mirror of
https://github.com/ntop/n2n.git
synced 2024-09-20 00:51:10 +02:00
Add decryption test in benchmark
This commit is contained in:
parent
c702ca8686
commit
fc16352198
33
benchmark.c
33
benchmark.c
|
@ -71,6 +71,25 @@ uint8_t PKT_CONTENT[]={
|
||||||
/* Prototypes */
|
/* Prototypes */
|
||||||
static ssize_t do_encode_packet( uint8_t * pktbuf, size_t bufsize, const n2n_community_t c );
|
static ssize_t do_encode_packet( uint8_t * pktbuf, size_t bufsize, const n2n_community_t c );
|
||||||
static void run_transop_benchmark(const char *op_name, n2n_trans_op_t *op_fn, uint8_t *pktbuf, n2n_community_t c);
|
static void run_transop_benchmark(const char *op_name, n2n_trans_op_t *op_fn, uint8_t *pktbuf, n2n_community_t c);
|
||||||
|
static int perform_decryption = 0;
|
||||||
|
|
||||||
|
static void usage() {
|
||||||
|
fprintf(stderr, "Usage: benchmark [-d]\n"
|
||||||
|
" -d\t\tEnable decryption. Default: only encryption is performed\n");
|
||||||
|
exit(1);
|
||||||
|
}
|
||||||
|
|
||||||
|
static void parseArgs(int argc, char * argv[]) {
|
||||||
|
if((argc != 1) && (argc != 2))
|
||||||
|
usage();
|
||||||
|
|
||||||
|
if(argc == 2) {
|
||||||
|
if(strcmp(argv[1], "-d") != 0)
|
||||||
|
usage();
|
||||||
|
|
||||||
|
perform_decryption = 1;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
int main(int argc, char * argv[]) {
|
int main(int argc, char * argv[]) {
|
||||||
uint8_t pktbuf[N2N_PKT_BUF_SIZE];
|
uint8_t pktbuf[N2N_PKT_BUF_SIZE];
|
||||||
|
@ -78,6 +97,8 @@ int main(int argc, char * argv[]) {
|
||||||
n2n_trans_op_t transop_null, transop_twofish, transop_aes_cbc;
|
n2n_trans_op_t transop_null, transop_twofish, transop_aes_cbc;
|
||||||
u_char encrypt_pwd[] = "SoMEVer!S$cUREPassWORD";
|
u_char encrypt_pwd[] = "SoMEVer!S$cUREPassWORD";
|
||||||
|
|
||||||
|
parseArgs(argc, argv);
|
||||||
|
|
||||||
memset(c,0,sizeof(N2N_COMMUNITY_SIZE));
|
memset(c,0,sizeof(N2N_COMMUNITY_SIZE));
|
||||||
memcpy(c, "abc123def456", 12);
|
memcpy(c, "abc123def456", 12);
|
||||||
|
|
||||||
|
@ -113,7 +134,8 @@ static void run_transop_benchmark(const char *op_name, n2n_trans_op_t *op_fn, ui
|
||||||
ssize_t tdiff = 0; // microseconds
|
ssize_t tdiff = 0; // microseconds
|
||||||
size_t num_packets = 0;
|
size_t num_packets = 0;
|
||||||
|
|
||||||
printf("Run [%s] for %us (%u bytes): ", op_name, target_sec, (unsigned int)sizeof(PKT_CONTENT));
|
printf("Run %s[%s] for %us (%u bytes): ", perform_decryption ? "enc/dec" : "enc",
|
||||||
|
op_name, target_sec, (unsigned int)sizeof(PKT_CONTENT));
|
||||||
fflush(stdout);
|
fflush(stdout);
|
||||||
|
|
||||||
memset(mac_buf, 0, sizeof(mac_buf));
|
memset(mac_buf, 0, sizeof(mac_buf));
|
||||||
|
@ -132,6 +154,15 @@ static void run_transop_benchmark(const char *op_name, n2n_trans_op_t *op_fn, ui
|
||||||
decode_common( &cmn, pktbuf, &rem, &idx);
|
decode_common( &cmn, pktbuf, &rem, &idx);
|
||||||
decode_PACKET( &pkt, &cmn, pktbuf, &rem, &idx );
|
decode_PACKET( &pkt, &cmn, pktbuf, &rem, &idx );
|
||||||
|
|
||||||
|
if(perform_decryption) {
|
||||||
|
uint8_t decodebuf[N2N_PKT_BUF_SIZE];
|
||||||
|
|
||||||
|
op_fn->rev(op_fn, decodebuf, N2N_PKT_BUF_SIZE, pktbuf+idx, rem, 0);
|
||||||
|
|
||||||
|
if(memcmp(decodebuf, PKT_CONTENT, sizeof(PKT_CONTENT)) != 0)
|
||||||
|
fprintf(stderr, "Payload decryption failed!\n");
|
||||||
|
}
|
||||||
|
|
||||||
gettimeofday( &t2, NULL );
|
gettimeofday( &t2, NULL );
|
||||||
tdiff = ((t2.tv_sec - t1.tv_sec) * 1000000) + (t2.tv_usec - t1.tv_usec);
|
tdiff = ((t2.tv_sec - t1.tv_sec) * 1000000) + (t2.tv_usec - t1.tv_usec);
|
||||||
num_packets++;
|
num_packets++;
|
||||||
|
|
Loading…
Reference in New Issue
Block a user