Line data Source code
1 : /* benchmark.c - for libgcrypt
2 : * Copyright (C) 2002, 2004, 2005, 2006, 2008 Free Software Foundation, Inc.
3 : *
4 : * This file is part of Libgcrypt.
5 : *
6 : * Libgcrypt is free software; you can redistribute it and/or modify
7 : * it under the terms of the GNU Lesser general Public License as
8 : * published by the Free Software Foundation; either version 2.1 of
9 : * the License, or (at your option) any later version.
10 : *
11 : * Libgcrypt is distributed in the hope that it will be useful,
12 : * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 : * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 : * GNU Lesser General Public License for more details.
15 : *
16 : * You should have received a copy of the GNU Lesser General Public
17 : * License along with this program; if not, see <http://www.gnu.org/licenses/>.
18 : */
19 :
20 : #ifdef HAVE_CONFIG_H
21 : #include <config.h>
22 : #endif
23 : #include <stdio.h>
24 : #include <stdlib.h>
25 : #include <stdarg.h>
26 :
27 : #ifdef _GCRYPT_IN_LIBGCRYPT
28 : # include "../src/gcrypt-int.h"
29 : # include "../compat/libcompat.h"
30 : #else
31 : # include <gcrypt.h>
32 : #endif
33 :
34 : #include "stopwatch.h"
35 :
36 :
37 : #define PGM "benchmark"
38 :
39 : static int verbose;
40 :
41 : /* Do encryption tests with large buffers. */
42 : static int large_buffers;
43 :
44 : /* Number of cipher repetitions. */
45 : static int cipher_repetitions;
46 :
47 : /* Number of hash repetitions. */
48 : static int hash_repetitions;
49 :
50 : /* Number of hash repetitions. */
51 : static int mac_repetitions;
52 :
53 : /* Alignment of the buffers. */
54 : static int buffer_alignment;
55 :
56 : /* Whether to include the keysetup in the cipher timings. */
57 : static int cipher_with_keysetup;
58 :
59 : /* Whether fips mode was active at startup. */
60 : static int in_fips_mode;
61 :
62 : /* Whether we are running as part of the regression test suite. */
63 : static int in_regression_test;
64 :
65 : /* Whether --progress is in use. */
66 : static int with_progress;
67 :
68 : /* Runtime flag to switch to a different progress output. */
69 : static int single_char_progress;
70 :
71 :
72 : static const char sample_private_dsa_key_1024[] =
73 : "(private-key\n"
74 : " (dsa\n"
75 : " (p #00A126202D592214C5A8F6016E2C3F4256052ACB1CB17D88E64B1293FAF08F5E4685"
76 : "03E6F68366B326A56284370EB2103E92D8346A163E44A08FDC422AC8E9E44268557A"
77 : "853539A6AF39353A59CE5E78FD98B57D0F3E3A7EBC8A256AC9A775BA59689F3004BF"
78 : "C3035730C4C0C51626C5D7F5852637EC589BB29DAB46C161572E4B#)\n"
79 : " (q #00DEB5A296421887179ECA1762884DE2AF8185AFC5#)\n"
80 : " (g #3958B34AE7747194ECBD312F8FEE8CBE3918E94DF9FD11E2912E56318F33BDC38622"
81 : "B18DDFF393074BCA8BAACF50DF27AEE529F3E8AEECE55C398DAB3A5E04C2EA142312"
82 : "FACA2FE7F0A88884F8DAC3979EE67598F9A383B2A2325F035C796F352A5C3CDF2CB3"
83 : "85AD24EC52A6E55247E1BB37D260F79E617D2A4446415B6AD79A#)\n"
84 : " (y #519E9FE9AB0545A6724E74603B7B04E48DC1437E0284A11EA605A7BA8AB1CF354FD4"
85 : "ECC93880AC293391C69B558AD84E7AAFA88F11D028CF3A378F241D6B056A90C588F6"
86 : "66F68D27262B4DA84657D15057D371BCEC1F6504032507D5B881E45FC93A1B973155"
87 : "D91C57219D090C3ACD75E7C2B9F1176A208AC03D6C12AC28A271#)\n"
88 : " (x #4186F8A58C5DF46C5BCFC7006BEEBF05E93C0CA7#)\n"
89 : "))\n";
90 :
91 : static const char sample_public_dsa_key_1024[] =
92 : "(public-key\n"
93 : " (dsa\n"
94 : " (p #00A126202D592214C5A8F6016E2C3F4256052ACB1CB17D88E64B1293FAF08F5E4685"
95 : "03E6F68366B326A56284370EB2103E92D8346A163E44A08FDC422AC8E9E44268557A"
96 : "853539A6AF39353A59CE5E78FD98B57D0F3E3A7EBC8A256AC9A775BA59689F3004BF"
97 : "C3035730C4C0C51626C5D7F5852637EC589BB29DAB46C161572E4B#)\n"
98 : " (q #00DEB5A296421887179ECA1762884DE2AF8185AFC5#)\n"
99 : " (g #3958B34AE7747194ECBD312F8FEE8CBE3918E94DF9FD11E2912E56318F33BDC38622"
100 : "B18DDFF393074BCA8BAACF50DF27AEE529F3E8AEECE55C398DAB3A5E04C2EA142312"
101 : "FACA2FE7F0A88884F8DAC3979EE67598F9A383B2A2325F035C796F352A5C3CDF2CB3"
102 : "85AD24EC52A6E55247E1BB37D260F79E617D2A4446415B6AD79A#)\n"
103 : " (y #519E9FE9AB0545A6724E74603B7B04E48DC1437E0284A11EA605A7BA8AB1CF354FD4"
104 : "ECC93880AC293391C69B558AD84E7AAFA88F11D028CF3A378F241D6B056A90C588F6"
105 : "66F68D27262B4DA84657D15057D371BCEC1F6504032507D5B881E45FC93A1B973155"
106 : "D91C57219D090C3ACD75E7C2B9F1176A208AC03D6C12AC28A271#)\n"
107 : "))\n";
108 :
109 :
110 : static const char sample_private_dsa_key_2048[] =
111 : "(private-key\n"
112 : " (dsa\n"
113 : " (p #00B54636673962B64F7DC23C71ACEF6E7331796F607560B194DFCC0CA370E858A365"
114 : "A413152FB6EB8C664BD171AC316FE5B381CD084D07377571599880A068EF1382D85C"
115 : "308B4E9DEAC12D66DE5C4A826EBEB5ED94A62E7301E18927E890589A2F230272A150"
116 : "C118BC3DC2965AE0D05BE4F65C6137B2BA7EDABB192C3070D202C10AA3F534574970"
117 : "71454DB8A73DDB6511A5BA98EF1450FD90DE5BAAFC9FD3AC22EBEA612DD075BB7405"
118 : "D56866D125E33982C046808F7CEBA8E5C0B9F19A6FE451461660A1CBA9EF68891179"
119 : "0256A573D3B8F35A5C7A0C6C31F2DB90E25A26845252AD9E485EF2D339E7B5890CD4"
120 : "2F9C9F315ED409171EC35CA04CC06B275577B3#)\n"
121 : " (q #00DA67989167FDAC4AE3DF9247A716859A30C0CF9C5A6DBA01EABA3481#)\n"
122 : " (g #48E35DA584A089D05142AA63603FDB00D131B07A0781E2D5A8F9614D2B33D3E40A78"
123 : "98A9E10CDBB612CF093F95A3E10D09566726F2C12823836B2D9CD974BB695665F3B3"
124 : "5D219A9724B87F380BD5207EDA0AE38C79E8F18122C3F76E4CEB0ABED3250914987F"
125 : "B30D4B9E19C04C28A5D4F45560AF586F6A1B41751EAD90AE7F044F4E2A4A50C1F508"
126 : "4FC202463F478F678B9A19392F0D2961C5391C546EF365368BB46410C9C1CEE96E9F"
127 : "0C953570C2ED06328B11C90E86E57CAA7FA5ABAA278E22A4C8C08E16EE59F484EC44"
128 : "2CF55535BAA2C6BEA8833A555372BEFE1E665D3C7DAEF58061D5136331EF4EB61BC3"
129 : "6EE4425A553AF8885FEA15A88135BE133520#)\n"
130 : " (y #66E0D1A69D663466F8FEF2B7C0878DAC93C36A2FB2C05E0306A53B926021D4B92A1C"
131 : "2FA6860061E88E78CBBBA49B0E12700F07DBF86F72CEB2927EDAC0C7E3969C3A47BB"
132 : "4E0AE93D8BB3313E93CC7A72DFEEE442EFBC81B3B2AEC9D8DCBE21220FB760201D79"
133 : "328C41C773866587A44B6954767D022A88072900E964089D9B17133603056C985C4F"
134 : "8A0B648F297F8D2C3CB43E4371DC6002B5B12CCC085BDB2CFC5074A0587566187EE3"
135 : "E11A2A459BD94726248BB8D6CC62938E11E284C2C183576FBB51749EB238C4360923"
136 : "79C08CE1C8CD77EB57404CE9B4744395ACF721487450BADE3220576F2F816248B0A7"
137 : "14A264330AECCB24DE2A1107847B23490897#)\n"
138 : " (x #477BD14676E22563C5ABA68025CEBA2A48D485F5B2D4AD4C0EBBD6D0#)\n"
139 : "))\n";
140 :
141 :
142 : static const char sample_public_dsa_key_2048[] =
143 : "(public-key\n"
144 : " (dsa\n"
145 : " (p #00B54636673962B64F7DC23C71ACEF6E7331796F607560B194DFCC0CA370E858A365"
146 : "A413152FB6EB8C664BD171AC316FE5B381CD084D07377571599880A068EF1382D85C"
147 : "308B4E9DEAC12D66DE5C4A826EBEB5ED94A62E7301E18927E890589A2F230272A150"
148 : "C118BC3DC2965AE0D05BE4F65C6137B2BA7EDABB192C3070D202C10AA3F534574970"
149 : "71454DB8A73DDB6511A5BA98EF1450FD90DE5BAAFC9FD3AC22EBEA612DD075BB7405"
150 : "D56866D125E33982C046808F7CEBA8E5C0B9F19A6FE451461660A1CBA9EF68891179"
151 : "0256A573D3B8F35A5C7A0C6C31F2DB90E25A26845252AD9E485EF2D339E7B5890CD4"
152 : "2F9C9F315ED409171EC35CA04CC06B275577B3#)\n"
153 : " (q #00DA67989167FDAC4AE3DF9247A716859A30C0CF9C5A6DBA01EABA3481#)\n"
154 : " (g #48E35DA584A089D05142AA63603FDB00D131B07A0781E2D5A8F9614D2B33D3E40A78"
155 : "98A9E10CDBB612CF093F95A3E10D09566726F2C12823836B2D9CD974BB695665F3B3"
156 : "5D219A9724B87F380BD5207EDA0AE38C79E8F18122C3F76E4CEB0ABED3250914987F"
157 : "B30D4B9E19C04C28A5D4F45560AF586F6A1B41751EAD90AE7F044F4E2A4A50C1F508"
158 : "4FC202463F478F678B9A19392F0D2961C5391C546EF365368BB46410C9C1CEE96E9F"
