implement fast point multiplication with precomputation
[openssl.git] / apps / speed.c
index 08d00beddbe7ddcbe309347e4bd773127ec2f853..d6f78fb5d4a2cb99744187655b1926a558b15a06 100644 (file)
  * copied and put under another distribution licence
  * [including the GNU Public Licence.]
  */
+/* ====================================================================
+ * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED.
+ *
+ * Portions of the attached software ("Contribution") are developed by 
+ * SUN MICROSYSTEMS, INC., and are contributed to the OpenSSL project.
+ *
+ * The Contribution is licensed pursuant to the OpenSSL open source
+ * license provided above.
+ *
+ * The ECDH and ECDSA speed test software is originally written by 
+ * Sumit Gupta of Sun Microsystems Laboratories.
+ *
+ */
 
 /* most of this code has been pilfered from my libdes speed.c program */
 
@@ -62,6 +75,8 @@
 #define SECONDS                3       
 #define RSA_SECONDS    10
 #define DSA_SECONDS    10
+#define ECDSA_SECONDS   10
+#define ECDH_SECONDS    10
 
 /* 11-Sep-92 Andrew Daviel   Support for Silicon Graphics IRIX added */
 /* 06-Apr-92 Luke Brennan    Support for VMS and add extra signal calls */
 
 #if defined(__FreeBSD__) || defined(__NetBSD__) || defined(__OpenBSD__) || defined(OPENSSL_SYS_MACOSX)
 # define USE_TOD
-#elif !defined(OPENSSL_SYS_MSDOS) && (!defined(OPENSSL_SYS_VMS) || defined(__DECC))
+#elif !defined(OPENSSL_SYS_MSDOS) && !defined(OPENSSL_SYS_VXWORKS) && (!defined(OPENSSL_SYS_VMS) || defined(__DECC))
 # define TIMES
 #endif
-#if !defined(_UNICOS) && !defined(__OpenBSD__) && !defined(sgi) && !defined(__FreeBSD__) && !(defined(__bsdi) || defined(__bsdi__)) && !defined(_AIX) && !defined(OPENSSL_SYS_MPE) && !defined(__NetBSD__) /* FIXME */
+#if !defined(_UNICOS) && !defined(__OpenBSD__) && !defined(sgi) && !defined(__FreeBSD__) && !(defined(__bsdi) || defined(__bsdi__)) && !defined(_AIX) && !defined(OPENSSL_SYS_MPE) && !defined(__NetBSD__) && !defined(OPENSSL_SYS_VXWORKS) /* FIXME */
 # define TIMEB
 #endif
 
 #include <sys/timeb.h>
 #endif
 
-#if !defined(TIMES) && !defined(TIMEB) && !defined(USE_TOD)
+#if !defined(TIMES) && !defined(TIMEB) && !defined(USE_TOD) && !defined(OPENSSL_SYS_VXWORKS)
 #error "It seems neither struct tms nor struct timeb is supported in this platform!"
 #endif
 
 #endif
 
 #ifndef OPENSSL_NO_DES
-#include <openssl/des_old.h>
+#include <openssl/des.h>
 #endif
 #ifndef OPENSSL_NO_AES
 #include <openssl/aes.h>
 #ifndef OPENSSL_NO_DSA
 #include "./testdsa.h"
 #endif
+#ifndef OPENSSL_NO_ECDSA
+#include <openssl/ecdsa.h>
+#endif
+#ifndef OPENSSL_NO_ECDH
+#include <openssl/ecdh.h>
+#endif
 
 /* The following if from times(3) man page.  It may need to be changed */
 #ifndef HZ
-# ifdef _SC_CLK_TCK
+# if defined(_SC_CLK_TCK) \
+     && (!defined(OPENSSL_SYS_VMS) || __CTRL_VER >= 70000000)
 #  define HZ ((double)sysconf(_SC_CLK_TCK))
 # else
 #  ifndef CLK_TCK
@@ -226,6 +248,10 @@ static int do_multi(int multi);
 #define SIZE_NUM       5
 #define RSA_NUM                4
 #define DSA_NUM                3
+
+#define EC_NUM       16
+#define MAX_ECDH_SIZE 256
+
 static const char *names[ALGOR_NUM]={
   "md2","mdc2","md4","md5","hmac(md5)","sha1","rmd160","rc4",
   "des cbc","des ede3","idea cbc",
@@ -235,6 +261,9 @@ static double results[ALGOR_NUM][SIZE_NUM];
 static int lengths[SIZE_NUM]={16,64,256,1024,8*1024};
 static double rsa_results[RSA_NUM][2];
 static double dsa_results[DSA_NUM][2];
+static double ecdsa_results[EC_NUM][2];
+static double ecdh_results[EC_NUM][1];
+
 
