- 01 12月, 2000 2 次提交
-
-
由 Richard Levitte 提交于
-
由 Bodo Möller 提交于
Submitted by: Lenka Fibikova
-
- 30 11月, 2000 30 次提交
-
-
由 Richard Levitte 提交于
types of questions. Hopefully, that'll make them easier to spot, and specially, easier to refer to.
-
由 Bodo Möller 提交于
-
由 Richard Levitte 提交于
generated errors. Therefore, print whatever error there may be...
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
free that, since it's shared by all SSL_CTX's, present and future.
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
systems where such an operation is supported.
-
由 Bodo Möller 提交于
-
由 Richard Levitte 提交于
Windows. Really, this should probably be done on Unix as well, but that will be a later story...
-
由 Bodo Möller 提交于
Fix BN_mod_exp_simple for a==0 (mod m). Skip useless round in BN_mod_sqrt (1 is always a square, no need to test BN_kronecker for it).
-
由 Geoff Thorpe 提交于
tunnel to not pro-actively close down when failing an SSL handshake. * Change the cert-chain callback - originally this was the same one used in s_client and s_server but the output's as ugly as sin, so I've prettied tunala's copy output up a bit (and made the output level configurable). * Remove the superfluous "errors" from the SSL state callback - these are just non-blocking side-effects.
-
由 Bodo Möller 提交于
exists in bn_sqrt.c now
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
test_bn still fails in the BN_sqrt test because small primes appear to turn into zero for no obvious reason, leading to "div by zero" errors.
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
由 Ulf Möller 提交于
are not reduced modulo m, the outputs won't be either).
-
由 Geoff Thorpe 提交于
similarly modified now on DH and DSA.
-
由 Bodo Möller 提交于
-
由 Geoff Thorpe 提交于
the initialisation and cleanup of "ex_data" elements to before an init() handler and after a finish() handler respectively.
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
(we need the two's complement of BN_lsw then).
-
由 Geoff Thorpe 提交于
* A little bit of code-cleanup * Reformat the usage string (not so wide) * Allow adding an alternative (usually DSA) cert/key pair (a la s_server) * Allow control over cert-chain verify depth
-
由 Bodo Möller 提交于
so we have to reduce the random numbers used in test_mont. Before this change, test_mont failed in [debug-]solaris-sparcv9-gcc configurations ("Montgomery multiplication test failed!" because the multiplication result obtained with Montgomery multiplication differed from the result obtained by BN_mod_mul). Substituing the old version of bn_gcd.c (BN_mod_inverse) did not avoid the problem. The strange thing is that it I did not observe any problems when using debug-solaris-sparcv8-gcc and solaris-sparcv9-cc, as well as when compiling OpenSSL 0.9.6 in the solaric-sparcv9-gcc configuration on the same system.
-
由 Lutz Jänicke 提交于
-
由 Ulf Möller 提交于
-
由 Bodo Möller 提交于
-
由 Lutz Jänicke 提交于
For the server side this was already done one year ago :-(
-
- 29 11月, 2000 8 次提交
-
-
由 Bodo Möller 提交于
Improve readability of bn_shift.c. Add comment in bn_lib.c (why zero data between top and max?) Change bntest.c output for BN_kronecker test
-
由 Bodo Möller 提交于
I'm still investigating what caused the segementation fault (maybe "make clean; make" will cure it ...). But BN_bin2bn should always reset ret->neg.
-
由 Bodo Möller 提交于
This caused a segmentation fault in calls to malloc, so I cleaned up bn_lib.c a little so that it is easier to see what is going on. The bug turned out to be an off-by-one error in BN_bin2bn.
-
由 Bodo Möller 提交于
Modify "CHANGES" entry for BN_mod_inverse (it's not just avoiding BN_div that increases performance, avoiding BN_mul also helps)
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
Get the BN_mod_exp_mont bugfix (for handling negative inputs) correct this time.
-
由 Richard Levitte 提交于
bn_add_words(), not bn_sub_words()...
-