Richard Levitte - VMS Whacker wrote:
> 
> From: [EMAIL PROTECTED]
> 
> levitte>   Modified:    crypto/engine Tag: BRANCH_engine hw_ncipher.c
> levitte>   Log:
> levitte>   Geoff inspired me to nullify some pointers if initialisation went
> levitte>   wrong.  Additionally, just give a new value to hndidx once.
> 
> Steve, the hndidx hack is actually your code more or less taken
> straight as is.  I understand most of it, but feel a little unsure
> about having hndidx being created once and once only.  Can you verify
> that this was the intended way of use?
> 

I havn't had a chance to look at the ENGINE code in any detail yet
but...

hndidx is to hold a new index for the additional data thats being used
in the RSA structure. As such it should be called once in a single
threaded context. This is what's normally done with this kind of thing.
Check the various EX_DATA manpages for more info on what its does.

Also if I recall hndidx is only used if you access a secure hardware
key, it never gets used for pure acceleration. So unless you plan to
export the nFast_loadRSAkey() function it wont be much use.

Secure key handling is probably best written to use the database stuff:
which I'm currently working on. It should then be more transparent.

Steve.
-- 
Dr Stephen N. Henson.   http://www.drh-consultancy.demon.co.uk/
Personal Email: [EMAIL PROTECTED] 
Senior crypto engineer, Celo Communications: http://www.celocom.com/
Core developer of the   OpenSSL project: http://www.openssl.org/
Business Email: [EMAIL PROTECTED] PGP key: via homepage.

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to