| |
@@ -1,6 +1,6 @@
|
| |
- diff -up openssl-1.1.1c/apps/speed.c.curves openssl-1.1.1c/apps/speed.c
|
| |
- --- openssl-1.1.1c/apps/speed.c.curves 2019-05-28 15:12:21.000000000 +0200
|
| |
- +++ openssl-1.1.1c/apps/speed.c 2019-05-29 15:36:53.332224470 +0200
|
| |
+ diff -up openssl-1.1.1h/apps/speed.c.curves openssl-1.1.1h/apps/speed.c
|
| |
+ --- openssl-1.1.1h/apps/speed.c.curves 2020-09-22 14:55:07.000000000 +0200
|
| |
+ +++ openssl-1.1.1h/apps/speed.c 2020-11-06 13:27:15.659288431 +0100
|
| |
@@ -490,90 +490,30 @@ static double rsa_results[RSA_NUM][2];
|
| |
#endif /* OPENSSL_NO_RSA */
|
| |
|
| |
@@ -92,7 +92,7 @@
|
| |
{"ecdhx25519", R_EC_X25519},
|
| |
{"ecdhx448", R_EC_X448}
|
| |
};
|
| |
- @@ -1504,31 +1444,10 @@ int speed_main(int argc, char **argv)
|
| |
+ @@ -1502,31 +1442,10 @@ int speed_main(int argc, char **argv)
|
| |
unsigned int bits;
|
| |
} test_curves[] = {
|
| |
/* Prime Curves */
|
| |
@@ -124,7 +124,7 @@
|
| |
/* Other and ECDH only ones */
|
| |
{"X25519", NID_X25519, 253},
|
| |
{"X448", NID_X448, 448}
|
| |
- @@ -2028,9 +1947,9 @@ int speed_main(int argc, char **argv)
|
| |
+ @@ -2026,9 +1945,9 @@ int speed_main(int argc, char **argv)
|
| |
# endif
|
| |
|
| |
# ifndef OPENSSL_NO_EC
|
| |
@@ -137,7 +137,7 @@
|
| |
ecdsa_c[i][0] = ecdsa_c[i - 1][0] / 2;
|
| |
ecdsa_c[i][1] = ecdsa_c[i - 1][1] / 2;
|
| |
if (ecdsa_doit[i] <= 1 && ecdsa_c[i][0] == 0)
|
| |
- @@ -2042,7 +1961,7 @@ int speed_main(int argc, char **argv)
|
| |
+ @@ -2040,7 +1959,7 @@ int speed_main(int argc, char **argv)
|
| |
}
|
| |
}
|
| |
}
|
| |
@@ -146,7 +146,7 @@
|
| |
ecdsa_c[R_EC_K163][0] = count / 1000;
|
| |
ecdsa_c[R_EC_K163][1] = count / 1000 / 2;
|
| |
for (i = R_EC_K233; i <= R_EC_K571; i++) {
|
| |
- @@ -2073,8 +1992,8 @@ int speed_main(int argc, char **argv)
|
| |
+ @@ -2071,8 +1990,8 @@ int speed_main(int argc, char **argv)
|
| |
}
|
| |
# endif
|
| |
|
| |
@@ -157,7 +157,7 @@
|
| |
ecdh_c[i][0] = ecdh_c[i - 1][0] / 2;
|
| |
if (ecdh_doit[i] <= 1 && ecdh_c[i][0] == 0)
|
| |
ecdh_doit[i] = 0;
|
| |
- @@ -2084,7 +2003,7 @@ int speed_main(int argc, char **argv)
|
| |
+ @@ -2082,7 +2001,7 @@ int speed_main(int argc, char **argv)
|
| |
}
|
| |
}
|
| |
}
|
| |
@@ -166,9 +166,9 @@
|
| |
ecdh_c[R_EC_K163][0] = count / 1000;
|
| |
for (i = R_EC_K233; i <= R_EC_K571; i++) {
|
| |
ecdh_c[i][0] = ecdh_c[i - 1][0] / 2;
|
| |
- diff -up openssl-1.1.1c/crypto/ec/ecp_smpl.c.curves openssl-1.1.1c/crypto/ec/ecp_smpl.c
|
| |
- --- openssl-1.1.1c/crypto/ec/ecp_smpl.c.curves 2019-05-28 15:12:21.000000000 +0200
|
| |
- +++ openssl-1.1.1c/crypto/ec/ecp_smpl.c 2019-05-29 15:30:09.071349520 +0200
|
| |
+ diff -up openssl-1.1.1h/crypto/ec/ecp_smpl.c.curves openssl-1.1.1h/crypto/ec/ecp_smpl.c
