123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360 |
- /*
- * Copyright 2014-2022 The GmSSL Project. All Rights Reserved.
- *
- * Licensed under the Apache License, Version 2.0 (the License); you may
- * not use this file except in compliance with the License.
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- */
- #include <stdio.h>
- #include <string.h>
- #include <stdlib.h>
- #include <gmssl/hex.h>
- #include <gmssl/sm4.h>
- #include <gmssl/error.h>
- #include <gmssl/rand.h>
- #ifdef WIN32
- #include <wincrypt.h>
- static volatile int finish;
- VOID CALLBACK TimerProc_sm4(HWND hwnd, UINT message, UINT iTimerID, DWORD dwTime)
- {
- finish = 0;
- }
- int test_sm4()
- {
- uint8_t user_key[16] = {
- 0x01,
- 0x23,
- 0x45,
- 0x67,
- 0x89,
- 0xab,
- 0xcd,
- 0xef,
- 0xfe,
- 0xdc,
- 0xba,
- 0x98,
- 0x76,
- 0x54,
- 0x32,
- 0x10,
- };
- uint8_t iv[16] = {
- 0x01,
- 0x23,
- 0x45,
- 0x67,
- 0x89,
- 0xab,
- 0xcd,
- 0xef,
- 0xfe,
- 0xdc,
- 0xba,
- 0x98,
- 0x76,
- 0x54,
- 0x32,
- 0x10,
- };
- uint8_t ctr[16] = {0};
- uint8_t mac[16] = {0};
- uint8_t aad[16] = {
- 0x01,
- 0x23,
- 0x45,
- 0x67,
- 0x89,
- 0xab,
- 0xcd,
- 0xef,
- 0xfe,
- 0xdc,
- 0xba,
- 0x98,
- 0x76,
- 0x54,
- 0x32,
- 0x10,
- };
- uint8_t out[16384] = {0};
- SM4_KEY key;
- int sizebox[] = {16, 64, 256, 1024, 8192, 16384};
- int countbox[18] = {0};
- uint8_t *testhex[];
- HCRYPTPROV hCryptProv;
- testhex = (uint8_t **)malloc(sizeof(uint8_t *) * 6);
- for (int i = 0; i < 6; i++)
- {
- testhex[i] = (uint8_t *)malloc(sizebox[i]);
- CryptGenRandom(hCryptProv, sizebox[i], testhex[i]);
- }
- int count;
- sm4_set_encrypt_key(&key, user_key);
- for (int i = 0; i < 6; i++)
- {
- finish = 1;
- count = 0;
- printf("Doing sm4-cbc for 3s on %d size blocks: ", sizebox[i]);
- UINT_PTR iTimerID = SetTimer(NULL, 0, 3000, TimerProc_sm4);
- while (finish)
- {
- sm4_cbc_encrypt(&key, iv, testhex[i], sizebox[i] / 16, out);
- count++;
- }
- KillTimer(NULL, iTimerID);
- countbox[i] = count;
- printf("%d sm4-cbc's in 3s\n", count);
- }
- for (int i = 0; i < 6; i++)
- {
- finish = 1;
- count = 0;
- printf("Doing sm4-ctr for 3s on %d size blocks: ", sizebox[i]);
- UINT_PTR iTimerID = SetTimer(NULL, 0, 3000, TimerProc);
- while (finish)
- {
- sm4_ctr_encrypt(&key, ctr, testhex[i], sizebox[i], out);
- count++;
- }
- KillTimer(NULL, iTimerID);
- countbox[i + 6] = count;
- printf("%d sm4-ctr's in 3s\n", count);
- }
- for (int i = 0; i < 6; i++)
- {
- finish = 1;
- count = 0;
- printf("Doing sm4-gcm for 3s on %d size blocks: ", sizebox[i]);
- UINT_PTR iTimerID = SetTimer(NULL, 0, 3000, TimerProc);
- while (finish)
- {
- sm4_gcm_encrypt(&key, iv, 16, aad, 16, testhex[i], sizebox[i], out, 16, mac);
- count++;
- }
- KillTimer(NULL, iTimerID);
- countbox[i + 12] = count;
- printf("%d sm4-gcm's in 3s\n", count);
- }
- printf("type\t\t16 bytes\t64 bytes\t256 bytes\t1024 bytes\t8192 bytes\t16384 bytes\n");
- printf("sm4-cbc\t");
- for (int i = 0; i < 6; i++)
- {
- printf("\t%.2fK", countbox[i] * sizebox[i] / 1024 / 3.00);
- }
- printf("\n");
- printf("sm4-ctr\t");
- for (int i = 0; i < 6; i++)
- {
- printf("\t%.2fK", countbox[i + 6] * sizebox[i] / 1024 / 3.00);
- }
- printf("\n");
- printf("sm4-gcm\t");
- for (int i = 0; i < 6; i++)
- {
- printf("\t%.2fK", countbox[i + 12] * sizebox[i] / 1024 / 3.00);
