Fix multiple cosmetic typos.

This commit is contained in:
Jeff Walton 2013-06-05 07:46:49 -04:00 committed by Dr. Stephen Henson
parent e0f7cfda68
commit 3d7bf77f61

104
CHANGES
View File

@ -31,7 +31,7 @@
[Steve Henson] [Steve Henson]
*) Integrate hostname, email address and IP address checking with certificate *) Integrate hostname, email address and IP address checking with certificate
verification. New verify options supporting checking in opensl utility. verification. New verify options supporting checking in openssl utility.
[Steve Henson] [Steve Henson]
*) New function X509_CRL_diff to generate a delta CRL from the difference *) New function X509_CRL_diff to generate a delta CRL from the difference
@ -111,9 +111,9 @@
*) Add support for certificate stores in CERT structure. This makes it *) Add support for certificate stores in CERT structure. This makes it
possible to have different stores per SSL structure or one store in possible to have different stores per SSL structure or one store in
the parent SSL_CTX. Include distint stores for certificate chain the parent SSL_CTX. Include distinct stores for certificate chain
verification and chain building. New ctrl SSL_CTRL_BUILD_CERT_CHAIN verification and chain building. New ctrl SSL_CTRL_BUILD_CERT_CHAIN
to build and store a certificate chain in CERT structure: returing to build and store a certificate chain in CERT structure: returning
an error if the chain cannot be built: this will allow applications an error if the chain cannot be built: this will allow applications
to test if a chain is correctly configured. to test if a chain is correctly configured.
@ -235,16 +235,16 @@
[Steve Henson] [Steve Henson]
*) Add functions FIPS_module_version() and FIPS_module_version_text() *) Add functions FIPS_module_version() and FIPS_module_version_text()
to return numberical and string versions of the FIPS module number. to return numerical and string versions of the FIPS module number.
[Steve Henson] [Steve Henson]
*) Rename FIPS_mode_set and FIPS_mode to FIPS_module_mode_set and *) Rename FIPS_mode_set and FIPS_mode to FIPS_module_mode_set and
FIPS_module_mode. FIPS_mode and FIPS_mode_set will be implmeneted FIPS_module_mode. FIPS_mode and FIPS_mode_set will be implemented
outside the validated module in the FIPS capable OpenSSL. outside the validated module in the FIPS capable OpenSSL.
[Steve Henson] [Steve Henson]
*) Minor change to DRBG entropy callback semantics. In some cases *) Minor change to DRBG entropy callback semantics. In some cases
there is no mutiple of the block length between min_len and there is no multiple of the block length between min_len and
max_len. Allow the callback to return more than max_len bytes max_len. Allow the callback to return more than max_len bytes
of entropy but discard any extra: it is the callback's responsibility of entropy but discard any extra: it is the callback's responsibility
to ensure that the extra data discarded does not impact the to ensure that the extra data discarded does not impact the
@ -446,7 +446,7 @@
When in FIPS mode the approved implementations are used as normal, When in FIPS mode the approved implementations are used as normal,
when not in FIPS mode the internal unapproved versions are used instead. when not in FIPS mode the internal unapproved versions are used instead.
This means that the FIPS capable OpenSSL isn't forced to use the This means that the FIPS capable OpenSSL isn't forced to use the
(often lower perfomance) FIPS implementations outside FIPS mode. (often lower performance) FIPS implementations outside FIPS mode.
[Steve Henson] [Steve Henson]
*) Transparently support X9.42 DH parameters when calling *) Transparently support X9.42 DH parameters when calling
@ -529,7 +529,7 @@
*) OpenSSL 1.0.0 sets SSL_OP_ALL to 0x80000FFFL and OpenSSL 1.0.1 and *) OpenSSL 1.0.0 sets SSL_OP_ALL to 0x80000FFFL and OpenSSL 1.0.1 and
1.0.1a set SSL_OP_NO_TLSv1_1 to 0x00000400L which would unfortunately 1.0.1a set SSL_OP_NO_TLSv1_1 to 0x00000400L which would unfortunately
mean any application compiled against OpenSSL 1.0.0 headers setting mean any application compiled against OpenSSL 1.0.0 headers setting
SSL_OP_ALL would also set SSL_OP_NO_TLSv1_1, unintentionally disablng SSL_OP_ALL would also set SSL_OP_NO_TLSv1_1, unintentionally disabling
TLS 1.1 also. Fix this by changing the value of SSL_OP_NO_TLSv1_1 to TLS 1.1 also. Fix this by changing the value of SSL_OP_NO_TLSv1_1 to
0x10000000L Any application which was previously compiled against 0x10000000L Any application which was previously compiled against
OpenSSL 1.0.1 or 1.0.1a headers and which cares about SSL_OP_NO_TLSv1_1 OpenSSL 1.0.1 or 1.0.1a headers and which cares about SSL_OP_NO_TLSv1_1
@ -538,7 +538,7 @@
in unlike event, limit maximum offered version to TLS 1.0 [see below]. in unlike event, limit maximum offered version to TLS 1.0 [see below].
