blob: a17d6900b8b3eeec0ec179f88b1c53214c60b534 [file] [log] [blame]
Paul Bakker5121ce52009-01-03 21:22:43 +00001/*
2 * Benchmark demonstration program
3 *
Paul Bakkerd2681d82013-06-30 14:49:12 +02004 * Copyright (C) 2006-2013, Brainspark B.V.
Paul Bakkerb96f1542010-07-18 20:36:00 +00005 *
6 * This file is part of PolarSSL (http://www.polarssl.org)
Paul Bakker84f12b72010-07-18 10:13:04 +00007 * Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org>
Paul Bakkerb96f1542010-07-18 20:36:00 +00008 *
Paul Bakker77b385e2009-07-28 17:23:11 +00009 * All rights reserved.
Paul Bakkere0ccd0a2009-01-04 16:27:10 +000010 *
Paul Bakker5121ce52009-01-03 21:22:43 +000011 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License as published by
13 * the Free Software Foundation; either version 2 of the License, or
14 * (at your option) any later version.
15 *
16 * This program is distributed in the hope that it will be useful,
17 * but WITHOUT ANY WARRANTY; without even the implied warranty of
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 * GNU General Public License for more details.
20 *
21 * You should have received a copy of the GNU General Public License along
22 * with this program; if not, write to the Free Software Foundation, Inc.,
23 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
24 */
25
Manuel Pégourié-Gonnardcef4ad22014-04-29 12:39:06 +020026#if !defined(POLARSSL_CONFIG_FILE)
Manuel Pégourié-Gonnardabd6e022013-09-20 13:30:43 +020027#include "polarssl/config.h"
Manuel Pégourié-Gonnardcef4ad22014-04-29 12:39:06 +020028#else
29#include POLARSSL_CONFIG_FILE
30#endif
Paul Bakker5121ce52009-01-03 21:22:43 +000031
32#include <string.h>
33#include <stdlib.h>
34#include <stdio.h>
35
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +020036#include "polarssl/timing.h"
Paul Bakker5121ce52009-01-03 21:22:43 +000037
Paul Bakker40e46942009-01-03 21:51:57 +000038#include "polarssl/md4.h"
39#include "polarssl/md5.h"
Paul Bakker61b699e2014-01-22 13:35:29 +010040#include "polarssl/ripemd160.h"
Paul Bakker40e46942009-01-03 21:51:57 +000041#include "polarssl/sha1.h"
Paul Bakkerd2681d82013-06-30 14:49:12 +020042#include "polarssl/sha256.h"
43#include "polarssl/sha512.h"
Paul Bakker40e46942009-01-03 21:51:57 +000044#include "polarssl/arc4.h"
45#include "polarssl/des.h"
46#include "polarssl/aes.h"
Paul Bakker3d58fe82012-07-04 17:15:31 +000047#include "polarssl/blowfish.h"
Paul Bakker38119b12009-01-10 23:31:23 +000048#include "polarssl/camellia.h"
Paul Bakker89e80c92012-03-20 13:50:09 +000049#include "polarssl/gcm.h"
Manuel Pégourié-Gonnard58d78a82014-05-07 12:03:02 +020050#include "polarssl/ccm.h"
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +020051#include "polarssl/havege.h"
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +020052#include "polarssl/ctr_drbg.h"
Manuel Pégourié-Gonnardfef0f8f2014-01-30 20:59:00 +010053#include "polarssl/hmac_drbg.h"
Paul Bakker40e46942009-01-03 21:51:57 +000054#include "polarssl/rsa.h"
Manuel Pégourié-Gonnarde870c0a2012-11-08 11:31:48 +010055#include "polarssl/dhm.h"
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +020056#include "polarssl/ecdsa.h"
57#include "polarssl/ecdh.h"
Gergely Budaia5d336b2014-01-27 23:27:06 +010058#include "polarssl/error.h"
Paul Bakker5121ce52009-01-03 21:22:43 +000059
Manuel Pégourié-Gonnard2f77ce32013-10-03 11:59:57 +020060#if defined _MSC_VER && !defined snprintf
61#define snprintf _snprintf
62#endif
63
Paul Bakker02faf452011-11-29 11:23:58 +000064#define BUFSIZE 1024
Manuel Pégourié-Gonnardfef0f8f2014-01-30 20:59:00 +010065#define HEADER_FORMAT " %-24s : "
