Lines Matching +full:sha3 +full:- +full:384

1 // SPDX-License-Identifier: GPL-2.0-or-later
9 * Copyright (c) 2002 Jean-Francois Dive <[email protected]>
12 * Updated RFC4106 AES-GCM testing.
91 while (i-- > 0) in testmgr_alloc_buf()
94 return -ENOMEM; in testmgr_alloc_buf()
109 int np = (buflen + PAGE_SIZE - 1)/PAGE_SIZE; in sg_init_aead()
124 np--; in sg_init_aead()
134 struct crypto_wait *wait = req->base.data; in do_one_aead_op()
185 return -ENOMEM; in test_mb_aead_jiffies()
212 return -ENOMEM; in test_mb_aead_cycles()
214 /* Warm-up run. */ in test_mb_aead_cycles()
232 cycles += end - start; in test_mb_aead_cycles()
293 while (i--) in test_mb_aead_speed()
300 while (i--) in test_mb_aead_speed()
307 while (i--) in test_mb_aead_speed()
317 while (i--) in test_mb_aead_speed()
378 assoc = cur->axbuf[0]; in test_mb_aead_speed()
381 sg_init_aead(cur->sg, cur->xbuf, in test_mb_aead_speed()
385 sg_init_aead(cur->sgout, cur->xoutbuf, in test_mb_aead_speed()
389 aead_request_set_ad(cur->req, aad_size); in test_mb_aead_speed()
393 aead_request_set_crypt(cur->req, in test_mb_aead_speed()
394 cur->sgout, in test_mb_aead_speed()
395 cur->sg, in test_mb_aead_speed()
397 ret = crypto_aead_encrypt(cur->req); in test_mb_aead_speed()
398 ret = do_one_aead_op(cur->req, ret); in test_mb_aead_speed()
407 aead_request_set_crypt(cur->req, cur->sg, in test_mb_aead_speed()
408 cur->sgout, bs + in test_mb_aead_speed()
482 /* Warm-up run. */ in test_aead_cycles()
507 cycles += end - start; in test_aead_cycles()
525 int ret = -ENOMEM; in test_aead_speed()
649 * reversed (input <-> output) to calculate it in test_aead_speed()
714 struct crypto_wait *wait = req->base.data; in do_one_ahash_op()
777 /* Warm-up run. */ in test_ahash_cycles_digest()
796 cycles += end - start; in test_ahash_cycles_digest()
818 /* Warm-up run. */ in test_ahash_cycles()
853 cycles += end - start; in test_ahash_cycles()
1002 return -ENOMEM; in test_mb_acipher_jiffies()
1029 return -ENOMEM; in test_mb_acipher_cycles()
1031 /* Warm-up run. */ in test_mb_acipher_cycles()
1049 cycles += end - start; in test_mb_acipher_cycles()
1091 while (i--) in test_mb_skcipher_speed()
1101 while (i--) in test_mb_skcipher_speed()
1164 sg_init_table(cur->sg, pages); in test_mb_skcipher_speed()
1167 sg_set_buf(cur->sg + p, cur->xbuf[p], in test_mb_skcipher_speed()
1169 memset(cur->xbuf[p], 0xff, PAGE_SIZE); in test_mb_skcipher_speed()
1171 k -= PAGE_SIZE; in test_mb_skcipher_speed()
1174 sg_set_buf(cur->sg + p, cur->xbuf[p], k); in test_mb_skcipher_speed()
1175 memset(cur->xbuf[p], 0xff, k); in test_mb_skcipher_speed()
1177 skcipher_request_set_crypt(cur->req, cur->sg, in test_mb_skcipher_speed()
1178 cur->sg, bs, iv); in test_mb_skcipher_speed()
1216 struct crypto_wait *wait = req->base.data; in do_one_acipher_op()
1253 /* Warm-up run. */ in test_acipher_cycles()
1282 cycles += end - start; in test_acipher_cycles()
1376 PAGE_SIZE - *keysize); in test_skcipher_speed()
1377 k -= PAGE_SIZE; in test_skcipher_speed()
1383 k -= PAGE_SIZE; in test_skcipher_speed()
1446 /* non-fips algs return -EINVAL or -ECANCELED in fips mode */ in tcrypt_test()
1447 if (fips_enabled && (ret == -EINVAL || ret == -ECANCELED)) in tcrypt_test()
1462 ret = -ENOENT; in do_test()
1642 ret = min(ret, tcrypt_test("blake2b-512")); in do_test()
1662 ret = min(ret, tcrypt_test("sha3-224")); in do_test()
1666 ret = min(ret, tcrypt_test("sha3-256")); in do_test()
1670 ret = min(ret, tcrypt_test("sha3-384")); in do_test()
1674 ret = min(ret, tcrypt_test("sha3-512")); in do_test()
1742 ret = min(ret, tcrypt_test("hmac(sha3-224)")); in do_test()
1746 ret = min(ret, tcrypt_test("hmac(sha3-256)")); in do_test()
1750 ret = min(ret, tcrypt_test("hmac(sha3-384)")); in do_test()
1754 ret = min(ret, tcrypt_test("hmac(sha3-512)")); in do_test()
2263 test_hash_speed("blake2b-512", sec, generic_hash_speed_template); in do_test()
2284 test_hash_speed("sha3-224", sec, generic_hash_speed_template); in do_test()
2288 test_hash_speed("sha3-256", sec, generic_hash_speed_template); in do_test()
2292 test_hash_speed("sha3-384", sec, generic_hash_speed_template); in do_test()
2296 test_hash_speed("sha3-512", sec, generic_hash_speed_template); in do_test()
2371 test_ahash_speed("blake2b-512", sec, generic_hash_speed_template); in do_test()
2375 test_ahash_speed("sha3-224", sec, generic_hash_speed_template); in do_test()
2379 test_ahash_speed("sha3-256", sec, generic_hash_speed_template); in do_test()
2383 test_ahash_speed("sha3-384", sec, generic_hash_speed_template); in do_test()
2387 test_ahash_speed("sha3-512", sec, generic_hash_speed_template); in do_test()
2822 int err = -ENOMEM; in tcrypt_mod_init()
2840 /* We intentionaly return -EAGAIN to prevent keeping the module, in tcrypt_mod_init()
2845 * -- mludvig in tcrypt_mod_init()
2848 err = -EAGAIN; in tcrypt_mod_init()