tcrypt.c 76 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001
  1. /*
  2. * Quick & dirty crypto testing module.
  3. *
  4. * This will only exist until we have a better testing mechanism
  5. * (e.g. a char device).
  6. *
  7. * Copyright (c) 2002 James Morris <jmorris@intercode.com.au>
  8. * Copyright (c) 2002 Jean-Francois Dive <jef@linuxbe.org>
  9. * Copyright (c) 2007 Nokia Siemens Networks
  10. *
  11. * Updated RFC4106 AES-GCM testing.
  12. * Authors: Aidan O'Mahony (aidan.o.mahony@intel.com)
  13. * Adrian Hoban <adrian.hoban@intel.com>
  14. * Gabriele Paoloni <gabriele.paoloni@intel.com>
  15. * Tadeusz Struk (tadeusz.struk@intel.com)
  16. * Copyright (c) 2010, Intel Corporation.
  17. *
  18. * This program is free software; you can redistribute it and/or modify it
  19. * under the terms of the GNU General Public License as published by the Free
  20. * Software Foundation; either version 2 of the License, or (at your option)
  21. * any later version.
  22. *
  23. */
  24. #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
  25. #include <crypto/aead.h>
  26. #include <crypto/hash.h>
  27. #include <crypto/skcipher.h>
  28. #include <linux/err.h>
  29. #include <linux/fips.h>
  30. #include <linux/init.h>
  31. #include <linux/gfp.h>
  32. #include <linux/module.h>
  33. #include <linux/scatterlist.h>
  34. #include <linux/string.h>
  35. #include <linux/moduleparam.h>
  36. #include <linux/jiffies.h>
  37. #include <linux/timex.h>
  38. #include <linux/interrupt.h>
  39. #include "tcrypt.h"
  40. /*
  41. * Need slab memory for testing (size in number of pages).
  42. */
  43. #define TVMEMSIZE 4
  44. /*
  45. * Used by test_cipher_speed()
  46. */
  47. #define ENCRYPT 1
  48. #define DECRYPT 0
  49. #define MAX_DIGEST_SIZE 64
  50. /*
  51. * return a string with the driver name
  52. */
  53. #define get_driver_name(tfm_type, tfm) crypto_tfm_alg_driver_name(tfm_type ## _tfm(tfm))
  54. /*
  55. * Used by test_cipher_speed()
  56. */
  57. static unsigned int sec;
  58. static char *alg = NULL;
  59. static u32 type;
  60. static u32 mask;
  61. static int mode;
  62. static u32 num_mb = 8;
  63. static char *tvmem[TVMEMSIZE];
  64. static char *check[] = {
  65. "des", "md5", "des3_ede", "rot13", "sha1", "sha224", "sha256", "sm3",
  66. "blowfish", "twofish", "serpent", "sha384", "sha512", "md4", "aes",
  67. "cast6", "arc4", "michael_mic", "deflate", "crc32c", "tea", "xtea",
  68. "khazad", "wp512", "wp384", "wp256", "tnepres", "xeta", "fcrypt",
  69. "camellia", "seed", "salsa20", "rmd128", "rmd160", "rmd256", "rmd320",
  70. "lzo", "cts", "zlib", "sha3-224", "sha3-256", "sha3-384", "sha3-512",
  71. NULL
  72. };
  73. static u32 block_sizes[] = { 16, 64, 256, 1024, 8192, 0 };
  74. static u32 aead_sizes[] = { 16, 64, 256, 512, 1024, 2048, 4096, 8192, 0 };
  75. #define XBUFSIZE 8
  76. #define MAX_IVLEN 32
  77. static int testmgr_alloc_buf(char *buf[XBUFSIZE])
  78. {
  79. int i;
  80. for (i = 0; i < XBUFSIZE; i++) {
  81. buf[i] = (void *)__get_free_page(GFP_KERNEL);
  82. if (!buf[i])
  83. goto err_free_buf;
  84. }
  85. return 0;
  86. err_free_buf:
  87. while (i-- > 0)
  88. free_page((unsigned long)buf[i]);
  89. return -ENOMEM;
  90. }
  91. static void testmgr_free_buf(char *buf[XBUFSIZE])
  92. {
  93. int i;
  94. for (i = 0; i < XBUFSIZE; i++)
  95. free_page((unsigned long)buf[i]);
  96. }
  97. static void sg_init_aead(struct scatterlist *sg, char *xbuf[XBUFSIZE],
  98. unsigned int buflen, const void *assoc,
  99. unsigned int aad_size)
  100. {
  101. int np = (buflen + PAGE_SIZE - 1)/PAGE_SIZE;
  102. int k, rem;
  103. if (np > XBUFSIZE) {
  104. rem = PAGE_SIZE;
  105. np = XBUFSIZE;
  106. } else {
  107. rem = buflen % PAGE_SIZE;
  108. }
  109. sg_init_table(sg, np + 1);
  110. sg_set_buf(&sg[0], assoc, aad_size);
  111. if (rem)
  112. np--;
  113. for (k = 0; k < np; k++)
  114. sg_set_buf(&sg[k + 1], xbuf[k], PAGE_SIZE);
  115. if (rem)
  116. sg_set_buf(&sg[k + 1], xbuf[k], rem);
  117. }
  118. static inline int do_one_aead_op(struct aead_request *req, int ret)
  119. {
  120. struct crypto_wait *wait = req->base.data;
  121. return crypto_wait_req(ret, wait);
  122. }
  123. struct test_mb_aead_data {
  124. struct scatterlist sg[XBUFSIZE];
  125. struct scatterlist sgout[XBUFSIZE];
  126. struct aead_request *req;
  127. struct crypto_wait wait;
  128. char *xbuf[XBUFSIZE];
  129. char *xoutbuf[XBUFSIZE];
  130. char *axbuf[XBUFSIZE];
  131. };
  132. static int do_mult_aead_op(struct test_mb_aead_data *data, int enc,
  133. u32 num_mb, int *rc)
  134. {
  135. int i, err = 0;
  136. /* Fire up a bunch of concurrent requests */
  137. for (i = 0; i < num_mb; i++) {
  138. if (enc == ENCRYPT)
  139. rc[i] = crypto_aead_encrypt(data[i].req);
  140. else
  141. rc[i] = crypto_aead_decrypt(data[i].req);
  142. }
  143. /* Wait for all requests to finish */
  144. for (i = 0; i < num_mb; i++) {
  145. rc[i] = crypto_wait_req(rc[i], &data[i].wait);
  146. if (rc[i]) {
  147. pr_info("concurrent request %d error %d\n", i, rc[i]);
  148. err = rc[i];
  149. }
  150. }
  151. return err;
  152. }
  153. static int test_mb_aead_jiffies(struct test_mb_aead_data *data, int enc,
  154. int blen, int secs, u32 num_mb)
  155. {
  156. unsigned long start, end;
  157. int bcount;
  158. int ret = 0;
  159. int *rc;
  160. rc = kcalloc(num_mb, sizeof(*rc), GFP_KERNEL);
  161. if (!rc)
  162. return -ENOMEM;
  163. for (start = jiffies, end = start + secs * HZ, bcount = 0;
  164. time_before(jiffies, end); bcount++) {
  165. ret = do_mult_aead_op(data, enc, num_mb, rc);
  166. if (ret)
  167. goto out;
  168. }
  169. pr_cont("%d operations in %d seconds (%ld bytes)\n",
  170. bcount * num_mb, secs, (long)bcount * blen * num_mb);
  171. out:
  172. kfree(rc);
  173. return ret;
  174. }
  175. static int test_mb_aead_cycles(struct test_mb_aead_data *data, int enc,
  176. int blen, u32 num_mb)
  177. {
  178. unsigned long cycles = 0;
  179. int ret = 0;
  180. int i;
  181. int *rc;
  182. rc = kcalloc(num_mb, sizeof(*rc), GFP_KERNEL);
  183. if (!rc)
  184. return -ENOMEM;
  185. /* Warm-up run. */
  186. for (i = 0; i < 4; i++) {
  187. ret = do_mult_aead_op(data, enc, num_mb, rc);
  188. if (ret)
  189. goto out;
  190. }
  191. /* The real thing. */
  192. for (i = 0; i < 8; i++) {
  193. cycles_t start, end;
  194. start = get_cycles();
  195. ret = do_mult_aead_op(data, enc, num_mb, rc);
  196. end = get_cycles();
  197. if (ret)
  198. goto out;
  199. cycles += end - start;
  200. }
  201. pr_cont("1 operation in %lu cycles (%d bytes)\n",
  202. (cycles + 4) / (8 * num_mb), blen);
  203. out:
  204. kfree(rc);
  205. return ret;
  206. }
  207. static void test_mb_aead_speed(const char *algo, int enc, int secs,
  208. struct aead_speed_template *template,
  209. unsigned int tcount, u8 authsize,
  210. unsigned int aad_size, u8 *keysize, u32 num_mb)
  211. {
  212. struct test_mb_aead_data *data;
  213. struct crypto_aead *tfm;
  214. unsigned int i, j, iv_len;
  215. const char *key;
  216. const char *e;
  217. void *assoc;
  218. u32 *b_size;
  219. char *iv;
  220. int ret;
  221. if (aad_size >= PAGE_SIZE) {
  222. pr_err("associate data length (%u) too big\n", aad_size);
  223. return;
  224. }
  225. iv = kzalloc(MAX_IVLEN, GFP_KERNEL);
  226. if (!iv)
  227. return;
  228. if (enc == ENCRYPT)
  229. e = "encryption";
  230. else
  231. e = "decryption";
  232. data = kcalloc(num_mb, sizeof(*data), GFP_KERNEL);
  233. if (!data)
  234. goto out_free_iv;
  235. tfm = crypto_alloc_aead(algo, 0, 0);
  236. if (IS_ERR(tfm)) {
  237. pr_err("failed to load transform for %s: %ld\n",
  238. algo, PTR_ERR(tfm));
  239. goto out_free_data;
  240. }
  241. ret = crypto_aead_setauthsize(tfm, authsize);
  242. for (i = 0; i < num_mb; ++i)
  243. if (testmgr_alloc_buf(data[i].xbuf)) {
  244. while (i--)
  245. testmgr_free_buf(data[i].xbuf);
  246. goto out_free_tfm;
  247. }
  248. for (i = 0; i < num_mb; ++i)
  249. if (testmgr_alloc_buf(data[i].axbuf)) {
  250. while (i--)
  251. testmgr_free_buf(data[i].axbuf);
  252. goto out_free_xbuf;
  253. }
  254. for (i = 0; i < num_mb; ++i)
  255. if (testmgr_alloc_buf(data[i].xoutbuf)) {
  256. while (i--)
  257. testmgr_free_buf(data[i].xoutbuf);
  258. goto out_free_axbuf;
  259. }
  260. for (i = 0; i < num_mb; ++i) {
  261. data[i].req = aead_request_alloc(tfm, GFP_KERNEL);
  262. if (!data[i].req) {
  263. pr_err("alg: skcipher: Failed to allocate request for %s\n",
  264. algo);
  265. while (i--)
  266. aead_request_free(data[i].req);
  267. goto out_free_xoutbuf;
  268. }
  269. }
  270. for (i = 0; i < num_mb; ++i) {
  271. crypto_init_wait(&data[i].wait);
  272. aead_request_set_callback(data[i].req,
  273. CRYPTO_TFM_REQ_MAY_BACKLOG,
  274. crypto_req_done, &data[i].wait);
  275. }
  276. pr_info("\ntesting speed of multibuffer %s (%s) %s\n", algo,
  277. get_driver_name(crypto_aead, tfm), e);
  278. i = 0;
  279. do {
  280. b_size = aead_sizes;
  281. do {
  282. if (*b_size + authsize > XBUFSIZE * PAGE_SIZE) {
  283. pr_err("template (%u) too big for buffer (%lu)\n",
  284. authsize + *b_size,
  285. XBUFSIZE * PAGE_SIZE);
  286. goto out;
  287. }
  288. pr_info("test %u (%d bit key, %d byte blocks): ", i,
  289. *keysize * 8, *b_size);
  290. /* Set up tfm global state, i.e. the key */
  291. memset(tvmem[0], 0xff, PAGE_SIZE);
  292. key = tvmem[0];
  293. for (j = 0; j < tcount; j++) {
  294. if (template[j].klen == *keysize) {
  295. key = template[j].key;
  296. break;
  297. }
  298. }
  299. crypto_aead_clear_flags(tfm, ~0);
  300. ret = crypto_aead_setkey(tfm, key, *keysize);
  301. if (ret) {
  302. pr_err("setkey() failed flags=%x\n",
  303. crypto_aead_get_flags(tfm));
  304. goto out;
  305. }
  306. iv_len = crypto_aead_ivsize(tfm);
  307. if (iv_len)
  308. memset(iv, 0xff, iv_len);
  309. /* Now setup per request stuff, i.e. buffers */
  310. for (j = 0; j < num_mb; ++j) {
  311. struct test_mb_aead_data *cur = &data[j];
  312. assoc = cur->axbuf[0];
  313. memset(assoc, 0xff, aad_size);
  314. sg_init_aead(cur->sg, cur->xbuf,
  315. *b_size + (enc ? 0 : authsize),
  316. assoc, aad_size);
  317. sg_init_aead(cur->sgout, cur->xoutbuf,
  318. *b_size + (enc ? authsize : 0),
  319. assoc, aad_size);
  320. aead_request_set_ad(cur->req, aad_size);
  321. if (!enc) {
  322. aead_request_set_crypt(cur->req,
  323. cur->sgout,
  324. cur->sg,
  325. *b_size, iv);
  326. ret = crypto_aead_encrypt(cur->req);
  327. ret = do_one_aead_op(cur->req, ret);
  328. if (ret) {
  329. pr_err("calculating auth failed failed (%d)\n",
  330. ret);
  331. break;
  332. }
  333. }
  334. aead_request_set_crypt(cur->req, cur->sg,
  335. cur->sgout, *b_size +
  336. (enc ? 0 : authsize),
  337. iv);
  338. }
  339. if (secs) {
  340. ret = test_mb_aead_jiffies(data, enc, *b_size,
  341. secs, num_mb);
  342. cond_resched();
  343. } else {
  344. ret = test_mb_aead_cycles(data, enc, *b_size,
  345. num_mb);
  346. }
  347. if (ret) {
  348. pr_err("%s() failed return code=%d\n", e, ret);
  349. break;
  350. }
  351. b_size++;
  352. i++;
  353. } while (*b_size);
  354. keysize++;
  355. } while (*keysize);
  356. out:
  357. for (i = 0; i < num_mb; ++i)
