tcrypt.c 76 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989
  1. /*
  2. * Quick & dirty crypto testing module.
  3. *
  4. * This will only exist until we have a better testing mechanism
  5. * (e.g. a char device).
  6. *
  7. * Copyright (c) 2002 James Morris <jmorris@intercode.com.au>
  8. * Copyright (c) 2002 Jean-Francois Dive <jef@linuxbe.org>
  9. * Copyright (c) 2007 Nokia Siemens Networks
  10. *
  11. * Updated RFC4106 AES-GCM testing.
  12. * Authors: Aidan O'Mahony (aidan.o.mahony@intel.com)
  13. * Adrian Hoban <adrian.hoban@intel.com>
  14. * Gabriele Paoloni <gabriele.paoloni@intel.com>
  15. * Tadeusz Struk (tadeusz.struk@intel.com)
  16. * Copyright (c) 2010, Intel Corporation.
  17. *
  18. * This program is free software; you can redistribute it and/or modify it
  19. * under the terms of the GNU General Public License as published by the Free
  20. * Software Foundation; either version 2 of the License, or (at your option)
  21. * any later version.
  22. *
  23. */
  24. #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
  25. #include <crypto/aead.h>
  26. #include <crypto/hash.h>
  27. #include <crypto/skcipher.h>
  28. #include <linux/err.h>
  29. #include <linux/fips.h>
  30. #include <linux/init.h>
  31. #include <linux/gfp.h>
  32. #include <linux/module.h>
  33. #include <linux/scatterlist.h>
  34. #include <linux/string.h>
  35. #include <linux/moduleparam.h>
  36. #include <linux/jiffies.h>
  37. #include <linux/timex.h>
  38. #include <linux/interrupt.h>
  39. #include "tcrypt.h"
  40. /*
  41. * Need slab memory for testing (size in number of pages).
  42. */
  43. #define TVMEMSIZE 4
  44. /*
  45. * Used by test_cipher_speed()
  46. */
  47. #define ENCRYPT 1
  48. #define DECRYPT 0
  49. #define MAX_DIGEST_SIZE 64
  50. /*
  51. * return a string with the driver name
  52. */
  53. #define get_driver_name(tfm_type, tfm) crypto_tfm_alg_driver_name(tfm_type ## _tfm(tfm))
  54. /*
  55. * Used by test_cipher_speed()
  56. */
  57. static unsigned int sec;
  58. static char *alg = NULL;
  59. static u32 type;
  60. static u32 mask;
  61. static int mode;
  62. static u32 num_mb = 8;
  63. static char *tvmem[TVMEMSIZE];
  64. static char *check[] = {
  65. "des", "md5", "des3_ede", "rot13", "sha1", "sha224", "sha256", "sm3",
  66. "blowfish", "twofish", "serpent", "sha384", "sha512", "md4", "aes",
  67. "cast6", "arc4", "michael_mic", "deflate", "crc32c", "tea", "xtea",
  68. "khazad", "wp512", "wp384", "wp256", "tnepres", "xeta", "fcrypt",
  69. "camellia", "seed", "salsa20", "rmd128", "rmd160", "rmd256", "rmd320",
  70. "lzo", "cts", "zlib", "sha3-224", "sha3-256", "sha3-384", "sha3-512",
  71. NULL
  72. };
  73. static u32 block_sizes[] = { 16, 64, 256, 1024, 8192, 0 };
  74. static u32 aead_sizes[] = { 16, 64, 256, 512, 1024, 2048, 4096, 8192, 0 };
  75. #define XBUFSIZE 8
  76. #define MAX_IVLEN 32
  77. static int testmgr_alloc_buf(char *buf[XBUFSIZE])
  78. {
  79. int i;
  80. for (i = 0; i < XBUFSIZE; i++) {
  81. buf[i] = (void *)__get_free_page(GFP_KERNEL);
  82. if (!buf[i])
  83. goto err_free_buf;
  84. }
  85. return 0;
  86. err_free_buf:
  87. while (i-- > 0)
  88. free_page((unsigned long)buf[i]);
  89. return -ENOMEM;
  90. }
  91. static void testmgr_free_buf(char *buf[XBUFSIZE])
  92. {
  93. int i;
  94. for (i = 0; i < XBUFSIZE; i++)
  95. free_page((unsigned long)buf[i]);
  96. }
  97. static void sg_init_aead(struct scatterlist *sg, char *xbuf[XBUFSIZE],
  98. unsigned int buflen, const void *assoc,
  99. unsigned int aad_size)
  100. {
  101. int np = (buflen + PAGE_SIZE - 1)/PAGE_SIZE;
  102. int k, rem;
  103. if (np > XBUFSIZE) {
  104. rem = PAGE_SIZE;
  105. np = XBUFSIZE;
  106. } else {
  107. rem = buflen % PAGE_SIZE;
  108. }
  109. sg_init_table(sg, np + 1);
  110. sg_set_buf(&sg[0], assoc, aad_size);
  111. if (rem)
  112. np--;
  113. for (k = 0; k < np; k++)
  114. sg_set_buf(&sg[k + 1], xbuf[k], PAGE_SIZE);
  115. if (rem)
  116. sg_set_buf(&sg[k + 1], xbuf[k], rem);
  117. }
  118. static inline int do_one_aead_op(struct aead_request *req, int ret)
  119. {
  120. struct crypto_wait *wait = req->base.data;
  121. return crypto_wait_req(ret, wait);
  122. }
  123. struct test_mb_aead_data {
  124. struct scatterlist sg[XBUFSIZE];
  125. struct scatterlist sgout[XBUFSIZE];
  126. struct aead_request *req;
  127. struct crypto_wait wait;
  128. char *xbuf[XBUFSIZE];
  129. char *xoutbuf[XBUFSIZE];
  130. char *axbuf[XBUFSIZE];
  131. };
  132. static int do_mult_aead_op(struct test_mb_aead_data *data, int enc,
  133. u32 num_mb, int *rc)
  134. {
  135. int i, err = 0;
  136. /* Fire up a bunch of concurrent requests */
  137. for (i = 0; i < num_mb; i++) {
  138. if (enc == ENCRYPT)
  139. rc[i] = crypto_aead_encrypt(data[i].req);
  140. else
  141. rc[i] = crypto_aead_decrypt(data[i].req);
  142. }
  143. /* Wait for all requests to finish */
  144. for (i = 0; i < num_mb; i++) {
  145. rc[i] = crypto_wait_req(rc[i], &data[i].wait);
  146. if (rc[i]) {
  147. pr_info("concurrent request %d error %d\n", i, rc[i]);
  148. err = rc[i];
  149. }
  150. }
  151. return err;
  152. }
  153. static int test_mb_aead_jiffies(struct test_mb_aead_data *data, int enc,
  154. int blen, int secs, u32 num_mb)
  155. {
  156. unsigned long start, end;
  157. int bcount;
  158. int ret = 0;
  159. int *rc;
  160. rc = kcalloc(num_mb, sizeof(*rc), GFP_KERNEL);
  161. if (!rc)
  162. return -ENOMEM;
  163. for (start = jiffies, end = start + secs * HZ, bcount = 0;
  164. time_before(jiffies, end); bcount++) {
  165. ret = do_mult_aead_op(data, enc, num_mb, rc);
  166. if (ret)
  167. goto out;
  168. }
  169. pr_cont("%d operations in %d seconds (%ld bytes)\n",
  170. bcount * num_mb, secs, (long)bcount * blen * num_mb);
  171. out:
  172. kfree(rc);
  173. return ret;
  174. }
  175. static int test_mb_aead_cycles(struct test_mb_aead_data *data, int enc,
  176. int blen, u32 num_mb)
  177. {
  178. unsigned long cycles = 0;
  179. int ret = 0;
  180. int i;
  181. int *rc;
  182. rc = kcalloc(num_mb, sizeof(*rc), GFP_KERNEL);
  183. if (!rc)
  184. return -ENOMEM;
  185. /* Warm-up run. */
  186. for (i = 0; i < 4; i++) {
  187. ret = do_mult_aead_op(data, enc, num_mb, rc);
  188. if (ret)
  189. goto out;
  190. }
  191. /* The real thing. */
  192. for (i = 0; i < 8; i++) {
  193. cycles_t start, end;
  194. start = get_cycles();
  195. ret = do_mult_aead_op(data, enc, num_mb, rc);
  196. end = get_cycles();
  197. if (ret)
  198. goto out;
  199. cycles += end - start;
  200. }
  201. pr_cont("1 operation in %lu cycles (%d bytes)\n",
  202. (cycles + 4) / (8 * num_mb), blen);
  203. out:
  204. kfree(rc);
  205. return ret;
  206. }
  207. static void test_mb_aead_speed(const char *algo, int enc, int secs,
  208. struct aead_speed_template *template,
  209. unsigned int tcount, u8 authsize,
  210. unsigned int aad_size, u8 *keysize, u32 num_mb)
  211. {
  212. struct test_mb_aead_data *data;
  213. struct crypto_aead *tfm;
  214. unsigned int i, j, iv_len;
  215. const char *key;
  216. const char *e;
  217. void *assoc;
  218. u32 *b_size;
  219. char *iv;
  220. int ret;
  221. if (aad_size >= PAGE_SIZE) {
  222. pr_err("associate data length (%u) too big\n", aad_size);
  223. return;
  224. }
  225. iv = kzalloc(MAX_IVLEN, GFP_KERNEL);
  226. if (!iv)
  227. return;
  228. if (enc == ENCRYPT)
  229. e = "encryption";
  230. else
  231. e = "decryption";
  232. data = kcalloc(num_mb, sizeof(*data), GFP_KERNEL);
  233. if (!data)
  234. goto out_free_iv;
  235. tfm = crypto_alloc_aead(algo, 0, 0);
  236. if (IS_ERR(tfm)) {
  237. pr_err("failed to load transform for %s: %ld\n",
  238. algo, PTR_ERR(tfm));
  239. goto out_free_data;
  240. }
  241. ret = crypto_aead_setauthsize(tfm, authsize);
  242. for (i = 0; i < num_mb; ++i)
  243. if (testmgr_alloc_buf(data[i].xbuf)) {
  244. while (i--)
  245. testmgr_free_buf(data[i].xbuf);
  246. goto out_free_tfm;
  247. }
  248. for (i = 0; i < num_mb; ++i)
  249. if (testmgr_alloc_buf(data[i].axbuf)) {
  250. while (i--)
  251. testmgr_free_buf(data[i].axbuf);
  252. goto out_free_xbuf;
  253. }
  254. for (i = 0; i < num_mb; ++i)
  255. if (testmgr_alloc_buf(data[i].xoutbuf)) {
  256. while (i--)
  257. testmgr_free_buf(data[i].xoutbuf);
  258. goto out_free_axbuf;
  259. }
  260. for (i = 0; i < num_mb; ++i) {
  261. data[i].req = aead_request_alloc(tfm, GFP_KERNEL);
  262. if (!data[i].req) {
  263. pr_err("alg: skcipher: Failed to allocate request for %s\n",
  264. algo);
  265. while (i--)
  266. aead_request_free(data[i].req);
  267. goto out_free_xoutbuf;
  268. }
  269. }
  270. for (i = 0; i < num_mb; ++i) {
  271. crypto_init_wait(&data[i].wait);
  272. aead_request_set_callback(data[i].req,
  273. CRYPTO_TFM_REQ_MAY_BACKLOG,
  274. crypto_req_done, &data[i].wait);
  275. }
  276. pr_info("\ntesting speed of multibuffer %s (%s) %s\n", algo,
  277. get_driver_name(crypto_aead, tfm), e);
  278. i = 0;
  279. do {
  280. b_size = aead_sizes;
  281. do {
  282. if (*b_size + authsize > XBUFSIZE * PAGE_SIZE) {
  283. pr_err("template (%u) too big for buffer (%lu)\n",
  284. authsize + *b_size,
  285. XBUFSIZE * PAGE_SIZE);
  286. goto out;
  287. }
  288. pr_info("test %u (%d bit key, %d byte blocks): ", i,
  289. *keysize * 8, *b_size);
  290. /* Set up tfm global state, i.e. the key */
  291. memset(tvmem[0], 0xff, PAGE_SIZE);
  292. key = tvmem[0];
  293. for (j = 0; j < tcount; j++) {
  294. if (template[j].klen == *keysize) {
  295. key = template[j].key;
  296. break;
  297. }
  298. }
  299. crypto_aead_clear_flags(tfm, ~0);
  300. ret = crypto_aead_setkey(tfm, key, *keysize);
  301. if (ret) {
  302. pr_err("setkey() failed flags=%x\n",
  303. crypto_aead_get_flags(tfm));
  304. goto out;
  305. }
  306. iv_len = crypto_aead_ivsize(tfm);
  307. if (iv_len)
  308. memset(iv, 0xff, iv_len);
  309. /* Now setup per request stuff, i.e. buffers */
  310. for (j = 0; j < num_mb; ++j) {
  311. struct test_mb_aead_data *cur = &data[j];
  312. assoc = cur->axbuf[0];
  313. memset(assoc, 0xff, aad_size);
  314. sg_init_aead(cur->sg, cur->xbuf,
  315. *b_size + (enc ? 0 : authsize),
  316. assoc, aad_size);
  317. sg_init_aead(cur->sgout, cur->xoutbuf,
  318. *b_size + (enc ? authsize : 0),
  319. assoc, aad_size);
  320. aead_request_set_ad(cur->req, aad_size);
  321. if (!enc) {
  322. aead_request_set_crypt(cur->req,
  323. cur->sgout,
  324. cur->sg,
  325. *b_size, iv);
  326. ret = crypto_aead_encrypt(cur->req);
  327. ret = do_one_aead_op(cur->req, ret);
  328. if (ret) {
  329. pr_err("calculating auth failed failed (%d)\n",
  330. ret);
  331. break;
  332. }
  333. }
  334. aead_request_set_crypt(cur->req, cur->sg,
  335. cur->sgout, *b_size +
  336. (enc ? 0 : authsize),
  337. iv);
  338. }
  339. if (secs)
  340. ret = test_mb_aead_jiffies(data, enc, *b_size,
  341. secs, num_mb);
  342. else
  343. ret = test_mb_aead_cycles(data, enc, *b_size,
  344. num_mb);
  345. if (ret) {
  346. pr_err("%s() failed return code=%d\n", e, ret);
  347. break;
  348. }
  349. b_size++;
  350. i++;
  351. } while (*b_size);
  352. keysize++;
  353. } while (*keysize);
  354. out:
  355. for (i = 0; i < num_mb; ++i)
