mirror of
https://gitlab.com/cryptsetup/cryptsetup.git
synced 2025-12-05 16:00:05 +01:00
89 lines
2.3 KiB
C
89 lines
2.3 KiB
C
/*
|
|
* PBKDF performance check
|
|
* Copyright (C) 2012, Red Hat, Inc. All rights reserved.
|
|
*
|
|
* This file is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This file is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this file; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
*/
|
|
|
|
#include <errno.h>
|
|
#include <sys/time.h>
|
|
#include <sys/resource.h>
|
|
#include "crypto_backend.h"
|
|
|
|
static long time_ms(struct rusage *start, struct rusage *end)
|
|
{
|
|
long ms;
|
|
|
|
ms = (end->ru_utime.tv_sec - start->ru_utime.tv_sec) * 1000;
|
|
ms += (end->ru_utime.tv_usec - start->ru_utime.tv_usec) / 1000;
|
|
|
|
if (crypt_backend_flags() & CRYPT_BACKEND_KERNEL) {
|
|
ms += (end->ru_stime.tv_sec - start->ru_stime.tv_sec) * 1000;
|
|
ms += (end->ru_stime.tv_usec - start->ru_stime.tv_usec) / 1000;
|
|
}
|
|
|
|
return ms;
|
|
}
|
|
|
|
/* This code benchmarks PBKDF and returns iterations/second using specified hash */
|
|
int crypt_pbkdf_check(const char *kdf, const char *hash,
|
|
const char *password, size_t password_size,
|
|
const char *salt, size_t salt_size,
|
|
uint64_t *iter_secs)
|
|
{
|
|
struct rusage rstart, rend;
|
|
int r = 0, step = 0;
|
|
long ms = 0;
|
|
char buf;
|
|
unsigned int iterations;
|
|
|
|
if (!kdf || !hash)
|
|
return -EINVAL;
|
|
|
|
iterations = 1 << 15;
|
|
while (ms < 500) {
|
|
if (getrusage(RUSAGE_SELF, &rstart) < 0)
|
|
return -EINVAL;
|
|
|
|
r = crypt_pbkdf(kdf, hash, password, password_size, salt,
|
|
salt_size, &buf, 1, iterations);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
if (getrusage(RUSAGE_SELF, &rend) < 0)
|
|
return -EINVAL;
|
|
|
|
ms = time_ms(&rstart, &rend);
|
|
if (ms > 500)
|
|
break;
|
|
|
|
if (ms <= 62)
|
|
iterations <<= 4;
|
|
else if (ms <= 125)
|
|
iterations <<= 3;
|
|
else if (ms <= 250)
|
|
iterations <<= 2;
|
|
else
|
|
iterations <<= 1;
|
|
|
|
if (++step > 10 || !iterations)
|
|
return -EINVAL;
|
|
}
|
|
|
|
if (iter_secs)
|
|
*iter_secs = (iterations * 1000) / ms;
|
|
return r;
|
|
}
|