- 04 10月, 2005 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 16 5月, 2005 1 次提交
-
-
由 Bodo Möller 提交于
timing attacks. BN_FLG_EXP_CONSTTIME requests this algorithm, and this done by default for RSA/DSA/DH private key computations unless RSA_FLAG_NO_EXP_CONSTTIME/DSA_FLAG_NO_EXP_CONSTTIME/ DH_FLAG_NO_EXP_CONSTTIME is set. Submitted by: Matthew D Wood Reviewed by: Bodo Moeller
-
- 28 11月, 2003 1 次提交
-
-
由 Richard Levitte 提交于
PR: 780 Submitted by: Verdon Walker <VWalker@novell.com> Reviewed by: Richard Levitte
-
- 23 2月, 2003 1 次提交
-
-
由 Ulf Möller 提交于
-
- 29 11月, 2002 1 次提交
-
-
由 Richard Levitte 提交于
always give the expected result on some platforms.
-
- 20 2月, 2001 1 次提交
-
-
由 Richard Levitte 提交于
missed any. This compiles and runs on Linux, and external applications have no problems with it. The definite test will be to build this on VMS.
-
- 06 2月, 2000 1 次提交
-
-
由 Bodo Möller 提交于
-
- 15 1月, 2000 1 次提交
-
-
由 Bodo Möller 提交于
because otherwise BN_rand will fail unless DEVRANDOM works, which causes the programs to dump core because they don't check the return value of BN_rand (and if they did, we still couldn't test anything). - add comment to some files that appear not to be used at all.
-
- 26 10月, 1999 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Lennart Bång, Bodo Möller
-
- 30 4月, 1999 1 次提交
-
-
由 Ulf Möller 提交于
-
- 24 4月, 1999 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Reviewed by: PR:
-
- 20 4月, 1999 1 次提交
-
-
由 Ulf Möller 提交于
-
- 21 12月, 1998 3 次提交
-
-
由 Ralf S. Engelschall 提交于
-
由 Ralf S. Engelschall 提交于
-
由 Ralf S. Engelschall 提交于
-