Linux Audio

Check our new training course

Loading...
v4.6
 
   1/*
   2 * Quick & dirty crypto testing module.
   3 *
   4 * This will only exist until we have a better testing mechanism
   5 * (e.g. a char device).
   6 *
   7 * Copyright (c) 2002 James Morris <jmorris@intercode.com.au>
   8 * Copyright (c) 2002 Jean-Francois Dive <jef@linuxbe.org>
   9 * Copyright (c) 2007 Nokia Siemens Networks
  10 *
  11 * Updated RFC4106 AES-GCM testing.
  12 *    Authors: Aidan O'Mahony (aidan.o.mahony@intel.com)
  13 *             Adrian Hoban <adrian.hoban@intel.com>
  14 *             Gabriele Paoloni <gabriele.paoloni@intel.com>
  15 *             Tadeusz Struk (tadeusz.struk@intel.com)
  16 *             Copyright (c) 2010, Intel Corporation.
  17 *
  18 * This program is free software; you can redistribute it and/or modify it
  19 * under the terms of the GNU General Public License as published by the Free
  20 * Software Foundation; either version 2 of the License, or (at your option)
  21 * any later version.
  22 *
  23 */
  24
 
 
  25#include <crypto/aead.h>
  26#include <crypto/hash.h>
 
  27#include <linux/err.h>
  28#include <linux/fips.h>
  29#include <linux/init.h>
  30#include <linux/gfp.h>
 
 
  31#include <linux/module.h>
 
  32#include <linux/scatterlist.h>
 
  33#include <linux/string.h>
  34#include <linux/moduleparam.h>
  35#include <linux/jiffies.h>
  36#include <linux/timex.h>
  37#include <linux/interrupt.h>
 
  38#include "tcrypt.h"
  39
  40/*
  41 * Need slab memory for testing (size in number of pages).
  42 */
  43#define TVMEMSIZE	4
  44
  45/*
  46* Used by test_cipher_speed()
  47*/
  48#define ENCRYPT 1
  49#define DECRYPT 0
  50
  51#define MAX_DIGEST_SIZE		64
  52
  53/*
  54 * return a string with the driver name
  55 */
  56#define get_driver_name(tfm_type, tfm) crypto_tfm_alg_driver_name(tfm_type ## _tfm(tfm))
  57
  58/*
  59 * Used by test_cipher_speed()
  60 */
  61static unsigned int sec;
  62
  63static char *alg = NULL;
  64static u32 type;
  65static u32 mask;
  66static int mode;
 
 
  67static char *tvmem[TVMEMSIZE];
  68
  69static char *check[] = {
  70	"des", "md5", "des3_ede", "rot13", "sha1", "sha224", "sha256",
  71	"blowfish", "twofish", "serpent", "sha384", "sha512", "md4", "aes",
  72	"cast6", "arc4", "michael_mic", "deflate", "crc32c", "tea", "xtea",
  73	"khazad", "wp512", "wp384", "wp256", "tnepres", "xeta",  "fcrypt",
  74	"camellia", "seed", "salsa20", "rmd128", "rmd160", "rmd256", "rmd320",
  75	"lzo", "cts", "zlib", NULL
  76};
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
  77
  78struct tcrypt_result {
  79	struct completion completion;
  80	int err;
 
 
 
 
 
  81};
  82
  83static void tcrypt_complete(struct crypto_async_request *req, int err)
 
  84{
  85	struct tcrypt_result *res = req->data;
  86
  87	if (err == -EINPROGRESS)
  88		return;
 
 
 
 
 
 
 
 
 
  89
  90	res->err = err;
  91	complete(&res->completion);
 
 
 
 
 
  92}
  93
  94static int test_cipher_jiffies(struct blkcipher_desc *desc, int enc,
  95			       struct scatterlist *sg, int blen, int secs)
  96{
  97	unsigned long start, end;
  98	int bcount;
  99	int ret;
 
 
 
 
 
 100
 101	for (start = jiffies, end = start + secs * HZ, bcount = 0;
 102	     time_before(jiffies, end); bcount++) {
 103		if (enc)
 104			ret = crypto_blkcipher_encrypt(desc, sg, sg, blen);
 105		else
 106			ret = crypto_blkcipher_decrypt(desc, sg, sg, blen);
 107
 108		if (ret)
 109			return ret;
 110	}
 111
 112	printk("%d operations in %d seconds (%ld bytes)\n",
 113	       bcount, secs, (long)bcount * blen);
 114	return 0;
 
 
 
 115}
 116
 117static int test_cipher_cycles(struct blkcipher_desc *desc, int enc,
 118			      struct scatterlist *sg, int blen)
 119{
 120	unsigned long cycles = 0;
 121	int ret = 0;
 122	int i;
 
 123
 124	local_irq_disable();
 
 
 125
 126	/* Warm-up run. */
 127	for (i = 0; i < 4; i++) {
 128		if (enc)
 129			ret = crypto_blkcipher_encrypt(desc, sg, sg, blen);
 130		else
 131			ret = crypto_blkcipher_decrypt(desc, sg, sg, blen);
 132
 133		if (ret)
 134			goto out;
 135	}
 136
 137	/* The real thing. */
 138	for (i = 0; i < 8; i++) {
 139		cycles_t start, end;
 140
 141		start = get_cycles();
 142		if (enc)
 143			ret = crypto_blkcipher_encrypt(desc, sg, sg, blen);
 144		else
 145			ret = crypto_blkcipher_decrypt(desc, sg, sg, blen);
 146		end = get_cycles();
 147
 148		if (ret)
 149			goto out;
 150
 151		cycles += end - start;
 152	}
 153
 154out:
 155	local_irq_enable();
 156
 157	if (ret == 0)
 158		printk("1 operation in %lu cycles (%d bytes)\n",
 159		       (cycles + 4) / 8, blen);
 160
 
 
 161	return ret;
 162}
 163
 164static inline int do_one_aead_op(struct aead_request *req, int ret)
 
 
 
 165{
 166	if (ret == -EINPROGRESS || ret == -EBUSY) {
 167		struct tcrypt_result *tr = req->base.data;
 
 
 
 
 
 
 
 
 168
 169		ret = wait_for_completion_interruptible(&tr->completion);
 170		if (!ret)
 171			ret = tr->err;
 172		reinit_completion(&tr->completion);
 173	}
 174
 175	return ret;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 176}
 177
 178static int test_aead_jiffies(struct aead_request *req, int enc,
 179				int blen, int secs)
 180{
 181	unsigned long start, end;
 182	int bcount;
 183	int ret;
 184
 185	for (start = jiffies, end = start + secs * HZ, bcount = 0;
 186	     time_before(jiffies, end); bcount++) {
 187		if (enc)
 188			ret = do_one_aead_op(req, crypto_aead_encrypt(req));
 189		else
 190			ret = do_one_aead_op(req, crypto_aead_decrypt(req));
 191
 192		if (ret)
 193			return ret;
 194	}
 195
 196	printk("%d operations in %d seconds (%ld bytes)\n",
 197	       bcount, secs, (long)bcount * blen);
 198	return 0;
 199}
 200
 201static int test_aead_cycles(struct aead_request *req, int enc, int blen)
 202{
 203	unsigned long cycles = 0;
 204	int ret = 0;
 205	int i;
 206
 207	local_irq_disable();
 208
 209	/* Warm-up run. */
 210	for (i = 0; i < 4; i++) {
 211		if (enc)
 212			ret = do_one_aead_op(req, crypto_aead_encrypt(req));
 213		else
 214			ret = do_one_aead_op(req, crypto_aead_decrypt(req));
 215
 216		if (ret)
 217			goto out;
 218	}
 219
 220	/* The real thing. */
 221	for (i = 0; i < 8; i++) {
 222		cycles_t start, end;
 223
 224		start = get_cycles();
 225		if (enc)
 226			ret = do_one_aead_op(req, crypto_aead_encrypt(req));
 227		else
 228			ret = do_one_aead_op(req, crypto_aead_decrypt(req));
 229		end = get_cycles();
 230
 231		if (ret)
 232			goto out;
 233
 234		cycles += end - start;
 235	}
 236
 237out:
 238	local_irq_enable();
 239
 240	if (ret == 0)
 241		printk("1 operation in %lu cycles (%d bytes)\n",
 242		       (cycles + 4) / 8, blen);
 243
 244	return ret;
 245}
 246
 247static u32 block_sizes[] = { 16, 64, 256, 1024, 8192, 0 };
 248static u32 aead_sizes[] = { 16, 64, 256, 512, 1024, 2048, 4096, 8192, 0 };
 249
 250#define XBUFSIZE 8
 251#define MAX_IVLEN 32
 252
 253static int testmgr_alloc_buf(char *buf[XBUFSIZE])
 254{
 255	int i;
 256
 257	for (i = 0; i < XBUFSIZE; i++) {
 258		buf[i] = (void *)__get_free_page(GFP_KERNEL);
 259		if (!buf[i])
 260			goto err_free_buf;
 261	}
 262
 263	return 0;
 264
 265err_free_buf:
 266	while (i-- > 0)
 267		free_page((unsigned long)buf[i]);
 268
 269	return -ENOMEM;
 270}
 271
 272static void testmgr_free_buf(char *buf[XBUFSIZE])
 273{
 274	int i;
 275
 276	for (i = 0; i < XBUFSIZE; i++)
 277		free_page((unsigned long)buf[i]);
 278}
 279
 280static void sg_init_aead(struct scatterlist *sg, char *xbuf[XBUFSIZE],
 281			unsigned int buflen)
 282{
 283	int np = (buflen + PAGE_SIZE - 1)/PAGE_SIZE;
 284	int k, rem;
 285
 286	if (np > XBUFSIZE) {
 287		rem = PAGE_SIZE;
 288		np = XBUFSIZE;
 289	} else {
 290		rem = buflen % PAGE_SIZE;
 291	}
 292
 293	sg_init_table(sg, np + 1);
 294	np--;
 295	for (k = 0; k < np; k++)
 296		sg_set_buf(&sg[k + 1], xbuf[k], PAGE_SIZE);
 297
 298	sg_set_buf(&sg[k + 1], xbuf[k], rem);
 299}
 300
 301static void test_aead_speed(const char *algo, int enc, unsigned int secs,
 302			    struct aead_speed_template *template,
 303			    unsigned int tcount, u8 authsize,
 304			    unsigned int aad_size, u8 *keysize)
 305{
 306	unsigned int i, j;
 307	struct crypto_aead *tfm;
 308	int ret = -ENOMEM;
 309	const char *key;
 310	struct aead_request *req;
 311	struct scatterlist *sg;
 312	struct scatterlist *sgout;
 313	const char *e;
 314	void *assoc;
 315	char *iv;
 316	char *xbuf[XBUFSIZE];
 317	char *xoutbuf[XBUFSIZE];
 318	char *axbuf[XBUFSIZE];
 319	unsigned int *b_size;
 320	unsigned int iv_len;
 321	struct tcrypt_result result;
 322
 323	iv = kzalloc(MAX_IVLEN, GFP_KERNEL);
 324	if (!iv)
 325		return;
 326
 327	if (aad_size >= PAGE_SIZE) {
 328		pr_err("associate data length (%u) too big\n", aad_size);
 329		goto out_noxbuf;
 330	}
 331
 332	if (enc == ENCRYPT)
 333		e = "encryption";
 334	else
 335		e = "decryption";
 336
 337	if (testmgr_alloc_buf(xbuf))
 338		goto out_noxbuf;
 339	if (testmgr_alloc_buf(axbuf))
 340		goto out_noaxbuf;
 341	if (testmgr_alloc_buf(xoutbuf))
 342		goto out_nooutbuf;
 343
 344	sg = kmalloc(sizeof(*sg) * 9 * 2, GFP_KERNEL);
 345	if (!sg)
 346		goto out_nosg;
 347	sgout = &sg[9];
 348
 349	tfm = crypto_alloc_aead(algo, 0, 0);
 350
 351	if (IS_ERR(tfm)) {
 352		pr_err("alg: aead: Failed to load transform for %s: %ld\n", algo,
 353		       PTR_ERR(tfm));
 354		goto out_notfm;
 355	}
 356
 357	init_completion(&result.completion);
 358	printk(KERN_INFO "\ntesting speed of %s (%s) %s\n", algo,
 359			get_driver_name(crypto_aead, tfm), e);
 
 
 
 
 
 
 
 360
 361	req = aead_request_alloc(tfm, GFP_KERNEL);
 362	if (!req) {
 363		pr_err("alg: aead: Failed to allocate request for %s\n",
 364		       algo);
 365		goto out_noreq;
 366	}
 367
 368	aead_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
 369				  tcrypt_complete, &result);
 370
 371	i = 0;
 372	do {
 373		b_size = aead_sizes;
 374		do {
 
 
 375			assoc = axbuf[0];
 376			memset(assoc, 0xff, aad_size);
 377
 378			if ((*keysize + *b_size) > TVMEMSIZE * PAGE_SIZE) {
 379				pr_err("template (%u) too big for tvmem (%lu)\n",
 380				       *keysize + *b_size,
 381					TVMEMSIZE * PAGE_SIZE);
 382				goto out;
 383			}
 384
 385			key = tvmem[0];
 386			for (j = 0; j < tcount; j++) {
 387				if (template[j].klen == *keysize) {
 388					key = template[j].key;
 389					break;
 390				}
 391			}
 
 392			ret = crypto_aead_setkey(tfm, key, *keysize);
 393			ret = crypto_aead_setauthsize(tfm, authsize);
 
 
 
 
 394
 395			iv_len = crypto_aead_ivsize(tfm);
 396			if (iv_len)
 397				memset(iv, 0xff, iv_len);
 398
 399			crypto_aead_clear_flags(tfm, ~0);
 400			printk(KERN_INFO "test %u (%d bit key, %d byte blocks): ",
 401					i, *keysize * 8, *b_size);
 402
 403
 404			memset(tvmem[0], 0xff, PAGE_SIZE);
 405
 406			if (ret) {
 407				pr_err("setkey() failed flags=%x\n",
 408						crypto_aead_get_flags(tfm));
 409				goto out;
 410			}
 411
 412			sg_init_aead(sg, xbuf,
 413				    *b_size + (enc ? authsize : 0));
 414
 415			sg_init_aead(sgout, xoutbuf,
 416				    *b_size + (enc ? authsize : 0));
 
 417
 418			sg_set_buf(&sg[0], assoc, aad_size);
 419			sg_set_buf(&sgout[0], assoc, aad_size);
 420
 421			aead_request_set_crypt(req, sg, sgout, *b_size, iv);
 422			aead_request_set_ad(req, aad_size);
 423
 424			if (secs)
 425				ret = test_aead_jiffies(req, enc, *b_size,
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 426							secs);
 427			else
 428				ret = test_aead_cycles(req, enc, *b_size);
 
 
 429
 430			if (ret) {
 431				pr_err("%s() failed return code=%d\n", e, ret);
 432				break;
 433			}
 434			b_size++;
 435			i++;
 436		} while (*b_size);
 437		keysize++;
 438	} while (*keysize);
 439
 440out:
 441	aead_request_free(req);
 442out_noreq:
 443	crypto_free_aead(tfm);
 444out_notfm:
 445	kfree(sg);
 446out_nosg:
 447	testmgr_free_buf(xoutbuf);
 448out_nooutbuf:
 449	testmgr_free_buf(axbuf);
 450out_noaxbuf:
 451	testmgr_free_buf(xbuf);
 452out_noxbuf:
 453	kfree(iv);
 454	return;
 455}
 456
 457static void test_cipher_speed(const char *algo, int enc, unsigned int secs,
 458			      struct cipher_speed_template *template,
 459			      unsigned int tcount, u8 *keysize)
 460{
 461	unsigned int ret, i, j, iv_len;
 462	const char *key;
 463	char iv[128];
 464	struct crypto_blkcipher *tfm;
 465	struct blkcipher_desc desc;
 466	const char *e;
 467	u32 *b_size;
 468
 469	if (enc == ENCRYPT)
 470	        e = "encryption";
 471	else
 472		e = "decryption";
 473
 474	tfm = crypto_alloc_blkcipher(algo, 0, CRYPTO_ALG_ASYNC);
 475
 476	if (IS_ERR(tfm)) {
 477		printk("failed to load transform for %s: %ld\n", algo,
 478		       PTR_ERR(tfm));
 479		return;
 480	}
 481	desc.tfm = tfm;
 482	desc.flags = 0;
 483
 484	printk(KERN_INFO "\ntesting speed of %s (%s) %s\n", algo,
 485			get_driver_name(crypto_blkcipher, tfm), e);
 486
 487	i = 0;
 488	do {
 489
 490		b_size = block_sizes;
 491		do {
 492			struct scatterlist sg[TVMEMSIZE];
 493
 494			if ((*keysize + *b_size) > TVMEMSIZE * PAGE_SIZE) {
 495				printk("template (%u) too big for "
 496				       "tvmem (%lu)\n", *keysize + *b_size,
 497				       TVMEMSIZE * PAGE_SIZE);
 498				goto out;
 499			}
 500
 501			printk("test %u (%d bit key, %d byte blocks): ", i,
 502					*keysize * 8, *b_size);
 503
 504			memset(tvmem[0], 0xff, PAGE_SIZE);
 505
 506			/* set key, plain text and IV */
 507			key = tvmem[0];
 508			for (j = 0; j < tcount; j++) {
 509				if (template[j].klen == *keysize) {
 510					key = template[j].key;
 511					break;
 512				}
 513			}
 514
 515			ret = crypto_blkcipher_setkey(tfm, key, *keysize);
 516			if (ret) {
 517				printk("setkey() failed flags=%x\n",
 518						crypto_blkcipher_get_flags(tfm));
 519				goto out;
 520			}
 521
 522			sg_init_table(sg, TVMEMSIZE);
 523			sg_set_buf(sg, tvmem[0] + *keysize,
 524				   PAGE_SIZE - *keysize);
 525			for (j = 1; j < TVMEMSIZE; j++) {
 526				sg_set_buf(sg + j, tvmem[j], PAGE_SIZE);
 527				memset (tvmem[j], 0xff, PAGE_SIZE);
 528			}
 529
 530			iv_len = crypto_blkcipher_ivsize(tfm);
 531			if (iv_len) {
 532				memset(&iv, 0xff, iv_len);
 533				crypto_blkcipher_set_iv(tfm, iv, iv_len);
 534			}
 535
 536			if (secs)
 537				ret = test_cipher_jiffies(&desc, enc, sg,
 538							  *b_size, secs);
 539			else
 540				ret = test_cipher_cycles(&desc, enc, sg,
 541							 *b_size);
 542
 543			if (ret) {
 544				printk("%s() failed flags=%x\n", e, desc.flags);
 545				break;
 546			}
 547			b_size++;
 548			i++;
 549		} while (*b_size);
 550		keysize++;
 551	} while (*keysize);
 552
 553out:
 554	crypto_free_blkcipher(tfm);
 555}
 556
 557static void test_hash_sg_init(struct scatterlist *sg)
 558{
 559	int i;
 560
 561	sg_init_table(sg, TVMEMSIZE);
 562	for (i = 0; i < TVMEMSIZE; i++) {
 563		sg_set_buf(sg + i, tvmem[i], PAGE_SIZE);
 564		memset(tvmem[i], 0xff, PAGE_SIZE);
 565	}
 566}
 567
 568static inline int do_one_ahash_op(struct ahash_request *req, int ret)
 569{
 570	if (ret == -EINPROGRESS || ret == -EBUSY) {
 571		struct tcrypt_result *tr = req->base.data;
 572
 573		wait_for_completion(&tr->completion);
 574		reinit_completion(&tr->completion);
 575		ret = tr->err;
 576	}
 577	return ret;
 578}
 579
 580static int test_ahash_jiffies_digest(struct ahash_request *req, int blen,
 581				     char *out, int secs)
 582{
 583	unsigned long start, end;
 584	int bcount;
 585	int ret;
 586
 587	for (start = jiffies, end = start + secs * HZ, bcount = 0;
 588	     time_before(jiffies, end); bcount++) {
 589		ret = do_one_ahash_op(req, crypto_ahash_digest(req));
 590		if (ret)
 591			return ret;
 592	}
 593
 594	printk("%6u opers/sec, %9lu bytes/sec\n",
 595	       bcount / secs, ((long)bcount * blen) / secs);
 596
 597	return 0;
 598}
 599
 600static int test_ahash_jiffies(struct ahash_request *req, int blen,
 601			      int plen, char *out, int secs)
 602{
 603	unsigned long start, end;
 604	int bcount, pcount;
 605	int ret;
 606
 607	if (plen == blen)
 608		return test_ahash_jiffies_digest(req, blen, out, secs);
 609
 610	for (start = jiffies, end = start + secs * HZ, bcount = 0;
 611	     time_before(jiffies, end); bcount++) {
 612		ret = do_one_ahash_op(req, crypto_ahash_init(req));
 613		if (ret)
 614			return ret;
 615		for (pcount = 0; pcount < blen; pcount += plen) {
 616			ret = do_one_ahash_op(req, crypto_ahash_update(req));
 617			if (ret)
 618				return ret;
 619		}
 620		/* we assume there is enough space in 'out' for the result */
 621		ret = do_one_ahash_op(req, crypto_ahash_final(req));
 622		if (ret)
 623			return ret;
 624	}
 625
 626	pr_cont("%6u opers/sec, %9lu bytes/sec\n",
 627		bcount / secs, ((long)bcount * blen) / secs);
 628
 629	return 0;
 630}
 631
 632static int test_ahash_cycles_digest(struct ahash_request *req, int blen,
 633				    char *out)
 634{
 635	unsigned long cycles = 0;
 636	int ret, i;
 637
 638	/* Warm-up run. */
 639	for (i = 0; i < 4; i++) {
 640		ret = do_one_ahash_op(req, crypto_ahash_digest(req));
 641		if (ret)
 642			goto out;
 643	}
 644
 645	/* The real thing. */
 646	for (i = 0; i < 8; i++) {
 647		cycles_t start, end;
 648
 649		start = get_cycles();
 650
 651		ret = do_one_ahash_op(req, crypto_ahash_digest(req));
 652		if (ret)
 653			goto out;
 654
 655		end = get_cycles();
 656
 657		cycles += end - start;
 658	}
 659
 660out:
 661	if (ret)
 662		return ret;
 663
 664	pr_cont("%6lu cycles/operation, %4lu cycles/byte\n",
 665		cycles / 8, cycles / (8 * blen));
 666
 667	return 0;
 668}
 669
 670static int test_ahash_cycles(struct ahash_request *req, int blen,
 671			     int plen, char *out)
 672{
 673	unsigned long cycles = 0;
 674	int i, pcount, ret;
 675
 676	if (plen == blen)
 677		return test_ahash_cycles_digest(req, blen, out);
 678
 679	/* Warm-up run. */
 680	for (i = 0; i < 4; i++) {
 681		ret = do_one_ahash_op(req, crypto_ahash_init(req));
 682		if (ret)
 683			goto out;
 684		for (pcount = 0; pcount < blen; pcount += plen) {
 685			ret = do_one_ahash_op(req, crypto_ahash_update(req));
 686			if (ret)
 687				goto out;
 688		}
 689		ret = do_one_ahash_op(req, crypto_ahash_final(req));
 690		if (ret)
 691			goto out;
 692	}
 693
 694	/* The real thing. */
 695	for (i = 0; i < 8; i++) {
 696		cycles_t start, end;
 697
 698		start = get_cycles();
 699
 700		ret = do_one_ahash_op(req, crypto_ahash_init(req));
 701		if (ret)
 702			goto out;
 703		for (pcount = 0; pcount < blen; pcount += plen) {
 704			ret = do_one_ahash_op(req, crypto_ahash_update(req));
 705			if (ret)
 706				goto out;
 707		}
 708		ret = do_one_ahash_op(req, crypto_ahash_final(req));
 709		if (ret)
 710			goto out;
 711
 712		end = get_cycles();
 713
 714		cycles += end - start;
 715	}
 716
 717out:
 718	if (ret)
 719		return ret;
 720
 721	pr_cont("%6lu cycles/operation, %4lu cycles/byte\n",
 722		cycles / 8, cycles / (8 * blen));
 723
 724	return 0;
 725}
 726
 727static void test_ahash_speed_common(const char *algo, unsigned int secs,
 728				    struct hash_speed *speed, unsigned mask)
 729{
 730	struct scatterlist sg[TVMEMSIZE];
 731	struct tcrypt_result tresult;
 732	struct ahash_request *req;
 733	struct crypto_ahash *tfm;
 734	char *output;
 735	int i, ret;
 736
 737	tfm = crypto_alloc_ahash(algo, 0, mask);
 738	if (IS_ERR(tfm)) {
 739		pr_err("failed to load transform for %s: %ld\n",
 740		       algo, PTR_ERR(tfm));
 741		return;
 742	}
 743
 744	printk(KERN_INFO "\ntesting speed of async %s (%s)\n", algo,
 745			get_driver_name(crypto_ahash, tfm));
 746
 747	if (crypto_ahash_digestsize(tfm) > MAX_DIGEST_SIZE) {
 748		pr_err("digestsize(%u) > %d\n", crypto_ahash_digestsize(tfm),
 749		       MAX_DIGEST_SIZE);
 750		goto out;
 751	}
 752
 753	test_hash_sg_init(sg);
 754	req = ahash_request_alloc(tfm, GFP_KERNEL);
 755	if (!req) {
 756		pr_err("ahash request allocation failure\n");
 757		goto out;
 758	}
 759
 760	init_completion(&tresult.completion);
 761	ahash_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
 762				   tcrypt_complete, &tresult);
 763
 764	output = kmalloc(MAX_DIGEST_SIZE, GFP_KERNEL);
 765	if (!output)
 766		goto out_nomem;
 767
 768	for (i = 0; speed[i].blen != 0; i++) {
 769		if (speed[i].blen > TVMEMSIZE * PAGE_SIZE) {
 770			pr_err("template (%u) too big for tvmem (%lu)\n",
 771			       speed[i].blen, TVMEMSIZE * PAGE_SIZE);
 772			break;
 773		}
 774
 