 #ifdef SIGALRM
 #if defined(__STDC__) || defined(sgi) || defined(_AIX)
@@ -326,7 +355,23 @@ static double Time_F(int s)
 # if defined(TIMES) && defined(TIMEB)
        else
 # endif
-# ifdef TIMEB
+# ifdef OPENSSL_SYS_VXWORKS
+                {
+               static unsigned long tick_start, tick_end;
+
+               if( s == START )
+                       {
+                       tick_start = tickGet();
+                       return 0;
+                       }
+               else
+                       {
+                       tick_end = tickGet();
+                       ret = (double)(tick_end - tick_start) / (double)sysClkRateGet();
+                       return((ret < 0.001)?0.001:ret);
+                       }
+                }
+# elif defined(TIMEB)
                {
                static struct timeb tstart,tend;
                long i;
@@ -353,14 +398,18 @@ int MAIN(int, char **);
 
 int MAIN(int argc, char **argv)
        {
-       ENGINE *e;
+#ifndef OPENSSL_NO_ENGINE
+       ENGINE *e = NULL;
+#endif
        unsigned char *buf=NULL,*buf2=NULL;
        int mret=1;
        long count=0,save_count=0;
        int i,j,k;
+#if !defined(OPENSSL_NO_RSA) || !defined(OPENSSL_NO_DSA)
+       long rsa_count;
+#endif
 #ifndef OPENSSL_NO_RSA
        unsigned rsa_num;
-       long rsa_count;
 #endif
        unsigned char md[EVP_MAX_MD_SIZE];
 #ifndef OPENSSL_NO_MD2
@@ -421,9 +470,9 @@ int MAIN(int argc, char **argv)
        unsigned char iv[MAX_BLOCK_SIZE/8];
 #ifndef OPENSSL_NO_DES
        DES_cblock *buf_as_des_cblock = NULL;
-       static des_cblock key ={0x12,0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0};
-       static des_cblock key2={0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0,0x12};
-       static des_cblock key3={0x56,0x78,0x9a,0xbc,0xde,0xf0,0x12,0x34};
+       static DES_cblock key ={0x12,0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0};
+       static DES_cblock key2={0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0,0x12};
+       static DES_cblock key3={0x56,0x78,0x9a,0xbc,0xde,0xf0,0x12,0x34};
        DES_key_schedule sch;
        DES_key_schedule sch2;
        DES_key_schedule sch3;
@@ -459,6 +508,24 @@ int MAIN(int argc, char **argv)
 #define        R_RSA_1024      1
 #define        R_RSA_2048      2
 #define        R_RSA_4096      3
+
+#define R_EC_P160    0
+#define R_EC_P192    1 
+#define R_EC_P224    2
+#define R_EC_P256    3
+#define R_EC_P384    4
+#define R_EC_P521    5
+#define R_EC_K163    6
+#define R_EC_K233    7
+#define R_EC_K283    8
+#define R_EC_K409    9
+#define R_EC_K571    10
+#define R_EC_B163    11
+#define R_EC_B233    12
+#define R_EC_B283    13
+#define R_EC_B409    14
+#define R_EC_B571    15
+
 #ifndef OPENSSL_NO_RSA
        RSA *rsa_key[RSA_NUM];
        long rsa_c[RSA_NUM][2];
@@ -474,8 +541,83 @@ int MAIN(int argc, char **argv)
        long dsa_c[DSA_NUM][2];
        static unsigned int dsa_bits[DSA_NUM]={512,1024,2048};
 #endif
+#ifndef OPENSSL_NO_EC
+       /* We only test over the following curves as they are representative, 
+        * To add tests over more curves, simply add the curve NID
+        * and curve name to the following arrays and increase the 
+        * EC_NUM value accordingly. 
+        */
+       static unsigned int test_curves[EC_NUM] = 
+       {       
+       /* Prime Curves */
+       NID_secp160r1,
+       NID_X9_62_prime192v1,
+       NID_secp224r1,
+       NID_X9_62_prime256v1,
+       NID_secp384r1,
+       NID_secp521r1,
+       /* Binary Curves */
+       NID_sect163k1,
+       NID_sect233k1,
+       NID_sect283k1,
+       NID_sect409k1,
+       NID_sect571k1,
+       NID_sect163r2,
+       NID_sect233r1,
+       NID_sect283r1,
+       NID_sect409r1,
+       NID_sect571r1
+       }; 
+       static char * test_curves_names[EC_NUM] = 
+       {
+       /* Prime Curves */
+       "secp160r1",
+       "nistp192",
+       "nistp224",
+       "nistp256",
+       "nistp384",
+       "nistp521",
+       /* Binary Curves */
+       "nistk163",
+       "nistk233",
+       "nistk283",
+       "nistk409",
+       "nistk571",
+       "nistb163",
+       "nistb233",
+       "nistb283",
+       "nistb409",
+       "nistb571"
+       };
+       static int test_curves_bits[EC_NUM] =
+        {
+        160, 192, 224, 256, 384, 521,
+        163, 233, 283, 409, 571,
+        163, 233, 283, 409, 571
+        };
+
+#endif
+
+#ifndef OPENSSL_NO_ECDSA
+        unsigned char ecdsasig[256];
+        unsigned int ecdsasiglen;
+        EC_KEY *ecdsa[EC_NUM];
+        long ecdsa_c[EC_NUM][2];
+#endif
+
+#ifndef OPENSSL_NO_ECDH
+        EC_KEY *ecdh_a[EC_NUM], *ecdh_b[EC_NUM];
+        unsigned char secret_a[MAX_ECDH_SIZE], secret_b[MAX_ECDH_SIZE];
+        int secret_size_a, secret_size_b;
+        int ecdh_checks = 0;
+        int secret_idx = 0;
+        long ecdh_c[EC_NUM][2];
+#endif
+
        int rsa_doit[RSA_NUM];
        int dsa_doit[DSA_NUM];
+       int ecdsa_doit[EC_NUM];
+        int ecdh_doit[EC_NUM];
        int doit[ALGOR_NUM];
        int pr_header=0;
        const EVP_CIPHER *evp_cipher=NULL;
@@ -494,11 +636,25 @@ int MAIN(int argc, char **argv)
 #ifndef OPENSSL_NO_DSA
        memset(dsa_key,0,sizeof(dsa_key));
 #endif
+#ifndef OPENSSL_NO_ECDSA
+       for (i=0; i<EC_NUM; i++) ecdsa[i] = NULL;
+#endif
+#ifndef OPENSSL_NO_ECDH
+       for (i=0; i<EC_NUM; i++)
+               {
+               ecdh_a[i] = NULL;
+               ecdh_b[i] = NULL;
+               }
+#endif
+
 
