- 12 10月, 2003 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 11 10月, 2003 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
type is "other".
-
- 01 10月, 2003 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 25 9月, 2003 1 次提交
-
-
由 Ralf S. Engelschall 提交于
sure the loop does correctly stop and breaking ("division by zero") modulus operations are not performed. The (pre-generated) prime table crypto/bn/bn_prime.h was already correct, but it could not be re-generated on some platforms because of the "division by zero" situation in the script.
-
- 04 9月, 2003 3 次提交
-
-
由 Bodo Möller 提交于
0.9.6h forked into 0.9.6i and 0.9.7 ...
-
由 Dr. Stephen Henson 提交于
exiting on the first error in a request.
-
由 Dr. Stephen Henson 提交于
one, as required by SSL/TLS specs.
-
- 22 7月, 2003 2 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Douglas Stebila Reviewed by: Bodo Moeller
-
由 Bodo Möller 提交于
add code for kP+lQ timings Submitted by: Douglas Stebila <douglas.stebila@sun.com> Reviewed by: Bodo Moeller
-
- 21 7月, 2003 2 次提交
-
-
由 Bodo Möller 提交于
PR: 659
-
由 Bodo Möller 提交于
typo in 0.9.6k section
-
- 20 6月, 2003 3 次提交
-
-
由 Richard Levitte 提交于
PR: 587
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
-
- 12 6月, 2003 2 次提交
-
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
-
- 10 6月, 2003 1 次提交
-
-
由 Richard Levitte 提交于
-
- 03 6月, 2003 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 02 6月, 2003 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 01 5月, 2003 3 次提交
-
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
crypto/store/README, crypto/store/store.h and crypto/store/str_locl.h.
-
由 Richard Levitte 提交于
-
- 30 4月, 2003 3 次提交
-
-
由 Richard Levitte 提交于
that uses them that I'll commit in a few days.
-
由 Richard Levitte 提交于
returns an index.
-
由 Richard Levitte 提交于
flags.
-
- 11 4月, 2003 1 次提交
-
-
由 Bodo Möller 提交于
-
- 04 4月, 2003 3 次提交
-
-
由 Richard Levitte 提交于
the CA certificate part of the CA database, and combined with 'unique_subject=no', it should make operations like CA certificate roll-over easier.
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
subject.
-
- 02 4月, 2003 1 次提交
-
-
由 Bodo Möller 提交于
-
- 30 3月, 2003 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 25 3月, 2003 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 22 3月, 2003 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 21 3月, 2003 2 次提交
-
-
由 Bodo Möller 提交于
enable it automatically for the built-in engine
-
由 Dr. Stephen Henson 提交于
-
- 20 3月, 2003 1 次提交
-
-
由 Bodo Möller 提交于
-
- 14 3月, 2003 1 次提交
-
-
由 Geoff Thorpe 提交于
applications if they were passing a bogus 'flags' parameter yet having things work as they wanted anyway.
-
- 11 3月, 2003 1 次提交
-
-
由 Geoff Thorpe 提交于
dsa_mod_exp() and bn_mod_exp() handlers from dsa_do_verify() and dsa_sign_setup(). When another DSA_METHOD implementation does not define these lower-level handlers, it becomes impossible to do a fallback to software on errors using a simple DSA_OpenSSL()->fn(key). This change allows the default DSA_METHOD to function in such circumstances by only using dsa_mod_exp() and bn_mod_exp() handlers if they exist, otherwise using BIGNUM implementations directly (which is what those handlers did before this change). There should be no noticable difference for the software case, or indeed any custom case that didn't already segfault, except perhaps that there is now one less level of indirection in all cases. PR: 507
-
- 28 2月, 2003 1 次提交
-
-
由 Bodo Möller 提交于
- bugfix: in ECDH_compute_key, pad x coordinate with leading zeros if necessary
-