1c19800e8SDoug Rabson /*
2*ae771770SStanislav Sedov * Copyright (c) 2003-2005 Kungliga Tekniska Högskolan
3c19800e8SDoug Rabson * (Royal Institute of Technology, Stockholm, Sweden).
4c19800e8SDoug Rabson * All rights reserved.
5c19800e8SDoug Rabson *
6c19800e8SDoug Rabson * Redistribution and use in source and binary forms, with or without
7c19800e8SDoug Rabson * modification, are permitted provided that the following conditions
8c19800e8SDoug Rabson * are met:
9c19800e8SDoug Rabson *
10c19800e8SDoug Rabson * 1. Redistributions of source code must retain the above copyright
11c19800e8SDoug Rabson * notice, this list of conditions and the following disclaimer.
12c19800e8SDoug Rabson *
13c19800e8SDoug Rabson * 2. Redistributions in binary form must reproduce the above copyright
14c19800e8SDoug Rabson * notice, this list of conditions and the following disclaimer in the
15c19800e8SDoug Rabson * documentation and/or other materials provided with the distribution.
16c19800e8SDoug Rabson *
17c19800e8SDoug Rabson * 3. Neither the name of KTH nor the names of its contributors may be
18c19800e8SDoug Rabson * used to endorse or promote products derived from this software without
19c19800e8SDoug Rabson * specific prior written permission.
20c19800e8SDoug Rabson *
21c19800e8SDoug Rabson * THIS SOFTWARE IS PROVIDED BY KTH AND ITS CONTRIBUTORS ``AS IS'' AND ANY
22c19800e8SDoug Rabson * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23c19800e8SDoug Rabson * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
24c19800e8SDoug Rabson * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL KTH OR ITS CONTRIBUTORS BE
25c19800e8SDoug Rabson * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
26c19800e8SDoug Rabson * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
27c19800e8SDoug Rabson * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
28c19800e8SDoug Rabson * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
29c19800e8SDoug Rabson * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
30c19800e8SDoug Rabson * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
31c19800e8SDoug Rabson * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */
32c19800e8SDoug Rabson
33c19800e8SDoug Rabson #include "krb5_locl.h"
34c19800e8SDoug Rabson #include <err.h>
35c19800e8SDoug Rabson #include <getarg.h>
36c19800e8SDoug Rabson
37c19800e8SDoug Rabson static void
time_encryption(krb5_context context,size_t size,krb5_enctype etype,int iterations)38c19800e8SDoug Rabson time_encryption(krb5_context context, size_t size,
39c19800e8SDoug Rabson krb5_enctype etype, int iterations)
40c19800e8SDoug Rabson {
41c19800e8SDoug Rabson struct timeval tv1, tv2;
42c19800e8SDoug Rabson krb5_error_code ret;
43c19800e8SDoug Rabson krb5_keyblock key;
44c19800e8SDoug Rabson krb5_crypto crypto;
45c19800e8SDoug Rabson krb5_data data;
46c19800e8SDoug Rabson char *etype_name;
47c19800e8SDoug Rabson void *buf;
48c19800e8SDoug Rabson int i;
49c19800e8SDoug Rabson
50c19800e8SDoug Rabson ret = krb5_generate_random_keyblock(context, etype, &key);
51c19800e8SDoug Rabson if (ret)
52c19800e8SDoug Rabson krb5_err(context, 1, ret, "krb5_generate_random_keyblock");
53c19800e8SDoug Rabson
54c19800e8SDoug Rabson ret = krb5_enctype_to_string(context, etype, &etype_name);
55c19800e8SDoug Rabson if (ret)
56c19800e8SDoug Rabson krb5_err(context, 1, ret, "krb5_enctype_to_string");
57c19800e8SDoug Rabson
58c19800e8SDoug Rabson buf = malloc(size);
59c19800e8SDoug Rabson if (buf == NULL)