[Steve Henson] [Steve Henson]
*) In order to ensure interoperabilty SSL_OP_NO_protocolX does not *) In order to ensure interoperability SSL_OP_NO_protocolX does not
disable just protocol X, but all protocols above X *if* there are disable just protocol X, but all protocols above X *if* there are
protocols *below* X still enabled. In more practical terms it means protocols *below* X still enabled. In more practical terms it means
that if application wants to disable TLS1.0 in favor of TLS1.1 and that if application wants to disable TLS1.0 in favor of TLS1.1 and
@ -593,7 +593,7 @@
*) Some servers which support TLS 1.0 can choke if we initially indicate *) Some servers which support TLS 1.0 can choke if we initially indicate
support for TLS 1.2 and later renegotiate using TLS 1.0 in the RSA support for TLS 1.2 and later renegotiate using TLS 1.0 in the RSA
encrypted premaster secret. As a workaround use the maximum pemitted encrypted premaster secret. As a workaround use the maximum permitted
client version in client hello, this should keep such servers happy client version in client hello, this should keep such servers happy
and still work with previous versions of OpenSSL. and still work with previous versions of OpenSSL.
[Steve Henson] [Steve Henson]
@ -723,7 +723,7 @@
*) Add GCM support to TLS library. Some custom code is needed to split *) Add GCM support to TLS library. Some custom code is needed to split
the IV between the fixed (from PRF) and explicit (from TLS record) the IV between the fixed (from PRF) and explicit (from TLS record)
portions. This adds all GCM ciphersuites supported by RFC5288 and portions. This adds all GCM ciphersuites supported by RFC5288 and
RFC5289. Generalise some AES* cipherstrings to inlclude GCM and RFC5289. Generalise some AES* cipherstrings to include GCM and
add a special AESGCM string for GCM only. add a special AESGCM string for GCM only.
[Steve Henson] [Steve Henson]
@ -737,9 +737,9 @@
[Steve Henson] [Steve Henson]
*) For FIPS capable OpenSSL interpret a NULL default public key method *) For FIPS capable OpenSSL interpret a NULL default public key method
as unset and return the appopriate default but do *not* set the default. as unset and return the appropriate default but do *not* set the default.
This means we can return the appopriate method in applications that This means we can return the appropriate method in applications that
swicth between FIPS and non-FIPS modes. switch between FIPS and non-FIPS modes.
[Steve Henson] [Steve Henson]
*) Redirect HMAC and CMAC operations to FIPS module in FIPS mode. If an *) Redirect HMAC and CMAC operations to FIPS module in FIPS mode. If an
@ -1416,7 +1416,7 @@
most recently disabled ciphersuites when "HIGH" is parsed). most recently disabled ciphersuites when "HIGH" is parsed).
Also, change ssl_create_cipher_list() (using this new Also, change ssl_create_cipher_list() (using this new
funcionality) such that between otherwise identical functionality) such that between otherwise identical
cihpersuites, ephemeral ECDH is preferred over ephemeral DH in cihpersuites, ephemeral ECDH is preferred over ephemeral DH in
the default order. the default order.
[Bodo Moeller] [Bodo Moeller]
@ -1596,7 +1596,7 @@
functional reference processing. functional reference processing.
[Steve Henson] [Steve Henson]
*) New functions EVP_Digest{Sign,Verify)*. These are enchance versions of *) New functions EVP_Digest{Sign,Verify)*. These are enhance versions of
EVP_{Sign,Verify}* which allow an application to customise the signature EVP_{Sign,Verify}* which allow an application to customise the signature
process. process.