  358. aead_request_free(data[i].req);
  359. out_free_xoutbuf:
  360. for (i = 0; i < num_mb; ++i)
  361. testmgr_free_buf(data[i].xoutbuf);
  362. out_free_axbuf:
  363. for (i = 0; i < num_mb; ++i)
  364. testmgr_free_buf(data[i].axbuf);
  365. out_free_xbuf:
  366. for (i = 0; i < num_mb; ++i)
  367. testmgr_free_buf(data[i].xbuf);
  368. out_free_tfm:
  369. crypto_free_aead(tfm);
  370. out_free_data:
  371. kfree(data);
  372. out_free_iv:
  373. kfree(iv);
  374. }
  375. static int test_aead_jiffies(struct aead_request *req, int enc,
  376. int blen, int secs)
  377. {
  378. unsigned long start, end;
  379. int bcount;
  380. int ret;
  381. for (start = jiffies, end = start + secs * HZ, bcount = 0;
  382. time_before(jiffies, end); bcount++) {
  383. if (enc)
  384. ret = do_one_aead_op(req, crypto_aead_encrypt(req));
  385. else
  386. ret = do_one_aead_op(req, crypto_aead_decrypt(req));
  387. if (ret)
  388. return ret;
  389. }
  390. printk("%d operations in %d seconds (%ld bytes)\n",
  391. bcount, secs, (long)bcount * blen);
  392. return 0;
  393. }
  394. static int test_aead_cycles(struct aead_request *req, int enc, int blen)
  395. {
  396. unsigned long cycles = 0;
  397. int ret = 0;
  398. int i;
  399. /* Warm-up run. */
  400. for (i = 0; i < 4; i++) {
  401. if (enc)
  402. ret = do_one_aead_op(req, crypto_aead_encrypt(req));
  403. else
  404. ret = do_one_aead_op(req, crypto_aead_decrypt(req));
  405. if (ret)
  406. goto out;
  407. }
  408. /* The real thing. */
  409. for (i = 0; i < 8; i++) {
  410. cycles_t start, end;
  411. start = get_cycles();
  412. if (enc)
  413. ret = do_one_aead_op(req, crypto_aead_encrypt(req));
  414. else
  415. ret = do_one_aead_op(req, crypto_aead_decrypt(req));
  416. end = get_cycles();
  417. if (ret)
  418. goto out;
  419. cycles += end - start;
  420. }
  421. out:
  422. if (ret == 0)
  423. printk("1 operation in %lu cycles (%d bytes)\n",
  424. (cycles + 4) / 8, blen);
  425. return ret;
  426. }
  427. static void test_aead_speed(const char *algo, int enc, unsigned int secs,
  428. struct aead_speed_template *template,
  429. unsigned int tcount, u8 authsize,
  430. unsigned int aad_size, u8 *keysize)
  431. {
  432. unsigned int i, j;
  433. struct crypto_aead *tfm;
  434. int ret = -ENOMEM;
  435. const char *key;
  436. struct aead_request *req;
  437. struct scatterlist *sg;
  438. struct scatterlist *sgout;
  439. const char *e;
  440. void *assoc;
  441. char *iv;
  442. char *xbuf[XBUFSIZE];
  443. char *xoutbuf[XBUFSIZE];
  444. char *axbuf[XBUFSIZE];
  445. unsigned int *b_size;
  446. unsigned int iv_len;
  447. struct crypto_wait wait;
  448. iv = kzalloc(MAX_IVLEN, GFP_KERNEL);
  449. if (!iv)
  450. return;
  451. if (aad_size >= PAGE_SIZE) {
  452. pr_err("associate data length (%u) too big\n", aad_size);
  453. goto out_noxbuf;
  454. }
  455. if (enc == ENCRYPT)
  456. e = "encryption";
  457. else
  458. e = "decryption";
  459. if (testmgr_alloc_buf(xbuf))
  460. goto out_noxbuf;
  461. if (testmgr_alloc_buf(axbuf))
  462. goto out_noaxbuf;
  463. if (testmgr_alloc_buf(xoutbuf))
  464. goto out_nooutbuf;
  465. sg = kmalloc(sizeof(*sg) * 9 * 2, GFP_KERNEL);
  466. if (!sg)
  467. goto out_nosg;
  468. sgout = &sg[9];
  469. tfm = crypto_alloc_aead(algo, 0, 0);
  470. if (IS_ERR(tfm)) {
  471. pr_err("alg: aead: Failed to load transform for %s: %ld\n", algo,
  472. PTR_ERR(tfm));
  473. goto out_notfm;
  474. }
  475. crypto_init_wait(&wait);
  476. printk(KERN_INFO "\ntesting speed of %s (%s) %s\n", algo,
  477. get_driver_name(crypto_aead, tfm), e);
  478. req = aead_request_alloc(tfm, GFP_KERNEL);
  479. if (!req) {
  480. pr_err("alg: aead: Failed to allocate request for %s\n",
  481. algo);
  482. goto out_noreq;
  483. }
  484. aead_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
  485. crypto_req_done, &wait);
  486. i = 0;
  487. do {
  488. b_size = aead_sizes;
  489. do {
  490. assoc = axbuf[0];
  491. memset(assoc, 0xff, aad_size);
  492. if ((*keysize + *b_size) > TVMEMSIZE * PAGE_SIZE) {
  493. pr_err("template (%u) too big for tvmem (%lu)\n",
  494. *keysize + *b_size,
  495. TVMEMSIZE * PAGE_SIZE);
  496. goto out;
  497. }
  498. key = tvmem[0];
  499. for (j = 0; j < tcount; j++) {
  500. if (template[j].klen == *keysize) {
  501. key = template[j].key;
  502. break;
  503. }
  504. }
  505. ret = crypto_aead_setkey(tfm, key, *keysize);
  506. ret = crypto_aead_setauthsize(tfm, authsize);
  507. iv_len = crypto_aead_ivsize(tfm);
  508. if (iv_len)
  509. memset(iv, 0xff, iv_len);
  510. crypto_aead_clear_flags(tfm, ~0);
  511. printk(KERN_INFO "test %u (%d bit key, %d byte blocks): ",
  512. i, *keysize * 8, *b_size);
  513. memset(tvmem[0], 0xff, PAGE_SIZE);
  514. if (ret) {
  515. pr_err("setkey() failed flags=%x\n",
  516. crypto_aead_get_flags(tfm));
  517. goto out;
  518. }
  519. sg_init_aead(sg, xbuf, *b_size + (enc ? 0 : authsize),
  520. assoc, aad_size);
  521. sg_init_aead(sgout, xoutbuf,
  522. *b_size + (enc ? authsize : 0), assoc,
  523. aad_size);
  524. aead_request_set_ad(req, aad_size);
  525. if (!enc) {
  526. /*
  527. * For decryption we need a proper auth so
  528. * we do the encryption path once with buffers
  529. * reversed (input <-> output) to calculate it
  530. */
  531. aead_request_set_crypt(req, sgout, sg,
  532. *b_size, iv);
  533. ret = do_one_aead_op(req,
  534. crypto_aead_encrypt(req));
  535. if (ret) {
  536. pr_err("calculating auth failed failed (%d)\n",
  537. ret);
  538. break;
  539. }
  540. }
  541. aead_request_set_crypt(req, sg, sgout,
  542. *b_size + (enc ? 0 : authsize),
  543. iv);
  544. if (secs) {
  545. ret = test_aead_jiffies(req, enc, *b_size,
  546. secs);
  547. cond_resched();
  548. } else {
  549. ret = test_aead_cycles(req, enc, *b_size);
  550. }
  551. if (ret) {
  552. pr_err("%s() failed return code=%d\n", e, ret);
  553. break;
  554. }
  555. b_size++;
  556. i++;
  557. } while (*b_size);
  558. keysize++;
  559. } while (*keysize);
  560. out:
  561. aead_request_free(req);
  562. out_noreq:
  563. crypto_free_aead(tfm);
  564. out_notfm:
  565. kfree(sg);
  566. out_nosg:
  567. testmgr_free_buf(xoutbuf);
  568. out_nooutbuf:
  569. testmgr_free_buf(axbuf);
  570. out_noaxbuf:
  571. testmgr_free_buf(xbuf);
  572. out_noxbuf:
  573. kfree(iv);
  574. }
  575. static void test_hash_sg_init(struct scatterlist *sg)
  576. {
  577. int i;
  578. sg_init_table(sg, TVMEMSIZE);
  579. for (i = 0; i < TVMEMSIZE; i++) {
  580. sg_set_buf(sg + i, tvmem[i], PAGE_SIZE);
  581. memset(tvmem[i], 0xff, PAGE_SIZE);
  582. }
  583. }
  584. static inline int do_one_ahash_op(struct ahash_request *req, int ret)
  585. {
  586. struct crypto_wait *wait = req->base.data;
  587. return crypto_wait_req(ret, wait);
  588. }
  589. struct test_mb_ahash_data {
  590. struct scatterlist sg[XBUFSIZE];
  591. char result[64];
  592. struct ahash_request *req;
  593. struct crypto_wait wait;
  594. char *xbuf[XBUFSIZE];
  595. };
  596. static inline int do_mult_ahash_op(struct test_mb_ahash_data *data, u32 num_mb,
  597. int *rc)
  598. {
  599. int i, err = 0;
  600. /* Fire up a bunch of concurrent requests */
  601. for (i = 0; i < num_mb; i++)
  602. rc[i] = crypto_ahash_digest(data[i].req);
  603. /* Wait for all requests to finish */
  604. for (i = 0; i < num_mb; i++) {
  605. rc[i] = crypto_wait_req(rc[i], &data[i].wait);
  606. if (rc[i]) {
  607. pr_info("concurrent request %d error %d\n", i, rc[i]);
  608. err = rc[i];
  609. }
  610. }
  611. return err;
  612. }
  613. static int test_mb_ahash_jiffies(struct test_mb_ahash_data *data, int blen,
  614. int secs, u32 num_mb)
  615. {
  616. unsigned long start, end;
  617. int bcount;
  618. int ret = 0;
  619. int *rc;
  620. rc = kcalloc(num_mb, sizeof(*rc), GFP_KERNEL);
  621. if (!rc)
  622. return -ENOMEM;
  623. for (start = jiffies, end = start + secs * HZ, bcount = 0;
  624. time_before(jiffies, end); bcount++) {
  625. ret = do_mult_ahash_op(data, num_mb, rc);
  626. if (ret)
  627. goto out;
  628. }
  629. pr_cont("%d operations in %d seconds (%ld bytes)\n",
  630. bcount * num_mb, secs, (long)bcount * blen * num_mb);
  631. out:
  632. kfree(rc);
  633. return ret;
  634. }
  635. static int test_mb_ahash_cycles(struct test_mb_ahash_data *data, int blen,
  636. u32 num_mb)
  637. {
  638. unsigned long cycles = 0;
  639. int ret = 0;
  640. int i;
  641. int *rc;
  642. rc = kcalloc(num_mb, sizeof(*rc), GFP_KERNEL);
  643. if (!rc)
  644. return -ENOMEM;
  645. /* Warm-up run. */
  646. for (i = 0; i < 4; i++) {
  647. ret = do_mult_ahash_op(data, num_mb, rc);
  648. if (ret)
  649. goto out;
  650. }
  651. /* The real thing. */
  652. for (i = 0; i < 8; i++) {
  653. cycles_t start, end;
  654. start = get_cycles();
  655. ret = do_mult_ahash_op(data, num_mb, rc);
  656. end = get_cycles();
  657. if (ret)
  658. goto out;
  659. cycles += end - start;
  660. }
  661. pr_cont("1 operation in %lu cycles (%d bytes)\n",
  662. (cycles + 4) / (8 * num_mb), blen);
  663. out:
  664. kfree(rc);
  665. return ret;
  666. }
  667. static void test_mb_ahash_speed(const char *algo, unsigned int secs,
  668. struct hash_speed *speed, u32 num_mb)
  669. {
  670. struct test_mb_ahash_data *data;
  671. struct crypto_ahash *tfm;
  672. unsigned int i, j, k;
  673. int ret;
  674. data = kcalloc(num_mb, sizeof(*data), GFP_KERNEL);
  675. if (!data)
  676. return;
  677. tfm = crypto_alloc_ahash(algo, 0, 0);
  678. if (IS_ERR(tfm)) {
  679. pr_err("failed to load transform for %s: %ld\n",
  680. algo, PTR_ERR(tfm));
  681. goto free_data;
  682. }
  683. for (i = 0; i < num_mb; ++i) {
  684. if (testmgr_alloc_buf(data[i].xbuf))
  685. goto out;
  686. crypto_init_wait(&data[i].wait);
  687. data[i].req = ahash_request_alloc(tfm, GFP_KERNEL);
  688. if (!data[i].req) {
  689. pr_err("alg: hash: Failed to allocate request for %s\n",
  690. algo);
  691. goto out;
  692. }
  693. ahash_request_set_callback(data[i].req, 0, crypto_req_done,
  694. &data[i].wait);
  695. sg_init_table(data[i].sg, XBUFSIZE);
  696. for (j = 0; j < XBUFSIZE; j++) {
  697. sg_set_buf(data[i].sg + j, data[i].xbuf[j], PAGE_SIZE);
  698. memset(data[i].xbuf[j], 0xff, PAGE_SIZE);
  699. }
  700. }
  701. pr_info("\ntesting speed of multibuffer %s (%s)\n", algo,
  702. get_driver_name(crypto_ahash, tfm));
  703. for (i = 0; speed[i].blen != 0; i++) {
  704. /* For some reason this only tests digests. */
  705. if (speed[i].blen != speed[i].plen)
  706. continue;
  707. if (speed[i].blen > XBUFSIZE * PAGE_SIZE) {
  708. pr_err("template (%u) too big for tvmem (%lu)\n",
  709. speed[i].blen, XBUFSIZE * PAGE_SIZE);
  710. goto out;
  711. }
  712. if (speed[i].klen)
  713. crypto_ahash_setkey(tfm, tvmem[0], speed[i].klen);
  714. for (k = 0; k < num_mb; k++)
  715. ahash_request_set_crypt(data[k].req, data[k].sg,
  716. data[k].result, speed[i].blen);
  717. pr_info("test%3u "
  718. "(%5u byte blocks,%5u bytes per update,%4u updates): ",
  719. i, speed[i].blen, speed[i].plen,
  720. speed[i].blen / speed[i].plen);
  721. if (secs) {
  722. ret = test_mb_ahash_jiffies(data, speed[i].blen, secs,
  723. num_mb);
  724. cond_resched();
  725. } else {
