Lines Matching defs:testnum

497 static unsigned int testnum;
551 for (count = 0; COND(c[algindex][testnum]); count++) {
552 if (!EVP_Digest(buf, (size_t)lengths[testnum], digest, NULL, md,
595 for (count = 0; COND(c[algindex][testnum]); count++) {
599 || !EVP_MAC_update(mctx, buf, lengths[testnum])
651 for (count = 0; COND(c[algindex][testnum]); count++)
652 if (EVP_Cipher(tempargs->ctx, buf, buf, (size_t)lengths[testnum]) <= 0)
665 for (count = 0; COND(c[D_GHASH][testnum]); count++) {
666 if (!EVP_MAC_update(mctx, buf, lengths[testnum]))
718 for (count = 0; COND(c[D_RAND][testnum]); count++)
719 RAND_bytes(buf, lengths[testnum]);
736 for (count = 0; COND(c[D_EVP][testnum]); count++) {
737 rc = EVP_DecryptUpdate(ctx, buf, &outl, buf, lengths[testnum]);
744 for (count = 0; COND(c[D_EVP][testnum]); count++) {
745 rc = EVP_EncryptUpdate(ctx, buf, &outl, buf, lengths[testnum]);
773 for (count = 0; COND(c[D_EVP][testnum]); count++) {
779 (void)EVP_DecryptUpdate(ctx, buf, &outl, buf, lengths[testnum]);
782 for (count = 0; COND(c[D_EVP][testnum]); count++) {
784 (void)EVP_EncryptUpdate(ctx, NULL, &outl, NULL, lengths[testnum]);
786 (void)EVP_EncryptUpdate(ctx, buf, &outl, buf, lengths[testnum]);
811 for (count = 0; COND(c[D_EVP][testnum]); count++) {
816 (void)EVP_DecryptUpdate(ctx, buf, &outl, buf, lengths[testnum]);
820 for (count = 0; COND(c[D_EVP][testnum]); count++) {
823 (void)EVP_EncryptUpdate(ctx, buf, &outl, buf, lengths[testnum]);
841 for (count = 0; COND(rsa_c[testnum][0]); count++) {
843 ret = EVP_PKEY_sign(rsa_sign_ctx[testnum], buf2, rsa_num, buf, 36);
863 for (count = 0; COND(rsa_c[testnum][1]); count++) {
864 ret = EVP_PKEY_verify(rsa_verify_ctx[testnum], buf2, rsa_num, buf, 36);
881 EVP_PKEY_CTX *ffdh_ctx = tempargs->ffdh_ctx[testnum];
885 for (count = 0; COND(ffdh_c[testnum][0]); count++) {
905 for (count = 0; COND(dsa_c[testnum][0]); count++) {
907 ret = EVP_PKEY_sign(dsa_sign_ctx[testnum], buf2, dsa_num, buf, 20);
927 for (count = 0; COND(dsa_c[testnum][1]); count++) {
928 ret = EVP_PKEY_verify(dsa_verify_ctx[testnum], buf2, dsa_num, buf, 20);
949 for (count = 0; COND(ecdsa_c[testnum][0]); count++) {
951 ret = EVP_PKEY_sign(ecdsa_sign_ctx[testnum], buf2, ecdsa_num, buf, 20);
971 for (count = 0; COND(ecdsa_c[testnum][1]); count++) {
972 ret = EVP_PKEY_verify(ecdsa_verify_ctx[testnum], buf2, ecdsa_num,
990 EVP_PKEY_CTX *ctx = tempargs->ecdh_ctx[testnum];
993 size_t *outlen = &(tempargs->outlen[testnum]);
995 for (count = 0; COND(ecdh_c[testnum][0]); count++)
1011 for (count = 0; COND(eddsa_c[testnum][0]); count++) {
1012 ret = EVP_DigestSignInit(edctx[testnum], NULL, NULL, NULL, NULL);
1019 ret = EVP_DigestSign(edctx[testnum], eddsasig, eddsasigsize, buf, 20);
1039 for (count = 0; COND(eddsa_c[testnum][1]); count++) {
1040 ret = EVP_DigestVerifyInit(edctx[testnum], NULL, NULL, NULL, NULL);
1047 ret = EVP_DigestVerify(edctx[testnum], eddsasig, eddsasigsize, buf, 20);
