xref: /linux/crypto/tcrypt.c (revision f7511d5f66f01fc451747b24e79f3ada7a3af9af)
1 /*
2  * Quick & dirty crypto testing module.
3  *
4  * This will only exist until we have a better testing mechanism
5  * (e.g. a char device).
6  *
7  * Copyright (c) 2002 James Morris <jmorris@intercode.com.au>
8  * Copyright (c) 2002 Jean-Francois Dive <jef@linuxbe.org>
9  * Copyright (c) 2007 Nokia Siemens Networks
10  *
11  * This program is free software; you can redistribute it and/or modify it
12  * under the terms of the GNU General Public License as published by the Free
13  * Software Foundation; either version 2 of the License, or (at your option)
14  * any later version.
15  *
16  * 2007-11-13 Added GCM tests
17  * 2007-11-13 Added AEAD support
18  * 2007-11-06 Added SHA-224 and SHA-224-HMAC tests
19  * 2006-12-07 Added SHA384 HMAC and SHA512 HMAC tests
20  * 2004-08-09 Added cipher speed tests (Reyk Floeter <reyk@vantronix.net>)
21  * 2003-09-14 Rewritten by Kartikey Mahendra Bhatt
22  *
23  */
24 
25 #include <linux/err.h>
26 #include <linux/init.h>
27 #include <linux/module.h>
28 #include <linux/mm.h>
29 #include <linux/slab.h>
30 #include <linux/scatterlist.h>
31 #include <linux/string.h>
32 #include <linux/crypto.h>
33 #include <linux/highmem.h>
34 #include <linux/moduleparam.h>
35 #include <linux/jiffies.h>
36 #include <linux/timex.h>
37 #include <linux/interrupt.h>
38 #include "tcrypt.h"
39 
40 /*
41  * Need to kmalloc() memory for testing kmap().
42  */
43 #define TVMEMSIZE	16384
44 #define XBUFSIZE	32768
45 
46 /*
47  * Indexes into the xbuf to simulate cross-page access.
48  */
49 #define IDX1		37
50 #define IDX2		32400
51 #define IDX3		1
52 #define IDX4		8193
53 #define IDX5		22222
54 #define IDX6		17101
55 #define IDX7		27333
56 #define IDX8		3000
57 
58 /*
59 * Used by test_cipher()
60 */
61 #define ENCRYPT 1
62 #define DECRYPT 0
63 
64 struct tcrypt_result {
65 	struct completion completion;
66 	int err;
67 };
68 
69 static unsigned int IDX[8] = { IDX1, IDX2, IDX3, IDX4, IDX5, IDX6, IDX7, IDX8 };
70 
71 /*
72  * Used by test_cipher_speed()
73  */
74 static unsigned int sec;
75 
76 static int mode;
77 static char *xbuf;
78 static char *axbuf;
79 static char *tvmem;
80 
81 static char *check[] = {
82 	"des", "md5", "des3_ede", "rot13", "sha1", "sha224", "sha256",
83 	"blowfish", "twofish", "serpent", "sha384", "sha512", "md4", "aes",
84 	"cast6", "arc4", "michael_mic", "deflate", "crc32c", "tea", "xtea",
85 	"khazad", "wp512", "wp384", "wp256", "tnepres", "xeta",  "fcrypt",
86 	"camellia", "seed", "salsa20", "lzo", "cts", NULL
87 };
88 
89 static void hexdump(unsigned char *buf, unsigned int len)
90 {
91 	print_hex_dump(KERN_CONT, "", DUMP_PREFIX_OFFSET,
92 			16, 1,
93 			buf, len, false);
94 }
95 
96 static void tcrypt_complete(struct crypto_async_request *req, int err)
97 {
98 	struct tcrypt_result *res = req->data;
99 
100 	if (err == -EINPROGRESS)
101 		return;
102 
103 	res->err = err;
104 	complete(&res->completion);
105 }
106 
107 static void test_hash(char *algo, struct hash_testvec *template,
108 		      unsigned int tcount)
109 {
110 	unsigned int i, j, k, temp;
111 	struct scatterlist sg[8];
112 	char result[64];
113 	struct crypto_hash *tfm;
114 	struct hash_desc desc;
115 	int ret;
116 	void *hash_buff;
117 
118 	printk("\ntesting %s\n", algo);
119 
120 	tfm = crypto_alloc_hash(algo, 0, CRYPTO_ALG_ASYNC);
121 	if (IS_ERR(tfm)) {
122 		printk("failed to load transform for %s: %ld\n", algo,
123 		       PTR_ERR(tfm));
124 		return;
125 	}
126 
127 	desc.tfm = tfm;
128 	desc.flags = 0;
129 
130 	for (i = 0; i < tcount; i++) {
131 		printk("test %u:\n", i + 1);
132 		memset(result, 0, 64);
133 
134 		hash_buff = kzalloc(template[i].psize, GFP_KERNEL);
135 		if (!hash_buff)
136 			continue;
137 
138 		memcpy(hash_buff, template[i].plaintext, template[i].psize);
139 		sg_init_one(&sg[0], hash_buff, template[i].psize);
140 
141 		if (template[i].ksize) {
142 			ret = crypto_hash_setkey(tfm, template[i].key,
143 						 template[i].ksize);
144 			if (ret) {
145 				printk("setkey() failed ret=%d\n", ret);
146 				kfree(hash_buff);
147 				goto out;
148 			}
149 		}
150 
151 		ret = crypto_hash_digest(&desc, sg, template[i].psize, result);
152 		if (ret) {
153 			printk("digest () failed ret=%d\n", ret);
154 			kfree(hash_buff);
155 			goto out;
156 		}
157 
158 		hexdump(result, crypto_hash_digestsize(tfm));
159 		printk("%s\n",
160 		       memcmp(result, template[i].digest,
161 			      crypto_hash_digestsize(tfm)) ?
162 		       "fail" : "pass");
163 		kfree(hash_buff);
164 	}
165 
166 	printk("testing %s across pages\n", algo);
167 
168 	/* setup the dummy buffer first */
169 	memset(xbuf, 0, XBUFSIZE);
170 
171 	j = 0;
172 	for (i = 0; i < tcount; i++) {
173 		if (template[i].np) {
174 			j++;
175 			printk("test %u:\n", j);
176 			memset(result, 0, 64);
177 
178 			temp = 0;
179 			sg_init_table(sg, template[i].np);
180 			for (k = 0; k < template[i].np; k++) {
181 				memcpy(&xbuf[IDX[k]],
182 				       template[i].plaintext + temp,
183 				       template[i].tap[k]);
184 				temp += template[i].tap[k];
185 				sg_set_buf(&sg[k], &xbuf[IDX[k]],
186 					    template[i].tap[k]);
187 			}
188 
189 			if (template[i].ksize) {
190 				ret = crypto_hash_setkey(tfm, template[i].key,
191 							 template[i].ksize);
192 
193 				if (ret) {
194 					printk("setkey() failed ret=%d\n", ret);
195 					goto out;
196 				}
197 			}
198 
199 			ret = crypto_hash_digest(&desc, sg, template[i].psize,
200 						 result);
201 			if (ret) {
202 				printk("digest () failed ret=%d\n", ret);
203 				goto out;
204 			}
205 
206 			hexdump(result, crypto_hash_digestsize(tfm));
207 			printk("%s\n",
208 			       memcmp(result, template[i].digest,
209 				      crypto_hash_digestsize(tfm)) ?
210 			       "fail" : "pass");
211 		}
212 	}
213 
214 out:
215 	crypto_free_hash(tfm);
216 }
217 
218 static void test_aead(char *algo, int enc, struct aead_testvec *template,
219 		      unsigned int tcount)
220 {
221 	unsigned int ret, i, j, k, temp;
222 	char *q;
223 	struct crypto_aead *tfm;
224 	char *key;
225 	struct aead_request *req;
226 	struct scatterlist sg[8];
227 	struct scatterlist asg[8];
228 	const char *e;
229 	struct tcrypt_result result;
230 	unsigned int authsize;
231 	void *input;
232 	void *assoc;
233 	char iv[MAX_IVLEN];
234 
235 	if (enc == ENCRYPT)
236 		e = "encryption";
237 	else
238 		e = "decryption";
239 
240 	printk(KERN_INFO "\ntesting %s %s\n", algo, e);
241 
242 	init_completion(&result.completion);
243 
244 	tfm = crypto_alloc_aead(algo, 0, 0);
245 
246 	if (IS_ERR(tfm)) {
247 		printk(KERN_INFO "failed to load transform for %s: %ld\n",
248 		       algo, PTR_ERR(tfm));
249 		return;
250 	}
251 
252 	req = aead_request_alloc(tfm, GFP_KERNEL);
253 	if (!req) {
254 		printk(KERN_INFO "failed to allocate request for %s\n", algo);
255 		goto out;
256 	}
257 
258 	aead_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
259 				  tcrypt_complete, &result);
260 
261 	for (i = 0, j = 0; i < tcount; i++) {
262 		if (!template[i].np) {
263 			printk(KERN_INFO "test %u (%d bit key):\n",
264 			       ++j, template[i].klen * 8);
265 
266 			/* some tepmplates have no input data but they will
267 			 * touch input
268 			 */
269 			input = kzalloc(template[i].ilen + template[i].rlen, GFP_KERNEL);
270 			if (!input)
271 				continue;
272 
273 			assoc = kzalloc(template[i].alen, GFP_KERNEL);
274 			if (!assoc) {
275 				kfree(input);
276 				continue;
277 			}
278 
279 			memcpy(input, template[i].input, template[i].ilen);
280 			memcpy(assoc, template[i].assoc, template[i].alen);
281 			if (template[i].iv)
282 				memcpy(iv, template[i].iv, MAX_IVLEN);
283 			else
284 				memset(iv, 0, MAX_IVLEN);
285 
286 			crypto_aead_clear_flags(tfm, ~0);
287 			if (template[i].wk)
288 				crypto_aead_set_flags(
289 					tfm, CRYPTO_TFM_REQ_WEAK_KEY);
290 
291 			if (template[i].key)
292 				key = template[i].key;
293 			else
294 				key = kzalloc(template[i].klen, GFP_KERNEL);
295 
296 			ret = crypto_aead_setkey(tfm, key,
297 						 template[i].klen);
298 			if (ret) {
299 				printk(KERN_INFO "setkey() failed flags=%x\n",
300 				       crypto_aead_get_flags(tfm));
301 
302 				if (!template[i].fail)
303 					goto next_one;
304 			}
305 
306 			authsize = abs(template[i].rlen - template[i].ilen);
307 			ret = crypto_aead_setauthsize(tfm, authsize);
308 			if (ret) {
309 				printk(KERN_INFO
310 				       "failed to set authsize = %u\n",
311 				       authsize);
312 				goto next_one;
313 			}
314 
315 			sg_init_one(&sg[0], input,
316 				    template[i].ilen + (enc ? authsize : 0));
317 
318 			sg_init_one(&asg[0], assoc, template[i].alen);
319 
320 			aead_request_set_crypt(req, sg, sg,
321 					       template[i].ilen, iv);
322 
323 			aead_request_set_assoc(req, asg, template[i].alen);
324 
325 			ret = enc ?
