1*4882a593Smuzhiyun /*
2*4882a593Smuzhiyun * Copyright (c) 2022 Rockchip Electronics Co. Ltd.
3*4882a593Smuzhiyun */
4*4882a593Smuzhiyun #include <stdbool.h>
5*4882a593Smuzhiyun #include <stdio.h>
6*4882a593Smuzhiyun #include <stdlib.h>
7*4882a593Smuzhiyun #include <string.h>
8*4882a593Smuzhiyun #include <time.h>
9*4882a593Smuzhiyun #include <unistd.h>
10*4882a593Smuzhiyun #include "rkcrypto_core.h"
11*4882a593Smuzhiyun #include "rkcrypto_mem.h"
12*4882a593Smuzhiyun #include "rkcrypto_otp_key.h"
13*4882a593Smuzhiyun #include "rkcrypto_random.h"
14*4882a593Smuzhiyun #include "test_utils.h"
15*4882a593Smuzhiyun #include "rsa_key_data.h"
16*4882a593Smuzhiyun
17*4882a593Smuzhiyun #define TEST_BLOCK_SIZE 1024 * 1024 /* 1MB */
18*4882a593Smuzhiyun #define TEST_OTP_BLOCK_SIZE 500 * 1024
19*4882a593Smuzhiyun #define DURATION 1 /* 1s */
20*4882a593Smuzhiyun #define DATA_BUTT 0xFFFFFFFF
21*4882a593Smuzhiyun
test_otp_key_item_tp(bool is_virt,uint32_t key_id,uint32_t key_len,uint32_t algo,uint32_t mode,uint32_t operation,rk_crypto_mem * fd,uint32_t data_len)22*4882a593Smuzhiyun static int test_otp_key_item_tp(bool is_virt, uint32_t key_id, uint32_t key_len,
23*4882a593Smuzhiyun uint32_t algo, uint32_t mode, uint32_t operation,
24*4882a593Smuzhiyun rk_crypto_mem *fd, uint32_t data_len)
25*4882a593Smuzhiyun {
26*4882a593Smuzhiyun uint32_t res = 0;
27*4882a593Smuzhiyun rk_cipher_config config;
28*4882a593Smuzhiyun uint8_t iv[16];
29*4882a593Smuzhiyun uint8_t in_out[RK_CRYPTO_MAX_DATA_LEN];
30*4882a593Smuzhiyun struct timespec start, end;
31*4882a593Smuzhiyun uint64_t total_nsec, nsec;
32*4882a593Smuzhiyun uint32_t rounds;
33*4882a593Smuzhiyun
34*4882a593Smuzhiyun nsec = DURATION * 1000000000;
35*4882a593Smuzhiyun
36*4882a593Smuzhiyun memset(iv, 0x00, sizeof(iv));
37*4882a593Smuzhiyun test_get_rng(iv, sizeof(iv));
38*4882a593Smuzhiyun
39*4882a593Smuzhiyun if (is_virt) {
40*4882a593Smuzhiyun memset(in_out, 0x00, sizeof(in_out));
41*4882a593Smuzhiyun test_get_rng(in_out, data_len);
42*4882a593Smuzhiyun }
43*4882a593Smuzhiyun
44*4882a593Smuzhiyun memcpy(config.iv, iv, sizeof(iv));
45*4882a593Smuzhiyun
46*4882a593Smuzhiyun config.algo = algo;
47*4882a593Smuzhiyun config.mode = mode;
48*4882a593Smuzhiyun config.key_len = key_len;
49*4882a593Smuzhiyun config.reserved = NULL;
50*4882a593Smuzhiyun config.operation = operation;
51*4882a593Smuzhiyun total_nsec = 0;
52*4882a593Smuzhiyun rounds = 0;
53*4882a593Smuzhiyun
54*4882a593Smuzhiyun while (total_nsec < nsec) {
55*4882a593Smuzhiyun clock_gettime(CLOCK_REALTIME, &start);
56*4882a593Smuzhiyun
57*4882a593Smuzhiyun if (is_virt)
58*4882a593Smuzhiyun res = rk_oem_otp_key_cipher_virt(key_id, &config, in_out, in_out, data_len);
59*4882a593Smuzhiyun else
60*4882a593Smuzhiyun res = rk_oem_otp_key_cipher(key_id, &config, fd->dma_fd, fd->dma_fd, data_len);
61*4882a593Smuzhiyun
62*4882a593Smuzhiyun if (res == RK_CRYPTO_ERR_NOT_SUPPORTED) {
63*4882a593Smuzhiyun if (is_virt)
64*4882a593Smuzhiyun printf("virt:\totpkey\t[%s-%u]\t%s\t%s\tN/A.\n",
65*4882a593Smuzhiyun test_algo_name(algo), key_len * 8, test_mode_name(mode),
66*4882a593Smuzhiyun test_op_name(operation));
67*4882a593Smuzhiyun else
68*4882a593Smuzhiyun printf("dma_fd:\totpkey\t[%s-%u]\t%s\t%s\tN/A.\n",
69*4882a593Smuzhiyun test_algo_name(algo), key_len * 8, test_mode_name(mode),
70*4882a593Smuzhiyun test_op_name(operation));
71*4882a593Smuzhiyun
72*4882a593Smuzhiyun return RK_CRYPTO_SUCCESS;
73*4882a593Smuzhiyun } else if (res) {
74*4882a593Smuzhiyun printf("test rk_oem_otp_key_cipher failed! 0x%08x\n", res);
75*4882a593Smuzhiyun return res;
76*4882a593Smuzhiyun }
77*4882a593Smuzhiyun
78*4882a593Smuzhiyun clock_gettime(CLOCK_REALTIME, &end);
79*4882a593Smuzhiyun total_nsec += (end.tv_sec - start.tv_sec) * 1000000000 +
80*4882a593Smuzhiyun (end.tv_nsec - start.tv_nsec);
81*4882a593Smuzhiyun rounds ++;
82*4882a593Smuzhiyun }
83*4882a593Smuzhiyun
84*4882a593Smuzhiyun if (is_virt)
85*4882a593Smuzhiyun printf("virt:\totpkey\t[%s-%u]\t%s\t%s\t%dMB/s.\n",
86*4882a593Smuzhiyun test_algo_name(algo), key_len * 8, test_mode_name(mode),
87*4882a593Smuzhiyun test_op_name(operation), (data_len * rounds / (1024 * 1024)));
88*4882a593Smuzhiyun else
89*4882a593Smuzhiyun printf("dma_fd:\totpkey\t[%s-%u]\t%s\t%s\t%dMB/s.\n",
90*4882a593Smuzhiyun test_algo_name(algo), key_len * 8, test_mode_name(mode),
91*4882a593Smuzhiyun test_op_name(operation), (data_len * rounds / (1024 * 1024)));
92*4882a593Smuzhiyun
93*4882a593Smuzhiyun return res;
94*4882a593Smuzhiyun }
95*4882a593Smuzhiyun
test_otp_key_virt_tp(void)96*4882a593Smuzhiyun static int test_otp_key_virt_tp(void)
97*4882a593Smuzhiyun {
98*4882a593Smuzhiyun uint32_t h, j, k;
99*4882a593Smuzhiyun uint32_t algo, key_id, mode, operation, len, key_len;
100*4882a593Smuzhiyun
101*4882a593Smuzhiyun const uint32_t algo_tab[] = {
102*4882a593Smuzhiyun RK_ALGO_AES,
103*4882a593Smuzhiyun RK_ALGO_SM4,
104*4882a593Smuzhiyun };
105*4882a593Smuzhiyun const uint32_t mode_tab[] = {
106*4882a593Smuzhiyun RK_CIPHER_MODE_ECB,
107*4882a593Smuzhiyun RK_CIPHER_MODE_CBC,
108*4882a593Smuzhiyun RK_CIPHER_MODE_CTR,
109*4882a593Smuzhiyun };
110*4882a593Smuzhiyun const uint32_t op_tab[] = {
111*4882a593Smuzhiyun RK_OP_CIPHER_ENC,
112*4882a593Smuzhiyun RK_OP_CIPHER_DEC,
113*4882a593Smuzhiyun };
114*4882a593Smuzhiyun
115*4882a593Smuzhiyun for (h = 0; h < ARRAY_SIZE(algo_tab); h++) {
116*4882a593Smuzhiyun for (j = 0; j < ARRAY_SIZE(mode_tab); j++) {
117*4882a593Smuzhiyun for (k = 0; k < ARRAY_SIZE(op_tab); k++) {
118*4882a593Smuzhiyun algo = algo_tab[h];
119*4882a593Smuzhiyun mode = mode_tab[j];
120*4882a593Smuzhiyun operation = op_tab[k];
121*4882a593Smuzhiyun key_id = RK_OEM_OTP_KEY3;
122*4882a593Smuzhiyun len = TEST_OTP_BLOCK_SIZE;
123*4882a593Smuzhiyun
124*4882a593Smuzhiyun if (algo == RK_ALGO_AES) {
125*4882a593Smuzhiyun key_len = 32;
126*4882a593Smuzhiyun } else {
127*4882a593Smuzhiyun key_len = 16;
128*4882a593Smuzhiyun }
129*4882a593Smuzhiyun
130*4882a593Smuzhiyun if (test_otp_key_item_tp(true, key_id, key_len, algo,
131*4882a593Smuzhiyun mode, operation, NULL, len))
132*4882a593Smuzhiyun goto error;
133*4882a593Smuzhiyun }
134*4882a593Smuzhiyun }
135*4882a593Smuzhiyun }
136*4882a593Smuzhiyun
137*4882a593Smuzhiyun printf("virt:\ttest otp_key throughput SUCCESS.\n\n");
138*4882a593Smuzhiyun return 0;
139*4882a593Smuzhiyun
140*4882a593Smuzhiyun error:
141*4882a593Smuzhiyun printf("virt:\ttest otp_key throughput FAILED!!!\n\n");
142*4882a593Smuzhiyun return -1;
143*4882a593Smuzhiyun }
144*4882a593Smuzhiyun
test_otp_key_fd_tp(void)145*4882a593Smuzhiyun static int test_otp_key_fd_tp(void)
146*4882a593Smuzhiyun {
147*4882a593Smuzhiyun int res = 0;
148*4882a593Smuzhiyun uint32_t h, j, k;
149*4882a593Smuzhiyun uint32_t algo, key_id, mode, operation, len, key_len;
150*4882a593Smuzhiyun rk_crypto_mem *in_out = NULL;
151*4882a593Smuzhiyun
152*4882a593Smuzhiyun const uint32_t algo_tab[] = {
153*4882a593Smuzhiyun RK_ALGO_AES,
154*4882a593Smuzhiyun RK_ALGO_SM4,
155*4882a593Smuzhiyun };
156*4882a593Smuzhiyun const uint32_t mode_tab[] = {
157*4882a593Smuzhiyun RK_CIPHER_MODE_ECB,
158*4882a593Smuzhiyun RK_CIPHER_MODE_CBC,
159*4882a593Smuzhiyun RK_CIPHER_MODE_CTR,
160*4882a593Smuzhiyun };
161*4882a593Smuzhiyun const uint32_t op_tab[] = {
162*4882a593Smuzhiyun RK_OP_CIPHER_ENC,
163*4882a593Smuzhiyun RK_OP_CIPHER_DEC,
164*4882a593Smuzhiyun };
165*4882a593Smuzhiyun
166*4882a593Smuzhiyun if (rk_crypto_init()) {
167*4882a593Smuzhiyun printf("rk_crypto_init error!\n");
168*4882a593Smuzhiyun return -1;
169*4882a593Smuzhiyun }
170*4882a593Smuzhiyun
171*4882a593Smuzhiyun in_out = rk_crypto_mem_alloc(TEST_OTP_BLOCK_SIZE);
172*4882a593Smuzhiyun if (!in_out) {
173*4882a593Smuzhiyun printf("rk_crypto_mem_alloc %uByte error!\n", TEST_OTP_BLOCK_SIZE);
174*4882a593Smuzhiyun res = -1;
175*4882a593Smuzhiyun goto out;
176*4882a593Smuzhiyun }
177*4882a593Smuzhiyun
178*4882a593Smuzhiyun for (h = 0; h < ARRAY_SIZE(algo_tab); h++) {
179*4882a593Smuzhiyun for (j = 0; j < ARRAY_SIZE(mode_tab); j++) {
180*4882a593Smuzhiyun for (k = 0; k < ARRAY_SIZE(op_tab); k++) {
181*4882a593Smuzhiyun algo = algo_tab[h];
182*4882a593Smuzhiyun mode = mode_tab[j];
183*4882a593Smuzhiyun operation = op_tab[k];
184*4882a593Smuzhiyun key_id = RK_OEM_OTP_KEY3;
185*4882a593Smuzhiyun len = TEST_OTP_BLOCK_SIZE;
186*4882a593Smuzhiyun
187*4882a593Smuzhiyun if (algo == RK_ALGO_AES) {
188*4882a593Smuzhiyun key_len = 32;
189*4882a593Smuzhiyun } else {
190*4882a593Smuzhiyun key_len = 16;
191*4882a593Smuzhiyun }
192*4882a593Smuzhiyun
193*4882a593Smuzhiyun if (test_otp_key_item_tp(false, key_id, key_len, algo,
194*4882a593Smuzhiyun mode, operation, in_out, len)) {
195*4882a593Smuzhiyun printf("dma_fd:\ttest otp_key throughput FAILED!!!\n");
196*4882a593Smuzhiyun res = -1;
197*4882a593Smuzhiyun goto out;
198*4882a593Smuzhiyun }
199*4882a593Smuzhiyun }
200*4882a593Smuzhiyun }
201*4882a593Smuzhiyun }
202*4882a593Smuzhiyun
203*4882a593Smuzhiyun printf("dma_fd:\ttest otp_key throughput SUCCESS.\n\n");
204*4882a593Smuzhiyun
205*4882a593Smuzhiyun out:
206*4882a593Smuzhiyun if (!in_out)
207*4882a593Smuzhiyun rk_crypto_mem_free(in_out);
208*4882a593Smuzhiyun
209*4882a593Smuzhiyun rk_crypto_deinit();
210*4882a593Smuzhiyun return res;
211*4882a593Smuzhiyun }
212*4882a593Smuzhiyun
test_otp_key_tp(void)213*4882a593Smuzhiyun static int test_otp_key_tp(void)
214*4882a593Smuzhiyun {
215*4882a593Smuzhiyun if (test_otp_key_fd_tp())
216*4882a593Smuzhiyun return -1;
217*4882a593Smuzhiyun
218*4882a593Smuzhiyun if (test_otp_key_virt_tp())
219*4882a593Smuzhiyun return -1;
220*4882a593Smuzhiyun
221*4882a593Smuzhiyun return 0;
222*4882a593Smuzhiyun }
223*4882a593Smuzhiyun
test_cipher_item_tp(bool is_virt,uint32_t key_len,uint32_t algo,uint32_t mode,uint32_t operation,void * in_out,uint32_t data_len)224*4882a593Smuzhiyun static int test_cipher_item_tp(bool is_virt, uint32_t key_len, uint32_t algo,
225*4882a593Smuzhiyun uint32_t mode, uint32_t operation,
226*4882a593Smuzhiyun void *in_out, uint32_t data_len)
227*4882a593Smuzhiyun {
228*4882a593Smuzhiyun uint32_t res = 0;
229*4882a593Smuzhiyun rk_handle handle = 0;
230*4882a593Smuzhiyun rk_cipher_config config;
231*4882a593Smuzhiyun struct timespec start, end;
232*4882a593Smuzhiyun uint64_t total_nsec, nsec;
233*4882a593Smuzhiyun uint32_t rounds;
234*4882a593Smuzhiyun
235*4882a593Smuzhiyun nsec = DURATION * 1000000000;
236*4882a593Smuzhiyun
237*4882a593Smuzhiyun test_get_rng(config.iv, sizeof(config.iv));
238*4882a593Smuzhiyun test_get_rng(config.key, key_len);
239*4882a593Smuzhiyun
240*4882a593Smuzhiyun if (is_virt)
241*4882a593Smuzhiyun test_get_rng(in_out, data_len);
242*4882a593Smuzhiyun
243*4882a593Smuzhiyun config.algo = algo;
244*4882a593Smuzhiyun config.mode = mode;
245*4882a593Smuzhiyun config.key_len = key_len;
246*4882a593Smuzhiyun config.reserved = NULL;
247*4882a593Smuzhiyun config.operation = operation;
248*4882a593Smuzhiyun total_nsec = 0;
249*4882a593Smuzhiyun rounds = 0;
250*4882a593Smuzhiyun
251*4882a593Smuzhiyun while (total_nsec < nsec) {
252*4882a593Smuzhiyun clock_gettime(CLOCK_REALTIME, &start);
253*4882a593Smuzhiyun
254*4882a593Smuzhiyun res = rk_cipher_init(&config, &handle);
255*4882a593Smuzhiyun if (res) {
256*4882a593Smuzhiyun if (res != RK_CRYPTO_ERR_NOT_SUPPORTED) {
257*4882a593Smuzhiyun printf("test rk_cipher_init failed! 0x%08x\n", res);
258*4882a593Smuzhiyun goto error;
259*4882a593Smuzhiyun }
260*4882a593Smuzhiyun
261*4882a593Smuzhiyun if (is_virt)
262*4882a593Smuzhiyun printf("virt:\t[%s-%u]\t%s\tN/A\n",
263*4882a593Smuzhiyun test_algo_name(algo), key_len * 8, test_mode_name(mode));
264*4882a593Smuzhiyun else
265*4882a593Smuzhiyun printf("dma_fd:\t[%s-%u]\t%s\tN/A\n",
266*4882a593Smuzhiyun test_algo_name(algo), key_len * 8, test_mode_name(mode));
267*4882a593Smuzhiyun return 0;
268*4882a593Smuzhiyun }
269*4882a593Smuzhiyun
270*4882a593Smuzhiyun if (is_virt)
271*4882a593Smuzhiyun res = rk_cipher_crypt_virt(handle, in_out, in_out, data_len);
272*4882a593Smuzhiyun else
273*4882a593Smuzhiyun res = rk_cipher_crypt(handle,
274*4882a593Smuzhiyun ((rk_crypto_mem *)in_out)->dma_fd,
275*4882a593Smuzhiyun ((rk_crypto_mem *)in_out)->dma_fd,
276*4882a593Smuzhiyun data_len);
277*4882a593Smuzhiyun
278*4882a593Smuzhiyun if (res) {
279*4882a593Smuzhiyun rk_cipher_final(handle);
280*4882a593Smuzhiyun printf("test rk_cipher_crypt failed! 0x%08x\n", res);
281*4882a593Smuzhiyun goto error;
282*4882a593Smuzhiyun }
283*4882a593Smuzhiyun
284*4882a593Smuzhiyun rk_cipher_final(handle);
285*4882a593Smuzhiyun
286*4882a593Smuzhiyun clock_gettime(CLOCK_REALTIME, &end);
287*4882a593Smuzhiyun total_nsec += (end.tv_sec - start.tv_sec) * 1000000000 +
288*4882a593Smuzhiyun (end.tv_nsec - start.tv_nsec);
289*4882a593Smuzhiyun rounds ++;
290*4882a593Smuzhiyun }
291*4882a593Smuzhiyun
