Lines Matching defs:testnum
662 static unsigned int testnum;
727 for (count = 0; COND(c[algindex][testnum]); count++) {
729 || !EVP_DigestUpdate(ctx, buf, (size_t)lengths[testnum])
736 for (count = 0; COND(c[algindex][testnum]); count++) {
737 if (!EVP_Digest(buf, (size_t)lengths[testnum], digest, NULL, md,
818 for (count = 0; COND(c[algindex][testnum]); count++) {
822 || !EVP_MAC_update(mctx, buf, lengths[testnum])
884 for (count = 0; COND(c[algindex][testnum]); count++)
885 if (EVP_Cipher(tempargs->ctx, buf, buf, (size_t)lengths[testnum]) <= 0)
898 for (count = 0; COND(c[D_GHASH][testnum]); count++) {
899 if (!EVP_MAC_update(mctx, buf, lengths[testnum]))
951 for (count = 0; COND(c[D_RAND][testnum]); count++)
952 RAND_bytes(buf, lengths[testnum]);
965 for (count = 0; COND(c[D_EVP][testnum]); count++) {
966 rc = EVP_DecryptUpdate(ctx, buf, &outl, buf, lengths[testnum]);
973 for (count = 0; COND(c[D_EVP][testnum]); count++) {
974 rc = EVP_EncryptUpdate(ctx, buf, &outl, buf, lengths[testnum]);
1007 for (count = 0; COND(c[D_EVP][testnum]); count++) {
1036 NULL, lengths[testnum])) {
1049 if (!EVP_EncryptUpdate(ctx, buf, &outl, buf, lengths[testnum])) {
1079 for (count = 0; COND(c[D_EVP][testnum]); count++) {
1125 NULL, lengths[testnum])) {
1138 if (!EVP_DecryptUpdate(ctx, outbuf, &outl, buf, lengths[testnum])) {
1158 for (count = 0; COND(rsa_c[testnum][0]); count++) {
1160 ret = EVP_PKEY_sign(rsa_sign_ctx[testnum], buf2, rsa_num, buf, 36);
1180 for (count = 0; COND(rsa_c[testnum][1]); count++) {
1181 ret = EVP_PKEY_verify(rsa_verify_ctx[testnum], buf2, rsa_num, buf, 36);
1201 for (count = 0; COND(rsa_c[testnum][2]); count++) {
1203 ret = EVP_PKEY_encrypt(rsa_encrypt_ctx[testnum], buf2, rsa_num, buf, 36);
1223 for (count = 0; COND(rsa_c[testnum][3]); count++) {
1225 ret = EVP_PKEY_decrypt(rsa_decrypt_ctx[testnum], buf, &rsa_num, buf2, tempargs->encsize);
1241 EVP_PKEY_CTX *ffdh_ctx = tempargs->ffdh_ctx[testnum];
1245 for (count = 0; COND(ffdh_c[testnum][0]); count++) {
1265 for (count = 0; COND(dsa_c[testnum][0]); count++) {
1267 ret = EVP_PKEY_sign(dsa_sign_ctx[testnum], buf2, dsa_num, buf, 20);
1287 for (count = 0; COND(dsa_c[testnum][1]); count++) {
1288 ret = EVP_PKEY_verify(dsa_verify_ctx[testnum], buf2, dsa_num, buf, 20);
1309 for (count = 0; COND(ecdsa_c[testnum][0]); count++) {
1311 ret = EVP_PKEY_sign(ecdsa_sign_ctx[testnum], buf2, ecdsa_num, buf, 20);
1331 for (count = 0; COND(ecdsa_c[testnum][1]); count++) {
1332 ret = EVP_PKEY_verify(ecdsa_verify_ctx[testnum], buf2, ecdsa_num,
1349 EVP_PKEY_CTX *ctx = tempargs->ecdh_ctx[testnum];
1352 size_t *outlen = &(tempargs->outlen[testnum]);
1354 for (count = 0; COND(ecdh_c[testnum][0]); count++)
1370 for (count = 0; COND(eddsa_c[testnum][0]); count++) {
1371 ret = EVP_DigestSignInit(edctx[testnum], NULL, NULL, NULL, NULL);
1378 ret = EVP_DigestSign(edctx[testnum], eddsasig, eddsasigsize, buf, 20);
1398 for (count = 0; COND(eddsa_c[testnum][1]); count++) {
1399 ret = EVP_DigestVerifyInit(edctx[testnum], NULL, NULL, NULL, NULL);
1406 ret = EVP_DigestVerify(edctx[testnum], eddsasig, eddsasigsize, buf, 20);
1428 const size_t max_size = EVP_PKEY_get_size(sm2_pkey[testnum]);
