Lutz Jänicke
9cbf440f0e
Fix incorrect command for assember file generation on IA64
...
Submitted by: Amadeu A. Barbosa Jr <amadeu@tecgraf.puc-rio.br>
2008-10-06 10:36:22 +00:00
Dr. Stephen Henson
667640dbae
Fix from head.
2008-05-09 23:17:51 +00:00
Dr. Stephen Henson
916494d004
Fix from HEAD.
2008-03-31 15:01:23 +00:00
Ben Laurie
c85e77b1fb
Fix dependencies. Again.
2008-03-09 18:22:50 +00:00
Andy Polyakov
87dc67a2e1
Eliminate conditional final subtraction in Montgomery multiplication
...
[from HEAD].
2007-10-10 22:05:54 +00:00
Andy Polyakov
b54049d37c
Respect ISO aliasing rules [from HEAD].
...
PR: 1296
2007-10-10 21:56:01 +00:00
Andy Polyakov
1840f9e70c
Make bn2dec work on "SIXTY_FOUR_BIT" platforms [from HEAD].
...
PR: 1456
2007-09-15 17:10:13 +00:00
Dr. Stephen Henson
a92d3fac59
Update from HEAD.
2007-05-22 23:31:56 +00:00
Dr. Stephen Henson
fc9e4d82bf
Add evp_cnf.c file.
2007-04-09 23:56:33 +00:00
Dr. Stephen Henson
7c4828636e
Fix from HEAD.
2007-04-09 23:54:55 +00:00
Dr. Stephen Henson
4ac62009ac
Backport "alg" module to OpenSSL 0.9.7
2007-04-09 12:17:21 +00:00
Dr. Stephen Henson
d8ebb4260f
Update from HEAD.
2007-04-09 11:47:17 +00:00
Dr. Stephen Henson
b048a143d4
Update from 0.9.8-stable
2007-03-05 00:07:57 +00:00
Dr. Stephen Henson
f4819d8ab2
Update to next dev version.
2007-02-23 12:35:48 +00:00
Dr. Stephen Henson
44f69e6f26
Oops! Correct version file.
2007-02-23 12:17:03 +00:00
Dr. Stephen Henson
d08d0c124a
Prepare for release.
2007-02-23 12:07:21 +00:00
Dr. Stephen Henson
f7bd41b449
Make update.
2007-02-23 00:59:28 +00:00
Lutz Jänicke
4804720353
Fix incorrect handling of special characters.
...
PR: 1459
Submitted by: tnitschke@innominate.com
Reviewed by: steve@openssl.org
2007-02-21 17:44:08 +00:00
Dr. Stephen Henson
9a3a58e13b
Cleanse PEM buffers before freeing them.
...
Submitted by: Benjamin Bennett <ben@psc.edu>
2007-02-21 13:48:09 +00:00
Dr. Stephen Henson
f35dd4c360
Update from fips2 branch.
2007-02-03 17:33:30 +00:00
Dr. Stephen Henson
c2c47c7f95
Typo.
2007-01-23 18:21:12 +00:00
Dr. Stephen Henson
37e8a08075
Constify tag table.
2007-01-23 17:53:01 +00:00
Dr. Stephen Henson
ab8c8aa404
Move some DSA functions between files to make it possible to use the DSA
...
crypto without ASN1 dependency.
2007-01-23 17:43:57 +00:00
Dr. Stephen Henson
566933a8ba
Update from HEAD.
2007-01-21 16:02:37 +00:00
Dr. Stephen Henson
618def59f7
Remove 'done' variable since it stops error codes being reloaded.
2006-12-07 13:23:22 +00:00
Nils Larsch
492a907089
fix function names in RSAerr calls
...
PR: 1403
2006-12-04 20:41:46 +00:00
Dr. Stephen Henson
ea474c567f
Rebuild error source files.
2006-11-21 19:27:19 +00:00
Dr. Stephen Henson
0e5d87d76f
Fix from HEAD.
