int main (int argc, char **argv) { setprogname (argv[0]); random_update (); vtime = signtime = 0; int sz = 2048; bool opt_v = false; if (argc > 1 && !strcmp (argv[1], "-v")) opt_v = true; if (argc > 2 && !(sz = atoi (argv[2]))) fatal << "bad argument\n"; for (int i = 0; i < 10; i++) { esign_priv sk = esign_keygen (opt_v ? sz : 424 + rnd.getword () % 256); test_key_sign (sk); } if (opt_v) { warn ("Signed 500 messages with %d bit key in %" U64F "u " TIME_LABEL " per signature\n", sz, signtime / 500); warn ("Verified 500 messages with %d bit key in %" U64F "u " TIME_LABEL " per verify\n", sz, vtime / 500); } return 0; }
int main (int argc, char **argv) { tst_vtime = tst_stime = 0; bool opt_v = false; int vsz = 1024; ptr<dsa_gen> dg; if (argc > 1 && !strcmp (argv[1], "-v")) { opt_v = true; } setprogname (argv[0]); random_update (); for (int i = 0; i < 1; i++) { dg = dsa_gen::rgen (opt_v ? vsz : 424 + rnd.getword () % 256); test_key_sign (dg->sk); } if (opt_v) { warn ("Signed 50 messages with %d bit key in %" U64F "u " TIME_LABEL " per signature\n", vsz, tst_stime / 50); warn ("Verified 50 messages with %d bit key in %" U64F "u " TIME_LABEL " per verify\n", vsz, tst_vtime / 50); } return 0; }
int main (int argc, char **argv) { setprogname (argv[0]); random_update (); esign_priv sk = get_private_key(); test_key_sign (sk); }