2005-06-23 00:26:03 +04:00
/*
2005-04-17 02:20:36 +04:00
* Quick & dirty crypto testing module .
*
* This will only exist until we have a better testing mechanism
* ( e . g . a char device ) .
*
* Copyright ( c ) 2002 James Morris < jmorris @ intercode . com . au >
* Copyright ( c ) 2002 Jean - Francois Dive < jef @ linuxbe . org >
2007-11-26 17:12:07 +03:00
* Copyright ( c ) 2007 Nokia Siemens Networks
2005-04-17 02:20:36 +04:00
*
* This program is free software ; you can redistribute it and / or modify it
* under the terms of the GNU General Public License as published by the Free
2005-06-23 00:26:03 +04:00
* Software Foundation ; either version 2 of the License , or ( at your option )
2005-04-17 02:20:36 +04:00
* any later version .
*
2007-11-26 17:24:11 +03:00
* 2007 - 11 - 13 Added GCM tests
2007-11-26 17:12:07 +03:00
* 2007 - 11 - 13 Added AEAD support
2007-11-10 15:08:25 +03:00
* 2007 - 11 - 06 Added SHA - 224 and SHA - 224 - HMAC tests
2006-12-10 04:10:20 +03:00
* 2006 - 12 - 07 Added SHA384 HMAC and SHA512 HMAC tests
2005-06-23 00:27:23 +04:00
* 2004 - 08 - 09 Added cipher speed tests ( Reyk Floeter < reyk @ vantronix . net > )
* 2003 - 09 - 14 Rewritten by Kartikey Mahendra Bhatt
*
2005-04-17 02:20:36 +04:00
*/
2006-08-13 02:26:09 +04:00
# include <linux/err.h>
2005-04-17 02:20:36 +04:00
# include <linux/init.h>
# include <linux/module.h>
# include <linux/mm.h>
# include <linux/slab.h>
2005-09-17 11:55:31 +04:00
# include <linux/scatterlist.h>
2005-04-17 02:20:36 +04:00
# include <linux/string.h>
# include <linux/crypto.h>
# include <linux/highmem.h>
# include <linux/moduleparam.h>
2005-06-23 00:27:23 +04:00
# include <linux/jiffies.h>
2005-06-23 00:29:03 +04:00
# include <linux/timex.h>
# include <linux/interrupt.h>
2005-04-17 02:20:36 +04:00
# include "tcrypt.h"
/*
* Need to kmalloc ( ) memory for testing kmap ( ) .
*/
2005-06-23 00:27:23 +04:00
# define TVMEMSIZE 16384
2005-04-17 02:20:36 +04:00
# define XBUFSIZE 32768
/*
* Indexes into the xbuf to simulate cross - page access .
*/
# define IDX1 37
# define IDX2 32400
# define IDX3 1
# define IDX4 8193
# define IDX5 22222
# define IDX6 17101
# define IDX7 27333
# define IDX8 3000
/*
* Used by test_cipher ( )
*/
# define ENCRYPT 1
# define DECRYPT 0
2007-04-04 11:41:07 +04:00
struct tcrypt_result {
struct completion completion ;
int err ;
} ;
2005-04-17 02:20:36 +04:00
static unsigned int IDX [ 8 ] = { IDX1 , IDX2 , IDX3 , IDX4 , IDX5 , IDX6 , IDX7 , IDX8 } ;
2005-06-23 00:27:23 +04:00
/*
* Used by test_cipher_speed ( )
*/
2005-06-23 00:29:03 +04:00
static unsigned int sec ;
2005-06-23 00:27:23 +04:00
2005-04-17 02:20:36 +04:00
static int mode ;
static char * xbuf ;
2007-11-26 17:12:07 +03:00
static char * axbuf ;
2005-04-17 02:20:36 +04:00
static char * tvmem ;
static char * check [ ] = {
2007-11-10 15:08:25 +03:00
" des " , " md5 " , " des3_ede " , " rot13 " , " sha1 " , " sha224 " , " sha256 " ,
" blowfish " , " twofish " , " serpent " , " sha384 " , " sha512 " , " md4 " , " aes " ,
" cast6 " , " arc4 " , " michael_mic " , " deflate " , " crc32c " , " tea " , " xtea " ,
2005-06-23 00:26:03 +04:00
" arc4 " , " michael_mic " , " deflate " , " crc32c " , " tea " , " xtea " ,
2006-12-16 04:13:14 +03:00
" khazad " , " wp512 " , " wp384 " , " wp256 " , " tnepres " , " xeta " , " fcrypt " ,
2007-11-23 14:45:00 +03:00
" camellia " , " seed " , " salsa20 " , NULL
2005-04-17 02:20:36 +04:00
} ;
2005-06-23 00:26:03 +04:00
static void hexdump ( unsigned char * buf , unsigned int len )
2005-04-17 02:20:36 +04:00
{
2007-11-30 08:59:30 +03:00
print_hex_dump ( KERN_CONT , " " , DUMP_PREFIX_OFFSET ,
16 , 1 ,
buf , len , false ) ;
2005-04-17 02:20:36 +04:00
}
2007-04-04 11:41:07 +04:00
static void tcrypt_complete ( struct crypto_async_request * req , int err )
{
struct tcrypt_result * res = req - > data ;
if ( err = = - EINPROGRESS )
return ;
res - > err = err ;
complete ( & res - > completion ) ;
}
2005-06-23 00:26:03 +04:00
static void test_hash ( char * algo , struct hash_testvec * template ,
unsigned int tcount )
2005-04-17 02:20:36 +04:00
{
2005-06-23 00:26:03 +04:00
unsigned int i , j , k , temp ;
struct scatterlist sg [ 8 ] ;
char result [ 64 ] ;
2006-08-19 15:38:49 +04:00
struct crypto_hash * tfm ;
struct hash_desc desc ;
2005-06-23 00:26:03 +04:00
struct hash_testvec * hash_tv ;
unsigned int tsize ;
2006-08-19 15:38:49 +04:00
int ret ;
2005-06-23 00:26:03 +04:00
printk ( " \n testing %s \n " , algo ) ;
tsize = sizeof ( struct hash_testvec ) ;
2005-04-17 02:20:36 +04:00
tsize * = tcount ;
2005-06-23 00:26:03 +04:00
2005-04-17 02:20:36 +04:00
if ( tsize > TVMEMSIZE ) {
printk ( " template (%u) too big for tvmem (%u) \n " , tsize , TVMEMSIZE ) ;
return ;
}
memcpy ( tvmem , template , tsize ) ;
2005-06-23 00:26:03 +04:00
hash_tv = ( void * ) tvmem ;
2006-08-19 15:38:49 +04:00
tfm = crypto_alloc_hash ( algo , 0 , CRYPTO_ALG_ASYNC ) ;
if ( IS_ERR ( tfm ) ) {
printk ( " failed to load transform for %s: %ld \n " , algo ,
PTR_ERR ( tfm ) ) ;
2005-04-17 02:20:36 +04:00
return ;
}
2006-08-19 15:38:49 +04:00
desc . tfm = tfm ;
desc . flags = 0 ;
2005-04-17 02:20:36 +04:00
for ( i = 0 ; i < tcount ; i + + ) {
2005-06-23 00:26:03 +04:00
printk ( " test %u: \n " , i + 1 ) ;
memset ( result , 0 , 64 ) ;
2005-04-17 02:20:36 +04:00
2007-10-26 11:38:10 +04:00
sg_init_one ( & sg [ 0 ] , hash_tv [ i ] . plaintext , hash_tv [ i ] . psize ) ;
2005-04-17 02:20:36 +04:00
2006-08-19 15:38:49 +04:00
if ( hash_tv [ i ] . ksize ) {
ret = crypto_hash_setkey ( tfm , hash_tv [ i ] . key ,
hash_tv [ i ] . ksize ) ;
if ( ret ) {
printk ( " setkey() failed ret=%d \n " , ret ) ;
goto out ;
}
}
ret = crypto_hash_digest ( & desc , sg , hash_tv [ i ] . psize , result ) ;
if ( ret ) {
printk ( " digest () failed ret=%d \n " , ret ) ;
goto out ;
}
2005-04-17 02:20:36 +04:00
2006-08-19 15:38:49 +04:00
hexdump ( result , crypto_hash_digestsize ( tfm ) ) ;
2005-04-17 02:20:36 +04:00
printk ( " %s \n " ,
2005-06-23 00:26:03 +04:00
memcmp ( result , hash_tv [ i ] . digest ,
2006-08-19 15:38:49 +04:00
crypto_hash_digestsize ( tfm ) ) ?
2005-06-23 00:26:03 +04:00
" fail " : " pass " ) ;
2005-04-17 02:20:36 +04:00
}
2005-06-23 00:26:03 +04:00
printk ( " testing %s across pages \n " , algo ) ;
2005-04-17 02:20:36 +04:00
/* setup the dummy buffer first */
2005-06-23 00:26:03 +04:00
memset ( xbuf , 0 , XBUFSIZE ) ;
2007-11-26 17:12:07 +03:00
memset ( axbuf , 0 , XBUFSIZE ) ;
2005-04-17 02:20:36 +04:00
j = 0 ;
for ( i = 0 ; i < tcount ; i + + ) {
if ( hash_tv [ i ] . np ) {
j + + ;
2005-06-23 00:26:03 +04:00
printk ( " test %u: \n " , j ) ;
memset ( result , 0 , 64 ) ;
2005-04-17 02:20:36 +04:00
temp = 0 ;
2007-10-26 11:38:10 +04:00
sg_init_table ( sg , hash_tv [ i ] . np ) ;
2005-04-17 02:20:36 +04:00
for ( k = 0 ; k < hash_tv [ i ] . np ; k + + ) {
2005-06-23 00:26:03 +04:00
memcpy ( & xbuf [ IDX [ k ] ] ,
hash_tv [ i ] . plaintext + temp ,
hash_tv [ i ] . tap [ k ] ) ;
2005-04-17 02:20:36 +04:00
temp + = hash_tv [ i ] . tap [ k ] ;
2005-09-17 11:55:31 +04:00
sg_set_buf ( & sg [ k ] , & xbuf [ IDX [ k ] ] ,
hash_tv [ i ] . tap [ k ] ) ;
2005-04-17 02:20:36 +04:00
}
2006-08-19 15:38:49 +04:00
if ( hash_tv [ i ] . ksize ) {
ret = crypto_hash_setkey ( tfm , hash_tv [ i ] . key ,
hash_tv [ i ] . ksize ) ;
2005-06-23 00:26:03 +04:00
2006-08-19 15:38:49 +04:00
if ( ret ) {
printk ( " setkey() failed ret=%d \n " , ret ) ;
goto out ;
}
2005-04-17 02:20:36 +04:00
}
2006-08-19 15:38:49 +04:00
ret = crypto_hash_digest ( & desc , sg , hash_tv [ i ] . psize ,
result ) ;
if ( ret ) {
printk ( " digest () failed ret=%d \n " , ret ) ;
goto out ;
}
2005-06-23 00:26:03 +04:00
2006-08-19 15:38:49 +04:00
hexdump ( result , crypto_hash_digestsize ( tfm ) ) ;
2005-04-17 02:20:36 +04:00
printk ( " %s \n " ,
2006-08-19 15:38:49 +04:00
memcmp ( result , hash_tv [ i ] . digest ,
crypto_hash_digestsize ( tfm ) ) ?
