mirror of
https://github.com/FFmpeg/FFmpeg.git
synced 2024-11-26 19:01:44 +02:00
790f793844
There are lots of files that don't need it: The number of object files that actually need it went down from 2011 to 884 here. Keep it for external users in order to not cause breakages. Also improve the other headers a bit while just at it. Signed-off-by: Andreas Rheinhardt <andreas.rheinhardt@outlook.com>
722 lines
25 KiB
C
722 lines
25 KiB
C
/*
|
|
* Copyright (c) 2013 Nicolas George
|
|
*
|
|
* This file is part of FFmpeg.
|
|
*
|
|
* FFmpeg is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public License
|
|
* as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* FFmpeg is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public License
|
|
* along with FFmpeg; if not, write to the Free Software Foundation, Inc.,
|
|
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
|
|
*/
|
|
|
|
/* Optional external libraries; can be enabled using:
|
|
* make VERSUS=crypto+gcrypt+tomcrypt+mbedcrypto tools/crypto_bench */
|
|
#define USE_crypto 0x01 /* OpenSSL's libcrypto */
|
|
#define USE_gcrypt 0x02 /* GnuTLS's libgcrypt */
|
|
#define USE_tomcrypt 0x04 /* LibTomCrypt */
|
|
#define USE_mbedcrypto 0x08 /* mbed TLS */
|
|
|
|
#include <stdlib.h>
|
|
#include <math.h>
|
|
|
|
#include "libavutil/avutil.h"
|
|
#include "libavutil/avstring.h"
|
|
#include "libavutil/crc.h"
|
|
#include "libavutil/intreadwrite.h"
|
|
#include "libavutil/mem.h"
|
|
#include "libavutil/timer.h"
|
|
|
|
#ifndef AV_READ_TIME
|
|
#define AV_READ_TIME(x) 0
|
|
#endif
|
|
|
|
#if HAVE_UNISTD_H
|
|
#include <unistd.h> /* for getopt */
|
|
#endif
|
|
#if !HAVE_GETOPT
|
|
#include "compat/getopt.c"
|
|
#endif
|
|
|
|
#define MAX_INPUT_SIZE 1048576
|
|
#define MAX_OUTPUT_SIZE 128
|
|
|
|
static const char *enabled_libs;
|
|
static const char *enabled_algos;
|
|
static unsigned specified_runs;
|
|
|
|
static const uint8_t *hardcoded_key = "FFmpeg is the best program ever.";
|
|
|
|
static void fatal_error(const char *tag)
|
|
{
|
|
av_log(NULL, AV_LOG_ERROR, "Fatal error: %s\n", tag);
|
|
exit(1);
|
|
}
|
|
|
|
struct hash_impl {
|
|
const char *lib;
|
|
const char *name;
|
|
void (*run)(uint8_t *output, const uint8_t *input, unsigned size);
|
|
const char *output;
|
|
};
|
|
|
|
/***************************************************************************
|
|
* lavu: libavutil
|
|
***************************************************************************/
|
|
|
|
#include "libavutil/md5.h"
|
|
#include "libavutil/sha.h"
|
|
#include "libavutil/sha512.h"
|
|
#include "libavutil/ripemd.h"
|
|
#include "libavutil/aes.h"
|
|
#include "libavutil/blowfish.h"
|
|
#include "libavutil/camellia.h"
|
|
#include "libavutil/cast5.h"
|
|
#include "libavutil/des.h"
|
|
#include "libavutil/twofish.h"
|
|
#include "libavutil/rc4.h"
|
|
#include "libavutil/xtea.h"
|
|
|
|
