xref: /freebsd/crypto/heimdal/lib/krb5/test_crypto.c (revision 6a068746777241722b2b32c5d0bc443a2a64d80b)
1c19800e8SDoug Rabson /*
2*ae771770SStanislav Sedov  * Copyright (c) 2003-2005 Kungliga Tekniska Högskolan
3c19800e8SDoug Rabson  * (Royal Institute of Technology, Stockholm, Sweden).
4c19800e8SDoug Rabson  * All rights reserved.
5c19800e8SDoug Rabson  *
6c19800e8SDoug Rabson  * Redistribution and use in source and binary forms, with or without
7c19800e8SDoug Rabson  * modification, are permitted provided that the following conditions
8c19800e8SDoug Rabson  * are met:
9c19800e8SDoug Rabson  *
10c19800e8SDoug Rabson  * 1. Redistributions of source code must retain the above copyright
11c19800e8SDoug Rabson  *    notice, this list of conditions and the following disclaimer.
12c19800e8SDoug Rabson  *
13c19800e8SDoug Rabson  * 2. Redistributions in binary form must reproduce the above copyright
14c19800e8SDoug Rabson  *    notice, this list of conditions and the following disclaimer in the
15c19800e8SDoug Rabson  *    documentation and/or other materials provided with the distribution.
16c19800e8SDoug Rabson  *
17c19800e8SDoug Rabson  * 3. Neither the name of KTH nor the names of its contributors may be
18c19800e8SDoug Rabson  *    used to endorse or promote products derived from this software without
19c19800e8SDoug Rabson  *    specific prior written permission.
20c19800e8SDoug Rabson  *
21c19800e8SDoug Rabson  * THIS SOFTWARE IS PROVIDED BY KTH AND ITS CONTRIBUTORS ``AS IS'' AND ANY
22c19800e8SDoug Rabson  * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23c19800e8SDoug Rabson  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
24c19800e8SDoug Rabson  * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL KTH OR ITS CONTRIBUTORS BE
25c19800e8SDoug Rabson  * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
26c19800e8SDoug Rabson  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
27c19800e8SDoug Rabson  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
28c19800e8SDoug Rabson  * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
29c19800e8SDoug Rabson  * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
30c19800e8SDoug Rabson  * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
31c19800e8SDoug Rabson  * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */
32c19800e8SDoug Rabson 
33c19800e8SDoug Rabson #include "krb5_locl.h"
34c19800e8SDoug Rabson #include <err.h>
35c19800e8SDoug Rabson #include <getarg.h>
36c19800e8SDoug Rabson 
37c19800e8SDoug Rabson static void
time_encryption(krb5_context context,size_t size,krb5_enctype etype,int iterations)38c19800e8SDoug Rabson time_encryption(krb5_context context, size_t size,
39c19800e8SDoug Rabson 		krb5_enctype etype, int iterations)
40c19800e8SDoug Rabson {
41c19800e8SDoug Rabson     struct timeval tv1, tv2;
42c19800e8SDoug Rabson     krb5_error_code ret;
43c19800e8SDoug Rabson     krb5_keyblock key;
44c19800e8SDoug Rabson     krb5_crypto crypto;
45c19800e8SDoug Rabson     krb5_data data;
46c19800e8SDoug Rabson     char *etype_name;
47c19800e8SDoug Rabson     void *buf;
48c19800e8SDoug Rabson     int i;
49c19800e8SDoug Rabson 
50c19800e8SDoug Rabson     ret = krb5_generate_random_keyblock(context, etype, &key);
51c19800e8SDoug Rabson     if (ret)
52c19800e8SDoug Rabson 	krb5_err(context, 1, ret, "krb5_generate_random_keyblock");
53c19800e8SDoug Rabson 
54c19800e8SDoug Rabson     ret = krb5_enctype_to_string(context, etype, &etype_name);
55c19800e8SDoug Rabson     if (ret)
56c19800e8SDoug Rabson 	krb5_err(context, 1, ret, "krb5_enctype_to_string");
57c19800e8SDoug Rabson 
58c19800e8SDoug Rabson     buf = malloc(size);
