Avoid re-build avalanches with HP-UX make.
[oweals/openssl.git] / apps / speed.c
index d9dd1b65d72a52378c19d3bb64bb37a0397b6f62..5ed510ced69b94ca505b41824e28f0a06a10ea6d 100644 (file)
  * copied and put under another distribution licence
  * [including the GNU Public Licence.]
  */
-/* ====================================================================
- * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED.
- *
- * Portions of the attached software ("Contribution") are developed by 
- * SUN MICROSYSTEMS, INC., and are contributed to the OpenSSL project.
- *
- * The Contribution is licensed pursuant to the OpenSSL open source
- * license provided above.
- *
- * The ECDH and ECDSA speed test software is originally written by 
- * Sumit Gupta of Sun Microsystems Laboratories.
- *
- */
 
 /* most of this code has been pilfered from my libdes speed.c program */
 
@@ -77,8 +64,6 @@
 #define SECONDS                3       
 #define RSA_SECONDS    10
 #define DSA_SECONDS    10
-#define ECDSA_SECONDS   10
-#define ECDH_SECONDS    10
 
 /* 11-Sep-92 Andrew Daviel   Support for Silicon Graphics IRIX added */
 /* 06-Apr-92 Luke Brennan    Support for VMS and add extra signal calls */
 #ifndef OPENSSL_NO_DSA
 #include "./testdsa.h"
 #endif
-#ifndef OPENSSL_NO_ECDSA
-#include <openssl/ecdsa.h>
-#endif
-#ifndef OPENSSL_NO_ECDH
-#include <openssl/ecdh.h>
-#endif
-
-/*
- * The following "HZ" timing stuff should be sync'd up with the code in
- * crypto/tmdiff.[ch]. That appears to try to do the same job, though I think
- * this code is more up to date than libcrypto's so there may be features to
- * migrate over first. This is used in two places further down AFAICS. 
- * The point is that nothing in openssl actually *uses* that tmdiff stuff, so
- * either speed.c should be using it or it should go because it's obviously not
- * useful enough. Anyone want to do a janitorial job on this?
- */
 
 /* The following if from times(3) man page.  It may need to be changed */
 #ifndef HZ
 # if defined(_SC_CLK_TCK) \
      && (!defined(OPENSSL_SYS_VMS) || __CTRL_VER >= 70000000)
-#  define HZ sysconf(_SC_CLK_TCK)
+#  define HZ ((double)sysconf(_SC_CLK_TCK))
 # else
 #  ifndef CLK_TCK
 #   ifndef _BSD_CLK_TCK_ /* FreeBSD hack */
@@ -260,10 +229,6 @@ static int do_multi(int multi);
 #define SIZE_NUM       5
 #define RSA_NUM                4
 #define DSA_NUM                3
-
-#define EC_NUM       16
-#define MAX_ECDH_SIZE 256
-
 static const char *names[ALGOR_NUM]={
   "md2","mdc2","md4","md5","hmac(md5)","sha1","rmd160","rc4",
   "des cbc","des ede3","idea cbc",
@@ -273,9 +238,6 @@ static double results[ALGOR_NUM][SIZE_NUM];
 static int lengths[SIZE_NUM]={16,64,256,1024,8*1024};
 static double rsa_results[RSA_NUM][2];
 static double dsa_results[DSA_NUM][2];
-static double ecdsa_results[EC_NUM][2];
-static double ecdh_results[EC_NUM][1];
-
 
 #ifdef SIGALRM
 #if defined(__STDC__) || defined(sgi) || defined(_AIX)
@@ -304,7 +266,7 @@ static double Time_F(int s)
 
 #ifdef USE_TOD
        if(usertime)
-               {
+           {
                static struct rusage tstart,tend;
 
                getrusage_used = 1;
@@ -359,8 +321,7 @@ static double Time_F(int s)
                else
                        {
                        times(&tend);
-                       ret = HZ;
-                       ret=(double)(tend.tms_utime-tstart.tms_utime) / ret;
+                       ret=((double)(tend.tms_utime-tstart.tms_utime))/HZ;
                        return((ret < 1e-3)?1e-3:ret);
                        }
                }
@@ -407,20 +368,6 @@ static double Time_F(int s)
 #endif
        }
 