#define IMPL_USE_lavu IMPL_USE
|
|
|
|
static void run_lavu_md5(uint8_t *output,
|
|
const uint8_t *input, unsigned size)
|
|
{
|
|
av_md5_sum(output, input, size);
|
|
}
|
|
|
|
#define DEFINE_LAVU_MD(suffix, type, namespace, hsize) \
|
|
static void run_lavu_ ## suffix(uint8_t *output, \
|
|
const uint8_t *input, unsigned size) \
|
|
{ \
|
|
static struct type *h; \
|
|
if (!h && !(h = av_ ## namespace ## _alloc())) \
|
|
fatal_error("out of memory"); \
|
|
av_ ## namespace ## _init(h, hsize); \
|
|
av_ ## namespace ## _update(h, input, size); \
|
|
av_ ## namespace ## _final(h, output); \
|
|
}
|
|
|
|
DEFINE_LAVU_MD(sha1, AVSHA, sha, 160);
|
|
DEFINE_LAVU_MD(sha256, AVSHA, sha, 256);
|
|
DEFINE_LAVU_MD(sha512, AVSHA512, sha512, 512);
|
|
DEFINE_LAVU_MD(ripemd128, AVRIPEMD, ripemd, 128);
|
|
DEFINE_LAVU_MD(ripemd160, AVRIPEMD, ripemd, 160);
|
|
|
|
static void run_lavu_aes128(uint8_t *output,
|
|
const uint8_t *input, unsigned size)
|
|
{
|
|
static struct AVAES *aes;
|
|
if (!aes && !(aes = av_aes_alloc()))
|
|
fatal_error("out of memory");
|
|
av_aes_init(aes, hardcoded_key, 128, 0);
|
|
av_aes_crypt(aes, output, input, size >> 4, NULL, 0);
|
|
}
|
|
|
|
static void run_lavu_blowfish(uint8_t *output,
|
|
const uint8_t *input, unsigned size)
|
|
{
|
|
static struct AVBlowfish *blowfish;
|
|
if (!blowfish && !(blowfish = av_blowfish_alloc()))
|
|
fatal_error("out of memory");
|
|
av_blowfish_init(blowfish, hardcoded_key, 16);
|
|
av_blowfish_crypt(blowfish, output, input, size >> 3, NULL, 0);
|
|
}
|
|
|
|
static void run_lavu_camellia(uint8_t *output,
|
|
const uint8_t *input, unsigned size)
|
|
{
|
|
static struct AVCAMELLIA *camellia;
|
|
if (!camellia && !(camellia = av_camellia_alloc()))
|
|
fatal_error("out of memory");
|
|
av_camellia_init(camellia, hardcoded_key, 128);
|
|
av_camellia_crypt(camellia, output, input, size >> 4, NULL, 0);
|
|
}
|
|
|
|
static void run_lavu_cast128(uint8_t *output,
|
|
const uint8_t *input, unsigned size)
|
|
{
|
|
static struct AVCAST5 *cast;
|
|
if (!cast && !(cast = av_cast5_alloc()))
|
|
fatal_error("out of memory");
|
|
av_cast5_init(cast, hardcoded_key, 128);
|
|
av_cast5_crypt(cast, output, input, size >> 3, 0);
|
|
}
|
|
|
|
static void run_lavu_des(uint8_t *output,
|
|
const uint8_t *input, unsigned size)
|
|
{
|
|
static struct AVDES *des;
|
|
if (!des && !(des = av_des_alloc()))
|
|
fatal_error("out of memory");
|
|
av_des_init(des, hardcoded_key, 64, 0);
|
|
av_des_crypt(des, output, input, size >> 3, NULL, 0);
|
|
}
|
|
|
|
static void run_lavu_twofish(uint8_t *output,
|
|
const uint8_t *input, unsigned size)
|
|
{
|
|
static struct AVTWOFISH *twofish;
|
|
if (!twofish && !(twofish = av_twofish_alloc()))
|
|
fatal_error("out of memory");
|
|
av_twofish_init(twofish, hardcoded_key, 128);
|
|
av_twofish_crypt(twofish, output, input, size >> 4, NULL, 0);
|
|
}
|
|
|
|
