]>
Commit | Line | Data |
---|---|---|
ef2736fc | 1 | /* |
1da177e4 LT |
2 | * Quick & dirty crypto testing module. |
3 | * | |
4 | * This will only exist until we have a better testing mechanism | |
5 | * (e.g. a char device). | |
6 | * | |
7 | * Copyright (c) 2002 James Morris <jmorris@intercode.com.au> | |
8 | * Copyright (c) 2002 Jean-Francois Dive <jef@linuxbe.org> | |
9 | * | |
10 | * This program is free software; you can redistribute it and/or modify it | |
11 | * under the terms of the GNU General Public License as published by the Free | |
ef2736fc | 12 | * Software Foundation; either version 2 of the License, or (at your option) |
1da177e4 LT |
13 | * any later version. |
14 | * | |
ebfd9bcf HW |
15 | * 2004-08-09 Added cipher speed tests (Reyk Floeter <reyk@vantronix.net>) |
16 | * 2003-09-14 Rewritten by Kartikey Mahendra Bhatt | |
17 | * | |
1da177e4 LT |
18 | */ |
19 | ||
cba83564 | 20 | #include <linux/err.h> |
1da177e4 LT |
21 | #include <linux/init.h> |
22 | #include <linux/module.h> | |
23 | #include <linux/mm.h> | |
24 | #include <linux/slab.h> | |
378f058c | 25 | #include <linux/scatterlist.h> |
1da177e4 LT |
26 | #include <linux/string.h> |
27 | #include <linux/crypto.h> | |
28 | #include <linux/highmem.h> | |
29 | #include <linux/moduleparam.h> | |
ebfd9bcf | 30 | #include <linux/jiffies.h> |
6a17944c HX |
31 | #include <linux/timex.h> |
32 | #include <linux/interrupt.h> | |
1da177e4 LT |
33 | #include "tcrypt.h" |
34 | ||
35 | /* | |
36 | * Need to kmalloc() memory for testing kmap(). | |
37 | */ | |
ebfd9bcf | 38 | #define TVMEMSIZE 16384 |
1da177e4 LT |
39 | #define XBUFSIZE 32768 |
40 | ||
41 | /* | |
42 | * Indexes into the xbuf to simulate cross-page access. | |
43 | */ | |
44 | #define IDX1 37 | |
45 | #define IDX2 32400 | |
46 | #define IDX3 1 | |
47 | #define IDX4 8193 | |
48 | #define IDX5 22222 | |
49 | #define IDX6 17101 | |
50 | #define IDX7 27333 | |
51 | #define IDX8 3000 | |
52 | ||
53 | /* | |
54 | * Used by test_cipher() | |
55 | */ | |
56 | #define ENCRYPT 1 | |
57 | #define DECRYPT 0 | |
1da177e4 LT |
58 | |
59 | static unsigned int IDX[8] = { IDX1, IDX2, IDX3, IDX4, IDX5, IDX6, IDX7, IDX8 }; | |
60 | ||
ebfd9bcf HW |
61 | /* |
62 | * Used by test_cipher_speed() | |
63 | */ | |
6a17944c | 64 | static unsigned int sec; |
ebfd9bcf | 65 | |
1da177e4 LT |
66 | static int mode; |
67 | static char *xbuf; | |
68 | static char *tvmem; | |
69 | ||
70 | static char *check[] = { | |
71 | "des", "md5", "des3_ede", "rot13", "sha1", "sha256", "blowfish", | |
ef2736fc HX |
72 | "twofish", "serpent", "sha384", "sha512", "md4", "aes", "cast6", |
73 | "arc4", "michael_mic", "deflate", "crc32c", "tea", "xtea", | |
fb4f10ed | 74 | "khazad", "wp512", "wp384", "wp256", "tnepres", "xeta", NULL |
1da177e4 LT |
75 | }; |
76 | ||
ef2736fc | 77 | static void hexdump(unsigned char *buf, unsigned int len) |
1da177e4 LT |
78 | { |
79 | while (len--) | |
80 | printk("%02x", *buf++); | |
81 | ||
82 | printk("\n"); | |
83 | } | |
84 | ||
ef2736fc HX |
85 | static void test_hash(char *algo, struct hash_testvec *template, |
86 | unsigned int tcount) | |
1da177e4 | 87 | { |
ef2736fc HX |
88 | unsigned int i, j, k, temp; |
89 | struct scatterlist sg[8]; | |
90 | char result[64]; | |
e9d41164 HX |
91 | struct crypto_hash *tfm; |
92 | struct hash_desc desc; | |
ef2736fc HX |
93 | struct hash_testvec *hash_tv; |
94 | unsigned int tsize; | |
e9d41164 | 95 | int ret; |
ef2736fc HX |
96 | |
97 | printk("\ntesting %s\n", algo); | |
98 | ||
99 | tsize = sizeof(struct hash_testvec); | |
1da177e4 | 100 | tsize *= tcount; |
ef2736fc | 101 | |
1da177e4 LT |
102 | if (tsize > TVMEMSIZE) { |
103 | printk("template (%u) too big for tvmem (%u)\n", tsize, TVMEMSIZE); | |
104 | return; | |
105 | } | |
106 | ||
107 | memcpy(tvmem, template, tsize); | |
ef2736fc | 108 | hash_tv = (void *)tvmem; |
e9d41164 HX |
109 | |
110 | tfm = crypto_alloc_hash(algo, 0, CRYPTO_ALG_ASYNC); | |
111 | if (IS_ERR(tfm)) { | |
112 | printk("failed to load transform for %s: %ld\n", algo, | |
113 | PTR_ERR(tfm)); | |
1da177e4 LT |
114 | return; |
115 | } | |
116 | ||
e9d41164 HX |
117 | desc.tfm = tfm; |
118 | desc.flags = 0; | |
119 | ||
1da177e4 | 120 | for (i = 0; i < tcount; i++) { |
ef2736fc HX |
121 | printk("test %u:\n", i + 1); |
122 | memset(result, 0, 64); | |
1da177e4 | 123 | |
378f058c | 124 | sg_set_buf(&sg[0], hash_tv[i].plaintext, hash_tv[i].psize); |
1da177e4 | 125 | |
e9d41164 HX |
126 | if (hash_tv[i].ksize) { |
127 | ret = crypto_hash_setkey(tfm, hash_tv[i].key, | |
128 | hash_tv[i].ksize); | |
129 | if (ret) { | |
130 | printk("setkey() failed ret=%d\n", ret); | |
131 | goto out; | |
132 | } | |
133 | } | |
134 | ||
135 | ret = crypto_hash_digest(&desc, sg, hash_tv[i].psize, result); | |
136 | if (ret) { | |
137 | printk("digest () failed ret=%d\n", ret); | |
138 | goto out; | |
139 | } | |
1da177e4 | 140 | |
e9d41164 | 141 | hexdump(result, crypto_hash_digestsize(tfm)); |
1da177e4 | 142 | printk("%s\n", |
ef2736fc | 143 | memcmp(result, hash_tv[i].digest, |
e9d41164 | 144 | crypto_hash_digestsize(tfm)) ? |
ef2736fc | 145 | "fail" : "pass"); |
1da177e4 LT |
146 | } |
147 | ||
ef2736fc | 148 | printk("testing %s across pages\n", algo); |
1da177e4 LT |
149 | |
150 | /* setup the dummy buffer first */ | |
ef2736fc | 151 | memset(xbuf, 0, XBUFSIZE); |
1da177e4 LT |
152 | |
153 | j = 0; | |
154 | for (i = 0; i < tcount; i++) { | |
155 | if (hash_tv[i].np) { | |
156 | j++; | |
ef2736fc HX |
157 | printk("test %u:\n", j); |
158 | memset(result, 0, 64); | |
1da177e4 LT |
159 | |
160 | temp = 0; | |
161 | for (k = 0; k < hash_tv[i].np; k++) { | |
ef2736fc HX |
162 | memcpy(&xbuf[IDX[k]], |
163 | hash_tv[i].plaintext + temp, | |
164 | hash_tv[i].tap[k]); | |
1da177e4 | 165 | temp += hash_tv[i].tap[k]; |
378f058c DH |
166 | sg_set_buf(&sg[k], &xbuf[IDX[k]], |
167 | hash_tv[i].tap[k]); | |
1da177e4 LT |
168 | } |
169 | ||
e9d41164 HX |
170 | if (hash_tv[i].ksize) { |
171 | ret = crypto_hash_setkey(tfm, hash_tv[i].key, | |
172 | hash_tv[i].ksize); | |
ef2736fc | 173 | |
e9d41164 HX |
174 | if (ret) { |
175 | printk("setkey() failed ret=%d\n", ret); | |