1069 const size_t max_size = EVP_PKEY_get_size(sm2_pkey[testnum]);
1071 for (count = 0; COND(sm2_c[testnum][0]); count++) {
1074 if (!EVP_DigestSignInit(sm2ctx[testnum], NULL, EVP_sm3(),
1075 NULL, sm2_pkey[testnum])) {
1081 ret = EVP_DigestSign(sm2ctx[testnum], sm2sig, &sm2sigsize,
1106 for (count = 0; COND(sm2_c[testnum][1]); count++) {
1107 if (!EVP_DigestVerifyInit(sm2ctx[testnum], NULL, EVP_sm3(),
1108 NULL, sm2_pkey[testnum])) {
1114 ret = EVP_DigestVerify(sm2ctx[testnum], sm2sig, sm2sigsize,
1885 for (testnum = 0; testnum < size_num; testnum++) {
1886 print_message(names[D_MD2], c[D_MD2][testnum], lengths[testnum],
1891 print_result(D_MD2, testnum, count, d);
1898 for (testnum = 0; testnum < size_num; testnum++) {
1899 print_message(names[D_MDC2], c[D_MDC2][testnum], lengths[testnum],
1904 print_result(D_MDC2, testnum, count, d);
1911 for (testnum = 0; testnum < size_num; testnum++) {
1912 print_message(names[D_MD4], c[D_MD4][testnum], lengths[testnum],
1917 print_result(D_MD4, testnum, count, d);
1924 for (testnum = 0; testnum < size_num; testnum++) {
1925 print_message(names[D_MD5], c[D_MD5][testnum], lengths[testnum],
1930 print_result(D_MD5, testnum, count, d);
1937 for (testnum = 0; testnum < size_num; testnum++) {
1938 print_message(names[D_SHA1], c[D_SHA1][testnum], lengths[testnum],
1943 print_result(D_SHA1, testnum, count, d);
1950 for (testnum = 0; testnum < size_num; testnum++) {
1951 print_message(names[D_SHA256], c[D_SHA256][testnum],
1952 lengths[testnum], seconds.sym);
1956 print_result(D_SHA256, testnum, count, d);
1963 for (testnum = 0; testnum < size_num; testnum++) {
1964 print_message(names[D_SHA512], c[D_SHA512][testnum],
1965 lengths[testnum], seconds.sym);
1969 print_result(D_SHA512, testnum, count, d);
1976 for (testnum = 0; testnum < size_num; testnum++) {
1977 print_message(names[D_WHIRLPOOL], c[D_WHIRLPOOL][testnum],
1978 lengths[testnum], seconds.sym);
1982 print_result(D_WHIRLPOOL, testnum, count, d);
1989 for (testnum = 0; testnum < size_num; testnum++) {
1990 print_message(names[D_RMD160], c[D_RMD160][testnum],
1991 lengths[testnum], seconds.sym);
1995 print_result(D_RMD160, testnum, count, d);
2031 for (testnum = 0; testnum < size_num; testnum++) {
2032 print_message(names[D_HMAC], c[D_HMAC][testnum], lengths[testnum],
2037 print_result(D_HMAC, testnum, count, d);
2056 for (testnum = 0; st && testnum < size_num; testnum++) {
2057 print_message(names[D_CBC_DES], c[D_CBC_DES][testnum],
2058 lengths[testnum], seconds.sym);
2062 print_result(D_CBC_DES, testnum, count, d);
2077 for (testnum = 0; st && testnum < size_num; testnum++) {
2078 print_message(names[D_EDE3_DES], c[D_EDE3_DES][testnum],
2079 lengths[testnum], seconds.sym);
2084 print_result(D_EDE3_DES, testnum, count, d);
2102 for (testnum = 0; st && testnum < size_num; testnum++) {
2103 print_message(names[algindex], c[algindex][testnum],
2104 lengths[testnum], seconds.sym);
2109 print_result(algindex, testnum, count, d);
