Matt Caswell
3df69d3aef
Prepare for 1.0.2a release
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-19 13:31:16 +00:00
Matt Caswell
921095d4d3
make update
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-19 13:31:16 +00:00
Matt Caswell
5cc6509dae
Fix unsigned/signed warnings
...
Fix some unsigned/signed warnings introduced as part of the fix
for CVE-2015-0293
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-19 12:58:36 +00:00
Matt Caswell
18029a3d07
Fix a failure to NULL a pointer freed on error.
...
Reported by the LibreSSL project as a follow on to CVE-2015-0209
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-19 12:58:35 +00:00
Matt Caswell
7b22e8d01f
Update NEWS file
...
Update the NEWS file with the latest entries from CHANGES ready for the
release.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-19 12:58:35 +00:00
Matt Caswell
da947c9758
Update CHANGES for release
...
Update CHANGES file with all the latest fixes ready for the release.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-19 12:58:35 +00:00
Matt Caswell
128b271c8d
Fix discrepancy in NEWS file
...
There was a discrepancy between the 1.0.2 version of NEWS and the 1.0.1
version. This fixes it.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-19 12:58:35 +00:00
Matt Caswell
a8b1e52ff4
Fix CHANGES discrepancies
...
There were some discrepancies in the CHANGES file between the 1.0.1 version
and 1.0.2. This corrects it.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-19 12:58:35 +00:00
Matt Caswell
d6e903d188
Remove overlapping CHANGES/NEWS entries
...
Remove entries from CHANGES and NEWS from letter releases that occur *after*
the next point release. Without this we get duplicate entries for the same
issue appearing multiple times.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-19 12:58:35 +00:00
Emilia Kasper
86f8fb0e34
Fix reachable assert in SSLv2 servers.
...
This assert is reachable for servers that support SSLv2 and export ciphers.
Therefore, such servers can be DoSed by sending a specially crafted
SSLv2 CLIENT-MASTER-KEY.
Also fix s2_srvr.c to error out early if the key lengths are malformed.
These lengths are sent unencrypted, so this does not introduce an oracle.
CVE-2015-0293
This issue was discovered by Sean Burford (Google) and Emilia Käsper of
the OpenSSL development team.
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-03-19 12:58:35 +00:00
Emilia Kasper
c0334c2c92
PKCS#7: avoid NULL pointer dereferences with missing content
...
In PKCS#7, the ASN.1 content component is optional.
This typically applies to inner content (detached signatures),
however we must also handle unexpected missing outer content
correctly.
This patch only addresses functions reachable from parsing,
decryption and verification, and functions otherwise associated
with reading potentially untrusted data.
Correcting all low-level API calls requires further work.
CVE-2015-0289
Thanks to Michal Zalewski (Google) for reporting this issue.
Reviewed-by: Steve Henson <steve@openssl.org >
2015-03-19 12:58:35 +00:00
Dr. Stephen Henson
c3c7fb07dc
Fix ASN1_TYPE_cmp
...
Fix segmentation violation when ASN1_TYPE_cmp is passed a boolean type. This
can be triggered during certificate verification so could be a DoS attack
against a client or a server enabling client authentication.
CVE-2015-0286
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-19 12:58:35 +00:00
Matt Caswell
b19d814321
Fix DHE Null CKE vulnerability
...
If client auth is used then a server can seg fault in the event of a DHE
cipher being used and a zero length ClientKeyExchange message being sent
by the client. This could be exploited in a DoS attack.
CVE-2015-1787
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-19 12:58:35 +00:00
Dr. Stephen Henson
76343947ad
Fix for CVE-2015-0291
...
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org >
Conflicts:
ssl/t1_lib.c
2015-03-19 12:58:35 +00:00
Dr. Stephen Henson
4b22cce381
Reject invalid PSS parameters.
...
Fix a bug where invalid PSS parameters are not rejected resulting in a
NULL pointer exception. This can be triggered during certificate
verification so could be a DoS attack against a client or a server
enabling client authentication.
Thanks to Brian Carpenter for reporting this issues.
CVE-2015-0208
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-03-19 12:58:35 +00:00
Dr. Stephen Henson
b717b08307
Free up ADB and CHOICE if already initialised.
...
CVE-2015-0287
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-03-19 11:11:22 +00:00
Matt Caswell
819418110b
Fix Seg fault in DTLSv1_listen
...
The DTLSv1_listen function is intended to be stateless and processes
the initial ClientHello from many peers. It is common for user code to
loop over the call to DTLSv1_listen until a valid ClientHello is received
with an associated cookie. A defect in the implementation of DTLSv1_listen
means that state is preserved in the SSL object from one invokation to the
next that can lead to a segmentation fault. Erorrs processing the initial
ClientHello can trigger this scenario. An example of such an error could
be that a DTLS1.0 only client is attempting to connect to a DTLS1.2 only
server.
CVE-2015-0207
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-19 11:11:22 +00:00
Matt Caswell
77c77f0a1b
Multiblock corrupted pointer fix
...
OpenSSL 1.0.2 introduced the "multiblock" performance improvement. This
feature only applies on 64 bit x86 architecture platforms that support AES
NI instructions. A defect in the implementation of "multiblock" can cause
OpenSSL's internal write buffer to become incorrectly set to NULL when
using non-blocking IO. Typically, when the user application is using a
socket BIO for writing, this will only result in a failed connection.
However if some other BIO is used then it is likely that a segmentation
fault will be triggered, thus enabling a potential DoS attack.
CVE-2015-0290
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-03-19 11:11:22 +00:00
Dr. Stephen Henson
8b84495380
Add support for ServerInfo SSL_CONF option.
...
Add support for ServerInfo SSL_CONF option and update documentation. This
was wrongly omitted from the 1.0.2 release.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-18 12:31:06 +00:00
Matt Caswell
c1559f5046
Dead code removal from apps
...
Some miscellaneous removal of dead code from apps. Also fix an issue with
error handling with pkcs7.
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit 11abf92259 )
2015-03-17 14:49:47 +00:00
Matt Caswell
d8d2e50359
Remove dead code from crypto
...
Some miscellaneous removal of dead code from lib crypto.
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit b7573c597c )
2015-03-17 14:49:47 +00:00
Matt Caswell
6c4ce00753
Fix seg fault in s_time
...
Passing a negative value for the "-time" option to s_time results in a seg
fault. This commit fixes it so that time has to be greater than 0.
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit dfef52f6f2 )
2015-03-17 13:48:04 +00:00
Matt Caswell
fcb61b6c92
Add sanity check to PRF
...
The function tls1_PRF counts the number of digests in use and partitions
security evenly between them. There always needs to be at least one digest
in use, otherwise this is an internal error. Add a sanity check for this.
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit 668f6f08c6 )
2015-03-17 13:48:04 +00:00
Matt Caswell
b2b8163964
Fix memset call in stack.c
...
The function sk_zero is supposed to zero the elements held within a stack.
It uses memset to do this. However it calculates the size of each element
as being sizeof(char **) instead of sizeof(char *). This probably doesn't
make much practical difference in most cases, but isn't a portable
assumption.
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit 7132ac830f )
2015-03-17 13:48:04 +00:00
Matt Caswell
56490fc26f
Move malloc fail checks closer to malloc
...
Move memory allocation failure checks closer to the site of the malloc in
dgst app. Only a problem if the debug flag is set...but still should be
fixed.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit be1477adc9 )
2015-03-17 13:48:04 +00:00
Matt Caswell
f2e95a02b1
Add malloc failure checks
...
Add some missing checks for memory allocation failures in ca app.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit a561bfe944 )
2015-03-17 13:48:04 +00:00
Carl Jackson
912c8c92b5
Fix regression in ASN1_UTCTIME_cmp_time_t
...
Previously, ASN1_UTCTIME_cmp_time_t would return 1 if s > t, -1 if
s < t, and 0 if s == t.
This behavior was broken in a refactor [0], resulting in the opposite
time comparison behavior.
[0]: 904348a492
PR#3706
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit da27006df0 )
2015-03-15 19:47:08 +00:00
Andy Polyakov
94be83127b
Avoid reading an unused byte after the buffer
...
Other curves don't have this problem.
Reviewed-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 9fbbdd73c5 )
2015-03-14 18:24:58 +01:00
Emilia Kasper
be109b9eec
Fix undefined behaviour in shifts.
...
Td4 and Te4 are arrays of u8. A u8 << int promotes the u8 to an int first then shifts.
If the mathematical result of a shift (as modelled by lhs * 2^{rhs}) is not representable
in an integer, behaviour is undefined. In other words, you can't shift into the sign bit
of a signed integer. Fix this by casting to u32 whenever we're shifting left by 24.
(For consistency, cast other shifts, too.)
Caught by -fsanitize=shift
Submitted by Nick Lewycky (Google)
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit 8b37e5c14f )
2015-03-13 21:14:20 -07:00
Dr. Stephen Henson
c0d69ddb33
additional configuration documentation
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit 3d764db7a2 )
2015-03-12 13:45:24 +00:00
Dr. Stephen Henson
8cd6714084
ASN.1 print fix.
...
When printing out an ASN.1 structure if the type is an item template don't
fall thru and attempt to interpret as a primitive type.
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit 5dc1247a74 )
2015-03-12 13:45:24 +00:00
Matt Caswell
327de270d5
SSL_check_chain fix
...
If SSL_check_chain is called with a NULL X509 object or a NULL EVP_PKEY
or the type of the public key is unrecognised then the local variable
|cpk| in tls1_check_chain does not get initialised. Subsequently an
attempt is made to deref it (after the "end" label), and a seg fault will
result.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit d813f9eb38 )
2015-03-12 09:29:48 +00:00
Matt Caswell
8e91b3d991
Fix missing return checks in v3_cpols.c
...
Fixed assorted missing return value checks in c3_cpols.c
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit c5f2b5336a )
2015-03-12 09:29:48 +00:00
Matt Caswell
20223855e4
Fix dsa_pub_encode
...
The return value from ASN1_STRING_new() was not being checked which could
lead to a NULL deref in the event of a malloc failure. Also fixed a mem
leak in the error path.
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 0c7ca4033d )
2015-03-12 09:29:48 +00:00
Matt Caswell
563fc239d2
Fix dh_pub_encode
...
The return value from ASN1_STRING_new() was not being checked which could
lead to a NULL deref in the event of a malloc failure. Also fixed a mem
leak in the error path.
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 6aa8dab2bb )
2015-03-12 09:29:48 +00:00
Matt Caswell
15919ecadc
Fix asn1_item_print_ctx
...
The call to asn1_do_adb can return NULL on error, so we should check the
return value before attempting to use it.
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 34a7ed0c39 )
2015-03-12 09:29:48 +00:00
Matt Caswell
289c06823e
ASN1_primitive_new NULL param handling
...
ASN1_primitive_new takes an ASN1_ITEM * param |it|. There are a couple
of conditional code paths that check whether |it| is NULL or not - but
later |it| is deref'd unconditionally. If |it| was ever really NULL then
this would seg fault. In practice ASN1_primitive_new is marked as an
internal function in the public header file. The only places it is ever
used internally always pass a non NULL parameter for |it|. Therefore, change
the code to sanity check that |it| is not NULL, and remove the conditional
checking.
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit 9e488fd6ab )
2015-03-12 09:29:48 +00:00
Matt Caswell
ff2459b918
Fix EVP_DigestInit_ex with NULL digest
...
Calling EVP_DigestInit_ex which has already had the digest set up for it
should be possible. You are supposed to be able to pass NULL for the type.
However currently this seg faults.
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit a01087027b )
2015-03-12 09:29:48 +00:00
Matt Caswell
8944d10e2d
Fix error handling in bn_exp
...
In the event of an error |rr| could be NULL. Therefore don't assume you can
use |rr| in the error handling code.
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit 8c5a7b33c6 )
2015-03-12 09:29:48 +00:00
Andy Polyakov
df57e42baa
evp/e_aes.c: fix SPARC T4-specific problem:
...
- SIGSEGV/ILL in CCM (RT#3688);
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-12 09:07:53 +01:00
Matt Caswell
9c5c18500b
Fix seg fault in ASN1_generate_v3/ASN1_generate_nconf
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit ac5a110621 )
2015-03-11 11:21:09 +00:00
Matt Caswell
35fafc4dbc
Cleanse buffers
...
Cleanse various intermediate buffers used by the PRF (backported version
from master).
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-11 10:45:23 +00:00
Emilia Kasper
0c14565c5b
Harmonize return values in dtls1_buffer_record
...
Ensure all malloc failures return -1.
Reported by Adam Langley (Google).
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 06c6a2b4a3 )
2015-03-10 13:52:32 -07:00
Richard Godbee
5a9e9669d8
BIO_debug_callback: Fix output on 64-bit machines
...
BIO_debug_callback() no longer assumes the hexadecimal representation of
a pointer fits in 8 characters.
Signed-off-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 460e920d8a )
2015-03-10 12:34:21 +01:00
Matt Caswell
2b31fcc0b5
Prevent handshake with unseeded PRNG
...
Fix security issue where under certain conditions a client can complete a
handshake with an unseeded PRNG. The conditions are:
- Client is on a platform where the PRNG has not been seeded, and the
user has not seeded manually
- A protocol specific client method version has been used (i.e. not
SSL_client_methodv23)
- A ciphersuite is used that does not require additional random data
from the PRNG beyond the initial ClientHello client random
(e.g. PSK-RC4-SHA)
If the handshake succeeds then the client random that has been used will
have been generated from a PRNG with insufficient entropy and therefore
the output may be predictable.
For example using the following command with an unseeded openssl will
succeed on an unpatched platform:
openssl s_client -psk 1a2b3c4d -tls1_2 -cipher PSK-RC4-SHA
CVE-2015-0285
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit e1b568dd24 )
2015-03-10 10:45:52 +00:00
Dmitry-Me
b65b4c3481
Fix wrong numbers being passed as string lengths
...
Signed-off-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 0b142f022e )
2015-03-09 21:05:39 +01:00
Dr. Stephen Henson
ef116b0003
update ordinals
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-09 16:57:24 +00:00
David Woodhouse
0d691e0e27
Wrong SSL version in DTLS1_BAD_VER ClientHello
...
Since commit 741c9959 ("DTLS revision."), we put the wrong protocol
version into our ClientHello for DTLS1_BAD_VER. The old DTLS
code which used ssl->version was replaced by the more generic SSL3 code
which uses ssl->client_version. The Cisco ASA no longer likes our
ClientHello.
RT#3711
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit f7683aaf36 )
2015-03-09 11:07:47 +00:00
Matt Caswell
ae3fcdf1e5
Fix DTLS1_BAD_VER regression
...
Commit 9cf0f187 in HEAD, and 68039af3 in 1.0.2, removed a version check
from dtls1_buffer_message() which was needed to distinguish between DTLS
1.x and Cisco's pre-standard version of DTLS (DTLS1_BAD_VER).
Based on an original patch by David Woodhouse <dwmw2@infradead.org >
RT#3703
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 5178a16c43 )
2015-03-09 10:54:06 +00:00
Dr. Stephen Henson
d6ca1cee8b
fix warning
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-08 17:31:48 +00:00
Dr. Stephen Henson
bfa34f551c
Cleanse PKCS#8 private key components.
...
New function ASN1_STRING_clear_free which cleanses an ASN1_STRING
structure before freeing it.
Call ASN1_STRING_clear_free on PKCS#8 private key components.
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit a8ae0891d4 )
2015-03-08 16:29:28 +00:00
Dr. Stephen Henson
f9aa27dc78
Additional CMS documentation.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit e3013932df )
2015-03-08 16:19:24 +00:00
Kurt Roeckx
f417997a32
Remove export ciphers from the DEFAULT cipher list
...
They are moved to the COMPLEMENTOFDEFAULT instead.
This also fixes SSLv2 to be part of COMPLEMENTOFDEFAULT.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-03-07 23:02:19 +01:00
Matt Caswell
6ee3997134
Update mkerr.pl for new format
...
Make the output from mkerr.pl consistent with the newly reformatted code.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-06 14:07:05 +00:00
Kurt Cancemi
f9a21ed069
Use constants not numbers
...
This patch uses warning/fatal constants instead of numbers with comments for
warning/alerts in d1_pkt.c and s3_pkt.c
RT#3725
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit fd865cadcb )
2015-03-05 09:28:37 +00:00
Matt Caswell
d6b4a41d10
Unchecked malloc fixes
...
Miscellaneous unchecked malloc fixes. Also fixed some mem leaks on error
paths as I spotted them along the way.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 918bb86529 )
Conflicts:
crypto/bio/bss_dgram.c
2015-03-05 09:15:08 +00:00
Dr. Stephen Henson
9fdbaf3a32
Check public key is not NULL.
...
CVE-2015-0288
PR#3708
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 28a00bcd8e )
2015-03-02 15:26:41 +00:00
Dr. Stephen Henson
6fff54b0ce
Fix format script.
...
The format script didn't correctly recognise some ASN.1 macros and
didn't reformat some files as a result. Fix script and reformat
affected files.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 437b14b533 )
2015-03-02 13:43:17 +00:00
Matt Caswell
6e20f55646
Fix d2i_SSL_SESSION for DTLS1_BAD_VER
...
Some Cisco appliances use a pre-standard version number for DTLS. We support
this as DTLS1_BAD_VER within the code.
This change fixes d2i_SSL_SESSION for that DTLS version.
Based on an original patch by David Woodhouse <dwmw2@infradead.org >
RT#3704
Reviewed-by: Tim Hudson <tjh@openssl.org >
Conflicts:
ssl/ssl_asn1.c
2015-02-27 20:31:28 +00:00
Matt Caswell
87cd297d14
Fixed missing return value checks.
...
Added various missing return value checks in tls1_change_cipher_state.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-02-27 15:18:21 +00:00
Matt Caswell
195f6302bb
Fix missing return value checks.
...
Fixed various missing return value checks in ssl3_send_newsession_ticket.
Also a mem leak on error.
Reviewed-by: Richard Levitte <levitte@openssl.org >
Conflicts:
ssl/s3_srvr.c
2015-02-27 15:18:20 +00:00
Matt Caswell
8f51c206b3
Fix evp_extra_test.c with no-ec
...
When OpenSSL is configured with no-ec, then the new evp_extra_test fails to
pass. This change adds appropriate OPENSSL_NO_EC guards around the code.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit a988036259 )
2015-02-26 23:34:54 +00:00
Matt Caswell
f2aff60f6f
Update the SHA* documentation
...
Updates to include SHA224, SHA256, SHA384 and SHA512. In particular note
the restriction on setting md to NULL with regards to thread safety.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit f7812493a0 )
2015-02-25 22:57:19 +00:00
Rainer Jung
fbabc6c06e
Fix NAME section of d2i_ECPKParameters to prevent broken symlinks when using
...
the extract-names.pl script.
RT#3718
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-02-25 20:47:42 +00:00
Matt Caswell
bfb14d724b
Fix some minor documentation issues
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-02-25 17:22:01 +00:00
Matt Caswell
4d2207f097
Remove pointless free, and use preferred way of calling d2i_* functions
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-02-25 17:22:01 +00:00
Matt Caswell
b42e4a9f6b
Add dire warnings about the "reuse" capability of the d2i_* functions.
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-02-25 17:22:01 +00:00
Matt Caswell
78a6b77976
Provide documentation for i2d_ECPrivateKey and d2i_ECPrivateKey
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-02-25 17:22:01 +00:00
Matt Caswell
ba5d0113e8
Fix a failure to NULL a pointer freed on error.
...
Inspired by BoringSSL commit 517073cd4b by Eric Roman <eroman@chromium.org >
CVE-2015-0209
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-02-25 17:22:01 +00:00
Matt Caswell
f747572547
Import evp_test.c from BoringSSL. Unfortunately we already have a file
...
called evp_test.c, so I have called this one evp_extra_test.c
Reviewed-by: Emilia Käsper <emilia@openssl.org >
Conflicts:
crypto/evp/Makefile
test/Makefile
2015-02-25 17:21:58 +00:00
Dr. Stephen Henson
36b619a06e
Document -no_explicit
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 384dee5124 )
2015-02-24 15:28:38 +00:00
Andy Polyakov
13c1807041
Fix crash in SPARC T4 XTS.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 775b669de3 )
2015-02-24 10:12:57 +01:00
Andy Polyakov
f243def213
sha/asm/sha1-586.pl: fix typo.
...
The typo doesn't affect supported configuration, only unsupported masm.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 3372c4fffa )
2015-02-22 19:22:09 +01:00
Dr. Stephen Henson
1f956f9cda
typo
...
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
(cherry picked from commit 15b5d6585d )
2015-02-22 14:44:21 +00:00
Edgar Pek
98e6f07901
Fix null-pointer dereference
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit bcfa19a8d1 )
2015-02-22 13:23:53 +01:00
Kurt Roeckx
f95519538a
Fix memory leak
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit edac5dc220 )
2015-02-22 13:23:53 +01:00
Doug Hogan
79e2e927e6
Avoid a double-free in an error path.
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 1549a26520 )
2015-02-22 13:23:52 +01:00
Richard Levitte
7f3563b576
Restore -DTERMIO/-DTERMIOS on Windows platforms.
...
The previous defaulting to TERMIOS took away -DTERMIOS / -DTERMIO a
bit too enthusiastically. Windows/DOSish platforms of all sorts get
identified as OPENSSL_SYS_MSDOS, and they get a different treatment
altogether UNLESS -DTERMIO or -DTERMIOS is explicitely given with the
configuration. The answer is to restore those macro definitions for
the affected configuration targets.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit ba4bdee718 )
Conflicts:
Configure
2015-02-22 09:38:20 +01:00
Richard Levitte
458a55af16
Assume TERMIOS is default, remove TERMIO on all Linux.
...
The rationale for this move is that TERMIOS is default, supported by
POSIX-1.2001, and most definitely on Linux. For a few other systems,
TERMIO may still be the termnial interface of preference, so we keep
-DTERMIO on those in Configure.
crypto/ui/ui_openssl.c is simplified in this regard, and will define
TERMIOS for all systems except a select few exceptions.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 64e6bf64b3 )
Conflicts:
Configure
crypto/ui/ui_openssl.c
2015-02-22 08:10:29 +01:00
Richard Levitte
681da86ebb
Transfer a fix from 1.0.1
...
manually picked from e7b85bc402
Reviewed-by: Stephen Henson <steve@openssl.org >
(cherry picked from commit 774ccae63c )
2015-02-13 13:40:47 +01:00
Rich Salz
872f91c403
RT3684: rand_egd needs stddef.h
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-02-12 14:23:28 -05:00
Graeme Perrow
ee1ccd0a41
RT3670: Check return from BUF_MEM_grow_clean
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit b0333e697c )
2015-02-12 13:01:33 -05:00
Eric Dequin
62bfff2d99
Missing OPENSSL_free on error path.
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit 1d2932de4c )
2015-02-12 11:15:29 -05:00
Emilia Kasper
95929797a0
Fix hostname validation in the command-line tool to honour negative return values.
...
Specifically, an ASN.1 NumericString in the certificate CN will fail UTF-8 conversion
and result in a negative return value, which the "x509 -checkhost" command-line option
incorrectly interpreted as success.
Also update X509_check_host docs to reflect reality.
Thanks to Sean Burford (Google) for reporting this issue.
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit 0923e7df9e )
2015-02-10 15:36:03 +01:00
Andy Polyakov
bcfaa4eeee
objects/obj_xref.h: revert reformat.
...
obj_xref.h was erroneously restored to pre-reformat state.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-02-10 08:55:30 +01:00
Andy Polyakov
cb43fd0467
Bring objects.pl output even closer to new format.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 849037169d )
2015-02-09 16:00:25 +01:00
Dr. Stephen Henson
ba25221226
Fix memory leak reporting.
...
Free up bio_err after memory leak data has been printed to it.
In int_free_ex_data if ex_data is NULL there is nothing to free up
so return immediately and don't reallocate it.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 9c7a780bbe )
2015-02-09 13:01:15 +00:00
Andy Polyakov
506805e708
Harmonize objects.pl output with new format.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 7ce3862319 )
2015-02-09 09:57:23 +01:00
Matt Caswell
04222b630e
Fix error handling in ssltest
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit ae632974f9 )
2015-02-06 10:08:58 +00:00
Rich Salz
16064539ad
Fixed bad formatting in crypto/des/spr.h
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit 7e35f06ea9 )
2015-02-05 09:45:25 -05:00
Dr. Stephen Henson
75c77a71fa
Make objxref.pl output in correct format
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 6922ddee1b )
2015-02-04 13:35:35 +00:00
Dr. Stephen Henson
3b740cebd5
Preliminary ASN1_TIME documentation.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit a724e79ed7 )
2015-02-03 16:50:29 +00:00
Dr. Stephen Henson
f17a4ad7d7
Check PKCS#8 pkey field is valid before cleansing.
...
PR:3683
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 52e028b9de )
2015-02-03 14:02:12 +00:00
Andy Polyakov
79e0285755
cms-test.pl: "localize" /dev/null even further [as follow-up to VMS].
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 5da05a26f2 )
2015-02-02 15:29:10 +01:00
Andy Polyakov
8d5d455988
modes/gcm128.c: fix OPENSSL_SMALL_FOOTPRINT compile failure
...
on affected platforms (PowerPC and AArch64).
For reference, minimalistic #ifdef GHASH is sufficient, because
it's never defined with OPENSSL_SMALL_FOOTPRINT and ctx->ghash
is never referred.
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit b2991c081a )
2015-01-30 16:38:42 +01:00
Richard Levitte
1d5668c258
VMS exit codes weren't handled well enough and were unclear
...
Making a specific variable $failure_code and a bit of commenting in the
VMS section should help clear things up.
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit e00ab250c8 )
2015-01-30 14:47:37 +01:00
Richard Levitte
bc1544d8c5
dso_vms needs to add the .EXE extension if there is none already
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit be7b1097e2 )
2015-01-30 05:02:56 +01:00
Matt Caswell
6ca1dc9737
Provide documentation for all SSL(_CTX)?_(get|set)(_default)?_read_ahead
...
functions.
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit 8507474564 )
2015-01-27 14:30:25 +00:00
Matt Caswell
0ed9ca21ae
Remove explicit setting of read_ahead for DTLS. It never makes sense not to
...
use read_ahead with DTLS because it doesn't work. Therefore read_ahead needs
to be the default.
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit f400241251 )
2015-01-27 14:30:25 +00:00
Matt Caswell
11b32d6e29
Make DTLS always act as if read_ahead is set. The actual value of read_ahead
...
is ignored for DTLS.
RT#3657
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit 8dd4ad0ff5 )
2015-01-27 14:30:25 +00:00
Rich Salz
63ac16ccac
Remove obsolete support for old code.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit 3d0cf91807 )
2015-01-26 11:06:28 -05:00
Rich Salz
db7cb7ab9a
Remove unused eng_rsax and related asm file
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-01-26 10:46:26 -05:00
Rich Salz
6d09851694
Make OPENSSL_config truly ignore errors.
...
Per discussion: should not exit. Should not print to stderr.
Errors are ignored. Updated doc to reflect that, and the fact
that this function is to be avoided.
Reviewed-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
(cherry picked from commit abdd677125 )
2015-01-25 21:12:01 -05:00
Kurt Roeckx
63c1d16bb8
Fix segfault with empty fields as last in the config.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-24 14:52:58 +01:00
Dr. Stephen Henson
6fa805f516
FIPS build fixes.
...
PR#3673
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-23 00:12:39 +00:00
Matt Caswell
06aab26874
Prepare for 1.0.2a-dev
...
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-01-22 16:16:24 +00:00
Matt Caswell
4ac0329582
Prepare for 1.0.2 release
...
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-01-22 16:12:26 +00:00
Matt Caswell
51e647f6e5
make update
...
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-01-22 16:12:26 +00:00
Matt Caswell
ba7e998d5b
Updates to CHANGES for 1.0.2
...
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2015-01-22 15:14:15 +00:00
Matt Caswell
25fc5ac48a
NEWS update
...
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2015-01-22 14:49:24 +00:00
Matt Caswell
d3b7cac41b
Fix for reformat problems with e_padlock.c
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-01-22 14:12:11 +00:00
Matt Caswell
fdc3ced983
Fix post-reformat errors preventing windows compilation
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 14:11:04 +00:00
Matt Caswell
65d6fdaa21
Fix formatting error in pem.h
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-01-22 14:11:04 +00:00
Rob Stradling
f11818c88d
Use inner algorithm when printing certificate.
...
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit 004efdbb41 )
2015-01-22 12:42:15 +00:00
Corinna Vinschen
3577e01438
Drop redundant and outdated __CYGWIN32__ tests.
...
Change OPENSSL_SYSNAME_CYGWIN32 to OPENSSL_SYSNAME_CYGWIN.
Drop outdated Cygwin targets.
RT#3605
Signed-off-by: Corinna Vinschen <vinschen@redhat.com >
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 732c5a6b92 )
Resolved conflicts:
Configure
TABLE
2015-01-22 13:06:47 +01:00
Andy Polyakov
2fc2649173
Fix macosx-ppc build (and typos in unwind info).
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit c462a6817b )
2015-01-22 12:15:34 +01:00
Andy Polyakov
2ad75afc3e
sha256-armv4.pl: fix typo.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 52cab56356 )
2015-01-22 12:02:14 +01:00
Matt Caswell
83975c80bb
Re-align some comments after running the reformat script.
...
This should be a one off operation (subsequent invokation of the
script should not move them)
This commit is for the 1.0.2 changes
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:31:48 +00:00
Matt Caswell
323d39e87f
Rerun util/openssl-format-source -v -c .
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:31:48 +00:00
Matt Caswell
ae5c8664e5
Run util/openssl-format-source -v -c .
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:31:38 +00:00
Matt Caswell
aae3233e1e
More tweaks for comments due indent issues
...
Conflicts:
ssl/ssl_ciph.c
ssl/ssl_locl.h
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:29:11 +00:00
Matt Caswell
04f7cbea11
Fix modes.h so that indent doesn't complain
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:29:06 +00:00
Matt Caswell
45bd3616bb
Backport hw_ibmca.c from master due to failed merge
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:29:00 +00:00
Matt Caswell
335d4d06a7
Tweaks for comments due to indent's inability to handle them
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:28:55 +00:00
Matt Caswell
f3b6ee30f4
Move more comments that confuse indent
...
Conflicts:
crypto/dsa/dsa.h
demos/engines/ibmca/hw_ibmca.c
ssl/ssl_locl.h
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:28:49 +00:00
Dr. Stephen Henson
a1b20ff654
Delete trailing whitespace from output.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:28:43 +00:00
Dr. Stephen Henson
628afe685e
Add -d debug option to save preprocessed files.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:28:38 +00:00
Dr. Stephen Henson
defc825e9e
Test option -nc
...
Add option -nc which sets COMMENTS=true but disables all indent comment
reformatting options.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:28:32 +00:00
Andy Polyakov
319d5c7a58
ec/ecp_nistz256.c: further harmonization with latest rules.
...
Conflicts:
crypto/ec/ecp_nistz256.c
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:28:26 +00:00
Matt Caswell
3807db9d91
Add ecp_nistz256.c to list of files skipped by openssl-format-source
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:28:20 +00:00
Matt Caswell
0f344da8f7
Manually reformat aes_x86core.c and add it to the list of files skipped by
...
openssl-format-source
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:28:14 +00:00
Andy Polyakov
23690f94d9
crypto/ofb128.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:28:08 +00:00
Andy Polyakov
9a11440ec0
modes/ctr128.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:28:03 +00:00
Andy Polyakov
ea09c04e7e
modes/cfb128.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:27:58 +00:00
Andy Polyakov
e1e7dc5085
ec/ecp_nistz256.c: harmonize with latest indent script.
...
Conflicts:
crypto/ec/ecp_nistz256.c
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:27:52 +00:00
Matt Caswell
cc4cd8213e
Fix indent comment corruption issue
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:27:47 +00:00
Matt Caswell
d18d367d90
Amend openssl-format-source so that it give more repeatable output
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:27:41 +00:00
Andy Polyakov
065e6718bb
bn/bn_const.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:27:35 +00:00
Andy Polyakov
3bca047362
bn/asm/x86_64-gcc.cL make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:27:29 +00:00
Andy Polyakov
78e74b59c1
bn/bn_asm.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:27:22 +00:00
Andy Polyakov
c0edd77487
bn/bn_exp.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:27:16 +00:00
Matt Caswell
e4e5457c29
Manually reformat aes_core.c
...
Add aes_core.c to the list of files not processed by openssl-format-source
Conflicts:
crypto/aes/aes_core.c
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:27:10 +00:00
Matt Caswell
9b214383c1
Add obj_dat.h to the list of files that will not be processed by
...
openssl-format-source
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:27:05 +00:00
Matt Caswell
cc6e2a5936
Fix strange formatting by indent
...
Conflicts:
crypto/hmac/hmac.h
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:26:58 +00:00
Andy Polyakov
85b120f361
modes/modes_lcl.h: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:26:52 +00:00
Matt Caswell
65a6a1ff45
indent has problems with comments that are on the right hand side of a line.
...
Sometimes it fails to format them very well, and sometimes it corrupts them!
This commit moves some particularly problematic ones.
Conflicts:
crypto/bn/bn.h
crypto/ec/ec_lcl.h
crypto/rsa/rsa.h
demos/engines/ibmca/hw_ibmca.c
ssl/ssl.h
ssl/ssl3.h
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:26:44 +00:00
Andy Polyakov
fbdbb28ac6
modes/gcm128.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:26:38 +00:00
Andy Polyakov
80e1750976
modes/cts128.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:26:32 +00:00
Andy Polyakov
11552ddc13
crypto/mem_dbg.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:26:26 +00:00
Matt Caswell
4ce632fb45
More indent fixes for STACK_OF
...
Conflicts:
ssl/s3_lib.c
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:26:15 +00:00
Matt Caswell
7b1ac23412
Fix indent issue with functions using STACK_OF
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:26:10 +00:00
Matt Caswell
bdc21a1571
Fix indent issue with engine.h
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:26:04 +00:00
Matt Caswell
39108d595e
Fix logic to check for indent.pro
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:25:58 +00:00
Andy Polyakov
d565023ae8
crypto/cryptlib.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:25:52 +00:00
Andy Polyakov
96a66a973b
bn/bntest.c: make it indent-friendly.
...
Conflicts:
crypto/bn/bntest.c
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:25:45 +00:00
Andy Polyakov
20c554ce8f
bn/bn_recp.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:25:39 +00:00
Andy Polyakov
d72781b4c9
engines/e_ubsec.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:25:33 +00:00
Andy Polyakov
ff397a8ff0
apps/speed.c: make it indent-friendly.
...
Conflicts:
apps/speed.c
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:25:25 +00:00
Andy Polyakov
abef2b4c53
bn/rsaz_exp.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:25:19 +00:00
Matt Caswell
d2f8517ad0
Fix make errors
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:25:13 +00:00
Richard Levitte
27df27d4b9
Make the script a little more location agnostic
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:25:06 +00:00
Matt Caswell
4a81e0f0d6
Provide script for filtering data initialisers for structs/unions. indent just can't handle it.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:24:59 +00:00
Dr. Stephen Henson
24e6a032bf
Script fixes.
...
Don't use double newline for headers.
Don't interpret ASN1_PCTX as start of an ASN.1 module.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:24:44 +00:00
Richard Levitte
9d63b5e375
Run expand before perl, to make sure things are properly aligned
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:24:38 +00:00
Richard Levitte
a45030fc9b
Force the use of our indent profile
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:24:32 +00:00
Tim Hudson
45b575a031
Provide source reformating script. Requires GNU indent to be
...
available.
Script written by Tim Hudson, with amendments by Steve Henson, Rich Salz and
Matt Caswell
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-22 09:24:12 +00:00
Matt Caswell
bc2d623c0e
Fix source where indent will not be able to cope
...
Conflicts:
apps/ciphers.c
ssl/s3_pkt.c
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:24:04 +00:00
Matt Caswell
c695ebe2a0
Additional comment changes for reformat of 1.0.2
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:23:58 +00:00
Matt Caswell
e19d4a99b8
Further comment amendments to preserve formatting prior to source reformat
...
(cherry picked from commit 4a7fa26ffd65bf36beb8d1cb8f29fc0ae203f5c5)
Conflicts:
crypto/x509v3/pcy_tree.c
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:23:50 +00:00
Tim Hudson
6977c7e2ba
mark all block comments that need format preserving so that
...
indent will not alter them when reformatting comments
(cherry picked from commit 1d97c84351 )
Conflicts:
crypto/bn/bn_lcl.h
crypto/bn/bn_prime.c
crypto/engine/eng_all.c
crypto/rc4/rc4_utl.c
crypto/sha/sha.h
ssl/kssl.c
ssl/t1_lib.c
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:23:04 +00:00
Richard Levitte
43257b9f51
Define CFLAGS as cflags on VMS as well
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-14 00:14:20 +01:00
Andy Polyakov
10771e3421
Add Broadwell performance results.
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit b3d7294976 )
2015-01-13 21:42:13 +01:00
Matt Caswell
36f694e09a
Make output from openssl version -f consistent with previous versions
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit 2d2671790e )
2015-01-13 11:28:54 +00:00
Matt Caswell
635ca4446f
Fix warning where BIO_FLAGS_UPLINK was being redefined.
...
This warning breaks the build in 1.0.0 and 0.9.8
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit b1ffc6ca1c )
2015-01-13 11:24:52 +00:00
Matt Caswell
bd00b8dc65
Avoid deprecation problems in Visual Studio 13
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit 86d21d0b95 )
2015-01-13 09:47:09 +00:00
Rich Salz
2194b36979
Allow multiple IDN xn-- indicators
...
Update the X509v3 name parsing to allow multiple xn-- international
domain name indicators in a name. Previously, only allowed one at
the beginning of a name, which was wrong.
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
(cherry picked from commit 31d1d3741f )
2015-01-12 12:40:29 -05:00
Kurt Roeckx
e81a83657c
Make build reproducible
...
It contained a date on when it was build.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-01-10 16:31:27 +01:00
Matt Caswell
cbbb952f3a
Further windows specific .gitignore entries
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 41c9cfbc4e )
2015-01-09 23:40:41 +00:00
Matt Caswell
04f670cf3d
Update .gitignore with windows files to be excluded from git
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
Conflicts:
.gitignore
2015-01-09 11:30:07 +00:00
Matt Caswell
5cee72382c
Fix build failure on Windows due to undefined cflags identifier
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 5c5e7e1a7e )
2015-01-08 19:24:09 +00:00
Matt Caswell
7c6a3cf237
A memory leak can occur in dtls1_buffer_record if either of the calls to
...
ssl3_setup_buffers or pqueue_insert fail. The former will fail if there is a
malloc failure, whilst the latter will fail if attempting to add a duplicate
record to the queue. This should never happen because duplicate records should
be detected and dropped before any attempt to add them to the queue.
Unfortunately records that arrive that are for the next epoch are not being
recorded correctly, and therefore replays are not being detected.
Additionally, these "should not happen" failures that can occur in
dtls1_buffer_record are not being treated as fatal and therefore an attacker
could exploit this by sending repeated replay records for the next epoch,
eventually causing a DoS through memory exhaustion.
Thanks to Chris Mueller for reporting this issue and providing initial
analysis and a patch. Further analysis and the final patch was performed by
Matt Caswell from the OpenSSL development team.
CVE-2015-0206
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
(cherry picked from commit 652ff0f4796eecd8729b4690f2076d1c7ccb2862)
2015-01-08 15:46:42 +00:00
Dr. Stephen Henson
be3fb8d15d
Unauthenticated DH client certificate fix.
...
Fix to prevent use of DH client certificates without sending
certificate verify message.
If we've used a client certificate to generate the premaster secret
ssl3_get_client_key_exchange returns 2 and ssl3_get_cert_verify is
never called.
We can only skip the certificate verify message in
ssl3_get_cert_verify if the client didn't send a certificate.
Thanks to Karthikeyan Bhargavan for reporting this issue.
CVE-2015-0205
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-08 15:46:42 +00:00
Matt Caswell
fb73f12a9c
Follow on from CVE-2014-3571. This fixes the code that was the original source
...
of the crash due to p being NULL. Steve's fix prevents this situation from
occuring - however this is by no means obvious by looking at the code for
dtls1_get_record. This fix just makes things look a bit more sane.
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2015-01-08 15:46:19 +00:00
Dr. Stephen Henson
25d738c3a4
Fix crash in dtls1_get_record whilst in the listen state where you get two
...
separate reads performed - one for the header and one for the body of the
handshake record.
CVE-2014-3571
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-08 11:20:29 +00:00
Andy Polyakov
49446ea62f
Fix for CVE-2014-3570 (with minor bn_asm.c revamp).
...
Reviewed-by: Emilia Kasper <emilia@openssl.org >
(cherry picked from commit 56df92efb6893abe323307939425957ce878c8f0)
2015-01-08 11:20:29 +00:00
Dr. Stephen Henson
f33ab61b5f
fix error discrepancy
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 4a4d415857 )
2015-01-07 18:10:38 +00:00
Andy Polyakov
2d63d0c84a
Fix irix-cc build.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit e464403d0b )
2015-01-07 18:41:17 +01:00
Richard Levitte
cfb5d6c10a
VMS fixups for 1.0.2
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-01-07 02:15:35 +01:00
Dr. Stephen Henson
a936ba1148
use correct credit in CHANGES
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 4138e38825 )
2015-01-06 22:41:27 +00:00
Emilia Kasper
ed736ddd74
Only inherit the session ID context in SSL_set_SSL_CTX if the existing
...
context was also inherited (matches that of the existing SSL_CTX).
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit ac8e9cbe14 )
2015-01-06 23:10:03 +01:00
Dr. Stephen Henson
c7c2a56a1b
use correct function name
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit cb62ab4b17 )
2015-01-06 21:04:38 +00:00
Dr. Stephen Henson
129344a8fb
RT3662: Allow leading . in nameConstraints
...
Change by SteveH from original by John Denker (in the RT)
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 77ff1f3b8b )
2015-01-06 15:33:41 -05:00
Martin Brejcha
be6e766953
Fix memory leak.
...
Fix memory leak by freeing up saved_message.data if it is not NULL.
PR#3489
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 41cd41c441 )
2015-01-06 16:49:36 +00:00
Matt Caswell
8dc461eccf
Remove blank line from start of cflags character array in buildinf.h
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit b691154e18 )
2015-01-06 15:35:15 +00:00
Dr. Stephen Henson
4b4c1fcc88
Only allow ephemeral RSA keys in export ciphersuites.
...
OpenSSL clients would tolerate temporary RSA keys in non-export
ciphersuites. It also had an option SSL_OP_EPHEMERAL_RSA which
enabled this server side. Remove both options as they are a
protocol violation.
Thanks to Karthikeyan Bhargavan for reporting this issue.
(CVE-2015-0204)
Reviewed-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-06 12:45:10 +00:00
Andy Polyakov
1cfd7cf3cc
CHANGES: mention "universal" ARM support.
...
This is re-commit without unrelated modification.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 0548505f4c )
2015-01-06 12:15:40 +01:00
Andy Polyakov
2996157127
Revert "CHANGES: mention "universal" ARM support."
...
This reverts commit caeed719fe .
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-06 12:12:15 +01:00
Andy Polyakov
caeed719fe
CHANGES: mention "universal" ARM support.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 4fec915069 )
2015-01-06 11:21:12 +01:00
Andy Polyakov
f4868c9921
Remove inconsistency in ARM support.
...
This facilitates "universal" builds, ones that target multiple
architectures, e.g. ARMv5 through ARMv7. See commentary in
Configure for details.
Reviewed-by: Ard Biesheuvel <ard.biesheuvel@linaro.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit c1669e1c20 )
2015-01-06 11:14:23 +01:00
Dr. Stephen Henson
4aaf1e493c
ECDH downgrade bug fix.
...
Fix bug where an OpenSSL client would accept a handshake using an
ephemeral ECDH ciphersuites with the server key exchange message omitted.
Thanks to Karthikeyan Bhargavan for reporting this issue.
CVE-2014-3572
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit b15f876964 )
2015-01-05 23:34:57 +00:00
Dr. Stephen Henson
d96c24926d
update ordinals
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 31c65a7bc0 )
2015-01-05 16:51:41 +00:00
Adam Langley
d9b277e085
Ensure that the session ID context of an SSL* is updated
...
when its SSL_CTX is updated.
From BoringSSL commit
https://boringssl.googlesource.com/boringssl/+/a5dc545bbcffd9c24cebe65e9ab5ce72d4535e3a
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 61aa44ca99 )
2015-01-05 17:33:02 +01:00
Dr. Stephen Henson
aace6dbcb3
Constify ASN1_TYPE_cmp add X509_ALGOR_cmp.
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 4c52816d35 )
2015-01-05 14:54:38 +00:00
Dr. Stephen Henson
85cfc188c0
Fix various certificate fingerprint issues.
...
By using non-DER or invalid encodings outside the signed portion of a
certificate the fingerprint can be changed without breaking the signature.
Although no details of the signed portion of the certificate can be changed
this can cause problems with some applications: e.g. those using the
certificate fingerprint for blacklists.
1. Reject signatures with non zero unused bits.
If the BIT STRING containing the signature has non zero unused bits reject
the signature. All current signature algorithms require zero unused bits.
2. Check certificate algorithm consistency.
Check the AlgorithmIdentifier inside TBS matches the one in the
certificate signature. NB: this will result in signature failure
errors for some broken certificates.
3. Check DSA/ECDSA signatures use DER.
Reencode DSA/ECDSA signatures and compare with the original received
signature. Return an error if there is a mismatch.
This will reject various cases including garbage after signature
(thanks to Antti Karjalainen and Tuomo Untinen from the Codenomicon CROSS
program for discovering this case) and use of BER or invalid ASN.1 INTEGERs
(negative or with leading zeroes).
CVE-2014-8275
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 684400ce19 )
2015-01-05 14:36:06 +00:00
Matt Caswell
6ee7de1eb3
Additional fix required for no-srtp to work
...
RT3638
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-01-05 14:28:40 +00:00
Piotr Sikora
7b0194db42
Fix building with no-srtp
...
RT3638
Reviewed-by: Emilia Käsper <emilia@openssl.org >
Conflicts:
ssl/t1_lib.c
2015-01-05 14:28:40 +00:00
Emilia Kasper
bfaf796241
Add a clang build target for linux-x86_64
...
This change documents the world as-is, by turning all warnings on,
and then turning warnings that trigger off again.
Reviewed-by: Andy Polyakov <appro@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-01-05 14:10:33 +01:00
Andy Polyakov
c02e2d6a71
ecp_nistz256-x86_64.pl: fix occasional failures.
...
RT: 3607
Reviewed-by: Adam Langley <agl@google.com >
Reviewed-by: Emilia Kasper <emilia@openssl.org >
(cherry picked from commit 9e557ab262 )
2015-01-04 23:22:06 +01:00
Rich Salz
9f49067c9e
RT2914: NULL check missing in X509_name_canon
...
Check for NULL return from X509_NAME_ENTRY_new()
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 2c60925d1c )
2015-01-04 14:52:01 -05:00
Dr. Stephen Henson
5396c1190f
Update SGC flag comment.
...
Since SGC has been removed from OpenSSL 1.0.2 the
SSL3_FLAGS_SGC_RESTART_DONE is no longer used. However the #define is
retained for compatibility.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-02 23:12:37 +00:00
Dr. Stephen Henson
cf95b2d66a
Remove MS SGC
...
MS Server gated cryptography is obsolete and dates from the time of export
restrictions on strong encryption and is only used by ancient versions of
MSIE.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 63eab8a620 )
2015-01-02 23:01:38 +00:00
Dr. Stephen Henson
47606dda67
Clear existing extension state.
...
When parsing ClientHello clear any existing extension state from
SRP login and SRTP profile.
Thanks to Karthikeyan Bhargavan for reporting this issue.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 4f605ccb77 )
Conflicts:
ssl/t1_lib.c
2015-01-02 22:27:40 +00:00
Dominik Neubauer
c30c876176
typo in s_client
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
2014-12-31 11:19:03 +01:00
Kurt Roeckx
73bda31b4c
Make "run" volatile
...
RT#3629
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-30 16:54:56 +01:00
Thorsten Glaser
dc00fb9d51
Document openssl dgst -hmac option
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-30 16:53:48 +01:00
Kurt Roeckx
06c3e65deb
dlfcn: always define _GNU_SOURCE
...
We need this for the freebsd kernel with glibc as used in the Debian kfreebsd
ports. There shouldn't be a problem defining this on systems not using glibc.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-30 16:53:48 +01:00
Kurt Roeckx
5984c7e3d5
Fix memory leak in the apps
...
The BIO_free() allocated ex_data again that we already freed.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-30 16:53:48 +01:00
Alok Menghrajani
beef278bd7
Improves certificates HOWTO
...
* adds links to various related documents.
* fixes a few typos.
* rewords a few sentences.
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 67472bd82b )
2014-12-22 16:26:03 +01:00
Richard Levitte
58191465ef
Small typo
...
Reviewed-by: Stephen Henson <steve@openssl.org >
(cherry picked from commit 7cfab40f43 )
2014-12-22 15:36:42 +01:00
Michael Tuexen
5760c8b82f
Fix incorrect OPENSSL_assert() usage.
...
Return an error code for I/O errors instead of an assertion failure.
PR#3470
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 2521fcd852 )
2014-12-20 14:46:28 +00:00
Matt Caswell
b651407268
Fix a problem if CFLAGS is too long cversion.c fails to compile when config
...
is run with --strict-warnings.
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit 488f16e31b )
2014-12-19 14:05:25 +00:00
Kurt Roeckx
a760dde681
Return error when a bit string indicates an invalid amount of bits left
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-18 15:04:58 +01:00
Dr. Stephen Henson
f5e4b6b5b5
Reject invalid constructed encodings.
...
According to X6.90 null, object identifier, boolean, integer and enumerated
types can only have primitive encodings: return an error if any of
these are received with a constructed encoding.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-12-17 14:34:36 +00:00
Emilia Kasper
9ca2cc78a9
Add a comment noting the padding oracle.
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit 03af843039 )
2014-12-17 14:55:47 +01:00
Emilia Kasper
0cf552230e
Revert "RT3425: constant-time evp_enc"
...
Causes more problems than it fixes: even though error codes
are not part of the stable API, several users rely on the
specific error code, and the change breaks them. Conversely,
we don't have any concrete use-cases for constant-time behaviour here.
This reverts commit 738911cde6 .
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-12-17 14:55:39 +01:00
Emilia Kasper
0e1c318ece
Build fixes
...
Various build fixes, mostly uncovered by clang's unused-const-variable
and unused-function errors.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-12-17 14:27:49 +01:00
Richard Levitte
8bc8450a26
Clear warnings/errors within RL_DEBUG code sections (RL_DEBUG should be renamed)
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-12-17 14:17:54 +01:00
Richard Levitte
bf68456f53
Clear warnings/errors within TLS_DEBUG code sections
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-12-17 14:17:54 +01:00
Richard Levitte
53332a75d1
Clear warnings/errors within KSSL_DEBUG code sections
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-12-17 14:17:54 +01:00
Richard Levitte
cd387d21da
Clear warnings/errors within CIPHER_DEBUG code sections
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-12-17 14:17:54 +01:00
Richard Levitte
0c403e80a9
Clear warnings/errors within CIPHER_DEBUG code sections
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-12-17 14:17:54 +01:00
Richard Levitte
553affbef7
Clear warnings/errors within BN_CTX_DEBUG code sections
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-12-17 14:17:54 +01:00
Adam Langley
1ecfb67335
Premaster secret handling fixes
...
From BoringSSL
- Send an alert when the client key exchange isn't correctly formatted.
- Reject overly short RSA ciphertexts to avoid a (benign) out-of-bounds memory access.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
(cherry picked from commit 4aecfd4d9f )
2014-12-17 14:03:43 +01:00
Bodo Möller
bb565cd29e
Backport regression test
...
master branch has a specific regression test for a bug in x86_64-mont5 code,
see commit cdfe0fdde6 .
This code is now in 1.0.2/1.0.1, so also backport the test.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-17 12:00:17 +01:00
Emilia Kasper
a43bcd9e96
Check for invalid divisors in BN_div.
...
Invalid zero-padding in the divisor could cause a division by 0.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-17 10:00:17 +01:00
Dr. Stephen Henson
c8667a2e46
Check return value of ssl3_output_cert_chain
...
(cherry picked from commit 66f96fe2d5 )
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-16 15:01:29 +00:00
Matt Caswell
5ee441162e
The dtls1_output_cert_chain function no longer exists so remove it from
...
ssl_locl.h
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-16 15:01:11 +00:00
Adam Langley
63ef0db60f
Don't set client_version to the ServerHello version.
...
The client_version needs to be preserved for the RSA key exchange.
This change also means that renegotiation will, like TLS, repeat the old
client_version rather than advertise only the final version. (Either way,
version change on renego is not allowed.) This is necessary in TLS to work
around an SChannel bug, but it's not strictly necessary in DTLS.
(From BoringSSL)
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit ec1af3c419 )
2014-12-16 14:46:57 +00:00
Matt Caswell
f74f5c8586
Add more meaningful OPENSSL_NO_ECDH error message for suite b mode
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit db812f2d70 )
2014-12-16 14:17:32 +00:00
Matt Caswell
a38ae11c48
Add OPENSSL_NO_ECDH guards
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit af6e2d51bf )
2014-12-16 14:17:12 +00:00
Matt Caswell
4ca0e95b92
Remove extraneous white space, and add some braces
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 55e530265a )
2014-12-16 00:13:36 +00:00
Matt Caswell
f9398b92de
DTLS fixes for signed/unsigned issues
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 1904d21123 )
2014-12-16 00:13:36 +00:00
Emilia Kasper
6af16ec5ee
Fix unused variable warning
...
The temporary variable causes unused variable warnings in opt mode with clang,
because the subsequent assert is compiled out.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-12-15 13:15:30 +01:00
Matt Caswell
d04a1e0b5b
Fix memory leak in s2_srvr.c if BUF_MEM_grow fails
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-12-13 00:04:32 +00:00
Matt Caswell
bb1ddd3d9a
Fixed memory leak if BUF_MEM_grow fails
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-12-13 00:03:58 +00:00
Matt Caswell
6806b69084
Fixed memory leak in the event of a failure of BUF_MEM_grow
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit 41bf250130 )
2014-12-08 16:44:09 +00:00
Matt Caswell
9809ab965b
Fix memory leak in SSL_new if errors occur.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit 76e6509085 )
2014-12-08 16:44:09 +00:00
Emilia Kasper
bd34823e55
Clarify the return values for SSL_get_shared_curve.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 376e2ca3e3 )
2014-12-05 18:31:57 +01:00
Emilia Kasper
533814c6b5
Add extra checks for odd-length EC curve lists.
...
Odd-length lists should be rejected everywhere upon parsing. Nevertheless,
be extra careful and add guards against off-by-one reads.
Also, drive-by replace inexplicable double-negation with an explicit comparison.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-05 18:24:54 +01:00
Emilia Kasper
b32474a40b
Make 'make update' succeed and run it
...
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2014-12-05 18:20:51 +01:00
Emilia Kasper
f6e725e868
Reject elliptic curve lists of odd lengths.
...
The Supported Elliptic Curves extension contains a vector of NamedCurves
of 2 bytes each, so the total length must be even. Accepting odd-length
lists was observed to lead to a non-exploitable one-byte out-of-bounds
read in the latest development branches (1.0.2 and master). Released
versions of OpenSSL are not affected.
Thanks to Felix Groebert of the Google Security Team for reporting this issue.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 33d5ba8629 )
2014-12-05 16:44:12 +01:00
Richard Levitte
7005eda3b6
s_client and s_server take -verify_{host,email,ip}, not -check*
...
RT3596
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-04 23:16:38 +01:00
Matt Caswell
9a6e994240
Remove incorrect code inadvertently introduced through commit 59669b6ab.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-04 14:18:45 +00:00
Matt Caswell
0b3c13092c
Remove "#if 0" code
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 4bb8eb9ce4 )
2014-12-03 09:31:39 +00:00
Matt Caswell
dfa2762bba
Only use the fallback mtu after 2 unsuccessful retransmissions if it is less
...
than the mtu we are already using
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 047f21593e )
2014-12-03 09:31:39 +00:00
Matt Caswell
c0b90b3237
Updates to s_client and s_server to remove the constant 28 (for IPv4 header
...
and UDP header) when setting an mtu. This constant is not always correct (e.g.
if using IPv6). Use the new DTLS_CTRL functions instead.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 464ce92026 )
2014-12-03 09:31:39 +00:00
Matt Caswell
788a5bad17
If we really get a situation where the underlying mtu is less than the minimum
...
we will support then dtls1_do_write can go into an infinite loop. This commit
fixes that.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit d3d9eef316 )
2014-12-03 09:31:39 +00:00
Matt Caswell
1872083ca1
Fix dtls_query_mtu so that it will always either complete with an mtu that is
...
at least the minimum or it will fail.
There were some instances in dtls1_query_mtu where the final mtu can end up
being less than the minimum, i.e. where the user has set an mtu manually. This
shouldn't be allowed. Also remove dtls1_guess_mtu that, despite having
logic for guessing an mtu, was actually only ever used to work out the minimum
mtu to use.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 1620a2e49c )
2014-12-03 09:31:39 +00:00
Matt Caswell
05e769f269
Remove instances in libssl of the constant 28 (for size of IPv4 header + UDP)
...
and instead use the value provided by the underlying BIO. Also provide some
new DTLS_CTRLs so that the library user can set the mtu without needing to
know this constant. These new DTLS_CTRLs provide the capability to set the
link level mtu to be used (i.e. including this IP/UDP overhead). The previous
DTLS_CTRLs required the library user to subtract this overhead first.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 59669b6abf )
Conflicts:
ssl/d1_both.c
2014-12-03 09:31:35 +00:00
Matt Caswell
ccecdb130c
There are a number of instances throughout the code where the constant 28 is
...
used with no explanation. Some of this was introduced as part of RT#1929. The
value 28 is the length of the IP header (20 bytes) plus the UDP header (8
bytes). However use of this constant is incorrect because there may be
instances where a different value is needed, e.g. an IPv4 header is 20 bytes
but an IPv6 header is 40. Similarly you may not be using UDP (e.g. SCTP).
This commit introduces a new BIO_CTRL that provides the value to be used for
this mtu "overhead". It will be used by subsequent commits.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 0d3ae34df5 )
2014-12-03 09:30:21 +00:00
Matt Caswell
80d09058af
The first call to query the mtu in dtls1_do_write correctly checks that the
...
mtu that we have received is not less than the minimum. If its less it uses the
minimum instead. The second call to query the mtu does not do that, but
instead uses whatever comes back. We have seen an instance in RT#3592 where we
have got an unreasonably small mtu come back. This commit makes both query
checks consistent.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 6abb0d1f8e )
2014-12-03 09:30:21 +00:00
Matt Caswell
3cc0c0d21c
The SSL_OP_NO_QUERY_MTU option is supposed to stop the mtu from being
...
automatically updated, and we should use the one provided instead.
Unfortunately there are a couple of locations where this is not respected.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 001235778a )
2014-12-03 09:30:21 +00:00
Matt Caswell
5e47008b61
Verify that we have a sensible message len and fail if not
...
RT#3592 provides an instance where the OPENSSL_assert that this commit
replaces can be hit. I was able to recreate this issue by forcing the
underlying BIO to misbehave and come back with very small mtu values. This
happens the second time around the while loop after we have detected that the
MTU has been exceeded following the call to dtls1_write_bytes.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit cf75017bfd )
2014-12-03 09:30:21 +00:00
Kurt Roeckx
e9f47de1f0
Use the SSLv23 method by default
...
If SSLv2 and SSLv3 are both disabled we still support SSL/TLS.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-02 11:28:42 +01:00
Richard Levitte
6a7a4a4e19
Check for FindNextFile when defining it rather than FindFirstFile
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-28 23:31:28 +01:00
Richard Levitte
67a0ea702b
[PR3597] Advance to the next state variant when reusing messages.
...
Previously, state variant was not advanced, which resulted in state
being stuck in the st1 variant (usually "_A").
This broke certificate callback retry logic when accepting connections
that were using SSLv2 ClientHello (hence reusing the message), because
their state never advanced to SSL3_ST_SR_CLNT_HELLO_C variant required
for the retry code path.
Reported by Yichun Zhang (agentzh).
Signed-off-by: Piotr Sikora <piotr@cloudflare.com >
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-28 23:31:28 +01:00
Richard Levitte
89e1e5c84d
Correct some layout issues, convert all remaining tabs to appropriate amounts of spaces.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 8123d158ab )
2014-11-28 17:04:15 +01:00
Alok Menghrajani
7cae6eeed0
Improves the proxy certificates howto doc.
...
The current documentation contains a bunch of spelling and grammar mistakes. I also
found it hard to understand some paragraphs, so here is my attempt to improve its
readability.
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 03b637a730 )
2014-11-28 17:04:15 +01:00
Matt Caswell
4b12a17fe3
Fix warning in ssl2_enc
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit f9ea4deba0 )
2014-11-27 21:46:04 +00:00
Matt Caswell
2e524475cd
Remove more references to dtls1_enc
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit eceef8fb86 )
2014-11-27 21:46:04 +00:00
Matt Caswell
ac3dc3ee87
Check EVP_Cipher return values for SSL2
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit 81ec01b217 )
2014-11-27 21:46:04 +00:00
Matt Caswell
63039a177a
Delete unused file
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit 4b87706d20 )
Conflicts:
ssl/d1_enc.c
2014-11-27 21:46:00 +00:00
Matt Caswell
ca88bd4112
Add checks to the return value of EVP_Cipher to prevent silent encryption failure.
...
PR#1767
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit fe78f08d15 )
2014-11-27 21:44:03 +00:00
Matt Caswell
1e7b4891cb
Remove redundant checks in ssl_cert_dup. This was causing spurious error messages when using GOST
...
PR#3613
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit fc3968a25c )
2014-11-27 20:51:59 +00:00
Matt Caswell
3623e24b45
Remove duplicated code
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-27 14:30:36 +00:00
Matt Caswell
e164582690
Tidy up ocsp help output
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 5e31a40f47 )
Conflicts:
apps/ocsp.c
2014-11-27 14:16:49 +00:00
André Guerreiro
4d3df37bc7
Add documentation on -timeout option in the ocsp utility
...
PR#3612
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit de87dd46c1 )
2014-11-27 14:14:52 +00:00
Guenter
261e64b85e
NetWare compilation fix.
...
Workaround for NetWare CodeWarrior compiler which doesn't properly lookup
includes when in same directory as the C file which includes it.
PR#3569
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit 333fad9f2d )
2014-11-27 14:03:57 +00:00
Matt Caswell
23cf88440c
Updates to X509_NAME_get_index_by_NID.pod submitted by user Bernardh via the wiki
...
Minor changes made by Matt Caswell
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 6484958645 )
2014-11-27 13:57:11 +00:00
Matt Caswell
bd8192604a
Updates to X509_NAME_add_entry_by_txt.pod submitted by user Bernardh via the wiki
...
Minor changes made by Matt Caswell.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit f281b8df70 )
2014-11-27 13:57:11 +00:00
Matt Caswell
8f8e7cec83
Updates to EVP_PKEY_encrypt.pod submitted by user Bernardh via the wiki
...
Minor changes made by Matt Caswell.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 34890ac18e )
2014-11-27 13:57:11 +00:00
Matt Caswell
14332e4331
Add include of ssl.h which is required by srtp.h
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit f67203836c )
2014-11-27 13:17:56 +00:00
Matt Caswell
60de554e4f
Fixed memory leak due to incorrect freeing of DTLS reassembly bit mask
...
PR#3608
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 8a35dbb6d8 )
2014-11-26 10:11:25 +00:00
Matt Caswell
c57400e86c
Corrected comments in ssl.h about SSLv23_method and friends
...
PR#3574
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 3a0765882c )
2014-11-25 22:24:34 +00:00
Dr. Stephen Henson
f90fd2b017
Print out Suite B status.
...
When using the -xcert option to test certificate validity print out
if we pass Suite B compliance. We print out "not tested" if we aren't
in Suite B mode.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 7d4cdededc )
2014-11-20 22:14:45 +00:00
Dr. Stephen Henson
8d325d1d36
Fix SuiteB chain checking logic.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 7255ca99df )
2014-11-20 22:14:29 +00:00
David Benjamin
03d14f5887
Do not resume a session if the negotiated protocol version does not match
...
the session's version (server).
See also BoringSSL's commit bdf5e72f50e25f0e45e825c156168766d8442dde.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 9e189b9dc1 )
2014-11-20 16:31:35 +01:00
Matt Caswell
6f71d7da64
When using EVP_PKEY_derive with a KDF set, a negative error from
...
ECDH_compute_key is silently ignored and the KDF is run on duff data
Thanks to github user tomykaira for the suggested fix.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 8d02bebddf )
2014-11-20 15:21:37 +00:00
Emilia Kasper
0b9e82763f
Clean up CHANGES
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 31832e8ff1 )
Conflicts:
CHANGES
2014-11-20 15:19:42 +01:00
Emilia Kasper
e5f261df73
Ensure SSL3_FLAGS_CCS_OK (or d1->change_cipher_spec_ok for DTLS) is reset
...
once the ChangeCipherSpec message is received. Previously, the server would
set the flag once at SSL3_ST_SR_CERT_VRFY and again at SSL3_ST_SR_FINISHED.
This would allow a second CCS to arrive and would corrupt the server state.
(Because the first CCS would latch the correct keys and subsequent CCS
messages would have to be encrypted, a MitM attacker cannot exploit this,
though.)
Thanks to Joeri de Ruiter for reporting this issue.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit e94a6c0ede )
2014-11-20 15:17:36 +01:00
Emilia Kasper
9baee0216f
Always require an advertised NewSessionTicket message.
...
The server must send a NewSessionTicket message if it advertised one
in the ServerHello, so make a missing ticket message an alert
in the client.
An equivalent change was independently made in BoringSSL, see commit
6444287806d801b9a45baf1f6f02a0e3a16e144c.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit de2c7504eb )
2014-11-20 15:17:36 +01:00
Emilia Kasper
5d23e1303c
Remove ssl3_check_finished.
...
The client sends a session ID with the session ticket, and uses
the returned ID to detect resumption, so we do not need to peek
at handshake messages: s->hit tells us explicitly if we're resuming.
An equivalent change was independently made in BoringSSL, see commit
407886f589cf2dbaed82db0a44173036c3bc3317.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 980bc1ec61 )
Conflicts:
ssl/s3_clnt.c
2014-11-20 15:17:30 +01:00
Emilia Kasper
f7c7aa69f7
Set s->hit when resuming from external pre-shared secret.
...
The same change was independently made in BoringSSL, see commit
9eaeef81fa2d4fd6246dc02b6203fa936a5eaf67
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 7b3ba508af )
2014-11-20 15:09:45 +01:00
Emilia Kasper
ce5f32cfa7
Reset s->tlsext_ticket_expected in ssl_scan_serverhello_tlsext.
...
This ensures that it's zeroed even if the SSL object is reused
(as in ssltest.c). It also ensures that it applies to DTLS, too.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit a06cd5d056 )
2014-11-20 15:09:45 +01:00
Matt Caswell
5891c226d8
Fix s_server -ssl2. Previously this reported "Error setting EC curve"
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 13d568661c )
2014-11-19 23:57:02 +00:00
Dr. Stephen Henson
017a15cbd2
New option no-ssl3-method which removes SSLv3_*method
...
When no-ssl3 is set only make SSLv3 disabled by default. Retain -ssl3
options for s_client/s_server/ssltest.
When no-ssl3-method is set SSLv3_*method() is removed and all -ssl3
options.
We should document this somewhere, e.g. wiki, FAQ or manual page.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 3881d8106d )
2014-11-19 22:54:30 +00:00
Dr. Stephen Henson
786370b1b0
Fix excert logic.
...
If no keyfile has been specified use the certificate file instead.
Fix typo: we need to check the chain is not NULL, not the chain file.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-19 22:50:00 +00:00
Dr. Stephen Henson
56e8dc542b
Process signature algorithms before deciding on certificate.
...
The supported signature algorithms extension needs to be processed before
the certificate to use is decided and before a cipher is selected (as the
set of shared signature algorithms supported may impact the choice).
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-19 14:44:42 +00:00
Matt Caswell
9ef1d283fe
Added RFC 7027 references
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-18 13:10:41 +00:00
Matt Caswell
5a4a949904
Fixed cms-test.pl for no-ec2m
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-18 13:10:23 +00:00
Matt Caswell
ffa69c1ced
Added OPENSSL_NO_EC2M guards around the default EC curves
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-18 13:10:01 +00:00
Jan Hykel
305e2b4111
Don't use msg on error.
...
Don't attempt to access msg structure if recvmsg returns an error.
PR#3483
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 012aa9ec76 )
2014-11-17 12:41:47 +00:00
Dr. Stephen Henson
ba7aaa5622
Fix cross reference table generator.
...
If the hash or public key algorithm is "undef" the signature type
will receive special handling and shouldn't be included in the
cross reference table.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 55f7fb8848 )
2014-11-13 13:35:25 +00:00
Alok Menghrajani
2ad842b86a
Fixes a minor typo in the EVP docs.
...
Out is the buffer which needs to contain at least inl + cipher_block_size - 1 bytes. Outl
is just an int*.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 5211e094de )
2014-11-12 21:05:01 +00:00
Michal Bozon
297a8fd4ac
Correct timestamp output when clock_precision_digits > 0
...
PR#3535
Reviewed-by: Stephen Henson <steve@openssl.org >
2014-11-12 20:52:52 +00:00
Matt Caswell
5b3a5e3e90
Fix free of garbage pointer. PR#3595
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit e04d426bf9 )
2014-11-12 20:29:27 +00:00
Kurt Roeckx
40e214a23b
Fix warning about negative unsigned intergers
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-11-11 15:47:54 +01:00
Russell Coker
39679d858a
Fix datarace reported by valgrind/helgrind
...
This doesn't really fix the datarace but changes it so it can only happens
once. This isn't really a problem since we always just set it to the same
value. We now just stop writing it after the first time.
PR3584, https://bugs.debian.org/534534
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-11-10 18:35:50 +01:00
Daniel Kahn Gillmor
0ec6898c67
Allow ECDHE and DHE as forward-compatible aliases for EECDH and EDH
...
see RT #3203
Future versions of OpenSSL use the canonical terms "ECDHE" and "DHE"
as configuration strings and compilation constants. This patch
introduces aliases so that the stable 1.0.2 branch can be
forward-compatible with code and configuration scripts that use the
normalized terms, while avoiding changing any library output for
stable users.
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-10 10:58:49 +01:00
Andy Polyakov
1e10aee2a7
armv4cpuid.S: fix compilation error in pre-ARMv7 build.
...
PR: 3474
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
(cherry picked from commit 6696203963 )
2014-10-30 20:31:50 +01:00
Andy Polyakov
34a136d90f
md32_common.h: address compiler warning in HOST_c2l.
...
Reviewed-by: Stephen Henson <steve@openssl.org >
(cherry picked from commit d45282fc7c )
2014-10-29 10:55:15 +01:00
Samuel Neves
42af669ff2
Use only unsigned arithmetic in constant-time operations
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-10-28 20:42:22 +01:00
Emilia Kasper
4c75f4e5ca
Tighten session ticket handling
...
Tighten client-side session ticket handling during renegotiation:
ensure that the client only accepts a session ticket if the server sends
the extension anew in the ServerHello. Previously, a TLS client would
reuse the old extension state and thus accept a session ticket if one was
announced in the initial ServerHello.
Reviewed-by: Bodo Moeller <bodo@openssl.org >
(cherry picked from commit d663df2399 )
2014-10-28 17:38:23 +01:00
Emilia Kasper
1380317483
Sync CHANGES
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-10-27 17:52:15 +01:00
Emilia Kasper
a35f7adf5c
Fix ssltest logic when some protocols are compiled out.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
(cherry picked from commit fd28a41ec8 )
Conflicts:
ssl/ssltest.c
2014-10-27 16:33:28 +01:00
Dr. Stephen Henson
1ce95f1960
Copy negotiated parameters in SSL_set_SSL_CTX.
...
SSL_set_SSL_CTX is used to change the SSL_CTX for SNI, keep the
supported signature algorithms and raw cipherlist.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 14e14bf696 )
2014-10-24 14:01:01 +01:00
Dr. Stephen Henson
51695b98f1
Process signature algorithms in ClientHello late.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit c800c27a8c )
Conflicts:
ssl/ssl.h
ssl/ssl_err.c
ssl/ssl_locl.h
2014-10-24 13:57:23 +01:00
Dr. Stephen Henson
82182413a4
Parse custom extensions after SNI.
...
Since SNI will typically switch the SSL_CTX structure to the one
corresponding to the appopriate server we need to parse custom
extensions using the switched SSL_CTX not the original one. This
is done by parsing custom extensions *after* SNI.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-10-23 14:45:30 +01:00
Andy Polyakov
0ce2dbfb5b
Add missing credit.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 9f4bd9d5f9 )
2014-10-22 09:38:40 +02:00
Bodo Moeller
981545e1e7
Fix and improve SSL_MODE_SEND_FALLBACK_SCSV documentation.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-10-21 22:39:26 +02:00
Bodo Moeller
d60de314f4
When processing ClientHello.cipher_suites, don't ignore cipher suites
...
listed after TLS_FALLBACK_SCSV.
RT: 3575
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2014-10-21 22:32:09 +02:00
Kurt Roeckx
b6ece4c1fc
Keep old method in case of an unsupported protocol
...
When we're configured with no-ssl3 and we receive an SSL v3 Client Hello, we set
the method to NULL. We didn't used to do that, and it breaks things. This is a
regression introduced in 62f45cc27d . Keep the old
method since the code is not able to deal with a NULL method at this time.
CVE-2014-3569, PR#3571
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 392fa7a952 )
2014-10-21 21:04:09 +02:00
Tim Hudson
bb086221dd
no-ssl2 with no-ssl3 does not mean drop the ssl lib
...
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
(cherry picked from commit c882abd522 )
2014-10-20 15:26:16 +10:00
Kurt Cancemi
b4b8969df8
RT3547: Add missing static qualifier
...
Reviewed-by: Ben Laurie <ben@openssl.org >
(cherry picked from commit 87d388c955 )
2014-10-17 11:48:32 +02:00
Matt Caswell
010d37621d
Updates to NEWS file
...
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2014-10-15 08:54:27 -04:00
Matt Caswell
84d4f99d31
Updates to CHANGES file
...
Reviewed-by: Bodo Möller <bodo@openssl.org >
2014-10-15 08:54:26 -04:00
Geoff Thorpe
82180dcc0a
Fix no-ssl3 configuration option
...
CVE-2014-3568
Reviewed-by: Emilia Kasper <emilia@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-10-15 08:54:26 -04:00
Dr. Stephen Henson
c2b90b398d
Fix for session tickets memory leak.
...
CVE-2014-3567
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 5dc6070a03779cd524f0e67f76c945cb0ac38320)
2014-10-15 08:54:26 -04:00
Matt Caswell
c2a2ff3f0a
Fix SRTP compile issues for windows
...
Related to CVE-2014-3513
This fix was developed by the OpenSSL Team
Reviewed-by: Tim Hudson <tjh@openssl.org >
Conflicts:
util/mkdef.pl
util/ssleay.num
Conflicts:
util/mkdef.pl
2014-10-15 08:54:26 -04:00
Matt Caswell
d64b6c980c
Fix for SRTP Memory Leak
...
CVE-2014-3513
This issue was reported to OpenSSL on 26th September 2014, based on an original
issue and patch developed by the LibreSSL project. Further analysis of the issue
was performed by the OpenSSL team.
The fix was developed by the OpenSSL team.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-10-15 08:54:26 -04:00
Bodo Moeller
05df9b9ae5
Fix SSL_R naming inconsistency.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-10-15 14:48:00 +02:00
Andy Polyakov
3e3cc471c2
aesni-x86_64.pl: make ECB subroutine Windows ABI compliant.
...
RT: 3553
Reviewed-by: Emilia Kasper <emilia@openssl.org >
(cherry picked from commit 69d5747f90 )
2014-10-15 11:12:24 +02:00
Bodo Moeller
80fb4820cb
Add TLS_FALLBACK_SCSV documentation, and move s_client -fallback_scsv
...
handling out of #ifndef OPENSSL_NO_DTLS1 section.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-10-15 10:50:53 +02:00
Bodo Moeller
2229fe5b94
Oop: revert unintentional change committed along with
...
TLS_FALLBACK_SCSV support, restoring a reviewed state instead.
Reviewed-by: Stephen Henson (steve@openssl.org )
2014-10-15 04:50:13 +02:00
Bodo Moeller
a46c705214
Support TLS_FALLBACK_SCSV.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-10-15 04:04:55 +02:00
Matt Caswell
dc7bca8bcc
Removed duplicate definition of PKCS7_type_is_encrypted
...
Patch supplied by Matthieu Patou <mat@matws.net >, and modified to also
remove duplicate definition of PKCS7_type_is_digest.
PR#3551
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit e0fdea3e49 )
2014-10-06 23:43:49 +01:00
Ben Laurie
f58cfe0422
Fix single makefile.
...
Reviewed-by: Geoffrey Thorpe <geoff@geoffthorpe.net >
2014-10-06 18:06:18 +01:00
Rich Salz
20d1c8111f
RT3462: Document actions when data==NULL
...
If data is NULL, return the size needed to hold the
derived key. No other API to do this, so document
the behavior.
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit 5aed169305 )
2014-10-03 10:39:32 -04:00
Bodo Moeller
c578fe37d9
DTLS 1.2 support has been added to 1.0.2.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-10-02 17:58:10 +02:00
Rich Salz
a4ee5bbc77
RT2309: Fix podpage MMNNFFPPS->MNNFFPPS
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 9208640a36 )
2014-09-30 16:31:44 -04:00
Andy Polyakov
8ad9050318
e_os.h: refine inline override logic (to address warnings in debug build).
...
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
(cherry picked from commit 55c7a4cf11 )
2014-09-30 21:07:59 +02:00
Dr. Stephen Henson
5df07a7210
Add additional DigestInfo checks.
...
Reencode DigestInto in DER and check against the original: this
will reject any improperly encoded DigestInfo structures.
Note: this is a precautionary measure, there is no known attack
which can exploit this.
Thanks to Brian Smith for reporting this issue.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-29 12:24:04 +01:00
Matt Caswell
0853b2c5e4
Prepare for 1.0.2-beta4-dev
...
Reviewed-by: Stephen Henson <steve@openssl.org >
2014-09-25 21:35:35 +01:00
Matt Caswell
2c5db8dac3
Prepare for 1.0.2-beta3 release
...
Reviewed-by: Stephen Henson <steve@openssl.org >
2014-09-25 21:31:40 +01:00
Matt Caswell
bffd5a7f35
make update
...
Reviewed-by: Stephen Henson <steve@openssl.org >
2014-09-25 21:31:40 +01:00
Matt Caswell
5e60396fe7
Added 1.0.1i CHANGES and NEWS updates
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-25 21:29:25 +01:00
Emilia Kasper
0d6a11a91f
Add missing tests
...
Accidentally omitted from commit 455b65dfab
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
(cherry picked from commit fdc35a9d3e )
2014-09-25 13:46:55 +02:00
Tim Hudson
f9fac6163e
Add constant_time_locl.h to HEADERS,
...
so the Win32 compile picks it up correctly.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-09-25 08:08:51 +02:00
Richard Levitte
ef8055cbb7
Add the constant time test to the VMS build and tests
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-25 08:07:54 +02:00
Richard Levitte
3b7ab6f4b8
Include "constant_time_locl.h" rather than "../constant_time_locl.h".
...
The different -I compiler parameters will take care of the rest...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-25 08:06:47 +02:00
Dr. Stephen Henson
3b4a761853
Don't allow non-FIPS curves in FIPS mode.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-25 00:20:56 +01:00
Dr. Stephen Henson
255401756d
Use correct function name: CMS_add1_signer()
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 5886354dcc )
2014-09-25 00:06:46 +01:00
Andy Polyakov
ec65b83d65
crypto/bn/bn_nist.c: work around MSC ARM compiler bug.
...
RT: 3541
Reviewed-by: Emilia Kasper <emilia@openssl.org >
(cherry picked from commit 8b07c005fe )
2014-09-25 00:46:45 +02:00
Andy Polyakov
d169bf9cab
e_os.h: allow inline functions to be compiled by legacy compilers.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 40155f4089 )
2014-09-25 00:36:10 +02:00
Emilia Kasper
738911cde6
RT3425: constant-time evp_enc
...
Do the final padding check in EVP_DecryptFinal_ex in constant time to
avoid a timing leak from padding failure.
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 4aac102f75 )
Conflicts:
crypto/evp/evp_enc.c
2014-09-24 16:25:04 +02:00
Emilia Kasper
e1080ea3c7
RT3067: simplify patch
...
(Original commit adb46dbc6d )
Use the new constant-time methods consistently in s3_srvr.c
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
(cherry picked from commit 455b65dfab )
2014-09-24 15:54:51 +02:00
Adam Langley
941af48fec
This change alters the processing of invalid, RSA pre-master secrets so
...
that bad encryptions are treated like random session keys in constant
time.
(cherry picked from commit adb46dbc6d )
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-09-24 15:42:43 +02:00
Emilia Kasper
9bed73adaa
RT3066: rewrite RSA padding checks to be slightly more constant time.
...
Also tweak s3_cbc.c to use new constant-time methods.
Also fix memory leaks from internal errors in RSA_padding_check_PKCS1_OAEP_mgf1
This patch is based on the original RT submission by Adam Langley <agl@chromium.org >,
as well as code from BoringSSL and OpenSSL.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
Conflicts:
crypto/rsa/rsa_oaep.c
crypto/rsa/rsa_pk1.c
ssl/s3_cbc.c
2014-09-24 12:47:19 +02:00
Emilia Kasper
e9128d9401
Note i2d_re_X509_tbs and related changes in CHANGES
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-23 18:26:42 +02:00
Emilia Kasper
972868b23d
make update
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-09-23 18:20:26 +02:00
Emilia Kasper
e774a3055b
Add i2d_re_X509_tbs
...
i2d_re_X509_tbs re-encodes the TBS portion of the certificate.
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
(cherry picked from commit 95b1752cc7 )
2014-09-23 18:20:26 +02:00
Emilia Kasper
d9f99d4ef3
Revert "Add accessor for x509.cert_info."
...
This reverts commit 519ad9b384 .
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-09-23 18:20:26 +02:00
Emilia Kasper
6ce2a64191
Revert "Add more accessors."
...
This reverts commit cacdfcb247 .
Conflicts:
crypto/x509/x509.h
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-09-23 18:20:26 +02:00
Andy Polyakov
d2a1226b81
CHANGES: mention ECP_NISTZ256.
...
Reviewed-by: Bodo Moeller <bodo@openssl.org >
(cherry picked from commit 507efe7372 )
2014-09-23 14:56:46 +02:00
Andy Polyakov
9fa9370b6f
crypto/ecp_nistz256.c: harmonize error codes.
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit be07ae9b10 )
2014-09-22 00:11:04 +02:00
Dr. Stephen Henson
12f14b1d8f
Fix warning.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 16e5b45f72 )
2014-09-22 00:10:53 +02:00
Andy Polyakov
27918b7c25
crypto/ec: harmonize new code with FIPS module.
...
RT: 3149
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-22 00:07:44 +02:00
Andy Polyakov
2e31c47adb
Configure: engage ECP_NISTZ256.
...
RT: 3149
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 847147908b )
Resolved conflicts:
Configure
TABLE
2014-09-22 00:07:44 +02:00
Andy Polyakov
3842a64d36
Add ECP_NISTZ256 by Shay Gueron, Intel Corp.
...
RT: 3149
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 4d3fa06fce )
2014-09-22 00:07:44 +02:00
Andy Polyakov
8aed2a7548
Reserve option to use BN_mod_exp_mont_consttime in ECDSA.
...
Submitted by Shay Gueron, Intel Corp.
RT: 3149
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit f54be179aa )
2014-09-22 00:07:44 +02:00
Andy Polyakov
f7835e1c20
perlasm/x86_64-xlate.pl: handle inter-bank movd.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 902b30df19 )
2014-09-22 00:07:44 +02:00
Andy Polyakov
11d8abb331
Configure: add configuration for crypto/ec/asm extensions.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 6019cdd327 )
Resolved conflicts:
Configure
Makefile.org
TABLE
2014-09-22 00:07:44 +02:00
Tim Hudson
320d949781
Fixed error introduced in commit f2be92b94d
...
that fixed PR#3450 where an existing cast masked an issue when i was changed
from int to long in that commit
Picked up on z/linux (s390) where sizeof(int)!=sizeof(long)
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit b5ff559ff9 )
2014-09-22 06:35:57 +10:00
Andy Polyakov
dfb5de6fc0
Harmonize Tru64 and Linux make rules.
...
RT: 3333,3165
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit d475b2a3bf )
2014-09-20 10:22:13 +02:00
Jake Goulding
5015a93ded
RT2301: GetDIBits, not GetBitmapBits in rand_win
...
GetDIBits has been around since Windows2000 and
BitBitmapBits is an old Win16 compatibility function
that is much slower.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 99b00fd993 )
2014-09-18 16:42:07 -04:00
Rich Salz
478b3470ff
RT2772 update: c_rehash was broken
...
Move the readdir() lines out of the if statement, so
that flist is available globally.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 6f46c3c3b0 )
2014-09-11 13:09:56 -04:00
Rich Salz
3258429883
RT3271 update; extra; semi-colon; confuses; some;
...
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
(cherry picked from commit cb4bb56bae )
2014-09-10 15:09:53 -04:00
Rich Salz
a9d928a8b6
RT2560: missing NULL check in ocsp_req_find_signer
...
If we don't find a signer in the internal list, then fall
through and look at the internal list; don't just return NULL.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit b2aa38a980 )
2014-09-10 12:20:15 -04:00
Rich Salz
3aa2d2d08f
RT2196: Clear up some README wording
...
Say where to email bug reports.
Mention general RT tracker info in a separate paragraph.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 468ab1c20d )
2014-09-09 17:49:04 -04:00
Matt Caswell
f33ce36aff
RT3192: spurious error in DSA verify
...
This is funny; Ben commented in the source, Matt opend a ticket,
and Rich is doing the submit. Need more code-review? :)
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit eb63bce040 )
2014-09-09 17:10:57 -04:00
Rich Salz
e61c648fd6
RT3271: Don't use "if !" in shell lines
...
For portability don't use "if ! expr"
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit b999f66e34 )
2014-09-09 17:05:50 -04:00
Geoff Keating
8c0d19d857
RT1909: Omit version for v1 certificates
...
When calling X509_set_version to set v1 certificate, that
should mean that the version number field is omitted.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 1f18f50c4b )
2014-09-09 15:16:42 -04:00
Kurt Cancemi
283a8fd1aa
RT3506: typo's in ssltest
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 4eadd11cd9 )
2014-09-09 13:58:33 -04:00
Paul Suhler
b8d687bb56
RT2841: Extra return in check_issued
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 4cd1119df3 )
2014-09-08 18:50:40 -04:00
Kurt Roeckx
57c932dafd
RT2626: Change default_bits from 1K to 2K
...
This is a more comprehensive fix. It changes all
keygen apps to use 2K keys. It also changes the
default to use SHA256 not SHA1. This is from
Kurt's upstream Debian changes.
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
(cherry picked from commit 44e0c2bae4 )
2014-09-08 17:23:37 -04:00
Matthias Andree
ef720a67ab
RT2272: Add old-style hash to c_rehash
...
In addition to Matthias's change, I also added -n to
not remove links. And updated the manpage.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit a787c2590e )
2014-09-08 11:35:25 -04:00
Rich Salz
f28c48d07e
RT468: SSL_CTX_sess_set_cache_size wrong
...
The documentation is wrong about what happens when the
session cache fills up.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit e9edfc4196 )
2014-09-08 11:26:19 -04:00
Erik Auerswald
ff89be854e
RT3301: Discard too-long heartbeat requests
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit af4c6e348e )
2014-09-08 11:23:02 -04:00
Scott Schaefer
61a44b76a0
RT2518: fix pod2man errors
...
pod2man now complains when item tags are not sequential.
Also complains about missing =back and other tags.
Silence the warnings; most were already done.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit fe7573042f )
2014-09-08 11:18:58 -04:00
Rich Salz
45236ed6a4
RT3108: OPENSSL_NO_SOCK should imply OPENSSL_NO_DGRAM
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit be0bd11d69 )
2014-09-08 11:08:01 -04:00
Robin Lee
240635c0b2
RT3031: Need to #undef some names for win32
...
Copy the ifdef/undef stanza from x509.h to x509v3.h
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 83e4e03eeb )
2014-09-08 11:06:07 -04:00
Martin Olsson
610ac0525d
RT2843: Remove another spurious close-comment token
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 683cd7c948 )
2014-09-08 10:52:19 -04:00
Martin Olsson
9c096d0bbf
RT2842: Remove spurious close-comment marker.
...
Also, I (rsalz) changed "#ifdef undef" to "#if 0"
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 6b0dc6eff1 )
2014-09-08 10:50:33 -04:00
Rich Salz
1915744a64
Merge branch 'OpenSSL_1_0_2-stable' of git.openssl.org:openssl into OpenSSL_1_0_2-stable
...
another empty merge???
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-08 10:47:03 -04:00
Rich Salz
c387f7d0ea
Empty merge
...
Merge branch 'OpenSSL_1_0_2-stable' of git.openssl.org:openssl into OpenSSL_1_0_2-stable
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-08 10:45:53 -04:00
Rich Salz
eee95fc64f
Empty merge
...
Merge branch 'OpenSSL_1_0_2-stable' of git.openssl.org:openssl into OpenSSL_1_0_2-stable
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-08 10:45:31 -04:00
Rich Salz
dd3c21b2d2
RT1834: Fix PKCS7_verify return value
...
The function returns 0 or 1, only.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit b0e659cfac )
2014-09-08 10:43:32 -04:00
Rich Salz
dd13aadf9e
RT1832: Fix PKCS7_verify return value
...
The function returns 0 or 1, only.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit b0e659cfac )
2014-09-08 10:39:12 -04:00
Alon Bar-Lev
2a49fef28e
RT1771: Add string.h include.
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 8842987e5a )
2014-09-08 10:38:08 -04:00
Viktor Dkhovni
c56be26d9f
RT1325,2973: Add more extensions to c_rehash
...
Regexp was bracketed wrong.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 5a8addc432 )
2014-09-07 18:25:59 -04:00
Dr. Stephen Henson
2102c53caa
Add CHANGES entry for SCT viewer code.
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit b2774f6e17 )
2014-09-05 13:45:45 +01:00
Adam Langley
e12e875759
psk_client_callback, 128-byte id bug.
...
Fix a bug in handling of 128 byte long PSK identity in
psk_client_callback.
OpenSSL supports PSK identities of up to (and including) 128 bytes in
length. PSK identity is obtained via the psk_client_callback,
implementors of which are expected to provide a NULL-terminated
identity. However, the callback is invoked with only 128 bytes of
storage thus making it impossible to return a 128 byte long identity and
the required additional NULL byte.
This CL fixes the issue by passing in a 129 byte long buffer into the
psk_client_callback. As a safety precaution, this CL also zeroes out the
buffer before passing it into the callback, uses strnlen for obtaining
the length of the identity returned by the callback, and aborts the
handshake if the identity (without the NULL terminator) is longer than
128 bytes.
(Original patch amended to achieve strnlen in a different way.)
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit be0d851732 )
2014-09-05 12:22:33 +02:00
Adam Langley
0600a5cd49
Ensure that x**0 mod 1 = 0.
...
(cherry picked from commit 2b0180c37f )
Reviewed-by: Ben Laurie <ben@openssl.org >
2014-09-04 16:05:57 +02:00
Richard Levitte
a91b73fd29
Followup on RT3334 fix: make sure that a directory that's the empty
...
string returns 0 with errno = ENOENT.
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit 360928b7d0 )
2014-09-03 22:23:34 +02:00
Phil Mesnier
02c38e37a6
RT3334: Fix crypto/LPdir_win.c
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit 6a14fe7576 )
2014-09-03 22:23:34 +02:00
Clang via Jeffrey Walton
fa2ae04c40
RT3140: Possibly-unit variable in pem_lib.c
...
Can't really happen, but the flow of control isn't obvious.
Add an initializer.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 0ff3687eab )
2014-09-02 23:38:15 -04:00
Emilia Kasper
27739e9265
Make the inline const-time functions static.
...
"inline" without static is not correct as the compiler may choose to ignore it
and will then either emit an external definition, or expect one.
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
(cherry picked from commit 86f50b36e6 )
2014-09-02 15:24:54 +02:00
Adam Williamson
157c345175
RT3511: doc fix; req default serial is random
...
RT842, closed back in 2004, changed the default serial number
to be a random number rather than zero. Finally time to update
the doc
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 3aba132d61 )
2014-08-31 23:41:51 -04:00
Richard Levitte
770b98d02e
Add t1_ext and ssl_utst to the VMS build as well.
...
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2014-08-31 18:22:02 +02:00
TANABE Hiroyasu
8475416fe7
RT1325,2973: Add more extensions to c_rehash
...
Add .crt/.cer/.crl to the filenames parsed.
I also updated the podpage (since it didn't exist when
this ticket was first created, nor when it was re-created
seven years later).
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 80ec8d4e3e )
2014-08-31 00:37:54 -04:00
Andy Polyakov
30b7d5e1d8
md5-x86_64.pl: work around warning.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 4d86e8df6b )
2014-08-30 19:18:12 +02:00
Andy Polyakov
9dd6240201
x86[_64] assembly pack: add Silvermont performance data.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit b59f92e75d )
2014-08-30 19:14:49 +02:00
Rich Salz
63eacabb61
RT2820: case-insensitive filenames on Darwin
...
Andy pointed out there is also darwin64, so tweak the pattern.
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit 457f7b14ec )
2014-08-30 10:20:28 -04:00
Rich Salz
0996ccc077
Add tags/TAGS
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 9d6253cfd3 )
2014-08-30 10:09:01 -04:00
Rich Salz
6aa9dbab0f
RT2119,3407: Updated to dgst.pod
...
Re-order algorithm list.
Be consistent in command synopsis.
Add content about signing.
Add EXAMPLE section
Add some missing options: -r, -fips-fingerprint -non-fips-allow
Various other fixes.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-08-30 10:05:19 -04:00
James Westby
c1071ab4f1
RT1941: c_rehash.pod is missing
...
Add the file written by James Westby, graciously contributed
under the terms of the OpenSSL license.
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit cf2239b3b3 )
2014-08-30 09:51:36 -04:00
Rich Salz
5decce4db0
RT2379: Bug in BIO_set_accept_port.pod
...
The doc says that port can be "*" to mean any port.
That's wrong.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 07e3b31fae )
2014-08-29 16:46:16 -04:00
Jim Reid
12dabfc560
RT2880: HFS is case-insensitive filenames
...
Add Darwin to list of case-insensitive filenames when
installing manapges. When doing this, I noticed that
we weren't setting "filecase" for the HTML doc install.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 82d9185ae5 )
2014-08-29 16:39:38 -04:00
Dr. Stephen Henson
39d64e9351
update ordinals
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-28 18:24:14 +01:00
Dr. Stephen Henson
f9784baf0e
Fix comments, add new test.
...
Fix comments in ssltest.c: return value of 0 now means extension is
omitted and add_cb is not called for servers if the corresponding
extension is absent in ClientHello.
Test add_cb is not called if extension is not received.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit f47e203975 )
2014-08-28 18:10:21 +01:00
Dr. Stephen Henson
8fb57b29d6
Custom extension documentation.
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit f3f56c2a87 )
2014-08-28 18:10:21 +01:00
Dr. Stephen Henson
cf8d6c1000
Rename some callbacks, fix alignment.
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 0cfefe4b6d )
2014-08-28 18:10:21 +01:00
Dr. Stephen Henson
4164d631bb
Use consistent function naming.
...
Instead of SSL_CTX_set_custom_cli_ext and SSL_CTX_set_custom_srv_ext
use SSL_CTX_add_client_custom_ext and SSL_CTX_add_server_custom_ext.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 8cafe9e8bf )
2014-08-28 18:10:21 +01:00
Dr. Stephen Henson
46a1b9ef4f
New function SSL_extension_supported().
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit c846a5f567 )
2014-08-28 18:10:21 +01:00
Dr. Stephen Henson
6db2239c60
New extension callback features.
...
Support separate parse and add callback arguments.
Add new callback so an application can free extension data.
Change return value for send functions so < 0 is an error 0
omits extension and > 0 includes it. This is more consistent
with the behaviour of other functions in OpenSSL.
Modify parse_cb handling so <= 0 is an error.
Make SSL_CTX_set_custom_cli_ext and SSL_CTX_set_custom_cli_ext argument
order consistent.
NOTE: these changes WILL break existing code.
Remove (now inaccurate) in line documentation.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 33f653adf3 )
2014-08-28 18:10:21 +01:00
Dr. Stephen Henson
423ceb8319
Callback revision.
...
Use "parse" and "add" for function and callback names instead of
"first" and "second".
Change arguments to callback so the extension type is unsigned int
and the buffer length is size_t. Note: this *will* break existing code.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit de2a9e38f3 )
2014-08-28 18:10:21 +01:00
Dr. Stephen Henson
cd2e17020e
Remove serverinfo checks.
...
Since sanity checks are performed for all custom extensions the
serverinfo checks are no longer needed.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 707b026d78 )
Conflicts:
ssl/ssl3.h
ssl/t1_lib.c
2014-08-28 18:09:59 +01:00
Dr. Stephen Henson
9346c75cb8
Add custom extension sanity checks.
...
Reject attempts to use extensions handled internally.
Add flags to each extension structure to indicate if an extension
has been sent or received. Enforce RFC5246 compliance by rejecting
duplicate extensions and unsolicited extensions and only send a
server extension if we have sent the corresponding client extension.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 28ea0a0c6a )
2014-08-28 18:09:39 +01:00
Dr. Stephen Henson
0a4fe37fc6
Custom extension revision.
...
Use the same structure for client and server custom extensions.
Add utility functions in new file t1_ext.c.
Use new utility functions to handle custom server and client extensions
and remove a lot of code duplication.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit ecf4d66090 )
Conflicts:
ssl/ssl_lib.c
ssl/ssl_locl.h
ssl/t1_lib.c
2014-08-28 18:09:05 +01:00
Dr. Stephen Henson
da67a0ae34
Revision of custom extension code.
...
Move custom extension structures from SSL_CTX to CERT structure.
This change means the form can be revised in future without binary
compatibility issues. Also since CERT is part of SSL structures
so per-SSL custom extensions could be supported in future as well as
per SSL_CTX.
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit b83294fe30 )
Conflicts:
ssl/ssl.h
ssl/ssl_cert.c
ssl/ssl_locl.h
2014-08-28 17:06:50 +01:00
Emilia Kasper
9a9b0c0401
Constant-time utilities
...
Pull constant-time methods out to a separate header, add tests.
Reviewed-by: Bodo Moeller <bodo@openssl.org >
(cherry picked from commit 5a3d21c058 )
Conflicts:
ssl/s3_cbc.c
test/Makefile
2014-08-28 16:26:01 +02:00
Raphael Spreitzer
b85d461cdf
RT2400: ASN1_STRING_to_UTF8 missing initializer
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit f9fb43e176 )
2014-08-27 22:59:40 -04:00
Rich Salz
089f10e69e
RT2308: Add extern "C" { ... } wrapper
...
Add the wrapper to all public header files (Configure
generates one). Don't bother for those that are just
lists of #define's that do renaming.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Cherry-pick of commit 17e80c6bd0
2014-08-27 21:45:09 -04:00
Emilia Kasper
7f7c05ca63
Explicitly check for empty ASN.1 strings in d2i_ECPrivateKey
...
The old code implicitly relies on the ASN.1 code returning a \0-prefixed buffer
when the buffer length is 0. Change this to verify explicitly that the ASN.1 string
has positive length.
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
(cherry picked from commit 82dc08de54ce443c2a9ac478faffe79e76157795)
2014-08-27 19:50:15 +02:00
Matt Caswell
2083f7c465
RT3065: automatically generate a missing EC public key
...
When d2i_ECPrivateKey reads a private key with a missing (optional) public key,
generate one automatically from the group and private key.
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
(cherry picked from commit ed383f847156940e93f256fed78599873a4a9b28)
2014-08-27 19:50:15 +02:00
Adam Langley
1f2b943254
RT3065: ec_private_key_dont_crash
...
This change saves several EC routines from crashing when an EC_KEY is
missing a public key. The public key is optional in the EC private key
format and, without this patch, running the following through `openssl
ec` causes a crash:
-----BEGIN EC PRIVATE KEY-----
MBkCAQEECAECAwQFBgcIoAoGCCqGSM49AwEH
-----END EC PRIVATE KEY-----
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
(cherry picked from commit b391570bdeb386d4fd325917c248d593d3c43930)
2014-08-27 19:50:15 +02:00
Mihai Militaru
dc5c3d7370
RT2210: Add missing EVP_cleanup to example
...
I also removed some trailing whitespace and cleaned
up the "see also" list.
Reviewed-by: Emilia Kasper <emilia@openssl.org >
(cherry picked from commit 7b3e11c544 )
2014-08-27 13:25:36 -04:00
John Fitzgibbon
383f0e349f
RT2724: Remove extra declaration
...
Extra SSL_get_selected_srtp_profile() declaration in ssl/srtp.h
causes -Werror builds to fail.
Cherry-picked from 3609b02305
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-26 16:55:54 -04:00
David Gatwood
0a64a864b4
RT1744: SSL_CTX_set_dump_dh() doc feedback
...
The description of when the server creates a DH key is
confusing. This cleans it up.
(rsalz: also removed trailing whitespace.)
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
2014-08-26 13:38:27 -04:00
Jan Schaumann
dec128313b
RT1804: fix EXAMPLE in EVP_EncryptInit.pod
...
The EXAMPLE that used FILE and RC2 doesn't compile due to a
few minor errors. Tweak to use IDEA and AES-128. Remove
examples about RC2 and RC5.
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2014-08-25 10:26:17 -04:00
Matt Caswell
1d4f214eaf
Typo fixes to evp documentation.
...
This patch was submitted by user "Kox" via the wiki
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 2dd8cb3b95 )
2014-08-24 21:26:02 +01:00
Adam Langley
3aac17a82f
RT3060: Limit the number of empty records.
...
Limit the number of empty records that will be processed consecutively
in order to prevent ssl3_get_record from never returning.
Reported by "oftc_must_be_destroyed" and George Kadianakis.
Reviewed-by: Bodo Moeller <bodo@openssl.org >
2014-08-22 15:36:06 +02:00
Adam Langley
e19c93811f
RT3061: Don't SEGFAULT when trying to export a public DSA key as a private key.
...
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-22 15:21:12 +02:00
Emilia Kasper
108e907645
Improve EVP_PKEY_sign documentation
...
Clarify the intended use of EVP_PKEY_sign. Make the code example compile.
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
(cherry picked from commit d64c533a20 )
2014-08-22 15:05:55 +02:00
Emilia Kasper
8958be3946
define inline for Visual Studio
...
In Visual Studio, inline is available in C++ only, however __inline is available for C, see
http://msdn.microsoft.com/en-us/library/z8y1yy88.aspx
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
(cherry picked from commit f511b25a73 )
2014-08-21 16:07:44 +02:00
Emilia Kasper
ebf221ee25
Fix build when BSAES_ASM is defined but VPAES_ASM is not
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit da92be4d68 )
2014-08-21 15:48:10 +02:00
Andy Polyakov
ef90877721
bn/asm/rsaz-*.pl: allow spaces in Perl path name.
...
RT: 2835
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 15735e4f0e )
2014-08-21 00:19:24 +02:00
Andy Polyakov
a89adc148e
sha1-mb-x86_64.pl: add commentary.
...
Reviewed-by: Emilia Kasper <emilia@openssl.org >
(cherry picked from commit e608273a80 )
2014-08-21 00:16:32 +02:00
Andy Polyakov
b698c427de
crypto/evp/e_aes_cbc_hmac_sha[1|256].c: fix compiler warnings.
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 2893a302a9 )
2014-08-20 22:20:21 +02:00
Andy Polyakov
e99ac8b868
sha1-mb-x86_64.pl: fix typo.
...
Reviewed-by: Emilia Kasper <emilia@openssl.org >
(cherry picked from commit 55eb14da20 )
2014-08-20 22:12:50 +02:00
Matt Caswell
43312c624d
Fixed out-of-bounds read errors in ssl3_get_key_exchange.
...
PR#3450
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-15 23:28:52 +01:00
Istvan Noszticzius
beeb0fa7be
Fix use after free bug.
...
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 5afa57fb7b17aa51cfba1ffa94e900fc7a5f0e04)
2014-08-15 16:46:14 +01:00
Bodo Moeller
267e6f3cc0
Further improve/fix ec_GFp_simple_points_make_affine (ecp_smpl.c) and
...
group_order_tests (ectest.c). Also fix the EC_POINTs_mul documentation (ec.h).
Reviewed-by: emilia@openssl.org
2014-08-13 17:40:33 +02:00
Dr. Stephen Henson
5ed0b6ac0c
Fix SRP authentication ciphersuites.
...
The addition of SRP authentication needs to be checked in various places
to work properly. Specifically:
A certificate is not sent.
A certificate request must not be sent.
Server key exchange message must not contain a signature.
If appropriate SRP authentication ciphersuites should be chosen.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 8f5a8805b82d1ae81168b11b7f1506db9e047dec)
2014-08-09 00:09:14 +01:00
Dr. Stephen Henson
90a549ddfb
Test SRP authentication ciphersuites.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 193c1c07165b0042abd217274a084b49459d4443)
2014-08-09 00:09:01 +01:00
Dr. Stephen Henson
bc792813f0
Only use FIPS EC methods in FIPS mode.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 1433cac53c )
2014-08-07 02:11:53 +01:00
Dr. Stephen Henson
bb4c9ffd02
Check SRP parameters early.
...
Check SRP parameters when they are received so we can send back an
appropriate alert.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-08-06 20:41:53 +01:00
Dr. Stephen Henson
53348780e9
Fix SRP buffer overrun vulnerability.
...
Invalid parameters passed to the SRP code can be overrun an internal
buffer. Add sanity check that g, A, B < N to SRP code.
Thanks to Sean Devlin and Watson Ladd of Cryptography Services, NCC
Group for reporting this issue.
2014-08-06 20:41:24 +01:00
Dr. Stephen Henson
f338c2e0c2
Fix SRP ciphersuite DoS vulnerability.
...
If a client attempted to use an SRP ciphersuite and it had not been
set up correctly it would crash with a null pointer read. A malicious
server could exploit this in a DoS attack.
Thanks to Joonas Kuorilehto and Riku Hietamäki from Codenomicon
for reporting this issue.
CVE-2014-2970
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-06 20:41:24 +01:00
Gabor Tyukasz
92aa73bcbf
Fix race condition in ssl_parse_serverhello_tlsext
...
CVE-2014-3509
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-06 20:41:24 +01:00
Emilia Kasper
c01618dd82
Fix OID handling:
...
- Upon parsing, reject OIDs with invalid base-128 encoding.
- Always NUL-terminate the destination buffer in OBJ_obj2txt printing function.
CVE-2014-3508
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-06 20:41:24 +01:00
Emilia Käsper
1d7d0ed9c2
Fix DTLS anonymous EC(DH) denial of service
...
CVE-2014-3510
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-06 20:41:24 +01:00
David Benjamin
40a2200d89
Fix protocol downgrade bug in case of fragmented packets
...
CVE-2014-3511
Reviewed-by: Emilia Käsper <emilia@openssl.org >
Reviewed-by: Bodo Möller <bodo@openssl.org >
2014-08-06 20:41:24 +01:00
Adam Langley
d345a24569
Remove some duplicate DTLS code.
...
In a couple of functions, a sequence number would be calculated twice.
Additionally, in |dtls1_process_out_of_seq_message|, we know that
|frag_len| <= |msg_hdr->msg_len| so the later tests for |frag_len <
msg_hdr->msg_len| can be more clearly written as |frag_len !=
msg_hdr->msg_len|, since that's the only remaining case.
Reviewed-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-06 20:41:24 +01:00
Matt Caswell
3d5dceac43
Applying same fix as in dtls1_process_out_of_seq_message. A truncated DTLS fragment would cause *ok to be clear, but the return value would still be the number of bytes read.
...
Problem identified by Emilia Käsper, based on previous issue/patch by Adam
Langley.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-06 20:41:23 +01:00
Adam Langley
aad61c0a57
Fix return code for truncated DTLS fragment.
...
Previously, a truncated DTLS fragment in
|dtls1_process_out_of_seq_message| would cause *ok to be cleared, but
the return value would still be the number of bytes read. This would
cause |dtls1_get_message| not to consider it an error and it would
continue processing as normal until the calling function noticed that
*ok was zero.
I can't see an exploit here because |dtls1_get_message| uses
|s->init_num| as the length, which will always be zero from what I can
see.
Reviewed-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-06 20:41:23 +01:00
Adam Langley
8ca4c4b25e
Fix memory leak from zero-length DTLS fragments.
...
The |pqueue_insert| function can fail if one attempts to insert a
duplicate sequence number. When handling a fragment of an out of
sequence message, |dtls1_process_out_of_seq_message| would not call
|dtls1_reassemble_fragment| if the fragment's length was zero. It would
then allocate a fresh fragment and attempt to insert it, but ignore the
return value, leaking the fragment.
This allows an attacker to exhaust the memory of a DTLS peer.
Fixes CVE-2014-3507
Reviewed-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-06 20:41:23 +01:00
Matt Caswell
0598468fc0
Fix DTLS handshake message size checks.
...
In |dtls1_reassemble_fragment|, the value of
|msg_hdr->frag_off+frag_len| was being checked against the maximum
handshake message size, but then |msg_len| bytes were allocated for the
fragment buffer. This means that so long as the fragment was within the
allowed size, the pending handshake message could consume 16MB + 2MB
(for the reassembly bitmap). Approx 10 outstanding handshake messages
are allowed, meaning that an attacker could consume ~180MB per DTLS
connection.
In the non-fragmented path (in |dtls1_process_out_of_seq_message|), no
check was applied.
Fixes CVE-2014-3506
Wholly based on patch by Adam Langley with one minor amendment.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-06 20:41:23 +01:00
Matt Caswell
ea7cb53974
Added comment for the frag->reassembly == NULL case as per feedback from Emilia
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-06 20:41:23 +01:00
Adam Langley
4985007555
Avoid double free when processing DTLS packets.
...
The |item| variable, in both of these cases, may contain a pointer to a
|pitem| structure within |s->d1->buffered_messages|. It was being freed
in the error case while still being in |buffered_messages|. When the
error later caused the |SSL*| to be destroyed, the item would be double
freed.
Thanks to Wah-Teh Chang for spotting that the fix in 1632ef74 was
inconsistent with the other error paths (but correct).
Fixes CVE-2014-3505
Reviewed-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-06 20:41:23 +01:00
Dr. Stephen Henson
89d2f8f1a9
make update
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-01 21:21:03 +01:00
Dr. Stephen Henson
2c3673cd3f
Fix error discrepancy.
...
We can't rename ssleay_rand_bytes to md_rand_bytes_lock as this will cause
an error code discrepancy. Instead keep ssleay_rand_bytes and add an
extra parameter: since ssleay_rand_bytes is not part of the public API
this wont cause any binary compatibility issues.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-08-01 18:42:41 +01:00
Bodo Moeller
ba5f75d53e
Update $default_depflags to match current defaults.
2014-08-01 19:03:03 +02:00
Bodo Moeller
be804523cf
Clean up CHANGES files: If a change is already present in 1.0.1f or 1.0.1h,
...
don't list it again under changes between 1.0.1h and 1.0.2.
2014-08-01 18:38:56 +02:00
Bodo Moeller
d5213519c0
Simplify and fix ec_GFp_simple_points_make_affine
...
(which didn't always handle value 0 correctly).
Reviewed-by: emilia@openssl.org
2014-08-01 17:27:59 +02:00
Dr. Stephen Henson
a3efe1b6e9
Avoid multiple lock using FIPS DRBG.
...
Don't use multiple locks when SP800-90 DRBG is used outside FIPS mode.
PR#3176
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-07-30 21:08:07 +01:00
Dr. Stephen Henson
789b12599d
Add conditional unit testing interface.
...
Don't call internal functions directly call them through
SSL_test_functions(). This also makes unit testing work on
Windows and platforms that don't export internal functions
from shared libraries.
By default unit testing is not enabled: it requires the compile
time option "enable-unit-test".
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
(cherry picked from commit e0fc7961c4 )
Conflicts:
ssl/heartbeat_test.c
ssl/ssl.h
util/mkdef.pl
2014-07-24 19:42:26 +01:00
Matt Caswell
371d9a627b
Prepare for 1.0.2-beta3-dev
...
Reviewed-by: Stephen Henson <steve@openssl.org >
2014-07-22 21:31:04 +01:00
Matt Caswell
2f63ad1c6d
Prepare for 1.0.2-beta2 release
...
Reviewed-by: Stephen Henson <steve@openssl.org >
2014-07-22 21:30:33 +01:00
Matt Caswell
0e32035292
make update
...
Reviewed-by: Stephen Henson <steve@openssl.org >
2014-07-22 21:30:33 +01:00
Dr. Stephen Henson
f5ce8d6a61
update $default_depflags
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-07-22 21:12:25 +01:00
Andy Polyakov
0ae6ba18ab
CHANGES: mention new platforms.
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-07-22 20:18:06 +02:00
Billy Brumley
4ccc2c19e2
"EC_POINT_invert" was checking "dbl" function pointer instead of "invert".
...
PR#2569
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit cba11f57ce )
2014-07-21 22:28:09 +01:00
Tim Hudson
b5e611a973
Remove old unused and unmaintained demonstration code.
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 62352b8138 )
2014-07-22 07:26:55 +10:00
Andy Polyakov
a2f34441ab
sha1-ppc.pl: shave off one cycle from BODY_20_39
...
and improve performance by 10% on POWER[78].
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
(cherry picked from commit 5c3598307e )
2014-07-21 15:30:59 +02:00
Tim Hudson
2be9425514
Minor documentation update removing "really" and a
...
statement of opinion rather than a fact.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit c8d133e4b6 )
2014-07-21 20:25:14 +10:00
Dr. Stephen Henson
f284fc7cc3
Add test header to Makefile, update ordinals
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-07-20 20:50:38 +01:00
Andy Polyakov
c991d8ae8b
Initial POWER8 support from development branch.
...
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-07-20 14:36:49 +02:00
Dr. Stephen Henson
be12cb3e24
Fix documentation for RSA_set_method(3)
...
PR#1675
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 197400c3f0d617d71ad8167b52fb73046d334320)
2014-07-19 18:25:53 +01:00
Dr. Stephen Henson
4c05b1f8d6
Make *Final work for key wrap again.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 58f4698f67 )
2014-07-17 23:31:11 +01:00
Dr. Stephen Henson
6e1e5996df
Sanity check lengths for AES wrap algorithm.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit d12eef1501 )
2014-07-17 12:58:42 +01:00
Jeffrey Walton
6ccd120f5f
Fix typo, add reference.
...
PR#3456
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit d48e78f0cf )
2014-07-17 12:08:26 +01:00
Matt Caswell
ca818b322d
Disabled XTS mode in enc utility as it is not supported
...
PR#3442
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 2097a17c57 )
2014-07-16 21:01:38 +01:00
Matt Caswell
b11c24110c
Add Matt Caswell's fingerprint, and general update on the fingerprints file to bring it up to date
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 3bd548192a )
2014-07-15 23:22:49 +01:00
Dr. Stephen Henson
beac6cb5aa
Clarify -Verify and PSK.
...
PR#3452
(cherry picked from commit ca2015a617 )
2014-07-15 20:23:25 +01:00
Dr. Stephen Henson
666a597ffb
Fix DTLS certificate requesting code.
...
Use same logic when determining when to expect a client
certificate for both TLS and DTLS.
PR#3452
(cherry picked from commit c8d710dc5f )
2014-07-15 18:23:35 +01:00
Dr. Stephen Henson
d4dbabb814
Don't allow -www etc options with DTLS.
...
The options which emulate a web server don't make sense when doing DTLS.
Exit with an error if an attempt is made to use them.
PR#3453
(cherry picked from commit 58a2aaeade8bdecd0f9f0df41927f7cff3012547)
2014-07-15 12:25:19 +01:00
Dr. Stephen Henson
c71e37aa6c
Use case insensitive compare for servername.
...
PR#3445
(cherry picked from commit 1c3e9a7c67 )
2014-07-14 23:59:58 +01:00
Hubert Kario
cdae9a58e6
document -nextprotoneg option in man pages
...
Add description of the option to advertise support of
Next Protocol Negotiation extension (-nextprotoneg) to
man pages of s_client and s_server.
PR#3444
(cherry picked from commit 7efd0e777e )
2014-07-14 23:43:21 +01:00
Dr. Stephen Henson
fa2b54c83a
Use more common name for GOST key exchange.
...
(cherry picked from commit 7aabd9c92fe6f0ea2a82869e5171dcc4518cee85)
2014-07-14 18:31:55 +01:00
Matt Caswell
14b5d0d029
Fixed valgrind complaint due to BN_consttime_swap reading uninitialised data.
...
This is actually ok for this function, but initialised to zero anyway if
PURIFY defined.
This does have the impact of masking any *real* unitialised data reads in bn though.
Patch based on approach suggested by Rich Salz.
PR#3415
(cherry picked from commit 77747e2d9a5573b1dbc15e247ce18c03374c760c)
2014-07-13 22:20:15 +01:00
Peter Mosmans
2fbd94252a
Add names of GOST algorithms.
...
PR#3440
(cherry picked from commit 924e5eda2c )
2014-07-13 18:31:09 +01:00
Richard Levitte
5b9188454b
* crypto/ui/ui_lib.c: misplaced brace in switch statement.
...
Detected by dcruette@qualitesys.com
(cherry picked from commit 8b5dd34091 )
2014-07-13 19:13:38 +02:00
Ben Laurie
5e189b4b8d
Don't clean up uninitialised EVP_CIPHER_CTX on error (CID 483259).
...
(cherry picked from commit c1d1b0114e )
2014-07-10 17:49:53 +01:00
Matt Caswell
23bd628735
Fix memory leak in BIO_free if there is no destroy function.
...
Based on an original patch by Neitrino Photonov <neitrinoph@gmail.com >
PR#3439
(cherry picked from commit 66816c53be )
2014-07-09 23:32:18 +01:00
Andy Polyakov
371feee876
x86_64 assembly pack: improve masm support.
...
(cherry picked from commit 1b0fe79f3e )
2014-07-09 22:46:13 +02:00
Andy Polyakov
f50f0c6aa3
Please Clang's sanitizer, addendum.
...
(cherry picked from commit d11c70b2c2 )
2014-07-09 22:45:52 +02:00
Andy Polyakov
2064e2db08
Please Clang's sanitizer.
...
PR: #3424,#3423,#3422
(cherry picked from commit 021e5043e5 )
2014-07-09 22:45:38 +02:00
Andy Polyakov
de222838fe
apps/speed.c: fix compiler warnings in multiblock_speed().
...
(cherry picked from commit c4f8efab34 )
2014-07-07 17:03:27 +02:00
Andy Polyakov
0ad2a0a303
sha[1|512]-x86_64.pl: fix logical errors with $shaext=0.
...
(cherry picked from commit 07b635cceb )
2014-07-07 17:02:00 +02:00
David Lloyd
2cb761c1f4
Prevent infinite loop loading config files.
...
PR#2985
(cherry picked from commit 9d23f422a3 )
2014-07-07 13:54:11 +01:00
Viktor Dukhovni
3ebcecf5c4
Improve X509_check_host() documentation.
...
Based on feedback from Jeffrey Walton.
(cherry picked from commit b73ac02735 )
2014-07-07 20:35:49 +10:00
Viktor Dukhovni
e83c913723
Update API to use (char *) for email addresses and hostnames
...
