Thanks, OK I got the rest of the way through the tangled mess. The
question is there someone out there that can skip trace through the
subroutines that can put together a tight code set on how this works?
One command walk through to start from the beginning to the end which is
the key feedback.
> From: owner-openssl-us...@openssl.org On Behalf Of dave
> Sent: Monday, August 04, 2014 15:50
> I have it that the elliptic multiply is not standard. So I have been
> skip tracing though the code.
> It starts with ec_key.c, with EC_KEY_generate_key. This grabs the
> group or or the particula
I have it that the elliptic multiply is not standard. So I have been
skip tracing though the code.
It starts with ec_key.c, with EC_KEY_generate_key. This grabs the
group or or the particular curves prime field size. It then uses this
as the range for bn_rand_range. This is in bn_rand.c. I
> From: owner-openssl-us...@openssl.org On Behalf Of dave paxton
> Sent: Thursday, July 31, 2014 20:12
> In looking at this today I found what the new ec key is doing. It
> does a BN_rand_range operation. That does have the rand.h include. It
> looks like it is using from the random area pseu