tcrypt.c 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951
  1. /*
  2. * Quick & dirty crypto testing module.
  3. *
  4. * This will only exist until we have a better testing mechanism
  5. * (e.g. a char device).
  6. *
  7. * Copyright (c) 2002 James Morris <jmorris@intercode.com.au>
  8. * Copyright (c) 2002 Jean-Francois Dive <jef@linuxbe.org>
  9. * Copyright (c) 2007 Nokia Siemens Networks
  10. *
  11. * This program is free software; you can redistribute it and/or modify it
  12. * under the terms of the GNU General Public License as published by the Free
  13. * Software Foundation; either version 2 of the License, or (at your option)
  14. * any later version.
  15. *
  16. */
  17. #include <crypto/hash.h>
  18. #include <linux/err.h>
  19. #include <linux/init.h>
  20. #include <linux/module.h>
  21. #include <linux/slab.h>
  22. #include <linux/scatterlist.h>
  23. #include <linux/string.h>
  24. #include <linux/moduleparam.h>
  25. #include <linux/jiffies.h>
  26. #include <linux/timex.h>
  27. #include <linux/interrupt.h>
  28. #include "tcrypt.h"
  29. #include "internal.h"
  30. /*
  31. * Need slab memory for testing (size in number of pages).
  32. */
  33. #define TVMEMSIZE 4
  34. /*
  35. * Used by test_cipher_speed()
  36. */
  37. #define ENCRYPT 1
  38. #define DECRYPT 0
  39. /*
  40. * Used by test_cipher_speed()
  41. */
  42. static unsigned int sec;
  43. static char *alg = NULL;
  44. static u32 type;
  45. static int mode;
  46. static char *tvmem[TVMEMSIZE];
  47. static char *check[] = {
  48. "des", "md5", "des3_ede", "rot13", "sha1", "sha224", "sha256",
  49. "blowfish", "twofish", "serpent", "sha384", "sha512", "md4", "aes",
  50. "cast6", "arc4", "michael_mic", "deflate", "crc32c", "tea", "xtea",
  51. "khazad", "wp512", "wp384", "wp256", "tnepres", "xeta", "fcrypt",
  52. "camellia", "seed", "salsa20", "rmd128", "rmd160", "rmd256", "rmd320",
  53. "lzo", "cts", "zlib", NULL
  54. };
  55. static int test_cipher_jiffies(struct blkcipher_desc *desc, int enc,
  56. struct scatterlist *sg, int blen, int sec)
  57. {
  58. unsigned long start, end;
  59. int bcount;
  60. int ret;
  61. for (start = jiffies, end = start + sec * HZ, bcount = 0;
  62. time_before(jiffies, end); bcount++) {
  63. if (enc)
  64. ret = crypto_blkcipher_encrypt(desc, sg, sg, blen);
  65. else
  66. ret = crypto_blkcipher_decrypt(desc, sg, sg, blen);
  67. if (ret)
  68. return ret;
  69. }
  70. printk("%d operations in %d seconds (%ld bytes)\n",
  71. bcount, sec, (long)bcount * blen);
  72. return 0;
  73. }
  74. static int test_cipher_cycles(struct blkcipher_desc *desc, int enc,
  75. struct scatterlist *sg, int blen)
  76. {
  77. unsigned long cycles = 0;
  78. int ret = 0;
  79. int i;
  80. local_bh_disable();
  81. local_irq_disable();
  82. /* Warm-up run. */
  83. for (i = 0; i < 4; i++) {
  84. if (enc)
  85. ret = crypto_blkcipher_encrypt(desc, sg, sg, blen);
  86. else
  87. ret = crypto_blkcipher_decrypt(desc, sg, sg, blen);
  88. if (ret)
  89. goto out;
  90. }
  91. /* The real thing. */
  92. for (i = 0; i < 8; i++) {
  93. cycles_t start, end;
  94. start = get_cycles();
  95. if (enc)
  96. ret = crypto_blkcipher_encrypt(desc, sg, sg, blen);
  97. else
  98. ret = crypto_blkcipher_decrypt(desc, sg, sg, blen);
  99. end = get_cycles();
  100. if (ret)
  101. goto out;
  102. cycles += end - start;
  103. }