326 				crypto_aead_encrypt(req) :
327 				crypto_aead_decrypt(req);
328 
329 			switch (ret) {
330 			case 0:
331 				break;
332 			case -EINPROGRESS:
333 			case -EBUSY:
334 				ret = wait_for_completion_interruptible(
335 					&result.completion);
336 				if (!ret && !(ret = result.err)) {
337 					INIT_COMPLETION(result.completion);
338 					break;
339 				}
340 				/* fall through */
341 			default:
342 				printk(KERN_INFO "%s () failed err=%d\n",
343 				       e, -ret);
344 				goto next_one;
345 			}
346 
347 			q = kmap(sg_page(&sg[0])) + sg[0].offset;
348 			hexdump(q, template[i].rlen);
349 
350 			printk(KERN_INFO "enc/dec: %s\n",
351 			       memcmp(q, template[i].result,
352 				      template[i].rlen) ? "fail" : "pass");
353 			kunmap(sg_page(&sg[0]));
354 next_one:
355 			if (!template[i].key)
356 				kfree(key);
357 			kfree(assoc);
358 			kfree(input);
359 		}
360 	}
361 
362 	printk(KERN_INFO "\ntesting %s %s across pages (chunking)\n", algo, e);
363 	memset(xbuf, 0, XBUFSIZE);
364 	memset(axbuf, 0, XBUFSIZE);
365 
366 	for (i = 0, j = 0; i < tcount; i++) {
367 		if (template[i].np) {
368 			printk(KERN_INFO "test %u (%d bit key):\n",
369 			       ++j, template[i].klen * 8);
370 
371 			if (template[i].iv)
372 				memcpy(iv, template[i].iv, MAX_IVLEN);
373 			else
374 				memset(iv, 0, MAX_IVLEN);
375 
376 			crypto_aead_clear_flags(tfm, ~0);
377 			if (template[i].wk)
378 				crypto_aead_set_flags(
379 					tfm, CRYPTO_TFM_REQ_WEAK_KEY);
380 			key = template[i].key;
381 
382 			ret = crypto_aead_setkey(tfm, key, template[i].klen);
383 			if (ret) {
384 				printk(KERN_INFO "setkey() failed flags=%x\n",
385 				       crypto_aead_get_flags(tfm));
386 
387 				if (!template[i].fail)
388 					goto out;
389 			}
390 
391 			sg_init_table(sg, template[i].np);
392 			for (k = 0, temp = 0; k < template[i].np; k++) {
393 				memcpy(&xbuf[IDX[k]],
394 				       template[i].input + temp,
395 				       template[i].tap[k]);
396 				temp += template[i].tap[k];
397 				sg_set_buf(&sg[k], &xbuf[IDX[k]],
398 					   template[i].tap[k]);
399 			}
400 
401 			authsize = abs(template[i].rlen - template[i].ilen);
402 			ret = crypto_aead_setauthsize(tfm, authsize);
403 			if (ret) {
404 				printk(KERN_INFO
405 				       "failed to set authsize = %u\n",
406 				       authsize);
407 				goto out;
408 			}
409 
410 			if (enc)
411 				sg[k - 1].length += authsize;
412 
413 			sg_init_table(asg, template[i].anp);
414 			for (k = 0, temp = 0; k < template[i].anp; k++) {
415 				memcpy(&axbuf[IDX[k]],
416 				       template[i].assoc + temp,
417 				       template[i].atap[k]);
418 				temp += template[i].atap[k];
419 				sg_set_buf(&asg[k], &axbuf[IDX[k]],
420 					   template[i].atap[k]);
421 			}
422 
423 			aead_request_set_crypt(req, sg, sg,
424 					       template[i].ilen,
425 					       iv);
426 
427 			aead_request_set_assoc(req, asg, template[i].alen);
428 
429 			ret = enc ?
430 				crypto_aead_encrypt(req) :
431 				crypto_aead_decrypt(req);
432 
433 			switch (ret) {
434 			case 0:
435 				break;
436 			case -EINPROGRESS:
437 			case -EBUSY:
438 				ret = wait_for_completion_interruptible(
439 					&result.completion);
440 				if (!ret && !(ret = result.err)) {
441 					INIT_COMPLETION(result.completion);
442 					break;
443 				}
444 				/* fall through */
445 			default:
446 				printk(KERN_INFO "%s () failed err=%d\n",
447 				       e, -ret);
448 				goto out;
449 			}
450 
451 			for (k = 0, temp = 0; k < template[i].np; k++) {
452 				printk(KERN_INFO "page %u\n", k);
453 				q = kmap(sg_page(&sg[k])) + sg[k].offset;
454 				hexdump(q, template[i].tap[k]);
455 				printk(KERN_INFO "%s\n",
456 				       memcmp(q, template[i].result + temp,
457 					      template[i].tap[k] -
458 					      (k < template[i].np - 1 || enc ?
459 					       0 : authsize)) ?
460 				       "fail" : "pass");
461 
462 				temp += template[i].tap[k];
463 				kunmap(sg_page(&sg[k]));
464 			}
465 		}
466 	}
467 
468 out:
469 	crypto_free_aead(tfm);
470 	aead_request_free(req);
471 }
472 
473 static void test_cipher(char *algo, int enc,
474 			struct cipher_testvec *template, unsigned int tcount)
475 {
476 	unsigned int ret, i, j, k, temp;
477 	char *q;
478 	struct crypto_ablkcipher *tfm;
479 	struct ablkcipher_request *req;
480 	struct scatterlist sg[8];
481 	const char *e;
482 	struct tcrypt_result result;
483 	void *data;
484 	char iv[MAX_IVLEN];
485 
486 	if (enc == ENCRYPT)
487 	        e = "encryption";
488 	else
489 		e = "decryption";
490 
491 	printk("\ntesting %s %s\n", algo, e);
492 
493 	init_completion(&result.completion);
494 	tfm = crypto_alloc_ablkcipher(algo, 0, 0);
495 
496 	if (IS_ERR(tfm)) {
497 		printk("failed to load transform for %s: %ld\n", algo,
498 		       PTR_ERR(tfm));
499 		return;
500 	}
501 
502 	req = ablkcipher_request_alloc(tfm, GFP_KERNEL);
503 	if (!req) {
504 		printk("failed to allocate request for %s\n", algo);
505 		goto out;
506 	}
507 
508 	ablkcipher_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
509 					tcrypt_complete, &result);
510 
511 	j = 0;
512 	for (i = 0; i < tcount; i++) {
513 
514 		data = kzalloc(template[i].ilen, GFP_KERNEL);
515 		if (!data)
516 			continue;
517 
518 		memcpy(data, template[i].input, template[i].ilen);
519 		if (template[i].iv)
520 			memcpy(iv, template[i].iv, MAX_IVLEN);
521 		else
522 			memset(iv, 0, MAX_IVLEN);
523 
524 		if (!(template[i].np)) {
525 			j++;
526 			printk("test %u (%d bit key):\n",
527 			j, template[i].klen * 8);
528 
529 			crypto_ablkcipher_clear_flags(tfm, ~0);
530 			if (template[i].wk)
531 				crypto_ablkcipher_set_flags(
532 					tfm, CRYPTO_TFM_REQ_WEAK_KEY);
533 
534 			ret = crypto_ablkcipher_setkey(tfm, template[i].key,
535 						       template[i].klen);
536 			if (ret) {
537 				printk("setkey() failed flags=%x\n",
538 				       crypto_ablkcipher_get_flags(tfm));
539 
540 				if (!template[i].fail) {
541 					kfree(data);
542 					goto out;
543 				}
544 			}
545 
546 			sg_init_one(&sg[0], data, template[i].ilen);
547 
548 			ablkcipher_request_set_crypt(req, sg, sg,
549 						     template[i].ilen, iv);
550 			ret = enc ?
