<feed xmlns='http://www.w3.org/2005/Atom'>
<title>otp.git/lib/crypto, branch OTP-17.2</title>
<subtitle>Mirror of Erlang/OTP repository.
</subtitle>
<link rel='alternate' type='text/html' href='http://git.ninenines.eu/otp.git/'/>
<entry>
<title>Prepare release</title>
<updated>2014-06-19T11:47:21+00:00</updated>
<author>
<name>Erlang/OTP</name>
<email>otp@erlang.org</email>
</author>
<published>2014-06-19T11:47:21+00:00</published>
<link rel='alternate' type='text/html' href='http://git.ninenines.eu/otp.git/commit/?id=77da984614ae462912a1896ba1bb73c798ffd4f8'/>
<id>77da984614ae462912a1896ba1bb73c798ffd4f8</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge branch 'sverk/crypto-ec-mem-leak/OTP-11999' into maint</title>
<updated>2014-06-19T11:44:11+00:00</updated>
<author>
<name>Sverker Eriksson</name>
<email>sverker@erlang.org</email>
</author>
<published>2014-06-19T11:44:11+00:00</published>
<link rel='alternate' type='text/html' href='http://git.ninenines.eu/otp.git/commit/?id=1af8998028f77b4ca01c52972a5983b072ef02d1'/>
<id>1af8998028f77b4ca01c52972a5983b072ef02d1</id>
<content type='text'>
* sverk/crypto-ec-mem-leak/OTP-11999:
  crypto: Fix memory leak of EC "keys" and "points"
  crypto: Fix crypto for debug and valgrind
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* sverk/crypto-ec-mem-leak/OTP-11999:
  crypto: Fix memory leak of EC "keys" and "points"
  crypto: Fix crypto for debug and valgrind
</pre>
</div>
</content>
</entry>
<entry>
<title>crypto: Fix memory leak of EC "keys" and "points"</title>
<updated>2014-06-18T14:40:55+00:00</updated>
<author>
<name>Sverker Eriksson</name>
<email>sverker@erlang.org</email>
</author>
<published>2014-06-18T14:40:55+00:00</published>
<link rel='alternate' type='text/html' href='http://git.ninenines.eu/otp.git/commit/?id=3e04f2d1e62aa76f0ffe4ad36dccd843cc89b9ae'/>
<id>3e04f2d1e62aa76f0ffe4ad36dccd843cc89b9ae</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>crypto: Fix crypto for debug and valgrind</title>
<updated>2014-06-17T18:17:40+00:00</updated>
<author>
<name>Sverker Eriksson</name>
<email>sverker@erlang.org</email>
</author>
<published>2014-06-17T18:17:40+00:00</published>
<link rel='alternate' type='text/html' href='http://git.ninenines.eu/otp.git/commit/?id=70c6e5a1baa326c9809851e00b8849cb6706f812'/>
<id>70c6e5a1baa326c9809851e00b8849cb6706f812</id>
<content type='text'>
without relying on opt-version has been built.

Removed ASSERT to make crypto_callback.debug.so work without
dynamic linking to libcrypto.so.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
without relying on opt-version has been built.

