4157 Commits

Author SHA1 Message Date
Lutz Jänicke
9cbf440f0e Fix incorrect command for assember file generation on IA64
Submitted by: Amadeu A. Barbosa Jr <amadeu@tecgraf.puc-rio.br>
2008-10-06 10:36:22 +00:00
Dr. Stephen Henson
667640dbae Fix from head. 2008-05-09 23:17:51 +00:00
Dr. Stephen Henson
916494d004 Fix from HEAD. 2008-03-31 15:01:23 +00:00
Ben Laurie
c85e77b1fb Fix dependencies. Again. 2008-03-09 18:22:50 +00:00
Andy Polyakov
87dc67a2e1 Eliminate conditional final subtraction in Montgomery multiplication
[from HEAD].
2007-10-10 22:05:54 +00:00
Andy Polyakov
b54049d37c Respect ISO aliasing rules [from HEAD].
PR: 1296
2007-10-10 21:56:01 +00:00
Andy Polyakov
1840f9e70c Make bn2dec work on "SIXTY_FOUR_BIT" platforms [from HEAD].
PR: 1456
2007-09-15 17:10:13 +00:00
Dr. Stephen Henson
a92d3fac59 Update from HEAD. 2007-05-22 23:31:56 +00:00
Dr. Stephen Henson
fc9e4d82bf Add evp_cnf.c file. 2007-04-09 23:56:33 +00:00
Dr. Stephen Henson
7c4828636e Fix from HEAD. 2007-04-09 23:54:55 +00:00
Dr. Stephen Henson
4ac62009ac Backport "alg" module to OpenSSL 0.9.7 2007-04-09 12:17:21 +00:00
Dr. Stephen Henson
d8ebb4260f Update from HEAD. 2007-04-09 11:47:17 +00:00
Dr. Stephen Henson
b048a143d4 Update from 0.9.8-stable 2007-03-05 00:07:57 +00:00
Dr. Stephen Henson
f4819d8ab2 Update to next dev version. 2007-02-23 12:35:48 +00:00
Dr. Stephen Henson
44f69e6f26 Oops! Correct version file. 2007-02-23 12:17:03 +00:00
Dr. Stephen Henson
d08d0c124a Prepare for release. 2007-02-23 12:07:21 +00:00
Dr. Stephen Henson
f7bd41b449 Make update. 2007-02-23 00:59:28 +00:00
Lutz Jänicke
4804720353 Fix incorrect handling of special characters.
PR: 1459
Submitted by: tnitschke@innominate.com
Reviewed by: steve@openssl.org
2007-02-21 17:44:08 +00:00
Dr. Stephen Henson
9a3a58e13b Cleanse PEM buffers before freeing them.
Submitted by: Benjamin Bennett <ben@psc.edu>
2007-02-21 13:48:09 +00:00
Dr. Stephen Henson
f35dd4c360 Update from fips2 branch. 2007-02-03 17:33:30 +00:00
Dr. Stephen Henson
c2c47c7f95 Typo. 2007-01-23 18:21:12 +00:00
Dr. Stephen Henson
37e8a08075 Constify tag table. 2007-01-23 17:53:01 +00:00
Dr. Stephen Henson
ab8c8aa404 Move some DSA functions between files to make it possible to use the DSA
crypto without ASN1 dependency.
2007-01-23 17:43:57 +00:00
Dr. Stephen Henson
566933a8ba Update from HEAD. 2007-01-21 16:02:37 +00:00
Dr. Stephen Henson
618def59f7 Remove 'done' variable since it stops error codes being reloaded. 2006-12-07 13:23:22 +00:00
Nils Larsch
492a907089 fix function names in RSAerr calls
PR: 1403
2006-12-04 20:41:46 +00:00
Dr. Stephen Henson
ea474c567f Rebuild error source files. 2006-11-21 19:27:19 +00:00
Dr. Stephen Henson
0e5d87d76f Fix from HEAD. 2006-11-13 13:23:33 +00:00
Mark J. Cox
055fa1c35c Initialise ctx to NULL to avoid uninitialized free, noticed by
Steve Kiernan
2006-09-29 08:20:11 +00:00
Mark J. Cox
6b131d9c45 After tagging, open up 0.9.7m-dev 2006-09-28 12:00:30 +00:00
Mark J. Cox
c830c1a209 Prepare for 0.9.7l release 2006-09-28 11:56:57 +00:00
Mark J. Cox
b213966415 Introduce limits to prevent malicious keys being able to
cause a denial of service.  (CVE-2006-2940)
[Steve Henson, Bodo Moeller]

