- 08 12月, 2014 4 次提交
-
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
- 29 11月, 2014 1 次提交
-
-
由 Rich Salz 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
- 21 11月, 2014 1 次提交
-
-
由 Annie Yousar 提交于
In keygen, return KEY_SIZE_TOO_SMALL not INVALID_KEYBITS. ** I also increased the minimum from 256 to 512, which is now documented in CHANGES file. ** Reviewed-by: NMatt Caswell <matt@openssl.org>
-
- 15 10月, 2014 1 次提交
-
-
由 Richard Levitte 提交于
The different -I compiler parameters will take care of the rest... Reviewed-by: NTim Hudson <tjh@openssl.org> Conflicts: crypto/evp/evp_enc.c crypto/rsa/rsa_oaep.c crypto/rsa/rsa_pk1.c
-
- 29 9月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Reencode DigestInto in DER and check against the original: this will reject any improperly encoded DigestInfo structures. Note: this is a precautionary measure, there is no known attack which can exploit this. Thanks to Brian Smith for reporting this issue. Reviewed-by: NTim Hudson <tjh@openssl.org>
-
- 24 9月, 2014 1 次提交
-
-
由 Emilia Kasper 提交于
Also tweak s3_cbc.c to use new constant-time methods. Also fix memory leaks from internal errors in RSA_padding_check_PKCS1_OAEP_mgf1 This patch is based on the original RT submission by Adam Langley <agl@chromium.org>, as well as code from BoringSSL and OpenSSL. Reviewed-by: NKurt Roeckx <kurt@openssl.org>
-
- 22 9月, 2014 1 次提交
-
-
由 Andy Polyakov 提交于
Reviewed-by: NDr. Stephen Henson <steve@openssl.org>
-
- 09 9月, 2014 1 次提交
-
-
由 Kurt Roeckx 提交于
This is a more comprehensive fix. It changes all keygen apps to use 2K keys. It also changes the default to use SHA256 not SHA1. This is from Kurt's upstream Debian changes. Reviewed-by: NRich Salz <rsalz@openssl.org> Reviewed-by: NKurt Roeckx <kurt@openssl.org>
-
- 08 9月, 2014 1 次提交
-
-
由 Rich Salz 提交于
The original RT request included a patch. By the time we got around to doing it, however, the callback scheme had changed. So I wrote a new function RSA_check_key_ex() that uses the BN_GENCB callback. But thanks very much to Vinet Sharma <vineet.sharma@gmail.com> for the initial implementation. Reviewed-by: NDr. Stephen Henson <steve@openssl.org>
-
- 19 8月, 2014 1 次提交
-
-
由 Doug Goldstein 提交于
Several files #include stdio.h and don't need it. Also, per tjh, remove BN_COUNT Reviewed-by: NEmilia Kasper <emilia@openssl.org>
-
- 06 7月, 2014 1 次提交
-
-
由 Alan Hryngle 提交于
PR#3418.
-
- 29 5月, 2014 1 次提交
-
-
由 Martin Kaiser 提交于
-
- 28 3月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Add functions to return the "bits of security" for various public key algorithms. Based on SP800-57.
-
- 20 3月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Some CMS SignedData structure use a signature algorithm OID such as SHA1WithRSA instead of the RSA algorithm OID. Workaround this case by tolerating the signature if we recognise the OID.
-
- 20 2月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 09 11月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 18 7月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
For RSA and DSA keys return an appropriate RecipientInfo type. By setting CMS_RECIPINFO_NONE for DSA keys an appropriate error is returned if an attempt is made to use DSA with enveloped data.
-
- 22 6月, 2013 3 次提交
-
-
由 Dr. Stephen Henson 提交于
Extend RSA ASN1 method to support CMS PSS signatures for both sign and verify. For signing the EVP_PKEY_CTX parameters are read and the appropriate CMS structures set up. For verification the CMS structures are analysed and the corresponding parameters in the EVP_PKEY_CTX set. Also add RSA-OAEP support. For encrypt the EVP_PKEY_CTX parameters are used. For decrypt the CMS structure is uses to set the appropriate EVP_PKEY_CTX parameters.
-
由 Dr. Stephen Henson 提交于
Add OAEP ctrls to retrieve MD and label. Return errors if an attempt is made to set or retrieve OAEP parameters when padding mode is not OAEP.
-
由 Dr. Stephen Henson 提交于
-
- 13 6月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Extend OAEP support. Generalise the OAEP padding functions to support arbitrary digests. Extend EVP_PKEY RSA method to handle the new OAEP padding functions and add ctrls to set the additional parameters.
-
- 05 6月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Fix PSS signature printing: consistently use 0x prefix for hex values for padding length and trailer fields.
-
- 01 4月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 06 2月, 2013 1 次提交
-
-
由 Ben Laurie 提交于
This change adds CRYPTO_memcmp, which compares two vectors of bytes in an amount of time that's independent of their contents. It also changes several MAC compares in the code to use this over the standard memcmp, which may leak information about the size of a matching prefix. (cherry picked from commit 2ee798880a246d648ecddadc5b91367bee4a5d98)
-
- 04 6月, 2012 1 次提交
-
-
由 Ben Laurie 提交于
-
- 15 2月, 2012 2 次提交
-
-
由 Dr. Stephen Henson 提交于
Update RSA EVP_PKEY_METHOD to use the OCTET STRING form of MDC2 signature: this will make all versions of MDC2 signature equivalent.
-
由 Dr. Stephen Henson 提交于
signatures and MDC2 using EVP or RSA_sign. This has become more apparent when the dgst utility in OpenSSL 1.0.0 and later switched to using the EVP_DigestSign functions which call RSA_sign. This means that the signature format OpenSSL 1.0.0 and later used with dgst -sign and MDC2 is incompatible with previous versions. Add detection in RSA_verify so either format works. Note: MDC2 is disabled by default in OpenSSL and very rarely used in practice.
-
- 03 1月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 19 10月, 2011 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Emilia Kasper (Google)
-
- 15 9月, 2011 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 05 9月, 2011 1 次提交
-
-
由 Bodo Möller 提交于
-
- 18 6月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 03 6月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 11 5月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
the FIPS capable OpenSSL.
-
- 24 4月, 2011 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
- 22 4月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-