/* benchmark.c * * Copyright (C) 2006-2012 Sawtooth Consulting Ltd. * * This file is part of CyaSSL. * * CyaSSL is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * CyaSSL is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA */ /* CTaoCrypt benchmark */ #ifdef HAVE_CONFIG_H #include #endif #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #ifdef _MSC_VER /* 4996 warning to use MS extensions e.g., strcpy_s instead of strncpy */ #pragma warning(disable: 4996) #endif void bench_des(void); void bench_arc4(void); void bench_hc128(void); void bench_rabbit(void); void bench_aes(int); void bench_aesgcm(void); void bench_aesccm(void); void bench_md5(void); void bench_sha(void); void bench_sha256(void); void bench_sha512(void); void bench_ripemd(void); void bench_rsa(void); void bench_rsaKeyGen(void); void bench_dh(void); #ifdef HAVE_ECC void bench_eccKeyGen(void); void bench_eccKeyAgree(void); #endif double current_time(void); int main(int argc, char** argv) { (void)argc; (void)argv; #ifndef NO_AES bench_aes(0); bench_aes(1); #endif #ifdef HAVE_AESGCM bench_aesgcm(); #endif #ifdef HAVE_AESCCM bench_aesccm(); #endif #ifndef NO_RC4 bench_arc4(); #endif #ifdef HAVE_HC128 bench_hc128(); #endif #ifndef NO_RABBIT bench_rabbit(); #endif #ifndef NO_DES3 bench_des(); #endif printf("\n"); #ifndef NO_MD5 bench_md5(); #endif bench_sha(); #ifndef NO_SHA256 bench_sha256(); #endif #ifdef CYASSL_SHA512 bench_sha512(); #endif #ifdef CYASSL_RIPEMD bench_ripemd(); #endif printf("\n"); #ifndef NO_RSA bench_rsa(); #endif #ifndef NO_DH bench_dh(); #endif #if defined(CYASSL_KEY_GEN) && !defined(NO_RSA) bench_rsaKeyGen(); #endif #ifdef HAVE_ECC bench_eccKeyGen(); bench_eccKeyAgree(); #endif return 0; } const int megs = 5; /* how many megs to test (en/de)cryption */ const int times = 100; /* public key iterations */ const byte key[] = { 0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef, 0xfe,0xde,0xba,0x98,0x76,0x54,0x32,0x10, 0x89,0xab,0xcd,0xef,0x01,0x23,0x45,0x67 }; const byte iv[] = { 0x12,0x34,0x56,0x78,0x90,0xab,0xcd,0xef, 0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01, 0x11,0x21,0x31,0x41,0x51,0x61,0x71,0x81 }; byte plain [1024*1024]; byte cipher[1024*1024]; #ifndef NO_AES void bench_aes(int show) { Aes enc; double start, total, persec; int i; AesSetKey(&enc, key, 16, iv, AES_ENCRYPTION); start = current_time(); for(i = 0; i < megs; i++) AesCbcEncrypt(&enc, plain, cipher, sizeof(plain)); total = current_time() - start; persec = 1 / total * megs; if (show) printf("AES %d megs took %5.3f seconds, %6.2f MB/s\n", megs, total, persec); } #endif byte additional[13]; byte tag[16]; #ifdef HAVE_AESGCM void bench_aesgcm(void) { Aes enc; double start, total, persec; int i; AesGcmSetKey(&enc, key, 16, iv); AesGcmSetExpIV(&enc, iv+4); start = current_time(); for(i = 0; i < megs; i++) AesGcmEncrypt(&enc, cipher, plain, sizeof(plain), tag, 16, additional, 13); total = current_time() - start; persec = 1 / total * megs; printf("AES-GCM %d megs took %5.3f seconds, %6.2f MB/s\n", megs, total, persec); } #endif #ifdef HAVE_AESCCM void bench_aesccm(void) { Aes enc; double start, total, persec; int i; AesCcmSetKey(&enc, key, 16, iv, 12); start = current_time(); for(i = 0; i < megs; i++) AesCcmEncrypt(&enc, cipher, plain, sizeof(plain), tag, 16, additional, 13); total = current_time() - start; persec = 1 / total * megs; printf("AES-CCM %d megs took %5.3f seconds, %6.2f MB/s\n", megs, total, persec); } #endif #ifndef NO_DES3 void bench_des(void) { Des3 enc; double start, total, persec; int i; Des3_SetKey(&enc, key, iv, DES_ENCRYPTION); start = current_time(); for(i = 0; i < megs; i++) Des3_CbcEncrypt(&enc, plain, cipher, sizeof(plain)); total = current_time() - start; persec = 1 / total * megs; printf("3DES %d megs took %5.3f seconds, %6.2f MB/s\n", megs, total, persec); } #endif #ifndef NO_RC4 void bench_arc4(void) { Arc4 enc; double start, total, persec; int i; Arc4SetKey(&enc, key, 16); start = current_time(); for(i = 0; i < megs; i++) Arc4Process(&enc, cipher, plain, sizeof(plain)); total = current_time() - start; persec = 1 / total * megs; printf("ARC4 %d megs took %5.3f seconds, %6.2f MB/s\n", megs, total, persec); } #endif #ifdef HAVE_HC128 void bench_hc128(void) { HC128 enc; double start, total, persec; int i; Hc128_SetKey(&enc, key, iv); start = current_time(); for(i = 0; i < megs; i++) Hc128_Process(&enc, cipher, plain, sizeof(plain)); total = current_time() - start; persec = 1 / total * megs; printf("HC128 %d megs took %5.3f seconds, %6.2f MB/s\n", megs, total, persec); } #endif /* HAVE_HC128 */ #ifndef NO_RABBIT void bench_rabbit(void) { Rabbit enc; double start, total, persec; int i; RabbitSetKey(&enc, key, iv); start = current_time(); for(i = 0; i < megs; i++) RabbitProcess(&enc, cipher, plain, sizeof(plain)); total = current_time() - start; persec = 1 / total * megs; printf("RABBIT %d megs took %5.3f seconds, %6.2f MB/s\n", megs, total, persec); } #endif /* NO_RABBIT */ #ifndef NO_MD5 void bench_md5(void) { Md5 hash; byte digest[MD5_DIGEST_SIZE]; double start, total, persec; int i; InitMd5(&hash); start = current_time(); for(i = 0; i < megs; i++) Md5Update(&hash, plain, sizeof(plain)); Md5Final(&hash, digest); total = current_time() - start; persec = 1 / total * megs; printf("MD5 %d megs took %5.3f seconds, %6.2f MB/s\n", megs, total, persec); } #endif /* NO_MD5 */ void bench_sha(void) { Sha hash; byte digest[SHA_DIGEST_SIZE]; double start, total, persec; int i; InitSha(&hash); start = current_time(); for(i = 0; i < megs; i++) ShaUpdate(&hash, plain, sizeof(plain)); ShaFinal(&hash, digest); total = current_time() - start; persec = 1 / total * megs; printf("SHA %d megs took %5.3f seconds, %6.2f MB/s\n", megs, total, persec); } #ifndef NO_SHA256 void bench_sha256(void) { Sha256 hash; byte digest[SHA256_DIGEST_SIZE]; double start, total, persec; int i; InitSha256(&hash); start = current_time(); for(i = 0; i < megs; i++) Sha256Update(&hash, plain, sizeof(plain)); Sha256Final(&hash, digest); total = current_time() - start; persec = 1 / total * megs; printf("SHA-256 %d megs took %5.3f seconds, %6.2f MB/s\n", megs, total, persec); } #endif #ifdef CYASSL_SHA512 void bench_sha512(void) { Sha512 hash; byte digest[SHA512_DIGEST_SIZE]; double start, total, persec; int i; InitSha512(&hash); start = current_time(); for(i = 0; i < megs; i++) Sha512Update(&hash, plain, sizeof(plain)); Sha512Final(&hash, digest); total = current_time() - start; persec = 1 / total * megs; printf("SHA-512 %d megs took %5.3f seconds, %6.2f MB/s\n", megs, total, persec); } #endif #ifdef CYASSL_RIPEMD void bench_ripemd(void) { RipeMd hash; byte digest[RIPEMD_DIGEST_SIZE]; double start, total, persec; int i; InitRipeMd(&hash); start = current_time(); for(i = 0; i < megs; i++) RipeMdUpdate(&hash, plain, sizeof(plain)); RipeMdFinal(&hash, digest); total = current_time() - start; persec = 1 / total * megs; printf("RIPEMD %d megs took %5.3f seconds, %6.2f MB/s\n", megs, total, persec); } #endif #if !defined(NO_RSA) || !defined(NO_DH) \ || defined(CYASSL_KEYGEN) || defined(HAVE_ECC) RNG rng; #endif #ifndef NO_RSA void bench_rsa(void) { int i; byte tmp[3072]; size_t bytes; word32 idx = 0; byte message[] = "Everyone gets Friday off."; byte* output; byte enc[512]; /* for up to 4096 bit */ const int len = (int)strlen((char*)message); double start, total, each, milliEach; RsaKey rsaKey; FILE* file = fopen("./certs/rsa2048.der", "rb"); if (!file) { printf("can't find ./certs/rsa2048.der, " "Please run from CyaSSL home dir\n"); return; } InitRng(&rng); bytes = fread(tmp, 1, sizeof(tmp), file); InitRsaKey(&rsaKey, 0); bytes = RsaPrivateKeyDecode(tmp, &idx, &rsaKey, (word32)bytes); start = current_time(); for (i = 0; i < times; i++) bytes = RsaPublicEncrypt(message,len,enc,sizeof(enc), &rsaKey, &rng); total = current_time() - start; each = total / times; /* per second */ milliEach = each * 1000; /* milliseconds */ printf("RSA 2048 encryption took %6.2f milliseconds, avg over %d" " iterations\n", milliEach, times); start = current_time(); for (i = 0; i < times; i++) RsaPrivateDecryptInline(enc, (word32)bytes, &output, &rsaKey); total = current_time() - start; each = total / times; /* per second */ milliEach = each * 1000; /* milliseconds */ printf("RSA 2048 decryption took %6.2f milliseconds, avg over %d" " iterations\n", milliEach, times); fclose(file); FreeRsaKey(&rsaKey); } #endif #ifndef NO_DH void bench_dh(void) { int i; byte tmp[1024]; size_t bytes; word32 idx = 0, pubSz, privSz, pubSz2, privSz2, agreeSz; byte pub[256]; /* for 2048 bit */ byte priv[256]; /* for 2048 bit */ byte pub2[256]; /* for 2048 bit */ byte priv2[256]; /* for 2048 bit */ byte agree[256]; /* for 2048 bit */ double start, total, each, milliEach; DhKey dhKey; FILE* file = fopen("./certs/dh2048.der", "rb"); if (!file) { printf("can't find ./certs/dh2048.der, " "Please run from CyaSSL home dir\n"); return; } bytes = fread(tmp, 1, sizeof(tmp), file); InitDhKey(&dhKey); bytes = DhKeyDecode(tmp, &idx, &dhKey, (word32)bytes); if (bytes != 0) { printf("dhekydecode failed, can't benchmark\n"); return; } start = current_time(); for (i = 0; i < times; i++) DhGenerateKeyPair(&dhKey, &rng, priv, &privSz, pub, &pubSz); total = current_time() - start; each = total / times; /* per second */ milliEach = each * 1000; /* milliseconds */ printf("DH 2048 key generation %6.2f milliseconds, avg over %d" " iterations\n", milliEach, times); DhGenerateKeyPair(&dhKey, &rng, priv2, &privSz2, pub2, &pubSz2); start = current_time(); for (i = 0; i < times; i++) DhAgree(&dhKey, agree, &agreeSz, priv, privSz, pub2, pubSz2); total = current_time() - start; each = total / times; /* per