-
-static const int KDF1_SHA1_len = 20;
-static void *KDF1_SHA1(void *in, size_t inlen, void *out, size_t outlen)
-       {
-#ifndef OPENSSL_NO_SHA
-       if (outlen != SHA_DIGEST_LENGTH)
-               return NULL;
-       return SHA1(in, inlen, out);
-#else
-       return NULL;
-#endif
-       }
-
-
 int MAIN(int, char **);
 
 int MAIN(int argc, char **argv)
@@ -535,24 +482,6 @@ int MAIN(int argc, char **argv)
 #define        R_RSA_1024      1
 #define        R_RSA_2048      2
 #define        R_RSA_4096      3
-
-#define R_EC_P160    0
-#define R_EC_P192    1 
-#define R_EC_P224    2
-#define R_EC_P256    3
-#define R_EC_P384    4
-#define R_EC_P521    5
-#define R_EC_K163    6
-#define R_EC_K233    7
-#define R_EC_K283    8
-#define R_EC_K409    9
-#define R_EC_K571    10
-#define R_EC_B163    11
-#define R_EC_B233    12
-#define R_EC_B283    13
-#define R_EC_B409    14
-#define R_EC_B571    15
-
 #ifndef OPENSSL_NO_RSA
        RSA *rsa_key[RSA_NUM];
        long rsa_c[RSA_NUM][2];
@@ -568,83 +497,8 @@ int MAIN(int argc, char **argv)
        long dsa_c[DSA_NUM][2];
        static unsigned int dsa_bits[DSA_NUM]={512,1024,2048};
 #endif
-#ifndef OPENSSL_NO_EC
-       /* We only test over the following curves as they are representative, 
-        * To add tests over more curves, simply add the curve NID
-        * and curve name to the following arrays and increase the 
-        * EC_NUM value accordingly. 
-        */
-       static unsigned int test_curves[EC_NUM] = 
-       {       
-       /* Prime Curves */
-       NID_secp160r1,
-       NID_X9_62_prime192v1,
-       NID_secp224r1,
-       NID_X9_62_prime256v1,
-       NID_secp384r1,
-       NID_secp521r1,
-       /* Binary Curves */
-       NID_sect163k1,
-       NID_sect233k1,
-       NID_sect283k1,
-       NID_sect409k1,
-       NID_sect571k1,
-       NID_sect163r2,
-       NID_sect233r1,
-       NID_sect283r1,
-       NID_sect409r1,
-       NID_sect571r1
-       }; 
-       static char * test_curves_names[EC_NUM] = 
-       {
-       /* Prime Curves */
-       "secp160r1",
-       "nistp192",
-       "nistp224",
-       "nistp256",
-       "nistp384",
-       "nistp521",
-       /* Binary Curves */
-       "nistk163",
-       "nistk233",
-       "nistk283",
-       "nistk409",
-       "nistk571",
-       "nistb163",
-       "nistb233",
-       "nistb283",
-       "nistb409",
-       "nistb571"
-       };
-       static int test_curves_bits[EC_NUM] =
-        {
-        160, 192, 224, 256, 384, 521,
-        163, 233, 283, 409, 571,
-        163, 233, 283, 409, 571
-        };
-
-#endif
-
-#ifndef OPENSSL_NO_ECDSA
-        unsigned char ecdsasig[256];
-        unsigned int ecdsasiglen;
-        EC_KEY *ecdsa[EC_NUM];
-        long ecdsa_c[EC_NUM][2];
-#endif
-
-#ifndef OPENSSL_NO_ECDH
-        EC_KEY *ecdh_a[EC_NUM], *ecdh_b[EC_NUM];
-        unsigned char secret_a[MAX_ECDH_SIZE], secret_b[MAX_ECDH_SIZE];
-        int secret_size_a, secret_size_b;
-        int ecdh_checks = 0;
-        int secret_idx = 0;
-        long ecdh_c[EC_NUM][2];
-#endif
-
        int rsa_doit[RSA_NUM];
        int dsa_doit[DSA_NUM];
-       int ecdsa_doit[EC_NUM];
-        int ecdh_doit[EC_NUM];
        int doit[ALGOR_NUM];
        int pr_header=0;
        const EVP_CIPHER *evp_cipher=NULL;
@@ -663,17 +517,6 @@ int MAIN(int argc, char **argv)
 #ifndef OPENSSL_NO_DSA
        memset(dsa_key,0,sizeof(dsa_key));
 #endif
-#ifndef OPENSSL_NO_ECDSA
-       for (i=0; i<EC_NUM; i++) ecdsa[i] = NULL;
-#endif
-#ifndef OPENSSL_NO_ECDH
-       for (i=0; i<EC_NUM; i++)
-               {
-               ecdh_a[i] = NULL;
-               ecdh_b[i] = NULL;
-               }
-#endif
-
 
