- Jun 13, 2013
-
-
Adam Langley authored
that bad encryptions are treated like random session keys in constant time.
-
Ben Laurie authored
-
- Jun 12, 2013
-
-
Matt Caswell authored
PR#3071 The primary changes made are: - Updates to the "NAME" section of many pages to correctly reflect the functions defined on those pages. This section is automatically parsed by the util/extract-names.pl script, so if it is not correct then running "man" will not correctly locate the right manual pages. - Updates to take account of where functions are now deprecated - Full documentation of the ec sub-library - A number of other typo corrections and other minor tweaks
-
Dr. Stephen Henson authored
Extend OAEP support. Generalise the OAEP padding functions to support arbitrary digests. Extend EVP_PKEY RSA method to handle the new OAEP padding functions and add ctrls to set the additional parameters.
-
Dr. Stephen Henson authored
-
Trevor authored
Contributed by Trevor Perrin.
-
Ben Laurie authored
-
- Jun 10, 2013
-
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
- Jun 05, 2013
-
-
Dr. Stephen Henson authored
Fix PSS signature printing: consistently use 0x prefix for hex values for padding length and trailer fields.
-
Dr. Stephen Henson authored
-
- Jun 04, 2013
-
-
Adam Langley authored
requested size. Fixes OpenSSL #2701. This change does not address the cases of generating safe primes, or where the |add| parameter is non-NULL. Conflicts: crypto/bn/bn.h crypto/bn/bn_err.c
-
Adam Langley authored
-
Adam Langley authored
eliminating them as dead code. Both volatile and "memory" are used because of some concern that the compiler may still cache values across the asm block without it, and because this was such a painful debugging session that I wanted to ensure that it's never repeated.
-
Ben Laurie authored
-
Ben Laurie authored
-
- Jun 01, 2013
-
-
Andy Polyakov authored
-
- May 25, 2013
-
-
Andy Polyakov authored
PR: 3042
-
Andy Polyakov authored
-
Andy Polyakov authored
(and pending AVX2 changes).
-
Andy Polyakov authored
-
- May 13, 2013
-
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
- May 05, 2013
-
-
Ben Laurie authored
-
Ben Laurie authored
-
- May 02, 2013
-
-
Dr. Stephen Henson authored
Reencode certificates in X509_sign_ctx as well as X509_sign. This was causing a problem in the x509 application when it modified an existing certificate.
-
- Apr 23, 2013
-
-
Andy Polyakov authored
Submitted by: Ard Biesheuvel <ard.biesheuvel@linaro.org> Contributor claims ~50% improvement in CTR and ~9% in CBC decrypt on Cortex-A15.
-
Andy Polyakov authored
-
- Apr 14, 2013
-
-
Dr. Stephen Henson authored
-
- Apr 13, 2013
-
-
Andy Polyakov authored
-
Andy Polyakov authored
While ARMv7 in general is capable of unaligned access, not all instructions actually are. And trouble is that compiler doesn't seem to differentiate those capable and incapable of unaligned access. Side effect is that kernel goes into endless loop retrying same instruction triggering unaligned trap. Problem was observed in xts128.c and ccm128.c modules. It's possible to resolve it by using (volatile u32*) casts, but letting STRICT_ALIGNMENT be feels more appropriate.
-
- Apr 09, 2013
-
-
Dr. Stephen Henson authored
Check for Suite B support using method flags instead of version numbers: anything supporting TLS 1.2 cipher suites will also support Suite B. Return an error if an attempt to use DTLS 1.0 is made in Suite B mode.
-
Dr. Stephen Henson authored
If we successfully match a cookie don't set return value to 2 as this results in other error conditions returning 2 as well. Instead set return value to -2 which can be checked later if everything else is OK.
-
Dr. Stephen Henson authored
Add new methods DTLS_*_method() which support both DTLS 1.0 and DTLS 1.2 and pick the highest version the peer supports during negotiation. As with SSL/TLS options can change this behaviour specifically SSL_OP_NO_DTLSv1 and SSL_OP_NO_DTLSv1_2.
-