Revīziju vēsture

Autors SHA1 Ziņojums Datums
  Bernd Edlinger 8957adda16 Fix error handling in compute_key, BN_CTX_get can return NULL 7 gadi atpakaļ
  Matt Caswell ae5c8664e5 Run util/openssl-format-source -v -c . 9 gadi atpakaļ
  Dr. Stephen Henson 6c4b3514d7 New SP 800-56A compliant version of DH_compute_key(). 13 gadi atpakaļ
  Dr. Stephen Henson 5999d45a5d DH keys have an (until now) unused 'q' parameter. When creating from DSA copy 13 gadi atpakaļ
  Dr. Stephen Henson 03e16611a3 Redirect DH operations to FIPS module. Block non-FIPS methods. 13 gadi atpakaļ
  Bodo Möller bd31fb2145 Change to mitigate branch prediction attacks 17 gadi atpakaļ
  Mark J. Cox c2cccfc585 Initialise ctx to NULL to avoid uninitialized free, noticed by 18 gadi atpakaļ
  Bodo Möller 5e3225cc44 Introduce limits to prevent malicious keys being able to 18 gadi atpakaļ
  Nils Larsch 47d5566646 fix error found by coverity: check if ctx is != NULL before calling BN_CTX_end() 18 gadi atpakaļ
  Ben Laurie bf3d6c0c9b Make D-H safer, include well-known primes. 19 gadi atpakaļ
  Bodo Möller a28a5d9c62 Use BN_with_flags() in a cleaner way. 19 gadi atpakaļ
  Bodo Möller 46a643763d Implement fixed-window exponentiation to mitigate hyper-threading 19 gadi atpakaļ
  Andy Polyakov 3cc54008eb Pointer to BN_MONT_CTX could be used uninitialized. 19 gadi atpakaļ
  Dr. Stephen Henson 879b19801a Change method_mont_p from (char *) to (BN_MONT_CTX *) and remove several 19 gadi atpakaļ
  Dr. Stephen Henson 6ec8e63af6 Port BN_MONT_CTX_set_locked() from stable branch. 19 gadi atpakaļ
  Bodo Möller aa4ce7315f Fix various incorrect error function codes. 19 gadi atpakaļ
  Richard Levitte 43eb3b0130 We seem to carry some rests of the 0.9.6 [engine] ENGINE framework in form 21 gadi atpakaļ
  Richard Levitte 0b13e9f055 Add the possibility to build without the ENGINE framework. 21 gadi atpakaļ
  Geoff Thorpe 0e4aa0d2d2 As with RSA, which was modified recently, this change makes it possible to 22 gadi atpakaļ
  Geoff Thorpe cb78486d97 This commits changes to various parts of libcrypto required by the recent 23 gadi atpakaļ
  Bodo Möller de3333bae4 length of secret exponent is needed only when we create one 23 gadi atpakaļ
  Bodo Möller 924875e53b Undo DH_generate_key() change: s3_srvr.c was using it correctly 23 gadi atpakaļ
  Bodo Möller e5cb260365 DH key generation should not use a do ... while loop, 23 gadi atpakaļ
  Bodo Möller 6aecef815c Don't preserve existing keys in DH_generate_key. 23 gadi atpakaļ
  Bodo Möller c62b26fdc6 Hide BN_CTX structure details. 23 gadi atpakaļ
  Ulf Möller 48f2ef8d00 make it a loop as in dsa 23 gadi atpakaļ
  Ulf Möller 12c2fe8d53 Use BN_rand_range(). 23 gadi atpakaļ
  Richard Levitte f971ccb264 Constify DH-related code. 24 gadi atpakaļ
  Richard Levitte 5270e7025e Merge the engine branch into the main trunk. All conflicts resolved. 24 gadi atpakaļ
  Bodo Möller 6dad7bd69c Speed up DH with small generator. 24 gadi atpakaļ