        if (bio_err == NULL)
                if ((bio_err=BIO_new(BIO_s_file())) != NULL)
                        BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 
+       if (!load_config(bio_err, NULL))
+               goto end;
+
 #ifndef OPENSSL_NO_RSA
        memset(rsa_key,0,sizeof(rsa_key));
        for (i=0; i<RSA_NUM; i++)
@@ -511,7 +667,7 @@ int MAIN(int argc, char **argv)
                goto end;
                }
 #ifndef OPENSSL_NO_DES
-       buf_as_des_cblock = (des_cblock *)buf;
+       buf_as_des_cblock = (DES_cblock *)buf;
 #endif
        if ((buf2=(unsigned char *)OPENSSL_malloc((int)BUFSIZE)) == NULL)
                {
@@ -529,6 +685,15 @@ int MAIN(int argc, char **argv)
                rsa_doit[i]=0;
        for (i=0; i<DSA_NUM; i++)
                dsa_doit[i]=0;
+#ifndef OPENSSL_NO_ECDSA
+       for (i=0; i<EC_NUM; i++)
+               ecdsa_doit[i]=0;
+#endif
+#ifndef OPENSSL_NO_ECDH
+       for (i=0; i<EC_NUM; i++)
+               ecdh_doit[i]=0;
+#endif
+
        