        if (bio_err == NULL)
                if ((bio_err=BIO_new(BIO_s_file())) != NULL)
@@ -712,15 +555,6 @@ int MAIN(int argc, char **argv)
                rsa_doit[i]=0;
        for (i=0; i<DSA_NUM; i++)
                dsa_doit[i]=0;
-#ifndef OPENSSL_NO_ECDSA
-       for (i=0; i<EC_NUM; i++)
-               ecdsa_doit[i]=0;
-#endif
-#ifndef OPENSSL_NO_ECDH
-       for (i=0; i<EC_NUM; i++)
-               ecdh_doit[i]=0;
-#endif
-
        
        j=0;
        argc--;
@@ -939,52 +773,7 @@ int MAIN(int argc, char **argv)
                        {
                        dsa_doit[R_DSA_512]=1;
                        dsa_doit[R_DSA_1024]=1;
-                       }
-               else
-#endif
-#ifndef OPENSSL_NO_ECDSA
-                    if (strcmp(*argv,"ecdsap160") == 0) ecdsa_doit[R_EC_P160]=2;
-               else if (strcmp(*argv,"ecdsap224") == 0) ecdsa_doit[R_EC_P224]=2;
-               else if (strcmp(*argv,"ecdsap256") == 0) ecdsa_doit[R_EC_P256]=2;
-               else if (strcmp(*argv,"ecdsap384") == 0) ecdsa_doit[R_EC_P384]=2;
-               else if (strcmp(*argv,"ecdsap521") == 0) ecdsa_doit[R_EC_P521]=2;
-               else if (strcmp(*argv,"ecdsak163") == 0) ecdsa_doit[R_EC_K163]=2;
-               else if (strcmp(*argv,"ecdsak233") == 0) ecdsa_doit[R_EC_K233]=2;
-               else if (strcmp(*argv,"ecdsak283") == 0) ecdsa_doit[R_EC_K283]=2;
-               else if (strcmp(*argv,"ecdsak409") == 0) ecdsa_doit[R_EC_K409]=2;
-               else if (strcmp(*argv,"ecdsak571") == 0) ecdsa_doit[R_EC_K571]=2;
-               else if (strcmp(*argv,"ecdsab163") == 0) ecdsa_doit[R_EC_B163]=2;
-               else if (strcmp(*argv,"ecdsab233") == 0) ecdsa_doit[R_EC_B233]=2;
-               else if (strcmp(*argv,"ecdsab283") == 0) ecdsa_doit[R_EC_B283]=2;
-               else if (strcmp(*argv,"ecdsab409") == 0) ecdsa_doit[R_EC_B409]=2;
-               else if (strcmp(*argv,"ecdsab571") == 0) ecdsa_doit[R_EC_B571]=2;
-               else if (strcmp(*argv,"ecdsa") == 0)
-                       {
-                       for (i=0; i < EC_NUM; i++)
-                               ecdsa_doit[i]=1;
-                       }
-               else
-#endif
-#ifndef OPENSSL_NO_ECDH
-                    if (strcmp(*argv,"ecdhp160") == 0) ecdh_doit[R_EC_P160]=2;
-               else if (strcmp(*argv,"ecdhp224") == 0) ecdh_doit[R_EC_P224]=2;
-               else if (strcmp(*argv,"ecdhp256") == 0) ecdh_doit[R_EC_P256]=2;
-               else if (strcmp(*argv,"ecdhp384") == 0) ecdh_doit[R_EC_P384]=2;
-               else if (strcmp(*argv,"ecdhp521") == 0) ecdh_doit[R_EC_P521]=2;
-               else if (strcmp(*argv,"ecdhk163") == 0) ecdh_doit[R_EC_K163]=2;
-               else if (strcmp(*argv,"ecdhk233") == 0) ecdh_doit[R_EC_K233]=2;
-               else if (strcmp(*argv,"ecdhk283") == 0) ecdh_doit[R_EC_K283]=2;
-               else if (strcmp(*argv,"ecdhk409") == 0) ecdh_doit[R_EC_K409]=2;
-               else if (strcmp(*argv,"ecdhk571") == 0) ecdh_doit[R_EC_K571]=2;
-               else if (strcmp(*argv,"ecdhb163") == 0) ecdh_doit[R_EC_B163]=2;
-               else if (strcmp(*argv,"ecdhb233") == 0) ecdh_doit[R_EC_B233]=2;
-               else if (strcmp(*argv,"ecdhb283") == 0) ecdh_doit[R_EC_B283]=2;
-               else if (strcmp(*argv,"ecdhb409") == 0) ecdh_doit[R_EC_B409]=2;
-               else if (strcmp(*argv,"ecdhb571") == 0) ecdh_doit[R_EC_B571]=2;
-               else if (strcmp(*argv,"ecdh") == 0)
-                       {
-                       for (i=0; i < EC_NUM; i++)
-                               ecdh_doit[i]=1;
+                       dsa_doit[R_DSA_2048]=1;
                        }
                else
 #endif
@@ -1053,18 +842,6 @@ int MAIN(int argc, char **argv)
 #ifndef OPENSSL_NO_DSA
                        BIO_printf(bio_err,"dsa512   dsa1024  dsa2048\n");
 #endif
-#ifndef OPENSSL_NO_ECDSA
-                       BIO_printf(bio_err,"ecdsap160 ecdsap224 ecdsap256 ecdsap384 ecdsap521\n");
-                       BIO_printf(bio_err,"ecdsak163 ecdsak233 ecdsak283 ecdsak409 ecdsak571\n");
-                       BIO_printf(bio_err,"ecdsab163 ecdsab233 ecdsab283 ecdsab409 ecdsab571\n");
-                       BIO_printf(bio_err,"ecdsa\n");
-#endif
-#ifndef OPENSSL_NO_ECDH
-                       BIO_printf(bio_err,"ecdhp160  ecdhp224  ecdhp256  ecdhp384  ecdhp521\n");
-                       BIO_printf(bio_err,"ecdhk163  ecdhk233  ecdhk283  ecdhk409  ecdhk571\n");
-                       BIO_printf(bio_err,"ecdhb163  ecdhb233  ecdhb283  ecdhb409  ecdhb571\n");
-                       BIO_printf(bio_err,"ecdh\n");
-#endif
 
