blob: d8237f544c1d98a88d4d64f0c62cc9e5909595f2 [file] [log] [blame]
Paul Bakker5121ce52009-01-03 21:22:43 +00001/*
2 * Benchmark demonstration program
3 *
Bence Szépkúti1e148272020-08-07 13:07:28 +02004 * Copyright The Mbed TLS Contributors
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02005 * SPDX-License-Identifier: Apache-2.0
6 *
7 * Licensed under the Apache License, Version 2.0 (the "License"); you may
8 * not use this file except in compliance with the License.
9 * You may obtain a copy of the License at
10 *
11 * http://www.apache.org/licenses/LICENSE-2.0
12 *
13 * Unless required by applicable law or agreed to in writing, software
14 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
15 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16 * See the License for the specific language governing permissions and
17 * limitations under the License.
Paul Bakker5121ce52009-01-03 21:22:43 +000018 */
19
Mateusz Starzyk6c2e9b62021-05-19 17:54:54 +020020#define MBEDTLS_ALLOW_PRIVATE_ACCESS
21
Bence Szépkútic662b362021-05-27 11:25:03 +020022#include "mbedtls/build_info.h"
Paul Bakker5121ce52009-01-03 21:22:43 +000023
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000024#include "mbedtls/platform.h"
Rich Evansf90016a2015-01-19 14:26:37 +000025
Andrzej Kurek6056e7a2022-03-02 12:01:10 -050026#if !defined(MBEDTLS_HAVE_TIME)
Gilles Peskine449bd832023-01-11 14:50:10 +010027int main(void)
Manuel Pégourié-Gonnard714929b2015-02-16 17:32:47 +000028{
Andrzej Kurek6056e7a2022-03-02 12:01:10 -050029 mbedtls_printf("MBEDTLS_HAVE_TIME not defined.\n");
Gilles Peskine449bd832023-01-11 14:50:10 +010030 mbedtls_exit(0);
Manuel Pégourié-Gonnard714929b2015-02-16 17:32:47 +000031}
32#else
Manuel Pégourié-Gonnard50da0482014-12-19 12:10:37 +010033
Manuel Pégourié-Gonnard714929b2015-02-16 17:32:47 +000034#include <string.h>
Manuel Pégourié-Gonnard7551cb92015-05-26 16:04:06 +020035#include <stdlib.h>
Manuel Pégourié-Gonnard50da0482014-12-19 12:10:37 +010036
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000037#include "mbedtls/md5.h"
38#include "mbedtls/ripemd160.h"
39#include "mbedtls/sha1.h"
40#include "mbedtls/sha256.h"
41#include "mbedtls/sha512.h"
Pol Henarejosebb36402022-05-20 14:26:00 +020042#include "mbedtls/sha3.h"
Manuel Pégourié-Gonnard62e813c2018-02-21 10:47:47 +010043
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000044#include "mbedtls/des.h"
45#include "mbedtls/aes.h"
Manuel Pégourié-Gonnard62e813c2018-02-21 10:47:47 +010046#include "mbedtls/aria.h"
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000047#include "mbedtls/camellia.h"
Daniel King34b822c2016-05-15 17:28:08 -030048#include "mbedtls/chacha20.h"
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000049#include "mbedtls/gcm.h"
50#include "mbedtls/ccm.h"
Manuel Pégourié-Gonnardd6aea182018-05-09 10:21:28 +020051#include "mbedtls/chachapoly.h"
Simon Butcher549dc3d2016-10-05 14:14:19 +010052#include "mbedtls/cmac.h"
Daniel Kingadc32c02016-05-16 18:25:45 -030053#include "mbedtls/poly1305.h"
Manuel Pégourié-Gonnard62e813c2018-02-21 10:47:47 +010054
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000055#include "mbedtls/ctr_drbg.h"
56#include "mbedtls/hmac_drbg.h"
Manuel Pégourié-Gonnard62e813c2018-02-21 10:47:47 +010057
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000058#include "mbedtls/rsa.h"
59#include "mbedtls/dhm.h"
60#include "mbedtls/ecdsa.h"
61#include "mbedtls/ecdh.h"
Manuel Pégourié-Gonnard62e813c2018-02-21 10:47:47 +010062
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000063#include "mbedtls/error.h"
Paul Bakker5121ce52009-01-03 21:22:43 +000064
David Horstmanne3d8f312023-01-03 11:07:09 +000065/* *INDENT-OFF* */
TRodziewicz90f304f2021-06-11 11:56:47 +020066#ifndef asm
67#define asm __asm
68#endif
David Horstmanne3d8f312023-01-03 11:07:09 +000069/* *INDENT-ON* */
TRodziewicz90f304f2021-06-11 11:56:47 +020070
TRodziewiczd8540832021-06-10 15:16:50 +020071#if defined(_WIN32) && !defined(EFIX64) && !defined(EFI32)
72
73#include <windows.h>
74#include <process.h>
75
Gilles Peskine449bd832023-01-11 14:50:10 +010076struct _hr_time {
TRodziewiczd8540832021-06-10 15:16:50 +020077 LARGE_INTEGER start;
78};
79
80#else
81
82#include <unistd.h>
83#include <sys/types.h>
84#include <sys/time.h>
85#include <signal.h>
86#include <time.h>
87
Gilles Peskine449bd832023-01-11 14:50:10 +010088struct _hr_time {
TRodziewiczd8540832021-06-10 15:16:50 +020089 struct timeval start;
90};
91
92#endif /* _WIN32 && !EFIX64 && !EFI32 */
93
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020094#if defined(MBEDTLS_MEMORY_BUFFER_ALLOC_C)
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000095#include "mbedtls/memory_buffer_alloc.h"
Rich Evans18b78c72015-02-11 14:06:19 +000096#endif
97
Gilles Peskine449bd832023-01-11 14:50:10 +010098static void mbedtls_set_alarm(int seconds);
TRodziewiczd8540832021-06-10 15:16:50 +020099
Manuel Pégourié-Gonnard714929b2015-02-16 17:32:47 +0000100/*
101 * For heap usage estimates, we need an estimate of the overhead per allocated
102 * block. ptmalloc2/3 (used in gnu libc for instance) uses 2 size_t per block,
103 * so use that as our baseline.
104 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100105#define MEM_BLOCK_OVERHEAD (2 * sizeof(size_t))
Manuel Pégourié-Gonnard714929b2015-02-16 17:32:47 +0000106
107/*
Manuel Pégourié-Gonnardb2a18a22015-05-27 16:29:56 +0200108 * Size to use for the alloc buffer if MEMORY_BUFFER_ALLOC_C is defined.
Manuel Pégourié-Gonnard714929b2015-02-16 17:32:47 +0000109 */
Christoph M. Wintersteiger0bc9c692018-10-25 12:47:18 +0100110#define HEAP_SIZE (1u << 16) /* 64k */
Manuel Pégourié-Gonnard714929b2015-02-16 17:32:47 +0000111
Paul Bakker02faf452011-11-29 11:23:58 +0000112#define BUFSIZE 1024
Manuel Pégourié-Gonnardfef0f8f2014-01-30 20:59:00 +0100113#define HEADER_FORMAT " %-24s : "
Gergely Budaia5d336b2014-01-27 23:27:06 +0100114#define TITLE_LEN 25
Manuel Pégourié-Gonnard6c5abfa2015-02-13 14:12:07 +0000115
Yanray Wang022b9a12023-09-12 09:45:37 +0800116#define OPTIONS \
117 "md5, ripemd160, sha1, sha256, sha512,\n" \
118 "sha3_224, sha3_256, sha3_384, sha3_512,\n" \
119 "des3, des, camellia, chacha20,\n" \
120 "aes_cbc, aes_cfb128, aes_cfb8, aes_gcm, aes_ccm, aes_xts, chachapoly\n" \
121 "aes_cmac, des3_cmac, poly1305\n" \
122 "ctr_drbg, hmac_drbg\n" \
Rich Evans85b05ec2015-02-12 11:37:29 +0000123 "rsa, dhm, ecdsa, ecdh.\n"
124
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200125#if defined(MBEDTLS_ERROR_C)
Rich Evans85b05ec2015-02-12 11:37:29 +0000126#define PRINT_ERROR \
Gilles Peskine449bd832023-01-11 14:50:10 +0100127 mbedtls_strerror(ret, (char *) tmp, sizeof(tmp)); \
128 mbedtls_printf("FAILED: %s\n", tmp);
Rich Evans85b05ec2015-02-12 11:37:29 +0000129#else
130#define PRINT_ERROR \
Gilles Peskine449bd832023-01-11 14:50:10 +0100131 mbedtls_printf("FAILED: -0x%04x\n", (unsigned int) -ret);
Rich Evans85b05ec2015-02-12 11:37:29 +0000132#endif
133
Gilles Peskine449bd832023-01-11 14:50:10 +0100134#define TIME_AND_TSC(TITLE, CODE) \
135 do { \
136 unsigned long ii, jj, tsc; \
137 int ret = 0; \
Rich Evans85b05ec2015-02-12 11:37:29 +0000138 \
Gilles Peskine449bd832023-01-11 14:50:10 +0100139 mbedtls_printf(HEADER_FORMAT, TITLE); \
140 fflush(stdout); \
Rich Evans85b05ec2015-02-12 11:37:29 +0000141 \
Gilles Peskine449bd832023-01-11 14:50:10 +0100142 mbedtls_set_alarm(1); \
143 for (ii = 1; ret == 0 && !mbedtls_timing_alarmed; ii++) \
144 { \
145 ret = CODE; \
146 } \
Rich Evans85b05ec2015-02-12 11:37:29 +0000147 \
Gilles Peskine449bd832023-01-11 14:50:10 +0100148 tsc = mbedtls_timing_hardclock(); \
149 for (jj = 0; ret == 0 && jj < 1024; jj++) \
150 { \
151 ret = CODE; \
152 } \
Rich Evans85b05ec2015-02-12 11:37:29 +0000153 \
Gilles Peskine449bd832023-01-11 14:50:10 +0100154 if (ret != 0) \
155 { \
156 PRINT_ERROR; \
157 } \
158 else \
159 { \
160 mbedtls_printf("%9lu KiB/s, %9lu cycles/byte\n", \
161 ii * BUFSIZE / 1024, \
162 (mbedtls_timing_hardclock() - tsc) \
163 / (jj * BUFSIZE)); \
164 } \
165 } while (0)
Rich Evans85b05ec2015-02-12 11:37:29 +0000166
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200167#if defined(MBEDTLS_MEMORY_BUFFER_ALLOC_C) && defined(MBEDTLS_MEMORY_DEBUG)
Manuel Pégourié-Gonnard50da0482014-12-19 12:10:37 +0100168
Manuel Pégourié-Gonnard5edd3882020-04-09 10:40:03 +0200169/* How much space to reserve for the title when printing heap usage results.