 
 
 775		pr_info("test%3u "
 776			"(%5u byte blocks,%5u bytes per update,%4u updates): ",
 777			i, speed[i].blen, speed[i].plen, speed[i].blen / speed[i].plen);
 778
 779		ahash_request_set_crypt(req, sg, output, speed[i].plen);
 780
 781		if (secs)
 782			ret = test_ahash_jiffies(req, speed[i].blen,
 783						 speed[i].plen, output, secs);
 784		else
 
 785			ret = test_ahash_cycles(req, speed[i].blen,
 786						speed[i].plen, output);
 
 787
 788		if (ret) {
 789			pr_err("hashing failed ret=%d\n", ret);
 790			break;
 791		}
 792	}
 793
 794	kfree(output);
 795
 796out_nomem:
 797	ahash_request_free(req);
 798
 799out:
 800	crypto_free_ahash(tfm);
 801}
 802
 803static void test_ahash_speed(const char *algo, unsigned int secs,
 804			     struct hash_speed *speed)
 805{
 806	return test_ahash_speed_common(algo, secs, speed, 0);
 807}
 808
 809static void test_hash_speed(const char *algo, unsigned int secs,
 810			    struct hash_speed *speed)
 811{
 812	return test_ahash_speed_common(algo, secs, speed, CRYPTO_ALG_ASYNC);
 813}
 814
 815static inline int do_one_acipher_op(struct ablkcipher_request *req, int ret)
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 816{
 817	if (ret == -EINPROGRESS || ret == -EBUSY) {
 818		struct tcrypt_result *tr = req->base.data;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 819
 820		wait_for_completion(&tr->completion);
 821		reinit_completion(&tr->completion);
 822		ret = tr->err;
 
 
 823	}
 824
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 825	return ret;
 826}
 827
 828static int test_acipher_jiffies(struct ablkcipher_request *req, int enc,
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 829				int blen, int secs)
 830{
 831	unsigned long start, end;
 832	int bcount;
 833	int ret;
 834
 835	for (start = jiffies, end = start + secs * HZ, bcount = 0;
 836	     time_before(jiffies, end); bcount++) {
 837		if (enc)
 838			ret = do_one_acipher_op(req,
 839						crypto_ablkcipher_encrypt(req));
 840		else
 841			ret = do_one_acipher_op(req,
 842						crypto_ablkcipher_decrypt(req));
 843
 844		if (ret)
 845			return ret;
 846	}
 847
 848	pr_cont("%d operations in %d seconds (%ld bytes)\n",
 849		bcount, secs, (long)bcount * blen);
 850	return 0;
 851}
 852
 853static int test_acipher_cycles(struct ablkcipher_request *req, int enc,
 854			       int blen)
 855{
 856	unsigned long cycles = 0;
 857	int ret = 0;
 858	int i;
 859
 860	/* Warm-up run. */
 861	for (i = 0; i < 4; i++) {
 862		if (enc)
 863			ret = do_one_acipher_op(req,
 864						crypto_ablkcipher_encrypt(req));
 865		else
 866			ret = do_one_acipher_op(req,
 867						crypto_ablkcipher_decrypt(req));
 868
 869		if (ret)
 870			goto out;
 871	}
 872
 873	/* The real thing. */
 874	for (i = 0; i < 8; i++) {
 875		cycles_t start, end;
 876
 877		start = get_cycles();
 878		if (enc)
 879			ret = do_one_acipher_op(req,
 880						crypto_ablkcipher_encrypt(req));
 881		else
 882			ret = do_one_acipher_op(req,
 883						crypto_ablkcipher_decrypt(req));
 884		end = get_cycles();
 885
 886		if (ret)
 887			goto out;
 888
 889		cycles += end - start;
 890	}
 891
 892out:
 893	if (ret == 0)
 894		pr_cont("1 operation in %lu cycles (%d bytes)\n",
 895			(cycles + 4) / 8, blen);
 896
 897	return ret;
 898}
 899
 900static void test_acipher_speed(const char *algo, int enc, unsigned int secs,
 901			       struct cipher_speed_template *template,
 902			       unsigned int tcount, u8 *keysize)
 903{
 904	unsigned int ret, i, j, k, iv_len;
 905	struct tcrypt_result tresult;
 906	const char *key;
 907	char iv[128];
 908	struct ablkcipher_request *req;
 909	struct crypto_ablkcipher *tfm;
 
 910	const char *e;
 911	u32 *b_size;
 912
 913	if (enc == ENCRYPT)
 914		e = "encryption";
 915	else
 916		e = "decryption";
 917
 918	init_completion(&tresult.completion);
 919
 920	tfm = crypto_alloc_ablkcipher(algo, 0, 0);
 921
 922	if (IS_ERR(tfm)) {
 923		pr_err("failed to load transform for %s: %ld\n", algo,
 924		       PTR_ERR(tfm));
 925		return;
 926	}
 927
 928	pr_info("\ntesting speed of async %s (%s) %s\n", algo,
 929			get_driver_name(crypto_ablkcipher, tfm), e);
 930
 931	req = ablkcipher_request_alloc(tfm, GFP_KERNEL);
 932	if (!req) {
 933		pr_err("tcrypt: skcipher: Failed to allocate request for %s\n",
 934		       algo);
 935		goto out;
 936	}
 937
 938	ablkcipher_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
 939					tcrypt_complete, &tresult);
 940
 941	i = 0;
 942	do {
 943		b_size = block_sizes;
 944
 945		do {
 
 946			struct scatterlist sg[TVMEMSIZE];
 947
 948			if ((*keysize + *b_size) > TVMEMSIZE * PAGE_SIZE) {
 949				pr_err("template (%u) too big for "
 950				       "tvmem (%lu)\n", *keysize + *b_size,
 951				       TVMEMSIZE * PAGE_SIZE);
 952				goto out_free_req;
 953			}
 954
 955			pr_info("test %u (%d bit key, %d byte blocks): ", i,
 956				*keysize * 8, *b_size);
 957
 958			memset(tvmem[0], 0xff, PAGE_SIZE);
 959
 960			/* set key, plain text and IV */
 961			key = tvmem[0];
 962			for (j = 0; j < tcount; j++) {
 963				if (template[j].klen == *keysize) {
 964					key = template[j].key;
 965					break;
 966				}
 967			}
 968
 969			crypto_ablkcipher_clear_flags(tfm, ~0);
 970
 971			ret = crypto_ablkcipher_setkey(tfm, key, *keysize);
 972			if (ret) {
 973				pr_err("setkey() failed flags=%x\n",
 974					crypto_ablkcipher_get_flags(tfm));
 975				goto out_free_req;
 976			}
 977
 978			k = *keysize + *b_size;
 979			sg_init_table(sg, DIV_ROUND_UP(k, PAGE_SIZE));
 980
 981			if (k > PAGE_SIZE) {
 982				sg_set_buf(sg, tvmem[0] + *keysize,
 983				   PAGE_SIZE - *keysize);
 984				k -= PAGE_SIZE;
 985				j = 1;
 986				while (k > PAGE_SIZE) {
 987					sg_set_buf(sg + j, tvmem[j], PAGE_SIZE);
 988					memset(tvmem[j], 0xff, PAGE_SIZE);
 989					j++;
 990					k -= PAGE_SIZE;
 991				}
 992				sg_set_buf(sg + j, tvmem[j], k);
 993				memset(tvmem[j], 0xff, k);
 994			} else {
 995				sg_set_buf(sg, tvmem[0] + *keysize, *b_size);
 996			}
 997
 998			iv_len = crypto_ablkcipher_ivsize(tfm);
 999			if (iv_len)
1000				memset(&iv, 0xff, iv_len);
1001
1002			ablkcipher_request_set_crypt(req, sg, sg, *b_size, iv);
1003
1004			if (secs)
1005				ret = test_acipher_jiffies(req, enc,
1006							   *b_size, secs);
1007			else
 
1008				ret = test_acipher_cycles(req, enc,
1009							  *b_size);
 
1010
1011			if (ret) {
1012				pr_err("%s() failed flags=%x\n", e,
1013					crypto_ablkcipher_get_flags(tfm));
1014				break;
1015			}
1016			b_size++;
1017			i++;
1018		} while (*b_size);
1019		keysize++;
1020	} while (*keysize);
1021
1022out_free_req:
1023	ablkcipher_request_free(req);
1024out:
1025	crypto_free_ablkcipher(tfm);
1026}
1027
1028static void test_available(void)
 
 
1029{
1030	char **name = check;
 
 
1031
1032	while (*name) {
1033		printk("alg %s ", *name);
1034		printk(crypto_has_alg(*name, 0, 0) ?
1035		       "found\n" : "not found\n");
1036		name++;
1037	}
1038}
1039
1040static inline int tcrypt_test(const char *alg)
1041{
1042	int ret;
1043
 
 
1044	ret = alg_test(alg, alg, 0, 0);
1045	/* non-fips algs return -EINVAL in fips mode */
1046	if (fips_enabled && ret == -EINVAL)
1047		ret = 0;
1048	return ret;
1049}
1050
1051static int do_test(const char *alg, u32 type, u32 mask, int m)
1052{
1053	int i;
1054	int ret = 0;
1055
1056	switch (m) {
1057	case 0:
1058		if (alg) {
1059			if (!crypto_has_alg(alg, type,
1060					    mask ?: CRYPTO_ALG_TYPE_MASK))
1061				ret = -ENOENT;
1062			break;
1063		}
1064
1065		for (i = 1; i < 200; i++)
1066			ret += do_test(NULL, 0, 0, i);
1067		break;
1068
1069	case 1:
1070		ret += tcrypt_test("md5");
1071		break;
1072
1073	case 2:
1074		ret += tcrypt_test("sha1");
1075		break;
1076
1077	case 3:
1078		ret += tcrypt_test("ecb(des)");
1079		ret += tcrypt_test("cbc(des)");
1080		ret += tcrypt_test("ctr(des)");
1081		break;
1082
1083	case 4:
1084		ret += tcrypt_test("ecb(des3_ede)");
1085		ret += tcrypt_test("cbc(des3_ede)");
1086		ret += tcrypt_test("ctr(des3_ede)");
1087		break;
1088
1089	case 5:
1090		ret += tcrypt_test("md4");
1091		break;
1092
1093	case 6:
1094		ret += tcrypt_test("sha256");
1095		break;
1096
1097	case 7:
1098		ret += tcrypt_test("ecb(blowfish)");
1099		ret += tcrypt_test("cbc(blowfish)");
1100		ret += tcrypt_test("ctr(blowfish)");
1101		break;
1102
1103	case 8:
1104		ret += tcrypt_test("ecb(twofish)");
1105		ret += tcrypt_test("cbc(twofish)");
1106		ret += tcrypt_test("ctr(twofish)");
1107		ret += tcrypt_test("lrw(twofish)");
1108		ret += tcrypt_test("xts(twofish)");
1109		break;
1110
1111	case 9:
1112		ret += tcrypt_test("ecb(serpent)");
1113		ret += tcrypt_test("cbc(serpent)");
1114		ret += tcrypt_test("ctr(serpent)");
1115		ret += tcrypt_test("lrw(serpent)");
1116		ret += tcrypt_test("xts(serpent)");
1117		break;
1118
1119	case 10:
1120		ret += tcrypt_test("ecb(aes)");
1121		ret += tcrypt_test("cbc(aes)");
1122		ret += tcrypt_test("lrw(aes)");
1123		ret += tcrypt_test("xts(aes)");
1124		ret += tcrypt_test("ctr(aes)");
1125		ret += tcrypt_test("rfc3686(ctr(aes))");
 
1126		break;
1127
1128	case 11:
1129		ret += tcrypt_test("sha384");
1130		break;
1131
1132	case 12:
1133		ret += tcrypt_test("sha512");
1134		break;
1135
1136	case 13:
1137		ret += tcrypt_test("deflate");
1138		break;
1139
1140	case 14:
1141		ret += tcrypt_test("ecb(cast5)");
1142		ret += tcrypt_test("cbc(cast5)");
1143		ret += tcrypt_test("ctr(cast5)");
1144		break;
1145
1146	case 15:
1147		ret += tcrypt_test("ecb(cast6)");
1148		ret += tcrypt_test("cbc(cast6)");
1149		ret += tcrypt_test("ctr(cast6)");
1150		ret += tcrypt_test("lrw(cast6)");
1151		ret += tcrypt_test("xts(cast6)");
1152		break;
1153
1154	case 16:
1155		ret += tcrypt_test("ecb(arc4)");
1156		break;
1157
1158	case 17:
1159		ret += tcrypt_test("michael_mic");
1160		break;
1161
1162	case 18:
1163		ret += tcrypt_test("crc32c");
1164		break;
1165
1166	case 19:
1167		ret += tcrypt_test("ecb(tea)");
1168		break;
1169
1170	case 20:
1171		ret += tcrypt_test("ecb(xtea)");
1172		break;
1173
1174	case 21:
1175		ret += tcrypt_test("ecb(khazad)");
1176		break;
1177
1178	case 22:
1179		ret += tcrypt_test("wp512");
1180		break;
1181
1182	case 23:
1183		ret += tcrypt_test("wp384");
1184		break;
1185
1186	case 24:
1187		ret += tcrypt_test("wp256");
1188		break;
1189
1190	case 25:
1191		ret += tcrypt_test("ecb(tnepres)");
1192		break;
1193
1194	case 26:
1195		ret += tcrypt_test("ecb(anubis)");
1196		ret += tcrypt_test("cbc(anubis)");
1197		break;
1198
1199	case 27:
1200		ret += tcrypt_test("tgr192");
1201		break;
1202
1203	case 28:
1204		ret += tcrypt_test("tgr160");
1205		break;
1206
1207	case 29:
1208		ret += tcrypt_test("tgr128");
1209		break;
1210
1211	case 30:
1212		ret += tcrypt_test("ecb(xeta)");
1213		break;
1214
1215	case 31:
1216		ret += tcrypt_test("pcbc(fcrypt)");
1217		break;
1218
1219	case 32:
1220		ret += tcrypt_test("ecb(camellia)");
1221		ret += tcrypt_test("cbc(camellia)");
1222		ret += tcrypt_test("ctr(camellia)");
1223		ret += tcrypt_test("lrw(camellia)");
1224		ret += tcrypt_test("xts(camellia)");
1225		break;
1226
1227	case 33:
1228		ret += tcrypt_test("sha224");
1229		break;
1230
1231	case 34:
1232		ret += tcrypt_test("salsa20");
1233		break;
1234
1235	case 35:
1236		ret += tcrypt_test("gcm(aes)");
1237		break;
1238
1239	case 36:
1240		ret += tcrypt_test("lzo");
1241		break;
1242
1243	case 37:
1244		ret += tcrypt_test("ccm(aes)");
1245		break;
1246
1247	case 38:
1248		ret += tcrypt_test("cts(cbc(aes))");
1249		break;
1250
1251        case 39:
1252		ret += tcrypt_test("rmd128");
1253		break;
1254
1255        case 40:
1256		ret += tcrypt_test("rmd160");
1257		break;
1258
1259	case 41:
1260		ret += tcrypt_test("rmd256");
1261		break;
1262
1263	case 42:
1264		ret += tcrypt_test("rmd320");
1265		break;
1266
1267	case 43:
1268		ret += tcrypt_test("ecb(seed)");
1269		break;
1270
1271	case 44:
1272		ret += tcrypt_test("zlib");
1273		break;
1274
1275	case 45:
1276		ret += tcrypt_test("rfc4309(ccm(aes))");
1277		break;
1278
1279	case 46:
1280		ret += tcrypt_test("ghash");
1281		break;
1282
1283	case 47:
1284		ret += tcrypt_test("crct10dif");
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1285		break;
1286
1287	case 100:
1288		ret += tcrypt_test("hmac(md5)");
1289		break;
1290
1291	case 101:
1292		ret += tcrypt_test("hmac(sha1)");
1293		break;
1294
1295	case 102:
1296		ret += tcrypt_test("hmac(sha256)");
1297		break;
1298
1299	case 103:
1300		ret += tcrypt_test("hmac(sha384)");
1301		break;
1302
1303	case 104:
1304		ret += tcrypt_test("hmac(sha512)");
1305		break;
1306
1307	case 105:
1308		ret += tcrypt_test("hmac(sha224)");
1309		break;
1310
1311	case 106:
1312		ret += tcrypt_test("xcbc(aes)");
1313		break;
1314
1315	case 107:
1316		ret += tcrypt_test("hmac(rmd128)");
1317		break;
1318
1319	case 108:
1320		ret += tcrypt_test("hmac(rmd160)");
1321		break;
1322
1323	case 109:
1324		ret += tcrypt_test("vmac(aes)");
 
 
 
 
 
 
 
 
 
 
 
 
1325		break;
1326
1327	case 110:
1328		ret += tcrypt_test("hmac(crc32)");
 
 
 
 
 
 
 
 
1329		break;
1330
1331	case 150:
1332		ret += tcrypt_test("ansi_cprng");
1333		break;
1334
1335	case 151:
1336		ret += tcrypt_test("rfc4106(gcm(aes))");
1337		break;
1338
1339	case 152:
1340		ret += tcrypt_test("rfc4543(gcm(aes))");
1341		break;
1342
1343	case 153:
1344		ret += tcrypt_test("cmac(aes)");
1345		break;
1346
1347	case 154:
1348		ret += tcrypt_test("cmac(des3_ede)");
1349		break;
1350
1351	case 155:
1352		ret += tcrypt_test("authenc(hmac(sha1),cbc(aes))");
1353		break;
1354
1355	case 156:
1356		ret += tcrypt_test("authenc(hmac(md5),ecb(cipher_null))");
1357		break;
1358
1359	case 157:
1360		ret += tcrypt_test("authenc(hmac(sha1),ecb(cipher_null))");
 
 
 
 
1361		break;
 
 
 
 
 
 
 
 
 
1362	case 181:
1363		ret += tcrypt_test("authenc(hmac(sha1),cbc(des))");
1364		break;
1365	case 182:
1366		ret += tcrypt_test("authenc(hmac(sha1),cbc(des3_ede))");
1367		break;
1368	case 183:
1369		ret += tcrypt_test("authenc(hmac(sha224),cbc(des))");
1370		break;
1371	case 184:
1372		ret += tcrypt_test("authenc(hmac(sha224),cbc(des3_ede))");
1373		break;
1374	case 185:
1375		ret += tcrypt_test("authenc(hmac(sha256),cbc(des))");
1376		break;
1377	case 186:
1378		ret += tcrypt_test("authenc(hmac(sha256),cbc(des3_ede))");
1379		break;
1380	case 187:
1381		ret += tcrypt_test("authenc(hmac(sha384),cbc(des))");
1382		break;
1383	case 188:
1384		ret += tcrypt_test("authenc(hmac(sha384),cbc(des3_ede))");
1385		break;
1386	case 189:
1387		ret += tcrypt_test("authenc(hmac(sha512),cbc(des))");
1388		break;
1389	case 190:
1390		ret += tcrypt_test("authenc(hmac(sha512),cbc(des3_ede))");
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1391		break;
1392	case 200:
1393		test_cipher_speed("ecb(aes)", ENCRYPT, sec, NULL, 0,
1394				speed_template_16_24_32);
1395		test_cipher_speed("ecb(aes)", DECRYPT, sec, NULL, 0,
1396				speed_template_16_24_32);
1397		test_cipher_speed("cbc(aes)", ENCRYPT, sec, NULL, 0,
1398				speed_template_16_24_32);
1399		test_cipher_speed("cbc(aes)", DECRYPT, sec, NULL, 0,
1400				speed_template_16_24_32);
1401		test_cipher_speed("lrw(aes)", ENCRYPT, sec, NULL, 0,
1402				speed_template_32_40_48);
1403		test_cipher_speed("lrw(aes)", DECRYPT, sec, NULL, 0,
1404				speed_template_32_40_48);
1405		test_cipher_speed("xts(aes)", ENCRYPT, sec, NULL, 0,
1406				speed_template_32_48_64);
1407		test_cipher_speed("xts(aes)", DECRYPT, sec, NULL, 0,
1408				speed_template_32_48_64);
 
 
 
