tcrypt.c 76 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953
  1. /*
  2. * Quick & dirty crypto testing module.
  3. *
  4. * This will only exist until we have a better testing mechanism
  5. * (e.g. a char device).
  6. *
  7. * Copyright (c) 2002 James Morris <jmorris@intercode.com.au>
  8. * Copyright (c) 2002 Jean-Francois Dive <jef@linuxbe.org>
  9. * Copyright (c) 2007 Nokia Siemens Networks
  10. *
  11. * Updated RFC4106 AES-GCM testing.
  12. * Authors: Aidan O'Mahony (aidan.o.mahony@intel.com)
  13. * Adrian Hoban <adrian.hoban@intel.com>
  14. * Gabriele Paoloni <gabriele.paoloni@intel.com>
  15. * Tadeusz Struk (tadeusz.struk@intel.com)
  16. * Copyright (c) 2010, Intel Corporation.
  17. *
  18. * This program is free software; you can redistribute it and/or modify it
  19. * under the terms of the GNU General Public License as published by the Free
  20. * Software Foundation; either version 2 of the License, or (at your option)
  21. * any later version.
  22. *
  23. */
  24. #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
  25. #include <crypto/aead.h>
  26. #include <crypto/hash.h>
  27. #include <crypto/skcipher.h>
  28. #include <linux/err.h>
  29. #include <linux/fips.h>
  30. #include <linux/init.h>
  31. #include <linux/gfp.h>
  32. #include <linux/module.h>
  33. #include <linux/scatterlist.h>
  34. #include <linux/string.h>
  35. #include <linux/moduleparam.h>
  36. #include <linux/jiffies.h>
  37. #include <linux/timex.h>
  38. #include <linux/interrupt.h>
  39. #include "tcrypt.h"
  40. /*
  41. * Need slab memory for testing (size in number of pages).
  42. */
  43. #define TVMEMSIZE 4
  44. /*
  45. * Used by test_cipher_speed()
  46. */
  47. #define ENCRYPT 1
  48. #define DECRYPT 0
  49. #define MAX_DIGEST_SIZE 64
  50. /*
  51. * return a string with the driver name
  52. */
  53. #define get_driver_name(tfm_type, tfm) crypto_tfm_alg_driver_name(tfm_type ## _tfm(tfm))
  54. /*
  55. * Used by test_cipher_speed()
  56. */
  57. static unsigned int sec;
  58. static char *alg = NULL;
  59. static u32 type;
  60. static u32 mask;
  61. static int mode;
  62. static u32 num_mb = 8;
  63. static char *tvmem[TVMEMSIZE];
  64. static char *check[] = {
  65. "des", "md5", "des3_ede", "rot13", "sha1", "sha224", "sha256", "sm3",
  66. "blowfish", "twofish", "serpent", "sha384", "sha512", "md4", "aes",
  67. "cast6", "arc4", "michael_mic", "deflate", "crc32c", "tea", "xtea",
  68. "khazad", "wp512", "wp384", "wp256", "tnepres", "xeta", "fcrypt",
  69. "camellia", "seed", "salsa20", "rmd128", "rmd160", "rmd256", "rmd320",
  70. "lzo", "cts", "zlib", "sha3-224", "sha3-256", "sha3-384", "sha3-512",
  71. NULL
  72. };
  73. static u32 block_sizes[] = { 16, 64, 256, 1024, 8192, 0 };
  74. static u32 aead_sizes[] = { 16, 64, 256, 512, 1024, 2048, 4096, 8192, 0 };
  75. #define XBUFSIZE 8
  76. #define MAX_IVLEN 32
  77. static int testmgr_alloc_buf(char *buf[XBUFSIZE])
  78. {
  79. int i;
  80. for (i = 0; i < XBUFSIZE; i++) {
  81. buf[i] = (void *)__get_free_page(GFP_KERNEL);
  82. if (!buf[i])
  83. goto err_free_buf;
  84. }
  85. return 0;
  86. err_free_buf:
  87. while (i-- > 0)
  88. free_page((unsigned long)buf[i]);
  89. return -ENOMEM;
  90. }
  91. static void testmgr_free_buf(char *buf[XBUFSIZE])
  92. {
  93. int i;
  94. for (i = 0; i < XBUFSIZE; i++)
  95. free_page((unsigned long)buf[i]);
  96. }
  97. static void sg_init_aead(struct scatterlist *sg, char *xbuf[XBUFSIZE],
  98. unsigned int buflen, const void *assoc,
  99. unsigned int aad_size)
  100. {
  101. int np = (buflen + PAGE_SIZE - 1)/PAGE_SIZE;
  102. int k, rem;
  103. if (np > XBUFSIZE) {
  104. rem = PAGE_SIZE;
  105. np = XBUFSIZE;
  106. } else {
  107. rem = buflen % PAGE_SIZE;
  108. }
  109. sg_init_table(sg, np + 1);
  110. sg_set_buf(&sg[0], assoc, aad_size);
  111. if (rem)
  112. np--;
  113. for (k = 0; k < np; k++)
  114. sg_set_buf(&sg[k + 1], xbuf[k], PAGE_SIZE);
  115. if (rem)
  116. sg_set_buf(&sg[k + 1], xbuf[k], rem);
  117. }
  118. static inline int do_one_aead_op(struct aead_request *req, int ret)
  119. {
  120. struct crypto_wait *wait = req->base.data;
  121. return crypto_wait_req(ret, wait);
  122. }
  123. struct test_mb_aead_data {
  124. struct scatterlist sg[XBUFSIZE];
  125. struct scatterlist sgout[XBUFSIZE];
  126. struct aead_request *req;
  127. struct crypto_wait wait;
  128. char *xbuf[XBUFSIZE];
  129. char *xoutbuf[XBUFSIZE];
  130. char *axbuf[XBUFSIZE];
  131. };
  132. static int do_mult_aead_op(struct test_mb_aead_data *data, int enc,
  133. u32 num_mb)
  134. {
  135. int i, rc[num_mb], err = 0;
  136. /* Fire up a bunch of concurrent requests */
  137. for (i = 0; i < num_mb; i++) {
  138. if (enc == ENCRYPT)
  139. rc[i] = crypto_aead_encrypt(data[i].req);
  140. else
  141. rc[i] = crypto_aead_decrypt(data[i].req);
  142. }
  143. /* Wait for all requests to finish */
  144. for (i = 0; i < num_mb; i++) {
  145. rc[i] = crypto_wait_req(rc[i], &data[i].wait);
  146. if (rc[i]) {
  147. pr_info("concurrent request %d error %d\n", i, rc[i]);
  148. err = rc[i];
  149. }
  150. }
  151. return err;
  152. }
  153. static int test_mb_aead_jiffies(struct test_mb_aead_data *data, int enc,
  154. int blen, int secs, u32 num_mb)
  155. {
  156. unsigned long start, end;
  157. int bcount;
  158. int ret;
  159. for (start = jiffies, end = start + secs * HZ, bcount = 0;
  160. time_before(jiffies, end); bcount++) {
  161. ret = do_mult_aead_op(data, enc, num_mb);
  162. if (ret)
  163. return ret;
  164. }
  165. pr_cont("%d operations in %d seconds (%ld bytes)\n",
  166. bcount * num_mb, secs, (long)bcount * blen * num_mb);
  167. return 0;
  168. }
  169. static int test_mb_aead_cycles(struct test_mb_aead_data *data, int enc,
  170. int blen, u32 num_mb)
  171. {
  172. unsigned long cycles = 0;
  173. int ret = 0;
  174. int i;
  175. /* Warm-up run. */
  176. for (i = 0; i < 4; i++) {
  177. ret = do_mult_aead_op(data, enc, num_mb);
  178. if (ret)
  179. goto out;
  180. }
  181. /* The real thing. */
  182. for (i = 0; i < 8; i++) {
  183. cycles_t start, end;
  184. start = get_cycles();
  185. ret = do_mult_aead_op(data, enc, num_mb);
  186. end = get_cycles();
  187. if (ret)
  188. goto out;
  189. cycles += end - start;
  190. }
  191. out:
  192. if (ret == 0)
  193. pr_cont("1 operation in %lu cycles (%d bytes)\n",
  194. (cycles + 4) / (8 * num_mb), blen);
  195. return ret;
  196. }
  197. static void test_mb_aead_speed(const char *algo, int enc, int secs,
  198. struct aead_speed_template *template,
  199. unsigned int tcount, u8 authsize,
  200. unsigned int aad_size, u8 *keysize, u32 num_mb)
  201. {
  202. struct test_mb_aead_data *data;
  203. struct crypto_aead *tfm;
  204. unsigned int i, j, iv_len;
  205. const char *key;
  206. const char *e;
  207. void *assoc;
  208. u32 *b_size;
  209. char *iv;
  210. int ret;
  211. if (aad_size >= PAGE_SIZE) {
  212. pr_err("associate data length (%u) too big\n", aad_size);
  213. return;
  214. }
  215. iv = kzalloc(MAX_IVLEN, GFP_KERNEL);
  216. if (!iv)
  217. return;
  218. if (enc == ENCRYPT)
  219. e = "encryption";
  220. else
  221. e = "decryption";
  222. data = kcalloc(num_mb, sizeof(*data), GFP_KERNEL);
  223. if (!data)
  224. goto out_free_iv;
  225. tfm = crypto_alloc_aead(algo, 0, 0);
  226. if (IS_ERR(tfm)) {
  227. pr_err("failed to load transform for %s: %ld\n",
  228. algo, PTR_ERR(tfm));
  229. goto out_free_data;
  230. }
  231. ret = crypto_aead_setauthsize(tfm, authsize);
  232. for (i = 0; i < num_mb; ++i)
  233. if (testmgr_alloc_buf(data[i].xbuf)) {
  234. while (i--)
  235. testmgr_free_buf(data[i].xbuf);
  236. goto out_free_tfm;
  237. }
  238. for (i = 0; i < num_mb; ++i)
  239. if (testmgr_alloc_buf(data[i].axbuf)) {
  240. while (i--)
  241. testmgr_free_buf(data[i].axbuf);
  242. goto out_free_xbuf;
  243. }
  244. for (i = 0; i < num_mb; ++i)
  245. if (testmgr_alloc_buf(data[i].xoutbuf)) {
  246. while (i--)
  247. testmgr_free_buf(data[i].xoutbuf);
  248. goto out_free_axbuf;
  249. }
  250. for (i = 0; i < num_mb; ++i) {
  251. data[i].req = aead_request_alloc(tfm, GFP_KERNEL);
  252. if (!data[i].req) {
  253. pr_err("alg: skcipher: Failed to allocate request for %s\n",
  254. algo);
  255. while (i--)
  256. aead_request_free(data[i].req);
  257. goto out_free_xoutbuf;
  258. }
  259. }
  260. for (i = 0; i < num_mb; ++i) {
  261. crypto_init_wait(&data[i].wait);
  262. aead_request_set_callback(data[i].req,
  263. CRYPTO_TFM_REQ_MAY_BACKLOG,
  264. crypto_req_done, &data[i].wait);
  265. }
  266. pr_info("\ntesting speed of multibuffer %s (%s) %s\n", algo,
  267. get_driver_name(crypto_aead, tfm), e);
  268. i = 0;
  269. do {
  270. b_size = aead_sizes;
  271. do {
  272. if (*b_size + authsize > XBUFSIZE * PAGE_SIZE) {
  273. pr_err("template (%u) too big for buffer (%lu)\n",
  274. authsize + *b_size,
  275. XBUFSIZE * PAGE_SIZE);
  276. goto out;
  277. }
  278. pr_info("test %u (%d bit key, %d byte blocks): ", i,
  279. *keysize * 8, *b_size);
  280. /* Set up tfm global state, i.e. the key */
  281. memset(tvmem[0], 0xff, PAGE_SIZE);
  282. key = tvmem[0];
  283. for (j = 0; j < tcount; j++) {
  284. if (template[j].klen == *keysize) {
  285. key = template[j].key;
  286. break;
  287. }
  288. }
  289. crypto_aead_clear_flags(tfm, ~0);
  290. ret = crypto_aead_setkey(tfm, key, *keysize);
  291. if (ret) {
  292. pr_err("setkey() failed flags=%x\n",
  293. crypto_aead_get_flags(tfm));
  294. goto out;
  295. }
  296. iv_len = crypto_aead_ivsize(tfm);
  297. if (iv_len)
  298. memset(iv, 0xff, iv_len);
  299. /* Now setup per request stuff, i.e. buffers */
  300. for (j = 0; j < num_mb; ++j) {
  301. struct test_mb_aead_data *cur = &data[j];
  302. assoc = cur->axbuf[0];
  303. memset(assoc, 0xff, aad_size);
  304. sg_init_aead(cur->sg, cur->xbuf,
  305. *b_size + (enc ? 0 : authsize),
  306. assoc, aad_size);
  307. sg_init_aead(cur->sgout, cur->xoutbuf,
  308. *b_size + (enc ? authsize : 0),
  309. assoc, aad_size);
  310. aead_request_set_ad(cur->req, aad_size);
  311. if (!enc) {
  312. aead_request_set_crypt(cur->req,
  313. cur->sgout,
  314. cur->sg,
  315. *b_size, iv);
  316. ret = crypto_aead_encrypt(cur->req);
  317. ret = do_one_aead_op(cur->req, ret);
  318. if (ret) {
  319. pr_err("calculating auth failed failed (%d)\n",
  320. ret);
  321. break;
  322. }
  323. }
  324. aead_request_set_crypt(cur->req, cur->sg,
  325. cur->sgout, *b_size +
  326. (enc ? 0 : authsize),
  327. iv);
  328. }
  329. if (secs)
  330. ret = test_mb_aead_jiffies(data, enc, *b_size,
  331. secs, num_mb);
  332. else
  333. ret = test_mb_aead_cycles(data, enc, *b_size,
  334. num_mb);
  335. if (ret) {
  336. pr_err("%s() failed return code=%d\n", e, ret);
  337. break;
  338. }
  339. b_size++;
  340. i++;
  341. } while (*b_size);
  342. keysize++;
  343. } while (*keysize);
  344. out:
  345. for (i = 0; i < num_mb; ++i)
  346. aead_request_free(data[i].req);
  347. out_free_xoutbuf:
  348. for (i = 0; i < num_mb; ++i)
  349. testmgr_free_buf(data[i].xoutbuf);
  350. out_free_axbuf:
  351. for (i = 0; i < num_mb; ++i)
  352. testmgr_free_buf(data[i].axbuf);
  353. out_free_xbuf:
  354. for (i = 0; i < num_mb; ++i)
  355. testmgr_free_buf(data[i].xbuf);
  356. out_free_tfm:
  357. crypto_free_aead(tfm);
  358. out_free_data:
  359. kfree(data);
  360. out_free_iv:
  361. kfree(iv);
  362. }
  363. static int test_aead_jiffies(struct aead_request *req, int enc,
  364. int blen, int secs)
  365. {
  366. unsigned long start, end;
  367. int bcount;
  368. int ret;
  369. for (start = jiffies, end = start + secs * HZ, bcount = 0;
  370. time_before(jiffies, end); bcount++) {
  371. if (enc)
  372. ret = do_one_aead_op(req, crypto_aead_encrypt(req));
  373. else
  374. ret = do_one_aead_op(req, crypto_aead_decrypt(req));
  375. if (ret)
  376. return ret;
  377. }
  378. printk("%d operations in %d seconds (%ld bytes)\n",
  379. bcount, secs, (long)bcount * blen);
  380. return 0;
  381. }
  382. static int test_aead_cycles(struct aead_request *req, int enc, int blen)
  383. {
  384. unsigned long cycles = 0;
  385. int ret = 0;
  386. int i;
  387. /* Warm-up run. */
  388. for (i = 0; i < 4; i++) {
  389. if (enc)
  390. ret = do_one_aead_op(req, crypto_aead_encrypt(req));
  391. else
  392. ret = do_one_aead_op(req, crypto_aead_decrypt(req));
  393. if (ret)
  394. goto out;
  395. }
  396. /* The real thing. */
  397. for (i = 0; i < 8; i++) {
  398. cycles_t start, end;
  399. start = get_cycles();
  400. if (enc)
  401. ret = do_one_aead_op(req, crypto_aead_encrypt(req));
  402. else
  403. ret = do_one_aead_op(req, crypto_aead_decrypt(req));
  404. end = get_cycles();
  405. if (ret)
  406. goto out;
  407. cycles += end - start;
  408. }
  409. out:
  410. if (ret == 0)
  411. printk("1 operation in %lu cycles (%d bytes)\n",
  412. (cycles + 4) / 8, blen);
  413. return ret;
  414. }
  415. static void test_aead_speed(const char *algo, int enc, unsigned int secs,
  416. struct aead_speed_template *template,
  417. unsigned int tcount, u8 authsize,
  418. unsigned int aad_size, u8 *keysize)
  419. {
  420. unsigned int i, j;
  421. struct crypto_aead *tfm;
  422. int ret = -ENOMEM;
  423. const char *key;
  424. struct aead_request *req;
  425. struct scatterlist *sg;
  426. struct scatterlist *sgout;
  427. const char *e;
  428. void *assoc;
  429. char *iv;
  430. char *xbuf[XBUFSIZE];
  431. char *xoutbuf[XBUFSIZE];
  432. char *axbuf[XBUFSIZE];
  433. unsigned int *b_size;
  434. unsigned int iv_len;
  435. struct crypto_wait wait;
  436. iv = kzalloc(MAX_IVLEN, GFP_KERNEL);
  437. if (!iv)
  438. return;
  439. if (aad_size >= PAGE_SIZE) {
  440. pr_err("associate data length (%u) too big\n", aad_size);
  441. goto out_noxbuf;
  442. }
  443. if (enc == ENCRYPT)
  444. e = "encryption";
  445. else
  446. e = "decryption";
  447. if (testmgr_alloc_buf(xbuf))
  448. goto out_noxbuf;
  449. if (testmgr_alloc_buf(axbuf))
  450. goto out_noaxbuf;
  451. if (testmgr_alloc_buf(xoutbuf))
  452. goto out_nooutbuf;
  453. sg = kmalloc(sizeof(*sg) * 9 * 2, GFP_KERNEL);
  454. if (!sg)
  455. goto out_nosg;
  456. sgout = &sg[9];
  457. tfm = crypto_alloc_aead(algo, 0, 0);
  458. if (IS_ERR(tfm)) {
  459. pr_err("alg: aead: Failed to load transform for %s: %ld\n", algo,
  460. PTR_ERR(tfm));
  461. goto out_notfm;
  462. }
  463. crypto_init_wait(&wait);
  464. printk(KERN_INFO "\ntesting speed of %s (%s) %s\n", algo,
  465. get_driver_name(crypto_aead, tfm), e);
  466. req = aead_request_alloc(tfm, GFP_KERNEL);
  467. if (!req) {
  468. pr_err("alg: aead: Failed to allocate request for %s\n",
  469. algo);
  470. goto out_noreq;
  471. }
  472. aead_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
  473. crypto_req_done, &wait);
  474. i = 0;
  475. do {
  476. b_size = aead_sizes;
  477. do {
  478. assoc = axbuf[0];
  479. memset(assoc, 0xff, aad_size);
  480. if ((*keysize + *b_size) > TVMEMSIZE * PAGE_SIZE) {
  481. pr_err("template (%u) too big for tvmem (%lu)\n",
  482. *keysize + *b_size,
  483. TVMEMSIZE * PAGE_SIZE);
  484. goto out;
  485. }
  486. key = tvmem[0];
  487. for (j = 0; j < tcount; j++) {
  488. if (template[j].klen == *keysize) {
  489. key = template[j].key;
  490. break;
  491. }
  492. }
  493. ret = crypto_aead_setkey(tfm, key, *keysize);
  494. ret = crypto_aead_setauthsize(tfm, authsize);
  495. iv_len = crypto_aead_ivsize(tfm);
  496. if (iv_len)
  497. memset(iv, 0xff, iv_len);
  498. crypto_aead_clear_flags(tfm, ~0);
  499. printk(KERN_INFO "test %u (%d bit key, %d byte blocks): ",
  500. i, *keysize * 8, *b_size);
  501. memset(tvmem[0], 0xff, PAGE_SIZE);
  502. if (ret) {
  503. pr_err("setkey() failed flags=%x\n",
  504. crypto_aead_get_flags(tfm));
  505. goto out;
  506. }
  507. sg_init_aead(sg, xbuf, *b_size + (enc ? 0 : authsize),
  508. assoc, aad_size);
  509. sg_init_aead(sgout, xoutbuf,
  510. *b_size + (enc ? authsize : 0), assoc,
  511. aad_size);
  512. aead_request_set_ad(req, aad_size);
  513. if (!enc) {
  514. /*
  515. * For decryption we need a proper auth so
  516. * we do the encryption path once with buffers
  517. * reversed (input <-> output) to calculate it
  518. */
  519. aead_request_set_crypt(req, sgout, sg,
  520. *b_size, iv);
  521. ret = do_one_aead_op(req,
  522. crypto_aead_encrypt(req));
  523. if (ret) {
  524. pr_err("calculating auth failed failed (%d)\n",
  525. ret);
  526. break;
  527. }
  528. }
  529. aead_request_set_crypt(req, sg, sgout,
  530. *b_size + (enc ? 0 : authsize),
  531. iv);
  532. if (secs)
  533. ret = test_aead_jiffies(req, enc, *b_size,
  534. secs);
  535. else
  536. ret = test_aead_cycles(req, enc, *b_size);
  537. if (ret) {
  538. pr_err("%s() failed return code=%d\n", e, ret);
  539. break;
  540. }
  541. b_size++;
  542. i++;
  543. } while (*b_size);
  544. keysize++;
  545. } while (*keysize);
  546. out:
  547. aead_request_free(req);
  548. out_noreq:
  549. crypto_free_aead(tfm);
  550. out_notfm:
  551. kfree(sg);
  552. out_nosg:
  553. testmgr_free_buf(xoutbuf);
  554. out_nooutbuf:
  555. testmgr_free_buf(axbuf);
  556. out_noaxbuf:
  557. testmgr_free_buf(xbuf);
  558. out_noxbuf:
  559. kfree(iv);
  560. }
  561. static void test_hash_sg_init(struct scatterlist *sg)
  562. {
  563. int i;
  564. sg_init_table(sg, TVMEMSIZE);
  565. for (i = 0; i < TVMEMSIZE; i++) {
  566. sg_set_buf(sg + i, tvmem[i], PAGE_SIZE);
  567. memset(tvmem[i], 0xff, PAGE_SIZE);
  568. }
  569. }
  570. static inline int do_one_ahash_op(struct ahash_request *req, int ret)
  571. {
  572. struct crypto_wait *wait = req->base.data;
  573. return crypto_wait_req(ret, wait);
  574. }
  575. struct test_mb_ahash_data {
  576. struct scatterlist sg[XBUFSIZE];
  577. char result[64];
  578. struct ahash_request *req;
  579. struct crypto_wait wait;
  580. char *xbuf[XBUFSIZE];
  581. };
  582. static inline int do_mult_ahash_op(struct test_mb_ahash_data *data, u32 num_mb)
  583. {
  584. int i, rc[num_mb], err = 0;
  585. /* Fire up a bunch of concurrent requests */
  586. for (i = 0; i < num_mb; i++)
  587. rc[i] = crypto_ahash_digest(data[i].req);
  588. /* Wait for all requests to finish */
  589. for (i = 0; i < num_mb; i++) {
  590. rc[i] = crypto_wait_req(rc[i], &data[i].wait);
  591. if (rc[i]) {
  592. pr_info("concurrent request %d error %d\n", i, rc[i]);
  593. err = rc[i];
  594. }
  595. }
  596. return err;
  597. }
  598. static int test_mb_ahash_jiffies(struct test_mb_ahash_data *data, int blen,
  599. int secs, u32 num_mb)
  600. {
  601. unsigned long start, end;
  602. int bcount;
  603. int ret;
  604. for (start = jiffies, end = start + secs * HZ, bcount = 0;
  605. time_before(jiffies, end); bcount++) {
  606. ret = do_mult_ahash_op(data, num_mb);
  607. if (ret)
  608. return ret;
  609. }
  610. pr_cont("%d operations in %d seconds (%ld bytes)\n",
  611. bcount * num_mb, secs, (long)bcount * blen * num_mb);
  612. return 0;
  613. }
  614. static int test_mb_ahash_cycles(struct test_mb_ahash_data *data, int blen,
  615. u32 num_mb)
  616. {
  617. unsigned long cycles = 0;
  618. int ret = 0;
  619. int i;
  620. /* Warm-up run. */
  621. for (i = 0; i < 4; i++) {
  622. ret = do_mult_ahash_op(data, num_mb);
  623. if (ret)
  624. goto out;
  625. }
  626. /* The real thing. */
  627. for (i = 0; i < 8; i++) {
  628. cycles_t start, end;
  629. start = get_cycles();
  630. ret = do_mult_ahash_op(data, num_mb);
  631. end = get_cycles();
  632. if (ret)
  633. goto out;
  634. cycles += end - start;
  635. }
  636. out:
  637. if (ret == 0)
  638. pr_cont("1 operation in %lu cycles (%d bytes)\n",
  639. (cycles + 4) / (8 * num_mb), blen);
  640. return ret;
  641. }
  642. static void test_mb_ahash_speed(const char *algo, unsigned int secs,
  643. struct hash_speed *speed, u32 num_mb)
  644. {
  645. struct test_mb_ahash_data *data;
  646. struct crypto_ahash *tfm;
  647. unsigned int i, j, k;
  648. int ret;
  649. data = kcalloc(num_mb, sizeof(*data), GFP_KERNEL);
  650. if (!data)
  651. return;
  652. tfm = crypto_alloc_ahash(algo, 0, 0);
  653. if (IS_ERR(tfm)) {
  654. pr_err("failed to load transform for %s: %ld\n",
  655. algo, PTR_ERR(tfm));
  656. goto free_data;
  657. }
  658. for (i = 0; i < num_mb; ++i) {
  659. if (testmgr_alloc_buf(data[i].xbuf))
  660. goto out;
  661. crypto_init_wait(&data[i].wait);
  662. data[i].req = ahash_request_alloc(tfm, GFP_KERNEL);
  663. if (!data[i].req) {
  664. pr_err("alg: hash: Failed to allocate request for %s\n",
  665. algo);
  666. goto out;
  667. }
  668. ahash_request_set_callback(data[i].req, 0, crypto_req_done,
  669. &data[i].wait);
  670. sg_init_table(data[i].sg, XBUFSIZE);
  671. for (j = 0; j < XBUFSIZE; j++) {
  672. sg_set_buf(data[i].sg + j, data[i].xbuf[j], PAGE_SIZE);
  673. memset(data[i].xbuf[j], 0xff, PAGE_SIZE);
  674. }
  675. }
  676. pr_info("\ntesting speed of multibuffer %s (%s)\n", algo,
  677. get_driver_name(crypto_ahash, tfm));
  678. for (i = 0; speed[i].blen != 0; i++) {
  679. /* For some reason this only tests digests. */
  680. if (speed[i].blen != speed[i].plen)
  681. continue;
  682. if (speed[i].blen > XBUFSIZE * PAGE_SIZE) {
  683. pr_err("template (%u) too big for tvmem (%lu)\n",
  684. speed[i].blen, XBUFSIZE * PAGE_SIZE);
  685. goto out;
  686. }
  687. if (speed[i].klen)
  688. crypto_ahash_setkey(tfm, tvmem[0], speed[i].klen);
  689. for (k = 0; k < num_mb; k++)
  690. ahash_request_set_crypt(data[k].req, data[k].sg,
  691. data[k].result, speed[i].blen);
  692. pr_info("test%3u "
  693. "(%5u byte blocks,%5u bytes per update,%4u updates): ",
  694. i, speed[i].blen, speed[i].plen,
  695. speed[i].blen / speed[i].plen);
  696. if (secs)
  697. ret = test_mb_ahash_jiffies(data, speed[i].blen, secs,
  698. num_mb);
  699. else
  700. ret = test_mb_ahash_cycles(data, speed[i].blen, num_mb);
  701. if (ret) {
  702. pr_err("At least one hashing failed ret=%d\n", ret);
  703. break;
  704. }
  705. }
  706. out:
  707. for (k = 0; k < num_mb; ++k)
  708. ahash_request_free(data[k].req);
  709. for (k = 0; k < num_mb; ++k)
  710. testmgr_free_buf(data[k].xbuf);
  711. crypto_free_ahash(tfm);
  712. free_data:
  713. kfree(data);
  714. }
  715. static int test_ahash_jiffies_digest(struct ahash_request *req, int blen,
  716. char *out, int secs)
  717. {
  718. unsigned long start, end;
  719. int bcount;
  720. int ret;
  721. for (start = jiffies, end = start + secs * HZ, bcount = 0;
  722. time_before(jiffies, end); bcount++) {
  723. ret = do_one_ahash_op(req, crypto_ahash_digest(req));
  724. if (ret)
  725. return ret;
  726. }
  727. printk("%6u opers/sec, %9lu bytes/sec\n",
  728. bcount / secs, ((long)bcount * blen) / secs);
  729. return 0;
  730. }
  731. static int test_ahash_jiffies(struct ahash_request *req, int blen,
  732. int plen, char *out, int secs)
  733. {
  734. unsigned long start, end;
  735. int bcount, pcount;
  736. int ret;
  737. if (plen == blen)
  738. return test_ahash_jiffies_digest(req, blen, out, secs);
  739. for (start = jiffies, end = start + secs * HZ, bcount = 0;
  740. time_before(jiffies, end); bcount++) {
  741. ret = do_one_ahash_op(req, crypto_ahash_init(req));
  742. if (ret)
  743. return ret;
  744. for (pcount = 0; pcount < blen; pcount += plen) {
  745. ret = do_one_ahash_op(req, crypto_ahash_update(req));
  746. if (ret)
  747. return ret;
  748. }
  749. /* we assume there is enough space in 'out' for the result */
  750. ret = do_one_ahash_op(req, crypto_ahash_final(req));
  751. if (ret)
  752. return ret;
  753. }
  754. pr_cont("%6u opers/sec, %9lu bytes/sec\n",
  755. bcount / secs, ((long)bcount * blen) / secs);
  756. return 0;
  757. }
  758. static int test_ahash_cycles_digest(struct ahash_request *req, int blen,
  759. char *out)
  760. {
  761. unsigned long cycles = 0;
  762. int ret, i;
  763. /* Warm-up run. */
  764. for (i = 0; i < 4; i++) {
  765. ret = do_one_ahash_op(req, crypto_ahash_digest(req));
  766. if (ret)
  767. goto out;
  768. }
  769. /* The real thing. */
  770. for (i = 0; i < 8; i++) {
  771. cycles_t start, end;
  772. start = get_cycles();
  773. ret = do_one_ahash_op(req, crypto_ahash_digest(req));
  774. if (ret)
  775. goto out;
  776. end = get_cycles();
  777. cycles += end - start;
  778. }
  779. out:
  780. if (ret)
  781. return ret;
  782. pr_cont("%6lu cycles/operation, %4lu cycles/byte\n",
  783. cycles / 8, cycles / (8 * blen));
  784. return 0;
  785. }
  786. static int test_ahash_cycles(struct ahash_request *req, int blen,
  787. int plen, char *out)
  788. {
  789. unsigned long cycles = 0;
  790. int i, pcount, ret;
  791. if (plen == blen)
  792. return test_ahash_cycles_digest(req, blen, out);
  793. /* Warm-up run. */
  794. for (i = 0; i < 4; i++) {
  795. ret = do_one_ahash_op(req, crypto_ahash_init(req));
  796. if (ret)
  797. goto out;
  798. for (pcount = 0; pcount < blen; pcount += plen) {
  799. ret = do_one_ahash_op(req, crypto_ahash_update(req));
  800. if (ret)
  801. goto out;
  802. }
  803. ret = do_one_ahash_op(req, crypto_ahash_final(req));
  804. if (ret)
  805. goto out;
  806. }
  807. /* The real thing. */
  808. for (i = 0; i < 8; i++) {
  809. cycles_t start, end;
  810. start = get_cycles();
  811. ret = do_one_ahash_op(req, crypto_ahash_init(req));
  812. if (ret)
  813. goto out;
  814. for (pcount = 0; pcount < blen; pcount += plen) {
  815. ret = do_one_ahash_op(req, crypto_ahash_update(req));
  816. if (ret)
  817. goto out;
  818. }
  819. ret = do_one_ahash_op(req, crypto_ahash_final(req));
  820. if (ret)
  821. goto out;
  822. end = get_cycles();
  823. cycles += end - start;
  824. }
  825. out:
  826. if (ret)
  827. return ret;
  828. pr_cont("%6lu cycles/operation, %4lu cycles/byte\n",
  829. cycles / 8, cycles / (8 * blen));
  830. return 0;
  831. }
  832. static void test_ahash_speed_common(const char *algo, unsigned int secs,
  833. struct hash_speed *speed, unsigned mask)
  834. {
  835. struct scatterlist sg[TVMEMSIZE];
  836. struct crypto_wait wait;
  837. struct ahash_request *req;
  838. struct crypto_ahash *tfm;
  839. char *output;
  840. int i, ret;
  841. tfm = crypto_alloc_ahash(algo, 0, mask);
  842. if (IS_ERR(tfm)) {
  843. pr_err("failed to load transform for %s: %ld\n",
  844. algo, PTR_ERR(tfm));
  845. return;
  846. }
  847. printk(KERN_INFO "\ntesting speed of async %s (%s)\n", algo,
  848. get_driver_name(crypto_ahash, tfm));
  849. if (crypto_ahash_digestsize(tfm) > MAX_DIGEST_SIZE) {
  850. pr_err("digestsize(%u) > %d\n", crypto_ahash_digestsize(tfm),
  851. MAX_DIGEST_SIZE);
  852. goto out;
  853. }
  854. test_hash_sg_init(sg);
  855. req = ahash_request_alloc(tfm, GFP_KERNEL);
  856. if (!req) {
  857. pr_err("ahash request allocation failure\n");
  858. goto out;
  859. }
  860. crypto_init_wait(&wait);
  861. ahash_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
  862. crypto_req_done, &wait);
  863. output = kmalloc(MAX_DIGEST_SIZE, GFP_KERNEL);
  864. if (!output)
  865. goto out_nomem;
  866. for (i = 0; speed[i].blen != 0; i++) {
  867. if (speed[i].blen > TVMEMSIZE * PAGE_SIZE) {
  868. pr_err("template (%u) too big for tvmem (%lu)\n",
  869. speed[i].blen, TVMEMSIZE * PAGE_SIZE);
  870. break;
  871. }
  872. pr_info("test%3u "
  873. "(%5u byte blocks,%5u bytes per update,%4u updates): ",
  874. i, speed[i].blen, speed[i].plen, speed[i].blen / speed[i].plen);
  875. ahash_request_set_crypt(req, sg, output, speed[i].plen);
  876. if (secs)
  877. ret = test_ahash_jiffies(req, speed[i].blen,
  878. speed[i].plen, output, secs);
  879. else
  880. ret = test_ahash_cycles(req, speed[i].blen,
  881. speed[i].plen, output);
  882. if (ret) {
  883. pr_err("hashing failed ret=%d\n", ret);
  884. break;
  885. }
  886. }
  887. kfree(output);
  888. out_nomem:
  889. ahash_request_free(req);
  890. out:
  891. crypto_free_ahash(tfm);
  892. }
  893. static void test_ahash_speed(const char *algo, unsigned int secs,
  894. struct hash_speed *speed)
  895. {
  896. return test_ahash_speed_common(algo, secs, speed, 0);
  897. }
  898. static void test_hash_speed(const char *algo, unsigned int secs,
  899. struct hash_speed *speed)
  900. {
  901. return test_ahash_speed_common(algo, secs, speed, CRYPTO_ALG_ASYNC);
  902. }
  903. struct test_mb_skcipher_data {
  904. struct scatterlist sg[XBUFSIZE];
  905. struct skcipher_request *req;
  906. struct crypto_wait wait;
  907. char *xbuf[XBUFSIZE];
  908. };
  909. static int do_mult_acipher_op(struct test_mb_skcipher_data *data, int enc,
  910. u32 num_mb)
  911. {
  912. int i, rc[num_mb], err = 0;
  913. /* Fire up a bunch of concurrent requests */
  914. for (i = 0; i < num_mb; i++) {
  915. if (enc == ENCRYPT)
  916. rc[i] = crypto_skcipher_encrypt(data[i].req);
  917. else
  918. rc[i] = crypto_skcipher_decrypt(data[i].req);
  919. }
  920. /* Wait for all requests to finish */
  921. for (i = 0; i < num_mb; i++) {
  922. rc[i] = crypto_wait_req(rc[i], &data[i].wait);
  923. if (rc[i]) {
  924. pr_info("concurrent request %d error %d\n", i, rc[i]);
  925. err = rc[i];
  926. }
  927. }
  928. return err;
  929. }
  930. static int test_mb_acipher_jiffies(struct test_mb_skcipher_data *data, int enc,
  931. int blen, int secs, u32 num_mb)
  932. {
  933. unsigned long start, end;
  934. int bcount;
  935. int ret;
  936. for (start = jiffies, end = start + secs * HZ, bcount = 0;
  937. time_before(jiffies, end); bcount++) {
  938. ret = do_mult_acipher_op(data, enc, num_mb);
  939. if (ret)
  940. return ret;
  941. }
  942. pr_cont("%d operations in %d seconds (%ld bytes)\n",
  943. bcount * num_mb, secs, (long)bcount * blen * num_mb);
  944. return 0;
  945. }
  946. static int test_mb_acipher_cycles(struct test_mb_skcipher_data *data, int enc,
  947. int blen, u32 num_mb)
  948. {
  949. unsigned long cycles = 0;
  950. int ret = 0;
  951. int i;
  952. /* Warm-up run. */
  953. for (i = 0; i < 4; i++) {
  954. ret = do_mult_acipher_op(data, enc, num_mb);
  955. if (ret)
  956. goto out;
  957. }
  958. /* The real thing. */
  959. for (i = 0; i < 8; i++) {
  960. cycles_t start, end;
  961. start = get_cycles();
  962. ret = do_mult_acipher_op(data, enc, num_mb);
  963. end = get_cycles();
  964. if (ret)
  965. goto out;
  966. cycles += end - start;
  967. }
  968. out:
  969. if (ret == 0)
  970. pr_cont("1 operation in %lu cycles (%d bytes)\n",
  971. (cycles + 4) / (8 * num_mb), blen);
  972. return ret;
  973. }
  974. static void test_mb_skcipher_speed(const char *algo, int enc, int secs,
  975. struct cipher_speed_template *template,
  976. unsigned int tcount, u8 *keysize, u32 num_mb)
  977. {
  978. struct test_mb_skcipher_data *data;
  979. struct crypto_skcipher *tfm;
  980. unsigned int i, j, iv_len;
  981. const char *key;
  982. const char *e;
  983. u32 *b_size;
  984. char iv[128];
  985. int ret;
  986. if (enc == ENCRYPT)
  987. e = "encryption";
  988. else
  989. e = "decryption";
  990. data = kcalloc(num_mb, sizeof(*data), GFP_KERNEL);
  991. if (!data)
  992. return;
  993. tfm = crypto_alloc_skcipher(algo, 0, 0);
  994. if (IS_ERR(tfm)) {
  995. pr_err("failed to load transform for %s: %ld\n",
  996. algo, PTR_ERR(tfm));
  997. goto out_free_data;
  998. }
  999. for (i = 0; i < num_mb; ++i)
  1000. if (testmgr_alloc_buf(data[i].xbuf)) {
  1001. while (i--)
  1002. testmgr_free_buf(data[i].xbuf);
  1003. goto out_free_tfm;
  1004. }
  1005. for (i = 0; i < num_mb; ++i)
  1006. if (testmgr_alloc_buf(data[i].xbuf)) {
  1007. while (i--)
  1008. testmgr_free_buf(data[i].xbuf);
  1009. goto out_free_tfm;
  1010. }
  1011. for (i = 0; i < num_mb; ++i) {
  1012. data[i].req = skcipher_request_alloc(tfm, GFP_KERNEL);
  1013. if (!data[i].req) {
  1014. pr_err("alg: skcipher: Failed to allocate request for %s\n",
  1015. algo);
  1016. while (i--)
  1017. skcipher_request_free(data[i].req);
  1018. goto out_free_xbuf;
  1019. }
  1020. }
  1021. for (i = 0; i < num_mb; ++i) {
  1022. skcipher_request_set_callback(data[i].req,
  1023. CRYPTO_TFM_REQ_MAY_BACKLOG,
  1024. crypto_req_done, &data[i].wait);
  1025. crypto_init_wait(&data[i].wait);
  1026. }
  1027. pr_info("\ntesting speed of multibuffer %s (%s) %s\n", algo,
  1028. get_driver_name(crypto_skcipher, tfm), e);
  1029. i = 0;
  1030. do {
  1031. b_size = block_sizes;
  1032. do {
  1033. if (*b_size > XBUFSIZE * PAGE_SIZE) {
  1034. pr_err("template (%u) too big for buffer (%lu)\n",
  1035. *b_size, XBUFSIZE * PAGE_SIZE);
  1036. goto out;
  1037. }
  1038. pr_info("test %u (%d bit key, %d byte blocks): ", i,
  1039. *keysize * 8, *b_size);
  1040. /* Set up tfm global state, i.e. the key */
  1041. memset(tvmem[0], 0xff, PAGE_SIZE);
  1042. key = tvmem[0];
  1043. for (j = 0; j < tcount; j++) {
  1044. if (template[j].klen == *keysize) {
  1045. key = template[j].key;
  1046. break;
  1047. }
  1048. }
  1049. crypto_skcipher_clear_flags(tfm, ~0);
  1050. ret = crypto_skcipher_setkey(tfm, key, *keysize);
  1051. if (ret) {
  1052. pr_err("setkey() failed flags=%x\n",
  1053. crypto_skcipher_get_flags(tfm));
  1054. goto out;
  1055. }
  1056. iv_len = crypto_skcipher_ivsize(tfm);
  1057. if (iv_len)
  1058. memset(&iv, 0xff, iv_len);
  1059. /* Now setup per request stuff, i.e. buffers */
  1060. for (j = 0; j < num_mb; ++j) {