  356. aead_request_free(data[i].req);
  357. out_free_xoutbuf:
  358. for (i = 0; i < num_mb; ++i)
  359. testmgr_free_buf(data[i].xoutbuf);
  360. out_free_axbuf:
  361. for (i = 0; i < num_mb; ++i)
  362. testmgr_free_buf(data[i].axbuf);
  363. out_free_xbuf:
  364. for (i = 0; i < num_mb; ++i)
  365. testmgr_free_buf(data[i].xbuf);
  366. out_free_tfm:
  367. crypto_free_aead(tfm);
  368. out_free_data:
  369. kfree(data);
  370. out_free_iv:
  371. kfree(iv);
  372. }
  373. static int test_aead_jiffies(struct aead_request *req, int enc,
  374. int blen, int secs)
  375. {
  376. unsigned long start, end;
  377. int bcount;
  378. int ret;
  379. for (start = jiffies, end = start + secs * HZ, bcount = 0;
  380. time_before(jiffies, end); bcount++) {
  381. if (enc)
  382. ret = do_one_aead_op(req, crypto_aead_encrypt(req));
  383. else
  384. ret = do_one_aead_op(req, crypto_aead_decrypt(req));
  385. if (ret)
  386. return ret;
  387. }
  388. printk("%d operations in %d seconds (%ld bytes)\n",
  389. bcount, secs, (long)bcount * blen);
  390. return 0;
  391. }
  392. static int test_aead_cycles(struct aead_request *req, int enc, int blen)
  393. {
  394. unsigned long cycles = 0;
  395. int ret = 0;
  396. int i;
  397. /* Warm-up run. */
  398. for (i = 0; i < 4; i++) {
  399. if (enc)
  400. ret = do_one_aead_op(req, crypto_aead_encrypt(req));
  401. else
  402. ret = do_one_aead_op(req, crypto_aead_decrypt(req));
  403. if (ret)
  404. goto out;
  405. }
  406. /* The real thing. */
  407. for (i = 0; i < 8; i++) {
  408. cycles_t start, end;
  409. start = get_cycles();
  410. if (enc)
  411. ret = do_one_aead_op(req, crypto_aead_encrypt(req));
  412. else
  413. ret = do_one_aead_op(req, crypto_aead_decrypt(req));
  414. end = get_cycles();
  415. if (ret)
  416. goto out;
  417. cycles += end - start;
  418. }
  419. out:
  420. if (ret == 0)
  421. printk("1 operation in %lu cycles (%d bytes)\n",
  422. (cycles + 4) / 8, blen);
  423. return ret;
  424. }
  425. static void test_aead_speed(const char *algo, int enc, unsigned int secs,
  426. struct aead_speed_template *template,
  427. unsigned int tcount, u8 authsize,
  428. unsigned int aad_size, u8 *keysize)
  429. {
  430. unsigned int i, j;
  431. struct crypto_aead *tfm;
  432. int ret = -ENOMEM;
  433. const char *key;
  434. struct aead_request *req;
  435. struct scatterlist *sg;
  436. struct scatterlist *sgout;
  437. const char *e;
  438. void *assoc;
  439. char *iv;
  440. char *xbuf[XBUFSIZE];
  441. char *xoutbuf[XBUFSIZE];
  442. char *axbuf[XBUFSIZE];
  443. unsigned int *b_size;
  444. unsigned int iv_len;
  445. struct crypto_wait wait;
  446. iv = kzalloc(MAX_IVLEN, GFP_KERNEL);
  447. if (!iv)
  448. return;
  449. if (aad_size >= PAGE_SIZE) {
  450. pr_err("associate data length (%u) too big\n", aad_size);
  451. goto out_noxbuf;
  452. }
  453. if (enc == ENCRYPT)
  454. e = "encryption";
  455. else
  456. e = "decryption";
  457. if (testmgr_alloc_buf(xbuf))
  458. goto out_noxbuf;
  459. if (testmgr_alloc_buf(axbuf))
  460. goto out_noaxbuf;
  461. if (testmgr_alloc_buf(xoutbuf))
  462. goto out_nooutbuf;
  463. sg = kmalloc(sizeof(*sg) * 9 * 2, GFP_KERNEL);
  464. if (!sg)
  465. goto out_nosg;
  466. sgout = &sg[9];
  467. tfm = crypto_alloc_aead(algo, 0, 0);
  468. if (IS_ERR(tfm)) {
  469. pr_err("alg: aead: Failed to load transform for %s: %ld\n", algo,
  470. PTR_ERR(tfm));
  471. goto out_notfm;
  472. }
  473. crypto_init_wait(&wait);
  474. printk(KERN_INFO "\ntesting speed of %s (%s) %s\n", algo,
  475. get_driver_name(crypto_aead, tfm), e);
  476. req = aead_request_alloc(tfm, GFP_KERNEL);
  477. if (!req) {
  478. pr_err("alg: aead: Failed to allocate request for %s\n",
  479. algo);
  480. goto out_noreq;
  481. }
  482. aead_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
  483. crypto_req_done, &wait);
  484. i = 0;
  485. do {
  486. b_size = aead_sizes;
  487. do {
  488. assoc = axbuf[0];
  489. memset(assoc, 0xff, aad_size);
  490. if ((*keysize + *b_size) > TVMEMSIZE * PAGE_SIZE) {
  491. pr_err("template (%u) too big for tvmem (%lu)\n",
  492. *keysize + *b_size,
  493. TVMEMSIZE * PAGE_SIZE);
  494. goto out;
  495. }
  496. key = tvmem[0];
  497. for (j = 0; j < tcount; j++) {
  498. if (template[j].klen == *keysize) {
  499. key = template[j].key;
  500. break;
  501. }
  502. }
  503. ret = crypto_aead_setkey(tfm, key, *keysize);
  504. ret = crypto_aead_setauthsize(tfm, authsize);
  505. iv_len = crypto_aead_ivsize(tfm);
  506. if (iv_len)
  507. memset(iv, 0xff, iv_len);
  508. crypto_aead_clear_flags(tfm, ~0);
  509. printk(KERN_INFO "test %u (%d bit key, %d byte blocks): ",
  510. i, *keysize * 8, *b_size);
  511. memset(tvmem[0], 0xff, PAGE_SIZE);
  512. if (ret) {
  513. pr_err("setkey() failed flags=%x\n",
  514. crypto_aead_get_flags(tfm));
  515. goto out;
  516. }
  517. sg_init_aead(sg, xbuf, *b_size + (enc ? 0 : authsize),
  518. assoc, aad_size);
  519. sg_init_aead(sgout, xoutbuf,
  520. *b_size + (enc ? authsize : 0), assoc,
  521. aad_size);
  522. aead_request_set_ad(req, aad_size);
  523. if (!enc) {
  524. /*
  525. * For decryption we need a proper auth so
  526. * we do the encryption path once with buffers
  527. * reversed (input <-> output) to calculate it
  528. */
  529. aead_request_set_crypt(req, sgout, sg,
  530. *b_size, iv);
  531. ret = do_one_aead_op(req,
  532. crypto_aead_encrypt(req));
  533. if (ret) {
  534. pr_err("calculating auth failed failed (%d)\n",
  535. ret);
  536. break;
  537. }
  538. }
  539. aead_request_set_crypt(req, sg, sgout,
  540. *b_size + (enc ? 0 : authsize),
  541. iv);
  542. if (secs)
  543. ret = test_aead_jiffies(req, enc, *b_size,
  544. secs);
  545. else
  546. ret = test_aead_cycles(req, enc, *b_size);
  547. if (ret) {
  548. pr_err("%s() failed return code=%d\n", e, ret);
  549. break;
  550. }
  551. b_size++;
  552. i++;
  553. } while (*b_size);
  554. keysize++;
  555. } while (*keysize);
  556. out:
  557. aead_request_free(req);
  558. out_noreq:
  559. crypto_free_aead(tfm);
  560. out_notfm:
  561. kfree(sg);
  562. out_nosg:
  563. testmgr_free_buf(xoutbuf);
  564. out_nooutbuf:
  565. testmgr_free_buf(axbuf);
  566. out_noaxbuf:
  567. testmgr_free_buf(xbuf);
  568. out_noxbuf:
  569. kfree(iv);
  570. }
  571. static void test_hash_sg_init(struct scatterlist *sg)
  572. {
  573. int i;
  574. sg_init_table(sg, TVMEMSIZE);
  575. for (i = 0; i < TVMEMSIZE; i++) {
  576. sg_set_buf(sg + i, tvmem[i], PAGE_SIZE);
  577. memset(tvmem[i], 0xff, PAGE_SIZE);
  578. }
  579. }
  580. static inline int do_one_ahash_op(struct ahash_request *req, int ret)
  581. {
  582. struct crypto_wait *wait = req->base.data;
  583. return crypto_wait_req(ret, wait);
  584. }
  585. struct test_mb_ahash_data {
  586. struct scatterlist sg[XBUFSIZE];
  587. char result[64];
  588. struct ahash_request *req;
  589. struct crypto_wait wait;
  590. char *xbuf[XBUFSIZE];
  591. };
  592. static inline int do_mult_ahash_op(struct test_mb_ahash_data *data, u32 num_mb,
  593. int *rc)
  594. {
  595. int i, err = 0;
  596. /* Fire up a bunch of concurrent requests */
  597. for (i = 0; i < num_mb; i++)
  598. rc[i] = crypto_ahash_digest(data[i].req);
  599. /* Wait for all requests to finish */
  600. for (i = 0; i < num_mb; i++) {
  601. rc[i] = crypto_wait_req(rc[i], &data[i].wait);
  602. if (rc[i]) {
  603. pr_info("concurrent request %d error %d\n", i, rc[i]);
  604. err = rc[i];
  605. }
  606. }
  607. return err;
  608. }
  609. static int test_mb_ahash_jiffies(struct test_mb_ahash_data *data, int blen,
  610. int secs, u32 num_mb)
  611. {
  612. unsigned long start, end;
  613. int bcount;
  614. int ret = 0;
  615. int *rc;
  616. rc = kcalloc(num_mb, sizeof(*rc), GFP_KERNEL);
  617. if (!rc)
  618. return -ENOMEM;
  619. for (start = jiffies, end = start + secs * HZ, bcount = 0;
  620. time_before(jiffies, end); bcount++) {
  621. ret = do_mult_ahash_op(data, num_mb, rc);
  622. if (ret)
  623. goto out;
  624. }
  625. pr_cont("%d operations in %d seconds (%ld bytes)\n",
  626. bcount * num_mb, secs, (long)bcount * blen * num_mb);
  627. out:
  628. kfree(rc);
  629. return ret;
  630. }
  631. static int test_mb_ahash_cycles(struct test_mb_ahash_data *data, int blen,
  632. u32 num_mb)
  633. {
  634. unsigned long cycles = 0;
  635. int ret = 0;
  636. int i;
  637. int *rc;
  638. rc = kcalloc(num_mb, sizeof(*rc), GFP_KERNEL);
  639. if (!rc)
  640. return -ENOMEM;
  641. /* Warm-up run. */
  642. for (i = 0; i < 4; i++) {
  643. ret = do_mult_ahash_op(data, num_mb, rc);
  644. if (ret)
  645. goto out;
  646. }
  647. /* The real thing. */
  648. for (i = 0; i < 8; i++) {
  649. cycles_t start, end;
  650. start = get_cycles();
  651. ret = do_mult_ahash_op(data, num_mb, rc);
  652. end = get_cycles();
  653. if (ret)
  654. goto out;
  655. cycles += end - start;
  656. }
  657. pr_cont("1 operation in %lu cycles (%d bytes)\n",
  658. (cycles + 4) / (8 * num_mb), blen);
  659. out:
  660. kfree(rc);
  661. return ret;
  662. }
  663. static void test_mb_ahash_speed(const char *algo, unsigned int secs,
  664. struct hash_speed *speed, u32 num_mb)
  665. {
  666. struct test_mb_ahash_data *data;
  667. struct crypto_ahash *tfm;
  668. unsigned int i, j, k;
  669. int ret;
  670. data = kcalloc(num_mb, sizeof(*data), GFP_KERNEL);
  671. if (!data)
  672. return;
  673. tfm = crypto_alloc_ahash(algo, 0, 0);
  674. if (IS_ERR(tfm)) {
  675. pr_err("failed to load transform for %s: %ld\n",
  676. algo, PTR_ERR(tfm));
  677. goto free_data;
  678. }
  679. for (i = 0; i < num_mb; ++i) {
  680. if (testmgr_alloc_buf(data[i].xbuf))
  681. goto out;
  682. crypto_init_wait(&data[i].wait);
  683. data[i].req = ahash_request_alloc(tfm, GFP_KERNEL);
  684. if (!data[i].req) {
  685. pr_err("alg: hash: Failed to allocate request for %s\n",
  686. algo);
  687. goto out;
  688. }
  689. ahash_request_set_callback(data[i].req, 0, crypto_req_done,
  690. &data[i].wait);
  691. sg_init_table(data[i].sg, XBUFSIZE);
  692. for (j = 0; j < XBUFSIZE; j++) {
  693. sg_set_buf(data[i].sg + j, data[i].xbuf[j], PAGE_SIZE);
  694. memset(data[i].xbuf[j], 0xff, PAGE_SIZE);
  695. }
  696. }
  697. pr_info("\ntesting speed of multibuffer %s (%s)\n", algo,
  698. get_driver_name(crypto_ahash, tfm));
  699. for (i = 0; speed[i].blen != 0; i++) {
  700. /* For some reason this only tests digests. */
  701. if (speed[i].blen != speed[i].plen)
  702. continue;
  703. if (speed[i].blen > XBUFSIZE * PAGE_SIZE) {
  704. pr_err("template (%u) too big for tvmem (%lu)\n",
  705. speed[i].blen, XBUFSIZE * PAGE_SIZE);
  706. goto out;
  707. }
  708. if (speed[i].klen)
  709. crypto_ahash_setkey(tfm, tvmem[0], speed[i].klen);
  710. for (k = 0; k < num_mb; k++)
  711. ahash_request_set_crypt(data[k].req, data[k].sg,
  712. data[k].result, speed[i].blen);
  713. pr_info("test%3u "
  714. "(%5u byte blocks,%5u bytes per update,%4u updates): ",
  715. i, speed[i].blen, speed[i].plen,
  716. speed[i].blen / speed[i].plen);
  717. if (secs)
  718. ret = test_mb_ahash_jiffies(data, speed[i].blen, secs,
  719. num_mb);
  720. else
  721. ret = test_mb_ahash_cycles(data, speed[i].blen, num_mb);