[Steve Henson] [Steve Henson]
@ -1636,7 +1636,7 @@
*) Add a ctrl to asn1 method to allow a public key algorithm to express *) Add a ctrl to asn1 method to allow a public key algorithm to express
a default digest type to use. In most cases this will be SHA1 but some a default digest type to use. In most cases this will be SHA1 but some
algorithms (such as GOST) need to specify an alternative digest. The algorithms (such as GOST) need to specify an alternative digest. The
return value indicates how strong the prefernce is 1 means optional and return value indicates how strong the preference is 1 means optional and
2 is mandatory (that is it is the only supported type). Modify 2 is mandatory (that is it is the only supported type). Modify
ASN1_item_sign() to accept a NULL digest argument to indicate it should ASN1_item_sign() to accept a NULL digest argument to indicate it should
use the default md. Update openssl utilities to use the default digest use the default md. Update openssl utilities to use the default digest
@ -1681,7 +1681,7 @@
manual pages. manual pages.
[Oliver Tappe <zooey@hirschkaefer.de>] [Oliver Tappe <zooey@hirschkaefer.de>]
*) New utility "genpkey" this is analagous to "genrsa" etc except it can *) New utility "genpkey" this is analogous to "genrsa" etc except it can
generate keys for any algorithm. Extend and update EVP_PKEY_METHOD to generate keys for any algorithm. Extend and update EVP_PKEY_METHOD to
support key and parameter generation and add initial key generation support key and parameter generation and add initial key generation
functionality for RSA. functionality for RSA.
@ -1958,7 +1958,7 @@
*) Fix for double free bug in ssl/s3_clnt.c CVE-2010-2939 *) Fix for double free bug in ssl/s3_clnt.c CVE-2010-2939
[Steve Henson] [Steve Henson]
*) Don't reencode certificate when calculating signature: cache and use *) Don't re-encode certificate when calculating signature: cache and use
the original encoding instead. This makes signature verification of the original encoding instead. This makes signature verification of
some broken encodings work correctly. some broken encodings work correctly.
[Steve Henson] [Steve Henson]
@ -2318,16 +2318,16 @@
This work was sponsored by Logica. This work was sponsored by Logica.
[Steve Henson] [Steve Henson]
*) Fix bug in X509_ATTRIBUTE creation: dont set attribute using *) Fix bug in X509_ATTRIBUTE creation: don't set attribute using
ASN1_TYPE_set1 if MBSTRING flag set. This bug would crash certain ASN1_TYPE_set1 if MBSTRING flag set. This bug would crash certain
attribute creation routines such as certifcate requests and PKCS#12 attribute creation routines such as certificate requests and PKCS#12
files. files.
[Steve Henson] [Steve Henson]
Changes between 0.9.8g and 0.9.8h [28 May 2008] Changes between 0.9.8g and 0.9.8h [28 May 2008]
*) Fix flaw if 'Server Key exchange message' is omitted from a TLS *) Fix flaw if 'Server Key exchange message' is omitted from a TLS
handshake which could lead to a cilent crash as found using the handshake which could lead to a client crash as found using the
Codenomicon TLS test suite (CVE-2008-1672) Codenomicon TLS test suite (CVE-2008-1672)
[Steve Henson, Mark Cox] [Steve Henson, Mark Cox]
@ -2395,7 +2395,7 @@
[Ian Lister (tweaked by Geoff Thorpe)] [Ian Lister (tweaked by Geoff Thorpe)]
*) Backport of CMS code to OpenSSL 0.9.8. This differs from the 0.9.9 *) Backport of CMS code to OpenSSL 0.9.8. This differs from the 0.9.9
implemention in the following ways: implementation in the following ways:
Lack of EVP_PKEY_ASN1_METHOD means algorithm parameters have to be Lack of EVP_PKEY_ASN1_METHOD means algorithm parameters have to be
hard coded. hard coded.
@ -2745,7 +2745,7 @@
unofficial, and the ID has long expired. unofficial, and the ID has long expired.
[Bodo Moeller] [Bodo Moeller]
*) Fix RSA blinding Heisenbug (problems sometimes occured on *) Fix RSA blinding Heisenbug (problems sometimes occurred on
dual-core machines) and other potential thread-safety issues. dual-core machines) and other potential thread-safety issues.
