diff options
Diffstat (limited to '')
-rw-r--r-- | src/usr.bin/openssl/speed.c | 22 |
1 files changed, 2 insertions, 20 deletions
diff --git a/src/usr.bin/openssl/speed.c b/src/usr.bin/openssl/speed.c index e40607f940..8795d6c434 100644 --- a/src/usr.bin/openssl/speed.c +++ b/src/usr.bin/openssl/speed.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: speed.c,v 1.4 2015/01/03 03:03:39 lteo Exp $ */ | 1 | /* $OpenBSD: speed.c,v 1.5 2015/02/08 10:22:45 doug Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -675,12 +675,6 @@ speed_main(int argc, char **argv) | |||
675 | doit[D_CBC_256_CML] = 1; | 675 | doit[D_CBC_256_CML] = 1; |
676 | else | 676 | else |
677 | #endif | 677 | #endif |
678 | #if 0 /* was: #ifdef RSAref */ | ||
679 | if (strcmp(*argv, "rsaref") == 0) { | ||
680 | RSA_set_default_openssl_method(RSA_PKCS1_RSAref()); | ||
681 | j--; | ||
682 | } else | ||
683 | #endif | ||
684 | #ifndef RSA_NULL | 678 | #ifndef RSA_NULL |
685 | if (strcmp(*argv, "openssl") == 0) { | 679 | if (strcmp(*argv, "openssl") == 0) { |
686 | RSA_set_default_method(RSA_PKCS1_SSLeay()); | 680 | RSA_set_default_method(RSA_PKCS1_SSLeay()); |
@@ -1004,15 +998,6 @@ speed_main(int argc, char **argv) | |||
1004 | BIO_printf(bio_err, "internal error loading RSA key number %d\n", i); | 998 | BIO_printf(bio_err, "internal error loading RSA key number %d\n", i); |
1005 | goto end; | 999 | goto end; |
1006 | } | 1000 | } |
1007 | #if 0 | ||
1008 | else { | ||
1009 | BIO_printf(bio_err, mr ? "+RK:%d:" | ||
1010 | : "Loaded RSA key, %d bit modulus and e= 0x", | ||
1011 | BN_num_bits(rsa_key[i]->n)); | ||
1012 | BN_print(bio_err, rsa_key[i]->e); | ||
1013 | BIO_printf(bio_err, "\n"); | ||
1014 | } | ||
1015 | #endif | ||
1016 | } | 1001 | } |
1017 | 1002 | ||
1018 | dsa_key[0] = get_dsa512(); | 1003 | dsa_key[0] = get_dsa512(); |
@@ -1501,7 +1486,6 @@ speed_main(int argc, char **argv) | |||
1501 | rsa_count = count; | 1486 | rsa_count = count; |
1502 | } | 1487 | } |
1503 | 1488 | ||
1504 | #if 1 | ||
1505 | ret = RSA_verify(NID_md5_sha1, buf, 36, buf2, rsa_num, rsa_key[j]); | 1489 | ret = RSA_verify(NID_md5_sha1, buf, 36, buf2, rsa_num, rsa_key[j]); |
1506 | if (ret <= 0) { | 1490 | if (ret <= 0) { |
1507 | BIO_printf(bio_err, "RSA verify failure. No RSA verify will be done.\n"); | 1491 | BIO_printf(bio_err, "RSA verify failure. No RSA verify will be done.\n"); |
@@ -1529,7 +1513,6 @@ speed_main(int argc, char **argv) | |||
1529 | count, rsa_bits[j], d); | 1513 | count, rsa_bits[j], d); |
1530 | rsa_results[j][1] = d / (double) count; | 1514 | rsa_results[j][1] = d / (double) count; |
1531 | } | 1515 | } |
1532 | #endif | ||
1533 | 1516 | ||
1534 | if (rsa_count <= 1) { | 1517 | if (rsa_count <= 1) { |
1535 | /* if longer than 10s, don't do any more */ | 1518 | /* if longer than 10s, don't do any more */ |
@@ -1624,9 +1607,8 @@ speed_main(int argc, char **argv) | |||
1624 | ERR_print_errors(bio_err); | 1607 | ERR_print_errors(bio_err); |
1625 | rsa_count = 1; | 1608 | rsa_count = 1; |
1626 | } else { | 1609 | } else { |
1627 | #if 1 | ||
1628 | EC_KEY_precompute_mult(ecdsa[j], NULL); | 1610 | EC_KEY_precompute_mult(ecdsa[j], NULL); |
1629 | #endif | 1611 | |
1630 | /* Perform ECDSA signature test */ | 1612 | /* Perform ECDSA signature test */ |
1631 | EC_KEY_generate_key(ecdsa[j]); | 1613 | EC_KEY_generate_key(ecdsa[j]); |
1632 | ret = ECDSA_sign(0, buf, 20, ecdsasig, | 1614 | ret = ECDSA_sign(0, buf, 20, ecdsasig, |