551 				crypto_ablkcipher_encrypt(req) :
552 				crypto_ablkcipher_decrypt(req);
553 
554 			switch (ret) {
555 			case 0:
556 				break;
557 			case -EINPROGRESS:
558 			case -EBUSY:
559 				ret = wait_for_completion_interruptible(
560 					&result.completion);
561 				if (!ret && !((ret = result.err))) {
562 					INIT_COMPLETION(result.completion);
563 					break;
564 				}
565 				/* fall through */
566 			default:
567 				printk("%s () failed err=%d\n", e, -ret);
568 				kfree(data);
569 				goto out;
570 			}
571 
572 			q = kmap(sg_page(&sg[0])) + sg[0].offset;
573 			hexdump(q, template[i].rlen);
574 
575 			printk("%s\n",
576 			       memcmp(q, template[i].result,
577 				      template[i].rlen) ? "fail" : "pass");
578 			kunmap(sg_page(&sg[0]));
579 		}
580 		kfree(data);
581 	}
582 
583 	printk("\ntesting %s %s across pages (chunking)\n", algo, e);
584 	memset(xbuf, 0, XBUFSIZE);
585 
586 	j = 0;
587 	for (i = 0; i < tcount; i++) {
588 
589 		data = kzalloc(template[i].ilen, GFP_KERNEL);
590 		if (!data)
591 			continue;
592 
593 		memcpy(data, template[i].input, template[i].ilen);
594 
595 		if (template[i].iv)
596 			memcpy(iv, template[i].iv, MAX_IVLEN);
597 		else
598 			memset(iv, 0, MAX_IVLEN);
599 
600 		if (template[i].np) {
601 			j++;
602 			printk("test %u (%d bit key):\n",
603 			j, template[i].klen * 8);
604 
605 			crypto_ablkcipher_clear_flags(tfm, ~0);
606 			if (template[i].wk)
607 				crypto_ablkcipher_set_flags(
608 					tfm, CRYPTO_TFM_REQ_WEAK_KEY);
609 
610 			ret = crypto_ablkcipher_setkey(tfm, template[i].key,
611 						       template[i].klen);
612 			if (ret) {
613 				printk("setkey() failed flags=%x\n",
614 						crypto_ablkcipher_get_flags(tfm));
615 
616 				if (!template[i].fail) {
617 					kfree(data);
618 					goto out;
619 				}
620 			}
621 
622 			temp = 0;
623 			sg_init_table(sg, template[i].np);
624 			for (k = 0; k < template[i].np; k++) {
625 				memcpy(&xbuf[IDX[k]],
626 						template[i].input + temp,
627 						template[i].tap[k]);
628 				temp += template[i].tap[k];
629 				sg_set_buf(&sg[k], &xbuf[IDX[k]],
630 						template[i].tap[k]);
631 			}
632 
633 			ablkcipher_request_set_crypt(req, sg, sg,
634 					template[i].ilen, iv);
635 
636 			ret = enc ?
637 				crypto_ablkcipher_encrypt(req) :
638 				crypto_ablkcipher_decrypt(req);
639 
640 			switch (ret) {
641 			case 0:
642 				break;
643 			case -EINPROGRESS:
644 			case -EBUSY:
645 				ret = wait_for_completion_interruptible(
646 					&result.completion);
647 				if (!ret && !((ret = result.err))) {
648 					INIT_COMPLETION(result.completion);
649 					break;
650 				}
651 				/* fall through */
652 			default:
653 				printk("%s () failed err=%d\n", e, -ret);
654 				goto out;
655 			}
656 
657 			temp = 0;
658 			for (k = 0; k < template[i].np; k++) {
659 				printk("page %u\n", k);
660 				q = kmap(sg_page(&sg[k])) + sg[k].offset;
661 				hexdump(q, template[i].tap[k]);
662 				printk("%s\n",
663 					memcmp(q, template[i].result + temp,
664 						template[i].tap[k]) ? "fail" :
665 					"pass");
666 				temp += template[i].tap[k];
667 				kunmap(sg_page(&sg[k]));
668 			}
669 		}
670 	}
671 out:
672 	crypto_free_ablkcipher(tfm);
673 	ablkcipher_request_free(req);
674 }
675 
676 static int test_cipher_jiffies(struct blkcipher_desc *desc, int enc, char *p,
677 			       int blen, int sec)
678 {
679 	struct scatterlist sg[1];
680 	unsigned long start, end;
681 	int bcount;
682 	int ret;
683 
684 	sg_init_one(sg, p, blen);
685 
686 	for (start = jiffies, end = start + sec * HZ, bcount = 0;
687 	     time_before(jiffies, end); bcount++) {
688 		if (enc)
689 			ret = crypto_blkcipher_encrypt(desc, sg, sg, blen);
690 		else
691 			ret = crypto_blkcipher_decrypt(desc, sg, sg, blen);
692 
693 		if (ret)
694 			return ret;
695 	}
696 
697 	printk("%d operations in %d seconds (%ld bytes)\n",
698 	       bcount, sec, (long)bcount * blen);
699 	return 0;
700 }
701 
702 static int test_cipher_cycles(struct blkcipher_desc *desc, int enc, char *p,
703 			      int blen)
704 {
705 	struct scatterlist sg[1];
706 	unsigned long cycles = 0;
707 	int ret = 0;
708 	int i;
709 
710 	sg_init_one(sg, p, blen);
711 
712 	local_bh_disable();
713 	local_irq_disable();
714 
715 	/* Warm-up run. */
716 	for (i = 0; i < 4; i++) {
717 		if (enc)
718 			ret = crypto_blkcipher_encrypt(desc, sg, sg, blen);
719 		else
720 			ret = crypto_blkcipher_decrypt(desc, sg, sg, blen);
721 
722 		if (ret)
723 			goto out;
724 	}
725 
726 	/* The real thing. */
727 	for (i = 0; i < 8; i++) {
728 		cycles_t start, end;
729 
730 		start = get_cycles();
731 		if (enc)
732 			ret = crypto_blkcipher_encrypt(desc, sg, sg, blen);
733 		else
734 			ret = crypto_blkcipher_decrypt(desc, sg, sg, blen);
735 		end = get_cycles();
736 
737 		if (ret)
738 			goto out;
739 
740 		cycles += end - start;
741 	}
742 
743 out:
744 	local_irq_enable();
745 	local_bh_enable();
746 
747 	if (ret == 0)
748 		printk("1 operation in %lu cycles (%d bytes)\n",
749 		       (cycles + 4) / 8, blen);
750 
751 	return ret;
752 }
753 
754 static u32 block_sizes[] = { 16, 64, 256, 1024, 8192, 0 };
755 
756 static void test_cipher_speed(char *algo, int enc, unsigned int sec,
757 			      struct cipher_testvec *template,
758 			      unsigned int tcount, u8 *keysize)
759 {
760 	unsigned int ret, i, j, iv_len;
761 	unsigned char *key, *p, iv[128];
762 	struct crypto_blkcipher *tfm;
763 	struct blkcipher_desc desc;
764 	const char *e;
765 	u32 *b_size;
766 
767 	if (enc == ENCRYPT)
768 	        e = "encryption";
769 	else
770 		e = "decryption";
771 
772 	printk("\ntesting speed of %s %s\n", algo, e);
773 
774 	tfm = crypto_alloc_blkcipher(algo, 0, CRYPTO_ALG_ASYNC);
775 
776 	if (IS_ERR(tfm)) {
777 		printk("failed to load transform for %s: %ld\n", algo,
778 		       PTR_ERR(tfm));
779 		return;
780 	}
781 	desc.tfm = tfm;
782 	desc.flags = 0;
783 
784 	i = 0;
785 	do {
786 
787 		b_size = block_sizes;
788 		do {
789 
790 			if ((*keysize + *b_size) > TVMEMSIZE) {
791 				printk("template (%u) too big for tvmem (%u)\n",
792 						*keysize + *b_size, TVMEMSIZE);
793 				goto out;
794 			}
795 
796 			printk("test %u (%d bit key, %d byte blocks): ", i,
797 					*keysize * 8, *b_size);
798 
799 			memset(tvmem, 0xff, *keysize + *b_size);
800 
801 			/* set key, plain text and IV */
802 			key = (unsigned char *)tvmem;
803 			for (j = 0; j < tcount; j++) {
804 				if (template[j].klen == *keysize) {
805 					key = template[j].key;
806 					break;
807 				}
808 			}
809 			p = (unsigned char *)tvmem + *keysize;
810 
811 			ret = crypto_blkcipher_setkey(tfm, key, *keysize);
812 			if (ret) {
813 				printk("setkey() failed flags=%x\n",
814 						crypto_blkcipher_get_flags(tfm));
815 				goto out;
816 			}
817 
818 			iv_len = crypto_blkcipher_ivsize(tfm);
819 			if (iv_len) {
820 				memset(&iv, 0xff, iv_len);
821 				crypto_blkcipher_set_iv(tfm, iv, iv_len);
822 			}
823 
824 			if (sec)
825 				ret = test_cipher_jiffies(&desc, enc, p, *b_size, sec);
826 			else
827 				ret = test_cipher_cycles(&desc, enc, p, *b_size);
828 
829 			if (ret) {
830 				printk("%s() failed flags=%x\n", e, desc.flags);
831 				break;
832 			}
833 			b_size++;
834 			i++;
835 		} while (*b_size);
836 		keysize++;
837 	} while (*keysize);
838 
839 out:
840 	crypto_free_blkcipher(tfm);
841 }
842 
843 static int test_hash_jiffies_digest(struct hash_desc *desc, char *p, int blen,
844 				    char *out, int sec)
845 {
846 	struct scatterlist sg[1];
847 	unsigned long start, end;
848 	int bcount;
849 	int ret;
850 
851 	sg_init_table(sg, 1);
852 
853 	for (start = jiffies, end = start + sec * HZ, bcount = 0;
