An error occurred fetching the project authors.
  1. 11 Oct, 2012 1 commit
    • Adam Langley's avatar
      crypto/rsa: fix decryption benchmark. · 3acce59b
      Adam Langley authored
      I was an idiot and was thinking that a small base didn't matter
      because the exponentiation would quickly make the number the same size
      as the modulus. But, of course, the small base continues to make
      multiplications unrealistically cheap throughout the computation.
      
      R=golang-dev, r
      CC=golang-dev
      https://golang.org/cl/6649048
      3acce59b
  2. 04 Apr, 2012 1 commit
    • Adam Langley's avatar
      crypto/rsa: only enforce that de ≡ 1 mod |(ℤ/nℤ)*| in order to load private... · 22690e66
      Adam Langley authored
      crypto/rsa: only enforce that de ≡ 1 mod |(ℤ/nℤ)*| in order to load private keys generated by GnuTLS.
      
      Previously we checked that de ≡ 1 mod φ(n). Since φ(n) is a multiple
      of |(ℤ/nℤ)*|, this encompassed the new check, but it was too strict as
      keys generated by GnuTLS would be rejected when gcd(p-1,q-1)≠1.
      
      (Also updated the error strings in crypto/rsa to contain the package name, which some were missing.)
      
      R=golang-dev, r
      CC=golang-dev
      https://golang.org/cl/5867043
      22690e66
  3. 08 Nov, 2011 1 commit
  4. 22 Apr, 2011 1 commit
    • Adam Langley's avatar
      crypto/rsa: support > 3 primes. · 555685e2
      Adam Langley authored
      With full multi-prime support we can support version 1 PKCS#1 private
      keys. This means exporting all the members of rsa.PrivateKey, thus
      making the API a little messy. However there has already been another
      request to export this so it seems to be something that's needed.
      
      Over time, rsa.GenerateMultiPrimeKey will replace rsa.GenerateKey, but
      I need to work on the prime balance first because we're no longer
      generating primes which are a multiples of 8 bits.
      
      Fixes #987.
      
      R=rsc
      CC=golang-dev
      https://golang.org/cl/4378046
      555685e2
  5. 06 Apr, 2011 2 commits
  6. 05 Apr, 2011 1 commit
  7. 25 Mar, 2011 1 commit
  8. 18 Feb, 2011 1 commit
  9. 22 Oct, 2010 1 commit
  10. 12 Jul, 2010 1 commit
  11. 08 Mar, 2010 1 commit
    • Adam Langley's avatar
      crypto/rsa: don't use safe primes. · df53544f
      Adam Langley authored
      Previously we would require safe primes for our RSA key generation.
      Since this took rather a long time, this removes the requirement that
      the primes be safe.
      
      OpenSSL doesn't use safe primes for RSA key generation either
      (openssl-0.9.8l/crypto/rsa/rsa_gen.c:122)
      
      Fixes #649.
      
      R=rsc
      CC=golang-dev
      https://golang.org/cl/253041
      df53544f
  12. 15 Dec, 2009 1 commit
    • Robert Griesemer's avatar
      1) Change default gofmt default settings for · 5a1d3323
      Robert Griesemer authored
                        parsing and printing to new syntax.
      
                        Use -oldparser to parse the old syntax,
                        use -oldprinter to print the old syntax.
      
                     2) Change default gofmt formatting settings
                        to use tabs for indentation only and to use
                        spaces for alignment. This will make the code
                        alignment insensitive to an editor's tabwidth.
      
                        Use -spaces=false to use tabs for alignment.
      
                     3) Manually changed src/exp/parser/parser_test.go
                        so that it doesn't try to parse the parser's
                        source files using the old syntax (they have
                        new syntax now).
      
                     4) gofmt -w src misc test/bench
      
      	       1st set of files.
      
      R=rsc
      CC=agl, golang-dev, iant, ken2, r
      https://golang.org/cl/180047
      5a1d3323
  13. 15 Nov, 2009 1 commit
    • Adam Langley's avatar
      crypto/rsa: handle the case of non-coprime blinds. · ad05d291
      Adam Langley authored
      We are dealing with the multiplicative group ℤ/pqℤ. Multiples of
      either p or q are not members of the group since they cannot have an
      inverse. (Such numbers are 0 in the subgroup ℤ/pℤ.)
      
      With p and q of typical size (> 512 bits), the probability of a random
      blind [1..pq-1] being a multiple of p or q is negligible. However, in
      the unit tests, much smaller sizes are used and the event could occur.
      
      This change checks the result of the ext GCD and deals with this case.
      
      It also increases the size of p and q in the unit test as a large
      number of the keys selected were p, q = 227,169.
      
      R=rsc
      CC=golang-dev
      https://golang.org/cl/154141
      ad05d291
  14. 11 Nov, 2009 3 commits
  15. 09 Nov, 2009 1 commit
  16. 06 Nov, 2009 1 commit
  17. 02 Nov, 2009 1 commit
  18. 30 Oct, 2009 1 commit
  19. 22 Oct, 2009 1 commit
  20. 19 Oct, 2009 1 commit