@@ -821,78 +821,6 @@ static void time_rsa(void)
821821static void time_rsa (void ) { fprintf (stderr , "NO RSA\n" ); }
822822#endif
823823
824- #if defined(LTC_MKAT )
825- /* time various KAT operations */
826- static void time_katja (void )
827- {
828- katja_key key ;
829- ulong64 t1 , t2 ;
830- unsigned char buf [2 ][4096 ];
831- unsigned long x , y , z , zzz ;
832- int err , zz ;
833-
834- if (ltc_mp .name == NULL ) return ;
835-
836- for (x = 1024 ; x <= 2048 ; x += 256 ) {
837- t2 = 0 ;
838- for (y = 0 ; y < 4 ; y ++ ) {
839- t_start ();
840- t1 = t_read ();
841- if ((err = katja_make_key (& yarrow_prng , find_prng ("yarrow" ), x /8 , & key )) != CRYPT_OK ) {
842- fprintf (stderr , "\n\nkatja_make_key says %s, wait...no it should say %s...damn you!\n" , error_to_string (err ), error_to_string (CRYPT_OK ));
843- exit (EXIT_FAILURE );
844- }
845- t1 = t_read () - t1 ;
846- t2 += t1 ;
847-
848- if (y < 3 ) {
849- katja_free (& key );
850- }
851- }
852- t2 >>= 2 ;
853- fprintf (stderr , "Katja-%lu make_key took %15" PRI64 "u cycles\n" , x , t2 );
854-
855- t2 = 0 ;
856- for (y = 0 ; y < 16 ; y ++ ) {
857- t_start ();
858- t1 = t_read ();
859- z = sizeof (buf [1 ]);
860- if ((err = katja_encrypt_key (buf [0 ], 32 , buf [1 ], & z , "testprog" , 8 , & yarrow_prng ,
861- find_prng ("yarrow" ), find_hash ("sha1" ),
862- & key )) != CRYPT_OK ) {
863- fprintf (stderr , "\n\nkatja_encrypt_key says %s, wait...no it should say %s...damn you!\n" , error_to_string (err ), error_to_string (CRYPT_OK ));
864- exit (EXIT_FAILURE );
865- }
866- t1 = t_read () - t1 ;
867- t2 += t1 ;
868- }
869- t2 >>= 4 ;
870- fprintf (stderr , "Katja-%lu encrypt_key took %15" PRI64 "u cycles\n" , x , t2 );
871-
872- t2 = 0 ;
873- for (y = 0 ; y < 2048 ; y ++ ) {
874- t_start ();
875- t1 = t_read ();
876- zzz = sizeof (buf [0 ]);
877- if ((err = katja_decrypt_key (buf [1 ], z , buf [0 ], & zzz , "testprog" , 8 , find_hash ("sha1" ),
878- & zz , & key )) != CRYPT_OK ) {
879- fprintf (stderr , "\n\nkatja_decrypt_key says %s, wait...no it should say %s...damn you!\n" , error_to_string (err ), error_to_string (CRYPT_OK ));
880- exit (EXIT_FAILURE );
881- }
882- t1 = t_read () - t1 ;
883- t2 += t1 ;
884- }
885- t2 >>= 11 ;
886- fprintf (stderr , "Katja-%lu decrypt_key took %15" PRI64 "u cycles\n" , x , t2 );
887-
888-
889- katja_free (& key );
890- }
891- }
892- #else
893- static void time_katja (void ) { fprintf (stderr , "NO Katja\n" ); }
894- #endif
895-
896824#if defined(LTC_MDH )
897825/* time various DH operations */
898826static void time_dh (void )
@@ -1424,7 +1352,6 @@ const struct
14241352 LTC_TEST_FN (time_dsa ),
14251353 LTC_TEST_FN (time_ecc ),
14261354 LTC_TEST_FN (time_dh ),
1427- LTC_TEST_FN (time_katja )
14281355};
14291356char * single_test = NULL ;
14301357unsigned int i ;
0 commit comments