  726. ret = test_mb_ahash_cycles(data, speed[i].blen, num_mb);
  727. }
  728. if (ret) {
  729. pr_err("At least one hashing failed ret=%d\n", ret);
  730. break;
  731. }
  732. }
  733. out:
  734. for (k = 0; k < num_mb; ++k)
  735. ahash_request_free(data[k].req);
  736. for (k = 0; k < num_mb; ++k)
  737. testmgr_free_buf(data[k].xbuf);
  738. crypto_free_ahash(tfm);
  739. free_data:
  740. kfree(data);
  741. }
  742. static int test_ahash_jiffies_digest(struct ahash_request *req, int blen,
  743. char *out, int secs)
  744. {
  745. unsigned long start, end;
  746. int bcount;
  747. int ret;
  748. for (start = jiffies, end = start + secs * HZ, bcount = 0;
  749. time_before(jiffies, end); bcount++) {
  750. ret = do_one_ahash_op(req, crypto_ahash_digest(req));
  751. if (ret)
  752. return ret;
  753. }
  754. printk("%6u opers/sec, %9lu bytes/sec\n",
  755. bcount / secs, ((long)bcount * blen) / secs);
  756. return 0;
  757. }
  758. static int test_ahash_jiffies(struct ahash_request *req, int blen,
  759. int plen, char *out, int secs)
  760. {
  761. unsigned long start, end;
  762. int bcount, pcount;
  763. int ret;
  764. if (plen == blen)
  765. return test_ahash_jiffies_digest(req, blen, out, secs);
  766. for (start = jiffies, end = start + secs * HZ, bcount = 0;
  767. time_before(jiffies, end); bcount++) {
  768. ret = do_one_ahash_op(req, crypto_ahash_init(req));
  769. if (ret)
  770. return ret;
  771. for (pcount = 0; pcount < blen; pcount += plen) {
  772. ret = do_one_ahash_op(req, crypto_ahash_update(req));
  773. if (ret)
  774. return ret;
  775. }
  776. /* we assume there is enough space in 'out' for the result */
  777. ret = do_one_ahash_op(req, crypto_ahash_final(req));
  778. if (ret)
  779. return ret;
  780. }
  781. pr_cont("%6u opers/sec, %9lu bytes/sec\n",
  782. bcount / secs, ((long)bcount * blen) / secs);
  783. return 0;
  784. }
  785. static int test_ahash_cycles_digest(struct ahash_request *req, int blen,
  786. char *out)
  787. {
  788. unsigned long cycles = 0;
  789. int ret, i;
  790. /* Warm-up run. */
  791. for (i = 0; i < 4; i++) {
  792. ret = do_one_ahash_op(req, crypto_ahash_digest(req));
  793. if (ret)
  794. goto out;
  795. }
  796. /* The real thing. */
  797. for (i = 0; i < 8; i++) {
  798. cycles_t start, end;
  799. start = get_cycles();
  800. ret = do_one_ahash_op(req, crypto_ahash_digest(req));
  801. if (ret)
  802. goto out;
  803. end = get_cycles();
  804. cycles += end - start;
  805. }
  806. out:
  807. if (ret)
  808. return ret;
  809. pr_cont("%6lu cycles/operation, %4lu cycles/byte\n",
  810. cycles / 8, cycles / (8 * blen));
  811. return 0;
  812. }
  813. static int test_ahash_cycles(struct ahash_request *req, int blen,
  814. int plen, char *out)
  815. {
  816. unsigned long cycles = 0;
  817. int i, pcount, ret;
  818. if (plen == blen)
  819. return test_ahash_cycles_digest(req, blen, out);
  820. /* Warm-up run. */
  821. for (i = 0; i < 4; i++) {
  822. ret = do_one_ahash_op(req, crypto_ahash_init(req));
  823. if (ret)
  824. goto out;
  825. for (pcount = 0; pcount < blen; pcount += plen) {
  826. ret = do_one_ahash_op(req, crypto_ahash_update(req));
  827. if (ret)
  828. goto out;
  829. }
  830. ret = do_one_ahash_op(req, crypto_ahash_final(req));
  831. if (ret)
  832. goto out;
  833. }
  834. /* The real thing. */
  835. for (i = 0; i < 8; i++) {
  836. cycles_t start, end;
  837. start = get_cycles();
  838. ret = do_one_ahash_op(req, crypto_ahash_init(req));
  839. if (ret)
  840. goto out;
  841. for (pcount = 0; pcount < blen; pcount += plen) {
  842. ret = do_one_ahash_op(req, crypto_ahash_update(req));
  843. if (ret)
  844. goto out;
  845. }
  846. ret = do_one_ahash_op(req, crypto_ahash_final(req));
  847. if (ret)
  848. goto out;
  849. end = get_cycles();
  850. cycles += end - start;
  851. }
  852. out:
  853. if (ret)
  854. return ret;
  855. pr_cont("%6lu cycles/operation, %4lu cycles/byte\n",
  856. cycles / 8, cycles / (8 * blen));
  857. return 0;
  858. }
  859. static void test_ahash_speed_common(const char *algo, unsigned int secs,
  860. struct hash_speed *speed, unsigned mask)
  861. {
  862. struct scatterlist sg[TVMEMSIZE];
  863. struct crypto_wait wait;
  864. struct ahash_request *req;
  865. struct crypto_ahash *tfm;
  866. char *output;
  867. int i, ret;
  868. tfm = crypto_alloc_ahash(algo, 0, mask);
  869. if (IS_ERR(tfm)) {
  870. pr_err("failed to load transform for %s: %ld\n",
  871. algo, PTR_ERR(tfm));
  872. return;
  873. }
  874. printk(KERN_INFO "\ntesting speed of async %s (%s)\n", algo,
  875. get_driver_name(crypto_ahash, tfm));
  876. if (crypto_ahash_digestsize(tfm) > MAX_DIGEST_SIZE) {
  877. pr_err("digestsize(%u) > %d\n", crypto_ahash_digestsize(tfm),
  878. MAX_DIGEST_SIZE);
  879. goto out;
  880. }
  881. test_hash_sg_init(sg);
  882. req = ahash_request_alloc(tfm, GFP_KERNEL);
  883. if (!req) {
  884. pr_err("ahash request allocation failure\n");
  885. goto out;
  886. }
  887. crypto_init_wait(&wait);
  888. ahash_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
  889. crypto_req_done, &wait);
  890. output = kmalloc(MAX_DIGEST_SIZE, GFP_KERNEL);
  891. if (!output)
  892. goto out_nomem;
  893. for (i = 0; speed[i].blen != 0; i++) {
  894. if (speed[i].blen > TVMEMSIZE * PAGE_SIZE) {
  895. pr_err("template (%u) too big for tvmem (%lu)\n",
  896. speed[i].blen, TVMEMSIZE * PAGE_SIZE);
  897. break;
  898. }
  899. pr_info("test%3u "
  900. "(%5u byte blocks,%5u bytes per update,%4u updates): ",
  901. i, speed[i].blen, speed[i].plen, speed[i].blen / speed[i].plen);
  902. ahash_request_set_crypt(req, sg, output, speed[i].plen);
  903. if (secs) {
  904. ret = test_ahash_jiffies(req, speed[i].blen,
  905. speed[i].plen, output, secs);
  906. cond_resched();
  907. } else {
  908. ret = test_ahash_cycles(req, speed[i].blen,
  909. speed[i].plen, output);
  910. }
  911. if (ret) {
  912. pr_err("hashing failed ret=%d\n", ret);
  913. break;
  914. }
  915. }
  916. kfree(output);
  917. out_nomem:
  918. ahash_request_free(req);
  919. out:
  920. crypto_free_ahash(tfm);
  921. }
  922. static void test_ahash_speed(const char *algo, unsigned int secs,
  923. struct hash_speed *speed)
  924. {
  925. return test_ahash_speed_common(algo, secs, speed, 0);
  926. }
  927. static void test_hash_speed(const char *algo, unsigned int secs,
  928. struct hash_speed *speed)
  929. {
  930. return test_ahash_speed_common(algo, secs, speed, CRYPTO_ALG_ASYNC);
  931. }
  932. struct test_mb_skcipher_data {
  933. struct scatterlist sg[XBUFSIZE];
  934. struct skcipher_request *req;
  935. struct crypto_wait wait;
  936. char *xbuf[XBUFSIZE];
  937. };
  938. static int do_mult_acipher_op(struct test_mb_skcipher_data *data, int enc,
  939. u32 num_mb, int *rc)
  940. {
  941. int i, err = 0;
  942. /* Fire up a bunch of concurrent requests */
  943. for (i = 0; i < num_mb; i++) {
  944. if (enc == ENCRYPT)
  945. rc[i] = crypto_skcipher_encrypt(data[i].req);
  946. else
  947. rc[i] = crypto_skcipher_decrypt(data[i].req);
  948. }
  949. /* Wait for all requests to finish */
  950. for (i = 0; i < num_mb; i++) {
  951. rc[i] = crypto_wait_req(rc[i], &data[i].wait);
  952. if (rc[i]) {
  953. pr_info("concurrent request %d error %d\n", i, rc[i]);
  954. err = rc[i];
  955. }
  956. }
  957. return err;
  958. }
  959. static int test_mb_acipher_jiffies(struct test_mb_skcipher_data *data, int enc,
  960. int blen, int secs, u32 num_mb)
  961. {
  962. unsigned long start, end;
  963. int bcount;
  964. int ret = 0;
  965. int *rc;
  966. rc = kcalloc(num_mb, sizeof(*rc), GFP_KERNEL);
  967. if (!rc)
  968. return -ENOMEM;
  969. for (start = jiffies, end = start + secs * HZ, bcount = 0;
  970. time_before(jiffies, end); bcount++) {
  971. ret = do_mult_acipher_op(data, enc, num_mb, rc);
  972. if (ret)
  973. goto out;
  974. }
  975. pr_cont("%d operations in %d seconds (%ld bytes)\n",
  976. bcount * num_mb, secs, (long)bcount * blen * num_mb);
  977. out:
  978. kfree(rc);
  979. return ret;
  980. }
  981. static int test_mb_acipher_cycles(struct test_mb_skcipher_data *data, int enc,
  982. int blen, u32 num_mb)
  983. {
  984. unsigned long cycles = 0;
  985. int ret = 0;
  986. int i;
  987. int *rc;
  988. rc = kcalloc(num_mb, sizeof(*rc), GFP_KERNEL);
  989. if (!rc)
  990. return -ENOMEM;
  991. /* Warm-up run. */
  992. for (i = 0; i < 4; i++) {
  993. ret = do_mult_acipher_op(data, enc, num_mb, rc);
  994. if (ret)
  995. goto out;
  996. }
  997. /* The real thing. */
  998. for (i = 0; i < 8; i++) {
  999. cycles_t start, end;
  1000. start = get_cycles();
  1001. ret = do_mult_acipher_op(data, enc, num_mb, rc);
  1002. end = get_cycles();
  1003. if (ret)
  1004. goto out;
  1005. cycles += end - start;
  1006. }
  1007. pr_cont("1 operation in %lu cycles (%d bytes)\n",
  1008. (cycles + 4) / (8 * num_mb), blen);
  1009. out:
  1010. kfree(rc);
  1011. return ret;
  1012. }
  1013. static void test_mb_skcipher_speed(const char *algo, int enc, int secs,
  1014. struct cipher_speed_template *template,
  1015. unsigned int tcount, u8 *keysize, u32 num_mb)
  1016. {
  1017. struct test_mb_skcipher_data *data;
  1018. struct crypto_skcipher *tfm;
  1019. unsigned int i, j, iv_len;
  1020. const char *key;
  1021. const char *e;
  1022. u32 *b_size;
  1023. char iv[128];
  1024. int ret;
  1025. if (enc == ENCRYPT)
  1026. e = "encryption";
  1027. else
  1028. e = "decryption";
  1029. data = kcalloc(num_mb, sizeof(*data), GFP_KERNEL);
  1030. if (!data)
  1031. return;
  1032. tfm = crypto_alloc_skcipher(algo, 0, 0);
  1033. if (IS_ERR(tfm)) {
  1034. pr_err("failed to load transform for %s: %ld\n",
  1035. algo, PTR_ERR(tfm));
  1036. goto out_free_data;
  1037. }
  1038. for (i = 0; i < num_mb; ++i)
  1039. if (testmgr_alloc_buf(data[i].xbuf)) {
  1040. while (i--)
  1041. testmgr_free_buf(data[i].xbuf);
  1042. goto out_free_tfm;
  1043. }
  1044. for (i = 0; i < num_mb; ++i)
  1045. if (testmgr_alloc_buf(data[i].xbuf)) {
  1046. while (i--)
  1047. testmgr_free_buf(data[i].xbuf);
  1048. goto out_free_tfm;
  1049. }
  1050. for (i = 0; i < num_mb; ++i) {
  1051. data[i].req = skcipher_request_alloc(tfm, GFP_KERNEL);
  1052. if (!data[i].req) {
  1053. pr_err("alg: skcipher: Failed to allocate request for %s\n",
  1054. algo);
  1055. while (i--)
  1056. skcipher_request_free(data[i].req);
  1057. goto out_free_xbuf;
  1058. }
  1059. }
  1060. for (i = 0; i < num_mb; ++i) {
  1061. skcipher_request_set_callback(data[i].req,
  1062. CRYPTO_TFM_REQ_MAY_BACKLOG,
  1063. crypto_req_done, &data[i].wait);
  1064. crypto_init_wait(&data[i].wait);
  1065. }
  1066. pr_info("\ntesting speed of multibuffer %s (%s) %s\n", algo,
  1067. get_driver_name(crypto_skcipher, tfm), e);
  1068. i = 0;
  1069. do {
  1070. b_size = block_sizes;
  1071. do {
  1072. if (*b_size > XBUFSIZE * PAGE_SIZE) {
  1073. pr_err("template (%u) too big for buffer (%lu)\n",
  1074. *b_size, XBUFSIZE * PAGE_SIZE);
  1075. goto out;
  1076. }
  1077. pr_info("test %u (%d bit key, %d byte blocks): ", i,
  1078. *keysize * 8, *b_size);
  1079. /* Set up tfm global state, i.e. the key */
  1080. memset(tvmem[0], 0xff, PAGE_SIZE);
