aboutsummaryrefslogtreecommitdiffstats
path: root/src/cmd
diff options
context:
space:
mode:
authorlloyd <[email protected]>2015-03-23 02:14:48 +0000
committerlloyd <[email protected]>2015-03-23 02:14:48 +0000
commite9283c9817949aa27ae97f0c9ec06745fb62240d (patch)
tree8cbdb20e07b5b74e734ded250363776bff1daf04 /src/cmd
parentce679ca4fc75c7f7ffa36d4364392fe0dd2b1294 (diff)
Move the signature padding schemes to the PK operation classes,
as was previously done with encrypt/decrypt ops. One feature dropped on the floor here is previously PK_Signer by default did verification of signatures before releasing them as an measure against fault attacks. However in addition to being expensive this turned out to be difficult to implement with the new scheme.
Diffstat (limited to 'src/cmd')
-rw-r--r--src/cmd/speed_pk.cpp9
1 files changed, 3 insertions, 6 deletions
diff --git a/src/cmd/speed_pk.cpp b/src/cmd/speed_pk.cpp
index 313892a23..ed3349cd5 100644
--- a/src/cmd/speed_pk.cpp
+++ b/src/cmd/speed_pk.cpp
@@ -80,9 +80,6 @@ using namespace Botan;
#include <memory>
#include <set>
-#define BENCH_FAULT_PROT DISABLE_FAULT_PROTECTION
-//#define BENCH_FAULT_PROT ENABLE_FAULT_PROTECTION
-
namespace {
const char* ec_domains[] = {
@@ -347,7 +344,7 @@ void benchmark_ecdsa(RandomNumberGenerator& rng,
ECDSA_PrivateKey key(rng, params);
keygen_timer.stop();
- PK_Signer sig(key, padding, IEEE_1363, BENCH_FAULT_PROT);
+ PK_Signer sig(key, padding, IEEE_1363);
PK_Verifier ver(key, padding);
benchmark_sig_ver(ver, sig, verify_timer,
@@ -389,7 +386,7 @@ void benchmark_gost_3410(RandomNumberGenerator& rng,
GOST_3410_PrivateKey key(rng, params);
keygen_timer.stop();
- PK_Signer sig(key, padding, IEEE_1363, BENCH_FAULT_PROT);
+ PK_Signer sig(key, padding, IEEE_1363);
PK_Verifier ver(key, padding);
benchmark_sig_ver(ver, sig, verify_timer,
@@ -496,7 +493,7 @@ void benchmark_dsa_nr(RandomNumberGenerator& rng,
algo_name = key.algo_name();
keygen_timer.stop();
- PK_Signer sig(key, padding, IEEE_1363, BENCH_FAULT_PROT);
+ PK_Signer sig(key, padding, IEEE_1363);
PK_Verifier ver(key, padding);
benchmark_sig_ver(ver, sig, verify_timer,