[Bodo Moeller] [Bodo Moeller]
@ -2761,7 +2761,7 @@
*) Disable the padding bug check when compression is in use. The padding *) Disable the padding bug check when compression is in use. The padding
bug check assumes the first packet is of even length, this is not bug check assumes the first packet is of even length, this is not
necessarily true if compresssion is enabled and can result in false necessarily true if compression is enabled and can result in false
positives causing handshake failure. The actual bug test is ancient positives causing handshake failure. The actual bug test is ancient
code so it is hoped that implementations will either have fixed it by code so it is hoped that implementations will either have fixed it by
now or any which still have the bug do not support compression. now or any which still have the bug do not support compression.
@ -2900,7 +2900,7 @@
to SSL_CTX_use_PrivateKey_file() and SSL_use_PrivateKey_file() to SSL_CTX_use_PrivateKey_file() and SSL_use_PrivateKey_file()
[Walter Goulet] [Walter Goulet]
*) Remove buggy and incompletet DH cert support from *) Remove buggy and incomplete DH certificate support from
ssl/ssl_rsa.c and ssl/s3_both.c ssl/ssl_rsa.c and ssl/s3_both.c
[Nils Larsch] [Nils Larsch]
@ -2990,7 +2990,7 @@
we can fix the problem directly in the 'ca' utility.) we can fix the problem directly in the 'ca' utility.)
[Steve Henson] [Steve Henson]
*) Reduced header interdepencies by declaring more opaque objects in *) Reduced header interdependencies by declaring more opaque objects in
ossl_typ.h. As a consequence, including some headers (eg. engine.h) will ossl_typ.h. As a consequence, including some headers (eg. engine.h) will
give fewer recursive includes, which could break lazy source code - so give fewer recursive includes, which could break lazy source code - so
this change is covered by the OPENSSL_NO_DEPRECATED symbol. As always, this change is covered by the OPENSSL_NO_DEPRECATED symbol. As always,
@ -3114,7 +3114,7 @@
[Geoff Thorpe] [Geoff Thorpe]
*) Reorganise PKCS#7 code to separate the digest location functionality *) Reorganise PKCS#7 code to separate the digest location functionality
into PKCS7_find_digest(), digest addtion into PKCS7_bio_add_digest(). into PKCS7_find_digest(), digest addition into PKCS7_bio_add_digest().
New function PKCS7_set_digest() to set the digest type for PKCS#7 New function PKCS7_set_digest() to set the digest type for PKCS#7
digestedData type. Add additional code to correctly generate the digestedData type. Add additional code to correctly generate the
digestedData type and add support for this type in PKCS7 initialization digestedData type and add support for this type in PKCS7 initialization
@ -3297,7 +3297,7 @@
*) Key-generation can now be implemented in RSA_METHOD, DSA_METHOD *) Key-generation can now be implemented in RSA_METHOD, DSA_METHOD
and DH_METHOD (eg. by ENGINE implementations) to override the normal and DH_METHOD (eg. by ENGINE implementations) to override the normal
software implementations. For DSA and DH, parameter generation can software implementations. For DSA and DH, parameter generation can
also be overriden by providing the appropriate method callbacks. also be overridden by providing the appropriate method callbacks.
[Geoff Thorpe] [Geoff Thorpe]
*) Change the "progress" mechanism used in key-generation and *) Change the "progress" mechanism used in key-generation and
@ -3380,13 +3380,13 @@
the "shared" options was given to ./Configure or ./config. the "shared" options was given to ./Configure or ./config.
Otherwise, they are inserted in libcrypto.a. Otherwise, they are inserted in libcrypto.a.
/usr/local/ssl/engines is the default directory for dynamic /usr/local/ssl/engines is the default directory for dynamic
engines, but that can be overriden at configure time through engines, but that can be overridden at configure time through
the usual use of --prefix and/or --openssldir, and at run the usual use of --prefix and/or --openssldir, and at run
time with the environment variable OPENSSL_ENGINES. time with the environment variable OPENSSL_ENGINES.
[Geoff Thorpe and Richard Levitte] [Geoff Thorpe and Richard Levitte]
*) Add Makefile.shared, a helper makefile to build shared *) Add Makefile.shared, a helper makefile to build shared
libraries. Addapt Makefile.org. libraries. Adapt Makefile.org.
[Richard Levitte] [Richard Levitte]
*) Add version info to Win32 DLLs. *) Add version info to Win32 DLLs.
