Lines Matching +full:mingw +full:- +full:no +full:- +full:asm
5 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
51 /* *INDENT-OFF* */
52 #ifndef asm
53 #define asm __asm macro
55 /* *INDENT-ON* */
106 #define HEADER_FORMAT " %-24s : "
124 mbedtls_printf("FAILED: -0x%04x\n", (unsigned int) -ret);
155 (mbedtls_timing_hardclock() - tsc) \
165 * sed -n 's/.*[T]IME_PUBLIC.*"\(.*\)",/\1/p' programs/test/benchmark.c |
166 * awk '{print length+3}' | sort -rn | head -n1
186 ii = TITLE_SPACE > (title_len) ? TITLE_SPACE - (title_len) : 1; \
187 while (ii--) mbedtls_printf(" "); \
188 max_used -= prv_used; \
189 max_blocks -= prv_blocks; \
193 (unsigned) (alloc_cnt - prv_alloc));
251 /* some versions of mingw-64 have 32-bit longs even on x84_64 */
261 asm volatile ("rdtsc" : "=a" (lo), "=d" (hi)); in mbedtls_timing_hardclock()
275 asm volatile ("rdtsc" : "=a" (lo), "=d" (hi)); in mbedtls_timing_hardclock()
291 asm volatile ("mftbu %0" : "=r" (tbu0)); in mbedtls_timing_hardclock()
292 asm volatile ("mftb %0" : "=r" (tbl)); in mbedtls_timing_hardclock()
293 asm volatile ("mftbu %0" : "=r" (tbu1)); in mbedtls_timing_hardclock()
312 asm volatile ("rdpr %%tick, %0;" : "=&r" (tick)); in mbedtls_timing_hardclock()
327 asm volatile (".byte 0x83, 0x41, 0x00, 0x00"); in mbedtls_timing_hardclock()
328 asm volatile ("mov %%g1, %0" : "=r" (tick)); in mbedtls_timing_hardclock()
342 asm volatile ("rpcc %0" : "=r" (cc)); in mbedtls_timing_hardclock()
356 asm volatile ("mov %0 = ar.itc" : "=r" (itc)); in mbedtls_timing_hardclock()
394 return (tv_cur.tv_sec - tv_init.tv_sec) * 1000000U in mbedtls_timing_hardclock()
395 + (tv_cur.tv_usec - tv_init.tv_usec); in mbedtls_timing_hardclock()
418 /* No need to create a thread for this simple case. in mbedtls_set_alarm()
470 len -= use_len; in myrand()
535 (void) curve_list; /* Unused in some configurations where no benchmark uses ECC */ in main()
645 TIME_AND_TSC("SHA-1", mbedtls_sha1(buf, BUFSIZE, tmp)); in main()
651 TIME_AND_TSC("SHA-256", mbedtls_sha256(buf, BUFSIZE, tmp, 0)); in main()
657 TIME_AND_TSC("SHA-512", mbedtls_sha512(buf, BUFSIZE, tmp, 0)); in main()
662 TIME_AND_TSC("SHA3-224", mbedtls_sha3(MBEDTLS_SHA3_224, buf, BUFSIZE, tmp, 28)); in main()
665 TIME_AND_TSC("SHA3-256", mbedtls_sha3(MBEDTLS_SHA3_256, buf, BUFSIZE, tmp, 32)); in main()
668 TIME_AND_TSC("SHA3-384", mbedtls_sha3(MBEDTLS_SHA3_384, buf, BUFSIZE, tmp, 48)); in main()
671 TIME_AND_TSC("SHA3-512", mbedtls_sha3(MBEDTLS_SHA3_512, buf, BUFSIZE, tmp, 64)); in main()
712 TIME_AND_TSC("3DES-CMAC", in main()
727 mbedtls_snprintf(title, sizeof(title), "AES-CBC-%d", keysize); in main()
