diff options
author | tb <> | 2024-11-30 10:05:41 +0000 |
---|---|---|
committer | tb <> | 2024-11-30 10:05:41 +0000 |
commit | 3f6eb9bb1205bfa957d4cfefd8e4f33fd954952a (patch) | |
tree | 82b1ea60ed63dcdbd04794510ead638727c75654 /src | |
parent | b904925934b9c033c83089cd3b396ae763a5ea3f (diff) | |
download | openbsd-3f6eb9bb1205bfa957d4cfefd8e4f33fd954952a.tar.gz openbsd-3f6eb9bb1205bfa957d4cfefd8e4f33fd954952a.tar.bz2 openbsd-3f6eb9bb1205bfa957d4cfefd8e4f33fd954952a.zip |
openssl speed: stop trying to use small curves
secp160r1 and nistp192 are no longer available in libcrypto. Should have
been committed along with disabling these curves, but was missed.
ok jsing
Diffstat (limited to 'src')
-rw-r--r-- | src/usr.bin/openssl/speed.c | 36 |
1 files changed, 11 insertions, 25 deletions
diff --git a/src/usr.bin/openssl/speed.c b/src/usr.bin/openssl/speed.c index 4e8814cea0..7b98e6776d 100644 --- a/src/usr.bin/openssl/speed.c +++ b/src/usr.bin/openssl/speed.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: speed.c,v 1.39 2024/07/13 16:43:56 tb Exp $ */ | 1 | /* $OpenBSD: speed.c,v 1.40 2024/11/30 10:05:41 tb Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -168,7 +168,7 @@ static int do_multi(int multi); | |||
168 | #define RSA_NUM 4 | 168 | #define RSA_NUM 4 |
169 | #define DSA_NUM 3 | 169 | #define DSA_NUM 3 |
170 | 170 | ||
171 | #define EC_NUM 6 | 171 | #define EC_NUM 4 |
172 | #define MAX_ECDH_SIZE 256 | 172 | #define MAX_ECDH_SIZE 256 |
173 | 173 | ||
174 | static const char *names[ALGOR_NUM] = { | 174 | static const char *names[ALGOR_NUM] = { |
@@ -362,12 +362,10 @@ speed_main(int argc, char **argv) | |||
362 | #define R_RSA_2048 2 | 362 | #define R_RSA_2048 2 |
363 | #define R_RSA_4096 3 | 363 | #define R_RSA_4096 3 |
364 | 364 | ||
365 | #define R_EC_P160 0 | 365 | #define R_EC_P224 0 |
366 | #define R_EC_P192 1 | 366 | #define R_EC_P256 1 |
367 | #define R_EC_P224 2 | 367 | #define R_EC_P384 2 |
368 | #define R_EC_P256 3 | 368 | #define R_EC_P521 3 |
369 | #define R_EC_P384 4 | ||
370 | #define R_EC_P521 5 | ||
371 | 369 | ||
372 | RSA *rsa_key[RSA_NUM]; | 370 | RSA *rsa_key[RSA_NUM]; |
373 | long rsa_c[RSA_NUM][2]; | 371 | long rsa_c[RSA_NUM][2]; |
@@ -388,23 +386,19 @@ speed_main(int argc, char **argv) | |||
388 | * accordingly. | 386 | * accordingly. |
389 | */ | 387 | */ |
390 | static unsigned int test_curves[EC_NUM] = { | 388 | static unsigned int test_curves[EC_NUM] = { |
391 | NID_secp160r1, | ||
392 | NID_X9_62_prime192v1, | ||
393 | NID_secp224r1, | 389 | NID_secp224r1, |
394 | NID_X9_62_prime256v1, | 390 | NID_X9_62_prime256v1, |
395 | NID_secp384r1, | 391 | NID_secp384r1, |
396 | NID_secp521r1, | 392 | NID_secp521r1, |
397 | }; | 393 | }; |
398 | static const char *test_curves_names[EC_NUM] = { | 394 | static const char *test_curves_names[EC_NUM] = { |
