This change adds the option to calculate (EC)DSA nonces by hashing the
message and private key along with entropy to avoid leaking the
private key if the PRNG fails.

Note that this depends on the build fixes in
http://rt.openssl.org/Ticket/Display.html?id=3051

Attachment: dsa_nonce.patch
Description: Binary data

Reply via email to