- 08 12月, 2014 4 次提交
-
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
- 29 11月, 2014 1 次提交
-
-
由 Rich Salz 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
- 10 9月, 2014 1 次提交
-
-
由 Matt Caswell 提交于
This is funny; Ben commented in the source, Matt opend a ticket, and Rich is doing the submit. Need more code-review? :) Reviewed-by: NDr. Stephen Henson <steve@openssl.org>
-
- 09 9月, 2014 1 次提交
-
-
由 Kurt Roeckx 提交于
This is a more comprehensive fix. It changes all keygen apps to use 2K keys. It also changes the default to use SHA256 not SHA1. This is from Kurt's upstream Debian changes. Reviewed-by: NRich Salz <rsalz@openssl.org> Reviewed-by: NKurt Roeckx <kurt@openssl.org>
-
- 30 8月, 2014 1 次提交
-
-
由 Rich Salz 提交于
Reviewed-by: NAndy Polyakov <appro@openssl.org>
-
- 22 8月, 2014 1 次提交
-
-
由 Emilia Kasper 提交于
Add an extra NULL dereference check Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
-
- 28 3月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Add functions to return the "bits of security" for various public key algorithms. Based on SP800-57.
-
- 06 9月, 2013 1 次提交
-
-
- 18 7月, 2013 2 次提交
-
-
由 Dr. Stephen Henson 提交于
For RSA and DSA keys return an appropriate RecipientInfo type. By setting CMS_RECIPINFO_NONE for DSA keys an appropriate error is returned if an attempt is made to use DSA with enveloped data.
-
由 Dr. Stephen Henson 提交于
Keep original function names for nonce versions so we don't have to change error function codes.
-
- 15 7月, 2013 1 次提交
-
-
由 Adam Langley 提交于
This change updates 8a99cb29 to make the generation of (EC)DSA nonces using the message digest the default. It also reverts the changes to (EC)DSA_METHOD structure. In addition to making it the default, removing the flag from EC_KEY means that FIPS modules will no longer have an ABI mismatch.
-
- 22 6月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 14 6月, 2013 2 次提交
-
-
由 Adam Langley 提交于
This change adds the option to calculate (EC)DSA nonces by hashing the message and private key along with entropy to avoid leaking the private key if the PRNG fails.
-
由 Adam Langley 提交于
-
- 04 6月, 2012 1 次提交
-
-
由 Ben Laurie 提交于
-
- 26 11月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 25 11月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 05 11月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 16 10月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 15 9月, 2011 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 05 9月, 2011 1 次提交
-
-
由 Bodo Möller 提交于
-
- 27 8月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 26 8月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Modify fips_dssvs to support appropriate file format.
-
- 21 6月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 11 5月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
the FIPS capable OpenSSL.
-
- 08 5月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 24 4月, 2011 5 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Richard Levitte 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
- 19 4月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 14 4月, 2011 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
allow status of POST to be monitored and/or failures induced.
-
- 07 4月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
from DSA copy q across and if q present generate DH key in the correct range.
-
- 04 4月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 25 3月, 2011 1 次提交
-
-
由 Richard Levitte 提交于
-