2
0

bf_opts.c 8.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331
  1. /* crypto/bf/bf_opts.c */
  2. /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
  3. * All rights reserved.
  4. *
  5. * This package is an SSL implementation written
  6. * by Eric Young (eay@cryptsoft.com).
  7. * The implementation was written so as to conform with Netscapes SSL.
  8. *
  9. * This library is free for commercial and non-commercial use as long as
  10. * the following conditions are aheared to. The following conditions
  11. * apply to all code found in this distribution, be it the RC4, RSA,
  12. * lhash, DES, etc., code; not just the SSL code. The SSL documentation
  13. * included with this distribution is covered by the same copyright terms
  14. * except that the holder is Tim Hudson (tjh@cryptsoft.com).
  15. *
  16. * Copyright remains Eric Young's, and as such any Copyright notices in
  17. * the code are not to be removed.
  18. * If this package is used in a product, Eric Young should be given attribution
  19. * as the author of the parts of the library used.
  20. * This can be in the form of a textual message at program startup or
  21. * in documentation (online or textual) provided with the package.
  22. *
  23. * Redistribution and use in source and binary forms, with or without
  24. * modification, are permitted provided that the following conditions
  25. * are met:
  26. * 1. Redistributions of source code must retain the copyright
  27. * notice, this list of conditions and the following disclaimer.
  28. * 2. Redistributions in binary form must reproduce the above copyright
  29. * notice, this list of conditions and the following disclaimer in the
  30. * documentation and/or other materials provided with the distribution.
  31. * 3. All advertising materials mentioning features or use of this software
  32. * must display the following acknowledgement:
  33. * "This product includes cryptographic software written by
  34. * Eric Young (eay@cryptsoft.com)"
  35. * The word 'cryptographic' can be left out if the rouines from the library
  36. * being used are not cryptographic related :-).
  37. * 4. If you include any Windows specific code (or a derivative thereof) from
  38. * the apps directory (application code) you must include an acknowledgement:
  39. * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
  40. *
  41. * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
  42. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  43. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  44. * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
  45. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  46. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  47. * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  48. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  49. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  50. * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  51. * SUCH DAMAGE.
  52. *
  53. * The licence and distribution terms for any publically available version or
  54. * derivative of this code cannot be changed. i.e. this code cannot simply be
  55. * copied and put under another distribution licence
  56. * [including the GNU Public Licence.]
  57. */
  58. /* define PART1, PART2, PART3 or PART4 to build only with a few of the options.
  59. * This is for machines with 64k code segment size restrictions. */
  60. #if !defined(OPENSSL_SYS_MSDOS) && (!defined(OPENSSL_SYS_VMS) || defined(__DECC)) && !defined(OPENSSL_SYS_MACOSX)
  61. #define TIMES
  62. #endif
  63. #include <stdio.h>
  64. #include <openssl/e_os2.h>
  65. #include OPENSSL_UNISTD_IO
  66. OPENSSL_DECLARE_EXIT
  67. #ifndef OPENSSL_SYS_NETWARE
  68. #include <signal.h>
  69. #endif
  70. #ifndef _IRIX
  71. #include <time.h>
  72. #endif
  73. #ifdef TIMES
  74. #include <sys/types.h>
  75. #include <sys/times.h>
  76. #endif
  77. /* Depending on the VMS version, the tms structure is perhaps defined.
