bf_opts.c 9.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325
  1. /* crypto/bf/bf_opts.c */
  2. /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
  3. * All rights reserved.
  4. *
  5. * This package is an SSL implementation written
  6. * by Eric Young (eay@cryptsoft.com).
  7. * The implementation was written so as to conform with Netscapes SSL.
  8. *
  9. * This library is free for commercial and non-commercial use as long as
  10. * the following conditions are aheared to. The following conditions
  11. * apply to all code found in this distribution, be it the RC4, RSA,
  12. * lhash, DES, etc., code; not just the SSL code. The SSL documentation
  13. * included with this distribution is covered by the same copyright terms
  14. * except that the holder is Tim Hudson (tjh@cryptsoft.com).
  15. *
  16. * Copyright remains Eric Young's, and as such any Copyright notices in
  17. * the code are not to be removed.
  18. * If this package is used in a product, Eric Young should be given attribution
  19. * as the author of the parts of the library used.
  20. * This can be in the form of a textual message at program startup or
  21. * in documentation (online or textual) provided with the package.
  22. *
  23. * Redistribution and use in source and binary forms, with or without
  24. * modification, are permitted provided that the following conditions
  25. * are met:
  26. * 1. Redistributions of source code must retain the copyright
  27. * notice, this list of conditions and the following disclaimer.
  28. * 2. Redistributions in binary form must reproduce the above copyright
  29. * notice, this list of conditions and the following disclaimer in the
  30. * documentation and/or other materials provided with the distribution.
  31. * 3. All advertising materials mentioning features or use of this software
  32. * must display the following acknowledgement:
  33. * "This product includes cryptographic software written by
  34. * Eric Young (eay@cryptsoft.com)"
  35. * The word 'cryptographic' can be left out if the rouines from the library
  36. * being used are not cryptographic related :-).
  37. * 4. If you include any Windows specific code (or a derivative thereof) from
  38. * the apps directory (application code) you must include an acknowledgement:
  39. * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
  40. *
  41. * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
  42. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  43. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  44. * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
  45. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  46. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  47. * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  48. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  49. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  50. * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  51. * SUCH DAMAGE.
  52. *
  53. * The licence and distribution terms for any publically available version or
  54. * derivative of this code cannot be changed. i.e. this code cannot simply be
  55. * copied and put under another distribution licence
  56. * [including the GNU Public Licence.]
  57. */
  58. /*
  59. * define PART1, PART2, PART3 or PART4 to build only with a few of the
  60. * options. This is for machines with 64k code segment size restrictions.
  61. */
  62. #if !defined(OPENSSL_SYS_MSDOS) && (!defined(OPENSSL_SYS_VMS) || defined(__DECC)) && !defined(OPENSSL_SYS_MACOSX)
  63. # define TIMES
  64. #endif
  65. #include <stdio.h>
  66. #include <openssl/e_os2.h>
  67. #include OPENSSL_UNISTD_IO
  68. OPENSSL_DECLARE_EXIT
  69. #ifndef OPENSSL_SYS_NETWARE
  70. # include <signal.h>
  71. #endif
  72. #ifndef _IRIX
  73. # include <time.h>
  74. #endif
  75. #ifdef TIMES
  76. # include <sys/types.h>
  77. # include <sys/times.h>
  78. #endif
  79. /*
  80. * Depending on the VMS version, the tms structure is perhaps defined.