854 	     time_before(jiffies, end); bcount++) {
855 		sg_set_buf(sg, p, blen);
856 		ret = crypto_hash_digest(desc, sg, blen, out);
857 		if (ret)
858 			return ret;
859 	}
860 
861 	printk("%6u opers/sec, %9lu bytes/sec\n",
862 	       bcount / sec, ((long)bcount * blen) / sec);
863 
864 	return 0;
865 }
866 
867 static int test_hash_jiffies(struct hash_desc *desc, char *p, int blen,
868 			     int plen, char *out, int sec)
869 {
870 	struct scatterlist sg[1];
871 	unsigned long start, end;
872 	int bcount, pcount;
873 	int ret;
874 
875 	if (plen == blen)
876 		return test_hash_jiffies_digest(desc, p, blen, out, sec);
877 
878 	sg_init_table(sg, 1);
879 
880 	for (start = jiffies, end = start + sec * HZ, bcount = 0;
881 	     time_before(jiffies, end); bcount++) {
882 		ret = crypto_hash_init(desc);
883 		if (ret)
884 			return ret;
885 		for (pcount = 0; pcount < blen; pcount += plen) {
886 			sg_set_buf(sg, p + pcount, plen);
887 			ret = crypto_hash_update(desc, sg, plen);
888 			if (ret)
889 				return ret;
890 		}
891 		/* we assume there is enough space in 'out' for the result */
892 		ret = crypto_hash_final(desc, out);
893 		if (ret)
894 			return ret;
895 	}
896 
897 	printk("%6u opers/sec, %9lu bytes/sec\n",
898 	       bcount / sec, ((long)bcount * blen) / sec);
899 
900 	return 0;
901 }
902 
903 static int test_hash_cycles_digest(struct hash_desc *desc, char *p, int blen,
904 				   char *out)
905 {
906 	struct scatterlist sg[1];
907 	unsigned long cycles = 0;
908 	int i;
909 	int ret;
910 
911 	sg_init_table(sg, 1);
912 
913 	local_bh_disable();
914 	local_irq_disable();
915 
916 	/* Warm-up run. */
917 	for (i = 0; i < 4; i++) {
918 		sg_set_buf(sg, p, blen);
919 		ret = crypto_hash_digest(desc, sg, blen, out);
920 		if (ret)
921 			goto out;
922 	}
923 
924 	/* The real thing. */
925 	for (i = 0; i < 8; i++) {
926 		cycles_t start, end;
927 
928 		start = get_cycles();
929 
930 		sg_set_buf(sg, p, blen);
931 		ret = crypto_hash_digest(desc, sg, blen, out);
932 		if (ret)
933 			goto out;
934 
935 		end = get_cycles();
936 
937 		cycles += end - start;
938 	}
939 
940 out:
941 	local_irq_enable();
942 	local_bh_enable();
943 
944 	if (ret)
945 		return ret;
946 
947 	printk("%6lu cycles/operation, %4lu cycles/byte\n",
948 	       cycles / 8, cycles / (8 * blen));
949 
950 	return 0;
951 }
952 
953 static int test_hash_cycles(struct hash_desc *desc, char *p, int blen,
954 			    int plen, char *out)
955 {
956 	struct scatterlist sg[1];
957 	unsigned long cycles = 0;
958 	int i, pcount;
959 	int ret;
960 
961 	if (plen == blen)
962 		return test_hash_cycles_digest(desc, p, blen, out);
963 
964 	sg_init_table(sg, 1);
965 
966 	local_bh_disable();
967 	local_irq_disable();
968 
969 	/* Warm-up run. */
970 	for (i = 0; i < 4; i++) {
971 		ret = crypto_hash_init(desc);
972 		if (ret)
973 			goto out;
974 		for (pcount = 0; pcount < blen; pcount += plen) {
975 			sg_set_buf(sg, p + pcount, plen);
976 			ret = crypto_hash_update(desc, sg, plen);
977 			if (ret)
978 				goto out;
979 		}
980 		ret = crypto_hash_final(desc, out);
981 		if (ret)
982 			goto out;
983 	}
984 
985 	/* The real thing. */
986 	for (i = 0; i < 8; i++) {
987 		cycles_t start, end;
988 
989 		start = get_cycles();
990 
991 		ret = crypto_hash_init(desc);
992 		if (ret)
993 			goto out;
994 		for (pcount = 0; pcount < blen; pcount += plen) {
995 			sg_set_buf(sg, p + pcount, plen);
996 			ret = crypto_hash_update(desc, sg, plen);
997 			if (ret)
998 				goto out;
999 		}
1000 		ret = crypto_hash_final(desc, out);
1001 		if (ret)
1002 			goto out;
1003 
1004 		end = get_cycles();
1005 
1006 		cycles += end - start;
1007 	}
1008 
1009 out:
1010 	local_irq_enable();
1011 	local_bh_enable();
1012 
1013 	if (ret)
1014 		return ret;
1015 
1016 	printk("%6lu cycles/operation, %4lu cycles/byte\n",
1017 	       cycles / 8, cycles / (8 * blen));
1018 
1019 	return 0;
1020 }
1021 
1022 static void test_hash_speed(char *algo, unsigned int sec,
1023 			      struct hash_speed *speed)
1024 {
1025 	struct crypto_hash *tfm;
1026 	struct hash_desc desc;
1027 	char output[1024];
1028 	int i;
1029 	int ret;
1030 
1031 	printk("\ntesting speed of %s\n", algo);
1032 
1033 	tfm = crypto_alloc_hash(algo, 0, CRYPTO_ALG_ASYNC);
1034 
1035 	if (IS_ERR(tfm)) {
1036 		printk("failed to load transform for %s: %ld\n", algo,
1037 		       PTR_ERR(tfm));
1038 		return;
1039 	}
1040 
1041 	desc.tfm = tfm;
1042 	desc.flags = 0;
1043 
1044 	if (crypto_hash_digestsize(tfm) > sizeof(output)) {
1045 		printk("digestsize(%u) > outputbuffer(%zu)\n",
1046 		       crypto_hash_digestsize(tfm), sizeof(output));
1047 		goto out;
1048 	}
1049 
1050 	for (i = 0; speed[i].blen != 0; i++) {
1051 		if (speed[i].blen > TVMEMSIZE) {
1052 			printk("template (%u) too big for tvmem (%u)\n",
1053 			       speed[i].blen, TVMEMSIZE);
1054 			goto out;
1055 		}
1056 
1057 		printk("test%3u (%5u byte blocks,%5u bytes per update,%4u updates): ",
1058 		       i, speed[i].blen, speed[i].plen, speed[i].blen / speed[i].plen);
1059 
1060 		memset(tvmem, 0xff, speed[i].blen);
1061 
1062 		if (sec)
1063 			ret = test_hash_jiffies(&desc, tvmem, speed[i].blen,
1064 						speed[i].plen, output, sec);
1065 		else
1066 			ret = test_hash_cycles(&desc, tvmem, speed[i].blen,
1067 					       speed[i].plen, output);
1068 
1069 		if (ret) {
1070 			printk("hashing failed ret=%d\n", ret);
1071 			break;
1072 		}
1073 	}
1074 
1075 out:
1076 	crypto_free_hash(tfm);
1077 }
1078 
1079 static void test_comp(char *algo, struct comp_testvec *ctemplate,
1080 		       struct comp_testvec *dtemplate, int ctcount, int dtcount)
1081 {
1082 	unsigned int i;
1083 	char result[COMP_BUF_SIZE];
1084 	struct crypto_comp *tfm;
1085 	unsigned int tsize;
1086 
1087 	printk("\ntesting %s compression\n", algo);
1088 
1089 	tfm = crypto_alloc_comp(algo, 0, CRYPTO_ALG_ASYNC);
1090 	if (IS_ERR(tfm)) {
1091 		printk("failed to load transform for %s\n", algo);
1092 		return;
1093 	}
1094 
1095 	for (i = 0; i < ctcount; i++) {
1096 		int ilen, ret, dlen = COMP_BUF_SIZE;
1097 
1098 		printk("test %u:\n", i + 1);
1099 		memset(result, 0, sizeof (result));
1100 
1101 		ilen = ctemplate[i].inlen;
1102 		ret = crypto_comp_compress(tfm, ctemplate[i].input,
1103 		                           ilen, result, &dlen);
1104 		if (ret) {
1105 			printk("fail: ret=%d\n", ret);
1106 			continue;
1107 		}
1108 		hexdump(result, dlen);
1109 		printk("%s (ratio %d:%d)\n",
1110 		       memcmp(result, ctemplate[i].output, dlen) ? "fail" : "pass",
1111 		       ilen, dlen);
1112 	}
1113 
1114 	printk("\ntesting %s decompression\n", algo);
1115 
1116 	tsize = sizeof(struct comp_testvec);
1117 	tsize *= dtcount;
1118 	if (tsize > TVMEMSIZE) {
1119 		printk("template (%u) too big for tvmem (%u)\n", tsize,
1120 		       TVMEMSIZE);
1121 		goto out;
1122 	}
1123 
1124 	for (i = 0; i < dtcount; i++) {
1125 		int ilen, ret, dlen = COMP_BUF_SIZE;
1126 
1127 		printk("test %u:\n", i + 1);
1128 		memset(result, 0, sizeof (result));
1129 
1130 		ilen = dtemplate[i].inlen;
1131 		ret = crypto_comp_decompress(tfm, dtemplate[i].input,
1132 		                             ilen, result, &dlen);
1133 		if (ret) {
1134 			printk("fail: ret=%d\n", ret);
1135 			continue;
1136 		}
1137 		hexdump(result, dlen);
1138 		printk("%s (ratio %d:%d)\n",
1139 		       memcmp(result, dtemplate[i].output, dlen) ? "fail" : "pass",
1140 		       ilen, dlen);
1141 	}
1142 out:
1143 	crypto_free_comp(tfm);
1144 }
1145 
1146 static void test_available(void)
1147 {
1148 	char **name = check;
1149 
1150 	while (*name) {
1151 		printk("alg %s ", *name);
1152 		printk(crypto_has_alg(*name, 0, 0) ?