170 * Updated manually as the output of the following command:
171 *
172 * sed -n 's/.*[T]IME_PUBLIC.*"\(.*\)",/\1/p' programs/test/benchmark.c |
Manuel Pégourié-Gonnardbf5b46c2022-01-05 10:34:17 +0100173 * awk '{print length+3}' | sort -rn | head -n1
Manuel Pégourié-Gonnard5edd3882020-04-09 10:40:03 +0200174 *
Manuel Pégourié-Gonnardbf5b46c2022-01-05 10:34:17 +0100175 * This computes the maximum length of a title +3, because we appends "/s" and
176 * want at least one space. (If the value is too small, the only consequence
Shaun Case8b0ecbc2021-12-20 21:14:10 -0800177 * is poor alignment.) */
Manuel Pégourié-Gonnardbf5b46c2022-01-05 10:34:17 +0100178#define TITLE_SPACE 17
Manuel Pégourié-Gonnard5edd3882020-04-09 10:40:03 +0200179
Manuel Pégourié-Gonnard50da0482014-12-19 12:10:37 +0100180#define MEMORY_MEASURE_INIT \
181 size_t max_used, max_blocks, max_bytes; \
182 size_t prv_used, prv_blocks; \
Manuel Pégourié-Gonnard6ced0022022-01-05 10:05:54 +0100183 size_t alloc_cnt, free_cnt, prv_alloc, prv_free; \
Gilles Peskine449bd832023-01-11 14:50:10 +0100184 mbedtls_memory_buffer_alloc_cur_get(&prv_used, &prv_blocks); \
185 mbedtls_memory_buffer_alloc_max_reset();
Manuel Pégourié-Gonnard50da0482014-12-19 12:10:37 +0100186
Manuel Pégourié-Gonnardc4055442022-01-04 10:24:01 +0100187#define MEMORY_MEASURE_RESET \
Gilles Peskine449bd832023-01-11 14:50:10 +0100188 mbedtls_memory_buffer_alloc_count_get(&prv_alloc, &prv_free);
Manuel Pégourié-Gonnardc4055442022-01-04 10:24:01 +0100189
Gilles Peskine449bd832023-01-11 14:50:10 +0100190#define MEMORY_MEASURE_PRINT(title_len) \
191 mbedtls_memory_buffer_alloc_max_get(&max_used, &max_blocks); \
192 mbedtls_memory_buffer_alloc_count_get(&alloc_cnt, &free_cnt); \
Manuel Pégourié-Gonnard5edd3882020-04-09 10:40:03 +0200193 ii = TITLE_SPACE > (title_len) ? TITLE_SPACE - (title_len) : 1; \
Gilles Peskine449bd832023-01-11 14:50:10 +0100194 while (ii--) mbedtls_printf(" "); \
Manuel Pégourié-Gonnard50da0482014-12-19 12:10:37 +0100195 max_used -= prv_used; \
196 max_blocks -= prv_blocks; \
197 max_bytes = max_used + MEM_BLOCK_OVERHEAD * max_blocks; \
Gilles Peskine449bd832023-01-11 14:50:10 +0100198 mbedtls_printf("%6u heap bytes, %6u allocs", \
199 (unsigned) max_bytes, \
200 (unsigned) (alloc_cnt - prv_alloc));
Manuel Pégourié-Gonnard50da0482014-12-19 12:10:37 +0100201
202#else
Manuel Pégourié-Gonnarde579dab2015-01-29 16:28:44 +0000203#define MEMORY_MEASURE_INIT
Manuel Pégourié-Gonnardc4055442022-01-04 10:24:01 +0100204#define MEMORY_MEASURE_RESET
Gilles Peskine449bd832023-01-11 14:50:10 +0100205#define MEMORY_MEASURE_PRINT(title_len)
Manuel Pégourié-Gonnard50da0482014-12-19 12:10:37 +0100206#endif
207
Gilles Peskine449bd832023-01-11 14:50:10 +0100208#define TIME_PUBLIC(TITLE, TYPE, CODE) \
209 do { \
210 unsigned long ii; \
211 int ret; \
212 MEMORY_MEASURE_INIT; \
Rich Evans85b05ec2015-02-12 11:37:29 +0000213 \
Gilles Peskine449bd832023-01-11 14:50:10 +0100214 mbedtls_printf(HEADER_FORMAT, TITLE); \
215 fflush(stdout); \
216 mbedtls_set_alarm(3); \
Rich Evans85b05ec2015-02-12 11:37:29 +0000217 \
Gilles Peskine449bd832023-01-11 14:50:10 +0100218 ret = 0; \
219 for (ii = 1; !mbedtls_timing_alarmed && !ret; ii++) \
220 { \
221 MEMORY_MEASURE_RESET; \
222 CODE; \
223 } \
Rich Evans85b05ec2015-02-12 11:37:29 +0000224 \
Gilles Peskine449bd832023-01-11 14:50:10 +0100225 if (ret == MBEDTLS_ERR_PLATFORM_FEATURE_UNSUPPORTED) \
226 { \
227 mbedtls_printf("Feature Not Supported. Skipping.\n"); \
228 ret = 0; \
229 } \
230 else if (ret != 0) \
231 { \
232 PRINT_ERROR; \
233 } \
234 else \
235 { \
236 mbedtls_printf("%6lu " TYPE "/s", ii / 3); \
237 MEMORY_MEASURE_PRINT(sizeof(TYPE) + 1); \
238 mbedtls_printf("\n"); \
239 } \
240 } while (0)
Paul Bakker5121ce52009-01-03 21:22:43 +0000241
TRodziewiczd8540832021-06-10 15:16:50 +0200242#if !defined(HAVE_HARDCLOCK) && defined(MBEDTLS_HAVE_ASM) && \
Gilles Peskine449bd832023-01-11 14:50:10 +0100243 (defined(_MSC_VER) && defined(_M_IX86)) || defined(__WATCOMC__)
TRodziewiczd8540832021-06-10 15:16:50 +0200244
245#define HAVE_HARDCLOCK
246
Gilles Peskine449bd832023-01-11 14:50:10 +0100247static unsigned long mbedtls_timing_hardclock(void)
TRodziewiczd8540832021-06-10 15:16:50 +0200248{
249 unsigned long tsc;
250 __asm rdtsc
Gilles Peskine449bd832023-01-11 14:50:10 +0100251 __asm mov[tsc], eax
252 return tsc;
TRodziewiczd8540832021-06-10 15:16:50 +0200253}
254#endif /* !HAVE_HARDCLOCK && MBEDTLS_HAVE_ASM &&
255 ( _MSC_VER && _M_IX86 ) || __WATCOMC__ */
256
257/* some versions of mingw-64 have 32-bit longs even on x84_64 */
258#if !defined(HAVE_HARDCLOCK) && defined(MBEDTLS_HAVE_ASM) && \
Gilles Peskine449bd832023-01-11 14:50:10 +0100259 defined(__GNUC__) && (defined(__i386__) || ( \
260 (defined(__amd64__) || defined(__x86_64__)) && __SIZEOF_LONG__ == 4))
TRodziewiczd8540832021-06-10 15:16:50 +0200261
262#define HAVE_HARDCLOCK
263
Gilles Peskine449bd832023-01-11 14:50:10 +0100264static unsigned long mbedtls_timing_hardclock(void)
TRodziewiczd8540832021-06-10 15:16:50 +0200265{
266 unsigned long lo, hi;
Gilles Peskine449bd832023-01-11 14:50:10 +0100267 asm volatile ("rdtsc" : "=a" (lo), "=d" (hi));
268 return lo;
TRodziewiczd8540832021-06-10 15:16:50 +0200269}
270#endif /* !HAVE_HARDCLOCK && MBEDTLS_HAVE_ASM &&
271 __GNUC__ && __i386__ */
272
273#if !defined(HAVE_HARDCLOCK) && defined(MBEDTLS_HAVE_ASM) && \
Gilles Peskine449bd832023-01-11 14:50:10 +0100274 defined(__GNUC__) && (defined(__amd64__) || defined(__x86_64__))
TRodziewiczd8540832021-06-10 15:16:50 +0200275
276#define HAVE_HARDCLOCK
277
Gilles Peskine449bd832023-01-11 14:50:10 +0100278static unsigned long mbedtls_timing_hardclock(void)
TRodziewiczd8540832021-06-10 15:16:50 +0200279{
280 unsigned long lo, hi;
Gilles Peskine449bd832023-01-11 14:50:10 +0100281 asm volatile ("rdtsc" : "=a" (lo), "=d" (hi));
282 return lo | (hi << 32);
TRodziewiczd8540832021-06-10 15:16:50 +0200283}
284#endif /* !HAVE_HARDCLOCK && MBEDTLS_HAVE_ASM &&
285 __GNUC__ && ( __amd64__ || __x86_64__ ) */
286
287#if !defined(HAVE_HARDCLOCK) && defined(MBEDTLS_HAVE_ASM) && \
Gilles Peskine449bd832023-01-11 14:50:10 +0100288 defined(__GNUC__) && (defined(__powerpc__) || defined(__ppc__))
TRodziewiczd8540832021-06-10 15:16:50 +0200289
290#define HAVE_HARDCLOCK
291
Gilles Peskine449bd832023-01-11 14:50:10 +0100292static unsigned long mbedtls_timing_hardclock(void)
TRodziewiczd8540832021-06-10 15:16:50 +0200293{
294 unsigned long tbl, tbu0, tbu1;
295
Gilles Peskine449bd832023-01-11 14:50:10 +0100296 do {
297 asm volatile ("mftbu %0" : "=r" (tbu0));
298 asm volatile ("mftb %0" : "=r" (tbl));
299 asm volatile ("mftbu %0" : "=r" (tbu1));
300 } while (tbu0 != tbu1);
TRodziewiczd8540832021-06-10 15:16:50 +0200301
Gilles Peskine449bd832023-01-11 14:50:10 +0100302 return tbl;
TRodziewiczd8540832021-06-10 15:16:50 +0200303}
304#endif /* !HAVE_HARDCLOCK && MBEDTLS_HAVE_ASM &&
305 __GNUC__ && ( __powerpc__ || __ppc__ ) */
306
307#if !defined(HAVE_HARDCLOCK) && defined(MBEDTLS_HAVE_ASM) && \
308 defined(__GNUC__) && defined(__sparc64__)
309
310#if defined(__OpenBSD__)
311#warning OpenBSD does not allow access to tick register using software version instead
312#else
313#define HAVE_HARDCLOCK
314
Gilles Peskine449bd832023-01-11 14:50:10 +0100315static unsigned long mbedtls_timing_hardclock(void)
TRodziewiczd8540832021-06-10 15:16:50 +0200316{
317 unsigned long tick;
Gilles Peskine449bd832023-01-11 14:50:10 +0100318 asm volatile ("rdpr %%tick, %0;" : "=&r" (tick));
319 return tick;
TRodziewiczd8540832021-06-10 15:16:50 +0200320}
321#endif /* __OpenBSD__ */
322#endif /* !HAVE_HARDCLOCK && MBEDTLS_HAVE_ASM &&
323 __GNUC__ && __sparc64__ */
324
325#if !defined(HAVE_HARDCLOCK) && defined(MBEDTLS_HAVE_ASM) && \
326 defined(__GNUC__) && defined(__sparc__) && !defined(__sparc64__)
327
328#define HAVE_HARDCLOCK
329
Gilles Peskine449bd832023-01-11 14:50:10 +0100330static unsigned long mbedtls_timing_hardclock(void)
TRodziewiczd8540832021-06-10 15:16:50 +0200331{
332 unsigned long tick;
Gilles Peskine449bd832023-01-11 14:50:10 +0100333 asm volatile (".byte 0x83, 0x41, 0x00, 0x00");
334 asm volatile ("mov %%g1, %0" : "=r" (tick));
335 return tick;
TRodziewiczd8540832021-06-10 15:16:50 +0200336}
337#endif /* !HAVE_HARDCLOCK && MBEDTLS_HAVE_ASM &&
338 __GNUC__ && __sparc__ && !__sparc64__ */
339
340#if !defined(HAVE_HARDCLOCK) && defined(MBEDTLS_HAVE_ASM) && \
341 defined(__GNUC__) && defined(__alpha__)
342
343#define HAVE_HARDCLOCK
344
Gilles Peskine449bd832023-01-11 14:50:10 +0100345static unsigned long mbedtls_timing_hardclock(void)
TRodziewiczd8540832021-06-10 15:16:50 +0200346{
347 unsigned long cc;
Gilles Peskine449bd832023-01-11 14:50:10 +0100348 asm volatile ("rpcc %0" : "=r" (cc));
349 return cc & 0xFFFFFFFF;
TRodziewiczd8540832021-06-10 15:16:50 +0200350}
351#endif /* !HAVE_HARDCLOCK && MBEDTLS_HAVE_ASM &&
352 __GNUC__ && __alpha__ */
353
354#if !defined(HAVE_HARDCLOCK) && defined(MBEDTLS_HAVE_ASM) && \
355 defined(__GNUC__) && defined(__ia64__)
356
357#define HAVE_HARDCLOCK
358
Gilles Peskine449bd832023-01-11 14:50:10 +0100359static unsigned long mbedtls_timing_hardclock(void)
TRodziewiczd8540832021-06-10 15:16:50 +0200360{
361 unsigned long itc;
Gilles Peskine449bd832023-01-11 14:50:10 +0100362 asm volatile ("mov %0 = ar.itc" : "=r" (itc));
363 return itc;
TRodziewiczd8540832021-06-10 15:16:50 +0200364}
365#endif /* !HAVE_HARDCLOCK && MBEDTLS_HAVE_ASM &&
366 __GNUC__ && __ia64__ */
367
Martin Storsjö5c1479d2022-04-22 13:11:42 +0300368#if !defined(HAVE_HARDCLOCK) && defined(_WIN32) && \
TRodziewiczd8540832021-06-10 15:16:50 +0200369 !defined(EFIX64) && !defined(EFI32)
370
371#define HAVE_HARDCLOCK
372
Gilles Peskine449bd832023-01-11 14:50:10 +0100373static unsigned long mbedtls_timing_hardclock(void)
TRodziewiczd8540832021-06-10 15:16:50 +0200374{
375 LARGE_INTEGER offset;
376
Gilles Peskine449bd832023-01-11 14:50:10 +0100377 QueryPerformanceCounter(&offset);
TRodziewiczd8540832021-06-10 15:16:50 +0200378
Gilles Peskine449bd832023-01-11 14:50:10 +0100379 return (unsigned long) (offset.QuadPart);
TRodziewiczd8540832021-06-10 15:16:50 +0200380}
Martin Storsjö5c1479d2022-04-22 13:11:42 +0300381#endif /* !HAVE_HARDCLOCK && _WIN32 && !EFIX64 && !EFI32 */
TRodziewiczd8540832021-06-10 15:16:50 +0200382
383#if !defined(HAVE_HARDCLOCK)
384
385#define HAVE_HARDCLOCK
386
387static int hardclock_init = 0;
388static struct timeval tv_init;
389
Gilles Peskine449bd832023-01-11 14:50:10 +0100390static unsigned long mbedtls_timing_hardclock(void)
TRodziewiczd8540832021-06-10 15:16:50 +0200391{
392 struct timeval tv_cur;
393
Gilles Peskine449bd832023-01-11 14:50:10 +0100394 if (hardclock_init == 0) {
395 gettimeofday(&tv_init, NULL);
TRodziewiczd8540832021-06-10 15:16:50 +0200396 hardclock_init = 1;
397 }
398
Gilles Peskine449bd832023-01-11 14:50:10 +0100399 gettimeofday(&tv_cur, NULL);
400 return (tv_cur.tv_sec - tv_init.tv_sec) * 1000000U
401 + (tv_cur.tv_usec - tv_init.tv_usec);
TRodziewiczd8540832021-06-10 15:16:50 +0200402}
403#endif /* !HAVE_HARDCLOCK */
404
405volatile int mbedtls_timing_alarmed = 0;
406
407#if defined(_WIN32) && !defined(EFIX64) && !defined(EFI32)
408
409/* It's OK to use a global because alarm() is supposed to be global anyway */
410static DWORD alarmMs;
411
Gilles Peskine449bd832023-01-11 14:50:10 +0100412static void TimerProc(void *TimerContext)
TRodziewiczd8540832021-06-10 15:16:50 +0200413{
414 (void) TimerContext;
Gilles Peskine449bd832023-01-11 14:50:10 +0100415 Sleep(alarmMs);
TRodziewiczd8540832021-06-10 15:16:50 +0200416 mbedtls_timing_alarmed = 1;
417 /* _endthread will be called implicitly on return
Tom Cosgrove1797b052022-12-04 17:19:59 +0000418 * That ensures execution of thread function's epilogue */
TRodziewiczd8540832021-06-10 15:16:50 +0200419}
420
Gilles Peskine449bd832023-01-11 14:50:10 +0100421static void mbedtls_set_alarm(int seconds)
TRodziewiczd8540832021-06-10 15:16:50 +0200422{
Gilles Peskine449bd832023-01-11 14:50:10 +0100423 if (seconds == 0) {
TRodziewiczd8540832021-06-10 15:16:50 +0200424 /* No need to create a thread for this simple case.
