| /* benchmark.c |
| * |
| * Copyright (C) 2006-2015 wolfSSL Inc. |
| * |
| * This file is part of wolfSSL. (formerly known as CyaSSL) |
| * |
| * wolfSSL is free software; you can redistribute it and/or modify |
| * it under the terms of the GNU General Public License as published by |
| * the Free Software Foundation; either version 2 of the License, or |
| * (at your option) any later version. |
| * |
| * wolfSSL is distributed in the hope that it will be useful, |
| * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| * GNU General Public License for more details. |
| * |
| * You should have received a copy of the GNU General Public License |
| * along with this program; if not, write to the Free Software |
| * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA |
| */ |
| |
| /* wolfCrypt benchmark */ |
| |
| |
| #ifdef HAVE_CONFIG_H |
| #include <config.h> |
| #endif |
| |
| #include <wolfssl/wolfcrypt/settings.h> |
| |
| #include <string.h> |
| |
| #ifdef FREESCALE_MQX |
| #include <mqx.h> |
| #include <fio.h> |
| #else |
| #include <stdio.h> |
| #endif |
| |
| #include <wolfssl/wolfcrypt/random.h> |
| #include <wolfssl/wolfcrypt/des3.h> |
| #include <wolfssl/wolfcrypt/arc4.h> |
| #include <wolfssl/wolfcrypt/hc128.h> |
| #include <wolfssl/wolfcrypt/rabbit.h> |
| #include <wolfssl/wolfcrypt/chacha.h> |
| #include <wolfssl/wolfcrypt/chacha20_poly1305.h> |
| #include <wolfssl/wolfcrypt/aes.h> |
| #include <wolfssl/wolfcrypt/poly1305.h> |
| #include <wolfssl/wolfcrypt/camellia.h> |
| #include <wolfssl/wolfcrypt/md5.h> |
| #include <wolfssl/wolfcrypt/sha.h> |
| #include <wolfssl/wolfcrypt/sha256.h> |
| #include <wolfssl/wolfcrypt/sha512.h> |
| #include <wolfssl/wolfcrypt/rsa.h> |
| #include <wolfssl/wolfcrypt/asn.h> |
| #include <wolfssl/wolfcrypt/ripemd.h> |
| #ifdef HAVE_ECC |
| #include <wolfssl/wolfcrypt/ecc.h> |
| #endif |
| #ifdef HAVE_CURVE25519 |
| #include <wolfssl/wolfcrypt/curve25519.h> |
| #endif |
| #ifdef HAVE_ED25519 |
| #include <wolfssl/wolfcrypt/ed25519.h> |
| #endif |
| |
| #include <wolfssl/wolfcrypt/dh.h> |
| #ifdef HAVE_CAVIUM |
| #include "cavium_sysdep.h" |
| #include "cavium_common.h" |
| #include "cavium_ioctl.h" |
| #endif |
| #ifdef HAVE_NTRU |
| #include "ntru_crypto.h" |
| #endif |
| |
| #if defined(WOLFSSL_MDK_ARM) |
| extern FILE * wolfSSL_fopen(const char *fname, const char *mode) ; |
| #define fopen wolfSSL_fopen |
| #endif |
| |
| #if defined(__GNUC__) && defined(__x86_64__) && !defined(NO_ASM) |
| #define HAVE_GET_CYCLES |
| static INLINE word64 get_intel_cycles(void); |
| static word64 total_cycles; |
| #define BEGIN_INTEL_CYCLES total_cycles = get_intel_cycles(); |
| #define END_INTEL_CYCLES total_cycles = get_intel_cycles() - total_cycles; |
| #define SHOW_INTEL_CYCLES printf(" Cycles per byte = %6.2f", \ |
| (float)total_cycles / (numBlocks*sizeof(plain))); |
| #else |
| #define BEGIN_INTEL_CYCLES |
| #define END_INTEL_CYCLES |
| #define SHOW_INTEL_CYCLES |
| #endif |
| |
| /* let's use buffers, we have them */ |
| #if !defined(USE_CERT_BUFFERS_1024) && !defined(USE_CERT_BUFFERS_2048) |
| #define USE_CERT_BUFFERS_2048 |
| #endif |
| |
| #if defined(USE_CERT_BUFFERS_1024) || defined(USE_CERT_BUFFERS_2048) \ |
| || !defined(NO_DH) |
| /* include test cert and key buffers for use with NO_FILESYSTEM */ |
| #if defined(WOLFSSL_MDK_ARM) |
| #include "cert_data.h" /* use certs_test.c for initial data, |
| so other commands can share the data. */ |
| #else |
| #include <wolfssl/certs_test.h> |
| #endif |
| #endif |
| |
| |
| #ifdef HAVE_BLAKE2 |
| #include <wolfssl/wolfcrypt/blake2.h> |
| void bench_blake2(void); |
| #endif |
| |
| #ifdef _MSC_VER |
| /* 4996 warning to use MS extensions e.g., strcpy_s instead of strncpy */ |
| #pragma warning(disable: 4996) |
| #endif |
| |
| |
| void bench_des(void); |
| void bench_arc4(void); |
| void bench_hc128(void); |
| void bench_rabbit(void); |
| void bench_chacha(void); |
| void bench_chacha20_poly1305_aead(void); |
| void bench_aes(int); |
| void bench_aesgcm(void); |
| void bench_aesccm(void); |
| void bench_aesctr(void); |
| void bench_poly1305(void); |
| void bench_camellia(void); |
| |
| void bench_md5(void); |
| void bench_sha(void); |
| void bench_sha256(void); |
| void bench_sha384(void); |
| void bench_sha512(void); |
| void bench_ripemd(void); |
| |
| void bench_rsa(void); |
| void bench_rsaKeyGen(void); |
| void bench_dh(void); |
| #ifdef HAVE_ECC |
| void bench_eccKeyGen(void); |
| void bench_eccKeyAgree(void); |
| #endif |
| #ifdef HAVE_CURVE25519 |
| void bench_curve25519KeyGen(void); |
| void bench_curve25519KeyAgree(void); |
| #endif |
| #ifdef HAVE_ED25519 |
| void bench_ed25519KeyGen(void); |
| void bench_ed25519KeySign(void); |
| #endif |
| #ifdef HAVE_NTRU |
| void bench_ntru(void); |
| void bench_ntruKeyGen(void); |
| #endif |
| |
| double current_time(int); |
| |
| |
| #ifdef HAVE_CAVIUM |
| |
| static int OpenNitroxDevice(int dma_mode,int dev_id) |
| { |
| Csp1CoreAssignment core_assign; |
| Uint32 device; |
| |
| if (CspInitialize(CAVIUM_DIRECT,CAVIUM_DEV_ID)) |
| return -1; |
| if (Csp1GetDevType(&device)) |
| return -1; |
| if (device != NPX_DEVICE) { |
| if (ioctl(gpkpdev_hdlr[CAVIUM_DEV_ID], IOCTL_CSP1_GET_CORE_ASSIGNMENT, |
| (Uint32 *)&core_assign)!= 0) |
| return -1; |
| } |
| CspShutdown(CAVIUM_DEV_ID); |
| |
| return CspInitialize(dma_mode, dev_id); |
| } |
| |
| #endif |
| |
| #if defined(DEBUG_WOLFSSL) && !defined(HAVE_VALGRIND) |
| WOLFSSL_API int wolfSSL_Debugging_ON(); |
| #endif |
| |
| #if !defined(NO_RSA) || !defined(NO_DH) \ |
| || defined(WOLFSSL_KEYGEN) || defined(HAVE_ECC) |
| #define HAVE_LOCAL_RNG |
| static RNG rng; |
| #endif |
| |
| /* use kB instead of mB for embedded benchmarking */ |
| #ifdef BENCH_EMBEDDED |
| static byte plain [1024]; |