399 | "secp160r1", | ||
400 | "nistp192", | ||
401 | "nistp224", | 395 | "nistp224", |
402 | "nistp256", | 396 | "nistp256", |
403 | "nistp384", | 397 | "nistp384", |
404 | "nistp521", | 398 | "nistp521", |
405 | }; | 399 | }; |
406 | static int test_curves_bits[EC_NUM] = { | 400 | static int test_curves_bits[EC_NUM] = { |
407 | 160, 192, 224, 256, 384, 521, | 401 | 224, 256, 384, 521, |
408 | }; | 402 | }; |
409 | 403 | ||
410 | #endif | 404 | #endif |
@@ -719,11 +713,7 @@ speed_main(int argc, char **argv) | |||
719 | dsa_doit[R_DSA_512] = 1; | 713 | dsa_doit[R_DSA_512] = 1; |
720 | dsa_doit[R_DSA_1024] = 1; | 714 | dsa_doit[R_DSA_1024] = 1; |
721 | dsa_doit[R_DSA_2048] = 1; | 715 | dsa_doit[R_DSA_2048] = 1; |
722 | } else if (strcmp(*argv, "ecdsap160") == 0) | 716 | } else if (strcmp(*argv, "ecdsap224") == 0) |
723 | ecdsa_doit[R_EC_P160] = 2; | ||
724 | else if (strcmp(*argv, "ecdsap192") == 0) | ||
725 | ecdsa_doit[R_EC_P192] = 2; | ||
726 | else if (strcmp(*argv, "ecdsap224") == 0) | ||
727 | ecdsa_doit[R_EC_P224] = 2; | 717 | ecdsa_doit[R_EC_P224] = 2; |
728 | else if (strcmp(*argv, "ecdsap256") == 0) | 718 | else if (strcmp(*argv, "ecdsap256") == 0) |
729 | ecdsa_doit[R_EC_P256] = 2; | 719 | ecdsa_doit[R_EC_P256] = 2; |
@@ -734,11 +724,7 @@ speed_main(int argc, char **argv) | |||
734 | else if (strcmp(*argv, "ecdsa") == 0) { | 724 | else if (strcmp(*argv, "ecdsa") == 0) { |
735 | for (i = 0; i < EC_NUM; i++) | 725 | for (i = 0; i < EC_NUM; i++) |
736 | ecdsa_doit[i] = 1; | 726 | ecdsa_doit[i] = 1; |
737 | } else if (strcmp(*argv, "ecdhp160") == 0) | 727 | } else if (strcmp(*argv, "ecdhp224") == 0) |
738 | ecdh_doit[R_EC_P160] = 2; | ||
739 | else if (strcmp(*argv, "ecdhp192") == 0) | ||
740 | ecdh_doit[R_EC_P192] = 2; | ||
741 | else if (strcmp(*argv, "ecdhp224") == 0) | ||
742 | ecdh_doit[R_EC_P224] = 2; | 728 | ecdh_doit[R_EC_P224] = 2; |
743 | else if (strcmp(*argv, "ecdhp256") == 0) | 729 | else if (strcmp(*argv, "ecdhp256") == 0) |
744 | ecdh_doit[R_EC_P256] = 2; | 730 | ecdh_doit[R_EC_P256] = 2; |
@@ -816,8 +802,8 @@ speed_main(int argc, char **argv) | |||
816 | BIO_printf(bio_err, "rsa512 rsa1024 rsa2048 rsa4096\n"); | 802 | BIO_printf(bio_err, "rsa512 rsa1024 rsa2048 rsa4096\n"); |
817 | 803 | ||
818 | BIO_printf(bio_err, "dsa512 dsa1024 dsa2048\n"); | 804 | BIO_printf(bio_err, "dsa512 dsa1024 dsa2048\n"); |
819 | BIO_printf(bio_err, "ecdsap160 ecdsap192 ecdsap224 ecdsap256 ecdsap384 ecdsap521\n"); | 805 | BIO_printf(bio_err, "ecdsap224 ecdsap256 ecdsap384 ecdsap521\n"); |
820 | BIO_printf(bio_err, "ecdhp160 ecdhp192 ecdhp224 ecdhp256 ecdhp384 ecdhp521\n"); | 806 | BIO_printf(bio_err, "ecdhp224 ecdhp256 ecdhp384 ecdhp521\n"); |
821 | 807 | ||
822 | #ifndef OPENSSL_NO_IDEA | 808 | #ifndef OPENSSL_NO_IDEA |
823 | BIO_printf(bio_err, "idea "); | 809 | BIO_printf(bio_err, "idea "); |