Reduces number of silly casts in OpenSSL code and likely most
applications. Consistent with (char *) for "peername" value from
X509_check_host() and X509_VERIFY_PARAM_get0_peername().
(cherry picked from commit 297c67fcd8 )
2014-07-07 19:20:34 +10:00
Viktor Dukhovni
55fe56837a
Set optional peername when X509_check_host() succeeds.
...
Pass address of X509_VERIFY_PARAM_ID peername to X509_check_host().
Document modified interface.
(cherry picked from commit ced3d9158a )
2014-07-07 19:20:34 +10:00
Viktor Dukhovni
1eb57ae2b7
New peername element in X509_VERIFY_PARAM_ID
...
Declaration, memory management, accessor and documentation.
(cherry picked from commit 6e661d458f )
2014-07-07 19:20:34 +10:00
Viktor Dukhovni
41e3ebd5ab
One more typo when changing !result to result <= 0
...
(cherry picked from commit eef1827f89 )
2014-07-07 19:19:13 +10:00
Viktor Dukhovni
9624b50d51
Fix typo in last commit
...
(cherry picked from commit 90b70a6a6b )
2014-07-07 19:19:13 +10:00
Viktor Dukhovni
449d864515
Multiple verifier reference identities.
...
Implemented as STACK_OF(OPENSSL_STRING).
(cherry picked from commit 8abffa4a73 )
2014-07-07 19:19:13 +10:00
Viktor Dukhovni
7f7e11ee5c
Implement sk_deep_copy.
...
(cherry picked from commit 66d884f067 )
2014-07-07 19:19:13 +10:00
Dr. Stephen Henson
43f534b986
Usage for -hack and -prexit -verify_return_error
...
(cherry picked from commit ee724df75d )
2014-07-06 22:45:20 +01:00
Dr. Stephen Henson
fbe8ea3abe
Document certificate status request options.
...
(cherry picked from commit cba3f1c739 )
2014-07-06 22:45:20 +01:00
Dr. Stephen Henson
affc941ea6
s_server usage for certificate status requests
...
(cherry picked from commit a44f219c00 )
2014-07-06 22:45:20 +01:00
Dr. Stephen Henson
012f7474f7
Update ticket callback docs.
...
(cherry picked from commit a23a6e85d8 )
2014-07-06 12:40:16 +01:00
Dr. Stephen Henson
5c1b373be6
Sanity check keylength in PVK files.
...
PR#2277
(cherry picked from commit 733a6c882e92f8221bd03a51643bb47f5f81bb81)
2014-07-06 00:36:14 +01:00
Jeffrey Walton
648a9f7c2f
Added reference to platform specific cryptographic acceleration such as AES-NI
2014-07-06 00:04:09 +01:00
Matt Caswell
623acb90cc
Fixed error in pod files with latest versions of pod2man
...
(cherry picked from commit 07255f0a76d9d349d915e14f969b9ff2ee0d1953)
2014-07-06 00:04:09 +01:00
Andy Polyakov
6ce295a301
sha512-x86_64.pl: fix typo.
...
PR: #3431
(cherry picked from commit 7eb9680ae1 )
2014-07-06 00:00:34 +02:00
Andy Polyakov
0359ccfd8b
s3_pkt.c: fix typo.
...
(cherry picked from commit 0e7a32b55e )
2014-07-05 23:57:28 +02:00
Andy Polyakov
9c1cf94f34
apps/speed.c: add multi-block benchmark.
...
(cherry picked from commit 375a64e349 )
2014-07-05 23:54:43 +02:00
Alan Hryngle
ff5b11f547
Return smaller of ret and f.
...
PR#3418.
(cherry picked from commit fdea4fff8f )
2014-07-05 22:38:17 +01:00
Dr. Stephen Henson
8358302d47
Don't limit message sizes in ssl3_get_cert_verify.
...
PR#319 (reoponed version).
(cherry picked from commit 7f6e957864 )
2014-07-05 13:30:38 +01:00
Dr. Stephen Henson
534656a997
Add license info.
...
(cherry picked from commit 55707a36cc )
2014-07-04 18:43:06 +01:00
Dr. Stephen Henson
2cfbec1cae
typo
2014-07-04 13:50:26 +01:00
Dr. Stephen Henson
22db480daf
Remove all RFC5878 code.
...
Remove RFC5878 code. It is no longer needed for CT and has numerous bugs.
2014-07-04 13:42:05 +01:00
Rich Salz
d107382214
Merge branch 'rsalz-docfixes'
2014-07-03 12:57:16 -04:00
Rich Salz
03ae3ca621
Close 3170, remove reference to Ariel Glenn's old 0.9.8 doc
...
(cherry picked from commit f1112985e8 )
2014-07-03 12:54:31 -04:00
Andy Polyakov
61df34e924
e_os.h: limit _MSC_VER trickery to older compilers.
...
PR: #3390
(cherry picked from commit aab3560b65 )
2014-07-02 22:34:02 +02:00
Andy Polyakov
47b9e06cfd
bn_exp.c: fix x86_64-specific crash with one-word modulus.
...
PR: #3397
(cherry picked from commit eca441b2b4 )
2014-07-02 21:16:45 +02:00
Matt Smart
88822622a1
Fix doc typo.
...
ERR_get_error(3) references the non-existent
ERR_get_last_error_line_data instead of the one that does exist,
ERR_peek_last_error_line_data.
PR#3283
(cherry picked from commit 5cc99c6cf5 )
2014-07-02 03:45:01 +01:00
Thijs Alkemade
8f243ab6c1
Make disabling last cipher work.
...
(cherry picked from commit 7cb472bd0d )
2014-07-02 03:32:42 +01:00
Dr. Stephen Henson
9223a31eb7
ASN1 sanity check.
...
Primitive encodings shouldn't use indefinite length constructed
form.
PR#2438 (partial).
(cherry picked from commit 398e99fe5e )
2014-07-02 00:59:44 +01:00
Dr. Stephen Henson
654ae3d6ad
Accessor functions for app_data in ECDSA_METHOD
...
(cherry picked from commit 387b844ffd )
2014-07-02 00:59:43 +01:00
Ben Laurie
70c739b8db
Fix possible buffer overrun.
...
(cherry picked from commit 2db3ea2929 )
Conflicts:
ssl/ssl_locl.h
ssl/t1_lib.c
2014-07-02 00:09:39 +01:00
Andy Polyakov
daa96141d3
sha512-x86_64.pl: fix linking problem under Windows.
...
(cherry picked from commit 29be3f6411 )
2014-07-01 17:12:41 +02:00
Dr. Stephen Henson
802fdcda1e
Fix copy for CCM, GCM and XTS.
...
Internal pointers in CCM, GCM and XTS contexts should either be
NULL or set to point to the appropriate key schedule. This needs
to be adjusted when copying contexts.
(cherry picked from commit c2fd5d79ff )
2014-06-30 13:59:38 +01:00
Dr. Stephen Henson
6006e352ad
Make EVP_Digest* work again.
2014-06-30 13:59:29 +01:00
Dr. Stephen Henson
2af68ef774
Don't core dump when using CMAC with dgst.
...
We can't unfortunately print the CMAC cipher used without extending the API.
PR#2579
(cherry picked from commit 79e31a2842e10271581cbfdaae0145dd4bd35107)
2014-06-29 23:44:44 +01:00
Dr. Stephen Henson
df401f4796
Make CMAC work with EVP_PKEY.
...
Add patch originally accidentally omitted to allow CMAC to work with
EVP_PKEY APIs.
2014-06-29 23:44:44 +01:00
Jeffrey Walton
3875ee59ba
Clarified that the signature's buffer size, s, is not used as an
...
IN parameter.
Under the old docs, the only thing stated was "at most
EVP_PKEY_size(pkey) bytes will be written". It was kind of misleading
since it appears EVP_PKEY_size(pkey) WILL be written regardless of the
signature's buffer size.
(cherry picked from commit 6e6ba36d98 )
2014-06-29 23:36:22 +01:00
ZNV
14183e50e7
Make EVP_CIPHER_CTX_copy work in GCM mode.
...
PR#3272
(cherry picked from commit 370bf1d708 )
2014-06-29 22:02:23 +01:00
Dr. Stephen Henson
15de0f609c
Fix memory leak.
...
PR#2531
(cherry picked from commit 44724beead )
2014-06-29 13:51:57 +01:00
Ken Ballou
4824e7d6e9
Typo.
...
PR#3173
(cherry picked from commit 76ed5a42ea )
2014-06-29 13:39:20 +01:00
Dr. Stephen Henson
a3b8cd242a
Show errors on CSR verification failure.
...
If CSR verify fails in ca utility print out error messages.
Otherwise some errors give misleading output: for example
if the key size exceeds the library limit.
PR#2875
(cherry picked from commit a30bdb55d1 )
2014-06-29 13:34:25 +01:00
Dr. Stephen Henson
d1cc95f781
Make no-ssl3 no-ssl2 do more sensible things.
...
(cherry picked from commit 7ae6a4b659 )
2014-06-29 03:05:21 +01:00
Dr. Stephen Henson
6d02baf6ab
Clarify protocols supported.
...
Update protocols supported and note that SSLv2 is effectively disabled
by default.
PR#3184
(cherry picked from commit 1b13a4f38dfc385d5e776f6b3e06c5795874cf9b)
2014-06-29 00:07:07 +01:00
Andy Polyakov
377551b9c4
x86_64 assembly pack: refine clang detection.
...
(cherry picked from commit a356e488ad )
Resolved conflicts:
crypto/bn/asm/rsaz-avx2.pl
2014-06-28 17:26:03 +02:00
Dr. Stephen Henson
361fd136e9
Typo.
...
PR#3107
(cherry picked from commit 7c206db928 )
2014-06-28 12:42:59 +01:00
Dr. Stephen Henson
4950a528ce
Don't disable state strings with no-ssl2
...
Some state strings were erronously not compiled when no-ssl2
was set.
PR#3295
(cherry picked from commit 0518a3e19e )
2014-06-28 00:56:27 +01:00
yogesh nagarkar
00ab230a3f
Fix compilation with -DSSL_DEBUG -DTLS_DEBUG -DKSSL_DEBUG
...
PR#3141
(cherry picked from commit d183545d45 )
2014-06-28 00:41:31 +01:00
Andreas Westfeld
e99980e8fd
Fix typo in ideatest.c
...
(cherry picked from commit d1d4382dcb )
2014-06-28 00:06:32 +01:00
Ken Ballou
ec77f276e1
Remove redundant check.
...
PR#3174
(cherry picked from commit fd331c0bb9b557903dd2ce88398570a3327b5ef0)
2014-06-27 23:19:37 +01:00
Dr. Stephen Henson
d0ba994483
Fix for EVP_PBE_alg_add().
...
In EVP_PBE_alg_add don't use the underlying NID for the cipher
as it may have a non-standard key size.
PR#3206
(cherry picked from commit efb7caef637a1de8468ca109efd355a9d0e73a45)
2014-06-27 23:19:37 +01:00
Andy Polyakov
52f856526c
x86_64 assembly pack: addendum to last clang commit.
...
(cherry picked from commit 7eb0488280 )
2014-06-27 22:55:22 +02:00
Andy Polyakov
912f08dd5e
x86_64 assembly pack: allow clang to compile AVX code.
...
(cherry picked from commit ac171925ab )
2014-06-27 22:55:07 +02:00
Andy Polyakov
1067663d85
bn/asm/rsaz-avx2.pl: fix occasional failures.
...
(cherry picked from commit 406d4af050 )
2014-06-27 22:43:43 +02:00
Dr. Stephen Henson
22228d2d40
Tolerate critical AKID in CRLs.
...
PR#3014
(cherry picked from commit 11da66f8b1 )
2014-06-27 18:50:19 +01:00
Tom Greenslade
c57745596c
Handle IPv6 addresses in OCSP_parse_url.
...
PR#2783
(cherry picked from commit b36f35cda9 )
2014-06-27 17:31:37 +01:00
Dr. Stephen Henson
65e4dca40c
Rebuild OID table.
2014-06-27 16:58:41 +01:00
Dr. Stephen Henson
ff4cfc4c58
Fix OID encoding for one component.
...
OIDs with one component don't have an encoding.
PR#2556 (Bug#1)
(cherry picked from commit 95791bf941 )
2014-06-27 16:58:16 +01:00
Tomas Mraz
f4623ab996
Don't advertise ECC ciphersuits in SSLv2 compatible client hello.
...
PR#3374
(cherry picked from commit 0436369fcc )
2014-06-27 16:52:00 +01:00
Jeffrey Walton
6ef350952c
Clarify docs.
...
Document that the certificate passed to SSL_CTX_add_extra_chain_cert()
should not be freed by the application.
PR#3409
(cherry picked from commit 0535c2d67c )
2014-06-27 16:39:39 +01:00
Dr. Stephen Henson
e42c208235
Memory leak and NULL dereference fixes.
...
PR#3403
(cherry picked from commit d2aea03829 )
2014-06-27 14:52:36 +01:00
Dr. Stephen Henson
e86951ca2a
Remove ancient obsolete files under pkcs7.
...
(cherry picked from commit 7be6b27aaf )
2014-06-27 13:53:23 +01:00
Huzaifa Sidhpurwala
b7a4f98b15
Make sure BN_sqr can never return a negative value.
...
PR#3410
(cherry picked from commit e14e764c0d5d469da63d0819c6ffc0e1e9e7f0bb)
2014-06-26 23:56:32 +01:00
Andy Polyakov
82a9dafe32
bn_exp.c: move check for AD*X to rsaz-avx2.pl.
...
This ensures high performance is situations when assembler supports
AVX2, but not AD*X.
(cherry picked from commit f3f620e1e0 )
Resolved conflicts:
crypto/bn/asm/rsaz-avx2.pl
2014-06-27 00:36:05 +02:00
Andy Polyakov
1536bcfd56
aesv8-armx.pl: rigid input verification in key setup.
...
(cherry picked from commit 7b8c8c4d79 )
2014-06-25 22:12:08 +02:00
Viktor Dukhovni
3fc0b1edad
X509_check_mumble() failure is <= 0, not just 0
...
(cherry picked from commit a48fb0400c )
2014-06-25 18:21:36 +01:00
Viktor Dukhovni
3d15d58e55
More complete input validation of X509_check_mumble
...
(cherry picked from commit 29edebe95c )
2014-06-25 18:21:35 +01:00
Viktor Dukhovni
d93edc0aab
Drop hostlen from X509_VERIFY_PARAM_ID.
...
Just store NUL-terminated strings. This works better when we add
support for multiple hostnames.
(cherry picked from commit b3012c698a )
2014-06-25 18:21:35 +01:00
Viktor Dukhovni
609daababb
More complete X509_check_host documentation.
...
(cherry picked from commit d241b80409 )
2014-06-25 18:21:35 +01:00
Andy Polyakov
a073ceeff4
aesv8-armx.pl: inclrease interleave factor.
...
This is to compensate for higher aes* instruction latency on Cortex-A57.
(cherry picked from commit 015364baf3 )
2014-06-24 08:10:37 +02:00
Andy Polyakov
5cd8ce42ec
ARMv8 assembly pack: add Cortex performance numbers.
...
(cherry picked from commit 0f777aeb50 )
2014-06-24 08:07:04 +02:00
Miod Vallat
d15f2d98ef
Fix off-by-one errors in ssl_cipher_get_evp()
...
In the ssl_cipher_get_evp() function, fix off-by-one errors in index validation before accessing arrays.
Bug discovered and fixed by Miod Vallat from the OpenBSD team.
PR#3375
2014-06-22 23:18:15 +01:00
Matt Caswell
00f5ee445b
Revert "Fix off-by-one errors in ssl_cipher_get_evp()"
...
This reverts commit 3d86077427 .
Incorrect attribution.
2014-06-22 23:17:40 +01:00
Matt Caswell
e7911530a9
Fixed Windows compilation failure
2014-06-22 20:18:09 +02:00
Richard Levitte
6ff73426c3
Make sure test/tests.com exit gracefully, even when openssl.exe wasn't
...
properly built.
2014-06-18 13:43:10 +02:00
Richard Levitte
a61e509e9b
Adjust VMS build to Unix build. Most of all, make it so the disabled
...
algorithms MD2 and RC5 don't get built.
Also, disable building the test apps in crypto/des and crypto/pkcs7, as
they have no support at all.
2014-06-18 13:43:09 +02:00
Felix Laurie von Massenbach
1b823494de
Fix signed/unsigned comparisons.
...
(cherry picked from commit 50cc4f7b3d )
2014-06-17 18:38:36 +01:00
Felix Laurie von Massenbach
6657e68bf2
Fix shadow declaration.
...
(cherry picked from commit 1f61d8b5b1 )
2014-06-17 18:36:48 +01:00
Richard Levitte
23351c607b
Remove unused DANE macros. This should be the last DANE stuff...
2014-06-17 12:38:20 +02:00
Richard Levitte
9a6112d16a
DCL doesn't do well with empty lines, or lines starting with #
2014-06-16 13:25:16 +02:00
Richard Levitte
b9c0dae28e
Spaces were added in some strings for better readability. However, those spaces do not belong in file names, so when picking out the individual parts, remove the spaces
2014-06-16 13:25:16 +02:00
Andy Polyakov
d940b3b9c7
aesni-sha[1|256]-x86_64.pl: fix logical error and MacOS X build.
...
(cherry picked from commit 9024b84b7c )
2014-06-16 10:12:56 +02:00
Viktor Dukhovni
cfbc10fb32
Enforce _X509_CHECK_FLAG_DOT_SUBDOMAINS internal-only
...
(cherry picked from commit d435e23959f1c2cb4feadbfba9ad884c59f37db9)
2014-06-14 22:31:28 +01:00
Dr. Stephen Henson
90d94ce39e
Accept CCS after sending finished.
...
Allow CCS after finished has been sent by client: at this point
keys have been correctly set up so it is OK to accept CCS from
server. Without this renegotiation can sometimes fail.
PR#3400
(cherry picked from commit 99cd6a91fcb0931feaebbb4832681d40a66fad41)
2014-06-14 22:31:28 +01:00
Andy Polyakov
79b960c046
evp/e_aes_cbc_sha[1|256].c: fix -DPEDANTIC build.
...
(cherry picked from commit ce00c64df9 )
2014-06-14 23:16:29 +02:00
Richard Levitte
66a6e2b2b6
Adjust VMS build files to the Unix ones
2014-06-14 16:58:11 +02:00
Richard Levitte
1be1d05184
Make sure that disabling the MAYLOSEDATA3 warning is only done when the
...
compiler supports it. Otherwise, there are warnings about it lacking
everywhere, which is quite tedious to read through while trying to check
for other warnings.
2014-06-14 16:58:11 +02:00
Richard Levitte
9f8c183283
Update the VMS tests according to the latest unixly tests.
...
Partly provided by Zoltan Arpadffy <arpadffy@polarhome.com >
2014-06-14 16:58:11 +02:00
Andy Polyakov
8301245a5e
aesni-sha256-x86_64.pl: add missing rex in shaext.
...
PR: 3405
(cherry picked from commit 91a6bf80f8 )
2014-06-14 16:04:04 +02:00
Andy Polyakov
1f6d207625
sha1-x86_64.pl: add missing rex prefix in shaext.
...
PR: 3405
(cherry picked from commit c9cf29cca2 )
2014-06-14 15:28:38 +02:00
Matt Caswell
561ba12463
Fixed incorrect return code handling in ssl3_final_finish_mac.
...
Based on an original patch by Joel Sing (OpenBSD) who also originally identified the issue.
2014-06-13 15:50:58 +01:00
Matt Caswell
7f133c357b
Revert "Fixed incorrect return code handling in ssl3_final_finish_mac"
...
This reverts commit 728bd41a15 .
Missing attribution.
2014-06-13 15:50:28 +01:00
Viktor Dukhovni
3cc8a3f234
Client-side namecheck wildcards.
...
A client reference identity of ".example.com" matches a server
certificate presented identity that is any sub-domain of "example.com"
(e.g. "www.sub.example.com).
With the X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS flag, it matches
only direct child sub-domains (e.g. "www.sub.example.com").
(cherry picked from commit e52c52f10bb8e34aaf8f28f3e5b56939e8f6b357)
2014-06-12 23:19:24 +01:00
Kurt Cancemi
3d86077427
Fix off-by-one errors in ssl_cipher_get_evp()
...
In the ssl_cipher_get_evp() function, fix off-by-one errors in index validation before accessing arrays.
PR#3375
2014-06-12 21:12:43 +01:00
Andy Polyakov
56ba280ccd
Facilitate back-porting of AESNI and SHA modules.
...
Fix SEH and stack handling in Win64 build.
(cherry picked from commit 977f32e852 )
2014-06-12 21:51:35 +02:00
Matt Caswell
955bfbc268
Added OPENSSL_assert check as per PR#3377 reported by Rainer Jung <rainer.jung@kippdata.de>
2014-06-12 20:42:33 +01:00
Dr. Stephen Henson
2eab488c02
remove some more DANE code
2014-06-12 11:09:14 +01:00
Dr. Stephen Henson
fa7a0efbac
make update
2014-06-12 10:52:49 +01:00
Dr. Stephen Henson
3fe8f005b0
Fix Windows build.
2014-06-12 10:52:49 +01:00
Dr. Stephen Henson
5af09776ce
Remove unimplemented functions.
2014-06-12 10:52:49 +01:00
Richard Levitte
995d08d104
Update the VMS build according to the latest unixly build.
...
Partly provided by Zoltan Arpadffy <arpadffy@polarhome.com >
2014-06-12 16:59:47 +02:00
Richard Levitte
ca422f3563
The 1.0.2 cms-test.pl had some changes that don't quite work on VMS...
2014-06-12 16:58:39 +02:00
Richard Levitte
68a1e0bc35
Bring in the 1.0.1g to 1.0.1h changes into CHANGES.
2014-06-12 12:22:24 +02:00
Richard Levitte
ed6c278f60
Small cleanup, double entry in CHANGES.
2014-06-12 12:18:13 +02:00
Andy Polyakov
d85a772ec3
Enable multi-block support by default.
...
(cherry picked from commit 77a27a5066 )
2014-06-11 20:41:46 +02:00
Dr. Stephen Henson
fb2f9f266c
Fix compilation with no-comp
...
(cherry picked from commit 7239a09c7b5757ed8d0e9869f3e9b03c0e11f4d1)
2014-06-11 14:41:00 +01:00
Andy Polyakov
66aeaec067
ghash-x86_64.pl: optimize for upcoming Atom.
...
(cherry picked from commit 1cf8f57b43 )
2014-06-11 11:35:23 +02:00
Andy Polyakov
70fddbe32a
Add support for Intel SHA extension.
...
(cherry picked from commit 619b94667c )
2014-06-11 10:30:31 +02:00
Rob Stradling
5fc3d333c7
Separate the SCT List parser from the SCT List viewer
...
(cherry picked from commit fd2309aa29 )
2014-06-11 00:10:45 +01:00
Matt Caswell
728bd41a15
Fixed incorrect return code handling in ssl3_final_finish_mac
2014-06-10 23:32:27 +01:00
Andy Polyakov
77fb5a303b
Engage GHASH for ARMv8.
...
(cherry picked from commit 82741e9c89 )
2014-06-11 00:10:00 +02:00
Andy Polyakov
7344089dc3
Add GHASH for ARMv8 Crypto Extension.
...
Result of joint effort with Ard Biesheuvel.
(cherry picked from commit 2d5a799d27 )
2014-06-11 00:09:35 +02:00
Andy Polyakov
7e03acf2be
Engage ARMv8 AES support [from HEAD].
2014-06-11 00:08:03 +02:00
Andy Polyakov
9af4cb3d3b
Add AES module for ARMv8 Crypto Extension [from HEAD].
2014-06-11 00:06:27 +02:00
Andy Polyakov
a00caa0257
sha[1|512]-armv8.pl: get instruction endianness right.
...
Submitted by: Ard Biesheuvel.
(cherry picked from commit cd91fd7c32 )
2014-06-10 23:34:53 +02:00
Andy Polyakov
4672acfa7d
linux-aarch64: engage SHA modules.
...
(cherry picked from commit f8aab6174c )
2014-06-10 23:32:26 +02:00
Andy Polyakov
ea61b32719
Add SHA for ARMv8.
...
(cherry picked from commit ddb6b965da )
2014-06-10 23:32:16 +02:00
Andy Polyakov
dabfbea7d9
Add linux-aarch64 taget.
...
armcap.c is shared between 32- and 64-bit builds and features link-time
detection of getauxval.
Submitted by: Ard Biesheuvel.
(cherry picked from commit e8d93e342b )
2014-06-10 23:20:55 +02:00
Andy Polyakov
56d973709c
aesni-mb-x86_64.pl: add Win64 SEH.
...
(cherry picked from commit e2eabed110 )
2014-06-10 23:09:04 +02:00
Andy Polyakov
3a97ebb16b
ARM assembly pack: get ARMv7 instruction endianness right.
...
Pointer out and suggested by: Ard Biesheuvel.
(cherry picked from commit 5dcf70a1c5 )
2014-06-10 22:51:15 +02:00
Andy Polyakov
16f4d2e32f
armv4cpuid.S: switch to CNTVCT tick counter.
...
(cherry picked from commit 723463282f )
2014-06-10 22:50:18 +02:00
Andy Polyakov
1f72a76f98
sha[1|256]-armv4: harmonize with arm_arch.h.
...
(cherry picked from commit 797d24bee9 )
2014-06-10 22:49:54 +02:00
Andy Polyakov
f5247cea39
sha/asm/sha1-armv4-large.pl: add NEON and ARMv8 code paths.
...
sha/asm/sha256-armv4.pl: add ARMv8 code path.
(cherry picked from commit 9250a30692 )
2014-06-10 22:48:27 +02:00
Andy Polyakov
3da2c3df78
crypto/armcap.c: detect ARMv8 capabilities [in 32-bit build].
...
(cherry picked from commit 4afa9f033d )
2014-06-10 22:47:19 +02:00
Hubert Kario
4ceddeea6c
backport changes to ciphers(1) man page
...
Backport of patch:
add ECC strings to ciphers(1), point out difference between DH and ECDH
and backport of other other assorted fixes to this man page
* Make a clear distinction between DH and ECDH key exchange.
* Group all key exchange cipher suite identifiers, first DH then ECDH
* add descriptions for all supported *DH* identifiers
* add ECDSA authentication descriptions
* add example showing how to disable all suites that offer no
authentication or encryption
* update status of static DH (it's now supported)
* backport descriptions of AES128, AES256, AESGCM
* backport descriptions of CAMELLIA128, CAMELLIA256
* backport listing of standard names for ECC cipher suites
and TLSv1.2 cipher suites
* backport description of PSK cipher suites
2014-06-10 20:55:14 +01:00
Mike Bland
2fddc5fc09
Create test/testutil.h for unit test helper macros
...
Defines SETUP_TEST_FIXTURE and EXECUTE_TEST, and updates ssl/heartbeat_test.c
using these macros. SETUP_TEST_FIXTURE makes use of the new TEST_CASE_NAME
macro, defined to use __func__ or __FUNCTION__ on platforms that support those
symbols, or to use the file name and line number otherwise. This should fix
several reported build problems related to lack of C99 support.
2014-06-10 19:24:46 +01:00
Dr. Stephen Henson
e3beef1e1b
Remove experimental DANE code.
...
Remove experimental DANE/dnssec code: not ready for use in an
official release yet.
2014-06-10 14:59:10 +01:00
Dr. Stephen Henson
cea5a1d5f2
Fix null pointer errors.
...
PR#3394
(cherry picked from commit 7a9d59c148 )
2014-06-10 14:48:02 +01:00
Dr. Stephen Henson
f472ada006
SRP ciphersuite correction.
...
SRP ciphersuites do not have no authentication. They have authentication
based on SRP. Add new SRP authentication flag and cipher string.
(cherry picked from commit a86b88acc373ac1fb0ca709a5fb8a8fa74683f67)
2014-06-09 12:09:51 +01:00
Dr. Stephen Henson
05b2210476
Update strength_bits for 3DES.
...
Fix strength_bits to 112 for 3DES.
(cherry picked from commit 837c203719205ab19b5609b2df7151be8df05687)
2014-06-09 12:09:51 +01:00
Kurt Roeckx
33e1a1d652
Link heartbeat_test with the static version of the libraries
...
It's using an internal API that that might not be available in the shared
library.
2014-06-09 00:12:37 +01:00
Jakub Wilk
38956b071a
Create ~/.rnd with mode 0600 instead of 0666
...
Because of a missing include <fcntl.h> we don't have O_CREATE and don't create
the file with open() using mode 0600 but fall back to using fopen() with the
default umask followed by a chmod().
Problem found by Jakub Wilk <jwilk@debian.org >.
2014-06-08 21:20:34 +01:00
Dr. Stephen Henson
a21f350a76
Make tls_session_secret_cb work with CVE-2014-0224 fix.
...
If application uses tls_session_secret_cb for session resumption
set the CCS_OK flag.
(cherry picked from commit 953c592572e8811b7956cc09fbd8e98037068b58)
2014-06-07 15:27:23 +01:00
Dr. Stephen Henson
74360af359
Update NEWS.
2014-06-07 15:27:23 +01:00
Matt Caswell
5400882ca3
Fixed minor duplication in docs
2014-06-07 12:31:38 +01:00
Dr. Stephen Henson
eb6508d50c
Fix for CVE-2014-0195
...
A buffer overrun attack can be triggered by sending invalid DTLS fragments
to an OpenSSL DTLS client or server. This is potentially exploitable to
run arbitrary code on a vulnerable client or server.
Fixed by adding consistency check for DTLS fragments.
Thanks to Jüri Aedla for reporting this issue.
(cherry picked from commit 1632ef7448 )
2014-06-05 13:24:50 +01:00
Dr. Stephen Henson
77719aefb8
Fix for CVE-2014-0224
...
Only accept change cipher spec when it is expected instead of at any
time. This prevents premature setting of session keys before the master
secret is determined which an attacker could use as a MITM attack.
Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for reporting this issue
and providing the initial fix this patch is based on.
(cherry picked from commit bc8923b1ec )
2014-06-05 13:24:46 +01:00
Dr. Stephen Henson
9d2c9dd1e1
Additional CVE-2014-0224 protection.
...
Return a fatal error if an attempt is made to use a zero length
master secret.
(cherry picked from commit 006cd7083f )
2014-06-05 13:24:40 +01:00
Dr. Stephen Henson
8942b92c7c
Fix CVE-2014-0221
...
Unnecessary recursion when receiving a DTLS hello request can be used to
crash a DTLS client. Fixed by handling DTLS hello request without recursion.
Thanks to Imre Rad (Search-Lab Ltd.) for discovering this issue.
(cherry picked from commit d3152655d5 )
2014-06-05 13:24:36 +01:00
Dr. Stephen Henson
e5f706590c
Fix CVE-2014-3470
...
Check session_cert is not NULL before dereferencing it.
(cherry picked from commit 8011cd56e3 )
2014-06-05 13:24:30 +01:00
Libor Krystek
a5d03c54ab
Corrected OPENSSL_NO_EC_NISTP_64_GCC_128 usage in ec_lcl.h. PR#3370
2014-06-03 23:17:21 +01:00
David Benjamin
56b94a38b9
Check there is enough room for extension.
...
(cherry picked from commit 7d89b3bf42e4b4067371ab33ef7631434e41d1e4)
2014-06-02 18:59:48 +01:00
zhu qun-ying
d52eb82781
Free up s->d1->buffered_app_data.q properly.
...
PR#3286
(cherry picked from commit 71e95000afb2227fe5cac1c79ae884338bcd8d0b)
2014-06-02 14:40:05 +01:00
Dr. Stephen Henson
4967a832ab
Allow reordering of certificates when signing.
...
Add certificates if -nocerts and -certfile specified when signing
in smime application. This can be used this to specify the
order certificates appear in the PKCS#7 structure: some broken
applications require a certain ordering.
PR#3316
(cherry picked from commit e114abee9ec084a56c1d6076ac6de8a7a3a5cf34)
2014-06-02 14:19:43 +01:00
Sami Farin
6468866823
Typo: set i to -1 before goto.
...
PR#3302
(cherry picked from commit 9717f01951f976f76dd40a38d9fc7307057fa4c4)
2014-06-02 13:53:54 +01:00
Matt Caswell
de8a5b523f
Added SSLErr call for internal error in dtls1_buffer_record
2014-06-01 21:40:31 +01:00
David Ramos
8de85b0048
Delays the queue insertion until after the ssl3_setup_buffers() call due to use-after-free bug. PR#3362
2014-06-01 21:40:25 +01:00
Dr. Stephen Henson
8d71574142
Recognise padding extension.
...
(cherry picked from commit ea2bb861f0daaa20819bf9ac8c146f7593feacd4)
Conflicts:
apps/s_cb.c
2014-06-01 16:50:25 +01:00
Dr. Stephen Henson
623a01df49
Option to disable padding extension.
...
Add TLS padding extension to SSL_OP_ALL so it is used with other
"bugs" options and can be turned off.
This replaces SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG which is an ancient
option referring to SSLv2 and SSLREF.
PR#3336
(cherry picked from commit 758415b2259fa45d3fe17d8e53ae1341b7b6e482)
Conflicts:
ssl/t1_lib.c
2014-06-01 16:50:25 +01:00
Dr. Stephen Henson
08b172b975
Set default global mask to UTF8 only.
...
(cherry picked from commit 3009244da4 )
2014-06-01 15:04:21 +01:00
David Ramos
856a4585d6
Allocate extra space when NETSCAPE_HANG_BUG defined.
...
Make sure there is an extra 4 bytes for server done message when
NETSCAPE_HANG_BUG is defined.
PR#3361
(cherry picked from commit 92d81ba622 )
2014-06-01 14:27:58 +01:00
David Ramos
3329765bba
Initialise alg.
...
PR#3313
(cherry picked from commit 7e2c6f7eb0 )
2014-06-01 13:05:08 +01:00
Dr. Stephen Henson
87a0cbdf2e
Use correct digest when exporting keying material.
...
PR#3319
(cherry picked from commit 84691390eae86befd33c83721dacedb539ae34e6)
2014-05-30 13:24:36 +01:00
Dr. Stephen Henson
b5bdde9e0e
Don't compile heartbeat test code on Windows (for now).
...
(cherry picked from commit 2c575907d2c8601a18716f718ce309ed4e1f1783)
2014-05-30 13:12:26 +01:00
Dr. Stephen Henson
1788072b9e
Set version number correctly.
...
PR#3249
(cherry picked from commit 8909bf20269035d295743fca559207ef2eb84eb3)
2014-05-29 14:08:54 +01:00
František Bořánek
5f2b5e3823
Fix memory leak.
...
PR#3278
(cherry picked from commit de56fe797081fc09ebd1add06d6e2df42a324fd5)
2014-05-29 13:49:50 +01:00
Martin Kaiser
42d73874ed
remove duplicate 0x for default RSASSA-PSS salt len
...
(cherry picked from commit 3820fec3a09faecba7fe9912aa20ef7fcda8337b)
2014-05-29 13:32:41 +01:00
Matt Caswell
88d3d6c9ae
Fixed error in args for SSL_set_msg_callback and SSL_set_msg_callback_arg
2014-05-25 23:47:32 +01:00
Ben Laurie
3435ef467f
Only copy opensslconf.h at init time.
2014-05-24 15:48:24 +01:00
Andy Polyakov
c90c694bc4
vpaes-ppc.pl: comply with ABI.
...
(cherry picked from commit b83d09f552 )
2014-05-23 20:16:21 +02:00
Mike Bland
8db2ba4b84
Fix heartbeat_test for -DOPENSSL_NO_HEARTBEATS
...
Replaces the entire test with a trivial implementation when
OPENSSL_NO_HEARTBEATS is defined.
2014-05-22 22:02:46 +01:00
Ben Laurie
d77501d8fd
Check length first in BUF_strnlen().
2014-05-22 10:12:10 +01:00
Matt Caswell
15e4565984
Fixed minor copy&paste error, and stray space causing rendering problem
2014-05-22 00:11:40 +01:00
Matt Caswell
5757766550
Fixed unterminated B tag, causing build to fail with newer pod2man versions
2014-05-22 00:01:33 +01:00
Ben Laurie
4f7236edc7
Remove redundant test.
2014-05-21 12:03:50 +01:00
Ben Laurie
ed693e4332
Implement BUF_strnlen() and use it instead of strlen().
2014-05-21 11:56:21 +01:00
Viktor Dukhovni
a2219f6be3
Fixes to host checking.
...
Fixes to host checking wild card support and add support for
setting host checking flags when verifying a certificate
chain.
(cherry picked from commit 397a8e747d )
2014-05-21 11:32:19 +01:00
Dr. Stephen Henson
03b5b78c09
Fix for PKCS12_create if no-rc2 specified.
...
Use triple DES for certificate encryption if no-rc2 is
specified.
PR#3357
2014-05-21 11:28:57 +01:00
Dr. Stephen Henson
cd302feb5d
Change default cipher in smime app to des3.
...
PR#3357
(cherry picked from commit ca3ffd9670f2b589bf8cc04923f953e06d6fbc58)
2014-05-21 11:28:57 +01:00
Ben Laurie
5cd1a6fc3e
Fix signed/unsigned warning.
2014-05-20 15:14:30 +01:00
Ben Laurie
4ceb430a46
Don't allocate more than is needed in BUF_strndup().
2014-05-20 13:53:35 +01:00
Dr. Stephen Henson
81ce94f8dc
For portability use BUF_strndup instead of strndup.
...
(cherry picked from commit dcca7b13e9 )
2014-05-20 11:22:33 +01:00
Dr. Stephen Henson
feaa3b380b
Adding padding extension to trace code.
...
(cherry picked from commit 6db14dbc51 )
2014-05-20 11:22:15 +01:00
Janpopan
5d8e9f2ae0
Fix a wrong parameter count ERR_add_error_data
2014-05-19 22:15:27 +01:00
Ben Laurie
6c1d36a649
Merge branch 'mbland-heartbeat-test-1.0.2' into OpenSSL_1_0_2-stable
2014-05-19 18:04:41 +01:00
Mike Bland
2312a84ca1
Unit/regression test for TLS heartbeats.
...
Regression test against CVE-2014-0160 (Heartbleed).
More info: http://mike-bland.com/tags/heartbleed.html
(based on commit 35cb55988b75573105eefd00d27d0138eebe40b1)
2014-05-18 10:23:59 -04:00
Matt Caswell
a99d2a22e1
Moved note about lack of support for AEAD modes out of BUGS section to SUPPORTED CIPHERS section (bug has been fixed, but still no support for AEAD)
2014-05-15 21:15:21 +01:00
Dr. Stephen Henson
2fa65aa7d8
Enc doesn't support AEAD ciphers.
...
(cherry picked from commit 09184dddead165901700b31eb39d540ba30f93c5)
2014-05-15 14:16:45 +01:00
Jeffrey Walton
4907cf0845
Fix grammar error in verify pod. PR#3355
2014-05-14 22:58:19 +01:00
Jeffrey Walton
28b4820f70
Add information to BUGS section of enc documentation. PR#3354
2014-05-14 22:58:19 +01:00
Michal Bozon
72967d5be9
Corrected POD syntax errors. PR#3353
2014-05-14 22:58:19 +01:00
Mike Frysinger
4aebb2c8b8
Have the .pc files depend on each other rather than duplicating the
...
various link settings. PR#3332
2014-05-12 23:33:35 +01:00
Kurt Roeckx
1f5bce2dce
Check sk_SSL_CIPHER_num() after assigning sk.
2014-05-12 22:59:11 +01:00
Jean-Paul Calderone
b953b02849
Correct the return type on the signature for X509_STORE_CTX_get_ex_data given in the pod file.
2014-05-12 22:49:00 +01:00
Serguei E. Leontiev
d6e55b4001
Replace manual ASN1 decoder with ASN1_get_object
...
Replace manual ASN.1 decoder with ASN1_get object. This
will decode the tag and length properly and check against
it does not exceed the supplied buffer length.
PR#3335
(cherry picked from commit b0308dddd1cc6a8e1de803ef29ba6da25ee072c2)
2014-05-12 18:41:51 +01:00
Matt Caswell
f710c3f198
Fixed NULL pointer dereference. See PR#3321
2014-05-12 00:39:43 +01:00
Kurt Roeckx
99a3d167d9
Set authkey to NULL and check malloc return value.
2014-05-12 00:22:52 +01:00
Martin Brejcha
c622649513
dgram_sctp_ctrl: authkey memory leak
...
PR: 3327
2014-05-12 00:22:52 +01:00
Günther Noack
8571902e23
Avoid out-of-bounds write in SSL_get_shared_ciphers
...
PR: 3317
2014-05-11 23:55:06 +01:00
Viktor Dukhovni
711bb9bc88
Fix infinite loop. PR#3347
2014-05-11 21:09:56 +01:00
Matt Caswell
f2ebe2a60e
Move length check earlier to ensure we don't go beyond the end of the user's buffer. PR#3320
2014-05-11 11:32:17 +01:00
Tim Hudson
011ee91105
safety check to ensure we dont send out beyond the users buffer
2014-05-11 11:32:17 +01:00
Dr. Stephen Henson
2c4144638a
Return an error if no recipient type matches.
...
If the key type does not match any CMS recipient type return
an error instead of using a random key (MMA mitigation). This
does not leak any useful information to an attacker.
PR#3348
(cherry picked from commit bd43b4cf778a53ffa5d77510ecd408a009dc00d2)
2014-05-09 14:24:53 +01:00
Tim Hudson
2fc04cb872
coverity 966576 - close socket in error path
2014-05-08 23:22:28 +01:00
Tim Hudson
62cc5ff623
PR#3342 fix resource leak coverity issue 966577
2014-05-08 23:22:21 +01:00
Tim Hudson
afe343c3a7
fix coverity issue 966597 - error line is not always initialised
2014-05-07 23:57:00 +01:00
Matt Caswell
e0d2139045
Fixed NULL pointer dereference in PKCS7_dataDecode reported by David Ramos in PR#3339
2014-05-07 23:23:15 +01:00
Geoff Thorpe
d60f019321
dso: eliminate VMS code on non-VMS systems
...
Even though the meat of dso_vms.c is compiled out on non-VMS builds,
the (pre-)compiler still traverses some of the macro handling. This
trips up at least one non-VMS build configuration, so this commit
makes the skip-VMS case more robust.
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
2014-05-06 18:03:52 -04:00
Geoff Thorpe
65402586c0
evp: prevent underflow in base64 decoding
...
This patch resolves RT ticket #2608 .
Thanks to Robert Dugal for originally spotting this, and to David
Ramos for noticing that the ball had been dropped.
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
2014-05-06 18:02:02 -04:00
Geoff Thorpe
bf43446835
bignum: allow concurrent BN_MONT_CTX_set_locked()
...
The lazy-initialisation of BN_MONT_CTX was serialising all threads, as
noted by Daniel Sands and co at Sandia. This was to handle the case that
2 or more threads race to lazy-init the same context, but stunted all
scalability in the case where 2 or more threads are doing unrelated
things! We favour the latter case by punishing the former. The init work
gets done by each thread that finds the context to be uninitialised, and
we then lock the "set" logic after that work is done - the winning
thread's work gets used, the losing threads throw away what they've done.
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
2014-05-06 18:01:59 -04:00
Dr. Stephen Henson
7169e56d6b
Initialize num properly.
...
PR#3289
PR#3345
(cherry picked from commit 3ba1e406c2 )
2014-05-06 14:09:07 +01:00
Dr. Stephen Henson
1047b8c84d
Set Enveloped data version to 2 if ktri version not zero.
...
(cherry picked from commit 546b1b4384 )
2014-05-06 14:00:11 +01:00
Tim Hudson
9740a03695
- fix coverity issues 966593-966596
2014-05-06 00:04:59 +01:00
David Ramos
e34af3ec2b
Double free in i2o_ECPublicKey
...
PR: 3338
2014-05-04 00:50:42 +01:00
Jeff Trawick
d576146ebf
typo in SSL_get_peer_cert_chain docs
...
RT: 3304
2014-05-02 00:26:05 +01:00
Matt Caswell
7441e7dbe9
Fixed spelling error in error message. Fix supplied by Marcos Marado
2014-05-01 00:27:02 +01:00
Matt Caswell
1d3f432b53
Fixed various pod errors
2014-05-01 00:07:28 +01:00
Lubomir Rintel
15a4add72d
POD: Fix item numbering
...
Newer pod2man considers =item [1-9] part of a numbered list, while =item
0 starts an unnumbered list. Add a zero effect formatting mark to override
this.
doc/apps/smime.pod around line 315: Expected text after =item, not a
number
...
PR#3146
2014-04-30 23:44:54 +01:00
Geoff Thorpe
3cc546a3bb
bignum: fix boundary condition in montgomery logic
...
It's not clear whether this inconsistency could lead to an actual
computation error, but it involved a BIGNUM being passed around the
montgomery logic in an inconsistent state. This was found using flags
-DBN_DEBUG -DBN_DEBUG_RAND, and working backwards from this assertion
in 'ectest';
ectest: bn_mul.c:960: BN_mul: Assertion `(_bnum2->top == 0) ||
(_bnum2->d[_bnum2->top - 1] != 0)' failed
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
(cherry picked from commit a529261891 )
2014-04-30 11:53:09 -04:00
Geoff Thorpe
c434f7f80f
util/mkerr.pl: fix perl warning
...
Gets rid of this;
defined(@array) is deprecated at ../util/mkerr.pl line 792.
(Maybe you should just omit the defined()?)
defined(@array) is deprecated at ../util/mkerr.pl line 800.
(Maybe you should just omit the defined()?)
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
(cherry picked from commit 647f360e2e )
2014-04-30 11:52:08 -04:00
mancha
e6a01b47e4
Fix version documentation.
...
Specify -f is for compilation flags. Add -d to synopsis section.
(cherry picked from commit 006397ea62bbcae22c8664d53c2222b808c4bdd1)
Closes #78 .
2014-04-26 11:20:00 +01:00
mancha
3f1b3d9675
Fix eckey_priv_encode()
...
Fix eckey_priv_encode to return an error on failure of i2d_ECPrivateKey.
2014-04-24 19:31:49 +00:00
Steve Marquess
3e124d66c8
Add new sponsors
...
(cherry picked from commit 351f0a124bffaa94d2a8abdec2e7dde5ae9c457d)
2014-04-24 12:33:01 +01:00
Andy Polyakov
0fb3d5b4fd
bn/asm/armv4-gf2m.pl, modes/asm/ghash-armv4.pl: faster multiplication
...
algorithm suggested in following paper:
Câmara, D.; Gouvêa, C. P. L.; López, J. & Dahab, R.: Fast Software
Polynomial Multiplication on ARM Processors using the NEON Engine.
http://conradoplg.cryptoland.net/files/2010/12/mocrysen13.pdf
(cherry picked from commit f8cee9d081 )
2014-04-24 10:27:52 +02:00
Andy Polyakov
ffdff9f12f
aes/asm/bsaes-x86_64.pl: Atom-specific optimization.
...
(cherry picked from commit 558ff0f0c1 )
2014-04-24 10:14:46 +02:00
Ben Laurie
a0fe2e72c4
Fix use after free.
2014-04-23 07:30:16 +01:00
Ben Laurie
3b21abfd6c
Fix double frees.
...
Conflicts:
CHANGES
2014-04-22 17:00:52 +01:00
Kaspar Brand
5aeb43393b
Fix SSL_CTX_get{first,next}_certificate.
...
Fix typo that stopped SSL_CTX_get_{first,next}_certificate from working.
(cherry picked from commit 9330a85e04 )
2014-04-21 16:53:48 +01:00
Dr. Stephen Henson
6e85eba11b
Document -debug_decrypt option.
...
(cherry picked from commit 0dd5b94aeb )
2014-04-16 12:35:54 +01:00
Dr. Stephen Henson
5cd5e0219d
Extension checking fixes.
...
When looking for an extension we need to set the last found
position to -1 to properly search all extensions.
PR#3309.
(cherry picked from commit 300b9f0b70 )
2014-04-15 18:52:50 +01:00
Dr. Stephen Henson
9c1d63540f
Clarify CMS_decrypt behaviour.
...
(cherry picked from commit 5f8e9a477a )
2014-04-15 18:19:26 +01:00
Dr. Stephen Henson
db34be4224
Add new key fingerprint.
...
(cherry picked from commit 3143a332e8 )
2014-04-11 02:51:34 +01:00
Dr. Stephen Henson
b9ce05acc4
Fix free errors in ocsp utility.
...
Keep copy of any host, path and port values allocated by
OCSP_parse_url and free as necessary.
(cherry picked from commit 5219d3dd35 )
2014-04-09 15:45:16 +01:00
Steven M. Schweda
6ef9d9bacf
VMS build fix #2 .
...
(cherry picked from commit a74bee5fc7 )
2014-04-08 17:28:23 +01:00
Steven M. Schweda
40a44a7c3d
VMS build fix for older compilers.
...
(cherry picked from commit 55c9e24875 )
2014-04-07 23:15:31 +01:00
Dr. Stephen Henson
13738d5fa1
update CHANGES
2014-04-07 21:56:34 +01:00
Dr. Stephen Henson
363dede7a5
Update NEWS.
2014-04-07 21:32:56 +01:00
Dr. Stephen Henson
43866bd6fc
update NEWS
2014-04-07 19:29:04 +01:00
Dr. Stephen Henson
cd29ced6de
Return if ssleay_rand_add called with zero num.
...
Treat a zero length passed to ssleay_rand_add a no op: the existing logic
zeroes the md value which is very bad. OpenSSL itself never does this
internally and the actual call doesn't make sense as it would be passing
zero bytes of entropy.
Thanks to Marcus Meissner <meissner@suse.de > for reporting this bug.
(cherry picked from commit 5be1ae28ef )
2014-04-07 19:27:46 +01:00
Dr. Stephen Henson
7e840163c0
Add heartbeat extension bounds check.
...
A missing bounds check in the handling of the TLS heartbeat extension
can be used to reveal up to 64k of memory to a connected client or
server.
Thanks for Neel Mehta of Google Security for discovering this bug and to
Adam Langley <agl@chromium.org > and Bodo Moeller <bmoeller@acm.org > for
preparing the fix (CVE-2014-0160)
(cherry picked from commit 96db9023b8 )
2014-04-07 19:25:34 +01:00
Dr. Stephen Henson
a4896327e3
Document -verify_return_error option.
...
(cherry picked from commit 4e6c12f308 )
2014-04-07 13:03:54 +01:00
Andy Polyakov
f396e9f4fc
crypto/modes/gcm128.c: more strict aliasing fixes.
...
(cherry picked from commit 997d1aac7c )
2014-04-06 17:22:12 +02:00
Andy Polyakov
dacb698ada
vpaes-[x86_64|ppc].pl: fix typo, which for some reason triggers rkhunter.
...
(cherry picked from commit 6eebcf3459 )
2014-04-06 12:53:17 +02:00
Dr. Stephen Henson
6411b83e52
Set TLS padding extension value.
...
Enable TLS padding extension using official value from:
http://www.iana.org/assignments/tls-extensiontype-values/tls-extensiontype-values.xhtml
(cherry picked from commit cd6bd5ffda )
Conflicts:
CHANGES
2014-04-05 20:49:09 +01:00
Dr. Stephen Henson
bb98beade9
Use correct length when prompting for password.
...
Use bufsiz - 1 not BUFSIZ - 1 when prompting for a password in
the openssl utility.
Thanks to Rob Mackinnon, Leviathan Security for reporting this issue.
(cherry picked from commit 7ba08a4d73 )
2014-04-04 13:06:49 +01:00
Dr. Stephen Henson
b8d208c549
Update FAQ.
...
(cherry picked from commit 6cc0068430 )
2014-04-04 13:05:56 +01:00
Dr. Stephen Henson
04f35a8909
Document new crl option.
...
(cherry picked from commit dbb7654dc1 )
2014-04-03 13:35:48 +01:00
Tim Hudson
68bd06eb6e
Add option to generate old hash format.
...
New -hash_old to generate CRL hashes using old
(before OpenSSL 1.0.0) algorithm.
(cherry picked from commit de2d97cd79 )
2014-04-03 13:35:22 +01:00
Dr. Stephen Henson
686b616ea9
VMS build fix
2014-04-02 21:46:13 +01:00
Eric Young
0bb37c5e23
Fix base64 decoding bug.
...
A short PEM encoded sequence if passed to the BIO, and the file
had 2 \n following would fail.
PR#3289
(cherry picked from commit 10378fb5f4 )
2014-04-02 19:57:06 +01:00
Dr. Stephen Henson
e9b4b8afbd
Don't try and verify signatures if key is NULL (CVE-2013-0166)
...
Add additional check to catch this in ASN1_item_verify too.
(cherry picked from commit 66e8211c0b )
2014-04-01 16:39:35 +01:00
Dr. Stephen Henson
bc5ec653ba
Fix memory leak with client auth.
2014-03-27 16:10:50 +00:00
Dr. Stephen Henson
1f44dac24d
Add -no_resumption_on_reneg to SSL_CONF.
2014-03-27 15:51:25 +00:00
Dr. Stephen Henson
2dd6976f6d
Update chain building function.
...
Don't clear verification errors from the error queue unless
SSL_BUILD_CHAIN_FLAG_CLEAR_ERROR is set.
If errors occur during verification and SSL_BUILD_CHAIN_FLAG_IGNORE_ERROR
is set return 2 so applications can issue warnings.
2014-03-27 14:23:46 +00:00
Emilia Kasper
662239183d
Allow duplicate certs in ssl_build_cert_chain
2014-03-25 17:28:04 +00:00
Dr. Stephen Henson
66243398bb
Workaround for some CMS signature formats.
...
Some CMS SignedData structure use a signature algorithm OID such
as SHA1WithRSA instead of the RSA algorithm OID. Workaround this
case by tolerating the signature if we recognise the OID.
(cherry picked from commit 3a98f9cf20 )
2014-03-19 17:29:55 +00:00
Piotr Sikora
aa10982c49
Retry callback only after ClientHello received.
...
(cherry picked from commit f04665a653 )
2014-03-18 23:58:39 +00:00
Dr. Stephen Henson
8b0336c810
Update ordinals.
...
Use a previously unused value as we will be updating multiple released
branches.
(cherry picked from commit 0737acd2a8 )
2014-03-12 14:41:52 +00:00
Dr. Stephen Henson
0a9f7780e5
Fix for CVE-2014-0076
...
Fix for the attack described in the paper "Recovering OpenSSL
ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack"
by Yuval Yarom and Naomi Benger. Details can be obtained from:
http://eprint.iacr.org/2014/140
Thanks to Yuval Yarom and Naomi Benger for discovering this
flaw and to Yuval Yarom for supplying a fix.
(cherry picked from commit 2198be3483 )
Conflicts:
CHANGES
2014-03-12 14:23:21 +00:00
Dr. Stephen Henson
44f7e399d3
typo
...
(cherry picked from commit a029788b0e )
2014-03-10 15:48:12 +00:00
Dr. Stephen Henson
8419df95e1
Remove -WX option from debug-VC-WIN32
...
(cherry picked from commit 7a3e67f029969620966b8a627b8485d83692cca5)
2014-03-07 19:07:51 +00:00
Andy Polyakov
59314f304e
engines/ccgost/gosthash.c: simplify and avoid SEGV.
...
PR: 3275
(cherry picked from commit ea38f02049 )
2014-03-07 11:03:25 +01:00
Andy Polyakov
cc6dc9b229
SPARC T4 assembly pack: treat zero input length in CBC.
...
The problem is that OpenSSH calls EVP_Cipher, which is not as
protective as EVP_CipherUpdate. Formally speaking we ought to
do more checks in *_cipher methods, including rejecting
lengths not divisible by block size (unless ciphertext stealing
is in place). But for now I implement check for zero length in
low-level based on precedent.
PR: 3087, 2775
(cherry picked from commit 5e44c144e6 )
2014-03-07 10:48:51 +01:00
Andy Polyakov
fe69e6be6e
dh_check.c: check BN_CTX_get's return value.
...
(cherry picked from commit 53e5161231 )
2014-03-06 14:21:17 +01:00
Andy Polyakov
430c5ca02e
test/Makefile: allow emulated test (e.g. under wine) [from master].
...
Submitted by: Roumen Petrov
2014-03-06 14:09:58 +01:00
Andy Polyakov
25ebd9e3ce
bss_dgram.c,d1_lib.c: make it compile with mingw.
...
Submitted by: Roumen Petrov
(cherry picked from commit 972b0dc350 )
2014-03-06 14:07:16 +01:00
Dr. Stephen Henson
bdfc0e284c
For self signed root only indicate one error.
2014-03-03 23:33:51 +00:00
Dr. Stephen Henson
12c56e4888
Sync crypto documentation with master branch.
2014-03-03 15:12:17 +00:00
Dr. Stephen Henson
1bd4ee1da1
Use nid not cipher type as some ciphers don't have OIDs.
2014-03-02 15:00:21 +00:00
Dr. Stephen Henson
3956bfce60
Make null cipher work in FIPS mode.
2014-03-02 13:50:06 +00:00
Dr. Stephen Henson
8394109c89
Add new VMS hack symbol, update ordinals.
2014-03-02 13:50:06 +00:00
Dr. Stephen Henson
813cfd9c0a
Add additional FIPS digests.
...
Add a few special case digests not returned by FIPS_get_digestbynid().
Thanks to Roumen Petrov <openssl@roumenpetrov.info > for reporting this
issue.
2014-03-01 23:14:08 +00:00
Dr. Stephen Henson
976c58302b
Add function to free compression methods.
...
Although the memory allocated by compression methods is fixed and
cannot grow over time it can cause warnings in some leak checking
tools. The function SSL_COMP_free_compression_methods() will free
and zero the list of supported compression methods. This should
*only* be called in a single threaded context when an application
is shutting down to avoid interfering with existing contexts
attempting to look up compression methods.
2014-03-01 23:14:08 +00:00
Dr. Stephen Henson
b60272b01f
PKCS#8 support for alternative PRFs.
...
Add option to set an alternative to the default hmacWithSHA1 PRF
for PKCS#8 private key encryptions. This is used automatically
by PKCS8_encrypt if the nid specified is a PRF.
Add option to pkcs8 utility.
Update docs.
2014-03-01 23:14:08 +00:00
Dr. Stephen Henson
124d218889
Fix memory leak.
2014-03-01 23:14:08 +00:00
Andy Polyakov
cd077dab08
Makefile.org: fix syntax error on Solaris.
...
PR: 3271
(cherry picked from commit 65370f9bbc )
2014-02-28 22:55:44 +01:00
Dr. Stephen Henson
d1201e3195
Fix compilation errors with no-nextprotoneg
2014-02-28 13:35:30 +00:00
Dr. Stephen Henson
5f2329b82a
Fix fips flag handling.
...
Don't set the fips flags in cipher and digests as the implementations
aren't suitable for FIPS mode and will be redirected to the FIPS module
versions anyway.
Return EVP_CIPH_FLAG_FIPS or EVP_MD_FLAG_FIPS if a FIPS implementation
exists when calling EVP_CIPHER_flags and EVP_MD_flags repectively.
Remove unused FIPS code from e_aes.c: the 1.0.2 branch will never be
used to build a FIPS module.
2014-02-27 19:18:58 +00:00
Dr. Stephen Henson
01fb5e133f
Remove unused file.
...
The file evp_fips.c isn't used in OpenSSL 1.0.2 as FIPS and non-FIPS
implementations of algorithms can coexist.
2014-02-27 19:08:53 +00:00
Andy Polyakov
fd2c85f6ae
evp/e_aes.c: harmonize with 1.0.1.
2014-02-27 17:47:23 +01:00
Andy Polyakov
41977c2e04
Configure: mark unixware target as elf-1.
...
(cherry picked from commit 4ca026560a )
2014-02-27 14:32:46 +01:00
Andy Polyakov
ca88a1d439
perlasm/x86asm.pl: recognize elf-1 denoting old ELF platforms.
...
(cherry picked from commit b62a4a1c0e )
2014-02-27 14:30:42 +01:00
Andy Polyakov
5615196f7b
perlasm/x86gas.pl: limit special OPENSSL_ia32cap_P treatment to ELF.
...
(cherry picked from commit ce876d8316 )
2014-02-27 14:29:07 +01:00
Andy Polyakov
1f59eb5f11
rc4/asm/rc4-586.pl: allow for 386-only build.
...
(cherry picked from commit f861b1d433 )
2014-02-27 14:28:54 +01:00
Andy Polyakov
4bf6d66e67
des/asm/des-586.pl: shortcut reference to DES_SPtrans.
...
(cherry picked from commit fd361a67ef )
2014-02-27 14:28:44 +01:00
Andy Polyakov
2f34088e5e
Makefile.org: mask touch's exit code
...
[but don't let it mask make's].
PR: 3269
2014-02-27 12:35:02 +01:00
Andy Polyakov
559e69f9b4
crypto/Makefile: make it OSF-make-friendly
...
PR: 3165
2014-02-26 16:42:57 +01:00
Rob Stradling
f3b7e522d8
CABForum EV OIDs for Subject Jurisdiction of Incorporation or Registration.
...
(cherry picked from commit ffcc832ba6e17859d45779eea87e38467561dd5d)
2014-02-26 15:33:10 +00:00
Dr. Stephen Henson
73be56a21d
Fix for WIN32 builds with KRB5
2014-02-26 15:33:10 +00:00
Andy Polyakov
d00ae7cf70
sha/asm/sha256-586.pl: don't try to compile SIMD with no-sse2.
...
(cherry picked from commit d49135e7ea )
2014-02-26 10:23:56 +01:00
Andy Polyakov
f92926e331
sha/asm/sha512-x86_64.pl: fix compilation error on Solaris.
...
(cherry picked from commit 147cca8f53 )
2014-02-26 09:31:40 +01:00
Andy Polyakov
241c8004ce
Configure: blended processor target in solaris-x86-cc.
...
(cherry picked from commit 7bb9d84e35 )
2014-02-26 09:31:26 +01:00
Andy Polyakov
8d08627c94
ssl/t1_enc.c: check EVP_MD_CTX_copy return value.
...
PR: 3201
(cherry picked from commit 03da57fe14 )
2014-02-25 22:23:49 +01:00
Andy Polyakov
aa1bb606f3
aes/asm/vpaes-ppc.pl: fix traceback info.
...
(cherry picked from commit e704741bf3 )
2014-02-25 20:13:41 +01:00
Zoltan Arpadffy
dabd4f1986
OpenVMS fixes.
2014-02-25 15:16:03 +00:00
Dr. Stephen Henson
251c47001b
update NEWS with v3_scts.c issue
2014-02-25 15:08:45 +00:00
Dr. Stephen Henson
3678161d71
Don't use BN_ULLONG in n2l8 use SCTS_TIMESTAMP.
2014-02-25 15:05:08 +00:00
Dr. Stephen Henson
6634416732
Fix for v3_scts.c
...
Not all platforms define BN_ULLONG. Define SCTS_TIMESTAMP as a type
which should work on all platforms.
2014-02-25 14:54:09 +00:00
Dr. Stephen Henson
7101fd705c
update NEWS
2014-02-25 13:56:40 +00:00
Dr. Stephen Henson
0f9bcf3319
Avoid Windows 8 Getversion deprecated errors.
...
Windows 8 SDKs complain that GetVersion() is deprecated.
We only use GetVersion like this:
(GetVersion() < 0x80000000)
which checks if the Windows version is NT based. Use a macro check_winnt()
which uses GetVersion() on older SDK versions and true otherwise.
(cherry picked from commit a4cc3c8041 )
2014-02-25 13:41:53 +00:00
Rob Stradling
a948732e1c
Parse non-v1 SCTs less awkwardly.
...
(cherry picked from commit 19f65ddbab )
2014-02-25 13:04:21 +00:00
Andy Polyakov
c3006e0f5a
util/pl/VC-32.pl: harmonize with 1.0.1 and fix typo.
2014-02-25 13:41:40 +01:00
Andy Polyakov
efe835eb5a
ms/do_win64a.bat: forward to NUL, not NUL:.
...
Allegedly formwarding to NUL: sometimes creates NUL file in file
system.
PR: 3250
(cherry picked from commit 63aff3001e )
2014-02-24 19:37:48 +01:00
Dr. Stephen Henson
ab03ead035
we need /MD for fips builds
2014-02-24 18:21:35 +00:00
Dr. Stephen Henson
6a6e08960e
Update NEWS with known issue.
2014-02-24 16:31:44 +00:00
Andy Polyakov
aedabeee3a
BC-32.pl: refresh Borland C support.
...
PR: 3251
Suggested by: Thorsten Schning
(cherry picked from commit 779c51c644 )
2014-02-24 16:45:15 +01:00
Andy Polyakov
83fe7b9c83
x509/by_dir.c: fix run-away pointer (and potential SEGV)
...
when adding duplicates in add_cert_dir.
PR: 3261
Reported by: Marian Done
(cherry picked from commit 758954e0d8 )
2014-02-24 15:21:37 +01:00
Dr. Stephen Henson
97654d7e28
Prepare for 1.0.2-beta2-dev
2014-02-24 13:52:51 +00:00
Dr. Stephen Henson
94f4166017
Prepare for 1.0.2-beta1 release
2014-02-24 13:51:34 +00:00
Dr. Stephen Henson
a74c9c9e10
OpenSSL 1.0.2 is now in beta
2014-02-24 13:50:38 +00:00
Dr. Stephen Henson
d2a3c4497f
make update
2014-02-24 13:50:38 +00:00
Andy Polyakov
a129850922
config: recognize ARMv8/AArch64 target.
...
(cherry picked from commit d099f0ed6c )
2014-02-24 13:21:14 +01:00
Dr. Stephen Henson
c3f5d3d93a
Only set current certificate to valid values.
...
When setting the current certificate check that it has a corresponding
private key.
(cherry picked from commit 358d352aa2 )
2014-02-23 13:49:21 +00:00
Dr. Stephen Henson
c5ea65b157
New chain building flags.
...
New flags to build certificate chains. The can be used to rearrange
the chain so all an application needs to do is add all certificates
in arbitrary order and then build the chain to check and correct them.
Add verify error code when building chain.
Update docs.
(cherry picked from commit 13dc3ce9ab )
2014-02-23 13:49:21 +00:00
Dr. Stephen Henson
58b86e4235
Option to set current cert to server certificate.
...
(cherry picked from commit daddd9a950 )
2014-02-23 13:49:21 +00:00
Ben Laurie
a466be6243
Fix typo.
2014-02-23 11:21:39 +00:00
Ben Laurie
60327ce41a
Add debug flag.
2014-02-23 11:21:28 +00:00
Andy Polyakov
2d4d9623da
aes/asm/aesni-x86[_64].pl: minor Atom-specific performance tweak.
...
(cherry picked from commit 214368ffee )
2014-02-21 12:15:07 +01:00
Andy Polyakov
6b3b6beaa1
ssl/ssl_cert.c: DANE update.
2014-02-21 12:12:25 +01:00
Dr. Stephen Henson
7743be3aac
make update
2014-02-20 22:57:24 +00:00
Dr. Stephen Henson
b709f8ef54
fix WIN32 warnings
2014-02-20 22:41:06 +00:00
Rob Stradling
c74ce24cd2
Show the contents of the RFC6962 Signed Certificate Timestamp List Certificate/OCSP Extensions.
...
Add the RFC6962 OIDs to the objects table.
(backport from master branch)
2014-02-20 21:43:54 +00:00
Dr. Stephen Henson
612566e752
Don't use CRYPTO_AES_CTR if it isn't defined.
...
(cherry picked from commit 6ecbc2bb62 )
2014-02-18 22:21:41 +00:00
Dr. Stephen Henson
3ecce3dbeb
Don't use getcwd in non-copy builds.
...
(cherry picked from commit f3a3903260 )
2014-02-15 20:17:59 +00:00
Dr. Stephen Henson
71eca86c30
Don't override $srcd for non copy builds.
2014-02-15 20:16:13 +00:00
Dr. Stephen Henson
dd1e3bd8d4
recognise multiblock
2014-02-15 18:19:35 +00:00
Dr. Stephen Henson
c55fef76f7
Add /fixed flag for FIPS links where appropriate.
2014-02-15 17:16:19 +00:00
Dr. Stephen Henson
eb70d4407f
Remove duplicate statement.
...
(cherry picked from commit 5a7652c3e5 )
2014-02-15 01:29:24 +00:00
Klaus-Peter Junghanns
b335b5440a
Add support for aes-128/192/256-ctr to the cryptodev engine.
...
This can be used to speed up SRTP with libsrtp, e.g. on TI omap/sitara based devices.
(cherry picked from commit be2c4d9bd9 )
2014-02-15 00:06:43 +00:00
Kurt Roeckx
a8eeedb603
Use defaults bits in req when not given
...
If you use "-newkey rsa" it's supposed to read the default number of bits from the
config file. However the value isn't used to generate the key, but it does
print it's generating such a key. The set_keygen_ctx() doesn't call
EVP_PKEY_CTX_set_rsa_keygen_bits() and you end up with the default set in
pkey_rsa_init() (1024). Afterwards the number of bits gets read from the config
file, but nothing is done with that anymore.
We now read the config first and use the value from the config file when no size
is given.
PR: 2592
(cherry picked from commit 3343220327 )
2014-02-14 22:35:15 +00:00
Kurt Roeckx
b3d8de7903
Fix additional pod errors with numbered items.
...
(cherry picked from commit e547c45f1c )
2014-02-14 22:35:15 +00:00
Scott Schaefer
0413ea5801
Fix various spelling errors
...
(cherry picked from commit 2b4ffc659e )
2014-02-14 22:35:15 +00:00
Scott Schaefer
2f6fba6772
Document pkcs12 -password behavior
...
apps/pkcs12.c accepts -password as an argument. The document author
almost certainly meant to write "-password, -passin".
However, that is not correct, either. Actually the code treats
-password as equivalent to -passin, EXCEPT when -export is also
specified, in which case -password as equivalent to -passout.
(cherry picked from commit 856c6dfb09 )
2014-02-14 22:35:15 +00:00
Dr. Stephen Henson
d69acceca9
Fix error discrepancy with 1.0.1
2014-02-14 17:50:20 +00:00
Andy Polyakov
aff78bb39a
ssl/s3_pkt.c: detect RAND_bytes error in multi-block.
...
(cherry picked from commit 701134320a )
2014-02-14 17:45:33 +01:00
Andy Polyakov
104c032b7b
x86[_64]cpuid.pl: add low-level RDSEED.
...
(cherry picked from commit f4d456408d )
2014-02-14 17:25:14 +01:00
Andy Polyakov
b347341c75
aes/asm/aesni-x86_64.pl: further optimization for Atom Silvermont.
...
Improve CBC decrypt and CTR by ~13/16%, which adds up to ~25/33%
improvement over "pre-Silvermont" version. [Add performance table to
aesni-x86.pl].
(cherry picked from commit 5599c7331b )
2014-02-14 17:17:39 +01:00
Dr. Stephen Henson
c00f8d697a
Include self-signed flag in certificates by checking SKID/AKID as well
...
as issuer and subject names. Although this is an incompatible change
it should have little impact in pratice because self-issued certificates
that are not self-signed are rarely encountered.
(cherry picked from commit b1efb7161f )
2014-02-14 15:27:30 +00:00
Dr. Stephen Henson
b07e4f2f46
Include TA in checks/callback with partial chains.
...
When a chain is complete and ends in a trusted root checks are also
performed on the TA and the callback notified with ok==1. For
consistency do the same for chains where the TA is not self signed.
(cherry picked from commit 385b348666 )
2014-02-14 15:12:53 +00:00
Dr. Stephen Henson
ced6dc5cef
Add cert_self_signed function to simplify verify
...
(from master)
2014-02-14 15:12:52 +00:00
Dr. Stephen Henson
bf2d129194
Simplify X509_STORE_CTX_get1_chain (from master).
2014-02-14 15:12:52 +00:00
Andy Polyakov
d59d0b7c21
ssl/ssl[3].h: retain binary compatibility.
2014-02-13 17:03:14 +01:00
Andy Polyakov
dbd512e1b7
Configure: restore binary compatibility in darwin64-x86_64-cc.
...
(and remove duplicates).
2014-02-13 15:23:36 +01:00
Andy Polyakov
fcc6f699e3
evp/e_aes_cbc_hmac_sha*.c: improve cache locality.
...
(cherry picked from commit 9587429fa0 )
2014-02-13 14:41:10 +01:00
Andy Polyakov
7078d93307
ghash-x86[_64].pl: ~15% improvement on Atom Silvermont
...
(other processors unaffected).
(cherry picked from commit 98e143f118 )
2014-02-13 14:38:59 +01:00
Dr. Stephen Henson
a2317c3ffd
fix error discrepancy
2014-02-09 21:12:12 +00:00
Dr. Stephen Henson
75917fac8e
Make upate.
...
Revert libssl ordinals to OpenSSL 1.0.1 values first to tidy up and
avoid entries for deleted functions.
2014-02-09 19:59:54 +00:00
Dr. Stephen Henson
295fd057ce
fix error number clash
2014-02-09 19:57:27 +00:00
Ben Laurie
8c4e09f74f
Whitespace fixes.
2014-02-09 19:31:07 +00:00
Ben Laurie
e32cbae224
Merge branch '102_stable_tlsext_suppdata_changes' of git://github.com/scottdeboy/openssl into scottdeboy-102_stable_tlsext_suppdata_changes
2014-02-09 19:17:42 +00:00
Scott Deboy
f6fd8db2a4
Restore copyright symbol - ISO-8859-1 encoding for Configure file
2014-02-09 08:26:04 -08:00
Ben Laurie
d65db21976
Const fix.
2014-02-09 08:07:16 -08:00
Ben Laurie
8acf1ff4b4
More cleanup.
...
(cherry picked from commit 5eda213ebe )
Conflicts:
apps/s_client.c
apps/s_server.c
2014-02-09 08:07:04 -08:00
Ben Laurie
8b41df41c2
Make it build.
...
(cherry picked from commit a6a48e87bc )
Conflicts:
ssl/s3_clnt.c
ssl/t1_lib.c
2014-02-09 08:02:40 -08:00
Scott Deboy
c32ebefaa8
Reverting 1.0.2-only changes supporting the prior authz RFC5878-based tests from commit 835d104f46
2014-02-09 07:49:44 -08:00
Ben Laurie
ed0dc93d89
Add new asm modules.
2014-02-09 12:18:16 +00:00
Scott Deboy
5a32dd8930
Don't break out of the custom extension callback loop - continue instead
...
The contract for custom extension callbacks has changed - all custom extension callbacks are triggered
2014-02-08 16:19:30 -08:00
Ben Laurie
130ebe34c8
Fix whitespace, new-style comments.
2014-02-08 16:19:30 -08:00
Scott Deboy
7612511b3b
Re-add alert variables removed during rebase
...
Whitespace fixes
(cherry picked from commit e9add063b5 )
Conflicts:
ssl/s3_clnt.c
2014-02-08 16:19:01 -08:00
Scott Deboy
19a28a8aa3
Updating DTCP authorization type to expected value
2014-02-08 16:18:11 -08:00
Scott Deboy
fc213217e8
Update custom TLS extension and supplemental data 'generate' callbacks to support sending an alert.
...
If multiple TLS extensions are expected but not received, the TLS extension and supplemental data 'generate' callbacks are the only chance for the receive-side to trigger a specific TLS alert during the handshake.
Removed logic which no-op'd TLS extension generate callbacks (as the generate callbacks need to always be called in order to trigger alerts), and updated the serverinfo-specific custom TLS extension callbacks to track which custom TLS extensions were received by the client, where no-ops for 'generate' callbacks are appropriate.
(cherry picked from commit ac20719d99 )
Conflicts:
ssl/t1_lib.c
2014-02-08 16:17:24 -08:00
Trevor Perrin
7198c5af1f
Redo deletion of some serverinfo code that supplemental data code mistakenly reinstated.
2014-02-08 16:15:10 -08:00
Scott Deboy
40632f6b77
Free generated supp data after handshake completion, add comment regarding use of num_renegotiations in TLS and supp data generation callbacks
...
(cherry picked from commit 67c408cee9 )
Conflicts:
apps/s_client.c
apps/s_server.c
2014-02-08 16:14:23 -08:00
Scott Deboy
038bec784e
Add callbacks supporting generation and retrieval of supplemental data entries, facilitating RFC 5878 (TLS auth extensions)
...
Removed prior audit proof logic - audit proof support was implemented using the generic TLS extension API
Tests exercising the new supplemental data registration and callback api can be found in ssltest.c.
Implemented changes to s_server and s_client to exercise supplemental data callbacks via the -auth argument, as well as additional flags to exercise supplemental data being sent only during renegotiation.
(cherry picked from commit 36086186a9 )
Conflicts:
Configure
apps/s_client.c
apps/s_server.c
ssl/ssl.h
ssl/ssl3.h
ssl/ssltest.c
2014-02-08 16:12:15 -08:00
Dr. Stephen Henson
f407eec799
make update
2014-02-06 14:31:09 +00:00
Dr. Stephen Henson
bd618bebbe
update default depflags
2014-02-06 14:28:49 +00:00
Andy Polyakov
e2884b3e9a
Configure: recognize experimental-multiblock.
...
(cherry picked from commit 2d752737c5 )
2014-02-06 14:26:01 +00:00
Dr. Stephen Henson
c41e242e5c
Return previous compression methods when setting them.
...
(cherry picked from commit b45e874d7c )
2014-02-06 13:58:18 +00:00
Andy Polyakov
9578319394
ssl/s3_pkt.c: add multi-block processing [from master].
2014-02-05 21:43:17 +01:00
Andy Polyakov
16eaca2c79
config: recognize little-endian Linux PPC64.
2014-02-05 20:36:11 +01:00
Dr. Stephen Henson
3bff195dca
Oops, get selection logic right.
...
(cherry picked from commit 3880579240d476d21f68fd01a391dd325920f479)
2014-02-05 18:57:23 +00:00
Andy Polyakov
41cf2d2518
evp/e_aes_cbc_hmac_sha[1|256].c: add multi-block implementations [from master].
2014-02-05 19:52:38 +01:00
Dr. Stephen Henson
e0d4272a58
Return per-certificate chain if extra chain is NULL.
...
If an application calls the macro SSL_CTX_get_extra_chain_certs
return either the old "shared" extra certificates or those associated
with the current certificate.
This means applications which call SSL_CTX_use_certificate_chain_file
and retrieve the additional chain using SSL_CTX_get_extra_chain_certs
will still work. An application which only wants to check the shared
extra certificates can call the new macro
SSL_CTX_get_extra_chain_certs_only
(cherry picked from commit a51f767645 )
2014-02-05 17:06:56 +00:00
Andy Polyakov
41c373fa3e
[aesni|sha*]-mb-x86_64.pl: add multi-block assembly modules [from master].
2014-02-05 14:33:44 +01:00
Dr. Stephen Henson
7f6e09b531
Add quotes as CC can contain spaces.
...
PR#3253
2014-02-03 14:13:04 +00:00
Dr. Stephen Henson
e2f06800bc
New ctrl to set current certificate.
...
New ctrl sets current certificate based on certain criteria. Currently
two options: set the first valid certificate as current and set the
next valid certificate as current. Using these an application can
iterate over all certificates in an SSL_CTX or SSL structure.
(cherry picked from commit 0f78819c8c )
2014-02-02 23:12:06 +00:00
Dr. Stephen Henson
1180833643
Fix various typos.
...
(cherry picked from commit f3efeaad54 )
2014-02-02 23:12:06 +00:00
Dr. Stephen Henson
130eed01cc
Update demo.
...
(cherry picked from commit 88c21c47a3 )
2014-02-02 23:06:16 +00:00
Dr. Stephen Henson
2ded87355f
Update demos/bio/README
...
(cherry picked from commit ea131a0644 )
2014-02-02 23:05:52 +00:00
Dr. Stephen Henson
b1ae02e2ff
Modify sample accept.cnf
...
(cherry picked from commit d80b0eeee5 )
2014-02-02 23:05:34 +00:00
Dr. Stephen Henson
381417089a
Add demo for SSL server using SSL_CONF.
...
(cherry picked from commit ebd14bfce9 )
2014-02-02 23:05:15 +00:00
Ben Laurie
984a30423d
Add extension free function.
2014-02-02 15:22:47 +00:00
Andy Polyakov
2ad673c611
engines/e_capi.c: TCHAR support (cumilative update from master).
2014-02-02 00:17:38 +01:00
Andy Polyakov
0693dd954e
modes/asm/ghash-s390x.pl: +15% performance improvement on z10.
...
(cherry picked from commit d162584b11 )
2014-02-02 00:10:41 +01:00
Andy Polyakov
9071b36d9a
Add AES-NI+SHA256 stitch registrations (from master).
2014-02-02 00:05:02 +01:00
Andy Polyakov
eb6af20d2e
dso/dso_win32.c: fix compiler warning.
...
(cherry picked from commit 0a2d5003df )
2014-02-01 23:32:19 +01:00
Andy Polyakov
8087969c5b
crypto/cryptlib.c: remove stdio dependency (update from master).
2014-02-01 23:27:49 +01:00
Andy Polyakov
cb437c66d1
camellia/asm/cmll-x86_64.pl: fix symptomless bugs (update from master).
2014-02-01 23:14:33 +01:00
Ben Laurie
40b0d0765e
Remove redundant accessor (you can do the same thing, and more, with
...
X509_ALGOR_[gs]et0()).
2014-02-01 22:03:40 +00:00
Andy Polyakov
41235f30fb
util/pl/VC-32.pl fix typo.
...
(cherry picked from commit fb0a520897 )
2014-02-01 22:55:25 +01:00
Andy Polyakov
130c15ef5a
util/pl/VC-32.pl: refresh, switch to ws2, add crypt32, fix typo (based on
...
suggestions from Pierre Delaage).
(cherry picked from commit 668bcfd5ca )
Resolved conflicts:
util/pl/VC-32.pl
2014-02-01 22:53:24 +01:00
Andy Polyakov
2cc5142fb1
Improve WINCE support.
...
Submitted by: Pierre Delaage
(cherry picked from commit a006fef78e )
Resolved conflicts:
crypto/bio/bss_dgram.c
ssl/d1_lib.c
util/pl/VC-32.pl
2014-02-01 22:48:56 +01:00
Andy Polyakov
d451ece4e7
b_sock.c: make getsockopt work in cases when optlen is 64-bit value.
...
(cherry picked from commit 80c42f3e0c )
2014-02-01 22:33:02 +01:00
Andy Polyakov
1121ba1b74
wp-mmx.pl: ~10% performance improvement.
...
(cherry picked from commit ae007d4d09 )
2014-02-01 22:27:07 +01:00
Andy Polyakov
1fb039fde2
wp-x86_64.pl: ~10% performance improvement.
...
(cherry picked from commit 701d593f70 )
2014-02-01 22:26:45 +01:00
Andy Polyakov
3073927e42
sha512-ia64.pl: 15-20% performance improvement.
...
(cherry picked from commit 46a2b3387a )
2014-02-01 22:21:57 +01:00
Andy Polyakov
b6c2029931
objxref.pl: improve portability.
...
(cherry picked from commit 71fa3bc5ec )
2014-02-01 22:17:36 +01:00
Adam Langley
45d010255f
Add volatile qualifications to two blocks of inline asm to stop GCC from
...
eliminating them as dead code.
Both volatile and "memory" are used because of some concern that the compiler
may still cache values across the asm block without it, and because this was
such a painful debugging session that I wanted to ensure that it's never
repeated.
(cherry picked from commit 7753a3a684 )
2014-02-01 22:01:46 +01:00
Andy Polyakov
7e569022c5
PPC assembly pack: ppc64-mont update from master.
2014-02-01 21:51:51 +01:00
Andy Polyakov
50f1b47c7f
PPC assembly pack: jumbo update from master.
...
Add Vector Permutation AES and little-endian support.
2014-02-01 21:48:31 +01:00
Andy Polyakov
5572bc4e2f
crypto/aes/asm/aesni-x86[_64].pl: jumbo update from master.
2014-02-01 21:27:46 +01:00
Andy Polyakov
729d334106
crypto/sha/asm/sha1-x86_64.pl: jumbo update from master.
2014-02-01 21:24:55 +01:00
Ben Laurie
cacdfcb247
Add more accessors.
2014-02-01 18:30:23 +00:00
Ben Laurie
519ad9b384
Add accessor for x509.cert_info.
2014-02-01 18:30:23 +00:00
Ben Laurie
7b2d785d20
Fix warning.
2014-01-29 17:57:32 +01:00
Dr. Stephen Henson
f2d678e6e8
Clarify docs.
...
Remove reference to ERR_TXT_MALLOCED in the error library as that is
only used internally. Indicate that returned error data must not be
freed.
2014-01-29 00:59:35 +00:00
Dr. Stephen Henson
448e9b7cf1
typo
...
(cherry picked from commit cb2182676b )
2014-01-28 15:36:15 +00:00
Dr. Stephen Henson
2c4c9867e7
Fix demo comment: 0.9.9 never released.
...
(cherry picked from commit 717cc85895 )
2014-01-28 15:17:32 +00:00
Dr. Stephen Henson
a99540a6de
Check i before r[i].
...
PR#3244
(cherry picked from commit 9614d2c676 )
2014-01-28 15:14:47 +00:00
Dr. Stephen Henson
9614ed695d
Add loaded dynamic ENGINEs to list.
...
Always add a dynamically loaded ENGINE to list. Otherwise it can cause
problems when multiply loaded, especially if it adds new public key methods.
For all current engines we only want a single implementation anyway.
(cherry picked from commit e933f91f50 )
2014-01-28 13:57:14 +00:00
Dr. Stephen Henson
aabfee601e
Certificate callback doc.
...
(cherry picked from commit 46ab9bbd7f )
2014-01-28 13:38:55 +00:00
Dr. Stephen Henson
cee1d9e02f
make update
2014-01-27 14:59:46 +00:00
Dr. Stephen Henson
285f7fb0f9
Add cert callback retry test.
...
(cherry picked from commit 3323314fc1 )
2014-01-27 14:41:38 +00:00
Dr. Stephen Henson
ede90b1121
Support retries in certificate callback
...
(cherry picked from commit 0ebc965b9c )
Conflicts:
ssl/s3_srvr.c
ssl/ssl3.h
2014-01-27 14:41:38 +00:00
Dr. Stephen Henson
5e7329d156
Compare encodings in X509_cmp as well as hash.
...
(cherry picked from commit ec492c8a5a )
2014-01-27 14:33:10 +00:00
Dr. Stephen Henson
9f1979b94a
New function to set compression methods so they can be safely freed.
...
(cherry picked from commit cbb6744827 )
2014-01-27 14:32:44 +00:00
Dr. Stephen Henson
3fcf327e26
Add -engine_impl option to dgst which will use an implementation of
...
an algorithm from the supplied engine instead of just the default one.
(cherry picked from commit bb845ee044 )
2014-01-23 18:35:42 +00:00
Dr. Stephen Henson
3f4742b48c
make update
2014-01-23 17:13:37 +00:00
Dr. Stephen Henson
c4f01c533b
Add new function SSL_CTX_get_ssl_method().
...
Partial fix for PR#3183.
(cherry picked from commit ba168244a1 )
2014-01-16 14:08:42 +00:00
Kaspar Brand
b7a8550988
Omit initial status request callback check.
...
PR#3178
(cherry picked from commit d0b039d4a3 )
2014-01-16 13:48:23 +00:00
Zoltan Arpadffy
e775891708
VMS fixes
2014-01-11 22:44:04 +00:00
Jeff Trawick
ae6fbb5df0
typo
...
(cherry picked from commit 5edce5685f )
2014-01-10 23:02:46 +00:00
Jeff Trawick
f9c1f03754
typo
...
(cherry picked from commit 4b64e0cbdb )
2014-01-10 23:02:20 +00:00
Dr. Stephen Henson
50701af9d5
Fix bug in X509_V_FLAG_IGNORE_CRITICAL CRL handling.
...
(cherry picked from commit 8f4077ca69 )
2014-01-09 22:53:50 +00:00
Dr. Stephen Henson
1d6af3d430
update NEWS
2014-01-09 22:50:07 +00:00
Andy Polyakov
392fd8f89c
bn/asm/x86_64-mont5.pl: fix compilation error on Solaris.
...
(cherry picked from commit eedab5241e )
2014-01-09 13:47:53 +01:00
Dr. Stephen Henson
802db0fab2
Sync CHANGES
2014-01-07 15:41:11 +00:00
Dr. Stephen Henson
2f972419a3
Add fix for CVE-2013-4353
2014-01-07 15:41:11 +00:00
Dr. Stephen Henson
a05a2c67ef
Update NEWS.
2014-01-07 15:41:04 +00:00
Andy Polyakov
e34140620e
sha/asm/sha256-armv4.pl: add NEON code path.
...
(and shave off cycle even from integer-only code)
(cherry picked from commit ad0d2579cf )
2014-01-04 18:06:36 +01:00
Andy Polyakov
acd9121085
aesni-sha1-x86_64.pl: harmonize [Atom-specific optimizations] with master branch.
2014-01-04 17:42:13 +01:00
Dr. Stephen Henson
b17d6b8d1d
Restore SSL_OP_MSIE_SSLV2_RSA_PADDING
...
The flag SSL_OP_MSIE_SSLV2_RSA_PADDING hasn't done anything since OpenSSL
0.9.7h but deleting it will break source compatibility with any software
that references it. Restore it but #define to zero.
2014-01-04 13:58:51 +00:00
Dr. Stephen Henson
b9fa413a08
Use algorithm specific chains for certificates.
...
Fix a limitation in SSL_CTX_use_certificate_chain_file(): use algorithm
specific chains instead of the shared chain.
Update docs.
(cherry picked from commit a4339ea3ba )
Conflicts:
CHANGES
2014-01-03 22:45:20 +00:00
Andy Polyakov
4abe148444
ssl/t1_enc.c: optimize PRF (suggested by Intel).
...
(cherry picked from commit e8b0dd57c0 )
2014-01-03 21:56:03 +01:00
Dr. Stephen Henson
04d6940436
update NEWS
2014-01-02 19:12:47 +00:00
Dr. Stephen Henson
8511b5f594
Don't change version number if session established
...
When sending an invalid version number alert don't change the
version number to the client version if a session is already
established.
Thanks to Marek Majkowski for additional analysis of this issue.
PR#3191
(cherry picked from commit b77b58a398 )
2014-01-02 15:07:51 +00:00
Dr. Stephen Henson
546d6760b9
Update curve list size.
2013-12-29 16:30:34 +00:00
Andy Polyakov
ccbb8d5e95
sparcv9cap.c: omit random detection.
...
PR: 3202
(cherry picked from commit 926725b3d7 )
2013-12-28 13:32:45 +01:00
Andy Polyakov
d7d7e7b038
ARM assembly pack: make it work with older toolchain.
...
(cherry picked from commit 2218c296b4 )
2013-12-28 12:18:11 +01:00
Dr. Stephen Henson
80b6d97585
Fix DTLS retransmission from previous session.
...
For DTLS we might need to retransmit messages from the previous session
so keep a copy of write context in DTLS retransmission buffers instead
of replacing it after sending CCS. CVE-2013-6450.
(cherry picked from commit 34628967f1 )
2013-12-20 23:25:41 +00:00
Dr. Stephen Henson
ff64ab32ae
Ignore NULL parameter in EVP_MD_CTX_destroy.
...
(cherry picked from commit a6c62f0c25 )
2013-12-20 23:24:26 +00:00
Andy Polyakov
fc9c9e47f7
sha1-x86_64.pl: harmonize Win64 SE handlers for SIMD code pathes.
...
(and ensure stack alignment in the process)
(cherry picked from commit fc0503a25c )
2013-12-18 22:57:14 +01:00
Andy Polyakov
68e6ac4379
evp/e_[aes|camellia].c: fix typo in CBC subroutine.
...
It worked because it was never called.
(cherry picked from commit e9c80e04c1 )
2013-12-18 22:56:24 +01:00
Andy Polyakov
e34b7e99fd
sha512.c: fullfull implicit API contract in SHA512_Transform.
...
SHA512_Transform was initially added rather as tribute to tradition
than for practucal reasons. But use was recently found in ssl/s3_cbc.c
and it turned to be problematic on platforms that don't tolerate
misasligned references to memory and lack assembly subroutine.
(cherry picked from commit cdd1acd788 )
2013-12-18 22:56:00 +01:00
Dr. Stephen Henson
a32ba49352
Check EVP errors for handshake digests.
...
Partial mitigation of PR#3200
(cherry picked from commit 0294b2be5f )
2013-12-18 13:27:15 +00:00
Dr. Stephen Henson
3a0c71541b
verify parameter enumeration functions
...
(cherry picked from commit 9b3d75706e )
Conflicts:
crypto/x509/x509_vpm.c
2013-12-13 15:52:27 +00:00
Dr. Stephen Henson
adc6bd73e3
Add opaque ID structure.
...
Move the IP, email and host checking fields from the public
X509_VERIFY_PARAM structure into an opaque X509_VERIFY_PARAM_ID
structure. By doing this the structure can be modified in future
without risk of breaking any applications.
2013-12-13 15:36:31 +00:00
Dr. Stephen Henson
8c6d8c2a49
Backport TLS padding extension from master.
2013-12-13 15:29:26 +00:00
Dr. Stephen Henson
53a8f8c26d
Fix for partial chain notification.
...
For consistency with other cases if we are performing
partial chain verification with just one certificate
notify the callback with ok==1.
2013-12-13 15:29:26 +00:00
Dr. Stephen Henson
bf4863b3f5
Verify parameter retrieval functions.
...
New functions to retrieve internal pointers to X509_VERIFY_PARAM
for SSL_CTX and SSL structures.
2013-12-13 15:29:26 +00:00
Dr. Stephen Henson
8f68678989
Don't use rdrand engine as default unless explicitly requested.
2013-12-13 15:29:26 +00:00
Dr. Stephen Henson
57c4e42d75
Get FIPS checking logic right.
...
We need to lock when *not* in FIPS mode.
2013-12-10 12:52:27 +00:00
Dr. Stephen Henson
ff672cf8dd
remove obsolete STATUS file
2013-12-10 00:10:41 +00:00
Dr. Stephen Henson
d43b040773
Add release dates to NEWS
2013-12-10 00:08:33 +00:00
Andy Polyakov
422c8c36e5
ARM assembly pack: SHA update from master.
2013-12-09 23:53:42 +01:00
Andy Polyakov
b76310ba74
ARM assembly pack: AES update from master (including bit-sliced module).
2013-12-09 23:44:45 +01:00
Andy Polyakov
c012f6e576
bn/asm/armv4-mont.pl: add NEON code path.
...
(cherry picked from commit d1671f4f1a )
2013-12-09 22:46:29 +01:00
Andy Polyakov
cf6d55961c
crypto/bn/asm/x86_64-mont*.pl: update from master.
...
Add MULX/AD*X code paths and optimize even original code path.
2013-12-09 22:40:53 +01:00
Andy Polyakov
3aa1b1ccbb
x86_64-xlate.pl: fix jrcxz in nasm case.
...
(cherry picked from commit 667053a2f3 )
2013-12-09 22:19:34 +01:00
Andy Polyakov
3dcae82fa9
x86_64-xlate.pl: minor update.
...
(cherry picked from commit 41965a84c4 )
2013-12-09 21:53:41 +01:00
Dr. Stephen Henson
86b81ecb73
update $default_depflags
2013-12-08 13:21:02 +00:00
Dr. Stephen Henson
c43dc3dd77
Avoid multiple locks in FIPS mode.
...
PR: 3176.
In FIPS mode ssleay_rand_bytes is only used for PRNG seeding and is
performed in either a single threaded context (when the PRNG is first
initialised) or under a lock (reseeding). To avoid multiple locks disable
use of CRYPTO_LOCK_RAND in FIPS mode in ssleay_rand_bytes.
2013-12-08 13:21:02 +00:00
Andy Polyakov
e5eab8a199
bn/asm/x86_64-mont5.pl: comply with Win64 ABI.
...
PR: 3189
Submitted by: Oscar Ciurana
(cherry picked from commit c5d5f5bd0f )
2013-12-04 00:02:18 +01:00
Andy Polyakov
7bab6eb6f0
crypto/bn/asm/rsaz-x86_64.pl: make it work on Win64.
...
(cherry picked from commit 8bd7ca9996 )
2013-12-03 22:30:00 +01:00
Andy Polyakov
87d9526d0c
crypto/bn/rsaz*: fix licensing note.
...
rsaz_exp.c: harmonize line terminating;
asm/rsaz-*.pl: minor optimizations.
asm/rsaz-x86_64.pl: sync from master.
(cherry picked from commit 31ed9a2131 )
2013-12-03 22:17:55 +01:00
Andy Polyakov
36982f056a
bn/asm/rsaz-x86_64.pl: fix prototype.
...
(cherry picked from commit 6efef384c6 )
2013-12-03 09:44:24 +01:00
Dr. Stephen Henson
c97ec5631b
Fix warning.
2013-12-01 23:30:21 +00:00
Dr. Stephen Henson
fdb0d5dd8f
Change header order to pick up OPENSSL_SYS_WIN32
2013-12-01 23:29:40 +00:00
Dr. Stephen Henson
81b6dfe40d
Recongnise no-dane and no-libunbound
2013-12-01 23:12:27 +00:00
Dr. Stephen Henson
bc35b8e435
make update
2013-12-01 23:09:44 +00:00
Dr. Stephen Henson
6859f3fc12
Fix warnings.
2013-12-01 23:08:13 +00:00
Dr. Stephen Henson
8b2d5cc4a7
WIN32 fixes.
2013-12-01 23:07:18 +00:00
Dr. Stephen Henson
74184b6f21
RSAX no longer compiled.
2013-12-01 23:06:33 +00:00
Dr. Stephen Henson
6416aed586
Simplify and update openssl.spec
2013-11-27 15:35:02 +00:00
Dr. Stephen Henson
2a1b7bd380
New functions to retrieve certificate from SSL_CTX
...
New functions to retrieve current certificate or private key
from an SSL_CTX.
Constify SSL_get_private_key().
(cherry picked from commit a25f9adc77 )
2013-11-18 18:59:18 +00:00
Dr. Stephen Henson
4bba0bda61
Don't define SSL_select_next_proto if OPENSSL_NO_TLSEXT set
...
(cherry picked from commit 60aeb18750 )
2013-11-18 18:59:03 +00:00
Dr. Stephen Henson
27baa8317a
Use correct header length in ssl3_send_certifcate_request
...
(cherry picked from commit fdeaf55bf9 )
2013-11-17 17:50:11 +00:00
Dr. Stephen Henson
1abfa78a8b
Constify.
2013-11-14 21:00:40 +00:00
Piotr Sikora
edc687ba0f
Fix compilation with no-nextprotoneg.
...
PR#3106
2013-11-14 01:20:58 +00:00
Dr. Stephen Henson
ff0bdbed85
Allow match selecting of current certificate.
...
If pointer comparison for current certificate fails check
to see if a match using X509_cmp succeeds for the current
certificate: this is useful for cases where the certificate
pointer is not available.
(cherry picked from commit 6856b288a6e66edd23907b7fa264f42e05ac9fc7)
2013-11-13 23:47:49 +00:00
Rob Stradling
dc4bdf592f
Additional "chain_cert" functions.
...
PR#3169
This patch, which currently applies successfully against master and
1_0_2, adds the following functions:
SSL_[CTX_]select_current_cert() - set the current certificate without
disturbing the existing structure.
SSL_[CTX_]get0_chain_certs() - get the current certificate's chain.
SSL_[CTX_]clear_chain_certs() - clear the current certificate's chain.
The patch also adds these functions to, and fixes some existing errors
in, SSL_CTX_add1_chain_cert.pod.
(cherry picked from commit 2f56c9c015dbca45379c9a725915b3b8e765a119)
2013-11-13 23:47:37 +00:00
Krzysztof Kwiatkowski
b03d0513d0
Delete duplicate entry.
...
PR#3172
(cherry picked from commit 4f055e34c3598cad00fca097d812fa3e6436d967)
2013-11-13 23:47:26 +00:00
Andy Polyakov
0de70011ad
srp/srp_grps.h: make it Compaq C-friendly.
...
PR: 3165
Submitted by: Daniel Richard G.
(cherry picked from commit 2df9ec01d5 )
2013-11-12 22:19:40 +01:00
Andy Polyakov
220d1e5353
modes/asm/ghash-alpha.pl: update from HEAD.
...
PR: 3165
2013-11-12 21:59:01 +01:00
Andy Polyakov
ca44f72938
Make Makefiles OSF-make-friendly.
...
PR: 3165
(cherry picked from commit d1cf23ac86 )
2013-11-12 21:53:39 +01:00
Dr. Stephen Henson
18f49508a5
Fix memory leak.
...
(cherry picked from commit 16bc45ba95 )
2013-11-11 23:55:18 +00:00
Dr. Stephen Henson
5c50462e1e
Typo.
2013-11-11 22:24:08 +00:00
Dr. Stephen Henson
a257865303
Fix for some platforms where "char" is unsigned.
...
(cherry picked from commit 08b433540416c5bc9a874ba0343e35ba490c65f1)
2013-11-11 22:18:07 +00:00
Andy Polyakov
60adefa610
Makefile.org: make FIPS build work with BSD make.
2013-11-10 23:06:41 +01:00
Dr. Stephen Henson
b5dde6bcc6
Check for missing components in RSA_check.
...
(cherry picked from commit 01be36ef70525e81fc358d2e559bdd0a0d9427a5)
2013-11-09 15:09:22 +00:00
Dr. Stephen Henson
024dbfd44c
Document RSAPublicKey_{in,out} options.
...
(cherry picked from commit 7040d73d22987532faa503630d6616cf2788c975)
2013-11-09 15:09:22 +00:00
Dr. Stephen Henson
233069f8db
Add CMS_SignerInfo_get0_signature function.
...
Add function to retrieve the signature from a CMS_SignerInfo structure:
applications can then read or modify it.
(cherry picked from commit e8df6cec4c09b9a94c4c07abcf0402d31ec82cc1)
2013-11-09 15:09:22 +00:00
Andy Polyakov
c76d6922b1
engines/ccgost/gost89.h: make word32 defintion unconditional.
...
Original definition depended on __LONG_MAX__ that is not guaranteed to
be present. As we don't support platforms with int narrower that 32 bits
it's appropriate to make defition inconditional.
PR: 3165
(cherry picked from commit 96180cac04 )
2013-11-08 23:10:21 +01:00
Andy Polyakov
3241496144
modes/asm/ghash-alpha.pl: make it work with older assembler.
...
PR: 3165
(cherry picked from commit d24d1d7daf )
2013-11-08 23:10:09 +01:00
Dr. Stephen Henson
63fe69c12e
Enable PSK in FIPS mode.
...
Enable PSK ciphersuites with AES or DES3 in FIPS mode.
(cherry picked from commit e0ffd129c1 )
2013-11-06 14:39:41 +00:00
Dr. Stephen Henson
a4947e4e06
Initialise context before using it.
2013-11-06 13:16:50 +00:00
Ben Laurie
262f1c524e
PBKDF2 should be efficient. Contributed by Christian Heimes
...
<christian@python.org >.
2013-11-03 17:27:12 +00:00
Dr. Stephen Henson
bd80d0229c
Add brainpool curves to trace output.
2013-11-02 14:07:21 +00:00
Dr. Stephen Henson
163d794845
Fix warning.
...
(cherry picked from commit 96e16bddb4 )
2013-11-02 14:02:00 +00:00
Dr. Stephen Henson
0b33466b3f
Add SSL_CONF command to set DH Parameters.
...
(cherry picked from commit c557f921dc )
2013-11-02 13:42:03 +00:00
Dr. Stephen Henson
bed27f4db3
Fix argument processing.
...
(cherry picked from commit abf840e4f7 )
2013-11-02 13:41:51 +00:00
Dr. Stephen Henson
738a224bd0
Constification.
...
(cherry picked from commit 27f3b65f49 )
2013-11-02 13:41:38 +00:00
Dr. Stephen Henson
044f8ca87d
Extend SSL_CONF
...
Extend SSL_CONF to return command value types.
Add certificate and key options.
Update documentation.
(cherry picked from commit ec2f7e568e )
2013-11-02 13:41:19 +00:00
Dr. Stephen Henson
45ee08d99b
Typo.
...
(cherry picked from commit 13af145159 )
2013-11-02 13:41:06 +00:00
Piotr Sikora
5ff68e8f6d
Fix SSL_OP_SINGLE_ECDH_USE
...
Don't require a public key in tls1_set_ec_id if compression status is
not needed. This fixes a bug where SSL_OP_SINGLE_ECDH_USE wouldn't work.
2013-11-01 21:37:46 +00:00
Dr. Stephen Henson
f14a4a861d
Add -ecdh_single option.
...
Add -ecdh_single option to set SSL_OP_SINGLE_ECDH_USE on the command line.
2013-11-01 21:35:00 +00:00
Robin Seggelmann
f596e3c491
DTLS/SCTP struct authchunks Bug
...
PR: 2809
DTLS/SCTP requires DATA and FORWARD-TSN chunks to be protected with
SCTP-AUTH. It is checked if this has been activated successfully for
the local and remote peer. Due to a bug, however, the
gauth_number_of_chunks field of the authchunks struct is missing on
FreeBSD, and was therefore not considered in the OpenSSL implementation.
This patch sets the corresponding pointer for the check correctly
whether or not this bug is present.
2013-10-30 14:37:22 +00:00
Robin Seggelmann
9fb523adce
DTLS/SCTP Finished Auth Bug
...
PR: 2808
With DTLS/SCTP the SCTP extension SCTP-AUTH is used to protect DATA and
FORWARD-TSN chunks. The key for this extension is derived from the
master secret and changed with the next ChangeCipherSpec, whenever a new
key has been negotiated. The following Finished then already uses the
new key. Unfortunately, the ChangeCipherSpec and Finished are part of
the same flight as the ClientKeyExchange, which is necessary for the
computation of the new secret. Hence, these messages are sent
immediately following each other, leaving the server very little time to
compute the new secret and pass it to SCTP before the finished arrives.
So the Finished is likely to be discarded by SCTP and a retransmission
becomes necessary. To prevent this issue, the Finished of the client is
still sent with the old key.
2013-10-30 14:37:22 +00:00
Ben Laurie
cecf4d98d0
Remove unused variable.
2013-10-21 03:34:00 +01:00
Nick Mathewson
070e40e2f5
Fix another gmt_unix_time case in server_random
2013-10-20 15:08:58 -07:00
Nick Mathewson
d757097bbc
Do not include a timestamp in the Client/ServerHello Random field.
...
Instead, send random bytes, unless SSL_SEND_{CLIENT,SERVER}RANDOM_MODE
is set.
This is a forward-port of commits:
4af793036f
f4c93b46ed
3da721dac9
2583270191
While the gmt_unix_time record was added in an ostensible attempt to
mitigate the dangers of a bad RNG, its presence leaks the host's view
of the current time in the clear. This minor leak can help
fingerprint TLS instances across networks and protocols... and what's
worse, it's doubtful thet the gmt_unix_time record does any good at
all for its intended purpose, since:
* It's quite possible to open two TLS connections in one second.
* If the PRNG output is prone to repeat itself, ephemeral
handshakes (and who knows what else besides) are broken.
2013-10-20 15:03:24 -07:00
Steve Marquess
7b112c2766
Remove gratuitous patent references
2013-10-20 22:19:47 +01:00
Dr. Stephen Henson
03ee8c2ed7
Fix no-ssl-trace
2013-10-20 22:07:33 +01:00
Dr. Stephen Henson
3495842bb0
Prevent use of RSA+MD5 in TLS 1.2 by default.
...
Removing RSA+MD5 from the default signature algorithm list
prevents its use by default.
If a broken implementation attempts to use RSA+MD5 anyway the sanity
checking of signature algorithms will cause a fatal alert.
(cherry picked from commit 77a0f740d00ecf8f6b01c0685a2f858c3f65a3dd)
2013-10-20 22:07:33 +01:00
Ben Laurie
face65dab8
Add clang debug target.
2013-10-20 13:23:14 +01:00
Andy Polyakov
e41a49c625
PPC assembly pack: make new .size directives profiler-friendly.
...
Suggested by: Anton Blanchard
(cherry picked from commit 76c15d790e )
2013-10-15 23:42:18 +02:00
Dr. Stephen Henson
3a55a42bff
Add brainpool curves to NID table too.
...
(cherry picked from commit 6699cb8491 )
2013-10-15 12:09:54 +01:00
Dr. Stephen Henson
72550c52ed
Fix warning.
...
(cherry picked from commit f6983769c1bcd6c3c6b6bbfbbc41848f6dccf127)
2013-10-15 11:33:58 +01:00
Dr. Stephen Henson
a9d0c56de1
Add test vectors from RFC7027
...
(cherry picked from commit 8ba2d4ed7f128e400693562efd35985068c45e4d)
2013-10-15 11:33:58 +01:00
Dr. Stephen Henson
469bcb0c24
RFC7027 (Brainpool for TLS) support.
...
(cherry picked from commit 695e8c36528f9c3275f5f56e9633ac6a0c11f2e3)
2013-10-15 11:33:58 +01:00
Andy Polyakov
43ce9cdde9
PPC assembly pack: update from master branch.
...
Includes multiple updates: AES module to comply with more ABI
flavors, SHA512 for PPC32, .size directives.
2013-10-15 00:31:45 +02:00
Andy Polyakov
011f89893c
Add support for Cygwin-x86_64.
...
PR: 3110
Submitted by Corinna Vinschen.
(cherry picked from commit b3ef742cbb )
2013-10-14 16:59:05 +02:00
Andy Polyakov
958608ca1c
Initial aarch64 bits.
...
(cherry picked from commit 039081b809 )
2013-10-13 19:24:22 +02:00
Andy Polyakov
1aecb23f5b
MIPS assembly pack: get rid of deprecated instructions.
...
Latest MIPS ISA specification declared 'branch likely' instructions
obsolete. To makes code future-proof replace them with equivalent.
(cherry picked from commit 0c2adb0a9b )
2013-10-13 13:18:21 +02:00
Andy Polyakov
9ed6fba2b4
aes/asm/bsaes-x86_64.pl: update from master.
...
Performance improvement and Windows-specific bugfix (PR#3139).
2013-10-12 21:47:54 +02:00
Andy Polyakov
df5c435c0b
bn/asm/rsax-avx2.pl: minor optimization [for Decoded ICache].
...
(cherry picked from commit fa104be35e )
2013-10-10 23:09:54 +02:00
Ben Laurie
1ebaf97c44
Constification.
2013-10-07 12:44:40 +01:00
Ben Laurie
c8c6914aac
Merge branch 'OpenSSL_1_0_2-stable' into pre-aead
2013-10-05 21:20:24 +01:00
Andy Polyakov
c99028f252
evp/e_des3.c: fix typo with potential integer overflow on 32-bit platforms.
...
Submitted by: Yuriy Kaminskiy
(cherry picked from commit 524b00c0da )
2013-10-05 21:09:50 +01:00
Andy Polyakov
90d8c5862b
perlasm/sparcv9_modes.pl: make it work even with seasoned perl.
...
PR: 3130
(cherry picked from commit 6b2cae0c16 )
2013-10-05 21:09:39 +01:00
Ben Laurie
2d5dd00f9e
Merge branch 'OpenSSL_1_0_2-stable' into agl-1.0.2aead
2013-10-04 12:59:03 +01:00
Ben Laurie
cb52183836
Tidy.
2013-10-04 12:58:08 +01:00
Ben Laurie
ab3b624b0c
Merge branch 'OpenSSL_1_0_2-stable' into agl-1.0.2aead
2013-10-04 12:48:24 +01:00
Ben Laurie
7c81de9a91
Make it build and test.
2013-10-03 19:02:58 +01:00
Andy Polyakov
4dfac659ff
evp/e_des3.c: fix typo with potential integer overflow on 32-bit platforms.
...
Submitted by: Yuriy Kaminskiy
(cherry picked from commit 524b00c0da )
2013-10-03 10:57:45 +02:00
Andy Polyakov
66e0f9db08
perlasm/sparcv9_modes.pl: make it work even with seasoned perl.
...
PR: 3130
(cherry picked from commit 6b2cae0c16 )
2013-10-03 10:45:36 +02:00
Adam Langley
a2eef41993
AEAD Tests.
...
Add tests for AEAD functions: AES-128-GCM, AES-256-GCM and
ChaCha20+Poly1305.
2013-10-01 15:34:44 -04:00
Adam Langley
9a8646510b
chacha20poly1305
...
Add support for Chacha20 + Poly1305.
2013-10-01 14:59:22 -04:00
Adam Langley
fa03d0117a
Use AEAD for AES-GCM.
...
Switches AES-GCM ciphersuites to use AEAD interfaces.
2013-10-01 13:09:12 -04:00
Adam Langley
03614034e9
AEAD support in ssl/
...
This change allows AEADs to be used in ssl/ to implement SSL/TLS
ciphersuites.
2013-10-01 12:49:50 -04:00
Adam Langley
444b1d416b
AEAD support.
...
This change adds an AEAD interface to EVP and an AES-GCM implementation
suitable for use in TLS.
2013-10-01 12:30:52 -04:00
Adam Langley
4055ca1f9e
Rework tls1_change_cipher_state.
...
The previous version of the function made adding AEAD changes very
difficult. This change should be a semantic no-op - it should be purely
a cleanup.
2013-10-01 11:31:30 -04:00
Ben Laurie
7a216dfee5
Constification.
2013-10-01 14:51:04 +01:00
Dr. Stephen Henson
a78b21fc67
Update cms docs.
...
(cherry picked from commit dfcb42c68e )
2013-10-01 14:01:19 +01:00
Ben Laurie
a808002bc3
Correctly test for no-ec.
...
(cherry picked from commit d5605699a1 )
2013-10-01 14:01:19 +01:00
Dr. Stephen Henson
2fc368c111
Don't run ECDH CMS tests if EC disabled.
...
(cherry picked from commit b85f8afe37 )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
6ed3af7d50
Add X9.42 DH test.
...
(cherry picked from commit bbc098ffb3 )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
d037e0d30c
New CMS tests.
...
Add some ECDH CMS tests.
(cherry picked from commit 5cdc25a754 )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
51cb950904
Add X9.42 DH certificate to S/MIME test
...
(cherry picked from commit 75787fd833 )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
4bfa88bb4c
Scripts to recreate S/MIME test certificates.
...
Add a script to generate keys and certificates for the S/MIME and CMS
tests.
Update certificates and add EC examples.
(cherry picked from commit a0957d5505 )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
9d1e475db6
Custom key wrap option for cms utility.
...
(cherry picked from commit 5711885a2b )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
3e792793f6
add cofactor ECDH support from fips branch
...
(cherry picked from commit a3a2e3a43d )
2013-10-01 14:01:18 +01:00
Ben Laurie
ac5cb33356
Fix compile errors.
...
(cherry picked from commit a0aaa5660a )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
aaf74259ec
CMS RFC2631 X9.42 DH enveloped data support.
...
(cherry picked from commit bd59f2b91d )
Conflicts:
crypto/dh/dh.h
crypto/dh/dh_err.c
Sync error codes with 1.0.1.
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
ecf9ceb90d
Minor optimisation to KDF algorithm.
...
Don't need to use temporary buffer if remaining length equals digest length.
(cherry picked from commit 3f6b6f0b8c )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
5c4ff8ad37
Add KDF for DH.
...
Add X9.42 DH KDF. Move sharedinfo generation code to CMS library as the
same structure is used by DH and ECDH.
Move ASN1_OBJECT typedef to ossl_typ.h so it can be picked up by dh headers
without the need to use ASN1.
(cherry picked from commit dc1ce3bc64 )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
dc427fc8e2
Return correct enveloped data type in ASN1 methods.
...
For RSA and DSA keys return an appropriate RecipientInfo type. By setting
CMS_RECIPINFO_NONE for DSA keys an appropriate error is returned if
an attempt is made to use DSA with enveloped data.
(cherry picked from commit 41b920ef01 )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
e1e6c4dae7
Algorithm parameter support.
...
Check and set AlgorithmIdenfier parameters for key wrap algorithms.
Currently these just set parameters to NULL.
(cherry picked from commit e61f5d55bc )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
1747fd1cc6
Add support for ECDH KARI.
...
Add support for ECDH in enveloped data. The CMS ctrls for the EC ASN1
method decode/encode the appropriate parameters from the CMS ASN1 data
and send appropriate data to the EC public key method.
(cherry picked from commit 88e20b8584 )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
a119822b90
Add support for X9.62 KDF.
...
Add X9.62 KDF to EC EVP_PKEY_METHOD.
(cherry picked from commit 25af7a5dbc )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
8c798690ce
CMS support for key agreeement recipient info.
...
Add hooks to support key agreement recipient info type (KARI) using
algorithm specific code in the relevant public key ASN1 method.
(cherry picked from commit 17c2764d2e )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
ea6bf26657
Add new CMS tests.
...
Add new tests to cms-test.pl covering PSS and OAEP.
(cherry picked from commit 32b18e0338 )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
4a26fd6e3b
Add -keyopt option to cms utility.
...
Add support for custom public key parameters in the cms utility using
the -keyopt switch. Works for -sign and also -encrypt if -recip is used.
(cherry picked from commit 02498cc885 )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
dddb38834e
Update cms docs.
...
Document use of -keyopt to use RSA-PSS and RSA-OAEP modes.
(cherry picked from commit 4bf4a6501c )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
af7d6b936b
CMS RSA-OAEP and RSA-PSS support.
...
Extend RSA ASN1 method to support CMS PSS signatures for both sign
and verify.
For signing the EVP_PKEY_CTX parameters are read and the appropriate
CMS structures set up.
For verification the CMS structures are analysed and the corresponding
parameters in the EVP_PKEY_CTX set.
Also add RSA-OAEP support.
For encrypt the EVP_PKEY_CTX parameters are used.
For decrypt the CMS structure is uses to set the appropriate EVP_PKEY_CTX
parameters.
(cherry picked from commit 0574cadf85 )
Also sync error codes with OpenSSL 1.0.1 and add new ones.
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
a64b8786b5
Update to OAEP support.
...
Add OAEP ctrls to retrieve MD and label. Return errors if
an attempt is made to set or retrieve OAEP parameters when
padding mode is not OAEP.
(cherry picked from commit 211a14f627 )
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
25f93585a7
Exetended OAEP support.
...
Extend OAEP support. Generalise the OAEP padding functions to support
arbitrary digests. Extend EVP_PKEY RSA method to handle the new OAEP
padding functions and add ctrls to set the additional parameters.
(cherry picked from commit 271fef0ef3 )
Conflicts:
CHANGES
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
0d5a49e150
Add FIPS RSA error code.
...
Add some RSA error codes used by the FIPS module.
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
5c49a98c5e
Set CMS EnvelopedData version correctly.
...
(cherry picked from commit ff7b6ce9db )
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
869772ff08
Initialise CMS signature buffer length properly.
...
(cherry picked from commit e0f7cfda68 )
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
f2edf3181e
CMS public key parameter support.
...
Add support for customisation of CMS handling of signed and enveloped
data from custom public key parameters.
This will provide support for RSA-PSS and RSA-OAEP but could also be
applied to other algorithms.
(cherry picked from commit e365352d6a )
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
d6dc5c506a
Add control to retrieve signature MD.
...
(cherry picked from commit 810639536c )
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
eebd5e5dd7
Add new OIDs from RFC5753
...
Add OIDs for KDF schemes from RFC5753 and add cross references for
each type and the appropriate digest to use.
(cherry picked from commit 6af440ced4 )
Conflicts:
crypto/objects/obj_dat.h
crypto/objects/obj_mac.num
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
868b266451
Add new OID to pSpecified from PKCS#1
...
(cherry picked from commit e423c360fd )
Conflicts:
crypto/objects/obj_dat.h
crypto/objects/obj_mac.num
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
3fa23ff0f1
Add FIPS 186-2 DSA parameter generation algorithm.
...
Backport support for FIPS 186-2 DSA parameter generation from
HEAD. Redirect to FIPS in FIPS mode and workaround prototype error.
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
c275fb091e
Extend DH parameter generation support.
...
Add support for DH parameter generation using DSA methods including
FIPS 186-3.
(cherry picked from commit 3909087801 )
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
90c341c601
Enhance DH dup functions.
...
