diff options
| author | doug <> | 2015-02-08 10:22:45 +0000 |
|---|---|---|
| committer | doug <> | 2015-02-08 10:22:45 +0000 |
| commit | aadeac45679210d7a9938059e6af0b6143c7c9c6 (patch) | |
| tree | ba58b46fda227cb1089ceb084bb49a3366291f24 /src/usr.bin/openssl/speed.c | |
| parent | 89fcaed452ee7306b5217661570015ceba637a83 (diff) | |
| download | openbsd-aadeac45679210d7a9938059e6af0b6143c7c9c6.tar.gz openbsd-aadeac45679210d7a9938059e6af0b6143c7c9c6.tar.bz2 openbsd-aadeac45679210d7a9938059e6af0b6143c7c9c6.zip | |
Delete commented out code from openssl(1) apps.
From OpenSSL commits:
6f91b017bbb7140f816721141ac156d1b828a6b3
75d0ebef2aef7a2c77b27575b8da898e22f3ccd5
a2b18e657ea1a932d125154f4e13ab2258796d90
ok miod@, jsing@
Diffstat (limited to '')
| -rw-r--r-- | src/usr.bin/openssl/speed.c | 22 |
1 files changed, 2 insertions, 20 deletions
diff --git a/src/usr.bin/openssl/speed.c b/src/usr.bin/openssl/speed.c index e40607f940..8795d6c434 100644 --- a/src/usr.bin/openssl/speed.c +++ b/src/usr.bin/openssl/speed.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: speed.c,v 1.4 2015/01/03 03:03:39 lteo Exp $ */ | 1 | /* $OpenBSD: speed.c,v 1.5 2015/02/08 10:22:45 doug Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -675,12 +675,6 @@ speed_main(int argc, char **argv) | |||
| 675 | doit[D_CBC_256_CML] = 1; | 675 | doit[D_CBC_256_CML] = 1; |
| 676 | else | 676 | else |
| 677 | #endif | 677 | #endif |
| 678 | #if 0 /* was: #ifdef RSAref */ | ||
| 679 | if (strcmp(*argv, "rsaref") == 0) { | ||
| 680 | RSA_set_default_openssl_method(RSA_PKCS1_RSAref()); | ||
| 681 | j--; | ||
| 682 | } else | ||
| 683 | #endif | ||
| 684 | #ifndef RSA_NULL | 678 | #ifndef RSA_NULL |
| 685 | if (strcmp(*argv, "openssl") == 0) { | 679 | if (strcmp(*argv, "openssl") == 0) { |
| 686 | RSA_set_default_method(RSA_PKCS1_SSLeay()); | 680 | RSA_set_default_method(RSA_PKCS1_SSLeay()); |
| @@ -1004,15 +998,6 @@ speed_main(int argc, char **argv) | |||
| 1004 | BIO_printf(bio_err, "internal error loading RSA key number %d\n", i); | 998 | BIO_printf(bio_err, "internal error loading RSA key number %d\n", i); |
| 1005 | goto end; | 999 | goto end; |
| 1006 | } | 1000 | } |
| 1007 | #if 0 | ||
| 1008 | else { | ||
| 1009 | BIO_printf(bio_err, mr ? "+RK:%d:" | ||
| 1010 | : "Loaded RSA key, %d bit modulus and e= 0x", | ||
| 1011 | BN_num_bits(rsa_key[i]->n)); | ||
| 1012 | BN_print(bio_err, rsa_key[i]->e); | ||
| 1013 | BIO_printf(bio_err, "\n"); | ||
| 1014 | } | ||
| 1015 | #endif | ||
| 1016 | } | 1001 | } |
| 1017 | 1002 | ||
| 1018 | dsa_key[0] = get_dsa512(); | 1003 | dsa_key[0] = get_dsa512(); |
| @@ -1501,7 +1486,6 @@ speed_main(int argc, char **argv) | |||
| 1501 | rsa_count = count; | 1486 | rsa_count = count; |
| 1502 | } | 1487 | } |
| 1503 | 1488 | ||
| 1504 | #if 1 | ||
| 1505 | ret = RSA_verify(NID_md5_sha1, buf, 36, buf2, rsa_num, rsa_key[j]); | 1489 | ret = RSA_verify(NID_md5_sha1, buf, 36, buf2, rsa_num, rsa_key[j]); |
| 1506 | if (ret <= 0) { | 1490 | if (ret <= 0) { |
| 1507 | BIO_printf(bio_err, "RSA verify failure. No RSA verify will be done.\n"); | 1491 | BIO_printf(bio_err, "RSA verify failure. No RSA verify will be done.\n"); |
| @@ -1529,7 +1513,6 @@ speed_main(int argc, char **argv) | |||
| 1529 | count, rsa_bits[j], d); | 1513 | count, rsa_bits[j], d); |
| 1530 | rsa_results[j][1] = d / (double) count; | 1514 | rsa_results[j][1] = d / (double) count; |
| 1531 | } | 1515 | } |
| 1532 | #endif | ||
| 1533 | 1516 | ||
| 1534 | if (rsa_count <= 1) { | 1517 | if (rsa_count <= 1) { |
| 1535 | /* if longer than 10s, don't do any more */ | 1518 | /* if longer than 10s, don't do any more */ |
| @@ -1624,9 +1607,8 @@ speed_main(int argc, char **argv) | |||
| 1624 | ERR_print_errors(bio_err); | 1607 | ERR_print_errors(bio_err); |
| 1625 | rsa_count = 1; | 1608 | rsa_count = 1; |
| 1626 | } else { | 1609 | } else { |
| 1627 | #if 1 | ||
| 1628 | EC_KEY_precompute_mult(ecdsa[j], NULL); | 1610 | EC_KEY_precompute_mult(ecdsa[j], NULL); |
| 1629 | #endif | 1611 | |
| 1630 | /* Perform ECDSA signature test */ | 1612 | /* Perform ECDSA signature test */ |
| 1631 | EC_KEY_generate_key(ecdsa[j]); | 1613 | EC_KEY_generate_key(ecdsa[j]); |
| 1632 | ret = ECDSA_sign(0, buf, 20, ecdsasig, | 1614 | ret = ECDSA_sign(0, buf, 20, ecdsasig, |
