- 18 5月, 2016 2 次提交
-
-
由 Matt Caswell 提交于
Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
由 Rich Salz 提交于
Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
- 27 1月, 2016 1 次提交
-
-
由 Rich Salz 提交于
This was done by the following find . -name '*.[ch]' | /tmp/pl where /tmp/pl is the following three-line script: print unless $. == 1 && m@/\* .*\.[ch] \*/@; close ARGV if eof; # Close file to reset $. And then some hand-editing of other files. Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
-
- 18 11月, 2015 1 次提交
-
-
由 Rich Salz 提交于
Final part of flushing out SSLEay API's. Reviewed-by: NTim Hudson <tjh@openssl.org>
-
- 05 11月, 2015 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Rebuild error source files: the new mkerr.pl functionality will now pick up and translate static function names properly. Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
- 22 1月, 2015 1 次提交
-
-
由 Matt Caswell 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
- 24 9月, 2014 1 次提交
-
-
由 Emilia Kasper 提交于
Also tweak s3_cbc.c to use new constant-time methods. Also fix memory leaks from internal errors in RSA_padding_check_PKCS1_OAEP_mgf1 This patch is based on the original RT submission by Adam Langley <agl@chromium.org>, as well as code from BoringSSL and OpenSSL. Reviewed-by: NKurt Roeckx <kurt@openssl.org>
-
- 22 9月, 2014 1 次提交
-
-
由 Andy Polyakov 提交于
Reviewed-by: NDr. Stephen Henson <steve@openssl.org>
-
- 22 6月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Extend RSA ASN1 method to support CMS PSS signatures for both sign and verify. For signing the EVP_PKEY_CTX parameters are read and the appropriate CMS structures set up. For verification the CMS structures are analysed and the corresponding parameters in the EVP_PKEY_CTX set. Also add RSA-OAEP support. For encrypt the EVP_PKEY_CTX parameters are used. For decrypt the CMS structure is uses to set the appropriate EVP_PKEY_CTX parameters.
-
- 13 6月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Extend OAEP support. Generalise the OAEP padding functions to support arbitrary digests. Extend EVP_PKEY RSA method to handle the new OAEP padding functions and add ctrls to set the additional parameters.
-
- 03 2月, 2011 1 次提交
-
-
由 Bodo Möller 提交于
-
- 26 1月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Check for selftest failures. Pairwise consistency test for RSA key generation. Use some EVP macros instead of EVP functions. Use minimal FIPS EVP where needed.
-
- 11 3月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 09 3月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
requests. Add new ASN1 signature initialisation function to handle this case.
-
- 30 12月, 2008 1 次提交
-
-
由 Ben Laurie 提交于
test for them!
-
- 29 12月, 2008 1 次提交
-
-
由 Ben Laurie 提交于
(Coverity ID 135).
-
- 16 3月, 2008 1 次提交
-
-
由 Dr. Stephen Henson 提交于
examples. All RFC4134 examples can not be processed.
-
- 22 11月, 2006 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 28 9月, 2006 1 次提交
-
-
由 Bodo Möller 提交于
cause a denial of service. (CVE-2006-2940) [Steve Henson, Bodo Moeller]
-
- 06 9月, 2006 1 次提交
-
-
由 Bodo Möller 提交于
Colin Percival (this would have caused more problems than solved, and isn't really necessary anyway)
-
- 05 9月, 2006 1 次提交
-
-
由 Mark J. Cox 提交于
(CVE-2006-4339) Submitted by: Ben Laurie, Google Security Team Reviewed by: bmoeller, mjc, shenson
-
- 18 7月, 2006 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 12 5月, 2006 1 次提交
-
-
由 Dr. Stephen Henson 提交于
More error checking for RSA pmeth.
-
- 12 4月, 2006 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 10 4月, 2006 2 次提交
-
-
由 Dr. Stephen Henson 提交于
Add digest size sanity checks.
-
由 Dr. Stephen Henson 提交于
-
- 20 3月, 2006 1 次提交
-
-
由 Dr. Stephen Henson 提交于
key ASN1 handling through a single EVP_PKEY_ASN1_METHOD structure and move the spaghetti algorithm specific code to a single ASN1 module for each algorithm.
-
- 03 6月, 2005 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 29 5月, 2005 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 11 5月, 2005 1 次提交
-
-
由 Bodo Möller 提交于
(Also improve util/ck_errf.pl script, and occasionally fix source code formatting.)
-
- 27 4月, 2005 1 次提交
-
-
由 Nils Larsch 提交于
- possibility of re-creation of the blinding parameters after a fixed number of uses (suggested by Bodo) - calculatition of the rsa::e in case it's absent and p and q are present (see bug report #785) - improve the performance when if one rsa structure is shared by more than a thread (see bug report #555) - fix the problem described in bug report #827 - hide the definition ot the BN_BLINDING structure in bn_blind.c
-
- 13 4月, 2005 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 26 7月, 2001 1 次提交
-
-
由 Bodo Möller 提交于
-
- 20 2月, 2001 1 次提交
-
-
由 Richard Levitte 提交于
sure they are available in opensslconf.h, by giving them names starting with "OPENSSL_" to avoid conflicts with other packages and by making sure e_os2.h will cover all platform-specific cases together with opensslconf.h. I've checked fairly well that nothing breaks with this (apart from external software that will adapt if they have used something like NO_KRB5), but I can't guarantee it completely, so a review of this change would be a good thing.
-
- 05 3月, 2000 1 次提交
-
-
由 Bodo Möller 提交于
-
- 19 9月, 1999 1 次提交
-
-
由 Dr. Stephen Henson 提交于
and verify rather than direct encrypt/decrypt.
-
- 09 9月, 1999 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 12 7月, 1999 2 次提交
-
-
由 Bodo Möller 提交于
insert spaces in products that occur in error codes
-
由 Bodo Möller 提交于
openssl rsa -check
-
- 24 4月, 1999 1 次提交
-
-
由 Dr. Stephen Henson 提交于
script, translates function codes better and doesn't need the K&R function prototypes to work (NB. the K&R prototypes can't be wiped just yet: they are still needed by the DEF generator...). I also ran the script with the -rewrite option to update all the header and source files.
-