 
1409		test_cipher_speed("ctr(aes)", ENCRYPT, sec, NULL, 0,
1410				speed_template_16_24_32);
1411		test_cipher_speed("ctr(aes)", DECRYPT, sec, NULL, 0,
1412				speed_template_16_24_32);
1413		break;
1414
1415	case 201:
1416		test_cipher_speed("ecb(des3_ede)", ENCRYPT, sec,
1417				des3_speed_template, DES3_SPEED_VECTORS,
1418				speed_template_24);
1419		test_cipher_speed("ecb(des3_ede)", DECRYPT, sec,
1420				des3_speed_template, DES3_SPEED_VECTORS,
1421				speed_template_24);
1422		test_cipher_speed("cbc(des3_ede)", ENCRYPT, sec,
1423				des3_speed_template, DES3_SPEED_VECTORS,
1424				speed_template_24);
1425		test_cipher_speed("cbc(des3_ede)", DECRYPT, sec,
1426				des3_speed_template, DES3_SPEED_VECTORS,
1427				speed_template_24);
1428		test_cipher_speed("ctr(des3_ede)", ENCRYPT, sec,
1429				des3_speed_template, DES3_SPEED_VECTORS,
1430				speed_template_24);
1431		test_cipher_speed("ctr(des3_ede)", DECRYPT, sec,
1432				des3_speed_template, DES3_SPEED_VECTORS,
1433				speed_template_24);
1434		break;
1435
1436	case 202:
1437		test_cipher_speed("ecb(twofish)", ENCRYPT, sec, NULL, 0,
1438				speed_template_16_24_32);
1439		test_cipher_speed("ecb(twofish)", DECRYPT, sec, NULL, 0,
1440				speed_template_16_24_32);
1441		test_cipher_speed("cbc(twofish)", ENCRYPT, sec, NULL, 0,
1442				speed_template_16_24_32);
1443		test_cipher_speed("cbc(twofish)", DECRYPT, sec, NULL, 0,
1444				speed_template_16_24_32);
1445		test_cipher_speed("ctr(twofish)", ENCRYPT, sec, NULL, 0,
1446				speed_template_16_24_32);
1447		test_cipher_speed("ctr(twofish)", DECRYPT, sec, NULL, 0,
1448				speed_template_16_24_32);
1449		test_cipher_speed("lrw(twofish)", ENCRYPT, sec, NULL, 0,
1450				speed_template_32_40_48);
1451		test_cipher_speed("lrw(twofish)", DECRYPT, sec, NULL, 0,
1452				speed_template_32_40_48);
1453		test_cipher_speed("xts(twofish)", ENCRYPT, sec, NULL, 0,
1454				speed_template_32_48_64);
1455		test_cipher_speed("xts(twofish)", DECRYPT, sec, NULL, 0,
1456				speed_template_32_48_64);
1457		break;
1458
1459	case 203:
1460		test_cipher_speed("ecb(blowfish)", ENCRYPT, sec, NULL, 0,
1461				  speed_template_8_32);
1462		test_cipher_speed("ecb(blowfish)", DECRYPT, sec, NULL, 0,
1463				  speed_template_8_32);
1464		test_cipher_speed("cbc(blowfish)", ENCRYPT, sec, NULL, 0,
1465				  speed_template_8_32);
1466		test_cipher_speed("cbc(blowfish)", DECRYPT, sec, NULL, 0,
1467				  speed_template_8_32);
1468		test_cipher_speed("ctr(blowfish)", ENCRYPT, sec, NULL, 0,
1469				  speed_template_8_32);
1470		test_cipher_speed("ctr(blowfish)", DECRYPT, sec, NULL, 0,
1471				  speed_template_8_32);
1472		break;
1473
1474	case 204:
1475		test_cipher_speed("ecb(des)", ENCRYPT, sec, NULL, 0,
1476				  speed_template_8);
1477		test_cipher_speed("ecb(des)", DECRYPT, sec, NULL, 0,
1478				  speed_template_8);
1479		test_cipher_speed("cbc(des)", ENCRYPT, sec, NULL, 0,
1480				  speed_template_8);
1481		test_cipher_speed("cbc(des)", DECRYPT, sec, NULL, 0,
1482				  speed_template_8);
1483		break;
1484
1485	case 205:
1486		test_cipher_speed("ecb(camellia)", ENCRYPT, sec, NULL, 0,
1487				speed_template_16_24_32);
1488		test_cipher_speed("ecb(camellia)", DECRYPT, sec, NULL, 0,
1489				speed_template_16_24_32);
1490		test_cipher_speed("cbc(camellia)", ENCRYPT, sec, NULL, 0,
1491				speed_template_16_24_32);
1492		test_cipher_speed("cbc(camellia)", DECRYPT, sec, NULL, 0,
1493				speed_template_16_24_32);
1494		test_cipher_speed("ctr(camellia)", ENCRYPT, sec, NULL, 0,
1495				speed_template_16_24_32);
1496		test_cipher_speed("ctr(camellia)", DECRYPT, sec, NULL, 0,
1497				speed_template_16_24_32);
1498		test_cipher_speed("lrw(camellia)", ENCRYPT, sec, NULL, 0,
1499				speed_template_32_40_48);
1500		test_cipher_speed("lrw(camellia)", DECRYPT, sec, NULL, 0,
1501				speed_template_32_40_48);
1502		test_cipher_speed("xts(camellia)", ENCRYPT, sec, NULL, 0,
1503				speed_template_32_48_64);
1504		test_cipher_speed("xts(camellia)", DECRYPT, sec, NULL, 0,
1505				speed_template_32_48_64);
1506		break;
1507
1508	case 206:
1509		test_cipher_speed("salsa20", ENCRYPT, sec, NULL, 0,
1510				  speed_template_16_32);
1511		break;
1512
1513	case 207:
1514		test_cipher_speed("ecb(serpent)", ENCRYPT, sec, NULL, 0,
1515				  speed_template_16_32);
1516		test_cipher_speed("ecb(serpent)", DECRYPT, sec, NULL, 0,
1517				  speed_template_16_32);
1518		test_cipher_speed("cbc(serpent)", ENCRYPT, sec, NULL, 0,
1519				  speed_template_16_32);
1520		test_cipher_speed("cbc(serpent)", DECRYPT, sec, NULL, 0,
1521				  speed_template_16_32);
1522		test_cipher_speed("ctr(serpent)", ENCRYPT, sec, NULL, 0,
1523				  speed_template_16_32);
1524		test_cipher_speed("ctr(serpent)", DECRYPT, sec, NULL, 0,
1525				  speed_template_16_32);
1526		test_cipher_speed("lrw(serpent)", ENCRYPT, sec, NULL, 0,
1527				  speed_template_32_48);
1528		test_cipher_speed("lrw(serpent)", DECRYPT, sec, NULL, 0,
1529				  speed_template_32_48);
1530		test_cipher_speed("xts(serpent)", ENCRYPT, sec, NULL, 0,
1531				  speed_template_32_64);
1532		test_cipher_speed("xts(serpent)", DECRYPT, sec, NULL, 0,
1533				  speed_template_32_64);
1534		break;
1535
1536	case 208:
1537		test_cipher_speed("ecb(arc4)", ENCRYPT, sec, NULL, 0,
1538				  speed_template_8);
1539		break;
1540
1541	case 209:
1542		test_cipher_speed("ecb(cast5)", ENCRYPT, sec, NULL, 0,
1543				  speed_template_8_16);
1544		test_cipher_speed("ecb(cast5)", DECRYPT, sec, NULL, 0,
1545				  speed_template_8_16);
1546		test_cipher_speed("cbc(cast5)", ENCRYPT, sec, NULL, 0,
1547				  speed_template_8_16);
1548		test_cipher_speed("cbc(cast5)", DECRYPT, sec, NULL, 0,
1549				  speed_template_8_16);
1550		test_cipher_speed("ctr(cast5)", ENCRYPT, sec, NULL, 0,
1551				  speed_template_8_16);
1552		test_cipher_speed("ctr(cast5)", DECRYPT, sec, NULL, 0,
1553				  speed_template_8_16);
1554		break;
1555
1556	case 210:
1557		test_cipher_speed("ecb(cast6)", ENCRYPT, sec, NULL, 0,
1558				  speed_template_16_32);
1559		test_cipher_speed("ecb(cast6)", DECRYPT, sec, NULL, 0,
1560				  speed_template_16_32);
1561		test_cipher_speed("cbc(cast6)", ENCRYPT, sec, NULL, 0,
1562				  speed_template_16_32);
1563		test_cipher_speed("cbc(cast6)", DECRYPT, sec, NULL, 0,
1564				  speed_template_16_32);
1565		test_cipher_speed("ctr(cast6)", ENCRYPT, sec, NULL, 0,
1566				  speed_template_16_32);
1567		test_cipher_speed("ctr(cast6)", DECRYPT, sec, NULL, 0,
1568				  speed_template_16_32);
1569		test_cipher_speed("lrw(cast6)", ENCRYPT, sec, NULL, 0,
1570				  speed_template_32_48);
1571		test_cipher_speed("lrw(cast6)", DECRYPT, sec, NULL, 0,
1572				  speed_template_32_48);
1573		test_cipher_speed("xts(cast6)", ENCRYPT, sec, NULL, 0,
1574				  speed_template_32_64);
1575		test_cipher_speed("xts(cast6)", DECRYPT, sec, NULL, 0,
1576				  speed_template_32_64);
1577		break;
1578
1579	case 211:
1580		test_aead_speed("rfc4106(gcm(aes))", ENCRYPT, sec,
1581				NULL, 0, 16, 16, aead_speed_template_20);
1582		test_aead_speed("gcm(aes)", ENCRYPT, sec,
1583				NULL, 0, 16, 8, speed_template_16_24_32);
 
 
 
 
1584		break;
1585
1586	case 212:
1587		test_aead_speed("rfc4309(ccm(aes))", ENCRYPT, sec,
1588				NULL, 0, 16, 16, aead_speed_template_19);
 
 
1589		break;
1590
1591	case 213:
1592		test_aead_speed("rfc7539esp(chacha20,poly1305)", ENCRYPT, sec,
1593				NULL, 0, 16, 8, aead_speed_template_36);
 
 
1594		break;
1595
1596	case 214:
1597		test_cipher_speed("chacha20", ENCRYPT, sec, NULL, 0,
1598				  speed_template_32);
1599		break;
1600
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1601
1602	case 300:
1603		if (alg) {
1604			test_hash_speed(alg, sec, generic_hash_speed_template);
1605			break;
1606		}
1607
1608		/* fall through */
1609
1610	case 301:
1611		test_hash_speed("md4", sec, generic_hash_speed_template);
1612		if (mode > 300 && mode < 400) break;
1613
1614	case 302:
1615		test_hash_speed("md5", sec, generic_hash_speed_template);
1616		if (mode > 300 && mode < 400) break;
1617
1618	case 303:
1619		test_hash_speed("sha1", sec, generic_hash_speed_template);
1620		if (mode > 300 && mode < 400) break;
1621
1622	case 304:
1623		test_hash_speed("sha256", sec, generic_hash_speed_template);
1624		if (mode > 300 && mode < 400) break;
1625
1626	case 305:
1627		test_hash_speed("sha384", sec, generic_hash_speed_template);
1628		if (mode > 300 && mode < 400) break;
1629
1630	case 306:
1631		test_hash_speed("sha512", sec, generic_hash_speed_template);
1632		if (mode > 300 && mode < 400) break;
1633
1634	case 307:
1635		test_hash_speed("wp256", sec, generic_hash_speed_template);
1636		if (mode > 300 && mode < 400) break;
1637
1638	case 308:
1639		test_hash_speed("wp384", sec, generic_hash_speed_template);
1640		if (mode > 300 && mode < 400) break;
1641
1642	case 309:
1643		test_hash_speed("wp512", sec, generic_hash_speed_template);
1644		if (mode > 300 && mode < 400) break;
1645
1646	case 310:
1647		test_hash_speed("tgr128", sec, generic_hash_speed_template);
1648		if (mode > 300 && mode < 400) break;
1649
1650	case 311:
1651		test_hash_speed("tgr160", sec, generic_hash_speed_template);
1652		if (mode > 300 && mode < 400) break;
1653
1654	case 312:
1655		test_hash_speed("tgr192", sec, generic_hash_speed_template);
1656		if (mode > 300 && mode < 400) break;
1657
1658	case 313:
1659		test_hash_speed("sha224", sec, generic_hash_speed_template);
1660		if (mode > 300 && mode < 400) break;
1661
1662	case 314:
1663		test_hash_speed("rmd128", sec, generic_hash_speed_template);
1664		if (mode > 300 && mode < 400) break;
1665
1666	case 315:
1667		test_hash_speed("rmd160", sec, generic_hash_speed_template);
1668		if (mode > 300 && mode < 400) break;
1669
1670	case 316:
1671		test_hash_speed("rmd256", sec, generic_hash_speed_template);
1672		if (mode > 300 && mode < 400) break;
1673
1674	case 317:
1675		test_hash_speed("rmd320", sec, generic_hash_speed_template);
1676		if (mode > 300 && mode < 400) break;
1677
1678	case 318:
1679		test_hash_speed("ghash-generic", sec, hash_speed_template_16);
 
1680		if (mode > 300 && mode < 400) break;
1681
1682	case 319:
1683		test_hash_speed("crc32c", sec, generic_hash_speed_template);
1684		if (mode > 300 && mode < 400) break;
1685
1686	case 320:
1687		test_hash_speed("crct10dif", sec, generic_hash_speed_template);
1688		if (mode > 300 && mode < 400) break;
1689
1690	case 321:
1691		test_hash_speed("poly1305", sec, poly1305_speed_template);
1692		if (mode > 300 && mode < 400) break;
1693
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1694	case 399:
1695		break;
1696
1697	case 400:
1698		if (alg) {
1699			test_ahash_speed(alg, sec, generic_hash_speed_template);
1700			break;
1701		}
1702
1703		/* fall through */
1704
1705	case 401:
1706		test_ahash_speed("md4", sec, generic_hash_speed_template);
1707		if (mode > 400 && mode < 500) break;
1708
1709	case 402:
1710		test_ahash_speed("md5", sec, generic_hash_speed_template);
1711		if (mode > 400 && mode < 500) break;
1712
1713	case 403:
1714		test_ahash_speed("sha1", sec, generic_hash_speed_template);
1715		if (mode > 400 && mode < 500) break;
1716
1717	case 404:
1718		test_ahash_speed("sha256", sec, generic_hash_speed_template);
1719		if (mode > 400 && mode < 500) break;
1720
1721	case 405:
1722		test_ahash_speed("sha384", sec, generic_hash_speed_template);
1723		if (mode > 400 && mode < 500) break;
1724
1725	case 406:
1726		test_ahash_speed("sha512", sec, generic_hash_speed_template);
1727		if (mode > 400 && mode < 500) break;
1728
1729	case 407:
1730		test_ahash_speed("wp256", sec, generic_hash_speed_template);
1731		if (mode > 400 && mode < 500) break;
1732
1733	case 408:
1734		test_ahash_speed("wp384", sec, generic_hash_speed_template);
1735		if (mode > 400 && mode < 500) break;
1736
1737	case 409:
1738		test_ahash_speed("wp512", sec, generic_hash_speed_template);
1739		if (mode > 400 && mode < 500) break;
1740
1741	case 410:
1742		test_ahash_speed("tgr128", sec, generic_hash_speed_template);
1743		if (mode > 400 && mode < 500) break;
1744
1745	case 411:
1746		test_ahash_speed("tgr160", sec, generic_hash_speed_template);
1747		if (mode > 400 && mode < 500) break;
1748
1749	case 412:
1750		test_ahash_speed("tgr192", sec, generic_hash_speed_template);
1751		if (mode > 400 && mode < 500) break;
1752
1753	case 413:
1754		test_ahash_speed("sha224", sec, generic_hash_speed_template);
1755		if (mode > 400 && mode < 500) break;
1756
1757	case 414:
1758		test_ahash_speed("rmd128", sec, generic_hash_speed_template);
1759		if (mode > 400 && mode < 500) break;
1760
1761	case 415:
1762		test_ahash_speed("rmd160", sec, generic_hash_speed_template);
1763		if (mode > 400 && mode < 500) break;
1764
1765	case 416:
1766		test_ahash_speed("rmd256", sec, generic_hash_speed_template);
1767		if (mode > 400 && mode < 500) break;
1768
1769	case 417:
1770		test_ahash_speed("rmd320", sec, generic_hash_speed_template);
1771		if (mode > 400 && mode < 500) break;
1772
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1773	case 499:
1774		break;
1775
1776	case 500:
1777		test_acipher_speed("ecb(aes)", ENCRYPT, sec, NULL, 0,
1778				   speed_template_16_24_32);
1779		test_acipher_speed("ecb(aes)", DECRYPT, sec, NULL, 0,
1780				   speed_template_16_24_32);
1781		test_acipher_speed("cbc(aes)", ENCRYPT, sec, NULL, 0,
1782				   speed_template_16_24_32);
1783		test_acipher_speed("cbc(aes)", DECRYPT, sec, NULL, 0,
1784				   speed_template_16_24_32);
1785		test_acipher_speed("lrw(aes)", ENCRYPT, sec, NULL, 0,
1786				   speed_template_32_40_48);
1787		test_acipher_speed("lrw(aes)", DECRYPT, sec, NULL, 0,
1788				   speed_template_32_40_48);
1789		test_acipher_speed("xts(aes)", ENCRYPT, sec, NULL, 0,
1790				   speed_template_32_48_64);
1791		test_acipher_speed("xts(aes)", DECRYPT, sec, NULL, 0,
1792				   speed_template_32_48_64);
1793		test_acipher_speed("ctr(aes)", ENCRYPT, sec, NULL, 0,
1794				   speed_template_16_24_32);
1795		test_acipher_speed("ctr(aes)", DECRYPT, sec, NULL, 0,
1796				   speed_template_16_24_32);
1797		test_acipher_speed("cfb(aes)", ENCRYPT, sec, NULL, 0,
1798				   speed_template_16_24_32);
1799		test_acipher_speed("cfb(aes)", DECRYPT, sec, NULL, 0,
1800				   speed_template_16_24_32);
1801		test_acipher_speed("ofb(aes)", ENCRYPT, sec, NULL, 0,
1802				   speed_template_16_24_32);
1803		test_acipher_speed("ofb(aes)", DECRYPT, sec, NULL, 0,
1804				   speed_template_16_24_32);
1805		test_acipher_speed("rfc3686(ctr(aes))", ENCRYPT, sec, NULL, 0,
1806				   speed_template_20_28_36);
1807		test_acipher_speed("rfc3686(ctr(aes))", DECRYPT, sec, NULL, 0,
1808				   speed_template_20_28_36);
1809		break;
1810
1811	case 501:
1812		test_acipher_speed("ecb(des3_ede)", ENCRYPT, sec,
1813				   des3_speed_template, DES3_SPEED_VECTORS,
1814				   speed_template_24);
1815		test_acipher_speed("ecb(des3_ede)", DECRYPT, sec,
1816				   des3_speed_template, DES3_SPEED_VECTORS,
1817				   speed_template_24);
1818		test_acipher_speed("cbc(des3_ede)", ENCRYPT, sec,
1819				   des3_speed_template, DES3_SPEED_VECTORS,
1820				   speed_template_24);
1821		test_acipher_speed("cbc(des3_ede)", DECRYPT, sec,
1822				   des3_speed_template, DES3_SPEED_VECTORS,
1823				   speed_template_24);
1824		test_acipher_speed("cfb(des3_ede)", ENCRYPT, sec,
1825				   des3_speed_template, DES3_SPEED_VECTORS,
1826				   speed_template_24);
1827		test_acipher_speed("cfb(des3_ede)", DECRYPT, sec,
1828				   des3_speed_template, DES3_SPEED_VECTORS,
1829				   speed_template_24);
1830		test_acipher_speed("ofb(des3_ede)", ENCRYPT, sec,
1831				   des3_speed_template, DES3_SPEED_VECTORS,
1832				   speed_template_24);
1833		test_acipher_speed("ofb(des3_ede)", DECRYPT, sec,
1834				   des3_speed_template, DES3_SPEED_VECTORS,
1835				   speed_template_24);
1836		break;
1837
1838	case 502:
1839		test_acipher_speed("ecb(des)", ENCRYPT, sec, NULL, 0,
1840				   speed_template_8);
1841		test_acipher_speed("ecb(des)", DECRYPT, sec, NULL, 0,
1842				   speed_template_8);
1843		test_acipher_speed("cbc(des)", ENCRYPT, sec, NULL, 0,
1844				   speed_template_8);
1845		test_acipher_speed("cbc(des)", DECRYPT, sec, NULL, 0,
1846				   speed_template_8);
1847		test_acipher_speed("cfb(des)", ENCRYPT, sec, NULL, 0,
1848				   speed_template_8);
1849		test_acipher_speed("cfb(des)", DECRYPT, sec, NULL, 0,
1850				   speed_template_8);
1851		test_acipher_speed("ofb(des)", ENCRYPT, sec, NULL, 0,
1852				   speed_template_8);
1853		test_acipher_speed("ofb(des)", DECRYPT, sec, NULL, 0,
1854				   speed_template_8);
1855		break;
1856
1857	case 503:
1858		test_acipher_speed("ecb(serpent)", ENCRYPT, sec, NULL, 0,
1859				   speed_template_16_32);
1860		test_acipher_speed("ecb(serpent)", DECRYPT, sec, NULL, 0,
1861				   speed_template_16_32);
1862		test_acipher_speed("cbc(serpent)", ENCRYPT, sec, NULL, 0,
1863				   speed_template_16_32);
1864		test_acipher_speed("cbc(serpent)", DECRYPT, sec, NULL, 0,
1865				   speed_template_16_32);
1866		test_acipher_speed("ctr(serpent)", ENCRYPT, sec, NULL, 0,
1867				   speed_template_16_32);
1868		test_acipher_speed("ctr(serpent)", DECRYPT, sec, NULL, 0,
1869				   speed_template_16_32);
1870		test_acipher_speed("lrw(serpent)", ENCRYPT, sec, NULL, 0,
1871				   speed_template_32_48);
1872		test_acipher_speed("lrw(serpent)", DECRYPT, sec, NULL, 0,
1873				   speed_template_32_48);
1874		test_acipher_speed("xts(serpent)", ENCRYPT, sec, NULL, 0,
1875				   speed_template_32_64);
1876		test_acipher_speed("xts(serpent)", DECRYPT, sec, NULL, 0,
1877				   speed_template_32_64);
1878		break;
1879
1880	case 504:
1881		test_acipher_speed("ecb(twofish)", ENCRYPT, sec, NULL, 0,
1882				   speed_template_16_24_32);
1883		test_acipher_speed("ecb(twofish)", DECRYPT, sec, NULL, 0,
1884				   speed_template_16_24_32);
1885		test_acipher_speed("cbc(twofish)", ENCRYPT, sec, NULL, 0,
1886				   speed_template_16_24_32);
1887		test_acipher_speed("cbc(twofish)", DECRYPT, sec, NULL, 0,
1888				   speed_template_16_24_32);
1889		test_acipher_speed("ctr(twofish)", ENCRYPT, sec, NULL, 0,
1890				   speed_template_16_24_32);
1891		test_acipher_speed("ctr(twofish)", DECRYPT, sec, NULL, 0,
1892				   speed_template_16_24_32);
1893		test_acipher_speed("lrw(twofish)", ENCRYPT, sec, NULL, 0,
1894				   speed_template_32_40_48);
1895		test_acipher_speed("lrw(twofish)", DECRYPT, sec, NULL, 0,
1896				   speed_template_32_40_48);
1897		test_acipher_speed("xts(twofish)", ENCRYPT, sec, NULL, 0,
1898				   speed_template_32_48_64);
1899		test_acipher_speed("xts(twofish)", DECRYPT, sec, NULL, 0,
1900				   speed_template_32_48_64);
1901		break;
1902
1903	case 505:
1904		test_acipher_speed("ecb(arc4)", ENCRYPT, sec, NULL, 0,
1905				   speed_template_8);
1906		break;
1907
1908	case 506:
1909		test_acipher_speed("ecb(cast5)", ENCRYPT, sec, NULL, 0,
1910				   speed_template_8_16);
1911		test_acipher_speed("ecb(cast5)", DECRYPT, sec, NULL, 0,
1912				   speed_template_8_16);
1913		test_acipher_speed("cbc(cast5)", ENCRYPT, sec, NULL, 0,
1914				   speed_template_8_16);
1915		test_acipher_speed("cbc(cast5)", DECRYPT, sec, NULL, 0,
1916				   speed_template_8_16);
1917		test_acipher_speed("ctr(cast5)", ENCRYPT, sec, NULL, 0,
1918				   speed_template_8_16);
1919		test_acipher_speed("ctr(cast5)", DECRYPT, sec, NULL, 0,
1920				   speed_template_8_16);
1921		break;
1922
1923	case 507:
1924		test_acipher_speed("ecb(cast6)", ENCRYPT, sec, NULL, 0,
1925				   speed_template_16_32);
1926		test_acipher_speed("ecb(cast6)", DECRYPT, sec, NULL, 0,
1927				   speed_template_16_32);
1928		test_acipher_speed("cbc(cast6)", ENCRYPT, sec, NULL, 0,
1929				   speed_template_16_32);
1930		test_acipher_speed("cbc(cast6)", DECRYPT, sec, NULL, 0,
1931				   speed_template_16_32);
1932		test_acipher_speed("ctr(cast6)", ENCRYPT, sec, NULL, 0,
1933				   speed_template_16_32);
1934		test_acipher_speed("ctr(cast6)", DECRYPT, sec, NULL, 0,
1935				   speed_template_16_32);
1936		test_acipher_speed("lrw(cast6)", ENCRYPT, sec, NULL, 0,
1937				   speed_template_32_48);
1938		test_acipher_speed("lrw(cast6)", DECRYPT, sec, NULL, 0,
1939				   speed_template_32_48);
1940		test_acipher_speed("xts(cast6)", ENCRYPT, sec, NULL, 0,
1941				   speed_template_32_64);
1942		test_acipher_speed("xts(cast6)", DECRYPT, sec, NULL, 0,
1943				   speed_template_32_64);
1944		break;
1945
1946	case 508:
1947		test_acipher_speed("ecb(camellia)", ENCRYPT, sec, NULL, 0,
1948				   speed_template_16_32);
1949		test_acipher_speed("ecb(camellia)", DECRYPT, sec, NULL, 0,
1950				   speed_template_16_32);
1951		test_acipher_speed("cbc(camellia)", ENCRYPT, sec, NULL, 0,
1952				   speed_template_16_32);
1953		test_acipher_speed("cbc(camellia)", DECRYPT, sec, NULL, 0,
1954				   speed_template_16_32);
1955		test_acipher_speed("ctr(camellia)", ENCRYPT, sec, NULL, 0,
1956				   speed_template_16_32);
1957		test_acipher_speed("ctr(camellia)", DECRYPT, sec, NULL, 0,
1958				   speed_template_16_32);
1959		test_acipher_speed("lrw(camellia)", ENCRYPT, sec, NULL, 0,
1960				   speed_template_32_48);
1961		test_acipher_speed("lrw(camellia)", DECRYPT, sec, NULL, 0,
1962				   speed_template_32_48);
1963		test_acipher_speed("xts(camellia)", ENCRYPT, sec, NULL, 0,
1964				   speed_template_32_64);
1965		test_acipher_speed("xts(camellia)", DECRYPT, sec, NULL, 0,
1966				   speed_template_32_64);
1967		break;
1968
1969	case 509:
1970		test_acipher_speed("ecb(blowfish)", ENCRYPT, sec, NULL, 0,
1971				   speed_template_8_32);
1972		test_acipher_speed("ecb(blowfish)", DECRYPT, sec, NULL, 0,
1973				   speed_template_8_32);
1974		test_acipher_speed("cbc(blowfish)", ENCRYPT, sec, NULL, 0,
1975				   speed_template_8_32);
1976		test_acipher_speed("cbc(blowfish)", DECRYPT, sec, NULL, 0,
1977				   speed_template_8_32);
1978		test_acipher_speed("ctr(blowfish)", ENCRYPT, sec, NULL, 0,
1979				   speed_template_8_32);
1980		test_acipher_speed("ctr(blowfish)", DECRYPT, sec, NULL, 0,
1981				   speed_template_8_32);
1982		break;
1983
1984	case 1000:
1985		test_available();
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1986		break;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1987	}
1988
1989	return ret;
1990}
1991
1992static int __init tcrypt_mod_init(void)
1993{
1994	int err = -ENOMEM;
1995	int i;
1996
1997	for (i = 0; i < TVMEMSIZE; i++) {
1998		tvmem[i] = (void *)__get_free_page(GFP_KERNEL);
1999		if (!tvmem[i])
2000			goto err_free_tv;
2001	}
2002
2003	err = do_test(alg, type, mask, mode);
2004
2005	if (err) {
2006		printk(KERN_ERR "tcrypt: one or more tests failed!\n");
2007		goto err_free_tv;
 