  104. out:
  105. local_irq_enable();
  106. local_bh_enable();
  107. if (ret == 0)
  108. printk("1 operation in %lu cycles (%d bytes)\n",
  109. (cycles + 4) / 8, blen);
  110. return ret;
  111. }
  112. static u32 block_sizes[] = { 16, 64, 256, 1024, 8192, 0 };
  113. static void test_cipher_speed(const char *algo, int enc, unsigned int sec,
  114. struct cipher_speed_template *template,
  115. unsigned int tcount, u8 *keysize)
  116. {
  117. unsigned int ret, i, j, iv_len;
  118. const char *key, iv[128];
  119. struct crypto_blkcipher *tfm;
  120. struct blkcipher_desc desc;
  121. const char *e;
  122. u32 *b_size;
  123. if (enc == ENCRYPT)
  124. e = "encryption";
  125. else
  126. e = "decryption";
  127. printk("\ntesting speed of %s %s\n", algo, e);
  128. tfm = crypto_alloc_blkcipher(algo, 0, CRYPTO_ALG_ASYNC);
  129. if (IS_ERR(tfm)) {
  130. printk("failed to load transform for %s: %ld\n", algo,
  131. PTR_ERR(tfm));
  132. return;
  133. }
  134. desc.tfm = tfm;
  135. desc.flags = 0;
  136. i = 0;
  137. do {
  138. b_size = block_sizes;
  139. do {
  140. struct scatterlist sg[TVMEMSIZE];
  141. if ((*keysize + *b_size) > TVMEMSIZE * PAGE_SIZE) {
  142. printk("template (%u) too big for "
  143. "tvmem (%lu)\n", *keysize + *b_size,
  144. TVMEMSIZE * PAGE_SIZE);
  145. goto out;
  146. }
  147. printk("test %u (%d bit key, %d byte blocks): ", i,
  148. *keysize * 8, *b_size);
  149. memset(tvmem[0], 0xff, PAGE_SIZE);
  150. /* set key, plain text and IV */
  151. key = tvmem[0];
  152. for (j = 0; j < tcount; j++) {
  153. if (template[j].klen == *keysize) {
  154. key = template[j].key;
  155. break;
  156. }
  157. }
  158. ret = crypto_blkcipher_setkey(tfm, key, *keysize);
  159. if (ret) {
  160. printk("setkey() failed flags=%x\n",
  161. crypto_blkcipher_get_flags(tfm));
  162. goto out;
  163. }
  164. sg_init_table(sg, TVMEMSIZE);
  165. sg_set_buf(sg, tvmem[0] + *keysize,
  166. PAGE_SIZE - *keysize);
  167. for (j = 1; j < TVMEMSIZE; j++) {
  168. sg_set_buf(sg + j, tvmem[j], PAGE_SIZE);
  169. memset (tvmem[j], 0xff, PAGE_SIZE);
  170. }
  171. iv_len = crypto_blkcipher_ivsize(tfm);
  172. if (iv_len) {
  173. memset(&iv, 0xff, iv_len);
  174. crypto_blkcipher_set_iv(tfm, iv, iv_len);
  175. }
  176. if (sec)
  177. ret = test_cipher_jiffies(&desc, enc, sg,
  178. *b_size, sec);
  179. else
  180. ret = test_cipher_cycles(&desc, enc, sg,
  181. *b_size);
  182. if (ret) {
  183. printk("%s() failed flags=%x\n", e, desc.flags);
  184. break;
  185. }
  186. b_size++;
  187. i++;
  188. } while (*b_size);
  189. keysize++;
  190. } while (*keysize);
  191. out:
  192. crypto_free_blkcipher(tfm);
  193. }
  194. static int test_hash_jiffies_digest(struct hash_desc *desc,
  195. struct scatterlist *sg, int blen,
  196. char *out, int sec)
  197. {
  198. unsigned long start, end;
  199. int bcount;
  200. int ret;
  201. for (start = jiffies, end = start + sec * HZ, bcount = 0;
  202. time_before(jiffies, end); bcount++) {
  203. ret = crypto_hash_digest(desc, sg, blen, out);
  204. if (ret)
  205. return ret;
  206. }
  207. printk("%6u opers/sec, %9lu bytes/sec\n",
  208. bcount / sec, ((long)bcount * blen) / sec);
  209. return 0;
  210. }
  211. static int test_hash_jiffies(struct hash_desc *desc, struct scatterlist *sg,
  212. int blen, int plen, char *out, int sec)
  213. {
  214. unsigned long start, end;