2005-06-23 00:26:03 +04:00
" fail " : " pass " ) ;
2005-04-17 02:20:36 +04:00
}
}
2006-08-19 15:38:49 +04:00
2005-04-17 02:20:36 +04:00
out :
2006-08-19 15:38:49 +04:00
crypto_free_hash ( tfm ) ;
2005-04-17 02:20:36 +04:00
}
2007-11-26 17:12:07 +03:00
static void test_aead ( char * algo , int enc , struct aead_testvec * template ,
unsigned int tcount )
{
unsigned int ret , i , j , k , temp ;
unsigned int tsize ;
char * q ;
struct crypto_aead * tfm ;
char * key ;
struct aead_testvec * aead_tv ;
struct aead_request * req ;
struct scatterlist sg [ 8 ] ;
struct scatterlist asg [ 8 ] ;
const char * e ;
struct tcrypt_result result ;
if ( enc = = ENCRYPT )
e = " encryption " ;
else
e = " decryption " ;
printk ( KERN_INFO " \n testing %s %s \n " , algo , e ) ;
tsize = sizeof ( struct aead_testvec ) ;
tsize * = tcount ;
if ( tsize > TVMEMSIZE ) {
printk ( KERN_INFO " template (%u) too big for tvmem (%u) \n " ,
tsize , TVMEMSIZE ) ;
return ;
}
memcpy ( tvmem , template , tsize ) ;
aead_tv = ( void * ) tvmem ;
init_completion ( & result . completion ) ;
tfm = crypto_alloc_aead ( algo , 0 , 0 ) ;
if ( IS_ERR ( tfm ) ) {
printk ( KERN_INFO " failed to load transform for %s: %ld \n " ,
algo , PTR_ERR ( tfm ) ) ;
return ;
}
req = aead_request_alloc ( tfm , GFP_KERNEL ) ;
if ( ! req ) {
printk ( KERN_INFO " failed to allocate request for %s \n " , algo ) ;
goto out ;
}
aead_request_set_callback ( req , CRYPTO_TFM_REQ_MAY_BACKLOG ,
tcrypt_complete , & result ) ;
for ( i = 0 , j = 0 ; i < tcount ; i + + ) {
if ( ! aead_tv [ i ] . np ) {
printk ( KERN_INFO " test %u (%d bit key): \n " ,
+ + j , aead_tv [ i ] . klen * 8 ) ;
crypto_aead_clear_flags ( tfm , ~ 0 ) ;
if ( aead_tv [ i ] . wk )
crypto_aead_set_flags (
tfm , CRYPTO_TFM_REQ_WEAK_KEY ) ;
key = aead_tv [ i ] . key ;
ret = crypto_aead_setkey ( tfm , key ,
aead_tv [ i ] . klen ) ;
if ( ret ) {
printk ( KERN_INFO " setkey() failed flags=%x \n " ,
crypto_aead_get_flags ( tfm ) ) ;
if ( ! aead_tv [ i ] . fail )
goto out ;
}
sg_init_one ( & sg [ 0 ] , aead_tv [ i ] . input ,
aead_tv [ i ] . ilen ) ;
sg_init_one ( & asg [ 0 ] , aead_tv [ i ] . assoc ,
aead_tv [ i ] . alen ) ;
aead_request_set_crypt ( req , sg , sg ,
aead_tv [ i ] . ilen ,
aead_tv [ i ] . iv ) ;
aead_request_set_assoc ( req , asg , aead_tv [ i ] . alen ) ;
if ( enc ) {
ret = crypto_aead_encrypt ( req ) ;
} else {
memcpy ( req - > __ctx , aead_tv [ i ] . tag ,
aead_tv [ i ] . tlen ) ;
ret = crypto_aead_decrypt ( req ) ;
}
switch ( ret ) {
case 0 :
break ;
case - EINPROGRESS :
case - EBUSY :
ret = wait_for_completion_interruptible (
& result . completion ) ;
if ( ! ret & & ! ( ret = result . err ) ) {
INIT_COMPLETION ( result . completion ) ;
break ;
}
/* fall through */
default :
printk ( KERN_INFO " %s () failed err=%d \n " ,
e , - ret ) ;
goto out ;
}
q = kmap ( sg_page ( & sg [ 0 ] ) ) + sg [ 0 ] . offset ;
hexdump ( q , aead_tv [ i ] . rlen ) ;
printk ( KERN_INFO " auth tag: " ) ;
hexdump ( ( unsigned char * ) req - > __ctx , aead_tv [ i ] . tlen ) ;
printk ( KERN_INFO " enc/dec: %s \n " ,
memcmp ( q , aead_tv [ i ] . result ,
aead_tv [ i ] . rlen ) ? " fail " : " pass " ) ;
printk ( KERN_INFO " auth tag: %s \n " ,
memcmp ( req - > __ctx , aead_tv [ i ] . tag ,
aead_tv [ i ] . tlen ) ? " fail " : " pass " ) ;
}
}
printk ( KERN_INFO " \n testing %s %s across pages (chunking) \n " , algo , e ) ;
memset ( xbuf , 0 , XBUFSIZE ) ;
for ( i = 0 , j = 0 ; i < tcount ; i + + ) {
if ( aead_tv [ i ] . np ) {
printk ( KERN_INFO " test %u (%d bit key): \n " ,
+ + j , aead_tv [ i ] . klen * 8 ) ;
crypto_aead_clear_flags ( tfm , ~ 0 ) ;
if ( aead_tv [ i ] . wk )
crypto_aead_set_flags (
tfm , CRYPTO_TFM_REQ_WEAK_KEY ) ;
key = aead_tv [ i ] . key ;
ret = crypto_aead_setkey ( tfm , key , aead_tv [ i ] . klen ) ;
if ( ret ) {
printk ( KERN_INFO " setkey() failed flags=%x \n " ,
crypto_aead_get_flags ( tfm ) ) ;
if ( ! aead_tv [ i ] . fail )
goto out ;
}
sg_init_table ( sg , aead_tv [ i ] . np ) ;
for ( k = 0 , temp = 0 ; k < aead_tv [ i ] . np ; k + + ) {
memcpy ( & xbuf [ IDX [ k ] ] ,
aead_tv [ i ] . input + temp ,
aead_tv [ i ] . tap [ k ] ) ;
temp + = aead_tv [ i ] . tap [ k ] ;
sg_set_buf ( & sg [ k ] , & xbuf [ IDX [ k ] ] ,
aead_tv [ i ] . tap [ k ] ) ;
}
sg_init_table ( asg , aead_tv [ i ] . anp ) ;
for ( k = 0 , temp = 0 ; k < aead_tv [ i ] . anp ; k + + ) {
memcpy ( & axbuf [ IDX [ k ] ] ,
aead_tv [ i ] . assoc + temp ,
aead_tv [ i ] . atap [ k ] ) ;
temp + = aead_tv [ i ] . atap [ k ] ;
sg_set_buf ( & asg [ k ] , & axbuf [ IDX [ k ] ] ,
aead_tv [ i ] . atap [ k ] ) ;
}
aead_request_set_crypt ( req , sg , sg ,
aead_tv [ i ] . ilen ,
aead_tv [ i ] . iv ) ;
aead_request_set_assoc ( req , asg , aead_tv [ i ] . alen ) ;
if ( enc ) {
ret = crypto_aead_encrypt ( req ) ;
} else {
memcpy ( req - > __ctx , aead_tv [ i ] . tag ,
aead_tv [ i ] . tlen ) ;
ret = crypto_aead_decrypt ( req ) ;
}
switch ( ret ) {
case 0 :
break ;
case - EINPROGRESS :
case - EBUSY :
ret = wait_for_completion_interruptible (
& result . completion ) ;
if ( ! ret & & ! ( ret = result . err ) ) {
INIT_COMPLETION ( result . completion ) ;
break ;
}
/* fall through */
default :
printk ( KERN_INFO " %s () failed err=%d \n " ,
e , - ret ) ;
goto out ;
}
for ( k = 0 , temp = 0 ; k < aead_tv [ i ] . np ; k + + ) {
printk ( KERN_INFO " page %u \n " , k ) ;
q = kmap ( sg_page ( & sg [ k ] ) ) + sg [ k ] . offset ;
hexdump ( q , aead_tv [ i ] . tap [ k ] ) ;
printk ( KERN_INFO " %s \n " ,
memcmp ( q , aead_tv [ i ] . result + temp ,
aead_tv [ i ] . tap [ k ] ) ?
" fail " : " pass " ) ;
temp + = aead_tv [ i ] . tap [ k ] ;
}
printk ( KERN_INFO " auth tag: " ) ;
hexdump ( ( unsigned char * ) req - > __ctx , aead_tv [ i ] . tlen ) ;
printk ( KERN_INFO " auth tag: %s \n " ,
memcmp ( req - > __ctx , aead_tv [ i ] . tag ,
aead_tv [ i ] . tlen ) ? " fail " : " pass " ) ;
}
}
out :
crypto_free_aead ( tfm ) ;
aead_request_free ( req ) ;
}
2006-08-13 02:26:09 +04:00
static void test_cipher ( char * algo , int enc ,
2005-06-23 00:26:03 +04:00
struct cipher_testvec * template , unsigned int tcount )
2005-04-17 02:20:36 +04:00
{
unsigned int ret , i , j , k , temp ;
unsigned int tsize ;
2005-09-17 11:55:31 +04:00
char * q ;
2007-04-04 11:41:07 +04:00
struct crypto_ablkcipher * tfm ;
2005-04-17 02:20:36 +04:00
char * key ;
struct cipher_testvec * cipher_tv ;
2007-04-04 11:41:07 +04:00
struct ablkcipher_request * req ;
2005-04-17 02:20:36 +04:00
struct scatterlist sg [ 8 ] ;
2006-08-13 02:26:09 +04:00
const char * e ;
2007-04-04 11:41:07 +04:00
struct tcrypt_result result ;
2005-04-17 02:20:36 +04:00
if ( enc = = ENCRYPT )
2005-06-23 00:26:36 +04:00
e = " encryption " ;
2005-04-17 02:20:36 +04:00
else
2005-06-23 00:26:36 +04:00
e = " decryption " ;
2005-04-17 02:20:36 +04:00
2006-08-13 02:26:09 +04:00
printk ( " \n testing %s %s \n " , algo , e ) ;
2005-04-17 02:20:36 +04:00
2005-06-23 00:26:03 +04:00
tsize = sizeof ( struct cipher_testvec ) ;
2005-04-17 02:20:36 +04:00
if ( tsize > TVMEMSIZE ) {
printk ( " template (%u) too big for tvmem (%u) \n " , tsize ,
TVMEMSIZE ) ;
return ;
}
2005-06-23 00:26:03 +04:00
cipher_tv = ( void * ) tvmem ;
2007-04-04 11:41:07 +04:00
init_completion ( & result . completion ) ;
tfm = crypto_alloc_ablkcipher ( algo , 0 , 0 ) ;
2005-04-17 02:20:36 +04:00
2006-08-13 02:26:09 +04:00
if ( IS_ERR ( tfm ) ) {
printk ( " failed to load transform for %s: %ld \n " , algo ,
PTR_ERR ( tfm ) ) ;
2005-04-17 02:20:36 +04:00
return ;
}
2007-04-04 11:41:07 +04:00
req = ablkcipher_request_alloc ( tfm , GFP_KERNEL ) ;
if ( ! req ) {
printk ( " failed to allocate request for %s \n " , algo ) ;
goto out ;
}
ablkcipher_request_set_callback ( req , CRYPTO_TFM_REQ_MAY_BACKLOG ,
tcrypt_complete , & result ) ;
2005-06-23 00:26:03 +04:00
2005-04-17 02:20:36 +04:00
j = 0 ;
for ( i = 0 ; i < tcount ; i + + ) {
2007-11-29 16:30:11 +03:00
memcpy ( cipher_tv , & template [ i ] , tsize ) ;
if ( ! ( cipher_tv - > np ) ) {
2005-06-23 00:26:03 +04:00
j + + ;
2005-04-17 02:20:36 +04:00
printk ( " test %u (%d bit key): \n " ,
2007-11-29 16:30:11 +03:00
j , cipher_tv - > klen * 8 ) ;
2005-04-17 02:20:36 +04:00
2007-04-04 11:41:07 +04:00
crypto_ablkcipher_clear_flags ( tfm , ~ 0 ) ;
2007-11-29 16:30:11 +03:00
if ( cipher_tv - > wk )
2007-04-04 11:41:07 +04:00
crypto_ablkcipher_set_flags (
2006-08-13 02:26:09 +04:00
tfm , CRYPTO_TFM_REQ_WEAK_KEY ) ;
2007-11-29 16:30:11 +03:00
key = cipher_tv - > key ;
2005-06-23 00:26:03 +04:00
2007-04-04 11:41:07 +04:00
ret = crypto_ablkcipher_setkey ( tfm , key ,
2007-11-29 16:30:11 +03:00
cipher_tv - > klen ) ;
2005-04-17 02:20:36 +04:00
if ( ret ) {
2006-08-13 02:26:09 +04:00
printk ( " setkey() failed flags=%x \n " ,
2007-04-04 11:41:07 +04:00
crypto_ablkcipher_get_flags ( tfm ) ) ;
2005-06-23 00:26:03 +04:00
2007-11-29 16:30:11 +03:00
if ( ! cipher_tv - > fail )
2005-04-17 02:20:36 +04:00
goto out ;
2005-06-23 00:26:03 +04:00
}
2005-04-17 02:20:36 +04:00
2007-11-29 16:30:11 +03:00
sg_init_one ( & sg [ 0 ] , cipher_tv - > input ,
cipher_tv - > ilen ) ;
2005-06-23 00:26:03 +04:00
2007-04-04 11:41:07 +04:00
ablkcipher_request_set_crypt ( req , sg , sg ,
2007-11-29 16:30:11 +03:00
cipher_tv - > ilen ,
cipher_tv - > iv ) ;
2005-06-23 00:26:03 +04:00
2006-08-13 02:26:09 +04:00
ret = enc ?