@ -3760,7 +3760,7 @@
unofficial, and the ID has long expired. unofficial, and the ID has long expired.
[Bodo Moeller] [Bodo Moeller]
*) Fix RSA blinding Heisenbug (problems sometimes occured on *) Fix RSA blinding Heisenbug (problems sometimes occurred on
dual-core machines) and other potential thread-safety issues. dual-core machines) and other potential thread-safety issues.
[Bodo Moeller] [Bodo Moeller]
@ -3774,7 +3774,7 @@
[Steve Henson] [Steve Henson]
*) Add new Windows build target VC-32-GMAKE for VC++. This uses GNU make *) Add new Windows build target VC-32-GMAKE for VC++. This uses GNU make
from a Windows bash shell such as MSYS. It is autodetected from the from a Windows bash shell such as MSYS. It is auto-detected from the
"config" script when run from a VC++ environment. Modify standard VC++ "config" script when run from a VC++ environment. Modify standard VC++
build to use fipscanister.o from the GNU make build. build to use fipscanister.o from the GNU make build.
[Steve Henson] [Steve Henson]
@ -3915,7 +3915,7 @@
[Steve Henson] [Steve Henson]
*) Perform some character comparisons of different types in X509_NAME_cmp: *) Perform some character comparisons of different types in X509_NAME_cmp:
this is needed for some certificates that reencode DNs into UTF8Strings this is needed for some certificates that re-encode DNs into UTF8Strings
(in violation of RFC3280) and can't or wont issue name rollover (in violation of RFC3280) and can't or wont issue name rollover
certificates. certificates.
[Steve Henson] [Steve Henson]
@ -4090,7 +4090,7 @@
Changes between 0.9.7 and 0.9.7a [19 Feb 2003] Changes between 0.9.7 and 0.9.7a [19 Feb 2003]
*) In ssl3_get_record (ssl/s3_pkt.c), minimize information leaked *) In ssl3_get_record (ssl/s3_pkt.c), minimize information leaked
via timing by performing a MAC computation even if incorrrect via timing by performing a MAC computation even if incorrect
block cipher padding has been found. This is a countermeasure block cipher padding has been found. This is a countermeasure
against active attacks where the attacker has to distinguish against active attacks where the attacker has to distinguish
between bad padding and a MAC verification error. (CVE-2003-0078) between bad padding and a MAC verification error. (CVE-2003-0078)
@ -4352,7 +4352,7 @@
done done
To be absolutely sure not to disturb the source tree, a "make clean" To be absolutely sure not to disturb the source tree, a "make clean"
is a good thing. If it isn't successfull, don't worry about it, is a good thing. If it isn't successful, don't worry about it,
it probably means the source directory is very clean. it probably means the source directory is very clean.
[Richard Levitte] [Richard Levitte]
@ -4448,7 +4448,7 @@
[Steve Henson] [Steve Henson]
*) Move default behaviour from OPENSSL_config(). If appname is NULL *) Move default behaviour from OPENSSL_config(). If appname is NULL
use "openssl_conf" if filename is NULL use default openssl config file. use "openssl_conf". If filename is NULL use default openssl config file.
[Steve Henson] [Steve Henson]
*) Add an argument to OPENSSL_config() to allow the use of an alternative *) Add an argument to OPENSSL_config() to allow the use of an alternative
@ -4657,7 +4657,7 @@
*) Major restructuring to the underlying ENGINE code. This includes *) Major restructuring to the underlying ENGINE code. This includes
reduction of linker bloat, separation of pure "ENGINE" manipulation reduction of linker bloat, separation of pure "ENGINE" manipulation
(initialisation, etc) from functionality dealing with implementations (initialisation, etc) from functionality dealing with implementations
of specific crypto iterfaces. This change also introduces integrated of specific crypto interfaces. This change also introduces integrated
support for symmetric ciphers and digest implementations - so ENGINEs support for symmetric ciphers and digest implementations - so ENGINEs
can now accelerate these by providing EVP_CIPHER and EVP_MD can now accelerate these by providing EVP_CIPHER and EVP_MD
implementations of their own. This is detailed in crypto/engine/README implementations of their own. This is detailed in crypto/engine/README
@ -4686,7 +4686,7 @@
*) New function SSL_renegotiate_pending(). This returns true once *) New function SSL_renegotiate_pending(). This returns true once
renegotiation has been requested (either SSL_renegotiate() call renegotiation has been requested (either SSL_renegotiate() call
or HelloRequest/ClientHello receveived from the peer) and becomes or HelloRequest/ClientHello received from the peer) and becomes
false once a handshake has been completed. false once a handshake has been completed.
