- 12 5月, 2014 2 次提交
-
-
由 Kurt Roeckx 提交于
-
由 Martin Brejcha 提交于
PR: 3327
-
- 09 5月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
If the key type does not match any CMS recipient type return an error instead of using a random key (MMA mitigation). This does not leak any useful information to an attacker. PR#3348
-
- 08 5月, 2014 1 次提交
-
-
由 Matt Caswell 提交于
-
- 07 5月, 2014 2 次提交
-
-
由 Geoff Thorpe 提交于
This patch resolves RT ticket #2608. Thanks to Robert Dugal for originally spotting this, and to David Ramos for noticing that the ball had been dropped. Signed-off-by: NGeoff Thorpe <geoff@openssl.org>
-
由 Geoff Thorpe 提交于
The lazy-initialisation of BN_MONT_CTX was serialising all threads, as noted by Daniel Sands and co at Sandia. This was to handle the case that 2 or more threads race to lazy-init the same context, but stunted all scalability in the case where 2 or more threads are doing unrelated things! We favour the latter case by punishing the former. The init work gets done by each thread that finds the context to be uninitialised, and we then lock the "set" logic after that work is done - the winning thread's work gets used, the losing threads throw away what they've done. Signed-off-by: NGeoff Thorpe <geoff@openssl.org>
-
- 06 5月, 2014 3 次提交
-
-
由 Dr. Stephen Henson 提交于
PR#3289 PR#3345
-
由 Dr. Stephen Henson 提交于
-
由 Tim Hudson 提交于
-
- 04 5月, 2014 6 次提交
-
-
由 Andy Polyakov 提交于
[MD5 is hardly relevant, just cleaning up repository]
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
sha/asm/sha256-armv4.pl: add ARMv8 code path.
-
由 Andy Polyakov 提交于
-
由 David Ramos 提交于
PR: 3338
-
- 02 5月, 2014 1 次提交
-
-
由 Geoff Thorpe 提交于
Even though the meat of dso_vms.c is compiled out on non-VMS builds, the (pre-)compiler still traverses some of the macro handling. This trips up at least one non-VMS build configuration, so this commit makes the skip-VMS case more robust. Signed-off-by: NGeoff Thorpe <geoff@openssl.org>
-
- 30 4月, 2014 1 次提交
-
-
由 Geoff Thorpe 提交于
It's not clear whether this inconsistency could lead to an actual computation error, but it involved a BIGNUM being passed around the montgomery logic in an inconsistent state. This was found using flags -DBN_DEBUG -DBN_DEBUG_RAND, and working backwards from this assertion in 'ectest'; ectest: bn_mul.c:960: BN_mul: Assertion `(_bnum2->top == 0) || (_bnum2->d[_bnum2->top - 1] != 0)' failed Signed-off-by: NGeoff Thorpe <geoff@openssl.org>
-
- 26 4月, 2014 2 次提交
-
-
由 mancha 提交于
Fix eckey_priv_encode to return an error on failure of i2d_ECPrivateKey.
-
由 Geoff Thorpe 提交于
-
- 24 4月, 2014 2 次提交
-
-
由 Andy Polyakov 提交于
algorithm suggested in following paper: Câmara, D.; Gouvêa, C. P. L.; López, J. & Dahab, R.: Fast Software Polynomial Multiplication on ARM Processors using the NEON Engine. http://conradoplg.cryptoland.net/files/2010/12/mocrysen13.pdf
-
由 Andy Polyakov 提交于
-
- 22 4月, 2014 1 次提交
-
-
由 Ben Laurie 提交于
-
- 16 4月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
When looking for an extension we need to set the last found position to -1 to properly search all extensions. PR#3309.
-
- 09 4月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 08 4月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Treat a zero length passed to ssleay_rand_add a no op: the existing logic zeroes the md value which is very bad. OpenSSL itself never does this internally and the actual call doesn't make sense as it would be passing zero bytes of entropy. Thanks to Marcus Meissner <meissner@suse.de> for reporting this bug. (cherry picked from commit 5be1ae28ef3c4bdec95b94f14e0e939157be550a)
-
- 06 4月, 2014 2 次提交
-
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
- 03 4月, 2014 1 次提交
-
-
由 Eric Young 提交于
A short PEM encoded sequence if passed to the BIO, and the file had 2 \n following would fail. PR#3289
-
- 01 4月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Add additional check to catch this in ASN1_item_verify too. (cherry picked from commit 66e8211c0b1347970096e04b18aa52567c325200)
-
- 28 3月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Add functions to return the "bits of security" for various public key algorithms. Based on SP800-57.
-
- 20 3月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Some CMS SignedData structure use a signature algorithm OID such as SHA1WithRSA instead of the RSA algorithm OID. Workaround this case by tolerating the signature if we recognise the OID.
-
- 12 3月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Fix for the attack described in the paper "Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack" by Yuval Yarom and Naomi Benger. Details can be obtained from: http://eprint.iacr.org/2014/140 Thanks to Yuval Yarom and Naomi Benger for discovering this flaw and to Yuval Yarom for supplying a fix. (cherry picked from commit 2198be3483259de374f91e57d247d0fc667aef29) Conflicts: CHANGES
-
- 07 3月, 2014 1 次提交
-
-
由 Andy Polyakov 提交于
The problem is that OpenSSH calls EVP_Cipher, which is not as protective as EVP_CipherUpdate. Formally speaking we ought to do more checks in *_cipher methods, including rejecting lengths not divisible by block size (unless ciphertext stealing is in place). But for now I implement check for zero length in low-level based on precedent. PR: 3087, 2775
-
- 06 3月, 2014 2 次提交
-
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
Submitted by: Roumen Petrov
-
- 04 3月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
(cherry picked from commit bdfc0e284c89dd5781259cc19aa264aded538492)
-
- 02 3月, 2014 2 次提交
-
-
由 Dr. Stephen Henson 提交于
Add option to set an alternative to the default hmacWithSHA1 PRF for PKCS#8 private key encryptions. This is used automatically by PKCS8_encrypt if the nid specified is a PRF. Add option to pkcs8 utility. Update docs. (cherry picked from commit b60272b01fcb4f69201b3e1659b4f7e9e9298dfb)
-
由 Dr. Stephen Henson 提交于
(cherry picked from commit 124d218889dfca33d277404612f1319afe04107e)
-
- 27 2月, 2014 2 次提交
-
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-