// // gettsc.inl // // gives access to the Pentium's (secret) cycle counter // // This software was written by Leonard Janke (janke@unixg.ubc.ca) // in 1996-7 and is entered, by him, into the public domain. #if defined(__WATCOMC__) void GetTSC(unsigned long&); #pragma aux GetTSC = 0x0f 0x31 "mov [edi], eax" parm [edi] modify [edx eax]; #elif defined(__GNUC__) inline void GetTSC(unsigned long& tsc) { asm volatile(".byte 15, 49\n\t" : "=eax" (tsc) : : "%edx", "%eax"); } #elif defined(_MSC_VER) inline void GetTSC(unsigned long& tsc) { unsigned long a; __asm _emit 0fh __asm _emit 31h __asm mov a, eax; tsc=a; } #endif #include #include #include void main(int argc,char *argv[]) { unsigned char buffer[1024]; RC4_KEY ctx; unsigned long s1,s2,e1,e2; unsigned char k[16]; unsigned long data[2]; unsigned char iv[8]; int i,num=64,numm; int j=0; if (argc >= 2) num=atoi(argv[1]); if (num == 0) num=256; if (num > 1024-16) num=1024-16; numm=num+8; for (j=0; j<6; j++) { for (i=0; i<10; i++) /**/ { RC4(&ctx,numm,buffer,buffer); GetTSC(s1); RC4(&ctx,numm,buffer,buffer); GetTSC(e1); GetTSC(s2); RC4(&ctx,num,buffer,buffer); GetTSC(e2); RC4(&ctx,num,buffer,buffer); } printf("RC4 (%d bytes) %d %d (%d) - 8 bytes\n",num, e1-s1,e2-s2,(e1-s1)-(e2-s2)); } } .py?id=95ac922b7c662b715c3b68e285ae4e2c9dcca79c'>treecommitdiff
blob: 438853558d254eab5281afc18d99c54443627cef (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
"""
Generate config for a test RPKI root certificate for resources
specified in asns.csv and prefixes.csv.

This script is separate from arin-to-csv.py so that we can convert on
the fly rather than having to pull the entire database into memory.

$Id$

Copyright (C) 2009-2012  Internet Systems Consortium ("ISC")

Permission to use, copy, modify, and distribute this software for any
purpose with or without fee is hereby granted, provided that the above
copyright notice and this permission notice appear in all copies.

THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS.  IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
PERFORMANCE OF THIS SOFTWARE.
"""

import sys
from rpki.csv_utils import csv_reader

if len(sys.argv) not in (2, 4):
  sys.exit("Usage: %s holder [asns.csv prefixes.csv]" % sys.argv[0])

print '''\
[req]
default_bits                    = 2048
default_md                      = sha256
distinguished_name              = req_dn
prompt                          = no
encrypt_key                     = no

[req_dn]
CN                              = Pseudo-%(HOLDER)s testbed root RPKI certificate

[x509v3_extensions]
basicConstraints                = critical,CA:true
subjectKeyIdentifier            = hash
keyUsage                        = critical,keyCertSign,cRLSign
subjectInfoAccess               = 1.3.6.1.5.5.7.48.5;URI:rsync://%(holder)s.rpki.net/rpki/%(holder)s/,1.3.6.1.5.5.7.48.10;URI:rsync://%(holder)s.rpki.net/rpki/%(holder)s/root.mft
certificatePolicies             = critical,1.3.6.1.5.5.7.14.2
sbgp-autonomousSysNum           = critical,@rfc3779_asns
sbgp-ipAddrBlock                = critical,@rfc3997_addrs

[rfc3779_asns]
''' % { "holder" : sys.argv[1].lower(),
        "HOLDER" : sys.argv[1].upper() }

for i, asn in enumerate(asn for handle, asn in csv_reader(sys.argv[2] if len(sys.argv) > 2 else "asns.csv", columns = 2)):
  print "AS.%d = %s" % (i, asn)

print '''\

[rfc3997_addrs]

'''

for i, prefix in enumerate(prefix for handle, prefix in csv_reader(sys.argv[3] if len(sys.argv) > 2 else "prefixes.csv", columns = 2)):
  v = 6 if ":" in prefix else 4
  print "IPv%d.%d = %s" % (v, i, prefix)