xref: /openbmc/linux/crypto/tcrypt.c (revision 545e4006)
1 /*
2  * Quick & dirty crypto testing module.
3  *
4  * This will only exist until we have a better testing mechanism
5  * (e.g. a char device).
6  *
7  * Copyright (c) 2002 James Morris <jmorris@intercode.com.au>
8  * Copyright (c) 2002 Jean-Francois Dive <jef@linuxbe.org>
9  * Copyright (c) 2007 Nokia Siemens Networks
10  *
11  * This program is free software; you can redistribute it and/or modify it
12  * under the terms of the GNU General Public License as published by the Free
13  * Software Foundation; either version 2 of the License, or (at your option)
14  * any later version.
15  *
16  */
17 
18 #include <crypto/hash.h>
19 #include <linux/err.h>
20 #include <linux/init.h>
21 #include <linux/module.h>
22 #include <linux/mm.h>
23 #include <linux/slab.h>
24 #include <linux/scatterlist.h>
25 #include <linux/string.h>
26 #include <linux/crypto.h>
27 #include <linux/moduleparam.h>
28 #include <linux/jiffies.h>
29 #include <linux/timex.h>
30 #include <linux/interrupt.h>
31 #include "tcrypt.h"
32 
33 /*
34  * Need to kmalloc() memory for testing.
35  */
36 #define TVMEMSIZE	16384
37 #define XBUFSIZE	32768
38 
39 /*
40  * Indexes into the xbuf to simulate cross-page access.
41  */
42 #define IDX1		32
43 #define IDX2		32400
44 #define IDX3		1
45 #define IDX4		8193
46 #define IDX5		22222
47 #define IDX6		17101
48 #define IDX7		27333
49 #define IDX8		3000
50 
51 /*
52 * Used by test_cipher()
53 */
54 #define ENCRYPT 1
55 #define DECRYPT 0
56 
57 struct tcrypt_result {
58 	struct completion completion;
59 	int err;
60 };
61 
62 static unsigned int IDX[8] = { IDX1, IDX2, IDX3, IDX4, IDX5, IDX6, IDX7, IDX8 };
63 
64 /*
65  * Used by test_cipher_speed()
66  */
67 static unsigned int sec;
68 
69 static int mode;
70 static char *xbuf;
71 static char *axbuf;
72 static char *tvmem;
73 
74 static char *check[] = {
75 	"des", "md5", "des3_ede", "rot13", "sha1", "sha224", "sha256",
76 	"blowfish", "twofish", "serpent", "sha384", "sha512", "md4", "aes",
77 	"cast6", "arc4", "michael_mic", "deflate", "crc32c", "tea", "xtea",
78 	"khazad", "wp512", "wp384", "wp256", "tnepres", "xeta",  "fcrypt",
79 	"camellia", "seed", "salsa20", "rmd128", "rmd160", "rmd256", "rmd320",
80 	"lzo", "cts", NULL
81 };
82 
83 static void hexdump(unsigned char *buf, unsigned int len)
84 {
85 	print_hex_dump(KERN_CONT, "", DUMP_PREFIX_OFFSET,
86 			16, 1,
87 			buf, len, false);
88 }
89 
90 static void tcrypt_complete(struct crypto_async_request *req, int err)
91 {
92 	struct tcrypt_result *res = req->data;
93 
94 	if (err == -EINPROGRESS)
95 		return;
96 
97 	res->err = err;
98 	complete(&res->completion);
99 }
100 
101 static void test_hash(char *algo, struct hash_testvec *template,
102 		      unsigned int tcount)
103 {
104 	unsigned int i, j, k, temp;
105 	struct scatterlist sg[8];
106 	char result[64];
107 	struct crypto_ahash *tfm;
108 	struct ahash_request *req;
109 	struct tcrypt_result tresult;
110 	int ret;
111 	void *hash_buff;
112 
113 	printk("\ntesting %s\n", algo);
114 
115 	init_completion(&tresult.completion);
116 
117 	tfm = crypto_alloc_ahash(algo, 0, 0);
118 	if (IS_ERR(tfm)) {
119 		printk("failed to load transform for %s: %ld\n", algo,
120 		       PTR_ERR(tfm));
121 		return;
122 	}
123 
124 	req = ahash_request_alloc(tfm, GFP_KERNEL);
125 	if (!req) {
126 		printk(KERN_ERR "failed to allocate request for %s\n", algo);
127 		goto out_noreq;
128 	}
129 	ahash_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
130 				   tcrypt_complete, &tresult);
131 
132 	for (i = 0; i < tcount; i++) {
133 		printk("test %u:\n", i + 1);
134 		memset(result, 0, 64);
135 
136 		hash_buff = kzalloc(template[i].psize, GFP_KERNEL);
137 		if (!hash_buff)
138 			continue;
139 
140 		memcpy(hash_buff, template[i].plaintext, template[i].psize);
141 		sg_init_one(&sg[0], hash_buff, template[i].psize);
142 
143 		if (template[i].ksize) {
144 			crypto_ahash_clear_flags(tfm, ~0);
145 			ret = crypto_ahash_setkey(tfm, template[i].key,
146 						  template[i].ksize);
147 			if (ret) {
148 				printk("setkey() failed ret=%d\n", ret);
149 				kfree(hash_buff);
150 				goto out;
151 			}
152 		}
153 
154 		ahash_request_set_crypt(req, sg, result, template[i].psize);
155 		ret = crypto_ahash_digest(req);
156 		switch (ret) {
157 		case 0:
158 			break;
159 		case -EINPROGRESS:
160 		case -EBUSY:
161 			ret = wait_for_completion_interruptible(
162 				&tresult.completion);
163 			if (!ret && !(ret = tresult.err)) {
164 				INIT_COMPLETION(tresult.completion);
165 				break;
166 			}
167 			/* fall through */
168 		default:
169 			printk("digest () failed ret=%d\n", ret);
170 			kfree(hash_buff);
171 			goto out;
172 		}
173 
174 		hexdump(result, crypto_ahash_digestsize(tfm));
175 		printk("%s\n",
176 		       memcmp(result, template[i].digest,
177 			      crypto_ahash_digestsize(tfm)) ?
178 		       "fail" : "pass");
179 		kfree(hash_buff);
180 	}
181 
182 	printk("testing %s across pages\n", algo);
183 
184 	/* setup the dummy buffer first */
185 	memset(xbuf, 0, XBUFSIZE);
186 
187 	j = 0;
188 	for (i = 0; i < tcount; i++) {
189 		if (template[i].np) {
190 			j++;
191 			printk("test %u:\n", j);
192 			memset(result, 0, 64);
193 
194 			temp = 0;
195 			sg_init_table(sg, template[i].np);
196 			for (k = 0; k < template[i].np; k++) {
197 				memcpy(&xbuf[IDX[k]],
198 				       template[i].plaintext + temp,
199 				       template[i].tap[k]);
200 				temp += template[i].tap[k];
201 				sg_set_buf(&sg[k], &xbuf[IDX[k]],
202 					    template[i].tap[k]);
203 			}
204 
205 			if (template[i].ksize) {
206 				crypto_ahash_clear_flags(tfm, ~0);
207 				ret = crypto_ahash_setkey(tfm, template[i].key,
208 							  template[i].ksize);
209 
210 				if (ret) {
211 					printk("setkey() failed ret=%d\n", ret);
212 					goto out;
213 				}
214 			}
215 
216 			ahash_request_set_crypt(req, sg, result,
217 						template[i].psize);
218 			ret = crypto_ahash_digest(req);
219 			switch (ret) {
220 			case 0:
221 				break;
222 			case -EINPROGRESS:
223 			case -EBUSY:
224 				ret = wait_for_completion_interruptible(
225 					&tresult.completion);
226 				if (!ret && !(ret = tresult.err)) {
227 					INIT_COMPLETION(tresult.completion);
228 					break;
229 				}
230 				/* fall through */
231 			default:
232 				printk("digest () failed ret=%d\n", ret);
233 				goto out;
234 			}
235 
236 			hexdump(result, crypto_ahash_digestsize(tfm));
237 			printk("%s\n",
238 			       memcmp(result, template[i].digest,
239 				      crypto_ahash_digestsize(tfm)) ?
