1. 29 11月, 2002 1 次提交
  2. 28 10月, 2002 1 次提交
  3. 04 8月, 2002 1 次提交
  4. 03 8月, 2002 1 次提交
  5. 25 7月, 2002 1 次提交
    • B
      Move zeroing from bn_expand_internal() to bn_expand2() so that it · 12593e6f
      Bodo Möller 提交于
      happens reliably, even if the BIGNUM is already sufficiently large.
      
      [Note that the bn_expand()/bn_wexpand() macros call bn_expand2() only
      if the BIGNUM actually has to grow, so this change does not add any
      new overhead as currently bn_expand2() is never called directly.]
      12593e6f
  6. 08 3月, 2001 1 次提交
  7. 04 12月, 2000 1 次提交
  8. 03 12月, 2000 5 次提交
  9. 02 12月, 2000 1 次提交
  10. 29 11月, 2000 3 次提交
  11. 27 11月, 2000 1 次提交
  12. 17 11月, 2000 1 次提交
  13. 07 11月, 2000 3 次提交
  14. 04 9月, 2000 1 次提交
  15. 04 8月, 2000 1 次提交
  16. 02 6月, 2000 1 次提交
    • R
      There have been a number of complaints from a number of sources that names · 26a3a48d
      Richard Levitte 提交于
      like Malloc, Realloc and especially Free conflict with already existing names
      on some operating systems or other packages.  That is reason enough to change
      the names of the OpenSSL memory allocation macros to something that has a
      better chance of being unique, like prepending them with OPENSSL_.
      
      This change includes all the name changes needed throughout all C files.
      26a3a48d
  17. 27 2月, 2000 1 次提交
  18. 05 2月, 2000 1 次提交
  19. 04 2月, 2000 1 次提交
  20. 24 1月, 2000 1 次提交
  21. 31 7月, 1999 1 次提交
  22. 21 6月, 1999 1 次提交
  23. 05 6月, 1999 1 次提交
  24. 20 5月, 1999 1 次提交
  25. 15 5月, 1999 1 次提交
  26. 13 5月, 1999 1 次提交
    • U
      VMS support. · 7d7d2cbc
      Ulf Möller 提交于
      Submitted by: Richard Levitte <richard@levitte.org>
      7d7d2cbc
  27. 23 4月, 1999 1 次提交
  28. 20 4月, 1999 1 次提交
  29. 18 4月, 1999 1 次提交
  30. 16 4月, 1999 1 次提交
    • D
      Fix a horrible BN bug in bn_expand2 which caused BN_add_word() et al to fail · 953937bd
      Dr. Stephen Henson 提交于
      when they cause the destination to expand.
      
      To see how evil this is try this:
      
      #include <pem.h>
      main()
      {
      	BIGNUM *bn = NULL;
              int i;
      	bn = BN_new();
      	BN_hex2bn(&bn, "FFFFFFFF");
      	BN_add_word(bn, 1);
      	printf("Value %s\n", BN_bn2hex(bn));
      }
      
      This would typically fail before the patch.
      
      It also screws up if you comment out the BN_hex2bn line above or in any
      situation where BN_add_word() causes the number of BN_ULONGs in the result
      to change (try doubling the number of FFs).
      953937bd
  31. 22 3月, 1999 1 次提交
  32. 08 1月, 1999 1 次提交