diff options
author | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2011-12-12 02:18:59 +0100 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2011-12-12 02:56:01 +0100 |
commit | bd617810e4338294aa0c6b74da81274bae045f10 (patch) | |
tree | d938f496564dd1e2f20dc426a9128b74e4c9d8e9 /lib/auth | |
parent | 09ec28b2d701d7b27a1a2171988b98ff08690257 (diff) | |
download | gnutls-bd617810e4338294aa0c6b74da81274bae045f10.tar.gz |
Optimizations in DH parameter generation.
The larger prime is find first and the big loop needs to
find a smaller prime, increasing performance.
The _gnutls_rnd() function is now inline and GNUTLS_RND_NONCE doesn't update random generator state.
Diffstat (limited to 'lib/auth')
-rw-r--r-- | lib/auth/psk_passwd.c | 2 | ||||
-rw-r--r-- | lib/auth/rsa.c | 4 | ||||
-rw-r--r-- | lib/auth/rsa_export.c | 2 | ||||
-rw-r--r-- | lib/auth/srp_passwd.c | 6 |
4 files changed, 7 insertions, 7 deletions
diff --git a/lib/auth/psk_passwd.c b/lib/auth/psk_passwd.c index 7a02c6c907..195454dac6 100644 --- a/lib/auth/psk_passwd.c +++ b/lib/auth/psk_passwd.c @@ -107,7 +107,7 @@ _randomize_psk (gnutls_datum_t * psk) psk->size = 16; - ret = gnutls_rnd (GNUTLS_RND_NONCE, (char *) psk->data, 16); + ret = _gnutls_rnd (GNUTLS_RND_NONCE, (char *) psk->data, 16); if (ret < 0) { gnutls_assert (); diff --git a/lib/auth/rsa.c b/lib/auth/rsa.c index a9a88aa872..030ed35dde 100644 --- a/lib/auth/rsa.c +++ b/lib/auth/rsa.c @@ -213,7 +213,7 @@ proc_rsa_client_kx (gnutls_session_t session, opaque * data, /* we do not need strong random numbers here. */ - ret = gnutls_rnd (GNUTLS_RND_NONCE, session->key->key.data, + ret = _gnutls_rnd (GNUTLS_RND_NONCE, session->key->key.data, session->key->key.size); if (ret < 0) { @@ -268,7 +268,7 @@ _gnutls_gen_rsa_client_kx (gnutls_session_t session, gnutls_buffer_st* data) return GNUTLS_E_MEMORY_ERROR; } - ret = gnutls_rnd (GNUTLS_RND_RANDOM, session->key->key.data, + ret = _gnutls_rnd (GNUTLS_RND_RANDOM, session->key->key.data, session->key->key.size); if (ret < 0) { diff --git a/lib/auth/rsa_export.c b/lib/auth/rsa_export.c index 28ef8c67ca..959f72c672 100644 --- a/lib/auth/rsa_export.c +++ b/lib/auth/rsa_export.c @@ -204,7 +204,7 @@ proc_rsa_export_client_kx (gnutls_session_t session, opaque * data, /* we do not need strong random numbers here. */ - ret = gnutls_rnd (GNUTLS_RND_NONCE, session->key->key.data, + ret = _gnutls_rnd (GNUTLS_RND_NONCE, session->key->key.data, session->key->key.size); if (ret < 0) { diff --git a/lib/auth/srp_passwd.c b/lib/auth/srp_passwd.c index 7ced10179f..19972201c6 100644 --- a/lib/auth/srp_passwd.c +++ b/lib/auth/srp_passwd.c @@ -404,7 +404,7 @@ _randomize_pwd_entry (SRP_PWD_ENTRY * entry) return GNUTLS_E_INTERNAL_ERROR; } - ret = gnutls_rnd (GNUTLS_RND_NONCE, &rnd, 1); + ret = _gnutls_rnd (GNUTLS_RND_NONCE, &rnd, 1); if (ret < 0) { gnutls_assert (); @@ -421,7 +421,7 @@ _randomize_pwd_entry (SRP_PWD_ENTRY * entry) return GNUTLS_E_MEMORY_ERROR; } - ret = gnutls_rnd (GNUTLS_RND_RANDOM, entry->v.data, 20); + ret = _gnutls_rnd (GNUTLS_RND_RANDOM, entry->v.data, 20); if (ret < 0) { gnutls_assert (); @@ -435,7 +435,7 @@ _randomize_pwd_entry (SRP_PWD_ENTRY * entry) return GNUTLS_E_MEMORY_ERROR; } - ret = gnutls_rnd (GNUTLS_RND_NONCE, entry->salt.data, entry->salt.size); + ret = _gnutls_rnd (GNUTLS_RND_NONCE, entry->salt.data, entry->salt.size); if (ret < 0) { gnutls_assert (); |