  722. if (ret) {
  723. pr_err("At least one hashing failed ret=%d\n", ret);
  724. break;
  725. }
  726. }
  727. out:
  728. for (k = 0; k < num_mb; ++k)
  729. ahash_request_free(data[k].req);
  730. for (k = 0; k < num_mb; ++k)
  731. testmgr_free_buf(data[k].xbuf);
  732. crypto_free_ahash(tfm);
  733. free_data:
  734. kfree(data);
  735. }
  736. static int test_ahash_jiffies_digest(struct ahash_request *req, int blen,
  737. char *out, int secs)
  738. {
  739. unsigned long start, end;
  740. int bcount;
  741. int ret;
  742. for (start = jiffies, end = start + secs * HZ, bcount = 0;
  743. time_before(jiffies, end); bcount++) {
  744. ret = do_one_ahash_op(req, crypto_ahash_digest(req));
  745. if (ret)
  746. return ret;
  747. }
  748. printk("%6u opers/sec, %9lu bytes/sec\n",
  749. bcount / secs, ((long)bcount * blen) / secs);
  750. return 0;
  751. }
  752. static int test_ahash_jiffies(struct ahash_request *req, int blen,
  753. int plen, char *out, int secs)
  754. {
  755. unsigned long start, end;
  756. int bcount, pcount;
  757. int ret;
  758. if (plen == blen)
  759. return test_ahash_jiffies_digest(req, blen, out, secs);
  760. for (start = jiffies, end = start + secs * HZ, bcount = 0;
  761. time_before(jiffies, end); bcount++) {
  762. ret = do_one_ahash_op(req, crypto_ahash_init(req));
  763. if (ret)
  764. return ret;
  765. for (pcount = 0; pcount < blen; pcount += plen) {
  766. ret = do_one_ahash_op(req, crypto_ahash_update(req));
  767. if (ret)
  768. return ret;
  769. }
  770. /* we assume there is enough space in 'out' for the result */
  771. ret = do_one_ahash_op(req, crypto_ahash_final(req));
  772. if (ret)
  773. return ret;
  774. }
  775. pr_cont("%6u opers/sec, %9lu bytes/sec\n",
  776. bcount / secs, ((long)bcount * blen) / secs);
  777. return 0;
  778. }
  779. static int test_ahash_cycles_digest(struct ahash_request *req, int blen,
  780. char *out)
  781. {
  782. unsigned long cycles = 0;
  783. int ret, i;
  784. /* Warm-up run. */
  785. for (i = 0; i < 4; i++) {
  786. ret = do_one_ahash_op(req, crypto_ahash_digest(req));
  787. if (ret)
  788. goto out;
  789. }
  790. /* The real thing. */
  791. for (i = 0; i < 8; i++) {
  792. cycles_t start, end;
  793. start = get_cycles();
  794. ret = do_one_ahash_op(req, crypto_ahash_digest(req));
  795. if (ret)
  796. goto out;
  797. end = get_cycles();
  798. cycles += end - start;
  799. }
  800. out:
  801. if (ret)
  802. return ret;
  803. pr_cont("%6lu cycles/operation, %4lu cycles/byte\n",
  804. cycles / 8, cycles / (8 * blen));
  805. return 0;
  806. }
  807. static int test_ahash_cycles(struct ahash_request *req, int blen,
  808. int plen, char *out)
  809. {
  810. unsigned long cycles = 0;
  811. int i, pcount, ret;
  812. if (plen == blen)
  813. return test_ahash_cycles_digest(req, blen, out);
  814. /* Warm-up run. */
  815. for (i = 0; i < 4; i++) {
  816. ret = do_one_ahash_op(req, crypto_ahash_init(req));
  817. if (ret)
  818. goto out;
  819. for (pcount = 0; pcount < blen; pcount += plen) {
  820. ret = do_one_ahash_op(req, crypto_ahash_update(req));
  821. if (ret)
  822. goto out;
  823. }
  824. ret = do_one_ahash_op(req, crypto_ahash_final(req));
  825. if (ret)
  826. goto out;
  827. }
  828. /* The real thing. */
  829. for (i = 0; i < 8; i++) {
  830. cycles_t start, end;
  831. start = get_cycles();
  832. ret = do_one_ahash_op(req, crypto_ahash_init(req));
  833. if (ret)
  834. goto out;
  835. for (pcount = 0; pcount < blen; pcount += plen) {
  836. ret = do_one_ahash_op(req, crypto_ahash_update(req));
  837. if (ret)
  838. goto out;
  839. }
  840. ret = do_one_ahash_op(req, crypto_ahash_final(req));
  841. if (ret)
  842. goto out;
  843. end = get_cycles();
  844. cycles += end - start;
  845. }
  846. out:
  847. if (ret)
  848. return ret;
  849. pr_cont("%6lu cycles/operation, %4lu cycles/byte\n",
  850. cycles / 8, cycles / (8 * blen));
  851. return 0;
  852. }
  853. static void test_ahash_speed_common(const char *algo, unsigned int secs,
  854. struct hash_speed *speed, unsigned mask)
  855. {
  856. struct scatterlist sg[TVMEMSIZE];
  857. struct crypto_wait wait;
  858. struct ahash_request *req;
  859. struct crypto_ahash *tfm;
  860. char *output;
  861. int i, ret;
  862. tfm = crypto_alloc_ahash(algo, 0, mask);
  863. if (IS_ERR(tfm)) {
  864. pr_err("failed to load transform for %s: %ld\n",
  865. algo, PTR_ERR(tfm));
  866. return;
  867. }
  868. printk(KERN_INFO "\ntesting speed of async %s (%s)\n", algo,
  869. get_driver_name(crypto_ahash, tfm));
  870. if (crypto_ahash_digestsize(tfm) > MAX_DIGEST_SIZE) {
  871. pr_err("digestsize(%u) > %d\n", crypto_ahash_digestsize(tfm),
  872. MAX_DIGEST_SIZE);
  873. goto out;
  874. }
  875. test_hash_sg_init(sg);
  876. req = ahash_request_alloc(tfm, GFP_KERNEL);
  877. if (!req) {
  878. pr_err("ahash request allocation failure\n");
  879. goto out;
  880. }
  881. crypto_init_wait(&wait);
  882. ahash_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
  883. crypto_req_done, &wait);
  884. output = kmalloc(MAX_DIGEST_SIZE, GFP_KERNEL);
  885. if (!output)
  886. goto out_nomem;
  887. for (i = 0; speed[i].blen != 0; i++) {
  888. if (speed[i].blen > TVMEMSIZE * PAGE_SIZE) {
  889. pr_err("template (%u) too big for tvmem (%lu)\n",
  890. speed[i].blen, TVMEMSIZE * PAGE_SIZE);
  891. break;
  892. }
  893. pr_info("test%3u "
  894. "(%5u byte blocks,%5u bytes per update,%4u updates): ",
  895. i, speed[i].blen, speed[i].plen, speed[i].blen / speed[i].plen);
  896. ahash_request_set_crypt(req, sg, output, speed[i].plen);
  897. if (secs)
  898. ret = test_ahash_jiffies(req, speed[i].blen,
  899. speed[i].plen, output, secs);
  900. else
  901. ret = test_ahash_cycles(req, speed[i].blen,
  902. speed[i].plen, output);
  903. if (ret) {
  904. pr_err("hashing failed ret=%d\n", ret);
  905. break;
  906. }
  907. }
  908. kfree(output);
  909. out_nomem:
  910. ahash_request_free(req);
  911. out:
  912. crypto_free_ahash(tfm);
  913. }
  914. static void test_ahash_speed(const char *algo, unsigned int secs,
  915. struct hash_speed *speed)
  916. {
  917. return test_ahash_speed_common(algo, secs, speed, 0);
  918. }
  919. static void test_hash_speed(const char *algo, unsigned int secs,
  920. struct hash_speed *speed)
  921. {
  922. return test_ahash_speed_common(algo, secs, speed, CRYPTO_ALG_ASYNC);
  923. }
  924. struct test_mb_skcipher_data {
  925. struct scatterlist sg[XBUFSIZE];
  926. struct skcipher_request *req;
  927. struct crypto_wait wait;
  928. char *xbuf[XBUFSIZE];
  929. };
  930. static int do_mult_acipher_op(struct test_mb_skcipher_data *data, int enc,
  931. u32 num_mb, int *rc)
  932. {
  933. int i, err = 0;
  934. /* Fire up a bunch of concurrent requests */
  935. for (i = 0; i < num_mb; i++) {
  936. if (enc == ENCRYPT)
  937. rc[i] = crypto_skcipher_encrypt(data[i].req);
  938. else
  939. rc[i] = crypto_skcipher_decrypt(data[i].req);
  940. }
  941. /* Wait for all requests to finish */
  942. for (i = 0; i < num_mb; i++) {
  943. rc[i] = crypto_wait_req(rc[i], &data[i].wait);
  944. if (rc[i]) {
  945. pr_info("concurrent request %d error %d\n", i, rc[i]);
  946. err = rc[i];
  947. }
  948. }
  949. return err;
  950. }
  951. static int test_mb_acipher_jiffies(struct test_mb_skcipher_data *data, int enc,
  952. int blen, int secs, u32 num_mb)
  953. {
  954. unsigned long start, end;
  955. int bcount;
  956. int ret = 0;
  957. int *rc;
  958. rc = kcalloc(num_mb, sizeof(*rc), GFP_KERNEL);
  959. if (!rc)
  960. return -ENOMEM;
  961. for (start = jiffies, end = start + secs * HZ, bcount = 0;
  962. time_before(jiffies, end); bcount++) {
  963. ret = do_mult_acipher_op(data, enc, num_mb, rc);
  964. if (ret)
  965. goto out;
  966. }
  967. pr_cont("%d operations in %d seconds (%ld bytes)\n",
  968. bcount * num_mb, secs, (long)bcount * blen * num_mb);
  969. out:
  970. kfree(rc);
  971. return ret;
  972. }
  973. static int test_mb_acipher_cycles(struct test_mb_skcipher_data *data, int enc,
  974. int blen, u32 num_mb)
  975. {
  976. unsigned long cycles = 0;
  977. int ret = 0;
  978. int i;
  979. int *rc;
  980. rc = kcalloc(num_mb, sizeof(*rc), GFP_KERNEL);
  981. if (!rc)
  982. return -ENOMEM;
  983. /* Warm-up run. */
  984. for (i = 0; i < 4; i++) {
  985. ret = do_mult_acipher_op(data, enc, num_mb, rc);
  986. if (ret)
  987. goto out;
  988. }
  989. /* The real thing. */
  990. for (i = 0; i < 8; i++) {
  991. cycles_t start, end;
  992. start = get_cycles();
  993. ret = do_mult_acipher_op(data, enc, num_mb, rc);
  994. end = get_cycles();
  995. if (ret)
  996. goto out;
  997. cycles += end - start;
  998. }
  999. pr_cont("1 operation in %lu cycles (%d bytes)\n",
  1000. (cycles + 4) / (8 * num_mb), blen);
  1001. out:
  1002. kfree(rc);
  1003. return ret;
  1004. }
  1005. static void test_mb_skcipher_speed(const char *algo, int enc, int secs,
  1006. struct cipher_speed_template *template,
  1007. unsigned int tcount, u8 *keysize, u32 num_mb)
  1008. {
  1009. struct test_mb_skcipher_data *data;
  1010. struct crypto_skcipher *tfm;
  1011. unsigned int i, j, iv_len;
  1012. const char *key;
  1013. const char *e;
  1014. u32 *b_size;
  1015. char iv[128];
  1016. int ret;
  1017. if (enc == ENCRYPT)
  1018. e = "encryption";
  1019. else
  1020. e = "decryption";
  1021. data = kcalloc(num_mb, sizeof(*data), GFP_KERNEL);
  1022. if (!data)
  1023. return;
  1024. tfm = crypto_alloc_skcipher(algo, 0, 0);
  1025. if (IS_ERR(tfm)) {
  1026. pr_err("failed to load transform for %s: %ld\n",
  1027. algo, PTR_ERR(tfm));
  1028. goto out_free_data;
  1029. }
  1030. for (i = 0; i < num_mb; ++i)
  1031. if (testmgr_alloc_buf(data[i].xbuf)) {
  1032. while (i--)
  1033. testmgr_free_buf(data[i].xbuf);
  1034. goto out_free_tfm;
  1035. }
  1036. for (i = 0; i < num_mb; ++i)
  1037. if (testmgr_alloc_buf(data[i].xbuf)) {
  1038. while (i--)
  1039. testmgr_free_buf(data[i].xbuf);
  1040. goto out_free_tfm;
  1041. }
  1042. for (i = 0; i < num_mb; ++i) {
  1043. data[i].req = skcipher_request_alloc(tfm, GFP_KERNEL);
  1044. if (!data[i].req) {
  1045. pr_err("alg: skcipher: Failed to allocate request for %s\n",
  1046. algo);
  1047. while (i--)
  1048. skcipher_request_free(data[i].req);
  1049. goto out_free_xbuf;
  1050. }
  1051. }
  1052. for (i = 0; i < num_mb; ++i) {
  1053. skcipher_request_set_callback(data[i].req,
  1054. CRYPTO_TFM_REQ_MAY_BACKLOG,
  1055. crypto_req_done, &data[i].wait);
  1056. crypto_init_wait(&data[i].wait);
  1057. }
  1058. pr_info("\ntesting speed of multibuffer %s (%s) %s\n", algo,
  1059. get_driver_name(crypto_skcipher, tfm), e);
  1060. i = 0;
  1061. do {
  1062. b_size = block_sizes;
  1063. do {
  1064. if (*b_size > XBUFSIZE * PAGE_SIZE) {
  1065. pr_err("template (%u) too big for buffer (%lu)\n",
  1066. *b_size, XBUFSIZE * PAGE_SIZE);
  1067. goto out;
  1068. }
  1069. pr_info("test %u (%d bit key, %d byte blocks): ", i,
  1070. *keysize * 8, *b_size);
  1071. /* Set up tfm global state, i.e. the key */
  1072. memset(tvmem[0], 0xff, PAGE_SIZE);
  1073. key = tvmem[0];
  1074. for (j = 0; j < tcount; j++) {