747 mbedtls_snprintf(title, sizeof(title), "AES-CFB128-%d", keysize); in main()
765 mbedtls_snprintf(title, sizeof(title), "AES-CFB8-%d", keysize); in main()
787 mbedtls_snprintf(title, sizeof(title), "AES-CTR-%d", keysize); in main()
809 mbedtls_snprintf(title, sizeof(title), "AES-XTS-%d", keysize); in main()
830 mbedtls_snprintf(title, sizeof(title), "AES-GCM-%d", keysize); in main()
851 mbedtls_snprintf(title, sizeof(title), "AES-CCM-%d", keysize); in main()
873 mbedtls_snprintf(title, sizeof(title), "ChaCha20-Poly1305"); in main()
894 mbedtls_snprintf(title, sizeof(title), "AES-CMAC-%d", keysize); in main()
908 TIME_AND_TSC("AES-CMAC-PRF-128", in main()
922 mbedtls_snprintf(title, sizeof(title), "ARIA-CBC-%d", keysize); in main()
943 mbedtls_snprintf(title, sizeof(title), "CAMELLIA-CBC-%d", keysize); in main()
1008 TIME_AND_TSC("HMAC_DRBG SHA-1 (NOPR)", in main()
1016 TIME_AND_TSC("HMAC_DRBG SHA-1 (PR)", in main()
1028 TIME_AND_TSC("HMAC_DRBG SHA-256 (NOPR)", in main()
1036 TIME_AND_TSC("HMAC_DRBG SHA-256 (PR)", in main()
1049 mbedtls_snprintf(title, sizeof(title), "RSA-%d", keysize); in main()
1111 mbedtls_snprintf(title, sizeof(title), "DHE-%d", dhm_sizes[i]); in main()
1118 mbedtls_snprintf(title, sizeof(title), "DH-%d", dhm_sizes[i]); in main()
1138 curve_info->grp_id != MBEDTLS_ECP_DP_NONE; in main()
1140 if (!mbedtls_ecdsa_can_do(curve_info->grp_id)) { in main()
1146 if (mbedtls_ecdsa_genkey(&ecdsa, curve_info->grp_id, myrand, NULL) != 0) { in main()
1150 mbedtls_snprintf(title, sizeof(title), "ECDSA-%s", in main()
1151 curve_info->name); in main()
1156 curve_info->bit_size, in main()
1164 curve_info->grp_id != MBEDTLS_ECP_DP_NONE; in main()
1166 if (!mbedtls_ecdsa_can_do(curve_info->grp_id)) { in main()
1172 if (mbedtls_ecdsa_genkey(&ecdsa, curve_info->grp_id, myrand, NULL) != 0 || in main()
1173 mbedtls_ecdsa_write_signature(&ecdsa, MBEDTLS_MD_SHA256, buf, curve_info->bit_size, in main()
1178 mbedtls_snprintf(title, sizeof(title), "ECDSA-%s", in main()
1179 curve_info->name); in main()
1181 ret = mbedtls_ecdsa_read_signature(&ecdsa, buf, curve_info->bit_size, in main()
1197 curve_info->grp_id != MBEDTLS_ECP_DP_NONE; in main()
1199 if (!mbedtls_ecdh_can_do(curve_info->grp_id)) { in main()
1205 CHECK_AND_CONTINUE(mbedtls_ecdh_setup(&ecdh_srv, curve_info->grp_id)); in main()
1209 mbedtls_snprintf(title, sizeof(title), "ECDHE-%s", curve_info->name); in main()
1229 curve_info->grp_id != MBEDTLS_ECP_DP_NONE; in main()
1231 if (!mbedtls_ecdh_can_do(curve_info->grp_id)) { in main()
1238 CHECK_AND_CONTINUE(mbedtls_ecdh_setup(&ecdh_srv, curve_info->grp_id)); in main()
1249 mbedtls_snprintf(title, sizeof(title), "ECDH-%s", curve_info->name); in main()