  78. The __TMS macro will show if it was. If it wasn't defined, we should
  79. undefine TIMES, since that tells the rest of the program how things
  80. should be handled. -- Richard Levitte */
  81. #if defined(OPENSSL_SYS_VMS_DECC) && !defined(__TMS)
  82. #undef TIMES
  83. #endif
  84. #ifndef TIMES
  85. #include <sys/timeb.h>
  86. #endif
  87. #if defined(sun) || defined(__ultrix)
  88. #define _POSIX_SOURCE
  89. #include <limits.h>
  90. #include <sys/param.h>
  91. #endif
  92. #include <openssl/blowfish.h>
  93. #define BF_DEFAULT_OPTIONS
  94. #undef BF_ENC
  95. #define BF_encrypt BF_encrypt_normal
  96. #undef HEADER_BF_LOCL_H
  97. #include "bf_enc.c"
  98. #define BF_PTR
  99. #undef BF_PTR2
  100. #undef BF_ENC
  101. #undef BF_encrypt
  102. #define BF_encrypt BF_encrypt_ptr
  103. #undef HEADER_BF_LOCL_H
  104. #include "bf_enc.c"
  105. #undef BF_PTR
  106. #define BF_PTR2
  107. #undef BF_ENC
  108. #undef BF_encrypt
  109. #define BF_encrypt BF_encrypt_ptr2
  110. #undef HEADER_BF_LOCL_H
  111. #include "bf_enc.c"
  112. /* The following if from times(3) man page. It may need to be changed */
  113. #ifndef HZ
  114. # ifndef CLK_TCK
  115. # ifndef _BSD_CLK_TCK_ /* FreeBSD fix */
  116. # define HZ 100.0
  117. # else /* _BSD_CLK_TCK_ */
  118. # define HZ ((double)_BSD_CLK_TCK_)
  119. # endif
  120. # else /* CLK_TCK */
  121. # define HZ ((double)CLK_TCK)
  122. # endif
  123. #endif
  124. #define BUFSIZE ((long)1024)
  125. long run=0;
  126. double Time_F(int s);
  127. #ifdef SIGALRM
  128. #if defined(__STDC__) || defined(sgi)
  129. #define SIGRETTYPE void
  130. #else
  131. #define SIGRETTYPE int
  132. #endif
  133. SIGRETTYPE sig_done(int sig);
  134. SIGRETTYPE sig_done(int sig)
  135. {
  136. signal(SIGALRM,sig_done);
  137. run=0;
  138. #ifdef LINT
  139. sig=sig;
  140. #endif
  141. }
  142. #endif
  143. #define START 0
  144. #define STOP 1
  145. double Time_F(int s)
  146. {
  147. double ret;
  148. #ifdef TIMES
  149. static struct tms tstart,tend;
  150. if (s == START)
  151. {
  152. times(&tstart);
  153. return(0);
  154. }
  155. else
  156. {
  157. times(&tend);
  158. ret=((double)(tend.tms_utime-tstart.tms_utime))/HZ;
  159. return((ret == 0.0)?1e-6:ret);
  160. }
  161. #else /* !times() */
  162. static struct timeb tstart,tend;
  163. long i;
  164. if (s == START)
  165. {
  166. ftime(&tstart);
  167. return(0);
  168. }
  169. else
  170. {
  171. ftime(&tend);
  172. i=(long)tend.millitm-(long)tstart.millitm;
  173. ret=((double)(tend.time-tstart.time))+((double)i)/1000.0;
  174. return((ret == 0.0)?1e-6:ret);
  175. }
  176. #endif
  177. }
  178. #ifdef SIGALRM
  179. #define print_name(name) fprintf(stderr,"Doing %s's for 10 seconds\n",name); alarm(10);
  180. #else
  181. #define print_name(name) fprintf(stderr,"Doing %s %ld times\n",name,cb);
  182. #endif
  183. #define time_it(func,name,index) \
  184. print_name(name); \
  185. Time_F(START); \
  186. for (count=0,run=1; COND(cb); count+=4) \
  187. { \
  188. unsigned long d[2]; \