| #else |
| static byte plain [1024*1024]; |
| #endif |
| |
| |
| /* use kB instead of mB for embedded benchmarking */ |
| #ifdef BENCH_EMBEDDED |
| static byte cipher[1024]; |
| #else |
| static byte cipher[1024*1024]; |
| #endif |
| |
| |
| static const XGEN_ALIGN byte key[] = |
| { |
| 0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef, |
| 0xfe,0xde,0xba,0x98,0x76,0x54,0x32,0x10, |
| 0x89,0xab,0xcd,0xef,0x01,0x23,0x45,0x67 |
| }; |
| |
| static const XGEN_ALIGN byte iv[] = |
| { |
| 0x12,0x34,0x56,0x78,0x90,0xab,0xcd,0xef, |
| 0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01, |
| 0x11,0x21,0x31,0x41,0x51,0x61,0x71,0x81 |
| }; |
| |
| |
| /* so embedded projects can pull in tests on their own */ |
| #if !defined(NO_MAIN_DRIVER) |
| |
| int main(int argc, char** argv) |
| |
| { |
| (void)argc; |
| (void)argv; |
| #else |
| int benchmark_test(void *args) |
| { |
| #endif |
| |
| #if defined(DEBUG_WOLFSSL) && !defined(HAVE_VALGRIND) |
| wolfSSL_Debugging_ON(); |
| #endif |
| |
| (void)plain; |
| (void)cipher; |
| (void)key; |
| (void)iv; |
| |
| #ifdef HAVE_CAVIUM |
| int ret = OpenNitroxDevice(CAVIUM_DIRECT, CAVIUM_DEV_ID); |
| if (ret != 0) { |
| printf("Cavium OpenNitroxDevice failed\n"); |
| exit(-1); |
| } |
| #endif /* HAVE_CAVIUM */ |
| |
| #if defined(HAVE_LOCAL_RNG) |
| { |
| int rngRet = wc_InitRng(&rng); |
| if (rngRet < 0) { |
| printf("InitRNG failed\n"); |
| return rngRet; |
| } |
| } |
| #endif |
| |
| #ifndef NO_AES |
| bench_aes(0); |
| bench_aes(1); |
| #endif |
| #ifdef HAVE_AESGCM |
| bench_aesgcm(); |
| #endif |
| |
| #ifdef WOLFSSL_AES_COUNTER |
| bench_aesctr(); |
| #endif |
| |
| #ifdef HAVE_AESCCM |
| bench_aesccm(); |
| #endif |
| #ifdef HAVE_CAMELLIA |
| bench_camellia(); |
| #endif |
| #ifndef NO_RC4 |
| bench_arc4(); |
| #endif |
| #ifdef HAVE_HC128 |
| bench_hc128(); |
| #endif |
| #ifndef NO_RABBIT |
| bench_rabbit(); |
| #endif |
| #ifdef HAVE_CHACHA |
| bench_chacha(); |
| #endif |
| #if defined(HAVE_CHACHA) && defined(HAVE_POLY1305) |
| bench_chacha20_poly1305_aead(); |
| #endif |
| #ifndef NO_DES3 |
| bench_des(); |
| #endif |
| |
| printf("\n"); |
| |
| #ifndef NO_MD5 |
| bench_md5(); |
| #endif |
| #ifdef HAVE_POLY1305 |
| bench_poly1305(); |
| #endif |
| #ifndef NO_SHA |
| bench_sha(); |
| #endif |
| #ifndef NO_SHA256 |
| bench_sha256(); |
| #endif |
| #ifdef WOLFSSL_SHA384 |
| bench_sha384(); |
| #endif |
| #ifdef WOLFSSL_SHA512 |
| bench_sha512(); |
| #endif |
| #ifdef WOLFSSL_RIPEMD |
| bench_ripemd(); |
| #endif |
| #ifdef HAVE_BLAKE2 |
| bench_blake2(); |
| #endif |
| |
| printf("\n"); |
| |
| #ifndef NO_RSA |
| bench_rsa(); |
| #endif |
| |
| #ifdef HAVE_NTRU |
| bench_ntru(); |
| #endif |
| |
| #ifndef NO_DH |
| bench_dh(); |
| #endif |
| |
| #if defined(WOLFSSL_KEY_GEN) && !defined(NO_RSA) |
| bench_rsaKeyGen(); |
| #endif |
| |
| #ifdef HAVE_NTRU |
| bench_ntruKeyGen(); |
| #endif |
| |
| #ifdef HAVE_ECC |
| bench_eccKeyGen(); |
| bench_eccKeyAgree(); |
| #if defined(FP_ECC) |
| wc_ecc_fp_free(); |
| #endif |
| #endif |
| |
| #ifdef HAVE_CURVE25519 |
| bench_curve25519KeyGen(); |
| bench_curve25519KeyAgree(); |
| #endif |
| |
| #ifdef HAVE_ED25519 |
| bench_ed25519KeyGen(); |
| bench_ed25519KeySign(); |
| #endif |
| |
| #if defined(HAVE_LOCAL_RNG) |
| wc_FreeRng(&rng); |
| #endif |
| |
| return 0; |
| } |
| |
| |
| #ifdef BENCH_EMBEDDED |
| enum BenchmarkBounds { |
| numBlocks = 25, /* how many kB to test (en/de)cryption */ |
| ntimes = 1, |
| genTimes = 5, /* public key iterations */ |
| agreeTimes = 5 |
| }; |
| static const char blockType[] = "kB"; /* used in printf output */ |
| #else |
| enum BenchmarkBounds { |
| numBlocks = 50, /* how many megs to test (en/de)cryption */ |
| ntimes = 100, |
| genTimes = 100, |
| agreeTimes = 100 |
| }; |
| static const char blockType[] = "megs"; /* used in printf output */ |
| #endif |
| |
| |
| #ifndef NO_AES |
| |
| void bench_aes(int show) |
| { |
| Aes enc; |
| double start, total, persec; |
| int i; |
| int ret; |
| |
| #ifdef HAVE_CAVIUM |
| if (wc_AesInitCavium(&enc, CAVIUM_DEV_ID) != 0) { |
| printf("aes init cavium failed\n"); |
| return; |
| } |
| #endif |
| |
| ret = wc_AesSetKey(&enc, key, 16, iv, AES_ENCRYPTION); |
| if (ret != 0) { |
| printf("AesSetKey failed, ret = %d\n", ret); |
| return; |
| } |
| start = current_time(1); |
| BEGIN_INTEL_CYCLES |
| |
| for(i = 0; i < numBlocks; i++) |
| wc_AesCbcEncrypt(&enc, plain, cipher, sizeof(plain)); |
| |
| END_INTEL_CYCLES |
| total = current_time(0) - start; |
| |
| persec = 1 / total * numBlocks; |
| #ifdef BENCH_EMBEDDED |
| /* since using kB, convert to MB/s */ |
| persec = persec / 1024; |
| #endif |
| |
| if (show) { |
| printf("AES %d %s took %5.3f seconds, %8.3f MB/s", numBlocks, |
| blockType, total, persec); |
| SHOW_INTEL_CYCLES |
| printf("\n"); |
| } |
| #ifdef HAVE_CAVIUM |
| wc_AesFreeCavium(&enc); |
| #endif |
| } |
| #endif |
| |
| |
| #if defined(HAVE_AESGCM) || defined(HAVE_AESCCM) |
| static byte additional[13]; |
| static byte tag[16]; |
| #endif |
| |
| |
| #ifdef HAVE_AESGCM |
| void bench_aesgcm(void) |
| { |
| Aes enc; |
| double start, total, persec; |
| int i; |
| |
| wc_AesGcmSetKey(&enc, key, 16); |
| start = current_time(1); |
| BEGIN_INTEL_CYCLES |
| |
| for(i = 0; i < numBlocks; i++) |
| wc_AesGcmEncrypt(&enc, cipher, plain, sizeof(plain), iv, 12, |
| tag, 16, additional, 13); |
| |
| END_INTEL_CYCLES |
| total = current_time(0) - start; |
| |
| persec = 1 / total * numBlocks; |
| #ifdef BENCH_EMBEDDED |
| /* since using kB, convert to MB/s */ |
| persec = persec / 1024; |
| #endif |
| |
| printf("AES-GCM %d %s took %5.3f seconds, %8.3f MB/s", numBlocks, |
| blockType, total, persec); |
| SHOW_INTEL_CYCLES |
| printf("\n"); |
| } |
| #endif |
| |
| #ifdef WOLFSSL_AES_COUNTER |
