1*4882a593Smuzhiyun /*
2*4882a593Smuzhiyun * Copyright (c) 2022 Rockchip Electronics Co. Ltd.
3*4882a593Smuzhiyun */
4*4882a593Smuzhiyun #include <stdlib.h>
5*4882a593Smuzhiyun #include <string.h>
6*4882a593Smuzhiyun #include <time.h>
7*4882a593Smuzhiyun #include <unistd.h>
8*4882a593Smuzhiyun #include "rkcrypto_core.h"
9*4882a593Smuzhiyun #include "rkcrypto_mem.h"
10*4882a593Smuzhiyun #include "rkcrypto_trace.h"
11*4882a593Smuzhiyun #include "cmode_adapter.h"
12*4882a593Smuzhiyun #include "test_cipher.h"
13*4882a593Smuzhiyun #include "test_utils.h"
14*4882a593Smuzhiyun
15*4882a593Smuzhiyun #define DATA_BUTT 0xFFFFFFFF
16*4882a593Smuzhiyun #define TEST_DATA_MAX (1024 * 1024)
17*4882a593Smuzhiyun #define MULTI_BLOCKSIZE (256 * 1024)
18*4882a593Smuzhiyun
19*4882a593Smuzhiyun struct test_cipher_item {
20*4882a593Smuzhiyun uint32_t algo;
21*4882a593Smuzhiyun uint32_t modes[RK_CIPHER_MODE_MAX];
22*4882a593Smuzhiyun uint32_t key_lens[4];
23*4882a593Smuzhiyun uint32_t iv_len;
24*4882a593Smuzhiyun };
25*4882a593Smuzhiyun
26*4882a593Smuzhiyun static struct test_cipher_item test_item_tbl[] = {
27*4882a593Smuzhiyun {
28*4882a593Smuzhiyun .algo = RK_ALGO_DES,
29*4882a593Smuzhiyun .modes = {
30*4882a593Smuzhiyun RK_CIPHER_MODE_ECB,
31*4882a593Smuzhiyun RK_CIPHER_MODE_CBC,
32*4882a593Smuzhiyun RK_CIPHER_MODE_CFB,
33*4882a593Smuzhiyun RK_CIPHER_MODE_OFB,
34*4882a593Smuzhiyun DATA_BUTT,
35*4882a593Smuzhiyun },
36*4882a593Smuzhiyun .key_lens = {8},
37*4882a593Smuzhiyun .iv_len = DES_BLOCK_SIZE,
38*4882a593Smuzhiyun },
39*4882a593Smuzhiyun
40*4882a593Smuzhiyun {
41*4882a593Smuzhiyun .algo = RK_ALGO_TDES,
42*4882a593Smuzhiyun .modes = {
43*4882a593Smuzhiyun RK_CIPHER_MODE_ECB,
44*4882a593Smuzhiyun RK_CIPHER_MODE_CBC,
45*4882a593Smuzhiyun RK_CIPHER_MODE_CFB,
46*4882a593Smuzhiyun RK_CIPHER_MODE_OFB,
47*4882a593Smuzhiyun DATA_BUTT,
48*4882a593Smuzhiyun },
49*4882a593Smuzhiyun .key_lens = {24},
50*4882a593Smuzhiyun .iv_len = DES_BLOCK_SIZE,
51*4882a593Smuzhiyun },
52*4882a593Smuzhiyun
53*4882a593Smuzhiyun {
54*4882a593Smuzhiyun .algo = RK_ALGO_AES,
55*4882a593Smuzhiyun .modes = {
56*4882a593Smuzhiyun RK_CIPHER_MODE_ECB,
57*4882a593Smuzhiyun RK_CIPHER_MODE_CBC,
58*4882a593Smuzhiyun RK_CIPHER_MODE_CTS,
59*4882a593Smuzhiyun RK_CIPHER_MODE_CTR,
60*4882a593Smuzhiyun RK_CIPHER_MODE_CFB,
61*4882a593Smuzhiyun RK_CIPHER_MODE_OFB,
62*4882a593Smuzhiyun RK_CIPHER_MODE_XTS,
63*4882a593Smuzhiyun DATA_BUTT,
64*4882a593Smuzhiyun },
65*4882a593Smuzhiyun .key_lens = {16, 24, 32},
