#include "fio.h"
+#include "md5.h"
+#include "crc64.h"
+#include "crc32.h"
+#include "crc16.h"
+#include "crc7.h"
+#include "sha256.h"
+#include "sha512.h"
+
static void fill_random_bytes(struct thread_data *td, void *p, unsigned int len)
{
unsigned int todo;
log_info("\n");
}
+/*
+ * Prepare for seperation of verify_header and checksum header
+ */
+static inline unsigned int __hdr_size(int fio_unused verify_type)
+{
+ return sizeof(struct verify_header);
+
+}
+
+static inline unsigned int hdr_size(struct verify_header *hdr)
+{
+ return sizeof(*hdr);
+}
+
/*
* Return data area 'header_num'
*/
struct io_u *io_u,
unsigned char header_num)
{
- return io_u->buf + sizeof(*hdr) + header_num * hdr->len;
+ return io_u->buf + header_num * hdr->len + hdr_size(hdr);
+}
+
+static int verify_io_u_sha512(struct verify_header *hdr, struct io_u *io_u,
+ unsigned int header_num)
+{
+ void *p = io_u_verify_off(hdr, io_u, header_num);
+ uint8_t sha512[128];
+ struct sha512_ctx sha512_ctx = {
+ .buf = sha512,
+ };
+
+ sha512_init(&sha512_ctx);
+ sha512_update(&sha512_ctx, p, hdr->len - hdr_size(hdr));
+
+ if (memcmp(hdr->sha512, sha512_ctx.buf, sizeof(sha512))) {
+ log_err("sha512: verify failed at %llu/%u\n",
+ io_u->offset + header_num * hdr->len,
+ hdr->len);
+ hexdump(hdr->sha512, sizeof(hdr->sha512));
+ hexdump(sha512_ctx.buf, sizeof(sha512));
+ return 1;
+ }
+
+ return 0;
+}
+
+static int verify_io_u_sha256(struct verify_header *hdr, struct io_u *io_u,
+ unsigned int header_num)
+{
+ void *p = io_u_verify_off(hdr, io_u, header_num);
+ uint8_t sha256[128];
+ struct sha256_ctx sha256_ctx = {
+ .buf = sha256,
+ };
+
+ sha256_init(&sha256_ctx);
+ sha256_update(&sha256_ctx, p, hdr->len - hdr_size(hdr));
+
+ if (memcmp(hdr->sha256, sha256_ctx.buf, sizeof(sha256))) {
+ log_err("sha256: verify failed at %llu/%u\n",
+ io_u->offset + header_num * hdr->len,
+ hdr->len);
+ hexdump(hdr->sha256, sizeof(hdr->sha256));
+ hexdump(sha256_ctx.buf, sizeof(sha256));
+ return 1;
+ }
+
+ return 0;
}
static int verify_io_u_crc7(struct verify_header *hdr, struct io_u *io_u,
void *p = io_u_verify_off(hdr, io_u, header_num);
unsigned char c;
- c = crc7(p, hdr->len - sizeof(*hdr));
+ c = crc7(p, hdr->len - hdr_size(hdr));
if (c != hdr->crc7) {
log_err("crc7: verify failed at %llu/%u\n",
void *p = io_u_verify_off(hdr, io_u, header_num);
unsigned short c;
- c = crc16(p, hdr->len - sizeof(*hdr));
+ c = crc16(p, hdr->len - hdr_size(hdr));
if (c != hdr->crc16) {
log_err("crc16: verify failed at %llu/%u\n",
void *p = io_u_verify_off(hdr, io_u, header_num);
unsigned long long c;
- c = crc64(p, hdr->len - sizeof(*hdr));
+ c = crc64(p, hdr->len - hdr_size(hdr));
if (c != hdr->crc64) {
log_err("crc64: verify failed at %llu/%u\n",
void *p = io_u_verify_off(hdr, io_u, header_num);
unsigned long c;
- c = crc32(p, hdr->len - sizeof(*hdr));
+ c = crc32(p, hdr->len - hdr_size(hdr));
if (c != hdr->crc32) {
log_err("crc32: verify failed at %llu/%u\n",
.hash = hash,
};
- memset(md5_ctx.hash, 0, sizeof(hdr->md5_digest));
- md5_update(&md5_ctx, p, hdr->len - sizeof(*hdr));
+ md5_init(&md5_ctx);
+ md5_update(&md5_ctx, p, hdr->len - hdr_size(hdr));
if (memcmp(hdr->md5_digest, md5_ctx.hash, sizeof(hash))) {
log_err("md5: verify failed at %llu/%u\n",
for (p = io_u->buf; p < io_u->buf + io_u->buflen; p += hdr_inc) {
if (td->o.verify_offset)
- memswp(p, p + td->o.verify_offset, sizeof(*hdr));
+ memswp(p, p + td->o.verify_offset, __hdr_size(hdr->verify_type));
hdr = p;
case VERIFY_CRC7:
ret = verify_io_u_crc7(hdr, io_u, hdr_num);
break;
+ case VERIFY_SHA256:
+ ret = verify_io_u_sha256(hdr, io_u, hdr_num);
+ break;
+ case VERIFY_SHA512:
+ ret = verify_io_u_sha512(hdr, io_u, hdr_num);
+ break;
default:
log_err("Bad verify type %u\n", hdr->verify_type);
ret = 1;
return 0;
}
+static void fill_sha512(struct verify_header *hdr, void *p, unsigned int len)
+{
+ struct sha512_ctx sha512_ctx = {
+ .buf = hdr->sha512,
+ };
+
+ sha512_init(&sha512_ctx);
+ sha512_update(&sha512_ctx, p, len);
+}
+
+static void fill_sha256(struct verify_header *hdr, void *p, unsigned int len)
+{
+ struct sha256_ctx sha256_ctx = {
+ .buf = hdr->sha256,
+ };
+
+ sha256_init(&sha256_ctx);
+ sha256_update(&sha256_ctx, p, len);
+}
+
static void fill_crc7(struct verify_header *hdr, void *p, unsigned int len)
{
hdr->crc7 = crc7(p, len);
.hash = (uint32_t *) hdr->md5_digest,
};
- memset(md5_ctx.hash, 0, sizeof(hdr->md5_digest));
+ md5_init(&md5_ctx);
md5_update(&md5_ctx, p, len);
}
hdr_inc = io_u->buflen;
if (td->o.verify_interval)
hdr_inc = td->o.verify_interval;
- data_len = hdr_inc - sizeof(*hdr);
for (;p < io_u->buf + io_u->buflen; p += hdr_inc) {
hdr = p;
hdr->fio_magic = FIO_HDR_MAGIC;
hdr->verify_type = td->o.verify;
hdr->len = hdr_inc;
+ data_len = hdr_inc - hdr_size(hdr);
- data = p + sizeof(*hdr);
+ data = p + hdr_size(hdr);
switch (td->o.verify) {
case VERIFY_MD5:
fill_md5(hdr, data, data_len);
case VERIFY_CRC7:
fill_crc7(hdr, data, data_len);
break;
+ case VERIFY_SHA256:
+ fill_sha256(hdr, data, data_len);
+ break;
+ case VERIFY_SHA512:
+ fill_sha512(hdr, data, data_len);
+ break;
default:
log_err("fio: bad verify type: %d\n", td->o.verify);
assert(0);
}
if (td->o.verify_offset)
- memswp(p, p + td->o.verify_offset, sizeof(*hdr));
+ memswp(p, p + td->o.verify_offset, hdr_size(hdr));
}
}