292*4882a593Smuzhiyun if (is_virt)
293*4882a593Smuzhiyun printf("virt:\t[%s-%u]\t%s\t%s\t%dMB/s.\n",
294*4882a593Smuzhiyun test_algo_name(algo), key_len * 8, test_mode_name(mode),
295*4882a593Smuzhiyun test_op_name(operation), (data_len * rounds / (1024 * 1024)));
296*4882a593Smuzhiyun else
297*4882a593Smuzhiyun printf("dma_fd:\t[%s-%u]\t%s\t%s\t%dMB/s.\n",
298*4882a593Smuzhiyun test_algo_name(algo), key_len * 8, test_mode_name(mode),
299*4882a593Smuzhiyun test_op_name(operation), (data_len * rounds / (1024 * 1024)));
300*4882a593Smuzhiyun
301*4882a593Smuzhiyun return res;
302*4882a593Smuzhiyun error:
303*4882a593Smuzhiyun if (is_virt)
304*4882a593Smuzhiyun printf("virt:\t[%s-%u]\t%s\tFailed.\n",
305*4882a593Smuzhiyun test_algo_name(algo), key_len * 8, test_mode_name(mode));
306*4882a593Smuzhiyun else
307*4882a593Smuzhiyun printf("dma_fd:\t[%s-%u]\t%s\tFailed.\n",
308*4882a593Smuzhiyun test_algo_name(algo), key_len * 8, test_mode_name(mode));
309*4882a593Smuzhiyun return res;
310*4882a593Smuzhiyun }
311*4882a593Smuzhiyun
test_cipher_tp(void)312*4882a593Smuzhiyun static int test_cipher_tp(void)
313*4882a593Smuzhiyun {
314*4882a593Smuzhiyun int res = 0;
315*4882a593Smuzhiyun uint32_t h, j, k;
316*4882a593Smuzhiyun uint32_t algo, mode, operation, len, key_len;
317*4882a593Smuzhiyun rk_crypto_mem *in_out_fd = NULL;
318*4882a593Smuzhiyun uint8_t *in_out_virt = NULL;
319*4882a593Smuzhiyun size_t page_size = getpagesize();
320*4882a593Smuzhiyun
321*4882a593Smuzhiyun struct test_cipher_item_tp {
322*4882a593Smuzhiyun uint32_t algo;
323*4882a593Smuzhiyun uint32_t modes[RK_CIPHER_MODE_MAX];
324*4882a593Smuzhiyun uint32_t key_len;
325*4882a593Smuzhiyun uint32_t op[2];
326*4882a593Smuzhiyun };
327*4882a593Smuzhiyun
328*4882a593Smuzhiyun static struct test_cipher_item_tp test_item_tbl[] = {
329*4882a593Smuzhiyun {
330*4882a593Smuzhiyun .algo = RK_ALGO_DES,
331*4882a593Smuzhiyun .modes = {
332*4882a593Smuzhiyun RK_CIPHER_MODE_ECB,
333*4882a593Smuzhiyun RK_CIPHER_MODE_CBC,
334*4882a593Smuzhiyun DATA_BUTT,
335*4882a593Smuzhiyun },
336*4882a593Smuzhiyun .key_len = 8,
337*4882a593Smuzhiyun .op = {RK_OP_CIPHER_ENC, RK_OP_CIPHER_DEC},
338*4882a593Smuzhiyun },
339*4882a593Smuzhiyun
340*4882a593Smuzhiyun {
341*4882a593Smuzhiyun .algo = RK_ALGO_TDES,
342*4882a593Smuzhiyun .modes = {
343*4882a593Smuzhiyun RK_CIPHER_MODE_ECB,
344*4882a593Smuzhiyun RK_CIPHER_MODE_CBC,
345*4882a593Smuzhiyun DATA_BUTT,
346*4882a593Smuzhiyun },
347*4882a593Smuzhiyun .key_len = 24,
348*4882a593Smuzhiyun .op = {RK_OP_CIPHER_ENC, RK_OP_CIPHER_DEC},
349*4882a593Smuzhiyun },
350*4882a593Smuzhiyun
351*4882a593Smuzhiyun {
352*4882a593Smuzhiyun .algo = RK_ALGO_AES,
353*4882a593Smuzhiyun .modes = {
354*4882a593Smuzhiyun RK_CIPHER_MODE_ECB,
355*4882a593Smuzhiyun RK_CIPHER_MODE_CBC,
356*4882a593Smuzhiyun RK_CIPHER_MODE_CTS,
357*4882a593Smuzhiyun RK_CIPHER_MODE_CTR,
358*4882a593Smuzhiyun DATA_BUTT,
359*4882a593Smuzhiyun },
360*4882a593Smuzhiyun .key_len = 32,
361*4882a593Smuzhiyun .op = {RK_OP_CIPHER_ENC, RK_OP_CIPHER_DEC},
362*4882a593Smuzhiyun },
363*4882a593Smuzhiyun
364*4882a593Smuzhiyun {
365*4882a593Smuzhiyun .algo = RK_ALGO_SM4,
366*4882a593Smuzhiyun .modes = {
367*4882a593Smuzhiyun RK_CIPHER_MODE_ECB,
368*4882a593Smuzhiyun RK_CIPHER_MODE_CBC,
369*4882a593Smuzhiyun RK_CIPHER_MODE_CTS,
370*4882a593Smuzhiyun RK_CIPHER_MODE_CTR,
371*4882a593Smuzhiyun DATA_BUTT,
372*4882a593Smuzhiyun },
373*4882a593Smuzhiyun .key_len = 16,
374*4882a593Smuzhiyun .op = {RK_OP_CIPHER_ENC, RK_OP_CIPHER_DEC},
375*4882a593Smuzhiyun },
376*4882a593Smuzhiyun
377*4882a593Smuzhiyun };
378*4882a593Smuzhiyun
379*4882a593Smuzhiyun if (rk_crypto_init()) {
380*4882a593Smuzhiyun printf("rk_crypto_init error!\n");
381*4882a593Smuzhiyun return -1;
382*4882a593Smuzhiyun }
383*4882a593Smuzhiyun
384*4882a593Smuzhiyun in_out_fd = rk_crypto_mem_alloc(TEST_BLOCK_SIZE);
385*4882a593Smuzhiyun if (!in_out_fd) {
386*4882a593Smuzhiyun printf("rk_crypto_mem_alloc %uByte error!\n", TEST_BLOCK_SIZE);
387*4882a593Smuzhiyun res = -1;
388*4882a593Smuzhiyun goto out;
389*4882a593Smuzhiyun }
390*4882a593Smuzhiyun
391*4882a593Smuzhiyun if (posix_memalign((void *)&in_out_virt, page_size, TEST_BLOCK_SIZE) || !in_out_virt) {
392*4882a593Smuzhiyun printf("malloc %uByte error!\n", TEST_BLOCK_SIZE);
393*4882a593Smuzhiyun res = -1;
394*4882a593Smuzhiyun goto out;
395*4882a593Smuzhiyun }
396*4882a593Smuzhiyun
397*4882a593Smuzhiyun /* Test dma_fd cipher */
398*4882a593Smuzhiyun for (h = 0; h < ARRAY_SIZE(test_item_tbl); h++) {
399*4882a593Smuzhiyun for (j = 0; j < ARRAY_SIZE(test_item_tbl[h].modes); j++) {
400*4882a593Smuzhiyun if (test_item_tbl[h].modes[j] == DATA_BUTT)
401*4882a593Smuzhiyun break;
402*4882a593Smuzhiyun
403*4882a593Smuzhiyun for (k = 0; k < ARRAY_SIZE(test_item_tbl[h].op); k++) {
404*4882a593Smuzhiyun algo = test_item_tbl[h].algo;
405*4882a593Smuzhiyun key_len = test_item_tbl[h].key_len;
406*4882a593Smuzhiyun mode = test_item_tbl[h].modes[j];
407*4882a593Smuzhiyun operation = test_item_tbl[h].op[k];
408*4882a593Smuzhiyun len = TEST_BLOCK_SIZE;
409*4882a593Smuzhiyun
410*4882a593Smuzhiyun if (test_cipher_item_tp(false, key_len, algo, mode,
411*4882a593Smuzhiyun operation, in_out_fd, len)) {
412*4882a593Smuzhiyun printf("dma_fd:\ttest cipher throughput FAILED!!!\n");
413*4882a593Smuzhiyun res = -1;
414*4882a593Smuzhiyun goto out;
415*4882a593Smuzhiyun }
416*4882a593Smuzhiyun }
417*4882a593Smuzhiyun }
418*4882a593Smuzhiyun }
419*4882a593Smuzhiyun
420*4882a593Smuzhiyun printf("dma_fd:\ttest cipher throughput SUCCESS.\n\n");
421*4882a593Smuzhiyun
422*4882a593Smuzhiyun /* Test virt cipher */
423*4882a593Smuzhiyun for (h = 0; h < ARRAY_SIZE(test_item_tbl); h++) {
424*4882a593Smuzhiyun for (j = 0; j < ARRAY_SIZE(test_item_tbl[h].modes); j++) {
425*4882a593Smuzhiyun if (test_item_tbl[h].modes[j] == DATA_BUTT)
426*4882a593Smuzhiyun break;
427*4882a593Smuzhiyun
428*4882a593Smuzhiyun for (k = 0; k < ARRAY_SIZE(test_item_tbl[h].op); k++) {
429*4882a593Smuzhiyun algo = test_item_tbl[h].algo;
430*4882a593Smuzhiyun key_len = test_item_tbl[h].key_len;
431*4882a593Smuzhiyun mode = test_item_tbl[h].modes[j];
432*4882a593Smuzhiyun operation = test_item_tbl[h].op[k];
433*4882a593Smuzhiyun len = TEST_BLOCK_SIZE;
434*4882a593Smuzhiyun
435*4882a593Smuzhiyun if (test_cipher_item_tp(true, key_len, algo, mode,
436*4882a593Smuzhiyun operation, in_out_virt, len)) {