66*4882a593Smuzhiyun .iv_len = AES_BLOCK_SIZE,
67*4882a593Smuzhiyun },
68*4882a593Smuzhiyun
69*4882a593Smuzhiyun {
70*4882a593Smuzhiyun .algo = RK_ALGO_SM4,
71*4882a593Smuzhiyun .modes = {
72*4882a593Smuzhiyun RK_CIPHER_MODE_ECB,
73*4882a593Smuzhiyun RK_CIPHER_MODE_CBC,
74*4882a593Smuzhiyun RK_CIPHER_MODE_CTS,
75*4882a593Smuzhiyun RK_CIPHER_MODE_CTR,
76*4882a593Smuzhiyun RK_CIPHER_MODE_CFB,
77*4882a593Smuzhiyun RK_CIPHER_MODE_OFB,
78*4882a593Smuzhiyun RK_CIPHER_MODE_XTS,
79*4882a593Smuzhiyun DATA_BUTT,
80*4882a593Smuzhiyun },
81*4882a593Smuzhiyun .key_lens = {16},
82*4882a593Smuzhiyun .iv_len = SM4_BLOCK_SIZE,
83*4882a593Smuzhiyun },
84*4882a593Smuzhiyun
85*4882a593Smuzhiyun };
86*4882a593Smuzhiyun
test_cipher_item_virt(const struct test_cipher_item * item,int verbose)87*4882a593Smuzhiyun static RK_RES test_cipher_item_virt(const struct test_cipher_item *item, int verbose)
88*4882a593Smuzhiyun {
89*4882a593Smuzhiyun RK_RES res = RK_CRYPTO_ERR_GENERIC;
90*4882a593Smuzhiyun uint32_t i, j, k;
91*4882a593Smuzhiyun uint32_t ops[] = {RK_OP_CIPHER_ENC, RK_OP_CIPHER_DEC};
92*4882a593Smuzhiyun uint32_t data_len = TEST_DATA_MAX;
93*4882a593Smuzhiyun rk_handle cipher_hdl = 0;
94*4882a593Smuzhiyun rk_cipher_config cipher_cfg;
95*4882a593Smuzhiyun uint8_t *plain = NULL, *cipher_soft = NULL, *cipher_hard = NULL;
96*4882a593Smuzhiyun uint32_t algo = 0, mode = 0, key_len, iv_len, operation;
97*4882a593Smuzhiyun uint32_t loop_nbytes, tmp_len;
98*4882a593Smuzhiyun uint8_t *tmp_data_in, *tmp_data_out;
99*4882a593Smuzhiyun uint8_t iv_tmp[AES_BLOCK_SIZE];
100*4882a593Smuzhiyun size_t page_size = getpagesize();
101*4882a593Smuzhiyun
102*4882a593Smuzhiyun if (posix_memalign((void *)&plain, page_size, data_len) || !plain) {
103*4882a593Smuzhiyun E_TRACE("plain malloc %uByte error!\n", data_len);
104*4882a593Smuzhiyun goto exit;
105*4882a593Smuzhiyun }
106*4882a593Smuzhiyun
107*4882a593Smuzhiyun if (posix_memalign((void *)&cipher_soft, page_size, data_len) || !cipher_soft) {
108*4882a593Smuzhiyun E_TRACE("cipher_soft malloc %uByte error!\n", data_len);
109*4882a593Smuzhiyun goto exit;
110*4882a593Smuzhiyun }
111*4882a593Smuzhiyun
112*4882a593Smuzhiyun if (posix_memalign((void *)&cipher_hard, page_size, data_len) || !cipher_hard) {
113*4882a593Smuzhiyun E_TRACE("cipher_hard malloc %uByte error!\n", data_len);
114*4882a593Smuzhiyun goto exit;
115*4882a593Smuzhiyun }
116*4882a593Smuzhiyun
117*4882a593Smuzhiyun test_get_rng(plain, data_len);
