1. 18 10月, 2017 1 次提交
  2. 26 6月, 2017 1 次提交
  3. 26 1月, 2017 1 次提交
  4. 25 1月, 2017 1 次提交
  5. 25 6月, 2016 2 次提交
  6. 18 5月, 2016 1 次提交
  7. 09 4月, 2016 1 次提交
  8. 29 1月, 2016 1 次提交
  9. 28 1月, 2016 1 次提交
    • M
      Prevent small subgroup attacks on DH/DHE · b128abc3
      Matt Caswell 提交于
      Historically OpenSSL only ever generated DH parameters based on "safe"
      primes. More recently (in version 1.0.2) support was provided for
      generating X9.42 style parameter files such as those required for RFC
      5114 support. The primes used in such files may not be "safe". Where an
      application is using DH configured with parameters based on primes that
      are not "safe" then an attacker could use this fact to find a peer's
      private DH exponent. This attack requires that the attacker complete
      multiple handshakes in which the peer uses the same DH exponent.
      
      A simple mitigation is to ensure that y^q (mod p) == 1
      
      CVE-2016-0701
      
      Issue reported by Antonio Sanso.
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      b128abc3
  10. 27 1月, 2016 1 次提交
    • R
      Remove /* foo.c */ comments · 34980760
      Rich Salz 提交于
      This was done by the following
              find . -name '*.[ch]' | /tmp/pl
      where /tmp/pl is the following three-line script:
              print unless $. == 1 && m@/\* .*\.[ch] \*/@;
              close ARGV if eof; # Close file to reset $.
      
      And then some hand-editing of other files.
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      34980760
  11. 14 5月, 2015 1 次提交
  12. 01 5月, 2015 1 次提交
    • R
      free NULL cleanup 7 · 23a1d5e9
      Rich Salz 提交于
      This gets BN_.*free:
          BN_BLINDING_free BN_CTX_free BN_FLG_FREE BN_GENCB_free
          BN_MONT_CTX_free BN_RECP_CTX_free BN_clear_free BN_free BUF_MEM_free
      
      Also fix a call to DSA_SIG_free to ccgost engine and remove some #ifdef'd
      dead code in engines/e_ubsec.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      23a1d5e9
  13. 04 2月, 2015 1 次提交
  14. 22 1月, 2015 1 次提交
  15. 31 12月, 2014 1 次提交
  16. 06 3月, 2014 1 次提交
  17. 02 12月, 2011 1 次提交
  18. 24 9月, 2007 1 次提交
    • L
      Typos · 5f0477f4
      Lutz Jänicke 提交于
      PR: 1578
      Submitted by: Charles Longeau <chl@tuxfamily.org>
      5f0477f4
  19. 22 8月, 2005 1 次提交
  20. 08 12月, 2002 1 次提交
    • G
      This is a first-cut at improving the callback mechanisms used in · e9224c71
      Geoff Thorpe 提交于
      key-generation and prime-checking functions. Rather than explicitly passing
      callback functions and caller-defined context data for the callbacks, a new
      structure BN_GENCB is defined that encapsulates this; a pointer to the
      structure is passed to all such functions instead.
      
      This wrapper structure allows the encapsulation of "old" and "new" style
      callbacks - "new" callbacks return a boolean result on the understanding
      that returning FALSE should terminate keygen/primality processing.  The
      BN_GENCB abstraction will allow future callback modifications without
      needing to break binary compatibility nor change the API function
      prototypes. The new API functions have been given names ending in "_ex" and
      the old functions are implemented as wrappers to the new ones.  The
      OPENSSL_NO_DEPRECATED symbol has been introduced so that, if defined,
      declaration of the older functions will be skipped. NB: Some
      openssl-internal code will stick with the older callbacks for now, so
      appropriate "#undef" logic will be put in place - this is in case the user
      is *building* openssl (rather than *including* its headers) with this
      symbol defined.
      
      There is another change in the new _ex functions; the key-generation
      functions do not return key structures but operate on structures passed by
      the caller, the return value is a boolean. This will allow for a smoother
      transition to having key-generation as "virtual function" in the various
      ***_METHOD tables.
      e9224c71
  21. 07 11月, 2000 1 次提交
  22. 23 1月, 2000 1 次提交
  23. 12 1月, 2000 1 次提交
  24. 24 4月, 1999 1 次提交
  25. 20 4月, 1999 1 次提交
  26. 21 12月, 1998 2 次提交