        j=0;
        argc--;
@@ -568,6 +733,7 @@ int MAIN(int argc, char **argv)
                        j--;    /* Otherwise, -elapsed gets confused with
                                   an algorithm. */
                        }
+#ifndef OPENSSL_NO_ENGINE
                else if ((argc > 0) && (strcmp(*argv,"-engine") == 0))
                        {
                        argc--;
@@ -584,6 +750,7 @@ int MAIN(int argc, char **argv)
                           means all of them should be run) */
                        j--;
                        }
+#endif
 #ifdef HAVE_FORK
                else if ((argc > 0) && (strcmp(*argv,"-multi") == 0))
                        {
@@ -747,6 +914,52 @@ int MAIN(int argc, char **argv)
                        dsa_doit[R_DSA_1024]=1;
                        }
                else
+#endif
+#ifndef OPENSSL_NO_ECDSA
+                    if (strcmp(*argv,"ecdsap160") == 0) ecdsa_doit[R_EC_P160]=2;
+               else if (strcmp(*argv,"ecdsap224") == 0) ecdsa_doit[R_EC_P224]=2;
+               else if (strcmp(*argv,"ecdsap256") == 0) ecdsa_doit[R_EC_P256]=2;
+               else if (strcmp(*argv,"ecdsap384") == 0) ecdsa_doit[R_EC_P384]=2;
+               else if (strcmp(*argv,"ecdsap521") == 0) ecdsa_doit[R_EC_P521]=2;
+               else if (strcmp(*argv,"ecdsak163") == 0) ecdsa_doit[R_EC_K163]=2;
+               else if (strcmp(*argv,"ecdsak233") == 0) ecdsa_doit[R_EC_K233]=2;
+               else if (strcmp(*argv,"ecdsak283") == 0) ecdsa_doit[R_EC_K283]=2;
+               else if (strcmp(*argv,"ecdsak409") == 0) ecdsa_doit[R_EC_K409]=2;
+               else if (strcmp(*argv,"ecdsak571") == 0) ecdsa_doit[R_EC_K571]=2;
+               else if (strcmp(*argv,"ecdsab163") == 0) ecdsa_doit[R_EC_B163]=2;
+               else if (strcmp(*argv,"ecdsab233") == 0) ecdsa_doit[R_EC_B233]=2;
+               else if (strcmp(*argv,"ecdsab283") == 0) ecdsa_doit[R_EC_B283]=2;
+               else if (strcmp(*argv,"ecdsab409") == 0) ecdsa_doit[R_EC_B409]=2;
+               else if (strcmp(*argv,"ecdsab571") == 0) ecdsa_doit[R_EC_B571]=2;
+               else if (strcmp(*argv,"ecdsa") == 0)
+                       {
+                       for (i=0; i < EC_NUM; i++)
+                               ecdsa_doit[i]=1;
+                       }
+               else
+#endif
+#ifndef OPENSSL_NO_ECDH
+                    if (strcmp(*argv,"ecdhp160") == 0) ecdh_doit[R_EC_P160]=2;
+               else if (strcmp(*argv,"ecdhp224") == 0) ecdh_doit[R_EC_P224]=2;
+               else if (strcmp(*argv,"ecdhp256") == 0) ecdh_doit[R_EC_P256]=2;
+               else if (strcmp(*argv,"ecdhp384") == 0) ecdh_doit[R_EC_P384]=2;
+               else if (strcmp(*argv,"ecdhp521") == 0) ecdh_doit[R_EC_P521]=2;
+               else if (strcmp(*argv,"ecdhk163") == 0) ecdh_doit[R_EC_K163]=2;
+               else if (strcmp(*argv,"ecdhk233") == 0) ecdh_doit[R_EC_K233]=2;
+               else if (strcmp(*argv,"ecdhk283") == 0) ecdh_doit[R_EC_K283]=2;
+               else if (strcmp(*argv,"ecdhk409") == 0) ecdh_doit[R_EC_K409]=2;
+               else if (strcmp(*argv,"ecdhk571") == 0) ecdh_doit[R_EC_K571]=2;
+               else if (strcmp(*argv,"ecdhb163") == 0) ecdh_doit[R_EC_B163]=2;
+               else if (strcmp(*argv,"ecdhb233") == 0) ecdh_doit[R_EC_B233]=2;
+               else if (strcmp(*argv,"ecdhb283") == 0) ecdh_doit[R_EC_B283]=2;
+               else if (strcmp(*argv,"ecdhb409") == 0) ecdh_doit[R_EC_B409]=2;
+               else if (strcmp(*argv,"ecdhb571") == 0) ecdh_doit[R_EC_B571]=2;
+               else if (strcmp(*argv,"ecdh") == 0)
+                       {
+                       for (i=0; i < EC_NUM; i++)
+                               ecdh_doit[i]=1;
+                       }
+               else
 #endif
                        {
                        BIO_printf(bio_err,"Error: bad option or value\n");
@@ -813,6 +1026,18 @@ int MAIN(int argc, char **argv)
 #ifndef OPENSSL_NO_DSA
                        BIO_printf(bio_err,"dsa512   dsa1024  dsa2048\n");
 #endif
+#ifndef OPENSSL_NO_ECDSA
+                       BIO_printf(bio_err,"ecdsap160 ecdsap224 ecdsap256 ecdsap384 ecdsap521\n");
+                       BIO_printf(bio_err,"ecdsak163 ecdsak233 ecdsak283 ecdsak409 ecdsak571\n");
+                       BIO_printf(bio_err,"ecdsab163 ecdsab233 ecdsab283 ecdsab409 ecdsab571\n");
+                       BIO_printf(bio_err,"ecdsa\n");
+#endif
+#ifndef OPENSSL_NO_ECDH
+                       BIO_printf(bio_err,"ecdhp160  ecdhp224  ecdhp256  ecdhp384  ecdhp521\n");
+                       BIO_printf(bio_err,"ecdhk163  ecdhk233  ecdhk283  ecdhk409  ecdhk571\n");
+                       BIO_printf(bio_err,"ecdhb163  ecdhb233  ecdhb283  ecdhb409  ecdhb571\n");
+                       BIO_printf(bio_err,"ecdh\n");
+#endif
 
 #ifndef OPENSSL_NO_IDEA
                        BIO_printf(bio_err,"idea     ");
@@ -840,10 +1065,12 @@ int MAIN(int argc, char **argv)
 
                        BIO_printf(bio_err,"\n");
                        BIO_printf(bio_err,"Available options:\n");
-#ifdef TIMES
+#if defined(TIMES) || defined(USE_TOD)
                        BIO_printf(bio_err,"-elapsed        measure time in real time instead of CPU user time.\n");
 #endif
+#ifndef OPENSSL_NO_ENGINE
                        BIO_printf(bio_err,"-engine e       use engine e, possibly a hardware device.\n");
+#endif
                        BIO_printf(bio_err,"-evp e          use EVP e.\n");
                        BIO_printf(bio_err,"-decrypt        time decryption instead of encryption (only EVP).\n");
                        BIO_printf(bio_err,"-mr             produce machine readable output.\n");
@@ -1042,6 +1269,114 @@ int MAIN(int argc, char **argv)
                }
 #endif
 