second */ milliEach = each * 1000; /* milliseconds */ printf("DH 2048 key agreement %6.2f milliseconds, avg over %d" " iterations\n", milliEach, times); fclose(file); FreeDhKey(&dhKey); } #endif #if defined(CYASSL_KEY_GEN) && !defined(NO_RSA) void bench_rsaKeyGen(void) { RsaKey genKey; double start, total, each, milliEach; int i; const int genTimes = 5; /* 1024 bit */ start = current_time(); for(i = 0; i < genTimes; i++) { InitRsaKey(&genKey, 0); MakeRsaKey(&genKey, 1024, 65537, &rng); FreeRsaKey(&genKey); } total = current_time() - start; each = total / genTimes; /* per second */ milliEach = each * 1000; /* millisconds */ printf("\n"); printf("RSA 1024 key generation %6.2f milliseconds, avg over %d" " iterations\n", milliEach, genTimes); /* 2048 bit */ start = current_time(); for(i = 0; i < genTimes; i++) { InitRsaKey(&genKey, 0); MakeRsaKey(&genKey, 2048, 65537, &rng); FreeRsaKey(&genKey); } total = current_time() - start; each = total / genTimes; /* per second */ milliEach = each * 1000; /* millisconds */ printf("RSA 2048 key generation %6.2f milliseconds, avg over %d" " iterations\n", milliEach, genTimes); } #endif /* CYASSL_KEY_GEN */ #ifdef HAVE_ECC void bench_eccKeyGen(void) { ecc_key genKey; double start, total, each, milliEach; int i; const int genTimes = 5; /* 256 bit */ start = current_time(); for(i = 0; i < genTimes; i++) { ecc_make_key(&rng, 32, &genKey); ecc_free(&genKey); } total = current_time() - start; each = total / genTimes; /* per second */ milliEach = each * 1000; /* millisconds */ printf("\n"); printf("ECC 256 key generation %6.2f milliseconds, avg over %d" " iterations\n", milliEach, genTimes); } void bench_eccKeyAgree(void) { ecc_key genKey, genKey2; double start, total, each, milliEach; int i; const int agreeTimes = 5; byte shared[1024]; byte sig[1024]; byte digest[32]; word32 x; ecc_make_key(&rng, 32, &genKey); ecc_make_key(&rng, 32, &genKey2); /* 256 bit */ start = current_time(); for(i = 0; i < agreeTimes; i++) { x = sizeof(shared); ecc_shared_secret(&genKey, &genKey2, shared, &x); } total = current_time() - start; each = total / agreeTimes; /* per second */ milliEach = each * 1000; /* millisconds */ printf("EC-DHE key agreement %6.2f milliseconds, avg over %d" " iterations\n", milliEach, agreeTimes); /* make dummy digest */ for (i = 0; i < (int)sizeof(digest); i++) digest[i] = i; start = current_time(); for(i = 0; i < agreeTimes; i++) { x = sizeof(sig); ecc_sign_hash(digest, sizeof(digest), sig, &x, &rng, &genKey); } total = current_time() - start; each = total / agreeTimes; /* per second */ milliEach = each * 1000; /* millisconds */ printf("EC-DSA sign time %6.2f milliseconds, avg over %d" " iterations\n", milliEach, agreeTimes); ecc_free(&genKey2); ecc_free(&genKey); } #endif /* HAVE_ECC */ #ifdef _WIN32 #define WIN32_LEAN_AND_MEAN #include double current_time() { static int init = 0; static LARGE_INTEGER freq; LARGE_INTEGER count; if (!init) { QueryPerformanceFrequency(&freq); init = 1; } QueryPerformanceCounter(&count); return (double)count.QuadPart / freq.QuadPart; } #else #include double current_time(void) { struct timeval tv; gettimeofday(&tv, 0); return (double)tv.tv_sec + (double)tv.tv_usec / 1000000; } #endif /* _WIN32 */