425 * Also, this shorcut is more reliable at least on MinGW32 */
426 mbedtls_timing_alarmed = 1;
427 return;
428 }
429
430 mbedtls_timing_alarmed = 0;
431 alarmMs = seconds * 1000;
Gilles Peskine449bd832023-01-11 14:50:10 +0100432 (void) _beginthread(TimerProc, 0, NULL);
TRodziewiczd8540832021-06-10 15:16:50 +0200433}
434
435#else /* _WIN32 && !EFIX64 && !EFI32 */
436
Gilles Peskine449bd832023-01-11 14:50:10 +0100437static void sighandler(int signum)
TRodziewiczd8540832021-06-10 15:16:50 +0200438{
439 mbedtls_timing_alarmed = 1;
Gilles Peskine449bd832023-01-11 14:50:10 +0100440 signal(signum, sighandler);
TRodziewiczd8540832021-06-10 15:16:50 +0200441}
442
Gilles Peskine449bd832023-01-11 14:50:10 +0100443static void mbedtls_set_alarm(int seconds)
TRodziewiczd8540832021-06-10 15:16:50 +0200444{
445 mbedtls_timing_alarmed = 0;
Gilles Peskine449bd832023-01-11 14:50:10 +0100446 signal(SIGALRM, sighandler);
447 alarm(seconds);
448 if (seconds == 0) {
TRodziewiczd8540832021-06-10 15:16:50 +0200449 /* alarm(0) cancelled any previous pending alarm, but the
450 handler won't fire, so raise the flag straight away. */
451 mbedtls_timing_alarmed = 1;
452 }
453}
454
455#endif /* _WIN32 && !EFIX64 && !EFI32 */
456
Gilles Peskine449bd832023-01-11 14:50:10 +0100457static int myrand(void *rng_state, unsigned char *output, size_t len)
Paul Bakker5121ce52009-01-03 21:22:43 +0000458{
Paul Bakkera3d195c2011-11-27 21:07:34 +0000459 size_t use_len;
460 int rnd;
461
Gilles Peskine449bd832023-01-11 14:50:10 +0100462 if (rng_state != NULL) {
Paul Bakker5121ce52009-01-03 21:22:43 +0000463 rng_state = NULL;
Gilles Peskine449bd832023-01-11 14:50:10 +0100464 }
Paul Bakker5121ce52009-01-03 21:22:43 +0000465
Gilles Peskine449bd832023-01-11 14:50:10 +0100466 while (len > 0) {
Paul Bakkera3d195c2011-11-27 21:07:34 +0000467 use_len = len;
Gilles Peskine449bd832023-01-11 14:50:10 +0100468 if (use_len > sizeof(int)) {
Paul Bakkera3d195c2011-11-27 21:07:34 +0000469 use_len = sizeof(int);
Gilles Peskine449bd832023-01-11 14:50:10 +0100470 }
Paul Bakkera3d195c2011-11-27 21:07:34 +0000471
472 rnd = rand();
Gilles Peskine449bd832023-01-11 14:50:10 +0100473 memcpy(output, &rnd, use_len);
Paul Bakkera3d195c2011-11-27 21:07:34 +0000474 output += use_len;
475 len -= use_len;
476 }
477
Gilles Peskine449bd832023-01-11 14:50:10 +0100478 return 0;
Paul Bakker5121ce52009-01-03 21:22:43 +0000479}
480
Gilles Peskine449bd832023-01-11 14:50:10 +0100481#define CHECK_AND_CONTINUE(R) \
Christoph M. Wintersteiger21411d22019-02-06 18:06:15 +0000482 { \
Gilles Peskine449bd832023-01-11 14:50:10 +0100483 int CHECK_AND_CONTINUE_ret = (R); \
484 if (CHECK_AND_CONTINUE_ret == MBEDTLS_ERR_PLATFORM_FEATURE_UNSUPPORTED) { \
485 mbedtls_printf("Feature not supported. Skipping.\n"); \
Christoph M. Wintersteiger21411d22019-02-06 18:06:15 +0000486 continue; \
487 } \
Gilles Peskine449bd832023-01-11 14:50:10 +0100488 else if (CHECK_AND_CONTINUE_ret != 0) { \
489 mbedtls_exit(1); \
Christoph M. Wintersteiger21411d22019-02-06 18:06:15 +0000490 } \
491 }
Christoph M. Wintersteiger3dca1a42018-12-14 11:54:59 +0000492
Gilles Peskine28f62f62020-07-24 02:06:46 +0200493#if defined(MBEDTLS_ECP_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100494static int set_ecp_curve(const char *string, mbedtls_ecp_curve_info *curve)
Gilles Peskine28f62f62020-07-24 02:06:46 +0200495{
496 const mbedtls_ecp_curve_info *found =
Gilles Peskine449bd832023-01-11 14:50:10 +0100497 mbedtls_ecp_curve_info_from_name(string);
498 if (found != NULL) {
Gilles Peskine28f62f62020-07-24 02:06:46 +0200499 *curve = *found;
Gilles Peskine449bd832023-01-11 14:50:10 +0100500 return 1;
501 } else {
502 return 0;
Gilles Peskine28f62f62020-07-24 02:06:46 +0200503 }
Gilles Peskine28f62f62020-07-24 02:06:46 +0200504}
505#endif
506
Paul Bakker5121ce52009-01-03 21:22:43 +0000507unsigned char buf[BUFSIZE];
508
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200509typedef struct {
TRodziewicz10e8cf52021-05-31 17:58:57 +0200510 char md5, ripemd160, sha1, sha256, sha512,
Pol Henarejosebb36402022-05-20 14:26:00 +0200511 sha3_224, sha3_256, sha3_384, sha3_512,
TRodziewicz10e8cf52021-05-31 17:58:57 +0200512 des3, des,
Yanray Wang022b9a12023-09-12 09:45:37 +0800513 aes_cbc, aes_cfb128, aes_cfb8, aes_gcm, aes_ccm, aes_xts, chachapoly,
Manuel Pégourié-Gonnardd6aea182018-05-09 10:21:28 +0200514 aes_cmac, des3_cmac,
TRodziewicz10e8cf52021-05-31 17:58:57 +0200515 aria, camellia, chacha20,
Daniel Kingadc32c02016-05-16 18:25:45 -0300516 poly1305,
Mateusz Starzyk0fdcc8e2021-01-29 16:46:31 +0100517 ctr_drbg, hmac_drbg,
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +0200518 rsa, dhm, ecdsa, ecdh;
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200519} todo_list;
520
Simon Butcher63cb97e2018-12-06 17:43:31 +0000521
Gilles Peskine449bd832023-01-11 14:50:10 +0100522int main(int argc, char *argv[])
Paul Bakker5690efc2011-05-26 13:16:06 +0000523{
Manuel Pégourié-Gonnard71e75dc2014-12-19 18:05:43 +0100524 int i;
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +0200525 unsigned char tmp[200];
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200526 char title[TITLE_LEN];
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200527 todo_list todo;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200528#if defined(MBEDTLS_MEMORY_BUFFER_ALLOC_C)
Manuel Pégourié-Gonnardb2a18a22015-05-27 16:29:56 +0200529 unsigned char alloc_buf[HEAP_SIZE] = { 0 };
Manuel Pégourié-Gonnard128657d2014-12-18 16:35:52 +0000530#endif
Gilles Peskine28f62f62020-07-24 02:06:46 +0200531#if defined(MBEDTLS_ECP_C)
532 mbedtls_ecp_curve_info single_curve[2] = {
533 { MBEDTLS_ECP_DP_NONE, 0, 0, NULL },
534 { MBEDTLS_ECP_DP_NONE, 0, 0, NULL },
535 };
Gilles Peskine449bd832023-01-11 14:50:10 +0100536 const mbedtls_ecp_curve_info *curve_list = mbedtls_ecp_curve_list();
Gilles Peskine28f62f62020-07-24 02:06:46 +0200537#endif
538
539#if defined(MBEDTLS_ECP_C)
540 (void) curve_list; /* Unused in some configurations where no benchmark uses ECC */
541#endif
Paul Bakkercce9d772011-11-18 14:26:47 +0000542
Gilles Peskine449bd832023-01-11 14:50:10 +0100543 if (argc <= 1) {
544 memset(&todo, 1, sizeof(todo));
545 } else {
546 memset(&todo, 0, sizeof(todo));
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200547
Gilles Peskine449bd832023-01-11 14:50:10 +0100548 for (i = 1; i < argc; i++) {
549 if (strcmp(argv[i], "md5") == 0) {
Manuel Pégourié-Gonnarde85fef12015-05-11 19:21:39 +0200550 todo.md5 = 1;
Gilles Peskine449bd832023-01-11 14:50:10 +0100551 } else if (strcmp(argv[i], "ripemd160") == 0) {
Manuel Pégourié-Gonnarde85fef12015-05-11 19:21:39 +0200552 todo.ripemd160 = 1;
Gilles Peskine449bd832023-01-11 14:50:10 +0100553 } else if (strcmp(argv[i], "sha1") == 0) {
Manuel Pégourié-Gonnarde85fef12015-05-11 19:21:39 +0200554 todo.sha1 = 1;
Gilles Peskine449bd832023-01-11 14:50:10 +0100555 } else if (strcmp(argv[i], "sha256") == 0) {
Manuel Pégourié-Gonnarde85fef12015-05-11 19:21:39 +0200556 todo.sha256 = 1;
Gilles Peskine449bd832023-01-11 14:50:10 +0100557 } else if (strcmp(argv[i], "sha512") == 0) {
Manuel Pégourié-Gonnarde85fef12015-05-11 19:21:39 +0200558 todo.sha512 = 1;
Pol Henarejos4e747332023-02-07 19:55:31 +0100559 } else if (strcmp(argv[i], "sha3_224") == 0) {
Pol Henarejosebb36402022-05-20 14:26:00 +0200560 todo.sha3_224 = 1;
Pol Henarejos4e747332023-02-07 19:55:31 +0100561 } else if (strcmp(argv[i], "sha3_256") == 0) {
Pol Henarejosebb36402022-05-20 14:26:00 +0200562 todo.sha3_256 = 1;
Pol Henarejos4e747332023-02-07 19:55:31 +0100563 } else if (strcmp(argv[i], "sha3_384") == 0) {
Pol Henarejosebb36402022-05-20 14:26:00 +0200564 todo.sha3_384 = 1;
Pol Henarejos4e747332023-02-07 19:55:31 +0100565 } else if (strcmp(argv[i], "sha3_512") == 0) {
Pol Henarejosebb36402022-05-20 14:26:00 +0200566 todo.sha3_512 = 1;
Gilles Peskine449bd832023-01-11 14:50:10 +0100567 } else if (strcmp(argv[i], "des3") == 0) {
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200568 todo.des3 = 1;
Gilles Peskine449bd832023-01-11 14:50:10 +0100569 } else if (strcmp(argv[i], "des") == 0) {
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200570 todo.des = 1;
Gilles Peskine449bd832023-01-11 14:50:10 +0100571 } else if (strcmp(argv[i], "aes_cbc") == 0) {
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200572 todo.aes_cbc = 1;
Yanray Wang55aba192023-09-12 09:03:50 +0800573 } else if (strcmp(argv[i], "aes_cfb128") == 0) {
574 todo.aes_cfb128 = 1;
Yanray Wang022b9a12023-09-12 09:45:37 +0800575 } else if (strcmp(argv[i], "aes_cfb8") == 0) {
576 todo.aes_cfb8 = 1;
Gilles Peskine449bd832023-01-11 14:50:10 +0100577 } else if (strcmp(argv[i], "aes_xts") == 0) {
Aorimn5f778012016-06-09 23:22:58 +0200578 todo.aes_xts = 1;
Gilles Peskine449bd832023-01-11 14:50:10 +0100579 } else if (strcmp(argv[i], "aes_gcm") == 0) {
