From 8974e0f2ead1c965482920492d87ca55c7cd3844 Mon Sep 17 00:00:00 2001 From: Zhi Guan Date: Fri, 27 Oct 2023 16:24:29 +0800 Subject: [PATCH] Remove unused files --- tools/README.md | 41 ------ tools/sm3speed.c | 155 -------------------- tools/sm4speed.c | 360 ----------------------------------------------- 3 files changed, 556 deletions(-) delete mode 100644 tools/README.md delete mode 100644 tools/sm3speed.c delete mode 100644 tools/sm4speed.c diff --git a/tools/README.md b/tools/README.md deleted file mode 100644 index 4d4dd0492..000000000 --- a/tools/README.md +++ /dev/null @@ -1,41 +0,0 @@ -# 命令行工具 - -注意: - -* 命令行工具接口在v3版本正式发布前还会有较大调整 -* SM2, SM3, SM4等算法的命令相对比较底层,是对C语言接口的简单封装,命令行的应用开发者需要组合使用这些指令 - -命令行工具: - -* `sm3` 计算SM3杂凑值,支持带公钥和ID的Z值计算 -* `sm3hmac` 计算SM3-HMAC值 -* `sm2keygen` 生成SM2密钥对,以PKCS #8口令加密的PEM格式存储 -* `sm2sign`,`sm2verify` SM2签名和验证,生成DER二进制编码的SM2签名值 -* `sm2encrypt`,`sm2decrypt` SM2加解密,注意只支持较短的消息加密 -* `reqgen` 生成PKCS #10证书签名请求PEM文件 -* `reqparse` 解析打印REQ文件 -* `reqsign` CA用私钥对REQ文件签名,生成证书 -* `certgen`生成自签名证书 -* `certparse` 解析打印证书 -* `certverify` 验证证书链 - -TLS功能 - -* `tlcp_client` -* `tlcp_server` -* `tls12_client` -* `tls12_server` -* `tls13_client` -* `tls13_server` - -私钥总是默认以口令加密的方式存储 -SM3/HMAC-SM3 以二进制的格式输出 -签名和SM2Ciphertext以DER编码输出 - - -应该提供一个口令导出密钥的算法,由口令导出密钥 - -SM4加密需要外部提供key, iv -HMAC-SM3可以用命令行的方式拼合 -因此没必要提供一个单独的SM4-CBC-HMAC-SM3 - diff --git a/tools/sm3speed.c b/tools/sm3speed.c deleted file mode 100644 index 42f6d401b..000000000 --- a/tools/sm3speed.c +++ /dev/null @@ -1,155 +0,0 @@ -/* - * Copyright 2014-2022 The GmSSL Project. All Rights Reserved. - * - * Licensed under the Apache License, Version 2.0 (the License); you may - * not use this file except in compliance with the License. - * - * http://www.apache.org/licenses/LICENSE-2.0 - */ - -#include -#include -#include -#include -#include -#include -#include - -#ifdef WIN32 -#include - -static volatile int finish; - -VOID CALLBACK TimerProc_sm3(HWND hwnd, UINT message, UINT iTimerID, DWORD dwTime) -{ - finish = 0; -} - -int test_sm3() -{ - int sizebox[] = {16, 64, 256, 1024, 8192, 16384}; - int countbox[6] = {0}; - uint8_t **testhex; - HCRYPTPROV hCryptProv; - - testhex = (uint8_t **)malloc(sizeof(uint8_t *) * 6); - for (int i = 0; i < 6; i++) - { - testhex[i] = (uint8_t *)malloc(sizebox[i]); - CryptGenRandom(hCryptProv, sizebox[i], testhex[i]); - } - - uint8_t dgst[32]; - int count; - - for (int i = 0; i < 6; i++) - { - finish = 1; - count = 0; - printf("Doing sm3 for 3s on %d size blocks: ", sizebox[i]); - UINT_PTR iTimerID = SetTimer(NULL, 0, 3000, TimerProc_sm3); - while (finish) - { - sm3_digest(testhex[i], sizebox[i], dgst); - count++; - } - KillTimer(NULL, iTimerID); - countbox[i] = count; - printf("%d sm3's in 3s\n", count); - } - printf("type\t\t16 bytes\t64 bytes\t256 