- 25 8月, 1999 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 24 8月, 1999 2 次提交
-
-
由 Dr. Stephen Henson 提交于
block.
-
由 Dr. Stephen Henson 提交于
DSA_METHOD to make it more consistent with RSA_METHOD.
-
- 23 8月, 1999 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 19 8月, 1999 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Bodo Möller 提交于
-
- 17 8月, 1999 1 次提交
-
-
由 Dr. Stephen Henson 提交于
support for encrypted content type in PKCS7_set_content().
-
- 15 8月, 1999 1 次提交
-
-
由 Ulf Möller 提交于
-
- 14 8月, 1999 3 次提交
-
-
由 Ulf Möller 提交于
Submitted by: Ivan Nejgebauer <ian@uns.ns.ac.yu>
-
由 Ulf Möller 提交于
-
由 Ulf Möller 提交于
-
- 11 8月, 1999 3 次提交
-
-
由 Bodo Möller 提交于
-
由 Dr. Stephen Henson 提交于
Modify obj_dat.pl to take its files from the command line. Usage is now perl obj_dat.pl objects.h obj_dat.h this should avoid redirection shell escape problems under Win32.
-
由 Bodo Möller 提交于
-
- 10 8月, 1999 2 次提交
-
-
由 Bodo Möller 提交于
Prototypes and constant declarations for non-copying reads and writes for BIO pairs (which is totally untested as of now, so I don't yet commit the actual source code, but reserve the numbers to avoid conflicts).
-
由 Dr. Stephen Henson 提交于
used by things like Xenroll. Also include documentation for extendedKeyUsage extension.
-
- 09 8月, 1999 2 次提交
-
-
由 Ralf S. Engelschall 提交于
Friends, feel free to start again hacking for 0.9.5... ;)
-
由 Ralf S. Engelschall 提交于
-
- 08 8月, 1999 3 次提交
-
-
由 Bodo Möller 提交于
-
由 Ralf S. Engelschall 提交于
-
由 Ralf S. Engelschall 提交于
Hint from: Andrija Antonijevic <TheAntony2@bigfoot.com>
-
- 07 8月, 1999 1 次提交
-
-
由 Bodo Möller 提交于
-
- 06 8月, 1999 1 次提交
-
-
由 Bodo Möller 提交于
-
- 05 8月, 1999 1 次提交
-
-
由 Bodo Möller 提交于
while implementing and using it.
-
- 03 8月, 1999 7 次提交
-
-
由 Ben Laurie 提交于
-
由 Ben Laurie 提交于
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
- 01 8月, 1999 1 次提交
-
-
由 Andy Polyakov 提交于
the remainder left in %edx. Here is the resulting performance improvement matrix (improvement as a result of this *and* previous tune-up committed two days ago). The results were obtained by profiling the "div" part of the crypto/bn/bnspeed.c. CPU BN_div bn_div_words overall comment ------------------------------------------------------------------------ PII +16% accumulated by +2-3% PII multiplies damn fast! Taking inlining multiplication out of the loop didn't make too much difference. Eliminating of the multiplication involved in remainder calculation is the major factor. Pentium +45% accumulated by +7-9% mull isn't that fast and replacing inlining multiplications with additions in the loop has more visible effect:-) MIPS +75% +12% +20-25% In addition to the taking mults R10000 out of the loop (giving 12% in the asm/mips3.s) three mults were eliminated in BN_div. Alpha +30% +50% +10-15% Same as above. But remember that EV4 bn_div_words is a C implementation. It takes 4 Alpha mults in C to do the same thing as 1 MIPS mult in assembler does. So the effect (50%) is more impressive. But not the overall one... Well, if Alpha bn_mul_add would be implemented in assembler overall improvement would be closer to MIPS...
-
- 31 7月, 1999 1 次提交
-
-
由 Bodo Möller 提交于
-
- 30 7月, 1999 5 次提交
-
-
由 Andy Polyakov 提交于
loop body and replace 'em with addition/subtraction.
-
由 Bodo Möller 提交于
-
由 Dr. Stephen Henson 提交于
for encrypted data, rather than hard coding '8'.
-
由 Dr. Stephen Henson 提交于
recipient.
-
由 Ulf Möller 提交于
to Kerberos.
-
- 29 7月, 1999 2 次提交
-
-
由 Ulf Möller 提交于
Configure didn't generate the file in Windows builds).
-
由 Bodo Möller 提交于
Using different files caused problems because the dependencies in the Makefiles produced by mk1mf.pl were for the standard case, i.e. mentioned buildinf.h and not mk1mfinf.h.
-