I've committed something similar to 0.9.8, see [1]. Please try a
recent snapshot.
[1] http://marc.theaimsgroup.com/?l=openssl-cvsm=111455472305028w=2
Cheers,
Nils
__
OpenSSL Project
Bodo Moeller via RT wrote:
Tom Wu via RT [EMAIL PROTECTED]:
I just tried benchmarking the snapshot code against my earlier patch on
an 8-way P3-700 server (Win2K AS). My patch gets ~100 RSA sign/s
(1024-bit) with a single thread and peaks at ~790 RSA sign/s with 8
threads. The 0402
PROTECTED]
Subject: Re: [openssl.org #555] RSA blinding MT patch
Bodo Moeller via RT wrote:
[EMAIL PROTECTED] - Mon Mar 31 17:14:12 2003]:
The latest snapshots have not been fixed, some more patience is
required ...
The next round of snapshots (20030402, to appear at
ftp
In message [EMAIL PROTECTED] on Thu, 3 Apr 2003 11:26:58 -0600, Bobco, Pete
[EMAIL PROTECTED] said:
Pete.Bobco In closing, does the OpenSSL Release Group have any idea
Pete.Bobco as to when OpenSSL 0.9.6j might be officially released?
I don't know, but I'm guessing someone is working on the
Tom Wu via RT [EMAIL PROTECTED]:
Bodo Moeller via RT wrote:
The next round of snapshots (20030402, to appear at
ftp://ftp.openssl.org/snapshot;type=d in about six hours)
should solve the multi-threading problems. Please test them when they
are available.
The good news is that the fix in
(Bodo Moeller) via RT wrote:
Tom Wu via RT [EMAIL PROTECTED]:
In the case where the blinding struct is owned by
a different thread from the one doing an RSA op, the code has to do a
modexp and a mod inverse, as opposed to the two squarings that the
update normally
Tom Wu via RT [EMAIL PROTECTED]:
(Bodo Moeller) via RT wrote:
Tom Wu via RT [EMAIL PROTECTED]:
Is there any established wisdom on the security implications of
refreshing the blinding factor? Assuming that the initial blinding
value had sufficient entropy and was unknown to an attacker,
[EMAIL PROTECTED] - Mon Mar 31 17:14:12 2003]:
The latest snapshots have not been fixed, some more patience is
required ...
The next round of snapshots (20030402, to appear at
ftp://ftp.openssl.org/snapshot;type=d in about six hours)
should solve the multi-threading problems. Please test
Bodo Moeller via RT wrote:
[EMAIL PROTECTED] - Mon Mar 31 17:14:12 2003]:
The latest snapshots have not been fixed, some more patience is
required ...
The next round of snapshots (20030402, to appear at
ftp://ftp.openssl.org/snapshot;type=d in about six hours)
should solve the
Could you please download the latest 0.9.6 snapshot and check that it works for you?
As far as I understand, the MT issue has been adressed, but solved in a different
manner.
[EMAIL PROTECTED] - Fri Mar 28 08:22:16 2003]:
This patch fixes the multithreading issues I was having when an RSA
On Mon, Mar 31, 2003 at 03:01:10PM +0200, Richard Levitte via RT wrote:
Could you please download the latest 0.9.6 snapshot and check that
it works for you? As far as I understand, the MT issue has been
adressed, but solved in a different manner.
The latest snapshots have not been fixed,
Hi!
This patch fixes the multithreading issues I was having when an RSA
struct was being used by multiple threads simultaneously with blinding
enabled.
It adds _r versions of the convert/invert functions to save the
unblinding value, and does the update in the convert step. rsa_eay.c
This patch fixes the multithreading issues I was having when an RSA
struct was being used by multiple threads simultaneously with blinding
enabled.
It adds _r versions of the convert/invert functions to save the
unblinding value, and does the update in the convert step. rsa_eay.c
uses the
13 matches
Mail list logo