Make DHparams_dup work properly with X9.42 DH parameters.
(cherry picked from commit d3cc91eee2 )
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
52d0e1ca4e
If present print j, seed and counter values for DH
...
(cherry picked from commit c9577ab5ea )
Conflicts:
crypto/dh/dh_ameth.c
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
c6f3386577
EVP support for wrapping algorithms.
...
Add support for key wrap algorithms via EVP interface.
Generalise AES wrap algorithm and add to modes, making existing
AES wrap algorithm a special case.
Move test code to evptests.txt
(cherry picked from commit 97cf1f6c28 )
Conflicts:
CHANGES
2013-10-01 14:01:17 +01:00
Andy Polyakov
cf65a07256
evptests.txt: add XTS test vectors
...
(cherry picked from commit c9a8e3d1c7 )
2013-10-01 14:01:17 +01:00
Andy Polyakov
051dc9db2b
evptests.txt: additional GCM test vectors.
...
(cherry picked from commit ca303d333b )
2013-10-01 14:01:17 +01:00
Ben Laurie
93a886b45a
Fix warnings.
...
(cherry picked from commit 282a480a35 )
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
ec19082ecc
GCM and CCM test support
...
Add code to support GCM an CCM modes in evp_test. On encrypt this
will compare the expected ciphertext and tag. On decrypt it will
compare the expected plaintext: tag comparison is done internally.
Add a simple CCM test case and convert all tests from crypto/modes/gcm128.c
(cherry picked from commit 15652f9825 )
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
0eff7c7c88
Add CCM ciphers to tables.
...
(cherry picked from commit 95248de327 )
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
6c4b3514d7
New SP 800-56A compliant version of DH_compute_key().
...
(cherry picked from commit bc91494e06 )
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
d84cca7447
Typo.
...
(cherry picked from commit 415ece7301 )
2013-10-01 14:01:16 +01:00
Ben Laurie
3a8b23bfd9
Re-add accidentally deleted #endif.
2013-10-01 12:34:44 +01:00
Ben Laurie
63fe322160
Merge remote-tracking branch 'agl/1.0.2alpn' into agl-alpn
...
Conflicts:
ssl/ssl3.h
ssl/t1_lib.c
2013-10-01 12:20:02 +01:00
Ben Laurie
c808798013
Produce PEM we would consume.
2013-09-25 13:55:06 +01:00
Ben Laurie
379f21ce5c
Show useful errors.
2013-09-24 23:13:22 +01:00
Ben Laurie
4f3b1b3eb9
Merge remote-tracking branch 'trevp/pempick' into OpenSSL_1_0_2-stable
2013-09-24 12:47:54 +01:00
Dr. Stephen Henson
b49df9502e
Disable Dual EC DRBG.
...
Return an error if an attempt is made to enable the Dual EC DRBG: it
is not used by default.
(cherry picked from commit a4870de5aa )
2013-09-22 18:25:58 +01:00
Ben Laurie
4f8a706dc7
Merge remote-tracking branch 'trevp/pemfix' into trev-pem-fix
2013-09-20 15:39:08 -07:00
Dr. Stephen Henson
7560f63909
Fix warning.
2013-09-18 15:10:22 +01:00
Dr. Stephen Henson
1dfb1b103c
DTLS version usage fixes.
...
Make DTLS behave like TLS when negotiating version: record layer has
DTLS 1.0, message version is 1.2.
Tolerate different version numbers if version hasn't been negotiated
yet.
(cherry picked from commit 40088d8b81 )
2013-09-18 13:47:05 +01:00
Dr. Stephen Henson
6e1987ca1d
DTLS trace support.
...
Add DTLS record header parsing, different client hello format and add
HelloVerifyRequest message type.
Add code to d1_pkt.c to send message headers to the message callback.
(cherry picked from commit 890f2f8b92 )
Conflicts:
ssl/ssl_locl.h
2013-09-18 13:46:03 +01:00
Dr. Stephen Henson
d307176931
Suite B support for DTLS 1.2
...
Check for Suite B support using method flags instead of version numbers:
anything supporting TLS 1.2 cipher suites will also support Suite B.
Return an error if an attempt to use DTLS 1.0 is made in Suite B mode.
(cherry picked from commit 4544f0a691 )
2013-09-18 13:46:03 +01:00
Dr. Stephen Henson
c391a74266
Always return errors in ssl3_get_client_hello
...
If we successfully match a cookie don't set return value to 2 as this
results in other error conditions returning 2 as well.
Instead set return value to -2 which can be checked later if everything
else is OK.
(cherry picked from commit c56f5b8edf )
2013-09-18 13:46:02 +01:00
Dr. Stephen Henson
65a87d3cc3
Dual DTLS version methods.
...
Add new methods DTLS_*_method() which support both DTLS 1.0 and DTLS 1.2 and
pick the highest version the peer supports during negotiation.
As with SSL/TLS options can change this behaviour specifically
SSL_OP_NO_DTLSv1 and SSL_OP_NO_DTLSv1_2.
(cherry picked from commit c6913eeb76 )
Conflicts:
CHANGES
2013-09-18 13:46:02 +01:00
Dr. Stephen Henson
b60b9e7afe
Enable TLS 1.2 ciphers in DTLS 1.2.
...
Port TLS 1.2 GCM code to DTLS. Enable use of TLS 1.2 only ciphers when in
DTLS 1.2 mode too.
(cherry picked from commit 4221c0dd30 )
2013-09-18 13:46:02 +01:00
Dr. Stephen Henson
919834dc84
Update fixed DH requirements.
...
The relaxed signing requirements for fixed DH certificates apply to DTLS 1.2
too.
(cherry picked from commit fbbaaccaca )
2013-09-18 13:46:02 +01:00
Dr. Stephen Henson
efc17286f8
DTLS 1.2 cached record support.
...
Add DTLS1.2 support for cached records when computing handshake macs
instead of the MD5+SHA1 case for DTLS < 1.2 (this is a port of the
equivalent TLS 1.2 code to DTLS).
(cherry picked from commit 04fac50045 )
2013-09-18 13:46:02 +01:00
Dr. Stephen Henson
acec5a6244
Provisional DTLS 1.2 support.
...
Add correct flags for DTLS 1.2, update s_server and s_client to handle
DTLS 1.2 methods.
Currently no support for version negotiation: i.e. if client/server selects
DTLS 1.2 it is that or nothing.
(cherry picked from commit c3b344e36a )
Conflicts:
apps/s_server.c
2013-09-18 13:46:02 +01:00
Dr. Stephen Henson
68039af3e7
Remove versions test from dtls1_buffer_message
...
Since this is always called from DTLS code it is safe to assume the header
length should be the DTLS value. This avoids the need to check the version
number and should work with any version of DTLS (not just 1.0).
(cherry picked from commit 9cf0f18754 )
2013-09-18 13:46:02 +01:00
Dr. Stephen Henson
da1247d653
Extend DTLS method macros.
...
Extend DTLS method creation macros to support version numbers and encryption
methods. Update existing code.
(cherry picked from commit cfd298b7ae )
2013-09-18 13:46:02 +01:00
Dr. Stephen Henson
052d0358f2
Enable various DTLS extensions.
...
Some TLS extensions were disabled for DTLS. Possibly because they caused
problems with the old duplicated code. Enable them again.
(cherry picked from commit 874a18cfad )
2013-09-18 13:46:02 +01:00
Dr. Stephen Henson
1b6ab411d3
Use enc_flags when deciding protocol variations.
...
Use the enc_flags field to determine whether we should use explicit IV,
signature algorithms or SHA256 default PRF instead of hard coding which
versions support each requirement.
(cherry picked from commit cbd64894ec )
Conflicts:
ssl/ssl_locl.h
2013-09-18 13:46:02 +01:00
Dr. Stephen Henson
d88d98edd3
Use appropriate versions of SSL3_ENC_METHOD
...
(cherry picked from commit 6de2649a6b )
2013-09-18 13:46:02 +01:00
Dr. Stephen Henson
741c9959f6
DTLS revision.
...
Revise DTLS code. There was a *lot* of code duplication in the
DTLS code that generates records. This makes it harder to maintain and
sometimes a TLS update is omitted by accident from the DTLS code.
Specifically almost all of the record generation functions have code like
this:
some_pointer = buffer + HANDSHAKE_HEADER_LENGTH;
... Record creation stuff ...
set_handshake_header(ssl, SSL_MT_SOMETHING, message_len);
...
write_handshake_message(ssl);
Where the "Record creation stuff" is identical between SSL/TLS and DTLS or
in some cases has very minor differences.
By adding a few fields to SSL3_ENC to include the header length, some flags
and function pointers for handshake header setting and handshake writing the
code can cope with both cases.
(cherry picked from commit 173e72e64c )
2013-09-18 13:46:02 +01:00
Dr. Stephen Henson
7c23127fde
Add functions to set ECDSA_METHOD structure.
...
Add various functions to allocate and set the fields of an ECDSA_METHOD
structure.
(cherry picked from commit 94c2f77a62 )
2013-09-18 01:23:40 +01:00
Bodo Moeller
8b9722a3c0
Merge branch 'OpenSSL_1_0_2-stable' of openssl.net:openssl into OpenSSL_1_0_2-stable
2013-09-17 09:59:14 +02:00
Bodo Moeller
8c149cfd83
Sync with version from master.
2013-09-17 09:55:27 +02:00
Trevor Perrin
6da498991c
Various custom extension fixes.
...
Force no SSL2 when custom extensions in use.
Don't clear extension state when cert is set.
Clear on renegotiate.
Conflicts:
ssl/t1_lib.c
2013-09-16 18:40:53 +01:00
Rob Stradling
86a66deb7e
Update CHANGES.
2013-09-16 14:03:22 +01:00
Rob Stradling
9409e18179
Tidy up comments.
2013-09-16 14:03:21 +01:00
Rob Stradling
6a0b803fc0
Use TLS version supplied by client when fingerprinting Safari.
2013-09-16 14:03:21 +01:00
Rob Stradling
5fa3b54788
Fix compilation with no-ec and/or no-tlsext.
2013-09-16 14:03:21 +01:00
Rob Stradling
07df5018be
Don't prefer ECDHE-ECDSA ciphers when the client appears to be Safari on OS X.
...
OS X 10.8..10.8.3 has broken support for ECDHE-ECDSA ciphers.
2013-09-16 14:03:21 +01:00
Bodo Moeller
1b9a59c36a
Sync CHANGES and NEWS files.
2013-09-16 14:54:34 +02:00
Bodo Moeller
8f89c33451
Merge branch 'OpenSSL_1_0_2-stable' of /usr/local/google/home/bmoeller/openssl/openssl into OpenSSL_1_0_2-stable
2013-09-16 14:51:10 +02:00
Bodo Moeller
485d7d5904
Fix overly lenient comparisons:
...
- EC_GROUP_cmp shouldn't consider curves equal just because
the curve name is the same. (They really *should* be the same
in this case, but there's an EC_GROUP_set_curve_name API,
which could be misused.)
- EC_POINT_cmp shouldn't return 0 for ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED
or EC_R_INCOMPATIBLE_OBJECTS errors because in a cmp API, 0 indicates
equality (not an error).
Reported by: king cope
(cherry picked from commit 312a46791ab465cfa3bf26764361faed0e5df014)
2013-09-16 14:50:48 +02:00
Bodo Moeller
e3720888c7
Fix overly lenient comparisons:
...
- EC_GROUP_cmp shouldn't consider curves equal just because
the curve name is the same. (They really *should* be the same
in this case, but there's an EC_GROUP_set_curve_name API,
which could be misused.)
- EC_POINT_cmp shouldn't return 0 for ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED
or EC_R_INCOMPATIBLE_OBJECTS errors because in a cmp API, 0 indicates
equality (not an error).
Reported by: king cope
(cherry picked from commit 312a46791ab465cfa3bf26764361faed0e5df014)
2013-09-16 13:06:30 +02:00
Andy Polyakov
d75e384ff8
Extend OPENSSL_ia32cap_P (backport from HEAD).
2013-09-15 22:13:54 +02:00
Andy Polyakov
c340c7a88c
crypto/armcap.c: fix typo in rdtsc subroutine.
...
PR: 3125
Submitted by: Kyle McMartin
(cherry picked from commit 8e52a9063a )
2013-09-15 22:10:49 +02:00
Dr. Stephen Henson
9ecf6e93af
add -badsig option to corrupt CRL signatures for testing too
...
(cherry picked from commit 139cd16cc5 )
2013-09-14 13:53:44 +01:00
Dr. Stephen Henson
a41735288c
Add missing code from SSL_CONF backport.
2013-09-14 13:53:44 +01:00
Scott Deboy
8ae78c6bd9
Initialize next_proto in s_server - resolves incorrect attempts to free
...
Cherry pick of b0d27cb902 .
2013-09-13 11:31:39 -04:00
Adam Langley
cb3cec4adf
Add tests for ALPN functionality.
...
Cherry-picked from a898936218 .
2013-09-13 11:27:26 -04:00
Adam Langley
b0d6f3c58f
Support ALPN.
...
This change adds support for ALPN[1] in OpenSSL. ALPN is the IETF
blessed version of NPN and we'll be supporting both ALPN and NPN for
some time yet.
Cherry-picked from 6f017a8f9d .
[1] https://tools.ietf.org/html/draft-ietf-tls-applayerprotoneg-00
2013-09-13 11:27:22 -04:00
Ben Laurie
0338648426
Constification.
2013-09-10 17:58:44 +01:00
Andy Polyakov
c7dc404188
crypto/modes/asm/aesni-gcm-x86_64.pl: minor optimization.
...
Avoid occasional up to 8% performance drops.
(cherry picked from commit 7a1a12232a )
2013-09-09 21:46:02 +02:00
Andy Polyakov
08853158b6
crypto/bn/asm/x86_64-mont.pl: minor optimization.
...
(cherry picked from commit 72a158703b )
2013-09-09 21:42:48 +02:00
Andy Polyakov
74e0187663
Revert "x86cpuid.pl: fix extended feature flags detection."
...
This reverts commit 514f1a7835 .
2013-09-09 21:35:15 +02:00
Dr. Stephen Henson
bb4aa95c81
Remove ancient PATENTS section and FAQ reference.
...
(cherry picked from commit ce4555967e )
2013-09-08 21:25:38 +01:00
Dr. Stephen Henson
5117d50b7e
Partial path fix.
...
When verifying a partial path always check to see if the EE certificate
is explicitly trusted: the path could contain other untrusted certificates.
(cherry picked from commit 52073b7675 )
2013-09-08 21:25:10 +01:00
Dr. Stephen Henson
593605d3ec
Document supported curve functions.
...
(cherry picked from commit c3eb33763b )
2013-09-03 15:43:59 +01:00
Dr. Stephen Henson
c9ea4df8f9
Document -force_pubkey option.
...
(cherry picked from commit b093a06866bf632a97a9a0286e2d08f69c3cf7dd)
2013-08-21 13:41:17 +01:00
Dr. Stephen Henson
89ff56faf1
Correct ECDSA example.
...
(cherry picked from commit 3a918ea2bbf4175d9461f81be1403d3781b2c0dc)
2013-08-20 17:30:16 +01:00
Dr. Stephen Henson
9855026c43
fix printout of expiry days if -enddate is used in ca
...
(cherry picked from commit f7ac0ec89d )
2013-08-19 21:55:07 +01:00
Dr. Stephen Henson
904348a492
Time difference functions.
...
Backport of ASN1_TIME_diff and OPENSSL_gmtime_diff functions from master
branch.
2013-08-19 21:55:07 +01:00
Dr. Stephen Henson
aaaa18392d
new command line option -stdname to ciphers utility
...
(cherry picked from commit 51b9115b6d )
2013-08-19 20:25:39 +01:00
Dr. Stephen Henson
8c33e40d2e
Add new test option set the version in generated certificates: this
...
is needed to test some profiles/protocols which reject certificates
with unsupported versions.
(cherry picked from commit df316fd43c )
2013-08-19 18:10:04 +01:00
Dr. Stephen Henson
0d04af1e72
option to output corrupted signature in certificates for testing purposes
...
(cherry picked from commit 96cfba0fb4 )
2013-08-19 18:09:44 +01:00
Dr. Stephen Henson
8f17495800
update usage messages
...
(cherry picked from commit 7c8ac50504 )
2013-08-19 18:09:26 +01:00
Dr. Stephen Henson
95c1a24853
add -naccept <n> option to s_server to automatically exit after <n> connections
...
(cherry picked from commit b5cadfb564 )
2013-08-19 17:42:02 +01:00
Dr. Stephen Henson
08374de10f
with -rev close connection if client sends "CLOSE"
...
(cherry picked from commit 685755937a )
2013-08-19 14:14:05 +01:00
Dr. Stephen Henson
506e70a216
Add simple external session cache to s_server. This serialises sessions
...
just like a "real" server making it easier to trace any problems.
(manually applied from commit 35b0ea4efe )
2013-08-19 14:13:56 +01:00
Dr. Stephen Henson
0cca92cdd3
Remove commented out debug line.
2013-08-19 14:13:38 +01:00
Dr. Stephen Henson
5b430cfc44
Make no-ec compilation work.
...
(cherry picked from commit 14536c8c9c )
2013-08-19 14:13:38 +01:00
Dr. Stephen Henson
171c4da568
Add -rev test option to s_server to just reverse order of characters received
...
by client and send back to server. Also prints an abbreviated summary of
the connection parameters.
(cherry picked from commit 4f3df8bea2 )
2013-08-19 14:13:38 +01:00
Dr. Stephen Henson
04611fb0f1
Add -brief option to s_client and s_server to summarise connection details.
...
New option -verify_quiet to shut up the verify callback unless there is
an error.
(manually applied from commit 2a7cbe77b3 )
2013-08-19 14:13:24 +01:00
Dr. Stephen Henson
df430489cf
Add documentation.
...
Preliminary documentation for chain and verify stores and certificate chain
setting functions.
(cherry picked from commit eeb15452a0 )
2013-08-18 13:53:32 +01:00
Dr. Stephen Henson
5085e57fb5
Return 1 when setting ECDH auto mode.
...
(cherry picked from commit 42082eda6f )
2013-08-18 13:53:00 +01:00
Michael Tuexen
75b81247a0
DTLS message_sequence number wrong in rehandshake ServerHello
...
This fix ensures that
* A HelloRequest is retransmitted if not responded by a ClientHello
* The HelloRequest "consumes" the sequence number 0. The subsequent
ServerHello uses the sequence number 1.
* The client also expects the sequence number of the ServerHello to
be 1 if a HelloRequest was received earlier.
This patch fixes the RFC violation.
(cherry picked from commit b62f4daac0 )
2013-08-13 18:55:16 +01:00
Michael Tuexen
2c1a5c1039
DTLS handshake fix.
...
Reported by: Prashant Jaikumar <rmstar@gmail.com >
Fix handling of application data received before a handshake.
(cherry picked from commit 0c75eeacd3 )
2013-08-08 13:31:54 +01:00
Dr. Stephen Henson
71c34b7f2d
Fix verify loop with CRL checking.
...
PR #3090
Reported by: Franck Youssef <fry@open.ch >
If no new reason codes are obtained after checking a CRL exit with an
error to avoid repeatedly checking the same CRL.
This will only happen if verify errors such as invalid CRL scope are
overridden in a callback.
(cherry picked from commit 4b26645c1a )
2013-08-06 16:08:04 +01:00
Kaspar Brand
b0cfaf58ad
Fix for PEM_X509_INFO_read_bio.
...
PR: 3028
Fix bug introduced in PEM_X509_INFO_bio which wouldn't process RSA keys
correctly if they appeared first.
(cherry picked from commit 5ae8d6bcba )
2013-08-06 16:04:52 +01:00
Andy Polyakov
9dc07f04c3
crypto/evp/e_aes.c: fix logical pre-processor bug and formatting.
...
Bug would emerge when XTS is added to bsaes-armv7.pl. Pointed out by
Ard Biesheuvel of Linaro.
(cherry picked from commit 044f63086051d7542fa9485a1432498c39c4d8fa)
2013-08-03 17:09:37 +02:00
Andy Polyakov
f15c16200b
crypto/bn/asm/rsax-x86_64.pl: make it work on Darwin.
...
(cherry picked from commit fd8ad019e1 )
2013-08-03 16:30:40 +02:00
Andy Polyakov
4e09add6f8
crypto/sha/asm/sha*-x86_64.pl: comply with Win64 ABI.
...
(cherry picked from commit 006784378d )
2013-07-31 23:52:21 +02:00
Trevor
355a6236be
Cosmetic touchups.
2013-07-31 16:38:43 +01:00
Ben Laurie
6d7fa9c25c
Support new rsaz asm stuff.
2013-07-31 16:37:19 +01:00
Andy Polyakov
82ae22ef4d
bn/asm/rsaz-avx2.pl: Windows-specific fix.
...
(cherry picked from commit 5c57c69f9e )
2013-07-12 19:01:23 +02:00
Ben Laurie
b56bae5126
s/rsaz_eligible/rsaz_avx2_eligible/.
...
(cherry picked from commit 852f837f5e )
2013-07-12 18:53:05 +02:00
Andy Polyakov
2d3f31e0a1
sha512-586.pl: fix typo.
...
Submitted by: Gisle Vanem
(cherry picked from commit 241fba4ea9 )
2013-07-10 10:02:34 +02:00
Andy Polyakov
ae74191e38
Remove RSAX engine, superseded by RSAZ module.
...
(cherry picked from commit f5b132d652 )
Conflicts [resloved]:
Configure
2013-07-05 22:16:10 +02:00
Andy Polyakov
ab8233ab81
Take RSAZ modules into build loop, add glue and engage.
...
RT: 2582, 2850
(cherry picked from commit ca48ace5c5 )
Conflicts:
Configure
2013-07-05 21:53:05 +02:00
Andy Polyakov
d5572bdc64
Add RSAZ assembly modules.
...
RT: 2582, 2850
(cherry picked from commit 0b4bb91db6 )
2013-07-05 21:49:19 +02:00
Andy Polyakov
e3990db59c
bn/asm/x86_86-mont.pl: optimize reduction for Intel Core family.
...
(cherry picked from commit 26e43b48a3 )
2013-07-05 21:15:16 +02:00
Andy Polyakov
87d90528ac
bn/bn_exp.c: harmonize.
...
(cherry picked from commit cbce8c4644 )
2013-07-05 21:01:51 +02:00
Trevor
e27711cfdd
Trying cherrypick:
...
Add support for arbitrary TLS extensions.
Contributed by Trevor Perrin.
Conflicts:
CHANGES
ssl/ssl.h
ssl/ssltest.c
test/testssl
Fix compilation due to #endif.
Cherrypicking more stuff.
Cleanup of custom extension stuff.
serverinfo rejects non-empty extensions.
Omit extension if no relevant serverinfo data.
Improve error-handling in serverinfo callback.
Cosmetic cleanups.
s_client documentation.
s_server documentation.
SSL_CTX_serverinfo documentation.
Cleaup -1 and NULL callback handling for custom extensions, add tests.
Cleanup ssl_rsa.c serverinfo code.
Whitespace cleanup.
Improve comments in ssl.h for serverinfo.
Whitespace.
Cosmetic cleanup.
Reject non-zero-len serverinfo extensions.
Whitespace.
Make it build.
Conflicts:
test/testssl
2013-07-03 11:53:30 +01:00
Andy Polyakov
28c08222c0
config: fix executable format detection on latest FreeBSD.
...
Submitted by: Bryan Drewery
PR: 3075
(cherry picked from commit c256e69d3f )
2013-06-30 23:59:30 +02:00
Andy Polyakov
8508a80998
bn/bn_exp.c: Solaris-specific fix, T4 MONTMUL relies on alloca.
...
(cherry picked from commit b74ce8d948 )
2013-06-30 23:14:31 +02:00
Andy Polyakov
7850a8bc04
x86_64-xlate.pl: Windows fixes.
...
(cherry picked from commit a9d14832fd )
2013-06-30 23:14:19 +02:00
Andy Polyakov
fccec89084
aesni-sha256-x86_64.pl: fix typo in Windows SEH.
...
(cherry picked from commit 42386fdb62 )
2013-06-30 23:14:04 +02:00
Andy Polyakov
6c7fa27404
PA-RISC assembler pack: switch to bve in 64-bit builds.
...
PR: 3074
(cherry picked from commit 02450ec69d )
2013-06-30 23:13:23 +02:00
Andy Polyakov
e7f9c08ab8
SPARC T4 DES support: fix typo.
...
(cherry picked from commit 8ee3c7e676 )
2013-06-18 11:07:24 +02:00
Andy Polyakov
03c8441b14
Optimize SPARC T4 MONTMUL support.
...
Improve RSA sing performance by 20-30% by:
- switching from floating-point to integer conditional moves;
- daisy-chaining sqr-sqr-sqr-sqr-sqr-mul sequences;
- using MONTMUL even during powers table setup;
(cherry picked from commit 4ddacd9921 )
2013-06-18 11:07:16 +02:00
Ben Laurie
e887c4187e
Backport single makefile from master.
2013-06-13 15:09:48 +01:00
Ben Laurie
933aee6199
Wrong include path.
2013-06-13 13:26:22 +01:00
Dr. Stephen Henson
90e7f983b5
Typo: don't call RAND_cleanup during app startup.
2013-06-12 21:16:31 +01:00
Andy Polyakov
f00962aaf3
aesni-sha1-x86_64.pl: update performance data.
...
(cherry picked from commit 3b848d3401 )
2013-06-10 22:52:06 +02:00
Andy Polyakov
3eccd2e53a
aesni-sha256-x86_64.pl: harmonize with latest sha512-x86_64.pl.
...
(cherry picked from commit 42b9a4177b )
2013-06-10 22:51:55 +02:00
Andy Polyakov
fcd0e61c24
sha1-x86_64.pl: add AVX2+BMI code path.
...
(cherry picked from commit cd8d7335af )
2013-06-10 22:51:47 +02:00
Andy Polyakov
e7a02b24c1
sha512-x86_64.pl: upcoming-Atom-specific optimization.
...
(cherry picked from commit c7f690c243 )
2013-06-10 22:51:31 +02:00
Andy Polyakov
cbe6bb54e6
sha[256|512]-586.pl: add more SIMD code paths.
...
(cherry picked from commit 32213d8d77 )
2013-06-10 22:50:32 +02:00
Andy Polyakov
23966faca4
ghash-x86_64.pl: add Haswell performance data.
...
(cherry picked from commit b42759158d )
2013-06-10 22:50:23 +02:00
Andy Polyakov
514f1a7835
x86cpuid.pl: fix extended feature flags detection.
...
(cherry picked from commit 1bc0b68d7b )
2013-06-10 22:49:35 +02:00
Dr. Stephen Henson
af908bc48b
Don't use RC2 with PKCS#12 files in FIPS mode.
...
(cherry picked from commit cdb6c48445 )
2013-06-05 15:06:02 +01:00
Dr. Stephen Henson
233ebcb543
Fix PSS signature printing.
...
Fix PSS signature printing: consistently use 0x prefix for hex values for
padding length and trailer fields.
(cherry picked from commit deb24ad53147f5a8dd63416224a5edd7bbc0e74a)
2013-06-05 15:06:02 +01:00
Dr. Stephen Henson
da0c007254
Reencode with X509_CRL_ctx_sign too.
...
(cherry picked from commit 96940f4f2d0300c033379a87db0ff19e598c6264)
2013-06-05 15:06:02 +01:00
Ben Laurie
01bc7dcafc
Header needed for SOCK_STREAM on FreeBSD.
2013-06-04 16:27:05 +01:00
Ben Laurie
83e2ff8c51
Fix missing/incorrect prototype.
2013-06-04 16:17:30 +01:00
Ben Laurie
e3120586fb
Missing prototypes.
2013-06-04 15:14:18 +01:00
Ben Laurie
3941aa12f1
Remove added ;.
2013-06-04 15:05:18 +01:00
Andy Polyakov
0c10cf0ad6
crypto/modes: even more strict aliasing fixes [and fix bug in cbc128.c from
...
previous cbc128.c commit].
2013-06-04 14:31:23 +01:00
Andy Polyakov
62874a5a69
cbc128.c: fix strict aliasing warning.
2013-06-04 14:30:49 +01:00
Andy Polyakov
8c1f9c56fd
crypto/bn/bn_exp.c: SPARC portability fix.
...
(cherry picked from commit b69437e1e5 )
2013-06-01 09:59:54 +02:00
Andy Polyakov
75063c1527
aesni-sha1-x86_64.pl: Atom-specific optimization.
...
(cherry picked from commit 4df2280b4f )
2013-05-25 19:09:47 +02:00
Andy Polyakov
5de583aa91
sha512-x86_64.pl: +16% optimization for Atom.
...
(and pending AVX2 changes).
(cherry picked from commit 504bbcf3cd )
2013-05-25 19:04:48 +02:00
Andy Polyakov
a0675d8149
vpaes-x86[_64].pl: minor Atom-specific optimization.
...
(cherry picked from commit 988d11b641 )
2013-05-25 18:58:54 +02:00
Andy Polyakov
a7e9ed95ec
evp/e_aes.c: engage SPARC T4 AES support [from master].
2013-05-20 16:36:53 +02:00
Andy Polyakov
615d0edf1f
evp/e_aes.c: engage AES-NI GCM stitch.
2013-05-20 16:30:21 +02:00
Andy Polyakov
e775755dec
evp/evp_err.c: update from master.
2013-05-20 16:16:34 +02:00
Andy Polyakov
a1bf7de5a7
evp/e_camellia.c: engage SPARC T5 Camellia support [from master].
2013-05-20 16:09:13 +02:00
Andy Polyakov
047c02e8db
evp/e_des[3].c: engage SPARC T4 DES support.
2013-05-20 16:08:39 +02:00
Andy Polyakov
c92989d2b7
Add BN support for SPARC VIS3 and T4 [from master].
2013-05-20 15:48:13 +02:00
Andy Polyakov
039e7875ff
md5_locl.h: enable assembly support on SPARC [from master].
2013-05-20 00:33:09 +02:00
Andy Polyakov
48b7b96bd0
sparcv9cap.c: update from master.
2013-05-20 00:16:18 +02:00
Andy Polyakov
747b7a636a
Add MD5 SPARC T4 code from master.
2013-05-20 00:08:15 +02:00
Andy Polyakov
635f56fabd
Add SHA SPARC T4 code from master.
2013-05-20 00:04:38 +02:00
Andy Polyakov
c617bc0054
Add Camellia SPARC T4 module from master.
2013-05-19 23:58:54 +02:00
Andy Polyakov
d215724753
Add AES SPARC T4 module from master.
2013-05-19 23:54:34 +02:00
Andy Polyakov
9c1ee1bed5
Add DES SPARC T4 module from master.
2013-05-19 23:51:22 +02:00
Andy Polyakov
14ef63c15e
Add perlasm/sparcv9_modes.pl from master.
2013-05-19 23:47:38 +02:00
Andy Polyakov
5a456140c1
des_enc.m4: update from master.
2013-05-19 23:43:12 +02:00
Andy Polyakov
1ff546737b
evp/Makefile: fix typo.
2013-05-19 23:11:03 +02:00
Andy Polyakov
56f0b25754
Add EVP glue to AES-NI SHA256 stich [from master].
2013-05-19 22:35:37 +02:00
Andy Polyakov
b0f78dc018
Add AES-NI SHA256 stitch and take it into build loop [from master].
2013-05-19 22:23:18 +02:00
Andy Polyakov
1f2d194acf
aesni-sha1-x86_64.pl: update from master.
2013-05-19 22:18:52 +02:00
Andy Polyakov
aacfb2a2c6
Add AES-NI GCM stich and take it into build loop [from master].
2013-05-19 22:06:18 +02:00
Andy Polyakov
0ba304dd31
gcm128.c: update from master (add AVX and VIS3 support).
2013-05-19 21:55:30 +02:00
Andy Polyakov
8eb2da5fbb
ghash-sparcv9.pl: update from master.
2013-05-19 21:53:14 +02:00
Andy Polyakov
d1896e8ccd
ghash-x86_64.pl: update from master.
2013-05-19 21:51:19 +02:00
Andy Polyakov
0edcb7a556
ghash-x86.pl: update from master.
2013-05-19 21:46:03 +02:00
Andy Polyakov
ecc2c5d81a
sha512-x86_64.pl: update from master.
2013-05-19 21:36:54 +02:00
Andy Polyakov
441dec8e9f
sha512-586.pl: update from master.
2013-05-19 21:36:38 +02:00
Andy Polyakov
4f566c360b
sha256-598.pl: update from master.
2013-05-19 21:35:55 +02:00
Andy Polyakov
e10cd58090
sha1-x86_64.pl: update from master.
2013-05-19 21:33:04 +02:00
Andy Polyakov
5c8ae6d93e
sha1-586.pl: update from master.
2013-05-19 21:32:29 +02:00
Andy Polyakov
e72f7677bf
crypto/perlasm: update from master.
2013-05-19 21:27:59 +02:00
Andy Polyakov
e815d72b1f
RFC6689 support: add missing commit (git noob alert).
2013-05-15 20:41:51 +02:00
Andy Polyakov
ddf918673d
ssl/dnssec.c: compilation errors.
2013-05-15 20:38:58 +02:00
Andy Polyakov
8517d0c00d
Initial support for RFC6689, a.k.a. DANE.
...
Note that it initially applies to 1.0.2, and not to HEAD. This is
in order to allow development with existing libunbound installations
that are dependent on OpenSSL 1.0.x. More details in RT.
RT: 3003
2013-05-13 15:36:06 +02:00
Dr. Stephen Henson
8659dc73f4
Reencode certificates in X509_sign_ctx.
...
Reencode certificates in X509_sign_ctx as well as X509_sign.
This was causing a problem in the x509 application when it modified an
existing certificate.
(cherry picked from commit c6d8adb8a4 )
2013-05-02 12:24:33 +01:00
Andy Polyakov
07464787a8
crypto/modes/modes_lcl.h: let STRICT_ALIGNMENT be on ARMv7.
...
While ARMv7 in general is capable of unaligned access, not all instructions
actually are. And trouble is that compiler doesn't seem to differentiate
those capable and incapable of unaligned access. Side effect is that kernel
goes into endless loop retrying same instruction triggering unaligned trap.
Problem was observed in xts128.c and ccm128.c modules. It's possible to
resolve it by using (volatile u32*) casts, but letting STRICT_ALIGNMENT
be feels more appropriate.
(cherry picked from commit 3bdd80521a )
2013-04-13 21:19:16 +02:00
Dr. Stephen Henson
e9a3aa9721
Set s->d1 to NULL after freeing it.
...
(cherry picked from commit 04638f2fc3 )
2013-04-08 18:39:52 +01:00
Dr. Stephen Henson
a8cc9f1873
Typo.
...
(cherry picked from commit 0ded2a0689 )
2013-03-31 17:43:42 +01:00
Dr. Stephen Henson
f25c3c0542
Call RAND_cleanup in openssl application.
...
(cherry picked from commit 944bc29f90 )
2013-03-28 14:29:11 +00:00
Matt Caswell
4e5b9645e8
Make binary curve ASN.1 work in FIPS mode.
...
Don't check for binary curves by checking methods: the values will
be different in FIPS mode as they are redirected to the validated module
version.
(cherry picked from commit 94782e0e9c )
2013-03-26 16:58:29 +00:00
Dr. Stephen Henson
04347839ea
enhance EC method to support setting curve type when generating keys and add parameter encoding option
...
(cherry picked from commit 24edfa9df9 )
2013-03-20 15:54:05 +00:00
Dr. Stephen Henson
e14b8410ca
Disable compression for DTLS.
...
The only standard compression method is stateful and is incompatible with
DTLS.
2013-03-19 13:46:57 +00:00
Andy Polyakov
2a1ab7b438
x86cpuid.pl: make it work with older CPUs.
...
PR: 3005
(cherry picked from commit 5702e965d7 )
2013-03-18 19:50:09 +01:00
Andy Polyakov
dd1e4fbcc0
e_aes_cbc_hmac_sha1.c: fix rare bad record mac on AES-NI plaforms.
...
PR: 3002
(cherry picked from commit 5c60046553 )
2013-03-18 19:35:20 +01:00
Michael Tuexen
3f84d34c37
Avoid unnecessary fragmentation.
...
(cherry picked from commit 80ccc66d7e )
2013-03-18 14:32:59 +00:00
Dr. Stephen Henson
d7e429b91d
Encode INTEGER correctly.
...
If an ASN1_INTEGER structure is allocated but not explicitly set encode
it as zero: don't generate an invalid zero length INTEGER.
(cherry picked from commit 1643edc63c )
2013-03-18 14:22:01 +00:00
Dr. Stephen Henson
155ef13c67
Typo.
...
(cherry picked from commit 1546fb780b )
2013-03-18 13:59:57 +00:00
Dr. Stephen Henson
c3466040ec
Update ordinals.
2013-03-04 19:28:57 +00:00
Andy Polyakov
2d9be79407
x86_64-gf2m.pl: fix typo.
...
(cherry picked from commit 342dbbbe4e )
2013-03-01 22:37:53 +01:00
Andy Polyakov
2e4b7eede3
x86_64-gf2m.pl: add missing Windows build fix for #2963 .
...
PR: 3004
(cherry picked from commit 7c43601d44 )
2013-03-01 21:57:25 +01:00
Dr. Stephen Henson
e1dee801b9
Add function CMS_RecipientInfo_encrypt
...
Add CMS_RecipientInfo_encrypt: this function encrypts an existing content
encryption key to match the key in the RecipientInfo structure: this is
useful if a new recpient is added to and existing enveloped data structure.
Add documentation.
(cherry picked from commit e1f1d28f34 )
2013-02-26 17:06:08 +00:00
Dr. Stephen Henson
3c53fd892c
Fix error codes.
...
(cherry picked from commit 388aff08dc )
2013-02-26 17:05:39 +00:00
Dr. Stephen Henson
c46990b13b
Demo code for SSL_CONF API
...
Two example programs one for command line argument processing and
one for configuration file processing.
(cherry picked from commit 3646578ae7 )
2013-02-26 16:34:23 +00:00
Dr. Stephen Henson
1510b1f4c2
Update SSL_CONF docs.
...
Fix some typos and update version number first added: it has now been
backported to OpenSSL 1.0.2.
(cherry picked from commit 4365e4aad9 )
2013-02-26 15:29:49 +00:00
Dr. Stephen Henson
f8a69166ed
New -force_pubkey option to x509 utility to supply a different public
...
key to the one in a request. This is useful for cases where the public
key cannot be used for signing e.g. DH.
(cherry picked from commit 43206a2d7c )
2013-02-25 15:25:27 +00:00
Andy Polyakov
b9eef98883
bn_nist.c: work around clang 3.0 bug.
...
(cherry picked from commit 750398acd8 )
2013-02-16 11:37:38 +01:00
Nick Alcock
ae5c1ca377
Fix POD errors to stop make install_docs dying with pod2man 2.5.0+
...
podlators 2.5.0 has switched to dying on POD syntax errors. This means
that a bunch of long-standing erroneous POD in the openssl documentation
now leads to fatal errors from pod2man, halting installation.
Unfortunately POD constraints mean that you have to sort numeric lists
in ascending order if they start with 1: you cannot do 1, 0, 2 even if
you want 1 to appear first. I've reshuffled such (alas, I wish there
were a better way but I don't know of one).
(cherry picked from commit 5cc2707742 )
2013-02-15 19:39:59 +01:00
Andy Polyakov
188ab7df98
cms-test.pl: make it work with not-so-latest perl.
...
(cherry picked from commit 9c437e2fad )
2013-02-14 16:39:06 +01:00
Dr. Stephen Henson
2e3d02fe1a
Upate FAQ.
...
Add description of "allocate and encode" operation for ASN1 routines.
Document how versioning will for after the letter release reaches
y.
(cherry picked from commit 2527b94fec )
2013-02-12 16:05:02 +00:00
David Woodhouse
3a3a1af1da
Check DTLS_BAD_VER for version number.
...
The version check for DTLS1_VERSION was redundant as
DTLS1_VERSION > TLS1_1_VERSION, however we do need to
check for DTLS1_BAD_VER for compatibility.
PR:2984
(cherry picked from commit d980abb22e )
2013-02-12 15:15:32 +00:00
Dr. Stephen Henson
0ced72c608
Fix in ssltest is no-ssl2 configured
...
(cherry picked from commit cbf9b4aed3 )
2013-02-11 18:28:48 +00:00
Lutz Jaenicke
5584a95490
FAQ/README: we are now using Git instead of CVS
...
(cherry picked from commit f88dbb8385 )
2013-02-11 11:33:19 +01:00
Andy Polyakov
a3e66779d3
sparccpuid.S: work around emulator bug on T1.
...
(cherry picked from commit 3caeef94bd )
2013-02-11 10:41:22 +01:00
Andy Polyakov
919eab8a8b
s3_cbc.c: make CBC_MAC_ROTATE_IN_PLACE universal.
...
(cherry picked from commit f93a41877d )
2013-02-08 21:36:06 +01:00
Andy Polyakov
e9baceab5a
s3_cbc.c: get rid of expensive divisions [from master].
2013-02-08 16:59:26 +01:00
Andy Polyakov
b05561c4b7
ssl/[d1|s3]_pkt.c: harmomize orig_len handling.
...
(cherry picked from commit 8545f73b89 )
2013-02-08 10:40:51 +01:00
Dr. Stephen Henson
b7355af421
Fix IV check and padding removal.
...
Fix the calculation that checks there is enough room in a record
after removing padding and optional explicit IV. (by Steve)
For AEAD remove the correct number of padding bytes (by Andy)
(cherry picked from commit 32cc2479b4 )
2013-02-08 10:40:39 +01:00
Adam Langley
0462eedf5e
Fix for EXP-RC2-CBC-MD5
...
MD5 should use little endian order. Fortunately the only ciphersuite
affected is EXP-RC2-CBC-MD5 (TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5) which
is a rarely used export grade ciphersuite.
(cherry picked from commit f306b87d76 )
2013-02-08 10:40:13 +01:00
Andy Polyakov
82425f2c28
e_aes_cbc_hmac_sha1.c: align calculated MAC at cache line.
...
It also ensures that valgring is happy.
(cherry picked from commit 2141e6f30b )
2013-02-08 10:35:02 +01:00
Andy Polyakov
af010edd55
e_aes_cbc_hmac_sha1.c: cleanse temporary copy of HMAC secret.
...
(cherry picked from commit 529d27ea47 )
2013-02-06 13:56:15 +00:00
Andy Polyakov
5966f4d973
e_aes_cbc_hmac_sha1.c: address the CBC decrypt timing issues.
...
Address CBC decrypt timing issues and reenable the AESNI+SHA1 stitch.
(cherry picked from commit 125093b59f )
2013-02-06 13:56:15 +00:00
Andy Polyakov
eeb486a5f4
ssl/*: remove SSL3_RECORD->orig_len to restore binary compatibility.
...
Kludge alert. This is arranged by passing padding length in unused
bits of SSL3_RECORD->type, so that orig_len can be reconstructed.
(cherry picked from commit 8bfd4c659f )
2013-02-06 13:56:15 +00:00
Dr. Stephen Henson
d7f55e76f2
Don't access EVP_MD_CTX internals directly.
...
(cherry picked from commit 04e45b52ee )
2013-02-06 13:56:14 +00:00
Andy Polyakov
7d9e781a1d
s3/s3_cbc.c: allow for compilations with NO_SHA256|512.
...
(cherry picked from commit d5371324d9 )
2013-02-06 13:56:14 +00:00
Andy Polyakov
e0c21a0b6b
ssl/s3_cbc.c: md_state alignment portability fix.
...
RISCs are picky and alignment granted by compiler for md_state can be
insufficient for SHA512.
(cherry picked from commit 36260233e7 )
2013-02-06 13:56:14 +00:00
Andy Polyakov
1dfb4b9400
ssl/s3_cbc.c: uint64_t portability fix.
...
Break dependency on uint64_t. It's possible to declare bits as
unsigned int, because TLS packets are limited in size and 32-bit
value can't overflow.
(cherry picked from commit cab13fc847 )
2013-02-06 13:56:14 +00:00
Dr. Stephen Henson
e5cb774323
typo.
...
(cherry picked from commit 34ab3c8c71 )
2013-02-06 13:56:14 +00:00
Dr. Stephen Henson
73390e6ba5
Add ordinal for CRYPTO_memcmp: since this will affect multiple
...
branches it needs to be in a "gap".
(cherry picked from commit 81ce0e14e7 )
2013-02-06 13:56:13 +00:00
Dr. Stephen Henson
d91d9acc58
Timing fix mitigation for FIPS mode.
...
We have to use EVP in FIPS mode so we can only partially mitigate
timing differences.
Make an extra call to EVP_DigestSignUpdate to hash additonal blocks
to cover any timing differences caused by removal of padding.
(cherry picked from commit b908e88ec1 )
2013-02-06 13:56:13 +00:00
Ben Laurie
820988a0c0
Oops. Add missing file.
...
(cherry picked from commit 014265eb02 )
2013-02-06 13:56:13 +00:00
Ben Laurie
1326a64a33
Update DTLS code to match CBC decoding in TLS.
...
This change updates the DTLS code to match the constant-time CBC
behaviour in the TLS.
(cherry picked from commit 9f27de170d )
2013-02-06 13:56:13 +00:00
Ben Laurie
e0da2c2ed2
Don't crash when processing a zero-length, TLS >= 1.1 record.
...
The previous CBC patch was bugged in that there was a path through enc()
in s3_pkt.c/d1_pkt.c which didn't set orig_len. orig_len would be left
at the previous value which could suggest that the packet was a
sufficient length when it wasn't.
(cherry picked from commit 6cb19b7681 )
2013-02-06 13:56:13 +00:00
Ben Laurie
fb0a59cc58
Make CBC decoding constant time.
...
This patch makes the decoding of SSLv3 and TLS CBC records constant
time. Without this, a timing side-channel can be used to build a padding
oracle and mount Vaudenay's attack.
This patch also disables the stitched AESNI+SHA mode pending a similar
fix to that code.
In order to be easy to backport, this change is implemented in ssl/,
rather than as a generic AEAD mode. In the future this should be changed
around so that HMAC isn't in ssl/, but crypto/ as FIPS expects.
(cherry picked from commit e130841bcc )
2013-02-06 13:56:12 +00:00
Ben Laurie
f5cd3561ba
Add and use a constant-time memcmp.
...
This change adds CRYPTO_memcmp, which compares two vectors of bytes in
an amount of time that's independent of their contents. It also changes
several MAC compares in the code to use this over the standard memcmp,
which may leak information about the size of a matching prefix.
(cherry picked from commit 2ee798880a )
2013-02-06 13:56:12 +00:00
Dr. Stephen Henson
115f7fa562
Merge branch 'OpenSSL_1_0_2-stable' of /home/steve/src/git/openssl into OpenSSL_1_0_2-stable
2013-02-04 15:14:11 +00:00
Dr. Stephen Henson
c867d87180
Fix for trace code: SSL3 doesn't include a length value for
...
encrypted premaster secret value.
(cherry picked from commit ea34a58385 )
2013-02-04 15:14:00 +00:00
Andy Polyakov
2a713eadc3
bn_word.c: fix overflow bug in BN_add_word.
...
(cherry picked from commit 134c00659a )
2013-02-02 22:37:35 +01:00
Andy Polyakov
2e7900b624
x86_64 assembly pack: keep making Windows build more robust.
...
PR: 2963 and a number of others
(cherry picked from commit 4568182a8b )
2013-02-02 19:56:43 +01:00
Dr. Stephen Henson
f8435919a1
Fix warning: lenmax isn't used any more.
2013-01-24 14:08:28 +00:00
Dr. Stephen Henson
1db4354b53
Don't include comp.h in cmd_cd.c if OPENSSL_NO_COMP set
2013-01-23 01:11:05 +00:00
Andy Polyakov
3f233a1e77
x86_64 assembly pack: make Windows build more robust [from master].
...
PR: 2963 and a number of others
2013-01-22 22:51:29 +01:00
Andy Polyakov
25917e972d
TABLE update.
2013-01-22 21:22:20 +01:00
Andy Polyakov
8812a81bdd
Configure: update linux-mips* lines [from master].
2013-01-22 21:21:44 +01:00
Andy Polyakov
b17ffba915
bn/asm/mips.pl: hardwire local call to bn_div_words.
2013-01-22 21:16:02 +01:00
Dr. Stephen Henson
3619e34f50
Don't include comp.h if no-comp set.
2013-01-20 01:10:03 +00:00
Ben Laurie
6924686b78
Merge branch 'OpenSSL_1_0_2-stable' of openssl.net:openssl into OpenSSL_1_0_2-stable
2013-01-19 18:36:44 +00:00
Ben Laurie
92745f8116
Remove extraneous brackets (clang doesn't like them).
2013-01-19 18:24:00 +00:00
Ben Laurie
17cf9864e0
Add MacOS 64-bit debug target.
2013-01-19 18:23:36 +00:00
Andy Polyakov
5cfefd3ce3
engines/ccgost: GOST fixes [from master].
...
Submitted by: Dmitry Belyavsky, Seguei Leontiev
PR: 2821
2013-01-19 18:24:03 +01:00
Ben Laurie
9ccc6f4382
Can't check a size_t for < 0.
2013-01-19 15:01:18 +00:00
Andy Polyakov
3c92471723
.gitignore adjustments
2013-01-19 13:31:29 +01:00
Dr. Stephen Henson
1a932ae094
-named_curve option handled automatically now.
2013-01-18 15:41:06 +00:00
Dr. Stephen Henson
57912ed329
Add code to download CRLs based on CRLDP extension.
...
Just a sample, real world applications would have to be cleverer.
2013-01-18 15:38:13 +00:00
Dr. Stephen Henson
e998f8aeb8
cipher is not used in s_server any more.
2013-01-18 15:05:28 +00:00
Dr. Stephen Henson
e318431e54
New option to add CRLs for s_client and s_server.
2013-01-18 14:37:14 +00:00
Dr. Stephen Henson
6a10f38daa
initial support for delta CRL generations by diffing two full CRLs
2013-01-17 18:51:50 +00:00
Dr. Stephen Henson
c095078890
Typo (PR2959).
2013-01-17 18:21:54 +00:00
Dr. Stephen Henson
c644b83227
constify
2013-01-17 16:35:50 +00:00
Dr. Stephen Henson
75f535315a
New functions to set lookup_crls callback and to retrieve internal X509_STORE
...
from X509_STORE_CTX.
2013-01-17 16:32:33 +00:00
Dr. Stephen Henson
7c283d9e97
add option to get a certificate or CRL from a URL
2013-01-17 16:08:02 +00:00
Dr. Stephen Henson
2aa3ef78b6
print out issuer and subject unique identifier fields in certificates
2013-01-16 15:08:34 +00:00
Dr. Stephen Henson
1c0964e87f
add wrapper function for certificate download
2013-01-15 18:01:54 +00:00
Dr. Stephen Henson
5c8d41be85
Generalise OCSP I/O functions to support dowloading of other ASN1
...
structures using HTTP. Add wrapper function to handle CRL download.
2013-01-15 18:01:31 +00:00
Dr. Stephen Henson
b286640360
Update default dependency flags.
2013-01-15 16:26:04 +00:00
Dr. Stephen Henson
75a8ff9263
make update
2013-01-15 16:24:07 +00:00
Dr. Stephen Henson
50b5966e57
Add support for broken protocol tests (backport from master branch)
2013-01-15 16:18:13 +00:00
Dr. Stephen Henson
8eb4456f93
Make whitespace consistent with master branch.
2013-01-15 15:55:54 +00:00
Ben Laurie
24c45faba0
Fix some clang warnings.
2013-01-13 21:06:36 +00:00
Ben Laurie
010ac38a98
Correct EVP_PKEY_verifyrecover to EVP_PKEY_verify_recover (RT 2955).
2013-01-12 12:51:58 +00:00
Dr. Stephen Henson
1c25ed5dbb
In FIPS mode use PKCS#8 format when writing private keys:
...
traditional format uses MD5 which is prohibited in FIPS mode.
2013-01-07 16:16:43 +00:00
Dr. Stephen Henson
bf1d32e52a
Change default bits to 1024
2013-01-07 16:13:48 +00:00
Dr. Stephen Henson
6c86b69729
Add .gitignore from master branch.
2013-01-06 21:34:51 +00:00
Ben Laurie
72dfff2d5e
Fix warning.
2013-01-06 21:03:05 +00:00
Dr. Stephen Henson
3341b820cc
add support for separate verify can chain stores to s_client (backport from HEAD)
2012-12-30 16:27:15 +00:00
Dr. Stephen Henson
ede5f6cf74
add -chain options to s_client (backrpot from HEAD)
2012-12-30 16:17:29 +00:00
Dr. Stephen Henson
321a9fea75
make no-comp compile
2012-12-30 16:05:03 +00:00
Dr. Stephen Henson
2e00f46b51
stop warning when compiling with no-comp
2012-12-30 01:12:19 +00:00
Dr. Stephen Henson
8c3f868983
remove unused cipher functionality from s_client
2012-12-30 00:03:40 +00:00
Dr. Stephen Henson
d03cc94f47
Update debug-steve* options.
2012-12-29 23:59:18 +00:00
Dr. Stephen Henson
5477ff9ba2
make JPAKE work again, fix memory leaks
2012-12-29 23:58:44 +00:00
Dr. Stephen Henson
46b11600b0
update ordinals
2012-12-29 14:18:14 +00:00
Dr. Stephen Henson
15387e4ce0
Delegate command line handling for many common options in s_client/s_server to
...
the SSL_CONF APIs.
This is complicated a little because the SSL_CTX structure is not available
when the command line is processed: so just check syntax of commands initially
and store them, ready to apply later.
(backport from HEAD)
2012-12-29 14:16:41 +00:00
Dr. Stephen Henson
49ef33fa34
add SSL_CONF functions and documentation (backport from HEAD)
2012-12-29 13:30:56 +00:00
Dr. Stephen Henson
1166323530
Update ordinals.
2012-12-26 23:53:52 +00:00
Dr. Stephen Henson
29113688a1
Portability fix: use BIO_snprintf and pick up strcasecmp alternative
...
definitions from e_os.h
2012-12-26 23:51:41 +00:00
Dr. Stephen Henson
44c970746f
typo
2012-12-26 22:43:43 +00:00
Dr. Stephen Henson
bc200e691c
SSL/TLS record tracing code (backport from HEAD).
2012-12-26 22:40:46 +00:00
Dr. Stephen Henson
a08f8d73cc
Reject zero length ec point format list.
...
Give more meaningful error is attempt made to use incorrect curve.
(from HEAD)
2012-12-26 18:26:11 +00:00
Dr. Stephen Henson
b52f12b3ba
handle point format list retrieval for clients too (from HEAD)
2012-12-26 18:20:07 +00:00
Dr. Stephen Henson
78b5d89ddf
Add support for printing out and retrieving EC point formats extension.
...
(backport from HEAD)
2012-12-26 18:13:49 +00:00
Dr. Stephen Henson
b79df62eff
return error if Suite B mode is selected and TLS 1.2 can't be used.
...
(backport from HEAD)
2012-12-26 17:39:02 +00:00
Dr. Stephen Henson
e3c76874ad
set auto ecdh parameter selction for Suite B
...
(backport from HEAD)
2012-12-26 17:35:02 +00:00
Dr. Stephen Henson
4347394a27
add Suite B 128 bit mode offering only combination 2
...
(backport from HEAD)
2012-12-26 17:34:50 +00:00
Dr. Stephen Henson
53bb723834
Use client version when deciding which cipher suites to disable.
...
(backport from HEAD)
2012-12-26 17:09:39 +00:00
Dr. Stephen Henson
684a2264c5
Use default point formats extension for server side as well as client
...
side, if possible.
Don't advertise compressed char2 for SuiteB as it is not supported.
(backport from HEAD)
2012-12-26 17:09:14 +00:00
Dr. Stephen Henson
fde8dc1798
add Suite B verification flags
2012-12-26 16:57:39 +00:00
Dr. Stephen Henson
3c87a2bdfa
contify
...
(backport from HEAD)
2012-12-26 16:49:59 +00:00
Dr. Stephen Henson
1520e6c084
Add ctrl and utility functions to retrieve raw cipher list sent by client in
...
client hello message. Previously this could only be retrieved on an initial
connection and it was impossible to determine the cipher IDs of any uknown
ciphersuites.
(backport from HEAD)
2012-12-26 16:25:06 +00:00
Dr. Stephen Henson
2001129f09
new ctrl to retrive value of received temporary key in server key exchange message, print out details in s_client
...
(backport from HEAD)
2012-12-26 16:23:36 +00:00
Dr. Stephen Henson
a50ecaee56
store and print out message digest peer signed with in TLS 1.2
...
(backport from HEAD)
2012-12-26 16:23:13 +00:00
Dr. Stephen Henson
67d9dcf003
perform sanity checks on server certificate type as soon as it is received instead of waiting until server key exchange
...
(backport from HEAD)
2012-12-26 16:22:19 +00:00
Dr. Stephen Henson
79dcae32ef
give more meaningful error if presented with wrong certificate type by server
...
(backport from HEAD)
2012-12-26 16:18:15 +00:00
Dr. Stephen Henson
ccf6a19e2d
Add three Suite B modes to TLS code, supporting RFC6460.
...
(backport from HEAD)
2012-12-26 16:17:40 +00:00
Dr. Stephen Henson
28fbbe3b1b
Add missing prototype to x509.h
2012-12-26 16:11:10 +00:00
Dr. Stephen Henson
8d2dbe6ac0
New function X509_chain_up_ref to dup and up the reference count of
...
a STACK_OF(X509): replace equivalent functionality in several places
by the equivalent call.
(backport from HEAD)
2012-12-26 16:04:03 +00:00
Dr. Stephen Henson
ba8bdea771
add suite B chain validation flags and associated verify errors
...
(backport from HEAD)
2012-12-26 16:01:31 +00:00
Dr. Stephen Henson
3d9916298a
Oops, add missing v3nametest.c
2012-12-26 15:59:57 +00:00
Dr. Stephen Henson
87054c4f0e
New -valid option to add a certificate to the ca index.txt that is valid and not revoked
...
(backport from HEAD)
2012-12-26 15:32:13 +00:00
Dr. Stephen Henson
6660baee66
Make tls1_check_chain return a set of flags indicating checks passed
...
by a certificate chain. Add additional tests to handle client
certificates: checks for matching certificate type and issuer name
comparison.
Print out results of checks for each candidate chain tested in
s_server/s_client.
(backport from HEAD)
2012-12-26 15:27:44 +00:00
Dr. Stephen Henson
25d4c9254c
Abort handshake if signature algorithm used not supported by peer.
...
(backport from HEAD)
2012-12-26 15:27:24 +00:00
Dr. Stephen Henson
44adfeb6c0
check EC tmp key matches preferences
...
(backport from HEAD)
2012-12-26 15:27:04 +00:00
Dr. Stephen Henson
5ff2ef79e6
typo
2012-12-26 15:23:16 +00:00
Dr. Stephen Henson
b762acadeb
Add support for certificate stores in CERT structure. This makes it
...
possible to have different stores per SSL structure or one store in
the parent SSL_CTX. Include distint stores for certificate chain
verification and chain building. New ctrl SSL_CTRL_BUILD_CERT_CHAIN
to build and store a certificate chain in CERT structure: returing
an error if the chain cannot be built: this will allow applications
to test if a chain is correctly configured.
Note: if the CERT based stores are not set then the parent SSL_CTX
store is used to retain compatibility with existing behaviour.
(backport from HEAD)
2012-12-26 15:21:53 +00:00
Dr. Stephen Henson
7d779eefb4
add ssl_locl.h to err header files, rebuild ssl error strings
...
(backport from HEAD)
2012-12-26 15:09:16 +00:00
Dr. Stephen Henson
35b7757f9b
set ciphers to NULL before calling cert_cb
...
(backport from HEAD)
2012-12-26 14:56:40 +00:00
Dr. Stephen Henson
23195e4dcc
stop warning
...
(backport from HEAD)
2012-12-26 14:56:27 +00:00
Dr. Stephen Henson
b28fbdfa7d
New function ssl_set_client_disabled to set masks for any ciphersuites
...
that are disabled for this session (as opposed to always disabled by
configuration).
(backport from HEAD)
2012-12-26 14:55:46 +00:00
Dr. Stephen Henson
a897502cd9
Add new ctrl to retrieve client certificate types, print out
...
details in s_client.
Also add ctrl to set client certificate types. If not used sensible values
will be included based on supported signature algorithms: for example if
we don't include any DSA signing algorithms the DSA certificate type is
omitted.
Fix restriction in old code where certificate types would be truncated
if it exceeded TLS_CT_NUMBER.
(backport from HEAD)
2012-12-26 14:51:37 +00:00
Dr. Stephen Henson
8546add692
cert_flags is unsigned
...
(backport from HEAD)
2012-12-26 14:48:05 +00:00
Dr. Stephen Henson
aa5c5eb4c1
add support for client certificate callbak, fix memory leak
...
(backport from HEAD)
2012-12-26 14:47:31 +00:00
Dr. Stephen Henson
731abd3bd7
new function SSL_is_server to which returns 1 is the corresponding SSL context is for a server
...
(backport from HEAD)
2012-12-26 14:45:46 +00:00
Dr. Stephen Henson
7531dd18dc
no need to check s->server as default_nid is never used for TLS 1.2 client authentication
...
(backport from HEAD)
2012-12-26 14:45:27 +00:00
Dr. Stephen Henson
04c32cddaa
Separate client and server permitted signature algorithm support: by default
...
the permitted signature algorithms for server and client authentication
are the same but it is now possible to set different algorithms for client
authentication only.
(backport from HEAD)
2012-12-26 14:44:56 +00:00
Dr. Stephen Henson
623a5e24cb
Add certificate callback. If set this is called whenever a certificate
...
is required by client or server. An application can decide which
certificate chain to present based on arbitrary criteria: for example
supported signature algorithms. Add very simple example to s_server.
This fixes many of the problems and restrictions of the existing client
certificate callback: for example you can now clear existing certificates
and specify the whole chain.
(backport from HEAD)
2012-12-26 14:43:51 +00:00
Dr. Stephen Henson
bd9fc1d667
New functions to retrieve certificate signatures and signature OID NID.
...
(backport from HEAD)
2012-12-26 14:31:05 +00:00
Dr. Stephen Henson
c550f2e37b
Function tls1_check_ec_server_key is now redundant as we make
...
appropriate checks in tls1_check_chain.
(backport from HEAD)
2012-12-26 14:27:27 +00:00
Dr. Stephen Henson
484f876235
Add new "valid_flags" field to CERT_PKEY structure which determines what
...
the certificate can be used for (if anything). Set valid_flags field
in new tls1_check_chain function. Simplify ssl_set_cert_masks which used
to have similar checks in it.
Add new "cert_flags" field to CERT structure and include a "strict mode".
This enforces some TLS certificate requirements (such as only permitting
certificate signature algorithms contained in the supported algorithms
extension) which some implementations ignore: this option should be used
with caution as it could cause interoperability issues.
(backport from HEAD)
2012-12-26 14:26:53 +00:00
Dr. Stephen Henson
c70a1fee71
Reorganise supported signature algorithm extension processing.
...
Only store encoded versions of peer and configured signature algorithms.
Determine shared signature algorithms and cache the result along with NID
equivalents of each algorithm.
(backport from HEAD)
2012-12-26 14:26:16 +00:00
Dr. Stephen Henson
0b362de5f5
Add support for application defined signature algorithms for use with
...
TLS v1.2. These are sent as an extension for clients and during a certificate
request for servers.
TODO: add support for shared signature algorithms, respect shared algorithms
when deciding which ciphersuites and certificates to permit.
(backport from HEAD)
2012-12-26 14:25:29 +00:00
Dr. Stephen Henson
d312f7be37
Make it possible to delete all certificates from an SSL structure.
...
(backport from HEAD)
2012-12-26 14:18:50 +00:00
Dr. Stephen Henson
2b5e5c3d08
Revert incompatible OCSP_basic_verify changes.
...
Make partial chain chekcing work with EE certificates only.
Remove unneeded -trust_other option from tocsp.
(Backport from HEAD)
2012-12-26 14:12:09 +00:00
Dr. Stephen Henson
708454f010
add missing \n
2012-12-23 18:12:28 +00:00
Dr. Stephen Henson
f1aec4dec3
fix typo
2012-12-21 18:33:53 +00:00
Dr. Stephen Henson
1c53a72f17
update/fix tocsp script (from HEAD)
2012-12-20 19:15:35 +00:00
Dr. Stephen Henson
9b157602e0
Backport enhancements to OCSP utility from HEAD:
...
Support - as a file for standard input or output.
Add -badsig option to generate invalid signatures for testing.
New -rmd option to specify digest to sign OCSP responses with.
2012-12-20 19:06:39 +00:00
Dr. Stephen Henson
67e217c84c
revert, missing commit message
2012-12-20 19:01:55 +00:00
Dr. Stephen Henson
e6b650df0a
oops, revert
2012-12-20 19:01:34 +00:00
Dr. Stephen Henson
7b7b667ddc
apps/ocsp.c
2012-12-20 18:59:09 +00:00
Dr. Stephen Henson
70cd3c6b95
Integrate host, email and IP address checks into X509_verify.
...
Add new verify options to set checks.
(backport from HEAD)
2012-12-19 15:14:10 +00:00
Dr. Stephen Henson
db05bc512d
Return success when the responder is active.
...
Don't verify our own responses.
(backport from HEAD)
2012-12-19 15:02:58 +00:00
Dr. Stephen Henson
45da1efcdb
Backport X509 hostname, IP address and email checking code from HEAD.
2012-12-19 15:01:59 +00:00
Dr. Stephen Henson
54a0076e94
Check chain is not NULL before assuming we have a validated chain. The
...
modification to the OCSP helper purpose breaks normal OCSP verification. It is
no longer needed now we can trust partial chains.
2012-12-19 15:01:32 +00:00
Andy Polyakov
f8cab37bc1
VC-32.pl: fix typo [from HEAD].
...
Submitted by: Pierre Delaage
2012-12-16 19:40:51 +00:00
Dr. Stephen Henson
2e65277695
Use new partial chain flag instead of modifying input parameters.
...
(backport from HEAD)
2012-12-14 14:31:16 +00:00
Dr. Stephen Henson
9a1f59cd31
New verify flag to return success if we have any certificate in the trusted
...
store instead of the default which is to return an error if we can't build
the complete chain. [backport from HEAD]
2012-12-14 14:30:46 +00:00
Ben Laurie
4e72220fd6
Documentation improvements by Chris Palmer (Google).
2012-12-14 13:29:17 +00:00
Ben Laurie
d65b8b2162
Backport OCSP fixes.
2012-12-14 12:53:53 +00:00
Ben Laurie
5dca1e338c
Document -pubkey option.
2012-12-13 16:16:48 +00:00
Ben Laurie
5f4cf08864
Make verify return errors.
2012-12-13 15:49:15 +00:00
Ben Laurie
2a2e537983
Ignore more.
2012-12-13 12:43:18 +00:00
Ben Laurie
d79fc8da02
Add my 64-bit debug target.
2012-12-12 13:45:32 +00:00
Dr. Stephen Henson
e04ccbc5cc
Fix two bugs which affect delta CRL handling:
...
Use -1 to check all extensions in CRLs.
Always set flag for freshest CRL.
2012-12-06 18:24:47 +00:00
Andy Polyakov
bc946bfb97
aes-s390x.pl: fix XTS bugs in z196-specific code path [from HEAD].
2012-12-05 17:45:09 +00:00
Dr. Stephen Henson
38680fa466
check mval for NULL too
2012-12-04 17:26:04 +00:00
Dr. Stephen Henson
a902b6bd98
fix leak
2012-12-03 16:33:15 +00:00
Andy Polyakov
c5e91a9ae9
aes-s390x.pl: harmonize software-only path [from HEAD].
2012-12-01 11:09:13 +00:00
Dr. Stephen Henson
b5f57f455a
PR: 2803
...
Submitted by: jean-etienne.schwartz@bull.net
In OCSP_basic_varify return an error if X509_STORE_CTX_init fails.
2012-11-29 19:15:27 +00:00
Andy Polyakov
ad00a52f2d
Intel compiler support update from HEAD.
2012-11-28 13:12:09 +00:00
Dr. Stephen Henson
e08c7f15b4
change inaccurate error message
2012-11-26 15:47:44 +00:00
Dr. Stephen Henson
7469af4484
reject zero length point format list or supported curves extensions
2012-11-22 14:15:36 +00:00
Dr. Stephen Henson
ec76d850af
PR: 2908
...
Submitted by: Dmitry Belyavsky <beldmit@gmail.com >
Fix DH double free if parameter generation fails.
2012-11-21 14:02:30 +00:00
Dr. Stephen Henson
cedf19f356
fix leaks
2012-11-20 00:28:22 +00:00
Dr. Stephen Henson
1d5f3f4640
correct docs
2012-11-19 20:06:57 +00:00
Andy Polyakov
a060fc3b8e
x86_64-gcc.c: resore early clobber constraint [from HEAD].
...
Submitted by: Florian Weimer
2012-11-19 15:02:34 +00:00
Dr. Stephen Henson
bda5153703
PR: 2880
...
Submitted by: "Florian Rüchel" <florian.ruechel@ruhr-uni-bochum.de >
Correctly handle local machine keys in the capi ENGINE.
2012-11-18 15:21:12 +00:00
Dr. Stephen Henson
6f539399ef
add "missing" TLSv1.2 cipher alias
2012-11-15 19:15:07 +00:00
Andy Polyakov
d90bf2ab21
[vp]aes-x86[_64].pl: update from HEAD.
2012-11-12 18:11:17 +00:00
Andy Polyakov
02620cfcd5
Cumulative updates from HEAD.
2012-10-29 22:29:29 +00:00
Dr. Stephen Henson
74daafaa94
use correct year automatically
2012-10-22 13:03:31 +00:00
Andy Polyakov
aa963813ed
linux-ppc: make it more robust [from HEAD].
2012-10-21 18:25:29 +00:00
Dr. Stephen Henson
9a6aff50ff
Don't require tag before ciphertext in AESGCM mode
2012-10-16 22:46:32 +00:00
Andy Polyakov
c7d16ac8da
aix[64]-cc: get MT support right [from HEAD].
...
PR: 2896
2012-10-16 08:09:20 +00:00
Bodo Möller
b626f0396c
Fix EC_KEY initialization race.
...
Submitted by: Adam Langley
2012-10-05 20:50:38 +00:00
Dr. Stephen Henson
9d2006d8ed
add -trusted_first option and verify flag (backport from HEAD)
2012-09-26 13:50:42 +00:00
Bodo Möller
abf1e32f2f
Fix Valgrind warning.
...
Submitted by: Adam Langley
2012-09-24 19:49:25 +00:00
Richard Levitte
fc1e09bf81
* Configure: make the debug-levitte-linux{elf,noasm} less extreme.
2012-09-24 18:49:07 +00:00
Richard Levitte
451cec33df
* ssl/t1_enc.c (tls1_change_cipher_state): Stupid bug. Fortunately in
...
debugging code that's seldom used.
2012-09-21 13:08:30 +00:00
Andy Polyakov
16c92916c7
Configure: allow for compiler options starting with double dash [from HEAD].
2012-09-19 21:00:35 +00:00
Andy Polyakov
988037fe18
MIPS assembly pack: jumbo update from HEAD.
2012-09-19 20:59:18 +00:00
Bodo Möller
9a7f80c869
Fix warning.
...
Submitted by: Chromium Authors
2012-09-17 17:23:43 +00:00
Andy Polyakov
507e5c3a61
e_aes.c: uninitialized variable in aes_ccm_init_key [from HEAD].
...
PR: 2874
Submitted by: Tomas Mraz
2012-09-15 08:46:08 +00:00
Dr. Stephen Henson
f8b90b5a5d
fix memory leak
2012-09-11 13:44:19 +00:00
Dr. Stephen Henson
dc14441757
Minor enhancement to PR#2836 fix. Instead of modifying SSL_get_certificate
...
change the current certificate (in s->cert->key) to the one used and then
SSL_get_certificate and SSL_get_privatekey will automatically work.
2012-09-11 13:35:14 +00:00
Ben Laurie
da8512aaff
Call OCSP Stapling callback after ciphersuite has been chosen, so the
...
right response is stapled. Also change SSL_get_certificate() so it
returns the certificate actually sent. See
http://rt.openssl.org/Ticket/Display.html?id=2836 .
2012-09-11 12:00:25 +00:00
Andy Polyakov
d46a1a6178
bn_lcl.h: gcc removed support for "h" constraint, which broke inline
...
assembler [from HEAD].
2012-09-01 13:21:24 +00:00
Dr. Stephen Henson
957c7c0e88
Don't load GOST ENGINE if it is already loaded.
...
Multiple copies of the ENGINE will cause problems when it is cleaned up as
the methods are stored in static structures which will be overwritten and
freed up more than once.
Set static methods to NULL when the ENGINE is freed so it can be reloaded.
2012-09-01 11:30:35 +00:00
Andy Polyakov
3ebe87473c
x86cpuid.pl: hide symbols [backport from x86_64, from HEAD].
2012-08-29 14:24:18 +00:00
Andy Polyakov
0e05b51fe5
Add linux-x32 target [from HEAD].
2012-08-29 14:12:10 +00:00
Dr. Stephen Henson
c759e453bc
PR: 2786
...
Reported by: Tomas Mraz <tmraz@redhat.com >
Treat a NULL value passed to drbg_free_entropy callback as non-op. This
can happen if the call to fips_get_entropy fails.
2012-08-22 22:43:03 +00:00
Andy Polyakov
40ce8fca73
sha1-armv4-large.pl: comply with ABI [from HEAD].
2012-08-17 19:58:34 +00:00
Andy Polyakov
8e1c33e160
MIPS assembly pack updates from HEAD.
2012-08-17 09:41:30 +00:00
Andy Polyakov
13b0cae256
aes-mips.pl: harmonize with fips module.
...
PR: 2863
Submitted by: Duane Sand
2012-08-17 09:03:57 +00:00
Bodo Möller
6d78a93b5b
Enable message names for TLS 1.1, 1.2 with -msg.
2012-08-16 13:42:37 +00:00
Andy Polyakov
ae92994645
bss_dgram.c: fix compilation failure and warning on Windows with
...
contemporary SDK [from HEAD].
2012-08-14 09:53:41 +00:00
Andy Polyakov
c4aa6b041b
gosthash.c: use memmove in circle_xor8, as input pointers can be equal
...
[from HEAD].
PR: 2858
2012-08-13 16:37:58 +00:00
Andy Polyakov
80158304f0
./Configure: libcrypto.a can grow to many GB on Solaris 10, because of ar bug
...
[from HEAD].
PR: 2838
2012-08-13 16:16:24 +00:00
Andy Polyakov
f0a069c1a2
gcm128.c: fix AAD-only case with AAD length not divisible by 16 [from HEAD].
...
PR: 2859
Submitted by: John Foley
2012-08-13 15:31:10 +00:00
Dr. Stephen Henson
5b4b9ce976
Don't ignore (!) reference count in X509_STORE_free.
2012-07-19 12:48:02 +00:00
Dr. Stephen Henson
7fbcc2f24a
type
2012-07-13 11:17:56 +00:00
Richard Levitte
e4be79a383
Add the missing dh_rfc5114 and evp_cnf.
2012-07-05 13:00:45 +00:00
Richard Levitte
658604473f
Added aliases for symbols longer than 31 chars.
2012-07-05 09:08:18 +00:00
Richard Levitte
86bea6455c
remove duplicate symbol in crypto/symhacks.h
...
Have the new names start in column 48, that makes it easy to see when
the 31 character limit is reached (on a 80 column display, do the math)
2012-07-05 08:53:43 +00:00
Dr. Stephen Henson
1e4a6e7b7f
add missing evp_cnf.c file
2012-07-04 13:14:44 +00:00
Andy Polyakov
fd6a72fa1c
crypto/bn/*.h: move PTR_SIZE_INT to private header [from HEAD].
2012-07-04 08:51:44 +00:00
Dr. Stephen Henson
ccffdb3fdc
revert unrelated test code
2012-07-03 20:21:35 +00:00
Dr. Stephen Henson
74d89b0d93
PR: 2840
...
Reported by: David McCullough <david_mccullough@mcafee.com >
Restore fips configuration module from 0.9.8.
2012-07-03 20:20:11 +00:00
Dr. Stephen Henson
f142a71c3d
Fix memory leak.
...
Always perform nexproto callback argument initialisation in s_server
otherwise we use uninitialised data if -nocert is specified.
2012-07-03 16:37:31 +00:00
Andy Polyakov
5b7af6de43
bn_nist.c: harmonize buf in BN_nist_mod_256 with other mod functions and
...
compensate for VC buf [from HEAD].
PR: 2837
2012-07-02 14:38:22 +00:00
Andy Polyakov
ae414a0e42
bss_dgram.c: fix typos in Windows code [from HEAD].
2012-07-01 09:12:03 +00:00
Dr. Stephen Henson
a240ea8ab8
don't use pseudo digests for default values of keys
2012-06-27 14:12:01 +00:00
Andy Polyakov
8b654459be
x86_64 assembly pack: make it possible to compile with Perl located
...
on path with spaces [from HEAD].
PR: 2835
2012-06-27 12:48:50 +00:00
Dr. Stephen Henson
93cf058334
oops, add -debug_decrypt option which was accidenatally left out
2012-06-19 13:39:17 +00:00
Andy Polyakov
3e8b4b5055
bss_dgram.c: add BIO_CTRL_DGRAM_SET_DONT_FRAG, fix bugs [from HEAD].
...
PR: 2830, 2833
2012-06-19 12:28:47 +00:00
Ben Laurie
3c56d65a41
Fix memory leak.
2012-06-11 09:23:38 +00:00
Dr. Stephen Henson
e51ec51af9
revert more "version skew" changes that break FIPS builds
2012-06-10 23:02:06 +00:00
Dr. Stephen Henson
ff1c55e983
Revert "version skew" patches that break FIPS compilation
2012-06-09 23:36:38 +00:00
Ben Laurie
835d104f46
Rearrange and test authz extension.
2012-06-07 13:20:20 +00:00
Ben Laurie
aeba1ef352
Fix memory leak.
2012-06-06 12:58:35 +00:00
Ben Laurie
49e9f751a4
Fix authz parsing.
2012-06-06 12:45:14 +00:00
Ben Laurie
ff46820da6
Version skew reduction.
2012-06-06 12:41:46 +00:00
Andy Polyakov
6fba65e20d
x86gas.pl: update from HEAD.
2012-06-04 22:14:25 +00:00
Ben Laurie
68d2cf51bc
Reduce version skew: trivia (I hope).
2012-06-03 22:03:37 +00:00
Ben Laurie
19eedffcaf
Don't insert in the middle.
2012-05-29 18:58:43 +00:00
Ben Laurie
4e14996e8a
Missing from previous commit.
2012-05-29 18:39:32 +00:00
Ben Laurie
8a02a46a5c
RFC 5878 support.
2012-05-29 17:27:48 +00:00
Ben Laurie
0de5a0feee
Work around macro issue with FreeBSD and gcc 4.6.
2012-05-18 12:40:28 +00:00
Andy Polyakov
4d321e0767
s2_clnt.c: compensate for compiler bug [from HEAD].
2012-05-16 18:22:15 +00:00
Andy Polyakov
67fda0c12e
ppccap.c: assume no features under 32-bit AIX kernel [from HEAD].
...
PR: 2810
2012-05-16 18:18:14 +00:00
Dr. Stephen Henson
1dded7f7e8
Experimental multi-implementation support for FIPS capable OpenSSL.
...
When in FIPS mode the approved implementations are used as normal,
when not in FIPS mode the internal unapproved versions are used instead.
This means that the FIPS capable OpenSSL isn't forced to use the
(often lower perfomance) FIPS implementations outside FIPS mode.
2012-05-13 18:40:12 +00:00
Dr. Stephen Henson
482f238069
PR: 2813
...
Reported by: Constantine Sapuntzakis <csapuntz@gmail.com >
Fix possible deadlock when decoding public keys.
2012-05-11 13:53:23 +00:00
Dr. Stephen Henson
5e145e54cc
PR: 2811
...
Reported by: Phil Pennock <openssl-dev@spodhuis.org >
Make renegotiation work for TLS 1.2, 1.1 by not using a lower record
version client hello workaround if renegotiating.
2012-05-11 13:33:34 +00:00
Dr. Stephen Henson
df73e68a43
PR: 2806
...
Submitted by: PK <runningdoglackey@yahoo.com >
Correct ciphersuite signature algorithm definitions.
2012-05-10 18:25:31 +00:00
Dr. Stephen Henson
e7c8483891
Sanity check record length before skipping explicit IV in TLS 1.2, 1.1 and
...
DTLS to fix DoS attack.
Thanks to Codenomicon for discovering this issue using Fuzz-o-Matic
fuzzing as a service testing platform.
(CVE-2012-2333)
2012-05-10 16:03:36 +00:00
Richard Levitte
712d523484
Don't forget to install srtp.h as well
2012-05-10 15:01:26 +00:00
Dr. Stephen Henson
24547c23ca
Reported by: Solar Designer of Openwall
...
Make sure tkeylen is initialised properly when encrypting CMS messages.
2012-05-10 13:44:24 +00:00
Richard Levitte
8baf604a39
Correct environment variable is OPENSSL_ALLOW_PROXY_CERTS.
2012-05-04 10:43:24 +00:00
Andy Polyakov
95416ce5b3
ppccpuid.pl: branch hints in OPENSSL_cleanse impact small block performance
...
of digest algorithms, mosty SHA, on Power7. Mystery of century, why SHA,
why slower algorithm are affected more... [from HEAD].
PR: 2794
Submitted by: Ashley Lai
2012-04-27 20:19:23 +00:00
Dr. Stephen Henson
a56f9a612b
Don't try to use unvalidated composite ciphers in FIPS mode
2012-04-26 18:51:26 +00:00
Andy Polyakov
0ae89cf32e
CHANGES: clarify.
2012-04-26 07:34:09 +00:00
Andy Polyakov
7e0c9630a3
CHANGES: fix typos and clarify.
2012-04-26 07:24:28 +00:00
Dr. Stephen Henson
a6df6702c6
Change value of SSL_OP_NO_TLSv1_1 to avoid clash with SSL_OP_ALL and
...
OpenSSL 1.0.0. Add CHANGES entry noting the consequences.
2012-04-25 23:06:31 +00:00
Andy Polyakov
f69abd5321
s23_clnt.c: ensure interoperability by maitaining client "version capability"
...
vector contiguous [from HEAD].
PR: 2802
2012-04-25 22:07:03 +00:00
Dr. Stephen Henson
fe9ce2b7d6
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr>
...
Reviewed by: steve
Improved localisation of TLS extension handling and code tidy.
2012-04-24 12:15:17 +00:00
Andy Polyakov
8e7ccf6ff7
objxref.pl: improve portability [from HEAD].
2012-04-22 21:19:41 +00:00
Dr. Stephen Henson
51b77c0337
correct error code
2012-04-22 13:31:19 +00:00
Dr. Stephen Henson
85d179d4eb
check correctness of errors before updating them so we don't get bogus errors added
2012-04-22 13:25:41 +00:00
Dr. Stephen Henson
890f5ada82
correct old FAQ answers, sync with HEAD
2012-04-22 13:21:15 +00:00
Dr. Stephen Henson
1cc8410e36
PR: 2239
...
Submitted by: Dominik Oepen <oepen@informatik.hu-berlin.de >
Add Brainpool curves from RFC5639.
Original patch by Annie Yousar <a.yousar@informatik.hu-berlin.de >
2012-04-22 13:11:48 +00:00
Andy Polyakov
6ca7af9ec0
e_rc4_hmac_md5.c: reapply commit#21726, which was erroneously omitted [from 1.0.1].
...
PR: 2797, 2792
2012-04-20 21:45:21 +00:00
Dr. Stephen Henson
bc2c8efc80
call OPENSSL_init when calling FIPS_mode too
2012-04-20 14:43:14 +00:00
Dr. Stephen Henson
00bb875240
make ciphers work again for FIPS builds
2012-04-20 00:08:32 +00:00
Andy Polyakov
c3cb563d87
e_rc4_hmac_md5.c: last commit was inappropriate for non-x86[_64] platforms
...
[from HEAD].
PR: 2792
2012-04-19 20:42:24 +00:00
Dr. Stephen Henson
d6ef8165bb
update date
2012-04-19 16:21:49 +00:00
Dr. Stephen Henson
564a503b1b
Check for potentially exploitable overflows in asn1_d2i_read_bio
...
BUF_mem_grow and BUF_mem_grow_clean. Refuse attempts to shrink buffer
in CRYPTO_realloc_clean.
Thanks to Tavis Ormandy, Google Security Team, for discovering this
issue and to Adam Langley <agl@chromium.org > for fixing it. (CVE-2012-2110)
2012-04-19 16:19:07 +00:00
Andy Polyakov
56eeb1b28c
Makefile.org: clear yet another environment variable [from HEAD].
...
PR: 2793
2012-04-19 06:40:21 +00:00
Dr. Stephen Henson
068fc255ac
only call FIPS_cipherinit in FIPS mode
2012-04-18 22:42:06 +00:00
Andy Polyakov
cc8f2fb917
e_rc4_hmac_md5.c: update from HEAD, fixes crash on legacy Intel CPUs.
...
PR: 2792
2012-04-18 17:51:26 +00:00
Dr. Stephen Henson
b583ebb7dd
recognise X9.42 DH certificates on servers
2012-04-18 17:03:45 +00:00
Dr. Stephen Henson
f897fe4146
correct error code
2012-04-18 15:17:39 +00:00
Bodo Möller
bb3add20f3
Disable SHA-2 ciphersuites in < TLS 1.2 connections.
...
(TLS 1.2 clients could end up negotiating these with an OpenSSL server
with TLS 1.2 disabled, which is problematic.)
Submitted by: Adam Langley
2012-04-17 15:21:29 +00:00
Dr. Stephen Henson
48e0f6667b
Additional workaround for PR#2771
...
If OPENSSL_MAX_TLS1_2_CIPHER_LENGTH is set then limit the size of client
ciphersuites to this value. A value of 50 should be sufficient.
Document workarounds in CHANGES.
2012-04-17 14:47:14 +00:00
Dr. Stephen Henson
32213fb25a
Partial workaround for PR#2771.
...
Some servers hang when presented with a client hello record length exceeding
255 bytes but will work with longer client hellos if the TLS record version
in client hello does not exceed TLS v1.0. Unfortunately this doesn't fix all
cases...
2012-04-17 13:20:37 +00:00
Andy Polyakov
f6a1939f0f
OPENSSL_NO_SOCK fixes [from HEAD].
...
PR: 2791
Submitted by: Ben Noordhuis
2012-04-16 17:43:02 +00:00
Andy Polyakov
94c666479d
Minor compatibility fixes [from HEAD].
...
PR: 2790
Submitted by: Alexei Khlebnikov
2012-04-16 17:35:48 +00:00
Andy Polyakov
09f17419a6
s3_srvr.c: fix typo [from HEAD].
...
PR: 2538
2012-04-15 17:23:54 +00:00
Andy Polyakov
eb8a65db16
e_aes_cbc_hmac_sha1.c: handle zero-length payload and engage empty frag
...
countermeasure [from HEAD].
PR: 2778
2012-04-15 14:23:26 +00:00
Andy Polyakov
e6255a7d1e
s390x asm pack: fix typos.
2012-04-12 06:46:49 +00:00
Dr. Stephen Henson
65a0f68484
Add options to set additional type specific certificate chains to
...
s_server.
2012-04-11 16:54:07 +00:00
Dr. Stephen Henson
e1a7db8fdd
use different variable for chain iteration
2012-04-11 16:01:20 +00:00
Dr. Stephen Henson
65331f225a
oops, macro not present in OpenSSL 1.0.2
2012-04-11 15:10:48 +00:00
Dr. Stephen Henson
64e8dc7981
fix reset fix
2012-04-11 15:05:33 +00:00
Dr. Stephen Henson
737fe7ea29
make reinitialisation work for CMAC
2012-04-11 12:26:27 +00:00
Dr. Stephen Henson
b344a826ad
update rather ancient EVP digest documentation
2012-04-10 22:28:13 +00:00
Andy Polyakov
bc0f56d6d7
aes-s390x.pl: fix crash in AES_set_decrypt_key in linux32-s390x build [from HEAD].
2012-04-09 15:12:30 +00:00
Dr. Stephen Henson
3a89e9f106
update year
2012-04-07 22:14:16 +00:00
Dr. Stephen Henson
79e75e04ea
recognise DECLARE_PEM_write_const, update ordinals
...
(backport from HEAD)
2012-04-07 20:48:12 +00:00
Dr. Stephen Henson
c3cb069108
transparently handle X9.42 DH parameters
...
(backport from HEAD)
2012-04-07 20:42:44 +00:00
Dr. Stephen Henson
cdb41713a4
Document RFC5114 "generation" options.
...
(backport from HEAD)
2012-04-07 20:42:17 +00:00
Dr. Stephen Henson
491734eb21
Initial experimental support for X9.42 DH parameter format to handle
...
RFC5114 parameters and X9.42 DH public and private keys.
(backport from HEAD)
2012-04-07 20:22:11 +00:00
Dr. Stephen Henson
4e891a191d
branches: 1.2.2;
...
Correct some parameter values.
(backport from HEAD)
2012-04-07 17:41:51 +00:00
Dr. Stephen Henson
b73a69a9c2
Update DH_check() to peform sensible checks when q parameter is present.
...
(backport from HEAD)
2012-04-07 17:40:08 +00:00
Dr. Stephen Henson
e811eff5a9
Add RFC5114 DH parameters to OpenSSL. Add test data to dhtest.
...
(backport from HEAD)
2012-04-07 12:19:50 +00:00
Dr. Stephen Henson
1d0c47fd55
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr>
...
Localize client hello extension parsing in t1_lib.c
(backport from HEAD)
2012-04-06 20:16:09 +00:00
Dr. Stephen Henson
e46c807e4f
Add support for automatic ECDH temporary key parameter selection. When
...
enabled instead of requiring an application to hard code a (possibly
inappropriate) parameter set and delve into EC internals we just
automatically use the preferred curve.
(backport from HEAD)
2012-04-06 20:15:50 +00:00
Dr. Stephen Henson
c132ca95c0
Tidy up EC parameter check code: instead of accessing internal structures
...
add utility functions to t1_lib.c to check if EC certificates and parameters
are consistent with peer.
(backport from HEAD)
2012-04-06 20:14:53 +00:00
Dr. Stephen Henson
6b870763ac
Initial revision of ECC extension handling.
...
Tidy some code up.
Don't allocate a structure to handle ECC extensions when it is used for
default values.
Make supported curves configurable.
Add ctrls to retrieve shared curves: not fully integrated with rest of
ECC code yet.
(backport from HEAD)
2012-04-06 20:12:35 +00:00
Dr. Stephen Henson
5505818199
New ctrls to retrieve supported signature algorithms and curves and
...
extensions to s_client and s_server to print out retrieved valued.
Extend CERT structure to cache supported signature algorithm data.
(backport from HEAD)
2012-04-06 19:29:49 +00:00
Dr. Stephen Henson
7493bcc659
initialise i if n == 0
...
(backport from HEAD)
2012-04-06 17:36:40 +00:00
Dr. Stephen Henson
a068a1d0e3
Add new APIs EC_curve_nist2nid and EC_curve_nid2nist which convert
...
between NIDs and the more common NIST names such as "P-256". Enhance
ecparam utility and ECC method to recognise the NIST names for curves.
(backport from HEAD)
2012-04-06 17:35:01 +00:00
Dr. Stephen Henson
37b16c84bb
Add support for distinct certificate chains per key type and per SSL
...
structure.
Before this the only way to add a custom chain was in the parent SSL_CTX
(which is shared by all key types and SSL structures) or rely on auto
chain building (which is performed on each handshake) from the trust store.
(backport from HEAD)
2012-04-06 17:22:48 +00:00
Dr. Stephen Henson
0ac89e8f54
Backport: code tidy (from HEAD)
2012-04-06 12:02:43 +00:00
Dr. Stephen Henson
7e65b21a24
Backport: Revise ssl code to use CERT_PKEY structure when outputting a certificate chain (from HEAD)
2012-04-06 12:00:24 +00:00
Dr. Stephen Henson
736d69750d
Backport: tidy/enhance certificate chain output code (from HEAD)
2012-04-06 11:58:17 +00:00
Dr. Stephen Henson
0cb9dbed4e
Backport: allow key agreement in SSL/TLS certificates (from HEAD)
2012-04-06 11:36:35 +00:00
Dr. Stephen Henson
6cfccfec33
Backport: initialise dh_clnt (from HEAD)
2012-04-06 11:35:45 +00:00
Dr. Stephen Henson
c523eb98d1
Backport DH client certificate support (from HEAD)
2012-04-06 11:34:42 +00:00
Dr. Stephen Henson
0ffa49970b
Backport support for fixed DH ciphersuites (from HEAD)
2012-04-06 11:33:12 +00:00
Andy Polyakov
8cd2ea552e
aes-armv4.pl: make it more foolproof [inspired by aes-s390x.pl in 1.0.1].
2012-04-05 08:32:08 +00:00
Andy Polyakov
3f0becbf75
aes-s390x.pl: fix endless loop in linux32-s390x build [from 1.0.1].
2012-04-05 08:17:47 +00:00
Andy Polyakov
1b0ae81f4a
ssl/ssl_ciph.c: interim solution for assertion in d1_pkt.c(444) [from HEAD].
...
PR: 2778
2012-04-04 20:50:58 +00:00
Andy Polyakov
54543b954c
CHANGES: harmonize with 1.0.0 and 1.0.1.
2012-03-31 18:56:07 +00:00
Dr. Stephen Henson
5e2187f7ee
PR: 2778(part)
...
Submitted by: John Fitzgibbon <john_fitzgibbon@yahoo.com >
Time is always encoded as 4 bytes, not sizeof(Time).
2012-03-31 18:02:53 +00:00
Andy Polyakov
7b087bf4a9
modes_lcl.h: make it work on i386 [from HEAD].
...
PR: 2780
2012-03-31 17:03:43 +00:00
Andy Polyakov
9df9c9d102
vpaes-x86[_64].pl: handle zero length in vpaes_cbc_encrypt [from HEAD].
...
PR: 2775
2012-03-31 16:55:34 +00:00
Andy Polyakov
7e8b5493a4
util/cygwin.sh update [from HEAD].
...
PR: 2761
Submitted by: Corinna Vinschen
2012-03-31 11:07:09 +00:00
Andy Polyakov
265863c6a4
bn/bn_gf2m.c: make new BN_GF2m_mod_inv work with BN_DEBUG_RAND [from HEAD].
2012-03-30 17:41:00 +00:00
Andy Polyakov
2fee1e0666
ans1/tasn_prn.c: avoid bool in variable names [from HEAD].
...
PR: 2776
2012-03-29 19:11:59 +00:00
Andy Polyakov
b4ff166cbc
perlasm/x86masm.pl: fix last fix [from HEAD].
2012-03-29 19:11:08 +00:00
Dr. Stephen Henson
861a0722c2
fix leak
2012-03-22 16:28:21 +00:00
Dr. Stephen Henson
b1cef8d984
Submitted by: Markus Friedl <mfriedl@gmail.com>
...
Fix memory leaks in 'goto err' cases.
2012-03-22 15:43:28 +00:00
Dr. Stephen Henson
b911523977
set version to 1.0.2-dev
2012-03-22 15:29:21 +00:00
cvs2svn
247c3f6049
This commit was manufactured by cvs2svn to create branch
...
'OpenSSL_1_0_2-stable'.
2012-03-21 21:32:58 +00:00
Dr. Stephen Henson
78c5d2a9bb
use client version when deciding whether to send supported signature algorithms extension
2012-03-21 21:32:57 +00:00
Dr. Stephen Henson
3bf4e14cc3
Always use SSLv23_{client,server}_method in s_client.c and s_server.c,
...
the old code came from SSLeay days before TLS was even supported.
2012-03-18 18:16:05 +00:00
Andy Polyakov
d68d160cb7
bsaes-x86_64.pl: optimize key conversion [from HEAD].
2012-03-16 21:45:51 +00:00
Dr. Stephen Henson
202cb42fbb
remove trailing slash
2012-03-14 22:20:40 +00:00
Richard Levitte
49f6cb968f
cipher should only be set to PSK if JPAKE is used.
2012-03-14 12:39:00 +00:00
Dr. Stephen Henson
07e120b7da
update STATUS
2012-03-14 12:14:06 +00:00
Dr. Stephen Henson
f3dcae15ac
prepare for 1.0.1 release
2012-03-14 12:04:40 +00:00
Dr. Stephen Henson
25ec498dc7
update NEWS
2012-03-13 22:49:27 +00:00
Andy Polyakov
9cc42cb091
ssl/t1_enc.c: pay attention to EVP_CIPH_FLAG_CUSTOM_CIPHER [from HEAD].
2012-03-13 19:21:15 +00:00
Andy Polyakov
bcf9cf89e7
x86_64-xlate.pl: remove old kludge.
...
PR: 2435,2440
2012-03-13 19:19:31 +00:00
Dr. Stephen Henson
f0729fc3e0
corrected fix to PR#2711 and also cover mime_param_cmp
2012-03-12 16:29:47 +00:00
Dr. Stephen Henson
8186c00ef3
Fix for CMS/PKCS7 MMA. If RSA decryption fails use a random key and
...
continue with symmetric decryption process to avoid leaking timing
information to an attacker.
Thanks to Ivan Nestlerode <inestlerode@us.ibm.com > for discovering
this issue. (CVE-2012-0884)
2012-03-12 16:27:50 +00:00
Dr. Stephen Henson
c0b31ccb87
PR: 2744
...
Submitted by: Dmitry Belyavsky <beldmit@gmail.com >
CMS support for ccgost engine
2012-03-11 13:40:05 +00:00
Dr. Stephen Henson
267c950c5f
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr>
...
Add more extension names in s_cb.c extension printing code.
2012-03-09 18:37:41 +00:00
Dr. Stephen Henson
ce1605b508
PR: 2756
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix DTLS timeout handling.
2012-03-09 15:52:20 +00:00
Dr. Stephen Henson
66fdb1c0d4
check return value of BIO_write in PKCS7_decrypt
2012-03-08 14:02:51 +00:00
Dr. Stephen Henson
25bfdca16a
PR: 2755
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reduce MTU after failed transmissions.
2012-03-06 13:47:27 +00:00
Dr. Stephen Henson
9c284f9651
PR: 2748
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix possible DTLS timer deadlock.
2012-03-06 13:24:16 +00:00
Andy Polyakov
6d78c381f6
Configure: make no-whirlpool work [from HEAD].
2012-03-03 13:18:06 +00:00
Richard Levitte
784e2080df
On OpenVMS, try sha256 and sha512 et al as well.
2012-03-01 21:29:58 +00:00
Richard Levitte
70505bc334
For OpenVMS, use inttypes.h instead of stdint.h
2012-03-01 21:29:16 +00:00
Dr. Stephen Henson
8e8b247341
PR: 2743
...
Reported by: Dmitry Belyavsky <beldmit@gmail.com >
Fix memory leak if invalid GOST MAC key given.
2012-02-29 14:12:52 +00:00
Dr. Stephen Henson
a8595879ec
PR: 2742
...
Reported by: Dmitry Belyavsky <beldmit@gmail.com >
If resigning with detached content in CMS just copy data across.
2012-02-29 14:01:53 +00:00
Dr. Stephen Henson
33a688e806
Fix memory leak cause by race condition when creating public keys.
...
Thanks to Ivan Nestlerode <inestlerode@us.ibm.com > for reporting this bug.
2012-02-28 14:47:16 +00:00
Andy Polyakov
5c2bfad9b4
x86cpuid.pl: fix processor capability detection on pre-586 [from HEAD].
2012-02-28 14:20:34 +00:00
Dr. Stephen Henson
250f979237
PR: 2736
...
Reported by: Remi Gacogne <rgacogne-bugs@coredump.fr >
Preserve unused bits value in non-canonicalised ASN1_STRING structures
by using ASN1_STRING_copy which preseves flags.
2012-02-27 18:45:18 +00:00
Dr. Stephen Henson
b527b6e8ff
PR: 2737
...
Submitted by: Remi Gacogne <rgacogne-bugs@coredump.fr >
Fix double free in PKCS12_parse if we run out of memory.
2012-02-27 16:46:45 +00:00
Dr. Stephen Henson
a54ce007e6
PR: 2739
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix padding bugs in Heartbeat support.
2012-02-27 16:38:10 +00:00
Dr. Stephen Henson
4ed1f3490e
PR: 2735
...
Make cryptodev digests work. Thanks to Nikos Mavrogiannopoulos for
this fix.
2012-02-27 16:33:25 +00:00
Dr. Stephen Henson
0a082e9b37
free headers after use in error message
2012-02-27 16:27:09 +00:00
Dr. Stephen Henson
236a99a409
Detect symmetric crypto errors in PKCS7_decrypt.
...
Thanks to Ivan Nestlerode <inestlerode@us.ibm.com > for reporting this bug.
2012-02-27 15:22:54 +00:00
Andy Polyakov
04b4363ec8
Configure: remove adding of -D_XPG4_2 -D__EXTENSIONS__ in sctp builds,
...
see corresponding commit to HEAD for details.
2012-02-26 22:03:41 +00:00
Andy Polyakov
37ebc20093
seed.c: Solaris portability fix from HEAD.
2012-02-26 21:53:28 +00:00
Dr. Stephen Henson
cef781cc87
PR: 2730
...
Submitted by: Arpadffy Zoltan <Zoltan.Arpadffy@scientificgames.se >
VMS fixes: disable SCTP by default.
2012-02-25 17:58:03 +00:00
Dr. Stephen Henson
08e4c7a967
correct CHANGES
2012-02-23 22:13:59 +00:00
Dr. Stephen Henson
697e4edcad
PR: 2711
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Tolerate bad MIME headers in parser.
2012-02-23 21:50:32 +00:00
Dr. Stephen Henson
b26297ca51
PR: 2696
...
Submitted by: Rob Austein <sra@hactrn.net >
Fix inverted range problem in RFC3779 code.
Thanks to Andrew Chi for generating test cases for this bug.
2012-02-23 21:31:22 +00:00
Dr. Stephen Henson
6ca7dba0cf
PR: 2727
...
Submitted by: Bruce Stephens <bruce.stephens@isode.com >
Use same construct for EXHEADER in srp/Makefile as other makefiles to cope
with possibly empty EXHEADER.
2012-02-23 13:49:22 +00:00
Dr. Stephen Henson
f1fa05b407
ABI compliance fixes.
...
Move new structure fields to end of structures.
Import library codes from 1.0.0 and recreate new ones.
2012-02-22 14:01:44 +00:00
Dr. Stephen Henson
02e22c35fe
update NEWS
2012-02-21 14:21:32 +00:00
Dr. Stephen Henson
b935714237
typo
2012-02-17 17:31:32 +00:00
Dr. Stephen Henson
a8314df902
Fix bug in CVE-2011-4619: check we have really received a client hello
...
before rejecting multiple SGC restarts.
2012-02-16 15:25:39 +00:00
Dr. Stephen Henson
0cd7a0325f
Additional compatibility fix for MDC2 signature format.
...
Update RSA EVP_PKEY_METHOD to use the OCTET STRING form of MDC2 signature:
this will make all versions of MDC2 signature equivalent.
2012-02-15 14:14:01 +00:00
Dr. Stephen Henson
16b7c81d55
An incompatibility has always existed between the format used for RSA
...
signatures and MDC2 using EVP or RSA_sign. This has become more apparent
when the dgst utility in OpenSSL 1.0.0 and later switched to using the
EVP_DigestSign functions which call RSA_sign.
This means that the signature format OpenSSL 1.0.0 and later used with
dgst -sign and MDC2 is incompatible with previous versions.
Add detection in RSA_verify so either format works.
Note: MDC2 is disabled by default in OpenSSL and very rarely used in practice.
2012-02-15 14:00:09 +00:00
Dr. Stephen Henson
424ba8b588
PR: 2708
...
Submitted by: Bruce Stephens <bruce.stephens@isode.com >
Translate path separators correctly for $fipsdir in util/mk1mf.pl
2012-02-12 23:20:21 +00:00
Dr. Stephen Henson
bf493e8d62
PR: 2713
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Move libraries that are not needed for dynamic linking to Libs.private in
the .pc files
2012-02-12 18:47:36 +00:00
Dr. Stephen Henson
c714e43c8d
PR: 2717
...
Submitted by: Tim Rice <tim@multitalents.net >
Make compilation work on OpenServer 5.0.7
2012-02-11 23:38:49 +00:00
Dr. Stephen Henson
cdf9d6f6ed
PR: 2716
...
Submitted by: Adam Langley <agl@google.com >
Fix handling of exporter return value and use OpenSSL indentation in
s_client, s_server.
2012-02-11 23:21:09 +00:00
Dr. Stephen Henson
cc4b48c27c
PR: 2703
...
Submitted by: Alexey Melnikov <alexey.melnikov@isode.com >
Fix some memory and resource leaks in CAPI ENGINE.
2012-02-11 23:12:59 +00:00
Dr. Stephen Henson
cac9c92cc0
PR: 2705
...
Submitted by: Alexey Melnikov <alexey.melnikov@isode.com >
Only create ex_data indices once for CAPI engine.
2012-02-11 23:07:58 +00:00
Dr. Stephen Henson
d40abf1689
Submitted by: Eric Rescorla <ekr@rtfm.com>
...
Further fixes for use_srtp extension.
2012-02-11 22:53:48 +00:00
Andy Polyakov
69e9c69e70
apps/s_cb.c: recognize latest TLS versions [from HEAD].
2012-02-11 13:31:16 +00:00
Dr. Stephen Henson
c489ea7d01
PR: 2704
...
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr >
Fix srp extension.
2012-02-10 20:08:49 +00:00
Dr. Stephen Henson
26c6857a59
PR: 2710
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Check return codes for load_certs_crls.
2012-02-10 19:54:46 +00:00
Dr. Stephen Henson
508bd3d1aa
PR: 2714
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Make no-srp work.
2012-02-10 19:44:00 +00:00
Dr. Stephen Henson
8705846710
only cleanup ctx if we need to, save ctx flags when we do
2012-02-10 16:54:56 +00:00
Dr. Stephen Henson
c944a9696e
add fips hmac option and fips blocking overrides to command line utilities
2012-02-10 16:46:19 +00:00
Dr. Stephen Henson
943cc09d8a
Submitted by: Eric Rescorla <ekr@rtfm.com>
...
Fix encoding of use_srtp extension to be compliant with RFC5764
2012-02-10 00:03:37 +00:00
Dr. Stephen Henson
fc6800d19f
Modify client hello version when renegotiating to enhance interop with
...
some servers.
2012-02-09 15:41:44 +00:00
Andy Polyakov
d06f047b04
bn_nist.c: make new optimized code dependent on BN_LLONG [from HEAD].
2012-02-02 07:46:19 +00:00
Andy Polyakov
ddc899bada
hpux-parisc2-*: engage assembler [from HEAD] and make it link.
2012-02-02 07:42:31 +00:00
Andy Polyakov
bd479e25c7
ghash-x86.pl: engage original MMX version in no-sse2 builds [from HEAD].
2012-01-25 17:56:25 +00:00
Andy Polyakov
eaf5bd168e
x86_64-xlate.pl: 1.0.1-specific typo.
2012-01-25 17:50:23 +00:00
Dr. Stephen Henson
d7ecc206ba
only include bn.h once
2012-01-24 23:00:36 +00:00
Dr. Stephen Henson
11ea212e8c
only include evp.h once
2012-01-24 22:59:46 +00:00
Dr. Stephen Henson
cb29d8c11f
only include string.h once
2012-01-24 22:58:46 +00:00
Dr. Stephen Henson
adcea5a043
return error if md is NULL
2012-01-22 13:12:50 +00:00
Andy Polyakov
f02f7c2c4a
cryptlib.c: make even non-Windows builds "strtoull-agnostic" [from HEAD].
2012-01-21 12:18:29 +00:00
Andy Polyakov
a1e44cc14f
x86_64-xlate.pl: proper solution for RT#2620 [from HEAD].
2012-01-21 11:35:20 +00:00
Dr. Stephen Henson
d2d09bf68c
change version to beta3-dev
2012-01-19 17:14:17 +00:00
Dr. Stephen Henson
e2dfb655f7
update files for beta2 release
2012-01-19 15:46:43 +00:00
Dr. Stephen Henson
463e76b63c
prepare for beta2
2012-01-19 15:37:57 +00:00
Dr. Stephen Henson
2dc4b0dbe8
Fix for DTLS DoS issue introduced by fix for CVE-2011-4109.
...
Thanks to Antonio Martin, Enterprise Secure Access Research and
Development, Cisco Systems, Inc. for discovering this bug and
preparing a fix. (CVE-2012-0050)
2012-01-18 18:14:56 +00:00
Dr. Stephen Henson
7b23c126e6
undef some symbols that cause problems with make depend for fips builds
2012-01-18 01:40:36 +00:00
Dr. Stephen Henson
25e3d2225a
fix CHANGES entry
2012-01-17 14:19:09 +00:00
Andy Polyakov
c8e0b5d7b6
1.0.1-specific OPNESSL vs. OPENSSL typo.
...
PR: 2613
Submitted by: Leena Heino
2012-01-15 13:42:50 +00:00
Andy Polyakov
4fb7e2b445
Fix OPNESSL vs. OPENSSL typos [from HEAD].
...
PR: 2613
Submitted by: Leena Heino
2012-01-15 13:40:21 +00:00
Dr. Stephen Henson
9138e3c061
fix warning
2012-01-15 13:30:52 +00:00
Andy Polyakov
9b2a29660b
Sanitize usage of <ctype.h> functions. It's important that characters
...
are passed zero-extended, not sign-extended [from HEAD].
PR: 2682
2012-01-12 16:28:03 +00:00
Andy Polyakov
b7b4a9fa57
sparcv9cap.c: omit unused variable.
2012-01-12 14:19:52 +00:00
Andy Polyakov
1fb07a7de8
doc/apps: formatting fixes [from HEAD].
...
PR: 2683
Submitted by: Annie Yousar
2012-01-11 21:58:42 +00:00
Andy Polyakov
b9cbcaad58
speed.c: typo in pkey_print_message [from HEAD].
...
PR: 2681
Submitted by: Annie Yousar
2012-01-11 21:49:16 +00:00
Andy Polyakov
c6706a6f6c
ecdsa.pod: typo.
...
PR: 2678
Submitted by: Annie Yousar
2012-01-11 21:41:50 +00:00
Andy Polyakov
958e6a75a1
asn1/t_x509.c: fix serial number print, harmonize with a_int.c [from HEAD].
...
PR: 2675
Submitted by: Annie Yousar
2012-01-11 21:12:47 +00:00
Andy Polyakov
397977726c
aes-sparcv9.pl: clean up regexp [from HEAD].
...
PR: 2685
2012-01-11 15:32:08 +00:00
Dr. Stephen Henson
285d9189c7
PR: 2652
...
Submitted by: Arpadffy Zoltan <Zoltan.Arpadffy@scientificgames.se >
OpenVMS fixes.
2012-01-05 14:30:08 +00:00
Bodo Möller
767d3e0054
Update for 0.9.8s and 1.0.0f.
...
(While the 1.0.0f CHANGES entry on VOS PRNG seeding was missing
in the 1.0.1 branch, the actual code is here already.)
2012-01-05 13:46:27 +00:00
Bodo Möller
409d2a1b71
Fix for builds without DTLS support.
...
Submitted by: Brian Carlstrom
2012-01-05 10:22:39 +00:00
Dr. Stephen Henson
e0b9678d7f
PR: 2671
...
Submitted by: steve
Update maximum message size for certifiate verify messages to support
4096 bit RSA keys again as TLS v1.2 messages is two bytes longer.
2012-01-05 00:28:29 +00:00
Dr. Stephen Henson
166dea6ac8
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de>
...
Reviewed by: steve
Send fatal alert if heartbeat extension has an illegal value.
2012-01-05 00:23:31 +00:00
Dr. Stephen Henson
52bef4d677
disable heartbeats if tlsext disabled
2012-01-05 00:07:34 +00:00
Dr. Stephen Henson
801e5ef840
update CHANGES
2012-01-04 23:53:52 +00:00
Dr. Stephen Henson
0044739ae5
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de>, Michael Tuexen <tuexen@fh-muenster.de>
...
Reviewed by: steve
Fix for DTLS plaintext recovery attack discovered by Nadhem Alfardan and
Kenny Paterson.
2012-01-04 23:52:05 +00:00
Dr. Stephen Henson
4e44bd3650
Clear bytes used for block padding of SSL 3.0 records. (CVE-2011-4576)
2012-01-04 23:13:29 +00:00
Dr. Stephen Henson
0cffb0cd3e
fix CHANGES
2012-01-04 23:11:43 +00:00
Dr. Stephen Henson
aaa3850ccd
Only allow one SGC handshake restart for SSL/TLS. (CVE-2011-4619)
2012-01-04 23:07:54 +00:00
Dr. Stephen Henson
a17b5d5a4f
Check GOST parameters are not NULL (CVE-2012-0027)
2012-01-04 23:03:20 +00:00
Dr. Stephen Henson
2f97765bc3
Prevent malformed RFC3779 data triggering an assertion failure (CVE-2011-4577)
2012-01-04 23:01:19 +00:00
Dr. Stephen Henson
3205ca8deb
fix warnings
2012-01-04 14:46:04 +00:00
Dr. Stephen Henson
1cb4d65b87
Submitted by: Adam Langley <agl@chromium.org>
...
Reviewed by: steve
Fix memory leaks.
2012-01-04 14:25:28 +00:00
Dr. Stephen Henson
7b2dd292bc
only send heartbeat extension from server if client sent one
2012-01-03 22:03:07 +00:00
Dr. Stephen Henson
ab585551c0
prepare for 1.0.1-beta1
2012-01-03 13:30:28 +00:00
Dr. Stephen Henson
6cf0d7b999
OpenSSL 1.0.1 is now in beta.
2012-01-02 18:28:28 +00:00
Dr. Stephen Henson
9d972207f0
incomplete provisional OAEP CMS decrypt support
2012-01-02 18:16:40 +00:00
Dr. Stephen Henson
d9834ff24b
make update
2012-01-02 16:41:11 +00:00
Dr. Stephen Henson
d9c3ba05e7
update NEWS
2012-01-02 16:31:46 +00:00
Dr. Stephen Henson
03467ce6bd
recognise HEARTBEATS in mkdef.pl script
2011-12-31 23:49:45 +00:00
Dr. Stephen Henson
6e750fcb1e
update CHANGES
2011-12-31 23:07:28 +00:00
Dr. Stephen Henson
bd6941cfaa
PR: 2658
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Support for TLS/DTLS heartbeats.
2011-12-31 23:00:36 +00:00
Dr. Stephen Henson
578519edd0
make error code checking strict
2011-12-27 15:17:50 +00:00
Dr. Stephen Henson
5c05f69450
make update
2011-12-27 14:38:27 +00:00
Dr. Stephen Henson
f529dca488
fix error code
2011-12-27 14:37:43 +00:00
Dr. Stephen Henson
296aca9dcf
fix deprecated statement
2011-12-27 14:36:57 +00:00
Dr. Stephen Henson
b170703128
update default depflags
2011-12-27 14:28:25 +00:00
Dr. Stephen Henson
b300fb7734
PR: 1794
...
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr >
Reviewed by: steve
- remove some unncessary SSL_err and permit
an srp user callback to allow a worker to obtain
a user verifier.
- cleanup and comments in s_server and demonstration
for asynchronous srp user lookup
2011-12-27 14:23:22 +00:00
Dr. Stephen Henson
f89af47438
PR: 2326
...
Submitted by: Tianjie Mao <tjmao@tjmao.net >
Reviewed by: steve
Fix incorrect comma expressions and goto f_err as alert has been set.
2011-12-26 19:38:09 +00:00
Dr. Stephen Henson
7bb4f8ff12
recognise no-sctp
2011-12-25 14:59:40 +00:00
Dr. Stephen Henson
7dd6407a4c
update ordinals
2011-12-25 14:48:44 +00:00
Dr. Stephen Henson
53de315b78
recognise SCTP in mkdef.pl script
2011-12-25 14:47:46 +00:00
Dr. Stephen Henson
e065e6cda2
PR: 2535
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Add SCTP support for DTLS (RFC 6083).
2011-12-25 14:45:40 +00:00
Dr. Stephen Henson
60553cc209
typo
2011-12-23 15:03:16 +00:00
Dr. Stephen Henson
2d4c9ab518
delete unimplemented function from header file, update ordinals
2011-12-23 14:10:35 +00:00
Dr. Stephen Henson
50771f7ce3
update ordinals
2011-12-22 16:10:04 +00:00
Dr. Stephen Henson
242f8d644c
remove prototype for deleted SRP function
2011-12-22 16:01:23 +00:00
Dr. Stephen Henson
f5575cd167
New ctrl values to clear or retrieve extra chain certs from an SSL_CTX.
...
New function to retrieve compression method from SSL_SESSION structure.
Delete SSL_SESSION_get_id_len and SSL_SESSION_get0_id functions
as they duplicate functionality of SSL_SESSION_get_id. Note: these functions
have never appeared in any release version of OpenSSL.
2011-12-22 15:01:16 +00:00
Ben Laurie
dd0ddc3e78
Fix DTLS.
2011-12-20 15:05:03 +00:00
Dr. Stephen Henson
62308f3f4a
PR: 2563
...
Submitted by: Paul Green <Paul.Green@stratus.com >
Reviewed by: steve
Improved PRNG seeding for VOS.
2011-12-19 17:02:35 +00:00
Andy Polyakov
cecafcce94
update CHANGES.
2011-12-19 14:49:05 +00:00
Dr. Stephen Henson
ca0efb7594
update CHANGES
2011-12-19 14:40:02 +00:00
Andy Polyakov
1d05ff2779
apps/speed.c: fix typo in last commit.
2011-12-19 14:33:37 +00:00
Andy Polyakov
941811ccb9
apps/speed.c: Cygwin alarm() fails sometimes.
...
PR: 2655
2011-12-15 22:30:11 +00:00
Andy Polyakov
700384be8e
vpaes-x86.pl: revert previous commit and solve the problem through x86masm.pl [from HEAD].
...
PR: 2657
2011-12-15 22:20:26 +00:00
Dr. Stephen Henson
b8a22c40e0
PR: 1794
...
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr >
Reviewed by: steve
Remove unnecessary code for srp and to add some comments to
s_client.
- the callback to provide a user during client connect is
no longer necessary since rfc 5054 a connection attempt
with an srp cipher and no user is terminated when the
cipher is acceptable
- comments to indicate in s_client the (non-)usefulness of
th primalaty tests for non known group parameters.
2011-12-14 22:18:03 +00:00
Andy Polyakov
3918de9ad1
vpaes-x86.pl: portability fix.
...
PR: 2657
2011-12-14 21:30:25 +00:00
Ben Laurie
96fe35e7d4
Remove redundant TLS exporter.
2011-12-13 14:35:12 +00:00
Ben Laurie
e87afb1518
SSL export fixes (from Adam Langley).
2011-12-13 14:25:11 +00:00
Andy Polyakov
7b467c6b81
modexp512-x86_64.pl: Solaris portability fix [from HEAD].
...
PR: 2656
2011-12-12 15:12:09 +00:00
Dr. Stephen Henson
eb8ebafe87
detect and use older PKITS data
2011-12-11 16:39:56 +00:00
Dr. Stephen Henson
e559febaf1
typo
2011-12-10 01:37:55 +00:00
Dr. Stephen Henson
6bcc6d38c7
add commented out option to allow use of older PKITS data
2011-12-10 00:50:16 +00:00
Dr. Stephen Henson
8173960305
remove old -attime code, new version includes all old functionality
2011-12-10 00:42:48 +00:00
Dr. Stephen Henson
f2e590942e
implement -attime option as a verify parameter then it works with all relevant applications
2011-12-10 00:37:42 +00:00
Ben Laurie
6a4b87eb9d
Fix warning.
