- Dec 02, 2000
-
-
Ulf Möller authored
-
Ulf Möller authored
-
Ulf Möller authored
-
Ulf Möller authored
if (bp == NULL) for (j=0; j<10000; j++) BN_add(&c,&a,&b); seem to be pretty useless, and bp never is NULL anyway.
-
Ulf Möller authored
-
Ulf Möller authored
The *_part_words functions are not static.
-
Ulf Möller authored
The bn_cmp_part_words bug was only caught in the BN_mod_mul() test, not in the BN_mul() test, so apparently the choice of parameters in some cases is bad.
-
Ulf Möller authored
-
Ulf Möller authored
-
- Dec 01, 2000
-
-
Geoff Thorpe authored
casts) used in the lhash code are about as horrible and evil as they can be. For starters, the callback prototypes contain empty parameter lists. Yuck. This first change defines clearer prototypes - including "typedef"'d function pointer types to use as "hash" and "compare" callbacks, as well as the callbacks passed to the lh_doall and lh_doall_arg iteration functions. Now at least more explicit (and clear) casting is required in all of the dependant code - and that should be included in this commit. The next step will be to hunt down and obliterate some of the function pointer casting being used when it's not necessary - a particularly evil variant exists in the implementation of lh_doall.
-
Richard Levitte authored
a draft.
-
Richard Levitte authored
-
Richard Levitte authored
-
Richard Levitte authored
-
Bodo Möller authored
-
Bodo Möller authored
-
Bodo Möller authored
-
Ulf Möller authored
I hope this adequately summarizes the results of all those disussions.
-
Ulf Möller authored
-
Ulf Möller authored
-
Richard Levitte authored
-
- Nov 30, 2000
-
-
Bodo Möller authored
Don't dump core in ssltest.
-
Bodo Möller authored
-
Richard Levitte authored
First tentative impementation of Kerberos 5 cryptos and keys for SSL/TLS. Implemented by Vern Staats <staatsvr@asc.hpc.mil>, further hacked and distributed by Jeffrey Altman <jaltnab@columbia.edu>
-
Bodo Möller authored
-
Bodo Möller authored
violation in test_kron on a 32 bit system.
-
Bodo Möller authored
But even if this is avoided, there are still segmentation violations (during one of the BN_free()s at the end of test_kron in some cases, in other cases during BN_kronecker, or later in BN_sqrt; choosing a different exponentiation algorithm in bntest.c appears to influence when the SIGSEGV takes place).
-
Bodo Möller authored
-
Richard Levitte authored
-
Bodo Möller authored
Submitted by: Lenka Fibikova
-
Richard Levitte authored
types of questions. Hopefully, that'll make them easier to spot, and specially, easier to refer to.
-
Bodo Möller authored
-
Richard Levitte authored
generated errors. Therefore, print whatever error there may be...
-
Richard Levitte authored
-
Richard Levitte authored
free that, since it's shared by all SSL_CTX's, present and future.
-
Richard Levitte authored
-
Richard Levitte authored
-
Richard Levitte authored
-
Richard Levitte authored
systems where such an operation is supported.
-
Bodo Möller authored
-