diff options
author | lloyd <[email protected]> | 2015-03-23 02:14:48 +0000 |
---|---|---|
committer | lloyd <[email protected]> | 2015-03-23 02:14:48 +0000 |
commit | e9283c9817949aa27ae97f0c9ec06745fb62240d (patch) | |
tree | 8cbdb20e07b5b74e734ded250363776bff1daf04 /src/cmd/speed_pk.cpp | |
parent | ce679ca4fc75c7f7ffa36d4364392fe0dd2b1294 (diff) |
Move the signature padding schemes to the PK operation classes,
as was previously done with encrypt/decrypt ops.
One feature dropped on the floor here is previously PK_Signer by
default did verification of signatures before releasing them as an
measure against fault attacks. However in addition to being expensive
this turned out to be difficult to implement with the new scheme.
Diffstat (limited to 'src/cmd/speed_pk.cpp')
-rw-r--r-- | src/cmd/speed_pk.cpp | 9 |
1 files changed, 3 insertions, 6 deletions
diff --git a/src/cmd/speed_pk.cpp b/src/cmd/speed_pk.cpp index 313892a23..ed3349cd5 100644 --- a/src/cmd/speed_pk.cpp +++ b/src/cmd/speed_pk.cpp @@ -80,9 +80,6 @@ using namespace Botan; #include <memory> #include <set> -#define BENCH_FAULT_PROT DISABLE_FAULT_PROTECTION -//#define BENCH_FAULT_PROT ENABLE_FAULT_PROTECTION - namespace { const char* ec_domains[] = { @@ -347,7 +344,7 @@ void benchmark_ecdsa(RandomNumberGenerator& rng, ECDSA_PrivateKey key(rng, params); keygen_timer.stop(); - PK_Signer sig(key, padding, IEEE_1363, BENCH_FAULT_PROT); + PK_Signer sig(key, padding, IEEE_1363); PK_Verifier ver(key, padding); benchmark_sig_ver(ver, sig, verify_timer, @@ -389,7 +386,7 @@ void benchmark_gost_3410(RandomNumberGenerator& rng, GOST_3410_PrivateKey key(rng, params); keygen_timer.stop(); - PK_Signer sig(key, padding, IEEE_1363, BENCH_FAULT_PROT); + PK_Signer sig(key, padding, IEEE_1363); PK_Verifier ver(key, padding); benchmark_sig_ver(ver, sig, verify_timer, @@ -496,7 +493,7 @@ void benchmark_dsa_nr(RandomNumberGenerator& rng, algo_name = key.algo_name(); keygen_timer.stop(); - PK_Signer sig(key, padding, IEEE_1363, BENCH_FAULT_PROT); + PK_Signer sig(key, padding, IEEE_1363); PK_Verifier ver(key, padding); benchmark_sig_ver(ver, sig, verify_timer, |