118*4882a593Smuzhiyun
119*4882a593Smuzhiyun memset(cipher_soft, 0x00, data_len);
120*4882a593Smuzhiyun memset(cipher_hard, 0x00, data_len);
121*4882a593Smuzhiyun
122*4882a593Smuzhiyun for (i = 0; i < ARRAY_SIZE(item->modes); i++) {
123*4882a593Smuzhiyun algo = item->algo;
124*4882a593Smuzhiyun mode = item->modes[i];
125*4882a593Smuzhiyun
126*4882a593Smuzhiyun if (mode == DATA_BUTT)
127*4882a593Smuzhiyun break;
128*4882a593Smuzhiyun
129*4882a593Smuzhiyun for (j = 0; j < ARRAY_SIZE(item->key_lens); j++) {
130*4882a593Smuzhiyun key_len = item->key_lens[j];
131*4882a593Smuzhiyun iv_len = item->iv_len;
132*4882a593Smuzhiyun
133*4882a593Smuzhiyun if (key_len == 0)
134*4882a593Smuzhiyun break;
135*4882a593Smuzhiyun
136*4882a593Smuzhiyun if (mode == RK_CIPHER_MODE_XTS)
137*4882a593Smuzhiyun key_len *= 2;
138*4882a593Smuzhiyun
139*4882a593Smuzhiyun for (k = 0; k < ARRAY_SIZE(ops); k++) {
140*4882a593Smuzhiyun operation = ops[k];
141*4882a593Smuzhiyun
142*4882a593Smuzhiyun memset(&cipher_cfg, 0x00, sizeof(cipher_cfg));
143*4882a593Smuzhiyun cipher_cfg.algo = algo;
144*4882a593Smuzhiyun cipher_cfg.mode = mode;
145*4882a593Smuzhiyun cipher_cfg.operation = operation;
146*4882a593Smuzhiyun cipher_cfg.key_len = key_len;
147*4882a593Smuzhiyun
148*4882a593Smuzhiyun test_get_rng(cipher_cfg.key, key_len);
149*4882a593Smuzhiyun test_get_rng(cipher_cfg.iv, iv_len);
150*4882a593Smuzhiyun memcpy(iv_tmp, cipher_cfg.iv, iv_len);
151*4882a593Smuzhiyun
152*4882a593Smuzhiyun res = rk_cipher_init(&cipher_cfg, &cipher_hdl);
153*4882a593Smuzhiyun if (res) {
154*4882a593Smuzhiyun if (res != RK_CRYPTO_ERR_NOT_SUPPORTED) {
155*4882a593Smuzhiyun E_TRACE("rk_cipher_init error[%x]\n", res);
156*4882a593Smuzhiyun goto exit;
157*4882a593Smuzhiyun }
158*4882a593Smuzhiyun
159*4882a593Smuzhiyun if (verbose)
160*4882a593Smuzhiyun printf("virt:\t[%s-%u]\t%s\t%s\tN/A\n",
161*4882a593Smuzhiyun test_algo_name(algo), key_len * 8,
162*4882a593Smuzhiyun test_mode_name(mode),
163*4882a593Smuzhiyun test_op_name(operation));
164*4882a593Smuzhiyun res = RK_CRYPTO_SUCCESS;
165*4882a593Smuzhiyun continue;
166*4882a593Smuzhiyun }
167*4882a593Smuzhiyun
168*4882a593Smuzhiyun if (is_no_multi_blocksize(mode))
169*4882a593Smuzhiyun data_len = TEST_DATA_MAX - 3;
170*4882a593Smuzhiyun else
171*4882a593Smuzhiyun data_len = TEST_DATA_MAX;
172*4882a593Smuzhiyun
173*4882a593Smuzhiyun /* chain multi crypt */
174*4882a593Smuzhiyun loop_nbytes = data_len;
175*4882a593Smuzhiyun tmp_data_in = plain;
