Skip to content
  1. Sep 25, 2003
    • Ralf S. Engelschall's avatar
      Fix prime generation loop in crypto/bn/bn_prime.pl by making · 6bd27f86
      Ralf S. Engelschall authored
      sure the loop does correctly stop and breaking ("division by zero")
      modulus operations are not performed. The (pre-generated) prime
      table crypto/bn/bn_prime.h was already correct, but it could not be
      re-generated on some platforms because of the "division by zero"
      situation in the script.
      6bd27f86
  2. Sep 04, 2003
  3. Sep 03, 2003
  4. Jul 22, 2003
  5. Jul 21, 2003
  6. Jun 19, 2003
  7. Jun 11, 2003
  8. Jun 10, 2003
  9. Jun 03, 2003
  10. Jun 01, 2003
  11. May 01, 2003
  12. Apr 29, 2003
  13. Apr 11, 2003
  14. Apr 03, 2003
  15. Apr 02, 2003
  16. Mar 30, 2003
  17. Mar 24, 2003
  18. Mar 21, 2003
  19. Mar 20, 2003
  20. Mar 19, 2003
  21. Mar 13, 2003
  22. Mar 11, 2003
    • Geoff Thorpe's avatar
      The default implementation of DSA_METHOD has an interdependence on the · 879650b8
      Geoff Thorpe authored
      dsa_mod_exp() and bn_mod_exp() handlers from dsa_do_verify() and
      dsa_sign_setup(). When another DSA_METHOD implementation does not define
      these lower-level handlers, it becomes impossible to do a fallback to
      software on errors using a simple DSA_OpenSSL()->fn(key).
      
      This change allows the default DSA_METHOD to function in such circumstances
      by only using dsa_mod_exp() and bn_mod_exp() handlers if they exist,
      otherwise using BIGNUM implementations directly (which is what those
      handlers did before this change). There should be no noticable difference
      for the software case, or indeed any custom case that didn't already
      segfault, except perhaps that there is now one less level of indirection in
      all cases.
      
      PR: 507
      879650b8
  23. Feb 28, 2003
  24. Feb 27, 2003
  25. Feb 25, 2003
  26. Feb 22, 2003