1. 24 5月, 2016 1 次提交
  2. 18 5月, 2016 1 次提交
  3. 27 1月, 2016 1 次提交
    • R
      Remove /* foo.c */ comments · 34980760
      Rich Salz 提交于
      This was done by the following
              find . -name '*.[ch]' | /tmp/pl
      where /tmp/pl is the following three-line script:
              print unless $. == 1 && m@/\* .*\.[ch] \*/@;
              close ARGV if eof; # Close file to reset $.
      
      And then some hand-editing of other files.
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      34980760
  4. 05 11月, 2015 1 次提交
  5. 23 5月, 2015 1 次提交
    • M
      Reject negative shifts for BN_rshift and BN_lshift · 7cc18d81
      Matt Caswell 提交于
      The functions BN_rshift and BN_lshift shift their arguments to the right or
      left by a specified number of bits. Unpredicatable results (including
      crashes) can occur if a negative number is supplied for the shift value.
      
      Thanks to Mateusz Kocielski (LogicalTrust), Marek Kroemeke and Filip Palian
      for discovering and reporting this issue.
      Reviewed-by: NKurt Roeckx <kurt@openssl.org>
      7cc18d81
  6. 27 4月, 2015 1 次提交
  7. 22 1月, 2015 1 次提交
  8. 09 12月, 2014 1 次提交
  9. 14 6月, 2013 1 次提交
    • A
      Add secure DSA nonce flag. · 8a99cb29
      Adam Langley 提交于
      This change adds the option to calculate (EC)DSA nonces by hashing the
      message and private key along with entropy to avoid leaking the private
      key if the PRNG fails.
      8a99cb29
  10. 05 6月, 2013 1 次提交
  11. 19 4月, 2007 1 次提交
  12. 22 11月, 2006 1 次提交
  13. 16 5月, 2005 1 次提交
    • B
      Implement fixed-window exponentiation to mitigate hyper-threading · 46a64376
      Bodo Möller 提交于
      timing attacks.
      
      BN_FLG_EXP_CONSTTIME requests this algorithm, and this done by default for
      RSA/DSA/DH private key computations unless
      RSA_FLAG_NO_EXP_CONSTTIME/DSA_FLAG_NO_EXP_CONSTTIME/
      DH_FLAG_NO_EXP_CONSTTIME is set.
      
      Submitted by: Matthew D Wood
      Reviewed by: Bodo Moeller
      46a64376
  14. 11 5月, 2005 1 次提交
    • B
      Fix more error codes. · 8afca8d9
      Bodo Möller 提交于
      (Also improve util/ck_errf.pl script, and occasionally
      fix source code formatting.)
      8afca8d9
  15. 27 4月, 2005 2 次提交
    • N
      some updates for the blinding code; summary: · 800e400d
      Nils Larsch 提交于
      - possibility of re-creation of the blinding parameters after a
        fixed number of uses (suggested by Bodo)
      - calculatition of the rsa::e in case it's absent and p and q
        are present (see bug report #785)
      - improve the performance when if one rsa structure is shared by
        more than a thread (see bug report #555)
      - fix the problem described in bug report #827
      - hide the definition ot the BN_BLINDING structure in bn_blind.c
      800e400d
    • B
      Fix various incorrect error function codes. · aa4ce731
      Bodo Möller 提交于
      ("perl util/ck_errf.pl */*.c */*/*.c" still reports many more.)
      aa4ce731
  16. 13 4月, 2005 1 次提交
  17. 06 7月, 2004 1 次提交
  18. 21 3月, 2003 1 次提交
  19. 02 8月, 2002 1 次提交
    • B
      Binary field arithmetic contributed by Sun Microsystems. · 1dc920c8
      Bodo Möller 提交于
      The 'OPENSSL_NO_SUN_DIV' default is still subject to change,
      so I didn't bother to finish the CHANGES entry yet.
      
      Submitted by: Douglas Stebila <douglas.stebila@sun.com>, Sheueling Chang <sheueling.chang@sun.com>
      (CHANGES entry by Bodo Moeller)
      1dc920c8
  20. 20 2月, 2001 1 次提交
    • R
      Make all configuration macros available for application by making · cf1b7d96
      Richard Levitte 提交于
      sure they are available in opensslconf.h, by giving them names starting
      with "OPENSSL_" to avoid conflicts with other packages and by making
      sure e_os2.h will cover all platform-specific cases together with
      opensslconf.h.
      
      I've checked fairly well that nothing breaks with this (apart from
      external software that will adapt if they have used something like
      NO_KRB5), but I can't guarantee it completely, so a review of this
      change would be a good thing.
      cf1b7d96
  21. 08 2月, 2001 1 次提交
    • B
      Integrate my implementation of a countermeasure against · 35ed8cb8
      Bodo Möller 提交于
      Bleichenbacher's DSA attack.  With this implementation, the expected
      number of iterations never exceeds 2.
      
      New semantics for BN_rand_range():
      BN_rand_range(r, min, range) now generates r such that
           min <= r < min+range.
      (Previously, BN_rand_range(r, min, max) generated r such that
           min <= r < max.
      It is more convenient to have the range; also the previous
      prototype was misleading because max was larger than
      the actual maximum.)
      35ed8cb8
  22. 04 12月, 2000 1 次提交
  23. 03 12月, 2000 1 次提交
  24. 30 11月, 2000 1 次提交
  25. 29 11月, 2000 1 次提交
    • B
      Expand expspeed.c to make BN_kronecker timings. · a08bcccc
      Bodo Möller 提交于
      This caused a segmentation fault in calls to malloc, so I cleaned up
      bn_lib.c a little so that it is easier to see what is going on.
      The bug turned out to be an off-by-one error in BN_bin2bn.
      a08bcccc
  26. 27 11月, 2000 1 次提交
  27. 09 6月, 2000 1 次提交
  28. 08 6月, 2000 1 次提交
  29. 05 3月, 2000 1 次提交
  30. 06 2月, 2000 1 次提交
  31. 05 2月, 2000 1 次提交
  32. 24 4月, 1999 2 次提交
  33. 20 4月, 1999 1 次提交
  34. 19 4月, 1999 1 次提交
  35. 28 1月, 1999 1 次提交
  36. 22 12月, 1998 1 次提交
  37. 21 12月, 1998 2 次提交