| void bench_aesctr(void) |
| { |
| Aes enc; |
| double start, total, persec; |
| int i; |
| |
| wc_AesSetKeyDirect(&enc, key, AES_BLOCK_SIZE, iv, AES_ENCRYPTION); |
| start = current_time(1); |
| BEGIN_INTEL_CYCLES |
| |
| for(i = 0; i < numBlocks; i++) |
| wc_AesCtrEncrypt(&enc, plain, cipher, sizeof(plain)); |
| |
| END_INTEL_CYCLES |
| total = current_time(0) - start; |
| |
| persec = 1 / total * numBlocks; |
| #ifdef BENCH_EMBEDDED |
| /* since using kB, convert to MB/s */ |
| persec = persec / 1024; |
| #endif |
| |
| printf("AES-CTR %d %s took %5.3f seconds, %8.3f MB/s", numBlocks, |
| blockType, total, persec); |
| SHOW_INTEL_CYCLES |
| printf("\n"); |
| } |
| #endif |
| |
| |
| |
| #ifdef HAVE_AESCCM |
| void bench_aesccm(void) |
| { |
| Aes enc; |
| double start, total, persec; |
| int i; |
| |
| wc_AesCcmSetKey(&enc, key, 16); |
| start = current_time(1); |
| BEGIN_INTEL_CYCLES |
| |
| for(i = 0; i < numBlocks; i++) |
| wc_AesCcmEncrypt(&enc, cipher, plain, sizeof(plain), iv, 12, |
| tag, 16, additional, 13); |
| |
| END_INTEL_CYCLES |
| total = current_time(0) - start; |
| |
| persec = 1 / total * numBlocks; |
| #ifdef BENCH_EMBEDDED |
| /* since using kB, convert to MB/s */ |
| persec = persec / 1024; |
| #endif |
| |
| printf("AES-CCM %d %s took %5.3f seconds, %8.3f MB/s", numBlocks, |
| blockType, total, persec); |
| SHOW_INTEL_CYCLES |
| printf("\n"); |
| } |
| #endif |
| |
| |
| #ifdef HAVE_POLY1305 |
| void bench_poly1305() |
| { |
| Poly1305 enc; |
| byte mac[16]; |
| double start, total, persec; |
| int i; |
| int ret; |
| |
| |
| ret = wc_Poly1305SetKey(&enc, key, 32); |
| if (ret != 0) { |
| printf("Poly1305SetKey failed, ret = %d\n", ret); |
| return; |
| } |
| start = current_time(1); |
| BEGIN_INTEL_CYCLES |
| |
| for(i = 0; i < numBlocks; i++) |
| wc_Poly1305Update(&enc, plain, sizeof(plain)); |
| |
| wc_Poly1305Final(&enc, mac); |
| END_INTEL_CYCLES |
| total = current_time(0) - start; |
| |
| persec = 1 / total * numBlocks; |
| #ifdef BENCH_EMBEDDED |
| /* since using kB, convert to MB/s */ |
| persec = persec / 1024; |
| #endif |
| |
| printf("POLY1305 %d %s took %5.3f seconds, %8.3f MB/s", numBlocks, |
| blockType, total, persec); |
| SHOW_INTEL_CYCLES |
| printf("\n"); |
| } |
| #endif /* HAVE_POLY1305 */ |
| |
| |
| #ifdef HAVE_CAMELLIA |
| void bench_camellia(void) |
| { |
| Camellia cam; |
| double start, total, persec; |
| int i, ret; |
| |
| ret = wc_CamelliaSetKey(&cam, key, 16, iv); |
| if (ret != 0) { |
| printf("CamelliaSetKey failed, ret = %d\n", ret); |
| return; |
| } |
| start = current_time(1); |
| BEGIN_INTEL_CYCLES |
| |
| for(i = 0; i < numBlocks; i++) |
| wc_CamelliaCbcEncrypt(&cam, plain, cipher, sizeof(plain)); |
| |
| END_INTEL_CYCLES |
| total = current_time(0) - start; |
| |
| persec = 1 / total * numBlocks; |
| #ifdef BENCH_EMBEDDED |
| /* since using kB, convert to MB/s */ |
| persec = persec / 1024; |
| #endif |
| |
| printf("Camellia %d %s took %5.3f seconds, %8.3f MB/s", numBlocks, |
| blockType, total, persec); |
| SHOW_INTEL_CYCLES |
| printf("\n"); |
| } |
| #endif |
| |
| |
| #ifndef NO_DES3 |
| void bench_des(void) |
| { |
| Des3 enc; |
| double start, total, persec; |
| int i, ret; |
| |
| #ifdef HAVE_CAVIUM |
| if (wc_Des3_InitCavium(&enc, CAVIUM_DEV_ID) != 0) |
| printf("des3 init cavium failed\n"); |
| #endif |
| ret = wc_Des3_SetKey(&enc, key, iv, DES_ENCRYPTION); |
| if (ret != 0) { |
| printf("Des3_SetKey failed, ret = %d\n", ret); |
| return; |
| } |
| start = current_time(1); |
| BEGIN_INTEL_CYCLES |
| |
| for(i = 0; i < numBlocks; i++) |
| wc_Des3_CbcEncrypt(&enc, plain, cipher, sizeof(plain)); |
| |
| END_INTEL_CYCLES |
| total = current_time(0) - start; |
| |
| persec = 1 / total * numBlocks; |
| #ifdef BENCH_EMBEDDED |
| /* since using kB, convert to MB/s */ |
| persec = persec / 1024; |
| #endif |
| |
| printf("3DES %d %s took %5.3f seconds, %8.3f MB/s", numBlocks, |
| blockType, total, persec); |
| SHOW_INTEL_CYCLES |
| printf("\n"); |
| #ifdef HAVE_CAVIUM |
| wc_Des3_FreeCavium(&enc); |
| #endif |
| } |
| #endif |
| |
| |
| #ifndef NO_RC4 |
| void bench_arc4(void) |
| { |
| Arc4 enc; |
| double start, total, persec; |
| int i; |
| |
| #ifdef HAVE_CAVIUM |
| if (wc_Arc4InitCavium(&enc, CAVIUM_DEV_ID) != 0) |
| printf("arc4 init cavium failed\n"); |
| #endif |
| |
| wc_Arc4SetKey(&enc, key, 16); |
| start = current_time(1); |
| BEGIN_INTEL_CYCLES |
| |
| for(i = 0; i < numBlocks; i++) |
| wc_Arc4Process(&enc, cipher, plain, sizeof(plain)); |
| |
| END_INTEL_CYCLES |
| total = current_time(0) - start; |
| persec = 1 / total * numBlocks; |
| #ifdef BENCH_EMBEDDED |
| /* since using kB, convert to MB/s */ |
| persec = persec / 1024; |
| #endif |
| |
| printf("ARC4 %d %s took %5.3f seconds, %8.3f MB/s", numBlocks, |
| blockType, total, persec); |
| SHOW_INTEL_CYCLES |
| printf("\n"); |
| #ifdef HAVE_CAVIUM |
| wc_Arc4FreeCavium(&enc); |
| #endif |
| } |
| #endif |
| |
| |
| #ifdef HAVE_HC128 |
| void bench_hc128(void) |
| { |
| HC128 enc; |
| double start, total, persec; |
| int i; |
| |
| wc_Hc128_SetKey(&enc, key, iv); |
| start = current_time(1); |
| BEGIN_INTEL_CYCLES |
| |
| for(i = 0; i < numBlocks; i++) |
| wc_Hc128_Process(&enc, cipher, plain, sizeof(plain)); |
| |
| END_INTEL_CYCLES |
| total = current_time(0) - start; |
| persec = 1 / total * numBlocks; |
| #ifdef BENCH_EMBEDDED |
| /* since using kB, convert to MB/s */ |
| persec = persec / 1024; |
| #endif |
| |
| printf("HC128 %d %s took %5.3f seconds, %8.3f MB/s", numBlocks, |
| blockType, total, persec); |
| SHOW_INTEL_CYCLES |
| printf("\n"); |
| } |
| #endif /* HAVE_HC128 */ |
| |
| |
| #ifndef NO_RABBIT |
| void bench_rabbit(void) |
| { |
| Rabbit enc; |
| double start, total, persec; |
| int i; |
| |
| wc_RabbitSetKey(&enc, key, iv); |