Fix ASN.1 parsing of certain invalid structures that can result
in a denial of service.  (CVE-2006-2937)  [Steve Henson]

Fix buffer overflow in SSL_get_shared_ciphers() function.
(CVE-2006-3738) [Tavis Ormandy and Will Drewry, Google Security Team]

Fix SSL client code which could crash if connecting to a
malicious SSLv2 server.  (CVE-2006-4343)
[Tavis Ormandy and Will Drewry, Google Security Team]
2006-09-28 11:53:51 +00:00
Dr. Stephen Henson
4ebd255a5b Fix from head. 2006-09-22 17:06:51 +00:00
Bodo Möller
d9d294463e Ensure that the addition mods[i]+delta cannot overflow in probable_prime().
[Problem pointed out by Adam Young <adamy (at) acm.org>]
2006-09-19 10:00:29 +00:00
Bodo Möller
c2293d2e9a make consistent with 0.9.8-branch version of this file 2006-09-06 06:41:32 +00:00
Mark J. Cox
60bee5d44c Bump for 0.9.7l-dev 2006-09-05 08:38:12 +00:00
Mark J. Cox
975a7a483f Prepare 0.9.7k release 2006-09-05 08:34:07 +00:00
Mark J. Cox
ffa0407233 Avoid PKCS #1 v1.5 signature attack discovered by Daniel Bleichenbacher
(CVE-2006-4339)  [Ben Laurie and Google Security Team]

Submitted by: Ben Laurie, Google Security Team
Reviewed by: bmoeller, mjc, shenson
2006-09-05 08:24:14 +00:00
Dr. Stephen Henson
6f414aef0e Update from HEAD. 2006-08-31 20:11:30 +00:00
Dr. Stephen Henson
0f562e2a2c Fix from HEAD. 2006-07-09 12:05:10 +00:00
Bodo Möller
feee55c65d use <poll.h> as by Single Unix Specification 2006-06-30 08:15:13 +00:00
Bodo Möller
81edd235b1 always read if we can't use select because of a too large FD
(it's non-blocking mode anyway)
2006-06-28 14:49:39 +00:00
Andy Polyakov
23c13189e9 Mitigate the hazard of cache-collision timing attack on last round
[from HEAD].
2006-06-28 08:57:22 +00:00
Richard Levitte
bdd00f8c8a Use poll() when possible to gather Unix randomness entropy 2006-06-27 06:31:48 +00:00
Richard Levitte
e4a901b0b3 Synchronise with the Unix build 2006-06-21 05:08:36 +00:00
Dr. Stephen Henson
e25a2423da Place hex_to_string and string_to_hex in separate source file to avoid
dragging in extra dependencies when just these functions are used.
2006-06-20 18:06:40 +00:00
Bodo Möller
094c6aa51d Thread-safety fixes 2006-06-16 01:01:34 +00:00
Bodo Möller
019a63f9c9 Thread-safety fixes 2006-06-14 08:50:11 +00:00
Dr. Stephen Henson
0be0592ec4 Fix from HEAD. 2006-05-17 18:20:53 +00:00
Dr. Stephen Henson
a6fb8a8203 Update for next dev version. 2006-05-04 13:08:01 +00:00