+#ifndef OPENSSL_NO_ECDSA
+       ecdsa_c[R_EC_P160][0]=count/1000;
+       ecdsa_c[R_EC_P160][1]=count/1000/2;
+       for (i=R_EC_P224; i<=R_EC_P521; i++)
+               {
+               ecdsa_c[i][0]=ecdsa_c[i-1][0]/2;
+               ecdsa_c[i][1]=ecdsa_c[i-1][1]/2;
+               if ((ecdsa_doit[i] <= 1) && (ecdsa_c[i][0] == 0))
+                       ecdsa_doit[i]=0;
+               else
+                       {
+                       if (ecdsa_c[i] == 0)
+                               {
+                               ecdsa_c[i][0]=1;
+                               ecdsa_c[i][1]=1;
+                               }
+                       }
+               }
+       ecdsa_c[R_EC_K163][0]=count/1000;
+       ecdsa_c[R_EC_K163][1]=count/1000/2;
+       for (i=R_EC_K233; i<=R_EC_K571; i++)
+               {
+               ecdsa_c[i][0]=ecdsa_c[i-1][0]/2;
+               ecdsa_c[i][1]=ecdsa_c[i-1][1]/2;
+               if ((ecdsa_doit[i] <= 1) && (ecdsa_c[i][0] == 0))
+                       ecdsa_doit[i]=0;
+               else
+                       {
+                       if (ecdsa_c[i] == 0)
+                               {
+                               ecdsa_c[i][0]=1;
+                               ecdsa_c[i][1]=1;
+                               }
+                       }
+               }
+       ecdsa_c[R_EC_B163][0]=count/1000;
+       ecdsa_c[R_EC_B163][1]=count/1000/2;
+       for (i=R_EC_B233; i<=R_EC_B571; i++)
+               {
+               ecdsa_c[i][0]=ecdsa_c[i-1][0]/2;
+               ecdsa_c[i][1]=ecdsa_c[i-1][1]/2;
+               if ((ecdsa_doit[i] <= 1) && (ecdsa_c[i][0] == 0))
+                       ecdsa_doit[i]=0;
+               else
+                       {
+                       if (ecdsa_c[i] == 0)
+                               {
+                               ecdsa_c[i][0]=1;
+                               ecdsa_c[i][1]=1;
+                               }
+                       }
+               }
+#endif
+
+#ifndef OPENSSL_NO_ECDH
+       ecdh_c[R_EC_P160][0]=count/1000;
+       ecdh_c[R_EC_P160][1]=count/1000;
+       for (i=R_EC_P224; i<=R_EC_P521; i++)
+               {
+               ecdh_c[i][0]=ecdh_c[i-1][0]/2;
+               ecdh_c[i][1]=ecdh_c[i-1][1]/2;
+               if ((ecdh_doit[i] <= 1) && (ecdh_c[i][0] == 0))
+                       ecdh_doit[i]=0;
+               else
+                       {
+                       if (ecdh_c[i] == 0)
+                               {
+                               ecdh_c[i][0]=1;
+                               ecdh_c[i][1]=1;
+                               }
+                       }
+               }
+       ecdh_c[R_EC_K163][0]=count/1000;
+       ecdh_c[R_EC_K163][1]=count/1000;
+       for (i=R_EC_K233; i<=R_EC_K571; i++)
+               {
+               ecdh_c[i][0]=ecdh_c[i-1][0]/2;
+               ecdh_c[i][1]=ecdh_c[i-1][1]/2;
+               if ((ecdh_doit[i] <= 1) && (ecdh_c[i][0] == 0))
+                       ecdh_doit[i]=0;
+               else
+                       {
+                       if (ecdh_c[i] == 0)
+                               {
+                               ecdh_c[i][0]=1;
+                               ecdh_c[i][1]=1;
+                               }
+                       }
+               }
+       ecdh_c[R_EC_B163][0]=count/1000;
+       ecdh_c[R_EC_B163][1]=count/1000;
+       for (i=R_EC_B233; i<=R_EC_B571; i++)
+               {
+               ecdh_c[i][0]=ecdh_c[i-1][0]/2;
+               ecdh_c[i][1]=ecdh_c[i-1][1]/2;
+               if ((ecdh_doit[i] <= 1) && (ecdh_c[i][0] == 0))
+                       ecdh_doit[i]=0;
+               else
+                       {
+                       if (ecdh_c[i] == 0)
+                               {
+                               ecdh_c[i][0]=1;
+                               ecdh_c[i][1]=1;
+                               }
+                       }
+               }
+#endif
+
 #define COND(d)        (count < (d))
 #define COUNT(d) (d)
 #else
@@ -1120,7 +1455,7 @@ int MAIN(int argc, char **argv)
 
