shithub: riscv

ref: dc96f164a2b72ccb209ae98ce50a11087cbe44f8
dir: /sys/src/ape/lib/openssl/crypto/bf/bfs.cpp/

View raw version
//
// gettsc.inl
//
// gives access to the Pentium's (secret) cycle counter
//
// This software was written by Leonard Janke ([email protected])
// in 1996-7 and is entered, by him, into the public domain.

#if defined(__WATCOMC__)
void GetTSC(unsigned long&);
#pragma aux GetTSC = 0x0f 0x31 "mov [edi], eax" parm [edi] modify [edx eax];
#elif defined(__GNUC__)
inline
void GetTSC(unsigned long& tsc)
{
  asm volatile(".byte 15, 49\n\t"
	       : "=eax" (tsc)
	       :
	       : "%edx", "%eax");
}
#elif defined(_MSC_VER)
inline
void GetTSC(unsigned long& tsc)
{
  unsigned long a;
  __asm _emit 0fh
  __asm _emit 31h
  __asm mov a, eax;
  tsc=a;
}
#endif      

#include <stdio.h>
#include <stdlib.h>
#include <openssl/blowfish.h>

void main(int argc,char *argv[])
	{
	BF_KEY key;
	unsigned long s1,s2,e1,e2;
	unsigned long data[2];
	int i,j;

	for (j=0; j<6; j++)
		{
		for (i=0; i<1000; i++) /**/
			{
			BF_encrypt(&data[0],&key);
			GetTSC(s1);
			BF_encrypt(&data[0],&key);
			BF_encrypt(&data[0],&key);
			BF_encrypt(&data[0],&key);
			GetTSC(e1);
			GetTSC(s2);
			BF_encrypt(&data[0],&key);
			BF_encrypt(&data[0],&key);
			BF_encrypt(&data[0],&key);
			BF_encrypt(&data[0],&key);
			GetTSC(e2);
			BF_encrypt(&data[0],&key);
			}

		printf("blowfish %d %d (%d)\n",
			e1-s1,e2-s2,((e2-s2)-(e1-s1)));
		}
	}