1430 for (count = 0; COND(sm2_c[testnum][0]); count++) {
1433 if (!EVP_DigestSignInit(sm2ctx[testnum], NULL, EVP_sm3(),
1434 NULL, sm2_pkey[testnum])) {
1440 ret = EVP_DigestSign(sm2ctx[testnum], sm2sig, &sm2sigsize,
1465 for (count = 0; COND(sm2_c[testnum][1]); count++) {
1466 if (!EVP_DigestVerifyInit(sm2ctx[testnum], NULL, EVP_sm3(),
1467 NULL, sm2_pkey[testnum])) {
1473 ret = EVP_DigestVerify(sm2ctx[testnum], sm2sig, sm2sigsize,
1489 EVP_PKEY_CTX *ctx = tempargs->kem_gen_ctx[testnum];
1493 for (count = 0; COND(kems_c[testnum][0]); count++) {
1512 EVP_PKEY_CTX *ctx = tempargs->kem_encaps_ctx[testnum];
1513 size_t out_len = tempargs->kem_out_len[testnum];
1514 size_t secret_len = tempargs->kem_secret_len[testnum];
1515 unsigned char *out = tempargs->kem_out[testnum];
1516 unsigned char *secret = tempargs->kem_send_secret[testnum];
1519 for (count = 0; COND(kems_c[testnum][1]); count++) {
1529 EVP_PKEY_CTX *ctx = tempargs->kem_decaps_ctx[testnum];
1530 size_t out_len = tempargs->kem_out_len[testnum];
1531 size_t secret_len = tempargs->kem_secret_len[testnum];
1532 unsigned char *out = tempargs->kem_out[testnum];
1533 unsigned char *secret = tempargs->kem_send_secret[testnum];
1536 for (count = 0; COND(kems_c[testnum][2]); count++) {
1546 EVP_PKEY_CTX *ctx = tempargs->sig_gen_ctx[testnum];
1550 for (count = 0; COND(kems_c[testnum][0]); count++) {
1562 EVP_PKEY_CTX *ctx = tempargs->sig_sign_ctx[testnum];
1564 unsigned char *sig = app_malloc(tempargs->sig_max_sig_len[testnum],
1570 for (count = 0; COND(kems_c[testnum][1]); count++) {
1571 size_t sig_len = tempargs->sig_max_sig_len[testnum];
1588 EVP_PKEY_CTX *ctx = tempargs->sig_verify_ctx[testnum];
1589 size_t sig_len = tempargs->sig_act_sig_len[testnum];
1590 unsigned char *sig = tempargs->sig_sig[testnum];
1595 for (count = 0; COND(kems_c[testnum][2]); count++) {
2689 for (testnum = 0; testnum < size_num; testnum++) {
2690 print_message(names[D_MD2], lengths[testnum], seconds.sym);
2694 print_result(D_MD2, testnum, count, d);
2701 for (testnum = 0; testnum < size_num; testnum++) {
2702 print_message(names[D_MDC2], lengths[testnum], seconds.sym);
2706 print_result(D_MDC2, testnum, count, d);
2713 for (testnum = 0; testnum < size_num; testnum++) {
2714 print_message(names[D_MD4], lengths[testnum], seconds.sym);
2718 print_result(D_MD4, testnum, count, d);
2725 for (testnum = 0; testnum < size_num; testnum++) {
2726 print_message(names[D_MD5], lengths[testnum], seconds.sym);
2730 print_result(D_MD5, testnum, count, d);
2737 for (testnum = 0; testnum < size_num; testnum++) {
2738 print_message(names[D_SHA1], lengths[testnum], seconds.sym);
2742 print_result(D_SHA1, testnum, count, d);
2749 for (testnum = 0; testnum < size_num; testnum++) {
2750 print_message(names[D_SHA256], lengths[testnum], seconds.sym);
2754 print_result(D_SHA256, testnum, count, d);
2761 for (testnum = 0; testnum < size_num; testnum++) {
2762 print_message(names[D_SHA512], lengths[testnum], seconds.sym);
2766 print_result(D_SHA512, testnum, count, d);
2773 for (testnum = 0; testnum < size_num; testnum++) {