176 | goto out; | |
177 | } | |
1da177e4 LT |
178 | } |
179 | ||
e9d41164 HX |
180 | ret = crypto_hash_digest(&desc, sg, hash_tv[i].psize, |
181 | result); | |
182 | if (ret) { | |
183 | printk("digest () failed ret=%d\n", ret); | |
184 | goto out; | |
185 | } | |
ef2736fc | 186 | |
e9d41164 | 187 | hexdump(result, crypto_hash_digestsize(tfm)); |
1da177e4 | 188 | printk("%s\n", |
e9d41164 HX |
189 | memcmp(result, hash_tv[i].digest, |
190 | crypto_hash_digestsize(tfm)) ? | |
ef2736fc | 191 | "fail" : "pass"); |
1da177e4 LT |
192 | } |
193 | } | |
e9d41164 | 194 | |
1da177e4 | 195 | out: |
e9d41164 | 196 | crypto_free_hash(tfm); |
1da177e4 LT |
197 | } |
198 | ||
cba83564 | 199 | static void test_cipher(char *algo, int enc, |
ef2736fc | 200 | struct cipher_testvec *template, unsigned int tcount) |
1da177e4 LT |
201 | { |
202 | unsigned int ret, i, j, k, temp; | |
203 | unsigned int tsize; | |
cba83564 HX |
204 | unsigned int iv_len; |
205 | unsigned int len; | |
378f058c | 206 | char *q; |
cba83564 | 207 | struct crypto_blkcipher *tfm; |
1da177e4 LT |
208 | char *key; |
209 | struct cipher_testvec *cipher_tv; | |
cba83564 | 210 | struct blkcipher_desc desc; |
1da177e4 | 211 | struct scatterlist sg[8]; |
cba83564 | 212 | const char *e; |
1da177e4 LT |
213 | |
214 | if (enc == ENCRYPT) | |
3cc3816f | 215 | e = "encryption"; |
1da177e4 | 216 | else |
3cc3816f | 217 | e = "decryption"; |
1da177e4 | 218 | |
cba83564 | 219 | printk("\ntesting %s %s\n", algo, e); |
1da177e4 | 220 | |
ef2736fc | 221 | tsize = sizeof (struct cipher_testvec); |
1da177e4 | 222 | tsize *= tcount; |
ef2736fc | 223 | |
1da177e4 LT |
224 | if (tsize > TVMEMSIZE) { |
225 | printk("template (%u) too big for tvmem (%u)\n", tsize, | |
226 | TVMEMSIZE); | |
227 | return; | |
228 | } | |
229 | ||
230 | memcpy(tvmem, template, tsize); | |
ef2736fc HX |
231 | cipher_tv = (void *)tvmem; |
232 | ||
cba83564 | 233 | tfm = crypto_alloc_blkcipher(algo, 0, CRYPTO_ALG_ASYNC); |
1da177e4 | 234 | |
cba83564 HX |
235 | if (IS_ERR(tfm)) { |
236 | printk("failed to load transform for %s: %ld\n", algo, | |
237 | PTR_ERR(tfm)); | |
1da177e4 LT |
238 | return; |
239 | } | |
cba83564 HX |
240 | desc.tfm = tfm; |
241 | desc.flags = 0; | |
ef2736fc | 242 | |
1da177e4 LT |
243 | j = 0; |
244 | for (i = 0; i < tcount; i++) { | |
245 | if (!(cipher_tv[i].np)) { | |
ef2736fc | 246 | j++; |
1da177e4 LT |
247 | printk("test %u (%d bit key):\n", |
248 | j, cipher_tv[i].klen * 8); | |
249 | ||
cba83564 | 250 | crypto_blkcipher_clear_flags(tfm, ~0); |
ef2736fc | 251 | if (cipher_tv[i].wk) |
cba83564 HX |
252 | crypto_blkcipher_set_flags( |
253 | tfm, CRYPTO_TFM_REQ_WEAK_KEY); | |
1da177e4 | 254 | key = cipher_tv[i].key; |
ef2736fc | 255 | |
cba83564 HX |
256 | ret = crypto_blkcipher_setkey(tfm, key, |
257 | cipher_tv[i].klen); | |
1da177e4 | 258 | if (ret) { |
cba83564 HX |
259 | printk("setkey() failed flags=%x\n", |
260 | crypto_blkcipher_get_flags(tfm)); | |
ef2736fc | 261 | |
1da177e4 LT |
262 | if (!cipher_tv[i].fail) |
263 | goto out; | |
ef2736fc | 264 | } |
1da177e4 | 265 | |
378f058c DH |
266 | sg_set_buf(&sg[0], cipher_tv[i].input, |
267 | cipher_tv[i].ilen); | |
ef2736fc | 268 | |
cba83564 HX |
269 | iv_len = crypto_blkcipher_ivsize(tfm); |
270 | if (iv_len) | |
271 | crypto_blkcipher_set_iv(tfm, cipher_tv[i].iv, | |
272 | iv_len); | |
ef2736fc | 273 | |
cba83564 HX |
274 | len = cipher_tv[i].ilen; |
275 | ret = enc ? | |
276 | crypto_blkcipher_encrypt(&desc, sg, sg, len) : | |
277 | crypto_blkcipher_decrypt(&desc, sg, sg, len); | |
ef2736fc | 278 | |
1da177e4 | 279 | if (ret) { |
cba83564 HX |
280 | printk("%s () failed flags=%x\n", e, |
281 | desc.flags); | |
1da177e4 | 282 | goto out; |
ef2736fc HX |
283 | } |
284 | ||
1da177e4 LT |
285 | q = kmap(sg[0].page) + sg[0].offset; |
286 | hexdump(q, cipher_tv[i].rlen); | |
ef2736fc HX |
287 | |
288 | printk("%s\n", | |
289 | memcmp(q, cipher_tv[i].result, | |
290 | cipher_tv[i].rlen) ? "fail" : "pass"); | |
1da177e4 LT |
291 | } |
292 | } | |
ef2736fc | 293 | |
cba83564 | 294 | printk("\ntesting %s %s across pages (chunking)\n", algo, e); |
1da177e4 | 295 | memset(xbuf, 0, XBUFSIZE); |
ef2736fc | 296 | |
1da177e4 LT |
297 | j = 0; |
298 | for (i = 0; i < tcount; i++) { | |
299 | if (cipher_tv[i].np) { | |
ef2736fc | 300 | j++; |
1da177e4 LT |
301 | printk("test %u (%d bit key):\n", |
302 | j, cipher_tv[i].klen * 8); | |
303 | ||
cba83564 | 304 | crypto_blkcipher_clear_flags(tfm, ~0); |
ef2736fc | 305 | if (cipher_tv[i].wk) |
cba83564 HX |
306 | crypto_blkcipher_set_flags( |
307 | tfm, CRYPTO_TFM_REQ_WEAK_KEY); | |
1da177e4 | 308 | key = cipher_tv[i].key; |
ef2736fc | 309 | |
cba83564 HX |
310 | ret = crypto_blkcipher_setkey(tfm, key, |
311 | cipher_tv[i].klen); | |
1da177e4 | 312 | if (ret) { |
cba83564 HX |
313 | printk("setkey() failed flags=%x\n", |
314 | crypto_blkcipher_get_flags(tfm)); | |
ef2736fc | 315 | |
1da177e4 LT |
316 | if (!cipher_tv[i].fail) |
317 | goto out; | |
318 | } | |
319 | ||
320 | temp = 0; | |
321 | for (k = 0; k < cipher_tv[i].np; k++) { | |
ef2736fc HX |
322 | memcpy(&xbuf[IDX[k]], |
323 | cipher_tv[i].input + temp, | |
324 | cipher_tv[i].tap[k]); | |
1da177e4 | 325 | temp += cipher_tv[i].tap[k]; |
378f058c DH |
326 | sg_set_buf(&sg[k], &xbuf[IDX[k]], |
327 | cipher_tv[i].tap[k]); | |
1da177e4 | 328 | } |
ef2736fc | 329 | |
cba83564 HX |
330 | iv_len = crypto_blkcipher_ivsize(tfm); |
331 | if (iv_len) | |
332 | crypto_blkcipher_set_iv(tfm, cipher_tv[i].iv, | |
333 | iv_len); | |
ef2736fc | 334 | |
cba83564 HX |
335 | len = cipher_tv[i].ilen; |
336 | ret = enc ? | |
337 | crypto_blkcipher_encrypt(&desc, sg, sg, len) : | |
338 | crypto_blkcipher_decrypt(&desc, sg, sg, len); | |
ef2736fc | 339 | |
1da177e4 | 340 | if (ret) { |
cba83564 HX |
341 | printk("%s () failed flags=%x\n", e, |
342 | desc.flags); | |
1da177e4 LT |
343 | goto out; |
344 | } | |
345 | ||
346 | temp = 0; | |
347 | for (k = 0; k < cipher_tv[i].np; k++) { | |
348 | printk("page %u\n", k); | |
349 | q = kmap(sg[k].page) + sg[k].offset; | |
350 | hexdump(q, cipher_tv[i].tap[k]); | |
ef2736fc HX |
351 | printk("%s\n", |
