Mark sm4 and missing aes using protected keys which are indetical to
same algs with no HW protected keys as tested.
Signed-off-by: Gilad Ben-Yossef <gilad@benyossef.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
                .alg = "cbc(paes)",
                .test = alg_test_null,
                .fips_allowed = 1,
+       }, {
+               /* Same as cbc(sm4) except the key is stored in
+                * hardware secure memory which we reference by index
+                */
+               .alg = "cbc(psm4)",
+               .test = alg_test_null,
        }, {
                .alg = "cbc(serpent)",
                .test = alg_test_skcipher,
                .test = alg_test_null,
                .fips_allowed = 1,
        }, {
+
+               /* Same as ctr(sm4) except the key is stored in
+                * hardware secure memory which we reference by index
+                */
+               .alg = "ctr(psm4)",
+               .test = alg_test_null,
+       }, {
                .alg = "ctr(serpent)",
                .test = alg_test_skcipher,
                .suite = {
                .suite = {
                        .cipher = __VECS(cts_mode_tv_template)
                }
+       }, {
+               /* Same as cts(cbc((aes)) except the key is stored in
+                * hardware secure memory which we reference by index
+                */
+               .alg = "cts(cbc(paes))",
+               .test = alg_test_null,
+               .fips_allowed = 1,
        }, {
                .alg = "deflate",
                .test = alg_test_comp,