176*4882a593Smuzhiyun tmp_data_out = cipher_hard;
177*4882a593Smuzhiyun
178*4882a593Smuzhiyun while (loop_nbytes) {
179*4882a593Smuzhiyun
180*4882a593Smuzhiyun tmp_len = loop_nbytes > MULTI_BLOCKSIZE ? MULTI_BLOCKSIZE : loop_nbytes;
181*4882a593Smuzhiyun
182*4882a593Smuzhiyun res = rk_cipher_crypt_virt(cipher_hdl, tmp_data_in,
183*4882a593Smuzhiyun tmp_data_out, tmp_len);
184*4882a593Smuzhiyun if (res) {
185*4882a593Smuzhiyun rk_cipher_final(cipher_hdl);
186*4882a593Smuzhiyun E_TRACE("rk_cipher_crypt_virt error[%x]\n", res);
187*4882a593Smuzhiyun goto exit;
188*4882a593Smuzhiyun }
189*4882a593Smuzhiyun
190*4882a593Smuzhiyun tmp_data_in += tmp_len;
191*4882a593Smuzhiyun tmp_data_out += tmp_len;
192*4882a593Smuzhiyun loop_nbytes -= tmp_len;
193*4882a593Smuzhiyun }
194*4882a593Smuzhiyun
195*4882a593Smuzhiyun rk_cipher_final(cipher_hdl);
196*4882a593Smuzhiyun cipher_hdl = 0;
197*4882a593Smuzhiyun
198*4882a593Smuzhiyun res = soft_cipher(algo, mode, operation,
199*4882a593Smuzhiyun cipher_cfg.key, cipher_cfg.key_len, iv_tmp,
200*4882a593Smuzhiyun plain, data_len, cipher_soft);
201*4882a593Smuzhiyun if (res) {
202*4882a593Smuzhiyun E_TRACE("soft_cipher error[%x]\n", res);
203*4882a593Smuzhiyun goto exit;
204*4882a593Smuzhiyun }
205*4882a593Smuzhiyun
206*4882a593Smuzhiyun /* Verify the result */
207*4882a593Smuzhiyun if (memcmp(cipher_hard, cipher_soft, data_len) != 0) {
208*4882a593Smuzhiyun E_TRACE("rkcrypto_test_cipher_virt compare failed.\n");
209*4882a593Smuzhiyun // test_dump_hex("cipher_hard", cipher_hard, data_len);
210*4882a593Smuzhiyun // test_dump_hex("cipher_soft", cipher_soft, data_len);
211*4882a593Smuzhiyun res = RK_CRYPTO_ERR_GENERIC;
212*4882a593Smuzhiyun goto exit;
213*4882a593Smuzhiyun }
214*4882a593Smuzhiyun
215*4882a593Smuzhiyun if (verbose)
216*4882a593Smuzhiyun printf("virt:\t[%s-%u]\t%s\t%s\tPASS\n",
217*4882a593Smuzhiyun test_algo_name(algo), key_len * 8,
218*4882a593Smuzhiyun test_mode_name(mode), test_op_name(operation));
219*4882a593Smuzhiyun }
220*4882a593Smuzhiyun }
221*4882a593Smuzhiyun }
222*4882a593Smuzhiyun
223*4882a593Smuzhiyun res = RK_CRYPTO_SUCCESS;
224*4882a593Smuzhiyun exit:
225*4882a593Smuzhiyun if (plain)
226*4882a593Smuzhiyun free(plain);
227*4882a593Smuzhiyun
228*4882a593Smuzhiyun if (cipher_soft)
229*4882a593Smuzhiyun free(cipher_soft);
230*4882a593Smuzhiyun
231*4882a593Smuzhiyun if (cipher_hard)
232*4882a593Smuzhiyun free(cipher_hard);
233*4882a593Smuzhiyun
234*4882a593Smuzhiyun if (res)