 #ifndef OPENSSL_NO_IDEA
                        BIO_printf(bio_err,"idea     ");
@@ -1302,114 +1079,6 @@ int MAIN(int argc, char **argv)
                }
 #endif
 
-#ifndef OPENSSL_NO_ECDSA
-       ecdsa_c[R_EC_P160][0]=count/1000;
-       ecdsa_c[R_EC_P160][1]=count/1000/2;
-       for (i=R_EC_P224; i<=R_EC_P521; i++)
-               {
-               ecdsa_c[i][0]=ecdsa_c[i-1][0]/2;
-               ecdsa_c[i][1]=ecdsa_c[i-1][1]/2;
-               if ((ecdsa_doit[i] <= 1) && (ecdsa_c[i][0] == 0))
-                       ecdsa_doit[i]=0;
-               else
-                       {
-                       if (ecdsa_c[i] == 0)
-                               {
-                               ecdsa_c[i][0]=1;
-                               ecdsa_c[i][1]=1;
-                               }
-                       }
-               }
-       ecdsa_c[R_EC_K163][0]=count/1000;
-       ecdsa_c[R_EC_K163][1]=count/1000/2;
-       for (i=R_EC_K233; i<=R_EC_K571; i++)
-               {
-               ecdsa_c[i][0]=ecdsa_c[i-1][0]/2;
-               ecdsa_c[i][1]=ecdsa_c[i-1][1]/2;
-               if ((ecdsa_doit[i] <= 1) && (ecdsa_c[i][0] == 0))
-                       ecdsa_doit[i]=0;
-               else
-                       {
-                       if (ecdsa_c[i] == 0)
-                               {
-                               ecdsa_c[i][0]=1;
-                               ecdsa_c[i][1]=1;
-                               }
-                       }
-               }
-       ecdsa_c[R_EC_B163][0]=count/1000;
-       ecdsa_c[R_EC_B163][1]=count/1000/2;
-       for (i=R_EC_B233; i<=R_EC_B571; i++)
-               {
-               ecdsa_c[i][0]=ecdsa_c[i-1][0]/2;
-               ecdsa_c[i][1]=ecdsa_c[i-1][1]/2;
-               if ((ecdsa_doit[i] <= 1) && (ecdsa_c[i][0] == 0))
-                       ecdsa_doit[i]=0;
-               else
-                       {
-                       if (ecdsa_c[i] == 0)
-                               {
-                               ecdsa_c[i][0]=1;
-                               ecdsa_c[i][1]=1;
-                               }
-                       }
-               }
-#endif
-
-#ifndef OPENSSL_NO_ECDH
-       ecdh_c[R_EC_P160][0]=count/1000;
-       ecdh_c[R_EC_P160][1]=count/1000;
-       for (i=R_EC_P224; i<=R_EC_P521; i++)
-               {
-               ecdh_c[i][0]=ecdh_c[i-1][0]/2;
-               ecdh_c[i][1]=ecdh_c[i-1][1]/2;
-               if ((ecdh_doit[i] <= 1) && (ecdh_c[i][0] == 0))
-                       ecdh_doit[i]=0;
-               else
-                       {
-                       if (ecdh_c[i] == 0)
-                               {
-                               ecdh_c[i][0]=1;
-                               ecdh_c[i][1]=1;
-                               }
-                       }
-               }
-       ecdh_c[R_EC_K163][0]=count/1000;
-       ecdh_c[R_EC_K163][1]=count/1000;
-       for (i=R_EC_K233; i<=R_EC_K571; i++)
-               {
-               ecdh_c[i][0]=ecdh_c[i-1][0]/2;
-               ecdh_c[i][1]=ecdh_c[i-1][1]/2;
-               if ((ecdh_doit[i] <= 1) && (ecdh_c[i][0] == 0))
-                       ecdh_doit[i]=0;
-               else
-                       {
-                       if (ecdh_c[i] == 0)
-                               {
-                               ecdh_c[i][0]=1;
-                               ecdh_c[i][1]=1;
-                               }
-                       }
-               }
-       ecdh_c[R_EC_B163][0]=count/1000;
-       ecdh_c[R_EC_B163][1]=count/1000;
-       for (i=R_EC_B233; i<=R_EC_B571; i++)
-               {
-               ecdh_c[i][0]=ecdh_c[i-1][0]/2;
-               ecdh_c[i][1]=ecdh_c[i-1][1]/2;
-               if ((ecdh_doit[i] <= 1) && (ecdh_c[i][0] == 0))
-                       ecdh_doit[i]=0;
-               else
-                       {
-                       if (ecdh_c[i] == 0)
-                               {
-                               ecdh_c[i][0]=1;
-                               ecdh_c[i][1]=1;
-                               }
-                       }
-               }
-#endif
-
 #define COND(d)        (count < (d))
 #define COUNT(d) (d)
 #else
@@ -1726,6 +1395,7 @@ int MAIN(int argc, char **argv)
                                        EVP_DecryptInit_ex(&ctx,evp_cipher,NULL,key16,iv);
                                else
                                        EVP_EncryptInit_ex(&ctx,evp_cipher,NULL,key16,iv);
+                               EVP_CIPHER_CTX_set_padding(&ctx, 0);
 