(For servers, SSL_renegotiate() followed by SSL_do_handshake() (For servers, SSL_renegotiate() followed by SSL_do_handshake()
sends a HelloRequest, but does not ensure that a handshake takes sends a HelloRequest, but does not ensure that a handshake takes
@ -5099,7 +5099,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
missing functions (including a catch-all ENGINE_cpy that duplicates missing functions (including a catch-all ENGINE_cpy that duplicates
all ENGINE values onto a new ENGINE except reference counts/state). all ENGINE values onto a new ENGINE except reference counts/state).
- Removed NULL parameter checks in get/set functions. Setting a method - Removed NULL parameter checks in get/set functions. Setting a method
or function to NULL is a way of cancelling out a previously set or function to NULL is a way of canceling out a previously set
value. Passing a NULL ENGINE parameter is just plain stupid anyway value. Passing a NULL ENGINE parameter is just plain stupid anyway
and doesn't justify the extra error symbols and code. and doesn't justify the extra error symbols and code.
- Deprecate the ENGINE_FLAGS_MALLOCED define and move the area for - Deprecate the ENGINE_FLAGS_MALLOCED define and move the area for
@ -5661,7 +5661,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
[Steve Henson] [Steve Henson]
*) Enhance mkdef.pl to be more accepting about spacing in C preprocessor *) Enhance mkdef.pl to be more accepting about spacing in C preprocessor
lines, recognice more "algorithms" that can be deselected, and make lines, recognise more "algorithms" that can be deselected, and make
it complain about algorithm deselection that isn't recognised. it complain about algorithm deselection that isn't recognised.
[Richard Levitte] [Richard Levitte]
@ -5679,7 +5679,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
*) New function X509V3_add1_i2d(). This automatically encodes and *) New function X509V3_add1_i2d(). This automatically encodes and
adds an extension. Its behaviour can be customised with various adds an extension. Its behaviour can be customised with various
flags to append, replace or delete. Various wrappers added for flags to append, replace or delete. Various wrappers added for
certifcates and CRLs. certificates and CRLs.
[Steve Henson] [Steve Henson]
*) Fix to avoid calling the underlying ASN1 print routine when *) Fix to avoid calling the underlying ASN1 print routine when
@ -5687,7 +5687,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
OCSP_SERVICELOC extension. Tidy up print OCSP format. OCSP_SERVICELOC extension. Tidy up print OCSP format.
[Steve Henson] [Steve Henson]
*) Make mkdef.pl parse some of the ASN1 macros and add apropriate *) Make mkdef.pl parse some of the ASN1 macros and add appropriate
entries for variables. entries for variables.
[Steve Henson] [Steve Henson]
@ -6059,7 +6059,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
Changes between 0.9.6h and 0.9.6i [19 Feb 2003] Changes between 0.9.6h and 0.9.6i [19 Feb 2003]
*) In ssl3_get_record (ssl/s3_pkt.c), minimize information leaked *) In ssl3_get_record (ssl/s3_pkt.c), minimize information leaked
via timing by performing a MAC computation even if incorrrect via timing by performing a MAC computation even if incorrect
block cipher padding has been found. This is a countermeasure block cipher padding has been found. This is a countermeasure
against active attacks where the attacker has to distinguish against active attacks where the attacker has to distinguish
between bad padding and a MAC verification error. (CVE-2003-0078) between bad padding and a MAC verification error. (CVE-2003-0078)
@ -6224,7 +6224,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
[Nils Larsch <nla@trustcenter.de>] [Nils Larsch <nla@trustcenter.de>]
*) Fix BASE64 decode (EVP_DecodeUpdate) for data with CR/LF ended lines: *) Fix BASE64 decode (EVP_DecodeUpdate) for data with CR/LF ended lines:
an end-of-file condition would erronously be flagged, when the CRLF an end-of-file condition would erroneously be flagged, when the CRLF
was just at the end of a processed block. The bug was discovered when was just at the end of a processed block. The bug was discovered when
processing data through a buffering memory BIO handing the data to a processing data through a buffering memory BIO handing the data to a
BASE64-decoding BIO. Bug fund and patch submitted by Pavel Tsekov BASE64-decoding BIO. Bug fund and patch submitted by Pavel Tsekov
@ -6431,7 +6431,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
[Bodo Moeller; bug noticed by Andy Schneider <andy.schneider@bjss.co.uk>] [Bodo Moeller; bug noticed by Andy Schneider <andy.schneider@bjss.co.uk>]
*) Bugfix in ssl3_accept (ssl/s3_srvr.c): Case SSL3_ST_SW_HELLO_REQ_C *) Bugfix in ssl3_accept (ssl/s3_srvr.c): Case SSL3_ST_SW_HELLO_REQ_C
should end in 'break', not 'goto end' which circuments various should end in 'break', not 'goto end' which circumvents various
cleanups done in state SSL_ST_OK. But session related stuff cleanups done in state SSL_ST_OK. But session related stuff
must be disabled for SSL_ST_OK in the case that we just sent a must be disabled for SSL_ST_OK in the case that we just sent a
HelloRequest. HelloRequest.