| start = current_time(1); |
| BEGIN_INTEL_CYCLES |
| |
| for(i = 0; i < numBlocks; i++) |
| wc_RabbitProcess(&enc, cipher, plain, sizeof(plain)); |
| |
| END_INTEL_CYCLES |
| total = current_time(0) - start; |
| persec = 1 / total * numBlocks; |
| #ifdef BENCH_EMBEDDED |
| /* since using kB, convert to MB/s */ |
| persec = persec / 1024; |
| #endif |
| |
| printf("RABBIT %d %s took %5.3f seconds, %8.3f MB/s", numBlocks, |
| blockType, total, persec); |
| SHOW_INTEL_CYCLES |
| printf("\n"); |
| } |
| #endif /* NO_RABBIT */ |
| |
| |
| #ifdef HAVE_CHACHA |
| void bench_chacha(void) |
| { |
| ChaCha enc; |
| double start, total, persec; |
| int i; |
| |
| wc_Chacha_SetKey(&enc, key, 16); |
| start = current_time(1); |
| BEGIN_INTEL_CYCLES |
| |
| for (i = 0; i < numBlocks; i++) { |
| wc_Chacha_SetIV(&enc, iv, 0); |
| wc_Chacha_Process(&enc, cipher, plain, sizeof(plain)); |
| } |
| |
| END_INTEL_CYCLES |
| total = current_time(0) - start; |
| persec = 1 / total * numBlocks; |
| #ifdef BENCH_EMBEDDED |
| /* since using kB, convert to MB/s */ |
| persec = persec / 1024; |
| #endif |
| |
| printf("CHACHA %d %s took %5.3f seconds, %8.3f MB/s", numBlocks, blockType, total, persec); |
| SHOW_INTEL_CYCLES |
| printf("\n"); |
| |
| } |
| #endif /* HAVE_CHACHA*/ |
| |
| #if( defined( HAVE_CHACHA ) && defined( HAVE_POLY1305 ) ) |
| void bench_chacha20_poly1305_aead(void) |
| { |
| double start, total, persec; |
| int i; |
| |
| byte authTag[CHACHA20_POLY1305_AEAD_AUTHTAG_SIZE]; |
| XMEMSET( authTag, 0, sizeof( authTag ) ); |
| |
| start = current_time(1); |
| BEGIN_INTEL_CYCLES |
| |
| for (i = 0; i < numBlocks; i++) |
| { |
| wc_ChaCha20Poly1305_Encrypt(key, iv, NULL, 0, plain, sizeof(plain), |
| cipher, authTag ); |
| } |
| |
| END_INTEL_CYCLES |
| total = current_time(0) - start; |
| persec = 1 / total * numBlocks; |
| #ifdef BENCH_EMBEDDED |
| /* since using kB, convert to MB/s */ |
| persec = persec / 1024; |
| #endif |
| |
| printf("CHA-POLY %d %s took %5.3f seconds, %8.3f MB/s", |
| numBlocks, blockType, total, persec); |
| SHOW_INTEL_CYCLES |
| printf("\n"); |
| |
| } |
| #endif /* HAVE_CHACHA && HAVE_POLY1305 */ |
| |
| |
| #ifndef NO_MD5 |
| void bench_md5(void) |
| { |
| Md5 hash; |
| byte digest[MD5_DIGEST_SIZE]; |
| double start, total, persec; |
| int i; |
| |
| wc_InitMd5(&hash); |
| start = current_time(1); |
| BEGIN_INTEL_CYCLES |
| |
| for(i = 0; i < numBlocks; i++) |
| wc_Md5Update(&hash, plain, sizeof(plain)); |
| |
| wc_Md5Final(&hash, digest); |
| |
| END_INTEL_CYCLES |
| total = current_time(0) - start; |
| persec = 1 / total * numBlocks; |
| #ifdef BENCH_EMBEDDED |
| /* since using kB, convert to MB/s */ |
| persec = persec / 1024; |
| #endif |
| |
| printf("MD5 %d %s took %5.3f seconds, %8.3f MB/s", numBlocks, |
| blockType, total, persec); |
| SHOW_INTEL_CYCLES |
| printf("\n"); |
| } |
| #endif /* NO_MD5 */ |
| |
| |
| #ifndef NO_SHA |
| void bench_sha(void) |
| { |
| Sha hash; |
| byte digest[SHA_DIGEST_SIZE]; |
| double start, total, persec; |
| int i, ret; |
| |
| ret = wc_InitSha(&hash); |
| if (ret != 0) { |
| printf("InitSha failed, ret = %d\n", ret); |
| return; |
| } |
| start = current_time(1); |
| BEGIN_INTEL_CYCLES |
| |
| for(i = 0; i < numBlocks; i++) |
| wc_ShaUpdate(&hash, plain, sizeof(plain)); |
| |
| wc_ShaFinal(&hash, digest); |
| |
| END_INTEL_CYCLES |
| total = current_time(0) - start; |
| persec = 1 / total * numBlocks; |
| #ifdef BENCH_EMBEDDED |
| /* since using kB, convert to MB/s */ |
| persec = persec / 1024; |
| #endif |
| |
| printf("SHA %d %s took %5.3f seconds, %8.3f MB/s", numBlocks, |
| blockType, total, persec); |
| SHOW_INTEL_CYCLES |
| printf("\n"); |
| } |
| #endif /* NO_SHA */ |
| |
| |
| #ifndef NO_SHA256 |
| void bench_sha256(void) |
| { |
| Sha256 hash; |
| byte digest[SHA256_DIGEST_SIZE]; |
| double start, total, persec; |
| int i, ret; |
| |
| ret = wc_InitSha256(&hash); |
| if (ret != 0) { |
| printf("InitSha256 failed, ret = %d\n", ret); |
| return; |
| } |
| start = current_time(1); |
| BEGIN_INTEL_CYCLES |
| |
| for(i = 0; i < numBlocks; i++) { |
| ret = wc_Sha256Update(&hash, plain, sizeof(plain)); |
| if (ret != 0) { |
| printf("Sha256Update failed, ret = %d\n", ret); |
| return; |
| } |
| } |
| |
| ret = wc_Sha256Final(&hash, digest); |
| if (ret != 0) { |
| printf("Sha256Final failed, ret = %d\n", ret); |
| return; |
| } |
| |
| END_INTEL_CYCLES |
| total = current_time(0) - start; |
| persec = 1 / total * numBlocks; |
| #ifdef BENCH_EMBEDDED |
| /* since using kB, convert to MB/s */ |
| persec = persec / 1024; |
| #endif |
| |
| printf("SHA-256 %d %s took %5.3f seconds, %8.3f MB/s", numBlocks, |
| blockType, total, persec); |
| SHOW_INTEL_CYCLES |
| printf("\n"); |
| } |
| #endif |
| |
| #ifdef WOLFSSL_SHA384 |
| void bench_sha384(void) |
| { |
| Sha384 hash; |
| byte digest[SHA384_DIGEST_SIZE]; |
| double start, total, persec; |
| int i, ret; |
| |
| ret = wc_InitSha384(&hash); |
| if (ret != 0) { |
| printf("InitSha384 failed, ret = %d\n", ret); |
| return; |
| } |
| start = current_time(1); |
| BEGIN_INTEL_CYCLES |
| |
| for(i = 0; i < numBlocks; i++) { |
| ret = wc_Sha384Update(&hash, plain, sizeof(plain)); |
| if (ret != 0) { |
| printf("Sha384Update failed, ret = %d\n", ret); |
| return; |
| } |
| } |
| |
| ret = wc_Sha384Final(&hash, digest); |
| if (ret != 0) { |
| printf("Sha384Final failed, ret = %d\n", ret); |
| return; |
| } |
| |
| END_INTEL_CYCLES |
| total = current_time(0) - start; |
| persec = 1 / total * numBlocks; |
| #ifdef BENCH_EMBEDDED |
| /* since using kB, convert to MB/s */ |
| persec = persec / 1024; |
| #endif |
| |
| printf("SHA-384 %d %s took %5.3f seconds, %8.3f MB/s", numBlocks, |
| blockType, total, persec); |
| SHOW_INTEL_CYCLES |
| printf("\n"); |
| } |
| #endif |
| |
| #ifdef WOLFSSL_SHA512 |
