blob: c0c7a11e638d2e6d983932a375f31ee0ba9e66c1 [file] [log] [blame]
Paul Bakker5121ce52009-01-03 21:22:43 +00001/*
2 * Benchmark demonstration program
3 *
Manuel Pégourié-Gonnarda658a402015-01-23 09:45:19 +00004 * Copyright (C) 2006-2013, ARM Limited, All Rights Reserved
Paul Bakkerb96f1542010-07-18 20:36:00 +00005 *
Manuel Pégourié-Gonnard860b5162015-01-28 17:12:07 +00006 * This file is part of mbed TLS (https://polarssl.org)
Paul Bakkerb96f1542010-07-18 20:36:00 +00007 *
Paul Bakker5121ce52009-01-03 21:22:43 +00008 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2 of the License, or
11 * (at your option) any later version.
12 *
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
17 *
18 * You should have received a copy of the GNU General Public License along
19 * with this program; if not, write to the Free Software Foundation, Inc.,
20 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
21 */
22
Manuel Pégourié-Gonnardcef4ad22014-04-29 12:39:06 +020023#if !defined(POLARSSL_CONFIG_FILE)
Manuel Pégourié-Gonnardabd6e022013-09-20 13:30:43 +020024#include "polarssl/config.h"
Manuel Pégourié-Gonnardcef4ad22014-04-29 12:39:06 +020025#else
26#include POLARSSL_CONFIG_FILE
27#endif
Paul Bakker5121ce52009-01-03 21:22:43 +000028
Rich Evansf90016a2015-01-19 14:26:37 +000029#if defined(POLARSSL_PLATFORM_C)
30#include "polarssl/platform.h"
31#else
Rich Evans18b78c72015-02-11 14:06:19 +000032#include <stdio.h>
Rich Evans77d36382015-01-30 12:12:11 +000033#define polarssl_exit exit
Rich Evansb92965b2015-01-30 11:11:57 +000034#define polarssl_printf printf
35#define polarssl_snprintf snprintf
Rich Evans012acfc2015-01-30 12:12:11 +000036#define polarssl_exit exit
Rich Evansf90016a2015-01-19 14:26:37 +000037#endif
38
Rich Evans18b78c72015-02-11 14:06:19 +000039#if defined(POLARSSL_TIMING_C)
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +020040#include "polarssl/timing.h"
Paul Bakker5121ce52009-01-03 21:22:43 +000041
Paul Bakker40e46942009-01-03 21:51:57 +000042#include "polarssl/md4.h"
43#include "polarssl/md5.h"
Paul Bakker61b699e2014-01-22 13:35:29 +010044#include "polarssl/ripemd160.h"
Paul Bakker40e46942009-01-03 21:51:57 +000045#include "polarssl/sha1.h"
Paul Bakkerd2681d82013-06-30 14:49:12 +020046#include "polarssl/sha256.h"
47#include "polarssl/sha512.h"
Paul Bakker40e46942009-01-03 21:51:57 +000048#include "polarssl/arc4.h"
49#include "polarssl/des.h"
50#include "polarssl/aes.h"
Paul Bakker3d58fe82012-07-04 17:15:31 +000051#include "polarssl/blowfish.h"
Paul Bakker38119b12009-01-10 23:31:23 +000052#include "polarssl/camellia.h"
Paul Bakker89e80c92012-03-20 13:50:09 +000053#include "polarssl/gcm.h"
Manuel Pégourié-Gonnard58d78a82014-05-07 12:03:02 +020054#include "polarssl/ccm.h"
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +020055#include "polarssl/havege.h"
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +020056#include "polarssl/ctr_drbg.h"
Manuel Pégourié-Gonnardfef0f8f2014-01-30 20:59:00 +010057#include "polarssl/hmac_drbg.h"
Paul Bakker40e46942009-01-03 21:51:57 +000058#include "polarssl/rsa.h"
Manuel Pégourié-Gonnarde870c0a2012-11-08 11:31:48 +010059#include "polarssl/dhm.h"
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +020060#include "polarssl/ecdsa.h"
61#include "polarssl/ecdh.h"
Gergely Budaia5d336b2014-01-27 23:27:06 +010062#include "polarssl/error.h"
Paul Bakker5121ce52009-01-03 21:22:43 +000063
Manuel Pégourié-Gonnard128657d2014-12-18 16:35:52 +000064#if defined(POLARSSL_MEMORY_BUFFER_ALLOC_C)
65#include "polarssl/memory_buffer_alloc.h"
Rich Evans18b78c72015-02-11 14:06:19 +000066#endif
67
Manuel Pégourié-Gonnard2f77ce32013-10-03 11:59:57 +020068#if defined _MSC_VER && !defined snprintf
69#define snprintf _snprintf
70#endif
71
Paul Bakker02faf452011-11-29 11:23:58 +000072#define BUFSIZE 1024
Manuel Pégourié-Gonnardfef0f8f2014-01-30 20:59:00 +010073#define HEADER_FORMAT " %-24s : "
Gergely Budaia5d336b2014-01-27 23:27:06 +010074#define TITLE_LEN 25
Manuel Pégourié-Gonnard6c5abfa2015-02-13 14:12:07 +000075