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200580 todo.aes_gcm = 1;
Gilles Peskine449bd832023-01-11 14:50:10 +0100581 } else if (strcmp(argv[i], "aes_ccm") == 0) {
Manuel Pégourié-Gonnard58d78a82014-05-07 12:03:02 +0200582 todo.aes_ccm = 1;
Gilles Peskine449bd832023-01-11 14:50:10 +0100583 } else if (strcmp(argv[i], "chachapoly") == 0) {
Manuel Pégourié-Gonnardd6aea182018-05-09 10:21:28 +0200584 todo.chachapoly = 1;
Gilles Peskine449bd832023-01-11 14:50:10 +0100585 } else if (strcmp(argv[i], "aes_cmac") == 0) {
Simon Butcher549dc3d2016-10-05 14:14:19 +0100586 todo.aes_cmac = 1;
Gilles Peskine449bd832023-01-11 14:50:10 +0100587 } else if (strcmp(argv[i], "des3_cmac") == 0) {
Simon Butcher549dc3d2016-10-05 14:14:19 +0100588 todo.des3_cmac = 1;
Gilles Peskine449bd832023-01-11 14:50:10 +0100589 } else if (strcmp(argv[i], "aria") == 0) {
Manuel Pégourié-Gonnard62e813c2018-02-21 10:47:47 +0100590 todo.aria = 1;
Gilles Peskine449bd832023-01-11 14:50:10 +0100591 } else if (strcmp(argv[i], "camellia") == 0) {
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200592 todo.camellia = 1;
Gilles Peskine449bd832023-01-11 14:50:10 +0100593 } else if (strcmp(argv[i], "chacha20") == 0) {
Daniel King34b822c2016-05-15 17:28:08 -0300594 todo.chacha20 = 1;
Gilles Peskine449bd832023-01-11 14:50:10 +0100595 } else if (strcmp(argv[i], "poly1305") == 0) {
Daniel Kingadc32c02016-05-16 18:25:45 -0300596 todo.poly1305 = 1;
Gilles Peskine449bd832023-01-11 14:50:10 +0100597 } else if (strcmp(argv[i], "ctr_drbg") == 0) {
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200598 todo.ctr_drbg = 1;
Gilles Peskine449bd832023-01-11 14:50:10 +0100599 } else if (strcmp(argv[i], "hmac_drbg") == 0) {
Manuel Pégourié-Gonnardfef0f8f2014-01-30 20:59:00 +0100600 todo.hmac_drbg = 1;
Gilles Peskine449bd832023-01-11 14:50:10 +0100601 } else if (strcmp(argv[i], "rsa") == 0) {
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200602 todo.rsa = 1;
Gilles Peskine449bd832023-01-11 14:50:10 +0100603 } else if (strcmp(argv[i], "dhm") == 0) {
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200604 todo.dhm = 1;
Gilles Peskine449bd832023-01-11 14:50:10 +0100605 } else if (strcmp(argv[i], "ecdsa") == 0) {
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +0200606 todo.ecdsa = 1;
Gilles Peskine449bd832023-01-11 14:50:10 +0100607 } else if (strcmp(argv[i], "ecdh") == 0) {
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +0200608 todo.ecdh = 1;
Gilles Peskine449bd832023-01-11 14:50:10 +0100609 }
Gilles Peskine28f62f62020-07-24 02:06:46 +0200610#if defined(MBEDTLS_ECP_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100611 else if (set_ecp_curve(argv[i], single_curve)) {
Gilles Peskine28f62f62020-07-24 02:06:46 +0200612 curve_list = single_curve;
Gilles Peskine449bd832023-01-11 14:50:10 +0100613 }
Gilles Peskine28f62f62020-07-24 02:06:46 +0200614#endif
Gilles Peskine449bd832023-01-11 14:50:10 +0100615 else {
616 mbedtls_printf("Unrecognized option: %s\n", argv[i]);
617 mbedtls_printf("Available options: " OPTIONS);
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200618 }
619 }
620 }
Paul Bakker5121ce52009-01-03 21:22:43 +0000621
Gilles Peskine449bd832023-01-11 14:50:10 +0100622 mbedtls_printf("\n");
Paul Bakker5121ce52009-01-03 21:22:43 +0000623
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200624#if defined(MBEDTLS_MEMORY_BUFFER_ALLOC_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100625 mbedtls_memory_buffer_alloc_init(alloc_buf, sizeof(alloc_buf));
Manuel Pégourié-Gonnard128657d2014-12-18 16:35:52 +0000626#endif
Gilles Peskine449bd832023-01-11 14:50:10 +0100627 memset(buf, 0xAA, sizeof(buf));
628 memset(tmp, 0xBB, sizeof(tmp));
Manuel Pégourié-Gonnarded7cbe92013-09-17 15:30:51 +0200629
Manuel Pégourié-Gonnarda93aa582022-01-04 09:47:54 +0100630 /* Avoid "unused static function" warning in configurations without
631 * symmetric crypto. */
Manuel Pégourié-Gonnardcd4ad0c2022-01-05 09:54:37 +0100632 (void) mbedtls_timing_hardclock;
Manuel Pégourié-Gonnarda93aa582022-01-04 09:47:54 +0100633
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200634#if defined(MBEDTLS_MD5_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100635 if (todo.md5) {
636 TIME_AND_TSC("MD5", mbedtls_md5(buf, BUFSIZE, tmp));
637 }
Paul Bakker5121ce52009-01-03 21:22:43 +0000638#endif
639
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200640#if defined(MBEDTLS_RIPEMD160_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100641 if (todo.ripemd160) {
642 TIME_AND_TSC("RIPEMD160", mbedtls_ripemd160(buf, BUFSIZE, tmp));
643 }
Manuel Pégourié-Gonnard01b0b382014-01-17 14:29:46 +0100644#endif
645
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200646#if defined(MBEDTLS_SHA1_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100647 if (todo.sha1) {
648 TIME_AND_TSC("SHA-1", mbedtls_sha1(buf, BUFSIZE, tmp));
649 }
Paul Bakker5121ce52009-01-03 21:22:43 +0000650#endif
651
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200652#if defined(MBEDTLS_SHA256_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100653 if (todo.sha256) {
654 TIME_AND_TSC("SHA-256", mbedtls_sha256(buf, BUFSIZE, tmp, 0));
655 }
Paul Bakker5121ce52009-01-03 21:22:43 +0000656#endif
657
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200658#if defined(MBEDTLS_SHA512_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100659 if (todo.sha512) {
660 TIME_AND_TSC("SHA-512", mbedtls_sha512(buf, BUFSIZE, tmp, 0));
661 }
Paul Bakker3a3c3c22009-02-09 22:33:30 +0000662#endif
Pol Henarejosebb36402022-05-20 14:26:00 +0200663#if defined(MBEDTLS_SHA3_C)
Pol Henarejosa6779282023-02-08 00:50:04 +0100664 if (todo.sha3_224) {
665 TIME_AND_TSC("SHA3-224", mbedtls_sha3(MBEDTLS_SHA3_224, buf, BUFSIZE, tmp, 28));
666 }
667 if (todo.sha3_256) {
668 TIME_AND_TSC("SHA3-256", mbedtls_sha3(MBEDTLS_SHA3_256, buf, BUFSIZE, tmp, 32));
669 }
670 if (todo.sha3_384) {
671 TIME_AND_TSC("SHA3-384", mbedtls_sha3(MBEDTLS_SHA3_384, buf, BUFSIZE, tmp, 48));
672 }
673 if (todo.sha3_512) {
674 TIME_AND_TSC("SHA3-512", mbedtls_sha3(MBEDTLS_SHA3_512, buf, BUFSIZE, tmp, 64));
675 }
Pol Henarejosebb36402022-05-20 14:26:00 +0200676#endif
Paul Bakker3a3c3c22009-02-09 22:33:30 +0000677
Simon Butcher549dc3d2016-10-05 14:14:19 +0100678#if defined(MBEDTLS_DES_C)
679#if defined(MBEDTLS_CIPHER_MODE_CBC)
Gilles Peskine449bd832023-01-11 14:50:10 +0100680 if (todo.des3) {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200681 mbedtls_des3_context des3;
Yanray Wang5cae6e82023-10-09 18:40:17 +0800682
Gilles Peskine449bd832023-01-11 14:50:10 +0100683 mbedtls_des3_init(&des3);
684 if (mbedtls_des3_set3key_enc(&des3, tmp) != 0) {
685 mbedtls_exit(1);
686 }
687 TIME_AND_TSC("3DES",
688 mbedtls_des3_crypt_cbc(&des3, MBEDTLS_DES_ENCRYPT, BUFSIZE, tmp, buf, buf));
689 mbedtls_des3_free(&des3);
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200690 }
Paul Bakker5121ce52009-01-03 21:22:43 +0000691
Gilles Peskine449bd832023-01-11 14:50:10 +0100692 if (todo.des) {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200693 mbedtls_des_context des;
Yanray Wang5cae6e82023-10-09 18:40:17 +0800694
Gilles Peskine449bd832023-01-11 14:50:10 +0100695 mbedtls_des_init(&des);
696 if (mbedtls_des_setkey_enc(&des, tmp) != 0) {
697 mbedtls_exit(1);
698 }
699 TIME_AND_TSC("DES",
700 mbedtls_des_crypt_cbc(&des, MBEDTLS_DES_ENCRYPT, BUFSIZE, tmp, buf, buf));
701 mbedtls_des_free(&des);
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200702 }
Simon Butcher549dc3d2016-10-05 14:14:19 +0100703
704#endif /* MBEDTLS_CIPHER_MODE_CBC */
705#if defined(MBEDTLS_CMAC_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100706 if (todo.des3_cmac) {
Simon Butcher549dc3d2016-10-05 14:14:19 +0100707 unsigned char output[8];
708 const mbedtls_cipher_info_t *cipher_info;
709
Gilles Peskine449bd832023-01-11 14:50:10 +0100710 memset(buf, 0, sizeof(buf));
711 memset(tmp, 0, sizeof(tmp));
Simon Butcher549dc3d2016-10-05 14:14:19 +0100712
Gilles Peskine449bd832023-01-11 14:50:10 +0100713 cipher_info = mbedtls_cipher_info_from_type(MBEDTLS_CIPHER_DES_EDE3_ECB);
Simon Butcher549dc3d2016-10-05 14:14:19 +0100714
Gilles Peskine449bd832023-01-11 14:50:10 +0100715 TIME_AND_TSC("3DES-CMAC",
716 mbedtls_cipher_cmac(cipher_info, tmp, 192, buf,
717 BUFSIZE, output));
Simon Butcher549dc3d2016-10-05 14:14:19 +0100718 }
719#endif /* MBEDTLS_CMAC_C */
720#endif /* MBEDTLS_DES_C */
Paul Bakker5121ce52009-01-03 21:22:43 +0000721
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200722#if defined(MBEDTLS_AES_C)
723#if defined(MBEDTLS_CIPHER_MODE_CBC)
Gilles Peskine449bd832023-01-11 14:50:10 +0100724 if (todo.aes_cbc) {
Manuel Pégourié-Gonnard71e75dc2014-12-19 18:05:43 +0100725 int keysize;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200726 mbedtls_aes_context aes;
Yanray Wang5cae6e82023-10-09 18:40:17 +0800727