| void bench_sha512(void) |
| { |
| Sha512 hash; |
| byte digest[SHA512_DIGEST_SIZE]; |
| double start, total, persec; |
| int i, ret; |
| |
| ret = wc_InitSha512(&hash); |
| if (ret != 0) { |
| printf("InitSha512 failed, ret = %d\n", ret); |
| return; |
| } |
| start = current_time(1); |
| BEGIN_INTEL_CYCLES |
| |
| for(i = 0; i < numBlocks; i++) { |
| ret = wc_Sha512Update(&hash, plain, sizeof(plain)); |
| if (ret != 0) { |
| printf("Sha512Update failed, ret = %d\n", ret); |
| return; |
| } |
| } |
| |
| ret = wc_Sha512Final(&hash, digest); |
| if (ret != 0) { |
| printf("Sha512Final failed, ret = %d\n", ret); |
| return; |
| } |
| |
| END_INTEL_CYCLES |
| total = current_time(0) - start; |
| persec = 1 / total * numBlocks; |
| #ifdef BENCH_EMBEDDED |
| /* since using kB, convert to MB/s */ |
| persec = persec / 1024; |
| #endif |
| |
| printf("SHA-512 %d %s took %5.3f seconds, %8.3f MB/s", numBlocks, |
| blockType, total, persec); |
| SHOW_INTEL_CYCLES |
| printf("\n"); |
| } |
| #endif |
| |
| #ifdef WOLFSSL_RIPEMD |
| void bench_ripemd(void) |
| { |
| RipeMd hash; |
| byte digest[RIPEMD_DIGEST_SIZE]; |
| double start, total, persec; |
| int i; |
| |
| wc_InitRipeMd(&hash); |
| start = current_time(1); |
| BEGIN_INTEL_CYCLES |
| |
| for(i = 0; i < numBlocks; i++) |
| wc_RipeMdUpdate(&hash, plain, sizeof(plain)); |
| |
| wc_RipeMdFinal(&hash, digest); |
| |
| END_INTEL_CYCLES |
| total = current_time(0) - start; |
| persec = 1 / total * numBlocks; |
| #ifdef BENCH_EMBEDDED |
| /* since using kB, convert to MB/s */ |
| persec = persec / 1024; |
| #endif |
| |
| printf("RIPEMD %d %s took %5.3f seconds, %8.3f MB/s", numBlocks, |
| blockType, total, persec); |
| SHOW_INTEL_CYCLES |
| printf("\n"); |
| } |
| #endif |
| |
| |
| #ifdef HAVE_BLAKE2 |
| void bench_blake2(void) |
| { |
| Blake2b b2b; |
| byte digest[64]; |
| double start, total, persec; |
| int i, ret; |
| |
| ret = wc_InitBlake2b(&b2b, 64); |
| if (ret != 0) { |
| printf("InitBlake2b failed, ret = %d\n", ret); |
| return; |
| } |
| start = current_time(1); |
| BEGIN_INTEL_CYCLES |
| |
| for(i = 0; i < numBlocks; i++) { |
| ret = wc_Blake2bUpdate(&b2b, plain, sizeof(plain)); |
| if (ret != 0) { |
| printf("Blake2bUpdate failed, ret = %d\n", ret); |
| return; |
| } |
| } |
| |
| ret = wc_Blake2bFinal(&b2b, digest, 64); |
| if (ret != 0) { |
| printf("Blake2bFinal failed, ret = %d\n", ret); |
| return; |
| } |
| |
| END_INTEL_CYCLES |
| total = current_time(0) - start; |
| persec = 1 / total * numBlocks; |
| #ifdef BENCH_EMBEDDED |
| /* since using kB, convert to MB/s */ |
| persec = persec / 1024; |
| #endif |
| |
| printf("BLAKE2b %d %s took %5.3f seconds, %8.3f MB/s", numBlocks, |
| blockType, total, persec); |
| SHOW_INTEL_CYCLES |
| printf("\n"); |
| } |
| #endif |
| |
| |
| #ifndef NO_RSA |
| |
| |
| #if !defined(USE_CERT_BUFFERS_1024) && !defined(USE_CERT_BUFFERS_2048) |
| #if defined(WOLFSSL_MDK_SHELL) |
| static char *certRSAname = "certs/rsa2048.der"; |
| /* set by shell command */ |
| static void set_Bench_RSA_File(char * cert) { certRSAname = cert ; } |
| #elif defined(FREESCALE_MQX) |
| static char *certRSAname = "a:\\certs\\rsa2048.der"; |
| #else |
| static const char *certRSAname = "certs/rsa2048.der"; |
| #endif |
| #endif |
| |
| void bench_rsa(void) |
| { |
| int i; |
| int ret; |
| size_t bytes; |
| word32 idx = 0; |
| const byte* tmp; |
| |
| byte message[] = "Everyone gets Friday off."; |
| byte enc[256]; /* for up to 2048 bit */ |
| const int len = (int)strlen((char*)message); |
| double start, total, each, milliEach; |
| |
| RsaKey rsaKey; |
| int rsaKeySz = 2048; /* used in printf */ |
| |
| #ifdef USE_CERT_BUFFERS_1024 |
| tmp = rsa_key_der_1024; |
| bytes = sizeof_rsa_key_der_1024; |
| rsaKeySz = 1024; |
| #elif defined(USE_CERT_BUFFERS_2048) |
| tmp = rsa_key_der_2048; |
| bytes = sizeof_rsa_key_der_2048; |
| #else |
| #error "need a cert buffer size" |
| #endif /* USE_CERT_BUFFERS */ |
| |
| |
| #ifdef HAVE_CAVIUM |
| if (wc_RsaInitCavium(&rsaKey, CAVIUM_DEV_ID) != 0) |
| printf("RSA init cavium failed\n"); |
| #endif |
| ret = wc_InitRsaKey(&rsaKey, 0); |
| if (ret < 0) { |
| printf("InitRsaKey failed\n"); |
| return; |
| } |
| ret = wc_RsaPrivateKeyDecode(tmp, &idx, &rsaKey, (word32)bytes); |
| |
| start = current_time(1); |
| |
| for (i = 0; i < ntimes; i++) |
| ret = wc_RsaPublicEncrypt(message,len,enc,sizeof(enc), &rsaKey, &rng); |
| |
| total = current_time(0) - start; |
| each = total / ntimes; /* per second */ |
| milliEach = each * 1000; /* milliseconds */ |
| |
| printf("RSA %d encryption took %6.3f milliseconds, avg over %d" |
| " iterations\n", rsaKeySz, milliEach, ntimes); |
| |
| if (ret < 0) { |
| printf("Rsa Public Encrypt failed\n"); |
| return; |
| } |
| |
| start = current_time(1); |
| |
| for (i = 0; i < ntimes; i++) { |
| byte out[256]; /* for up to 2048 bit */ |
| wc_RsaPrivateDecrypt(enc, (word32)ret, out, sizeof(out), &rsaKey); |
| } |
| |
| total = current_time(0) - start; |
| each = total / ntimes; /* per second */ |
| milliEach = each * 1000; /* milliseconds */ |
| |
| printf("RSA %d decryption took %6.3f milliseconds, avg over %d" |
| " iterations\n", rsaKeySz, milliEach, ntimes); |
| |
| wc_FreeRsaKey(&rsaKey); |
| #ifdef HAVE_CAVIUM |
| wc_RsaFreeCavium(&rsaKey); |
| #endif |
| } |
| #endif |
| |
| |
| #ifndef NO_DH |
| |
| |
| #if !defined(USE_CERT_BUFFERS_1024) && !defined(USE_CERT_BUFFERS_2048) |
| #if defined(WOLFSSL_MDK_SHELL) |
| static char *certDHname = "certs/dh2048.der"; |
| /* set by shell command */ |
| void set_Bench_DH_File(char * cert) { certDHname = cert ; } |
| #elif defined(FREESCALE_MQX) |
| static char *certDHname = "a:\\certs\\dh2048.der"; |
| #elif defined(NO_ASN) |
| /* do nothing, but don't need a file */ |
| #else |
