From 17b77485fa4ea8ecbf472e2d1daa15007ff93705 Mon Sep 17 00:00:00 2001 From: Erwin Nindl Date: Fri, 13 Jul 2007 16:05:16 +0000 Subject: * removed srtp directory * install libsrtp under /usr/local/lib * cleaned up Makefile --- srtp/crypto/test/cipher_driver.c | 491 --------------------------------------- 1 file changed, 491 deletions(-) delete mode 100644 srtp/crypto/test/cipher_driver.c (limited to 'srtp/crypto/test/cipher_driver.c') diff --git a/srtp/crypto/test/cipher_driver.c b/srtp/crypto/test/cipher_driver.c deleted file mode 100644 index 25ca90a..0000000 --- a/srtp/crypto/test/cipher_driver.c +++ /dev/null @@ -1,491 +0,0 @@ -/* - * cipher_driver.c - * - * A driver for the generic cipher type - * - * David A. McGrew - * Cisco Systems, Inc. - */ - -/* - * - * Copyright (c) 2001-2006, Cisco Systems, Inc. - * All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * Redistributions in binary form must reproduce the above - * copyright notice, this list of conditions and the following - * disclaimer in the documentation and/or other materials provided - * with the distribution. - * - * Neither the name of the Cisco Systems, Inc. nor the names of its - * contributors may be used to endorse or promote products derived - * from this software without specific prior written permission. - * - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS - * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE - * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, - * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES - * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR - * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * - */ - -#include /* for printf() */ -#include /* for rand() */ -#include /* for memset() */ -#include /* for getopt() */ -#include "cipher.h" -#include "aes_icm.h" -#include "null_cipher.h" - -#define PRINT_DEBUG 0 - -void -cipher_driver_test_throughput(cipher_t *c); - -err_status_t -cipher_driver_self_test(cipher_type_t *ct); - - -/* - * cipher_driver_test_buffering(ct) tests the cipher's output - * buffering for correctness by checking the consistency of succesive - * calls - */ - -err_status_t -cipher_driver_test_buffering(cipher_t *c); - - -/* - * functions for testing cipher cache thrash - */ -err_status_t -cipher_driver_test_array_throughput(cipher_type_t *ct, - int klen, int num_cipher); - -void -cipher_array_test_throughput(cipher_t *ca[], int num_cipher); - -uint64_t -cipher_array_bits_per_second(cipher_t *cipher_array[], int num_cipher, - unsigned octets_in_buffer, int num_trials); - -err_status_t -cipher_array_delete(cipher_t *cipher_array[], int num_cipher); - -err_status_t -cipher_array_alloc_init(cipher_t ***cipher_array, int num_ciphers, - cipher_type_t *ctype, int klen); - -void -usage(char *prog_name) { - printf("usage: %s [ -t | -v | -a ]\n", prog_name); - exit(255); -} - -void -check_status(err_status_t s) { - if (s) { - printf("error (code %d)\n", s); - exit(s); - } - return; -} - -/* - * null_cipher, aes_icm, and aes_cbc are the cipher meta-objects - * defined in the files in crypto/cipher subdirectory. these are - * declared external so that we can use these cipher types here - */ - -extern cipher_type_t null_cipher; -extern cipher_type_t aes_icm; -extern cipher_type_t aes_cbc; - -int -main(int argc, char *argv[]) { - cipher_t *c = NULL; - err_status_t status; - unsigned char test_key[20] = { - 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, - 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, - 0x10, 0x11, 0x12, 0x13 - }; - int q; - unsigned do_timing_test = 0; - unsigned do_validation = 0; - unsigned do_array_timing_test = 0; - - /* process input arguments */ - while (1) { - q = getopt(argc, argv, "tva"); - if (q == -1) - break; - switch (q) { - case 't': - do_timing_test = 1; - break; - case 'v': - do_validation = 1; - break; - case 'a': - do_array_timing_test = 1; - break; - default: - usage(argv[0]); - } - } - - printf("cipher test driver\n" - "David A. McGrew\n" - "Cisco Systems, Inc.