352 | memcmp(q, cipher_tv[i].result + temp, | |
353 | cipher_tv[i].tap[k]) ? "fail" : | |
1da177e4 LT |
354 | "pass"); |
355 | temp += cipher_tv[i].tap[k]; | |
356 | } | |
357 | } | |
358 | } | |
359 | ||
360 | out: | |
cba83564 | 361 | crypto_free_blkcipher(tfm); |
1da177e4 LT |
362 | } |
363 | ||
cba83564 | 364 | static int test_cipher_jiffies(struct blkcipher_desc *desc, int enc, char *p, |
6a17944c HX |
365 | int blen, int sec) |
366 | { | |
6df5b9f4 | 367 | struct scatterlist sg[1]; |
6a17944c HX |
368 | unsigned long start, end; |
369 | int bcount; | |
370 | int ret; | |
371 | ||
6df5b9f4 | 372 | sg_set_buf(sg, p, blen); |
6a17944c HX |
373 | |
374 | for (start = jiffies, end = start + sec * HZ, bcount = 0; | |
375 | time_before(jiffies, end); bcount++) { | |
376 | if (enc) | |
cba83564 | 377 | ret = crypto_blkcipher_encrypt(desc, sg, sg, blen); |
6a17944c | 378 | else |
cba83564 | 379 | ret = crypto_blkcipher_decrypt(desc, sg, sg, blen); |
6a17944c HX |
380 | |
381 | if (ret) | |
382 | return ret; | |
383 | } | |
384 | ||
385 | printk("%d operations in %d seconds (%ld bytes)\n", | |
386 | bcount, sec, (long)bcount * blen); | |
387 | return 0; | |
388 | } | |
389 | ||
cba83564 | 390 | static int test_cipher_cycles(struct blkcipher_desc *desc, int enc, char *p, |
6a17944c HX |
391 | int blen) |
392 | { | |
6df5b9f4 | 393 | struct scatterlist sg[1]; |
6a17944c HX |
394 | unsigned long cycles = 0; |
395 | int ret = 0; | |
396 | int i; | |
397 | ||
6df5b9f4 | 398 | sg_set_buf(sg, p, blen); |
6a17944c HX |
399 | |
400 | local_bh_disable(); | |
401 | local_irq_disable(); | |
402 | ||
403 | /* Warm-up run. */ | |
404 | for (i = 0; i < 4; i++) { | |
405 | if (enc) | |
cba83564 | 406 | ret = crypto_blkcipher_encrypt(desc, sg, sg, blen); |
6a17944c | 407 | else |
cba83564 | 408 | ret = crypto_blkcipher_decrypt(desc, sg, sg, blen); |
6a17944c HX |
409 | |
410 | if (ret) | |
411 | goto out; | |
412 | } | |
413 | ||
414 | /* The real thing. */ | |
415 | for (i = 0; i < 8; i++) { | |
416 | cycles_t start, end; | |
417 | ||
418 | start = get_cycles(); | |
419 | if (enc) | |
cba83564 | 420 | ret = crypto_blkcipher_encrypt(desc, sg, sg, blen); |
6a17944c | 421 | else |
cba83564 | 422 | ret = crypto_blkcipher_decrypt(desc, sg, sg, blen); |
6a17944c HX |
423 | end = get_cycles(); |
424 | ||
425 | if (ret) | |
426 | goto out; | |
427 | ||
428 | cycles += end - start; | |
429 | } | |
430 | ||
431 | out: | |
432 | local_irq_enable(); | |
433 | local_bh_enable(); | |
434 | ||
435 | if (ret == 0) | |
436 | printk("1 operation in %lu cycles (%d bytes)\n", | |
437 | (cycles + 4) / 8, blen); | |
438 | ||
439 | return ret; | |
440 | } | |
441 | ||
cba83564 | 442 | static void test_cipher_speed(char *algo, int enc, unsigned int sec, |
dce907c0 HX |
443 | struct cipher_testvec *template, |
444 | unsigned int tcount, struct cipher_speed *speed) | |
ebfd9bcf | 445 | { |
dce907c0 | 446 | unsigned int ret, i, j, iv_len; |
ebfd9bcf | 447 | unsigned char *key, *p, iv[128]; |
cba83564 HX |
448 | struct crypto_blkcipher *tfm; |
449 | struct blkcipher_desc desc; | |
450 | const char *e; | |
ebfd9bcf HW |
451 | |
452 | if (enc == ENCRYPT) | |
453 | e = "encryption"; | |
454 | else | |
455 | e = "decryption"; | |
ebfd9bcf | 456 | |
cba83564 | 457 | printk("\ntesting speed of %s %s\n", algo, e); |
ebfd9bcf | 458 | |
cba83564 | 459 | tfm = crypto_alloc_blkcipher(algo, 0, CRYPTO_ALG_ASYNC); |
ebfd9bcf | 460 | |
cba83564 HX |
461 | if (IS_ERR(tfm)) { |
462 | printk("failed to load transform for %s: %ld\n", algo, | |
463 | PTR_ERR(tfm)); | |
ebfd9bcf HW |
464 | return; |
465 | } | |
cba83564 HX |
466 | desc.tfm = tfm; |
467 | desc.flags = 0; | |
ebfd9bcf HW |
468 | |
469 | for (i = 0; speed[i].klen != 0; i++) { | |
470 | if ((speed[i].blen + speed[i].klen) > TVMEMSIZE) { | |
471 | printk("template (%u) too big for tvmem (%u)\n", | |
472 | speed[i].blen + speed[i].klen, TVMEMSIZE); | |
473 | goto out; | |
474 | } | |
475 | ||
476 | printk("test %u (%d bit key, %d byte blocks): ", i, | |
477 | speed[i].klen * 8, speed[i].blen); | |
478 | ||
479 | memset(tvmem, 0xff, speed[i].klen + speed[i].blen); | |
480 | ||
481 | /* set key, plain text and IV */ | |
482 | key = (unsigned char *)tvmem; | |
dce907c0 HX |
483 | for (j = 0; j < tcount; j++) { |
484 | if (template[j].klen == speed[i].klen) { | |
485 | key = template[j].key; | |
486 | break; | |
487 | } | |
488 | } | |
ebfd9bcf HW |
489 | p = (unsigned char *)tvmem + speed[i].klen; |
490 | ||
cba83564 | 491 | ret = crypto_blkcipher_setkey(tfm, key, speed[i].klen); |
ebfd9bcf | 492 | if (ret) { |
cba83564 HX |
493 | printk("setkey() failed flags=%x\n", |
494 | crypto_blkcipher_get_flags(tfm)); | |
ebfd9bcf HW |
495 | goto out; |
496 | } | |
497 | ||
cba83564 HX |
498 | iv_len = crypto_blkcipher_ivsize(tfm); |
499 | if (iv_len) { | |
ebfd9bcf | 500 | memset(&iv, 0xff, iv_len); |
cba83564 | 501 | crypto_blkcipher_set_iv(tfm, iv, iv_len); |
ebfd9bcf HW |
502 | } |
503 | ||
6a17944c | 504 | if (sec) |
cba83564 | 505 | ret = test_cipher_jiffies(&desc, enc, p, speed[i].blen, |
6a17944c HX |
506 | sec); |
507 | else | |
cba83564 | 508 | ret = test_cipher_cycles(&desc, enc, p, speed[i].blen); |
ebfd9bcf | 509 | |
6a17944c | 510 | if (ret) { |
cba83564 | 511 | printk("%s() failed flags=%x\n", e, desc.flags); |
6a17944c | 512 | break; |
ebfd9bcf | 513 | } |
ebfd9bcf HW |
514 | } |
515 | ||
516 | out: | |
cba83564 | 517 | crypto_free_blkcipher(tfm); |
ebfd9bcf HW |
518 | } |
519 | ||
e9d41164 HX |
520 | static int test_hash_jiffies_digest(struct hash_desc *desc, char *p, int blen, |
521 | char *out, int sec) | |
522 | { | |
523 | struct scatterlist sg[1]; | |
524 | unsigned long start, end; | |
525 | int bcount; | |
526 | int ret; | |
527 | ||
528 | for (start = jiffies, end = start + sec * HZ, bcount = 0; | |
529 | time_before(jiffies, end); bcount++) { | |
530 | sg_set_buf(sg, p, blen); | |
531 | ret = crypto_hash_digest(desc, sg, blen, out); | |
532 | if (ret) | |
533 | return ret; | |
534 | } | |
535 | ||
536 | printk("%6u opers/sec, %9lu bytes/sec\n", | |
537 | bcount / sec, ((long)bcount * blen) / sec); | |
538 | ||
539 | return 0; | |
540 | } | |
541 | ||
542 | static int test_hash_jiffies(struct hash_desc *desc, char *p, int blen, | |
543 | int plen, char *out, int sec) | |
e8057928 ML |
544 | { |
545 | struct scatterlist sg[1]; | |
546 | unsigned long start, end; | |
547 | int bcount, pcount; | |
e9d41164 HX |
548 | int ret; |
549 | ||
550 | if (plen == blen) | |
551 | return test_hash_jiffies_digest(desc, p, blen, out, sec); | |
e8057928 ML |
552 | |
553 | for (start = jiffies, end = start + sec * HZ, bcount = 0; | |
554 | time_before(jiffies, end); bcount++) { | |
e9d41164 HX |
555 | ret = crypto_hash_init(desc); |
556 | if (ret) | |
557 | return ret; | |
e8057928 ML |
558 | for (pcount = 0; pcount < blen; pcount += plen) { |
559 | sg_set_buf(sg, p + pcount, plen); | |
e9d41164 HX |
560 | ret = crypto_hash_update(desc, sg, plen); |
561 | if (ret) | |
562 | return ret; | |
e8057928 ML |
563 | } |
564 | /* we assume there is enough space in 'out' for the result */ | |
e9d41164 HX |
565 | ret = crypto_hash_final(desc, out); |
566 | if (ret) | |
567 | return ret; | |
e8057928 ML |
568 | } |
569 | ||
570 | printk("%6u opers/sec, %9lu bytes/sec\n", | |
571 | bcount / sec, ((long)bcount * blen) / sec); | |
572 | ||
e9d41164 HX |
573 | return 0; |
574 | } | |
575 | ||
576 | static int test_hash_cycles_digest(struct hash_desc *desc, char *p, int blen, | |
577 | char *out) | |
578 | { | |
579 | struct scatterlist sg[1]; | |
580 | unsigned long cycles = 0; | |
581 | int i; | |
582 | int ret; | |
583 | ||
584 | local_bh_disable(); | |
585 | local_irq_disable(); | |
586 | ||
587 | /* Warm-up run. */ | |
588 | for (i = 0; i < 4; i++) { | |
589 | sg_set_buf(sg, p, blen); | |
590 | ret = crypto_hash_digest(desc, sg, blen, out); | |
591 | if (ret) | |
592 | goto out; | |
593 | } | |
594 | ||
595 | /* The real thing. */ | |
596 | for (i = 0; i < 8; i++) { | |
597 | cycles_t start, end; | |
598 | ||
599 | start = get_cycles(); | |
600 | ||
601 | sg_set_buf(sg, p, blen); | |
602 | ret = crypto_hash_digest(desc, sg, blen, out); | |
603 | if (ret) | |
604 | goto out; | |
605 | ||
606 | end = get_cycles(); | |
607 | ||
608 | cycles += end - start; | |
609 | } | |
610 | ||
611 | out: | |
612 | local_irq_enable(); | |
613 | local_bh_enable(); | |
614 | ||
615 | if (ret) | |
616 | return ret; | |
617 | ||
618 | printk("%6lu cycles/operation, %4lu cycles/byte\n", | |
619 | cycles / 8, cycles / (8 * blen)); | |
620 | ||
621 | return 0; | |
e8057928 ML |
622 | } |
623 | ||
e9d41164 HX |
624 | static int test_hash_cycles(struct hash_desc *desc, char *p, int blen, |
625 | int plen, char *out) | |
e8057928 ML |
626 | { |
627 | struct scatterlist sg[1]; | |
628 | unsigned long cycles = 0; | |
629 | int i, pcount; | |
e9d41164 HX |
630 | int ret; |
631 | ||
632 | if (plen == blen) | |
633 | return test_hash_cycles_digest(desc, p, blen, out); | |
e8057928 ML |
634 | |
635 | local_bh_disable(); | |
636 | local_irq_disable(); | |
637 | ||
638 | /* Warm-up run. */ | |
639 | for (i = 0; i < 4; i++) { | |
e9d41164 HX |
640 | ret = crypto_hash_init(desc); |
641 | if (ret) | |
642 | goto out; | |
e8057928 ML |
643 | for (pcount = 0; pcount < blen; pcount += plen) { |
644 | sg_set_buf(sg, p + pcount, plen); | |
e9d41164 HX |
645 | ret = crypto_hash_update(desc, sg, plen); |
646 | if (ret) | |
647 | goto out; | |
e8057928 | 648 | } |
e9d41164 HX |
649 | crypto_hash_final(desc, out); |
650 | if (ret) | |
651 | goto out; | |
e8057928 ML |
652 | } |
653 | ||
654 | /* The real thing. */ | |
655 | for (i = 0; i < 8; i++) { | |
656 | cycles_t start, end; | |
657 | ||
e8057928 ML |
658 | start = get_cycles(); |
659 | ||
e9d41164 HX |
660 | ret = crypto_hash_init(desc); |
661 | if (ret) | |
662 | goto out; | |
e8057928 ML |
663 | for (pcount = 0; pcount < blen; pcount += plen) { |
664 | sg_set_buf(sg, p + pcount, plen); | |
e9d41164 HX |
665 | ret = crypto_hash_update(desc, sg, plen); |
666 | if (ret) | |
667 | goto out; | |
e8057928 | 668 | } |
e9d41164 HX |
669 | ret = crypto_hash_final(desc, out); |
670 | if (ret) | |
671 | goto out; | |
e8057928 ML |
672 | |
673 | end = get_cycles(); | |
674 | ||
675 | cycles += end - start; | |
676 | } | |
677 | ||
e9d41164 | 678 | out: |
e8057928 ML |
679 | local_irq_enable(); |
680 | local_bh_enable(); | |
681 | ||
e9d41164 HX |
682 | if (ret) |
683 | return ret; | |
684 | ||
e8057928 ML |
685 | printk("%6lu cycles/operation, %4lu cycles/byte\n", |
686 | cycles / 8, cycles / (8 * blen)); | |
687 | ||
e9d41164 | 688 | return 0; |
e8057928 ML |
689 | } |
690 | ||
e9d41164 HX |
691 | static void test_hash_speed(char *algo, unsigned int sec, |
692 | struct hash_speed *speed) | |
e8057928 | 693 | { |
e9d41164 HX |
694 | struct crypto_hash *tfm; |
695 | struct hash_desc desc; | |
e8057928 ML |
696 | char output[1024]; |
697 | int i; | |
e9d41164 | 698 | int ret; |
e8057928 ML |
699 | |
700 | printk("\ntesting speed of %s\n", algo); | |
701 | ||
e9d41164 | 702 | tfm = crypto_alloc_hash(algo, 0, CRYPTO_ALG_ASYNC); |
e8057928 | 703 | |
e9d41164 HX |
704 | if (IS_ERR(tfm)) { |
705 | printk("failed to load transform for %s: %ld\n", algo, | |
706 | PTR_ERR(tfm)); | |
e8057928 ML |
707 | return; |
708 | } | |
709 | ||
e9d41164 HX |
710 | desc.tfm = tfm; |
711 | desc.flags = 0; | |
712 | ||
713 | if (crypto_hash_digestsize(tfm) > sizeof(output)) { | |
e8057928 | 714 | printk("digestsize(%u) > outputbuffer(%zu)\n", |
e9d41164 | 715 | crypto_hash_digestsize(tfm), sizeof(output)); |
e8057928 ML |
716 | goto out; |
717 | } | |
718 | ||
719 | for (i = 0; speed[i].blen != 0; i++) { | |
720 | if (speed[i].blen > TVMEMSIZE) { | |
721 | printk("template (%u) too big for tvmem (%u)\n", | |
722 | speed[i].blen, TVMEMSIZE); | |
723 | goto out; | |
724 | } | |
725 | ||
726 | printk("test%3u (%5u byte blocks,%5u bytes per update,%4u updates): ", | |
727 | i, speed[i].blen, speed[i].plen, speed[i].blen / speed[i].plen); | |
728 | ||
729 | memset(tvmem, 0xff, speed[i].blen); | |
730 | ||
731 | if (sec) | |
e9d41164 HX |
732 | ret = test_hash_jiffies(&desc, tvmem, speed[i].blen, |
733 | speed[i].plen, output, sec); | |
e8057928 | 734 | else |
e9d41164 HX |