240 			       "fail" : "pass");
241 		}
242 	}
243 
244 out:
245 	ahash_request_free(req);
246 out_noreq:
247 	crypto_free_ahash(tfm);
248 }
249 
250 static void test_aead(char *algo, int enc, struct aead_testvec *template,
251 		      unsigned int tcount)
252 {
253 	unsigned int ret, i, j, k, n, temp;
254 	char *q;
255 	struct crypto_aead *tfm;
256 	char *key;
257 	struct aead_request *req;
258 	struct scatterlist sg[8];
259 	struct scatterlist asg[8];
260 	const char *e;
261 	struct tcrypt_result result;
262 	unsigned int authsize;
263 	void *input;
264 	void *assoc;
265 	char iv[MAX_IVLEN];
266 
267 	if (enc == ENCRYPT)
268 		e = "encryption";
269 	else
270 		e = "decryption";
271 
272 	printk(KERN_INFO "\ntesting %s %s\n", algo, e);
273 
274 	init_completion(&result.completion);
275 
276 	tfm = crypto_alloc_aead(algo, 0, 0);
277 
278 	if (IS_ERR(tfm)) {
279 		printk(KERN_INFO "failed to load transform for %s: %ld\n",
280 		       algo, PTR_ERR(tfm));
281 		return;
282 	}
283 
284 	req = aead_request_alloc(tfm, GFP_KERNEL);
285 	if (!req) {
286 		printk(KERN_INFO "failed to allocate request for %s\n", algo);
287 		goto out;
288 	}
289 
290 	aead_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
291 				  tcrypt_complete, &result);
292 
293 	for (i = 0, j = 0; i < tcount; i++) {
294 		if (!template[i].np) {
295 			printk(KERN_INFO "test %u (%d bit key):\n",
296 			       ++j, template[i].klen * 8);
297 
298 			/* some tepmplates have no input data but they will
299 			 * touch input
300 			 */
301 			input = kzalloc(template[i].ilen + template[i].rlen, GFP_KERNEL);
302 			if (!input)
303 				continue;
304 
305 			assoc = kzalloc(template[i].alen, GFP_KERNEL);
306 			if (!assoc) {
307 				kfree(input);
308 				continue;
309 			}
310 
311 			memcpy(input, template[i].input, template[i].ilen);
312 			memcpy(assoc, template[i].assoc, template[i].alen);
313 			if (template[i].iv)
314 				memcpy(iv, template[i].iv, MAX_IVLEN);
315 			else
316 				memset(iv, 0, MAX_IVLEN);
317 
318 			crypto_aead_clear_flags(tfm, ~0);
319 			if (template[i].wk)
320 				crypto_aead_set_flags(
321 					tfm, CRYPTO_TFM_REQ_WEAK_KEY);
322 
323 			if (template[i].key)
324 				key = template[i].key;
325 			else
326 				key = kzalloc(template[i].klen, GFP_KERNEL);
327 
328 			ret = crypto_aead_setkey(tfm, key,
329 						 template[i].klen);
330 			if (ret) {
331 				printk(KERN_INFO "setkey() failed flags=%x\n",
332 				       crypto_aead_get_flags(tfm));
333 
334 				if (!template[i].fail)
335 					goto next_one;
336 			}
337 
338 			authsize = abs(template[i].rlen - template[i].ilen);
339 			ret = crypto_aead_setauthsize(tfm, authsize);
340 			if (ret) {
341 				printk(KERN_INFO
342 				       "failed to set authsize = %u\n",
343 				       authsize);
344 				goto next_one;
345 			}
346 
347 			sg_init_one(&sg[0], input,
348 				    template[i].ilen + (enc ? authsize : 0));
349 
350 			sg_init_one(&asg[0], assoc, template[i].alen);
351 
352 			aead_request_set_crypt(req, sg, sg,
353 					       template[i].ilen, iv);
354 
355 			aead_request_set_assoc(req, asg, template[i].alen);
356 
357 			ret = enc ?
358 				crypto_aead_encrypt(req) :
359 				crypto_aead_decrypt(req);
360 
361 			switch (ret) {
362 			case 0:
363 				break;
364 			case -EINPROGRESS:
365 			case -EBUSY:
366 				ret = wait_for_completion_interruptible(
367 					&result.completion);
368 				if (!ret && !(ret = result.err)) {
369 					INIT_COMPLETION(result.completion);
370 					break;
371 				}
372 				/* fall through */
373 			default:
374 				printk(KERN_INFO "%s () failed err=%d\n",
375 				       e, -ret);
376 				goto next_one;
377 			}
378 
379 			q = input;
380 			hexdump(q, template[i].rlen);
381 
382 			printk(KERN_INFO "enc/dec: %s\n",
383 			       memcmp(q, template[i].result,
384 				      template[i].rlen) ? "fail" : "pass");
385 next_one:
386 			if (!template[i].key)
387 				kfree(key);
388 			kfree(assoc);
389 			kfree(input);
390 		}
391 	}
392 
393 	printk(KERN_INFO "\ntesting %s %s across pages (chunking)\n", algo, e);
394 	memset(axbuf, 0, XBUFSIZE);
395 
396 	for (i = 0, j = 0; i < tcount; i++) {
397 		if (template[i].np) {
398 			printk(KERN_INFO "test %u (%d bit key):\n",
399 			       ++j, template[i].klen * 8);
400 
401 			if (template[i].iv)
402 				memcpy(iv, template[i].iv, MAX_IVLEN);
403 			else
404 				memset(iv, 0, MAX_IVLEN);
405 
406 			crypto_aead_clear_flags(tfm, ~0);
407 			if (template[i].wk)
408 				crypto_aead_set_flags(
409 					tfm, CRYPTO_TFM_REQ_WEAK_KEY);
410 			key = template[i].key;
411 
412 			ret = crypto_aead_setkey(tfm, key, template[i].klen);
413 			if (ret) {
414 				printk(KERN_INFO "setkey() failed flags=%x\n",
415 				       crypto_aead_get_flags(tfm));
416 
417 				if (!template[i].fail)
418 					goto out;
419 			}
420 
421 			memset(xbuf, 0, XBUFSIZE);
422 			sg_init_table(sg, template[i].np);
423 			for (k = 0, temp = 0; k < template[i].np; k++) {
424 				memcpy(&xbuf[IDX[k]],
425 				       template[i].input + temp,
426 				       template[i].tap[k]);
427 				temp += template[i].tap[k];
428 				sg_set_buf(&sg[k], &xbuf[IDX[k]],
429 					   template[i].tap[k]);
430 			}
431 
432 			authsize = abs(template[i].rlen - template[i].ilen);
433 			ret = crypto_aead_setauthsize(tfm, authsize);
434 			if (ret) {
435 				printk(KERN_INFO
436 				       "failed to set authsize = %u\n",
437 				       authsize);
438 				goto out;
439 			}
440 
441 			if (enc)
442 				sg[k - 1].length += authsize;
443 
444 			sg_init_table(asg, template[i].anp);
445 			for (k = 0, temp = 0; k < template[i].anp; k++) {
446 				memcpy(&axbuf[IDX[k]],
447 				       template[i].assoc + temp,
448 				       template[i].atap[k]);
449 				temp += template[i].atap[k];
450 				sg_set_buf(&asg[k], &axbuf[IDX[k]],
451 					   template[i].atap[k]);
452 			}
453 
454 			aead_request_set_crypt(req, sg, sg,
455 					       template[i].ilen,
456 					       iv);
457 
458 			aead_request_set_assoc(req, asg, template[i].alen);
459 
460 			ret = enc ?
461 				crypto_aead_encrypt(req) :
462 				crypto_aead_decrypt(req);
463 
464 			switch (ret) {
465 			case 0:
466 				break;
467 			case -EINPROGRESS:
468 			case -EBUSY:
469 				ret = wait_for_completion_interruptible(
470 					&result.completion);
471 				if (!ret && !(ret = result.err)) {
472 					INIT_COMPLETION(result.completion);
473 					break;
474 				}
475 				/* fall through */
476 			default:
477 				printk(KERN_INFO "%s () failed err=%d\n",
478 				       e, -ret);
479 				goto out;
480 			}
481 
482 			for (k = 0, temp = 0; k < template[i].np; k++) {
483 				printk(KERN_INFO "page %u\n", k);
484 				q = &axbuf[IDX[k]];
485 				hexdump(q, template[i].tap[k]);
486 				printk(KERN_INFO "%s\n",
487 				       memcmp(q, template[i].result + temp,
488 					      template[i].tap[k] -
489 					      (k < template[i].np - 1 || enc ?
490 					       0 : authsize)) ?
491 				       "fail" : "pass");
492 
493 				for (n = 0; q[template[i].tap[k] + n]; n++)
494 					;
495 				if (n) {
496 					printk("Result buffer corruption %u "
497 					       "bytes:\n", n);
498 					hexdump(&q[template[i].tap[k]], n);
499 				}
500 
501 				temp += template[i].tap[k];
502 			}
503 		}
504 	}
505 
506 out:
507 	crypto_free_aead(tfm);
508 	aead_request_free(req);
509 }
510 
511 static void test_cipher(char *algo, int enc,
512 			struct cipher_testvec *template, unsigned int tcount)
513 {
514 	unsigned int ret, i, j, k, n, temp;
515 	char *q;
516 	struct crypto_ablkcipher *tfm;
517 	struct ablkcipher_request *req;
518 	struct scatterlist sg[8];
519 	const char *e;
520 	struct tcrypt_result result;
521 	void *data;
522 	char iv[MAX_IVLEN];
523 
524 	if (enc == ENCRYPT)
525 	        e = "encryption";
526 	else
527 		e = "decryption";
528 
529 	printk("\ntesting %s %s\n", algo, e);
530 
531 	init_completion(&result.completion);
532 	tfm = crypto_alloc_ablkcipher(algo, 0, 0);
533 
534 	if (IS_ERR(tfm)) {
535 		printk("failed to load transform for %s: %ld\n", algo,
536 		       PTR_ERR(tfm));
537 		return;
538 	}
539 
540 	req = ablkcipher_request_alloc(tfm, GFP_KERNEL);
541 	if (!req) {
542 		printk("failed to allocate request for %s\n", algo);
543 		goto out;
544 	}
545 
546 	ablkcipher_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
547 					tcrypt_complete, &result);
548 
549 	j = 0;
550 	for (i = 0; i < tcount; i++) {
551 
552 		data = kzalloc(template[i].ilen, GFP_KERNEL);
553 		if (!data)
554 			continue;
555 
556 		memcpy(data, template[i].input, template[i].ilen);
557 		if (template[i].iv)
558 			memcpy(iv, template[i].iv, MAX_IVLEN);
559 		else
560 			memset(iv, 0, MAX_IVLEN);
561 
562 		if (!(template[i].np)) {
563 			j++;
564 			printk("test %u (%d bit key):\n",
565 			j, template[i].klen * 8);
566 
567 			crypto_ablkcipher_clear_flags(tfm, ~0);
568 			if (template[i].wk)
569 				crypto_ablkcipher_set_flags(
570 					tfm, CRYPTO_TFM_REQ_WEAK_KEY);
571 
572 			ret = crypto_ablkcipher_setkey(tfm, template[i].key,
573 						       template[i].klen);
574 			if (ret) {
575 				printk("setkey() failed flags=%x\n",
576 				       crypto_ablkcipher_get_flags(tfm));
577 
578 				if (!template[i].fail) {
579 					kfree(data);
580 					goto out;
581 				}
582 			}
583 
584 			sg_init_one(&sg[0], data, template[i].ilen);
585 
586 			ablkcipher_request_set_crypt(req, sg, sg,
587 						     template[i].ilen, iv);
588 			ret = enc ?