  1061. struct test_mb_skcipher_data *cur = &data[j];
  1062. unsigned int k = *b_size;
  1063. unsigned int pages = DIV_ROUND_UP(k, PAGE_SIZE);
  1064. unsigned int p = 0;
  1065. sg_init_table(cur->sg, pages);
  1066. while (k > PAGE_SIZE) {
  1067. sg_set_buf(cur->sg + p, cur->xbuf[p],
  1068. PAGE_SIZE);
  1069. memset(cur->xbuf[p], 0xff, PAGE_SIZE);
  1070. p++;
  1071. k -= PAGE_SIZE;
  1072. }
  1073. sg_set_buf(cur->sg + p, cur->xbuf[p], k);
  1074. memset(cur->xbuf[p], 0xff, k);
  1075. skcipher_request_set_crypt(cur->req, cur->sg,
  1076. cur->sg, *b_size,
  1077. iv);
  1078. }
  1079. if (secs)
  1080. ret = test_mb_acipher_jiffies(data, enc,
  1081. *b_size, secs,
  1082. num_mb);
  1083. else
  1084. ret = test_mb_acipher_cycles(data, enc,
  1085. *b_size, num_mb);
  1086. if (ret) {
  1087. pr_err("%s() failed flags=%x\n", e,
  1088. crypto_skcipher_get_flags(tfm));
  1089. break;
  1090. }
  1091. b_size++;
  1092. i++;
  1093. } while (*b_size);
  1094. keysize++;
  1095. } while (*keysize);
  1096. out:
  1097. for (i = 0; i < num_mb; ++i)
  1098. skcipher_request_free(data[i].req);
  1099. out_free_xbuf:
  1100. for (i = 0; i < num_mb; ++i)
  1101. testmgr_free_buf(data[i].xbuf);
  1102. out_free_tfm:
  1103. crypto_free_skcipher(tfm);
  1104. out_free_data:
  1105. kfree(data);
  1106. }
  1107. static inline int do_one_acipher_op(struct skcipher_request *req, int ret)
  1108. {
  1109. struct crypto_wait *wait = req->base.data;
  1110. return crypto_wait_req(ret, wait);
  1111. }
  1112. static int test_acipher_jiffies(struct skcipher_request *req, int enc,
  1113. int blen, int secs)
  1114. {
  1115. unsigned long start, end;
  1116. int bcount;
  1117. int ret;
  1118. for (start = jiffies, end = start + secs * HZ, bcount = 0;
  1119. time_before(jiffies, end); bcount++) {
  1120. if (enc)
  1121. ret = do_one_acipher_op(req,
  1122. crypto_skcipher_encrypt(req));
  1123. else
  1124. ret = do_one_acipher_op(req,
  1125. crypto_skcipher_decrypt(req));
  1126. if (ret)
  1127. return ret;
  1128. }
  1129. pr_cont("%d operations in %d seconds (%ld bytes)\n",
  1130. bcount, secs, (long)bcount * blen);
  1131. return 0;
  1132. }
  1133. static int test_acipher_cycles(struct skcipher_request *req, int enc,
  1134. int blen)
  1135. {
  1136. unsigned long cycles = 0;
  1137. int ret = 0;
  1138. int i;
  1139. /* Warm-up run. */
  1140. for (i = 0; i < 4; i++) {
  1141. if (enc)
  1142. ret = do_one_acipher_op(req,
  1143. crypto_skcipher_encrypt(req));
  1144. else
  1145. ret = do_one_acipher_op(req,
  1146. crypto_skcipher_decrypt(req));
  1147. if (ret)
  1148. goto out;
  1149. }
  1150. /* The real thing. */
  1151. for (i = 0; i < 8; i++) {
  1152. cycles_t start, end;
  1153. start = get_cycles();
  1154. if (enc)
  1155. ret = do_one_acipher_op(req,
  1156. crypto_skcipher_encrypt(req));
  1157. else
  1158. ret = do_one_acipher_op(req,
  1159. crypto_skcipher_decrypt(req));
  1160. end = get_cycles();
  1161. if (ret)
  1162. goto out;
  1163. cycles += end - start;
  1164. }
  1165. out:
  1166. if (ret == 0)
  1167. pr_cont("1 operation in %lu cycles (%d bytes)\n",
  1168. (cycles + 4) / 8, blen);
  1169. return ret;
  1170. }
  1171. static void test_skcipher_speed(const char *algo, int enc, unsigned int secs,
  1172. struct cipher_speed_template *template,
  1173. unsigned int tcount, u8 *keysize, bool async)
  1174. {
  1175. unsigned int ret, i, j, k, iv_len;
  1176. struct crypto_wait wait;
  1177. const char *key;
  1178. char iv[128];
  1179. struct skcipher_request *req;
  1180. struct crypto_skcipher *tfm;
  1181. const char *e;
  1182. u32 *b_size;
  1183. if (enc == ENCRYPT)
  1184. e = "encryption";
  1185. else
  1186. e = "decryption";
  1187. crypto_init_wait(&wait);
  1188. tfm = crypto_alloc_skcipher(algo, 0, async ? 0 : CRYPTO_ALG_ASYNC);
  1189. if (IS_ERR(tfm)) {
  1190. pr_err("failed to load transform for %s: %ld\n", algo,
  1191. PTR_ERR(tfm));
  1192. return;
  1193. }
  1194. pr_info("\ntesting speed of async %s (%s) %s\n", algo,
  1195. get_driver_name(crypto_skcipher, tfm), e);
  1196. req = skcipher_request_alloc(tfm, GFP_KERNEL);
  1197. if (!req) {
  1198. pr_err("tcrypt: skcipher: Failed to allocate request for %s\n",
  1199. algo);
  1200. goto out;
  1201. }
  1202. skcipher_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
  1203. crypto_req_done, &wait);
  1204. i = 0;
  1205. do {
  1206. b_size = block_sizes;
  1207. do {
  1208. struct scatterlist sg[TVMEMSIZE];
  1209. if ((*keysize + *b_size) > TVMEMSIZE * PAGE_SIZE) {
  1210. pr_err("template (%u) too big for "
  1211. "tvmem (%lu)\n", *keysize + *b_size,
  1212. TVMEMSIZE * PAGE_SIZE);
  1213. goto out_free_req;
  1214. }
  1215. pr_info("test %u (%d bit key, %d byte blocks): ", i,
  1216. *keysize * 8, *b_size);
  1217. memset(tvmem[0], 0xff, PAGE_SIZE);
  1218. /* set key, plain text and IV */
  1219. key = tvmem[0];
  1220. for (j = 0; j < tcount; j++) {
  1221. if (template[j].klen == *keysize) {
  1222. key = template[j].key;
  1223. break;
  1224. }
  1225. }
  1226. crypto_skcipher_clear_flags(tfm, ~0);
  1227. ret = crypto_skcipher_setkey(tfm, key, *keysize);
  1228. if (ret) {
  1229. pr_err("setkey() failed flags=%x\n",
  1230. crypto_skcipher_get_flags(tfm));
  1231. goto out_free_req;
  1232. }
  1233. k = *keysize + *b_size;
  1234. sg_init_table(sg, DIV_ROUND_UP(k, PAGE_SIZE));
  1235. if (k > PAGE_SIZE) {
  1236. sg_set_buf(sg, tvmem[0] + *keysize,
  1237. PAGE_SIZE - *keysize);
  1238. k -= PAGE_SIZE;
  1239. j = 1;
  1240. while (k > PAGE_SIZE) {
  1241. sg_set_buf(sg + j, tvmem[j], PAGE_SIZE);
  1242. memset(tvmem[j], 0xff, PAGE_SIZE);
  1243. j++;
  1244. k -= PAGE_SIZE;
  1245. }
  1246. sg_set_buf(sg + j, tvmem[j], k);
  1247. memset(tvmem[j], 0xff, k);
  1248. } else {
  1249. sg_set_buf(sg, tvmem[0] + *keysize, *b_size);
  1250. }
  1251. iv_len = crypto_skcipher_ivsize(tfm);
  1252. if (iv_len)
  1253. memset(&iv, 0xff, iv_len);
  1254. skcipher_request_set_crypt(req, sg, sg, *b_size, iv);
  1255. if (secs)
  1256. ret = test_acipher_jiffies(req, enc,
  1257. *b_size, secs);
  1258. else
  1259. ret = test_acipher_cycles(req, enc,
  1260. *b_size);
  1261. if (ret) {
  1262. pr_err("%s() failed flags=%x\n", e,
  1263. crypto_skcipher_get_flags(tfm));
  1264. break;
  1265. }
  1266. b_size++;
  1267. i++;
  1268. } while (*b_size);
  1269. keysize++;
  1270. } while (*keysize);
  1271. out_free_req:
  1272. skcipher_request_free(req);
  1273. out:
  1274. crypto_free_skcipher(tfm);
  1275. }
  1276. static void test_acipher_speed(const char *algo, int enc, unsigned int secs,
  1277. struct cipher_speed_template *template,
  1278. unsigned int tcount, u8 *keysize)
  1279. {
  1280. return test_skcipher_speed(algo, enc, secs, template, tcount, keysize,
  1281. true);
  1282. }
  1283. static void test_cipher_speed(const char *algo, int enc, unsigned int secs,
  1284. struct cipher_speed_template *template,
  1285. unsigned int tcount, u8 *keysize)
  1286. {
  1287. return test_skcipher_speed(algo, enc, secs, template, tcount, keysize,
  1288. false);
  1289. }
  1290. static void test_available(void)
  1291. {
  1292. char **name = check;
  1293. while (*name) {
  1294. printk("alg %s ", *name);
  1295. printk(crypto_has_alg(*name, 0, 0) ?
  1296. "found\n" : "not found\n");
  1297. name++;
  1298. }
  1299. }
  1300. static inline int tcrypt_test(const char *alg)
  1301. {
  1302. int ret;
  1303. pr_debug("testing %s\n", alg);
  1304. ret = alg_test(alg, alg, 0, 0);
  1305. /* non-fips algs return -EINVAL in fips mode */
  1306. if (fips_enabled && ret == -EINVAL)
  1307. ret = 0;
  1308. return ret;
  1309. }
  1310. static int do_test(const char *alg, u32 type, u32 mask, int m)
  1311. {
  1312. int i;
  1313. int ret = 0;
  1314. switch (m) {
  1315. case 0:
  1316. if (alg) {
  1317. if (!crypto_has_alg(alg, type,
  1318. mask ?: CRYPTO_ALG_TYPE_MASK))
  1319. ret = -ENOENT;
  1320. break;
  1321. }
  1322. for (i = 1; i < 200; i++)
  1323. ret += do_test(NULL, 0, 0, i);
  1324. break;
  1325. case 1:
  1326. ret += tcrypt_test("md5");
  1327. break;
  1328. case 2:
  1329. ret += tcrypt_test("sha1");
  1330. break;
  1331. case 3:
  1332. ret += tcrypt_test("ecb(des)");
  1333. ret += tcrypt_test("cbc(des)");
  1334. ret += tcrypt_test("ctr(des)");
  1335. break;
  1336. case 4:
  1337. ret += tcrypt_test("ecb(des3_ede)");
  1338. ret += tcrypt_test("cbc(des3_ede)");
  1339. ret += tcrypt_test("ctr(des3_ede)");
  1340. break;
  1341. case 5:
  1342. ret += tcrypt_test("md4");
  1343. break;
  1344. case 6:
  1345. ret += tcrypt_test("sha256");
  1346. break;
  1347. case 7:
  1348. ret += tcrypt_test("ecb(blowfish)");
  1349. ret += tcrypt_test("cbc(blowfish)");
  1350. ret += tcrypt_test("ctr(blowfish)");
  1351. break;
  1352. case 8:
  1353. ret += tcrypt_test("ecb(twofish)");
  1354. ret += tcrypt_test("cbc(twofish)");
  1355. ret += tcrypt_test("ctr(twofish)");
  1356. ret += tcrypt_test("lrw(twofish)");
  1357. ret += tcrypt_test("xts(twofish)");
  1358. break;
  1359. case 9:
  1360. ret += tcrypt_test("ecb(serpent)");
  1361. ret += tcrypt_test("cbc(serpent)");
  1362. ret += tcrypt_test("ctr(serpent)");
  1363. ret += tcrypt_test("lrw(serpent)");
  1364. ret += tcrypt_test("xts(serpent)");
  1365. break;
  1366. case 10:
  1367. ret += tcrypt_test("ecb(aes)");
  1368. ret += tcrypt_test("cbc(aes)");
  1369. ret += tcrypt_test("lrw(aes)");
  1370. ret += tcrypt_test("xts(aes)");
  1371. ret += tcrypt_test("ctr(aes)");
  1372. ret += tcrypt_test("rfc3686(ctr(aes))");
  1373. break;
  1374. case 11:
  1375. ret += tcrypt_test("sha384");
  1376. break;
  1377. case 12:
  1378. ret += tcrypt_test("sha512");
  1379. break;
  1380. case 13:
  1381. ret += tcrypt_test("deflate");
  1382. break;
  1383. case 14:
  1384. ret += tcrypt_test("ecb(cast5)");
  1385. ret += tcrypt_test("cbc(cast5)");
  1386. ret += tcrypt_test("ctr(cast5)");
  1387. break;
  1388. case 15:
  1389. ret += tcrypt_test("ecb(cast6)");
  1390. ret += tcrypt_test("cbc(cast6)");
  1391. ret += tcrypt_test("ctr(cast6)");
  1392. ret += tcrypt_test("lrw(cast6)");
  1393. ret += tcrypt_test("xts(cast6)");
  1394. break;
  1395. case 16:
  1396. ret += tcrypt_test("ecb(arc4)");
  1397. break;
  1398. case 17:
  1399. ret += tcrypt_test("michael_mic");
  1400. break;
  1401. case 18:
  1402. ret += tcrypt_test("crc32c");
  1403. break;
  1404. case 19:
  1405. ret += tcrypt_test("ecb(tea)");
  1406. break;
  1407. case 20:
  1408. ret += tcrypt_test("ecb(xtea)");
  1409. break;
  1410. case 21:
  1411. ret += tcrypt_test("ecb(khazad)");
  1412. break;
  1413. case 22:
  1414. ret += tcrypt_test("wp512");
  1415. break;
  1416. case 23:
  1417. ret += tcrypt_test("wp384");
  1418. break;
  1419. case 24:
  1420. ret += tcrypt_test("wp256");
  1421. break;
  1422. case 25:
  1423. ret += tcrypt_test("ecb(tnepres)");
  1424. break;
  1425. case 26:
  1426. ret += tcrypt_test("ecb(anubis)");
  1427. ret += tcrypt_test("cbc(anubis)");
  1428. break;
  1429. case 27:
  1430. ret += tcrypt_test("tgr192");
