This was used to test the async AES algo. trcypt is working as well but does
enqueue that much :-)

Signed-off-by: Sebastian Siewior <[EMAIL PROTECTED]>
--- a/crypto/Kconfig
+++ b/crypto/Kconfig
@@ -468,6 +468,12 @@ config CRYPTO_TEST
        help
          Quick & dirty crypto test module.
 
+config CRYPTO_LIMI_SPEED_ASYNC
+       tristate "Crypto algorithm speed test with msec resolution"
+       help
+         insmod/modprobe the module, and watch dmesg for results.
+         Test is for aes only, see modinfo for options
+
 source "drivers/crypto/Kconfig"
 
 endif  # if CRYPTO
--- a/crypto/Makefile
+++ b/crypto/Makefile
@@ -50,6 +50,7 @@ obj-$(CONFIG_CRYPTO_MICHAEL_MIC) += mich
 obj-$(CONFIG_CRYPTO_CRC32C) += crc32c.o
 
 obj-$(CONFIG_CRYPTO_TEST) += tcrypt.o
+obj-$(CONFIG_CRYPTO_LIMI_SPEED_ASYNC) += limi-speeda.o
 
 #
 # generic algorithms and the async_tx api
--- /dev/null
+++ b/crypto/limi-speeda.c
@@ -0,0 +1,191 @@
+/*
+ * Code derived von crypt/tcrypt.h
+ *
+ * Small speed test with time resolution in msec.
+ * Author: Sebastian Siewior (sebastian _at_ breakpoint.cc)
+ * License: GPL v2
+ */
+
+#include <linux/module.h>
+#include <linux/moduleparam.h>
+#include <linux/scatterlist.h>
+#include <linux/crypto.h>
+#include <linux/jiffies.h>
+#include <linux/types.h>
+#include <linux/err.h>
+
+static unsigned int buff_size = 16 * 1024;
+module_param(buff_size, uint, 0444);
+MODULE_PARM_DESC(buff_size, "Buffer allocated by kmalloc()");
+
+static unsigned int keylen = 16;
+module_param(keylen, uint, 0444);
+MODULE_PARM_DESC(keylen, "Length of the key (16,24 or 32 bits");
+
+static unsigned int mode = 0;
+module_param(mode, uint, 0444);
+MODULE_PARM_DESC(mode, "0 -> encryption else decryption");
+
+static unsigned int big_loops = 10;
+module_param(big_loops, uint, 0444);
+MODULE_PARM_DESC(big_loops, "Number of mensurations.");
+
+static unsigned int small_loops = 10000;
+module_param(small_loops, uint, 0444);
+MODULE_PARM_DESC(small_loops, "loops within one mesurement.");
+
+static unsigned int alg = 1;
+module_param(alg, uint, 0444);
+MODULE_PARM_DESC(alg, "0 -> ecb(aes), else -> cbc(aes)");
+
+static atomic_t req_pending;
+
+static void request_complete(struct crypto_async_request *req, int err)
+{
+       wait_queue_head_t *complete_wq = req->data;
+       struct ablkcipher_request *ablk_req = ablkcipher_request_cast(req);
+
+       atomic_dec(&req_pending);
+       ablkcipher_request_free(ablk_req);
+       wake_up_all(complete_wq);
+}
+
+static int __init init(void)
+{
+       struct scatterlist sg[1];
+       unsigned char iv[16];
+       struct crypto_ablkcipher *tfm;
+       static char *in;
+       unsigned int i;
+       unsigned int ret;
+       unsigned long start, end;
+       unsigned long total = 0;
+       unsigned long size_kb;
+       unsigned char key[32] = { 1, 2, 3, 4, 5, 6 };
+       const unsigned char *algname;
+       struct ablkcipher_request *ablk_req = NULL;
+       wait_queue_head_t complete_wq;
+       DEFINE_WAIT(wait_for_request);
+
+       algname = alg ? "cbc(aes)" : "ecb(aes)";
+       printk("Limi-speed: %s buff_size: %u, keylen: %d, mode: %s\n", algname, 
buff_size, keylen,
+                       mode ? "decryption" : "encryption");
+       printk("loops: %d, iterations: %d, ", big_loops, small_loops);
+       size_kb = small_loops * buff_size / 1024;
+       printk("=> %lu kb or %lu mb a loop\n", size_kb, size_kb/1024);
+
+       if (keylen != 16 && keylen != 24 && keylen != 32) {
+               printk("Invalid keysize\n");
+               return -EINVAL;
+       }
+
+       in = kmalloc(buff_size, GFP_KERNEL);
+       if (in == NULL) {
+               printk("Failed to allocate memory.\n");
+               return -ENOMEM;
+       }
+       printk("'Alloc' in %d @%p\n", buff_size, in);
+       memset(in, 0x24, buff_size);
+       sg_set_buf(sg, in, buff_size);