589 				crypto_ablkcipher_encrypt(req) :
590 				crypto_ablkcipher_decrypt(req);
591 
592 			switch (ret) {
593 			case 0:
594 				break;
595 			case -EINPROGRESS:
596 			case -EBUSY:
597 				ret = wait_for_completion_interruptible(
598 					&result.completion);
599 				if (!ret && !((ret = result.err))) {
600 					INIT_COMPLETION(result.completion);
601 					break;
602 				}
603 				/* fall through */
604 			default:
605 				printk("%s () failed err=%d\n", e, -ret);
606 				kfree(data);
607 				goto out;
608 			}
609 
610 			q = data;
611 			hexdump(q, template[i].rlen);
612 
613 			printk("%s\n",
614 			       memcmp(q, template[i].result,
615 				      template[i].rlen) ? "fail" : "pass");
616 		}
617 		kfree(data);
618 	}
619 
620 	printk("\ntesting %s %s across pages (chunking)\n", algo, e);
621 
622 	j = 0;
623 	for (i = 0; i < tcount; i++) {
624 
625 		if (template[i].iv)
626 			memcpy(iv, template[i].iv, MAX_IVLEN);
627 		else
628 			memset(iv, 0, MAX_IVLEN);
629 
630 		if (template[i].np) {
631 			j++;
632 			printk("test %u (%d bit key):\n",
633 			j, template[i].klen * 8);
634 
635 			memset(xbuf, 0, XBUFSIZE);
636 			crypto_ablkcipher_clear_flags(tfm, ~0);
637 			if (template[i].wk)
638 				crypto_ablkcipher_set_flags(
639 					tfm, CRYPTO_TFM_REQ_WEAK_KEY);
640 
641 			ret = crypto_ablkcipher_setkey(tfm, template[i].key,
642 						       template[i].klen);
643 			if (ret) {
644 				printk("setkey() failed flags=%x\n",
645 						crypto_ablkcipher_get_flags(tfm));
646 
647 				if (!template[i].fail)
648 					goto out;
649 			}
650 
651 			temp = 0;
652 			sg_init_table(sg, template[i].np);
653 			for (k = 0; k < template[i].np; k++) {
654 				memcpy(&xbuf[IDX[k]],
655 						template[i].input + temp,
656 						template[i].tap[k]);
657 				temp += template[i].tap[k];
658 				sg_set_buf(&sg[k], &xbuf[IDX[k]],
659 						template[i].tap[k]);
660 			}
661 
662 			ablkcipher_request_set_crypt(req, sg, sg,
663 					template[i].ilen, iv);
664 
665 			ret = enc ?
666 				crypto_ablkcipher_encrypt(req) :
667 				crypto_ablkcipher_decrypt(req);
668 
669 			switch (ret) {
670 			case 0:
671 				break;
672 			case -EINPROGRESS:
673 			case -EBUSY:
674 				ret = wait_for_completion_interruptible(
675 					&result.completion);
676 				if (!ret && !((ret = result.err))) {
677 					INIT_COMPLETION(result.completion);
678 					break;
679 				}
680 				/* fall through */
681 			default:
682 				printk("%s () failed err=%d\n", e, -ret);
683 				goto out;
684 			}
685 
686 			temp = 0;
687 			for (k = 0; k < template[i].np; k++) {
688 				printk("page %u\n", k);
689 				q = &xbuf[IDX[k]];
690 				hexdump(q, template[i].tap[k]);
691 				printk("%s\n",
692 					memcmp(q, template[i].result + temp,
693 						template[i].tap[k]) ? "fail" :
694 					"pass");
695 
696 				for (n = 0; q[template[i].tap[k] + n]; n++)
697 					;
698 				if (n) {
699 					printk("Result buffer corruption %u "
700 					       "bytes:\n", n);
701 					hexdump(&q[template[i].tap[k]], n);
702 				}
703 				temp += template[i].tap[k];
704 			}
705 		}
706 	}
707 out:
708 	crypto_free_ablkcipher(tfm);
709 	ablkcipher_request_free(req);
710 }
711 
712 static int test_cipher_jiffies(struct blkcipher_desc *desc, int enc, char *p,
713 			       int blen, int sec)
714 {
715 	struct scatterlist sg[1];
716 	unsigned long start, end;
717 	int bcount;
718 	int ret;
719 
720 	sg_init_one(sg, p, blen);
721 
722 	for (start = jiffies, end = start + sec * HZ, bcount = 0;
723 	     time_before(jiffies, end); bcount++) {
724 		if (enc)
725 			ret = crypto_blkcipher_encrypt(desc, sg, sg, blen);
726 		else
727 			ret = crypto_blkcipher_decrypt(desc, sg, sg, blen);
728 
729 		if (ret)
730 			return ret;
731 	}
732 
733 	printk("%d operations in %d seconds (%ld bytes)\n",
734 	       bcount, sec, (long)bcount * blen);
735 	return 0;
736 }
737 
738 static int test_cipher_cycles(struct blkcipher_desc *desc, int enc, char *p,
739 			      int blen)
740 {
741 	struct scatterlist sg[1];
742 	unsigned long cycles = 0;
743 	int ret = 0;
744 	int i;
745 
746 	sg_init_one(sg, p, blen);
747 
748 	local_bh_disable();
749 	local_irq_disable();
750 
751 	/* Warm-up run. */
752 	for (i = 0; i < 4; i++) {
753 		if (enc)
754 			ret = crypto_blkcipher_encrypt(desc, sg, sg, blen);
755 		else
756 			ret = crypto_blkcipher_decrypt(desc, sg, sg, blen);
757 
758 		if (ret)
759 			goto out;
760 	}
761 
762 	/* The real thing. */
763 	for (i = 0; i < 8; i++) {
764 		cycles_t start, end;
765 
766 		start = get_cycles();
767 		if (enc)
768 			ret = crypto_blkcipher_encrypt(desc, sg, sg, blen);
769 		else
770 			ret = crypto_blkcipher_decrypt(desc, sg, sg, blen);
771 		end = get_cycles();
772 
773 		if (ret)
774 			goto out;
775 
776 		cycles += end - start;
777 	}
778 
779 out:
780 	local_irq_enable();
781 	local_bh_enable();
782 
783 	if (ret == 0)
784 		printk("1 operation in %lu cycles (%d bytes)\n",
785 		       (cycles + 4) / 8, blen);
786 
787 	return ret;
788 }
789 
790 static u32 block_sizes[] = { 16, 64, 256, 1024, 8192, 0 };
791 
792 static void test_cipher_speed(char *algo, int enc, unsigned int sec,
793 			      struct cipher_testvec *template,
794 			      unsigned int tcount, u8 *keysize)
795 {
796 	unsigned int ret, i, j, iv_len;
797 	unsigned char *key, *p, iv[128];
798 	struct crypto_blkcipher *tfm;
799 	struct blkcipher_desc desc;
800 	const char *e;
801 	u32 *b_size;
802 
803 	if (enc == ENCRYPT)
804 	        e = "encryption";
805 	else
806 		e = "decryption";
807 
808 	printk("\ntesting speed of %s %s\n", algo, e);
809 
810 	tfm = crypto_alloc_blkcipher(algo, 0, CRYPTO_ALG_ASYNC);
811 
812 	if (IS_ERR(tfm)) {
813 		printk("failed to load transform for %s: %ld\n", algo,
814 		       PTR_ERR(tfm));
815 		return;
816 	}
817 	desc.tfm = tfm;
818 	desc.flags = 0;
819 
820 	i = 0;
821 	do {
822 
823 		b_size = block_sizes;
824 		do {
825 
826 			if ((*keysize + *b_size) > TVMEMSIZE) {
827 				printk("template (%u) too big for tvmem (%u)\n",
828 						*keysize + *b_size, TVMEMSIZE);
829 				goto out;
830 			}
831 
832 			printk("test %u (%d bit key, %d byte blocks): ", i,
833 					*keysize * 8, *b_size);
834 
835 			memset(tvmem, 0xff, *keysize + *b_size);
836 
837 			/* set key, plain text and IV */
838 			key = (unsigned char *)tvmem;
839 			for (j = 0; j < tcount; j++) {
840 				if (template[j].klen == *keysize) {
841 					key = template[j].key;
842 					break;
843 				}
844 			}
845 			p = (unsigned char *)tvmem + *keysize;
846 
847 			ret = crypto_blkcipher_setkey(tfm, key, *keysize);
848 			if (ret) {
849 				printk("setkey() failed flags=%x\n",
850 						crypto_blkcipher_get_flags(tfm));
851 				goto out;
852 			}
853 
854 			iv_len = crypto_blkcipher_ivsize(tfm);
855 			if (iv_len) {
856 				memset(&iv, 0xff, iv_len);
857 				crypto_blkcipher_set_iv(tfm, iv, iv_len);
858 			}
859 
860 			if (sec)
861 				ret = test_cipher_jiffies(&desc, enc, p, *b_size, sec);
862 			else
863 				ret = test_cipher_cycles(&desc, enc, p, *b_size);
864 
865 			if (ret) {
866 				printk("%s() failed flags=%x\n", e, desc.flags);
867 				break;
868 			}
869 			b_size++;
870 			i++;
871 		} while (*b_size);
872 		keysize++;
873 	} while (*keysize);
874 
875 out:
876 	crypto_free_blkcipher(tfm);
877 }
878 
879 static int test_hash_jiffies_digest(struct hash_desc *desc, char *p, int blen,
880 				    char *out, int sec)
881 {
882 	struct scatterlist sg[1];
883 	unsigned long start, end;
884 	int bcount;
885 	int ret;
886 
887 	sg_init_table(sg, 1);
888 
889 	for (start = jiffies, end = start + sec * HZ, bcount = 0;
890 	     time_before(jiffies, end); bcount++) {
891 		sg_set_buf(sg, p, blen);
