mirror of
https://github.com/openssl/openssl.git
synced 2024-11-27 05:21:51 +08:00
bn: remove TODOs
Reviewed-by: Tim Hudson <tjh@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15539)
This commit is contained in:
parent
79cabd7e27
commit
26b3e44a66
@ -11,19 +11,6 @@
|
|||||||
#include "internal/cryptlib.h"
|
#include "internal/cryptlib.h"
|
||||||
#include "bn_local.h"
|
#include "bn_local.h"
|
||||||
|
|
||||||
/*-
|
|
||||||
* TODO list
|
|
||||||
*
|
|
||||||
* 1. Check a bunch of "(words+1)" type hacks in various bignum functions and
|
|
||||||
* check they can be safely removed.
|
|
||||||
* - Check +1 and other ugliness in BN_from_montgomery()
|
|
||||||
*
|
|
||||||
* 2. Consider allowing a BN_new_ex() that, at least, lets you specify an
|
|
||||||
* appropriate 'block' size that will be honoured by bn_expand_internal() to
|
|
||||||
* prevent piddly little reallocations. OTOH, profiling bignum expansions in
|
|
||||||
* BN_CTX doesn't show this to be a big issue.
|
|
||||||
*/
|
|
||||||
|
|
||||||
/* How many bignums are in each "pool item"; */
|
/* How many bignums are in each "pool item"; */
|
||||||
#define BN_CTX_POOL_SIZE 16
|
#define BN_CTX_POOL_SIZE 16
|
||||||
/* The stack frame info is resizing, set a first-time expansion size; */
|
/* The stack frame info is resizing, set a first-time expansion size; */
|
||||||
|
@ -483,7 +483,6 @@ static int probable_prime(BIGNUM *rnd, int bits, int safe, prime_t *mods,
|
|||||||
BN_ULONG maxdelta = BN_MASK2 - primes[trial_divisions - 1];
|
BN_ULONG maxdelta = BN_MASK2 - primes[trial_divisions - 1];
|
||||||
|
|
||||||
again:
|
again:
|
||||||
/* TODO: Not all primes are private */
|
|
||||||
if (!BN_priv_rand_ex(rnd, bits, BN_RAND_TOP_TWO, BN_RAND_BOTTOM_ODD, 0,
|
if (!BN_priv_rand_ex(rnd, bits, BN_RAND_TOP_TWO, BN_RAND_BOTTOM_ODD, 0,
|
||||||
ctx))
|
ctx))
|
||||||
return 0;
|
return 0;
|
||||||
|
Loading…
Reference in New Issue
Block a user