1153 		       "found\n" : "not found\n");
1154 		name++;
1155 	}
1156 }
1157 
1158 static void do_test(void)
1159 {
1160 	switch (mode) {
1161 
1162 	case 0:
1163 		test_hash("md5", md5_tv_template, MD5_TEST_VECTORS);
1164 
1165 		test_hash("sha1", sha1_tv_template, SHA1_TEST_VECTORS);
1166 
1167 		//DES
1168 		test_cipher("ecb(des)", ENCRYPT, des_enc_tv_template,
1169 			    DES_ENC_TEST_VECTORS);
1170 		test_cipher("ecb(des)", DECRYPT, des_dec_tv_template,
1171 			    DES_DEC_TEST_VECTORS);
1172 		test_cipher("cbc(des)", ENCRYPT, des_cbc_enc_tv_template,
1173 			    DES_CBC_ENC_TEST_VECTORS);
1174 		test_cipher("cbc(des)", DECRYPT, des_cbc_dec_tv_template,
1175 			    DES_CBC_DEC_TEST_VECTORS);
1176 
1177 		//DES3_EDE
1178 		test_cipher("ecb(des3_ede)", ENCRYPT, des3_ede_enc_tv_template,
1179 			    DES3_EDE_ENC_TEST_VECTORS);
1180 		test_cipher("ecb(des3_ede)", DECRYPT, des3_ede_dec_tv_template,
1181 			    DES3_EDE_DEC_TEST_VECTORS);
1182 
1183 		test_hash("md4", md4_tv_template, MD4_TEST_VECTORS);
1184 
1185 		test_hash("sha224", sha224_tv_template, SHA224_TEST_VECTORS);
1186 
1187 		test_hash("sha256", sha256_tv_template, SHA256_TEST_VECTORS);
1188 
1189 		//BLOWFISH
1190 		test_cipher("ecb(blowfish)", ENCRYPT, bf_enc_tv_template,
1191 			    BF_ENC_TEST_VECTORS);
1192 		test_cipher("ecb(blowfish)", DECRYPT, bf_dec_tv_template,
1193 			    BF_DEC_TEST_VECTORS);
1194 		test_cipher("cbc(blowfish)", ENCRYPT, bf_cbc_enc_tv_template,
1195 			    BF_CBC_ENC_TEST_VECTORS);
1196 		test_cipher("cbc(blowfish)", DECRYPT, bf_cbc_dec_tv_template,
1197 			    BF_CBC_DEC_TEST_VECTORS);
1198 
1199 		//TWOFISH
1200 		test_cipher("ecb(twofish)", ENCRYPT, tf_enc_tv_template,
1201 			    TF_ENC_TEST_VECTORS);
1202 		test_cipher("ecb(twofish)", DECRYPT, tf_dec_tv_template,
1203 			    TF_DEC_TEST_VECTORS);
1204 		test_cipher("cbc(twofish)", ENCRYPT, tf_cbc_enc_tv_template,
1205 			    TF_CBC_ENC_TEST_VECTORS);
1206 		test_cipher("cbc(twofish)", DECRYPT, tf_cbc_dec_tv_template,
1207 			    TF_CBC_DEC_TEST_VECTORS);
1208 
1209 		//SERPENT
1210 		test_cipher("ecb(serpent)", ENCRYPT, serpent_enc_tv_template,
1211 			    SERPENT_ENC_TEST_VECTORS);
1212 		test_cipher("ecb(serpent)", DECRYPT, serpent_dec_tv_template,
1213 			    SERPENT_DEC_TEST_VECTORS);
1214 
1215 		//TNEPRES
1216 		test_cipher("ecb(tnepres)", ENCRYPT, tnepres_enc_tv_template,
1217 			    TNEPRES_ENC_TEST_VECTORS);
1218 		test_cipher("ecb(tnepres)", DECRYPT, tnepres_dec_tv_template,
1219 			    TNEPRES_DEC_TEST_VECTORS);
1220 
1221 		//AES
1222 		test_cipher("ecb(aes)", ENCRYPT, aes_enc_tv_template,
1223 			    AES_ENC_TEST_VECTORS);
1224 		test_cipher("ecb(aes)", DECRYPT, aes_dec_tv_template,
1225 			    AES_DEC_TEST_VECTORS);
1226 		test_cipher("cbc(aes)", ENCRYPT, aes_cbc_enc_tv_template,
1227 			    AES_CBC_ENC_TEST_VECTORS);
1228 		test_cipher("cbc(aes)", DECRYPT, aes_cbc_dec_tv_template,
1229 			    AES_CBC_DEC_TEST_VECTORS);
1230 		test_cipher("lrw(aes)", ENCRYPT, aes_lrw_enc_tv_template,
1231 			    AES_LRW_ENC_TEST_VECTORS);
1232 		test_cipher("lrw(aes)", DECRYPT, aes_lrw_dec_tv_template,
1233 			    AES_LRW_DEC_TEST_VECTORS);
1234 		test_cipher("xts(aes)", ENCRYPT, aes_xts_enc_tv_template,
1235 			    AES_XTS_ENC_TEST_VECTORS);
1236 		test_cipher("xts(aes)", DECRYPT, aes_xts_dec_tv_template,
1237 			    AES_XTS_DEC_TEST_VECTORS);
1238 		test_cipher("rfc3686(ctr(aes))", ENCRYPT, aes_ctr_enc_tv_template,
1239 			    AES_CTR_ENC_TEST_VECTORS);
1240 		test_cipher("rfc3686(ctr(aes))", DECRYPT, aes_ctr_dec_tv_template,
1241 			    AES_CTR_DEC_TEST_VECTORS);
1242 		test_aead("gcm(aes)", ENCRYPT, aes_gcm_enc_tv_template,
1243 			  AES_GCM_ENC_TEST_VECTORS);
1244 		test_aead("gcm(aes)", DECRYPT, aes_gcm_dec_tv_template,
1245 			  AES_GCM_DEC_TEST_VECTORS);
1246 		test_aead("ccm(aes)", ENCRYPT, aes_ccm_enc_tv_template,
1247 			  AES_CCM_ENC_TEST_VECTORS);
1248 		test_aead("ccm(aes)", DECRYPT, aes_ccm_dec_tv_template,
1249 			  AES_CCM_DEC_TEST_VECTORS);
1250 
1251 		//CAST5
1252 		test_cipher("ecb(cast5)", ENCRYPT, cast5_enc_tv_template,
1253 			    CAST5_ENC_TEST_VECTORS);
1254 		test_cipher("ecb(cast5)", DECRYPT, cast5_dec_tv_template,
1255 			    CAST5_DEC_TEST_VECTORS);
1256 
1257 		//CAST6
1258 		test_cipher("ecb(cast6)", ENCRYPT, cast6_enc_tv_template,
1259 			    CAST6_ENC_TEST_VECTORS);
1260 		test_cipher("ecb(cast6)", DECRYPT, cast6_dec_tv_template,
1261 			    CAST6_DEC_TEST_VECTORS);
1262 
1263 		//ARC4
1264 		test_cipher("ecb(arc4)", ENCRYPT, arc4_enc_tv_template,
1265 			    ARC4_ENC_TEST_VECTORS);
1266 		test_cipher("ecb(arc4)", DECRYPT, arc4_dec_tv_template,
1267 			    ARC4_DEC_TEST_VECTORS);
1268 
1269 		//TEA
1270 		test_cipher("ecb(tea)", ENCRYPT, tea_enc_tv_template,
1271 			    TEA_ENC_TEST_VECTORS);
1272 		test_cipher("ecb(tea)", DECRYPT, tea_dec_tv_template,
1273 			    TEA_DEC_TEST_VECTORS);
1274 
1275 
1276 		//XTEA
1277 		test_cipher("ecb(xtea)", ENCRYPT, xtea_enc_tv_template,
1278 			    XTEA_ENC_TEST_VECTORS);
1279 		test_cipher("ecb(xtea)", DECRYPT, xtea_dec_tv_template,
1280 			    XTEA_DEC_TEST_VECTORS);
1281 
1282 		//KHAZAD
1283 		test_cipher("ecb(khazad)", ENCRYPT, khazad_enc_tv_template,
1284 			    KHAZAD_ENC_TEST_VECTORS);
1285 		test_cipher("ecb(khazad)", DECRYPT, khazad_dec_tv_template,
1286 			    KHAZAD_DEC_TEST_VECTORS);
1287 
1288 		//ANUBIS
1289 		test_cipher("ecb(anubis)", ENCRYPT, anubis_enc_tv_template,
1290 			    ANUBIS_ENC_TEST_VECTORS);
1291 		test_cipher("ecb(anubis)", DECRYPT, anubis_dec_tv_template,
1292 			    ANUBIS_DEC_TEST_VECTORS);
1293 		test_cipher("cbc(anubis)", ENCRYPT, anubis_cbc_enc_tv_template,
1294 			    ANUBIS_CBC_ENC_TEST_VECTORS);
1295 		test_cipher("cbc(anubis)", DECRYPT, anubis_cbc_dec_tv_template,
1296 			    ANUBIS_CBC_ENC_TEST_VECTORS);
1297 
1298 		//XETA
1299 		test_cipher("ecb(xeta)", ENCRYPT, xeta_enc_tv_template,
1300 			    XETA_ENC_TEST_VECTORS);
1301 		test_cipher("ecb(xeta)", DECRYPT, xeta_dec_tv_template,
1302 			    XETA_DEC_TEST_VECTORS);
1303 
1304 		//FCrypt
1305 		test_cipher("pcbc(fcrypt)", ENCRYPT, fcrypt_pcbc_enc_tv_template,
1306 			    FCRYPT_ENC_TEST_VECTORS);
1307 		test_cipher("pcbc(fcrypt)", DECRYPT, fcrypt_pcbc_dec_tv_template,
1308 			    FCRYPT_DEC_TEST_VECTORS);
1309 
1310 		//CAMELLIA
1311 		test_cipher("ecb(camellia)", ENCRYPT,
1312 			    camellia_enc_tv_template,
