- Nov 30, 2000
-
-
Bodo Möller authored
test_bn still fails in the BN_sqrt test because small primes appear to turn into zero for no obvious reason, leading to "div by zero" errors.
-
Bodo Möller authored
-
Bodo Möller authored
-
- Nov 29, 2000
-
-
Ulf Möller authored
are not reduced modulo m, the outputs won't be either).
-
Geoff Thorpe authored
similarly modified now on DH and DSA.
-
Bodo Möller authored
-
Geoff Thorpe authored
the initialisation and cleanup of "ex_data" elements to before an init() handler and after a finish() handler respectively.
-
Bodo Möller authored
-
Bodo Möller authored
(we need the two's complement of BN_lsw then).
-
Geoff Thorpe authored
* A little bit of code-cleanup * Reformat the usage string (not so wide) * Allow adding an alternative (usually DSA) cert/key pair (a la s_server) * Allow control over cert-chain verify depth
-
Bodo Möller authored
so we have to reduce the random numbers used in test_mont. Before this change, test_mont failed in [debug-]solaris-sparcv9-gcc configurations ("Montgomery multiplication test failed!" because the multiplication result obtained with Montgomery multiplication differed from the result obtained by BN_mod_mul). Substituing the old version of bn_gcd.c (BN_mod_inverse) did not avoid the problem. The strange thing is that it I did not observe any problems when using debug-solaris-sparcv8-gcc and solaris-sparcv9-cc, as well as when compiling OpenSSL 0.9.6 in the solaric-sparcv9-gcc configuration on the same system.
-
Lutz Jänicke authored
-
Ulf Möller authored
-
Bodo Möller authored
-
Lutz Jänicke authored
For the server side this was already done one year ago :-(
-
Bodo Möller authored
Improve readability of bn_shift.c. Add comment in bn_lib.c (why zero data between top and max?) Change bntest.c output for BN_kronecker test
-
Bodo Möller authored
I'm still investigating what caused the segementation fault (maybe "make clean; make" will cure it ...). But BN_bin2bn should always reset ret->neg.
-
Bodo Möller authored
This caused a segmentation fault in calls to malloc, so I cleaned up bn_lib.c a little so that it is easier to see what is going on. The bug turned out to be an off-by-one error in BN_bin2bn.
-
Bodo Möller authored
Modify "CHANGES" entry for BN_mod_inverse (it's not just avoiding BN_div that increases performance, avoiding BN_mul also helps)
-
Bodo Möller authored
-
Bodo Möller authored
-
Bodo Möller authored
Get the BN_mod_exp_mont bugfix (for handling negative inputs) correct this time.
-
Richard Levitte authored
bn_add_words(), not bn_sub_words()...
-
Geoff Thorpe authored
command line, and make the peer-authentication similarly configurable.
-
Ulf Möller authored
-
- Nov 28, 2000
-
-
Geoff Thorpe authored
- Add "-cipher" and "-out_state" command line arguments to control SSL cipher-suites and handshake debug output respectively. - Implemented error handling for SSL handshakes that break down. This uses a cheat - storing a non-NULL pointer as "app_data" in the SSL structure when the SSL should be killed.
-
Geoff Thorpe authored
or two kinks lurking around, but it now appears to deal with the basic test cases ok.
-
Bodo Möller authored
-
Bodo Möller authored
-
Bodo Möller authored
-
Richard Levitte authored
-
Bodo Möller authored
Sketch the test for BN_kronecker.
-
Bodo Möller authored
-
Bodo Möller authored
-
Bodo Möller authored
-
Bodo Möller authored
Also add the next file in advance so that I can't forget this one :-)
-
- Nov 27, 2000
-
-
Bodo Möller authored
-
Bodo Möller authored
Fix BN_gcd. Analyze BN_mod_inverse. Add BN_kronecker. "make update".
-
- Nov 26, 2000
-
-
Bodo Möller authored
use BN_CTX_start/get/end instead of accessing ctx->tos). Change indentation to "EAY" style.
-
Bodo Möller authored
use BN_CTX_start/get/end instead of accessing ctx->tos). Change indentation to "EAY" style.
-