159 : "0C953570C2ED06328B11C90E86E57CAA7FA5ABAA278E22A4C8C08E16EE59F484EC44"
160 : "2CF55535BAA2C6BEA8833A555372BEFE1E665D3C7DAEF58061D5136331EF4EB61BC3"
161 : "6EE4425A553AF8885FEA15A88135BE133520#)\n"
162 : " (y #66E0D1A69D663466F8FEF2B7C0878DAC93C36A2FB2C05E0306A53B926021D4B92A1C"
163 : "2FA6860061E88E78CBBBA49B0E12700F07DBF86F72CEB2927EDAC0C7E3969C3A47BB"
164 : "4E0AE93D8BB3313E93CC7A72DFEEE442EFBC81B3B2AEC9D8DCBE21220FB760201D79"
165 : "328C41C773866587A44B6954767D022A88072900E964089D9B17133603056C985C4F"
166 : "8A0B648F297F8D2C3CB43E4371DC6002B5B12CCC085BDB2CFC5074A0587566187EE3"
167 : "E11A2A459BD94726248BB8D6CC62938E11E284C2C183576FBB51749EB238C4360923"
168 : "79C08CE1C8CD77EB57404CE9B4744395ACF721487450BADE3220576F2F816248B0A7"
169 : "14A264330AECCB24DE2A1107847B23490897#)\n"
170 : "))\n";
171 :
172 :
173 : static const char sample_private_dsa_key_3072[] =
174 : "(private-key\n"
175 : " (dsa\n"
176 : " (p #00BA73E148AEA5E8B64878AF5BE712B8302B9671C5F3EEB7722A9D0D9868D048C938"
177 : "877C91C335C7819292E69C7D34264F1578E32EC2DA8408DF75D0EB76E0D3030B84B5"
178 : "62D8EF93AB53BAB6B8A5DE464F5CA87AEA43BDCF0FB0B7815AA3114CFC84FD916A83"
179 : "B3D5FD78390189332232E9D037D215313FD002FF46C048B66703F87FAE092AAA0988"
180 : "AC745336EBE672A01DEDBD52395783579B67CF3AE1D6F1602CCCB12154FA0E00AE46"
181 : "0D9B289CF709194625BCB919B11038DEFC50ADBBA20C3F320078E4E9529B4F6848E2"
182 : "AB5E6278DB961FE226F2EEBD201E071C48C5BEF98B4D9BEE42C1C7102D893EBF8902"
183 : "D7A91266340AFD6CE1D09E52282FFF5B97EAFA3886A3FCF84FF76D1E06538D0D8E60"
184 : "B3332145785E07D29A5965382DE3470D1D888447FA9C00A2373378FC3FA7B9F7D17E"
185 : "95A6A5AE1397BE46D976EF2C96E89913AC4A09351CA661BF6F67E30407DA846946C7"
186 : "62D9BAA6B77825097D3E7B886456BB32E3E74516BF3FD93D71B257AA8F723E01CE33"
187 : "8015353D3778B02B892AF7#)\n"
188 : " (q #00BFF3F3CC18FA018A5B8155A8695E1E4939660D5E4759322C39D50F3B93E5F68B#)\n"
189 : " (g #6CCFD8219F5FCE8EF2BEF3262929787140847E38674B1EF8DB20255E212CB6330EC4"
190 : "DFE8A26AB7ECC5760DEB9BBF59A2B2821D510F1868172222867558B8D204E889C474"
191 : "7CA30FBF9D8CF41AE5D5BD845174641101593849FF333E6C93A6550931B2B9D56B98"
192 : "9CAB01729D9D736FA6D24A74D2DDE1E9E648D141473E443DD6BBF0B3CAB64F9FE4FC"
193 : "134B2EB57437789F75C744DF1FA67FA8A64603E5441BC7ECE29E00BDF262BDC81E8C"
194 : "7330A18A412DE38E7546D342B89A0AF675A89E6BEF00540EB107A2FE74EA402B0D89"
195 : "F5C02918DEEEAF8B8737AC866B09B50810AB8D8668834A1B9E1E53866E2B0A926FAB"
196 : "120A0CDE5B3715FFFE6ACD1AB73588DCC1EC4CE9392FE57F8D1D35811200CB07A0E6"
197 : "374E2C4B0AEB7E3D077B8545C0E438DCC0F1AE81E186930E99EBC5B91B77E92803E0"
198 : "21602887851A4FFDB3A7896AC655A0901218C121C5CBB0931E7D5EAC243F37711B5F"
199 : "D5A62B1B38A83F03D8F6703D8B98DF367FC8A76990335F62173A5391836F0F2413EC"
200 : "4997AF9EB55C6660B01A#)\n"
201 : " (y #2320B22434C5DB832B4EC267CC52E78DD5CCFA911E8F0804E7E7F32B186B2D4167AE"
202 : "4AA6869822E76400492D6A193B0535322C72B0B7AA4A87E33044FDC84BE24C64A053"
203 : "A37655EE9EABDCDC1FDF63F3F1C677CEB41595DF7DEFE9178D85A3D621B4E4775492"
204 : "8C0A58D2458D06F9562E4DE2FE6129A64063A99E88E54485B97484A28188C4D33F15"
205 : "DDC903B6CEA0135E3E3D27B4EA39319696305CE93D7BA7BE00367DBE3AAF43491E71"
206 : "CBF254744A5567F5D70090D6139E0C990239627B3A1C5B20B6F9F6374B8D8D8A8997"
207 : "437265BE1E3B4810D4B09254400DE287A0DFFBAEF339E48D422B1D41A37E642BC026"
208 : "73314701C8FA9792845C129351A87A945A03E6C895860E51D6FB8B7340A94D1A8A7B"
209 : "FA85AC83B4B14E73AB86CB96C236C8BFB0978B61B2367A7FE4F7891070F56C78D5DD"
210 : "F5576BFE5BE4F333A4E2664E79528B3294907AADD63F4F2E7AA8147B928D8CD69765"
211 : "3DB98C4297CB678046ED55C0DBE60BF7142C594603E4D705DC3D17270F9F086EC561"
212 : "2703D518D8D49FF0EBE6#)\n"
213 : " (x #00A9FFFC88E67D6F7B810E291C050BAFEA7FC4A75E8D2F16CFED3416FD77607232#)\n"
214 : "))\n";
215 :
216 : static const char sample_public_dsa_key_3072[] =
217 : "(public-key\n"
218 : " (dsa\n"
219 : " (p #00BA73E148AEA5E8B64878AF5BE712B8302B9671C5F3EEB7722A9D0D9868D048C938"
220 : "877C91C335C7819292E69C7D34264F1578E32EC2DA8408DF75D0EB76E0D3030B84B5"
221 : "62D8EF93AB53BAB6B8A5DE464F5CA87AEA43BDCF0FB0B7815AA3114CFC84FD916A83"
222 : "B3D5FD78390189332232E9D037D215313FD002FF46C048B66703F87FAE092AAA0988"
223 : "AC745336EBE672A01DEDBD52395783579B67CF3AE1D6F1602CCCB12154FA0E00AE46"
224 : "0D9B289CF709194625BCB919B11038DEFC50ADBBA20C3F320078E4E9529B4F6848E2"
225 : "AB5E6278DB961FE226F2EEBD201E071C48C5BEF98B4D9BEE42C1C7102D893EBF8902"
226 : "D7A91266340AFD6CE1D09E52282FFF5B97EAFA3886A3FCF84FF76D1E06538D0D8E60"
227 : "B3332145785E07D29A5965382DE3470D1D888447FA9C00A2373378FC3FA7B9F7D17E"
228 : "95A6A5AE1397BE46D976EF2C96E89913AC4A09351CA661BF6F67E30407DA846946C7"
229 : "62D9BAA6B77825097D3E7B886456BB32E3E74516BF3FD93D71B257AA8F723E01CE33"
230 : "8015353D3778B02B892AF7#)\n"
231 : " (q #00BFF3F3CC18FA018A5B8155A8695E1E4939660D5E4759322C39D50F3B93E5F68B#)\n"
232 : " (g #6CCFD8219F5FCE8EF2BEF3262929787140847E38674B1EF8DB20255E212CB6330EC4"
233 : "DFE8A26AB7ECC5760DEB9BBF59A2B2821D510F1868172222867558B8D204E889C474"
234 : "7CA30FBF9D8CF41AE5D5BD845174641101593849FF333E6C93A6550931B2B9D56B98"
235 : "9CAB01729D9D736FA6D24A74D2DDE1E9E648D141473E443DD6BBF0B3CAB64F9FE4FC"
236 : "134B2EB57437789F75C744DF1FA67FA8A64603E5441BC7ECE29E00BDF262BDC81E8C"
237 : "7330A18A412DE38E7546D342B89A0AF675A89E6BEF00540EB107A2FE74EA402B0D89"
238 : "F5C02918DEEEAF8B8737AC866B09B50810AB8D8668834A1B9E1E53866E2B0A926FAB"
239 : "120A0CDE5B3715FFFE6ACD1AB73588DCC1EC4CE9392FE57F8D1D35811200CB07A0E6"
240 : "374E2C4B0AEB7E3D077B8545C0E438DCC0F1AE81E186930E99EBC5B91B77E92803E0"
241 : "21602887851A4FFDB3A7896AC655A0901218C121C5CBB0931E7D5EAC243F37711B5F"
242 : "D5A62B1B38A83F03D8F6703D8B98DF367FC8A76990335F62173A5391836F0F2413EC"
243 : "4997AF9EB55C6660B01A#)\n"
244 : " (y #2320B22434C5DB832B4EC267CC52E78DD5CCFA911E8F0804E7E7F32B186B2D4167AE"
245 : "4AA6869822E76400492D6A193B0535322C72B0B7AA4A87E33044FDC84BE24C64A053"
246 : "A37655EE9EABDCDC1FDF63F3F1C677CEB41595DF7DEFE9178D85A3D621B4E4775492"
247 : "8C0A58D2458D06F9562E4DE2FE6129A64063A99E88E54485B97484A28188C4D33F15"
248 : "DDC903B6CEA0135E3E3D27B4EA39319696305CE93D7BA7BE00367DBE3AAF43491E71"
249 : "CBF254744A5567F5D70090D6139E0C990239627B3A1C5B20B6F9F6374B8D8D8A8997"
250 : "437265BE1E3B4810D4B09254400DE287A0DFFBAEF339E48D422B1D41A37E642BC026"
251 : "73314701C8FA9792845C129351A87A945A03E6C895860E51D6FB8B7340A94D1A8A7B"
252 : "FA85AC83B4B14E73AB86CB96C236C8BFB0978B61B2367A7FE4F7891070F56C78D5DD"
253 : "F5576BFE5BE4F333A4E2664E79528B3294907AADD63F4F2E7AA8147B928D8CD69765"
254 : "3DB98C4297CB678046ED55C0DBE60BF7142C594603E4D705DC3D17270F9F086EC561"
255 : "2703D518D8D49FF0EBE6#)\n"
256 : "))\n";
257 :
258 :
259 : static const char sample_public_elg_key_1024[] =
260 : "(public-key"
261 : " (elg"
262 : " (p #00F7CC7C08AF096B620C545C9353B1140D698FF8BE2D97A3515C17C7F8DABCDB8FB6"
263 : "64A46416C90C530C18DF5ABB6C1DDE3AE2FA9DDC9CE40DF644CDE2E759F6DE43F31A"
264 : "EEEBC136A460B3E4B0A8F99326A335145B19F4C81B13804894B7D2A30F78A8A7D7F4"
265 : "52B83836FDB0DE90BE327FB5E5318757BEF5FE0FC3A5461CBEA0D3#)"
266 : " (g #06#)"
267 : " (y #36B38FB63E3340A0DD8A0468E9FAA512A32DA010BF7110201D0A3DF1B8FEA0E16F3C"
268 : "80374584E554804B96EAA8C270FE531F75D0DBD81BA65640EDB1F76D46C27D2925B7"
269 : "3EC3B295CDAEEF242904A84D74FB2879425F82D4C5B59BB49A992F85D574168DED85"
270 : "D227600BBEF7AF0B8F0DEB785528370E4C4B3E4D65C536122A5A#)"
271 : " ))";
272 : static const char sample_private_elg_key_1024[] =
273 : "(private-key"
274 : " (elg"
275 : " (p #00F7CC7C08AF096B620C545C9353B1140D698FF8BE2D97A3515C17C7F8DABCDB8FB6"