 
2008	}
2009
2010	/* We intentionaly return -EAGAIN to prevent keeping the module,
2011	 * unless we're running in fips mode. It does all its work from
2012	 * init() and doesn't offer any runtime functionality, but in
2013	 * the fips case, checking for a successful load is helpful.
2014	 * => we don't need it in the memory, do we?
2015	 *                                        -- mludvig
2016	 */
2017	if (!fips_enabled)
2018		err = -EAGAIN;
2019
2020err_free_tv:
2021	for (i = 0; i < TVMEMSIZE && tvmem[i]; i++)
2022		free_page((unsigned long)tvmem[i]);
2023
2024	return err;
2025}
2026
2027/*
2028 * If an init function is provided, an exit function must also be provided
2029 * to allow module unload.
2030 */
2031static void __exit tcrypt_mod_fini(void) { }
2032
2033module_init(tcrypt_mod_init);
2034module_exit(tcrypt_mod_fini);
2035
2036module_param(alg, charp, 0);
2037module_param(type, uint, 0);
2038module_param(mask, uint, 0);
2039module_param(mode, int, 0);
2040module_param(sec, uint, 0);
2041MODULE_PARM_DESC(sec, "Length in seconds of speed tests "
2042		      "(defaults to zero which uses CPU cycles instead)");
 
 
 
 
2043
2044MODULE_LICENSE("GPL");
2045MODULE_DESCRIPTION("Quick & dirty crypto testing module");
2046MODULE_AUTHOR("James Morris <jmorris@intercode.com.au>");
v6.9.4
   1// SPDX-License-Identifier: GPL-2.0-or-later
   2/*
   3 * Quick & dirty crypto testing module.
   4 *
   5 * This will only exist until we have a better testing mechanism
   6 * (e.g. a char device).
   7 *
   8 * Copyright (c) 2002 James Morris <jmorris@intercode.com.au>
   9 * Copyright (c) 2002 Jean-Francois Dive <jef@linuxbe.org>
  10 * Copyright (c) 2007 Nokia Siemens Networks
  11 *
  12 * Updated RFC4106 AES-GCM testing.
  13 *    Authors: Aidan O'Mahony (aidan.o.mahony@intel.com)
  14 *             Adrian Hoban <adrian.hoban@intel.com>
  15 *             Gabriele Paoloni <gabriele.paoloni@intel.com>
  16 *             Tadeusz Struk (tadeusz.struk@intel.com)
  17 *             Copyright (c) 2010, Intel Corporation.
 
 
 
 
 
 
  18 */
  19
  20#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
  21
  22#include <crypto/aead.h>
  23#include <crypto/hash.h>
  24#include <crypto/skcipher.h>
  25#include <linux/err.h>
  26#include <linux/fips.h>
  27#include <linux/init.h>
  28#include <linux/interrupt.h>
  29#include <linux/jiffies.h>
  30#include <linux/kernel.h>
  31#include <linux/module.h>
  32#include <linux/moduleparam.h>
  33#include <linux/scatterlist.h>
  34#include <linux/slab.h>
  35#include <linux/string.h>
 
 
  36#include <linux/timex.h>
  37
  38#include "internal.h"
  39#include "tcrypt.h"
  40
  41/*
  42 * Need slab memory for testing (size in number of pages).
  43 */
  44#define TVMEMSIZE	4
  45
  46/*
  47* Used by test_cipher_speed()
  48*/
  49#define ENCRYPT 1
  50#define DECRYPT 0
  51
  52#define MAX_DIGEST_SIZE		64
  53
  54/*
  55 * return a string with the driver name
  56 */
  57#define get_driver_name(tfm_type, tfm) crypto_tfm_alg_driver_name(tfm_type ## _tfm(tfm))
  58
  59/*
  60 * Used by test_cipher_speed()
  61 */
  62static unsigned int sec;
  63
  64static char *alg;
  65static u32 type;
  66static u32 mask;
  67static int mode;
  68static u32 num_mb = 8;
  69static unsigned int klen;
  70static char *tvmem[TVMEMSIZE];
  71
  72static const int block_sizes[] = { 16, 64, 128, 256, 1024, 1420, 4096, 0 };
  73static const int aead_sizes[] = { 16, 64, 256, 512, 1024, 1420, 4096, 8192, 0 };
  74
  75#define XBUFSIZE 8
  76#define MAX_IVLEN 32
  77
  78static int testmgr_alloc_buf(char *buf[XBUFSIZE])
  79{
  80	int i;
  81
  82	for (i = 0; i < XBUFSIZE; i++) {
  83		buf[i] = (void *)__get_free_page(GFP_KERNEL);
  84		if (!buf[i])
  85			goto err_free_buf;
  86	}
  87
  88	return 0;
  89
  90err_free_buf:
  91	while (i-- > 0)
  92		free_page((unsigned long)buf[i]);
  93
  94	return -ENOMEM;
  95}
  96
  97static void testmgr_free_buf(char *buf[XBUFSIZE])
  98{
  99	int i;
 100
 101	for (i = 0; i < XBUFSIZE; i++)
 102		free_page((unsigned long)buf[i]);
 103}
 104
 105static void sg_init_aead(struct scatterlist *sg, char *xbuf[XBUFSIZE],
 106			 unsigned int buflen, const void *assoc,
 107			 unsigned int aad_size)
 108{
 109	int np = (buflen + PAGE_SIZE - 1)/PAGE_SIZE;
 110	int k, rem;
 111
 112	if (np > XBUFSIZE) {
 113		rem = PAGE_SIZE;
 114		np = XBUFSIZE;
 115	} else {
 116		rem = buflen % PAGE_SIZE;
 117	}
 118
 119	sg_init_table(sg, np + 1);
 120
 121	sg_set_buf(&sg[0], assoc, aad_size);
 122
 123	if (rem)
 124		np--;
 125	for (k = 0; k < np; k++)
 126		sg_set_buf(&sg[k + 1], xbuf[k], PAGE_SIZE);
 127
 128	if (rem)
 129		sg_set_buf(&sg[k + 1], xbuf[k], rem);
 130}
 131
 132static inline int do_one_aead_op(struct aead_request *req, int ret)
 133{
 134	struct crypto_wait *wait = req->base.data;
 135
 136	return crypto_wait_req(ret, wait);
 137}
 138
 139struct test_mb_aead_data {
 140	struct scatterlist sg[XBUFSIZE];
 141	struct scatterlist sgout[XBUFSIZE];
 142	struct aead_request *req;
 143	struct crypto_wait wait;
 144	char *xbuf[XBUFSIZE];
 145	char *xoutbuf[XBUFSIZE];
 146	char *axbuf[XBUFSIZE];
 147};
 148
 149static int do_mult_aead_op(struct test_mb_aead_data *data, int enc,
 150				u32 num_mb, int *rc)
 151{
 152	int i, err = 0;
 153
 154	/* Fire up a bunch of concurrent requests */
 155	for (i = 0; i < num_mb; i++) {
 156		if (enc == ENCRYPT)
 157			rc[i] = crypto_aead_encrypt(data[i].req);
 158		else
 159			rc[i] = crypto_aead_decrypt(data[i].req);
 160	}
 161
 162	/* Wait for all requests to finish */
 163	for (i = 0; i < num_mb; i++) {
 164		rc[i] = crypto_wait_req(rc[i], &data[i].wait);
 165
 166		if (rc[i]) {
 167			pr_info("concurrent request %d error %d\n", i, rc[i]);
 168			err = rc[i];
 169		}
 170	}
 171
 172	return err;
 173}
 174
 175static int test_mb_aead_jiffies(struct test_mb_aead_data *data, int enc,
 176				int blen, int secs, u32 num_mb)
 177{
 178	unsigned long start, end;
 179	int bcount;
 180	int ret = 0;
 181	int *rc;
 182
 183	rc = kcalloc(num_mb, sizeof(*rc), GFP_KERNEL);
 184	if (!rc)
 185		return -ENOMEM;
 186
 187	for (start = jiffies, end = start + secs * HZ, bcount = 0;
 188	     time_before(jiffies, end); bcount++) {
 189		ret = do_mult_aead_op(data, enc, num_mb, rc);
 
 
 
 
 190		if (ret)
 191			goto out;
 192	}
 193
 194	pr_cont("%d operations in %d seconds (%llu bytes)\n",
 195		bcount * num_mb, secs, (u64)bcount * blen * num_mb);
 196
 197out:
 198	kfree(rc);
 199	return ret;
 200}
 201
 202static int test_mb_aead_cycles(struct test_mb_aead_data *data, int enc,
 203			       int blen, u32 num_mb)
 204{
 205	unsigned long cycles = 0;
 206	int ret = 0;
 207	int i;
 208	int *rc;
 209
 210	rc = kcalloc(num_mb, sizeof(*rc), GFP_KERNEL);
 211	if (!rc)
 212		return -ENOMEM;
 213
 214	/* Warm-up run. */
 215	for (i = 0; i < 4; i++) {
 216		ret = do_mult_aead_op(data, enc, num_mb, rc);
 
 
 
 
 217		if (ret)
 218			goto out;
 219	}
 220
 221	/* The real thing. */
 222	for (i = 0; i < 8; i++) {
 223		cycles_t start, end;
 224
 225		start = get_cycles();
 226		ret = do_mult_aead_op(data, enc, num_mb, rc);
 
 
 
 227		end = get_cycles();
 228
 229		if (ret)
 230			goto out;
 231
 232		cycles += end - start;
 233	}
 234
 235	pr_cont("1 operation in %lu cycles (%d bytes)\n",
 236		(cycles + 4) / (8 * num_mb), blen);
 
 
 
 
 237
 238out:
 239	kfree(rc);
 240	return ret;
 241}
 242
 243static void test_mb_aead_speed(const char *algo, int enc, int secs,
 244			       struct aead_speed_template *template,
 245			       unsigned int tcount, u8 authsize,
 246			       unsigned int aad_size, u8 *keysize, u32 num_mb)
 247{
 248	struct test_mb_aead_data *data;
 249	struct crypto_aead *tfm;
 250	unsigned int i, j, iv_len;
 251	const int *b_size;
 252	const char *key;
 253	const char *e;
 254	void *assoc;
 255	char *iv;
 256	int ret;
 257
 258
 259	if (aad_size >= PAGE_SIZE) {
 260		pr_err("associate data length (%u) too big\n", aad_size);
 261		return;
 
 262	}
 263
 264	iv = kzalloc(MAX_IVLEN, GFP_KERNEL);
 265	if (!iv)
 266		return;
 267
 268	if (enc == ENCRYPT)
 269		e = "encryption";
 270	else
 271		e = "decryption";
 272
 273	data = kcalloc(num_mb, sizeof(*data), GFP_KERNEL);
 274	if (!data)
 275		goto out_free_iv;
 276
 277	tfm = crypto_alloc_aead(algo, 0, 0);
 278	if (IS_ERR(tfm)) {
 279		pr_err("failed to load transform for %s: %ld\n",
 280			algo, PTR_ERR(tfm));
 281		goto out_free_data;
 282	}
 283
 284	ret = crypto_aead_setauthsize(tfm, authsize);
 285	if (ret) {
 286		pr_err("alg: aead: Failed to setauthsize for %s: %d\n", algo,
 287		       ret);
 288		goto out_free_tfm;
 289	}
 290
 291	for (i = 0; i < num_mb; ++i)
 292		if (testmgr_alloc_buf(data[i].xbuf)) {
 293			while (i--)
 294				testmgr_free_buf(data[i].xbuf);
 295			goto out_free_tfm;
 296		}
 297
 298	for (i = 0; i < num_mb; ++i)
 299		if (testmgr_alloc_buf(data[i].axbuf)) {
 300			while (i--)
 301				testmgr_free_buf(data[i].axbuf);
 302			goto out_free_xbuf;
 303		}
 304
 305	for (i = 0; i < num_mb; ++i)
 306		if (testmgr_alloc_buf(data[i].xoutbuf)) {
 307			while (i--)
 308				testmgr_free_buf(data[i].xoutbuf);
 309			goto out_free_axbuf;
 310		}
 311
 312	for (i = 0; i < num_mb; ++i) {
 313		data[i].req = aead_request_alloc(tfm, GFP_KERNEL);
 314		if (!data[i].req) {
 315			pr_err("alg: aead: Failed to allocate request for %s\n",
 316			       algo);
 317			while (i--)
 318				aead_request_free(data[i].req);
 319			goto out_free_xoutbuf;
 320		}
 321	}
 322
 323	for (i = 0; i < num_mb; ++i) {
 324		crypto_init_wait(&data[i].wait);
 325		aead_request_set_callback(data[i].req,
 326					  CRYPTO_TFM_REQ_MAY_BACKLOG,
 327					  crypto_req_done, &data[i].wait);
 328	}
 329
 330	pr_info("testing speed of multibuffer %s (%s) %s\n", algo,
 331		get_driver_name(crypto_aead, tfm), e);
 332
 333	i = 0;
 334	do {
 335		b_size = aead_sizes;
 336		do {
 337			int bs = round_up(*b_size, crypto_aead_blocksize(tfm));
 338
 339			if (bs + authsize > XBUFSIZE * PAGE_SIZE) {
 340				pr_err("template (%u) too big for buffer (%lu)\n",
 341				       authsize + bs,
 342				       XBUFSIZE * PAGE_SIZE);
 343				goto out;
 344			}
 345
 346			pr_info("test %u (%d bit key, %d byte blocks): ", i,
 347				*keysize * 8, bs);
 348
 349			/* Set up tfm global state, i.e. the key */
 350
 351			memset(tvmem[0], 0xff, PAGE_SIZE);
 352			key = tvmem[0];
 353			for (j = 0; j < tcount; j++) {
 354				if (template[j].klen == *keysize) {
 355					key = template[j].key;
 356					break;
 357				}
 358			}
 359
 360			crypto_aead_clear_flags(tfm, ~0);
 361
 362			ret = crypto_aead_setkey(tfm, key, *keysize);
 363			if (ret) {
 364				pr_err("setkey() failed flags=%x\n",
 365				       crypto_aead_get_flags(tfm));
 366				goto out;
 367			}
 368
 369			iv_len = crypto_aead_ivsize(tfm);
 370			if (iv_len)
 371				memset(iv, 0xff, iv_len);
 372
 373			/* Now setup per request stuff, i.e. buffers */
 374
 375			for (j = 0; j < num_mb; ++j) {
 376				struct test_mb_aead_data *cur = &data[j];
 377
 378				assoc = cur->axbuf[0];
 379				memset(assoc, 0xff, aad_size);
 380
 381				sg_init_aead(cur->sg, cur->xbuf,
 382					     bs + (enc ? 0 : authsize),
 383					     assoc, aad_size);
 384
 385				sg_init_aead(cur->sgout, cur->xoutbuf,
 386					     bs + (enc ? authsize : 0),
 387					     assoc, aad_size);
 388
 389				aead_request_set_ad(cur->req, aad_size);
 390
 391				if (!enc) {
 392
 393					aead_request_set_crypt(cur->req,
 394							       cur->sgout,
 395							       cur->sg,
 396							       bs, iv);
 397					ret = crypto_aead_encrypt(cur->req);
 398					ret = do_one_aead_op(cur->req, ret);
 399
 400					if (ret) {
 401						pr_err("calculating auth failed (%d)\n",
 402						       ret);
 403						break;
 404					}
 405				}
 406
 407				aead_request_set_crypt(cur->req, cur->sg,
 408						       cur->sgout, bs +
 409						       (enc ? 0 : authsize),
 410						       iv);
 411
 412			}
 413
 414			if (secs) {
 415				ret = test_mb_aead_jiffies(data, enc, bs,
 416							   secs, num_mb);
 417				cond_resched();
 418			} else {
 419				ret = test_mb_aead_cycles(data, enc, bs,
 420							  num_mb);
 421			}
 422
 423			if (ret) {
 424				pr_err("%s() failed return code=%d\n", e, ret);
 425				break;
 426			}
 427			b_size++;
 428			i++;
 429		} while (*b_size);
 430		keysize++;
 431	} while (*keysize);
 432
 433out:
 434	for (i = 0; i < num_mb; ++i)
 435		aead_request_free(data[i].req);
 436out_free_xoutbuf:
 437	for (i = 0; i < num_mb; ++i)
 438		testmgr_free_buf(data[i].xoutbuf);
 439out_free_axbuf:
 440	for (i = 0; i < num_mb; ++i)
 441		testmgr_free_buf(data[i].axbuf);
 442out_free_xbuf:
 443	for (i = 0; i < num_mb; ++i)
 444		testmgr_free_buf(data[i].xbuf);
 445out_free_tfm:
 446	crypto_free_aead(tfm);
 447out_free_data:
 448	kfree(data);
 449out_free_iv:
 450	kfree(iv);
 451}
 452
 453static int test_aead_jiffies(struct aead_request *req, int enc,
 454				int blen, int secs)
 455{
 456	unsigned long start, end;
 457	int bcount;
 458	int ret;
 459
 460	for (start = jiffies, end = start + secs * HZ, bcount = 0;
 461	     time_before(jiffies, end); bcount++) {
 462		if (enc)
 463			ret = do_one_aead_op(req, crypto_aead_encrypt(req));
 464		else
 465			ret = do_one_aead_op(req, crypto_aead_decrypt(req));
 466
 467		if (ret)
 468			return ret;
 469	}
 470
 471	pr_cont("%d operations in %d seconds (%llu bytes)\n",
 472	        bcount, secs, (u64)bcount * blen);
 473	return 0;
 474}
 475
 476static int test_aead_cycles(struct aead_request *req, int enc, int blen)
 477{
 478	unsigned long cycles = 0;
 479	int ret = 0;
 480	int i;
 481
 
 
 482	/* Warm-up run. */
 483	for (i = 0; i < 4; i++) {
 484		if (enc)
 485			ret = do_one_aead_op(req, crypto_aead_encrypt(req));
 486		else
 487			ret = do_one_aead_op(req, crypto_aead_decrypt(req));
 488
 489		if (ret)
 490			goto out;
 491	}
 492
 493	/* The real thing. */
 494	for (i = 0; i < 8; i++) {
 495		cycles_t start, end;
 496
 497		start = get_cycles();
 498		if (enc)
 499			ret = do_one_aead_op(req, crypto_aead_encrypt(req));
 500		else
 501			ret = do_one_aead_op(req, crypto_aead_decrypt(req));
 502		end = get_cycles();
 503
 504		if (ret)
 505			goto out;
 506
 507		cycles += end - start;
 508	}
 509
 510out:
 
 
 511	if (ret == 0)
 512		pr_cont("1 operation in %lu cycles (%d bytes)\n",
 513			(cycles + 4) / 8, blen);
 514
 515	return ret;
 516}
 517
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 518static void test_aead_speed(const char *algo, int enc, unsigned int secs,
 519			    struct aead_speed_template *template,
 520			    unsigned int tcount, u8 authsize,
 521			    unsigned int aad_size, u8 *keysize)
 522{
 523	unsigned int i, j;
 524	struct crypto_aead *tfm;
 525	int ret = -ENOMEM;
 526	const char *key;
 527	struct aead_request *req;
 528	struct scatterlist *sg;
 529	struct scatterlist *sgout;
 530	const char *e;
 531	void *assoc;
 532	char *iv;
 533	char *xbuf[XBUFSIZE];
 534	char *xoutbuf[XBUFSIZE];
 535	char *axbuf[XBUFSIZE];
 536	const int *b_size;
 537	unsigned int iv_len;
 538	struct crypto_wait wait;
 539
 540	iv = kzalloc(MAX_IVLEN, GFP_KERNEL);
 541	if (!iv)
 542		return;
 543
 544	if (aad_size >= PAGE_SIZE) {
 545		pr_err("associate data length (%u) too big\n", aad_size);
 546		goto out_noxbuf;
 547	}
 548
 549	if (enc == ENCRYPT)
 550		e = "encryption";
 551	else
 552		e = "decryption";
 553
 554	if (testmgr_alloc_buf(xbuf))
 555		goto out_noxbuf;
 556	if (testmgr_alloc_buf(axbuf))
 557		goto out_noaxbuf;
 558	if (testmgr_alloc_buf(xoutbuf))
 559		goto out_nooutbuf;
 560
 561	sg = kmalloc(sizeof(*sg) * 9 * 2, GFP_KERNEL);
 562	if (!sg)
 563		goto out_nosg;
 564	sgout = &sg[9];
 565
 566	tfm = crypto_alloc_aead(algo, 0, 0);
 