Gilles Peskine449bd832023-01-11 14:50:10 +0100728 mbedtls_aes_init(&aes);
729 for (keysize = 128; keysize <= 256; keysize += 64) {
730 mbedtls_snprintf(title, sizeof(title), "AES-CBC-%d", keysize);
Paul Bakker5121ce52009-01-03 21:22:43 +0000731
Gilles Peskine449bd832023-01-11 14:50:10 +0100732 memset(buf, 0, sizeof(buf));
733 memset(tmp, 0, sizeof(tmp));
734 CHECK_AND_CONTINUE(mbedtls_aes_setkey_enc(&aes, tmp, keysize));
Paul Bakker5121ce52009-01-03 21:22:43 +0000735
Gilles Peskine449bd832023-01-11 14:50:10 +0100736 TIME_AND_TSC(title,
737 mbedtls_aes_crypt_cbc(&aes, MBEDTLS_AES_ENCRYPT, BUFSIZE, tmp, buf, buf));
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200738 }
Gilles Peskine449bd832023-01-11 14:50:10 +0100739 mbedtls_aes_free(&aes);
Paul Bakker5121ce52009-01-03 21:22:43 +0000740 }
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200741#endif
Yanray Wang55aba192023-09-12 09:03:50 +0800742#if defined(MBEDTLS_CIPHER_MODE_CFB)
743 if (todo.aes_cfb128) {
744 int keysize;
745 size_t iv_off = 0;
746 mbedtls_aes_context aes;
Yanray Wang5cae6e82023-10-09 18:40:17 +0800747
Yanray Wang55aba192023-09-12 09:03:50 +0800748 mbedtls_aes_init(&aes);
749 for (keysize = 128; keysize <= 256; keysize += 64) {
750 mbedtls_snprintf(title, sizeof(title), "AES-CFB128-%d", keysize);
751
752 memset(buf, 0, sizeof(buf));
753 memset(tmp, 0, sizeof(tmp));
754 CHECK_AND_CONTINUE(mbedtls_aes_setkey_enc(&aes, tmp, keysize));
755
756 TIME_AND_TSC(title,
757 mbedtls_aes_crypt_cfb128(&aes, MBEDTLS_AES_ENCRYPT, BUFSIZE,
758 &iv_off, tmp, buf, buf));
759 }
760 mbedtls_aes_free(&aes);
761 }
Yanray Wang022b9a12023-09-12 09:45:37 +0800762 if (todo.aes_cfb8) {
763 int keysize;
764 mbedtls_aes_context aes;
Yanray Wang5cae6e82023-10-09 18:40:17 +0800765
Yanray Wang022b9a12023-09-12 09:45:37 +0800766 mbedtls_aes_init(&aes);
767 for (keysize = 128; keysize <= 256; keysize += 64) {
768 mbedtls_snprintf(title, sizeof(title), "AES-CFB8-%d", keysize);
769
770 memset(buf, 0, sizeof(buf));
771 memset(tmp, 0, sizeof(tmp));
772 CHECK_AND_CONTINUE(mbedtls_aes_setkey_enc(&aes, tmp, keysize));
773
774 TIME_AND_TSC(title,
775 mbedtls_aes_crypt_cfb8(&aes, MBEDTLS_AES_ENCRYPT, BUFSIZE, tmp, buf, buf));
776 }
777 mbedtls_aes_free(&aes);
778 }
Yanray Wang55aba192023-09-12 09:03:50 +0800779#endif
Aorimn5f778012016-06-09 23:22:58 +0200780#if defined(MBEDTLS_CIPHER_MODE_XTS)
Gilles Peskine449bd832023-01-11 14:50:10 +0100781 if (todo.aes_xts) {
Aorimn5f778012016-06-09 23:22:58 +0200782 int keysize;
Jaeden Amero9366feb2018-05-29 18:55:17 +0100783 mbedtls_aes_xts_context ctx;
784
Gilles Peskine449bd832023-01-11 14:50:10 +0100785 mbedtls_aes_xts_init(&ctx);
786 for (keysize = 128; keysize <= 256; keysize += 128) {
787 mbedtls_snprintf(title, sizeof(title), "AES-XTS-%d", keysize);
Aorimn5f778012016-06-09 23:22:58 +0200788
Gilles Peskine449bd832023-01-11 14:50:10 +0100789 memset(buf, 0, sizeof(buf));
790 memset(tmp, 0, sizeof(tmp));
791 CHECK_AND_CONTINUE(mbedtls_aes_xts_setkey_enc(&ctx, tmp, keysize * 2));
Aorimn5f778012016-06-09 23:22:58 +0200792
Gilles Peskine449bd832023-01-11 14:50:10 +0100793 TIME_AND_TSC(title,
794 mbedtls_aes_crypt_xts(&ctx, MBEDTLS_AES_ENCRYPT, BUFSIZE,
795 tmp, buf, buf));
Jaeden Amero9366feb2018-05-29 18:55:17 +0100796
Gilles Peskine449bd832023-01-11 14:50:10 +0100797 mbedtls_aes_xts_free(&ctx);
Aorimn5f778012016-06-09 23:22:58 +0200798 }
Aorimn5f778012016-06-09 23:22:58 +0200799 }
800#endif
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200801#if defined(MBEDTLS_GCM_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100802 if (todo.aes_gcm) {
Manuel Pégourié-Gonnard71e75dc2014-12-19 18:05:43 +0100803 int keysize;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200804 mbedtls_gcm_context gcm;
Manuel Pégourié-Gonnardc34e8dd2015-04-28 21:42:17 +0200805
Gilles Peskine449bd832023-01-11 14:50:10 +0100806 mbedtls_gcm_init(&gcm);
807 for (keysize = 128; keysize <= 256; keysize += 64) {
808 mbedtls_snprintf(title, sizeof(title), "AES-GCM-%d", keysize);
Paul Bakker89e80c92012-03-20 13:50:09 +0000809
Gilles Peskine449bd832023-01-11 14:50:10 +0100810 memset(buf, 0, sizeof(buf));
811 memset(tmp, 0, sizeof(tmp));
812 mbedtls_gcm_setkey(&gcm, MBEDTLS_CIPHER_ID_AES, tmp, keysize);
Paul Bakker89e80c92012-03-20 13:50:09 +0000813
Gilles Peskine449bd832023-01-11 14:50:10 +0100814 TIME_AND_TSC(title,
815 mbedtls_gcm_crypt_and_tag(&gcm, MBEDTLS_GCM_ENCRYPT, BUFSIZE, tmp,
816 12, NULL, 0, buf, buf, 16, tmp));
Paul Bakkerf70fe812013-12-16 16:43:10 +0100817
Gilles Peskine449bd832023-01-11 14:50:10 +0100818 mbedtls_gcm_free(&gcm);
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200819 }
Paul Bakker89e80c92012-03-20 13:50:09 +0000820 }
821#endif
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200822#if defined(MBEDTLS_CCM_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100823 if (todo.aes_ccm) {
Manuel Pégourié-Gonnard71e75dc2014-12-19 18:05:43 +0100824 int keysize;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200825 mbedtls_ccm_context ccm;
Manuel Pégourié-Gonnard6963ff02015-04-28 18:02:54 +0200826
Gilles Peskine449bd832023-01-11 14:50:10 +0100827 mbedtls_ccm_init(&ccm);
828 for (keysize = 128; keysize <= 256; keysize += 64) {
829 mbedtls_snprintf(title, sizeof(title), "AES-CCM-%d", keysize);
Manuel Pégourié-Gonnard58d78a82014-05-07 12:03:02 +0200830
Gilles Peskine449bd832023-01-11 14:50:10 +0100831 memset(buf, 0, sizeof(buf));
832 memset(tmp, 0, sizeof(tmp));
833 mbedtls_ccm_setkey(&ccm, MBEDTLS_CIPHER_ID_AES, tmp, keysize);
Manuel Pégourié-Gonnard58d78a82014-05-07 12:03:02 +0200834
Gilles Peskine449bd832023-01-11 14:50:10 +0100835 TIME_AND_TSC(title,
836 mbedtls_ccm_encrypt_and_tag(&ccm, BUFSIZE, tmp,
837 12, NULL, 0, buf, buf, tmp, 16));
Manuel Pégourié-Gonnard58d78a82014-05-07 12:03:02 +0200838
Gilles Peskine449bd832023-01-11 14:50:10 +0100839 mbedtls_ccm_free(&ccm);
Manuel Pégourié-Gonnard58d78a82014-05-07 12:03:02 +0200840 }
841 }
842#endif
Manuel Pégourié-Gonnardd6aea182018-05-09 10:21:28 +0200843#if defined(MBEDTLS_CHACHAPOLY_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100844 if (todo.chachapoly) {
Manuel Pégourié-Gonnardd6aea182018-05-09 10:21:28 +0200845 mbedtls_chachapoly_context chachapoly;
846
Gilles Peskine449bd832023-01-11 14:50:10 +0100847 mbedtls_chachapoly_init(&chachapoly);
848 memset(buf, 0, sizeof(buf));
849 memset(tmp, 0, sizeof(tmp));
Manuel Pégourié-Gonnardd6aea182018-05-09 10:21:28 +0200850
Gilles Peskine449bd832023-01-11 14:50:10 +0100851 mbedtls_snprintf(title, sizeof(title), "ChaCha20-Poly1305");
Manuel Pégourié-Gonnardd6aea182018-05-09 10:21:28 +0200852
Gilles Peskine449bd832023-01-11 14:50:10 +0100853 mbedtls_chachapoly_setkey(&chachapoly, tmp);
Manuel Pégourié-Gonnardd6aea182018-05-09 10:21:28 +0200854
Gilles Peskine449bd832023-01-11 14:50:10 +0100855 TIME_AND_TSC(title,
856 mbedtls_chachapoly_encrypt_and_tag(&chachapoly,
857 BUFSIZE, tmp, NULL, 0, buf, buf, tmp));
Manuel Pégourié-Gonnardd6aea182018-05-09 10:21:28 +0200858
Gilles Peskine449bd832023-01-11 14:50:10 +0100859 mbedtls_chachapoly_free(&chachapoly);
Manuel Pégourié-Gonnardd6aea182018-05-09 10:21:28 +0200860 }
861#endif
Simon Butcher549dc3d2016-10-05 14:14:19 +0100862#if defined(MBEDTLS_CMAC_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100863 if (todo.aes_cmac) {
Simon Butcher549dc3d2016-10-05 14:14:19 +0100864 unsigned char output[16];
865 const mbedtls_cipher_info_t *cipher_info;
866 mbedtls_cipher_type_t cipher_type;
867 int keysize;
868
Gilles Peskine449bd832023-01-11 14:50:10 +0100869 for (keysize = 128, cipher_type = MBEDTLS_CIPHER_AES_128_ECB;
Simon Butcher549dc3d2016-10-05 14:14:19 +0100870 keysize <= 256;
Gilles Peskine449bd832023-01-11 14:50:10 +0100871 keysize += 64, cipher_type++) {
872 mbedtls_snprintf(title, sizeof(title), "AES-CMAC-%d", keysize);
Simon Butcher549dc3d2016-10-05 14:14:19 +0100873
Gilles Peskine449bd832023-01-11 14:50:10 +0100874 memset(buf, 0, sizeof(buf));
875 memset(tmp, 0, sizeof(tmp));
Simon Butcher549dc3d2016-10-05 14:14:19 +0100876
Gilles Peskine449bd832023-01-11 14:50:10 +0100877 cipher_info = mbedtls_cipher_info_from_type(cipher_type);
Simon Butcher549dc3d2016-10-05 14:14:19 +0100878
Gilles Peskine449bd832023-01-11 14:50:10 +0100879 TIME_AND_TSC(title,
880 mbedtls_cipher_cmac(cipher_info, tmp, keysize,
881 buf, BUFSIZE, output));
Simon Butcher549dc3d2016-10-05 14:14:19 +0100882 }
883
Gilles Peskine449bd832023-01-11 14:50:10 +0100884 memset(buf, 0, sizeof(buf));
885 memset(tmp, 0, sizeof(tmp));
886 TIME_AND_TSC("AES-CMAC-PRF-128",
887 mbedtls_aes_cmac_prf_128(tmp, 16, buf, BUFSIZE,
888 output));
Simon Butcher549dc3d2016-10-05 14:14:19 +0100889 }
890#endif /* MBEDTLS_CMAC_C */
891#endif /* MBEDTLS_AES_C */
Paul Bakker5121ce52009-01-03 21:22:43 +0000892
