1178825Sdfr/*
2178825Sdfr * Copyright (c) 2003-2005 Kungliga Tekniska H�gskolan
3178825Sdfr * (Royal Institute of Technology, Stockholm, Sweden).
4178825Sdfr * All rights reserved.
5178825Sdfr *
6178825Sdfr * Redistribution and use in source and binary forms, with or without
7178825Sdfr * modification, are permitted provided that the following conditions
8178825Sdfr * are met:
9178825Sdfr *
10178825Sdfr * 1. Redistributions of source code must retain the above copyright
11178825Sdfr *    notice, this list of conditions and the following disclaimer.
12178825Sdfr *
13178825Sdfr * 2. Redistributions in binary form must reproduce the above copyright
14178825Sdfr *    notice, this list of conditions and the following disclaimer in the
15178825Sdfr *    documentation and/or other materials provided with the distribution.
16178825Sdfr *
17178825Sdfr * 3. Neither the name of KTH nor the names of its contributors may be
18178825Sdfr *    used to endorse or promote products derived from this software without
19178825Sdfr *    specific prior written permission.
20178825Sdfr *
21178825Sdfr * THIS SOFTWARE IS PROVIDED BY KTH AND ITS CONTRIBUTORS ``AS IS'' AND ANY
22178825Sdfr * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23178825Sdfr * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
24178825Sdfr * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL KTH OR ITS CONTRIBUTORS BE
25178825Sdfr * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
26178825Sdfr * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
27178825Sdfr * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
28178825Sdfr * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
29178825Sdfr * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
30178825Sdfr * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
31178825Sdfr * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */
32178825Sdfr
33178825Sdfr#include "krb5_locl.h"
34178825Sdfr#include <err.h>
35178825Sdfr#include <getarg.h>
36178825Sdfr
37178825SdfrRCSID("$Id: test_crypto.c 16290 2005-11-24 09:57:50Z lha $");
38178825Sdfr
39178825Sdfrstatic void
40178825Sdfrtime_encryption(krb5_context context, size_t size,
41178825Sdfr		krb5_enctype etype, int iterations)
42178825Sdfr{
43178825Sdfr    struct timeval tv1, tv2;
44178825Sdfr    krb5_error_code ret;
45178825Sdfr    krb5_keyblock key;
46178825Sdfr    krb5_crypto crypto;
47178825Sdfr    krb5_data data;
48178825Sdfr    char *etype_name;
49178825Sdfr    void *buf;
50178825Sdfr    int i;
51178825Sdfr
52178825Sdfr    ret = krb5_generate_random_keyblock(context, etype, &key);
53178825Sdfr    if (ret)
54178825Sdfr	krb5_err(context, 1, ret, "krb5_generate_random_keyblock");
55178825Sdfr
56178825Sdfr    ret = krb5_enctype_to_string(context, etype, &etype_name);
57178825Sdfr    if (ret)
58178825Sdfr	krb5_err(context, 1, ret, "krb5_enctype_to_string");
59178825Sdfr
60178825Sdfr    buf = malloc(size);
61178825Sdfr    if (buf == NULL)
62178825Sdfr	krb5_errx(context, 1, "out of memory");
63178825Sdfr    memset(buf, 0, size);
64178825Sdfr
65178825Sdfr    ret = krb5_crypto_init(context, &key, 0, &crypto);
66178825Sdfr    if (ret)
67178825Sdfr	krb5_err(context, 1, ret, "krb5_crypto_init");
68178825Sdfr
69178825Sdfr    gettimeofday(&tv1, NULL);
70178825Sdfr
71178825Sdfr    for (i = 0; i < iterations; i++) {
72178825Sdfr	ret = krb5_encrypt(context, crypto, 0, buf, size, &data);
73178825Sdfr	if (ret)
74178825Sdfr	    krb5_err(context, 1, ret, "encrypt: %d", i);
75178825Sdfr	krb5_data_free(&data);
76178825Sdfr    }
77178825Sdfr
78178825Sdfr    gettimeofday(&tv2, NULL);
79178825Sdfr
80178825Sdfr    timevalsub(&tv2, &tv1);
81178825Sdfr
82178825Sdfr    printf("%s size: %7lu iterations: %d time: %3ld.%06ld\n",
83178825Sdfr	   etype_name, (unsigned long)size, iterations,
84178825Sdfr	   (long)tv2.tv_sec, (long)tv2.tv_usec);
85178825Sdfr
86178825Sdfr    free(buf);
87178825Sdfr    free(etype_name);
88178825Sdfr    krb5_crypto_destroy(context, crypto);
89178825Sdfr    krb5_free_keyblock_contents(context, &key);
90178825Sdfr}
91178825Sdfr
92178825Sdfrstatic void
93178825Sdfrtime_s2k(krb5_context context,
94178825Sdfr	 krb5_enctype etype,
95178825Sdfr	 const char *password,
96178825Sdfr	 krb5_salt salt,
