Age | Commit message (Expand) | Author |
2018-11-09 | Initialize priv_key and pub_key on first use instead of at the top. | Theo Buehler |
2018-11-06 | unrevert the use of bn_rand_interval(). | Theo Buehler |
2018-11-06 | revert use of bn_rand_interval due to failures with ECDHE and TLS | Theo Buehler |
2018-11-05 | Make use of bn_rand_interval() where appropriate. | Theo Buehler |
2018-11-05 | Eliminate a few "} else" branches, a few unneeded NULL checks before | Theo Buehler |
2018-11-05 | Remove two unnecessary BN_FLG_CONSTTIME dances: BN_mod_exp_ct() already | Theo Buehler |
2018-08-24 | Add consts to EVP_PKEY_asn1_set_private() | Theo Buehler |
2018-08-24 | After removing support for broken PKCS#8 formats (it was high time), | Theo Buehler |
2018-06-14 | Use a blinding value when generating a DSA signature, in order to reduce | Joel Sing |
2018-06-14 | Clarify the digest truncation comment in DSA signature generation. | Joel Sing |
2018-06-14 | Pull up the code that converts the digest to a BIGNUM - this only needs | Joel Sing |
2018-06-14 | Fix a potential leak/incorrect return value in DSA signature generation. | Joel Sing |
2018-06-14 | Call DSA_SIG_new() instead of hand rolling the same. | Joel Sing |
2018-06-14 | DSA_SIG_new() amounts to a single calloc() call. | Joel Sing |
2018-06-13 | style(9), comments and whitespace. | Joel Sing |
2018-06-13 | Avoid a timing side-channel leak when generating DSA and ECDSA signatures. | Joel Sing |
2018-05-01 | Convert a handful of X509_*() functions to take const as in OpenSSL. | Theo Buehler |
2018-04-28 | Fix a small timing side channel in dsa_sign_setup(). Simple adaptation | Theo Buehler |
2018-04-14 | make ENGINE_finish() succeed on NULL and simplify callers as in | Theo Buehler |
2018-03-17 | Add DSA_meth_{dup,free,new,set_{finish,sign}}() | Theo Buehler |
2018-02-20 | Provide DSA_get0_engine() | Theo Buehler |
2018-02-20 | Provide DSA_SIG_{g,s}et0() | Theo Buehler |
2018-02-20 | Provide DSA_{clear,set,test}_flags() | Theo Buehler |
2018-02-18 | Provide {DH,DSA}_set0_key(). Requested by sthen. | Theo Buehler |
2018-02-18 | Provide DSA_set0_pqg. | Theo Buehler |
2018-02-17 | s/DH/DSA/ | Joel Sing |
2018-02-17 | Provide further parts of the OpenSSL 1.1 API: {DH,DSA}_get0_{key,pqg}(), | Theo Buehler |
2017-05-02 | use freezero() instead of memset/explicit_bzero + free. Substantially | Theo de Raadt |
2017-01-29 | Send the function codes from the error functions to the bit bucket, | Bob Beck |
2017-01-21 | Add ct and nonct versions of BN_mod_inverse for internal use | Bob Beck |
2017-01-21 | Split out BN_div and BN_mod into ct and nonct versions for Internal use. | Bob Beck |
2017-01-21 | Make explicit _ct and _nonct versions of bn_mod_exp funcitons that | Bob Beck |
2016-12-30 | Expand ASN1_ITEM_rptr macro - no change in generated assembly. | Joel Sing |
2016-12-21 | Explicitly export a list of symbols from libcrypto. | Joel Sing |
2016-11-04 | Kill a bunch of OLD_ASN1 usage by replacing ASN1_{d2i,i2d}_* with | Joel Sing |
2016-10-19 | unifdef OPENSSL_NO_CMS | Joel Sing |
2016-06-30 | Remove flags for disabling constant-time operations. | Brent Cook |
2016-06-21 | Disable DSA_FLAG_NO_EXP_CONSTTIME, always enable constant-time behavior. | Brent Cook |
2016-06-06 | Set BN_FLG_CONSTTIME on the correct variable. beck committed wrong fix. | Ted Unangst |
2016-06-06 | Correct a problem that prevents the DSA signing algorithm from running | Bob Beck |
2016-03-01 | Remove support for ancient, broken DSA implementations. | Doug Hogan |
2015-10-13 | Group d2i/i2d function prototypes by type and add missing externs for the | Joel Sing |
2015-09-26 | We don't need no stinking "EXAMPLE OF THE DSA" or README (the credits are | Joel Sing |
2015-09-10 | When loading a DSA key from an raw (without DH parameters) ASN.1 serialization, | Miod Vallat |
2015-09-10 | Fix an incorrect error check in DSA verify. | Brent Cook |
2015-07-15 | Fix inverted test in previous. Commit message told what we intended, but | Miod Vallat |
2015-07-15 | Previous fix for Coverity CID 21785 did not cope correctly with seed_len != 0, | Miod Vallat |
2015-02-15 | Avoid calling BN_CTX_end() on a context that wasn't started. | Doug Hogan |
2015-02-15 | If we decide to discard the provided seed buffer because its size is not | Miod Vallat |
2015-02-14 | Coverity CID 21733 (unchecked allocation), 78823 (leak on error). | Miod Vallat |