Manuel Pégourié-Gonnard62e813c2018-02-21 10:47:47 +0100893#if defined(MBEDTLS_ARIA_C) && defined(MBEDTLS_CIPHER_MODE_CBC)
Gilles Peskine449bd832023-01-11 14:50:10 +0100894 if (todo.aria) {
Manuel Pégourié-Gonnard62e813c2018-02-21 10:47:47 +0100895 int keysize;
896 mbedtls_aria_context aria;
Yanray Wang5cae6e82023-10-09 18:40:17 +0800897
Gilles Peskine449bd832023-01-11 14:50:10 +0100898 mbedtls_aria_init(&aria);
899 for (keysize = 128; keysize <= 256; keysize += 64) {
900 mbedtls_snprintf(title, sizeof(title), "ARIA-CBC-%d", keysize);
Manuel Pégourié-Gonnard62e813c2018-02-21 10:47:47 +0100901
Gilles Peskine449bd832023-01-11 14:50:10 +0100902 memset(buf, 0, sizeof(buf));
903 memset(tmp, 0, sizeof(tmp));
904 mbedtls_aria_setkey_enc(&aria, tmp, keysize);
Manuel Pégourié-Gonnard62e813c2018-02-21 10:47:47 +0100905
Gilles Peskine449bd832023-01-11 14:50:10 +0100906 TIME_AND_TSC(title,
907 mbedtls_aria_crypt_cbc(&aria, MBEDTLS_ARIA_ENCRYPT,
908 BUFSIZE, tmp, buf, buf));
Manuel Pégourié-Gonnard62e813c2018-02-21 10:47:47 +0100909 }
Gilles Peskine449bd832023-01-11 14:50:10 +0100910 mbedtls_aria_free(&aria);
Manuel Pégourié-Gonnard62e813c2018-02-21 10:47:47 +0100911 }
912#endif
913
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200914#if defined(MBEDTLS_CAMELLIA_C) && defined(MBEDTLS_CIPHER_MODE_CBC)
Gilles Peskine449bd832023-01-11 14:50:10 +0100915 if (todo.camellia) {
Manuel Pégourié-Gonnard71e75dc2014-12-19 18:05:43 +0100916 int keysize;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200917 mbedtls_camellia_context camellia;
Yanray Wang5cae6e82023-10-09 18:40:17 +0800918
Gilles Peskine449bd832023-01-11 14:50:10 +0100919 mbedtls_camellia_init(&camellia);
920 for (keysize = 128; keysize <= 256; keysize += 64) {
921 mbedtls_snprintf(title, sizeof(title), "CAMELLIA-CBC-%d", keysize);
Paul Bakker38119b12009-01-10 23:31:23 +0000922
Gilles Peskine449bd832023-01-11 14:50:10 +0100923 memset(buf, 0, sizeof(buf));
924 memset(tmp, 0, sizeof(tmp));
925 mbedtls_camellia_setkey_enc(&camellia, tmp, keysize);
Paul Bakker38119b12009-01-10 23:31:23 +0000926
Gilles Peskine449bd832023-01-11 14:50:10 +0100927 TIME_AND_TSC(title,
928 mbedtls_camellia_crypt_cbc(&camellia, MBEDTLS_CAMELLIA_ENCRYPT,
929 BUFSIZE, tmp, buf, buf));
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200930 }
Gilles Peskine449bd832023-01-11 14:50:10 +0100931 mbedtls_camellia_free(&camellia);
Paul Bakker38119b12009-01-10 23:31:23 +0000932 }
933#endif
934
Daniel King34b822c2016-05-15 17:28:08 -0300935#if defined(MBEDTLS_CHACHA20_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100936 if (todo.chacha20) {
937 TIME_AND_TSC("ChaCha20", mbedtls_chacha20_crypt(buf, buf, 0U, BUFSIZE, buf, buf));
Daniel King34b822c2016-05-15 17:28:08 -0300938 }
939#endif
940
Daniel Kingadc32c02016-05-16 18:25:45 -0300941#if defined(MBEDTLS_POLY1305_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100942 if (todo.poly1305) {
943 TIME_AND_TSC("Poly1305", mbedtls_poly1305_mac(buf, buf, BUFSIZE, buf));
Daniel Kingadc32c02016-05-16 18:25:45 -0300944 }
945#endif
946
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200947#if defined(MBEDTLS_CTR_DRBG_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100948 if (todo.ctr_drbg) {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200949 mbedtls_ctr_drbg_context ctr_drbg;
Paul Bakker02faf452011-11-29 11:23:58 +0000950
Gilles Peskine449bd832023-01-11 14:50:10 +0100951 mbedtls_ctr_drbg_init(&ctr_drbg);
952 if (mbedtls_ctr_drbg_seed(&ctr_drbg, myrand, NULL, NULL, 0) != 0) {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200953 mbedtls_exit(1);
Gilles Peskine449bd832023-01-11 14:50:10 +0100954 }
955 TIME_AND_TSC("CTR_DRBG (NOPR)",
956 mbedtls_ctr_drbg_random(&ctr_drbg, buf, BUFSIZE));
957 mbedtls_ctr_drbg_free(&ctr_drbg);
Paul Bakker02faf452011-11-29 11:23:58 +0000958
Gilles Peskine449bd832023-01-11 14:50:10 +0100959 mbedtls_ctr_drbg_init(&ctr_drbg);
960 if (mbedtls_ctr_drbg_seed(&ctr_drbg, myrand, NULL, NULL, 0) != 0) {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200961 mbedtls_exit(1);
Gilles Peskine449bd832023-01-11 14:50:10 +0100962 }
963 mbedtls_ctr_drbg_set_prediction_resistance(&ctr_drbg, MBEDTLS_CTR_DRBG_PR_ON);
964 TIME_AND_TSC("CTR_DRBG (PR)",
965 mbedtls_ctr_drbg_random(&ctr_drbg, buf, BUFSIZE));
966 mbedtls_ctr_drbg_free(&ctr_drbg);
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +0200967 }
Paul Bakker02faf452011-11-29 11:23:58 +0000968#endif
969
Andrzej Kurek68327742022-10-03 06:18:18 -0400970#if defined(MBEDTLS_HMAC_DRBG_C) && \
Gilles Peskine449bd832023-01-11 14:50:10 +0100971 (defined(MBEDTLS_SHA1_C) || defined(MBEDTLS_SHA256_C))
972 if (todo.hmac_drbg) {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200973 mbedtls_hmac_drbg_context hmac_drbg;
974 const mbedtls_md_info_t *md_info;
Manuel Pégourié-Gonnardfef0f8f2014-01-30 20:59:00 +0100975
Gilles Peskine449bd832023-01-11 14:50:10 +0100976 mbedtls_hmac_drbg_init(&hmac_drbg);
Manuel Pégourié-Gonnardf9e94812015-04-28 22:07:14 +0200977
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200978#if defined(MBEDTLS_SHA1_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100979 if ((md_info = mbedtls_md_info_from_type(MBEDTLS_MD_SHA1)) == NULL) {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200980 mbedtls_exit(1);
Gilles Peskine449bd832023-01-11 14:50:10 +0100981 }
Manuel Pégourié-Gonnardfef0f8f2014-01-30 20:59:00 +0100982
Gilles Peskine449bd832023-01-11 14:50:10 +0100983 if (mbedtls_hmac_drbg_seed(&hmac_drbg, md_info, myrand, NULL, NULL, 0) != 0) {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200984 mbedtls_exit(1);
Gilles Peskine449bd832023-01-11 14:50:10 +0100985 }
986 TIME_AND_TSC("HMAC_DRBG SHA-1 (NOPR)",
987 mbedtls_hmac_drbg_random(&hmac_drbg, buf, BUFSIZE));
Manuel Pégourié-Gonnardfef0f8f2014-01-30 20:59:00 +0100988
Gilles Peskine449bd832023-01-11 14:50:10 +0100989 if (mbedtls_hmac_drbg_seed(&hmac_drbg, md_info, myrand, NULL, NULL, 0) != 0) {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200990 mbedtls_exit(1);
Gilles Peskine449bd832023-01-11 14:50:10 +0100991 }
992 mbedtls_hmac_drbg_set_prediction_resistance(&hmac_drbg,
993 MBEDTLS_HMAC_DRBG_PR_ON);
994 TIME_AND_TSC("HMAC_DRBG SHA-1 (PR)",
995 mbedtls_hmac_drbg_random(&hmac_drbg, buf, BUFSIZE));
Manuel Pégourié-Gonnardfef0f8f2014-01-30 20:59:00 +0100996#endif
997
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200998#if defined(MBEDTLS_SHA256_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100999 if ((md_info = mbedtls_md_info_from_type(MBEDTLS_MD_SHA256)) == NULL) {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001000 mbedtls_exit(1);
Gilles Peskine449bd832023-01-11 14:50:10 +01001001 }
Manuel Pégourié-Gonnardfef0f8f2014-01-30 20:59:00 +01001002
Gilles Peskine449bd832023-01-11 14:50:10 +01001003 if (mbedtls_hmac_drbg_seed(&hmac_drbg, md_info, myrand, NULL, NULL, 0) != 0) {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001004 mbedtls_exit(1);
Gilles Peskine449bd832023-01-11 14:50:10 +01001005 }
1006 TIME_AND_TSC("HMAC_DRBG SHA-256 (NOPR)",
1007 mbedtls_hmac_drbg_random(&hmac_drbg, buf, BUFSIZE));
Manuel Pégourié-Gonnardfef0f8f2014-01-30 20:59:00 +01001008
Gilles Peskine449bd832023-01-11 14:50:10 +01001009 if (mbedtls_hmac_drbg_seed(&hmac_drbg, md_info, myrand, NULL, NULL, 0) != 0) {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001010 mbedtls_exit(1);
Gilles Peskine449bd832023-01-11 14:50:10 +01001011 }
1012 mbedtls_hmac_drbg_set_prediction_resistance(&hmac_drbg,
1013 MBEDTLS_HMAC_DRBG_PR_ON);
1014 TIME_AND_TSC("HMAC_DRBG SHA-256 (PR)",
1015 mbedtls_hmac_drbg_random(&hmac_drbg, buf, BUFSIZE));
Manuel Pégourié-Gonnardfef0f8f2014-01-30 20:59:00 +01001016#endif
Gilles Peskine449bd832023-01-11 14:50:10 +01001017 mbedtls_hmac_drbg_free(&hmac_drbg);
Manuel Pégourié-Gonnardfef0f8f2014-01-30 20:59:00 +01001018 }
Andrzej Kurek68327742022-10-03 06:18:18 -04001019#endif /* MBEDTLS_HMAC_DRBG_C && ( MBEDTLS_SHA1_C || MBEDTLS_SHA256_C ) */
Manuel Pégourié-Gonnardfef0f8f2014-01-30 20:59:00 +01001020
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001021#if defined(MBEDTLS_RSA_C) && defined(MBEDTLS_GENPRIME)
Gilles Peskine449bd832023-01-11 14:50:10 +01001022 if (todo.rsa) {
Manuel Pégourié-Gonnard71e75dc2014-12-19 18:05:43 +01001023 int keysize;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001024 mbedtls_rsa_context rsa;
Yanray Wang5cae6e82023-10-09 18:40:17 +08001025
Gilles Peskine449bd832023-01-11 14:50:10 +01001026 for (keysize = 2048; keysize <= 4096; keysize *= 2) {
1027 mbedtls_snprintf(title, sizeof(title), "RSA-%d", keysize);
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +02001028
Gilles Peskine449bd832023-01-11 14:50:10 +01001029 mbedtls_rsa_init(&rsa);
1030 mbedtls_rsa_gen_key(&rsa, myrand, NULL, keysize, 65537);
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +02001031
Gilles Peskine449bd832023-01-11 14:50:10 +01001032 TIME_PUBLIC(title, " public",