276 : "64A46416C90C530C18DF5ABB6C1DDE3AE2FA9DDC9CE40DF644CDE2E759F6DE43F31A"
277 : "EEEBC136A460B3E4B0A8F99326A335145B19F4C81B13804894B7D2A30F78A8A7D7F4"
278 : "52B83836FDB0DE90BE327FB5E5318757BEF5FE0FC3A5461CBEA0D3#)"
279 : " (g #06#)"
280 : " (y #36B38FB63E3340A0DD8A0468E9FAA512A32DA010BF7110201D0A3DF1B8FEA0E16F3C"
281 : "80374584E554804B96EAA8C270FE531F75D0DBD81BA65640EDB1F76D46C27D2925B7"
282 : "3EC3B295CDAEEF242904A84D74FB2879425F82D4C5B59BB49A992F85D574168DED85"
283 : "D227600BBEF7AF0B8F0DEB785528370E4C4B3E4D65C536122A5A#)"
284 : " (x #03656C6186FCD27D4A4B1F5010DC0D2AE7833B501E423FCD51DE5EB6D80DACFE#)"
285 : " ))";
286 :
287 :
288 : static const char sample_public_elg_key_2048[] =
289 : "(public-key"
290 : " (elg"
291 : " (p #00BE5A2BB4E562D7B644E3D01321CB818DBA27295C339FC2C47EAE9823225EE1E7B6"
292 : "38C5DE300E931080E09CC89A18C9D180C16559FEF0D89D6A09534BB86489CCCEE30D"
293 : "C18E007A8726BB99F2B2D90D2694597757B120CD2435C0098AD1B74C20004C25BA97"
294 : "73EAA4FBEC594EE17F8B25867EEB0F9F857C751116ADED68ADA2A1E9F9F4F40D18F0"
295 : "EC1221CA6A746FC5F4CDA2B8B5D0AB83834564ACF6FDBB1AB01D4BFBD1E2C0108FF5"
296 : "5FB3190C6D6DA4D95EA683EFA44935CFBC0BF5C6118ACC3768AEA9A98D06024841B8"
297 : "D07C234289D22A5E3948F199C397AA991C59A55BEA0C01E91902E039116946FEA135"
298 : "768011AF6B622C5AF366EF0196FC4EAEAA8127#)"
299 : " (g #07#)"
300 : " (y #5AFF87BC23D8B97AA62897A5C1CDFFA86C59F39EDBD6012B6F333CE23D872009B8C8"
301 : "D1E220E18CFCADFE0AA16346BA2EA132472FFEC746D11C6E758896052313BB501210"
302 : "2389C683A25A3464E9B35A192BAE0A3BB99C973126F7560D968C4A754901DC967354"
303 : "D61A90ACD56D90DCC4337AFB71FAE3FD18C60EB0D6DD173877DF5DB5199C4931FE4E"
304 : "5046F814422580E1162798406FC6554781142DBB7922D4B5B37A111F23761636090F"
305 : "6212681E133365191CF15753AE737F17943ED4B7506DE0A85C3B6D63227F9D65ADF8"
306 : "2C3DF0676C8F43B5B1C07D9AD4E6D0C812401D7DA7B9484DBA8CD3B73B19A95EB237"
307 : "D493E092AEA2371AA904009C8960B0969D12#)"
308 : " ))";
309 : static const char sample_private_elg_key_2048[] =
310 : "(private-key"
311 : " (elg"
312 : " (p #00BE5A2BB4E562D7B644E3D01321CB818DBA27295C339FC2C47EAE9823225EE1E7B6"
313 : "38C5DE300E931080E09CC89A18C9D180C16559FEF0D89D6A09534BB86489CCCEE30D"
314 : "C18E007A8726BB99F2B2D90D2694597757B120CD2435C0098AD1B74C20004C25BA97"
315 : "73EAA4FBEC594EE17F8B25867EEB0F9F857C751116ADED68ADA2A1E9F9F4F40D18F0"
316 : "EC1221CA6A746FC5F4CDA2B8B5D0AB83834564ACF6FDBB1AB01D4BFBD1E2C0108FF5"
317 : "5FB3190C6D6DA4D95EA683EFA44935CFBC0BF5C6118ACC3768AEA9A98D06024841B8"
318 : "D07C234289D22A5E3948F199C397AA991C59A55BEA0C01E91902E039116946FEA135"
319 : "768011AF6B622C5AF366EF0196FC4EAEAA8127#)"
320 : " (g #07#)"
321 : " (y #5AFF87BC23D8B97AA62897A5C1CDFFA86C59F39EDBD6012B6F333CE23D872009B8C8"
322 : "D1E220E18CFCADFE0AA16346BA2EA132472FFEC746D11C6E758896052313BB501210"
323 : "2389C683A25A3464E9B35A192BAE0A3BB99C973126F7560D968C4A754901DC967354"
324 : "D61A90ACD56D90DCC4337AFB71FAE3FD18C60EB0D6DD173877DF5DB5199C4931FE4E"
325 : "5046F814422580E1162798406FC6554781142DBB7922D4B5B37A111F23761636090F"
326 : "6212681E133365191CF15753AE737F17943ED4B7506DE0A85C3B6D63227F9D65ADF8"
327 : "2C3DF0676C8F43B5B1C07D9AD4E6D0C812401D7DA7B9484DBA8CD3B73B19A95EB237"
328 : "D493E092AEA2371AA904009C8960B0969D12#)"
329 : " (x #0628C3903972C55BDC1BC4223075616D3F3BA57D55532DDB40CB14CF72070E0D28BF"
330 : "D0402B9088D25ED8FC#)"
331 : " ))";
332 :
333 : static const char sample_public_elg_key_3072[] =
334 : "(public-key"
335 : " (elg"
336 : " (p #008EAA3497AFE3706E1A57FFA52E68C64C500731B58EBAFEB51C4A20AB15BA57FA72"
337 : "BA1510A4703D5AA6F05DB67E4A776F92AD08800577DC686D00B793167A5D79C997E0"
338 : "5B9A9E5974B4B68B4D71ED8EC37F2F45235D901997D72915643F058E712AA18275A2"
339 : "C6F9F7C2B9B7CD1E814D215F12A840800B546AEF2A2E6C077CDD1A322738FFD36DB2"
340 : "FA5420B5848EED870BC1A6CF55040AE8D2A5945F11AE2BCBE107B41A59EFDBD3B05C"
341 : "F4C876C02C9AEAE22CD4C86806A415302936E4C1E5AA59DBBCCD2F83C20941A29888"
342 : "A70ADB94D3B8A6489C46BF2C5219CD9FD2341EA21D4E68A4ECC468FD09D215FE96D4"
343 : "7AEA12FD22B2456D2CC13672FC7E9772A365C68668157C51E46966B6A1831C429BA0"
344 : "D513519713C49C13C5FC7C14BE0A117627B204C4478D0A93C6B57929E448C9B65BF2"
345 : "390E04BC5940320C0262FC1A221E7C796493432239A6F12BC62C5CF32E8ADBC1730C"
346 : "84C6E6E6BD95AF62835941F3F344AF46BFE5A8F629D5FA699FE37EF8B8C6A2484E42"
347 : "D226206FDF7D1FB93A5457#)"
348 : " (g #0B#)"
349 : " (y #18E734FF645AE169079AEAFC78772371089AD3088627ECF77034AFBDF33ADF594AAF"
350 : "3288F6979E0DB59CE3D2F0FEE031DFF187F1E4549D3C79668794CB19C14481ECDE2D"
351 : "D50861AB674F87A011D50D35F28E424D0D2353850899C2CDD0CC8FDBFC5A0CA395F0"
352 : "E605D46CBDD140DBEF426EBD638C9ADD83C195C45CE84ED2D2B21B87800C783A4F79"
353 : "12226FEFBDA01C66B254534A51765AF09687275AA80C5DFBA143A6262E47C547D7E2"
354 : "289413F8C5C56AED3FA7E5DF5526958E2294FE318AF590C0E720029C202563E6E686"
355 : "9EC810F39A859262FB6047C1D418CAA9047A00BDB127B44B69CF6BC8E6B3709B4C23"
356 : "79783C5F8457EFE23EDA6FF00D1DDCC29268FC4A6C18577BE2B7004089CBB824027A"
357 : "A53C86B51DB054CC83B4F50C8923E2E9431F0A77D741237226CC68591083A2E40171"
358 : "5C7B74100BB74003E2264F8B44A0B0BC5404C44218ABE65C04AA573877506CE4F48C"
359 : "9E3F8AD1CD8DD9F285DD015C2FC5DEBCFA5779AD87F0BBC62E9EC6246021AB450DB9"
360 : "4DDDEFAFD2C7C66E235D#)"
361 : " ))";
362 : static const char sample_private_elg_key_3072[] =
363 : "(private-key"
364 : " (elg"
365 : " (p #008EAA3497AFE3706E1A57FFA52E68C64C500731B58EBAFEB51C4A20AB15BA57FA72"
366 : "BA1510A4703D5AA6F05DB67E4A776F92AD08800577DC686D00B793167A5D79C997E0"
367 : "5B9A9E5974B4B68B4D71ED8EC37F2F45235D901997D72915643F058E712AA18275A2"
368 : "C6F9F7C2B9B7CD1E814D215F12A840800B546AEF2A2E6C077CDD1A322738FFD36DB2"
369 : "FA5420B5848EED870BC1A6CF55040AE8D2A5945F11AE2BCBE107B41A59EFDBD3B05C"
370 : "F4C876C02C9AEAE22CD4C86806A415302936E4C1E5AA59DBBCCD2F83C20941A29888"
371 : "A70ADB94D3B8A6489C46BF2C5219CD9FD2341EA21D4E68A4ECC468FD09D215FE96D4"
372 : "7AEA12FD22B2456D2CC13672FC7E9772A365C68668157C51E46966B6A1831C429BA0"
373 : "D513519713C49C13C5FC7C14BE0A117627B204C4478D0A93C6B57929E448C9B65BF2"
374 : "390E04BC5940320C0262FC1A221E7C796493432239A6F12BC62C5CF32E8ADBC1730C"
375 : "84C6E6E6BD95AF62835941F3F344AF46BFE5A8F629D5FA699FE37EF8B8C6A2484E42"
376 : "D226206FDF7D1FB93A5457#)"
377 : " (g #0B#)"
378 : " (y #18E734FF645AE169079AEAFC78772371089AD3088627ECF77034AFBDF33ADF594AAF"
379 : "3288F6979E0DB59CE3D2F0FEE031DFF187F1E4549D3C79668794CB19C14481ECDE2D"
380 : "D50861AB674F87A011D50D35F28E424D0D2353850899C2CDD0CC8FDBFC5A0CA395F0"
381 : "E605D46CBDD140DBEF426EBD638C9ADD83C195C45CE84ED2D2B21B87800C783A4F79"
382 : "12226FEFBDA01C66B254534A51765AF09687275AA80C5DFBA143A6262E47C547D7E2"
383 : "289413F8C5C56AED3FA7E5DF5526958E2294FE318AF590C0E720029C202563E6E686"
384 : "9EC810F39A859262FB6047C1D418CAA9047A00BDB127B44B69CF6BC8E6B3709B4C23"
385 : "79783C5F8457EFE23EDA6FF00D1DDCC29268FC4A6C18577BE2B7004089CBB824027A"
386 : "A53C86B51DB054CC83B4F50C8923E2E9431F0A77D741237226CC68591083A2E40171"
387 : "5C7B74100BB74003E2264F8B44A0B0BC5404C44218ABE65C04AA573877506CE4F48C"
388 : "9E3F8AD1CD8DD9F285DD015C2FC5DEBCFA5779AD87F0BBC62E9EC6246021AB450DB9"
389 : "4DDDEFAFD2C7C66E235D#)"
390 : " (x #03A73F0389E470AAC831B039F8AA0C4EBD3A47DD083E32EEA08E4911236CD597C272"
391 : "9823D47A51C8535DA52FE6DAB3E8D1C20D#)"
392 : " ))";
393 :
394 :
395 : #define DIM(v) (sizeof(v)/sizeof((v)[0]))
396 : #define DIMof(type,member) DIM(((type *)0)->member)
397 : #define BUG() do {fprintf ( stderr, "Ooops at %s:%d\n", __FILE__ , __LINE__ );\
398 : exit(2);} while(0)
399 :
400 :
401 : static void
402 0 : die (const char *format, ...)