  189. func(d,&sch); \
  190. func(d,&sch); \
  191. func(d,&sch); \
  192. func(d,&sch); \
  193. } \
  194. tm[index]=Time_F(STOP); \
  195. fprintf(stderr,"%ld %s's in %.2f second\n",count,name,tm[index]); \
  196. tm[index]=((double)COUNT(cb))/tm[index];
  197. #define print_it(name,index) \
  198. fprintf(stderr,"%s bytes per sec = %12.2f (%5.1fuS)\n",name, \
  199. tm[index]*8,1.0e6/tm[index]);
  200. int main(int argc, char **argv)
  201. {
  202. long count;
  203. static unsigned char buf[BUFSIZE];
  204. static char key[16]={ 0x12,0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0,
  205. 0x12,0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0};
  206. BF_KEY sch;
  207. double d,tm[16],max=0;
  208. int rank[16];
  209. char *str[16];
  210. int max_idx=0,i,num=0,j;
  211. #ifndef SIGALARM
  212. long ca,cb,cc,cd,ce;
  213. #endif
  214. for (i=0; i<12; i++)
  215. {
  216. tm[i]=0.0;
  217. rank[i]=0;
  218. }
  219. #ifndef TIMES
  220. fprintf(stderr,"To get the most accurate results, try to run this\n");
  221. fprintf(stderr,"program when this computer is idle.\n");
  222. #endif
  223. BF_set_key(&sch,16,key);
  224. #ifndef SIGALRM
  225. fprintf(stderr,"First we calculate the approximate speed ...\n");
  226. count=10;
  227. do {
  228. long i;
  229. unsigned long data[2];
  230. count*=2;
  231. Time_F(START);
  232. for (i=count; i; i--)
  233. BF_encrypt(data,&sch);
  234. d=Time_F(STOP);
  235. } while (d < 3.0);
  236. ca=count;
  237. cb=count*3;
  238. cc=count*3*8/BUFSIZE+1;
  239. cd=count*8/BUFSIZE+1;
  240. ce=count/20+1;
  241. #define COND(d) (count != (d))
  242. #define COUNT(d) (d)
  243. #else
  244. #define COND(c) (run)
  245. #define COUNT(d) (count)
  246. signal(SIGALRM,sig_done);
  247. alarm(10);
  248. #endif
  249. time_it(BF_encrypt_normal, "BF_encrypt_normal ", 0);
  250. time_it(BF_encrypt_ptr, "BF_encrypt_ptr ", 1);
  251. time_it(BF_encrypt_ptr2, "BF_encrypt_ptr2 ", 2);
  252. num+=3;
  253. str[0]="<nothing>";
  254. print_it("BF_encrypt_normal ",0);
  255. max=tm[0];
  256. max_idx=0;
  257. str[1]="ptr ";
  258. print_it("BF_encrypt_ptr ",1);
  259. if (max < tm[1]) { max=tm[1]; max_idx=1; }
  260. str[2]="ptr2 ";
  261. print_it("BF_encrypt_ptr2 ",2);
  262. if (max < tm[2]) { max=tm[2]; max_idx=2; }
  263. printf("options BF ecb/s\n");
  264. printf("%s %12.2f 100.0%%\n",str[max_idx],tm[max_idx]);
  265. d=tm[max_idx];
  266. tm[max_idx]= -2.0;
  267. max= -1.0;
  268. for (;;)
  269. {
  270. for (i=0; i<3; i++)
  271. {
  272. if (max < tm[i]) { max=tm[i]; j=i; }
  273. }
  274. if (max < 0.0) break;
  275. printf("%s %12.2f %4.1f%%\n",str[j],tm[j],tm[j]/d*100.0);
  276. tm[j]= -2.0;
  277. max= -1.0;
  278. }
  279. switch (max_idx)
  280. {
  281. case 0:
  282. printf("-DBF_DEFAULT_OPTIONS\n");
  283. break;
  284. case 1:
  285. printf("-DBF_PTR\n");
  286. break;
  287. case 2:
  288. printf("-DBF_PTR2\n");
  289. break;
  290. }
  291. exit(0);
  292. #if defined(LINT) || defined(OPENSSL_SYS_MSDOS)
  293. return(0);
  294. #endif
  295. }