Gergely Budaia5d336b2014-01-27 23:27:06 +010066#define TITLE_LEN 25
Paul Bakker5121ce52009-01-03 21:22:43 +000067
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +020068#if !defined(POLARSSL_TIMING_C)
69int main( int argc, char *argv[] )
70{
71 ((void) argc);
72 ((void) argv);
73
74 printf("POLARSSL_TIMING_C not defined.\n");
75 return( 0 );
76}
77#else
78
Paul Bakkera3d195c2011-11-27 21:07:34 +000079static int myrand( void *rng_state, unsigned char *output, size_t len )
Paul Bakker5121ce52009-01-03 21:22:43 +000080{
Paul Bakkera3d195c2011-11-27 21:07:34 +000081 size_t use_len;
82 int rnd;
83
Paul Bakker5121ce52009-01-03 21:22:43 +000084 if( rng_state != NULL )
85 rng_state = NULL;
86
Paul Bakkera3d195c2011-11-27 21:07:34 +000087 while( len > 0 )
88 {
89 use_len = len;
90 if( use_len > sizeof(int) )
91 use_len = sizeof(int);
92
93 rnd = rand();
94 memcpy( output, &rnd, use_len );
95 output += use_len;
96 len -= use_len;
97 }
98
99 return( 0 );
Paul Bakker5121ce52009-01-03 21:22:43 +0000100}
101
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200102#define TIME_AND_TSC( TITLE, CODE ) \
103do { \
104 unsigned long i, j, tsc; \
105 \
106 printf( HEADER_FORMAT, TITLE ); \
107 fflush( stdout ); \
108 \
109 set_alarm( 1 ); \
110 for( i = 1; ! alarmed; i++ ) \
111 { \
112 CODE; \
113 } \
114 \
115 tsc = hardclock(); \
116 for( j = 0; j < 1024; j++ ) \
117 { \
118 CODE; \
119 } \
120 \
121 printf( "%9lu Kb/s, %9lu cycles/byte\n", i * BUFSIZE / 1024, \
122 ( hardclock() - tsc ) / ( j * BUFSIZE ) ); \
123} while( 0 )
124
Paul Bakker0c5e4292014-05-22 14:11:13 +0200125#if defined(POLARSSL_ERROR_C)
126#define PRINT_ERROR \
127 polarssl_strerror( ret, ( char * )tmp, sizeof( tmp ) ); \
128 printf( "FAILED: %s\n", tmp );
129#else
130#define PRINT_ERROR \
131 printf( "FAILED: -0x%04x\n", -ret );
132#endif
133
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200134#define TIME_PUBLIC( TITLE, TYPE, CODE ) \
135do { \
136 unsigned long i; \
137 int ret; \
138 \
139 printf( HEADER_FORMAT, TITLE ); \
140 fflush( stdout ); \
141 set_alarm( 3 ); \
142 \
143 ret = 0; \
144 for( i = 1; ! alarmed && ! ret ; i++ ) \
145 { \
146 CODE; \
147 } \
148 \
149 if( ret != 0 ) \
Gergely Budaia5d336b2014-01-27 23:27:06 +0100150 { \
Paul Bakker0c5e4292014-05-22 14:11:13 +0200151PRINT_ERROR; \
Gergely Budaia5d336b2014-01-27 23:27:06 +0100152 } \
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200153 else \
Manuel Pégourié-Gonnard01b0b382014-01-17 14:29:46 +0100154 printf( "%9lu " TYPE "/s\n", i / 3 ); \
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200155} while( 0 )
156
Paul Bakker5121ce52009-01-03 21:22:43 +0000157unsigned char buf[BUFSIZE];
158
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200159typedef struct {
Paul Bakker61b699e2014-01-22 13:35:29 +0100160 char md4, md5, ripemd160, sha1, sha256, sha512,
Manuel Pégourié-Gonnard58d78a82014-05-07 12:03:02 +0200161 arc4, des3, des, aes_cbc, aes_gcm, aes_ccm, camellia, blowfish,
Manuel Pégourié-Gonnardfef0f8f2014-01-30 20:59:00 +0100162 havege, ctr_drbg, hmac_drbg,
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +0200163 rsa, dhm, ecdsa, ecdh;
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200164} todo_list;
165
166#define OPTIONS \
Paul Bakker61b699e2014-01-22 13:35:29 +0100167 "md4, md5, ripemd160, sha1, sha256, sha512,\n" \
Manuel Pégourié-Gonnard58d78a82014-05-07 12:03:02 +0200168 "arc4, des3, des, aes_cbc, aes_gcm, aes_ccm, camellia, blowfish,\n" \
Manuel Pégourié-Gonnardfef0f8f2014-01-30 20:59:00 +0100169 "havege, ctr_drbg, hmac_drbg\n" \
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +0200170 "rsa, dhm, ecdsa, ecdh.\n"
