X-Git-Url: https://git.cryptolib.org/?a=blobdiff_plain;f=main-cast5-test.c;h=2cfb3d11b4a34fe3386fee51d1c03b887e5520f5;hb=37d550b5d03ebe6cc51c6e7bbc897f9520ea7422;hp=2a3841b8e7e086e23fcc28294959dcba4560e030;hpb=f746b1cd8b111c52014e72d6c86d0d159721b5ce;p=avr-crypto-lib.git diff --git a/main-cast5-test.c b/main-cast5-test.c index 2a3841b..2cfb3d1 100644 --- a/main-cast5-test.c +++ b/main-cast5-test.c @@ -1,3 +1,21 @@ +/* main-cast5-test.c */ +/* + This file is part of the Crypto-avr-lib/microcrypt-lib. + Copyright (C) 2008 Daniel Otte (daniel.otte@rub.de) + + This program is free software: you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation, either version 3 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program. If not, see . +*/ /* * cast5 test-suit * @@ -22,32 +40,15 @@ char* cipher_name = "cast-128 (cast5)"; /***************************************************************************** * additional validation-functions * *****************************************************************************/ -/* - void cast5_init(cast5_ctx_t* s, uint8_t* key, uint8_t keylength); - void cast5_enc(cast5_ctx_t *s, void* block); - void cast5_dec(cast5_ctx_t *s, void* block); -*/ - -void cast5_init_dummy(uint8_t* key, uint8_t keylength_b, cast5_ctx_t* ctx){ - cast5_init(ctx, key, keylength_b); -} - -void cast5_enc_dummy(void* buffer, cast5_ctx_t* ctx){ - cast5_enc(ctx, buffer); -} -void cast5_dec_dummy(void* buffer, cast5_ctx_t* ctx){ - cast5_dec(ctx, buffer); -} - -void test_nessie_cast5(void){ +void testrun_nessie_cast5(void){ nessie_bc_ctx.blocksize_B = 8; nessie_bc_ctx.keysize_b = 128; nessie_bc_ctx.name = cipher_name; nessie_bc_ctx.ctx_size_B = sizeof(cast5_ctx_t); - nessie_bc_ctx.cipher_enc = (nessie_bc_enc_fpt)cast5_enc_dummy; - nessie_bc_ctx.cipher_dec = (nessie_bc_dec_fpt)cast5_dec_dummy; - nessie_bc_ctx.cipher_genctx = (nessie_bc_gen_fpt)cast5_init_dummy; + nessie_bc_ctx.cipher_enc = (nessie_bc_enc_fpt)cast5_enc; + nessie_bc_ctx.cipher_dec = (nessie_bc_dec_fpt)cast5_dec; + nessie_bc_ctx.cipher_genctx = (nessie_bc_gen_fpt)cast5_init; nessie_bc_run(); } @@ -82,9 +83,8 @@ void test_encrypt(uint8_t *block, uint8_t *key, uint8_t keylength, bool print){ uart_putstr("\r\n plaintext:\t"); uart_hexdump(block, 8); } - cast5_init(&s, key, keylength); -// cast5_ctx_dump(&s); - cast5_enc(&s, block); + cast5_init(key, keylength, &s); + cast5_enc(block, &s); if (print){ uart_putstr("\r\n ciphertext:\t"); uart_hexdump(block, 8); @@ -99,9 +99,8 @@ void test_decrypt(uint8_t *block, uint8_t *key, uint8_t keylength, bool print){ uart_putstr("\r\n ciphertext:\t"); uart_hexdump(block, 8); } - cast5_init(&s, key, keylength); -// cast5_ctx_dump(&s); - cast5_dec(&s, block); + cast5_init(key, keylength, &s); + cast5_dec(block, &s); if (print){ uart_putstr("\r\n plaintext:\t"); uart_hexdump(block, 8); @@ -152,28 +151,20 @@ void testrun_cast5(void){ } -void test_performance_cast5(void){ - uint16_t i,c; +void testrun_performance_cast5(void){ uint64_t t; char str[6]; uint8_t key[16], data[16]; cast5_ctx_t ctx; calibrateTimer(); - getOverhead(&c, &i); - uart_putstr_P(PSTR("\r\n\r\n=== benchmark ===")); - utoa(c, str, 10); - uart_putstr_P(PSTR("\r\n\tconst overhead: ")); - uart_putstr(str); - utoa(i, str, 10); - uart_putstr_P(PSTR("\r\n\tinterrupt overhead: ")); - uart_putstr(str); + print_overhead(); memset(key, 0, 16); memset(data, 0, 16); startTimer(1); - cast5_init(&ctx, key, 128); + cast5_init(key, 128, &ctx); t = stopTimer(); uart_putstr_P(PSTR("\r\n\tctx-gen time: ")); ultoa((unsigned long)t, str, 10); @@ -181,7 +172,7 @@ void test_performance_cast5(void){ startTimer(1); - cast5_enc(&ctx, data); + cast5_enc(data, &ctx); t = stopTimer(); uart_putstr_P(PSTR("\r\n\tencrypt time: ")); ultoa((unsigned long)t, str, 10); @@ -189,7 +180,7 @@ void test_performance_cast5(void){ startTimer(1); - cast5_dec(&ctx, data); + cast5_dec(data, &ctx); t = stopTimer(); uart_putstr_P(PSTR("\r\n\tdecrypt time: ")); ultoa((unsigned long)t, str, 10); @@ -214,7 +205,7 @@ int main (void){ uart_putstr_P(PSTR(")\r\nloaded and running\r\n")); PGM_P u = PSTR("nessie\0test\0performance\0"); - void_fpt v[] = {test_nessie_cast5, test_nessie_cast5, test_performance_cast5}; + void_fpt v[] = {testrun_nessie_cast5, testrun_cast5, testrun_performance_cast5}; while(1){ if (!getnextwordn(str,20)){DEBUG_S("DBG: W1\r\n"); goto error;}