2774 print_message(names[D_WHIRLPOOL], lengths[testnum], seconds.sym);
2778 print_result(D_WHIRLPOOL, testnum, count, d);
2785 for (testnum = 0; testnum < size_num; testnum++) {
2786 print_message(names[D_RMD160], lengths[testnum], seconds.sym);
2790 print_result(D_RMD160, testnum, count, d);
2816 for (testnum = 0; testnum < size_num; testnum++) {
2817 print_message(names[D_HMAC], lengths[testnum], seconds.sym);
2821 print_result(D_HMAC, testnum, count, d);
2837 for (testnum = 0; st && testnum < size_num; testnum++) {
2838 if (!check_block_size(loopargs[0].ctx, lengths[testnum]))
2840 print_message(names[D_CBC_DES], lengths[testnum], seconds.sym);
2844 print_result(D_CBC_DES, testnum, count, d);
2859 for (testnum = 0; st && testnum < size_num; testnum++) {
2860 if (!check_block_size(loopargs[0].ctx, lengths[testnum]))
2862 print_message(names[D_EDE3_DES], lengths[testnum], seconds.sym);
2866 print_result(D_EDE3_DES, testnum, count, d);
2884 for (testnum = 0; st && testnum < size_num; testnum++) {
2885 if (!check_block_size(loopargs[0].ctx, lengths[testnum]))
2887 print_message(names[algindex], lengths[testnum], seconds.sym);
2891 print_result(algindex, testnum, count, d);
2910 for (testnum = 0; st && testnum < size_num; testnum++) {
2911 if (!check_block_size(loopargs[0].ctx, lengths[testnum]))
2913 print_message(names[algindex], lengths[testnum], seconds.sym);
2917 print_result(algindex, testnum, count, d);
2935 for (testnum = 0; st && testnum < size_num; testnum++) {
2936 if (!check_block_size(loopargs[0].ctx, lengths[testnum]))
2938 print_message(names[algindex], lengths[testnum], seconds.sym);
2942 print_result(algindex, testnum, count, d);
2968 for (testnum = 0; testnum < size_num; testnum++) {
2969 print_message(names[D_GHASH], lengths[testnum], seconds.sym);
2973 print_result(D_GHASH, testnum, count, d);
2981 for (testnum = 0; testnum < size_num; testnum++) {
2982 print_message(names[D_RAND], lengths[testnum], seconds.sym);
2986 print_result(D_RAND, testnum, count, d);
3032 for (testnum = 0; testnum < size_num; testnum++) {
3033 print_message(names[D_EVP], lengths[testnum], seconds.sym);
3108 lengths[testnum])) {
3126 lengths[testnum])) {
3180 print_result(D_EVP, testnum, count, d);
3185 for (testnum = 0; testnum < size_num; testnum++) {
3186 print_message(names[D_EVP], lengths[testnum], seconds.sym);
3190 print_result(D_EVP, testnum, count, d);
3223 for (testnum = 0; testnum < size_num; testnum++) {
3224 print_message(names[D_EVP_CMAC], lengths[testnum], seconds.sym);
3228 print_result(D_EVP_CMAC, testnum, count, d);
3244 for (testnum = 0; testnum < size_num; testnum++) {
3245 print_message(names[D_KMAC128], lengths[testnum], seconds.sym);
3249 print_result(D_KMAC128, testnum, count, d);
3265 for (testnum = 0; testnum < size_num; testnum++) {
3266 print_message(names[D_KMAC256], lengths[testnum], seconds.sym);
3270 print_result(D_KMAC256, testnum, count, d);
3281 for (testnum = 0; testnum < RSA_NUM; testnum++) {
3285 if (!rsa_doit[testnum])
3294 && EVP_PKEY_CTX_set_rsa_keygen_bits(genctx, rsa_keys[testnum].bits) > 0
3303 const unsigned char *p = rsa_keys[testnum].data;
3306 rsa_keys[testnum].length))