1313 			    CAMELLIA_ENC_TEST_VECTORS);
1314 		test_cipher("ecb(camellia)", DECRYPT,
1315 			    camellia_dec_tv_template,
1316 			    CAMELLIA_DEC_TEST_VECTORS);
1317 		test_cipher("cbc(camellia)", ENCRYPT,
1318 			    camellia_cbc_enc_tv_template,
1319 			    CAMELLIA_CBC_ENC_TEST_VECTORS);
1320 		test_cipher("cbc(camellia)", DECRYPT,
1321 			    camellia_cbc_dec_tv_template,
1322 			    CAMELLIA_CBC_DEC_TEST_VECTORS);
1323 
1324 		//SEED
1325 		test_cipher("ecb(seed)", ENCRYPT, seed_enc_tv_template,
1326 			    SEED_ENC_TEST_VECTORS);
1327 		test_cipher("ecb(seed)", DECRYPT, seed_dec_tv_template,
1328 			    SEED_DEC_TEST_VECTORS);
1329 
1330 		//CTS
1331 		test_cipher("cts(cbc(aes))", ENCRYPT, cts_mode_enc_tv_template,
1332 			    CTS_MODE_ENC_TEST_VECTORS);
1333 		test_cipher("cts(cbc(aes))", DECRYPT, cts_mode_dec_tv_template,
1334 			    CTS_MODE_DEC_TEST_VECTORS);
1335 
1336 		test_hash("sha384", sha384_tv_template, SHA384_TEST_VECTORS);
1337 		test_hash("sha512", sha512_tv_template, SHA512_TEST_VECTORS);
1338 		test_hash("wp512", wp512_tv_template, WP512_TEST_VECTORS);
1339 		test_hash("wp384", wp384_tv_template, WP384_TEST_VECTORS);
1340 		test_hash("wp256", wp256_tv_template, WP256_TEST_VECTORS);
1341 		test_hash("tgr192", tgr192_tv_template, TGR192_TEST_VECTORS);
1342 		test_hash("tgr160", tgr160_tv_template, TGR160_TEST_VECTORS);
1343 		test_hash("tgr128", tgr128_tv_template, TGR128_TEST_VECTORS);
1344 		test_comp("deflate", deflate_comp_tv_template,
1345 			  deflate_decomp_tv_template, DEFLATE_COMP_TEST_VECTORS,
1346 			  DEFLATE_DECOMP_TEST_VECTORS);
1347 		test_comp("lzo", lzo_comp_tv_template, lzo_decomp_tv_template,
1348 			  LZO_COMP_TEST_VECTORS, LZO_DECOMP_TEST_VECTORS);
1349 		test_hash("crc32c", crc32c_tv_template, CRC32C_TEST_VECTORS);
1350 		test_hash("hmac(md5)", hmac_md5_tv_template,
1351 			  HMAC_MD5_TEST_VECTORS);
1352 		test_hash("hmac(sha1)", hmac_sha1_tv_template,
1353 			  HMAC_SHA1_TEST_VECTORS);
1354 		test_hash("hmac(sha224)", hmac_sha224_tv_template,
1355 			  HMAC_SHA224_TEST_VECTORS);
1356 		test_hash("hmac(sha256)", hmac_sha256_tv_template,
1357 			  HMAC_SHA256_TEST_VECTORS);
1358 		test_hash("hmac(sha384)", hmac_sha384_tv_template,
1359 			  HMAC_SHA384_TEST_VECTORS);
1360 		test_hash("hmac(sha512)", hmac_sha512_tv_template,
1361 			  HMAC_SHA512_TEST_VECTORS);
1362 
1363 		test_hash("xcbc(aes)", aes_xcbc128_tv_template,
1364 			  XCBC_AES_TEST_VECTORS);
1365 
1366 		test_hash("michael_mic", michael_mic_tv_template, MICHAEL_MIC_TEST_VECTORS);
1367 		break;
1368 
1369 	case 1:
1370 		test_hash("md5", md5_tv_template, MD5_TEST_VECTORS);
1371 		break;
1372 
1373 	case 2:
1374 		test_hash("sha1", sha1_tv_template, SHA1_TEST_VECTORS);
1375 		break;
1376 
1377 	case 3:
1378 		test_cipher("ecb(des)", ENCRYPT, des_enc_tv_template,
1379 			    DES_ENC_TEST_VECTORS);
1380 		test_cipher("ecb(des)", DECRYPT, des_dec_tv_template,
1381 			    DES_DEC_TEST_VECTORS);
1382 		test_cipher("cbc(des)", ENCRYPT, des_cbc_enc_tv_template,
1383 			    DES_CBC_ENC_TEST_VECTORS);
1384 		test_cipher("cbc(des)", DECRYPT, des_cbc_dec_tv_template,
1385 			    DES_CBC_DEC_TEST_VECTORS);
1386 		break;
1387 
1388 	case 4:
1389 		test_cipher("ecb(des3_ede)", ENCRYPT, des3_ede_enc_tv_template,
1390 			    DES3_EDE_ENC_TEST_VECTORS);
1391 		test_cipher("ecb(des3_ede)", DECRYPT, des3_ede_dec_tv_template,
1392 			    DES3_EDE_DEC_TEST_VECTORS);
1393 		break;
1394 
1395 	case 5:
1396 		test_hash("md4", md4_tv_template, MD4_TEST_VECTORS);
1397 		break;
1398 
1399 	case 6:
1400 		test_hash("sha256", sha256_tv_template, SHA256_TEST_VECTORS);
1401 		break;
1402 
1403 	case 7:
1404 		test_cipher("ecb(blowfish)", ENCRYPT, bf_enc_tv_template,
1405 			    BF_ENC_TEST_VECTORS);
1406 		test_cipher("ecb(blowfish)", DECRYPT, bf_dec_tv_template,
1407 			    BF_DEC_TEST_VECTORS);
1408 		test_cipher("cbc(blowfish)", ENCRYPT, bf_cbc_enc_tv_template,
1409 			    BF_CBC_ENC_TEST_VECTORS);
1410 		test_cipher("cbc(blowfish)", DECRYPT, bf_cbc_dec_tv_template,
1411 			    BF_CBC_DEC_TEST_VECTORS);
1412 		break;
1413 
1414 	case 8:
1415 		test_cipher("ecb(twofish)", ENCRYPT, tf_enc_tv_template,
1416 			    TF_ENC_TEST_VECTORS);
1417 		test_cipher("ecb(twofish)", DECRYPT, tf_dec_tv_template,
1418 			    TF_DEC_TEST_VECTORS);
1419 		test_cipher("cbc(twofish)", ENCRYPT, tf_cbc_enc_tv_template,
1420 			    TF_CBC_ENC_TEST_VECTORS);
1421 		test_cipher("cbc(twofish)", DECRYPT, tf_cbc_dec_tv_template,
1422 			    TF_CBC_DEC_TEST_VECTORS);
1423 		break;
1424 
1425 	case 9:
1426 		test_cipher("ecb(serpent)", ENCRYPT, serpent_enc_tv_template,
1427 			    SERPENT_ENC_TEST_VECTORS);
1428 		test_cipher("ecb(serpent)", DECRYPT, serpent_dec_tv_template,
1429 			    SERPENT_DEC_TEST_VECTORS);
1430 		break;
1431 
1432 	case 10:
1433 		test_cipher("ecb(aes)", ENCRYPT, aes_enc_tv_template,
1434 			    AES_ENC_TEST_VECTORS);
1435 		test_cipher("ecb(aes)", DECRYPT, aes_dec_tv_template,
1436 			    AES_DEC_TEST_VECTORS);
1437 		test_cipher("cbc(aes)", ENCRYPT, aes_cbc_enc_tv_template,
1438 			    AES_CBC_ENC_TEST_VECTORS);
1439 		test_cipher("cbc(aes)", DECRYPT, aes_cbc_dec_tv_template,
1440 			    AES_CBC_DEC_TEST_VECTORS);
1441 		test_cipher("lrw(aes)", ENCRYPT, aes_lrw_enc_tv_template,
1442 			    AES_LRW_ENC_TEST_VECTORS);
1443 		test_cipher("lrw(aes)", DECRYPT, aes_lrw_dec_tv_template,
1444 			    AES_LRW_DEC_TEST_VECTORS);
1445 		test_cipher("xts(aes)", ENCRYPT, aes_xts_enc_tv_template,
1446 			    AES_XTS_ENC_TEST_VECTORS);
1447 		test_cipher("xts(aes)", DECRYPT, aes_xts_dec_tv_template,
1448 			    AES_XTS_DEC_TEST_VECTORS);
1449 		test_cipher("rfc3686(ctr(aes))", ENCRYPT, aes_ctr_enc_tv_template,
1450 			    AES_CTR_ENC_TEST_VECTORS);
1451 		test_cipher("rfc3686(ctr(aes))", DECRYPT, aes_ctr_dec_tv_template,
1452 			    AES_CTR_DEC_TEST_VECTORS);
1453 		break;
1454 
1455 	case 11:
1456 		test_hash("sha384", sha384_tv_template, SHA384_TEST_VECTORS);
1457 		break;
1458 
1459 	case 12:
1460 		test_hash("sha512", sha512_tv_template, SHA512_TEST_VECTORS);
1461 		break;
1462 
1463 	case 13:
1464 		test_comp("deflate", deflate_comp_tv_template,
1465 			  deflate_decomp_tv_template, DEFLATE_COMP_TEST_VECTORS,
1466 			  DEFLATE_DECOMP_TEST_VECTORS);
1467 		break;
1468 
1469 	case 14:
1470 		test_cipher("ecb(cast5)", ENCRYPT, cast5_enc_tv_template,
1471 			    CAST5_ENC_TEST_VECTORS);