2128 for (testnum = 0; st && testnum < size_num; testnum++) {
2129 print_message(names[algindex], c[algindex][testnum],
2130 lengths[testnum], seconds.sym);
2135 print_result(algindex, testnum, count, d);
2153 for (testnum = 0; st && testnum < size_num; testnum++) {
2154 print_message(names[algindex], c[algindex][testnum],
2155 lengths[testnum], seconds.sym);
2160 print_result(algindex, testnum, count, d);
2189 for (testnum = 0; testnum < size_num; testnum++) {
2190 print_message(names[D_GHASH], c[D_GHASH][testnum], lengths[testnum],
2195 print_result(D_GHASH, testnum, count, d);
2206 for (testnum = 0; testnum < size_num; testnum++) {
2207 print_message(names[D_RAND], c[D_RAND][testnum], lengths[testnum],
2212 print_result(D_RAND, testnum, count, d);
2240 for (testnum = 0; testnum < size_num; testnum++) {
2241 print_message(names[D_EVP], c[D_EVP][testnum], lengths[testnum],
2281 print_result(D_EVP, testnum, count, d);
2286 for (testnum = 0; testnum < size_num; testnum++) {
2287 print_message(names[D_EVP], c[D_EVP][testnum], lengths[testnum],
2292 print_result(D_EVP, testnum, count, d);
2335 for (testnum = 0; testnum < size_num; testnum++) {
2336 print_message(names[D_EVP_CMAC], c[D_EVP_CMAC][testnum],
2337 lengths[testnum], seconds.sym);
2341 print_result(D_EVP_CMAC, testnum, count, d);
2355 for (testnum = 0; testnum < RSA_NUM; testnum++) {
2359 if (!rsa_doit[testnum])
2368 && EVP_PKEY_CTX_set_rsa_keygen_bits(genctx, rsa_keys[testnum].bits) > 0
2377 const unsigned char *p = rsa_keys[testnum].data;
2380 rsa_keys[testnum].length)) != NULL;
2384 loopargs[i].rsa_sign_ctx[testnum] = EVP_PKEY_CTX_new(rsa_key, NULL);
2386 if (loopargs[i].rsa_sign_ctx[testnum] == NULL
2387 || EVP_PKEY_sign_init(loopargs[i].rsa_sign_ctx[testnum]) <= 0
2388 || EVP_PKEY_sign(loopargs[i].rsa_sign_ctx[testnum],
2401 rsa_c[testnum][0], rsa_keys[testnum].bits,
2403 /* RSA_blinding_on(rsa_key[testnum],NULL); */
2410 count, rsa_keys[testnum].bits, d);
2411 rsa_results[testnum][0] = (double)count / d;
2416 loopargs[i].rsa_verify_ctx[testnum] = EVP_PKEY_CTX_new(rsa_key,
2418 if (loopargs[i].rsa_verify_ctx[testnum] == NULL
2419 || EVP_PKEY_verify_init(loopargs[i].rsa_verify_ctx[testnum]) <= 0
2420 || EVP_PKEY_verify(loopargs[i].rsa_verify_ctx[testnum],
2430 rsa_doit[testnum] = 0;
2433 rsa_c[testnum][1], rsa_keys[testnum].bits,
2441 count, rsa_keys[testnum].bits, d);
2442 rsa_results[testnum][1] = (double)count / d;
2447 stop_it(rsa_doit, testnum);
2452 for (testnum = 0; testnum < DSA_NUM; testnum++) {
2456 if (!dsa_doit[testnum])
2459 st = (dsa_key = get_dsa(dsa_bits[testnum])) != NULL;
2462 loopargs[i].dsa_sign_ctx[testnum] = EVP_PKEY_CTX_new(dsa_key,
2465 if (loopargs[i].dsa_sign_ctx[testnum] == NULL
2466 || EVP_PKEY_sign_init(loopargs[i].dsa_sign_ctx[testnum]) <= 0
2468 || EVP_PKEY_sign(loopargs[i].dsa_sign_ctx[testnum],
2481 dsa_c[testnum][0], dsa_bits[testnum],
2489 count, dsa_bits[testnum], d);