403 : {
404 : va_list arg_ptr ;
405 :
406 0 : va_start( arg_ptr, format ) ;
407 0 : putchar ('\n');
408 0 : fputs ( PGM ": ", stderr);
409 0 : vfprintf (stderr, format, arg_ptr );
410 0 : va_end(arg_ptr);
411 0 : exit (1);
412 : }
413 :
414 :
415 : static void
416 0 : show_sexp (const char *prefix, gcry_sexp_t a)
417 : {
418 : char *buf;
419 : size_t size;
420 :
421 0 : fputs (prefix, stderr);
422 0 : size = gcry_sexp_sprint (a, GCRYSEXP_FMT_ADVANCED, NULL, 0);
423 0 : buf = malloc (size);
424 0 : if (!buf)
425 0 : die ("out of core\n");
426 :
427 0 : gcry_sexp_sprint (a, GCRYSEXP_FMT_ADVANCED, buf, size);
428 0 : fprintf (stderr, "%.*s", (int)size, buf);
429 0 : }
430 :
431 :
432 : static void
433 0 : progress_cb (void *cb_data, const char *what, int printchar,
434 : int current, int total)
435 : {
436 : (void)cb_data;
437 :
438 0 : if (single_char_progress)
439 : {
440 0 : fputc (printchar, stdout);
441 0 : fflush (stderr);
442 : }
443 : else
444 : {
445 0 : fprintf (stderr, PGM ": progress (%s %c %d %d)\n",
446 : what, printchar, current, total);
447 0 : fflush (stderr);
448 : }
449 0 : }
450 :
451 :
452 : static void
453 1 : random_bench (int very_strong)
454 : {
455 : char buf[128];
456 : int i;
457 :
458 1 : printf ("%-10s", "random");
459 :
460 1 : if (!very_strong)
461 : {
462 1 : start_timer ();
463 101 : for (i=0; i < 100; i++)
464 100 : gcry_randomize (buf, sizeof buf, GCRY_STRONG_RANDOM);
465 1 : stop_timer ();
466 1 : printf (" %s", elapsed_time (1));
467 : }
468 :
469 1 : start_timer ();
470 101 : for (i=0; i < 100; i++)
471 100 : gcry_randomize (buf, 8,
472 : very_strong? GCRY_VERY_STRONG_RANDOM:GCRY_STRONG_RANDOM);
473 1 : stop_timer ();
474 1 : printf (" %s", elapsed_time (1));
475 :
476 1 : putchar ('\n');
477 1 : if (verbose)
478 0 : gcry_control (GCRYCTL_DUMP_RANDOM_STATS);
479 1 : }
480 :
481 :
482 :
483 : static void
484 26 : md_bench ( const char *algoname )
485 : {
486 : int algo;
487 : gcry_md_hd_t hd;
488 : int i, j, repcount;
489 : char buf_base[1000+15];
490 26 : size_t bufsize = 1000;
491 : char *buf;
492 : char *largebuf_base;
493 : char *largebuf;
494 : char digest[512/8];
495 26 : gcry_error_t err = GPG_ERR_NO_ERROR;
496 :
497 26 : if (!algoname)
498 : {
499 400 : for (i=1; i < 400; i++)
500 399 : if (in_fips_mode && i == GCRY_MD_MD5)
501 : ; /* Don't use MD5 in fips mode. */
502 399 : else if ( !gcry_md_test_algo (i) )
503 25 : md_bench (gcry_md_algo_name (i));
504 27 : return;
505 : }
506 :
507 25 : buf = buf_base + ((16 - ((size_t)buf_base & 0x0f)) % buffer_alignment);
508 :
509 25 : algo = gcry_md_map_name (algoname);
510 25 : if (!algo)
511 : {
512 0 : fprintf (stderr, PGM ": invalid hash algorithm `%s'\n", algoname);
513 0 : exit (1);
514 : }
515 :
516 25 : err = gcry_md_open (&hd, algo, 0);
517 25 : if (err)
518 : {
519 0 : fprintf (stderr, PGM ": error opening hash algorithm `%s'\n", algoname);
520 0 : exit (1);
521 : }
522 :
523 25025 : for (i=0; i < bufsize; i++)
524 25000 : buf[i] = i;
525 :
526 25 : printf ("%-12s", gcry_md_algo_name (algo));
527 :
528 25 : start_timer ();
529 50 : for (repcount=0; repcount < hash_repetitions; repcount++)
530 25025 : for (i=0; i < 1000; i++)
531 25000 : gcry_md_write (hd, buf, bufsize);
532 25 : gcry_md_final (hd);
533 25 : stop_timer ();
534 25 : printf (" %s", elapsed_time (1));
535 25 : fflush (stdout);
536 :
537 25 : gcry_md_reset (hd);
538 25 : start_timer ();
539 50 : for (repcount=0; repcount < hash_repetitions; repcount++)
540 250025 : for (i=0; i < 10000; i++)
541 250000 : gcry_md_write (hd, buf, bufsize/10);
542 25 : gcry_md_final (hd);
543 25 : stop_timer ();
544 25 : printf (" %s", elapsed_time (1));
545 25 : fflush (stdout);
546 :
547 25 : gcry_md_reset (hd);
548 25 : start_timer ();
549 50 : for (repcount=0; repcount < hash_repetitions; repcount++)
550 25000025 : for (i=0; i < 1000000; i++)
551 25000000 : gcry_md_write (hd, buf, 1);
552 25 : gcry_md_final (hd);
553 25 : stop_timer ();
554 25 : printf (" %s", elapsed_time (1));
555 25 : fflush (stdout);
556 :
557 25 : start_timer ();
558 50 : for (repcount=0; repcount < hash_repetitions; repcount++)
559 25025 : for (i=0; i < 1000; i++)
560 25025000 : for (j=0; j < bufsize; j++)
561 25000000 : gcry_md_putc (hd, buf[j]);
562 25 : gcry_md_final (hd);
563 25 : stop_timer ();
564 25 : printf (" %s", elapsed_time (1));
565 25 : fflush (stdout);
566 :
567 25 : gcry_md_close (hd);
568 :
569 : /* Now 100 hash operations on 10000 bytes using the fast function.
570 : We initialize the buffer so that all memory pages are committed
571 : and we have repeatable values. */
572 25 : if (gcry_md_get_algo_dlen (algo) > sizeof digest)
573 0 : die ("digest buffer too short\n");
574 :
575 25 : if (gcry_md_get_algo_dlen (algo))
576 : {
577 23 : largebuf_base = malloc (10000+15);
578 23 : if (!largebuf_base)
579 0 : die ("out of core\n");
580 23 : largebuf = (largebuf_base
581 23 : + ((16 - ((size_t)largebuf_base & 0x0f)) % buffer_alignment));
582 :
583 230023 : for (i=0; i < 10000; i++)
584 230000 : largebuf[i] = i;
585 23 : start_timer ();
586 46 : for (repcount=0; repcount < hash_repetitions; repcount++)
587 2323 : for (i=0; i < 100; i++)
588 2300 : gcry_md_hash_buffer (algo, digest, largebuf, 10000);
589 23 : stop_timer ();
590 23 : printf (" %s", elapsed_time (1));
591 23 : free (largebuf_base);
592 : }
593 :
594 25 : putchar ('\n');
595 25 : fflush (stdout);
596 : }
597 :
598 :
599 :
600 : static void
601 40 : mac_bench ( const char *algoname )
602 : {
603 : int algo;
604 : gcry_mac_hd_t hd;
605 : int step, pos, j, i, repcount;
606 : char buf_base[1000+15];
607 40 : size_t bufsize = 1000;
608 : char *buf;
609 : char mac[3][512];
610 : char key[512];
611 : unsigned int maclen, keylen;
612 : size_t macoutlen;
613 40 : gcry_error_t err = GPG_ERR_NO_ERROR;
614 :
615 40 : if (!algoname)
616 : {
617 600 : for (i=1; i < 600; i++)
618 599 : if (in_fips_mode && i == GCRY_MAC_HMAC_MD5)
619 : ; /* Don't use MD5 in fips mode. */
620 599 : else if ( !gcry_mac_test_algo (i) )
621 39 : mac_bench (gcry_mac_algo_name (i));
622 41 : return;
623 : }
624 :
625 39 : buf = buf_base + ((16 - ((size_t)buf_base & 0x0f)) % buffer_alignment);
626 :
627 39 : algo = gcry_mac_map_name (algoname);
628 39 : if (!algo)
629 : {
630 0 : fprintf (stderr, PGM ": invalid hash algorithm `%s'\n", algoname);
631 0 : exit (1);
632 : }
633 :
634 39 : maclen = gcry_mac_get_algo_maclen (algo);
635 39 : if (maclen > sizeof(mac))
636 0 : maclen = sizeof(mac);
637 :
638 39 : keylen = gcry_mac_get_algo_keylen (algo);
639 39 : if (keylen == 0)
640 0 : keylen = 32;
641 39 : if (keylen > sizeof(key))
642 0 : keylen = sizeof(key);
643 1727 : for (i=0; i < keylen; i++)
644 1688 : key[i] = (keylen - i) ^ 0x54;
645 :
646 39 : err = gcry_mac_open (&hd, algo, 0, NULL);
647 39 : if (err)
648 : {
649 0 : fprintf (stderr, PGM ": error opening mac algorithm `%s': %s\n", algoname,
650 : gpg_strerror (err));
651 0 : exit (1);
652 : }
653 :
654 39 : err = gcry_mac_setkey (hd, key, keylen);
655 39 : if (err)
656 : {
657 0 : fprintf (stderr, PGM ": error setting key for mac algorithm `%s': %s\n",
658 : algoname, gpg_strerror (err));
659 0 : exit (1);
660 : }
661 :
662 39039 : for (i=0; i < bufsize; i++)
663 39000 : buf[i] = i;
664 :
665 39 : if (algo >= GCRY_MAC_POLY1305_AES && algo <= GCRY_MAC_POLY1305_SEED)
666 : {
667 : static const char iv[16] = { 1, 2, 3, 4, };
668 5 : err = gcry_mac_setiv(hd, iv, sizeof(iv));
669 5 : if (err)
670 : {
671 0 : fprintf (stderr, PGM ": error setting nonce for mac algorithm `%s': %s\n",
672 : algoname, gpg_strerror (err));
673 0 : exit (1);
674 : }
675 : }
676 :
677 39 : printf ("%-20s", gcry_mac_algo_name (algo));
678 :
679 39 : start_timer ();
680 78 : for (repcount=0; repcount < mac_repetitions; repcount++)
681 39039 : for (i=0; i < 1000; i++)
682 39000 : gcry_mac_write (hd, buf, bufsize);
683 39 : macoutlen = maclen;
684 39 : gcry_mac_read (hd, mac[0], &macoutlen);
685 39 : stop_timer ();
686 39 : printf (" %s", elapsed_time (1));
687 39 : fflush (stdout);
688 :
689 39 : gcry_mac_reset (hd);
690 39 : start_timer ();
691 78 : for (repcount=0; repcount < mac_repetitions; repcount++)
692 39039 : for (i=0; i < 1000; i++)
693 429000 : for (step=bufsize/10, pos=0, j=0; j < 10; j++, pos+=step)
694 390000 : gcry_mac_write (hd, &buf[pos], step);
695 39 : macoutlen = maclen;
696 39 : gcry_mac_read (hd, mac[1], &macoutlen);
697 39 : stop_timer ();
698 39 : printf (" %s", elapsed_time (1));
699 39 : fflush (stdout);
700 :
701 39 : gcry_mac_reset (hd);
702 39 : start_timer ();
703 78 : for (repcount=0; repcount < mac_repetitions; repcount++)
704 39039 : for (i=0; i < 1000; i++)
705 3939000 : for (step=bufsize/100, pos=0, j=0; j < 100; j++, pos+=step)
706 3900000 : gcry_mac_write (hd, &buf[pos], step);
707 39 : macoutlen = maclen;
708 39 : gcry_mac_read (hd, mac[2], &macoutlen);
709 39 : stop_timer ();
710 39 : printf (" %s", elapsed_time (1));
711 39 : fflush (stdout);
712 :
713 39 : gcry_mac_close (hd);
714 :
715 117 : for (i=1; i < 3; i++)
716 : {
717 78 : if (memcmp(mac[i-1], mac[i], maclen))
718 : {
719 0 : fprintf (stderr, PGM ": mac mismatch with algorithm `%s'\n",
720 : algoname);
721 0 : exit(1);