2006-11-13 13:23:33 +00:00
Mark J. Cox
055fa1c35c
Initialise ctx to NULL to avoid uninitialized free, noticed by
...
Steve Kiernan
2006-09-29 08:20:11 +00:00
Mark J. Cox
6b131d9c45
After tagging, open up 0.9.7m-dev
2006-09-28 12:00:30 +00:00
Mark J. Cox
c830c1a209
Prepare for 0.9.7l release
2006-09-28 11:56:57 +00:00
Mark J. Cox
b213966415
Introduce limits to prevent malicious keys being able to
...
cause a denial of service. (CVE-2006-2940)
[Steve Henson, Bodo Moeller]
Fix ASN.1 parsing of certain invalid structures that can result
in a denial of service. (CVE-2006-2937) [Steve Henson]
Fix buffer overflow in SSL_get_shared_ciphers() function.
(CVE-2006-3738) [Tavis Ormandy and Will Drewry, Google Security Team]
Fix SSL client code which could crash if connecting to a
malicious SSLv2 server. (CVE-2006-4343)
[Tavis Ormandy and Will Drewry, Google Security Team]
2006-09-28 11:53:51 +00:00
Dr. Stephen Henson
4ebd255a5b
Fix from head.
2006-09-22 17:06:51 +00:00
Bodo Möller
d9d294463e
Ensure that the addition mods[i]+delta cannot overflow in probable_prime().
...
[Problem pointed out by Adam Young <adamy (at) acm.org>]
2006-09-19 10:00:29 +00:00
Bodo Möller
c2293d2e9a
make consistent with 0.9.8-branch version of this file
2006-09-06 06:41:32 +00:00
Mark J. Cox
60bee5d44c
Bump for 0.9.7l-dev
2006-09-05 08:38:12 +00:00
Mark J. Cox
975a7a483f
Prepare 0.9.7k release
2006-09-05 08:34:07 +00:00
Mark J. Cox
ffa0407233
Avoid PKCS #1 v1.5 signature attack discovered by Daniel Bleichenbacher
...
(CVE-2006-4339) [Ben Laurie and Google Security Team]
Submitted by: Ben Laurie, Google Security Team
Reviewed by: bmoeller, mjc, shenson
2006-09-05 08:24:14 +00:00
Dr. Stephen Henson
6f414aef0e
Update from HEAD.
2006-08-31 20:11:30 +00:00
Dr. Stephen Henson
0f562e2a2c
Fix from HEAD.
2006-07-09 12:05:10 +00:00
Bodo Möller
feee55c65d
use <poll.h> as by Single Unix Specification
2006-06-30 08:15:13 +00:00
Bodo Möller
81edd235b1
always read if we can't use select because of a too large FD
...
(it's non-blocking mode anyway)
2006-06-28 14:49:39 +00:00
Andy Polyakov
23c13189e9
Mitigate the hazard of cache-collision timing attack on last round
...
[from HEAD].
2006-06-28 08:57:22 +00:00
Richard Levitte
bdd00f8c8a
Use poll() when possible to gather Unix randomness entropy
2006-06-27 06:31:48 +00:00
Richard Levitte
e4a901b0b3
Synchronise with the Unix build
2006-06-21 05:08:36 +00:00
Dr. Stephen Henson
e25a2423da
Place hex_to_string and string_to_hex in separate source file to avoid
...
dragging in extra dependencies when just these functions are used.
2006-06-20 18:06:40 +00:00
Bodo Möller
094c6aa51d
Thread-safety fixes
2006-06-16 01:01:34 +00:00
Bodo Möller
019a63f9c9
Thread-safety fixes
2006-06-14 08:50:11 +00:00
Dr. Stephen Henson
0be0592ec4
Fix from HEAD.
2006-05-17 18:20:53 +00:00
Dr. Stephen Henson
a6fb8a8203
Update for next dev version.
2006-05-04 13:08:01 +00:00