bf_opts.c 8.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328
  1. /* crypto/bf/bf_opts.c */
  2. /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
  3. * All rights reserved.
  4. *
  5. * This package is an SSL implementation written
  6. * by Eric Young (eay@cryptsoft.com).
  7. * The implementation was written so as to conform with Netscapes SSL.
  8. *
  9. * This library is free for commercial and non-commercial use as long as
  10. * the following conditions are aheared to. The following conditions
  11. * apply to all code found in this distribution, be it the RC4, RSA,
  12. * lhash, DES, etc., code; not just the SSL code. The SSL documentation
  13. * included with this distribution is covered by the same copyright terms
  14. * except that the holder is Tim Hudson (tjh@cryptsoft.com).
  15. *
  16. * Copyright remains Eric Young's, and as such any Copyright notices in
  17. * the code are not to be removed.
  18. * If this package is used in a product, Eric Young should be given attribution
  19. * as the author of the parts of the library used.
  20. * This can be in the form of a textual message at program startup or
  21. * in documentation (online or textual) provided with the package.
  22. *
  23. * Redistribution and use in source and binary forms, with or without
  24. * modification, are permitted provided that the following conditions
  25. * are met:
  26. * 1. Redistributions of source code must retain the copyright
  27. * notice, this list of conditions and the following disclaimer.
  28. * 2. Redistributions in binary form must reproduce the above copyright
  29. * notice, this list of conditions and the following disclaimer in the
  30. * documentation and/or other materials provided with the distribution.
  31. * 3. All advertising materials mentioning features or use of this software
  32. * must display the following acknowledgement:
  33. * "This product includes cryptographic software written by
  34. * Eric Young (eay@cryptsoft.com)"
  35. * The word 'cryptographic' can be left out if the rouines from the library
  36. * being used are not cryptographic related :-).
  37. * 4. If you include any Windows specific code (or a derivative thereof) from
  38. * the apps directory (application code) you must include an acknowledgement:
  39. * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
  40. *
  41. * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
  42. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  43. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  44. * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
  45. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  46. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  47. * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  48. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  49. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  50. * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  51. * SUCH DAMAGE.
  52. *
  53. * The licence and distribution terms for any publically available version or
  54. * derivative of this code cannot be changed. i.e. this code cannot simply be
  55. * copied and put under another distribution licence
  56. * [including the GNU Public Licence.]
  57. */
  58. /* define PART1, PART2, PART3 or PART4 to build only with a few of the options.
  59. * This is for machines with 64k code segment size restrictions. */
  60. #if !defined(OPENSSL_SYS_MSDOS) && (!defined(OPENSSL_SYS_VMS) || defined(__DECC))
  61. #define TIMES
  62. #endif
  63. #include <stdio.h>
  64. #include <openssl/e_os2.h>
  65. #include OPENSSL_UNISTD_IO
  66. OPENSSL_DECLARE_EXIT
  67. #include <signal.h>
  68. #ifndef _IRIX
  69. #include <time.h>
  70. #endif
  71. #ifdef TIMES
  72. #include <sys/types.h>
  73. #include <sys/times.h>
  74. #endif
  75. /* Depending on the VMS version, the tms structure is perhaps defined.
  76. The __TMS macro will show if it was. If it wasn't defined, we should
  77. undefine TIMES, since that tells the rest of the program how things
  78. should be handled. -- Richard Levitte */
  79. #if defined(OPENSSL_SYS_VMS_DECC) && !defined(__TMS)
  80. #undef TIMES
  81. #endif
  82. #ifndef TIMES
  83. #include <sys/timeb.h>
  84. #endif
  85. #if defined(sun) || defined(__ultrix)
  86. #define _POSIX_SOURCE
  87. #include <limits.h>
  88. #include <sys/param.h>
  89. #endif
  90. #include <openssl/blowfish.h>
  91. #define BF_DEFAULT_OPTIONS
  92. #undef BF_ENC
  93. #define BF_encrypt BF_encrypt_normal
  94. #undef HEADER_BF_LOCL_H
  95. #include "bf_enc.c"
  96. #define BF_PTR
  97. #undef BF_PTR2
  98. #undef BF_ENC
  99. #undef BF_encrypt
  100. #define BF_encrypt BF_encrypt_ptr
  101. #undef HEADER_BF_LOCL_H
  102. #include "bf_enc.c"
  103. #undef BF_PTR
  104. #define BF_PTR2
  105. #undef BF_ENC
  106. #undef BF_encrypt
  107. #define BF_encrypt BF_encrypt_ptr2
  108. #undef HEADER_BF_LOCL_H
  109. #include "bf_enc.c"
  110. /* The following if from times(3) man page. It may need to be changed */
