- 03 12月, 2000 5 次提交
-
-
由 Ulf Möller 提交于
-
由 Ulf Möller 提交于
-
由 Ulf Möller 提交于
-
由 Ulf Möller 提交于
-
由 Ulf Möller 提交于
if (bp == NULL) for (j=0; j<10000; j++) BN_add(&c,&a,&b); seem to be pretty useless, and bp never is NULL anyway.
-
- 02 12月, 2000 8 次提交
-
-
由 Ulf Möller 提交于
-
由 Ulf Möller 提交于
The *_part_words functions are not static.
-
由 Ulf Möller 提交于
The bn_cmp_part_words bug was only caught in the BN_mod_mul() test, not in the BN_mul() test, so apparently the choice of parameters in some cases is bad.
-
由 Ulf Möller 提交于
-
由 Ulf Möller 提交于
-
由 Geoff Thorpe 提交于
casts) used in the lhash code are about as horrible and evil as they can be. For starters, the callback prototypes contain empty parameter lists. Yuck. This first change defines clearer prototypes - including "typedef"'d function pointer types to use as "hash" and "compare" callbacks, as well as the callbacks passed to the lh_doall and lh_doall_arg iteration functions. Now at least more explicit (and clear) casting is required in all of the dependant code - and that should be included in this commit. The next step will be to hunt down and obliterate some of the function pointer casting being used when it's not necessary - a particularly evil variant exists in the implementation of lh_doall.
-
由 Richard Levitte 提交于
a draft.
-
由 Richard Levitte 提交于
-
- 01 12月, 2000 18 次提交
-
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
由 Ulf Möller 提交于
I hope this adequately summarizes the results of all those disussions.
-
由 Ulf Möller 提交于
-
由 Ulf Möller 提交于
-
由 Richard Levitte 提交于
-
由 Bodo Möller 提交于
Don't dump core in ssltest.
-
由 Bodo Möller 提交于
-
由 Richard Levitte 提交于
First tentative impementation of Kerberos 5 cryptos and keys for SSL/TLS. Implemented by Vern Staats <staatsvr@asc.hpc.mil>, further hacked and distributed by Jeffrey Altman <jaltnab@columbia.edu>
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
violation in test_kron on a 32 bit system.
-
由 Bodo Möller 提交于
But even if this is avoided, there are still segmentation violations (during one of the BN_free()s at the end of test_kron in some cases, in other cases during BN_kronecker, or later in BN_sqrt; choosing a different exponentiation algorithm in bntest.c appears to influence when the SIGSEGV takes place).
-
由 Bodo Möller 提交于
-
由 Richard Levitte 提交于
-
由 Bodo Möller 提交于
Submitted by: Lenka Fibikova
-
- 30 11月, 2000 9 次提交
-
-
由 Richard Levitte 提交于
types of questions. Hopefully, that'll make them easier to spot, and specially, easier to refer to.
-
由 Bodo Möller 提交于
-
由 Richard Levitte 提交于
generated errors. Therefore, print whatever error there may be...
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
free that, since it's shared by all SSL_CTX's, present and future.
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
systems where such an operation is supported.
-