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200171
Paul Bakkercce9d772011-11-18 14:26:47 +0000172int main( int argc, char *argv[] )
Paul Bakker5690efc2011-05-26 13:16:06 +0000173{
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200174 int keysize, i;
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +0200175 unsigned char tmp[200];
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200176 char title[TITLE_LEN];
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200177 todo_list todo;
Paul Bakkercce9d772011-11-18 14:26:47 +0000178
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200179 if( argc == 1 )
180 memset( &todo, 1, sizeof( todo ) );
181 else
182 {
183 memset( &todo, 0, sizeof( todo ) );
184
185 for( i = 1; i < argc; i++ )
186 {
187 if( strcmp( argv[i], "md4" ) == 0 )
188 todo.md4 = 1;
189 else if( strcmp( argv[i], "md5" ) == 0 )
190 todo.md5 = 1;
Paul Bakker61b699e2014-01-22 13:35:29 +0100191 else if( strcmp( argv[i], "ripemd160" ) == 0 )
192 todo.ripemd160 = 1;
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200193 else if( strcmp( argv[i], "sha1" ) == 0 )
194 todo.sha1 = 1;
195 else if( strcmp( argv[i], "sha256" ) == 0 )
196 todo.sha256 = 1;
197 else if( strcmp( argv[i], "sha512" ) == 0 )
198 todo.sha512 = 1;
199 else if( strcmp( argv[i], "arc4" ) == 0 )
200 todo.arc4 = 1;
201 else if( strcmp( argv[i], "des3" ) == 0 )
202 todo.des3 = 1;
203 else if( strcmp( argv[i], "des" ) == 0 )
204 todo.des = 1;
205 else if( strcmp( argv[i], "aes_cbc" ) == 0 )
206 todo.aes_cbc = 1;
207 else if( strcmp( argv[i], "aes_gcm" ) == 0 )
208 todo.aes_gcm = 1;
Manuel Pégourié-Gonnard58d78a82014-05-07 12:03:02 +0200209 else if( strcmp( argv[i], "aes_ccm" ) == 0 )
210 todo.aes_ccm = 1;
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200211 else if( strcmp( argv[i], "camellia" ) == 0 )
212 todo.camellia = 1;
213 else if( strcmp( argv[i], "blowfish" ) == 0 )
214 todo.blowfish = 1;
215 else if( strcmp( argv[i], "havege" ) == 0 )
216 todo.havege = 1;
217 else if( strcmp( argv[i], "ctr_drbg" ) == 0 )
218 todo.ctr_drbg = 1;
Manuel Pégourié-Gonnardfef0f8f2014-01-30 20:59:00 +0100219 else if( strcmp( argv[i], "hmac_drbg" ) == 0 )
220 todo.hmac_drbg = 1;
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200221 else if( strcmp( argv[i], "rsa" ) == 0 )
222 todo.rsa = 1;
223 else if( strcmp( argv[i], "dhm" ) == 0 )
224 todo.dhm = 1;
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +0200225 else if( strcmp( argv[i], "ecdsa" ) == 0 )
226 todo.ecdsa = 1;
227 else if( strcmp( argv[i], "ecdh" ) == 0 )
228 todo.ecdh = 1;
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200229 else
230 {
231 printf( "Unrecognized option: %s\n", argv[i] );
Manuel Pégourié-Gonnard58d78a82014-05-07 12:03:02 +0200232 printf( "Available options: " OPTIONS );
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200233 }
234 }
235 }
Paul Bakker5121ce52009-01-03 21:22:43 +0000236
237 printf( "\n" );
238
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200239 memset( buf, 0xAA, sizeof( buf ) );
Paul Bakkerdf71dd12014-04-17 16:03:48 +0200240 memset( tmp, 0xBB, sizeof( tmp ) );
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200241
Paul Bakker40e46942009-01-03 21:51:57 +0000242#if defined(POLARSSL_MD4_C)
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200243 if( todo.md4 )
244 TIME_AND_TSC( "MD4", md4( buf, BUFSIZE, tmp ) );
Paul Bakker5121ce52009-01-03 21:22:43 +0000245#endif
246
Paul Bakker40e46942009-01-03 21:51:57 +0000247#if defined(POLARSSL_MD5_C)
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200248 if( todo.md5 )
249 TIME_AND_TSC( "MD5", md5( buf, BUFSIZE, tmp ) );