Rich Evans85b05ec2015-02-12 11:37:29 +000076#define DHM_SIZES 3
77
78#define OPTIONS \
79 "md4, md5, ripemd160, sha1, sha256, sha512,\n" \
80 "arc4, des3, des, aes_cbc, aes_gcm, aes_ccm, camellia, blowfish,\n" \
81 "havege, ctr_drbg, hmac_drbg\n" \
82 "rsa, dhm, ecdsa, ecdh.\n"
83
84#if defined(POLARSSL_ERROR_C)
85#define PRINT_ERROR \
86 polarssl_strerror( ret, ( char * )tmp, sizeof( tmp ) ); \
87 polarssl_printf( "FAILED: %s\n", tmp );
88#else
89#define PRINT_ERROR \
90 polarssl_printf( "FAILED: -0x%04x\n", -ret );
91#endif
92
93#define TIME_AND_TSC( TITLE, CODE ) \
94do { \
95 unsigned long i, j, tsc; \
96 \
97 polarssl_printf( HEADER_FORMAT, TITLE ); \
98 fflush( stdout ); \
99 \
100 set_alarm( 1 ); \
101 for( i = 1; ! alarmed; i++ ) \
102 { \
103 CODE; \
104 } \
105 \
106 tsc = hardclock(); \
107 for( j = 0; j < 1024; j++ ) \
108 { \
109 CODE; \
110 } \
111 \
112 polarssl_printf( "%9lu Kb/s, %9lu cycles/byte\n", i * BUFSIZE / 1024, \
113 ( hardclock() - tsc ) / ( j * BUFSIZE ) ); \
114} while( 0 )
115
116#define TIME_PUBLIC( TITLE, TYPE, CODE ) \
117do { \
118 unsigned long i; \
119 int ret; \
120 \
121 polarssl_printf( HEADER_FORMAT, TITLE ); \
122 fflush( stdout ); \
123 set_alarm( 3 ); \
124 \
125 ret = 0; \
126 for( i = 1; ! alarmed && ! ret ; i++ ) \
127 { \
128 CODE; \
129 } \
130 \
131 if( ret != 0 ) \
132 { \
133PRINT_ERROR; \
134 } \
135 else \
136 polarssl_printf( "%9lu " TYPE "/s\n", i / 3 ); \
137} while( 0 )
Paul Bakker5121ce52009-01-03 21:22:43 +0000138
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200139#if !defined(POLARSSL_TIMING_C)
Rich Evans85b05ec2015-02-12 11:37:29 +0000140int main( void )
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200141{
Rich Evansf90016a2015-01-19 14:26:37 +0000142 polarssl_printf("POLARSSL_TIMING_C not defined.\n");
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200143 return( 0 );
144}
145#else
Paul Bakkera3d195c2011-11-27 21:07:34 +0000146static int myrand( void *rng_state, unsigned char *output, size_t len )
Paul Bakker5121ce52009-01-03 21:22:43 +0000147{
Paul Bakkera3d195c2011-11-27 21:07:34 +0000148 size_t use_len;
149 int rnd;
150
Paul Bakker5121ce52009-01-03 21:22:43 +0000151 if( rng_state != NULL )
152 rng_state = NULL;
153
Paul Bakkera3d195c2011-11-27 21:07:34 +0000154 while( len > 0 )
155 {
156 use_len = len;
157 if( use_len > sizeof(int) )
158 use_len = sizeof(int);
159
160 rnd = rand();
161 memcpy( output, &rnd, use_len );
162 output += use_len;
163 len -= use_len;
164 }
165
166 return( 0 );
Paul Bakker5121ce52009-01-03 21:22:43 +0000167}
168
169unsigned char buf[BUFSIZE];
170
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200171typedef struct {
Paul Bakker61b699e2014-01-22 13:35:29 +0100172 char md4, md5, ripemd160, sha1, sha256, sha512,
Manuel Pégourié-Gonnard58d78a82014-05-07 12:03:02 +0200173 arc4, des3, des, aes_cbc, aes_gcm, aes_ccm, camellia, blowfish,
Manuel Pégourié-Gonnardfef0f8f2014-01-30 20:59:00 +0100174 havege, ctr_drbg, hmac_drbg,
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +0200175 rsa, dhm, ecdsa, ecdh;
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200176} todo_list;
177
Paul Bakkercce9d772011-11-18 14:26:47 +0000178int main( int argc, char *argv[] )
Paul Bakker5690efc2011-05-26 13:16:06 +0000179{
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200180 int keysize, i;
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +0200181 unsigned char tmp[200];
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200182 char title[TITLE_LEN];
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200183 todo_list todo;
Manuel Pégourié-Gonnard128657d2014-12-18 16:35:52 +0000184#if defined(POLARSSL_MEMORY_BUFFER_ALLOC_C)
185 unsigned char malloc_buf[1000000] = { 0 };
186#endif
Paul Bakkercce9d772011-11-18 14:26:47 +0000187
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200188 if( argc == 1 )
189 memset( &todo, 1, sizeof( todo ) );
190 else
191 {
192 memset( &todo, 0, sizeof( todo ) );
