- 19 9月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 12 9月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
(strength can be queried using FIPS_drbg_get_strength ) and adds a substantial extra overhead to health check (need to check every combination of parameters).
-
- 10 9月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
tests and POST code.
-
- 09 8月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 16 6月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 14 6月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
are sure they are OK. API to retrieve FIPS rand method.
-
- 21 4月, 2011 2 次提交
-
-
由 Dr. Stephen Henson 提交于
to specify a "block length".
-
由 Dr. Stephen Henson 提交于
-
- 10 4月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 05 4月, 2011 2 次提交
-
-
由 Dr. Stephen Henson 提交于
now use an internal RAND_METHOD. All dependencies to OpenSSL standard PRNG are now removed: it is the applications resposibility to setup the FIPS PRNG and initalise it. Initial OpenSSL RAND_init_fips() function that will setup the DRBG for the "FIPS capable OpenSSL".
-
由 Dr. Stephen Henson 提交于
used by applications directly and the X9.31 PRNG is deprecated by new FIPS140-2 rules anyway.
-
- 02 4月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
are undisturbed. Allow setting of "rand" callbacks for DRBG.
-
- 01 4月, 2011 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
pointer to a buffer instead of copying to a fixed length buffer. This removes the entropy and nonce length restrictions.
-
- 25 3月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Test mode is now set when a DRBG context is initialised.
-
- 18 3月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Fix warnings. Instantiate DRBGs at maximum strength.
-
- 16 3月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 12 3月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
security strength.
-
- 08 3月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 06 3月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
algorithm test generator.
-
- 05 3月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
not working, incomplete and unused SP800-90 DRBGs for CTR and Hash modes. Did I say this was untested?
-
- 26 1月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Initial FIPS 140-2 code ported to HEAD. Doesn't even compile yet, may have missing files, extraneous files and other nastiness. In other words: it's experimental ATM, OK?
-
- 21 1月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 16 2月, 2002 1 次提交
-
-
由 Richard Levitte 提交于
Submitted by Stephen Sprunk <stephen@sprunk.org>
-
- 03 1月, 2002 1 次提交
-
-
由 Richard Levitte 提交于
crypto/rijndael. Additionally, I applied the AES integration patch from Stephen Sprunk <stephen@sprunk.org> and fiddled it to work properly with the normal EVP constructs (and incidently work the same way as all other symmetric cipher implementations). This results in an API that looks a lot like the rest of the OpenSSL cipher suite.
-
- 04 6月, 1999 1 次提交
-
-
由 Ben Laurie 提交于
-
- 30 1月, 1999 1 次提交
-
-
由 Ben Laurie 提交于
-
- 24 1月, 1999 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 17 1月, 1999 1 次提交
-
-
由 Dr. Stephen Henson 提交于
GeneralizedTime. At several points PKIX specifies that GeneralizedTime can be used but OpenSSL doesn't currently support it. This patch adds several files and a bunch of functions. Of interest is the ASN1_TIME structure and its related functions. At several points certificates, CRLs et al specify that a time can be expressed as a choice of UTCTime and GeneralizedTime. Currently OpenSSL interprets this (wrongly) as UTCTime because GeneralizedTime isn't supported. The ASN1_TIME stuff provides this functionality. Still todo is to trace which cert and CRL points need an ASN1_TIME and modify the utilities appropriately and of course fix all the bugs. Note new OpenSSL copyright in the new file a_time.c. I didn't put it in a_gentm.c because it is a minimally modified form a_utctm.c . Since this adds new files and error codes you will need to do a 'make errors' at the top level to add the new codes.
-