Skip to content
  1. Oct 11, 2003
  2. Oct 10, 2003
  3. Sep 30, 2003
  4. Sep 25, 2003
    • Ralf S. Engelschall's avatar
      Fix prime generation loop in crypto/bn/bn_prime.pl by making · 6bd27f86
      Ralf S. Engelschall authored
      sure the loop does correctly stop and breaking ("division by zero")
      modulus operations are not performed. The (pre-generated) prime
      table crypto/bn/bn_prime.h was already correct, but it could not be
      re-generated on some platforms because of the "division by zero"
      situation in the script.
      6bd27f86
  5. Sep 04, 2003
  6. Sep 03, 2003
  7. Jul 22, 2003
  8. Jul 21, 2003
  9. Jun 19, 2003
  10. Jun 11, 2003
  11. Jun 10, 2003
  12. Jun 03, 2003
  13. Jun 01, 2003
  14. May 01, 2003
  15. Apr 29, 2003
  16. Apr 11, 2003
  17. Apr 03, 2003
  18. Apr 02, 2003
  19. Mar 30, 2003
  20. Mar 24, 2003
  21. Mar 21, 2003
  22. Mar 20, 2003
  23. Mar 19, 2003
  24. Mar 13, 2003
  25. Mar 11, 2003
    • Geoff Thorpe's avatar
      The default implementation of DSA_METHOD has an interdependence on the · 879650b8
      Geoff Thorpe authored
      dsa_mod_exp() and bn_mod_exp() handlers from dsa_do_verify() and
      dsa_sign_setup(). When another DSA_METHOD implementation does not define
      these lower-level handlers, it becomes impossible to do a fallback to
      software on errors using a simple DSA_OpenSSL()->fn(key).
      
      This change allows the default DSA_METHOD to function in such circumstances
      by only using dsa_mod_exp() and bn_mod_exp() handlers if they exist,
      otherwise using BIGNUM implementations directly (which is what those
      handlers did before this change). There should be no noticable difference
      for the software case, or indeed any custom case that didn't already
      segfault, except perhaps that there is now one less level of indirection in
      all cases.
      
      PR: 507
      879650b8
  26. Feb 28, 2003