  215. int bcount, pcount;
  216. int ret;
  217. if (plen == blen)
  218. return test_hash_jiffies_digest(desc, sg, blen, out, sec);
  219. for (start = jiffies, end = start + sec * HZ, bcount = 0;
  220. time_before(jiffies, end); bcount++) {
  221. ret = crypto_hash_init(desc);
  222. if (ret)
  223. return ret;
  224. for (pcount = 0; pcount < blen; pcount += plen) {
  225. ret = crypto_hash_update(desc, sg, plen);
  226. if (ret)
  227. return ret;
  228. }
  229. /* we assume there is enough space in 'out' for the result */
  230. ret = crypto_hash_final(desc, out);
  231. if (ret)
  232. return ret;
  233. }
  234. printk("%6u opers/sec, %9lu bytes/sec\n",
  235. bcount / sec, ((long)bcount * blen) / sec);
  236. return 0;
  237. }
  238. static int test_hash_cycles_digest(struct hash_desc *desc,
  239. struct scatterlist *sg, int blen, char *out)
  240. {
  241. unsigned long cycles = 0;
  242. int i;
  243. int ret;
  244. local_bh_disable();
  245. local_irq_disable();
  246. /* Warm-up run. */
  247. for (i = 0; i < 4; i++) {
  248. ret = crypto_hash_digest(desc, sg, blen, out);
  249. if (ret)
  250. goto out;
  251. }
  252. /* The real thing. */
  253. for (i = 0; i < 8; i++) {
  254. cycles_t start, end;
  255. start = get_cycles();
  256. ret = crypto_hash_digest(desc, sg, blen, out);
  257. if (ret)
  258. goto out;
  259. end = get_cycles();
  260. cycles += end - start;
  261. }
  262. out:
  263. local_irq_enable();
  264. local_bh_enable();
  265. if (ret)
  266. return ret;
  267. printk("%6lu cycles/operation, %4lu cycles/byte\n",
  268. cycles / 8, cycles / (8 * blen));
  269. return 0;
  270. }
  271. static int test_hash_cycles(struct hash_desc *desc, struct scatterlist *sg,
  272. int blen, int plen, char *out)
  273. {
  274. unsigned long cycles = 0;
  275. int i, pcount;
  276. int ret;
  277. if (plen == blen)
  278. return test_hash_cycles_digest(desc, sg, blen, out);
  279. local_bh_disable();
  280. local_irq_disable();
  281. /* Warm-up run. */
  282. for (i = 0; i < 4; i++) {
  283. ret = crypto_hash_init(desc);
  284. if (ret)
  285. goto out;
  286. for (pcount = 0; pcount < blen; pcount += plen) {
  287. ret = crypto_hash_update(desc, sg, plen);
  288. if (ret)
  289. goto out;
  290. }
  291. ret = crypto_hash_final(desc, out);
  292. if (ret)
  293. goto out;
  294. }
  295. /* The real thing. */
  296. for (i = 0; i < 8; i++) {
  297. cycles_t start, end;
  298. start = get_cycles();
  299. ret = crypto_hash_init(desc);
  300. if (ret)
  301. goto out;
  302. for (pcount = 0; pcount < blen; pcount += plen) {
  303. ret = crypto_hash_update(desc, sg, plen);
  304. if (ret)
  305. goto out;
  306. }
  307. ret = crypto_hash_final(desc, out);
  308. if (ret)
  309. goto out;
  310. end = get_cycles();
  311. cycles += end - start;
  312. }
  313. out:
  314. local_irq_enable();
  315. local_bh_enable();
  316. if (ret)
  317. return ret;
  318. printk("%6lu cycles/operation, %4lu cycles/byte\n",
  319. cycles / 8, cycles / (8 * blen));
  320. return 0;
  321. }
  322. static void test_hash_speed(const char *algo, unsigned int sec,
  323. struct hash_speed *speed)
  324. {
  325. struct scatterlist sg[TVMEMSIZE];
  326. struct crypto_hash *tfm;
  327. struct hash_desc desc;
  328. static char output[1024];
  329. int i;
  330. int ret;
  331. printk(KERN_INFO "\ntesting speed of %s\n", algo);