| static const char *certDHname = "certs/dh2048.der"; |
| #endif |
| #endif |
| |
| void bench_dh(void) |
| { |
| int i ; |
| size_t bytes; |
| word32 idx = 0, pubSz, privSz = 0, pubSz2, privSz2, agreeSz; |
| const byte* tmp; |
| |
| byte pub[256]; /* for 2048 bit */ |
| byte pub2[256]; /* for 2048 bit */ |
| byte agree[256]; /* for 2048 bit */ |
| byte priv[32]; /* for 2048 bit */ |
| byte priv2[32]; /* for 2048 bit */ |
| |
| double start, total, each, milliEach; |
| DhKey dhKey; |
| int dhKeySz = 2048; /* used in printf */ |
| |
| (void)idx; |
| (void)tmp; |
| |
| |
| #ifdef USE_CERT_BUFFERS_1024 |
| tmp = dh_key_der_1024; |
| bytes = sizeof_dh_key_der_1024; |
| dhKeySz = 1024; |
| #elif defined(USE_CERT_BUFFERS_2048) |
| tmp = dh_key_der_2048; |
| bytes = sizeof_dh_key_der_2048; |
| #elif defined(NO_ASN) |
| dhKeySz = 1024; |
| /* do nothing, but don't use default FILE */ |
| #else |
| #error "need to define a cert buffer size" |
| #endif /* USE_CERT_BUFFERS */ |
| |
| |
| wc_InitDhKey(&dhKey); |
| #ifdef NO_ASN |
| bytes = wc_DhSetKey(&dhKey, dh_p, sizeof(dh_p), dh_g, sizeof(dh_g)); |
| #else |
| bytes = wc_DhKeyDecode(tmp, &idx, &dhKey, (word32)bytes); |
| #endif |
| if (bytes != 0) { |
| printf("dhekydecode failed, can't benchmark\n"); |
| return; |
| } |
| |
| start = current_time(1); |
| |
| for (i = 0; i < ntimes; i++) |
| wc_DhGenerateKeyPair(&dhKey, &rng, priv, &privSz, pub, &pubSz); |
| |
| total = current_time(0) - start; |
| each = total / ntimes; /* per second */ |
| milliEach = each * 1000; /* milliseconds */ |
| |
| printf("DH %d key generation %6.3f milliseconds, avg over %d" |
| " iterations\n", dhKeySz, milliEach, ntimes); |
| |
| wc_DhGenerateKeyPair(&dhKey, &rng, priv2, &privSz2, pub2, &pubSz2); |
| start = current_time(1); |
| |
| for (i = 0; i < ntimes; i++) |
| wc_DhAgree(&dhKey, agree, &agreeSz, priv, privSz, pub2, pubSz2); |
| |
| total = current_time(0) - start; |
| each = total / ntimes; /* per second */ |
| milliEach = each * 1000; /* milliseconds */ |
| |
| printf("DH %d key agreement %6.3f milliseconds, avg over %d" |
| " iterations\n", dhKeySz, milliEach, ntimes); |
| |
| wc_FreeDhKey(&dhKey); |
| } |
| #endif |
| |
| #if defined(WOLFSSL_KEY_GEN) && !defined(NO_RSA) |
| void bench_rsaKeyGen(void) |
| { |
| RsaKey genKey; |
| double start, total, each, milliEach; |
| int i; |
| |
| /* 1024 bit */ |
| start = current_time(1); |
| |
| for(i = 0; i < genTimes; i++) { |
| wc_InitRsaKey(&genKey, 0); |
| wc_MakeRsaKey(&genKey, 1024, 65537, &rng); |
| wc_FreeRsaKey(&genKey); |
| } |
| |
| total = current_time(0) - start; |
| each = total / genTimes; /* per second */ |
| milliEach = each * 1000; /* millisconds */ |
| printf("\n"); |
| printf("RSA 1024 key generation %6.3f milliseconds, avg over %d" |
| " iterations\n", milliEach, genTimes); |
| |
| /* 2048 bit */ |
| start = current_time(1); |
| |
| for(i = 0; i < genTimes; i++) { |
| wc_InitRsaKey(&genKey, 0); |
| wc_MakeRsaKey(&genKey, 2048, 65537, &rng); |
| wc_FreeRsaKey(&genKey); |
| } |
| |
| total = current_time(0) - start; |
| each = total / genTimes; /* per second */ |
| milliEach = each * 1000; /* millisconds */ |
| printf("RSA 2048 key generation %6.3f milliseconds, avg over %d" |
| " iterations\n", milliEach, genTimes); |
| } |
| #endif /* WOLFSSL_KEY_GEN */ |
| #ifdef HAVE_NTRU |
| byte GetEntropy(ENTROPY_CMD cmd, byte* out); |
| |
| byte GetEntropy(ENTROPY_CMD cmd, byte* out) |
| { |
| if (cmd == INIT) |
| return (wc_InitRng(&rng) == 0) ? 1 : 0; |
| |
| if (out == NULL) |
| return 0; |
| |
| if (cmd == GET_BYTE_OF_ENTROPY) |
| return (wc_RNG_GenerateBlock(&rng, out, 1) == 0) ? 1 : 0; |
| |
| if (cmd == GET_NUM_BYTES_PER_BYTE_OF_ENTROPY) { |
| *out = 1; |
| return 1; |
| } |
| |
| return 0; |
| } |
| |
| void bench_ntru(void) |
| { |
| int i; |
| double start, total, each, milliEach; |
| |
| byte public_key[557]; |
| word16 public_key_len = sizeof(public_key); |
| byte private_key[607]; |
| word16 private_key_len = sizeof(private_key); |
| |
| byte ciphertext[552]; |
| word16 ciphertext_len; |
| byte plaintext[16]; |
| word16 plaintext_len; |
| |
| DRBG_HANDLE drbg; |
| static byte const aes_key[] = { |
| 0xf3, 0xe9, 0x87, 0xbb, 0x18, 0x08, 0x3c, 0xaa, |
| 0x7b, 0x12, 0x49, 0x88, 0xaf, 0xb3, 0x22, 0xd8 |
| }; |
| |
| static byte const cyasslStr[] = { |
| 'C', 'y', 'a', 'S', 'S', 'L', ' ', 'N', 'T', 'R', 'U' |
| }; |
| |
| word32 rc = ntru_crypto_drbg_instantiate(112, cyasslStr, sizeof(cyasslStr), |
| (ENTROPY_FN) GetEntropy, &drbg); |
| if(rc != DRBG_OK) { |
| printf("NTRU drbg instantiate failed\n"); |
| return; |
| } |
| |
| rc = ntru_crypto_ntru_encrypt_keygen(drbg, NTRU_EES401EP2, |
| &public_key_len, NULL, &private_key_len, NULL); |
| if (rc != NTRU_OK) { |
| ntru_crypto_drbg_uninstantiate(drbg); |
| printf("NTRU failed to get key lengths\n"); |
| return; |
| } |
| |
| rc = ntru_crypto_ntru_encrypt_keygen(drbg, NTRU_EES401EP2, &public_key_len, |
| public_key, &private_key_len, |
| private_key); |
| |
| ntru_crypto_drbg_uninstantiate(drbg); |
| |
| if (rc != NTRU_OK) { |
| ntru_crypto_drbg_uninstantiate(drbg); |
| printf("NTRU keygen failed\n"); |
| return; |
| } |
| |
| rc = ntru_crypto_drbg_instantiate(112, NULL, 0, (ENTROPY_FN)GetEntropy, |
| &drbg); |
| if (rc != DRBG_OK) { |
| printf("NTRU error occurred during DRBG instantiation\n"); |
| return; |
| } |
| |
| rc = ntru_crypto_ntru_encrypt(drbg, public_key_len, public_key, sizeof( |
| aes_key), aes_key, &ciphertext_len, NULL); |
| |
| if (rc != NTRU_OK) { |
| printf("NTRU error occurred requesting the buffer size needed\n"); |
| return; |
| } |
| start = current_time(1); |
| |
| for (i = 0; i < ntimes; i++) { |
| |
| rc = ntru_crypto_ntru_encrypt(drbg, public_key_len, public_key, sizeof( |
| aes_key), aes_key, &ciphertext_len, ciphertext); |