                                Time_F(START);
                                if(decrypt)
@@ -1935,239 +1605,6 @@ int MAIN(int argc, char **argv)
                }
        if (rnd_fake) RAND_cleanup();
 #endif
-
-#ifndef OPENSSL_NO_ECDSA
-       if (RAND_status() != 1) 
-               {
-               RAND_seed(rnd_seed, sizeof rnd_seed);
-               rnd_fake = 1;
-               }
-       for (j=0; j<EC_NUM; j++) 
-               {
-               int ret;
-
-               if (!ecdsa_doit[j]) continue; /* Ignore Curve */ 
-               ecdsa[j] = EC_KEY_new();
-               if (ecdsa[j] == NULL) 
-                       {
-                       BIO_printf(bio_err,"ECDSA failure.\n");
-                       ERR_print_errors(bio_err);
-                       rsa_count=1;
-                       } 
-               else 
-                       {
-                       ecdsa[j]->group = EC_GROUP_new_by_nid(test_curves[j]);
-                       /* Could not obtain group information */
-                       if (ecdsa[j]->group == NULL) 
-                               {
-                               BIO_printf(bio_err,"ECDSA failure.Could not obtain group information\n");
-                               ERR_print_errors(bio_err);
-                               rsa_count=1;
-                               } 
-                       else 
-                               {
-#if 1
-                               EC_GROUP_precompute_mult(ecdsa[j]->group, NULL);
-#endif
-                               /* Perform ECDSA signature test */
-                               EC_KEY_generate_key(ecdsa[j]);
-                               ret = ECDSA_sign(0, buf, 20, ecdsasig, 
-                                       &ecdsasiglen, ecdsa[j]);
-                               if (ret == 0) 
-                                       {
-                                       BIO_printf(bio_err,"ECDSA sign failure.  No ECDSA sign will be done.\n");
-                                       ERR_print_errors(bio_err);
-                                       rsa_count=1;
-                                       } 
-                               else 
-                                       {
-                                       pkey_print_message("sign","ecdsa",
-                                               ecdsa_c[j][0], 
-                                               test_curves_bits[j],
-                                               ECDSA_SECONDS);
-
-                                       Time_F(START);
-                                       for (count=0,run=1; COND(ecdsa_c[j][0]);
-                                               count++) 
-                                               {
-                                               ret=ECDSA_sign(0, buf, 20, 
-                                                       ecdsasig, &ecdsasiglen,
-                                                       ecdsa[j]);
-                                               if (ret == 0) 
-                                                       {
-                                                       BIO_printf(bio_err, "ECDSA sign failure\n");
-                                                       ERR_print_errors(bio_err);
-                                                       count=1;
-                                                       break;
-                                                       }
-                                               }
-                                               d=Time_F(STOP);
-
-                                               BIO_printf(bio_err, mr ? "+R5:%ld:%d:%.2f\n" :
-                                               "%ld %d bit ECDSA signs in %.2fs \n", 
-                                               count, test_curves_bits[j], d);
-                                               ecdsa_results[j][0]=d/(double)count;
-                                               rsa_count=count;
-                                       }
-
-                               /* Perform ECDSA verification test */
-                               ret=ECDSA_verify(0, buf, 20, ecdsasig, 
-                                       ecdsasiglen, ecdsa[j]);
-                               if (ret != 1) 
-                                       {
-                                       BIO_printf(bio_err,"ECDSA verify failure.  No ECDSA verify will be done.\n");
-                                       ERR_print_errors(bio_err);
-                                       ecdsa_doit[j] = 0;
-                                       } 
-                               else 
-                                       {
-                                       pkey_print_message("verify","ecdsa",
-                                       ecdsa_c[j][1],
-                                       test_curves_bits[j],
-                                       ECDSA_SECONDS);
-                                       Time_F(START);
-                                       for (count=0,run=1; COND(ecdsa_c[j][1]); count++) 
-                                               {
-                                               ret=ECDSA_verify(0, buf, 20, ecdsasig, ecdsasiglen, ecdsa[j]);
-                                               if (ret != 1) 