437*4882a593Smuzhiyun printf("virt:\ttest cipher throughput FAILED!!!\n");
438*4882a593Smuzhiyun res = -1;
439*4882a593Smuzhiyun goto out;
440*4882a593Smuzhiyun }
441*4882a593Smuzhiyun }
442*4882a593Smuzhiyun }
443*4882a593Smuzhiyun }
444*4882a593Smuzhiyun
445*4882a593Smuzhiyun printf("virt:\ttest cipher throughput SUCCESS.\n\n");
446*4882a593Smuzhiyun
447*4882a593Smuzhiyun out:
448*4882a593Smuzhiyun if (in_out_fd)
449*4882a593Smuzhiyun rk_crypto_mem_free(in_out_fd);
450*4882a593Smuzhiyun
451*4882a593Smuzhiyun if (in_out_virt)
452*4882a593Smuzhiyun free(in_out_virt);
453*4882a593Smuzhiyun
454*4882a593Smuzhiyun rk_crypto_deinit();
455*4882a593Smuzhiyun return res;
456*4882a593Smuzhiyun }
457*4882a593Smuzhiyun
test_ae_item_tp(bool is_virt,uint32_t key_len,uint32_t algo,uint32_t mode,void * in,void * out,uint32_t data_len,void * aad,uint32_t aad_len,void * tag)458*4882a593Smuzhiyun static int test_ae_item_tp(bool is_virt, uint32_t key_len, uint32_t algo,
459*4882a593Smuzhiyun uint32_t mode, void *in, void *out, uint32_t data_len,
460*4882a593Smuzhiyun void *aad, uint32_t aad_len, void *tag)
461*4882a593Smuzhiyun {
462*4882a593Smuzhiyun uint32_t res = 0;
463*4882a593Smuzhiyun rk_handle handle = 0;
464*4882a593Smuzhiyun rk_ae_config config;
465*4882a593Smuzhiyun struct timespec start, end;
466*4882a593Smuzhiyun uint64_t total_nsec, nsec;
467*4882a593Smuzhiyun uint32_t rounds;
468*4882a593Smuzhiyun uint8_t iv_tmp[32];
469*4882a593Smuzhiyun
470*4882a593Smuzhiyun nsec = DURATION * 1000000000;
471*4882a593Smuzhiyun
472*4882a593Smuzhiyun test_get_rng(config.iv, sizeof(config.iv));
473*4882a593Smuzhiyun test_get_rng(config.key, key_len);
474*4882a593Smuzhiyun
475*4882a593Smuzhiyun memcpy(iv_tmp, config.iv, sizeof(config.iv));
476*4882a593Smuzhiyun
477*4882a593Smuzhiyun if (is_virt) {
478*4882a593Smuzhiyun test_get_rng(in, data_len);
479*4882a593Smuzhiyun test_get_rng(aad, aad_len);
480*4882a593Smuzhiyun } else {
481*4882a593Smuzhiyun test_get_rng(((rk_crypto_mem *)in)->vaddr, data_len);
482*4882a593Smuzhiyun test_get_rng(((rk_crypto_mem *)aad)->vaddr, aad_len);
483*4882a593Smuzhiyun }
484*4882a593Smuzhiyun
485*4882a593Smuzhiyun config.algo = algo;
486*4882a593Smuzhiyun config.mode = mode;
487*4882a593Smuzhiyun config.key_len = key_len;
488*4882a593Smuzhiyun config.reserved = NULL;
489*4882a593Smuzhiyun config.aad_len = aad_len;
490*4882a593Smuzhiyun config.iv_len = 12;
491*4882a593Smuzhiyun config.tag_len = 16;
492*4882a593Smuzhiyun
493*4882a593Smuzhiyun /* ENC */
494*4882a593Smuzhiyun config.operation = RK_OP_CIPHER_ENC;
495*4882a593Smuzhiyun total_nsec = 0;
496*4882a593Smuzhiyun rounds = 0;
497*4882a593Smuzhiyun
498*4882a593Smuzhiyun while (total_nsec < nsec) {
499*4882a593Smuzhiyun clock_gettime(CLOCK_REALTIME, &start);
500*4882a593Smuzhiyun
501*4882a593Smuzhiyun res = rk_ae_init(&config, &handle);
502*4882a593Smuzhiyun if (res) {
503*4882a593Smuzhiyun if (res != RK_CRYPTO_ERR_NOT_SUPPORTED) {
504*4882a593Smuzhiyun printf("test rk_ae_init failed! 0x%08x\n", res);
505*4882a593Smuzhiyun goto error;
506*4882a593Smuzhiyun }
507*4882a593Smuzhiyun
508*4882a593Smuzhiyun if (is_virt)
509*4882a593Smuzhiyun printf("virt:\t[%s-%u]\t%s\tN/A\n",
510*4882a593Smuzhiyun test_algo_name(algo), key_len * 8, test_mode_name(mode));
511*4882a593Smuzhiyun else
512*4882a593Smuzhiyun printf("dma_fd:\t[%s-%u]\t%s\tN/A\n",
513*4882a593Smuzhiyun test_algo_name(algo), key_len * 8, test_mode_name(mode));
514*4882a593Smuzhiyun return 0;
515*4882a593Smuzhiyun }
516*4882a593Smuzhiyun
517*4882a593Smuzhiyun if (is_virt) {
518*4882a593Smuzhiyun res = rk_ae_set_aad_virt(handle, aad);
519*4882a593Smuzhiyun if (res) {
520*4882a593Smuzhiyun rk_ae_final(handle);
521*4882a593Smuzhiyun goto error;
522*4882a593Smuzhiyun }
523*4882a593Smuzhiyun res = rk_ae_crypt_virt(handle, in, out, data_len, tag);
524*4882a593Smuzhiyun } else {
525*4882a593Smuzhiyun res = rk_ae_set_aad(handle, ((rk_crypto_mem *)aad)->dma_fd);
526*4882a593Smuzhiyun if (res) {
527*4882a593Smuzhiyun rk_ae_final(handle);
528*4882a593Smuzhiyun goto error;
529*4882a593Smuzhiyun }
530*4882a593Smuzhiyun
531*4882a593Smuzhiyun res = rk_ae_crypt(handle,
532*4882a593Smuzhiyun ((rk_crypto_mem *)in)->dma_fd,
533*4882a593Smuzhiyun ((rk_crypto_mem *)out)->dma_fd,
534*4882a593Smuzhiyun data_len,
535*4882a593Smuzhiyun tag);
536*4882a593Smuzhiyun }
537*4882a593Smuzhiyun
538*4882a593Smuzhiyun if (res) {
539*4882a593Smuzhiyun rk_ae_final(handle);
540*4882a593Smuzhiyun printf("test rk_ad_crypt failed! 0x%08x\n", res);
541*4882a593Smuzhiyun goto error;
542*4882a593Smuzhiyun }
543*4882a593Smuzhiyun
544*4882a593Smuzhiyun rk_ae_final(handle);
545*4882a593Smuzhiyun
546*4882a593Smuzhiyun clock_gettime(CLOCK_REALTIME, &end);
547*4882a593Smuzhiyun total_nsec += (end.tv_sec - start.tv_sec) * 1000000000 +
548*4882a593Smuzhiyun (end.tv_nsec - start.tv_nsec);
549*4882a593Smuzhiyun rounds ++;
550*4882a593Smuzhiyun }
551*4882a593Smuzhiyun
552*4882a593Smuzhiyun if (is_virt)
553*4882a593Smuzhiyun printf("virt:\t[%s-%u]\t%s\t%s\t%dMB/s.\n",
554*4882a593Smuzhiyun test_algo_name(algo), key_len * 8, test_mode_name(mode),
555*4882a593Smuzhiyun test_op_name(config.operation), (data_len * rounds / (1024 * 1024)));
556*4882a593Smuzhiyun else
557*4882a593Smuzhiyun printf("dma_fd:\t[%s-%u]\t%s\t%s\t%dMB/s.\n",
558*4882a593Smuzhiyun test_algo_name(algo), key_len * 8, test_mode_name(mode),
559*4882a593Smuzhiyun test_op_name(config.operation), (data_len * rounds / (1024 * 1024)));
560*4882a593Smuzhiyun
561*4882a593Smuzhiyun /* DEC */
562*4882a593Smuzhiyun config.operation = RK_OP_CIPHER_DEC;
563*4882a593Smuzhiyun memcpy(config.iv, iv_tmp, config.iv_len);
564*4882a593Smuzhiyun total_nsec = 0;
565*4882a593Smuzhiyun rounds = 0;
566*4882a593Smuzhiyun while (total_nsec < nsec) {
567*4882a593Smuzhiyun clock_gettime(CLOCK_REALTIME, &start);
568*4882a593Smuzhiyun
569*4882a593Smuzhiyun res = rk_ae_init(&config, &handle);
570*4882a593Smuzhiyun if (res) {
571*4882a593Smuzhiyun if (res != RK_CRYPTO_ERR_NOT_SUPPORTED) {
572*4882a593Smuzhiyun printf("test rk_ae_init failed! 0x%08x\n", res);
573*4882a593Smuzhiyun goto error;
574*4882a593Smuzhiyun }
575*4882a593Smuzhiyun
576*4882a593Smuzhiyun if (is_virt)
577*4882a593Smuzhiyun printf("virt:\t[%s-%u]\t%s\tN/A\n",
578*4882a593Smuzhiyun test_algo_name(algo), key_len * 8, test_mode_name(mode));
579*4882a593Smuzhiyun else
580*4882a593Smuzhiyun printf("dma_fd:\t[%s-%u]\t%s\tN/A\n",
