1. 26 11月, 2015 1 次提交
    • M
      Tighten up BN_with_flags usage and avoid a reachable assert · fd7d2520
      Matt Caswell 提交于
      The function rsa_ossl_mod_exp uses the function BN_with_flags to create a
      temporary copy (local_r1) of a BIGNUM (r1) with modified flags. This
      temporary copy shares some state with the original r1. If the state of r1
      gets updated then local_r1's state will be stale. This was occurring in the
      function so that when local_r1 was freed a call to bn_check_top was made
      which failed an assert due to the stale state. To resolve this we must free
      local_r1 immediately after we have finished using it and not wait until the
      end of the function.
      
      This problem prompted a review of all BN_with_flag usage within the
      codebase. All other usage appears to be correct, although often not
      obviously so. This commit refactors things to make it much clearer for
      these other uses.
      Reviewed-by: NEmilia Käsper <emilia@openssl.org>
      fd7d2520
  2. 10 11月, 2015 1 次提交
  3. 24 6月, 2015 1 次提交
  4. 14 5月, 2015 1 次提交
  5. 01 5月, 2015 1 次提交
    • R
      free NULL cleanup 7 · 23a1d5e9
      Rich Salz 提交于
      This gets BN_.*free:
          BN_BLINDING_free BN_CTX_free BN_FLG_FREE BN_GENCB_free
          BN_MONT_CTX_free BN_RECP_CTX_free BN_clear_free BN_free BUF_MEM_free
      
      Also fix a call to DSA_SIG_free to ccgost engine and remove some #ifdef'd
      dead code in engines/e_ubsec.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      23a1d5e9
  6. 22 1月, 2015 1 次提交
  7. 09 12月, 2014 1 次提交
  8. 08 12月, 2014 2 次提交
  9. 08 6月, 2011 1 次提交
  10. 11 5月, 2011 1 次提交
  11. 22 4月, 2011 1 次提交
  12. 07 4月, 2011 1 次提交
  13. 09 3月, 2011 1 次提交
  14. 04 2月, 2011 1 次提交
  15. 26 1月, 2011 1 次提交
  16. 28 3月, 2007 1 次提交
  17. 29 9月, 2006 1 次提交
  18. 28 9月, 2006 1 次提交
  19. 14 3月, 2006 1 次提交
  20. 22 8月, 2005 1 次提交
  21. 27 5月, 2005 1 次提交
  22. 16 5月, 2005 1 次提交
    • B
      Implement fixed-window exponentiation to mitigate hyper-threading · 46a64376
      Bodo Möller 提交于
      timing attacks.
      
      BN_FLG_EXP_CONSTTIME requests this algorithm, and this done by default for
      RSA/DSA/DH private key computations unless
      RSA_FLAG_NO_EXP_CONSTTIME/DSA_FLAG_NO_EXP_CONSTTIME/
      DH_FLAG_NO_EXP_CONSTTIME is set.
      
      Submitted by: Matthew D Wood
      Reviewed by: Bodo Moeller
      46a64376
  23. 28 4月, 2005 1 次提交
  24. 27 4月, 2005 3 次提交
  25. 08 4月, 2003 1 次提交
  26. 31 1月, 2003 1 次提交
  27. 15 1月, 2003 1 次提交
  28. 26 9月, 2001 1 次提交
    • G
      This commits changes to various parts of libcrypto required by the recent · cb78486d
      Geoff Thorpe 提交于
      ENGINE surgery. DH, DSA, RAND, and RSA now use *both* "method" and ENGINE
      pointers to manage their hooking with ENGINE. Previously their use of
      "method" pointers was replaced by use of ENGINE references. See
      crypto/engine/README for details.
      
      Also, remove the ENGINE iterations from evp_test - even when the
      cipher/digest code is committed in, this functionality would require a
      different set of API calls.
      cb78486d
  29. 28 7月, 2001 2 次提交
  30. 26 7月, 2001 2 次提交
  31. 08 3月, 2001 1 次提交
  32. 21 2月, 2001 1 次提交
  33. 20 2月, 2001 1 次提交
  34. 07 11月, 2000 1 次提交
  35. 27 10月, 2000 1 次提交