]> git.proxmox.com Git - ceph.git/blame - ceph/src/crypto/isa-l/isa-l_crypto/sha256_mb/sha256_mb_rand_ssl_test.c
update ceph source to reef 18.1.2
[ceph.git] / ceph / src / crypto / isa-l / isa-l_crypto / sha256_mb / sha256_mb_rand_ssl_test.c
CommitLineData
7c673cae
FG
1/**********************************************************************
2 Copyright(c) 2011-2016 Intel Corporation All rights reserved.
3
4 Redistribution and use in source and binary forms, with or without
1e59de90 5 modification, are permitted provided that the following conditions
7c673cae
FG
6 are met:
7 * Redistributions of source code must retain the above copyright
8 notice, this list of conditions and the following disclaimer.
9 * Redistributions in binary form must reproduce the above copyright
10 notice, this list of conditions and the following disclaimer in
11 the documentation and/or other materials provided with the
12 distribution.
13 * Neither the name of Intel Corporation nor the names of its
14 contributors may be used to endorse or promote products derived
15 from this software without specific prior written permission.
16
17 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
18 "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
19 LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
20 A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
21 OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
22 SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
23 LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
24 DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
25 THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
26 (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
27 OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
28**********************************************************************/
29
30#include <stdio.h>
31#include <stdlib.h>
32#include <openssl/sha.h>
33#include "sha256_mb.h"
1e59de90 34#include "endian_helper.h"
7c673cae
FG
35
36#define TEST_LEN (1024*1024)
37#define TEST_BUFS 200
38#ifndef RANDOMS
39# define RANDOMS 10
40#endif
41#ifndef TEST_SEED
42# define TEST_SEED 0x1234
43#endif
44
45/* Reference digest global to reduce stack usage */
46static uint8_t digest_ssl[TEST_BUFS][4 * SHA256_DIGEST_NWORDS];
47
48// Generates pseudo-random data
49void rand_buffer(unsigned char *buf, const long buffer_size)
50{
51 long i;
52 for (i = 0; i < buffer_size; i++)
53 buf[i] = rand();
54}
55
7c673cae
FG
56int main(void)
57{
58 SHA256_HASH_CTX_MGR *mgr = NULL;
59 SHA256_HASH_CTX ctxpool[TEST_BUFS];
60 unsigned char *bufs[TEST_BUFS];
61 uint32_t i, j, fail = 0;
62 uint32_t lens[TEST_BUFS];
63 unsigned int jobs, t;
1e59de90 64 int ret;
7c673cae
FG
65
66 printf("multibinary_sha256 test, %d sets of %dx%d max: ", RANDOMS, TEST_BUFS,
67 TEST_LEN);
68
69 srand(TEST_SEED);
70
1e59de90
TL
71 ret = posix_memalign((void *)&mgr, 16, sizeof(SHA256_HASH_CTX_MGR));
72 if ((ret != 0) || (mgr == NULL)) {
73 printf("posix_memalign failed test aborted\n");
74 return 1;
75 }
76
7c673cae
FG
77 sha256_ctx_mgr_init(mgr);
78
79 for (i = 0; i < TEST_BUFS; i++) {
80 // Allocate and fill buffer
81 bufs[i] = (unsigned char *)malloc(TEST_LEN);
82 if (bufs[i] == NULL) {
83 printf("malloc failed test aborted\n");
84 return 1;
85 }
86 rand_buffer(bufs[i], TEST_LEN);
87
88 // Init ctx contents
89 hash_ctx_init(&ctxpool[i]);
90 ctxpool[i].user_data = (void *)((uint64_t) i);
91
92 // SSL test
93 SHA256(bufs[i], TEST_LEN, digest_ssl[i]);
94
95 // sb_sha256 test
96 sha256_ctx_mgr_submit(mgr, &ctxpool[i], bufs[i], TEST_LEN, HASH_ENTIRE);
97 }
98
99 while (sha256_ctx_mgr_flush(mgr)) ;
100
101 for (i = 0; i < TEST_BUFS; i++) {
102 for (j = 0; j < SHA256_DIGEST_NWORDS; j++) {
103 if (ctxpool[i].job.result_digest[j] !=
1e59de90 104 to_be32(((uint32_t *) digest_ssl[i])[j])) {
7c673cae
FG
105 fail++;
106 printf("Test%d, digest%d fail %08X <=> %08X\n",
107 i, j, ctxpool[i].job.result_digest[j],
1e59de90 108 to_be32(((uint32_t *) digest_ssl[i])[j]));
7c673cae
FG
109 }
110 }
111 }
112 putchar('.');
113
114 // Run tests with random size and number of jobs
115 for (t = 0; t < RANDOMS; t++) {
116 jobs = rand() % (TEST_BUFS);
117
118 sha256_ctx_mgr_init(mgr);
119
120 for (i = 0; i < jobs; i++) {
1e59de90 121 // Random buffer with random len and contents
7c673cae
FG
122 lens[i] = rand() % (TEST_LEN);
123 rand_buffer(bufs[i], lens[i]);
124
125 // Run SSL test
126 SHA256(bufs[i], lens[i], digest_ssl[i]);
127
128 // Run sb_sha256 test
129 sha256_ctx_mgr_submit(mgr, &ctxpool[i], bufs[i], lens[i], HASH_ENTIRE);
130 }
131
132 while (sha256_ctx_mgr_flush(mgr)) ;
133
134 for (i = 0; i < jobs; i++) {
135 for (j = 0; j < SHA256_DIGEST_NWORDS; j++) {
136 if (ctxpool[i].job.result_digest[j] !=
1e59de90 137 to_be32(((uint32_t *) digest_ssl[i])[j])) {
7c673cae
FG
138 fail++;
139 printf("Test%d, digest%d fail %08X <=> %08X\n",
140 i, j, ctxpool[i].job.result_digest[j],
1e59de90 141 to_be32(((uint32_t *) digest_ssl[i])[j]));
7c673cae
FG
142 }
143 }
144 }
145 if (fail) {
146 printf("Test failed function check %d\n", fail);
147 return fail;
148 }
149
150 putchar('.');
151 fflush(0);
152 } // random test t
153
154 if (fail)
155 printf("Test failed function check %d\n", fail);
156 else
157 printf(" multibinary_sha256_ssl rand: Pass\n");
158
159 return fail;
160}