bytes\t1024 bytes\t8192 bytes\t16384 bytes\n"); - printf("sm3\t"); - for (int i = 0; i < 6; i++) - { - printf("\t%.2fK", countbox[i] * sizebox[i] / 1024 / 3.00); - } - printf("\n"); - - for (int i = 0; i < 6; i++) - { - free(testhex[i]); - } - free(testhex); - return 1; -} -#else -#include -#include - -static volatile int finish; - -void sig_alm_handler_sm3(int sig_num) -{ - if (sig_num = SIGALRM) - finish = 0; -} - -int test_sm3() -{ - int sizebox[] = {16, 64, 256, 1024, 8192, 16384}; - int countbox[6] = {0}; - uint8_t **testhex; - - FILE *fs_p = fopen("/dev/urandom", "r"); - if (NULL == fs_p) - { - printf("Can not open /dev/urandom\n"); - return -1; - } - - testhex = (uint8_t **)malloc(sizeof(uint8_t *) * 6); - for (int i = 0; i < 6; i++) - { - testhex[i] = (uint8_t *)malloc(sizebox[i]); - fread(testhex[i], sizebox[i], 1, fs_p); - } - - fclose(fs_p); - - uint8_t dgst[32]; - int count; - - signal(SIGALRM, sig_alm_handler_sm3); - - struct itimerval new_value, old_value; - new_value.it_value.tv_sec = 3; - new_value.it_value.tv_usec = 0; - new_value.it_interval.tv_sec = 0; - new_value.it_interval.tv_usec = 0; - - for (int i = 0; i < 6; i++) - { - finish = 1; - count = 0; - printf("Doing sm3 for 3s on %d size blocks: ", sizebox[i]); - setitimer(ITIMER_REAL, &new_value, &old_value); - while (finish) - { - sm3_digest(testhex[i], sizebox[i], dgst); - count++; - } - countbox[i] = count; - printf("%d sm3's in 3s\n", count); - } - printf("type\t\t16 bytes\t64 bytes\t256 bytes\t1024 bytes\t8192 bytes\t16384 bytes\n"); - printf("sm3\t"); - for (int i = 0; i < 6; i++) - { - printf("\t%.2fK", countbox[i] * sizebox[i] / 1024 / 3.00); - } - printf("\n"); - - for (int i = 0; i < 6; i++) - { - free(testhex[i]); - } - free(testhex); - return 1; -} -#endif - -int sm3speed_main(void) -{ - test_sm3(); - return 1; -} diff --git a/tools/sm4speed.c b/tools/sm4speed.c deleted file mode 100644 index cc90b4555..000000000 --- a/tools/sm4speed.c +++ /dev/null @@ -1,360 +0,0 @@ -/* - * Copyright 2014-2022 The GmSSL Project. All Rights Reserved. - * - * Licensed under the Apache License, Version 2.0 (the License); you may - * not use this file except in compliance with the License. - * - * http://www.apache.org/licenses/LICENSE-2.0 - */ - -#include -#include -#include -#include -#include -#include -#include - -#ifdef WIN32 -#include - -static volatile int finish; - -VOID CALLBACK TimerProc_sm4(HWND hwnd, UINT message, UINT iTimerID, DWORD dwTime) -{ - finish = 0; -} - -int test_sm4() -{ - uint8_t user_key[16] = { - 0x01, - 0x23, - 0x45, - 0x67, - 0x89, - 0xab, - 0xcd, - 0xef, - 0xfe, - 0xdc, - 0xba, - 0x98, - 0x76, - 0x54, - 0x32, - 0x10, - }; - uint8_t iv[16] = { - 0x01, - 0x23, - 0x45, - 0x67, - 0x89, - 0xab, - 0xcd, - 0xef, - 0xfe, - 0xdc, - 0xba, - 0x98, - 0x76, - 0x54, - 