722 : }
723 : }
724 :
725 39 : putchar ('\n');
726 39 : fflush (stdout);
727 : }
728 :
729 :
730 24000 : static void ccm_aead_init(gcry_cipher_hd_t hd, size_t buflen, int authlen)
731 : {
732 24000 : const int _L = 4;
733 24000 : const int noncelen = 15 - _L;
734 24000 : char nonce[noncelen];
735 : u64 params[3];
736 24000 : gcry_error_t err = GPG_ERR_NO_ERROR;
737 :
738 24000 : memset (nonce, 0x33, noncelen);
739 :
740 24000 : err = gcry_cipher_setiv (hd, nonce, noncelen);
741 24000 : if (err)
742 : {
743 0 : fprintf (stderr, "gcry_cipher_setiv failed: %s\n",
744 : gpg_strerror (err));
745 0 : gcry_cipher_close (hd);
746 0 : exit (1);
747 : }
748 :
749 24000 : params[0] = buflen; /* encryptedlen */
750 24000 : params[1] = 0; /* aadlen */
751 24000 : params[2] = authlen; /* authtaglen */
752 24000 : err = gcry_cipher_ctl (hd, GCRYCTL_SET_CCM_LENGTHS, params, sizeof(params));
753 24000 : if (err)
754 : {
755 0 : fprintf (stderr, "gcry_cipher_setiv failed: %s\n",
756 : gpg_strerror (err));
757 0 : gcry_cipher_close (hd);
758 0 : exit (1);
759 : }
760 24000 : }
761 :
762 :
763 : static void
764 25 : cipher_bench ( const char *algoname )
765 : {
766 : static int header_printed;
767 : int algo;
768 : gcry_cipher_hd_t hd;
769 : int i;
770 : int keylen, blklen;
771 : char key[128];
772 : char *outbuf, *buf;
773 : char *raw_outbuf, *raw_buf;
774 : size_t allocated_buflen, buflen;
775 : int repetitions;
776 : static const struct {
777 : int mode;
778 : const char *name;
779 : int blocked;
780 : void (* const aead_init)(gcry_cipher_hd_t hd, size_t buflen, int authlen);
781 : int req_blocksize;
782 : int authlen;
783 : int noncelen;
784 : } modes[] = {
785 : { GCRY_CIPHER_MODE_ECB, " ECB/Stream", 1 },
786 : { GCRY_CIPHER_MODE_CBC, " CBC", 1 },
787 : { GCRY_CIPHER_MODE_CFB, " CFB", 0 },
788 : { GCRY_CIPHER_MODE_OFB, " OFB", 0 },
789 : { GCRY_CIPHER_MODE_CTR, " CTR", 0 },
790 : { GCRY_CIPHER_MODE_CCM, " CCM", 0,
791 : ccm_aead_init, GCRY_CCM_BLOCK_LEN, 8 },
792 : { GCRY_CIPHER_MODE_GCM, " GCM", 0,
793 : NULL, GCRY_GCM_BLOCK_LEN, GCRY_GCM_BLOCK_LEN },
794 : { GCRY_CIPHER_MODE_OCB, " OCB", 1,
795 : NULL, 16, 16, 15 },
796 : { GCRY_CIPHER_MODE_STREAM, "", 0 },
797 : {0}
798 : };
799 : int modeidx;
800 25 : gcry_error_t err = GPG_ERR_NO_ERROR;
801 :
802 :
803 25 : if (!algoname)
804 : {
805 400 : for (i=1; i < 400; i++)
806 399 : if ( !gcry_cipher_test_algo (i) )
807 24 : cipher_bench (gcry_cipher_algo_name (i));
808 26 : return;
809 : }
810 :
811 24 : if (large_buffers)
812 : {
813 0 : allocated_buflen = 1024 * 100;
814 0 : repetitions = 10;
815 : }
816 : else
817 : {
818 24 : allocated_buflen = 1024;
819 24 : repetitions = 1000;
820 : }
821 24 : repetitions *= cipher_repetitions;
822 :
823 24 : raw_buf = gcry_xcalloc (allocated_buflen+15, 1);
824 24 : buf = (raw_buf
825 24 : + ((16 - ((size_t)raw_buf & 0x0f)) % buffer_alignment));
826 24 : outbuf = raw_outbuf = gcry_xmalloc (allocated_buflen+15);
827 24 : outbuf = (raw_outbuf
828 24 : + ((16 - ((size_t)raw_outbuf & 0x0f)) % buffer_alignment));
829 :
830 24 : if (!header_printed)
831 : {
832 1 : if (cipher_repetitions != 1)
833 0 : printf ("Running each test %d times.\n", cipher_repetitions);
834 1 : printf ("%-12s", "");
835 10 : for (modeidx=0; modes[modeidx].mode; modeidx++)
836 9 : if (*modes[modeidx].name)
837 8 : printf (" %-15s", modes[modeidx].name );
838 1 : putchar ('\n');
839 1 : printf ("%-12s", "");
840 10 : for (modeidx=0; modes[modeidx].mode; modeidx++)
841 9 : if (*modes[modeidx].name)
842 8 : printf (" ---------------" );
843 1 : putchar ('\n');
844 1 : header_printed = 1;
845 : }
846 :
847 24 : algo = gcry_cipher_map_name (algoname);
848 24 : if (!algo)
849 : {
850 0 : fprintf (stderr, PGM ": invalid cipher algorithm `%s'\n", algoname);
851 0 : exit (1);
852 : }
853 :
854 24 : keylen = gcry_cipher_get_algo_keylen (algo);
855 24 : if (!keylen)
856 : {
857 0 : fprintf (stderr, PGM ": failed to get key length for algorithm `%s'\n",
858 : algoname);
859 0 : exit (1);
860 : }
861 24 : if ( keylen > sizeof key )
862 : {
863 0 : fprintf (stderr, PGM ": algo %d, keylength problem (%d)\n",
864 : algo, keylen );
865 0 : exit (1);
866 : }
867 549 : for (i=0; i < keylen; i++)
868 525 : key[i] = i + (clock () & 0xff);
869 :
870 24 : blklen = gcry_cipher_get_algo_blklen (algo);
871 24 : if (!blklen)
872 : {
873 0 : fprintf (stderr, PGM ": failed to get block length for algorithm `%s'\n",
874 : algoname);
875 0 : exit (1);
876 : }
877 :
878 24 : printf ("%-12s", gcry_cipher_algo_name (algo));
879 24 : fflush (stdout);
880 :
881 240 : for (modeidx=0; modes[modeidx].mode; modeidx++)
882 : {
883 216 : if ((blklen > 1 && modes[modeidx].mode == GCRY_CIPHER_MODE_STREAM)
884 196 : || (blklen == 1 && modes[modeidx].mode != GCRY_CIPHER_MODE_STREAM))
885 52 : continue;
886 :
887 164 : if (modes[modeidx].req_blocksize > 0
888 60 : && blklen != modes[modeidx].req_blocksize)
889 : {
890 24 : printf (" %7s %7s", "-", "-" );
891 24 : continue;
892 : }
893 :
894 1260 : for (i=0; i < sizeof buf; i++)
895 1120 : buf[i] = i;
896 :
897 140 : err = gcry_cipher_open (&hd, algo, modes[modeidx].mode, 0);
898 140 : if (err)
899 : {
900 0 : fprintf (stderr, PGM ": error opening cipher `%s'\n", algoname);
901 0 : exit (1);
902 : }
903 :
904 140 : if (!cipher_with_keysetup)
905 : {
906 140 : err = gcry_cipher_setkey (hd, key, keylen);
907 140 : if (err)
908 : {
909 0 : fprintf (stderr, "gcry_cipher_setkey failed: %s\n",
910 : gpg_strerror (err));
911 0 : gcry_cipher_close (hd);
912 0 : exit (1);
913 : }
914 : }
915 :
916 140 : buflen = allocated_buflen;
917 140 : if (modes[modeidx].blocked)
918 52 : buflen = (buflen / blklen) * blklen;
919 :
920 140 : start_timer ();
921 140140 : for (i=err=0; !err && i < repetitions; i++)
922 : {
923 140000 : if (cipher_with_keysetup)
924 : {
925 0 : err = gcry_cipher_setkey (hd, key, keylen);
926 0 : if (err)
927 : {
928 0 : fprintf (stderr, "gcry_cipher_setkey failed: %s\n",
929 : gpg_strerror (err));
930 0 : gcry_cipher_close (hd);
931 0 : exit (1);
932 : }
933 : }
934 :
935 140000 : if (modes[modeidx].noncelen)
936 : {
937 : char nonce[100];
938 : size_t noncelen;
939 :
940 12000 : noncelen = modes[modeidx].noncelen;
941 12000 : if (noncelen > sizeof nonce)
942 0 : noncelen = sizeof nonce;
943 12000 : memset (nonce, 42, noncelen);
944 12000 : err = gcry_cipher_setiv (hd, nonce, noncelen);
945 12000 : if (err)
946 : {
947 0 : fprintf (stderr, "gcry_cipher_setiv failed: %s\n",
948 : gpg_strerror (err));
949 0 : gcry_cipher_close (hd);
950 0 : exit (1);
951 : }
952 : }
953 :
954 140000 : if (modes[modeidx].aead_init)
955 : {
956 12000 : (*modes[modeidx].aead_init) (hd, buflen, modes[modeidx].authlen);
957 12000 : gcry_cipher_final (hd);
958 12000 : err = gcry_cipher_encrypt (hd, outbuf, buflen, buf, buflen);
959 12000 : if (err)
960 0 : break;
961 12000 : err = gcry_cipher_gettag (hd, outbuf, modes[modeidx].authlen);
962 : }
963 : else
964 : {
965 128000 : err = gcry_cipher_encrypt (hd, outbuf, buflen, buf, buflen);
966 : }
967 : }
968 140 : stop_timer ();
969 :
970 140 : printf (" %s", elapsed_time (1));
971 140 : fflush (stdout);
972 140 : gcry_cipher_close (hd);
973 140 : if (err)
974 : {
975 0 : fprintf (stderr, "gcry_cipher_encrypt failed: %s\n",
976 : gpg_strerror (err) );
977 0 : exit (1);
978 : }
979 :
980 140 : err = gcry_cipher_open (&hd, algo, modes[modeidx].mode, 0);
981 140 : if (err)
982 : {
983 0 : fprintf (stderr, PGM ": error opening cipher `%s'/n", algoname);
984 0 : exit (1);
985 : }
986 :
987 140 : if (!cipher_with_keysetup)
988 : {
989 140 : err = gcry_cipher_setkey (hd, key, keylen);
990 140 : if (err)
991 : {
992 0 : fprintf (stderr, "gcry_cipher_setkey failed: %s\n",
993 : gpg_strerror (err));
994 0 : gcry_cipher_close (hd);
995 0 : exit (1);
996 : }
997 : }
998 :
999 140 : start_timer ();
1000 140140 : for (i=err=0; !err && i < repetitions; i++)
1001 : {
1002 140000 : if (cipher_with_keysetup)
1003 : {
1004 0 : err = gcry_cipher_setkey (hd, key, keylen);
1005 0 : if (err)
1006 : {
1007 0 : fprintf (stderr, "gcry_cipher_setkey failed: %s\n",
1008 : gpg_strerror (err));
1009 0 : gcry_cipher_close (hd);
1010 0 : exit (1);
1011 : }
1012 : }
1013 :
1014 140000 : if (modes[modeidx].noncelen)
1015 : {
1016 : char nonce[100];
1017 : size_t noncelen;
1018 :
1019 12000 : noncelen = modes[modeidx].noncelen;
1020 12000 : if (noncelen > sizeof nonce)
1021 0 : noncelen = sizeof nonce;
1022 12000 : memset (nonce, 42, noncelen);
1023 12000 : err = gcry_cipher_setiv (hd, nonce, noncelen);
1024 12000 : if (err)
1025 : {
1026 0 : fprintf (stderr, "gcry_cipher_setiv failed: %s\n",
1027 : gpg_strerror (err));
1028 0 : gcry_cipher_close (hd);
1029 0 : exit (1);
1030 : }
1031 : }
1032 :
1033 140000 : if (modes[modeidx].aead_init)
1034 : {
1035 12000 : (*modes[modeidx].aead_init) (hd, buflen, modes[modeidx].authlen);
1036 12000 : gcry_cipher_final (hd);
1037 12000 : err = gcry_cipher_decrypt (hd, outbuf, buflen, buf, buflen);
1038 12000 : if (err)
1039 0 : break;
1040 12000 : err = gcry_cipher_checktag (hd, outbuf, modes[modeidx].authlen);
1041 12000 : if (gpg_err_code (err) == GPG_ERR_CHECKSUM)
1042 12000 : err = 0;
1043 : }
1044 : else
1045 : {