2011-12-09 20:15:48 +00:00
Andy Polyakov
edcba19c23
perlasm/x86gas.pl: give a hand old assemblers assembling loop instruction
...
[from HEAD].
2011-12-09 19:16:35 +00:00
Andy Polyakov
b140ae9137
cryptlib.c: allow for OPENSSL_ia32cap=~0x????? syntax for environment value
...
in question.
2011-12-09 15:46:41 +00:00
Andy Polyakov
8ee0591f28
x86-mont.pl: fix bug in integer-only squaring path.
...
PR: 2648
2011-12-09 14:26:28 +00:00
Dr. Stephen Henson
97d0c596a1
Replace expired test server and client certificates with new ones.
2011-12-08 14:45:15 +00:00
Dr. Stephen Henson
7454cba4fa
fix error discrepancy
2011-12-07 12:28:50 +00:00
Dr. Stephen Henson
5713411893
The default CN prompt message can be confusing when often the CN needs to
...
be the server FQDN: change it.
[Reported by PSW Group]
2011-12-06 00:00:51 +00:00
Ben Laurie
a0cf79e841
Fix exporter.
2011-12-02 16:49:32 +00:00
Ben Laurie
825e1a7c56
Fix warnings.
2011-12-02 14:39:41 +00:00
Bodo Möller
9f2b453338
Resolve a stack set-up race condition (if the list of compression
...
methods isn't presorted, it will be sorted on first read).
Submitted by: Adam Langley
2011-12-02 12:51:41 +00:00
Bodo Möller
a0dce9be76
Fix ecdsatest.c.
...
Submitted by: Emilia Kasper
2011-12-02 12:40:42 +00:00
Bodo Möller
cf2b938529
Fix BIO_f_buffer().
...
Submitted by: Adam Langley
Reviewed by: Bodo Moeller
2011-12-02 12:24:48 +00:00
Andy Polyakov
62f685a9cd
bn/asm/mips.pl: fix typos [from HEAD].
2011-12-01 12:17:20 +00:00
Dr. Stephen Henson
2c7d978c2d
PR: 1794
...
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr >
Reviewed by: steve
Make SRP conformant to rfc 5054.
Changes are:
- removal of the addition state after client hello
- removal of all pre-rfc srp alert ids
- sending a fatal alert when there is no srp extension but when the
server wants SRP
- removal of unnecessary code in the client.
2011-11-25 00:18:10 +00:00
Ben Laurie
8cd897a42c
Don't send NPN during renegotiation.
2011-11-24 18:22:06 +00:00
Ben Laurie
1dc44d3130
Indent.
2011-11-24 16:51:15 +00:00
Dr. Stephen Henson
2a6e3ef37e
update ordinals
2011-11-22 14:45:27 +00:00
Dr. Stephen Henson
115d528c23
add cryptlib.h to mkdef.pl
2011-11-22 14:44:42 +00:00
Dr. Stephen Henson
a310428527
Workaround so "make depend" works for fips builds.
2011-11-22 12:50:59 +00:00
Dr. Stephen Henson
7e0fd45ce3
update ordinals
2011-11-21 22:56:33 +00:00
Dr. Stephen Henson
b138ea54ee
add strp.h to mkdef.pl headers
2011-11-21 22:55:12 +00:00
Dr. Stephen Henson
d7125d8d85
move internal functions to ssl_locl.h
2011-11-21 22:52:01 +00:00
Dr. Stephen Henson
9c115a4acc
recognise NEXTPROTONEG
2011-11-21 22:35:35 +00:00
Dr. Stephen Henson
43716567f5
bcmp doesn't exist on all platforms, replace with memcmp
2011-11-21 22:29:16 +00:00
Andy Polyakov
0a8f00af34
bsaes-x86_64.pl: fix buffer overrun in tail processing [from HEAD].
2011-11-16 23:36:40 +00:00
Ben Laurie
b1d7429186
Add TLS exporter.
2011-11-15 23:51:22 +00:00
Ben Laurie
060a38a2c0
Add DTLS-SRTP.
2011-11-15 23:02:16 +00:00
Andy Polyakov
58402976b4
aes-armv4.pl: make it link.
2011-11-15 13:55:52 +00:00
Andy Polyakov
cd7b854bbb
e_rc4_hmac_md5.c: make it work on darwin64, which is configured with RC4_CHAR.
2011-11-15 12:39:48 +00:00
Andy Polyakov
aecc0756e8
aes-s390x.pl: make it link.
2011-11-15 12:20:55 +00:00
Andy Polyakov
e6ccc6ed70
Configure, e_aes.c: allow for XTS assembler implementation [from HEAD].
2011-11-15 12:19:56 +00:00
Andy Polyakov
e959a01fac
e_aes.c: jumbo update from HEAD.
2011-11-14 21:17:08 +00:00
Andy Polyakov
17674bfdf7
ec_cvt.c: performance update from HEAD.
2011-11-14 21:14:53 +00:00
Andy Polyakov
d807d4c21f
c_allc.c: add XTS ciphers [from HEAD].
2011-11-14 21:13:35 +00:00
Andy Polyakov
b4690d2eab
config: platform and poratbility updates from HEAD.
2011-11-14 21:12:53 +00:00
Andy Polyakov
886657a641
Configure, etc.: engage additional assembler modules.
2011-11-14 21:12:05 +00:00
Andy Polyakov
db896db5a7
speed.c: add ghash benchmark [from HEAD].
2011-11-14 21:09:30 +00:00
Andy Polyakov
2357ae17e7
x86 assembler pack update from HEAD.
2011-11-14 21:06:50 +00:00
Andy Polyakov
9f1c5491d2
BN update from HEAD.
2011-11-14 21:05:42 +00:00
Andy Polyakov
70b52222f5
x86_64 assembler pack update from HEAD.
2011-11-14 21:01:21 +00:00
Andy Polyakov
88cb59727c
ARM assembler pack update from HEAD.
2011-11-14 20:58:01 +00:00
Andy Polyakov
781bfdc314
Alpha assembler pack update from HEAD.
2011-11-14 20:56:15 +00:00
Andy Polyakov
b66723b23e
MIPS assembler pack update from HEAD.
2011-11-14 20:55:24 +00:00
Andy Polyakov
cf96d71c22
PPC assembler pack update from HEAD.
2011-11-14 20:54:17 +00:00
Andy Polyakov
1a111921da
PA-RISC assembler pack update from HEAD.
2011-11-14 20:50:15 +00:00
Andy Polyakov
5d9bb428bb
SPARCv9 assembler pack update from HEAD.
2011-11-14 20:48:35 +00:00
Andy Polyakov
9833757b5d
s390x assembler pack update from HEAD.
2011-11-14 20:47:22 +00:00
Andy Polyakov
4195343c0d
IA64 assembler pack update from HEAD.
2011-11-14 20:45:57 +00:00
Andy Polyakov
042bee4e5c
perlasm update from HEAD.
2011-11-14 20:44:20 +00:00
Andy Polyakov
4afba1f3d9
Mafiles updates to accomodate assembler update from HEAD.
2011-11-14 20:42:22 +00:00
Dr. Stephen Henson
5999d45a5d
DH keys have an (until now) unused 'q' parameter. When creating from DSA copy
...
q across and if q present generate DH key in the correct range. (from HEAD)
2011-11-14 14:16:09 +00:00
Dr. Stephen Henson
f69e5d6a19
Call OPENSSL_init after we've checked to see if customisation is permissible.
2011-11-14 14:15:29 +00:00
Ben Laurie
3517637702
Ignorance.
2011-11-14 02:42:26 +00:00
Ben Laurie
e2809bfb42
Next Protocol Negotiation.
2011-11-14 02:25:04 +00:00
Ben Laurie
68b33cc5c7
Add Next Protocol Negotiation.
2011-11-13 21:55:42 +00:00
Ben Laurie
4c02cf8ecc
make depend.
2011-11-13 20:23:34 +00:00
Ben Laurie
271daaf768
Fix one of the no-tlsext build errors (there are more).
2011-11-13 20:19:21 +00:00
Dr. Stephen Henson
efbb7ee432
PR: 1794
...
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr >
Reviewed by: steve
Document unknown_psk_identify alert, remove pre-RFC 5054 string from
ssl_stat.c
2011-11-13 13:13:14 +00:00
Andy Polyakov
6471ec71aa
x86cpuid.pl: compensate for imaginary virtual machines [from HEAD].
...
PR: 2633
2011-11-08 21:28:14 +00:00
Andy Polyakov
cb45708061
x86cpuid.pl: don't punish "last-year" OSes on "this-year" CPUs.
...
PR: 2633
2011-11-05 10:44:25 +00:00
Andy Polyakov
02597f2885
ppc.pl: fix bug in bn_mul_comba4 [from HEAD].
...
PR: 2636
Submitted by: Charles Bryant
2011-11-05 10:16:30 +00:00
Richard Levitte
8c6a514edf
Add missing algorithms to disable, and in particular, disable
...
EC_NISTP_64_GCC_128 by default, as GCC isn't currently supported on
VMS. Add CMAC to the modules to build, and synchronise with Unix.
2011-10-30 11:45:30 +00:00
Richard Levitte
7f3fdab793
Teach mkshared.com to have a look for disabled algorithms in opensslconf.h
2011-10-30 11:40:56 +00:00
Dr. Stephen Henson
5372f5f989
PR: 2628
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Send alert instead of assertion failure for incorrectly formatted DTLS
fragments.
2011-10-27 13:06:43 +00:00
Dr. Stephen Henson
6d24c09a69
PR: 2628
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix for ECC keys and DTLS.
2011-10-27 13:01:20 +00:00
Dr. Stephen Henson
a8d72c79db
PR: 2632
...
Submitted by: emmanuel.azencot@bull.net
Reviewed by: steve
Return -1 immediately if not affine coordinates as BN_CTX has not been
set up.
2011-10-26 16:43:23 +00:00
Dr. Stephen Henson
1f713e0106
Use correct tag for SRP username.
2011-10-25 12:52:47 +00:00
Dr. Stephen Henson
03f84c8260
Update error codes for FIPS.
...
Add support for authentication in FIPS_mode_set().
2011-10-21 13:04:27 +00:00
Dr. Stephen Henson
6d5eb464c9
Recognise new ECC option (from HEAD).
2011-10-21 12:53:07 +00:00
Bodo Möller
67f8de9ab8
"make update"
2011-10-19 15:24:44 +00:00
Bodo Möller
2d95ceedc5
BN_BLINDING multi-threading fix.
...
Submitted by: Emilia Kasper (Google)
2011-10-19 14:58:59 +00:00
Bodo Möller
6526d765fc
Fix indentation
2011-10-19 09:24:05 +00:00
Bodo Möller
3d520f7c2d
Fix warnings.
...
Also, use the common Configure mechanism for enabling/disabling the 64-bit ECC code.
2011-10-19 08:58:35 +00:00
Bodo Möller
9c37519b55
Improve optional 64-bit NIST-P224 implementation, and add NIST-P256 and
...
NIST-P521. (Now -DEC_NISTP_64_GCC_128 enables all three of these;
-DEC_NISTP224_64_GCC_128 no longer works.)
Submitted by: Google Inc.
2011-10-18 19:43:54 +00:00
Dr. Stephen Henson
7e9cfcd0dc
Recognise no-rsax option.
2011-10-15 13:22:26 +00:00
Andy Polyakov
a99ce1f5b1
e_aes.c: fix bug in aesni_gcm_tls_cipher [in HEAD].
2011-10-14 09:34:14 +00:00
Andy Polyakov
42660b3cf1
aesni-x86[_64].pl: pull from HEAD.
2011-10-14 09:21:03 +00:00
Bodo Möller
f30258c439
use -no_ecdhe when using -no_dhe
2011-10-13 15:07:05 +00:00
Bodo Möller
93ff4c69f7
Make CTR mode behaviour consistent with other modes:
...
clear ctx->num in EVP_CipherInit_ex
Submitted by: Emilia Kasper
2011-10-13 13:42:29 +00:00
Bodo Möller
79571bb1ca
Clarify warning
2011-10-13 13:25:03 +00:00
Bodo Möller
f72c1a58cb
In ssl3_clear, preserve s3->init_extra along with s3->rbuf.
...
Submitted by: Bob Buckholz <bbuckholz@google.com >
2011-10-13 13:05:35 +00:00
Dr. Stephen Henson
2461396f69
For now disable RSAX ENGINE for FIPS builds: it sets a non-FIPS RSA
...
method which stops FIPS mode working.
2011-10-13 11:43:44 +00:00
Dr. Stephen Henson
81a071df2f
increase test RSA key size to 1024 bits
2011-10-12 21:55:42 +00:00
Dr. Stephen Henson
6841abe842
update pkey method initialisation and copy
2011-10-11 18:16:02 +00:00
Dr. Stephen Henson
cb70355d87
Backport ossl_ssize_t type from HEAD.
2011-10-10 22:33:50 +00:00
Dr. Stephen Henson
b17442bb04
def_rsa_finish not used anymore.
2011-10-10 20:34:17 +00:00
Dr. Stephen Henson
4874e235fb
fix leak properly this time...
2011-10-10 14:09:05 +00:00
Dr. Stephen Henson
06afa6eb94
add GCM ciphers in SSL_library_init
2011-10-10 12:56:11 +00:00
Dr. Stephen Henson
58e4205d6c
disable GCM if not available
2011-10-10 12:40:13 +00:00
Dr. Stephen Henson
733394d6dd
Add some entries for 1.0.1 in NEWS.
2011-10-10 00:27:52 +00:00
Dr. Stephen Henson
2de9558dea
sync NEWS with 1.0.0 branch
2011-10-10 00:23:14 +00:00
Dr. Stephen Henson
6bd173fced
Don't disable TLS v1.2 by default any more.
2011-10-09 23:28:25 +00:00
Dr. Stephen Henson
6b00cd746a
Update ordinals.
2011-10-09 23:14:20 +00:00
Dr. Stephen Henson
9309ea6617
Backport PSS signature support from HEAD.
2011-10-09 23:13:50 +00:00
Dr. Stephen Henson
05c9e3aea5
fix CHANGES entry
2011-10-09 23:11:09 +00:00
Dr. Stephen Henson
88bac3e664
fix memory leaks
2011-10-09 23:09:22 +00:00
Dr. Stephen Henson
5473b6bc2f
Fix memory leak. From HEAD.
2011-10-09 16:04:17 +00:00
Dr. Stephen Henson
38e408076e
Update ordinals.
2011-10-09 15:28:52 +00:00
Dr. Stephen Henson
dc100d87b5
Backport of password based CMS support from HEAD.
2011-10-09 15:28:02 +00:00
Dr. Stephen Henson
6f6b31dadc
PR: 2482
...
Submitted by: Rob Austein <sra@hactrn.net >
Reviewed by: steve
Don't allow inverted ranges in RFC3779 code, discovered by Frank Ellermann.
2011-10-09 00:56:43 +00:00
Dr. Stephen Henson
b08b158b44
use client version when eliminating TLS v1.2 ciphersuites in client hello
2011-10-07 15:07:36 +00:00
Dr. Stephen Henson
177f27d71e
? crypto/aes/aes-armv4.S
...
? crypto/aes/aesni-sha1-x86_64.s
? crypto/aes/aesni-x86_64.s
? crypto/aes/foo.pl
? crypto/aes/vpaes-x86_64.s
? crypto/bn/.bn_lib.c.swp
? crypto/bn/armv4-gf2m.S
? crypto/bn/diffs
? crypto/bn/modexp512-x86_64.s
? crypto/bn/x86_64-gf2m.s
? crypto/bn/x86_64-mont5.s
? crypto/ec/bc.txt
? crypto/ec/diffs
? crypto/modes/a.out
? crypto/modes/diffs
? crypto/modes/ghash-armv4.S
? crypto/modes/ghash-x86_64.s
? crypto/modes/op.h
? crypto/modes/tst.c
? crypto/modes/x.h
? crypto/objects/.obj_xref.txt.swp
? crypto/rand/diffs
? crypto/sha/sha-512
? crypto/sha/sha1-armv4-large.S
? crypto/sha/sha256-armv4.S
? crypto/sha/sha512-armv4.S
Index: crypto/objects/obj_xref.c
===================================================================
RCS file: /v/openssl/cvs/openssl/crypto/objects/obj_xref.c,v
retrieving revision 1.9
diff -u -r1.9 obj_xref.c
--- crypto/objects/obj_xref.c 5 Nov 2008 18:38:58 -0000 1.9
+++ crypto/objects/obj_xref.c 6 Oct 2011 20:30:21 -0000
@@ -110,8 +110,10 @@
#endif
if (rv == NULL)
return 0;
- *pdig_nid = rv->hash_id;
- *ppkey_nid = rv->pkey_id;
+ if (pdig_nid)
+ *pdig_nid = rv->hash_id;
+ if (ppkey_nid)
+ *ppkey_nid = rv->pkey_id;
return 1;
}
@@ -144,7 +146,8 @@
#endif
if (rv == NULL)
return 0;
- *psignid = (*rv)->sign_id;
+ if (psignid)
+ *psignid = (*rv)->sign_id;
return 1;
}
Index: crypto/x509/x509type.c
===================================================================
RCS file: /v/openssl/cvs/openssl/crypto/x509/x509type.c,v
retrieving revision 1.10
diff -u -r1.10 x509type.c
--- crypto/x509/x509type.c 26 Oct 2007 12:06:33 -0000 1.10
+++ crypto/x509/x509type.c 6 Oct 2011 20:36:04 -0000
@@ -100,20 +100,26 @@
break;
}
- i=X509_get_signature_type(x);
- switch (i)
+ i=OBJ_obj2nid(x->sig_alg->algorithm);
+ if (i && OBJ_find_sigid_algs(i, NULL, &i))
{
- case EVP_PKEY_RSA:
- ret|=EVP_PKS_RSA;
- break;
- case EVP_PKEY_DSA:
- ret|=EVP_PKS_DSA;
- break;
- case EVP_PKEY_EC:
- ret|=EVP_PKS_EC;
- break;
- default:
- break;
+
+ switch (i)
+ {
+ case NID_rsaEncryption:
+ case NID_rsa:
+ ret|=EVP_PKS_RSA;
+ break;
+ case NID_dsa:
+ case NID_dsa_2:
+ ret|=EVP_PKS_DSA;
+ break;
+ case NID_X9_62_id_ecPublicKey:
+ ret|=EVP_PKS_EC;
+ break;
+ default:
+ break;
+ }
}
if (EVP_PKEY_size(pk) <= 1024/8)/* /8 because it's 1024 bits we look
2011-10-06 20:45:08 +00:00
Dr. Stephen Henson
928bd9a149
fix signed/unsigned warning
2011-09-26 17:04:41 +00:00
Dr. Stephen Henson
e53113b8ac
make sure eivlen is initialised
2011-09-24 23:06:35 +00:00
Dr. Stephen Henson
1fe83b4afe
use keyformat for -x509toreq, don't hard code PEM
2011-09-23 21:48:50 +00:00
Dr. Stephen Henson
e8f31f80d1
PR: 2606
...
Submitted by: Christoph Viethen <cv@kawo2.rwth-aachen.de >
Reviewed by: steve
Handle timezones correctly in UTCTime.
2011-09-23 13:39:35 +00:00
Dr. Stephen Henson
56f5ab43c2
PR: 2602
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS bug which prevents manual MTU setting
2011-09-23 13:35:05 +00:00
Dr. Stephen Henson
370385571c
PR: 2347
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Reviewed by: steve
Fix usage message.
2011-09-23 13:12:41 +00:00
Dr. Stephen Henson
e34a303ce1
make depend
2011-09-16 23:15:22 +00:00
Dr. Stephen Henson
36f120cd20
Improved error checking for DRBG calls.
...
New functionality to allow default DRBG type to be set during compilation or during runtime.
2011-09-16 23:12:34 +00:00
Dr. Stephen Henson
0ae7c43fa5
Improved error checking for DRBG calls.
...
New functionality to allow default DRBG type to be set during compilation
or during runtime.
2011-09-16 23:08:57 +00:00
Dr. Stephen Henson
c0d2943952
Typo.
2011-09-16 23:04:07 +00:00
Dr. Stephen Henson
7d453a3b49
Fix warnings (from HEAD).
2011-09-10 21:18:37 +00:00
Dr. Stephen Henson
cd447875e6
Initialise X509_STORE_CTX properly so CRLs with nextUpdate date in the past
...
produce an error (CVE-2011-3207)
2011-09-06 15:14:41 +00:00
Andy Polyakov
692a94293c
config: don't add -Wa options with no-asm [from HEAD].
2011-09-05 16:33:48 +00:00
Bodo Möller
efebb10829
oops
2011-09-05 13:43:53 +00:00
Bodo Möller
3c3f025923
Fix session handling.
2011-09-05 13:36:55 +00:00
Bodo Möller
5ff6e2dfbb
Fix d2i_SSL_SESSION.
2011-09-05 13:31:07 +00:00
Bodo Möller
61ac68f9f6
(EC)DH memory handling fixes.
...
Submitted by: Adam Langley
2011-09-05 10:25:27 +00:00
Bodo Möller
7f1022a8b1
Fix memory leak on bad inputs.
2011-09-05 09:57:15 +00:00
Bodo Möller
edf6b025b1
make update
2011-09-05 09:44:54 +00:00
Bodo Möller
d799df36b3
Fix expected DEFFLAG for default config.
2011-09-05 09:43:56 +00:00
Bodo Möller
9e96812934
Fix error codes.
2011-09-05 09:42:55 +00:00
Dr. Stephen Henson
91e97cbe4c
Don't use *from++ in tolower as this is implemented as a macro on some
...
platforms. Thanks to Shayne Murray <Shayne.Murray@Polycom.com > for
reporting this issue.
2011-09-02 11:28:18 +00:00
Dr. Stephen Henson
63ee3b32fe
PR: 2576
...
Submitted by: Doug Goldstein <cardoe@gentoo.org >
Reviewed by: steve
Include header file stdlib.h which is needed on some platforms to get
getenv() declaration.
2011-09-02 11:20:32 +00:00
Dr. Stephen Henson
4ff1a2da10
PR: 2340
...
Submitted by: "Mauro H. Leggieri" <mxmauro@caiman.com.ar >
Reviewed by: steve
Stop warnings if OPENSSL_NO_DGRAM is defined.
2011-09-01 15:01:55 +00:00
Dr. Stephen Henson
4c3c975066
make timing attack protection unconditional
2011-09-01 14:23:22 +00:00
Dr. Stephen Henson
ec5d74f868
PR: 2573
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS buffering and decryption bug.
2011-09-01 14:02:14 +00:00
Dr. Stephen Henson
be0853358c
PR: 2589
...
Submitted by: Thomas Jarosch <thomas.jarosch@intra2net.com >
Reviewed by: steve
Initialise p pointer.
2011-09-01 13:52:38 +00:00
Dr. Stephen Henson
fea15b553d
PR: 2588
...
Submitted by: Thomas Jarosch <thomas.jarosch@intra2net.com >
Reviewed by: steve
Close file pointer.
2011-09-01 13:49:08 +00:00
Dr. Stephen Henson
88ef78745e
PR: 2586
...
Submitted by: Thomas Jarosch <thomas.jarosch@intra2net.com >
Reviewed by: steve
Zero structure fields properly.
2011-09-01 13:45:35 +00:00
Dr. Stephen Henson
be79342515
PR: 2586
...
Submitted by: Thomas Jarosch <thomas.jarosch@intra2net.com >
Reviewed by: steve
Fix brace mismatch.
2011-09-01 13:37:28 +00:00
Dr. Stephen Henson
064a6176ac
Update ordinals.
2011-08-26 10:45:17 +00:00
Andy Polyakov
84e7485bfb
Add RC4-MD5 and AESNI-SHA1 "stitched" implementations [from HEAD].
2011-08-23 20:53:34 +00:00
Andy Polyakov
f56f72f219
eng_rsax.c: improve portability [from HEAD].
2011-08-22 19:01:41 +00:00
Andy Polyakov
2bfb23f102
modexp512-x86_64.pl: make it work with ml64 [from HEAD].
2011-08-19 06:31:27 +00:00
Dr. Stephen Henson
cf199fec52
Remove hard coded ecdsaWithSHA1 hack in ssl routines and check for RSA
...
using OBJ xref utilities instead of string comparison with OID name.
This removes the arbitrary restriction on using SHA1 only with some ECC
ciphersuites.
2011-08-14 13:47:30 +00:00
Andy Polyakov
165c20c2c4
eng_rsax.c: make it work on Win64.
2011-08-14 08:38:04 +00:00
Andy Polyakov
625c6ba4c7
eng_rdrand.c: make it link in './config 386' case [from HEAD].
2011-08-14 08:31:14 +00:00
Andy Polyakov
a32bede701
x86_64-xlate.pl: fix movzw [from HEAD].
2011-08-12 21:25:23 +00:00
Andy Polyakov
8ff5c8874f
Alpha assembler fixed from HEAD.
...
PR: 2577
2011-08-12 12:31:08 +00:00
Dr. Stephen Henson
c5d38fc262
aesni TLS GCM support
2011-08-11 23:06:37 +00:00
Dr. Stephen Henson
6b71970520
Sync EVP AES modes from HEAD.
2011-08-11 22:52:06 +00:00
Dr. Stephen Henson
0209e111f6
Add XTS OIDs from HEAD.
2011-08-11 22:51:37 +00:00
Dr. Stephen Henson
dc01af7723
Sync ASM/modes to add CCM and XTS modes and assembly language optimisation
...
(from HEAD, original by Andy).
2011-08-11 22:36:19 +00:00
Dr. Stephen Henson
5435d0412f
prevent compilation errors and warnings
2011-08-11 21:12:01 +00:00
Andy Polyakov
922ac25f64
Add provisory support for RDRAND [from HEAD].
2011-08-10 18:53:13 +00:00
Dr. Stephen Henson
aed53d6c5a
Backport GCM support from HEAD.
2011-08-04 11:13:28 +00:00
Dr. Stephen Henson
61cdb9f36a
Backport GCM support from HEAD. Minimal support at present: no assembly
...
language optimisation. [original by Andy]
2011-08-04 11:12:38 +00:00
Dr. Stephen Henson
1acd042c85
fix memory leak
2011-08-03 16:40:14 +00:00
Dr. Stephen Henson
572712d82a
recognise ecdsaWithSHA1 OID
2011-07-28 14:42:53 +00:00
Dr. Stephen Henson
d1697a7556
Disable rsax for Windows: it doesn't currently work.
2011-07-25 23:45:49 +00:00
Dr. Stephen Henson
c8c6e9ecd9
Add HMAC ECC ciphersuites from RFC5289. Include SHA384 PRF support and
...
prohibit use of these ciphersuites for TLS < 1.2
2011-07-25 21:45:17 +00:00
Andy Polyakov
90f3e4cf05
Back-port TLS AEAD framework [from HEAD].
2011-07-21 19:22:57 +00:00
Dr. Stephen Henson
7bd8bf58bb
stop warnings
2011-07-21 13:45:17 +00:00
Andy Polyakov
1190d3f442
Add RSAX builtin engine [from HEAD].
2011-07-20 21:51:33 +00:00
Dr. Stephen Henson
0e4f5cfbab
PR: 2559
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS socket error bug
2011-07-20 15:22:02 +00:00
Dr. Stephen Henson
f1c8db9f8c
PR: 2555
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS sequence number bug
2011-07-20 15:17:42 +00:00
Dr. Stephen Henson
2c9abbd554
PR: 2550
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS HelloVerifyRequest Timer bug
2011-07-20 15:13:43 +00:00
Dr. Stephen Henson
2305ae5d8c
PR: 2556 (partial)
...
Reported by: Daniel Marschall <daniel-marschall@viathinksoft.de >
Reviewed by: steve
Fix OID routines.
Check on encoding leading zero rejection should start at beginning of
encoding.
Allow for initial digit when testing when to use BIGNUMs which can increase
first value by 2 * 40.
2011-07-14 12:01:36 +00:00
Andy Polyakov
dec54bd0ba
ms/uplink.c: fix Visual Studio 2010 warning [from HEAD].
2011-07-13 14:54:56 +00:00
Andy Polyakov
aade369737
config: config: detect if assembler supports --noexecstack and pass it down
...
[from HEAD].
2011-07-13 14:25:22 +00:00
Andy Polyakov
2a5e042c70
perlasm/cbc.pl: fix tail processing bug [from HEAD].
...
PR: 2557
2011-07-13 06:22:46 +00:00
Bodo Möller
1dc4c8c727
Fix typo.
...
Submitted by: Jim Morrison
2011-07-11 12:13:56 +00:00
Dr. Stephen Henson
7ca035db88
Update ordinals.
2011-07-08 12:12:30 +00:00
Andy Polyakov
a460c42f94
x86_64-xlate.pl: update from HEAD.
2011-07-04 13:11:55 +00:00
Andy Polyakov
d16743e728
sha1-x86_64.pl: nasm-related update from HEAD.
2011-07-04 13:01:42 +00:00
Andy Polyakov
4a29fa8caf
sha1-x86_64.pl: fix win64-specific typos and add masm support [from HEAD].
2011-07-01 21:24:39 +00:00
Andy Polyakov
250bb54dba
x86_64-xlate.pl: masm-specific update.
2011-07-01 21:22:13 +00:00
Dr. Stephen Henson
847d05d0b4
No need for trailing slash any more.
2011-07-01 14:15:02 +00:00
Dr. Stephen Henson
8315aa03fc
Fix assembly language function renaming so it works on WIN64.
2011-07-01 14:13:52 +00:00
Andy Polyakov
b7a4c480d6
Configure: add aesni-x86_64.o to VC-WIN64A line.
2011-06-28 18:20:25 +00:00
Andy Polyakov
9a35faaa29
rc4-x86[_64].pl: back-sync with original 1.0.1.
2011-06-28 15:04:31 +00:00
Andy Polyakov
fbe2e28911
AES-NI backport from HEAD. Note that e_aes.c doesn't implement all modes
...
from HEAD yet, more will be back-ported later.
2011-06-28 14:49:35 +00:00
Andy Polyakov
84968e25f3
x86[_64] assembler pack: back-port SHA1 and RC4 from HEAD.
2011-06-28 13:53:50 +00:00
Andy Polyakov
10fd0b7b55
x86[_64]cpuid.pl: harmonize OPENSSL_ia32_cpuid [from HEAD].
2011-06-28 13:40:19 +00:00
Andy Polyakov
4a46dc6e5c
x86[_64] perlasm: pull-in from HEAD.
2011-06-28 13:33:47 +00:00
Andy Polyakov
0ec55604c0
Expand OPENSSL_ia32cap_P to 64 bits. It might appear controversial, because
...
such operation can be considered as breaking binary compatibility. However!
OPNESSL_ia32cap_P is accessed by application through pointer returned by
OPENSSL_ia32cap_loc() and such change of *internal* OPENSSL_ia32cap_P
declaration is possible specifically on little-endian platforms, such as
x86[_64] ones in question. In addition, if 32-bit application calls
OPENSSL_ia32cap_loc(), it clears upper half of capability vector maintaining
the illusion that it's still 32 bits wide.
2011-06-28 13:31:58 +00:00
Dr. Stephen Henson
500007c9ed
auto detect configuration using KERNEL_BITS and CC
2011-06-27 11:39:01 +00:00
Dr. Stephen Henson
f75abba013
allow KERNEL_BITS to be specified in the environment
2011-06-24 14:04:18 +00:00
Dr. Stephen Henson
dea113b428
PR: 2470
...
Submitted by: Corinna Vinschen <vinschen@redhat.com >
Reviewed by: steve
Don't call ERR_remove_state from DllMain.
2011-06-22 15:38:40 +00:00
Dr. Stephen Henson
6abc406a69
PR: 2543
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Correctly handle errors in DTLSv1_handle_timeout()
2011-06-22 15:30:04 +00:00
Dr. Stephen Henson
dcbe723bc5
PR: 2540
...
Submitted by: emmanuel.azencot@bull.net
Reviewed by: steve
Prevent infinite loop in BN_GF2m_mod_inv().
2011-06-22 15:23:40 +00:00
Dr. Stephen Henson
33c98a28ac
correctly encode OIDs near 2^32
2011-06-22 15:15:48 +00:00
Dr. Stephen Henson
b2ddddfb20
allow MD5 use for computing old format hash links
2011-06-22 02:18:06 +00:00
Dr. Stephen Henson
c24367ebb9
Don't set FIPS rand method at same time as RAND method as this can cause
...
the FIPS library to fail. Applications that want to set the FIPS rand
method can do so explicitly and presumably they know what they are doing...
2011-06-21 17:08:25 +00:00
Dr. Stephen Henson
7397b35379
Add FIPS error codes.
2011-06-21 16:58:10 +00:00
Dr. Stephen Henson
baee44c3de
Stop warning.
2011-06-21 16:42:15 +00:00
Dr. Stephen Henson
1f2e4ecc30
Rename all AES_set*() functions using private_ prefix.
2011-06-21 16:23:42 +00:00
Dr. Stephen Henson
955e28006d
make EVP_dss() work for DSA signing
2011-06-20 20:05:13 +00:00
Dr. Stephen Henson
bf0736eb1f
Redirect null cipher to FIPS module.
2011-06-20 20:00:10 +00:00
Dr. Stephen Henson
3a5b97b7f1
Don't set default public key methods in FIPS mode so applications
...
can switch between modes.
2011-06-20 19:41:13 +00:00
Dr. Stephen Henson
45bf825066
Set FIPSLINK correctly now trailing slash is removed from FIPSDIR.
2011-06-18 19:35:03 +00:00
Dr. Stephen Henson
4a18d5c89b
Don't add trailing slash to FIPSDIR: it causes problems with Windows builds.
2011-06-18 19:02:12 +00:00
Dr. Stephen Henson
174b26c497
Preliminary WIN32 support for FIPS capable OpenSSL building.
2011-06-17 12:50:40 +00:00
Bodo Möller
5cacc82f61
Fix the version history: given that 1.0.1 has yet to be released,
...
we should list "Changes between 1.0.0e and 1.0.1",
not "between 1.0.0d and 1.0.1".
2011-06-15 14:23:44 +00:00
Dr. Stephen Henson
29a90816ff
Update key sizes to 2048 bits.
...
Only build ssltest with fipsld.
Include FIPS mode test for ssltest.
2011-06-14 15:35:49 +00:00
Dr. Stephen Henson
4bea454021
set FIPS allow before initialising ctx
2011-06-14 15:25:41 +00:00
Dr. Stephen Henson
8bfd0ae4c4
typo
2011-06-14 13:47:25 +00:00
Dr. Stephen Henson
378943ce67
Use include dir when copiling fips_premain_dso.
2011-06-14 12:58:35 +00:00
Dr. Stephen Henson
c65d409afd
Fix warnings in shared builds.
2011-06-14 12:58:00 +00:00
Dr. Stephen Henson
ed1bbe2cad
make sure custom cipher flag doesn't use any mode bits
2011-06-13 23:10:34 +00:00
Dr. Stephen Henson
b0b3d09063
Set rand method in FIPS_mode_set() not in rand library.
2011-06-13 21:18:00 +00:00
Dr. Stephen Henson
0ede2af7a0
Redirect RAND to FIPS module in FIPS mode.
2011-06-13 20:40:52 +00:00
Dr. Stephen Henson
e8d23f7811
Redirect HMAC and CMAC operations to module.
2011-06-12 15:07:26 +00:00
Dr. Stephen Henson
907cd7217e
update ordinals
2011-06-10 17:17:55 +00:00
Dr. Stephen Henson
7c402e5af3
Disable GCM, CCM, XTS outside FIPS mode this will be updated
...
when backported.
2011-06-10 14:22:42 +00:00
Dr. Stephen Henson
b8d78a5520
add cmac to Windows build, update ordinals
2011-06-10 14:12:55 +00:00
Dr. Stephen Henson
dfa5862960
Add android platforms. Let fipsdir come from environment.
2011-06-09 21:54:13 +00:00
Dr. Stephen Henson
4276908f51
add android support to DSO (from HEAD)
2011-06-09 21:49:24 +00:00
Ben Laurie
be23b71e87
Add -attime.
2011-06-09 17:09:31 +00:00
Ben Laurie
f851acbfff
Fix warnings/errors(!).
2011-06-09 17:09:08 +00:00
Ben Laurie
78ef9b0205
Fix warnings.
2011-06-09 16:03:18 +00:00
Dr. Stephen Henson
ed9b0e5cba
Redirect DH key and parameter generation.
2011-06-09 15:21:46 +00:00
Dr. Stephen Henson
752c1a0ce9
Redirect DSA operations to FIPS module in FIPS mode.
2011-06-09 13:54:09 +00:00
Dr. Stephen Henson
cc30415d0c
Use method rsa keygen first if FIPS mode if it is a FIPS method.
2011-06-09 13:18:07 +00:00
Dr. Stephen Henson
03e16611a3
Redirect DH operations to FIPS module. Block non-FIPS methods.
...
Sync DH error codes with HEAD.
2011-06-08 15:58:59 +00:00
Dr. Stephen Henson
8e2f3c1c83
fix memory leak
2011-06-08 15:55:57 +00:00
Dr. Stephen Henson
b6d63b2516
Check fips method flags for ECDH, ECDSA.
2011-06-08 14:01:00 +00:00
Dr. Stephen Henson
e6b88d02bd
Implement Camellia_set_key properly for FIPS builds.
2011-06-08 13:11:46 +00:00
Andy Polyakov
125060ca63
rc4_skey.c: remove dead/redundant code (it's never compiled) and
...
misleading/obsolete comment [from HEAD].
2011-06-06 20:04:33 +00:00
Dr. Stephen Henson
b4baca9261
Recognise "fips" in mkdef.pl script.
2011-06-06 15:46:25 +00:00
Dr. Stephen Henson
6342b6e332
Redirection of ECDSA, ECDH operations to FIPS module.
...
Also use FIPS EC methods unconditionally for now: might want to use them
only in FIPS mode or with a switch later.
2011-06-06 15:39:17 +00:00
Dr. Stephen Henson
a6dc77822b
Set SSL_FIPS flag in ECC ciphersuites.
2011-06-06 14:14:14 +00:00
Dr. Stephen Henson
59bc67052b
Add flags field to EC_KEY structure (backport from HEAD).
2011-06-06 13:18:03 +00:00
Dr. Stephen Henson
c090562828
Make no-ec2m work again (backport from HEAD).
2011-06-06 13:00:30 +00:00
Dr. Stephen Henson
69e2ec63c5
Reorganise ECC code so it can use FIPS module.
...
Move compression, point2oct and oct2point functions into separate files.
Add a flags field to EC_METHOD.
Add a flag EC_FLAGS_DEFAULT_OCT to use the default compession and oct functions
(all existing methods do this). This removes dependencies from EC_METHOD while
keeping original functionality.
Backport from HEAD with minor changes.
2011-06-06 12:54:51 +00:00
Dr. Stephen Henson
f610a516a0
Backport from HEAD:
...
New option to disable characteristic two fields in EC code.
Make no-ec2m work on Win32 build.
2011-06-06 11:49:36 +00:00
Dr. Stephen Henson
2e51a4caa3
Function not used outside FIPS builds.
2011-06-06 11:24:47 +00:00
Dr. Stephen Henson
c6fa97a6d6
FIPS low level blocking for AES, RC4 and Camellia. This is complicated by
...
use of assembly language routines: rename the assembly language function
to the private_* variant unconditionally and perform tests from a small
C wrapper.
2011-06-05 17:36:44 +00:00
Dr. Stephen Henson
24d7159abd
Backport libcrypto audit: check return values of EVP functions instead
...
of assuming they will always suceed.
2011-06-03 20:53:00 +00:00
Dr. Stephen Henson
7978dc989d
fix error discrepancy
2011-06-03 18:50:49 +00:00
Dr. Stephen Henson
d99e6b5014
New function X509_ALGOR_set_md() to set X509_ALGOR (DigestAlgorithmIdentifier) from a digest algorithm (backport from HEAD).
2011-06-03 18:35:49 +00:00
Dr. Stephen Henson
2cf40fc2b8
license correction, no EAY code included in this file
2011-06-03 17:56:51 +00:00
Dr. Stephen Henson
260d08b814
Backport CMAC support from HEAD.
2011-06-03 15:08:42 +00:00
Dr. Stephen Henson
53dd05d8f6
Redirect RSA keygen, sign, verify to FIPS module.
2011-06-03 13:16:16 +00:00
Dr. Stephen Henson
fbe7055370
Redirection of low level APIs to FIPS module.
...
Digest sign, verify operations are not redirected at this stage.
2011-06-02 18:22:42 +00:00
Dr. Stephen Henson
a5b386205f
Backport extended PSS support from HEAD: allow setting of mgf1Hash explicitly.
...
This is needed to handle FIPS redirection fully.
2011-06-02 18:13:33 +00:00
Dr. Stephen Henson
916bcab28e
Prohibit low level cipher APIs in FIPS mode.
...
Not complete: ciphers with assembly language key setup are not
covered yet.
2011-06-01 16:54:06 +00:00
Dr. Stephen Henson
c7373c3dee
For consistency define clone digests in evp_fips.c
2011-06-01 15:11:00 +00:00
Dr. Stephen Henson
9f2c8eb2a1
Redirect clone digests to FIPS module for FIPS builds.
2011-06-01 14:28:21 +00:00
Dr. Stephen Henson
65300dcfb0
Prohibit use of low level digest APIs in FIPS mode.
2011-06-01 13:39:45 +00:00
Dr. Stephen Henson
9ddc574f9a
typo
2011-06-01 11:10:50 +00:00
Dr. Stephen Henson
2dd9e67874
set FIPS permitted flag before initalising digest
2011-05-31 16:24:06 +00:00
Dr. Stephen Henson
f93b03a5e6
Don't round up partitioned premaster secret length if there is only one
...
digest in use: this caused the PRF to fail for an odd premaster secret
length.
2011-05-31 10:35:22 +00:00
Dr. Stephen Henson
55a47cd30f
Output supported curves in preference order instead of numerically.
2011-05-30 17:58:29 +00:00
Dr. Stephen Henson
5792219d1d
Redirect cipher operations to FIPS module for FIPS builds.
2011-05-29 16:18:38 +00:00
Dr. Stephen Henson
293c58c1e7
Use approved API for EVP digest operations in FIPS builds.
...
Call OPENSSL_init() in a few more places to make sure it is always called
at least once.
Initial cipher API redirection (incomplete).
2011-05-29 15:55:13 +00:00
Dr. Stephen Henson
9f375a752e
Add default ASN1 handling to support FIPS.
2011-05-29 02:32:05 +00:00
Dr. Stephen Henson
04dc5a9ca6
Redirect digests to FIPS module for FIPS builds.
...
Use FIPS API when initialising digests.
Sync header file evp.h and error codes with HEAD for necessary FIPS
definitions.
2011-05-28 23:01:26 +00:00
Dr. Stephen Henson
ae6cb5483e
Use || instead of && so build doesn't fail.
2011-05-26 22:10:28 +00:00
Dr. Stephen Henson
a168ec1d27
Support shared library builds of FIPS capable OpenSSL, add fipscanister.o
...
to libcrypto.a so linking to libcrypto.a works.
2011-05-26 21:23:11 +00:00
Dr. Stephen Henson
2a35144327
Make test utility link work for fips build.
2011-05-26 14:36:56 +00:00
Dr. Stephen Henson
7207eca1ee
The first of many changes to make OpenSSL 1.0.1 FIPS capable.
...
Add static build support to openssl utility.
Add new "fips" option to Configure.
Make use of installed fipsld and fips_standalone_sha1
Initialise FIPS error callbacks, locking and DRBG.
Doesn't do anything much yet: no crypto is redirected to the FIPS module.
Doesn't completely build either but the openssl utility can enter FIPS mode:
which doesn't do anything much either.
2011-05-26 14:19:19 +00:00
Dr. Stephen Henson
9c34782478
Don't advertise or use MD5 for TLS v1.2 in FIPS mode
2011-05-25 15:33:29 +00:00
Dr. Stephen Henson
20e6d22709
PR: 2533
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Setting SSL_MODE_RELEASE_BUFFERS should be ignored for DTLS, but instead causes
the program to crash. This is due to missing version checks and is fixed with
this patch.
2011-05-25 15:21:01 +00:00
Dr. Stephen Henson
24dd0c61ef
PR: 2529
...
Submitted by: Marcus Meissner <meissner@suse.de >
Reviewed by: steve
Call ssl_new() to reallocate SSL BIO internals if we want to replace
the existing internal SSL structure.
2011-05-25 15:16:01 +00:00
Dr. Stephen Henson
565c15363c
PR: 2527
...
Submitted by: Marcus Meissner <meissner@suse.de >
Reviewed by: steve
Set cnf to NULL to avoid possible double free.
2011-05-25 15:05:56 +00:00
Dr. Stephen Henson
ed67f7b7a7
Fix the ECDSA timing attack mentioned in the paper at:
...
http://eprint.iacr.org/2011/232.pdf
Thanks to the original authors Billy Bob Brumley and Nicola Tuveri for
bringing this to our attention.
2011-05-25 14:52:33 +00:00
Dr. Stephen Henson
6ea8d138d3
Fix the ECDSA timing attack mentioned in the paper at:
...
http://eprint.iacr.org/2011/232.pdf
Thanks to the original authors Billy Bob Brumley and Nicola Tuveri for
bringing this to our attention.
2011-05-25 14:42:27 +00:00
Dr. Stephen Henson
4159ac43aa
Oops use up to date patch for PR#2506
2011-05-25 14:30:05 +00:00
Dr. Stephen Henson
419b09b053
PR: 2512
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix BIO_accept so it can be bound to IPv4 or IPv6 sockets consistently.
2011-05-25 12:36:59 +00:00
Dr. Stephen Henson
88530f6b76
PR: 2506
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fully implement SSL_clear for DTLS.
2011-05-25 12:28:16 +00:00
Dr. Stephen Henson
a8cb8177f6
PR: 2505
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS session resumption timer bug.
2011-05-25 12:24:43 +00:00
Dr. Stephen Henson
277f8a34f4
use TLS1_get_version macro to check version so TLS v1.2 changes don't interfere with DTLS
2011-05-25 11:43:17 +00:00
Dr. Stephen Henson
4dde470865
Add tls12_sigalgs which somehow didn't get added to the backport.
2011-05-21 17:40:23 +00:00
Richard Levitte
ab08405984
LIBOBJ contained o_fips.c, now o_fips.o.
2011-05-21 09:17:54 +00:00
Dr. Stephen Henson
b81fde02aa
Add server client certificate support for TLS v1.2 . This is more complex
...
than client side as we need to keep the handshake record cache frozen when
it contains all the records need to process the certificate verify message.
(backport from HEAD).
2011-05-20 14:58:45 +00:00
Dr. Stephen Henson
57dd2ea808
add FIPS support to openssl utility (backport from HEAD)
2011-05-19 18:23:24 +00:00
Dr. Stephen Henson
7043fa702f
add FIPS support to ssl: doesn't do anything on this branch yet as there is no FIPS compilation support
2011-05-19 18:22:16 +00:00
Dr. Stephen Henson
f98d2e5cc1
Implement FIPS_mode and FIPS_mode_set
2011-05-19 18:19:07 +00:00
Dr. Stephen Henson
1a5538251f
update date
2011-05-19 17:56:12 +00:00
Dr. Stephen Henson
f4ddbb5ad1
inherit HMAC flags from MD_CTX
2011-05-19 17:38:57 +00:00
Dr. Stephen Henson
74bf705ea8
set encodedPoint to NULL after freeing it
2011-05-19 16:18:11 +00:00
Dr. Stephen Henson
676cd3a283
new flag to stop ENGINE methods being registered
2011-05-15 15:58:38 +00:00
Dr. Stephen Henson
c6ead3cdd3
Recognise and ignore no-ec-nistp224-64-gcc-128 (from HEAD).
2011-05-13 12:46:12 +00:00
Dr. Stephen Henson
2d53648ce7
typo
2011-05-13 12:44:37 +00:00
Dr. Stephen Henson
64ca6ac26b
Recognise NO_NISTP224-64-GCC-128
2011-05-13 12:38:02 +00:00
Dr. Stephen Henson
4fe4c00eca
Provisional support for TLS v1.2 client authentication: client side only.
...
Parse certificate request message and set digests appropriately.
Generate new TLS v1.2 format certificate verify message.
Keep handshake caches around for longer as they are needed for client auth.
2011-05-12 17:49:15 +00:00
Dr. Stephen Henson
376838a606
Process signature algorithms during TLS v1.2 client authentication.
...
Make sure message is long enough for signature algorithms.
(backport from HEAD).
2011-05-12 17:44:59 +00:00
Dr. Stephen Henson
d768a816aa
Ooops fix typo.
2011-05-12 13:59:04 +00:00
Dr. Stephen Henson
766e0cb7d1
SRP fixes from HEAD which weren't in 1.0.1-stable.
2011-05-12 13:46:40 +00:00
Dr. Stephen Henson
6a6b0c8b51
Add SSL_INTERN definition.
2011-05-12 13:12:49 +00:00
Dr. Stephen Henson
e24b01cc6f
Have EC_NISTP224_64_GCC_128 treated like any algorithm, and have disabled by
...
default. If we don't do it this way, it screws up libeay.num.
(update from HEAD, original from levitte).
2011-05-12 13:10:27 +00:00
Dr. Stephen Henson
7f9ef5621a
Oops, add missing declaration.
2011-05-12 13:02:25 +00:00
Dr. Stephen Henson
d7fc9ffc51
Update ordinals.
2011-05-11 23:03:06 +00:00
Dr. Stephen Henson
39348038df
make kerberos work with OPENSSL_NO_SSL_INTERN
2011-05-11 22:52:34 +00:00
Dr. Stephen Henson
9472baae0d
Backport TLS v1.2 support from HEAD.
...
This includes TLS v1.2 server and client support but at present
client certificate support is not implemented.
2011-05-11 13:37:52 +00:00
Dr. Stephen Henson
ae17b9ecd5
Typo.
2011-05-11 13:22:54 +00:00
Dr. Stephen Henson
74096890ba
Initial "opaque SSL" framework. If an application defines OPENSSL_NO_SSL_INTERN
...
all ssl related structures are opaque and internals cannot be directly
accessed. Many applications will need some modification to support this and
most likely some additional functions added to OpenSSL.
The advantage of this option is that any application supporting it will still
be binary compatible if SSL structures change.
(backport from HEAD).
2011-05-11 12:56:38 +00:00
Dr. Stephen Henson
889c2282a5
allow SHA384, SHA512 with DSA
2011-05-08 12:38:51 +00:00
Dr. Stephen Henson
dca30c44f5
no need to include memory.h
2011-04-30 23:38:05 +00:00
Dr. Stephen Henson
f2c358c6ce
check buffer is larger enough before overwriting
2011-04-06 18:06:54 +00:00
Dr. Stephen Henson
2ab42de1ec
PR: 2462
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS Retransmission Buffer Bug
2011-04-03 17:14:48 +00:00
Dr. Stephen Henson
ac2024ccbf
PR: 2458
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Don't change state when answering DTLS ClientHello.
2011-04-03 16:25:54 +00:00
Dr. Stephen Henson
93164a7d64
PR: 2457
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS fragment reassembly bug.
2011-04-03 15:48:32 +00:00
Richard Levitte
ecff2e5ce1
Corrections to the VMS build system.
...
Submitted by Steven M. Schweda <sms@antinode.info >
2011-03-25 16:21:08 +00:00
Dr. Stephen Henson
c9d630dab6
make some non-VMS builds work again
2011-03-25 15:07:18 +00:00
Richard Levitte
d135906dbc
For VMS, implement the possibility to choose 64-bit pointers with
...
different options:
"64" The build system will choose /POINTER_SIZE=64=ARGV if
the compiler supports it, otherwise /POINTER_SIZE=64.
"64=" The build system will force /POINTER_SIZE=64.
"64=ARGV" The build system will force /POINTER_SIZE=64=ARGV.
2011-03-25 09:39:46 +00:00
Richard Levitte
9f427a52cb
make update (1.0.1-stable)
...
This meant a slight renumbering in util/libeay.num due to symbols
appearing in 1.0.0-stable. However, since there's been no release on
this branch yet, it should be harmless.
2011-03-23 00:06:04 +00:00
Richard Levitte
5a39d3a838
* util/mkdef.pl: Add crypto/o_str.h and crypto/o_time.h. Maybe some
...
more need to be added...
2011-03-22 23:54:15 +00:00
Richard Levitte
013f3d999f
* apps/makeapps.com: Add srp.
2011-03-20 17:34:06 +00:00
Richard Levitte
64d30d7adc
* apps/makeapps.com: Forgot to end the check for /POINTER_SIZE=64=ARGV
...
with turning trapping back on.
* test/maketests.com: Do the same check for /POINTER_SIZE=64=ARGV
here.
* test/clean-test.com: A new script for cleaning up.
2011-03-20 14:01:49 +00:00
Richard Levitte
7062cb56a9
file clean_test.com was added on branch OpenSSL_1_0_1-stable on 2011-03-20 14:01:48 +0000
2011-03-20 14:01:18 +00:00
Richard Levitte
9d57828d66
* apps/openssl.c: For VMS, take care of copying argv if needed much earlier,
...
directly in main(). 'if needed' also includes when argv is a 32 bit
pointer in an otherwise 64 bit environment.
* apps/makeapps.com: When using /POINTER_SIZE=64, try to use the additional
=ARGV, but only if it's supported. Fortunately, DCL is very helpful
telling us in this case.
2011-03-20 13:15:37 +00:00
Richard Levitte
9ed8dee71b
A few more long symbols needing shortening.
2011-03-19 11:03:41 +00:00
Richard Levitte
4692b3345d
Keep file references in the VMS build files in the same order as they
...
are in the Unix Makefiles, and add SRP tests.
2011-03-19 10:46:21 +00:00
Richard Levitte
e59fb00735
SRP was introduced, add it for OpenVMS.
2011-03-19 09:55:35 +00:00
Richard Levitte
9275853084
A few more symbols that need shorter versions on OpenVMS.
2011-03-19 09:54:47 +00:00
Richard Levitte
0c81aa29f9
Change INSTALL.VMS to reflect the changes done on the build and
...
install scripts. This could need some more work.
2011-03-19 09:48:15 +00:00
Richard Levitte
01d2e27a2b
Apply all the changes submitted by Steven M. Schweda <sms@antinode.info>
2011-03-19 09:47:47 +00:00
Richard Levitte
dd7aadf7b2
file install-ssl.com was added on branch OpenSSL_1_0_1-stable on 2011-03-19 09:47:33 +0000
2011-03-19 09:44:39 +00:00
Richard Levitte
b2fdf501c5
file vms_rms.h was added on branch OpenSSL_1_0_1-stable on 2011-03-19 09:47:25 +0000
2011-03-19 09:44:30 +00:00
Richard Levitte
345e515735
file install-crypto.com was added on branch OpenSSL_1_0_1-stable on 2011-03-19 09:47:25 +0000
2011-03-19 09:44:29 +00:00
Richard Levitte
945982b0b2
file vms_decc_init.c was added on branch OpenSSL_1_0_1-stable on 2011-03-19 09:47:21 +0000
2011-03-19 09:44:27 +00:00
Richard Levitte
18ad9cbd10
file install-apps.com was added on branch OpenSSL_1_0_1-stable on 2011-03-19 09:47:21 +0000
2011-03-19 09:44:26 +00:00
Richard Levitte
f433a75569
file openssl_undo.com was added on branch OpenSSL_1_0_1-stable on 2011-03-19 09:47:19 +0000
2011-03-19 09:44:25 +00:00
Richard Levitte
b05389c825
file openssl_startup.com was added on branch OpenSSL_1_0_1-stable on 2011-03-19 09:47:19 +0000
2011-03-19 09:44:24 +00:00
Richard Levitte
68875fdf32
file install-vms.com was added on branch OpenSSL_1_0_1-stable on 2011-03-19 09:47:19 +0000
2011-03-19 09:44:23 +00:00
Dr. Stephen Henson
3393e0c02c
Fix SRP error codes (from HEAD).
2011-03-16 16:55:12 +00:00
Ben Laurie
a149b2466e
Add SRP.
2011-03-16 11:26:40 +00:00
Dr. Stephen Henson
13e230d505
PR: 2469
...
Submitted by: Jim Studt <jim@studt.net >
Reviewed by: steve
Check mac is present before trying to retrieve mac iteration count.
2011-03-13 18:20:23 +00:00
Dr. Stephen Henson
80b3d7a3c9
Remove redundant check to stop compiler warning.
2011-03-12 17:05:58 +00:00
Ben Laurie
4bd48de60c
Fix warning.
2011-03-12 12:18:34 +00:00
Dr. Stephen Henson
2eab92f8e3
make no-dsa work again
2011-03-10 18:27:13 +00:00
Andy Polyakov
2bbd82cf24
s390x-mont.pl: optimize for z196.
2011-03-04 13:13:04 +00:00
Andy Polyakov
1bfd3d7f58
dso_dlfcn.c: make it work on Tru64 4.0 [from HEAD].
2011-02-12 16:47:12 +00:00
Bodo Möller
cd77b3e88b
Sync with 1.0.0 branch.
...
(CVE-2011-0014 OCSP stapling fix has been applied to the 1.0.1 branch as well.)
2011-02-08 19:08:32 +00:00
Bodo Möller
8c93c4dd42
OCSP stapling fix (OpenSSL 0.9.8r/1.0.0d)
...
Submitted by: Neel Mehta, Adam Langley, Bodo Moeller
2011-02-08 17:48:41 +00:00
Bodo Möller
45d63a5408
Synchronize with 1.0.0 branch
2011-02-08 08:48:34 +00:00
Dr. Stephen Henson
decef971f4
add -stripcr option to copy.pl from 0.9.8
2011-02-03 14:58:02 +00:00
Bodo Möller
a288aaefc4
Assorted bugfixes:
...
- safestack macro changes for C++ were incomplete
- RLE decompression boundary case
- SSL 2.0 key arg length check
Submitted by: Google (Adam Langley, Neel Mehta, Bodo Moeller)
2011-02-03 12:03:57 +00:00
Bodo Möller
eed56c77b4
fix omission
2011-02-03 11:19:52 +00:00
Bodo Möller
346601bc32
CVE-2010-4180 fix (from OpenSSL_1_0_0-stable)
2011-02-03 10:42:00 +00:00
Dr. Stephen Henson
5080fbbef0
Since FIPS 186-3 specifies we use the leftmost bits of the digest
...
we shouldn't reject digest lengths larger than SHA256: the FIPS
algorithm tests include SHA384 and SHA512 tests.
2011-02-01 12:53:47 +00:00
Dr. Stephen Henson
b5b724348d
stop warnings about no previous prototype when compiling shared engines
2011-01-30 01:55:29 +00:00
Dr. Stephen Henson
c3ee90d8ca
FIPS mode changes to make RNG compile (this will need updating later as we
...
need a whole new PRNG for FIPS).
1. avoid use of ERR_peek().
2. If compiling with FIPS use small FIPS EVP and disable ENGINE
2011-01-26 14:55:23 +00:00
Dr. Stephen Henson
e1435034ae
FIPS_allow_md5() no longer exists and is no longer required
2011-01-26 12:25:51 +00:00
Richard Levitte
bf35c5dc7f
Add rsa_crpt
2011-01-26 06:32:22 +00:00
Dr. Stephen Henson
c42d223ac2
Move RSA encryption functions to new file crypto/rsa/rsa_crpt.c to separate
...
crypto and ENGINE dependencies in RSA library.
2011-01-25 17:43:20 +00:00
Dr. Stephen Henson
d5654d2b20
Move BN_options function to bn_print.c to remove dependency for BIO printf
...
routines from bn_lib.c
2011-01-25 17:10:42 +00:00
Dr. Stephen Henson
a7508fec1a
Move DSA_sign, DSA_verify to dsa_asn1.c and include separate versions of
...
DSA_SIG_new() and DSA_SIG_free() to remove ASN1 dependencies from DSA_do_sign()
and DSA_do_verify().
2011-01-25 16:55:27 +00:00
Dr. Stephen Henson
c31945e682
recalculate DSA signature if r or s is zero (FIPS 186-3 requirement)
2011-01-25 16:02:27 +00:00
Dr. Stephen Henson
d3203b931e
PR: 2433
...
Submitted by: Chris Wilson <chris@qwirx.com >
Reviewed by: steve
Constify ASN1_STRING_set_default_mask_asc().
2011-01-24 16:20:05 +00:00
Dr. Stephen Henson
947f4e90c3
New function EC_KEY_set_affine_coordinates() this performs all the
...
NIST PKV tests.
2011-01-24 16:09:57 +00:00
Dr. Stephen Henson
d184c7b271
check EC public key isn't point at infinity
2011-01-24 15:07:47 +00:00
Dr. Stephen Henson
913488c066
PR: 1612
...
Submitted by: Robert Jackson <robert@rjsweb.net >
Reviewed by: steve
Fix EC_POINT_cmp function for case where b but not a is the point at infinity.
2011-01-24 14:41:49 +00:00
Dr. Stephen Henson
7fa27d9ac6
Add additional parameter to dsa_builtin_paramgen to output the generated
...
seed to: this doesn't introduce any binary compatibility issues as the
function is only used internally.
The seed output is needed for FIPS 140-2 algorithm testing: the functionality
used to be in DSA_generate_parameters_ex() but was removed in OpenSSL 1.0.0
2011-01-19 14:46:42 +00:00
Dr. Stephen Henson
c341b9cce5
add va_list version of ERR_add_error_data
2011-01-14 15:13:59 +00:00
Dr. Stephen Henson
bbbf0d45ba
stop warning with no-engine
2011-01-13 15:42:47 +00:00
Richard Levitte
114c402d9e
PR: 2425
...
Synchronise VMS build with Unixly build.
2011-01-10 20:55:27 +00:00
Dr. Stephen Henson
d51519eba4
add buf_str.c file
2011-01-09 13:30:58 +00:00
Dr. Stephen Henson
e650f9988b
move some string utilities to buf_str.c to reduce some dependencies (from 0.9.8 branch).
2011-01-09 13:30:34 +00:00
Dr. Stephen Henson
8ed8454115
add X9.31 prime generation routines from 0.9.8 branch
2011-01-09 13:22:47 +00:00
Richard Levitte
6e101bebb1
PR: 2407
...
Fix fault include.
Submitted by Arpadffy Zoltan <Zoltan.Arpadffy@scientificgames.se >
2011-01-06 20:56:04 +00:00
Dr. Stephen Henson
4577b38d22
Don't use decryption_failed alert for TLS v1.1 or later.
2011-01-04 19:39:42 +00:00
Dr. Stephen Henson
a8515e2d28
Since DTLS 1.0 is based on TLS 1.1 we should never return a decryption_failed
...
alert.
2011-01-04 19:33:30 +00:00
Dr. Stephen Henson
964e91052e
oops missed an assert
2011-01-03 12:52:11 +00:00
Dr. Stephen Henson
4e55e69bff
PR: 2411
...
Submitted by: Rob Austein <sra@hactrn.net >
Reviewed by: steve
Fix corner cases in RFC3779 code.
2011-01-03 01:40:45 +00:00
Dr. Stephen Henson
e501dbb658
Fix escaping code for string printing. If *any* escaping is enabled we
...
must escape the escape character itself (backslash).
2011-01-03 01:30:58 +00:00
Dr. Stephen Henson
20e505e4b7
PR: 2410
...
Submitted by: Rob Austein <sra@hactrn.net >
Reviewed by: steve
Use OPENSSL_assert() instead of assert().
2011-01-03 01:22:27 +00:00
Dr. Stephen Henson
291a26e6e3
PR: 2413
...
Submitted by: Michael Bergandi <mbergandi@gmail.com >
Reviewed by: steve
Fix typo in crypto/bio/bss_dgram.c
2011-01-03 01:07:20 +00:00
Dr. Stephen Henson
0383911887
PR: 2416
...
Submitted by: Mark Phalan <mark.phalan@oracle.com >
Reviewed by: steve
Use L suffix in version number.
2011-01-03 00:26:21 +00:00
Richard Levitte
a5c5eb77b5
Part of the IF structure didn't get pasted here...
...
PR: 2393
2010-12-14 21:44:33 +00:00
Richard Levitte
90d02be7c5
First attempt at adding the possibility to set the pointer size for the builds on VMS.
...
PR: 2393
2010-12-14 19:18:58 +00:00
Andy Polyakov
04221983ac
bss_file.c: refine UTF8 logic [from HEAD].
...
PR: 2382
2010-12-11 14:54:48 +00:00
Dr. Stephen Henson
dfda027ae8
ignore leading null fields
2010-12-03 19:31:23 +00:00
Dr. Stephen Henson
21b5a79121
update FAQ
2010-12-02 19:56:03 +00:00
Dr. Stephen Henson
411a388c62
PR: 2386
...
Submitted by: Stefan Birrer <stefan.birrer@adnovum.ch >
Reviewed by: steve
Correct SKM_ASN1_SET_OF_d2i macro.
2010-12-02 18:02:14 +00:00
Dr. Stephen Henson
61c10d42f6
fix doc typos
2010-12-02 13:45:25 +00:00
Dr. Stephen Henson
68ecfb69a5
use consistent FAQ between version
2010-12-02 00:11:21 +00:00
Andy Polyakov
e62fee8eb3
Configure: make -mno-cygwin optional on mingw platforms [from HEAD].
...
PR: 2381
2010-11-30 22:18:46 +00:00
Dr. Stephen Henson
5566d49103
PR: 2385
...
Submitted by: Stefan Birrer <stefan.birrer@adnovum.ch >
Reviewed by: steve
Zero key->pkey.ptr after it is freed so the structure can be reused.
2010-11-30 19:45:31 +00:00
Richard Levitte
48337a4a35
Better method for creating SSLROOT:.
...
Make sure to include the path to evptest.txt.
2010-11-29 22:27:18 +00:00
Dr. Stephen Henson
2c5c4fca14
apply J-PKAKE fix to HEAD (original by Ben)
2010-11-29 18:33:28 +00:00
Dr. Stephen Henson
4fab95ed20
Some of the MS_STATIC use in crypto/evp is a legacy from the days when
...
EVP_MD_CTX was much larger: it isn't needed anymore.
2010-11-27 17:35:56 +00:00
Dr. Stephen Henson
6c36ca4628
PR: 2240
...
Submitted by: Jack Lloyd <lloyd@randombit.net >, "Mounir IDRASSI" <mounir.idrassi@idrix.net >, steve
Reviewed by: steve
As required by RFC4492 an absent supported points format by a server is
not an error: it should be treated as equivalent to an extension only
containing uncompressed.
2010-11-25 12:27:39 +00:00
Dr. Stephen Henson
9c61c57896
using_ecc doesn't just apply to TLSv1
2010-11-25 11:51:46 +00:00
Dr. Stephen Henson
a618011ca1
add "missing" functions to copy EVP_PKEY_METHOD and examine info
2010-11-24 16:07:45 +00:00
Dr. Stephen Henson
95eef4df79
use generalised mac API for SSL key generation
2010-11-24 13:17:48 +00:00
Dr. Stephen Henson
ec1e714ac1
constify EVP_PKEY_new_mac_key()
2010-11-24 13:14:03 +00:00
Andy Polyakov
736d658080
INSTALL.W32: document trouble with symlinks under MSYS [from HEAD].
...
PR: 2377
2010-11-23 23:01:22 +00:00
Richard Levitte
aa2920584e
Implement bc test strategy as submitted by Steven M. Schweda <sms@antinode.info>.
...
Make sure we move to '__here' before trying to use it to build local sslroot:
2010-11-23 02:12:14 +00:00
Richard Levitte
9d13bfc258
Print openssl version information at the end of the tests
2010-11-23 01:06:13 +00:00
Richard Levitte
e43633011c
Give the architecture dependent directory higher priority
2010-11-23 01:05:32 +00:00
Richard Levitte
97027f7fb3
Don't define an empty CFLAGS, it's much more honest not to defined it at all.
...
Make sure to remove any [.CRYTO]BUILDINF.H so it doesn't get used instead of
[.CRYPTO._''ARCH'BUILDINF.H
2010-11-23 01:04:07 +00:00
Richard Levitte
bf5adc9be4
* tests.com: Add the symbol openssl_conf, so the openssl application
...
stops complaining about a missing configuration file. Define the logical
name PERL_ENV_TABLES with values to Perl considers the DCL symbol table
as part of the environment (see 'man perlvms' for details), so cms-test.pl
can get the value of EXE_DIR from tests.com, among others.
* cms-test.pl: Make changes to have it work on VMS as well. Upper or mixed
case options need to be quoted and the openssl command needs a VMS-specific
treatment. It all should work properly on Unix, I hope it does on Windows
as well...
2010-11-22 23:42:48 +00:00
Andy Polyakov
7665b436f0
s390x.S: fix typo in bn_mul_words [from HEAD].
...
PR: 2380
2010-11-22 21:57:29 +00:00
Dr. Stephen Henson
ffca7b85c2
PR: 2376
...
Submitted by: Guenter <lists@gknw.net >
Reviewed by: steve
Cleanup alloca use, fix Win32 target for OpenWatcom.
2010-11-19 00:11:44 +00:00
Dr. Stephen Henson
eef2fa00d9
PR: 2375
...
Submitted by: Guenter <lists@gknw.net >
Reviewed by: steve
cleanup/fix e_aep.c for OpenWatcom
2010-11-18 22:59:53 +00:00
Dr. Stephen Henson
c55551ad7c
PR: 2374
...
Submitted by: Guenter <lists@gknw.net >
Reviewed by: steve
Don't compile capi ENGINE on mingw32
2010-11-18 22:56:53 +00:00
Richard Levitte
c91b521111
Tell the user what test is being performed.
2010-11-18 22:46:55 +00:00
Richard Levitte
deb35e3e2c
Make sure the source directory for ASN1TEST is defined.
2010-11-18 22:45:29 +00:00
Richard Levitte
5e2d3c9ec1
We expect these scripts not to bail on error, so make sure that's what happens.
2010-11-18 22:31:01 +00:00
Richard Levitte
dda454434b
Synchronise with Unix tests
2010-11-18 22:24:22 +00:00
Richard Levitte
b97d371ce0
We redid the structure on architecture dependent source files, but
...
apparently forgot to adapt the copying to the installation directory.
2010-11-18 20:02:54 +00:00
Dr. Stephen Henson
a25c98ac73
remove duplicate statement
2010-11-18 17:33:44 +00:00
Dr. Stephen Henson
fd47013111
add ACKNOWLEDGEMENTS file to 1.0.1 branch
2010-11-18 17:26:51 +00:00
Dr. Stephen Henson
b3aa469c21
compile cts128.c on VMS
2010-11-18 17:04:37 +00:00
Dr. Stephen Henson
981c0de27a
fix no SIGALRM case in speed.c
2010-11-18 13:22:42 +00:00
Dr. Stephen Henson
1bfe9acbbf
PR: 2372
...
Submitted by: "W.C.A. Wijngaards" <wouter@nlnetlabs.nl >
Reviewed by: steve
Fix OpenBSD compilation failure.
2010-11-18 12:29:38 +00:00
Dr. Stephen Henson
2d1e9ce753
oops, reinstate TLSv1 string
2010-11-17 18:16:57 +00:00
Dr. Stephen Henson
19043426b9
backport AES EVP ctr mode changes from HEAD
2010-11-17 17:46:23 +00:00
Dr. Stephen Henson
6e21ce592e
fix CVE-2010-3864
2010-11-17 17:36:29 +00:00
Dr. Stephen Henson
975c6efbe4
sync OIDs with HEAD
2010-11-17 17:26:10 +00:00
Dr. Stephen Henson
972491aece
If EVP_PKEY structure contains an ENGINE the key is ENGINE specific and
...
we should use its method instead of any generic one.
2010-11-16 12:11:31 +00:00
Dr. Stephen Henson
1a8ecda3ee
Only use explicit IV if cipher is in CBC mode.
2010-11-14 17:47:21 +00:00
Dr. Stephen Henson
d36c7b618d
Get correct GOST private key instead of just assuming the last one is
...
correct: this isn't always true if we have more than one certificate.
2010-11-14 13:50:42 +00:00
Dr. Stephen Henson
251431ff4f
add TLS v1.1 options to s_server
2010-11-13 12:44:17 +00:00
Dr. Stephen Henson
1a3052793e
Submitted By: Bogdan Harjoc <harjoc@gmail.com>
...
Add missing debug WIN64 targets.
2010-11-11 15:23:32 +00:00
Dr. Stephen Henson
84fbc56fd0
PR: 2366
...
Submitted by: Damien Miller <djm@mindrot.org >
Reviewed by: steve
Stop pkeyutl crashing if some arguments are missing. Also make str2fmt
tolerate NULL parameter.
2010-11-11 14:42:34 +00:00
Dr. Stephen Henson
4444ff7632
Submitted by: Jonathan Dixon <joth@chromium.org>
...
Reviewed by: steve
If store is NULL set flags correctly.
2010-11-02 15:58:05 +00:00
Dr. Stephen Henson
7770da4b41
PR: 2295
...
Submitted by: Alexei Khlebnikov <alexei.khlebnikov@opera.com >
Reviewed by: steve
OOM checking. Leak in OOM fix. Fall-through comment. Duplicate code
elimination.
2010-10-11 23:25:23 +00:00
Andy Polyakov
7202a4d42b
x86_64-xlate.pl: fix LNK4078 and LNK4210 link warnings [from HEAD].
...
PR: 2356
2010-10-10 21:12:18 +00:00
Dr. Stephen Henson
3fa29765fd
PR: 2314
...
Submitted by: Mounir IDRASSI <mounir.idrassi@idrix.net >
Reviewed by: steve
Fix for double free bug in ssl/s3_clnt.c CVE-2010-2939
2010-10-10 12:27:19 +00:00
Dr. Stephen Henson
b9e468c163
We can't always read 6 bytes in an OCSP response: fix so error statuses
...
are read correctly for non-blocking I/O.
2010-10-06 18:01:14 +00:00
Dr. Stephen Henson
0172ad2902
Minor documentation fixes, PR#2345
2010-10-04 13:28:27 +00:00
Dr. Stephen Henson
d9aa352ff0
Minor documentation fixes, PR#2344
2010-10-04 13:24:07 +00:00
Dr. Stephen Henson
945ba0300d
Add call to ENGINE_register_all_complete() to ENGINE_load_builtin_engines(),
...
this means that some implementations will be used automatically, e.g. aesni,
we do this for cryptodev anyway.
Setup cpuid in ENGINE_load_builtin_engines() too as some ENGINEs use it.
2010-10-03 18:56:25 +00:00
Andy Polyakov
9e15cc606e
Alpha assembler pack: adapt for Linux [from HEAD].
...
PR: 2335
2010-09-13 20:32:53 +00:00
Andy Polyakov
e011160f3c
VC-32.pl: default to nasm if neither nasm or nasmw is is found at the moment [from HEAD].
...
PR: 2338
2010-09-13 16:29:00 +00:00
Andy Polyakov
9447da5065
crypto/bn/asm/s390x.S: drop redundant instructions [from HEAD].
2010-09-10 14:55:34 +00:00
Andy Polyakov
387ed39f6d
sparcv9cap.c: disengange Solaris-specific CPU detection routine in favour
...
of unified procedure relying on SIGILL [from HEAD].
PR: 2321
2010-09-05 19:48:19 +00:00
Dr. Stephen Henson
e50e5f9336
make no-gost work on Windows
2010-09-02 17:23:58 +00:00
Dr. Stephen Henson
6f0d9950f3
fix bug in AES_unwrap()
2010-08-30 23:58:47 +00:00
Bodo Möller
4705ff7d6d
More C language police work.
2010-08-27 13:17:58 +00:00
Dr. Stephen Henson
36778eb231
PR: 1833
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix other cases not covered by original patch. (correct patch this time!)
2010-08-27 12:12:07 +00:00
Dr. Stephen Henson
c6dd154b3e
oops, revert previous patch
2010-08-27 12:10:12 +00:00
Bodo Möller
74b5feea7b
C conformity fixes: Move declarations before statements in all blocks.
2010-08-27 12:07:12 +00:00
Dr. Stephen Henson
35cae95032
PR: 1833
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix other cases not covered by original patch.
2010-08-27 11:57:42 +00:00
Bodo Möller
11a36aa96f
C conformity fixes:
...
- Move declarations before statements in all blocks.
- Where 64-bit type is required, use it explicitly (not 1l).
2010-08-27 11:29:09 +00:00
Bodo Möller
9b0e97ae10
Update version numbers
2010-08-26 18:45:21 +00:00
Bodo Möller
02ba02604c
Patch from PR #1833 was broken: there's no s->s3->new_session
...
(only s->new_session).
2010-08-26 14:54:18 +00:00
Bodo Möller
42ecf418f5
(formatting error)
2010-08-26 14:38:49 +00:00
Bodo Möller
48ce525d16
New 64-bit optimized implementation EC_GFp_nistp224_method().
...
Binary compatibility is not affected as this will only be
compiled in if explicitly requested (#ifdef EC_NISTP224_64_GCC_128).
Submitted by: Emilia Kasper (Google)
2010-08-26 14:29:27 +00:00
Dr. Stephen Henson
3081e2ca73
update ordinals
2010-08-26 14:25:53 +00:00
Dr. Stephen Henson
48ae85b6ff
PR: 1833
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Support for abbreviated handshakes when renegotiating.
2010-08-26 14:22:40 +00:00
Bodo Möller
82281ce47d
ECC library bugfixes.
...
Submitted by: Emilia Kapser (Google)
2010-08-26 12:10:57 +00:00
Bodo Möller
4ecd2bafbb
Harmonize with OpenSSL_1_0_0-stable version of CHANGES.
2010-08-26 11:21:49 +00:00
Andy Polyakov
308b9ad8f0
util/cygwin.sh: maintainer's update [from HEAD].
...
Submitted by: Corinna Vinschen
2010-08-24 21:52:15 +00:00
Andy Polyakov
73b408c242
engine/Makefile: harmonize engine install rule for .dylib extension on MacOS X [from HEAD].
...
PR: 2319
2010-08-24 21:46:58 +00:00
Andy Polyakov
51c9eb321a
Makefile.shared: fix brown-bag typo in link_o.darwin [from HEAD].
...
PR: 2319
2010-08-21 11:37:17 +00:00
Andy Polyakov
1657fca2f4
sha1-armv4-large.pl: reschedule instructions for dual-issue pipeline [from HEAD]
...
.
2010-08-03 15:36:52 +00:00
Andy Polyakov
0d25aad90d
Make inline assembler clang-friendly [from HEAD].
2010-08-02 21:54:48 +00:00
Andy Polyakov
b8c1cb1c2c
alphacpuid.pl: fix brown-bag bug [from HEAD].
2010-07-28 08:18:46 +00:00
Andy Polyakov
6e1d44fd56
Replace alphacpuid.s with alphacpuid.pl to ensure it makes to release tar-balls [from HEAD].
...
PR: 2309
2010-07-26 22:11:23 +00:00
Dr. Stephen Henson
528ff4b451
Add modes.h to mkdef.pl, update ordinals.
2010-07-25 17:48:35 +00:00
Dr. Stephen Henson
f6c29ba3dc
Fix WIN32 build system to correctly link ENGINE DLLs contained in a
...
directory: currently the GOST ENGINE is the only case.
2010-07-24 17:55:47 +00:00
Dr. Stephen Henson
160f9b5bf6
Add call to ENGINE_register_all_complete() to ENGINE_load_builtin_engines(),
...
this means that some implementations will be used automatically, e.g. aesni,
we do this for cryptodev anyway.
Setup cpuid in ENGINE_load_builtin_engines() too as some ENGINEs use it.
2010-07-21 16:23:59 +00:00
Dr. Stephen Henson
53e7985c8d
PR: 1830
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >, Steve Henson
Support for RFC5705 key extractor.
2010-07-18 17:39:46 +00:00
Andy Polyakov
9102342795
Configure: suppress $multilib with non-system $prefix [from HEAD].
...
PR: 2307
2010-07-16 08:14:11 +00:00
Andy Polyakov
c4488936b2
Makefile.shared: update link_o.darwin rule [from HEAD].
...
PR: 2306
2010-07-16 08:11:43 +00:00
Andy Polyakov
4e2b990734
ARM assembler pack: reschedule instructions for dual-issue pipeline [from HEAD].
...
Modest improvement coefficients mean that code already had some
parallelism and there was not very much room for improvement. Special
thanks to Ted Krovetz for benchmarking the code with such patience.
2010-07-13 14:08:22 +00:00
Dr. Stephen Henson
6ca1418587
PR: 2297
...
Submitted by: Antony, Benoy <bantony@ebay.com >
Approved by: steve@openssl.org
Fix bug in AES wrap code when t > 0xff.
2010-07-09 17:25:46 +00:00
Andy Polyakov
30dd06812e
INSTALL.W32: mention _OPENSSL_isservice() [from HEAD].
...
PR: 2194
2010-07-09 14:32:22 +00:00
Andy Polyakov
b29b89ef21
rand_nw.c: compensate for gcc bug (using %edx instead of %eax at -O3)
...
[from HEAD].
PR: 2296
2010-07-08 09:15:49 +00:00
Andy Polyakov
81ae27d56a
PROBLEMS: MacOS X is not necessarily a problem anymore [from HEAD].
2010-07-08 09:02:22 +00:00
Andy Polyakov
f90bf72280
sparcv9cap.c: reiterate CPU detection logic [from HEAD].
2010-07-08 07:52:36 +00:00
Dr. Stephen Henson
abcf7aa591
crypto/sparc*: elininate _sparcv9_rdwrasi [from HEAD], original from Andy.
2010-07-05 22:22:22 +00:00
Dr. Stephen Henson
40b6d49387
SPARCv9 assembler pack: refine CPU detection on Linux, fix for "unaligned
...
opcodes detected in executable segment" error [from HEAD], original from Andy.
2010-07-05 22:20:36 +00:00
Dr. Stephen Henson
497b4f92d2
i variable is used on some platforms
2010-07-05 11:03:50 +00:00
Dr. Stephen Henson
28566b4966
no need for empty fragments with TLS 1.1 and later due to explicit IV
2010-06-27 14:42:43 +00:00
Dr. Stephen Henson
b4b15f68c0
Backport TLS v1.1 support from HEAD, ssl/ changes
2010-06-27 14:22:11 +00:00
Dr. Stephen Henson
1eb1cf452b
Backport TLS v1.1 support from HEAD
2010-06-27 14:15:02 +00:00
Dr. Stephen Henson
c549810def
update versions for 1.0.1
2010-06-16 13:48:00 +00:00
cvs2svn
0d0ed9187a
This commit was manufactured by cvs2svn to create branch
...
'OpenSSL_1_0_1-stable'.
2010-06-16 13:37:23 +00:00
Dr. Stephen Henson
dfa81d9efb
update README, fix opensslv.h
2010-06-16 13:37:22 +00:00
Dr. Stephen Henson
1dba06e7b0
update for next version
2010-06-16 13:34:33 +00:00
Dr. Stephen Henson
daac87be95
clarify comment
2010-06-16 13:17:22 +00:00
Dr. Stephen Henson
e97359435e
Fix warnings (From HEAD, original patch by Ben).
2010-06-15 17:25:15 +00:00
Andy Polyakov
afce9bcca1
VC-32.pl: fix /Fd name generation [from HEAD].
...
PR: 2284
2010-06-09 15:49:09 +00:00
Dr. Stephen Henson
9c7baca820
prepare for release
2010-06-01 13:31:38 +00:00
Dr. Stephen Henson
618265e645
Fix CVE-2010-1633 and CVE-2010-0742.
2010-06-01 13:17:06 +00:00
Andy Polyakov
9728978b75
VC-32.pl: unconditionally generate symbols.pdb [from HEAD].
2010-06-01 06:03:20 +00:00
Andy Polyakov
938c0bbae1
x86_64-xlate.pl: updates from HEAD.
2010-06-01 05:57:26 +00:00
Andy Polyakov
a0cd818831
Configure: update mingw config-lines [from HEAD].
2010-06-01 05:53:35 +00:00
Dr. Stephen Henson
31c4ab5401
fix PR#2261 in a different way
2010-05-31 13:18:08 +00:00
Dr. Stephen Henson
1f65529824
PR: 2278
...
Submitted By: Mattias Ellert <mattias.ellert@fysast.uu.se >
Fix type checking macro SKM_ASN1_SET_OF_i2d
2010-05-29 12:49:48 +00:00
Dr. Stephen Henson
5b3a6eedd1
update NEWS
2010-05-27 15:05:01 +00:00
Dr. Stephen Henson
6938440d68
PR: 2262
...
Submitted By: Victor Wagner <vitus@cryptocom.ru >
Fix error reporting in load_key function.
2010-05-27 14:09:13 +00:00
Dr. Stephen Henson
57ec6c9bad
PR: 2261
...
Submitted By: De Rudder, Stephen L." <s_derudder@tditx.com >
Workaround for newer Windows headers which define EADDRINUSE but not to the
same value as WSAEADDRINUSE.
2010-05-27 13:07:45 +00:00
Dr. Stephen Henson
7a09bc4068
PR: 2258
...
Submitted By: Ger Hobbelt <ger@hobbelt.com >
Base64 BIO fixes:
Use OPENSSL_assert() instead of assert().
Use memmove() as buffers overlap.
Fix write retry logic.
2010-05-27 12:41:20 +00:00
Dr. Stephen Henson
deb15645a8
PR: 2266
...
Submitted By: Jonathan Gray <jsg@goblin.cx >
Correct ioctl definitions.
2010-05-26 23:23:44 +00:00
Dr. Stephen Henson
f0b358e8b9
Avoid use of ex_data free function in Chil ENGINE so it can be safely
...
reloaded.
2010-05-26 16:17:06 +00:00
Dr. Stephen Henson
dce2b5a8fc
PR: 2254
...
Submitted by: Ger Hobbelt <ger@hobbelt.com >
Approved by: steve@openssl.org
Check for <= 0 i2d return value.
2010-05-22 00:40:58 +00:00
Dr. Stephen Henson
59d100d959
PR: 2251
...
Submitted by: Ger Hobbelt <ger@hobbelt.com >
Approved by: steve@openssl.org
Memleak, BIO chain leak and realloc checks in v3_pci.c
2010-05-22 00:31:02 +00:00
Dr. Stephen Henson
d497b5362b
oops, typo
2010-05-20 17:35:37 +00:00
Dr. Stephen Henson
369b0abdc2
Update cms-test.pl to handle some Unix like Windows environments where
...
calling shlib_wrap.sh doesn't work.
2010-05-20 17:28:51 +00:00
Dr. Stephen Henson
72240ab31a
PR: 2259
...
Submitted By: Artem Chuprina <ran@cryptocom.ru >
Check return values of HMAC in tls_P_hash and tls1_generate_key_block.
Although the previous version could in theory crash that would only happen if a
digest call failed. The standard software methods can never fail and only one
ENGINE currently uses digests and it is not compiled in by default.
2010-05-17 11:26:56 +00:00
Dr. Stephen Henson
dc4e1ddc9f
PR: 2253
...
Submitted By: Ger Hobbelt <ger@hobbelt.com >
Check callback return value when outputting errors.
2010-05-15 00:36:12 +00:00
Dr. Stephen Henson
ff656346fa
PR: 2255
...
Submitted By: Ger Hobbelt <ger@hobbelt.com >
Place RSA dependent variable under #ifndef OPENSSL_NO_RSA
2010-05-15 00:19:57 +00:00
Dr. Stephen Henson
ca91057d50
PR: 2252
...
Submitted By: Ger Hobbelt <ger@hobbelt.com >
Update docs to BIO_f_buffer()
2010-05-03 15:29:51 +00:00
Dr. Stephen Henson
8c1e7de6cb
PR: 2230
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix bug in bitmask macros and stop warnings.
2010-05-03 13:01:50 +00:00
Dr. Stephen Henson
207886cd3a
PR: 2244
...
Submitted By: "PMHager" <hager@dortmund.net >
Initialise pkey callback to 0.
2010-05-03 12:50:52 +00:00
Andy Polyakov
336d1ee733
bss_file.c: reserve for option to encode file name in UTF-8 on Windows
...
[from HEAD].
2010-04-28 20:04:37 +00:00
Andy Polyakov
bed2b769f5
md5-ia64.S: fix assembler warning [from HEAD].
2010-04-20 20:41:23 +00:00
Dr. Stephen Henson
26029d9c4c
PR: 2241
...
Submitted By: Artemy Lebedev <vagran.ast@gmail.com >
Typo.
2010-04-20 12:53:05 +00:00
Dr. Stephen Henson
c64c888929
oops, commit Configure part of PR#2234
2010-04-15 13:17:05 +00:00
Dr. Stephen Henson
8d9db41880
PR: 2234
...
Submitted By: Matthias Andree <matthias.andree@gmx.de >
Use correct path to openssl utility in c_rehash script.
2010-04-14 23:07:28 +00:00
Dr. Stephen Henson
4fae54a8e0
PR: 2235
...
Submitted By: Bruce Stephens <bruce.stephens@isode.com >
Make ts/Makefile consistent with other Makefiles.
2010-04-14 23:04:19 +00:00
Andy Polyakov
9f35928719
x86_64cpuid.pl: ml64 is allergic to db on label line [from HEAD].
2010-04-14 19:25:09 +00:00
Dr. Stephen Henson
c5af032df5
update FAQ
2010-04-14 13:20:53 +00:00
Andy Polyakov
8a898a6fcc
[co]cf128.c: fix "n=0" bug [from HEAD].
2010-04-14 07:47:53 +00:00
Dr. Stephen Henson
9f827ded1c
fix signed/unsigned comparison warnings
2010-04-14 00:41:01 +00:00
Dr. Stephen Henson
5daa9411a0
fix bug in ccgost CFB mode code
2010-04-14 00:33:22 +00:00
Dr. Stephen Henson
094d4019b8
check ASN1 type before using it
2010-04-14 00:30:12 +00:00
Dr. Stephen Henson
1507f3abba
PR: 2230
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix various DTLS fragment reassembly bugs.
2010-04-14 00:17:29 +00:00
Dr. Stephen Henson
30e8defe52
PR: 2229
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Don't drop DTLS connection if mac or decryption failed.
2010-04-14 00:09:55 +00:00
Dr. Stephen Henson
9f4dd3e3e3
PR: 2228
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix DTLS buffer record MAC failure bug.
2010-04-14 00:03:13 +00:00
Dr. Stephen Henson
8c00014d7e
make update
2010-04-13 17:08:50 +00:00
Richard Levitte
1cf12a6350
No need to look for the file if none was entered.
2010-04-13 14:39:58 +00:00
Richard Levitte
dc9461e23f
A few more things that aren't built on VAX
2010-04-13 14:39:08 +00:00
Richard Levitte
72d57050df
Since test modules aren't copied to the test/ directory any more on
...
VMS, we need to rework this script with knowledge of where they are.
2010-04-13 14:38:39 +00:00
Richard Levitte
49d1f665a4
Rework the way engines are built
2010-04-13 14:37:43 +00:00
Richard Levitte
2c25edc4c1
Too long symbols
2010-04-13 14:36:58 +00:00
Richard Levitte
d2f098b33d
Spelling
2010-04-13 14:34:48 +00:00
Richard Levitte
6f4f7f35f3
Rework the configuration of avoided algorithms.
...
Avoid copying test modules.
2010-04-13 14:33:04 +00:00
Richard Levitte
0a4fe6c8db
Undo the previous change, it was incorrect in this branch.
2010-04-13 11:10:07 +00:00
Richard Levitte
7bba401d5d
Third argument to dtls1_buffer_record is by reference
2010-04-13 08:41:58 +00:00
Andy Polyakov
c73cff12f1
aes-ppc.pl: 10% performance improvement on Power6 [from HEAD].
2010-04-10 14:54:34 +00:00
Andy Polyakov
b32d93840e
cryptlib.c: allow application to override OPENSSL_isservice [from HEAD].
2010-04-10 14:13:12 +00:00
Andy Polyakov
cb457849fd
ctr129.c: fix typo, simplify ctr128_inc and fix "n=0" bug [from HEAD].
2010-04-10 13:47:11 +00:00
Andy Polyakov
cb3c30059a
darwin-ppc-cc: add -Wa,-force_cpusubtype_ALL to produce binaries not
...
specific to G5. This was already added to HEAD earlier.
PR: 2231
2010-04-10 13:41:58 +00:00
Andy Polyakov
20dc93e49e
sparccpuid.S: some assembler is allergic to apostrophes in comments [from HEAD].
2010-04-10 13:37:06 +00:00
Andy Polyakov
b620447dcc
alpha-mont.pl: comply with stack alignment requirement [from HEAD].
2010-04-10 13:33:46 +00:00
Dr. Stephen Henson
4ffd2ad1d3
make GOST MAC work again
2010-04-08 10:54:54 +00:00
Dr. Stephen Henson
acc9938ba5
Add SHA2 algorithms to SSL_library_init(). Although these aren't used
...
directly by SSL/TLS SHA2 certificates are becoming more common and
applications that only call SSL_library_init() and not
OpenSSL_add_all_alrgorithms() will fail when verifying certificates.
Update docs.
2010-04-07 13:18:30 +00:00
Dr. Stephen Henson
f6d13ac8cf
Remove obsolete PRNG note. Add comment about use of SHA256 et al.
2010-04-06 15:05:47 +00:00
Dr. Stephen Henson
24cb653c6b
PR: 2209
...
Submitted Daniel Mentz <danielml@sent.com >
Documentation typo.
2010-04-06 14:45:31 +00:00
Dr. Stephen Henson
6dfd3cf68e
PR: 2218
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fixes for DTLS replay bug.
2010-04-06 12:44:55 +00:00
Dr. Stephen Henson
073775cbbb
PR: 2219
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fixes for DTLS buffering bug.
2010-04-06 12:40:10 +00:00
Dr. Stephen Henson
e995d5044e
PR: 2223
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fixes for DTLS timeout bug
2010-04-06 12:29:21 +00:00
Dr. Stephen Henson
5b0a79a27a
PR: 2220
...
Fixes to make OpenSSL compile with no-rc4
2010-04-06 11:18:32 +00:00
Dr. Stephen Henson
6747de655e
updates for next release
2010-03-30 00:55:00 +00:00
Dr. Stephen Henson
91bad2b09e
Prepare for 1.0.0 release - finally ;-)
2010-03-29 13:11:54 +00:00
Andy Polyakov
1244d5b713
ARMv4 assembler: [unconfirmed] fix for compilation failure [from HEAD].
2010-03-29 09:59:58 +00:00
Andy Polyakov
c0ed5cd47b
dso_dlfcn.c: fix compile failure on Tru64 [from HEAD].
2010-03-29 09:50:33 +00:00
Dr. Stephen Henson
c8281fd38e
PR: 1696
...
Check return value if d2i_PBEPARAM().
2010-03-28 00:42:29 +00:00
Dr. Stephen Henson
fe8e6bff9b
PR: 1763
...
Remove useless num = 0 assignment.
Remove redundant cases on sock_ctrl(): default case handles them.
2010-03-27 23:28:23 +00:00
Dr. Stephen Henson
9caf25d144
PR: 1904
...
Submitted by: David Woodhouse <dwmw2@infradead.org >
Pass passphrase minimum length down to UI.
2010-03-27 19:27:51 +00:00
Dr. Stephen Henson
348620c7ac
PR: 1813
...
Submitted by: Torsten Hilbrich <torsten.hilbrich@secunet.com >
Fix memory leak when engine name cannot be loaded.
2010-03-27 18:28:13 +00:00
Dr. Stephen Henson
30fc2ab92b
update FAQ
2010-03-25 12:07:45 +00:00
Bodo Möller
5b5464d525
Fix for "Record of death" vulnerability CVE-2010-0740.
...
Also, add missing CHANGES entry for CVE-2009-3245 (code changes submitted to this branch on 23 Feb 2010).
2010-03-25 11:22:42 +00:00
Dr. Stephen Henson
cd15a0528f
initialise buf if wrong_info not used
2010-03-24 23:42:20 +00:00
Dr. Stephen Henson
7b52778eff
PR: 1731 and maybe 2197
...
Clear error queue in a few places in SSL code where errors are expected
so they don't stay in the queue.
2010-03-24 23:16:49 +00:00
Andy Polyakov
162de2f2b5
rand_win.c: fix logical bug in readscreen [from HEAD].
2010-03-22 22:44:35 +00:00
Andy Polyakov
f6e4af6fd7
bss_file.c: fix MSC 6.0 warning [from HEAD].
2010-03-22 22:39:46 +00:00
Andy Polyakov
32b76dcdac
e_capi.c: fix typo.
2010-03-15 22:29:20 +00:00
Andy Polyakov
bcfd252052
Fix UPLINK typo [from HEAD].
2010-03-15 22:26:33 +00:00
Dr. Stephen Henson
32c452779e
workaround for missing definition in some headers
2010-03-15 13:09:39 +00:00
Dr. Stephen Henson
118b90c59e
PR: 2192
...
Submitted By: Jaroslav Imrich <jaroslav.imrich@disig.sk >
The prompt_info and wrong_info parameters can be empty strings which
can produce confusing prompts. Treat empty string same as NULL.
2010-03-12 12:48:46 +00:00
Dr. Stephen Henson
f6a61b140e
missing goto meant signature was never printed out
2010-03-12 12:07:05 +00:00
Dr. Stephen Henson
75ece4b5cf
don't leave bogus errors in the queue
2010-03-10 13:48:21 +00:00
Dr. Stephen Henson
724cca4178
make update
2010-03-09 17:23:51 +00:00
Dr. Stephen Henson
5b3fdb0181
PR: 2188
...
Submitted By: Jaroslav Imrich <jaroslav.imrich@disig.sk >
Add "missing" functions to get and set prompt constructor.
2010-03-09 17:18:17 +00:00
Dr. Stephen Henson
fcc3d0265d
PR: 2186
...
Submitted By: "Joel Rabinovitch" <Joel.Rabinovitch@tecsys.com >
Detect aix64-gcc
2010-03-09 17:08:39 +00:00
Dr. Stephen Henson
5356ea7cde
reserve a few more bits for future cipher modes
2010-03-08 23:47:57 +00:00
Dr. Stephen Henson
06226df1a9
The OID sanity check was incorrect. It should only disallow *leading* 0x80
...
values.
2010-03-07 16:40:19 +00:00
Dr. Stephen Henson
bf638ef026
don't add digest alias if signature algorithm is undefined
2010-03-06 20:47:45 +00:00
Dr. Stephen Henson
07973d5db8
Fix memory leak: free up ENGINE functional reference if digest is not
...
found in an ENGINE.
2010-03-05 13:33:43 +00:00
Dr. Stephen Henson
3b3f71121b
PR: 2183
...
PR#1999 broke fork detection by assuming HAVE_FORK was set for all platforms.
Include original HAVE_FORK detection logic while allowing it to be
overridden on specific platforms with -DHAVE_FORK=1 or -DHAVE_FORK=0
2010-03-03 19:56:17 +00:00
Dr. Stephen Henson
47333a34d5
Submitted by: Tomas Hoger <thoger@redhat.com>
...
Fix for CVE-2010-0433 where some kerberos enabled versions of OpenSSL
could be crashed if the relevant tables were not present (e.g. chrooted).
2010-03-03 15:41:00 +00:00
Dr. Stephen Henson
d92138f703
don't mix definitions and code
2010-03-03 15:30:26 +00:00
Andy Polyakov
b2bf335327
Fix s390x-specific HOST_l2c|c2l [from HEAD].
...
Submitted by: Andreas Krebbel
2010-03-02 16:25:10 +00:00
Dr. Stephen Henson
33bec62a20
PR: 2178
...
Submitted by: "Kennedy, Brendan" <brendan.kennedy@intel.com >
Handle error codes correctly: cryptodev returns 0 for success whereas OpenSSL
returns 1.
2010-03-01 23:54:34 +00:00
Dr. Stephen Henson
2e630b1847
use supplied ENGINE in genrsa
2010-03-01 14:22:02 +00:00
Dr. Stephen Henson
002d3fe863
use correct prototype as in HEAD
2010-03-01 03:01:56 +00:00
Dr. Stephen Henson
fb24311e7c
'typo'
2010-03-01 01:52:47 +00:00
Dr. Stephen Henson
90278430d9
make USE_CRYPTODEV_DIGESTS work
2010-03-01 01:19:36 +00:00
Ben Laurie
bcd9d12a8d
Fix warning.
2010-02-28 13:38:16 +00:00
Dr. Stephen Henson
79363339b7
algorithms field has changed in 1.0.0 and later: update
2010-02-28 00:24:24 +00:00
Dr. Stephen Henson
fbe2c6b33e
Add Kerberos fix which was in 0.9.8-stable but never committed to HEAD and
...
1.0.0. Original fix was on 2007-Mar-09 and had the log message: "Fix kerberos
ciphersuite bugs introduced with PR:1336."
2010-02-27 23:04:10 +00:00
Dr. Stephen Henson
fc11f47229
Revert CFB block length change. Despite what SP800-38a says the input to
...
CFB mode does *not* have to be a multiple of the block length and several
other specifications (e.g. PKCS#11) do not require this.
2010-02-26 14:41:48 +00:00
Dr. Stephen Henson
2b23d89d14
oops, use correct date
2010-02-26 12:14:30 +00:00
Dr. Stephen Henson
9cfa3cff54
update FAQ, NEWS
2010-02-25 18:21:20 +00:00
Dr. Stephen Henson
6507653e72
The meaning of the X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY and
...
X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT error codes were reversed in
the verify application documentation.
2010-02-23 14:09:22 +00:00
Bodo Möller
7fe747d1eb
Always check bn_wexpend() return values for failure (CVE-2009-3245).
...
(The CHANGES entry covers the change from PR #2111 as well, submitted by
Martin Olsson.)
Submitted by: Neel Mehta
2010-02-23 10:36:30 +00:00
Bodo Möller
32567c9f3b
Fix X509_STORE locking
2010-02-19 18:26:23 +00:00
Dr. Stephen Henson
4f3d52fedc
clarify documentation
2010-02-18 12:41:50 +00:00
Dr. Stephen Henson
8321bab39c
OR default SSL_OP_LEGACY_SERVER_CONNECT so existing options are preserved
2010-02-17 19:43:46 +00:00
Dr. Stephen Henson
989238802a
Allow renegotiation if SSL_OP_LEGACY_SERVER_CONNECT is set as well as
...
initial connection to unpatched servers. There are no additional security
concerns in doing this as clients don't see renegotiation during an
attack anyway.
2010-02-17 18:38:10 +00:00
Dr. Stephen Henson
9051fc538f
PR: 2100
...
Submitted by: James Baker <jbaker@tableausoftware.com > et al.
Workaround for slow Heap32Next on some versions of Windows.
2010-02-17 14:32:25 +00:00
Dr. Stephen Henson
03fd7f27db
Submitted by: Dmitry Ivanov <vonami@gmail.com>
...
Don't leave dangling pointers in GOST engine if calls fail.
2010-02-16 14:30:19 +00:00
Dr. Stephen Henson
45d6a15ae9
PR: 2171
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Since SSLv2 doesn't support renegotiation at all don't reject it if
legacy renegotiation isn't enabled.
Also can now use SSL2 compatible client hello because RFC5746 supports it.
2010-02-16 14:20:40 +00:00
Dr. Stephen Henson
6c6ca18664
The "block length" for CFB mode was incorrectly coded as 1 all the time. It
...
should be the number of feedback bits expressed in bytes. For CFB1 mode set
this to 1 by rounding up to the nearest multiple of 8.
2010-02-15 19:40:30 +00:00
Dr. Stephen Henson
97fe2b40c1
Correct ECB mode EVP_CIPHER definition: IV length is 0
2010-02-15 19:25:52 +00:00
Dr. Stephen Henson
f689ab5017
add EVP_CIPH_FLAG_LENGTH_BITS from 0.9.8-stable
2010-02-15 19:17:55 +00:00
Dr. Stephen Henson
edb7cac271
PR: 2164
...
Submitted by: "Noszticzius, Istvan" <inoszticzius@rightnow.com >
Don't clear the output buffer: ciphers should correctly the same input
and output buffers.
2010-02-15 19:01:56 +00:00
Dr. Stephen Henson
81d87a2a28
update references to new RI RFC
2010-02-12 21:59:57 +00:00
Dr. Stephen Henson
7366f0b304
PR: 2170
...
Submitted by: Magnus Lilja <lilja.magnus@gmail.com >
Make -c option in dgst work again.
2010-02-12 17:07:24 +00:00
Dr. Stephen Henson
1d8fa09c80
Make assembly language versions of OPENSSL_cleanse() accept zero length
...
parameter. Backport from HEAD, orginal by appro.
2010-02-12 17:02:13 +00:00
Dr. Stephen Henson
e085e6c84c
Fix memory leak in ENGINE autoconfig code. Improve error logging.
2010-02-09 14:17:57 +00:00
Dr. Stephen Henson
008fa4584d
update year
2010-02-09 14:13:00 +00:00
Dr. Stephen Henson
c8c49133d9
oops, use new value for new flag
2010-02-07 13:54:54 +00:00
Dr. Stephen Henson
961f1dea06
make update
2010-02-07 13:47:08 +00:00
Dr. Stephen Henson
1700426256
Add missing function EVP_CIPHER_CTX_copy(). Current code uses memcpy() to copy
...
an EVP_CIPHER_CTX structure which may have problems with external ENGINEs
who need to duplicate internal handles etc.
2010-02-07 13:41:23 +00:00
Dr. Stephen Henson
aa7f5baad2
don't assume 0x is at start of string
2010-02-03 18:19:05 +00:00
Dr. Stephen Henson
45acdd6f6d
tolerate broken CMS/PKCS7 implementations using signature OID instead of digest
2010-02-02 14:26:32 +00:00
Dr. Stephen Henson
8b354e776b
PR: 2161
...
Submitted by: Doug Goldstein <cardoe@gentoo.org >, Steve.
Make no-dsa, no-ecdsa and no-rsa compile again.
2010-02-02 13:36:05 +00:00
Dr. Stephen Henson
868f5e44ca
PR: 2160
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Make session tickets work with DTLS.
2010-02-01 16:49:42 +00:00
Dr. Stephen Henson
4e5fdd11ea
PR: 2159
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Typo in PR#1949 bug, oops!
2010-02-01 12:44:11 +00:00
Richard Levitte
d552a3391a
Typo.
2010-01-29 12:07:50 +00:00
Richard Levitte
d023b4e2dd
The previous take went wrong, try again.
2010-01-29 12:02:54 +00:00
Richard Levitte
fa79cc9c23
Architecture specific header files need special handling.
2010-01-29 11:44:40 +00:00
Richard Levitte
06daa75fb9
If opensslconf.h and buildinf.h are to be in an architecture specific
...
directory, place it in the same tree as the other architecture
specific things.
2010-01-29 11:43:53 +00:00
Dr. Stephen Henson
ffa304c838
oops, revert more test code arghh!
2010-01-28 17:52:18 +00:00
Dr. Stephen Henson
df21765a3e
In engine_table_select() don't clear out entire error queue: just clear
...
out any we added using ERR_set_mark() and ERR_pop_to_mark() otherwise
errors from other sources (e.g. SSL library) can be wiped.
2010-01-28 17:50:23 +00:00
Dr. Stephen Henson
5a6ae115f8
reword RI description
2010-01-27 18:53:49 +00:00
Dr. Stephen Henson
5e5df40b9b
update documentation to reflect new renegotiation options
2010-01-27 17:50:20 +00:00
Dr. Stephen Henson
6d4943e81f
Some shells print out the directory name if CDPATH is set breaking the
...
pod2man test. Use ./util instead to avoid this.
2010-01-27 16:06:58 +00:00
Dr. Stephen Henson
57cffe901f
typo
2010-01-27 14:05:15 +00:00
Dr. Stephen Henson
a758f61793
PR: 2157
...
Submitted by: "Green, Paul" <Paul.Green@stratus.com >
Typo.
2010-01-27 12:55:52 +00:00
Richard Levitte
b3b35df2a2
Cosmetic changes, including changing a confusing example.
2010-01-27 09:18:05 +00:00
Richard Levitte
5ad50246fc
Apparently, test/testtsa.com was only half done
2010-01-27 01:19:12 +00:00
Richard Levitte
d89b895cfd
size_t doesn't compare less than zero...
2010-01-27 01:18:26 +00:00
Dr. Stephen Henson
d793c292cb
add CHANGES entry
2010-01-26 19:48:10 +00:00
Dr. Stephen Henson
57749b1b9f
PR: 1949
...
Submitted by: steve@openssl.org
More robust fix and workaround for PR#1949. Don't try to work out if there
is any write pending data as this can be unreliable: always flush.
2010-01-26 19:46:30 +00:00
Dr. Stephen Henson
1cdb7854a5
PR: 2138
...
Submitted by: Kevin Regan <k.regan@f5.com >
Clear stat structure if -DPURIFY is set to avoid problems on some
platforms which include unitialised fields.
2010-01-26 18:07:41 +00:00
Dr. Stephen Henson
704d33b347
Add flags functions which were added to 0.9.8 for fips but not 1.0.0 and
...
later.
2010-01-26 14:33:52 +00:00
Dr. Stephen Henson
b2a7515ee8
OPENSSL_isservice is now defined on all platforms not just WIN32
2010-01-26 13:58:49 +00:00
Dr. Stephen Henson
f4f2b52995
oops
2010-01-26 13:56:15 +00:00
Dr. Stephen Henson
c7d5edbf5e
export OPENSSL_isservice and make update
2010-01-26 13:55:33 +00:00
Dr. Stephen Henson
d8f07f1674
Typo
2010-01-26 12:29:48 +00:00
Dr. Stephen Henson
78bfb45b07
PR: 2149
...
Submitted by: Douglas Stebila <douglas@stebila.ca >
Fix wap OIDs.
2010-01-25 16:07:51 +00:00
Richard Levitte
6ad4d60555
There's really no need to use $ENV::HOME
2010-01-25 00:22:52 +00:00
Richard Levitte
2fad8aa209
Forgot to correct the definition of __arch in this file.
...
Submitted by Steven M. Schweda <sms@antinode.info >
2010-01-25 00:21:14 +00:00
Richard Levitte
74397d45b2
It seems like sslroot: needs to be defined for some tests to work.
...
Submitted by Steven M. Schweda <sms@antinode.info >
2010-01-25 00:20:32 +00:00
Richard Levitte
c8ca769d3b
Compile t1_reneg on VMS as well.
...
Submitted by Steven M. Schweda <sms@antinode.info >
2010-01-25 00:19:33 +00:00
Richard Levitte
25d42c17e3
A few more macros for long symbols.
...
Submitted by Steven M. Schweda <sms@antinode.info >
2010-01-25 00:18:31 +00:00
Dr. Stephen Henson
a377811f15
PR: 2153, 2125
...
Submitted by: steve@openssl.org
The original fix for PR#2125 broke compilation on some Unixware platforms:
revert and make conditional on VMS.
2010-01-24 16:57:38 +00:00
Dr. Stephen Henson
ef1b6b2cf2
The fix for PR#1949 unfortunately broke cases where the BIO_CTRL_WPENDING
...
ctrl is incorrectly implemented (e.g. some versions of Apache). As a workaround
call both BIO_CTRL_INFO and BIO_CTRL_WPENDING if it returns zero. This should
both address the original bug and retain compatibility with the old behaviour.
2010-01-24 13:54:07 +00:00
Dr. Stephen Henson
1699389a46
Tolerate PKCS#8 DSA format with negative private key.
2010-01-22 20:17:30 +00:00
Dr. Stephen Henson
ad8ee3d7d1
If legacy renegotiation is not permitted then send a fatal alert if a patched
...
server attempts to renegotiate with an unpatched client.
2010-01-22 18:49:19 +00:00
Dr. Stephen Henson
39f0a4d8e9
typo
2010-01-21 18:46:28 +00:00
Dr. Stephen Henson
15a9821cc2
fix comments
2010-01-21 01:17:45 +00:00
Dr. Stephen Henson
53e97e7433
update version for next beta if we have one...
2010-01-20 15:40:27 +00:00
Dr. Stephen Henson
bc0ecd202a
make update
2010-01-20 15:05:52 +00:00
Dr. Stephen Henson
b307daa23f
Prepare for beta5 release
2010-01-20 15:00:49 +00:00
Dr. Stephen Henson
4c95b1bfda
Update demo
2010-01-20 14:05:56 +00:00
Dr. Stephen Henson
9359fc5ff2
Support -L options in VC++ link.
2010-01-20 14:04:55 +00:00
Andy Polyakov
a238d7d1eb
rand_win.c: handel GetTickCount wrap-around [from HEAD].
2010-01-19 21:44:07 +00:00
Andy Polyakov
0e92313331
x86_64-xlate.pl: refine sign extension logic when handling lea [from HEAD].
...
PR: 2094,2095
2010-01-19 21:43:05 +00:00
Andy Polyakov
3e719c99f5
s390x assembler update: add support for run-time facility detection [from HEAD].
2010-01-19 21:40:58 +00:00
Dr. Stephen Henson
2a4d0dcb89
The use of NIDs in the password based encryption table can result in
...
algorithms not found when an application uses PKCS#12 and only calls
SSL_library_init() instead of OpenSSL_add_all_algorithms(). Simple
work around is to add the missing algorithm (40 bit RC2) in
SSL_library_init().
2010-01-19 19:55:47 +00:00
Dr. Stephen Henson
2e155fde39
PR: 2141
...
Submitted by: "NARUSE, Yui" <naruse@airemix.jp >
Remove non-ASCII comment which causes compilation errors on some versions
of VC++.
2010-01-19 19:28:03 +00:00
Dr. Stephen Henson
9a8c8cb22e
stop asn1test compilation producing link errors
2010-01-19 19:25:16 +00:00
Dr. Stephen Henson
04aa7441ab
PR: 2144
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Better fix for PR#2144
2010-01-19 19:11:21 +00:00
Dr. Stephen Henson
28dc54f6d9
Reverted patch for PR#2095. Addressed by Andy now in x86_64-xlate.pl
2010-01-17 16:58:56 +00:00
Dr. Stephen Henson
a1e1165200
PR: 2135
...
Submitted by: Mike Frysinger <vapier@gentoo.org >
Change missed references to lib to $(LIBDIR)
2010-01-16 20:06:10 +00:00
Dr. Stephen Henson
ddba003d5e
PR: 2144
...
Submitted by: steve@openssl.org
Fix DTLS connection so new_session is reset if we read second client hello:
new_session is used to detect renegotiation.
2010-01-16 19:45:59 +00:00
Dr. Stephen Henson
e59d9a34c9
PR: 2133
...
Submitted by: steve@openssl.org
Add missing DTLS state strings.
2010-01-16 19:20:38 +00:00
Ben Laurie
9e198c4bd0
Fix type-checking/casting issue.
2010-01-16 13:32:14 +00:00
Dr. Stephen Henson
7eceffbfef
convert to Unix EOL form
2010-01-15 15:26:32 +00:00
Dr. Stephen Henson
8043f01b13
PR: 2125
...
Submitted by: "Alon Bar-Lev" <alon.barlev@gmail.com >
Fix gcc-aix compilation issue.
2010-01-14 17:51:52 +00:00
Dr. Stephen Henson
41c0f68630
Fix version handling so it can cope with a major version >3.
...
Although it will be many years before TLS v2.0 or later appears old versions
of servers have a habit of hanging around for a considerable time so best
if we handle this properly now.
2010-01-13 19:08:29 +00:00
Dr. Stephen Henson
2c627637c5
Modify compression code so it avoids using ex_data free functions. This
...
stops applications that call CRYPTO_free_all_ex_data() prematurely leaking
memory.
2010-01-13 18:46:01 +00:00
Dr. Stephen Henson
58f4b3511e
update ordinals
2010-01-12 17:33:59 +00:00
Dr. Stephen Henson
93fac08ec3
PR: 2136
...
Submitted by: Willy Weisz <weisz@vcpc.univie.ac.at >
Add options to output hash using older algorithm compatible with OpenSSL
versions before 1.0.0
2010-01-12 17:27:11 +00:00
Dr. Stephen Henson
23c3bee970
make update
2010-01-12 01:59:11 +00:00
Dr. Stephen Henson
73ff97ad76
Simplify RI+SCSV logic:
...
1. Send SCSV is not renegotiating, never empty RI.
2. Send RI if renegotiating.
2010-01-07 19:05:03 +00:00
Andy Polyakov
0d8ffc2007
b_sock.c: bind/connect are picky about socket address length [from HEAD].
2010-01-07 13:15:39 +00:00
Andy Polyakov
a32f7fb832
sendto is reportedly picky about destination socket address length [from HEAD].
...
PR: 2114
Submitted by: Robin Seggelmann
2010-01-07 10:44:21 +00:00
Andy Polyakov
496cf69e40
Fix compilation on older Linux [from HEAD].
2010-01-06 21:25:22 +00:00
Dr. Stephen Henson
eb17330837
Updates to conform with draft-ietf-tls-renegotiation-03.txt:
...
1. Add provisional SCSV value.
2. Don't send SCSV and RI at same time.
3. Fatal error is SCSV received when renegotiating.
2010-01-06 17:37:38 +00:00
Dr. Stephen Henson
2708603bb4
ENGINE_load_capi() now exists on all platforms (but no op on non-WIN32)
2010-01-06 13:20:52 +00:00
Dr. Stephen Henson
e4f1cda7de
PR: 2102
...
Submitted by: John Fitzgibbon <john_fitzgibbon@yahoo.com >
Remove duplicate definitions.
2010-01-05 17:58:15 +00:00
Dr. Stephen Henson
4359b88bbe
Typo
2010-01-05 17:50:01 +00:00
Dr. Stephen Henson
c079fde3f7
PR: 2132
...
Submitted by: steve
Fix bundled pod2man.pl to handle alternative comment formats.
2010-01-05 17:33:09 +00:00
Dr. Stephen Henson
6e94156199
Remove tabs on blank lines: they produce warnings in pod2man
2010-01-05 17:17:20 +00:00
Dr. Stephen Henson
1f67a3a985
compress_meth should be unsigned
2010-01-05 16:46:39 +00:00
Dr. Stephen Henson
4cba294d79
Client side compression algorithm sanity checks: ensure old compression
...
algorithm matches current and give error if compression is disabled and
server requests it (shouldn't happen unless server is broken).
2010-01-01 14:39:51 +00:00
Dr. Stephen Henson
e642fd7a1c
Compression handling on session resume was badly broken: it always
...
used compression algorithms in client hello (a legacy from when
the compression algorithm wasn't serialized with SSL_SESSION).
2010-01-01 00:44:36 +00:00
Andy Polyakov
5448e6739c
b_sock.c: correct indirect calls on WinSock platforms [from HEAD].
...
PR: 2130
Submitted by: Eugeny Gostyukhin
2009-12-30 12:56:16 +00:00
Andy Polyakov
f0389d8d37
Adapt mingw config for newer mingw environment [from HEAD].
...
PR: 2113
2009-12-30 11:57:39 +00:00
Andy Polyakov
a5313cf360
sha512.c update for esoteric PPC platfrom(s) [from HEAD].
...
PR: 1998
2009-12-30 11:53:33 +00:00
Andy Polyakov
b26c45b033
Deploy multilib config-line parameter [from HEAD].
2009-12-29 10:46:46 +00:00
Dr. Stephen Henson
986093affa
Typo
2009-12-27 23:03:25 +00:00
Dr. Stephen Henson
f88e0acb0e
Update RI to match latest spec.
...
MCSV is now called SCSV.
Don't send SCSV if renegotiating.
Also note if RI is empty in debug messages.
2009-12-27 22:59:09 +00:00
Dr. Stephen Henson
aed461b431
Traditional Yuletide commit ;-)
...
Add Triple DES CFB1 and CFB8 to algorithm list and NID translation.
2009-12-25 14:12:24 +00:00
Bodo Möller
8bbd0e826c
Use properly local variables for thread-safety.
...
Submitted by: Martin Rex
2009-12-22 11:52:15 +00:00
Bodo Möller
40c45f86d4
Constify crypto/cast.
2009-12-22 11:45:59 +00:00
Bodo Möller
a0b7277724
Constify crypto/cast.
