1. 20 4月, 2004 10 次提交
  2. 15 4月, 2004 1 次提交
  3. 14 4月, 2004 1 次提交
  4. 02 4月, 2004 2 次提交
  5. 31 3月, 2004 2 次提交
  6. 29 3月, 2004 3 次提交
  7. 28 3月, 2004 3 次提交
  8. 27 3月, 2004 1 次提交
  9. 26 3月, 2004 8 次提交
  10. 25 3月, 2004 9 次提交
    • R
      RAND_add() wants a double as it's last argument. · a8722803
      Richard Levitte 提交于
      a8722803
    • D
      Fix loads of warnings in policy code. · b79c82ea
      Dr. Stephen Henson 提交于
      I'll remember to try to compile this with warnings enabled next time :-)
      b79c82ea
    • D
      Fix ASN1 warnings. · 69d1d5e6
      Dr. Stephen Henson 提交于
      69d1d5e6
    • G
      Adjust various bignum functions to use BN_CTX for variables instead of · c86f2054
      Geoff Thorpe 提交于
      locally initialising their own.
      
      NB: I've removed the "BN_clear_free()" loops for the exit-paths in some of
      these functions, and that may be a major part of the performance
      improvements we're seeing. The "free" part can be removed because we're
      using BN_CTX. The "clear" part OTOH can be removed because BN_CTX
      destruction automatically performs this task, so performing it inside
      functions that may be called repeatedly is wasteful. This is currently safe
      within openssl due to the fact that BN_CTX objects are never created for
      longer than a single high-level operation. However, that is only because
      there's currently no mechanism in openssl for thread-local storage. Beyond
      that, this might be an issue for applications using the bignum API directly
      and caching their own BN_CTX objects. The solution is to introduce a flag
      to BN_CTX_start() that allows its variables to be automatically sanitised
      on release during BN_CTX_end(). This way any higher-level function (and
      perhaps the application) can specify this flag in its own
      BN_CTX_start()/BN_CTX_end() pair, and this will cause inner-loop functions
      specifying the flag to be ignored so that sanitisation is handled only once
      back out at the higher level. I will be implementing this in the near
      future.
      c86f2054
    • G
      Replace the BN_CTX implementation with my current work. I'm leaving the · 5c98b2ca
      Geoff Thorpe 提交于
      little TODO list in there as well as the debugging code (only enabled if
      BN_CTX_DEBUG is defined).
      
      I'd appreciate as much review and testing as can be spared for this. I'll
      commit some changes to other parts of the bignum code shortly to make
      better use of this implementation (no more fixed size limitations). Note
      also that under identical optimisations, I'm seeing a noticable speed
      increase over openssl-0.9.7 - so any feedback to confirm/deny this on other
      systems would also be most welcome.
      5c98b2ca
    • G
      Adds warnings about two curves and fixes the "seed" value for two other · 51487109
      Geoff Thorpe 提交于
      curves.
      
      Submitted by: Nils Larsch
      51487109
    • G
      ... and this should likewise fix up those RSA implementations that weren't · ea77fc33
      Geoff Thorpe 提交于
      already built and tested.
      ea77fc33
    • G
      By adding a BN_CTX parameter to the 'rsa_mod_exp' callback, private key · 46ef873f
      Geoff Thorpe 提交于
      operations no longer require two distinct BN_CTX structures. This may put
      more "strain" on the current BN_CTX implementation (which has a fixed limit
      to the number of variables it will hold), but so far this limit is not
      triggered by any of the tests pass and I will be changing BN_CTX in the
      near future to avoid this problem anyway.
      
      This also changes the default RSA implementation code to use the BN_CTX in
      favour of initialising some of its variables locally in each function.
      46ef873f
    • G
      Damn, I was a bit hasty with my fix and hadn't spotted the linker · 2d2a5ba3
      Geoff Thorpe 提交于
      dependency from asn1.
      2d2a5ba3