193
194 for( i = 1; i < argc; i++ )
195 {
196 if( strcmp( argv[i], "md4" ) == 0 )
197 todo.md4 = 1;
198 else if( strcmp( argv[i], "md5" ) == 0 )
199 todo.md5 = 1;
Paul Bakker61b699e2014-01-22 13:35:29 +0100200 else if( strcmp( argv[i], "ripemd160" ) == 0 )
201 todo.ripemd160 = 1;
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200202 else if( strcmp( argv[i], "sha1" ) == 0 )
203 todo.sha1 = 1;
204 else if( strcmp( argv[i], "sha256" ) == 0 )
205 todo.sha256 = 1;
206 else if( strcmp( argv[i], "sha512" ) == 0 )
207 todo.sha512 = 1;
208 else if( strcmp( argv[i], "arc4" ) == 0 )
209 todo.arc4 = 1;
210 else if( strcmp( argv[i], "des3" ) == 0 )
211 todo.des3 = 1;
212 else if( strcmp( argv[i], "des" ) == 0 )
213 todo.des = 1;
214 else if( strcmp( argv[i], "aes_cbc" ) == 0 )
215 todo.aes_cbc = 1;
216 else if( strcmp( argv[i], "aes_gcm" ) == 0 )
217 todo.aes_gcm = 1;
Manuel Pégourié-Gonnard58d78a82014-05-07 12:03:02 +0200218 else if( strcmp( argv[i], "aes_ccm" ) == 0 )
219 todo.aes_ccm = 1;
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200220 else if( strcmp( argv[i], "camellia" ) == 0 )
221 todo.camellia = 1;
222 else if( strcmp( argv[i], "blowfish" ) == 0 )
223 todo.blowfish = 1;
224 else if( strcmp( argv[i], "havege" ) == 0 )
225 todo.havege = 1;
226 else if( strcmp( argv[i], "ctr_drbg" ) == 0 )
227 todo.ctr_drbg = 1;
Manuel Pégourié-Gonnardfef0f8f2014-01-30 20:59:00 +0100228 else if( strcmp( argv[i], "hmac_drbg" ) == 0 )
229 todo.hmac_drbg = 1;
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200230 else if( strcmp( argv[i], "rsa" ) == 0 )
231 todo.rsa = 1;
232 else if( strcmp( argv[i], "dhm" ) == 0 )
233 todo.dhm = 1;
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +0200234 else if( strcmp( argv[i], "ecdsa" ) == 0 )
235 todo.ecdsa = 1;
236 else if( strcmp( argv[i], "ecdh" ) == 0 )
237 todo.ecdh = 1;
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200238 else
239 {
Rich Evansf90016a2015-01-19 14:26:37 +0000240 polarssl_printf( "Unrecognized option: %s\n", argv[i] );
241 polarssl_printf( "Available options: " OPTIONS );
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200242 }
243 }
244 }
Paul Bakker5121ce52009-01-03 21:22:43 +0000245
Rich Evansf90016a2015-01-19 14:26:37 +0000246 polarssl_printf( "\n" );
Paul Bakker5121ce52009-01-03 21:22:43 +0000247
Manuel Pégourié-Gonnard128657d2014-12-18 16:35:52 +0000248#if defined(POLARSSL_MEMORY_BUFFER_ALLOC_C)
249 memory_buffer_alloc_init( malloc_buf, sizeof( malloc_buf ) );
250#endif
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200251 memset( buf, 0xAA, sizeof( buf ) );
Paul Bakkerdf71dd12014-04-17 16:03:48 +0200252 memset( tmp, 0xBB, sizeof( tmp ) );
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200253
Paul Bakker40e46942009-01-03 21:51:57 +0000254#if defined(POLARSSL_MD4_C)
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200255 if( todo.md4 )
256 TIME_AND_TSC( "MD4", md4( buf, BUFSIZE, tmp ) );
Paul Bakker5121ce52009-01-03 21:22:43 +0000257#endif
258
Paul Bakker40e46942009-01-03 21:51:57 +0000259#if defined(POLARSSL_MD5_C)
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200260 if( todo.md5 )
261 TIME_AND_TSC( "MD5", md5( buf, BUFSIZE, tmp ) );
Paul Bakker5121ce52009-01-03 21:22:43 +0000262#endif
263
Paul Bakker61b699e2014-01-22 13:35:29 +0100264#if defined(POLARSSL_RIPEMD160_C)
265 if( todo.ripemd160 )
266 TIME_AND_TSC( "RIPEMD160", ripemd160( buf, BUFSIZE, tmp ) );
Manuel Pégourié-Gonnard01b0b382014-01-17 14:29:46 +0100267#endif
268
Paul Bakker40e46942009-01-03 21:51:57 +0000269#if defined(POLARSSL_SHA1_C)
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200270 if( todo.sha1 )
271 TIME_AND_TSC( "SHA-1", sha1( buf, BUFSIZE, tmp ) );
Paul Bakker5121ce52009-01-03 21:22:43 +0000272#endif
273
Paul Bakker9e36f042013-06-30 14:34:05 +0200274#if defined(POLARSSL_SHA256_C)
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200275 if( todo.sha256 )
276 TIME_AND_TSC( "SHA-256", sha256( buf, BUFSIZE, tmp, 0 ) );
