speed.c 30.1 KB
Newer Older
1
/* apps/speed.c */
2
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62
 * All rights reserved.
 *
 * This package is an SSL implementation written
 * by Eric Young (eay@cryptsoft.com).
 * The implementation was written so as to conform with Netscapes SSL.
 * 
 * This library is free for commercial and non-commercial use as long as
 * the following conditions are aheared to.  The following conditions
 * apply to all code found in this distribution, be it the RC4, RSA,
 * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
 * included with this distribution is covered by the same copyright terms
 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
 * 
 * Copyright remains Eric Young's, and as such any Copyright notices in
 * the code are not to be removed.
 * If this package is used in a product, Eric Young should be given attribution
 * as the author of the parts of the library used.
 * This can be in the form of a textual message at program startup or
 * in documentation (online or textual) provided with the package.
 * 
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions
 * are met:
 * 1. Redistributions of source code must retain the copyright
 *    notice, this list of conditions and the following disclaimer.
 * 2. Redistributions in binary form must reproduce the above copyright
 *    notice, this list of conditions and the following disclaimer in the
 *    documentation and/or other materials provided with the distribution.
 * 3. All advertising materials mentioning features or use of this software
 *    must display the following acknowledgement:
 *    "This product includes cryptographic software written by
 *     Eric Young (eay@cryptsoft.com)"
 *    The word 'cryptographic' can be left out if the rouines from the library
 *    being used are not cryptographic related :-).
 * 4. If you include any Windows specific code (or a derivative thereof) from 
 *    the apps directory (application code) you must include an acknowledgement:
 *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
 * 
 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
 * SUCH DAMAGE.
 * 
 * The licence and distribution terms for any publically available version or
 * derivative of this code cannot be changed.  i.e. this code cannot simply be
 * copied and put under another distribution licence
 * [including the GNU Public Licence.]
 */

/* most of this code has been pilfered from my libdes speed.c program */

#undef SECONDS
#define SECONDS		3	
63 64
#define RSA_SECONDS	10
#define DSA_SECONDS	10
65 66 67 68 69 70 71 72 73 74 75

/* 11-Sep-92 Andrew Daviel   Support for Silicon Graphics IRIX added */
/* 06-Apr-92 Luke Brennan    Support for VMS and add extra signal calls */

#undef PROG
#define PROG speed_main

#include <stdio.h>
#include <stdlib.h>
#include <signal.h>
#include <string.h>
76
#include <math.h>
77
#include "apps.h"
78
#ifdef NO_STDIO
79 80
#define APPS_WIN16
#endif
81 82 83
#include <openssl/crypto.h>
#include <openssl/rand.h>
#include <openssl/err.h>
84

U
Ulf Möller 已提交
85
#if !defined(MSDOS) && (!defined(VMS) || defined(__DECC))
86 87 88 89 90 91 92 93 94 95
#define TIMES
#endif

#ifndef _IRIX
#include <time.h>
#endif
#ifdef TIMES
#include <sys/types.h>
#include <sys/times.h>
#endif
U
Ulf Möller 已提交
96 97 98 99 100 101 102

/* Depending on the VMS version, the tms structure is perhaps defined.
   The __TMS macro will show if it was.  If it wasn't defined, we should
   undefine TIMES, since that tells the rest of the program how things
   should be handled.				-- Richard Levitte */
#if defined(VMS) && defined(__DECC) && !defined(__TMS)
#undef TIMES
103
#endif
U
Ulf Möller 已提交
104

105 106
#include <sys/timeb.h>

107 108
#if defined(sun) || defined(__ultrix)
#define _POSIX_SOURCE
109 110 111 112 113
#include <limits.h>
#include <sys/param.h>
#endif

#ifndef NO_DES
114
#include <openssl/des.h>
115 116
#endif
#ifndef NO_MD2
117
#include <openssl/md2.h>
118 119
#endif
#ifndef NO_MDC2
120
#include <openssl/mdc2.h>
121 122
#endif
#ifndef NO_MD5
123
#include <openssl/md5.h>
U
Ulf Möller 已提交
124 125
#endif
#ifndef NO_HMAC
126
#include <openssl/hmac.h>
127
#endif
U
Ulf Möller 已提交
128
#include <openssl/evp.h>
129
#ifndef NO_SHA
130
#include <openssl/sha.h>
131
#endif
132
#ifndef NO_RIPEMD
133
#include <openssl/ripemd.h>
134
#endif
135
#ifndef NO_RC4
136
#include <openssl/rc4.h>
137
#endif
138
#ifndef NO_RC5
139
#include <openssl/rc5.h>
140
#endif
141
#ifndef NO_RC2
142
#include <openssl/rc2.h>
143 144
#endif
#ifndef NO_IDEA
145
#include <openssl/idea.h>
146
#endif
147
#ifndef NO_BF
148
#include <openssl/blowfish.h>
149
#endif
150
#ifndef NO_CAST
151
#include <openssl/cast.h>
152
#endif
153
#ifndef NO_RSA
154
#include <openssl/rsa.h>
155
#include "./testrsa.h"
156
#endif
157
#include <openssl/x509.h>
158 159 160 161 162 163 164 165
#ifndef NO_DSA
#include "./testdsa.h"
#endif

/* The following if from times(3) man page.  It may need to be changed */
#ifndef HZ
# ifndef CLK_TCK
#  ifndef _BSD_CLK_TCK_ /* FreeBSD hack */
U
Ulf Möller 已提交
166
#   define HZ	100.0
167 168 169 170 171 172 173 174 175
#  else /* _BSD_CLK_TCK_ */
#   define HZ ((double)_BSD_CLK_TCK_)
#  endif
# else /* CLK_TCK */
#  define HZ ((double)CLK_TCK)
# endif
#endif

#undef BUFSIZE
176
#define BUFSIZE	((long)1024*8+1)
177 178
int run=0;

179
static double Time_F(int s, int usertime);
180 181 182 183 184 185 186 187 188 189
static void print_message(char *s,long num,int length);
static void pkey_print_message(char *str,char *str2,long num,int bits,int sec);
#ifdef SIGALRM
#if defined(__STDC__) || defined(sgi) || defined(_AIX)
#define SIGRETTYPE void
#else
#define SIGRETTYPE int
#endif 

static SIGRETTYPE sig_done(int sig);
U
Ulf Möller 已提交
190
static SIGRETTYPE sig_done(int sig)
191 192 193 194 195 196 197 198 199 200 201 202
	{
	signal(SIGALRM,sig_done);
	run=0;
#ifdef LINT
	sig=sig;
#endif
	}
#endif