-                                                       {
-                                                       BIO_printf(bio_err, "ECDSA verify failure\n");
-                                                       ERR_print_errors(bio_err);
-                                                       count=1;
-                                                       break;
-                                                       }
-                                               }
-                                               d=Time_F(STOP);
-                                               BIO_printf(bio_err, mr? "+R6:%ld:%d:%.2f\n"
-                                                       : "%ld %d bit ECDSA verify in %.2fs\n",
-                                               count, test_curves_bits[j], d);
-                                               ecdsa_results[j][1]=d/(double)count;
-                                       }
-
-                               if (rsa_count <= 1) 
-                                       {
-                                       /* if longer than 10s, don't do any more */
-                                       for (j++; j<EC_NUM; j++)
-                                       ecdsa_doit[j]=0;
-                                       }
-                               }
-                       }
-               }
-       if (rnd_fake) RAND_cleanup();
-#endif
-
-#ifndef OPENSSL_NO_ECDH
-       if (RAND_status() != 1)
-               {
-               RAND_seed(rnd_seed, sizeof rnd_seed);
-               rnd_fake = 1;
-               }
-       for (j=0; j<EC_NUM; j++)
-               {
-               if (!ecdh_doit[j]) continue;
-               ecdh_a[j] = EC_KEY_new();
-               ecdh_b[j] = EC_KEY_new();
-               if ((ecdh_a[j] == NULL) || (ecdh_b[j] == NULL))
-                       {
-                       BIO_printf(bio_err,"ECDH failure.\n");
-                       ERR_print_errors(bio_err);
-                       rsa_count=1;
-                       }
-               else
-                       {
-                       ecdh_a[j]->group = EC_GROUP_new_by_nid(test_curves[j]);
-                       if (ecdh_a[j]->group == NULL)
-                               {
-                               BIO_printf(bio_err,"ECDH failure.\n");
-                               ERR_print_errors(bio_err);
-                               rsa_count=1;
-                               }
-                       else
-                               {
-                               ecdh_b[j]->group = EC_GROUP_dup(ecdh_a[j]->group);
-
-                               /* generate two ECDH key pairs */
-                               if (!EC_KEY_generate_key(ecdh_a[j]) ||
-                                       !EC_KEY_generate_key(ecdh_b[j]))
-                                       {
-                                       BIO_printf(bio_err,"ECDH key generation failure.\n");
-                                       ERR_print_errors(bio_err);
-                                       rsa_count=1;            
-                                       }
-                               else
-                                       {
-                                       /* If field size is not more than 24 octets, then use SHA-1 hash of result;
-                                        * otherwise, use result (see section 4.8 of draft-ietf-tls-ecc-03.txt).
-                                        */
-                                       int field_size, outlen;
-                                       void *(*kdf)(void *in, size_t inlen, void *out, size_t xoutlen);
-                                       field_size = EC_GROUP_get_degree(ecdh_a[j]->group);
-                                       if (field_size <= 24 * 8)
-                                               {
-                                               outlen = KDF1_SHA1_len;
-                                               kdf = KDF1_SHA1;
-                                               }
-                                       else
-                                               {
-                                               outlen = (field_size+7)/8;
-                                               kdf = NULL;
-                                               }
-                                       secret_size_a = ECDH_compute_key(secret_a, outlen,
-                                               ecdh_b[j]->pub_key,
-                                               ecdh_a[j], kdf);
-                                       secret_size_b = ECDH_compute_key(secret_b, outlen,
-                                               ecdh_a[j]->pub_key,
-                                               ecdh_b[j], kdf);
-                                       if (secret_size_a != secret_size_b) 
-                                               ecdh_checks = 0;
-                                       else
-                                               ecdh_checks = 1;
-
-                                       for (secret_idx = 0; 
-                                           (secret_idx < secret_size_a)
-                                               && (ecdh_checks == 1);
-                                           secret_idx++)