  1081. key = tvmem[0];
  1082. for (j = 0; j < tcount; j++) {
  1083. if (template[j].klen == *keysize) {
  1084. key = template[j].key;
  1085. break;
  1086. }
  1087. }
  1088. crypto_skcipher_clear_flags(tfm, ~0);
  1089. ret = crypto_skcipher_setkey(tfm, key, *keysize);
  1090. if (ret) {
  1091. pr_err("setkey() failed flags=%x\n",
  1092. crypto_skcipher_get_flags(tfm));
  1093. goto out;
  1094. }
  1095. iv_len = crypto_skcipher_ivsize(tfm);
  1096. if (iv_len)
  1097. memset(&iv, 0xff, iv_len);
  1098. /* Now setup per request stuff, i.e. buffers */
  1099. for (j = 0; j < num_mb; ++j) {
  1100. struct test_mb_skcipher_data *cur = &data[j];
  1101. unsigned int k = *b_size;
  1102. unsigned int pages = DIV_ROUND_UP(k, PAGE_SIZE);
  1103. unsigned int p = 0;
  1104. sg_init_table(cur->sg, pages);
  1105. while (k > PAGE_SIZE) {
  1106. sg_set_buf(cur->sg + p, cur->xbuf[p],
  1107. PAGE_SIZE);
  1108. memset(cur->xbuf[p], 0xff, PAGE_SIZE);
  1109. p++;
  1110. k -= PAGE_SIZE;
  1111. }
  1112. sg_set_buf(cur->sg + p, cur->xbuf[p], k);
  1113. memset(cur->xbuf[p], 0xff, k);
  1114. skcipher_request_set_crypt(cur->req, cur->sg,
  1115. cur->sg, *b_size,
  1116. iv);
  1117. }
  1118. if (secs) {
  1119. ret = test_mb_acipher_jiffies(data, enc,
  1120. *b_size, secs,
  1121. num_mb);
  1122. cond_resched();
  1123. } else {
  1124. ret = test_mb_acipher_cycles(data, enc,
  1125. *b_size, num_mb);
  1126. }
  1127. if (ret) {
  1128. pr_err("%s() failed flags=%x\n", e,
  1129. crypto_skcipher_get_flags(tfm));
  1130. break;
  1131. }
  1132. b_size++;
  1133. i++;
  1134. } while (*b_size);
  1135. keysize++;
  1136. } while (*keysize);
  1137. out:
  1138. for (i = 0; i < num_mb; ++i)
  1139. skcipher_request_free(data[i].req);
  1140. out_free_xbuf:
  1141. for (i = 0; i < num_mb; ++i)
  1142. testmgr_free_buf(data[i].xbuf);
  1143. out_free_tfm:
  1144. crypto_free_skcipher(tfm);
  1145. out_free_data:
  1146. kfree(data);
  1147. }
  1148. static inline int do_one_acipher_op(struct skcipher_request *req, int ret)
  1149. {
  1150. struct crypto_wait *wait = req->base.data;
  1151. return crypto_wait_req(ret, wait);
  1152. }
  1153. static int test_acipher_jiffies(struct skcipher_request *req, int enc,
  1154. int blen, int secs)
  1155. {
  1156. unsigned long start, end;
  1157. int bcount;
  1158. int ret;
  1159. for (start = jiffies, end = start + secs * HZ, bcount = 0;
  1160. time_before(jiffies, end); bcount++) {
  1161. if (enc)
  1162. ret = do_one_acipher_op(req,
  1163. crypto_skcipher_encrypt(req));
  1164. else
  1165. ret = do_one_acipher_op(req,
  1166. crypto_skcipher_decrypt(req));
  1167. if (ret)
  1168. return ret;
  1169. }
  1170. pr_cont("%d operations in %d seconds (%ld bytes)\n",
  1171. bcount, secs, (long)bcount * blen);
  1172. return 0;
  1173. }
  1174. static int test_acipher_cycles(struct skcipher_request *req, int enc,
  1175. int blen)
  1176. {
  1177. unsigned long cycles = 0;
  1178. int ret = 0;
  1179. int i;
  1180. /* Warm-up run. */
  1181. for (i = 0; i < 4; i++) {
  1182. if (enc)
  1183. ret = do_one_acipher_op(req,
  1184. crypto_skcipher_encrypt(req));
  1185. else
  1186. ret = do_one_acipher_op(req,
  1187. crypto_skcipher_decrypt(req));
  1188. if (ret)
  1189. goto out;
  1190. }
  1191. /* The real thing. */
  1192. for (i = 0; i < 8; i++) {
  1193. cycles_t start, end;
  1194. start = get_cycles();
  1195. if (enc)
  1196. ret = do_one_acipher_op(req,
  1197. crypto_skcipher_encrypt(req));
  1198. else
  1199. ret = do_one_acipher_op(req,
  1200. crypto_skcipher_decrypt(req));
  1201. end = get_cycles();
  1202. if (ret)
  1203. goto out;
  1204. cycles += end - start;
  1205. }
  1206. out:
  1207. if (ret == 0)
  1208. pr_cont("1 operation in %lu cycles (%d bytes)\n",
  1209. (cycles + 4) / 8, blen);
  1210. return ret;
  1211. }
  1212. static void test_skcipher_speed(const char *algo, int enc, unsigned int secs,
  1213. struct cipher_speed_template *template,
  1214. unsigned int tcount, u8 *keysize, bool async)
  1215. {
  1216. unsigned int ret, i, j, k, iv_len;
  1217. struct crypto_wait wait;
  1218. const char *key;
  1219. char iv[128];
  1220. struct skcipher_request *req;
  1221. struct crypto_skcipher *tfm;
  1222. const char *e;
  1223. u32 *b_size;
  1224. if (enc == ENCRYPT)
  1225. e = "encryption";
  1226. else
  1227. e = "decryption";
  1228. crypto_init_wait(&wait);
  1229. tfm = crypto_alloc_skcipher(algo, 0, async ? 0 : CRYPTO_ALG_ASYNC);
  1230. if (IS_ERR(tfm)) {
  1231. pr_err("failed to load transform for %s: %ld\n", algo,
  1232. PTR_ERR(tfm));
  1233. return;
  1234. }
  1235. pr_info("\ntesting speed of async %s (%s) %s\n", algo,
  1236. get_driver_name(crypto_skcipher, tfm), e);
  1237. req = skcipher_request_alloc(tfm, GFP_KERNEL);
  1238. if (!req) {
  1239. pr_err("tcrypt: skcipher: Failed to allocate request for %s\n",
  1240. algo);
  1241. goto out;
  1242. }
  1243. skcipher_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
  1244. crypto_req_done, &wait);
  1245. i = 0;
  1246. do {
  1247. b_size = block_sizes;
  1248. do {
  1249. struct scatterlist sg[TVMEMSIZE];
  1250. if ((*keysize + *b_size) > TVMEMSIZE * PAGE_SIZE) {
  1251. pr_err("template (%u) too big for "
  1252. "tvmem (%lu)\n", *keysize + *b_size,
  1253. TVMEMSIZE * PAGE_SIZE);
  1254. goto out_free_req;
  1255. }
  1256. pr_info("test %u (%d bit key, %d byte blocks): ", i,
  1257. *keysize * 8, *b_size);
  1258. memset(tvmem[0], 0xff, PAGE_SIZE);
  1259. /* set key, plain text and IV */
  1260. key = tvmem[0];
  1261. for (j = 0; j < tcount; j++) {
  1262. if (template[j].klen == *keysize) {
  1263. key = template[j].key;
  1264. break;
  1265. }
  1266. }
  1267. crypto_skcipher_clear_flags(tfm, ~0);
  1268. ret = crypto_skcipher_setkey(tfm, key, *keysize);
  1269. if (ret) {
  1270. pr_err("setkey() failed flags=%x\n",
  1271. crypto_skcipher_get_flags(tfm));
  1272. goto out_free_req;
  1273. }
  1274. k = *keysize + *b_size;
  1275. sg_init_table(sg, DIV_ROUND_UP(k, PAGE_SIZE));
  1276. if (k > PAGE_SIZE) {
  1277. sg_set_buf(sg, tvmem[0] + *keysize,
  1278. PAGE_SIZE - *keysize);
  1279. k -= PAGE_SIZE;
  1280. j = 1;
  1281. while (k > PAGE_SIZE) {
  1282. sg_set_buf(sg + j, tvmem[j], PAGE_SIZE);
  1283. memset(tvmem[j], 0xff, PAGE_SIZE);
  1284. j++;
  1285. k -= PAGE_SIZE;
  1286. }
  1287. sg_set_buf(sg + j, tvmem[j], k);
  1288. memset(tvmem[j], 0xff, k);
  1289. } else {
  1290. sg_set_buf(sg, tvmem[0] + *keysize, *b_size);
  1291. }
  1292. iv_len = crypto_skcipher_ivsize(tfm);
  1293. if (iv_len)
  1294. memset(&iv, 0xff, iv_len);
  1295. skcipher_request_set_crypt(req, sg, sg, *b_size, iv);
  1296. if (secs) {
  1297. ret = test_acipher_jiffies(req, enc,
  1298. *b_size, secs);
  1299. cond_resched();
  1300. } else {
  1301. ret = test_acipher_cycles(req, enc,
  1302. *b_size);
  1303. }
  1304. if (ret) {
  1305. pr_err("%s() failed flags=%x\n", e,
  1306. crypto_skcipher_get_flags(tfm));
  1307. break;
  1308. }
  1309. b_size++;
  1310. i++;
  1311. } while (*b_size);
  1312. keysize++;
  1313. } while (*keysize);
  1314. out_free_req:
  1315. skcipher_request_free(req);
  1316. out:
  1317. crypto_free_skcipher(tfm);
  1318. }
  1319. static void test_acipher_speed(const char *algo, int enc, unsigned int secs,
  1320. struct cipher_speed_template *template,
  1321. unsigned int tcount, u8 *keysize)
  1322. {
  1323. return test_skcipher_speed(algo, enc, secs, template, tcount, keysize,
  1324. true);
  1325. }
  1326. static void test_cipher_speed(const char *algo, int enc, unsigned int secs,
  1327. struct cipher_speed_template *template,
  1328. unsigned int tcount, u8 *keysize)
  1329. {
  1330. return test_skcipher_speed(algo, enc, secs, template, tcount, keysize,
  1331. false);
  1332. }
  1333. static void test_available(void)
  1334. {
  1335. char **name = check;
  1336. while (*name) {
  1337. printk("alg %s ", *name);
  1338. printk(crypto_has_alg(*name, 0, 0) ?
  1339. "found\n" : "not found\n");
  1340. name++;
  1341. }
  1342. }
  1343. static inline int tcrypt_test(const char *alg)
  1344. {
  1345. int ret;
  1346. pr_debug("testing %s\n", alg);
  1347. ret = alg_test(alg, alg, 0, 0);
  1348. /* non-fips algs return -EINVAL in fips mode */
  1349. if (fips_enabled && ret == -EINVAL)
  1350. ret = 0;
  1351. return ret;
  1352. }
  1353. static int do_test(const char *alg, u32 type, u32 mask, int m, u32 num_mb)
  1354. {
  1355. int i;
  1356. int ret = 0;
  1357. switch (m) {
  1358. case 0:
  1359. if (alg) {
  1360. if (!crypto_has_alg(alg, type,
  1361. mask ?: CRYPTO_ALG_TYPE_MASK))
  1362. ret = -ENOENT;
  1363. break;
  1364. }
  1365. for (i = 1; i < 200; i++)
  1366. ret += do_test(NULL, 0, 0, i, num_mb);
  1367. break;
  1368. case 1:
  1369. ret += tcrypt_test("md5");
  1370. break;
  1371. case 2:
  1372. ret += tcrypt_test("sha1");
  1373. break;
  1374. case 3:
  1375. ret += tcrypt_test("ecb(des)");
  1376. ret += tcrypt_test("cbc(des)");
  1377. ret += tcrypt_test("ctr(des)");
  1378. break;
  1379. case 4:
  1380. ret += tcrypt_test("ecb(des3_ede)");
  1381. ret += tcrypt_test("cbc(des3_ede)");
  1382. ret += tcrypt_test("ctr(des3_ede)");
  1383. break;
  1384. case 5:
  1385. ret += tcrypt_test("md4");
  1386. break;
  1387. case 6:
  1388. ret += tcrypt_test("sha256");
  1389. break;
  1390. case 7:
  1391. ret += tcrypt_test("ecb(blowfish)");
  1392. ret += tcrypt_test("cbc(blowfish)");
  1393. ret += tcrypt_test("ctr(blowfish)");
  1394. break;
  1395. case 8:
  1396. ret += tcrypt_test("ecb(twofish)");
  1397. ret += tcrypt_test("cbc(twofish)");
  1398. ret += tcrypt_test("ctr(twofish)");
  1399. ret += tcrypt_test("lrw(twofish)");
  1400. ret += tcrypt_test("xts(twofish)");
  1401. break;
  1402. case 9:
  1403. ret += tcrypt_test("ecb(serpent)");
  1404. ret += tcrypt_test("cbc(serpent)");
  1405. ret += tcrypt_test("ctr(serpent)");
  1406. ret += tcrypt_test("lrw(serpent)");
  1407. ret += tcrypt_test("xts(serpent)");
  1408. break;
  1409. case 10:
  1410. ret += tcrypt_test("ecb(aes)");
  1411. ret += tcrypt_test("cbc(aes)");
  1412. ret += tcrypt_test("lrw(aes)");
  1413. ret += tcrypt_test("xts(aes)");
  1414. ret += tcrypt_test("ctr(aes)");
  1415. ret += tcrypt_test("rfc3686(ctr(aes))");
  1416. break;
  1417. case 11:
  1418. ret += tcrypt_test("sha384");
  1419. break;
  1420. case 12:
  1421. ret += tcrypt_test("sha512");
  1422. break;
  1423. case 13:
  1424. ret += tcrypt_test("deflate");
  1425. break;
  1426. case 14:
  1427. ret += tcrypt_test("ecb(cast5)");
  1428. ret += tcrypt_test("cbc(cast5)");
  1429. ret += tcrypt_test("ctr(cast5)");
  1430. break;
  1431. case 15:
  1432. ret += tcrypt_test("ecb(cast6)");
  1433. ret += tcrypt_test("cbc(cast6)");
  1434. ret += tcrypt_test("ctr(cast6)");
  1435. ret += tcrypt_test("lrw(cast6)");
  1436. ret += tcrypt_test("xts(cast6)");
  1437. break;
  1438. case 16:
  1439. ret += tcrypt_test("ecb(arc4)");
  1440. break;
  1441. case 17:
  1442. ret += tcrypt_test("michael_mic");
  1443. break;
  1444. case 18:
  1445. ret += tcrypt_test("crc32c");
  1446. break;
  1447. case 19:
  1448. ret += tcrypt_test("ecb(tea)");
  1449. break;
  1450. case 20:
  1451. ret += tcrypt_test("ecb(xtea)");