 567	if (IS_ERR(tfm)) {
 568		pr_err("alg: aead: Failed to load transform for %s: %ld\n", algo,
 569		       PTR_ERR(tfm));
 570		goto out_notfm;
 571	}
 572
 573	ret = crypto_aead_setauthsize(tfm, authsize);
 574	if (ret) {
 575		pr_err("alg: aead: Failed to setauthsize for %s: %d\n", algo,
 576		       ret);
 577		goto out_noreq;
 578	}
 579
 580	crypto_init_wait(&wait);
 581	pr_info("testing speed of %s (%s) %s\n", algo,
 582		get_driver_name(crypto_aead, tfm), e);
 583
 584	req = aead_request_alloc(tfm, GFP_KERNEL);
 585	if (!req) {
 586		pr_err("alg: aead: Failed to allocate request for %s\n",
 587		       algo);
 588		goto out_noreq;
 589	}
 590
 591	aead_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
 592				  crypto_req_done, &wait);
 593
 594	i = 0;
 595	do {
 596		b_size = aead_sizes;
 597		do {
 598			u32 bs = round_up(*b_size, crypto_aead_blocksize(tfm));
 599
 600			assoc = axbuf[0];
 601			memset(assoc, 0xff, aad_size);
 602
 603			if ((*keysize + bs) > TVMEMSIZE * PAGE_SIZE) {
 604				pr_err("template (%u) too big for tvmem (%lu)\n",
 605				       *keysize + bs,
 606					TVMEMSIZE * PAGE_SIZE);
 607				goto out;
 608			}
 609
 610			key = tvmem[0];
 611			for (j = 0; j < tcount; j++) {
 612				if (template[j].klen == *keysize) {
 613					key = template[j].key;
 614					break;
 615				}
 616			}
 617
 618			ret = crypto_aead_setkey(tfm, key, *keysize);
 619			if (ret) {
 620				pr_err("setkey() failed flags=%x: %d\n",
 621					crypto_aead_get_flags(tfm), ret);
 622				goto out;
 623			}
 624
 625			iv_len = crypto_aead_ivsize(tfm);
 626			if (iv_len)
 627				memset(iv, 0xff, iv_len);
 628
 629			crypto_aead_clear_flags(tfm, ~0);
 630			pr_info("test %u (%d bit key, %d byte blocks): ",
 631				i, *keysize * 8, bs);
 
 632
 633			memset(tvmem[0], 0xff, PAGE_SIZE);
 634
 635			sg_init_aead(sg, xbuf, bs + (enc ? 0 : authsize),
 636				     assoc, aad_size);
 
 
 
 
 
 
 637
 638			sg_init_aead(sgout, xoutbuf,
 639				     bs + (enc ? authsize : 0), assoc,
 640				     aad_size);
 641
 
 
 
 
 642			aead_request_set_ad(req, aad_size);
 643
 644			if (!enc) {
 645
 646				/*
 647				 * For decryption we need a proper auth so
 648				 * we do the encryption path once with buffers
 649				 * reversed (input <-> output) to calculate it
 650				 */
 651				aead_request_set_crypt(req, sgout, sg,
 652						       bs, iv);
 653				ret = do_one_aead_op(req,
 654						     crypto_aead_encrypt(req));
 655
 656				if (ret) {
 657					pr_err("calculating auth failed (%d)\n",
 658					       ret);
 659					break;
 660				}
 661			}
 662
 663			aead_request_set_crypt(req, sg, sgout,
 664					       bs + (enc ? 0 : authsize),
 665					       iv);
 666
 667			if (secs) {
 668				ret = test_aead_jiffies(req, enc, bs,
 669							secs);
 670				cond_resched();
 671			} else {
 672				ret = test_aead_cycles(req, enc, bs);
 673			}
 674
 675			if (ret) {
 676				pr_err("%s() failed return code=%d\n", e, ret);
 677				break;
 678			}
 679			b_size++;
 680			i++;
 681		} while (*b_size);
 682		keysize++;
 683	} while (*keysize);
 684
 685out:
 686	aead_request_free(req);
 687out_noreq:
 688	crypto_free_aead(tfm);
 689out_notfm:
 690	kfree(sg);
 691out_nosg:
 692	testmgr_free_buf(xoutbuf);
 693out_nooutbuf:
 694	testmgr_free_buf(axbuf);
 695out_noaxbuf:
 696	testmgr_free_buf(xbuf);
 697out_noxbuf:
 698	kfree(iv);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 699}
 700
 701static void test_hash_sg_init(struct scatterlist *sg)
 702{
 703	int i;
 704
 705	sg_init_table(sg, TVMEMSIZE);
 706	for (i = 0; i < TVMEMSIZE; i++) {
 707		sg_set_buf(sg + i, tvmem[i], PAGE_SIZE);
 708		memset(tvmem[i], 0xff, PAGE_SIZE);
 709	}
 710}
 711
 712static inline int do_one_ahash_op(struct ahash_request *req, int ret)
 713{
 714	struct crypto_wait *wait = req->base.data;
 
 715
 716	return crypto_wait_req(ret, wait);
 
 
 
 
 717}
 718
 719static int test_ahash_jiffies_digest(struct ahash_request *req, int blen,
 720				     char *out, int secs)
 721{
 722	unsigned long start, end;
 723	int bcount;
 724	int ret;
 725
 726	for (start = jiffies, end = start + secs * HZ, bcount = 0;
 727	     time_before(jiffies, end); bcount++) {
 728		ret = do_one_ahash_op(req, crypto_ahash_digest(req));
 729		if (ret)
 730			return ret;
 731	}
 732
 733	pr_cont("%6u opers/sec, %9lu bytes/sec\n",
 734		bcount / secs, ((long)bcount * blen) / secs);
 735
 736	return 0;
 737}
 738
 739static int test_ahash_jiffies(struct ahash_request *req, int blen,
 740			      int plen, char *out, int secs)
 741{
 742	unsigned long start, end;
 743	int bcount, pcount;
 744	int ret;
 745
 746	if (plen == blen)
 747		return test_ahash_jiffies_digest(req, blen, out, secs);
 748
 749	for (start = jiffies, end = start + secs * HZ, bcount = 0;
 750	     time_before(jiffies, end); bcount++) {
 751		ret = do_one_ahash_op(req, crypto_ahash_init(req));
 752		if (ret)
 753			return ret;
 754		for (pcount = 0; pcount < blen; pcount += plen) {
 755			ret = do_one_ahash_op(req, crypto_ahash_update(req));
 756			if (ret)
 757				return ret;
 758		}
 759		/* we assume there is enough space in 'out' for the result */
 760		ret = do_one_ahash_op(req, crypto_ahash_final(req));
 761		if (ret)
 762			return ret;
 763	}
 764
 765	pr_cont("%6u opers/sec, %9lu bytes/sec\n",
 766		bcount / secs, ((long)bcount * blen) / secs);
 767
 768	return 0;
 769}
 770
 771static int test_ahash_cycles_digest(struct ahash_request *req, int blen,
 772				    char *out)
 773{
 774	unsigned long cycles = 0;
 775	int ret, i;
 776
 777	/* Warm-up run. */
 778	for (i = 0; i < 4; i++) {
 779		ret = do_one_ahash_op(req, crypto_ahash_digest(req));
 780		if (ret)
 781			goto out;
 782	}
 783
 784	/* The real thing. */
 785	for (i = 0; i < 8; i++) {
 786		cycles_t start, end;
 787
 788		start = get_cycles();
 789
 790		ret = do_one_ahash_op(req, crypto_ahash_digest(req));
 791		if (ret)
 792			goto out;
 793
 794		end = get_cycles();
 795
 796		cycles += end - start;
 797	}
 798
 799out:
 800	if (ret)
 801		return ret;
 802
 803	pr_cont("%6lu cycles/operation, %4lu cycles/byte\n",
 804		cycles / 8, cycles / (8 * blen));
 805
 806	return 0;
 807}
 808
 809static int test_ahash_cycles(struct ahash_request *req, int blen,
 810			     int plen, char *out)
 811{
 812	unsigned long cycles = 0;
 813	int i, pcount, ret;
 814
 815	if (plen == blen)
 816		return test_ahash_cycles_digest(req, blen, out);
 817
 818	/* Warm-up run. */
 819	for (i = 0; i < 4; i++) {
 820		ret = do_one_ahash_op(req, crypto_ahash_init(req));
 821		if (ret)
 822			goto out;
 823		for (pcount = 0; pcount < blen; pcount += plen) {
 824			ret = do_one_ahash_op(req, crypto_ahash_update(req));
 825			if (ret)
 826				goto out;
 827		}
 828		ret = do_one_ahash_op(req, crypto_ahash_final(req));
 829		if (ret)
 830			goto out;
 831	}
 832
 833	/* The real thing. */
 834	for (i = 0; i < 8; i++) {
 835		cycles_t start, end;
 836
 837		start = get_cycles();
 838
 839		ret = do_one_ahash_op(req, crypto_ahash_init(req));
 840		if (ret)
 841			goto out;
 842		for (pcount = 0; pcount < blen; pcount += plen) {
 843			ret = do_one_ahash_op(req, crypto_ahash_update(req));
 844			if (ret)
 845				goto out;
 846		}
 847		ret = do_one_ahash_op(req, crypto_ahash_final(req));
 848		if (ret)
 849			goto out;
 850
 851		end = get_cycles();
 852
 853		cycles += end - start;
 854	}
 855
 856out:
 857	if (ret)
 858		return ret;
 859
 860	pr_cont("%6lu cycles/operation, %4lu cycles/byte\n",
 861		cycles / 8, cycles / (8 * blen));
 862
 863	return 0;
 864}
 865
 866static void test_ahash_speed_common(const char *algo, unsigned int secs,
 867				    struct hash_speed *speed, unsigned mask)
 868{
 869	struct scatterlist sg[TVMEMSIZE];
 870	struct crypto_wait wait;
 871	struct ahash_request *req;
 872	struct crypto_ahash *tfm;
 873	char *output;
 874	int i, ret;
 875
 876	tfm = crypto_alloc_ahash(algo, 0, mask);
 877	if (IS_ERR(tfm)) {
 878		pr_err("failed to load transform for %s: %ld\n",
 879		       algo, PTR_ERR(tfm));
 880		return;
 881	}
 882
 883	pr_info("testing speed of async %s (%s)\n", algo,
 884		get_driver_name(crypto_ahash, tfm));
 885
 886	if (crypto_ahash_digestsize(tfm) > MAX_DIGEST_SIZE) {
 887		pr_err("digestsize(%u) > %d\n", crypto_ahash_digestsize(tfm),
 888		       MAX_DIGEST_SIZE);
 889		goto out;
 890	}
 891
 892	test_hash_sg_init(sg);
 893	req = ahash_request_alloc(tfm, GFP_KERNEL);
 894	if (!req) {
 895		pr_err("ahash request allocation failure\n");
 896		goto out;
 897	}
 898
 899	crypto_init_wait(&wait);
 900	ahash_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
 901				   crypto_req_done, &wait);
 902
 903	output = kmalloc(MAX_DIGEST_SIZE, GFP_KERNEL);
 904	if (!output)
 905		goto out_nomem;
 906
 907	for (i = 0; speed[i].blen != 0; i++) {
 908		if (speed[i].blen > TVMEMSIZE * PAGE_SIZE) {
 909			pr_err("template (%u) too big for tvmem (%lu)\n",
 910			       speed[i].blen, TVMEMSIZE * PAGE_SIZE);
 911			break;
 912		}
 913
 914		if (klen)
 915			crypto_ahash_setkey(tfm, tvmem[0], klen);
 916
 917		pr_info("test%3u "
 918			"(%5u byte blocks,%5u bytes per update,%4u updates): ",
 919			i, speed[i].blen, speed[i].plen, speed[i].blen / speed[i].plen);
 920
 921		ahash_request_set_crypt(req, sg, output, speed[i].plen);
 922
 923		if (secs) {
 924			ret = test_ahash_jiffies(req, speed[i].blen,
 925						 speed[i].plen, output, secs);
 926			cond_resched();
 927		} else {
 928			ret = test_ahash_cycles(req, speed[i].blen,
 929						speed[i].plen, output);
 930		}
 931
 932		if (ret) {
 933			pr_err("hashing failed ret=%d\n", ret);
 934			break;
 935		}
 936	}
 937
 938	kfree(output);
 939
 940out_nomem:
 941	ahash_request_free(req);
 942
 943out:
 944	crypto_free_ahash(tfm);
 945}
 946
 947static void test_ahash_speed(const char *algo, unsigned int secs,
 948			     struct hash_speed *speed)
 949{
 950	return test_ahash_speed_common(algo, secs, speed, 0);
 951}
 952
 953static void test_hash_speed(const char *algo, unsigned int secs,
 954			    struct hash_speed *speed)
 955{
 956	return test_ahash_speed_common(algo, secs, speed, CRYPTO_ALG_ASYNC);
 957}
 958
 959struct test_mb_skcipher_data {
 960	struct scatterlist sg[XBUFSIZE];
 961	struct skcipher_request *req;
 962	struct crypto_wait wait;
 963	char *xbuf[XBUFSIZE];
 964};
 965
 966static int do_mult_acipher_op(struct test_mb_skcipher_data *data, int enc,
 967				u32 num_mb, int *rc)
 968{
 969	int i, err = 0;
 970
 971	/* Fire up a bunch of concurrent requests */
 972	for (i = 0; i < num_mb; i++) {
 973		if (enc == ENCRYPT)
 974			rc[i] = crypto_skcipher_encrypt(data[i].req);
 975		else
 976			rc[i] = crypto_skcipher_decrypt(data[i].req);
 977	}
 978
 979	/* Wait for all requests to finish */
 980	for (i = 0; i < num_mb; i++) {
 981		rc[i] = crypto_wait_req(rc[i], &data[i].wait);
 982
 983		if (rc[i]) {
 984			pr_info("concurrent request %d error %d\n", i, rc[i]);
 985			err = rc[i];
 986		}
 987	}
 988
 989	return err;
 990}
 991
 992static int test_mb_acipher_jiffies(struct test_mb_skcipher_data *data, int enc,
 993				int blen, int secs, u32 num_mb)
 994{
 995	unsigned long start, end;
 996	int bcount;
 997	int ret = 0;
 998	int *rc;
 999
1000	rc = kcalloc(num_mb, sizeof(*rc), GFP_KERNEL);
1001	if (!rc)
1002		return -ENOMEM;
1003
1004	for (start = jiffies, end = start + secs * HZ, bcount = 0;
1005	     time_before(jiffies, end); bcount++) {
1006		ret = do_mult_acipher_op(data, enc, num_mb, rc);
1007		if (ret)
1008			goto out;
1009	}
1010
1011	pr_cont("%d operations in %d seconds (%llu bytes)\n",
1012		bcount * num_mb, secs, (u64)bcount * blen * num_mb);
1013
1014out:
1015	kfree(rc);
1016	return ret;
1017}
1018
1019static int test_mb_acipher_cycles(struct test_mb_skcipher_data *data, int enc,
1020			       int blen, u32 num_mb)
1021{
1022	unsigned long cycles = 0;
1023	int ret = 0;
1024	int i;
1025	int *rc;
1026
1027	rc = kcalloc(num_mb, sizeof(*rc), GFP_KERNEL);
1028	if (!rc)
1029		return -ENOMEM;
1030
1031	/* Warm-up run. */
1032	for (i = 0; i < 4; i++) {
1033		ret = do_mult_acipher_op(data, enc, num_mb, rc);
1034		if (ret)
1035			goto out;
1036	}
1037
1038	/* The real thing. */
1039	for (i = 0; i < 8; i++) {
1040		cycles_t start, end;
1041
1042		start = get_cycles();
1043		ret = do_mult_acipher_op(data, enc, num_mb, rc);
1044		end = get_cycles();
1045
1046		if (ret)
1047			goto out;
1048
1049		cycles += end - start;
1050	}
1051
1052	pr_cont("1 operation in %lu cycles (%d bytes)\n",
1053		(cycles + 4) / (8 * num_mb), blen);
1054
1055out:
1056	kfree(rc);
1057	return ret;
1058}
1059
1060static void test_mb_skcipher_speed(const char *algo, int enc, int secs,
1061				   struct cipher_speed_template *template,
1062				   unsigned int tcount, u8 *keysize, u32 num_mb)
1063{
1064	struct test_mb_skcipher_data *data;
1065	struct crypto_skcipher *tfm;
1066	unsigned int i, j, iv_len;
1067	const int *b_size;
1068	const char *key;
1069	const char *e;
1070	char iv[128];
1071	int ret;
1072
1073	if (enc == ENCRYPT)
1074		e = "encryption";
1075	else
1076		e = "decryption";
1077
1078	data = kcalloc(num_mb, sizeof(*data), GFP_KERNEL);
1079	if (!data)
1080		return;
1081
1082	tfm = crypto_alloc_skcipher(algo, 0, 0);
1083	if (IS_ERR(tfm)) {
1084		pr_err("failed to load transform for %s: %ld\n",
1085			algo, PTR_ERR(tfm));
1086		goto out_free_data;
1087	}
1088
1089	for (i = 0; i < num_mb; ++i)
1090		if (testmgr_alloc_buf(data[i].xbuf)) {
1091			while (i--)
1092				testmgr_free_buf(data[i].xbuf);
1093			goto out_free_tfm;
1094		}
1095
1096	for (i = 0; i < num_mb; ++i) {
1097		data[i].req = skcipher_request_alloc(tfm, GFP_KERNEL);
1098		if (!data[i].req) {
1099			pr_err("alg: skcipher: Failed to allocate request for %s\n",
1100			       algo);
1101			while (i--)
1102				skcipher_request_free(data[i].req);
1103			goto out_free_xbuf;
1104		}
1105	}
1106
1107	for (i = 0; i < num_mb; ++i) {
1108		skcipher_request_set_callback(data[i].req,
1109					      CRYPTO_TFM_REQ_MAY_BACKLOG,
1110					      crypto_req_done, &data[i].wait);
1111		crypto_init_wait(&data[i].wait);
1112	}
1113
1114	pr_info("testing speed of multibuffer %s (%s) %s\n", algo,
1115		get_driver_name(crypto_skcipher, tfm), e);
1116
1117	i = 0;
1118	do {
1119		b_size = block_sizes;
1120		do {
1121			u32 bs = round_up(*b_size, crypto_skcipher_blocksize(tfm));
1122
1123			if (bs > XBUFSIZE * PAGE_SIZE) {
1124				pr_err("template (%u) too big for buffer (%lu)\n",
1125				       bs, XBUFSIZE * PAGE_SIZE);
1126				goto out;
1127			}
1128
1129			pr_info("test %u (%d bit key, %d byte blocks): ", i,
1130				*keysize * 8, bs);
1131
1132			/* Set up tfm global state, i.e. the key */
1133
1134			memset(tvmem[0], 0xff, PAGE_SIZE);
1135			key = tvmem[0];
1136			for (j = 0; j < tcount; j++) {
1137				if (template[j].klen == *keysize) {
1138					key = template[j].key;
1139					break;
1140				}
1141			}
1142
1143			crypto_skcipher_clear_flags(tfm, ~0);
1144
1145			ret = crypto_skcipher_setkey(tfm, key, *keysize);
1146			if (ret) {
1147				pr_err("setkey() failed flags=%x\n",
1148				       crypto_skcipher_get_flags(tfm));
1149				goto out;
1150			}
1151
1152			iv_len = crypto_skcipher_ivsize(tfm);
1153			if (iv_len)
1154				memset(&iv, 0xff, iv_len);
1155
1156			/* Now setup per request stuff, i.e. buffers */
1157
1158			for (j = 0; j < num_mb; ++j) {
1159				struct test_mb_skcipher_data *cur = &data[j];
1160				unsigned int k = bs;
1161				unsigned int pages = DIV_ROUND_UP(k, PAGE_SIZE);
1162				unsigned int p = 0;
1163
1164				sg_init_table(cur->sg, pages);
1165
1166				while (k > PAGE_SIZE) {
1167					sg_set_buf(cur->sg + p, cur->xbuf[p],
1168						   PAGE_SIZE);
1169					memset(cur->xbuf[p], 0xff, PAGE_SIZE);
1170					p++;
1171					k -= PAGE_SIZE;
1172				}
1173
1174				sg_set_buf(cur->sg + p, cur->xbuf[p], k);
1175				memset(cur->xbuf[p], 0xff, k);
1176
1177				skcipher_request_set_crypt(cur->req, cur->sg,
1178							   cur->sg, bs, iv);
1179			}
1180
1181			if (secs) {
1182				ret = test_mb_acipher_jiffies(data, enc,
1183							      bs, secs,
1184							      num_mb);
1185				cond_resched();
1186			} else {
1187				ret = test_mb_acipher_cycles(data, enc,
1188							     bs, num_mb);
1189			}
1190
1191			if (ret) {
1192				pr_err("%s() failed flags=%x\n", e,
1193				       crypto_skcipher_get_flags(tfm));
1194				break;
1195			}
1196			b_size++;
1197			i++;
1198		} while (*b_size);
1199		keysize++;
1200	} while (*keysize);
1201
1202out:
1203	for (i = 0; i < num_mb; ++i)
1204		skcipher_request_free(data[i].req);
1205out_free_xbuf:
1206	for (i = 0; i < num_mb; ++i)
1207		testmgr_free_buf(data[i].xbuf);
1208out_free_tfm:
1209	crypto_free_skcipher(tfm);
1210out_free_data:
1211	kfree(data);
1212}
1213
1214static inline int do_one_acipher_op(struct skcipher_request *req, int ret)
1215{
1216	struct crypto_wait *wait = req->base.data;
1217
1218	return crypto_wait_req(ret, wait);
1219}
1220
1221static int test_acipher_jiffies(struct skcipher_request *req, int enc,
1222				int blen, int secs)
1223{
1224	unsigned long start, end;
1225	int bcount;
1226	int ret;
1227
1228	for (start = jiffies, end = start + secs * HZ, bcount = 0;
1229	     time_before(jiffies, end); bcount++) {
1230		if (enc)
1231			ret = do_one_acipher_op(req,
1232						crypto_skcipher_encrypt(req));
1233		else
1234			ret = do_one_acipher_op(req,
1235						crypto_skcipher_decrypt(req));
1236
1237		if (ret)
1238			return ret;
1239	}
1240
1241	pr_cont("%d operations in %d seconds (%llu bytes)\n",
1242		bcount, secs, (u64)bcount * blen);
1243	return 0;
1244}
1245
1246static int test_acipher_cycles(struct skcipher_request *req, int enc,
1247			       int blen)
1248{
1249	unsigned long cycles = 0;
1250	int ret = 0;
1251	int i;
1252
1253	/* Warm-up run. */
1254	for (i = 0; i < 4; i++) {
1255		if (enc)
1256			ret = do_one_acipher_op(req,
1257						crypto_skcipher_encrypt(req));
1258		else
1259			ret = do_one_acipher_op(req,
1260						crypto_skcipher_decrypt(req));
1261
1262		if (ret)
1263			goto out;
1264	}
1265
1266	/* The real thing. */
1267	for (i = 0; i < 8; i++) {
1268		cycles_t start, end;
1269
1270		start = get_cycles();
1271		if (enc)
1272			ret = do_one_acipher_op(req,
1273						crypto_skcipher_encrypt(req));
1274		else
1275			ret = do_one_acipher_op(req,
1276						crypto_skcipher_decrypt(req));
1277		end = get_cycles();
1278
1279		if (ret)
1280			goto out;
1281
1282		cycles += end - start;
1283	}
1284
1285out:
1286	if (ret == 0)
1287		pr_cont("1 operation in %lu cycles (%d bytes)\n",
1288			(cycles + 4) / 8, blen);
1289
1290	return ret;
1291}
1292
1293static void test_skcipher_speed(const char *algo, int enc, unsigned int secs,
1294				struct cipher_speed_template *template,
1295				unsigned int tcount, u8 *keysize, bool async)
1296{
1297	unsigned int ret, i, j, k, iv_len;
1298	struct crypto_wait wait;
1299	const char *key;
1300	char iv[128];
1301	struct skcipher_request *req;
1302	struct crypto_skcipher *tfm;
1303	const int *b_size;
1304	const char *e;
 
1305
1306	if (enc == ENCRYPT)
1307		e = "encryption";
1308	else
1309		e = "decryption";
1310
1311	crypto_init_wait(&wait);
1312
1313	tfm = crypto_alloc_skcipher(algo, 0, async ? 0 : CRYPTO_ALG_ASYNC);
1314
1315	if (IS_ERR(tfm)) {
1316		pr_err("failed to load transform for %s: %ld\n", algo,
1317		       PTR_ERR(tfm));
1318		return;
1319	}
1320
1321	pr_info("testing speed of %s %s (%s) %s\n", async ? "async" : "sync",
1322		algo, get_driver_name(crypto_skcipher, tfm), e);
1323
1324	req = skcipher_request_alloc(tfm, GFP_KERNEL);
1325	if (!req) {
1326		pr_err("skcipher: Failed to allocate request for %s\n", algo);
 