1472 		test_cipher("ecb(cast5)", DECRYPT, cast5_dec_tv_template,
1473 			    CAST5_DEC_TEST_VECTORS);
1474 		break;
1475 
1476 	case 15:
1477 		test_cipher("ecb(cast6)", ENCRYPT, cast6_enc_tv_template,
1478 			    CAST6_ENC_TEST_VECTORS);
1479 		test_cipher("ecb(cast6)", DECRYPT, cast6_dec_tv_template,
1480 			    CAST6_DEC_TEST_VECTORS);
1481 		break;
1482 
1483 	case 16:
1484 		test_cipher("ecb(arc4)", ENCRYPT, arc4_enc_tv_template,
1485 			    ARC4_ENC_TEST_VECTORS);
1486 		test_cipher("ecb(arc4)", DECRYPT, arc4_dec_tv_template,
1487 			    ARC4_DEC_TEST_VECTORS);
1488 		break;
1489 
1490 	case 17:
1491 		test_hash("michael_mic", michael_mic_tv_template, MICHAEL_MIC_TEST_VECTORS);
1492 		break;
1493 
1494 	case 18:
1495 		test_hash("crc32c", crc32c_tv_template, CRC32C_TEST_VECTORS);
1496 		break;
1497 
1498 	case 19:
1499 		test_cipher("ecb(tea)", ENCRYPT, tea_enc_tv_template,
1500 			    TEA_ENC_TEST_VECTORS);
1501 		test_cipher("ecb(tea)", DECRYPT, tea_dec_tv_template,
1502 			    TEA_DEC_TEST_VECTORS);
1503 		break;
1504 
1505 	case 20:
1506 		test_cipher("ecb(xtea)", ENCRYPT, xtea_enc_tv_template,
1507 			    XTEA_ENC_TEST_VECTORS);
1508 		test_cipher("ecb(xtea)", DECRYPT, xtea_dec_tv_template,
1509 			    XTEA_DEC_TEST_VECTORS);
1510 		break;
1511 
1512 	case 21:
1513 		test_cipher("ecb(khazad)", ENCRYPT, khazad_enc_tv_template,
1514 			    KHAZAD_ENC_TEST_VECTORS);
1515 		test_cipher("ecb(khazad)", DECRYPT, khazad_dec_tv_template,
1516 			    KHAZAD_DEC_TEST_VECTORS);
1517 		break;
1518 
1519 	case 22:
1520 		test_hash("wp512", wp512_tv_template, WP512_TEST_VECTORS);
1521 		break;
1522 
1523 	case 23:
1524 		test_hash("wp384", wp384_tv_template, WP384_TEST_VECTORS);
1525 		break;
1526 
1527 	case 24:
1528 		test_hash("wp256", wp256_tv_template, WP256_TEST_VECTORS);
1529 		break;
1530 
1531 	case 25:
1532 		test_cipher("ecb(tnepres)", ENCRYPT, tnepres_enc_tv_template,
1533 			    TNEPRES_ENC_TEST_VECTORS);
1534 		test_cipher("ecb(tnepres)", DECRYPT, tnepres_dec_tv_template,
1535 			    TNEPRES_DEC_TEST_VECTORS);
1536 		break;
1537 
1538 	case 26:
1539 		test_cipher("ecb(anubis)", ENCRYPT, anubis_enc_tv_template,
1540 			    ANUBIS_ENC_TEST_VECTORS);
1541 		test_cipher("ecb(anubis)", DECRYPT, anubis_dec_tv_template,
1542 			    ANUBIS_DEC_TEST_VECTORS);
1543 		test_cipher("cbc(anubis)", ENCRYPT, anubis_cbc_enc_tv_template,
1544 			    ANUBIS_CBC_ENC_TEST_VECTORS);
1545 		test_cipher("cbc(anubis)", DECRYPT, anubis_cbc_dec_tv_template,
1546 			    ANUBIS_CBC_ENC_TEST_VECTORS);
1547 		break;
1548 
1549 	case 27:
1550 		test_hash("tgr192", tgr192_tv_template, TGR192_TEST_VECTORS);
1551 		break;
1552 
1553 	case 28:
1554 
1555 		test_hash("tgr160", tgr160_tv_template, TGR160_TEST_VECTORS);
1556 		break;
1557 
1558 	case 29:
1559 		test_hash("tgr128", tgr128_tv_template, TGR128_TEST_VECTORS);
1560 		break;
1561 
1562 	case 30:
1563 		test_cipher("ecb(xeta)", ENCRYPT, xeta_enc_tv_template,
1564 			    XETA_ENC_TEST_VECTORS);
1565 		test_cipher("ecb(xeta)", DECRYPT, xeta_dec_tv_template,
1566 			    XETA_DEC_TEST_VECTORS);
1567 		break;
1568 
1569 	case 31:
1570 		test_cipher("pcbc(fcrypt)", ENCRYPT, fcrypt_pcbc_enc_tv_template,
1571 			    FCRYPT_ENC_TEST_VECTORS);
1572 		test_cipher("pcbc(fcrypt)", DECRYPT, fcrypt_pcbc_dec_tv_template,
1573 			    FCRYPT_DEC_TEST_VECTORS);
1574 		break;
1575 
1576 	case 32:
1577 		test_cipher("ecb(camellia)", ENCRYPT,
1578 			    camellia_enc_tv_template,
1579 			    CAMELLIA_ENC_TEST_VECTORS);
1580 		test_cipher("ecb(camellia)", DECRYPT,
1581 			    camellia_dec_tv_template,
1582 			    CAMELLIA_DEC_TEST_VECTORS);
1583 		test_cipher("cbc(camellia)", ENCRYPT,
1584 			    camellia_cbc_enc_tv_template,
1585 			    CAMELLIA_CBC_ENC_TEST_VECTORS);
1586 		test_cipher("cbc(camellia)", DECRYPT,
1587 			    camellia_cbc_dec_tv_template,
1588 			    CAMELLIA_CBC_DEC_TEST_VECTORS);
1589 		break;
1590 	case 33:
1591 		test_hash("sha224", sha224_tv_template, SHA224_TEST_VECTORS);
1592 		break;
1593 
1594 	case 34:
1595 		test_cipher("salsa20", ENCRYPT,
1596 			    salsa20_stream_enc_tv_template,
1597 			    SALSA20_STREAM_ENC_TEST_VECTORS);
1598 		break;
1599 
1600 	case 35:
1601 		test_aead("gcm(aes)", ENCRYPT, aes_gcm_enc_tv_template,
1602 			  AES_GCM_ENC_TEST_VECTORS);
1603 		test_aead("gcm(aes)", DECRYPT, aes_gcm_dec_tv_template,
1604 			  AES_GCM_DEC_TEST_VECTORS);
1605 		break;
1606 
1607 	case 36:
1608 		test_comp("lzo", lzo_comp_tv_template, lzo_decomp_tv_template,
1609 			  LZO_COMP_TEST_VECTORS, LZO_DECOMP_TEST_VECTORS);
1610 		break;
1611 
1612 	case 37:
1613 		test_aead("ccm(aes)", ENCRYPT, aes_ccm_enc_tv_template,
1614 			  AES_CCM_ENC_TEST_VECTORS);
1615 		test_aead("ccm(aes)", DECRYPT, aes_ccm_dec_tv_template,
1616 			  AES_CCM_DEC_TEST_VECTORS);
1617 		break;
1618 
1619 	case 38:
1620 		test_cipher("cts(cbc(aes))", ENCRYPT, cts_mode_enc_tv_template,
1621 			    CTS_MODE_ENC_TEST_VECTORS);
1622 		test_cipher("cts(cbc(aes))", DECRYPT, cts_mode_dec_tv_template,
1623 			    CTS_MODE_DEC_TEST_VECTORS);
1624 		break;
1625 
1626 	case 100:
1627 		test_hash("hmac(md5)", hmac_md5_tv_template,
1628 			  HMAC_MD5_TEST_VECTORS);
1629 		break;
1630 
1631 	case 101:
1632 		test_hash("hmac(sha1)", hmac_sha1_tv_template,
1633 			  HMAC_SHA1_TEST_VECTORS);
1634 		break;
1635 
1636 	case 102:
1637 		test_hash("hmac(sha256)", hmac_sha256_tv_template,
1638 			  HMAC_SHA256_TEST_VECTORS);
1639 		break;
1640 
1641 	case 103:
1642 		test_hash("hmac(sha384)", hmac_sha384_tv_template,
1643 			  HMAC_SHA384_TEST_VECTORS);
1644 		break;
1645 
1646 	case 104:
1647 		test_hash("hmac(sha512)", hmac_sha512_tv_template,
1648 			  HMAC_SHA512_TEST_VECTORS);
1649 		break;
1650 
1651 	case 105:
1652 		test_hash("hmac(sha224)", hmac_sha224_tv_template,
1653 			  HMAC_SHA224_TEST_VECTORS);
1654 		break;
1655 
1656 	case 106:
1657 		test_hash("xcbc(aes)", aes_xcbc128_tv_template,
1658 			  XCBC_AES_TEST_VECTORS);
1659 		break;
1660 
1661 	case 200:
1662 		test_cipher_speed("ecb(aes)", ENCRYPT, sec, NULL, 0,
1663 				speed_template_16_24_32);
1664 		test_cipher_speed("ecb(aes)", DECRYPT, sec, NULL, 0,
1665 				speed_template_16_24_32);
1666 		test_cipher_speed("cbc(aes)", ENCRYPT, sec, NULL, 0,
1667 				speed_template_16_24_32);
1668 		test_cipher_speed("cbc(aes)", DECRYPT, sec, NULL, 0,
