Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
4960411e
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
大约 1 年 前同步成功
通知
9
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
体验新版 GitCode,发现更多精彩内容 >>
提交
4960411e
编写于
6月 08, 2011
作者:
D
Dr. Stephen Henson
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
Add flags for DH FIPS method.
Update/fix prototypes in fips.h
上级
6b6abd62
变更
3
隐藏空白更改
内联
并排
Showing
3 changed file
with
25 addition
and
7 deletion
+25
-7
crypto/dh/dh.h
crypto/dh/dh.h
+15
-0
crypto/dh/dh_key.c
crypto/dh/dh_key.c
+1
-1
fips/fips.h
fips/fips.h
+9
-6
未找到文件。
crypto/dh/dh.h
浏览文件 @
4960411e
...
...
@@ -88,6 +88,21 @@
* be used for all exponents.
*/
/* If this flag is set the DH method is FIPS compliant and can be used
* in FIPS mode. This is set in the validated module method. If an
* application sets this flag in its own methods it is its reposibility
* to ensure the result is compliant.
*/
#define DH_FLAG_FIPS_METHOD 0x0400
/* If this flag is set the operations normally disabled in FIPS mode are
* permitted it is then the applications responsibility to ensure that the
* usage is compliant.
*/
#define DH_FLAG_NON_FIPS_ALLOW 0x0400
#ifdef __cplusplus
extern
"C"
{
#endif
...
...
crypto/dh/dh_key.c
浏览文件 @
4960411e
...
...
@@ -108,7 +108,7 @@ compute_key,
dh_bn_mod_exp
,
dh_init
,
dh_finish
,
0
,
DH_FLAG_FIPS_METHOD
,
NULL
,
NULL
};
...
...
fips/fips.h
浏览文件 @
4960411e
...
...
@@ -74,6 +74,7 @@ struct evp_cipher_st;
struct
evp_cipher_ctx_st
;
struct
ec_method_st
;
struct
ecdsa_method
;
struct
dh_method
;
int
FIPS_module_mode_set
(
int
onoff
);
int
FIPS_module_mode
(
void
);
...
...
@@ -275,16 +276,18 @@ const EVP_MD *FIPS_evp_ecdsa(void);
const
RSA_METHOD
*
FIPS_rsa_pkcs1_ssleay
(
void
);
int
FIPS_rsa_generate_key_ex
(
RSA
*
rsa
,
int
bits
,
BIGNUM
*
e
,
BN_GENCB
*
cb
);
struct
ec_method_st
*
fips_ec_gf2m_simple_method
(
void
);
struct
ec_method_st
*
fips_ec_gfp_simple_method
(
void
);
struct
ec_method_st
*
fips_ec_gfp_mont_method
(
void
);
struct
ec_method_st
*
fips_ec_gfp_nist_method
(
void
);
const
struct
ec_method_st
*
fips_ec_gf2m_simple_method
(
void
);
const
struct
ec_method_st
*
fips_ec_gfp_simple_method
(
void
);
const
struct
ec_method_st
*
fips_ec_gfp_mont_method
(
void
);
const
struct
ec_method_st
*
fips_ec_gfp_nist_method
(
void
);
struct
ecdsa_method
*
FIPS_ecdsa_openssl
(
void
);
struct
ecdh_method
*
FIPS_ecdh_openssl
(
void
);
const
struct
ecdsa_method
*
FIPS_ecdsa_openssl
(
void
);
const
struct
ecdh_method
*
FIPS_ecdh_openssl
(
void
);
int
FIPS_ec_key_generate_key
(
struct
ec_key_st
*
key
);
const
struct
dh_method
*
FIPS_dh_openssl
(
void
);
#endif
/* Where necessary redirect standard OpenSSL APIs to FIPS versions */
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录