#define START	0
#define STOP	1

203
static double Time_F(int s, int usertime)
204 205 206
	{
	double ret;
#ifdef TIMES
207
	if (usertime)
208
		{
209
		static struct tms tstart,tend;
210

211 212 213 214 215 216 217 218 219 220 221
		if (s == START)
			{
			times(&tstart);
			return(0);
			}
		else
			{
			times(&tend);
			ret=((double)(tend.tms_utime-tstart.tms_utime))/HZ;
			return((ret < 1e-3)?1e-3:ret);
			}
222 223
		}
	else
224
#endif /* times() */
225
		{
226 227 228 229 230 231 232 233 234 235 236 237 238 239 240
		static struct timeb tstart,tend;
		long i;

		if (s == START)
			{
			ftime(&tstart);
			return(0);
			}
		else
			{
			ftime(&tend);
			i=(long)tend.millitm-(long)tstart.millitm;
			ret=((double)(tend.time-tstart.time))+((double)i)/1000.0;
			return((ret < 0.001)?0.001:ret);
			}
241 242 243
		}
	}

244 245
int MAIN(int, char **);

U
Ulf Möller 已提交
246
int MAIN(int argc, char **argv)
247 248
	{
	unsigned char *buf=NULL,*buf2=NULL;
B
Ben Laurie 已提交
249
	int mret=1;
250
#define ALGOR_NUM	14
251 252 253 254
#define SIZE_NUM	5
#define RSA_NUM		4
#define DSA_NUM		3
	long count,rsa_count;
B
Ben Laurie 已提交
255 256
	int i,j,k;
	unsigned rsa_num,rsa_num2;
257 258 259 260 261 262 263 264
#ifndef NO_MD2
	unsigned char md2[MD2_DIGEST_LENGTH];
#endif
#ifndef NO_MDC2
	unsigned char mdc2[MDC2_DIGEST_LENGTH];
#endif
#ifndef NO_MD5
	unsigned char md5[MD5_DIGEST_LENGTH];
265
	unsigned char hmac[MD5_DIGEST_LENGTH];
266
#endif
267
#ifndef NO_SHA
268 269
	unsigned char sha[SHA_DIGEST_LENGTH];
#endif
270
#ifndef NO_RIPEMD
271 272
	unsigned char rmd160[RIPEMD160_DIGEST_LENGTH];
#endif
273 274 275
#ifndef NO_RC4
	RC4_KEY rc4_ks;
#endif
276 277 278
#ifndef NO_RC5
	RC5_32_KEY rc5_ks;
#endif
279 280 281 282 283 284
#ifndef NO_RC2
	RC2_KEY rc2_ks;
#endif
#ifndef NO_IDEA
	IDEA_KEY_SCHEDULE idea_ks;
#endif
285
#ifndef NO_BF
286
	BF_KEY bf_ks;
287 288 289
#endif
#ifndef NO_CAST
	CAST_KEY cast_ks;
290 291 292 293 294 295
#endif
	static unsigned char key16[16]=
		{0x12,0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0,
		 0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0,0x12};
	unsigned char iv[8];
#ifndef NO_DES
U
Ulf Möller 已提交
296
	des_cblock *buf_as_des_cblock = NULL;
297 298 299 300 301 302 303 304
	static des_cblock key ={0x12,0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0};
	static des_cblock key2={0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0,0x12};
	static des_cblock key3={0x56,0x78,0x9a,0xbc,0xde,0xf0,0x12,0x34};
	des_key_schedule sch,sch2,sch3;
#endif
#define	D_MD2		0
#define	D_MDC2		1
#define	D_MD5		2
305
#define	D_HMAC		3
306
#define	D_SHA1		4
307 308 309 310 311 312 313 314 315
#define D_RMD160	5
#define	D_RC4		6
#define	D_CBC_DES	7
#define	D_EDE3_DES	8
#define	D_CBC_IDEA	9
#define	D_CBC_RC2	10
#define	D_CBC_RC5	11
#define	D_CBC_BF	12
#define	D_CBC_CAST	13
316 317 318 319
	double d,results[ALGOR_NUM][SIZE_NUM];
	static int lengths[SIZE_NUM]={8,64,256,1024,8*1024};
	long c[ALGOR_NUM][SIZE_NUM];
	static char *names[ALGOR_NUM]={
320
		"md2","mdc2","md5","hmac(md5)","sha1","rmd160","rc4",
321
		"des cbc","des ede3","idea cbc",
322
		"rc2 cbc","rc5-32/12 cbc","blowfish cbc","cast cbc"};
323 324 325 326 327 328 329
#define	R_DSA_512	0
#define	R_DSA_1024	1
#define	R_DSA_2048	2
#define	R_RSA_512	0
#define	R_RSA_1024	1
#define	R_RSA_2048	2
#define	R_RSA_4096	3
330
#ifndef NO_RSA
331 332 333 334 335 336 337 338 339
	RSA *rsa_key[RSA_NUM];
	long rsa_c[RSA_NUM][2];
	double rsa_results[RSA_NUM][2];
	static unsigned int rsa_bits[RSA_NUM]={512,1024,2048,4096};
	static unsigned char *rsa_data[RSA_NUM]=
		{test512,test1024,test2048,test4096};
	static int rsa_data_length[RSA_NUM]={
		sizeof(test512),sizeof(test1024),
		sizeof(test2048),sizeof(test4096)};
340 341 342 343 344 345 346
#endif
#ifndef NO_DSA
	DSA *dsa_key[DSA_NUM];
	long dsa_c[DSA_NUM][2];
	double dsa_results[DSA_NUM][2];
	static unsigned int dsa_bits[DSA_NUM]={512,1024,2048};
#endif
347 348
	int rsa_doit[RSA_NUM];
	int dsa_doit[DSA_NUM];
349
	int doit[ALGOR_NUM];
350
	int pr_header=0;
351 352 353 354 355
	int usertime=1;

#ifndef TIMES
	usertime=-1;
#endif
356 357

	apps_startup();
358
	memset(results, 0, sizeof(results));
359
#ifndef NO_DSA
360 361
	memset(dsa_key,0,sizeof(dsa_key));
#endif
362 363 364

	if (bio_err == NULL)
		if ((bio_err=BIO_new(BIO_s_file())) != NULL)
365
			BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
366