59c19800e8SDoug Rabson     if (buf == NULL)
60c19800e8SDoug Rabson 	krb5_errx(context, 1, "out of memory");
61c19800e8SDoug Rabson     memset(buf, 0, size);
62c19800e8SDoug Rabson 
63c19800e8SDoug Rabson     ret = krb5_crypto_init(context, &key, 0, &crypto);
64c19800e8SDoug Rabson     if (ret)
65c19800e8SDoug Rabson 	krb5_err(context, 1, ret, "krb5_crypto_init");
66c19800e8SDoug Rabson 
67c19800e8SDoug Rabson     gettimeofday(&tv1, NULL);
68c19800e8SDoug Rabson 
69c19800e8SDoug Rabson     for (i = 0; i < iterations; i++) {
70c19800e8SDoug Rabson 	ret = krb5_encrypt(context, crypto, 0, buf, size, &data);
71c19800e8SDoug Rabson 	if (ret)
72c19800e8SDoug Rabson 	    krb5_err(context, 1, ret, "encrypt: %d", i);
73c19800e8SDoug Rabson 	krb5_data_free(&data);
74c19800e8SDoug Rabson     }
75c19800e8SDoug Rabson 
76c19800e8SDoug Rabson     gettimeofday(&tv2, NULL);
77c19800e8SDoug Rabson 
78c19800e8SDoug Rabson     timevalsub(&tv2, &tv1);
79c19800e8SDoug Rabson 
80c19800e8SDoug Rabson     printf("%s size: %7lu iterations: %d time: %3ld.%06ld\n",
81c19800e8SDoug Rabson 	   etype_name, (unsigned long)size, iterations,
82c19800e8SDoug Rabson 	   (long)tv2.tv_sec, (long)tv2.tv_usec);
83c19800e8SDoug Rabson 
84c19800e8SDoug Rabson     free(buf);
85c19800e8SDoug Rabson     free(etype_name);
86c19800e8SDoug Rabson     krb5_crypto_destroy(context, crypto);
87c19800e8SDoug Rabson     krb5_free_keyblock_contents(context, &key);
88c19800e8SDoug Rabson }
89c19800e8SDoug Rabson 
90c19800e8SDoug Rabson static void
time_s2k(krb5_context context,krb5_enctype etype,const char * password,krb5_salt salt,int iterations)91c19800e8SDoug Rabson time_s2k(krb5_context context,
92c19800e8SDoug Rabson 	 krb5_enctype etype,
93c19800e8SDoug Rabson 	 const char *password,
94c19800e8SDoug Rabson 	 krb5_salt salt,
95c19800e8SDoug Rabson 	 int iterations)
96c19800e8SDoug Rabson {
97c19800e8SDoug Rabson     struct timeval tv1, tv2;
98c19800e8SDoug Rabson     krb5_error_code ret;
99c19800e8SDoug Rabson     krb5_keyblock key;
100c19800e8SDoug Rabson     krb5_data opaque;
101c19800e8SDoug Rabson     char *etype_name;
102c19800e8SDoug Rabson     int i;
103c19800e8SDoug Rabson 
104c19800e8SDoug Rabson     ret = krb5_enctype_to_string(context, etype, &etype_name);
105c19800e8SDoug Rabson     if (ret)
106c19800e8SDoug Rabson 	krb5_err(context, 1, ret, "krb5_enctype_to_string");
107c19800e8SDoug Rabson 
108c19800e8SDoug Rabson     opaque.data = NULL;
109c19800e8SDoug Rabson     opaque.length = 0;
110c19800e8SDoug Rabson 
111c19800e8SDoug Rabson     gettimeofday(&tv1, NULL);
112c19800e8SDoug Rabson 
113c19800e8SDoug Rabson     for (i = 0; i < iterations; i++) {
114c19800e8SDoug Rabson 	ret = krb5_string_to_key_salt_opaque(context, etype, password, salt,
115c19800e8SDoug Rabson 					 opaque, &key);
116c19800e8SDoug Rabson 	if (ret)
117c19800e8SDoug Rabson 	    krb5_err(context, 1, ret, "krb5_string_to_key_data_salt_opaque");
118c19800e8SDoug Rabson 	krb5_free_keyblock_contents(context, &key);
119c19800e8SDoug Rabson     }
120c19800e8SDoug Rabson 
121c19800e8SDoug Rabson     gettimeofday(&tv2, NULL);
122c19800e8SDoug Rabson 
123c19800e8SDoug Rabson     timevalsub(&tv2, &tv1);
124c19800e8SDoug Rabson 
125c19800e8SDoug Rabson     printf("%s string2key %d iterations time: %3ld.%06ld\n",
126c19800e8SDoug Rabson 	   etype_name, iterations, (long)tv2.tv_sec, (long)tv2.tv_usec);
127c19800e8SDoug Rabson     free(etype_name);
128c19800e8SDoug Rabson 
129c19800e8SDoug Rabson }
130c19800e8SDoug Rabson 
131c19800e8SDoug Rabson static int version_flag = 0;
132c19800e8SDoug Rabson static int help_flag	= 0;
133c19800e8SDoug Rabson 
134c19800e8SDoug Rabson static struct getargs args[] = {