\n"); - - if (!do_validation && !do_timing_test && !do_array_timing_test) - usage(argv[0]); - - /* arry timing (cache thrash) test */ - if (do_array_timing_test) { - int max_num_cipher = 1 << 16; /* number of ciphers in cipher_array */ - int num_cipher; - - for (num_cipher=1; num_cipher < max_num_cipher; num_cipher *=8) - cipher_driver_test_array_throughput(&null_cipher, 0, num_cipher); - - for (num_cipher=1; num_cipher < max_num_cipher; num_cipher *=8) - cipher_driver_test_array_throughput(&aes_icm, 30, num_cipher); - - for (num_cipher=1; num_cipher < max_num_cipher; num_cipher *=8) - cipher_driver_test_array_throughput(&aes_cbc, 16, num_cipher); - - } - - if (do_validation) { - cipher_driver_self_test(&null_cipher); - cipher_driver_self_test(&aes_icm); - cipher_driver_self_test(&aes_cbc); - } - - /* do timing and/or buffer_test on null_cipher */ - status = cipher_type_alloc(&null_cipher, &c, 0); - check_status(status); - - status = cipher_init(c, NULL, direction_encrypt); - check_status(status); - - if (do_timing_test) - cipher_driver_test_throughput(c); - if (do_validation) { - status = cipher_driver_test_buffering(c); - check_status(status); - } - status = cipher_dealloc(c); - check_status(status); - - - /* run the throughput test on the aes_icm cipher */ - status = cipher_type_alloc(&aes_icm, &c, 30); - if (status) { - fprintf(stderr, "error: can't allocate cipher\n"); - exit(status); - } - - status = cipher_init(c, test_key, direction_encrypt); - check_status(status); - - if (do_timing_test) - cipher_driver_test_throughput(c); - - if (do_validation) { - status = cipher_driver_test_buffering(c); - check_status(status); - } - - status = cipher_dealloc(c); - check_status(status); - - return 0; -} - -void -cipher_driver_test_throughput(cipher_t *c) { - int i; - int min_enc_len = 32; - int max_enc_len = 2048; /* should be a power of two */ - int num_trials = 100000; - - printf("timing %s throughput:\n", c->type->description); - fflush(stdout); - for (i=min_enc_len; i <= max_enc_len; i = i * 2) - printf("msg len: %d\tgigabits per second: %f\n", - i, cipher_bits_per_second(c, i, num_trials) / 1e9); - -} - -err_status_t -cipher_driver_self_test(cipher_type_t *ct) { - err_status_t status; - - printf("running cipher self-test for %s...", ct->description); - status = cipher_type_self_test(ct); - if (status) { - printf("failed with error code %d\n", status); - exit(status); - } - printf("passed\n"); - - return err_status_ok; -} - -/* - * cipher_driver_test_buffering(ct) tests the cipher's output - * buffering for correctness by checking the consistency of succesive - * calls - */ - -err_status_t -cipher_driver_test_buffering(cipher_t *c) { - int i, j, num_trials = 1000; - unsigned len, buflen = 1024; - uint8_t buffer0[buflen], buffer1[buflen], *current, *end; - uint8_t idx[16] = { - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x12, 0x34 - }; - err_status_t status; - - printf("testing output buffering for cipher %s...", - c->type->description); - - for (i=0; i < num_trials; i++) { - - /* set buffers to zero */ - for (j=0; j < buflen; j++) - buffer0[j] = buffer1[j] = 0; - - /* initialize cipher */ - status = cipher_set_iv(c, idx); - if (status) - return status; - - /* generate 'reference' value by encrypting all at once */ - status = cipher_encrypt(c, buffer0, &buflen); - if (status) - return status; - - /* re-initialize cipher */ - status = cipher_set_iv(c, idx); - if (status) - return status; - - /* now loop over short lengths until buffer1 is encrypted */ - current = buffer1; - end = buffer1 + buflen; - while (current < end) { - - /* choose a short length */ - len = rand() & 0x01f; - - /* make sure that len doesn't cause us to overreach the buffer */ - if (current + len > end) - len = end - current; - - status = cipher_encrypt(c, current, &len); - if (status) - return status; - - /* advance pointer into buffer1 to reflect encryption */ - current += len; - - /* if buffer1 is all encrypted, break out of loop */ - if (current == end) - break; - } - - /* compare buffers */ - for (j=0; j < buflen; j++) - if (buffer0[j] != buffer1[j]) { -#if PRINT_DEBUG - printf("test case %d failed at byte %d\n", i, j); - printf("computed: %s\n", octet_string_hex_string(buffer1, buflen)); - printf("expected: %s\n", octet_string_hex_string(buffer0, buflen)); -#endif - return err_status_algo_fail; - } - } - - printf("passed\n"); - - return err_status_ok; -} - - -/* - * The function cipher_test_throughput_array() tests the effect of CPU - * cache thrash on cipher throughput. - * - * cipher_array_alloc_init(ctype, array, num_ciphers) creates an array - * of cipher_t of type ctype - */ - -err_status_t -cipher_array_alloc_init(cipher_t ***ca, int num_ciphers, - cipher_type_t *ctype, int klen) { - int i, j; - err_status_t status; - uint8_t *key; - cipher_t **cipher_array; - - /* allocate array of pointers to ciphers */ - cipher_array = (cipher_t **) malloc(sizeof(cipher_t *) * num_ciphers); - if (cipher_array == NULL) - return err_status_alloc_fail; - - /* set ca to location of cipher_array */ - *ca = cipher_array; - - /* allocate key */ - key = crypto_alloc(klen); - if (key == NULL) { - free(cipher_array); - return err_status_alloc_fail; - } - - /* allocate and initialize an array of ciphers */ - for (i=0; i < num_ciphers; i++) { - - /* allocate cipher */ - status = cipher_type_alloc(ctype, cipher_array, klen); - if (status) - return status; - - /* generate random key and initialize cipher */ - for (j=0; j < klen; j++) - key[j] = (uint8_t) rand(); - status = cipher_init(*cipher_array, key, direction_encrypt); - if (status) - return status; - -/* printf("%dth cipher is at %p\n", i, *cipher_array); */ -/* printf("%dth cipher description: %s\n", i, */ -/* (*cipher_array)->type->description); */ - - /* advance cipher array pointer */ - cipher_array++; - } - - return err_status_ok; -} - -err_status_t -cipher_array_delete(cipher_t *cipher_array[], int num_cipher) { - int i; - - for (i=0; i < num_cipher; i++) { - cipher_dealloc(cipher_array[i]); - } - - free(cipher_array); - - return err_status_ok; -} - - -/* - * cipher_array_bits_per_second(c, l, t) computes (an estimate of) the - * number of bits that a cipher implementation can encrypt in a second - * when distinct keys are used to encrypt distinct messages - * - * c is a cipher (which MUST be allocated an initialized already), l - * is the length in octets of the test data to be encrypted, and t is - * the number of trials - * - * if an error is encountered, the value 0 is returned - */ - -uint64_t -cipher_array_bits_per_second(cipher_t *cipher_array[], int num_cipher, - unsigned octets_in_buffer, int num_trials) { - int i; - v128_t nonce; - clock_t timer; - unsigned char *enc_buf; - int cipher_index = 0; - - - enc_buf = crypto_alloc(octets_in_buffer); - if (enc_buf == NULL) - return 0; /* indicate bad parameters by returning null */ - - /* time repeated trials */ - v128_set_to_zero(&nonce); - timer = clock(); - for(i=0; i < num_trials; i++, nonce.v32[3] = i) { - - /* choose a cipher at random from the array*/ - cipher_index = (*((uint32_t *)enc_buf)) % num_cipher; - - /* encrypt buffer with cipher */ - cipher_set_iv(cipher_array[cipher_index], &nonce); - cipher_encrypt(cipher_array[cipher_index], enc_buf, &octets_in_buffer); - } - timer = clock() - timer; - - free(enc_buf); - - if (timer == 0) { - /* Too fast! */ - return 0; - } - - return CLOCKS_PER_SEC * num_trials * 8 * octets_in_buffer / timer; -} - -void -cipher_array_test_throughput(cipher_t *ca[], int num_cipher) { - int i; - int min_enc_len = 16; - int max_enc_len = 2048; /* should be a power of two */ - int num_trials = 10000; - - printf("timing %s throughput with array size %d:\n", - (ca[0])->type->description, num_cipher); - fflush(stdout); - for (i=min_enc_len; i <= max_enc_len; i = i * 4) - printf("msg len: %d\tgigabits per second: %f\n", i, - cipher_array_bits_per_second(ca, num_cipher, i, num_trials) / 1e9); - -} - -err_status_t -cipher_driver_test_array_throughput(cipher_type_t *ct, - int klen, int num_cipher) { - cipher_t **ca = NULL; - err_status_t status; - - status = cipher_array_alloc_init(&ca, num_cipher, ct, klen); - if (status) { - printf("error: cipher_array_alloc_init() failed with error code %d\n", - status); - return status; - } - - cipher_array_test_throughput(ca, num_cipher); - - cipher_array_delete(ca, num_cipher); - - return err_status_ok; -} -- cgit v1.2.3