Removed ASSERT to make crypto_callback.debug.so work without
dynamic linking to libcrypto.so.
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge branch 'pguyot/fix_srp' into maint</title>
<updated>2014-06-11T08:52:50+00:00</updated>
<author>
<name>Henrik Nord</name>
<email>henrik@erlang.org</email>
</author>
<published>2014-06-11T08:52:50+00:00</published>
<link rel='alternate' type='text/html' href='http://git.ninenines.eu/otp.git/commit/?id=0bbe935474b3548a80925423ad625be842d00479'/>
<id>0bbe935474b3548a80925423ad625be842d00479</id>
<content type='text'>
* pguyot/fix_srp:
  Fix bug in SRP implementation
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* pguyot/fix_srp:
  Fix bug in SRP implementation
</pre>
</div>
</content>
</entry>
<entry>
<title>crypto: Fix memory leak in some error cases</title>
<updated>2014-05-26T15:09:54+00:00</updated>
<author>
<name>Sverker Eriksson</name>
<email>sverker@erlang.org</email>
</author>
<published>2014-05-26T15:02:35+00:00</published>
<link rel='alternate' type='text/html' href='http://git.ninenines.eu/otp.git/commit/?id=fb6d7a6e6eacc7767fd5faf262eda6791de44fe7'/>
<id>fb6d7a6e6eacc7767fd5faf262eda6791de44fe7</id>
<content type='text'>
sign(dss,) and compute_key(dh,)
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
sign(dss,) and compute_key(dh,)
</pre>
</div>
</content>
</entry>
<entry>
<title>crypto: Fix memory leak in hmac stream functions</title>
<updated>2014-05-26T14:18:41+00:00</updated>
<author>
<name>Sverker Eriksson</name>
<email>sverker@erlang.org</email>
</author>
<published>2014-05-26T14:18:41+00:00</published>
<link rel='alternate' type='text/html' href='http://git.ninenines.eu/otp.git/commit/?id=d282da3510b56313feb7c52e7844880f4d87d088'/>
<id>d282da3510b56313feb7c52e7844880f4d87d088</id>
<content type='text'>
The context was never deallocated.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The context was never deallocated.
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix bug in SRP implementation</title>
<updated>2014-05-15T14:38:12+00:00</updated>
<author>
<name>Paul Guyot</name>
<email>pguyot@kallisys.net</email>
</author>
<published>2014-05-15T14:29:34+00:00</published>
<link rel='alternate' type='text/html' href='http://git.ninenines.eu/otp.git/commit/?id=eee8d83ad1766b038b16102eb2006eaa7c21b4e5'/>
<id>eee8d83ad1766b038b16102eb2006eaa7c21b4e5</id>
<content type='text'>
SRP didn't work with smaller primes as user secret was improperly
computed.

Formula is: (B - (k * g^x)) ^ (a + (u * x)) % N

Previously, the code computed a + (u * x) % N instead of a + (u * x).
a typically is a 256 bits random number (RFC 5054 says it should be at
least 256 bits), u and x are SHA1 signatures (160 bits). So a + (u * x)
can differ from a + (u * x) % N for N primes smaller than 320 bits.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
SRP didn't work with smaller primes as user secret was improperly
computed.

Formula is: (B - (k * g^x)) ^ (a + (u * x)) % N

Previously, the code computed a + (u * x) % N instead of a + (u * x).
a typically is a 256 bits random number (RFC 5054 says it should be at
least 256 bits), u and x are SHA1 signatures (160 bits). So a + (u * x)
can differ from a + (u * x) % N for N primes smaller than 320 bits.
</pre>
</div>
</content>
</entry>
<entry>
<title>Add AES-CBF8 cypher to crypto module</title>
<updated>2014-04-29T12:31:49+00:00</updated>
<author>
<name>Bernard Duggan</name>
<email>bernard@guarana.org</email>
</author>
<published>2014-03-31T08:58:35+00:00</published>
<link rel='alternate' type='text/html' href='http://git.ninenines.eu/otp.git/commit/?id=4237524a0d3eb26c244e78539de84c78b828c3c3'/>
<id>4237524a0d3eb26c244e78539de84c78b828c3c3</id>
<content type='text'>
This adds the aes_cfb8 cypher type (and associated tests and
documentation) to the crypto module.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This adds the aes_cfb8 cypher type (and associated tests and
documentation) to the crypto module.
</pre>
</div>
</content>
</entry>
<entry>
<title>Update release notes</title>
<updated>2014-04-07T17:52:48+00:00</updated>
<author>
<name>Erlang/OTP</name>
<email>otp@erlang.org</email>
</author>
<published>2014-04-07T17:52:48+00:00</published>
<link rel='alternate' type='text/html' href='http://git.ninenines.eu/otp.git/commit/?id=f719d0fe308f00b85f92c29d7cdf9b0dc20d98a2'/>
<id>f719d0fe308f00b85f92c29d7cdf9b0dc20d98a2</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
</feed>