60c19800e8SDoug Rabson krb5_errx(context, 1, "out of memory");
61c19800e8SDoug Rabson memset(buf, 0, size);
62c19800e8SDoug Rabson
63c19800e8SDoug Rabson ret = krb5_crypto_init(context, &key, 0, &crypto);
64c19800e8SDoug Rabson if (ret)
65c19800e8SDoug Rabson krb5_err(context, 1, ret, "krb5_crypto_init");
66c19800e8SDoug Rabson
67c19800e8SDoug Rabson gettimeofday(&tv1, NULL);
68c19800e8SDoug Rabson
69c19800e8SDoug Rabson for (i = 0; i < iterations; i++) {
70c19800e8SDoug Rabson ret = krb5_encrypt(context, crypto, 0, buf, size, &data);
71c19800e8SDoug Rabson if (ret)
72c19800e8SDoug Rabson krb5_err(context, 1, ret, "encrypt: %d", i);
73c19800e8SDoug Rabson krb5_data_free(&data);
74c19800e8SDoug Rabson }
75c19800e8SDoug Rabson
76c19800e8SDoug Rabson gettimeofday(&tv2, NULL);
77c19800e8SDoug Rabson
78c19800e8SDoug Rabson timevalsub(&tv2, &tv1);
79c19800e8SDoug Rabson
80c19800e8SDoug Rabson printf("%s size: %7lu iterations: %d time: %3ld.%06ld\n",
81c19800e8SDoug Rabson etype_name, (unsigned long)size, iterations,
82c19800e8SDoug Rabson (long)tv2.tv_sec, (long)tv2.tv_usec);
83c19800e8SDoug Rabson
84c19800e8SDoug Rabson free(buf);
85c19800e8SDoug Rabson free(etype_name);
86c19800e8SDoug Rabson krb5_crypto_destroy(context, crypto);
87c19800e8SDoug Rabson krb5_free_keyblock_contents(context, &key);
88c19800e8SDoug Rabson }
89c19800e8SDoug Rabson
90c19800e8SDoug Rabson static void
time_s2k(krb5_context context,krb5_enctype etype,const char * password,krb5_salt salt,int iterations)91c19800e8SDoug Rabson time_s2k(krb5_context context,
92c19800e8SDoug Rabson krb5_enctype etype,
93c19800e8SDoug Rabson const char *password,
94c19800e8SDoug Rabson krb5_salt salt,
95c19800e8SDoug Rabson int iterations)
96c19800e8SDoug Rabson {
97c19800e8SDoug Rabson struct timeval tv1, tv2;
98c19800e8SDoug Rabson krb5_error_code ret;
99c19800e8SDoug Rabson krb5_keyblock key;
100c19800e8SDoug Rabson krb5_data opaque;
101c19800e8SDoug Rabson char *etype_name;
102c19800e8SDoug Rabson int i;
103c19800e8SDoug Rabson
104c19800e8SDoug Rabson ret = krb5_enctype_to_string(context, etype, &etype_name);
105c19800e8SDoug Rabson if (ret)
106c19800e8SDoug Rabson krb5_err(context, 1, ret, "krb5_enctype_to_string");
107c19800e8SDoug Rabson
108c19800e8SDoug Rabson opaque.data = NULL;
109c19800e8SDoug Rabson opaque.length = 0;
110c19800e8SDoug Rabson
111c19800e8SDoug Rabson gettimeofday(&tv1, NULL);
112c19800e8SDoug Rabson
113c19800e8SDoug Rabson for (i = 0; i < iterations; i++) {
114c19800e8SDoug Rabson ret = krb5_string_to_key_salt_opaque(context, etype, password, salt,
115c19800e8SDoug Rabson opaque, &key);
116c19800e8SDoug Rabson if (ret)
117c19800e8SDoug Rabson krb5_err(context, 1, ret, "krb5_string_to_key_data_salt_opaque");
118c19800e8SDoug Rabson krb5_free_keyblock_contents(context, &key);
119c19800e8SDoug Rabson }
120c19800e8SDoug Rabson
121c19800e8SDoug Rabson gettimeofday(&tv2, NULL);
122c19800e8SDoug Rabson
123c19800e8SDoug Rabson timevalsub(&tv2, &tv1);
124c19800e8SDoug Rabson
125c19800e8SDoug Rabson printf("%s string2key %d iterations time: %3ld.%06ld\n",
126c19800e8SDoug Rabson etype_name, iterations, (long)tv2.tv_sec, (long)tv2.tv_usec);
127c19800e8SDoug Rabson free(etype_name);
128c19800e8SDoug Rabson
129c19800e8SDoug Rabson }
130c19800e8SDoug Rabson
131c19800e8SDoug Rabson static int version_flag = 0;
132c19800e8SDoug Rabson static int help_flag = 0;
133c19800e8SDoug Rabson
134c19800e8SDoug Rabson static struct getargs args[] = {
