- 15 2月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Damien Miller <djm@mindrot.org> Approved by: steve@openssl.org Fix various typos.
-
- 13 8月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 19 6月, 2006 1 次提交
-
-
由 Bodo Möller 提交于
the BN library more generally useful. Submitted by: Douglas Stebila
-
- 18 3月, 2006 1 次提交
-
-
由 Nils Larsch 提交于
-
- 16 12月, 2005 1 次提交
-
-
http://cvs.openssl.org/chngview?cn=14690由 Andy Polyakov 提交于
keep disclaiming narrower than 32-bit support.
-
- 16 5月, 2005 1 次提交
-
-
由 Bodo Möller 提交于
timing attacks. BN_FLG_EXP_CONSTTIME requests this algorithm, and this done by default for RSA/DSA/DH private key computations unless RSA_FLAG_NO_EXP_CONSTTIME/DSA_FLAG_NO_EXP_CONSTTIME/ DH_FLAG_NO_EXP_CONSTTIME is set. Submitted by: Matthew D Wood Reviewed by: Bodo Moeller
-
- 22 7月, 2004 1 次提交
-
-
由 Andy Polyakov 提交于
SIXTY_FOUR_BIT_LONG) were failing to pass 'cd test; make test_bn'.
-
- 18 6月, 2004 1 次提交
-
-
由 Geoff Thorpe 提交于
the only function that uses it) because it would trip up an assertion in bn_div_words() when first invoked. This also adds BN_div_word() testing to bntest. Submitted by: Nils Larsch Reviewed by: Geoff Thorpe
-
- 29 10月, 2003 1 次提交
-
-
由 Geoff Thorpe 提交于
and links with OPENSSL_NO_DEPRECATED defined.
-
- 23 2月, 2003 1 次提交
-
-
由 Ulf Möller 提交于
-
- 08 12月, 2002 1 次提交
-
-
由 Geoff Thorpe 提交于
key-generation and prime-checking functions. Rather than explicitly passing callback functions and caller-defined context data for the callbacks, a new structure BN_GENCB is defined that encapsulates this; a pointer to the structure is passed to all such functions instead. This wrapper structure allows the encapsulation of "old" and "new" style callbacks - "new" callbacks return a boolean result on the understanding that returning FALSE should terminate keygen/primality processing. The BN_GENCB abstraction will allow future callback modifications without needing to break binary compatibility nor change the API function prototypes. The new API functions have been given names ending in "_ex" and the old functions are implemented as wrappers to the new ones. The OPENSSL_NO_DEPRECATED symbol has been introduced so that, if defined, declaration of the older functions will be skipped. NB: Some openssl-internal code will stick with the older callbacks for now, so appropriate "#undef" logic will be put in place - this is in case the user is *building* openssl (rather than *including* its headers) with this symbol defined. There is another change in the new _ex functions; the key-generation functions do not return key structures but operate on structures passed by the caller, the return value is a boolean. This will allow for a smoother transition to having key-generation as "virtual function" in the various ***_METHOD tables.
-
- 29 11月, 2002 1 次提交
-
-
由 Richard Levitte 提交于
always give the expected result on some platforms.
-
- 29 10月, 2002 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Sheueling Chang <Sheueling.Chang@Sun.COM>
-
- 02 8月, 2002 2 次提交
-
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
The 'OPENSSL_NO_SUN_DIV' default is still subject to change, so I didn't bother to finish the CHANGES entry yet. Submitted by: Douglas Stebila <douglas.stebila@sun.com>, Sheueling Chang <sheueling.chang@sun.com> (CHANGES entry by Bodo Moeller)
-
- 10 7月, 2002 1 次提交
-
-
由 Bodo Möller 提交于
-
- 08 3月, 2001 1 次提交
-
-
由 Bodo Möller 提交于
Incease the number of BIGNUMs in a BN_CTX.
-
- 22 2月, 2001 1 次提交
-
-
由 Richard Levitte 提交于
and make all files the depend on it include it without prefixing it with openssl/. This means that all Makefiles will have $(TOP) as one of the include directories.
-
- 20 2月, 2001 2 次提交
-
-
由 Richard Levitte 提交于
missed any. This compiles and runs on Linux, and external applications have no problems with it. The definite test will be to build this on VMS.
-
由 Richard Levitte 提交于
sure they are available in opensslconf.h, by giving them names starting with "OPENSSL_" to avoid conflicts with other packages and by making sure e_os2.h will cover all platform-specific cases together with opensslconf.h. I've checked fairly well that nothing breaks with this (apart from external software that will adapt if they have used something like NO_KRB5), but I can't guarantee it completely, so a review of this change would be a good thing.
-
- 08 12月, 2000 1 次提交
-
-
由 Bodo Möller 提交于
One problem that looked like a problem in bn_recp.c at first turned out to be a BN_mul bug. An example is given in bn_recp.c; finding the bug responsible for this is left as an exercise.
-
- 07 12月, 2000 1 次提交
-
-
由 Bodo Möller 提交于
BN_mod_exp_mont does not work properly yet if modulus m is negative (we want computations to be carried out modulo |m|).
-
- 06 12月, 2000 2 次提交
-
-
由 Bodo Möller 提交于
not just on certain platforms.
-
由 Ulf Möller 提交于
-
- 03 12月, 2000 2 次提交
-
-
由 Ulf Möller 提交于
-
由 Ulf Möller 提交于
if (bp == NULL) for (j=0; j<10000; j++) BN_add(&c,&a,&b); seem to be pretty useless, and bp never is NULL anyway.
-
- 02 12月, 2000 1 次提交
-
-
由 Ulf Möller 提交于
The bn_cmp_part_words bug was only caught in the BN_mod_mul() test, not in the BN_mul() test, so apparently the choice of parameters in some cases is bad.
-
- 01 12月, 2000 4 次提交
-
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
violation in test_kron on a 32 bit system.
-
由 Bodo Möller 提交于
But even if this is avoided, there are still segmentation violations (during one of the BN_free()s at the end of test_kron in some cases, in other cases during BN_kronecker, or later in BN_sqrt; choosing a different exponentiation algorithm in bntest.c appears to influence when the SIGSEGV takes place).
-
由 Bodo Möller 提交于
-
- 30 11月, 2000 5 次提交
-
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
(we need the two's complement of BN_lsw then).
-
由 Bodo Möller 提交于
so we have to reduce the random numbers used in test_mont. Before this change, test_mont failed in [debug-]solaris-sparcv9-gcc configurations ("Montgomery multiplication test failed!" because the multiplication result obtained with Montgomery multiplication differed from the result obtained by BN_mod_mul). Substituing the old version of bn_gcd.c (BN_mod_inverse) did not avoid the problem. The strange thing is that it I did not observe any problems when using debug-solaris-sparcv8-gcc and solaris-sparcv9-cc, as well as when compiling OpenSSL 0.9.6 in the solaric-sparcv9-gcc configuration on the same system.
-
- 29 11月, 2000 2 次提交
-
-
由 Bodo Möller 提交于
Improve readability of bn_shift.c. Add comment in bn_lib.c (why zero data between top and max?) Change bntest.c output for BN_kronecker test
-
由 Bodo Möller 提交于
Modify "CHANGES" entry for BN_mod_inverse (it's not just avoiding BN_div that increases performance, avoiding BN_mul also helps)
-
- 28 11月, 2000 2 次提交
-
-
由 Bodo Möller 提交于
Sketch the test for BN_kronecker.
-
由 Bodo Möller 提交于
-