1669 				speed_template_16_24_32);
1670 		test_cipher_speed("lrw(aes)", ENCRYPT, sec, NULL, 0,
1671 				speed_template_32_40_48);
1672 		test_cipher_speed("lrw(aes)", DECRYPT, sec, NULL, 0,
1673 				speed_template_32_40_48);
1674 		test_cipher_speed("xts(aes)", ENCRYPT, sec, NULL, 0,
1675 				speed_template_32_48_64);
1676 		test_cipher_speed("xts(aes)", DECRYPT, sec, NULL, 0,
1677 				speed_template_32_48_64);
1678 		break;
1679 
1680 	case 201:
1681 		test_cipher_speed("ecb(des3_ede)", ENCRYPT, sec,
1682 				des3_ede_enc_tv_template, DES3_EDE_ENC_TEST_VECTORS,
1683 				speed_template_24);
1684 		test_cipher_speed("ecb(des3_ede)", DECRYPT, sec,
1685 				des3_ede_enc_tv_template, DES3_EDE_ENC_TEST_VECTORS,
1686 				speed_template_24);
1687 		test_cipher_speed("cbc(des3_ede)", ENCRYPT, sec,
1688 				des3_ede_enc_tv_template, DES3_EDE_ENC_TEST_VECTORS,
1689 				speed_template_24);
1690 		test_cipher_speed("cbc(des3_ede)", DECRYPT, sec,
1691 				des3_ede_enc_tv_template, DES3_EDE_ENC_TEST_VECTORS,
1692 				speed_template_24);
1693 		break;
1694 
1695 	case 202:
1696 		test_cipher_speed("ecb(twofish)", ENCRYPT, sec, NULL, 0,
1697 				speed_template_16_24_32);
1698 		test_cipher_speed("ecb(twofish)", DECRYPT, sec, NULL, 0,
1699 				speed_template_16_24_32);
1700 		test_cipher_speed("cbc(twofish)", ENCRYPT, sec, NULL, 0,
1701 				speed_template_16_24_32);
1702 		test_cipher_speed("cbc(twofish)", DECRYPT, sec, NULL, 0,
1703 				speed_template_16_24_32);
1704 		break;
1705 
1706 	case 203:
1707 		test_cipher_speed("ecb(blowfish)", ENCRYPT, sec, NULL, 0,
1708 				  speed_template_8_32);
1709 		test_cipher_speed("ecb(blowfish)", DECRYPT, sec, NULL, 0,
1710 				  speed_template_8_32);
1711 		test_cipher_speed("cbc(blowfish)", ENCRYPT, sec, NULL, 0,
1712 				  speed_template_8_32);
1713 		test_cipher_speed("cbc(blowfish)", DECRYPT, sec, NULL, 0,
1714 				  speed_template_8_32);
1715 		break;
1716 
1717 	case 204:
1718 		test_cipher_speed("ecb(des)", ENCRYPT, sec, NULL, 0,
1719 				  speed_template_8);
1720 		test_cipher_speed("ecb(des)", DECRYPT, sec, NULL, 0,
1721 				  speed_template_8);
1722 		test_cipher_speed("cbc(des)", ENCRYPT, sec, NULL, 0,
1723 				  speed_template_8);
1724 		test_cipher_speed("cbc(des)", DECRYPT, sec, NULL, 0,
1725 				  speed_template_8);
1726 		break;
1727 
1728 	case 205:
1729 		test_cipher_speed("ecb(camellia)", ENCRYPT, sec, NULL, 0,
1730 				speed_template_16_24_32);
1731 		test_cipher_speed("ecb(camellia)", DECRYPT, sec, NULL, 0,
1732 				speed_template_16_24_32);
1733 		test_cipher_speed("cbc(camellia)", ENCRYPT, sec, NULL, 0,
1734 				speed_template_16_24_32);
1735 		test_cipher_speed("cbc(camellia)", DECRYPT, sec, NULL, 0,
1736 				speed_template_16_24_32);
1737 		break;
1738 
1739 	case 206:
1740 		test_cipher_speed("salsa20", ENCRYPT, sec, NULL, 0,
1741 				  speed_template_16_32);
1742 		break;
1743 
1744 	case 300:
1745 		/* fall through */
1746 
1747 	case 301:
1748 		test_hash_speed("md4", sec, generic_hash_speed_template);
1749 		if (mode > 300 && mode < 400) break;
1750 
1751 	case 302:
1752 		test_hash_speed("md5", sec, generic_hash_speed_template);
1753 		if (mode > 300 && mode < 400) break;
1754 
1755 	case 303:
1756 		test_hash_speed("sha1", sec, generic_hash_speed_template);
1757 		if (mode > 300 && mode < 400) break;
1758 
1759 	case 304:
1760 		test_hash_speed("sha256", sec, generic_hash_speed_template);
1761 		if (mode > 300 && mode < 400) break;
1762 
1763 	case 305:
1764 		test_hash_speed("sha384", sec, generic_hash_speed_template);
1765 		if (mode > 300 && mode < 400) break;
1766 
1767 	case 306:
1768 		test_hash_speed("sha512", sec, generic_hash_speed_template);
1769 		if (mode > 300 && mode < 400) break;
1770 
1771 	case 307:
1772 		test_hash_speed("wp256", sec, generic_hash_speed_template);
1773 		if (mode > 300 && mode < 400) break;
1774 
1775 	case 308:
1776 		test_hash_speed("wp384", sec, generic_hash_speed_template);
1777 		if (mode > 300 && mode < 400) break;
1778 
1779 	case 309:
1780 		test_hash_speed("wp512", sec, generic_hash_speed_template);
1781 		if (mode > 300 && mode < 400) break;
1782 
1783 	case 310:
1784 		test_hash_speed("tgr128", sec, generic_hash_speed_template);
1785 		if (mode > 300 && mode < 400) break;
1786 
1787 	case 311:
1788 		test_hash_speed("tgr160", sec, generic_hash_speed_template);
1789 		if (mode > 300 && mode < 400) break;
1790 
1791 	case 312:
1792 		test_hash_speed("tgr192", sec, generic_hash_speed_template);
1793 		if (mode > 300 && mode < 400) break;
1794 
1795 	case 313:
1796 		test_hash_speed("sha224", sec, generic_hash_speed_template);
1797 		if (mode > 300 && mode < 400) break;
1798 
1799 	case 399:
1800 		break;
1801 
1802 	case 1000:
1803 		test_available();
1804 		break;
1805 
1806 	default:
1807 		/* useful for debugging */
1808 		printk("not testing anything\n");
1809 		break;
1810 	}
1811 }
1812 
1813 static int __init tcrypt_mod_init(void)
1814 {
1815 	int err = -ENOMEM;
1816 
1817 	tvmem = kmalloc(TVMEMSIZE, GFP_KERNEL);
1818 	if (tvmem == NULL)
1819 		return err;
1820 
1821 	xbuf = kmalloc(XBUFSIZE, GFP_KERNEL);
1822 	if (xbuf == NULL)
1823 		goto err_free_tv;
1824 
1825 	axbuf = kmalloc(XBUFSIZE, GFP_KERNEL);
1826 	if (axbuf == NULL)
1827 		goto err_free_xbuf;
1828 
1829 	do_test();
1830 
1831 	/* We intentionaly return -EAGAIN to prevent keeping
1832 	 * the module. It does all its work from init()
1833 	 * and doesn't offer any runtime functionality
1834 	 * => we don't need it in the memory, do we?
1835 	 *                                        -- mludvig
1836 	 */
1837 	err = -EAGAIN;
1838 
1839 	kfree(axbuf);
1840  err_free_xbuf:
1841 	kfree(xbuf);
1842  err_free_tv:
1843 	kfree(tvmem);
1844 
1845 	return err;
1846 }
1847 
1848 /*
1849  * If an init function is provided, an exit function must also be provided
1850  * to allow module unload.
1851  */
1852 static void __exit tcrypt_mod_fini(void) { }
1853 
1854 module_init(tcrypt_mod_init);
1855 module_exit(tcrypt_mod_fini);
1856 
1857 module_param(mode, int, 0);
1858 module_param(sec, uint, 0);
1859 MODULE_PARM_DESC(sec, "Length in seconds of speed tests "
1860 		      "(defaults to zero which uses CPU cycles instead)");
1861 
1862 MODULE_LICENSE("GPL");
1863 MODULE_DESCRIPTION("Quick & dirty crypto testing module");
1864 MODULE_AUTHOR("James Morris <jmorris@intercode.com.au>");
1865