                HMAC_CTX_init(&hctx);
                HMAC_Init_ex(&hctx,(unsigned char *)"This is a key...",
-                       16,EVP_md5());
+                       16,EVP_md5(), NULL);
 
                for (j=0; j<SIZE_NUM; j++)
                        {
@@ -1128,9 +1463,9 @@ int MAIN(int argc, char **argv)
                        Time_F(START);
                        for (count=0,run=1; COND(c[D_HMAC][j]); count++)
                                {
-                               HMAC_Init_ex(&hctx,NULL,0,NULL);
-                                HMAC_Update(&hctx,buf,lengths[j]);
-                                HMAC_Final(&hctx,&(hmac[0]),NULL);
+                               HMAC_Init_ex(&hctx,NULL,0,NULL,NULL);
+                               HMAC_Update(&hctx,buf,lengths[j]);
+                               HMAC_Final(&hctx,&(hmac[0]),NULL);
                                }
                        d=Time_F(STOP);
                        print_result(D_HMAC,j,count,d);
@@ -1371,6 +1706,7 @@ int MAIN(int argc, char **argv)
                                else
                                        EVP_EncryptFinal_ex(&ctx,buf,&outl);
                                d=Time_F(STOP);
+                               EVP_CIPHER_CTX_cleanup(&ctx);
                                }
                        if (evp_md)
                                {
@@ -1566,6 +1902,223 @@ int MAIN(int argc, char **argv)
                }
        if (rnd_fake) RAND_cleanup();
 #endif
+
+#ifndef OPENSSL_NO_ECDSA
+       if (RAND_status() != 1) 
+               {
+               RAND_seed(rnd_seed, sizeof rnd_seed);
+               rnd_fake = 1;
+               }
+       for (j=0; j<EC_NUM; j++) 
+               {
+               int ret;
+
+               if (!ecdsa_doit[j]) continue; /* Ignore Curve */ 
+               ecdsa[j] = EC_KEY_new();
+               if (ecdsa[j] == NULL) 
+                       {
+                       BIO_printf(bio_err,"ECDSA failure.\n");
+                       ERR_print_errors(bio_err);
+                       rsa_count=1;
+                       } 
+               else 
+                       {
+                       ecdsa[j]->group = EC_GROUP_new_by_nid(test_curves[j]);
+                       /* Could not obtain group information */
+                       if (ecdsa[j]->group == NULL) 
+                               {
+                               BIO_printf(bio_err,"ECDSA failure.Could not obtain group information\n");
+                               ERR_print_errors(bio_err);
+                               rsa_count=1;
+                               } 
+                       else 
+                               {
+#if 1
+                               EC_GROUP_precompute_mult(ecdsa[j]->group, NULL);
+#endif
+                               /* Perform ECDSA signature test */
+                               EC_KEY_generate_key(ecdsa[j]);
+                               ret = ECDSA_sign(0, buf, 20, ecdsasig, 
+                                       &ecdsasiglen, ecdsa[j]);
+                               if (ret == 0) 
+                                       {
+                                       BIO_printf(bio_err,"ECDSA sign failure.  No ECDSA sign will be done.\n");
+                                       ERR_print_errors(bio_err);
+                                       rsa_count=1;
+                                       } 
+                               else 
+                                       {
+                                       pkey_print_message("sign","ecdsa",
+                                               ecdsa_c[j][0], 
+                                               test_curves_bits[j],
+                                               ECDSA_SECONDS);
+
+                                       Time_F(START);
+                                       for (count=0,run=1; COND(ecdsa_c[j][0]);
+                                               count++) 
+                                               {
+                                               ret=ECDSA_sign(0, buf, 20, 
+                                                       ecdsasig, &ecdsasiglen,
+                                                       ecdsa[j]);
+                                               if (ret == 0) 
+                                                       {
+                                                       BIO_printf(bio_err, "ECDSA sign failure\n");
+                                                       ERR_print_errors(bio_err);
+                                                       count=1;
+                                                       break;
+                                                       }
+                                               }
+                                               d=Time_F(STOP);
+
+                                               BIO_printf(bio_err, mr ? "+R5:%ld:%d:%.2f\n" :
+                                               "%ld %d bit ECDSA signs in %.2fs \n", 
+                                               count, test_curves_bits[j], d);
+                                               ecdsa_results[j][0]=d/(double)count;
+                                               rsa_count=count;
+                                       }
+
+                               /* Perform ECDSA verification test */
+                               ret=ECDSA_verify(0, buf, 20, ecdsasig, 
+                                       ecdsasiglen, ecdsa[j]);
+                               if (ret != 1) 
+                                       {
+                                       BIO_printf(bio_err,"ECDSA verify failure.  No ECDSA verify will be done.\n");
+                                       ERR_print_errors(bio_err);
+                                       ecdsa_doit[j] = 0;
+                                       } 
+                               else 
+                                       {
+                                       pkey_print_message("verify","ecdsa",
+                                       ecdsa_c[j][1],
+                                       test_curves_bits[j],
+                                       ECDSA_SECONDS);
+                                       Time_F(START);
+                                       for (count=0,run=1; COND(ecdsa_c[j][1]); count++) 
+                                               {
+                                               ret=ECDSA_verify(0, buf, 20, ecdsasig, ecdsasiglen, ecdsa[j]);
+                                               if (ret != 1) 
+                                                       {
+                                                       BIO_printf(bio_err, "ECDSA verify failure\n");
+                                                       ERR_print_errors(bio_err);
+                                                       count=1;
+                                                       break;
+                                                       }
+                                               }
+                                               d=Time_F(STOP);
+                                               BIO_printf(bio_err, mr? "+R6:%ld:%d:%.2f\n"
+                                                       : "%ld %d bit ECDSA verify in %.2fs\n",
+                                               count, test_curves_bits[j], d);
+                                               ecdsa_results[j][1]=d/(double)count;
+                                       }
+
+                               if (rsa_count <= 1) 
+                                       {
+                                       /* if longer than 10s, don't do any more */
+                                       for (j++; j<EC_NUM; j++)
+                                       ecdsa_doit[j]=0;
+                                       }
+                               }
+                       }
+               }
+       if (rnd_fake) RAND_cleanup();
+#endif
+
+#ifndef OPENSSL_NO_ECDH
+       if (RAND_status() != 1)
