openssl/fips/dh
Richard Levitte 7f9c37457a To protect FIPS-related global variables, add locking mechanisms
around them.

NOTE: because two new locks are added, this adds potential binary
incompatibility with earlier versions in the 0.9.7 series.  However,
those locks will only ever be touched when FIPS_mode_set() is called
and after, thanks to a variable that's only changed from 0 to 1 once
(when FIPS_mode_set() is called).  So basically, as long as FIPS mode
hasn't been engaged explicitely by the calling application, the new
locks are treated as if they didn't exist at all, thus not becoming a
problem.  Applications that are built or rebuilt to use FIPS
functionality will need to be recompiled in any case, thus not being a
problem either.
2004-07-30 14:38:02 +00:00
..
.cvsignore Update ignores. 2004-06-19 13:18:01 +00:00
fingerprint.sha1 To protect FIPS-related global variables, add locking mechanisms 2004-07-30 14:38:02 +00:00
fips_dh_check.c Make sure the FIPS stuff is only really compiled when in FIPS mode. 2004-06-28 20:33:35 +00:00
fips_dh_gen.c To protect FIPS-related global variables, add locking mechanisms 2004-07-30 14:38:02 +00:00
fips_dh_key.c Make sure the FIPS stuff is only really compiled when in FIPS mode. 2004-06-28 20:33:35 +00:00
Makefile Make sure we don't try to loop over an empty EXHEADER. In the 2004-06-21 09:07:41 +00:00