  111. #ifndef HZ
  112. # ifndef CLK_TCK
  113. # ifndef _BSD_CLK_TCK_ /* FreeBSD fix */
  114. # define HZ 100.0
  115. # else /* _BSD_CLK_TCK_ */
  116. # define HZ ((double)_BSD_CLK_TCK_)
  117. # endif
  118. # else /* CLK_TCK */
  119. # define HZ ((double)CLK_TCK)
  120. # endif
  121. #endif
  122. #define BUFSIZE ((long)1024)
  123. long run=0;
  124. double Time_F(int s);
  125. #ifdef SIGALRM
  126. #if defined(__STDC__) || defined(sgi)
  127. #define SIGRETTYPE void
  128. #else
  129. #define SIGRETTYPE int
  130. #endif
  131. SIGRETTYPE sig_done(int sig);
  132. SIGRETTYPE sig_done(int sig)
  133. {
  134. signal(SIGALRM,sig_done);
  135. run=0;
  136. #ifdef LINT
  137. sig=sig;
  138. #endif
  139. }
  140. #endif
  141. #define START 0
  142. #define STOP 1
  143. double Time_F(int s)
  144. {
  145. double ret;
  146. #ifdef TIMES
  147. static struct tms tstart,tend;
  148. if (s == START)
  149. {
  150. times(&tstart);
  151. return(0);
  152. }
  153. else
  154. {
  155. times(&tend);
  156. ret=((double)(tend.tms_utime-tstart.tms_utime))/HZ;
  157. return((ret == 0.0)?1e-6:ret);
  158. }
  159. #else /* !times() */
  160. static struct timeb tstart,tend;
  161. long i;
  162. if (s == START)
  163. {
  164. ftime(&tstart);
  165. return(0);
  166. }
  167. else
  168. {
  169. ftime(&tend);
  170. i=(long)tend.millitm-(long)tstart.millitm;
  171. ret=((double)(tend.time-tstart.time))+((double)i)/1000.0;
  172. return((ret == 0.0)?1e-6:ret);
  173. }
  174. #endif
  175. }
  176. #ifdef SIGALRM
  177. #define print_name(name) fprintf(stderr,"Doing %s's for 10 seconds\n",name); alarm(10);
  178. #else
  179. #define print_name(name) fprintf(stderr,"Doing %s %ld times\n",name,cb);
  180. #endif
  181. #define time_it(func,name,index) \
  182. print_name(name); \
  183. Time_F(START); \
  184. for (count=0,run=1; COND(cb); count+=4) \
  185. { \
  186. unsigned long d[2]; \
  187. func(d,&sch); \
  188. func(d,&sch); \
  189. func(d,&sch); \
  190. func(d,&sch); \
  191. } \
  192. tm[index]=Time_F(STOP); \
  193. fprintf(stderr,"%ld %s's in %.2f second\n",count,name,tm[index]); \
  194. tm[index]=((double)COUNT(cb))/tm[index];
  195. #define print_it(name,index) \
  196. fprintf(stderr,"%s bytes per sec = %12.2f (%5.1fuS)\n",name, \
  197. tm[index]*8,1.0e6/tm[index]);
  198. int main(int argc, char **argv)
  199. {
  200. long count;
  201. static unsigned char buf[BUFSIZE];
  202. static char key[16]={ 0x12,0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0,
  203. 0x12,0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0};
  204. BF_KEY sch;
  205. double d,tm[16],max=0;
  206. int rank[16];
  207. char *str[16];
  208. int max_idx=0,i,num=0,j;
  209. #ifndef SIGALARM
  210. long ca,cb,cc,cd,ce;
  211. #endif
  212. for (i=0; i<12; i++)
  213. {
  214. tm[i]=0.0;
  215. rank[i]=0;
  216. }
  217. #ifndef TIMES
  218. fprintf(stderr,"To get the most accurate results, try to run this\n");
  219. fprintf(stderr,"program when this computer is idle.\n");
  220. #endif
  221. BF_set_key(&sch,16,key);
  222. #ifndef SIGALRM
  223. fprintf(stderr,"First we calculate the approximate speed ...\n");
  224. count=10;
  225. do {
  226. long i;
  227. unsigned long data[2];
  228. count*=2;
  229. Time_F(START);
  230. for (i=count; i; i--)
  231. BF_encrypt(data,&sch);
  232. d=Time_F(STOP);
  233. } while (d < 3.0);
  234. ca=count;
  235. cb=count*3;
  236. cc=count*3*8/BUFSIZE+1;
  237. cd=count*8/BUFSIZE+1;
  238. ce=count/20+1;
  239. #define COND(d) (count != (d))
  240. #define COUNT(d) (d)
  241. #else
  242. #define COND(c) (run)
  243. #define COUNT(d) (count)
  244. signal(SIGALRM,sig_done);
  245. alarm(10);
  246. #endif
  247. time_it(BF_encrypt_normal, "BF_encrypt_normal ", 0);
  248. time_it(BF_encrypt_ptr, "BF_encrypt_ptr ", 1);
  249. time_it(BF_encrypt_ptr2, "BF_encrypt_ptr2 ", 2);
  250. num+=3;
  251. str[0]="<nothing>";
  252. print_it("BF_encrypt_normal ",0);
  253. max=tm[0];
  254. max_idx=0;
  255. str[1]="ptr ";
  256. print_it("BF_encrypt_ptr ",1);
  257. if (max < tm[1]) { max=tm[1]; max_idx=1; }
  258. str[2]="ptr2 ";
  259. print_it("BF_encrypt_ptr2 ",2);
  260. if (max < tm[2]) { max=tm[2]; max_idx=2; }
  261. printf("options BF ecb/s\n");
  262. printf("%s %12.2f 100.0%%\n",str[max_idx],tm[max_idx]);
  263. d=tm[max_idx];
  264. tm[max_idx]= -2.0;
  265. max= -1.0;
  266. for (;;)
  267. {
  268. for (i=0; i<3; i++)
  269. {
  270. if (max < tm[i]) { max=tm[i]; j=i; }
  271. }
  272. if (max < 0.0) break;
  273. printf("%s %12.2f %4.1f%%\n",str[j],tm[j],tm[j]/d*100.0);
  274. tm[j]= -2.0;
  275. max= -1.0;
  276. }
  277. switch (max_idx)
  278. {
  279. case 0:
  280. printf("-DBF_DEFAULT_OPTIONS\n");
  281. break;
  282. case 1:
  283. printf("-DBF_PTR\n");
  284. break;
  285. case 2:
  286. printf("-DBF_PTR2\n");
  287. break;
  288. }
  289. exit(0);
  290. #if defined(LINT) || defined(OPENSSL_SYS_MSDOS)
  291. return(0);
  292. #endif
  293. }