Lines Matching refs:DSA

320  * Fixed an issue where checking excessively long DSA keys or parameters may
324 EVP_PKEY_public_check() to check a DSA public key or DSA parameters may
329 To resolve this issue DSA keys larger than OPENSSL_DSA_MAX_MODULUS_BITS
337 * Improved EC/DSA nonce generation routines to avoid bias and timing
947 DSA and DH keys of 1024 bits and above and less than 2048 bits and ECC keys
1416 * Fixed NULL dereference validating DSA public key.
1419 application tries to check a malformed DSA public key by the
2702 * All of the low-level DSA functions have been deprecated.
3854 * Enable SHA3 pre-hashing for ECDSA and DSA.
3858 * Change the default RSA, DSA and DH size to 2048 bit instead of 1024.
3860 It fixes an omission in earlier changes that changed all RSA, DSA and DH
3950 * Timing vulnerability in DSA signature generation
3952 The OpenSSL DSA signature algorithm has been shown to be vulnerable to a
4026 * Increase the number of Miller-Rabin rounds for DSA key generating to 64.
4095 * Add blinding to ECDSA and DSA signatures to protect against side channel
4572 * Change the default RSA, DSA and DH size to 2048 bit instead of 1024.
4574 It fixes an omission in earlier changes that changed all RSA, DSA and DH
4635 * Timing vulnerability in DSA signature generation
4637 The OpenSSL DSA signature algorithm has been shown to be vulnerable to a
4710 * Increase the number of Miller-Rabin rounds for DSA key generating to 64.
4714 * Add blinding to ECDSA and DSA signatures to protect against side channel
4809 Analysis suggests that attacks against RSA and DSA as a result of this
4833 against RSA and DSA as a result of this defect would be very difficult to
4918 against RSA and DSA as a result of this defect would be very difficult to
4966 longer than 256 bits. Analysis suggests that attacks against RSA, DSA
5120 off the constant time implementation for RSA, DSA and DH have been made
5234 * Made DSA and DSA_METHOD opaque. The structures for managing DSA objects
5934 - OPENSSL_NO_EC{DH,DSA} merged into OPENSSL_NO_EC
6096 * Add support for canonical generation of DSA parameter 'g'. See
6124 * Add PRNG security strength checks to RSA, DSA and ECDSA using
6369 * Change the default RSA, DSA and DH size to 2048 bit instead of 1024.
6371 It fixes an omission in earlier changes that changed all RSA, DSA and DH
6431 * Timing vulnerability in DSA signature generation
6433 The OpenSSL DSA signature algorithm has been shown to be vulnerable to a
6495 * Increase the number of Miller-Rabin rounds for DSA key generating to 64.
6499 * Add blinding to ECDSA and DSA signatures to protect against side channel
6560 Analysis suggests that attacks against RSA and DSA as a result of this
6584 against RSA and DSA as a result of this defect would be very difficult to
6636 against RSA and DSA as a result of this defect would be very difficult to
6657 longer than 256 bits. Analysis suggests that attacks against RSA, DSA
6804 * Constant time flag not preserved in DSA signing
6806 Operations in the DSA signing algorithm should run in constant time in
6807 order to avoid side channel attacks. A flaw in the OpenSSL DSA
6810 attack to be sufficient for an attacker to recover the private DSA key.
6999 * Fix a double-free in DSA code
7001 A double free bug was discovered when OpenSSL parses malformed DSA private
7003 that receive DSA private keys from untrusted sources. This scenario is
7105 * Change the `req` command to generate a 2048-bit RSA/DSA key by default,
7107 omission in an earlier change that changed all RSA/DSA key generation
7165 against RSA and DSA as a result of this defect would be very difficult to
8005 * Constant time flag not preserved in DSA signing
8007 Operations in the DSA signing algorithm should run in constant time in
8008 order to avoid side channel attacks. A flaw in the OpenSSL DSA
8011 attack to be sufficient for an attacker to recover the private DSA key.
