1. 19 1月, 2016 1 次提交
  2. 12 1月, 2016 8 次提交
  3. 10 1月, 2016 1 次提交
  4. 29 12月, 2015 1 次提交
  5. 15 12月, 2015 1 次提交
  6. 11 12月, 2015 2 次提交
  7. 10 12月, 2015 1 次提交
  8. 08 12月, 2015 7 次提交
  9. 03 12月, 2015 1 次提交
    • D
      Remove legacy sign/verify from EVP_MD. · 7f572e95
      Dr. Stephen Henson 提交于
      Remove sign/verify and required_pkey_type fields of EVP_MD: these are a
      legacy from when digests were linked to public key types. All signing is
      now handled by the corresponding EVP_PKEY_METHOD.
      
      Only allow supported digest types in RSA EVP_PKEY_METHOD: other algorithms
      already block unsupported types.
      
      Remove now obsolete EVP_dss1() and EVP_ecdsa().
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      7f572e95
  10. 25 11月, 2015 3 次提交
  11. 31 10月, 2015 1 次提交
  12. 01 10月, 2015 2 次提交
  13. 29 9月, 2015 1 次提交
  14. 11 9月, 2015 1 次提交
  15. 05 9月, 2015 1 次提交
  16. 04 9月, 2015 1 次提交
  17. 14 8月, 2015 1 次提交
  18. 03 6月, 2015 1 次提交
  19. 26 5月, 2015 1 次提交
  20. 21 5月, 2015 2 次提交
  21. 20 5月, 2015 1 次提交
  22. 01 5月, 2015 1 次提交
    • M
      Sanity check EVP_CTRL_AEAD_TLS_AAD · c8269881
      Matt Caswell 提交于
      The various implementations of EVP_CTRL_AEAD_TLS_AAD expect a buffer of at
      least 13 bytes long. Add sanity checks to ensure that the length is at
      least that. Also add a new constant (EVP_AEAD_TLS1_AAD_LEN) to evp.h to
      represent this length. Thanks to Kevin Wojtysiak (Int3 Solutions) and
      Paramjot Oberoi (Int3 Solutions) for reporting this issue.
      Reviewed-by: NAndy Polyakov <appro@openssl.org>
      c8269881