- }
- printf("\n");
- for (int i = 0; i < 6; i++)
- {
- free(testhex[i]);
- }
- free(testhex);
- return 1;
- }
- #else
- #include <signal.h>
- #include <sys/time.h>
- static volatile int finish;
- void sig_alm_handler_sm4(int sig_num)
- {
- if (sig_num = SIGALRM)
- finish = 0;
- }
- int test_sm4()
- {
- uint8_t user_key[16] = {
- 0x01,
- 0x23,
- 0x45,
- 0x67,
- 0x89,
- 0xab,
- 0xcd,
- 0xef,
- 0xfe,
- 0xdc,
- 0xba,
- 0x98,
- 0x76,
- 0x54,
- 0x32,
- 0x10,
- };
- uint8_t iv[16] = {
- 0x01,
- 0x23,
- 0x45,
- 0x67,
- 0x89,
- 0xab,
- 0xcd,
- 0xef,
- 0xfe,
- 0xdc,
- 0xba,
- 0x98,
- 0x76,
- 0x54,
- 0x32,
- 0x10,
- };
- uint8_t ctr[16] = {0};
- uint8_t mac[16] = {0};
- uint8_t aad[16] = {
- 0x01,
- 0x23,
- 0x45,
- 0x67,
- 0x89,
- 0xab,
- 0xcd,
- 0xef,
- 0xfe,
- 0xdc,
- 0xba,
- 0x98,
- 0x76,
- 0x54,
- 0x32,
- 0x10,
- };
- uint8_t out[16384] = {0};
- int count;
- SM4_KEY key;
- int sizebox[] = {16, 64, 256, 1024, 8192, 16384};
- int countbox[18] = {0};
- uint8_t **testhex;
- FILE *fs_p = fopen("/dev/urandom", "r");
- if (NULL == fs_p)
- {
- printf("Can not open /dev/urandom\n");
- return -1;
- }
- testhex = (uint8_t **)malloc(sizeof(uint8_t *) * 6);
- for (int i = 0; i < 6; i++)
- {
- testhex[i] = (uint8_t *)malloc(sizebox[i]);
- fread(testhex[i], sizebox[i], 1, fs_p);
- }
- fclose(fs_p);
- signal(SIGALRM, sig_alm_handler_sm4);
- struct itimerval new_value, old_value;
- new_value.it_value.tv_sec = 3;
- new_value.it_value.tv_usec = 0;
- new_value.it_interval.tv_sec = 0;
- new_value.it_interval.tv_usec = 0;
- sm4_set_encrypt_key(&key, user_key);
- for (int i = 0; i < 6; i++)
- {
- finish = 1;
- count = 0;
- printf("Doing sm4-cbc for 3s on %d size blocks: ", sizebox[i]);
- setitimer(ITIMER_REAL, &new_value, &old_value);
- while (finish)
- {
- sm4_cbc_encrypt(&key, iv, testhex[i], sizebox[i] / 16, out);
- count++;
- }
- countbox[i] = count;
- printf("%d sm4-cbc's in 3s\n", count);
- }
- for (int i = 0; i < 6; i++)
- {
- finish = 1;
- count = 0;
- printf("Doing sm4-ctr for 3s on %d size blocks: ", sizebox[i]);
- setitimer(ITIMER_REAL, &new_value, &old_value);
- while (finish)
- {
- sm4_ctr_encrypt(&key, ctr, testhex[i], sizebox[i], out);
- count++;
- }
- countbox[i + 6] = count;
- printf("%d sm4-ctr's in 3s\n", count);
- }
- for (int i = 0; i < 6; i++)
- {
- finish = 1;
- count = 0;
- printf("Doing sm4-gcm for 3s on %d size blocks: ", sizebox[i]);
- setitimer(ITIMER_REAL, &new_value, &old_value);
- while (finish)
- {
- sm4_gcm_encrypt(&key, iv, 16, aad, 16, testhex[i], sizebox[i], out, 16, mac);
- count++;
- }
- countbox[i + 12] = count;
- printf("%d sm4-gcm's in 3s\n", count);
- }
- printf("type\t\t16 bytes\t64 bytes\t256 bytes\t1024 bytes\t8192 bytes\t16384 bytes\n");
- printf("sm4-cbc\t");
- for (int i = 0; i < 6; i++)
- {
- printf("\t%.2fK", countbox[i] * sizebox[i] / 1024 / 3.00);
- }
- printf("\n");
- printf("sm4-ctr\t");
- for (int i = 0; i < 6; i++)
- {
- printf("\t%.2fK", countbox[i + 6] * sizebox[i] / 1024 / 3.00);
- }
- printf("\n");
- printf("sm4-gcm\t");
- for (int i = 0; i < 6; i++)
- {
- printf("\t%.2fK", countbox[i + 12] * sizebox[i] / 1024 / 3.00);
- }
- printf("\n");
- for (int i = 0; i < 6; i++)
- {
- free(testhex[i]);
- }
- free(testhex);
- return 1;
- }
- #endif
- int sm4speed_main(void)
- {
- test_sm4();
- return 1;
- }
|