  332. tfm = crypto_alloc_hash(algo, 0, CRYPTO_ALG_ASYNC);
  333. if (IS_ERR(tfm)) {
  334. printk(KERN_ERR "failed to load transform for %s: %ld\n", algo,
  335. PTR_ERR(tfm));
  336. return;
  337. }
  338. desc.tfm = tfm;
  339. desc.flags = 0;
  340. if (crypto_hash_digestsize(tfm) > sizeof(output)) {
  341. printk(KERN_ERR "digestsize(%u) > outputbuffer(%zu)\n",
  342. crypto_hash_digestsize(tfm), sizeof(output));
  343. goto out;
  344. }
  345. sg_init_table(sg, TVMEMSIZE);
  346. for (i = 0; i < TVMEMSIZE; i++) {
  347. sg_set_buf(sg + i, tvmem[i], PAGE_SIZE);
  348. memset(tvmem[i], 0xff, PAGE_SIZE);
  349. }
  350. for (i = 0; speed[i].blen != 0; i++) {
  351. if (speed[i].blen > TVMEMSIZE * PAGE_SIZE) {
  352. printk(KERN_ERR
  353. "template (%u) too big for tvmem (%lu)\n",
  354. speed[i].blen, TVMEMSIZE * PAGE_SIZE);
  355. goto out;
  356. }
  357. printk(KERN_INFO "test%3u "
  358. "(%5u byte blocks,%5u bytes per update,%4u updates): ",
  359. i, speed[i].blen, speed[i].plen, speed[i].blen / speed[i].plen);
  360. if (sec)
  361. ret = test_hash_jiffies(&desc, sg, speed[i].blen,
  362. speed[i].plen, output, sec);
  363. else
  364. ret = test_hash_cycles(&desc, sg, speed[i].blen,
  365. speed[i].plen, output);
  366. if (ret) {
  367. printk(KERN_ERR "hashing failed ret=%d\n", ret);
  368. break;
  369. }
  370. }
  371. out:
  372. crypto_free_hash(tfm);
  373. }
  374. static void test_available(void)
  375. {
  376. char **name = check;
  377. while (*name) {
  378. printk("alg %s ", *name);
  379. printk(crypto_has_alg(*name, 0, 0) ?
  380. "found\n" : "not found\n");
  381. name++;
  382. }
  383. }
  384. static inline int tcrypt_test(const char *alg)
  385. {
  386. int ret;
  387. ret = alg_test(alg, alg, 0, 0);
  388. /* non-fips algs return -EINVAL in fips mode */
  389. if (fips_enabled && ret == -EINVAL)
  390. ret = 0;
  391. return ret;
  392. }
  393. static int do_test(int m)
  394. {
  395. int i;
  396. int ret = 0;
  397. switch (m) {
  398. case 0:
  399. for (i = 1; i < 200; i++)
  400. ret += do_test(i);
  401. break;
  402. case 1:
  403. ret += tcrypt_test("md5");
  404. break;
  405. case 2:
  406. ret += tcrypt_test("sha1");
  407. break;
  408. case 3:
  409. ret += tcrypt_test("ecb(des)");
  410. ret += tcrypt_test("cbc(des)");
  411. break;
  412. case 4:
  413. ret += tcrypt_test("ecb(des3_ede)");
  414. ret += tcrypt_test("cbc(des3_ede)");
  415. break;
  416. case 5:
  417. ret += tcrypt_test("md4");
  418. break;
  419. case 6:
  420. ret += tcrypt_test("sha256");
  421. break;
  422. case 7:
  423. ret += tcrypt_test("ecb(blowfish)");
  424. ret += tcrypt_test("cbc(blowfish)");
  425. break;
  426. case 8:
  427. ret += tcrypt_test("ecb(twofish)");
  428. ret += tcrypt_test("cbc(twofish)");
  429. break;
  430. case 9:
  431. ret += tcrypt_test("ecb(serpent)");
  432. break;
  433. case 10:
  434. ret += tcrypt_test("ecb(aes)");
  435. ret += tcrypt_test("cbc(aes)");
  436. ret += tcrypt_test("lrw(aes)");
  437. ret += tcrypt_test("xts(aes)");
  438. ret += tcrypt_test("ctr(aes)");
  439. ret += tcrypt_test("rfc3686(ctr(aes))");
  440. break;
  441. case 11:
  442. ret += tcrypt_test("sha384");
  443. break;
  444. case 12:
  445. ret += tcrypt_test("sha512");
  446. break;
  447. case 13:
  448. ret += tcrypt_test("deflate");
  449. break;
  450. case 14:
  451. ret += tcrypt_test("ecb(cast5)");
  452. break;