892 		ret = crypto_hash_digest(desc, sg, blen, out);
893 		if (ret)
894 			return ret;
895 	}
896 
897 	printk("%6u opers/sec, %9lu bytes/sec\n",
898 	       bcount / sec, ((long)bcount * blen) / sec);
899 
900 	return 0;
901 }
902 
903 static int test_hash_jiffies(struct hash_desc *desc, char *p, int blen,
904 			     int plen, char *out, int sec)
905 {
906 	struct scatterlist sg[1];
907 	unsigned long start, end;
908 	int bcount, pcount;
909 	int ret;
910 
911 	if (plen == blen)
912 		return test_hash_jiffies_digest(desc, p, blen, out, sec);
913 
914 	sg_init_table(sg, 1);
915 
916 	for (start = jiffies, end = start + sec * HZ, bcount = 0;
917 	     time_before(jiffies, end); bcount++) {
918 		ret = crypto_hash_init(desc);
919 		if (ret)
920 			return ret;
921 		for (pcount = 0; pcount < blen; pcount += plen) {
922 			sg_set_buf(sg, p + pcount, plen);
923 			ret = crypto_hash_update(desc, sg, plen);
924 			if (ret)
925 				return ret;
926 		}
927 		/* we assume there is enough space in 'out' for the result */
928 		ret = crypto_hash_final(desc, out);
929 		if (ret)
930 			return ret;
931 	}
932 
933 	printk("%6u opers/sec, %9lu bytes/sec\n",
934 	       bcount / sec, ((long)bcount * blen) / sec);
935 
936 	return 0;
937 }
938 
939 static int test_hash_cycles_digest(struct hash_desc *desc, char *p, int blen,
940 				   char *out)
941 {
942 	struct scatterlist sg[1];
943 	unsigned long cycles = 0;
944 	int i;
945 	int ret;
946 
947 	sg_init_table(sg, 1);
948 
949 	local_bh_disable();
950 	local_irq_disable();
951 
952 	/* Warm-up run. */
953 	for (i = 0; i < 4; i++) {
954 		sg_set_buf(sg, p, blen);
955 		ret = crypto_hash_digest(desc, sg, blen, out);
956 		if (ret)
957 			goto out;
958 	}
959 
960 	/* The real thing. */
961 	for (i = 0; i < 8; i++) {
962 		cycles_t start, end;
963 
964 		start = get_cycles();
965 
966 		sg_set_buf(sg, p, blen);
967 		ret = crypto_hash_digest(desc, sg, blen, out);
968 		if (ret)
969 			goto out;
970 
971 		end = get_cycles();
972 
973 		cycles += end - start;
974 	}
975 
976 out:
977 	local_irq_enable();
978 	local_bh_enable();
979 
980 	if (ret)
981 		return ret;
982 
983 	printk("%6lu cycles/operation, %4lu cycles/byte\n",
984 	       cycles / 8, cycles / (8 * blen));
985 
986 	return 0;
987 }
988 
989 static int test_hash_cycles(struct hash_desc *desc, char *p, int blen,
990 			    int plen, char *out)
991 {
992 	struct scatterlist sg[1];
993 	unsigned long cycles = 0;
994 	int i, pcount;
995 	int ret;
996 
997 	if (plen == blen)
998 		return test_hash_cycles_digest(desc, p, blen, out);
999 
1000 	sg_init_table(sg, 1);
1001 
1002 	local_bh_disable();
1003 	local_irq_disable();
1004 
1005 	/* Warm-up run. */
1006 	for (i = 0; i < 4; i++) {
1007 		ret = crypto_hash_init(desc);
1008 		if (ret)
1009 			goto out;
1010 		for (pcount = 0; pcount < blen; pcount += plen) {
1011 			sg_set_buf(sg, p + pcount, plen);
1012 			ret = crypto_hash_update(desc, sg, plen);
1013 			if (ret)
1014 				goto out;
1015 		}
1016 		ret = crypto_hash_final(desc, out);
1017 		if (ret)
1018 			goto out;
1019 	}
1020 
1021 	/* The real thing. */
1022 	for (i = 0; i < 8; i++) {
1023 		cycles_t start, end;
1024 
1025 		start = get_cycles();
1026 
1027 		ret = crypto_hash_init(desc);
1028 		if (ret)
1029 			goto out;
1030 		for (pcount = 0; pcount < blen; pcount += plen) {
1031 			sg_set_buf(sg, p + pcount, plen);
1032 			ret = crypto_hash_update(desc, sg, plen);
1033 			if (ret)
1034 				goto out;
1035 		}
1036 		ret = crypto_hash_final(desc, out);
1037 		if (ret)
1038 			goto out;
1039 
1040 		end = get_cycles();
1041 
1042 		cycles += end - start;
1043 	}
1044 
1045 out:
1046 	local_irq_enable();
1047 	local_bh_enable();
1048 
1049 	if (ret)
1050 		return ret;
1051 
1052 	printk("%6lu cycles/operation, %4lu cycles/byte\n",
1053 	       cycles / 8, cycles / (8 * blen));
1054 
1055 	return 0;
1056 }
1057 
1058 static void test_hash_speed(char *algo, unsigned int sec,
1059 			      struct hash_speed *speed)
1060 {
1061 	struct crypto_hash *tfm;
1062 	struct hash_desc desc;
1063 	char output[1024];
1064 	int i;
1065 	int ret;
1066 
1067 	printk("\ntesting speed of %s\n", algo);
1068 
1069 	tfm = crypto_alloc_hash(algo, 0, CRYPTO_ALG_ASYNC);
1070 
1071 	if (IS_ERR(tfm)) {
1072 		printk("failed to load transform for %s: %ld\n", algo,
1073 		       PTR_ERR(tfm));
1074 		return;
1075 	}
1076 
1077 	desc.tfm = tfm;
1078 	desc.flags = 0;
1079 
1080 	if (crypto_hash_digestsize(tfm) > sizeof(output)) {
1081 		printk("digestsize(%u) > outputbuffer(%zu)\n",
1082 		       crypto_hash_digestsize(tfm), sizeof(output));
1083 		goto out;
1084 	}
1085 
1086 	for (i = 0; speed[i].blen != 0; i++) {
1087 		if (speed[i].blen > TVMEMSIZE) {
1088 			printk("template (%u) too big for tvmem (%u)\n",
1089 			       speed[i].blen, TVMEMSIZE);
1090 			goto out;
1091 		}
1092 
1093 		printk("test%3u (%5u byte blocks,%5u bytes per update,%4u updates): ",
1094 		       i, speed[i].blen, speed[i].plen, speed[i].blen / speed[i].plen);
1095 
1096 		memset(tvmem, 0xff, speed[i].blen);
1097 
1098 		if (sec)
1099 			ret = test_hash_jiffies(&desc, tvmem, speed[i].blen,
1100 						speed[i].plen, output, sec);
1101 		else
1102 			ret = test_hash_cycles(&desc, tvmem, speed[i].blen,
1103 					       speed[i].plen, output);
1104 
1105 		if (ret) {
1106 			printk("hashing failed ret=%d\n", ret);
1107 			break;
1108 		}
1109 	}
1110 
1111 out:
1112 	crypto_free_hash(tfm);
1113 }
1114 
1115 static void test_comp(char *algo, struct comp_testvec *ctemplate,
1116 		       struct comp_testvec *dtemplate, int ctcount, int dtcount)
1117 {
1118 	unsigned int i;
1119 	char result[COMP_BUF_SIZE];
1120 	struct crypto_comp *tfm;
1121 	unsigned int tsize;
1122 
1123 	printk("\ntesting %s compression\n", algo);
1124 
1125 	tfm = crypto_alloc_comp(algo, 0, CRYPTO_ALG_ASYNC);
1126 	if (IS_ERR(tfm)) {
1127 		printk("failed to load transform for %s\n", algo);
1128 		return;
1129 	}
1130 
1131 	for (i = 0; i < ctcount; i++) {
1132 		int ilen, ret, dlen = COMP_BUF_SIZE;
1133 
1134 		printk("test %u:\n", i + 1);
1135 		memset(result, 0, sizeof (result));
1136 
1137 		ilen = ctemplate[i].inlen;
1138 		ret = crypto_comp_compress(tfm, ctemplate[i].input,
1139 		                           ilen, result, &dlen);
1140 		if (ret) {
1141 			printk("fail: ret=%d\n", ret);
1142 			continue;
1143 		}
1144 		hexdump(result, dlen);
1145 		printk("%s (ratio %d:%d)\n",
1146 		       memcmp(result, ctemplate[i].output, dlen) ? "fail" : "pass",
1147 		       ilen, dlen);
1148 	}
1149 
1150 	printk("\ntesting %s decompression\n", algo);
1151 
1152 	tsize = sizeof(struct comp_testvec);
1153 	tsize *= dtcount;
1154 	if (tsize > TVMEMSIZE) {
1155 		printk("template (%u) too big for tvmem (%u)\n", tsize,
1156 		       TVMEMSIZE);
1157 		goto out;
1158 	}
1159 
1160 	for (i = 0; i < dtcount; i++) {
1161 		int ilen, ret, dlen = COMP_BUF_SIZE;
1162 
1163 		printk("test %u:\n", i + 1);
1164 		memset(result, 0, sizeof (result));
1165 
1166 		ilen = dtemplate[i].inlen;
1167 		ret = crypto_comp_decompress(tfm, dtemplate[i].input,
1168 		                             ilen, result, &dlen);
1169 		if (ret) {
1170 			printk("fail: ret=%d\n", ret);
1171 			continue;
1172 		}
1173 		hexdump(result, dlen);
1174 		printk("%s (ratio %d:%d)\n",
1175 		       memcmp(result, dtemplate[i].output, dlen) ? "fail" : "pass",
1176 		       ilen, dlen);
1177 	}
1178 out:
1179 	crypto_free_comp(tfm);
1180 }
1181 
1182 static void test_available(void)
1183 {
1184 	char **name = check;
1185 
1186 	while (*name) {
1187 		printk("alg %s ", *name);
1188 		printk(crypto_has_alg(*name, 0, 0) ?