135c19800e8SDoug Rabson {"version", 0, arg_flag, &version_flag,
136c19800e8SDoug Rabson "print version", NULL },
137c19800e8SDoug Rabson {"help", 0, arg_flag, &help_flag,
138c19800e8SDoug Rabson NULL, NULL }
139c19800e8SDoug Rabson };
140c19800e8SDoug Rabson
141c19800e8SDoug Rabson static void
usage(int ret)142c19800e8SDoug Rabson usage (int ret)
143c19800e8SDoug Rabson {
144c19800e8SDoug Rabson arg_printusage (args,
145c19800e8SDoug Rabson sizeof(args)/sizeof(*args),
146c19800e8SDoug Rabson NULL,
147c19800e8SDoug Rabson "");
148c19800e8SDoug Rabson exit (ret);
149c19800e8SDoug Rabson }
150c19800e8SDoug Rabson
151c19800e8SDoug Rabson int
main(int argc,char ** argv)152c19800e8SDoug Rabson main(int argc, char **argv)
153c19800e8SDoug Rabson {
154c19800e8SDoug Rabson krb5_context context;
155c19800e8SDoug Rabson krb5_error_code ret;
156c19800e8SDoug Rabson int i, enciter, s2kiter;
157c19800e8SDoug Rabson int optidx = 0;
158c19800e8SDoug Rabson krb5_salt salt;
159c19800e8SDoug Rabson
160c19800e8SDoug Rabson krb5_enctype enctypes[] = {
161c19800e8SDoug Rabson ETYPE_DES_CBC_CRC,
162c19800e8SDoug Rabson ETYPE_DES3_CBC_SHA1,
163c19800e8SDoug Rabson ETYPE_ARCFOUR_HMAC_MD5,
164c19800e8SDoug Rabson ETYPE_AES128_CTS_HMAC_SHA1_96,
165c19800e8SDoug Rabson ETYPE_AES256_CTS_HMAC_SHA1_96
166c19800e8SDoug Rabson };
167c19800e8SDoug Rabson
168c19800e8SDoug Rabson setprogname(argv[0]);
169c19800e8SDoug Rabson
170c19800e8SDoug Rabson if(getarg(args, sizeof(args) / sizeof(args[0]), argc, argv, &optidx))
171c19800e8SDoug Rabson usage(1);
172c19800e8SDoug Rabson
173c19800e8SDoug Rabson if (help_flag)
174c19800e8SDoug Rabson usage (0);
175c19800e8SDoug Rabson
176c19800e8SDoug Rabson if(version_flag){
177c19800e8SDoug Rabson print_version(NULL);
178c19800e8SDoug Rabson exit(0);
179c19800e8SDoug Rabson }
180c19800e8SDoug Rabson
181c19800e8SDoug Rabson salt.salttype = KRB5_PW_SALT;
182c19800e8SDoug Rabson salt.saltvalue.data = NULL;
183c19800e8SDoug Rabson salt.saltvalue.length = 0;
184c19800e8SDoug Rabson
185c19800e8SDoug Rabson ret = krb5_init_context(&context);
186c19800e8SDoug Rabson if (ret)
187c19800e8SDoug Rabson errx (1, "krb5_init_context failed: %d", ret);
188c19800e8SDoug Rabson
189c19800e8SDoug Rabson enciter = 1000;
190c19800e8SDoug Rabson s2kiter = 100;
191c19800e8SDoug Rabson
192c19800e8SDoug Rabson for (i = 0; i < sizeof(enctypes)/sizeof(enctypes[0]); i++) {
193c19800e8SDoug Rabson
194*ae771770SStanislav Sedov krb5_enctype_enable(context, enctypes[i]);
195*ae771770SStanislav Sedov
196c19800e8SDoug Rabson time_encryption(context, 16, enctypes[i], enciter);
197c19800e8SDoug Rabson time_encryption(context, 32, enctypes[i], enciter);
198c19800e8SDoug Rabson time_encryption(context, 512, enctypes[i], enciter);
199c19800e8SDoug Rabson time_encryption(context, 1024, enctypes[i], enciter);
200c19800e8SDoug Rabson time_encryption(context, 2048, enctypes[i], enciter);
201c19800e8SDoug Rabson time_encryption(context, 4096, enctypes[i], enciter);
202c19800e8SDoug Rabson time_encryption(context, 8192, enctypes[i], enciter);
203c19800e8SDoug Rabson time_encryption(context, 16384, enctypes[i], enciter);
204c19800e8SDoug Rabson time_encryption(context, 32768, enctypes[i], enciter);
205c19800e8SDoug Rabson
206c19800e8SDoug Rabson time_s2k(context, enctypes[i], "mYsecreitPassword", salt, s2kiter);
207c19800e8SDoug Rabson }
208c19800e8SDoug Rabson
209c19800e8SDoug Rabson krb5_free_context(context);
210c19800e8SDoug Rabson
211c19800e8SDoug Rabson return 0;
212c19800e8SDoug Rabson }
213