VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Main/Forms/BenchmarkDialog.cpp
blob: 5d17414eb15a94771a63fd9b7a702b2a31ecf74d (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
/*
 Derived from source code of TrueCrypt 7.1a, which is
 Copyright (c) 2008-2012 TrueCrypt Developers Association and which is governed
 by the TrueCrypt License 3.0.

 Modifications and additions to the original source code (contained in this file) 
 and all other portions of this file are Copyright (c) 2013-2015 IDRIX
 and are governed by the Apache License 2.0 the full text of which is
 contained in the file License.txt included in VeraCrypt binary and source
 code distribution packages.
*/

#include "System.h"
#include "Volume/EncryptionModeXTS.h"
#include "Main/GraphicUserInterface.h"
#include "BenchmarkDialog.h"

namespace VeraCrypt
{
	BenchmarkDialog::BenchmarkDialog (wxWindow *parent)
		: BenchmarkDialogBase (parent)
	{
		BenchmarkNoteStaticText->SetLabel (LangString["IDT_BOX_BENCHMARK_INFO"]);
		BenchmarkNoteStaticText->Wrap (RightSizer->GetSize().GetWidth());

		list <size_t> bufferSizes;
		bufferSizes.push_back (1 * BYTES_PER_MB);
		bufferSizes.push_back (5 * BYTES_PER_MB);
		bufferSizes.push_back (10 * BYTES_PER_MB);
		bufferSizes.push_back (50 * BYTES_PER_MB);
		bufferSizes.push_back (100 * BYTES_PER_MB);
		bufferSizes.push_back (200 * BYTES_PER_MB);
		bufferSizes.push_back (500 * BYTES_PER_MB);
		bufferSizes.push_back (1 * BYTES_PER_GB);

		foreach (size_t size, bufferSizes)
		{
			BufferSizeChoice->Append (Gui->SizeToString (size), (void *) size);
		}

		BufferSizeChoice->Select (1);

		list <int> colPermilles;
		BenchmarkListCtrl->InsertColumn (ColumnAlgorithm, LangString["ALGORITHM"], wxLIST_FORMAT_LEFT, 1);
		colPermilles.push_back (322);

		BenchmarkListCtrl->InsertColumn (ColumnEncryption, LangString["ENCRYPTION"], wxLIST_FORMAT_RIGHT, 1);
		colPermilles.push_back (226);

		BenchmarkListCtrl->InsertColumn (ColumnDecryption, LangString["DECRYPTION"], wxLIST_FORMAT_RIGHT, 1);
		colPermilles.push_back (226);

		BenchmarkListCtrl->InsertColumn (ColumnMean, LangString["MEAN"], wxLIST_FORMAT_RIGHT, 1);
		colPermilles.push_back (226);

		Gui->SetListCtrlWidth (BenchmarkListCtrl, 62, false);
		Gui->SetListCtrlHeight (BenchmarkListCtrl, 14);
		Gui->SetListCtrlColumnWidths (BenchmarkListCtrl, colPermilles);

		Layout();
		Fit();
		Center();
	}

	void BenchmarkDialog::OnBenchmarkButtonClick (wxCommandEvent& event)
	{
		list <BenchmarkResult> results;

		wxBusyCursor busy;
		Buffer buffer ((size_t) Gui->GetSelectedData <size_t> (BufferSizeChoice));
			
		BenchmarkThreadRoutine routine(this, results, buffer);
		Gui->ExecuteWaitThreadRoutine (this, &routine);

		BenchmarkListCtrl->DeleteAllItems();

		foreach (const BenchmarkResult &result, results)
		{
			vector <wstring> fields (BenchmarkListCtrl->GetColumnCount());
					
			fields[ColumnAlgorithm] = result.AlgorithmName;
			fields[ColumnEncryption] = Gui->SpeedToString (result.EncryptionSpeed);
			fields[ColumnDecryption] = Gui->SpeedToString (result.DecryptionSpeed);
			fields[ColumnMean] = Gui->SpeedToString (result.MeanSpeed);