735 | ret = test_hash_cycles(&desc, tvmem, speed[i].blen, |
736 | speed[i].plen, output); | |
737 | ||
738 | if (ret) { | |
739 | printk("hashing failed ret=%d\n", ret); | |
740 | break; | |
741 | } | |
e8057928 ML |
742 | } |
743 | ||
744 | out: | |
e9d41164 | 745 | crypto_free_hash(tfm); |
e8057928 ML |
746 | } |
747 | ||
ef2736fc | 748 | static void test_deflate(void) |
1da177e4 LT |
749 | { |
750 | unsigned int i; | |
751 | char result[COMP_BUF_SIZE]; | |
e4d5b79c | 752 | struct crypto_comp *tfm; |
1da177e4 LT |
753 | struct comp_testvec *tv; |
754 | unsigned int tsize; | |
755 | ||
756 | printk("\ntesting deflate compression\n"); | |
757 | ||
758 | tsize = sizeof (deflate_comp_tv_template); | |
759 | if (tsize > TVMEMSIZE) { | |
760 | printk("template (%u) too big for tvmem (%u)\n", tsize, | |
761 | TVMEMSIZE); | |
762 | return; | |
763 | } | |
764 | ||
765 | memcpy(tvmem, deflate_comp_tv_template, tsize); | |
ef2736fc | 766 | tv = (void *)tvmem; |
1da177e4 LT |
767 | |
768 | tfm = crypto_alloc_tfm("deflate", 0); | |
769 | if (tfm == NULL) { | |
770 | printk("failed to load transform for deflate\n"); | |
771 | return; | |
772 | } | |
773 | ||
774 | for (i = 0; i < DEFLATE_COMP_TEST_VECTORS; i++) { | |
775 | int ilen, ret, dlen = COMP_BUF_SIZE; | |
ef2736fc | 776 | |
1da177e4 LT |
777 | printk("test %u:\n", i + 1); |
778 | memset(result, 0, sizeof (result)); | |
779 | ||
780 | ilen = tv[i].inlen; | |
781 | ret = crypto_comp_compress(tfm, tv[i].input, | |
782 | ilen, result, &dlen); | |
783 | if (ret) { | |
784 | printk("fail: ret=%d\n", ret); | |
785 | continue; | |
786 | } | |
787 | hexdump(result, dlen); | |
788 | printk("%s (ratio %d:%d)\n", | |
789 | memcmp(result, tv[i].output, dlen) ? "fail" : "pass", | |
790 | ilen, dlen); | |
791 | } | |
792 | ||
793 | printk("\ntesting deflate decompression\n"); | |
794 | ||
795 | tsize = sizeof (deflate_decomp_tv_template); | |
796 | if (tsize > TVMEMSIZE) { | |
797 | printk("template (%u) too big for tvmem (%u)\n", tsize, | |
798 | TVMEMSIZE); | |
799 | goto out; | |
800 | } | |
801 | ||
802 | memcpy(tvmem, deflate_decomp_tv_template, tsize); | |
ef2736fc | 803 | tv = (void *)tvmem; |
1da177e4 LT |
804 | |
805 | for (i = 0; i < DEFLATE_DECOMP_TEST_VECTORS; i++) { | |
806 | int ilen, ret, dlen = COMP_BUF_SIZE; | |
ef2736fc | 807 | |
1da177e4 LT |
808 | printk("test %u:\n", i + 1); |
809 | memset(result, 0, sizeof (result)); | |
810 | ||
811 | ilen = tv[i].inlen; | |
812 | ret = crypto_comp_decompress(tfm, tv[i].input, | |
813 | ilen, result, &dlen); | |
814 | if (ret) { | |
815 | printk("fail: ret=%d\n", ret); | |
816 | continue; | |
817 | } | |
818 | hexdump(result, dlen); | |
819 | printk("%s (ratio %d:%d)\n", | |
820 | memcmp(result, tv[i].output, dlen) ? "fail" : "pass", | |
821 | ilen, dlen); | |
822 | } | |
823 | out: | |
e4d5b79c | 824 | crypto_free_comp(tfm); |
1da177e4 LT |
825 | } |
826 | ||
ef2736fc | 827 | static void test_available(void) |
1da177e4 LT |
828 | { |
829 | char **name = check; | |
ef2736fc | 830 | |
1da177e4 LT |
831 | while (*name) { |
832 | printk("alg %s ", *name); | |
e4d5b79c HX |
833 | printk(crypto_has_alg(*name, 0, CRYPTO_ALG_ASYNC) ? |
834 | "found\n" : "not found\n"); | |
1da177e4 | 835 | name++; |
ef2736fc | 836 | } |
1da177e4 LT |
837 | } |
838 | ||
ef2736fc | 839 | static void do_test(void) |
1da177e4 LT |
840 | { |
841 | switch (mode) { | |
842 | ||
843 | case 0: | |
844 | test_hash("md5", md5_tv_template, MD5_TEST_VECTORS); | |
ef2736fc | 845 | |
1da177e4 | 846 | test_hash("sha1", sha1_tv_template, SHA1_TEST_VECTORS); |
ef2736fc | 847 | |
1da177e4 | 848 | //DES |
cba83564 HX |
849 | test_cipher("ecb(des)", ENCRYPT, des_enc_tv_template, |
850 | DES_ENC_TEST_VECTORS); | |
851 | test_cipher("ecb(des)", DECRYPT, des_dec_tv_template, | |
852 | DES_DEC_TEST_VECTORS); | |
853 | test_cipher("cbc(des)", ENCRYPT, des_cbc_enc_tv_template, | |
854 | DES_CBC_ENC_TEST_VECTORS); | |
855 | test_cipher("cbc(des)", DECRYPT, des_cbc_dec_tv_template, | |
856 | DES_CBC_DEC_TEST_VECTORS); | |
ef2736fc | 857 | |
1da177e4 | 858 | //DES3_EDE |
cba83564 HX |
859 | test_cipher("ecb(des3_ede)", ENCRYPT, des3_ede_enc_tv_template, |
860 | DES3_EDE_ENC_TEST_VECTORS); | |
861 | test_cipher("ecb(des3_ede)", DECRYPT, des3_ede_dec_tv_template, | |
862 | DES3_EDE_DEC_TEST_VECTORS); | |
ef2736fc | 863 | |
1da177e4 | 864 | test_hash("md4", md4_tv_template, MD4_TEST_VECTORS); |
ef2736fc | 865 | |
1da177e4 | 866 | test_hash("sha256", sha256_tv_template, SHA256_TEST_VECTORS); |
ef2736fc | 867 | |
1da177e4 | 868 | //BLOWFISH |
cba83564 HX |
869 | test_cipher("ecb(blowfish)", ENCRYPT, bf_enc_tv_template, |
870 | BF_ENC_TEST_VECTORS); | |
871 | test_cipher("ecb(blowfish)", DECRYPT, bf_dec_tv_template, | |
872 | BF_DEC_TEST_VECTORS); | |
873 | test_cipher("cbc(blowfish)", ENCRYPT, bf_cbc_enc_tv_template, | |
874 | BF_CBC_ENC_TEST_VECTORS); | |
875 | test_cipher("cbc(blowfish)", DECRYPT, bf_cbc_dec_tv_template, | |
876 | BF_CBC_DEC_TEST_VECTORS); | |
ef2736fc | 877 | |
1da177e4 | 878 | //TWOFISH |
cba83564 HX |
879 | test_cipher("ecb(twofish)", ENCRYPT, tf_enc_tv_template, |
880 | TF_ENC_TEST_VECTORS); | |
881 | test_cipher("ecb(twofish)", DECRYPT, tf_dec_tv_template, | |
882 | TF_DEC_TEST_VECTORS); | |
883 | test_cipher("cbc(twofish)", ENCRYPT, tf_cbc_enc_tv_template, | |
884 | TF_CBC_ENC_TEST_VECTORS); | |
885 | test_cipher("cbc(twofish)", DECRYPT, tf_cbc_dec_tv_template, | |
886 | TF_CBC_DEC_TEST_VECTORS); | |
ef2736fc | 887 | |
1da177e4 | 888 | //SERPENT |
cba83564 HX |
889 | test_cipher("ecb(serpent)", ENCRYPT, serpent_enc_tv_template, |
890 | SERPENT_ENC_TEST_VECTORS); | |
891 | test_cipher("ecb(serpent)", DECRYPT, serpent_dec_tv_template, | |
892 | SERPENT_DEC_TEST_VECTORS); | |
ef2736fc | 893 | |
1da177e4 | 894 | //TNEPRES |
cba83564 HX |
895 | test_cipher("ecb(tnepres)", ENCRYPT, tnepres_enc_tv_template, |
896 | TNEPRES_ENC_TEST_VECTORS); | |
897 | test_cipher("ecb(tnepres)", DECRYPT, tnepres_dec_tv_template, | |
898 | TNEPRES_DEC_TEST_VECTORS); | |
1da177e4 LT |
899 | |
900 | //AES | |
cba83564 HX |
901 | test_cipher("ecb(aes)", ENCRYPT, aes_enc_tv_template, |
