Age | Commit message (Collapse) | Author |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Submitted by: David Miller, Andy Polyakov
|
|
|
|
|
|
|
|
Submitted by: David Miller
|
|
Submitted by: David Miller
|
|
|
|
|
|
|
|
|
|
|
|
PR: 2838
|
|
tested, because kernel is not in shape to handle it *yet*. The code is
committed mostly to stimulate the kernel development.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Also, use the common Configure mechanism for enabling/disabling the 64-bit ECC code.
|
|
|
|
|
|
|
|
|
|
|
|
x86_64 platform. It targets specifically RSA1024 sign (using ideas
from http://eprint.iacr.org/2011/239) and adds more than 10% on most
platforms. Overall performance improvement relative to 1.0.0 is ~40%
in average, with best result of 54% on Westmere. Incidentally ~40%
is average improvement even for longer key lengths.
|
|
|
|
|
|
|
|
|
|
details and performance data).
|
|
|
|
|
|
This meant alarger renumbering in util/libeay.num due to symbols
appearing in 1.0.0-stable and 1.0.1-stable. However, since there's
been no release on this branch yet, it should be harmless.
|
|
|
|
|
|
|
|
|
|
update commentary...
|
|
|
|
|