Paul Bakker5121ce52009-01-03 21:22:43 +0000250#endif
251
Paul Bakker61b699e2014-01-22 13:35:29 +0100252#if defined(POLARSSL_RIPEMD160_C)
253 if( todo.ripemd160 )
254 TIME_AND_TSC( "RIPEMD160", ripemd160( buf, BUFSIZE, tmp ) );
Manuel Pégourié-Gonnard01b0b382014-01-17 14:29:46 +0100255#endif
256
Paul Bakker40e46942009-01-03 21:51:57 +0000257#if defined(POLARSSL_SHA1_C)
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200258 if( todo.sha1 )
259 TIME_AND_TSC( "SHA-1", sha1( buf, BUFSIZE, tmp ) );
Paul Bakker5121ce52009-01-03 21:22:43 +0000260#endif
261
Paul Bakker9e36f042013-06-30 14:34:05 +0200262#if defined(POLARSSL_SHA256_C)
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200263 if( todo.sha256 )
264 TIME_AND_TSC( "SHA-256", sha256( buf, BUFSIZE, tmp, 0 ) );
Paul Bakker5121ce52009-01-03 21:22:43 +0000265#endif
266
Paul Bakker9e36f042013-06-30 14:34:05 +0200267#if defined(POLARSSL_SHA512_C)
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200268 if( todo.sha512 )
269 TIME_AND_TSC( "SHA-512", sha512( buf, BUFSIZE, tmp, 0 ) );
Paul Bakker3a3c3c22009-02-09 22:33:30 +0000270#endif
271
Paul Bakker40e46942009-01-03 21:51:57 +0000272#if defined(POLARSSL_ARC4_C)
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200273 if( todo.arc4 )
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200274 {
275 arc4_context arc4;
Paul Bakker8cfd9d82014-06-18 11:16:11 +0200276 arc4_init( &arc4 );
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200277 arc4_setup( &arc4, tmp, 32 );
278 TIME_AND_TSC( "ARC4", arc4_crypt( &arc4, BUFSIZE, buf, buf ) );
Paul Bakker8cfd9d82014-06-18 11:16:11 +0200279 arc4_free( &arc4 );
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200280 }
Paul Bakker5121ce52009-01-03 21:22:43 +0000281#endif
282
Manuel Pégourié-Gonnard92cb1d32013-09-13 16:24:20 +0200283#if defined(POLARSSL_DES_C) && defined(POLARSSL_CIPHER_MODE_CBC)
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200284 if( todo.des3 )
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200285 {
286 des3_context des3;
Paul Bakker8cfd9d82014-06-18 11:16:11 +0200287 des3_init( &des3 );
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200288 des3_set3key_enc( &des3, tmp );
289 TIME_AND_TSC( "3DES",
290 des3_crypt_cbc( &des3, DES_ENCRYPT, BUFSIZE, tmp, buf, buf ) );
Paul Bakker8cfd9d82014-06-18 11:16:11 +0200291 des3_free( &des3 );
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200292 }
Paul Bakker5121ce52009-01-03 21:22:43 +0000293
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200294 if( todo.des )
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200295 {
296 des_context des;
Paul Bakker8cfd9d82014-06-18 11:16:11 +0200297 des_init( &des );
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200298 des_setkey_enc( &des, tmp );
299 TIME_AND_TSC( "DES",
300 des_crypt_cbc( &des, DES_ENCRYPT, BUFSIZE, tmp, buf, buf ) );
Paul Bakker8cfd9d82014-06-18 11:16:11 +0200301 des_free( &des );
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200302 }
Paul Bakker5121ce52009-01-03 21:22:43 +0000303#endif
304
Paul Bakker40e46942009-01-03 21:51:57 +0000305#if defined(POLARSSL_AES_C)
Manuel Pégourié-Gonnard92cb1d32013-09-13 16:24:20 +0200306#if defined(POLARSSL_CIPHER_MODE_CBC)
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200307 if( todo.aes_cbc )
Paul Bakker5121ce52009-01-03 21:22:43 +0000308 {
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200309 aes_context aes;
Paul Bakker8cfd9d82014-06-18 11:16:11 +0200310 aes_init( &aes );
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200311 for( keysize = 128; keysize <= 256; keysize += 64 )