  1452. break;
  1453. case 21:
  1454. ret += tcrypt_test("ecb(khazad)");
  1455. break;
  1456. case 22:
  1457. ret += tcrypt_test("wp512");
  1458. break;
  1459. case 23:
  1460. ret += tcrypt_test("wp384");
  1461. break;
  1462. case 24:
  1463. ret += tcrypt_test("wp256");
  1464. break;
  1465. case 25:
  1466. ret += tcrypt_test("ecb(tnepres)");
  1467. break;
  1468. case 26:
  1469. ret += tcrypt_test("ecb(anubis)");
  1470. ret += tcrypt_test("cbc(anubis)");
  1471. break;
  1472. case 27:
  1473. ret += tcrypt_test("tgr192");
  1474. break;
  1475. case 28:
  1476. ret += tcrypt_test("tgr160");
  1477. break;
  1478. case 29:
  1479. ret += tcrypt_test("tgr128");
  1480. break;
  1481. case 30:
  1482. ret += tcrypt_test("ecb(xeta)");
  1483. break;
  1484. case 31:
  1485. ret += tcrypt_test("pcbc(fcrypt)");
  1486. break;
  1487. case 32:
  1488. ret += tcrypt_test("ecb(camellia)");
  1489. ret += tcrypt_test("cbc(camellia)");
  1490. ret += tcrypt_test("ctr(camellia)");
  1491. ret += tcrypt_test("lrw(camellia)");
  1492. ret += tcrypt_test("xts(camellia)");
  1493. break;
  1494. case 33:
  1495. ret += tcrypt_test("sha224");
  1496. break;
  1497. case 34:
  1498. ret += tcrypt_test("salsa20");
  1499. break;
  1500. case 35:
  1501. ret += tcrypt_test("gcm(aes)");
  1502. break;
  1503. case 36:
  1504. ret += tcrypt_test("lzo");
  1505. break;
  1506. case 37:
  1507. ret += tcrypt_test("ccm(aes)");
  1508. break;
  1509. case 38:
  1510. ret += tcrypt_test("cts(cbc(aes))");
  1511. break;
  1512. case 39:
  1513. ret += tcrypt_test("rmd128");
  1514. break;
  1515. case 40:
  1516. ret += tcrypt_test("rmd160");
  1517. break;
  1518. case 41:
  1519. ret += tcrypt_test("rmd256");
  1520. break;
  1521. case 42:
  1522. ret += tcrypt_test("rmd320");
  1523. break;
  1524. case 43:
  1525. ret += tcrypt_test("ecb(seed)");
  1526. break;
  1527. case 44:
  1528. ret += tcrypt_test("zlib");
  1529. break;
  1530. case 45:
  1531. ret += tcrypt_test("rfc4309(ccm(aes))");
  1532. break;
  1533. case 46:
  1534. ret += tcrypt_test("ghash");
  1535. break;
  1536. case 47:
  1537. ret += tcrypt_test("crct10dif");
  1538. break;
  1539. case 48:
  1540. ret += tcrypt_test("sha3-224");
  1541. break;
  1542. case 49:
  1543. ret += tcrypt_test("sha3-256");
  1544. break;
  1545. case 50:
  1546. ret += tcrypt_test("sha3-384");
  1547. break;
  1548. case 51:
  1549. ret += tcrypt_test("sha3-512");
  1550. break;
  1551. case 52:
  1552. ret += tcrypt_test("sm3");
  1553. break;
  1554. case 100:
  1555. ret += tcrypt_test("hmac(md5)");
  1556. break;
  1557. case 101:
  1558. ret += tcrypt_test("hmac(sha1)");
  1559. break;
  1560. case 102:
  1561. ret += tcrypt_test("hmac(sha256)");
  1562. break;
  1563. case 103:
  1564. ret += tcrypt_test("hmac(sha384)");
  1565. break;
  1566. case 104:
  1567. ret += tcrypt_test("hmac(sha512)");
  1568. break;
  1569. case 105:
  1570. ret += tcrypt_test("hmac(sha224)");
  1571. break;
  1572. case 106:
  1573. ret += tcrypt_test("xcbc(aes)");
  1574. break;
  1575. case 107:
  1576. ret += tcrypt_test("hmac(rmd128)");
  1577. break;
  1578. case 108:
  1579. ret += tcrypt_test("hmac(rmd160)");
  1580. break;
  1581. case 109:
  1582. ret += tcrypt_test("vmac64(aes)");
  1583. break;
  1584. case 111:
  1585. ret += tcrypt_test("hmac(sha3-224)");
  1586. break;
  1587. case 112:
  1588. ret += tcrypt_test("hmac(sha3-256)");
  1589. break;
  1590. case 113:
  1591. ret += tcrypt_test("hmac(sha3-384)");
  1592. break;
  1593. case 114:
  1594. ret += tcrypt_test("hmac(sha3-512)");
  1595. break;
  1596. case 150:
  1597. ret += tcrypt_test("ansi_cprng");
  1598. break;
  1599. case 151:
  1600. ret += tcrypt_test("rfc4106(gcm(aes))");
  1601. break;
  1602. case 152:
  1603. ret += tcrypt_test("rfc4543(gcm(aes))");
  1604. break;
  1605. case 153:
  1606. ret += tcrypt_test("cmac(aes)");
  1607. break;
  1608. case 154:
  1609. ret += tcrypt_test("cmac(des3_ede)");
  1610. break;
  1611. case 155:
  1612. ret += tcrypt_test("authenc(hmac(sha1),cbc(aes))");
  1613. break;
  1614. case 156:
  1615. ret += tcrypt_test("authenc(hmac(md5),ecb(cipher_null))");
  1616. break;
  1617. case 157:
  1618. ret += tcrypt_test("authenc(hmac(sha1),ecb(cipher_null))");
  1619. break;
  1620. case 181:
  1621. ret += tcrypt_test("authenc(hmac(sha1),cbc(des))");
  1622. break;
  1623. case 182:
  1624. ret += tcrypt_test("authenc(hmac(sha1),cbc(des3_ede))");
  1625. break;
  1626. case 183:
  1627. ret += tcrypt_test("authenc(hmac(sha224),cbc(des))");
  1628. break;
  1629. case 184:
  1630. ret += tcrypt_test("authenc(hmac(sha224),cbc(des3_ede))");
  1631. break;
  1632. case 185:
  1633. ret += tcrypt_test("authenc(hmac(sha256),cbc(des))");
  1634. break;
  1635. case 186:
  1636. ret += tcrypt_test("authenc(hmac(sha256),cbc(des3_ede))");
  1637. break;
  1638. case 187:
  1639. ret += tcrypt_test("authenc(hmac(sha384),cbc(des))");
  1640. break;
  1641. case 188:
  1642. ret += tcrypt_test("authenc(hmac(sha384),cbc(des3_ede))");
  1643. break;
  1644. case 189:
  1645. ret += tcrypt_test("authenc(hmac(sha512),cbc(des))");
  1646. break;
  1647. case 190:
  1648. ret += tcrypt_test("authenc(hmac(sha512),cbc(des3_ede))");
  1649. break;
  1650. case 191:
  1651. ret += tcrypt_test("ecb(sm4)");
  1652. break;
  1653. case 200:
  1654. test_cipher_speed("ecb(aes)", ENCRYPT, sec, NULL, 0,
  1655. speed_template_16_24_32);
  1656. test_cipher_speed("ecb(aes)", DECRYPT, sec, NULL, 0,
  1657. speed_template_16_24_32);
  1658. test_cipher_speed("cbc(aes)", ENCRYPT, sec, NULL, 0,
  1659. speed_template_16_24_32);
  1660. test_cipher_speed("cbc(aes)", DECRYPT, sec, NULL, 0,
  1661. speed_template_16_24_32);
  1662. test_cipher_speed("lrw(aes)", ENCRYPT, sec, NULL, 0,
  1663. speed_template_32_40_48);
  1664. test_cipher_speed("lrw(aes)", DECRYPT, sec, NULL, 0,
  1665. speed_template_32_40_48);
  1666. test_cipher_speed("xts(aes)", ENCRYPT, sec, NULL, 0,
  1667. speed_template_32_64);
  1668. test_cipher_speed("xts(aes)", DECRYPT, sec, NULL, 0,
  1669. speed_template_32_64);
  1670. test_cipher_speed("cts(cbc(aes))", ENCRYPT, sec, NULL, 0,
  1671. speed_template_16_24_32);
  1672. test_cipher_speed("cts(cbc(aes))", DECRYPT, sec, NULL, 0,
  1673. speed_template_16_24_32);
  1674. test_cipher_speed("ctr(aes)", ENCRYPT, sec, NULL, 0,
  1675. speed_template_16_24_32);
  1676. test_cipher_speed("ctr(aes)", DECRYPT, sec, NULL, 0,
  1677. speed_template_16_24_32);
  1678. break;
  1679. case 201:
  1680. test_cipher_speed("ecb(des3_ede)", ENCRYPT, sec,
  1681. des3_speed_template, DES3_SPEED_VECTORS,
  1682. speed_template_24);
  1683. test_cipher_speed("ecb(des3_ede)", DECRYPT, sec,
  1684. des3_speed_template, DES3_SPEED_VECTORS,
  1685. speed_template_24);
  1686. test_cipher_speed("cbc(des3_ede)", ENCRYPT, sec,
  1687. des3_speed_template, DES3_SPEED_VECTORS,
  1688. speed_template_24);
  1689. test_cipher_speed("cbc(des3_ede)", DECRYPT, sec,
  1690. des3_speed_template, DES3_SPEED_VECTORS,
  1691. speed_template_24);
  1692. test_cipher_speed("ctr(des3_ede)", ENCRYPT, sec,
  1693. des3_speed_template, DES3_SPEED_VECTORS,
  1694. speed_template_24);
  1695. test_cipher_speed("ctr(des3_ede)", DECRYPT, sec,
  1696. des3_speed_template, DES3_SPEED_VECTORS,
  1697. speed_template_24);
  1698. break;
  1699. case 202:
  1700. test_cipher_speed("ecb(twofish)", ENCRYPT, sec, NULL, 0,
  1701. speed_template_16_24_32);
  1702. test_cipher_speed("ecb(twofish)", DECRYPT, sec, NULL, 0,
  1703. speed_template_16_24_32);
  1704. test_cipher_speed("cbc(twofish)", ENCRYPT, sec, NULL, 0,
  1705. speed_template_16_24_32);
  1706. test_cipher_speed("cbc(twofish)", DECRYPT, sec, NULL, 0,
  1707. speed_template_16_24_32);
  1708. test_cipher_speed("ctr(twofish)", ENCRYPT, sec, NULL, 0,
  1709. speed_template_16_24_32);
  1710. test_cipher_speed("ctr(twofish)", DECRYPT, sec, NULL, 0,
  1711. speed_template_16_24_32);
  1712. test_cipher_speed("lrw(twofish)", ENCRYPT, sec, NULL, 0,
  1713. speed_template_32_40_48);
  1714. test_cipher_speed("lrw(twofish)", DECRYPT, sec, NULL, 0,
  1715. speed_template_32_40_48);
  1716. test_cipher_speed("xts(twofish)", ENCRYPT, sec, NULL, 0,
  1717. speed_template_32_48_64);
  1718. test_cipher_speed("xts(twofish)", DECRYPT, sec, NULL, 0,
  1719. speed_template_32_48_64);
  1720. break;
  1721. case 203:
  1722. test_cipher_speed("ecb(blowfish)", ENCRYPT, sec, NULL, 0,
  1723. speed_template_8_32);
  1724. test_cipher_speed("ecb(blowfish)", DECRYPT, sec, NULL, 0,
  1725. speed_template_8_32);
  1726. test_cipher_speed("cbc(blowfish)", ENCRYPT, sec, NULL, 0,
  1727. speed_template_8_32);
  1728. test_cipher_speed("cbc(blowfish)", DECRYPT, sec, NULL, 0,
  1729. speed_template_8_32);
  1730. test_cipher_speed("ctr(blowfish)", ENCRYPT, sec, NULL, 0,
  1731. speed_template_8_32);
  1732. test_cipher_speed("ctr(blowfish)", DECRYPT, sec, NULL, 0,
  1733. speed_template_8_32);
  1734. break;
  1735. case 204:
  1736. test_cipher_speed("ecb(des)", ENCRYPT, sec, NULL, 0,
  1737. speed_template_8);
  1738. test_cipher_speed("ecb(des)", DECRYPT, sec, NULL, 0,
  1739. speed_template_8);
  1740. test_cipher_speed("cbc(des)", ENCRYPT, sec, NULL, 0,
  1741. speed_template_8);
  1742. test_cipher_speed("cbc(des)", DECRYPT, sec, NULL, 0,
  1743. speed_template_8);
  1744. break;
  1745. case 205:
  1746. test_cipher_speed("ecb(camellia)", ENCRYPT, sec, NULL, 0,
  1747. speed_template_16_24_32);
  1748. test_cipher_speed("ecb(camellia)", DECRYPT, sec, NULL, 0,
  1749. speed_template_16_24_32);
  1750. test_cipher_speed("cbc(camellia)", ENCRYPT, sec, NULL, 0,
  1751. speed_template_16_24_32);
  1752. test_cipher_speed("cbc(camellia)", DECRYPT, sec, NULL, 0,
  1753. speed_template_16_24_32);
  1754. test_cipher_speed("ctr(camellia)", ENCRYPT, sec, NULL, 0,
  1755. speed_template_16_24_32);
  1756. test_cipher_speed("ctr(camellia)", DECRYPT, sec, NULL, 0,
  1757. speed_template_16_24_32);
  1758. test_cipher_speed("lrw(camellia)", ENCRYPT, sec, NULL, 0,
  1759. speed_template_32_40_48);
  1760. test_cipher_speed("lrw(camellia)", DECRYPT, sec, NULL, 0,
  1761. speed_template_32_40_48);
  1762. test_cipher_speed("xts(camellia)", ENCRYPT, sec, NULL, 0,
  1763. speed_template_32_48_64);
  1764. test_cipher_speed("xts(camellia)", DECRYPT, sec, NULL, 0,
  1765. speed_template_32_48_64);
  1766. break;
  1767. case 206:
  1768. test_cipher_speed("salsa20", ENCRYPT, sec, NULL, 0,
  1769. speed_template_16_32);
  1770. break;
  1771. case 207:
  1772. test_cipher_speed("ecb(serpent)", ENCRYPT, sec, NULL, 0,
  1773. speed_template_16_32);
  1774. test_cipher_speed("ecb(serpent)", DECRYPT, sec, NULL, 0,
  1775. speed_template_16_32);
  1776. test_cipher_speed("cbc(serpent)", ENCRYPT, sec, NULL, 0,
  1777. speed_template_16_32);
  1778. test_cipher_speed("cbc(serpent)", DECRYPT, sec, NULL, 0,
  1779. speed_template_16_32);
  1780. test_cipher_speed("ctr(serpent)", ENCRYPT, sec, NULL, 0,
  1781. speed_template_16_32);
  1782. test_cipher_speed("ctr(serpent)", DECRYPT, sec, NULL, 0,
  1783. speed_template_16_32);
  1784. test_cipher_speed("lrw(serpent)", ENCRYPT, sec, NULL, 0,
  1785. speed_template_32_48);
