Fix prime generation loop in crypto/bn/bn_prime.pl by making
sure the loop does correctly stop and breaking ("division by zero") modulus operations are not performed. The (pre-generated) prime table crypto/bn/bn_prime.h was already correct, but it could not be re-generated on some platforms because of the "division by zero" situation in the script.
This commit is contained in:
parent
dfe399e7d9
commit
6bd27f8644
8
CHANGES
8
CHANGES
@ -4,6 +4,14 @@
|
|||||||
|
|
||||||
Changes between 0.9.7c and 0.9.8 [xx XXX xxxx]
|
Changes between 0.9.7c and 0.9.8 [xx XXX xxxx]
|
||||||
|
|
||||||
|
*) Fix prime generation loop in crypto/bn/bn_prime.pl by making
|
||||||
|
sure the loop does correctly stop and breaking ("division by zero")
|
||||||
|
modulus operations are not performed. The (pre-generated) prime
|
||||||
|
table crypto/bn/bn_prime.h was already correct, but it could not be
|
||||||
|
re-generated on some platforms because of the "division by zero"
|
||||||
|
situation in the script.
|
||||||
|
[Ralf S. Engelschall]
|
||||||
|
|
||||||
*) Update support for ECC-based TLS ciphersuites according to
|
*) Update support for ECC-based TLS ciphersuites according to
|
||||||
draft-ietf-tls-ecc-03.txt: the KDF1 key derivation function with
|
draft-ietf-tls-ecc-03.txt: the KDF1 key derivation function with
|
||||||
SHA-1 now is only used for "small" curves (where the
|
SHA-1 now is only used for "small" curves (where the
|
||||||
|
@ -11,7 +11,7 @@ loop: while ($#primes < $num-1)
|
|||||||
$p+=2;
|
$p+=2;
|
||||||
$s=int(sqrt($p));
|
$s=int(sqrt($p));
|
||||||
|
|
||||||
for ($i=0; $primes[$i]<=$s; $i++)
|
for ($i=0; defined($primes[$i]) && $primes[$i]<=$s; $i++)
|
||||||
{
|
{
|
||||||
next loop if (($p%$primes[$i]) == 0);
|
next loop if (($p%$primes[$i]) == 0);
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user