Paul Bakker5121ce52009-01-03 21:22:43 +0000277#endif
278
Paul Bakker9e36f042013-06-30 14:34:05 +0200279#if defined(POLARSSL_SHA512_C)
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200280 if( todo.sha512 )
281 TIME_AND_TSC( "SHA-512", sha512( buf, BUFSIZE, tmp, 0 ) );
Paul Bakker3a3c3c22009-02-09 22:33:30 +0000282#endif
283
Paul Bakker40e46942009-01-03 21:51:57 +0000284#if defined(POLARSSL_ARC4_C)
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200285 if( todo.arc4 )
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200286 {
287 arc4_context arc4;
Paul Bakker8cfd9d82014-06-18 11:16:11 +0200288 arc4_init( &arc4 );
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200289 arc4_setup( &arc4, tmp, 32 );
290 TIME_AND_TSC( "ARC4", arc4_crypt( &arc4, BUFSIZE, buf, buf ) );
Paul Bakker8cfd9d82014-06-18 11:16:11 +0200291 arc4_free( &arc4 );
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200292 }
Paul Bakker5121ce52009-01-03 21:22:43 +0000293#endif
294
Manuel Pégourié-Gonnard92cb1d32013-09-13 16:24:20 +0200295#if defined(POLARSSL_DES_C) && defined(POLARSSL_CIPHER_MODE_CBC)
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200296 if( todo.des3 )
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200297 {
298 des3_context des3;
Paul Bakker8cfd9d82014-06-18 11:16:11 +0200299 des3_init( &des3 );
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200300 des3_set3key_enc( &des3, tmp );
301 TIME_AND_TSC( "3DES",
302 des3_crypt_cbc( &des3, DES_ENCRYPT, BUFSIZE, tmp, buf, buf ) );
Paul Bakker8cfd9d82014-06-18 11:16:11 +0200303 des3_free( &des3 );
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200304 }
Paul Bakker5121ce52009-01-03 21:22:43 +0000305
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200306 if( todo.des )
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200307 {
308 des_context des;
Paul Bakker8cfd9d82014-06-18 11:16:11 +0200309 des_init( &des );
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200310 des_setkey_enc( &des, tmp );
311 TIME_AND_TSC( "DES",
312 des_crypt_cbc( &des, DES_ENCRYPT, BUFSIZE, tmp, buf, buf ) );
Paul Bakker8cfd9d82014-06-18 11:16:11 +0200313 des_free( &des );
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200314 }
Paul Bakker5121ce52009-01-03 21:22:43 +0000315#endif
316
Paul Bakker40e46942009-01-03 21:51:57 +0000317#if defined(POLARSSL_AES_C)
Manuel Pégourié-Gonnard92cb1d32013-09-13 16:24:20 +0200318#if defined(POLARSSL_CIPHER_MODE_CBC)
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200319 if( todo.aes_cbc )
Paul Bakker5121ce52009-01-03 21:22:43 +0000320 {
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200321 aes_context aes;
Paul Bakker8cfd9d82014-06-18 11:16:11 +0200322 aes_init( &aes );
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200323 for( keysize = 128; keysize <= 256; keysize += 64 )
324 {
Rich Evans783d9d12015-01-30 11:11:57 +0000325 polarssl_snprintf( title, sizeof( title ), "AES-CBC-%d", keysize );
Paul Bakker5121ce52009-01-03 21:22:43 +0000326
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200327 memset( buf, 0, sizeof( buf ) );
328 memset( tmp, 0, sizeof( tmp ) );
329 aes_setkey_enc( &aes, tmp, keysize );
Paul Bakker5121ce52009-01-03 21:22:43 +0000330
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200331 TIME_AND_TSC( title,
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200332 aes_crypt_cbc( &aes, AES_ENCRYPT, BUFSIZE, tmp, buf, buf ) );
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200333 }
Paul Bakker8cfd9d82014-06-18 11:16:11 +0200334 aes_free( &aes );
Paul Bakker5121ce52009-01-03 21:22:43 +0000335 }
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200336#endif
Paul Bakker89e80c92012-03-20 13:50:09 +0000337#if defined(POLARSSL_GCM_C)
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200338 if( todo.aes_gcm )
Paul Bakker89e80c92012-03-20 13:50:09 +0000339 {
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200340 gcm_context gcm;
341 for( keysize = 128; keysize <= 256; keysize += 64 )
342 {