1189 		       "found\n" : "not found\n");
1190 		name++;
1191 	}
1192 }
1193 
1194 static void do_test(void)
1195 {
1196 	switch (mode) {
1197 
1198 	case 0:
1199 		test_hash("md5", md5_tv_template, MD5_TEST_VECTORS);
1200 
1201 		test_hash("sha1", sha1_tv_template, SHA1_TEST_VECTORS);
1202 
1203 		//DES
1204 		test_cipher("ecb(des)", ENCRYPT, des_enc_tv_template,
1205 			    DES_ENC_TEST_VECTORS);
1206 		test_cipher("ecb(des)", DECRYPT, des_dec_tv_template,
1207 			    DES_DEC_TEST_VECTORS);
1208 		test_cipher("cbc(des)", ENCRYPT, des_cbc_enc_tv_template,
1209 			    DES_CBC_ENC_TEST_VECTORS);
1210 		test_cipher("cbc(des)", DECRYPT, des_cbc_dec_tv_template,
1211 			    DES_CBC_DEC_TEST_VECTORS);
1212 
1213 		//DES3_EDE
1214 		test_cipher("ecb(des3_ede)", ENCRYPT, des3_ede_enc_tv_template,
1215 			    DES3_EDE_ENC_TEST_VECTORS);
1216 		test_cipher("ecb(des3_ede)", DECRYPT, des3_ede_dec_tv_template,
1217 			    DES3_EDE_DEC_TEST_VECTORS);
1218 
1219 		test_cipher("cbc(des3_ede)", ENCRYPT,
1220 			    des3_ede_cbc_enc_tv_template,
1221 			    DES3_EDE_CBC_ENC_TEST_VECTORS);
1222 
1223 		test_cipher("cbc(des3_ede)", DECRYPT,
1224 			    des3_ede_cbc_dec_tv_template,
1225 			    DES3_EDE_CBC_DEC_TEST_VECTORS);
1226 
1227 		test_hash("md4", md4_tv_template, MD4_TEST_VECTORS);
1228 
1229 		test_hash("sha224", sha224_tv_template, SHA224_TEST_VECTORS);
1230 
1231 		test_hash("sha256", sha256_tv_template, SHA256_TEST_VECTORS);
1232 
1233 		//BLOWFISH
1234 		test_cipher("ecb(blowfish)", ENCRYPT, bf_enc_tv_template,
1235 			    BF_ENC_TEST_VECTORS);
1236 		test_cipher("ecb(blowfish)", DECRYPT, bf_dec_tv_template,
1237 			    BF_DEC_TEST_VECTORS);
1238 		test_cipher("cbc(blowfish)", ENCRYPT, bf_cbc_enc_tv_template,
1239 			    BF_CBC_ENC_TEST_VECTORS);
1240 		test_cipher("cbc(blowfish)", DECRYPT, bf_cbc_dec_tv_template,
1241 			    BF_CBC_DEC_TEST_VECTORS);
1242 
1243 		//TWOFISH
1244 		test_cipher("ecb(twofish)", ENCRYPT, tf_enc_tv_template,
1245 			    TF_ENC_TEST_VECTORS);
1246 		test_cipher("ecb(twofish)", DECRYPT, tf_dec_tv_template,
1247 			    TF_DEC_TEST_VECTORS);
1248 		test_cipher("cbc(twofish)", ENCRYPT, tf_cbc_enc_tv_template,
1249 			    TF_CBC_ENC_TEST_VECTORS);
1250 		test_cipher("cbc(twofish)", DECRYPT, tf_cbc_dec_tv_template,
1251 			    TF_CBC_DEC_TEST_VECTORS);
1252 
1253 		//SERPENT
1254 		test_cipher("ecb(serpent)", ENCRYPT, serpent_enc_tv_template,
1255 			    SERPENT_ENC_TEST_VECTORS);
1256 		test_cipher("ecb(serpent)", DECRYPT, serpent_dec_tv_template,
1257 			    SERPENT_DEC_TEST_VECTORS);
1258 
1259 		//TNEPRES
1260 		test_cipher("ecb(tnepres)", ENCRYPT, tnepres_enc_tv_template,
1261 			    TNEPRES_ENC_TEST_VECTORS);
1262 		test_cipher("ecb(tnepres)", DECRYPT, tnepres_dec_tv_template,
1263 			    TNEPRES_DEC_TEST_VECTORS);
1264 
1265 		//AES
1266 		test_cipher("ecb(aes)", ENCRYPT, aes_enc_tv_template,
1267 			    AES_ENC_TEST_VECTORS);
1268 		test_cipher("ecb(aes)", DECRYPT, aes_dec_tv_template,
1269 			    AES_DEC_TEST_VECTORS);
1270 		test_cipher("cbc(aes)", ENCRYPT, aes_cbc_enc_tv_template,
1271 			    AES_CBC_ENC_TEST_VECTORS);
1272 		test_cipher("cbc(aes)", DECRYPT, aes_cbc_dec_tv_template,
1273 			    AES_CBC_DEC_TEST_VECTORS);
1274 		test_cipher("lrw(aes)", ENCRYPT, aes_lrw_enc_tv_template,
1275 			    AES_LRW_ENC_TEST_VECTORS);
1276 		test_cipher("lrw(aes)", DECRYPT, aes_lrw_dec_tv_template,
1277 			    AES_LRW_DEC_TEST_VECTORS);
1278 		test_cipher("xts(aes)", ENCRYPT, aes_xts_enc_tv_template,
1279 			    AES_XTS_ENC_TEST_VECTORS);
1280 		test_cipher("xts(aes)", DECRYPT, aes_xts_dec_tv_template,
1281 			    AES_XTS_DEC_TEST_VECTORS);
1282 		test_cipher("rfc3686(ctr(aes))", ENCRYPT, aes_ctr_enc_tv_template,
1283 			    AES_CTR_ENC_TEST_VECTORS);
1284 		test_cipher("rfc3686(ctr(aes))", DECRYPT, aes_ctr_dec_tv_template,
1285 			    AES_CTR_DEC_TEST_VECTORS);
1286 		test_aead("gcm(aes)", ENCRYPT, aes_gcm_enc_tv_template,
1287 			  AES_GCM_ENC_TEST_VECTORS);
1288 		test_aead("gcm(aes)", DECRYPT, aes_gcm_dec_tv_template,
1289 			  AES_GCM_DEC_TEST_VECTORS);
1290 		test_aead("ccm(aes)", ENCRYPT, aes_ccm_enc_tv_template,
1291 			  AES_CCM_ENC_TEST_VECTORS);
1292 		test_aead("ccm(aes)", DECRYPT, aes_ccm_dec_tv_template,
1293 			  AES_CCM_DEC_TEST_VECTORS);
1294 
1295 		//CAST5
1296 		test_cipher("ecb(cast5)", ENCRYPT, cast5_enc_tv_template,
1297 			    CAST5_ENC_TEST_VECTORS);
1298 		test_cipher("ecb(cast5)", DECRYPT, cast5_dec_tv_template,
1299 			    CAST5_DEC_TEST_VECTORS);
1300 
1301 		//CAST6
1302 		test_cipher("ecb(cast6)", ENCRYPT, cast6_enc_tv_template,
1303 			    CAST6_ENC_TEST_VECTORS);
1304 		test_cipher("ecb(cast6)", DECRYPT, cast6_dec_tv_template,
1305 			    CAST6_DEC_TEST_VECTORS);
1306 
1307 		//ARC4
1308 		test_cipher("ecb(arc4)", ENCRYPT, arc4_enc_tv_template,
1309 			    ARC4_ENC_TEST_VECTORS);
1310 		test_cipher("ecb(arc4)", DECRYPT, arc4_dec_tv_template,
1311 			    ARC4_DEC_TEST_VECTORS);
1312 
1313 		//TEA
1314 		test_cipher("ecb(tea)", ENCRYPT, tea_enc_tv_template,
1315 			    TEA_ENC_TEST_VECTORS);
1316 		test_cipher("ecb(tea)", DECRYPT, tea_dec_tv_template,
1317 			    TEA_DEC_TEST_VECTORS);
1318 
1319 
1320 		//XTEA
1321 		test_cipher("ecb(xtea)", ENCRYPT, xtea_enc_tv_template,
1322 			    XTEA_ENC_TEST_VECTORS);
1323 		test_cipher("ecb(xtea)", DECRYPT, xtea_dec_tv_template,
1324 			    XTEA_DEC_TEST_VECTORS);
1325 
1326 		//KHAZAD
1327 		test_cipher("ecb(khazad)", ENCRYPT, khazad_enc_tv_template,
1328 			    KHAZAD_ENC_TEST_VECTORS);
1329 		test_cipher("ecb(khazad)", DECRYPT, khazad_dec_tv_template,
1330 			    KHAZAD_DEC_TEST_VECTORS);
1331 
1332 		//ANUBIS
1333 		test_cipher("ecb(anubis)", ENCRYPT, anubis_enc_tv_template,
1334 			    ANUBIS_ENC_TEST_VECTORS);
1335 		test_cipher("ecb(anubis)", DECRYPT, anubis_dec_tv_template,
1336 			    ANUBIS_DEC_TEST_VECTORS);
1337 		test_cipher("cbc(anubis)", ENCRYPT, anubis_cbc_enc_tv_template,
1338 			    ANUBIS_CBC_ENC_TEST_VECTORS);
1339 		test_cipher("cbc(anubis)", DECRYPT, anubis_cbc_dec_tv_template,
1340 			    ANUBIS_CBC_ENC_TEST_VECTORS);
1341 
1342 		//XETA
1343 		test_cipher("ecb(xeta)", ENCRYPT, xeta_enc_tv_template,
1344 			    XETA_ENC_TEST_VECTORS);
1345 		test_cipher("ecb(xeta)", DECRYPT, xeta_dec_tv_template,
1346 			    XETA_DEC_TEST_VECTORS);
1347 
1348 		//FCrypt
1349 		test_cipher("pcbc(fcrypt)", ENCRYPT, fcrypt_pcbc_enc_tv_template,
1350 			    FCRYPT_ENC_TEST_VECTORS);
1351 		test_cipher("pcbc(fcrypt)", DECRYPT, fcrypt_pcbc_dec_tv_template,
1352 			    FCRYPT_DEC_TEST_VECTORS);
1353 
1354 		//CAMELLIA
1355 		test_cipher("ecb(camellia)", ENCRYPT,
1356 			    camellia_enc_tv_template,
1357 			    CAMELLIA_ENC_TEST_VECTORS);
1358 		test_cipher("ecb(camellia)", DECRYPT,
1359 			    camellia_dec_tv_template,
1360 			    CAMELLIA_DEC_TEST_VECTORS);