2007-04-04 11:41:07 +04:00
crypto_ablkcipher_encrypt ( req ) :
crypto_ablkcipher_decrypt ( req ) ;
2005-06-23 00:26:03 +04:00
2007-04-04 11:41:07 +04:00
switch ( ret ) {
case 0 :
break ;
case - EINPROGRESS :
case - EBUSY :
ret = wait_for_completion_interruptible (
& result . completion ) ;
if ( ! ret & & ! ( ( ret = result . err ) ) ) {
INIT_COMPLETION ( result . completion ) ;
break ;
}
/* fall through */
default :
printk ( " %s () failed err=%d \n " , e , - ret ) ;
2005-04-17 02:20:36 +04:00
goto out ;
2005-06-23 00:26:03 +04:00
}
2007-10-22 21:40:16 +04:00
q = kmap ( sg_page ( & sg [ 0 ] ) ) + sg [ 0 ] . offset ;
2007-11-29 16:30:11 +03:00
hexdump ( q , cipher_tv - > rlen ) ;
2005-06-23 00:26:03 +04:00
printk ( " %s \n " ,
2007-11-29 16:30:11 +03:00
memcmp ( q , cipher_tv - > result ,
cipher_tv - > rlen ) ? " fail " : " pass " ) ;
2005-04-17 02:20:36 +04:00
}
}
2005-06-23 00:26:03 +04:00
2006-08-13 02:26:09 +04:00
printk ( " \n testing %s %s across pages (chunking) \n " , algo , e ) ;
2005-04-17 02:20:36 +04:00
memset ( xbuf , 0 , XBUFSIZE ) ;
2005-06-23 00:26:03 +04:00
2005-04-17 02:20:36 +04:00
j = 0 ;
for ( i = 0 ; i < tcount ; i + + ) {
2007-11-29 16:30:11 +03:00
memcpy ( cipher_tv , & template [ i ] , tsize ) ;
if ( cipher_tv - > np ) {
2005-06-23 00:26:03 +04:00
j + + ;
2005-04-17 02:20:36 +04:00
printk ( " test %u (%d bit key): \n " ,
2007-11-29 16:30:11 +03:00
j , cipher_tv - > klen * 8 ) ;
2005-04-17 02:20:36 +04:00
2007-04-04 11:41:07 +04:00
crypto_ablkcipher_clear_flags ( tfm , ~ 0 ) ;
2007-11-29 16:30:11 +03:00
if ( cipher_tv - > wk )
2007-04-04 11:41:07 +04:00
crypto_ablkcipher_set_flags (
2006-08-13 02:26:09 +04:00
tfm , CRYPTO_TFM_REQ_WEAK_KEY ) ;
2007-11-29 16:30:11 +03:00
key = cipher_tv - > key ;
2005-06-23 00:26:03 +04:00
2007-04-04 11:41:07 +04:00
ret = crypto_ablkcipher_setkey ( tfm , key ,
2007-11-29 16:30:11 +03:00
cipher_tv - > klen ) ;
2005-04-17 02:20:36 +04:00
if ( ret ) {
2006-08-13 02:26:09 +04:00
printk ( " setkey() failed flags=%x \n " ,
2007-04-04 11:41:07 +04:00
crypto_ablkcipher_get_flags ( tfm ) ) ;
2005-06-23 00:26:03 +04:00
2007-11-29 16:30:11 +03:00
if ( ! cipher_tv - > fail )
2005-04-17 02:20:36 +04:00
goto out ;
}
temp = 0 ;
2007-11-29 16:30:11 +03:00
sg_init_table ( sg , cipher_tv - > np ) ;
for ( k = 0 ; k < cipher_tv - > np ; k + + ) {
2005-06-23 00:26:03 +04:00
memcpy ( & xbuf [ IDX [ k ] ] ,
2007-11-29 16:30:11 +03:00
cipher_tv - > input + temp ,
cipher_tv - > tap [ k ] ) ;
temp + = cipher_tv - > tap [ k ] ;
2005-09-17 11:55:31 +04:00
sg_set_buf ( & sg [ k ] , & xbuf [ IDX [ k ] ] ,
2007-11-29 16:30:11 +03:00
cipher_tv - > tap [ k ] ) ;
2005-04-17 02:20:36 +04:00
}
2005-06-23 00:26:03 +04:00
2007-04-04 11:41:07 +04:00
ablkcipher_request_set_crypt ( req , sg , sg ,
2007-11-29 16:30:11 +03:00
cipher_tv - > ilen ,
cipher_tv - > iv ) ;
2005-06-23 00:26:03 +04:00
2006-08-13 02:26:09 +04:00
ret = enc ?
2007-04-04 11:41:07 +04:00
crypto_ablkcipher_encrypt ( req ) :
crypto_ablkcipher_decrypt ( req ) ;
2005-06-23 00:26:03 +04:00
2007-04-04 11:41:07 +04:00
switch ( ret ) {
case 0 :
break ;
case - EINPROGRESS :
case - EBUSY :
ret = wait_for_completion_interruptible (
& result . completion ) ;
if ( ! ret & & ! ( ( ret = result . err ) ) ) {
INIT_COMPLETION ( result . completion ) ;
break ;
}
/* fall through */
default :
printk ( " %s () failed err=%d \n " , e , - ret ) ;
2005-04-17 02:20:36 +04:00
goto out ;
}
temp = 0 ;
2007-11-29 16:30:11 +03:00
for ( k = 0 ; k < cipher_tv - > np ; k + + ) {
2005-04-17 02:20:36 +04:00
printk ( " page %u \n " , k ) ;
2007-10-22 21:40:16 +04:00
q = kmap ( sg_page ( & sg [ k ] ) ) + sg [ k ] . offset ;
2007-11-29 16:30:11 +03:00
hexdump ( q , cipher_tv - > tap [ k ] ) ;
2005-06-23 00:26:03 +04:00
printk ( " %s \n " ,
2007-11-29 16:30:11 +03:00
memcmp ( q , cipher_tv - > result + temp ,
cipher_tv - > tap [ k ] ) ? " fail " :
2005-04-17 02:20:36 +04:00
" pass " ) ;
2007-11-29 16:30:11 +03:00
temp + = cipher_tv - > tap [ k ] ;
2005-04-17 02:20:36 +04:00
}
}
}
out :
2007-04-04 11:41:07 +04:00
crypto_free_ablkcipher ( tfm ) ;
ablkcipher_request_free ( req ) ;
2005-04-17 02:20:36 +04:00
}
2006-08-13 02:26:09 +04:00
static int test_cipher_jiffies ( struct blkcipher_desc * desc , int enc , char * p ,
2005-06-23 00:29:03 +04:00
int blen , int sec )
{
2005-09-19 16:30:11 +04:00
struct scatterlist sg [ 1 ] ;
2005-06-23 00:29:03 +04:00
unsigned long start , end ;
int bcount ;
int ret ;
2007-10-26 11:38:10 +04:00
sg_init_one ( sg , p , blen ) ;
2005-06-23 00:29:03 +04:00
for ( start = jiffies , end = start + sec * HZ , bcount = 0 ;
time_before ( jiffies , end ) ; bcount + + ) {
if ( enc )
2006-08-13 02:26:09 +04:00
ret = crypto_blkcipher_encrypt ( desc , sg , sg , blen ) ;
2005-06-23 00:29:03 +04:00
else
2006-08-13 02:26:09 +04:00
ret = crypto_blkcipher_decrypt ( desc , sg , sg , blen ) ;
2005-06-23 00:29:03 +04:00
if ( ret )
return ret ;
}
printk ( " %d operations in %d seconds (%ld bytes) \n " ,
bcount , sec , ( long ) bcount * blen ) ;
return 0 ;
}
2006-08-13 02:26:09 +04:00
static int test_cipher_cycles ( struct blkcipher_desc * desc , int enc , char * p ,
2005-06-23 00:29:03 +04:00
int blen )
{
2005-09-19 16:30:11 +04:00
struct scatterlist sg [ 1 ] ;
2005-06-23 00:29:03 +04:00
unsigned long cycles = 0 ;
int ret = 0 ;
int i ;
2007-10-26 11:38:10 +04:00
sg_init_one ( sg , p , blen ) ;
2005-06-23 00:29:03 +04:00
local_bh_disable ( ) ;
local_irq_disable ( ) ;
/* Warm-up run. */
for ( i = 0 ; i < 4 ; i + + ) {
if ( enc )
2006-08-13 02:26:09 +04:00
ret = crypto_blkcipher_encrypt ( desc , sg , sg , blen ) ;
2005-06-23 00:29:03 +04:00
else
2006-08-13 02:26:09 +04:00
ret = crypto_blkcipher_decrypt ( desc , sg , sg , blen ) ;
2005-06-23 00:29:03 +04:00
if ( ret )
goto out ;
}
/* The real thing. */
for ( i = 0 ; i < 8 ; i + + ) {
cycles_t start , end ;
start = get_cycles ( ) ;
if ( enc )
2006-08-13 02:26:09 +04:00
ret = crypto_blkcipher_encrypt ( desc , sg , sg , blen ) ;
2005-06-23 00:29:03 +04:00
else
2006-08-13 02:26:09 +04:00
ret = crypto_blkcipher_decrypt ( desc , sg , sg , blen ) ;
2005-06-23 00:29:03 +04:00
end = get_cycles ( ) ;
if ( ret )
goto out ;
cycles + = end - start ;
}
out :
local_irq_enable ( ) ;
local_bh_enable ( ) ;
if ( ret = = 0 )
printk ( " 1 operation in %lu cycles (%d bytes) \n " ,
( cycles + 4 ) / 8 , blen ) ;
return ret ;
}
2006-08-13 02:26:09 +04:00
static void test_cipher_speed ( char * algo , int enc , unsigned int sec ,
2005-06-23 00:27:51 +04:00
struct cipher_testvec * template ,
unsigned int tcount , struct cipher_speed * speed )
2005-06-23 00:27:23 +04:00
{
2005-06-23 00:27:51 +04:00
unsigned int ret , i , j , iv_len ;
2005-06-23 00:27:23 +04:00
unsigned char * key , * p , iv [ 128 ] ;
2006-08-13 02:26:09 +04:00
struct crypto_blkcipher * tfm ;
struct blkcipher_desc desc ;
const char * e ;
2005-06-23 00:27:23 +04:00
if ( enc = = ENCRYPT )
e = " encryption " ;
else
e = " decryption " ;
2006-08-13 02:26:09 +04:00
printk ( " \n testing speed of %s %s \n " , algo , e ) ;
2005-06-23 00:27:23 +04:00
2006-08-13 02:26:09 +04:00
tfm = crypto_alloc_blkcipher ( algo , 0 , CRYPTO_ALG_ASYNC ) ;
2005-06-23 00:27:23 +04:00
2006-08-13 02:26:09 +04:00
if ( IS_ERR ( tfm ) ) {
printk ( " failed to load transform for %s: %ld \n " , algo ,
PTR_ERR ( tfm ) ) ;
2005-06-23 00:27:23 +04:00
return ;
}
2006-08-13 02:26:09 +04:00
desc . tfm = tfm ;
desc . flags = 0 ;
2005-06-23 00:27:23 +04:00
for ( i = 0 ; speed [ i ] . klen ! = 0 ; i + + ) {
if ( ( speed [ i ] . blen + speed [ i ] . klen ) > TVMEMSIZE ) {
printk ( " template (%u) too big for tvmem (%u) \n " ,
speed [ i ] . blen + speed [ i ] . klen , TVMEMSIZE ) ;
goto out ;
}
printk ( " test %u (%d bit key, %d byte blocks): " , i ,
speed [ i ] . klen * 8 , speed [ i ] . blen ) ;
memset ( tvmem , 0xff , speed [ i ] . klen + speed [ i ] . blen ) ;
/* set key, plain text and IV */
key = ( unsigned char * ) tvmem ;
2005-06-23 00:27:51 +04:00
for ( j = 0 ; j < tcount ; j + + ) {
if ( template [ j ] . klen = = speed [ i ] . klen ) {
key = template [ j ] . key ;
break ;
}
}
2005-06-23 00:27:23 +04:00
p = ( unsigned char * ) tvmem + speed [ i ] . klen ;
2006-08-13 02:26:09 +04:00
ret = crypto_blkcipher_setkey ( tfm , key , speed [ i ] . klen ) ;
2005-06-23 00:27:23 +04:00
if ( ret ) {
2006-08-13 02:26:09 +04:00
printk ( " setkey() failed flags=%x \n " ,
crypto_blkcipher_get_flags ( tfm ) ) ;
2005-06-23 00:27:23 +04:00
goto out ;
}
2006-08-13 02:26:09 +04:00
iv_len = crypto_blkcipher_ivsize ( tfm ) ;
if ( iv_len ) {
2005-06-23 00:27:23 +04:00
memset ( & iv , 0xff , iv_len ) ;
2006-08-13 02:26:09 +04:00
crypto_blkcipher_set_iv ( tfm , iv , iv_len ) ;
2005-06-23 00:27:23 +04:00
}
2005-06-23 00:29:03 +04:00
if ( sec )
2006-08-13 02:26:09 +04:00
ret = test_cipher_jiffies ( & desc , enc , p , speed [ i ] . blen ,
2005-06-23 00:29:03 +04:00
sec ) ;
else
2006-08-13 02:26:09 +04:00
ret = test_cipher_cycles ( & desc , enc , p , speed [ i ] . blen ) ;
2005-06-23 00:27:23 +04:00
2005-06-23 00:29:03 +04:00
if ( ret ) {
2006-08-13 02:26:09 +04:00
printk ( " %s() failed flags=%x \n " , e , desc . flags ) ;
2005-06-23 00:29:03 +04:00
break ;
2005-06-23 00:27:23 +04:00
}
}
out :
2006-08-13 02:26:09 +04:00
crypto_free_blkcipher ( tfm ) ;
2005-06-23 00:27:23 +04:00
}
2006-08-19 15:38:49 +04:00
static int test_hash_jiffies_digest ( struct hash_desc * desc , char * p , int blen ,
char * out , int sec )
{
struct scatterlist sg [ 1 ] ;
unsigned long start , end ;