  1786. test_cipher_speed("lrw(serpent)", DECRYPT, sec, NULL, 0,
  1787. speed_template_32_48);
  1788. test_cipher_speed("xts(serpent)", ENCRYPT, sec, NULL, 0,
  1789. speed_template_32_64);
  1790. test_cipher_speed("xts(serpent)", DECRYPT, sec, NULL, 0,
  1791. speed_template_32_64);
  1792. break;
  1793. case 208:
  1794. test_cipher_speed("ecb(arc4)", ENCRYPT, sec, NULL, 0,
  1795. speed_template_8);
  1796. break;
  1797. case 209:
  1798. test_cipher_speed("ecb(cast5)", ENCRYPT, sec, NULL, 0,
  1799. speed_template_8_16);
  1800. test_cipher_speed("ecb(cast5)", DECRYPT, sec, NULL, 0,
  1801. speed_template_8_16);
  1802. test_cipher_speed("cbc(cast5)", ENCRYPT, sec, NULL, 0,
  1803. speed_template_8_16);
  1804. test_cipher_speed("cbc(cast5)", DECRYPT, sec, NULL, 0,
  1805. speed_template_8_16);
  1806. test_cipher_speed("ctr(cast5)", ENCRYPT, sec, NULL, 0,
  1807. speed_template_8_16);
  1808. test_cipher_speed("ctr(cast5)", DECRYPT, sec, NULL, 0,
  1809. speed_template_8_16);
  1810. break;
  1811. case 210:
  1812. test_cipher_speed("ecb(cast6)", ENCRYPT, sec, NULL, 0,
  1813. speed_template_16_32);
  1814. test_cipher_speed("ecb(cast6)", DECRYPT, sec, NULL, 0,
  1815. speed_template_16_32);
  1816. test_cipher_speed("cbc(cast6)", ENCRYPT, sec, NULL, 0,
  1817. speed_template_16_32);
  1818. test_cipher_speed("cbc(cast6)", DECRYPT, sec, NULL, 0,
  1819. speed_template_16_32);
  1820. test_cipher_speed("ctr(cast6)", ENCRYPT, sec, NULL, 0,
  1821. speed_template_16_32);
  1822. test_cipher_speed("ctr(cast6)", DECRYPT, sec, NULL, 0,
  1823. speed_template_16_32);
  1824. test_cipher_speed("lrw(cast6)", ENCRYPT, sec, NULL, 0,
  1825. speed_template_32_48);
  1826. test_cipher_speed("lrw(cast6)", DECRYPT, sec, NULL, 0,
  1827. speed_template_32_48);
  1828. test_cipher_speed("xts(cast6)", ENCRYPT, sec, NULL, 0,
  1829. speed_template_32_64);
  1830. test_cipher_speed("xts(cast6)", DECRYPT, sec, NULL, 0,
  1831. speed_template_32_64);
  1832. break;
  1833. case 211:
  1834. test_aead_speed("rfc4106(gcm(aes))", ENCRYPT, sec,
  1835. NULL, 0, 16, 16, aead_speed_template_20);
  1836. test_aead_speed("gcm(aes)", ENCRYPT, sec,
  1837. NULL, 0, 16, 8, speed_template_16_24_32);
  1838. test_aead_speed("rfc4106(gcm(aes))", DECRYPT, sec,
  1839. NULL, 0, 16, 16, aead_speed_template_20);
  1840. test_aead_speed("gcm(aes)", DECRYPT, sec,
  1841. NULL, 0, 16, 8, speed_template_16_24_32);
  1842. break;
  1843. case 212:
  1844. test_aead_speed("rfc4309(ccm(aes))", ENCRYPT, sec,
  1845. NULL, 0, 16, 16, aead_speed_template_19);
  1846. test_aead_speed("rfc4309(ccm(aes))", DECRYPT, sec,
  1847. NULL, 0, 16, 16, aead_speed_template_19);
  1848. break;
  1849. case 213:
  1850. test_aead_speed("rfc7539esp(chacha20,poly1305)", ENCRYPT, sec,
  1851. NULL, 0, 16, 8, aead_speed_template_36);
  1852. test_aead_speed("rfc7539esp(chacha20,poly1305)", DECRYPT, sec,
  1853. NULL, 0, 16, 8, aead_speed_template_36);
  1854. break;
  1855. case 214:
  1856. test_cipher_speed("chacha20", ENCRYPT, sec, NULL, 0,
  1857. speed_template_32);
  1858. break;
  1859. case 215:
  1860. test_mb_aead_speed("rfc4106(gcm(aes))", ENCRYPT, sec, NULL,
  1861. 0, 16, 16, aead_speed_template_20, num_mb);
  1862. test_mb_aead_speed("gcm(aes)", ENCRYPT, sec, NULL, 0, 16, 8,
  1863. speed_template_16_24_32, num_mb);
  1864. test_mb_aead_speed("rfc4106(gcm(aes))", DECRYPT, sec, NULL,
  1865. 0, 16, 16, aead_speed_template_20, num_mb);
  1866. test_mb_aead_speed("gcm(aes)", DECRYPT, sec, NULL, 0, 16, 8,
  1867. speed_template_16_24_32, num_mb);
  1868. break;
  1869. case 216:
  1870. test_mb_aead_speed("rfc4309(ccm(aes))", ENCRYPT, sec, NULL, 0,
  1871. 16, 16, aead_speed_template_19, num_mb);
  1872. test_mb_aead_speed("rfc4309(ccm(aes))", DECRYPT, sec, NULL, 0,
  1873. 16, 16, aead_speed_template_19, num_mb);
  1874. break;
  1875. case 217:
  1876. test_mb_aead_speed("rfc7539esp(chacha20,poly1305)", ENCRYPT,
  1877. sec, NULL, 0, 16, 8, aead_speed_template_36,
  1878. num_mb);
  1879. test_mb_aead_speed("rfc7539esp(chacha20,poly1305)", DECRYPT,
  1880. sec, NULL, 0, 16, 8, aead_speed_template_36,
  1881. num_mb);
  1882. break;
  1883. case 300:
  1884. if (alg) {
  1885. test_hash_speed(alg, sec, generic_hash_speed_template);
  1886. break;
  1887. }
  1888. /* fall through */
  1889. case 301:
  1890. test_hash_speed("md4", sec, generic_hash_speed_template);
  1891. if (mode > 300 && mode < 400) break;
  1892. /* fall through */
  1893. case 302:
  1894. test_hash_speed("md5", sec, generic_hash_speed_template);
  1895. if (mode > 300 && mode < 400) break;
  1896. /* fall through */
  1897. case 303:
  1898. test_hash_speed("sha1", sec, generic_hash_speed_template);
  1899. if (mode > 300 && mode < 400) break;
  1900. /* fall through */
  1901. case 304:
  1902. test_hash_speed("sha256", sec, generic_hash_speed_template);
  1903. if (mode > 300 && mode < 400) break;
  1904. /* fall through */
  1905. case 305:
  1906. test_hash_speed("sha384", sec, generic_hash_speed_template);
  1907. if (mode > 300 && mode < 400) break;
  1908. /* fall through */
  1909. case 306:
  1910. test_hash_speed("sha512", sec, generic_hash_speed_template);
  1911. if (mode > 300 && mode < 400) break;
  1912. /* fall through */
  1913. case 307:
  1914. test_hash_speed("wp256", sec, generic_hash_speed_template);
  1915. if (mode > 300 && mode < 400) break;
  1916. /* fall through */
  1917. case 308:
  1918. test_hash_speed("wp384", sec, generic_hash_speed_template);
  1919. if (mode > 300 && mode < 400) break;
  1920. /* fall through */
  1921. case 309:
  1922. test_hash_speed("wp512", sec, generic_hash_speed_template);
  1923. if (mode > 300 && mode < 400) break;
  1924. /* fall through */
  1925. case 310:
  1926. test_hash_speed("tgr128", sec, generic_hash_speed_template);
  1927. if (mode > 300 && mode < 400) break;
  1928. /* fall through */
  1929. case 311:
  1930. test_hash_speed("tgr160", sec, generic_hash_speed_template);
  1931. if (mode > 300 && mode < 400) break;
  1932. /* fall through */
  1933. case 312:
  1934. test_hash_speed("tgr192", sec, generic_hash_speed_template);
  1935. if (mode > 300 && mode < 400) break;
  1936. /* fall through */
  1937. case 313:
  1938. test_hash_speed("sha224", sec, generic_hash_speed_template);
  1939. if (mode > 300 && mode < 400) break;
  1940. /* fall through */
  1941. case 314:
  1942. test_hash_speed("rmd128", sec, generic_hash_speed_template);
  1943. if (mode > 300 && mode < 400) break;
  1944. /* fall through */
  1945. case 315:
  1946. test_hash_speed("rmd160", sec, generic_hash_speed_template);
  1947. if (mode > 300 && mode < 400) break;
  1948. /* fall through */
  1949. case 316:
  1950. test_hash_speed("rmd256", sec, generic_hash_speed_template);
  1951. if (mode > 300 && mode < 400) break;
  1952. /* fall through */
  1953. case 317:
  1954. test_hash_speed("rmd320", sec, generic_hash_speed_template);
  1955. if (mode > 300 && mode < 400) break;
  1956. /* fall through */
  1957. case 318:
  1958. test_hash_speed("ghash-generic", sec, hash_speed_template_16);
  1959. if (mode > 300 && mode < 400) break;
  1960. /* fall through */
  1961. case 319:
  1962. test_hash_speed("crc32c", sec, generic_hash_speed_template);
  1963. if (mode > 300 && mode < 400) break;
  1964. /* fall through */
  1965. case 320:
  1966. test_hash_speed("crct10dif", sec, generic_hash_speed_template);
  1967. if (mode > 300 && mode < 400) break;
  1968. /* fall through */
  1969. case 321:
  1970. test_hash_speed("poly1305", sec, poly1305_speed_template);
  1971. if (mode > 300 && mode < 400) break;
  1972. /* fall through */
  1973. case 322:
  1974. test_hash_speed("sha3-224", sec, generic_hash_speed_template);
  1975. if (mode > 300 && mode < 400) break;
  1976. /* fall through */
  1977. case 323:
  1978. test_hash_speed("sha3-256", sec, generic_hash_speed_template);
  1979. if (mode > 300 && mode < 400) break;
  1980. /* fall through */
  1981. case 324:
  1982. test_hash_speed("sha3-384", sec, generic_hash_speed_template);
  1983. if (mode > 300 && mode < 400) break;
  1984. /* fall through */
  1985. case 325:
  1986. test_hash_speed("sha3-512", sec, generic_hash_speed_template);
  1987. if (mode > 300 && mode < 400) break;
  1988. /* fall through */
  1989. case 326:
  1990. test_hash_speed("sm3", sec, generic_hash_speed_template);
  1991. if (mode > 300 && mode < 400) break;
  1992. /* fall through */
  1993. case 399:
  1994. break;
  1995. case 400:
  1996. if (alg) {
  1997. test_ahash_speed(alg, sec, generic_hash_speed_template);
  1998. break;
  1999. }
  2000. /* fall through */
  2001. case 401:
  2002. test_ahash_speed("md4", sec, generic_hash_speed_template);
  2003. if (mode > 400 && mode < 500) break;
  2004. /* fall through */
  2005. case 402:
  2006. test_ahash_speed("md5", sec, generic_hash_speed_template);
  2007. if (mode > 400 && mode < 500) break;
  2008. /* fall through */
  2009. case 403:
  2010. test_ahash_speed("sha1", sec, generic_hash_speed_template);
  2011. if (mode > 400 && mode < 500) break;
  2012. /* fall through */
  2013. case 404:
  2014. test_ahash_speed("sha256", sec, generic_hash_speed_template);
  2015. if (mode > 400 && mode < 500) break;
  2016. /* fall through */
  2017. case 405:
  2018. test_ahash_speed("sha384", sec, generic_hash_speed_template);
  2019. if (mode > 400 && mode < 500) break;
  2020. /* fall through */
  2021. case 406:
  2022. test_ahash_speed("sha512", sec, generic_hash_speed_template);
  2023. if (mode > 400 && mode < 500) break;
  2024. /* fall through */
  2025. case 407:
  2026. test_ahash_speed("wp256", sec, generic_hash_speed_template);
  2027. if (mode > 400 && mode < 500) break;
  2028. /* fall through */
  2029. case 408:
  2030. test_ahash_speed("wp384", sec, generic_hash_speed_template);
  2031. if (mode > 400 && mode < 500) break;
  2032. /* fall through */
  2033. case 409:
  2034. test_ahash_speed("wp512", sec, generic_hash_speed_template);
  2035. if (mode > 400 && mode < 500) break;
  2036. /* fall through */
  2037. case 410:
  2038. test_ahash_speed("tgr128", sec, generic_hash_speed_template);
  2039. if (mode > 400 && mode < 500) break;
  2040. /* fall through */
  2041. case 411:
  2042. test_ahash_speed("tgr160", sec, generic_hash_speed_template);
  2043. if (mode > 400 && mode < 500) break;
  2044. /* fall through */
  2045. case 412:
  2046. test_ahash_speed("tgr192", sec, generic_hash_speed_template);
  2047. if (mode > 400 && mode < 500) break;
  2048. /* fall through */
  2049. case 413:
  2050. test_ahash_speed("sha224", sec, generic_hash_speed_template);
  2051. if (mode > 400 && mode < 500) break;
  2052. /* fall through */
  2053. case 414:
  2054. test_ahash_speed("rmd128", sec, generic_hash_speed_template);
  2055. if (mode > 400 && mode < 500) break;
  2056. /* fall through */
  2057. case 415:
  2058. test_ahash_speed("rmd160", sec, generic_hash_speed_template);
  2059. if (mode > 400 && mode < 500) break;
  2060. /* fall through */
  2061. case 416:
  2062. test_ahash_speed("rmd256", sec, generic_hash_speed_template);
  2063. if (mode > 400 && mode < 500) break;
  2064. /* fall through */
  2065. case 417:
  2066. test_ahash_speed("rmd320", sec, generic_hash_speed_template);
  2067. if (mode > 400 && mode < 500) break;
