Received: by 2002:a05:6358:1087:b0:cb:c9d3:cd90 with SMTP id j7csp5805rwi; Wed, 12 Oct 2022 15:04:08 -0700 (PDT) X-Google-Smtp-Source: AMsMyM7k+NnKUSGLfBLXOoS7AXgR7+mIKWZma2uFcmn+66g4+FZXp4MofXry32mGMxftt/H/ZylG X-Received: by 2002:a17:907:2cd8:b0:78e:7fe:a38f with SMTP id hg24-20020a1709072cd800b0078e07fea38fmr624615ejc.632.1665612247923; Wed, 12 Oct 2022 15:04:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1665612247; cv=none; d=google.com; s=arc-20160816; b=NbhyEQuQ22D/701zW8qedUz0Vpa/WFhar96WQG8yulKoC13sY5cHH8DITFwIXPwlQ8 cCZcyq0wVVuf5JqjVTIMIKYk4rwYZT6KwtgN7NtUVDDBP36HEfyIzN3TFA2Z0ppDX/DO V6q2nOj+hSQW9ckEGDzLWVwDPbhpvvh7VaWMwChXVhMANqxkfiwcfv3fyxBMZazDPDIm 3Mjf3rE7GIvcZIrfKWP6i2jKzozP/9XeXSxXer8jeW8kKErJfudVI6pMoQ6CR9PrCv/w wrtq7Y78X2PNsrUJhYS2iNL716z1P6m9gDvAO65kR4Iu8AVI84sXeEw0h3XLLlK4tW39 DvHw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=ieDB45JQqpAn8o0cFOMeE/nL1kcgeiYxQWZKC81F9j4=; b=VlIvgSqRETA+Q6qL9gJD7SUEEZr9FoGuRdxGin0zzher8nm5Dsh6NwkXn2vFWkad09 juh9GPix8M7yv7U61gEVaqo80Y05unCtjQwTDO93atdUhKvSpq0aQDMVyLOKoJDRBd9D y1WN2RQxZNhh1UWm8lUPXrA/ezRIT8JqOVRbXc/ppQvSRWkFhVFVy4Z37+Re/WwQXwnH Ke6vqoyeGVhGrhCVeCLIUXI0wv3T11SMTDkl5VTToCn0/nsqP/gmUvGeR00W0flzITPs qr++zZfzLTbc+d3qDV/TKtoEQwhQ15mlqbo510YoMZkTSx/lp+1t1R0GxXCnD4deGQq5 NqTw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@hpe.com header.s=pps0720 header.b=fsyctmOy; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=hpe.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 25-20020a508e19000000b0045c645405bdsi5484931edw.240.2022.10.12.15.03.42; Wed, 12 Oct 2022 15:04:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@hpe.com header.s=pps0720 header.b=fsyctmOy; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=hpe.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229955AbiJLWAW (ORCPT + 99 others); Wed, 12 Oct 2022 18:00:22 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37774 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229910AbiJLWAN (ORCPT ); Wed, 12 Oct 2022 18:00:13 -0400 Received: from mx0b-002e3701.pphosted.com (mx0b-002e3701.pphosted.com [148.163.143.35]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1C63B29836; Wed, 12 Oct 2022 15:00:08 -0700 (PDT) Received: from pps.filterd (m0134425.ppops.net [127.0.0.1]) by mx0b-002e3701.pphosted.com (8.17.1.5/8.17.1.5) with ESMTP id 29CL7PBG016325; Wed, 12 Oct 2022 21:59:44 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hpe.com; h=from : to : cc : subject : date : message-id : in-reply-to : references : mime-version : content-transfer-encoding; s=pps0720; bh=ieDB45JQqpAn8o0cFOMeE/nL1kcgeiYxQWZKC81F9j4=; b=fsyctmOy/FYzK3XyIUb8Si33A4BcMpuF9C67VH44qcpSAcuIn4pcet+hyATkTV7j28pE OFVippZ56La6QNVD03Pnxz6K0LHJ1IxrBZpK2UP7gUUB49RBEYP5WJkRvm9asm92yZ1x qR6Wc/YtK2gIhxfM6c9yNsl/u7+XIsp7608Qg2OHSLP7vRHtXUp5DG6bEcLl8msPt6Mt q9EKIg5pRWClv/eYKV4E0KDFITFi9AYzo6BO6cm+BI78Rbk/os3OoAk/AfiuJIZfeY06 