  1431. break;
  1432. case 28:
  1433. ret += tcrypt_test("tgr160");
  1434. break;
  1435. case 29:
  1436. ret += tcrypt_test("tgr128");
  1437. break;
  1438. case 30:
  1439. ret += tcrypt_test("ecb(xeta)");
  1440. break;
  1441. case 31:
  1442. ret += tcrypt_test("pcbc(fcrypt)");
  1443. break;
  1444. case 32:
  1445. ret += tcrypt_test("ecb(camellia)");
  1446. ret += tcrypt_test("cbc(camellia)");
  1447. ret += tcrypt_test("ctr(camellia)");
  1448. ret += tcrypt_test("lrw(camellia)");
  1449. ret += tcrypt_test("xts(camellia)");
  1450. break;
  1451. case 33:
  1452. ret += tcrypt_test("sha224");
  1453. break;
  1454. case 34:
  1455. ret += tcrypt_test("salsa20");
  1456. break;
  1457. case 35:
  1458. ret += tcrypt_test("gcm(aes)");
  1459. break;
  1460. case 36:
  1461. ret += tcrypt_test("lzo");
  1462. break;
  1463. case 37:
  1464. ret += tcrypt_test("ccm(aes)");
  1465. break;
  1466. case 38:
  1467. ret += tcrypt_test("cts(cbc(aes))");
  1468. break;
  1469. case 39:
  1470. ret += tcrypt_test("rmd128");
  1471. break;
  1472. case 40:
  1473. ret += tcrypt_test("rmd160");
  1474. break;
  1475. case 41:
  1476. ret += tcrypt_test("rmd256");
  1477. break;
  1478. case 42:
  1479. ret += tcrypt_test("rmd320");
  1480. break;
  1481. case 43:
  1482. ret += tcrypt_test("ecb(seed)");
  1483. break;
  1484. case 44:
  1485. ret += tcrypt_test("zlib");
  1486. break;
  1487. case 45:
  1488. ret += tcrypt_test("rfc4309(ccm(aes))");
  1489. break;
  1490. case 46:
  1491. ret += tcrypt_test("ghash");
  1492. break;
  1493. case 47:
  1494. ret += tcrypt_test("crct10dif");
  1495. break;
  1496. case 48:
  1497. ret += tcrypt_test("sha3-224");
  1498. break;
  1499. case 49:
  1500. ret += tcrypt_test("sha3-256");
  1501. break;
  1502. case 50:
  1503. ret += tcrypt_test("sha3-384");
  1504. break;
  1505. case 51:
  1506. ret += tcrypt_test("sha3-512");
  1507. break;
  1508. case 52:
  1509. ret += tcrypt_test("sm3");
  1510. break;
  1511. case 100:
  1512. ret += tcrypt_test("hmac(md5)");
  1513. break;
  1514. case 101:
  1515. ret += tcrypt_test("hmac(sha1)");
  1516. break;
  1517. case 102:
  1518. ret += tcrypt_test("hmac(sha256)");
  1519. break;
  1520. case 103:
  1521. ret += tcrypt_test("hmac(sha384)");
  1522. break;
  1523. case 104:
  1524. ret += tcrypt_test("hmac(sha512)");
  1525. break;
  1526. case 105:
  1527. ret += tcrypt_test("hmac(sha224)");
  1528. break;
  1529. case 106:
  1530. ret += tcrypt_test("xcbc(aes)");
  1531. break;
  1532. case 107:
  1533. ret += tcrypt_test("hmac(rmd128)");
  1534. break;
  1535. case 108:
  1536. ret += tcrypt_test("hmac(rmd160)");
  1537. break;
  1538. case 109:
  1539. ret += tcrypt_test("vmac(aes)");
  1540. break;
  1541. case 110:
  1542. ret += tcrypt_test("hmac(crc32)");
  1543. break;
  1544. case 111:
  1545. ret += tcrypt_test("hmac(sha3-224)");
  1546. break;
  1547. case 112:
  1548. ret += tcrypt_test("hmac(sha3-256)");
  1549. break;
  1550. case 113:
  1551. ret += tcrypt_test("hmac(sha3-384)");
  1552. break;
  1553. case 114:
  1554. ret += tcrypt_test("hmac(sha3-512)");
  1555. break;
  1556. case 150:
  1557. ret += tcrypt_test("ansi_cprng");
  1558. break;
  1559. case 151:
  1560. ret += tcrypt_test("rfc4106(gcm(aes))");
  1561. break;
  1562. case 152:
  1563. ret += tcrypt_test("rfc4543(gcm(aes))");
  1564. break;
  1565. case 153:
  1566. ret += tcrypt_test("cmac(aes)");
  1567. break;
  1568. case 154:
  1569. ret += tcrypt_test("cmac(des3_ede)");
  1570. break;
  1571. case 155:
  1572. ret += tcrypt_test("authenc(hmac(sha1),cbc(aes))");
  1573. break;
  1574. case 156:
  1575. ret += tcrypt_test("authenc(hmac(md5),ecb(cipher_null))");
  1576. break;
  1577. case 157:
  1578. ret += tcrypt_test("authenc(hmac(sha1),ecb(cipher_null))");
  1579. break;
  1580. case 181:
  1581. ret += tcrypt_test("authenc(hmac(sha1),cbc(des))");
  1582. break;
  1583. case 182:
  1584. ret += tcrypt_test("authenc(hmac(sha1),cbc(des3_ede))");
  1585. break;
  1586. case 183:
  1587. ret += tcrypt_test("authenc(hmac(sha224),cbc(des))");
  1588. break;
  1589. case 184:
  1590. ret += tcrypt_test("authenc(hmac(sha224),cbc(des3_ede))");
  1591. break;
  1592. case 185:
  1593. ret += tcrypt_test("authenc(hmac(sha256),cbc(des))");
  1594. break;
  1595. case 186:
  1596. ret += tcrypt_test("authenc(hmac(sha256),cbc(des3_ede))");
  1597. break;
  1598. case 187:
  1599. ret += tcrypt_test("authenc(hmac(sha384),cbc(des))");
  1600. break;
  1601. case 188:
  1602. ret += tcrypt_test("authenc(hmac(sha384),cbc(des3_ede))");
  1603. break;
  1604. case 189:
  1605. ret += tcrypt_test("authenc(hmac(sha512),cbc(des))");
  1606. break;
  1607. case 190:
  1608. ret += tcrypt_test("authenc(hmac(sha512),cbc(des3_ede))");
  1609. break;
  1610. case 191:
  1611. ret += tcrypt_test("ecb(sm4)");
  1612. break;
  1613. case 200:
  1614. test_cipher_speed("ecb(aes)", ENCRYPT, sec, NULL, 0,
  1615. speed_template_16_24_32);
  1616. test_cipher_speed("ecb(aes)", DECRYPT, sec, NULL, 0,
  1617. speed_template_16_24_32);
  1618. test_cipher_speed("cbc(aes)", ENCRYPT, sec, NULL, 0,
  1619. speed_template_16_24_32);
  1620. test_cipher_speed("cbc(aes)", DECRYPT, sec, NULL, 0,
  1621. speed_template_16_24_32);
  1622. test_cipher_speed("lrw(aes)", ENCRYPT, sec, NULL, 0,
  1623. speed_template_32_40_48);
  1624. test_cipher_speed("lrw(aes)", DECRYPT, sec, NULL, 0,
  1625. speed_template_32_40_48);
  1626. test_cipher_speed("xts(aes)", ENCRYPT, sec, NULL, 0,
  1627. speed_template_32_64);
  1628. test_cipher_speed("xts(aes)", DECRYPT, sec, NULL, 0,
  1629. speed_template_32_64);
  1630. test_cipher_speed("cts(cbc(aes))", ENCRYPT, sec, NULL, 0,
  1631. speed_template_16_24_32);
  1632. test_cipher_speed("cts(cbc(aes))", DECRYPT, sec, NULL, 0,
  1633. speed_template_16_24_32);
  1634. test_cipher_speed("ctr(aes)", ENCRYPT, sec, NULL, 0,
  1635. speed_template_16_24_32);
  1636. test_cipher_speed("ctr(aes)", DECRYPT, sec, NULL, 0,
  1637. speed_template_16_24_32);
  1638. break;
  1639. case 201:
  1640. test_cipher_speed("ecb(des3_ede)", ENCRYPT, sec,
  1641. des3_speed_template, DES3_SPEED_VECTORS,
  1642. speed_template_24);
  1643. test_cipher_speed("ecb(des3_ede)", DECRYPT, sec,
  1644. des3_speed_template, DES3_SPEED_VECTORS,
  1645. speed_template_24);
  1646. test_cipher_speed("cbc(des3_ede)", ENCRYPT, sec,
  1647. des3_speed_template, DES3_SPEED_VECTORS,
  1648. speed_template_24);
  1649. test_cipher_speed("cbc(des3_ede)", DECRYPT, sec,
  1650. des3_speed_template, DES3_SPEED_VECTORS,
  1651. speed_template_24);
  1652. test_cipher_speed("ctr(des3_ede)", ENCRYPT, sec,
  1653. des3_speed_template, DES3_SPEED_VECTORS,
  1654. speed_template_24);
  1655. test_cipher_speed("ctr(des3_ede)", DECRYPT, sec,
  1656. des3_speed_template, DES3_SPEED_VECTORS,
  1657. speed_template_24);
  1658. break;
  1659. case 202:
  1660. test_cipher_speed("ecb(twofish)", ENCRYPT, sec, NULL, 0,
  1661. speed_template_16_24_32);
  1662. test_cipher_speed("ecb(twofish)", DECRYPT, sec, NULL, 0,
  1663. speed_template_16_24_32);
  1664. test_cipher_speed("cbc(twofish)", ENCRYPT, sec, NULL, 0,
  1665. speed_template_16_24_32);
  1666. test_cipher_speed("cbc(twofish)", DECRYPT, sec, NULL, 0,
  1667. speed_template_16_24_32);
  1668. test_cipher_speed("ctr(twofish)", ENCRYPT, sec, NULL, 0,
  1669. speed_template_16_24_32);
  1670. test_cipher_speed("ctr(twofish)", DECRYPT, sec, NULL, 0,
  1671. speed_template_16_24_32);
  1672. test_cipher_speed("lrw(twofish)", ENCRYPT, sec, NULL, 0,
  1673. speed_template_32_40_48);
  1674. test_cipher_speed("lrw(twofish)", DECRYPT, sec, NULL, 0,
  1675. speed_template_32_40_48);
  1676. test_cipher_speed("xts(twofish)", ENCRYPT, sec, NULL, 0,
  1677. speed_template_32_48_64);
  1678. test_cipher_speed("xts(twofish)", DECRYPT, sec, NULL, 0,
  1679. speed_template_32_48_64);
  1680. break;
  1681. case 203:
  1682. test_cipher_speed("ecb(blowfish)", ENCRYPT, sec, NULL, 0,
  1683. speed_template_8_32);
  1684. test_cipher_speed("ecb(blowfish)", DECRYPT, sec, NULL, 0,
  1685. speed_template_8_32);
  1686. test_cipher_speed("cbc(blowfish)", ENCRYPT, sec, NULL, 0,
  1687. speed_template_8_32);
  1688. test_cipher_speed("cbc(blowfish)", DECRYPT, sec, NULL, 0,
  1689. speed_template_8_32);
  1690. test_cipher_speed("ctr(blowfish)", ENCRYPT, sec, NULL, 0,
  1691. speed_template_8_32);
  1692. test_cipher_speed("ctr(blowfish)", DECRYPT, sec, NULL, 0,
  1693. speed_template_8_32);
  1694. break;
  1695. case 204:
  1696. test_cipher_speed("ecb(des)", ENCRYPT, sec, NULL, 0,
  1697. speed_template_8);
  1698. test_cipher_speed("ecb(des)", DECRYPT, sec, NULL, 0,
  1699. speed_template_8);
  1700. test_cipher_speed("cbc(des)", ENCRYPT, sec, NULL, 0,
  1701. speed_template_8);
  1702. test_cipher_speed("cbc(des)", DECRYPT, sec, NULL, 0,
  1703. speed_template_8);
  1704. break;
  1705. case 205:
  1706. test_cipher_speed("ecb(camellia)", ENCRYPT, sec, NULL, 0,
  1707. speed_template_16_24_32);
  1708. test_cipher_speed("ecb(camellia)", DECRYPT, sec, NULL, 0,
  1709. speed_template_16_24_32);
  1710. test_cipher_speed("cbc(camellia)", ENCRYPT, sec, NULL, 0,
  1711. speed_template_16_24_32);
  1712. test_cipher_speed("cbc(camellia)", DECRYPT, sec, NULL, 0,
  1713. speed_template_16_24_32);
  1714. test_cipher_speed("ctr(camellia)", ENCRYPT, sec, NULL, 0,
  1715. speed_template_16_24_32);
  1716. test_cipher_speed("ctr(camellia)", DECRYPT, sec, NULL, 0,
  1717. speed_template_16_24_32);
  1718. test_cipher_speed("lrw(camellia)", ENCRYPT, sec, NULL, 0,
  1719. speed_template_32_40_48);
  1720. test_cipher_speed("lrw(camellia)", DECRYPT, sec, NULL, 0,
  1721. speed_template_32_40_48);
  1722. test_cipher_speed("xts(camellia)", ENCRYPT, sec, NULL, 0,
  1723. speed_template_32_48_64);
  1724. test_cipher_speed("xts(camellia)", DECRYPT, sec, NULL, 0,
  1725. speed_template_32_48_64);
  1726. break;
  1727. case 206:
  1728. test_cipher_speed("salsa20", ENCRYPT, sec, NULL, 0,
  1729. speed_template_16_32);
  1730. break;
  1731. case 207:
  1732. test_cipher_speed("ecb(serpent)", ENCRYPT, sec, NULL, 0,
  1733. speed_template_16_32);
  1734. test_cipher_speed("ecb(serpent)", DECRYPT, sec, NULL, 0,
  1735. speed_template_16_32);
  1736. test_cipher_speed("cbc(serpent)", ENCRYPT, sec, NULL, 0,
  1737. speed_template_16_32);
  1738. test_cipher_speed("cbc(serpent)", DECRYPT, sec, NULL, 0,
  1739. speed_template_16_32);
  1740. test_cipher_speed("ctr(serpent)", ENCRYPT, sec, NULL, 0,
  1741. speed_template_16_32);
  1742. test_cipher_speed("ctr(serpent)", DECRYPT, sec, NULL, 0,
  1743. speed_template_16_32);
  1744. test_cipher_speed("lrw(serpent)", ENCRYPT, sec, NULL, 0,
  1745. speed_template_32_48);
  1746. test_cipher_speed("lrw(serpent)", DECRYPT, sec, NULL, 0,
  1747. speed_template_32_48);
  1748. test_cipher_speed("xts(serpent)", ENCRYPT, sec, NULL, 0,
  1749. speed_template_32_64);
  1750. test_cipher_speed("xts(serpent)", DECRYPT, sec, NULL, 0,
  1751. speed_template_32_64);
  1752. break;
  1753. case 208:
  1754. test_cipher_speed("ecb(arc4)", ENCRYPT, sec, NULL, 0,
  1755. speed_template_8);
