1. 10 8月, 2021 1 次提交
  2. 27 2月, 2020 1 次提交
  3. 10 9月, 2019 1 次提交
  4. 31 7月, 2019 1 次提交
  5. 05 4月, 2018 1 次提交
    • M
      Pick a q size consistent with the digest for DSA param generation · d54897cf
      Matt Caswell 提交于
      There are two undocumented DSA parameter generation options available in
      the genpkey command line app:
      dsa_paramgen_md and dsa_paramgen_q_bits.
      
      These can also be accessed via the EVP API but only by using
      EVP_PKEY_CTX_ctrl() or EVP_PKEY_CTX_ctrl_str() directly. There are no
      helper macros for these options.
      
      dsa_paramgen_q_bits sets the length of q in bits (default 160 bits).
      dsa_paramgen_md sets the digest that is used during the parameter
      generation (default SHA1). In particular the output length of the digest
      used must be equal to or greater than the number of bits in q because of
      this code:
      
                  if (!EVP_Digest(seed, qsize, md, NULL, evpmd, NULL))
                      goto err;
                  if (!EVP_Digest(buf, qsize, buf2, NULL, evpmd, NULL))
                      goto err;
                  for (i = 0; i < qsize; i++)
                      md[i] ^= buf2[i];
      
                  /* step 3 */
                  md[0] |= 0x80;
                  md[qsize - 1] |= 0x01;
                  if (!BN_bin2bn(md, qsize, q))
                      goto err;
      
      qsize here is the number of bits in q and evpmd is the digest set via
      dsa_paramgen_md. md and buf2 are buffers of length SHA256_DIGEST_LENGTH.
      buf2 has been filled with qsize bits of random seed data, and md is
      uninitialised.
      
      If the output size of evpmd is less than qsize then the line "md[i] ^=
      buf2[i]" will be xoring an uninitialised value and the random seed data
      together to form the least significant bits of q (and not using the
      output of the digest at all for those bits) - which is probably not what
      was intended. The same seed is then used as an input to generating p. If
      the uninitialised data is actually all zeros (as seems quite likely)
      then the least significant bits of q will exactly match the least
      significant bits of the seed.
      
      This problem only occurs if you use these undocumented and difficult to
      find options and you set the size of q to be greater than the message
      digest output size. This is for parameter generation only not key
      generation. This scenario is considered highly unlikely and
      therefore the security risk of this is considered negligible.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/5800)
      d54897cf
  6. 08 6月, 2017 1 次提交
    • R
      make error tables const and separate header file · 52df25cf
      Rich Salz 提交于
      Run perltidy on util/mkerr
      Change some mkerr flags, write some doc comments
      Make generated tables "const" when genearting lib-internal ones.
      Add "state" file for mkerr
      Renerate error tables and headers
      Rationalize declaration of ERR_load_XXX_strings
      Fix out-of-tree build
      Add -static; sort flags/vars for options.
      Also tweak code output
      Moved engines/afalg to engines (from master)
      Use -static flag
      Standard engine #include's of errors
      Don't linewrap err string tables unless necessary
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/3392)
      52df25cf
  7. 14 11月, 2016 1 次提交
  8. 21 7月, 2016 1 次提交
  9. 20 7月, 2016 1 次提交
  10. 24 5月, 2016 1 次提交
  11. 18 5月, 2016 2 次提交
  12. 27 1月, 2016 1 次提交
    • R
      Remove /* foo.c */ comments · 34980760
      Rich Salz 提交于
      This was done by the following
              find . -name '*.[ch]' | /tmp/pl
      where /tmp/pl is the following three-line script:
              print unless $. == 1 && m@/\* .*\.[ch] \*/@;
              close ARGV if eof; # Close file to reset $.
      
      And then some hand-editing of other files.
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      34980760
  13. 05 11月, 2015 1 次提交
  14. 22 1月, 2015 1 次提交
  15. 15 7月, 2013 1 次提交
    • A
      Make `safe' (EC)DSA nonces the default. · 190c615d
      Adam Langley 提交于
      This change updates 8a99cb29 to make the generation of (EC)DSA nonces
      using the message digest the default. It also reverts the changes to
      (EC)DSA_METHOD structure.
      
      In addition to making it the default, removing the flag from EC_KEY
      means that FIPS modules will no longer have an ABI mismatch.
      190c615d
  16. 14 6月, 2013 1 次提交
    • A
      Add secure DSA nonce flag. · 8a99cb29
      Adam Langley 提交于
      This change adds the option to calculate (EC)DSA nonces by hashing the
      message and private key along with entropy to avoid leaking the private
      key if the PRNG fails.
      8a99cb29
  17. 01 2月, 2011 1 次提交
  18. 26 1月, 2011 2 次提交
  19. 09 3月, 2010 1 次提交
  20. 22 11月, 2006 1 次提交
  21. 28 9月, 2006 1 次提交
  22. 18 7月, 2006 1 次提交
  23. 12 4月, 2006 2 次提交
  24. 28 3月, 2006 1 次提交
  25. 20 3月, 2006 1 次提交
  26. 13 4月, 2005 1 次提交
  27. 21 3月, 2003 1 次提交
  28. 10 3月, 2002 1 次提交
    • D
      · 0c372b94
      Dr. Stephen Henson 提交于
      Make {RSA,DSA,DH}_new_method obtain and release an ENGINE
      functional reference in all cases.
      0c372b94
  29. 21 4月, 2001 1 次提交
    • D
      · c962479b
      Dr. Stephen Henson 提交于
      Fix ASN1 bug when decoding OTHER type.
      
      Various S/MIME DSA related fixes.
      c962479b
  30. 20 2月, 2001 1 次提交
    • R
      Make all configuration macros available for application by making · cf1b7d96
      Richard Levitte 提交于
      sure they are available in opensslconf.h, by giving them names starting
      with "OPENSSL_" to avoid conflicts with other packages and by making
      sure e_os2.h will cover all platform-specific cases together with
      opensslconf.h.
      
      I've checked fairly well that nothing breaks with this (apart from
      external software that will adapt if they have used something like
      NO_KRB5), but I can't guarantee it completely, so a review of this
      change would be a good thing.
      cf1b7d96
  31. 09 12月, 2000 1 次提交
    • D
      · 9d6b1ce6
      Dr. Stephen Henson 提交于
      Merge from the ASN1 branch of new ASN1 code
      to main trunk.
      
      Lets see if the makes it to openssl-cvs :-)
      9d6b1ce6
  32. 05 3月, 2000 1 次提交
  33. 30 1月, 2000 1 次提交
  34. 24 4月, 1999 2 次提交
  35. 20 4月, 1999 1 次提交
  36. 10 4月, 1999 1 次提交