312 {
313 snprintf( title, sizeof( title ), "AES-CBC-%d", keysize );
Paul Bakker5121ce52009-01-03 21:22:43 +0000314
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200315 memset( buf, 0, sizeof( buf ) );
316 memset( tmp, 0, sizeof( tmp ) );
317 aes_setkey_enc( &aes, tmp, keysize );
Paul Bakker5121ce52009-01-03 21:22:43 +0000318
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200319 TIME_AND_TSC( title,
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200320 aes_crypt_cbc( &aes, AES_ENCRYPT, BUFSIZE, tmp, buf, buf ) );
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200321 }
Paul Bakker8cfd9d82014-06-18 11:16:11 +0200322 aes_free( &aes );
Paul Bakker5121ce52009-01-03 21:22:43 +0000323 }
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200324#endif
Paul Bakker89e80c92012-03-20 13:50:09 +0000325#if defined(POLARSSL_GCM_C)
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200326 if( todo.aes_gcm )
Paul Bakker89e80c92012-03-20 13:50:09 +0000327 {
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200328 gcm_context gcm;
329 for( keysize = 128; keysize <= 256; keysize += 64 )
330 {
331 snprintf( title, sizeof( title ), "AES-GCM-%d", keysize );
Paul Bakker89e80c92012-03-20 13:50:09 +0000332
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200333 memset( buf, 0, sizeof( buf ) );
334 memset( tmp, 0, sizeof( tmp ) );
335 gcm_init( &gcm, POLARSSL_CIPHER_ID_AES, tmp, keysize );
Paul Bakker89e80c92012-03-20 13:50:09 +0000336
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200337 TIME_AND_TSC( title,
338 gcm_crypt_and_tag( &gcm, GCM_ENCRYPT, BUFSIZE, tmp,
339 12, NULL, 0, buf, buf, 16, tmp ) );
Paul Bakkerf70fe812013-12-16 16:43:10 +0100340
341 gcm_free( &gcm );
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200342 }
Paul Bakker89e80c92012-03-20 13:50:09 +0000343 }
344#endif
Manuel Pégourié-Gonnard58d78a82014-05-07 12:03:02 +0200345#if defined(POLARSSL_CCM_C)
346 if( todo.aes_ccm )
347 {
348 ccm_context ccm;
349 for( keysize = 128; keysize <= 256; keysize += 64 )
350 {
351 snprintf( title, sizeof( title ), "AES-CCM-%d", keysize );
352
353 memset( buf, 0, sizeof( buf ) );
354 memset( tmp, 0, sizeof( tmp ) );
355 ccm_init( &ccm, POLARSSL_CIPHER_ID_AES, tmp, keysize );
356
357 TIME_AND_TSC( title,
358 ccm_encrypt_and_tag( &ccm, BUFSIZE, tmp,
359 12, NULL, 0, buf, buf, tmp, 16 ) );
360
361 ccm_free( &ccm );
362 }
363 }
364#endif
Paul Bakker5121ce52009-01-03 21:22:43 +0000365#endif
366
Manuel Pégourié-Gonnard92cb1d32013-09-13 16:24:20 +0200367#if defined(POLARSSL_CAMELLIA_C) && defined(POLARSSL_CIPHER_MODE_CBC)
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200368 if( todo.camellia )
Paul Bakker38119b12009-01-10 23:31:23 +0000369 {
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200370 camellia_context camellia;
Paul Bakker8cfd9d82014-06-18 11:16:11 +0200371 camellia_init( &camellia );
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200372 for( keysize = 128; keysize <= 256; keysize += 64 )
373 {
374 snprintf( title, sizeof( title ), "CAMELLIA-CBC-%d", keysize );
Paul Bakker38119b12009-01-10 23:31:23 +0000375
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200376 memset( buf, 0, sizeof( buf ) );
377 memset( tmp, 0, sizeof( tmp ) );
378 camellia_setkey_enc( &camellia, tmp, keysize );
Paul Bakker38119b12009-01-10 23:31:23 +0000379
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200380 TIME_AND_TSC( title,
381 camellia_crypt_cbc( &camellia, CAMELLIA_ENCRYPT,
382 BUFSIZE, tmp, buf, buf ) );
383 }
Paul Bakker8cfd9d82014-06-18 11:16:11 +0200384 camellia_free( &camellia );
Paul Bakker38119b12009-01-10 23:31:23 +0000385 }
