- Nov 30, 2000
-
-
Richard Levitte authored
generated errors. Therefore, print whatever error there may be...
-
Richard Levitte authored
-
Richard Levitte authored
free that, since it's shared by all SSL_CTX's, present and future.
-
Richard Levitte authored
-
Richard Levitte authored
-
Richard Levitte authored
-
Richard Levitte authored
systems where such an operation is supported.
-
Bodo Möller authored
-
Richard Levitte authored
Windows. Really, this should probably be done on Unix as well, but that will be a later story...
-
Bodo Möller authored
Fix BN_mod_exp_simple for a==0 (mod m). Skip useless round in BN_mod_sqrt (1 is always a square, no need to test BN_kronecker for it).
-
Geoff Thorpe authored
tunnel to not pro-actively close down when failing an SSL handshake. * Change the cert-chain callback - originally this was the same one used in s_client and s_server but the output's as ugly as sin, so I've prettied tunala's copy output up a bit (and made the output level configurable). * Remove the superfluous "errors" from the SSL state callback - these are just non-blocking side-effects.
-
Bodo Möller authored
exists in bn_sqrt.c now
-
Bodo Möller authored
-
Bodo Möller authored
test_bn still fails in the BN_sqrt test because small primes appear to turn into zero for no obvious reason, leading to "div by zero" errors.
-
Bodo Möller authored
-
Bodo Möller authored
-
- Nov 29, 2000
-
-
Ulf Möller authored
are not reduced modulo m, the outputs won't be either).
-
Geoff Thorpe authored
similarly modified now on DH and DSA.
-
Bodo Möller authored
-
Geoff Thorpe authored
the initialisation and cleanup of "ex_data" elements to before an init() handler and after a finish() handler respectively.
-
Bodo Möller authored
-
Bodo Möller authored
(we need the two's complement of BN_lsw then).
-
Geoff Thorpe authored
* A little bit of code-cleanup * Reformat the usage string (not so wide) * Allow adding an alternative (usually DSA) cert/key pair (a la s_server) * Allow control over cert-chain verify depth
-
Bodo Möller authored
so we have to reduce the random numbers used in test_mont. Before this change, test_mont failed in [debug-]solaris-sparcv9-gcc configurations ("Montgomery multiplication test failed!" because the multiplication result obtained with Montgomery multiplication differed from the result obtained by BN_mod_mul). Substituing the old version of bn_gcd.c (BN_mod_inverse) did not avoid the problem. The strange thing is that it I did not observe any problems when using debug-solaris-sparcv8-gcc and solaris-sparcv9-cc, as well as when compiling OpenSSL 0.9.6 in the solaric-sparcv9-gcc configuration on the same system.
-
Lutz Jänicke authored
-
Ulf Möller authored
-
Bodo Möller authored
-
Lutz Jänicke authored
For the server side this was already done one year ago :-(
-
Bodo Möller authored
Improve readability of bn_shift.c. Add comment in bn_lib.c (why zero data between top and max?) Change bntest.c output for BN_kronecker test
-
Bodo Möller authored
I'm still investigating what caused the segementation fault (maybe "make clean; make" will cure it ...). But BN_bin2bn should always reset ret->neg.
-
Bodo Möller authored
This caused a segmentation fault in calls to malloc, so I cleaned up bn_lib.c a little so that it is easier to see what is going on. The bug turned out to be an off-by-one error in BN_bin2bn.
-
Bodo Möller authored
Modify "CHANGES" entry for BN_mod_inverse (it's not just avoiding BN_div that increases performance, avoiding BN_mul also helps)
-
Bodo Möller authored
-
Bodo Möller authored
-
Bodo Möller authored
Get the BN_mod_exp_mont bugfix (for handling negative inputs) correct this time.
-
Richard Levitte authored
bn_add_words(), not bn_sub_words()...
-
Geoff Thorpe authored
command line, and make the peer-authentication similarly configurable.
-
Ulf Möller authored
-
- Nov 28, 2000
-
-
Geoff Thorpe authored
- Add "-cipher" and "-out_state" command line arguments to control SSL cipher-suites and handshake debug output respectively. - Implemented error handling for SSL handshakes that break down. This uses a cheat - storing a non-NULL pointer as "app_data" in the SSL structure when the SSL should be killed.
-
Geoff Thorpe authored
or two kinks lurking around, but it now appears to deal with the basic test cases ok.
-