- 14 6月, 2013 3 次提交
-
-
由 Adam Langley 提交于
This change adds the option to calculate (EC)DSA nonces by hashing the message and private key along with entropy to avoid leaking the private key if the PRNG fails.
-
由 Adam Langley 提交于
in order to prevent ssl3_get_record from never returning. Reported by "oftc_must_be_destroyed" and George Kadianakis.
-
由 Adam Langley 提交于
-
- 13 6月, 2013 6 次提交
-
-
由 Adam Langley 提交于
that bad encryptions are treated like random session keys in constant time.
-
由 Ben Laurie 提交于
-
由 Matt Caswell 提交于
PR#3071 The primary changes made are: - Updates to the "NAME" section of many pages to correctly reflect the functions defined on those pages. This section is automatically parsed by the util/extract-names.pl script, so if it is not correct then running "man" will not correctly locate the right manual pages. - Updates to take account of where functions are now deprecated - Full documentation of the ec sub-library - A number of other typo corrections and other minor tweaks
-
由 Dr. Stephen Henson 提交于
Extend OAEP support. Generalise the OAEP padding functions to support arbitrary digests. Extend EVP_PKEY RSA method to handle the new OAEP padding functions and add ctrls to set the additional parameters.
-
由 Dr. Stephen Henson 提交于
-
由 Trevor 提交于
Contributed by Trevor Perrin.
-
- 12 6月, 2013 1 次提交
-
-
由 Ben Laurie 提交于
-
- 11 6月, 2013 7 次提交
-
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
- 05 6月, 2013 6 次提交
-
-
由 Dr. Stephen Henson 提交于
Fix PSS signature printing: consistently use 0x prefix for hex values for padding length and trailer fields.
-
由 Dr. Stephen Henson 提交于
-
由 Adam Langley 提交于
requested size. Fixes OpenSSL #2701. This change does not address the cases of generating safe primes, or where the |add| parameter is non-NULL. Conflicts: crypto/bn/bn.h crypto/bn/bn_err.c
-
由 Adam Langley 提交于
-
由 Adam Langley 提交于
eliminating them as dead code. Both volatile and "memory" are used because of some concern that the compiler may still cache values across the asm block without it, and because this was such a painful debugging session that I wanted to ensure that it's never repeated.
-
由 Ben Laurie 提交于
-
- 04 6月, 2013 1 次提交
-
-
由 Ben Laurie 提交于
-
- 01 6月, 2013 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 26 5月, 2013 4 次提交
-
-
由 Andy Polyakov 提交于
PR: 3042
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
(and pending AVX2 changes).
-
由 Andy Polyakov 提交于
-
- 14 5月, 2013 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 13 5月, 2013 2 次提交
-
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
- 05 5月, 2013 2 次提交
-
-
由 Ben Laurie 提交于
-
由 Ben Laurie 提交于
-
- 02 5月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Reencode certificates in X509_sign_ctx as well as X509_sign. This was causing a problem in the x509 application when it modified an existing certificate.
-
- 23 4月, 2013 2 次提交
-
-
由 Andy Polyakov 提交于
Submitted by: Ard Biesheuvel <ard.biesheuvel@linaro.org> Contributor claims ~50% improvement in CTR and ~9% in CBC decrypt on Cortex-A15.
-
由 Andy Polyakov 提交于
-
- 14 4月, 2013 3 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
While ARMv7 in general is capable of unaligned access, not all instructions actually are. And trouble is that compiler doesn't seem to differentiate those capable and incapable of unaligned access. Side effect is that kernel goes into endless loop retrying same instruction triggering unaligned trap. Problem was observed in xts128.c and ccm128.c modules. It's possible to resolve it by using (volatile u32*) casts, but letting STRICT_ALIGNMENT be feels more appropriate.
-