Commit History

Author SHA1 Message Date
  Bernd Edlinger 8957adda16 Fix error handling in compute_key, BN_CTX_get can return NULL 7 years ago
  Matt Caswell ae5c8664e5 Run util/openssl-format-source -v -c . 9 years ago
  Dr. Stephen Henson 6c4b3514d7 New SP 800-56A compliant version of DH_compute_key(). 13 years ago
  Dr. Stephen Henson 5999d45a5d DH keys have an (until now) unused 'q' parameter. When creating from DSA copy 13 years ago
  Dr. Stephen Henson 03e16611a3 Redirect DH operations to FIPS module. Block non-FIPS methods. 13 years ago
  Bodo Möller bd31fb2145 Change to mitigate branch prediction attacks 17 years ago
  Mark J. Cox c2cccfc585 Initialise ctx to NULL to avoid uninitialized free, noticed by 18 years ago
  Bodo Möller 5e3225cc44 Introduce limits to prevent malicious keys being able to 18 years ago
  Nils Larsch 47d5566646 fix error found by coverity: check if ctx is != NULL before calling BN_CTX_end() 18 years ago
  Ben Laurie bf3d6c0c9b Make D-H safer, include well-known primes. 19 years ago
  Bodo Möller a28a5d9c62 Use BN_with_flags() in a cleaner way. 19 years ago
  Bodo Möller 46a643763d Implement fixed-window exponentiation to mitigate hyper-threading 19 years ago
  Andy Polyakov 3cc54008eb Pointer to BN_MONT_CTX could be used uninitialized. 19 years ago
  Dr. Stephen Henson 879b19801a Change method_mont_p from (char *) to (BN_MONT_CTX *) and remove several 19 years ago
  Dr. Stephen Henson 6ec8e63af6 Port BN_MONT_CTX_set_locked() from stable branch. 19 years ago
  Bodo Möller aa4ce7315f Fix various incorrect error function codes. 19 years ago
  Richard Levitte 43eb3b0130 We seem to carry some rests of the 0.9.6 [engine] ENGINE framework in form 21 years ago
  Richard Levitte 0b13e9f055 Add the possibility to build without the ENGINE framework. 21 years ago
  Geoff Thorpe 0e4aa0d2d2 As with RSA, which was modified recently, this change makes it possible to 22 years ago
  Geoff Thorpe cb78486d97 This commits changes to various parts of libcrypto required by the recent 23 years ago
  Bodo Möller de3333bae4 length of secret exponent is needed only when we create one 23 years ago
  Bodo Möller 924875e53b Undo DH_generate_key() change: s3_srvr.c was using it correctly 23 years ago
  Bodo Möller e5cb260365 DH key generation should not use a do ... while loop, 23 years ago
  Bodo Möller 6aecef815c Don't preserve existing keys in DH_generate_key. 23 years ago
  Bodo Möller c62b26fdc6 Hide BN_CTX structure details. 23 years ago
  Ulf Möller 48f2ef8d00 make it a loop as in dsa 23 years ago
  Ulf Möller 12c2fe8d53 Use BN_rand_range(). 23 years ago
  Richard Levitte f971ccb264 Constify DH-related code. 24 years ago
  Richard Levitte 5270e7025e Merge the engine branch into the main trunk. All conflicts resolved. 24 years ago
  Bodo Möller 6dad7bd69c Speed up DH with small generator. 24 years ago