int bcount ;
int ret ;
2007-10-27 11:51:21 +04:00
sg_init_table ( sg , 1 ) ;
2006-08-19 15:38:49 +04:00
for ( start = jiffies , end = start + sec * HZ , bcount = 0 ;
time_before ( jiffies , end ) ; bcount + + ) {
2007-10-27 11:51:21 +04:00
sg_set_buf ( sg , p , blen ) ;
2006-08-19 15:38:49 +04:00
ret = crypto_hash_digest ( desc , sg , blen , out ) ;
if ( ret )
return ret ;
}
printk ( " %6u opers/sec, %9lu bytes/sec \n " ,
bcount / sec , ( ( long ) bcount * blen ) / sec ) ;
return 0 ;
}
static int test_hash_jiffies ( struct hash_desc * desc , char * p , int blen ,
int plen , char * out , int sec )
2006-05-30 16:04:19 +04:00
{
struct scatterlist sg [ 1 ] ;
unsigned long start , end ;
int bcount , pcount ;
2006-08-19 15:38:49 +04:00
int ret ;
if ( plen = = blen )
return test_hash_jiffies_digest ( desc , p , blen , out , sec ) ;
2006-05-30 16:04:19 +04:00
2007-10-27 11:51:21 +04:00
sg_init_table ( sg , 1 ) ;
2006-05-30 16:04:19 +04:00
for ( start = jiffies , end = start + sec * HZ , bcount = 0 ;
time_before ( jiffies , end ) ; bcount + + ) {
2006-08-19 15:38:49 +04:00
ret = crypto_hash_init ( desc ) ;
if ( ret )
return ret ;
2006-05-30 16:04:19 +04:00
for ( pcount = 0 ; pcount < blen ; pcount + = plen ) {
2007-10-27 11:51:21 +04:00
sg_set_buf ( sg , p + pcount , plen ) ;
2006-08-19 15:38:49 +04:00
ret = crypto_hash_update ( desc , sg , plen ) ;
if ( ret )
return ret ;
2006-05-30 16:04:19 +04:00
}
/* we assume there is enough space in 'out' for the result */
2006-08-19 15:38:49 +04:00
ret = crypto_hash_final ( desc , out ) ;
if ( ret )
return ret ;
2006-05-30 16:04:19 +04:00
}
printk ( " %6u opers/sec, %9lu bytes/sec \n " ,
bcount / sec , ( ( long ) bcount * blen ) / sec ) ;
2006-08-19 15:38:49 +04:00
return 0 ;
}
static int test_hash_cycles_digest ( struct hash_desc * desc , char * p , int blen ,
char * out )
{
struct scatterlist sg [ 1 ] ;
unsigned long cycles = 0 ;
int i ;
int ret ;
2007-10-27 11:51:21 +04:00
sg_init_table ( sg , 1 ) ;
2006-08-19 15:38:49 +04:00
local_bh_disable ( ) ;
local_irq_disable ( ) ;
/* Warm-up run. */
for ( i = 0 ; i < 4 ; i + + ) {
2007-10-27 11:51:21 +04:00
sg_set_buf ( sg , p , blen ) ;
2006-08-19 15:38:49 +04:00
ret = crypto_hash_digest ( desc , sg , blen , out ) ;
if ( ret )
goto out ;
}
/* The real thing. */
for ( i = 0 ; i < 8 ; i + + ) {
cycles_t start , end ;
start = get_cycles ( ) ;
2007-10-27 11:51:21 +04:00
sg_set_buf ( sg , p , blen ) ;
2006-08-19 15:38:49 +04:00
ret = crypto_hash_digest ( desc , sg , blen , out ) ;
if ( ret )
goto out ;
end = get_cycles ( ) ;
cycles + = end - start ;
}
out :
local_irq_enable ( ) ;
local_bh_enable ( ) ;
if ( ret )
return ret ;
printk ( " %6lu cycles/operation, %4lu cycles/byte \n " ,
cycles / 8 , cycles / ( 8 * blen ) ) ;
return 0 ;
2006-05-30 16:04:19 +04:00
}
2006-08-19 15:38:49 +04:00
static int test_hash_cycles ( struct hash_desc * desc , char * p , int blen ,
int plen , char * out )
2006-05-30 16:04:19 +04:00
{
struct scatterlist sg [ 1 ] ;
unsigned long cycles = 0 ;
int i , pcount ;
2006-08-19 15:38:49 +04:00
int ret ;
if ( plen = = blen )
return test_hash_cycles_digest ( desc , p , blen , out ) ;
2006-05-30 16:04:19 +04:00
2007-10-27 11:51:21 +04:00
sg_init_table ( sg , 1 ) ;
2006-05-30 16:04:19 +04:00
local_bh_disable ( ) ;
local_irq_disable ( ) ;
/* Warm-up run. */
for ( i = 0 ; i < 4 ; i + + ) {
2006-08-19 15:38:49 +04:00
ret = crypto_hash_init ( desc ) ;
if ( ret )
goto out ;
2006-05-30 16:04:19 +04:00
for ( pcount = 0 ; pcount < blen ; pcount + = plen ) {
2007-10-27 11:51:21 +04:00
sg_set_buf ( sg , p + pcount , plen ) ;
2006-08-19 15:38:49 +04:00
ret = crypto_hash_update ( desc , sg , plen ) ;
if ( ret )
goto out ;
2006-05-30 16:04:19 +04:00
}
2007-05-18 10:25:19 +04:00
ret = crypto_hash_final ( desc , out ) ;
2006-08-19 15:38:49 +04:00
if ( ret )
goto out ;
2006-05-30 16:04:19 +04:00
}
/* The real thing. */
for ( i = 0 ; i < 8 ; i + + ) {
cycles_t start , end ;
start = get_cycles ( ) ;
2006-08-19 15:38:49 +04:00
ret = crypto_hash_init ( desc ) ;
if ( ret )
goto out ;
2006-05-30 16:04:19 +04:00
for ( pcount = 0 ; pcount < blen ; pcount + = plen ) {
2007-10-27 11:51:21 +04:00
sg_set_buf ( sg , p + pcount , plen ) ;
2006-08-19 15:38:49 +04:00
ret = crypto_hash_update ( desc , sg , plen ) ;
if ( ret )
goto out ;
2006-05-30 16:04:19 +04:00
}
2006-08-19 15:38:49 +04:00
ret = crypto_hash_final ( desc , out ) ;
if ( ret )
goto out ;
2006-05-30 16:04:19 +04:00
end = get_cycles ( ) ;
cycles + = end - start ;
}
2006-08-19 15:38:49 +04:00
out :
2006-05-30 16:04:19 +04:00
local_irq_enable ( ) ;
local_bh_enable ( ) ;
2006-08-19 15:38:49 +04:00
if ( ret )
return ret ;
2006-05-30 16:04:19 +04:00
printk ( " %6lu cycles/operation, %4lu cycles/byte \n " ,
cycles / 8 , cycles / ( 8 * blen ) ) ;
2006-08-19 15:38:49 +04:00
return 0 ;
2006-05-30 16:04:19 +04:00
}
2006-08-19 15:38:49 +04:00
static void test_hash_speed ( char * algo , unsigned int sec ,
struct hash_speed * speed )
2006-05-30 16:04:19 +04:00
{
2006-08-19 15:38:49 +04:00
struct crypto_hash * tfm ;
struct hash_desc desc ;
2006-05-30 16:04:19 +04:00
char output [ 1024 ] ;
int i ;
2006-08-19 15:38:49 +04:00
int ret ;
2006-05-30 16:04:19 +04:00
printk ( " \n testing speed of %s \n " , algo ) ;
2006-08-19 15:38:49 +04:00
tfm = crypto_alloc_hash ( algo , 0 , CRYPTO_ALG_ASYNC ) ;
2006-05-30 16:04:19 +04:00
2006-08-19 15:38:49 +04:00
if ( IS_ERR ( tfm ) ) {
printk ( " failed to load transform for %s: %ld \n " , algo ,
PTR_ERR ( tfm ) ) ;
2006-05-30 16:04:19 +04:00
return ;
}
2006-08-19 15:38:49 +04:00
desc . tfm = tfm ;
desc . flags = 0 ;
if ( crypto_hash_digestsize ( tfm ) > sizeof ( output ) ) {
2006-05-30 16:04:19 +04:00
printk ( " digestsize(%u) > outputbuffer(%zu) \n " ,
2006-08-19 15:38:49 +04:00
crypto_hash_digestsize ( tfm ) , sizeof ( output ) ) ;
2006-05-30 16:04:19 +04:00
goto out ;
}
for ( i = 0 ; speed [ i ] . blen ! = 0 ; i + + ) {
if ( speed [ i ] . blen > TVMEMSIZE ) {
printk ( " template (%u) too big for tvmem (%u) \n " ,
speed [ i ] . blen , TVMEMSIZE ) ;
goto out ;
}
printk ( " test%3u (%5u byte blocks,%5u bytes per update,%4u updates): " ,
i , speed [ i ] . blen , speed [ i ] . plen , speed [ i ] . blen / speed [ i ] . plen ) ;
memset ( tvmem , 0xff , speed [ i ] . blen ) ;
if ( sec )
2006-08-19 15:38:49 +04:00
ret = test_hash_jiffies ( & desc , tvmem , speed [ i ] . blen ,
speed [ i ] . plen , output , sec ) ;
2006-05-30 16:04:19 +04:00
else
2006-08-19 15:38:49 +04:00
ret = test_hash_cycles ( & desc , tvmem , speed [ i ] . blen ,
speed [ i ] . plen , output ) ;
if ( ret ) {
printk ( " hashing failed ret=%d \n " , ret ) ;
break ;
}
2006-05-30 16:04:19 +04:00
}
out :
2006-08-19 15:38:49 +04:00
crypto_free_hash ( tfm ) ;
2006-05-30 16:04:19 +04:00
}
2005-06-23 00:26:03 +04:00
static void test_deflate ( void )
2005-04-17 02:20:36 +04:00
{
unsigned int i ;
char result [ COMP_BUF_SIZE ] ;
2006-08-26 12:12:40 +04:00
struct crypto_comp * tfm ;
2005-04-17 02:20:36 +04:00
struct comp_testvec * tv ;
unsigned int tsize ;
printk ( " \n testing deflate compression \n " ) ;
tsize = sizeof ( deflate_comp_tv_template ) ;
if ( tsize > TVMEMSIZE ) {
printk ( " template (%u) too big for tvmem (%u) \n " , tsize ,
TVMEMSIZE ) ;
return ;
}
memcpy ( tvmem , deflate_comp_tv_template , tsize ) ;
2005-06-23 00:26:03 +04:00
tv = ( void * ) tvmem ;
2005-04-17 02:20:36 +04:00
2006-12-17 00:57:38 +03:00
tfm = crypto_alloc_comp ( " deflate " , 0 , CRYPTO_ALG_ASYNC ) ;
2007-03-21 00:58:43 +03:00
if ( IS_ERR ( tfm ) ) {
2005-04-17 02:20:36 +04:00
printk ( " failed to load transform for deflate \n " ) ;
return ;
}
for ( i = 0 ; i < DEFLATE_COMP_TEST_VECTORS ; i + + ) {
int ilen , ret , dlen = COMP_BUF_SIZE ;
2005-06-23 00:26:03 +04:00
2005-04-17 02:20:36 +04:00
printk ( " test %u: \n " , i + 1 ) ;
memset ( result , 0 , sizeof ( result ) ) ;
ilen = tv [ i ] . inlen ;
ret = crypto_comp_compress ( tfm , tv [ i ] . input ,
ilen , result , & dlen ) ;
if ( ret ) {
printk ( " fail: ret=%d \n " , ret ) ;
continue ;
}
hexdump ( result , dlen ) ;
printk ( " %s (ratio %d:%d) \n " ,
memcmp ( result , tv [ i ] . output , dlen ) ? " fail " : " pass " ,
ilen , dlen ) ;
}
printk ( " \n testing deflate decompression \n " ) ;
tsize = sizeof ( deflate_decomp_tv_template ) ;
if ( tsize > TVMEMSIZE ) {
printk ( " template (%u) too big for tvmem (%u) \n " , tsize ,
TVMEMSIZE ) ;
goto out ;
}
memcpy ( tvmem , deflate_decomp_tv_template , tsize ) ;
2005-06-23 00:26:03 +04:00
tv = ( void * ) tvmem ;
2005-04-17 02:20:36 +04:00
for ( i = 0 ; i < DEFLATE_DECOMP_TEST_VECTORS ; i + + ) {
int ilen , ret , dlen = COMP_BUF_SIZE ;
2005-06-23 00:26:03 +04:00
2005-04-17 02:20:36 +04:00
printk ( " test %u: \n " , i + 1 ) ;
memset ( result , 0 , sizeof ( result ) ) ;
ilen = tv [ i ] . inlen ;
ret = crypto_comp_decompress ( tfm , tv [ i ] . input ,
ilen , result , & dlen ) ;
if ( ret ) {
printk ( " fail: ret=%d \n " , ret ) ;
continue ;
}
hexdump ( result , dlen ) ;
printk ( " %s (ratio %d:%d) \n " ,
memcmp ( result , tv [ i ] . output , dlen ) ? " fail " : " pass " ,
ilen , dlen ) ;
}
out :
2006-08-26 12:12:40 +04:00
crypto_free_comp ( tfm ) ;
2005-04-17 02:20:36 +04:00
}
2005-06-23 00:26:03 +04:00
static void test_available ( void )
2005-04-17 02:20:36 +04:00
{
char * * name = check ;
2005-06-23 00:26:03 +04:00
2005-04-17 02:20:36 +04:00
while ( * name ) {
printk ( " alg %s " , * name ) ;
2007-04-04 11:41:07 +04:00
printk ( crypto_has_alg ( * name , 0 , 0 ) ?