3311 loopargs[i].rsa_sign_ctx[testnum] = EVP_PKEY_CTX_new(rsa_key, NULL);
3313 if (loopargs[i].rsa_sign_ctx[testnum] == NULL
3314 || EVP_PKEY_sign_init(loopargs[i].rsa_sign_ctx[testnum]) <= 0
3315 || EVP_PKEY_sign(loopargs[i].rsa_sign_ctx[testnum],
3329 rsa_keys[testnum].bits, seconds.rsa);
3330 /* RSA_blinding_on(rsa_key[testnum],NULL); */
3337 count, rsa_keys[testnum].bits, d);
3338 rsa_results[testnum][0] = (double)count / d;
3343 loopargs[i].rsa_verify_ctx[testnum] = EVP_PKEY_CTX_new(rsa_key,
3345 if (loopargs[i].rsa_verify_ctx[testnum] == NULL
3346 || EVP_PKEY_verify_init(loopargs[i].rsa_verify_ctx[testnum]) <= 0
3347 || EVP_PKEY_verify(loopargs[i].rsa_verify_ctx[testnum],
3358 rsa_doit[testnum] = 0;
3361 rsa_keys[testnum].bits, seconds.rsa);
3368 count, rsa_keys[testnum].bits, d);
3369 rsa_results[testnum][1] = (double)count / d;
3373 loopargs[i].rsa_encrypt_ctx[testnum] = EVP_PKEY_CTX_new(rsa_key, NULL);
3375 if (loopargs[i].rsa_encrypt_ctx[testnum] == NULL
3376 || EVP_PKEY_encrypt_init(loopargs[i].rsa_encrypt_ctx[testnum]) <= 0
3377 || EVP_PKEY_encrypt(loopargs[i].rsa_encrypt_ctx[testnum],
3391 rsa_keys[testnum].bits, seconds.rsa);
3392 /* RSA_blinding_on(rsa_key[testnum],NULL); */
3399 count, rsa_keys[testnum].bits, d);
3400 rsa_results[testnum][2] = (double)count / d;
3405 loopargs[i].rsa_decrypt_ctx[testnum] = EVP_PKEY_CTX_new(rsa_key, NULL);
3407 if (loopargs[i].rsa_decrypt_ctx[testnum] == NULL
3408 || EVP_PKEY_decrypt_init(loopargs[i].rsa_decrypt_ctx[testnum]) <= 0
3409 || EVP_PKEY_decrypt(loopargs[i].rsa_decrypt_ctx[testnum],
3424 rsa_keys[testnum].bits, seconds.rsa);
3425 /* RSA_blinding_on(rsa_key[testnum],NULL); */
3432 count, rsa_keys[testnum].bits, d);
3433 rsa_results[testnum][3] = (double)count / d;
3439 stop_it(rsa_doit, testnum);
3445 for (testnum = 0; testnum < DSA_NUM; testnum++) {
3449 if (!dsa_doit[testnum])
3452 st = (dsa_key = get_dsa(dsa_bits[testnum])) != NULL;
3455 loopargs[i].dsa_sign_ctx[testnum] = EVP_PKEY_CTX_new(dsa_key,
3458 if (loopargs[i].dsa_sign_ctx[testnum] == NULL
3459 || EVP_PKEY_sign_init(loopargs[i].dsa_sign_ctx[testnum]) <= 0
3460 || EVP_PKEY_sign(loopargs[i].dsa_sign_ctx[testnum],
3474 dsa_bits[testnum], seconds.dsa);
3481 count, dsa_bits[testnum], d);
3482 dsa_results[testnum][0] = (double)count / d;
3487 loopargs[i].dsa_verify_ctx[testnum] = EVP_PKEY_CTX_new(dsa_key,
3489 if (loopargs[i].dsa_verify_ctx[testnum] == NULL
3490 || EVP_PKEY_verify_init(loopargs[i].dsa_verify_ctx[testnum]) <= 0
3491 || EVP_PKEY_verify(loopargs[i].dsa_verify_ctx[testnum],
3502 dsa_doit[testnum] = 0;
3505 dsa_bits[testnum], seconds.dsa);
3512 count, dsa_bits[testnum], d);
3513 dsa_results[testnum][1] = (double)count / d;
3518 stop_it(dsa_doit, testnum);
3524 for (testnum = 0; testnum < ECDSA_NUM; testnum++) {
3528 if (!ecdsa_doit[testnum])
3531 st = (ecdsa_key = get_ecdsa(&ec_curves[testnum])) != NULL;
3534 loopargs[i].ecdsa_sign_ctx[testnum] = EVP_PKEY_CTX_new(ecdsa_key,
3537 if (loopargs[i].ecdsa_sign_ctx[testnum] == NULL
3538 || EVP_PKEY_sign_init(loopargs[i].ecdsa_sign_ctx[testnum]) <= 0
3539 testnum],
3553 ec_curves[testnum].bits, seconds.ecdsa);
