5cda1ca
diff -up openssl-1.1.1b/apps/speed.c.curves openssl-1.1.1b/apps/speed.c
5cda1ca
--- openssl-1.1.1b/apps/speed.c.curves	2019-02-26 15:15:30.000000000 +0100
5cda1ca
+++ openssl-1.1.1b/apps/speed.c	2019-02-28 11:20:42.347170167 +0100
a4bf4e1
@@ -489,82 +489,28 @@ static const OPT_PAIR rsa_choices[] = {
a4bf4e1
 static double rsa_results[RSA_NUM][2];  /* 2 ops: sign then verify */
a4bf4e1
 #endif /* OPENSSL_NO_RSA */
a4bf4e1
 
a4bf4e1
-#define R_EC_P160    0
a4bf4e1
-#define R_EC_P192    1
a4bf4e1
-#define R_EC_P224    2
a4bf4e1
-#define R_EC_P256    3
a4bf4e1
-#define R_EC_P384    4
a4bf4e1
-#define R_EC_P521    5
a4bf4e1
-#define R_EC_K163    6
a4bf4e1
-#define R_EC_K233    7
a4bf4e1
-#define R_EC_K283    8
a4bf4e1
-#define R_EC_K409    9
a4bf4e1
-#define R_EC_K571    10
a4bf4e1
-#define R_EC_B163    11
a4bf4e1
-#define R_EC_B233    12
a4bf4e1
-#define R_EC_B283    13
a4bf4e1
-#define R_EC_B409    14
a4bf4e1
-#define R_EC_B571    15
a4bf4e1
-#define R_EC_BRP256R1  16
a4bf4e1
-#define R_EC_BRP256T1  17
a4bf4e1
-#define R_EC_BRP384R1  18
a4bf4e1
-#define R_EC_BRP384T1  19
a4bf4e1
-#define R_EC_BRP512R1  20
a4bf4e1
-#define R_EC_BRP512T1  21
a4bf4e1
-#define R_EC_X25519  22
a4bf4e1
-#define R_EC_X448    23
a4bf4e1
+#define R_EC_P224    0
a4bf4e1
+#define R_EC_P256    1
a4bf4e1
+#define R_EC_P384    2
a4bf4e1
+#define R_EC_P521    3
a4bf4e1
+#define R_EC_X25519  4
a4bf4e1
+#define R_EC_X448    5
510bcc2
 #ifndef OPENSSL_NO_EC
510bcc2
 static OPT_PAIR ecdsa_choices[] = {
510bcc2
-    {"ecdsap160", R_EC_P160},
510bcc2
-    {"ecdsap192", R_EC_P192},
e443a79
     {"ecdsap224", R_EC_P224},
510bcc2
     {"ecdsap256", R_EC_P256},
510bcc2
     {"ecdsap384", R_EC_P384},
510bcc2
     {"ecdsap521", R_EC_P521},
510bcc2
-    {"ecdsak163", R_EC_K163},
510bcc2
-    {"ecdsak233", R_EC_K233},
510bcc2
-    {"ecdsak283", R_EC_K283},
510bcc2
-    {"ecdsak409", R_EC_K409},
510bcc2
-    {"ecdsak571", R_EC_K571},
510bcc2
-    {"ecdsab163", R_EC_B163},
510bcc2
-    {"ecdsab233", R_EC_B233},
510bcc2
-    {"ecdsab283", R_EC_B283},
510bcc2
-    {"ecdsab409", R_EC_B409},
510bcc2
-    {"ecdsab571", R_EC_B571},
9189f03
-    {"ecdsabrp256r1", R_EC_BRP256R1},
9189f03
-    {"ecdsabrp256t1", R_EC_BRP256T1},
9189f03
-    {"ecdsabrp384r1", R_EC_BRP384R1},
9189f03
-    {"ecdsabrp384t1", R_EC_BRP384T1},
9189f03
-    {"ecdsabrp512r1", R_EC_BRP512R1},
9189f03
-    {"ecdsabrp512t1", R_EC_BRP512T1}
510bcc2
 };
9189f03
 # define ECDSA_NUM       OSSL_NELEM(ecdsa_choices)
510bcc2
 
9189f03
 static double ecdsa_results[ECDSA_NUM][2];    /* 2 ops: sign then verify */
9189f03
 