static void run_lavu_rc4(uint8_t *output,
|
|
const uint8_t *input, unsigned size)
|
|
{
|
|
static struct AVRC4 *rc4;
|
|
if (!rc4 && !(rc4 = av_rc4_alloc()))
|
|
fatal_error("out of memory");
|
|
av_rc4_init(rc4, hardcoded_key, 128, 0);
|
|
av_rc4_crypt(rc4, output, input, size, NULL, 0);
|
|
}
|
|
|
|
static void run_lavu_xtea(uint8_t *output,
|
|
const uint8_t *input, unsigned size)
|
|
{
|
|
static struct AVXTEA *xtea;
|
|
if (!xtea && !(xtea = av_xtea_alloc()))
|
|
fatal_error("out of memory");
|
|
av_xtea_init(xtea, hardcoded_key);
|
|
av_xtea_crypt(xtea, output, input, size >> 3, NULL, 0);
|
|
}
|
|
|
|
/***************************************************************************
|
|
* crypto: OpenSSL's libcrypto
|
|
***************************************************************************/
|
|
|
|
#if (USE_EXT_LIBS) & USE_crypto
|
|
|
|
#define OPENSSL_DISABLE_OLD_DES_SUPPORT
|
|
#include <openssl/md5.h>
|
|
#include <openssl/sha.h>
|
|
#include <openssl/ripemd.h>
|
|
#include <openssl/aes.h>
|
|
#include <openssl/blowfish.h>
|
|
#include <openssl/camellia.h>
|
|
#include <openssl/cast.h>
|
|
#include <openssl/des.h>
|
|
#include <openssl/rc4.h>
|
|
|
|
#define DEFINE_CRYPTO_WRAPPER(suffix, function) \
|
|
static void run_crypto_ ## suffix(uint8_t *output, \
|
|
const uint8_t *input, unsigned size) \
|
|
{ \
|
|
function(input, size, output); \
|
|
}
|
|
|
|
DEFINE_CRYPTO_WRAPPER(md5, MD5)
|
|
DEFINE_CRYPTO_WRAPPER(sha1, SHA1)
|
|
DEFINE_CRYPTO_WRAPPER(sha256, SHA256)
|
|
DEFINE_CRYPTO_WRAPPER(sha512, SHA512)
|
|
DEFINE_CRYPTO_WRAPPER(ripemd160, RIPEMD160)
|
|
|
|
static void run_crypto_aes128(uint8_t *output,
|
|
const uint8_t *input, unsigned size)
|
|
{
|
|
AES_KEY aes;
|
|
unsigned i;
|
|
|
|
AES_set_encrypt_key(hardcoded_key, 128, &aes);
|
|
size -= 15;
|
|
for (i = 0; i < size; i += 16)
|
|
AES_encrypt(input + i, output + i, &aes);
|
|
}
|
|
|
|
static void run_crypto_blowfish(uint8_t *output,
|
|
const uint8_t *input, unsigned size)
|
|
{
|
|
BF_KEY blowfish;
|
|
unsigned i;
|
|
|
|
BF_set_key(&blowfish, 16, hardcoded_key);
|
|
for (i = 0; i < size; i += 8)
|
|
BF_ecb_encrypt(input + i, output + i, &blowfish, 1);
|
|
}
|
|
|
|
static void run_crypto_camellia(uint8_t *output,
|
|
const uint8_t *input, unsigned size)
|
|
{
|
|
CAMELLIA_KEY camellia;
|
|
unsigned i;
|
|
|
|
Camellia_set_key(hardcoded_key, 128, &camellia);
|
|
size -= 15;
|
|
for (i = 0; i < size; i += 16)
|
|
Camellia_ecb_encrypt(input + i, output + i, &camellia, 1);
|
|
}
|
|
|
|
static void run_crypto_cast128(uint8_t *output,
|
|
const uint8_t *input, unsigned size)
|
|
{
|
|
CAST_KEY cast;
|
|
unsigned i;
|
|
|
|
CAST_set_key(&cast, 16, hardcoded_key);
|
|
for (i = 0; i < size; i += 8)
|
|
CAST_ecb_encrypt(input + i, output + i, &cast, 1);
|
|
}
|
|
|
|
static void run_crypto_des(uint8_t *output,
|
|
const uint8_t *input, unsigned size)
|
|
{
|
|
DES_key_schedule des;