  2068. /* fall through */
  2069. case 418:
  2070. test_ahash_speed("sha3-224", sec, generic_hash_speed_template);
  2071. if (mode > 400 && mode < 500) break;
  2072. /* fall through */
  2073. case 419:
  2074. test_ahash_speed("sha3-256", sec, generic_hash_speed_template);
  2075. if (mode > 400 && mode < 500) break;
  2076. /* fall through */
  2077. case 420:
  2078. test_ahash_speed("sha3-384", sec, generic_hash_speed_template);
  2079. if (mode > 400 && mode < 500) break;
  2080. /* fall through */
  2081. case 421:
  2082. test_ahash_speed("sha3-512", sec, generic_hash_speed_template);
  2083. if (mode > 400 && mode < 500) break;
  2084. /* fall through */
  2085. case 422:
  2086. test_mb_ahash_speed("sha1", sec, generic_hash_speed_template,
  2087. num_mb);
  2088. if (mode > 400 && mode < 500) break;
  2089. /* fall through */
  2090. case 423:
  2091. test_mb_ahash_speed("sha256", sec, generic_hash_speed_template,
  2092. num_mb);
  2093. if (mode > 400 && mode < 500) break;
  2094. /* fall through */
  2095. case 424:
  2096. test_mb_ahash_speed("sha512", sec, generic_hash_speed_template,
  2097. num_mb);
  2098. if (mode > 400 && mode < 500) break;
  2099. /* fall through */
  2100. case 425:
  2101. test_mb_ahash_speed("sm3", sec, generic_hash_speed_template,
  2102. num_mb);
  2103. if (mode > 400 && mode < 500) break;
  2104. /* fall through */
  2105. case 499:
  2106. break;
  2107. case 500:
  2108. test_acipher_speed("ecb(aes)", ENCRYPT, sec, NULL, 0,
  2109. speed_template_16_24_32);
  2110. test_acipher_speed("ecb(aes)", DECRYPT, sec, NULL, 0,
  2111. speed_template_16_24_32);
  2112. test_acipher_speed("cbc(aes)", ENCRYPT, sec, NULL, 0,
  2113. speed_template_16_24_32);
  2114. test_acipher_speed("cbc(aes)", DECRYPT, sec, NULL, 0,
  2115. speed_template_16_24_32);
  2116. test_acipher_speed("lrw(aes)", ENCRYPT, sec, NULL, 0,
  2117. speed_template_32_40_48);
  2118. test_acipher_speed("lrw(aes)", DECRYPT, sec, NULL, 0,
  2119. speed_template_32_40_48);
  2120. test_acipher_speed("xts(aes)", ENCRYPT, sec, NULL, 0,
  2121. speed_template_32_64);
  2122. test_acipher_speed("xts(aes)", DECRYPT, sec, NULL, 0,
  2123. speed_template_32_64);
  2124. test_acipher_speed("cts(cbc(aes))", ENCRYPT, sec, NULL, 0,
  2125. speed_template_16_24_32);
  2126. test_acipher_speed("cts(cbc(aes))", DECRYPT, sec, NULL, 0,
  2127. speed_template_16_24_32);
  2128. test_acipher_speed("ctr(aes)", ENCRYPT, sec, NULL, 0,
  2129. speed_template_16_24_32);
  2130. test_acipher_speed("ctr(aes)", DECRYPT, sec, NULL, 0,
  2131. speed_template_16_24_32);
  2132. test_acipher_speed("cfb(aes)", ENCRYPT, sec, NULL, 0,
  2133. speed_template_16_24_32);
  2134. test_acipher_speed("cfb(aes)", DECRYPT, sec, NULL, 0,
  2135. speed_template_16_24_32);
  2136. test_acipher_speed("ofb(aes)", ENCRYPT, sec, NULL, 0,
  2137. speed_template_16_24_32);
  2138. test_acipher_speed("ofb(aes)", DECRYPT, sec, NULL, 0,
  2139. speed_template_16_24_32);
  2140. test_acipher_speed("rfc3686(ctr(aes))", ENCRYPT, sec, NULL, 0,
  2141. speed_template_20_28_36);
  2142. test_acipher_speed("rfc3686(ctr(aes))", DECRYPT, sec, NULL, 0,
  2143. speed_template_20_28_36);
  2144. break;
  2145. case 501:
  2146. test_acipher_speed("ecb(des3_ede)", ENCRYPT, sec,
  2147. des3_speed_template, DES3_SPEED_VECTORS,
  2148. speed_template_24);
  2149. test_acipher_speed("ecb(des3_ede)", DECRYPT, sec,
  2150. des3_speed_template, DES3_SPEED_VECTORS,
  2151. speed_template_24);
  2152. test_acipher_speed("cbc(des3_ede)", ENCRYPT, sec,
  2153. des3_speed_template, DES3_SPEED_VECTORS,
  2154. speed_template_24);
  2155. test_acipher_speed("cbc(des3_ede)", DECRYPT, sec,
  2156. des3_speed_template, DES3_SPEED_VECTORS,
  2157. speed_template_24);
  2158. test_acipher_speed("cfb(des3_ede)", ENCRYPT, sec,
  2159. des3_speed_template, DES3_SPEED_VECTORS,
  2160. speed_template_24);
  2161. test_acipher_speed("cfb(des3_ede)", DECRYPT, sec,
  2162. des3_speed_template, DES3_SPEED_VECTORS,
  2163. speed_template_24);
  2164. test_acipher_speed("ofb(des3_ede)", ENCRYPT, sec,
  2165. des3_speed_template, DES3_SPEED_VECTORS,
  2166. speed_template_24);
  2167. test_acipher_speed("ofb(des3_ede)", DECRYPT, sec,
  2168. des3_speed_template, DES3_SPEED_VECTORS,
  2169. speed_template_24);
  2170. break;
  2171. case 502:
  2172. test_acipher_speed("ecb(des)", ENCRYPT, sec, NULL, 0,
  2173. speed_template_8);
  2174. test_acipher_speed("ecb(des)", DECRYPT, sec, NULL, 0,
  2175. speed_template_8);
  2176. test_acipher_speed("cbc(des)", ENCRYPT, sec, NULL, 0,
  2177. speed_template_8);
  2178. test_acipher_speed("cbc(des)", DECRYPT, sec, NULL, 0,
  2179. speed_template_8);
  2180. test_acipher_speed("cfb(des)", ENCRYPT, sec, NULL, 0,
  2181. speed_template_8);
  2182. test_acipher_speed("cfb(des)", DECRYPT, sec, NULL, 0,
  2183. speed_template_8);
  2184. test_acipher_speed("ofb(des)", ENCRYPT, sec, NULL, 0,
  2185. speed_template_8);
  2186. test_acipher_speed("ofb(des)", DECRYPT, sec, NULL, 0,
  2187. speed_template_8);
  2188. break;
  2189. case 503:
  2190. test_acipher_speed("ecb(serpent)", ENCRYPT, sec, NULL, 0,
  2191. speed_template_16_32);
  2192. test_acipher_speed("ecb(serpent)", DECRYPT, sec, NULL, 0,
  2193. speed_template_16_32);
  2194. test_acipher_speed("cbc(serpent)", ENCRYPT, sec, NULL, 0,
  2195. speed_template_16_32);
  2196. test_acipher_speed("cbc(serpent)", DECRYPT, sec, NULL, 0,
  2197. speed_template_16_32);
  2198. test_acipher_speed("ctr(serpent)", ENCRYPT, sec, NULL, 0,
  2199. speed_template_16_32);
  2200. test_acipher_speed("ctr(serpent)", DECRYPT, sec, NULL, 0,
  2201. speed_template_16_32);
  2202. test_acipher_speed("lrw(serpent)", ENCRYPT, sec, NULL, 0,
  2203. speed_template_32_48);
  2204. test_acipher_speed("lrw(serpent)", DECRYPT, sec, NULL, 0,
  2205. speed_template_32_48);
  2206. test_acipher_speed("xts(serpent)", ENCRYPT, sec, NULL, 0,
  2207. speed_template_32_64);
  2208. test_acipher_speed("xts(serpent)", DECRYPT, sec, NULL, 0,
  2209. speed_template_32_64);
  2210. break;
  2211. case 504:
  2212. test_acipher_speed("ecb(twofish)", ENCRYPT, sec, NULL, 0,
  2213. speed_template_16_24_32);
  2214. test_acipher_speed("ecb(twofish)", DECRYPT, sec, NULL, 0,
  2215. speed_template_16_24_32);
  2216. test_acipher_speed("cbc(twofish)", ENCRYPT, sec, NULL, 0,
  2217. speed_template_16_24_32);
  2218. test_acipher_speed("cbc(twofish)", DECRYPT, sec, NULL, 0,
  2219. speed_template_16_24_32);
  2220. test_acipher_speed("ctr(twofish)", ENCRYPT, sec, NULL, 0,
  2221. speed_template_16_24_32);
  2222. test_acipher_speed("ctr(twofish)", DECRYPT, sec, NULL, 0,
  2223. speed_template_16_24_32);
  2224. test_acipher_speed("lrw(twofish)", ENCRYPT, sec, NULL, 0,
  2225. speed_template_32_40_48);
  2226. test_acipher_speed("lrw(twofish)", DECRYPT, sec, NULL, 0,
  2227. speed_template_32_40_48);
  2228. test_acipher_speed("xts(twofish)", ENCRYPT, sec, NULL, 0,
  2229. speed_template_32_48_64);
  2230. test_acipher_speed("xts(twofish)", DECRYPT, sec, NULL, 0,
  2231. speed_template_32_48_64);
  2232. break;
  2233. case 505:
  2234. test_acipher_speed("ecb(arc4)", ENCRYPT, sec, NULL, 0,
  2235. speed_template_8);
  2236. break;
  2237. case 506:
  2238. test_acipher_speed("ecb(cast5)", ENCRYPT, sec, NULL, 0,
  2239. speed_template_8_16);
  2240. test_acipher_speed("ecb(cast5)", DECRYPT, sec, NULL, 0,
  2241. speed_template_8_16);
  2242. test_acipher_speed("cbc(cast5)", ENCRYPT, sec, NULL, 0,
  2243. speed_template_8_16);
  2244. test_acipher_speed("cbc(cast5)", DECRYPT, sec, NULL, 0,
  2245. speed_template_8_16);
  2246. test_acipher_speed("ctr(cast5)", ENCRYPT, sec, NULL, 0,
  2247. speed_template_8_16);
  2248. test_acipher_speed("ctr(cast5)", DECRYPT, sec, NULL, 0,
  2249. speed_template_8_16);
  2250. break;
  2251. case 507:
  2252. test_acipher_speed("ecb(cast6)", ENCRYPT, sec, NULL, 0,
  2253. speed_template_16_32);
  2254. test_acipher_speed("ecb(cast6)", DECRYPT, sec, NULL, 0,
  2255. speed_template_16_32);
  2256. test_acipher_speed("cbc(cast6)", ENCRYPT, sec, NULL, 0,
  2257. speed_template_16_32);
  2258. test_acipher_speed("cbc(cast6)", DECRYPT, sec, NULL, 0,
  2259. speed_template_16_32);
  2260. test_acipher_speed("ctr(cast6)", ENCRYPT, sec, NULL, 0,
  2261. speed_template_16_32);
  2262. test_acipher_speed("ctr(cast6)", DECRYPT, sec, NULL, 0,
  2263. speed_template_16_32);
  2264. test_acipher_speed("lrw(cast6)", ENCRYPT, sec, NULL, 0,
  2265. speed_template_32_48);
  2266. test_acipher_speed("lrw(cast6)", DECRYPT, sec, NULL, 0,
  2267. speed_template_32_48);
  2268. test_acipher_speed("xts(cast6)", ENCRYPT, sec, NULL, 0,
  2269. speed_template_32_64);
  2270. test_acipher_speed("xts(cast6)", DECRYPT, sec, NULL, 0,
  2271. speed_template_32_64);
  2272. break;
  2273. case 508:
  2274. test_acipher_speed("ecb(camellia)", ENCRYPT, sec, NULL, 0,
  2275. speed_template_16_32);
  2276. test_acipher_speed("ecb(camellia)", DECRYPT, sec, NULL, 0,
  2277. speed_template_16_32);
  2278. test_acipher_speed("cbc(camellia)", ENCRYPT, sec, NULL, 0,
  2279. speed_template_16_32);
  2280. test_acipher_speed("cbc(camellia)", DECRYPT, sec, NULL, 0,
  2281. speed_template_16_32);
  2282. test_acipher_speed("ctr(camellia)", ENCRYPT, sec, NULL, 0,
  2283. speed_template_16_32);
  2284. test_acipher_speed("ctr(camellia)", DECRYPT, sec, NULL, 0,
  2285. speed_template_16_32);
  2286. test_acipher_speed("lrw(camellia)", ENCRYPT, sec, NULL, 0,
  2287. speed_template_32_48);
  2288. test_acipher_speed("lrw(camellia)", DECRYPT, sec, NULL, 0,
  2289. speed_template_32_48);
  2290. test_acipher_speed("xts(camellia)", ENCRYPT, sec, NULL, 0,
  2291. speed_template_32_64);
  2292. test_acipher_speed("xts(camellia)", DECRYPT, sec, NULL, 0,
  2293. speed_template_32_64);
  2294. break;
  2295. case 509:
  2296. test_acipher_speed("ecb(blowfish)", ENCRYPT, sec, NULL, 0,
  2297. speed_template_8_32);
  2298. test_acipher_speed("ecb(blowfish)", DECRYPT, sec, NULL, 0,
  2299. speed_template_8_32);
  2300. test_acipher_speed("cbc(blowfish)", ENCRYPT, sec, NULL, 0,
  2301. speed_template_8_32);
  2302. test_acipher_speed("cbc(blowfish)", DECRYPT, sec, NULL, 0,
  2303. speed_template_8_32);
  2304. test_acipher_speed("ctr(blowfish)", ENCRYPT, sec, NULL, 0,
  2305. speed_template_8_32);
  2306. test_acipher_speed("ctr(blowfish)", DECRYPT, sec, NULL, 0,
  2307. speed_template_8_32);
  2308. break;
  2309. case 600:
  2310. test_mb_skcipher_speed("ecb(aes)", ENCRYPT, sec, NULL, 0,
  2311. speed_template_16_24_32, num_mb);
  2312. test_mb_skcipher_speed("ecb(aes)", DECRYPT, sec, NULL, 0,
  2313. speed_template_16_24_32, num_mb);
  2314. test_mb_skcipher_speed("cbc(aes)", ENCRYPT, sec, NULL, 0,
  2315. speed_template_16_24_32, num_mb);
  2316. test_mb_skcipher_speed("cbc(aes)", DECRYPT, sec, NULL, 0,
  2317. speed_template_16_24_32, num_mb);
  2318. test_mb_skcipher_speed("lrw(aes)", ENCRYPT, sec, NULL, 0,
  2319. speed_template_32_40_48, num_mb);
  2320. test_mb_skcipher_speed("lrw(aes)", DECRYPT, sec, NULL, 0,
  2321. speed_template_32_40_48, num_mb);
  2322. test_mb_skcipher_speed("xts(aes)", ENCRYPT, sec, NULL, 0,
  2323. speed_template_32_64, num_mb);
  2324. test_mb_skcipher_speed("xts(aes)", DECRYPT, sec, NULL, 0,
