1. 03 11月, 2004 1 次提交
  2. 19 9月, 2004 1 次提交
  3. 18 5月, 2004 2 次提交
  4. 27 4月, 2004 1 次提交
  5. 26 4月, 2004 2 次提交
  6. 20 4月, 2004 2 次提交
    • G
      make update · c57bc2dc
      Geoff Thorpe 提交于
      c57bc2dc
    • G
      Reduce header interdependencies, initially in engine.h (the rest of the · 3a87a9b9
      Geoff Thorpe 提交于
      changes are the fallout). As this could break source code that doesn't
      directly include headers for interfaces it uses, changes to recursive
      includes are covered by the OPENSSL_NO_DEPRECATED symbol. It's better to
      define this when building and using openssl, and then adapt code where
      necessary - this is how to stay current. However the mechanism exists for
      the lethargic.
      3a87a9b9
  7. 25 3月, 2004 1 次提交
    • G
      By adding a BN_CTX parameter to the 'rsa_mod_exp' callback, private key · 46ef873f
      Geoff Thorpe 提交于
      operations no longer require two distinct BN_CTX structures. This may put
      more "strain" on the current BN_CTX implementation (which has a fixed limit
      to the number of variables it will hold), but so far this limit is not
      triggered by any of the tests pass and I will be changing BN_CTX in the
      near future to avoid this problem anyway.
      
      This also changes the default RSA implementation code to use the BN_CTX in
      favour of initialising some of its variables locally in each function.
      46ef873f
  8. 16 3月, 2004 2 次提交
  9. 27 12月, 2003 1 次提交
  10. 28 11月, 2003 1 次提交
  11. 30 10月, 2003 1 次提交
    • G
      A general spring-cleaning (in autumn) to fix up signed/unsigned warnings. · 27545970
      Geoff Thorpe 提交于
      I have tried to convert 'len' type variable declarations to unsigned as a
      means to address these warnings when appropriate, but when in doubt I have
      used casts in the comparisons instead. The better solution (that would get
      us all lynched by API users) would be to go through and convert all the
      function prototypes and structure definitions to use unsigned variables
      except when signed is necessary. The proliferation of (signed) "int" for
      strictly non-negative uses is unfortunate.
      27545970
  12. 29 10月, 2003 1 次提交
  13. 07 5月, 2003 1 次提交
  14. 05 5月, 2003 1 次提交
  15. 01 5月, 2003 1 次提交
  16. 16 4月, 2003 1 次提交
  17. 15 4月, 2003 1 次提交
  18. 11 4月, 2003 1 次提交
  19. 08 4月, 2003 4 次提交
  20. 02 4月, 2003 1 次提交
  21. 21 3月, 2003 1 次提交
  22. 15 2月, 2003 2 次提交
    • G
      We cache a montgomery form for 'n' if the PUBLIC flag is set, not PRIVATE. · b12753df
      Geoff Thorpe 提交于
      Also, I've added handling for other mod_exp calls that were not using any
      cached montgomery forms. These cases matter only for special RSA keys (eg.
      ones that are missing information) so are unlikely to be used in normal
      circumstances.
      b12753df
    • G
      David Brumley <dbrumley@stanford.edu> noted and corrected a case in the · 79221bc2
      Geoff Thorpe 提交于
      verification step of CRT private key operations in the RSA code -
      previously no montgomery form was checked or used for 'n', and so it would
      be generated on the fly each time. As a result, private key operations are
      now a percent or two faster.
      
      Rather than adding this as another repetition of the nearly-identical
      montgomery "check for first-use" initialisation code blocks, I've taken
      this chance to create a helper function and macro-wrapper to replace them.
      
      PR: 475
      79221bc2
  23. 31 1月, 2003 2 次提交
  24. 07 1月, 2003 1 次提交
  25. 29 12月, 2002 1 次提交
  26. 09 12月, 2002 2 次提交
    • R
      make update · 0edad88a
      Richard Levitte 提交于
      0edad88a
    • G
      Nils Larsch submitted; · e1898724
      Geoff Thorpe 提交于
        - a patch to fix a memory leak in rsa_gen.c
        - a note about compiler warnings with unions
        - a note about improving structure element names
      
      This applies his patch and implements a solution to the notes.
      e1898724
  27. 08 12月, 2002 1 次提交
    • G
      This is a first-cut at improving the callback mechanisms used in · e9224c71
      Geoff Thorpe 提交于
      key-generation and prime-checking functions. Rather than explicitly passing
      callback functions and caller-defined context data for the callbacks, a new
      structure BN_GENCB is defined that encapsulates this; a pointer to the
      structure is passed to all such functions instead.
      
      This wrapper structure allows the encapsulation of "old" and "new" style
      callbacks - "new" callbacks return a boolean result on the understanding
      that returning FALSE should terminate keygen/primality processing.  The
      BN_GENCB abstraction will allow future callback modifications without
      needing to break binary compatibility nor change the API function
      prototypes. The new API functions have been given names ending in "_ex" and
      the old functions are implemented as wrappers to the new ones.  The
      OPENSSL_NO_DEPRECATED symbol has been introduced so that, if defined,
      declaration of the older functions will be skipped. NB: Some
      openssl-internal code will stick with the older callbacks for now, so
      appropriate "#undef" logic will be put in place - this is in case the user
      is *building* openssl (rather than *including* its headers) with this
      symbol defined.
      
      There is another change in the new _ex functions; the key-generation
      functions do not return key structures but operate on structures passed by
      the caller, the return value is a boolean. This will allow for a smoother
      transition to having key-generation as "virtual function" in the various
      ***_METHOD tables.
      e9224c71
  28. 28 11月, 2002 1 次提交
  29. 26 11月, 2002 1 次提交
  30. 04 11月, 2002 1 次提交