summaryrefslogtreecommitdiffstats
path: root/crypto/rsa (follow)
Commit message (Expand)AuthorAgeFilesLines
* Avoid generating RSA keys with p < qrkarmaka982023-04-281-0/+9
* Fix the LCM computation in the RSA multiprime key checkTomas Mraz2023-04-131-6/+10
* Alternative fix for CVE-2022-4304Bernd Edlinger2023-04-041-7/+6
* Revert "Fix Timing Oracle in RSA decryption"Bernd Edlinger2023-04-041-14/+7
* Remove ossl_rsa_pss_params_30_set_maskgenalg().slontis2023-03-011-9/+0
* S390x: Support ME and CRT offloadingJuergen Christ2023-02-081-0/+35
* Fix Timing Oracle in RSA decryptionDmitry Belyavskiy2023-02-071-76/+96
* Make RSA_generate_multi_prime_key() not segfault if e is NULL.slontis2023-01-121-6/+7
* Refine the documents of several APIsPeiwei Hu2022-12-161-1/+1
* rsa: Add option to disable implicit rejectionHubert Kario2022-12-122-6/+30
* rsa: add implicit rejection in PKCS#1 v1.5Hubert Kario2022-12-122-1/+346
* signature: Clamp PSS salt len to MD lenClemens Lang2022-12-082-6/+38
* Obtain PSS salt length from providerClemens Lang2022-12-081-18/+20
* Replace "a RSA" with "an RSA"Daniel Fiala2022-12-061-2/+2
* Stop raising ERR_R_MALLOC_FAILURE in most placesRichard Levitte2022-10-0514-74/+40
* Fix memory leak in ossl_rsa_fromdata.slontis2022-06-281-2/+5
* The rsa_validate_keypair_multiprime() function return is not booleanMatt Caswell2022-06-281-1/+1
* Add sensitive memory clean in priv encodeKan2022-06-161-0/+1
* RSA Keygen update - When using the default provider fallback to default multi...slontis2022-06-131-7/+9
* Fix the check of evp_pkey_ctx_set_params_strictPeiwei Hu2022-06-021-2/+4
* Fix the checks of EVP_PKEY_CTX_get/set_rsa_pss_saltlenPeiwei Hu2022-06-021-1/+1
* Update copyright yearMatt Caswell2022-05-034-4/+4
* str[n]casecmp => OPENSSL_strncasecmpDmitry Belyavskiy2022-04-221-4/+2
* rsa: add check after calling BN_BLINDING_lockJiasheng Jiang2022-02-081-1/+3
* Move e_os.h to include/internalRichard Levitte2022-02-051-1/+1
* Fix EVP todata and fromdata when used with selection of EVP_PKEY_PUBLIC_KEY.slontis2022-02-032-7/+9
* replace ;; with ; as statement separatorPauli2022-01-181-1/+1
* Fix malloc failure handling of X509_ALGOR_set0()Dr. David von Oheimb2022-01-141-11/+17
* Fix typosDimitris Apostolou2022-01-051-1/+1
* check the return value of BN_dup() in rsa_lib.c:1248x20182021-12-021-1/+4
* fix some code with obvious wrong coding stylex20182021-10-284-4/+4
* add checks for the return values of BN_new(), sk_RSA_PRIME_INFO_new_reserve(),x20182021-10-271-0/+2
* Allow small RSA exponents in the default providerShane Lontis2021-08-131-18/+9
* Update copyright yearMatt Caswell2021-07-291-1/+1
* DSA/RSA_print(): Fix potential memory leakTomas Mraz2021-07-231-2/+4
* Update our EVP_PKEY_METHODs to get low level keys via public APIsMatt Caswell2021-07-221-23/+44
* CRYPTO: Remove the check for built-in methods in the export_to functionRichard Levitte2021-07-071-7/+0
* fips module header inclusion fine-tunningTomas Mraz2021-07-063-18/+23
* Replace non-ASCII character in source fileTomas Mraz2021-06-191-1/+1
* rsa: fix indentationPauli2021-06-191-6/+6
* crypto: repalce tabs with spacesPauli2021-06-191-3/+3
* Update copyright yearMatt Caswell2021-06-171-1/+1
* Move libssl related defines used by fips provider to prov_ssl.hTomas Mraz2021-06-041-1/+1
* rsa: make the maximum key strength check FIPS only.Pauli2021-06-031-0/+6
* rsa: remove TODOsPauli2021-06-022-11/+0
* Rename all getters to use get/get0 in nameTomas Mraz2021-06-016-33/+34
* crypto: updates to pass size_t to RAND_bytes_ex()Pauli2021-06-013-0/+8
* add zero strenght arguments to BN and RAND RNG callsPauli2021-05-293-5/+5
* errors: update error message (to be squashed)Pauli2021-05-271-1/+3
* rsa: check that the RNG is capable of producing a key of the specified sizePauli2021-05-271-0/+22