367 368
#ifndef NO_RSA
	memset(rsa_key,0,sizeof(rsa_key));
369 370
	for (i=0; i<RSA_NUM; i++)
		rsa_key[i]=NULL;
371
#endif
372

373
	if ((buf=(unsigned char *)OPENSSL_malloc((int)BUFSIZE)) == NULL)
374 375 376 377
		{
		BIO_printf(bio_err,"out of memory\n");
		goto end;
		}
U
Ulf Möller 已提交
378
#ifndef NO_DES
379
	buf_as_des_cblock = (des_cblock *)buf;
U
Ulf Möller 已提交
380
#endif
381
	if ((buf2=(unsigned char *)OPENSSL_malloc((int)BUFSIZE)) == NULL)
382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401
		{
		BIO_printf(bio_err,"out of memory\n");
		goto end;
		}

	memset(c,0,sizeof(c));
	memset(iv,0,sizeof(iv));

	for (i=0; i<ALGOR_NUM; i++)
		doit[i]=0;
	for (i=0; i<RSA_NUM; i++)
		rsa_doit[i]=0;
	for (i=0; i<DSA_NUM; i++)
		dsa_doit[i]=0;
	
	j=0;
	argc--;
	argv++;
	while (argc)
		{
402 403
		if	((argc > 0) && (strcmp(*argv,"-elapsed") == 0))
			usertime = 0;
404 405 406 407 408 409 410 411 412 413 414 415
#ifndef NO_MD2
		if	(strcmp(*argv,"md2") == 0) doit[D_MD2]=1;
		else
#endif
#ifndef NO_MDC2
			if (strcmp(*argv,"mdc2") == 0) doit[D_MDC2]=1;
		else
#endif
#ifndef NO_MD5
			if (strcmp(*argv,"md5") == 0) doit[D_MD5]=1;
		else
#endif
416 417
#ifndef NO_MD5
			if (strcmp(*argv,"hmac") == 0) doit[D_HMAC]=1;
418 419
		else
#endif
420
#ifndef NO_SHA
421 422
			if (strcmp(*argv,"sha1") == 0) doit[D_SHA1]=1;
		else
423 424 425
			if (strcmp(*argv,"sha") == 0) doit[D_SHA1]=1;
		else
#endif
426
#ifndef NO_RIPEMD
427 428 429 430 431 432
			if (strcmp(*argv,"ripemd") == 0) doit[D_RMD160]=1;
		else
			if (strcmp(*argv,"rmd160") == 0) doit[D_RMD160]=1;
		else
			if (strcmp(*argv,"ripemd160") == 0) doit[D_RMD160]=1;
		else
433 434 435 436 437
#endif
#ifndef NO_RC4
			if (strcmp(*argv,"rc4") == 0) doit[D_RC4]=1;
		else 
#endif
B
typo  
Bodo Möller 已提交
438
#ifndef NO_DES
439 440 441 442 443 444 445 446 447 448 449 450 451
			if (strcmp(*argv,"des-cbc") == 0) doit[D_CBC_DES]=1;
		else	if (strcmp(*argv,"des-ede3") == 0) doit[D_EDE3_DES]=1;
		else
#endif
#ifndef NO_RSA
#ifdef RSAref
			if (strcmp(*argv,"rsaref") == 0) 
			{
			RSA_set_default_method(RSA_PKCS1_RSAref());
			j--;
			}
		else
#endif
452
#ifndef RSA_NULL
453
			if (strcmp(*argv,"openssl") == 0) 
454 455 456 457 458
			{
			RSA_set_default_method(RSA_PKCS1_SSLeay());
			j--;
			}
		else
459
#endif
460 461 462 463 464 465 466 467 468 469 470 471 472 473
#endif /* !NO_RSA */
		     if (strcmp(*argv,"dsa512") == 0) dsa_doit[R_DSA_512]=2;
		else if (strcmp(*argv,"dsa1024") == 0) dsa_doit[R_DSA_1024]=2;
		else if (strcmp(*argv,"dsa2048") == 0) dsa_doit[R_DSA_2048]=2;
		else if (strcmp(*argv,"rsa512") == 0) rsa_doit[R_RSA_512]=2;
		else if (strcmp(*argv,"rsa1024") == 0) rsa_doit[R_RSA_1024]=2;
		else if (strcmp(*argv,"rsa2048") == 0) rsa_doit[R_RSA_2048]=2;
		else if (strcmp(*argv,"rsa4096") == 0) rsa_doit[R_RSA_4096]=2;
		else
#ifndef NO_RC2
		     if (strcmp(*argv,"rc2-cbc") == 0) doit[D_CBC_RC2]=1;
		else if (strcmp(*argv,"rc2") == 0) doit[D_CBC_RC2]=1;
		else
#endif
474 475 476 477 478
#ifndef NO_RC5
		     if (strcmp(*argv,"rc5-cbc") == 0) doit[D_CBC_RC5]=1;
		else if (strcmp(*argv,"rc5") == 0) doit[D_CBC_RC5]=1;
		else
#endif
479 480 481 482 483
#ifndef NO_IDEA
		     if (strcmp(*argv,"idea-cbc") == 0) doit[D_CBC_IDEA]=1;
		else if (strcmp(*argv,"idea") == 0) doit[D_CBC_IDEA]=1;
		else
#endif
484
#ifndef NO_BF
485 486
		     if (strcmp(*argv,"bf-cbc") == 0) doit[D_CBC_BF]=1;
		else if (strcmp(*argv,"blowfish") == 0) doit[D_CBC_BF]=1;
487 488 489 490 491 492 493
		else if (strcmp(*argv,"bf") == 0) doit[D_CBC_BF]=1;
		else
#endif
#ifndef NO_CAST
		     if (strcmp(*argv,"cast-cbc") == 0) doit[D_CBC_CAST]=1;
		else if (strcmp(*argv,"cast") == 0) doit[D_CBC_CAST]=1;
		else if (strcmp(*argv,"cast5") == 0) doit[D_CBC_CAST]=1;
494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522
		else
#endif
#ifndef NO_DES
			if (strcmp(*argv,"des") == 0)
			{
			doit[D_CBC_DES]=1;
			doit[D_EDE3_DES]=1;
			}
		else
#endif
#ifndef NO_RSA
			if (strcmp(*argv,"rsa") == 0)
			{
			rsa_doit[R_RSA_512]=1;
			rsa_doit[R_RSA_1024]=1;
			rsa_doit[R_RSA_2048]=1;
			rsa_doit[R_RSA_4096]=1;
			}
		else
#endif
#ifndef NO_DSA
			if (strcmp(*argv,"dsa") == 0)
			{
			dsa_doit[R_DSA_512]=1;
			dsa_doit[R_DSA_1024]=1;
			}
		else
#endif
			{
523
			BIO_printf(bio_err,"bad option or value, pick one of\n");
524
			BIO_printf(bio_err,"md2      mdc2	md5      hmac      sha1    rmd160\n");
525 526 527 528 529 530
#ifndef NO_IDEA
			BIO_printf(bio_err,"idea-cbc ");
#endif
#ifndef NO_RC2
			BIO_printf(bio_err,"rc2-cbc  ");
#endif
531 532 533
#ifndef NO_RC5
			BIO_printf(bio_err,"rc5-cbc  ");
#endif
534
#ifndef NO_BF
535 536
			BIO_printf(bio_err,"bf-cbc");
#endif
537
#if !defined(NO_IDEA) && !defined(NO_RC2) && !defined(NO_BF) && !defined(NO_RC5)
538 539 540 541 542 543 544 545 546 547 548 549 550
			BIO_printf(bio_err,"\n");
#endif
			BIO_printf(bio_err,"des-cbc  des-ede3 ");
#ifndef NO_RC4
			BIO_printf(bio_err,"rc4");
#endif
#ifndef NO_RSA
			BIO_printf(bio_err,"\nrsa512   rsa1024  rsa2048  rsa4096\n");
#endif
#ifndef NO_DSA
			BIO_printf(bio_err,"\ndsa512   dsa1024  dsa2048\n");
#endif
			BIO_printf(bio_err,"idea     rc2      des      rsa    blowfish\n");
551 552 553 554
			BIO_printf(bio_err,"\n");
			BIO_printf(bio_err,"Available options:\n");
			BIO_printf(bio_err,"\n");
			BIO_printf(bio_err,"-elapsed        measure time in real time instead of CPU user time.\n");
555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573
			goto end;
			}
		argc--;
		argv++;
		j++;
		}