-                                               {
-                                               if (secret_a[secret_idx] != secret_b[secret_idx])
-                                               ecdh_checks = 0;
-                                               }
-
-                                       if (ecdh_checks == 0)
-                                               {
-                                               BIO_printf(bio_err,"ECDH computations don't match.\n");
-                                               ERR_print_errors(bio_err);
-                                               rsa_count=1;            
-                                               }
-
-                                       pkey_print_message("","ecdh",
-                                       ecdh_c[j][0], 
-                                       test_curves_bits[j],
-                                       ECDH_SECONDS);
-                                       Time_F(START);
-                                       for (count=0,run=1; COND(ecdh_c[j][0]); count++)
-                                               {
-                                               ECDH_compute_key(secret_a, outlen,
-                                               ecdh_b[j]->pub_key,
-                                               ecdh_a[j], kdf);
-                                               }
-                                       d=Time_F(STOP);
-                                       BIO_printf(bio_err, mr ? "+R7:%ld:%d:%.2f\n" :"%ld %d-bit ECDH ops in %.2fs\n",
-                                       count, test_curves_bits[j], d);
-                                       ecdh_results[j][0]=d/(double)count;
-                                       rsa_count=count;
-                                       }
-                               }
-                       }
-
-               if (rsa_count <= 1)
-                       {
-                       /* if longer than 10s, don't do any more */
-                       for (j++; j<EC_NUM; j++)
-                       ecdh_doit[j]=0;
-                       }
-               }
-       if (rnd_fake) RAND_cleanup();
-#endif
 #ifdef HAVE_FORK
 show_res:
 #endif
@@ -2208,10 +1645,7 @@ show_res:
 #endif
 #ifdef HZ
 #define as_string(s) (#s)
-               {
-               double dbl = HZ;
-               printf("HZ=%g", dbl);
-               }
+               printf("HZ=%g", (double)HZ);
 # ifdef _SC_CLK_TCK
                printf(" [sysconf value]");
 # endif
@@ -2296,57 +1730,7 @@ show_res:
                                1.0/dsa_results[k][0],1.0/dsa_results[k][1]);
                }
 #endif
-#ifndef OPENSSL_NO_ECDSA
-       j=1;
-       for (k=0; k<EC_NUM; k++)
-               {
-               if (!ecdsa_doit[k]) continue;
-               if (j && !mr)
-                       {
-                       printf("%30ssign    verify    sign/s verify/s\n"," ");
-                       j=0;
-                       }
-
-               if (mr)
-                       fprintf(stdout,"+F4:%u:%u:%f:%f\n", 
-                               k, test_curves_bits[k],
-                               ecdsa_results[k][0],ecdsa_results[k][1]);
-               else
-                       fprintf(stdout,
-                               "%4u bit ecdsa (%s) %8.4fs %8.4fs %8.1f %8.1f\n", 
-                               test_curves_bits[k],
-                               test_curves_names[k],
-                               ecdsa_results[k][0],ecdsa_results[k][1], 
-                               1.0/ecdsa_results[k][0],1.0/ecdsa_results[k][1]);
-               }
-#endif
-
-
-#ifndef OPENSSL_NO_ECDH
-       j=1;
-       for (k=0; k<EC_NUM; k++)
-               {
-               if (!ecdh_doit[k]) continue;
-               if (j && !mr)
-                       {
-                       printf("%30sop      op/s\n"," ");
-                       j=0;
-                       }
-               if (mr)
-                       fprintf(stdout,"+F5:%u:%u:%f:%f\n",
-                               k, test_curves_bits[k],
-                               ecdh_results[k][0], 1.0/ecdh_results[k][0]);
-
-               else
-                       fprintf(stdout,"%4u bit ecdh (%s) %8.4fs %8.1f\n",
-                               test_curves_bits[k],
-                               test_curves_names[k],
-                               ecdh_results[k][0], 1.0/ecdh_results[k][0]);
-               }
-#endif
-
        mret=0;
-
 end:
        ERR_print_errors(bio_err);
        if (buf != NULL) OPENSSL_free(buf);
@@ -2361,22 +1745,6 @@ end:
                if (dsa_key[i] != NULL)
                        DSA_free(dsa_key[i]);
 #endif
-
-#ifndef OPENSSL_NO_ECDSA
-       for (i=0; i<EC_NUM; i++)
-               if (ecdsa[i] != NULL)
-                       EC_KEY_free(ecdsa[i]);
-#endif
-#ifndef OPENSSL_NO_ECDH
-       for (i=0; i<EC_NUM; i++)
-       {
-               if (ecdh_a[i] != NULL)
-                       EC_KEY_free(ecdh_a[i]);
-               if (ecdh_b[i] != NULL)
-                       EC_KEY_free(ecdh_b[i]);
-       }
-#endif
-
        apps_shutdown();
        OPENSSL_EXIT(mret);
        }
@@ -2418,8 +1786,8 @@ static void pkey_print_message(char *str, char *str2, long num, int bits,
 