2009-12-22 10:58:01 +00:00
Dr. Stephen Henson
54bc369ad7
Alert to use is now defined in spec: update code
2009-12-17 15:42:43 +00:00
Dr. Stephen Henson
2d3855fc6e
PR: 2127
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Check for lookup failures in EVP_PBE_CipherInit().
2009-12-17 15:28:45 +00:00
Dr. Stephen Henson
1cd47f5f6e
Ooops revert stuff which shouldn't have been part of previous commit.
2009-12-16 20:33:11 +00:00
Dr. Stephen Henson
675564835c
New option to enable/disable connection to unpatched servers
2009-12-16 20:28:30 +00:00
Dr. Stephen Henson
2456cd58c4
Allow initial connection (but no renegoriation) to servers which don't support
...
RI.
Reorganise RI checking code and handle some missing cases.
2009-12-14 13:55:39 +00:00
Ben Laurie
43a107026d
Missing error code.
2009-12-12 15:57:53 +00:00
Ben Laurie
ef0498a00b
Use gcc 4.4.
2009-12-12 15:57:19 +00:00
Dr. Stephen Henson
f1784f2fd2
Move SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION out of SSL_OP_ALL
2009-12-11 00:20:58 +00:00
Dr. Stephen Henson
730f5752ff
clarify docs
2009-12-09 18:17:09 +00:00
Dr. Stephen Henson
a88c73b43a
Document option clearning functions.
...
Initial secure renegotiation documentation.
2009-12-09 18:00:52 +00:00
Dr. Stephen Henson
a6d204e241
Add patch to crypto/evp which didn't apply from PR#2124
2009-12-09 15:02:14 +00:00
Dr. Stephen Henson
941baf6641
Revert lhash patch for PR#2124
2009-12-09 15:00:20 +00:00
Dr. Stephen Henson
b41a614686
Check s3 is not NULL
2009-12-09 14:53:51 +00:00
Dr. Stephen Henson
aac751832a
PR: 2124
...
Submitted by: Jan Pechanec <Jan.Pechanec@Sun.COM >
Check for memory allocation failures.
2009-12-09 13:38:20 +00:00
Dr. Stephen Henson
52a08e90d1
Add ctrls to clear options and mode.
...
Change RI ctrl so it doesn't clash.
2009-12-09 13:25:38 +00:00
Dr. Stephen Henson
6b5f0458fe
Send no_renegotiation alert as required by spec.
2009-12-08 19:06:09 +00:00
Dr. Stephen Henson
b52a2738d4
Add ctrl and macro so we can determine if peer support secure renegotiation.
2009-12-08 13:42:32 +00:00
Dr. Stephen Henson
10f99d7b77
Add support for magic cipher suite value (MCSV). Make secure renegotiation
...
work in SSLv3: initial handshake has no extensions but includes MCSV, if
server indicates RI support then renegotiation handshakes include RI.
NB: current MCSV value is bogus for testing only, will be updated when we
have an official value.
Change mismatch alerts to handshake_failure as required by spec.
Also have some debugging fprintfs so we can clearly see what is going on
if OPENSSL_RI_DEBUG is set.
2009-12-08 13:15:12 +00:00
Dr. Stephen Henson
593222afe1
PR: 2121
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Add extension support to DTLS code mainly using existing implementation for
TLS.
2009-12-08 11:38:18 +00:00
Dr. Stephen Henson
7b1856e5a1
PR: 2111
...
Submitted by: Martin Olsson <molsson@opera.com >
Check for bn_wexpand errors in bn_mul.c
2009-12-02 15:28:05 +00:00
Dr. Stephen Henson
3d5d81bf39
Replace the broken SPKAC certification with the correct version.
2009-12-02 14:41:24 +00:00
Dr. Stephen Henson
50f06b46f4
Check it actually compiles this time ;-)
2009-12-02 14:25:55 +00:00
Dr. Stephen Henson
be6076c0ad
PR: 2120
...
Submitted by: steve@openssl.org
Initialize fields correctly if pem_str or info are NULL in EVP_PKEY_asn1_new().
2009-12-02 13:57:03 +00:00
Dr. Stephen Henson
6125e07d79
check DSA_sign() return value properly
2009-12-01 18:41:50 +00:00
Dr. Stephen Henson
d5b8c46499
PR: 2115
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Add Renegotiation extension to DTLS, fix DTLS ClientHello processing bug.
2009-12-01 17:41:42 +00:00
Dr. Stephen Henson
7805e23588
PR: 1432
...
Submitted by: "Andrzej Chmielowiec" <achmielowiec@enigma.com.pl >, steve@openssl.org
Approved by: steve@openssl.org
Truncate hash if it is too large: as required by FIPS 186-3.
2009-12-01 17:32:33 +00:00
Dr. Stephen Henson
9117b9d17a
PR: 2118
...
Submitted by: Mounir IDRASSI <mounir.idrassi@idrix.net >
Approved by: steve@openssl.org
Check return value of ECDSA_sign() properly.
2009-11-30 13:53:42 +00:00
Dr. Stephen Henson
e274c8fb72
typo
2009-11-29 13:45:18 +00:00
Andy Polyakov
e8dbd66e2b
cms-test.pl: use EXE_EXT (from HEAD).
...
PR: 2107
2009-11-26 21:12:12 +00:00
Andy Polyakov
8b9b23603f
bss_dgram.c: re-fix BIO_CTRL_DGRAM_GET_PEER (from HEAD).
2009-11-26 20:56:05 +00:00
Bodo Möller
aefb9dc5e5
Make CHANGES in the OpenSSL_1_0_0-stable branch consistent with the
...
one in the OpenSSL_0_9_8-stable branch.
2009-11-26 18:37:11 +00:00
Andy Polyakov
a8c1b19a31
x86_64-xlate.pl: fix typo introduced in last commit.
...
PR: 2109
2009-11-23 19:51:24 +00:00
Andy Polyakov
29c8d2a54a
x86_64-xlate.pl: new gas requires sign extension.
...
x86masm.pl: fix linker warning.
PR: 2094,2095
2009-11-22 12:52:18 +00:00
Andy Polyakov
87827be0c2
VC-32.pl: bufferoverlowu.lib only when needed and remove duplicate code
...
(update from HEAD).
PR: 2086
2009-11-22 12:26:15 +00:00
Andy Polyakov
e4572e5210
bio_sock.c and bss_dgram.c: update from HEAD.
...
PR: 2069
2009-11-22 12:24:43 +00:00
Dr. Stephen Henson
3e8e12a6b6
Servers can't end up talking SSLv2 with legacy renegotiation disabled
2009-11-18 15:09:35 +00:00
Dr. Stephen Henson
5ddbb8f41a
Don't use SSLv2 compatible client hello if we don't tolerate legacy renegotiation
2009-11-18 14:45:32 +00:00
Dr. Stephen Henson
3c44e92bcb
Include a more meaningful error message when rejecting legacy renegotiation
2009-11-18 14:19:52 +00:00
Dr. Stephen Henson
5e8d95f590
PR: 2103
...
Submitted by: Rob Austein <sra@hactrn.net >
Approved by: steve@openssl.org
Initialise atm.flags to 0.
2009-11-17 13:25:35 +00:00
Dr. Stephen Henson
2156704924
PR: 2101 (additional)
...
Submitted by: Roumen Petrov <openssl@roumenpetrov.info >
Approved by: steve@openssl.org
Another mingw fix.
2009-11-15 19:06:21 +00:00
Dr. Stephen Henson
4e49aa0ca3
PR: 2095
...
Submitted by: Arkadiusz Miskiewicz <arekm@maven.pl >
Approved by: steve@openssl.org
Fix for out range of signed 32bit displacement error on newer binutils
in file sha1-x86_64.pl
2009-11-13 14:23:44 +00:00
Dr. Stephen Henson
d5d1c53735
PR: 2101
...
Submitted by: Doug Kaufman <dkaufman@rahul.net >
Approved by: steve@openssl.org
Fixes for tests in cms-test.pl
2009-11-13 13:44:14 +00:00
Richard Levitte
1aac5c0ee8
Add test_cms
2009-11-13 08:45:52 +00:00
Dr. Stephen Henson
4434328b0a
PR: 2088
...
Submitted by: Aleksey Samsonov <s4ms0n0v@gmail.com >
Approved by: steve@openssl.org
Fix memory leak in d2i_PublicKey().
2009-11-12 19:57:39 +00:00
Dr. Stephen Henson
9b2cfb890c
set engine to NULL after releasing it
2009-11-12 19:24:34 +00:00
Richard Levitte
b2f364ec62
Compiling vms.mar doesn't work on other than VAX.
2009-11-12 14:05:04 +00:00
Richard Levitte
b7aeb4c9b5
Another symbol longer than 31 characters.
2009-11-12 14:04:26 +00:00
Richard Levitte
370f48da2a
Typo
2009-11-12 14:03:57 +00:00
Richard Levitte
32def77ace
Everywhere was a little too much.
2009-11-12 14:03:35 +00:00
Dr. Stephen Henson
531c81ece8
PR: 2098
...
Submitted by: Corinna Vinschen <vinschen@redhat.com >
Approved by: steve@openssl.org
For Cygwin enable zlib and mdc2 by default.
2009-11-11 19:04:56 +00:00
Dr. Stephen Henson
73582b8117
add missing parts of reneg port, fix apps patch
2009-11-11 14:51:29 +00:00
Dr. Stephen Henson
5c33091cfa
commit missing apps code for reneg fix
2009-11-11 14:10:09 +00:00
Dr. Stephen Henson
56327ebe6a
make update
2009-11-10 13:23:04 +00:00
Dr. Stephen Henson
e0031b1c78
Prepare for beta4 release
2009-11-10 13:15:09 +00:00
Dr. Stephen Henson
b2ac5cb2d0
PR: 1686
...
Submitted by: Hanno Böck <hanno@hboeck.de >
Approved by: steve@openssl.org
Create engines dir if it doesn't already exist.
2009-11-10 01:52:52 +00:00
Dr. Stephen Henson
6757ef89b3
PR: 2091
...
Submitted by: Martin Kaiser <lists@kaiser.cx >, Stephen Henson
Approved by: steve@openssl.org
If an OID has no short name or long name return the numerical representation.
2009-11-10 01:00:23 +00:00
Dr. Stephen Henson
bf6eea6536
PR: 2090
...
Submitted by: Martin Kaiser <lists@kaiser.cx >, Stephen Henson
Approved by: steve@openssl.org
Improve error checking in asn1_gen.c
2009-11-10 00:47:37 +00:00
Dr. Stephen Henson
ec4346f6f9
oops, add missing prototypes
2009-11-09 18:58:50 +00:00
Dr. Stephen Henson
e42ff486a8
fix CHANGES
2009-11-09 18:46:59 +00:00
Dr. Stephen Henson
bc9058d041
First cut of renegotiation extension. (port to 1.0.0-stable)
2009-11-09 18:45:42 +00:00
Dr. Stephen Henson
4a276f3039
make update
2009-11-09 14:35:30 +00:00
Dr. Stephen Henson
acf47d8f24
Remove BF_PTR2 from configuration: it doesn't improve performance any more and causes gcc warnings about arrays out of range
2009-11-09 14:11:13 +00:00
Dr. Stephen Henson
f62d1ea3d5
Combat gcc 4.4.1 aliasing rules. (from HEAD)
2009-11-09 14:09:53 +00:00
Dr. Stephen Henson
f923bba73c
file t1_reneg.c was added on branch OpenSSL_1_0_0-stable on 2009-11-09 18:45:42 +0000
2009-11-08 14:51:55 +00:00
Dr. Stephen Henson
e3738c49b8
If it is a new session don't send the old TLS ticket: send a zero length
...
ticket to request a new session.
2009-11-08 14:36:32 +00:00
Dr. Stephen Henson
41746da8c2
Update ordinals.
2009-11-04 13:29:58 +00:00
Dr. Stephen Henson
23b97c6bb5
PR: 2089
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
DTLS Fragment size bug fix.
2009-11-02 13:37:17 +00:00
Dr. Stephen Henson
4a7f7171f5
Add missing functions to allow access to newer X509_STORE_CTX status
...
information. Add more informative message to verify callback to indicate
when CRL path validation is taking place.
2009-10-31 19:21:47 +00:00
Dr. Stephen Henson
961092281f
Add option to allow in-band CRL loading in verify utility. Add function
...
load_crls and tidy up load_certs. Remove useless purpose variable from
verify utility: now done with args_verify.
2009-10-31 13:34:19 +00:00
Dr. Stephen Henson
036b3f331b
Generate stateless session ID just after the ticket is received instead
...
of when a session is loaded. This will mean that applications that
just hold onto SSL_SESSION structures and never call d2i_SSL_SESSION()
will still work.
2009-10-30 14:06:18 +00:00
Dr. Stephen Henson
9ac5c355a2
Move CHANGES entry to 0.9.8l section
2009-10-30 13:29:08 +00:00
Dr. Stephen Henson
3d0b604c14
Fix statless session resumption so it can coexist with SNI
2009-10-30 13:22:44 +00:00
Dr. Stephen Henson
257b2bfb6c
Don't attempt session resumption if no ticket is present and session
...
ID length is zero.
2009-10-28 19:52:35 +00:00
Dr. Stephen Henson
90528846e8
Add -no_cache option to s_server
2009-10-28 17:49:37 +00:00
Dr. Stephen Henson
32509c9731
Don't replace whole AR line
2009-10-28 15:33:20 +00:00
Dr. Stephen Henson
d3f940833d
PR: 2081
...
Submitted by: Mike Frysinger <vapier@gentoo.org >
Approved by: steve@openssl.org
Respect AR and RANLIB environment variables if set.
2009-10-28 14:00:41 +00:00
Dr. Stephen Henson
b335e351d4
PR: 2080
...
Submitted by: Mike Frysinger <vapier@gentoo.org >
Approved by: steve@openssl.org
Respect MAKE environment variable if set.
2009-10-28 13:55:55 +00:00
Dr. Stephen Henson
67bcde9ba8
PR: 2078
...
Submitted by: Dale Anderson <dra@redevised.net >
Approved by: steve@openssl.org
Corrections to bn_internal documentation.
2009-10-28 13:51:56 +00:00
Dr. Stephen Henson
169bfde4d4
Clarification
2009-10-23 12:47:01 +00:00
Dr. Stephen Henson
0a7f291268
Sync FAQ with HEAD.
2009-10-23 12:24:54 +00:00
Dr. Stephen Henson
0c2c2e71a6
If not checking all certificates don't attempt to find a CRL
...
for the leaf certificate of a CRL path.
2009-10-23 12:05:54 +00:00
Dr. Stephen Henson
d1d746afb4
Need to check <= 0 here.
2009-10-22 23:14:12 +00:00
Dr. Stephen Henson
db6e41f0ed
PR: 2070
...
Submitted by: Alexander Nikitovskiy <Nikitovski@ya.ru >
Approved by: steve@openssl.org
Fix wrong cast.
2009-10-19 13:13:14 +00:00
Dr. Stephen Henson
5b2b60ae98
Document additions for X509 chain verification from HEAD
2009-10-18 15:28:59 +00:00
Dr. Stephen Henson
c90a1ae0c9
make update
2009-10-18 14:44:51 +00:00
Dr. Stephen Henson
c679fb298e
Add new function X509_STORE_set_verify_cb and use it in apps
2009-10-18 14:42:27 +00:00
Dr. Stephen Henson
17c7cad545
take install prefix from the environment
2009-10-18 14:26:46 +00:00
Dr. Stephen Henson
164c263b5c
PR: 2074
...
Submitted by: Bram Neijt <bneijt@gmail.com >
Approved by: steve@openssl.org
Typo: "contet".
2009-10-16 15:29:34 +00:00
Dr. Stephen Henson
a9bb9d0eb4
PR: 2072
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Approved by: steve@openssl.org
Avoid potential doublefree and reuse of freed handshake_buffer.
2009-10-16 15:24:19 +00:00
Dr. Stephen Henson
cc6688d796
PR: 2073
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Approved by: steve@openssl.org
Don't access freed SSL_CTX in SSL_free().
2009-10-16 13:41:52 +00:00
Dr. Stephen Henson
9b1f24df3d
Fixes to CROSS_COMPILE, don't override command line option from environment
2009-10-15 23:44:11 +00:00
Dr. Stephen Henson
595e804ae3
Fix for WIN32 (and possibly other platforms) which don't define in_port_t.
2009-10-15 18:48:47 +00:00
Dr. Stephen Henson
b381e9b952
Update ordinals.
2009-10-15 18:04:43 +00:00
Dr. Stephen Henson
28418076b2
PR: 2069
...
Submitted by: Michael Tuexen <tuexen@fh-muenster.de >
Approved by: steve@openssl.org
IPv6 support for DTLS.
2009-10-15 17:41:44 +00:00
Dr. Stephen Henson
abdfdb029e
PR: 1847
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Approved by: steve@openssl.org
Integrated patches to CA.sh to bring it into line with CA.pl functionality.
2009-10-15 17:27:47 +00:00
Dr. Stephen Henson
8465b81d50
PR: 2066
...
Submitted by: Guenter <lists@gknw.net >
Approved by: steve@openssl.org
Add -r option to dgst to produce format compatible with core utilities.
2009-10-15 17:18:03 +00:00
Dr. Stephen Henson
ed65b6e512
Rename CROSS_COMPILE_PREFIX to CROSS_COMPILE
2009-10-15 13:05:41 +00:00
Dr. Stephen Henson
d793544518
Allow uname values to be overridden by the environment
2009-10-07 16:46:51 +00:00
Dr. Stephen Henson
53480a673b
Allow cross compilation prefix to come from CROSS_COMPILE environment variable
2009-10-07 16:41:33 +00:00
Dr. Stephen Henson
ad187f8905
Fix unitialized warnings
2009-10-04 16:52:35 +00:00
Dr. Stephen Henson
2280f82fc6
Fix warnings about ignoring fgets return value
2009-10-04 16:43:21 +00:00
Dr. Stephen Henson
e6714faffb
Prevent ignored return value warning
2009-10-04 14:04:14 +00:00
Dr. Stephen Henson
af8f2bb174
Prevent aliasing warning
2009-10-04 14:02:03 +00:00
Dr. Stephen Henson
d7501c16bf
Yes it is a typo ;-)
2009-10-01 12:17:18 +00:00
Dr. Stephen Henson
804196a418
PR: 2061
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct i2b_PVK_bio error handling in rsa.c, dsa.c
2009-10-01 00:26:07 +00:00
Dr. Stephen Henson
50d70c01d6
PR: 2062
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct BN_rand error handling in bntest.c
2009-10-01 00:21:55 +00:00
Dr. Stephen Henson
9fc601cfbb
PR: 2059
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct EVP_SealInit error handling in pem_seal.c
2009-10-01 00:17:35 +00:00
Dr. Stephen Henson
fed5333248
PR: 2056
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct BIO_wirte error handling in asn1_par.c
2009-10-01 00:11:49 +00:00
Dr. Stephen Henson
3d1dab4404
PR: 2055
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct BIO_ctrl error handling in s2_srvr.c
2009-10-01 00:07:10 +00:00
Dr. Stephen Henson
29c2fd46d2
PR: 2054
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct BIO_ctrl error handling
2009-10-01 00:03:50 +00:00
Dr. Stephen Henson
a3d5cdb07c
PR: 2063
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct BIO_write error handling in ocsp_prn.c
2009-09-30 23:59:16 +00:00
Dr. Stephen Henson
d99c0f6b4a
PR: 2057
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct BIO_write, BIO_printf, i2a_ASN1_INTEGER and i2a_ASN1_OBJECT
error handling in OCSP print routines.
2009-09-30 23:55:29 +00:00
Dr. Stephen Henson
43f21e62aa
PR: 2058
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct EVP_DigestVerifyFinal error handling.
2009-09-30 23:50:10 +00:00
Dr. Stephen Henson
50425bc137
Change version from 0.9.9 to 1.0.0 in docs
2009-09-30 23:40:52 +00:00
Dr. Stephen Henson
0c690586e0
PR: 2064, 728
...
Submitted by: steve@openssl.org
Add support for custom headers in OCSP requests.
2009-09-30 21:41:53 +00:00
Dr. Stephen Henson
bc8c5fe58d
Free SSL_CTX after BIO
2009-09-30 21:35:26 +00:00
Dr. Stephen Henson
0cc0db32e3
PR: 2050
...
Submitted by: Michael Tuexen <tuexen@fh-muenster.de >
Approved by: steve@openssl.org
Fix handling of ENOTCONN and EMSGSIZE for dgram BIOs.
2009-09-22 11:34:25 +00:00
Dr. Stephen Henson
d68f7641a3
PR: 2047
...
Submitted by: David Lee <live4thee@gmail.com >, steve@openssl.org
Approved by: steve@openssl.org
Fix for IPv6 handling in BIO_get_accept_socket().
2009-09-20 16:40:59 +00:00
Dr. Stephen Henson
4fcbaa3dd9
Ooops, missing close quote
2009-09-20 12:47:04 +00:00
Dr. Stephen Henson
5e56584285
Don't use __try+__except unless on VC++
2009-09-20 12:39:16 +00:00
Dr. Stephen Henson
ca26ccb083
add version info for VC-WIN64I too
2009-09-20 11:39:59 +00:00
Dr. Stephen Henson
3e8b713b06
PR: 2048
...
Submitted by: john blair <mailtome200420032002@yahoo.com >
Approved by: steve@openssl.org
Add version info in VC-WIN64A too.
2009-09-19 23:01:24 +00:00
Andy Polyakov
13eca7d782
cmll-x86_64.pl: small buglet in CBC subroutine [from HEAD].
...
PR: 2035
2009-09-17 19:35:49 +00:00
Dr. Stephen Henson
af3d4e1b02
PR: 2039
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
DTLS listen bug fix,
2009-09-15 22:48:30 +00:00
Dr. Stephen Henson
80afb40ae3
Submitted by: Julia Lawall <julia@diku.dk>
...
The functions ENGINE_ctrl(), OPENSSL_isservice(), EVP_PKEY_sign(),
CMS_get1_RecipientRequest() and RAND_bytes() can return <=0 on error fix
so the return code is checked correctly.
2009-09-13 11:27:27 +00:00
Dr. Stephen Henson
3333428b44
PR: 2023
...
Submitted by: James Beckett <jmb.openssl@nospam.hackery.net >, steve
Approved by: steve@openssl.org
Fix documentation errors in d2i_X509 manual pages.
2009-09-12 23:34:56 +00:00
Dr. Stephen Henson
a131de9bb2
PR: 2025
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Approved by: steve@openssl.org
Constify SSL_CIPHER_description
2009-09-12 23:18:09 +00:00
Dr. Stephen Henson
0ddd002f60
PR: 1411
...
Submitted by: steve@openssl.org
Allow use of trusted certificates in SSL_CTX_use_chain_file()
2009-09-12 23:09:26 +00:00
Dr. Stephen Henson
e7209103e6
PR: 2038
...
Submitted by: Artem Chuprina <ran@cryptocom.ru >
Approved by: steve@openssl.org
Avoid double call to BIO_free().
2009-09-11 11:03:31 +00:00
Dr. Stephen Henson
53f062d050
PR: 2033
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
DTLS listen support.
2009-09-09 17:05:42 +00:00
Dr. Stephen Henson
b5b65403a4
Add new option --strict-warnings to Configure script. This is used to add
...
in devteam warnings into other configurations.
2009-09-09 16:32:19 +00:00
Dr. Stephen Henson
1a3914fe0c
Seed PRNG with DSA and ECDSA digests for additional protection against
...
possible PRNG state duplication.
2009-09-09 12:14:36 +00:00
Dr. Stephen Henson
b7e3cb31a5
PR: 2031
...
Submitted by: steve@openssl.org
Tolerate application/timestamp-response which some servers send out.
2009-09-07 17:57:02 +00:00
Dr. Stephen Henson
9769137a43
Typo presumably...
2009-09-06 17:55:40 +00:00
Dr. Stephen Henson
c0688f1aef
Make update, deleting bogus DTLS error code
2009-09-06 15:55:54 +00:00
Dr. Stephen Henson
6c29853bf2
PR: 1644
...
Submitted by: steve@openssl.org
Fix to make DHparams_dup() et al work in C++.
For 1.0 fix the final argument to ASN1_dup() so it is void *. Replace some
*_dup macros with functions.
2009-09-06 15:49:12 +00:00
Dr. Stephen Henson
2e9802b7a7
PR: 2028
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Fix DTLS cookie management bugs.
2009-09-04 17:42:06 +00:00
Dr. Stephen Henson
7483896e15
Correction: salt is now default
2009-09-04 12:27:01 +00:00
Dr. Stephen Henson
4b4f249e0d
Oops, s can be NULL
2009-09-04 11:31:19 +00:00
Dr. Stephen Henson
196dcf93bc
PR: 2020
...
Submitted by: Keith Beckman <kbeckman@mcg.edu >, Tomas Mraz <tmraz@redhat.com >
Checked by: steve@openssl.org
Fix improperly capitalized references to WWW::Curl::Easy.
2009-09-02 15:57:12 +00:00
Dr. Stephen Henson
2c11ec308b
PR: 2029
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Checked by: steve@openssl.org
Fix so that the legacy digest EVP_dss1() still works.
2009-09-02 15:51:28 +00:00
Dr. Stephen Henson
e5eb96c83a
PR: 2013
...
Submitted by: steve@openssl.org
Include a flag ASN1_STRING_FLAG_MSTRING when a multi string type is created.
This makes it possible to tell if the underlying type is UTCTime,
GeneralizedTime or Time when the structure is reused and X509_time_adj_ex()
can handle each case in an appropriate manner.
Add error checking to CRL generation in ca utility when nextUpdate is being
set.
2009-09-02 13:55:22 +00:00
Dr. Stephen Henson
54ed003ace
PR: 2009
...
Submitted by: "Alexei Khlebnikov" <alexei.khlebnikov@opera.com >
Approved by: steve@openssl.org
Avoid memory leak and fix error reporting in d2i_SSL_SESSION(). NB: although
the ticket mentions buffer overruns this isn't a security issue because
the SSL_SESSION structure is generated internally and it should never be
possible to supply its contents from an untrusted application (this would
among other things destroy session cache security).
2009-09-02 13:20:22 +00:00
Dr. Stephen Henson
f18e10253d
PR: 2022
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Fix DTLS record header length bug.
2009-09-02 12:53:32 +00:00
Dr. Stephen Henson
c9add317a9
Tidy up and fix verify callbacks to avoid structure dereference, use of
...
obsolete functions and enhance to handle new conditions such as policy
printing.
2009-09-02 12:45:19 +00:00
Dr. Stephen Henson
6d1741030b
Missing break.
2009-08-31 22:21:01 +00:00
Dr. Stephen Henson
b8dc932c05
PR: 2005
...
Submitted by: steve@openssl.org
Some systems have broken IPv6 headers and/or implementations. If
OPENSSL_USE_IPV6 is set to 0 IPv6 is not used, if it is set to 1 it is used
and if undefined an attempt is made to detect at compile time by checking
if AF_INET6 is set and excluding known problem platforms.
2009-08-26 15:13:43 +00:00
Dr. Stephen Henson
17f8d8db61
PR: 2006
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Do not use multiple DTLS records for a single user message
2009-08-26 11:51:23 +00:00
Dr. Stephen Henson
38437fa135
PR: 2015
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Define LIBDIR properly.
2009-08-26 11:41:32 +00:00
Richard Levitte
82f35daaaf
Moving up the inclusion of e_os.h was a bad idea.
...
Put it back where it was and place an inclusion of e_os2.h to get platform
macros defined...
2009-08-26 11:21:50 +00:00
Richard Levitte
b529bba4bf
Make sure ENGINES can be separately compiled as well.
...
Make sure _XOPEN_SOURCE_EXTENDED is defined in opensslconf.h
Submitted by Zoltan Arpadffy <zoli@polarhome.com >
2009-08-25 07:30:02 +00:00
Richard Levitte
dde33ea9c3
Remove tmdiff.h from EXHEADERS as it doesn't exist.
...
Don't have separate installation directory variables for VAX and AXP.
Submitted by Zoltan Arpadffy <zoli@polarhome.com >
2009-08-25 07:28:12 +00:00
Richard Levitte
cb0d89705b
Define EXE_DIR earlier.
...
Make sure S_SOCKET also gets compiled with _POSIX_C_SOURCE defined.
Submitted by Zoltan Arpadffy <zoli@polarhome.com >
2009-08-25 07:25:55 +00:00
Richard Levitte
f49353b42f
Move up the inclusion of e_os.h so OPENSSL_SYS_VMS_DECC has a chance
...
to be properly defined.
2009-08-25 07:23:21 +00:00
Richard Levitte
573c61dcde
Make it possible to compile non-assembler routines on AXP as well.
...
Submitted by Zoltan Arpadffy <arpadffy@polarhome.com >
2009-08-25 07:22:08 +00:00
Richard Levitte
51f38e6c2d
Make engines compile on VMS for ia64 as well.
...
Parse file types in a more secure manner.
Submitted by sms@antinode.info (Steven M. Schweda)
2009-08-25 07:19:20 +00:00
Richard Levitte
2de213732a
Correct some typos and missing things.
...
Submitted by Arpadffy Zoltan <Zoltan.Arpadffy@scientificgames.se >
2009-08-25 07:17:13 +00:00
Richard Levitte
3798c36686
Include proper header files for time functions.
...
Submitted by Arpadffy Zoltan <Zoltan.Arpadffy@scientificgames.se >
2009-08-25 07:10:09 +00:00
Dr. Stephen Henson
209abea1db
Stop unused variable warning on WIN32 et al.
2009-08-18 11:14:12 +00:00
Dr. Stephen Henson
250705e7b5
Use SHA1 and not deprecated MD5 in demos.
2009-08-15 10:51:37 +00:00
Dr. Stephen Henson
5a96822f2c
Update default dependency flags.
...
Make error name discrepancies a fatal error.
Fix error codes.
make update
2009-08-12 17:08:44 +00:00
Dr. Stephen Henson
23b34259e0
Re-enable mdc2 default by default as the patent is now expired.
2009-08-12 16:45:35 +00:00
Dr. Stephen Henson
11b6cb8aae
Update README with bug report and contribution details.
2009-08-12 16:41:46 +00:00
Dr. Stephen Henson
a4bade7aac
PR: 1997
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
DTLS timeout handling fix.
2009-08-12 13:21:26 +00:00
Dr. Stephen Henson
e322b5d167
Typo
2009-08-10 15:53:11 +00:00
Dr. Stephen Henson
01af4edcfe
PR: 1999
...
Submitted by: "Bayram Kurumahmut" <kbayram@ubicom.com >
Approved by: steve@openssl.org
Don't use HAVE_FORK in apps/speed.c it can conflict with configured version.
2009-08-10 15:30:29 +00:00
Dr. Stephen Henson
ff0945cbdc
PR: 2004
...
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr >
Approved by: steve@openssl.org
Handle fractional seconds properly in ASN1_GENERALIZEDTIME_print
2009-08-10 14:57:11 +00:00
Dr. Stephen Henson
d5ec7d66a8
PR: 2003
...
Make it possible to install OpenSSL in directories with name other
than "lib" for example "lib64". Based on patch from Jeremy Utley.
2009-08-10 14:42:05 +00:00
Dr. Stephen Henson
dc0aebabe6
Add COMP error strings.
2009-08-09 14:58:05 +00:00
Dr. Stephen Henson
52828ca214
Add missing CHANGES entry.
2009-08-06 16:29:42 +00:00
Dr. Stephen Henson
757e9886a0
Update from HEAD.
2009-08-05 15:52:06 +00:00
Dr. Stephen Henson
f45e8c7bdd
PR: 2000
...
Submitted by: Vadim Zeitlin <vz-openssl@zeitlins.org >
Approved by: steve@openssl.org
Make no-comp compile without warnings.
2009-08-05 15:29:14 +00:00
Dr. Stephen Henson
ea904b4074
Update from HEAD.
2009-08-05 15:04:16 +00:00
Dr. Stephen Henson
ec6158d029
PR: 1996
...
Submitted by: steve@openssl.org
Change conflicting name "BLOCK" to "OPENSSL_BLOCK".
2009-07-27 21:21:25 +00:00
Dr. Stephen Henson
4386445c18
Change STRING to OPENSSL_STRING etc as common words such
...
as "STRING" cause conflicts with other headers/libraries.
2009-07-27 21:08:53 +00:00
Ben Laurie
a585aa6750
Fix warnings.
2009-07-26 12:26:38 +00:00
Dr. Stephen Henson
2475a52061
Update from 0.9.8-stable.
2009-07-24 13:47:52 +00:00
Dr. Stephen Henson
001dfac061
Remove MD2 test from WIN32 tests.
2009-07-24 13:43:23 +00:00
Dr. Stephen Henson
1b37c55e26
Fix typo.
2009-07-24 13:36:36 +00:00
Dr. Stephen Henson
3442781798
Update TABLE.
2009-07-24 13:29:45 +00:00
Dr. Stephen Henson
c9d3f123a6
Add new debug targets.
2009-07-24 13:29:13 +00:00
Dr. Stephen Henson
d069a4d15d
PR: 1990
...
Update from 0.9.8-stable.
2009-07-24 13:07:08 +00:00
Dr. Stephen Henson
f1ad8fb627
Doc update from HEAD.
2009-07-24 13:02:55 +00:00
Dr. Stephen Henson
d7406b1528
PR: 1993
...
Fix from 0.9.8-stable.
2009-07-24 11:52:32 +00:00
Dr. Stephen Henson
02ce897e80
Fix from 0.9.8-stable
2009-07-24 11:34:41 +00:00
Dr. Stephen Henson
0bd9d3a60e
Update from 0.9.8-stable.
2009-07-24 11:24:45 +00:00
Dr. Stephen Henson
b4c81fb6db
Update from 0.9.8-stable
2009-07-24 11:15:55 +00:00
Dr. Stephen Henson
0f566bda2b
Update from 0.9.8-stable.
2009-07-24 11:10:57 +00:00
Dr. Stephen Henson
f97a8149cd
Update from HEAD.
2009-07-16 09:54:49 +00:00
Dr. Stephen Henson
f4b6a3e9c0
Call CMS tests with "make test"
2009-07-15 17:59:17 +00:00
Dr. Stephen Henson
7dfae89768
Handle OSX ".dynlib" DSO extension.
2009-07-15 17:58:57 +00:00
Dr. Stephen Henson
d41ca3f0e2
Update for next beta.
2009-07-15 12:08:35 +00:00
Dr. Stephen Henson
65fc4c55be
Preparation for beta3 release.
2009-07-15 11:37:45 +00:00
Dr. Stephen Henson
5135d6b985
Fix error codes and indentation.
2009-07-15 11:32:58 +00:00
Dr. Stephen Henson
2202edeff0
PR: 1980
...
Submitted by: Victor Wagner <vitus@wagner.pp.ru >
Approved by: steve@openssl.org
Fix memory leaks.
2009-07-15 11:01:40 +00:00
Dr. Stephen Henson
c8f759ec74
Stop warning of signed/unsigned compare.
2009-07-14 15:28:44 +00:00
Dr. Stephen Henson
5fda10c6f1
Oops, use right function name...
2009-07-14 15:14:39 +00:00
Dr. Stephen Henson
11ba084e1b
Document MD2 deprecation.
2009-07-13 11:57:15 +00:00
Dr. Stephen Henson
cddd00166c
PR: 1984
...
Submitted by: Michael Tüxen <Michael.Tuexen@lurchi.franken.de >
Approved by: steve@openssl.org
Don't concatenate reads in DTLS.
2009-07-13 11:44:04 +00:00
Dr. Stephen Henson
0190aa7353
Update from HEAD.
2009-07-13 11:40:46 +00:00
Dr. Stephen Henson
1546de87f0
Fix from 0.9.8-stable.
2009-07-11 22:36:27 +00:00
Dr. Stephen Henson
affffaed3d
Update from HEAD.
2009-07-11 22:30:02 +00:00
Dr. Stephen Henson
0c644f1462
PR: 1985
...
Submitted by: Artem Chuprina <ran@cryptocom.ru >
Approved by: steve@openssl.org
Initialise flags.
2009-07-11 21:42:47 +00:00
Dr. Stephen Henson
a2da5c7daa
Make update.
2009-07-08 09:13:24 +00:00
Dr. Stephen Henson
c155d83f5b
Delete MD2 from algorithm tables and default compilation.
2009-07-08 08:50:53 +00:00
Dr. Stephen Henson
5a03e3ac3f
Fix from HEAD.
2009-07-04 12:05:14 +00:00
Dr. Stephen Henson
08b2097967
Update from HEAD.
2009-07-04 11:44:01 +00:00
Dr. Stephen Henson
15401859b5
PR: 1976
...
Submitted by: David McCullough <david_mccullough@securecomputing.com >
Approved by: steve@openssl.org
Cleanup some compile time warnings/magic numbers.
2009-07-01 15:46:43 +00:00
Dr. Stephen Henson
6f24165170
PR: 1974(partial)
...
Submitted by: David McCullough <david_mccullough@securecomputing.com >
Approved by: steve@openssl.org
Cryptodev digest support.
2009-07-01 15:42:38 +00:00
Dr. Stephen Henson
a8afd9382c
192, 256 bit AES and RC4 support for cryptodev.
2009-07-01 15:36:55 +00:00
Dr. Stephen Henson
caddf00d78
PR: 1974(partial)
...
Submitted by: David McCullough <david_mccullough@securecomputing.com >
Approved by: steve@openssl.org
Fix up RSA API compliance for rsa_nocrt_mod_exp method.
2009-07-01 15:25:17 +00:00
Dr. Stephen Henson
e105098b3f
PR: 1974 (partial)
...
Submitted by: David McCullough <david_mccullough@securecomputing.com >
Approved by: steve@openssl.org
If -DHAVE_CRYPTODEV is set enable cryptodev support
2009-07-01 14:55:59 +00:00
Dr. Stephen Henson
9852e7e4d7
PR: 1972
...
Submitted by: David McCullough <david_mccullough@securecomputing.com >
Approved by: steve@openssl.org
Add support for building with the uClinux-dist.
2009-07-01 11:43:57 +00:00
Dr. Stephen Henson
b855560192
PR: 1970
...
Submitted by: David McCullough <david_mccullough@securecomputing.com >
Reviewed by: steve@openssl.org
Fix unused variable "words" and uninitialised data "b".
2009-07-01 11:39:59 +00:00
Dr. Stephen Henson
f2f50efea3
PR: 1965
...
Submitted by: David McCullough <david_mccullough@securecomputing.com >
Approved by: steve@openssl.org
Make sure defines to remove SHA are correct.
2009-07-01 11:35:46 +00:00
Dr. Stephen Henson
2b3cd246e5
PR: 1962
...
Submitted by: Daniel Mentz <daniel.m@sent.com >
Reviewed by: steve@openssl.org
Fix "for dtls1_get_record() returns a bad record in one edge case" bug.
2009-07-01 11:29:01 +00:00
Dr. Stephen Henson
7171ade2c2
Submitted by: "Victor B. Wagner" <vitus@cryptocom.ru>
...
Reviewed by: steve@openssl.org
EVP_CTRL_PBE_PRF_NID suppot for Gost engine.
2009-07-01 11:23:07 +00:00
Dr. Stephen Henson
76ec9151d1
Update from 0.9.8-stable.
2009-06-30 22:26:28 +00:00
Dr. Stephen Henson
6c24dd9005
Typo.
2009-06-30 20:55:55 +00:00
Dr. Stephen Henson
e323afb0ce
Update from HEAD.
2009-06-30 16:10:24 +00:00
Dr. Stephen Henson
1fd43fd86e
PR: 1969
...
Submitted by: David McCullough <david_mccullough@securecomputing.com >
Approved by: steve@openssl.org
Don't use repeating key when testing algs.
2009-06-30 15:21:48 +00:00
Dr. Stephen Henson
3e70c81ed9
PR: 1967
...
Submitted by: David McCullough <david_mccullough@securecomputing.com >
Approved by: steve@openssl.org
Don't go past end of params array.
2009-06-30 15:10:54 +00:00
Dr. Stephen Henson
6e07229564
PR: 1966
...
Submitted by: David McCullough <david_mccullough@securecomputing.com >
Reviewed by: steve@openssl.org
Make no-ocsp work properly.
2009-06-30 15:08:38 +00:00
Dr. Stephen Henson
859d5eb2d7
PR: 1963
...
Submitted by: David McCullough <david_mccullough@securecomputing.com >
Approved by: steve@openssl.org
Make build fail if makedepend not present.
2009-06-30 14:59:59 +00:00
Dr. Stephen Henson
29b0c4a01c
Add "missing" functions for setting all verify parameters for SSL_CTX and SSL
...
structures.
2009-06-30 11:57:24 +00:00
Dr. Stephen Henson
b824f0f458
Redundant check: s->param is always non-NULL, it is set in SSL_new().
2009-06-30 11:41:35 +00:00
Dr. Stephen Henson
43ea53a04a
Inherit parameters properly in SSL contexts: any parameters set should
...
replace those in the current list.
2009-06-30 11:21:00 +00:00
Dr. Stephen Henson
fa07f00aaf
Update from HEAD.
2009-06-29 16:09:58 +00:00
Dr. Stephen Henson
dbb834ffeb
Update from 0.9.8-stable.
2009-06-28 16:24:11 +00:00
Dr. Stephen Henson
8549a8a5dc
Fix from 0.9.8-stable
2009-06-26 23:14:11 +00:00
Dr. Stephen Henson
887c250852
Update from 0.9.8-stable.
2009-06-26 15:04:22 +00:00
Dr. Stephen Henson
710c1c34d1
Allow checking of self-signed certifictes if a flag is set.
2009-06-26 11:28:52 +00:00
Dr. Stephen Henson
e16818108f
Fix from HEAD.
2009-06-25 17:11:48 +00:00
Dr. Stephen Henson
0cb76e79df
PR: 1748
...
Fix nasty SSL BIO pop bug. Since this changes the behaviour of SSL BIOs and
will break applications that worked around the bug only included in 1.0.0 and
later.
2009-06-25 11:26:45 +00:00
Ben Laurie
6cb419673e
DEBUG_BN_CTX doesn't really debug anything (it is essentially verbosity) and
...
has made make test far too noisy.
2009-06-25 10:15:06 +00:00
Dr. Stephen Henson
72d668c332
Update from HEAD.
2009-06-24 13:30:07 +00:00
Dr. Stephen Henson
5ce4799a38
Update from HEAD.
2009-06-17 12:19:35 +00:00
Dr. Stephen Henson
6178da0142
Update from HEAD.
2009-06-17 12:05:51 +00:00
Dr. Stephen Henson
27713e3fc2
Check t too.
2009-06-17 11:47:54 +00:00
Dr. Stephen Henson
3492c47b18
Update from HEAD.
2009-06-17 11:38:26 +00:00
Dr. Stephen Henson
43dc001b62
Update from HEAD.
2009-06-17 11:33:17 +00:00
Dr. Stephen Henson
8280b43a62
Update from HEAD.
2009-06-17 11:26:09 +00:00
Dr. Stephen Henson
85d9b02d16
Update from HEAD.
2009-06-16 16:55:01 +00:00
Dr. Stephen Henson
bfd502f027
Updates from HEAD.
2009-06-16 16:39:20 +00:00
Dr. Stephen Henson
f1ed5fa827
Update from 0.9.8-stable.
2009-06-15 15:00:19 +00:00
Dr. Stephen Henson
5bb9e1b4d4
Update from HEAD.
2009-06-15 11:23:33 +00:00
Ben Laurie
7de819237d
Two digits is not wide enough.
2009-06-14 10:23:29 +00:00
Ben Laurie
6cfab29b71
Make depend.
2009-06-14 02:37:22 +00:00
Dr. Stephen Henson
55708796af
Update from HEAD.
2009-06-13 20:47:09 +00:00
Dr. Stephen Henson
7074f1df07
Stop gcc bracket warning.
2009-06-05 14:57:10 +00:00
Dr. Stephen Henson
67d8ab07e6
Stop warning if dtls disabled.
2009-06-05 14:56:48 +00:00
Dr. Stephen Henson
4e63da0669
PR: 1950
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve@openssl.org
DTLS fragment retransmission bug.
2009-06-05 14:46:49 +00:00
Ben Laurie
15b0a5651c
Not always used.
2009-06-05 08:35:54 +00:00
Dr. Stephen Henson
4e66723517
Update from HEAD.
2009-06-02 11:23:30 +00:00
Dr. Stephen Henson
3e53c86001
Update from HEAD.
2009-06-02 11:06:28 +00:00
Dr. Stephen Henson
524e5b844b
Update from HEAD.
2009-06-01 12:14:15 +00:00
Dr. Stephen Henson
e1f09dfd84
PR: 1921
...
Submitted by: Michael Tuexen <tuexen@fh-muenster.de >
Reviewed by: steve@openssl.org
Add ECDHE and PSK support to DTLS.
2009-05-31 17:11:24 +00:00
Dr. Stephen Henson
f16411ccfd
Ensure canonical encodings of X509_NAME structures are valid.
2009-05-30 18:10:59 +00:00
Dr. Stephen Henson
2bbcd45b05
Update from HEAD.
2009-05-29 18:58:59 +00:00
Dr. Stephen Henson
fdc6c6ef08
Update from 0.9.8-stable.
2009-05-29 14:02:30 +00:00
Dr. Stephen Henson
6e87cc8da6
Need definition of struct timeval for dtls1.h which broke WIN32 builds,
...
so include winsock.h. (might be a cleaner way to do this...)
2009-05-28 20:53:16 +00:00
Dr. Stephen Henson
2d0b6c72b8
Update ordinals and sync with 0.9.8
2009-05-28 20:49:29 +00:00
Dr. Stephen Henson
3e84046f90
make errors
2009-05-28 20:45:26 +00:00
Dr. Stephen Henson
cc1cb996f1
Submitted by: Artem Chuprina <ran@cryptocom.ru>
...
Reviewed by: steve@openssl.org
Fix to match latest GOST in TLS draft.
2009-05-28 18:10:47 +00:00
Dr. Stephen Henson
32fbeacdfb
Add CHANGES entries from 0.9.8-stable.
2009-05-18 17:37:13 +00:00
Dr. Stephen Henson
431aad3c15
Delete line which should have gone with PR#1922.
2009-05-18 16:11:58 +00:00
Dr. Stephen Henson
0454f2c490
PR: 1929
...
Submitted by: Michael Tuexen <tuexen@fh-muenster.de >
Approved by: steve@openssl.org
Updated DTLS MTU bug fix.
2009-05-17 16:04:21 +00:00
Dr. Stephen Henson
5f911774bf
Revert previous MTU patch from PR#1929
2009-05-17 15:57:51 +00:00
Dr. Stephen Henson
66b7e42790
PR: 1599
...
Reformat PKCS12_parse manual page, document return values.
2009-05-17 14:48:02 +00:00
Richard Levitte
6a419388fc
Stupid typo
2009-05-17 07:22:15 +00:00
Dr. Stephen Henson
abda7c1147
PR: 1931
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Fix fragment handling memory leak.
2009-05-16 16:22:11 +00:00
Dr. Stephen Henson
88b48dc680
PR: 1930
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Limit size of DTLS record buffer queue.
2009-05-16 16:17:46 +00:00
Dr. Stephen Henson
661d35dfb2
Disable ECDHE in DTLS in a cleaner way.
2009-05-16 11:16:15 +00:00
Dr. Stephen Henson
f99c9daa39
Make the stuff compile again, fix missing prototype warnings.
2009-05-16 11:14:55 +00:00
Dr. Stephen Henson
019b3f3e5a
Update from HEAD.
2009-05-15 23:07:41 +00:00
Dr. Stephen Henson
d6584eba8c
PR: 1922
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
DTLS Timer bug fix.
2009-05-15 22:58:13 +00:00
Dr. Stephen Henson
a379c433a3
PR: 1925
...
Submitted by: "Green, Paul" <Paul.Green@stratus.com >
Approved by: steve@openssl.org
VOS extended name support.
2009-05-15 22:50:12 +00:00
Richard Levitte
006c7c6bb1
Functional VMS changes submitted by sms@antinode.info (Steven M. Schweda).
...
Thank you\!
(note: not tested for now, a few nightly builds should give indications though)
2009-05-15 16:37:08 +00:00
Richard Levitte
bd4a902a15
Have mkdef.pl also handle VAX and Non-VAX differences for VMS
2009-05-15 16:01:42 +00:00
Richard Levitte
17ae5e9f13
Add a comment about libeay.num and ssleay.num
2009-05-15 16:00:08 +00:00
Andy Polyakov
baa5f52422
x86[_64]cpuid.pl: update from HEAD.
2009-05-14 18:25:29 +00:00
Dr. Stephen Henson
b3620451b2
PR: 1921
...
Submitted by: steve@openssl.org
Our DTLS implementation doesn't currently handle ECDHE so don't include
unsupported ciphers in client hello.
2009-05-13 16:25:35 +00:00
Dr. Stephen Henson
d2f17d9615
Print out DTLS versions too.
2009-05-13 16:24:12 +00:00
Dr. Stephen Henson
561cbe5678
PR: 1923
...
Submitted by: Daniel Mentz <daniel.m@sent.com >, Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Don't access freed data structure.
2009-05-13 11:51:30 +00:00
Dr. Stephen Henson
756d2074b8
PR: 1924
...
Submitted by: "Green, Paul" <Paul.Green@stratus.com >
Approved by: steve@openssl.org
Fix _POSIX_C_SOURCE usage.
2009-05-13 11:32:24 +00:00
Andy Polyakov
c65db618bb
e_padlock.c: update from HEAD.
2009-05-12 20:24:23 +00:00
Dr. Stephen Henson
8355647403
Typo.
2009-05-07 16:26:44 +00:00
Dr. Stephen Henson
b839d73411
Typo.
2009-05-06 16:58:27 +00:00
Dr. Stephen Henson
4563c1e043
Add debug-VC-WIN32 target and let mk1mf.pl auto detect it, update docs.
2009-05-06 16:54:25 +00:00
Richard Levitte
11f35a036d
Select updates from HEAD
2009-05-06 14:03:24 +00:00
Dr. Stephen Henson
d8646dab14
Don't use -D_CRT_NONSTDC_NO_DEPRECATE, fix bio_lcl.h instead.
2009-05-06 10:23:39 +00:00
Andy Polyakov
47b3cd98f2
Configure: update from HEAD (Camellia assembler in VC-WIN64A, CAPI engine
...
in mingw64).
2009-05-05 19:25:53 +00:00
Andy Polyakov
27c7e53882
ec_mult.c: update from HEAD (Win64 compile warnings).
2009-05-05 19:23:45 +00:00
Andy Polyakov
b2b28803fb
cryptlib.c: update from HEAD.
2009-05-05 19:23:14 +00:00
Andy Polyakov
8e92b1b9ce
perlasm: update from HEAD.
2009-05-05 19:21:12 +00:00
Andy Polyakov
0f41ccf370
e_capi.c: update from HEAD.
2009-05-05 19:17:00 +00:00
Richard Levitte
c44544a1d7
Update from HEAD
2009-05-05 08:46:30 +00:00
Dr. Stephen Henson
4e50f02638
If an SSLv2 method is explicitly asked for use the SSLv2 cipher string:
...
assume an application *really* wants SSLv2 if they do that.
Otherwise stick with the default which excludes all SSLv2 cipher suites.
2009-04-29 14:12:54 +00:00
Dr. Stephen Henson
174ea15647
Typo.
2009-04-28 22:35:42 +00:00
Dr. Stephen Henson
18f8258a87
PR: 1629
...
Submitted by: Kaspar Brand <ossl-rt@velox.ch >
Approved by: steve@openssl.org
Don't use extensions if using SSLv3: this chokes some broken servers.
2009-04-28 22:01:53 +00:00
Dr. Stephen Henson
376bbb5887
PR: 1914
...
Make safestack work with C++.
2009-04-28 21:56:04 +00:00
Richard Levitte
2c8275409e
Update from HEAD.
2009-04-28 13:00:50 +00:00
Andy Polyakov
892582b541
v3_alt.c: otherName parsing fix from HEAD.
...
Submitted by: Love Hoernquist Aastrand
2009-04-27 19:37:23 +00:00
Andy Polyakov
57b53c1b0a
VC-32.pl: update from HEAD.
2009-04-27 19:32:13 +00:00
Andy Polyakov
004c3ca521
test_padlock: update from HEAD.
2009-04-27 19:31:52 +00:00
Andy Polyakov
f0f00f9272
sha*-s390x.pl: minor update from HEAD.
2009-04-27 19:31:30 +00:00
Andy Polyakov
a243c68736
rc4-x86_64.pl: Win64 SEH update from HEAD.
2009-04-27 19:31:04 +00:00
Andy Polyakov
467d9f2a34
b_sock.c: readability update from HEAD.
2009-04-27 19:30:36 +00:00
Richard Levitte
226a94963a
Updates from HEAD
2009-04-27 00:08:50 +00:00
Dr. Stephen Henson
d7f0d147b1
Update docs: can use backslashes now.
2009-04-26 15:50:55 +00:00
Dr. Stephen Henson
26902b9aad
Prevent warning if WINCE not used.
2009-04-26 15:04:06 +00:00
Dr. Stephen Henson
3c69d6bec4
Add extra no deprecate flags in Configure.
2009-04-26 14:54:23 +00:00
Dr. Stephen Henson
4f44677a41
This at least break WIN32 which doesn't have sys/time.h might need to make
...
this a bit more generous later...
2009-04-26 14:53:58 +00:00
Richard Levitte
88d9f669c5
Add local symbol hacks for OpenVMS
2009-04-26 12:26:04 +00:00
Richard Levitte
22e1421672
Cast to avoid signedness confusion
2009-04-26 12:16:12 +00:00
Richard Levitte
5409414eff
Updates from HEAD
2009-04-26 11:35:58 +00:00
Dr. Stephen Henson
7134507de0
Make no-rsa, no-dsa and no-dh compile again.
2009-04-23 17:16:40 +00:00
Dr. Stephen Henson
fe41d9853c
Make no-ec work
2009-04-23 16:25:00 +00:00
Dr. Stephen Henson
d07692cd96
Make no-gost work properly.
2009-04-23 16:12:09 +00:00
Dr. Stephen Henson
82ae57136b
Some no-ec fixes (not complete yet).
2009-04-23 15:24:27 +00:00
Dr. Stephen Henson
30baeaaeab
CryptoAPI engine only exists on WIN32.
2009-04-22 17:36:45 +00:00
Dr. Stephen Henson
87a0f4b92e
PR: 1902
...
Add ecdsa/ecdh algorithms to default for speed utility.
2009-04-22 17:31:04 +00:00
Dr. Stephen Henson
1b08bcbfe3
Find openssl utility if on the PATH.
2009-04-22 16:50:42 +00:00
Dr. Stephen Henson
346b1001eb
PR: 1903
...
Submitted by: "Paul Smedley" <pauldespam@despamsmedley.id.au >
Approved by: steve@openssl.org
OS/2 fixes (excludes Makefile.shared patch for now).
2009-04-22 16:21:20 +00:00
Dr. Stephen Henson
b61a84c8e6
Fix WIN32 warnings.
2009-04-22 15:40:54 +00:00
Dr. Stephen Henson
a543ea44bc
Fix WIN32 warning.
2009-04-22 12:17:02 +00:00
Dr. Stephen Henson
b0dd3d1b94
Another kerberos fix.
2009-04-21 22:30:54 +00:00
Dr. Stephen Henson
461be68b75
Change version to beta3-dev
2009-04-21 22:27:41 +00:00
Dr. Stephen Henson
21fb688d26
Some fixes for kerberos builds.
2009-04-21 22:20:12 +00:00
Dr. Stephen Henson
d8faad27b7
Fix RFC num.
2009-04-21 15:42:01 +00:00
Dr. Stephen Henson
dab7075946
Update STATUS.
2009-04-21 15:19:15 +00:00
Dr. Stephen Henson
dfc8e96daa
Fix warning.
2009-04-21 15:11:59 +00:00
Dr. Stephen Henson
71d3eaf358
make update.
2009-04-21 15:02:20 +00:00
Dr. Stephen Henson
ef6b25be63
Beta 2 preparation.
2009-04-21 14:58:57 +00:00
Dr. Stephen Henson
b452f43322
PR: 1751
...
Submitted by: David Woodhouse <dwmw2@infradead.org >
Approved by: steve@openssl.org
Compatibility patches for Cisco VPN client DTLS.
2009-04-19 18:03:13 +00:00
Dr. Stephen Henson
52891f832f
Fix error header files and error files too.
2009-04-19 17:58:01 +00:00
Dr. Stephen Henson
9990cb75c1
PR: 1894
...
Submitted by: Ger Hobbelt <ger@hobbelt.com >
Approved by: steve@openssl.org
Fix various typos and stuff.
2009-04-16 17:22:51 +00:00
Dr. Stephen Henson
a5cc69c7ae
PR: 1900
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Remove unnecessary included header file.
2009-04-16 16:42:02 +00:00
Dr. Stephen Henson
0b4b8ba64e
PR: 1895
...
Submitted by: Ger Hobbelt <ger@hobbelt.com >
Approved by: steve@openssl.org
Updates to mkerr.pl script.
2009-04-15 15:16:29 +00:00
Dr. Stephen Henson
268e78c305
PR: 1899
...
Submitted by: Ger Hobbelt <ger@hobbelt.com >
Approved by: steve@openssl.org
Check for <= 0 when verifying CRL issuers.
2009-04-15 15:07:09 +00:00
Dr. Stephen Henson
c900a78c99
PR: 1828
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Updated DTLS Rentransmission bug patch.
2009-04-15 14:49:36 +00:00
Dr. Stephen Henson
46ffb2dc97
PR #1828 reverted: state save/restore incompatible with 1.0.0-stable.
2009-04-14 15:29:34 +00:00
Dr. Stephen Henson
10acacb3bf
Fix typo and stop WIN32 warnings.
2009-04-14 15:13:35 +00:00
Dr. Stephen Henson
aab790a656
PR: 1829
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
DTLS Timer Bug fix.
2009-04-14 14:33:12 +00:00
Dr. Stephen Henson
1319aad994
PR: 1647
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Update patch for PR#1647.
2009-04-14 14:22:26 +00:00
Dr. Stephen Henson
3c0ce01cea
PR: 1827
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Updated patch for PR #1827
2009-04-14 14:20:57 +00:00
Dr. Stephen Henson
9fcbefebdb
PR: 1828
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Update from 0.9.8-stable.
2009-04-14 14:19:46 +00:00
Dr. Stephen Henson
017d2a887f
PR: 1838
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Updated patch from 0.9.8-stable.
2009-04-14 14:18:16 +00:00
Dr. Stephen Henson
0416482605
Make update.
2009-04-13 11:40:00 +00:00
Dr. Stephen Henson
0f17424918
PR: 1786
...
Submitted by: Ger Hobbelt <ger@hobbelt.com >
Approved by: steve@openssl.org
Add missing IMPLEMENT.
2009-04-13 11:36:19 +00:00
Dr. Stephen Henson
55ed10db21
PR: 1785
...
Submitted by: Ger Hobbelt <ger@hobbelt.com >
Approved by: steve@openssl.org
Properly handle malloc failure.
2009-04-13 11:31:22 +00:00
Dr. Stephen Henson
3877b6bfe9
PR: 1896
...
Submitted by: Ger Hobbelt <ger@hobbelt.com >
Approved by: steve@openssl.org
Remove double sk_*_free() definition and add missing definition to mkstack.pl
2009-04-13 11:26:31 +00:00
Dr. Stephen Henson
a0f32454b6
PR: 1898
...
Submitted by: Ger Hobbelt <ger@hobbelt.com >
Approved by: steve@openssl.org
Include correct headers in selftest.pl generated code.
2009-04-13 11:22:55 +00:00
Dr. Stephen Henson
6fda4d7e5d
PR: 1887
...
Submitted by: "Victor B. Wagner" <vitus@cryptocom.ru >
Approved by: steve@openssl.org
Document/clarify use of some options and include details of GOST algorihthm
usage.
2009-04-10 16:42:28 +00:00
Dr. Stephen Henson
36a252ea46
Typo.
2009-04-10 11:35:31 +00:00
Dr. Stephen Henson
a31a195246
PR: 1887 (part, modified)
...
Submitted by: "Victor B. Wagner" <vitus@cryptocom.ru >
Approved by: steve@openssl.org
Use correct command names in -engine description and fix typo.
2009-04-10 11:25:54 +00:00
Dr. Stephen Henson
5f590d2218
PR: 1887 (part)
...
Submitted by: "Victor B. Wagner" <vitus@cryptocom.ru >
Approved by: steve@openssl.org
Added error codes for ccgost.
2009-04-10 11:07:35 +00:00
Dr. Stephen Henson
791b7bc715
Fix usage messages and lookup digests later in req command.
...
(part of PR #1887 )
2009-04-10 11:00:12 +00:00
Dr. Stephen Henson
19ae090787
Print out registered digest names in dgst utility instead of hard
...
coding them. Modify EVP_MD_do_all() to include registered digest name.
This is a modified version of part of PR#1887.
2009-04-10 10:30:27 +00:00
Dr. Stephen Henson
db3076621b
PR: 1892
...
Fix memory leak when email:move option used.
2009-04-08 15:58:07 +00:00
Dr. Stephen Henson
9ae5743515
Disable SSLv2 cipher suites by default and avoid SSLv2 compatible client
...
hello if no SSLv2 cipher suites are included. This effectively disables
the broken SSLv2 use by default.
2009-04-07 17:01:07 +00:00
Dr. Stephen Henson
c184b140df
Update from 0.9.8-stable.
2009-04-07 16:30:32 +00:00
Dr. Stephen Henson
9d80aa7e3f
Update from 0.9.8-stable
2009-04-07 12:10:59 +00:00
Dr. Stephen Henson
15671a90a9
PR: 1677
...
Submitted by: Vennemann <rvennemann@cool.ms >
Approved by: steve@openssl.org
Call RSA_new() after ENGINE has been set up.
2009-04-06 21:42:11 +00:00
Dr. Stephen Henson
0048464449
Use basename of objxref.pl not whole path in generated header.
2009-04-06 16:16:23 +00:00
Dr. Stephen Henson
b422166ce0
Updates from HEAD.
2009-04-06 16:02:51 +00:00
Dr. Stephen Henson
81be661ae2
PR: 1626
...
Submitted by: Cerutti Pietro <pietro.cerutti@bfh.ch >
Fix manual page.
2009-04-06 15:16:41 +00:00
Dr. Stephen Henson
8681c66eec
PR: 1890
...
Submitted by: "Green, Paul" <Paul.Green@stratus.com >
Approved by: steve@openssl.org
Fixes to --with-zlib-include and --with-zlib-lib and init PRNG for VOS.
2009-04-06 14:31:36 +00:00
Dr. Stephen Henson
69a0034e50
PR: 1899
...
Submitted by: Doug Kaufman <dkaufman@rahul.net >
Approved by: steve@openssl.org
Mingw fixes.
2009-04-06 14:25:02 +00:00
Dr. Stephen Henson
c9a1778134
Fix error codes.
2009-04-05 11:54:34 +00:00
Dr. Stephen Henson
326794e9c6
Change default openssl.cnf to only use issuer+serial option in AKID if no
...
SKID.
2009-04-04 18:09:43 +00:00
Dr. Stephen Henson
2dd5ca1fbc
Make no-ssl2 work including on Win32 builds.
2009-04-04 17:57:34 +00:00
Ben Laurie
3042945ac8
Fix warning.
2009-04-04 13:39:48 +00:00
Dr. Stephen Henson
da29b0d335
Fix for VC++ 6 which chokes on the empty argument.
2009-04-04 11:44:48 +00:00
Dr. Stephen Henson
6abbc68188
PR: 1870
...
Submitted by: kilroy <kilroy@mail.zutom.sk >
Approved by: steve@openssl.org
Handle pkcs12 format correctly by not assuming PEM format straight away.
2009-04-03 17:06:35 +00:00
Dr. Stephen Henson
25f6c7fd8b
Update from 0.9.8-stable.
2009-04-03 16:54:37 +00:00
Dr. Stephen Henson
1cf3571ea4
PR: 1888
...
Submitted by: Tim Rice <tim@multitalents.net >
Approved by: steve@openssl.org
Allow SOCKLEN_T type to be overridden at config time e.g.
./config -DSOCKLEN_T=int
2009-04-03 16:44:40 +00:00
Dr. Stephen Henson
d769e7a58c
PR: 1613
...
Submitted by: "Jean Rebiffe" <jrebiffe@gmail.com >
Approved by: steve@openssl.org
Free section.
2009-04-03 16:21:01 +00:00
Dr. Stephen Henson
fa3619f233
Update version info, fix typo.
2009-04-03 11:50:59 +00:00
Dr. Stephen Henson
a414cbcad3
Update from 0.9.8-stable.
2009-04-03 11:37:47 +00:00
Dr. Stephen Henson
c6196da587
Update from 0.9.8-stable.
2009-04-02 22:28:52 +00:00
Dr. Stephen Henson
5d48762647
Make PKCS12_parse() handle some PKCS#12 files which have their own ideas
...
about settings for local key id...
2009-04-02 17:44:50 +00:00
Dr. Stephen Henson
77e749405d
Fix demo program.
2009-04-02 17:39:25 +00:00
Dr. Stephen Henson
9ccd4e224f
Add USE_SOCKETS.
2009-04-02 15:19:03 +00:00
Dr. Stephen Henson
1dad4f3672
PR: 1882
...
Submitted by: Corinna Vinschen <vinschen@redhat.com >
Approved by: steve@openssl.org
Typo.
2009-04-02 15:04:01 +00:00
Dr. Stephen Henson
59745556b4
Add another one...
2009-04-01 15:22:00 +00:00
Dr. Stephen Henson
fab4447179
PR: 1880
...
Document -ocsp_uri command line switch to x509 utility.
2009-04-01 15:06:28 +00:00
Dr. Stephen Henson
417b8d4705
PR:1880
...
Load config in ts utility.
2009-04-01 14:59:18 +00:00
Dr. Stephen Henson
e614ec4769
Update README.
2009-04-01 08:57:37 +00:00
Dr. Stephen Henson
a6b03f4138
Make update fixing duplicate ASN1 error codes.
2009-04-01 08:55:54 +00:00
Dr. Stephen Henson
809fa4cc59
Update for first beta.
2009-04-01 08:47:28 +00:00
Dr. Stephen Henson
463f448595
Win32 build fixes.
2009-03-31 22:04:25 +00:00
Dr. Stephen Henson
5cd0cf8cce
Fix other read call too.
2009-03-31 21:57:26 +00:00
Dr. Stephen Henson
49cb959494
Use OPENSSL_SYS_WIN32 instead of _WIN32
2009-03-31 21:45:29 +00:00
Dr. Stephen Henson
783a73c47f
Oops.
2009-03-31 21:39:54 +00:00
Dr. Stephen Henson
99bf516908
Add update from 0.9.8-stable branch.
2009-03-31 21:35:55 +00:00
Dr. Stephen Henson
a26c372cfc
Fix shlib version.
2009-03-31 21:21:42 +00:00
Dr. Stephen Henson
ed5ac22e5b
Correct version.
2009-03-31 21:19:17 +00:00
cvs2svn
3d11b8f896
This commit was manufactured by cvs2svn to create branch
...
'OpenSSL_1_0_0-stable'.
2009-03-31 19:54:52 +00:00
Dr. Stephen Henson
70b2186e24
Stop warnings.
2009-03-31 19:54:51 +00:00
Dr. Stephen Henson
64ecdaeca9
HEAD is now 1.1.0
...
The 1.0.0 branch is now OpenSSL_1_0_0-stable
2009-03-31 10:38:37 +00:00
Dr. Stephen Henson
4e74239df1
Update STATUS and NEWS.
2009-03-30 11:33:03 +00:00
Dr. Stephen Henson
aaf35f11d7
Allow use of algorithm and cipher names for dgsts and enc utilities instead
...
of having to manually include each one.
2009-03-30 11:31:50 +00:00
Dr. Stephen Henson
093f5d2c15
Nothing to see here... move along....
2009-03-28 17:12:51 +00:00
Dr. Stephen Henson
7f1c086b21
Update NEWS file.
2009-03-28 16:21:44 +00:00
Dr. Stephen Henson
77ea8c3002
Fix typo in CHANGES.
2009-03-25 22:21:12 +00:00
Dr. Stephen Henson
ddcfc25a6d
Update from stable branch.
2009-03-25 19:02:22 +00:00
Dr. Stephen Henson
4d7b7c62c3
Update CHANGES.
2009-03-25 12:57:50 +00:00
Dr. Stephen Henson
dd009fe655
Update FAQ.
2009-03-25 12:54:47 +00:00
Dr. Stephen Henson
73ba116e96
Update from stable branch.
2009-03-25 12:54:14 +00:00
Dr. Stephen Henson
80b2ff978d
Update from stable branch.
2009-03-25 12:53:50 +00:00
Dr. Stephen Henson
7ce8c95d58
Update from stable branch.
2009-03-25 12:53:26 +00:00
Dr. Stephen Henson
38b6e6c07b
Typo in usage message.
2009-03-23 21:04:23 +00:00
Dr. Stephen Henson
e4e949192b
Submitted by: Victor B. Wagner <vitus@cryptocom.ru>
...
Reviewed by: steve@openssl.org
Check return codes properly in md BIO and dgst command.
2009-03-18 18:53:08 +00:00
Andy Polyakov
4e52b9845e
aes-390x.pl: commentary update.
2009-03-17 20:04:11 +00:00
Andy Polyakov
e22b864846
Make SPARC assembler modules *really* Purify-friendly.
2009-03-17 18:31:08 +00:00
Dr. Stephen Henson
b6af2c7e3e
Submitted by: "Victor B. Wagner" <vitus@cryptocom.ru>
...
Reviewed by: steve@openssl.org
Update ccgost engine to support parameter files.
2009-03-17 15:38:34 +00:00
Andy Polyakov
57db09906b
Excuse myself from integrating sha1-sparcv9a.pl into build system, but
...
make it Purify-friendly...
2009-03-16 13:48:42 +00:00
Andy Polyakov
4c78bc05c4
Make SPARC assembler Pirify-friendly (Purify can't cope with certain
...
PIC constructs).
2009-03-16 13:32:38 +00:00
Dr. Stephen Henson
ef8e772805
Use OPENSSL_assert() instead of assert.
2009-03-15 14:04:42 +00:00
Dr. Stephen Henson
54571ba004
Use correct ctx name.
2009-03-15 14:03:47 +00:00
Dr. Stephen Henson
237d7b6cae
Fix from stable branch.
2009-03-15 13:37:34 +00:00
Dr. Stephen Henson
854a225a27
Update from stable branch.
2009-03-14 18:33:49 +00:00
Dr. Stephen Henson
e39acc1c90
PR: 1864
...
Submitted by: Ger Hobbelt <ger@hobbelt.com >
Reviewed by: steve@openssl.org
Check return value.
2009-03-14 12:39:05 +00:00
Dr. Stephen Henson
a0b76569b2
Update from stable branch.
2009-03-14 12:26:48 +00:00
Dr. Stephen Henson
78625cac82
Submitted by: Victor Duchovni <Victor.Duchovni@morganstanley.com>
...
Reviewed by: steve@openssl.org
Check return value of sk_SSL_COMP_find() properly.
2009-03-12 17:30:29 +00:00
Dr. Stephen Henson
c28a9165f2
PR: 1862
...
Typo.
2009-03-12 17:13:15 +00:00
Dr. Stephen Henson
617298dca3
Update from stable branch.
2009-03-12 17:10:26 +00:00
Dr. Stephen Henson
33ab2e31f3
PR: 1854
...
Submitted by: Oliver Martin <oliver@volatilevoid.net >
Reviewed by: steve@openssl.org
Support GeneralizedTime in ca utility.
2009-03-09 13:59:07 +00:00
Dr. Stephen Henson
bb7ccdfbe2
Update from stable branch.
2009-03-09 13:08:04 +00:00
Dr. Stephen Henson
c836f8ef73
Update from stable branch.
2009-03-09 12:30:10 +00:00
Dr. Stephen Henson
4df100935f
Update from stable branch.
2009-03-09 12:21:19 +00:00
Dr. Stephen Henson
2a0ff7ad20
Typo.
2009-03-08 12:01:20 +00:00
Ben Laurie
c2a548a884
Print IPv6 all 0s correctly (Rob Austein).
2009-03-08 10:54:45 +00:00
Dr. Stephen Henson
77202a85a0
Update from stable branch.
2009-03-07 17:00:23 +00:00
Ben Laurie
73bfcf2226
Don't ask for -iv for ciphers that need no IV.
2009-03-03 15:14:33 +00:00
Ben Laurie
2121f15daf
Use the right length (reported by Quanhong Wang).
2009-03-03 15:12:56 +00:00
Dr. Stephen Henson
b2cf7c6452
Submitted by: "Victor B. Wagner" <vitus@cryptocom.ru>
...
Approved by: steve
Recognise "enable-zlib" in mkdef.pl to handle "zlib" option when passed
to Configure.
2009-02-25 11:55:15 +00:00
Ben Laurie
7587347bc4
Fix memory leak.
2009-02-23 16:40:59 +00:00
Richard Levitte
ae3b4f2336
Make STORE an experimental feature.
2009-02-19 09:43:18 +00:00
Richard Levitte
605b04f661
Make it possible to disable STORE.
2009-02-19 09:42:51 +00:00
Richard Levitte
97132a0f8e
Reference bug.
2009-02-19 09:42:32 +00:00
Dr. Stephen Henson
30e5e39a3d
PR: 1778
...
Increase default verify depth to 100.
2009-02-16 23:23:21 +00:00
Dr. Stephen Henson
2c618ab993
Submitted by: "Victor B. Wagner" <vitus@cryptocom.ru>
...
Reviewed by: steve@openssl.org
Change default Gost parameter set to id_Gost28147_89_CryptoPro_A_ParamSet
2009-02-16 21:52:01 +00:00
Dr. Stephen Henson
b5d5c0a21f
PR: 1843
...
Use correct array size for SHA1 hash.
2009-02-16 21:42:48 +00:00
Richard Levitte
f8ea4757cc
Data not initialised.
...
Notified by Gerardo Ganis <gerardo.ganis@cern.ch >
2009-02-16 15:17:24 +00:00
Dr. Stephen Henson
0ed6b52687
Stop warning about use of *printf() without a format.
2009-02-15 15:29:59 +00:00
Dr. Stephen Henson
a63bf2c53c
Make no-engine work again.
2009-02-15 15:28:18 +00:00
Ben Laurie
b3f3407850
Use new common flags and fix resulting warnings.
2009-02-15 14:08:51 +00:00
Dr. Stephen Henson
477fd4596f
PR: 1835
...
Submitted by: Damien Miller <djm@mindrot.org >
Approved by: steve@openssl.org
Fix various typos.
2009-02-14 21:49:38 +00:00
Dr. Stephen Henson
30b1b28aff
Return correct exit code.
2009-02-12 18:06:11 +00:00
Dr. Stephen Henson
46400c97a9
Avoid leaks in pkcs8 app, tidy code up.
2009-02-12 18:02:47 +00:00
Andy Polyakov
c558c99fd8
rc4-s390x.pl: allow for older assembler and optimize character loop.
2009-02-12 14:48:49 +00:00
Andy Polyakov
13c3a1defa
RC4 for s390x.
2009-02-11 10:01:36 +00:00
Dr. Stephen Henson
aaa29f9e83
Add error checking to obj_xref.pl and add command line support for data
...
file locations.
2009-02-10 13:03:31 +00:00
Dr. Stephen Henson
ede6ef5e08
Submitted by: Peter Sylvester <Peter.Sylvester@edelweb.fr>
...
Reviewed by: steve
If tagging is universal and SET or SEQUENCE set constructed bit.
2009-02-10 12:13:08 +00:00
Andy Polyakov
0f529cbdc3
s390x-mont.pl: optimize prologue.
2009-02-10 08:46:48 +00:00
Andy Polyakov
eb55b9fc19
linux-s390x failed link after assembler pack update.
2009-02-10 07:43:48 +00:00
Andy Polyakov
7012d2a8fa
sha1-sparcv9a.pl: fix bug in commentary section.
2009-02-09 16:03:33 +00:00
Andy Polyakov
8626230a02
s390x assembler pack update.
2009-02-09 15:42:04 +00:00
Andy Polyakov
c23632d3f1
Reserve for "multilib" suffix, the one allowing to perform multi-ABI
...
installations. It's not enabled in Makefiles yet.
2009-02-09 15:11:22 +00:00
Dr. Stephen Henson
3859d7ee78
Just to be awkward Ubuntu 8.10 doesn't like _XOPEN_SOURCE_EXTENDED...
2009-02-06 16:43:52 +00:00
Bodo Möller
d615bceb2d
For -hex, print just one \n
2009-02-02 00:40:29 +00:00
Bodo Möller
7ca1cfbac3
-hex option for openssl rand
...
PR: 1831
Submitted by: Damien Miller
2009-02-02 00:01:28 +00:00
Bodo Möller
d8e8fc4803
Put back a variable deleted by the previous revision,
...
but used in the code.
2009-02-01 01:08:13 +00:00
Dr. Stephen Henson
57f39cc826
Print out UTF8 and NumericString types in ASN1 parsing utility.
2009-01-28 12:54:52 +00:00
Dr. Stephen Henson
6489573224
Update from stable branch.
2009-01-28 12:36:14 +00:00
Dr. Stephen Henson
079e00e646
Typo: just copy across an unknown type.
2009-01-28 12:32:03 +00:00
Richard Levitte
5871ddb016
Because DEC C - sorry, HP C - is picky about features, we need to
...
define _XOPEN_SOURCE_EXTENDED to reach fd_set and timeval types and
functionality.
2009-01-28 07:38:14 +00:00
Richard Levitte
c7ba21493a
Hopefully resolve signed vs unsigned issue.
2009-01-28 07:09:23 +00:00
Richard Levitte
8bf5001612
Do the Camellia part right
2009-01-28 07:01:29 +00:00
Richard Levitte
6ed9dfb23a
Synchronise with Unix build
2009-01-20 05:39:24 +00:00
Ben Laurie
7f62532030
Allow CC to be overridden.
2009-01-18 12:06:37 +00:00
Dr. Stephen Henson
c2c99e2860
Update certificate hash line format to handle canonical format
...
and avoid MD5 dependency.
2009-01-15 13:22:39 +00:00
Dr. Stephen Henson
8125d9f99c
Make PKCS#8 the standard write format for private keys, replacing the
...
ancient SSLeay format.
2009-01-15 12:52:38 +00:00
Dr. Stephen Henson
8e6925b0cd
Add CRYPTO_MDEBUG_ABORT to abort() is there are any memory leaks. This will
...
cause "make test" failures and make resource leaks more obvious.
2009-01-11 20:36:50 +00:00
Dr. Stephen Henson
d7ecd42255
Fix warnings properly this time ;-)
2009-01-11 20:34:23 +00:00
Dr. Stephen Henson
41b7619596
Fix missing prototype warnings then fix different prototype warnings ;-)
2009-01-11 16:17:26 +00:00
Dr. Stephen Henson
211655fcdd
Fix sign-compare warnings.
2009-01-11 15:58:51 +00:00
Dr. Stephen Henson
363bd0b48e
Add a set of standard gcc warning options which are designed to be the
...
minimum requirement for committed code. Added to debug-steve* config targets
for now.
2009-01-11 15:56:32 +00:00
Ben Laurie
60aee6ce15
Add missing entry.
2009-01-09 12:48:02 +00:00
Dr. Stephen Henson
bab534057b
Updatde from stable branch.
2009-01-07 23:44:27 +00:00
Dr. Stephen Henson
cec2af7510
Update FAQ.
2009-01-07 12:15:15 +00:00
Andy Polyakov
6de3683908
Add UltraSPARC VIS-powered SHA1 block procedure.
2009-01-05 14:52:31 +00:00
Lutz Jänicke
fceac0bc74
Fix compilation with -no-comp by adding some more #ifndef OPENSSL_NO_COMP
...
Some #include statements were not properly protected. This will go unnoted
on most systems as openssl/comp.h tends to be installed as a system header
file by default but may become visible when cross compiling.
2009-01-05 14:43:05 +00:00
Richard Levitte
792bbc2374
VMS stuff I forgot...
2009-01-03 09:25:32 +00:00
Ben Laurie
4a94003a51
srvr_ecdh cannot be NULL at this point (Coverity ID 232).
2009-01-02 12:49:07 +00:00
Andy Polyakov
ab4d689832
Makefile.shared: improve portability of commit#17753.
2009-01-02 09:02:27 +00:00
Ben Laurie
23b973e600
Calculate offset correctly. (Coverity ID 233)
2009-01-01 18:30:51 +00:00
Andy Polyakov
b3b201b6f7
Styling update to makefiles: eliminate redundant pipes.
2008-12-30 13:20:17 +00:00
Ben Laurie
d41c785d69
Document dead code.
2008-12-30 13:02:02 +00:00
Andy Polyakov
a370537bde
Styling update to makefiles: $() to denote make substitutions and $${} -
...
shell ones.
2008-12-29 16:17:52 +00:00
Ben Laurie
2bd45dc94c
Apparently s->ctx could be NULL. (Coverity ID 147).
2008-12-29 16:15:27 +00:00
Ben Laurie
121f9e743c
Apparently s->ctx could be NULL at this point (see earlier
...
test). (Coverity ID 148).
2008-12-29 16:13:49 +00:00
Ben Laurie
0eab41fb78
If we're going to return errors (no matter how stupid), then we should
...
test for them!
2008-12-29 16:11:58 +00:00
Ben Laurie
8aa02e97a7
Make sure a bad parameter to RSA_verify_PKCS1_PSS() doesn't lead to a crash.
...
(Coverity ID 135).
2008-12-29 13:35:08 +00:00
Andy Polyakov
a68c7b9171
bn_lib.c: [re-]fix Win64 compiler warning.
2008-12-29 12:44:33 +00:00
Andy Polyakov
5cabcf96e7
Fix "possible loss of data" Win64 compiler warnings.
2008-12-29 12:35:49 +00:00
Ben Laurie
85e878f224
Die earlier if hash is NULL. (Coverity IDs 137 & 138).
2008-12-29 11:54:56 +00:00
Ben Laurie
fe1c7fecf1
Reverse incorrect earlier fix.
2008-12-29 11:47:08 +00:00
Ben Laurie
0e941da6fa
Die earlier if we have no hash function.
2008-12-29 11:46:44 +00:00
Dr. Stephen Henson
2d1cbc85c8
Add standard .cvsignore file.
2008-12-29 00:27:06 +00:00
Dr. Stephen Henson
d195d60a5f
Update steve-debug* options.
2008-12-29 00:25:54 +00:00
Andy Polyakov
e81695205e
x86_64-xlate.pl: support for binary constants, such as 0b1010101.
2008-12-27 14:00:37 +00:00
Andy Polyakov
fe150ac25d
Add modes/cts128.c, Ciphertext Stealing implementation.
2008-12-27 13:40:45 +00:00
Andy Polyakov
bec45a35bb
cmll-x86_64.pl: fix bug in cbc tail processing and comply with Win64 ABI spec.
2008-12-27 13:39:38 +00:00
Andy Polyakov
3b0ee0d2bf
Revisit RT#1801 and complete fix.
2008-12-27 13:32:21 +00:00
Ben Laurie
dde5b979d2
Remove dead code. (Coverity ID 2)
2008-12-27 02:36:24 +00:00
Ben Laurie
57a6ac7c4f
Check scalar->d before we use it (in BN_num_bits()). (Coverity ID 129)
2008-12-27 02:15:16 +00:00
Ben Laurie
9b9cb004f7
Deal with the unlikely event that EVP_MD_CTX_size() returns an error.
...
(Coverity ID 140).
2008-12-27 02:09:24 +00:00
Ben Laurie
6ba71a7173
Handle the unlikely event that BIO_get_mem_data() returns -ve.
2008-12-27 02:00:38 +00:00
Richard Levitte
4ded7b44a8
More synchronisation with Unix
2008-12-26 23:52:06 +00:00
Ben Laurie
1457619e13
Remove misleading dead code. Constify. (Coverity ID 142)
2008-12-26 17:17:21 +00:00
Ben Laurie
ccf529928f
!a && !a->b is clearly wrong! Changed to !a || !a->b (Coverity ID 145).
2008-12-26 15:32:59 +00:00
Ben Laurie
5ceb595dfa
pval must always be set when pk7_cb() does anything (Coverity ID 146).
2008-12-26 15:29:02 +00:00
Richard Levitte
44390fadc0
In BIO_write(), update the write statistics, not the read statistics.
...
PR: 1803
2008-12-25 22:24:17 +00:00
Richard Levitte
974d05a323
Further synchronisation with Unix
2008-12-25 22:04:42 +00:00
Andy Polyakov
0f76640fba
Windows-specific addenum to "engage crypto/modes" commit #17716 .
2008-12-23 15:15:44 +00:00
Andy Polyakov
a11974180f
Patch the omission from prvious commit #17716 .
2008-12-23 11:38:33 +00:00
Andy Polyakov
5d48a66a6a
Engage crypto/modes.
2008-12-23 11:33:01 +00:00
Andy Polyakov
63fc7f848d
crypto/modes: make modes.h selfsufficient and rename block_f to block128_t.
2008-12-23 11:18:45 +00:00
Andy Polyakov
830457ce4f
Optimize CAST for size on 64-bit platforms. For reference, CAST_LONG being
...
unsigned long must be attributed to 16-bit support. As we don't support
16-bit platoforms anymore, there is no reason to waste twice required
space on CAST S-boxes (16KB vs. 8KB) or key schedule.
2008-12-22 15:21:59 +00:00
Andy Polyakov
ea4d5005d9
cmll-x86_64.pl: Win64 SEH section to handle pushf/popf in CBC routine.
2008-12-22 14:15:11 +00:00
Andy Polyakov
9f03d0fc04
Optimize #undef DES_UNROLL for size.
2008-12-22 14:10:42 +00:00
Andy Polyakov
2140659b00
Incidentally http://cvs.openssl.org/chngview?cn=17710 also made it possible
...
to build the library without -D_CRT_NONSTDC_NO_DEPRECATE. This commit
expands it even to apps catalog and actually omits the macro in question
from Configure.
2008-12-22 14:05:42 +00:00
Andy Polyakov
e527201f6b
This _WIN32-specific patch makes it possible to "wrap" OpenSSL in another
...
.DLL, in particular static build. The issue has been discussed in RT#1230
and later on openssl-dev, and mutually exclusive approaches were suggested.
This completes compromise solution suggested in RT#1230.
PR: 1230
2008-12-22 13:54:12 +00:00
Dr. Stephen Henson
70531c147c
Make no-engine work again.
2008-12-20 17:04:40 +00:00
Andy Polyakov
75bbf6e14c
make depend to work with cross-gcc, compensate for msys glitch.
...
PR: 1753
Submitted by: Alon Bar-Lev
2008-12-19 13:35:09 +00:00
Andy Polyakov
702e742515
cmll-x86_64.pl: bug fix and size optimization of Win64 SEH section.
2008-12-19 11:19:19 +00:00
Andy Polyakov
be01f79d3d
x86_64 assembler pack: add support for Win64 SEH.
2008-12-19 11:17:29 +00:00
Andy Polyakov
bf785c9849
x86_64-xlate.pl: fix masm hexadecimal constants.
2008-12-19 11:14:38 +00:00
Andy Polyakov
4db4882402
perlasm/x86* update: support for 3 and 4 argument instructions.
2008-12-17 19:56:48 +00:00
Andy Polyakov
6786f52ada
SEGV in AES_cbc_encrypt in aes-x86_64 assembler module.
...
PR: 1801
Submitted by: Huang Ying
2008-12-17 14:11:30 +00:00
Richard Levitte
2e6a7b3efc
Constify where needed
2008-12-16 13:41:49 +00:00
Richard Levitte
63461b8db1
Remove extraneous semicolons
2008-12-16 10:56:05 +00:00
Richard Levitte
e77228ba11
Stack changes made dso_vms.c not compile properly.
2008-12-16 10:55:26 +00:00
Richard Levitte
5c60b1637a
A few more symbols that are a little bit long for VMS
2008-12-16 10:54:53 +00:00
Richard Levitte
26397d2e8c
Synchronise VMS build system with the Unixly one
2008-12-16 10:54:28 +00:00
Andy Polyakov
85b2c0ce7f
128-bit block cipher modes consolidation. As consolidated functions
...
rely on indirect call to block functions, they are not as fast as
non-consolidated routines. However, performance loss(*) is within
measurement error and consolidation advantages are considered to
outweigh it.
(*) actually one can observe performance *improvement* on e.g.
CBC benchmarks thanks to optimization, which also becomes
shared among ciphers.
2008-12-16 08:39:21 +00:00
Andy Polyakov
f826bf7798
SEED to support OPENSSL_SMALL_FOOTPRINT: ~2x size decrease on x86.
2008-12-16 07:41:21 +00:00
Andy Polyakov
3ebbe8853f
Bring C bn_mul_mont template closer to assembler.
2008-12-16 07:28:38 +00:00
Andy Polyakov
ac71d81e84
no-asm didn't exclude Camellia assembler.
2008-12-16 07:26:53 +00:00
Ben Laurie
a9dbe71ee0
Back out pointless change.
2008-12-13 17:45:49 +00:00
Ben Laurie
ecd3370ba0
*** empty log message ***
2008-12-13 17:45:27 +00:00
Ben Laurie
19d300d07c
Return error if DH_new() fails (Coverity ID 150).
2008-12-13 17:39:53 +00:00
Ben Laurie
071920d9f6
Check for NULL before use (Coverity ID 203).
2008-12-13 17:28:25 +00:00
Ben Laurie
1f6e9bce21
Missing return values (Coverity ID 204).
2008-12-13 17:19:40 +00:00
Dr. Stephen Henson
434ba03ca9
Fix from stable branch.
2008-12-10 17:35:21 +00:00
Lutz Jänicke
d88d941c87
apps/speed.c: children should not inherit buffered I/O
...
PR: 1787
Submitted by: Artur Klauser <aklauser@google.com >
2008-12-10 08:03:47 +00:00
Dr. Stephen Henson
9d44cd1642
Oops should check zero_pos >= 0.
2008-12-08 19:13:06 +00:00
Dr. Stephen Henson
1d4e879106
Handle case where v6stat.zero_pos == 0 correctly.
...
Reported by: Kurt Roeckx <kurt@roeckx.be >, Tobias Ginzler <ginzler@fgan.de > (Debian bug #506111 )
2008-12-07 23:58:44 +00:00
Andy Polyakov
ae381fef5c
Add Camellia assembler x86 and x86_64 modules.
2008-12-03 09:22:51 +00:00
Bodo Möller
48114ec952
experimental-foo support for mk1mf.pl.
2008-12-02 23:50:22 +00:00
Bodo Möller
7a76219774
Implement Configure option pattern "experimental-foo"
...
(specifically, "experimental-jpake").
2008-12-02 01:21:39 +00:00
Dr. Stephen Henson
2900fc8ae1
Don't stop -cipher from working.
2008-11-30 22:01:31 +00:00
Dr. Stephen Henson
e9afa08cd1
Update from stable branch.
2008-11-30 16:09:04 +00:00
Geoff Thorpe
bcaa36fd11
Fix compilation with -DOPENSSL_NO_DEPRECATED.
2008-11-28 22:06:55 +00:00
Geoff Thorpe
71702f7ed0
Clarify a 'chil' engine param that is a little unintuitive.
...
Submitted by: Sander Temme <sander@temme.net >
2008-11-28 22:04:49 +00:00
Dr. Stephen Henson
fd252de312
Update libeay.num
2008-11-24 17:46:29 +00:00
Dr. Stephen Henson
349e78e2e8
Stop warning about different const qualifiers.
2008-11-24 17:39:42 +00:00
Dr. Stephen Henson
79bd20fd17
Update from stable-branch.
2008-11-24 17:27:08 +00:00
Dr. Stephen Henson
d0c3628834
Set memory BIOs up properly when stripping text headers from S/MIME messages.
2008-11-21 18:18:13 +00:00
Geoff Thorpe
31636a3ed1
Allow the CHIL engine to load even if dynamic locks aren't registered.
...
Submitted by: Sander Temme
2008-11-19 14:21:27 +00:00
Ben Laurie
f3b7bdadbc
Integrate J-PAKE and TLS-PSK. Increase PSK buffer size. Fix memory leaks.
2008-11-16 12:47:12 +00:00
Ben Laurie
ad7159ea84
Ignore generated ASM.
2008-11-16 12:32:14 +00:00
Dr. Stephen Henson
0b0dbb2cac
Don't disable JPAKE by default in head...
2008-11-15 17:36:49 +00:00
Dr. Stephen Henson
12bf56c017
PR: 1574
...
Submitted by: Jouni Malinen <j@w1.fi >
Approved by: steve@openssl.org
Ticket override support for EAP-FAST.
2008-11-15 17:18:12 +00:00
Andy Polyakov
93c4ba07d7
x86_64-xlate.pl update, engage x86_64 assembler in mingw64.
2008-11-14 16:40:37 +00:00
Bodo Möller
36d46234c7
warnings (mostly)
2008-11-14 00:22:02 +00:00
Ben Laurie
774b2fe700
Aftermath of a clashing size_t fix (now only format changes).
2008-11-13 09:48:47 +00:00
Ben Laurie
6c901ae8c1
Ignore saved Makefile.
2008-11-13 09:31:37 +00:00
Ben Laurie
90c65a9838
J-PAKE is not experimental in HEAD.
2008-11-13 09:31:08 +00:00
Dr. Stephen Henson
5eba1ab346
Oops...
2008-11-12 19:02:25 +00:00
Dr. Stephen Henson
4e50072d56
mk1mf.pl update from stable branch.
2008-11-12 18:52:58 +00:00
Dr. Stephen Henson
dd9557a8ba
Revert another size_t change.
2008-11-12 18:47:24 +00:00
Dr. Stephen Henson
ed551cddf7
Update from stable branch.
2008-11-12 17:28:18 +00:00
Dr. Stephen Henson
5aca224ecd
Reinstate camellia header fix patch.
2008-11-12 17:02:40 +00:00
Andy Polyakov
dab6293482
Configure update: clean-ups and most notably engage x86_64 assembler
...
on MacOS X.
2008-11-12 08:21:20 +00:00
Andy Polyakov
1416aec60d
Update make rules for x86_64 assembler pack.
2008-11-12 08:19:04 +00:00
Andy Polyakov
aa8f38e49b
x86_64 assembler pack to comply with updated styling x86_64-xlate.pl rules.
2008-11-12 08:15:52 +00:00
Andy Polyakov
8525377265
x86_64-xlate.pl to support MacOS X and mingw64.
2008-11-12 08:05:58 +00:00
Andy Polyakov
2fbc8a2aad
Revert commit #17603 , it should have been part of #17617 .
2008-11-12 07:27:36 +00:00
Geoff Thorpe
6343829a39
Revert the size_t modifications from HEAD that had led to more
...
knock-on work than expected - they've been extracted into a patch
series that can be completed elsewhere, or in a different branch,
before merging back to HEAD.
2008-11-12 03:58:08 +00:00
Dr. Stephen Henson
2401debe83
Tolerate -----BEGIN PKCS #7 SIGNED DATA----- header lines as used by some
...
implementations.
2008-11-11 12:38:25 +00:00
Dr. Stephen Henson
5c61111bff
Update from stable branch.
2008-11-11 12:23:18 +00:00
Dr. Stephen Henson
bc645199c0
Update from stable branch.
2008-11-11 10:17:54 +00:00
Bodo Möller
0a8c9f7de1
symbol deobnoxification
2008-11-11 07:08:59 +00:00
Dr. Stephen Henson
7b808412c9
Make -DKSSL_DEBUG work again.
2008-11-10 19:08:37 +00:00
Lutz Jänicke
706c5a4d35
Clarify (non-)blocking behavior of EGD socket interface used by RAND_egd().
2008-11-10 11:26:44 +00:00
Dr. Stephen Henson
0afc9f5bc0
PR: 1777
...
Submitted by: "Alon Bar-Lev" <alon.barlev@gmail.com >
Approved by: steve@openssl.org
Fix some size_t issues.
2008-11-05 23:14:32 +00:00
Dr. Stephen Henson
2e5975285e
Update obsolete email address...
2008-11-05 18:39:08 +00:00
Dr. Stephen Henson
5947ca0409
Don't use clobbered 'i' for checking UTCTime and GeneralizedTime length.
2008-11-05 18:28:24 +00:00
Ben Laurie
d40a1b865f
Only one of these needs to be signed.
2008-11-04 15:16:23 +00:00
Ben Laurie
f80921b6a6
Formatting.
2008-11-04 12:06:09 +00:00
Andy Polyakov
9be5481297
Add initial support for mingw64.
...
PR: 1693
Submitted by: Alon Bar-Lev
2008-11-03 21:15:07 +00:00
Andy Polyakov
8fe8bae15a
Minor perlasm updates.
2008-11-03 08:46:07 +00:00
Dr. Stephen Henson
f2c0230518
Not sure about this one... seems to be needed to make 64 bit release
...
builds work properly...
2008-11-02 18:29:27 +00:00
Dr. Stephen Henson
e6e0c9018c
Fix prototypes.
2008-11-02 18:12:36 +00:00
Dr. Stephen Henson
9619b730b4
Use stddef.h to pick up size_t def.
2008-11-02 16:56:13 +00:00
Dr. Stephen Henson
2766515fca
Fix prototypes.
2008-11-02 16:13:19 +00:00
Dr. Stephen Henson
87d52468aa
Update HMAC functions to return an error where relevant.
2008-11-02 16:00:39 +00:00
Dr. Stephen Henson
70d71f6185
Fix warnings: printf format mismatches on 64 bit platforms.
...
Change assert to OPENSSL_assert().
Fix e_padlock prototype.
2008-11-02 15:41:30 +00:00
Ben Laurie
5ee92a5ec1
Fix asserts. Fix incorrect dependency.
2008-11-02 13:15:06 +00:00
Dr. Stephen Henson
c76fd290be
Fix warnings about mismatched prototypes, undefined size_t and value computed
...
not used.
2008-11-02 12:50:48 +00:00
Ben Laurie
d0a20cafa1
Fix warnings.
2008-11-02 09:22:29 +00:00
Ben Laurie
8da07655ee
Fix warning.
2008-11-02 09:00:25 +00:00
Andy Polyakov
befe1fbc29
Fix bss_log.c on Windows.
2008-11-01 21:09:54 +00:00
Ben Laurie
5e4430e70d
More size_tification.
2008-11-01 16:40:37 +00:00
Ben Laurie
4d6e1e4f29
size_tification.
2008-11-01 14:37:00 +00:00
Andy Polyakov
122396f2db
Fix SHA512 and optimize BN for mingw64.
2008-11-01 12:46:18 +00:00
Andy Polyakov
09a60c9833
Fix warnings after commit#17578.
2008-10-31 20:20:54 +00:00
Andy Polyakov
b444ac3e6f
size_t-fy EVP_CIPHER. Note that being size_t-fied it doesn't require
...
underlying cipher to be size_t-fied, it allows for size_t, signed and
unsigned long. It maintains source and even binary compatibility.
2008-10-31 19:48:25 +00:00
Andy Polyakov
f768be81d8
size_t-fy AES, Camellia and RC4.
2008-10-31 19:30:11 +00:00
Dr. Stephen Henson
91173829db
Add install target to crypto/jpake/Makefile
2008-10-31 12:06:25 +00:00
Ben Laurie
bfaead2b12
Fix warning.
2008-10-29 05:10:09 +00:00
Andy Polyakov
e6b4578540
randfile.c: .rnd can become orphaned on VMS.
...
Submitted by: David North
2008-10-28 16:25:47 +00:00
Andy Polyakov
0dd4850ee0
.cvsignore update: ignore all flavors of shared objects.
2008-10-28 15:29:25 +00:00
Andy Polyakov
c650168a4f
Fix typo in ./config.
...
Submitted by: Sander Temme
2008-10-28 15:09:06 +00:00
Andy Polyakov
ea71ec1b11
ec2_mult.c readability update.
2008-10-28 13:53:51 +00:00
Andy Polyakov
f1455b3063
Minor clean-up in bn_lib.c: constification and optimization.
2008-10-28 13:52:51 +00:00
Andy Polyakov
b764f82c64
Fix crash in BN_rshift.
...
PR: 1663
2008-10-28 13:46:14 +00:00
Andy Polyakov
436bdcff4e
Harmonize Camellia API with version 1.x.
2008-10-28 12:13:52 +00:00
Andy Polyakov
27f864e8ac
Camellia update. Quoting camellia.c:
...
/*
* This release balances code size and performance. In particular key
* schedule setup is fully unrolled, because doing so *significantly*
* reduces amount of instructions per setup round and code increase is
* justifiable. In block functions on the other hand only inner loops
* are unrolled, as full unroll gives only nominal performance boost,
* while code size grows 4 or 7 times. Also, unlike previous versions
* this one "encourages" compiler to keep intermediate variables in
* registers, which should give better "all round" results, in other
* words reasonable performance even with not so modern compilers.
*/
2008-10-28 08:47:24 +00:00
Andy Polyakov
80aa9cc985
x86_64-xlate.pl update: refine SEH support.
2008-10-28 08:40:07 +00:00
Dr. Stephen Henson
ab7e09f59b
Win32 fixes... add new directory to build system. Fix warnings.
2008-10-27 12:31:13 +00:00
Dr. Stephen Henson
e9eda23ae6
Fix warnings and various issues.
...
C++ style comments.
Signed/unsigned warning in apps.c
Missing targets in jpake/Makefile
2008-10-27 12:02:52 +00:00
Ben Laurie
6caa4edd3e
Add JPAKE.
2008-10-26 18:40:52 +00:00
Dr. Stephen Henson
ac786241a2
Add support for -crlnumber option in crl utility.
2008-10-22 19:54:55 +00:00
Dr. Stephen Henson
df0681e554
Add permanentIdentifier OID.
2008-10-22 18:48:11 +00:00
Dr. Stephen Henson
e19106f5fb
Create function of the form OBJ_bsearch_xxx() in bsearch typesafe macros
...
with the appropriate parameters which calls OBJ_bsearch(). A compiler will
typically inline this.
This avoids the need for cmp_xxx variables and fixes unchecked const issues
with CHECKED_PTR_OF()
2008-10-22 15:43:01 +00:00
Geoff Thorpe
ae7ec4c71d
Apparently '__top' is also risky, obfuscate further. (All this to
...
avoid inlines...)
2008-10-22 12:00:15 +00:00
Lutz Jänicke
020d67fb89
Allow detection of input EOF in quiet mode by adding -no_ign_eof option
...
to s_client application.
PR: #1761
Submitted by: David Woodhouse <dwmw2@infradead.org >
2008-10-22 06:46:14 +00:00
Geoff Thorpe
3fdc6c11aa
Use of a 'top' var creates "shadow variable" warnings.
2008-10-22 01:25:45 +00:00
Dr. Stephen Henson
dcf6b3e9b6
Reinstate obj_xref.h as it is not auto generated on all platforms.
2008-10-20 15:12:48 +00:00
Dr. Stephen Henson
606f6c477a
Fix a shed load or warnings:
...
Duplicate const.
Use of ; outside function.
2008-10-20 15:12:00 +00:00
Lutz Jänicke
1581f82243
Add missing "-d" to option list of openssl version.
...
Submitted by: Alex Chen <alex_chen@filemaker.com >
2008-10-20 12:53:36 +00:00
Ben Laurie
0d6f9c7181
Constification.
2008-10-19 22:51:27 +00:00
Dr. Stephen Henson
640b86cb24
Fix Warning...
2008-10-19 17:22:34 +00:00
Dr. Stephen Henson
111a6e2a23
Fix multiple ; warning.
2008-10-18 15:02:59 +00:00
Ben Laurie
d764e7edb8
Fix warning a different way.
2008-10-18 12:12:34 +00:00
Andy Polyakov
aff8259510
Fix argument order in BN_nnmod call and implement rigorous boundary
...
condition check.
2008-10-16 07:54:41 +00:00
Andy Polyakov
256b3e9c5f
Optimize bn_correct_top.
2008-10-15 10:48:52 +00:00
Andy Polyakov
762a2e3cab
Remove redundant BN_ucmp, fix boundary condition in BN_nist_mod_224 and
...
reimplement BN_nist_mod_521.
2008-10-15 10:47:48 +00:00
Ben Laurie
28b6d5020e
Set comparison function in v3_add_canonize().
2008-10-14 19:27:07 +00:00
Ben Laurie
d5bbead449
Add XMPP STARTTLS support.
2008-10-14 19:11:26 +00:00
Dr. Stephen Henson
0f7efbc859
Ooops... remove code accidentally commited from FIPS version.
2008-10-14 15:44:14 +00:00
Dr. Stephen Henson
a7ae4abfd9
Add missing lock definitions...
2008-10-14 15:24:49 +00:00
Dr. Stephen Henson
30661b1b01
Add missing lock definitions.
2008-10-14 15:22:11 +00:00
Ben Laurie
1ea6472e60
Type-safe OBJ_bsearch_ex.
2008-10-14 08:10:52 +00:00
Lutz Jänicke
b8dfde2a36
Remove the DTLS1_BAD_VER thing from 0.9.9-dev. It is present in 0.9.8
...
but has been omitted from HEAD (0.9.9), see commit
http://cvs.openssl.org/chngview?cn=16627
by appro.
2008-10-13 06:45:59 +00:00
Lutz Jänicke
570006f3a2
Half of the commit for 0.9.8 as the bitmap handling has changed.
...
(Firstly... ommitted)
Secondly, it wasn't even _dropping_ the offending packets, in the
non-blocking case. It was just returning garbage instead.
PR: #1752
Submitted by: David Woodhouse <dwmw2@infradead.org >
2008-10-13 06:43:03 +00:00
Ben Laurie
babb379849
Type-checked (and modern C compliant) OBJ_bsearch.
2008-10-12 14:32:47 +00:00
Ben Laurie
6665ef303e
Add missing DTLS1_BAD_VER (hope I got the value right).
2008-10-12 14:04:34 +00:00
Lutz Jänicke
7e7af0bc51
When the underlying BIO_write() fails to send a datagram, we leave the
...
offending record queued as 'pending'. The DTLS code doesn't expect this,
and we end up hitting an OPENSSL_assert() in do_dtls1_write().
The simple fix is just _not_ to leave it queued. In DTLS, dropping
packets is perfectly acceptable -- and even preferable. If we wanted a
service with retries and guaranteed delivery, we'd be using TCP.
PR: #1703
Submitted by: David Woodhouse <dwmw2@infradead.org >
2008-10-10 10:41:35 +00:00
Dr. Stephen Henson
87d3a0cd90
Experimental new date handling routines. These fix issues with X509_time_adj()
...
and should avoid any OS date limitations such as the year 2038 bug.
2008-10-07 22:55:27 +00:00
Lutz Jänicke
1e369b375e
Fix incorrect command for assember file generation on IA64
...
Submitted by: Amadeu A. Barbosa Jr <amadeu@tecgraf.puc-rio.br >
2008-10-06 10:34:49 +00:00
Andy Polyakov
6bf24568bc
Fix EC_KEY_check_key.
2008-09-23 17:33:11 +00:00
Bodo Möller
837f2fc7a4
Make sure that SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG can't
...
enable disabled ciphersuites.
2008-09-22 21:22:47 +00:00
Bodo Möller
1a489c9af1
From branch OpenSSL_0_9_8-stable: Allow soft-loading engines.
...
Also, fix CHANGES (consistency with stable branch).
2008-09-15 20:41:24 +00:00
Dr. Stephen Henson
8c864e5466
Add missing CHANGES entry.
2008-09-15 20:30:58 +00:00
Bodo Möller
be5707c820
from 0.9.8 branch
2008-09-15 20:30:17 +00:00
Dr. Stephen Henson
4a4f3071ec
Update FAQ.
2008-09-15 11:27:58 +00:00
Andy Polyakov
d7235a9d68
Fix yesterday typos in bss_dgram.c.
2008-09-15 05:43:04 +00:00
Geoff Thorpe
fa0f834c20
Fix build warnings.
2008-09-15 04:02:37 +00:00
Bodo Möller
96562f2fb3
update comment
2008-09-14 19:50:55 +00:00
Andy Polyakov
b9790c1cd4
Winsock handles SO_RCVTIMEO in unique manner...
...
PR: 1648
2008-09-14 19:22:52 +00:00
Bodo Möller
fcbdde0dfe
oops
2008-09-14 18:16:07 +00:00
Andy Polyakov
51ec776b7d
dtls1_write_bytes consumers expect amount of bytes written per call, not
...
overall.
PR: 1604
2008-09-14 17:56:15 +00:00
Bodo Möller
e65bcbcef0
Fix SSL state transitions.
...
Submitted by: Nagendra Modadugu
2008-09-14 14:02:07 +00:00
Bodo Möller
e710de12ce
Note about CVS branch inconsistency.
2008-09-14 13:53:18 +00:00
Bodo Möller
db99c52509
Really get rid of unsafe double-checked locking.
...
Also, "CHANGES" clean-ups.
2008-09-14 13:51:44 +00:00
Bodo Möller
f8d6be3f81
Some precautions to avoid potential security-relevant problems.
2008-09-14 13:42:34 +00:00
Andy Polyakov
d493899579
DTLS didn't handle alerts correctly.
...
PR: 1632
2008-09-13 18:24:38 +00:00
Andy Polyakov
492279f6f3
AIX build updates.
2008-09-12 14:45:54 +00:00
Dr. Stephen Henson
3ad74edce8
Add SSL_FIPS flag for FIPS 140-2 approved ciphersuites and add a new
...
strength "FIPS" to represent all FIPS approved ciphersuites without NULL
encryption.
2008-09-10 16:02:09 +00:00
Ben Laurie
2b7b1cad10
Ignoring errors in makedepend can hide problems.
2008-09-09 19:08:40 +00:00
Ben Laurie
43048d13c8
Fix warning.
2008-09-07 13:22:34 +00:00
Dr. Stephen Henson
e8da6a1d0f
Fix from stable branch.
2008-09-03 22:17:11 +00:00
Dr. Stephen Henson
305514000c
Do not discard cached handshake records during resumed sessions:
...
they are used for mac computation.
2008-09-03 12:36:16 +00:00
Dr. Stephen Henson
0702150f53
Make no-tlsext compile.
2008-09-03 12:29:57 +00:00
Dr. Stephen Henson
a0ee081515
Perl script to run and verify OpenSSL against PKITS RFC3280 compliance
...
test suite.
2008-09-01 15:53:53 +00:00
Dr. Stephen Henson
d43c4497ce
Initial support for delta CRLs. If "use deltas" flag is set attempt to find
...
a delta CRL in addition to a full CRL. Check and search delta in addition to
the base.
2008-09-01 15:15:16 +00:00
Dr. Stephen Henson
4b96839f06
Add support for CRLs partitioned by reason code.
...
Tidy CRL scoring system.
Add new CRL path validation error.
2008-08-29 11:37:21 +00:00
Dr. Stephen Henson
249a77f5fb
Add support for freshest CRL extension.
2008-08-27 15:52:05 +00:00
Dr. Stephen Henson
d0fff69dc9
Initial indirect CRL support.
2008-08-20 16:42:19 +00:00
Dr. Stephen Henson
8c9bd89338
Support for certificateIssuer CRL entry extension.
2008-08-18 16:48:47 +00:00
Bodo Möller
2e415778f2
Don't use assertions to check application-provided arguments;
...
and don't unnecessarily fail on input size 0.
2008-08-14 21:37:51 +00:00
Bodo Möller
1cbf663a6c
sanity check
...
PR: 1679
2008-08-13 19:45:06 +00:00
Bodo Möller
9be8035b11
fix error function codes
2008-08-13 19:44:15 +00:00
Bodo Möller
2ecd2edede
Mention ERR_remove_state() deprecation, and ERR_remove_thread_state(NULL).
2008-08-13 19:30:01 +00:00
Dr. Stephen Henson
9d84d4ed5e
Initial support for CRL path validation. This supports distinct certificate
...
and CRL signing keys.
2008-08-13 16:00:11 +00:00
Dr. Stephen Henson
2e0c7db950
Initial code to support distinct certificate and CRL signing keys where the
...
CRL issuer is not part of the main path.
Not complete yet and not compiled in because the CRL issuer certificate is
not validated.
2008-08-12 16:07:52 +00:00
Dr. Stephen Henson
002e66c0e8
Support for policy mappings extension.
...
Delete X509_POLICY_REF code.
Fix handling of invalid policy extensions to return the correct error.
Add command line option to inhibit policy mappings.
2008-08-12 10:32:56 +00:00
Dr. Stephen Henson
e9746e03ee
Initial support for name constraints certificate extension.
...
TODO: robustness checking on name forms.
2008-08-08 15:35:29 +00:00
Geoff Thorpe
ab9c689ad3
Correct the FAQ and the threads man page re: CRYPTO_THREADID changes.
2008-08-06 16:41:50 +00:00
Geoff Thorpe
4c3296960d
Remove the dual-callback scheme for numeric and pointer thread IDs,
...
deprecate the original (numeric-only) scheme, and replace with the
CRYPTO_THREADID object. This hides the platform-specifics and should reduce
the possibility for programming errors (where failing to explicitly check
both thread ID forms could create subtle, platform-specific bugs).
Thanks to Bodo, for invaluable review and feedback.
2008-08-06 15:54:15 +00:00
Andy Polyakov
96826bfc84
sha1-armv4-large cosmetics.
2008-08-06 08:58:45 +00:00
Andy Polyakov
eb1aa135d8
sha1-armv4-large.pl performance improvement. On PXA255 it gives +10% on
...
8KB block, +60% on 1KB, +160% on 256B...
2008-08-06 08:47:07 +00:00
Geoff Thorpe
99649b5990
Fix signed/unsigned warning.
2008-08-05 17:48:02 +00:00
Dr. Stephen Henson
6d6c47980e
Correctly handle errors in CMS I/O code.
2008-08-05 15:55:53 +00:00
Bodo Möller
474b3b1cc8
Fix error codes for memory-saving patch.
...
Also, get rid of compile-time switch OPENSSL_NO_RELEASE_BUFFERS
because it was rather pointless (the new behavior has to be explicitly
requested by setting SSL_MODE_RELEASE_BUFFERS anyway).
2008-08-04 22:10:38 +00:00
Dr. Stephen Henson
3e727a3b37
Add support for nameRelativeToCRLIssuer field in distribution point name
...
fields.
2008-08-04 15:34:27 +00:00
Dr. Stephen Henson
a9ff742e42
Make explicit_policy handling match expected RFC3280 behaviour.
2008-08-02 11:16:35 +00:00
Lutz Jänicke
787287af40
Refer to SSL_pending from the man page for SSL_read
2008-08-01 15:03:20 +00:00
Dr. Stephen Henson
5cbd203302
Initial support for alternative CRL issuing certificates.
...
Allow inibit any policy flag to be set in apps.
2008-07-30 15:49:12 +00:00
Dr. Stephen Henson
592a207b94
Policy validation fixes.
...
Inhibit any policy count should ignore self issued certificates.
Require explicit policy is the number certificate before an explict policy
is required.
2008-07-30 15:41:42 +00:00
Ralf S. Engelschall
6bcbac0abb
remove a doubled entry for '-binary' in the usage message
2008-07-27 15:51:35 +00:00
Andy Polyakov
4c048211f1
Split ms/uplink.pl to corresponding platform versions.
2008-07-22 08:47:35 +00:00
Andy Polyakov
b94551e823
perlasm update: implement dataseg directive.
2008-07-22 08:44:31 +00:00
Andy Polyakov
9b634c9b37
x86_64-xlate.pl: implement indirect jump/calls, support for Win64 SEH.
2008-07-22 08:42:06 +00:00
Bodo Möller
5b331ab77a
We should check the eight bytes starting at p[-9] for rollback attack
...
detection, or the probability for an erroneous RSA_R_SSLV3_ROLLBACK_ATTACK
will be larger than necessary.
PR: 1695
2008-07-17 22:11:53 +00:00
Andy Polyakov
dd6f479ea8
mem_dbg.c: avoid compiler warnings.
...
PR: 1693
Submitted by: Stefan Neis
2008-07-17 13:58:21 +00:00
Andy Polyakov
87facba376
Remove junk argument to function_begin in sha/asm/*-586.pl.
...
PR: 1681
2008-07-17 09:50:56 +00:00
Andy Polyakov
e4662fdb62
x86masm.pl: harmonize functions' alignment.
2008-07-17 09:46:09 +00:00
Bodo Möller
efa73a77e4
Make sure not to read beyond end of buffer
2008-07-16 18:10:27 +00:00
Andy Polyakov
89778b7f3f
x86_64cpuid.pl cosmetics: harmonize $dir treatment with other modules.
2008-07-15 19:52:20 +00:00
Andy Polyakov
c79c5a256b
des-596.pl update: short-circuit reference to DES_SPtrans.
2008-07-15 13:24:16 +00:00
Andy Polyakov
9960bdc6fa
x86masm.pl cosmetics.
2008-07-15 13:16:42 +00:00
Andy Polyakov
23dcb447ff
x86nasm.pl update: use pre-defined macros and allow for /safeseh link.
2008-07-15 12:50:44 +00:00
Andy Polyakov
39c63e162c
Reaffirm that NASM is the only supported assembler for Win32 build.
2008-07-15 12:48:53 +00:00
Dr. Stephen Henson
34d05a4023
Zero is a valid value for any_skip and map_skip
2008-07-13 22:38:18 +00:00
Dr. Stephen Henson
dcc0c29876
We support inhibit any policy extension, add to table.
2008-07-13 15:55:37 +00:00
Dr. Stephen Henson
db50661fce
X509 verification fixes.
...
Ignore self issued certificates when checking path length constraints.
Duplicate OIDs in policy tree in case they are allocated.
Use anyPolicy from certificate cache and not current tree level.
2008-07-13 14:25:36 +00:00
Geoff Thorpe
f9afd9f861
If --prefix="C:\foo\bar" is supplied to Configure for a windows target,
...
then the backslashes need escaping to avoid being treated as switches in
the auto-generated strings in opensslconf.h. Perl users are welcome to
suggest a less hokey way of doing this ...
2008-07-10 20:08:47 +00:00
Dr. Stephen Henson
d4cdbab99b
Avoid warnings with -pedantic, specifically:
...
Conversion between void * and function pointer.
Value computed not used.
Signed/unsigned argument.
2008-07-04 23:12:52 +00:00
Geoff Thorpe
5f834ab123
Revert my earlier CRYPTO_THREADID commit, I will commit a reworked
...
version some time soon.
2008-07-03 19:59:25 +00:00
Dr. Stephen Henson
8528128b2a
Update from stable branch.
2008-06-26 23:27:31 +00:00
Dr. Stephen Henson
a0f3679b52
Update from stable branch.
2008-06-25 10:43:07 +00:00
Bodo Möller
8228fd89fc
avoid potential infinite loop in final reduction round of BN_GF2m_mod_arr()
...
Submitted by: Huang Ying
Reviewed by: Douglas Stebila
2008-06-23 20:46:24 +00:00
Dr. Stephen Henson
869eb9e767
Update ordinals.
2008-06-22 01:09:14 +00:00
Dr. Stephen Henson
6c2878344f
Fix from stable branch.
2008-06-21 23:28:55 +00:00
Dr. Stephen Henson
2836cb3816
Update from stable branch.
2008-06-18 15:08:41 +00:00
Dr. Stephen Henson
46d4782888
Update from stable branch.
2008-06-18 12:06:10 +00:00
Dr. Stephen Henson
a01a351cc2
Update from stable branch.
2008-06-16 15:51:48 +00:00
Dr. Stephen Henson
adb92d56eb
Add acknowledgement.
2008-06-09 16:48:42 +00:00
Dr. Stephen Henson
ce04f91951
Sync ordinals.
2008-06-06 15:57:16 +00:00
Dr. Stephen Henson
6cb9fca70d
Fix memory leak. The canonical X509_NAME_ENTRY STACK is reallocated rather
...
than referencing existing X509_NAME_ENTRY structures so needs to be
completely freed.
2008-06-06 11:26:07 +00:00
Dr. Stephen Henson
ec0bfca7e7
Remove uidlg library from VC-32.pl, it is now bound at runtime.