1361 		test_cipher("cbc(camellia)", ENCRYPT,
1362 			    camellia_cbc_enc_tv_template,
1363 			    CAMELLIA_CBC_ENC_TEST_VECTORS);
1364 		test_cipher("cbc(camellia)", DECRYPT,
1365 			    camellia_cbc_dec_tv_template,
1366 			    CAMELLIA_CBC_DEC_TEST_VECTORS);
1367 
1368 		//SEED
1369 		test_cipher("ecb(seed)", ENCRYPT, seed_enc_tv_template,
1370 			    SEED_ENC_TEST_VECTORS);
1371 		test_cipher("ecb(seed)", DECRYPT, seed_dec_tv_template,
1372 			    SEED_DEC_TEST_VECTORS);
1373 
1374 		//CTS
1375 		test_cipher("cts(cbc(aes))", ENCRYPT, cts_mode_enc_tv_template,
1376 			    CTS_MODE_ENC_TEST_VECTORS);
1377 		test_cipher("cts(cbc(aes))", DECRYPT, cts_mode_dec_tv_template,
1378 			    CTS_MODE_DEC_TEST_VECTORS);
1379 
1380 		test_hash("sha384", sha384_tv_template, SHA384_TEST_VECTORS);
1381 		test_hash("sha512", sha512_tv_template, SHA512_TEST_VECTORS);
1382 		test_hash("wp512", wp512_tv_template, WP512_TEST_VECTORS);
1383 		test_hash("wp384", wp384_tv_template, WP384_TEST_VECTORS);
1384 		test_hash("wp256", wp256_tv_template, WP256_TEST_VECTORS);
1385 		test_hash("tgr192", tgr192_tv_template, TGR192_TEST_VECTORS);
1386 		test_hash("tgr160", tgr160_tv_template, TGR160_TEST_VECTORS);
1387 		test_hash("tgr128", tgr128_tv_template, TGR128_TEST_VECTORS);
1388 		test_comp("deflate", deflate_comp_tv_template,
1389 			  deflate_decomp_tv_template, DEFLATE_COMP_TEST_VECTORS,
1390 			  DEFLATE_DECOMP_TEST_VECTORS);
1391 		test_comp("lzo", lzo_comp_tv_template, lzo_decomp_tv_template,
1392 			  LZO_COMP_TEST_VECTORS, LZO_DECOMP_TEST_VECTORS);
1393 		test_hash("crc32c", crc32c_tv_template, CRC32C_TEST_VECTORS);
1394 		test_hash("hmac(md5)", hmac_md5_tv_template,
1395 			  HMAC_MD5_TEST_VECTORS);
1396 		test_hash("hmac(sha1)", hmac_sha1_tv_template,
1397 			  HMAC_SHA1_TEST_VECTORS);
1398 		test_hash("hmac(sha224)", hmac_sha224_tv_template,
1399 			  HMAC_SHA224_TEST_VECTORS);
1400 		test_hash("hmac(sha256)", hmac_sha256_tv_template,
1401 			  HMAC_SHA256_TEST_VECTORS);
1402 		test_hash("hmac(sha384)", hmac_sha384_tv_template,
1403 			  HMAC_SHA384_TEST_VECTORS);
1404 		test_hash("hmac(sha512)", hmac_sha512_tv_template,
1405 			  HMAC_SHA512_TEST_VECTORS);
1406 
1407 		test_hash("xcbc(aes)", aes_xcbc128_tv_template,
1408 			  XCBC_AES_TEST_VECTORS);
1409 
1410 		test_hash("michael_mic", michael_mic_tv_template, MICHAEL_MIC_TEST_VECTORS);
1411 		break;
1412 
1413 	case 1:
1414 		test_hash("md5", md5_tv_template, MD5_TEST_VECTORS);
1415 		break;
1416 
1417 	case 2:
1418 		test_hash("sha1", sha1_tv_template, SHA1_TEST_VECTORS);
1419 		break;
1420 
1421 	case 3:
1422 		test_cipher("ecb(des)", ENCRYPT, des_enc_tv_template,
1423 			    DES_ENC_TEST_VECTORS);
1424 		test_cipher("ecb(des)", DECRYPT, des_dec_tv_template,
1425 			    DES_DEC_TEST_VECTORS);
1426 		test_cipher("cbc(des)", ENCRYPT, des_cbc_enc_tv_template,
1427 			    DES_CBC_ENC_TEST_VECTORS);
1428 		test_cipher("cbc(des)", DECRYPT, des_cbc_dec_tv_template,
1429 			    DES_CBC_DEC_TEST_VECTORS);
1430 		break;
1431 
1432 	case 4:
1433 		test_cipher("ecb(des3_ede)", ENCRYPT, des3_ede_enc_tv_template,
1434 			    DES3_EDE_ENC_TEST_VECTORS);
1435 		test_cipher("ecb(des3_ede)", DECRYPT, des3_ede_dec_tv_template,
1436 			    DES3_EDE_DEC_TEST_VECTORS);
1437 
1438 		test_cipher("cbc(des3_ede)", ENCRYPT,
1439 			    des3_ede_cbc_enc_tv_template,
1440 			    DES3_EDE_CBC_ENC_TEST_VECTORS);
1441 
1442 		test_cipher("cbc(des3_ede)", DECRYPT,
1443 			    des3_ede_cbc_dec_tv_template,
1444 			    DES3_EDE_CBC_DEC_TEST_VECTORS);
1445 		break;
1446 
1447 	case 5:
1448 		test_hash("md4", md4_tv_template, MD4_TEST_VECTORS);
1449 		break;
1450 
1451 	case 6:
1452 		test_hash("sha256", sha256_tv_template, SHA256_TEST_VECTORS);
1453 		break;
1454 
1455 	case 7:
1456 		test_cipher("ecb(blowfish)", ENCRYPT, bf_enc_tv_template,
1457 			    BF_ENC_TEST_VECTORS);
1458 		test_cipher("ecb(blowfish)", DECRYPT, bf_dec_tv_template,
1459 			    BF_DEC_TEST_VECTORS);
1460 		test_cipher("cbc(blowfish)", ENCRYPT, bf_cbc_enc_tv_template,
1461 			    BF_CBC_ENC_TEST_VECTORS);
1462 		test_cipher("cbc(blowfish)", DECRYPT, bf_cbc_dec_tv_template,
1463 			    BF_CBC_DEC_TEST_VECTORS);
1464 		break;
1465 
1466 	case 8:
1467 		test_cipher("ecb(twofish)", ENCRYPT, tf_enc_tv_template,
1468 			    TF_ENC_TEST_VECTORS);
1469 		test_cipher("ecb(twofish)", DECRYPT, tf_dec_tv_template,
1470 			    TF_DEC_TEST_VECTORS);
1471 		test_cipher("cbc(twofish)", ENCRYPT, tf_cbc_enc_tv_template,
1472 			    TF_CBC_ENC_TEST_VECTORS);
1473 		test_cipher("cbc(twofish)", DECRYPT, tf_cbc_dec_tv_template,
1474 			    TF_CBC_DEC_TEST_VECTORS);
1475 		break;
1476 
1477 	case 9:
1478 		test_cipher("ecb(serpent)", ENCRYPT, serpent_enc_tv_template,
1479 			    SERPENT_ENC_TEST_VECTORS);
1480 		test_cipher("ecb(serpent)", DECRYPT, serpent_dec_tv_template,
1481 			    SERPENT_DEC_TEST_VECTORS);
1482 		break;
1483 
1484 	case 10:
1485 		test_cipher("ecb(aes)", ENCRYPT, aes_enc_tv_template,
1486 			    AES_ENC_TEST_VECTORS);
1487 		test_cipher("ecb(aes)", DECRYPT, aes_dec_tv_template,
1488 			    AES_DEC_TEST_VECTORS);
1489 		test_cipher("cbc(aes)", ENCRYPT, aes_cbc_enc_tv_template,
1490 			    AES_CBC_ENC_TEST_VECTORS);
1491 		test_cipher("cbc(aes)", DECRYPT, aes_cbc_dec_tv_template,
1492 			    AES_CBC_DEC_TEST_VECTORS);
1493 		test_cipher("lrw(aes)", ENCRYPT, aes_lrw_enc_tv_template,
1494 			    AES_LRW_ENC_TEST_VECTORS);
1495 		test_cipher("lrw(aes)", DECRYPT, aes_lrw_dec_tv_template,
1496 			    AES_LRW_DEC_TEST_VECTORS);
1497 		test_cipher("xts(aes)", ENCRYPT, aes_xts_enc_tv_template,
1498 			    AES_XTS_ENC_TEST_VECTORS);
1499 		test_cipher("xts(aes)", DECRYPT, aes_xts_dec_tv_template,
1500 			    AES_XTS_DEC_TEST_VECTORS);
1501 		test_cipher("rfc3686(ctr(aes))", ENCRYPT, aes_ctr_enc_tv_template,
1502 			    AES_CTR_ENC_TEST_VECTORS);
1503 		test_cipher("rfc3686(ctr(aes))", DECRYPT, aes_ctr_dec_tv_template,
1504 			    AES_CTR_DEC_TEST_VECTORS);
1505 		break;
1506 
1507 	case 11:
1508 		test_hash("sha384", sha384_tv_template, SHA384_TEST_VECTORS);
1509 		break;
1510 
1511 	case 12:
1512 		test_hash("sha512", sha512_tv_template, SHA512_TEST_VECTORS);
1513 		break;
1514 
1515 	case 13:
1516 		test_comp("deflate", deflate_comp_tv_template,
1517 			  deflate_decomp_tv_template, DEFLATE_COMP_TEST_VECTORS,
1518 			  DEFLATE_DECOMP_TEST_VECTORS);
1519 		break;
1520 
1521 	case 14:
1522 		test_cipher("ecb(cast5)", ENCRYPT, cast5_enc_tv_template,
1523 			    CAST5_ENC_TEST_VECTORS);
1524 		test_cipher("ecb(cast5)", DECRYPT, cast5_dec_tv_template,
1525 			    CAST5_DEC_TEST_VECTORS);
1526 		break;
1527 
1528 	case 15:
1529 		test_cipher("ecb(cast6)", ENCRYPT, cast6_enc_tv_template,
1530 			    CAST6_ENC_TEST_VECTORS);
1531 		test_cipher("ecb(cast6)", DECRYPT, cast6_dec_tv_template,
1532 			    CAST6_DEC_TEST_VECTORS);
