1. 17 1月, 2018 1 次提交
  2. 11 1月, 2018 1 次提交
  3. 09 1月, 2018 3 次提交
  4. 06 1月, 2018 1 次提交
  5. 29 12月, 2017 1 次提交
  6. 22 12月, 2017 1 次提交
  7. 16 12月, 2017 1 次提交
  8. 13 12月, 2017 2 次提交
  9. 10 12月, 2017 1 次提交
  10. 30 11月, 2017 1 次提交
  11. 29 11月, 2017 1 次提交
  12. 28 11月, 2017 1 次提交
  13. 24 11月, 2017 2 次提交
  14. 21 11月, 2017 1 次提交
    • P
      Support multi-prime RSA (RFC 8017) · 665d899f
      Paul Yang 提交于
      * Introduce RSA_generate_multi_prime_key to generate multi-prime
        RSA private key. As well as the following functions:
          RSA_get_multi_prime_extra_count
          RSA_get0_multi_prime_factors
          RSA_get0_multi_prime_crt_params
          RSA_set0_multi_prime_params
          RSA_get_version
      * Support EVP operations for multi-prime RSA
      * Support ASN.1 operations for multi-prime RSA
      * Support multi-prime check in RSA_check_key_ex
      * Support multi-prime RSA in apps/genrsa and apps/speed
      * Support multi-prime RSA manipulation functions
      * Test cases and documentation are added
      * CHANGES is updated
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      Reviewed-by: NBernd Edlinger <bernd.edlinger@hotmail.de>
      (Merged from https://github.com/openssl/openssl/pull/4241)
      665d899f
  15. 20 11月, 2017 1 次提交
  16. 13 11月, 2017 1 次提交
  17. 12 11月, 2017 1 次提交
  18. 09 11月, 2017 1 次提交
  19. 08 11月, 2017 1 次提交
  20. 06 11月, 2017 3 次提交
  21. 31 10月, 2017 5 次提交
  22. 26 10月, 2017 5 次提交
  23. 20 10月, 2017 1 次提交
  24. 18 10月, 2017 2 次提交
    • D
      Fix reseeding issues of the public RAND_DRBG · c16de9d8
      Dr. Matthias St. Pierre 提交于
      Reseeding is handled very differently by the classic RAND_METHOD API
      and the new RAND_DRBG api. These differences led to some problems when
      the new RAND_DRBG was made the default OpenSSL RNG. In particular,
      RAND_add() did not work as expected anymore. These issues are discussed
      on the thread '[openssl-dev] Plea for a new public OpenSSL RNG API'
      and in Pull Request #4328. This commit fixes the mentioned issues,
      introducing the following changes:
      
      - Replace the fixed size RAND_BYTES_BUFFER by a new RAND_POOL API which
        facilitates collecting entropy by the get_entropy() callback.
      - Don't use RAND_poll()/RAND_add() for collecting entropy from the
        get_entropy() callback anymore. Instead, replace RAND_poll() by
        RAND_POOL_acquire_entropy().
      - Add a new function rand_drbg_restart() which tries to get the DRBG
        in an instantiated state by all means, regardless of the current
        state (uninstantiated, error, ...) the DRBG is in. If the caller
        provides entropy or additional input, it will be used for reseeding.
      - Restore the original documented behaviour of RAND_add() and RAND_poll()
        (namely to reseed the DRBG immediately) by a new implementation based
        on rand_drbg_restart().
      - Add automatic error recovery from temporary failures of the entropy
        source to RAND_DRBG_generate() using the rand_drbg_restart() function.
      Reviewed-by: NPaul Dale <paul.dale@oracle.com>
      Reviewed-by: NKurt Roeckx <kurt@roeckx.be>
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      Reviewed-by: NBen Kaduk <kaduk@mit.edu>
      (Merged from https://github.com/openssl/openssl/pull/4328)
      c16de9d8
    • R
      fe7a4d7c
  25. 16 10月, 2017 1 次提交