1033 buf[0] = 0;
1034 ret = mbedtls_rsa_public(&rsa, buf, buf));
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +02001035
Gilles Peskine449bd832023-01-11 14:50:10 +01001036 TIME_PUBLIC(title, "private",
1037 buf[0] = 0;
1038 ret = mbedtls_rsa_private(&rsa, myrand, NULL, buf, buf));
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +02001039
Gilles Peskine449bd832023-01-11 14:50:10 +01001040 mbedtls_rsa_free(&rsa);
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +02001041 }
Paul Bakker5121ce52009-01-03 21:22:43 +00001042 }
Paul Bakker5121ce52009-01-03 21:22:43 +00001043#endif
1044
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001045#if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_BIGNUM_C)
Gilles Peskine449bd832023-01-11 14:50:10 +01001046 if (todo.dhm) {
Manuel Pégourié-Gonnard4f3368e2015-07-19 15:01:28 +02001047 int dhm_sizes[] = { 2048, 3072 };
Brendan Shankse61514d2018-03-08 17:40:56 -08001048 static const unsigned char dhm_P_2048[] =
Hanno Beckerb9539212017-10-04 13:13:34 +01001049 MBEDTLS_DHM_RFC3526_MODP_2048_P_BIN;
Brendan Shankse61514d2018-03-08 17:40:56 -08001050 static const unsigned char dhm_P_3072[] =
Hanno Beckerb9539212017-10-04 13:13:34 +01001051 MBEDTLS_DHM_RFC3526_MODP_3072_P_BIN;
Brendan Shankse61514d2018-03-08 17:40:56 -08001052 static const unsigned char dhm_G_2048[] =
Hanno Beckerb9539212017-10-04 13:13:34 +01001053 MBEDTLS_DHM_RFC3526_MODP_2048_G_BIN;
Brendan Shankse61514d2018-03-08 17:40:56 -08001054 static const unsigned char dhm_G_3072[] =
Hanno Beckerb9539212017-10-04 13:13:34 +01001055 MBEDTLS_DHM_RFC3526_MODP_3072_G_BIN;
1056
1057 const unsigned char *dhm_P[] = { dhm_P_2048, dhm_P_3072 };
Gilles Peskine449bd832023-01-11 14:50:10 +01001058 const size_t dhm_P_size[] = { sizeof(dhm_P_2048),
1059 sizeof(dhm_P_3072) };
Hanno Beckerb9539212017-10-04 13:13:34 +01001060
1061 const unsigned char *dhm_G[] = { dhm_G_2048, dhm_G_3072 };
Gilles Peskine449bd832023-01-11 14:50:10 +01001062 const size_t dhm_G_size[] = { sizeof(dhm_G_2048),
1063 sizeof(dhm_G_3072) };
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +02001064
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001065 mbedtls_dhm_context dhm;
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +02001066 size_t olen;
Gilles Peskine487bbf62021-05-27 22:17:07 +02001067 size_t n;
Yanray Wang5cae6e82023-10-09 18:40:17 +08001068
Gilles Peskine449bd832023-01-11 14:50:10 +01001069 for (i = 0; (size_t) i < sizeof(dhm_sizes) / sizeof(dhm_sizes[0]); i++) {
1070 mbedtls_dhm_init(&dhm);
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +02001071
Gilles Peskine449bd832023-01-11 14:50:10 +01001072 if (mbedtls_mpi_read_binary(&dhm.P, dhm_P[i],
1073 dhm_P_size[i]) != 0 ||
1074 mbedtls_mpi_read_binary(&dhm.G, dhm_G[i],
1075 dhm_G_size[i]) != 0) {
1076 mbedtls_exit(1);
Paul Bakkercbe3d0d2014-04-17 16:00:59 +02001077 }
1078
Gilles Peskine449bd832023-01-11 14:50:10 +01001079 n = mbedtls_mpi_size(&dhm.P);
1080 mbedtls_dhm_make_public(&dhm, (int) n, buf, n, myrand, NULL);
1081 if (mbedtls_mpi_copy(&dhm.GY, &dhm.GX) != 0) {
1082 mbedtls_exit(1);
1083 }
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +02001084
Gilles Peskine449bd832023-01-11 14:50:10 +01001085 mbedtls_snprintf(title, sizeof(title), "DHE-%d", dhm_sizes[i]);
1086 TIME_PUBLIC(title, "handshake",
1087 ret |= mbedtls_dhm_make_public(&dhm, (int) n, buf, n,
1088 myrand, NULL);
1089 ret |=
1090 mbedtls_dhm_calc_secret(&dhm, buf, sizeof(buf), &olen, myrand, NULL));
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +02001091
Gilles Peskine449bd832023-01-11 14:50:10 +01001092 mbedtls_snprintf(title, sizeof(title), "DH-%d", dhm_sizes[i]);
1093 TIME_PUBLIC(title, "handshake",
1094 ret |=
1095 mbedtls_dhm_calc_secret(&dhm, buf, sizeof(buf), &olen, myrand, NULL));
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +02001096
Gilles Peskine449bd832023-01-11 14:50:10 +01001097 mbedtls_dhm_free(&dhm);
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +02001098 }
Manuel Pégourié-Gonnarde870c0a2012-11-08 11:31:48 +01001099 }
Manuel Pégourié-Gonnarde870c0a2012-11-08 11:31:48 +01001100#endif
1101
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001102#if defined(MBEDTLS_ECDSA_C) && defined(MBEDTLS_SHA256_C)
Gilles Peskine449bd832023-01-11 14:50:10 +01001103 if (todo.ecdsa) {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001104 mbedtls_ecdsa_context ecdsa;
1105 const mbedtls_ecp_curve_info *curve_info;
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +02001106 size_t sig_len;
1107
Gilles Peskine449bd832023-01-11 14:50:10 +01001108 memset(buf, 0x2A, sizeof(buf));
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +02001109
Gilles Peskine449bd832023-01-11 14:50:10 +01001110 for (curve_info = curve_list;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001111 curve_info->grp_id != MBEDTLS_ECP_DP_NONE;
Gilles Peskine449bd832023-01-11 14:50:10 +01001112 curve_info++) {
1113 if (!mbedtls_ecdsa_can_do(curve_info->grp_id)) {
Christoph M. Wintersteiger6a1a9e42019-01-07 13:47:30 +00001114 continue;
Manuel Pégourié-Gonnard50da0482014-12-19 12:10:37 +01001115 }
Manuel Pégourié-Gonnard50da0482014-12-19 12:10:37 +01001116
Gilles Peskine449bd832023-01-11 14:50:10 +01001117 mbedtls_ecdsa_init(&ecdsa);
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +02001118
Gilles Peskine449bd832023-01-11 14:50:10 +01001119 if (mbedtls_ecdsa_genkey(&ecdsa, curve_info->grp_id, myrand, NULL) != 0) {
1120 mbedtls_exit(1);
1121 }
1122
1123 mbedtls_snprintf(title, sizeof(title), "ECDSA-%s",
1124 curve_info->name);
1125 TIME_PUBLIC(title,
1126 "sign",
1127 ret =
1128 mbedtls_ecdsa_write_signature(&ecdsa, MBEDTLS_MD_SHA256, buf,
1129 curve_info->bit_size,
1130 tmp, sizeof(tmp), &sig_len, myrand,
1131 NULL));
1132
1133 mbedtls_ecdsa_free(&ecdsa);
1134 }
1135
1136 for (curve_info = curve_list;
1137 curve_info->grp_id != MBEDTLS_ECP_DP_NONE;
1138 curve_info++) {
1139 if (!mbedtls_ecdsa_can_do(curve_info->grp_id)) {
1140 continue;
1141 }
1142
1143 mbedtls_ecdsa_init(&ecdsa);
1144
1145 if (mbedtls_ecdsa_genkey(&ecdsa, curve_info->grp_id, myrand, NULL) != 0 ||
1146 mbedtls_ecdsa_write_signature(&ecdsa, MBEDTLS_MD_SHA256, buf, curve_info->bit_size,
1147 tmp, sizeof(tmp), &sig_len, myrand, NULL) != 0) {
1148 mbedtls_exit(1);
1149 }
1150
1151 mbedtls_snprintf(title, sizeof(title), "ECDSA-%s",
1152 curve_info->name);
1153 TIME_PUBLIC(title, "verify",
1154 ret = mbedtls_ecdsa_read_signature(&ecdsa, buf, curve_info->bit_size,
1155 tmp, sig_len));
1156
1157 mbedtls_ecdsa_free(&ecdsa);
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +02001158 }
1159 }
1160#endif
1161
Janos Follath52735ef2018-08-15 10:19:16 +01001162#if defined(MBEDTLS_ECDH_C) && defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
Gilles Peskine449bd832023-01-11 14:50:10 +01001163 if (todo.ecdh) {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001164 mbedtls_ecdh_context ecdh;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001165 mbedtls_mpi z;
Nicholas Wilson08f3ef12015-11-10 13:10:01 +00001166 const mbedtls_ecp_curve_info montgomery_curve_list[] = {
1167#if defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED)
1168 { MBEDTLS_ECP_DP_CURVE25519, 0, 0, "Curve25519" },
Manuel Pégourié-Gonnard85391f22015-02-05 09:54:48 +00001169#endif
Nicholas Wilson08f3ef12015-11-10 13:10:01 +00001170#if defined(MBEDTLS_ECP_DP_CURVE448_ENABLED)
1171 { MBEDTLS_ECP_DP_CURVE448, 0, 0, "Curve448" },
1172#endif
1173 { MBEDTLS_ECP_DP_NONE, 0, 0, 0 }
1174 };
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001175 const mbedtls_ecp_curve_info *curve_info;
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +02001176 size_t olen;
Gilles Peskine28f62f62020-07-24 02:06:46 +02001177 const mbedtls_ecp_curve_info *selected_montgomery_curve_list =
1178 montgomery_curve_list;
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +02001179
Gilles Peskine449bd832023-01-11 14:50:10 +01001180 if (curve_list == (const mbedtls_ecp_curve_info *) &single_curve) {
Gilles Peskine28f62f62020-07-24 02:06:46 +02001181 mbedtls_ecp_group grp;
Yanray Wang5cae6e82023-10-09 18:40:17 +08001182
Gilles Peskine449bd832023-01-11 14:50:10 +01001183 mbedtls_ecp_group_init(&grp);
1184 if (mbedtls_ecp_group_load(&grp, curve_list->grp_id) != 0) {
1185 mbedtls_exit(1);
1186 }
1187 if (mbedtls_ecp_get_type(&grp) == MBEDTLS_ECP_TYPE_MONTGOMERY) {
Gilles Peskine28f62f62020-07-24 02:06:46 +02001188 selected_montgomery_curve_list = single_curve;
Gilles Peskine449bd832023-01-11 14:50:10 +01001189 } else { /* empty list */
Gilles Peskine28f62f62020-07-24 02:06:46 +02001190 selected_montgomery_curve_list = single_curve + 1;
Gilles Peskine449bd832023-01-11 14:50:10 +01001191 }
1192 mbedtls_ecp_group_free(&grp);
Gilles Peskine28f62f62020-07-24 02:06:46 +02001193 }
1194
