diff options
author | James Almer <jamrial@gmail.com> | 2015-08-02 15:13:13 -0300 |
---|---|---|
committer | James Almer <jamrial@gmail.com> | 2015-08-13 13:45:14 -0300 |
commit | 1184795db6344e9aaa87f4db3b6438752839f01e (patch) | |
tree | e2b3e1af1ade115fccea0ee795581723bcb6f3ac /tools | |
parent | 7727f76230e60c9da881a51e53f6d34f249fa2fd (diff) | |
download | ffmpeg-1184795db6344e9aaa87f4db3b6438752839f01e.tar.gz |
crypto_bench: add support for blowfish
Reviewed-by: Nicolas George <george@nsup.org>
Signed-off-by: James Almer <jamrial@gmail.com>
Diffstat (limited to 'tools')
-rw-r--r-- | tools/crypto_bench.c | 45 |
1 files changed, 45 insertions, 0 deletions
diff --git a/tools/crypto_bench.c b/tools/crypto_bench.c index 79629bcaf8..d1e7c300c4 100644 --- a/tools/crypto_bench.c +++ b/tools/crypto_bench.c @@ -75,6 +75,7 @@ struct hash_impl { #include "libavutil/sha512.h" #include "libavutil/ripemd.h" #include "libavutil/aes.h" +#include "libavutil/blowfish.h" #include "libavutil/camellia.h" #include "libavutil/cast5.h" #include "libavutil/twofish.h" @@ -114,6 +115,16 @@ static void run_lavu_aes128(uint8_t *output, av_aes_crypt(aes, output, input, size >> 4, NULL, 0); } +static void run_lavu_blowfish(uint8_t *output, + const uint8_t *input, unsigned size) +{ + static struct AVBlowfish *blowfish; + if (!blowfish && !(blowfish = av_blowfish_alloc())) + fatal_error("out of memory"); + av_blowfish_init(blowfish, hardcoded_key, 16); + av_blowfish_crypt(blowfish, output, input, size >> 3, NULL, 0); +} + static void run_lavu_camellia(uint8_t *output, const uint8_t *input, unsigned size) { @@ -153,6 +164,7 @@ static void run_lavu_twofish(uint8_t *output, #include <openssl/sha.h> #include <openssl/ripemd.h> #include <openssl/aes.h> +#include <openssl/blowfish.h> #include <openssl/camellia.h> #include <openssl/cast.h> @@ -181,6 +193,17 @@ static void run_crypto_aes128(uint8_t *output, AES_encrypt(input + i, output + i, &aes); } +static void run_crypto_blowfish(uint8_t *output, + const uint8_t *input, unsigned size) +{ + BF_KEY blowfish; + unsigned i; + + BF_set_key(&blowfish, 16, hardcoded_key); + for (i = 0; i < size; i += 8) + BF_ecb_encrypt(input + i, output + i, &blowfish, 1); +} + static void run_crypto_camellia(uint8_t *output, const uint8_t *input, unsigned size) { @@ -240,6 +263,16 @@ static void run_gcrypt_aes128(uint8_t *output, gcry_cipher_encrypt(aes, output, size, input, size); } +static void run_gcrypt_blowfish(uint8_t *output, + const uint8_t *input, unsigned size) +{ + static gcry_cipher_hd_t blowfish; + if (!blowfish) + gcry_cipher_open(&blowfish, GCRY_CIPHER_BLOWFISH, GCRY_CIPHER_MODE_ECB, 0); + gcry_cipher_setkey(blowfish, hardcoded_key, 16); + gcry_cipher_encrypt(blowfish, output, size, input, size); +} + static void run_gcrypt_camellia(uint8_t *output, const uint8_t *input, unsigned size) { @@ -311,6 +344,17 @@ static void run_tomcrypt_aes128(uint8_t *output, aes_ecb_encrypt(input + i, output + i, &aes); } +static void run_tomcrypt_blowfish(uint8_t *output, + const uint8_t *input, unsigned size) +{ + symmetric_key blowfish; + unsigned i; + + blowfish_setup(hardcoded_key, 16, 0, &blowfish); + for (i = 0; i < size; i += 8) + blowfish_ecb_encrypt(input + i, output + i, &blowfish); +} + static void run_tomcrypt_camellia(uint8_t *output, const uint8_t *input, unsigned size) { @@ -431,6 +475,7 @@ struct hash_impl implementations[] = { IMPL_ALL("AES-128", aes128, "crc:ff6bc888") IMPL_ALL("CAMELLIA", camellia, "crc:7abb59a7") IMPL_ALL("CAST-128", cast128, "crc:456aa584") + IMPL_ALL("BLOWFISH", blowfish, "crc:33e8aa74") IMPL(lavu, "TWOFISH", twofish, "crc:9edbd5c1") IMPL(gcrypt, "TWOFISH", twofish, "crc:9edbd5c1") IMPL(tomcrypt, "TWOFISH", twofish, "crc:9edbd5c1") |