- 26 11月, 2015 1 次提交
-
-
由 Matt Caswell 提交于
The function rsa_ossl_mod_exp uses the function BN_with_flags to create a temporary copy (local_r1) of a BIGNUM (r1) with modified flags. This temporary copy shares some state with the original r1. If the state of r1 gets updated then local_r1's state will be stale. This was occurring in the function so that when local_r1 was freed a call to bn_check_top was made which failed an assert due to the stale state. To resolve this we must free local_r1 immediately after we have finished using it and not wait until the end of the function. This problem prompted a review of all BN_with_flag usage within the codebase. All other usage appears to be correct, although often not obviously so. This commit refactors things to make it much clearer for these other uses. Reviewed-by: NEmilia Käsper <emilia@openssl.org>
-
- 10 11月, 2015 1 次提交
-
-
由 Matt Caswell 提交于
Continuing from previous commit ensure our style is consistent for malloc return checks. Reviewed-by: NKurt Roeckx <kurt@openssl.org>
-
- 24 6月, 2015 1 次提交
-
-
由 Rich Salz 提交于
Add secure heap for storage of private keys (when possible). Add BIO_s_secmem(), CBIGNUM, etc. Add BIO_CTX_secure_new so all BIGNUM's in the context are secure. Contributed by Akamai Technologies under the Corporate CLA. Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
- 14 5月, 2015 1 次提交
-
-
由 Richard Levitte 提交于
There are header files in crypto/ that are used by a number of crypto/ submodules. Move those to crypto/include/internal and adapt the affected source code and Makefiles. The header files that got moved are: crypto/cryptolib.h crypto/md32_common.h Reviewed-by: NRich Salz <rsalz@openssl.org>
-
- 01 5月, 2015 1 次提交
-
-
由 Rich Salz 提交于
This gets BN_.*free: BN_BLINDING_free BN_CTX_free BN_FLG_FREE BN_GENCB_free BN_MONT_CTX_free BN_RECP_CTX_free BN_clear_free BN_free BUF_MEM_free Also fix a call to DSA_SIG_free to ccgost engine and remove some #ifdef'd dead code in engines/e_ubsec. Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
- 22 1月, 2015 1 次提交
-
-
由 Matt Caswell 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
- 09 12月, 2014 1 次提交
-
-
由 Matt Caswell 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
- 08 12月, 2014 2 次提交
-
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
- 08 6月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Update/fix prototypes in fips.h
-
- 11 5月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
the FIPS capable OpenSSL.
-
- 22 4月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 07 4月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
from DSA copy q across and if q present generate DH key in the correct range.
-
- 09 3月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 04 2月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
that use it.
-
- 26 1月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 28 3月, 2007 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Matthew D Wood Reviewed by: Bodo Moeller
-
- 29 9月, 2006 1 次提交
-
-
由 Mark J. Cox 提交于
Steve Kiernan
-
- 28 9月, 2006 1 次提交
-
-
由 Bodo Möller 提交于
cause a denial of service. (CVE-2006-2940) [Steve Henson, Bodo Moeller]
-
- 14 3月, 2006 1 次提交
-
-
由 Nils Larsch 提交于
-
- 22 8月, 2005 1 次提交
-
-
由 Ben Laurie 提交于
-
- 27 5月, 2005 1 次提交
-
-
由 Bodo Möller 提交于
-
- 16 5月, 2005 1 次提交
-
-
由 Bodo Möller 提交于
timing attacks. BN_FLG_EXP_CONSTTIME requests this algorithm, and this done by default for RSA/DSA/DH private key computations unless RSA_FLAG_NO_EXP_CONSTTIME/DSA_FLAG_NO_EXP_CONSTTIME/ DH_FLAG_NO_EXP_CONSTTIME is set. Submitted by: Matthew D Wood Reviewed by: Bodo Moeller
-
- 28 4月, 2005 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 27 4月, 2005 3 次提交
-
-
由 Dr. Stephen Henson 提交于
casts.
-
由 Dr. Stephen Henson 提交于
The function rsa_eay_mont_helper() has been removed because it is no longer needed after this change.
-
由 Bodo Möller 提交于
("perl util/ck_errf.pl */*.c */*/*.c" still reports many more.)
-
- 08 4月, 2003 1 次提交
-
-
由 Richard Levitte 提交于
of unneeded includes of openssl/engine.h.
-
- 31 1月, 2003 1 次提交
-
-
由 Richard Levitte 提交于
PR: 287
-
- 15 1月, 2003 1 次提交
-
-
由 Geoff Thorpe 提交于
override key-generation implementations by placing handlers in the methods for DSA and DH. Also, parameter generation for DSA and DH is possible by another new handler for each method.
-
- 26 9月, 2001 1 次提交
-
-
由 Geoff Thorpe 提交于
ENGINE surgery. DH, DSA, RAND, and RSA now use *both* "method" and ENGINE pointers to manage their hooking with ENGINE. Previously their use of "method" pointers was replaced by use of ENGINE references. See crypto/engine/README for details. Also, remove the ENGINE iterations from evp_test - even when the cipher/digest code is committed in, this functionality would require a different set of API calls.
-
- 28 7月, 2001 2 次提交
-
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
- 26 7月, 2001 2 次提交
-
-
由 Bodo Möller 提交于
or bogus DH parameters can be used for launching DOS attacks
-
由 Bodo Möller 提交于
-
- 08 3月, 2001 1 次提交
-
-
由 Bodo Möller 提交于
Incease the number of BIGNUMs in a BN_CTX.
-
- 21 2月, 2001 1 次提交
-
-
由 Ulf Möller 提交于
-
- 20 2月, 2001 1 次提交
-
-
由 Ulf Möller 提交于
-
- 07 11月, 2000 1 次提交
-
-
由 Richard Levitte 提交于
-
- 27 10月, 2000 1 次提交
-
-
由 Richard Levitte 提交于
At the same time, add VMS support for Rijndael.
-