Andy Polyakov
fc0e014ca3
fips_check_rsa update.
2005-05-19 22:29:55 +00:00
Bodo Möller
973fbfe3a3
make update
2005-05-11 17:49:50 +00:00
Andy Polyakov
cbd72088ec
Tidy up an error code.
2005-05-10 22:57:21 +00:00
Andy Polyakov
82b47955fc
Void new FIPS tests if configured without FIPS.
2005-05-09 19:34:34 +00:00
Dr. Stephen Henson
eb798944b3
Stop warnings in asserts.
...
Add support for SHA-XXX in RSA tests.
Make fips_check_rsa work for key lengths > 2048 bits.
2005-05-08 23:48:18 +00:00
Andy Polyakov
4b27a9feb3
Backport SHA-[224|256|384|512] from HEAD to FIPS.
2005-05-07 17:21:34 +00:00
Dr. Stephen Henson
0649b6f0f2
Add FIPS rsa sign test program.
2005-05-07 12:50:28 +00:00
Dr. Stephen Henson
389ff2e01f
FIPS RSA sign test.
2005-05-07 12:11:37 +00:00
Dr. Stephen Henson
2dab26339d
FIPS RSA verify test.
2005-05-05 21:46:30 +00:00
Dr. Stephen Henson
4ed56cba63
New function BN_MONT_CTX_set_locked, to set montgomery parameters in a
...
threadsafe manner.
Modify or add calls to use it in rsa, dsa and dh algorithms.
2005-04-22 13:17:49 +00:00
Dr. Stephen Henson
c61a8ad5b0
Remove obsolete fingerprint.sha1 files and associated scripts. Delete test
...
in fips/sha1/Makefile: the top level test checks the same files.
2005-04-18 16:34:21 +00:00
Andy Polyakov
2ec5ebb979
Minor fips const-ification.
2005-04-18 00:22:40 +00:00
Andy Polyakov
863a155451
Resolve minor binary compatibility issues in fips.
2005-04-17 23:26:40 +00:00
Dr. Stephen Henson
b99daf76a7
Update hash checking in makefiles to use new perl script.
2005-04-15 11:27:29 +00:00
Richard Levitte
9addd9b6fb
Add emacs cache files to .cvsignore.
2005-04-11 14:18:14 +00:00
Richard Levitte
086b64d0d3
make update
2005-01-14 00:16:31 +00:00
Richard Levitte
c4929fb841
Clear signed vs. unsigned conflicts.
...
Change the fingerprint accordingly.
2005-01-11 16:54:35 +00:00
Dr. Stephen Henson
76d088046c
RSA KAT.
2005-01-03 17:46:45 +00:00
Richard Levitte
a2617f727d
Don't use $(EXHEADER) directly in for loops, as most shells will break
...
if $(EXHEADER) is empty.
Notified by many, solution suggested by Carson Gaspar <carson@taltos.org>
2004-11-02 23:53:31 +00:00
Richard Levitte
7f9c37457a
To protect FIPS-related global variables, add locking mechanisms
...
around them.
NOTE: because two new locks are added, this adds potential binary
incompatibility with earlier versions in the 0.9.7 series. However,
those locks will only ever be touched when FIPS_mode_set() is called
and after, thanks to a variable that's only changed from 0 to 1 once
(when FIPS_mode_set() is called). So basically, as long as FIPS mode
hasn't been engaged explicitely by the calling application, the new
locks are treated as if they didn't exist at all, thus not becoming a
problem. Applications that are built or rebuilt to use FIPS
functionality will need to be recompiled in any case, thus not being a
problem either.
2004-07-30 14:38:02 +00:00
Dr. Stephen Henson
40007ad24d
Avoid compiler warnings.
2004-07-21 17:35:49 +00:00
Richard Levitte
871fe9107d
Make sure we don't try to loop over an empty EXHEADER. In the
...
Makefiles where this was fixed by commenting away code, change it to
check for an empty EXHEADER instead, so we have less hassle in a
future where EXHEADER changes.
PR: 900
2004-06-21 09:07:41 +00:00
Richard Levitte
5affe206e1
Define FIPS_*_SIZE_T for AES, DSA and RSA as well, in preparation for
...
size_t-ification of those algorithms in future version of OpenSSL...
2004-05-19 14:16:33 +00:00
Richard Levitte
141a64faff
Ignore 'Makefile.save'
2004-05-12 10:07:20 +00:00
Richard Levitte
035dcd3724
Ignore the 'lib' timestamp file.
2004-05-12 08:46:43 +00:00
Ben Laurie
3642f632d3
Pull FIPS back into stable.
2004-05-11 12:46:24 +00:00