312 lines
9.5 KiB
C
312 lines
9.5 KiB
C
/*
|
|
* Copyright (c) 2006 Kungliga Tekniska Högskolan
|
|
* (Royal Institute of Technology, Stockholm, Sweden).
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
*
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
*
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
*
|
|
* 3. Neither the name of the Institute nor the names of its contributors
|
|
* may be used to endorse or promote products derived from this software
|
|
* without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*/
|
|
|
|
#include <config.h>
|
|
#include <roken.h>
|
|
#include <assert.h>
|
|
#include <getarg.h>
|
|
|
|
#include <evp.h>
|
|
#include <evp-hcrypto.h>
|
|
#include <evp-cc.h>
|
|
#if defined(_WIN32)
|
|
#include <evp-w32.h>
|
|
#endif
|
|
#include <evp-pkcs11.h>
|
|
#include <hex.h>
|
|
#include <err.h>
|
|
|
|
#ifdef WIN32
|
|
#define STATS_START(M) \
|
|
LARGE_INTEGER StartingTime, EndingTime, ElapsedMicroseconds; \
|
|
LARGE_INTEGER Frequency; \
|
|
\
|
|
QueryPerformanceFrequency(&Frequency); \
|
|
QueryPerformanceCounter(&StartingTime);
|
|
|
|
#define STATS_END(M) \
|
|
QueryPerformanceCounter(&EndingTime); \
|
|
ElapsedMicroseconds.QuadPart = EndingTime.QuadPart - StartingTime.QuadPart; \
|
|
ElapsedMicroseconds.QuadPart *= 1000000; \
|
|
ElapsedMicroseconds.QuadPart /= Frequency.QuadPart; \
|
|
\
|
|
M += (ElapsedMicroseconds.QuadPart - M) / (i + 1);
|
|
#else
|
|
#define STATS_START(M) \
|
|
struct timeval StartingTime, EndingTime; \
|
|
\
|
|
gettimeofday(&StartingTime, NULL);
|
|
|
|
#define STATS_END(M) \
|
|
gettimeofday(&EndingTime, NULL); \
|
|
timevalsub(&EndingTime, &StartingTime); \
|
|
M += (EndingTime.tv_sec * 1000000 + EndingTime.tv_usec - M) / (i + 1);
|
|
#endif
|
|
|
|
static int version_flag;
|
|
static int help_flag;
|
|
static int len = 1;
|
|
static int loops = 20;
|
|
static char *provider = "hcrypto";
|
|
static unsigned char *d;
|
|
|
|
#ifdef __APPLE__
|
|
#define PROVIDER_USAGE "hcrypto|cc"
|
|
#elif defined(WIN32)
|
|
#define PROVIDER_USAGE "hcrypto|w32crypto"
|
|
#elif __sun || defined(PKCS11_MODULE_PATH)
|
|
#define PROVIDER_USAGE "hcrypto|pkcs11"
|
|
#else
|
|
#define PROVIDER_USAGE "hcrypto"
|
|
#endif
|
|
|
|
static struct getargs args[] = {
|
|
{ "provider", 0, arg_string, &provider,
|
|
"crypto provider", PROVIDER_USAGE },
|
|
{ "loops", 0, arg_integer, &loops,
|
|
"number of loops", "loops" },
|
|
{ "size", 0, arg_integer, &len,
|
|
"size (KB)", NULL },
|
|
{ "version", 0, arg_flag, &version_flag,
|
|
"print version", NULL },
|
|
{ "help", 0, arg_flag, &help_flag,
|
|
NULL, NULL }
|
|
};
|
|
|
|
static void
|
|
usage (int ret)
|
|
{
|
|
arg_printusage (args,
|
|
sizeof(args)/sizeof(*args),
|
|
NULL,
|
|
"");
|
|
exit (ret);
