- 16 11月, 2011 1 次提交
-
-
由 Ben Laurie 提交于
-
- 13 11月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 06 11月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
an induced error checking function.
-
- 05 11月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 02 11月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 20 10月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 19 10月, 2011 3 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Emilia Kasper (Google)
-
由 Bodo Möller 提交于
Also, use the common Configure mechanism for enabling/disabling the 64-bit ECC code.
-
由 Bodo Möller 提交于
NIST-P521. (Now -DEC_NISTP_64_GCC_128 enables all three of these; -DEC_NISTP224_64_GCC_128 no longer works.) Submitted by: Google Inc.
-
- 13 10月, 2011 2 次提交
-
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
Submitted by: Bob Buckholz <bbuckholz@google.com>
-
- 10 10月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 30 9月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 22 9月, 2011 2 次提交
-
-
由 Dr. Stephen Henson 提交于
Add explanatory comments to health check code.
-
由 Dr. Stephen Henson 提交于
One demand health check function. Perform generation test in fips_test_suite. Option to skip dh test if fips_test_suite.
-
- 14 9月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 13 9月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
for all DRBG combinations.
-
- 10 9月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
tests and POST code.
-
- 06 9月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
produce an error (CVE-2011-3207)
-
- 05 9月, 2011 5 次提交
-
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
Submitted by: Adam Langley
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
- 26 8月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Modify fips_dssvs to support appropriate file format.
-
- 24 8月, 2011 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 14 8月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
using OBJ xref utilities instead of string comparison with OID name. This removes the arbitrary restriction on using SHA1 only with some ECC ciphersuites.
-
- 09 8月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 03 8月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
invocation field. Add complete support for AES GCM ciphersuites including all those in RFC5288 and RFC5289.
-
- 26 7月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 05 7月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 15 6月, 2011 1 次提交
-
-
由 Bodo Möller 提交于
into 1.0.1 should not be listed as "changes between 1.0.1 and 1.0.0". This makes the OpenSSL_1_0_1-stable and HEAD versions of this file consistent with each other (the HEAD version has the additional 1.1.0 section, but doesn't otherwise differ).
-
- 31 5月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 25 5月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
http://eprint.iacr.org/2011/232.pdf Thanks to the original authors Billy Bob Brumley and Nicola Tuveri for bringing this to our attention.
-
- 20 5月, 2011 3 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Alexei Khlebnikov <alexei.khlebnikov@opera.com> Reviewed by: steve OOM checking. Leak in OOM fix. Fall-through comment. Duplicate code elimination.
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
- 13 5月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Parse certificate request message and set digests appropriately. Generate new TLS v1.2 format certificate verify message. Keep handshake caches around for longer as they are needed for client auth.
-
- 11 5月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
the FIPS capable OpenSSL.
-
- 09 5月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
algorithms extension (including everything we support). Swicth to new signature format where needed and relax ECC restrictions. Not TLS v1.2 client certifcate support yet but client will handle case where a certificate is requested and we don't have one.
-