|
|
unsigned i;
|
|
|
|
DES_set_key(hardcoded_key, &des);
|
|
for (i = 0; i < size; i += 8)
|
|
DES_ecb_encrypt(input + i, output + i, &des, 1);
|
|
}
|
|
|
|
static void run_crypto_rc4(uint8_t *output,
|
|
const uint8_t *input, unsigned size)
|
|
{
|
|
RC4_KEY rc4;
|
|
|
|
RC4_set_key(&rc4, 16, hardcoded_key);
|
|
RC4(&rc4, size, input, output);
|
|
}
|
|
|
|
#define IMPL_USE_crypto(...) IMPL_USE(__VA_ARGS__)
|
|
#else
|
|
#define IMPL_USE_crypto(...) /* ignore */
|
|
#endif
|
|
|
|
/***************************************************************************
|
|
* gcrypt: GnuTLS's libgcrypt
|
|
***************************************************************************/
|
|
|
|
#if (USE_EXT_LIBS) & USE_gcrypt
|
|
|
|
#include <gcrypt.h>
|
|
|
|
#define DEFINE_GCRYPT_WRAPPER(suffix, algo) \
|
|
static void run_gcrypt_ ## suffix(uint8_t *output, \
|
|
const uint8_t *input, unsigned size) \
|
|
{ \
|
|
gcry_md_hash_buffer(GCRY_MD_ ## algo, output, input, size); \
|
|
}
|
|
|
|
DEFINE_GCRYPT_WRAPPER(md5, MD5)
|
|
DEFINE_GCRYPT_WRAPPER(sha1, SHA1)
|
|
DEFINE_GCRYPT_WRAPPER(sha256, SHA256)
|
|
DEFINE_GCRYPT_WRAPPER(sha512, SHA512)
|
|
DEFINE_GCRYPT_WRAPPER(ripemd160, RMD160)
|
|
|
|
#define DEFINE_GCRYPT_CYPHER_WRAPPER(suffix, cypher, mode, sz) \
|
|
static void run_gcrypt_ ## suffix(uint8_t *output, \
|
|
const uint8_t *input, unsigned size) \
|
|
{ \
|
|
static gcry_cipher_hd_t suffix; \
|
|
if (!suffix) \
|
|
gcry_cipher_open(&suffix, GCRY_CIPHER_ ## cypher, GCRY_CIPHER_MODE_ ## mode, 0); \
|
|
gcry_cipher_setkey(suffix, hardcoded_key, sz); \
|
|
gcry_cipher_encrypt(suffix, output, size, input, size); \
|
|
}
|
|
|
|
DEFINE_GCRYPT_CYPHER_WRAPPER(aes128, AES128, ECB, 16)
|
|
DEFINE_GCRYPT_CYPHER_WRAPPER(blowfish, BLOWFISH, ECB, 16)
|
|
DEFINE_GCRYPT_CYPHER_WRAPPER(camellia, CAMELLIA128, ECB, 16)
|
|
DEFINE_GCRYPT_CYPHER_WRAPPER(cast128, CAST5, ECB, 16)
|
|
DEFINE_GCRYPT_CYPHER_WRAPPER(des, DES, ECB, 8)
|
|
DEFINE_GCRYPT_CYPHER_WRAPPER(twofish, TWOFISH128, ECB, 16)
|
|
DEFINE_GCRYPT_CYPHER_WRAPPER(rc4, ARCFOUR, STREAM, 16)
|
|
|
|
#define IMPL_USE_gcrypt(...) IMPL_USE(__VA_ARGS__)
|
|
#else
|
|
#define IMPL_USE_gcrypt(...) /* ignore */
|
|
#endif
|
|
|
|
/***************************************************************************
|
|
* mbedcrypto: mbed TLS
|
|
***************************************************************************/
|
|
|
|
#if (USE_EXT_LIBS) & USE_mbedcrypto
|
|
|
|
#include <mbedtls/aes.h>
|
|
#include <mbedtls/arc4.h>
|
|
#include <mbedtls/blowfish.h>
|
|
#include <mbedtls/camellia.h>
|
|
#include <mbedtls/des.h>
|
|
#include <mbedtls/md5.h>
|
|
#include <mbedtls/ripemd160.h>
|
|
#include <mbedtls/sha1.h>
|
|
#include <mbedtls/sha256.h>
|
|
#include <mbedtls/sha512.h>
|
|
#include <mbedtls/xtea.h>
|
|
|
|
#define DEFINE_MBEDCRYPTO_WRAPPER(suffix) \
|
|
static void run_mbedcrypto_ ## suffix(uint8_t *output, \