581*4882a593Smuzhiyun test_algo_name(algo), key_len * 8, test_mode_name(mode));
582*4882a593Smuzhiyun return 0;
583*4882a593Smuzhiyun }
584*4882a593Smuzhiyun
585*4882a593Smuzhiyun if (is_virt) {
586*4882a593Smuzhiyun res = rk_ae_set_aad_virt(handle, aad);
587*4882a593Smuzhiyun if (res) {
588*4882a593Smuzhiyun rk_ae_final(handle);
589*4882a593Smuzhiyun goto error;
590*4882a593Smuzhiyun }
591*4882a593Smuzhiyun res = rk_ae_crypt_virt(handle, out, in, data_len, tag);
592*4882a593Smuzhiyun } else {
593*4882a593Smuzhiyun res = rk_ae_set_aad(handle, ((rk_crypto_mem *)aad)->dma_fd);
594*4882a593Smuzhiyun if (res) {
595*4882a593Smuzhiyun rk_ae_final(handle);
596*4882a593Smuzhiyun goto error;
597*4882a593Smuzhiyun }
598*4882a593Smuzhiyun
599*4882a593Smuzhiyun res = rk_ae_crypt(handle,
600*4882a593Smuzhiyun ((rk_crypto_mem *)out)->dma_fd,
601*4882a593Smuzhiyun ((rk_crypto_mem *)in)->dma_fd,
602*4882a593Smuzhiyun data_len,
603*4882a593Smuzhiyun tag);
604*4882a593Smuzhiyun }
605*4882a593Smuzhiyun
606*4882a593Smuzhiyun if (res) {
607*4882a593Smuzhiyun rk_ae_final(handle);
608*4882a593Smuzhiyun printf("test rk_ad_crypt failed! 0x%08x\n", res);
609*4882a593Smuzhiyun goto error;
610*4882a593Smuzhiyun }
611*4882a593Smuzhiyun
612*4882a593Smuzhiyun rk_ae_final(handle);
613*4882a593Smuzhiyun
614*4882a593Smuzhiyun clock_gettime(CLOCK_REALTIME, &end);
615*4882a593Smuzhiyun total_nsec += (end.tv_sec - start.tv_sec) * 1000000000 +
616*4882a593Smuzhiyun (end.tv_nsec - start.tv_nsec);
617*4882a593Smuzhiyun rounds ++;
618*4882a593Smuzhiyun }
619*4882a593Smuzhiyun
620*4882a593Smuzhiyun if (is_virt)
621*4882a593Smuzhiyun printf("virt:\t[%s-%u]\t%s\t%s\t%dMB/s.\n",
622*4882a593Smuzhiyun test_algo_name(algo), key_len * 8, test_mode_name(mode),
623*4882a593Smuzhiyun test_op_name(config.operation), (data_len * rounds / (1024 * 1024)));
624*4882a593Smuzhiyun else
625*4882a593Smuzhiyun printf("dma_fd:\t[%s-%u]\t%s\t%s\t%dMB/s.\n",
626*4882a593Smuzhiyun test_algo_name(algo), key_len * 8, test_mode_name(mode),
627*4882a593Smuzhiyun test_op_name(config.operation), (data_len * rounds / (1024 * 1024)));
628*4882a593Smuzhiyun
629*4882a593Smuzhiyun return res;
630*4882a593Smuzhiyun error:
631*4882a593Smuzhiyun if (is_virt)
632*4882a593Smuzhiyun printf("virt:\t[%s-%u]\t%s\tFailed.\n",
633*4882a593Smuzhiyun test_algo_name(algo), key_len * 8, test_mode_name(mode));
634*4882a593Smuzhiyun else
635*4882a593Smuzhiyun printf("dma_fd:\t[%s-%u]\t%s\tFailed.\n",
636*4882a593Smuzhiyun test_algo_name(algo), key_len * 8, test_mode_name(mode));
637*4882a593Smuzhiyun return res;
638*4882a593Smuzhiyun }
639*4882a593Smuzhiyun
test_ae_tp(void)640*4882a593Smuzhiyun static int test_ae_tp(void)
641*4882a593Smuzhiyun {
642*4882a593Smuzhiyun int res = 0;
643*4882a593Smuzhiyun uint32_t h, j;
644*4882a593Smuzhiyun uint32_t algo, mode, len, key_len, aad_len;
645*4882a593Smuzhiyun rk_crypto_mem *in_fd = NULL, *out_fd = NULL, *aad_fd = NULL;
646*4882a593Smuzhiyun uint8_t *in_virt = NULL, *out_virt = NULL, *aad_virt = NULL;
647*4882a593Smuzhiyun size_t page_size = getpagesize();
648*4882a593Smuzhiyun uint32_t aad_buff_len = 1024;
649*4882a593Smuzhiyun uint8_t tag[16];
650*4882a593Smuzhiyun
651*4882a593Smuzhiyun struct test_aead_item_tp {
652*4882a593Smuzhiyun uint32_t algo;
653*4882a593Smuzhiyun uint32_t modes[RK_CIPHER_MODE_MAX];
654*4882a593Smuzhiyun uint32_t key_len;
655*4882a593Smuzhiyun uint32_t aad_len;
656*4882a593Smuzhiyun uint32_t len;
657*4882a593Smuzhiyun };
658*4882a593Smuzhiyun
659*4882a593Smuzhiyun static struct test_aead_item_tp test_item_tbl[] = {
660*4882a593Smuzhiyun {
661*4882a593Smuzhiyun .algo = RK_ALGO_AES,
662*4882a593Smuzhiyun .modes = {
663*4882a593Smuzhiyun RK_CIPHER_MODE_GCM,
664*4882a593Smuzhiyun DATA_BUTT,
665*4882a593Smuzhiyun },
666*4882a593Smuzhiyun .key_len = 32,
667*4882a593Smuzhiyun .aad_len = 1024,
668*4882a593Smuzhiyun .len = TEST_BLOCK_SIZE,
669*4882a593Smuzhiyun },
670*4882a593Smuzhiyun
671*4882a593Smuzhiyun {
672*4882a593Smuzhiyun .algo = RK_ALGO_SM4,
673*4882a593Smuzhiyun .modes = {
674*4882a593Smuzhiyun RK_CIPHER_MODE_GCM,
675*4882a593Smuzhiyun DATA_BUTT,
676*4882a593Smuzhiyun },
677*4882a593Smuzhiyun .key_len = 16,
678*4882a593Smuzhiyun .aad_len = 1024,
679*4882a593Smuzhiyun .len = TEST_BLOCK_SIZE,
680*4882a593Smuzhiyun },
681*4882a593Smuzhiyun };
682*4882a593Smuzhiyun
683*4882a593Smuzhiyun if (rk_crypto_init()) {
684*4882a593Smuzhiyun printf("rk_crypto_init error!\n");
685*4882a593Smuzhiyun return -1;
686*4882a593Smuzhiyun }
687*4882a593Smuzhiyun
688*4882a593Smuzhiyun in_fd = rk_crypto_mem_alloc(TEST_BLOCK_SIZE);
689*4882a593Smuzhiyun if (!in_fd) {
690*4882a593Smuzhiyun printf("rk_crypto_mem_alloc %uByte error!\n", TEST_BLOCK_SIZE);
691*4882a593Smuzhiyun res = -1;
692*4882a593Smuzhiyun goto out;
693*4882a593Smuzhiyun }
694*4882a593Smuzhiyun
695*4882a593Smuzhiyun out_fd = rk_crypto_mem_alloc(TEST_BLOCK_SIZE);
696*4882a593Smuzhiyun if (!out_fd) {
697*4882a593Smuzhiyun printf("rk_crypto_mem_alloc %uByte error!\n", TEST_BLOCK_SIZE);
698*4882a593Smuzhiyun res = -1;
699*4882a593Smuzhiyun goto out;
700*4882a593Smuzhiyun }
701*4882a593Smuzhiyun
702*4882a593Smuzhiyun aad_fd = rk_crypto_mem_alloc(aad_buff_len);
703*4882a593Smuzhiyun if (!aad_fd) {
704*4882a593Smuzhiyun printf("rk_crypto_mem_alloc %uByte error!\n", aad_buff_len);
705*4882a593Smuzhiyun res = -1;
706*4882a593Smuzhiyun goto out;
707*4882a593Smuzhiyun }
708*4882a593Smuzhiyun
709*4882a593Smuzhiyun if (posix_memalign((void *)&in_virt, page_size, TEST_BLOCK_SIZE) || !in_virt) {
710*4882a593Smuzhiyun printf("malloc %uByte error!\n", TEST_BLOCK_SIZE);
711*4882a593Smuzhiyun res = -1;
712*4882a593Smuzhiyun goto out;
713*4882a593Smuzhiyun }
714*4882a593Smuzhiyun
715*4882a593Smuzhiyun if (posix_memalign((void *)&out_virt, page_size, TEST_BLOCK_SIZE) || !out_virt) {
716*4882a593Smuzhiyun printf("malloc %uByte error!\n", TEST_BLOCK_SIZE);
717*4882a593Smuzhiyun res = -1;
718*4882a593Smuzhiyun goto out;
719*4882a593Smuzhiyun }
720*4882a593Smuzhiyun
721*4882a593Smuzhiyun if (posix_memalign((void *)&aad_virt, page_size, aad_buff_len) || !aad_virt) {
722*4882a593Smuzhiyun printf("malloc %uByte error!\n", aad_buff_len);
723*4882a593Smuzhiyun res = -1;
724*4882a593Smuzhiyun goto out;
725*4882a593Smuzhiyun }
726*4882a593Smuzhiyun
727*4882a593Smuzhiyun /* Test dma_fd cipher */
728*4882a593Smuzhiyun for (h = 0; h < ARRAY_SIZE(test_item_tbl); h++) {