386#endif
387
Manuel Pégourié-Gonnard92cb1d32013-09-13 16:24:20 +0200388#if defined(POLARSSL_BLOWFISH_C) && defined(POLARSSL_CIPHER_MODE_CBC)
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200389 if( todo.blowfish )
Paul Bakker3d58fe82012-07-04 17:15:31 +0000390 {
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200391 blowfish_context blowfish;
Paul Bakker8cfd9d82014-06-18 11:16:11 +0200392 blowfish_init( &blowfish );
393
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200394 for( keysize = 128; keysize <= 256; keysize += 64 )
395 {
396 snprintf( title, sizeof( title ), "BLOWFISH-CBC-%d", keysize );
Paul Bakker3d58fe82012-07-04 17:15:31 +0000397
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200398 memset( buf, 0, sizeof( buf ) );
399 memset( tmp, 0, sizeof( tmp ) );
400 blowfish_setkey( &blowfish, tmp, keysize );
Paul Bakker3d58fe82012-07-04 17:15:31 +0000401
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200402 TIME_AND_TSC( title,
403 blowfish_crypt_cbc( &blowfish, BLOWFISH_ENCRYPT, BUFSIZE,
404 tmp, buf, buf ) );
405 }
Paul Bakker8cfd9d82014-06-18 11:16:11 +0200406
407 blowfish_free( &blowfish );
Paul Bakker3d58fe82012-07-04 17:15:31 +0000408 }
409#endif
410
Paul Bakker02faf452011-11-29 11:23:58 +0000411#if defined(POLARSSL_HAVEGE_C)
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200412 if( todo.havege )
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200413 {
414 havege_state hs;
415 havege_init( &hs );
416 TIME_AND_TSC( "HAVEGE", havege_random( &hs, buf, BUFSIZE ) );
417 }
Paul Bakker02faf452011-11-29 11:23:58 +0000418#endif
419
420#if defined(POLARSSL_CTR_DRBG_C)
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200421 if( todo.ctr_drbg )
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200422 {
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200423 ctr_drbg_context ctr_drbg;
Paul Bakker02faf452011-11-29 11:23:58 +0000424
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200425 if( ctr_drbg_init( &ctr_drbg, myrand, NULL, NULL, 0 ) != 0 )
Paul Bakker02faf452011-11-29 11:23:58 +0000426 exit(1);
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200427 TIME_AND_TSC( "CTR_DRBG (NOPR)",
428 if( ctr_drbg_random( &ctr_drbg, buf, BUFSIZE ) != 0 )
429 exit(1) );
Paul Bakker02faf452011-11-29 11:23:58 +0000430
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200431 if( ctr_drbg_init( &ctr_drbg, myrand, NULL, NULL, 0 ) != 0 )
Paul Bakker02faf452011-11-29 11:23:58 +0000432 exit(1);
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200433 ctr_drbg_set_prediction_resistance( &ctr_drbg, CTR_DRBG_PR_ON );
434 TIME_AND_TSC( "CTR_DRBG (PR)",
435 if( ctr_drbg_random( &ctr_drbg, buf, BUFSIZE ) != 0 )
436 exit(1) );
437 }
Paul Bakker02faf452011-11-29 11:23:58 +0000438#endif
439
Manuel Pégourié-Gonnardfef0f8f2014-01-30 20:59:00 +0100440#if defined(POLARSSL_HMAC_DRBG_C)
441 if( todo.hmac_drbg )
442 {
443 hmac_drbg_context hmac_drbg;
444 const md_info_t *md_info;
445
446#if defined(POLARSSL_SHA1_C)
447 if( ( md_info = md_info_from_type( POLARSSL_MD_SHA1 ) ) == NULL )
448 exit(1);
449
450 if( hmac_drbg_init( &hmac_drbg, md_info, myrand, NULL, NULL, 0 ) != 0 )
451 exit(1);
452 TIME_AND_TSC( "HMAC_DRBG SHA-1 (NOPR)",
453 if( hmac_drbg_random( &hmac_drbg, buf, BUFSIZE ) != 0 )
454 exit(1) );
455 hmac_drbg_free( &hmac_drbg );
456
457 if( hmac_drbg_init( &hmac_drbg, md_info, myrand, NULL, NULL, 0 ) != 0 )
458 exit(1);
459 hmac_drbg_set_prediction_resistance( &hmac_drbg,
460 POLARSSL_HMAC_DRBG_PR_ON );
461 TIME_AND_TSC( "HMAC_DRBG SHA-1 (PR)",
462 if( hmac_drbg_random( &hmac_drbg, buf, BUFSIZE ) != 0 )