|
|
const uint8_t *input, unsigned size) \
|
|
{ \
|
|
mbedtls_ ## suffix ## _ret(input, size, output); \
|
|
}
|
|
|
|
#define DEFINE_MBEDCRYPTO_WRAPPER_SHA2(suffix) \
|
|
static void run_mbedcrypto_ ## suffix(uint8_t *output, \
|
|
const uint8_t *input, unsigned size) \
|
|
{ \
|
|
mbedtls_ ## suffix ## _ret(input, size, output, 0); \
|
|
}
|
|
|
|
DEFINE_MBEDCRYPTO_WRAPPER(md5)
|
|
DEFINE_MBEDCRYPTO_WRAPPER(ripemd160)
|
|
DEFINE_MBEDCRYPTO_WRAPPER(sha1)
|
|
DEFINE_MBEDCRYPTO_WRAPPER_SHA2(sha256)
|
|
DEFINE_MBEDCRYPTO_WRAPPER_SHA2(sha512)
|
|
|
|
|
|
#define DEFINE_MBEDCRYPTO_CYPHER_WRAPPER(suffix, cypher, algo) \
|
|
static void run_mbedcrypto_ ## suffix(uint8_t *output, \
|
|
const uint8_t *input, unsigned size) \
|
|
{ \
|
|
mbedtls_ ## cypher ## _context cypher; \
|
|
\
|
|
mbedtls_ ## cypher ## _init(&cypher); \
|
|
mbedtls_ ## cypher ## _setkey_enc(&cypher, hardcoded_key, 128); \
|
|
for (int i = 0; i < size; i += 16) \
|
|
mbedtls_ ## cypher ## _crypt_ecb(&cypher, MBEDTLS_ ## algo ## _ENCRYPT, \
|
|
input + i, output + i); \
|
|
mbedtls_ ## cypher ## _free(&cypher); \
|
|
}
|
|
|
|
DEFINE_MBEDCRYPTO_CYPHER_WRAPPER(aes128, aes, AES)
|
|
DEFINE_MBEDCRYPTO_CYPHER_WRAPPER(camellia, camellia, CAMELLIA)
|
|
|
|
static void run_mbedcrypto_blowfish(uint8_t *output,
|
|
const uint8_t *input, unsigned size)
|
|
{
|
|
mbedtls_blowfish_context blowfish;
|
|
|
|
mbedtls_blowfish_init(&blowfish);
|
|
mbedtls_blowfish_setkey(&blowfish, hardcoded_key, 128);
|
|
for (int i = 0; i < size; i += 8)
|
|
mbedtls_blowfish_crypt_ecb(&blowfish, MBEDTLS_BLOWFISH_ENCRYPT,
|
|
input + i, output + i);
|
|
mbedtls_blowfish_free(&blowfish);
|
|
}
|
|
|
|
static void run_mbedcrypto_des(uint8_t *output,
|
|
const uint8_t *input, unsigned size)
|
|
{
|
|
mbedtls_des_context des;
|
|
|
|
mbedtls_des_init(&des);
|
|
mbedtls_des_setkey_enc(&des, hardcoded_key);
|
|
for (int i = 0; i < size; i += 8)
|
|
mbedtls_des_crypt_ecb(&des, input + i, output + i);
|
|
mbedtls_des_free(&des);
|
|
}
|
|
|
|
static void run_mbedcrypto_rc4(uint8_t *output,
|
|
const uint8_t *input, unsigned size)
|
|
{
|
|
mbedtls_arc4_context rc4;
|
|
|
|
mbedtls_arc4_init(&rc4);
|
|
mbedtls_arc4_setup(&rc4, hardcoded_key, 16);
|
|
mbedtls_arc4_crypt(&rc4, size, input, output);
|
|
mbedtls_arc4_free(&rc4);
|
|
}
|
|
|
|
static void run_mbedcrypto_xtea(uint8_t *output,
|
|
const uint8_t *input, unsigned size)
|
|
{
|
|
mbedtls_xtea_context xtea;
|
|
|
|
mbedtls_xtea_init(&xtea);
|
|
mbedtls_xtea_setup(&xtea, hardcoded_key);
|
|
for (int i = 0; i < size; i += 8)
|
|
mbedtls_xtea_crypt_ecb(&xtea, MBEDTLS_XTEA_ENCRYPT,
|
|
input + i, output + i);
|
|
mbedtls_xtea_free(&xtea);
|
|
}
|
|
|
|
#define IMPL_USE_mbedcrypto(...) IMPL_USE(__VA_ARGS__)
|
|
#else
|
|
#define IMPL_USE_mbedcrypto(...) /* ignore */
|
|
#endif
|
|
|
|
/***************************************************************************