8201 * Fix a double-free in DSA code
8203 A double free bug was discovered when OpenSSL parses malformed DSA private
8205 that receive DSA private keys from untrusted sources. This scenario is
8307 * Change the req command to generate a 2048-bit RSA/DSA key by default,
8309 omission in an earlier change that changed all RSA/DSA key generation
8676 3. Check DSA/ECDSA signatures use DER.
8678 Re-encode DSA/ECDSA signatures and compare with the original received
9250 information. Include DSA version that prints out the signature
9324 * Redirect DSA and DH operations to FIPS module in FIPS mode.
9745 3. Check DSA/ECDSA signatures use DER.
9747 Re-encode DSA/ECDSA signatures and compare with the original received
10927 * Add DSA pkey method and DH pkey methods, extend DH ASN1 method to support
10929 command line functionality not previously available: DSA signatures can be
11516 * Add CryptoAPI ENGINE to support use of RSA and DSA keys held in Windows
12631 software implementations. For DSA and DH, parameter generation can
13182 * For DSA signing, unless DSA_FLAG_NO_EXP_CONSTTIME is set, perform
13185 after many signatures; cf. Bleichenbacher's attack on DSA with
13191 RSA, DSA, and DH private-key operations so that the sequence of
13198 BN_FLG_EXP_CONSTTIME is set for the exponent. RSA, DSA, and DH
13568 * DSA routines: under certain error conditions uninitialized BN objects
13998 default_algorithms = RSA, DSA, RAND, CIPHERS, DIGESTS
14173 API changes worth noting - some RSA, DSA, DH, and RAND functions that
14320 * Give DH, DSA, and RSA types their own `*_up_ref()` function to increment
14427 * Cause 'openssl speed' to use fully hard-coded DSA keys as it
16444 * Fix various bugs related to DSA S/MIME verification. Handle missing
16445 parameters in DSA public key structures and return an error in the
16446 DSA routines if parameters are absent.
16618 Bleichenbacher's DSA attack.
16693 call failed, free the DSA structure.
16763 * Initialise "ex_data" member of RSA/DSA/DH structures prior to calling
16922 random number < q in the DSA library.
17229 DSA key.
17342 This makes DSA verification about 2 % faster.
17456 * Add missing DSA library text string. Work around for some IIS
17666 * Fix the PKCS#8 DSA private key code so it decodes keys again
17686 converts DSA parameters into DH parameters. (When creating parameters,
17966 As BN_is_prime_fasttest includes trial division, DSA parameter
18229 if a DER encoded private key is RSA or DSA traditional format. Changed
18437 DSA key was used because it didn't fix the digest.
18475 * Modify RSA and DSA PEM read routines to transparently handle
18480 these are retained for compatibility: however the DSA variants were
18494 is used which works with EVP_PKEY, RSA or DSA structures: though
18698 seed file at least for key creation, DSA signing, and for DH exchanges;
18780 Also added necessary DSA public key functions to handle this.
18932 provides hooks that allow the default DSA functions or functions on a
19001 * New function DSA_dup_DH, which duplicates DSA parameters/keys as
19126 * The x509 application mishandled signing requests containing DSA
19127 keys when the signing key was also DSA and the parameters didn't match.
19844 the raw DSA values prior to ASN.1 encoding.
20178 for the DSA certificate situation this fixes the "no shared cipher"
20191 area because they are useful for the DSA situation and should be
20218 * Make `openssl x509 -noout -modulus`' functional also for DSA certificates
20221 -modulus`. For RSA the -modulus is the real "modulus" while for DSA
20519 * Remove pointless MD5 hash when using DSA keys in ca.
20561 encryption from sample DSA keys (in case anyone is interested the password
20636 * ca.c: move test for DSA keys inside #ifndef NO_DSA. Make pubkey
20741 * Incorporated the popular no-RSA/DSA-only patches
20828 * DSA fix for "ca" program.