1. 08 12月, 2014 4 次提交
  2. 29 11月, 2014 1 次提交
  3. 20 11月, 2014 1 次提交
  4. 13 11月, 2014 1 次提交
  5. 29 10月, 2014 1 次提交
  6. 23 10月, 2014 1 次提交
    • A
      ecp_nistz256 update. · 3ff08e1d
      Andy Polyakov 提交于
      Facilitate switch to custom scatter-gather routines. This modification
      does not change algorithms, only makes it possible to implement
      alternative. This is achieved by a) moving precompute table to assembly
      (perlasm parses ecp_nistz256_table.c and is free to rearrange data to
      match gathering algorithm); b) adhering to explicit scatter subroutine
      (which for now is simply a memcpy). First implementations that will use
      this option are 32-bit assembly implementations, ARMv4 and x86, where
      equivalent of current read-whole-table-select-single-value algorithm
      is too time-consuming. [On side note, switching to scatter-gather on
      x86_64 would allow to improve server-side ECDSA performance by ~5%].
      Reviewed-by: NBodo Moeller <bodo@openssl.org>
      3ff08e1d
  7. 21 9月, 2014 1 次提交
  8. 20 9月, 2014 1 次提交
  9. 12 9月, 2014 2 次提交
  10. 09 9月, 2014 1 次提交
  11. 31 8月, 2014 1 次提交
  12. 30 8月, 2014 1 次提交
  13. 28 8月, 2014 3 次提交
  14. 21 8月, 2014 1 次提交
  15. 19 8月, 2014 1 次提交
  16. 13 8月, 2014 1 次提交
  17. 01 8月, 2014 1 次提交
  18. 22 7月, 2014 1 次提交
  19. 04 6月, 2014 1 次提交
  20. 04 5月, 2014 1 次提交
  21. 26 4月, 2014 1 次提交
    • M
      Fix eckey_priv_encode() · e14f14d3
      mancha 提交于
      Fix eckey_priv_encode to return an error on failure of i2d_ECPrivateKey.
      e14f14d3
  22. 28 3月, 2014 1 次提交
  23. 12 3月, 2014 1 次提交
    • D
      Fix for CVE-2014-0076 · f9b6c0ba
      Dr. Stephen Henson 提交于
      Fix for the attack described in the paper "Recovering OpenSSL
      ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack"
      by Yuval Yarom and Naomi Benger. Details can be obtained from:
      http://eprint.iacr.org/2014/140
      
      Thanks to Yuval Yarom and Naomi Benger for discovering this
      flaw and to Yuval Yarom for supplying a fix.
      (cherry picked from commit 2198be3483259de374f91e57d247d0fc667aef29)
      
      Conflicts:
      
      	CHANGES
      f9b6c0ba
  24. 20 2月, 2014 1 次提交
  25. 09 11月, 2013 1 次提交
  26. 16 9月, 2013 1 次提交
    • B
      Fix overly lenient comparisons: · ca567a03
      Bodo Moeller 提交于
          - EC_GROUP_cmp shouldn't consider curves equal just because
            the curve name is the same. (They really *should* be the same
            in this case, but there's an EC_GROUP_set_curve_name API,
            which could be misused.)
      
          - EC_POINT_cmp shouldn't return 0 for ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED
            or EC_R_INCOMPATIBLE_OBJECTS errors because in a cmp API, 0 indicates
            equality (not an error).
      
          Reported by: king cope
      ca567a03
  27. 06 9月, 2013 1 次提交
  28. 05 8月, 2013 2 次提交
    • D
      Add KDF for DH. · dc1ce3bc
      Dr. Stephen Henson 提交于
      Add X9.42 DH KDF. Move sharedinfo generation code to CMS library as the
      same structure is used by DH and ECDH.
      
      Move ASN1_OBJECT typedef to ossl_typ.h so it can be picked up by dh headers
      without the need to use ASN1.
      dc1ce3bc
    • D
      Algorithm parameter support. · e61f5d55
      Dr. Stephen Henson 提交于
      Check and set AlgorithmIdenfier parameters for key wrap algorithms.
      Currently these just set parameters to NULL.
      e61f5d55
  29. 18 7月, 2013 2 次提交
  30. 15 7月, 2013 1 次提交
    • A
      Make `safe' (EC)DSA nonces the default. · 190c615d
      Adam Langley 提交于
      This change updates 8a99cb29 to make the generation of (EC)DSA nonces
      using the message digest the default. It also reverts the changes to
      (EC)DSA_METHOD structure.
      
      In addition to making it the default, removing the flag from EC_KEY
      means that FIPS modules will no longer have an ABI mismatch.
      190c615d
  31. 22 6月, 2013 1 次提交
  32. 14 6月, 2013 1 次提交
    • A
      Add secure DSA nonce flag. · 8a99cb29
      Adam Langley 提交于
      This change adds the option to calculate (EC)DSA nonces by hashing the
      message and private key along with entropy to avoid leaking the private
      key if the PRNG fails.
      8a99cb29