235*4882a593Smuzhiyun printf("virt:\t[%s-%u]\t%s\t%s\tFAIL\n",
236*4882a593Smuzhiyun test_algo_name(algo), key_len * 8,
237*4882a593Smuzhiyun test_mode_name(mode), test_op_name(operation));
238*4882a593Smuzhiyun
239*4882a593Smuzhiyun return res;
240*4882a593Smuzhiyun }
241*4882a593Smuzhiyun
test_cipher_item_fd(const struct test_cipher_item * item,int verbose)242*4882a593Smuzhiyun static RK_RES test_cipher_item_fd(const struct test_cipher_item *item, int verbose)
243*4882a593Smuzhiyun {
244*4882a593Smuzhiyun RK_RES res = RK_CRYPTO_ERR_GENERIC;
245*4882a593Smuzhiyun uint32_t i, j, k;
246*4882a593Smuzhiyun uint32_t ops[] = {RK_OP_CIPHER_ENC, RK_OP_CIPHER_DEC};
247*4882a593Smuzhiyun uint32_t data_len = TEST_DATA_MAX;
248*4882a593Smuzhiyun rk_handle cipher_hdl = 0;
249*4882a593Smuzhiyun rk_cipher_config cipher_cfg;
250*4882a593Smuzhiyun rk_crypto_mem *plain = NULL, *cipher_soft = NULL, *cipher_hard = NULL;
251*4882a593Smuzhiyun uint32_t algo = 0, mode = 0, key_len = 0, iv_len, operation;
252*4882a593Smuzhiyun uint8_t iv_tmp[AES_BLOCK_SIZE];
253*4882a593Smuzhiyun
254*4882a593Smuzhiyun plain = rk_crypto_mem_alloc(data_len);
255*4882a593Smuzhiyun if (!plain) {
256*4882a593Smuzhiyun E_TRACE("plain malloc %uByte error!\n", data_len);
257*4882a593Smuzhiyun goto exit;
258*4882a593Smuzhiyun }
259*4882a593Smuzhiyun
260*4882a593Smuzhiyun cipher_soft = rk_crypto_mem_alloc(data_len);
261*4882a593Smuzhiyun if (!cipher_soft) {
262*4882a593Smuzhiyun E_TRACE("cipher_soft malloc %uByte error!\n", data_len);
263*4882a593Smuzhiyun goto exit;
264*4882a593Smuzhiyun }
265*4882a593Smuzhiyun
266*4882a593Smuzhiyun cipher_hard = rk_crypto_mem_alloc(data_len);
267*4882a593Smuzhiyun if (!cipher_hard) {
268*4882a593Smuzhiyun E_TRACE("cipher_hard malloc %uByte error!\n", data_len);
269*4882a593Smuzhiyun goto exit;
270*4882a593Smuzhiyun }
271*4882a593Smuzhiyun
272*4882a593Smuzhiyun test_get_rng(plain->vaddr, data_len);
273*4882a593Smuzhiyun
274*4882a593Smuzhiyun for (i = 0; i < ARRAY_SIZE(item->modes); i++) {
275*4882a593Smuzhiyun algo = item->algo;
276*4882a593Smuzhiyun mode = item->modes[i];
277*4882a593Smuzhiyun
278*4882a593Smuzhiyun if (mode == DATA_BUTT)
279*4882a593Smuzhiyun break;
280*4882a593Smuzhiyun
281*4882a593Smuzhiyun for (j = 0; j < ARRAY_SIZE(item->key_lens); j++) {
282*4882a593Smuzhiyun key_len = item->key_lens[j];
283*4882a593Smuzhiyun iv_len = item->iv_len;
284*4882a593Smuzhiyun
285*4882a593Smuzhiyun if (key_len == 0)
286*4882a593Smuzhiyun break;