9189f03
 static const OPT_PAIR ecdh_choices[] = {
510bcc2
-    {"ecdhp160", R_EC_P160},
510bcc2
-    {"ecdhp192", R_EC_P192},
e443a79
     {"ecdhp224", R_EC_P224},
510bcc2
     {"ecdhp256", R_EC_P256},
510bcc2
     {"ecdhp384", R_EC_P384},
510bcc2
     {"ecdhp521", R_EC_P521},
510bcc2
-    {"ecdhk163", R_EC_K163},
510bcc2
-    {"ecdhk233", R_EC_K233},
510bcc2
-    {"ecdhk283", R_EC_K283},
510bcc2
-    {"ecdhk409", R_EC_K409},
510bcc2
-    {"ecdhk571", R_EC_K571},
510bcc2
-    {"ecdhb163", R_EC_B163},
510bcc2
-    {"ecdhb233", R_EC_B233},
510bcc2
-    {"ecdhb283", R_EC_B283},
510bcc2
-    {"ecdhb409", R_EC_B409},
510bcc2
-    {"ecdhb571", R_EC_B571},
9189f03
-    {"ecdhbrp256r1", R_EC_BRP256R1},
9189f03
-    {"ecdhbrp256t1", R_EC_BRP256T1},
9189f03
-    {"ecdhbrp384r1", R_EC_BRP384R1},
9189f03
-    {"ecdhbrp384t1", R_EC_BRP384T1},
9189f03
-    {"ecdhbrp512r1", R_EC_BRP512R1},
9189f03
-    {"ecdhbrp512t1", R_EC_BRP512T1},
510bcc2
     {"ecdhx25519", R_EC_X25519},
9189f03
     {"ecdhx448", R_EC_X448}
510bcc2
 };
a4bf4e1
@@ -1495,29 +1441,10 @@ int speed_main(int argc, char **argv)
a4bf4e1
         unsigned int bits;
a4bf4e1
     } test_curves[] = {
a4bf4e1
         /* Prime Curves */
a4bf4e1
-        {"secp160r1", NID_secp160r1, 160},
a4bf4e1
-        {"nistp192", NID_X9_62_prime192v1, 192},
a4bf4e1
         {"nistp224", NID_secp224r1, 224},
a4bf4e1
         {"nistp256", NID_X9_62_prime256v1, 256},
5cda1ca
         {"nistp384", NID_secp384r1, 384},
a4bf4e1
         {"nistp521", NID_secp521r1, 521},
a4bf4e1
-        /* Binary Curves */
a4bf4e1
-        {"nistk163", NID_sect163k1, 163},
5cda1ca
-        {"nistk233", NID_sect233k1, 233},
a4bf4e1
-        {"nistk283", NID_sect283k1, 283},
a4bf4e1
-        {"nistk409", NID_sect409k1, 409},
a4bf4e1
-        {"nistk571", NID_sect571k1, 571},
a4bf4e1
-        {"nistb163", NID_sect163r2, 163},
a4bf4e1
-        {"nistb233", NID_sect233r1, 233},
a4bf4e1
-        {"nistb283", NID_sect283r1, 283},
a4bf4e1
-        {"nistb409", NID_sect409r1, 409},
a4bf4e1
-        {"nistb571", NID_sect571r1, 571},
a4bf4e1
-        {"brainpoolP256r1", NID_brainpoolP256r1, 256},
a4bf4e1
-        {"brainpoolP256t1", NID_brainpoolP256t1, 256},
a4bf4e1
-        {"brainpoolP384r1", NID_brainpoolP384r1, 384},
a4bf4e1
-        {"brainpoolP384t1", NID_brainpoolP384t1, 384},
a4bf4e1
-        {"brainpoolP512r1", NID_brainpoolP512r1, 512},
a4bf4e1
-        {"brainpoolP512t1", NID_brainpoolP512t1, 512},
a4bf4e1
         /* Other and ECDH only ones */
a4bf4e1
         {"X25519", NID_X25519, 253},
a4bf4e1
         {"X448", NID_X448, 448}
a4bf4e1
@@ -2017,9 +1944,9 @@ int speed_main(int argc, char **argv)
a4bf4e1
 #  endif
a4bf4e1
 