|
|
}
|
|
|
|
static int
|
|
test_bulk_cipher(const char *cname, const EVP_CIPHER *c)
|
|
{
|
|
static unsigned char key[16];
|
|
static unsigned char iv[16];
|
|
int i;
|
|
int64_t M = 0;
|
|
|
|
if (c == NULL) {
|
|
printf("%s not supported\n", cname);
|
|
return 0;
|
|
}
|
|
|
|
for (i = 0; i < loops; i++) {
|
|
EVP_CIPHER_CTX ectx;
|
|
EVP_CIPHER_CTX dctx;
|
|
|
|
STATS_START(M)
|
|
|
|
EVP_CIPHER_CTX_init(&ectx);
|
|
EVP_CIPHER_CTX_init(&dctx);
|
|
|
|
if (EVP_CipherInit_ex(&ectx, c, NULL, NULL, NULL, 1) != 1)
|
|
errx(1, "can't init encrypt");
|
|
if (EVP_CipherInit_ex(&dctx, c, NULL, NULL, NULL, 0) != 1)
|
|
errx(1, "can't init decrypt");
|
|
|
|
EVP_CIPHER_CTX_set_key_length(&ectx, sizeof(key));
|
|
EVP_CIPHER_CTX_set_key_length(&dctx, sizeof(key));
|
|
|
|
if (EVP_CipherInit_ex(&ectx, NULL, NULL, key, iv, 1) != 1)
|
|
errx(1, "can't init encrypt");
|
|
if (EVP_CipherInit_ex(&dctx, NULL, NULL, key, iv, 0) != 1)
|
|
errx(1, "can't init decrypt");
|
|
|
|
if (!EVP_Cipher(&ectx, d, d, len))
|
|
errx(1, "can't encrypt");
|
|
if (!EVP_Cipher(&dctx, d, d, len))
|
|
errx(1, "can't decrypt");
|
|
|
|
EVP_CIPHER_CTX_cleanup(&ectx);
|
|
EVP_CIPHER_CTX_cleanup(&dctx);
|
|
|
|
STATS_END(M);
|
|
|
|
if (d[0] != 0x00 || d[len - 1] != ((len - 1) & 0xff))
|
|
errx(1, "encrypt/decrypt inconsistent");
|
|
}
|
|
|
|
printf("%s: mean time %llu usec%s\n", cname, (unsigned long long)M,
|
|
(M == 1) ? "" : "s");
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
test_bulk_digest(const char *cname, const EVP_MD *md)
|
|
{
|
|
char digest[EVP_MAX_MD_SIZE];
|
|
int i;
|
|
unsigned int tmp = sizeof(digest);
|
|
int64_t M = 0;
|
|
|
|
if (md == NULL) {
|
|
printf("%s not supported\n", cname);
|
|
return 0;
|
|
}
|
|
|
|
for (i = 0; i < loops; i++) {
|
|
STATS_START(M);
|
|
EVP_Digest(d, len, digest, &tmp, md, NULL);
|
|
STATS_END(M);
|
|
}
|
|
|
|
printf("%s: mean time %llu usec%s\n", cname, (unsigned long long)M,
|
|
(M == 1) ? "" : "s");
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void
|
|
test_bulk_provider_hcrypto(void)
|
|
{
|
|
test_bulk_cipher("hcrypto_aes_256_cbc", EVP_hcrypto_aes_256_cbc());
|
|
#if 0
|
|
test_bulk_cipher("hcrypto_aes_256_cfb8", EVP_hcrypto_aes_256_cfb8());
|
|
#endif
|
|
test_bulk_cipher("hcrypto_rc4", EVP_hcrypto_rc4());
|
|
test_bulk_digest("hcrypto_md4", EVP_hcrypto_md4());
|
|
test_bulk_digest("hcrypto_md5", EVP_hcrypto_md5());
|
|
test_bulk_digest("hcrypto_sha1", EVP_hcrypto_sha1());
|
|
test_bulk_digest("hcrypto_sha256", EVP_hcrypto_sha256());
|
|
test_bulk_digest("hcrypto_sha384", EVP_hcrypto_sha384());
|
|
test_bulk_digest("hcrypto_sha512", EVP_hcrypto_sha512());
|
|
}
|
|
|
|
#ifdef __APPLE__
|
|
static void
|
|
test_bulk_provider_cc(void)
|
|
{
|
|