@ -7408,7 +7408,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
*) When some versions of IIS use the 'NET' form of private key the *) When some versions of IIS use the 'NET' form of private key the
key derivation algorithm is different. Normally MD5(password) is key derivation algorithm is different. Normally MD5(password) is
used as a 128 bit RC4 key. In the modified case used as a 128 bit RC4 key. In the modified case
MD5(MD5(password) + "SGCKEYSALT") is used insted. Added some MD5(MD5(password) + "SGCKEYSALT") is used instead. Added some
new functions i2d_RSA_NET(), d2i_RSA_NET() etc which are the same new functions i2d_RSA_NET(), d2i_RSA_NET() etc which are the same
as the old Netscape_RSA functions except they have an additional as the old Netscape_RSA functions except they have an additional
'sgckey' parameter which uses the modified algorithm. Also added 'sgckey' parameter which uses the modified algorithm. Also added
@ -7696,8 +7696,8 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
its own key. its own key.
ssl_cert_dup, which is used by SSL_new, now copies DH keys in addition ssl_cert_dup, which is used by SSL_new, now copies DH keys in addition
to parameters -- in previous versions (since OpenSSL 0.9.3) the to parameters -- in previous versions (since OpenSSL 0.9.3) the
'default key' from SSL_CTX_set_tmp_dh would always be lost, meanining 'default key' from SSL_CTX_set_tmp_dh would always be lost, meanings
you effectivly got SSL_OP_SINGLE_DH_USE when using this macro. you effectively got SSL_OP_SINGLE_DH_USE when using this macro.
[Bodo Moeller] [Bodo Moeller]
*) New s_client option -ign_eof: EOF at stdin is ignored, and *) New s_client option -ign_eof: EOF at stdin is ignored, and
@ -7724,7 +7724,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
*) In util/mkerr.pl (which implements 'make errors'), preserve *) In util/mkerr.pl (which implements 'make errors'), preserve
reason strings from the previous version of the .c file, as reason strings from the previous version of the .c file, as
the default to have only downcase letters (and digits) in the default to have only lowercase letters (and digits) in
automatically generated reasons codes is not always appropriate. automatically generated reasons codes is not always appropriate.
[Bodo Moeller] [Bodo Moeller]
@ -10115,7 +10115,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
error code, add initial support to X509_print() and x509 application. error code, add initial support to X509_print() and x509 application.
[Steve Henson] [Steve Henson]
*) Takes a deep breath and start addding X509 V3 extension support code. Add *) Takes a deep breath and start adding X509 V3 extension support code. Add
files in crypto/x509v3. Move original stuff to crypto/x509v3/old. All this files in crypto/x509v3. Move original stuff to crypto/x509v3/old. All this
stuff is currently isolated and isn't even compiled yet. stuff is currently isolated and isn't even compiled yet.
[Steve Henson] [Steve Henson]
@ -10289,7 +10289,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
*) Fixed sk_insert which never worked properly. *) Fixed sk_insert which never worked properly.
[Steve Henson] [Steve Henson]
*) Fix ASN1 macros so they can handle indefinite length construted *) Fix ASN1 macros so they can handle indefinite length constructed
EXPLICIT tags. Some non standard certificates use these: they can now EXPLICIT tags. Some non standard certificates use these: they can now
be read in. be read in.
[Steve Henson] [Steve Henson]