  81. * The __TMS macro will show if it was. If it wasn't defined, we should
  82. * undefine TIMES, since that tells the rest of the program how things
  83. * should be handled. -- Richard Levitte
  84. */
  85. #if defined(OPENSSL_SYS_VMS_DECC) && !defined(__TMS)
  86. # undef TIMES
  87. #endif
  88. #ifndef TIMES
  89. # include <sys/timeb.h>
  90. #endif
  91. #if defined(sun) || defined(__ultrix)
  92. # define _POSIX_SOURCE
  93. # include <limits.h>
  94. # include <sys/param.h>
  95. #endif
  96. #include <openssl/blowfish.h>
  97. #define BF_DEFAULT_OPTIONS
  98. #undef BF_ENC
  99. #define BF_encrypt BF_encrypt_normal
  100. #undef HEADER_BF_LOCL_H
  101. #include "bf_enc.c"
  102. #define BF_PTR
  103. #undef BF_PTR2
  104. #undef BF_ENC
  105. #undef BF_encrypt
  106. #define BF_encrypt BF_encrypt_ptr
  107. #undef HEADER_BF_LOCL_H
  108. #include "bf_enc.c"
  109. #undef BF_PTR
  110. #define BF_PTR2
  111. #undef BF_ENC
  112. #undef BF_encrypt
  113. #define BF_encrypt BF_encrypt_ptr2
  114. #undef HEADER_BF_LOCL_H
  115. #include "bf_enc.c"
  116. /* The following if from times(3) man page. It may need to be changed */
  117. #ifndef HZ
  118. # ifndef CLK_TCK
  119. # ifndef _BSD_CLK_TCK_ /* FreeBSD fix */
  120. # define HZ 100.0
  121. # else /* _BSD_CLK_TCK_ */
  122. # define HZ ((double)_BSD_CLK_TCK_)
  123. # endif
  124. # else /* CLK_TCK */
  125. # define HZ ((double)CLK_TCK)
  126. # endif
  127. #endif
  128. #define BUFSIZE ((long)1024)
  129. long run = 0;
  130. double Time_F(int s);
  131. #ifdef SIGALRM
  132. # if defined(__STDC__) || defined(sgi)
  133. # define SIGRETTYPE void
  134. # else
  135. # define SIGRETTYPE int
  136. # endif
  137. SIGRETTYPE sig_done(int sig);
  138. SIGRETTYPE sig_done(int sig)
  139. {
  140. signal(SIGALRM, sig_done);
  141. run = 0;
  142. # ifdef LINT
  143. sig = sig;
  144. # endif
  145. }
  146. #endif
  147. #define START 0
  148. #define STOP 1
  149. double Time_F(int s)
  150. {
  151. double ret;
  152. #ifdef TIMES
  153. static struct tms tstart, tend;
  154. if (s == START) {
  155. times(&tstart);
  156. return (0);
  157. } else {
  158. times(&tend);
  159. ret = ((double)(tend.tms_utime - tstart.tms_utime)) / HZ;
  160. return ((ret == 0.0) ? 1e-6 : ret);
  161. }
  162. #else /* !times() */
  163. static struct timeb tstart, tend;
  164. long i;
  165. if (s == START) {
  166. ftime(&tstart);
  167. return (0);
  168. } else {
  169. ftime(&tend);
  170. i = (long)tend.millitm - (long)tstart.millitm;
  171. ret = ((double)(tend.time - tstart.time)) + ((double)i) / 1000.0;
  172. return ((ret == 0.0) ? 1e-6 : ret);
  173. }
  174. #endif
  175. }
  176. #ifdef SIGALRM
  177. # define print_name(name) fprintf(stderr,"Doing %s's for 10 seconds\n",name); alarm(10);
  178. #else
  179. # define print_name(name) fprintf(stderr,"Doing %s %ld times\n",name,cb);
  180. #endif
  181. #define time_it(func,name,index) \
  182. print_name(name); \
  183. Time_F(START); \
  184. for (count=0,run=1; COND(cb); count+=4) \
  185. { \
  186. unsigned long d[2]; \
  187. func(d,&sch); \
  188. func(d,&sch); \
  189. func(d,&sch); \