902 | AES_ENC_TEST_VECTORS); | |
903 | test_cipher("ecb(aes)", DECRYPT, aes_dec_tv_template, | |
904 | AES_DEC_TEST_VECTORS); | |
905 | test_cipher("cbc(aes)", ENCRYPT, aes_cbc_enc_tv_template, | |
906 | AES_CBC_ENC_TEST_VECTORS); | |
907 | test_cipher("cbc(aes)", DECRYPT, aes_cbc_dec_tv_template, | |
908 | AES_CBC_DEC_TEST_VECTORS); | |
1da177e4 LT |
909 | |
910 | //CAST5 | |
cba83564 HX |
911 | test_cipher("ecb(cast5)", ENCRYPT, cast5_enc_tv_template, |
912 | CAST5_ENC_TEST_VECTORS); | |
913 | test_cipher("ecb(cast5)", DECRYPT, cast5_dec_tv_template, | |
914 | CAST5_DEC_TEST_VECTORS); | |
ef2736fc | 915 | |
1da177e4 | 916 | //CAST6 |
cba83564 HX |
917 | test_cipher("ecb(cast6)", ENCRYPT, cast6_enc_tv_template, |
918 | CAST6_ENC_TEST_VECTORS); | |
919 | test_cipher("ecb(cast6)", DECRYPT, cast6_dec_tv_template, | |
920 | CAST6_DEC_TEST_VECTORS); | |
1da177e4 LT |
921 | |
922 | //ARC4 | |
cba83564 HX |
923 | test_cipher("ecb(arc4)", ENCRYPT, arc4_enc_tv_template, |
924 | ARC4_ENC_TEST_VECTORS); | |
925 | test_cipher("ecb(arc4)", DECRYPT, arc4_dec_tv_template, | |
926 | ARC4_DEC_TEST_VECTORS); | |
1da177e4 LT |
927 | |
928 | //TEA | |
cba83564 HX |
929 | test_cipher("ecb(tea)", ENCRYPT, tea_enc_tv_template, |
930 | TEA_ENC_TEST_VECTORS); | |
931 | test_cipher("ecb(tea)", DECRYPT, tea_dec_tv_template, | |
932 | TEA_DEC_TEST_VECTORS); | |
1da177e4 LT |
933 | |
934 | ||
935 | //XTEA | |
cba83564 HX |
936 | test_cipher("ecb(xtea)", ENCRYPT, xtea_enc_tv_template, |
937 | XTEA_ENC_TEST_VECTORS); | |
938 | test_cipher("ecb(xtea)", DECRYPT, xtea_dec_tv_template, | |
939 | XTEA_DEC_TEST_VECTORS); | |
1da177e4 LT |
940 | |
941 | //KHAZAD | |
cba83564 HX |
942 | test_cipher("ecb(khazad)", ENCRYPT, khazad_enc_tv_template, |
943 | KHAZAD_ENC_TEST_VECTORS); | |
944 | test_cipher("ecb(khazad)", DECRYPT, khazad_dec_tv_template, | |
945 | KHAZAD_DEC_TEST_VECTORS); | |
1da177e4 LT |
946 | |
947 | //ANUBIS | |
cba83564 HX |
948 | test_cipher("ecb(anubis)", ENCRYPT, anubis_enc_tv_template, |
949 | ANUBIS_ENC_TEST_VECTORS); | |
950 | test_cipher("ecb(anubis)", DECRYPT, anubis_dec_tv_template, | |
951 | ANUBIS_DEC_TEST_VECTORS); | |
952 | test_cipher("cbc(anubis)", ENCRYPT, anubis_cbc_enc_tv_template, | |
953 | ANUBIS_CBC_ENC_TEST_VECTORS); | |
954 | test_cipher("cbc(anubis)", DECRYPT, anubis_cbc_dec_tv_template, | |
955 | ANUBIS_CBC_ENC_TEST_VECTORS); | |
1da177e4 | 956 | |
fb4f10ed | 957 | //XETA |
cba83564 HX |
958 | test_cipher("ecb(xeta)", ENCRYPT, xeta_enc_tv_template, |
959 | XETA_ENC_TEST_VECTORS); | |
960 | test_cipher("ecb(xeta)", DECRYPT, xeta_dec_tv_template, | |
961 | XETA_DEC_TEST_VECTORS); | |
fb4f10ed | 962 | |
1da177e4 LT |
963 | test_hash("sha384", sha384_tv_template, SHA384_TEST_VECTORS); |
964 | test_hash("sha512", sha512_tv_template, SHA512_TEST_VECTORS); | |
965 | test_hash("wp512", wp512_tv_template, WP512_TEST_VECTORS); | |
966 | test_hash("wp384", wp384_tv_template, WP384_TEST_VECTORS); | |
967 | test_hash("wp256", wp256_tv_template, WP256_TEST_VECTORS); | |
968 | test_hash("tgr192", tgr192_tv_template, TGR192_TEST_VECTORS); | |
969 | test_hash("tgr160", tgr160_tv_template, TGR160_TEST_VECTORS); | |
970 | test_hash("tgr128", tgr128_tv_template, TGR128_TEST_VECTORS); | |
971 | test_deflate(); | |
c907ee76 | 972 | test_hash("crc32c", crc32c_tv_template, CRC32C_TEST_VECTORS); |
e9d41164 HX |
973 | test_hash("hmac(md5)", hmac_md5_tv_template, |
974 | HMAC_MD5_TEST_VECTORS); | |
975 | test_hash("hmac(sha1)", hmac_sha1_tv_template, | |
976 | HMAC_SHA1_TEST_VECTORS); | |
977 | test_hash("hmac(sha256)", hmac_sha256_tv_template, | |
978 | HMAC_SHA256_TEST_VECTORS); | |
1da177e4 LT |
979 | |
980 | test_hash("michael_mic", michael_mic_tv_template, MICHAEL_MIC_TEST_VECTORS); | |
981 | break; | |
982 | ||
983 | case 1: | |
984 | test_hash("md5", md5_tv_template, MD5_TEST_VECTORS); | |
985 | break; | |
986 | ||
987 | case 2: | |
988 | test_hash("sha1", sha1_tv_template, SHA1_TEST_VECTORS); | |
989 | break; | |
990 | ||
991 | case 3: | |
cba83564 HX |
992 | test_cipher("ecb(des)", ENCRYPT, des_enc_tv_template, |
993 | DES_ENC_TEST_VECTORS); | |
994 | test_cipher("ecb(des)", DECRYPT, des_dec_tv_template, | |
995 | DES_DEC_TEST_VECTORS); | |
996 | test_cipher("cbc(des)", ENCRYPT, des_cbc_enc_tv_template, | |
997 | DES_CBC_ENC_TEST_VECTORS); | |
998 | test_cipher("cbc(des)", DECRYPT, des_cbc_dec_tv_template, | |
999 | DES_CBC_DEC_TEST_VECTORS); | |
1da177e4 LT |
1000 | break; |
1001 | ||
1002 | case 4: | |
cba83564 HX |
1003 | test_cipher("ecb(des3_ede)", ENCRYPT, des3_ede_enc_tv_template, |
1004 | DES3_EDE_ENC_TEST_VECTORS); | |
1005 | test_cipher("ecb(des3_ede)", DECRYPT, des3_ede_dec_tv_template, | |
1006 | DES3_EDE_DEC_TEST_VECTORS); | |
1da177e4 LT |
1007 | break; |
1008 | ||
1009 | case 5: | |
1010 | test_hash("md4", md4_tv_template, MD4_TEST_VECTORS); | |
1011 | break; | |
ef2736fc | 1012 | |
1da177e4 LT |
1013 | case 6: |
1014 | test_hash("sha256", sha256_tv_template, SHA256_TEST_VECTORS); | |
1015 | break; | |
ef2736fc | 1016 | |
1da177e4 | 1017 | case 7: |
cba83564 HX |
1018 | test_cipher("ecb(blowfish)", ENCRYPT, bf_enc_tv_template, |
1019 | BF_ENC_TEST_VECTORS); | |
1020 | test_cipher("ecb(blowfish)", DECRYPT, bf_dec_tv_template, | |
1021 | BF_DEC_TEST_VECTORS); | |
1022 | test_cipher("cbc(blowfish)", ENCRYPT, bf_cbc_enc_tv_template, | |
1023 | BF_CBC_ENC_TEST_VECTORS); | |
1024 | test_cipher("cbc(blowfish)", DECRYPT, bf_cbc_dec_tv_template, | |
1025 | BF_CBC_DEC_TEST_VECTORS); | |
1da177e4 LT |
1026 | break; |
1027 | ||
1028 | case 8: | |
cba83564 HX |
1029 | test_cipher("ecb(twofish)", ENCRYPT, tf_enc_tv_template, |
1030 | TF_ENC_TEST_VECTORS); | |
1031 | test_cipher("ecb(twofish)", DECRYPT, tf_dec_tv_template, | |
1032 | TF_DEC_TEST_VECTORS); | |
1033 | test_cipher("cbc(twofish)", ENCRYPT, tf_cbc_enc_tv_template, | |
1034 | TF_CBC_ENC_TEST_VECTORS); | |
1035 | test_cipher("cbc(twofish)", DECRYPT, tf_cbc_dec_tv_template, | |
1036 | TF_CBC_DEC_TEST_VECTORS); | |
1da177e4 | 1037 | break; |
ef2736fc | 1038 | |
1da177e4 | 1039 | case 9: |
cba83564 HX |
1040 | test_cipher("ecb(serpent)", ENCRYPT, serpent_enc_tv_template, |