Rich Evans783d9d12015-01-30 11:11:57 +0000343 polarssl_snprintf( title, sizeof( title ), "AES-GCM-%d", keysize );
Paul Bakker89e80c92012-03-20 13:50:09 +0000344
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200345 memset( buf, 0, sizeof( buf ) );
346 memset( tmp, 0, sizeof( tmp ) );
347 gcm_init( &gcm, POLARSSL_CIPHER_ID_AES, tmp, keysize );
Paul Bakker89e80c92012-03-20 13:50:09 +0000348
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200349 TIME_AND_TSC( title,
350 gcm_crypt_and_tag( &gcm, GCM_ENCRYPT, BUFSIZE, tmp,
351 12, NULL, 0, buf, buf, 16, tmp ) );
Paul Bakkerf70fe812013-12-16 16:43:10 +0100352
353 gcm_free( &gcm );
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200354 }
Paul Bakker89e80c92012-03-20 13:50:09 +0000355 }
356#endif
Manuel Pégourié-Gonnard58d78a82014-05-07 12:03:02 +0200357#if defined(POLARSSL_CCM_C)
358 if( todo.aes_ccm )
359 {
360 ccm_context ccm;
361 for( keysize = 128; keysize <= 256; keysize += 64 )
362 {
Rich Evans783d9d12015-01-30 11:11:57 +0000363 polarssl_snprintf( title, sizeof( title ), "AES-CCM-%d", keysize );
Manuel Pégourié-Gonnard58d78a82014-05-07 12:03:02 +0200364
365 memset( buf, 0, sizeof( buf ) );
366 memset( tmp, 0, sizeof( tmp ) );
367 ccm_init( &ccm, POLARSSL_CIPHER_ID_AES, tmp, keysize );
368
369 TIME_AND_TSC( title,
370 ccm_encrypt_and_tag( &ccm, BUFSIZE, tmp,
371 12, NULL, 0, buf, buf, tmp, 16 ) );
372
373 ccm_free( &ccm );
374 }
375 }
376#endif
Paul Bakker5121ce52009-01-03 21:22:43 +0000377#endif
378
Manuel Pégourié-Gonnard92cb1d32013-09-13 16:24:20 +0200379#if defined(POLARSSL_CAMELLIA_C) && defined(POLARSSL_CIPHER_MODE_CBC)
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200380 if( todo.camellia )
Paul Bakker38119b12009-01-10 23:31:23 +0000381 {
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200382 camellia_context camellia;
Paul Bakker8cfd9d82014-06-18 11:16:11 +0200383 camellia_init( &camellia );
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200384 for( keysize = 128; keysize <= 256; keysize += 64 )
385 {
Rich Evans783d9d12015-01-30 11:11:57 +0000386 polarssl_snprintf( title, sizeof( title ), "CAMELLIA-CBC-%d", keysize );
Paul Bakker38119b12009-01-10 23:31:23 +0000387
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200388 memset( buf, 0, sizeof( buf ) );
389 memset( tmp, 0, sizeof( tmp ) );
390 camellia_setkey_enc( &camellia, tmp, keysize );
Paul Bakker38119b12009-01-10 23:31:23 +0000391
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200392 TIME_AND_TSC( title,
393 camellia_crypt_cbc( &camellia, CAMELLIA_ENCRYPT,
394 BUFSIZE, tmp, buf, buf ) );
395 }
Paul Bakker8cfd9d82014-06-18 11:16:11 +0200396 camellia_free( &camellia );
Paul Bakker38119b12009-01-10 23:31:23 +0000397 }
398#endif
399
Manuel Pégourié-Gonnard92cb1d32013-09-13 16:24:20 +0200400#if defined(POLARSSL_BLOWFISH_C) && defined(POLARSSL_CIPHER_MODE_CBC)
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200401 if( todo.blowfish )
Paul Bakker3d58fe82012-07-04 17:15:31 +0000402 {
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200403 blowfish_context blowfish;
Paul Bakker8cfd9d82014-06-18 11:16:11 +0200404 blowfish_init( &blowfish );
405
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200406 for( keysize = 128; keysize <= 256; keysize += 64 )
407 {
Rich Evans783d9d12015-01-30 11:11:57 +0000408 polarssl_snprintf( title, sizeof( title ), "BLOWFISH-CBC-%d", keysize );
Paul Bakker3d58fe82012-07-04 17:15:31 +0000409
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200410 memset( buf, 0, sizeof( buf ) );
411 memset( tmp, 0, sizeof( tmp ) );
412 blowfish_setkey( &blowfish, tmp, keysize );
Paul Bakker3d58fe82012-07-04 17:15:31 +0000413
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200414 TIME_AND_TSC( title,
415 blowfish_crypt_cbc( &blowfish, BLOWFISH_ENCRYPT, BUFSIZE,
416 tmp, buf, buf ) );
417 }
Paul Bakker8cfd9d82014-06-18 11:16:11 +0200418
419 blowfish_free( &blowfish );
Paul Bakker3d58fe82012-07-04 17:15:31 +0000420 }
421#endif
422