+               {
+               RAND_seed(rnd_seed, sizeof rnd_seed);
+               rnd_fake = 1;
+               }
+       for (j=0; j<EC_NUM; j++)
+               {
+               if (!ecdh_doit[j]) continue;
+               ecdh_a[j] = EC_KEY_new();
+               ecdh_b[j] = EC_KEY_new();
+               if ((ecdh_a[j] == NULL) || (ecdh_b[j] == NULL))
+                       {
+                       BIO_printf(bio_err,"ECDH failure.\n");
+                       ERR_print_errors(bio_err);
+                       rsa_count=1;
+                       }
+               else
+                       {
+                       ecdh_a[j]->group = EC_GROUP_new_by_nid(test_curves[j]);
+                       if (ecdh_a[j]->group == NULL)
+                               {
+                               BIO_printf(bio_err,"ECDH failure.\n");
+                               ERR_print_errors(bio_err);
+                               rsa_count=1;
+                               }
+                       else
+                               {
+                               ecdh_b[j]->group = ecdh_a[j]->group;
+
+                               /* generate two ECDH key pairs */
+                               if (!EC_KEY_generate_key(ecdh_a[j]) ||
+                                       !EC_KEY_generate_key(ecdh_b[j]))
+                                       {
+                                       BIO_printf(bio_err,"ECDH key generation failure.\n");
+                                       ERR_print_errors(bio_err);
+                                       rsa_count=1;            
+                                       }
+                               else
+                                       {
+                                       secret_size_a = ECDH_compute_key(secret_a, 
+                                               ecdh_b[j]->pub_key,
+                                               ecdh_a[j]);
+                                       secret_size_b = ECDH_compute_key(secret_b, 
+                                               ecdh_a[j]->pub_key,
+                                               ecdh_b[j]);
+                                       if (secret_size_a != secret_size_b) 
+                                               ecdh_checks = 0;
+                                       else
+                                               ecdh_checks = 1;
+
+                                       for (secret_idx = 0; 
+                                           (secret_idx < secret_size_a)
+                                               && (ecdh_checks == 1);
+                                           secret_idx++)
+                                               {
+                                               if (secret_a[secret_idx] != secret_b[secret_idx])
+                                               ecdh_checks = 0;
+                                               }
+
+                                       if (ecdh_checks == 0)
+                                               {
+                                               BIO_printf(bio_err,"ECDH computations don't match.\n");
+                                               ERR_print_errors(bio_err);
+                                               rsa_count=1;            
+                                               }
+
+                                       pkey_print_message("","ecdh",
+                                       ecdh_c[j][0], 
+                                       test_curves_bits[j],
+                                       ECDH_SECONDS);
+                                       Time_F(START);
+                                       for (count=0,run=1; COND(ecdh_c[j][0]); count++)
+                                               {
+                                               ECDH_compute_key(secret_a, 
+                                               ecdh_b[j]->pub_key,
+                                               ecdh_a[j]);
+                                               }
+                                       d=Time_F(STOP);
+                                       BIO_printf(bio_err, mr ? "+R7:%ld:%d:%.2f\n" :"%ld %d-bit ECDH ops in %.2fs\n",
+                                       count, test_curves_bits[j], d);
+                                       ecdh_results[j][0]=d/(double)count;
+                                       rsa_count=count;
+                                       }
+                               }
+                       }
+
+               if (rsa_count <= 1)
+                       {
+                       /* if longer than 10s, don't do any more */
+                       for (j++; j<EC_NUM; j++)
+                       ecdh_doit[j]=0;
+                       }
+               }
+       if (rnd_fake) RAND_cleanup();
+#endif
 #ifdef HAVE_FORK
 show_res:
 #endif
@@ -1582,7 +2135,7 @@ show_res:
                printf("%s ",RC4_options());
 #endif
 #ifndef OPENSSL_NO_DES
-               printf("%s ",des_options());
+               printf("%s ",DES_options());
 #endif
 #ifndef OPENSSL_NO_AES
                printf("%s ",AES_options());
@@ -1606,7 +2159,7 @@ show_res:
 #endif
 #ifdef HZ
 #define as_string(s) (#s)
-               printf("HZ=%g", HZ);
+               printf("HZ=%g", (double)HZ);
 # ifdef _SC_CLK_TCK
                printf(" [sysconf value]");
 # endif
@@ -1691,7 +2244,57 @@ show_res:
                                1.0/dsa_results[k][0],1.0/dsa_results[k][1]);
                }
 #endif
+#ifndef OPENSSL_NO_ECDSA
+       j=1;
+       for (k=0; k<EC_NUM; k++)
+               {
+               if (!ecdsa_doit[k]) continue;
+               if (j && !mr)
+                       {
+                       printf("%30ssign    verify    sign/s verify/s\n"," ");
+                       j=0;
+                       }
+
+               if (mr)
+                       fprintf(stdout,"+F4:%u:%u:%f:%f\n", 
+                               k, test_curves_bits[k],
+                               ecdsa_results[k][0],ecdsa_results[k][1]);
+               else
+                       fprintf(stdout,
+                               "%4u bit ecdsa (%s) %8.4fs %8.4fs %8.1f %8.1f\n", 
+                               test_curves_bits[k],
+                               test_curves_names[k],
+                               ecdsa_results[k][0],ecdsa_results[k][1], 
+                               1.0/ecdsa_results[k][0],1.0/ecdsa_results[k][1]);
+               }
+#endif
+
+
+#ifndef OPENSSL_NO_ECDH
+       j=1;
+       for (k=0; k<EC_NUM; k++)
+               {
+               if (!ecdh_doit[k]) continue;
+               if (j && !mr)
+                       {
+                       printf("%30sop      op/s\n"," ");
+                       j=0;
+                       }
+               if (mr)
+                       fprintf(stdout,"+F5:%u:%u:%f:%f\n",
+                               k, test_curves_bits[k],
+                               ecdh_results[k][0], 1.0/ecdh_results[k][0]);
+
+               else
+                       fprintf(stdout,"%4u bit ecdh (%s) %8.4fs %8.1f\n",
+                               test_curves_bits[k],
+                               test_curves_names[k],
+                               ecdh_results[k][0], 1.0/ecdh_results[k][0]);
+               }
+#endif
+
        mret=0;
+
 end:
        ERR_print_errors(bio_err);
        if (buf != NULL) OPENSSL_free(buf);
@@ -1706,8 +2309,24 @@ end:
                if (dsa_key[i] != NULL)
                        DSA_free(dsa_key[i]);
 #endif
+
+#ifndef OPENSSL_NO_ECDSA
+       for (i=0; i<EC_NUM; i++)
+               if (ecdsa[i] != NULL)
+                       EC_KEY_free(ecdsa[i]);
+#endif
+#ifndef OPENSSL_NO_ECDH
+       for (i=0; i<EC_NUM; i++)
+       {
+               if (ecdh_a[i] != NULL)
+                       EC_KEY_free(ecdh_a[i]);
+               if (ecdh_b[i] != NULL)
+                       EC_KEY_free(ecdh_b[i]);
+       }
+#endif
+
        apps_shutdown();
-       EXIT(mret);
+       OPENSSL_EXIT(mret);
        }
 