1327		goto out;
1328	}
1329
1330	skcipher_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
1331				      crypto_req_done, &wait);
1332
1333	i = 0;
1334	do {
1335		b_size = block_sizes;
1336
1337		do {
1338			u32 bs = round_up(*b_size, crypto_skcipher_blocksize(tfm));
1339			struct scatterlist sg[TVMEMSIZE];
1340
1341			if ((*keysize + bs) > TVMEMSIZE * PAGE_SIZE) {
1342				pr_err("template (%u) too big for "
1343				       "tvmem (%lu)\n", *keysize + bs,
1344				       TVMEMSIZE * PAGE_SIZE);
1345				goto out_free_req;
1346			}
1347
1348			pr_info("test %u (%d bit key, %d byte blocks): ", i,
1349				*keysize * 8, bs);
1350
1351			memset(tvmem[0], 0xff, PAGE_SIZE);
1352
1353			/* set key, plain text and IV */
1354			key = tvmem[0];
1355			for (j = 0; j < tcount; j++) {
1356				if (template[j].klen == *keysize) {
1357					key = template[j].key;
1358					break;
1359				}
1360			}
1361
1362			crypto_skcipher_clear_flags(tfm, ~0);
1363
1364			ret = crypto_skcipher_setkey(tfm, key, *keysize);
1365			if (ret) {
1366				pr_err("setkey() failed flags=%x\n",
1367					crypto_skcipher_get_flags(tfm));
1368				goto out_free_req;
1369			}
1370
1371			k = *keysize + bs;
1372			sg_init_table(sg, DIV_ROUND_UP(k, PAGE_SIZE));
1373
1374			if (k > PAGE_SIZE) {
1375				sg_set_buf(sg, tvmem[0] + *keysize,
1376				   PAGE_SIZE - *keysize);
1377				k -= PAGE_SIZE;
1378				j = 1;
1379				while (k > PAGE_SIZE) {
1380					sg_set_buf(sg + j, tvmem[j], PAGE_SIZE);
1381					memset(tvmem[j], 0xff, PAGE_SIZE);
1382					j++;
1383					k -= PAGE_SIZE;
1384				}
1385				sg_set_buf(sg + j, tvmem[j], k);
1386				memset(tvmem[j], 0xff, k);
1387			} else {
1388				sg_set_buf(sg, tvmem[0] + *keysize, bs);
1389			}
1390
1391			iv_len = crypto_skcipher_ivsize(tfm);
1392			if (iv_len)
1393				memset(&iv, 0xff, iv_len);
1394
1395			skcipher_request_set_crypt(req, sg, sg, bs, iv);
1396
1397			if (secs) {
1398				ret = test_acipher_jiffies(req, enc,
1399							   bs, secs);
1400				cond_resched();
1401			} else {
1402				ret = test_acipher_cycles(req, enc,
1403							  bs);
1404			}
1405
1406			if (ret) {
1407				pr_err("%s() failed flags=%x\n", e,
1408				       crypto_skcipher_get_flags(tfm));
1409				break;
1410			}
1411			b_size++;
1412			i++;
1413		} while (*b_size);
1414		keysize++;
1415	} while (*keysize);
1416
1417out_free_req:
1418	skcipher_request_free(req);
1419out:
1420	crypto_free_skcipher(tfm);
1421}
1422
1423static void test_acipher_speed(const char *algo, int enc, unsigned int secs,
1424			       struct cipher_speed_template *template,
1425			       unsigned int tcount, u8 *keysize)
1426{
1427	return test_skcipher_speed(algo, enc, secs, template, tcount, keysize,
1428				   true);
1429}
1430
1431static void test_cipher_speed(const char *algo, int enc, unsigned int secs,
1432			      struct cipher_speed_template *template,
1433			      unsigned int tcount, u8 *keysize)
1434{
1435	return test_skcipher_speed(algo, enc, secs, template, tcount, keysize,
1436				   false);
1437}
1438
1439static inline int tcrypt_test(const char *alg)
1440{
1441	int ret;
1442
1443	pr_debug("testing %s\n", alg);
1444
1445	ret = alg_test(alg, alg, 0, 0);
1446	/* non-fips algs return -EINVAL or -ECANCELED in fips mode */
1447	if (fips_enabled && (ret == -EINVAL || ret == -ECANCELED))
1448		ret = 0;
1449	return ret;
1450}
1451
1452static int do_test(const char *alg, u32 type, u32 mask, int m, u32 num_mb)
1453{
1454	int i;
1455	int ret = 0;
1456
1457	switch (m) {
1458	case 0:
1459		if (alg) {
1460			if (!crypto_has_alg(alg, type,
1461					    mask ?: CRYPTO_ALG_TYPE_MASK))
1462				ret = -ENOENT;
1463			break;
1464		}
1465
1466		for (i = 1; i < 200; i++)
1467			ret = min(ret, do_test(NULL, 0, 0, i, num_mb));
1468		break;
1469
1470	case 1:
1471		ret = min(ret, tcrypt_test("md5"));
1472		break;
1473
1474	case 2:
1475		ret = min(ret, tcrypt_test("sha1"));
1476		break;
1477
1478	case 3:
1479		ret = min(ret, tcrypt_test("ecb(des)"));
1480		ret = min(ret, tcrypt_test("cbc(des)"));
1481		ret = min(ret, tcrypt_test("ctr(des)"));
1482		break;
1483
1484	case 4:
1485		ret = min(ret, tcrypt_test("ecb(des3_ede)"));
1486		ret = min(ret, tcrypt_test("cbc(des3_ede)"));
1487		ret = min(ret, tcrypt_test("ctr(des3_ede)"));
1488		break;
1489
1490	case 5:
1491		ret = min(ret, tcrypt_test("md4"));
1492		break;
1493
1494	case 6:
1495		ret = min(ret, tcrypt_test("sha256"));
1496		break;
1497
1498	case 7:
1499		ret = min(ret, tcrypt_test("ecb(blowfish)"));
1500		ret = min(ret, tcrypt_test("cbc(blowfish)"));
1501		ret = min(ret, tcrypt_test("ctr(blowfish)"));
1502		break;
1503
1504	case 8:
1505		ret = min(ret, tcrypt_test("ecb(twofish)"));
1506		ret = min(ret, tcrypt_test("cbc(twofish)"));
1507		ret = min(ret, tcrypt_test("ctr(twofish)"));
1508		ret = min(ret, tcrypt_test("lrw(twofish)"));
1509		ret = min(ret, tcrypt_test("xts(twofish)"));
1510		break;
1511
1512	case 9:
1513		ret = min(ret, tcrypt_test("ecb(serpent)"));
1514		ret = min(ret, tcrypt_test("cbc(serpent)"));
1515		ret = min(ret, tcrypt_test("ctr(serpent)"));
1516		ret = min(ret, tcrypt_test("lrw(serpent)"));
1517		ret = min(ret, tcrypt_test("xts(serpent)"));
1518		break;
1519
1520	case 10:
1521		ret = min(ret, tcrypt_test("ecb(aes)"));
1522		ret = min(ret, tcrypt_test("cbc(aes)"));
1523		ret = min(ret, tcrypt_test("lrw(aes)"));
1524		ret = min(ret, tcrypt_test("xts(aes)"));
1525		ret = min(ret, tcrypt_test("ctr(aes)"));
1526		ret = min(ret, tcrypt_test("rfc3686(ctr(aes))"));
1527		ret = min(ret, tcrypt_test("xctr(aes)"));
1528		break;
1529
1530	case 11:
1531		ret = min(ret, tcrypt_test("sha384"));
1532		break;
1533
1534	case 12:
1535		ret = min(ret, tcrypt_test("sha512"));
1536		break;
1537
1538	case 13:
1539		ret = min(ret, tcrypt_test("deflate"));
1540		break;
1541
1542	case 14:
1543		ret = min(ret, tcrypt_test("ecb(cast5)"));
1544		ret = min(ret, tcrypt_test("cbc(cast5)"));
1545		ret = min(ret, tcrypt_test("ctr(cast5)"));
1546		break;
1547
1548	case 15:
1549		ret = min(ret, tcrypt_test("ecb(cast6)"));
1550		ret = min(ret, tcrypt_test("cbc(cast6)"));
1551		ret = min(ret, tcrypt_test("ctr(cast6)"));
1552		ret = min(ret, tcrypt_test("lrw(cast6)"));
1553		ret = min(ret, tcrypt_test("xts(cast6)"));
1554		break;
1555
1556	case 16:
1557		ret = min(ret, tcrypt_test("ecb(arc4)"));
1558		break;
1559
1560	case 17:
1561		ret = min(ret, tcrypt_test("michael_mic"));
1562		break;
1563
1564	case 18:
1565		ret = min(ret, tcrypt_test("crc32c"));
1566		break;
1567
1568	case 19:
1569		ret = min(ret, tcrypt_test("ecb(tea)"));
1570		break;
1571
1572	case 20:
1573		ret = min(ret, tcrypt_test("ecb(xtea)"));
1574		break;
1575
1576	case 21:
1577		ret = min(ret, tcrypt_test("ecb(khazad)"));
1578		break;
1579
1580	case 22:
1581		ret = min(ret, tcrypt_test("wp512"));
1582		break;
1583
1584	case 23:
1585		ret = min(ret, tcrypt_test("wp384"));
1586		break;
1587
1588	case 24:
1589		ret = min(ret, tcrypt_test("wp256"));
 
 
 
 
1590		break;
1591
1592	case 26:
1593		ret = min(ret, tcrypt_test("ecb(anubis)"));
1594		ret = min(ret, tcrypt_test("cbc(anubis)"));
 
 
 
 
 
 
 
 
 
 
 
 
1595		break;
1596
1597	case 30:
1598		ret = min(ret, tcrypt_test("ecb(xeta)"));
1599		break;
1600
1601	case 31:
1602		ret = min(ret, tcrypt_test("pcbc(fcrypt)"));
1603		break;
1604
1605	case 32:
1606		ret = min(ret, tcrypt_test("ecb(camellia)"));
1607		ret = min(ret, tcrypt_test("cbc(camellia)"));
1608		ret = min(ret, tcrypt_test("ctr(camellia)"));
1609		ret = min(ret, tcrypt_test("lrw(camellia)"));
1610		ret = min(ret, tcrypt_test("xts(camellia)"));
1611		break;
1612
1613	case 33:
1614		ret = min(ret, tcrypt_test("sha224"));
 
 
 
 
1615		break;
1616
1617	case 35:
1618		ret = min(ret, tcrypt_test("gcm(aes)"));
1619		break;
1620
1621	case 36:
1622		ret = min(ret, tcrypt_test("lzo"));
1623		break;
1624
1625	case 37:
1626		ret = min(ret, tcrypt_test("ccm(aes)"));
1627		break;
1628
1629	case 38:
1630		ret = min(ret, tcrypt_test("cts(cbc(aes))"));
1631		break;
1632
1633        case 39:
1634		ret = min(ret, tcrypt_test("xxhash64"));
1635		break;
1636
1637        case 40:
1638		ret = min(ret, tcrypt_test("rmd160"));
 
 
 
 
1639		break;
1640
1641	case 42:
1642		ret = min(ret, tcrypt_test("blake2b-512"));
1643		break;
1644
1645	case 43:
1646		ret = min(ret, tcrypt_test("ecb(seed)"));
 
 
 
 
1647		break;
1648
1649	case 45:
1650		ret = min(ret, tcrypt_test("rfc4309(ccm(aes))"));
1651		break;
1652
1653	case 46:
1654		ret = min(ret, tcrypt_test("ghash"));
1655		break;
1656
1657	case 47:
1658		ret = min(ret, tcrypt_test("crct10dif"));
1659		break;
1660
1661	case 48:
1662		ret = min(ret, tcrypt_test("sha3-224"));
1663		break;
1664
1665	case 49:
1666		ret = min(ret, tcrypt_test("sha3-256"));
1667		break;
1668
1669	case 50:
1670		ret = min(ret, tcrypt_test("sha3-384"));
1671		break;
1672
1673	case 51:
1674		ret = min(ret, tcrypt_test("sha3-512"));
1675		break;
1676
1677	case 52:
1678		ret = min(ret, tcrypt_test("sm3"));
1679		break;
1680
1681	case 53:
1682		ret = min(ret, tcrypt_test("streebog256"));
1683		break;
1684
1685	case 54:
1686		ret = min(ret, tcrypt_test("streebog512"));
1687		break;
1688
1689	case 55:
1690		ret = min(ret, tcrypt_test("gcm(sm4)"));
1691		break;
1692
1693	case 56:
1694		ret = min(ret, tcrypt_test("ccm(sm4)"));
1695		break;
1696
1697	case 57:
1698		ret = min(ret, tcrypt_test("polyval"));
1699		break;
1700
1701	case 58:
1702		ret = min(ret, tcrypt_test("gcm(aria)"));
1703		break;
1704
1705	case 59:
1706		ret = min(ret, tcrypt_test("cts(cbc(sm4))"));
1707		break;
1708
1709	case 100:
1710		ret = min(ret, tcrypt_test("hmac(md5)"));
1711		break;
1712
1713	case 101:
1714		ret = min(ret, tcrypt_test("hmac(sha1)"));
1715		break;
1716
1717	case 102:
1718		ret = min(ret, tcrypt_test("hmac(sha256)"));
1719		break;
1720
1721	case 103:
1722		ret = min(ret, tcrypt_test("hmac(sha384)"));
1723		break;
1724
1725	case 104:
1726		ret = min(ret, tcrypt_test("hmac(sha512)"));
1727		break;
1728
1729	case 105:
1730		ret = min(ret, tcrypt_test("hmac(sha224)"));
1731		break;
1732
1733	case 106:
1734		ret = min(ret, tcrypt_test("xcbc(aes)"));
 
 
 
 
1735		break;
1736
1737	case 108:
1738		ret = min(ret, tcrypt_test("hmac(rmd160)"));
1739		break;
1740
1741	case 109:
1742		ret = min(ret, tcrypt_test("vmac64(aes)"));
1743		break;
1744
1745	case 111:
1746		ret = min(ret, tcrypt_test("hmac(sha3-224)"));
1747		break;
1748
1749	case 112:
1750		ret = min(ret, tcrypt_test("hmac(sha3-256)"));
1751		break;
1752
1753	case 113:
1754		ret = min(ret, tcrypt_test("hmac(sha3-384)"));
1755		break;
1756
1757	case 114:
1758		ret = min(ret, tcrypt_test("hmac(sha3-512)"));
1759		break;
1760
1761	case 115:
1762		ret = min(ret, tcrypt_test("hmac(streebog256)"));
1763		break;
1764
1765	case 116:
1766		ret = min(ret, tcrypt_test("hmac(streebog512)"));
1767		break;
1768
1769	case 150:
1770		ret = min(ret, tcrypt_test("ansi_cprng"));
1771		break;
1772
1773	case 151:
1774		ret = min(ret, tcrypt_test("rfc4106(gcm(aes))"));
1775		break;
1776
1777	case 152:
1778		ret = min(ret, tcrypt_test("rfc4543(gcm(aes))"));
1779		break;
1780
1781	case 153:
1782		ret = min(ret, tcrypt_test("cmac(aes)"));
1783		break;
1784
1785	case 154:
1786		ret = min(ret, tcrypt_test("cmac(des3_ede)"));
1787		break;
1788
1789	case 155:
1790		ret = min(ret, tcrypt_test("authenc(hmac(sha1),cbc(aes))"));
1791		break;
1792
1793	case 156:
1794		ret = min(ret, tcrypt_test("authenc(hmac(md5),ecb(cipher_null))"));
1795		break;
1796
1797	case 157:
1798		ret = min(ret, tcrypt_test("authenc(hmac(sha1),ecb(cipher_null))"));
1799		break;
1800
1801	case 158:
1802		ret = min(ret, tcrypt_test("cbcmac(sm4)"));
1803		break;
1804
1805	case 159:
1806		ret = min(ret, tcrypt_test("cmac(sm4)"));
1807		break;
1808
1809	case 160:
1810		ret = min(ret, tcrypt_test("xcbc(sm4)"));
1811		break;
1812
1813	case 181:
1814		ret = min(ret, tcrypt_test("authenc(hmac(sha1),cbc(des))"));
1815		break;
1816	case 182:
1817		ret = min(ret, tcrypt_test("authenc(hmac(sha1),cbc(des3_ede))"));
1818		break;
1819	case 183:
1820		ret = min(ret, tcrypt_test("authenc(hmac(sha224),cbc(des))"));
1821		break;
1822	case 184:
1823		ret = min(ret, tcrypt_test("authenc(hmac(sha224),cbc(des3_ede))"));
1824		break;
1825	case 185:
1826		ret = min(ret, tcrypt_test("authenc(hmac(sha256),cbc(des))"));
1827		break;
1828	case 186:
1829		ret = min(ret, tcrypt_test("authenc(hmac(sha256),cbc(des3_ede))"));
1830		break;
1831	case 187:
1832		ret = min(ret, tcrypt_test("authenc(hmac(sha384),cbc(des))"));
1833		break;
1834	case 188:
1835		ret = min(ret, tcrypt_test("authenc(hmac(sha384),cbc(des3_ede))"));
1836		break;
1837	case 189:
1838		ret = min(ret, tcrypt_test("authenc(hmac(sha512),cbc(des))"));
1839		break;
1840	case 190:
1841		ret = min(ret, tcrypt_test("authenc(hmac(sha512),cbc(des3_ede))"));
1842		break;
1843	case 191:
1844		ret = min(ret, tcrypt_test("ecb(sm4)"));
1845		ret = min(ret, tcrypt_test("cbc(sm4)"));
1846		ret = min(ret, tcrypt_test("ctr(sm4)"));
1847		ret = min(ret, tcrypt_test("xts(sm4)"));
1848		break;
1849	case 192:
1850		ret = min(ret, tcrypt_test("ecb(aria)"));
1851		ret = min(ret, tcrypt_test("cbc(aria)"));
1852		ret = min(ret, tcrypt_test("ctr(aria)"));
1853		break;
1854	case 193:
1855		ret = min(ret, tcrypt_test("ffdhe2048(dh)"));
1856		break;
1857	case 200:
1858		test_cipher_speed("ecb(aes)", ENCRYPT, sec, NULL, 0,
1859				speed_template_16_24_32);
1860		test_cipher_speed("ecb(aes)", DECRYPT, sec, NULL, 0,
1861				speed_template_16_24_32);
1862		test_cipher_speed("cbc(aes)", ENCRYPT, sec, NULL, 0,
1863				speed_template_16_24_32);
1864		test_cipher_speed("cbc(aes)", DECRYPT, sec, NULL, 0,
1865				speed_template_16_24_32);
1866		test_cipher_speed("lrw(aes)", ENCRYPT, sec, NULL, 0,
1867				speed_template_32_40_48);
1868		test_cipher_speed("lrw(aes)", DECRYPT, sec, NULL, 0,
1869				speed_template_32_40_48);
1870		test_cipher_speed("xts(aes)", ENCRYPT, sec, NULL, 0,
1871				speed_template_32_64);
1872		test_cipher_speed("xts(aes)", DECRYPT, sec, NULL, 0,
1873				speed_template_32_64);
1874		test_cipher_speed("cts(cbc(aes))", ENCRYPT, sec, NULL, 0,
1875				speed_template_16_24_32);
1876		test_cipher_speed("cts(cbc(aes))", DECRYPT, sec, NULL, 0,
1877				speed_template_16_24_32);
1878		test_cipher_speed("ctr(aes)", ENCRYPT, sec, NULL, 0,
1879				speed_template_16_24_32);
1880		test_cipher_speed("ctr(aes)", DECRYPT, sec, NULL, 0,
1881				speed_template_16_24_32);
1882		break;
1883
1884	case 201:
1885		test_cipher_speed("ecb(des3_ede)", ENCRYPT, sec,
1886				des3_speed_template, DES3_SPEED_VECTORS,
1887				speed_template_24);
1888		test_cipher_speed("ecb(des3_ede)", DECRYPT, sec,
1889				des3_speed_template, DES3_SPEED_VECTORS,
1890				speed_template_24);
1891		test_cipher_speed("cbc(des3_ede)", ENCRYPT, sec,
1892				des3_speed_template, DES3_SPEED_VECTORS,
1893				speed_template_24);
1894		test_cipher_speed("cbc(des3_ede)", DECRYPT, sec,
1895				des3_speed_template, DES3_SPEED_VECTORS,
1896				speed_template_24);
1897		test_cipher_speed("ctr(des3_ede)", ENCRYPT, sec,
1898				des3_speed_template, DES3_SPEED_VECTORS,
1899				speed_template_24);
1900		test_cipher_speed("ctr(des3_ede)", DECRYPT, sec,
1901				des3_speed_template, DES3_SPEED_VECTORS,
1902				speed_template_24);
1903		break;
1904
1905	case 202:
1906		test_cipher_speed("ecb(twofish)", ENCRYPT, sec, NULL, 0,
1907				speed_template_16_24_32);
1908		test_cipher_speed("ecb(twofish)", DECRYPT, sec, NULL, 0,
1909				speed_template_16_24_32);
1910		test_cipher_speed("cbc(twofish)", ENCRYPT, sec, NULL, 0,
1911				speed_template_16_24_32);
1912		test_cipher_speed("cbc(twofish)", DECRYPT, sec, NULL, 0,
1913				speed_template_16_24_32);
1914		test_cipher_speed("ctr(twofish)", ENCRYPT, sec, NULL, 0,
1915				speed_template_16_24_32);
1916		test_cipher_speed("ctr(twofish)", DECRYPT, sec, NULL, 0,
1917				speed_template_16_24_32);
1918		test_cipher_speed("lrw(twofish)", ENCRYPT, sec, NULL, 0,
1919				speed_template_32_40_48);
1920		test_cipher_speed("lrw(twofish)", DECRYPT, sec, NULL, 0,
1921				speed_template_32_40_48);
1922		test_cipher_speed("xts(twofish)", ENCRYPT, sec, NULL, 0,
1923				speed_template_32_48_64);
1924		test_cipher_speed("xts(twofish)", DECRYPT, sec, NULL, 0,
1925				speed_template_32_48_64);
1926		break;
1927
1928	case 203:
1929		test_cipher_speed("ecb(blowfish)", ENCRYPT, sec, NULL, 0,
1930				  speed_template_8_32);
1931		test_cipher_speed("ecb(blowfish)", DECRYPT, sec, NULL, 0,
1932				  speed_template_8_32);
1933		test_cipher_speed("cbc(blowfish)", ENCRYPT, sec, NULL, 0,
1934				  speed_template_8_32);
1935		test_cipher_speed("cbc(blowfish)", DECRYPT, sec, NULL, 0,
1936				  speed_template_8_32);
1937		test_cipher_speed("ctr(blowfish)", ENCRYPT, sec, NULL, 0,
1938				  speed_template_8_32);
1939		test_cipher_speed("ctr(blowfish)", DECRYPT, sec, NULL, 0,
1940				  speed_template_8_32);
1941		break;
1942
1943	case 204:
1944		test_cipher_speed("ecb(des)", ENCRYPT, sec, NULL, 0,
1945				  speed_template_8);
1946		test_cipher_speed("ecb(des)", DECRYPT, sec, NULL, 0,
1947				  speed_template_8);
1948		test_cipher_speed("cbc(des)", ENCRYPT, sec, NULL, 0,
1949				  speed_template_8);
1950		test_cipher_speed("cbc(des)", DECRYPT, sec, NULL, 0,
1951				  speed_template_8);
1952		break;
1953
1954	case 205:
1955		test_cipher_speed("ecb(camellia)", ENCRYPT, sec, NULL, 0,
1956				speed_template_16_24_32);
1957		test_cipher_speed("ecb(camellia)", DECRYPT, sec, NULL, 0,
1958				speed_template_16_24_32);
1959		test_cipher_speed("cbc(camellia)", ENCRYPT, sec, NULL, 0,
1960				speed_template_16_24_32);
1961		test_cipher_speed("cbc(camellia)", DECRYPT, sec, NULL, 0,
1962				speed_template_16_24_32);
1963		test_cipher_speed("ctr(camellia)", ENCRYPT, sec, NULL, 0,
1964				speed_template_16_24_32);
1965		test_cipher_speed("ctr(camellia)", DECRYPT, sec, NULL, 0,
1966				speed_template_16_24_32);
1967		test_cipher_speed("lrw(camellia)", ENCRYPT, sec, NULL, 0,
1968				speed_template_32_40_48);
1969		test_cipher_speed("lrw(camellia)", DECRYPT, sec, NULL, 0,
1970				speed_template_32_40_48);
1971		test_cipher_speed("xts(camellia)", ENCRYPT, sec, NULL, 0,
1972				speed_template_32_48_64);
1973		test_cipher_speed("xts(camellia)", DECRYPT, sec, NULL, 0,
1974				speed_template_32_48_64);
1975		break;
1976
 
