X-Git-Url: https://git.cryptolib.org/?a=blobdiff_plain;f=main-xtea-test.c;h=07fcffeb1eb5a2f9ad1664d922704a5a34408f1c;hb=6bca96e560e6097aa5b225fad67f2e2a27f4182f;hp=164970262fbf375c990ca860df0a5fc0c31162ac;hpb=222f3914d6308961e4e3d04ec0ea5e9ae652a1f9;p=avr-crypto-lib.git
diff --git a/main-xtea-test.c b/main-xtea-test.c
index 1649702..07fcffe 100644
--- a/main-xtea-test.c
+++ b/main-xtea-test.c
@@ -1,3 +1,21 @@
+/* main-xtea-test.c */
+/*
+ This file is part of the Crypto-avr-lib/microcrypt-lib.
+ Copyright (C) 2008 Daniel Otte (daniel.otte@rub.de)
+
+ This program is free software: you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation, either version 3 of the License, or
+ (at your option) any later version.
+
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with this program. If not, see .
+*/
/*
* XTEA test-suit
*
@@ -10,6 +28,8 @@
#include "xtea.h"
#include "nessie_bc_test.h"
+#include "performance_test.h"
+#include "cli.h"
#include
#include
@@ -28,19 +48,40 @@ void xtea_dec_dummy(uint8_t* buffer, void* ctx){
xtea_dec((uint32_t*)buffer, (uint32_t*)buffer, ctx);
}
-void testrun_xtea(void){
- nessie_ctx.blocksize_B = 8;
- nessie_ctx.keysize = 128;
- nessie_ctx.name = cipher_name;
- nessie_ctx.ctx_size_B = 128/8;
- nessie_ctx.cipher_enc = (nessie_enc_fpt)xtea_enc_dummy;
- nessie_ctx.cipher_dec = (nessie_dec_fpt)xtea_dec_dummy;
- nessie_ctx.cipher_genctx = (nessie_gen_fpt)xtea_genctx_dummy;
+void testrun_nessie_xtea(void){
+ nessie_bc_ctx.blocksize_B = 8;
+ nessie_bc_ctx.keysize_b = 128;
+ nessie_bc_ctx.name = cipher_name;
+ nessie_bc_ctx.ctx_size_B = 128/8;
+ nessie_bc_ctx.cipher_enc = (nessie_bc_enc_fpt)xtea_enc_dummy;
+ nessie_bc_ctx.cipher_dec = (nessie_bc_dec_fpt)xtea_dec_dummy;
+ nessie_bc_ctx.cipher_genctx = (nessie_bc_gen_fpt)xtea_genctx_dummy;
- nessie_run();
+ nessie_bc_run();
}
-
+void testrun_performance_xtea(void){
+ uint64_t t;
+ uint8_t key[16], data[8];
+
+ calibrateTimer();
+ print_overhead();
+
+ memset(key, 0, 16);
+ memset(data, 0, 8);
+
+ startTimer(1);
+ xtea_enc(data, data, key);
+ t = stopTimer();
+ print_time_P(PSTR("\tencrypt time: "), t);
+
+ startTimer(1);
+ xtea_dec(data, data, key);
+ t = stopTimer();
+ print_time_P(PSTR("\tdecrypt time: "), t);
+
+ uart_putstr_P(PSTR("\r\n"));
+}
/*****************************************************************************
* main *
@@ -55,14 +96,16 @@ int main (void){
uart_putstr(cipher_name);
uart_putstr_P(PSTR(")\r\nloaded and running\r\n"));
-restart:
+ PGM_P u = PSTR("nessie\0test\0performance\0");
+ void_fpt v[] = {testrun_nessie_xtea, testrun_nessie_xtea, testrun_performance_xtea};
+
while(1){
- if (!getnextwordn(str,20)) {DEBUG_S("DBG: W1\r\n"); goto error;}
- if (strcmp(str, "nessie")) {DEBUG_S("DBG: 1b\r\n"); goto error;}
- testrun_xtea();
- goto restart;
+ if (!getnextwordn(str,20)){DEBUG_S("DBG: W1\r\n"); goto error;}
+ if(execcommand_d0_P(str, u, v)<0){
+ uart_putstr_P(PSTR("\r\nunknown command\r\n"));
+ }
continue;
error:
uart_putstr("ERROR\r\n");
- }
+ }
}