From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mtagate6.uk.ibm.com (mtagate6.uk.ibm.com [195.212.29.139]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "mtagate6.uk.ibm.com", Issuer "Equifax" (verified OK)) by ozlabs.org (Postfix) with ESMTP id 29B8CDDEC6 for ; Tue, 17 Apr 2007 22:24:06 +1000 (EST) Received: from d06nrmr1407.portsmouth.uk.ibm.com (d06nrmr1407.portsmouth.uk.ibm.com [9.149.38.185]) by mtagate6.uk.ibm.com (8.13.8/8.13.8) with ESMTP id l3HCO1ZN320462 for ; Tue, 17 Apr 2007 12:24:01 GMT Received: from d06av03.portsmouth.uk.ibm.com (d06av03.portsmouth.uk.ibm.com [9.149.37.213]) by d06nrmr1407.portsmouth.uk.ibm.com (8.13.8/8.13.8/NCO v8.3) with ESMTP id l3HCO1WG2551966 for ; Tue, 17 Apr 2007 13:24:01 +0100 Received: from d06av03.portsmouth.uk.ibm.com (loopback [127.0.0.1]) by d06av03.portsmouth.uk.ibm.com (8.12.11.20060308/8.13.3) with ESMTP id l3HCO1R9025754 for ; Tue, 17 Apr 2007 13:24:01 +0100 Received: from [9.152.237.70] (dyn-9-152-237-70.boeblingen.de.ibm.com [9.152.237.70]) by d06av03.portsmouth.uk.ibm.com (8.12.11.20060308/8.12.11) with ESMTP id l3HCO1Yo025751 for ; Tue, 17 Apr 2007 13:24:01 +0100 Message-Id: <20070417120925.673710000@linux.vnet.ibm.com>> References: <20070417115206.709701000@linux.vnet.ibm.com>> Date: Tue, 17 Apr 2007 13:52:09 +0200 From: Sebastian Siewior To: linuxppc-dev@ozlabs.org Subject: [RFC 3/3] cryptoapi: speed test List-Id: Linux on PowerPC Developers Mail List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , This has been used for performance testing of my aes altivec code. Signed-off-by: Sebastian Siewior Index: linux/crypto/limi-speed.c =================================================================== --- /dev/null +++ linux/crypto/limi-speed.c @@ -0,0 +1,140 @@ +/* + * Code derived von crypt/tcrypt.h + * + * Small speed test with time resolution in msec. + * Author: Sebastian Siewior (bigeasy _at_ breakpoint.cc) + * License: GPL v2 + */ + +#include +#include +#include +#include +#include +#include + +static char *in; + +static unsigned int buff_size = 16 * 1024; +module_param(buff_size, uint, 0444); +MODULE_PARM_DESC(buff_size, "Buffer allocated by kmalloc()"); + +static unsigned int keylen = 16; +module_param(keylen, uint, 0444); +MODULE_PARM_DESC(keylen, "Length of the key (16,24 or 32 bits"); + +static unsigned int mode = 0; +module_param(mode, uint, 0444); +MODULE_PARM_DESC(mode, "0 -> encryption else decryption"); + +static unsigned int big_loops = 10; +module_param(big_loops, uint, 0444); +MODULE_PARM_DESC(big_loops, "Number of mensurations."); + +static unsigned int small_loops = 10000; +module_param(small_loops, uint, 0444); +MODULE_PARM_DESC(small_loops, "loops within one mesurement."); + +static unsigned int alg = 1; +module_param(alg, uint, 0444); +MODULE_PARM_DESC(alg, "0 -> ecb(aes), else -> cbc(aes)"); + +static int __init init(void) +{ + struct scatterlist sg[1]; + struct crypto_blkcipher *tfm; + struct blkcipher_desc desc; + unsigned int i; + unsigned int ret; + unsigned int iv_len; + unsigned long start, end; + unsigned long total = 0; + unsigned long size_kb; + unsigned char key[32] = { 1, 2, 3, 4, 5, 6 }; + const unsigned char *algname; + + algname = alg ? "cbc(aes)" : "ecb(aes)"; + printk("Limi-speed: %s buff_size: %u, keylen: %d, mode: %s\n", algname, buff_size, keylen, + mode ? "decryption" : "encryption"); + printk("loops: %d, iterations: %d, ", big_loops, small_loops); + size_kb = small_loops * buff_size / 1024; + printk("=> %lu kb or %lu mb a loop\n", size_kb, size_kb/1024); + + if (keylen != 16 && keylen != 24 && keylen != 32) { + printk("Invalid keysize\n"); + return -EINVAL; + } + + in = kmalloc(buff_size, GFP_KERNEL); + if (in == NULL) { + printk("Failed to allocate memory.\n"); + return -ENOMEM; + } + + memset(in, 0x24, buff_size); + + sg_set_buf(sg, in, buff_size); + + tfm = crypto_alloc_blkcipher(algname, 0, CRYPTO_ALG_ASYNC); + + if (IS_ERR(tfm)) { + printk("failed to load transform for %s: %ld\n", algname, PTR_ERR(tfm)); + goto leave; + } + + crypto_blkcipher_setkey(tfm, key, keylen); + + iv_len = crypto_blkcipher_ivsize(tfm); + if (iv_len) + crypto_blkcipher_set_iv(tfm, in, iv_len); + + desc.tfm = tfm; + desc.flags = 0; + + for (i=0 ; i