  453. case 15:
  454. ret += tcrypt_test("ecb(cast6)");
  455. break;
  456. case 16:
  457. ret += tcrypt_test("ecb(arc4)");
  458. break;
  459. case 17:
  460. ret += tcrypt_test("michael_mic");
  461. break;
  462. case 18:
  463. ret += tcrypt_test("crc32c");
  464. break;
  465. case 19:
  466. ret += tcrypt_test("ecb(tea)");
  467. break;
  468. case 20:
  469. ret += tcrypt_test("ecb(xtea)");
  470. break;
  471. case 21:
  472. ret += tcrypt_test("ecb(khazad)");
  473. break;
  474. case 22:
  475. ret += tcrypt_test("wp512");
  476. break;
  477. case 23:
  478. ret += tcrypt_test("wp384");
  479. break;
  480. case 24:
  481. ret += tcrypt_test("wp256");
  482. break;
  483. case 25:
  484. ret += tcrypt_test("ecb(tnepres)");
  485. break;
  486. case 26:
  487. ret += tcrypt_test("ecb(anubis)");
  488. ret += tcrypt_test("cbc(anubis)");
  489. break;
  490. case 27:
  491. ret += tcrypt_test("tgr192");
  492. break;
  493. case 28:
  494. ret += tcrypt_test("tgr160");
  495. break;
  496. case 29:
  497. ret += tcrypt_test("tgr128");
  498. break;
  499. case 30:
  500. ret += tcrypt_test("ecb(xeta)");
  501. break;
  502. case 31:
  503. ret += tcrypt_test("pcbc(fcrypt)");
  504. break;
  505. case 32:
  506. ret += tcrypt_test("ecb(camellia)");
  507. ret += tcrypt_test("cbc(camellia)");
  508. break;
  509. case 33:
  510. ret += tcrypt_test("sha224");
  511. break;
  512. case 34:
  513. ret += tcrypt_test("salsa20");
  514. break;
  515. case 35:
  516. ret += tcrypt_test("gcm(aes)");
  517. break;
  518. case 36:
  519. ret += tcrypt_test("lzo");
  520. break;
  521. case 37:
  522. ret += tcrypt_test("ccm(aes)");
  523. break;
  524. case 38:
  525. ret += tcrypt_test("cts(cbc(aes))");
  526. break;
  527. case 39:
  528. ret += tcrypt_test("rmd128");
  529. break;
  530. case 40:
  531. ret += tcrypt_test("rmd160");
  532. break;
  533. case 41:
  534. ret += tcrypt_test("rmd256");
  535. break;
  536. case 42:
  537. ret += tcrypt_test("rmd320");
  538. break;
  539. case 43:
  540. ret += tcrypt_test("ecb(seed)");
  541. break;
  542. case 44:
  543. ret += tcrypt_test("zlib");
  544. break;
  545. case 45:
  546. ret += tcrypt_test("rfc4309(ccm(aes))");
  547. break;
  548. case 100:
  549. ret += tcrypt_test("hmac(md5)");
  550. break;
  551. case 101:
  552. ret += tcrypt_test("hmac(sha1)");
  553. break;
  554. case 102:
  555. ret += tcrypt_test("hmac(sha256)");
  556. break;
  557. case 103:
  558. ret += tcrypt_test("hmac(sha384)");
  559. break;
  560. case 104:
  561. ret += tcrypt_test("hmac(sha512)");
  562. break;
  563. case 105:
  564. ret += tcrypt_test("hmac(sha224)");
  565. break;
  566. case 106:
  567. ret += tcrypt_test("xcbc(aes)");
  568. break;
  569. case 107:
  570. ret += tcrypt_test("hmac(rmd128)");
  571. break;
  572. case 108:
  573. ret += tcrypt_test("hmac(rmd160)");
  574. break;
  575. case 150:
  576. ret += tcrypt_test("ansi_cprng");
  577. break;
  578. case 200:
  579. test_cipher_speed("ecb(aes)", ENCRYPT, sec, NULL, 0,
  580. speed_template_16_24_32);
  581. test_cipher_speed("ecb(aes)", DECRYPT, sec, NULL, 0,
  582. speed_template_16_24_32);
  583. test_cipher_speed("cbc(aes)", ENCRYPT, sec, NULL, 0,
  584. speed_template_16_24_32);
  585. test_cipher_speed("cbc(aes)", DECRYPT, sec, NULL, 0,
  586. speed_template_16_24_32);
  587. test_cipher_speed("lrw(aes)", ENCRYPT, sec, NULL, 0,
