- 01 12月, 2000 14 次提交
-
-
由 Bodo Möller 提交于
-
由 Ulf Möller 提交于
I hope this adequately summarizes the results of all those disussions.
-
由 Ulf Möller 提交于
-
由 Ulf Möller 提交于
-
由 Richard Levitte 提交于
-
由 Bodo Möller 提交于
Don't dump core in ssltest.
-
由 Bodo Möller 提交于
-
由 Richard Levitte 提交于
First tentative impementation of Kerberos 5 cryptos and keys for SSL/TLS. Implemented by Vern Staats <staatsvr@asc.hpc.mil>, further hacked and distributed by Jeffrey Altman <jaltnab@columbia.edu>
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
violation in test_kron on a 32 bit system.
-
由 Bodo Möller 提交于
But even if this is avoided, there are still segmentation violations (during one of the BN_free()s at the end of test_kron in some cases, in other cases during BN_kronecker, or later in BN_sqrt; choosing a different exponentiation algorithm in bntest.c appears to influence when the SIGSEGV takes place).
-
由 Bodo Möller 提交于
-
由 Richard Levitte 提交于
-
由 Bodo Möller 提交于
Submitted by: Lenka Fibikova
-
- 30 11月, 2000 26 次提交
-
-
由 Richard Levitte 提交于
types of questions. Hopefully, that'll make them easier to spot, and specially, easier to refer to.
-
由 Bodo Möller 提交于
-
由 Richard Levitte 提交于
generated errors. Therefore, print whatever error there may be...
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
free that, since it's shared by all SSL_CTX's, present and future.
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
systems where such an operation is supported.
-
由 Bodo Möller 提交于
-
由 Richard Levitte 提交于
Windows. Really, this should probably be done on Unix as well, but that will be a later story...
-
由 Bodo Möller 提交于
Fix BN_mod_exp_simple for a==0 (mod m). Skip useless round in BN_mod_sqrt (1 is always a square, no need to test BN_kronecker for it).
-
由 Geoff Thorpe 提交于
tunnel to not pro-actively close down when failing an SSL handshake. * Change the cert-chain callback - originally this was the same one used in s_client and s_server but the output's as ugly as sin, so I've prettied tunala's copy output up a bit (and made the output level configurable). * Remove the superfluous "errors" from the SSL state callback - these are just non-blocking side-effects.
-
由 Bodo Möller 提交于
exists in bn_sqrt.c now
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
test_bn still fails in the BN_sqrt test because small primes appear to turn into zero for no obvious reason, leading to "div by zero" errors.
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
由 Ulf Möller 提交于
are not reduced modulo m, the outputs won't be either).
-
由 Geoff Thorpe 提交于
similarly modified now on DH and DSA.
-
由 Bodo Möller 提交于
-
由 Geoff Thorpe 提交于
the initialisation and cleanup of "ex_data" elements to before an init() handler and after a finish() handler respectively.
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
(we need the two's complement of BN_lsw then).
-
由 Geoff Thorpe 提交于
* A little bit of code-cleanup * Reformat the usage string (not so wide) * Allow adding an alternative (usually DSA) cert/key pair (a la s_server) * Allow control over cert-chain verify depth
-
由 Bodo Möller 提交于
so we have to reduce the random numbers used in test_mont. Before this change, test_mont failed in [debug-]solaris-sparcv9-gcc configurations ("Montgomery multiplication test failed!" because the multiplication result obtained with Montgomery multiplication differed from the result obtained by BN_mod_mul). Substituing the old version of bn_gcd.c (BN_mod_inverse) did not avoid the problem. The strange thing is that it I did not observe any problems when using debug-solaris-sparcv8-gcc and solaris-sparcv9-cc, as well as when compiling OpenSSL 0.9.6 in the solaric-sparcv9-gcc configuration on the same system.
-