2008-06-05 23:42:04 +00:00
Dr. Stephen Henson
1cd504e7be
Don't change _WIN32_WINNT and detect GetConsoleWindow() and
...
CryptUIDlgSelectCertificateFromStore() at runtime. Add callback function
for selection mechanism.
2008-06-05 23:19:56 +00:00
Dr. Stephen Henson
11f3cee93b
Update from stable branch.
2008-06-05 17:04:16 +00:00
Dr. Stephen Henson
6bf79e30ea
Update CHANGES.
2008-06-05 15:34:24 +00:00
Dr. Stephen Henson
7555c9337f
Update from stable branch.
2008-06-05 15:13:45 +00:00
Dr. Stephen Henson
ffc2b3e927
Update from stable branch.
2008-06-05 11:45:25 +00:00
Dr. Stephen Henson
9ab89286a2
Sync ordinals with stable branch.
2008-06-05 11:10:49 +00:00
Dr. Stephen Henson
5329130333
Link in extra CryptoAPI related libraries if needed.
2008-06-05 10:51:48 +00:00
Dr. Stephen Henson
e1451bb51d
Update from stable branch.
2008-06-04 23:03:28 +00:00
Dr. Stephen Henson
0b44c26d78
Remove test fprintf.
2008-06-04 22:39:05 +00:00
Dr. Stephen Henson
4db9677bac
Compilation option to use a specific ssl client auth engine automatically.
2008-06-04 22:34:38 +00:00
Dr. Stephen Henson
1381bf90f4
Use an appropriate Window for selection dialog.
2008-06-04 16:45:05 +00:00
Dr. Stephen Henson
e0f7b87227
Add support for Windoes dialog box based certificate selection.
2008-06-04 16:10:09 +00:00
Dr. Stephen Henson
985de86340
Remove old non-safestack code.
2008-06-04 14:34:39 +00:00
Dr. Stephen Henson
b814c01a76
Tidy up and add comments to selection code.
2008-06-04 12:03:57 +00:00
Dr. Stephen Henson
c07a126fb2
Make DSO WIN32 compile again.
2008-06-04 11:53:14 +00:00
Dr. Stephen Henson
09a6e19431
Update ordinals.
2008-06-04 11:52:36 +00:00
Dr. Stephen Henson
863d447e0b
Remove store from Windows build.
2008-06-04 11:45:15 +00:00
Ben Laurie
5ce278a77b
More type-checking.
2008-06-04 11:01:43 +00:00
Dr. Stephen Henson
37cf49a3df
Avoid name clash.
2008-06-04 10:57:38 +00:00
Ben Laurie
f79262e94b
Only include windows headers when under windows.
2008-06-04 05:21:13 +00:00
Dr. Stephen Henson
7d537d4fc7
Add initial support for multiple SSL client certifcate selection in
...
CryptoAPI ENGINE.
2008-06-03 23:54:31 +00:00
Dr. Stephen Henson
ca89fc1fb4
Match empty CA list to anything for ssl client auth in CryptoAPI engine.
2008-06-03 11:37:52 +00:00
Dr. Stephen Henson
59d2d48f64
Add support for client cert engine setting in s_client app.
...
Add appropriate #ifdefs round client cert functions in headers.
2008-06-03 11:26:27 +00:00
Dr. Stephen Henson
b3c8dd4eab
Add preliminary SSL client auth callback to CryptoAPI ENGINE.
2008-06-03 10:27:39 +00:00
Dr. Stephen Henson
45d3767d28
Prevent signed/unsigned warning on VC++
2008-06-03 10:17:45 +00:00
Ben Laurie
8671b89860
Memory saving patch.
2008-06-03 02:48:34 +00:00
Dr. Stephen Henson
4f7f411719
Update year.
2008-06-02 23:41:38 +00:00
Dr. Stephen Henson
eac442ddd3
Windows batch file to rebuild error codes for CryptoAPI ENGINE.
2008-06-02 23:10:34 +00:00
Dr. Stephen Henson
55bef26d8a
#undef OCSP_RESPONSE: CryptoAPI uses this too.
2008-06-02 23:09:04 +00:00
Dr. Stephen Henson
2aa2a5775f
Fix indentation.
2008-06-02 14:29:32 +00:00
Dr. Stephen Henson
c451bd828f
Avoid case in ca.c fix.
2008-06-02 12:10:06 +00:00
Dr. Stephen Henson
8ecfbedd85
Revert, doesn't fix warning :-(
2008-06-02 10:42:57 +00:00
Dr. Stephen Henson
c173fce4e2
Avoid cast with wrapper function.
2008-06-02 10:37:53 +00:00
Dr. Stephen Henson
953174f46e
Free old store name (if any).
2008-06-01 23:45:11 +00:00
Dr. Stephen Henson
c621c7e432
Add ctrl for alternative certificate store names.
2008-06-01 23:42:49 +00:00
Dr. Stephen Henson
2bbe8f9129
Use keyspec for DSA too.
2008-06-01 23:28:17 +00:00
Dr. Stephen Henson
4be0a5d429
Get and note keyspec when signing.
2008-06-01 23:24:53 +00:00
Dr. Stephen Henson
bdfe932dca
Release engine reference when calling SSL_CTX_free().
2008-06-01 23:06:48 +00:00
Dr. Stephen Henson
3fc59c8406
Allow ENGINE client cert callback to specify a set of other certs, for
...
the rest of the certificate chain. Currently unused.
2008-06-01 22:45:08 +00:00
Dr. Stephen Henson
c61915c659
Update error codes.
2008-06-01 22:34:40 +00:00
Dr. Stephen Henson
368888bcb6
Add client cert engine to SSL routines.
2008-06-01 22:33:24 +00:00
Dr. Stephen Henson
eafd6e5110
Update error codes, move typedef of SSL, SSL_CTX to ossl_typ.h
2008-06-01 21:18:47 +00:00
Dr. Stephen Henson
05935c47b2
Add support for ENGINE supplied SSL client auth.
2008-06-01 21:10:30 +00:00
Dr. Stephen Henson
d8bd55a364
Update from stable branch.
2008-06-01 11:07:34 +00:00
Dr. Stephen Henson
841c91d6e4
Update from stable branch.
2008-05-31 23:48:02 +00:00
Dr. Stephen Henson
a4792168ec
Update VC-32.pl and load CryptoAPI engine in the right place.
2008-05-31 23:21:40 +00:00
Dr. Stephen Henson
90b96776cd
More CryptoAPI engine code from stable branch.
2008-05-31 22:53:16 +00:00
Dr. Stephen Henson
408f906592
Add CryptoAPI error file too.
2008-05-31 22:50:00 +00:00
Dr. Stephen Henson
7a18ecb2df
Add CryptoAPI ENGINE from stable branch.
2008-05-31 22:49:32 +00:00
Dr. Stephen Henson
174c86a216
Recognize LHASH_OF().
2008-05-31 21:20:53 +00:00
Dr. Stephen Henson
c6ddacf7f8
Stop const mismatch warning.
2008-05-31 19:28:57 +00:00
Dr. Stephen Henson
ab3eafd5b5
Stop warning about extra ';' outside of function.
2008-05-31 19:17:25 +00:00
Dr. Stephen Henson
dd043cd501
Stop const mismatch warning in VC++.
2008-05-31 18:55:23 +00:00
Bodo Möller
a75c662fd1
Everyone's had a few years to port their favorite additions to 0.9.7
...
to HEAD (and the 0.9.8 branch). Remove the reminder.
2008-05-31 13:42:53 +00:00
Dr. Stephen Henson
83574cf808
Fix from stable branch.
2008-05-30 10:57:49 +00:00
Bodo Möller
2cd81830ef
sync with 0.9.8 branch
2008-05-28 22:30:28 +00:00
Bodo Möller
e194fe8f47
From HEAD:
...
Fix flaw if 'Server Key exchange message' is omitted from a TLS
handshake which could lead to a cilent crash as found using the
Codenomicon TLS test suite (CVE-2008-1672)
Reviewed by: openssl-security@openssl.org
Obtained from: mark@awe.com
2008-05-28 22:17:34 +00:00
Bodo Möller
40a706286f
From HEAD:
...
Fix double-free in TLS server name extensions which could lead to a remote
crash found by Codenomicon TLS test suite (CVE-2008-0891)
Reviewed by: openssl-security@openssl.org
Obtained from: jorton@redhat.com
2008-05-28 22:15:48 +00:00
Bodo Möller
c6f6c380c7
grammar
2008-05-27 18:43:20 +00:00
Bodo Möller
8f395e0f4d
year 2008
2008-05-27 18:41:09 +00:00
Dr. Stephen Henson
595852f3b5
Avoid "duplicate const" warnings.
2008-05-27 11:44:03 +00:00
Dr. Stephen Henson
0a56761f19
Avoid warning about empty structures and always define CHECKED_PTR_OF
2008-05-27 11:28:49 +00:00
Dr. Stephen Henson
220903f92e
C++ style comments fixed.
2008-05-26 15:39:36 +00:00
Ben Laurie
3c1d6bbc92
LHASH revamp. make depend.
2008-05-26 11:24:29 +00:00
Lutz Jänicke
cab14b9803
Add README about removed root CA certificates.
2008-05-26 06:23:57 +00:00
Lutz Jänicke
17a4a4dff8
Reword comment to be much shorter to stop other people from complaining
...
about "overcommenting".
2008-05-26 06:21:13 +00:00
Lutz Jänicke
c2c2e7a438
Clear error queue when starting SSL_CTX_use_certificate_chain_file
...
PR: 1417, 1513
Submitted by: Erik de Castro Lopo <mle+openssl@mega-nerd.com >
2008-05-23 10:37:52 +00:00
Lutz Jänicke
d18ef847f4
Remove all root CA files (beyond test CAs including private key)
...
from the OpenSSL distribution.
2008-05-23 08:59:23 +00:00
Dr. Stephen Henson
5c0d90a699
Typo.
2008-05-20 18:49:00 +00:00
Dr. Stephen Henson
f434730524
Typo.
2008-05-20 16:13:57 +00:00
Dr. Stephen Henson
65fd877515
Update ordinals.
2008-05-20 12:23:38 +00:00
Dr. Stephen Henson
64ddafc6b6
Update from stable branch.
2008-05-20 11:52:57 +00:00
Dr. Stephen Henson
781f0a9bb5
Fix from stable branch.
2008-05-20 11:30:27 +00:00
Lutz Jänicke
3de5a7745f
Correctly adjust location of comment
...
Submitted by: Ben Laurie <ben@links.org >
2008-05-20 08:10:48 +00:00
Dr. Stephen Henson
94fd382f8b
Fix two invalid memory reads in RSA OAEP mode.
...
Submitted by: Ivan Nestlerode <inestlerode@us.ibm.com >
Reviewed by: steve
2008-05-19 21:33:55 +00:00
Bodo Möller
4bd4afa34e
Change use of CRYPTO_THREADID so that we always use both the ulong and
...
ptr members.
(So if the id_callback is bogus, we still have &errno.)
2008-05-19 20:45:25 +00:00
Bodo Möller
148bb9515c
Disable code that clearly doesn't currently serve any useful purpose.
...
(Buggy line reported by Matthias Koenig.)
2008-05-19 19:44:45 +00:00
Lutz Jänicke
51e00db226
Document "openssl s_server" -crl_check* options
...
Submitted by: Daniel Black <daniel.subs@internode.on.net >
2008-05-19 07:52:15 +00:00
Lutz Jänicke
a92ebf2290
Provide information about "openssl dgst" -hmac option.
2008-05-19 07:43:34 +00:00
Lutz Jänicke
f49c687507
Typo. (From 0.9.8-stable/S. Henson)
...
PR: 1672
2008-05-19 06:21:05 +00:00
Lutz Jänicke
8b99c79fae
Another occurance of possible valgrind/purify "uninitialized memory"
...
complaint related to the PRNG: with PURIFY policy don't feed uninitialized
memory into the PRNG.
Submitted by: Bodo Moeller <bmoeller@openssl.org > :-)
2008-05-16 07:14:26 +00:00
Dr. Stephen Henson
718f8f7a9e
Fix from stable branch.
2008-05-12 16:24:31 +00:00
Dr. Stephen Henson
e718520cc5
Add missing cast.
2008-05-09 23:16:24 +00:00
Andy Polyakov
4f46934269
Depict future Win64/x64 development.
2008-05-03 18:34:59 +00:00
Bodo Möller
fabe640f5e
Clarifying comment.
2008-05-02 18:47:48 +00:00
Dr. Stephen Henson
19048b5c8d
New function CMS_add1_crl().
2008-05-02 17:27:01 +00:00
Dr. Stephen Henson
156ee88285
Indicate support for digest init ctrl.
2008-05-02 11:24:40 +00:00
Dr. Stephen Henson
c386f8ac38
Typo.
2008-05-01 23:35:36 +00:00
Dr. Stephen Henson
4a954b56c9
Use "cont" consistently in cms-examples.pl
...
Add a -certsout option to output any certificates in a message.
Add test for example 4.11
2008-05-01 23:30:06 +00:00
Bodo Möller
d05a474556
Montgomery-related minor cleanups/documentation
2008-05-01 18:48:20 +00:00
Dr. Stephen Henson
8a2062fefe
Update from stable branch.
2008-04-30 16:14:02 +00:00
Dr. Stephen Henson
2f63ad5b35
Update from stable branch.
2008-04-29 17:22:35 +00:00
Dr. Stephen Henson
c78bba2343
Oops!
2008-04-29 16:46:46 +00:00
Dr. Stephen Henson
d26c905c67
Update from stable branch.
2008-04-29 16:44:51 +00:00
Dr. Stephen Henson
8fcc9caecc
Update from stable branch.
2008-04-29 16:39:03 +00:00
Geoff Thorpe
e7b097f558
Fix auto-discovery of ENGINEs. See the CHANGES entry for details (and/or
...
ticket #1668 ).
PR: 1668
Submitted by: Ian Lister
Reviewed by: Geoff Thorpe
2008-04-28 21:39:09 +00:00
Geoff Thorpe
5ee6f96cea
Paul Sheer optimised the OpenSSL to/from libGMP conversions for the case
...
where they both use the same limb size. I've tweaked his patch slightly, so
blame me if it breaks.
Submitted by: Paul Sheer
Reviewed by: Geoff Thorpe
2008-04-27 18:41:23 +00:00
Dr. Stephen Henson
dc634aff25
Don't send zero length session ID if stateless session resupmtion is
...
successful. Check be seeing if there is a cache hit.
2008-04-25 16:27:04 +00:00
Dr. Stephen Henson
8e3b2dbb31
Disable debugging fprintf.
2008-04-25 11:33:32 +00:00
Andy Polyakov
ba6f95e81b
Add 64-bit support to BN_nist_mod_244 and engage BN_nist_mod_* on 64-bit
...
platforms.
2008-04-24 10:04:26 +00:00
Andy Polyakov
281066cb03
Compensate inline assembler in sha512.c for gcc 2.7.2 compiler bug.
...
PR: 1667
2008-04-24 09:59:45 +00:00
Andy Polyakov
830b8877ba
Takanori Yanagisawa has shown how to correctly use pre-computed values.
...
So in a sense this commit reverts few latest ones fixing bugs in original
code and improving it, most notably adding 64-bit support [though not in
BN_nist_mod_224 yet].
PR: 1593
2008-04-23 08:10:25 +00:00
Andy Polyakov
9912ab6770
Resolve __DECC warning and keep disclaiming support for 16-bit platforms.
2008-04-18 15:47:30 +00:00
Andy Polyakov
299ab428ce
Fix remaining BN_nist_mod_*.
...
PR: 1593
2008-04-18 15:40:57 +00:00
Dr. Stephen Henson
e6ef05d5f3
Make certs argument work in CMS_sign() add test case.
...
PR:1664
2008-04-18 11:18:20 +00:00
Lutz Jänicke
0f401ff08b
Add missing 'extern "C" {' to some _err.h files in crypto/engines/
...
PR: 1609
2008-04-18 07:43:26 +00:00
Lutz Jänicke
5558128541
Another minor update from the mingw development
...
PR: 1552
Submitted by: Roumen Petrov <openssl@roumenpetrov.info >
2008-04-18 06:35:55 +00:00
Richard Levitte
e33c72dfc6
Synchronise with Unix.
2008-04-18 06:04:03 +00:00
Lutz Jänicke
44a877aa88
Fix incorrect return value in apps/apps.c:parse_yesno()
...
PR: 1607
Submitted by: "Christophe Macé" <mace.christophe@gmail.com >
2008-04-17 14:15:27 +00:00
Lutz Jänicke
6b6fe3d8e4
Correctly handle case of bad arguments supplied to rsautl
...
PR: 1659
2008-04-17 13:36:13 +00:00
Lutz Jänicke
4c1a6e004a
Apply mingw patches as supplied by Roumen Petrov an Alon Bar-Lev
...
PR: 1552
Submitted by: Roumen Petrov <openssl@roumenpetrov.info >, "Alon Bar-Lev" <alon.barlev@gmail.com >
2008-04-17 10:19:16 +00:00
Richard Levitte
6e6ada18c6
Further synchronisation with Unix build. I hadn't noticed pq_compat.h
...
was gone...
2008-04-12 08:41:05 +00:00
Richard Levitte
b35a131069
Provide other forms for symbols that are too long or that clash with others
2008-04-12 08:40:01 +00:00
Dr. Stephen Henson
1728756255
Detached encrypt/decrypt example, fix decrypt sample.
2008-04-11 23:52:26 +00:00
Dr. Stephen Henson
a12a6b9962
Correct argument order for CMS_decrypt() in docs.
2008-04-11 23:49:03 +00:00
Dr. Stephen Henson
852bd35065
Fix prototype for CMS_decrypt(), don't free up detached content.
2008-04-11 23:45:52 +00:00
Dr. Stephen Henson
a5db50d005
Revert argument swap change... oops CMS_uncompress() was consistent...
2008-04-11 23:23:18 +00:00
Dr. Stephen Henson
f3eba36c4c
Fix comments.
2008-04-11 17:50:20 +00:00
Dr. Stephen Henson
529d329ce1
Make CMS_uncompress() argument order consistent with other functions.
2008-04-11 17:34:13 +00:00
Dr. Stephen Henson
47a6d388c7
CMS compressed data examples.
2008-04-11 17:33:29 +00:00
Dr. Stephen Henson
c02b6b6b21
Fix for compression and updated CMS_final().
2008-04-11 17:07:01 +00:00
Dr. Stephen Henson
3b28bc9910
PKCS#7 examples converted to CMS.
2008-04-11 16:52:45 +00:00
Richard Levitte
fc003bcecb
Synchronise with Unix build
2008-04-11 01:53:16 +00:00
Dr. Stephen Henson
38d3a73808
Reformat, fix typos and clarify CMS API docs.
2008-04-10 23:28:25 +00:00
Dr. Stephen Henson
73b3c2d861
Correct HISTORY reference.
2008-04-10 15:59:40 +00:00
Dr. Stephen Henson
4670e00ff5
Typo.
2008-04-10 15:56:27 +00:00
Dr. Stephen Henson
287df2fe49
Add docs for CMS_final() and BIO_new_CMS().
2008-04-10 11:55:57 +00:00
Dr. Stephen Henson
e0fbd07309
Add additional parameter to CMS_final() to handle detached content.
2008-04-10 11:22:14 +00:00
Dr. Stephen Henson
eaee098e1f
Ignore nonsensical flags for signed receipts.
2008-04-10 11:12:42 +00:00
Dr. Stephen Henson
43d9e9d07f
Add CMS signed receipt genration and verification docs.
2008-04-10 11:00:47 +00:00
Dr. Stephen Henson
c420fab52b
Spellcheck CMS docs.
2008-04-10 10:46:11 +00:00
Dr. Stephen Henson
6469a1fda3
Signed receipt request function documentation.
2008-04-09 23:13:49 +00:00
Dr. Stephen Henson
7f50d9a4b0
Correct references to smime in cms app.
2008-04-09 22:09:45 +00:00
Dr. Stephen Henson
da6ea110b5
Update docs.
2008-04-09 20:59:45 +00:00
Dr. Stephen Henson
fb777e1f79
Add CMS_uncompress manual page.
2008-04-09 20:55:55 +00:00
Dr. Stephen Henson
360bb61d86
Add CMS_compress() docs.
2008-04-09 17:04:36 +00:00
Dr. Stephen Henson
847e551f39
More CMS API documentation.
2008-04-09 16:08:16 +00:00
Andy Polyakov
d4122504a2
Clarifying comment.
2008-04-09 12:06:42 +00:00
Andy Polyakov
2c4226c42b
Do BN_nist_mod_384 by the book, as cheating doesn't work. Other functions
...
will be revised too.
PR: 1593
2008-04-09 11:36:04 +00:00
Dr. Stephen Henson
86173db853
Fix various typos, update SMIMECapabilities description.
2008-04-08 22:44:56 +00:00
Dr. Stephen Henson
9034c56c6c
Correct d2i/i2d typos.
2008-04-08 22:35:32 +00:00
Dr. Stephen Henson
e33ffaca12
Initial CMS API documentation.
2008-04-08 22:27:10 +00:00
Dr. Stephen Henson
853eae51e0
Implement CMS_NOCRL.
2008-04-07 11:00:44 +00:00
Lutz Jänicke
b4be380889
Fix URI of OpenSSL Request Tracker information
...
PR: 1661
2008-04-07 06:37:05 +00:00
Dr. Stephen Henson
ff80280b01
Set contentType attribute just before signing to allow encapsulated content
...
type to be set at any time in applications.
2008-04-06 16:29:47 +00:00
Dr. Stephen Henson
e45641bd17
Fix typo and add header files to err library.
2008-04-06 15:53:29 +00:00
Dr. Stephen Henson
d5a37b0293
Give consistent return value and add error code for duplicate certificates.
2008-04-06 15:41:25 +00:00
Dr. Stephen Henson
6819050722
Delete nonexistant function from pkcs7.h header file. WIN32 build fix from
...
stable branch. Sync and update ordinals.
2008-04-04 00:06:43 +00:00
Dr. Stephen Henson
88db4e6b9e
Make mk1mf.pl recognize no-cms.
2008-04-03 23:29:15 +00:00
Dr. Stephen Henson
be86dd85e4
Rename runex.pl to cms-examples.pl
2008-04-03 23:25:43 +00:00
Dr. Stephen Henson
3df9357103
Update CHANGES.
2008-04-02 11:44:00 +00:00
Dr. Stephen Henson
992e92a46e
Update CHANGES.
2008-04-02 11:24:22 +00:00
Dr. Stephen Henson
3247812e34
Since OID NIDs with 0.9.8.
2008-04-02 10:48:34 +00:00
Dr. Stephen Henson
a5cdb7d5bd
Avoid warnings.
2008-04-01 16:29:42 +00:00
Dr. Stephen Henson
4a6bb116c4
Add signed receipt tests.
2008-04-01 15:16:15 +00:00
Andy Polyakov
2819ffb520
Fix fast reduction on NIST curves (as well BN_NIST_ADD_ONE macro).
...
PR: 1593
2008-04-01 08:39:08 +00:00
Dr. Stephen Henson
964c7e8f6d
Fix it properly this time....
2008-03-31 18:21:30 +00:00
Dr. Stephen Henson
f6a45ac5ac
Fix macro.
2008-03-31 18:14:10 +00:00
Dr. Stephen Henson
2e86f0d8d7
Use correct headers for signed receipts. Use consistent naming.
...
Update cms-test.pl to support OpenSSL 0.9.8.
2008-03-31 15:03:55 +00:00
Dr. Stephen Henson
e2a29d49ca
Update dependencies.
2008-03-29 21:11:25 +00:00
Dr. Stephen Henson
b99674103d
Remove unnecessary header.
2008-03-29 21:08:37 +00:00
Dr. Stephen Henson
41f81a0143
Update docs.
2008-03-29 00:54:24 +00:00
Dr. Stephen Henson
36309aa2be
Signed receipt generation code.
2008-03-28 19:43:16 +00:00
Dr. Stephen Henson
eb9d8d8cd4
Support for verification of signed receipts.
2008-03-28 13:15:39 +00:00
Geoff Thorpe
f7ccba3edf
There was a need to support thread ID types that couldn't be reliably cast
...
to 'unsigned long' (ie. odd platforms/compilers), so a pointer-typed
version was added but it required portable code to check *both* modes to
determine equality. This commit maintains the availability of both thread
ID types, but deprecates the type-specific accessor APIs that invoke the
callbacks - instead a single type-independent API is used. This simplifies
software that calls into this interface, and should also make it less
error-prone - as forgetting to call and compare *both* thread ID accessors
could have led to hard-to-debug/infrequent bugs (that might only affect
certain platforms or thread implementations). As the CHANGES note says,
there were corresponding deprecations and replacements in the
thread-related functions for BN_BLINDING and ERR too.
2008-03-28 02:49:43 +00:00
Geoff Thorpe
eb77ebe26c
Update tunala so it builds ok with OPENSSL_NO_DEPRECATED, and improve the
...
autoungunk.sh logic (autobits have grown since I last tried this...).
2008-03-28 01:56:08 +00:00
Dr. Stephen Henson
f5e2354c9d
Add support for signed receipt request printout and generation.
2008-03-26 17:40:22 +00:00
Dr. Stephen Henson
f4cc56f494
Signed Receipt Request utility functions and option on CMS utility to
...
print out receipt requests.
2008-03-26 13:10:21 +00:00
Dr. Stephen Henson
be86c7fc87
Add signed receipt ASN1 structures. Initial GENERAL_NAME utility functions.
2008-03-24 22:14:02 +00:00
Dr. Stephen Henson
6205171362
Add support for CMS structure printing in cms utility.
2008-03-24 21:53:07 +00:00
Dr. Stephen Henson
ab568a17cf
Fix duplicate asn1 ctrl values.
2008-03-23 14:13:45 +00:00
Dr. Stephen Henson
fe591284be
Update dependencies.
2008-03-22 18:52:03 +00:00
Dr. Stephen Henson
7122aafce5
Preliminary documentation for CMS utility.
2008-03-21 13:09:26 +00:00
Geoff Thorpe
5ffba305c8
Comment out a (currently) unused CMS function. (Sorry Steve, but I need
...
-Werror right now to help me code-by-domino :-)
2008-03-19 23:08:20 +00:00
Geoff Thorpe
ceee538af5
Fork my debug configuration into 32-bit and 64-bit versions.
2008-03-19 23:05:48 +00:00
Dr. Stephen Henson
054307e7ed
Allow alternate eContentType oids to be set in cms utility.
...
Add id-ct-asciiTextWithCRLF OID.
Give more meaninful error message is attempt to use key ID from a certificate
without a key ID.
2008-03-19 19:34:30 +00:00
Dr. Stephen Henson
8cd358bef8
Rebuild CMS error codes.
2008-03-19 18:42:02 +00:00
Dr. Stephen Henson
eeb9cdfc94
Add support for KEK decrypt in cms utility.
2008-03-19 18:39:51 +00:00
Dr. Stephen Henson
16fe5f8b50
Produce meaningful error if sanity check fails.
...
Delete trailing whitespace from objects.txt
Delete duplicate NIDs.
2008-03-19 17:01:12 +00:00
Dr. Stephen Henson
041e7f2eee
Additional sanity check.
2008-03-19 14:18:36 +00:00
Dr. Stephen Henson
ab12438030
Add support for KEKRecipientInfo in cms application.
2008-03-19 13:53:52 +00:00
Dr. Stephen Henson
c220e58f9e
Make 3DES default cipher in cms utility.
2008-03-18 19:03:03 +00:00
Dr. Stephen Henson
6bd05ad472
Delete standard out and err temp files too.
2008-03-18 18:53:12 +00:00
Dr. Stephen Henson
90ec4c0af0
Delete tmp files, silence openssl commands, compare extracted content.
2008-03-18 18:51:44 +00:00
Dr. Stephen Henson
52e9196d7e
Add enveloped data keyid test.
2008-03-18 18:29:54 +00:00
Dr. Stephen Henson
f7e85c371e
Uninitialized variable bug fix.
2008-03-18 18:18:25 +00:00
Dr. Stephen Henson
f5cbf8fbe1
Fixes for S/MIME consistency checker and flexibility enhancements.
2008-03-18 17:33:46 +00:00
Dr. Stephen Henson
7d7e640e0b
Add extensive PCKS7 and CMS consistency test script.
2008-03-18 14:37:59 +00:00
Dr. Stephen Henson
e4f0e40eac
Various tidies/fixes:
...
Make streaming support in cms cleaner.
Note errors in various S/MIME functions if CMS_final() fails.
Add streaming support for enveloped data.
2008-03-18 13:45:43 +00:00
Dr. Stephen Henson
6e3bc4f073
More support for KEK RecipientInfo.
...
Generalise RecipientInfo and enveloped data handling so applications can
add their own key lookup routines as well as using the standard ones.
2008-03-18 01:00:38 +00:00
Dr. Stephen Henson
c36e936b60
Partial support for KEKRecipientInfo type.
2008-03-17 18:11:27 +00:00
Dr. Stephen Henson
761ffa729f
Preliminary support for enveloped data content type creation.
...
Fix signed data creation so versions are only corrected if structure is
being created.
2008-03-17 13:38:51 +00:00
Geoff Thorpe
1e26a8baed
Fix a variety of warnings generated by some elevated compiler-fascism,
...
OPENSSL_NO_DEPRECATED, etc. Steve, please double-check the CMS stuff...
2008-03-16 21:05:46 +00:00
Dr. Stephen Henson
7c337e00d2
Fix some warnings.
2008-03-16 20:59:10 +00:00
Geoff Thorpe
7e8481afd1
Fix a nasty cast issue that my compiler was choking on.
2008-03-16 20:57:12 +00:00
Geoff Thorpe
1266cec2fe
Fix my debug-geoff configuration.
2008-03-16 20:49:32 +00:00
Dr. Stephen Henson
3667a6f5b3
Adapt to diffrent OpenSSL utility locations.
2008-03-16 19:10:02 +00:00
Dr. Stephen Henson
deb21fbae9
Remove deleted function from header file, update mkfiles.pl
2008-03-16 18:41:20 +00:00
Dr. Stephen Henson
057039f782
Don't need to check for examples directory any more.
2008-03-16 18:31:18 +00:00
Dr. Stephen Henson
d7c738a09a
Extend runex.pl to extract examples directly from RFC text.
2008-03-16 18:03:48 +00:00
Dr. Stephen Henson
a981e2adbc
Add support for random key generation: this will be needed by enveloped data.
2008-03-16 13:05:03 +00:00
Dr. Stephen Henson
88fce8539f
Initial support for enveloped data decrypt. Extent runex.pl to cover these
...
examples. All RFC4134 examples can now be processed.
2008-03-15 23:21:34 +00:00
Dr. Stephen Henson
4f1aa191b3
Initial support for enveloped data decrypt. Extent runex.pl to cover these
...
examples. All RFC4134 examples can not be processed.
2008-03-15 23:21:33 +00:00
Dr. Stephen Henson
e540d1cd77
Check for cipher BIO errors and set key length after parameter decode.
2008-03-15 13:37:32 +00:00
Dr. Stephen Henson
fd47c36136
Return error if no cipher set for encrypted data type.
...
Update CHANGES.
2008-03-15 00:02:23 +00:00
Dr. Stephen Henson
d9f5f07e28
Initial support for Encrypted Data type generation.
2008-03-14 23:30:56 +00:00
Dr. Stephen Henson
b31db9ee96
Delete temp files.
2008-03-14 19:40:40 +00:00
Dr. Stephen Henson
1021f9aa5e
Typos.
2008-03-14 19:38:44 +00:00
Dr. Stephen Henson
320bfc1be7
Reorganise encrypted content info code to avoid duplication and be more
...
consistent with other content types.
2008-03-14 19:37:56 +00:00
Dr. Stephen Henson
b820455c6e
Encrypted Data type processing. Add options to cms utility and run section 7
...
tests in RFC4134.
2008-03-14 13:21:48 +00:00
Dr. Stephen Henson
5c4436c977
New utility functions for encryptedData content type which will also be used
...
by envelopedData.
Use PRE and not POST when freeing up RecipientInfo.
2008-03-14 00:58:43 +00:00
Dr. Stephen Henson
a78a03744d
Only call free once in CHOICE type.
2008-03-14 00:57:01 +00:00
Dr. Stephen Henson
a329fdde51
RFC4134 S/MIME examples test script.
2008-03-13 01:04:47 +00:00
Dr. Stephen Henson
31d3c84422
.cvignore file for cms
2008-03-13 00:50:02 +00:00
Dr. Stephen Henson
afff52a3ba
Free up additional data in RecipientInfo structure
2008-03-13 00:48:59 +00:00
Dr. Stephen Henson
8931b30d84
And so it begins...
...
Initial support for CMS.
Add zlib compression BIO.
Add AES key wrap implementation.
Generalize S/MIME MIME code to support CMS and/or PKCS7.
2008-03-12 21:14:28 +00:00
Dr. Stephen Henson
27dc105f51
Update year.
2008-03-12 13:05:07 +00:00
Dr. Stephen Henson
3964038fe6
#undef X509_EXTENSIONS to avoid conflict with CryptoAPI.
2008-03-12 00:37:31 +00:00
Dr. Stephen Henson
b510d77535
We already have an object for "zlib compression" but it was a place
...
holder and its actual encoding never used.
Just as well because it's value looks like it was made up in the mists of
time...
Now there is a registered value for zlib compression (used in S/MIME
compressedData content type) use that instead.
2008-02-29 14:24:52 +00:00
Dr. Stephen Henson
56c7754cab
Avoid warnings.
2008-02-28 14:05:01 +00:00
Dr. Stephen Henson
92e2c81aff
Fix error code function name mismatches in GOST engine, rebuild errors.
2008-02-28 13:45:06 +00:00
Dr. Stephen Henson
a70a49a018
Fix typo and avoid warning.
2008-02-28 13:18:26 +00:00
Andy Polyakov
61b05a0025
Make x86_64-mont.pl work with debug Win64 build.
2008-02-27 20:09:28 +00:00
Bodo Möller
7c9882eb24
fix BIGNUM flag handling
2008-02-27 06:01:28 +00:00
Dr. Stephen Henson
0d7f6fc76a
Clarification and fix typo.
2008-02-25 18:11:47 +00:00
Dr. Stephen Henson
a9e96d724d
Use default value for $dir if it is empty.
2008-02-25 13:14:06 +00:00
Bodo Möller
d9e427f09c
Make sure to set indent-tabs-mode so that we get tabs, not spaces.
2008-02-21 07:24:12 +00:00
Andy Polyakov
a23e3dbee1
Support for NASM>=2 in Win64/x64 build.
2008-02-13 13:07:52 +00:00
Dr. Stephen Henson
400ca0e467
Add OIDs for compressedData content type and zlib compression.
2008-02-12 13:48:10 +00:00
Dr. Stephen Henson
9536b85c07
Typo.
2008-02-12 01:24:50 +00:00
Dr. Stephen Henson
4d318c79b2
Utility attribute function to retrieve attribute data from an expected
...
type. Useful for many attributes which are single valued and can only
have one type.
2008-02-11 17:52:38 +00:00
Dr. Stephen Henson
1ad90a916b
Extend attribute setting routines to support non-string types.
2008-02-11 13:59:33 +00:00
Andy Polyakov
8ab9025e31
Ad-hockery for Platform SDK ml64.
2008-02-11 13:04:39 +00:00
Dr. Stephen Henson
9e5df8e448
Support custom primitive type printing routines and add one to LONG type.
2008-02-08 13:07:04 +00:00
Andy Polyakov
96d13fe62b
Micro-profiling assisted "optimization" for Power6. Essentially it's so
...
to say educational commit. Reordering instructions doesn't improve
performance much, rather exhibits Power6 limitations.
2008-02-06 10:18:19 +00:00
Andy Polyakov
089458b096
ppc64-mont optimization.
2008-02-05 13:10:14 +00:00
Lutz Jänicke
7c1722c60d
Add missing colon in manpage
...
Submitted by: Richard Hartmann <richih.mailinglist@gmail.com >
2008-01-30 08:26:59 +00:00
Dr. Stephen Henson
c020c3213e
Add Global Sign root CA.
2008-01-26 23:42:58 +00:00
Dr. Stephen Henson
930875ef77
Clarify FAQ.
2008-01-23 19:21:00 +00:00
Dr. Stephen Henson
3b979c5450
Clarify BITLIST format and include an example.
2008-01-23 19:10:53 +00:00
Andy Polyakov
339ad7ce73
rc5/asm/rc5-586.pl was erroneously omitted from last perlasm unification.
2008-01-17 19:48:01 +00:00
Andy Polyakov
676517e08e
crypto/rc5/Makefile was erroneously omitted from last perlasm unification.
...
Also remove obsolete and now misleading comments.
2008-01-15 11:27:06 +00:00
Dr. Stephen Henson
52108cecc0
<strings.h> does not exist under WIN32.
2008-01-14 18:10:55 +00:00
Andy Polyakov
addd641f3a
Unify ppc assembler make rules.
2008-01-13 22:01:30 +00:00
Andy Polyakov
f63e4be392
Automate assembler support for Win64 targets (more work is needed).
2008-01-13 17:56:02 +00:00
Andy Polyakov
ca55d11f84
Allow to specify filename on sha1-ia64.pl command line.
2008-01-13 17:43:11 +00:00
Andy Polyakov
abe7f8b457
Make all x86_64 modules independent on current working directory.
2008-01-13 17:42:04 +00:00
Andy Polyakov
a078befcbe
rc4-x86_64 portability fix.
2008-01-12 11:29:45 +00:00
Ben Laurie
f12797a447
Missing headers.
2008-01-12 11:22:31 +00:00
Andy Polyakov
fa8e921f66
Unify x86 perlasm make rules.
2008-01-11 13:15:11 +00:00
Andy Polyakov
4287ade5b4
Automate assembler support in mk1mf even further.
2008-01-11 11:59:37 +00:00
Dr. Stephen Henson
7398053149
Experimental support for import of more options from Configure
...
(via top level Makefile) into mk1mf builds. This avoids the need
to duplicate the CFLAG handling and can auto build assembly language
source files from perl scripts.
Extend VC-WIN32 Configure entry to include new options.
2008-01-06 00:36:22 +00:00
Dr. Stephen Henson
4d1f3f7a6c
Update perl asm scripts include paths for perlasm.
2008-01-05 22:28:38 +00:00
Andy Polyakov
aff686df91
Fix unsigned/signed warnings in ssl.
2008-01-05 21:35:34 +00:00
Andy Polyakov
637f90621d
Cygwin compatibility fix to apps/ocsp.c.
2008-01-05 21:32:29 +00:00
Andy Polyakov
6d0624aca3
Compensate for BSDi shell bug.
2008-01-05 21:30:59 +00:00
Andy Polyakov
085ea80371
engine/ccgost Win32 portability fixes.
2008-01-05 21:28:53 +00:00
Andy Polyakov
ab0ff06205
Make aes-x86_64 work with debug Win64 build.
2008-01-05 18:17:20 +00:00
Andy Polyakov
79eeb47031
Make AES_T[ed] private to aes-586 module.
2008-01-05 08:58:18 +00:00
Dr. Stephen Henson
9911b7496f
Include Mont asm files in WIN32 build.
2008-01-05 00:45:27 +00:00
Dr. Stephen Henson
3dbd453f41
Add extra SHA2 defines.
2008-01-05 00:44:33 +00:00
Andy Polyakov
731339627f
Last dso_dlfcn.c check-in said "Use Dl_info only on systems where it is
...
known to exist. It does not exist on AIX 4.3.3, AIX 5.1, SCO 5, or Cygwin"
and disabled it on banch of systems it's known to exists, such as FreeBSD,
Solaris, 64-bit HP-UX, MacOS X. Get it straight.
2008-01-04 23:03:23 +00:00
Andy Polyakov
26e71a1850
x86gas.pl update.
2008-01-04 22:58:50 +00:00
Dr. Stephen Henson
db01bad30f
Add sha2 defines.
2008-01-04 16:32:39 +00:00
Dr. Stephen Henson
6ff28e017d
Update netware to use new SHA2 assembly language modules.
2008-01-04 13:18:09 +00:00
Dr. Stephen Henson
4664eb5230
Update WIN32 nasm build to use new asm files.
2008-01-04 00:48:14 +00:00
Dr. Stephen Henson
744ecaa5b6
Avoid WIN32 signed/unsigned warnings.
2008-01-04 00:37:23 +00:00
Dr. Stephen Henson
76d761ccd3
Move CHANGES entry. Revert include file install line.
2008-01-03 22:57:50 +00:00
Dr. Stephen Henson
eef0c1f34c
Netware support.
...
Submitted by: Guenter Knauf <eflash@gmx.net >
2008-01-03 22:43:04 +00:00
Andy Polyakov
82a2431327
NASM has recently changed name of win32 pre-compiled binary.
...
PR: 1627
2008-01-03 17:09:56 +00:00
Dr. Stephen Henson
96fc37f145
Add quotes to Win32 install directories.
...
Submitted by: Mladen Turk <mturk@apache.org >
2008-01-03 16:37:00 +00:00
Andy Polyakov
3a87756fed
perlasm/x86*.pl updates.
2008-01-03 16:21:06 +00:00
Andy Polyakov
c8ec4a1b0b
Final (for this commit series) optimized version and with commentary section.
2007-12-29 20:30:09 +00:00
Andy Polyakov
699e1a3a82
This is also informational commit exposing loop modulo scheduling "factor."
2007-12-29 20:28:01 +00:00
Andy Polyakov
64214a2183
New Montgomery multiplication module, ppc64-mont.pl. Reference, non-optimized
...
implementation. This is essentially informational commit.
2007-12-29 20:26:46 +00:00
Andy Polyakov
0fcb905b0d
ppc-xlate.pl update.
2007-12-29 18:50:44 +00:00
Andy Polyakov
4be63cfb55
Source readability fix, which incidentally works around XLC compiler bug.
2007-12-29 18:32:34 +00:00
Andy Polyakov
ca64056836
Engage x86 assembler in Mac OS X build.
2007-12-18 17:33:49 +00:00
Andy Polyakov
df77428443
Mac OS X x86 assembler support.
2007-12-18 17:28:22 +00:00
Andy Polyakov
3e583572b3
Disable support for Metrowerks assembler. Assembler itself is broken,
...
specifically it incorrectly encodes EA offsets between 128 and 255.
2007-12-18 09:32:20 +00:00
Andy Polyakov
43d8f27dca
x86 perlasm overhaul.
2007-12-18 09:18:49 +00:00
Dr. Stephen Henson
b045299113
Avoid aliasing warning.
2007-12-16 13:57:44 +00:00
Dr. Stephen Henson
13baedc55b
Update ordinals
2007-12-16 13:16:58 +00:00
Dr. Stephen Henson
9400d9ac83
Initialize sigsize.
2007-12-14 16:53:50 +00:00
Dr. Stephen Henson
341e18b497
Handle non-SHA1 digests for certids in OCSP test responder.
2007-12-14 12:43:50 +00:00
Andy Polyakov
339a1820fd
gmp engine was non-operational.
2007-12-04 20:28:52 +00:00
Dr. Stephen Henson
cec2538ca9
Submitted by: Victor B. Wagner <vitus@cryptocom.ru>, steve
...
Use default algorithms for OCSP request and response signing. New command
line option to support other digest use for OCSP certificate IDs.
2007-12-04 12:41:28 +00:00
Richard Levitte
28f7e60d47
Change submitted by Doug Kaufman. He writes:
...
I just compiled the 9.9-dev version from the 12022007 tarball under
DJGPP. There were only 2 changes needed, one for b_sock.c, since
DJGPP with WATT32 doesn't define socklen_t and one for testtsa to
handle DOS style path separators. I also noted what seems to be a
typographical error in ts.pod. The test suite passes. The patch is
attached.
Since I am in the US, I have sent notifications to the Bureau of
Industry and Security and to the NSA.
2007-12-03 09:02:29 +00:00
Andy Polyakov
544b82e493
Some assembler are allergic to lea reg,BYTE PTR[...].
...
Submitted by: Guenter Knauf
2007-12-02 21:32:03 +00:00
Andy Polyakov
8789af8db8
Structure symbol decorations, optimize label handling...
2007-11-24 16:03:57 +00:00
Dr. Stephen Henson
1ad6a1b5e9
Rebuild OID database: duplicates got in there somehow??
2007-11-23 00:34:00 +00:00
Dr. Stephen Henson
6e150083bb
Fix from stable branch.
2007-11-23 00:19:24 +00:00
Dr. Stephen Henson
98d8baabbd
Add caRepository OID and sync object NIDs with OpenSSL 0.9.8.
2007-11-23 00:14:59 +00:00
Andy Polyakov
c1d2e00ec5
Synchronize x86nasm.pl with x86unix.pl.
2007-11-22 21:21:35 +00:00
Andy Polyakov
ad8bd4ece8
Combat [bogus] relocations in some assember modules.
2007-11-22 20:51:48 +00:00
Dr. Stephen Henson
2f0550c4c1
Lookup public key ASN1 methods by string by iterating through all
...
implementations instead of all added ENGINEs to cover case where an
ENGINE is not added.
2007-11-21 17:25:58 +00:00
Dr. Stephen Henson
98057eba77
Submitted by: "Victor B. Wagner" <vitus@cryptocom.ru>
...
Update gost algorithm print routines.
2007-11-21 12:39:12 +00:00
Dr. Stephen Henson
097f9d8c52
Avoid warning.
2007-11-20 17:52:02 +00:00
Dr. Stephen Henson
60447e59ef
Update debug-steve targets.
2007-11-20 17:51:45 +00:00
Dr. Stephen Henson
94e6ae7a69
Submitted by: "Victor B. Wagner" <vitus@cryptocom.ru>
...
Make {d2i,i2d}_PrivateKey() fall back to PKCS#8 format if no legacy format
supported. Add support in d2i_AutoPrivateKey().
2007-11-20 13:37:51 +00:00
Dr. Stephen Henson
f670738987
Rebuild object cross reference table.
2007-11-20 13:04:45 +00:00
Lutz Jänicke
b6a338cb29
Typos in man pages: dependant->dependent
...
Submitted by: Tobias Stoeckmann <tobias@bugol.de >
2007-11-19 09:18:03 +00:00
Bodo Möller
4726fcfc25
Should reject signatures that we can't properly verify
...
and couldn't generate
(as pointed out by Ernst G Giessmann)
2007-11-19 07:25:55 +00:00
Bodo Möller
15bd07e923
fix typos
...
Submitted by: Ernst G. Giessmann
2007-11-19 07:24:08 +00:00
Ben Laurie
fdf355878c
Fix buffer overflow.
2007-11-16 14:41:09 +00:00
Bodo Möller
da989402f2
The hash length check wasn't strict enough,
...
as pointed out by Ernst G Giessmann
2007-11-16 13:01:14 +00:00
Ben Laurie
10f0c85cfc
Fix warnings.
2007-11-16 03:03:01 +00:00
Andy Polyakov
70ba4ee5d5
Commit #16325 fixed one thing but broke DH with certain moduli.
2007-11-03 20:09:04 +00:00
Dr. Stephen Henson
31f528b15d
Fix from stable branch.
2007-11-03 13:09:34 +00:00
Lutz Jänicke
86140095b5
Add OIDs by CMP (RFC 4210) and CRMF (RFC 4211)
...
Submitted by: Martin Peylo <martinmeis@googlemail.com >
2007-11-01 08:24:56 +00:00
Dr. Stephen Henson
8e1d3ba50e
Fix duplicate error codes.
2007-10-26 23:54:46 +00:00
Dr. Stephen Henson
37210fe7e2
GOST ENGINE information.
2007-10-26 23:50:40 +00:00
Dr. Stephen Henson
0e1dba934f
1. Changes for s_client.c to make it return non-zero exit code in case
...
of handshake failure
2. Changes to x509_certificate_type function (crypto/x509/x509type.c) to
make it recognize GOST certificates as EVP_PKT_SIGN|EVP_PKT_EXCH
(required for s3_srvr to accept GOST client certificates).
3. Changes to EVP
- adding of function EVP_PKEY_CTX_get0_peerkey
- Make function EVP_PKEY_derive_set_peerkey work for context with
ENCRYPT operation, because we use peerkey field in the context to
pass non-ephemeral secret key to GOST encrypt operation.
- added EVP_PKEY_CTRL_SET_IV control command. It is really
GOST-specific, but it is used in SSL code, so it has to go
in some header file, available during libssl compilation
4. Fix to HMAC to avoid call of OPENSSL_cleanse on undefined data
5. Include des.h if KSSL_DEBUG is defined into some libssl files, to
make debugging output which depends on constants defined there, work
and other KSSL_DEBUG output fixes
6. Declaration of real GOST ciphersuites, two authentication methods
SSL_aGOST94 and SSL_aGOST2001 and one key exchange method SSL_kGOST
7. Implementation of these methods.
8. Support for sending unsolicited serverhello extension if GOST
ciphersuite is selected. It is require for interoperability with
CryptoPro CSP 3.0 and 3.6 and controlled by
SSL_OP_CRYPTOPRO_TLSEXT_BUG constant.
This constant is added to SSL_OP_ALL, because it does nothing, if
non-GOST ciphersuite is selected, and all implementation of GOST
include compatibility with CryptoPro.
9. Support for CertificateVerify message without length field. It is
another CryptoPro bug, but support is made unconditional, because it
does no harm for draft-conforming implementation.
10. In tls1_mac extra copy of stream mac context is no more done.
When I've written currently commited code I haven't read
EVP_DigestSignFinal manual carefully enough and haven't noticed that
it does an internal digest ctx copying.
This implementation was tested against
1. CryptoPro CSP 3.6 client and server
2. Cryptopro CSP 3.0 server
2007-10-26 12:06:36 +00:00
Lutz Jänicke
11d01d371f
Release OpenSSL 0.9.8g with various fixes to issues introduced with 0.9.8f
2007-10-19 08:26:03 +00:00
Dr. Stephen Henson
76c3ef7446
Fix from stable branch.
2007-10-18 11:42:47 +00:00
Andy Polyakov
659f7f3168
Don't let DTLS ChangeCipherSpec increment handshake sequence number.
...
PR: 1587
2007-10-17 21:15:48 +00:00
Dr. Stephen Henson
3d3bf9c730
Don't lookup zero length session ID.
...
PR: 1591
2007-10-17 17:31:57 +00:00
Dr. Stephen Henson
4017e8706c
Fix from stable branch.
2007-10-17 11:49:27 +00:00
Andy Polyakov
3ce54f35b3
Make ssl compile [from 098-stable, bug is masked by default].
2007-10-14 14:09:13 +00:00
Andy Polyakov
ebc06fba67
Bunch of constifications.
2007-10-13 15:51:32 +00:00
Andy Polyakov
e979c039f9
Fix warnings in d1_both.c [from 0.9.8-stable].
2007-10-13 11:00:52 +00:00
Andy Polyakov
90acf770b5
DTLS fixes from 0.9.8-stable.
2007-10-13 10:57:02 +00:00
Andy Polyakov
0d89e45690
Synchronize CHANGES between 0.9.8 and HEAD.
2007-10-13 10:55:30 +00:00
Ben Laurie
1948c7e6dd
0.9.8f.
2007-10-12 10:56:10 +00:00
Dr. Stephen Henson
a6db6a0070
Update CHANGES. Keep ordinals consistent.
2007-10-12 00:15:09 +00:00
Ben Laurie
fdb2fe6dc2
New release.
2007-10-11 19:31:29 +00:00
Andy Polyakov
a2115c5d17
Respect cookie length set by app_gen_cookie_cb.
...
Submitted by: Alex Lam
2007-10-09 19:31:18 +00:00
Andy Polyakov
4fe55663df
Make DTLS1 record layer MAC calculation RFC compliant.
...
Submitted by: Alex Lam
2007-10-09 19:19:07 +00:00
Andy Polyakov
ae1552ee99
Addendum to commit #16654 .
2007-10-09 16:37:24 +00:00
Andy Polyakov
debf380122
size_t-fy crypto/buffer.
2007-10-09 15:52:07 +00:00
Ralf S. Engelschall
ddb038d349
ignore a few additionally generated files
2007-10-09 09:56:44 +00:00
Andy Polyakov
b7cc9dffac
Addendum to commit #16651 .
2007-10-07 14:34:59 +00:00
Andy Polyakov
e1b81fed33
Make it possible to link VC static lib with either /MT or /MD application.
...
PR: 1230
2007-10-07 12:55:36 +00:00
Andy Polyakov
5d58f1bbfe
Prohibit RC4 in DTLS.
2007-10-05 21:04:56 +00:00
Dr. Stephen Henson
fcd1cb666c
Fix from fips branch.
2007-10-05 16:53:31 +00:00
Dr. Stephen Henson
4f19a9cb9f
Off by one fix from stable branch.
2007-10-04 12:07:52 +00:00
Andy Polyakov
0023adb47a
Switch to bn-s390x (it's faster on keys longer than 512 bits) and mention
...
s390x assembler pack in CHANAGES.
2007-10-01 07:38:32 +00:00
Andy Polyakov
81fe8dcfe1
Oops! This was erroneously left out commit #16632 .
2007-10-01 06:27:21 +00:00
Andy Polyakov
d527834a1d
Basic idea behind explicit IV is to make it unpredictable for attacker.
...
Until now it was xor between CBC residue and 1st block from last datagram,
or in other words still predictable.
2007-09-30 22:01:36 +00:00
Andy Polyakov
89c333e3e5
Make ChangeCipherSpec compliant with DTLS RFC4347.
2007-09-30 21:19:30 +00:00
Andy Polyakov
0d97d00b6c
DTLS RFC4347 says HelloVerifyRequest resets Finished MAC.
2007-09-30 19:34:36 +00:00
Andy Polyakov
e7adda52b3
DTLS RFC4347 requires client to use rame random field in reply to
...
HelloVerifyRequest.
2007-09-30 19:15:27 +00:00
Andy Polyakov
7432d073af
Switch to RFC-compliant version encoding in DTLS.
2007-09-30 18:53:54 +00:00
Dr. Stephen Henson
04e2ab2c02
Move no status notification to ssl_check_serverhello_tlsext() to ensure
...
no status is notified even if no server extensions are present.
2007-09-28 17:45:11 +00:00
Dr. Stephen Henson
b7fcc08976
Typo.
2007-09-28 17:18:18 +00:00
Andy Polyakov
7722e53f12
Yet another ARM update. It appears to be more appropriate to make
...
developers responsible for -march choice.
2007-09-27 16:27:03 +00:00
Andy Polyakov
2c3ee16272
Move -march=armv4t to ./config.
2007-09-27 07:43:58 +00:00
Andy Polyakov
19112771d6
Minor ARMv4 update.
2007-09-27 07:20:31 +00:00
Andy Polyakov
4c7c5ff667
ARMv4 assembler pack.
2007-09-27 07:09:46 +00:00
Andy Polyakov
d7e915616d
10% performance tweak in 64-bit mode.
2007-09-27 06:19:25 +00:00
Dr. Stephen Henson
67c8e7f414
Support for certificate status TLS extension.
2007-09-26 21:56:59 +00:00
Andy Polyakov
74eb3e0914
Make sha512-armv4.pl byte-order neutral.
2007-09-26 12:17:33 +00:00
Andy Polyakov
79fe664f19
Clarify commentary in sha512-sparcv9.pl.
2007-09-26 12:16:32 +00:00
Lutz Jänicke
5f0477f47b
Typos
...
PR: 1578
Submitted by: Charles Longeau <chl@tuxfamily.org >
2007-09-24 11:22:58 +00:00
Lutz Jänicke
7bbce69721
Port from 0.9.8-stable
2007-09-24 11:01:18 +00:00
Dr. Stephen Henson
870d6541f2
Use accept flag for new session ticket write.
2007-09-23 15:55:15 +00:00
Bodo Möller
02c27b113c
properly handle length-zero opaque PRF input values
...
(which are pointless, but still might occur)
2007-09-23 11:30:53 +00:00
Bodo Möller
86d4bc3aea
fix length parameter in SSL_set_tlsext_opaque_prf_input() calls
2007-09-23 11:08:59 +00:00
Bodo Möller
761772d7e1
Implement the Opaque PRF Input TLS extension
...
(draft-rescorla-tls-opaque-prf-input-00.txt), and do some cleanups and
bugfixes on the way. In particular, this fixes the buffer bounds
checks in ssl_add_clienthello_tlsext() and in ssl_add_serverhello_tlsext().
Note that the opaque PRF Input TLS extension is not compiled by default;
see CHANGES.
2007-09-21 06:54:24 +00:00
Andy Polyakov
54ef01b54b
Fix indentation in d1_both.c.
2007-09-19 16:38:15 +00:00
Ben Laurie
9311c4421a
Fix dependencies. Make depend.
2007-09-19 14:53:18 +00:00
Ben Laurie
aaa4f448cf
The other half of make errors.
2007-09-19 14:51:28 +00:00
Ben Laurie
5f8b524619
make errors.
2007-09-19 14:29:59 +00:00
Bodo Möller
08111768a2
fix warning
2007-09-19 01:43:59 +00:00
Bodo Möller
1b827d7b6f
Clean up error codes a bit.
...
(engines/ccgost/ remains utter chaos, though; "make errors" is not happy.)
2007-09-19 00:58:58 +00:00
Andy Polyakov
a005fb019f
Addenum to "Constify obj_dat.[ch]."
2007-09-18 22:15:31 +00:00
Andy Polyakov
b5e5760d01
Minor formatting fixes in crypto/sha/asm.
2007-09-18 21:12:02 +00:00
Andy Polyakov
cf2bc94e5c
Wire RC4 key_table to read-only segment.
2007-09-18 21:10:32 +00:00
Andy Polyakov
26f0cf69d3
Constify obj_dat.[ch], as well as minimize linker relocations.
2007-09-18 21:05:21 +00:00
Andy Polyakov
61836c1b70
Wire DES weak_keys to read-only segment.
2007-09-18 20:58:33 +00:00
Andy Polyakov
2a1b0c8d65
Eliminate redundant make rule.
2007-09-18 20:57:06 +00:00
Andy Polyakov
75a8e30f4f
Minimize stack utilization in probable_prime.
2007-09-18 20:52:05 +00:00
Andy Polyakov
716b87a026
Remove excessive whitespaces from bio.h
2007-09-18 20:48:39 +00:00
Bodo Möller
08b229e13f
Make sure that BN_from_montgomery keeps the BIGNUMS in proper format
2007-09-18 16:35:28 +00:00
Dr. Stephen Henson
a529a80108
Update from stable branch.
2007-09-17 17:54:31 +00:00
Dr. Stephen Henson
c81898cbc4
Update from stable branch.
2007-09-17 17:31:53 +00:00
Andy Polyakov
330591fdfc
Mention aes in enc.pod.
...
PR: 1529
2007-09-17 16:42:35 +00:00
Andy Polyakov
c7503f5240
Mention SHA2 in openssl.pod.
...
PR: 1575
2007-09-17 15:56:55 +00:00
Andy Polyakov
eff371c866
Remove pq_compat.h.
2007-09-16 19:29:35 +00:00
Andy Polyakov
8dc899dee4
Minor sha[256|512]-586 performance tweaks.
2007-09-16 18:47:24 +00:00
Andy Polyakov
cc3d7bd0fc
It's inappropraite to override application signal, nor is it appropriate
...
to shut down Winsock unless we know it won't be used [and we never do].
PR: 1439
2007-09-16 18:35:02 +00:00
Andy Polyakov
7df4c86bdd
Minor fix in link_[oa].hpux.
2007-09-16 14:11:00 +00:00
Andy Polyakov
c313e32a8b
BSD run-time linkers apparently demand RPATH on .so objects.
...
PR: 1381
2007-09-16 12:23:47 +00:00
Andy Polyakov
77519b51db
Make bn2dec work on "SIXTY_FOUR_BIT" platforms.
...
PR: 1456
2007-09-15 17:05:11 +00:00
Andy Polyakov
1a01868e35
Remove sha512-sse2.pl.
2007-09-15 13:45:17 +00:00
Andy Polyakov
563d3e5948
Engage new x86 assembler modules.
2007-09-14 21:06:14 +00:00
Andy Polyakov
1187ee7dad
More Intel cc fix-ups.
2007-09-14 19:32:33 +00:00
Dr. Stephen Henson
7c5921e736
Handle empty case in X509_NAME canonical encoding.
2007-09-14 18:11:17 +00:00
Andy Polyakov
399f94bfb4
Commentary updates.
2007-09-13 07:27:10 +00:00
Andy Polyakov
1fa29843fa
SHA512 for ARMv4.
2007-09-13 07:26:35 +00:00
Andy Polyakov
ee0449b17c
SHA256/512 for x86.
2007-09-13 07:26:19 +00:00
Ben Laurie
e28eddc51f
Typo? Why did this work, anyway?
2007-09-08 15:58:51 +00:00
Dr. Stephen Henson
d82a612a90
Fix warning: print format option not compatible with size_t.
2007-09-07 13:34:46 +00:00
Dr. Stephen Henson
e7e8f4b333
Fix another warning.
2007-09-07 13:27:40 +00:00
Dr. Stephen Henson
a6fbcb4220
Change safestack reimplementation to match 0.9.8.
...
Fix additional gcc 4.2 value not used warnings.
2007-09-07 13:25:15 +00:00
Dr. Stephen Henson
8164032a2e
Fix warnings: computed value not use, incompatible pointer initialization
...
and cast from pointer to int of different size (linux-x86_64 and align).
2007-09-07 13:03:25 +00:00
Andy Polyakov
a5804a750b
Add sha512_block implementation optimized for small register bank.
...
On x86 it gives same performance, while code size shrinks >10 times.
2007-09-07 12:34:45 +00:00
Dr. Stephen Henson
81025661a9
Update ssl code to support digests other than MD5+SHA1 in handshake.
...
Submitted by: Victor B. Wagner <vitus@cryptocom.ru >
2007-08-31 12:42:53 +00:00
Andy Polyakov
4ece7eb6f4
Constify seed and md2.
2007-08-31 10:12:35 +00:00
Andy Polyakov
0bb01b7df0
Offer darwin64-x86_64-cc as option.
2007-08-31 10:09:34 +00:00
Andy Polyakov
1c56e95e28
Compress and more aggressively constify ec_curve.c [the latter is
...
achieved by minimizing link relocations].
2007-08-31 09:36:43 +00:00
Dr. Stephen Henson
446124a258
Check return code when attempting to receive new session ticket message.
2007-08-31 00:28:01 +00:00
Andy Polyakov
583b0b67ab
Unify RC4 settings among darwin platforms.
2007-08-30 08:09:12 +00:00
Andy Polyakov
584502d4a0
Add darwin64-x86_64-cc target.
2007-08-30 07:54:23 +00:00
Andy Polyakov
d8803d5ae6
aes_ige suffered SIGBUS on RISC platforms.
2007-08-29 21:30:13 +00:00
Andy Polyakov
acfb4b5b9f
Improve cache locality in linux64-sparcv9.
2007-08-29 20:46:11 +00:00
Andy Polyakov
0ddd3ea217
Make naming more consistent.
2007-08-28 21:02:38 +00:00
Andy Polyakov
6a8517f274
Make room for Camellia assembler.
2007-08-28 20:45:25 +00:00
Dr. Stephen Henson
94d511cdbd
Add ctrls to set and get RFC4507bis keys to enable several contexts to
...
reuse the same tickets.
2007-08-28 01:08:45 +00:00
Dr. Stephen Henson
ec5d747328
Add Google sponsorship note.
2007-08-27 23:41:36 +00:00
Andy Polyakov
c6880b2533
shlib_wrap commentary update.
2007-08-27 08:51:59 +00:00
Andy Polyakov
eb6eb3e630
shlib_wrap update, IRIX section.
2007-08-27 08:42:01 +00:00
Andy Polyakov
ae4eb3c9ac
IRIX and Tru64 platform updates.
2007-08-26 14:12:30 +00:00
Dr. Stephen Henson
ba0e826d83
Update from stable branch.
2007-08-23 22:59:09 +00:00
Dr. Stephen Henson
f3fef74b09
Document ticket disabling option.
2007-08-23 22:49:13 +00:00
Dr. Stephen Henson
014f62b649
Add usage message for -sess_out, -sess_in
2007-08-23 12:20:36 +00:00
Andy Polyakov
55eab3b74b
Make x86_64 modules work under Win64/x64.
2007-08-23 12:01:58 +00:00
Andy Polyakov
dc0fcb98df
Workaround MSVC6 compiler bug.
2007-08-23 11:59:53 +00:00
Dr. Stephen Henson
d24a9c8f5a
Docs and usage messages for RFC4507bis support.
2007-08-23 11:34:48 +00:00
Richard Levitte
42fe218b9f
VAX C can't handle 64 bit integers, making SHA512 impossible...
2007-08-22 20:58:50 +00:00
Dr. Stephen Henson
956006b741
Use SHA256 for ticket HMAC if possible.
2007-08-20 12:35:20 +00:00
Dr. Stephen Henson
167066fed4
Fix for asm/no-asm on WIN32.
2007-08-13 02:24:26 +00:00
Dr. Stephen Henson
525de5d335
OPENSSL_NO_TLS1 WIN32 build support. Fix so normal build works again.
2007-08-12 23:59:05 +00:00
Dr. Stephen Henson
367eb1f125
Fix warning and make no-tlsext work.
2007-08-12 18:56:14 +00:00
Dr. Stephen Henson
3444961787
Typo.
2007-08-12 18:05:20 +00:00
Dr. Stephen Henson
710069c19e
Fix warnings.
2007-08-12 17:44:32 +00:00
Dr. Stephen Henson
ddd3a617ca
Remove debugging fprintfs, fix typo.
2007-08-12 17:06:28 +00:00
Dr. Stephen Henson
6434abbfc6
RFC4507 (including RFC4507bis) TLS stateless session resumption support
...
for OpenSSL.
2007-08-11 23:18:29 +00:00
Andy Polyakov
e45c100762
Typos in ./config.
...
PR: 1563
2007-08-01 11:20:39 +00:00
Andy Polyakov
5a22a8e7f9
MacOS X update.
2007-07-31 19:30:13 +00:00
Andy Polyakov
d6c764573c
Proper support for shared build under MacOS X.
2007-07-31 18:24:41 +00:00
Andy Polyakov
9d35d08ab6
Typo in ppccpuid.pl.
2007-07-31 18:19:40 +00:00
Bodo Möller
f7b61702a0
document -S and -nopad options in usage information
2007-07-31 09:42:47 +00:00
Andy Polyakov
983180bb8b
Buglet fixes and minor optimization in aes-x86_86 assembler.
2007-07-30 16:42:57 +00:00
Andy Polyakov
cdb0392159
Make preprocessor logic more fail-safe.
2007-07-30 11:53:01 +00:00
Andy Polyakov
1891f5b395
As for inline vs. __inline. The original code implies that most compilers
...
understand inline, while WIN32 ones insist on __inline. Well, there are
other compilers that insist on __inline. At the same time it turned out
that most compilers understand both __inline and inline. I could find
only one that doesn't understand __inline, Sun C. In other words it seems
that __inline as preferred choice provides better coverage...
2007-07-30 11:42:08 +00:00
Andy Polyakov
a3963619f6
Make ppccpuid AIX friendly.
2007-07-30 08:47:32 +00:00
Andy Polyakov
34994068a4
Respect ISO aliasing rules.
...
PR: 1296
2007-07-27 20:34:10 +00:00
Andy Polyakov
afaad0ada6
AES for IA64 update.
2007-07-27 18:20:52 +00:00
Andy Polyakov
05f9cb3b77
ia64cpuid update.
2007-07-27 18:03:27 +00:00
Andy Polyakov
1988a456a7
x86 perlasm updates.
2007-07-25 12:38:11 +00:00
Andy Polyakov
69216cc5a5
Configure update from 098.
2007-07-24 14:41:20 +00:00
Dr. Stephen Henson
2cf6fa4c8b
Update debug-steve
2007-07-24 00:27:25 +00:00
Andy Polyakov
a61710b868
Allow for option to skip hardware support.
2007-07-23 20:38:57 +00:00
Andy Polyakov
20f7563f3d
md32_common.h update.
2007-07-23 13:57:15 +00:00
Andy Polyakov
3df2eff4bd
x86*cpuid update.
2007-07-21 14:46:27 +00:00
Andy Polyakov
a415ebd026
Complete synchronization of aes-x86_64 with aes-586.
2007-07-21 14:20:46 +00:00
Andy Polyakov
52ee3d01ae
Lppc_AES_[en|de]crypt_compact: size optimization.
2007-07-19 15:31:22 +00:00
Andy Polyakov
e59f992be6
Minor optimization in AES_set_encryption_key for x86_64.
2007-07-19 14:59:26 +00:00
Andy Polyakov
8bae7722a2
_x86_64_AES_[en|de]crypt_compact: size optimization and aggressive
...
T[ed]4 prefetch.
2007-07-19 14:29:41 +00:00
Dr. Stephen Henson
0d7dba92c8
WIN32 VC++ build fixes.
2007-07-18 17:40:49 +00:00
Andy Polyakov
ce1390aedc
shlib_wrap.sh update.
2007-07-16 14:00:08 +00:00
Andy Polyakov
287a9ee76e
gas -g doesn't tolerate unpadded .bytes in code segment.
2007-07-13 21:35:56 +00:00
Andy Polyakov
96b0f6c16d
Various minor updates to AES assembler modules.
2007-07-13 17:42:13 +00:00
Andy Polyakov
e1612ea59d
Add _x86_64_AES_[en|de]crypt_compact.
2007-07-13 17:39:40 +00:00
Andy Polyakov
71f4ea44eb
EVP_*_cfb1 was broken.
...
PR: 1318
2007-07-08 19:14:02 +00:00
Andy Polyakov
35295bdbee
bn_mul_recursive doesn't handle all cases correctly, which results in
...
BN_mul failures at certain key-length mixes.
PR: 1427
2007-07-08 18:53:03 +00:00
Andy Polyakov
aa8d6f3e86
Typo in str_lib.c
...
PR: 1177
2007-07-07 20:11:12 +00:00
Andy Polyakov
62aa5dd415
Fix build problem on Tru64.
2007-06-29 13:11:45 +00:00
Andy Polyakov
673c55a2fe
Latest bn_mont.c modification broke ECDSA test. I've got math wrong, which
...
is fixed now.
2007-06-29 13:10:19 +00:00
Ben Laurie
949ce10e88
Fix warning.
2007-06-23 18:47:51 +00:00
Ben Laurie
8dee823e61
Inline function declarations have to be prototypes.
2007-06-23 18:40:16 +00:00
Andy Polyakov
5d86336746
Flush output in x86_64cpuid.pl.
2007-06-21 11:39:35 +00:00
Andy Polyakov
5b89f78a89
Typo in x86_64-mont.pl.
...
PR: 1549
2007-06-21 11:38:52 +00:00
Andy Polyakov
85a5668dba
CHANGES update from 098-stable.
2007-06-20 17:46:43 +00:00
Andy Polyakov
c943ca5404
Optimize OPENSSL_cleanse.
2007-06-20 17:36:39 +00:00
Andy Polyakov
1c7f8707fd
bn_asm for s390x.
2007-06-20 14:10:16 +00:00
Andy Polyakov
a21c46e70b
Typo in Linux part of sparcv9cap.c
...
PR: 1532
2007-06-20 13:02:34 +00:00
Andy Polyakov
f3c26535ad
Make some shortcuts in sparcv9cap.c. Trouble is that di_walk_node result
...
is inconsistent among CPU generations.
2007-06-20 13:00:59 +00:00
Andy Polyakov
2329694222
SPARC Solaris and Linux assemblers treat .align directive differently.
...
PR: 1547
2007-06-20 12:24:22 +00:00
Dr. Stephen Henson
206a975752
Update from stable branch.
2007-06-19 15:43:48 +00:00
Dr. Stephen Henson
9677bf0f30
Update .cvsignore
2007-06-18 12:40:24 +00:00
Dr. Stephen Henson
6d6496ed52
Make ordinals consistent with OpenSSL 0.9.8
2007-06-18 12:35:56 +00:00
Andy Polyakov
7d9cf7c0bb
Eliminate conditional final subtraction in Montgomery assembler modules.
2007-06-17 17:10:03 +00:00
Andy Polyakov
55525742f4
Privatize BN_*_no_branch.
2007-06-11 16:33:03 +00:00
Andy Polyakov
c693b5a55c
Commentary updates and minor optimization for bn_mont.c.
2007-06-11 08:53:52 +00:00
Andy Polyakov
6b6443dead
Eliminate conditional final subtraction in Montgomery multiplication.
2007-06-10 19:34:38 +00:00
Dr. Stephen Henson
54b5fd537f
WIN32 fixes.
2007-06-08 00:26:16 +00:00
Dr. Stephen Henson
0b99d4f1d1
Remove unnecessary casts and avoid some warnings with gcc 4.2.
2007-06-07 16:07:57 +00:00
Dr. Stephen Henson
3c07d3a3d3
Finish gcc 4.2 changes.
2007-06-07 13:14:42 +00:00
Dr. Stephen Henson
1d1a64653c
Back out safestack.h change for now: seems to break some things.
2007-06-04 22:18:20 +00:00
Dr. Stephen Henson
297e6f1917
Avoid use of function pointer casts in pem library. Modify safestack to
...
always use inline functions.
2007-06-04 17:53:04 +00:00
Dr. Stephen Henson
b948e2c59e
Update ssl library to support EVP_PKEY MAC API. Include generic MAC support.
2007-06-04 17:04:40 +00:00
Dr. Stephen Henson
18096abb29
Handle NULL parameter in some EVP utility functions.
2007-05-31 12:39:21 +00:00
Dr. Stephen Henson
0aa08a2e34
Fix for GOST engine on platforms where sizeof(size_t) != sizeof(int).
2007-05-31 12:32:27 +00:00
Andy Polyakov
f20af72312
AES_set_[en|de]crypt_key for ARMv4.
2007-05-30 15:57:31 +00:00
Andy Polyakov
7ef643360d
s390x gas can't handle .align 128.
2007-05-28 16:32:50 +00:00
Andy Polyakov
76c828c627
AES_set_[en|de]crypt_key for s390x.
2007-05-28 16:30:18 +00:00
Dr. Stephen Henson
281cfff026
Update ordinals.
2007-05-24 10:17:49 +00:00
Dr. Stephen Henson
64a5c5d1be
Fix X509_REQ_print_ex() to process extension options.
2007-05-22 23:31:29 +00:00
Dr. Stephen Henson
7b8b797375
Revert broken change to ccgost.
...
Initialize context properly for HMAC pkey method.
2007-05-22 12:58:39 +00:00
Andy Polyakov
a1a382dbc9
SHA256 for ARMv4.
2007-05-22 09:56:45 +00:00
Bodo Möller
19f6c524bf
Fix crypto/ec/ec_mult.c to work properly with scalars of value 0
2007-05-22 09:47:43 +00:00
Dr. Stephen Henson
8dbdf6314c
Typo.
2007-05-21 16:36:09 +00:00
Dr. Stephen Henson
9c54e18bf0
Fixes for dgst tool. Initialize md_name, sig_name properly. Return error code
...
on failure. Keep output format consistent with previous versions.
Also flush stdout after printing ACCEPT in s_server.
2007-05-21 15:53:30 +00:00
Dr. Stephen Henson
9aba74e55a
Fix warning and back out bad modification.
2007-05-21 12:16:36 +00:00
Andy Polyakov
e4317d2031
OPENSSL_IMPLEMENT_GLOBAL caused more grief than it's worth (it's used twice
...
in legacy code). I'd rather just remove it along with legacy interface,
but it's probably not as appropriate as I'd like. Reimplement the macro.
2007-05-20 20:11:19 +00:00
Andy Polyakov
61775daf00
Padlock engine fails to compile with -O0 -fPIC.
2007-05-20 07:13:45 +00:00
Andy Polyakov
86d8f3ee19
Typo in aes-ppc.pl.
2007-05-19 20:00:33 +00:00
Andy Polyakov
cb1fbf9f63
--enable-auto-image-base in cygwin build.
...
PR: 1517
Submitted by: vinschen@redhat.com
2007-05-19 19:40:15 +00:00
Andy Polyakov
3005764c18
Typo in x509_txt.c.
...
Submitted by: Martin.Kraemer@Fujitsu-Siemens.com
2007-05-19 18:03:21 +00:00
Andy Polyakov
b1e8b4e65d
x86cpuid fixes.
...
PR: 1526
2007-05-19 17:52:51 +00:00
Andy Polyakov
c6149e2f02
ppc-xlate.pl update.
2007-05-19 17:32:06 +00:00
Andy Polyakov
aa5c99fa01
sparccpuid.s update.
2007-05-19 17:26:48 +00:00
Andy Polyakov
9c200f5471
Initial draft of AES for PPC.
2007-05-19 17:16:27 +00:00
Dr. Stephen Henson
ec06417d52
Updated GOST MAC support.
...
Submitted by: vitus@cryptocom.ru
2007-05-18 15:55:55 +00:00
Dr. Stephen Henson
a4346646f1
Initial GOST MAC support. Not fully working yet...
2007-05-17 17:44:09 +00:00
Dr. Stephen Henson
a70c09e2a2
Add .cvsignore to seed dir.
2007-05-17 16:43:15 +00:00
Dr. Stephen Henson
0f9e0abbee
Set len to buffer size.
2007-05-17 16:42:05 +00:00
Dr. Stephen Henson
e77dbf325f
Prepend signature name in dgst output.
2007-05-17 16:19:17 +00:00
Dr. Stephen Henson
f03620ea15
Use default md if none specified in dgst utility.
2007-05-17 12:55:03 +00:00
Dr. Stephen Henson
47b2e238e5
Use EVP_DigestVerify() in dgst.c if verifying.
2007-05-17 12:35:32 +00:00
Dr. Stephen Henson
ad35cdac74
PR: 1516
...
Revert change in 1516 because it breaks Windows build. Use a modified version
of the headers from s_client.c which has used similar functionality without
any problems.
2007-05-16 12:16:49 +00:00
Dr. Stephen Henson
4eba5d8c86
Fix error code name.
2007-05-16 00:14:32 +00:00
Dr. Stephen Henson
e69adea539
New function EVP_PKEY_asn1_copy(). Use default MD if type param is NULL.
2007-05-15 23:52:03 +00:00
Dr. Stephen Henson
9660cbcd6b
Change C++ style comments.
2007-05-15 23:50:55 +00:00
Andy Polyakov
9c9c83ccb9
Throw in ppccpuid module.
2007-05-15 20:51:48 +00:00
Andy Polyakov
1d42fb5f4a
Fix linking error after adding alphacpuid.s.
2007-05-15 07:11:23 +00:00
Andy Polyakov
e119769480
Add alphacpuid.s
2007-05-15 06:36:17 +00:00
Andy Polyakov
b2dba9bf1f
Profiling revealed that OPENSSL_cleanse consumes *more* CPU time than
...
sha1_block_data_order when hashing short messages. Move OPENSSL_cleanse
to "cpuid" assembler module and gain 2x.
2007-05-14 21:35:25 +00:00
Andy Polyakov
932cc129ee
x86_64 assembler updates.
2007-05-14 15:57:19 +00:00
Andy Polyakov
1a42839ba7
As all assembler modules are alignment neutral, allow C to pass unaligned
...
content.
2007-05-13 15:16:44 +00:00
Andy Polyakov
232a938c75
Make sha*-ia64 modules alignment neutral.
2007-05-13 15:15:24 +00:00
Ben Laurie
69ab085290
More IGE speedup.
2007-05-13 15:14:38 +00:00
Ben Laurie
5f09d0ecc2
AES IGE mode speedup.
2007-05-13 12:57:59 +00:00
Dr. Stephen Henson
76b46e7707
Document streaming options.
2007-05-11 12:08:38 +00:00
Dr. Stephen Henson
6217896145
Improve error detection when streaming S/MIME.
...
Only use streaming when appropriate for detached data in smime utility.
2007-05-10 17:37:15 +00:00
Dr. Stephen Henson
ee7ca0941a
Tidy up docs, remove warning.
2007-05-10 17:35:37 +00:00
Dr. Stephen Henson
f8492ffeaa
More useful ASN1 macros for static allocation functions.
2007-05-10 17:34:42 +00:00
Andy Polyakov
308595638a
Mention Core2 in sha1-x86_64.
2007-05-10 07:34:50 +00:00
Andy Polyakov
0bd8d6e2e1
Commentary updates to SHA for sparcv9.
2007-05-10 06:48:28 +00:00
Andy Polyakov
160065c5bb
Detect UltraSPARC T1 in ./config.
2007-05-04 13:04:17 +00:00
Andy Polyakov
ae0d6e3e36
Engage SHA for sparcv9.
2007-05-04 12:54:02 +00:00
Andy Polyakov
6fa8a01c72
SHA for sparcv9.
2007-05-04 12:52:54 +00:00
Andy Polyakov
3f6916cf29
Fix bug introduced in cn#16195.
2007-05-03 09:12:47 +00:00
Andy Polyakov
a4470ae7b2
Fine reading of manual suggests that km can return non-normal completion code.
2007-05-03 07:26:27 +00:00
Andy Polyakov
251718e4c1
Fix s390x bugs and correct performance coefficients.
2007-05-02 11:44:02 +00:00
Richard Levitte
c504a5e783
Synchronise VMS with Unix.
2007-05-01 12:25:15 +00:00
Andy Polyakov
f6fb2c95ef
Revert irrelevant changes from commit #16191 .
2007-04-30 17:22:09 +00:00
Andy Polyakov
708311267a
rll does not seem to be available on legacy s390.
2007-04-30 17:19:12 +00:00
Andy Polyakov
cdd1d7a618
Typo in commit #16187 .
2007-04-30 15:55:00 +00:00
Andy Polyakov
2f324768b2
Typo in s390x_asm.
2007-04-30 15:48:54 +00:00
Andy Polyakov
6ef18c21c9
Bug in apps/dgst.c.
2007-04-30 15:20:10 +00:00
Andy Polyakov
b38c0add30
s390x optimizations.
2007-04-30 13:26:06 +00:00
Andy Polyakov
b900df5258
Engage s390x assembler modules.
2007-04-30 09:22:27 +00:00
Andy Polyakov
a2a54ffc5f
s390x assembler pack.
2007-04-30 08:42:54 +00:00
Andy Polyakov
20c04a13e6
Reimplement rc4-586.pl, relicense rc4-x86_64.pl.
2007-04-26 20:48:38 +00:00
Bodo Möller
a291745eeb
fix function codes for error
2007-04-24 01:06:19 +00:00
Bodo Möller
0862caf27e
remove leftover from editing ...
2007-04-24 00:47:53 +00:00
Bodo Möller
cb1bab1a04
All ciphersuites should have a strength designator.
2007-04-24 00:13:51 +00:00
Bodo Möller
96afc1cfd5
Add SEED encryption algorithm.
...
PR: 1503
Submitted by: KISA
Reviewed by: Bodo Moeller
2007-04-23 23:48:59 +00:00
Bodo Möller
24a8c25ab5
fix error codes
2007-04-19 15:14:21 +00:00
Bodo Möller
d1e7d1d96c
don't violate the bn_check_top assertion in BN_mod_inverse_no_branch()
2007-04-19 14:45:57 +00:00
Dr. Stephen Henson
18f547734e
New function ASN1_STRING_copy() to copy to an already
...
alloacted ASN1_STRING structure.
2007-04-14 17:53:55 +00:00
Dr. Stephen Henson
be3b365a34
Sample text files for S/MIME test programs.
2007-04-13 20:41:42 +00:00
Dr. Stephen Henson
b2b2dafc28
Add a bunch of S/MIME sample programs and data.
2007-04-13 20:40:47 +00:00
Dr. Stephen Henson
14ab6cdd69
Flush b64 BIO.
2007-04-13 18:00:45 +00:00
Dr. Stephen Henson
eeec060df0
Don't finalize signerinfo if reuse and partial both set.
2007-04-13 16:41:52 +00:00
Dr. Stephen Henson
0efb7b1eea
PKCS7_sign_add_signer() docs.
2007-04-13 16:31:08 +00:00
Dr. Stephen Henson
f000f705ea
More docs for streaming functions.
2007-04-13 15:43:15 +00:00
Dr. Stephen Henson
2749cc1ede
Typo.
2007-04-13 13:23:31 +00:00
Dr. Stephen Henson
a44e4f2cf8
d2i_PKCS7_bio_stream() docs.
2007-04-13 13:22:15 +00:00
Dr. Stephen Henson
30b10f947a
Oops...
2007-04-13 13:20:46 +00:00
Dr. Stephen Henson
731c6802d7
Update docs.
2007-04-13 13:13:14 +00:00
Dr. Stephen Henson
4cfb986f27
Update docs.
2007-04-13 12:57:48 +00:00
Dr. Stephen Henson
9cfc8a9d5c
Update smime utility to support streaming for -encrypt and -sign -nodetach
...
options. Add new streaming i2d (though strictly speaking it is BER format
when streaming) and PEM functions.
These all process content on the fly without storing it all in memory.
2007-04-13 01:06:41 +00:00
Dr. Stephen Henson
18327cd0e4
Copy update callback across when copying EVP_MD_CTX.
...
Remove unnecessary reference to EVP_MD_CTX in HMAC pkey method.
2007-04-12 13:02:31 +00:00
Dr. Stephen Henson
2022cfe07e
New -mac and -macopt options to dgst utility. Reimplement -hmac option in
...
terms of new API.
2007-04-11 17:20:40 +00:00
Dr. Stephen Henson
47b71e6ee9
Update CHANGES.
2007-04-11 12:33:28 +00:00
Dr. Stephen Henson
74633553a9
Experimental HMAC support via EVP_PKEY_METHOD.
2007-04-11 12:33:06 +00:00
Dr. Stephen Henson
376bf1d4aa
Constification.
2007-04-11 12:26:53 +00:00
Dr. Stephen Henson
d318fb79d2
Don't ignore config_name parameter passed to OPENSSL_config(). Use
...
"openssl_conf" in config file if config_name variable is missing.
2007-04-09 11:45:54 +00:00
Dr. Stephen Henson
2840dcd2a6
file evp_cnf.c was added on branch OpenSSL_1_0_1-stable on 2012-07-04 13:14:11 +0000
2007-04-08 17:50:59 +00:00
Dr. Stephen Henson
bd5770c6b1
file evp_cnf.c was added on branch OpenSSL_1_0_2-stable on 2012-07-04 13:14:44 +0000
2007-04-08 17:50:58 +00:00
Dr. Stephen Henson
0cc361f3e7
Fix from stable branch.
2007-04-08 17:45:47 +00:00
Dr. Stephen Henson
baecb96e8a
Fix digest signing so digest type is set after init.
2007-04-08 16:53:50 +00:00
Dr. Stephen Henson
6181f5e404
Preliminary support for signctx/verifyctx callbacks.
2007-04-08 13:03:26 +00:00
Dr. Stephen Henson
d952c79a7b
New -sigopt option for dgst utility.
2007-04-08 12:47:18 +00:00
Ben Laurie
3dfb6b3353
Yet another resource leak. Coverity ID 123.
2007-04-07 13:20:09 +00:00
Ben Laurie
48bd505c0b
If you're going to check for negative, use an signed integer! Coverity ID 122.
2007-04-05 17:31:29 +00:00
Ben Laurie
ab2d91bd6b
Don't copy from a nonexistent next. Coverity ID 47.
2007-04-05 17:23:51 +00:00
Ben Laurie
3b2eead381
Fix duplicate error number.
2007-04-05 17:09:43 +00:00
Ben Laurie
f3d2a9db09
Errors should actually be errors.
2007-04-05 17:03:09 +00:00
Ben Laurie
8bbf6ac010
Don't dereference NULL argument. Coverity ID 52.
2007-04-05 16:58:39 +00:00
Ben Laurie
38e952e8ae
Missing config file.
2007-04-05 16:57:07 +00:00
Ben Laurie
fa9fed1c3a
Don't use a negative number as a length. Coverity ID 57.
2007-04-05 16:28:48 +00:00
Ben Laurie
f6301f6888
Avoid overrun. Coverity ID 60.
2007-04-05 15:45:58 +00:00
Ben Laurie
44907e6064
Free memory. Coverity ID 62.
2007-04-05 15:45:22 +00:00
Nils Larsch
907e99623c
check return value of ASN1_item_i2d(), Coverity ID 55
2007-04-04 19:41:20 +00:00
Ben Laurie
231671b9ff
Resource leak.
2007-04-04 16:00:03 +00:00
Ben Laurie
4f1a0b2c21
Handle bad content type. Coverity ID 99.
2007-04-04 15:31:17 +00:00
Ben Laurie
260c497cdd
Fix buffer overrun. Coverity ID 106.
2007-04-04 15:13:31 +00:00
Ben Laurie
313fce7b61
Don't free a NULL. Coverity ID 112.
2007-04-04 14:59:20 +00:00
Ben Laurie
2f877235a3
Missing return on error. Coverity ID 115.
2007-04-04 14:38:59 +00:00
Ben Laurie
309fa55bbb
Return an error if the serial number is badly formed. (Coverity ID 116).
2007-04-04 14:35:56 +00:00
Ben Laurie
4b8747e440
Die if serial number is invalid.
2007-04-04 13:41:33 +00:00
Ben Laurie
2ff7a0edef
Make sure we detect corruption.
2007-04-04 13:21:15 +00:00
Nils Larsch
442cbb062d
check correct pointer before freeing it (Coverity CID 79,86)
2007-04-02 20:29:40 +00:00
Nils Larsch
c971ca4c86
check if pointer is != NULL before dereferencing it (Coverity CID 40)
2007-04-02 20:02:27 +00:00
Andy Polyakov
9babf3929b
RC4_set_key for x86_64 and Core2 optimization.
...
PR: 1447
2007-04-02 09:50:14 +00:00
Ben Laurie
2ec0be9e77
Don't die if the value is NULL (Coverity CID 98).
2007-04-01 18:00:52 +00:00
Ben Laurie
c2d1c2d319
Fix warning.
2007-04-01 17:56:25 +00:00
Andy Polyakov
162f677def
Update x86cpuid.pl to correctly detect shared cache and to support new
...
RC4_set_key.
2007-04-01 17:28:08 +00:00
Andy Polyakov
2875462425
Reserve for assembler implementation of RC4_set_key and implement x86 one.
2007-04-01 17:01:12 +00:00
Richard Levitte
a1d915990b
Apply a more modern way to get the definition of select(), except for VMS.
...
Submitted by Corinna Vinschen <vinschen@redhat.com >
2007-03-29 18:34:57 +00:00
Bodo Möller
b002265ee3
make BN_FLG_CONSTTIME semantics more fool-proof
2007-03-28 18:41:23 +00:00
Bodo Möller
bd31fb2145
Change to mitigate branch prediction attacks
...
Submitted by: Matthew D Wood
Reviewed by: Bodo Moeller
2007-03-28 00:15:28 +00:00
Andy Polyakov
b506821d43
Allow shared builds for aix[64]-gcc targets.
2007-03-25 15:20:35 +00:00
Andy Polyakov
4bfb49b3cf
aix[64]-cc config lines update.
2007-03-25 15:13:51 +00:00
Dr. Stephen Henson
9981a51e42
Stage 1 GOST ciphersuite support.
...
Submitted by: ran@cryptocom.ru
Reviewed by: steve@openssl.org
2007-03-23 17:04:05 +00:00
Richard Levitte
ebb326afe6
Synchronise the VMS build with recent movements in the Unix build.
2007-03-23 09:36:33 +00:00
Andy Polyakov
0d1aa74d6f
Fixes for aix-shared rules.
2007-03-22 08:46:33 +00:00
Dr. Stephen Henson
a9c5de8654
file buf_str.c was added on branch OpenSSL_1_0_1-stable on 2011-01-09 13:30:58 +0000
2007-03-22 00:37:54 +00:00
Bodo Möller
0f32c841a6
stricter session ID context matching
2007-03-21 14:33:16 +00:00
Bodo Möller
41a8d5167f
clarification regarding libdes files
2007-03-21 10:58:45 +00:00
Andy Polyakov
8f41e4fa4d
link warnings caused by nasm modules.
2007-03-20 09:37:06 +00:00
Andy Polyakov
de50494505
Two extra instructions in RC4 character loop give 80% performance
...
improvement on Core2. I still need to detect Core2 and choose this
path...
2007-03-20 09:13:07 +00:00
Andy Polyakov
3d1def0132
Remove obsolete comment.
2007-03-20 09:07:19 +00:00
Andy Polyakov
0a29f5110d
Various PowerPC config updates.
2007-03-20 08:57:18 +00:00
Andy Polyakov
8b71d35458
nasm fixes.
2007-03-20 08:55:58 +00:00
Andy Polyakov
760e353528
sparcv9a-mont was modified to handle 32-bit aligned input, but check
...
for 64-bit alignment was not removed.
2007-03-20 08:54:51 +00:00
Dr. Stephen Henson
3627fedbea
Win32 fixes. Add GOST algorithm to mkdef, update ordinals. Signed/unsigned fixes.
2007-03-16 22:20:55 +00:00
Dr. Stephen Henson
bbb5cf05db
Fix from stable branch.
2007-03-05 00:09:08 +00:00
Nils Larsch
ebb01b84b8
size_t -> int
2007-03-02 19:56:29 +00:00
Nils Larsch
a0d48e7e7e
remove unused file
2007-03-02 19:42:16 +00:00
Lutz Jänicke
1fcfa22222
Initialize "buf" to 0 to make valgrind happy :-)
...
Note: the RAND_bytes() manual page says:
RAND_bytes() puts num cryptographically strong pseudo-random bytes into buf.
It does not talk about using the previous contents of buf so we are working
as documented.
2007-03-02 17:54:51 +00:00
Lutz Jänicke
c9fb4e2c8d
Do not use uninitialized memory to seed the PRNG as it may confuse
...
code checking tools.
PR: 1499
2007-03-02 17:46:25 +00:00
Dr. Stephen Henson
6e7ca5e1eb
Update from stable branch.
2007-02-27 18:43:42 +00:00
Ralf S. Engelschall
954b274789
small cosmetics: align title with the other similar manual page
2007-02-27 07:41:54 +00:00
Nils Larsch
0d5ac5a738
allow EVP_PKEY_CTX_free(NULL)
2007-02-26 18:32:53 +00:00
Nils Larsch
c209a35820
remove dead code
2007-02-26 18:21:19 +00:00
Bodo Möller
dd2b6750db
include complete 0.9.7 history
...
include release date of 0.9.8e
2007-02-26 10:49:59 +00:00
Bodo Möller
4bb89bca9e
use 2007 copyright for generated files
2007-02-26 10:48:10 +00:00
Dr. Stephen Henson
ac63b8370e
Update FAQ,NEWS in HEAD.
2007-02-23 13:16:38 +00:00
Bodo Möller
882d29dd87
Fix incorrect substitution that happened during the recent ciphersuite
...
selection remodeling
Submitted by: Victor Duchovni
2007-02-22 21:31:19 +00:00
Lutz Jänicke
ee373e7f19
Fix problem with multi line responses in -starttls by using a buffering
...
BIO and BIO_gets().
2007-02-22 17:39:47 +00:00
Lutz Jänicke
8d72476e2b
Extend SMTP and IMAP protocol handling to perform the required
...
EHLO or CAPABILITY handshake before sending STARTTLS
Submitted by: Goetz Babin-Ebell <goetz@shomitefo.de >
2007-02-21 18:20:41 +00:00
Lutz Jänicke
02756aa8ba
Add automatic detection for Linux on SuperH
...
PR: 1152
Submitted by: Mike Frysinger <vapier@gentoo.org >
2007-02-21 18:10:20 +00:00
Lutz Jänicke
072dfb9e4e
Add support for m68k linux
...
PR: 1277
Submitted by: Mike Frysinger <vapier@gentoo.org >
2007-02-21 17:58:54 +00:00
Lutz Jänicke
0636c39bb1
Fix incorrect handling of special characters
...
PR: 1459
Submitted by: tnitschke@innominate.com
Reviewed by: steve@openssl.org
2007-02-21 17:44:53 +00:00
Dr. Stephen Henson
a2e623c011
Update from 0.9.7-stable.
2007-02-21 13:49:35 +00:00
Bodo Möller
aa79dd6895
prefer SHA1 over MD5 (this affects the Kerberos ciphersuites)
2007-02-21 09:33:14 +00:00
Bodo Möller
60cad2caed
delete obsolete comment
2007-02-21 09:32:17 +00:00
Bodo Möller
114c9c36b1
SSL_kKRB5 ciphersuites shouldn't be preferred by default
2007-02-20 16:39:58 +00:00
Bodo Möller
fd5bc65cc8
Improve ciphersuite order stability when disabling ciphersuites.
...
Change ssl_create_cipher_list() to prefer ephemeral ECDH over
ephemeral DH.
2007-02-20 16:36:58 +00:00
Bodo Möller
e041863905
fix a typo in the new ciphersuite ordering code
2007-02-20 13:25:36 +00:00
Bodo Möller
0a05123a6c
Include "!eNULL" in SSL_DEFAULT_CIPHER_LIST to make sure that a
...
ciphersuite string such as "DEFAULT:RSA" cannot enable
authentication-only ciphersuites.
Also, change ssl_create_cipher_list() so that it no longer
starts with an arbitrary ciphersuite ordering, but instead
uses the logic that we previously had in SSL_DEFEAULT_CIPHER_LIST.
SSL_DEFAULT_CIPHER_LIST simplifies into just "ALL:!aNULL:!eNULL".
2007-02-19 18:41:41 +00:00
Bodo Möller
2afe316721
fix warnings for CIPHER_DEBUG builds
2007-02-19 16:59:13 +00:00
Bodo Möller
7e69565fe6
fix warnings/inconsistencies caused by the recent changes to the
...
ciphersuite selection code in HEAD
Submitted by: Victor Duchovni
2007-02-19 14:53:18 +00:00
Bodo Möller
ccae144d62
fix incorrect strength bit values for certain Kerberos ciphersuites
...
Submitted by: Victor Duchovni
2007-02-19 14:49:12 +00:00
Dr. Stephen Henson
5d5ca32fa1
Updates from 0.9.8-stable branch.
2007-02-18 18:21:57 +00:00
Bodo Möller
52b8dad8ec
Reorganize the data used for SSL ciphersuite pattern matching.
...
This change resolves a number of problems and obviates multiple kludges.
A new feature is that you can now say "AES256" or "AES128" (not just
"AES", which enables both).
In some cases the ciphersuite list generated from a given string is
affected by this change. I hope this is just in those cases where the
previous behaviour did not make sense.
2007-02-17 06:45:38 +00:00
Nils Larsch
cc684e330b
ensure that the EVP_CIPHER_CTX object is initialized
...
PR: 1490
2007-02-16 20:34:15 +00:00
Richard Levitte
85c6749216
Add STARTTLS support for IMAP and FTP.
...
Submitted by Kees Cook <kees@outflux.net >
2007-02-16 18:12:16 +00:00
Nils Larsch
30e5e8aca5
- use OPENSSL_malloc() etc. in zlib
...
- move zlib_stateful_ex_idx initialization to COMP_zlib()
PR: 1468
2007-02-14 21:52:01 +00:00
Nils Larsch
b900a6b42f
avoid shifting input
2007-02-11 19:33:21 +00:00
Nils Larsch
15780a1ea0
use user-supplied malloc functions for persistent kssl objects
...
PR: 1467
Submitted by: Andrei Pelinescu-Onciul <andrei@iptel.org >
2007-02-10 10:42:48 +00:00
Nils Larsch
92ada7cc52
remove unreachable code
2007-02-10 09:45:07 +00:00
Dr. Stephen Henson
53ca4761cc
PR: 1483
...
Add support for GOST 28147-89 in Gost ENGINE.
2007-02-09 19:43:04 +00:00
Dr. Stephen Henson
52cfa39716
Add -hmac option to dgst from 0.9.7 stable branch.
2007-02-08 19:07:43 +00:00
Nils Larsch
b3bad17d1a
remove unused variable
2007-02-07 20:49:58 +00:00
Nils Larsch
feaaf1dbea
ensure that a ec key is used
...
PR: 1476
2007-02-07 20:28:19 +00:00
Richard Levitte
82bf227e91
After objects have been freed, NULLify the pointers so there will be no double
...
free of those objects
2007-02-07 01:42:46 +00:00
Nils Larsch
8807a2dfc4
fix typo
2007-02-06 19:48:42 +00:00
Nils Larsch
bcb38217c4
add note about 56 bit ciphers
...
PR: 1461
2007-02-06 19:41:01 +00:00
Dr. Stephen Henson
af32f9fdda
Update from fips2 branch.
2007-02-03 17:32:49 +00:00
Nils Larsch
357d5de5b9
add support for DSA with SHA2
2007-02-03 14:41:12 +00:00
Nils Larsch
0501f02b06
fix documentation
...
PR: 1466
2007-02-03 10:28:08 +00:00
Nils Larsch
689f9faba4
fix potential memory leaks
...
PR: 1462
2007-02-03 09:55:42 +00:00
Andy Polyakov
82686bdcaa
Minimize aes_core.c footprint when AES_[en|de]crypt is implemented in
...
assembler.
2007-01-25 20:47:00 +00:00
Andy Polyakov
14b1d089b6
Minor touch to aes-armv4.pl.
2007-01-25 11:28:07 +00:00
Andy Polyakov
a296239bdd
AES for ARMv4.
2007-01-25 10:44:48 +00:00
Andy Polyakov
0b0896cdd2
Minor optimization for sha1-armv4 module.
2007-01-25 10:44:18 +00:00
Dr. Stephen Henson
2d3e956ae0
Update from 0.9.7-stable.
2007-01-23 17:53:48 +00:00
Andy Polyakov
36b7c06975
SHA1 for ARMv4 and Thumb.
2007-01-22 20:33:46 +00:00
Dr. Stephen Henson
42182852f5
Constify version strings is ssl lib.
2007-01-21 16:06:05 +00:00
Dr. Stephen Henson
560b79cbff
Constify version strings and some structures.
2007-01-21 13:07:17 +00:00
Dr. Stephen Henson
a6d799d705
Add AOL an AOLTW root CAs to bundle.
2007-01-18 21:24:44 +00:00
Andy Polyakov
64aecc6720
Make armv4t-mont module backward binary compatible with armv4 and rename it
...
accordingly.
2007-01-17 20:12:41 +00:00
Lutz Jänicke
8ac40b4dea
Update to new home page
2007-01-12 18:47:13 +00:00
Andy Polyakov
43b8fe1cd0
Montgomery multiplication for ARMv4.
2007-01-11 21:43:25 +00:00
Nils Larsch
39d764ed58
remove undefined constant
2007-01-03 20:00:32 +00:00
Andy Polyakov
a6ebe229e3
opensslwrap.sh to respect $OPENSSL_ENGINES.
2006-12-29 15:00:36 +00:00
Andy Polyakov
5c914f204a
#include <stddef.h> in digest headers.
...
Submitted by: Kurt Roeckx <kurt@roeckx.be >
2006-12-29 14:51:42 +00:00
Andy Polyakov
8876e58f34
Montgomery multiplication for MIPS III/IV. Not engaged.
2006-12-29 11:09:33 +00:00
Andy Polyakov
7321a84d4c
Minor clean-up in crypto/bn/asm.
2006-12-29 11:05:20 +00:00
Andy Polyakov
bb11c28246
Minor clean-up in crypto/engine.
2006-12-29 10:55:43 +00:00
Andy Polyakov
8d9f136d06
Allow opensslwrap.sh to access engines from build tree.
2006-12-29 10:53:09 +00:00
Andy Polyakov
00b4e083fd
Move eng_padlock.c to ./engines.
...
Submitted by: Michal Ludvig <michal@logix.cz >
2006-12-29 10:42:24 +00:00
Andy Polyakov
4cfe3df1f5
Minor performance improvements to x86-mont.pl.
2006-12-28 12:43:16 +00:00
Andy Polyakov
8f2d60ec26
Fix for "strange errors" exposed by ccgost engine. The fix is
...
two extra insructions in sqradd loop at line #503 .
2006-12-27 10:59:51 +00:00
Nils Larsch
123b23fa95
fix return value of get_cert_chain()
...
PR: 1441
2006-12-27 09:40:52 +00:00
Richard Levitte
423a5d54a1
Synchronise a bit more with Unixly build
2006-12-26 21:20:15 +00:00
Richard Levitte
8bbf6bcf17
Needed definition of _XOPEN_SOURCE_EXTENDED so DEC C on VMS will see
...
the declarations of fd_set, select() and so on.
2006-12-25 10:54:14 +00:00
Richard Levitte
ea46f5e0e5
Replace strdup() with BUF_strdup().
2006-12-25 09:43:46 +00:00
Richard Levitte
7f6c848242
Synchronise with Unixly build, again ;-)
2006-12-24 20:25:51 +00:00
Dr. Stephen Henson
559d50138f
Add bit I missed from PKCS#7 streaming encoder.
2006-12-24 16:46:47 +00:00
Dr. Stephen Henson
11d8cdc6ad
Experimental streaming PKCS#7 support.
...
I thought it was about time I dusted this off. This stuff had been sitting on
my hard drive for *ages* (2003 in fact). Hasn't been tested well and may not
work properly.
Nothing uses it at present which is just as well.
Think of this as a traditional Christmas present which looks far more
impressive in the adverts and on the box, some of the bits are missing and
falls to bits if you play with it too much.
2006-12-24 16:22:56 +00:00
Richard Levitte
e49978dafe
Synchronise with Unixly build
2006-12-24 09:27:23 +00:00
Andy Polyakov
e1d9e533b5
Oops! New prototype code creeped through...
2006-12-22 15:47:01 +00:00
Andy Polyakov
f946dd7198
Make sha.h more "portable."
2006-12-22 15:42:06 +00:00
Andy Polyakov
1702c8c4bf
x86-mont.pl sse2 tune-up and integer-only squaring procedure.
2006-12-22 15:28:07 +00:00
Nils Larsch
afda1385bd
use OPENSSL_NO_DYNAMIC_ENGINE macro, disable debug messages
...
PR: 1440
Submitted by: Victor B. Wagner" <vitus@cryptocom.ru >
2006-12-22 09:21:29 +00:00
Nils Larsch
fec38ca4ed
fix typos
...
PR: 1354, 1355, 1398, 1408
2006-12-21 21:13:27 +00:00
Nils Larsch
ec1edeb5fa
update pkcs12 help message + manpage
...
PR: 1443
Submitted by: Artem Chuprina <ran@cryptocom.ru >
2006-12-21 20:36:15 +00:00
Nils Larsch
b0ec114685
fix order
...
PR: 1442
2006-12-21 19:50:48 +00:00
Nils Larsch
c92da5a605
update
2006-12-21 19:48:47 +00:00
Nils Larsch
06e2dd037e
add support for ecdsa-with-sha256 etc.
2006-12-20 08:58:54 +00:00
Nils Larsch
34f0a19309
remove trailing '\'
...
PR: 1438
2006-12-19 19:49:02 +00:00
Bodo Möller
772e3c07b4
Fix the BIT STRING encoding of EC points or parameter seeds
...
(need to prevent the removal of trailing zero bits).
2006-12-19 15:11:37 +00:00
Nils Larsch
360ff3cf58
fix order
2006-12-18 22:20:27 +00:00
Nils Larsch
5dfe910023
properly initialize SSL context, check return value
2006-12-13 22:06:37 +00:00
Nils Larsch
91b73acb19
use const ASN1_TIME *
2006-12-11 22:35:51 +00:00
Andy Polyakov
87d3af6475
Eliminate 64-bit alignment limitation in sparcv9a-mont.
2006-12-08 15:18:41 +00:00
Andy Polyakov
98c1509f34
Engage alpha-mont module. Actually verified on Tru64 only.
2006-12-08 14:42:19 +00:00
Andy Polyakov
98939a05b6
alpha-mont.pl: gcc portability fix and make-rule.
2006-12-08 14:18:58 +00:00
Andy Polyakov
d28134b8f3
Minor, +10%, tune-up for x86_64-mont.pl.
2006-12-08 10:13:51 +00:00
Andy Polyakov
8583eba015
Montgomery multiplication routine for Alpha.
2006-12-08 10:12:56 +00:00
Dr. Stephen Henson
5894b98f99
Update from 0.9.7-stable branch.
2006-12-07 13:29:08 +00:00
Dr. Stephen Henson
5de3a0ff3d
Sync OID NIDs with OpenSSL 0.9.8.
2006-12-06 13:44:21 +00:00
Dr. Stephen Henson
10ca15f3fa
Fix change to OPENSSL_NO_RFC3779
2006-12-06 13:36:48 +00:00
Nils Larsch
da736b31b2
fix documentation
...
PR: 1343
2006-12-06 09:10:59 +00:00
Nils Larsch
fa9ac569b8
avoid duplicate entries in add_cert_dir()
...
PR: 1407
Submitted by: Tomas Mraz <tmraz@redhat.com >
2006-12-05 21:21:37 +00:00
Nils Larsch
10a10fb834
return 0 if 'noout' is used and no error has occurred
...
PR: 1435
Submitted by: "Haridharan" <haridharan@gmail.com >
2006-12-05 20:09:25 +00:00
Nils Larsch
0f997d0dc3
allocate a new attributes entry in X509_REQ_add_extensions()
...
if it's NULL (in case of a malformed pkcs10 request)
PR: 1347
Submitted by: Remo Inverardi <invi@your.toilet.ch >
2006-12-04 19:11:57 +00:00
Nils Larsch
b0eedd77f6
add "Certificate Issuer" and "Subject Directory Attributes" OIDs
...
PR: 1433
2006-12-04 18:51:06 +00:00
Andy Polyakov
502aef5aaf
Eliminate redundant variable in Camellia CBC routine.
2006-12-02 11:52:50 +00:00
Andy Polyakov
9f8cfb1c62
Improve Camellia code readability.
2006-12-02 11:12:13 +00:00
Andy Polyakov
c163b5f7a0
Fix bugs in Camellia CBC routine.
2006-12-02 10:56:45 +00:00
Andy Polyakov
20da8b8f90
Camellia portability fixes.
...
Submitted by: Masashi Fujita, NTT
2006-12-02 10:38:40 +00:00
Nils Larsch
ae93dc13ab
add support for whirlpool in apps/speed
...
PR: 1338
Submitted by: justin@soze.net
2006-12-01 21:42:55 +00:00
Dr. Stephen Henson
77e87e6148
Fix default dependency flags.
2006-11-30 13:55:30 +00:00
Dr. Stephen Henson
a6e700e665
Import ordinals from 0.9.8 and update.
2006-11-30 13:47:22 +00:00
Dr. Stephen Henson
4d7aff707e
Update dependencies.
2006-11-30 13:41:47 +00:00
Dr. Stephen Henson
d137b56a5b
Win32 fixes from stable branch.
2006-11-30 13:39:34 +00:00
Nils Larsch
7806f3dd4b
replace macros with functions
...
Submitted by: Tracy Camp <tracyx.e.camp@intel.com >
2006-11-29 20:54:57 +00:00
Bodo Möller
1e24b3a09e
fix support for receiving fragmented handshake messages
2006-11-29 14:45:50 +00:00
Andy Polyakov
73b979e601
Clarify HAL SPARC64 support situation in sparcv9a-mont.pl.
2006-11-28 11:07:36 +00:00
Andy Polyakov
ebae8092cb
Minor optimizations based on intruction level profiler feedback.
2006-11-28 10:34:51 +00:00
Andy Polyakov
2e21922eb6
Modulo-schedule loops in sparcv9a-mont.pl. Overall improvement factor
...
over 0.9.8 is up to 3x on USI&II cores and up to 80% - on USIII&IV.
2006-11-28 07:24:26 +00:00
Andy Polyakov
1c3d2b94be
This is "informational" commit. Its mere purpose is to expose "modulo
...
factor" in inner loops.
2006-11-28 07:20:36 +00:00
Andy Polyakov
48d2335d73
Non-SSE2 path to bn_mul_mont. But it's disabled, because it currently
...
doesn't give performance improvement.
2006-11-27 14:59:35 +00:00
Ben Laurie
96ea4ae91c
Add RFC 3779 support.
2006-11-27 14:18:05 +00:00
Andy Polyakov
7af5726108
sha512-ppc.pl mutli-thread safety fix.
2006-11-27 13:11:15 +00:00
Nils Larsch
69d4646f4e
register the engine as default engine in ENGINE_set_default()
...
PR: 1431
2006-11-24 18:37:43 +00:00
Dr. Stephen Henson
8bd11f3ec2
Add .cvsignore
2006-11-21 21:37:41 +00:00
Dr. Stephen Henson
47a9d527ab
Update from 0.9.8 stable. Eliminate duplicate error codes.
2006-11-21 21:29:44 +00:00
Ulf Möller
d9907c972b
wording (can't really call shared libs experimental after several years in the major Linux distributions)
2006-11-21 20:51:25 +00:00
Dr. Stephen Henson
1444bfb2c8
Update ordinals.
2006-11-16 00:56:01 +00:00
Dr. Stephen Henson
14975faa60
Remove illegal IMPLEMENT macros from header file.
2006-11-16 00:55:33 +00:00
Dr. Stephen Henson
3f12464861
Remove redundant PREDECLARE statement.
2006-11-16 00:52:49 +00:00
Dr. Stephen Henson
de12116417
Initial, incomplete support for typesafe macros without using function
...
casts.
2006-11-16 00:19:39 +00:00
Dr. Stephen Henson
28b987aec9
Don't assume requestorName is present for signed requests. ASN1 OCSP module
...
fix: certs field is OPTIONAL.
2006-11-13 13:21:47 +00:00
Dr. Stephen Henson
fb596f3bb7
OCSP library tidy. Use extension to encode OCSP extensions instead of doing
...
it manually. Make OCSP_CERTID_dup() a real function instead of a macro.
2006-11-13 13:18:28 +00:00
Ben Laurie
84948b39df
Fix various warnings.
2006-11-08 09:45:12 +00:00
Dr. Stephen Henson
cf32ad7fe3
Make TSA tests use the noprompt mode of utilities rather than piping
...
the result into interative utilities.
2006-11-07 16:21:16 +00:00
Dr. Stephen Henson
ad0e439604
Avoid shadow warning.
2006-11-07 16:20:14 +00:00
Dr. Stephen Henson
5456583294
Don't add the TS EKU by default in openssl.cnf because it then
...
makes certificates genereated by ca, CA.pl etc useless for anything else.
2006-11-07 14:27:55 +00:00
Dr. Stephen Henson
f1845cbee8
Typo.
2006-11-07 13:46:37 +00:00
Dr. Stephen Henson
51cc37b69d
Fix link for ASN1_generate_nconf
2006-11-07 13:44:03 +00:00
Dr. Stephen Henson
ff1b10dca1
Typo.
2006-11-07 13:17:02 +00:00
Dr. Stephen Henson
ebeb17e2e0
Add v3 ref to see also sections.
2006-11-07 13:13:14 +00:00
Dr. Stephen Henson
137de5b157
Add documentetion for noCheck extension and add a few cross references to
...
the extension documentation.
2006-11-07 12:51:27 +00:00
Nils Larsch
224328e404
fix warning
2006-11-06 20:10:44 +00:00
Nils Larsch
1611b9ed80
remove SSLEAY_MACROS code
2006-11-06 19:53:39 +00:00
Nils Larsch
8a4af56fc6
update md docs
2006-10-27 21:58:09 +00:00
Nils Larsch
05cfe06607
fix OPENSSL_NO_foo defines
2006-10-27 21:25:53 +00:00
Dr. Stephen Henson
b37a68cc8f
Initialize old_priv_encode, old_priv_decode.
2006-10-27 11:43:27 +00:00
Andy Polyakov
a2688c872d
Minor portability update to c_rehash.
2006-10-26 10:52:12 +00:00
Andy Polyakov
5b50f99e1e
Further mingw build procedure updates.
2006-10-24 22:14:20 +00:00
Andy Polyakov
b8994b6130
Harmonize dll naming in mingw builds.
2006-10-23 11:54:18 +00:00
Andy Polyakov
d7917c584a
Yet another mingw warning.
2006-10-23 07:45:52 +00:00
Andy Polyakov
544d845585
OPENSSL_ia32cap.pod update.
2006-10-23 07:44:51 +00:00
Andy Polyakov
a6efc2d1b8
Fix mingw warnings.
2006-10-23 07:41:05 +00:00
Andy Polyakov
3189772e07
Switch Win32/64 targets to Winsock2. Updates to ISNTALL.W32 cover even
...
recent mingw modifications.
2006-10-23 07:38:30 +00:00
Andy Polyakov
08a638237d
Allow for mingw cross-compile configuration.
2006-10-23 07:30:19 +00:00
Andy Polyakov
d8cdd1567f
Make c_rehash more platform neutral and make it work in mixed environment,
...
such as MSYS with "native" Win32 perl.
2006-10-21 16:28:03 +00:00
Andy Polyakov
cbfb39d1be
Rudimentary support for cross-compiling.
2006-10-21 13:38:16 +00:00
Andy Polyakov
a4d64c7f49
Align data payload for better performance.
2006-10-20 11:26:00 +00:00
Andy Polyakov
1e7b6c029c
Avoid application relink on every make invocation.
2006-10-20 11:23:35 +00:00
Andy Polyakov
3634d7e97a
Gcc over-optimizes PadLock AES CFB codepath, tell it not to.
2006-10-19 20:55:05 +00:00
Andy Polyakov
53d7efea76
Temporary fix for sha256 IA64 assembler.
2006-10-18 09:42:56 +00:00
Andy Polyakov
002684d693
Fix bug in big-endian path and optimize it for size.
2006-10-18 08:15:16 +00:00
Andy Polyakov
c038b8aa56
Typo in perlasm/x86asm.pl.
2006-10-17 16:21:28 +00:00
Andy Polyakov
c5f17d45c1
Further synchronizations with md32_common.h update, consistent naming
...
for low-level SHA block routines.
2006-10-17 16:13:18 +00:00
Andy Polyakov
31439046e0
bn/asm/ppc.pl to use ppc-xlate.pl.
2006-10-17 14:37:07 +00:00
Andy Polyakov
11d0ebc841
Further synchronizations with md32_common.h update.
2006-10-17 13:38:10 +00:00
Andy Polyakov
cecfdbf72d
VIA-specific Montgomery multiplication routine.
2006-10-17 07:04:48 +00:00
Andy Polyakov
f0f61f6d0d
Synchronize SHA1 assembler with md32_common.h update.
2006-10-17 07:00:23 +00:00
Andy Polyakov
d68ff71004
Support for .asciz directive in perlasm modules.
2006-10-17 06:43:11 +00:00
Andy Polyakov
591e85e928
Linking errors on IA64 and typo in aes-ia64.S.
2006-10-17 06:41:27 +00:00
Andy Polyakov
c69ed6ea39
Re-implement md32_common.h [make it simpler!] and eliminate code rendered
...
redundant as result.
2006-10-11 11:55:11 +00:00
Dr. Stephen Henson
55a08fac68
Typo.
2006-10-05 21:59:50 +00:00
Nils Larsch
2fc281d01f
return an error if the supplied precomputed values lead to an invalid signature
2006-10-04 19:37:17 +00:00
Bodo Möller
d326582cab
ASN1_item_verify needs to initialize ctx before any "goto err" can
...
happen; the new code for the OID cross reference table failed to do so.
2006-10-04 06:14:36 +00:00
Dr. Stephen Henson
f4c630abb3
Place standard CRL behaviour in default X509_CRL_METHOD new functions to
...
create, free and set default CRL method.
2006-10-03 02:47:59 +00:00
Mark J. Cox
c2cccfc585
Initialise ctx to NULL to avoid uninitialized free, noticed by
...
Steve Kiernan
2006-09-29 08:21:41 +00:00
Bodo Möller
3c5406b35c
All 0.9.8d patches have been applied to HEAD now, so we no longer need
...
the redundant entries under the 0.9.9 heading.