			Gui->AppendToListCtrl (BenchmarkListCtrl, fields);
		}
		
		BenchmarkListCtrl->SetColumnWidth(0, wxLIST_AUTOSIZE);
	}
	
	void BenchmarkDialog::DoBenchmark (list<BenchmarkResult>& results, Buffer& buffer)
	{
		try
		{
			EncryptionAlgorithmList encryptionAlgorithms = EncryptionAlgorithm::GetAvailableAlgorithms();
			foreach (shared_ptr <EncryptionAlgorithm> ea, encryptionAlgorithms)
			{
				if (!ea->IsDeprecated())
				{
					BenchmarkResult result;
					result.AlgorithmName = ea->GetName(true);

					Buffer key (ea->GetKeySize());
					ea->SetKey (key);

					shared_ptr <EncryptionMode> xts (new EncryptionModeXTS);
					xts->SetKey (key);
					ea->SetMode (xts);

					wxLongLong startTime = wxGetLocalTimeMillis();

					// CPU "warm up" (an attempt to prevent skewed results on systems where CPU frequency gradually changes depending on CPU load).
					do
					{
						ea->EncryptSectors (buffer, 0, buffer.Size() / ENCRYPTION_DATA_UNIT_SIZE, ENCRYPTION_DATA_UNIT_SIZE);
					}
					while (wxGetLocalTimeMillis().GetValue() - startTime.GetValue() < 20);

					uint64 size = 0;
					uint64 time;
					startTime = wxGetLocalTimeMillis();

					do
					{
						ea->EncryptSectors (buffer, 0, buffer.Size() / ENCRYPTION_DATA_UNIT_SIZE, ENCRYPTION_DATA_UNIT_SIZE);
						size += buffer.Size();
						time = (uint64) (wxGetLocalTimeMillis().GetValue() - startTime.GetValue());
					}
					while (time < 100);

					result.EncryptionSpeed = size * 1000 / time;

					startTime = wxGetLocalTimeMillis();
					size = 0;

					do
					{
						ea->DecryptSectors (buffer, 0, buffer.Size() / ENCRYPTION_DATA_UNIT_SIZE, ENCRYPTION_DATA_UNIT_SIZE);
						size += buffer.Size();
						time = (uint64) (wxGetLocalTimeMillis().GetValue() - startTime.GetValue());
					}
					while (time < 100);

					result.DecryptionSpeed = size * 1000 / time;
					result.MeanSpeed = (result.EncryptionSpeed + result.DecryptionSpeed) / 2;

					bool inserted = false;
					for (list <BenchmarkResult>::iterator i = results.begin(); i != results.end(); ++i)
					{
						if (i->MeanSpeed < result.MeanSpeed)
						{
							results.insert (i, result);
							inserted = true;
							break;
						}
					}