463 exit(1) );
464 hmac_drbg_free( &hmac_drbg );
465#endif
466
467#if defined(POLARSSL_SHA256_C)
468 if( ( md_info = md_info_from_type( POLARSSL_MD_SHA256 ) ) == NULL )
469 exit(1);
470
471 if( hmac_drbg_init( &hmac_drbg, md_info, myrand, NULL, NULL, 0 ) != 0 )
472 exit(1);
473 TIME_AND_TSC( "HMAC_DRBG SHA-256 (NOPR)",
474 if( hmac_drbg_random( &hmac_drbg, buf, BUFSIZE ) != 0 )
475 exit(1) );
476 hmac_drbg_free( &hmac_drbg );
477
478 if( hmac_drbg_init( &hmac_drbg, md_info, myrand, NULL, NULL, 0 ) != 0 )
479 exit(1);
480 hmac_drbg_set_prediction_resistance( &hmac_drbg,
481 POLARSSL_HMAC_DRBG_PR_ON );
482 TIME_AND_TSC( "HMAC_DRBG SHA-256 (PR)",
483 if( hmac_drbg_random( &hmac_drbg, buf, BUFSIZE ) != 0 )
484 exit(1) );
485 hmac_drbg_free( &hmac_drbg );
486#endif
487 }
488#endif
489
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200490#if defined(POLARSSL_RSA_C) && defined(POLARSSL_GENPRIME)
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200491 if( todo.rsa )
Paul Bakker5121ce52009-01-03 21:22:43 +0000492 {
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200493 rsa_context rsa;
494 for( keysize = 1024; keysize <= 4096; keysize *= 2 )
495 {
496 snprintf( title, sizeof( title ), "RSA-%d", keysize );
497
498 rsa_init( &rsa, RSA_PKCS_V15, 0 );
499 rsa_gen_key( &rsa, myrand, NULL, keysize, 65537 );
500
501 TIME_PUBLIC( title, " public",
502 buf[0] = 0;
503 ret = rsa_public( &rsa, buf, buf ) );
504
505 TIME_PUBLIC( title, "private",
506 buf[0] = 0;
507 ret = rsa_private( &rsa, myrand, NULL, buf, buf ) );
508
509 rsa_free( &rsa );
510 }
Paul Bakker5121ce52009-01-03 21:22:43 +0000511 }
Paul Bakker5121ce52009-01-03 21:22:43 +0000512#endif
513
Manuel Pégourié-Gonnarde870c0a2012-11-08 11:31:48 +0100514#if defined(POLARSSL_DHM_C) && defined(POLARSSL_BIGNUM_C)
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200515 if( todo.dhm )
Manuel Pégourié-Gonnarde870c0a2012-11-08 11:31:48 +0100516 {
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200517#define DHM_SIZES 3
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200518 int dhm_sizes[DHM_SIZES] = { 1024, 2048, 3072 };
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200519 const char *dhm_P[DHM_SIZES] = {
520 POLARSSL_DHM_RFC5114_MODP_1024_P,
521 POLARSSL_DHM_RFC3526_MODP_2048_P,
522 POLARSSL_DHM_RFC3526_MODP_3072_P,
523 };
524 const char *dhm_G[DHM_SIZES] = {
525 POLARSSL_DHM_RFC5114_MODP_1024_G,
526 POLARSSL_DHM_RFC3526_MODP_2048_G,
527 POLARSSL_DHM_RFC3526_MODP_3072_G,
528 };
529
530 dhm_context dhm;
531 size_t olen;
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200532 for( i = 0; i < DHM_SIZES; i++ )
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200533 {
534 memset( &dhm, 0, sizeof( dhm_context ) );
535
Paul Bakkercbe3d0d2014-04-17 16:00:59 +0200536 if( mpi_read_string( &dhm.P, 16, dhm_P[i] ) != 0 ||
537 mpi_read_string( &dhm.G, 16, dhm_G[i] ) != 0 )
538 {
539 exit( 1 );
540 }
541
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200542 dhm.len = mpi_size( &dhm.P );
Paul Bakker840ab202013-11-30 15:14:38 +0100543 dhm_make_public( &dhm, (int) dhm.len, buf, dhm.len, myrand, NULL );
Paul Bakkercbe3d0d2014-04-17 16:00:59 +0200544 if( mpi_copy( &dhm.GY, &dhm.GX ) != 0 )
545 exit( 1 );
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200546
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +0200547 snprintf( title, sizeof( title ), "DHE-%d", dhm_sizes[i] );
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200548 TIME_PUBLIC( title, "handshake",
549 olen = sizeof( buf );
Paul Bakker840ab202013-11-30 15:14:38 +0100550 ret |= dhm_make_public( &dhm, (int) dhm.len, buf, dhm.len,
