1. 10 9月, 2014 1 次提交
  2. 18 7月, 2013 1 次提交
  3. 15 7月, 2013 1 次提交
    • A
      Make `safe' (EC)DSA nonces the default. · 190c615d
      Adam Langley 提交于
      This change updates 8a99cb29 to make the generation of (EC)DSA nonces
      using the message digest the default. It also reverts the changes to
      (EC)DSA_METHOD structure.
      
      In addition to making it the default, removing the flag from EC_KEY
      means that FIPS modules will no longer have an ABI mismatch.
      190c615d
  4. 14 6月, 2013 1 次提交
    • A
      Add secure DSA nonce flag. · 8a99cb29
      Adam Langley 提交于
      This change adds the option to calculate (EC)DSA nonces by hashing the
      message and private key along with entropy to avoid leaking the private
      key if the PRNG fails.
      8a99cb29
  5. 04 6月, 2012 1 次提交
  6. 11 5月, 2011 1 次提交
  7. 24 4月, 2011 2 次提交
  8. 14 2月, 2011 1 次提交
  9. 04 2月, 2011 1 次提交
  10. 01 2月, 2011 1 次提交
  11. 26 1月, 2011 2 次提交
  12. 12 10月, 2010 1 次提交
    • D
      PR: 2295 · 776654ad
      Dr. Stephen Henson 提交于
      Submitted by: Alexei Khlebnikov <alexei.khlebnikov@opera.com>
      Reviewed by: steve
      
      OOM checking. Leak in OOM fix. Fall-through comment. Duplicate code
      elimination.
      776654ad
  13. 28 3月, 2007 1 次提交
  14. 12 2月, 2007 1 次提交
  15. 08 2月, 2007 1 次提交
  16. 03 2月, 2007 1 次提交
  17. 08 11月, 2006 1 次提交
  18. 28 9月, 2006 1 次提交
  19. 18 3月, 2006 1 次提交
  20. 16 3月, 2006 1 次提交
  21. 26 5月, 2005 1 次提交
  22. 16 5月, 2005 1 次提交
    • B
      Implement fixed-window exponentiation to mitigate hyper-threading · 46a64376
      Bodo Möller 提交于
      timing attacks.
      
      BN_FLG_EXP_CONSTTIME requests this algorithm, and this done by default for
      RSA/DSA/DH private key computations unless
      RSA_FLAG_NO_EXP_CONSTTIME/DSA_FLAG_NO_EXP_CONSTTIME/
      DH_FLAG_NO_EXP_CONSTTIME is set.
      
      Submitted by: Matthew D Wood
      Reviewed by: Bodo Moeller
      46a64376
  23. 09 5月, 2005 1 次提交
  24. 27 4月, 2005 2 次提交
  25. 23 4月, 2005 2 次提交
  26. 08 4月, 2003 1 次提交
  27. 11 3月, 2003 1 次提交
    • G
      The default implementation of DSA_METHOD has an interdependence on the · 879650b8
      Geoff Thorpe 提交于
      dsa_mod_exp() and bn_mod_exp() handlers from dsa_do_verify() and
      dsa_sign_setup(). When another DSA_METHOD implementation does not define
      these lower-level handlers, it becomes impossible to do a fallback to
      software on errors using a simple DSA_OpenSSL()->fn(key).
      
      This change allows the default DSA_METHOD to function in such circumstances
      by only using dsa_mod_exp() and bn_mod_exp() handlers if they exist,
      otherwise using BIGNUM implementations directly (which is what those
      handlers did before this change). There should be no noticable difference
      for the software case, or indeed any custom case that didn't already
      segfault, except perhaps that there is now one less level of indirection in
      all cases.
      
      PR: 507
      879650b8
  28. 31 1月, 2003 1 次提交
  29. 15 1月, 2003 2 次提交
  30. 04 11月, 2002 1 次提交
  31. 26 9月, 2001 1 次提交
    • G
      This commits changes to various parts of libcrypto required by the recent · cb78486d
      Geoff Thorpe 提交于
      ENGINE surgery. DH, DSA, RAND, and RSA now use *both* "method" and ENGINE
      pointers to manage their hooking with ENGINE. Previously their use of
      "method" pointers was replaced by use of ENGINE references. See
      crypto/engine/README for details.
      
      Also, remove the ENGINE iterations from evp_test - even when the
      cipher/digest code is committed in, this functionality would require a
      different set of API calls.
      cb78486d
  32. 26 6月, 2001 1 次提交
  33. 21 4月, 2001 1 次提交
    • D
      · c962479b
      Dr. Stephen Henson 提交于
      Fix ASN1 bug when decoding OTHER type.
      
      Various S/MIME DSA related fixes.
      c962479b
  34. 10 2月, 2001 1 次提交
  35. 08 2月, 2001 1 次提交
    • B
      Integrate my implementation of a countermeasure against · 35ed8cb8
      Bodo Möller 提交于
      Bleichenbacher's DSA attack.  With this implementation, the expected
      number of iterations never exceeds 2.
      
      New semantics for BN_rand_range():
      BN_rand_range(r, min, range) now generates r such that
           min <= r < min+range.
      (Previously, BN_rand_range(r, min, max) generated r such that
           min <= r < max.
      It is more convenient to have the range; also the previous
      prototype was misleading because max was larger than
      the actual maximum.)
      35ed8cb8