|
|
* tomcrypt: LibTomCrypt
|
|
***************************************************************************/
|
|
|
|
#if (USE_EXT_LIBS) & USE_tomcrypt
|
|
|
|
#include <tomcrypt.h>
|
|
|
|
#define DEFINE_TOMCRYPT_WRAPPER(suffix, namespace, algo) \
|
|
static void run_tomcrypt_ ## suffix(uint8_t *output, \
|
|
const uint8_t *input, unsigned size) \
|
|
{ \
|
|
hash_state md; \
|
|
namespace ## _init(&md); \
|
|
namespace ## _process(&md, input, size); \
|
|
namespace ## _done(&md, output); \
|
|
}
|
|
|
|
DEFINE_TOMCRYPT_WRAPPER(md5, md5, MD5)
|
|
DEFINE_TOMCRYPT_WRAPPER(sha1, sha1, SHA1)
|
|
DEFINE_TOMCRYPT_WRAPPER(sha256, sha256, SHA256)
|
|
DEFINE_TOMCRYPT_WRAPPER(sha512, sha512, SHA512)
|
|
DEFINE_TOMCRYPT_WRAPPER(ripemd128, rmd128, RIPEMD128)
|
|
DEFINE_TOMCRYPT_WRAPPER(ripemd160, rmd160, RIPEMD160)
|
|
|
|
static void run_tomcrypt_aes128(uint8_t *output,
|
|
const uint8_t *input, unsigned size)
|
|
{
|
|
symmetric_key aes;
|
|
unsigned i;
|
|
|
|
aes_setup(hardcoded_key, 16, 0, &aes);
|
|
size -= 15;
|
|
for (i = 0; i < size; i += 16)
|
|
aes_ecb_encrypt(input + i, output + i, &aes);
|
|
}
|
|
|
|
static void run_tomcrypt_blowfish(uint8_t *output,
|
|
const uint8_t *input, unsigned size)
|
|
{
|
|
symmetric_key blowfish;
|
|
unsigned i;
|
|
|
|
blowfish_setup(hardcoded_key, 16, 0, &blowfish);
|
|
for (i = 0; i < size; i += 8)
|
|
blowfish_ecb_encrypt(input + i, output + i, &blowfish);
|
|
}
|
|
|
|
static void run_tomcrypt_camellia(uint8_t *output,
|
|
const uint8_t *input, unsigned size)
|
|
{
|
|
symmetric_key camellia;
|
|
unsigned i;
|
|
|
|
camellia_setup(hardcoded_key, 16, 0, &camellia);
|
|
size -= 15;
|
|
for (i = 0; i < size; i += 16)
|
|
camellia_ecb_encrypt(input + i, output + i, &camellia);
|
|
}
|
|
|
|
static void run_tomcrypt_cast128(uint8_t *output,
|
|
const uint8_t *input, unsigned size)
|
|
{
|
|
symmetric_key cast;
|
|
unsigned i;
|
|
|
|
cast5_setup(hardcoded_key, 16, 0, &cast);
|
|
for (i = 0; i < size; i += 8)
|
|
cast5_ecb_encrypt(input + i, output + i, &cast);
|
|
}
|
|
|
|
static void run_tomcrypt_des(uint8_t *output,
|
|
const uint8_t *input, unsigned size)
|
|
{
|
|
symmetric_key des;
|
|
unsigned i;
|
|
|
|
des_setup(hardcoded_key, 8, 0, &des);
|
|
for (i = 0; i < size; i += 8)
|
|
des_ecb_encrypt(input + i, output + i, &des);
|
|
}
|
|
|
|
static void run_tomcrypt_rc4(uint8_t *output,
|
|
const uint8_t *input, unsigned size)
|
|
{
|
|
rc4_state rc4;
|
|
|
|
rc4_stream_setup(&rc4, hardcoded_key, 16);
|
|
rc4_stream_crypt(&rc4, input, size, output);
|
|
rc4_stream_done(&rc4);
|
|
}
|
|
|
|
static void run_tomcrypt_twofish(uint8_t *output,
|
|
const uint8_t *input, unsigned size)
|
|
{
|
|
symmetric_key twofish;
|
|
unsigned i;
|
|
|
|
twofish_setup(hardcoded_key, 16, 0, &twofish);
|
|
size -= 15;
|
|
for (i = 0; i < size; i += 16)
|
|
twofish_ecb_encrypt(input + i, output + i, &twofish);
