- 08 12月, 2014 2 次提交
-
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
- 08 6月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Update/fix prototypes in fips.h
-
- 11 5月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
the FIPS capable OpenSSL.
-
- 22 4月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 07 4月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
from DSA copy q across and if q present generate DH key in the correct range.
-
- 09 3月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 04 2月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
that use it.
-
- 26 1月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 28 3月, 2007 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Matthew D Wood Reviewed by: Bodo Moeller
-
- 29 9月, 2006 1 次提交
-
-
由 Mark J. Cox 提交于
Steve Kiernan
-
- 28 9月, 2006 1 次提交
-
-
由 Bodo Möller 提交于
cause a denial of service. (CVE-2006-2940) [Steve Henson, Bodo Moeller]
-
- 14 3月, 2006 1 次提交
-
-
由 Nils Larsch 提交于
-
- 22 8月, 2005 1 次提交
-
-
由 Ben Laurie 提交于
-
- 27 5月, 2005 1 次提交
-
-
由 Bodo Möller 提交于
-
- 16 5月, 2005 1 次提交
-
-
由 Bodo Möller 提交于
timing attacks. BN_FLG_EXP_CONSTTIME requests this algorithm, and this done by default for RSA/DSA/DH private key computations unless RSA_FLAG_NO_EXP_CONSTTIME/DSA_FLAG_NO_EXP_CONSTTIME/ DH_FLAG_NO_EXP_CONSTTIME is set. Submitted by: Matthew D Wood Reviewed by: Bodo Moeller
-
- 28 4月, 2005 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 27 4月, 2005 3 次提交
-
-
由 Dr. Stephen Henson 提交于
casts.
-
由 Dr. Stephen Henson 提交于
The function rsa_eay_mont_helper() has been removed because it is no longer needed after this change.
-
由 Bodo Möller 提交于
("perl util/ck_errf.pl */*.c */*/*.c" still reports many more.)
-
- 08 4月, 2003 1 次提交
-
-
由 Richard Levitte 提交于
of unneeded includes of openssl/engine.h.
-
- 31 1月, 2003 1 次提交
-
-
由 Richard Levitte 提交于
PR: 287
-
- 15 1月, 2003 1 次提交
-
-
由 Geoff Thorpe 提交于
override key-generation implementations by placing handlers in the methods for DSA and DH. Also, parameter generation for DSA and DH is possible by another new handler for each method.
-
- 26 9月, 2001 1 次提交
-
-
由 Geoff Thorpe 提交于
ENGINE surgery. DH, DSA, RAND, and RSA now use *both* "method" and ENGINE pointers to manage their hooking with ENGINE. Previously their use of "method" pointers was replaced by use of ENGINE references. See crypto/engine/README for details. Also, remove the ENGINE iterations from evp_test - even when the cipher/digest code is committed in, this functionality would require a different set of API calls.
-
- 28 7月, 2001 2 次提交
-
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
- 26 7月, 2001 2 次提交
-
-
由 Bodo Möller 提交于
or bogus DH parameters can be used for launching DOS attacks
-
由 Bodo Möller 提交于
-
- 08 3月, 2001 1 次提交
-
-
由 Bodo Möller 提交于
Incease the number of BIGNUMs in a BN_CTX.
-
- 21 2月, 2001 1 次提交
-
-
由 Ulf Möller 提交于
-
- 20 2月, 2001 1 次提交
-
-
由 Ulf Möller 提交于
-
- 07 11月, 2000 1 次提交
-
-
由 Richard Levitte 提交于
-
- 27 10月, 2000 1 次提交
-
-
由 Richard Levitte 提交于
At the same time, add VMS support for Rijndael.
-
- 08 6月, 2000 1 次提交
-
-
由 Bodo Möller 提交于
-
- 05 2月, 2000 1 次提交
-
-
由 Ulf Möller 提交于
temporary BIGNUMs. BN_CTX still uses a fixed number of BIGNUMs, but the BN_CTX implementation could now easily be changed.
-
- 24 8月, 1999 1 次提交
-
-
由 Dr. Stephen Henson 提交于
DSA_METHOD to make it more consistent with RSA_METHOD.
-
- 24 4月, 1999 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Reviewed by: PR:
-
- 20 4月, 1999 1 次提交
-
-
由 Ulf Möller 提交于
-
- 21 12月, 1998 2 次提交
-
-
由 Ralf S. Engelschall 提交于
-
由 Ralf S. Engelschall 提交于
-