135c19800e8SDoug Rabson     {"version",	0,	arg_flag,	&version_flag,
136c19800e8SDoug Rabson      "print version", NULL },
137c19800e8SDoug Rabson     {"help",	0,	arg_flag,	&help_flag,
138c19800e8SDoug Rabson      NULL, NULL }
139c19800e8SDoug Rabson };
140c19800e8SDoug Rabson 
141c19800e8SDoug Rabson static void
usage(int ret)142c19800e8SDoug Rabson usage (int ret)
143c19800e8SDoug Rabson {
144c19800e8SDoug Rabson     arg_printusage (args,
145c19800e8SDoug Rabson 		    sizeof(args)/sizeof(*args),
146c19800e8SDoug Rabson 		    NULL,
147c19800e8SDoug Rabson 		    "");
148c19800e8SDoug Rabson     exit (ret);
149c19800e8SDoug Rabson }
150c19800e8SDoug Rabson 
151c19800e8SDoug Rabson int
main(int argc,char ** argv)152c19800e8SDoug Rabson main(int argc, char **argv)
153c19800e8SDoug Rabson {
154c19800e8SDoug Rabson     krb5_context context;
155c19800e8SDoug Rabson     krb5_error_code ret;
156c19800e8SDoug Rabson     int i, enciter, s2kiter;
157c19800e8SDoug Rabson     int optidx = 0;
158c19800e8SDoug Rabson     krb5_salt salt;
159c19800e8SDoug Rabson 
160c19800e8SDoug Rabson     krb5_enctype enctypes[] = {
161c19800e8SDoug Rabson 	ETYPE_DES_CBC_CRC,
162c19800e8SDoug Rabson 	ETYPE_DES3_CBC_SHA1,
163c19800e8SDoug Rabson 	ETYPE_ARCFOUR_HMAC_MD5,
164c19800e8SDoug Rabson 	ETYPE_AES128_CTS_HMAC_SHA1_96,
165c19800e8SDoug Rabson 	ETYPE_AES256_CTS_HMAC_SHA1_96
166c19800e8SDoug Rabson     };
167c19800e8SDoug Rabson 
168c19800e8SDoug Rabson     setprogname(argv[0]);
169c19800e8SDoug Rabson 
170c19800e8SDoug Rabson     if(getarg(args, sizeof(args) / sizeof(args[0]), argc, argv, &optidx))
171c19800e8SDoug Rabson 	usage(1);
172c19800e8SDoug Rabson 
173c19800e8SDoug Rabson     if (help_flag)
174c19800e8SDoug Rabson 	usage (0);
175c19800e8SDoug Rabson 
176c19800e8SDoug Rabson     if(version_flag){
177c19800e8SDoug Rabson 	print_version(NULL);
178c19800e8SDoug Rabson 	exit(0);
179c19800e8SDoug Rabson     }
180c19800e8SDoug Rabson 
181c19800e8SDoug Rabson     salt.salttype = KRB5_PW_SALT;
182c19800e8SDoug Rabson     salt.saltvalue.data = NULL;
183c19800e8SDoug Rabson     salt.saltvalue.length = 0;
184c19800e8SDoug Rabson 
185c19800e8SDoug Rabson     ret = krb5_init_context(&context);
186c19800e8SDoug Rabson     if (ret)
187c19800e8SDoug Rabson 	errx (1, "krb5_init_context failed: %d", ret);
188c19800e8SDoug Rabson 
189c19800e8SDoug Rabson     enciter = 1000;
190c19800e8SDoug Rabson     s2kiter = 100;
191c19800e8SDoug Rabson 
192c19800e8SDoug Rabson     for (i = 0; i < sizeof(enctypes)/sizeof(enctypes[0]); i++) {
193c19800e8SDoug Rabson 
194*ae771770SStanislav Sedov 	krb5_enctype_enable(context, enctypes[i]);
195*ae771770SStanislav Sedov 
196c19800e8SDoug Rabson 	time_encryption(context, 16, enctypes[i], enciter);
197c19800e8SDoug Rabson 	time_encryption(context, 32, enctypes[i], enciter);
198c19800e8SDoug Rabson 	time_encryption(context, 512, enctypes[i], enciter);
199c19800e8SDoug Rabson 	time_encryption(context, 1024, enctypes[i], enciter);
200c19800e8SDoug Rabson 	time_encryption(context, 2048, enctypes[i], enciter);
201c19800e8SDoug Rabson 	time_encryption(context, 4096, enctypes[i], enciter);
202c19800e8SDoug Rabson 	time_encryption(context, 8192, enctypes[i], enciter);
203c19800e8SDoug Rabson 	time_encryption(context, 16384, enctypes[i], enciter);
204c19800e8SDoug Rabson 	time_encryption(context, 32768, enctypes[i], enciter);
205c19800e8SDoug Rabson 
206c19800e8SDoug Rabson 	time_s2k(context, enctypes[i], "mYsecreitPassword", salt, s2kiter);
207c19800e8SDoug Rabson     }
208c19800e8SDoug Rabson 
209c19800e8SDoug Rabson     krb5_free_context(context);
210c19800e8SDoug Rabson 
211c19800e8SDoug Rabson     return 0;
212c19800e8SDoug Rabson }
213