+/*
+ * Copyright (C) 2009 Martin Willi
+ * HSR Hochschule fuer Technik Rapperswil
+ *
+ * This program is free software; you can redistribute it and/or modify it
+ * under the terms of the GNU General Public License as published by the
+ * Free Software Foundation; either version 2 of the License, or (at your
+ * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
+ *
+ * This program is distributed in the hope that it will be useful, but
+ * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
+ * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
+ * for more details.
+ */
#include <stdio.h>
#include <time.h>
#include <library.h>
-#include <debug.h>
+#include <utils/debug.h>
#include <credentials/keys/private_key.h>
-#include <asn1/pem.h>
void start_timing(struct timespec *start)
{
double end_timing(struct timespec *start)
{
struct timespec end;
-
+
clock_gettime(CLOCK_THREAD_CPUTIME_ID, &end);
return (end.tv_nsec - start->tv_nsec) / 1000000000.0 +
(end.tv_sec - start->tv_sec) * 1.0;
static void usage()
{
- printf("usage: pubkey_speed plugins rsa|ecdsa rounds\n");
+ printf("usage: pubkey_speed plugins rsa|ecdsa rounds < key\n");
exit(1);
}
-static char data_buf[] = {0x01,0x02,0x03,0x04,0x05,0x06,0x07};
-
int main(int argc, char *argv[])
{
private_key_t *private;
char buf[8096], *pos = buf;
key_type_t type = KEY_ANY;
signature_scheme_t scheme = SIGN_UNKNOWN;
- chunk_t keydata, *sigs, data = chunk_from_buf(data_buf);
-
+ chunk_t keydata, *sigs, data;
+
if (argc < 4)
{
usage();
}
-
+
rounds = atoi(argv[3]);
-
+
if (streq(argv[2], "rsa"))
{
type = KEY_RSA;
{
usage();
}
-
- library_init(STRONGSWAN_CONF);
- lib->plugins->load(lib->plugins, IPSEC_PLUGINDIR, argv[1]);
+
+ library_init(NULL, "pubkey_speed");
+ lib->plugins->load(lib->plugins, argv[1]);
atexit(library_deinit);
-
+
keydata = chunk_create(buf, 0);
while ((read = fread(pos, 1, sizeof(buf) - (pos - buf), stdin)))
{
pos += read;
keydata.len += read;
}
- if (pem_to_bin(&keydata, chunk_empty, NULL) != SUCCESS)
- {
- printf("converting PEM private key failed.\n");
- exit(1);
- }
-
+
private = lib->creds->create(lib->creds, CRED_PRIVATE_KEY, type,
- BUILD_BLOB_ASN1_DER, keydata, BUILD_END);
+ BUILD_BLOB_PEM, keydata, BUILD_END);
if (!private)
{
printf("parsing private key failed.\n");
{
switch (private->get_keysize(private))
{
- case 32:
- scheme = SIGN_ECDSA_256;
+ case 256:
+ scheme = SIGN_ECDSA_256;
break;
- case 48:
+ case 384:
scheme = SIGN_ECDSA_384;
break;
- case 66:
+ case 521:
scheme = SIGN_ECDSA_521;
break;
default:
printf("%d bit ECDSA private key size not supported",
- private->get_keysize(private) * 8);
+ private->get_keysize(private));
exit(1);
}
}
-
- printf("%4d bit %N: ", private->get_keysize(private)*8,
+
+ printf("%4d bit %N: ", private->get_keysize(private),
key_type_names, type);
-
+
sigs = malloc(sizeof(chunk_t) * rounds);
-
+
+ data = chunk_from_chars(0x01,0x02,0x03,0x04,0x05,0x06,0x07);
start_timing(&timing);
for (round = 0; round < rounds; round++)
{
- if (!private->sign(private, scheme, data, &sigs[round]))
+ if (!private->sign(private, scheme, NULL, data, &sigs[round]))
{
printf("creating signature failed\n");
exit(1);
}
};
printf("sign()/s: %8.1f ", rounds / end_timing(&timing));
-
+
public = private->get_public_key(private);
if (!public)
{
start_timing(&timing);
for (round = 0; round < rounds; round++)
{
- if (!public->verify(public, scheme, data, sigs[round]))
+ if (!public->verify(public, scheme, NULL, data, sigs[round]))
{
printf("signature verification failed\n");
exit(1);
printf("verify()/s: %8.1f\n", rounds / end_timing(&timing));
public->destroy(public);
private->destroy(private);
-
+
for (round = 0; round < rounds; round++)
{
free(sigs[round].ptr);
free(sigs);
return 0;
}
-