- Dec 01, 2000
-
-
Geoff Thorpe authored
casts) used in the lhash code are about as horrible and evil as they can be. For starters, the callback prototypes contain empty parameter lists. Yuck. This first change defines clearer prototypes - including "typedef"'d function pointer types to use as "hash" and "compare" callbacks, as well as the callbacks passed to the lh_doall and lh_doall_arg iteration functions. Now at least more explicit (and clear) casting is required in all of the dependant code - and that should be included in this commit. The next step will be to hunt down and obliterate some of the function pointer casting being used when it's not necessary - a particularly evil variant exists in the implementation of lh_doall.
-
Richard Levitte authored
a draft.
-
Richard Levitte authored
-
Richard Levitte authored
-
Richard Levitte authored
-
Bodo Möller authored
-
Bodo Möller authored
-
Bodo Möller authored
-
Ulf Möller authored
I hope this adequately summarizes the results of all those disussions.
-
Ulf Möller authored
-
Ulf Möller authored
-
Richard Levitte authored
-
- Nov 30, 2000
-
-
Bodo Möller authored
Don't dump core in ssltest.
-
Bodo Möller authored
-
Richard Levitte authored
First tentative impementation of Kerberos 5 cryptos and keys for SSL/TLS. Implemented by Vern Staats <staatsvr@asc.hpc.mil>, further hacked and distributed by Jeffrey Altman <jaltnab@columbia.edu>
-
Bodo Möller authored
-
Bodo Möller authored
violation in test_kron on a 32 bit system.
-
Bodo Möller authored
But even if this is avoided, there are still segmentation violations (during one of the BN_free()s at the end of test_kron in some cases, in other cases during BN_kronecker, or later in BN_sqrt; choosing a different exponentiation algorithm in bntest.c appears to influence when the SIGSEGV takes place).
-
Bodo Möller authored
-
Richard Levitte authored
-
Bodo Möller authored
Submitted by: Lenka Fibikova
-
Richard Levitte authored
types of questions. Hopefully, that'll make them easier to spot, and specially, easier to refer to.
-
Bodo Möller authored
-
Richard Levitte authored
generated errors. Therefore, print whatever error there may be...
-
Richard Levitte authored
-
Richard Levitte authored
free that, since it's shared by all SSL_CTX's, present and future.
-
Richard Levitte authored
-
Richard Levitte authored
-
Richard Levitte authored
-
Richard Levitte authored
systems where such an operation is supported.
-
Bodo Möller authored
-
Richard Levitte authored
Windows. Really, this should probably be done on Unix as well, but that will be a later story...
-
Bodo Möller authored
Fix BN_mod_exp_simple for a==0 (mod m). Skip useless round in BN_mod_sqrt (1 is always a square, no need to test BN_kronecker for it).
-
Geoff Thorpe authored
tunnel to not pro-actively close down when failing an SSL handshake. * Change the cert-chain callback - originally this was the same one used in s_client and s_server but the output's as ugly as sin, so I've prettied tunala's copy output up a bit (and made the output level configurable). * Remove the superfluous "errors" from the SSL state callback - these are just non-blocking side-effects.
-
Bodo Möller authored
exists in bn_sqrt.c now
-
Bodo Möller authored
-
Bodo Möller authored
test_bn still fails in the BN_sqrt test because small primes appear to turn into zero for no obvious reason, leading to "div by zero" errors.
-
Bodo Möller authored
-
Bodo Möller authored
-
- Nov 29, 2000
-
-
Ulf Möller authored
are not reduced modulo m, the outputs won't be either).
-