2006-09-28 13:50:41 +00:00
Bodo Möller
5e3225cc44
Introduce limits to prevent malicious keys being able to
...
cause a denial of service. (CVE-2006-2940)
[Steve Henson, Bodo Moeller]
2006-09-28 13:45:34 +00:00
Bodo Möller
61118caa86
include 0.9.8d and 0.9.7l information
2006-09-28 13:35:01 +00:00
Mark J. Cox
348be7ec60
Fix ASN.1 parsing of certain invalid structures that can result
...
in a denial of service. (CVE-2006-2937) [Steve Henson]
2006-09-28 13:20:44 +00:00
Mark J. Cox
3ff55e9680
Fix buffer overflow in SSL_get_shared_ciphers() function.
...
(CVE-2006-3738) [Tavis Ormandy and Will Drewry, Google Security Team]
Fix SSL client code which could crash if connecting to a
malicious SSLv2 server. (CVE-2006-4343)
[Tavis Ormandy and Will Drewry, Google Security Team]
2006-09-28 13:18:43 +00:00
Richard Levitte
cbb92dfaf0
Fixes for the following claims:
...
1) Certificate Message with no certs
OpenSSL implementation sends the Certificate message during SSL
handshake, however as per the specification, these have been omitted.
-- RFC 2712 --
CertificateRequest, and the ServerKeyExchange shown in Figure 1
will be omitted since authentication and the establishment of a
master secret will be done using the client's Kerberos credentials
for the TLS server. The client's certificate will be omitted for
the same reason.
-- RFC 2712 --
3) Pre-master secret Protocol version
The pre-master secret generated by OpenSSL does not have the correct
client version.
RFC 2712 says, if the Kerberos option is selected, the pre-master
secret structure is the same as that used in the RSA case.
TLS specification defines pre-master secret as:
struct {
ProtocolVersion client_version;
opaque random[46];
} PreMasterSecret;
where client_version is the latest protocol version supported by the
client
The pre-master secret generated by OpenSSL does not have the correct
client version. The implementation does not update the first 2 bytes
of random secret for Kerberos Cipher suites. At the server-end, the
client version from the pre-master secret is not validated.
PR: 1336
2006-09-28 12:22:58 +00:00
Dr. Stephen Henson
019bfef899
Initialize new callbacks and make sure hent is always initialized.
2006-09-26 13:25:19 +00:00
Richard Levitte
0709249f4c
Complete the change for VMS.
2006-09-25 08:35:35 +00:00
Dr. Stephen Henson
89c9c66736
Submitted by: Brad Spencer <spencer@jacknife.org>
...
Reviewed by: steve
2006-09-23 17:29:49 +00:00
Dr. Stephen Henson
347ed3b93c
Buffer size handling fix for enc.
...
PR:1374
2006-09-22 17:14:22 +00:00
Dr. Stephen Henson
5b73c3609b
Using correct lock for X509_REQ.
...
PR:1348
2006-09-22 17:06:09 +00:00
Dr. Stephen Henson
eebeb52b29
Update length if copying MSB set in asn1_string_canon().
2006-09-22 13:37:15 +00:00
Dr. Stephen Henson
6ec6cfc767
Updated file.
2006-09-21 16:19:10 +00:00
Dr. Stephen Henson
44181ea836
Add missing prototype. Fix various warnings (C++ comments, ; outside function).
2006-09-21 13:24:46 +00:00
Dr. Stephen Henson
c80c7bf999
Make int_rsa_sign function match prototype.
...
PR: 1383
2006-09-21 13:11:24 +00:00
Dr. Stephen Henson
ffa5ebf3f4
Compile in gost engine.
2006-09-21 13:07:57 +00:00
Dr. Stephen Henson
926c41bd29
Updated version of gost engine.
2006-09-21 13:04:43 +00:00
Dr. Stephen Henson
1182301ca7
Do CRL method init after other operations.
2006-09-21 12:48:56 +00:00
Dr. Stephen Henson
010fa0b331
Tidy up CRL handling by checking for critical extensions when it is
...
loaded. Add new function X509_CRL_get0_by_serial() to lookup a revoked
entry to avoid the need to access the structure directly.
Add new X509_CRL_METHOD to allow common CRL operations (verify, lookup) to be
redirected.
2006-09-21 12:42:15 +00:00
Andy Polyakov
4ca7d975af
Build error on non-unix.
...
PR: 1390
2006-09-18 19:50:54 +00:00
Andy Polyakov
b774111020
Race condition in ms/uplink.c.
...
PR: 1382
2006-09-18 19:41:37 +00:00
Andy Polyakov
78260d890b
As x86ms.pl is out, remove do_masm.bat and mention to it in INSTALL.W32.
2006-09-18 19:20:43 +00:00
Andy Polyakov
4b67fefe5a
Remove x86ms.pl and reimplement x86*.pl.
2006-09-18 19:17:09 +00:00
Andy Polyakov
3a8012cbf2
Improve 386 portability of aes-586.pl.
2006-09-18 19:13:15 +00:00
Bodo Möller
a53cdc5b08
Ensure that the addition mods[i]+delta cannot overflow in probable_prime().
...
[Problem pointed out by Adam Young <adamy (at) acm.org>]
2006-09-18 14:00:49 +00:00
Dr. Stephen Henson
5d20c4fb35
Overhaul of by_dir code to handle dynamic loading of CRLs.
2006-09-17 17:16:28 +00:00
Dr. Stephen Henson
a04549cc75
GOST public key algorithm ENGINE donated to the OpenSSL by Cryptocom.
...
Very early version, doesn't do much yet, not even added to the build system.
2006-09-17 13:00:18 +00:00
Dr. Stephen Henson
bc7535bc7f
Support for AKID in CRLs and partial support for IDP. Overhaul of CRL
...
handling to support this.
2006-09-14 17:25:02 +00:00
Dr. Stephen Henson
83357f047d
Update docs.
2006-09-13 03:28:42 +00:00
Bodo Möller
b6699c3f07
Update
2006-09-12 14:42:19 +00:00
Dr. Stephen Henson
016bc5ceb3
Fixes for new CRL/cert callbacks. Update CRL processing code to use new
...
callbacks.
2006-09-11 13:00:52 +00:00
Bodo Möller
ed65f7dc34
ensure that ciphersuite strings such as "RC4-MD5" match the SSL 2.0
...
ciphersuite as well
2006-09-11 09:49:03 +00:00
Dr. Stephen Henson
4d50a2b4d6
Add verify callback functions to lookup a STACK of matching certs or CRLs
...
based on subject name.
New thread safe functions to retrieve matching STACK from X509_STORE.
Cache some IDP components.
2006-09-10 12:38:37 +00:00
Bodo Möller
7f4301668f
Make sure the int_rsa_verify() prototype matches the implementation
...
(m_len currently is 'unsigned int', not 'size_t')
Submitted by: Gisle Vanem
2006-09-08 06:00:40 +00:00
Dr. Stephen Henson
29a1bb07e5
Additional detail.
2006-09-06 11:59:04 +00:00
Bodo Möller
99e9a90081
update information on "current version" ...
2006-09-06 11:54:19 +00:00
Dr. Stephen Henson
715020e334
Add an FAQ.
2006-09-06 11:53:50 +00:00
Bodo Möller
2952886010
Remove non-functional part of recent patch, after discussion with
...
Colin Percival (this would have caused more problems than solved,
and isn't really necessary anyway)
2006-09-06 06:43:11 +00:00
Bodo Möller
613e7d2a65
Make consistent with 0.9.8-branch version of this file
2006-09-06 06:42:11 +00:00
Bodo Möller
6a2c471077
Every change so far that is in the 0.9.8 branch is (or should be) in HEAD
2006-09-06 06:34:52 +00:00
Mark J. Cox
b79aa05e3b
Avoid PKCS #1 v1.5 signature attack discovered by Daniel Bleichenbacher
...
(CVE-2006-4339)
Submitted by: Ben Laurie, Google Security Team
Reviewed by: bmoeller, mjc, shenson
2006-09-05 08:58:03 +00:00
Andy Polyakov
500b5a181d
Rewrite sha1-586.pl.
2006-08-31 21:27:30 +00:00
Andy Polyakov
2b8a5406f9
Fix bug in aes-586.pl.
2006-08-31 21:15:38 +00:00
Andy Polyakov
2f35ae90fe
Fix bug in x86unix.pl introduced in latest update.
...
PR: 1380
2006-08-31 21:12:17 +00:00
Dr. Stephen Henson
0fca32a7aa
Kill more C++ comments.
2006-08-31 21:01:15 +00:00
Dr. Stephen Henson
02c9b66a6c
Fix C++ style comments, change assert to OPENSSL_assert, stop warning with
...
pedantic mode.
2006-08-31 20:56:20 +00:00
Dr. Stephen Henson
539d4c1030
Fix leak
2006-08-31 20:10:37 +00:00
Ben Laurie
aa6d1a0c19
Forward port of IGE mode.
2006-08-31 14:04:04 +00:00
Ben Laurie
777c47acbe
Make things static that should be. Declare stuff in headers that should be.
...
Fix warnings.
2006-08-28 17:01:04 +00:00
Richard Levitte
5776c3c4c6
According to documentation, including time.h declares select() on
...
OpenVMS, and possibly more.
Ref: http://h71000.www7.hp.com/doc/82final/6529/6529pro_019.html#r_select
2006-08-20 05:54:35 +00:00
Richard Levitte
0c3d346cb7
Correct warnings about signedness.
2006-08-20 05:18:12 +00:00
Ulf Möller
1c23bc5670
Use gmtime on cygwin
...
Submitted by: Corinna Vinschen
2006-08-13 09:03:38 +00:00
Andy Polyakov
8ea975d070
+20% tune-up for Power5.
2006-08-09 15:40:30 +00:00
Andy Polyakov
6c69aa532e
Revised AES_cbc_encrypt in x86 assembler module.
2006-08-07 09:05:52 +00:00
Ulf Möller
6264c9b2a9
Correct punctuation.
...
PR: 1367
2006-08-05 20:45:06 +00:00
Andy Polyakov
fc92414273
Agressively prefetch S-box in SSE codepatch, relax alignment requirement,
...
check for SSE bit instead of MMX, as pshufw was introduces in PIII, minor
optimization, typos...
2006-08-02 22:38:16 +00:00
Andy Polyakov
53154d71c3
Switch to compact S-box when generating AES key schedule.
2006-08-02 07:46:56 +00:00
Andy Polyakov
8cebec9802
Switch to compact S-box when generating AES key schedule.
2006-08-01 22:10:39 +00:00
Andy Polyakov
0209d1605d
Real Bourne shell doesn't interpret ==, but =.
2006-08-01 16:12:10 +00:00
Andy Polyakov
c8a0d0aaf9
Engage assembler in solaris64-x86_64-cc.
2006-07-31 22:28:40 +00:00
Andy Polyakov
0cc46efa09
perlasm/x86unix.pl update.
2006-07-31 22:26:40 +00:00
Andy Polyakov
22c268e6c9
Next generation aes-586.pl featuring AES_[en|de]crypt, accessing exclusively
...
256 byte S-box. AES_cbc_encrypt needs further work as it should also use
slow routines when processing smaller amount of data.
2006-07-31 20:03:56 +00:00
Bodo Möller
dd0514e2cc
Camellia IPR information
2006-07-31 11:50:01 +00:00
Dr. Stephen Henson
f6e7d01450
Support for multiple CRLs with same issuer name in X509_STORE. Modify
...
verify logic to try to use an unexpired CRL if possible.
2006-07-25 17:39:38 +00:00
Dr. Stephen Henson
edc540211c
Cache some CRL related extensions.
2006-07-24 12:39:22 +00:00
Dr. Stephen Henson
2eed3a3cc8
Avoid warning.
2006-07-21 22:46:19 +00:00
Dr. Stephen Henson
1aa44cc797
Avoid WIN32 warning.
2006-07-21 22:28:48 +00:00
Dr. Stephen Henson
37c8fd0eba
Avoid warnings.
2006-07-21 22:26:31 +00:00
Dr. Stephen Henson
786aa98da1
Use correct pointer types for various functions.
2006-07-20 16:56:47 +00:00
Bodo Möller
413e0853d7
New Camellia implementation (replacing previous version)
...
Submitted by: NTT
2006-07-19 13:38:26 +00:00
Bodo Möller
8e4560c42f
Camellia information
2006-07-19 13:36:40 +00:00
Dr. Stephen Henson
450ea83495
Store canonical encodings of Name structures. Update X509_NAME_cmp() to use
...
them.
2006-07-18 12:36:19 +00:00
Andy Polyakov
af8c1d81a3
Reimplement outer rounds as "compact" in x86 assembler. This has rather
...
strong impact on decrypt performance, 20-25%. One probably should consider
switching between slower and faster routines depending on how much data
we were asked to process.
2006-07-18 10:05:38 +00:00
Dr. Stephen Henson
b589427941
WIN32 fixes signed/unsigned issues and slightly socket semantics.
2006-07-17 18:52:51 +00:00
Dr. Stephen Henson
f0fa285f75
Update .cvsignore again.
2006-07-17 16:42:06 +00:00
Dr. Stephen Henson
a0b5b07010
Update .cvsignore
2006-07-17 16:40:20 +00:00
Dr. Stephen Henson
5c95c2ac23
Fix various error codes to match functions.
2006-07-17 16:33:31 +00:00
Dr. Stephen Henson
454dbbc593
Add -timeout option to ocsp utility.
2006-07-17 13:26:54 +00:00
Dr. Stephen Henson
c1c6c0bf45
New non-blocking OCSP functionality.
2006-07-17 12:18:28 +00:00
Andy Polyakov
dff2922aa7
Add option for "compact" rounds to aes_x86core.c. "Compact" rounds are
...
those referencing compact, 256-byte, S-boxes.
2006-07-14 09:57:55 +00:00
Dr. Stephen Henson
f253a058d3
There is should be no need to rewind the input stream any more.
...
For S/MIME multipart/signed type the signature is calculated on the fly.
For other detached data forms the stream isn't used after the single pass to
calculate signatures.
For non-detached the data is stored in a memory BIO.
2006-07-13 20:29:55 +00:00
Dr. Stephen Henson
b3c6a33185
In genpkey, also look for algorithm string name in any supplied ENGINE.
2006-07-12 18:00:20 +00:00
Dr. Stephen Henson
31780d0e26
Bugfix: don't look in internal table for signature if found in application
...
supplied list.
2006-07-12 16:30:40 +00:00
Dr. Stephen Henson
f489ab3147
Typo.
2006-07-12 13:28:44 +00:00
Dr. Stephen Henson
29cf84c692
New docs for EVP_Digest{Sign,Verify}*() function. Update existing docs.
2006-07-12 12:31:30 +00:00
Dr. Stephen Henson
e454929558
Add docs for pkeyparam. Update some existing docs.
2006-07-10 23:10:26 +00:00
Dr. Stephen Henson
105f6a6323
Update some usage messages.
2006-07-10 22:49:08 +00:00
Dr. Stephen Henson
8845701719
make update
2006-07-10 18:40:42 +00:00
Dr. Stephen Henson
b7683e3a5d
Allow digests to supply S/MIME micalg values from a ctrl.
...
Send ctrls to EVP_PKEY_METHOD during signing of PKCS7 structure so
customisation is possible.
2006-07-10 18:36:55 +00:00
Dr. Stephen Henson
0ee2166cc5
New functions to add and free up application defined signature OIDs.
2006-07-09 16:05:43 +00:00
Dr. Stephen Henson
067707e367
Set detached flag in PKCS7 structure earlier to avoid eating up memory.
...
PR: 1071
2006-07-09 12:02:08 +00:00
Dr. Stephen Henson
8211a33c7f
Public key comparison and printing routine functions.
2006-07-09 11:26:13 +00:00
Dr. Stephen Henson
7441052be6
EVP_PKEY_get_default_digest() manual page.
2006-07-09 11:01:49 +00:00
Dr. Stephen Henson
90ccf05f82
EVP_PKEY_CTX_ctrl() docs.
2006-07-09 10:51:03 +00:00
Dr. Stephen Henson
112161bd33
Update docs.
2006-07-09 01:59:30 +00:00
Dr. Stephen Henson
5ba4bf35c5
New functions to enumerate digests and ciphers.
2006-07-09 00:53:45 +00:00
Dr. Stephen Henson
aa93b18c2c
Keygen docs.
2006-07-08 21:42:49 +00:00
Dr. Stephen Henson
ba702545fc
EVP_PKEY_derive() docs.
2006-07-08 12:47:52 +00:00
Dr. Stephen Henson
436369100d
Add some examples.
2006-07-08 12:46:51 +00:00
Dr. Stephen Henson
6535bd42e6
EVP_PKEY_verify() docs.
2006-07-08 11:22:23 +00:00
Dr. Stephen Henson
64cee65ebc
New docs.
2006-07-08 11:13:01 +00:00
Dr. Stephen Henson
ba544377fb
Update docs.
2006-07-08 10:55:03 +00:00
Dr. Stephen Henson
5165148f72
Add some EVP_PKEY_METHOD docs.
2006-07-08 10:45:08 +00:00
Dr. Stephen Henson
8d970ca70b
Update docs with algorithm options.
2006-07-08 10:01:33 +00:00
Dr. Stephen Henson
383b8b8ca9
Typo.
2006-07-08 00:50:25 +00:00
Dr. Stephen Henson
5ce60a20f2
Initial docs for pkeyutl.
2006-07-08 00:47:04 +00:00
Dr. Stephen Henson
49131a7d94
Docs for new utilities.
2006-07-08 00:24:47 +00:00
Dr. Stephen Henson
d884c5bad1
Add documentation for new smime options.
2006-07-07 21:44:23 +00:00
Andy Polyakov
86bdc0a3ee
Fix compiler warnings.
2006-07-04 20:29:50 +00:00
Andy Polyakov
1a4e245f3e
Unsigned vs signed comparison warning.
2006-07-04 20:29:14 +00:00
Andy Polyakov
975efcbaee
Typos(?) in HEAD/crypto/evp/p_lib.c.
2006-07-04 20:27:44 +00:00
Dr. Stephen Henson
90e1b1fd7d
dsa_pub_cmp() doesn't need to check parameters because that is done in
...
EVP_PKEY_cmp().
2006-07-02 21:13:39 +00:00
Dr. Stephen Henson
86207c1960
Make return value from EVP_PKEY_cmp() and EVP_PKEY_cmp_parameters() consistent.
2006-07-02 21:12:40 +00:00
Andy Polyakov
9c62bca11a
Prepare playground for AES experimental code.
2006-07-02 09:18:00 +00:00
Bodo Möller
75d61b33bc
documentation for "HIGH" vs. "MEDIUM" was not up-to-date
2006-06-30 22:00:13 +00:00
Bodo Möller
3df760b83a
use <poll.h> as by Single Unix Specification
2006-06-30 08:14:39 +00:00
Bodo Möller
e34aa5a3b3
always read in RAND_poll() if we can't use select because of a too
...
large FD: it's non-blocking mode anyway
2006-06-28 14:50:12 +00:00
Andy Polyakov
985e4c4154
Mitigate the hazard of cache-collision timing attack on last round. The
...
only chance for T[ed]4 to get evicted in this module is when its cache
"overlaps" with last 128 bits of key schedule.
2006-06-28 08:52:16 +00:00
Andy Polyakov
9598fa8759
Mitigate the hazard of cache-collision timing attack on last round. Well,
...
prefetch could have been moved closer to Td4 references. Something for
later consideration...
2006-06-28 08:48:54 +00:00
Andy Polyakov
ac8173515a
Mitigate cache-collision timing attack on last round.
2006-06-28 08:39:06 +00:00
Dr. Stephen Henson
944f858021
Fix EVP_PKEY_CTX_dup() to return correct value and handle NULL keys in
...
the source.
2006-06-27 17:23:24 +00:00
Richard Levitte
27a3d9f9aa
Use poll() when possible to gather Unix randomness entropy
2006-06-27 06:31:34 +00:00
Bodo Möller
48fc582f66
New functions CRYPTO_set_idptr_callback(),
...
CRYPTO_get_idptr_callback(), CRYPTO_thread_idptr() for a 'void *' type
thread ID, since the 'unsigned long' type of the existing thread ID
does not always work well.
2006-06-23 15:21:36 +00:00
Bodo Möller
81de1028bc
Change in 0.9.8 branch:
...
Put ECCdraft ciphersuites back into default build (but disabled
unless specifically requested)
2006-06-22 12:37:28 +00:00
Bodo Möller
850815cb6e
Remove ECC ciphersuites from 0.9.8 branch (should use 0.9.9 branch)
2006-06-20 08:50:42 +00:00
Bodo Möller
c4e7870ac1
Change array representation of binary polynomials to make GF2m part of
...
the BN library more generally useful.
Submitted by: Douglas Stebila
2006-06-18 22:00:57 +00:00
Bodo Möller
4584eccea0
another thread-safety fix
2006-06-16 01:00:47 +00:00
Bodo Möller
ed3ecd801e
Error messages for client ECC cert verification.
...
Also, change the default ciphersuite to give some prefererence to
ciphersuites with forwared secrecy (rather than using a random order).
2006-06-15 19:58:22 +00:00
Bodo Möller
b166f13eb5
Call 'print_stuff' even if a handshake failed.
2006-06-15 19:00:34 +00:00
Bodo Möller
076944d920
Fix algorithm handling for ECC ciphersuites: Adapt to recent changes,
...
and allow more general RSA OIDs for ECC certs with RSA CA sig.
2006-06-15 18:28:00 +00:00
Bodo Möller
09e20e0bd8
Fix another new bug in the cipherstring logic.
2006-06-15 17:17:06 +00:00
Bodo Möller
a717831da4
Fix another bug introduced yesterday when deleting Fortezza stuff:
...
make sure 'mask' is initialized in ssl_cipher_get_disabled().
Also simplify code by removing some unused arguments in static functions.
2006-06-15 16:54:20 +00:00
Bodo Möller
4dfc8f1f0b
Oops ... deleted too much in the previous commit when I deleted
...
the Fortezza stuff
2006-06-15 16:07:10 +00:00
Bodo Möller
5b57fe0a1e
Disable invalid ciphersuites
2006-06-14 17:51:46 +00:00
Bodo Möller
89bbe14c50
Ciphersuite string bugfixes, and ECC-related (re-)definitions.
2006-06-14 17:40:31 +00:00
Bodo Möller
6635b48cd1
Make sure that AES ciphersuites get priority over Camellia
...
ciphersuites in the default cipher string.
2006-06-14 13:58:48 +00:00
Bodo Möller
675f605d44
Thread-safety fixes
2006-06-14 08:55:23 +00:00
Bodo Möller
6a983d4287
Fix a bug recently introduced when updating this file to use the new
...
keygen API: make sure that 'pkey_type' is actually visible to MAIN().
2006-06-14 01:16:22 +00:00
Richard Levitte
1a159e08af
Keep synchronised with Unix
2006-06-12 06:46:18 +00:00
Bodo Möller
dd030860c4
Camellia cipher, contributed by NTT
...
Submitted by: Masashi Fujita
Reviewed by: Bodo Moeller
2006-06-11 01:09:07 +00:00
Richard Levitte
2d09372434
Keep synchronised with the Unix build
2006-06-10 05:38:23 +00:00
Bodo Möller
67912e0032
Camellia cipher, contributed by NTT
...
Submitted by: Masashi Fujita
Reviewed by: Bodo Moeller
2006-06-09 22:29:40 +00:00
Bodo Möller
f3dea9a595
Camellia cipher, contributed by NTT
...
Submitted by: Masashi Fujita
Reviewed by: Bodo Moeller
2006-06-09 15:44:59 +00:00
Dr. Stephen Henson
fb7b393278
Output MIME parameter micalg according to RFC3851 and RFC4490 instead of hard
...
coding it to "sha1".
2006-06-06 13:27:36 +00:00
Dr. Stephen Henson
61e5ec4b1e
Add AES and GOST S/MIME capabilities if algorithms are supported.
2006-06-06 12:35:05 +00:00
Andy Polyakov
6f344eab03
Fix obvious typo.
2006-06-05 16:04:09 +00:00
Dr. Stephen Henson
41eacc84a0
Clarify comment and add #ifdef.
2006-06-05 12:38:22 +00:00
Dr. Stephen Henson
01b8b3c7d2
Complete EVP_PKEY_ASN1_METHOD ENGINE support.
2006-06-05 11:52:46 +00:00
Andy Polyakov
8fecd4b4f1
Sync aes.h with http://cvs.openssl.org/chngview?cn=15336 .
2006-06-05 10:43:41 +00:00
Andy Polyakov
41fc5f2dbe
Reimplement AES_ofb128_encrypt.
2006-06-05 10:40:54 +00:00
Andy Polyakov
bcfd3d68f5
Correct logical error in STRICT_ALIGNMENT check and remove copy of
...
eay licence, as module is practically rewritten from scratch [well,
even original submission was obviously "almost, but not quite,
entirely unlike" any other eay *_cfb.c module, not to mention new
functions].
2006-06-05 10:40:28 +00:00
Andy Polyakov
d3a6461d71
Minor ppc-xlate.pl update.
2006-06-05 09:42:31 +00:00
Andy Polyakov
17478fdede
Add sha512-ppc.pl module.
2006-06-05 09:37:55 +00:00
Andy Polyakov
4dca00cec8
Minor sha1-ppc.pl update.
2006-06-05 09:35:50 +00:00
Richard Levitte
061d774b99
A few more ENGINE strings that need shortening.
2006-06-04 08:22:25 +00:00
Richard Levitte
20469da285
Synchronise with Unix
2006-06-03 02:17:49 +00:00
Dr. Stephen Henson
e18e3eba76
Make update.
2006-06-02 17:54:47 +00:00
Dr. Stephen Henson
de9fcfe348
Initial public key ASN1 method engine support. Not integrated yet.
2006-06-02 17:52:27 +00:00
Dr. Stephen Henson
7e5b06813d
Automatically free up dynamically allocated public key methods when
...
and ENGINE is destroyed.
2006-06-02 17:09:17 +00:00
Dr. Stephen Henson
1892c8bf97
Extend default method string to include public key methods.
...
Add missing prototypes.
Fix engine method lookup.
2006-06-02 13:09:59 +00:00
Dr. Stephen Henson
5e428e7d0d
Typo.
2006-06-02 12:37:02 +00:00
Dr. Stephen Henson
c9777d2659
Add ENGINE support for EVP_PKEY_METHOD including lookups of ENGINE
...
implementations and functional reference counting when a context
is allocated, free or copied.
2006-06-02 12:33:39 +00:00
Richard Levitte
3aedd213a9
Synchronise with the Unixly build.
2006-06-01 12:50:56 +00:00
Dr. Stephen Henson
e0c1ea9038
Fix error code. make update
2006-06-01 12:43:39 +00:00
Dr. Stephen Henson
6f88c6a634
Add missing prototype. Extend engine utility to print public key algorithms.
2006-06-01 12:38:22 +00:00
Dr. Stephen Henson
58aa573ac2
Add engine table for EVP_PKEY_METHOD. Doesn't do much yet.
2006-06-01 11:38:50 +00:00
Richard Levitte
0ed110b969
Because all object files are now in a file, we don't need to mention
...
any of them on the linker command line. Besides, OBJECT_FILE now
represents the last compiled file, and using it here only results in
getting warnings about multiple definitions of the symbols in that
file.
2006-06-01 10:24:47 +00:00
Dr. Stephen Henson
b28dea4e10
New pkey functions for keygen callbacks and retrieving operation type.
2006-05-31 17:34:14 +00:00
Andy Polyakov
21f0db692d
Tune up AES CFB. Performance improvement varies from 10% to 50% from
...
platform to platform. Its absolute value is within few percents
marginal from that of ECB.
2006-05-30 07:20:13 +00:00
Richard Levitte
4d4e08ec1c
Use a new signed int ii instead of j (which is unsigned) to handle the
...
return value from sk_SSL_CIPHER_find().
2006-05-28 19:44:27 +00:00
Richard Levitte
25074d6c22
Deal with another name that's longer than 31 characters.
2006-05-28 19:39:36 +00:00
Richard Levitte
0cfc80c4c3
rslen is unsigned, so it can never go below 0.
2006-05-28 19:36:29 +00:00
Dr. Stephen Henson
b8bb15fb51
Install openssl.cnf to OPENSSLDIR in mk1mf.pl
2006-05-28 00:49:49 +00:00
Dr. Stephen Henson
994df5a248
Flush p7bio when all data has been copied.
2006-05-26 17:14:23 +00:00
Dr. Stephen Henson
6657b9c73a
Fix warnings.
2006-05-26 13:27:58 +00:00
Dr. Stephen Henson
ba0d04a986
Update pkeyutl to use size_t for pkey functions.
2006-05-26 12:24:49 +00:00
Richard Levitte
3cb9eb30d3
Signed vs. unsigned conflict
2006-05-25 23:40:04 +00:00
Richard Levitte
e0b624e20e
There was a problem with too long command lines, so I rebuilt to make
...
it work better.
2006-05-25 23:37:03 +00:00
Dr. Stephen Henson
c27309edcb
Allow any supported cipher to be used with smime -encrypt.
2006-05-25 16:53:52 +00:00
Dr. Stephen Henson
3207e61222
Add prototypes, update Win32 ordinals.
2006-05-25 11:44:05 +00:00
Richard Levitte
3671233089
Keep in sync with Unix
2006-05-25 10:40:01 +00:00
Dr. Stephen Henson
3a828611e9
Update EVP_MD_CTX_copy_ex() to use EVP_PKEY_CTX_dup().
2006-05-25 00:55:00 +00:00
Dr. Stephen Henson
8bdcef40e4
New function to dup EVP_PKEY_CTX. This will be needed to make new signing
...
functions and EVP_MD_CTX_copy work properly.
2006-05-24 23:49:30 +00:00
Dr. Stephen Henson
91c9e62123
New functions for enchanced digest sign/verify.
2006-05-24 17:30:09 +00:00
Dr. Stephen Henson
0e3453536e
Fix warnings.
2006-05-24 13:29:32 +00:00
Dr. Stephen Henson
eaff5a1412
Use size_t for new crypto size parameters.
2006-05-24 12:33:46 +00:00
Dr. Stephen Henson
216e0d5b91
Fix smime -pk7out.
2006-05-22 13:37:16 +00:00
Dr. Stephen Henson
0965991600
Add ctrl to EVP_MD and EVP_PKEY_CTX to EVP_MD_CTX. These will be used
...
for enhanced sign/verify operations.
2006-05-22 13:01:01 +00:00
Andy Polyakov
74aa1a4378
Tiny up hpux targets.
2006-05-20 08:52:34 +00:00
Dr. Stephen Henson
5531192151
Add -resign and -md options to smime command to support resigning an
...
existing structure and using alternative digest for signing.
2006-05-18 23:44:44 +00:00
Dr. Stephen Henson
a620626a33
Code tidy.
2006-05-18 18:06:03 +00:00
Dr. Stephen Henson
f13a71c66b
Typo.
2006-05-18 17:46:56 +00:00
Dr. Stephen Henson
3ef3e07a49
make update
2006-05-18 17:22:31 +00:00
Dr. Stephen Henson
76fa8f1838
More S/MIME tidy. Place some common attribute operations in utility
...
functions.
2006-05-18 17:20:23 +00:00
Dr. Stephen Henson
f2b139ed1f
Remove old digest type hacks for non RSA keys.
2006-05-18 13:05:20 +00:00
Dr. Stephen Henson
a6e7fcd140
Multiple signer support in smime application.
2006-05-18 12:41:28 +00:00
Dr. Stephen Henson
76cf3fcb43
Reformat smime.c utility.
2006-05-18 11:54:16 +00:00
Dr. Stephen Henson
121dd39f9f
New option to pkcs12 utility to set alternative MAC digest algorithm.
2006-05-17 18:46:22 +00:00
Dr. Stephen Henson
a263253545
Don't try to print PBE information if it can't be decoded.
2006-05-17 18:24:35 +00:00
Dr. Stephen Henson
76d6ac4b06
PKCS#12 mac key length should equal digest length.
2006-05-17 18:19:51 +00:00
Dr. Stephen Henson
60f20632e2
Tidy up of S/MIME code and add new functions which will make is easier
...
to create S/MIME signed data with multiple signers.
2006-05-17 17:17:01 +00:00
Dr. Stephen Henson
ae519a247f
Extended PBES2 function supporting application supplied IV and PRF NID.
2006-05-17 12:47:17 +00:00
Dr. Stephen Henson
8de916bcee
Oops...
2006-05-17 12:29:16 +00:00
Dr. Stephen Henson
1631d5f9b9
HMAC OIDs from RFC4231.
2006-05-17 12:27:45 +00:00
Dr. Stephen Henson
98c82b899e
Gather keygen options in req and only use them after all other options have
...
been processed. This allows any ENGINE changing operations to be processed
first (for example a config file).
2006-05-16 12:11:14 +00:00
Dr. Stephen Henson
6d3a1eac3b
Add PRF preference ctrl to ciphers.
2006-05-15 18:35:13 +00:00
Dr. Stephen Henson
b8f702a0af
Change builting PBE to use static table. Add entries for HMAC and MD5, GOST.
2006-05-15 17:34:36 +00:00
Dr. Stephen Henson
43c9825c2a
Update old **EVIL** PEM_X509_INFO_read_bio() function to correctly assign
...
private keys.
FIXME: this function should really be rewritten because it is *horrible*.
2006-05-15 13:28:00 +00:00
Dr. Stephen Henson
fbf6643607
Bugfix: the NONE string for PBE algorithms wasn't working.
2006-05-15 13:23:15 +00:00
Dr. Stephen Henson
3f36baa9f4
Correctly handle missing DSA parameters.
2006-05-15 01:26:52 +00:00
Dr. Stephen Henson
b0e69a0500
Add feature to PKCS12_create() if the encryption NID corresponds to a
...
supported encryption algorithm instead of a PBE NID then use that
algorithm with PBES2.
2006-05-15 00:45:10 +00:00
Dr. Stephen Henson
856640b54f
Extend PBE code to support non default PKCS#5 v2.0 PRFs.
2006-05-14 18:40:53 +00:00
Dr. Stephen Henson
76240b3a39
Check for deprecated private key types before PKCS#8 types.
2006-05-14 18:35:42 +00:00
Dr. Stephen Henson
34b3c72e4e
Typo.
2006-05-14 16:50:22 +00:00
Ulf Möller
c264592d69
Add includes in synopsis.
...
Submitted by: Mike Frysinger <vapier@gentoo.org >
2006-05-14 11:28:00 +00:00
Dr. Stephen Henson
1bd06bd0c4
In interactive mode only config OpenSSL once.
2006-05-12 17:11:58 +00:00
Dr. Stephen Henson
9540ccdf1f
Stop warnings about deprecated -mcpu option.
2006-05-12 16:06:12 +00:00
Richard Levitte
98bf13c36b
make update
2006-05-12 15:31:28 +00:00
Richard Levitte
7e76e56387
Someone made a mistake, and some function and reason codes got
...
duplicate numbers. Renumbering.
2006-05-12 15:27:52 +00:00
Dr. Stephen Henson
759d8ac6ee
Typo.
2006-05-12 00:27:39 +00:00
Dr. Stephen Henson
959e8dfe06
Update 'req' command to use new keygen API.
2006-05-11 21:39:00 +00:00
Dr. Stephen Henson
7f57b076a6
New functions to get key types without dereferncing EVP_PKEY.
...
More error checking for RSA pmeth.
2006-05-11 21:33:00 +00:00
Dr. Stephen Henson
7144c4212a
Update PKCS#7 decrypt routines to use new API.
2006-05-08 16:38:19 +00:00
Dr. Stephen Henson
399a6f0bd1
Update PKCS#7 enveloped data to new API.
2006-05-08 12:44:25 +00:00
Dr. Stephen Henson
3d47929968
Update S/MIME code to use default digest.
2006-05-07 17:22:58 +00:00
Dr. Stephen Henson
03919683f9
Add support for default public key digest type ctrl.
2006-05-07 17:09:39 +00:00
Dr. Stephen Henson
5cda6c4582
Fix from stable branch.
2006-05-07 12:30:37 +00:00
Ulf Möller
83ed49149c
bug fix.
...
PR: 1326
Submitted by: John Skodon
2006-05-06 18:26:12 +00:00
Andy Polyakov
67d990904e
Futher minor PPC assembler update.
2006-05-04 21:30:41 +00:00
Dr. Stephen Henson
f3df90b2bb
Update from stable branch.
2006-05-04 16:32:31 +00:00
Dr. Stephen Henson
11e46bd7ae
Update FAQ.
2006-05-04 14:22:00 +00:00
Andy Polyakov
c09a0318b7
Minor PPC assembler updates.
2006-05-03 14:07:34 +00:00
Andy Polyakov
fe716ba686
PPC assembler distiller update.
2006-05-03 13:39:34 +00:00
Andy Polyakov
9a97800813
Typo in linux-ppc line.
2006-05-03 13:38:50 +00:00
Dr. Stephen Henson
e881f6175a
Update from stable branch.
2006-05-03 13:19:06 +00:00
Ulf Möller
36e77b1059
Bug fix.
...
PR: 1307
Submitted by: Oliver Tappe <zooey@hirschkaefer.de >
2006-05-01 18:49:26 +00:00
Andy Polyakov
a9c32ace06
SHA1 for PowerPC.
2006-05-01 13:35:03 +00:00
Andy Polyakov
2c5d4daac5
Yet another "teaser" Montgomery multiplication module, for PowerPC.
2006-04-30 21:15:29 +00:00
Dr. Stephen Henson
b46343583c
Update EVP_PKEY_cmp() and X509_check_private() to return sensible values and
...
handle unsupported key types.
2006-04-28 12:27:37 +00:00
Dr. Stephen Henson
816c2b5a79
Fix from stable branch.
2006-04-28 00:30:49 +00:00
Dr. Stephen Henson
a78568b7e9
Replace RSA specific PKCS7_RECIP_INFO set up with an public key algorithm
...
ctrl.
2006-04-27 18:20:34 +00:00
Dr. Stephen Henson
ee5b2a1e51
Code tidy.
2006-04-27 00:42:51 +00:00
Dr. Stephen Henson
e4b21c74fc
New function to extract AlgorithmIdentifier for PKCS7_RECIP_INFO.
2006-04-27 00:29:50 +00:00
Dr. Stephen Henson
4edcb93dca
Don't free up parameter. The public key ASN1 method can do that if it needs
...
to.
2006-04-27 00:20:43 +00:00
Dr. Stephen Henson
15f80eea31
Fix usage message for pkeyutl.
2006-04-26 15:42:29 +00:00
Dr. Stephen Henson
81cebb8b79
Add prototypes and pkey accessor function for EVP_PKEY_CTX.
2006-04-26 11:52:36 +00:00
Dr. Stephen Henson
a4e75b3dfd
Correct copyright notice... this doesn't contain any SSLeay code.
2006-04-24 00:07:26 +00:00
Dr. Stephen Henson
cddaba8ede
Add 'flags' parameter to EVP_PKEY_asn1_meth_new() to set algorithm flags.
2006-04-21 17:38:58 +00:00
Nils Larsch
49c5f38d3d
undo accidental commit
2006-04-20 13:54:34 +00:00
Nils Larsch
f8296228f1
as we encrypt every bit separately we need to loop through the number
...
of bits; thanks to Michael McDougall <mmcdouga@saul.cis.upenn.edu >
PR: 1318
2006-04-20 13:11:52 +00:00
Nils Larsch
930b0c4b8a
make local function static
2006-04-20 09:53:49 +00:00
Dr. Stephen Henson
3d153f7985
Remove dss1 hack from S/MIME code.
2006-04-19 17:47:15 +00:00
Dr. Stephen Henson
ee1d9ec019
Remove link between digests and signature algorithms.
...
Use cross reference table in ASN1_item_sign(), ASN1_item_verify() to eliminate
the need for algorithm specific code.
2006-04-19 17:05:59 +00:00
Dr. Stephen Henson
614b448a67
Remove comment from SSLeay days about EVP_PKEY_METHOD.
2006-04-19 12:16:58 +00:00
Richard Levitte
a19c9f179d
Make sure obj_xref.h is updated during a "make update"
2006-04-19 06:45:06 +00:00
Richard Levitte
a784b943c1
Synchronise with Unixly build.
...
(Geez, a lot is happening right now, eh? :-))
2006-04-19 06:44:07 +00:00
Dr. Stephen Henson
d202709808
Add OID cross reference table.
...
Fix some typos in GOST OIDs.
Update dependencies.
2006-04-18 23:36:07 +00:00
Richard Levitte
51ff0abb05
Synchronise
2006-04-17 17:19:59 +00:00
Dr. Stephen Henson
492a9e2415
Allow public key ASN1 methods to set PKCS#7 SignerInfo structures.
2006-04-17 17:12:23 +00:00
Dr. Stephen Henson
7bf7333d68
If we include winsock2.h then FD_SET wants an unsigned type for an fd.
2006-04-17 12:22:13 +00:00
Dr. Stephen Henson
c20276e4ae
Fix (most) WIN32 warnings and errors.
2006-04-17 12:08:22 +00:00
Dr. Stephen Henson
9ca7047d71
Provisional support for EC pkey method, supporting ECDH and ECDSA.
2006-04-16 16:15:59 +00:00
Andy Polyakov
ba3b2f1538
SHA-1 for x86_64.
2006-04-16 14:42:54 +00:00
Dr. Stephen Henson
b010b7c434
Use more flexible method of determining output length, by setting &outlen
...
value of the passed output buffer is NULL.
The old method of using EVP_PKEY_size(pkey) isn't flexible enough to cover all
cases where the output length may depend on the operation or the parameters
associated with it.
2006-04-15 18:50:56 +00:00
Dr. Stephen Henson
9dc17a2536
Fix from 0.9.7-stable branch.
2006-04-15 17:43:43 +00:00
Dr. Stephen Henson
5950bf7943
Revert to original...
2006-04-15 13:15:25 +00:00
Dr. Stephen Henson
4141c803d8
Oops...
2006-04-15 13:12:42 +00:00
Dr. Stephen Henson
ba1ba5f0fb
If cipher list contains a match for an explicit ciphersuite only match that
...
one suite.
2006-04-15 00:22:05 +00:00
Richard Levitte
51aa7bd321
Got sick and tired of duplicating... Too error-prone (i.e. I forget
...
to update both...)!
2006-04-14 19:56:28 +00:00
Dr. Stephen Henson
09b88a4a55
Update copyright notices on a few files where all original SSLeay code has
...
been deleted.
2006-04-14 17:36:18 +00:00
Dr. Stephen Henson
f3481ca28f
Print out zero length string properly.
2006-04-14 16:47:18 +00:00
Dr. Stephen Henson
ba30bad57b
Add functions to allow setting and adding external EVP_PKEY_METHOD.
2006-04-14 12:41:35 +00:00
Dr. Stephen Henson
ffb1ac674c
Complete key derivation support.
2006-04-13 20:16:56 +00:00
Dr. Stephen Henson
3be34589e8
Update dependencies.
2006-04-13 13:00:45 +00:00
Dr. Stephen Henson
d87e615209
Add key derivation support.
2006-04-13 12:56:41 +00:00
Dr. Stephen Henson
92511cff48
Change the option setting command line switch to "-pkeyopt" to avoid confusion
...
with algorithm parameters.
2006-04-13 12:38:46 +00:00
Richard Levitte
7b82159865
Synchronise what what's happening with the Unix build
2006-04-13 09:59:52 +00:00
Dr. Stephen Henson
52c11dce31
Typo.
2006-04-13 00:26:05 +00:00
Dr. Stephen Henson
3ba0885a3e
Extend DH ASN1 method, add DH EVP_PKEY_METHOD.
2006-04-12 23:51:24 +00:00
Dr. Stephen Henson
023c9d8dd5
Fix leak.
2006-04-12 23:38:45 +00:00
Dr. Stephen Henson
4c97a04e2e
PKCS#3 DH PKCS#8 ASN1 support.
2006-04-12 23:06:10 +00:00
Ulf Möller
fb05e1cdf6
declare as in prototype
...
Submitted by: Gisle Vanem
2006-04-12 19:24:45 +00:00
Dr. Stephen Henson
ceb4678956
Extend DH ASN1 method to support public key encode/decode and parameter
...
utilities.
2006-04-12 17:14:48 +00:00
Dr. Stephen Henson
0cb8499b73
Compare parameters when comparing public keys.
2006-04-12 17:01:19 +00:00
Dr. Stephen Henson
4d62ec32e0
Add file dso_beos.c missing from original commit.
...
PR: 1312
2006-04-12 11:46:16 +00:00
Dr. Stephen Henson
75ef718820
Support for DSA keygen, fix for genpkey.
2006-04-12 11:14:11 +00:00
Dr. Stephen Henson
c927df3fa1
Initial DSA EVP_PKEY_METHOD. Fixup some error codes.
2006-04-12 10:20:47 +00:00
Ulf Möller
4700aea951
Add BeOS support.
...
PR: 1312
Submitted by: Oliver Tappe <zooey@hirschkaefer.de >
Reviewed by: Ulf Moeller
2006-04-11 21:34:21 +00:00
Ulf Möller
60cdb821db
manual pages as HTML
...
Submitted by: Oliver Tappe <zooey@hirschkaefer.de >
2006-04-11 21:09:57 +00:00
Ulf Möller
0ef888cd3e
Use Dl_info only on systems where it is known to exist. It does not
...
exist on AIX 4.3.3, AIX 5.1, SCO 5, or Cygwin.
2006-04-11 21:00:13 +00:00
Ulf Möller
26c777d516
uncomment; that one slipped through
2006-04-11 20:09:31 +00:00
Ulf Möller
9555339007
improve make dclean to remove files generated during build
...
PR: 1308
Submitted by: Oliver Tappe <zooey@hirschkaefer.de >
Reviewed by: Ulf Moeller
2006-04-11 20:05:23 +00:00
Dr. Stephen Henson
2fbe371f53
Fix parameter error messages.
2006-04-11 18:30:25 +00:00
Dr. Stephen Henson
15181d7811
Write parameters if -genparam option include.
2006-04-11 18:21:40 +00:00
Dr. Stephen Henson
1edba2110f
Add parameter generation option to genpkey.
2006-04-11 18:18:14 +00:00
Dr. Stephen Henson
54d853ebc3
Add support for setting keybits and public exponent value for pkey RSA keygen.
2006-04-11 17:28:37 +00:00
Dr. Stephen Henson
f5cda4cbb1
Initial keygen support.
2006-04-11 13:28:52 +00:00
Dr. Stephen Henson
f9a6348a53
ctrls to set PSS salt length.
2006-04-10 12:55:04 +00:00
Dr. Stephen Henson
a7ffd9d19c
Preliminary PSS support.
2006-04-10 12:41:21 +00:00
Dr. Stephen Henson
29db322e8f
Beginnings of PSS support.
2006-04-10 11:48:35 +00:00
Richard Levitte
25dc89eb9b
Synchronise with the Unix build
2006-04-10 11:39:49 +00:00
Dr. Stephen Henson
716630c0eb
Change operation values so they can be used as a mask.
...
Fix rsa_pkey_method.
2006-04-10 11:16:11 +00:00
Dr. Stephen Henson
4f59b6587f
Implementation of pkey_rsa_verify. Some constification.
2006-04-10 01:06:17 +00:00
Dr. Stephen Henson
9befdf1d20
New utility function to reverse a buffer, either by copying or in-place.
2006-04-10 00:11:30 +00:00
Dr. Stephen Henson
75d44c0452
Store digests as EVP_MD instead of a NID.
...
Add digest size sanity checks.
2006-04-09 21:24:48 +00:00
Dr. Stephen Henson
a58a636838
Constification.
2006-04-09 20:53:19 +00:00
Dr. Stephen Henson
9fdab72dd7
Bugfix X9.31 padding.
2006-04-09 20:44:00 +00:00
Dr. Stephen Henson
b2a97be7f4
Support for digest signing and X931 in rsa_pkey_meth.
2006-04-09 19:17:25 +00:00
Dr. Stephen Henson
6471c9f478
Add checking to padding ctrl.
2006-04-09 12:53:55 +00:00
Dr. Stephen Henson
4a3dc3c0e3
Add RSA ctrl for padding mode, add ctrl support in pkeyutl.
2006-04-09 12:42:09 +00:00
Dr. Stephen Henson
a2318e86bd
Fix typo. Add EVP_PKEY_CTX control function for later use by command line
...
utilities.
2006-04-09 00:34:00 +00:00
Dr. Stephen Henson
a9164153d1
Reformat pkeyutl.c, add support for verify operation but nothing actually
...
supports it (yet).
2006-04-08 22:25:47 +00:00
Dr. Stephen Henson
8795d38906
Update dependencies.
2006-04-08 13:04:31 +00:00
Dr. Stephen Henson
8cd44e3630
Implement encrypt/decrypt using RSA.
2006-04-08 13:02:04 +00:00
Dr. Stephen Henson
07e970c7e6
Initial functions for RSA EVP_PKEY_METHOD.
...
Update dependencies.
2006-04-08 00:15:07 +00:00
Dr. Stephen Henson
d1aa0d38c5
If <operatio>_init function is zero interpret as noop.
2006-04-07 23:11:49 +00:00
Dr. Stephen Henson
9e4d0f0be2
New utility 'pkeyutl' a general purpose version of 'rsautl'.
2006-04-07 19:33:28 +00:00
Dr. Stephen Henson
cd7638980a
Include EVP_PKEY argument in EVP_PKEY_CTX_new(). This avoids the
...
need for a separate EVP_PKEY parameter in the other operation
initialization routines.
2006-04-07 17:28:56 +00:00
Dr. Stephen Henson
f733a5ef0e
Initial functions for main EVP_PKEY_METHOD operations.
...
No method implementations yet.
2006-04-07 16:42:09 +00:00
Dr. Stephen Henson
5da98aa687
Updated to EVP_PKEY_METHOD code... still doesn't do much.
2006-04-06 17:32:43 +00:00
Dr. Stephen Henson
0b6f3c66cd
Initial definitions and a few functions for EVP_PKEY_METHOD: an extension
...
of the EVP routines to public key algorithms.
2006-04-06 13:02:06 +00:00
Bodo Möller
a01d9ac558
Remove ECC extension information from external representation
...
of the session -- we don't really need it once the handshake
has completed.
2006-04-05 17:11:19 +00:00
Dr. Stephen Henson
e46691a0bc
New function to add dynamic alias.
2006-04-05 13:24:19 +00:00
Dr. Stephen Henson
732a40e107
Last arg to EVP_PKEY_assign() should be void *.
2006-04-05 13:04:02 +00:00
Dr. Stephen Henson
29da3ade3c
Rebuild mac table to avoid duplicates.
2006-04-05 12:09:09 +00:00
Dr. Stephen Henson
de908d6319
Typos in a few OID names.
2006-04-05 12:06:32 +00:00
Dr. Stephen Henson
9c9c98ad2e
Typo.
2006-04-05 12:00:22 +00:00
Dr. Stephen Henson
5e0e9fce5d
Minor object name edit.
2006-04-05 11:29:31 +00:00
Dr. Stephen Henson
53ec8809cf
Add an explicit load_config() call so any added algorithms are
...
visible.
2006-04-04 18:47:20 +00:00
Dr. Stephen Henson
863779065e
Fix dynamic public key method lookup.
2006-04-04 18:32:19 +00:00
Dr. Stephen Henson
0b33dac310
New function to retrieve ASN1 info on public key algorithms. New command
...
line option to print out info.
2006-04-04 18:16:03 +00:00
Dr. Stephen Henson
e2bce37720
Stop warning.
2006-04-04 18:11:49 +00:00
Dr. Stephen Henson
228b4e426b
Update and add last (?) set of GOST OIDs.
2006-04-04 15:53:21 +00:00
Bodo Möller
a4974de937
clarification
2006-04-03 14:11:23 +00:00
Bodo Möller
22f41c9b99
check length properly
...
Submitted by: Peter Sylvester
2006-04-03 13:57:56 +00:00
Bodo Möller
a123c552cd
simplify: use s2n macro
2006-04-03 13:07:18 +00:00
Bodo Möller
b2172f4f8e
Avoid hard-coded table length where we can use sizeof.
...
Submitted by: Peter Sylvester
Reviewed by: Bodo Moeller
2006-04-03 11:56:30 +00:00
Bodo Möller
dc1d1b6934
fix memory leak
...
Submitted by: Peter Sylvester
2006-04-03 11:49:18 +00:00
Richard Levitte
67475a7ed7
Change chop to chomp when reading lines, so CRLF is properly processed on
...
the operating systems where they are the normal line endings
2006-04-03 09:15:15 +00:00
Dr. Stephen Henson
362ab3e4f9
More GOST OIDs
2006-04-02 13:22:39 +00:00
Dr. Stephen Henson
2aed84d16b
Add GOST parameter set OIDs.
2006-04-02 03:01:27 +00:00
Dr. Stephen Henson
5deea1c015
Don't free up key in priv_decode.
2006-03-31 18:16:22 +00:00
Dr. Stephen Henson
99516f81b1
Initialize pval.
2006-03-31 18:11:54 +00:00
Richard Levitte
d6091d5a39
If we declare a function, like d2i_TS_MSG_IMPRINT_bio(), we'd better
...
*define* it too, or things like shared libraries might be a bit sad.
2006-03-31 12:25:24 +00:00
Dr. Stephen Henson
5a47825ece
Fix gost OIDs.
2006-03-31 10:57:32 +00:00
Richard Levitte
16f66ae794
Synchronise with recent changes
2006-03-30 04:30:45 +00:00
Richard Levitte
7ce1d9e9a6
The -config option flag needs to be in the SSLEAY_CONFIG value.
...
PR: 1300
2006-03-30 04:29:38 +00:00
Bodo Möller
a70183bc80
fix for hostname extension
...
Submitted by: Kaspar Brand, Peter Sylvester
2006-03-30 02:53:30 +00:00
Bodo Möller
332737217a
Implement Supported Elliptic Curves Extension.
...
Submitted by: Douglas Stebila
2006-03-30 02:44:56 +00:00
Bodo Möller
bcbe37b716
Change default curve (for compatibility with a
...
soon-to-be-widely-deployed implementation that doesn't support the
previous default)
Submitted by: Douglas Stebila
2006-03-30 02:41:30 +00:00
Bodo Möller
f393b7449d
Implement cipher-suite selection logic given Supported Point Formats Extension.
...
Submitted by: Douglas Stebila
2006-03-30 02:35:09 +00:00
Dr. Stephen Henson
531308d929
Fix typo.
2006-03-29 15:58:55 +00:00
Dr. Stephen Henson
74e564cd46
Add some GOST OIDs.
2006-03-29 13:02:21 +00:00
Dr. Stephen Henson
42eae426df
Add missing function declaration.
2006-03-29 12:18:26 +00:00
Dr. Stephen Henson
246e09319c
Fix bug where freed OIDs could be accessed in EVP_cleanup() by
...
defering freeing in OBJ_cleanup().
2006-03-28 17:23:48 +00:00
Dr. Stephen Henson
f7a3296d8c
Typo.
2006-03-28 14:48:42 +00:00
Dr. Stephen Henson
3e4585c8fd
New utility pkeyparam. Enhance and bugfix algorithm specific parameter
...
functions to support it.
2006-03-28 14:35:32 +00:00
Dr. Stephen Henson
3e84b6e15f
New general public key utility 'pkey'.
2006-03-28 12:34:45 +00:00
Richard Levitte
d505d1ef4a
Small bug. apps/CA.sh and apps/CA.com look at SSLEAY_CONFIG, not
...
OPENSSL_CONF.
2006-03-28 10:26:12 +00:00
Richard Levitte
70b2ae3edf
Since we're moving between directories, let's get an absolute path to
...
openssl.exe.
2006-03-27 14:39:06 +00:00
Bodo Möller
9e5dba197c
Simplify ASN.1 for point format list
...
Submitted by: Douglas Stebila
2006-03-26 10:53:52 +00:00
Richard Levitte
a61114c38b
Only try to remove the tsa.dir subdirectory if it actually exists.
2006-03-25 10:24:22 +00:00
Dr. Stephen Henson
db98bbc114
Initial support for generalized public key parameters.
2006-03-24 13:46:58 +00:00
Dr. Stephen Henson
e42633140e
Add support for legacy PEM format private keys in EVP_PKEY_ASN1_METHOD.
2006-03-23 18:02:23 +00:00
Dr. Stephen Henson
bd50e31325
Typo.
2006-03-23 14:08:33 +00:00
Dr. Stephen Henson
b2c0518e6a
Fix bug in DSA, EC methods.
2006-03-23 14:04:39 +00:00
Dr. Stephen Henson
d82e2718e2
Add information and pem strings. Update dependencies.
2006-03-23 11:54:51 +00:00
Dr. Stephen Henson
18e377b4ff
Make EVP_PKEY_ASN1_METHOD opaque. Add application level functions to
...
initialize it. Initial support for application added public key ASN1.
2006-03-22 17:59:49 +00:00
Richard Levitte
043b2e9c2e
Keep up with the changes in the Unix build system.
2006-03-22 14:31:03 +00:00
Dr. Stephen Henson
1b593194be
Move algorithm specific print code from crypto/asn1/t_pkey.c to separate
...
*_prn.c files in each algorithm directory.
2006-03-22 13:34:19 +00:00
Dr. Stephen Henson
35208f368c
Gather printing routines into EVP_PKEY_ASN1_METHOD.
2006-03-22 13:09:35 +00:00
Richard Levitte
c788e59365
VMS doesn't support includes of paths very well.
2006-03-22 11:26:57 +00:00
Richard Levitte
cb08f4a6a3
Synchronise with recent changes
2006-03-21 06:22:36 +00:00
Dr. Stephen Henson
adbc603d24
DH EVP_PKEY_ASN1_METHOD, doesn't do much (yet?).
2006-03-20 18:37:40 +00:00
Dr. Stephen Henson
6f81892e6b
Transfer parameter handling and key comparison to algorithm methods.
2006-03-20 17:56:05 +00:00
Dr. Stephen Henson
448be74335
Initial support for pluggable public key ASN1 support. Process most public
...
key ASN1 handling through a single EVP_PKEY_ASN1_METHOD structure and move
the spaghetti algorithm specific code to a single ASN1 module for each
algorithm.
2006-03-20 12:22:24 +00:00
Dr. Stephen Henson
1a5a1a93f6
Stop compiler warnings.
2006-03-20 11:44:34 +00:00
Nils Larsch
d917188a46
fix last commit: return NULL is TS_RESP_CTX_set_status_info_cond() failed
2006-03-19 21:09:48 +00:00
Nils Larsch
b4e88ccb28
ensure the pointer is valid before using it
2006-03-18 14:27:41 +00:00
Nils Larsch
d916ba1ba1
check if con != NULL before using it
2006-03-18 14:24:02 +00:00
Nils Larsch
33af4421f2
remove unnecessary code
2006-03-18 14:22:20 +00:00
Richard Levitte
95e362c6da
Typo...
2006-03-18 10:36:15 +00:00
Ulf Möller
c58d983e3b
*** empty log message ***
2006-03-17 19:29:35 +00:00
Ulf Möller
a84c9d1ed9
Clarification for CPU specific config options.
2006-03-17 19:22:35 +00:00
Nils Larsch
c6a27f0178
fix for OPENSSL_NO_EC
...
PR: 1293
2006-03-15 19:17:56 +00:00
Nils Larsch
67b6f1ca88
fix problems found by coverity: remove useless code
2006-03-15 17:45:43 +00:00
Richard Levitte
a4ff392503
tlsext_ecpointformatlist_length is unsigned, so check if it's less
...
than zero will only result in pissing of some compilers...
2006-03-15 09:57:16 +00:00
Nils Larsch
40f51f506c
create BN_CTX object
2006-03-15 08:37:35 +00:00
Nils Larsch
eeb821f707
fix error found by coverity: check if ctx is != NULL before calling BN_CTX_end()
2006-03-14 22:48:41 +00:00
Nils Larsch
47d5566646
fix error found by coverity: check if ctx is != NULL before calling BN_CTX_end()
2006-03-13 23:14:57 +00:00
Nils Larsch
90bdfd97a6
signed vs. unsigned
2006-03-13 22:07:05 +00:00
Richard Levitte
b9865f110e
Oh, now I noticed Bodo's change that made tlsext_ecpointformatlist
...
unsigned...
2006-03-13 12:37:19 +00:00
Richard Levitte
07ef612968
Resolve signed vs. unsigned issues
2006-03-13 12:32:51 +00:00
Bodo Möller
019fdc7850
fix sign problems
2006-03-13 09:55:06 +00:00
Nils Larsch
7c382796be
remove unused variables
2006-03-13 07:21:39 +00:00
Bodo Möller
b6acb8d0de
udpate Supported Point Formats Extension code
...
Submitted by: Douglas Stebila
2006-03-13 01:24:38 +00:00
Nils Larsch
6adbcb9755
fix comment
...
Submitted by: Peter Sylvester
2006-03-12 23:00:32 +00:00
Nils Larsch
e968089485
use BIO_snprintf() instead of snprintf + use BIO_FP_TEXT for text output
...
Submitted by: Gisle Vanem
2006-03-12 22:16:57 +00:00
Nils Larsch
c2cd422ac6
note that SSL_library_init() is not reentrant
2006-03-12 00:37:55 +00:00
Bodo Möller
36ca4ba63d
Implement the Supported Point Formats Extension for ECC ciphersuites
...
Submitted by: Douglas Stebila
2006-03-11 23:46:37 +00:00
Bodo Möller
ed4a1d12b9
clarification
2006-03-11 22:10:34 +00:00
Nils Larsch
a0aa8b4b61
fix signed vs. unsigned warning
2006-03-11 12:18:11 +00:00
Nils Larsch
2c059d58d9
fix "missing initializer" warning
2006-03-11 11:58:47 +00:00
Nils Larsch
cd346d3e22
fix signed vs. unsigned warning
2006-03-11 11:54:27 +00:00
Nils Larsch
561d93aa00
make update
2006-03-10 23:08:31 +00:00
Nils Larsch
ddac197404
add initial support for RFC 4279 PSK SSL ciphersuites
...
PR: 1191
Submitted by: Mika Kousa and Pasi Eronen of Nokia Corporation
Reviewed by: Nils Larsch
2006-03-10 23:06:27 +00:00
Richard Levitte
0e8e6f19b2
Remember to *build* WP_TEST on VMS, as well :-)
2006-03-08 10:45:23 +00:00
Nils Larsch
c03e4f9bf0
fix function name in error message
2006-03-07 10:22:45 +00:00
Ulf Möller
c3bb1f8166
unused function
2006-03-06 17:58:25 +00:00
Richard Levitte
959a7201b8
The actual whirlpool test was missing on VMS...
2006-03-06 12:09:34 +00:00
Nils Larsch
6c73d01142
constify some print and ts functions
2006-03-05 20:19:05 +00:00
Dr. Stephen Henson
2932ad5677
Typo.
2006-03-05 01:19:48 +00:00
Nils Larsch
036bbcc53f
no need to cast away the const
2006-03-04 13:55:55 +00:00
Nils Larsch
6384e46da3
make some parameters const
2006-03-04 13:55:02 +00:00
Richard Levitte
6e2fcc44bd
Make shorter TS symbols for OpenVMS.
...
Don't convert a function pointer to a void*, ISO C doesn't like that.
2006-03-02 13:55:40 +00:00
Richard Levitte
8721fc2d0b
Forgot the TSA application...
2006-03-02 13:28:52 +00:00
Dr. Stephen Henson
c1facbb681
Check EVP_DigestInit_ex() return value in EVP_BytesToKey().
2006-03-01 21:17:13 +00:00
Nils Larsch
f2c33fa6fd
force C locale when using [a-z] in sed expressions
...
PR: 1283
Submitted by: Mike Frysinger
2006-03-01 19:51:37 +00:00
Nils Larsch
5aae935038
fix "#ifndef HZ" statement
...
PR: 1287
2006-02-28 19:52:15 +00:00
Ulf Möller
11503177d1
TS bugfixes: Do not hardcode message digest algorithms; fix ASN1 decoding.
...
Submitted by: Zoltan Glozik <zglozik@opentsa.org >
2006-02-26 23:34:53 +00:00
Richard Levitte
9ab899a660
Synchronise with openss.cnf
2006-02-26 10:48:40 +00:00
Richard Levitte
8937a13e0c
Add a TSA test. testtsa.com is a manual sh to dcl translation of
...
testtsa.
2006-02-26 10:47:57 +00:00
Richard Levitte
19017d4061
Add TS to the VMS build.
2006-02-26 10:46:39 +00:00
Richard Levitte
f53ac639c6
Break out deltree in its' own command procedure.
2006-02-26 10:44:57 +00:00
Nils Larsch
f71165b556
fix no-dh configure option; patch supplied by Peter Meerwald
2006-02-24 17:58:43 +00:00
Dr. Stephen Henson
350a404cb8
Print out <INVALID> if an OID value is invalid.
2006-02-21 01:00:08 +00:00
Dr. Stephen Henson
827c55741b
Tolerate a SEQUENCE in DN components.
2006-02-19 13:44:47 +00:00
Ulf Möller
e0c8c08936
ignore
2006-02-16 20:43:04 +00:00
Ulf Möller
4e397d07ea
message style
2006-02-16 20:33:47 +00:00
Ulf Möller
9eb8794149
oops
2006-02-16 20:30:58 +00:00
Ulf Möller
dc24110311
wrap shlib for testtsa
...
Submitted by: David Somers <dsomers@omz13.com >
2006-02-16 20:20:24 +00:00
Nils Larsch
b3e72fc37f
make some internal functions static; patch supplied by Kurt Roeckx
2006-02-15 20:20:20 +00:00
Nils Larsch
90076b96df
fix typos
...
PR: 1280
2006-02-15 19:42:22 +00:00
Dr. Stephen Henson
9c339a7227
Fix from stable branch.
2006-02-15 15:04:42 +00:00
Dr. Stephen Henson
e7a8b47f1a
Fix warnings.
2006-02-15 14:45:31 +00:00
Ulf Möller
7ac7a4bc37
shorter filenames
2006-02-15 00:35:46 +00:00
Nils Larsch
a628901dda
use asn1 callbacks for new, free and d2i
2006-02-14 07:55:03 +00:00
Nils Larsch
2ab75dee27
don't use the l length modifier for int
2006-02-13 09:50:04 +00:00
Nils Larsch
a3f586cdab
use stricter prototypes, fix warnings
2006-02-13 09:46:02 +00:00
Nils Larsch
fcfd87168a
fix warning: add missing prototype
2006-02-13 09:43:31 +00:00
Nils Larsch
95a0e8ab31
fix warning
2006-02-13 08:45:53 +00:00
Nils Larsch
0c9caf04de
fix typo: pass pre-computed parameters to the underlying signature function; thanks to Lucas Newman
2006-02-13 08:16:00 +00:00
Ulf Möller
21e8bbf290
*** empty log message ***
2006-02-12 23:36:58 +00:00
Ulf Möller
3b408d83fe
make update
2006-02-12 23:21:56 +00:00
Ulf Möller
8573552e8c
time stamp Makefile, test files
...
Submitted by: Zoltan Glozik <zglozik@opentsa.org >
2006-02-12 23:19:25 +00:00
Ulf Möller
c7235be6e3
RFC 3161 compliant time stamp request creation, response generation
...
and response verification.
Submitted by: Zoltan Glozik <zglozik@opentsa.org >
Reviewed by: Ulf Moeller
2006-02-12 23:11:56 +00:00
Dr. Stephen Henson
1c17d91c53
Minor clarification.
2006-02-11 01:54:19 +00:00
Dr. Stephen Henson
a070f0dac5
Add FAQ about AKID.
2006-02-11 00:46:34 +00:00
Richard Levitte
b480283c56
Document the building macros.
2006-02-10 08:48:43 +00:00
Richard Levitte
f5ce5e1465
As an effect of revisions 1.261, BUILD_CMD was changed so $(DIRS)
...
wasn't respected when using it to build different parts of OpenSSL.
1.269 was an attempt to correct that, but unfortunately meant that we
built every part that was given i $(DIRS) 7 times. This change puts
back the original intent with BUILD_CMD via the new macro
BUILD_ONE_CMD while keeping the intent with RECURSIVE_BUILD_CMD.
2006-02-10 08:04:59 +00:00
Dr. Stephen Henson
d7db77a0cb
Fix warnings about "sin" conflicting with sin(3) definition.
2006-02-09 17:17:41 +00:00
Dr. Stephen Henson
346ac30120
Avoid warnings about shadowed definitions.
2006-02-09 17:11:12 +00:00
Dr. Stephen Henson
07bb51b6b4
Update from 0.9.7-stable.
2006-02-09 12:29:21 +00:00
Nils Larsch
bbab9b61dd
remove unnecessary check
2006-02-08 18:52:43 +00:00
Nils Larsch
82e8372f17
p could be uninitialized
2006-02-08 18:51:17 +00:00
Bodo Möller
e67ed82877
move new member of SSL_SESSION to the end
...
(minimize changes to binary format)
Submitted by: Peter Sylvester
2006-02-07 14:26:43 +00:00
Dr. Stephen Henson
15ac971681
Update filenames in makefiles.
2006-02-04 01:45:59 +00:00
Dr. Stephen Henson
0c21e13012
Recognize mingw in perlasm.
2006-02-04 01:25:19 +00:00
Nils Larsch
d5fd72fd0d
fix if statement: call conn_state() if the BIO is not in the BIO_CONN_S_OK state
2006-02-02 22:11:02 +00:00
Dr. Stephen Henson
c7474d077b
Ignore zero length constructed segments.
2006-01-31 18:36:29 +00:00
Lutz Jänicke
826b52d26f
Typo
...
Submitted by: Girish Venkatachalam <girish1729@gmail.com >
2006-01-30 17:06:00 +00:00
Nils Larsch
8c5a2bd6bb
add additional checks + cleanup
...
Submitted by: David Hartman <david_hartman@symantec.com >
2006-01-29 23:12:22 +00:00
Dr. Stephen Henson
25a58453ff
Fixes for BOOL handling: produce errors for invalid string for mini-compiler,
...
correctly encode FALSE for BOOL in ASN1_TYPE.
2006-01-19 17:16:56 +00:00
Nils Larsch
00fe865dbe
recent changes from 0.9.8: fix cipher list order in s3_lib.c,
...
make "no-ssl2" work again
PR: 1217
2006-01-15 17:35:28 +00:00
Dr. Stephen Henson
9e9bececa9
Fix from stable branch.
2006-01-15 17:31:08 +00:00
Dr. Stephen Henson
90890074b0
Typo.
2006-01-15 13:55:31 +00:00
Dr. Stephen Henson
31676a3540
Update from stable branch.
2006-01-15 13:50:10 +00:00
Richard Levitte
6b9e941ee3
signed vs. unsigned clash.
2006-01-14 11:49:24 +00:00
Nils Larsch
802d7fa6d5
support numeric strings in ASN1_generate_nconf
2006-01-14 09:21:33 +00:00
Nils Larsch
3798cb8182
fix comment
...
PR: 1270
2006-01-13 23:50:26 +00:00
Nils Larsch
2c5fadbce3
2 is a prime
...
PR: 1266
2006-01-13 23:27:59 +00:00
Bodo Möller
58ece83395
Further TLS extension improvements
...
Submitted by: Peter Sylvester
2006-01-13 09:21:10 +00:00
Richard Levitte
c75c096aa8
Forgot to initialize CC6DISABLEWARNINGS properly...
2006-01-11 18:55:42 +00:00
Richard Levitte
ab961dc8b0
Typo...
2006-01-11 13:31:04 +00:00
Bodo Möller
6ad47e83b4
improvements for alert handling
2006-01-11 07:18:35 +00:00
Bodo Möller
241520e66d
More TLS extension related changes.
...
Submitted by: Peter Sylvester
2006-01-11 06:10:40 +00:00
Bodo Möller
a13c20f603
Further TLS extension updates
...
Submitted by: Peter Sylvester
2006-01-09 19:49:05 +00:00
Richard Levitte
db6251ad54
Disable the Mixed Linkage warning for some selected modules. This is
...
because the Compaq C compiler will not accept that a variable be
declared extern then defined static without a warning.
2006-01-09 19:23:01 +00:00
Bodo Möller
51eb1b81f6
Avoid contradictive error code assignments.
...
"make errors".
2006-01-08 21:54:24 +00:00
Bodo Möller
2adc42e43e
Detect more errors.
...
Change assignment strategy: rathern than using max+r for new codes,
find first hole in list of existing codes.
2006-01-08 21:43:36 +00:00
Bodo Möller
52cc46a237
Detect SSL error code mishandling.
2006-01-08 20:03:08 +00:00
Bodo Möller
a07b4dc038
include max. codes in debug output
2006-01-08 19:54:32 +00:00
Bodo Möller
739a543ea8
Some error code cleanups (SSL lib. used SSL_R_... codes reserved for alerts)
2006-01-08 19:42:30 +00:00
Bodo Möller
01c76c6606
There's no such things as DTLS1_AD_MISSING_HANDSHAKE_MESSAGE.
...
For now, anyway.
2006-01-07 20:44:29 +00:00
Bodo Möller
d32f888db1
prepare for additional RFC3546 alerts
2006-01-07 20:33:16 +00:00
Bodo Möller
f7914dbf9a
make sure that the unrecognized_name alert actually gets sent
...
Submitted by: Peter Sylvester
2006-01-07 20:29:50 +00:00
Bodo Möller
3ff94a009b
complete and correct RFC3546 error codes
2006-01-07 20:28:11 +00:00
Bodo Möller
1aeb3da83f
Fixes for TLS server_name extension
...
Submitted by: Peter Sylvester
2006-01-06 09:08:59 +00:00
Bodo Möller
e8e5b46e2b
Add names for people who provided the TLS extension patch.
2006-01-04 17:35:51 +00:00
Richard Levitte
c9d67d4ddf
The VMS I run on doesn't know socklen_t and uses size_t instead.
2006-01-04 12:03:47 +00:00
Richard Levitte
8de5b7f548
Fix signed/unsigned char clashes.
2006-01-04 12:02:43 +00:00
Dr. Stephen Henson
9ee0f7b7e0
In ASN1_parse() show tag value for ASN1 tags > 30.
2006-01-03 14:20:07 +00:00
Bodo Möller
f1fd4544a3
Various changes in the new TLS extension code, including the following:
...
- fix indentation
- rename some functions and macros
- fix up confusion between SSL_ERROR_... and SSL_AD_... values
2006-01-03 03:27:19 +00:00
Bodo Möller
349eb12fd5
Make sure that after the change from revision 1.261,
...
it's still possible to do a partial build.
2006-01-03 03:05:08 +00:00
Richard Levitte
6a8f17de1e
Missing files in the VMS installation
2006-01-02 23:33:36 +00:00
Bodo Möller
b1277b9902
C style fix-up
2006-01-02 23:29:12 +00:00
Bodo Möller
ed3883d21b
Support TLS extensions (specifically, HostName)
...
Submitted by: Peter Sylvester
2006-01-02 23:14:37 +00:00
Andy Polyakov
ea558241e0
Refine login in b_sock.c.
2006-01-02 16:05:26 +00:00
Andy Polyakov
61aa2134a4
Compile Windows with winsock2.h. But note that we still link with wsock32!
...
This works because wsock32 commonly loads ws2_32 anyway and we [intend to]
check upon presense of winsock2-specific API at run-time.
2006-01-02 13:44:06 +00:00
Andy Polyakov
4eb76e2397
Fix typo and purify logic in b_sock.c
2006-01-02 12:26:36 +00:00
Andy Polyakov
68e575362f
./util update, which covers various issues, but most importantly mkerr.pl
...
and mkdef.pl spinning in endless loop.
2006-01-02 12:13:07 +00:00
Andy Polyakov
aab3bb04cf
Typo in win32_globallookup.
2006-01-02 12:06:22 +00:00
Andy Polyakov
481d81cb76
Make b_sock.c IPv6 savvy.
2006-01-02 09:12:46 +00:00
Andy Polyakov
c6cb42e4fb
"Relax" prototype and rename DSO_global_lookup_func to DSO_global_lookup.
2006-01-02 08:59:20 +00:00
Andy Polyakov
2d43a89488
util/mkerr.pl update to address various mkerr.pl problems [such as failure
...
to handle multi-line comments and endless loop while parsing overloaded
gnu-ish __attribute__].
2006-01-01 18:42:05 +00:00
Andy Polyakov
302ea8c260
Fix mapping "leak" in newly introduced win32_globallookup.
2006-01-01 18:38:59 +00:00
Andy Polyakov
a1f3462bc0
Oops! Remove junk...
2005-12-31 14:54:22 +00:00
Bodo Möller
7476f3ac3b
Rewrite timeout computation in a way that is less prone to overflow.
...
(Problem reported by Peter Sylvester.)
2005-12-30 23:51:36 +00:00
Andy Polyakov
68b64fb610
Add DSO_global_lookup_func implementation. See commentary in dso_lib.c
...
for further details.
2005-12-30 22:53:59 +00:00
Andy Polyakov
34b537ee66
Fix CFB and OFB modes in eng_padlock.c. Engine was consistent with itself,
...
but not interoperable with the rest of the world. test_padlock script is
added mostly for reference.
2005-12-28 16:16:56 +00:00
Andy Polyakov
7a5dbeb782
Minor sparcv9 clean-ups.
2005-12-27 21:27:39 +00:00
Andy Polyakov
6c06918ede
Lower PADLOCK_CHUNK till value, which doesn't affect the benchmark results.
...
Well, it's even contrary, 512 was observed to *improve* performance by 5%.
Excuse ourselves from treating C7 specially.
2005-12-27 21:21:56 +00:00
Richard Levitte
ee8f293701
Whoops, we were copying instead of comparing at the end of trying to
...
find a queue element.
Notified by nagendra modadugu <nagendra@cs.stanford.edu >
2005-12-20 07:03:10 +00:00
Andy Polyakov
3b4a0225e2
As SPARCV9 CPU flavor is [expected to be] detected at run-time, we can
...
afford to relax SPARCV9/8+ compiler command line and produce "unversal"
binaries as we used to.
2005-12-19 09:10:06 +00:00
Ulf Möller
c8e1edaae5
comments
2005-12-18 20:59:25 +00:00
Andy Polyakov
63d3fc9106
Eliminate possible mapping leak.
2005-12-18 19:14:01 +00:00
Andy Polyakov
5d7324e42d
Typo in sparcv8cap.c.
2005-12-18 19:13:03 +00:00
Andy Polyakov
be7b4458f2
Keep disclaiming 16-bit platform support. For now remove WIN16 references
...
from .h files...
2005-12-18 19:11:37 +00:00
Andy Polyakov
7304956e39
Missing CFLAG in couple of depend: targets.
...
PR: 1247
Submitted by: Doug Kaufman
2005-12-18 19:00:54 +00:00
Andy Polyakov
c510eec090
Put back OPENSSL_SYS_MSDOS definition to revive DJGPP built.
...
PR: 1247
2005-12-18 18:55:55 +00:00
Andy Polyakov
1b167a4343
Make bio.h resistant to gnu-ish __attribute__ redefenitions.
...
PR: 1252
2005-12-16 21:21:41 +00:00
Andy Polyakov
9ab5170197
Fix typos in osf1 shared rules.
...
PR: 1248
Submitted by: Nikola Milutinovic
2005-12-16 20:51:03 +00:00
Andy Polyakov
a00e414faf
Unify sparcv9 assembler naming and build rules among 32- and 64-bit builds.
...
Engage run-time switch between bn_mul_mont_fpu and bn_mul_mont_int.
2005-12-16 17:39:57 +00:00
Andy Polyakov
4c5e19b6c6
Make framework for Whirlpool assembler flexible.
2005-12-16 13:23:57 +00:00
Andy Polyakov
ed26604a71
Engage Whirlpool assembler and mention Whirlpool in CHANGES.
2005-12-16 12:55:33 +00:00
Andy Polyakov
0fbd4bf044
Make room for Whirlpool assembler in Configure.
2005-12-16 11:53:31 +00:00
Andy Polyakov
d719e60cb4
Allow for warning-free passing of -Wl options on config command line. One
...
possible usage is to pass -Wl,-z,-noexecstack on Linux to ensure the stack
is marked non-executable. Well, -Wa,--noexecstack works fine too...
2005-12-16 11:29:19 +00:00
Andy Polyakov
0cb9d93d0c
Mention bn(64,64) to bn(64,32) switch on 64-bit SPARCv9 targets in CHANGES.
2005-12-16 11:12:42 +00:00
Andy Polyakov
f5826b8014
We all make typos:-) Fix just introduced ones in bn.h
2005-12-16 10:43:33 +00:00
Andy Polyakov
4a47f55639
Eliminate warning induced by http://cvs.openssl.org/chngview?cn=14690 and
...
keep disclaiming narrower than 32-bit support.
2005-12-16 10:37:24 +00:00
Andy Polyakov
b884556ed8
To exclude contention for shared FPU on T1, trade 3% of DES performance.
2005-12-15 22:55:16 +00:00
Andy Polyakov
c06b0f3d5e
sparccpuid module update.
2005-12-15 22:50:36 +00:00
Andy Polyakov
68ea60683a
Add IALU-only bn_mul_mont for SPARCv9. See commentary section for details.
2005-12-15 22:43:33 +00:00
Andy Polyakov
6df8c74d5b
Switch 64-bit sparcv9 platforms from bn(64,64) to bn(64,32). This doesn't
...
have impact on performance, because amount of multiplications does not
increase with this switch, not on sparcv9 that is. On the contrary, it
actually improves performance, because it spares a load of instructions
used to chase carries. Not to mention that BN assembler modules can be
shared more freely between 32- and 64-bit builts.
2005-12-15 22:40:58 +00:00
Andy Polyakov
877e8e970c
Allow for bn(64,32) on LP64 platforms.
2005-12-15 22:31:16 +00:00
Bodo Möller
d56349a2aa
update TLS-ECC code
...
Submitted by: Douglas Stebila
2005-12-13 07:33:35 +00:00
Bodo Möller
67c03ff185
comment
2005-12-13 05:46:33 +00:00
Andy Polyakov
35e00cc2d8
Minor aes-sparcv9.pl optimization.
2005-12-10 12:32:22 +00:00
Andy Polyakov
064f6cb6f2
Engage AES for UltraSPARC in sparcv9 targets.
2005-12-10 11:24:07 +00:00
Andy Polyakov
20ab8b4b41
Revoke the option to share AES S-boxes between C and assembler. It wastes
...
space, but gives total flexibility [back].
2005-12-10 11:22:57 +00:00
Andy Polyakov
7395d852c3
Initial draft for AES for UltraSPARC assembler.
2005-12-10 11:19:56 +00:00
Andy Polyakov
3ebf898e88
Support for indirect calls in x86 assembler modules.
2005-12-06 18:43:59 +00:00
Dr. Stephen Henson
a4c886e4c8
Add cpuid code to VC++ build.
2005-12-06 16:35:40 +00:00
Dr. Stephen Henson
1291dfdead
Don't include zlib header dir if it is not defined.
2005-12-06 13:36:59 +00:00
Andy Polyakov
df278aff3e
Fix typos in wp-mmx.pl.
2005-12-06 09:34:09 +00:00
Dr. Stephen Henson
7c510d6f43
Initial attempt at Whirlpool assembler support on VC++.
2005-12-06 02:04:58 +00:00
Dr. Stephen Henson
7bbcb2f690
Avoid warnings on VC++ 2005.
2005-12-05 17:21:22 +00:00
Dr. Stephen Henson
ad2695b1b7
Update from 0.9.8-stable.
2005-12-05 13:46:46 +00:00
Dr. Stephen Henson
9cbf062a70
Update from stable branch.
2005-12-05 00:53:36 +00:00
Dr. Stephen Henson
ec645d9017
Make mk1mf.pl and friends recognize Whirlpool.
2005-12-05 00:53:10 +00:00
Dr. Stephen Henson
0d894c9dbe
Make ZLIB without ZLIB_SHARED compiled again.
2005-12-03 17:42:11 +00:00
Andy Polyakov
c6709b89c4
Couple other benchmark comparisons for wp-x86_64.pl.
2005-12-03 11:59:25 +00:00
Andy Polyakov
061bebc0d8
x86cpuid.pl update.
2005-12-03 11:56:55 +00:00
Dr. Stephen Henson
802e1d692b
Oops...
2005-12-02 14:06:35 +00:00
Dr. Stephen Henson
dbf33b344c
Update ordinals and include changes from 0.9.8.
2005-12-02 13:59:00 +00:00
Dr. Stephen Henson
b40228a61d
New functions to support opaque EVP_CIPHER_CTX handling.
2005-12-02 13:46:39 +00:00
Dr. Stephen Henson
da5a0e8722
Add error checking to avoid crashing when zlib cannot be loaded.
2005-12-02 13:27:19 +00:00
Dr. Stephen Henson
200fc02848
Include EVP_whirlpool() prototype in evp.h
2005-12-02 13:25:52 +00:00
Richard Levitte
7096217d39
wq instead of wp? That's gotta be among the more amazing typos I've
...
made...
2005-12-02 09:30:25 +00:00
Richard Levitte
f1eb83a013
Whirlpool was added to EVP, so let's build it on VMS as well.
2005-12-01 03:06:10 +00:00
Andy Polyakov
fec82dbc86
Whirlpool for x86_64.
2005-11-30 21:03:36 +00:00
Andy Polyakov
7b1b47a8e6
Mention Whirlpool in dgst -help.
2005-11-30 20:58:41 +00:00
Andy Polyakov
8b9afce53a
Add Whirlpool to EVP.
2005-11-30 20:57:23 +00:00
Andy Polyakov
137db78b46
Adapt Whirlpool API for EVP.
2005-11-30 20:53:14 +00:00
Andy Polyakov
a3344c8e5e
Fix typos in wp-mmx.pl.
2005-11-30 20:52:27 +00:00
Dr. Stephen Henson
c173d09c56
Typo
2005-11-30 19:25:55 +00:00
Dr. Stephen Henson
cb49a3cfa1
Make CA.pl script use CA extensions when creating a root CA.
2005-11-30 18:31:36 +00:00
Richard Levitte
adab80053d
Build Whirlpool on VMS as well
2005-11-29 12:46:17 +00:00
Andy Polyakov
f106fb85d4
Add Whirlpool OID.
2005-11-28 20:51:46 +00:00
Andy Polyakov
5fa6d850a2
Remove development leftover from whrlpool/asm/wp-mmx.pl.
2005-11-28 20:29:01 +00:00
Andy Polyakov
4adfe93cc5
Add missing Makefile and fix couple of typos in commentary.
2005-11-28 20:16:56 +00:00
Andy Polyakov
d1593e6b15
Whirlpool hash implementation. The fact that subdirectory and .h file are
...
called whrlpool is not a typo, but a way to keep the names shorter than
8 characters. Remaining TODO list comprises adding OID, EVP, corresponding
flag to apps/openssl dgst, benchmark, engage assembler...
2005-11-28 20:09:58 +00:00
Richard Levitte
a53cb070e3
When using POSIXly functions, we need to define _POSIX_C_SOURCE, at
...
least when the source is compiled with ANSI settings.
2005-11-27 15:32:57 +00:00
Dr. Stephen Henson
452ae49db5
Extensive OID code enhancement and fixes.
2005-11-20 13:07:47 +00:00
Richard Levitte
8c5c5b6517
Synchronise with the Unix build.
2005-11-19 07:57:53 +00:00
Bodo Möller
6f44d4d247
deFUDify: don't require OPENSSL_EC_BIN_PT_COMP
2005-11-16 04:07:43 +00:00
Bodo Möller
d804f86b88
disable some invalid ciphersuites
2005-11-15 23:32:11 +00:00
Bodo Möller
8dee9f844f
deFUDify: don't require OPENSSL_EC_BIN_PT_COMP
2005-11-15 21:08:38 +00:00
Andy Polyakov
963ba10012
Keep shutting up VC8.
...
PR: 1243
2005-11-15 08:07:25 +00:00
Andy Polyakov
07645deeb8
Apply "better safe than sorry" approach after addressing sporadic SEGV in
...
bn_sub_words to the rest of the sparcv8plus.S.
2005-11-15 08:02:10 +00:00
Andy Polyakov
c52c82ffc1
Attempt to resolve sporadic SEGV crashes in bn_sub_words in OpenSSH. I'm
...
baffled why it crashes and does it sporadically...
2005-11-11 20:07:07 +00:00
Dr. Stephen Henson
d6a03a23a8
Update from stable branch.
2005-11-11 13:00:07 +00:00
Andy Polyakov
e347b0da2b
Throw in comment so that one doesn't get tempted to optimize it away.
2005-11-09 20:46:37 +00:00
Andy Polyakov
52b1fbbd99
Avoid end-less loop when libcrypto.a is manually deleted, but 'make clean'
...
was not executed. It doesn't excuse user from running 'make clean', it
simply avoids process table exhaustion.
PR: 1236
Submitted by: Michael Richardson
2005-11-09 20:41:21 +00:00
Andy Polyakov
65613f23ba
Mention PROBLEMS in FAQ.
2005-11-09 19:43:40 +00:00
Andy Polyakov
4f92a764f1
AIX -blibpath is not accumulative, one apparently has to specify even
...
self-obvious /usr/lib:/lib.
PR: 1239
2005-11-09 17:27:19 +00:00
Andy Polyakov
6a3a7f3076
Minor perlasm clean-up.
2005-11-09 17:20:26 +00:00
Andy Polyakov
63d3a9c5ea
Tidying up WinCE support.
2005-11-09 17:19:38 +00:00
Andy Polyakov
2c730f6fc2
Improve cross-compiler portability of applink.c module and mention
...
CRYPTO_malloc_init in FAQ.
2005-11-09 17:11:03 +00:00
Dr. Stephen Henson
df8dae1df4
Update docs.
2005-11-07 00:35:22 +00:00
Dr. Stephen Henson
2e9f1bf0e1
Update from stable branch.
2005-11-07 00:10:36 +00:00
Andy Polyakov
b1e0ccbaa8
One of Win64 rules lacked bufferoverflowu.lib.
2005-11-06 22:41:13 +00:00
Andy Polyakov
bd2abcae37
Move declaration for optional bn_mul_mont to bn_lcl.h in order to hide
...
it from mkdef.pl.
2005-11-06 22:10:38 +00:00
Andy Polyakov
f1fbd4c7d1
Address MASM-specific problems introduced with
...
http://cvs.openssl.org/chngview?cn=14547 .
2005-11-06 22:01:27 +00:00
Andy Polyakov
eed22ac4ac
Eliminate VC compiler warning.
2005-11-06 21:11:41 +00:00
Andy Polyakov
176a614899
First draft for WCE PortSDK support. Once again! It's *draft* which requires
...
more work, i.e. more modifications are due...
2005-11-06 20:52:26 +00:00
Dr. Stephen Henson
f858d222f2
Make DLL engines the default in 0.9.9 and VC++.
2005-11-06 20:51:49 +00:00
Dr. Stephen Henson
16094305bc
Add symbols for ASN1 print functions, update ordinal file.
2005-11-06 20:33:33 +00:00
Dr. Stephen Henson
fbf002bb88
Update from stable branch.
2005-11-06 17:58:26 +00:00
Andy Polyakov
9135fddb0e
Revive app_tminterval for Netware.
2005-11-06 17:11:04 +00:00
Andy Polyakov
d88fcf73f1
Revive app_tminterval for vxworks.
2005-11-06 16:55:44 +00:00
Andy Polyakov
a950f28762
Revive app_tminterval for VMS.
2005-11-06 16:16:38 +00:00
Andy Polyakov
c629204688
Keep removing references to tmdiff.
2005-11-06 12:53:28 +00:00
Andy Polyakov
e22f63f231
The typos never stop. Fix one in apps/apps.c.
2005-11-06 12:15:12 +00:00
Andy Polyakov
d256b95768
x86_64-xlate.pl commentary section update.
2005-11-06 11:59:39 +00:00
Andy Polyakov
f530138876
Fix newly introduced typos and warnings in ./apps.
2005-11-06 11:58:22 +00:00
Andy Polyakov
0a39d8f207
Collect timing procedures in apps/apps.c. It's a bit cruel patch, as it
...
temporarily[!] removes support for couple of esoteric platforms [well,
Netware, vxWorks and VMS].
2005-11-06 11:40:59 +00:00
Andy Polyakov
6852d1d8c3
Eliminate crypto/tmdiff.[ch].
2005-11-06 11:38:18 +00:00
Andy Polyakov
a1ad253f17
Eliminate remaining calls to stat in apps/apps.c and unify WIN32_rename for
...
all Windows targets.
2005-11-04 16:12:05 +00:00
Andy Polyakov
ffa101872f
Eliminate dependency on read/write/stat in apps under _WIN32.
2005-11-04 09:30:55 +00:00
Andy Polyakov
4d24b4c466
Engage OPENSSL_NO_POSIX_IO on Windows CE.
2005-11-03 16:50:03 +00:00
Andy Polyakov
474b8a9716
Make cygwin work in directories mounted with 'text' attribute.
2005-11-03 16:43:53 +00:00
Andy Polyakov
53261831f1
Get rid of arcane reference to _fmode in apps/apps.h. Binary open is
...
handles properly by bss_file.c, which renders _fmode redundant.
2005-11-03 16:42:57 +00:00
Andy Polyakov
49e3c9d8e6
Mask libcrypto references to stat with OPENSSL_NO_POSIX_IO.
2005-11-03 16:22:40 +00:00
Andy Polyakov
1715e4885a
Reserve for OPENSSL_NO_POSIX_IO macro which is to eliminate references
...
to open/read/write/close. First OPENSSL_NO_POSIX_IO target would be
Windows CE.
2005-11-03 15:50:50 +00:00
Andy Polyakov
eff7cb41d1
Disable BIO_s_fd on CE and disable fd:N as password passing option on
...
all _WIN32 [see commentary for clarification].
2005-11-03 15:31:28 +00:00
Andy Polyakov
7a6f825f0f
Make pshufw optional and update performance table in sha512-sse2.pl
...
[as per http://cvs.openssl.org/chngview?cn=14551 ].
2005-11-03 15:23:11 +00:00
Nils Larsch
29afd31dd1
fix typo, pointed out by Patrick Guio
2005-11-02 22:19:32 +00:00
Nils Larsch
d86b0f1f5f
compile sstrsep only if HAVE_FORK is defined; patch supplied by Johan Gill <johane@lysator.liu.se>
2005-11-02 22:13:43 +00:00
Richard Levitte
998ac55e19
Document it
2005-11-01 07:53:37 +00:00
Richard Levitte
d6f25d70f1
Fix numerous bugs in the Win32 path splitter
2005-11-01 07:49:45 +00:00
Richard Levitte
b02da8eb50
A slight change in documentation that makes it so much more comprehensible
2005-11-01 04:56:25 +00:00
Dr. Stephen Henson
2f52a41054
Include kerberos libraries (if used) when linking test apps: some need it.
2005-10-29 12:51:43 +00:00
Andy Polyakov
99c675b2f7
Add -install_name in link_a.darwin rule.
...
PR: 1218
2005-10-28 08:10:47 +00:00
Bodo Möller
72dce7685e
Add fixes for CAN-2005-2969.
...
(This were in 0.9.7-stable and 0.9.8-stable, but not in HEAD so far.)
2005-10-26 19:40:45 +00:00
Bodo Möller
ee8836c442
fix stupid typo
2005-10-26 19:30:10 +00:00
Bodo Möller
a1006c373d
harmonize with 0.9.7-stable and 0.9.8-stable variants of CHANGES
2005-10-26 19:28:04 +00:00
Andy Polyakov
755c5b3330
Fix install problems on MacOS X and HP-UX.
...
PR: 1218,1185
2005-10-25 21:58:59 +00:00
Andy Polyakov
ce6aa1e496
+20% SHA512 performance improvement on x86.
2005-10-25 17:08:55 +00:00
Andy Polyakov
6c1fc273f3
Eliminate false preprocessor dependencies introduced with VOS support.
2005-10-25 15:55:06 +00:00
Andy Polyakov
aa8b03b415
Fix typos in macos x targets.
2005-10-25 15:51:00 +00:00
Andy Polyakov
96ec4abd07
Eliminate ~3.5KB of duplicate code in des-586.pl and reserve for folded
...
loop option, which can give further 3KB code reduction.
2005-10-25 15:47:09 +00:00
Andy Polyakov
70532b7d6b
Move DES_SPtrans to where it really belongs, dec_enc to be specific.
2005-10-25 15:43:18 +00:00
Andy Polyakov
a4d729f31d
Clarify binary compatibility with HAL/Fujitsu SPARC64 family.
2005-10-25 15:39:47 +00:00
Andy Polyakov
fcbc5a3fdd
Integrate sparcv9a-mont.pl into UltraSPARC builds.
2005-10-22 20:21:41 +00:00
Andy Polyakov
8c0ceb17a2
bn_asm.c update.
2005-10-22 20:20:06 +00:00
Andy Polyakov
c2012f9b82
Eliminate gcc warning in bn_mont.c.
2005-10-22 20:17:01 +00:00
Andy Polyakov
aa2be094ae
Add support for 32-bit ABI to sparcv9a-mont.pl module.
2005-10-22 18:16:09 +00:00
Andy Polyakov
4d524040bc
Change bn_mul_mont declaration and BN_MONT_CTX. Update CHANGES.
2005-10-22 17:57:18 +00:00
Andy Polyakov
0fe120ba25
Add rudimentary aix64-gcc target.
...
Submitted by: Stefan Neis
2005-10-19 18:46:20 +00:00
Andy Polyakov
2e7aa150f7
util/pl/OS2-EMX.pl sync.
...
Submitted by: Stefan Neis, Brian Havard
2005-10-19 18:37:36 +00:00
Mark J. Cox
04fac37311
one time CAN->CVE update
2005-10-19 11:00:39 +00:00
Andy Polyakov
bcb43bb358
Yet another "teaser" Montgomery multiply module, for UltraSPARC. It's not
...
integrated yet, but it's tested and benchmarked [see commentary section
for further details].
2005-10-19 07:12:06 +00:00
Richard Levitte
89ec4332ec
Add in CHANGES for 0.9.7i.
2005-10-15 04:26:57 +00:00
Andy Polyakov
34736de4c0
Flip saved argument block and tp [required for non-SSE2 path].
2005-10-14 16:05:21 +00:00
Andy Polyakov
5f50d597f2
Make sure x86-mont.pl returns zero even if compiled with no-sse2.
2005-10-14 15:24:06 +00:00
Andy Polyakov
df94f187b9
Fix bug in SMALL_FOOTPRINT path and clarify comment.
2005-10-14 15:22:27 +00:00
Andy Polyakov
b92c0df834
Broaden compatibility amount Win32 headers even further [some don't have
...
SIZE_T].
2005-10-13 19:06:43 +00:00
Mark J. Cox
d357be38b9
Make sure head CHANGES is up to date, we refer to this in announce.txt
2005-10-11 11:10:19 +00:00
Richard Levitte
912e296070
Renumber to follow what happens with 0.9.8.
2005-10-11 10:14:44 +00:00
Andy Polyakov
35593b33f4
Add timestamp to x86-mont.pl.
2005-10-09 10:26:56 +00:00
Andy Polyakov
54f3d200d3
Throw in bn/asm/x86-mont.pl Montgomery multiplication "teaser".
2005-10-09 09:53:58 +00:00
Dr. Stephen Henson
3f67e11fab
Add PVK support to dsa utility.
2005-10-08 17:32:07 +00:00
Dr. Stephen Henson
c1de1a190d
Avoid warning on Win32.
2005-10-08 17:31:18 +00:00
Dr. Stephen Henson
566dda07ba
New option SSL_OP_NO_COMP to disable compression. New ctrls to set
...
maximum send fragment size. Allocate I/O buffers accordingly.
2005-10-08 00:18:53 +00:00
Andy Polyakov
7a2f4cbfe8
x86_64-mont.pl readability improvement.
2005-10-07 15:18:16 +00:00
Andy Polyakov
5ac7bde7c9
Throw in Montgomery multiplication assembler for x86_64.
2005-10-07 14:18:06 +00:00
Andy Polyakov
9b4eab501a
Refine logic in bn_mont.c and eliminate redundant BN_CTX pulls.
2005-10-06 13:12:28 +00:00
Andy Polyakov
ca04d7a208
Leave the decision to call/implement bn_sqr_mont to assembler developer.
2005-10-06 09:12:39 +00:00
Dr. Stephen Henson
40a3c12305
Initialize bignum constants using BN_bin2bn() instead of BN_hex2bn(). This
...
saves a bit of space and avoids a compiler warning about string length.
2005-10-05 17:51:43 +00:00
Andy Polyakov
3001a770ed
Mention "no-dso doesn't remove -ldl" in PROBLEMS.
...
PR: 1160
2005-10-04 06:30:52 +00:00
Andy Polyakov
2608383c5e
Fix typo in INSTALL.WCE.
2005-10-04 06:26:09 +00:00
Andy Polyakov
3d6312e807
Zap DES_UNROLL when SMALL_FOOTPRINT is in effect.
2005-10-04 06:25:39 +00:00
Andy Polyakov
22cd982566
Fix typo in exptest.c.
2005-10-04 06:23:15 +00:00
Andy Polyakov
682b112abc
Reserve for SMALL_FOOTPRINT bn_asm.c. Currently OPENSSL_SMALL_FOOTPRINT
...
is defined on Windows CE targets.
2005-10-04 06:22:11 +00:00
Andy Polyakov
e738280547
Add reference implementation for bn_[mul|sqr]_mont, new candidates for
...
assembler implementation.
2005-10-04 06:19:29 +00:00
Dr. Stephen Henson
8265328def
Oops :-)
2005-10-02 12:41:11 +00:00
Dr. Stephen Henson
231b98a5e1
Make OPENSSL_NO_COMP work under Win32.
2005-10-02 12:28:40 +00:00
Bodo Möller
13e4670c29
new option "openssl ciphers -V"
2005-10-01 04:08:48 +00:00
Dr. Stephen Henson
d08b6b44ba
Fix compilation without OPENSSL_NO_COMP :-)
2005-10-01 00:40:34 +00:00
Dr. Stephen Henson
09b6c2ef15
Make OPENSSL_NO_COMP compile again.
2005-09-30 23:35:33 +00:00
Nils Larsch
cc29c1204b
successfully updating the db shouldn't result in an error message
2005-09-30 16:47:38 +00:00
Andy Polyakov
94c00f3d4d
Fix typo.
2005-09-29 20:16:04 +00:00
Andy Polyakov
3c2b73672e
Fix missing applink call.
2005-09-29 16:56:21 +00:00
Richard Levitte
23acb0eeb2
Change a comment so it corresponds to reality. Put back a character that
...
was previously replaced with a NUL for parsing purposes. This seems to
fix a very weird parsing bug involving two variable references in the same
value.
2005-09-28 18:02:41 +00:00
Dr. Stephen Henson
bfa4b8c5ab
Update from stable branch.
2005-09-26 11:18:04 +00:00
Nils Larsch
ce75ca04b1
protect BN_BLINDING_invert with a write lock and BN_BLINDING_convert
...
with a read lock
Submitted by: Leandro Santi <lesanti@fiuba7504.com.ar >
2005-09-22 23:37:37 +00:00
Andy Polyakov
9dba0554a5
Fix SunOS 4 building issue.
...
PR: 1196
2005-09-22 20:37:50 +00:00
Andy Polyakov
59947880f4
Broaden compatibility among Windows SDK versions. Elder versions don't have
...
ULONG_PTR, so we replace it with equally wide SIZE_T.
2005-09-22 20:28:30 +00:00
Dr. Stephen Henson
61094cf3dc
128 bit AES ciphersuites should be classified as HIGH.
2005-09-21 00:55:42 +00:00
Andy Polyakov
6d00101e9d
Latest MSVCR80 doesn't tolerate unsupported signal numbers, throwing
...
fatal exceptions.
2005-09-20 20:30:15 +00:00
Andy Polyakov
7a06050cd3
"Overload" SunOS 4.x memcmp, which ruins ASN1_OBJECT table lookups.
...
PR: 1196
Submitted by: Russel Ruby
2005-09-20 20:19:07 +00:00
Andy Polyakov
6f9afa68cd
IA-32 BN tune-up. Performance imrpovement varies with platform and
...
keylength, this time larger improvement for shorter keys, and reaches
15%. Both SSE2 and IALU code pathes are improved.
2005-09-20 12:26:54 +00:00
Andy Polyakov
c038b90619
Fix typo: "powepc" vs "powerpc." G-r-r-r-r.
...
PR: 1198
2005-09-20 12:15:31 +00:00
Andy Polyakov
9c4fe78260
MD5 x86_64 assembler update.
...
Submitted by: Marc Bevand and Charles Liu
2005-09-20 07:56:03 +00:00
Andy Polyakov
60dd08573d
Refine AIX support.
...
PR: 1198
2005-09-20 07:43:27 +00:00
Andy Polyakov
f5204c61fb
BC-32.pl updates.
...
Submitted by: Old Wolf, Jon Bright
2005-09-20 07:05:32 +00:00
Andy Polyakov
9ddeefe39d
Proper solution to nasm compilation problems in Borland context.
2005-09-20 06:13:06 +00:00
Andy Polyakov
0293371a1b
Mention BN_sqr failure on x86 platforms in ./RPOBLEMS.
...
PR: 1176 [and others]
2005-09-19 14:57:44 +00:00
Andy Polyakov
dd31c6fcb0
Another missing space in VC-32.pl [from 0.9.8].
2005-09-19 14:44:17 +00:00
Andy Polyakov
6708df7bf0
Missing space in VC-32.pl.
2005-09-19 14:42:09 +00:00
Andy Polyakov
6d9c46b811
Oops-type typo.
...
PR: 1195
2005-09-19 13:12:00 +00:00
Andy Polyakov
af2c2823a7
bswapl usage should be masked by I386_ONLY.
...
PR: 1195
2005-09-19 13:06:46 +00:00
Nils Larsch
b17ecb642b
cleanup doxygen comments
2005-09-19 08:32:56 +00:00
Nils Larsch
ba12070f7e
add some doxygen comments
2005-09-19 08:10:10 +00:00
Dr. Stephen Henson
29b9763d9f
Change openssl.cnf to use UTF8Strings by default and not always include issuer
...
and serial versions of AKID.
2005-09-16 11:58:28 +00:00
Dr. Stephen Henson
270da80bfa
Fix for Win32.
2005-09-16 11:45:55 +00:00
Nils Larsch
701d35d12f
fix typos
...
PR: 1201
2005-09-15 19:00:55 +00:00
Bodo Möller
2238e8e477
correct+extend publication info
2005-09-12 01:39:46 +00:00
Nils Larsch
4b08da5538
bugfix: register engine as default engine in ENGINE_set_default_DSA
...
Submitted by: Jonathon Green
2005-09-09 07:50:09 +00:00
Richard Levitte
8a616a5a5f
Remove warnings about signed vs. unsigned...
2005-09-05 07:04:40 +00:00
Richard Levitte
9455d430cb
Synchronise VMS build with Unixly build.
2005-09-05 04:20:26 +00:00
Nils Larsch
137023dd0c
fix function name in error
2005-09-03 08:01:08 +00:00
Dr. Stephen Henson
2a45408c4a
Update print macro properly this time...
2005-09-03 00:49:26 +00:00
Dr. Stephen Henson
9e201014f8
Update ASN1 print implement macro.
2005-09-03 00:48:13 +00:00
Dr. Stephen Henson
0c072a0b46
Update asn1t.h too for ASN1 print.
2005-09-03 00:44:08 +00:00
Dr. Stephen Henson
c11c64fbe0
Update to ASN1 printing code.
2005-09-03 00:40:40 +00:00
Dr. Stephen Henson
f022c177db
Two new verify flags functions.
2005-09-02 22:49:54 +00:00
Nils Larsch
5f10073c95
fix typo in sbgp names
...
PR: 1194
2005-09-02 21:23:25 +00:00
Nils Larsch
33ac8b3139
don't try to load cert/key when the "-nocert" option is set
2005-09-02 12:44:59 +00:00
Dr. Stephen Henson
244847591f
Extend callback function to support print customization.
2005-09-01 20:42:52 +00:00
Dr. Stephen Henson
5abe32d861
Return 2 from X509_NAME printing routine to add newline.
2005-09-01 18:02:51 +00:00
Dr. Stephen Henson
9194296de8
Update ASN1 printing code and add a -print option to 'pkcs7' utility for
...
initial testing.
2005-09-01 18:00:56 +00:00
Richard Levitte
6273a91cb7
Synchronise with Unixly build.
2005-09-01 14:24:43 +00:00
Dr. Stephen Henson
1ef7acfe92
Initial support for ASN1 print code.
...
WARNING WARNING WARNING, experimental code, handle with care, use at
your own risk, may contain nuts.
2005-09-01 13:59:16 +00:00
Dr. Stephen Henson
a0156a926f
Integrated support for PVK files.
2005-08-31 16:37:54 +00:00
Richard Levitte
96998822b5
Last synchronisationn with Unixly build. I hope...
2005-08-30 06:00:32 +00:00
Nils Larsch
8215e7a938
fix warnings when building openssl with the following compiler options:
...
-Wmissing-prototypes -Wcomment -Wformat -Wimplicit -Wmain -Wmultichar
-Wswitch -Wshadow -Wtrigraphs -Werror -Wchar-subscripts
-Wstrict-prototypes -Wreturn-type -Wpointer-arith -W -Wunused
-Wno-unused-parameter -Wuninitialized
2005-08-28 22:49:57 +00:00
Richard Levitte
f7622f86d9
More synchronisation with the Unixly build.
2005-08-28 11:28:48 +00:00
Ben Laurie
337e368239
Fix warnings.
2005-08-27 12:10:34 +00:00
Richard Levitte
64b6840d8d
Synchronise with Unix changes.
2005-08-27 04:31:57 +00:00
Nils Larsch
6e119bb02e
Keep cipher lists sorted in the source instead of sorting them at
...
runtime, thus removing the need for a lock. Add a test to ssltest
to verify that the cipher lists are sorted.
2005-08-25 07:29:54 +00:00
Ben Laurie
2c2e46dbf5
Generate primes, too.
2005-08-23 13:48:17 +00:00
Bodo Möller
770bc596e1
recent DH change does not avoid *all* possible small-subgroup attacks;
...
let's be clear about that
2005-08-23 06:54:33 +00:00
Bodo Möller
7534d131d6
avoid potential spurious BN_free()
...
Submitted by: David Heine <dlheine@suif.Stanford.EDU >
2005-08-23 04:14:40 +00:00
Nils Larsch
7f3c9036ea
initialize cipher/digest methods table in SSL_library_init() and hence remove the need for a lock
2005-08-21 23:06:23 +00:00
Nils Larsch
725111f7cb
add missing file
2005-08-21 23:02:05 +00:00
Ben Laurie
bf3d6c0c9b
Make D-H safer, include well-known primes.
2005-08-21 16:00:17 +00:00
Ben Laurie
b8e8ccdc79
Fix warning.
2005-08-21 15:59:10 +00:00
Dr. Stephen Henson
6b80c20bdb
Use correct date and filename.
2005-08-21 12:25:52 +00:00
Dr. Stephen Henson
eea374fd19
Command line support for RSAPublicKey format.
2005-08-21 00:18:26 +00:00
Dr. Stephen Henson
2e8879fa6e
Delete old ASN1_METHOD files.
2005-08-20 19:48:58 +00:00
Dr. Stephen Henson
f5a07779dd
Add file which includes new ASN1 NETSCAPE format for certificates.
2005-08-20 19:46:52 +00:00
Dr. Stephen Henson
c51f2d4238
Update from stable branch.
2005-08-20 19:34:49 +00:00
Dr. Stephen Henson
45e2738585
Remove ASN1_METHOD code replace with new ASN1 alternative.
2005-08-20 18:12:45 +00:00
Dr. Stephen Henson
b173acfc96
New version of ASN1 print code, still not compiled in though.
2005-08-20 00:08:29 +00:00
Nils Larsch
4ebb342fcd
Let the TLSv1_method() etc. functions return a const SSL_METHOD
...
pointer and make the SSL_METHOD parameter in SSL_CTX_new,
SSL_CTX_set_ssl_version and SSL_set_ssl_method const.
2005-08-14 21:48:33 +00:00
Andy Polyakov
8e5ef8538a
Eliminate reference to removed platform line.
2005-08-11 09:38:59 +00:00
Andy Polyakov
ff82bf3b07
Pedantic polish to WCE-specific #if clause in ectest.c
2005-08-11 08:42:46 +00:00
Andy Polyakov
5147c3c914
Fix typo in WCE section in VC-32.pl
2005-08-11 08:18:42 +00:00
Andy Polyakov
fbbbffc5a8
Mention wcecompat update INSTALL.WCE.
2005-08-10 08:39:10 +00:00
Andy Polyakov
7cfe2a5e65
Fix Intel assembler warnings.
2005-08-10 08:28:36 +00:00
Andy Polyakov
df2a346b30
Suppress "deprecated" warnings introduced in VC8.
2005-08-09 22:44:54 +00:00
Andy Polyakov
270512ab12
Add support for more recent WCE SDK.
2005-08-09 22:19:35 +00:00
Nils Larsch
eba63ef58b
a ssl object needs it's own instance of a ecdh key; remove obsolete comment
2005-08-08 20:02:18 +00:00
Nils Larsch
01a9792f05
remove unused internal foo_base_method functions
2005-08-08 19:04:37 +00:00
Andy Polyakov
0491e05833
Final(?) WinCE update.
2005-08-07 22:21:49 +00:00
Nils Larsch
9a1a5b8785
avoid infinite recursion if dynamic engine isn't loaded
...
Submitted by: Jonathon Green <jonathon_au@yahoo.com >
2005-08-06 10:46:19 +00:00
Dr. Stephen Henson
f3b656b246
Initialize SSL_METHOD structures at compile time. This removes the need
...
for locking code. The CRYPTO_LOCK_SSL_METHOD lock is now no longer used.
2005-08-05 23:56:11 +00:00
Nils Larsch
53b38d37a9
fix potential memory leak + improved error checking
...
PR: 1182
2005-08-05 09:42:45 +00:00
Dr. Stephen Henson
8f2e4fdf86
Allow PKCS7_decrypt() to work if no cert supplied.
2005-08-04 22:15:22 +00:00
Andy Polyakov
11de71b04c
3-4 times better RSA/DSA performance on WIN64A target. Well, on AMD64 CPU,
...
EMT64T will hardly exhibit better performance...
2005-08-04 17:35:42 +00:00
Andy Polyakov
19bd66fe74
WCE update, mostly typos.
2005-08-03 19:56:36 +00:00
Andy Polyakov
45771abbd6
PIC-ify SPARC assembler in alternative manner to eliminate dependency on
...
OPENSSL_PIC macro.
2005-08-03 10:42:21 +00:00
Andy Polyakov
573969cd53
Abstain from GUI calls in rand_win.c in NT service context.
2005-08-02 22:09:14 +00:00
Andy Polyakov
34be0bb1a5
WCE-specific update for VC-32.pl.
2005-08-02 22:08:03 +00:00
Andy Polyakov
2031eca588
WCE-specific fix for cryptlib.c.
2005-08-02 22:07:28 +00:00
Andy Polyakov
6321c3a034
Keep disclaiming 16-bit support.
2005-08-02 22:04:11 +00:00
Andy Polyakov
1fda6c4f8c
Optimize for space on embedded WCE.
2005-08-02 14:09:44 +00:00
Andy Polyakov
11a4e58fc1
Stick to -DWCE_PLATFORM_$wceplatf, as that's what is apparently set by
...
Visual Studio IDE.
2005-08-02 12:21:18 +00:00
Andy Polyakov
8a35fb3bea
Eliminate bogus #if WCEPLATFORM!=MS_HPC_PRO [which by the way unconditionally
...
invalidated the whole clause] and replace it with #if _WIN32_WCE>=210.
2005-08-02 11:58:39 +00:00
Andy Polyakov
e85d67af9f
Type in OSF1 platform name.
2005-08-02 10:56:10 +00:00
Andy Polyakov
b37fb16dcb
Implement complementary LoadLibraryA shim under WCE.
2005-08-02 10:55:43 +00:00
Andy Polyakov
1e1c5047f2
Eliminate dependency on 3rd party wcedefs.mak.
2005-07-30 19:43:56 +00:00
Andy Polyakov
b2be099d16
Fix #if _MSC_VER clause in aes_locl.h
2005-07-30 19:42:50 +00:00
Nils Larsch
28d8362934
add comment
2005-07-29 19:46:42 +00:00
Nils Larsch
01039d0bff
remove unused variable
2005-07-27 20:20:53 +00:00
Nils Larsch
c755c5fd8b
improved error checking and some fixes
...
PR: 1170
Submitted by: Yair Elharrar
Reviewed and edited by: Nils Larsch
2005-07-26 21:10:34 +00:00
Dr. Stephen Henson
5c8e9139d1
Handle case where it==NULL
2005-07-26 12:25:06 +00:00
Dr. Stephen Henson
56defd9a98
Update ASN1 printing code. Highly experimental, not working properly (neither
...
did the old code) and not compiled in yet...
2005-07-26 11:46:23 +00:00
Dr. Stephen Henson
8eb7217580
Add declaration for IDP ASN1 functions.
2005-07-26 11:43:11 +00:00
Richard Levitte
b2a9d36a7f
bytes_to_long_long isn't used anywhere any more, so let's remove it
...
entirely.
2005-07-26 05:10:50 +00:00
Richard Levitte
04f15edb91
I'm reversing this change, as it seems the error is somewhere else.
2005-07-26 04:53:21 +00:00
Geoff Thorpe
4e98a44593
Silence two more generated files.
2005-07-26 04:52:52 +00:00
Geoff Thorpe
1385ddbb14
add a .cvsignore
2005-07-26 04:50:36 +00:00
Geoff Thorpe
7f0c65703a
"make update"
2005-07-26 04:48:54 +00:00
Geoff Thorpe
3a6dec8a05
Change my debug build for amd64.
2005-07-26 04:47:50 +00:00
Geoff Thorpe
209b12814f
Fix compilation when HAVE_LONG_LONG isn't defined.
2005-07-26 04:43:31 +00:00
Geoff Thorpe
f920c5b590
Fix signed/unsigned warnings.
2005-07-26 04:25:05 +00:00
Geoff Thorpe
05fc7018f8
Fix PEDANTIC compilation, using the same trick as elsewhere.
2005-07-26 04:05:03 +00:00
Geoff Thorpe
a384002724
Fix 64-bit compilation when PQ_64BIT_IS_INTEGER isn't defined.
2005-07-26 04:01:50 +00:00
Nils Larsch
0260405c68
fix BN_mod_word and give a more reasonable return value if an error occurred
2005-07-25 22:57:54 +00:00
Dr. Stephen Henson
0537f9689c
Add support for setting IDP too.
2005-07-25 22:35:36 +00:00
Dr. Stephen Henson
0c010a1517
Don't use @syntax for extended CRLDP format.
2005-07-25 18:55:40 +00:00
Dr. Stephen Henson
0745d0892d
Allow setting of all fields in CRLDP. Few cosmetic changes to output.
2005-07-25 18:42:29 +00:00
Dr. Stephen Henson
5e64f8c44c
Typo which prevents mult valued RDNs being created.
2005-07-25 18:39:44 +00:00
Andy Polyakov
4a5b8a5bee
Commentary section update in sha512-x86_64.pl.
2005-07-25 13:29:42 +00:00
Andy Polyakov
b3836ed3cb
Unify VC-32.pl and VC-CE.pl scripts and update INSTALL.W32.
2005-07-24 21:48:04 +00:00
Andy Polyakov
47738cbad7
Pull up mkdef.pl from 0.9.8.
2005-07-24 21:45:45 +00:00
Andy Polyakov
0a882b6394
Eliminate gcc warning in dso_win32.c.
2005-07-24 21:45:08 +00:00
Andy Polyakov
612a91110f
Engage SHA-256/-512 x86_64 assembler module.
2005-07-24 12:30:26 +00:00
Andy Polyakov
2337eb5823
SHA-256/-512 x86_64 assembler module.
2005-07-24 12:28:04 +00:00
Dr. Stephen Henson
9aa9d70ddb
Print out previously unsupported fields in CRLDP by i2r instead of i2v.
...
Cosmetic changes to IDP printout.
2005-07-24 00:23:57 +00:00
Dr. Stephen Henson
231493c93c
Initial print only support for IDP CRL extension.
2005-07-23 23:33:06 +00:00
Geoff Thorpe
20a90e3a76
Fix some signed/unsigned warnings.