 static void print_message(const char *s, long num, int length)
@@ -1760,7 +2379,7 @@ static char *sstrsep(char **string, const char *delim)
     if (**string == 0)
         return NULL;
 
-    memset(isdelim, 0, 256);
+    memset(isdelim, 0, sizeof isdelim);
     isdelim[0] = 1;
 
     while (*delim)
@@ -1907,6 +2526,49 @@ static int do_multi(int multi)
                                else
                                        dsa_results[k][1]=d;
                                }
+#ifndef OPENSSL_NO_ECDSA
+                       else if(!strncmp(buf,"+F4:",4))
+                               {
+                               int k;
+                               double d;
+                               
+                               p=buf+4;
+                               k=atoi(sstrsep(&p,sep));
+                               sstrsep(&p,sep);
+
+                               d=atof(sstrsep(&p,sep));
+                               if(n)
+                                       ecdsa_results[k][0]=1/(1/ecdsa_results[k][0]+1/d);
+                               else
+                                       ecdsa_results[k][0]=d;
+
+                               d=atof(sstrsep(&p,sep));
+                               if(n)
+                                       ecdsa_results[k][1]=1/(1/ecdsa_results[k][1]+1/d);
+                               else
+                                       ecdsa_results[k][1]=d;
+                               }
+#endif 
+
+#ifndef OPENSSL_NO_ECDH
+                       else if(!strncmp(buf,"+F5:",4))
+                               {
+                               int k;
+                               double d;
+                               
+                               p=buf+4;
+                               k=atoi(sstrsep(&p,sep));
+                               sstrsep(&p,sep);
+
+                               d=atof(sstrsep(&p,sep));
+                               if(n)
+                                       ecdh_results[k][0]=1/(1/ecdh_results[k][0]+1/d);
+                               else
+                                       ecdh_results[k][0]=d;
+
+                               }
+#endif
+
                        else if(!strncmp(buf,"+H:",3))
                                {
                                }