1046 128000 : gcry_cipher_final (hd);
1047 128000 : err = gcry_cipher_decrypt (hd, outbuf, buflen, buf, buflen);
1048 : }
1049 : }
1050 140 : stop_timer ();
1051 140 : printf (" %s", elapsed_time (1));
1052 140 : fflush (stdout);
1053 140 : gcry_cipher_close (hd);
1054 140 : if (err)
1055 : {
1056 0 : fprintf (stderr, "gcry_cipher_decrypt failed: %s\n",
1057 : gpg_strerror (err) );
1058 0 : exit (1);
1059 : }
1060 : }
1061 :
1062 24 : putchar ('\n');
1063 24 : gcry_free (raw_buf);
1064 24 : gcry_free (raw_outbuf);
1065 : }
1066 :
1067 :
1068 :
1069 : static void
1070 1 : rsa_bench (int iterations, int print_header, int no_blinding)
1071 : {
1072 : gpg_error_t err;
1073 1 : int p_sizes[] = { 1024, 2048, 3072, 4096 };
1074 : int testno;
1075 :
1076 1 : if (print_header)
1077 1 : printf ("Algorithm generate %4d*priv %4d*public\n"
1078 : "------------------------------------------------\n",
1079 : iterations, iterations );
1080 5 : for (testno=0; testno < DIM (p_sizes); testno++)
1081 : {
1082 : gcry_sexp_t key_spec, key_pair, pub_key, sec_key;
1083 : gcry_mpi_t x;
1084 : gcry_sexp_t data;
1085 4 : gcry_sexp_t sig = NULL;
1086 : int count;
1087 4 : unsigned nbits = p_sizes[testno];
1088 :
1089 4 : printf ("RSA %3d bit ", nbits);
1090 4 : fflush (stdout);
1091 :
1092 4 : if (in_fips_mode && !(nbits == 2048 || nbits == 3072))
1093 : {
1094 0 : puts ("[skipped in fips mode]");
1095 0 : continue;
1096 : }
1097 :
1098 4 : err = gcry_sexp_build (&key_spec, NULL,
1099 4 : gcry_fips_mode_active ()
1100 : ? "(genkey (RSA (nbits %d)))"
1101 : : "(genkey (RSA (nbits %d)(transient-key)))",
1102 : nbits);
1103 4 : if (err)
1104 0 : die ("creating S-expression failed: %s\n", gcry_strerror (err));
1105 :
1106 4 : start_timer ();
1107 4 : err = gcry_pk_genkey (&key_pair, key_spec);
1108 4 : if (err)
1109 0 : die ("creating %d bit RSA key failed: %s\n",
1110 : nbits, gcry_strerror (err));
1111 :
1112 4 : pub_key = gcry_sexp_find_token (key_pair, "public-key", 0);
1113 4 : if (! pub_key)
1114 0 : die ("public part missing in key\n");
1115 4 : sec_key = gcry_sexp_find_token (key_pair, "private-key", 0);
1116 4 : if (! sec_key)
1117 0 : die ("private part missing in key\n");
1118 4 : gcry_sexp_release (key_pair);
1119 4 : gcry_sexp_release (key_spec);
1120 :
1121 4 : stop_timer ();
1122 4 : printf (" %s", elapsed_time (1));
1123 4 : fflush (stdout);
1124 :
1125 4 : x = gcry_mpi_new (nbits);
1126 4 : gcry_mpi_randomize (x, nbits-8, GCRY_WEAK_RANDOM);
1127 4 : err = gcry_sexp_build (&data, NULL,
1128 : "(data (flags raw) (value %m))", x);
1129 4 : gcry_mpi_release (x);
1130 4 : if (err)
1131 0 : die ("converting data failed: %s\n", gcry_strerror (err));
1132 :
1133 4 : start_timer ();
1134 44 : for (count=0; count < iterations; count++)
1135 : {
1136 40 : gcry_sexp_release (sig);
1137 40 : err = gcry_pk_sign (&sig, data, sec_key);
1138 40 : if (err)
1139 0 : die ("signing failed (%d): %s\n", count, gpg_strerror (err));
1140 : }
1141 4 : stop_timer ();
1142 4 : printf (" %s", elapsed_time (1));
1143 4 : fflush (stdout);
1144 :
1145 4 : start_timer ();
1146 44 : for (count=0; count < iterations; count++)
1147 : {
1148 40 : err = gcry_pk_verify (sig, data, pub_key);
1149 40 : if (err)
1150 : {
1151 0 : putchar ('\n');
1152 0 : show_sexp ("seckey:\n", sec_key);
1153 0 : show_sexp ("data:\n", data);
1154 0 : show_sexp ("sig:\n", sig);
1155 0 : die ("verify failed (%d): %s\n", count, gpg_strerror (err));
1156 : }
1157 : }
1158 4 : stop_timer ();
1159 4 : printf (" %s", elapsed_time (1));
1160 :
1161 4 : if (no_blinding)
1162 : {
1163 0 : fflush (stdout);
1164 0 : x = gcry_mpi_new (nbits);
1165 0 : gcry_mpi_randomize (x, nbits-8, GCRY_WEAK_RANDOM);
1166 0 : err = gcry_sexp_build (&data, NULL,
1167 : "(data (flags no-blinding) (value %m))", x);
1168 0 : gcry_mpi_release (x);
1169 0 : if (err)
1170 0 : die ("converting data failed: %s\n", gcry_strerror (err));
1171 :
1172 0 : start_timer ();
1173 0 : for (count=0; count < iterations; count++)
1174 : {
1175 0 : gcry_sexp_release (sig);
1176 0 : err = gcry_pk_sign (&sig, data, sec_key);
1177 0 : if (err)
1178 0 : die ("signing failed (%d): %s\n", count, gpg_strerror (err));
1179 : }
1180 0 : stop_timer ();
1181 0 : printf (" %s", elapsed_time (1));
1182 0 : fflush (stdout);
1183 : }
1184 :
1185 4 : putchar ('\n');
1186 4 : fflush (stdout);
1187 :
1188 4 : gcry_sexp_release (sig);
1189 4 : gcry_sexp_release (data);
1190 4 : gcry_sexp_release (sec_key);
1191 4 : gcry_sexp_release (pub_key);
1192 : }
1193 1 : }
1194 :
1195 :
1196 : static void
1197 1 : elg_bench (int iterations, int print_header)
1198 : {
1199 : gpg_error_t err;
1200 : gcry_sexp_t pub_key[3], sec_key[3];
1201 1 : int p_sizes[3] = { 1024, 2048, 3072 };
1202 1 : gcry_sexp_t data = NULL;
1203 1 : gcry_sexp_t enc = NULL;
1204 1 : gcry_sexp_t plain = NULL;
1205 : int i, j;
1206 :
1207 1 : err = gcry_sexp_sscan (pub_key+0, NULL, sample_public_elg_key_1024,
1208 : strlen (sample_public_elg_key_1024));
1209 1 : if (!err)
1210 1 : err = gcry_sexp_sscan (sec_key+0, NULL, sample_private_elg_key_1024,
1211 : strlen (sample_private_elg_key_1024));
1212 1 : if (!err)
1213 1 : err = gcry_sexp_sscan (pub_key+1, NULL, sample_public_elg_key_2048,
1214 : strlen (sample_public_elg_key_2048));
1215 1 : if (!err)
1216 1 : err = gcry_sexp_sscan (sec_key+1, NULL, sample_private_elg_key_2048,
1217 : strlen (sample_private_elg_key_2048));
1218 1 : if (!err)
1219 1 : err = gcry_sexp_sscan (pub_key+2, NULL, sample_public_elg_key_3072,
1220 : strlen (sample_public_elg_key_3072));
1221 1 : if (!err)
1222 1 : err = gcry_sexp_sscan (sec_key+2, NULL, sample_private_elg_key_3072,
1223 : strlen (sample_private_elg_key_3072));
1224 1 : if (err)
1225 : {
1226 0 : fprintf (stderr, PGM ": converting sample keys failed: %s\n",
1227 : gcry_strerror (err));
1228 0 : exit (1);
1229 : }
1230 :
1231 1 : if (print_header)
1232 0 : printf ("Algorithm generate %4d*priv %4d*public\n"
1233 : "------------------------------------------------\n",
1234 : iterations, iterations );
1235 4 : for (i=0; i < DIM (p_sizes); i++)
1236 : {
1237 : char timerbuf1[100];
1238 :
1239 : {
1240 3 : gcry_mpi_t x = gcry_mpi_new (p_sizes[i]);
1241 3 : gcry_mpi_randomize (x, p_sizes[i] - 16, GCRY_WEAK_RANDOM);
1242 3 : err = gcry_sexp_build (&data, NULL, "(data (flags raw) (value %m))", x);
1243 3 : gcry_mpi_release (x);
1244 : }
1245 3 : if (err)
1246 : {
1247 0 : fprintf (stderr, PGM ": converting data failed: %s\n",
1248 : gcry_strerror (err));
1249 0 : exit (1);
1250 : }
1251 :
1252 3 : printf ("ELG %d bit -", p_sizes[i]);
1253 3 : fflush (stdout);
1254 :
1255 3 : start_timer ();
1256 33 : for (j=0; j < iterations; j++)
1257 : {
1258 30 : gcry_sexp_release (enc);
1259 30 : err = gcry_pk_encrypt (&enc, data, pub_key[i]);
1260 30 : if (err)
1261 : {
1262 0 : putchar ('\n');
1263 0 : fprintf (stderr, PGM ": encrypt failed: %s\n",
1264 : gpg_strerror (err));
1265 0 : exit (1);
1266 : }
1267 : }
1268 3 : stop_timer ();
1269 3 : snprintf (timerbuf1, sizeof timerbuf1, " %s", elapsed_time (1));
1270 3 : fflush (stdout);
1271 :
1272 3 : start_timer ();
1273 33 : for (j=0; j < iterations; j++)
1274 : {
1275 30 : gcry_sexp_release (plain);
1276 30 : err = gcry_pk_decrypt (&plain, enc, sec_key[i]);
1277 30 : if (err)
1278 : {
1279 0 : putchar ('\n');
1280 0 : fprintf (stderr, PGM ": decrypt failed: %s\n",
1281 : gpg_strerror (err));
1282 0 : exit (1);
1283 : }
1284 : }
1285 3 : stop_timer ();
1286 :
1287 3 : printf (" %s %s\n", elapsed_time (1), timerbuf1);
1288 3 : fflush (stdout);
1289 :
1290 3 : gcry_sexp_release (plain);
1291 3 : plain = NULL;
1292 3 : gcry_sexp_release (enc);
1293 3 : enc = NULL;
1294 3 : gcry_sexp_release (data);
1295 3 : data = NULL;
1296 : }
1297 :
1298 4 : for (i=0; i < DIM (p_sizes); i++)
1299 : {
1300 3 : gcry_sexp_release (sec_key[i]);
1301 3 : gcry_sexp_release (pub_key[i]);
1302 : }
1303 1 : }
1304 :
1305 :
1306 : static void
1307 1 : dsa_bench (int iterations, int print_header)
1308 : {
1309 : gpg_error_t err;
1310 : gcry_sexp_t pub_key[3], sec_key[3];
1311 1 : int p_sizes[3] = { 1024, 2048, 3072 };
1312 1 : int q_sizes[3] = { 160, 224, 256 };
1313 : gcry_sexp_t data;
1314 1 : gcry_sexp_t sig = NULL;
1315 : int i, j;
1316 :
1317 1 : err = gcry_sexp_sscan (pub_key+0, NULL, sample_public_dsa_key_1024,
1318 : strlen (sample_public_dsa_key_1024));
1319 1 : if (!err)
1320 1 : err = gcry_sexp_sscan (sec_key+0, NULL, sample_private_dsa_key_1024,
1321 : strlen (sample_private_dsa_key_1024));
1322 1 : if (!err)
1323 1 : err = gcry_sexp_sscan (pub_key+1, NULL, sample_public_dsa_key_2048,
1324 : strlen (sample_public_dsa_key_2048));
1325 1 : if (!err)
1326 1 : err = gcry_sexp_sscan (sec_key+1, NULL, sample_private_dsa_key_2048,
1327 : strlen (sample_private_dsa_key_2048));
1328 1 : if (!err)
1329 1 : err = gcry_sexp_sscan (pub_key+2, NULL, sample_public_dsa_key_3072,
1330 : strlen (sample_public_dsa_key_3072));
1331 1 : if (!err)
1332 1 : err = gcry_sexp_sscan (sec_key+2, NULL, sample_private_dsa_key_3072,
1333 : strlen (sample_private_dsa_key_3072));
1334 1 : if (err)
1335 : {
1336 0 : fprintf (stderr, PGM ": converting sample keys failed: %s\n",
1337 : gcry_strerror (err));