2490 dsa_results[testnum][0] = (double)count / d;
2495 loopargs[i].dsa_verify_ctx[testnum] = EVP_PKEY_CTX_new(dsa_key,
2497 if (loopargs[i].dsa_verify_ctx[testnum] == NULL
2498 || EVP_PKEY_verify_init(loopargs[i].dsa_verify_ctx[testnum]) <= 0
2499 || EVP_PKEY_verify(loopargs[i].dsa_verify_ctx[testnum],
2509 dsa_doit[testnum] = 0;
2512 dsa_c[testnum][1], dsa_bits[testnum],
2520 count, dsa_bits[testnum], d);
2521 dsa_results[testnum][1] = (double)count / d;
2526 stop_it(dsa_doit, testnum);
2531 for (testnum = 0; testnum < ECDSA_NUM; testnum++) {
2535 if (!ecdsa_doit[testnum])
2538 st = (ecdsa_key = get_ecdsa(&ec_curves[testnum])) != NULL;
2541 loopargs[i].ecdsa_sign_ctx[testnum] = EVP_PKEY_CTX_new(ecdsa_key,
2544 if (loopargs[i].ecdsa_sign_ctx[testnum] == NULL
2545 || EVP_PKEY_sign_init(loopargs[i].ecdsa_sign_ctx[testnum]) <= 0
2547 || EVP_PKEY_sign(loopargs[i].ecdsa_sign_ctx[testnum],
2560 ecdsa_c[testnum][0], ec_curves[testnum].bits,
2568 count, ec_curves[testnum].bits, d);
2569 ecdsa_results[testnum][0] = (double)count / d;
2574 loopargs[i].ecdsa_verify_ctx[testnum] = EVP_PKEY_CTX_new(ecdsa_key,
2576 if (loopargs[i].ecdsa_verify_ctx[testnum] == NULL
2577 || EVP_PKEY_verify_init(loopargs[i].ecdsa_verify_ctx[testnum]) <= 0
2578 || EVP_PKEY_verify(loopargs[i].ecdsa_verify_ctx[testnum],
2588 ecdsa_doit[testnum] = 0;
2591 ecdsa_c[testnum][1], ec_curves[testnum].bits,
2599 count, ec_curves[testnum].bits, d);
2600 ecdsa_results[testnum][1] = (double)count / d;
2605 stop_it(ecdsa_doit, testnum);
2609 for (testnum = 0; testnum < EC_NUM; testnum++) {
2612 if (!ecdh_doit[testnum])
2623 if ((key_A = get_ecdsa(&ec_curves[testnum])) == NULL /* generate secret key A */
2624 || (key_B = get_ecdsa(&ec_curves[testnum])) == NULL /* generate secret key B */
2668 loopargs[i].ecdh_ctx[testnum] = ctx;
2669 loopargs[i].outlen[testnum] = outlen;
2678 ecdh_c[testnum][0],
2679 ec_curves[testnum].bits, seconds.ecdh);
2687 ec_curves[testnum].bits, d);
2688 ecdh_results[testnum][0] = (double)count / d;
2694 stop_it(ecdh_doit, testnum);
2698 for (testnum = 0; testnum < EdDSA_NUM; testnum++) {
2703 if (!eddsa_doit[testnum])
2706 loopargs[i].eddsa_ctx[testnum] = EVP_MD_CTX_new();
2707 if (loopargs[i].eddsa_ctx[testnum] == NULL) {
2711 loopargs[i].eddsa_ctx2[testnum] = EVP_MD_CTX_new();
2712 if (loopargs[i].eddsa_ctx2[testnum] == NULL) {
2717 if ((ed_pctx = EVP_PKEY_CTX_new_id(ed_curves[testnum].nid,
2727 if (!EVP_DigestSignInit(loopargs[i].eddsa_ctx[testnum], NULL, NULL,
2733 if (!EVP_DigestVerifyInit(loopargs[i].eddsa_ctx2[testnum], NULL,
2750 loopargs[i].sigsize = ed_curves[testnum].sigsize;
2751 st = EVP_DigestSign(loopargs[i].eddsa_ctx[testnum],
2763 pkey_print_message("sign", ed_curves[testnum].name,
2764 eddsa_c[testnum][0],
2765 ed_curves[testnum].bits, seconds.eddsa);
2773 count, ed_curves[testnum].bits,
2774 ed_curves[testnum].name, d);
2775 eddsa_results[testnum][0] = (double)count / d;