|
|
}
|
|
|
|
static void run_tomcrypt_xtea(uint8_t *output,
|
|
const uint8_t *input, unsigned size)
|
|
{
|
|
symmetric_key xtea;
|
|
unsigned i;
|
|
|
|
xtea_setup(hardcoded_key, 16, 0, &xtea);
|
|
for (i = 0; i < size; i += 8)
|
|
xtea_ecb_encrypt(input + i, output + i, &xtea);
|
|
}
|
|
|
|
|
|
#define IMPL_USE_tomcrypt(...) IMPL_USE(__VA_ARGS__)
|
|
#else
|
|
#define IMPL_USE_tomcrypt(...) /* ignore */
|
|
#endif
|
|
|
|
/***************************************************************************
|
|
* Driver code
|
|
***************************************************************************/
|
|
|
|
static unsigned crc32(const uint8_t *data, unsigned size)
|
|
{
|
|
return av_crc(av_crc_get_table(AV_CRC_32_IEEE), 0, data, size);
|
|
}
|
|
|
|
static void run_implementation(const uint8_t *input, uint8_t *output,
|
|
struct hash_impl *impl, unsigned size)
|
|
{
|
|
uint64_t t0, t1;
|
|
unsigned nruns = specified_runs ? specified_runs : (1 << 30) / size;
|
|
unsigned outlen = 0, outcrc = 0;
|
|
unsigned i, j, val;
|
|
double mtime, ttime = 0, ttime2 = 0, stime;
|
|
uint8_t outref[MAX_OUTPUT_SIZE];
|
|
|
|
if (enabled_libs && !av_stristr(enabled_libs, impl->lib) ||
|
|
enabled_algos && !av_stristr(enabled_algos, impl->name))
|
|
return;
|
|
if (!sscanf(impl->output, "crc:%x", &outcrc)) {
|
|
outlen = strlen(impl->output) / 2;
|
|
for (i = 0; i < outlen; i++) {
|
|
sscanf(impl->output + i * 2, "%02x", &val);
|
|
outref[i] = val;
|
|
}
|
|
}
|
|
for (i = 0; i < 8; i++) /* heat caches */
|
|
impl->run(output, input, size);
|
|
for (i = 0; i < nruns; i++) {
|
|
memset(output, 0, size); /* avoid leftovers from previous runs */
|
|
t0 = AV_READ_TIME();
|
|
impl->run(output, input, size);
|
|
t1 = AV_READ_TIME();
|
|
if (outlen ? memcmp(output, outref, outlen) :
|
|
crc32(output, size) != outcrc) {
|
|
fprintf(stderr, "Expected: ");
|
|
if (outlen)
|
|
for (j = 0; j < outlen; j++)
|
|
fprintf(stderr, "%02x", output[j]);
|
|
else
|
|
fprintf(stderr, "%08x", crc32(output, size));
|
|
fprintf(stderr, "\n");
|
|
fatal_error("output mismatch");
|
|
}
|
|
mtime = (double)(t1 - t0) / size;
|
|
ttime += mtime;
|
|
ttime2 += mtime * mtime;
|
|
}
|
|
|
|
ttime /= nruns;
|
|
ttime2 /= nruns;
|
|
stime = sqrt(ttime2 - ttime * ttime);
|
|
printf("%-10s %-12s size: %7d runs: %6d time: %8.3f +- %.3f\n",
|
|
impl->lib, impl->name, size, nruns, ttime, stime);
|
|
fflush(stdout);
|
|
}
|
|
|
|
#define IMPL_USE(lib, name, symbol, output) \
|
|
{ #lib, name, run_ ## lib ## _ ## symbol, output },
|
|
#define IMPL(lib, ...) IMPL_USE_ ## lib(lib, __VA_ARGS__)
|
|
#define IMPL_ALL(...) \
|
|
IMPL(lavu, __VA_ARGS__) \
|
|
IMPL(crypto, __VA_ARGS__) \
|
|
IMPL(gcrypt, __VA_ARGS__) \
|
|
IMPL(mbedcrypto, __VA_ARGS__) \
|
|
IMPL(tomcrypt, __VA_ARGS__)
|
|
|
|
struct hash_impl implementations[] = {
|
|
IMPL_ALL("MD5", md5, "aa26ff5b895356bcffd9292ba9f89e66")