2006-08-26 12:12:40 +04:00
" found \n " : " not found \n " ) ;
2005-04-17 02:20:36 +04:00
name + + ;
2005-06-23 00:26:03 +04:00
}
2005-04-17 02:20:36 +04:00
}
2005-06-23 00:26:03 +04:00
static void do_test ( void )
2005-04-17 02:20:36 +04:00
{
switch ( mode ) {
case 0 :
test_hash ( " md5 " , md5_tv_template , MD5_TEST_VECTORS ) ;
2005-06-23 00:26:03 +04:00
2005-04-17 02:20:36 +04:00
test_hash ( " sha1 " , sha1_tv_template , SHA1_TEST_VECTORS ) ;
2005-06-23 00:26:03 +04:00
2005-04-17 02:20:36 +04:00
//DES
2006-08-13 02:26:09 +04:00
test_cipher ( " ecb(des) " , ENCRYPT , des_enc_tv_template ,
DES_ENC_TEST_VECTORS ) ;
test_cipher ( " ecb(des) " , DECRYPT , des_dec_tv_template ,
DES_DEC_TEST_VECTORS ) ;
test_cipher ( " cbc(des) " , ENCRYPT , des_cbc_enc_tv_template ,
DES_CBC_ENC_TEST_VECTORS ) ;
test_cipher ( " cbc(des) " , DECRYPT , des_cbc_dec_tv_template ,
DES_CBC_DEC_TEST_VECTORS ) ;
2005-06-23 00:26:03 +04:00
2005-04-17 02:20:36 +04:00
//DES3_EDE
2006-08-13 02:26:09 +04:00
test_cipher ( " ecb(des3_ede) " , ENCRYPT , des3_ede_enc_tv_template ,
DES3_EDE_ENC_TEST_VECTORS ) ;
test_cipher ( " ecb(des3_ede) " , DECRYPT , des3_ede_dec_tv_template ,
DES3_EDE_DEC_TEST_VECTORS ) ;
2005-06-23 00:26:03 +04:00
2005-04-17 02:20:36 +04:00
test_hash ( " md4 " , md4_tv_template , MD4_TEST_VECTORS ) ;
2005-06-23 00:26:03 +04:00
2007-11-10 15:08:25 +03:00
test_hash ( " sha224 " , sha224_tv_template , SHA224_TEST_VECTORS ) ;
2005-04-17 02:20:36 +04:00
test_hash ( " sha256 " , sha256_tv_template , SHA256_TEST_VECTORS ) ;
2005-06-23 00:26:03 +04:00
2005-04-17 02:20:36 +04:00
//BLOWFISH
2006-08-13 02:26:09 +04:00
test_cipher ( " ecb(blowfish) " , ENCRYPT , bf_enc_tv_template ,
BF_ENC_TEST_VECTORS ) ;
test_cipher ( " ecb(blowfish) " , DECRYPT , bf_dec_tv_template ,
BF_DEC_TEST_VECTORS ) ;
test_cipher ( " cbc(blowfish) " , ENCRYPT , bf_cbc_enc_tv_template ,
BF_CBC_ENC_TEST_VECTORS ) ;
test_cipher ( " cbc(blowfish) " , DECRYPT , bf_cbc_dec_tv_template ,
BF_CBC_DEC_TEST_VECTORS ) ;
2005-06-23 00:26:03 +04:00
2005-04-17 02:20:36 +04:00
//TWOFISH
2006-08-13 02:26:09 +04:00
test_cipher ( " ecb(twofish) " , ENCRYPT , tf_enc_tv_template ,
TF_ENC_TEST_VECTORS ) ;
test_cipher ( " ecb(twofish) " , DECRYPT , tf_dec_tv_template ,
TF_DEC_TEST_VECTORS ) ;
test_cipher ( " cbc(twofish) " , ENCRYPT , tf_cbc_enc_tv_template ,
TF_CBC_ENC_TEST_VECTORS ) ;
test_cipher ( " cbc(twofish) " , DECRYPT , tf_cbc_dec_tv_template ,
TF_CBC_DEC_TEST_VECTORS ) ;
2005-06-23 00:26:03 +04:00
2005-04-17 02:20:36 +04:00
//SERPENT
2006-08-13 02:26:09 +04:00
test_cipher ( " ecb(serpent) " , ENCRYPT , serpent_enc_tv_template ,
SERPENT_ENC_TEST_VECTORS ) ;
test_cipher ( " ecb(serpent) " , DECRYPT , serpent_dec_tv_template ,
SERPENT_DEC_TEST_VECTORS ) ;
2005-06-23 00:26:03 +04:00
2005-04-17 02:20:36 +04:00
//TNEPRES
2006-08-13 02:26:09 +04:00
test_cipher ( " ecb(tnepres) " , ENCRYPT , tnepres_enc_tv_template ,
TNEPRES_ENC_TEST_VECTORS ) ;
test_cipher ( " ecb(tnepres) " , DECRYPT , tnepres_dec_tv_template ,
TNEPRES_DEC_TEST_VECTORS ) ;
2005-04-17 02:20:36 +04:00
//AES
2006-08-13 02:26:09 +04:00
test_cipher ( " ecb(aes) " , ENCRYPT , aes_enc_tv_template ,
AES_ENC_TEST_VECTORS ) ;
test_cipher ( " ecb(aes) " , DECRYPT , aes_dec_tv_template ,
AES_DEC_TEST_VECTORS ) ;
test_cipher ( " cbc(aes) " , ENCRYPT , aes_cbc_enc_tv_template ,
AES_CBC_ENC_TEST_VECTORS ) ;
test_cipher ( " cbc(aes) " , DECRYPT , aes_cbc_dec_tv_template ,
AES_CBC_DEC_TEST_VECTORS ) ;
2006-11-29 11:01:41 +03:00
test_cipher ( " lrw(aes) " , ENCRYPT , aes_lrw_enc_tv_template ,
AES_LRW_ENC_TEST_VECTORS ) ;
test_cipher ( " lrw(aes) " , DECRYPT , aes_lrw_dec_tv_template ,
AES_LRW_DEC_TEST_VECTORS ) ;
2007-09-19 16:23:13 +04:00
test_cipher ( " xts(aes) " , ENCRYPT , aes_xts_enc_tv_template ,
AES_XTS_ENC_TEST_VECTORS ) ;
test_cipher ( " xts(aes) " , DECRYPT , aes_xts_dec_tv_template ,
AES_XTS_DEC_TEST_VECTORS ) ;
[CRYPTO] ctr: Add countersize
This patch adds countersize to CTR mode.
The template is now ctr(algo,noncesize,ivsize,countersize).
For example, ctr(aes,4,8,4) indicates the counterblock
will be composed of a salt/nonce that is 4 bytes, an iv
that is 8 bytes and the counter is 4 bytes.
When noncesize + ivsize < blocksize, CTR initializes the
last block - ivsize - noncesize portion of the block to
zero. Otherwise the counter block is composed of the IV
(and nonce if necessary).
If noncesize + ivsize == blocksize, then this indicates that
user is passing in entire counterblock. Thus countersize
indicates the amount of bytes in counterblock to use as
the counter for incrementing. CTR will increment counter
portion by 1, and begin encryption with that value.
Note that CTR assumes the counter portion of the block that
will be incremented is stored in big endian.
Signed-off-by: Joy Latten <latten@austin.ibm.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2007-11-07 17:59:47 +03:00
test_cipher ( " ctr(aes,4,8,4) " , ENCRYPT , aes_ctr_enc_tv_template ,
[CRYPTO] ctr: Add CTR (Counter) block cipher mode
This patch implements CTR mode for IPsec.
It is based off of RFC 3686.
Please note:
1. CTR turns a block cipher into a stream cipher.
Encryption is done in blocks, however the last block
may be a partial block.
A "counter block" is encrypted, creating a keystream
that is xor'ed with the plaintext. The counter portion
of the counter block is incremented after each block
of plaintext is encrypted.
Decryption is performed in same manner.
2. The CTR counterblock is composed of,
nonce + IV + counter
The size of the counterblock is equivalent to the
blocksize of the cipher.
sizeof(nonce) + sizeof(IV) + sizeof(counter) = blocksize
The CTR template requires the name of the cipher
algorithm, the sizeof the nonce, and the sizeof the iv.
ctr(cipher,sizeof_nonce,sizeof_iv)
So for example,
ctr(aes,4,8)
specifies the counterblock will be composed of 4 bytes
from a nonce, 8 bytes from the iv, and 4 bytes for counter
since aes has a blocksize of 16 bytes.
3. The counter portion of the counter block is stored
in big endian for conformance to rfc 3686.
Signed-off-by: Joy Latten <latten@austin.ibm.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2007-10-23 04:50:32 +04:00
AES_CTR_ENC_TEST_VECTORS ) ;
[CRYPTO] ctr: Add countersize
This patch adds countersize to CTR mode.
The template is now ctr(algo,noncesize,ivsize,countersize).
For example, ctr(aes,4,8,4) indicates the counterblock
will be composed of a salt/nonce that is 4 bytes, an iv
that is 8 bytes and the counter is 4 bytes.
When noncesize + ivsize < blocksize, CTR initializes the
last block - ivsize - noncesize portion of the block to
zero. Otherwise the counter block is composed of the IV
(and nonce if necessary).
If noncesize + ivsize == blocksize, then this indicates that
user is passing in entire counterblock. Thus countersize
indicates the amount of bytes in counterblock to use as
the counter for incrementing. CTR will increment counter
portion by 1, and begin encryption with that value.
Note that CTR assumes the counter portion of the block that
will be incremented is stored in big endian.
Signed-off-by: Joy Latten <latten@austin.ibm.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2007-11-07 17:59:47 +03:00
test_cipher ( " ctr(aes,4,8,4) " , DECRYPT , aes_ctr_dec_tv_template ,
[CRYPTO] ctr: Add CTR (Counter) block cipher mode
This patch implements CTR mode for IPsec.
It is based off of RFC 3686.
Please note:
1. CTR turns a block cipher into a stream cipher.
Encryption is done in blocks, however the last block
may be a partial block.
A "counter block" is encrypted, creating a keystream
that is xor'ed with the plaintext. The counter portion
of the counter block is incremented after each block
of plaintext is encrypted.
Decryption is performed in same manner.
2. The CTR counterblock is composed of,
nonce + IV + counter
The size of the counterblock is equivalent to the
blocksize of the cipher.
sizeof(nonce) + sizeof(IV) + sizeof(counter) = blocksize
The CTR template requires the name of the cipher
algorithm, the sizeof the nonce, and the sizeof the iv.
ctr(cipher,sizeof_nonce,sizeof_iv)
So for example,
ctr(aes,4,8)
specifies the counterblock will be composed of 4 bytes
from a nonce, 8 bytes from the iv, and 4 bytes for counter
since aes has a blocksize of 16 bytes.
3. The counter portion of the counter block is stored
in big endian for conformance to rfc 3686.