1533 		break;
1534 
1535 	case 16:
1536 		test_cipher("ecb(arc4)", ENCRYPT, arc4_enc_tv_template,
1537 			    ARC4_ENC_TEST_VECTORS);
1538 		test_cipher("ecb(arc4)", DECRYPT, arc4_dec_tv_template,
1539 			    ARC4_DEC_TEST_VECTORS);
1540 		break;
1541 
1542 	case 17:
1543 		test_hash("michael_mic", michael_mic_tv_template, MICHAEL_MIC_TEST_VECTORS);
1544 		break;
1545 
1546 	case 18:
1547 		test_hash("crc32c", crc32c_tv_template, CRC32C_TEST_VECTORS);
1548 		break;
1549 
1550 	case 19:
1551 		test_cipher("ecb(tea)", ENCRYPT, tea_enc_tv_template,
1552 			    TEA_ENC_TEST_VECTORS);
1553 		test_cipher("ecb(tea)", DECRYPT, tea_dec_tv_template,
1554 			    TEA_DEC_TEST_VECTORS);
1555 		break;
1556 
1557 	case 20:
1558 		test_cipher("ecb(xtea)", ENCRYPT, xtea_enc_tv_template,
1559 			    XTEA_ENC_TEST_VECTORS);
1560 		test_cipher("ecb(xtea)", DECRYPT, xtea_dec_tv_template,
1561 			    XTEA_DEC_TEST_VECTORS);
1562 		break;
1563 
1564 	case 21:
1565 		test_cipher("ecb(khazad)", ENCRYPT, khazad_enc_tv_template,
1566 			    KHAZAD_ENC_TEST_VECTORS);
1567 		test_cipher("ecb(khazad)", DECRYPT, khazad_dec_tv_template,
1568 			    KHAZAD_DEC_TEST_VECTORS);
1569 		break;
1570 
1571 	case 22:
1572 		test_hash("wp512", wp512_tv_template, WP512_TEST_VECTORS);
1573 		break;
1574 
1575 	case 23:
1576 		test_hash("wp384", wp384_tv_template, WP384_TEST_VECTORS);
1577 		break;
1578 
1579 	case 24:
1580 		test_hash("wp256", wp256_tv_template, WP256_TEST_VECTORS);
1581 		break;
1582 
1583 	case 25:
1584 		test_cipher("ecb(tnepres)", ENCRYPT, tnepres_enc_tv_template,
1585 			    TNEPRES_ENC_TEST_VECTORS);
1586 		test_cipher("ecb(tnepres)", DECRYPT, tnepres_dec_tv_template,
1587 			    TNEPRES_DEC_TEST_VECTORS);
1588 		break;
1589 
1590 	case 26:
1591 		test_cipher("ecb(anubis)", ENCRYPT, anubis_enc_tv_template,
1592 			    ANUBIS_ENC_TEST_VECTORS);
1593 		test_cipher("ecb(anubis)", DECRYPT, anubis_dec_tv_template,
1594 			    ANUBIS_DEC_TEST_VECTORS);
1595 		test_cipher("cbc(anubis)", ENCRYPT, anubis_cbc_enc_tv_template,
1596 			    ANUBIS_CBC_ENC_TEST_VECTORS);
1597 		test_cipher("cbc(anubis)", DECRYPT, anubis_cbc_dec_tv_template,
1598 			    ANUBIS_CBC_ENC_TEST_VECTORS);
1599 		break;
1600 
1601 	case 27:
1602 		test_hash("tgr192", tgr192_tv_template, TGR192_TEST_VECTORS);
1603 		break;
1604 
1605 	case 28:
1606 
1607 		test_hash("tgr160", tgr160_tv_template, TGR160_TEST_VECTORS);
1608 		break;
1609 
1610 	case 29:
1611 		test_hash("tgr128", tgr128_tv_template, TGR128_TEST_VECTORS);
1612 		break;
1613 
1614 	case 30:
1615 		test_cipher("ecb(xeta)", ENCRYPT, xeta_enc_tv_template,
1616 			    XETA_ENC_TEST_VECTORS);
1617 		test_cipher("ecb(xeta)", DECRYPT, xeta_dec_tv_template,
1618 			    XETA_DEC_TEST_VECTORS);
1619 		break;
1620 
1621 	case 31:
1622 		test_cipher("pcbc(fcrypt)", ENCRYPT, fcrypt_pcbc_enc_tv_template,
1623 			    FCRYPT_ENC_TEST_VECTORS);
1624 		test_cipher("pcbc(fcrypt)", DECRYPT, fcrypt_pcbc_dec_tv_template,
1625 			    FCRYPT_DEC_TEST_VECTORS);
1626 		break;
1627 
1628 	case 32:
1629 		test_cipher("ecb(camellia)", ENCRYPT,
1630 			    camellia_enc_tv_template,
1631 			    CAMELLIA_ENC_TEST_VECTORS);
1632 		test_cipher("ecb(camellia)", DECRYPT,
1633 			    camellia_dec_tv_template,
1634 			    CAMELLIA_DEC_TEST_VECTORS);
1635 		test_cipher("cbc(camellia)", ENCRYPT,
1636 			    camellia_cbc_enc_tv_template,
1637 			    CAMELLIA_CBC_ENC_TEST_VECTORS);
1638 		test_cipher("cbc(camellia)", DECRYPT,
1639 			    camellia_cbc_dec_tv_template,
1640 			    CAMELLIA_CBC_DEC_TEST_VECTORS);
1641 		break;
1642 	case 33:
1643 		test_hash("sha224", sha224_tv_template, SHA224_TEST_VECTORS);
1644 		break;
1645 
1646 	case 34:
1647 		test_cipher("salsa20", ENCRYPT,
1648 			    salsa20_stream_enc_tv_template,
1649 			    SALSA20_STREAM_ENC_TEST_VECTORS);
1650 		break;
1651 
1652 	case 35:
1653 		test_aead("gcm(aes)", ENCRYPT, aes_gcm_enc_tv_template,
1654 			  AES_GCM_ENC_TEST_VECTORS);
1655 		test_aead("gcm(aes)", DECRYPT, aes_gcm_dec_tv_template,
1656 			  AES_GCM_DEC_TEST_VECTORS);
1657 		break;
1658 
1659 	case 36:
1660 		test_comp("lzo", lzo_comp_tv_template, lzo_decomp_tv_template,
1661 			  LZO_COMP_TEST_VECTORS, LZO_DECOMP_TEST_VECTORS);
1662 		break;
1663 
1664 	case 37:
1665 		test_aead("ccm(aes)", ENCRYPT, aes_ccm_enc_tv_template,
1666 			  AES_CCM_ENC_TEST_VECTORS);
1667 		test_aead("ccm(aes)", DECRYPT, aes_ccm_dec_tv_template,
1668 			  AES_CCM_DEC_TEST_VECTORS);
1669 		break;
1670 
1671 	case 38:
1672 		test_cipher("cts(cbc(aes))", ENCRYPT, cts_mode_enc_tv_template,
1673 			    CTS_MODE_ENC_TEST_VECTORS);
1674 		test_cipher("cts(cbc(aes))", DECRYPT, cts_mode_dec_tv_template,
1675 			    CTS_MODE_DEC_TEST_VECTORS);
1676 		break;
1677 
1678         case 39:
1679 		test_hash("rmd128", rmd128_tv_template, RMD128_TEST_VECTORS);
1680 		break;
1681 
1682         case 40:
1683 		test_hash("rmd160", rmd160_tv_template, RMD160_TEST_VECTORS);
1684 		break;
1685 
1686 	case 41:
1687 		test_hash("rmd256", rmd256_tv_template, RMD256_TEST_VECTORS);
1688 		break;
1689 
1690 	case 42:
1691 		test_hash("rmd320", rmd320_tv_template, RMD320_TEST_VECTORS);
1692 		break;
1693 
1694 	case 100:
1695 		test_hash("hmac(md5)", hmac_md5_tv_template,
1696 			  HMAC_MD5_TEST_VECTORS);
1697 		break;
1698 
1699 	case 101:
1700 		test_hash("hmac(sha1)", hmac_sha1_tv_template,
1701 			  HMAC_SHA1_TEST_VECTORS);
1702 		break;
1703 
1704 	case 102:
1705 		test_hash("hmac(sha256)", hmac_sha256_tv_template,
1706 			  HMAC_SHA256_TEST_VECTORS);
1707 		break;
1708 
1709 	case 103:
1710 		test_hash("hmac(sha384)", hmac_sha384_tv_template,
1711 			  HMAC_SHA384_TEST_VECTORS);
1712 		break;
1713 
1714 	case 104:
1715 		test_hash("hmac(sha512)", hmac_sha512_tv_template,
1716 			  HMAC_SHA512_TEST_VECTORS);
1717 		break;
1718 
1719 	case 105:
1720 		test_hash("hmac(sha224)", hmac_sha224_tv_template,
1721 			  HMAC_SHA224_TEST_VECTORS);
1722 		break;
1723 
1724 	case 106:
1725 		test_hash("xcbc(aes)", aes_xcbc128_tv_template,
1726 			  XCBC_AES_TEST_VECTORS);
1727 		break;
1728 
1729 	case 107:
1730 		test_hash("hmac(rmd128)", hmac_rmd128_tv_template,
1731 			  HMAC_RMD128_TEST_VECTORS);
1732 		break;
1733 
1734 	case 108:
1735 		test_hash("hmac(rmd160)", hmac_rmd160_tv_template,
1736 			  HMAC_RMD160_TEST_VECTORS);
1737 		break;
1738 
1739 	case 200:
1740 		test_cipher_speed("ecb(aes)", ENCRYPT, sec, NULL, 0,
1741 				speed_template_16_24_32);
1742 		test_cipher_speed("ecb(aes)", DECRYPT, sec, NULL, 0,
1743 				speed_template_16_24_32);
1744 		test_cipher_speed("cbc(aes)", ENCRYPT, sec, NULL, 0,
1745 				speed_template_16_24_32);
1746 		test_cipher_speed("cbc(aes)", DECRYPT, sec, NULL, 0,
1747 				speed_template_16_24_32);
1748 		test_cipher_speed("lrw(aes)", ENCRYPT, sec, NULL, 0,