729*4882a593Smuzhiyun for (j = 0; j < ARRAY_SIZE(test_item_tbl[h].modes); j++) {
730*4882a593Smuzhiyun if (test_item_tbl[h].modes[j] == DATA_BUTT)
731*4882a593Smuzhiyun break;
732*4882a593Smuzhiyun
733*4882a593Smuzhiyun algo = test_item_tbl[h].algo;
734*4882a593Smuzhiyun key_len = test_item_tbl[h].key_len;
735*4882a593Smuzhiyun mode = test_item_tbl[h].modes[j];
736*4882a593Smuzhiyun aad_len = test_item_tbl[h].aad_len;
737*4882a593Smuzhiyun len = test_item_tbl[h].len;
738*4882a593Smuzhiyun
739*4882a593Smuzhiyun if (test_ae_item_tp(false, key_len, algo, mode,
740*4882a593Smuzhiyun in_fd, out_fd, len,
741*4882a593Smuzhiyun aad_fd, aad_len, tag)) {
742*4882a593Smuzhiyun printf("dma_fd:\ttest aead throughput FAILED!!!\n");
743*4882a593Smuzhiyun res = -1;
744*4882a593Smuzhiyun goto out;
745*4882a593Smuzhiyun }
746*4882a593Smuzhiyun }
747*4882a593Smuzhiyun }
748*4882a593Smuzhiyun
749*4882a593Smuzhiyun printf("dma_fd:\ttest aead throughput SUCCESS.\n\n");
750*4882a593Smuzhiyun
751*4882a593Smuzhiyun /* Test virt cipher */
752*4882a593Smuzhiyun for (h = 0; h < ARRAY_SIZE(test_item_tbl); h++) {
753*4882a593Smuzhiyun for (j = 0; j < ARRAY_SIZE(test_item_tbl[h].modes); j++) {
754*4882a593Smuzhiyun if (test_item_tbl[h].modes[j] == DATA_BUTT)
755*4882a593Smuzhiyun break;
756*4882a593Smuzhiyun
757*4882a593Smuzhiyun algo = test_item_tbl[h].algo;
758*4882a593Smuzhiyun key_len = test_item_tbl[h].key_len;
759*4882a593Smuzhiyun mode = test_item_tbl[h].modes[j];
760*4882a593Smuzhiyun aad_len = test_item_tbl[h].aad_len;
761*4882a593Smuzhiyun len = test_item_tbl[h].len;
762*4882a593Smuzhiyun
763*4882a593Smuzhiyun if (test_ae_item_tp(true, key_len, algo, mode,
764*4882a593Smuzhiyun in_virt, out_virt, len,
765*4882a593Smuzhiyun aad_virt, aad_len, tag)) {
766*4882a593Smuzhiyun printf("virt:\ttest aead throughput FAILED!!!\n");
767*4882a593Smuzhiyun res = -1;
768*4882a593Smuzhiyun goto out;
769*4882a593Smuzhiyun }
770*4882a593Smuzhiyun }
771*4882a593Smuzhiyun }
772*4882a593Smuzhiyun
773*4882a593Smuzhiyun printf("virt:\ttest aead throughput SUCCESS.\n\n");
774*4882a593Smuzhiyun
775*4882a593Smuzhiyun out:
776*4882a593Smuzhiyun if (in_fd)
777*4882a593Smuzhiyun rk_crypto_mem_free(in_fd);
778*4882a593Smuzhiyun
779*4882a593Smuzhiyun if (out_fd)
780*4882a593Smuzhiyun rk_crypto_mem_free(out_fd);
781*4882a593Smuzhiyun
782*4882a593Smuzhiyun if (aad_fd)
783*4882a593Smuzhiyun rk_crypto_mem_free(aad_fd);
784*4882a593Smuzhiyun
785*4882a593Smuzhiyun if (in_virt)
786*4882a593Smuzhiyun free(in_virt);
787*4882a593Smuzhiyun
788*4882a593Smuzhiyun if (out_virt)
789*4882a593Smuzhiyun free(out_virt);
790*4882a593Smuzhiyun
791*4882a593Smuzhiyun if (aad_virt)
792*4882a593Smuzhiyun free(aad_virt);
793*4882a593Smuzhiyun
794*4882a593Smuzhiyun rk_crypto_deinit();
795*4882a593Smuzhiyun return res;
796*4882a593Smuzhiyun }
797*4882a593Smuzhiyun
test_hash_item_tp(bool is_virt,bool is_hmac,uint32_t algo,uint32_t blocksize,void * input,uint32_t data_len)798*4882a593Smuzhiyun static int test_hash_item_tp(bool is_virt, bool is_hmac, uint32_t algo,
799*4882a593Smuzhiyun uint32_t blocksize, void *input, uint32_t data_len)
800*4882a593Smuzhiyun {
801*4882a593Smuzhiyun int res = 0;
802*4882a593Smuzhiyun uint32_t data_block = data_len;
803*4882a593Smuzhiyun uint32_t tmp_len;
804*4882a593Smuzhiyun uint8_t hash[64];
805*4882a593Smuzhiyun uint8_t key[MAX_HASH_BLOCK_SIZE];
806*4882a593Smuzhiyun uint8_t *tmp_data;
807*4882a593Smuzhiyun rk_handle hash_hdl = 0;
808*4882a593Smuzhiyun rk_hash_config hash_cfg;
809*4882a593Smuzhiyun uint32_t key_len;
810*4882a593Smuzhiyun struct timespec start, end;
811*4882a593Smuzhiyun uint64_t total_nsec, nsec;
812*4882a593Smuzhiyun uint32_t rounds;
813*4882a593Smuzhiyun
814*4882a593Smuzhiyun nsec = DURATION * 1000000000;
815*4882a593Smuzhiyun
816*4882a593Smuzhiyun if (is_virt)
817*4882a593Smuzhiyun test_get_rng(input, data_len);
818*4882a593Smuzhiyun
819*4882a593Smuzhiyun memset(hash, 0x00, sizeof(hash));
820*4882a593Smuzhiyun
821*4882a593Smuzhiyun memset(&hash_cfg, 0x00, sizeof(hash_cfg));
822*4882a593Smuzhiyun hash_cfg.algo = algo;
823*4882a593Smuzhiyun
824*4882a593Smuzhiyun if (is_hmac) {
825*4882a593Smuzhiyun key_len = blocksize;
826*4882a593Smuzhiyun test_get_rng(key, key_len);
827*4882a593Smuzhiyun hash_cfg.key = key;
828*4882a593Smuzhiyun hash_cfg.key_len = key_len;
829*4882a593Smuzhiyun }
830*4882a593Smuzhiyun
831*4882a593Smuzhiyun total_nsec = 0;
832*4882a593Smuzhiyun rounds = 0;
833*4882a593Smuzhiyun
834*4882a593Smuzhiyun res = rk_hash_init(&hash_cfg, &hash_hdl);
835*4882a593Smuzhiyun if (res) {
836*4882a593Smuzhiyun if (is_virt)
837*4882a593Smuzhiyun printf("virt:\t[%12s]\tN/A\n", test_algo_name(algo));
838*4882a593Smuzhiyun else
839*4882a593Smuzhiyun printf("dma_fd:\t[%12s]\tN/A\n", test_algo_name(algo));
840*4882a593Smuzhiyun return 0;
841*4882a593Smuzhiyun }
842*4882a593Smuzhiyun
843*4882a593Smuzhiyun while (total_nsec < nsec) {
844*4882a593Smuzhiyun clock_gettime(CLOCK_REALTIME, &start);
845*4882a593Smuzhiyun
846*4882a593Smuzhiyun data_block = data_len;
847*4882a593Smuzhiyun
848*4882a593Smuzhiyun if (is_virt) {
849*4882a593Smuzhiyun tmp_len = data_len;
850*4882a593Smuzhiyun tmp_data = input;
851*4882a593Smuzhiyun
852*4882a593Smuzhiyun while (tmp_len) {
853*4882a593Smuzhiyun data_block = tmp_len > data_block ? data_block : tmp_len;
854*4882a593Smuzhiyun
855*4882a593Smuzhiyun res = rk_hash_update_virt(hash_hdl, tmp_data, data_block);
856*4882a593Smuzhiyun if (res) {
857*4882a593Smuzhiyun rk_hash_final(hash_hdl, NULL);
858*4882a593Smuzhiyun printf("rk_hash_update_virt[%lu/%u] error = %d\n",
859*4882a593Smuzhiyun (unsigned long)(tmp_data - (uint8_t *)input), tmp_len, res);
860*4882a593Smuzhiyun goto error;
861*4882a593Smuzhiyun }
862*4882a593Smuzhiyun
863*4882a593Smuzhiyun tmp_len -= data_block;
864*4882a593Smuzhiyun tmp_data += data_block;
865*4882a593Smuzhiyun }
866*4882a593Smuzhiyun } else {
867*4882a593Smuzhiyun res = rk_hash_update(hash_hdl, ((rk_crypto_mem *)input)->dma_fd, data_block);
868*4882a593Smuzhiyun if (res) {
869*4882a593Smuzhiyun rk_hash_final(hash_hdl, NULL);
870*4882a593Smuzhiyun printf("rk_hash_update error = %d\n", res);
871*4882a593Smuzhiyun goto error;
872*4882a593Smuzhiyun }
873*4882a593Smuzhiyun }
874*4882a593Smuzhiyun
875*4882a593Smuzhiyun clock_gettime(CLOCK_REALTIME, &end);
876*4882a593Smuzhiyun total_nsec += (end.tv_sec - start.tv_sec) * 1000000000 +