  1075. if (template[j].klen == *keysize) {
  1076. key = template[j].key;
  1077. break;
  1078. }
  1079. }
  1080. crypto_skcipher_clear_flags(tfm, ~0);
  1081. ret = crypto_skcipher_setkey(tfm, key, *keysize);
  1082. if (ret) {
  1083. pr_err("setkey() failed flags=%x\n",
  1084. crypto_skcipher_get_flags(tfm));
  1085. goto out;
  1086. }
  1087. iv_len = crypto_skcipher_ivsize(tfm);
  1088. if (iv_len)
  1089. memset(&iv, 0xff, iv_len);
  1090. /* Now setup per request stuff, i.e. buffers */
  1091. for (j = 0; j < num_mb; ++j) {
  1092. struct test_mb_skcipher_data *cur = &data[j];
  1093. unsigned int k = *b_size;
  1094. unsigned int pages = DIV_ROUND_UP(k, PAGE_SIZE);
  1095. unsigned int p = 0;
  1096. sg_init_table(cur->sg, pages);
  1097. while (k > PAGE_SIZE) {
  1098. sg_set_buf(cur->sg + p, cur->xbuf[p],
  1099. PAGE_SIZE);
  1100. memset(cur->xbuf[p], 0xff, PAGE_SIZE);
  1101. p++;
  1102. k -= PAGE_SIZE;
  1103. }
  1104. sg_set_buf(cur->sg + p, cur->xbuf[p], k);
  1105. memset(cur->xbuf[p], 0xff, k);
  1106. skcipher_request_set_crypt(cur->req, cur->sg,
  1107. cur->sg, *b_size,
  1108. iv);
  1109. }
  1110. if (secs)
  1111. ret = test_mb_acipher_jiffies(data, enc,
  1112. *b_size, secs,
  1113. num_mb);
  1114. else
  1115. ret = test_mb_acipher_cycles(data, enc,
  1116. *b_size, num_mb);
  1117. if (ret) {
  1118. pr_err("%s() failed flags=%x\n", e,
  1119. crypto_skcipher_get_flags(tfm));
  1120. break;
  1121. }
  1122. b_size++;
  1123. i++;
  1124. } while (*b_size);
  1125. keysize++;
  1126. } while (*keysize);
  1127. out:
  1128. for (i = 0; i < num_mb; ++i)
  1129. skcipher_request_free(data[i].req);
  1130. out_free_xbuf:
  1131. for (i = 0; i < num_mb; ++i)
  1132. testmgr_free_buf(data[i].xbuf);
  1133. out_free_tfm:
  1134. crypto_free_skcipher(tfm);
  1135. out_free_data:
  1136. kfree(data);
  1137. }
  1138. static inline int do_one_acipher_op(struct skcipher_request *req, int ret)
  1139. {
  1140. struct crypto_wait *wait = req->base.data;
  1141. return crypto_wait_req(ret, wait);
  1142. }
  1143. static int test_acipher_jiffies(struct skcipher_request *req, int enc,
  1144. int blen, int secs)
  1145. {
  1146. unsigned long start, end;
  1147. int bcount;
  1148. int ret;
  1149. for (start = jiffies, end = start + secs * HZ, bcount = 0;
  1150. time_before(jiffies, end); bcount++) {
  1151. if (enc)
  1152. ret = do_one_acipher_op(req,
  1153. crypto_skcipher_encrypt(req));
  1154. else
  1155. ret = do_one_acipher_op(req,
  1156. crypto_skcipher_decrypt(req));
  1157. if (ret)
  1158. return ret;
  1159. }
  1160. pr_cont("%d operations in %d seconds (%ld bytes)\n",
  1161. bcount, secs, (long)bcount * blen);
  1162. return 0;
  1163. }
  1164. static int test_acipher_cycles(struct skcipher_request *req, int enc,
  1165. int blen)
  1166. {
  1167. unsigned long cycles = 0;
  1168. int ret = 0;
  1169. int i;
  1170. /* Warm-up run. */
  1171. for (i = 0; i < 4; i++) {
  1172. if (enc)
  1173. ret = do_one_acipher_op(req,
  1174. crypto_skcipher_encrypt(req));
  1175. else
  1176. ret = do_one_acipher_op(req,
  1177. crypto_skcipher_decrypt(req));
  1178. if (ret)
  1179. goto out;
  1180. }
  1181. /* The real thing. */
  1182. for (i = 0; i < 8; i++) {
  1183. cycles_t start, end;
  1184. start = get_cycles();
  1185. if (enc)
  1186. ret = do_one_acipher_op(req,
  1187. crypto_skcipher_encrypt(req));
  1188. else
  1189. ret = do_one_acipher_op(req,
  1190. crypto_skcipher_decrypt(req));
  1191. end = get_cycles();
  1192. if (ret)
  1193. goto out;
  1194. cycles += end - start;
  1195. }
  1196. out:
  1197. if (ret == 0)
  1198. pr_cont("1 operation in %lu cycles (%d bytes)\n",
  1199. (cycles + 4) / 8, blen);
  1200. return ret;
  1201. }
  1202. static void test_skcipher_speed(const char *algo, int enc, unsigned int secs,
  1203. struct cipher_speed_template *template,
  1204. unsigned int tcount, u8 *keysize, bool async)
  1205. {
  1206. unsigned int ret, i, j, k, iv_len;
  1207. struct crypto_wait wait;
  1208. const char *key;
  1209. char iv[128];
  1210. struct skcipher_request *req;
  1211. struct crypto_skcipher *tfm;
  1212. const char *e;
  1213. u32 *b_size;
  1214. if (enc == ENCRYPT)
  1215. e = "encryption";
  1216. else
  1217. e = "decryption";
  1218. crypto_init_wait(&wait);
  1219. tfm = crypto_alloc_skcipher(algo, 0, async ? 0 : CRYPTO_ALG_ASYNC);
  1220. if (IS_ERR(tfm)) {
  1221. pr_err("failed to load transform for %s: %ld\n", algo,
  1222. PTR_ERR(tfm));
  1223. return;
  1224. }
  1225. pr_info("\ntesting speed of async %s (%s) %s\n", algo,
  1226. get_driver_name(crypto_skcipher, tfm), e);
  1227. req = skcipher_request_alloc(tfm, GFP_KERNEL);
  1228. if (!req) {
  1229. pr_err("tcrypt: skcipher: Failed to allocate request for %s\n",
  1230. algo);
  1231. goto out;
  1232. }
  1233. skcipher_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
  1234. crypto_req_done, &wait);
  1235. i = 0;
  1236. do {
  1237. b_size = block_sizes;
  1238. do {
  1239. struct scatterlist sg[TVMEMSIZE];
  1240. if ((*keysize + *b_size) > TVMEMSIZE * PAGE_SIZE) {
  1241. pr_err("template (%u) too big for "
  1242. "tvmem (%lu)\n", *keysize + *b_size,
  1243. TVMEMSIZE * PAGE_SIZE);
  1244. goto out_free_req;
  1245. }
  1246. pr_info("test %u (%d bit key, %d byte blocks): ", i,
  1247. *keysize * 8, *b_size);
  1248. memset(tvmem[0], 0xff, PAGE_SIZE);
  1249. /* set key, plain text and IV */
  1250. key = tvmem[0];
  1251. for (j = 0; j < tcount; j++) {
  1252. if (template[j].klen == *keysize) {
  1253. key = template[j].key;
  1254. break;
  1255. }
  1256. }
  1257. crypto_skcipher_clear_flags(tfm, ~0);
  1258. ret = crypto_skcipher_setkey(tfm, key, *keysize);
  1259. if (ret) {
  1260. pr_err("setkey() failed flags=%x\n",
  1261. crypto_skcipher_get_flags(tfm));
  1262. goto out_free_req;
  1263. }
  1264. k = *keysize + *b_size;
  1265. sg_init_table(sg, DIV_ROUND_UP(k, PAGE_SIZE));
  1266. if (k > PAGE_SIZE) {
  1267. sg_set_buf(sg, tvmem[0] + *keysize,
  1268. PAGE_SIZE - *keysize);
  1269. k -= PAGE_SIZE;
  1270. j = 1;
  1271. while (k > PAGE_SIZE) {
  1272. sg_set_buf(sg + j, tvmem[j], PAGE_SIZE);
  1273. memset(tvmem[j], 0xff, PAGE_SIZE);
  1274. j++;
  1275. k -= PAGE_SIZE;
  1276. }
  1277. sg_set_buf(sg + j, tvmem[j], k);
  1278. memset(tvmem[j], 0xff, k);
  1279. } else {
  1280. sg_set_buf(sg, tvmem[0] + *keysize, *b_size);
  1281. }
  1282. iv_len = crypto_skcipher_ivsize(tfm);
  1283. if (iv_len)
  1284. memset(&iv, 0xff, iv_len);
  1285. skcipher_request_set_crypt(req, sg, sg, *b_size, iv);
  1286. if (secs)
  1287. ret = test_acipher_jiffies(req, enc,
  1288. *b_size, secs);
  1289. else
  1290. ret = test_acipher_cycles(req, enc,
  1291. *b_size);
  1292. if (ret) {
  1293. pr_err("%s() failed flags=%x\n", e,
  1294. crypto_skcipher_get_flags(tfm));
  1295. break;
  1296. }
  1297. b_size++;
  1298. i++;
  1299. } while (*b_size);
  1300. keysize++;
  1301. } while (*keysize);
  1302. out_free_req:
  1303. skcipher_request_free(req);
  1304. out:
  1305. crypto_free_skcipher(tfm);
  1306. }
  1307. static void test_acipher_speed(const char *algo, int enc, unsigned int secs,
  1308. struct cipher_speed_template *template,
  1309. unsigned int tcount, u8 *keysize)
  1310. {
  1311. return test_skcipher_speed(algo, enc, secs, template, tcount, keysize,
  1312. true);
  1313. }
  1314. static void test_cipher_speed(const char *algo, int enc, unsigned int secs,
  1315. struct cipher_speed_template *template,
  1316. unsigned int tcount, u8 *keysize)
  1317. {
  1318. return test_skcipher_speed(algo, enc, secs, template, tcount, keysize,
  1319. false);
  1320. }
  1321. static void test_available(void)
  1322. {
  1323. char **name = check;
  1324. while (*name) {
  1325. printk("alg %s ", *name);
  1326. printk(crypto_has_alg(*name, 0, 0) ?
  1327. "found\n" : "not found\n");
  1328. name++;
  1329. }
  1330. }
  1331. static inline int tcrypt_test(const char *alg)
  1332. {
  1333. int ret;
  1334. pr_debug("testing %s\n", alg);
  1335. ret = alg_test(alg, alg, 0, 0);
  1336. /* non-fips algs return -EINVAL in fips mode */
  1337. if (fips_enabled && ret == -EINVAL)
  1338. ret = 0;
  1339. return ret;
  1340. }
  1341. static int do_test(const char *alg, u32 type, u32 mask, int m, u32 num_mb)
  1342. {
  1343. int i;
  1344. int ret = 0;
  1345. switch (m) {
  1346. case 0:
  1347. if (alg) {
  1348. if (!crypto_has_alg(alg, type,
  1349. mask ?: CRYPTO_ALG_TYPE_MASK))
  1350. ret = -ENOENT;
  1351. break;
  1352. }
  1353. for (i = 1; i < 200; i++)
  1354. ret += do_test(NULL, 0, 0, i, num_mb);
  1355. break;
  1356. case 1:
  1357. ret += tcrypt_test("md5");
  1358. break;
  1359. case 2:
  1360. ret += tcrypt_test("sha1");
  1361. break;
  1362. case 3:
  1363. ret += tcrypt_test("ecb(des)");
  1364. ret += tcrypt_test("cbc(des)");
  1365. ret += tcrypt_test("ctr(des)");
  1366. break;
  1367. case 4:
  1368. ret += tcrypt_test("ecb(des3_ede)");
  1369. ret += tcrypt_test("cbc(des3_ede)");
  1370. ret += tcrypt_test("ctr(des3_ede)");
  1371. break;
  1372. case 5:
  1373. ret += tcrypt_test("md4");
  1374. break;
  1375. case 6:
  1376. ret += tcrypt_test("sha256");
  1377. break;
  1378. case 7:
  1379. ret += tcrypt_test("ecb(blowfish)");
  1380. ret += tcrypt_test("cbc(blowfish)");
  1381. ret += tcrypt_test("ctr(blowfish)");
  1382. break;
  1383. case 8:
  1384. ret += tcrypt_test("ecb(twofish)");
  1385. ret += tcrypt_test("cbc(twofish)");
  1386. ret += tcrypt_test("ctr(twofish)");
  1387. ret += tcrypt_test("lrw(twofish)");
  1388. ret += tcrypt_test("xts(twofish)");
  1389. break;
  1390. case 9:
  1391. ret += tcrypt_test("ecb(serpent)");
  1392. ret += tcrypt_test("cbc(serpent)");
  1393. ret += tcrypt_test("ctr(serpent)");
  1394. ret += tcrypt_test("lrw(serpent)");
  1395. ret += tcrypt_test("xts(serpent)");
  1396. break;
  1397. case 10:
  1398. ret += tcrypt_test("ecb(aes)");
  1399. ret += tcrypt_test("cbc(aes)");
  1400. ret += tcrypt_test("lrw(aes)");
  1401. ret += tcrypt_test("xts(aes)");
  1402. ret += tcrypt_test("ctr(aes)");
  1403. ret += tcrypt_test("rfc3686(ctr(aes))");
  1404. break;
  1405. case 11:
  1406. ret += tcrypt_test("sha384");
  1407. break;
  1408. case 12:
  1409. ret += tcrypt_test("sha512");
  1410. break;
  1411. case 13:
  1412. ret += tcrypt_test("deflate");
  1413. break;
  1414. case 14:
  1415. ret += tcrypt_test("ecb(cast5)");
  1416. ret += tcrypt_test("cbc(cast5)");
  1417. ret += tcrypt_test("ctr(cast5)");
  1418. break;
  1419. case 15:
  1420. ret += tcrypt_test("ecb(cast6)");
  1421. ret += tcrypt_test("cbc(cast6)");
  1422. ret += tcrypt_test("ctr(cast6)");
  1423. ret += tcrypt_test("lrw(cast6)");
  1424. ret += tcrypt_test("xts(cast6)");
  1425. break;
  1426. case 16:
  1427. ret += tcrypt_test("ecb(arc4)");
  1428. break;
  1429. case 17:
  1430. ret += tcrypt_test("michael_mic");
  1431. break;
  1432. case 18:
  1433. ret += tcrypt_test("crc32c");
  1434. break;
  1435. case 19:
  1436. ret += tcrypt_test("ecb(tea)");
  1437. break;
  1438. case 20:
  1439. ret += tcrypt_test("ecb(xtea)");
  1440. break;
  1441. case 21:
  1442. ret += tcrypt_test("ecb(khazad)");
  1443. break;
  1444. case 22:
  1445. ret += tcrypt_test("wp512");
  1446. break;
  1447. case 23:
  1448. ret += tcrypt_test("wp384");
  1449. break;
  1450. case 24:
  1451. ret += tcrypt_test("wp256");
  1452. break;
  1453. case 25:
  1454. ret += tcrypt_test("ecb(tnepres)");
  1455. break;
  1456. case 26:
  1457. ret += tcrypt_test("ecb(anubis)");
  1458. ret += tcrypt_test("cbc(anubis)");
  1459. break;
  1460. case 27:
  1461. ret += tcrypt_test("tgr192");
  1462. break;
  1463. case 28:
  1464. ret += tcrypt_test("tgr160");
  1465. break;
  1466. case 29:
  1467. ret += tcrypt_test("tgr128");
  1468. break;
  1469. case 30:
  1470. ret += tcrypt_test("ecb(xeta)");
  1471. break;
  1472. case 31:
  1473. ret += tcrypt_test("pcbc(fcrypt)");
  1474. break;
  1475. case 32:
  1476. ret += tcrypt_test("ecb(camellia)");
  1477. ret += tcrypt_test("cbc(camellia)");
  1478. ret += tcrypt_test("ctr(camellia)");
  1479. ret += tcrypt_test("lrw(camellia)");
  1480. ret += tcrypt_test("xts(camellia)");
  1481. break;
  1482. case 33:
  1483. ret += tcrypt_test("sha224");
  1484. break;
  1485. case 34:
  1486. ret += tcrypt_test("salsa20");
  1487. break;
  1488. case 35:
  1489. ret += tcrypt_test("gcm(aes)");
  1490. break;
  1491. case 36:
  1492. ret += tcrypt_test("lzo");
  1493. break;
  1494. case 37:
  1495. ret += tcrypt_test("ccm(aes)");
  1496. break;
  1497. case 38:
  1498. ret += tcrypt_test("cts(cbc(aes))");
  1499. break;
  1500. case 39:
  1501. ret += tcrypt_test("rmd128");
  1502. break;
  1503. case 40:
  1504. ret += tcrypt_test("rmd160");
  1505. break;
  1506. case 41:
  1507. ret += tcrypt_test("rmd256");
  1508. break;
  1509. case 42:
  1510. ret += tcrypt_test("rmd320");
  1511. break;
  1512. case 43:
  1513. ret += tcrypt_test("ecb(seed)");
  1514. break;
  1515. case 44:
  1516. ret += tcrypt_test("zlib");
  1517. break;
  1518. case 45:
  1519. ret += tcrypt_test("rfc4309(ccm(aes))");
  1520. break;
  1521. case 46:
  1522. ret += tcrypt_test("ghash");
  1523. break;
  1524. case 47:
  1525. ret += tcrypt_test("crct10dif");
  1526. break;
  1527. case 48:
  1528. ret += tcrypt_test("sha3-224");
  1529. break;
  1530. case 49:
  1531. ret += tcrypt_test("sha3-256");
  1532. break;
  1533. case 50:
  1534. ret += tcrypt_test("sha3-384");
  1535. break;
  1536. case 51:
  1537. ret += tcrypt_test("sha3-512");
  1538. break;
  1539. case 52:
  1540. ret += tcrypt_test("sm3");
  1541. break;
  1542. case 100:
  1543. ret += tcrypt_test("hmac(md5)");
  1544. break;
  1545. case 101:
  1546. ret += tcrypt_test("hmac(sha1)");
  1547. break;
  1548. case 102:
  1549. ret += tcrypt_test("hmac(sha256)");
  1550. break;
  1551. case 103:
  1552. ret += tcrypt_test("hmac(sha384)");
  1553. break;
  1554. case 104:
  1555. ret += tcrypt_test("hmac(sha512)");
  1556. break;
  1557. case 105:
  1558. ret += tcrypt_test("hmac(sha224)");
  1559. break;
  1560. case 106:
  1561. ret += tcrypt_test("xcbc(aes)");
  1562. break;
  1563. case 107:
  1564. ret += tcrypt_test("hmac(rmd128)");
  1565. break;
  1566. case 108:
  1567. ret += tcrypt_test("hmac(rmd160)");
  1568. break;
  1569. case 109:
  1570. ret += tcrypt_test("vmac(aes)");
  1571. break;
  1572. case 111:
  1573. ret += tcrypt_test("hmac(sha3-224)");
  1574. break;
  1575. case 112:
  1576. ret += tcrypt_test("hmac(sha3-256)");
  1577. break;
  1578. case 113:
  1579. ret += tcrypt_test("hmac(sha3-384)");
  1580. break;
  1581. case 114:
  1582. ret += tcrypt_test("hmac(sha3-512)");
  1583. break;
  1584. case 150:
  1585. ret += tcrypt_test("ansi_cprng");
  1586. break;
  1587. case 151:
  1588. ret += tcrypt_test("rfc4106(gcm(aes))");
  1589. break;
  1590. case 152:
  1591. ret += tcrypt_test("rfc4543(gcm(aes))");
  1592. break;
  1593. case 153:
  1594. ret += tcrypt_test("cmac(aes)");
  1595. break;
  1596. case 154:
  1597. ret += tcrypt_test("cmac(des3_ede)");
  1598. break;
  1599. case 155:
  1600. ret += tcrypt_test("authenc(hmac(sha1),cbc(aes))");
  1601. break;
  1602. case 156:
  1603. ret += tcrypt_test("authenc(hmac(md5),ecb(cipher_null))");
  1604. break;
  1605. case 157:
  1606. ret += tcrypt_test("authenc(hmac(sha1),ecb(cipher_null))");
  1607. break;
  1608. case 181:
  1609. ret += tcrypt_test("authenc(hmac(sha1),cbc(des))");
  1610. break;
  1611. case 182:
  1612. ret += tcrypt_test("authenc(hmac(sha1),cbc(des3_ede))");
  1613. break;
  1614. case 183:
  1615. ret += tcrypt_test("authenc(hmac(sha224),cbc(des))");
  1616. break;
  1617. case 184:
  1618. ret += tcrypt_test("authenc(hmac(sha224),cbc(des3_ede))");
  1619. break;
  1620. case 185:
  1621. ret += tcrypt_test("authenc(hmac(sha256),cbc(des))");
  1622. break;
  1623. case 186:
  1624. ret += tcrypt_test("authenc(hmac(sha256),cbc(des3_ede))");
  1625. break;
  1626. case 187:
  1627. ret += tcrypt_test("authenc(hmac(sha384),cbc(des))");
  1628. break;
  1629. case 188:
  1630. ret += tcrypt_test("authenc(hmac(sha384),cbc(des3_ede))");
  1631. break;
  1632. case 189:
  1633. ret += tcrypt_test("authenc(hmac(sha512),cbc(des))");
  1634. break;
  1635. case 190:
  1636. ret += tcrypt_test("authenc(hmac(sha512),cbc(des3_ede))");
  1637. break;
  1638. case 191:
  1639. ret += tcrypt_test("ecb(sm4)");
  1640. break;
  1641. case 200:
  1642. test_cipher_speed("ecb(aes)", ENCRYPT, sec, NULL, 0,
  1643. speed_template_16_24_32);
  1644. test_cipher_speed("ecb(aes)", DECRYPT, sec, NULL, 0,
  1645. speed_template_16_24_32);
  1646. test_cipher_speed("cbc(aes)", ENCRYPT, sec, NULL, 0,
  1647. speed_template_16_24_32);
  1648. test_cipher_speed("cbc(aes)", DECRYPT, sec, NULL, 0,
  1649. speed_template_16_24_32);
  1650. test_cipher_speed("lrw(aes)", ENCRYPT, sec, NULL, 0,
  1651. speed_template_32_40_48);
  1652. test_cipher_speed("lrw(aes)", DECRYPT, sec, NULL, 0,
  1653. speed_template_32_40_48);
  1654. test_cipher_speed("xts(aes)", ENCRYPT, sec, NULL, 0,
  1655. speed_template_32_64);
  1656. test_cipher_speed("xts(aes)", DECRYPT, sec, NULL, 0,
  1657. speed_template_32_64);
  1658. test_cipher_speed("cts(cbc(aes))", ENCRYPT, sec, NULL, 0,
  1659. speed_template_16_24_32);
  1660. test_cipher_speed("cts(cbc(aes))", DECRYPT, sec, NULL, 0,
  1661. speed_template_16_24_32);
  1662. test_cipher_speed("ctr(aes)", ENCRYPT, sec, NULL, 0,
  1663. speed_template_16_24_32);
  1664. test_cipher_speed("ctr(aes)", DECRYPT, sec, NULL, 0,
  1665. speed_template_16_24_32);
  1666. break;
  1667. case 201:
  1668. test_cipher_speed("ecb(des3_ede)", ENCRYPT, sec,
  1669. des3_speed_template, DES3_SPEED_VECTORS,
  1670. speed_template_24);
  1671. test_cipher_speed("ecb(des3_ede)", DECRYPT, sec,
  1672. des3_speed_template, DES3_SPEED_VECTORS,
  1673. speed_template_24);
  1674. test_cipher_speed("cbc(des3_ede)", ENCRYPT, sec,
  1675. des3_speed_template, DES3_SPEED_VECTORS,
  1676. speed_template_24);
  1677. test_cipher_speed("cbc(des3_ede)", DECRYPT, sec,
  1678. des3_speed_template, DES3_SPEED_VECTORS,
  1679. speed_template_24);
  1680. test_cipher_speed("ctr(des3_ede)", ENCRYPT, sec,
  1681. des3_speed_template, DES3_SPEED_VECTORS,
  1682. speed_template_24);
  1683. test_cipher_speed("ctr(des3_ede)", DECRYPT, sec,
  1684. des3_speed_template, DES3_SPEED_VECTORS,
  1685. speed_template_24);
  1686. break;
  1687. case 202:
  1688. test_cipher_speed("ecb(twofish)", ENCRYPT, sec, NULL, 0,
  1689. speed_template_16_24_32);
  1690. test_cipher_speed("ecb(twofish)", DECRYPT, sec, NULL, 0,
  1691. speed_template_16_24_32);
  1692. test_cipher_speed("cbc(twofish)", ENCRYPT, sec, NULL, 0,
  1693. speed_template_16_24_32);
  1694. test_cipher_speed("cbc(twofish)", DECRYPT, sec, NULL, 0,
  1695. speed_template_16_24_32);
  1696. test_cipher_speed("ctr(twofish)", ENCRYPT, sec, NULL, 0,
  1697. speed_template_16_24_32);
  1698. test_cipher_speed("ctr(twofish)", DECRYPT, sec, NULL, 0,
  1699. speed_template_16_24_32);
  1700. test_cipher_speed("lrw(twofish)", ENCRYPT, sec, NULL, 0,
  1701. speed_template_32_40_48);
  1702. test_cipher_speed("lrw(twofish)", DECRYPT, sec, NULL, 0,
  1703. speed_template_32_40_48);
  1704. test_cipher_speed("xts(twofish)", ENCRYPT, sec, NULL, 0,
  1705. speed_template_32_48_64);
  1706. test_cipher_speed("xts(twofish)", DECRYPT, sec, NULL, 0,
  1707. speed_template_32_48_64);
  1708. break;
  1709. case 203:
  1710. test_cipher_speed("ecb(blowfish)", ENCRYPT, sec, NULL, 0,
  1711. speed_template_8_32);
  1712. test_cipher_speed("ecb(blowfish)", DECRYPT, sec, NULL, 0,
  1713. speed_template_8_32);
  1714. test_cipher_speed("cbc(blowfish)", ENCRYPT, sec, NULL, 0,
  1715. speed_template_8_32);
  1716. test_cipher_speed("cbc(blowfish)", DECRYPT, sec, NULL, 0,
  1717. speed_template_8_32);
  1718. test_cipher_speed("ctr(blowfish)", ENCRYPT, sec, NULL, 0,
  1719. speed_template_8_32);
  1720. test_cipher_speed("ctr(blowfish)", DECRYPT, sec, NULL, 0,
  1721. speed_template_8_32);
  1722. break;
  1723. case 204:
  1724. test_cipher_speed("ecb(des)", ENCRYPT, sec, NULL, 0,
  1725. speed_template_8);
  1726. test_cipher_speed("ecb(des)", DECRYPT, sec, NULL, 0,
  1727. speed_template_8);
  1728. test_cipher_speed("cbc(des)", ENCRYPT, sec, NULL, 0,
  1729. speed_template_8);
  1730. test_cipher_speed("cbc(des)", DECRYPT, sec, NULL, 0,
  1731. speed_template_8);
  1732. break;
  1733. case 205:
  1734. test_cipher_speed("ecb(camellia)", ENCRYPT, sec, NULL, 0,
  1735. speed_template_16_24_32);
  1736. test_cipher_speed("ecb(camellia)", DECRYPT, sec, NULL, 0,
  1737. speed_template_16_24_32);
  1738. test_cipher_speed("cbc(camellia)", ENCRYPT, sec, NULL, 0,
  1739. speed_template_16_24_32);
  1740. test_cipher_speed("cbc(camellia)", DECRYPT, sec, NULL, 0,
  1741. speed_template_16_24_32);
  1742. test_cipher_speed("ctr(camellia)", ENCRYPT, sec, NULL, 0,
  1743. speed_template_16_24_32);
  1744. test_cipher_speed("ctr(camellia)", DECRYPT, sec, NULL, 0,
  1745. speed_template_16_24_32);
  1746. test_cipher_speed("lrw(camellia)", ENCRYPT, sec, NULL, 0,
  1747. speed_template_32_40_48);
  1748. test_cipher_speed("lrw(camellia)", DECRYPT, sec, NULL, 0,
  1749. speed_template_32_40_48);
  1750. test_cipher_speed("xts(camellia)", ENCRYPT, sec, NULL, 0,
  1751. speed_template_32_48_64);
  1752. test_cipher_speed("xts(camellia)", DECRYPT, sec, NULL, 0,
  1753. speed_template_32_48_64);
  1754. break;
  1755. case 206:
  1756. test_cipher_speed("salsa20", ENCRYPT, sec, NULL, 0,
  1757. speed_template_16_32);
  1758. break;
  1759. case 207:
  1760. test_cipher_speed("ecb(serpent)", ENCRYPT, sec, NULL, 0,
  1761. speed_template_16_32);
  1762. test_cipher_speed("ecb(serpent)", DECRYPT, sec, NULL, 0,
  1763. speed_template_16_32);
  1764. test_cipher_speed("cbc(serpent)", ENCRYPT, sec, NULL, 0,
  1765. speed_template_16_32);
  1766. test_cipher_speed("cbc(serpent)", DECRYPT, sec, NULL, 0,
  1767. speed_template_16_32);
  1768. test_cipher_speed("ctr(serpent)", ENCRYPT, sec, NULL, 0,
  1769. speed_template_16_32);
  1770. test_cipher_speed("ctr(serpent)", DECRYPT, sec, NULL, 0,
  1771. speed_template_16_32);
  1772. test_cipher_speed("lrw(serpent)", ENCRYPT, sec, NULL, 0,
  1773. speed_template_32_48);
  1774. test_cipher_speed("lrw(serpent)", DECRYPT, sec, NULL, 0,
  1775. speed_template_32_48);