2780 st = EVP_DigestVerify(loopargs[i].eddsa_ctx2[testnum],
2790 eddsa_doit[testnum] = 0;
2792 pkey_print_message("verify", ed_curves[testnum].name,
2793 eddsa_c[testnum][1],
2794 ed_curves[testnum].bits, seconds.eddsa);
2801 count, ed_curves[testnum].bits,
2802 ed_curves[testnum].name, d);
2803 eddsa_results[testnum][1] = (double)count / d;
2808 stop_it(eddsa_doit, testnum);
2814 for (testnum = 0; testnum < SM2_NUM; testnum++) {
2818 if (!sm2_doit[testnum])
2827 loopargs[i].sm2_ctx[testnum] = EVP_MD_CTX_new();
2828 loopargs[i].sm2_vfy_ctx[testnum] = EVP_MD_CTX_new();
2829 if (loopargs[i].sm2_ctx[testnum] == NULL
2830 || loopargs[i].sm2_vfy_ctx[testnum] == NULL)
2838 sm2_curves[testnum].nid) <= 0
2846 loopargs[i].sm2_pkey[testnum] = sm2_pkey;
2857 EVP_MD_CTX_set_pkey_ctx(loopargs[i].sm2_ctx[testnum], sm2_pctx);
2858 EVP_MD_CTX_set_pkey_ctx(loopargs[i].sm2_vfy_ctx[testnum], sm2_vfy_pctx);
2868 if (!EVP_DigestSignInit(loopargs[i].sm2_ctx[testnum], NULL,
2871 if (!EVP_DigestVerifyInit(loopargs[i].sm2_vfy_ctx[testnum], NULL,
2883 st = EVP_DigestSign(loopargs[i].sm2_ctx[testnum],
2895 pkey_print_message("sign", sm2_curves[testnum].name,
2896 sm2_c[testnum][0],
2897 sm2_curves[testnum].bits, seconds.sm2);
2905 count, sm2_curves[testnum].bits,
2906 sm2_curves[testnum].name, d);
2907 sm2_results[testnum][0] = (double)count / d;
2913 st = EVP_DigestVerify(loopargs[i].sm2_vfy_ctx[testnum],
2923 sm2_doit[testnum] = 0;
2925 pkey_print_message("verify", sm2_curves[testnum].name,
2926 sm2_c[testnum][1],
2927 sm2_curves[testnum].bits, seconds.sm2);
2934 count, sm2_curves[testnum].bits,
2935 sm2_curves[testnum].name, d);
2936 sm2_results[testnum][1] = (double)count / d;
2941 for (testnum++; testnum < SM2_NUM; testnum++)
2942 sm2_doit[testnum] = 0;
2949 for (testnum = 0; testnum < FFDH_NUM; testnum++) {
2952 if (!ffdh_doit[testnum])
3003 if (EVP_PKEY_CTX_set_dh_nid(ffdh_ctx, ffdh_params[testnum].nid) <= 0) {
3101 loopargs[i].ffdh_ctx[testnum] = ffdh_ctx;
3111 pkey_print_message("", "ffdh", ffdh_c[testnum][0],
3112 ffdh_params[testnum].bits, seconds.ffdh);
3120 ffdh_params[testnum].bits, d);
3121 ffdh_results[testnum][0] = (double)count / d;
3126 stop_it(ffdh_doit, testnum);
3148 for (testnum = 0; testnum < size_num; testnum++)
3149 printf(mr ? ":%d" : "%7d bytes", lengths[testnum]);
3170 for (testnum = 0; testnum < size_num; testnum++) {
3171 if (results[k][testnum] > 10000 && !mr)
3172 printf(" %11.2fk", results[k][testnum] / 1e3);
3174 printf(mr ? ":%.2f" : " %11.2f ", results[k][testnum]);
3178 testnum = 1;
3182 if (testnum && !mr) {
3184 testnum = 0;
3194 testnum = 1;
3198 if (testnum && !mr) {
3200 testnum = 0;
3210 testnum = 1;
3214 if (testnum && !mr) {
3216 testnum = 0;
3230 testnum = 1;
3234 if (testnum && !mr) {
3236 testnum = 0;
3249 testnum = 1;
3253 if (testnum && !mr) {
3255 testnum = 0;
3270 testnum = 1;
3274 if (testnum && !mr) {
3276 testnum = 0;
3291 testnum = 1;
3295 if (testnum && !mr) {
3297 testnum = 0;