  2325. speed_template_32_64, num_mb);
  2326. test_mb_skcipher_speed("cts(cbc(aes))", ENCRYPT, sec, NULL, 0,
  2327. speed_template_16_24_32, num_mb);
  2328. test_mb_skcipher_speed("cts(cbc(aes))", DECRYPT, sec, NULL, 0,
  2329. speed_template_16_24_32, num_mb);
  2330. test_mb_skcipher_speed("ctr(aes)", ENCRYPT, sec, NULL, 0,
  2331. speed_template_16_24_32, num_mb);
  2332. test_mb_skcipher_speed("ctr(aes)", DECRYPT, sec, NULL, 0,
  2333. speed_template_16_24_32, num_mb);
  2334. test_mb_skcipher_speed("cfb(aes)", ENCRYPT, sec, NULL, 0,
  2335. speed_template_16_24_32, num_mb);
  2336. test_mb_skcipher_speed("cfb(aes)", DECRYPT, sec, NULL, 0,
  2337. speed_template_16_24_32, num_mb);
  2338. test_mb_skcipher_speed("ofb(aes)", ENCRYPT, sec, NULL, 0,
  2339. speed_template_16_24_32, num_mb);
  2340. test_mb_skcipher_speed("ofb(aes)", DECRYPT, sec, NULL, 0,
  2341. speed_template_16_24_32, num_mb);
  2342. test_mb_skcipher_speed("rfc3686(ctr(aes))", ENCRYPT, sec, NULL,
  2343. 0, speed_template_20_28_36, num_mb);
  2344. test_mb_skcipher_speed("rfc3686(ctr(aes))", DECRYPT, sec, NULL,
  2345. 0, speed_template_20_28_36, num_mb);
  2346. break;
  2347. case 601:
  2348. test_mb_skcipher_speed("ecb(des3_ede)", ENCRYPT, sec,
  2349. des3_speed_template, DES3_SPEED_VECTORS,
  2350. speed_template_24, num_mb);
  2351. test_mb_skcipher_speed("ecb(des3_ede)", DECRYPT, sec,
  2352. des3_speed_template, DES3_SPEED_VECTORS,
  2353. speed_template_24, num_mb);
  2354. test_mb_skcipher_speed("cbc(des3_ede)", ENCRYPT, sec,
  2355. des3_speed_template, DES3_SPEED_VECTORS,
  2356. speed_template_24, num_mb);
  2357. test_mb_skcipher_speed("cbc(des3_ede)", DECRYPT, sec,
  2358. des3_speed_template, DES3_SPEED_VECTORS,
  2359. speed_template_24, num_mb);
  2360. test_mb_skcipher_speed("cfb(des3_ede)", ENCRYPT, sec,
  2361. des3_speed_template, DES3_SPEED_VECTORS,
  2362. speed_template_24, num_mb);
  2363. test_mb_skcipher_speed("cfb(des3_ede)", DECRYPT, sec,
  2364. des3_speed_template, DES3_SPEED_VECTORS,
  2365. speed_template_24, num_mb);
  2366. test_mb_skcipher_speed("ofb(des3_ede)", ENCRYPT, sec,
  2367. des3_speed_template, DES3_SPEED_VECTORS,
  2368. speed_template_24, num_mb);
  2369. test_mb_skcipher_speed("ofb(des3_ede)", DECRYPT, sec,
  2370. des3_speed_template, DES3_SPEED_VECTORS,
  2371. speed_template_24, num_mb);
  2372. break;
  2373. case 602:
  2374. test_mb_skcipher_speed("ecb(des)", ENCRYPT, sec, NULL, 0,
  2375. speed_template_8, num_mb);
  2376. test_mb_skcipher_speed("ecb(des)", DECRYPT, sec, NULL, 0,
  2377. speed_template_8, num_mb);
  2378. test_mb_skcipher_speed("cbc(des)", ENCRYPT, sec, NULL, 0,
  2379. speed_template_8, num_mb);
  2380. test_mb_skcipher_speed("cbc(des)", DECRYPT, sec, NULL, 0,
  2381. speed_template_8, num_mb);
  2382. test_mb_skcipher_speed("cfb(des)", ENCRYPT, sec, NULL, 0,
  2383. speed_template_8, num_mb);
  2384. test_mb_skcipher_speed("cfb(des)", DECRYPT, sec, NULL, 0,
  2385. speed_template_8, num_mb);
  2386. test_mb_skcipher_speed("ofb(des)", ENCRYPT, sec, NULL, 0,
  2387. speed_template_8, num_mb);
  2388. test_mb_skcipher_speed("ofb(des)", DECRYPT, sec, NULL, 0,
  2389. speed_template_8, num_mb);
  2390. break;
  2391. case 603:
  2392. test_mb_skcipher_speed("ecb(serpent)", ENCRYPT, sec, NULL, 0,
  2393. speed_template_16_32, num_mb);
  2394. test_mb_skcipher_speed("ecb(serpent)", DECRYPT, sec, NULL, 0,
  2395. speed_template_16_32, num_mb);
  2396. test_mb_skcipher_speed("cbc(serpent)", ENCRYPT, sec, NULL, 0,
  2397. speed_template_16_32, num_mb);
  2398. test_mb_skcipher_speed("cbc(serpent)", DECRYPT, sec, NULL, 0,
  2399. speed_template_16_32, num_mb);
  2400. test_mb_skcipher_speed("ctr(serpent)", ENCRYPT, sec, NULL, 0,
  2401. speed_template_16_32, num_mb);
  2402. test_mb_skcipher_speed("ctr(serpent)", DECRYPT, sec, NULL, 0,
  2403. speed_template_16_32, num_mb);
  2404. test_mb_skcipher_speed("lrw(serpent)", ENCRYPT, sec, NULL, 0,
  2405. speed_template_32_48, num_mb);
  2406. test_mb_skcipher_speed("lrw(serpent)", DECRYPT, sec, NULL, 0,
  2407. speed_template_32_48, num_mb);
  2408. test_mb_skcipher_speed("xts(serpent)", ENCRYPT, sec, NULL, 0,
  2409. speed_template_32_64, num_mb);
  2410. test_mb_skcipher_speed("xts(serpent)", DECRYPT, sec, NULL, 0,
  2411. speed_template_32_64, num_mb);
  2412. break;
  2413. case 604:
  2414. test_mb_skcipher_speed("ecb(twofish)", ENCRYPT, sec, NULL, 0,
  2415. speed_template_16_24_32, num_mb);
  2416. test_mb_skcipher_speed("ecb(twofish)", DECRYPT, sec, NULL, 0,
  2417. speed_template_16_24_32, num_mb);
  2418. test_mb_skcipher_speed("cbc(twofish)", ENCRYPT, sec, NULL, 0,
  2419. speed_template_16_24_32, num_mb);
  2420. test_mb_skcipher_speed("cbc(twofish)", DECRYPT, sec, NULL, 0,
  2421. speed_template_16_24_32, num_mb);
  2422. test_mb_skcipher_speed("ctr(twofish)", ENCRYPT, sec, NULL, 0,
  2423. speed_template_16_24_32, num_mb);
  2424. test_mb_skcipher_speed("ctr(twofish)", DECRYPT, sec, NULL, 0,
  2425. speed_template_16_24_32, num_mb);
  2426. test_mb_skcipher_speed("lrw(twofish)", ENCRYPT, sec, NULL, 0,
  2427. speed_template_32_40_48, num_mb);
  2428. test_mb_skcipher_speed("lrw(twofish)", DECRYPT, sec, NULL, 0,
  2429. speed_template_32_40_48, num_mb);
  2430. test_mb_skcipher_speed("xts(twofish)", ENCRYPT, sec, NULL, 0,
  2431. speed_template_32_48_64, num_mb);
  2432. test_mb_skcipher_speed("xts(twofish)", DECRYPT, sec, NULL, 0,
  2433. speed_template_32_48_64, num_mb);
  2434. break;
  2435. case 605:
  2436. test_mb_skcipher_speed("ecb(arc4)", ENCRYPT, sec, NULL, 0,
  2437. speed_template_8, num_mb);
  2438. break;
  2439. case 606:
  2440. test_mb_skcipher_speed("ecb(cast5)", ENCRYPT, sec, NULL, 0,
  2441. speed_template_8_16, num_mb);
  2442. test_mb_skcipher_speed("ecb(cast5)", DECRYPT, sec, NULL, 0,
  2443. speed_template_8_16, num_mb);
  2444. test_mb_skcipher_speed("cbc(cast5)", ENCRYPT, sec, NULL, 0,
  2445. speed_template_8_16, num_mb);
  2446. test_mb_skcipher_speed("cbc(cast5)", DECRYPT, sec, NULL, 0,
  2447. speed_template_8_16, num_mb);
  2448. test_mb_skcipher_speed("ctr(cast5)", ENCRYPT, sec, NULL, 0,
  2449. speed_template_8_16, num_mb);
  2450. test_mb_skcipher_speed("ctr(cast5)", DECRYPT, sec, NULL, 0,
  2451. speed_template_8_16, num_mb);
  2452. break;
  2453. case 607:
  2454. test_mb_skcipher_speed("ecb(cast6)", ENCRYPT, sec, NULL, 0,
  2455. speed_template_16_32, num_mb);
  2456. test_mb_skcipher_speed("ecb(cast6)", DECRYPT, sec, NULL, 0,
  2457. speed_template_16_32, num_mb);
  2458. test_mb_skcipher_speed("cbc(cast6)", ENCRYPT, sec, NULL, 0,
  2459. speed_template_16_32, num_mb);
  2460. test_mb_skcipher_speed("cbc(cast6)", DECRYPT, sec, NULL, 0,
  2461. speed_template_16_32, num_mb);
  2462. test_mb_skcipher_speed("ctr(cast6)", ENCRYPT, sec, NULL, 0,
  2463. speed_template_16_32, num_mb);
  2464. test_mb_skcipher_speed("ctr(cast6)", DECRYPT, sec, NULL, 0,
  2465. speed_template_16_32, num_mb);
  2466. test_mb_skcipher_speed("lrw(cast6)", ENCRYPT, sec, NULL, 0,
  2467. speed_template_32_48, num_mb);
  2468. test_mb_skcipher_speed("lrw(cast6)", DECRYPT, sec, NULL, 0,
  2469. speed_template_32_48, num_mb);
  2470. test_mb_skcipher_speed("xts(cast6)", ENCRYPT, sec, NULL, 0,
  2471. speed_template_32_64, num_mb);
  2472. test_mb_skcipher_speed("xts(cast6)", DECRYPT, sec, NULL, 0,
  2473. speed_template_32_64, num_mb);
  2474. break;
  2475. case 608:
  2476. test_mb_skcipher_speed("ecb(camellia)", ENCRYPT, sec, NULL, 0,
  2477. speed_template_16_32, num_mb);
  2478. test_mb_skcipher_speed("ecb(camellia)", DECRYPT, sec, NULL, 0,
  2479. speed_template_16_32, num_mb);
  2480. test_mb_skcipher_speed("cbc(camellia)", ENCRYPT, sec, NULL, 0,
  2481. speed_template_16_32, num_mb);
  2482. test_mb_skcipher_speed("cbc(camellia)", DECRYPT, sec, NULL, 0,
  2483. speed_template_16_32, num_mb);
  2484. test_mb_skcipher_speed("ctr(camellia)", ENCRYPT, sec, NULL, 0,
  2485. speed_template_16_32, num_mb);
  2486. test_mb_skcipher_speed("ctr(camellia)", DECRYPT, sec, NULL, 0,
  2487. speed_template_16_32, num_mb);
  2488. test_mb_skcipher_speed("lrw(camellia)", ENCRYPT, sec, NULL, 0,
  2489. speed_template_32_48, num_mb);
  2490. test_mb_skcipher_speed("lrw(camellia)", DECRYPT, sec, NULL, 0,
  2491. speed_template_32_48, num_mb);
  2492. test_mb_skcipher_speed("xts(camellia)", ENCRYPT, sec, NULL, 0,
  2493. speed_template_32_64, num_mb);
  2494. test_mb_skcipher_speed("xts(camellia)", DECRYPT, sec, NULL, 0,
  2495. speed_template_32_64, num_mb);
  2496. break;
  2497. case 609:
  2498. test_mb_skcipher_speed("ecb(blowfish)", ENCRYPT, sec, NULL, 0,
  2499. speed_template_8_32, num_mb);
  2500. test_mb_skcipher_speed("ecb(blowfish)", DECRYPT, sec, NULL, 0,
  2501. speed_template_8_32, num_mb);
  2502. test_mb_skcipher_speed("cbc(blowfish)", ENCRYPT, sec, NULL, 0,
  2503. speed_template_8_32, num_mb);
  2504. test_mb_skcipher_speed("cbc(blowfish)", DECRYPT, sec, NULL, 0,
  2505. speed_template_8_32, num_mb);
  2506. test_mb_skcipher_speed("ctr(blowfish)", ENCRYPT, sec, NULL, 0,
  2507. speed_template_8_32, num_mb);
  2508. test_mb_skcipher_speed("ctr(blowfish)", DECRYPT, sec, NULL, 0,
  2509. speed_template_8_32, num_mb);
  2510. break;
  2511. case 1000:
  2512. test_available();
  2513. break;
  2514. }
  2515. return ret;
  2516. }
  2517. static int __init tcrypt_mod_init(void)
  2518. {
  2519. int err = -ENOMEM;
  2520. int i;
  2521. for (i = 0; i < TVMEMSIZE; i++) {
  2522. tvmem[i] = (void *)__get_free_page(GFP_KERNEL);
  2523. if (!tvmem[i])
  2524. goto err_free_tv;
  2525. }
  2526. err = do_test(alg, type, mask, mode, num_mb);
  2527. if (err) {
  2528. printk(KERN_ERR "tcrypt: one or more tests failed!\n");
  2529. goto err_free_tv;
  2530. } else {
  2531. pr_debug("all tests passed\n");
  2532. }
  2533. /* We intentionaly return -EAGAIN to prevent keeping the module,
  2534. * unless we're running in fips mode. It does all its work from
  2535. * init() and doesn't offer any runtime functionality, but in
  2536. * the fips case, checking for a successful load is helpful.
  2537. * => we don't need it in the memory, do we?
  2538. * -- mludvig
  2539. */
  2540. if (!fips_enabled)
  2541. err = -EAGAIN;
  2542. err_free_tv:
  2543. for (i = 0; i < TVMEMSIZE && tvmem[i]; i++)
  2544. free_page((unsigned long)tvmem[i]);
  2545. return err;
  2546. }
  2547. /*
  2548. * If an init function is provided, an exit function must also be provided
  2549. * to allow module unload.
  2550. */
  2551. static void __exit tcrypt_mod_fini(void) { }
  2552. module_init(tcrypt_mod_init);
  2553. module_exit(tcrypt_mod_fini);
  2554. module_param(alg, charp, 0);
  2555. module_param(type, uint, 0);
  2556. module_param(mask, uint, 0);
  2557. module_param(mode, int, 0);
  2558. module_param(sec, uint, 0);
  2559. MODULE_PARM_DESC(sec, "Length in seconds of speed tests "
  2560. "(defaults to zero which uses CPU cycles instead)");
  2561. module_param(num_mb, uint, 0000);
  2562. MODULE_PARM_DESC(num_mb, "Number of concurrent requests to be used in mb speed tests (defaults to 8)");
  2563. MODULE_LICENSE("GPL");
  2564. MODULE_DESCRIPTION("Quick & dirty crypto testing module");
  2565. MODULE_AUTHOR("James Morris <jmorris@intercode.com.au>");