From c91e1259347388b57264bec5b4a9fd91237adc26 Mon Sep 17 00:00:00 2001 From: "Dr. Stephen Henson" <steve@openssl.org> Date: Sat, 2 Oct 1999 01:18:19 +0000 Subject: [PATCH] Modify the 'speed' application so it now uses RSA_sign and RSA_verify instead of RSA_private_encrypt and RSA_public_decrypt --- apps/speed.c | 23 +++++++++++------------ 1 file changed, 11 insertions(+), 12 deletions(-) diff --git a/apps/speed.c b/apps/speed.c index e769ca2310..502cb0c8ea 100644 --- a/apps/speed.c +++ b/apps/speed.c @@ -959,22 +959,22 @@ int MAIN(int argc, char **argv) } #endif - RAND_bytes(buf,30); + RAND_bytes(buf,36); #ifndef NO_RSA for (j=0; j<RSA_NUM; j++) { + int ret; if (!rsa_doit[j]) continue; - rsa_num=RSA_private_encrypt(30,buf,buf2,rsa_key[j], - RSA_PKCS1_PADDING); + ret=RSA_sign(NID_md5_sha1, buf,36, buf2, &rsa_num, rsa_key[j]); pkey_print_message("private","rsa",rsa_c[j][0],rsa_bits[j], RSA_SECONDS); /* RSA_blinding_on(rsa_key[j],NULL); */ Time_F(START); for (count=0,run=1; COND(rsa_c[j][0]); count++) { - rsa_num=RSA_private_encrypt(30,buf,buf2,rsa_key[j], - RSA_PKCS1_PADDING); - if (rsa_num <= 0) + ret=RSA_sign(NID_md5_sha1, buf,36, buf2, &rsa_num, + rsa_key[j]); + if (ret <= 0) { BIO_printf(bio_err,"RSA private encrypt failure\n"); ERR_print_errors(bio_err); @@ -989,18 +989,17 @@ int MAIN(int argc, char **argv) rsa_count=count; #if 1 - rsa_num2=RSA_public_decrypt(rsa_num,buf2,buf,rsa_key[j], - RSA_PKCS1_PADDING); + ret=RSA_verify(NID_md5_sha1, buf,36, buf2, rsa_num, rsa_key[j]); pkey_print_message("public","rsa",rsa_c[j][1],rsa_bits[j], RSA_SECONDS); Time_F(START); for (count=0,run=1; COND(rsa_c[j][1]); count++) { - rsa_num2=RSA_public_decrypt(rsa_num,buf2,buf,rsa_key[j], - RSA_PKCS1_PADDING); - if (rsa_num2 <= 0) + ret=RSA_verify(NID_md5_sha1, buf,36, buf2, rsa_num, + rsa_key[j]); + if (ret <= 0) { - BIO_printf(bio_err,"RSA public decrypt failure\n"); + BIO_printf(bio_err,"RSA verify failure\n"); ERR_print_errors(bio_err); count=1; break; -- 2.25.1