3560 count, ec_curves[testnum].bits, d);
3561 ecdsa_results[testnum][0] = (double)count / d;
3566 loopargs[i].ecdsa_verify_ctx[testnum] = EVP_PKEY_CTX_new(ecdsa_key,
3568 if (loopargs[i].ecdsa_verify_ctx[testnum] == NULL
3569 || EVP_PKEY_verify_init(loopargs[i].ecdsa_verify_ctx[testnum]) <= 0
3570 || EVP_PKEY_verify(loopargs[i].ecdsa_verify_ctx[testnum],
3581 ecdsa_doit[testnum] = 0;
3584 ec_curves[testnum].bits, seconds.ecdsa);
3591 count, ec_curves[testnum].bits, d);
3592 ecdsa_results[testnum][1] = (double)count / d;
3597 stop_it(ecdsa_doit, testnum);
3602 for (testnum = 0; testnum < EC_NUM; testnum++) {
3605 if (!ecdh_doit[testnum])
3616 if ((key_A = get_ecdsa(&ec_curves[testnum])) == NULL /* generate secret key A */
3617 || (key_B = get_ecdsa(&ec_curves[testnum])) == NULL /* generate secret key B */
3661 loopargs[i].ecdh_ctx[testnum] = ctx;
3662 loopargs[i].outlen[testnum] = outlen;
3671 ec_curves[testnum].bits, seconds.ecdh);
3677 ec_curves[testnum].bits, d);
3678 ecdh_results[testnum][0] = (double)count / d;
3684 stop_it(ecdh_doit, testnum);
3689 for (testnum = 0; testnum < EdDSA_NUM; testnum++) {
3694 if (!eddsa_doit[testnum])
3697 loopargs[i].eddsa_ctx[testnum] = EVP_MD_CTX_new();
3698 if (loopargs[i].eddsa_ctx[testnum] == NULL) {
3702 loopargs[i].eddsa_ctx2[testnum] = EVP_MD_CTX_new();
3703 if (loopargs[i].eddsa_ctx2[testnum] == NULL) {
3708 if ((ed_pctx = EVP_PKEY_CTX_new_id(ed_curves[testnum].nid,
3719 if (!EVP_DigestSignInit(loopargs[i].eddsa_ctx[testnum], NULL, NULL,
3725 if (!EVP_DigestVerifyInit(loopargs[i].eddsa_ctx2[testnum], NULL,
3742 loopargs[i].sigsize = ed_curves[testnum].sigsize;
3743 st = EVP_DigestSign(loopargs[i].eddsa_ctx[testnum],
3755 pkey_print_message("sign", ed_curves[testnum].name,
3756 ed_curves[testnum].bits, seconds.eddsa);
3763 count, ed_curves[testnum].bits,
3764 ed_curves[testnum].name, d);
3765 eddsa_results[testnum][0] = (double)count / d;
3770 st = EVP_DigestVerify(loopargs[i].eddsa_ctx2[testnum],
3780 eddsa_doit[testnum] = 0;
3782 pkey_print_message("verify", ed_curves[testnum].name,
3783 ed_curves[testnum].bits, seconds.eddsa);
3790 count, ed_curves[testnum].bits,
3791 ed_curves[testnum].name, d);
3792 eddsa_results[testnum][1] = (double)count / d;
3797 stop_it(eddsa_doit, testnum);
3804 for (testnum = 0; testnum < SM2_NUM; testnum++) {
3808 if (!sm2_doit[testnum])
3817 loopargs[i].sm2_ctx[testnum] = EVP_MD_CTX_new();
3818 loopargs[i].sm2_vfy_ctx[testnum] = EVP_MD_CTX_new();
3819 if (loopargs[i].sm2_ctx[testnum] == NULL
3820 || loopargs[i].sm2_vfy_ctx[testnum] == NULL)
3828 sm2_curves[testnum].nid)
3837 loopargs[i].sm2_pkey[testnum] = sm2_pkey;
3848 EVP_MD_CTX_set_pkey_ctx(loopargs[i].sm2_ctx[testnum], sm2_pctx);
3849 EVP_MD_CTX_set_pkey_ctx(loopargs[i].sm2_vfy_ctx[testnum], sm2_vfy_pctx);
3859 if (!EVP_DigestSignInit(loopargs[i].sm2_ctx[testnum], NULL,
3862 if (!EVP_DigestVerifyInit(loopargs[i].sm2_vfy_ctx[testnum], NULL,
3874 st = EVP_DigestSign(loopargs[i].sm2_ctx[testnum],
3886 pkey_print_message("sign", sm2_curves[testnum].name,
3887 sm2_curves[testnum].bits, seconds.sm2);
3894 count, sm2_curves[testnum].bits,
3895 sm2_curves[testnum].name, d);