Paul Bakker02faf452011-11-29 11:23:58 +0000423#if defined(POLARSSL_HAVEGE_C)
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200424 if( todo.havege )
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200425 {
426 havege_state hs;
427 havege_init( &hs );
428 TIME_AND_TSC( "HAVEGE", havege_random( &hs, buf, BUFSIZE ) );
Paul Bakkera317a982014-06-18 16:44:11 +0200429 havege_free( &hs );
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200430 }
Paul Bakker02faf452011-11-29 11:23:58 +0000431#endif
432
433#if defined(POLARSSL_CTR_DRBG_C)
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200434 if( todo.ctr_drbg )
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200435 {
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200436 ctr_drbg_context ctr_drbg;
Paul Bakker02faf452011-11-29 11:23:58 +0000437
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200438 if( ctr_drbg_init( &ctr_drbg, myrand, NULL, NULL, 0 ) != 0 )
Rich Evans77d36382015-01-30 12:12:11 +0000439 polarssl_exit(1);
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200440 TIME_AND_TSC( "CTR_DRBG (NOPR)",
441 if( ctr_drbg_random( &ctr_drbg, buf, BUFSIZE ) != 0 )
Rich Evans77d36382015-01-30 12:12:11 +0000442 polarssl_exit(1) );
Paul Bakker02faf452011-11-29 11:23:58 +0000443
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200444 if( ctr_drbg_init( &ctr_drbg, myrand, NULL, NULL, 0 ) != 0 )
Rich Evans77d36382015-01-30 12:12:11 +0000445 polarssl_exit(1);
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200446 ctr_drbg_set_prediction_resistance( &ctr_drbg, CTR_DRBG_PR_ON );
447 TIME_AND_TSC( "CTR_DRBG (PR)",
448 if( ctr_drbg_random( &ctr_drbg, buf, BUFSIZE ) != 0 )
Rich Evans77d36382015-01-30 12:12:11 +0000449 polarssl_exit(1) );
Paul Bakkera317a982014-06-18 16:44:11 +0200450 ctr_drbg_free( &ctr_drbg );
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200451 }
Paul Bakker02faf452011-11-29 11:23:58 +0000452#endif
453
Manuel Pégourié-Gonnardfef0f8f2014-01-30 20:59:00 +0100454#if defined(POLARSSL_HMAC_DRBG_C)
455 if( todo.hmac_drbg )
456 {
457 hmac_drbg_context hmac_drbg;
458 const md_info_t *md_info;
459
460#if defined(POLARSSL_SHA1_C)
461 if( ( md_info = md_info_from_type( POLARSSL_MD_SHA1 ) ) == NULL )
Rich Evans77d36382015-01-30 12:12:11 +0000462 polarssl_exit(1);
Manuel Pégourié-Gonnardfef0f8f2014-01-30 20:59:00 +0100463
464 if( hmac_drbg_init( &hmac_drbg, md_info, myrand, NULL, NULL, 0 ) != 0 )
Rich Evans77d36382015-01-30 12:12:11 +0000465 polarssl_exit(1);
Manuel Pégourié-Gonnardfef0f8f2014-01-30 20:59:00 +0100466 TIME_AND_TSC( "HMAC_DRBG SHA-1 (NOPR)",
467 if( hmac_drbg_random( &hmac_drbg, buf, BUFSIZE ) != 0 )
Rich Evans77d36382015-01-30 12:12:11 +0000468 polarssl_exit(1) );
Manuel Pégourié-Gonnardfef0f8f2014-01-30 20:59:00 +0100469 hmac_drbg_free( &hmac_drbg );
470
471 if( hmac_drbg_init( &hmac_drbg, md_info, myrand, NULL, NULL, 0 ) != 0 )
Rich Evans77d36382015-01-30 12:12:11 +0000472 polarssl_exit(1);
Manuel Pégourié-Gonnardfef0f8f2014-01-30 20:59:00 +0100473 hmac_drbg_set_prediction_resistance( &hmac_drbg,
474 POLARSSL_HMAC_DRBG_PR_ON );
475 TIME_AND_TSC( "HMAC_DRBG SHA-1 (PR)",
476 if( hmac_drbg_random( &hmac_drbg, buf, BUFSIZE ) != 0 )
Rich Evans77d36382015-01-30 12:12:11 +0000477 polarssl_exit(1) );
Manuel Pégourié-Gonnardfef0f8f2014-01-30 20:59:00 +0100478 hmac_drbg_free( &hmac_drbg );
479#endif
480
481#if defined(POLARSSL_SHA256_C)
482 if( ( md_info = md_info_from_type( POLARSSL_MD_SHA256 ) ) == NULL )
Rich Evans77d36382015-01-30 12:12:11 +0000483 polarssl_exit(1);
Manuel Pégourié-Gonnardfef0f8f2014-01-30 20:59:00 +0100484
485 if( hmac_drbg_init( &hmac_drbg, md_info, myrand, NULL, NULL, 0 ) != 0 )
Rich Evans77d36382015-01-30 12:12:11 +0000486 polarssl_exit(1);
Manuel Pégourié-Gonnardfef0f8f2014-01-30 20:59:00 +0100487 TIME_AND_TSC( "HMAC_DRBG SHA-256 (NOPR)",
488 if( hmac_drbg_random( &hmac_drbg, buf, BUFSIZE ) != 0 )
Rich Evans77d36382015-01-30 12:12:11 +0000489 polarssl_exit(1) );
Manuel Pégourié-Gonnardfef0f8f2014-01-30 20:59:00 +0100490 hmac_drbg_free( &hmac_drbg );