test_bulk_cipher("cc_aes_256_cbc", EVP_cc_aes_256_cbc());
|
|
#if 0
|
|
test_bulk_cipher("cc_aes_256_cfb8", EVP_cc_aes_256_cfb8());
|
|
#endif
|
|
test_bulk_cipher("cc_rc4", EVP_cc_rc4());
|
|
test_bulk_digest("cc_md4", EVP_cc_md4());
|
|
test_bulk_digest("cc_md5", EVP_cc_md5());
|
|
test_bulk_digest("cc_sha1", EVP_cc_sha1());
|
|
test_bulk_digest("cc_sha256", EVP_cc_sha256());
|
|
test_bulk_digest("cc_sha384", EVP_cc_sha384());
|
|
test_bulk_digest("cc_sha512", EVP_cc_sha512());
|
|
}
|
|
#endif /* __APPLE__ */
|
|
|
|
#ifdef WIN32
|
|
static void
|
|
test_bulk_provider_w32crypto(void)
|
|
{
|
|
test_bulk_cipher("w32crypto_aes_256_cbc", EVP_w32crypto_aes_256_cbc());
|
|
#if 0
|
|
test_bulk_cipher("w32crypto_aes_256_cfb8", EVP_w32crypto_aes_256_cfb8());
|
|
#endif
|
|
test_bulk_cipher("w32crypto_rc4", EVP_w32crypto_rc4());
|
|
test_bulk_digest("w32crypto_md4", EVP_w32crypto_md4());
|
|
test_bulk_digest("w32crypto_md5", EVP_w32crypto_md5());
|
|
test_bulk_digest("w32crypto_sha1", EVP_w32crypto_sha1());
|
|
test_bulk_digest("w32crypto_sha256", EVP_w32crypto_sha256());
|
|
test_bulk_digest("w32crypto_sha384", EVP_w32crypto_sha384());
|
|
test_bulk_digest("w32crypto_sha512", EVP_w32crypto_sha512());
|
|
}
|
|
#endif /* WIN32 */
|
|
|
|
#if __sun || defined(PKCS11_MODULE_PATH)
|
|
static void
|
|
test_bulk_provider_pkcs11(void)
|
|
{
|
|
test_bulk_cipher("pkcs11_aes_256_cbc", EVP_pkcs11_aes_256_cbc());
|
|
test_bulk_cipher("pkcs11_rc4", EVP_pkcs11_rc4());
|
|
test_bulk_digest("pkcs11_md5", EVP_pkcs11_md5());
|
|
test_bulk_digest("pkcs11_sha1", EVP_pkcs11_sha1());
|
|
test_bulk_digest("pkcs11_sha256", EVP_pkcs11_sha256());
|
|
test_bulk_digest("pkcs11_sha384", EVP_pkcs11_sha384());
|
|
test_bulk_digest("pkcs11_sha512", EVP_pkcs11_sha512());
|
|
}
|
|
#endif /* __sun || PKCS11_MODULE_PATH */
|
|
|
|
int
|
|
main(int argc, char **argv)
|
|
{
|
|
int ret = 0;
|
|
int idx = 0;
|
|
int i;
|
|
|
|
setprogname(argv[0]);
|
|
|
|
if(getarg(args, sizeof(args) / sizeof(args[0]), argc, argv, &idx))
|
|
usage(1);
|
|
|
|
if (help_flag)
|
|
usage(0);
|
|
|
|
if(version_flag) {
|
|
print_version(NULL);
|
|
exit(0);
|
|
}
|
|
|
|
argc -= idx;
|
|
argv += idx;
|
|
|
|
len *= 1024;
|
|
|
|
d = emalloc(len);
|
|
for (i = 0; i < len; i++)
|
|
d[i] = i & 0xff;
|
|
|
|
if (strcmp(provider, "hcrypto") == 0)
|
|
test_bulk_provider_hcrypto();
|
|
#ifdef __APPLE__
|
|
else if (strcmp(provider, "cc") == 0)
|
|
test_bulk_provider_cc();
|
|
#endif
|
|
#ifdef WIN32
|
|
else if (strcmp(provider, "w32crypto") == 0)
|
|
test_bulk_provider_w32crypto();
|
|
#endif
|
|
#if __sun || defined(PKCS11_MODULE_PATH)
|
|
else if (strcmp(provider, "pkcs11") == 0)
|
|
test_bulk_provider_pkcs11();
|
|
#endif
|
|
else
|
|
usage(1);
|
|
|
|
free(d);
|
|
|
|
return ret;
|
|
}
|