| |
| if (rc != NTRU_OK) { |
| printf("NTRU encrypt error\n"); |
| return; |
| } |
| |
| } |
| rc = ntru_crypto_drbg_uninstantiate(drbg); |
| |
| if (rc != DRBG_OK) { |
| printf("NTRU error occurred uninstantiating the DRBG\n"); |
| return; |
| } |
| |
| total = current_time(0) - start; |
| each = total / ntimes; /* per second */ |
| milliEach = each * 1000; /* milliseconds */ |
| |
| printf("NTRU 112 encryption took %6.3f milliseconds, avg over %d" |
| " iterations\n", milliEach, ntimes); |
| |
| |
| rc = ntru_crypto_ntru_decrypt(private_key_len, private_key, ciphertext_len, |
| ciphertext, &plaintext_len, NULL); |
| |
| if (rc != NTRU_OK) { |
| printf("NTRU decrypt error occurred getting the buffer size needed\n"); |
| return; |
| } |
| |
| plaintext_len = sizeof(plaintext); |
| start = current_time(1); |
| |
| for (i = 0; i < ntimes; i++) { |
| rc = ntru_crypto_ntru_decrypt(private_key_len, private_key, |
| ciphertext_len, ciphertext, |
| &plaintext_len, plaintext); |
| |
| if (rc != NTRU_OK) { |
| printf("NTRU error occurred decrypting the key\n"); |
| return; |
| } |
| } |
| |
| total = current_time(0) - start; |
| each = total / ntimes; /* per second */ |
| milliEach = each * 1000; /* milliseconds */ |
| |
| printf("NTRU 112 decryption took %6.3f milliseconds, avg over %d" |
| " iterations\n", milliEach, ntimes); |
| } |
| |
| void bench_ntruKeyGen(void) |
| { |
| double start, total, each, milliEach; |
| int i; |
| |
| byte public_key[557]; /* 2048 key equivalent to rsa */ |
| word16 public_key_len = sizeof(public_key); |
| byte private_key[607]; |
| word16 private_key_len = sizeof(private_key); |
| |
| DRBG_HANDLE drbg; |
| static uint8_t const pers_str[] = { |
| 'C', 'y', 'a', 'S', 'S', 'L', ' ', 't', 'e', 's', 't' |
| }; |
| |
| word32 rc = ntru_crypto_drbg_instantiate(112, pers_str, sizeof(pers_str), |
| GetEntropy, &drbg); |
| if(rc != DRBG_OK) { |
| printf("NTRU drbg instantiate failed\n"); |
| return; |
| } |
| |
| start = current_time(1); |
| |
| for(i = 0; i < genTimes; i++) { |
| ntru_crypto_ntru_encrypt_keygen(drbg, NTRU_EES401EP2, &public_key_len, |
| public_key, &private_key_len, |
| private_key); |
| } |
| |
| total = current_time(0) - start; |
| |
| rc = ntru_crypto_drbg_uninstantiate(drbg); |
| |
| if (rc != NTRU_OK) { |
| printf("NTRU drbg uninstantiate failed\n"); |
| return; |
| } |
| |
| each = total / genTimes; |
| milliEach = each * 1000; |
| |
| printf("\n"); |
| printf("NTRU 112 key generation %6.3f milliseconds, avg over %d" |
| " iterations\n", milliEach, genTimes); |
| |
| } |
| #endif |
| |
| #ifdef HAVE_ECC |
| void bench_eccKeyGen(void) |
| { |
| ecc_key genKey; |
| double start, total, each, milliEach; |
| int i; |
| |
| /* 256 bit */ |
| start = current_time(1); |
| |
| for(i = 0; i < genTimes; i++) { |
| wc_ecc_init(&genKey); |
| wc_ecc_make_key(&rng, 32, &genKey); |
| wc_ecc_free(&genKey); |
| } |
| |
| total = current_time(0) - start; |
| each = total / genTimes; /* per second */ |
| milliEach = each * 1000; /* millisconds */ |
| printf("\n"); |
| printf("ECC 256 key generation %6.3f milliseconds, avg over %d" |
| " iterations\n", milliEach, genTimes); |
| } |
| |
| |
| void bench_eccKeyAgree(void) |
| { |
| ecc_key genKey, genKey2; |
| double start, total, each, milliEach; |
| int i, ret; |
| byte shared[32]; |
| byte sig[64+16]; /* der encoding too */ |
| byte digest[32]; |
| word32 x = 0; |
| |
| wc_ecc_init(&genKey); |
| wc_ecc_init(&genKey2); |
| |
| ret = wc_ecc_make_key(&rng, 32, &genKey); |
| if (ret != 0) { |
| printf("ecc_make_key failed\n"); |
| return; |
| } |
| ret = wc_ecc_make_key(&rng, 32, &genKey2); |
| if (ret != 0) { |
| printf("ecc_make_key failed\n"); |
| return; |
| } |
| |
| /* 256 bit */ |
| start = current_time(1); |
| |
| for(i = 0; i < agreeTimes; i++) { |
| x = sizeof(shared); |
| ret = wc_ecc_shared_secret(&genKey, &genKey2, shared, &x); |
| if (ret != 0) { |
| printf("ecc_shared_secret failed\n"); |
| return; |
| } |
| } |
| |
| total = current_time(0) - start; |
| each = total / agreeTimes; /* per second */ |
| milliEach = each * 1000; /* millisconds */ |
| printf("EC-DHE key agreement %6.3f milliseconds, avg over %d" |
| " iterations\n", milliEach, agreeTimes); |
| |
| /* make dummy digest */ |
| for (i = 0; i < (int)sizeof(digest); i++) |
| digest[i] = (byte)i; |
| |
| |
| start = current_time(1); |
| |
| for(i = 0; i < agreeTimes; i++) { |
| x = sizeof(sig); |
| ret = wc_ecc_sign_hash(digest, sizeof(digest), sig, &x, &rng, &genKey); |
| if (ret != 0) { |
| printf("ecc_sign_hash failed\n"); |
| return; |
| } |
| } |
| |
| total = current_time(0) - start; |
| each = total / agreeTimes; /* per second */ |
| milliEach = each * 1000; /* millisconds */ |
| printf("EC-DSA sign time %6.3f milliseconds, avg over %d" |
| " iterations\n", milliEach, agreeTimes); |
| |
| start = current_time(1); |
| |
| for(i = 0; i < agreeTimes; i++) { |
| int verify = 0; |
| ret = wc_ecc_verify_hash(sig, x, digest, sizeof(digest), &verify, &genKey); |
| if (ret != 0) { |
| printf("ecc_verify_hash failed\n"); |
| return; |
| } |
| } |
| |
| total = current_time(0) - start; |
| each = total / agreeTimes; /* per second */ |
| milliEach = each * 1000; /* millisconds */ |
| printf("EC-DSA verify time %6.3f milliseconds, avg over %d" |
| " iterations\n", milliEach, agreeTimes); |
| |
| wc_ecc_free(&genKey2); |
| wc_ecc_free(&genKey); |
| } |
| #endif /* HAVE_ECC */ |
| |
| #ifdef HAVE_CURVE25519 |
| void bench_curve25519KeyGen(void) |
| { |
| curve25519_key genKey; |
| double start, total, each, milliEach; |
| int i; |
| |
| /* 256 bit */ |
| start = current_time(1); |
| |
| for(i = 0; i < genTimes; i++) { |
| wc_curve25519_make_key(&rng, 32, &genKey); |
| wc_curve25519_free(&genKey); |
| } |
| |
| total = current_time(0) - start; |