0x32, - 0x10, - }; - uint8_t ctr[16] = {0}; - uint8_t mac[16] = {0}; - uint8_t aad[16] = { - 0x01, - 0x23, - 0x45, - 0x67, - 0x89, - 0xab, - 0xcd, - 0xef, - 0xfe, - 0xdc, - 0xba, - 0x98, - 0x76, - 0x54, - 0x32, - 0x10, - }; - uint8_t out[16384] = {0}; - - SM4_KEY key; - int sizebox[] = {16, 64, 256, 1024, 8192, 16384}; - int countbox[18] = {0}; - uint8_t *testhex[]; - HCRYPTPROV hCryptProv; - - testhex = (uint8_t **)malloc(sizeof(uint8_t *) * 6); - for (int i = 0; i < 6; i++) - { - testhex[i] = (uint8_t *)malloc(sizebox[i]); - CryptGenRandom(hCryptProv, sizebox[i], testhex[i]); - } - - int count; - - sm4_set_encrypt_key(&key, user_key); - - for (int i = 0; i < 6; i++) - { - finish = 1; - count = 0; - printf("Doing sm4-cbc for 3s on %d size blocks: ", sizebox[i]); - UINT_PTR iTimerID = SetTimer(NULL, 0, 3000, TimerProc_sm4); - while (finish) - { - sm4_cbc_encrypt(&key, iv, testhex[i], sizebox[i] / 16, out); - count++; - } - KillTimer(NULL, iTimerID); - countbox[i] = count; - printf("%d sm4-cbc's in 3s\n", count); - } - for (int i = 0; i < 6; i++) - { - finish = 1; - count = 0; - printf("Doing sm4-ctr for 3s on %d size blocks: ", sizebox[i]); - UINT_PTR iTimerID = SetTimer(NULL, 0, 3000, TimerProc); - while (finish) - { - sm4_ctr_encrypt(&key, ctr, testhex[i], sizebox[i], out); - count++; - } - KillTimer(NULL, iTimerID); - countbox[i + 6] = count; - printf("%d sm4-ctr's in 3s\n", count); - } - for (int i = 0; i < 6; i++) - { - finish = 1; - count = 0; - printf("Doing sm4-gcm for 3s on %d size blocks: ", sizebox[i]); - UINT_PTR iTimerID = SetTimer(NULL, 0, 3000, TimerProc); - while (finish) - { - sm4_gcm_encrypt(&key, iv, 16, aad, 16, testhex[i], sizebox[i], out, 16, mac); - count++; - } - KillTimer(NULL, iTimerID); - countbox[i + 12] = count; - printf("%d sm4-gcm's in 3s\n", count); - } - printf("type\t\t16 bytes\t64 bytes\t256 bytes\t1024 bytes\t8192 bytes\t16384 bytes\n"); - printf("sm4-cbc\t"); - for (int i = 0; i < 6; i++) - { - printf("\t%.2fK", countbox[i] * sizebox[i] / 1024 / 3.00); - } - printf("\n"); - printf("sm4-ctr\t"); - for (int i = 0; i < 6; i++) - { - printf("\t%.2fK", countbox[i + 6] * sizebox[i] / 1024 / 3.00); - } - printf("\n"); - printf("sm4-gcm\t"); - for (int i = 0; i < 6; i++) - { - printf("\t%.2fK", countbox[i + 12] * sizebox[i] / 1024 / 3.00); - } - printf("\n"); - - for (int i = 0; i < 6; i++) - { - free(testhex[i]); - } - free(testhex); - return 1; -} - -#else -#include -#include - -static volatile int finish; - -void sig_alm_handler_sm4(int sig_num) -{ - if (sig_num = SIGALRM) - finish = 0; -} - -int test_sm4() -{ - uint8_t user_key[16] = { - 0x01, - 0x23, - 0x45, - 0x67, - 0x89, - 0xab, - 0xcd, - 0xef, - 0xfe, - 0xdc, - 0xba, - 0x98, - 0x76, - 0x54, - 0x32, - 0x10, - }; - uint8_t iv[16] = { - 0x01, - 0x23, - 0x45, - 