					if (!inserted)
						results.push_back (result);
				}
			}

		}
		catch (exception &e)
		{
			Gui->ShowError (e);
		}
	}
}
an class="o">+ rsi*4] shr edx, 16 ; 3-4 ���� movzx edi, dl xor r13d, dword [r8 + 32 + 256*4 + rdi*4] movzx esi, dh xor r13d, dword [r8 + 32 + rsi*4] mov ecx, [r8 + %2*4] ; read key ; 2nd ; 1-2 byte add ebx, r11d; ; add key movzx r15d, bl; movzx ebp, bh; xor r10d, dword [r8 + 32 + 256*3*4 + r15*4] xor r10d, dword [r8 + 32 + 256*2*4 + rbp*4] shr ebx, 16 ; 3-4 ���� movzx r15d, bl xor r10d, dword [r8 + 32 + 256*4 + r15*4] movzx ebp, bh xor r10d, dword [r8 + 32 + rbp*4] mov eax, [r8 + %2*4] ; read key %endmacro ; input: r8 - &key, rcx - &IN ; returns: (r13) & (r10) GostEncrypt2x64: ; 1st mov r13d, [rcx] mov r14, [rcx] shr r14, 32 ; 2nd mov r10d, [rcx + 16] mov r11, [rcx + 16] shr r11, 32 mov ecx, [r8] mov eax, ecx gost_round2 1, 2 gost_round2 3, 4 gost_round2 5, 6 gost_round2 7, 0 gost_round2 1, 2 gost_round2 3, 4 gost_round2 5, 6 gost_round2 7, 0 gost_round2 1, 2 gost_round2 3, 4 gost_round2 5, 6 gost_round2 7, 7 gost_round2 6, 5 gost_round2 4, 3 gost_round2 2, 1 gost_round2 0, 0 shl r13, 32 ; combine or r13, r14 shl r10, 32 ; combine or r10, r11 ret ; input: r8 - &key, rcx - &IN ; returns: (r13) & (r10) GostDecrypt2x64: ; 1st mov r13d, [rcx] mov r14, [rcx] shr r14, 32 ; 2nd mov r10d, [rcx + 16] mov r11, [rcx + 16] shr r11, 32 mov ecx, [r8] mov eax, ecx gost_round2 1, 2 gost_round2 3, 4 gost_round2 5, 6 gost_round2 7, 7 gost_round2 6, 5 gost_round2 4, 3 gost_round2 2, 1 gost_round2 0, 7 gost_round2 6, 5 gost_round2 4, 3 gost_round2 2, 1 gost_round2 0, 7 gost_round2 6, 5 gost_round2 4, 3 gost_round2 2, 1 gost_round2 0, 0 shl r13, 32 ; combine or r13, r14 shl r10, 32 ; combine or r10, r11 ret ;/////////////////////////////////////////////////////////////////// ;// Crypting 1 block ;/////////////////////////////////////////////////////////////////// %macro gost_round1 2 ; 1 - pos1, 2 - pos2 ; 1-2 byte add ecx, r13d ; add key movzx edi, cl movzx esi, ch xor r14d, dword [r8 + 32 + 256*3*4 + rdi*4] xor r14d, dword [r8 + 32 + 256*2*4 + rsi*4] shr ecx, 16 ; 3-4 ���� movzx edi, cl xor r14d, dword [r8 + 32 + 256*4 + rdi*4] movzx esi, ch xor r14d, dword [r8 + 32 + rsi*4] mov edx, [r8 + %1*4] ; read key for second step ; second step ; 1-2 byte add edx, r14d ; add key movzx edi, dl movzx esi, dh xor r13d, dword [r8 + 32 + 256*3*4 + rdi*4] xor r13d, dword [r8 + 32 + 256*2*4 + rsi*4] shr edx, 16 ; 3-4 ���� movzx edi, dl xor r13d, dword [r8 + 32 + 256*4 + rdi*4] movzx esi, dh xor r13d, dword [r8 + 32 + rsi*4] mov ecx, [r8 + %2*4] ; read key %endmacro ; input: r8 - &gost_kds rcx - &IN ; returns: r13 GostEncrypt1x64: mov r13d, [rcx] mov r14, [rcx] shr r14, 32 mov ecx, [r8] gost_round1 1, 2 gost_round1 3, 4 gost_round1 5, 6 gost_round1 7, 0 gost_round1 1, 2 gost_round1 3, 4 gost_round1 5, 6 gost_round1 7, 0 gost_round1 1, 2 gost_round1 3, 4 gost_round1 5, 6 gost_round1 7, 7 gost_round1 6, 5 gost_round1 4, 3 gost_round1 2, 1 gost_round1 0, 0 shl r13, 32 ; combine or r13, r14 ret ; input: r8 - &gost_kds rcx - IN ; returns: r13 