Commit History

Autor SHA1 Mensaxe Data
  Dr. Stephen Henson 8c3b5d5f27 Update from 0.9.8-stable with patches also applied to equivalent FIPS %!s(int64=17) %!d(string=hai) anos
  Dr. Stephen Henson aeb9ccfaad And so it begins... %!s(int64=17) %!d(string=hai) anos
  Mark J. Cox 951dfbb13a Introduce limits to prevent malicious keys being able to %!s(int64=18) %!d(string=hai) anos
  Bodo Möller 40ddcb717a Remove non-functional part of recent patch, after discussion with %!s(int64=18) %!d(string=hai) anos
  Mark J. Cox df20b6e79b Avoid PKCS #1 v1.5 signature attack discovered by Daniel Bleichenbacher %!s(int64=18) %!d(string=hai) anos
  Bodo Möller 6d2cd23f40 Thread-safety fixes %!s(int64=18) %!d(string=hai) anos
  Nils Larsch ff86d3d894 protect BN_BLINDING_invert with a write lock and BN_BLINDING_convert %!s(int64=19) %!d(string=hai) anos
  Dr. Stephen Henson dea446d995 Update from 0.9.7-stable branch. %!s(int64=19) %!d(string=hai) anos
  Bodo Möller cad811fc41 Use BN_with_flags() in a cleaner way. %!s(int64=19) %!d(string=hai) anos
  Bodo Möller 46a643763d Implement fixed-window exponentiation to mitigate hyper-threading %!s(int64=19) %!d(string=hai) anos
  Bodo Möller 8afca8d9c6 Fix more error codes. %!s(int64=19) %!d(string=hai) anos
  Dr. Stephen Henson 6ec8e63af6 Port BN_MONT_CTX_set_locked() from stable branch. %!s(int64=19) %!d(string=hai) anos
  Nils Larsch 800e400de5 some updates for the blinding code; summary: %!s(int64=19) %!d(string=hai) anos
  Nils Larsch ff22e913a3 - use BN_set_negative and BN_is_negative instead of BN_set_sign %!s(int64=19) %!d(string=hai) anos
  Geoff Thorpe 46ef873f0b By adding a BN_CTX parameter to the 'rsa_mod_exp' callback, private key %!s(int64=21) %!d(string=hai) anos
  Richard Levitte fd836aeee0 Make sure that the last argument to RAND_add() is a float, or some %!s(int64=21) %!d(string=hai) anos
  Richard Levitte cd1226bc6a Memory leak fix: local blinding structure not freed in rsa_eay_private_decrypt() %!s(int64=21) %!d(string=hai) anos
  Richard Levitte 43eb3b0130 We seem to carry some rests of the 0.9.6 [engine] ENGINE framework in form %!s(int64=21) %!d(string=hai) anos
  Bodo Möller 5679bcce07 make RSA blinding thread-safe %!s(int64=22) %!d(string=hai) anos
  Bodo Möller c554155b58 make sure RSA blinding works when the PRNG is not properly seeded; %!s(int64=22) %!d(string=hai) anos
  Geoff Thorpe b12753dffc We cache a montgomery form for 'n' if the PUBLIC flag is set, not PRIVATE. %!s(int64=22) %!d(string=hai) anos
  Geoff Thorpe 79221bc265 David Brumley <dbrumley@stanford.edu> noted and corrected a case in the %!s(int64=22) %!d(string=hai) anos
  Richard Levitte 0b13e9f055 Add the possibility to build without the ENGINE framework. %!s(int64=22) %!d(string=hai) anos
  Geoff Thorpe 2814c62915 This is the first step in allowing RSA_METHODs to implement their own key %!s(int64=22) %!d(string=hai) anos
  Richard Levitte 4579924b7e Cleanse memory using the new OPENSSL_cleanse() function. %!s(int64=22) %!d(string=hai) anos
  Bodo Möller b53e44e572 implement and use new macros BN_get_sign(), BN_set_sign() %!s(int64=22) %!d(string=hai) anos
  Richard Levitte 9cdf87f194 Check the return values where memory allocation failures may happen. %!s(int64=22) %!d(string=hai) anos
  Geoff Thorpe cb78486d97 This commits changes to various parts of libcrypto required by the recent %!s(int64=23) %!d(string=hai) anos
  Bodo Möller be6d77005f comments %!s(int64=23) %!d(string=hai) anos
  Bodo Möller 24cff6ced5 always reject data >= n %!s(int64=23) %!d(string=hai) anos