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200551 myrand, NULL );
552 ret |= dhm_calc_secret( &dhm, buf, &olen, myrand, NULL ) );
553
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +0200554 snprintf( title, sizeof( title ), "DH-%d", dhm_sizes[i] );
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200555 TIME_PUBLIC( title, "handshake",
556 olen = sizeof( buf );
557 ret |= dhm_calc_secret( &dhm, buf, &olen, myrand, NULL ) );
558
559 dhm_free( &dhm );
560 }
Manuel Pégourié-Gonnarde870c0a2012-11-08 11:31:48 +0100561 }
Manuel Pégourié-Gonnarde870c0a2012-11-08 11:31:48 +0100562#endif
563
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +0200564#if defined(POLARSSL_ECDSA_C)
565 if( todo.ecdsa )
566 {
567 ecdsa_context ecdsa;
568 const ecp_curve_info *curve_info;
569 size_t sig_len;
570
571 memset( buf, 0x2A, sizeof( buf ) );
572
Manuel Pégourié-Gonnardda179e42013-09-18 15:31:24 +0200573 for( curve_info = ecp_curve_list();
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +0200574 curve_info->grp_id != POLARSSL_ECP_DP_NONE;
575 curve_info++ )
576 {
577 ecdsa_init( &ecdsa );
578
579 if( ecdsa_genkey( &ecdsa, curve_info->grp_id, myrand, NULL ) != 0 )
580 exit( 1 );
581
Manuel Pégourié-Gonnard56cd3192013-09-17 17:23:07 +0200582 snprintf( title, sizeof( title ), "ECDSA-%s",
583 curve_info->name );
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +0200584 TIME_PUBLIC( title, "sign",
585 ret = ecdsa_write_signature( &ecdsa, buf, curve_info->size,
Manuel Pégourié-Gonnard56cd3192013-09-17 17:23:07 +0200586 tmp, &sig_len, myrand, NULL ) );
587
588 TIME_PUBLIC( title, "verify",
589 ret = ecdsa_read_signature( &ecdsa, buf, curve_info->size,
590 tmp, sig_len ) );
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +0200591
592 ecdsa_free( &ecdsa );
593 }
594 }
595#endif
596
597#if defined(POLARSSL_ECDH_C)
598 if( todo.ecdh )
599 {
600 ecdh_context ecdh;
601 const ecp_curve_info *curve_info;
602 size_t olen;
603
Manuel Pégourié-Gonnardda179e42013-09-18 15:31:24 +0200604 for( curve_info = ecp_curve_list();
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +0200605 curve_info->grp_id != POLARSSL_ECP_DP_NONE;
606 curve_info++ )
607 {
608 ecdh_init( &ecdh );
609
610 if( ecp_use_known_dp( &ecdh.grp, curve_info->grp_id ) != 0 ||
611 ecdh_make_public( &ecdh, &olen, buf, sizeof( buf),
612 myrand, NULL ) != 0 ||
613 ecp_copy( &ecdh.Qp, &ecdh.Q ) != 0 )
614 {
615 exit( 1 );
616 }
617
Manuel Pégourié-Gonnard56cd3192013-09-17 17:23:07 +0200618 snprintf( title, sizeof( title ), "ECDHE-%s",
619 curve_info->name );
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +0200620 TIME_PUBLIC( title, "handshake",
621 ret |= ecdh_make_public( &ecdh, &olen, buf, sizeof( buf),
622 myrand, NULL );
623 ret |= ecdh_calc_secret( &ecdh, &olen, buf, sizeof( buf ),
624 myrand, NULL ) );
625
Manuel Pégourié-Gonnard56cd3192013-09-17 17:23:07 +0200626 snprintf( title, sizeof( title ), "ECDH-%s",
627 curve_info->name );
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +0200628 TIME_PUBLIC( title, "handshake",
629 ret |= ecdh_calc_secret( &ecdh, &olen, buf, sizeof( buf ),
630 myrand, NULL ) );
631 ecdh_free( &ecdh );
632 }
633 }
634#endif
Paul Bakker1d4da2e2009-10-25 12:36:53 +0000635 printf( "\n" );
636
Paul Bakkercce9d772011-11-18 14:26:47 +0000637#if defined(_WIN32)
Paul Bakker5121ce52009-01-03 21:22:43 +0000638 printf( " Press Enter to exit this program.\n" );
639 fflush( stdout ); getchar();
640#endif
641
642 return( 0 );
643}
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200644
Paul Bakker5690efc2011-05-26 13:16:06 +0000645#endif /* POLARSSL_TIMING_C */