	if (j == 0)
		{
		for (i=0; i<ALGOR_NUM; i++)
			doit[i]=1;
		for (i=0; i<RSA_NUM; i++)
			rsa_doit[i]=1;
		for (i=0; i<DSA_NUM; i++)
			dsa_doit[i]=1;
		}
	for (i=0; i<ALGOR_NUM; i++)
		if (doit[i]) pr_header++;

574 575 576 577 578 579 580
	if (usertime == 0)
		BIO_printf(bio_err,"You have chosen to measure elapsed time instead of user CPU time.\n");
	if (usertime <= 0)
		{
		BIO_printf(bio_err,"To get the most accurate results, try to run this\n");
		BIO_printf(bio_err,"program when this computer is idle.\n");
		}
581 582 583 584 585 586 587 588 589 590 591 592 593

#ifndef NO_RSA
	for (i=0; i<RSA_NUM; i++)
		{
		unsigned char *p;

		p=rsa_data[i];
		rsa_key[i]=d2i_RSAPrivateKey(NULL,&p,rsa_data_length[i]);
		if (rsa_key[i] == NULL)
			{
			BIO_printf(bio_err,"internal error loading RSA key number %d\n",i);
			goto end;
			}
594 595 596 597 598 599 600 601
#if 0
		else
			{
			BIO_printf(bio_err,"Loaded RSA key, %d bit modulus and e= 0x",BN_num_bits(rsa_key[i]->n));
			BN_print(bio_err,rsa_key[i]->e);
			BIO_printf(bio_err,"\n");
			}
#endif
602 603 604 605 606 607 608 609 610 611
		}
#endif

#ifndef NO_DSA
	dsa_key[0]=get_dsa512();
	dsa_key[1]=get_dsa1024();
	dsa_key[2]=get_dsa2048();
#endif

#ifndef NO_DES
612 613 614
	des_set_key_unchecked(&key,sch);
	des_set_key_unchecked(&key2,sch2);
	des_set_key_unchecked(&key3,sch3);
615 616 617 618 619 620 621 622 623 624
#endif
#ifndef NO_IDEA
	idea_set_encrypt_key(key16,&idea_ks);
#endif
#ifndef NO_RC4
	RC4_set_key(&rc4_ks,16,key16);
#endif
#ifndef NO_RC2
	RC2_set_key(&rc2_ks,16,key16,128);
#endif
625 626 627
#ifndef NO_RC5
	RC5_32_set_key(&rc5_ks,16,key16,12);
#endif
628
#ifndef NO_BF
629 630
	BF_set_key(&bf_ks,16,key16);
#endif
631 632 633
#ifndef NO_CAST
	CAST_set_key(&cast_ks,16,key16);
#endif
634
#ifndef NO_RSA
635
	memset(rsa_c,0,sizeof(rsa_c));
636
#endif
637
#ifndef SIGALRM
B
Bodo Möller 已提交
638
#ifndef NO_DES
639 640 641 642 643
	BIO_printf(bio_err,"First we calculate the approximate speed ...\n");
	count=10;
	do	{
		long i;
		count*=2;
644
		Time_F(START,usertime);
645
		for (i=count; i; i--)
646 647
			des_ecb_encrypt(buf_as_des_cblock,buf_as_des_cblock,
				&(sch[0]),DES_ENCRYPT);
648
		d=Time_F(STOP,usertime);
649 650 651 652
		} while (d <3);
	c[D_MD2][0]=count/10;
	c[D_MDC2][0]=count/10;
	c[D_MD5][0]=count;
653
	c[D_HMAC][0]=count;
654
	c[D_SHA1][0]=count;
655
	c[D_RMD160][0]=count;
656 657 658 659 660
	c[D_RC4][0]=count*5;
	c[D_CBC_DES][0]=count;
	c[D_EDE3_DES][0]=count/3;
	c[D_CBC_IDEA][0]=count;
	c[D_CBC_RC2][0]=count;
661
	c[D_CBC_RC5][0]=count;
662
	c[D_CBC_BF][0]=count;
663
	c[D_CBC_CAST][0]=count;
664 665 666 667 668 669

