Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add 'rand' algorithm to speed tool #4481

Closed
wants to merge 1 commit into from
Closed

Conversation

p-steuer
Copy link
Member

@p-steuer p-steuer commented Oct 7, 2017

Id like to be able to measure DRBG performance using the speed tool.

Heres a suggestion.

Copy link
Contributor

@richsalz richsalz left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

people won't think of 'rand' as a crypto alg, so some doc update is needed. this is good, tho!

apps/speed.c Outdated
loopargs_t *tempargs = *(loopargs_t **) args;
unsigned char *buf = tempargs->buf;
int count;
for (count = 0; COND(c[D_RAND][testnum]); count++)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

blank line after declarations

Signed-off-by: Patrick Steuer <patrick.steuer@de.ibm.com>
@p-steuer
Copy link
Member Author

p-steuer commented Oct 7, 2017

added speed(1) update. i chose 'rand' to be consistent with the openssl rand tool.
other options would be 'csprng' (consistent with rand_add(3) doc) or 'drbg' (consistent with nist terminology).

@@ -20,7 +20,8 @@ B<openssl speed>

This command is used to test the performance of cryptographic algorithms.
To see the list of supported algorithms, use the I<list --digest-commands>
or I<list --cipher-commands> command.
or I<list --cipher-commands> command. The global CSPRNG is denoted by
I<rand>.
Copy link
Contributor

@paulidale paulidale Oct 8, 2017

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

by the rand algorithm name.

@paulidale
Copy link
Contributor

We've got multiple different DRBGs now, might it make sense to parameterise this option to allow each to be chosen individually?

@richsalz
Copy link
Contributor

richsalz commented Oct 8, 2017

For now they're just different instances of all the same algorithm, so i think parameterization is more than we need.

Copy link
Contributor

@paulidale paulidale left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Fair enough. With CHACHA coming this might change.

I'll approve irrespective of the documentation NIT I raised.

@richsalz richsalz added the approval: done This pull request has the required number of approvals label Oct 9, 2017
@richsalz
Copy link
Contributor

I made the wording change to the doc and merged. Thanks!

@richsalz richsalz closed this Oct 10, 2017
levitte pushed a commit that referenced this pull request Oct 10, 2017
Signed-off-by: Patrick Steuer <patrick.steuer@de.ibm.com>

Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Rich Salz <rsalz@openssl.org>
(Merged from #4481)
@p-steuer p-steuer deleted the speed branch October 16, 2017 13:36
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approval: done This pull request has the required number of approvals
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants