openssl/crypto/rsa
Geoff Thorpe 8a85c341fe The problem of rsa key-generation getting stuck in a loop for (pointlessly)
small key sizes seems to result from the code continually regenerating the
same prime value once the range is small enough. From my tests, this change
fixes the problem by setting an escape velocity of 3 repeats for the second
of the two primes.

PR: 874
2004-04-26 15:38:44 +00:00
..
.cvsignore
Makefile.ssl make update 2004-04-19 18:33:41 +00:00
rsa_asn1.c
rsa_chk.c This is a first-cut at improving the callback mechanisms used in 2002-12-08 05:24:31 +00:00
rsa_depr.c Allow RSA key-generation to specify an arbitrary public exponent. Jelte 2004-04-26 15:31:35 +00:00
rsa_eay.c By adding a BN_CTX parameter to the 'rsa_mod_exp' callback, private key 2004-03-25 02:52:04 +00:00
rsa_err.c
rsa_gen.c The problem of rsa key-generation getting stuck in a loop for (pointlessly) 2004-04-26 15:38:44 +00:00
rsa_lib.c Make sure that the last argument to RAND_add() is a float, or some 2004-03-15 22:37:08 +00:00
rsa_none.c
rsa_null.c This is the first step in allowing RSA_METHODs to implement their own key 2003-01-07 05:51:39 +00:00
rsa_oaep.c
rsa_pk1.c The logic in the main signing and verifying functions to check lengths was 2002-11-26 11:14:32 +00:00
rsa_saos.c Constify d2i, s2i, c2i and r2i functions and other associated 2004-03-15 23:15:26 +00:00
rsa_sign.c Constify d2i, s2i, c2i and r2i functions and other associated 2004-03-15 23:15:26 +00:00
rsa_ssl.c
rsa_test.c Netware-specific changes, 2003-11-28 13:10:58 +00:00
rsa.h Allow RSA key-generation to specify an arbitrary public exponent. Jelte 2004-04-26 15:31:35 +00:00