0x67, - 0x89, - 0xab, - 0xcd, - 0xef, - 0xfe, - 0xdc, - 0xba, - 0x98, - 0x76, - 0x54, - 0x32, - 0x10, - }; - uint8_t ctr[16] = {0}; - uint8_t mac[16] = {0}; - uint8_t aad[16] = { - 0x01, - 0x23, - 0x45, - 0x67, - 0x89, - 0xab, - 0xcd, - 0xef, - 0xfe, - 0xdc, - 0xba, - 0x98, - 0x76, - 0x54, - 0x32, - 0x10, - }; - uint8_t out[16384] = {0}; - int count; - - SM4_KEY key; - int sizebox[] = {16, 64, 256, 1024, 8192, 16384}; - int countbox[18] = {0}; - uint8_t **testhex; - - FILE *fs_p = fopen("/dev/urandom", "r"); - if (NULL == fs_p) - { - printf("Can not open /dev/urandom\n"); - return -1; - } - - testhex = (uint8_t **)malloc(sizeof(uint8_t *) * 6); - for (int i = 0; i < 6; i++) - { - testhex[i] = (uint8_t *)malloc(sizebox[i]); - fread(testhex[i], sizebox[i], 1, fs_p); - } - - fclose(fs_p); - - signal(SIGALRM, sig_alm_handler_sm4); - - struct itimerval new_value, old_value; - new_value.it_value.tv_sec = 3; - new_value.it_value.tv_usec = 0; - new_value.it_interval.tv_sec = 0; - new_value.it_interval.tv_usec = 0; - - sm4_set_encrypt_key(&key, user_key); - - for (int i = 0; i < 6; i++) - { - finish = 1; - count = 0; - printf("Doing sm4-cbc for 3s on %d size blocks: ", sizebox[i]); - setitimer(ITIMER_REAL, &new_value, &old_value); - while (finish) - { - sm4_cbc_encrypt(&key, iv, testhex[i], sizebox[i] / 16, out); - count++; - } - - countbox[i] = count; - printf("%d sm4-cbc's in 3s\n", count); - } - for (int i = 0; i < 6; i++) - { - finish = 1; - count = 0; - printf("Doing sm4-ctr for 3s on %d size blocks: ", sizebox[i]); - setitimer(ITIMER_REAL, &new_value, &old_value); - while (finish) - { - sm4_ctr_encrypt(&key, ctr, testhex[i], sizebox[i], out); - count++; - } - - countbox[i + 6] = count; - printf("%d sm4-ctr's in 3s\n", count); - } - for (int i = 0; i < 6; i++) - { - finish = 1; - count = 0; - printf("Doing sm4-gcm for 3s on %d size blocks: ", sizebox[i]); - setitimer(ITIMER_REAL, &new_value, &old_value); - while (finish) - { - sm4_gcm_encrypt(&key, iv, 16, aad, 16, testhex[i], sizebox[i], out, 16, mac); - count++; - } - countbox[i + 12] = count; - printf("%d sm4-gcm's in 3s\n", count); - } - printf("type\t\t16 bytes\t64 bytes\t256 bytes\t1024 bytes\t8192 bytes\t16384 bytes\n"); - printf("sm4-cbc\t"); - for (int i = 0; i < 6; i++) - { - printf("\t%.2fK", countbox[i] * sizebox[i] / 1024 / 3.00); - } - printf("\n"); - printf("sm4-ctr\t"); - for (int i = 0; i < 6; i++) - { - printf("\t%.2fK", countbox[i + 6] * sizebox[i] / 1024 / 3.00); - } - printf("\n"); - printf("sm4-gcm\t"); - for (int i = 0; i < 6; i++) - { - printf("\t%.2fK", countbox[i + 12] * sizebox[i] / 1024 / 3.00); - } - printf("\n"); - - for (int i = 0; i < 6; i++) - { - free(testhex[i]); - } - free(testhex); - return 1; -} - -#endif - -int sm4speed_main(void) -{ - test_sm4(); - return 1; -}