- 17 6月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Approved by: steve@openssl.org Check return values for NULL in case of malloc failure.
-
- 12 11月, 2008 1 次提交
-
-
由 Geoff Thorpe 提交于
knock-on work than expected - they've been extracted into a patch series that can be completed elsewhere, or in a different branch, before merging back to HEAD.
-
- 01 11月, 2008 1 次提交
-
-
由 Ben Laurie 提交于
-
- 28 3月, 2007 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Matthew D Wood Reviewed by: Bodo Moeller
-
- 16 5月, 2005 1 次提交
-
-
由 Bodo Möller 提交于
timing attacks. BN_FLG_EXP_CONSTTIME requests this algorithm, and this done by default for RSA/DSA/DH private key computations unless RSA_FLAG_NO_EXP_CONSTTIME/DSA_FLAG_NO_EXP_CONSTTIME/ DH_FLAG_NO_EXP_CONSTTIME is set. Submitted by: Matthew D Wood Reviewed by: Bodo Moeller
-
- 25 3月, 2004 1 次提交
-
-
由 Geoff Thorpe 提交于
locally initialising their own. NB: I've removed the "BN_clear_free()" loops for the exit-paths in some of these functions, and that may be a major part of the performance improvements we're seeing. The "free" part can be removed because we're using BN_CTX. The "clear" part OTOH can be removed because BN_CTX destruction automatically performs this task, so performing it inside functions that may be called repeatedly is wasteful. This is currently safe within openssl due to the fact that BN_CTX objects are never created for longer than a single high-level operation. However, that is only because there's currently no mechanism in openssl for thread-local storage. Beyond that, this might be an issue for applications using the bignum API directly and caching their own BN_CTX objects. The solution is to introduce a flag to BN_CTX_start() that allows its variables to be automatically sanitised on release during BN_CTX_end(). This way any higher-level function (and perhaps the application) can specify this flag in its own BN_CTX_start()/BN_CTX_end() pair, and this will cause inner-loop functions specifying the flag to be ignored so that sanitisation is handled only once back out at the higher level. I will be implementing this in the near future.
-
- 14 3月, 2004 1 次提交
-
-
由 Geoff Thorpe 提交于
Remove certain redundant BN_zero() initialisations, because BN_CTX_get(), BN_init(), [etc] already initialise to zero. Correct error checking in bn_sqr.c, and be less wishy-wash about how/why the result's 'top' value is set (note also, 'max' is always > 0 at this point).
-
- 02 12月, 2003 1 次提交
-
-
由 Geoff Thorpe 提交于
the same thing. Also, I have some stuff on the back-burner related to some BN_CTX notes from Peter Gutmann about his cryptlib hacks to the bignum code. The BN_CTX comments are there to remind me of some relevant points in the code.
-
- 05 11月, 2003 1 次提交
-
-
由 Geoff Thorpe 提交于
is itself experimental, and in addition may cause execution to break on existing openssl "bugs" that previously were harmless or at least invisible.
-
- 08 12月, 2000 1 次提交
-
-
由 Bodo Möller 提交于
One problem that looked like a problem in bn_recp.c at first turned out to be a BN_mul bug. An example is given in bn_recp.c; finding the bug responsible for this is left as an exercise.
-
- 30 11月, 2000 3 次提交
-
-
由 Bodo Möller 提交于
Fix BN_mod_exp_simple for a==0 (mod m). Skip useless round in BN_mod_sqrt (1 is always a square, no need to test BN_kronecker for it).
-
由 Bodo Möller 提交于
test_bn still fails in the BN_sqrt test because small primes appear to turn into zero for no obvious reason, leading to "div by zero" errors.
-
由 Bodo Möller 提交于
-
- 29 11月, 2000 1 次提交
-
-
由 Bodo Möller 提交于
Get the BN_mod_exp_mont bugfix (for handling negative inputs) correct this time.
-
- 28 11月, 2000 1 次提交
-
-
由 Bodo Möller 提交于
-
- 27 11月, 2000 1 次提交
-
-
由 Bodo Möller 提交于
"make update"
-
- 07 11月, 2000 1 次提交
-
-
由 Richard Levitte 提交于
two functions that did expansion on in parameters (BN_mul() and BN_sqr()). The problem was solved by making bn_dup_expand() which is a mix of bn_expand2() and BN_dup().
-
- 27 10月, 2000 1 次提交
-
-
由 Richard Levitte 提交于
At the same time, add VMS support for Rijndael.
-
- 23 6月, 2000 2 次提交
-
-
由 Bodo Möller 提交于
comment out in the previous commit
-
由 Bodo Möller 提交于
and for small 'a' also a couple of calls to BN_mod_mul_montgomery(r, r, r, ...).
-
- 13 6月, 2000 2 次提交
-
-
由 Bodo Möller 提交于
BN_mod_exp_atalla could be used.
-
由 Geoff Thorpe 提交于
BN_mod_exp. Call the regular atalla mod_exp operation instead.
-
- 09 6月, 2000 1 次提交
-
-
由 Bodo Möller 提交于
marginally faster BN_mod_exp for 1024 bit exponents.
-
- 08 6月, 2000 2 次提交
-
-
由 Bodo Möller 提交于
because we're only handling words anyway) in BN_mod_exp_mont_word making it a little faster for very small exponents, and adjust the performance gain estimate in CHANGES according to slightly more thorough measurements. (15% faster than BN_mod_exp_mont for "large" base, 20% faster than BN_mod_exp_mont for small base.)
-
由 Bodo Möller 提交于
-
- 17 2月, 2000 1 次提交
-
-
由 Ben Laurie 提交于
-
- 05 2月, 2000 1 次提交
-
-
由 Ulf Möller 提交于
temporary BIGNUMs. BN_CTX still uses a fixed number of BIGNUMs, but the BN_CTX implementation could now easily be changed.
-
- 05 6月, 1999 1 次提交
-
-
由 Ben Laurie 提交于
-
- 20 4月, 1999 1 次提交
-
-
由 Ulf Möller 提交于
-
- 28 1月, 1999 1 次提交
-
-
由 Mark J. Cox 提交于
but the BN code had some problems that would cause failures when doing certificate verification and some other functions. Submitted by: Eric A Young from a C2Net version of SSLeay Reviewed by: Mark J Cox PR:
-
- 21 12月, 1998 3 次提交
-
-
由 Ralf S. Engelschall 提交于
-
由 Ralf S. Engelschall 提交于
-
由 Ralf S. Engelschall 提交于
-