	for (i=1; i<SIZE_NUM; i++)
		{
		c[D_MD2][i]=c[D_MD2][0]*4*lengths[0]/lengths[i];
		c[D_MDC2][i]=c[D_MDC2][0]*4*lengths[0]/lengths[i];
		c[D_MD5][i]=c[D_MD5][0]*4*lengths[0]/lengths[i];
670
		c[D_HMAC][i]=c[D_HMAC][0]*4*lengths[0]/lengths[i];
671
		c[D_SHA1][i]=c[D_SHA1][0]*4*lengths[0]/lengths[i];
672
		c[D_RMD160][i]=c[D_RMD160][0]*4*lengths[0]/lengths[i];
673 674 675 676 677 678 679 680 681 682 683 684
		}
	for (i=1; i<SIZE_NUM; i++)
		{
		long l0,l1;

		l0=(long)lengths[i-1];
		l1=(long)lengths[i];
		c[D_RC4][i]=c[D_RC4][i-1]*l0/l1;
		c[D_CBC_DES][i]=c[D_CBC_DES][i-1]*l0/l1;
		c[D_EDE3_DES][i]=c[D_EDE3_DES][i-1]*l0/l1;
		c[D_CBC_IDEA][i]=c[D_CBC_IDEA][i-1]*l0/l1;
		c[D_CBC_RC2][i]=c[D_CBC_RC2][i-1]*l0/l1;
685
		c[D_CBC_RC5][i]=c[D_CBC_RC5][i-1]*l0/l1;
686
		c[D_CBC_BF][i]=c[D_CBC_BF][i-1]*l0/l1;
687
		c[D_CBC_CAST][i]=c[D_CBC_CAST][i-1]*l0/l1;
688
		}
689
#ifndef NO_RSA
690 691 692 693 694 695 696 697 698 699
	rsa_c[R_RSA_512][0]=count/2000;
	rsa_c[R_RSA_512][1]=count/400;
	for (i=1; i<RSA_NUM; i++)
		{
		rsa_c[i][0]=rsa_c[i-1][0]/8;
		rsa_c[i][1]=rsa_c[i-1][1]/4;
		if ((rsa_doit[i] <= 1) && (rsa_c[i][0] == 0))
			rsa_doit[i]=0;
		else
			{
700
			if (rsa_c[i][0] == 0)
701 702 703 704 705 706
				{
				rsa_c[i][0]=1;
				rsa_c[i][1]=20;
				}
			}				
		}
707
#endif
708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726

	dsa_c[R_DSA_512][0]=count/1000;
	dsa_c[R_DSA_512][1]=count/1000/2;
	for (i=1; i<DSA_NUM; i++)
		{
		dsa_c[i][0]=dsa_c[i-1][0]/4;
		dsa_c[i][1]=dsa_c[i-1][1]/4;
		if ((dsa_doit[i] <= 1) && (dsa_c[i][0] == 0))
			dsa_doit[i]=0;
		else
			{
			if (dsa_c[i] == 0)
				{
				dsa_c[i][0]=1;
				dsa_c[i][1]=1;
				}
			}				
		}

727
#define COND(d)	(count < (d))
728 729
#define COUNT(d) (d)
#else
B
Bodo Möller 已提交
730 731 732 733
/* not worth fixing */
# error "You cannot disable DES on systems without SIGALRM."
#endif /* NO_DES */
#else
734 735 736
#define COND(c)	(run)
#define COUNT(d) (count)
	signal(SIGALRM,sig_done);
B
Bodo Möller 已提交
737
#endif /* SIGALRM */
738 739 740 741 742 743 744

#ifndef NO_MD2
	if (doit[D_MD2])
		{
		for (j=0; j<SIZE_NUM; j++)
			{
			print_message(names[D_MD2],c[D_MD2][j],lengths[j]);
745
			Time_F(START,usertime);
746 747
			for (count=0,run=1; COND(c[D_MD2][j]); count++)
				MD2(buf,(unsigned long)lengths[j],&(md2[0]));
748
			d=Time_F(STOP,usertime);
749 750 751 752 753 754 755 756 757 758 759 760
			BIO_printf(bio_err,"%ld %s's in %.2fs\n",
				count,names[D_MD2],d);
			results[D_MD2][j]=((double)count)/d*lengths[j];
			}
		}
#endif
#ifndef NO_MDC2
	if (doit[D_MDC2])
		{
		for (j=0; j<SIZE_NUM; j++)
			{
			print_message(names[D_MDC2],c[D_MDC2][j],lengths[j]);
761
			Time_F(START,usertime);
762 763
			for (count=0,run=1; COND(c[D_MDC2][j]); count++)
				MDC2(buf,(unsigned long)lengths[j],&(mdc2[0]));
764
			d=Time_F(STOP,usertime);
765 766 767 768 769 770 771 772 773 774 775 776 777
			BIO_printf(bio_err,"%ld %s's in %.2fs\n",
				count,names[D_MDC2],d);
			results[D_MDC2][j]=((double)count)/d*lengths[j];
			}
		}
#endif

#ifndef NO_MD5
	if (doit[D_MD5])
		{
		for (j=0; j<SIZE_NUM; j++)
			{
			print_message(names[D_MD5],c[D_MD5][j],lengths[j]);
778
			Time_F(START,usertime);
779
			for (count=0,run=1; COND(c[D_MD5][j]); count++)
780
				MD5(&(buf[0]),(unsigned long)lengths[j],&(md5[0]));
781
			d=Time_F(STOP,usertime);
782 783 784 785 786 787 788
			BIO_printf(bio_err,"%ld %s's in %.2fs\n",
				count,names[D_MD5],d);
			results[D_MD5][j]=((double)count)/d*lengths[j];
			}
		}
#endif

U
Ulf Möller 已提交
789
#if !defined(NO_MD5) && !defined(NO_HMAC)
790
	if (doit[D_HMAC])
791
		{
792 793 794 795
		HMAC_CTX hctx;
		HMAC_Init(&hctx,(unsigned char *)"This is a key...",
			16,EVP_md5());