Signed-off-by: Joy Latten <latten@austin.ibm.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2007-10-23 04:50:32 +04:00
AES_CTR_DEC_TEST_VECTORS ) ;
2007-11-26 17:24:11 +03:00
test_aead ( " gcm(aes) " , ENCRYPT , aes_gcm_enc_tv_template ,
AES_GCM_ENC_TEST_VECTORS ) ;
test_aead ( " gcm(aes) " , DECRYPT , aes_gcm_dec_tv_template ,
AES_GCM_DEC_TEST_VECTORS ) ;
2005-04-17 02:20:36 +04:00
//CAST5
2006-08-13 02:26:09 +04:00
test_cipher ( " ecb(cast5) " , ENCRYPT , cast5_enc_tv_template ,
CAST5_ENC_TEST_VECTORS ) ;
test_cipher ( " ecb(cast5) " , DECRYPT , cast5_dec_tv_template ,
CAST5_DEC_TEST_VECTORS ) ;
2005-06-23 00:26:03 +04:00
2005-04-17 02:20:36 +04:00
//CAST6
2006-08-13 02:26:09 +04:00
test_cipher ( " ecb(cast6) " , ENCRYPT , cast6_enc_tv_template ,
CAST6_ENC_TEST_VECTORS ) ;
test_cipher ( " ecb(cast6) " , DECRYPT , cast6_dec_tv_template ,
CAST6_DEC_TEST_VECTORS ) ;
2005-04-17 02:20:36 +04:00
//ARC4
2006-08-13 02:26:09 +04:00
test_cipher ( " ecb(arc4) " , ENCRYPT , arc4_enc_tv_template ,
ARC4_ENC_TEST_VECTORS ) ;
test_cipher ( " ecb(arc4) " , DECRYPT , arc4_dec_tv_template ,
ARC4_DEC_TEST_VECTORS ) ;
2005-04-17 02:20:36 +04:00
//TEA
2006-08-13 02:26:09 +04:00
test_cipher ( " ecb(tea) " , ENCRYPT , tea_enc_tv_template ,
TEA_ENC_TEST_VECTORS ) ;
test_cipher ( " ecb(tea) " , DECRYPT , tea_dec_tv_template ,
TEA_DEC_TEST_VECTORS ) ;
2005-04-17 02:20:36 +04:00
//XTEA
2006-08-13 02:26:09 +04:00
test_cipher ( " ecb(xtea) " , ENCRYPT , xtea_enc_tv_template ,
XTEA_ENC_TEST_VECTORS ) ;
test_cipher ( " ecb(xtea) " , DECRYPT , xtea_dec_tv_template ,
XTEA_DEC_TEST_VECTORS ) ;
2005-04-17 02:20:36 +04:00
//KHAZAD
2006-08-13 02:26:09 +04:00
test_cipher ( " ecb(khazad) " , ENCRYPT , khazad_enc_tv_template ,
KHAZAD_ENC_TEST_VECTORS ) ;
test_cipher ( " ecb(khazad) " , DECRYPT , khazad_dec_tv_template ,
KHAZAD_DEC_TEST_VECTORS ) ;
2005-04-17 02:20:36 +04:00
//ANUBIS
2006-08-13 02:26:09 +04:00
test_cipher ( " ecb(anubis) " , ENCRYPT , anubis_enc_tv_template ,
ANUBIS_ENC_TEST_VECTORS ) ;
test_cipher ( " ecb(anubis) " , DECRYPT , anubis_dec_tv_template ,
ANUBIS_DEC_TEST_VECTORS ) ;
test_cipher ( " cbc(anubis) " , ENCRYPT , anubis_cbc_enc_tv_template ,
ANUBIS_CBC_ENC_TEST_VECTORS ) ;
test_cipher ( " cbc(anubis) " , DECRYPT , anubis_cbc_dec_tv_template ,
ANUBIS_CBC_ENC_TEST_VECTORS ) ;
2005-04-17 02:20:36 +04:00
2005-09-02 04:42:46 +04:00
//XETA
2006-08-13 02:26:09 +04:00
test_cipher ( " ecb(xeta) " , ENCRYPT , xeta_enc_tv_template ,
XETA_ENC_TEST_VECTORS ) ;
test_cipher ( " ecb(xeta) " , DECRYPT , xeta_dec_tv_template ,
XETA_DEC_TEST_VECTORS ) ;
2005-09-02 04:42:46 +04:00
2006-12-16 04:13:14 +03:00
//FCrypt
test_cipher ( " pcbc(fcrypt) " , ENCRYPT , fcrypt_pcbc_enc_tv_template ,
FCRYPT_ENC_TEST_VECTORS ) ;
test_cipher ( " pcbc(fcrypt) " , DECRYPT , fcrypt_pcbc_dec_tv_template ,
FCRYPT_DEC_TEST_VECTORS ) ;
2007-01-24 13:48:19 +03:00
//CAMELLIA
test_cipher ( " ecb(camellia) " , ENCRYPT ,
camellia_enc_tv_template ,
CAMELLIA_ENC_TEST_VECTORS ) ;
test_cipher ( " ecb(camellia) " , DECRYPT ,
camellia_dec_tv_template ,
CAMELLIA_DEC_TEST_VECTORS ) ;
test_cipher ( " cbc(camellia) " , ENCRYPT ,
camellia_cbc_enc_tv_template ,
CAMELLIA_CBC_ENC_TEST_VECTORS ) ;
test_cipher ( " cbc(camellia) " , DECRYPT ,
camellia_cbc_dec_tv_template ,
CAMELLIA_CBC_DEC_TEST_VECTORS ) ;
2007-08-21 16:01:03 +04:00
//SEED
test_cipher ( " ecb(seed) " , ENCRYPT , seed_enc_tv_template ,
SEED_ENC_TEST_VECTORS ) ;
test_cipher ( " ecb(seed) " , DECRYPT , seed_dec_tv_template ,
SEED_DEC_TEST_VECTORS ) ;
2005-04-17 02:20:36 +04:00
test_hash ( " sha384 " , sha384_tv_template , SHA384_TEST_VECTORS ) ;
test_hash ( " sha512 " , sha512_tv_template , SHA512_TEST_VECTORS ) ;
test_hash ( " wp512 " , wp512_tv_template , WP512_TEST_VECTORS ) ;
test_hash ( " wp384 " , wp384_tv_template , WP384_TEST_VECTORS ) ;
test_hash ( " wp256 " , wp256_tv_template , WP256_TEST_VECTORS ) ;
test_hash ( " tgr192 " , tgr192_tv_template , TGR192_TEST_VECTORS ) ;
test_hash ( " tgr160 " , tgr160_tv_template , TGR160_TEST_VECTORS ) ;
test_hash ( " tgr128 " , tgr128_tv_template , TGR128_TEST_VECTORS ) ;
test_deflate ( ) ;
2006-08-21 16:04:03 +04:00
test_hash ( " crc32c " , crc32c_tv_template , CRC32C_TEST_VECTORS ) ;
2006-08-19 15:38:49 +04:00
test_hash ( " hmac(md5) " , hmac_md5_tv_template ,
HMAC_MD5_TEST_VECTORS ) ;
test_hash ( " hmac(sha1) " , hmac_sha1_tv_template ,
HMAC_SHA1_TEST_VECTORS ) ;
2007-11-10 15:08:25 +03:00
test_hash ( " hmac(sha224) " , hmac_sha224_tv_template ,
HMAC_SHA224_TEST_VECTORS ) ;
2006-08-19 15:38:49 +04:00
test_hash ( " hmac(sha256) " , hmac_sha256_tv_template ,
HMAC_SHA256_TEST_VECTORS ) ;
2006-12-10 04:10:20 +03:00
test_hash ( " hmac(sha384) " , hmac_sha384_tv_template ,
HMAC_SHA384_TEST_VECTORS ) ;
test_hash ( " hmac(sha512) " , hmac_sha512_tv_template ,
HMAC_SHA512_TEST_VECTORS ) ;
2005-04-17 02:20:36 +04:00
2006-10-28 07:18:53 +04:00
test_hash ( " xcbc(aes) " , aes_xcbc128_tv_template ,
XCBC_AES_TEST_VECTORS ) ;
2005-04-17 02:20:36 +04:00
test_hash ( " michael_mic " , michael_mic_tv_template , MICHAEL_MIC_TEST_VECTORS ) ;
break ;
case 1 :
test_hash ( " md5 " , md5_tv_template , MD5_TEST_VECTORS ) ;
break ;
case 2 :
test_hash ( " sha1 " , sha1_tv_template , SHA1_TEST_VECTORS ) ;
break ;
case 3 :
2006-08-13 02:26:09 +04:00
test_cipher ( " ecb(des) " , ENCRYPT , des_enc_tv_template ,
DES_ENC_TEST_VECTORS ) ;
test_cipher ( " ecb(des) " , DECRYPT , des_dec_tv_template ,
DES_DEC_TEST_VECTORS ) ;
test_cipher ( " cbc(des) " , ENCRYPT , des_cbc_enc_tv_template ,
DES_CBC_ENC_TEST_VECTORS ) ;
test_cipher ( " cbc(des) " , DECRYPT , des_cbc_dec_tv_template ,
DES_CBC_DEC_TEST_VECTORS ) ;
2005-04-17 02:20:36 +04:00
break ;
case 4 :
2006-08-13 02:26:09 +04:00
test_cipher ( " ecb(des3_ede) " , ENCRYPT , des3_ede_enc_tv_template ,
DES3_EDE_ENC_TEST_VECTORS ) ;
test_cipher ( " ecb(des3_ede) " , DECRYPT , des3_ede_dec_tv_template ,
DES3_EDE_DEC_TEST_VECTORS ) ;
2005-04-17 02:20:36 +04:00
break ;
case 5 :
test_hash ( " md4 " , md4_tv_template , MD4_TEST_VECTORS ) ;
break ;
2005-06-23 00:26:03 +04:00
2005-04-17 02:20:36 +04:00
case 6 :
test_hash ( " sha256 " , sha256_tv_template , SHA256_TEST_VECTORS ) ;
break ;
2005-06-23 00:26:03 +04:00
2005-04-17 02:20:36 +04:00
case 7 :
2006-08-13 02:26:09 +04:00
test_cipher ( " ecb(blowfish) " , ENCRYPT , bf_enc_tv_template ,
BF_ENC_TEST_VECTORS ) ;
test_cipher ( " ecb(blowfish) " , DECRYPT , bf_dec_tv_template ,
BF_DEC_TEST_VECTORS ) ;
test_cipher ( " cbc(blowfish) " , ENCRYPT , bf_cbc_enc_tv_template ,
BF_CBC_ENC_TEST_VECTORS ) ;
test_cipher ( " cbc(blowfish) " , DECRYPT , bf_cbc_dec_tv_template ,
BF_CBC_DEC_TEST_VECTORS ) ;
2005-04-17 02:20:36 +04:00
break ;
case 8 :
2006-08-13 02:26:09 +04:00
test_cipher ( " ecb(twofish) " , ENCRYPT , tf_enc_tv_template ,
TF_ENC_TEST_VECTORS ) ;
test_cipher ( " ecb(twofish) " , DECRYPT , tf_dec_tv_template ,
TF_DEC_TEST_VECTORS ) ;
test_cipher ( " cbc(twofish) " , ENCRYPT , tf_cbc_enc_tv_template ,
TF_CBC_ENC_TEST_VECTORS ) ;
test_cipher ( " cbc(twofish) " , DECRYPT , tf_cbc_dec_tv_template ,
TF_CBC_DEC_TEST_VECTORS ) ;
2005-04-17 02:20:36 +04:00
break ;
2005-06-23 00:26:03 +04:00
2005-04-17 02:20:36 +04:00
case 9 :
2006-08-13 02:26:09 +04:00
test_cipher ( " ecb(serpent) " , ENCRYPT , serpent_enc_tv_template ,
SERPENT_ENC_TEST_VECTORS ) ;
test_cipher ( " ecb(serpent) " , DECRYPT , serpent_dec_tv_template ,
SERPENT_DEC_TEST_VECTORS ) ;
2005-04-17 02:20:36 +04:00
break ;
case 10 :
2006-08-13 02:26:09 +04:00
test_cipher ( " ecb(aes) " , ENCRYPT , aes_enc_tv_template ,
AES_ENC_TEST_VECTORS ) ;
test_cipher ( " ecb(aes) " , DECRYPT , aes_dec_tv_template ,
AES_DEC_TEST_VECTORS ) ;
test_cipher ( " cbc(aes) " , ENCRYPT , aes_cbc_enc_tv_template ,
AES_CBC_ENC_TEST_VECTORS ) ;
test_cipher ( " cbc(aes) " , DECRYPT , aes_cbc_dec_tv_template ,
AES_CBC_DEC_TEST_VECTORS ) ;
2006-11-29 11:01:41 +03:00
test_cipher ( " lrw(aes) " , ENCRYPT , aes_lrw_enc_tv_template ,
AES_LRW_ENC_TEST_VECTORS ) ;
test_cipher ( " lrw(aes) " , DECRYPT , aes_lrw_dec_tv_template ,
AES_LRW_DEC_TEST_VECTORS ) ;
2007-09-19 16:23:13 +04:00
test_cipher ( " xts(aes) " , ENCRYPT , aes_xts_enc_tv_template ,
AES_XTS_ENC_TEST_VECTORS ) ;
test_cipher ( " xts(aes) " , DECRYPT , aes_xts_dec_tv_template ,
AES_XTS_DEC_TEST_VECTORS ) ;
[CRYPTO] ctr: Add countersize
This patch adds countersize to CTR mode.
The template is now ctr(algo,noncesize,ivsize,countersize).
For example, ctr(aes,4,8,4) indicates the counterblock
will be composed of a salt/nonce that is 4 bytes, an iv
that is 8 bytes and the counter is 4 bytes.