|
| |
+ --- openssl-1.1.1h/crypto/ec/ecp_smpl.c.curves 2020-09-22 14:55:07.000000000 +0200
|
| |
+ +++ openssl-1.1.1h/crypto/ec/ecp_smpl.c 2020-11-06 13:27:15.659288431 +0100
|
| |
@@ -145,6 +145,11 @@ int ec_GFp_simple_group_set_curve(EC_GRO
|
| |
return 0;
|
| |
}
|
| |
@@ -181,9 +181,9 @@
|
| |
if (ctx == NULL) {
|
| |
ctx = new_ctx = BN_CTX_new();
|
| |
if (ctx == NULL)
|
| |
- diff -up openssl-1.1.1c/test/ecdsatest.h.curves openssl-1.1.1c/test/ecdsatest.h
|
| |
- --- openssl-1.1.1c/test/ecdsatest.h.curves 2019-05-29 15:30:09.010350595 +0200
|
| |
- +++ openssl-1.1.1c/test/ecdsatest.h 2019-05-29 15:41:24.586444294 +0200
|
| |
+ diff -up openssl-1.1.1h/test/ecdsatest.h.curves openssl-1.1.1h/test/ecdsatest.h
|
| |
+ --- openssl-1.1.1h/test/ecdsatest.h.curves 2020-11-06 13:27:15.627288114 +0100
|
| |
+ +++ openssl-1.1.1h/test/ecdsatest.h 2020-11-06 13:27:15.660288441 +0100
|
| |
@@ -32,23 +32,6 @@ typedef struct {
|
| |
} ecdsa_cavs_kat_t;
|
| |
|
| |
@@ -208,3 +208,59 @@
|
| |
/* prime KATs from NIST CAVP */
|
| |
{NID_secp224r1, NID_sha224,
|
| |
"699325d6fc8fbbb4981a6ded3c3a54ad2e4e3db8a5669201912064c64e700c139248cdc1"
|
| |
+ --- openssl-1.1.1h/test/recipes/15-test_genec.t.ec-curves 2020-11-06 13:58:36.402895540 +0100
|
| |
+ +++ openssl-1.1.1h/test/recipes/15-test_genec.t 2020-11-06 13:59:38.508484498 +0100
|
| |
+ @@ -20,45 +20,11 @@ plan skip_all => "This test is unsupport
|
| |
+ if disabled("ec");
|
| |
+
|
| |
+ my @prime_curves = qw(
|
| |
+ - secp112r1
|
| |
+ - secp112r2
|
| |
+ - secp128r1
|
| |
+ - secp128r2
|
| |
+ - secp160k1
|
| |
+ - secp160r1
|
| |
+ - secp160r2
|
| |
+ - secp192k1
|
| |
+ - secp224k1
|
| |
+ secp224r1
|
| |
+ secp256k1
|
| |
+ secp384r1
|
| |
+ secp521r1
|
| |
+ - prime192v1
|
| |
+ - prime192v2
|
| |
+ - prime192v3
|
| |
+ - prime239v1
|
| |
+ - prime239v2
|
| |
+ - prime239v3
|
| |
+ prime256v1
|
| |
+ - wap-wsg-idm-ecid-wtls6
|
| |
+ - wap-wsg-idm-ecid-wtls7
|
| |
+ - wap-wsg-idm-ecid-wtls8
|
| |
+ - wap-wsg-idm-ecid-wtls9
|
| |
+ - wap-wsg-idm-ecid-wtls12
|
| |
+ - brainpoolP160r1
|
| |
+ - brainpoolP160t1
|
| |
+ - brainpoolP192r1
|
| |
+ - brainpoolP192t1
|
| |
+ - brainpoolP224r1
|
| |
+ - brainpoolP224t1
|
| |
+ - brainpoolP256r1
|
| |
+ - brainpoolP256t1
|
| |
+ - brainpoolP320r1
|
| |
+ - brainpoolP320t1
|
| |
+ - brainpoolP384r1
|
| |
+ - brainpoolP384t1
|
| |
+ - brainpoolP512r1
|
| |
+ - brainpoolP512t1
|
| |
+ );
|
| |
+
|
| |
+ my @binary_curves = qw(
|
| |
+ @@ -115,7 +81,6 @@ push(@other_curves, 'SM2')
|
| |
+ if !disabled("sm2");
|
| |
+
|
| |
+ my @curve_aliases = qw(
|
| |
+ - P-192
|
| |
+ P-224
|
| |
+ P-256
|
| |
+ P-384
|
| |
Signed-off-by: Sahana Prasad sahana@redhat.com