summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMilan Broz <gmazyland@gmail.com>2012-11-30 17:05:03 +0100
committerMilan Broz <gmazyland@gmail.com>2012-11-30 17:05:03 +0100
commit6123541d8074d6d3250f8d19f0f2fa23bc8a678f (patch)
tree6465105a5e1d9e5c2d0e6d27d897d6003a85c84f
parente510dd9c60cf665ed0ac93e9cd91e6d703623f25 (diff)
downloadcryptsetup-6123541d8074d6d3250f8d19f0f2fa23bc8a678f.tar.gz
cryptsetup-6123541d8074d6d3250f8d19f0f2fa23bc8a678f.tar.bz2
cryptsetup-6123541d8074d6d3250f8d19f0f2fa23bc8a678f.zip
Add missing pbkdf check file.
-rw-r--r--lib/crypto_backend/pbkdf_check.c88
1 files changed, 88 insertions, 0 deletions
diff --git a/lib/crypto_backend/pbkdf_check.c b/lib/crypto_backend/pbkdf_check.c
new file mode 100644
index 0000000..086aa38
--- /dev/null
+++ b/lib/crypto_backend/pbkdf_check.c
@@ -0,0 +1,88 @@
+/*
+ * PBKDF performance check
+ * Copyright (C) 2012, Red Hat, Inc. All rights reserved.
+ *
+ * This file is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU Lesser General Public
+ * License as published by the Free Software Foundation; either
+ * version 2.1 of the License, or (at your option) any later version.
+ *
+ * This file is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ * Lesser General Public License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public
+ * License along with this file; if not, write to the Free Software
+ * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
+ */
+
+#include <errno.h>
+#include <sys/time.h>
+#include <sys/resource.h>
+#include "crypto_backend.h"
+
+static long time_ms(struct rusage *start, struct rusage *end)
+{
+ long ms;
+
+ ms = (end->ru_utime.tv_sec - start->ru_utime.tv_sec) * 1000;
+ ms += (end->ru_utime.tv_usec - start->ru_utime.tv_usec) / 1000;
+
+ if (crypt_backend_flags() & CRYPT_BACKEND_KERNEL) {
+ ms += (end->ru_stime.tv_sec - start->ru_stime.tv_sec) * 1000;
+ ms += (end->ru_stime.tv_usec - start->ru_stime.tv_usec) / 1000;
+ }
+
+ return ms;
+}
+
+/* This code benchmarks PBKDF and returns iterations/second using specified hash */
+int crypt_pbkdf_check(const char *kdf, const char *hash, uint64_t *iter_secs)
+{
+ struct rusage rstart, rend;
+ int r = 0, step = 0;
+ long ms = 0;
+ char buf;
+ unsigned int iterations;
+
+ if (!kdf || !hash)
+ return -EINVAL;
+
+ iterations = 1 << 15;
+ while (ms < 500) {
+ if (getrusage(RUSAGE_SELF, &rstart) < 0)
+ return -EINVAL;
+
+ r = crypt_pbkdf(kdf, hash, "foo", 3, "bar", 3, &buf, 1, iterations);
+ if (r < 0)
+ return r;
+
+ if (getrusage(RUSAGE_SELF, &rend) < 0)
+ return -EINVAL;
+
+ ms = time_ms(&rstart, &rend);
+ if (ms > 500)
+ break;
+
+ if (ms <= 62)
+ iterations <<= 4;
+ else if (ms <= 125)
+ iterations <<= 3;
+ else if (ms <= 250)
+ iterations <<= 2;
+ else
+ iterations <<= 1;
+
+ if (++step > 10 || !iterations)
+ return -EINVAL;
+ }
+
+ /* Safety check if anything went wrong */
+ if (ms < 10)
+ return -EINVAL;
+
+ if (iter_secs)
+ *iter_secs = (iterations * 1000) / ms;
+ return r;
+}