|
|
IMPL_ALL("SHA-1", sha1, "1fd8bd1fa02f5b0fe916b0d71750726b096c5744")
|
|
IMPL_ALL("SHA-256", sha256, "14028ac673b3087e51a1d407fbf0df4deeec8f217119e13b07bf2138f93db8c5")
|
|
IMPL_ALL("SHA-512", sha512, "3afdd44a80d99af15c87bd724cb717243193767835ce866dd5d58c02d674bb57"
|
|
"7c25b9e118c200a189fcd5a01ef106a4e200061f3e97dbf50ba065745fd46bef")
|
|
IMPL(lavu, "RIPEMD-128", ripemd128, "9ab8bfba2ddccc5d99c9d4cdfb844a5f")
|
|
IMPL(tomcrypt, "RIPEMD-128", ripemd128, "9ab8bfba2ddccc5d99c9d4cdfb844a5f")
|
|
IMPL_ALL("RIPEMD-160", ripemd160, "62a5321e4fc8784903bb43ab7752c75f8b25af00")
|
|
IMPL_ALL("AES-128", aes128, "crc:ff6bc888")
|
|
IMPL_ALL("CAMELLIA", camellia, "crc:7abb59a7")
|
|
IMPL(lavu, "CAST-128", cast128, "crc:456aa584")
|
|
IMPL(crypto, "CAST-128", cast128, "crc:456aa584")
|
|
IMPL(gcrypt, "CAST-128", cast128, "crc:456aa584")
|
|
IMPL(tomcrypt, "CAST-128", cast128, "crc:456aa584")
|
|
IMPL_ALL("BLOWFISH", blowfish, "crc:33e8aa74")
|
|
IMPL_ALL("DES", des, "crc:31291e0b")
|
|
IMPL(lavu, "TWOFISH", twofish, "crc:9edbd5c1")
|
|
IMPL(gcrypt, "TWOFISH", twofish, "crc:9edbd5c1")
|
|
IMPL(tomcrypt, "TWOFISH", twofish, "crc:9edbd5c1")
|
|
IMPL_ALL("RC4", rc4, "crc:538d37b2")
|
|
IMPL(lavu, "XTEA", xtea, "crc:931fc270")
|
|
IMPL(mbedcrypto, "XTEA", xtea, "crc:931fc270")
|
|
IMPL(tomcrypt, "XTEA", xtea, "crc:931fc270")
|
|
};
|
|
|
|
int main(int argc, char **argv)
|
|
{
|
|
uint8_t *input;
|
|
uint8_t *output;
|
|
unsigned i, impl, size;
|
|
int opt;
|
|
|
|
while ((opt = getopt(argc, argv, "hl:a:r:")) != -1) {
|
|
switch (opt) {
|
|
case 'l':
|
|
enabled_libs = optarg;
|
|
break;
|
|
case 'a':
|
|
enabled_algos = optarg;
|
|
break;
|
|
case 'r':
|
|
specified_runs = strtol(optarg, NULL, 0);
|
|
break;
|
|
case 'h':
|
|
default:
|
|
fprintf(stderr, "Usage: %s [-l libs] [-a algos] [-r runs]\n",
|
|
argv[0]);
|
|
if ((USE_EXT_LIBS)) {
|
|
char buf[1024];
|
|
snprintf(buf, sizeof(buf), "%s%s%s%s",
|
|
((USE_EXT_LIBS) & USE_crypto) ? "+crypto" : "",
|
|
((USE_EXT_LIBS) & USE_gcrypt) ? "+gcrypt" : "",
|
|
((USE_EXT_LIBS) & USE_mbedcrypto) ? "+mbedcrypto" : "",
|
|
((USE_EXT_LIBS) & USE_tomcrypt) ? "+tomcrypt" : "");
|
|
fprintf(stderr, "Built with the following external libraries:\n"
|
|
"make VERSUS=%s\n", buf + 1);
|
|
} else {
|
|
fprintf(stderr, "Built without external libraries; use\n"
|
|
"make VERSUS=crypto+gcrypt+mbedcrypto+tomcrypt tools/crypto_bench\n"
|
|
"to enable them.\n");
|
|
}
|
|
exit(opt != 'h');
|
|
}
|
|
}
|
|
input = av_malloc(MAX_INPUT_SIZE * 2);
|
|
if (!input)
|
|
fatal_error("out of memory");
|
|
for (i = 0; i < MAX_INPUT_SIZE; i += 4)
|
|
AV_WB32(input + i, i);
|
|
|
|
output = input + MAX_INPUT_SIZE;
|
|
|
|
size = MAX_INPUT_SIZE;
|
|
for (impl = 0; impl < FF_ARRAY_ELEMS(implementations); impl++)
|
|
run_implementation(input, output, &implementations[impl], size);
|
|
|
|
av_free(input);
|
|
|
|
return 0;
|
|
}
|