unw02LnhGLPj51ENwgjOoHEalmXVVqPxPvVIvhNI0i7jWA+hUThLS0xkgiNO+fvhQ7GU mw== Received: from p1lg14878.it.hpe.com (p1lg14878.it.hpe.com [16.230.97.204]) by mx0b-002e3701.pphosted.com (PPS) with ESMTPS id 3k657c8a86-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 12 Oct 2022 21:59:44 +0000 Received: from p1lg14885.dc01.its.hpecorp.net (unknown [10.119.18.236]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by p1lg14878.it.hpe.com (Postfix) with ESMTPS id 93BE21395E; Wed, 12 Oct 2022 21:59:43 +0000 (UTC) Received: from adevxp033-sys.us.rdlabs.hpecorp.net (unknown [16.231.227.36]) by p1lg14885.dc01.its.hpecorp.net (Postfix) with ESMTP id 2AF43806B7E; Wed, 12 Oct 2022 21:59:43 +0000 (UTC) From: Robert Elliott To: herbert@gondor.apana.org.au, davem@davemloft.net, tim.c.chen@linux.intel.com, ap420073@gmail.com, ardb@kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Cc: Robert Elliott Subject: [PATCH v2 01/19] crypto: tcrypt - test crc32 Date: Wed, 12 Oct 2022 16:59:13 -0500 Message-Id: <20221012215931.3896-2-elliott@hpe.com> X-Mailer: git-send-email 2.37.3 In-Reply-To: <20221012215931.3896-1-elliott@hpe.com> References: <20221006223151.22159-1-elliott@hpe.com> <20221012215931.3896-1-elliott@hpe.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Proofpoint-ORIG-GUID: M8yLfQztDkfGvUQlwxTk7O468trsTZRl X-Proofpoint-GUID: M8yLfQztDkfGvUQlwxTk7O468trsTZRl X-HPE-SCL: -1 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.895,Hydra:6.0.545,FMLib:17.11.122.1 definitions=2022-10-12_11,2022-10-12_01,2022-06-22_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 clxscore=1015 impostorscore=0 suspectscore=0 bulkscore=0 adultscore=0 phishscore=0 spamscore=0 malwarescore=0 lowpriorityscore=0 mlxscore=0 mlxlogscore=943 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2209130000 definitions=main-2210120138 X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW, SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Add self-test and speed tests for crc32, paralleling those offered for crc32c and crct10dif. Signed-off-by: Robert Elliott --- crypto/tcrypt.c | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/crypto/tcrypt.c b/crypto/tcrypt.c index a82679b576bb..4426386dfb42 100644 --- a/crypto/tcrypt.c +++ b/crypto/tcrypt.c @@ -1711,6 +1711,10 @@ static int do_test(const char *alg, u32 type, u32 mask, int m, u32 num_mb) ret += tcrypt_test("gcm(aria)"); break; + case 59: + ret += tcrypt_test("crc32"); + break; + case 100: ret += tcrypt_test("hmac(md5)"); break; @@ -2317,6 +2321,10 @@ static int do_test(const char *alg, u32 type, u32 mask, int m, u32 num_mb) generic_hash_speed_template); if (mode > 300 && mode < 400) break; fallthrough; + case 329: + test_hash_speed("crc32", sec, generic_hash_speed_template); + if (mode > 300 && mode < 400) break; + fallthrough; case 399: break; -- 2.37.3