877*4882a593Smuzhiyun (end.tv_nsec - start.tv_nsec);
878*4882a593Smuzhiyun rounds ++;
879*4882a593Smuzhiyun }
880*4882a593Smuzhiyun
881*4882a593Smuzhiyun res = rk_hash_final(hash_hdl, hash);
882*4882a593Smuzhiyun if (res) {
883*4882a593Smuzhiyun printf("rk_hash_final error = %d\n", res);
884*4882a593Smuzhiyun return -1;
885*4882a593Smuzhiyun }
886*4882a593Smuzhiyun
887*4882a593Smuzhiyun if (is_virt)
888*4882a593Smuzhiyun printf("virt:\t[%12s]\t%dMB/s.\n",
889*4882a593Smuzhiyun test_algo_name(algo), (data_len * rounds / (1024 * 1024)));
890*4882a593Smuzhiyun else
891*4882a593Smuzhiyun printf("dma_fd:\t[%12s]\t%dMB/s.\n",
892*4882a593Smuzhiyun test_algo_name(algo), (data_len * rounds / (1024 * 1024)));
893*4882a593Smuzhiyun
894*4882a593Smuzhiyun return res;
895*4882a593Smuzhiyun error:
896*4882a593Smuzhiyun return res;
897*4882a593Smuzhiyun }
898*4882a593Smuzhiyun
test_hash_tp(void)899*4882a593Smuzhiyun static int test_hash_tp(void)
900*4882a593Smuzhiyun {
901*4882a593Smuzhiyun int res;
902*4882a593Smuzhiyun uint32_t buffer_len = TEST_BLOCK_SIZE;;
903*4882a593Smuzhiyun rk_crypto_mem *input_fd = NULL;
904*4882a593Smuzhiyun uint8_t *input_virt = NULL;
905*4882a593Smuzhiyun uint32_t i;
906*4882a593Smuzhiyun size_t page_size = getpagesize();
907*4882a593Smuzhiyun
908*4882a593Smuzhiyun struct test_hash_item {
909*4882a593Smuzhiyun uint32_t algo;
910*4882a593Smuzhiyun uint32_t blocksize;
911*4882a593Smuzhiyun };
912*4882a593Smuzhiyun
913*4882a593Smuzhiyun static struct test_hash_item test_hash_tbl[] = {
914*4882a593Smuzhiyun {RK_ALGO_MD5, MD5_BLOCK_SIZE},
915*4882a593Smuzhiyun {RK_ALGO_SHA1, SHA1_BLOCK_SIZE},
916*4882a593Smuzhiyun {RK_ALGO_SHA256, SHA256_BLOCK_SIZE},
917*4882a593Smuzhiyun {RK_ALGO_SHA224, SHA224_BLOCK_SIZE},
918*4882a593Smuzhiyun {RK_ALGO_SHA512, SHA512_BLOCK_SIZE},
919*4882a593Smuzhiyun {RK_ALGO_SHA384, SHA384_BLOCK_SIZE},
920*4882a593Smuzhiyun {RK_ALGO_SHA512_224, SHA512_224_BLOCK_SIZE},
921*4882a593Smuzhiyun {RK_ALGO_SHA512_256, SHA512_256_BLOCK_SIZE},
922*4882a593Smuzhiyun {RK_ALGO_SM3, SM3_BLOCK_SIZE},
923*4882a593Smuzhiyun };
924*4882a593Smuzhiyun
925*4882a593Smuzhiyun static struct test_hash_item test_hmac_tbl[] = {
926*4882a593Smuzhiyun {RK_ALGO_HMAC_MD5, MD5_BLOCK_SIZE},
927*4882a593Smuzhiyun {RK_ALGO_HMAC_SHA1, SHA1_BLOCK_SIZE},
928*4882a593Smuzhiyun {RK_ALGO_HMAC_SHA256, SHA256_BLOCK_SIZE},
929*4882a593Smuzhiyun {RK_ALGO_HMAC_SHA512, SHA512_BLOCK_SIZE},
930*4882a593Smuzhiyun {RK_ALGO_HMAC_SM3, SM3_BLOCK_SIZE},
931*4882a593Smuzhiyun };
932*4882a593Smuzhiyun
933*4882a593Smuzhiyun if (rk_crypto_init()) {
934*4882a593Smuzhiyun printf("rk_crypto_init error!\n");
935*4882a593Smuzhiyun return -1;
936*4882a593Smuzhiyun }
937*4882a593Smuzhiyun
938*4882a593Smuzhiyun input_fd = rk_crypto_mem_alloc(buffer_len);
939*4882a593Smuzhiyun if (!input_fd) {
940*4882a593Smuzhiyun printf("rk_crypto_mem_alloc %uByte error!\n", buffer_len);
941*4882a593Smuzhiyun res = -1;
942*4882a593Smuzhiyun goto out;
943*4882a593Smuzhiyun }
944*4882a593Smuzhiyun
945*4882a593Smuzhiyun if (posix_memalign((void *)&input_virt, page_size, TEST_BLOCK_SIZE) || !input_virt) {
946*4882a593Smuzhiyun printf("malloc %uByte error!\n", TEST_BLOCK_SIZE);
947*4882a593Smuzhiyun res = -1;
948*4882a593Smuzhiyun goto out;
949*4882a593Smuzhiyun }
950*4882a593Smuzhiyun
951*4882a593Smuzhiyun /* Test virt hash */
952*4882a593Smuzhiyun for (i = 0; i < ARRAY_SIZE(test_hash_tbl); i++) {
953*4882a593Smuzhiyun res = test_hash_item_tp(true, false, test_hash_tbl[i].algo,
954*4882a593Smuzhiyun test_hash_tbl[i].blocksize, input_virt, buffer_len);
955*4882a593Smuzhiyun if (res) {
956*4882a593Smuzhiyun printf("virt:\ttest hash throughput FAILED!!!\n");
957*4882a593Smuzhiyun goto out;
958*4882a593Smuzhiyun }
959*4882a593Smuzhiyun }
960*4882a593Smuzhiyun
961*4882a593Smuzhiyun printf("virt:\ttest hash throughput SUCCESS.\n\n");
962*4882a593Smuzhiyun
963*4882a593Smuzhiyun /* Test dma_fd hash */
964*4882a593Smuzhiyun for (i = 0; i < ARRAY_SIZE(test_hash_tbl); i++) {
965*4882a593Smuzhiyun res = test_hash_item_tp(false, false, test_hash_tbl[i].algo,
966*4882a593Smuzhiyun test_hash_tbl[i].blocksize, input_fd, buffer_len);
967*4882a593Smuzhiyun if (res) {
968*4882a593Smuzhiyun printf("dma_fd:\ttest hash throughput FAILED!!!\n");
969*4882a593Smuzhiyun goto out;
970*4882a593Smuzhiyun }
971*4882a593Smuzhiyun }
972*4882a593Smuzhiyun
973*4882a593Smuzhiyun printf("dma_fd:\ttest hash throughput SUCCESS.\n\n");
974*4882a593Smuzhiyun
975*4882a593Smuzhiyun /* Test virt hmac */
976*4882a593Smuzhiyun for (i = 0; i < ARRAY_SIZE(test_hmac_tbl); i++) {
977*4882a593Smuzhiyun res = test_hash_item_tp(true, true, test_hmac_tbl[i].algo,
978*4882a593Smuzhiyun test_hmac_tbl[i].blocksize, input_virt, buffer_len);
979*4882a593Smuzhiyun if (res) {
980*4882a593Smuzhiyun printf("virt:\ttest hmac throughput FAILED!!!\n");
981*4882a593Smuzhiyun goto out;
982*4882a593Smuzhiyun }
983*4882a593Smuzhiyun }
984*4882a593Smuzhiyun
985*4882a593Smuzhiyun printf("virt:\ttest hmac throughput SUCCESS.\n\n");
986*4882a593Smuzhiyun
987*4882a593Smuzhiyun /* Test dma_fd hmac */
988*4882a593Smuzhiyun for (i = 0; i < ARRAY_SIZE(test_hmac_tbl); i++) {
989*4882a593Smuzhiyun res = test_hash_item_tp(false, true, test_hmac_tbl[i].algo,
990*4882a593Smuzhiyun test_hmac_tbl[i].blocksize, input_fd, buffer_len);
991*4882a593Smuzhiyun if (res) {
992*4882a593Smuzhiyun printf("dma_fd:\ttest hmac throughput FAILED!!!\n");
993*4882a593Smuzhiyun goto out;
994*4882a593Smuzhiyun }
995*4882a593Smuzhiyun }
996*4882a593Smuzhiyun
997*4882a593Smuzhiyun printf("dma_fd:\ttest hmac throughput SUCCESS.\n\n");
998*4882a593Smuzhiyun
999*4882a593Smuzhiyun out:
1000*4882a593Smuzhiyun if (input_fd)
1001*4882a593Smuzhiyun rk_crypto_mem_free(input_fd);
1002*4882a593Smuzhiyun
1003*4882a593Smuzhiyun if (input_virt)
1004*4882a593Smuzhiyun free(input_virt);
1005*4882a593Smuzhiyun
1006*4882a593Smuzhiyun rk_crypto_deinit();
1007*4882a593Smuzhiyun
1008*4882a593Smuzhiyun return 0;
1009*4882a593Smuzhiyun }
1010*4882a593Smuzhiyun
test_rsa_item_tp(uint32_t nbits)1011*4882a593Smuzhiyun static int test_rsa_item_tp(uint32_t nbits)
1012*4882a593Smuzhiyun {
1013*4882a593Smuzhiyun uint8_t *data_plain = NULL, *data_enc = NULL, *data_dec = NULL;
1014*4882a593Smuzhiyun uint32_t nbytes = nbits / 8;
1015*4882a593Smuzhiyun rk_rsa_pub_key_pack pub_key;
1016*4882a593Smuzhiyun rk_rsa_priv_key_pack priv_key;