3896 sm2_results[testnum][0] = (double)count / d;
3902 st = EVP_DigestVerify(loopargs[i].sm2_vfy_ctx[testnum],
3912 sm2_doit[testnum] = 0;
3914 pkey_print_message("verify", sm2_curves[testnum].name,
3915 sm2_curves[testnum].bits, seconds.sm2);
3922 count, sm2_curves[testnum].bits,
3923 sm2_curves[testnum].name, d);
3924 sm2_results[testnum][1] = (double)count / d;
3929 for (testnum++; testnum < SM2_NUM; testnum++)
3930 sm2_doit[testnum] = 0;
3937 for (testnum = 0; testnum < FFDH_NUM; testnum++) {
3940 if (!ffdh_doit[testnum])
3991 if (EVP_PKEY_CTX_set_dh_nid(ffdh_ctx, ffdh_params[testnum].nid) <= 0) {
4085 loopargs[i].ffdh_ctx[testnum] = ffdh_ctx;
4096 ffdh_params[testnum].bits, seconds.ffdh);
4102 ffdh_params[testnum].bits, d);
4103 ffdh_results[testnum][0] = (double)count / d;
4108 stop_it(ffdh_doit, testnum);
4113 for (testnum = 0; testnum < kems_algs_len; testnum++) {
4115 const char *kem_name = kems_algname[testnum];
4117 if (!kems_doit[testnum] || !do_kems)
4250 loopargs[i].kem_gen_ctx[testnum] = kem_gen_ctx;
4251 loopargs[i].kem_encaps_ctx[testnum] = kem_encaps_ctx;
4252 loopargs[i].kem_decaps_ctx[testnum] = kem_decaps_ctx;
4253 loopargs[i].kem_out_len[testnum] = out_len;
4254 loopargs[i].kem_secret_len[testnum] = send_secret_len;
4255 loopargs[i].kem_out[testnum] = out;
4256 loopargs[i].kem_send_secret[testnum] = send_secret;
4257 loopargs[i].kem_rcv_secret[testnum] = rcv_secret;
4277 kems_results[testnum][0] = (double)count / d;
4286 kems_results[testnum][1] = (double)count / d;
4295 kems_results[testnum][2] = (double)count / d;
4300 stop_it(kems_doit, testnum);
4304 for (testnum = 0; testnum < sigs_algs_len; testnum++) {
4306 const char *sig_name = sigs_algname[testnum];
4308 if (!sigs_doit[testnum] || !do_sigs)
4460 loopargs[i].sig_gen_ctx[testnum] = sig_gen_ctx;
4461 loopargs[i].sig_sign_ctx[testnum] = sig_sign_ctx;
4462 loopargs[i].sig_verify_ctx[testnum] = sig_verify_ctx;
4463 loopargs[i].sig_max_sig_len[testnum] = max_sig_len;
4464 loopargs[i].sig_act_sig_len[testnum] = sig_len;
4465 loopargs[i].sig_sig[testnum] = sig;
4488 sigs_results[testnum][0] = (double)count / d;
4497 sigs_results[testnum][1] = (double)count / d;
4507 sigs_results[testnum][2] = (double)count / d;
4511 stop_it(sigs_doit, testnum);
4532 for (testnum = 0; testnum < size_num; testnum++)
4533 printf(mr ? ":%d" : "%7d bytes", lengths[testnum]);
4554 for (testnum = 0; testnum < size_num; testnum++) {
4555 if (results[k][testnum] > 10000 && !mr)
4556 printf(" %11.2fk", results[k][testnum] / 1e3);
4558 printf(mr ? ":%.2f" : " %11.2f ", results[k][testnum]);
4562 testnum = 1;
4566 if (testnum && !mr) {
4568 testnum = 0;
4582 testnum = 1;
4587 if (testnum && !mr) {
4589 testnum = 0;
4600 testnum = 1;
4604 if (testnum && !mr) {
4606 testnum = 0;
4620 testnum = 1;
4624 if (testnum && !mr) {
4626 testnum = 0;
4640 testnum = 1;
4644 if (testnum && !mr) {
4646 testnum = 0;
4662 testnum = 1;
4666 if (testnum && !mr) {
4668 testnum = 0;
4683 testnum = 1;
4687 if (testnum && !mr) {
4689 testnum = 0;
4703 testnum = 1;
4709 if (testnum && !mr) {
4711 testnum = 0;
4725 testnum = 1;
4731 if (testnum && !mr) {
4733 testnum = 0;