 static void print_result(int alg,int run_no,int count,double time_used)
        {
-       BIO_printf(bio_err,mr ? "+R:%d:%s:%f\n"
-                  : "%d %s's in %.2fs\n",count,names[alg],time_used);
+       BIO_printf(bio_err,mr ? "+R:%ld:%s:%f\n"
+                  : "%ld %s's in %.2fs\n",count,names[alg],time_used);
        results[alg][run_no]=((double)count)/time_used*lengths[run_no];
        }
 
@@ -2578,49 +1946,6 @@ static int do_multi(int multi)
                                else
                                        dsa_results[k][1]=d;
                                }
-#ifndef OPENSSL_NO_ECDSA
-                       else if(!strncmp(buf,"+F4:",4))
-                               {
-                               int k;
-                               double d;
-                               
-                               p=buf+4;
-                               k=atoi(sstrsep(&p,sep));
-                               sstrsep(&p,sep);
-
-                               d=atof(sstrsep(&p,sep));
-                               if(n)
-                                       ecdsa_results[k][0]=1/(1/ecdsa_results[k][0]+1/d);
-                               else
-                                       ecdsa_results[k][0]=d;
-
-                               d=atof(sstrsep(&p,sep));
-                               if(n)
-                                       ecdsa_results[k][1]=1/(1/ecdsa_results[k][1]+1/d);
-                               else
-                                       ecdsa_results[k][1]=d;
-                               }
-#endif 
-
-#ifndef OPENSSL_NO_ECDH
-                       else if(!strncmp(buf,"+F5:",4))
-                               {
-                               int k;
-                               double d;
-                               
-                               p=buf+4;
-                               k=atoi(sstrsep(&p,sep));
-                               sstrsep(&p,sep);
-
-                               d=atof(sstrsep(&p,sep));
-                               if(n)
-                                       ecdh_results[k][0]=1/(1/ecdh_results[k][0]+1/d);
-                               else
-                                       ecdh_results[k][0]=d;
-
-                               }
-#endif
-
                        else if(!strncmp(buf,"+H:",3))
                                {
                                }