796 797
		for (j=0; j<SIZE_NUM; j++)
			{
798
			print_message(names[D_HMAC],c[D_HMAC][j],lengths[j]);
799
			Time_F(START,usertime);
800 801 802 803 804 805
			for (count=0,run=1; COND(c[D_HMAC][j]); count++)
				{
				HMAC_Init(&hctx,NULL,0,NULL);
                                HMAC_Update(&hctx,buf,lengths[j]);
                                HMAC_Final(&hctx,&(hmac[0]),NULL);
				}
806
			d=Time_F(STOP,usertime);
807
			BIO_printf(bio_err,"%ld %s's in %.2fs\n",
808 809
				count,names[D_HMAC],d);
			results[D_HMAC][j]=((double)count)/d*lengths[j];
810 811 812
			}
		}
#endif
813
#ifndef NO_SHA
814 815 816 817 818
	if (doit[D_SHA1])
		{
		for (j=0; j<SIZE_NUM; j++)
			{
			print_message(names[D_SHA1],c[D_SHA1][j],lengths[j]);
819
			Time_F(START,usertime);
820 821
			for (count=0,run=1; COND(c[D_SHA1][j]); count++)
				SHA1(buf,(unsigned long)lengths[j],&(sha[0]));
822
			d=Time_F(STOP,usertime);
823 824 825 826 827 828
			BIO_printf(bio_err,"%ld %s's in %.2fs\n",
				count,names[D_SHA1],d);
			results[D_SHA1][j]=((double)count)/d*lengths[j];
			}
		}
#endif
829
#ifndef NO_RIPEMD
830 831 832 833 834
	if (doit[D_RMD160])
		{
		for (j=0; j<SIZE_NUM; j++)
			{
			print_message(names[D_RMD160],c[D_RMD160][j],lengths[j]);
835
			Time_F(START,usertime);
836 837
			for (count=0,run=1; COND(c[D_RMD160][j]); count++)
				RIPEMD160(buf,(unsigned long)lengths[j],&(rmd160[0]));
838
			d=Time_F(STOP,usertime);
839 840 841 842 843 844
			BIO_printf(bio_err,"%ld %s's in %.2fs\n",
				count,names[D_RMD160],d);
			results[D_RMD160][j]=((double)count)/d*lengths[j];
			}
		}
#endif
845 846 847 848 849 850
#ifndef NO_RC4
	if (doit[D_RC4])
		{
		for (j=0; j<SIZE_NUM; j++)
			{
			print_message(names[D_RC4],c[D_RC4][j],lengths[j]);
851
			Time_F(START,usertime);
852 853 854
			for (count=0,run=1; COND(c[D_RC4][j]); count++)
				RC4(&rc4_ks,(unsigned int)lengths[j],
					buf,buf);
855
			d=Time_F(STOP,usertime);
856 857 858 859 860 861 862 863 864 865 866 867
			BIO_printf(bio_err,"%ld %s's in %.2fs\n",
				count,names[D_RC4],d);
			results[D_RC4][j]=((double)count)/d*lengths[j];
			}
		}
#endif
#ifndef NO_DES
	if (doit[D_CBC_DES])
		{
		for (j=0; j<SIZE_NUM; j++)
			{
			print_message(names[D_CBC_DES],c[D_CBC_DES][j],lengths[j]);
868
			Time_F(START,usertime);
869
			for (count=0,run=1; COND(c[D_CBC_DES][j]); count++)
870
				des_ncbc_encrypt(buf,buf,lengths[j],sch,
871
						 &iv,DES_ENCRYPT);
872
			d=Time_F(STOP,usertime);
873 874 875 876 877 878 879 880 881 882 883
			BIO_printf(bio_err,"%ld %s's in %.2fs\n",
				count,names[D_CBC_DES],d);
			results[D_CBC_DES][j]=((double)count)/d*lengths[j];
			}
		}

	if (doit[D_EDE3_DES])
		{
		for (j=0; j<SIZE_NUM; j++)
			{
			print_message(names[D_EDE3_DES],c[D_EDE3_DES][j],lengths[j]);
884
			Time_F(START,usertime);
885
			for (count=0,run=1; COND(c[D_EDE3_DES][j]); count++)
886 887
				des_ede3_cbc_encrypt(buf,buf,lengths[j],
						     sch,sch2,sch3,
888
						     &iv,DES_ENCRYPT);
889
			d=Time_F(STOP,usertime);
890 891 892 893 894 895 896 897 898 899 900 901
			BIO_printf(bio_err,"%ld %s's in %.2fs\n",
				count,names[D_EDE3_DES],d);
			results[D_EDE3_DES][j]=((double)count)/d*lengths[j];
			}
		}
#endif
#ifndef NO_IDEA
	if (doit[D_CBC_IDEA])
		{
		for (j=0; j<SIZE_NUM; j++)
			{
			print_message(names[D_CBC_IDEA],c[D_CBC_IDEA][j],lengths[j]);
902
			Time_F(START,usertime);
903 904 905
			for (count=0,run=1; COND(c[D_CBC_IDEA][j]); count++)
				idea_cbc_encrypt(buf,buf,
					(unsigned long)lengths[j],&idea_ks,
906
					iv,IDEA_ENCRYPT);
907
			d=Time_F(STOP,usertime);
908 909 910 911 912 913 914 915 916 917 918 919
			BIO_printf(bio_err,"%ld %s's in %.2fs\n",
				count,names[D_CBC_IDEA],d);
			results[D_CBC_IDEA][j]=((double)count)/d*lengths[j];
			}
		}
#endif
#ifndef NO_RC2
	if (doit[D_CBC_RC2])
		{
		for (j=0; j<SIZE_NUM; j++)
			{
			print_message(names[D_CBC_RC2],c[D_CBC_RC2][j],lengths[j]);
920
			Time_F(START,usertime);
921 922 923
			for (count=0,run=1; COND(c[D_CBC_RC2][j]); count++)
				RC2_cbc_encrypt(buf,buf,
					(unsigned long)lengths[j],&rc2_ks,
924
					iv,RC2_ENCRYPT);
925
			d=Time_F(STOP,usertime);
926 927 928 929 930 931
			BIO_printf(bio_err,"%ld %s's in %.2fs\n",
				count,names[D_CBC_RC2],d);
			results[D_CBC_RC2][j]=((double)count)/d*lengths[j];
			}
		}
#endif
932 933 934 935 936 937
#ifndef NO_RC5
	if (doit[D_CBC_RC5])
		{
		for (j=0; j<SIZE_NUM; j++)
			{
			print_message(names[D_CBC_RC5],c[D_CBC_RC5][j],lengths[j]);
938
			Time_F(START,usertime);
939 940 941
			for (count=0,run=1; COND(c[D_CBC_RC5][j]); count++)
				RC5_32_cbc_encrypt(buf,buf,
					(unsigned long)lengths[j],&rc5_ks,
942
					iv,RC5_ENCRYPT);
943
			d=Time_F(STOP,usertime);
944 945 946 947 948 949
			BIO_printf(bio_err,"%ld %s's in %.2fs\n",
				count,names[D_CBC_RC5],d);
			results[D_CBC_RC5][j]=((double)count)/d*lengths[j];
			}
		}
#endif
950
#ifndef NO_BF
951 952 953 954 955
	if (doit[D_CBC_BF])
		{
		for (j=0; j<SIZE_NUM; j++)
			{
			print_message(names[D_CBC_BF],c[D_CBC_BF][j],lengths[j]);
956
			Time_F(START,usertime);
957 958 959
			for (count=0,run=1; COND(c[D_CBC_BF][j]); count++)
				BF_cbc_encrypt(buf,buf,
					(unsigned long)lengths[j],&bf_ks,
960
					iv,BF_ENCRYPT);
961
			d=Time_F(STOP,usertime);
962 963 964 965 966 967
			BIO_printf(bio_err,"%ld %s's in %.2fs\n",
				count,names[D_CBC_BF],d);
			results[D_CBC_BF][j]=((double)count)/d*lengths[j];
			}
		}
#endif
968 969 970 971 972 973
#ifndef NO_CAST
	if (doit[D_CBC_CAST])
		{
		for (j=0; j<SIZE_NUM; j++)
			{
			print_message(names[D_CBC_CAST],c[D_CBC_CAST][j],lengths[j]);
974
			Time_F(START,usertime);
975 976 977
			for (count=0,run=1; COND(c[D_CBC_CAST][j]); count++)
				CAST_cbc_encrypt(buf,buf,
					(unsigned long)lengths[j],&cast_ks,
978
					iv,CAST_ENCRYPT);
979
			d=Time_F(STOP,usertime);
980 981 982 983 984 985
			BIO_printf(bio_err,"%ld %s's in %.2fs\n",
				count,names[D_CBC_CAST],d);
			results[D_CBC_CAST][j]=((double)count)/d*lengths[j];
			}
		}
#endif
986