1338 0 : exit (1);
1339 : }
1340 :
1341 1 : if (print_header)
1342 0 : printf ("Algorithm generate %4d*priv %4d*public\n"
1343 : "------------------------------------------------\n",
1344 : iterations, iterations );
1345 4 : for (i=0; i < DIM (q_sizes); i++)
1346 : {
1347 : gcry_mpi_t x;
1348 :
1349 3 : x = gcry_mpi_new (q_sizes[i]);
1350 3 : gcry_mpi_randomize (x, q_sizes[i], GCRY_WEAK_RANDOM);
1351 3 : err = gcry_sexp_build (&data, NULL, "(data (flags raw) (value %m))", x);
1352 3 : gcry_mpi_release (x);
1353 3 : if (err)
1354 : {
1355 0 : fprintf (stderr, PGM ": converting data failed: %s\n",
1356 : gcry_strerror (err));
1357 0 : exit (1);
1358 : }
1359 :
1360 3 : printf ("DSA %d/%d -", p_sizes[i], q_sizes[i]);
1361 3 : fflush (stdout);
1362 :
1363 3 : start_timer ();
1364 33 : for (j=0; j < iterations; j++)
1365 : {
1366 30 : gcry_sexp_release (sig);
1367 30 : err = gcry_pk_sign (&sig, data, sec_key[i]);
1368 30 : if (err)
1369 : {
1370 0 : putchar ('\n');
1371 0 : fprintf (stderr, PGM ": signing failed: %s\n",
1372 : gpg_strerror (err));
1373 0 : exit (1);
1374 : }
1375 : }
1376 3 : stop_timer ();
1377 3 : printf (" %s", elapsed_time (1));
1378 3 : fflush (stdout);
1379 :
1380 3 : start_timer ();
1381 33 : for (j=0; j < iterations; j++)
1382 : {
1383 30 : err = gcry_pk_verify (sig, data, pub_key[i]);
1384 30 : if (err)
1385 : {
1386 0 : putchar ('\n');
1387 0 : fprintf (stderr, PGM ": verify failed: %s\n",
1388 : gpg_strerror (err));
1389 0 : exit (1);
1390 : }
1391 : }
1392 3 : stop_timer ();
1393 3 : printf (" %s\n", elapsed_time (1));
1394 3 : fflush (stdout);
1395 :
1396 3 : gcry_sexp_release (sig);
1397 3 : gcry_sexp_release (data);
1398 3 : sig = NULL;
1399 : }
1400 :
1401 :
1402 4 : for (i=0; i < DIM (q_sizes); i++)
1403 : {
1404 3 : gcry_sexp_release (sec_key[i]);
1405 3 : gcry_sexp_release (pub_key[i]);
1406 : }
1407 1 : }
1408 :
1409 :
1410 : static void
1411 1 : ecc_bench (int iterations, int print_header)
1412 : {
1413 : #if USE_ECC
1414 : gpg_error_t err;
1415 1 : const char *p_sizes[] = { "192", "224", "256", "384", "521", "Ed25519",
1416 : "gost256", "gost512" };
1417 : int testno;
1418 :
1419 1 : if (print_header)
1420 0 : printf ("Algorithm generate %4d*priv %4d*public\n"
1421 : "------------------------------------------------\n",
1422 : iterations, iterations );
1423 9 : for (testno=0; testno < DIM (p_sizes); testno++)
1424 : {
1425 : gcry_sexp_t key_spec, key_pair, pub_key, sec_key;
1426 : gcry_mpi_t x;
1427 : gcry_sexp_t data;
1428 8 : gcry_sexp_t sig = NULL;
1429 : int count;
1430 : int p_size;
1431 : int is_ed25519;
1432 : int is_gost;
1433 :
1434 8 : is_ed25519 = !strcmp (p_sizes[testno], "Ed25519");
1435 8 : is_gost = !strncmp (p_sizes[testno], "gost", 4);
1436 :
1437 : /* Only P-{224,256,384,521} are allowed in fips mode */
1438 8 : if (gcry_fips_mode_active()
1439 0 : && (is_ed25519 || is_gost || !strcmp (p_sizes[testno], "192")))
1440 0 : continue;
1441 :
1442 8 : if (is_ed25519)
1443 : {
1444 1 : p_size = 256;
1445 1 : printf ("EdDSA Ed25519 ");
1446 1 : fflush (stdout);
1447 : }
1448 7 : else if (is_gost)
1449 : {
1450 2 : p_size = atoi (p_sizes[testno] + 4);
1451 2 : printf ("GOST %3d bit ", p_size);
1452 2 : fflush (stdout);
1453 : }
1454 : else
1455 : {
1456 5 : p_size = atoi (p_sizes[testno]);
1457 5 : printf ("ECDSA %3d bit ", p_size);
1458 : }
1459 8 : fflush (stdout);
1460 :
1461 8 : if (is_ed25519)
1462 1 : err = gcry_sexp_build (&key_spec, NULL,
1463 : "(genkey (ecdsa (curve \"Ed25519\")"
1464 : "(flags eddsa)))");
1465 7 : else if (is_gost)
1466 2 : err = gcry_sexp_build (&key_spec, NULL,
1467 : "(genkey (ecdsa (curve %s)))",
1468 : p_size == 256 ? "GOST2001-test" : "GOST2012-test");
1469 : else
1470 5 : err = gcry_sexp_build (&key_spec, NULL,
1471 : "(genkey (ECDSA (nbits %d)))", p_size);
1472 8 : if (err)
1473 0 : die ("creating S-expression failed: %s\n", gcry_strerror (err));
1474 :
1475 8 : start_timer ();
1476 8 : err = gcry_pk_genkey (&key_pair, key_spec);
1477 8 : if (err)
1478 0 : die ("creating %d bit ECC key failed: %s\n",
1479 : p_size, gcry_strerror (err));
1480 8 : if (verbose > 2)
1481 0 : show_sexp ("ECC key:\n", key_pair);
1482 :
1483 8 : pub_key = gcry_sexp_find_token (key_pair, "public-key", 0);
1484 8 : if (! pub_key)
1485 0 : die ("public part missing in key\n");
1486 8 : sec_key = gcry_sexp_find_token (key_pair, "private-key", 0);
1487 8 : if (! sec_key)
1488 0 : die ("private part missing in key\n");
1489 8 : gcry_sexp_release (key_pair);
1490 8 : gcry_sexp_release (key_spec);
1491 :
1492 8 : stop_timer ();
1493 8 : printf (" %s", elapsed_time (1));
1494 8 : fflush (stdout);
1495 :
1496 8 : x = gcry_mpi_new (p_size);
1497 8 : gcry_mpi_randomize (x, p_size, GCRY_WEAK_RANDOM);
1498 8 : if (is_ed25519)
1499 1 : err = gcry_sexp_build (&data, NULL,
1500 : "(data (flags eddsa)(hash-algo sha512)"
1501 : " (value %m))", x);
1502 7 : else if (is_gost)
1503 2 : err = gcry_sexp_build (&data, NULL, "(data (flags gost) (value %m))", x);
1504 : else
1505 5 : err = gcry_sexp_build (&data, NULL, "(data (flags raw) (value %m))", x);
1506 8 : gcry_mpi_release (x);
1507 :
1508 8 : if (err)
1509 0 : die ("converting data failed: %s\n", gcry_strerror (err));
1510 :
1511 8 : start_timer ();
1512 88 : for (count=0; count < iterations; count++)
1513 : {
1514 80 : gcry_sexp_release (sig);
1515 80 : err = gcry_pk_sign (&sig, data, sec_key);
1516 80 : if (err)
1517 : {
1518 0 : if (verbose)
1519 : {
1520 0 : putc ('\n', stderr);
1521 0 : show_sexp ("signing key:\n", sec_key);
1522 0 : show_sexp ("signed data:\n", data);
1523 : }
1524 0 : die ("signing failed: %s\n", gpg_strerror (err));
1525 : }
1526 : }
1527 8 : stop_timer ();
1528 8 : printf (" %s", elapsed_time (1));
1529 8 : fflush (stdout);
1530 :
1531 8 : start_timer ();
1532 88 : for (count=0; count < iterations; count++)
1533 : {
1534 80 : err = gcry_pk_verify (sig, data, pub_key);
1535 80 : if (err)
1536 : {
1537 0 : putchar ('\n');
1538 0 : show_sexp ("seckey:\n", sec_key);
1539 0 : show_sexp ("data:\n", data);
1540 0 : show_sexp ("sig:\n", sig);
1541 0 : die ("verify failed: %s\n", gpg_strerror (err));
1542 : }
1543 : }
1544 8 : stop_timer ();
1545 8 : printf (" %s\n", elapsed_time (1));
1546 8 : fflush (stdout);
1547 :
1548 8 : gcry_sexp_release (sig);
1549 8 : gcry_sexp_release (data);
1550 8 : gcry_sexp_release (sec_key);
1551 8 : gcry_sexp_release (pub_key);
1552 : }
1553 : #endif /*USE_ECC*/
1554 1 : }
1555 :
1556 :
1557 :
1558 : static void
1559 3 : do_powm ( const char *n_str, const char *e_str, const char *m_str)
1560 : {
1561 : gcry_mpi_t e, n, msg, cip;
1562 : gcry_error_t err;
1563 : int i;
1564 :
1565 3 : err = gcry_mpi_scan (&n, GCRYMPI_FMT_HEX, n_str, 0, 0);
1566 3 : if (err) BUG ();
1567 3 : err = gcry_mpi_scan (&e, GCRYMPI_FMT_HEX, e_str, 0, 0);
1568 3 : if (err) BUG ();
1569 3 : err = gcry_mpi_scan (&msg, GCRYMPI_FMT_HEX, m_str, 0, 0);
1570 3 : if (err) BUG ();
1571 :
1572 3 : cip = gcry_mpi_new (0);
1573 :
1574 3 : start_timer ();
1575 3003 : for (i=0; i < 1000; i++)
1576 3000 : gcry_mpi_powm (cip, msg, e, n);
1577 3 : stop_timer ();
1578 3 : printf (" %s", elapsed_time (1)); fflush (stdout);
1579 : /* { */
1580 : /* char *buf; */
1581 :
1582 : /* if (gcry_mpi_aprint (GCRYMPI_FMT_HEX, (void**)&buf, NULL, cip)) */
1583 : /* BUG (); */
1584 : /* printf ("result: %s\n", buf); */
1585 : /* gcry_free (buf); */
1586 : /* } */
1587 3 : gcry_mpi_release (cip);
1588 3 : gcry_mpi_release (msg);
1589 3 : gcry_mpi_release (n);
1590 3 : gcry_mpi_release (e);
1591 3 : }
1592 :
1593 :
1594 : static void
1595 1 : mpi_bench (void)
1596 : {
1597 1 : printf ("%-10s", "powm"); fflush (stdout);
1598 :
1599 1 : do_powm (
1600 : "20A94417D4D5EF2B2DA99165C7DC87DADB3979B72961AF90D09D59BA24CB9A10166FDCCC9C659F2B9626EC23F3FA425F564A072BA941B03FA81767CC289E4",
1601 : "29",
1602 : "B870187A323F1ECD5B8A0B4249507335A1C4CE8394F38FD76B08C78A42C58F6EA136ACF90DFE8603697B1694A3D81114D6117AC1811979C51C4DD013D52F8"
1603 : );
1604 1 : do_powm (
1605 : "20A94417D4D5EF2B2DA99165C7DC87DADB3979B72961AF90D09D59BA24CB9A10166FDCCC9C659F2B9626EC23F3FA425F564A072BA941B03FA81767CC289E41071F0246879A442658FBD18C1771571E7073EEEB2160BA0CBFB3404D627069A6CFBD53867AD2D9D40231648000787B5C84176B4336144644AE71A403CA40716",
1606 : "29",
1607 : "B870187A323F1ECD5B8A0B4249507335A1C4CE8394F38FD76B08C78A42C58F6EA136ACF90DFE8603697B1694A3D81114D6117AC1811979C51C4DD013D52F8FC4EE4BB446B83E48ABED7DB81CBF5E81DE4759E8D68AC985846D999F96B0D8A80E5C69D272C766AB8A23B40D50A4FA889FBC2BD2624222D8EB297F4BAEF8593847"
1608 : );
1609 1 : do_powm (
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
1611 : "29",
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
1613 : );
1614 :
1615 1 : putchar ('\n');
1616 :
1617 :
1618 1 : }
1619 :
1620 :
1621 : static void
1622 0 : prime_bench (void)
1623 : {
1624 : gpg_error_t err;
1625 : int i;
1626 : gcry_mpi_t prime;
1627 0 : int old_prog = single_char_progress;
1628 :
1629 0 : single_char_progress = 1;
1630 0 : if (!with_progress)
1631 0 : printf ("%-10s", "prime");
1632 0 : fflush (stdout);
1633 0 : start_timer ();
1634 0 : for (i=0; i < 10; i++)
1635 : {
1636 0 : if (with_progress)