| each = total / genTimes; /* per second */ |
| milliEach = each * 1000; /* millisconds */ |
| printf("\n"); |
| printf("CURVE25519 256 key generation %6.3f milliseconds, avg over %d" |
| " iterations\n", milliEach, genTimes); |
| } |
| |
| |
| void bench_curve25519KeyAgree(void) |
| { |
| curve25519_key genKey, genKey2; |
| double start, total, each, milliEach; |
| int i, ret; |
| byte shared[32]; |
| word32 x = 0; |
| |
| wc_curve25519_init(&genKey); |
| wc_curve25519_init(&genKey2); |
| |
| ret = wc_curve25519_make_key(&rng, 32, &genKey); |
| if (ret != 0) { |
| printf("curve25519_make_key failed\n"); |
| return; |
| } |
| ret = wc_curve25519_make_key(&rng, 32, &genKey2); |
| if (ret != 0) { |
| printf("curve25519_make_key failed\n"); |
| return; |
| } |
| |
| /* 256 bit */ |
| start = current_time(1); |
| |
| for(i = 0; i < agreeTimes; i++) { |
| x = sizeof(shared); |
| ret = wc_curve25519_shared_secret(&genKey, &genKey2, shared, &x); |
| if (ret != 0) { |
| printf("curve25519_shared_secret failed\n"); |
| return; |
| } |
| } |
| |
| total = current_time(0) - start; |
| each = total / agreeTimes; /* per second */ |
| milliEach = each * 1000; /* millisconds */ |
| printf("CURVE25519 key agreement %6.3f milliseconds, avg over %d" |
| " iterations\n", milliEach, agreeTimes); |
| |
| wc_curve25519_free(&genKey2); |
| wc_curve25519_free(&genKey); |
| } |
| #endif /* HAVE_CURVE25519 */ |
| |
| #ifdef HAVE_ED25519 |
| void bench_ed25519KeyGen(void) |
| { |
| ed25519_key genKey; |
| double start, total, each, milliEach; |
| int i; |
| |
| /* 256 bit */ |
| start = current_time(1); |
| |
| for(i = 0; i < genTimes; i++) { |
| wc_ed25519_init(&genKey); |
| wc_ed25519_make_key(&rng, 32, &genKey); |
| wc_ed25519_free(&genKey); |
| } |
| |
| total = current_time(0) - start; |
| each = total / genTimes; /* per second */ |
| milliEach = each * 1000; /* millisconds */ |
| printf("\n"); |
| printf("ED25519 key generation %6.3f milliseconds, avg over %d" |
| " iterations\n", milliEach, genTimes); |
| } |
| |
| |
| void bench_ed25519KeySign(void) |
| { |
| ed25519_key genKey; |
| double start, total, each, milliEach; |
| int i, ret; |
| byte sig[ED25519_SIG_SIZE]; |
| byte msg[512]; |
| word32 x = 0; |
| |
| wc_ed25519_init(&genKey); |
| |
| ret = wc_ed25519_make_key(&rng, ED25519_KEY_SIZE, &genKey); |
| if (ret != 0) { |
| printf("ed25519_make_key failed\n"); |
| return; |
| } |
| /* make dummy msg */ |
| for (i = 0; i < (int)sizeof(msg); i++) |
| msg[i] = (byte)i; |
| |
| |
| start = current_time(1); |
| |
| for(i = 0; i < agreeTimes; i++) { |
| x = sizeof(sig); |
| ret = wc_ed25519_sign_msg(msg, sizeof(msg), sig, &x, &genKey); |
| if (ret != 0) { |
| printf("ed25519_sign_msg failed\n"); |
| return; |
| } |
| } |
| |
| total = current_time(0) - start; |
| each = total / agreeTimes; /* per second */ |
| milliEach = each * 1000; /* millisconds */ |
| printf("ED25519 sign time %6.3f milliseconds, avg over %d" |
| " iterations\n", milliEach, agreeTimes); |
| |
| start = current_time(1); |
| |
| for(i = 0; i < agreeTimes; i++) { |
| int verify = 0; |
| ret = wc_ed25519_verify_msg(sig, x, msg, sizeof(msg), &verify, |
| &genKey); |
| if (ret != 0 || verify != 1) { |
| printf("ed25519_verify_msg failed\n"); |
| return; |
| } |
| } |
| |
| total = current_time(0) - start; |
| each = total / agreeTimes; /* per second */ |
| milliEach = each * 1000; /* millisconds */ |
| printf("ED25519 verify time %6.3f milliseconds, avg over %d" |
| " iterations\n", milliEach, agreeTimes); |
| |
| wc_ed25519_free(&genKey); |
| } |
| #endif /* HAVE_ED25519 */ |
| |
| |
| #ifdef _WIN32 |
| |
| #define WIN32_LEAN_AND_MEAN |
| #include <windows.h> |
| |
| double current_time(int reset) |
| { |
| static int init = 0; |
| static LARGE_INTEGER freq; |
| |
| LARGE_INTEGER count; |
| |
| (void)reset; |
| |
| if (!init) { |
| QueryPerformanceFrequency(&freq); |
| init = 1; |
| } |
| |
| QueryPerformanceCounter(&count); |
| |
| return (double)count.QuadPart / freq.QuadPart; |
| } |
| |
| #elif defined MICROCHIP_PIC32 |
| #if defined(WOLFSSL_MICROCHIP_PIC32MZ) |
| #define CLOCK 80000000.0 |
| #else |
| #include <peripheral/timer.h> |
| #define CLOCK 40000000.0 |
| #endif |
| |
| double current_time(int reset) |
| { |
| unsigned int ns; |
| |
| if (reset) { |
| WriteCoreTimer(0); |
| } |
| |
| /* get timer in ns */ |
| ns = ReadCoreTimer(); |
| |
| /* return seconds as a double */ |
| return ( ns / CLOCK * 2.0); |
| } |
| |
| #elif defined(WOLFSSL_IAR_ARM_TIME) || defined (WOLFSSL_MDK_ARM) || defined(WOLFSSL_USER_CURRTIME) |
| extern double current_time(int reset); |
| |
| #elif defined FREERTOS |
| |
| double current_time(int reset) |
| { |
| portTickType tickCount; |
| |
| (void) reset; |
| |
| /* tick count == ms, if configTICK_RATE_HZ is set to 1000 */ |
| tickCount = xTaskGetTickCount(); |
| return (double)tickCount / 1000; |
| } |
| |
| #elif defined (WOLFSSL_TIRTOS) |
| |
| extern double current_time(int reset); |
| |
| #elif defined(FREESCALE_MQX) |
| |
| double current_time(int reset) |
| { |
| TIME_STRUCT tv; |
| _time_get(&tv); |
| |
| return (double)tv.SECONDS + (double)tv.MILLISECONDS / 1000; |
| } |
| |
| #else |
| |
| #include <sys/time.h> |
| |
| double current_time(int reset) |
| { |
| struct timeval tv; |
| |
| (void)reset; |
| |
| gettimeofday(&tv, 0); |
| |
| return (double)tv.tv_sec + (double)tv.tv_usec / 1000000; |
| } |
| |
| #endif /* _WIN32 */ |
| |
| #ifdef HAVE_GET_CYCLES |
| |
| static INLINE word64 get_intel_cycles(void) |
| { |
| unsigned int lo_c, hi_c; |
| __asm__ __volatile__ ( |
| "cpuid\n\t" |
| "rdtsc" |
| : "=a"(lo_c), "=d"(hi_c) /* out */ |
| : "a"(0) /* in */ |
| : "%ebx", "%ecx"); /* clobber */ |
| return ((word64)lo_c) | (((word64)hi_c) << 32); |
| } |
| |
| #endif /* HAVE_GET_CYCLES */ |