diff options
author | Felix Laurie von Massenbach <felix@erbridge.co.uk> | 2014-05-27 12:55:20 +0100 |
---|---|---|
committer | Ben Laurie <ben@links.org> | 2014-06-01 15:31:26 +0100 |
commit | 982c42cb20f6a6797ea0ce5c5a8c1a040b170d65 (patch) | |
tree | dca3621096bc190f754ae8e1621f1d92d7c0e9cc /crypto/bn/bn_lcl.h | |
parent | 7e965dcc3812ac6ec4d1413c5ea3224be6486c8f (diff) | |
download | openssl-982c42cb20f6a6797ea0ce5c5a8c1a040b170d65.tar.gz |
Try skipping over the adding and just picking a new random number.
Generates a number coprime to 2, 3, 5, 7, 11.
Speed:
Trial div (add) : trial div (retry) : coprime
1 : 0.42 : 0.84
Diffstat (limited to 'crypto/bn/bn_lcl.h')
-rw-r--r-- | crypto/bn/bn_lcl.h | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/crypto/bn/bn_lcl.h b/crypto/bn/bn_lcl.h index f0cfaeaaba..3de1d4cde1 100644 --- a/crypto/bn/bn_lcl.h +++ b/crypto/bn/bn_lcl.h @@ -536,8 +536,8 @@ BIGNUM *int_bn_mod_inverse(BIGNUM *in, int bn_probable_prime_dh(BIGNUM *rnd, int bits, const BIGNUM *add, const BIGNUM *rem, BN_CTX *ctx); -int bn_probable_prime_dh_coprime_safe(BIGNUM *rnd, int bits, - const BIGNUM *add, const BIGNUM *rem, BN_CTX *ctx); +int bn_probable_prime_dh_retry(BIGNUM *rnd, int bits, BN_CTX *ctx); +int bn_probable_prime_dh_coprime(BIGNUM *rnd, int bits, BN_CTX *ctx); #ifdef __cplusplus } |