GostDecrypt1x64: mov r13d, [rcx] mov r14, [rcx] shr r14, 32 mov ecx, [r8] gost_round1 1, 2 gost_round1 3, 4 gost_round1 5, 6 gost_round1 7, 7 gost_round1 6, 5 gost_round1 4, 3 gost_round1 2, 1 gost_round1 0, 7 gost_round1 6, 5 gost_round1 4, 3 gost_round1 2, 1 gost_round1 0, 7 gost_round1 6, 5 gost_round1 4, 3 gost_round1 2, 1 gost_round1 0, 0 shl r13, 32 ; combine or r13, r14 ret global gost_encrypt_128_CBC_asm ; gost_encrypt_128_CBC_asm(uint64* in, uint64* out, gost_kds* kds, uint64 count); ; rcx - &in ; rdx - &out ; r8 - &gost_kds ; r9 - count gost_encrypt_128_CBC_asm: SaveRegs ; Saving sub rsp, 32 mov [rsp], rdx ; Save out addr mov [rsp + 8], rcx ; Save in addr mov [rsp + 16], r8 ; key addr .do: mov [rsp + 24], r9 ; Save count cmp r9, 2 jge .blk2 cmp r9, 1 jge .blk1 jmp .end ; One 128 block encryption .blk1: mov rcx, [rsp + 8] ; set in addr call GostEncrypt1x64 mov rdx, [rsp] ; Restore out mov rcx, [rsp + 8] ; restore in mov [rdx], r13 mov rax, [rcx + 8] xor rax, r13 ; CBC add rdx, 8 ;next 8 bytes mov [rdx], rax mov rcx, rdx call GostEncrypt1x64 mov rdx, [rsp] ; Restore out addr mov rcx, [rsp+8] ; Restore in addr mov [rdx + 8], r13 add rdx,16 mov [rsp], rdx add rcx, 16 mov [rsp+8], rcx mov r9, [rsp + 24] dec r9 jmp .do .blk2: mov rcx, [rsp + 8] ; set in addr call GostEncrypt2x64 mov rdx, [rsp] ; Restore out mov rcx, [rsp + 8] ; restore in mov [rdx], r13 mov rax, [rcx + 8] xor rax, r13 ; CBC mov [rdx + 16], r10 mov rbx, [rcx + 24] xor rbx, r10 ; CBC mov [rdx + 8], rax mov [rdx + 24], rbx add rdx, 8 ;next 8 bytes mov rcx, rdx call GostEncrypt2x64 mov rdx, [rsp] ; Restore out addr mov rcx, [rsp+8] ; Restore in addr mov [rdx + 8], r13 mov [rdx + 24], r10 add rdx,32 mov [rsp], rdx add rcx, 32 mov [rsp+8], rcx mov r9, [rsp + 24] sub r9, 2 jmp .do .end: add rsp, 32 ; Load out addr RestoreRegs ; Load ret global gost_decrypt_128_CBC_asm ; gost_decrypt_128_CBC_asm(uint64* in, uint64* out, const gost_kds* kds, uint64 count); ; rcx - &in ; rdx - &out ; r8 - &gost_kds ; r9 - count gost_decrypt_128_CBC_asm: SaveRegs ; Saving sub rsp, 32 mov [rsp], rdx ; Save out addr mov [rsp+8], rcx ; Save in addr mov [rsp+16], r8 ; key addr .do: mov [rsp + 24], r9 ; Save count cmp r9, 2 jge .blk2 cmp r9, 1 jge .blk1 jmp .end ; One 128 block decryption .blk1: add rcx, 8 call GostDecrypt1x64 mov rdx, [rsp] ; Restore out mov rcx, [rsp + 8] ; Restore in mov rax, [rcx] xor rax, r13 ; CBC mov [rdx + 8], rax call GostDecrypt1x64 mov rdx, [rsp] ; Restore out addr mov rcx, [rsp+8] ; Restore in addr mov [rdx], r13 add rdx,16 mov [rsp], rdx add rcx, 16 mov [rsp+8], rcx mov r9, [rsp + 24] dec r9 jmp .do .blk2: add rcx, 8 call GostDecrypt2x64 mov rdx, [rsp] ; Restore out mov rcx, [rsp + 8] ; Restore in mov rax, [rcx] xor rax, r13 ; CBC mov [rdx + 8], rax mov rbx, [rcx+16] xor rbx, r10 ; CBC mov [rdx + 24], rbx call GostDecrypt2x64 mov rdx, [rsp] ; Restore out addr mov rcx, [rsp+8] ; Restore in addr mov [rdx], r13 mov [rdx+16], r10 add rdx,32 mov [rsp], rdx add rcx,32 mov [rsp+8], rcx mov r9, [rsp + 24] sub r9, 2 jmp .do .end: add rsp, 32 ; Load out addr RestoreRegs ; Load ret