491
492 if( hmac_drbg_init( &hmac_drbg, md_info, myrand, NULL, NULL, 0 ) != 0 )
Rich Evans77d36382015-01-30 12:12:11 +0000493 polarssl_exit(1);
Manuel Pégourié-Gonnardfef0f8f2014-01-30 20:59:00 +0100494 hmac_drbg_set_prediction_resistance( &hmac_drbg,
495 POLARSSL_HMAC_DRBG_PR_ON );
496 TIME_AND_TSC( "HMAC_DRBG SHA-256 (PR)",
497 if( hmac_drbg_random( &hmac_drbg, buf, BUFSIZE ) != 0 )
Rich Evans77d36382015-01-30 12:12:11 +0000498 polarssl_exit(1) );
Manuel Pégourié-Gonnardfef0f8f2014-01-30 20:59:00 +0100499 hmac_drbg_free( &hmac_drbg );
500#endif
501 }
502#endif
503
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200504#if defined(POLARSSL_RSA_C) && defined(POLARSSL_GENPRIME)
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200505 if( todo.rsa )
Paul Bakker5121ce52009-01-03 21:22:43 +0000506 {
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200507 rsa_context rsa;
508 for( keysize = 1024; keysize <= 4096; keysize *= 2 )
509 {
Rich Evans783d9d12015-01-30 11:11:57 +0000510 polarssl_snprintf( title, sizeof( title ), "RSA-%d", keysize );
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200511
512 rsa_init( &rsa, RSA_PKCS_V15, 0 );
513 rsa_gen_key( &rsa, myrand, NULL, keysize, 65537 );
514
515 TIME_PUBLIC( title, " public",
516 buf[0] = 0;
517 ret = rsa_public( &rsa, buf, buf ) );
518
519 TIME_PUBLIC( title, "private",
520 buf[0] = 0;
521 ret = rsa_private( &rsa, myrand, NULL, buf, buf ) );
522
523 rsa_free( &rsa );
524 }
Paul Bakker5121ce52009-01-03 21:22:43 +0000525 }
Paul Bakker5121ce52009-01-03 21:22:43 +0000526#endif
527
Manuel Pégourié-Gonnarde870c0a2012-11-08 11:31:48 +0100528#if defined(POLARSSL_DHM_C) && defined(POLARSSL_BIGNUM_C)
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200529 if( todo.dhm )
Manuel Pégourié-Gonnarde870c0a2012-11-08 11:31:48 +0100530 {
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200531 int dhm_sizes[DHM_SIZES] = { 1024, 2048, 3072 };
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200532 const char *dhm_P[DHM_SIZES] = {
533 POLARSSL_DHM_RFC5114_MODP_1024_P,
534 POLARSSL_DHM_RFC3526_MODP_2048_P,
535 POLARSSL_DHM_RFC3526_MODP_3072_P,
536 };
537 const char *dhm_G[DHM_SIZES] = {
538 POLARSSL_DHM_RFC5114_MODP_1024_G,
539 POLARSSL_DHM_RFC3526_MODP_2048_G,
540 POLARSSL_DHM_RFC3526_MODP_3072_G,
541 };
542
543 dhm_context dhm;
544 size_t olen;
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200545 for( i = 0; i < DHM_SIZES; i++ )
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200546 {
Paul Bakkera317a982014-06-18 16:44:11 +0200547 dhm_init( &dhm );
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200548
Paul Bakkercbe3d0d2014-04-17 16:00:59 +0200549 if( mpi_read_string( &dhm.P, 16, dhm_P[i] ) != 0 ||
550 mpi_read_string( &dhm.G, 16, dhm_G[i] ) != 0 )
551 {
Rich Evans77d36382015-01-30 12:12:11 +0000552 polarssl_exit( 1 );
Paul Bakkercbe3d0d2014-04-17 16:00:59 +0200553 }
554
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200555 dhm.len = mpi_size( &dhm.P );
Paul Bakker840ab202013-11-30 15:14:38 +0100556 dhm_make_public( &dhm, (int) dhm.len, buf, dhm.len, myrand, NULL );
Paul Bakkercbe3d0d2014-04-17 16:00:59 +0200557 if( mpi_copy( &dhm.GY, &dhm.GX ) != 0 )
Rich Evans77d36382015-01-30 12:12:11 +0000558 polarssl_exit( 1 );
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200559
Rich Evans783d9d12015-01-30 11:11:57 +0000560 polarssl_snprintf( title, sizeof( title ), "DHE-%d", dhm_sizes[i] );
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200561 TIME_PUBLIC( title, "handshake",
562 olen = sizeof( buf );
Paul Bakker840ab202013-11-30 15:14:38 +0100563 ret |= dhm_make_public( &dhm, (int) dhm.len, buf, dhm.len,
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200564 myrand, NULL );
565 ret |= dhm_calc_secret( &dhm, buf, &olen, myrand, NULL ) );
566
Rich Evans783d9d12015-01-30 11:11:57 +0000567 polarssl_snprintf( title, sizeof( title ), "DH-%d", dhm_sizes[i] );
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200568 TIME_PUBLIC( title, "handshake",