When noncesize + ivsize < blocksize, CTR initializes the
last block - ivsize - noncesize portion of the block to
zero. Otherwise the counter block is composed of the IV
(and nonce if necessary).
If noncesize + ivsize == blocksize, then this indicates that
user is passing in entire counterblock. Thus countersize
indicates the amount of bytes in counterblock to use as
the counter for incrementing. CTR will increment counter
portion by 1, and begin encryption with that value.
Note that CTR assumes the counter portion of the block that
will be incremented is stored in big endian.
Signed-off-by: Joy Latten <latten@austin.ibm.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2007-11-07 17:59:47 +03:00
test_cipher ( " ctr(aes,4,8,4) " , ENCRYPT , aes_ctr_enc_tv_template ,
[CRYPTO] ctr: Add CTR (Counter) block cipher mode
This patch implements CTR mode for IPsec.
It is based off of RFC 3686.
Please note:
1. CTR turns a block cipher into a stream cipher.
Encryption is done in blocks, however the last block
may be a partial block.
A "counter block" is encrypted, creating a keystream
that is xor'ed with the plaintext. The counter portion
of the counter block is incremented after each block
of plaintext is encrypted.
Decryption is performed in same manner.
2. The CTR counterblock is composed of,
nonce + IV + counter
The size of the counterblock is equivalent to the
blocksize of the cipher.
sizeof(nonce) + sizeof(IV) + sizeof(counter) = blocksize
The CTR template requires the name of the cipher
algorithm, the sizeof the nonce, and the sizeof the iv.
ctr(cipher,sizeof_nonce,sizeof_iv)
So for example,
ctr(aes,4,8)
specifies the counterblock will be composed of 4 bytes
from a nonce, 8 bytes from the iv, and 4 bytes for counter
since aes has a blocksize of 16 bytes.
3. The counter portion of the counter block is stored
in big endian for conformance to rfc 3686.
Signed-off-by: Joy Latten <latten@austin.ibm.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2007-10-23 04:50:32 +04:00
AES_CTR_ENC_TEST_VECTORS ) ;
[CRYPTO] ctr: Add countersize
This patch adds countersize to CTR mode.
The template is now ctr(algo,noncesize,ivsize,countersize).
For example, ctr(aes,4,8,4) indicates the counterblock
will be composed of a salt/nonce that is 4 bytes, an iv
that is 8 bytes and the counter is 4 bytes.
When noncesize + ivsize < blocksize, CTR initializes the
last block - ivsize - noncesize portion of the block to
zero. Otherwise the counter block is composed of the IV
(and nonce if necessary).
If noncesize + ivsize == blocksize, then this indicates that
user is passing in entire counterblock. Thus countersize
indicates the amount of bytes in counterblock to use as
the counter for incrementing. CTR will increment counter
portion by 1, and begin encryption with that value.
Note that CTR assumes the counter portion of the block that
will be incremented is stored in big endian.
Signed-off-by: Joy Latten <latten@austin.ibm.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2007-11-07 17:59:47 +03:00
test_cipher ( " ctr(aes,4,8,4) " , DECRYPT , aes_ctr_dec_tv_template ,
[CRYPTO] ctr: Add CTR (Counter) block cipher mode
This patch implements CTR mode for IPsec.
It is based off of RFC 3686.
Please note:
1. CTR turns a block cipher into a stream cipher.
Encryption is done in blocks, however the last block
may be a partial block.
A "counter block" is encrypted, creating a keystream
that is xor'ed with the plaintext. The counter portion
of the counter block is incremented after each block
of plaintext is encrypted.
Decryption is performed in same manner.
2. The CTR counterblock is composed of,
nonce + IV + counter
The size of the counterblock is equivalent to the
blocksize of the cipher.
sizeof(nonce) + sizeof(IV) + sizeof(counter) = blocksize
The CTR template requires the name of the cipher
algorithm, the sizeof the nonce, and the sizeof the iv.
ctr(cipher,sizeof_nonce,sizeof_iv)
So for example,
ctr(aes,4,8)
specifies the counterblock will be composed of 4 bytes
from a nonce, 8 bytes from the iv, and 4 bytes for counter
since aes has a blocksize of 16 bytes.
3. The counter portion of the counter block is stored
in big endian for conformance to rfc 3686.
Signed-off-by: Joy Latten <latten@austin.ibm.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2007-10-23 04:50:32 +04:00
AES_CTR_DEC_TEST_VECTORS ) ;
2005-04-17 02:20:36 +04:00
break ;
case 11 :
test_hash ( " sha384 " , sha384_tv_template , SHA384_TEST_VECTORS ) ;
break ;
2005-06-23 00:26:03 +04:00
2005-04-17 02:20:36 +04:00
case 12 :
test_hash ( " sha512 " , sha512_tv_template , SHA512_TEST_VECTORS ) ;
break ;
case 13 :
test_deflate ( ) ;
break ;
case 14 :
2006-08-13 02:26:09 +04:00
test_cipher ( " ecb(cast5) " , ENCRYPT , cast5_enc_tv_template ,
CAST5_ENC_TEST_VECTORS ) ;
test_cipher ( " ecb(cast5) " , DECRYPT , cast5_dec_tv_template ,
CAST5_DEC_TEST_VECTORS ) ;
2005-04-17 02:20:36 +04:00
break ;
case 15 :
2006-08-13 02:26:09 +04:00
test_cipher ( " ecb(cast6) " , ENCRYPT , cast6_enc_tv_template ,
CAST6_ENC_TEST_VECTORS ) ;
test_cipher ( " ecb(cast6) " , DECRYPT , cast6_dec_tv_template ,
CAST6_DEC_TEST_VECTORS ) ;
2005-04-17 02:20:36 +04:00
break ;
case 16 :
2006-08-13 02:26:09 +04:00
test_cipher ( " ecb(arc4) " , ENCRYPT , arc4_enc_tv_template ,
ARC4_ENC_TEST_VECTORS ) ;
test_cipher ( " ecb(arc4) " , DECRYPT , arc4_dec_tv_template ,
ARC4_DEC_TEST_VECTORS ) ;
2005-04-17 02:20:36 +04:00
break ;
case 17 :
test_hash ( " michael_mic " , michael_mic_tv_template , MICHAEL_MIC_TEST_VECTORS ) ;
break ;
case 18 :
2006-08-21 16:04:03 +04:00
test_hash ( " crc32c " , crc32c_tv_template , CRC32C_TEST_VECTORS ) ;
2005-04-17 02:20:36 +04:00
break ;
case 19 :
2006-08-13 02:26:09 +04:00
test_cipher ( " ecb(tea) " , ENCRYPT , tea_enc_tv_template ,
TEA_ENC_TEST_VECTORS ) ;
test_cipher ( " ecb(tea) " , DECRYPT , tea_dec_tv_template ,
TEA_DEC_TEST_VECTORS ) ;
2005-04-17 02:20:36 +04:00
break ;
case 20 :
2006-08-13 02:26:09 +04:00
test_cipher ( " ecb(xtea) " , ENCRYPT , xtea_enc_tv_template ,
XTEA_ENC_TEST_VECTORS ) ;
test_cipher ( " ecb(xtea) " , DECRYPT , xtea_dec_tv_template ,
XTEA_DEC_TEST_VECTORS ) ;
2005-04-17 02:20:36 +04:00
break ;
case 21 :
2006-08-13 02:26:09 +04:00
test_cipher ( " ecb(khazad) " , ENCRYPT , khazad_enc_tv_template ,
KHAZAD_ENC_TEST_VECTORS ) ;
test_cipher ( " ecb(khazad) " , DECRYPT , khazad_dec_tv_template ,
KHAZAD_DEC_TEST_VECTORS ) ;
2005-04-17 02:20:36 +04:00
break ;
case 22 :
test_hash ( " wp512 " , wp512_tv_template , WP512_TEST_VECTORS ) ;
break ;
case 23 :
test_hash ( " wp384 " , wp384_tv_template , WP384_TEST_VECTORS ) ;
break ;
case 24 :
test_hash ( " wp256 " , wp256_tv_template , WP256_TEST_VECTORS ) ;
break ;
case 25 :
2006-08-13 02:26:09 +04:00
test_cipher ( " ecb(tnepres) " , ENCRYPT , tnepres_enc_tv_template ,
TNEPRES_ENC_TEST_VECTORS ) ;
test_cipher ( " ecb(tnepres) " , DECRYPT , tnepres_dec_tv_template ,
TNEPRES_DEC_TEST_VECTORS ) ;
2005-04-17 02:20:36 +04:00
break ;
case 26 :
2006-08-13 02:26:09 +04:00
test_cipher ( " ecb(anubis) " , ENCRYPT , anubis_enc_tv_template ,
ANUBIS_ENC_TEST_VECTORS ) ;
test_cipher ( " ecb(anubis) " , DECRYPT , anubis_dec_tv_template ,
ANUBIS_DEC_TEST_VECTORS ) ;
test_cipher ( " cbc(anubis) " , ENCRYPT , anubis_cbc_enc_tv_template ,
ANUBIS_CBC_ENC_TEST_VECTORS ) ;
test_cipher ( " cbc(anubis) " , DECRYPT , anubis_cbc_dec_tv_template ,
ANUBIS_CBC_ENC_TEST_VECTORS ) ;
2005-04-17 02:20:36 +04:00
break ;
case 27 :
test_hash ( " tgr192 " , tgr192_tv_template , TGR192_TEST_VECTORS ) ;
break ;
case 28 :
test_hash ( " tgr160 " , tgr160_tv_template , TGR160_TEST_VECTORS ) ;
break ;
case 29 :
test_hash ( " tgr128 " , tgr128_tv_template , TGR128_TEST_VECTORS ) ;
break ;
2005-09-02 04:42:46 +04:00
case 30 :
2006-08-13 02:26:09 +04:00
test_cipher ( " ecb(xeta) " , ENCRYPT , xeta_enc_tv_template ,
XETA_ENC_TEST_VECTORS ) ;
test_cipher ( " ecb(xeta) " , DECRYPT , xeta_dec_tv_template ,
XETA_DEC_TEST_VECTORS ) ;
2005-09-02 04:42:46 +04:00
break ;
2005-04-17 02:20:36 +04:00
2006-12-16 04:13:14 +03:00
case 31 :
test_cipher ( " pcbc(fcrypt) " , ENCRYPT , fcrypt_pcbc_enc_tv_template ,
FCRYPT_ENC_TEST_VECTORS ) ;
test_cipher ( " pcbc(fcrypt) " , DECRYPT , fcrypt_pcbc_dec_tv_template ,
FCRYPT_DEC_TEST_VECTORS ) ;
break ;
2007-01-24 13:48:19 +03:00
case 32 :
test_cipher ( " ecb(camellia) " , ENCRYPT ,
camellia_enc_tv_template ,
CAMELLIA_ENC_TEST_VECTORS ) ;
test_cipher ( " ecb(camellia) " , DECRYPT ,
camellia_dec_tv_template ,
CAMELLIA_DEC_TEST_VECTORS ) ;
test_cipher ( " cbc(camellia) " , ENCRYPT ,
camellia_cbc_enc_tv_template ,
CAMELLIA_CBC_ENC_TEST_VECTORS ) ;
test_cipher ( " cbc(camellia) " , DECRYPT ,
camellia_cbc_dec_tv_template ,
CAMELLIA_CBC_DEC_TEST_VECTORS ) ;
break ;
2007-11-10 15:08:25 +03:00
case 33 :
test_hash ( " sha224 " , sha224_tv_template , SHA224_TEST_VECTORS ) ;
break ;
2007-01-24 13:48:19 +03:00
2007-11-23 14:45:00 +03:00
case 34 :
test_cipher ( " salsa20 " , ENCRYPT ,
salsa20_stream_enc_tv_template ,
SALSA20_STREAM_ENC_TEST_VECTORS ) ;
break ;
2007-12-02 06:55:47 +03:00
case 35 :
test_aead ( " gcm(aes) " , ENCRYPT , aes_gcm_enc_tv_template ,
AES_GCM_ENC_TEST_VECTORS ) ;
test_aead ( " gcm(aes) " , DECRYPT , aes_gcm_dec_tv_template ,
AES_GCM_DEC_TEST_VECTORS ) ;
break ;
2005-04-17 02:20:36 +04:00
case 100 :
2006-08-19 15:38:49 +04:00
