This has been used for performance testing of my aes altivec code. Signed-off-by: Sebastian Siewior Index: linux/crypto/limi-speed.c =================================================================== --- /dev/null +++ linux/crypto/limi-speed.c @@ -0,0 +1,140 @@ +/* + * Code derived von crypt/tcrypt.h + * + * Small speed test with time resolution in msec. + * Author: Sebastian Siewior (bigeasy _at_ breakpoint.cc) + * License: GPL v2 + */ + +#include +#include +#include +#include +#include +#include + +static char *in; + +static unsigned int buff_size = 16 * 1024; +module_param(buff_size, uint, 0444); +MODULE_PARM_DESC(buff_size, "Buffer allocated by kmalloc()"); + +static unsigned int keylen = 16; +module_param(keylen, uint, 0444); +MODULE_PARM_DESC(keylen, "Length of the key (16,24 or 32 bits"); + +static unsigned int mode = 0; +module_param(mode, uint, 0444); +MODULE_PARM_DESC(mode, "0 -> encryption else decryption"); + +static unsigned int big_loops = 10; +module_param(big_loops, uint, 0444); +MODULE_PARM_DESC(big_loops, "Number of mensurations."); + +static unsigned int small_loops = 10000; +module_param(small_loops, uint, 0444); +MODULE_PARM_DESC(small_loops, "loops within one mesurement."); + +static unsigned int alg = 1; +module_param(alg, uint, 0444); +MODULE_PARM_DESC(alg, "0 -> ecb(aes), else -> cbc(aes)"); + +static int __init init(void) +{ + struct scatterlist sg[1]; + struct crypto_blkcipher *tfm; + struct blkcipher_desc desc; + unsigned int i; + unsigned int ret; + unsigned int iv_len; + unsigned long start, end; + unsigned long total = 0; + unsigned long size_kb; + unsigned char key[32] = { 1, 2, 3, 4, 5, 6 }; + const unsigned char *algname; + + algname = alg ? "cbc(aes)" : "ecb(aes)"; + printk("Limi-speed: %s buff_size: %u, keylen: %d, mode: %s\n", algname, buff_size, keylen, + mode ? "decryption" : "encryption"); + printk("loops: %d, iterations: %d, ", big_loops, small_loops); + size_kb = small_loops * buff_size / 1024; + printk("=> %lu kb or %lu mb a loop\n", size_kb, size_kb/1024); + + if (keylen != 16 && keylen != 24 && keylen != 32) { + printk("Invalid keysize\n"); + return -EINVAL; + } + + in = kmalloc(buff_size, GFP_KERNEL); + if (in == NULL) { + printk("Failed to allocate memory.\n"); + return -ENOMEM; + } + + memset(in, 0x24, buff_size); + + sg_set_buf(sg, in, buff_size); + + tfm = crypto_alloc_blkcipher(algname, 0, CRYPTO_ALG_ASYNC); + + if (IS_ERR(tfm)) { + printk("failed to load transform for %s: %ld\n", algname, PTR_ERR(tfm)); + goto leave; + } + + crypto_blkcipher_setkey(tfm, key, keylen); + + iv_len = crypto_blkcipher_ivsize(tfm); + if (iv_len) + crypto_blkcipher_set_iv(tfm, in, iv_len); + + desc.tfm = tfm; + desc.flags = 0; + + for (i=0 ; i