+
+       tfm = crypto_alloc_ablkcipher(algname, 0, 0 /* CRYPTO_ALG_ASYNC */);
+
+       if (IS_ERR(tfm)) {
+               printk("failed to load transform for %s: %ld\n", algname, 
PTR_ERR(tfm));
+               goto leave;
+       }
+
+       ret = crypto_ablkcipher_setkey(tfm, key, keylen);
+       if (ret) {
+               printk("setkey() failed\n");
+               goto out_tfm;
+       }
+
+       init_waitqueue_head(&complete_wq);
+       atomic_set(&req_pending, 0);
+
+       for (i=0 ; i<big_loops; i++) {
+               int j;
+               ret = 0;
+               start = jiffies;
+
+               for (j=0; j < small_loops; j++) {
+                       while (1) {
+
+                               prepare_to_wait(&complete_wq, 
&wait_for_request, TASK_INTERRUPTIBLE);
+                               ablk_req = ablkcipher_request_alloc(tfm, 
GFP_KERNEL);
+                               if (likely(ablk_req))
+                                       break;
+                               printk("ablkcipher_request_alloc() failed\n");
+                               schedule();
+                       }
+                       atomic_inc(&req_pending);
+
+                       ablkcipher_request_set_callback(ablk_req, 
CRYPTO_TFM_REQ_MAY_BACKLOG, request_complete, &complete_wq);
+                       ablkcipher_request_set_crypt(ablk_req, sg, sg, 
buff_size, &iv);
+
+                       if (!mode)
+                               ret = crypto_ablkcipher_encrypt(ablk_req);
+                       else
+                               ret = crypto_ablkcipher_decrypt(ablk_req);
+
+                       if (unlikely(ret == -EBUSY)) {
+                               schedule();
+
+                       } else if (unlikely(ret == 0)) {
+                               printk("Process in SYNC mode, this is not 
cool\n");
+                               ablkcipher_request_free(ablk_req);
+                               goto out_tfm;
+                       } else if (unlikely(ret != -EINPROGRESS)) {
+                               printk("encryption failed: %d after (i,j) 
(%u,%u) iterations\n", ret, i, j);
+                               ablkcipher_request_free(ablk_req);
+                               goto out_tfm;
+                       }
+
+                       if (signal_pending(current)) {
+                               printk("signal catched\n");
+                               break;
+                       }
+
+               }
+
+               while (1) {
+//clean_up_exit:
+                       prepare_to_wait(&complete_wq, &wait_for_request, 
TASK_INTERRUPTIBLE);
+                       if (atomic_read(&req_pending) == 0)
+                               break;
+                       schedule();
+               }
+
+               end = jiffies;
+               finish_wait(&complete_wq, &wait_for_request);
+
+               if ( !time_after(start, end)) {
+                       printk("Run: %u msec\n", jiffies_to_msecs(end - start));
+                       total += jiffies_to_msecs(end - start);
+               } else {
+                       printk("Run: %u msec\n", jiffies_to_msecs(start - end));
+                       total += jiffies_to_msecs(start - end);
+               }
+               if (signal_pending(current))
+                       break;
+       }
+
+       total /= big_loops;
+       size_kb *= 1000;
+       size_kb /= total;
+       printk("Average: %lu msec, approx. %lu kb/sec || %lu mb/sec  \n", total,
+                       size_kb, size_kb/1024);
+out_tfm:
+       crypto_free_ablkcipher(tfm);
+leave:
+       kfree(in);
+       return -ENODEV;
+}
+
+static void __exit fini(void) { }
+
+module_init(init);
+module_exit(fini);
+
+MODULE_LICENSE("GPL");

-- 

-
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to