97178825Sdfr	 int iterations)
98178825Sdfr{
99178825Sdfr    struct timeval tv1, tv2;
100178825Sdfr    krb5_error_code ret;
101178825Sdfr    krb5_keyblock key;
102178825Sdfr    krb5_data opaque;
103178825Sdfr    char *etype_name;
104178825Sdfr    int i;
105178825Sdfr
106178825Sdfr    ret = krb5_enctype_to_string(context, etype, &etype_name);
107178825Sdfr    if (ret)
108178825Sdfr	krb5_err(context, 1, ret, "krb5_enctype_to_string");
109178825Sdfr
110178825Sdfr    opaque.data = NULL;
111178825Sdfr    opaque.length = 0;
112178825Sdfr
113178825Sdfr    gettimeofday(&tv1, NULL);
114178825Sdfr
115178825Sdfr    for (i = 0; i < iterations; i++) {
116178825Sdfr	ret = krb5_string_to_key_salt_opaque(context, etype, password, salt,
117178825Sdfr					 opaque, &key);
118178825Sdfr	if (ret)
119178825Sdfr	    krb5_err(context, 1, ret, "krb5_string_to_key_data_salt_opaque");
120178825Sdfr	krb5_free_keyblock_contents(context, &key);
121178825Sdfr    }
122178825Sdfr
123178825Sdfr    gettimeofday(&tv2, NULL);
124178825Sdfr
125178825Sdfr    timevalsub(&tv2, &tv1);
126178825Sdfr
127178825Sdfr    printf("%s string2key %d iterations time: %3ld.%06ld\n",
128178825Sdfr	   etype_name, iterations, (long)tv2.tv_sec, (long)tv2.tv_usec);
129178825Sdfr    free(etype_name);
130178825Sdfr
131178825Sdfr}
132178825Sdfr
133178825Sdfrstatic int version_flag = 0;
134178825Sdfrstatic int help_flag	= 0;
135178825Sdfr
136178825Sdfrstatic struct getargs args[] = {
137178825Sdfr    {"version",	0,	arg_flag,	&version_flag,
138178825Sdfr     "print version", NULL },
139178825Sdfr    {"help",	0,	arg_flag,	&help_flag,
140178825Sdfr     NULL, NULL }
141178825Sdfr};
142178825Sdfr
143178825Sdfrstatic void
144178825Sdfrusage (int ret)
145178825Sdfr{
146178825Sdfr    arg_printusage (args,
147178825Sdfr		    sizeof(args)/sizeof(*args),
148178825Sdfr		    NULL,
149178825Sdfr		    "");
150178825Sdfr    exit (ret);
151178825Sdfr}
152178825Sdfr
153178825Sdfrint
154178825Sdfrmain(int argc, char **argv)
155178825Sdfr{
156178825Sdfr    krb5_context context;
157178825Sdfr    krb5_error_code ret;
158178825Sdfr    int i, enciter, s2kiter;
159178825Sdfr    int optidx = 0;
160178825Sdfr    krb5_salt salt;
161178825Sdfr
162178825Sdfr    krb5_enctype enctypes[] = {
163178825Sdfr	ETYPE_DES_CBC_CRC,
164178825Sdfr	ETYPE_DES3_CBC_SHA1,
165178825Sdfr	ETYPE_ARCFOUR_HMAC_MD5,
166178825Sdfr	ETYPE_AES128_CTS_HMAC_SHA1_96,
167178825Sdfr	ETYPE_AES256_CTS_HMAC_SHA1_96
168178825Sdfr    };
169178825Sdfr
170178825Sdfr    setprogname(argv[0]);
171178825Sdfr
172178825Sdfr    if(getarg(args, sizeof(args) / sizeof(args[0]), argc, argv, &optidx))
173178825Sdfr	usage(1);
174178825Sdfr
175178825Sdfr    if (help_flag)
176178825Sdfr	usage (0);
177178825Sdfr
178178825Sdfr    if(version_flag){
179178825Sdfr	print_version(NULL);
180178825Sdfr	exit(0);
181178825Sdfr    }
182178825Sdfr
183178825Sdfr    argc -= optidx;
184178825Sdfr    argv += optidx;
185178825Sdfr
186178825Sdfr    salt.salttype = KRB5_PW_SALT;
187178825Sdfr    salt.saltvalue.data = NULL;
188178825Sdfr    salt.saltvalue.length = 0;
189178825Sdfr
190178825Sdfr    ret = krb5_init_context(&context);
191178825Sdfr    if (ret)
192178825Sdfr	errx (1, "krb5_init_context failed: %d", ret);
193178825Sdfr
194178825Sdfr    enciter = 1000;
195178825Sdfr    s2kiter = 100;
196178825Sdfr
197178825Sdfr    for (i = 0; i < sizeof(enctypes)/sizeof(enctypes[0]); i++) {
198178825Sdfr
199178825Sdfr	time_encryption(context, 16, enctypes[i], enciter);
200178825Sdfr	time_encryption(context, 32, enctypes[i], enciter);
201178825Sdfr	time_encryption(context, 512, enctypes[i], enciter);
202178825Sdfr	time_encryption(context, 1024, enctypes[i], enciter);
203178825Sdfr	time_encryption(context, 2048, enctypes[i], enciter);
204178825Sdfr	time_encryption(context, 4096, enctypes[i], enciter);
205178825Sdfr	time_encryption(context, 8192, enctypes[i], enciter);
206178825Sdfr	time_encryption(context, 16384, enctypes[i], enciter);
207178825Sdfr	time_encryption(context, 32768, enctypes[i], enciter);
208178825Sdfr
209178825Sdfr	time_s2k(context, enctypes[i], "mYsecreitPassword", salt, s2kiter);
210178825Sdfr    }
211178825Sdfr
212178825Sdfr    krb5_free_context(context);
213178825Sdfr
214178825Sdfr    return 0;
215178825Sdfr}
216