  588. speed_template_32_40_48);
  589. test_cipher_speed("lrw(aes)", DECRYPT, sec, NULL, 0,
  590. speed_template_32_40_48);
  591. test_cipher_speed("xts(aes)", ENCRYPT, sec, NULL, 0,
  592. speed_template_32_48_64);
  593. test_cipher_speed("xts(aes)", DECRYPT, sec, NULL, 0,
  594. speed_template_32_48_64);
  595. break;
  596. case 201:
  597. test_cipher_speed("ecb(des3_ede)", ENCRYPT, sec,
  598. des3_speed_template, DES3_SPEED_VECTORS,
  599. speed_template_24);
  600. test_cipher_speed("ecb(des3_ede)", DECRYPT, sec,
  601. des3_speed_template, DES3_SPEED_VECTORS,
  602. speed_template_24);
  603. test_cipher_speed("cbc(des3_ede)", ENCRYPT, sec,
  604. des3_speed_template, DES3_SPEED_VECTORS,
  605. speed_template_24);
  606. test_cipher_speed("cbc(des3_ede)", DECRYPT, sec,
  607. des3_speed_template, DES3_SPEED_VECTORS,
  608. speed_template_24);
  609. break;
  610. case 202:
  611. test_cipher_speed("ecb(twofish)", ENCRYPT, sec, NULL, 0,
  612. speed_template_16_24_32);
  613. test_cipher_speed("ecb(twofish)", DECRYPT, sec, NULL, 0,
  614. speed_template_16_24_32);
  615. test_cipher_speed("cbc(twofish)", ENCRYPT, sec, NULL, 0,
  616. speed_template_16_24_32);
  617. test_cipher_speed("cbc(twofish)", DECRYPT, sec, NULL, 0,
  618. speed_template_16_24_32);
  619. break;
  620. case 203:
  621. test_cipher_speed("ecb(blowfish)", ENCRYPT, sec, NULL, 0,
  622. speed_template_8_32);
  623. test_cipher_speed("ecb(blowfish)", DECRYPT, sec, NULL, 0,
  624. speed_template_8_32);
  625. test_cipher_speed("cbc(blowfish)", ENCRYPT, sec, NULL, 0,
  626. speed_template_8_32);
  627. test_cipher_speed("cbc(blowfish)", DECRYPT, sec, NULL, 0,
  628. speed_template_8_32);
  629. break;
  630. case 204:
  631. test_cipher_speed("ecb(des)", ENCRYPT, sec, NULL, 0,
  632. speed_template_8);
  633. test_cipher_speed("ecb(des)", DECRYPT, sec, NULL, 0,
  634. speed_template_8);
  635. test_cipher_speed("cbc(des)", ENCRYPT, sec, NULL, 0,
  636. speed_template_8);
  637. test_cipher_speed("cbc(des)", DECRYPT, sec, NULL, 0,
  638. speed_template_8);
  639. break;
  640. case 205:
  641. test_cipher_speed("ecb(camellia)", ENCRYPT, sec, NULL, 0,
  642. speed_template_16_24_32);
  643. test_cipher_speed("ecb(camellia)", DECRYPT, sec, NULL, 0,
  644. speed_template_16_24_32);
  645. test_cipher_speed("cbc(camellia)", ENCRYPT, sec, NULL, 0,
  646. speed_template_16_24_32);
  647. test_cipher_speed("cbc(camellia)", DECRYPT, sec, NULL, 0,
  648. speed_template_16_24_32);
  649. break;
  650. case 206:
  651. test_cipher_speed("salsa20", ENCRYPT, sec, NULL, 0,
  652. speed_template_16_32);
  653. break;
  654. case 300:
  655. /* fall through */
  656. case 301:
  657. test_hash_speed("md4", sec, generic_hash_speed_template);
  658. if (mode > 300 && mode < 400) break;
  659. case 302:
  660. test_hash_speed("md5", sec, generic_hash_speed_template);
  661. if (mode > 300 && mode < 400) break;
  662. case 303:
  663. test_hash_speed("sha1", sec, generic_hash_speed_template);
  664. if (mode > 300 && mode < 400) break;
  665. case 304:
  666. test_hash_speed("sha256", sec, generic_hash_speed_template);
  667. if (mode > 300 && mode < 400) break;
  668. case 305:
  669. test_hash_speed("sha384", sec, generic_hash_speed_template);
  670. if (mode > 300 && mode < 400) break;
  671. case 306:
  672. test_hash_speed("sha512", sec, generic_hash_speed_template);