test_hash ( " hmac(md5) " , hmac_md5_tv_template ,
HMAC_MD5_TEST_VECTORS ) ;
2005-04-17 02:20:36 +04:00
break ;
2005-06-23 00:26:03 +04:00
2005-04-17 02:20:36 +04:00
case 101 :
2006-08-19 15:38:49 +04:00
test_hash ( " hmac(sha1) " , hmac_sha1_tv_template ,
HMAC_SHA1_TEST_VECTORS ) ;
2005-04-17 02:20:36 +04:00
break ;
2005-06-23 00:26:03 +04:00
2005-04-17 02:20:36 +04:00
case 102 :
2006-08-19 15:38:49 +04:00
test_hash ( " hmac(sha256) " , hmac_sha256_tv_template ,
HMAC_SHA256_TEST_VECTORS ) ;
2005-04-17 02:20:36 +04:00
break ;
2006-12-10 04:10:20 +03:00
case 103 :
test_hash ( " hmac(sha384) " , hmac_sha384_tv_template ,
HMAC_SHA384_TEST_VECTORS ) ;
break ;
case 104 :
test_hash ( " hmac(sha512) " , hmac_sha512_tv_template ,
HMAC_SHA512_TEST_VECTORS ) ;
break ;
2007-11-10 15:08:25 +03:00
case 105 :
test_hash ( " hmac(sha224) " , hmac_sha224_tv_template ,
HMAC_SHA224_TEST_VECTORS ) ;
break ;
2005-04-17 02:20:36 +04:00
2005-06-23 00:27:23 +04:00
case 200 :
2006-08-13 02:26:09 +04:00
test_cipher_speed ( " ecb(aes) " , ENCRYPT , sec , NULL , 0 ,
2005-06-23 00:27:51 +04:00
aes_speed_template ) ;
2006-08-13 02:26:09 +04:00
test_cipher_speed ( " ecb(aes) " , DECRYPT , sec , NULL , 0 ,
2005-06-23 00:27:51 +04:00
aes_speed_template ) ;
2006-08-13 02:26:09 +04:00
test_cipher_speed ( " cbc(aes) " , ENCRYPT , sec , NULL , 0 ,
2005-06-23 00:27:51 +04:00
aes_speed_template ) ;
2006-08-13 02:26:09 +04:00
test_cipher_speed ( " cbc(aes) " , DECRYPT , sec , NULL , 0 ,
2005-06-23 00:27:51 +04:00
aes_speed_template ) ;
2006-11-29 11:01:41 +03:00
test_cipher_speed ( " lrw(aes) " , ENCRYPT , sec , NULL , 0 ,
aes_lrw_speed_template ) ;
test_cipher_speed ( " lrw(aes) " , DECRYPT , sec , NULL , 0 ,
aes_lrw_speed_template ) ;
2007-09-19 16:23:13 +04:00
test_cipher_speed ( " xts(aes) " , ENCRYPT , sec , NULL , 0 ,
aes_xts_speed_template ) ;
test_cipher_speed ( " xts(aes) " , DECRYPT , sec , NULL , 0 ,
aes_xts_speed_template ) ;
2005-06-23 00:27:23 +04:00
break ;
case 201 :
2006-08-13 02:26:09 +04:00
test_cipher_speed ( " ecb(des3_ede) " , ENCRYPT , sec ,
2005-06-23 00:27:51 +04:00
des3_ede_enc_tv_template ,
DES3_EDE_ENC_TEST_VECTORS ,
des3_ede_speed_template ) ;
2006-08-13 02:26:09 +04:00
test_cipher_speed ( " ecb(des3_ede) " , DECRYPT , sec ,
2005-06-23 00:27:51 +04:00
des3_ede_dec_tv_template ,
DES3_EDE_DEC_TEST_VECTORS ,
des3_ede_speed_template ) ;
2006-08-13 02:26:09 +04:00
test_cipher_speed ( " cbc(des3_ede) " , ENCRYPT , sec ,
2005-06-23 00:27:51 +04:00
des3_ede_enc_tv_template ,
DES3_EDE_ENC_TEST_VECTORS ,
des3_ede_speed_template ) ;
2006-08-13 02:26:09 +04:00
test_cipher_speed ( " cbc(des3_ede) " , DECRYPT , sec ,
2005-06-23 00:27:51 +04:00
des3_ede_dec_tv_template ,
DES3_EDE_DEC_TEST_VECTORS ,
des3_ede_speed_template ) ;
2005-06-23 00:27:23 +04:00
break ;
case 202 :
2006-08-13 02:26:09 +04:00
test_cipher_speed ( " ecb(twofish) " , ENCRYPT , sec , NULL , 0 ,
2005-06-23 00:27:51 +04:00
twofish_speed_template ) ;
2006-08-13 02:26:09 +04:00
test_cipher_speed ( " ecb(twofish) " , DECRYPT , sec , NULL , 0 ,
2005-06-23 00:27:51 +04:00
twofish_speed_template ) ;
2006-08-13 02:26:09 +04:00
test_cipher_speed ( " cbc(twofish) " , ENCRYPT , sec , NULL , 0 ,
2005-06-23 00:27:51 +04:00
twofish_speed_template ) ;
2006-08-13 02:26:09 +04:00
test_cipher_speed ( " cbc(twofish) " , DECRYPT , sec , NULL , 0 ,
2005-06-23 00:27:51 +04:00
twofish_speed_template ) ;
2005-06-23 00:27:23 +04:00
break ;
case 203 :
2006-08-13 02:26:09 +04:00
test_cipher_speed ( " ecb(blowfish) " , ENCRYPT , sec , NULL , 0 ,
2005-06-23 00:27:51 +04:00
blowfish_speed_template ) ;
2006-08-13 02:26:09 +04:00
test_cipher_speed ( " ecb(blowfish) " , DECRYPT , sec , NULL , 0 ,
2005-06-23 00:27:51 +04:00
blowfish_speed_template ) ;
2006-08-13 02:26:09 +04:00
test_cipher_speed ( " cbc(blowfish) " , ENCRYPT , sec , NULL , 0 ,
2005-06-23 00:27:51 +04:00
blowfish_speed_template ) ;
2006-08-13 02:26:09 +04:00
test_cipher_speed ( " cbc(blowfish) " , DECRYPT , sec , NULL , 0 ,
2005-06-23 00:27:51 +04:00
blowfish_speed_template ) ;
2005-06-23 00:27:23 +04:00
break ;
case 204 :
2006-08-13 02:26:09 +04:00
test_cipher_speed ( " ecb(des) " , ENCRYPT , sec , NULL , 0 ,
2005-06-23 00:27:51 +04:00
des_speed_template ) ;
2006-08-13 02:26:09 +04:00
test_cipher_speed ( " ecb(des) " , DECRYPT , sec , NULL , 0 ,
2005-06-23 00:27:51 +04:00
des_speed_template ) ;
2006-08-13 02:26:09 +04:00
test_cipher_speed ( " cbc(des) " , ENCRYPT , sec , NULL , 0 ,
2005-06-23 00:27:51 +04:00
des_speed_template ) ;
2006-08-13 02:26:09 +04:00
test_cipher_speed ( " cbc(des) " , DECRYPT , sec , NULL , 0 ,
2005-06-23 00:27:51 +04:00
des_speed_template ) ;
2005-06-23 00:27:23 +04:00
break ;
2007-01-24 13:48:19 +03:00
case 205 :
test_cipher_speed ( " ecb(camellia) " , ENCRYPT , sec , NULL , 0 ,
camellia_speed_template ) ;
test_cipher_speed ( " ecb(camellia) " , DECRYPT , sec , NULL , 0 ,
camellia_speed_template ) ;
test_cipher_speed ( " cbc(camellia) " , ENCRYPT , sec , NULL , 0 ,
camellia_speed_template ) ;
test_cipher_speed ( " cbc(camellia) " , DECRYPT , sec , NULL , 0 ,
camellia_speed_template ) ;
break ;
2006-05-30 16:04:19 +04:00
case 300 :
/* fall through */
case 301 :
2006-08-19 15:38:49 +04:00
test_hash_speed ( " md4 " , sec , generic_hash_speed_template ) ;
2006-05-30 16:04:19 +04:00
if ( mode > 300 & & mode < 400 ) break ;
case 302 :
2006-08-19 15:38:49 +04:00
test_hash_speed ( " md5 " , sec , generic_hash_speed_template ) ;
2006-05-30 16:04:19 +04:00
if ( mode > 300 & & mode < 400 ) break ;
case 303 :
2006-08-19 15:38:49 +04:00
test_hash_speed ( " sha1 " , sec , generic_hash_speed_template ) ;
2006-05-30 16:04:19 +04:00
if ( mode > 300 & & mode < 400 ) break ;
case 304 :
2006-08-19 15:38:49 +04:00
test_hash_speed ( " sha256 " , sec , generic_hash_speed_template ) ;
2006-05-30 16:04:19 +04:00
if ( mode > 300 & & mode < 400 ) break ;
case 305 :
2006-08-19 15:38:49 +04:00
test_hash_speed ( " sha384 " , sec , generic_hash_speed_template ) ;
2006-05-30 16:04:19 +04:00
if ( mode > 300 & & mode < 400 ) break ;
case 306 :
2006-08-19 15:38:49 +04:00
test_hash_speed ( " sha512 " , sec , generic_hash_speed_template ) ;
2006-05-30 16:04:19 +04:00
if ( mode > 300 & & mode < 400 ) break ;
case 307 :
2006-08-19 15:38:49 +04:00
test_hash_speed ( " wp256 " , sec , generic_hash_speed_template ) ;
2006-05-30 16:04:19 +04:00
if ( mode > 300 & & mode < 400 ) break ;
case 308 :
2006-08-19 15:38:49 +04:00
test_hash_speed ( " wp384 " , sec , generic_hash_speed_template ) ;
2006-05-30 16:04:19 +04:00
if ( mode > 300 & & mode < 400 ) break ;
case 309 :
2006-08-19 15:38:49 +04:00
test_hash_speed ( " wp512 " , sec , generic_hash_speed_template ) ;
2006-05-30 16:04:19 +04:00
if ( mode > 300 & & mode < 400 ) break ;
case 310 :
2006-08-19 15:38:49 +04:00
test_hash_speed ( " tgr128 " , sec , generic_hash_speed_template ) ;
2006-05-30 16:04:19 +04:00
if ( mode > 300 & & mode < 400 ) break ;
case 311 :
2006-08-19 15:38:49 +04:00
test_hash_speed ( " tgr160 " , sec , generic_hash_speed_template ) ;
2006-05-30 16:04:19 +04:00
if ( mode > 300 & & mode < 400 ) break ;
case 312 :
2006-08-19 15:38:49 +04:00
test_hash_speed ( " tgr192 " , sec , generic_hash_speed_template ) ;
2006-05-30 16:04:19 +04:00
if ( mode > 300 & & mode < 400 ) break ;
2007-11-10 15:08:25 +03:00
case 313 :
test_hash_speed ( " sha224 " , sec , generic_hash_speed_template ) ;
if ( mode > 300 & & mode < 400 ) break ;
2006-05-30 16:04:19 +04:00
case 399 :
break ;
2005-04-17 02:20:36 +04:00
case 1000 :
test_available ( ) ;
break ;
2005-06-23 00:26:03 +04:00
2005-04-17 02:20:36 +04:00
default :
/* useful for debugging */
printk ( " not testing anything \n " ) ;
break ;
}
}
2005-06-23 00:26:03 +04:00
static int __init init ( void )
2005-04-17 02:20:36 +04:00
{
2007-11-26 17:12:07 +03:00
int err = - ENOMEM ;
2005-04-17 02:20:36 +04:00
tvmem = kmalloc ( TVMEMSIZE , GFP_KERNEL ) ;
if ( tvmem = = NULL )
2007-11-26 17:12:07 +03:00
return err ;
2005-04-17 02:20:36 +04:00
xbuf = kmalloc ( XBUFSIZE , GFP_KERNEL ) ;
2007-11-26 17:12:07 +03:00
if ( xbuf = = NULL )
goto err_free_tv ;
2005-04-17 02:20:36 +04:00
2007-11-26 17:12:07 +03:00
axbuf = kmalloc ( XBUFSIZE , GFP_KERNEL ) ;
if ( axbuf = = NULL )
goto err_free_xbuf ;
2005-04-17 02:20:36 +04:00
2007-11-26 17:12:07 +03:00
do_test ( ) ;
2006-05-30 08:49:38 +04:00
/* We intentionaly return -EAGAIN to prevent keeping
* the module . It does all its work from init ( )
* and doesn ' t offer any runtime functionality
* = > we don ' t need it in the memory , do we ?
* - - mludvig
*/
2007-11-26 17:12:07 +03:00
err = - EAGAIN ;
kfree ( axbuf ) ;
err_free_xbuf :
kfree ( xbuf ) ;
err_free_tv :
kfree ( tvmem ) ;
return err ;
2005-04-17 02:20:36 +04:00
}
/*
* If an init function is provided , an exit function must also be provided
* to allow module unload .
*/
static void __exit fini ( void ) { }
module_init ( init ) ;
module_exit ( fini ) ;
module_param ( mode , int , 0 ) ;
2005-06-23 00:27:23 +04:00
module_param ( sec , uint , 0 ) ;
2005-06-23 00:29:03 +04:00
MODULE_PARM_DESC ( sec , " Length in seconds of speed tests "
" (defaults to zero which uses CPU cycles instead) " ) ;
2005-04-17 02:20:36 +04:00
MODULE_LICENSE ( " GPL " ) ;
MODULE_DESCRIPTION ( " Quick & dirty crypto testing module " ) ;
MODULE_AUTHOR ( " James Morris <jmorris@intercode.com.au> " ) ;