569 olen = sizeof( buf );
570 ret |= dhm_calc_secret( &dhm, buf, &olen, myrand, NULL ) );
571
572 dhm_free( &dhm );
573 }
Manuel Pégourié-Gonnarde870c0a2012-11-08 11:31:48 +0100574 }
Manuel Pégourié-Gonnarde870c0a2012-11-08 11:31:48 +0100575#endif
576
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +0200577#if defined(POLARSSL_ECDSA_C)
578 if( todo.ecdsa )
579 {
580 ecdsa_context ecdsa;
581 const ecp_curve_info *curve_info;
582 size_t sig_len;
583
584 memset( buf, 0x2A, sizeof( buf ) );
585
Manuel Pégourié-Gonnardda179e42013-09-18 15:31:24 +0200586 for( curve_info = ecp_curve_list();
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +0200587 curve_info->grp_id != POLARSSL_ECP_DP_NONE;
588 curve_info++ )
589 {
590 ecdsa_init( &ecdsa );
591
592 if( ecdsa_genkey( &ecdsa, curve_info->grp_id, myrand, NULL ) != 0 )
Rich Evans77d36382015-01-30 12:12:11 +0000593 polarssl_exit( 1 );
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +0200594
Rich Evans783d9d12015-01-30 11:11:57 +0000595 polarssl_snprintf( title, sizeof( title ), "ECDSA-%s",
Manuel Pégourié-Gonnard56cd3192013-09-17 17:23:07 +0200596 curve_info->name );
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +0200597 TIME_PUBLIC( title, "sign",
598 ret = ecdsa_write_signature( &ecdsa, buf, curve_info->size,
Manuel Pégourié-Gonnard56cd3192013-09-17 17:23:07 +0200599 tmp, &sig_len, myrand, NULL ) );
600
601 TIME_PUBLIC( title, "verify",
602 ret = ecdsa_read_signature( &ecdsa, buf, curve_info->size,
603 tmp, sig_len ) );
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +0200604
605 ecdsa_free( &ecdsa );
606 }
607 }
608#endif
609
610#if defined(POLARSSL_ECDH_C)
611 if( todo.ecdh )
612 {
613 ecdh_context ecdh;
614 const ecp_curve_info *curve_info;
615 size_t olen;
616
Manuel Pégourié-Gonnardda179e42013-09-18 15:31:24 +0200617 for( curve_info = ecp_curve_list();
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +0200618 curve_info->grp_id != POLARSSL_ECP_DP_NONE;
619 curve_info++ )
620 {
621 ecdh_init( &ecdh );
622
623 if( ecp_use_known_dp( &ecdh.grp, curve_info->grp_id ) != 0 ||
624 ecdh_make_public( &ecdh, &olen, buf, sizeof( buf),
625 myrand, NULL ) != 0 ||
626 ecp_copy( &ecdh.Qp, &ecdh.Q ) != 0 )
627 {
Rich Evans77d36382015-01-30 12:12:11 +0000628 polarssl_exit( 1 );
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +0200629 }
630
Rich Evans783d9d12015-01-30 11:11:57 +0000631 polarssl_snprintf( title, sizeof( title ), "ECDHE-%s",
Manuel Pégourié-Gonnard56cd3192013-09-17 17:23:07 +0200632 curve_info->name );
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +0200633 TIME_PUBLIC( title, "handshake",
634 ret |= ecdh_make_public( &ecdh, &olen, buf, sizeof( buf),
635 myrand, NULL );
636 ret |= ecdh_calc_secret( &ecdh, &olen, buf, sizeof( buf ),
637 myrand, NULL ) );
638
Rich Evans783d9d12015-01-30 11:11:57 +0000639 polarssl_snprintf( title, sizeof( title ), "ECDH-%s",
Manuel Pégourié-Gonnard56cd3192013-09-17 17:23:07 +0200640 curve_info->name );
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +0200641 TIME_PUBLIC( title, "handshake",
642 ret |= ecdh_calc_secret( &ecdh, &olen, buf, sizeof( buf ),
643 myrand, NULL ) );
644 ecdh_free( &ecdh );
645 }
646 }
647#endif
Rich Evansf90016a2015-01-19 14:26:37 +0000648 polarssl_printf( "\n" );
Paul Bakker1d4da2e2009-10-25 12:36:53 +0000649
Manuel Pégourié-Gonnard128657d2014-12-18 16:35:52 +0000650#if defined(POLARSSL_MEMORY_BUFFER_ALLOC_C)
651#if defined(POLARSSL_MEMORY_DEBUG)
652 memory_buffer_alloc_status();
653#endif
654 memory_buffer_alloc_free();
655#endif
656
Paul Bakkercce9d772011-11-18 14:26:47 +0000657#if defined(_WIN32)
Rich Evansf90016a2015-01-19 14:26:37 +0000658 polarssl_printf( " Press Enter to exit this program.\n" );
Paul Bakker5121ce52009-01-03 21:22:43 +0000659 fflush( stdout ); getchar();
660#endif
661
662 return( 0 );
663}
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200664
Paul Bakker5690efc2011-05-26 13:16:06 +0000665#endif /* POLARSSL_TIMING_C */