This was used to test the async AES algo. trcypt is working as well but does enqueue that much :-) Signed-off-by: Sebastian Siewior <sebastian@xxxxxxxxxxxxx> --- a/crypto/Kconfig +++ b/crypto/Kconfig @@ -468,6 +468,12 @@ config CRYPTO_TEST help Quick & dirty crypto test module. +config CRYPTO_LIMI_SPEED_ASYNC + tristate "Crypto algorithm speed test with msec resolution" + help + insmod/modprobe the module, and watch dmesg for results. + Test is for aes only, see modinfo for options + source "drivers/crypto/Kconfig" endif # if CRYPTO --- a/crypto/Makefile +++ b/crypto/Makefile @@ -50,6 +50,7 @@ obj-$(CONFIG_CRYPTO_MICHAEL_MIC) += mich obj-$(CONFIG_CRYPTO_CRC32C) += crc32c.o obj-$(CONFIG_CRYPTO_TEST) += tcrypt.o +obj-$(CONFIG_CRYPTO_LIMI_SPEED_ASYNC) += limi-speeda.o # # generic algorithms and the async_tx api --- /dev/null +++ b/crypto/limi-speeda.c @@ -0,0 +1,191 @@ +/* + * Code derived von crypt/tcrypt.h + * + * Small speed test with time resolution in msec. + * Author: Sebastian Siewior (sebastian _at_ breakpoint.cc) + * License: GPL v2 + */ + +#include <linux/module.h> +#include <linux/moduleparam.h> +#include <linux/scatterlist.h> +#include <linux/crypto.h> +#include <linux/jiffies.h> +#include <linux/types.h> +#include <linux/err.h> + +static unsigned int buff_size = 16 * 1024; +module_param(buff_size, uint, 0444); +MODULE_PARM_DESC(buff_size, "Buffer allocated by kmalloc()"); + +static unsigned int keylen = 16; +module_param(keylen, uint, 0444); +MODULE_PARM_DESC(keylen, "Length of the key (16,24 or 32 bits"); + +static unsigned int mode = 0; +module_param(mode, uint, 0444); +MODULE_PARM_DESC(mode, "0 -> encryption else decryption"); + +static unsigned int big_loops = 10; +module_param(big_loops, uint, 0444); +MODULE_PARM_DESC(big_loops, "Number of mensurations."); + +static unsigned int small_loops = 10000; +module_param(small_loops, uint, 0444); +MODULE_PARM_DESC(small_loops, "loops within one mesurement."); + +static unsigned int alg = 1; +module_param(alg, uint, 0444); +MODULE_PARM_DESC(alg, "0 -> ecb(aes), else -> cbc(aes)"); + +static atomic_t req_pending; + +static void request_complete(struct crypto_async_request *req, int err) +{ + wait_queue_head_t *complete_wq = req->data; + struct ablkcipher_request *ablk_req = ablkcipher_request_cast(req); + + atomic_dec(&req_pending); + ablkcipher_request_free(ablk_req); + wake_up_all(complete_wq); +} + +static int __init init(void) +{ + struct scatterlist sg[1]; + unsigned char iv[16]; + struct crypto_ablkcipher *tfm; + static char *in; + unsigned int i; + unsigned int ret; + unsigned long start, end; + unsigned long total = 0; + unsigned long size_kb; + unsigned char key[32] = { 1, 2, 3, 4, 5, 6 }; + const unsigned char *algname; + struct ablkcipher_request *ablk_req = NULL; + wait_queue_head_t complete_wq; + DEFINE_WAIT(wait_for_request); + + algname = alg ? "cbc(aes)" : "ecb(aes)"; + printk("Limi-speed: %s buff_size: %u, keylen: %d, mode: %s\n", algname, buff_size, keylen, + mode ? "decryption" : "encryption"); + printk("loops: %d, iterations: %d, ", big_loops, small_loops); + size_kb = small_loops * buff_size / 1024; + printk("=> %lu kb or %lu mb a loop\n", size_kb, size_kb/1024); + + if (keylen != 16 && keylen != 24 && keylen != 32) { + printk("Invalid keysize\n"); + return -EINVAL; + } + + in = kmalloc(buff_size, GFP_KERNEL); + if (in == NULL) { + printk("Failed to allocate memory.\n"); + return -ENOMEM; + } + printk("'Alloc' in %d @%p\n", buff_size, in); + memset(in, 0x24, buff_size); + sg_set_buf(sg, in, buff_size); + + tfm = crypto_alloc_ablkcipher(algname, 0, 0 /* CRYPTO_ALG_ASYNC */); + + if (IS_ERR(tfm)) { + printk("failed to load transform for %s: %ld\n", algname, PTR_ERR(tfm)); + goto leave; + } + + ret = crypto_ablkcipher_setkey(tfm, key, keylen); + if (ret) { + printk("setkey() failed\n"); + goto out_tfm; + } + + init_waitqueue_head(&complete_wq); + atomic_set(&req_pending, 0); + + for (i=0 ; i<big_loops; i++) { + int j; + ret = 0; + start = jiffies; + + for (j=0; j < small_loops; j++) { + while (1) { + + prepare_to_wait(&complete_wq, &wait_for_request, TASK_INTERRUPTIBLE); + ablk_req = ablkcipher_request_alloc(tfm, GFP_KERNEL); + if (likely(ablk_req)) + break; + printk("ablkcipher_request_alloc() failed\n"); + schedule(); + } + atomic_inc(&req_pending); + + ablkcipher_request_set_callback(ablk_req, CRYPTO_TFM_REQ_MAY_BACKLOG, request_complete, &complete_wq); + ablkcipher_request_set_crypt(ablk_req, sg, sg, buff_size, &iv); + + if (!mode) + ret = crypto_ablkcipher_encrypt(ablk_req); + else + ret = crypto_ablkcipher_decrypt(ablk_req); + + if (unlikely(ret == -EBUSY)) { + schedule(); + + } else if (unlikely(ret == 0)) { + printk("Process in SYNC mode, this is not cool\n"); + ablkcipher_request_free(ablk_req); + goto out_tfm; + } else if (unlikely(ret != -EINPROGRESS)) { + printk("encryption failed: %d after (i,j) (%u,%u) iterations\n", ret, i, j); + ablkcipher_request_free(ablk_req); + goto out_tfm; + } + + if (signal_pending(current)) { + printk("signal catched\n"); + break; + } + + } + + while (1) { +//clean_up_exit: + prepare_to_wait(&complete_wq, &wait_for_request, TASK_INTERRUPTIBLE); + if (atomic_read(&req_pending) == 0) + break; + schedule(); + } + + end = jiffies; + finish_wait(&complete_wq, &wait_for_request); + + if ( !time_after(start, end)) { + printk("Run: %u msec\n", jiffies_to_msecs(end - start)); + total += jiffies_to_msecs(end - start); + } else { + printk("Run: %u msec\n", jiffies_to_msecs(start - end)); + total += jiffies_to_msecs(start - end); + } + if (signal_pending(current)) + break; + } + + total /= big_loops; + size_kb *= 1000; + size_kb /= total; + printk("Average: %lu msec, approx. %lu kb/sec || %lu mb/sec \n", total, + size_kb, size_kb/1024); +out_tfm: + crypto_free_ablkcipher(tfm); +leave: + kfree(in); + return -ENODEV; +} + +static void __exit fini(void) { } + +module_init(init); +module_exit(fini); + +MODULE_LICENSE("GPL"); -- - To unsubscribe from this list: send the line "unsubscribe linux-crypto" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html