- 08 12月, 2014 4 次提交
-
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
- 29 11月, 2014 1 次提交
-
-
由 Rich Salz 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
- 20 11月, 2014 1 次提交
-
-
由 Matt Caswell 提交于
ECDH_compute_key is silently ignored and the KDF is run on duff data Thanks to github user tomykaira for the suggested fix. Reviewed-by: NDr. Stephen Henson <steve@openssl.org>
-
- 13 11月, 2014 1 次提交
-
-
由 Matt Caswell 提交于
Reviewed-by: NEmilia Käsper <emilia@openssl.org>
-
- 29 10月, 2014 1 次提交
-
-
由 Andy Polyakov 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
- 23 10月, 2014 1 次提交
-
-
由 Andy Polyakov 提交于
Facilitate switch to custom scatter-gather routines. This modification does not change algorithms, only makes it possible to implement alternative. This is achieved by a) moving precompute table to assembly (perlasm parses ecp_nistz256_table.c and is free to rearrange data to match gathering algorithm); b) adhering to explicit scatter subroutine (which for now is simply a memcpy). First implementations that will use this option are 32-bit assembly implementations, ARMv4 and x86, where equivalent of current read-whole-table-select-single-value algorithm is too time-consuming. [On side note, switching to scatter-gather on x86_64 would allow to improve server-side ECDSA performance by ~5%]. Reviewed-by: NBodo Moeller <bodo@openssl.org>
-
- 21 9月, 2014 1 次提交
-
-
由 Andy Polyakov 提交于
Reviewed-by: NDr. Stephen Henson <steve@openssl.org>
-
- 20 9月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
- 12 9月, 2014 2 次提交
-
-
由 Andy Polyakov 提交于
RT: 3149 Reviewed-by: NRich Salz <rsalz@openssl.org>
-
由 Andy Polyakov 提交于
Submitted by Shay Gueron, Intel Corp. RT: 3149 Reviewed-by: NRich Salz <rsalz@openssl.org>
-
- 09 9月, 2014 1 次提交
-
-
由 Kurt Roeckx 提交于
This is a more comprehensive fix. It changes all keygen apps to use 2K keys. It also changes the default to use SHA256 not SHA1. This is from Kurt's upstream Debian changes. Reviewed-by: NRich Salz <rsalz@openssl.org> Reviewed-by: NKurt Roeckx <kurt@openssl.org>
-
- 31 8月, 2014 1 次提交
-
-
由 Andy Polyakov 提交于
Reviewed-by: NRich Salz <rsalz@openssl.org>
-
- 30 8月, 2014 1 次提交
-
-
由 Matt Caswell 提交于
PR2693 Reviewed-by: NTim Hudson <tjh@openssl.org>
-
- 28 8月, 2014 3 次提交
-
-
由 Emilia Kasper 提交于
The old code implicitly relies on the ASN.1 code returning a \0-prefixed buffer when the buffer length is 0. Change this to verify explicitly that the ASN.1 string has positive length. Reviewed-by: NDr Stephen Henson <steve@openssl.org>
-
由 Matt Caswell 提交于
When d2i_ECPrivateKey reads a private key with a missing (optional) public key, generate one automatically from the group and private key. Reviewed-by: NDr Stephen Henson <steve@openssl.org>
-
由 Adam Langley 提交于
This change saves several EC routines from crashing when an EC_KEY is missing a public key. The public key is optional in the EC private key format and, without this patch, running the following through `openssl ec` causes a crash: -----BEGIN EC PRIVATE KEY----- MBkCAQEECAECAwQFBgcIoAoGCCqGSM49AwEH -----END EC PRIVATE KEY----- Reviewed-by: NDr Stephen Henson <steve@openssl.org>
-
- 21 8月, 2014 1 次提交
-
-
由 Laszlo Papp 提交于
Reviewed-by: NDr. Stephen Henson <steve@openssl.org>
-
- 19 8月, 2014 1 次提交
-
-
由 Martin Olsson 提交于
I also found a couple of others (padlock and signinit) and fixed them. Reviewed-by: NEmilia Kasper <emilia@openssl.org>
-
- 13 8月, 2014 1 次提交
-
-
由 Bodo Moeller 提交于
group_order_tests (ectest.c). Also fix the EC_POINTs_mul documentation (ec.h). Reviewed-by: emilia@openssl.org
-
- 01 8月, 2014 1 次提交
-
-
由 Bodo Moeller 提交于
(which didn't always handle value 0 correctly). Reviewed-by: emilia@openssl.org
-
- 22 7月, 2014 1 次提交
-
-
由 Billy Brumley 提交于
PR#2569 Reviewed-by: NRich Salz <rsalz@openssl.org>
-
- 04 6月, 2014 1 次提交
-
-
由 Libor Krystek 提交于
-
- 04 5月, 2014 1 次提交
-
-
由 David Ramos 提交于
PR: 3338
-
- 26 4月, 2014 1 次提交
-
-
由 mancha 提交于
Fix eckey_priv_encode to return an error on failure of i2d_ECPrivateKey.
-
- 28 3月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Add functions to return the "bits of security" for various public key algorithms. Based on SP800-57.
-
- 12 3月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Fix for the attack described in the paper "Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack" by Yuval Yarom and Naomi Benger. Details can be obtained from: http://eprint.iacr.org/2014/140 Thanks to Yuval Yarom and Naomi Benger for discovering this flaw and to Yuval Yarom for supplying a fix. (cherry picked from commit 2198be3483259de374f91e57d247d0fc667aef29) Conflicts: CHANGES
-
- 20 2月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 09 11月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 16 9月, 2013 1 次提交
-
-
由 Bodo Moeller 提交于
- EC_GROUP_cmp shouldn't consider curves equal just because the curve name is the same. (They really *should* be the same in this case, but there's an EC_GROUP_set_curve_name API, which could be misused.) - EC_POINT_cmp shouldn't return 0 for ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED or EC_R_INCOMPATIBLE_OBJECTS errors because in a cmp API, 0 indicates equality (not an error). Reported by: king cope
-
- 06 9月, 2013 1 次提交
-
-
- 05 8月, 2013 2 次提交
-
-
由 Dr. Stephen Henson 提交于
Add X9.42 DH KDF. Move sharedinfo generation code to CMS library as the same structure is used by DH and ECDH. Move ASN1_OBJECT typedef to ossl_typ.h so it can be picked up by dh headers without the need to use ASN1.
-
由 Dr. Stephen Henson 提交于
Check and set AlgorithmIdenfier parameters for key wrap algorithms. Currently these just set parameters to NULL.
-
- 18 7月, 2013 2 次提交
-
-
由 Dr. Stephen Henson 提交于
Add support for ECDH in enveloped data. The CMS ctrls for the EC ASN1 method decode/encode the appropriate parameters from the CMS ASN1 data and send appropriate data to the EC public key method.
-
由 Dr. Stephen Henson 提交于
Add X9.62 KDF to EC EVP_PKEY_METHOD.
-
- 15 7月, 2013 1 次提交
-
-
由 Adam Langley 提交于
This change updates 8a99cb29 to make the generation of (EC)DSA nonces using the message digest the default. It also reverts the changes to (EC)DSA_METHOD structure. In addition to making it the default, removing the flag from EC_KEY means that FIPS modules will no longer have an ABI mismatch.
-
- 22 6月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 14 6月, 2013 1 次提交
-
-
由 Adam Langley 提交于
This change adds the option to calculate (EC)DSA nonces by hashing the message and private key along with entropy to avoid leaking the private key if the PRNG fails.
-