  673. if (mode > 300 && mode < 400) break;
  674. case 307:
  675. test_hash_speed("wp256", sec, generic_hash_speed_template);
  676. if (mode > 300 && mode < 400) break;
  677. case 308:
  678. test_hash_speed("wp384", sec, generic_hash_speed_template);
  679. if (mode > 300 && mode < 400) break;
  680. case 309:
  681. test_hash_speed("wp512", sec, generic_hash_speed_template);
  682. if (mode > 300 && mode < 400) break;
  683. case 310:
  684. test_hash_speed("tgr128", sec, generic_hash_speed_template);
  685. if (mode > 300 && mode < 400) break;
  686. case 311:
  687. test_hash_speed("tgr160", sec, generic_hash_speed_template);
  688. if (mode > 300 && mode < 400) break;
  689. case 312:
  690. test_hash_speed("tgr192", sec, generic_hash_speed_template);
  691. if (mode > 300 && mode < 400) break;
  692. case 313:
  693. test_hash_speed("sha224", sec, generic_hash_speed_template);
  694. if (mode > 300 && mode < 400) break;
  695. case 314:
  696. test_hash_speed("rmd128", sec, generic_hash_speed_template);
  697. if (mode > 300 && mode < 400) break;
  698. case 315:
  699. test_hash_speed("rmd160", sec, generic_hash_speed_template);
  700. if (mode > 300 && mode < 400) break;
  701. case 316:
  702. test_hash_speed("rmd256", sec, generic_hash_speed_template);
  703. if (mode > 300 && mode < 400) break;
  704. case 317:
  705. test_hash_speed("rmd320", sec, generic_hash_speed_template);
  706. if (mode > 300 && mode < 400) break;
  707. case 399:
  708. break;
  709. case 1000:
  710. test_available();
  711. break;
  712. }
  713. return ret;
  714. }
  715. static int do_alg_test(const char *alg, u32 type)
  716. {
  717. return crypto_has_alg(alg, type, CRYPTO_ALG_TYPE_MASK) ? 0 : -ENOENT;
  718. }
  719. static int __init tcrypt_mod_init(void)
  720. {
  721. int err = -ENOMEM;
  722. int i;
  723. for (i = 0; i < TVMEMSIZE; i++) {
  724. tvmem[i] = (void *)__get_free_page(GFP_KERNEL);
  725. if (!tvmem[i])
  726. goto err_free_tv;
  727. }
  728. if (alg)
  729. err = do_alg_test(alg, type);
  730. else
  731. err = do_test(mode);
  732. if (err) {
  733. printk(KERN_ERR "tcrypt: one or more tests failed!\n");
  734. goto err_free_tv;
  735. }
  736. /* We intentionaly return -EAGAIN to prevent keeping the module,
  737. * unless we're running in fips mode. It does all its work from
  738. * init() and doesn't offer any runtime functionality, but in
  739. * the fips case, checking for a successful load is helpful.
  740. * => we don't need it in the memory, do we?
  741. * -- mludvig
  742. */
  743. if (!fips_enabled)
  744. err = -EAGAIN;
  745. err_free_tv:
  746. for (i = 0; i < TVMEMSIZE && tvmem[i]; i++)
  747. free_page((unsigned long)tvmem[i]);
  748. return err;
  749. }
  750. /*
  751. * If an init function is provided, an exit function must also be provided
  752. * to allow module unload.
  753. */
  754. static void __exit tcrypt_mod_fini(void) { }
  755. module_init(tcrypt_mod_init);
  756. module_exit(tcrypt_mod_fini);
  757. module_param(alg, charp, 0);
  758. module_param(type, uint, 0);
  759. module_param(mode, int, 0);
  760. module_param(sec, uint, 0);
  761. MODULE_PARM_DESC(sec, "Length in seconds of speed tests "
  762. "(defaults to zero which uses CPU cycles instead)");
  763. MODULE_LICENSE("GPL");
  764. MODULE_DESCRIPTION("Quick & dirty crypto testing module");
  765. MODULE_AUTHOR("James Morris <jmorris@intercode.com.au>");