1. 01 10月, 2003 1 次提交
  2. 25 9月, 2003 1 次提交
    • R
      Fix prime generation loop in crypto/bn/bn_prime.pl by making · 6bd27f86
      Ralf S. Engelschall 提交于
      sure the loop does correctly stop and breaking ("division by zero")
      modulus operations are not performed. The (pre-generated) prime
      table crypto/bn/bn_prime.h was already correct, but it could not be
      re-generated on some platforms because of the "division by zero"
      situation in the script.
      6bd27f86
  3. 04 9月, 2003 3 次提交
  4. 22 7月, 2003 2 次提交
  5. 21 7月, 2003 2 次提交
  6. 20 6月, 2003 3 次提交
  7. 12 6月, 2003 2 次提交
  8. 10 6月, 2003 1 次提交
  9. 03 6月, 2003 1 次提交
  10. 02 6月, 2003 1 次提交
  11. 01 5月, 2003 3 次提交
  12. 30 4月, 2003 3 次提交
  13. 11 4月, 2003 1 次提交
  14. 04 4月, 2003 3 次提交
  15. 02 4月, 2003 1 次提交
  16. 30 3月, 2003 1 次提交
  17. 25 3月, 2003 1 次提交
  18. 22 3月, 2003 1 次提交
  19. 21 3月, 2003 2 次提交
  20. 20 3月, 2003 1 次提交
  21. 14 3月, 2003 1 次提交
  22. 11 3月, 2003 1 次提交
    • G
      The default implementation of DSA_METHOD has an interdependence on the · 879650b8
      Geoff Thorpe 提交于
      dsa_mod_exp() and bn_mod_exp() handlers from dsa_do_verify() and
      dsa_sign_setup(). When another DSA_METHOD implementation does not define
      these lower-level handlers, it becomes impossible to do a fallback to
      software on errors using a simple DSA_OpenSSL()->fn(key).
      
      This change allows the default DSA_METHOD to function in such circumstances
      by only using dsa_mod_exp() and bn_mod_exp() handlers if they exist,
      otherwise using BIGNUM implementations directly (which is what those
      handlers did before this change). There should be no noticable difference
      for the software case, or indeed any custom case that didn't already
      segfault, except perhaps that there is now one less level of indirection in
      all cases.
      
      PR: 507
      879650b8
  23. 28 2月, 2003 1 次提交
  24. 27 2月, 2003 1 次提交
  25. 26 2月, 2003 1 次提交
  26. 23 2月, 2003 1 次提交