Geçmişin Kaydedilmesi

Yazar SHA1 Mesaj Tarih
  Bernd Edlinger 8957adda16 Fix error handling in compute_key, BN_CTX_get can return NULL 7 yıl önce
  Matt Caswell ae5c8664e5 Run util/openssl-format-source -v -c . 9 yıl önce
  Dr. Stephen Henson 6c4b3514d7 New SP 800-56A compliant version of DH_compute_key(). 13 yıl önce
  Dr. Stephen Henson 5999d45a5d DH keys have an (until now) unused 'q' parameter. When creating from DSA copy 13 yıl önce
  Dr. Stephen Henson 03e16611a3 Redirect DH operations to FIPS module. Block non-FIPS methods. 13 yıl önce
  Bodo Möller bd31fb2145 Change to mitigate branch prediction attacks 17 yıl önce
  Mark J. Cox c2cccfc585 Initialise ctx to NULL to avoid uninitialized free, noticed by 18 yıl önce
  Bodo Möller 5e3225cc44 Introduce limits to prevent malicious keys being able to 18 yıl önce
  Nils Larsch 47d5566646 fix error found by coverity: check if ctx is != NULL before calling BN_CTX_end() 18 yıl önce
  Ben Laurie bf3d6c0c9b Make D-H safer, include well-known primes. 19 yıl önce
  Bodo Möller a28a5d9c62 Use BN_with_flags() in a cleaner way. 19 yıl önce
  Bodo Möller 46a643763d Implement fixed-window exponentiation to mitigate hyper-threading 19 yıl önce
  Andy Polyakov 3cc54008eb Pointer to BN_MONT_CTX could be used uninitialized. 19 yıl önce
  Dr. Stephen Henson 879b19801a Change method_mont_p from (char *) to (BN_MONT_CTX *) and remove several 19 yıl önce
  Dr. Stephen Henson 6ec8e63af6 Port BN_MONT_CTX_set_locked() from stable branch. 19 yıl önce
  Bodo Möller aa4ce7315f Fix various incorrect error function codes. 19 yıl önce
  Richard Levitte 43eb3b0130 We seem to carry some rests of the 0.9.6 [engine] ENGINE framework in form 21 yıl önce
  Richard Levitte 0b13e9f055 Add the possibility to build without the ENGINE framework. 21 yıl önce
  Geoff Thorpe 0e4aa0d2d2 As with RSA, which was modified recently, this change makes it possible to 22 yıl önce
  Geoff Thorpe cb78486d97 This commits changes to various parts of libcrypto required by the recent 23 yıl önce
  Bodo Möller de3333bae4 length of secret exponent is needed only when we create one 23 yıl önce
  Bodo Möller 924875e53b Undo DH_generate_key() change: s3_srvr.c was using it correctly 23 yıl önce
  Bodo Möller e5cb260365 DH key generation should not use a do ... while loop, 23 yıl önce
  Bodo Möller 6aecef815c Don't preserve existing keys in DH_generate_key. 23 yıl önce
  Bodo Möller c62b26fdc6 Hide BN_CTX structure details. 23 yıl önce
  Ulf Möller 48f2ef8d00 make it a loop as in dsa 23 yıl önce
  Ulf Möller 12c2fe8d53 Use BN_rand_range(). 23 yıl önce
  Richard Levitte f971ccb264 Constify DH-related code. 24 yıl önce
  Richard Levitte 5270e7025e Merge the engine branch into the main trunk. All conflicts resolved. 24 yıl önce
  Bodo Möller 6dad7bd69c Speed up DH with small generator. 24 yıl önce