a4bf4e1
 #  ifndef OPENSSL_NO_EC
a4bf4e1
-    ecdsa_c[R_EC_P160][0] = count / 1000;
a4bf4e1
-    ecdsa_c[R_EC_P160][1] = count / 1000 / 2;
a4bf4e1
-    for (i = R_EC_P192; i <= R_EC_P521; i++) {
a4bf4e1
+    ecdsa_c[R_EC_P224][0] = count / 1000;
a4bf4e1
+    ecdsa_c[R_EC_P224][1] = count / 1000 / 2;
a4bf4e1
+    for (i = R_EC_P256; i <= R_EC_P521; i++) {
a4bf4e1
         ecdsa_c[i][0] = ecdsa_c[i - 1][0] / 2;
a4bf4e1
         ecdsa_c[i][1] = ecdsa_c[i - 1][1] / 2;
a4bf4e1
         if (ecdsa_doit[i] <= 1 && ecdsa_c[i][0] == 0)
a4bf4e1
@@ -2031,6 +1958,7 @@ int speed_main(int argc, char **argv)
a4bf4e1
             }
a4bf4e1
         }
a4bf4e1
     }
a4bf4e1
+#if 0
a4bf4e1
     ecdsa_c[R_EC_K163][0] = count / 1000;
a4bf4e1
     ecdsa_c[R_EC_K163][1] = count / 1000 / 2;
a4bf4e1
     for (i = R_EC_K233; i <= R_EC_K571; i++) {
a4bf4e1
@@ -2059,9 +1987,9 @@ int speed_main(int argc, char **argv)
a4bf4e1
             }
a4bf4e1
         }
a4bf4e1
     }
a4bf4e1
-
a4bf4e1
-    ecdh_c[R_EC_P160][0] = count / 1000;
a4bf4e1
-    for (i = R_EC_P192; i <= R_EC_P521; i++) {
a4bf4e1
+#endif
a4bf4e1
+    ecdh_c[R_EC_P224][0] = count / 1000;
a4bf4e1
+    for (i = R_EC_P256; i <= R_EC_P521; i++) {
a4bf4e1
         ecdh_c[i][0] = ecdh_c[i - 1][0] / 2;
a4bf4e1
         if (ecdh_doit[i] <= 1 && ecdh_c[i][0] == 0)
a4bf4e1
             ecdh_doit[i] = 0;
a4bf4e1
@@ -2071,6 +1999,7 @@ int speed_main(int argc, char **argv)
a4bf4e1
             }
a4bf4e1
         }
a4bf4e1
     }
a4bf4e1
+#if 0
a4bf4e1
     ecdh_c[R_EC_K163][0] = count / 1000;
a4bf4e1
     for (i = R_EC_K233; i <= R_EC_K571; i++) {
a4bf4e1
         ecdh_c[i][0] = ecdh_c[i - 1][0] / 2;
a4bf4e1
@@ -2116,6 +2045,7 @@ int speed_main(int argc, char **argv)
a4bf4e1
             }
a4bf4e1
         }
a4bf4e1
     }
a4bf4e1
+#endif
a4bf4e1
     /* default iteration count for the last two EC Curves */
a4bf4e1
     ecdh_c[R_EC_X25519][0] = count / 1800;
a4bf4e1
     ecdh_c[R_EC_X448][0] = count / 7200;
5cda1ca
diff -up openssl-1.1.1b/crypto/ec/ecp_smpl.c.curves openssl-1.1.1b/crypto/ec/ecp_smpl.c
5cda1ca
--- openssl-1.1.1b/crypto/ec/ecp_smpl.c.curves	2019-02-26 15:15:30.000000000 +0100
5cda1ca
+++ openssl-1.1.1b/crypto/ec/ecp_smpl.c	2019-02-28 11:19:30.628479300 +0100
5cda1ca
@@ -145,6 +145,11 @@ int ec_GFp_simple_group_set_curve(EC_GRO
e443a79
         return 0;
e443a79
     }
510bcc2
 
e443a79
+    if (BN_num_bits(p) < 224) {
e443a79
+        ECerr(EC_F_EC_GFP_SIMPLE_GROUP_SET_CURVE, EC_R_UNSUPPORTED_FIELD);
e443a79
+        return 0;
e443a79
+    }
e443a79
+
e443a79
     if (ctx == NULL) {
e443a79
         ctx = new_ctx = BN_CTX_new();
e443a79
         if (ctx == NULL)
5cda1ca
diff -up openssl-1.1.1b/test/ecdsatest.c.curves openssl-1.1.1b/test/ecdsatest.c
5cda1ca
--- openssl-1.1.1b/test/ecdsatest.c.curves	2019-02-26 15:15:30.000000000 +0100
5cda1ca
+++ openssl-1.1.1b/test/ecdsatest.c	2019-02-28 11:19:30.628479300 +0100
5cda1ca
@@ -176,6 +176,7 @@ static int x9_62_tests(void)
c676ac3
     if (!change_rand())
c676ac3
         goto x962_err;
c676ac3
 
c676ac3
+#if 0
9189f03
     if (!TEST_true(x9_62_test_internal(NID_X9_62_prime192v1,
9189f03
                  "3342403536405981729393488334694600415596881826869351677613",
9189f03
                  "5735822328888155254683894997897571951568553642892029982342")))
5cda1ca
@@ -186,6 +187,7 @@ static int x9_62_tests(void)
9189f03
                  "3238135532097973577080787768312505059318910517550078427819"
9189f03
                              "78505179448783")))
c676ac3
         goto x962_err;
c676ac3
+#endif
9189f03
 
c676ac3
 # ifndef OPENSSL_NO_EC2M
9189f03
     if (!TEST_true(x9_62_test_internal(NID_X9_62_c2tnb191v1,