  190. func(d,&sch); \
  191. } \
  192. tm[index]=Time_F(STOP); \
  193. fprintf(stderr,"%ld %s's in %.2f second\n",count,name,tm[index]); \
  194. tm[index]=((double)COUNT(cb))/tm[index];
  195. #define print_it(name,index) \
  196. fprintf(stderr,"%s bytes per sec = %12.2f (%5.1fuS)\n",name, \
  197. tm[index]*8,1.0e6/tm[index]);
  198. int main(int argc, char **argv)
  199. {
  200. long count;
  201. static unsigned char buf[BUFSIZE];
  202. static char key[16] = { 0x12, 0x34, 0x56, 0x78, 0x9a, 0xbc, 0xde, 0xf0,
  203. 0x12, 0x34, 0x56, 0x78, 0x9a, 0xbc, 0xde, 0xf0
  204. };
  205. BF_KEY sch;
  206. double d, tm[16], max = 0;
  207. int rank[16];
  208. char *str[16];
  209. int max_idx = 0, i, num = 0, j;
  210. #ifndef SIGALARM
  211. long ca, cb, cc, cd, ce;
  212. #endif
  213. for (i = 0; i < 12; i++) {
  214. tm[i] = 0.0;
  215. rank[i] = 0;
  216. }
  217. #ifndef TIMES
  218. fprintf(stderr, "To get the most accurate results, try to run this\n");
  219. fprintf(stderr, "program when this computer is idle.\n");
  220. #endif
  221. BF_set_key(&sch, 16, key);
  222. #ifndef SIGALRM
  223. fprintf(stderr, "First we calculate the approximate speed ...\n");
  224. count = 10;
  225. do {
  226. long i;
  227. unsigned long data[2];
  228. count *= 2;
  229. Time_F(START);
  230. for (i = count; i; i--)
  231. BF_encrypt(data, &sch);
  232. d = Time_F(STOP);
  233. } while (d < 3.0);
  234. ca = count;
  235. cb = count * 3;
  236. cc = count * 3 * 8 / BUFSIZE + 1;
  237. cd = count * 8 / BUFSIZE + 1;
  238. ce = count / 20 + 1;
  239. # define COND(d) (count != (d))
  240. # define COUNT(d) (d)
  241. #else
  242. # define COND(c) (run)
  243. # define COUNT(d) (count)
  244. signal(SIGALRM, sig_done);
  245. alarm(10);
  246. #endif
  247. time_it(BF_encrypt_normal, "BF_encrypt_normal ", 0);
  248. time_it(BF_encrypt_ptr, "BF_encrypt_ptr ", 1);
  249. time_it(BF_encrypt_ptr2, "BF_encrypt_ptr2 ", 2);
  250. num += 3;
  251. str[0] = "<nothing>";
  252. print_it("BF_encrypt_normal ", 0);
  253. max = tm[0];
  254. max_idx = 0;
  255. str[1] = "ptr ";
  256. print_it("BF_encrypt_ptr ", 1);
  257. if (max < tm[1]) {
  258. max = tm[1];
  259. max_idx = 1;
  260. }
  261. str[2] = "ptr2 ";
  262. print_it("BF_encrypt_ptr2 ", 2);
  263. if (max < tm[2]) {
  264. max = tm[2];
  265. max_idx = 2;
  266. }
  267. printf("options BF ecb/s\n");
  268. printf("%s %12.2f 100.0%%\n", str[max_idx], tm[max_idx]);
  269. d = tm[max_idx];
  270. tm[max_idx] = -2.0;
  271. max = -1.0;
  272. for (;;) {
  273. for (i = 0; i < 3; i++) {
  274. if (max < tm[i]) {
  275. max = tm[i];
  276. j = i;
  277. }
  278. }
  279. if (max < 0.0)
  280. break;
  281. printf("%s %12.2f %4.1f%%\n", str[j], tm[j], tm[j] / d * 100.0);
  282. tm[j] = -2.0;
  283. max = -1.0;
  284. }
  285. switch (max_idx) {
  286. case 0:
  287. printf("-DBF_DEFAULT_OPTIONS\n");
  288. break;
  289. case 1:
  290. printf("-DBF_PTR\n");
  291. break;
  292. case 2:
  293. printf("-DBF_PTR2\n");
  294. break;
  295. }
  296. exit(0);
  297. #if defined(LINT) || defined(OPENSSL_SYS_MSDOS)
  298. return (0);
  299. #endif
  300. }