  1776. test_cipher_speed("xts(serpent)", ENCRYPT, sec, NULL, 0,
  1777. speed_template_32_64);
  1778. test_cipher_speed("xts(serpent)", DECRYPT, sec, NULL, 0,
  1779. speed_template_32_64);
  1780. break;
  1781. case 208:
  1782. test_cipher_speed("ecb(arc4)", ENCRYPT, sec, NULL, 0,
  1783. speed_template_8);
  1784. break;
  1785. case 209:
  1786. test_cipher_speed("ecb(cast5)", ENCRYPT, sec, NULL, 0,
  1787. speed_template_8_16);
  1788. test_cipher_speed("ecb(cast5)", DECRYPT, sec, NULL, 0,
  1789. speed_template_8_16);
  1790. test_cipher_speed("cbc(cast5)", ENCRYPT, sec, NULL, 0,
  1791. speed_template_8_16);
  1792. test_cipher_speed("cbc(cast5)", DECRYPT, sec, NULL, 0,
  1793. speed_template_8_16);
  1794. test_cipher_speed("ctr(cast5)", ENCRYPT, sec, NULL, 0,
  1795. speed_template_8_16);
  1796. test_cipher_speed("ctr(cast5)", DECRYPT, sec, NULL, 0,
  1797. speed_template_8_16);
  1798. break;
  1799. case 210:
  1800. test_cipher_speed("ecb(cast6)", ENCRYPT, sec, NULL, 0,
  1801. speed_template_16_32);
  1802. test_cipher_speed("ecb(cast6)", DECRYPT, sec, NULL, 0,
  1803. speed_template_16_32);
  1804. test_cipher_speed("cbc(cast6)", ENCRYPT, sec, NULL, 0,
  1805. speed_template_16_32);
  1806. test_cipher_speed("cbc(cast6)", DECRYPT, sec, NULL, 0,
  1807. speed_template_16_32);
  1808. test_cipher_speed("ctr(cast6)", ENCRYPT, sec, NULL, 0,
  1809. speed_template_16_32);
  1810. test_cipher_speed("ctr(cast6)", DECRYPT, sec, NULL, 0,
  1811. speed_template_16_32);
  1812. test_cipher_speed("lrw(cast6)", ENCRYPT, sec, NULL, 0,
  1813. speed_template_32_48);
  1814. test_cipher_speed("lrw(cast6)", DECRYPT, sec, NULL, 0,
  1815. speed_template_32_48);
  1816. test_cipher_speed("xts(cast6)", ENCRYPT, sec, NULL, 0,
  1817. speed_template_32_64);
  1818. test_cipher_speed("xts(cast6)", DECRYPT, sec, NULL, 0,
  1819. speed_template_32_64);
  1820. break;
  1821. case 211:
  1822. test_aead_speed("rfc4106(gcm(aes))", ENCRYPT, sec,
  1823. NULL, 0, 16, 16, aead_speed_template_20);
  1824. test_aead_speed("gcm(aes)", ENCRYPT, sec,
  1825. NULL, 0, 16, 8, speed_template_16_24_32);
  1826. test_aead_speed("rfc4106(gcm(aes))", DECRYPT, sec,
  1827. NULL, 0, 16, 16, aead_speed_template_20);
  1828. test_aead_speed("gcm(aes)", DECRYPT, sec,
  1829. NULL, 0, 16, 8, speed_template_16_24_32);
  1830. break;
  1831. case 212:
  1832. test_aead_speed("rfc4309(ccm(aes))", ENCRYPT, sec,
  1833. NULL, 0, 16, 16, aead_speed_template_19);
  1834. test_aead_speed("rfc4309(ccm(aes))", DECRYPT, sec,
  1835. NULL, 0, 16, 16, aead_speed_template_19);
  1836. break;
  1837. case 213:
  1838. test_aead_speed("rfc7539esp(chacha20,poly1305)", ENCRYPT, sec,
  1839. NULL, 0, 16, 8, aead_speed_template_36);
  1840. test_aead_speed("rfc7539esp(chacha20,poly1305)", DECRYPT, sec,
  1841. NULL, 0, 16, 8, aead_speed_template_36);
  1842. break;
  1843. case 214:
  1844. test_cipher_speed("chacha20", ENCRYPT, sec, NULL, 0,
  1845. speed_template_32);
  1846. break;
  1847. case 215:
  1848. test_mb_aead_speed("rfc4106(gcm(aes))", ENCRYPT, sec, NULL,
  1849. 0, 16, 16, aead_speed_template_20, num_mb);
  1850. test_mb_aead_speed("gcm(aes)", ENCRYPT, sec, NULL, 0, 16, 8,
  1851. speed_template_16_24_32, num_mb);
  1852. test_mb_aead_speed("rfc4106(gcm(aes))", DECRYPT, sec, NULL,
  1853. 0, 16, 16, aead_speed_template_20, num_mb);
  1854. test_mb_aead_speed("gcm(aes)", DECRYPT, sec, NULL, 0, 16, 8,
  1855. speed_template_16_24_32, num_mb);
  1856. break;
  1857. case 216:
  1858. test_mb_aead_speed("rfc4309(ccm(aes))", ENCRYPT, sec, NULL, 0,
  1859. 16, 16, aead_speed_template_19, num_mb);
  1860. test_mb_aead_speed("rfc4309(ccm(aes))", DECRYPT, sec, NULL, 0,
  1861. 16, 16, aead_speed_template_19, num_mb);
  1862. break;
  1863. case 217:
  1864. test_mb_aead_speed("rfc7539esp(chacha20,poly1305)", ENCRYPT,
  1865. sec, NULL, 0, 16, 8, aead_speed_template_36,
  1866. num_mb);
  1867. test_mb_aead_speed("rfc7539esp(chacha20,poly1305)", DECRYPT,
  1868. sec, NULL, 0, 16, 8, aead_speed_template_36,
  1869. num_mb);
  1870. break;
  1871. case 300:
  1872. if (alg) {
  1873. test_hash_speed(alg, sec, generic_hash_speed_template);
  1874. break;
  1875. }
  1876. /* fall through */
  1877. case 301:
  1878. test_hash_speed("md4", sec, generic_hash_speed_template);
  1879. if (mode > 300 && mode < 400) break;
  1880. /* fall through */
  1881. case 302:
  1882. test_hash_speed("md5", sec, generic_hash_speed_template);
  1883. if (mode > 300 && mode < 400) break;
  1884. /* fall through */
  1885. case 303:
  1886. test_hash_speed("sha1", sec, generic_hash_speed_template);
  1887. if (mode > 300 && mode < 400) break;
  1888. /* fall through */
  1889. case 304:
  1890. test_hash_speed("sha256", sec, generic_hash_speed_template);
  1891. if (mode > 300 && mode < 400) break;
  1892. /* fall through */
  1893. case 305:
  1894. test_hash_speed("sha384", sec, generic_hash_speed_template);
  1895. if (mode > 300 && mode < 400) break;
  1896. /* fall through */
  1897. case 306:
  1898. test_hash_speed("sha512", sec, generic_hash_speed_template);
  1899. if (mode > 300 && mode < 400) break;
  1900. /* fall through */
  1901. case 307:
  1902. test_hash_speed("wp256", sec, generic_hash_speed_template);
  1903. if (mode > 300 && mode < 400) break;
  1904. /* fall through */
  1905. case 308:
  1906. test_hash_speed("wp384", sec, generic_hash_speed_template);
  1907. if (mode > 300 && mode < 400) break;
  1908. /* fall through */
  1909. case 309:
  1910. test_hash_speed("wp512", sec, generic_hash_speed_template);
  1911. if (mode > 300 && mode < 400) break;
  1912. /* fall through */
  1913. case 310:
  1914. test_hash_speed("tgr128", sec, generic_hash_speed_template);
  1915. if (mode > 300 && mode < 400) break;
  1916. /* fall through */
  1917. case 311:
  1918. test_hash_speed("tgr160", sec, generic_hash_speed_template);
  1919. if (mode > 300 && mode < 400) break;
  1920. /* fall through */
  1921. case 312:
  1922. test_hash_speed("tgr192", sec, generic_hash_speed_template);
  1923. if (mode > 300 && mode < 400) break;
  1924. /* fall through */
  1925. case 313:
  1926. test_hash_speed("sha224", sec, generic_hash_speed_template);
  1927. if (mode > 300 && mode < 400) break;
  1928. /* fall through */
  1929. case 314:
  1930. test_hash_speed("rmd128", sec, generic_hash_speed_template);
  1931. if (mode > 300 && mode < 400) break;
  1932. /* fall through */
  1933. case 315:
  1934. test_hash_speed("rmd160", sec, generic_hash_speed_template);
  1935. if (mode > 300 && mode < 400) break;
  1936. /* fall through */
  1937. case 316:
  1938. test_hash_speed("rmd256", sec, generic_hash_speed_template);
  1939. if (mode > 300 && mode < 400) break;
  1940. /* fall through */
  1941. case 317:
  1942. test_hash_speed("rmd320", sec, generic_hash_speed_template);
  1943. if (mode > 300 && mode < 400) break;
  1944. /* fall through */
  1945. case 318:
  1946. test_hash_speed("ghash-generic", sec, hash_speed_template_16);
  1947. if (mode > 300 && mode < 400) break;
  1948. /* fall through */
  1949. case 319:
  1950. test_hash_speed("crc32c", sec, generic_hash_speed_template);
  1951. if (mode > 300 && mode < 400) break;
  1952. /* fall through */
  1953. case 320:
  1954. test_hash_speed("crct10dif", sec, generic_hash_speed_template);
  1955. if (mode > 300 && mode < 400) break;
  1956. /* fall through */
  1957. case 321:
  1958. test_hash_speed("poly1305", sec, poly1305_speed_template);
  1959. if (mode > 300 && mode < 400) break;
  1960. /* fall through */
  1961. case 322:
  1962. test_hash_speed("sha3-224", sec, generic_hash_speed_template);
  1963. if (mode > 300 && mode < 400) break;
  1964. /* fall through */
  1965. case 323:
  1966. test_hash_speed("sha3-256", sec, generic_hash_speed_template);
  1967. if (mode > 300 && mode < 400) break;
  1968. /* fall through */
  1969. case 324:
  1970. test_hash_speed("sha3-384", sec, generic_hash_speed_template);
  1971. if (mode > 300 && mode < 400) break;
  1972. /* fall through */
  1973. case 325:
  1974. test_hash_speed("sha3-512", sec, generic_hash_speed_template);
  1975. if (mode > 300 && mode < 400) break;
  1976. /* fall through */
  1977. case 326:
  1978. test_hash_speed("sm3", sec, generic_hash_speed_template);
  1979. if (mode > 300 && mode < 400) break;
  1980. /* fall through */
  1981. case 399:
  1982. break;
  1983. case 400:
  1984. if (alg) {
  1985. test_ahash_speed(alg, sec, generic_hash_speed_template);
  1986. break;
  1987. }
  1988. /* fall through */
  1989. case 401:
  1990. test_ahash_speed("md4", sec, generic_hash_speed_template);
  1991. if (mode > 400 && mode < 500) break;
  1992. /* fall through */
  1993. case 402:
  1994. test_ahash_speed("md5", sec, generic_hash_speed_template);
  1995. if (mode > 400 && mode < 500) break;
  1996. /* fall through */
  1997. case 403:
  1998. test_ahash_speed("sha1", sec, generic_hash_speed_template);
  1999. if (mode > 400 && mode < 500) break;
  2000. /* fall through */
  2001. case 404:
  2002. test_ahash_speed("sha256", sec, generic_hash_speed_template);
  2003. if (mode > 400 && mode < 500) break;
  2004. /* fall through */
  2005. case 405:
  2006. test_ahash_speed("sha384", sec, generic_hash_speed_template);
  2007. if (mode > 400 && mode < 500) break;
  2008. /* fall through */
  2009. case 406:
  2010. test_ahash_speed("sha512", sec, generic_hash_speed_template);
  2011. if (mode > 400 && mode < 500) break;
  2012. /* fall through */
  2013. case 407:
  2014. test_ahash_speed("wp256", sec, generic_hash_speed_template);
  2015. if (mode > 400 && mode < 500) break;
  2016. /* fall through */
  2017. case 408:
  2018. test_ahash_speed("wp384", sec, generic_hash_speed_template);
  2019. if (mode > 400 && mode < 500) break;
  2020. /* fall through */
  2021. case 409:
  2022. test_ahash_speed("wp512", sec, generic_hash_speed_template);
  2023. if (mode > 400 && mode < 500) break;
  2024. /* fall through */
  2025. case 410:
  2026. test_ahash_speed("tgr128", sec, generic_hash_speed_template);
  2027. if (mode > 400 && mode < 500) break;
  2028. /* fall through */
  2029. case 411:
  2030. test_ahash_speed("tgr160", sec, generic_hash_speed_template);
  2031. if (mode > 400 && mode < 500) break;
  2032. /* fall through */
  2033. case 412:
  2034. test_ahash_speed("tgr192", sec, generic_hash_speed_template);
  2035. if (mode > 400 && mode < 500) break;
  2036. /* fall through */
  2037. case 413:
  2038. test_ahash_speed("sha224", sec, generic_hash_speed_template);
  2039. if (mode > 400 && mode < 500) break;
  2040. /* fall through */
  2041. case 414:
  2042. test_ahash_speed("rmd128", sec, generic_hash_speed_template);
  2043. if (mode > 400 && mode < 500) break;
  2044. /* fall through */
  2045. case 415:
  2046. test_ahash_speed("rmd160", sec, generic_hash_speed_template);
  2047. if (mode > 400 && mode < 500) break;
  2048. /* fall through */
  2049. case 416:
  2050. test_ahash_speed("rmd256", sec, generic_hash_speed_template);
  2051. if (mode > 400 && mode < 500) break;
  2052. /* fall through */
  2053. case 417:
  2054. test_ahash_speed("rmd320", sec, generic_hash_speed_template);
  2055. if (mode > 400 && mode < 500) break;
  2056. /* fall through */
  2057. case 418:
