- 30 11月, 2000 14 次提交
-
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
由 Ulf Möller 提交于
are not reduced modulo m, the outputs won't be either).
-
由 Geoff Thorpe 提交于
similarly modified now on DH and DSA.
-
由 Bodo Möller 提交于
-
由 Geoff Thorpe 提交于
the initialisation and cleanup of "ex_data" elements to before an init() handler and after a finish() handler respectively.
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
(we need the two's complement of BN_lsw then).
-
由 Geoff Thorpe 提交于
* A little bit of code-cleanup * Reformat the usage string (not so wide) * Allow adding an alternative (usually DSA) cert/key pair (a la s_server) * Allow control over cert-chain verify depth
-
由 Bodo Möller 提交于
so we have to reduce the random numbers used in test_mont. Before this change, test_mont failed in [debug-]solaris-sparcv9-gcc configurations ("Montgomery multiplication test failed!" because the multiplication result obtained with Montgomery multiplication differed from the result obtained by BN_mod_mul). Substituing the old version of bn_gcd.c (BN_mod_inverse) did not avoid the problem. The strange thing is that it I did not observe any problems when using debug-solaris-sparcv8-gcc and solaris-sparcv9-cc, as well as when compiling OpenSSL 0.9.6 in the solaric-sparcv9-gcc configuration on the same system.
-
由 Lutz Jänicke 提交于
-
由 Ulf Möller 提交于
-
由 Bodo Möller 提交于
-
由 Lutz Jänicke 提交于
For the server side this was already done one year ago :-(
-
- 29 11月, 2000 12 次提交
-
-
由 Bodo Möller 提交于
Improve readability of bn_shift.c. Add comment in bn_lib.c (why zero data between top and max?) Change bntest.c output for BN_kronecker test
-
由 Bodo Möller 提交于
I'm still investigating what caused the segementation fault (maybe "make clean; make" will cure it ...). But BN_bin2bn should always reset ret->neg.
-
由 Bodo Möller 提交于
This caused a segmentation fault in calls to malloc, so I cleaned up bn_lib.c a little so that it is easier to see what is going on. The bug turned out to be an off-by-one error in BN_bin2bn.
-
由 Bodo Möller 提交于
Modify "CHANGES" entry for BN_mod_inverse (it's not just avoiding BN_div that increases performance, avoiding BN_mul also helps)
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
Get the BN_mod_exp_mont bugfix (for handling negative inputs) correct this time.
-
由 Richard Levitte 提交于
bn_add_words(), not bn_sub_words()...
-
由 Geoff Thorpe 提交于
command line, and make the peer-authentication similarly configurable.
-
由 Ulf Möller 提交于
-
由 Geoff Thorpe 提交于
- Add "-cipher" and "-out_state" command line arguments to control SSL cipher-suites and handshake debug output respectively. - Implemented error handling for SSL handshakes that break down. This uses a cheat - storing a non-NULL pointer as "app_data" in the SSL structure when the SSL should be killed.
-
由 Geoff Thorpe 提交于
or two kinks lurking around, but it now appears to deal with the basic test cases ok.
-
- 28 11月, 2000 11 次提交
-
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
由 Richard Levitte 提交于
-
由 Bodo Möller 提交于
Sketch the test for BN_kronecker.
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
Also add the next file in advance so that I can't forget this one :-)
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
Fix BN_gcd. Analyze BN_mod_inverse. Add BN_kronecker. "make update".
-
- 27 11月, 2000 3 次提交
-
-
由 Bodo Möller 提交于
use BN_CTX_start/get/end instead of accessing ctx->tos). Change indentation to "EAY" style.
-
由 Bodo Möller 提交于
use BN_CTX_start/get/end instead of accessing ctx->tos). Change indentation to "EAY" style.
-
由 Geoff Thorpe 提交于
making a note in the CHANGES file.
-