287*4882a593Smuzhiyun
288*4882a593Smuzhiyun if (mode == RK_CIPHER_MODE_XTS)
289*4882a593Smuzhiyun key_len *= 2;
290*4882a593Smuzhiyun
291*4882a593Smuzhiyun for (k = 0; k < ARRAY_SIZE(ops); k++) {
292*4882a593Smuzhiyun operation = ops[k];
293*4882a593Smuzhiyun
294*4882a593Smuzhiyun memset(&cipher_cfg, 0x00, sizeof(cipher_cfg));
295*4882a593Smuzhiyun cipher_cfg.algo = algo;
296*4882a593Smuzhiyun cipher_cfg.mode = mode;
297*4882a593Smuzhiyun cipher_cfg.operation = operation;
298*4882a593Smuzhiyun cipher_cfg.key_len = key_len;
299*4882a593Smuzhiyun
300*4882a593Smuzhiyun test_get_rng(cipher_cfg.key, key_len);
301*4882a593Smuzhiyun test_get_rng(cipher_cfg.iv, iv_len);
302*4882a593Smuzhiyun memcpy(iv_tmp, cipher_cfg.iv, iv_len);
303*4882a593Smuzhiyun
304*4882a593Smuzhiyun res = rk_cipher_init(&cipher_cfg, &cipher_hdl);
305*4882a593Smuzhiyun if (res) {
306*4882a593Smuzhiyun if (res != RK_CRYPTO_ERR_NOT_SUPPORTED) {
307*4882a593Smuzhiyun E_TRACE("rk_cipher_init error[%x]\n", res);
308*4882a593Smuzhiyun goto exit;
309*4882a593Smuzhiyun }
310*4882a593Smuzhiyun
311*4882a593Smuzhiyun if (verbose)
312*4882a593Smuzhiyun printf("dma_fd:\t[%s-%u]\t%s\t%s\tN/A\n",
313*4882a593Smuzhiyun test_algo_name(algo), key_len * 8,
314*4882a593Smuzhiyun test_mode_name(mode), test_op_name(operation));
315*4882a593Smuzhiyun res = RK_CRYPTO_SUCCESS;
316*4882a593Smuzhiyun continue;
317*4882a593Smuzhiyun }
318*4882a593Smuzhiyun
319*4882a593Smuzhiyun if (is_no_multi_blocksize(mode))
320*4882a593Smuzhiyun data_len = TEST_DATA_MAX - 7;
321*4882a593Smuzhiyun else
322*4882a593Smuzhiyun data_len = TEST_DATA_MAX;
323*4882a593Smuzhiyun
324*4882a593Smuzhiyun res = rk_cipher_crypt(cipher_hdl, plain->dma_fd,
325*4882a593Smuzhiyun cipher_hard->dma_fd, data_len);
326*4882a593Smuzhiyun if (res) {
327*4882a593Smuzhiyun rk_cipher_final(cipher_hdl);
328*4882a593Smuzhiyun E_TRACE("rk_cipher_crypt error[%x]\n", res);
329*4882a593Smuzhiyun goto exit;
330*4882a593Smuzhiyun }
331*4882a593Smuzhiyun
332*4882a593Smuzhiyun rk_cipher_final(cipher_hdl);
333*4882a593Smuzhiyun cipher_hdl = 0;
334*4882a593Smuzhiyun
335*4882a593Smuzhiyun res = soft_cipher(algo, mode, operation,
336*4882a593Smuzhiyun cipher_cfg.key, cipher_cfg.key_len, iv_tmp,
337*4882a593Smuzhiyun plain->vaddr, data_len, cipher_soft->vaddr);
338*4882a593Smuzhiyun if (res) {
339*4882a593Smuzhiyun E_TRACE("soft_cipher error[%x]\n", res);
340*4882a593Smuzhiyun goto exit;
341*4882a593Smuzhiyun }
342*4882a593Smuzhiyun
