summaryrefslogtreecommitdiff
path: root/src/usr.bin/openssl/speed.c
diff options
context:
space:
mode:
Diffstat (limited to '')
-rw-r--r--src/usr.bin/openssl/speed.c22
1 files changed, 2 insertions, 20 deletions
diff --git a/src/usr.bin/openssl/speed.c b/src/usr.bin/openssl/speed.c
index e40607f940..8795d6c434 100644
--- a/src/usr.bin/openssl/speed.c
+++ b/src/usr.bin/openssl/speed.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: speed.c,v 1.4 2015/01/03 03:03:39 lteo Exp $ */ 1/* $OpenBSD: speed.c,v 1.5 2015/02/08 10:22:45 doug Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -675,12 +675,6 @@ speed_main(int argc, char **argv)
675 doit[D_CBC_256_CML] = 1; 675 doit[D_CBC_256_CML] = 1;
676 else 676 else
677#endif 677#endif
678#if 0 /* was: #ifdef RSAref */
679 if (strcmp(*argv, "rsaref") == 0) {
680 RSA_set_default_openssl_method(RSA_PKCS1_RSAref());
681 j--;
682 } else
683#endif
684#ifndef RSA_NULL 678#ifndef RSA_NULL
685 if (strcmp(*argv, "openssl") == 0) { 679 if (strcmp(*argv, "openssl") == 0) {
686 RSA_set_default_method(RSA_PKCS1_SSLeay()); 680 RSA_set_default_method(RSA_PKCS1_SSLeay());
@@ -1004,15 +998,6 @@ speed_main(int argc, char **argv)
1004 BIO_printf(bio_err, "internal error loading RSA key number %d\n", i); 998 BIO_printf(bio_err, "internal error loading RSA key number %d\n", i);
1005 goto end; 999 goto end;
1006 } 1000 }
1007#if 0
1008 else {
1009 BIO_printf(bio_err, mr ? "+RK:%d:"
1010 : "Loaded RSA key, %d bit modulus and e= 0x",
1011 BN_num_bits(rsa_key[i]->n));
1012 BN_print(bio_err, rsa_key[i]->e);
1013 BIO_printf(bio_err, "\n");
1014 }
1015#endif
1016 } 1001 }
1017 1002
1018 dsa_key[0] = get_dsa512(); 1003 dsa_key[0] = get_dsa512();
@@ -1501,7 +1486,6 @@ speed_main(int argc, char **argv)
1501 rsa_count = count; 1486 rsa_count = count;
1502 } 1487 }
1503 1488
1504#if 1
1505 ret = RSA_verify(NID_md5_sha1, buf, 36, buf2, rsa_num, rsa_key[j]); 1489 ret = RSA_verify(NID_md5_sha1, buf, 36, buf2, rsa_num, rsa_key[j]);
1506 if (ret <= 0) { 1490 if (ret <= 0) {
1507 BIO_printf(bio_err, "RSA verify failure. No RSA verify will be done.\n"); 1491 BIO_printf(bio_err, "RSA verify failure. No RSA verify will be done.\n");
@@ -1529,7 +1513,6 @@ speed_main(int argc, char **argv)
1529 count, rsa_bits[j], d); 1513 count, rsa_bits[j], d);
1530 rsa_results[j][1] = d / (double) count; 1514 rsa_results[j][1] = d / (double) count;
1531 } 1515 }
1532#endif
1533 1516
1534 if (rsa_count <= 1) { 1517 if (rsa_count <= 1) {
1535 /* if longer than 10s, don't do any more */ 1518 /* if longer than 10s, don't do any more */
@@ -1624,9 +1607,8 @@ speed_main(int argc, char **argv)
1624 ERR_print_errors(bio_err); 1607 ERR_print_errors(bio_err);
1625 rsa_count = 1; 1608 rsa_count = 1;
1626 } else { 1609 } else {
1627#if 1
1628 EC_KEY_precompute_mult(ecdsa[j], NULL); 1610 EC_KEY_precompute_mult(ecdsa[j], NULL);
1629#endif 1611
1630 /* Perform ECDSA signature test */ 1612 /* Perform ECDSA signature test */
1631 EC_KEY_generate_key(ecdsa[j]); 1613 EC_KEY_generate_key(ecdsa[j]);
1632 ret = ECDSA_sign(0, buf, 20, ecdsasig, 1614 ret = ECDSA_sign(0, buf, 20, ecdsasig,