987
	RAND_pseudo_bytes(buf,36);
988 989 990
#ifndef NO_RSA
	for (j=0; j<RSA_NUM; j++)
		{
D
 
Dr. Stephen Henson 已提交
991
		int ret;
992
		if (!rsa_doit[j]) continue;
D
 
Dr. Stephen Henson 已提交
993
		ret=RSA_sign(NID_md5_sha1, buf,36, buf2, &rsa_num, rsa_key[j]);
994 995
		pkey_print_message("private","rsa",rsa_c[j][0],rsa_bits[j],
			RSA_SECONDS);
996
/*		RSA_blinding_on(rsa_key[j],NULL); */
997
		Time_F(START,usertime);
998 999
		for (count=0,run=1; COND(rsa_c[j][0]); count++)
			{
D
 
Dr. Stephen Henson 已提交
1000 1001 1002
			ret=RSA_sign(NID_md5_sha1, buf,36, buf2, &rsa_num,
								 rsa_key[j]);
			if (ret <= 0)
1003 1004 1005 1006 1007 1008 1009
				{
				BIO_printf(bio_err,"RSA private encrypt failure\n");
				ERR_print_errors(bio_err);
				count=1;
				break;
				}
			}
1010
		d=Time_F(STOP,usertime);
1011 1012 1013 1014 1015
		BIO_printf(bio_err,"%ld %d bit private RSA's in %.2fs\n",
			count,rsa_bits[j],d);
		rsa_results[j][0]=d/(double)count;
		rsa_count=count;

1016
#if 1
D
 
Dr. Stephen Henson 已提交
1017
		ret=RSA_verify(NID_md5_sha1, buf,36, buf2, rsa_num, rsa_key[j]);
1018 1019
		pkey_print_message("public","rsa",rsa_c[j][1],rsa_bits[j],
			RSA_SECONDS);
1020
		Time_F(START,usertime);
1021 1022
		for (count=0,run=1; COND(rsa_c[j][1]); count++)
			{
D
 
Dr. Stephen Henson 已提交
1023 1024 1025
			ret=RSA_verify(NID_md5_sha1, buf,36, buf2, rsa_num,
								rsa_key[j]);
			if (ret <= 0)
1026
				{
D
 
Dr. Stephen Henson 已提交
1027
				BIO_printf(bio_err,"RSA verify failure\n");
1028 1029 1030 1031 1032
				ERR_print_errors(bio_err);
				count=1;
				break;
				}
			}
1033
		d=Time_F(STOP,usertime);
1034 1035 1036
		BIO_printf(bio_err,"%ld %d bit public RSA's in %.2fs\n",
			count,rsa_bits[j],d);
		rsa_results[j][1]=d/(double)count;
1037
#endif
1038 1039 1040 1041 1042 1043 1044 1045 1046 1047

		if (rsa_count <= 1)
			{
			/* if longer than 10s, don't do any more */
			for (j++; j<RSA_NUM; j++)
				rsa_doit[j]=0;
			}
		}
#endif

1048
	RAND_pseudo_bytes(buf,20);
1049
#ifndef NO_DSA
1050 1051 1052 1053 1054
	if (RAND_status() != 1)
		{
		RAND_seed(rnd_seed, sizeof rnd_seed);
		rnd_fake = 1;
		}
1055 1056
	for (j=0; j<DSA_NUM; j++)
		{
1057 1058
		unsigned int kk;

1059 1060 1061
		if (!dsa_doit[j]) continue;
		DSA_generate_key(dsa_key[j]);
/*		DSA_sign_setup(dsa_key[j],NULL); */
1062 1063
		rsa_num=DSA_sign(EVP_PKEY_DSA,buf,20,buf2,
			&kk,dsa_key[j]);
1064 1065
		pkey_print_message("sign","dsa",dsa_c[j][0],dsa_bits[j],
			DSA_SECONDS);
1066
		Time_F(START,usertime);
1067 1068 1069 1070
		for (count=0,run=1; COND(dsa_c[j][0]); count++)
			{
			rsa_num=DSA_sign(EVP_PKEY_DSA,buf,20,buf2,
				&kk,dsa_key[j]);
1071
			if (rsa_num == 0)
1072 1073 1074 1075 1076 1077 1078
				{
				BIO_printf(bio_err,"DSA sign failure\n");
				ERR_print_errors(bio_err);
				count=1;
				break;
				}
			}
1079
		d=Time_F(STOP,usertime);
1080 1081 1082 1083 1084
		BIO_printf(bio_err,"%ld %d bit DSA signs in %.2fs\n",
			count,dsa_bits[j],d);
		dsa_results[j][0]=d/(double)count;
		rsa_count=count;