  2058. test_ahash_speed("sha3-224", sec, generic_hash_speed_template);
  2059. if (mode > 400 && mode < 500) break;
  2060. /* fall through */
  2061. case 419:
  2062. test_ahash_speed("sha3-256", sec, generic_hash_speed_template);
  2063. if (mode > 400 && mode < 500) break;
  2064. /* fall through */
  2065. case 420:
  2066. test_ahash_speed("sha3-384", sec, generic_hash_speed_template);
  2067. if (mode > 400 && mode < 500) break;
  2068. /* fall through */
  2069. case 421:
  2070. test_ahash_speed("sha3-512", sec, generic_hash_speed_template);
  2071. if (mode > 400 && mode < 500) break;
  2072. /* fall through */
  2073. case 422:
  2074. test_mb_ahash_speed("sha1", sec, generic_hash_speed_template,
  2075. num_mb);
  2076. if (mode > 400 && mode < 500) break;
  2077. /* fall through */
  2078. case 423:
  2079. test_mb_ahash_speed("sha256", sec, generic_hash_speed_template,
  2080. num_mb);
  2081. if (mode > 400 && mode < 500) break;
  2082. /* fall through */
  2083. case 424:
  2084. test_mb_ahash_speed("sha512", sec, generic_hash_speed_template,
  2085. num_mb);
  2086. if (mode > 400 && mode < 500) break;
  2087. /* fall through */
  2088. case 425:
  2089. test_mb_ahash_speed("sm3", sec, generic_hash_speed_template,
  2090. num_mb);
  2091. if (mode > 400 && mode < 500) break;
  2092. /* fall through */
  2093. case 499:
  2094. break;
  2095. case 500:
  2096. test_acipher_speed("ecb(aes)", ENCRYPT, sec, NULL, 0,
  2097. speed_template_16_24_32);
  2098. test_acipher_speed("ecb(aes)", DECRYPT, sec, NULL, 0,
  2099. speed_template_16_24_32);
  2100. test_acipher_speed("cbc(aes)", ENCRYPT, sec, NULL, 0,
  2101. speed_template_16_24_32);
  2102. test_acipher_speed("cbc(aes)", DECRYPT, sec, NULL, 0,
  2103. speed_template_16_24_32);
  2104. test_acipher_speed("lrw(aes)", ENCRYPT, sec, NULL, 0,
  2105. speed_template_32_40_48);
  2106. test_acipher_speed("lrw(aes)", DECRYPT, sec, NULL, 0,
  2107. speed_template_32_40_48);
  2108. test_acipher_speed("xts(aes)", ENCRYPT, sec, NULL, 0,
  2109. speed_template_32_64);
  2110. test_acipher_speed("xts(aes)", DECRYPT, sec, NULL, 0,
  2111. speed_template_32_64);
  2112. test_acipher_speed("cts(cbc(aes))", ENCRYPT, sec, NULL, 0,
  2113. speed_template_16_24_32);
  2114. test_acipher_speed("cts(cbc(aes))", DECRYPT, sec, NULL, 0,
  2115. speed_template_16_24_32);
  2116. test_acipher_speed("ctr(aes)", ENCRYPT, sec, NULL, 0,
  2117. speed_template_16_24_32);
  2118. test_acipher_speed("ctr(aes)", DECRYPT, sec, NULL, 0,
  2119. speed_template_16_24_32);
  2120. test_acipher_speed("cfb(aes)", ENCRYPT, sec, NULL, 0,
  2121. speed_template_16_24_32);
  2122. test_acipher_speed("cfb(aes)", DECRYPT, sec, NULL, 0,
  2123. speed_template_16_24_32);
  2124. test_acipher_speed("ofb(aes)", ENCRYPT, sec, NULL, 0,
  2125. speed_template_16_24_32);
  2126. test_acipher_speed("ofb(aes)", DECRYPT, sec, NULL, 0,
  2127. speed_template_16_24_32);
  2128. test_acipher_speed("rfc3686(ctr(aes))", ENCRYPT, sec, NULL, 0,
  2129. speed_template_20_28_36);
  2130. test_acipher_speed("rfc3686(ctr(aes))", DECRYPT, sec, NULL, 0,
  2131. speed_template_20_28_36);
  2132. break;
  2133. case 501:
  2134. test_acipher_speed("ecb(des3_ede)", ENCRYPT, sec,
  2135. des3_speed_template, DES3_SPEED_VECTORS,
  2136. speed_template_24);
  2137. test_acipher_speed("ecb(des3_ede)", DECRYPT, sec,
  2138. des3_speed_template, DES3_SPEED_VECTORS,
  2139. speed_template_24);
  2140. test_acipher_speed("cbc(des3_ede)", ENCRYPT, sec,
  2141. des3_speed_template, DES3_SPEED_VECTORS,
  2142. speed_template_24);
  2143. test_acipher_speed("cbc(des3_ede)", DECRYPT, sec,
  2144. des3_speed_template, DES3_SPEED_VECTORS,
  2145. speed_template_24);
  2146. test_acipher_speed("cfb(des3_ede)", ENCRYPT, sec,
  2147. des3_speed_template, DES3_SPEED_VECTORS,
  2148. speed_template_24);
  2149. test_acipher_speed("cfb(des3_ede)", DECRYPT, sec,
  2150. des3_speed_template, DES3_SPEED_VECTORS,
  2151. speed_template_24);
  2152. test_acipher_speed("ofb(des3_ede)", ENCRYPT, sec,
  2153. des3_speed_template, DES3_SPEED_VECTORS,
  2154. speed_template_24);
  2155. test_acipher_speed("ofb(des3_ede)", DECRYPT, sec,
  2156. des3_speed_template, DES3_SPEED_VECTORS,
  2157. speed_template_24);
  2158. break;
  2159. case 502:
  2160. test_acipher_speed("ecb(des)", ENCRYPT, sec, NULL, 0,
  2161. speed_template_8);
  2162. test_acipher_speed("ecb(des)", DECRYPT, sec, NULL, 0,
  2163. speed_template_8);
  2164. test_acipher_speed("cbc(des)", ENCRYPT, sec, NULL, 0,
  2165. speed_template_8);
  2166. test_acipher_speed("cbc(des)", DECRYPT, sec, NULL, 0,
  2167. speed_template_8);
  2168. test_acipher_speed("cfb(des)", ENCRYPT, sec, NULL, 0,
  2169. speed_template_8);
  2170. test_acipher_speed("cfb(des)", DECRYPT, sec, NULL, 0,
  2171. speed_template_8);
  2172. test_acipher_speed("ofb(des)", ENCRYPT, sec, NULL, 0,
  2173. speed_template_8);
  2174. test_acipher_speed("ofb(des)", DECRYPT, sec, NULL, 0,
  2175. speed_template_8);
  2176. break;
  2177. case 503:
  2178. test_acipher_speed("ecb(serpent)", ENCRYPT, sec, NULL, 0,
  2179. speed_template_16_32);
  2180. test_acipher_speed("ecb(serpent)", DECRYPT, sec, NULL, 0,
  2181. speed_template_16_32);
  2182. test_acipher_speed("cbc(serpent)", ENCRYPT, sec, NULL, 0,
  2183. speed_template_16_32);
  2184. test_acipher_speed("cbc(serpent)", DECRYPT, sec, NULL, 0,
  2185. speed_template_16_32);
  2186. test_acipher_speed("ctr(serpent)", ENCRYPT, sec, NULL, 0,
  2187. speed_template_16_32);
  2188. test_acipher_speed("ctr(serpent)", DECRYPT, sec, NULL, 0,
  2189. speed_template_16_32);
  2190. test_acipher_speed("lrw(serpent)", ENCRYPT, sec, NULL, 0,
  2191. speed_template_32_48);
  2192. test_acipher_speed("lrw(serpent)", DECRYPT, sec, NULL, 0,
  2193. speed_template_32_48);
  2194. test_acipher_speed("xts(serpent)", ENCRYPT, sec, NULL, 0,
  2195. speed_template_32_64);
  2196. test_acipher_speed("xts(serpent)", DECRYPT, sec, NULL, 0,
  2197. speed_template_32_64);
  2198. break;
  2199. case 504:
  2200. test_acipher_speed("ecb(twofish)", ENCRYPT, sec, NULL, 0,
  2201. speed_template_16_24_32);
  2202. test_acipher_speed("ecb(twofish)", DECRYPT, sec, NULL, 0,
  2203. speed_template_16_24_32);
  2204. test_acipher_speed("cbc(twofish)", ENCRYPT, sec, NULL, 0,
  2205. speed_template_16_24_32);
  2206. test_acipher_speed("cbc(twofish)", DECRYPT, sec, NULL, 0,
  2207. speed_template_16_24_32);
  2208. test_acipher_speed("ctr(twofish)", ENCRYPT, sec, NULL, 0,
  2209. speed_template_16_24_32);
  2210. test_acipher_speed("ctr(twofish)", DECRYPT, sec, NULL, 0,
  2211. speed_template_16_24_32);
  2212. test_acipher_speed("lrw(twofish)", ENCRYPT, sec, NULL, 0,
  2213. speed_template_32_40_48);
  2214. test_acipher_speed("lrw(twofish)", DECRYPT, sec, NULL, 0,
  2215. speed_template_32_40_48);
  2216. test_acipher_speed("xts(twofish)", ENCRYPT, sec, NULL, 0,
  2217. speed_template_32_48_64);
  2218. test_acipher_speed("xts(twofish)", DECRYPT, sec, NULL, 0,
  2219. speed_template_32_48_64);
  2220. break;
  2221. case 505:
  2222. test_acipher_speed("ecb(arc4)", ENCRYPT, sec, NULL, 0,
  2223. speed_template_8);
  2224. break;
  2225. case 506:
  2226. test_acipher_speed("ecb(cast5)", ENCRYPT, sec, NULL, 0,
  2227. speed_template_8_16);
  2228. test_acipher_speed("ecb(cast5)", DECRYPT, sec, NULL, 0,
  2229. speed_template_8_16);
  2230. test_acipher_speed("cbc(cast5)", ENCRYPT, sec, NULL, 0,
  2231. speed_template_8_16);
  2232. test_acipher_speed("cbc(cast5)", DECRYPT, sec, NULL, 0,
  2233. speed_template_8_16);
  2234. test_acipher_speed("ctr(cast5)", ENCRYPT, sec, NULL, 0,
  2235. speed_template_8_16);
  2236. test_acipher_speed("ctr(cast5)", DECRYPT, sec, NULL, 0,
  2237. speed_template_8_16);
  2238. break;
  2239. case 507:
  2240. test_acipher_speed("ecb(cast6)", ENCRYPT, sec, NULL, 0,
  2241. speed_template_16_32);
  2242. test_acipher_speed("ecb(cast6)", DECRYPT, sec, NULL, 0,
  2243. speed_template_16_32);
  2244. test_acipher_speed("cbc(cast6)", ENCRYPT, sec, NULL, 0,
  2245. speed_template_16_32);
  2246. test_acipher_speed("cbc(cast6)", DECRYPT, sec, NULL, 0,
  2247. speed_template_16_32);
  2248. test_acipher_speed("ctr(cast6)", ENCRYPT, sec, NULL, 0,
  2249. speed_template_16_32);
  2250. test_acipher_speed("ctr(cast6)", DECRYPT, sec, NULL, 0,
  2251. speed_template_16_32);
  2252. test_acipher_speed("lrw(cast6)", ENCRYPT, sec, NULL, 0,
  2253. speed_template_32_48);
  2254. test_acipher_speed("lrw(cast6)", DECRYPT, sec, NULL, 0,
  2255. speed_template_32_48);
  2256. test_acipher_speed("xts(cast6)", ENCRYPT, sec, NULL, 0,
  2257. speed_template_32_64);
  2258. test_acipher_speed("xts(cast6)", DECRYPT, sec, NULL, 0,
  2259. speed_template_32_64);
  2260. break;
  2261. case 508:
  2262. test_acipher_speed("ecb(camellia)", ENCRYPT, sec, NULL, 0,
  2263. speed_template_16_32);
  2264. test_acipher_speed("ecb(camellia)", DECRYPT, sec, NULL, 0,
  2265. speed_template_16_32);
  2266. test_acipher_speed("cbc(camellia)", ENCRYPT, sec, NULL, 0,
  2267. speed_template_16_32);
  2268. test_acipher_speed("cbc(camellia)", DECRYPT, sec, NULL, 0,
  2269. speed_template_16_32);
  2270. test_acipher_speed("ctr(camellia)", ENCRYPT, sec, NULL, 0,
  2271. speed_template_16_32);
  2272. test_acipher_speed("ctr(camellia)", DECRYPT, sec, NULL, 0,
  2273. speed_template_16_32);
  2274. test_acipher_speed("lrw(camellia)", ENCRYPT, sec, NULL, 0,
  2275. speed_template_32_48);
  2276. test_acipher_speed("lrw(camellia)", DECRYPT, sec, NULL, 0,
  2277. speed_template_32_48);
  2278. test_acipher_speed("xts(camellia)", ENCRYPT, sec, NULL, 0,
  2279. speed_template_32_64);
  2280. test_acipher_speed("xts(camellia)", DECRYPT, sec, NULL, 0,
  2281. speed_template_32_64);
  2282. break;
  2283. case 509:
  2284. test_acipher_speed("ecb(blowfish)", ENCRYPT, sec, NULL, 0,
  2285. speed_template_8_32);
  2286. test_acipher_speed("ecb(blowfish)", DECRYPT, sec, NULL, 0,
  2287. speed_template_8_32);
  2288. test_acipher_speed("cbc(blowfish)", ENCRYPT, sec, NULL, 0,
  2289. speed_template_8_32);
  2290. test_acipher_speed("cbc(blowfish)", DECRYPT, sec, NULL, 0,
  2291. speed_template_8_32);
  2292. test_acipher_speed("ctr(blowfish)", ENCRYPT, sec, NULL, 0,
  2293. speed_template_8_32);
  2294. test_acipher_speed("ctr(blowfish)", DECRYPT, sec, NULL, 0,
  2295. speed_template_8_32);
  2296. break;
  2297. case 600:
  2298. test_mb_skcipher_speed("ecb(aes)", ENCRYPT, sec, NULL, 0,
  2299. speed_template_16_24_32, num_mb);
  2300. test_mb_skcipher_speed("ecb(aes)", DECRYPT, sec, NULL, 0,
  2301. speed_template_16_24_32, num_mb);
  2302. test_mb_skcipher_speed("cbc(aes)", ENCRYPT, sec, NULL, 0,
  2303. speed_template_16_24_32, num_mb);
  2304. test_mb_skcipher_speed("cbc(aes)", DECRYPT, sec, NULL, 0,
  2305. speed_template_16_24_32, num_mb);
  2306. test_mb_skcipher_speed("lrw(aes)", ENCRYPT, sec, NULL, 0,
  2307. speed_template_32_40_48, num_mb);
  2308. test_mb_skcipher_speed("lrw(aes)", DECRYPT, sec, NULL, 0,
  2309. speed_template_32_40_48, num_mb);
  2310. test_mb_skcipher_speed("xts(aes)", ENCRYPT, sec, NULL, 0,
  2311. speed_template_32_64, num_mb);
  2312. test_mb_skcipher_speed("xts(aes)", DECRYPT, sec, NULL, 0,