343*4882a593Smuzhiyun /* Verify the result */
344*4882a593Smuzhiyun if (memcmp(cipher_hard->vaddr, cipher_soft->vaddr, data_len) != 0) {
345*4882a593Smuzhiyun E_TRACE("rkcrypto_test_cipher compare failed.\n");
346*4882a593Smuzhiyun // test_dump_hex("cipher_hard", cipher_hard->vaddr, data_len);
347*4882a593Smuzhiyun // test_dump_hex("cipher_soft", cipher_soft->vaddr, data_len);
348*4882a593Smuzhiyun res = RK_CRYPTO_ERR_GENERIC;
349*4882a593Smuzhiyun goto exit;
350*4882a593Smuzhiyun }
351*4882a593Smuzhiyun
352*4882a593Smuzhiyun if (verbose)
353*4882a593Smuzhiyun printf("dma_fd:\t[%s-%u]\t%s\t%s\tPASS\n",
354*4882a593Smuzhiyun test_algo_name(algo), key_len * 8,
355*4882a593Smuzhiyun test_mode_name(mode), test_op_name(operation));
356*4882a593Smuzhiyun }
357*4882a593Smuzhiyun }
358*4882a593Smuzhiyun }
359*4882a593Smuzhiyun
360*4882a593Smuzhiyun res = RK_CRYPTO_SUCCESS;
361*4882a593Smuzhiyun exit:
362*4882a593Smuzhiyun rk_crypto_mem_free(plain);
363*4882a593Smuzhiyun rk_crypto_mem_free(cipher_soft);
364*4882a593Smuzhiyun rk_crypto_mem_free(cipher_hard);
365*4882a593Smuzhiyun
366*4882a593Smuzhiyun if (res && key_len)
367*4882a593Smuzhiyun printf("dma_fd:\t[%s-%u]\t%s\t%s\tFAIL\n",
368*4882a593Smuzhiyun test_algo_name(algo), key_len * 8,
369*4882a593Smuzhiyun test_mode_name(mode), test_op_name(operation));
370*4882a593Smuzhiyun
371*4882a593Smuzhiyun return res;
372*4882a593Smuzhiyun }
373*4882a593Smuzhiyun
test_cipher(int verbose)374*4882a593Smuzhiyun RK_RES test_cipher(int verbose)
375*4882a593Smuzhiyun {
376*4882a593Smuzhiyun RK_RES res = RK_CRYPTO_ERR_GENERIC;
377*4882a593Smuzhiyun uint32_t i;
378*4882a593Smuzhiyun
379*4882a593Smuzhiyun res = rk_crypto_init();
380*4882a593Smuzhiyun if (res) {
381*4882a593Smuzhiyun printf("rk_crypto_init error %08x\n", res);
382*4882a593Smuzhiyun return res;
383*4882a593Smuzhiyun }
384*4882a593Smuzhiyun
385*4882a593Smuzhiyun for (i = 0; i < ARRAY_SIZE(test_item_tbl); i++) {
386*4882a593Smuzhiyun res = test_cipher_item_virt(&test_item_tbl[i], verbose);
387*4882a593Smuzhiyun if (res)
388*4882a593Smuzhiyun goto exit;
389*4882a593Smuzhiyun
390*4882a593Smuzhiyun res = test_cipher_item_fd(&test_item_tbl[i], verbose);
391*4882a593Smuzhiyun if (res)
392*4882a593Smuzhiyun goto exit;
393*4882a593Smuzhiyun if (verbose)
394*4882a593Smuzhiyun printf("\n");
395*4882a593Smuzhiyun }
396*4882a593Smuzhiyun exit:
397*4882a593Smuzhiyun rk_crypto_deinit();
398*4882a593Smuzhiyun return res;
399*4882a593Smuzhiyun }
400*4882a593Smuzhiyun
401