 
 
 
 
1977	case 207:
1978		test_cipher_speed("ecb(serpent)", ENCRYPT, sec, NULL, 0,
1979				  speed_template_16_32);
1980		test_cipher_speed("ecb(serpent)", DECRYPT, sec, NULL, 0,
1981				  speed_template_16_32);
1982		test_cipher_speed("cbc(serpent)", ENCRYPT, sec, NULL, 0,
1983				  speed_template_16_32);
1984		test_cipher_speed("cbc(serpent)", DECRYPT, sec, NULL, 0,
1985				  speed_template_16_32);
1986		test_cipher_speed("ctr(serpent)", ENCRYPT, sec, NULL, 0,
1987				  speed_template_16_32);
1988		test_cipher_speed("ctr(serpent)", DECRYPT, sec, NULL, 0,
1989				  speed_template_16_32);
1990		test_cipher_speed("lrw(serpent)", ENCRYPT, sec, NULL, 0,
1991				  speed_template_32_48);
1992		test_cipher_speed("lrw(serpent)", DECRYPT, sec, NULL, 0,
1993				  speed_template_32_48);
1994		test_cipher_speed("xts(serpent)", ENCRYPT, sec, NULL, 0,
1995				  speed_template_32_64);
1996		test_cipher_speed("xts(serpent)", DECRYPT, sec, NULL, 0,
1997				  speed_template_32_64);
1998		break;
1999
2000	case 208:
2001		test_cipher_speed("ecb(arc4)", ENCRYPT, sec, NULL, 0,
2002				  speed_template_8);
2003		break;
2004
2005	case 209:
2006		test_cipher_speed("ecb(cast5)", ENCRYPT, sec, NULL, 0,
2007				  speed_template_8_16);
2008		test_cipher_speed("ecb(cast5)", DECRYPT, sec, NULL, 0,
2009				  speed_template_8_16);
2010		test_cipher_speed("cbc(cast5)", ENCRYPT, sec, NULL, 0,
2011				  speed_template_8_16);
2012		test_cipher_speed("cbc(cast5)", DECRYPT, sec, NULL, 0,
2013				  speed_template_8_16);
2014		test_cipher_speed("ctr(cast5)", ENCRYPT, sec, NULL, 0,
2015				  speed_template_8_16);
2016		test_cipher_speed("ctr(cast5)", DECRYPT, sec, NULL, 0,
2017				  speed_template_8_16);
2018		break;
2019
2020	case 210:
2021		test_cipher_speed("ecb(cast6)", ENCRYPT, sec, NULL, 0,
2022				  speed_template_16_32);
2023		test_cipher_speed("ecb(cast6)", DECRYPT, sec, NULL, 0,
2024				  speed_template_16_32);
2025		test_cipher_speed("cbc(cast6)", ENCRYPT, sec, NULL, 0,
2026				  speed_template_16_32);
2027		test_cipher_speed("cbc(cast6)", DECRYPT, sec, NULL, 0,
2028				  speed_template_16_32);
2029		test_cipher_speed("ctr(cast6)", ENCRYPT, sec, NULL, 0,
2030				  speed_template_16_32);
2031		test_cipher_speed("ctr(cast6)", DECRYPT, sec, NULL, 0,
2032				  speed_template_16_32);
2033		test_cipher_speed("lrw(cast6)", ENCRYPT, sec, NULL, 0,
2034				  speed_template_32_48);
2035		test_cipher_speed("lrw(cast6)", DECRYPT, sec, NULL, 0,
2036				  speed_template_32_48);
2037		test_cipher_speed("xts(cast6)", ENCRYPT, sec, NULL, 0,
2038				  speed_template_32_64);
2039		test_cipher_speed("xts(cast6)", DECRYPT, sec, NULL, 0,
2040				  speed_template_32_64);
2041		break;
2042
2043	case 211:
2044		test_aead_speed("rfc4106(gcm(aes))", ENCRYPT, sec,
2045				NULL, 0, 16, 16, aead_speed_template_20_28_36);
2046		test_aead_speed("gcm(aes)", ENCRYPT, sec,
2047				NULL, 0, 16, 8, speed_template_16_24_32);
2048		test_aead_speed("rfc4106(gcm(aes))", DECRYPT, sec,
2049				NULL, 0, 16, 16, aead_speed_template_20_28_36);
2050		test_aead_speed("gcm(aes)", DECRYPT, sec,
2051				NULL, 0, 16, 8, speed_template_16_24_32);
2052		break;
2053
2054	case 212:
2055		test_aead_speed("rfc4309(ccm(aes))", ENCRYPT, sec,
2056				NULL, 0, 16, 16, aead_speed_template_19);
2057		test_aead_speed("rfc4309(ccm(aes))", DECRYPT, sec,
2058				NULL, 0, 16, 16, aead_speed_template_19);
2059		break;
2060
2061	case 213:
2062		test_aead_speed("rfc7539esp(chacha20,poly1305)", ENCRYPT, sec,
2063				NULL, 0, 16, 8, aead_speed_template_36);
2064		test_aead_speed("rfc7539esp(chacha20,poly1305)", DECRYPT, sec,
2065				NULL, 0, 16, 8, aead_speed_template_36);
2066		break;
2067
2068	case 214:
2069		test_cipher_speed("chacha20", ENCRYPT, sec, NULL, 0,
2070				  speed_template_32);
2071		break;
2072
2073	case 215:
2074		test_mb_aead_speed("rfc4106(gcm(aes))", ENCRYPT, sec, NULL,
2075				   0, 16, 16, aead_speed_template_20_28_36, num_mb);
2076		test_mb_aead_speed("gcm(aes)", ENCRYPT, sec, NULL, 0, 16, 8,
2077				   speed_template_16_24_32, num_mb);
2078		test_mb_aead_speed("rfc4106(gcm(aes))", DECRYPT, sec, NULL,
2079				   0, 16, 16, aead_speed_template_20_28_36, num_mb);
2080		test_mb_aead_speed("gcm(aes)", DECRYPT, sec, NULL, 0, 16, 8,
2081				   speed_template_16_24_32, num_mb);
2082		break;
2083
2084	case 216:
2085		test_mb_aead_speed("rfc4309(ccm(aes))", ENCRYPT, sec, NULL, 0,
2086				   16, 16, aead_speed_template_19, num_mb);
2087		test_mb_aead_speed("rfc4309(ccm(aes))", DECRYPT, sec, NULL, 0,
2088				   16, 16, aead_speed_template_19, num_mb);
2089		break;
2090
2091	case 217:
2092		test_mb_aead_speed("rfc7539esp(chacha20,poly1305)", ENCRYPT,
2093				   sec, NULL, 0, 16, 8, aead_speed_template_36,
2094				   num_mb);
2095		test_mb_aead_speed("rfc7539esp(chacha20,poly1305)", DECRYPT,
2096				   sec, NULL, 0, 16, 8, aead_speed_template_36,
2097				   num_mb);
2098		break;
2099
2100	case 218:
2101		test_cipher_speed("ecb(sm4)", ENCRYPT, sec, NULL, 0,
2102				speed_template_16);
2103		test_cipher_speed("ecb(sm4)", DECRYPT, sec, NULL, 0,
2104				speed_template_16);
2105		test_cipher_speed("cbc(sm4)", ENCRYPT, sec, NULL, 0,
2106				speed_template_16);
2107		test_cipher_speed("cbc(sm4)", DECRYPT, sec, NULL, 0,
2108				speed_template_16);
2109		test_cipher_speed("cts(cbc(sm4))", ENCRYPT, sec, NULL, 0,
2110				speed_template_16);
2111		test_cipher_speed("cts(cbc(sm4))", DECRYPT, sec, NULL, 0,
2112				speed_template_16);
2113		test_cipher_speed("ctr(sm4)", ENCRYPT, sec, NULL, 0,
2114				speed_template_16);
2115		test_cipher_speed("ctr(sm4)", DECRYPT, sec, NULL, 0,
2116				speed_template_16);
2117		test_cipher_speed("xts(sm4)", ENCRYPT, sec, NULL, 0,
2118				speed_template_32);
2119		test_cipher_speed("xts(sm4)", DECRYPT, sec, NULL, 0,
2120				speed_template_32);
2121		break;
2122
2123	case 219:
2124		test_cipher_speed("adiantum(xchacha12,aes)", ENCRYPT, sec, NULL,
2125				  0, speed_template_32);
2126		test_cipher_speed("adiantum(xchacha12,aes)", DECRYPT, sec, NULL,
2127				  0, speed_template_32);
2128		test_cipher_speed("adiantum(xchacha20,aes)", ENCRYPT, sec, NULL,
2129				  0, speed_template_32);
2130		test_cipher_speed("adiantum(xchacha20,aes)", DECRYPT, sec, NULL,
2131				  0, speed_template_32);
2132		break;
2133
2134	case 220:
2135		test_acipher_speed("essiv(cbc(aes),sha256)",
2136				  ENCRYPT, sec, NULL, 0,
2137				  speed_template_16_24_32);
2138		test_acipher_speed("essiv(cbc(aes),sha256)",
2139				  DECRYPT, sec, NULL, 0,
2140				  speed_template_16_24_32);
2141		break;
2142
2143	case 221:
2144		test_aead_speed("aegis128", ENCRYPT, sec,
2145				NULL, 0, 16, 8, speed_template_16);
2146		test_aead_speed("aegis128", DECRYPT, sec,
2147				NULL, 0, 16, 8, speed_template_16);
2148		break;
2149
2150	case 222:
2151		test_aead_speed("gcm(sm4)", ENCRYPT, sec,
2152				NULL, 0, 16, 8, speed_template_16);
2153		test_aead_speed("gcm(sm4)", DECRYPT, sec,
2154				NULL, 0, 16, 8, speed_template_16);
2155		break;
2156
2157	case 223:
2158		test_aead_speed("rfc4309(ccm(sm4))", ENCRYPT, sec,
2159				NULL, 0, 16, 16, aead_speed_template_19);
2160		test_aead_speed("rfc4309(ccm(sm4))", DECRYPT, sec,
2161				NULL, 0, 16, 16, aead_speed_template_19);
2162		break;
2163
2164	case 224:
2165		test_mb_aead_speed("gcm(sm4)", ENCRYPT, sec, NULL, 0, 16, 8,
2166				   speed_template_16, num_mb);
2167		test_mb_aead_speed("gcm(sm4)", DECRYPT, sec, NULL, 0, 16, 8,
2168				   speed_template_16, num_mb);
2169		break;
2170
2171	case 225:
2172		test_mb_aead_speed("rfc4309(ccm(sm4))", ENCRYPT, sec, NULL, 0,
2173				   16, 16, aead_speed_template_19, num_mb);
2174		test_mb_aead_speed("rfc4309(ccm(sm4))", DECRYPT, sec, NULL, 0,
2175				   16, 16, aead_speed_template_19, num_mb);
2176		break;
2177
2178	case 226:
2179		test_cipher_speed("hctr2(aes)", ENCRYPT, sec, NULL,
2180				  0, speed_template_32);
2181		break;
2182
2183	case 227:
2184		test_cipher_speed("ecb(aria)", ENCRYPT, sec, NULL, 0,
2185				  speed_template_16_24_32);
2186		test_cipher_speed("ecb(aria)", DECRYPT, sec, NULL, 0,
2187				  speed_template_16_24_32);
2188		test_cipher_speed("cbc(aria)", ENCRYPT, sec, NULL, 0,
2189				  speed_template_16_24_32);
2190		test_cipher_speed("cbc(aria)", DECRYPT, sec, NULL, 0,
2191				  speed_template_16_24_32);
2192		test_cipher_speed("ctr(aria)", ENCRYPT, sec, NULL, 0,
2193				  speed_template_16_24_32);
2194		test_cipher_speed("ctr(aria)", DECRYPT, sec, NULL, 0,
2195				  speed_template_16_24_32);
2196		break;
2197
2198	case 228:
2199		test_aead_speed("gcm(aria)", ENCRYPT, sec,
2200				NULL, 0, 16, 8, speed_template_16_24_32);
2201		test_aead_speed("gcm(aria)", DECRYPT, sec,
2202				NULL, 0, 16, 8, speed_template_16_24_32);
2203		break;
2204
2205	case 229:
2206		test_mb_aead_speed("gcm(aria)", ENCRYPT, sec, NULL, 0, 16, 8,
2207				   speed_template_16, num_mb);
2208		test_mb_aead_speed("gcm(aria)", DECRYPT, sec, NULL, 0, 16, 8,
2209				   speed_template_16, num_mb);
2210		break;
2211
2212	case 300:
2213		if (alg) {
2214			test_hash_speed(alg, sec, generic_hash_speed_template);
2215			break;
2216		}
2217		fallthrough;
 
 
2218	case 301:
2219		test_hash_speed("md4", sec, generic_hash_speed_template);
2220		if (mode > 300 && mode < 400) break;
2221		fallthrough;
2222	case 302:
2223		test_hash_speed("md5", sec, generic_hash_speed_template);
2224		if (mode > 300 && mode < 400) break;
2225		fallthrough;
2226	case 303:
2227		test_hash_speed("sha1", sec, generic_hash_speed_template);
2228		if (mode > 300 && mode < 400) break;
2229		fallthrough;
2230	case 304:
2231		test_hash_speed("sha256", sec, generic_hash_speed_template);
2232		if (mode > 300 && mode < 400) break;
2233		fallthrough;
2234	case 305:
2235		test_hash_speed("sha384", sec, generic_hash_speed_template);
2236		if (mode > 300 && mode < 400) break;
2237		fallthrough;
2238	case 306:
2239		test_hash_speed("sha512", sec, generic_hash_speed_template);
2240		if (mode > 300 && mode < 400) break;
2241		fallthrough;
2242	case 307:
2243		test_hash_speed("wp256", sec, generic_hash_speed_template);
2244		if (mode > 300 && mode < 400) break;
2245		fallthrough;
2246	case 308:
2247		test_hash_speed("wp384", sec, generic_hash_speed_template);
2248		if (mode > 300 && mode < 400) break;
2249		fallthrough;
2250	case 309:
2251		test_hash_speed("wp512", sec, generic_hash_speed_template);
2252		if (mode > 300 && mode < 400) break;
2253		fallthrough;
 
 
 
 
 
 
 
 
 
 
 
 
2254	case 313:
2255		test_hash_speed("sha224", sec, generic_hash_speed_template);
2256		if (mode > 300 && mode < 400) break;
2257		fallthrough;
2258	case 314:
2259		test_hash_speed("xxhash64", sec, generic_hash_speed_template);
2260		if (mode > 300 && mode < 400) break;
2261		fallthrough;
2262	case 315:
2263		test_hash_speed("rmd160", sec, generic_hash_speed_template);
2264		if (mode > 300 && mode < 400) break;
2265		fallthrough;
 
 
 
 
2266	case 317:
2267		test_hash_speed("blake2b-512", sec, generic_hash_speed_template);
2268		if (mode > 300 && mode < 400) break;
2269		fallthrough;
2270	case 318:
2271		klen = 16;
2272		test_hash_speed("ghash", sec, generic_hash_speed_template);
2273		if (mode > 300 && mode < 400) break;
2274		fallthrough;
2275	case 319:
2276		test_hash_speed("crc32c", sec, generic_hash_speed_template);
2277		if (mode > 300 && mode < 400) break;
2278		fallthrough;
2279	case 320:
2280		test_hash_speed("crct10dif", sec, generic_hash_speed_template);
2281		if (mode > 300 && mode < 400) break;
2282		fallthrough;
2283	case 321:
2284		test_hash_speed("poly1305", sec, poly1305_speed_template);
2285		if (mode > 300 && mode < 400) break;
2286		fallthrough;
2287	case 322:
2288		test_hash_speed("sha3-224", sec, generic_hash_speed_template);
2289		if (mode > 300 && mode < 400) break;
2290		fallthrough;
2291	case 323:
2292		test_hash_speed("sha3-256", sec, generic_hash_speed_template);
2293		if (mode > 300 && mode < 400) break;
2294		fallthrough;
2295	case 324:
2296		test_hash_speed("sha3-384", sec, generic_hash_speed_template);
2297		if (mode > 300 && mode < 400) break;
2298		fallthrough;
2299	case 325:
2300		test_hash_speed("sha3-512", sec, generic_hash_speed_template);
2301		if (mode > 300 && mode < 400) break;
2302		fallthrough;
2303	case 326:
2304		test_hash_speed("sm3", sec, generic_hash_speed_template);
2305		if (mode > 300 && mode < 400) break;
2306		fallthrough;
2307	case 327:
2308		test_hash_speed("streebog256", sec,
2309				generic_hash_speed_template);
2310		if (mode > 300 && mode < 400) break;
2311		fallthrough;
2312	case 328:
2313		test_hash_speed("streebog512", sec,
2314				generic_hash_speed_template);
2315		if (mode > 300 && mode < 400) break;
2316		fallthrough;
2317	case 399:
2318		break;
2319
2320	case 400:
2321		if (alg) {
2322			test_ahash_speed(alg, sec, generic_hash_speed_template);
2323			break;
2324		}
2325		fallthrough;
 
 
2326	case 401:
2327		test_ahash_speed("md4", sec, generic_hash_speed_template);
2328		if (mode > 400 && mode < 500) break;
2329		fallthrough;
2330	case 402:
2331		test_ahash_speed("md5", sec, generic_hash_speed_template);
2332		if (mode > 400 && mode < 500) break;
2333		fallthrough;
2334	case 403:
2335		test_ahash_speed("sha1", sec, generic_hash_speed_template);
2336		if (mode > 400 && mode < 500) break;
2337		fallthrough;
2338	case 404:
2339		test_ahash_speed("sha256", sec, generic_hash_speed_template);
2340		if (mode > 400 && mode < 500) break;
2341		fallthrough;
2342	case 405:
2343		test_ahash_speed("sha384", sec, generic_hash_speed_template);
2344		if (mode > 400 && mode < 500) break;
2345		fallthrough;
2346	case 406:
2347		test_ahash_speed("sha512", sec, generic_hash_speed_template);
2348		if (mode > 400 && mode < 500) break;
2349		fallthrough;
2350	case 407:
2351		test_ahash_speed("wp256", sec, generic_hash_speed_template);
2352		if (mode > 400 && mode < 500) break;
2353		fallthrough;
2354	case 408:
2355		test_ahash_speed("wp384", sec, generic_hash_speed_template);
2356		if (mode > 400 && mode < 500) break;
2357		fallthrough;
2358	case 409:
2359		test_ahash_speed("wp512", sec, generic_hash_speed_template);
2360		if (mode > 400 && mode < 500) break;
2361		fallthrough;
 
 
 
 
 
 
 
 
 
 
 
 
2362	case 413:
2363		test_ahash_speed("sha224", sec, generic_hash_speed_template);
2364		if (mode > 400 && mode < 500) break;
2365		fallthrough;
2366	case 414:
2367		test_ahash_speed("xxhash64", sec, generic_hash_speed_template);
2368		if (mode > 400 && mode < 500) break;
2369		fallthrough;
2370	case 415:
2371		test_ahash_speed("rmd160", sec, generic_hash_speed_template);
2372		if (mode > 400 && mode < 500) break;
2373		fallthrough;
 
 
 
 
2374	case 417:
2375		test_ahash_speed("blake2b-512", sec, generic_hash_speed_template);
2376		if (mode > 400 && mode < 500) break;
2377		fallthrough;
2378	case 418:
2379		test_ahash_speed("sha3-224", sec, generic_hash_speed_template);
2380		if (mode > 400 && mode < 500) break;
2381		fallthrough;
2382	case 419:
2383		test_ahash_speed("sha3-256", sec, generic_hash_speed_template);
2384		if (mode > 400 && mode < 500) break;
2385		fallthrough;
2386	case 420:
2387		test_ahash_speed("sha3-384", sec, generic_hash_speed_template);
2388		if (mode > 400 && mode < 500) break;
2389		fallthrough;
2390	case 421:
2391		test_ahash_speed("sha3-512", sec, generic_hash_speed_template);
2392		if (mode > 400 && mode < 500) break;
2393		fallthrough;
2394	case 422:
2395		test_ahash_speed("sm3", sec, generic_hash_speed_template);
2396		if (mode > 400 && mode < 500) break;
2397		fallthrough;
2398	case 499:
2399		break;
2400
2401	case 500:
2402		test_acipher_speed("ecb(aes)", ENCRYPT, sec, NULL, 0,
2403				   speed_template_16_24_32);
2404		test_acipher_speed("ecb(aes)", DECRYPT, sec, NULL, 0,
2405				   speed_template_16_24_32);
2406		test_acipher_speed("cbc(aes)", ENCRYPT, sec, NULL, 0,
2407				   speed_template_16_24_32);
2408		test_acipher_speed("cbc(aes)", DECRYPT, sec, NULL, 0,
2409				   speed_template_16_24_32);
2410		test_acipher_speed("lrw(aes)", ENCRYPT, sec, NULL, 0,
2411				   speed_template_32_40_48);
2412		test_acipher_speed("lrw(aes)", DECRYPT, sec, NULL, 0,
2413				   speed_template_32_40_48);
2414		test_acipher_speed("xts(aes)", ENCRYPT, sec, NULL, 0,
2415				   speed_template_32_64);
2416		test_acipher_speed("xts(aes)", DECRYPT, sec, NULL, 0,
2417				   speed_template_32_64);
2418		test_acipher_speed("cts(cbc(aes))", ENCRYPT, sec, NULL, 0,
 
 
 
 
2419				   speed_template_16_24_32);
2420		test_acipher_speed("cts(cbc(aes))", DECRYPT, sec, NULL, 0,
2421				   speed_template_16_24_32);
2422		test_acipher_speed("ctr(aes)", ENCRYPT, sec, NULL, 0,
2423				   speed_template_16_24_32);
2424		test_acipher_speed("ctr(aes)", DECRYPT, sec, NULL, 0,
2425				   speed_template_16_24_32);
2426		test_acipher_speed("rfc3686(ctr(aes))", ENCRYPT, sec, NULL, 0,
2427				   speed_template_20_28_36);
2428		test_acipher_speed("rfc3686(ctr(aes))", DECRYPT, sec, NULL, 0,
2429				   speed_template_20_28_36);
2430		break;
2431
2432	case 501:
2433		test_acipher_speed("ecb(des3_ede)", ENCRYPT, sec,
2434				   des3_speed_template, DES3_SPEED_VECTORS,
2435				   speed_template_24);
2436		test_acipher_speed("ecb(des3_ede)", DECRYPT, sec,
2437				   des3_speed_template, DES3_SPEED_VECTORS,
2438				   speed_template_24);
2439		test_acipher_speed("cbc(des3_ede)", ENCRYPT, sec,
2440				   des3_speed_template, DES3_SPEED_VECTORS,
2441				   speed_template_24);
2442		test_acipher_speed("cbc(des3_ede)", DECRYPT, sec,
2443				   des3_speed_template, DES3_SPEED_VECTORS,
2444				   speed_template_24);
 
 
 
 
 
 
 
 
 
 
 
 
2445		break;
2446
2447	case 502:
2448		test_acipher_speed("ecb(des)", ENCRYPT, sec, NULL, 0,
2449				   speed_template_8);
2450		test_acipher_speed("ecb(des)", DECRYPT, sec, NULL, 0,
2451				   speed_template_8);
2452		test_acipher_speed("cbc(des)", ENCRYPT, sec, NULL, 0,
2453				   speed_template_8);
2454		test_acipher_speed("cbc(des)", DECRYPT, sec, NULL, 0,
2455				   speed_template_8);
 