1041 | SERPENT_ENC_TEST_VECTORS); | |
1042 | test_cipher("ecb(serpent)", DECRYPT, serpent_dec_tv_template, | |
1043 | SERPENT_DEC_TEST_VECTORS); | |
1da177e4 LT |
1044 | break; |
1045 | ||
1046 | case 10: | |
cba83564 HX |
1047 | test_cipher("ecb(aes)", ENCRYPT, aes_enc_tv_template, |
1048 | AES_ENC_TEST_VECTORS); | |
1049 | test_cipher("ecb(aes)", DECRYPT, aes_dec_tv_template, | |
1050 | AES_DEC_TEST_VECTORS); | |
1051 | test_cipher("cbc(aes)", ENCRYPT, aes_cbc_enc_tv_template, | |
1052 | AES_CBC_ENC_TEST_VECTORS); | |
1053 | test_cipher("cbc(aes)", DECRYPT, aes_cbc_dec_tv_template, | |
1054 | AES_CBC_DEC_TEST_VECTORS); | |
1da177e4 LT |
1055 | break; |
1056 | ||
1057 | case 11: | |
1058 | test_hash("sha384", sha384_tv_template, SHA384_TEST_VECTORS); | |
1059 | break; | |
ef2736fc | 1060 | |
1da177e4 LT |
1061 | case 12: |
1062 | test_hash("sha512", sha512_tv_template, SHA512_TEST_VECTORS); | |
1063 | break; | |
1064 | ||
1065 | case 13: | |
1066 | test_deflate(); | |
1067 | break; | |
1068 | ||
1069 | case 14: | |
cba83564 HX |
1070 | test_cipher("ecb(cast5)", ENCRYPT, cast5_enc_tv_template, |
1071 | CAST5_ENC_TEST_VECTORS); | |
1072 | test_cipher("ecb(cast5)", DECRYPT, cast5_dec_tv_template, | |
1073 | CAST5_DEC_TEST_VECTORS); | |
1da177e4 LT |
1074 | break; |
1075 | ||
1076 | case 15: | |
cba83564 HX |
1077 | test_cipher("ecb(cast6)", ENCRYPT, cast6_enc_tv_template, |
1078 | CAST6_ENC_TEST_VECTORS); | |
1079 | test_cipher("ecb(cast6)", DECRYPT, cast6_dec_tv_template, | |
1080 | CAST6_DEC_TEST_VECTORS); | |
1da177e4 LT |
1081 | break; |
1082 | ||
1083 | case 16: | |
cba83564 HX |
1084 | test_cipher("ecb(arc4)", ENCRYPT, arc4_enc_tv_template, |
1085 | ARC4_ENC_TEST_VECTORS); | |
1086 | test_cipher("ecb(arc4)", DECRYPT, arc4_dec_tv_template, | |
1087 | ARC4_DEC_TEST_VECTORS); | |
1da177e4 LT |
1088 | break; |
1089 | ||
1090 | case 17: | |
1091 | test_hash("michael_mic", michael_mic_tv_template, MICHAEL_MIC_TEST_VECTORS); | |
1092 | break; | |
1093 | ||
1094 | case 18: | |
c907ee76 | 1095 | test_hash("crc32c", crc32c_tv_template, CRC32C_TEST_VECTORS); |
1da177e4 LT |
1096 | break; |
1097 | ||
1098 | case 19: | |
cba83564 HX |
1099 | test_cipher("ecb(tea)", ENCRYPT, tea_enc_tv_template, |
1100 | TEA_ENC_TEST_VECTORS); | |
1101 | test_cipher("ecb(tea)", DECRYPT, tea_dec_tv_template, | |
1102 | TEA_DEC_TEST_VECTORS); | |
1da177e4 LT |
1103 | break; |
1104 | ||
1105 | case 20: | |
cba83564 HX |
1106 | test_cipher("ecb(xtea)", ENCRYPT, xtea_enc_tv_template, |
1107 | XTEA_ENC_TEST_VECTORS); | |
1108 | test_cipher("ecb(xtea)", DECRYPT, xtea_dec_tv_template, | |
1109 | XTEA_DEC_TEST_VECTORS); | |
1da177e4 LT |
1110 | break; |
1111 | ||
1112 | case 21: | |
cba83564 HX |
1113 | test_cipher("ecb(khazad)", ENCRYPT, khazad_enc_tv_template, |
1114 | KHAZAD_ENC_TEST_VECTORS); | |
1115 | test_cipher("ecb(khazad)", DECRYPT, khazad_dec_tv_template, | |
1116 | KHAZAD_DEC_TEST_VECTORS); | |
1da177e4 LT |
1117 | break; |
1118 | ||
1119 | case 22: | |
1120 | test_hash("wp512", wp512_tv_template, WP512_TEST_VECTORS); | |
1121 | break; | |
1122 | ||
1123 | case 23: | |
1124 | test_hash("wp384", wp384_tv_template, WP384_TEST_VECTORS); | |
1125 | break; | |
1126 | ||
1127 | case 24: | |
1128 | test_hash("wp256", wp256_tv_template, WP256_TEST_VECTORS); | |
1129 | break; | |
1130 | ||
1131 | case 25: | |
cba83564 HX |
1132 | test_cipher("ecb(tnepres)", ENCRYPT, tnepres_enc_tv_template, |
1133 | TNEPRES_ENC_TEST_VECTORS); | |
1134 | test_cipher("ecb(tnepres)", DECRYPT, tnepres_dec_tv_template, | |
1135 | TNEPRES_DEC_TEST_VECTORS); | |
1da177e4 LT |
1136 | break; |
1137 | ||
1138 | case 26: | |
cba83564 HX |
1139 | test_cipher("ecb(anubis)", ENCRYPT, anubis_enc_tv_template, |
1140 | ANUBIS_ENC_TEST_VECTORS); | |
1141 | test_cipher("ecb(anubis)", DECRYPT, anubis_dec_tv_template, | |
1142 | ANUBIS_DEC_TEST_VECTORS); | |
1143 | test_cipher("cbc(anubis)", ENCRYPT, anubis_cbc_enc_tv_template, | |
1144 | ANUBIS_CBC_ENC_TEST_VECTORS); | |
1145 | test_cipher("cbc(anubis)", DECRYPT, anubis_cbc_dec_tv_template, | |
1146 | ANUBIS_CBC_ENC_TEST_VECTORS); | |
1da177e4 LT |
1147 | break; |
1148 | ||
1149 | case 27: | |
1150 | test_hash("tgr192", tgr192_tv_template, TGR192_TEST_VECTORS); | |
1151 | break; | |
1152 | ||
1153 | case 28: | |
1154 | ||
1155 | test_hash("tgr160", tgr160_tv_template, TGR160_TEST_VECTORS); | |
1156 | break; | |
1157 | ||
1158 | case 29: | |
1159 | test_hash("tgr128", tgr128_tv_template, TGR128_TEST_VECTORS); | |
1160 | break; | |
fb4f10ed AG |
1161 | |
1162 | case 30: | |
cba83564 HX |
1163 | test_cipher("ecb(xeta)", ENCRYPT, xeta_enc_tv_template, |
1164 | XETA_ENC_TEST_VECTORS); | |
1165 | test_cipher("ecb(xeta)", DECRYPT, xeta_dec_tv_template, | |
1166 | XETA_DEC_TEST_VECTORS); | |
fb4f10ed | 1167 | break; |
1da177e4 | 1168 | |
1da177e4 | 1169 | case 100: |
e9d41164 HX |
1170 | test_hash("hmac(md5)", hmac_md5_tv_template, |
1171 | HMAC_MD5_TEST_VECTORS); | |
1da177e4 | 1172 | break; |
ef2736fc | 1173 | |
1da177e4 | 1174 | case 101: |
e9d41164 HX |
1175 | test_hash("hmac(sha1)", hmac_sha1_tv_template, |
1176 | HMAC_SHA1_TEST_VECTORS); | |
1da177e4 | 1177 | break; |
ef2736fc | 1178 | |
1da177e4 | 1179 | case 102: |
e9d41164 HX |
1180 | test_hash("hmac(sha256)", hmac_sha256_tv_template, |
1181 | HMAC_SHA256_TEST_VECTORS); | |
1da177e4 LT |
1182 | break; |
1183 | ||
1da177e4 | 1184 | |
ebfd9bcf | 1185 | case 200: |
cba83564 | 1186 | test_cipher_speed("ecb(aes)", ENCRYPT, sec, NULL, 0, |
dce907c0 | 1187 | aes_speed_template); |
cba83564 | 1188 | test_cipher_speed("ecb(aes)", DECRYPT, sec, NULL, 0, |
dce907c0 | 1189 | aes_speed_template); |
cba83564 | 1190 | test_cipher_speed("cbc(aes)", ENCRYPT, sec, NULL, 0, |
dce907c0 | 1191 | aes_speed_template); |
cba83564 | 1192 | test_cipher_speed("cbc(aes)", DECRYPT, sec, NULL, 0, |
dce907c0 | 1193 | aes_speed_template); |
ebfd9bcf HW |
1194 | break; |
1195 | ||
1196 | case 201: | |
cba83564 | 1197 | test_cipher_speed("ecb(des3_ede)", ENCRYPT, sec, |
dce907c0 HX |
1198 | des3_ede_enc_tv_template, |
1199 | DES3_EDE_ENC_TEST_VECTORS, | |
1200 | des3_ede_speed_template); | |
cba83564 | 1201 | test_cipher_speed("ecb(des3_ede)", DECRYPT, sec, |