Gilles Peskine449bd832023-01-11 14:50:10 +01001195 for (curve_info = curve_list;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001196 curve_info->grp_id != MBEDTLS_ECP_DP_NONE;
Gilles Peskine449bd832023-01-11 14:50:10 +01001197 curve_info++) {
1198 if (!mbedtls_ecdh_can_do(curve_info->grp_id)) {
Gilles Peskinec6c7c492019-02-11 18:41:27 +01001199 continue;
Gilles Peskine449bd832023-01-11 14:50:10 +01001200 }
Gilles Peskinec6c7c492019-02-11 18:41:27 +01001201
Gilles Peskine449bd832023-01-11 14:50:10 +01001202 mbedtls_ecdh_init(&ecdh);
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +02001203
Gilles Peskine449bd832023-01-11 14:50:10 +01001204 CHECK_AND_CONTINUE(mbedtls_ecp_group_load(&ecdh.grp, curve_info->grp_id));
1205 CHECK_AND_CONTINUE(mbedtls_ecdh_make_public(&ecdh, &olen, buf, sizeof(buf),
1206 myrand, NULL));
1207 CHECK_AND_CONTINUE(mbedtls_ecp_copy(&ecdh.Qp, &ecdh.Q));
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +02001208
Gilles Peskine449bd832023-01-11 14:50:10 +01001209 mbedtls_snprintf(title, sizeof(title), "ECDHE-%s",
1210 curve_info->name);
1211 TIME_PUBLIC(title, "handshake",
1212 CHECK_AND_CONTINUE(mbedtls_ecdh_make_public(&ecdh, &olen, buf, sizeof(buf),
1213 myrand, NULL));
1214 CHECK_AND_CONTINUE(mbedtls_ecdh_calc_secret(&ecdh, &olen, buf, sizeof(buf),
1215 myrand, NULL)));
1216 mbedtls_ecdh_free(&ecdh);
Manuel Pégourié-Gonnard50da0482014-12-19 12:10:37 +01001217 }
1218
Nicholas Wilson08f3ef12015-11-10 13:10:01 +00001219 /* Montgomery curves need to be handled separately */
Gilles Peskine449bd832023-01-11 14:50:10 +01001220 for (curve_info = selected_montgomery_curve_list;
1221 curve_info->grp_id != MBEDTLS_ECP_DP_NONE;
1222 curve_info++) {
1223 mbedtls_ecdh_init(&ecdh);
1224 mbedtls_mpi_init(&z);
Nicholas Wilson08f3ef12015-11-10 13:10:01 +00001225
Gilles Peskine449bd832023-01-11 14:50:10 +01001226 CHECK_AND_CONTINUE(mbedtls_ecp_group_load(&ecdh.grp, curve_info->grp_id));
1227 CHECK_AND_CONTINUE(mbedtls_ecdh_gen_public(&ecdh.grp, &ecdh.d, &ecdh.Qp, myrand, NULL));
Nicholas Wilson08f3ef12015-11-10 13:10:01 +00001228
Gilles Peskine449bd832023-01-11 14:50:10 +01001229 mbedtls_snprintf(title, sizeof(title), "ECDHE-%s",
1230 curve_info->name);
1231 TIME_PUBLIC(title, "handshake",
1232 CHECK_AND_CONTINUE(mbedtls_ecdh_gen_public(&ecdh.grp, &ecdh.d, &ecdh.Q,
1233 myrand, NULL));
1234 CHECK_AND_CONTINUE(mbedtls_ecdh_compute_shared(&ecdh.grp, &z, &ecdh.Qp,
1235 &ecdh.d,
1236 myrand, NULL)));
Nicholas Wilson08f3ef12015-11-10 13:10:01 +00001237
Gilles Peskine449bd832023-01-11 14:50:10 +01001238 mbedtls_ecdh_free(&ecdh);
1239 mbedtls_mpi_free(&z);
Manuel Pégourié-Gonnard85391f22015-02-05 09:54:48 +00001240 }
1241
Gilles Peskine449bd832023-01-11 14:50:10 +01001242 for (curve_info = curve_list;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001243 curve_info->grp_id != MBEDTLS_ECP_DP_NONE;
Gilles Peskine449bd832023-01-11 14:50:10 +01001244 curve_info++) {
1245 if (!mbedtls_ecdh_can_do(curve_info->grp_id)) {
Gilles Peskinec6c7c492019-02-11 18:41:27 +01001246 continue;
Gilles Peskine449bd832023-01-11 14:50:10 +01001247 }
Gilles Peskinec6c7c492019-02-11 18:41:27 +01001248
Gilles Peskine449bd832023-01-11 14:50:10 +01001249 mbedtls_ecdh_init(&ecdh);
Manuel Pégourié-Gonnard50da0482014-12-19 12:10:37 +01001250
Gilles Peskine449bd832023-01-11 14:50:10 +01001251 CHECK_AND_CONTINUE(mbedtls_ecp_group_load(&ecdh.grp, curve_info->grp_id));
1252 CHECK_AND_CONTINUE(mbedtls_ecdh_make_public(&ecdh, &olen, buf, sizeof(buf),
1253 myrand, NULL));
1254 CHECK_AND_CONTINUE(mbedtls_ecp_copy(&ecdh.Qp, &ecdh.Q));
1255 CHECK_AND_CONTINUE(mbedtls_ecdh_make_public(&ecdh, &olen, buf, sizeof(buf),
1256 myrand, NULL));
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +02001257
Gilles Peskine449bd832023-01-11 14:50:10 +01001258 mbedtls_snprintf(title, sizeof(title), "ECDH-%s",
1259 curve_info->name);
1260 TIME_PUBLIC(title, "handshake",
1261 CHECK_AND_CONTINUE(mbedtls_ecdh_calc_secret(&ecdh, &olen, buf, sizeof(buf),
1262 myrand, NULL)));
1263 mbedtls_ecdh_free(&ecdh);
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +02001264 }
Manuel Pégourié-Gonnard85391f22015-02-05 09:54:48 +00001265
Nicholas Wilson08f3ef12015-11-10 13:10:01 +00001266 /* Montgomery curves need to be handled separately */
Gilles Peskine449bd832023-01-11 14:50:10 +01001267 for (curve_info = selected_montgomery_curve_list;
1268 curve_info->grp_id != MBEDTLS_ECP_DP_NONE;
1269 curve_info++) {
1270 mbedtls_ecdh_init(&ecdh);
1271 mbedtls_mpi_init(&z);
Nicholas Wilson08f3ef12015-11-10 13:10:01 +00001272
Gilles Peskine449bd832023-01-11 14:50:10 +01001273 CHECK_AND_CONTINUE(mbedtls_ecp_group_load(&ecdh.grp, curve_info->grp_id));
1274 CHECK_AND_CONTINUE(mbedtls_ecdh_gen_public(&ecdh.grp, &ecdh.d, &ecdh.Qp,
1275 myrand, NULL));
1276 CHECK_AND_CONTINUE(mbedtls_ecdh_gen_public(&ecdh.grp, &ecdh.d, &ecdh.Q, myrand, NULL));
Nicholas Wilson08f3ef12015-11-10 13:10:01 +00001277
Gilles Peskine449bd832023-01-11 14:50:10 +01001278 mbedtls_snprintf(title, sizeof(title), "ECDH-%s",
1279 curve_info->name);
1280 TIME_PUBLIC(title, "handshake",
1281 CHECK_AND_CONTINUE(mbedtls_ecdh_compute_shared(&ecdh.grp, &z, &ecdh.Qp,
1282 &ecdh.d,
1283 myrand, NULL)));
Nicholas Wilson08f3ef12015-11-10 13:10:01 +00001284
Gilles Peskine449bd832023-01-11 14:50:10 +01001285 mbedtls_ecdh_free(&ecdh);
1286 mbedtls_mpi_free(&z);
Manuel Pégourié-Gonnard85391f22015-02-05 09:54:48 +00001287 }
Manuel Pégourié-Gonnardcc34f952013-09-17 16:04:08 +02001288 }
1289#endif
Manuel Pégourié-Gonnard50da0482014-12-19 12:10:37 +01001290
Christoph M. Wintersteigere50b9702018-12-14 11:03:02 +00001291#if defined(MBEDTLS_ECDH_C)
Gilles Peskine449bd832023-01-11 14:50:10 +01001292 if (todo.ecdh) {
Christoph M. Wintersteiger0bc9c692018-10-25 12:47:18 +01001293 mbedtls_ecdh_context ecdh_srv, ecdh_cli;
1294 unsigned char buf_srv[BUFSIZE], buf_cli[BUFSIZE];
Christoph M. Wintersteiger0bc9c692018-10-25 12:47:18 +01001295 const mbedtls_ecp_curve_info *curve_info;
1296 size_t olen;
1297
Gilles Peskine449bd832023-01-11 14:50:10 +01001298 for (curve_info = curve_list;
1299 curve_info->grp_id != MBEDTLS_ECP_DP_NONE;
1300 curve_info++) {
1301 if (!mbedtls_ecdh_can_do(curve_info->grp_id)) {
Gilles Peskinec6c7c492019-02-11 18:41:27 +01001302 continue;
Gilles Peskine449bd832023-01-11 14:50:10 +01001303 }
Gilles Peskinec6c7c492019-02-11 18:41:27 +01001304
Gilles Peskine449bd832023-01-11 14:50:10 +01001305 mbedtls_ecdh_init(&ecdh_srv);
1306 mbedtls_ecdh_init(&ecdh_cli);
Christoph M. Wintersteiger0bc9c692018-10-25 12:47:18 +01001307
Gilles Peskine449bd832023-01-11 14:50:10 +01001308 mbedtls_snprintf(title, sizeof(title), "ECDHE-%s", curve_info->name);
1309 TIME_PUBLIC(title,
1310 "full handshake",
1311 const unsigned char *p_srv = buf_srv;
Christoph M. Wintersteiger12f359f2019-02-26 12:26:04 +00001312
Gilles Peskine449bd832023-01-11 14:50:10 +01001313 CHECK_AND_CONTINUE(mbedtls_ecdh_setup(&ecdh_srv, curve_info->grp_id));
1314 CHECK_AND_CONTINUE(mbedtls_ecdh_make_params(&ecdh_srv, &olen, buf_srv,
1315 sizeof(buf_srv), myrand, NULL));
Christoph M. Wintersteiger0bc9c692018-10-25 12:47:18 +01001316
Gilles Peskine449bd832023-01-11 14:50:10 +01001317 CHECK_AND_CONTINUE(mbedtls_ecdh_read_params(&ecdh_cli, &p_srv,
1318 p_srv + olen));
1319 CHECK_AND_CONTINUE(mbedtls_ecdh_make_public(&ecdh_cli, &olen, buf_cli,
1320 sizeof(buf_cli), myrand, NULL));
Christoph M. Wintersteiger0bc9c692018-10-25 12:47:18 +01001321
Gilles Peskine449bd832023-01-11 14:50:10 +01001322 CHECK_AND_CONTINUE(mbedtls_ecdh_read_public(&ecdh_srv, buf_cli, olen));
1323 CHECK_AND_CONTINUE(mbedtls_ecdh_calc_secret(&ecdh_srv, &olen, buf_srv,
1324 sizeof(buf_srv), myrand, NULL));
Christoph M. Wintersteiger0bc9c692018-10-25 12:47:18 +01001325
Gilles Peskine449bd832023-01-11 14:50:10 +01001326 CHECK_AND_CONTINUE(mbedtls_ecdh_calc_secret(&ecdh_cli, &olen, buf_cli,
1327 sizeof(buf_cli), myrand, NULL));
1328 mbedtls_ecdh_free(&ecdh_cli);
Christoph M. Wintersteiger12f359f2019-02-26 12:26:04 +00001329
Gilles Peskine449bd832023-01-11 14:50:10 +01001330 mbedtls_ecdh_free(&ecdh_srv);
1331 );
Christoph M. Wintersteiger0bc9c692018-10-25 12:47:18 +01001332
Christoph M. Wintersteiger0bc9c692018-10-25 12:47:18 +01001333 }
1334 }
1335#endif
1336
Gilles Peskine449bd832023-01-11 14:50:10 +01001337 mbedtls_printf("\n");
Paul Bakker1d4da2e2009-10-25 12:36:53 +00001338
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001339#if defined(MBEDTLS_MEMORY_BUFFER_ALLOC_C)
1340 mbedtls_memory_buffer_alloc_free();
Manuel Pégourié-Gonnard128657d2014-12-18 16:35:52 +00001341#endif
1342
Gilles Peskine449bd832023-01-11 14:50:10 +01001343 mbedtls_exit(0);
Paul Bakker5121ce52009-01-03 21:22:43 +00001344}
Manuel Pégourié-Gonnard8271f2f2013-09-17 14:57:55 +02001345
Andrzej Kurek6056e7a2022-03-02 12:01:10 -05001346#endif /* MBEDTLS_HAVE_TIME */