1749 				speed_template_32_40_48);
1750 		test_cipher_speed("lrw(aes)", DECRYPT, sec, NULL, 0,
1751 				speed_template_32_40_48);
1752 		test_cipher_speed("xts(aes)", ENCRYPT, sec, NULL, 0,
1753 				speed_template_32_48_64);
1754 		test_cipher_speed("xts(aes)", DECRYPT, sec, NULL, 0,
1755 				speed_template_32_48_64);
1756 		break;
1757 
1758 	case 201:
1759 		test_cipher_speed("ecb(des3_ede)", ENCRYPT, sec,
1760 				des3_ede_enc_tv_template, DES3_EDE_ENC_TEST_VECTORS,
1761 				speed_template_24);
1762 		test_cipher_speed("ecb(des3_ede)", DECRYPT, sec,
1763 				des3_ede_enc_tv_template, DES3_EDE_ENC_TEST_VECTORS,
1764 				speed_template_24);
1765 		test_cipher_speed("cbc(des3_ede)", ENCRYPT, sec,
1766 				des3_ede_enc_tv_template, DES3_EDE_ENC_TEST_VECTORS,
1767 				speed_template_24);
1768 		test_cipher_speed("cbc(des3_ede)", DECRYPT, sec,
1769 				des3_ede_enc_tv_template, DES3_EDE_ENC_TEST_VECTORS,
1770 				speed_template_24);
1771 		break;
1772 
1773 	case 202:
1774 		test_cipher_speed("ecb(twofish)", ENCRYPT, sec, NULL, 0,
1775 				speed_template_16_24_32);
1776 		test_cipher_speed("ecb(twofish)", DECRYPT, sec, NULL, 0,
1777 				speed_template_16_24_32);
1778 		test_cipher_speed("cbc(twofish)", ENCRYPT, sec, NULL, 0,
1779 				speed_template_16_24_32);
1780 		test_cipher_speed("cbc(twofish)", DECRYPT, sec, NULL, 0,
1781 				speed_template_16_24_32);
1782 		break;
1783 
1784 	case 203:
1785 		test_cipher_speed("ecb(blowfish)", ENCRYPT, sec, NULL, 0,
1786 				  speed_template_8_32);
1787 		test_cipher_speed("ecb(blowfish)", DECRYPT, sec, NULL, 0,
1788 				  speed_template_8_32);
1789 		test_cipher_speed("cbc(blowfish)", ENCRYPT, sec, NULL, 0,
1790 				  speed_template_8_32);
1791 		test_cipher_speed("cbc(blowfish)", DECRYPT, sec, NULL, 0,
1792 				  speed_template_8_32);
1793 		break;
1794 
1795 	case 204:
1796 		test_cipher_speed("ecb(des)", ENCRYPT, sec, NULL, 0,
1797 				  speed_template_8);
1798 		test_cipher_speed("ecb(des)", DECRYPT, sec, NULL, 0,
1799 				  speed_template_8);
1800 		test_cipher_speed("cbc(des)", ENCRYPT, sec, NULL, 0,
1801 				  speed_template_8);
1802 		test_cipher_speed("cbc(des)", DECRYPT, sec, NULL, 0,
1803 				  speed_template_8);
1804 		break;
1805 
1806 	case 205:
1807 		test_cipher_speed("ecb(camellia)", ENCRYPT, sec, NULL, 0,
1808 				speed_template_16_24_32);
1809 		test_cipher_speed("ecb(camellia)", DECRYPT, sec, NULL, 0,
1810 				speed_template_16_24_32);
1811 		test_cipher_speed("cbc(camellia)", ENCRYPT, sec, NULL, 0,
1812 				speed_template_16_24_32);
1813 		test_cipher_speed("cbc(camellia)", DECRYPT, sec, NULL, 0,
1814 				speed_template_16_24_32);
1815 		break;
1816 
1817 	case 206:
1818 		test_cipher_speed("salsa20", ENCRYPT, sec, NULL, 0,
1819 				  speed_template_16_32);
1820 		break;
1821 
1822 	case 300:
1823 		/* fall through */
1824 
1825 	case 301:
1826 		test_hash_speed("md4", sec, generic_hash_speed_template);
1827 		if (mode > 300 && mode < 400) break;
1828 
1829 	case 302:
1830 		test_hash_speed("md5", sec, generic_hash_speed_template);
1831 		if (mode > 300 && mode < 400) break;
1832 
1833 	case 303:
1834 		test_hash_speed("sha1", sec, generic_hash_speed_template);
1835 		if (mode > 300 && mode < 400) break;
1836 
1837 	case 304:
1838 		test_hash_speed("sha256", sec, generic_hash_speed_template);
1839 		if (mode > 300 && mode < 400) break;
1840 
1841 	case 305:
1842 		test_hash_speed("sha384", sec, generic_hash_speed_template);
1843 		if (mode > 300 && mode < 400) break;
1844 
1845 	case 306:
1846 		test_hash_speed("sha512", sec, generic_hash_speed_template);
1847 		if (mode > 300 && mode < 400) break;
1848 
1849 	case 307:
1850 		test_hash_speed("wp256", sec, generic_hash_speed_template);
1851 		if (mode > 300 && mode < 400) break;
1852 
1853 	case 308:
1854 		test_hash_speed("wp384", sec, generic_hash_speed_template);
1855 		if (mode > 300 && mode < 400) break;
1856 
1857 	case 309:
1858 		test_hash_speed("wp512", sec, generic_hash_speed_template);
1859 		if (mode > 300 && mode < 400) break;
1860 
1861 	case 310:
1862 		test_hash_speed("tgr128", sec, generic_hash_speed_template);
1863 		if (mode > 300 && mode < 400) break;
1864 
1865 	case 311:
1866 		test_hash_speed("tgr160", sec, generic_hash_speed_template);
1867 		if (mode > 300 && mode < 400) break;
1868 
1869 	case 312:
1870 		test_hash_speed("tgr192", sec, generic_hash_speed_template);
1871 		if (mode > 300 && mode < 400) break;
1872 
1873 	case 313:
1874 		test_hash_speed("sha224", sec, generic_hash_speed_template);
1875 		if (mode > 300 && mode < 400) break;
1876 
1877 	case 314:
1878 		test_hash_speed("rmd128", sec, generic_hash_speed_template);
1879 		if (mode > 300 && mode < 400) break;
1880 
1881 	case 315:
1882 		test_hash_speed("rmd160", sec, generic_hash_speed_template);
1883 		if (mode > 300 && mode < 400) break;
1884 
1885 	case 316:
1886 		test_hash_speed("rmd256", sec, generic_hash_speed_template);
1887 		if (mode > 300 && mode < 400) break;
1888 
1889 	case 317:
1890 		test_hash_speed("rmd320", sec, generic_hash_speed_template);
1891 		if (mode > 300 && mode < 400) break;
1892 
1893 	case 399:
1894 		break;
1895 
1896 	case 1000:
1897 		test_available();
1898 		break;
1899 
1900 	default:
1901 		/* useful for debugging */
1902 		printk("not testing anything\n");
1903 		break;
1904 	}
1905 }
1906 
1907 static int __init tcrypt_mod_init(void)
1908 {
1909 	int err = -ENOMEM;
1910 
1911 	tvmem = kmalloc(TVMEMSIZE, GFP_KERNEL);
1912 	if (tvmem == NULL)
1913 		return err;
1914 
1915 	xbuf = kmalloc(XBUFSIZE, GFP_KERNEL);
1916 	if (xbuf == NULL)
1917 		goto err_free_tv;
1918 
1919 	axbuf = kmalloc(XBUFSIZE, GFP_KERNEL);
1920 	if (axbuf == NULL)
1921 		goto err_free_xbuf;
1922 
1923 	do_test();
1924 
1925 	/* We intentionaly return -EAGAIN to prevent keeping
1926 	 * the module. It does all its work from init()
1927 	 * and doesn't offer any runtime functionality
1928 	 * => we don't need it in the memory, do we?
1929 	 *                                        -- mludvig
1930 	 */
1931 	err = -EAGAIN;
1932 
1933 	kfree(axbuf);
1934  err_free_xbuf:
1935 	kfree(xbuf);
1936  err_free_tv:
1937 	kfree(tvmem);
1938 
1939 	return err;
1940 }
1941 
1942 /*
1943  * If an init function is provided, an exit function must also be provided
1944  * to allow module unload.
1945  */
1946 static void __exit tcrypt_mod_fini(void) { }
1947 
1948 module_init(tcrypt_mod_init);
1949 module_exit(tcrypt_mod_fini);
1950 
1951 module_param(mode, int, 0);
1952 module_param(sec, uint, 0);
1953 MODULE_PARM_DESC(sec, "Length in seconds of speed tests "
1954 		      "(defaults to zero which uses CPU cycles instead)");
1955 
1956 MODULE_LICENSE("GPL");
1957 MODULE_DESCRIPTION("Quick & dirty crypto testing module");
1958 MODULE_AUTHOR("James Morris <jmorris@intercode.com.au>");
1959