 
 
 
 
 
 
 
2456		break;
2457
2458	case 503:
2459		test_acipher_speed("ecb(serpent)", ENCRYPT, sec, NULL, 0,
2460				   speed_template_16_32);
2461		test_acipher_speed("ecb(serpent)", DECRYPT, sec, NULL, 0,
2462				   speed_template_16_32);
2463		test_acipher_speed("cbc(serpent)", ENCRYPT, sec, NULL, 0,
2464				   speed_template_16_32);
2465		test_acipher_speed("cbc(serpent)", DECRYPT, sec, NULL, 0,
2466				   speed_template_16_32);
2467		test_acipher_speed("ctr(serpent)", ENCRYPT, sec, NULL, 0,
2468				   speed_template_16_32);
2469		test_acipher_speed("ctr(serpent)", DECRYPT, sec, NULL, 0,
2470				   speed_template_16_32);
2471		test_acipher_speed("lrw(serpent)", ENCRYPT, sec, NULL, 0,
2472				   speed_template_32_48);
2473		test_acipher_speed("lrw(serpent)", DECRYPT, sec, NULL, 0,
2474				   speed_template_32_48);
2475		test_acipher_speed("xts(serpent)", ENCRYPT, sec, NULL, 0,
2476				   speed_template_32_64);
2477		test_acipher_speed("xts(serpent)", DECRYPT, sec, NULL, 0,
2478				   speed_template_32_64);
2479		break;
2480
2481	case 504:
2482		test_acipher_speed("ecb(twofish)", ENCRYPT, sec, NULL, 0,
2483				   speed_template_16_24_32);
2484		test_acipher_speed("ecb(twofish)", DECRYPT, sec, NULL, 0,
2485				   speed_template_16_24_32);
2486		test_acipher_speed("cbc(twofish)", ENCRYPT, sec, NULL, 0,
2487				   speed_template_16_24_32);
2488		test_acipher_speed("cbc(twofish)", DECRYPT, sec, NULL, 0,
2489				   speed_template_16_24_32);
2490		test_acipher_speed("ctr(twofish)", ENCRYPT, sec, NULL, 0,
2491				   speed_template_16_24_32);
2492		test_acipher_speed("ctr(twofish)", DECRYPT, sec, NULL, 0,
2493				   speed_template_16_24_32);
2494		test_acipher_speed("lrw(twofish)", ENCRYPT, sec, NULL, 0,
2495				   speed_template_32_40_48);
2496		test_acipher_speed("lrw(twofish)", DECRYPT, sec, NULL, 0,
2497				   speed_template_32_40_48);
2498		test_acipher_speed("xts(twofish)", ENCRYPT, sec, NULL, 0,
2499				   speed_template_32_48_64);
2500		test_acipher_speed("xts(twofish)", DECRYPT, sec, NULL, 0,
2501				   speed_template_32_48_64);
2502		break;
2503
2504	case 505:
2505		test_acipher_speed("ecb(arc4)", ENCRYPT, sec, NULL, 0,
2506				   speed_template_8);
2507		break;
2508
2509	case 506:
2510		test_acipher_speed("ecb(cast5)", ENCRYPT, sec, NULL, 0,
2511				   speed_template_8_16);
2512		test_acipher_speed("ecb(cast5)", DECRYPT, sec, NULL, 0,
2513				   speed_template_8_16);
2514		test_acipher_speed("cbc(cast5)", ENCRYPT, sec, NULL, 0,
2515				   speed_template_8_16);
2516		test_acipher_speed("cbc(cast5)", DECRYPT, sec, NULL, 0,
2517				   speed_template_8_16);
2518		test_acipher_speed("ctr(cast5)", ENCRYPT, sec, NULL, 0,
2519				   speed_template_8_16);
2520		test_acipher_speed("ctr(cast5)", DECRYPT, sec, NULL, 0,
2521				   speed_template_8_16);
2522		break;
2523
2524	case 507:
2525		test_acipher_speed("ecb(cast6)", ENCRYPT, sec, NULL, 0,
2526				   speed_template_16_32);
2527		test_acipher_speed("ecb(cast6)", DECRYPT, sec, NULL, 0,
2528				   speed_template_16_32);
2529		test_acipher_speed("cbc(cast6)", ENCRYPT, sec, NULL, 0,
2530				   speed_template_16_32);
2531		test_acipher_speed("cbc(cast6)", DECRYPT, sec, NULL, 0,
2532				   speed_template_16_32);
2533		test_acipher_speed("ctr(cast6)", ENCRYPT, sec, NULL, 0,
2534				   speed_template_16_32);
2535		test_acipher_speed("ctr(cast6)", DECRYPT, sec, NULL, 0,
2536				   speed_template_16_32);
2537		test_acipher_speed("lrw(cast6)", ENCRYPT, sec, NULL, 0,
2538				   speed_template_32_48);
2539		test_acipher_speed("lrw(cast6)", DECRYPT, sec, NULL, 0,
2540				   speed_template_32_48);
2541		test_acipher_speed("xts(cast6)", ENCRYPT, sec, NULL, 0,
2542				   speed_template_32_64);
2543		test_acipher_speed("xts(cast6)", DECRYPT, sec, NULL, 0,
2544				   speed_template_32_64);
2545		break;
2546
2547	case 508:
2548		test_acipher_speed("ecb(camellia)", ENCRYPT, sec, NULL, 0,
2549				   speed_template_16_32);
2550		test_acipher_speed("ecb(camellia)", DECRYPT, sec, NULL, 0,
2551				   speed_template_16_32);
2552		test_acipher_speed("cbc(camellia)", ENCRYPT, sec, NULL, 0,
2553				   speed_template_16_32);
2554		test_acipher_speed("cbc(camellia)", DECRYPT, sec, NULL, 0,
2555				   speed_template_16_32);
2556		test_acipher_speed("ctr(camellia)", ENCRYPT, sec, NULL, 0,
2557				   speed_template_16_32);
2558		test_acipher_speed("ctr(camellia)", DECRYPT, sec, NULL, 0,
2559				   speed_template_16_32);
2560		test_acipher_speed("lrw(camellia)", ENCRYPT, sec, NULL, 0,
2561				   speed_template_32_48);
2562		test_acipher_speed("lrw(camellia)", DECRYPT, sec, NULL, 0,
2563				   speed_template_32_48);
2564		test_acipher_speed("xts(camellia)", ENCRYPT, sec, NULL, 0,
2565				   speed_template_32_64);
2566		test_acipher_speed("xts(camellia)", DECRYPT, sec, NULL, 0,
2567				   speed_template_32_64);
2568		break;
2569
2570	case 509:
2571		test_acipher_speed("ecb(blowfish)", ENCRYPT, sec, NULL, 0,
2572				   speed_template_8_32);
2573		test_acipher_speed("ecb(blowfish)", DECRYPT, sec, NULL, 0,
2574				   speed_template_8_32);
2575		test_acipher_speed("cbc(blowfish)", ENCRYPT, sec, NULL, 0,
2576				   speed_template_8_32);
2577		test_acipher_speed("cbc(blowfish)", DECRYPT, sec, NULL, 0,
2578				   speed_template_8_32);
2579		test_acipher_speed("ctr(blowfish)", ENCRYPT, sec, NULL, 0,
2580				   speed_template_8_32);
2581		test_acipher_speed("ctr(blowfish)", DECRYPT, sec, NULL, 0,
2582				   speed_template_8_32);
2583		break;
2584
2585	case 518:
2586		test_acipher_speed("ecb(sm4)", ENCRYPT, sec, NULL, 0,
2587				speed_template_16);
2588		test_acipher_speed("ecb(sm4)", DECRYPT, sec, NULL, 0,
2589				speed_template_16);
2590		test_acipher_speed("cbc(sm4)", ENCRYPT, sec, NULL, 0,
2591				speed_template_16);
2592		test_acipher_speed("cbc(sm4)", DECRYPT, sec, NULL, 0,
2593				speed_template_16);
2594		test_acipher_speed("ctr(sm4)", ENCRYPT, sec, NULL, 0,
2595				speed_template_16);
2596		test_acipher_speed("ctr(sm4)", DECRYPT, sec, NULL, 0,
2597				speed_template_16);
2598		test_acipher_speed("xts(sm4)", ENCRYPT, sec, NULL, 0,
2599				speed_template_32);
2600		test_acipher_speed("xts(sm4)", DECRYPT, sec, NULL, 0,
2601				speed_template_32);
2602		break;
2603
2604	case 519:
2605		test_acipher_speed("ecb(aria)", ENCRYPT, sec, NULL, 0,
2606				   speed_template_16_24_32);
2607		test_acipher_speed("ecb(aria)", DECRYPT, sec, NULL, 0,
2608				   speed_template_16_24_32);
2609		test_acipher_speed("ctr(aria)", ENCRYPT, sec, NULL, 0,
2610				   speed_template_16_24_32);
2611		test_acipher_speed("ctr(aria)", DECRYPT, sec, NULL, 0,
2612				   speed_template_16_24_32);
2613		break;
2614
2615	case 600:
2616		test_mb_skcipher_speed("ecb(aes)", ENCRYPT, sec, NULL, 0,
2617				       speed_template_16_24_32, num_mb);
2618		test_mb_skcipher_speed("ecb(aes)", DECRYPT, sec, NULL, 0,
2619				       speed_template_16_24_32, num_mb);
2620		test_mb_skcipher_speed("cbc(aes)", ENCRYPT, sec, NULL, 0,
2621				       speed_template_16_24_32, num_mb);
2622		test_mb_skcipher_speed("cbc(aes)", DECRYPT, sec, NULL, 0,
2623				       speed_template_16_24_32, num_mb);
2624		test_mb_skcipher_speed("lrw(aes)", ENCRYPT, sec, NULL, 0,
2625				       speed_template_32_40_48, num_mb);
2626		test_mb_skcipher_speed("lrw(aes)", DECRYPT, sec, NULL, 0,
2627				       speed_template_32_40_48, num_mb);
2628		test_mb_skcipher_speed("xts(aes)", ENCRYPT, sec, NULL, 0,
2629				       speed_template_32_64, num_mb);
2630		test_mb_skcipher_speed("xts(aes)", DECRYPT, sec, NULL, 0,
2631				       speed_template_32_64, num_mb);
2632		test_mb_skcipher_speed("cts(cbc(aes))", ENCRYPT, sec, NULL, 0,
2633				       speed_template_16_24_32, num_mb);
2634		test_mb_skcipher_speed("cts(cbc(aes))", DECRYPT, sec, NULL, 0,
2635				       speed_template_16_24_32, num_mb);
2636		test_mb_skcipher_speed("ctr(aes)", ENCRYPT, sec, NULL, 0,
2637				       speed_template_16_24_32, num_mb);
2638		test_mb_skcipher_speed("ctr(aes)", DECRYPT, sec, NULL, 0,
2639				       speed_template_16_24_32, num_mb);
2640		test_mb_skcipher_speed("rfc3686(ctr(aes))", ENCRYPT, sec, NULL,
2641				       0, speed_template_20_28_36, num_mb);
2642		test_mb_skcipher_speed("rfc3686(ctr(aes))", DECRYPT, sec, NULL,
2643				       0, speed_template_20_28_36, num_mb);
2644		break;
2645
2646	case 601:
2647		test_mb_skcipher_speed("ecb(des3_ede)", ENCRYPT, sec,
2648				       des3_speed_template, DES3_SPEED_VECTORS,
2649				       speed_template_24, num_mb);
2650		test_mb_skcipher_speed("ecb(des3_ede)", DECRYPT, sec,
2651				       des3_speed_template, DES3_SPEED_VECTORS,
2652				       speed_template_24, num_mb);
2653		test_mb_skcipher_speed("cbc(des3_ede)", ENCRYPT, sec,
2654				       des3_speed_template, DES3_SPEED_VECTORS,
2655				       speed_template_24, num_mb);
2656		test_mb_skcipher_speed("cbc(des3_ede)", DECRYPT, sec,
2657				       des3_speed_template, DES3_SPEED_VECTORS,
2658				       speed_template_24, num_mb);
2659		break;
2660
2661	case 602:
2662		test_mb_skcipher_speed("ecb(des)", ENCRYPT, sec, NULL, 0,
2663				       speed_template_8, num_mb);
2664		test_mb_skcipher_speed("ecb(des)", DECRYPT, sec, NULL, 0,
2665				       speed_template_8, num_mb);
2666		test_mb_skcipher_speed("cbc(des)", ENCRYPT, sec, NULL, 0,
2667				       speed_template_8, num_mb);
2668		test_mb_skcipher_speed("cbc(des)", DECRYPT, sec, NULL, 0,
2669				       speed_template_8, num_mb);
2670		break;
2671
2672	case 603:
2673		test_mb_skcipher_speed("ecb(serpent)", ENCRYPT, sec, NULL, 0,
2674				       speed_template_16_32, num_mb);
2675		test_mb_skcipher_speed("ecb(serpent)", DECRYPT, sec, NULL, 0,
2676				       speed_template_16_32, num_mb);
2677		test_mb_skcipher_speed("cbc(serpent)", ENCRYPT, sec, NULL, 0,
2678				       speed_template_16_32, num_mb);
2679		test_mb_skcipher_speed("cbc(serpent)", DECRYPT, sec, NULL, 0,
2680				       speed_template_16_32, num_mb);
2681		test_mb_skcipher_speed("ctr(serpent)", ENCRYPT, sec, NULL, 0,
2682				       speed_template_16_32, num_mb);
2683		test_mb_skcipher_speed("ctr(serpent)", DECRYPT, sec, NULL, 0,
2684				       speed_template_16_32, num_mb);
2685		test_mb_skcipher_speed("lrw(serpent)", ENCRYPT, sec, NULL, 0,
2686				       speed_template_32_48, num_mb);
2687		test_mb_skcipher_speed("lrw(serpent)", DECRYPT, sec, NULL, 0,
2688				       speed_template_32_48, num_mb);
2689		test_mb_skcipher_speed("xts(serpent)", ENCRYPT, sec, NULL, 0,
2690				       speed_template_32_64, num_mb);
2691		test_mb_skcipher_speed("xts(serpent)", DECRYPT, sec, NULL, 0,
2692				       speed_template_32_64, num_mb);
2693		break;
2694
2695	case 604:
2696		test_mb_skcipher_speed("ecb(twofish)", ENCRYPT, sec, NULL, 0,
2697				       speed_template_16_24_32, num_mb);
2698		test_mb_skcipher_speed("ecb(twofish)", DECRYPT, sec, NULL, 0,
2699				       speed_template_16_24_32, num_mb);
2700		test_mb_skcipher_speed("cbc(twofish)", ENCRYPT, sec, NULL, 0,
2701				       speed_template_16_24_32, num_mb);
2702		test_mb_skcipher_speed("cbc(twofish)", DECRYPT, sec, NULL, 0,
2703				       speed_template_16_24_32, num_mb);
2704		test_mb_skcipher_speed("ctr(twofish)", ENCRYPT, sec, NULL, 0,
2705				       speed_template_16_24_32, num_mb);
2706		test_mb_skcipher_speed("ctr(twofish)", DECRYPT, sec, NULL, 0,
2707				       speed_template_16_24_32, num_mb);
2708		test_mb_skcipher_speed("lrw(twofish)", ENCRYPT, sec, NULL, 0,
2709				       speed_template_32_40_48, num_mb);
2710		test_mb_skcipher_speed("lrw(twofish)", DECRYPT, sec, NULL, 0,
2711				       speed_template_32_40_48, num_mb);
2712		test_mb_skcipher_speed("xts(twofish)", ENCRYPT, sec, NULL, 0,
2713				       speed_template_32_48_64, num_mb);
2714		test_mb_skcipher_speed("xts(twofish)", DECRYPT, sec, NULL, 0,
2715				       speed_template_32_48_64, num_mb);
2716		break;
2717
2718	case 605:
2719		test_mb_skcipher_speed("ecb(arc4)", ENCRYPT, sec, NULL, 0,
2720				       speed_template_8, num_mb);
2721		break;
2722
2723	case 606:
2724		test_mb_skcipher_speed("ecb(cast5)", ENCRYPT, sec, NULL, 0,
2725				       speed_template_8_16, num_mb);
2726		test_mb_skcipher_speed("ecb(cast5)", DECRYPT, sec, NULL, 0,
2727				       speed_template_8_16, num_mb);
2728		test_mb_skcipher_speed("cbc(cast5)", ENCRYPT, sec, NULL, 0,
2729				       speed_template_8_16, num_mb);
2730		test_mb_skcipher_speed("cbc(cast5)", DECRYPT, sec, NULL, 0,
2731				       speed_template_8_16, num_mb);
2732		test_mb_skcipher_speed("ctr(cast5)", ENCRYPT, sec, NULL, 0,
2733				       speed_template_8_16, num_mb);
2734		test_mb_skcipher_speed("ctr(cast5)", DECRYPT, sec, NULL, 0,
2735				       speed_template_8_16, num_mb);
2736		break;
2737
2738	case 607:
2739		test_mb_skcipher_speed("ecb(cast6)", ENCRYPT, sec, NULL, 0,
2740				       speed_template_16_32, num_mb);
2741		test_mb_skcipher_speed("ecb(cast6)", DECRYPT, sec, NULL, 0,
2742				       speed_template_16_32, num_mb);
2743		test_mb_skcipher_speed("cbc(cast6)", ENCRYPT, sec, NULL, 0,
2744				       speed_template_16_32, num_mb);
2745		test_mb_skcipher_speed("cbc(cast6)", DECRYPT, sec, NULL, 0,
2746				       speed_template_16_32, num_mb);
2747		test_mb_skcipher_speed("ctr(cast6)", ENCRYPT, sec, NULL, 0,
2748				       speed_template_16_32, num_mb);
2749		test_mb_skcipher_speed("ctr(cast6)", DECRYPT, sec, NULL, 0,
2750				       speed_template_16_32, num_mb);
2751		test_mb_skcipher_speed("lrw(cast6)", ENCRYPT, sec, NULL, 0,
2752				       speed_template_32_48, num_mb);
2753		test_mb_skcipher_speed("lrw(cast6)", DECRYPT, sec, NULL, 0,
2754				       speed_template_32_48, num_mb);
2755		test_mb_skcipher_speed("xts(cast6)", ENCRYPT, sec, NULL, 0,
2756				       speed_template_32_64, num_mb);
2757		test_mb_skcipher_speed("xts(cast6)", DECRYPT, sec, NULL, 0,
2758				       speed_template_32_64, num_mb);
2759		break;
2760
2761	case 608:
2762		test_mb_skcipher_speed("ecb(camellia)", ENCRYPT, sec, NULL, 0,
2763				       speed_template_16_32, num_mb);
2764		test_mb_skcipher_speed("ecb(camellia)", DECRYPT, sec, NULL, 0,
2765				       speed_template_16_32, num_mb);
2766		test_mb_skcipher_speed("cbc(camellia)", ENCRYPT, sec, NULL, 0,
2767				       speed_template_16_32, num_mb);
2768		test_mb_skcipher_speed("cbc(camellia)", DECRYPT, sec, NULL, 0,
2769				       speed_template_16_32, num_mb);
2770		test_mb_skcipher_speed("ctr(camellia)", ENCRYPT, sec, NULL, 0,
2771				       speed_template_16_32, num_mb);
2772		test_mb_skcipher_speed("ctr(camellia)", DECRYPT, sec, NULL, 0,
2773				       speed_template_16_32, num_mb);
2774		test_mb_skcipher_speed("lrw(camellia)", ENCRYPT, sec, NULL, 0,
2775				       speed_template_32_48, num_mb);
2776		test_mb_skcipher_speed("lrw(camellia)", DECRYPT, sec, NULL, 0,
2777				       speed_template_32_48, num_mb);
2778		test_mb_skcipher_speed("xts(camellia)", ENCRYPT, sec, NULL, 0,
2779				       speed_template_32_64, num_mb);
2780		test_mb_skcipher_speed("xts(camellia)", DECRYPT, sec, NULL, 0,
2781				       speed_template_32_64, num_mb);
2782		break;
2783
2784	case 609:
2785		test_mb_skcipher_speed("ecb(blowfish)", ENCRYPT, sec, NULL, 0,
2786				       speed_template_8_32, num_mb);
2787		test_mb_skcipher_speed("ecb(blowfish)", DECRYPT, sec, NULL, 0,
2788				       speed_template_8_32, num_mb);
2789		test_mb_skcipher_speed("cbc(blowfish)", ENCRYPT, sec, NULL, 0,
2790				       speed_template_8_32, num_mb);
2791		test_mb_skcipher_speed("cbc(blowfish)", DECRYPT, sec, NULL, 0,
2792				       speed_template_8_32, num_mb);
2793		test_mb_skcipher_speed("ctr(blowfish)", ENCRYPT, sec, NULL, 0,
2794				       speed_template_8_32, num_mb);
2795		test_mb_skcipher_speed("ctr(blowfish)", DECRYPT, sec, NULL, 0,
2796				       speed_template_8_32, num_mb);
2797		break;
2798
2799	case 610:
2800		test_mb_skcipher_speed("ecb(aria)", ENCRYPT, sec, NULL, 0,
2801				       speed_template_16_32, num_mb);
2802		test_mb_skcipher_speed("ecb(aria)", DECRYPT, sec, NULL, 0,
2803				       speed_template_16_32, num_mb);
2804		test_mb_skcipher_speed("ctr(aria)", ENCRYPT, sec, NULL, 0,
2805				       speed_template_16_32, num_mb);
2806		test_mb_skcipher_speed("ctr(aria)", DECRYPT, sec, NULL, 0,
2807				       speed_template_16_32, num_mb);
2808		break;
2809
2810	}
2811
2812	return ret;
2813}
2814
2815static int __init tcrypt_mod_init(void)
2816{
2817	int err = -ENOMEM;
2818	int i;
2819
2820	for (i = 0; i < TVMEMSIZE; i++) {
2821		tvmem[i] = (void *)__get_free_page(GFP_KERNEL);
2822		if (!tvmem[i])
2823			goto err_free_tv;
2824	}
2825
2826	err = do_test(alg, type, mask, mode, num_mb);
2827
2828	if (err) {
2829		pr_err("one or more tests failed!\n");
2830		goto err_free_tv;
2831	} else {
2832		pr_debug("all tests passed\n");
2833	}
2834
2835	/* We intentionaly return -EAGAIN to prevent keeping the module,
2836	 * unless we're running in fips mode. It does all its work from
2837	 * init() and doesn't offer any runtime functionality, but in
2838	 * the fips case, checking for a successful load is helpful.
2839	 * => we don't need it in the memory, do we?
2840	 *                                        -- mludvig
2841	 */
2842	if (!fips_enabled)
2843		err = -EAGAIN;
2844
2845err_free_tv:
2846	for (i = 0; i < TVMEMSIZE && tvmem[i]; i++)
2847		free_page((unsigned long)tvmem[i]);
2848
2849	return err;
2850}
2851
2852/*
2853 * If an init function is provided, an exit function must also be provided
2854 * to allow module unload.
2855 */
2856static void __exit tcrypt_mod_fini(void) { }
2857
2858late_initcall(tcrypt_mod_init);
2859module_exit(tcrypt_mod_fini);
2860
2861module_param(alg, charp, 0);
2862module_param(type, uint, 0);
2863module_param(mask, uint, 0);
2864module_param(mode, int, 0);
2865module_param(sec, uint, 0);
2866MODULE_PARM_DESC(sec, "Length in seconds of speed tests "
2867		      "(defaults to zero which uses CPU cycles instead)");
2868module_param(num_mb, uint, 0000);
2869MODULE_PARM_DESC(num_mb, "Number of concurrent requests to be used in mb speed tests (defaults to 8)");
2870module_param(klen, uint, 0);
2871MODULE_PARM_DESC(klen, "Key length (defaults to 0)");
2872
2873MODULE_LICENSE("GPL");
2874MODULE_DESCRIPTION("Quick & dirty crypto testing module");
2875MODULE_AUTHOR("James Morris <jmorris@intercode.com.au>");