1017*4882a593Smuzhiyun struct timespec t1, t2, t3;
1018*4882a593Smuzhiyun uint64_t priv_cost, pub_cost;
1019*4882a593Smuzhiyun uint32_t out_len = 0;
1020*4882a593Smuzhiyun RK_RES res;
1021*4882a593Smuzhiyun
1022*4882a593Smuzhiyun data_plain = malloc(nbytes);
1023*4882a593Smuzhiyun if (!data_plain) {
1024*4882a593Smuzhiyun printf("malloc data_plain %uByte error!\n", nbytes);
1025*4882a593Smuzhiyun res = RK_CRYPTO_ERR_OUT_OF_MEMORY;
1026*4882a593Smuzhiyun goto exit;
1027*4882a593Smuzhiyun }
1028*4882a593Smuzhiyun
1029*4882a593Smuzhiyun data_enc = malloc(nbytes);
1030*4882a593Smuzhiyun if (!data_enc) {
1031*4882a593Smuzhiyun printf("malloc data_enc %uByte error!\n", nbytes);
1032*4882a593Smuzhiyun res = RK_CRYPTO_ERR_OUT_OF_MEMORY;
1033*4882a593Smuzhiyun goto exit;
1034*4882a593Smuzhiyun }
1035*4882a593Smuzhiyun
1036*4882a593Smuzhiyun data_dec = malloc(nbytes);
1037*4882a593Smuzhiyun if (!data_dec) {
1038*4882a593Smuzhiyun printf("malloc data_dec %uByte error!\n", nbytes);
1039*4882a593Smuzhiyun res = RK_CRYPTO_ERR_OUT_OF_MEMORY;
1040*4882a593Smuzhiyun goto exit;
1041*4882a593Smuzhiyun }
1042*4882a593Smuzhiyun
1043*4882a593Smuzhiyun res = rk_get_random(data_plain, nbytes);
1044*4882a593Smuzhiyun if (res) {
1045*4882a593Smuzhiyun printf("failed to get random data.");
1046*4882a593Smuzhiyun goto exit;
1047*4882a593Smuzhiyun }
1048*4882a593Smuzhiyun
1049*4882a593Smuzhiyun /* make sure data_plain is less than n */
1050*4882a593Smuzhiyun data_plain[0] = 0x00;
1051*4882a593Smuzhiyun
1052*4882a593Smuzhiyun memset(data_enc, 0x00, nbytes);
1053*4882a593Smuzhiyun
1054*4882a593Smuzhiyun test_init_pubkey(&pub_key, nbits);
1055*4882a593Smuzhiyun test_init_privkey(&priv_key, nbits);
1056*4882a593Smuzhiyun
1057*4882a593Smuzhiyun clock_gettime(CLOCK_REALTIME, &t1);
1058*4882a593Smuzhiyun
1059*4882a593Smuzhiyun res = rk_rsa_priv_encrypt(&priv_key, RK_RSA_CRYPT_PADDING_NONE,
1060*4882a593Smuzhiyun data_plain, nbytes, data_enc, &out_len);
1061*4882a593Smuzhiyun if (res) {
1062*4882a593Smuzhiyun if (res != RK_CRYPTO_ERR_NOT_SUPPORTED)
1063*4882a593Smuzhiyun printf("rk_rsa_priv_encrypt failed %x\n", res);
1064*4882a593Smuzhiyun goto exit;
1065*4882a593Smuzhiyun }
1066*4882a593Smuzhiyun
1067*4882a593Smuzhiyun clock_gettime(CLOCK_REALTIME, &t2);
1068*4882a593Smuzhiyun
1069*4882a593Smuzhiyun res = rk_rsa_pub_decrypt(&pub_key, RK_RSA_CRYPT_PADDING_NONE,
1070*4882a593Smuzhiyun data_enc, out_len, data_dec, &out_len);
1071*4882a593Smuzhiyun if (res) {
1072*4882a593Smuzhiyun printf("rk_rsa_pub_decrypt failed %x\n", res);
1073*4882a593Smuzhiyun goto exit;
1074*4882a593Smuzhiyun }
1075*4882a593Smuzhiyun
1076*4882a593Smuzhiyun clock_gettime(CLOCK_REALTIME, &t3);
1077*4882a593Smuzhiyun
1078*4882a593Smuzhiyun if (nbytes != out_len || memcmp(data_dec, data_plain, nbytes)) {
1079*4882a593Smuzhiyun printf("rk_rsa_pub_decrypt compare failed\n");
1080*4882a593Smuzhiyun test_dump_hex("result", data_dec, out_len);
1081*4882a593Smuzhiyun test_dump_hex("expect", data_plain, nbytes);
1082*4882a593Smuzhiyun res = RK_CRYPTO_ERR_GENERIC;
1083*4882a593Smuzhiyun goto exit;
1084*4882a593Smuzhiyun }
1085*4882a593Smuzhiyun
1086*4882a593Smuzhiyun priv_cost = (t2.tv_sec - t1.tv_sec) * 1000000000 +
1087*4882a593Smuzhiyun (t2.tv_nsec - t1.tv_nsec);
1088*4882a593Smuzhiyun
1089*4882a593Smuzhiyun pub_cost = (t3.tv_sec - t2.tv_sec) * 1000000000 +
1090*4882a593Smuzhiyun (t3.tv_nsec - t2.tv_nsec);
1091*4882a593Smuzhiyun
1092*4882a593Smuzhiyun
1093*4882a593Smuzhiyun printf("virt:\t[RSA-%u]\tPRIV\tENCRYPT\t%lums.\n",
1094*4882a593Smuzhiyun nbits, (unsigned long)(priv_cost / 1000000));
1095*4882a593Smuzhiyun
1096*4882a593Smuzhiyun printf("virt:\t[RSA-%u]\tPUB\tDECRYPT\t%lums.\n",
1097*4882a593Smuzhiyun nbits, (unsigned long)(pub_cost / 1000000));
1098*4882a593Smuzhiyun
1099*4882a593Smuzhiyun exit:
1100*4882a593Smuzhiyun if (data_plain)
1101*4882a593Smuzhiyun free(data_plain);
1102*4882a593Smuzhiyun
1103*4882a593Smuzhiyun if (data_enc)
1104*4882a593Smuzhiyun free(data_enc);
1105*4882a593Smuzhiyun
1106*4882a593Smuzhiyun if (data_dec)
1107*4882a593Smuzhiyun free(data_dec);
1108*4882a593Smuzhiyun
1109*4882a593Smuzhiyun return (res == RK_CRYPTO_SUCCESS) ? 0 : -1;
1110*4882a593Smuzhiyun }
1111*4882a593Smuzhiyun
test_rsa_tp(void)1112*4882a593Smuzhiyun static int test_rsa_tp(void)
1113*4882a593Smuzhiyun {
1114*4882a593Smuzhiyun int res;
1115*4882a593Smuzhiyun uint32_t i;
1116*4882a593Smuzhiyun uint32_t rsa_bits_tbl[] = {
1117*4882a593Smuzhiyun RSA_BITS_1024,
1118*4882a593Smuzhiyun RSA_BITS_2048,
1119*4882a593Smuzhiyun RSA_BITS_3072,
1120*4882a593Smuzhiyun RSA_BITS_4096,
1121*4882a593Smuzhiyun };
1122*4882a593Smuzhiyun
1123*4882a593Smuzhiyun if (rk_crypto_init()) {
1124*4882a593Smuzhiyun printf("rk_crypto_init error!\n");
1125*4882a593Smuzhiyun return -1;
1126*4882a593Smuzhiyun }
1127*4882a593Smuzhiyun
1128*4882a593Smuzhiyun for (i = 0; i < ARRAY_SIZE(rsa_bits_tbl); i++) {
1129*4882a593Smuzhiyun res = test_rsa_item_tp(rsa_bits_tbl[i]);
1130*4882a593Smuzhiyun if (res) {
1131*4882a593Smuzhiyun printf("test rsa-%u throughput FAIL.\n\n", rsa_bits_tbl[i]);
1132*4882a593Smuzhiyun goto out;
1133*4882a593Smuzhiyun }
1134*4882a593Smuzhiyun }
1135*4882a593Smuzhiyun
1136*4882a593Smuzhiyun printf("test rsa throughput SUCCESS.\n\n");
1137*4882a593Smuzhiyun
1138*4882a593Smuzhiyun out:
1139*4882a593Smuzhiyun rk_crypto_deinit();
1140*4882a593Smuzhiyun
1141*4882a593Smuzhiyun return 0;
1142*4882a593Smuzhiyun }
1143*4882a593Smuzhiyun
test_throughput(void)1144*4882a593Smuzhiyun RK_RES test_throughput(void)
1145*4882a593Smuzhiyun {
1146*4882a593Smuzhiyun if (test_otp_key_tp())
1147*4882a593Smuzhiyun printf("Test otp key throughput FAILED.\n\n");
1148*4882a593Smuzhiyun
1149*4882a593Smuzhiyun if (test_cipher_tp())
1150*4882a593Smuzhiyun printf("Test cipher throughput FAILED.\n\n");
1151*4882a593Smuzhiyun
1152*4882a593Smuzhiyun if (test_ae_tp())
1153*4882a593Smuzhiyun printf("Test ae throughput FAILED.\n\n");
1154*4882a593Smuzhiyun
1155*4882a593Smuzhiyun if (test_hash_tp())
1156*4882a593Smuzhiyun printf("Test hash throughput FAILED.\n\n");
1157*4882a593Smuzhiyun
1158*4882a593Smuzhiyun if (test_rsa_tp())
1159*4882a593Smuzhiyun printf("Test rsa throughput FAILED.\n\n");
1160*4882a593Smuzhiyun
1161*4882a593Smuzhiyun printf("Test throughput SUCCESS.\n");
1162*4882a593Smuzhiyun
1163*4882a593Smuzhiyun return RK_CRYPTO_SUCCESS;
1164*4882a593Smuzhiyun }
1165