  1756. break;
  1757. case 209:
  1758. test_cipher_speed("ecb(cast5)", ENCRYPT, sec, NULL, 0,
  1759. speed_template_8_16);
  1760. test_cipher_speed("ecb(cast5)", DECRYPT, sec, NULL, 0,
  1761. speed_template_8_16);
  1762. test_cipher_speed("cbc(cast5)", ENCRYPT, sec, NULL, 0,
  1763. speed_template_8_16);
  1764. test_cipher_speed("cbc(cast5)", DECRYPT, sec, NULL, 0,
  1765. speed_template_8_16);
  1766. test_cipher_speed("ctr(cast5)", ENCRYPT, sec, NULL, 0,
  1767. speed_template_8_16);
  1768. test_cipher_speed("ctr(cast5)", DECRYPT, sec, NULL, 0,
  1769. speed_template_8_16);
  1770. break;
  1771. case 210:
  1772. test_cipher_speed("ecb(cast6)", ENCRYPT, sec, NULL, 0,
  1773. speed_template_16_32);
  1774. test_cipher_speed("ecb(cast6)", DECRYPT, sec, NULL, 0,
  1775. speed_template_16_32);
  1776. test_cipher_speed("cbc(cast6)", ENCRYPT, sec, NULL, 0,
  1777. speed_template_16_32);
  1778. test_cipher_speed("cbc(cast6)", DECRYPT, sec, NULL, 0,
  1779. speed_template_16_32);
  1780. test_cipher_speed("ctr(cast6)", ENCRYPT, sec, NULL, 0,
  1781. speed_template_16_32);
  1782. test_cipher_speed("ctr(cast6)", DECRYPT, sec, NULL, 0,
  1783. speed_template_16_32);
  1784. test_cipher_speed("lrw(cast6)", ENCRYPT, sec, NULL, 0,
  1785. speed_template_32_48);
  1786. test_cipher_speed("lrw(cast6)", DECRYPT, sec, NULL, 0,
  1787. speed_template_32_48);
  1788. test_cipher_speed("xts(cast6)", ENCRYPT, sec, NULL, 0,
  1789. speed_template_32_64);
  1790. test_cipher_speed("xts(cast6)", DECRYPT, sec, NULL, 0,
  1791. speed_template_32_64);
  1792. break;
  1793. case 211:
  1794. test_aead_speed("rfc4106(gcm(aes))", ENCRYPT, sec,
  1795. NULL, 0, 16, 16, aead_speed_template_20);
  1796. test_aead_speed("gcm(aes)", ENCRYPT, sec,
  1797. NULL, 0, 16, 8, speed_template_16_24_32);
  1798. test_aead_speed("rfc4106(gcm(aes))", DECRYPT, sec,
  1799. NULL, 0, 16, 16, aead_speed_template_20);
  1800. test_aead_speed("gcm(aes)", DECRYPT, sec,
  1801. NULL, 0, 16, 8, speed_template_16_24_32);
  1802. break;
  1803. case 212:
  1804. test_aead_speed("rfc4309(ccm(aes))", ENCRYPT, sec,
  1805. NULL, 0, 16, 16, aead_speed_template_19);
  1806. test_aead_speed("rfc4309(ccm(aes))", DECRYPT, sec,
  1807. NULL, 0, 16, 16, aead_speed_template_19);
  1808. break;
  1809. case 213:
  1810. test_aead_speed("rfc7539esp(chacha20,poly1305)", ENCRYPT, sec,
  1811. NULL, 0, 16, 8, aead_speed_template_36);
  1812. test_aead_speed("rfc7539esp(chacha20,poly1305)", DECRYPT, sec,
  1813. NULL, 0, 16, 8, aead_speed_template_36);
  1814. break;
  1815. case 214:
  1816. test_cipher_speed("chacha20", ENCRYPT, sec, NULL, 0,
  1817. speed_template_32);
  1818. break;
  1819. case 215:
  1820. test_mb_aead_speed("rfc4106(gcm(aes))", ENCRYPT, sec, NULL,
  1821. 0, 16, 16, aead_speed_template_20, num_mb);
  1822. test_mb_aead_speed("gcm(aes)", ENCRYPT, sec, NULL, 0, 16, 8,
  1823. speed_template_16_24_32, num_mb);
  1824. test_mb_aead_speed("rfc4106(gcm(aes))", DECRYPT, sec, NULL,
  1825. 0, 16, 16, aead_speed_template_20, num_mb);
  1826. test_mb_aead_speed("gcm(aes)", DECRYPT, sec, NULL, 0, 16, 8,
  1827. speed_template_16_24_32, num_mb);
  1828. break;
  1829. case 216:
  1830. test_mb_aead_speed("rfc4309(ccm(aes))", ENCRYPT, sec, NULL, 0,
  1831. 16, 16, aead_speed_template_19, num_mb);
  1832. test_mb_aead_speed("rfc4309(ccm(aes))", DECRYPT, sec, NULL, 0,
  1833. 16, 16, aead_speed_template_19, num_mb);
  1834. break;
  1835. case 217:
  1836. test_mb_aead_speed("rfc7539esp(chacha20,poly1305)", ENCRYPT,
  1837. sec, NULL, 0, 16, 8, aead_speed_template_36,
  1838. num_mb);
  1839. test_mb_aead_speed("rfc7539esp(chacha20,poly1305)", DECRYPT,
  1840. sec, NULL, 0, 16, 8, aead_speed_template_36,
  1841. num_mb);
  1842. break;
  1843. case 300:
  1844. if (alg) {
  1845. test_hash_speed(alg, sec, generic_hash_speed_template);
  1846. break;
  1847. }
  1848. /* fall through */
  1849. case 301:
  1850. test_hash_speed("md4", sec, generic_hash_speed_template);
  1851. if (mode > 300 && mode < 400) break;
  1852. /* fall through */
  1853. case 302:
  1854. test_hash_speed("md5", sec, generic_hash_speed_template);
  1855. if (mode > 300 && mode < 400) break;
  1856. /* fall through */
  1857. case 303:
  1858. test_hash_speed("sha1", sec, generic_hash_speed_template);
  1859. if (mode > 300 && mode < 400) break;
  1860. /* fall through */
  1861. case 304:
  1862. test_hash_speed("sha256", sec, generic_hash_speed_template);
  1863. if (mode > 300 && mode < 400) break;
  1864. /* fall through */
  1865. case 305:
  1866. test_hash_speed("sha384", sec, generic_hash_speed_template);
  1867. if (mode > 300 && mode < 400) break;
  1868. /* fall through */
  1869. case 306:
  1870. test_hash_speed("sha512", sec, generic_hash_speed_template);
  1871. if (mode > 300 && mode < 400) break;
  1872. /* fall through */
  1873. case 307:
  1874. test_hash_speed("wp256", sec, generic_hash_speed_template);
  1875. if (mode > 300 && mode < 400) break;
  1876. /* fall through */
  1877. case 308:
  1878. test_hash_speed("wp384", sec, generic_hash_speed_template);
  1879. if (mode > 300 && mode < 400) break;
  1880. /* fall through */
  1881. case 309:
  1882. test_hash_speed("wp512", sec, generic_hash_speed_template);
  1883. if (mode > 300 && mode < 400) break;
  1884. /* fall through */
  1885. case 310:
  1886. test_hash_speed("tgr128", sec, generic_hash_speed_template);
  1887. if (mode > 300 && mode < 400) break;
  1888. /* fall through */
  1889. case 311:
  1890. test_hash_speed("tgr160", sec, generic_hash_speed_template);
  1891. if (mode > 300 && mode < 400) break;
  1892. /* fall through */
  1893. case 312:
  1894. test_hash_speed("tgr192", sec, generic_hash_speed_template);
  1895. if (mode > 300 && mode < 400) break;
  1896. /* fall through */
  1897. case 313:
  1898. test_hash_speed("sha224", sec, generic_hash_speed_template);
  1899. if (mode > 300 && mode < 400) break;
  1900. /* fall through */
  1901. case 314:
  1902. test_hash_speed("rmd128", sec, generic_hash_speed_template);
  1903. if (mode > 300 && mode < 400) break;
  1904. /* fall through */
  1905. case 315:
  1906. test_hash_speed("rmd160", sec, generic_hash_speed_template);
  1907. if (mode > 300 && mode < 400) break;
  1908. /* fall through */
  1909. case 316:
  1910. test_hash_speed("rmd256", sec, generic_hash_speed_template);
  1911. if (mode > 300 && mode < 400) break;
  1912. /* fall through */
  1913. case 317:
  1914. test_hash_speed("rmd320", sec, generic_hash_speed_template);
  1915. if (mode > 300 && mode < 400) break;
  1916. /* fall through */
  1917. case 318:
  1918. test_hash_speed("ghash-generic", sec, hash_speed_template_16);
  1919. if (mode > 300 && mode < 400) break;
  1920. /* fall through */
  1921. case 319:
  1922. test_hash_speed("crc32c", sec, generic_hash_speed_template);
  1923. if (mode > 300 && mode < 400) break;
  1924. /* fall through */
  1925. case 320:
  1926. test_hash_speed("crct10dif", sec, generic_hash_speed_template);
  1927. if (mode > 300 && mode < 400) break;
  1928. /* fall through */
  1929. case 321:
  1930. test_hash_speed("poly1305", sec, poly1305_speed_template);
  1931. if (mode > 300 && mode < 400) break;
  1932. /* fall through */
  1933. case 322:
  1934. test_hash_speed("sha3-224", sec, generic_hash_speed_template);
  1935. if (mode > 300 && mode < 400) break;
  1936. /* fall through */
  1937. case 323:
  1938. test_hash_speed("sha3-256", sec, generic_hash_speed_template);
  1939. if (mode > 300 && mode < 400) break;
  1940. /* fall through */
  1941. case 324:
  1942. test_hash_speed("sha3-384", sec, generic_hash_speed_template);
  1943. if (mode > 300 && mode < 400) break;
  1944. /* fall through */
  1945. case 325:
  1946. test_hash_speed("sha3-512", sec, generic_hash_speed_template);
  1947. if (mode > 300 && mode < 400) break;
  1948. /* fall through */
  1949. case 326:
  1950. test_hash_speed("sm3", sec, generic_hash_speed_template);
  1951. if (mode > 300 && mode < 400) break;
  1952. /* fall through */
  1953. case 399:
  1954. break;
  1955. case 400:
  1956. if (alg) {
  1957. test_ahash_speed(alg, sec, generic_hash_speed_template);
  1958. break;
  1959. }
  1960. /* fall through */
  1961. case 401:
  1962. test_ahash_speed("md4", sec, generic_hash_speed_template);
  1963. if (mode > 400 && mode < 500) break;
  1964. /* fall through */
  1965. case 402:
  1966. test_ahash_speed("md5", sec, generic_hash_speed_template);
  1967. if (mode > 400 && mode < 500) break;
  1968. /* fall through */
  1969. case 403:
  1970. test_ahash_speed("sha1", sec, generic_hash_speed_template);
  1971. if (mode > 400 && mode < 500) break;
  1972. /* fall through */
  1973. case 404:
  1974. test_ahash_speed("sha256", sec, generic_hash_speed_template);
  1975. if (mode > 400 && mode < 500) break;
  1976. /* fall through */
  1977. case 405:
  1978. test_ahash_speed("sha384", sec, generic_hash_speed_template);
  1979. if (mode > 400 && mode < 500) break;
  1980. /* fall through */
  1981. case 406:
  1982. test_ahash_speed("sha512", sec, generic_hash_speed_template);
  1983. if (mode > 400 && mode < 500) break;
  1984. /* fall through */
  1985. case 407:
  1986. test_ahash_speed("wp256", sec, generic_hash_speed_template);
  1987. if (mode > 400 && mode < 500) break;
  1988. /* fall through */
  1989. case 408:
  1990. test_ahash_speed("wp384", sec, generic_hash_speed_template);
  1991. if (mode > 400 && mode < 500) break;
  1992. /* fall through */
  1993. case 409:
  1994. test_ahash_speed("wp512", sec, generic_hash_speed_template);
  1995. if (mode > 400 && mode < 500) break;
  1996. /* fall through */
  1997. case 410:
  1998. test_ahash_speed("tgr128", sec, generic_hash_speed_template);
  1999. if (mode > 400 && mode < 500) break;
  2000. /* fall through */
  2001. case 411:
  2002. test_ahash_speed("tgr160", sec, generic_hash_speed_template);
  2003. if (mode > 400 && mode < 500) break;
  2004. /* fall through */
  2005. case 412:
  2006. test_ahash_speed("tgr192", sec, generic_hash_speed_template);
  2007. if (mode > 400 && mode < 500) break;
  2008. /* fall through */
  2009. case 413:
  2010. test_ahash_speed("sha224", sec, generic_hash_speed_template);
  2011. if (mode > 400 && mode < 500) break;
  2012. /* fall through */
  2013. case 414:
  2014. test_ahash_speed("rmd128", sec, generic_hash_speed_template);
  2015. if (mode > 400 && mode < 500) break;
  2016. /* fall through */
  2017. case 415:
  2018. test_ahash_speed("rmd160", sec, generic_hash_speed_template);
  2019. if (mode > 400 && mode < 500) break;
  2020. /* fall through */
  2021. case 416:
  2022. test_ahash_speed("rmd256", sec, generic_hash_speed_template);
  2023. if (mode > 400 && mode < 500) break;
  2024. /* fall through */
  2025. case 417:
  2026. test_ahash_speed("rmd320", sec, generic_hash_speed_template);
  2027. if (mode > 400 && mode < 500) break;
  2028. /* fall through */
  2029. case 418:
  2030. test_ahash_speed("sha3-224", sec, generic_hash_speed_template);
  2031. if (mode > 400 && mode < 500) break;
  2032. /* fall through */
  2033. case 419:
  2034. test_ahash_speed("sha3-256", sec, generic_hash_speed_template);
  2035. if (mode > 400 && mode < 500) break;
  2036. /* fall through */
  2037. case 420:
  2038. test_ahash_speed("sha3-384", sec, generic_hash_speed_template);
  2039. if (mode > 400 && mode < 500) break;
  2040. /* fall through */
  2041. case 421:
  2042. test_ahash_speed("sha3-512", sec, generic_hash_speed_template);
  2043. if (mode > 400 && mode < 500) break;
  2044. /* fall through */
  2045. case 422:
  2046. test_mb_ahash_speed("sha1", sec, generic_hash_speed_template,
  2047. num_mb);
  2048. if (mode > 400 && mode < 500) break;
  2049. /* fall through */
  2050. case 423:
  2051. test_mb_ahash_speed("sha256", sec, generic_hash_speed_template,
  2052. num_mb);
  2053. if (mode > 400 && mode < 500) break;
  2054. /* fall through */
  2055. case 424:
  2056. test_mb_ahash_speed("sha512", sec, generic_hash_speed_template,
  2057. num_mb);
  2058. if (mode > 400 && mode < 500) break;
  2059. /* fall through */
  2060. case 425:
  2061. test_mb_ahash_speed("sm3", sec, generic_hash_speed_template,
  2062. num_mb);
  2063. if (mode > 400 && mode < 500) break;
  2064. /* fall through */
  2065. case 499:
  2066. break;
  2067. case 500:
  2068. test_acipher_speed("ecb(aes)", ENCRYPT, sec, NULL, 0,
  2069. speed_template_16_24_32);
  2070. test_acipher_speed("ecb(aes)", DECRYPT, sec, NULL, 0,
  2071. speed_template_16_24_32);
  2072. test_acipher_speed("cbc(aes)", ENCRYPT, sec, NULL, 0,
  2073. speed_template_16_24_32);
  2074. test_acipher_speed("cbc(aes)", DECRYPT, sec, NULL, 0,
  2075. speed_template_16_24_32);
  2076. test_acipher_speed("lrw(aes)", ENCRYPT, sec, NULL, 0,
  2077. speed_template_32_40_48);
  2078. test_acipher_speed("lrw(aes)", DECRYPT, sec, NULL, 0,
  2079. speed_template_32_40_48);
  2080. test_acipher_speed("xts(aes)", ENCRYPT, sec, NULL, 0,
  2081. speed_template_32_64);
  2082. test_acipher_speed("xts(aes)", DECRYPT, sec, NULL, 0,
  2083. speed_template_32_64);
  2084. test_acipher_speed("cts(cbc(aes))", ENCRYPT, sec, NULL, 0,
  2085. speed_template_16_24_32);
  2086. test_acipher_speed("cts(cbc(aes))", DECRYPT, sec, NULL, 0,
  2087. speed_template_16_24_32);
  2088. test_acipher_speed("ctr(aes)", ENCRYPT, sec, NULL, 0,
  2089. speed_template_16_24_32);
  2090. test_acipher_speed("ctr(aes)", DECRYPT, sec, NULL, 0,
  2091. speed_template_16_24_32);
  2092. test_acipher_speed("cfb(aes)", ENCRYPT, sec, NULL, 0,
  2093. speed_template_16_24_32);
  2094. test_acipher_speed("cfb(aes)", DECRYPT, sec, NULL, 0,
  2095. speed_template_16_24_32);
  2096. test_acipher_speed("ofb(aes)", ENCRYPT, sec, NULL, 0,
  2097. speed_template_16_24_32);
  2098. test_acipher_speed("ofb(aes)", DECRYPT, sec, NULL, 0,
  2099. speed_template_16_24_32);
  2100. test_acipher_speed("rfc3686(ctr(aes))", ENCRYPT, sec, NULL, 0,
  2101. speed_template_20_28_36);
  2102. test_acipher_speed("rfc3686(ctr(aes))", DECRYPT, sec, NULL, 0,
  2103. speed_template_20_28_36);
  2104. break;
  2105. case 501:
  2106. test_acipher_speed("ecb(des3_ede)", ENCRYPT, sec,
  2107. des3_speed_template, DES3_SPEED_VECTORS,
  2108. speed_template_24);
  2109. test_acipher_speed("ecb(des3_ede)", DECRYPT, sec,
  2110. des3_speed_template, DES3_SPEED_VECTORS,
  2111. speed_template_24);
  2112. test_acipher_speed("cbc(des3_ede)", ENCRYPT, sec,
  2113. des3_speed_template, DES3_SPEED_VECTORS,
  2114. speed_template_24);
  2115. test_acipher_speed("cbc(des3_ede)", DECRYPT, sec,
  2116. des3_speed_template, DES3_SPEED_VECTORS,
  2117. speed_template_24);
  2118. test_acipher_speed("cfb(des3_ede)", ENCRYPT, sec,
  2119. des3_speed_template, DES3_SPEED_VECTORS,
  2120. speed_template_24);
  2121. test_acipher_speed("cfb(des3_ede)", DECRYPT, sec,
  2122. des3_speed_template, DES3_SPEED_VECTORS,
  2123. speed_template_24);
  2124. test_acipher_speed("ofb(des3_ede)", ENCRYPT, sec,
  2125. des3_speed_template, DES3_SPEED_VECTORS,
  2126. speed_template_24);
  2127. test_acipher_speed("ofb(des3_ede)", DECRYPT, sec,
  2128. des3_speed_template, DES3_SPEED_VECTORS,
  2129. speed_template_24);
  2130. break;
  2131. case 502:
  2132. test_acipher_speed("ecb(des)", ENCRYPT, sec, NULL, 0,
  2133. speed_template_8);
  2134. test_acipher_speed("ecb(des)", DECRYPT, sec, NULL, 0,
  2135. speed_template_8);
  2136. test_acipher_speed("cbc(des)", ENCRYPT, sec, NULL, 0,
  2137. speed_template_8);
  2138. test_acipher_speed("cbc(des)", DECRYPT, sec, NULL, 0,
  2139. speed_template_8);
  2140. test_acipher_speed("cfb(des)", ENCRYPT, sec, NULL, 0,
  2141. speed_template_8);
  2142. test_acipher_speed("cfb(des)", DECRYPT, sec, NULL, 0,
  2143. speed_template_8);
  2144. test_acipher_speed("ofb(des)", ENCRYPT, sec, NULL, 0,
  2145. speed_template_8);
  2146. test_acipher_speed("ofb(des)", DECRYPT, sec, NULL, 0,
  2147. speed_template_8);
  2148. break;
  2149. case 503:
  2150. test_acipher_speed("ecb(serpent)", ENCRYPT, sec, NULL, 0,
  2151. speed_template_16_32);
  2152. test_acipher_speed("ecb(serpent)", DECRYPT, sec, NULL, 0,
  2153. speed_template_16_32);
  2154. test_acipher_speed("cbc(serpent)", ENCRYPT, sec, NULL, 0,
  2155. speed_template_16_32);
  2156. test_acipher_speed("cbc(serpent)", DECRYPT, sec, NULL, 0,
  2157. speed_template_16_32);
  2158. test_acipher_speed("ctr(serpent)", ENCRYPT, sec, NULL, 0,
  2159. speed_template_16_32);
  2160. test_acipher_speed("ctr(serpent)", DECRYPT, sec, NULL, 0,
  2161. speed_template_16_32);
  2162. test_acipher_speed("lrw(serpent)", ENCRYPT, sec, NULL, 0,
  2163. speed_template_32_48);
  2164. test_acipher_speed("lrw(serpent)", DECRYPT, sec, NULL, 0,
  2165. speed_template_32_48);
  2166. test_acipher_speed("xts(serpent)", ENCRYPT, sec, NULL, 0,
  2167. speed_template_32_64);
  2168. test_acipher_speed("xts(serpent)", DECRYPT, sec, NULL, 0,
  2169. speed_template_32_64);
  2170. break;
  2171. case 504:
  2172. test_acipher_speed("ecb(twofish)", ENCRYPT, sec, NULL, 0,
  2173. speed_template_16_24_32);
  2174. test_acipher_speed("ecb(twofish)", DECRYPT, sec, NULL, 0,
  2175. speed_template_16_24_32);
  2176. test_acipher_speed("cbc(twofish)", ENCRYPT, sec, NULL, 0,
  2177. speed_template_16_24_32);
  2178. test_acipher_speed("cbc(twofish)", DECRYPT, sec, NULL, 0,
  2179. speed_template_16_24_32);
  2180. test_acipher_speed("ctr(twofish)", ENCRYPT, sec, NULL, 0,
  2181. speed_template_16_24_32);
  2182. test_acipher_speed("ctr(twofish)", DECRYPT, sec, NULL, 0,
  2183. speed_template_16_24_32);
  2184. test_acipher_speed("lrw(twofish)", ENCRYPT, sec, NULL, 0,
  2185. speed_template_32_40_48);
  2186. test_acipher_speed("lrw(twofish)", DECRYPT, sec, NULL, 0,
  2187. speed_template_32_40_48);
  2188. test_acipher_speed("xts(twofish)", ENCRYPT, sec, NULL, 0,
  2189. speed_template_32_48_64);
  2190. test_acipher_speed("xts(twofish)", DECRYPT, sec, NULL, 0,
  2191. speed_template_32_48_64);
  2192. break;
  2193. case 505:
  2194. test_acipher_speed("ecb(arc4)", ENCRYPT, sec, NULL, 0,
  2195. speed_template_8);
  2196. break;
  2197. case 506:
  2198. test_acipher_speed("ecb(cast5)", ENCRYPT, sec, NULL, 0,
  2199. speed_template_8_16);
  2200. test_acipher_speed("ecb(cast5)", DECRYPT, sec, NULL, 0,
  2201. speed_template_8_16);
  2202. test_acipher_speed("cbc(cast5)", ENCRYPT, sec, NULL, 0,
  2203. speed_template_8_16);
  2204. test_acipher_speed("cbc(cast5)", DECRYPT, sec, NULL, 0,
  2205. speed_template_8_16);
  2206. test_acipher_speed("ctr(cast5)", ENCRYPT, sec, NULL, 0,
  2207. speed_template_8_16);
  2208. test_acipher_speed("ctr(cast5)", DECRYPT, sec, NULL, 0,
  2209. speed_template_8_16);
  2210. break;
  2211. case 507:
  2212. test_acipher_speed("ecb(cast6)", ENCRYPT, sec, NULL, 0,
  2213. speed_template_16_32);
  2214. test_acipher_speed("ecb(cast6)", DECRYPT, sec, NULL, 0,
  2215. speed_template_16_32);
  2216. test_acipher_speed("cbc(cast6)", ENCRYPT, sec, NULL, 0,
  2217. speed_template_16_32);
  2218. test_acipher_speed("cbc(cast6)", DECRYPT, sec, NULL, 0,
  2219. speed_template_16_32);
  2220. test_acipher_speed("ctr(cast6)", ENCRYPT, sec, NULL, 0,
  2221. speed_template_16_32);
  2222. test_acipher_speed("ctr(cast6)", DECRYPT, sec, NULL, 0,
  2223. speed_template_16_32);
  2224. test_acipher_speed("lrw(cast6)", ENCRYPT, sec, NULL, 0,
  2225. speed_template_32_48);
  2226. test_acipher_speed("lrw(cast6)", DECRYPT, sec, NULL, 0,
  2227. speed_template_32_48);
  2228. test_acipher_speed("xts(cast6)", ENCRYPT, sec, NULL, 0,
  2229. speed_template_32_64);
  2230. test_acipher_speed("xts(cast6)", DECRYPT, sec, NULL, 0,
  2231. speed_template_32_64);
  2232. break;
  2233. case 508:
  2234. test_acipher_speed("ecb(camellia)", ENCRYPT, sec, NULL, 0,
  2235. speed_template_16_32);
  2236. test_acipher_speed("ecb(camellia)", DECRYPT, sec, NULL, 0,
  2237. speed_template_16_32);
  2238. test_acipher_speed("cbc(camellia)", ENCRYPT, sec, NULL, 0,
  2239. speed_template_16_32);
  2240. test_acipher_speed("cbc(camellia)", DECRYPT, sec, NULL, 0,
  2241. speed_template_16_32);
  2242. test_acipher_speed("ctr(camellia)", ENCRYPT, sec, NULL, 0,
  2243. speed_template_16_32);
  2244. test_acipher_speed("ctr(camellia)", DECRYPT, sec, NULL, 0,
  2245. speed_template_16_32);
  2246. test_acipher_speed("lrw(camellia)", ENCRYPT, sec, NULL, 0,
  2247. speed_template_32_48);
  2248. test_acipher_speed("lrw(camellia)", DECRYPT, sec, NULL, 0,
  2249. speed_template_32_48);
  2250. test_acipher_speed("xts(camellia)", ENCRYPT, sec, NULL, 0,
  2251. speed_template_32_64);
  2252. test_acipher_speed("xts(camellia)", DECRYPT, sec, NULL, 0,
  2253. speed_template_32_64);
  2254. break;
  2255. case 509:
  2256. test_acipher_speed("ecb(blowfish)", ENCRYPT, sec, NULL, 0,
  2257. speed_template_8_32);
  2258. test_acipher_speed("ecb(blowfish)", DECRYPT, sec, NULL, 0,
  2259. speed_template_8_32);
  2260. test_acipher_speed("cbc(blowfish)", ENCRYPT, sec, NULL, 0,
  2261. speed_template_8_32);
  2262. test_acipher_speed("cbc(blowfish)", DECRYPT, sec, NULL, 0,
  2263. speed_template_8_32);
  2264. test_acipher_speed("ctr(blowfish)", ENCRYPT, sec, NULL, 0,
  2265. speed_template_8_32);
  2266. test_acipher_speed("ctr(blowfish)", DECRYPT, sec, NULL, 0,
  2267. speed_template_8_32);
  2268. break;
  2269. case 600:
  2270. test_mb_skcipher_speed("ecb(aes)", ENCRYPT, sec, NULL, 0,
  2271. speed_template_16_24_32, num_mb);
  2272. test_mb_skcipher_speed("ecb(aes)", DECRYPT, sec, NULL, 0,
  2273. speed_template_16_24_32, num_mb);
  2274. test_mb_skcipher_speed("cbc(aes)", ENCRYPT, sec, NULL, 0,
  2275. speed_template_16_24_32, num_mb);
  2276. test_mb_skcipher_speed("cbc(aes)", DECRYPT, sec, NULL, 0,
  2277. speed_template_16_24_32, num_mb);
  2278. test_mb_skcipher_speed("lrw(aes)", ENCRYPT, sec, NULL, 0,
  2279. speed_template_32_40_48, num_mb);
  2280. test_mb_skcipher_speed("lrw(aes)", DECRYPT, sec, NULL, 0,
  2281. speed_template_32_40_48, num_mb);
  2282. test_mb_skcipher_speed("xts(aes)", ENCRYPT, sec, NULL, 0,
  2283. speed_template_32_64, num_mb);
  2284. test_mb_skcipher_speed("xts(aes)", DECRYPT, sec, NULL, 0,
  2285. speed_template_32_64, num_mb);
  2286. test_mb_skcipher_speed("cts(cbc(aes))", ENCRYPT, sec, NULL, 0,