  2313. speed_template_32_64, num_mb);
  2314. test_mb_skcipher_speed("cts(cbc(aes))", ENCRYPT, sec, NULL, 0,
  2315. speed_template_16_24_32, num_mb);
  2316. test_mb_skcipher_speed("cts(cbc(aes))", DECRYPT, sec, NULL, 0,
  2317. speed_template_16_24_32, num_mb);
  2318. test_mb_skcipher_speed("ctr(aes)", ENCRYPT, sec, NULL, 0,
  2319. speed_template_16_24_32, num_mb);
  2320. test_mb_skcipher_speed("ctr(aes)", DECRYPT, sec, NULL, 0,
  2321. speed_template_16_24_32, num_mb);
  2322. test_mb_skcipher_speed("cfb(aes)", ENCRYPT, sec, NULL, 0,
  2323. speed_template_16_24_32, num_mb);
  2324. test_mb_skcipher_speed("cfb(aes)", DECRYPT, sec, NULL, 0,
  2325. speed_template_16_24_32, num_mb);
  2326. test_mb_skcipher_speed("ofb(aes)", ENCRYPT, sec, NULL, 0,
  2327. speed_template_16_24_32, num_mb);
  2328. test_mb_skcipher_speed("ofb(aes)", DECRYPT, sec, NULL, 0,
  2329. speed_template_16_24_32, num_mb);
  2330. test_mb_skcipher_speed("rfc3686(ctr(aes))", ENCRYPT, sec, NULL,
  2331. 0, speed_template_20_28_36, num_mb);
  2332. test_mb_skcipher_speed("rfc3686(ctr(aes))", DECRYPT, sec, NULL,
  2333. 0, speed_template_20_28_36, num_mb);
  2334. break;
  2335. case 601:
  2336. test_mb_skcipher_speed("ecb(des3_ede)", ENCRYPT, sec,
  2337. des3_speed_template, DES3_SPEED_VECTORS,
  2338. speed_template_24, num_mb);
  2339. test_mb_skcipher_speed("ecb(des3_ede)", DECRYPT, sec,
  2340. des3_speed_template, DES3_SPEED_VECTORS,
  2341. speed_template_24, num_mb);
  2342. test_mb_skcipher_speed("cbc(des3_ede)", ENCRYPT, sec,
  2343. des3_speed_template, DES3_SPEED_VECTORS,
  2344. speed_template_24, num_mb);
  2345. test_mb_skcipher_speed("cbc(des3_ede)", DECRYPT, sec,
  2346. des3_speed_template, DES3_SPEED_VECTORS,
  2347. speed_template_24, num_mb);
  2348. test_mb_skcipher_speed("cfb(des3_ede)", ENCRYPT, sec,
  2349. des3_speed_template, DES3_SPEED_VECTORS,
  2350. speed_template_24, num_mb);
  2351. test_mb_skcipher_speed("cfb(des3_ede)", DECRYPT, sec,
  2352. des3_speed_template, DES3_SPEED_VECTORS,
  2353. speed_template_24, num_mb);
  2354. test_mb_skcipher_speed("ofb(des3_ede)", ENCRYPT, sec,
  2355. des3_speed_template, DES3_SPEED_VECTORS,
  2356. speed_template_24, num_mb);
  2357. test_mb_skcipher_speed("ofb(des3_ede)", DECRYPT, sec,
  2358. des3_speed_template, DES3_SPEED_VECTORS,
  2359. speed_template_24, num_mb);
  2360. break;
  2361. case 602:
  2362. test_mb_skcipher_speed("ecb(des)", ENCRYPT, sec, NULL, 0,
  2363. speed_template_8, num_mb);
  2364. test_mb_skcipher_speed("ecb(des)", DECRYPT, sec, NULL, 0,
  2365. speed_template_8, num_mb);
  2366. test_mb_skcipher_speed("cbc(des)", ENCRYPT, sec, NULL, 0,
  2367. speed_template_8, num_mb);
  2368. test_mb_skcipher_speed("cbc(des)", DECRYPT, sec, NULL, 0,
  2369. speed_template_8, num_mb);
  2370. test_mb_skcipher_speed("cfb(des)", ENCRYPT, sec, NULL, 0,
  2371. speed_template_8, num_mb);
  2372. test_mb_skcipher_speed("cfb(des)", DECRYPT, sec, NULL, 0,
  2373. speed_template_8, num_mb);
  2374. test_mb_skcipher_speed("ofb(des)", ENCRYPT, sec, NULL, 0,
  2375. speed_template_8, num_mb);
  2376. test_mb_skcipher_speed("ofb(des)", DECRYPT, sec, NULL, 0,
  2377. speed_template_8, num_mb);
  2378. break;
  2379. case 603:
  2380. test_mb_skcipher_speed("ecb(serpent)", ENCRYPT, sec, NULL, 0,
  2381. speed_template_16_32, num_mb);
  2382. test_mb_skcipher_speed("ecb(serpent)", DECRYPT, sec, NULL, 0,
  2383. speed_template_16_32, num_mb);
  2384. test_mb_skcipher_speed("cbc(serpent)", ENCRYPT, sec, NULL, 0,
  2385. speed_template_16_32, num_mb);
  2386. test_mb_skcipher_speed("cbc(serpent)", DECRYPT, sec, NULL, 0,
  2387. speed_template_16_32, num_mb);
  2388. test_mb_skcipher_speed("ctr(serpent)", ENCRYPT, sec, NULL, 0,
  2389. speed_template_16_32, num_mb);
  2390. test_mb_skcipher_speed("ctr(serpent)", DECRYPT, sec, NULL, 0,
  2391. speed_template_16_32, num_mb);
  2392. test_mb_skcipher_speed("lrw(serpent)", ENCRYPT, sec, NULL, 0,
  2393. speed_template_32_48, num_mb);
  2394. test_mb_skcipher_speed("lrw(serpent)", DECRYPT, sec, NULL, 0,
  2395. speed_template_32_48, num_mb);
  2396. test_mb_skcipher_speed("xts(serpent)", ENCRYPT, sec, NULL, 0,
  2397. speed_template_32_64, num_mb);
  2398. test_mb_skcipher_speed("xts(serpent)", DECRYPT, sec, NULL, 0,
  2399. speed_template_32_64, num_mb);
  2400. break;
  2401. case 604:
  2402. test_mb_skcipher_speed("ecb(twofish)", ENCRYPT, sec, NULL, 0,
  2403. speed_template_16_24_32, num_mb);
  2404. test_mb_skcipher_speed("ecb(twofish)", DECRYPT, sec, NULL, 0,
  2405. speed_template_16_24_32, num_mb);
  2406. test_mb_skcipher_speed("cbc(twofish)", ENCRYPT, sec, NULL, 0,
  2407. speed_template_16_24_32, num_mb);
  2408. test_mb_skcipher_speed("cbc(twofish)", DECRYPT, sec, NULL, 0,
  2409. speed_template_16_24_32, num_mb);
  2410. test_mb_skcipher_speed("ctr(twofish)", ENCRYPT, sec, NULL, 0,
  2411. speed_template_16_24_32, num_mb);
  2412. test_mb_skcipher_speed("ctr(twofish)", DECRYPT, sec, NULL, 0,
  2413. speed_template_16_24_32, num_mb);
  2414. test_mb_skcipher_speed("lrw(twofish)", ENCRYPT, sec, NULL, 0,
  2415. speed_template_32_40_48, num_mb);
  2416. test_mb_skcipher_speed("lrw(twofish)", DECRYPT, sec, NULL, 0,
  2417. speed_template_32_40_48, num_mb);
  2418. test_mb_skcipher_speed("xts(twofish)", ENCRYPT, sec, NULL, 0,
  2419. speed_template_32_48_64, num_mb);
  2420. test_mb_skcipher_speed("xts(twofish)", DECRYPT, sec, NULL, 0,
  2421. speed_template_32_48_64, num_mb);
  2422. break;
  2423. case 605:
  2424. test_mb_skcipher_speed("ecb(arc4)", ENCRYPT, sec, NULL, 0,
  2425. speed_template_8, num_mb);
  2426. break;
  2427. case 606:
  2428. test_mb_skcipher_speed("ecb(cast5)", ENCRYPT, sec, NULL, 0,
  2429. speed_template_8_16, num_mb);
  2430. test_mb_skcipher_speed("ecb(cast5)", DECRYPT, sec, NULL, 0,
  2431. speed_template_8_16, num_mb);
  2432. test_mb_skcipher_speed("cbc(cast5)", ENCRYPT, sec, NULL, 0,
  2433. speed_template_8_16, num_mb);
  2434. test_mb_skcipher_speed("cbc(cast5)", DECRYPT, sec, NULL, 0,
  2435. speed_template_8_16, num_mb);
  2436. test_mb_skcipher_speed("ctr(cast5)", ENCRYPT, sec, NULL, 0,
  2437. speed_template_8_16, num_mb);
  2438. test_mb_skcipher_speed("ctr(cast5)", DECRYPT, sec, NULL, 0,
  2439. speed_template_8_16, num_mb);
  2440. break;
  2441. case 607:
  2442. test_mb_skcipher_speed("ecb(cast6)", ENCRYPT, sec, NULL, 0,
  2443. speed_template_16_32, num_mb);
  2444. test_mb_skcipher_speed("ecb(cast6)", DECRYPT, sec, NULL, 0,
  2445. speed_template_16_32, num_mb);
  2446. test_mb_skcipher_speed("cbc(cast6)", ENCRYPT, sec, NULL, 0,
  2447. speed_template_16_32, num_mb);
  2448. test_mb_skcipher_speed("cbc(cast6)", DECRYPT, sec, NULL, 0,
  2449. speed_template_16_32, num_mb);
  2450. test_mb_skcipher_speed("ctr(cast6)", ENCRYPT, sec, NULL, 0,
  2451. speed_template_16_32, num_mb);
  2452. test_mb_skcipher_speed("ctr(cast6)", DECRYPT, sec, NULL, 0,
  2453. speed_template_16_32, num_mb);
  2454. test_mb_skcipher_speed("lrw(cast6)", ENCRYPT, sec, NULL, 0,
  2455. speed_template_32_48, num_mb);
  2456. test_mb_skcipher_speed("lrw(cast6)", DECRYPT, sec, NULL, 0,
  2457. speed_template_32_48, num_mb);
  2458. test_mb_skcipher_speed("xts(cast6)", ENCRYPT, sec, NULL, 0,
  2459. speed_template_32_64, num_mb);
  2460. test_mb_skcipher_speed("xts(cast6)", DECRYPT, sec, NULL, 0,
  2461. speed_template_32_64, num_mb);
  2462. break;
  2463. case 608:
  2464. test_mb_skcipher_speed("ecb(camellia)", ENCRYPT, sec, NULL, 0,
  2465. speed_template_16_32, num_mb);
  2466. test_mb_skcipher_speed("ecb(camellia)", DECRYPT, sec, NULL, 0,
  2467. speed_template_16_32, num_mb);
  2468. test_mb_skcipher_speed("cbc(camellia)", ENCRYPT, sec, NULL, 0,
  2469. speed_template_16_32, num_mb);
  2470. test_mb_skcipher_speed("cbc(camellia)", DECRYPT, sec, NULL, 0,
  2471. speed_template_16_32, num_mb);
  2472. test_mb_skcipher_speed("ctr(camellia)", ENCRYPT, sec, NULL, 0,
  2473. speed_template_16_32, num_mb);
  2474. test_mb_skcipher_speed("ctr(camellia)", DECRYPT, sec, NULL, 0,
  2475. speed_template_16_32, num_mb);
  2476. test_mb_skcipher_speed("lrw(camellia)", ENCRYPT, sec, NULL, 0,
  2477. speed_template_32_48, num_mb);
  2478. test_mb_skcipher_speed("lrw(camellia)", DECRYPT, sec, NULL, 0,
  2479. speed_template_32_48, num_mb);
  2480. test_mb_skcipher_speed("xts(camellia)", ENCRYPT, sec, NULL, 0,
  2481. speed_template_32_64, num_mb);
  2482. test_mb_skcipher_speed("xts(camellia)", DECRYPT, sec, NULL, 0,
  2483. speed_template_32_64, num_mb);
  2484. break;
  2485. case 609:
  2486. test_mb_skcipher_speed("ecb(blowfish)", ENCRYPT, sec, NULL, 0,
  2487. speed_template_8_32, num_mb);
  2488. test_mb_skcipher_speed("ecb(blowfish)", DECRYPT, sec, NULL, 0,
  2489. speed_template_8_32, num_mb);
  2490. test_mb_skcipher_speed("cbc(blowfish)", ENCRYPT, sec, NULL, 0,
  2491. speed_template_8_32, num_mb);
  2492. test_mb_skcipher_speed("cbc(blowfish)", DECRYPT, sec, NULL, 0,
  2493. speed_template_8_32, num_mb);
  2494. test_mb_skcipher_speed("ctr(blowfish)", ENCRYPT, sec, NULL, 0,
  2495. speed_template_8_32, num_mb);
  2496. test_mb_skcipher_speed("ctr(blowfish)", DECRYPT, sec, NULL, 0,
  2497. speed_template_8_32, num_mb);
  2498. break;
  2499. case 1000:
  2500. test_available();
  2501. break;
  2502. }
  2503. return ret;
  2504. }
  2505. static int __init tcrypt_mod_init(void)
  2506. {
  2507. int err = -ENOMEM;
  2508. int i;
  2509. for (i = 0; i < TVMEMSIZE; i++) {
  2510. tvmem[i] = (void *)__get_free_page(GFP_KERNEL);
  2511. if (!tvmem[i])
  2512. goto err_free_tv;
  2513. }
  2514. err = do_test(alg, type, mask, mode, num_mb);
  2515. if (err) {
  2516. printk(KERN_ERR "tcrypt: one or more tests failed!\n");
  2517. goto err_free_tv;
  2518. } else {
  2519. pr_debug("all tests passed\n");
  2520. }
  2521. /* We intentionaly return -EAGAIN to prevent keeping the module,
  2522. * unless we're running in fips mode. It does all its work from
  2523. * init() and doesn't offer any runtime functionality, but in
  2524. * the fips case, checking for a successful load is helpful.
  2525. * => we don't need it in the memory, do we?
  2526. * -- mludvig
  2527. */
  2528. if (!fips_enabled)
  2529. err = -EAGAIN;
  2530. err_free_tv:
  2531. for (i = 0; i < TVMEMSIZE && tvmem[i]; i++)
  2532. free_page((unsigned long)tvmem[i]);
  2533. return err;
  2534. }
  2535. /*
  2536. * If an init function is provided, an exit function must also be provided
  2537. * to allow module unload.
  2538. */
  2539. static void __exit tcrypt_mod_fini(void) { }
  2540. module_init(tcrypt_mod_init);
  2541. module_exit(tcrypt_mod_fini);
  2542. module_param(alg, charp, 0);
  2543. module_param(type, uint, 0);
  2544. module_param(mask, uint, 0);
  2545. module_param(mode, int, 0);
  2546. module_param(sec, uint, 0);
  2547. MODULE_PARM_DESC(sec, "Length in seconds of speed tests "
  2548. "(defaults to zero which uses CPU cycles instead)");
  2549. module_param(num_mb, uint, 0000);
  2550. MODULE_PARM_DESC(num_mb, "Number of concurrent requests to be used in mb speed tests (defaults to 8)");
  2551. MODULE_LICENSE("GPL");
  2552. MODULE_DESCRIPTION("Quick & dirty crypto testing module");
  2553. MODULE_AUTHOR("James Morris <jmorris@intercode.com.au>");