1637 0 : fputs ("primegen ", stdout);
1638 0 : err = gcry_prime_generate (&prime,
1639 : 1024, 0,
1640 : NULL,
1641 : NULL, NULL,
1642 : GCRY_WEAK_RANDOM,
1643 : GCRY_PRIME_FLAG_SECRET);
1644 0 : if (with_progress)
1645 : {
1646 0 : fputc ('\n', stdout);
1647 0 : fflush (stdout);
1648 : }
1649 0 : if (err)
1650 : {
1651 0 : fprintf (stderr, PGM ": error creating prime: %s\n",
1652 : gpg_strerror (err));
1653 0 : exit (1);
1654 : }
1655 0 : gcry_mpi_release (prime);
1656 : }
1657 0 : stop_timer ();
1658 0 : if (with_progress)
1659 0 : printf ("%-10s", "prime");
1660 0 : printf (" %s\n", elapsed_time (1)); fflush (stdout);
1661 :
1662 0 : single_char_progress = old_prog;
1663 0 : }
1664 :
1665 :
1666 : int
1667 1 : main( int argc, char **argv )
1668 : {
1669 1 : int last_argc = -1;
1670 1 : int no_blinding = 0;
1671 1 : int use_random_daemon = 0;
1672 1 : int use_secmem = 0;
1673 1 : int debug = 0;
1674 1 : int pk_count = 100;
1675 :
1676 1 : buffer_alignment = 1;
1677 :
1678 1 : if (argc)
1679 1 : { argc--; argv++; }
1680 :
1681 : /* We skip this test if we are running under the test suite (no args
1682 : and srcdir defined) and GCRYPT_NO_BENCHMARKS is set. */
1683 1 : if (!argc && getenv ("srcdir") && getenv ("GCRYPT_NO_BENCHMARKS"))
1684 0 : exit (77);
1685 :
1686 1 : if (getenv ("GCRYPT_IN_REGRESSION_TEST"))
1687 : {
1688 1 : in_regression_test = 1;
1689 1 : pk_count = 10;
1690 : }
1691 :
1692 2 : while (argc && last_argc != argc )
1693 : {
1694 0 : last_argc = argc;
1695 0 : if (!strcmp (*argv, "--"))
1696 : {
1697 0 : argc--; argv++;
1698 0 : break;
1699 : }
1700 0 : else if (!strcmp (*argv, "--help"))
1701 : {
1702 0 : fputs ("usage: benchmark "
1703 : "[md|mac|cipher|random|mpi|rsa|dsa|ecc|prime [algonames]]\n",
1704 : stdout);
1705 0 : exit (0);
1706 : }
1707 0 : else if (!strcmp (*argv, "--verbose"))
1708 : {
1709 0 : verbose++;
1710 0 : argc--; argv++;
1711 : }
1712 0 : else if (!strcmp (*argv, "--debug"))
1713 : {
1714 0 : verbose += 2;
1715 0 : debug++;
1716 0 : argc--; argv++;
1717 : }
1718 0 : else if (!strcmp (*argv, "--use-random-daemon"))
1719 : {
1720 0 : use_random_daemon = 1;
1721 0 : argc--; argv++;
1722 : }
1723 0 : else if (!strcmp (*argv, "--use-secmem"))
1724 : {
1725 0 : use_secmem = 1;
1726 0 : argc--; argv++;
1727 : }
1728 0 : else if (!strcmp (*argv, "--prefer-standard-rng"))
1729 : {
1730 : /* This is anyway the default, but we may want to use it for
1731 : debugging. */
1732 0 : gcry_control (GCRYCTL_SET_PREFERRED_RNG_TYPE, GCRY_RNG_TYPE_STANDARD);
1733 0 : argc--; argv++;
1734 : }
1735 0 : else if (!strcmp (*argv, "--prefer-fips-rng"))
1736 : {
1737 0 : gcry_control (GCRYCTL_SET_PREFERRED_RNG_TYPE, GCRY_RNG_TYPE_FIPS);
1738 0 : argc--; argv++;
1739 : }
1740 0 : else if (!strcmp (*argv, "--prefer-system-rng"))
1741 : {
1742 0 : gcry_control (GCRYCTL_SET_PREFERRED_RNG_TYPE, GCRY_RNG_TYPE_SYSTEM);
1743 0 : argc--; argv++;
1744 : }
1745 0 : else if (!strcmp (*argv, "--no-blinding"))
1746 : {
1747 0 : no_blinding = 1;
1748 0 : argc--; argv++;
1749 : }
1750 0 : else if (!strcmp (*argv, "--large-buffers"))
1751 : {
1752 0 : large_buffers = 1;
1753 0 : argc--; argv++;
1754 : }
1755 0 : else if (!strcmp (*argv, "--cipher-repetitions"))
1756 : {
1757 0 : argc--; argv++;
1758 0 : if (argc)
1759 : {
1760 0 : cipher_repetitions = atoi(*argv);
1761 0 : argc--; argv++;
1762 : }
1763 : }
1764 0 : else if (!strcmp (*argv, "--cipher-with-keysetup"))
1765 : {
1766 0 : cipher_with_keysetup = 1;
1767 0 : argc--; argv++;
1768 : }
1769 0 : else if (!strcmp (*argv, "--hash-repetitions"))
1770 : {
1771 0 : argc--; argv++;
1772 0 : if (argc)
1773 : {
1774 0 : hash_repetitions = atoi(*argv);
1775 0 : argc--; argv++;
1776 : }
1777 : }
1778 0 : else if (!strcmp (*argv, "--mac-repetitions"))
1779 : {
1780 0 : argc--; argv++;
1781 0 : if (argc)
1782 : {
1783 0 : mac_repetitions = atoi(*argv);
1784 0 : argc--; argv++;
1785 : }
1786 : }
1787 0 : else if (!strcmp (*argv, "--pk-count"))
1788 : {
1789 0 : argc--; argv++;
1790 0 : if (argc)
1791 : {
1792 0 : pk_count = atoi(*argv);
1793 0 : argc--; argv++;
1794 : }
1795 : }
1796 0 : else if (!strcmp (*argv, "--alignment"))
1797 : {
1798 0 : argc--; argv++;
1799 0 : if (argc)
1800 : {
1801 0 : buffer_alignment = atoi(*argv);
1802 0 : argc--; argv++;
1803 : }
1804 : }
1805 0 : else if (!strcmp (*argv, "--disable-hwf"))
1806 : {
1807 0 : argc--; argv++;
1808 0 : if (argc)
1809 : {
1810 0 : if (gcry_control (GCRYCTL_DISABLE_HWF, *argv, NULL))
1811 0 : fprintf (stderr, PGM ": unknown hardware feature `%s'"
1812 : " - option ignored\n", *argv);
1813 0 : argc--; argv++;
1814 : }
1815 : }
1816 0 : else if (!strcmp (*argv, "--fips"))
1817 : {
1818 0 : argc--; argv++;
1819 : /* This command needs to be called before gcry_check_version. */
1820 0 : gcry_control (GCRYCTL_FORCE_FIPS_MODE, 0);
1821 : }
1822 0 : else if (!strcmp (*argv, "--progress"))
1823 : {
1824 0 : argc--; argv++;
1825 0 : with_progress = 1;
1826 : }
1827 : }
1828 :
1829 1 : if (buffer_alignment < 1 || buffer_alignment > 16)
1830 0 : die ("value for --alignment must be in the range 1 to 16\n");
1831 :
1832 1 : gcry_control (GCRYCTL_SET_VERBOSITY, (int)verbose);
1833 :
1834 1 : if (!gcry_check_version (GCRYPT_VERSION))
1835 : {
1836 0 : fprintf (stderr, PGM ": version mismatch; pgm=%s, library=%s\n",
1837 : GCRYPT_VERSION, gcry_check_version (NULL));
1838 0 : exit (1);
1839 : }
1840 :
1841 1 : if (debug)
1842 0 : gcry_control (GCRYCTL_SET_DEBUG_FLAGS, 1u , 0);
1843 :
1844 1 : if (gcry_fips_mode_active ())
1845 0 : in_fips_mode = 1;
1846 1 : else if (!use_secmem)
1847 1 : gcry_control (GCRYCTL_DISABLE_SECMEM, 0);
1848 :
1849 1 : if (use_random_daemon)
1850 0 : gcry_control (GCRYCTL_USE_RANDOM_DAEMON, 1);
1851 :
1852 1 : if (with_progress)
1853 0 : gcry_set_progress_handler (progress_cb, NULL);
1854 :
1855 1 : gcry_control (GCRYCTL_INITIALIZATION_FINISHED, 0);
1856 :
1857 1 : if (cipher_repetitions < 1)
1858 1 : cipher_repetitions = 1;
1859 1 : if (hash_repetitions < 1)
1860 1 : hash_repetitions = 1;
1861 1 : if (mac_repetitions < 1)
1862 1 : mac_repetitions = 1;
1863 :
1864 1 : if (in_regression_test)
1865 1 : fputs ("Note: " PGM " running in quick regression test mode.\n", stdout);
1866 :
1867 1 : if ( !argc )
1868 : {
1869 1 : gcry_control (GCRYCTL_ENABLE_QUICK_RANDOM, 0);
1870 1 : md_bench (NULL);
1871 1 : putchar ('\n');
1872 1 : mac_bench (NULL);
1873 1 : putchar ('\n');
1874 1 : cipher_bench (NULL);
1875 1 : putchar ('\n');
1876 1 : rsa_bench (pk_count, 1, no_blinding);
1877 1 : elg_bench (pk_count, 0);
1878 1 : dsa_bench (pk_count, 0);
1879 1 : ecc_bench (pk_count, 0);
1880 1 : putchar ('\n');
1881 1 : mpi_bench ();
1882 1 : putchar ('\n');
1883 1 : random_bench (0);
1884 : }
1885 0 : else if ( !strcmp (*argv, "random") || !strcmp (*argv, "strongrandom"))
1886 : {
1887 0 : if (argc == 1)
1888 0 : random_bench ((**argv == 's'));
1889 0 : else if (argc == 2)
1890 : {
1891 0 : gcry_control (GCRYCTL_SET_RANDOM_SEED_FILE, argv[1]);
1892 0 : random_bench ((**argv == 's'));
1893 0 : gcry_control (GCRYCTL_UPDATE_RANDOM_SEED_FILE);
1894 : }
1895 : else
1896 0 : fputs ("usage: benchmark [strong]random [seedfile]\n", stdout);
1897 : }
1898 0 : else if ( !strcmp (*argv, "md"))
1899 : {
1900 0 : if (argc == 1)
1901 0 : md_bench (NULL);
1902 : else
1903 0 : for (argc--, argv++; argc; argc--, argv++)
1904 0 : md_bench ( *argv );
1905 : }
1906 0 : else if ( !strcmp (*argv, "mac"))
1907 : {
1908 0 : if (argc == 1)
1909 0 : mac_bench (NULL);
1910 : else
1911 0 : for (argc--, argv++; argc; argc--, argv++)
1912 0 : mac_bench ( *argv );
1913 : }
1914 0 : else if ( !strcmp (*argv, "cipher"))
1915 : {
1916 0 : if (argc == 1)
1917 0 : cipher_bench (NULL);
1918 : else
1919 0 : for (argc--, argv++; argc; argc--, argv++)
1920 0 : cipher_bench ( *argv );
1921 : }
1922 0 : else if ( !strcmp (*argv, "mpi"))
1923 : {
1924 0 : mpi_bench ();
1925 : }
1926 0 : else if ( !strcmp (*argv, "pubkey"))
1927 : {
1928 0 : gcry_control (GCRYCTL_ENABLE_QUICK_RANDOM, 0);
1929 0 : rsa_bench (pk_count, 1, no_blinding);
1930 0 : elg_bench (pk_count, 0);
1931 0 : dsa_bench (pk_count, 0);
1932 0 : ecc_bench (pk_count, 0);
1933 : }
1934 0 : else if ( !strcmp (*argv, "rsa"))
1935 : {
1936 0 : gcry_control (GCRYCTL_ENABLE_QUICK_RANDOM, 0);
1937 0 : rsa_bench (pk_count, 1, no_blinding);
1938 : }
1939 0 : else if ( !strcmp (*argv, "elg"))
1940 : {
1941 0 : gcry_control (GCRYCTL_ENABLE_QUICK_RANDOM, 0);
1942 0 : elg_bench (pk_count, 1);
1943 : }
1944 0 : else if ( !strcmp (*argv, "dsa"))
1945 : {
1946 0 : gcry_control (GCRYCTL_ENABLE_QUICK_RANDOM, 0);
1947 0 : dsa_bench (pk_count, 1);
1948 : }
1949 0 : else if ( !strcmp (*argv, "ecc"))
1950 : {
1951 0 : gcry_control (GCRYCTL_ENABLE_QUICK_RANDOM, 0);
1952 0 : ecc_bench (pk_count, 1);
1953 : }
1954 0 : else if ( !strcmp (*argv, "prime"))
1955 : {
1956 0 : gcry_control (GCRYCTL_ENABLE_QUICK_RANDOM, 0);
1957 0 : prime_bench ();
1958 : }
1959 : else
1960 : {
1961 0 : fprintf (stderr, PGM ": bad arguments\n");
1962 0 : return 1;
1963 : }
1964 :
1965 :
1966 1 : if (in_fips_mode && !gcry_fips_mode_active ())
1967 0 : fprintf (stderr, PGM ": FIPS mode is not anymore active\n");
1968 :
1969 1 : return 0;
1970 : }
|