1085 1086
		rsa_num2=DSA_verify(EVP_PKEY_DSA,buf,20,buf2,
			kk,dsa_key[j]);
1087 1088
		pkey_print_message("verify","dsa",dsa_c[j][1],dsa_bits[j],
			DSA_SECONDS);
1089
		Time_F(START,usertime);
1090 1091 1092 1093
		for (count=0,run=1; COND(dsa_c[j][1]); count++)
			{
			rsa_num2=DSA_verify(EVP_PKEY_DSA,buf,20,buf2,
				kk,dsa_key[j]);
1094
			if (rsa_num2 == 0)
1095 1096 1097 1098 1099 1100 1101
				{
				BIO_printf(bio_err,"DSA verify failure\n");
				ERR_print_errors(bio_err);
				count=1;
				break;
				}
			}
1102
		d=Time_F(STOP,usertime);
1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113
		BIO_printf(bio_err,"%ld %d bit DSA verify in %.2fs\n",
			count,dsa_bits[j],d);
		dsa_results[j][1]=d/(double)count;

		if (rsa_count <= 1)
			{
			/* if longer than 10s, don't do any more */
			for (j++; j<DSA_NUM; j++)
				dsa_doit[j]=0;
			}
		}
1114
	if (rnd_fake) RAND_cleanup();
1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132
#endif

	fprintf(stdout,"%s\n",SSLeay_version(SSLEAY_VERSION));
        fprintf(stdout,"%s\n",SSLeay_version(SSLEAY_BUILT_ON));
	printf("options:");
	printf("%s ",BN_options());
#ifndef NO_MD2
	printf("%s ",MD2_options());
#endif
#ifndef NO_RC4
	printf("%s ",RC4_options());
#endif
#ifndef NO_DES
	printf("%s ",des_options());
#endif
#ifndef NO_IDEA
	printf("%s ",idea_options());
#endif
1133
#ifndef NO_BF
1134 1135
	printf("%s ",BF_options());
#endif
1136
	fprintf(stdout,"\n%s\n",SSLeay_version(SSLEAY_CFLAGS));
1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149

	if (pr_header)
		{
		fprintf(stdout,"The 'numbers' are in 1000s of bytes per second processed.\n"); 
		fprintf(stdout,"type        ");
		for (j=0;  j<SIZE_NUM; j++)
			fprintf(stdout,"%7d bytes",lengths[j]);
		fprintf(stdout,"\n");
		}

	for (k=0; k<ALGOR_NUM; k++)
		{
		if (!doit[k]) continue;
1150
		fprintf(stdout,"%-13s",names[k]);
1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164
		for (j=0; j<SIZE_NUM; j++)
			{
			if (results[k][j] > 10000)
				fprintf(stdout," %11.2fk",results[k][j]/1e3);
			else
				fprintf(stdout," %11.2f ",results[k][j]);
			}
		fprintf(stdout,"\n");
		}
#ifndef NO_RSA
	j=1;
	for (k=0; k<RSA_NUM; k++)
		{
		if (!rsa_doit[k]) continue;
1165 1166 1167 1168 1169
		if (j)
			{
			printf("%18ssign    verify    sign/s verify/s\n"," ");
			j=0;
			}
B
Bodo Möller 已提交
1170
		fprintf(stdout,"rsa %4u bits %8.4fs %8.4fs %8.1f %8.1f",
1171 1172
			rsa_bits[k],rsa_results[k][0],rsa_results[k][1],
			1.0/rsa_results[k][0],1.0/rsa_results[k][1]);
1173 1174 1175 1176 1177 1178 1179 1180
		fprintf(stdout,"\n");
		}
#endif
#ifndef NO_DSA
	j=1;
	for (k=0; k<DSA_NUM; k++)
		{
		if (!dsa_doit[k]) continue;
1181 1182 1183 1184
		if (j)	{
			printf("%18ssign    verify    sign/s verify/s\n"," ");
			j=0;
			}
B
Bodo Möller 已提交
1185
		fprintf(stdout,"dsa %4u bits %8.4fs %8.4fs %8.1f %8.1f",
1186 1187
			dsa_bits[k],dsa_results[k][0],dsa_results[k][1],
			1.0/dsa_results[k][0],1.0/dsa_results[k][1]);
1188 1189 1190
		fprintf(stdout,"\n");
		}
#endif
B
Ben Laurie 已提交
1191
	mret=0;
1192
end:
1193 1194
	if (buf != NULL) OPENSSL_free(buf);
	if (buf2 != NULL) OPENSSL_free(buf2);
1195 1196 1197 1198 1199 1200 1201 1202 1203 1204
#ifndef NO_RSA
	for (i=0; i<RSA_NUM; i++)
		if (rsa_key[i] != NULL)
			RSA_free(rsa_key[i]);
#endif
#ifndef NO_DSA
	for (i=0; i<DSA_NUM; i++)
		if (dsa_key[i] != NULL)
			DSA_free(dsa_key[i]);
#endif
B
Ben Laurie 已提交
1205
	EXIT(mret);
1206 1207
	}

U
Ulf Möller 已提交
1208
static void print_message(char *s, long num, int length)
1209 1210 1211
	{
#ifdef SIGALRM
	BIO_printf(bio_err,"Doing %s for %ds on %d size blocks: ",s,SECONDS,length);
B
Bodo Möller 已提交
1212
	(void)BIO_flush(bio_err);
1213 1214 1215
	alarm(SECONDS);
#else
	BIO_printf(bio_err,"Doing %s %ld times on %d size blocks: ",s,num,length);
B
Bodo Möller 已提交
1216
	(void)BIO_flush(bio_err);
1217 1218 1219 1220 1221 1222
#endif
#ifdef LINT
	num=num;
#endif
	}

U
Ulf Möller 已提交
1223 1224
static void pkey_print_message(char *str, char *str2, long num, int bits,
	     int tm)
1225 1226 1227
	{
#ifdef SIGALRM
	BIO_printf(bio_err,"Doing %d bit %s %s's for %ds: ",bits,str,str2,tm);
B
Bodo Möller 已提交
1228
	(void)BIO_flush(bio_err);
1229 1230 1231
	alarm(RSA_SECONDS);
#else
	BIO_printf(bio_err,"Doing %ld %d bit %s %s's: ",num,bits,str,str2);
B
Bodo Möller 已提交
1232
	(void)BIO_flush(bio_err);
1233 1234 1235 1236 1237
#endif
#ifdef LINT
	num=num;
#endif
	}
1238