dce907c0 HX |
1202 | des3_ede_dec_tv_template, |
1203 | DES3_EDE_DEC_TEST_VECTORS, | |
1204 | des3_ede_speed_template); | |
cba83564 | 1205 | test_cipher_speed("cbc(des3_ede)", ENCRYPT, sec, |
dce907c0 HX |
1206 | des3_ede_enc_tv_template, |
1207 | DES3_EDE_ENC_TEST_VECTORS, | |
1208 | des3_ede_speed_template); | |
cba83564 | 1209 | test_cipher_speed("cbc(des3_ede)", DECRYPT, sec, |
dce907c0 HX |
1210 | des3_ede_dec_tv_template, |
1211 | DES3_EDE_DEC_TEST_VECTORS, | |
1212 | des3_ede_speed_template); | |
ebfd9bcf HW |
1213 | break; |
1214 | ||
1215 | case 202: | |
cba83564 | 1216 | test_cipher_speed("ecb(twofish)", ENCRYPT, sec, NULL, 0, |
dce907c0 | 1217 | twofish_speed_template); |
cba83564 | 1218 | test_cipher_speed("ecb(twofish)", DECRYPT, sec, NULL, 0, |
dce907c0 | 1219 | twofish_speed_template); |
cba83564 | 1220 | test_cipher_speed("cbc(twofish)", ENCRYPT, sec, NULL, 0, |
dce907c0 | 1221 | twofish_speed_template); |
cba83564 | 1222 | test_cipher_speed("cbc(twofish)", DECRYPT, sec, NULL, 0, |
dce907c0 | 1223 | twofish_speed_template); |
ebfd9bcf HW |
1224 | break; |
1225 | ||
1226 | case 203: | |
cba83564 | 1227 | test_cipher_speed("ecb(blowfish)", ENCRYPT, sec, NULL, 0, |
dce907c0 | 1228 | blowfish_speed_template); |
cba83564 | 1229 | test_cipher_speed("ecb(blowfish)", DECRYPT, sec, NULL, 0, |
dce907c0 | 1230 | blowfish_speed_template); |
cba83564 | 1231 | test_cipher_speed("cbc(blowfish)", ENCRYPT, sec, NULL, 0, |
dce907c0 | 1232 | blowfish_speed_template); |
cba83564 | 1233 | test_cipher_speed("cbc(blowfish)", DECRYPT, sec, NULL, 0, |
dce907c0 | 1234 | blowfish_speed_template); |
ebfd9bcf HW |
1235 | break; |
1236 | ||
1237 | case 204: | |
cba83564 | 1238 | test_cipher_speed("ecb(des)", ENCRYPT, sec, NULL, 0, |
dce907c0 | 1239 | des_speed_template); |
cba83564 | 1240 | test_cipher_speed("ecb(des)", DECRYPT, sec, NULL, 0, |
dce907c0 | 1241 | des_speed_template); |
cba83564 | 1242 | test_cipher_speed("cbc(des)", ENCRYPT, sec, NULL, 0, |
dce907c0 | 1243 | des_speed_template); |
cba83564 | 1244 | test_cipher_speed("cbc(des)", DECRYPT, sec, NULL, 0, |
dce907c0 | 1245 | des_speed_template); |
ebfd9bcf HW |
1246 | break; |
1247 | ||
e8057928 ML |
1248 | case 300: |
1249 | /* fall through */ | |
1250 | ||
1251 | case 301: | |
e9d41164 | 1252 | test_hash_speed("md4", sec, generic_hash_speed_template); |
e8057928 ML |
1253 | if (mode > 300 && mode < 400) break; |
1254 | ||
1255 | case 302: | |
e9d41164 | 1256 | test_hash_speed("md5", sec, generic_hash_speed_template); |
e8057928 ML |
1257 | if (mode > 300 && mode < 400) break; |
1258 | ||
1259 | case 303: | |
e9d41164 | 1260 | test_hash_speed("sha1", sec, generic_hash_speed_template); |
e8057928 ML |
1261 | if (mode > 300 && mode < 400) break; |
1262 | ||
1263 | case 304: | |
e9d41164 | 1264 | test_hash_speed("sha256", sec, generic_hash_speed_template); |
e8057928 ML |
1265 | if (mode > 300 && mode < 400) break; |
1266 | ||
1267 | case 305: | |
e9d41164 | 1268 | test_hash_speed("sha384", sec, generic_hash_speed_template); |
e8057928 ML |
1269 | if (mode > 300 && mode < 400) break; |
1270 | ||
1271 | case 306: | |
e9d41164 | 1272 | test_hash_speed("sha512", sec, generic_hash_speed_template); |
e8057928 ML |
1273 | if (mode > 300 && mode < 400) break; |
1274 | ||
1275 | case 307: | |
e9d41164 | 1276 | test_hash_speed("wp256", sec, generic_hash_speed_template); |
e8057928 ML |
1277 | if (mode > 300 && mode < 400) break; |
1278 | ||
1279 | case 308: | |
e9d41164 | 1280 | test_hash_speed("wp384", sec, generic_hash_speed_template); |
e8057928 ML |
1281 | if (mode > 300 && mode < 400) break; |
1282 | ||
1283 | case 309: | |
e9d41164 | 1284 | test_hash_speed("wp512", sec, generic_hash_speed_template); |
e8057928 ML |
1285 | if (mode > 300 && mode < 400) break; |
1286 | ||
1287 | case 310: | |
e9d41164 | 1288 | test_hash_speed("tgr128", sec, generic_hash_speed_template); |
e8057928 ML |
1289 | if (mode > 300 && mode < 400) break; |
1290 | ||
1291 | case 311: | |
e9d41164 | 1292 | test_hash_speed("tgr160", sec, generic_hash_speed_template); |
e8057928 ML |
1293 | if (mode > 300 && mode < 400) break; |
1294 | ||
1295 | case 312: | |
e9d41164 | 1296 | test_hash_speed("tgr192", sec, generic_hash_speed_template); |
e8057928 ML |
1297 | if (mode > 300 && mode < 400) break; |
1298 | ||
1299 | case 399: | |
1300 | break; | |
1301 | ||
1da177e4 LT |
1302 | case 1000: |
1303 | test_available(); | |
1304 | break; | |
ef2736fc | 1305 | |
1da177e4 LT |
1306 | default: |
1307 | /* useful for debugging */ | |
1308 | printk("not testing anything\n"); | |
1309 | break; | |
1310 | } | |
1311 | } | |
1312 | ||
ef2736fc | 1313 | static int __init init(void) |
1da177e4 LT |
1314 | { |
1315 | tvmem = kmalloc(TVMEMSIZE, GFP_KERNEL); | |
1316 | if (tvmem == NULL) | |
1317 | return -ENOMEM; | |
1318 | ||
1319 | xbuf = kmalloc(XBUFSIZE, GFP_KERNEL); | |
1320 | if (xbuf == NULL) { | |
1321 | kfree(tvmem); | |
1322 | return -ENOMEM; | |
1323 | } | |
1324 | ||
1325 | do_test(); | |
1326 | ||
1327 | kfree(xbuf); | |
1328 | kfree(tvmem); | |
14fdf477 ML |
1329 | |
1330 | /* We intentionaly return -EAGAIN to prevent keeping | |
1331 | * the module. It does all its work from init() | |
1332 | * and doesn't offer any runtime functionality | |
1333 | * => we don't need it in the memory, do we? | |
1334 | * -- mludvig | |
1335 | */ | |
1336 | return -EAGAIN; | |
1da177e4 LT |
1337 | } |
1338 | ||
1339 | /* | |
1340 | * If an init function is provided, an exit function must also be provided | |
1341 | * to allow module unload. | |
1342 | */ | |
1343 | static void __exit fini(void) { } | |
1344 | ||
1345 | module_init(init); | |
1346 | module_exit(fini); | |
1347 | ||
1348 | module_param(mode, int, 0); | |
ebfd9bcf | 1349 | module_param(sec, uint, 0); |
6a17944c HX |
1350 | MODULE_PARM_DESC(sec, "Length in seconds of speed tests " |
1351 | "(defaults to zero which uses CPU cycles instead)"); | |
1da177e4 LT |
1352 | |
1353 | MODULE_LICENSE("GPL"); | |
1354 | MODULE_DESCRIPTION("Quick & dirty crypto testing module"); | |
1355 | MODULE_AUTHOR("James Morris <jmorris@intercode.com.au>"); |