  2287. speed_template_16_24_32, num_mb);
  2288. test_mb_skcipher_speed("cts(cbc(aes))", DECRYPT, sec, NULL, 0,
  2289. speed_template_16_24_32, num_mb);
  2290. test_mb_skcipher_speed("ctr(aes)", ENCRYPT, sec, NULL, 0,
  2291. speed_template_16_24_32, num_mb);
  2292. test_mb_skcipher_speed("ctr(aes)", DECRYPT, sec, NULL, 0,
  2293. speed_template_16_24_32, num_mb);
  2294. test_mb_skcipher_speed("cfb(aes)", ENCRYPT, sec, NULL, 0,
  2295. speed_template_16_24_32, num_mb);
  2296. test_mb_skcipher_speed("cfb(aes)", DECRYPT, sec, NULL, 0,
  2297. speed_template_16_24_32, num_mb);
  2298. test_mb_skcipher_speed("ofb(aes)", ENCRYPT, sec, NULL, 0,
  2299. speed_template_16_24_32, num_mb);
  2300. test_mb_skcipher_speed("ofb(aes)", DECRYPT, sec, NULL, 0,
  2301. speed_template_16_24_32, num_mb);
  2302. test_mb_skcipher_speed("rfc3686(ctr(aes))", ENCRYPT, sec, NULL,
  2303. 0, speed_template_20_28_36, num_mb);
  2304. test_mb_skcipher_speed("rfc3686(ctr(aes))", DECRYPT, sec, NULL,
  2305. 0, speed_template_20_28_36, num_mb);
  2306. break;
  2307. case 601:
  2308. test_mb_skcipher_speed("ecb(des3_ede)", ENCRYPT, sec,
  2309. des3_speed_template, DES3_SPEED_VECTORS,
  2310. speed_template_24, num_mb);
  2311. test_mb_skcipher_speed("ecb(des3_ede)", DECRYPT, sec,
  2312. des3_speed_template, DES3_SPEED_VECTORS,
  2313. speed_template_24, num_mb);
  2314. test_mb_skcipher_speed("cbc(des3_ede)", ENCRYPT, sec,
  2315. des3_speed_template, DES3_SPEED_VECTORS,
  2316. speed_template_24, num_mb);
  2317. test_mb_skcipher_speed("cbc(des3_ede)", DECRYPT, sec,
  2318. des3_speed_template, DES3_SPEED_VECTORS,
  2319. speed_template_24, num_mb);
  2320. test_mb_skcipher_speed("cfb(des3_ede)", ENCRYPT, sec,
  2321. des3_speed_template, DES3_SPEED_VECTORS,
  2322. speed_template_24, num_mb);
  2323. test_mb_skcipher_speed("cfb(des3_ede)", DECRYPT, sec,
  2324. des3_speed_template, DES3_SPEED_VECTORS,
  2325. speed_template_24, num_mb);
  2326. test_mb_skcipher_speed("ofb(des3_ede)", ENCRYPT, sec,
  2327. des3_speed_template, DES3_SPEED_VECTORS,
  2328. speed_template_24, num_mb);
  2329. test_mb_skcipher_speed("ofb(des3_ede)", DECRYPT, sec,
  2330. des3_speed_template, DES3_SPEED_VECTORS,
  2331. speed_template_24, num_mb);
  2332. break;
  2333. case 602:
  2334. test_mb_skcipher_speed("ecb(des)", ENCRYPT, sec, NULL, 0,
  2335. speed_template_8, num_mb);
  2336. test_mb_skcipher_speed("ecb(des)", DECRYPT, sec, NULL, 0,
  2337. speed_template_8, num_mb);
  2338. test_mb_skcipher_speed("cbc(des)", ENCRYPT, sec, NULL, 0,
  2339. speed_template_8, num_mb);
  2340. test_mb_skcipher_speed("cbc(des)", DECRYPT, sec, NULL, 0,
  2341. speed_template_8, num_mb);
  2342. test_mb_skcipher_speed("cfb(des)", ENCRYPT, sec, NULL, 0,
  2343. speed_template_8, num_mb);
  2344. test_mb_skcipher_speed("cfb(des)", DECRYPT, sec, NULL, 0,
  2345. speed_template_8, num_mb);
  2346. test_mb_skcipher_speed("ofb(des)", ENCRYPT, sec, NULL, 0,
  2347. speed_template_8, num_mb);
  2348. test_mb_skcipher_speed("ofb(des)", DECRYPT, sec, NULL, 0,
  2349. speed_template_8, num_mb);
  2350. break;
  2351. case 603:
  2352. test_mb_skcipher_speed("ecb(serpent)", ENCRYPT, sec, NULL, 0,
  2353. speed_template_16_32, num_mb);
  2354. test_mb_skcipher_speed("ecb(serpent)", DECRYPT, sec, NULL, 0,
  2355. speed_template_16_32, num_mb);
  2356. test_mb_skcipher_speed("cbc(serpent)", ENCRYPT, sec, NULL, 0,
  2357. speed_template_16_32, num_mb);
  2358. test_mb_skcipher_speed("cbc(serpent)", DECRYPT, sec, NULL, 0,
  2359. speed_template_16_32, num_mb);
  2360. test_mb_skcipher_speed("ctr(serpent)", ENCRYPT, sec, NULL, 0,
  2361. speed_template_16_32, num_mb);
  2362. test_mb_skcipher_speed("ctr(serpent)", DECRYPT, sec, NULL, 0,
  2363. speed_template_16_32, num_mb);
  2364. test_mb_skcipher_speed("lrw(serpent)", ENCRYPT, sec, NULL, 0,
  2365. speed_template_32_48, num_mb);
  2366. test_mb_skcipher_speed("lrw(serpent)", DECRYPT, sec, NULL, 0,
  2367. speed_template_32_48, num_mb);
  2368. test_mb_skcipher_speed("xts(serpent)", ENCRYPT, sec, NULL, 0,
  2369. speed_template_32_64, num_mb);
  2370. test_mb_skcipher_speed("xts(serpent)", DECRYPT, sec, NULL, 0,
  2371. speed_template_32_64, num_mb);
  2372. break;
  2373. case 604:
  2374. test_mb_skcipher_speed("ecb(twofish)", ENCRYPT, sec, NULL, 0,
  2375. speed_template_16_24_32, num_mb);
  2376. test_mb_skcipher_speed("ecb(twofish)", DECRYPT, sec, NULL, 0,
  2377. speed_template_16_24_32, num_mb);
  2378. test_mb_skcipher_speed("cbc(twofish)", ENCRYPT, sec, NULL, 0,
  2379. speed_template_16_24_32, num_mb);
  2380. test_mb_skcipher_speed("cbc(twofish)", DECRYPT, sec, NULL, 0,
  2381. speed_template_16_24_32, num_mb);
  2382. test_mb_skcipher_speed("ctr(twofish)", ENCRYPT, sec, NULL, 0,
  2383. speed_template_16_24_32, num_mb);
  2384. test_mb_skcipher_speed("ctr(twofish)", DECRYPT, sec, NULL, 0,
  2385. speed_template_16_24_32, num_mb);
  2386. test_mb_skcipher_speed("lrw(twofish)", ENCRYPT, sec, NULL, 0,
  2387. speed_template_32_40_48, num_mb);
  2388. test_mb_skcipher_speed("lrw(twofish)", DECRYPT, sec, NULL, 0,
  2389. speed_template_32_40_48, num_mb);
  2390. test_mb_skcipher_speed("xts(twofish)", ENCRYPT, sec, NULL, 0,
  2391. speed_template_32_48_64, num_mb);
  2392. test_mb_skcipher_speed("xts(twofish)", DECRYPT, sec, NULL, 0,
  2393. speed_template_32_48_64, num_mb);
  2394. break;
  2395. case 605:
  2396. test_mb_skcipher_speed("ecb(arc4)", ENCRYPT, sec, NULL, 0,
  2397. speed_template_8, num_mb);
  2398. break;
  2399. case 606:
  2400. test_mb_skcipher_speed("ecb(cast5)", ENCRYPT, sec, NULL, 0,
  2401. speed_template_8_16, num_mb);
  2402. test_mb_skcipher_speed("ecb(cast5)", DECRYPT, sec, NULL, 0,
  2403. speed_template_8_16, num_mb);
  2404. test_mb_skcipher_speed("cbc(cast5)", ENCRYPT, sec, NULL, 0,
  2405. speed_template_8_16, num_mb);
  2406. test_mb_skcipher_speed("cbc(cast5)", DECRYPT, sec, NULL, 0,
  2407. speed_template_8_16, num_mb);
  2408. test_mb_skcipher_speed("ctr(cast5)", ENCRYPT, sec, NULL, 0,
  2409. speed_template_8_16, num_mb);
  2410. test_mb_skcipher_speed("ctr(cast5)", DECRYPT, sec, NULL, 0,
  2411. speed_template_8_16, num_mb);
  2412. break;
  2413. case 607:
  2414. test_mb_skcipher_speed("ecb(cast6)", ENCRYPT, sec, NULL, 0,
  2415. speed_template_16_32, num_mb);
  2416. test_mb_skcipher_speed("ecb(cast6)", DECRYPT, sec, NULL, 0,
  2417. speed_template_16_32, num_mb);
  2418. test_mb_skcipher_speed("cbc(cast6)", ENCRYPT, sec, NULL, 0,
  2419. speed_template_16_32, num_mb);
  2420. test_mb_skcipher_speed("cbc(cast6)", DECRYPT, sec, NULL, 0,
  2421. speed_template_16_32, num_mb);
  2422. test_mb_skcipher_speed("ctr(cast6)", ENCRYPT, sec, NULL, 0,
  2423. speed_template_16_32, num_mb);
  2424. test_mb_skcipher_speed("ctr(cast6)", DECRYPT, sec, NULL, 0,
  2425. speed_template_16_32, num_mb);
  2426. test_mb_skcipher_speed("lrw(cast6)", ENCRYPT, sec, NULL, 0,
  2427. speed_template_32_48, num_mb);
  2428. test_mb_skcipher_speed("lrw(cast6)", DECRYPT, sec, NULL, 0,
  2429. speed_template_32_48, num_mb);
  2430. test_mb_skcipher_speed("xts(cast6)", ENCRYPT, sec, NULL, 0,
  2431. speed_template_32_64, num_mb);
  2432. test_mb_skcipher_speed("xts(cast6)", DECRYPT, sec, NULL, 0,
  2433. speed_template_32_64, num_mb);
  2434. break;
  2435. case 608:
  2436. test_mb_skcipher_speed("ecb(camellia)", ENCRYPT, sec, NULL, 0,
  2437. speed_template_16_32, num_mb);
  2438. test_mb_skcipher_speed("ecb(camellia)", DECRYPT, sec, NULL, 0,
  2439. speed_template_16_32, num_mb);
  2440. test_mb_skcipher_speed("cbc(camellia)", ENCRYPT, sec, NULL, 0,
  2441. speed_template_16_32, num_mb);
  2442. test_mb_skcipher_speed("cbc(camellia)", DECRYPT, sec, NULL, 0,
  2443. speed_template_16_32, num_mb);
  2444. test_mb_skcipher_speed("ctr(camellia)", ENCRYPT, sec, NULL, 0,
  2445. speed_template_16_32, num_mb);
  2446. test_mb_skcipher_speed("ctr(camellia)", DECRYPT, sec, NULL, 0,
  2447. speed_template_16_32, num_mb);
  2448. test_mb_skcipher_speed("lrw(camellia)", ENCRYPT, sec, NULL, 0,
  2449. speed_template_32_48, num_mb);
  2450. test_mb_skcipher_speed("lrw(camellia)", DECRYPT, sec, NULL, 0,
  2451. speed_template_32_48, num_mb);
  2452. test_mb_skcipher_speed("xts(camellia)", ENCRYPT, sec, NULL, 0,
  2453. speed_template_32_64, num_mb);
  2454. test_mb_skcipher_speed("xts(camellia)", DECRYPT, sec, NULL, 0,
  2455. speed_template_32_64, num_mb);
  2456. break;
  2457. case 609:
  2458. test_mb_skcipher_speed("ecb(blowfish)", ENCRYPT, sec, NULL, 0,
  2459. speed_template_8_32, num_mb);
  2460. test_mb_skcipher_speed("ecb(blowfish)", DECRYPT, sec, NULL, 0,
  2461. speed_template_8_32, num_mb);
  2462. test_mb_skcipher_speed("cbc(blowfish)", ENCRYPT, sec, NULL, 0,
  2463. speed_template_8_32, num_mb);
  2464. test_mb_skcipher_speed("cbc(blowfish)", DECRYPT, sec, NULL, 0,
  2465. speed_template_8_32, num_mb);
  2466. test_mb_skcipher_speed("ctr(blowfish)", ENCRYPT, sec, NULL, 0,
  2467. speed_template_8_32, num_mb);
  2468. test_mb_skcipher_speed("ctr(blowfish)", DECRYPT, sec, NULL, 0,
  2469. speed_template_8_32, num_mb);
  2470. break;
  2471. case 1000:
  2472. test_available();
  2473. break;
  2474. }
  2475. return ret;
  2476. }
  2477. static int __init tcrypt_mod_init(void)
  2478. {
  2479. int err = -ENOMEM;
  2480. int i;
  2481. for (i = 0; i < TVMEMSIZE; i++) {
  2482. tvmem[i] = (void *)__get_free_page(GFP_KERNEL);
  2483. if (!tvmem[i])
  2484. goto err_free_tv;
  2485. }
  2486. err = do_test(alg, type, mask, mode);
  2487. if (err) {
  2488. printk(KERN_ERR "tcrypt: one or more tests failed!\n");
  2489. goto err_free_tv;
  2490. } else {
  2491. pr_debug("all tests passed\n");
  2492. }
  2493. /* We intentionaly return -EAGAIN to prevent keeping the module,
  2494. * unless we're running in fips mode. It does all its work from
  2495. * init() and doesn't offer any runtime functionality, but in
  2496. * the fips case, checking for a successful load is helpful.
  2497. * => we don't need it in the memory, do we?
  2498. * -- mludvig
  2499. */
  2500. if (!fips_enabled)
  2501. err = -EAGAIN;
  2502. err_free_tv:
  2503. for (i = 0; i < TVMEMSIZE && tvmem[i]; i++)
  2504. free_page((unsigned long)tvmem[i]);
  2505. return err;
  2506. }
  2507. /*
  2508. * If an init function is provided, an exit function must also be provided
  2509. * to allow module unload.
  2510. */
  2511. static void __exit tcrypt_mod_fini(void) { }
  2512. module_init(tcrypt_mod_init);
  2513. module_exit(tcrypt_mod_fini);
  2514. module_param(alg, charp, 0);
  2515. module_param(type, uint, 0);
  2516. module_param(mask, uint, 0);
  2517. module_param(mode, int, 0);
  2518. module_param(sec, uint, 0);
  2519. MODULE_PARM_DESC(sec, "Length in seconds of speed tests "
  2520. "(defaults to zero which uses CPU cycles instead)");
  2521. module_param(num_mb, uint, 0000);
  2522. MODULE_PARM_DESC(num_mb, "Number of concurrent requests to be used in mb speed tests (defaults to 8)");
  2523. MODULE_LICENSE("GPL");
  2524. MODULE_DESCRIPTION("Quick & dirty crypto testing module");
  2525. MODULE_AUTHOR("James Morris <jmorris@intercode.com.au>");