2005-07-22 03:36:30 +00:00
Nils Larsch
17a2994dbd
set correct bn->top value
2005-07-21 22:40:39 +00:00
Nils Larsch
b554eef43b
the final byte of a pkcs7 padded plaintext can never be 0
...
Submitted by: K S Sreeram <sreeram@tachyontech.net >
2005-07-20 22:03:36 +00:00
Andy Polyakov
0066590f98
Pedantic polish to aes-ia64 and sha512-ia64.
2005-07-20 15:15:22 +00:00
Andy Polyakov
165a28abae
Pedantic polish to md5-ia64.S.
2005-07-20 12:24:04 +00:00
Andy Polyakov
63999e5299
Syncronize BSD-ia64 with other IA64-based platforms.
2005-07-20 12:10:41 +00:00
Andy Polyakov
2802ec65c2
Pedantic polish to rc4-ia64.pl.
2005-07-20 11:47:47 +00:00
Andy Polyakov
b3f56e8b38
Typo in version number.
2005-07-20 11:11:14 +00:00
Andy Polyakov
5826e4f481
Perl stylistic/cosmetic update for aes-x86_64.pl.
2005-07-20 11:09:02 +00:00
Andy Polyakov
66ee67be03
Fix bug [SHA1 IA-64 being disabled] introduced with Stratus VOS update.
...
PR: 1130
2005-07-19 23:04:57 +00:00
Andy Polyakov
a7ad2afa5e
Engage MD5 assembler module.
2005-07-19 22:37:57 +00:00
Andy Polyakov
0f04379d9c
This update gets endianness-neutrality right and adds second required
...
entry point, md5_block_asm_data_order.
2005-07-19 22:33:03 +00:00
Andy Polyakov
7e4d335943
MD5 IA-64 assembler implementation. Original copy for reference purposes.
...
Submitted by: David Mosberger
Obtained from: http://www.hpl.hp.com/research/linux/crypto/
2005-07-19 22:27:02 +00:00
Andy Polyakov
26c07054a1
Retire original rc4-ia64.S.
2005-07-18 18:59:21 +00:00
Andy Polyakov
843d9d0b39
Switch to new RC4 IA-64 module.
2005-07-18 18:56:16 +00:00
Andy Polyakov
4ac210c16a
This update implements following improvements.
...
1. Original submission required minor modification to RC4_set_key, which
we don't want to tolerate and therefore we fix assembler instead.
2. Eliminate remaining byte-order dependence [look for RC4_BIG_ENDIAN].
3. Eliminate logical error [when key->x is referred prior key is verified].
4. HP-UX assembler puked on MODSCHED_RC4 macro with "syntax error,"
macro has to be splitted in two.
5. Deploy parallel compare in function prologue.
6. Eliminate redundant instuctions and nops.
7. Eliminate assembler warnings.
2005-07-18 17:11:13 +00:00
Andy Polyakov
02703c74a4
Unrolled RC4 IA-64 loop gives 40% improvement over current assembler
...
implementation [as predicted].
Submitted by: David Mosberger
Obtained from: http://www.hpl.hp.com/research/linux/crypto/
2005-07-18 16:55:52 +00:00
Andy Polyakov
ef428d5681
Fix unwind directives in IA-64 assembler modules. This helps symbolic
...
debugging and doesn't affect functionality.
Submitted by: David Mosberger
Obtained from: http://www.hpl.hp.com/research/linux/crypto/
2005-07-18 09:54:14 +00:00
Andy Polyakov
afbe674edb
~15% better AES x86_64 assembler.
2005-07-18 09:15:04 +00:00
Nils Larsch
f42e6d24f2
fix typo
2005-07-17 21:04:19 +00:00
Nils Larsch
449bd384ed
bugfix: 0 - w (w != 0) is actually negative
2005-07-17 16:09:09 +00:00
Nils Larsch
3eeaab4bed
make
...
./configure no-deprecated [no-dsa] [no-dh] [no-ec] [no-rsa]
make depend all test
work again
PR: 1159
2005-07-16 12:37:36 +00:00
Nils Larsch
57eb1d3250
add missing entries for "-multivalue-rdn" and "-utf8" in ca.pod and req.pod
...
PR: 1158
Submitted by: Michael Bell <michael.bell@cms.hu-berlin.de >
2005-07-15 09:49:03 +00:00
Andy Polyakov
b4f5e5c959
Commentary section update.
2005-07-14 13:16:31 +00:00
Nils Larsch
0d2848b3ba
the second argument of d2i_X509, d2i_X509_CRL and d2i_X509_REQ is const
...
PR: 1156
Submitted by: Michael Bell <michael.bell@cms.hu-berlin.de >
2005-07-13 22:01:33 +00:00
Andy Polyakov
e84b663a93
complementary x86_64-xlate.pl update.
2005-07-12 22:11:22 +00:00
Andy Polyakov
d85185217b
AES x86_64 assembler implementation.
2005-07-12 15:44:58 +00:00
Andy Polyakov
8f3bdc72d0
Latest Intel compiler means every word in "if copying [with memcpy] takes
...
place between objects that overlap, the behavior is undefined." It's hard
to comprehend, but it reportedly manages to be case.
2005-07-08 16:46:22 +00:00
Richard Levitte
7d368fcbd8
On case insensitive systems, 'install' gets mixed up with the existing file
...
'INSTALL', so we need to put some force into installing
2005-07-08 10:13:22 +00:00
Richard Levitte
2bd2cd9b78
Changes from the 0.9.8 branch.
2005-07-05 19:16:24 +00:00
Richard Levitte
c83101248a
Changes from the 0.9.8 branch.
2005-07-05 18:36:42 +00:00
Andy Polyakov
8d3509b937
CHANGES and TABLE sync with 0.9.8.
2005-07-05 11:48:38 +00:00
Andy Polyakov
1875e6db29
Pull up Win64 support from 0.9.8.
2005-07-05 11:44:45 +00:00
Richard Levitte
0962fbbf98
Add libcrypto.pc and libssl.pc, and install them along with openssl.pc.
...
PR: 1143
2005-07-05 05:14:17 +00:00
Dr. Stephen Henson
cbdac46d58
Update from stable branch.
2005-07-04 23:12:04 +00:00
Richard Levitte
d2e0c81720
The private key should never have ended up in newreq.pem.
...
Now, it ends up in newkey.pem instead.
2005-07-04 21:44:16 +00:00
Andy Polyakov
109080ae48
Fix bugs in bug-fix to x509/by_dir.c.
...
PR: 1131
2005-07-03 13:10:45 +00:00
Andy Polyakov
31efffbdba
Trap condition should be 64-bit when it's due.
2005-07-03 09:17:50 +00:00
Andy Polyakov
aaa5dc614f
More elegant solution to "sparse decimal printout on PPC" problem.
2005-07-02 08:58:55 +00:00
Andy Polyakov
8be97c01d1
Decimal printout of a BN is wrong on PPC, it's sparse with very few
...
significant digits. As soon it verifies elsewhere it goes to 0.9.8 and
0.9.7.
2005-07-01 17:49:47 +00:00
Nils Larsch
9e1a112336
initialize newly allocated data
...
PR: 1145
2005-07-01 16:08:14 +00:00
Andy Polyakov
4e28f13209
Pedantic polish to aes-586.pl:-)
2005-07-01 10:13:30 +00:00
Andy Polyakov
53a20bfd94
Typos in commentary section.
2005-06-30 22:09:03 +00:00
Andy Polyakov
a28062338c
AES_cbc_encrypt to allow end-user to retain small blocks performance by
...
aligning the key schedule in a specific manner.
2005-06-30 22:06:35 +00:00
Dr. Stephen Henson
1c2f1fe505
Check PKCS7 structures in PKCS#12 files are of type data.
2005-06-30 11:34:58 +00:00
Richard Levitte
14365bd820
Actually, the 64bit format specifier differs between SIXTY_FOUR_BIT and
...
SIXTY_FOUR_BIT_LONG
2005-06-29 18:48:08 +00:00
Ben Laurie
a51a97262d
Brought forward from 0.9.8 - 64 bit warning fixes and fussy compiler fixes.
2005-06-29 11:02:15 +00:00
Ben Laurie
45d8574b93
Fix warnings.
2005-06-29 10:25:06 +00:00
Richard Levitte
417f8973ff
asn1parse doesn't support any TXT format, so let's stop pretending
...
it does.
2005-06-28 15:44:11 +00:00
Nils Larsch
b3b72cd92c
remove OPENSSL_NO_ASM dependency
2005-06-28 15:05:02 +00:00
Andy Polyakov
bb00084863
Replace _int64 with __int64, which is more widely accepted among Win32
...
compiler vendors.
2005-06-28 11:50:50 +00:00
Andy Polyakov
db22e5faa6
A report suggests that there're nasm version, which defaults to 16-bit
...
segmenting...
2005-06-28 11:28:43 +00:00
Andy Polyakov
55d03c3179
Mention hpux64-ia64-cc blowfish failure in PROBLEMS.
2005-06-28 09:57:04 +00:00
Richard Levitte
7e0a494f13
There are a few showstoppers. Unfortunately, I only remember one. Please fill this in.
2005-06-28 05:55:22 +00:00
Andy Polyakov
83e68987b3
Eliminate dependency on UNICODE macro.
2005-06-27 21:27:23 +00:00
Andy Polyakov
53bb3bee34
Fix typos in apps/apps.c
2005-06-27 15:56:53 +00:00
Dr. Stephen Henson
c9edf6fe98
Sync libeay.num
2005-06-27 00:45:38 +00:00
Andy Polyakov
14cc0aaf7b
Unify some SCO targets.
2005-06-26 18:06:38 +00:00
Andy Polyakov
2f3c39bc62
Minor (final?) Makefiles polish.
2005-06-26 17:47:44 +00:00
Andy Polyakov
c5de8b2a27
Minimum requirement for Solaris x86 was always Pentium. Reflect this in
...
Configure line. TABLE update accomodates other recent ./Configure changes...
2005-06-26 17:17:11 +00:00
Andy Polyakov
a4022932ee
Omit padding in RC4_KEY on IA-64. The idea behind padding was to reserve
...
room for aligning of the key schedule itself [specific alignment is
required for future performance improvements], but OpenSSH "abuses"
our API by making copies and restoring RC4_KEY, thus ruining the
alignment and making it impossible to recover the key schedule.
PR: 1114
2005-06-26 16:09:29 +00:00
Richard Levitte
0e3b6b70df
Updated status from 0.9.8-stable.
2005-06-24 22:27:57 +00:00
Andy Polyakov
c49a0aa08d
Replace emms with finit in x86cpuid.
2005-06-24 16:32:10 +00:00
Dr. Stephen Henson
5503b6a352
Add Argen root CAs.
2005-06-24 11:07:13 +00:00
Richard Levitte
60021d9165
Someone did some cutting and pasting and didn't quite finish the job :-).
...
Notified by Steffen Pankratz <kratz00@gmx.de >
2005-06-24 05:13:08 +00:00
Richard Levitte
97b708910a
Wrap the inclusion of openssl/engine.h with a protective check for
...
the absence of OPENSSL_NO_ENGINE.
2005-06-23 22:08:47 +00:00
Richard Levitte
2f6ebed1dc
Wrap the inclusion of openssl/engine.h with a protective check for
...
the absence of OPENSSL_NO_ENGINE.
PR: 1123
2005-06-23 21:57:40 +00:00
Richard Levitte
156f657209
Do not defined des_crypt(), since it clashes with Solaris crypt.h.
...
PR: 1125
2005-06-23 21:53:56 +00:00
Richard Levitte
816f74d1c7
Initialise dir to avoid a compiler warning.
2005-06-23 21:49:21 +00:00
Richard Levitte
ec14c80c7c
The NAME section of a man page is required to have a dash followed by a
...
short description, at least according to pod2man.
PR: 1127
2005-06-23 21:45:37 +00:00
Richard Levitte
543b4ecc13
DCC doesn't like argument names in returned function pointers.
...
PR: 1122
2005-06-23 21:35:25 +00:00
Richard Levitte
1110cea007
Update for Stratus VOS.
...
PR: 1130
2005-06-23 21:27:21 +00:00
Richard Levitte
0ed64ce310
Configure update for Stratus VOS.
...
PR: 1129
2005-06-23 21:21:45 +00:00
Richard Levitte
0e441bc2be
Change dir_ctrl to check for the environment variable before using the default
...
directory instead of the other way around.
PR: 1131
2005-06-23 21:14:15 +00:00
Richard Levitte
d996a9af2b
Strip the engine shared libraries as well.
...
Submitted by Corinna Vinschen <vinschen@redhat.com >
2005-06-23 20:55:38 +00:00
Andy Polyakov
ab6cf1b8a2
Darwin specific update for Configure and Makefile.shared.
2005-06-23 20:44:27 +00:00
Andy Polyakov
c25f2f1cbf
Missed -c in IRIX rules.
2005-06-23 20:37:29 +00:00
Andy Polyakov
62526671e9
Typo in bn-mips3 rule.
2005-06-23 16:24:51 +00:00
Andy Polyakov
88ebf53577
Rename mips3.o to bn-mips3.o [it's better in long run] and adjust the
...
rule to accomodate gcc4, which no longer support SGI as.
2005-06-23 16:23:06 +00:00
Andy Polyakov
a41b0aade2
HP-UX specific updates to Makefile.org and Makefile.shared.
2005-06-23 15:36:15 +00:00
Andy Polyakov
02c31fa461
Jumbo Makfiles update.
...
- eliminate ambiguities between GNU-ish and SysV-ish make flavors;
- switch [back] to -e;
- fold/unify rules;
This is follow-up to the patch introducing common BUILDENV. Idea is
to collect as much parameters in $(TOP) as possible and "strip" lower
Makefiles for most variables [and thus makes them more readable].
2005-06-23 00:03:26 +00:00
Andy Polyakov
5df70a9e21
no-asm didn't prevent make from compiling assembler modules.
2005-06-22 23:44:44 +00:00
Andy Polyakov
cbe52c3166
TABLE was out-of-sync.
2005-06-22 23:43:12 +00:00
Andy Polyakov
7858cc03da
Solaris-specific Makefile.shared update from 098.
2005-06-22 23:42:34 +00:00
Dr. Stephen Henson
bbada33271
Typo.
2005-06-22 18:54:54 +00:00
Dr. Stephen Henson
f5d51a9362
Fix extension ordering.
2005-06-22 13:26:23 +00:00
Richard Levitte
0fc6b2c9e2
Do no try to pretend we're at the end of anything unless we're at the end
...
of a 4-character block.
2005-06-20 22:11:14 +00:00
Richard Levitte
7a5ad5d5a1
Check for 'usage' and 'Usage'.
...
Submitted by Tim Rice <tim@multitalents.net >. His comment is:
I noticed "make report" didn't show the cc version on most of
my System V platforms. This patch corrects this.
2005-06-20 20:48:21 +00:00
Andy Polyakov
44eff497e8
Fix typo in ssl/d1_pkt.c.
2005-06-20 19:36:34 +00:00
Andy Polyakov
8b452002e8
Refine ELF detection on BSD platforms.
2005-06-20 17:39:10 +00:00
Andy Polyakov
e442c36252
Solaris x86_64 /usr/ccs/bin/as support.
2005-06-20 14:56:48 +00:00
Andy Polyakov
50ec3951dc
Handle wrap-arounds and revive missing assignment.
2005-06-20 12:40:37 +00:00
Richard Levitte
11cd239707
Add crypto/bn/bn_prime.h to the collection of generated files. In the
...
update target, place the dependency on depend last, so all necessary files
are generated *before* the dependencies are figured out.
PR: 1121
2005-06-20 04:29:50 +00:00
Richard Levitte
f6098f2dda
With DJGPP, it seems like the return code from grep, even when in the
...
middle of a pipe, is noted. Counter that by forcing a true return code
when the return code has no importance.
PR: 1085
2005-06-19 20:31:15 +00:00
Richard Levitte
857c6092b6
Undefine DECRANDOM before redefining it.
...
PR: 1110
2005-06-19 20:20:24 +00:00
Richard Levitte
eef468e330
Add better documentation on how id_function() should be defined and what
...
issues there are.
PR: 1096
2005-06-18 05:52:16 +00:00
Richard Levitte
4bd46774bb
Move the definition of DEVRANDOM for DJGPP from Configure to e_os.h.
...
That should solve the issues with propagating it through the Makefiles.
PR: 1110
2005-06-18 04:42:24 +00:00
Richard Levitte
283c3e2437
Only define ZLIB_SHARED if it hasn't already been defined (on the command
...
line, for example).
PR: 1112
2005-06-18 04:32:12 +00:00
Richard Levitte
306aae6cee
Have pod2man.pl accept '=for comment ...' before the '=head1 NAME' line.
...
PR: 1113
2005-06-18 04:27:06 +00:00
Nils Larsch
edb0600583
clear dso pointer in case of an error
...
PR: 816
2005-06-17 21:26:36 +00:00
Nils Larsch
ac86d923fc
update for the cswift engine:
...
- fix the problem described in bug report 825
- fix a segfault when the engine fails to initialize
- let the engine switch to software when keysize > 2048
PR: 825, 826
Submitted by: Frédéric Giudicelli
2005-06-17 20:27:41 +00:00
Richard Levitte
fbd63d0784
Do not undefine _XOPEN_SOURCE. This is currently experimental, and
...
will be firmed up as soon as it's been verified not to break anything.
2005-06-16 22:20:55 +00:00
Richard Levitte
78ebeee2c4
0.9.8-beta5 works on Gentoo/arml but not /armb, and works on Linux AMD64
2005-06-14 05:42:52 +00:00
Richard Levitte
55805fd2d0
Data about which Cygwin versions 0.9.8-beta5 work on
2005-06-13 17:10:03 +00:00
Richard Levitte
7ebd220a8f
0.9.8-beta5 works on SuSE 9.3
2005-06-13 17:03:13 +00:00
Richard Levitte
e8a1f6d190
0.9.8-beta5 works on Cygwin
2005-06-13 17:00:18 +00:00
Nils Larsch
034bae10fc
update FAQ
2005-06-13 08:38:02 +00:00
Richard Levitte
a7c924c041
0.9.8-beta5 works on VMS/Alpha
2005-06-13 04:17:12 +00:00
Richard Levitte
27b762af60
Status update
2005-06-13 03:36:58 +00:00
Richard Levitte
b764ab9537
Netware patch submitted by Verdon Walker" <VWalker@novell.com> in PR
...
1107. He says:
This is a followup to the NetWare patch that was applied to beta3. It
does the following:
- Fixes a problem in the CLib build with undefined symbols.
- Adds the ability to use BSD sockets as the default for the OpenSSL
socket BIO. NetWare supports 2 flavors of sockets and our Apache
developers need BSD sockets as a configurable option when building
OpenSSL. This adds that for them.
- Updates to the INSTALL.NW file to explain new options.
I have tried very hard to make sure all the changes are in NetWare
specific files or guarded carefully to make sure they only impact
NetWare builds. I have tested the Windows build to make sure it does
not break that since we have made changes to mk1mf.pl.
We are still working the gcc cross compile for NetWare issue and hope
to have a patch for that before beta 6 is released.
2005-06-13 03:23:50 +00:00
Richard Levitte
a761b89d2f
Show what the offending target was.
...
PR: 1108
2005-06-13 02:39:05 +00:00
Nils Larsch
a136862afe
replace the deprecated "-m486" gcc option with "-march=i486"
...
PR: 1049
2005-06-12 10:34:42 +00:00
Nils Larsch
f0747cd950
- let SSL_CTX_set_cipher_list and SSL_set_cipher_list return an
...
error if the cipher list is empty
- fix last commit in ssl_create_cipher_list
- clean up ssl_create_cipher_list
2005-06-10 19:55:26 +00:00
Andy Polyakov
21ac2b964b
Eliminate gcc -pedantic warnings.
2005-06-09 21:41:44 +00:00
Andy Polyakov
79e1dd65ab
Allow for dso load by explicit path on HP-UX.
2005-06-09 20:52:24 +00:00
Richard Levitte
13e393607b
When the return type of the function is int, it's better to return an
...
in than NULL, especially when an error is signalled with a negative
value.
2005-06-09 17:28:53 +00:00
Nils Larsch
052ec89927
use "=" instead of "|=", fix typo
2005-06-08 22:22:33 +00:00
Richard Levitte
2073d95fb4
Avoid endless loops. Really, we were using the same variable for two
...
different conditions...
2005-06-08 21:59:47 +00:00
Nils Larsch
cbed917fee
ssl_create_cipher_list should return an error if no cipher could be
...
collected (see SSL_CTX_set_cipher_list manpage). Fix handling of
"cipher1+cipher2" expressions in ssl_cipher_process_rulestr.
PR: 836 + 1005
2005-06-08 21:19:14 +00:00
Andy Polyakov
dffdb56b7f
"Liberate" dtls from BN dependency. Fix bug in replay/update.
2005-06-07 22:21:14 +00:00
Dr. Stephen Henson
a78c0632ed
Fix for padding X9.31 padding check and zero padding bytes.
2005-06-06 22:39:43 +00:00
Andy Polyakov
8fa6a40be2
Allow BIO_s_file to open and sequentially access files larger than 2GB on
...
affected platforms.
PR: 973
2005-06-06 11:58:31 +00:00
Andy Polyakov
4b5598682a
FAQ to mention no-sha512 as option for compilers without support for 64-bit
...
integer type.
2005-06-06 09:32:01 +00:00
Richard Levitte
e9f5428d3a
Pass INSTALL_PREFIX in BUILDENV.
...
PR: 1100
2005-06-06 08:52:19 +00:00
Richard Levitte
34f0b26424
Skipping all tests just because one algorithm is disabled seems a bit harsch.
...
PR: 1089
2005-06-06 08:38:05 +00:00
Andy Polyakov
cd27b13b1d
Change mention of Makefile.ssl to Makefile.
2005-06-06 08:35:49 +00:00
Richard Levitte
3ecbd099eb
_GNU_SOURCE needs to be defined before any standard header.
2005-06-06 00:50:52 +00:00
Richard Levitte
e43d03e30e
Update from 0.9.8-stable.
2005-06-06 00:42:24 +00:00
Richard Levitte
d1acb9b44f
Further change pq_compat.h to generate the flag macros PQ_64BIT_IS_INTEGER
...
and PQ_64BIT_IS_BIGNUM with the values 0 (for false) and 1 (for true),
depending on which is true. Use those flags everywhere else to provide
the correct implementation for handling certain operations in q PQ_64BIT.
2005-06-06 00:32:11 +00:00
Richard Levitte
acd1c4b5af
Document the change and update the version number (d'oh!).
2005-06-05 23:25:29 +00:00
Richard Levitte
40808cedc1
Remove the incorrect installation of '%{openssldir}/lib'.
...
PR: 1074
2005-06-05 23:15:03 +00:00
Richard Levitte
51054a1b39
Change pq_compat.h to trust the macros defined by bn.h a bit more, and thereby
...
provide better generic support for environments that do not have 64-bit
integers. Among others, this should solve PR 1086
2005-06-05 22:42:58 +00:00
Richard Levitte
e774a3299e
gcc 2.95.3 on Ultrix supports long long.
...
PR: 1091
2005-06-05 22:19:24 +00:00
Richard Levitte
99febc8b9a
Correct typo ia64.o -> bn-ia64.o.
...
PR: 1094
2005-06-05 22:09:10 +00:00
Richard Levitte
1ce8efbdda
Add support for the new Intel compiler, icc.
...
Submitted by Keith Thompson <kst@sdsc.edu >
PR: 1095
2005-06-05 22:01:18 +00:00
Richard Levitte
0b0a60d861
Old typo...
...
PR: 1097
2005-06-05 21:54:48 +00:00
Richard Levitte
9e5b378081
Updated support for NetWare, submitted by Verdon Walker <VWalker@novell.com>.
...
PR: 1098
2005-06-05 21:47:19 +00:00
Andy Polyakov
7ed876533a
New function, DSO_pathbyaddr, to find pathname for loaded shared object
...
by an address within it. Tested on Linux, Solaris, IRIX, Tru64, Darwin,
HP-UX, Win32, few BSD flavors...
2005-06-05 18:13:38 +00:00
Andy Polyakov
b2d91a6913
Unify BSDi target.
2005-06-05 18:10:19 +00:00
Andy Polyakov
ce074604c4
./PROBLEMS to mention workarounds for ULTRIX build problems.
...
PR: 1092
2005-06-05 18:03:37 +00:00
Richard Levitte
19ac190252
The macro THREADS was changed to OPENSSL_THREADS a long time ago.
...
PR: 1096
2005-06-04 08:44:02 +00:00
Richard Levitte
02c5ddf91e
From 0.9.8-stable:
...
handshake_write_seq is an unsigned short, so treat it like one
2005-06-04 04:18:26 +00:00
Dr. Stephen Henson
1aaeaf8a3d
Use correct name for config file env variable.
2005-06-02 23:19:56 +00:00
Dr. Stephen Henson
5d6c4985d1
Typo.
2005-06-02 20:29:32 +00:00
Dr. Stephen Henson
b615ad90c8
Update CHANGES.
2005-06-02 20:11:16 +00:00
Andy Polyakov
c7aaf3918d
Fix inconsistensy between 8 and HEAD.
2005-06-02 18:28:27 +00:00
Andy Polyakov
d51204f1b1
PSS update [from 0.9.7].
2005-06-02 18:25:36 +00:00
Nils Larsch
b3f6325988
check return value
2005-06-01 22:35:01 +00:00
Dr. Stephen Henson
3129acbd83
Update from 0.9.7-stable.
2005-06-01 22:14:04 +00:00
Richard Levitte
12f89d32b5
Synchronise yet a little more with the Unixly build
2005-06-01 16:24:15 +00:00
Nils Larsch
1d42741a19
clear error queue on success and return NULL if no cert could be read
...
PR: 1088
2005-06-01 08:38:44 +00:00
Nils Larsch
88737991d2
fix assertion
2005-05-31 20:39:16 +00:00
Richard Levitte
75c00536ba
Synchronise more with the Unix build.
2005-05-31 20:28:41 +00:00
Nils Larsch
63d740752f
changes from 0.9.8
2005-05-31 18:22:53 +00:00
Nils Larsch
6e04afb8c5
include opensslconf.h if OPENSSL_NO_* is used
2005-05-31 17:36:06 +00:00
Andy Polyakov
165fca51e0
"Show" more respect to no-sha* config options.
...
PR: 1086
2005-05-31 16:36:27 +00:00
Andy Polyakov
db6b4e3791
Mention more GCC bugs in ./PROBLEMS.
2005-05-31 12:39:54 +00:00
Andy Polyakov
20a85e9f69
Missing sparcv8.o rule.
...
PR: 1082
2005-05-31 12:17:35 +00:00
Andy Polyakov
2a6144a1b6
Fix typo in ./config.
2005-05-31 11:34:33 +00:00
Andy Polyakov
f8bc3e1bd8
Platform update from 8-stable.
2005-05-31 11:07:27 +00:00
Andy Polyakov
5b737a0731
Platform update from 8-stable.
2005-05-31 09:39:03 +00:00
Richard Levitte
6e0ef10915
Merge from 0.9.8-stable.
2005-05-30 23:26:04 +00:00
Richard Levitte
7017605dce
Merge in the new news from 0.9.8-stable.
2005-05-30 22:51:28 +00:00
Richard Levitte
b29228836a
DJGPP changes. Contributed by Doug Kaufman <dkaufman@rahul.net>
2005-05-30 22:37:44 +00:00
Richard Levitte
188b05792f
pqueue and dtls uses 64-bit values. Unfortunately, OpenSSL doesn't
...
have a uniform representation for those over all architectures, so a
little bit of hackery is needed.
Contributed by nagendra modadugu <nagendra@cs.stanford.edu >
2005-05-30 22:34:37 +00:00
Richard Levitte
575901e537
Synchronise with Unixly build
2005-05-30 22:26:30 +00:00
Richard Levitte
2333d65880
Change all relevant occurences of 'ncipher' to 'chil'. That's what nCipher always wanted...
2005-05-30 05:17:02 +00:00
Dr. Stephen Henson
ffd1df0579
Update from stable branch.
2005-05-30 00:29:16 +00:00
Geoff Thorpe
a2c32e2d7f
Change the source and output paths for 'chil' and '4758cca' engines so that
...
dynamic loading is consistent with respect to engine ids.
2005-05-29 19:14:21 +00:00
Richard Levitte
80b168a5a9
We have some source with \r\n as line ends. DEC C informs about that,
...
and I really can't be bothered...
2005-05-29 12:13:51 +00:00
Richard Levitte
9426364be9
Typo
2005-05-29 12:11:50 +00:00
Dr. Stephen Henson
429168e7ee
Add pss/x931 files.
2005-05-28 20:44:37 +00:00
Dr. Stephen Henson
499fca2db3
Update from 0.9.7-stable. Also repatch and rebuild error codes.
2005-05-28 20:44:02 +00:00
Bodo Möller
a28a5d9c62
Use BN_with_flags() in a cleaner way.
2005-05-27 15:38:53 +00:00
Dr. Stephen Henson
3f791ca818
Assing check_{cert,crl}_time to 'ok' variable so it returns errors on
...
expiry.
2005-05-27 13:19:25 +00:00
Bodo Möller
0ebfcc8f92
make sure DSA signing exponentiations really are constant-time
2005-05-26 04:40:52 +00:00
Bodo Möller
c61f571ce0
check BN_copy() return value
2005-05-26 04:30:49 +00:00
Geoff Thorpe
60192e96b8
Handle differences between engine IDs and their dynamic library names (and
...
source files, for that matter) by tolerating the alternatives. It would be
preferable to also change the generated shared library names, but that will
be taken up separately.
2005-05-25 02:54:28 +00:00
Richard Levitte
85991994df
It seems like mkdef.pl couldn't quite understand that #ifdef OPENSSL_NO_SHA512
...
was still active when it came down to the functions. mkdef.pl should really
be corrected, but that'll be another day...
2005-05-24 03:39:08 +00:00
Richard Levitte
b325518f45
Typo correction
2005-05-24 03:27:15 +00:00
Richard Levitte
b172dec864
DEC C complains about bad subscript, but we know better, so let's shut it up.
2005-05-24 03:22:53 +00:00
Andy Polyakov
61391e2314
Be more consistent with OPENSSL_NO_SHA256.
2005-05-22 10:27:59 +00:00
Andy Polyakov
4b23506594
OPENSSL_NO_SHA512 to mask even SHA512_CTX declaration. This is done to
...
make no-sha512 more effective on platforms, which don't support 64-bit
integer type of *any* kind.
2005-05-22 08:55:15 +00:00
Andy Polyakov
82d3dda8a1
Still SEGV trouble in .init segment under Solaris x86...
2005-05-21 17:49:10 +00:00
Richard Levitte
fe8bf9560d
When _XOPEN_SOURCE is defined, make sure it's defined to 500. Required in
...
http://www.opengroup.org/onlinepubs/007908799/xsh/compilation.html .
Notified by David Wolfe <dwolfe5272@yahoo.com >
2005-05-21 17:39:43 +00:00
Andy Polyakov
e4c9b85e65
Default to no-sse2 on selected platforms.
2005-05-21 16:50:27 +00:00
Richard Levitte
447aa49007
Patches for Cygwin, provided by Corinna Vinschen <vinschen@redhat.com>
2005-05-21 16:41:34 +00:00
Ben Laurie
fe977f7512
Propagate BUILDENV into subdirectories.
2005-05-21 16:13:36 +00:00
Andy Polyakov
e476f94212
Move _WIN32_WINNT definition from command line to e_os.h. The change is
...
inspired by VC6 failure report. In addition abstain from taking screen
snapshots when running in NT service context.
2005-05-21 13:19:27 +00:00
Nils Larsch
bbbd67108f
fix typo, add prototype
2005-05-20 22:55:10 +00:00
Nils Larsch
7f246621b5
fix potential memory leak
...
Submitted by: Goetz Babin-Ebell
2005-05-19 22:10:40 +00:00
Nils Larsch
b67d988915
update ecdsa doc
2005-05-19 20:54:30 +00:00
Andy Polyakov
851e31ff07
FAQ to mention no-sse2.
2005-05-19 19:54:49 +00:00
Richard Levitte
decc9ffc18
Update status information
2005-05-19 19:43:28 +00:00
Nils Larsch
3f4657d131
fix "dereferencing type-punned pointer will break strict-aliasing rules"
...
warning when using gcc 4.0
2005-05-19 12:01:51 +00:00
Nils Larsch
67ffa18cce
make the type parameter const when ID2_OF_const() is used
2005-05-18 22:30:38 +00:00
Andy Polyakov
788e67e227
FAQ update to mention Applink.
2005-05-18 13:35:54 +00:00
Andy Polyakov
c50226594d
Don't emit SSE2 instructions unless were asked to.
...
PR: 1073
2005-05-18 08:42:08 +00:00
Andy Polyakov
51ff6bde38
Engage Applink in mingw. Note that application-side module is not
...
compiled into *our* aplpications. That's because mingw is always
consistent with itself. Having library-side code linked into .dll
makes it possible to deploy the .dll with user-code compiled with
another compiler [which is pretty much the whole point behind Applink].
2005-05-18 08:16:46 +00:00
Richard Levitte
28e4fe34e4
Version changes where needed.
2005-05-18 04:04:12 +00:00
Richard Levitte
c800a070b5
I just branched 0.9.8, so HEAD needs to be bumped to 0.9.9-dev.
...
The 0.9.8 branch is called OpenSSL_0_9_8-stable.
2005-05-18 03:58:34 +00:00
Andy Polyakov
53d8996764
Engage Applink for VC builds.
2005-05-17 16:50:46 +00:00
Andy Polyakov
32b1843ec6
Keep disclaming 16-bit support.
2005-05-17 13:51:36 +00:00
Nils Larsch
8712009778
simplify EC_KEY_dup
2005-05-17 12:23:16 +00:00
Andy Polyakov
b8994f44e7
mdc2test is not built by default anymore.
2005-05-17 06:57:45 +00:00
Bodo Möller
f468e3824a
fix memory leak (BIO_free_all needs pointer to first BIO)
...
PR: 1070
2005-05-17 05:52:24 +00:00
Andy Polyakov
ea1b02db6a
OPENSSL_Applink update.
2005-05-17 00:08:28 +00:00
Andy Polyakov
2c4b354d32
Disclaim 16-bit support.
2005-05-17 00:07:13 +00:00
Andy Polyakov
25a66ee3cb
Move cryptlib.h prior bio.h. Actually it makes sense to include cryptlib.h
...
first everywhere in crypto and skip stdio.h and string.h [because it
includes them].
2005-05-17 00:01:48 +00:00
Andy Polyakov
0978dec131
Improve shell portability of new rules in Makefile.shared.
2005-05-16 21:05:09 +00:00
Bodo Möller
91b17fbad4
Change wording for BN_mod_exp_mont_consttime() entry
2005-05-16 19:14:34 +00:00
Andy Polyakov
ce92b6eb9c
Further BUILDENV refinement, further fool-proofing of Makefiles and
...
[most importantly] put back dependencies accidentaly eliminated in
check-in #13342 .
2005-05-16 16:55:47 +00:00
Andy Polyakov
7abbffc3fb
Further BUILDENV clean-up, 'make depend' is operational again.
2005-05-16 14:24:45 +00:00
Nils Larsch
9dd8405341
ecc api cleanup; summary:
...
- hide the EC_KEY structure definition in ec_lcl.c + add
some functions to use/access the EC_KEY fields
- change the way how method specific data (ecdsa/ecdh) is
attached to a EC_KEY
- add ECDSA_sign_ex and ECDSA_do_sign_ex functions with
additional parameters for pre-computed values
- rebuild libeay.num from 0.9.7
2005-05-16 10:11:04 +00:00
Bodo Möller
46a643763d
Implement fixed-window exponentiation to mitigate hyper-threading
...
timing attacks.
BN_FLG_EXP_CONSTTIME requests this algorithm, and this done by default for
RSA/DSA/DH private key computations unless
RSA_FLAG_NO_EXP_CONSTTIME/DSA_FLAG_NO_EXP_CONSTTIME/
DH_FLAG_NO_EXP_CONSTTIME is set.
Submitted by: Matthew D Wood
Reviewed by: Bodo Moeller
2005-05-16 01:43:31 +00:00
Bodo Möller
92c4468572
rebuild to synchronize with additions to 0.9.7 branch
2005-05-16 00:29:29 +00:00
Bodo Möller
10cde5010d
make update
2005-05-16 00:27:37 +00:00
Andy Polyakov
c4cd925cc0
Make Makefile.shared quiet again.
2005-05-16 00:01:49 +00:00
Andy Polyakov
f210eb7b89
Simplify shared rules, link run-path into applications only.
2005-05-15 23:59:04 +00:00
Andy Polyakov
734540f887
Consolidate BUILDENV [idea is to keep all variables in one place].
2005-05-15 23:53:34 +00:00
Andy Polyakov
804515425a
+20% performance improvement of P4-specific RC4_CHAR loop.
2005-05-15 22:43:00 +00:00
Andy Polyakov
81a86fcf17
Fool-proofing Makefiles
2005-05-15 22:23:26 +00:00
Dr. Stephen Henson
a534bb09d3
Make update.
2005-05-15 00:56:47 +00:00
Dr. Stephen Henson
b6995add5c
Make -CSP option work again in pkcs12 utility by checking for
...
attribute in EVP_PKEY structure.
2005-05-15 00:54:45 +00:00
Dr. Stephen Henson
8ccd06c66c
openssl_fcast should always be defined, not just with DEBUG_SAFESTACK
2005-05-14 12:58:20 +00:00
Dr. Stephen Henson
fe86616c72
Some C compilers produce warnings or compilation errors if an attempt
...
is made to directly cast a function of one type to what it considers and
incompatible type. In particular gcc 3.4.2.
Add new openssl_fcast macro to place functions into a form where the compiler
will allow them to be cast.
The current version achives this by casting to: void function(void).
2005-05-12 23:01:44 +00:00
Dr. Stephen Henson
ba2ba27008
Avoid warnings.
2005-05-12 22:40:19 +00:00
Dr. Stephen Henson
f795123c4a
Fix from stable branch.
2005-05-12 22:39:42 +00:00
Dr. Stephen Henson
c596c795bf
Typo.
2005-05-12 17:28:53 +00:00
Bodo Möller
3f19bbf4e3
fix msg_callback() arguments for SSL 2.0 compatible client hello
...
(previous revision got this wrong)
2005-05-12 06:24:25 +00:00
Bodo Möller
b874ce4dc2
Move another item into ChangeLog.0_9_7-stable_not-in-head_FIPS
2005-05-11 18:36:47 +00:00
Bodo Möller
c6c2e3135d
Don't use the SSL 2.0 Client Hello format if SSL 2.0 is disabled
...
with the SSL_OP_NO_SSLv2 option.
2005-05-11 18:25:49 +00:00
Ben Laurie
4b26fe30de
There must be an explicit way to build the .o!
2005-05-11 16:39:05 +00:00
Bodo Möller
4a8224b598
Move some entries from ChangeLog.0_9_7-stable_not-in-head
...
to ChangeLog.0_9_7-stable_not-in-head_FIPS.
2005-05-11 03:54:21 +00:00
Bodo Möller
8afca8d9c6
Fix more error codes.
...
(Also improve util/ck_errf.pl script, and occasionally
fix source code formatting.)
2005-05-11 03:45:39 +00:00
Nils Larsch
35e8510e60
use 'p' as conversion specifier for printf to avoid truncation of
...
pointers on 64 bit platforms. Patch supplied by Daniel Gryniewicz
via Mike Frysinger <vapier@gentoo.org >.
PR: 1064
2005-05-10 11:55:28 +00:00
Nils Larsch
8b15c74018
give EC_GROUP_new_by_nid a more meanigful name:
...
EC_GROUP_new_by_nid -> EC_GROUP_new_by_curve_name
2005-05-10 11:37:47 +00:00
Nils Larsch
3afa6cf866
improve command line argument checking
...
PR: 1061
2005-05-10 09:51:29 +00:00
Andy Polyakov
e19e549041
Comply with optimization manual (no data should share cache-line with code).
2005-05-09 21:48:01 +00:00
Andy Polyakov
d7561ac576
Allow for 64-bit cache-line alignments in code segment.
2005-05-09 21:27:40 +00:00
Bodo Möller
fbeaa3c47d
Update util/ck_errf.pl script, and have it run automatically
...
during "make errors" and thus during "make update".
Fix lots of bugs that util/ck_errf.pl can detect automatically.
Various others of these are still left to fix; that's why
"make update" will complain loudly when run now.
2005-05-09 00:27:37 +00:00
Bodo Möller
ee2262b8d7
rebuild (starting with state from 0.9.7-stable branch) to avoid clutter
2005-05-09 00:22:02 +00:00
Bodo Möller
b0ac0a8ef8
improve comment readability
2005-05-09 00:06:54 +00:00
Bodo Möller
0f4499360e
give EC_GROUP_*_nid functions a more meaningful name
...
EC_GROUP_get_nid -> EC_GROUP_get_curve_name
EC_GROUP_set_nid -> EC_GROUP_set_curve_name
2005-05-09 00:05:17 +00:00
Nils Larsch
7dc17a6cf0
give EC_GROUP_*_nid functions a more meaningful name
...
EC_GROUP_get_nid -> EC_GROUP_get_curve_name
EC_GROUP_set_nid -> EC_GROUP_set_curve_name
2005-05-08 22:09:12 +00:00
Andy Polyakov
b6223d2f70
Eliminate "statement with no effect" warning when OPENSSL_assert macro
...
is used with constant assertion.
2005-05-08 19:54:33 +00:00
Richard Levitte
256b5d5877
I was incorrect about VMS/Alpha. Defining BN_LLONG with
...
SIXTY_FOUR_BIT could cause havoc, so don't (it's lucky bn.h undefines
BN_LLONG when SIXTY_FOUR_BIT is defined).
2005-05-07 21:21:17 +00:00
Andy Polyakov
5d0d60e2f5
x86_64 assembler translator update.
2005-05-07 08:13:51 +00:00
Andy Polyakov
57ee007035
Fix constants.
...
PR: 1059
2005-05-07 08:11:50 +00:00
Richard Levitte
82e8cb403a
Since BN_LLONG will only be defined for Alpha/VMS and not VAX/VMS,
...
there's no need to undefine it here. Then, let's get a bit paranoid
and not define BN_ULLONG on THIRTY_TWO_BIT machines when BN_LLONG
isn't defined.
2005-05-06 13:34:35 +00:00
Richard Levitte
abee01c6f8
Actually, C on VMS/Alpha knows very well what a long long is, and
...
knows how to make use of it. So let's stop pretending the Alpha
doesn't know long long...
2005-05-06 13:33:16 +00:00
Nils Larsch
2c288b2a7e
fix compiler warning; pow10 is also in math.h
2005-05-05 20:57:37 +00:00
Richard Levitte
831721ef49
A few more fingerprints...
2005-05-05 06:38:55 +00:00
Andy Polyakov
0ee883650d
Commentary update motivating code update in 0.9.7.
2005-05-04 14:51:38 +00:00
Andy Polyakov
70cf309517
x86_64 assembler translator update.
2005-05-04 08:42:47 +00:00
Andy Polyakov
8b5bf52ac2
Cvs missed adapted module itself, here it goes...
2005-05-03 23:03:31 +00:00
Andy Polyakov
73a9485081
Engage md5-x86_64 assembler module.
2005-05-03 22:59:17 +00:00
Andy Polyakov
d37a65bc81
Throw in md5-x86_64 assembler.
2005-05-03 22:56:15 +00:00
Andy Polyakov
34c7ff6dc9
Cygwin doesn't expose Win32 [not "officially"].
2005-05-03 21:20:17 +00:00
Andy Polyakov
647907918d
Commentary update.
2005-05-03 21:16:42 +00:00
Andy Polyakov
cee73df3bd
Cpuid modules updates.
2005-05-03 21:05:06 +00:00
Nils Larsch
07481951f9
remove false positive
2005-05-03 20:58:24 +00:00
Nils Larsch
f15c448a72
remove BN_ncopy, it was only used in bn_nist.c and wasn't particular
...
useful anyway
2005-05-03 20:27:00 +00:00
Nils Larsch
fcb41c0ee8
rewrite of bn_nist.c, disable support for some curves on 64 bit platforms
...
for now (it was broken anyway)
2005-05-03 20:23:33 +00:00
Nils Larsch
9b62318311
fix typo
...
PR: 1054
2005-05-03 18:34:01 +00:00
Andy Polyakov
5f1841cdca
Rename amd64 modules to x86_64 and update RC4 implementation.
2005-05-03 15:42:05 +00:00
Andy Polyakov
4b45051902
x86_64 assembler translator update.
2005-05-03 15:35:14 +00:00
Nils Larsch
9e5790ce21
backport fix from the stable branch
2005-05-03 10:00:16 +00:00
Ben Laurie
fce8c6cc53
Redundant changes.
2005-05-01 13:55:41 +00:00
Ben Laurie
0ff469d38d
Add prototype.
2005-05-01 13:49:56 +00:00
Dr. Stephen Henson
05338b58ce
Support for smime-type MIME parameter.
2005-05-01 12:46:57 +00:00
Andy Polyakov
081057c3ff
Remove false positives and resolve some of remaining ones.
2005-04-30 23:48:17 +00:00
Andy Polyakov
94c1672ef0
Cygwin/mingw sync with stable.
2005-04-30 23:45:53 +00:00
Andy Polyakov
405d9761a5
Allow for ./config no-sha0 [from stable].
2005-04-30 21:51:41 +00:00
Andy Polyakov
4c3a2d64e4
Fold rules in test/Makefiles [from stable].
2005-04-30 21:39:39 +00:00
Dr. Stephen Henson
98a2fd32a0
Typo.
2005-04-30 18:07:30 +00:00
Dr. Stephen Henson
7bdeeb64ac
Don't attempt to parse nested ASN1 strings by default.
2005-04-30 18:02:54 +00:00
Richard Levitte
43b45a42fd
Some true positives fixed, toss some false positives.
2005-04-30 15:25:04 +00:00
Richard Levitte
9af1bfb3d5
From branch OpenSSL_0_9_7-stable, 2004-09-11 11:45:
...
Makefile.ssl changed name to Makefile...
2005-04-30 15:23:14 +00:00
Richard Levitte
aed14edd12
From branch OpenSSL_0_9_7-stable, 2004-08-11 22:34:
...
Another missing module in the VMS build files.I believe this is
the last, though...
2005-04-30 15:21:40 +00:00
Richard Levitte
14a948e6ad
All kinds of changes from branch OpenSSL_0_9_7-stable
2005-04-30 15:17:05 +00:00
Richard Levitte
af2fcf3a65
This one deserves a note. In the change to CHANGES, there's the
...
following:
+ NOTE: This is for the 0.9.7 series ONLY. This hack will never
+ appear in 0.9.8 or later. We EXPECT application authors to have
+ dealt properly with this when 0.9.8 is released (unless we actually
+ make such changes in the libcrypto locking code that changes will
+ have to be made anyway).
That makes this one a false positive.
2005-04-30 14:41:51 +00:00
Richard Levitte
4a676ac4f8
Remove a bunch of false positives, and fix some true positives.
2005-04-30 14:40:19 +00:00
Richard Levitte
37e27219f2
From branch OpenSSL_0_9_7-stable, 2002-11-13 15:30:
...
The loading functions should be static if we build a dynamic
engine.
2005-04-30 14:34:28 +00:00
Richard Levitte
d2284ab5d1
Remove a bunch of false positives, fix one true positive.
2005-04-30 13:50:57 +00:00
Richard Levitte
78e91e7574
From branch OpenSSL_0_9_7-stable, revision 1.1.4.1, 2002-05-23 17:25:
...
Forgot this file.
2005-04-30 13:42:02 +00:00
Dr. Stephen Henson
e1cc0671ac
Use more efficient way to locate end of an ASN1 structure.
2005-04-30 13:06:45 +00:00
Nils Larsch
c1a8a5de13
don't let BN_CTX_free(NULL) segfault
2005-04-29 21:20:31 +00:00
Nils Larsch
e3d0e0a792
remove false positive
2005-04-29 20:41:38 +00:00
Nils Larsch
7c7667b86b
check return value of RAND_pseudo_bytes; backport from the stable branch
2005-04-29 20:10:06 +00:00
Nils Larsch
38be5db93b
remove some false positive
2005-04-29 19:24:50 +00:00
Nils Larsch
6a50d0a422
hide the definition of ECDSA_METHOD and ECDSA_DATA (and mutatis mutandis
...
for ecdh)
2005-04-29 15:56:06 +00:00
Nils Larsch
7ab2d30349
add 192 bit prime curve to the command line options
2005-04-29 15:21:09 +00:00
Nils Larsch
d753c3f582
add reference to BN_BLINDING_new.pod
2005-04-29 15:07:34 +00:00
Nils Larsch
1897c89302
avoid warnings when building on systems where sizeof(void *) > sizeof(int)
2005-04-29 14:26:59 +00:00
Andy Polyakov
3cc54008eb
Pointer to BN_MONT_CTX could be used uninitialized.
2005-04-28 08:49:01 +00:00
Richard Levitte
ff8bcccdd4
Synchronise with Unix build system.
2005-04-28 04:55:28 +00:00
Dr. Stephen Henson
a93b01be57
Increase offset for BIO_f_enc() to avoid problems with overlapping buffers
...
when decrypting data.
2005-04-28 00:21:29 +00:00
Dr. Stephen Henson
04b304d346
Update default dependency flags.
2005-04-27 16:32:30 +00:00
Dr. Stephen Henson
6c61726b2a
Lots of Win32 fixes for DTLS.
...
1. "unsigned long long" isn't portable changed: to BN_ULLONG.
2. The LL prefix isn't allowed in VC++ but it isn't needed where it is used.
2. Avoid lots of compiler warnings about signed/unsigned mismatches.
3. Include new library directory pqueue in mk1mf build system.
4. Update symbols.
2005-04-27 16:27:14 +00:00
Nils Larsch
cd202fe2f9
get rid of Makefile.ssl in util/
2005-04-27 08:56:15 +00:00
Nils Larsch
69af4faec1
no Makefile.ssl anymore
2005-04-27 08:48:55 +00:00
Nils Larsch
df9e0bf507
add missing parentheses
2005-04-27 07:57:50 +00:00
Dr. Stephen Henson
879b19801a
Change method_mont_p from (char *) to (BN_MONT_CTX *) and remove several
...
casts.
2005-04-27 00:04:59 +00:00
Dr. Stephen Henson
6ec8e63af6
Port BN_MONT_CTX_set_locked() from stable branch.
...
The function rsa_eay_mont_helper() has been removed because it is no longer
needed after this change.
2005-04-26 23:58:54 +00:00
Dr. Stephen Henson
465b9f6b26
Stop unused variable warning.
2005-04-26 23:45:49 +00:00
Dr. Stephen Henson
0c9c87a76e
Remove more false positives.
2005-04-26 23:33:47 +00:00
Bodo Möller
a7a90b2f00
there's no such thing as Makefile.ssl anymore
2005-04-26 23:22:49 +00:00
Bodo Möller
4d6e7733fa
util/mk1mf.pl issues have been resolved
2005-04-26 23:22:25 +00:00
Dr. Stephen Henson
2deadf1672
Port from stable branch.
2005-04-26 23:21:49 +00:00
Dr. Stephen Henson
9ea862e0b3
More false positives and cases covered by port of prime.c
2005-04-26 23:19:21 +00:00
Bodo Möller
11c9b7cfeb
"PS" to Steve's commit (Port prime utility across from stable branch).
2005-04-26 23:11:05 +00:00
Dr. Stephen Henson
b08868c48a
Port prime utility across from stable branch.
2005-04-26 23:02:52 +00:00
Nils Larsch
9ca46ff609
add docu for BN_BLINDING functions
2005-04-26 22:33:36 +00:00
Nils Larsch
800e400de5
some updates for the blinding code; summary:
...
- possibility of re-creation of the blinding parameters after a
fixed number of uses (suggested by Bodo)
- calculatition of the rsa::e in case it's absent and p and q
are present (see bug report #785 )
- improve the performance when if one rsa structure is shared by
more than a thread (see bug report #555 )
- fix the problem described in bug report #827
- hide the definition ot the BN_BLINDING structure in bn_blind.c
2005-04-26 22:31:48 +00:00
Dr. Stephen Henson
05886a6f77
Remove more false positives.
2005-04-26 22:25:10 +00:00
Dr. Stephen Henson
667aef4c6a
Port from stable branch.
2005-04-26 22:07:17 +00:00
Dr. Stephen Henson
49e179cc52
Remove more false positives.
2005-04-26 22:05:19 +00:00
Bodo Möller
aa4ce7315f
Fix various incorrect error function codes.
...
("perl util/ck_errf.pl */*.c */*/*.c" still reports many more.)
2005-04-26 18:53:22 +00:00
Bodo Möller
c741b83762
take OPENSSL_NO_DGRAM into account
...
(via make update)
2005-04-26 18:48:02 +00:00
Bodo Möller
64387788a9
let mkdef.pl know about OPENSSL_NO_DGRAM
...
(which appears in the new file crypto/bio/bss_dgram.c)
2005-04-26 18:21:25 +00:00
Bodo Möller
480506bd49
remove some functions from exported headers
2005-04-26 18:18:35 +00:00
Bodo Möller
0d5ea7613e
make update
2005-04-26 18:09:21 +00:00
Bodo Möller
beb056b303
fix SSLerr stuff for DTLS1 code;
...
move some functions from exported header <openssl/dtl1.h> into "ssl_locl.h";
fix silly indentation (a TAB is *not* always 4 spaces)
2005-04-26 18:08:00 +00:00
Dr. Stephen Henson
4e321ffaff
Fixes for signed/unsigned warnings and shadows.
2005-04-26 17:43:53 +00:00
Dr. Stephen Henson
6ededa42db
False positive removed.
2005-04-26 17:37:21 +00:00
Ben Laurie
36d16f8ee0
Add DTLS support.
2005-04-26 16:02:40 +00:00
Ben Laurie
ab781a0cb6
make depend.
2005-04-26 13:56:36 +00:00
Nils Larsch
19c2987eb6
remove false positive
2005-04-26 08:17:58 +00:00
Bodo Möller
b09af97686
some more false positives to remove
2005-04-25 23:19:07 +00:00
Bodo Möller
a7b1c7732f
make update
2005-04-25 23:17:30 +00:00
Bodo Möller
abc64463af
move some more entries into FIPS file
2005-04-25 23:16:58 +00:00
Bodo Möller
2e7245f5a3
Use OPENSSL_NO_CAST, not OPENSSL_NO_CAST5 in e_old.c
...
PR: 959
2005-04-25 23:09:00 +00:00
Bodo Möller
f76b062e16
Remove some more entries that are false positives, or have been
...
resolved by recent commits.
2005-04-25 23:06:15 +00:00
Bodo Möller
cc1717eaa4
Sort out changes in FIPS and other changes, collected in separate files.
...
(Also remove another "make update".)
2005-04-25 22:55:24 +00:00
Bodo Möller
c5156d952e
remove some more false positives
2005-04-25 22:08:13 +00:00
Bodo Möller
0b2d0d7d13
remove some more false positives
2005-04-25 22:02:34 +00:00
Bodo Möller
b732a8cf5f
remove some more changes that came from HEAD
2005-04-25 21:54:14 +00:00
Bodo Möller
a7dc451ebe
fix editing error, and remove a false positive
2005-04-25 21:53:08 +00:00
Bodo Möller
87357fc0b8
update
2005-04-25 21:42:14 +00:00
Bodo Möller
a2c96d888d
remove extra whitespace; fix link
2005-04-25 21:36:56 +00:00
Bodo Möller
9a6c6b99bf
remove some false positives
2005-04-25 21:32:52 +00:00
Bodo Möller
033c79dff1
add recent changes; now this file is up-to-date
2005-04-25 21:25:48 +00:00
Bodo Möller
b362536275
bring up-to-date
2005-04-25 21:22:08 +00:00
Bodo Möller
aa16a28631
first step to melt down ChangeLog.0_9_7-stable_not-in-head :-)
2005-04-25 21:06:05 +00:00
Bodo Möller
2757c67da2
This is a collection of those CVS change log entries for the 0.9.7
...
branch (OpenSSL_0_9_7-stable) that do not appear similarly in
0.9.8-dev (CVS head).
Some obvious false positives have been eliminated: e.g., we do not
care about a simple "make update"; and we don't care about changes
identified to the 0.9.7 branch that were explicitly identified as
backports from head.
Eliminating all other entries (and finally this file), either as false
positives or as things that should go into 0.9.8, remains to be done.
2005-04-25 21:01:31 +00:00
Andy Polyakov
3d5fd31280
Avoid L1 cache aliasing even between key and S-boxes.
2005-04-24 21:09:20 +00:00
Ben Laurie
c7199e62f1
Flag changes in Configure and config, too.
...
Update dependencies.
2005-04-24 12:02:49 +00:00
Nils Larsch
0b3fc6e63b
update
2005-04-24 09:17:48 +00:00
Dr. Stephen Henson
c2db9cfb52
Oops...
2005-04-24 02:24:53 +00:00
Dr. Stephen Henson
6bc8e6b898
Recognize zlib and krb5 options in mk1mf.pl
2005-04-24 02:21:02 +00:00
Nils Larsch
9edf4e8157
make asn.1 field names const
2005-04-23 13:45:49 +00:00
Nils Larsch
965a1cb92e
change prototype of the ecdh KDF: make input parameter const and the outlen argument more flexible
2005-04-23 10:11:16 +00:00
Ben Laurie
e9ad6665a5
Add debug target, remove cast, note possible bug.
2005-04-23 06:05:24 +00:00
Ben Laurie
b5855b2f32
Add prototypes.
2005-04-22 23:57:46 +00:00
Nils Larsch
a0bee97e55
more const
2005-04-22 21:57:36 +00:00
Nils Larsch
e7076c5a80
make update
2005-04-22 20:17:17 +00:00
Nils Larsch
ff22e913a3
- use BN_set_negative and BN_is_negative instead of BN_set_sign
...
and BN_get_sign
- implement BN_set_negative as a function
- always use "#define BN_is_zero(a) ((a)->top == 0)"
2005-04-22 20:02:44 +00:00
Andy Polyakov
04d0d0accf
Avoid aliasing between stack frames and S-boxes. Compress prefetch code.
2005-04-22 11:49:32 +00:00
Nils Larsch
00df894701
the pointer to the message digest is const
2005-04-21 09:43:09 +00:00
Richard Levitte
630e4a6e59
Provide a default OPENSSL_ia32cap_loc for non-Intel platforms where
...
util/libeay.num is important when building shared libraries, like
VMS.
2005-04-21 09:10:19 +00:00
Dr. Stephen Henson
bf2336f478
Don't use standard kerberos library locations in MK1MF builds.
...
Fix typo in mk1mf.pl
2005-04-21 00:46:28 +00:00
Dr. Stephen Henson
384dba6edb
Make kerberos ciphersuite code compile again.
...
Avoid more shadow warnings.
2005-04-20 21:48:48 +00:00
Dr. Stephen Henson
2c45bf2bc9
Rename typed version of M_ASN1_get M_ASN1_get_x to avoid conflicts.
...
Remove more bogus shadow warnings.
2005-04-20 21:48:06 +00:00
Dr. Stephen Henson
836ec0c764
Stop compiler warnings about deprecated lvalue casts.
2005-04-20 21:39:13 +00:00
Dr. Stephen Henson
5e72fb063a
Stop bogus shadowing warning.
2005-04-20 21:34:29 +00:00
Dr. Stephen Henson
2dc08d5f5d
Process MINFO file earlier in mk1mf.pl so it can modify variables like CFLAGS.
...
Process kerberos include and library options.
2005-04-20 16:22:58 +00:00
Dr. Stephen Henson
00b8abee61
Handle similar mk1mf.pl options with a hash table.
2005-04-20 16:01:50 +00:00
Richard Levitte
7efebab9fd
signed vs. unsigned.
2005-04-20 13:21:10 +00:00
Richard Levitte
a74286d636
Make sure id2_func is properly cast as well...
2005-04-20 13:17:42 +00:00
Richard Levitte
254cfe878e
signed vs. unsigned.
2005-04-20 13:12:33 +00:00
Richard Levitte
ed824195a1
Avoid compiler complaint about mismatched function signatures
...
(void * != char *)
2005-04-20 13:09:46 +00:00
Richard Levitte
22c3600e4c
Resolve signed vs. unsigned.
2005-04-20 12:55:15 +00:00
Richard Levitte
49f386578e
Type mismatch detected by DEC C compiler. void* != void**
2005-04-20 12:53:50 +00:00
Richard Levitte
7c671508bd
Avoid compiler complaint about mismatched function signatures
...
(void * != RSA *)
2005-04-20 10:02:16 +00:00
Dr. Stephen Henson
d3fdc27aa8
Fix logic in mkdef.pl function is_valid.
...
Update symbols
2005-04-19 23:54:44 +00:00
Dr. Stephen Henson
40e950aed6
Stop perl warning.
2005-04-19 18:57:17 +00:00
Dr. Stephen Henson
987bebaf8c
New "algorithm define" OPENSSL_NO_GMP. Update mkdef.pl and Configure script
...
to use it.
2005-04-19 13:24:44 +00:00
Dr. Stephen Henson
65f0efe198
Ignore TYPEDEF_OF in mkdef.pl
2005-04-19 11:49:25 +00:00
Dr. Stephen Henson
e77d8f2ecd
Update year.
2005-04-19 00:15:18 +00:00
Dr. Stephen Henson
f68854b4c3
Various Win32 and other fixes for warnings and compilation errors.
...
Fix Win32 build system to use 'Makefile' instead of 'Makefile.ssl'.
2005-04-19 00:12:36 +00:00
Andy Polyakov
1cfd258ed6
Throw in x86_64 AT&T to MASM assembler converter to facilitate development
...
of dual-ABI Unix/Win64 modules.
2005-04-17 21:05:57 +00:00
Dr. Stephen Henson
04d7d51ea2
Fix from stable branch.
2005-04-17 13:59:36 +00:00
Richard Levitte
2906dc8601
Synchronise with ec/Makefile.
2005-04-17 09:07:37 +00:00
Andy Polyakov
c8d5c71af5
Mitigate cache-timing attack in CBC mode. This is done by implementing
...
compressed tables (2x compression factor) and by pre-fetching them into
processor cache prior every CBC en-/decryption pass. One can argue why
just CBC? Well, it's commonly used mode in real-life applications and
API allows us to amortize the prefetch costs for larger data chunks...
2005-04-16 15:23:21 +00:00
Nils Larsch
ff990440ee
const fixes
2005-04-15 18:29:33 +00:00
Nils Larsch
0e304b7f41
EVP_CIPHER_CTX_init is a void function + fix typo
...
PR: 1044 + 1045
2005-04-15 16:01:35 +00:00
Dr. Stephen Henson
fbe6ba81e9
Check return values of <Digest>_Init functions in low level digest calls.
2005-04-14 22:58:44 +00:00
Andy Polyakov
2b85e23d2e
Prototype mnemonics in padlock_verify_context for better portability
...
[read support for Solaris assembler].
2005-04-14 07:47:10 +00:00
Andy Polyakov
026bb0b96a
Fix for bug emerged in openvpn conext.
2005-04-14 07:41:29 +00:00
Andy Polyakov
6424498226
Final touch to mingw shared.
2005-04-13 23:54:28 +00:00
Andy Polyakov
3ed449e94a
More cover-ups, removing OPENSSL_GLOBAL/EXTERNS. We can remove more...
2005-04-13 21:46:30 +00:00
Andy Polyakov
4f1c33b430
Addenum to http://cvs.openssl.org/chngview?cn=13054 .
2005-04-13 21:10:07 +00:00
Andy Polyakov
1334462ab3
Final(?) touches to mingw shared support.
2005-04-13 21:08:39 +00:00
Andy Polyakov
e62991a07c
Zap OPENSSL_EXTERN on symbols, which are not meant to be local to DLL.
2005-04-13 20:51:42 +00:00
Nils Larsch
52272327f3
Makefile.ssl -> Makefile
2005-04-13 19:09:43 +00:00
Andy Polyakov
1bf955920a
Fix typos.
2005-04-13 15:41:11 +00:00
Andy Polyakov
51d28013db
Introduce OPENSSL_NONPIC_relocated to denote relocated DLLs.
2005-04-13 08:46:35 +00:00
Andy Polyakov
8861ba355d
Parameterize do_solaris rules in Makefile.shared.
2005-04-13 07:22:41 +00:00
Andy Polyakov
9e88c82703
Minor cryptlib.c update: compiler warnings in OPENSSL_showfatal and
...
OPENSSL_stderr stub.
2005-04-13 06:55:42 +00:00
Dr. Stephen Henson
9d2f51c086
Update FAQ.
2005-04-12 16:38:00 +00:00
Dr. Stephen Henson
ad0db060b1
More overwritten stuff...
2005-04-12 16:36:36 +00:00
Dr. Stephen Henson
3547478fc8
Replace overwritten lines before error codes.
2005-04-12 16:17:53 +00:00
Dr. Stephen Henson
29dc350813
Rebuild error codes.
2005-04-12 16:15:22 +00:00
Dr. Stephen Henson
bc3cae7e7d
Include error library value in C error source files instead of fixing up
...
at runtime.
2005-04-12 13:31:14 +00:00
Nils Larsch
37942fab51
include limits.h for UINT_MAX etc.
2005-04-11 20:59:58 +00:00
Richard Levitte
36521f0150
Add a NEWS item for 0.9.7g.
2005-04-11 15:05:45 +00:00
Richard Levitte
4bb61becbb
Add emacs cache files to .cvsignore.
2005-04-11 14:17:07 +00:00
Dr. Stephen Henson
b392e52050
Move allow_proxy_certs declaration to start of function.
2005-04-10 23:41:09 +00:00
Dr. Stephen Henson
0858b71b41
Make kerberos ciphersuite code work with newer header files
2005-04-09 23:55:55 +00:00
Richard Levitte
d9bfe4f97c
Added restrictions on the use of proxy certificates, as they may pose
...
a security threat on unexpecting applications. Document and test.
2005-04-09 16:07:12 +00:00
Nils Larsch
dc0ed30cfe
add support for DER encoded private keys to SSL_CTX_use_PrivateKey_file()
...
and SSL_use_PrivateKey_file()
PR: 1035
Submitted by: Walter Goulet
Reviewed by: Nils Larsch
2005-04-08 22:52:42 +00:00
Nils Larsch
e248596bac
improve docu of SSL_CTX_use_PrivateKey()
2005-04-08 22:49:57 +00:00
Nils Larsch
6049399baf
get rid of very buggy and very imcomplete DH cert support
...
Reviewed by: Bodo Moeller
2005-04-07 23:19:17 +00:00
Nils Larsch
f763e0b5ae
make sure error queue is totally emptied
...
PR: 359
2005-04-07 22:53:35 +00:00
Nils Larsch
eb3eab20a8
const fixes
2005-04-07 22:48:33 +00:00
Andy Polyakov
4848cbf1cf
Recognize MSYS/MINGW environment.
2005-04-07 20:24:29 +00:00
Andy Polyakov
9f2027e56d
Implement OPENSSL_showfatal and make it Win32 GUI and service aware
...
[meaning that it will detect in which context application is running
and either write message to stderr, post a dialog or log an event].
2005-04-07 18:39:45 +00:00
Andy Polyakov
e1d51de41f
Harmonize cygwin/mingw and VC targets.
2005-04-07 15:51:55 +00:00
Andy Polyakov
81ee80ab88
+45% RC4 performance boost on Intel EM64T core. Unrolled loop providing
...
further +35% will follow...
Submitted by: Zou Nanhai
2005-04-06 09:45:42 +00:00
Nils Larsch
7d727231b7
some const fixes
2005-04-05 19:11:19 +00:00
Nils Larsch
69740c2b3f
update progs.pl to reflect changes in progs.h
2005-04-05 18:17:13 +00:00
Nils Larsch
119d1a1dd4
fix example in docu
...
PR: 800
2005-04-05 11:17:03 +00:00
Nils Larsch
70f34a5841
some const fixes and cleanup
2005-04-05 10:29:43 +00:00
Nils Larsch
c2e40d0f9a
remove unused recp method
2005-04-04 18:15:59 +00:00
Andy Polyakov
0abfd60604
Extend Solaris x86 support to amd64.
2005-04-04 17:10:53 +00:00
Andy Polyakov
e5dbccc182
Solaris x86 linker erroneously pads .init segment with zeros instead of
...
nops, which causes SEGV at startup. So I don't align anymore.
2005-04-04 17:07:16 +00:00
Andy Polyakov
f8fa22d826
Some non-GNU compilers (such as Sun C) define __i386.
2005-04-04 17:05:06 +00:00
Bodo Möller
c393222280
HISTORY section: point out change of default digest
2005-04-03 23:53:48 +00:00
Andy Polyakov
60fd574cdf
Make bn/asm/x86_64-gcc.c gcc4 savvy. +r is likely to be initially
...
introduced for a reason [like bug in initial gcc port], but proposed
=&r is treated correctly by senior 3.2, so we can assume it's safe now.
PR: 1031
2005-04-03 18:53:29 +00:00
Ben Laurie
73705abc34
If input is bad, we still need to clear the buffer.
2005-04-03 16:38:22 +00:00
Nils Larsch
12bdb64375
use SHA-1 as the default digest for the apps/openssl commands
2005-04-02 09:29:15 +00:00
Dr. Stephen Henson
7bdf8eed69
Typo
2005-04-01 21:56:15 +00:00
Nils Larsch
48c832b6b7
really clear the error queue here
...
PR: 860
2005-04-01 17:50:09 +00:00
Nils Larsch
f3e427f6f9
use SSL3_VERSION_MAJOR instead of SSL3_VERSION etc.
...
PR: 658
2005-04-01 17:35:32 +00:00
Ben Laurie
8bb826ee53
Consistency.
2005-03-31 13:57:54 +00:00
Richard Levitte
5d1430f390
Add a file with fingerprints that have recently been used to sign
...
OpenSSL distributions, or are about to. This has been requested a
little now and then by users, for years :-/...
2005-03-31 11:51:47 +00:00
Ben Laurie
45d10efc35
Simplicate and add lightness.
2005-03-31 10:55:55 +00:00
Ben Laurie
db3cb0e97a
Get rid of irritating noise.
2005-03-31 10:34:59 +00:00
Ben Laurie
41a15c4f0f
Give everything prototypes (well, everything that's actually used).
2005-03-31 09:26:39 +00:00
Nils Larsch
fea4280a8b
fix header
2005-03-30 21:38:29 +00:00
Nils Larsch
e852b8533f
Makefile.ssl doesn't exist anymore
2005-03-30 21:37:05 +00:00
Ben Laurie
20a3439ea9
Take account of Makefile.ssl removal.
2005-03-30 14:44:50 +00:00
Ben Laurie
a273a2824c
Make tags target useful.
2005-03-30 14:19:21 +00:00
Ben Laurie
24c97c819d
Don't debug.
2005-03-30 14:15:14 +00:00
Ben Laurie
42ba5d2329
Blow away Makefile.ssl.
2005-03-30 13:05:57 +00:00
Nils Larsch
c3e6402857
update docs (recent constification)
2005-03-30 11:50:14 +00:00
Ben Laurie
0821bcd4de
Constification.
2005-03-30 10:26:02 +00:00
Nils Larsch
4a6a2032ed
the second argument of EVP_SealInit is const
2005-03-29 17:50:08 +00:00
Nils Larsch
c01d2b974e
when building with OPENSSL_NO_DEPRECATED defined BN_zero is a macro
...
which cannot be evaluated in an if statement
2005-03-28 15:06:29 +00:00
Bodo Möller
b0ef321cc8
Harmonize with CHANGES as distributed in OpenSSL 0.9.7f.
2005-03-24 01:37:07 +00:00
Ulf Möller
7a8c728860
undo Cygwin change
2005-03-24 00:14:59 +00:00
Richard Levitte
6141b86a49
Change the memory leak FAQ entry to describe the levels of thread safety in each function
2005-03-23 21:14:59 +00:00
Dr. Stephen Henson
23fadaa084
Update FAQ
2005-03-22 20:10:38 +00:00
Dr. Stephen Henson
e27a259696
Doc fixes.
2005-03-22 17:55:33 +00:00
Nils Larsch
41e455bfc4
test, remove unnecessary const cast
2005-03-22 17:55:18 +00:00
Dr. Stephen Henson
59b6836ab2
Ensure (SSL_RANDOM_BYTES - 4) of pseudo random data is used for server and
...
client random values.
2005-03-22 14:11:06 +00:00
Richard Levitte
9fc9b55237
There are cases when there are no files left to verify. Make sure to
...
handle that properly.
2005-03-21 13:52:12 +00:00
Nils Larsch
689c6f2542
add new curves to the loop (with some cleanup from me)
...
Submitted by: Jean-Luc Duval
Reviewed by: Nils Larsch
2005-03-20 23:12:13 +00:00
Nils Larsch
f4bfd357e5
some const fixes
2005-03-20 22:56:07 +00:00
Ulf Möller
130db968b8
Use Windows randomness code on Cygwin
2005-03-19 11:39:17 +00:00
Ulf Möller
8d274837e5
fix breakage for Perl versions that do boolean operations on long words
2005-03-19 11:13:30 +00:00
Ulf Möller
5855038049
typo
2005-03-19 10:19:45 +00:00
Richard Levitte
d18685d959
Added HOWTO about proxy certificates.
2005-03-14 15:39:25 +00:00
Bodo Möller
9f6715d4bb
"make depend". This takes into account the algorithms that are now
...
disabled by default (MDC2 and RC5), which until now were skipped
by "make links" and yet supposedly required by some of the Makefiles,
meaning that the recent snapshots failed to compile.
Problem reported by Nils Larsch.
2005-03-13 19:49:47 +00:00
Bodo Möller
ab185b6038
It seems that Configure revision 1.404 broke "make depend" by hiding
...
from it which algorithms were disabled. With these new changes,
"make depend" will properly take into account algorithms that are skipped.
2005-03-13 19:46:58 +00:00
Andy Polyakov
1642000707
Cygwin to use DSO_FLFCN and mingw to use DSO_WIN32.
2005-03-12 11:28:41 +00:00
Andy Polyakov
f7f2125522
Avoid re-build avalanches with HP-UX make.
2005-03-12 09:12:44 +00:00
Bodo Möller
2b61034b0b
fix potential memory leak when allocation fails
...
PR: 801
Submitted by: Nils Larsch
2005-03-11 09:01:24 +00:00
Bodo Möller
80c808b90b
Fix typo
...
PR: 1017
Submitted by: ciresh@yahoo.com
Reviewed by: Nils Larsch
2005-03-09 19:08:02 +00:00
Bodo Möller
af1048c25c
Take MDC2 patent into account.
2005-03-02 20:22:58 +00:00
Bodo Möller
ecc5ef8793
In addition to RC5, also exclude MDC2 from compilation unless
...
the algorithm is explicitly requested.
2005-03-02 20:11:31 +00:00
Bodo Möller
c9a112f540
Change ./Configure so that certain algorithms can be disabled by default.
...
This is now the case for RC5.
As a side effect, the OPTIONS in the Makefile will usually look a
little different now, but they are essentially only for information
anyway.
2005-02-22 10:29:51 +00:00
Lutz Jänicke
5286db697f
Fix typo on blowfish manual page
...
PR: 1010
Submitted by: Marc Balmer <mbalmer@openbsd.org >
2005-02-19 10:26:18 +00:00
Lutz Jänicke
f69a8aebab
Fix hang in EGD/PRNGD query when communication socket is closed
...
prematurely by EGD/PRNGD.
PR: 1014
Submitted by: Darren Tucker <dtucker@zip.com.au >
2005-02-19 10:19:07 +00:00
Dr. Stephen Henson
9d10b15ef9
Fix possible memory leak.
2005-02-14 21:53:24 +00:00
Andy Polyakov
da30c74a27
Remove unused assembler modules.
2005-02-06 13:43:02 +00:00
Andy Polyakov
67ea999d4a
This patch was "ignited" by OpenBSD 3>=4 support. They've switched to ELF
...
and GNU binutils, but kept BSD make... And I took the opportunity to
unify other targets to this common least denominator...
2005-02-06 13:23:34 +00:00
Andy Polyakov
e1892f2370
Reliable BSD-x86-elf detection in ./config.
2005-02-06 13:20:23 +00:00
Andy Polyakov
fe28866d71
Make Makefile.shared BSD make-friendly, remove more redundant -lc, set up
...
OBJECT_MODE for AIX.
2005-02-06 13:18:40 +00:00
Andy Polyakov
de4ab1e629
Make util/shlib_wrap.sh [Open]BSD-friendly.
2005-02-06 13:15:21 +00:00
Andy Polyakov
216ddfaf6b
Mention no-sse2 option in INSTALL note.
2005-02-06 13:10:23 +00:00
Dr. Stephen Henson
8aa36bcac9
In mkdef.pl ignore trailing whitespace in #ifdef lines
2005-02-05 17:22:14 +00:00
Andy Polyakov
485e30dbe1
Drop redundant -lc from a number of rules in Makefile.shared. It's
...
perfectly safe [compiler driver adds it] and in some situation even
perfectly appropriate [mixing -pthread and -lc on FreeBSD can have
lethal effect on apps/openssl]. I'd say we should get rid of more,
but I remove those I can test myself...
2005-02-03 22:40:40 +00:00
Andy Polyakov
877dbcb8a0
Shut whiny make's up.
2005-02-03 10:19:59 +00:00
Andy Polyakov
62d27939c2
Address run-time linker problems: LD_PRELOAD issue on multi-ABI platforms
...
and SafeDllSearchMode in Windows.
Submitted by: Richard Levitte
2005-02-01 23:48:37 +00:00
Richard Levitte
8c3c570134
The first argument to load_iv should really be a char ** instead of an
...
unsigned char **, since it points at text.
Thanks to Nils Larsch <nils.larsch@cybertrust.com > for pointing out
the inelegance of our code :-)
2005-01-27 11:42:28 +00:00
Richard Levitte
97a1630e81
Oops, == should really be = when used with test ([ and ]).
...
I guess I use bash too much...
Thanks to Peter Sylvester <Peter.Sylvester@edelweb.fr > for pointing it
out to me.
2005-01-27 10:59:36 +00:00
Richard Levitte
bf746f0f46
Check for errors from EVP_VerifyInit_ex(), or EVP_VerifyUpdate might
...
cause a segfault... This was uncovered because EVP_VerifyInit() may fail
in FIPS mode if the wrong algorithm is chosen...
2005-01-27 01:49:25 +00:00
Richard Levitte
a229e3038e
Get rid if the annoying warning
2005-01-27 01:47:31 +00:00
Richard Levitte
4aca9297dc
The mix of CFLAGS and LDFLAGS is a bit confusing in my opinion, and
...
Makefile.shared was a bit overcomplicated.
Make the shell variables LDFLAGS and SHAREDFLAGS in Makefile.shared
get the values of $(CFLAGS) or $(LDFLAGS) as appropriate depending on
the value the shell variables LDCMD and SHAREDCMD get. That leaves
much less chance of confusion, since those pairs of shell variables
always are defined together.
2005-01-26 23:51:20 +00:00
Andy Polyakov
b2c5960935
Respect the fact that most interactive shells don't restore stty settings
...
and make it work in non-interactive mode...
2005-01-26 19:58:15 +00:00
Andy Polyakov
fbdce13e5a
Please BSD make...
2005-01-25 22:09:11 +00:00
Andy Polyakov
e532a6c449
FreeBSD 5 refuses to #include <malloc.h>. Fix compiler warning after
...
http://cvs.openssl.org/chngview?cn=12843 .
2005-01-25 22:07:22 +00:00
Andy Polyakov
14bcdb087f
./Configure to respect $thread_cflag variable.
2005-01-24 15:58:25 +00:00
Andy Polyakov
b7efa56a4a
Fold a bunch of linux and *BSD targets into [linux|BSD]-generic[32|64].
...
Idea is to provide unified "fall-down" case for all rare platforms out
there. ./config is free to enable some optimizations, such as endianness
specification, specific -mcpu flags...
2005-01-24 14:38:14 +00:00
Andy Polyakov
8359421d90
Default to AES u32 being unsinged int and not long. This improves cache
...
locality on 64-bit platforms (and fixes IA64 assembler-empowered build:-).
The choice is guarded by newly introduced AES_LONG macro, which needs
to be defined only on 16-bit platforms which we don't support (not that
I know of). Meaning that one could as well skip long option altogether.
2005-01-24 14:22:05 +00:00
Andy Polyakov
efde5230f1
Improve ECB performance (48+14*rounds -> 18+13*rounds) and reserve for
...
hand-coded zero-copy AES_cbc_encrypt.
2005-01-24 14:14:53 +00:00
Andy Polyakov
f5ffad9d1d
linux-arm target update.
...
PR: 991
2005-01-21 10:32:57 +00:00
Andy Polyakov
57a68b2129
linux-parisc update.
...
PR: 990
Submitted by: Mike Frysinger <vapier@gentoo.org >
2005-01-20 17:00:14 +00:00
Andy Polyakov
bac252a5e3
Bug-fix in CBC encrypt tail processing and commentary section update.
2005-01-20 10:33:37 +00:00
Richard Levitte
a963395a7b
Apparently, at least with my VMS C environment, defining _XOPEN_SOURCE
...
gets _POSIX_C_SOURC and _ANSI_C_SOURCE defined, which stops u_int from
being defined, and that breaks havock into the rest of the standard
headers... *sigh*
2005-01-19 17:03:07 +00:00
Richard Levitte
d8863f0bdb
Small thing. It seems like we have to defined _XOPEN_SOURCE to get
...
isascii() on DEC/Compaq/HP C for VMS.
2005-01-18 16:46:02 +00:00
Andy Polyakov
addb6e16a8
Throw in AES CBC assembler, up to +40% on aes-128-cbc benchmark.
2005-01-18 01:04:41 +00:00
Andy Polyakov
4d27c4c960
Fix a typo in a.out assembler modules.
2005-01-18 00:46:55 +00:00
Andy Polyakov
ed65fab910
Reserve for AES CBC assembler implementation...
2005-01-18 00:43:32 +00:00
Andy Polyakov
90cc40911b
Don't zap AES CBC IV, when decrypting truncated content in place.
2005-01-18 00:26:52 +00:00
Richard Levitte
a7201e9a1b
Changes concering RFC 3820 (proxy certificates) integration:
...
- Enforce that there should be no policy settings when the language
is one of id-ppl-independent or id-ppl-inheritAll.
- Add functionality to ssltest.c so that it can process proxy rights
and check that they are set correctly. Rights consist of ASCII
letters, and the condition is a boolean expression that includes
letters, parenthesis, &, | and ^.
- Change the proxy certificate configurations so they get proxy
rights that are understood by ssltest.c.
- Add a script that tests proxy certificates with SSL operations.
Other changes:
- Change the copyright end year in mkerr.pl.
- make update.
2005-01-17 17:06:58 +00:00
Dr. Stephen Henson
fcd5cca418
PKCS7_verify() performance optimization. When the content is large and a
...
memory BIO (for example from SMIME_read_PKCS7 and detached data) avoid lots
of slow memory copies from the memory BIO by saving the content in a
temporary read only memory BIO.
2005-01-14 17:52:24 +00:00
Andy Polyakov
9222bc6b4e
INSTALL.DJGPP sync.
...
PR: 989
2005-01-14 16:25:36 +00:00
Andy Polyakov
e6d27baf52
Rely on e_os.h to appropriately define str[n]casecmp in non-POSIX
...
environments.
2005-01-13 15:46:09 +00:00
Andy Polyakov
e7e1150706
"Monolithic" x86 assembler replacement for aes_core.c. Up to +15% better
...
performance on recent microarchitectures.
2005-01-13 15:35:44 +00:00
Andy Polyakov
5d727078ac
Fix an "oops" typo! Well, it was a debugging left-over...
2005-01-13 15:25:30 +00:00
Andy Polyakov
108159ffcc
O_NOFOLLOW is not appropriate when opening /dev/* entries on Solaris.
...
PR: 998
2005-01-13 15:20:42 +00:00
Richard Levitte
c4d423511a
Small typo, `mask' got the same value ORed to it twice instead of
...
`mask' and `emask' getting that operation done once each.
Patch supplied by Nils Larsch <nils.larsch@cybertrust.com >
2005-01-12 16:40:48 +00:00
Richard Levitte
b15a93a9c5
Correct a faulty address assignment, and add a length check (not
...
really needed now, but may be needed in the future, who knows?).
2005-01-12 09:53:20 +00:00
Andy Polyakov
d9248e5780
FAQ update to mention no-sha0 as possible workaround for Tru64 compiler bug.
...
Well, no-options seem to be busted in HEAD currently, which should/will be
fixed one way or another (see PR#989 for a possible alternative).
2005-01-09 20:42:33 +00:00
Andy Polyakov
0b52f89b81
DJGPP documentation note update.
2005-01-09 20:14:04 +00:00
Andy Polyakov
7de4b5b060
Permit "monolithic" AES assembler implementations, i.e. such which would
...
replace *whole* aes_core.c, not only AES_[de|en]crypt routines.
2005-01-09 16:01:58 +00:00
Andy Polyakov
02a00bb054
DJGPP update.
...
PR: 989
Submitted by: Doug Kaufman
2005-01-04 10:28:38 +00:00
Andy Polyakov
3b4de6e4cc
Borrow #include <string[s].h> from e_os.h.
2004-12-31 00:00:05 +00:00
Andy Polyakov
bdbc9b4d1a
Make whiny compilers stop complaining about missing prototype.
2004-12-30 23:40:31 +00:00
Andy Polyakov
09ef94d2c9
Fix Win32 test-suit.
2004-12-30 22:55:28 +00:00
Andy Polyakov
3ffb8d42bc
Remove naming conflict between variable and label.
2004-12-30 11:10:11 +00:00
Andy Polyakov
25866e3982
Commentary update for AES IA-64 assembler module.
2004-12-30 10:55:02 +00:00
Andy Polyakov
3b3df98ca6
Minor AES x86 assembler tune-up.
2004-12-30 10:46:03 +00:00
Andy Polyakov
2e4a99f38b
AES-CFB[18] 2x optimization. Well, I bet nobody cares about AES-CFB1
...
performance, but anyway...
2004-12-30 10:43:33 +00:00
Dr. Stephen Henson
e90faddaf8
Prompt for passphrases for PKCS12 input format
2004-12-29 01:07:14 +00:00
Andy Polyakov
f1ce306f30
Oops-kind typos in aes-ia64.S...
2004-12-28 17:10:42 +00:00
Richard Levitte
37b11ca78e
iv needs to be const because it sometimes takes it's value from a
...
const.
2004-12-28 10:35:13 +00:00
Richard Levitte
a17af9e277
Forgot to synchronise the VMS build scripts.
2004-12-28 10:22:00 +00:00
Richard Levitte
6951c23afd
Add functionality needed to process proxy certificates.
2004-12-28 00:21:35 +00:00
Andy Polyakov
de421076a5
Minor cygwin update.
...
PR: 949
2004-12-27 21:27:46 +00:00
Andy Polyakov
bd16cd6bcc
As new major IRIX release is highly unlikely to appear [and break following],
...
I change from -notall to -none synonym in irix rules to improve backward
compatibility with IRIX 5.x.
PR: 987
2004-12-27 14:59:36 +00:00
Andy Polyakov
0c51600203
Remove CPU detect for IRIX targets. Performance gain is less than 1%,
...
it makes more sense to strive for broader binary compatibility...
2004-12-27 14:57:54 +00:00
Andy Polyakov
9850f7f6b2
Remove yet another redundant memcpy. Not at least performance critical,
...
essentially cosmetic modification...
2004-12-26 13:05:40 +00:00
Andy Polyakov
131e064e4a
Eliminate redundant memcpy of IV material. Performance improvement varies
...
from platform to platform and can be as large as 20%.
2004-12-26 12:31:37 +00:00
Andy Polyakov
556b8f3f77
Engage AES x86 assembler module for COFF and a.out targets.
2004-12-26 10:58:39 +00:00
Andy Polyakov
045d3285e2
Engage AES x86 assembler module on ELF platforms.
2004-12-23 21:44:28 +00:00
Andy Polyakov
d1df5b4339
x86 perlasm update to accomodate aes-586.pl.
2004-12-23 21:43:25 +00:00
Andy Polyakov
25558bf743
Eliminate copies of TeN and TdN, use those found in assembler module.
2004-12-23 21:40:23 +00:00
Andy Polyakov
713147109c
AES x86 assembler implementation.
2004-12-23 21:32:34 +00:00
Andy Polyakov
76ef6ac956
Refine PowerPC platform support.
2004-12-20 13:44:34 +00:00
Dr. Stephen Henson
a842df6659
Remove unused buffer 'buf'.
2004-12-20 00:49:36 +00:00
Dr. Stephen Henson
c05a7f5dfd
Don't use multiple storage types.
2004-12-19 01:21:18 +00:00
Geoff Thorpe
627bd6709c
Fix typos in the ecparam doc.
...
Submitted by: Nils Larsch
2004-12-17 05:42:00 +00:00
Richard Levitte
fbf218b8c3
make update (oops, missed this file)
2004-12-13 22:57:39 +00:00
Richard Levitte
3c97bd833b
Change libeay.num so it's synchronised with additions in 0.9.7-stable.
...
make update
2004-12-13 22:57:08 +00:00
Dr. Stephen Henson
abbc186bd2
Fix s_client so it works without a certificate again.
2004-12-13 18:02:23 +00:00
Richard Levitte
de6859e442
Propagate a few more variables to Makefile.shared when linking
...
programs.
2004-12-13 17:28:44 +00:00
Dr. Stephen Henson
5e8904f289
Remove duplicate lines.
2004-12-12 13:15:49 +00:00
Andy Polyakov
0c0788ba0a
Solaris x86 perlasm update.
2004-12-10 11:24:42 +00:00
Andy Polyakov
905fd45b36
Engage SHA1 IA64 assembler on IA64 platforms.
2004-12-09 15:39:55 +00:00
Dr. Stephen Henson
c162b132eb
Automatically mark the CRL cached encoding as invalid when some operations
...
are performed.
2004-12-09 13:35:06 +00:00
Andy Polyakov
b4e0ce5165
SHA1 assembler for IA-64.
2004-12-09 11:57:38 +00:00
Andy Polyakov
17f0e916db
Extend RC4 test.
2004-12-07 11:55:56 +00:00
Dr. Stephen Henson
3dfa23cbc4
Update 'certs' directory. Move expired certificates to expired directory
...
and zero assurance demontrations CAs to 'demo'.
2004-12-05 19:48:02 +00:00
Dr. Stephen Henson
a37e22d866
Use X509_cmp_time() in -checkend option, to support GeneralizedTime.
2004-12-05 18:26:19 +00:00
Dr. Stephen Henson
41c70d47d7
Remaing bits of PR:620 relevant to 0.9.8.
2004-12-05 01:50:56 +00:00
Dr. Stephen Henson
a0e7c8eede
Add lots of checks for memory allocation failure, error codes to indicate
...
failure and freeing up memory if a failure occurs.
PR:620
2004-12-05 01:03:15 +00:00
Dr. Stephen Henson
a8e00b17ce
Update year.
2004-12-05 00:51:41 +00:00
Dr. Stephen Henson
3e66ee9f01
In by_file.c check last error for no start line, not first error.
2004-12-04 21:25:51 +00:00
Dr. Stephen Henson
5b40d7dd97
Add -passin argument to dgst command.
2004-12-03 12:26:56 +00:00
Dr. Stephen Henson
8f284faaec
V1 certificates that aren't self signed can't be accepted as CAs.
2004-12-03 00:10:34 +00:00
Andy Polyakov
f774accdbf
Fix rc4-ia64.S to pass more exhaustive regression tests.
2004-12-02 10:07:55 +00:00
Dr. Stephen Henson
8544a80776
Add couple of OIDs. Resync NIDs for consistency with 0.9.7.
2004-12-01 18:09:53 +00:00
Andy Polyakov
7c69478064
I've introduced a bug to i386 RC4 assembler, which would emerge with
...
certain mix of calls to RC4 routine not covered by rc4test.c.
It's fixed now. In addition this patch inadvertently fixes minor
performance problem: in 0.9.7 context P4 was performing 12% slower
than the original implementation...
2004-12-01 15:28:18 +00:00
Dr. Stephen Henson
1862dae862
Perform partial comparison of different character types in X509_NAME_cmp().
2004-12-01 01:45:30 +00:00
Andy Polyakov
b7b46c9a87
Add 0.9.7 specific comments to RC4 assembler modules.
2004-11-30 15:46:46 +00:00
Mark J. Cox
e6e1f4cb5e
Mention that the keys likely to have signed the distribution are now
...
listed on the web site for easy finding and downloading
2004-11-30 14:34:16 +00:00
Richard Levitte
5073ff0346
Split X509_check_ca() into a small self and an internal function
...
check_ca(), to resolve constness issue. check_ca() is called from the
purpose checkers instead of X509_check_ca(), since the stuff done by
the latter (except for calling check_ca()) is also done by
X509_check_purpose().
2004-11-30 12:18:55 +00:00
Andy Polyakov
fc7fc5678f
sha1_block_asm_data_order can't hash if message crosses 2GB boundary.
2004-11-29 21:19:56 +00:00
Andy Polyakov
7a3240e319
Final touches to rc4/asm/rc4-596.pl, +52% better performance on AMD core.
2004-11-29 21:12:58 +00:00
Richard Levitte
5022e4ecdf
Document the change.
2004-11-29 11:57:00 +00:00
Richard Levitte
30b415b076
Make an explicit check during certificate validation to see that the
...
CA setting in each certificate on the chain is correct. As a side-
effect always do the following basic checks on extensions, not just
when there's an associated purpose to the check:
- if there is an unhandled critical extension (unless the user has
chosen to ignore this fault)
- if the path length has been exceeded (if one is set at all)
- that certain extensions fit the associated purpose (if one has been
given)
2004-11-29 11:28:08 +00:00
Andy Polyakov
914c2a28c0
perlasm/x86[ms|nasm] update to accomodate updated RC4 assembler module.
2004-11-27 15:14:58 +00:00
Andy Polyakov
ea681ba872
Summarize recent RC4 tune-ups.
2004-11-26 15:26:09 +00:00
Andy Polyakov
bc3e7fabe7
Engage RC4 IA-64 assembler module.
2004-11-26 15:12:17 +00:00
Andy Polyakov
d675c74d14
RC4 IA-64 assembler implementation.
2004-11-26 15:07:50 +00:00
Dr. Stephen Henson
59c7029862
Typo.
2004-11-26 01:04:55 +00:00
Dr. Stephen Henson
1582a4073e
Add errstr manual page
2004-11-25 18:21:26 +00:00
Dr. Stephen Henson
401ee37a3e
Allow alternative manual sections to be embedded in .pod file comments.
2004-11-25 17:47:31 +00:00
Dr. Stephen Henson
cb26a20cb1
Update docs
2004-11-25 14:14:25 +00:00
Dr. Stephen Henson
82c4674e47
Update docs.
2004-11-25 14:11:25 +00:00
Dr. Stephen Henson
9d2996b82f
Check return code of EVP_CipherInit() in PKCS#12 code.
2004-11-24 01:21:03 +00:00
Dr. Stephen Henson
3fee255102
Typo.
2004-11-23 21:40:10 +00:00
Dr. Stephen Henson
16df5f066a
Fix memory leak.
2004-11-23 21:22:21 +00:00
Andy Polyakov
959f9b1158
linux-x86_64 didn't link after EM64T RC4 tune-up...
2004-11-23 09:06:12 +00:00
Andy Polyakov
376729e130
RC4 tune-up for Intel P4 core, both 32- and 64-bit ones. As it's
...
apparently impossible to compose blended code with would perform
satisfactory on all x86 and x86_64 cores, an extra RC4_CHAR
code-path is introduced and P4 core is detected at run-time. This
way we keep original performance on non-P4 implementations and
turbo-charge P4 performance by factor of 2.8x (on 32-bit core).
2004-11-21 10:36:25 +00:00
Dr. Stephen Henson
00dd8f6d6e
In "req" exit immediately if configuration file is needed and it can't
...
be loaded instead of giving the misleading:
"unable to find 'distinguised_name' in config"
error message.
2004-11-17 18:36:13 +00:00
Dr. Stephen Henson
5dd87981bf
Update X509v3 doc.
2004-11-17 00:55:43 +00:00
Dr. Stephen Henson
37dccd8ff2
Update X509v3 docs.
2004-11-16 17:45:13 +00:00
Dr. Stephen Henson
826a42a088
PR: 910
...
Add command line options -certform, -keyform and -pass to s_client and
s_server. This supports the use of alternative passphrase sources, key formats
and keys handled by an ENGINE.
Update docs.
2004-11-16 17:30:59 +00:00
Dr. Stephen Henson
19f39703f7
Initial pod documentation of X509V3 config file format.
2004-11-16 14:09:12 +00:00
Dr. Stephen Henson
151368ccba
PR: 940
...
Typo: use prompt_info, not cb_data->prompt_info.
2004-11-14 15:40:00 +00:00
Dr. Stephen Henson
4451c2558e
PR: 923
...
Typo.
2004-11-14 15:11:37 +00:00
Dr. Stephen Henson
4a64f3d665
PR: 938
...
Typo.
2004-11-14 13:55:16 +00:00
Dr. Stephen Henson
5fee606442
Zap obsolete der_chop script.
2004-11-14 00:08:36 +00:00
Dr. Stephen Henson
521aaafc6a
PR: 969
...
Submitted by: David Holmes <davidh@3blackdogs.com >
2004-11-13 13:38:34 +00:00
Dr. Stephen Henson
78df5a2f1e
Fix x509.c so it creates serial number file again if no
...
serial number is supplied on command line.
2004-11-13 13:26:06 +00:00
Richard Levitte
6c9f57d629
Cut'n'paste mistake. All tested OK now...
2004-11-11 19:36:08 +00:00
Richard Levitte
382342ce1d
Whoops, syntactic mistake...
2004-11-11 18:58:01 +00:00
Richard Levitte
69c922f5d2
Some find it confusing that environment variables are set when shared
...
libraries aren't built or used. I can see the point, so I'm
reorganising a little for clarity.
2004-11-11 18:18:43 +00:00
Dr. Stephen Henson
10c8505734
Use the default_md config file value when signing CRLs.
...
PR:662
2004-11-11 13:47:06 +00:00
Dr. Stephen Henson
10f92aac33
Don't return an error with crl -noout.
...
PR:917
Sumbmitted by: Michael Konietzka <konietzka@schlund.de >
2004-11-11 02:13:08 +00:00
Andy Polyakov
68d9e764cb
As was shown by Marc Bevand reordering of couple of load operations
...
results in even higher performance gain of 3.3x:-) At least on
Opteron...
2004-11-09 17:23:26 +00:00
Richard Levitte
8de69cf2c6
Make sure LD_PRELOAD is only set when we build shared libraries (and
...
therefore link with them). Add LD_PRELOAD setting code where it was
still missing.
PR: 966
2004-11-05 09:12:10 +00:00
Richard Levitte
a2ac429da2
Don't use $(EXHEADER) directly in for loops, as most shells will break
...
if $(EXHEADER) is empty.
Notified by many, solution suggested by Carson Gaspar <carson@taltos.org >
2004-11-02 23:55:01 +00:00
Richard Levitte
ffd0f93f14
Because -rpath/-R may have been used, our settings of LD_LIBRARY_PATH
...
and friends may be entirely useless. In such a case, LD_PRELOAD is
the answer, at least on platforms using LD_LIBRARY_PATH. There might
be other variables to set on other platforms, please fill us in...
For now, we only do this with the tests, so they won't fail for silly
reasons like getting dynamically linked to older installed libraries
rather than the newly built ones...
PR: 960
2004-11-02 01:13:04 +00:00
Richard Levitte
1a4b8e7cee
Make sure memmove() is defined, even on SunOS 4.1.4.
...
PR: 963
2004-11-01 07:58:38 +00:00
Dr. Stephen Henson
03386677ed
Update NEWS
2004-10-25 17:11:19 +00:00
Dr. Stephen Henson
559f90ff60
Update FAQ.
2004-10-25 12:36:33 +00:00
Dr. Stephen Henson
c284f20f00
Fix race condition when SSL ciphers are initialized.
2004-10-25 11:14:16 +00:00
Geoff Thorpe
58ae65cd1a
Update ECDSA and ECDH for OPENSSL_NO_ENGINE.
...
Reported by: Maxim Masiutin
Submitted by: Nils Larsch
2004-10-21 00:06:14 +00:00
Richard Levitte
5b0f1f7d13
Because libraries on Windows lack useful version information, the zlib
...
guys had to change the name to differentiate with older versions when
a backward incompatibility came up. Of course, we need to adapt.
This change simply tries to load the library through the newer name
(ZLIB1) first, and if that fails, it tries the good old ZLIB.
2004-10-14 05:48:59 +00:00
Dr. Stephen Henson
785e827323
Oops!
2004-10-04 17:28:31 +00:00
Dr. Stephen Henson
2f605e8d24
Fix race condition when CRL checking is enabled.
2004-10-04 16:30:12 +00:00
Dr. Stephen Henson
5e2216bfa1
Update debug-steve
2004-10-01 11:35:38 +00:00
Dr. Stephen Henson
175ac6811a
Don't use C++ reserved work "explicit".
2004-10-01 11:21:53 +00:00
Andy Polyakov
07d488daf6
Fix Solaris 10_x86 shared build. -Bsymbolic is required to avoid
...
"remaining relocations" in assembler modules. The latter seems to
be new behaviour, elder as/ld managed to resolve this relocations
as internal. It's possible to address this problem differently,
but I settle for -Bsymbolic...
PR: 546
2004-09-28 20:45:10 +00:00
Richard Levitte
d1360f6ecc
usr/doc has recently changed to usr/share/doc on Cygwin.
...
Notified by Corinna Vinschen <vinschen@redhat.com >
2004-09-28 13:10:16 +00:00
Richard Levitte
c38ff58b6b
Move the declaration of alloca() so it's ony declared when really
...
necessary.
2004-09-27 21:59:44 +00:00
Andy Polyakov
c29ef588dc
SHA1 asm Pentium tune-up. Performance loss is not as bad anymore.
2004-09-27 09:37:03 +00:00
Andy Polyakov
968c31bd84
sha256_block advances the input pointer double as fast sometimes. Fix the
...
bug and test that it's actually gone.
PR: 950
2004-09-27 09:35:59 +00:00
Geoff Thorpe
c743966156
Nils Larsch reported that this include is required. Strange that this had
...
gone unnoticed ...
2004-09-24 23:37:52 +00:00
Richard Levitte
bb09fd2bb6
Import changed files from LPlib. The changes are logged as follows
...
for LPdir_unix.c in LPlib. For the other files, only the last log
entry applies.
----------------------------
revision 1.11
date: 2004/09/23 22:07:22; author: _cvs_levitte; state: Exp; lines: +20 -6
Define my own macro LP_ENTRY_SIZE to express the size of my own
buffering of directory entries, and make it depend on whichever comes
first of PATH_MAX and NAME_MAX. As a fallback, make sure it's set to
255 if neither PATH_MAX or NAME_MAX were defined. Also, if the size
given from PATH_MAX or NAME_MAX is less than 255, force LP_ENTRY_SIZE
to be 255.
It makes no harm whatsoever if LP_ENTRY_SIZE is larger than the
maximum local path name limit. It does make a lot of harm if
LP_ENTRY_SIZE is smaller. 255 seemed like a fairly acceptable default
when nothing else is available.
----------------------------
revision 1.10
date: 2004/08/26 13:36:05; author: _cvs_levitte; state: Exp; lines: +13 -13
License correction. I am not REGENTS, just a COPYRIGHT HOLDER.
----------------------------
2004-09-23 22:11:39 +00:00
Geoff Thorpe
280eb33b59
Remove distracting comments and code. Thanks to Nils for picking up on the
...
outstanding ticket.
PR: 926
2004-09-19 04:55:15 +00:00
Geoff Thorpe
f79110c633
Two TODO comments taken care of. Nils pointed out that one of them had already
...
been done, and took care of the other one (which hadn't).
Submitted by: Nils Larsch
Reviewed by: Geoff Thorpe
2004-09-19 04:43:46 +00:00
Geoff Thorpe
6ef2ff62fc
Make -Werror happy again.
2004-09-18 01:32:32 +00:00
Dr. Stephen Henson
980aea7860
Check ASN1_TYPE structure type is a SEQUENCE in PKCS7_get_smimecap().
2004-09-15 23:47:25 +00:00
Dr. Stephen Henson
bd9327baa9
Change values of MBSTRING_* to the form MBSTRING_FLAG|nbyte as assumed
...
in ASN1_STRING_to_UTF8().
2004-09-13 22:33:56 +00:00
Richard Levitte
6f9bafafa3
- There's no more need for the snprintf macro.
...
- Move the inclusion of malloc.h until after all other includes, so we
can do proper tests of system macros.
- Make sure the correct header file is included to get the builtin
"alloca" under VMS, and define a macro to map the symbol 'alloca' to
it.
2004-09-13 09:15:06 +00:00
Richard Levitte
422a4a33a5
Synchronise with Unix build.
2004-09-12 13:02:04 +00:00
Dr. Stephen Henson
58606421ae
When looking for request extensions in a certificate look first
...
for the PKCS#9 OID then the non standard MS OID.
2004-09-10 20:20:54 +00:00
Richard Levitte
d813ff2ac1
make update
2004-09-10 10:30:33 +00:00
Andy Polyakov
36734b2bab
Make VIA Padlock engine more platform friendly and eliminate compiler
...
warning.
Submitted by: Doug Kaufman <dkaufman@rahul.net >
2004-09-09 14:54:12 +00:00
Andy Polyakov
c85c5c408a
x86 assembler updates: more instructions, new OPENSSL_instrument_halt
...
[for DJGPP]...
2004-09-09 14:50:32 +00:00
Richard Levitte
2c1677d703
Synchronise VMS build files with Unixly Makefiles.
2004-09-08 08:13:34 +00:00
Richard Levitte
72348cbb8d
Another symbol longer than 31 characters...
2004-09-08 08:13:03 +00:00
Dr. Stephen Henson
c431798e82
Reformat smime utility.
...
Add support for policy checking in verify utility.
2004-09-07 18:38:46 +00:00
Dr. Stephen Henson
fb80794568
Don't use 'explicit' for variable name.
2004-09-07 00:31:08 +00:00
Dr. Stephen Henson
4ec3d785e5
Reformat smime.c
2004-09-07 00:28:17 +00:00
Dr. Stephen Henson
5d7c222db8
New X509_VERIFY_PARAM structure and associated functionality.
...
This tidies up verify parameters and adds support for integrated policy
checking.
Add support for policy related command line options. Currently only in smime
application.
WARNING: experimental code subject to change.
2004-09-06 18:43:01 +00:00
Dr. Stephen Henson
d993addbed
Stop compiler warnings.
2004-09-06 18:37:46 +00:00
Andy Polyakov
476b6ab541
TABLE OpenBSD-i386 update
2004-08-29 22:05:02 +00:00
Andy Polyakov
16760a3089
Proper support for OpenBSD-i386 shared build, including assember modules!
...
"Proper" means "compiles and passes test." Versioning is broken (I think).
2004-08-29 21:36:37 +00:00
Andy Polyakov
2b247cf81f
OPENSSL_ia32cap final touches. Note that OPENSSL_ia32cap is no longer a
...
symbol, but a macro expanded as (*(OPENSSL_ia32cap_loc())). The latter
is the only one to be exported to application.
2004-08-29 16:36:05 +00:00
Andy Polyakov
746fc2526f
Fix compiler warnings in crypto/evp/bio_ok.c as pointed out by Geoff.
2004-08-29 16:19:27 +00:00
Andy Polyakov
a8c65b400c
crypto/perlasm update primarily to unify Netware modules. Once it's verified
...
x86*_nw.pl will be deleted. In addition this update implements initseg
on several additional [in addition to ELF] platforms. Functions registered
with initseg are supposed to be called prior main().
2004-08-29 16:10:27 +00:00
Andy Polyakov
526975906b
Minor VIA Padlock engine update: eliminate -Wunused warning when *not*
...
compiling the engine and inline memcpy in performance critical pathes.
2004-08-24 09:01:09 +00:00
Andy Polyakov
14fa6ad9f9
Make aes_ctr.c 64-bit savvy.
2004-08-23 22:19:51 +00:00
Richard Levitte
e544b0dc2a
'compatibility', not 'computability' :-)...
2004-08-18 15:48:33 +00:00
Richard Levitte
2549564009
On systems that use case-insensitive symbol names (i.e. they're all
...
converted to upper case or something like that), the application-
level bio_dump_cb() has a name clash with the new library function
BIO_dump_cb(). The easiest fix is to rename the function at the
application level.
2004-08-12 08:58:55 +00:00
Richard Levitte
bb1a915c24
Basically, I wanted to be able to make a dump to a FILE*, and not have
...
to bother creating a BIO around it. So here's a few more functions to
make it possible to make the dump using a printing callback, and to
print to a FILE* (based on the callback variant), done in the same
style as the functions in crypto/err/err_prn.c.
2004-08-11 21:13:57 +00:00
Richard Levitte
b94f886b22
Stupid casts...
2004-08-11 17:41:15 +00:00
Dr. Stephen Henson
6ef7b78e7c
Update FAQ.
2004-08-11 17:22:13 +00:00
Dr. Stephen Henson
e08aad1d14
Make ASN1_INTEGER_cmp() work as expected with negative integers.
2004-08-10 17:40:14 +00:00
Dr. Stephen Henson
b5a93e2250
Call setup_engine after autoconfig.
2004-08-06 12:44:34 +00:00
Dr. Stephen Henson
c128bb0fa2
Don't ignore return value of EVP_DigestInit_ex() in md BIOs and dgst utility.
2004-08-05 18:09:50 +00:00
Geoff Thorpe
30fe028f07
Make a note of the new engine.
2004-08-04 22:42:29 +00:00
Andy Polyakov
b88606c28e
Padlock engine update to fix a typo in MSC assembler and to address
...
potential corruption problem if user manages to inter-leave aligined
and misaligned requests [as well as some MSC-specific tweaks].
2004-08-04 12:58:26 +00:00
Richard Levitte
2ea6abf6e5
DJGPP has opendir() and friends, according to Gisle Vanem <giva@bgnett.no>.
2004-08-03 19:15:21 +00:00
Andy Polyakov
f8c469de73
If they ask for 386, keep it as 386 as possible...
2004-08-02 22:41:19 +00:00
Andy Polyakov
42096e05f7
Avoid a.out name table pollition.
2004-08-02 22:02:17 +00:00
Andy Polyakov
7d15a556f8
Minor clean-up to make Microsoft compiler shut up.
2004-08-02 21:54:40 +00:00
Andy Polyakov
5b17246324
VIA C3 processor extends IA-32 instruction set with instuctions
...
performing AES encryption in hardware, as well as one accessing
hardware RNG. As you surely imagine this engine access this
extended instruction set. Well, only AES for the moment, support
for RNG is to be added later on...
PR: 889
Submitted by: Michal Ludvig <michal@logix.cz >
Obtained from: http://www.logix.cz/michal/devel/padlock/
2004-08-02 21:48:11 +00:00
Andy Polyakov
c77094415f
Cygwin fix-up for shared build.
2004-08-01 21:24:34 +00:00
Andy Polyakov
34413fca84
OpenBSD fix-up for new a.out targets. OpenBSD .s.o rule is busted...
2004-08-01 21:16:26 +00:00
Andy Polyakov
ec38ddc765
Clean-up GAS targets: get rid of "cpp" stuff and replace it with "purified"
...
COFF and a.out targets [similar to ELF targets]. You might notice some
rudementary support for shared mingw builds under cygwin. It works (it
produces cryptoeay32.dll and ssleay32.dll with everything exported by
name), but it's primarily for testing/debugging purposes, at least for
now...
2004-08-01 17:33:58 +00:00
Andy Polyakov
8aae01e223
Deprecate cpp and gaswin targets. New coff fills in for gaswin, but cpp is
...
going out...
2004-08-01 17:03:50 +00:00
Andy Polyakov
00555c2f2f
DLLEntryPoint is a collective name, not what linker looks for. However,
...
if we explicitly intruct the linker to set entry point, then we become
obliged to initialize run-time library. Instead we can pick name run-time
will call and such name is DllMain. Note that this applies to both
"native" Win32 environment and Cygwin:-)
2004-08-01 14:27:43 +00:00
Richard Levitte
07d80f6f35
We build the crypto stuff, not the ssl stuff, in this command procedure...
2004-07-29 22:25:59 +00:00
Richard Levitte
4591850561
The compiler may complain about what looks like a double definition of a
...
static variable
2004-07-27 13:58:27 +00:00
Dr. Stephen Henson
a25aca2943
Oops, wrong version...
2004-07-27 00:19:58 +00:00
Dr. Stephen Henson
48c524827b
Add FIPS library name to error routines.
2004-07-27 00:19:18 +00:00
Andy Polyakov
ebaec63e3e
This is so to say "damage control" for jumbo "cpuid" patch, see
...
http://cvs.openssl.org/chngview?cn=12493 . Now all platform should
be operational, while SSE2 code pathes get engaged on ELF platforms
only.
2004-07-26 22:01:50 +00:00
Andy Polyakov
14e21f863a
Add framework for yet another assembler module dubbed "cpuid." Idea
...
is to have a placeholder to small routines, which can be written only
in assembler. In IA-32 case this includes processor capability
identification and access to Time-Stamp Counter. As discussed earlier
OPENSSL_ia32cap is introduced to control recently added SSE2 code
pathes (see docs/crypto/OPENSSL_ia32cap.pod). For the moment the
code is operational on ELF platforms only. I haven't checked it yet,
but I have all reasons to believe that Windows build should fail to
link too. I'll be looking into it shortly...
2004-07-26 20:18:55 +00:00
Andy Polyakov
f10725a6e1
Zero key-length for HMAC is apparently OK.
2004-07-25 20:24:49 +00:00
Andy Polyakov
0f71b77d5c
Make bio_ok.c Microsoft compiler savvy.
2004-07-25 20:13:30 +00:00
Andy Polyakov
d6bb6a88be
Typos, typos...
2004-07-25 20:09:56 +00:00
Andy Polyakov
3205db2bfe
Make bio_ok.c 64-bit savvy.
2004-07-25 19:37:41 +00:00
Andy Polyakov
6f86850eec
Stricter boundary condition check in HMAC_Init_ex.
2004-07-25 19:25:05 +00:00
Andy Polyakov
16ab8a93bc
Minor 64-bit md32_common.h update and minor unsignification of digests.
2004-07-25 19:10:43 +00:00
Andy Polyakov
c88f8f76b5
'apps/openssl dgst -help' update and minor apps/speed.c update.
2004-07-25 18:57:35 +00:00
Andy Polyakov
fbf96849e9
Make SHA-256/-512 optional. Note that no-sha switches off *all* SHA.
2004-07-25 18:25:24 +00:00
Andy Polyakov
d70e2507f8
Some compilers are just too whiny. Nothing makes Microsoft compiler
...
stop complaining about loss of precision, but explicit cast.
2004-07-25 17:00:56 +00:00
Andy Polyakov
2fcf435d73
Some compilers are just too whiny. DEC C doesn't like long long...
2004-07-25 16:54:08 +00:00
Andy Polyakov
da2ee71de5
Typos and due casts. As for the latter. It's "safe" to cast as below,
...
because "wrong" casts will either be optimized away or never performed.
2004-07-25 16:48:28 +00:00
Andy Polyakov
8611934352
Minor HP-UX make update. IA-64-based HP-UX favor .so extension for shared
...
libraries. Old .sl extension works just fine, but it .so which is default.
2004-07-24 14:17:32 +00:00
Andy Polyakov
01e94efd46
TABLE update.
2004-07-23 23:29:25 +00:00
Andy Polyakov
33c3ecf741
Build-n-link new IA-64 modules on Linux and HP-UX.
2004-07-23 23:27:10 +00:00
Andy Polyakov
5bd4c26057
Various IA-64 assembler fix-ups.
2004-07-23 22:54:18 +00:00
Andy Polyakov
4aa5889e1a
VC-NT was taken away by mistake, putting it back...
2004-07-23 20:46:41 +00:00
Andy Polyakov
bafcc7e060
Win64 placeholder targets. This is merely naming suggestion. As we know
...
Win64 comes in two flavors, IA-64/Itanium and AMD64/Opteron. The
suggestion is to refer to former as WIN64I and latter - WIN64A
2004-07-23 19:18:20 +00:00
Andy Polyakov
afe67fb28e
Adapt rc4-amd64.pl for Win64/AMD64 assembler.
2004-07-23 17:51:17 +00:00
Richard Levitte
f744f92adb
From LPlib:
...
Apparently, the length *including* the NUL byte should be used.
Contributed by Andy Polyakov <appro@fy.chalmers.se >
2004-07-22 18:34:06 +00:00
Richard Levitte
75f134c077
From LPlib:
...
Make a nicer comment, as we don't really know for sure that it's
really needed, and just want to play on the safe side.
Suggest by Andy Polyakov <appro@fy.chalmers.se >
2004-07-22 13:00:14 +00:00
Andy Polyakov
d8d25c9603
WinCE should always be compiled as UNICODE, even debugging version...
2004-07-22 11:08:31 +00:00
Andy Polyakov
f1bdf1d518
#include <limits.h> is required at least on HP-UX and IRIX. And what's
...
with HP-UX offering 14 for NAME_MAX?
2004-07-22 10:53:26 +00:00
Andy Polyakov
d58caee734
EVP_Digest is size_t-fied, clean up test programs accordingly.
2004-07-22 10:25:52 +00:00
Andy Polyakov
e39c2548f5
Run SHA-256/-512 tests through EVP...
2004-07-22 10:21:13 +00:00
Andy Polyakov
8169dd73f9
All SIXTY_FOUR_BIT platforms (mind the difference between SIXTY_FOUR_BIT and
...
SIXTY_FOUR_BIT_LONG) were failing to pass 'cd test; make test_bn'.
2004-07-22 09:32:11 +00:00
Richard Levitte
765e231a7c
From LPlib:
...
Some code beautification.
Change the macro CP_THREAD_ACP to CP_ACP, because the latter is more
widely defined.
Add a conditional macro definition in case FindFirstFile and
FindNextFile aren't properly defined (might happen on WinCE).
Suggested by Andy Polyakov <appro@fy.chalmers.se >
2004-07-21 21:16:21 +00:00
Andy Polyakov
89c53672c2
Make rand_win.c UNICODE savvy.
2004-07-21 17:17:30 +00:00
Richard Levitte
64ba6cf222
From LPlib:
...
Windows changes that detects if multibyte characters are available and
deals with them properly.
Contributed by Andy Polyakov <appro@fy.chalmers.se >
2004-07-20 21:24:43 +00:00
Richard Levitte
210a4f78ae
Imported from LPlib, making sure the entry name (at least on Unix) is
...
NUL-teminated at all times, and that we don't make unneeded calls to
free().
2004-07-19 16:36:28 +00:00
Richard Levitte
334ef04949
Since version 7.0, The C RTL in VMS handles time in terms of UTC
...
instead of local time.
2004-07-19 07:50:43 +00:00
Andy Polyakov
859ceeeb51
Anchor AES and SHA-256/-512 assembler from C.
2004-07-18 17:26:01 +00:00
Andy Polyakov
22edcae7fa
Type in Configure and TABLE update.
2004-07-18 16:22:53 +00:00
Andy Polyakov
d0590fe6b2
Add anchors for AES, SHA-256/-512 assembler modules and SSE2 code pathes.
...
I also used this opportunity to clean up some out-of-date targets and
re-group targets by OS.
2004-07-18 16:19:34 +00:00
Andy Polyakov
2232b10f5a
Add licensing terms.
2004-07-17 13:24:58 +00:00
Andy Polyakov
e34794dd1b
IA-64 is intolerant to misaligned access. It was a problem on Win64 as
...
we were mislead by _MSC_VER macro, which is defined by *all* Windows
Microsoft compilers.
2004-07-17 12:55:55 +00:00
Geoff Thorpe
0210065bbd
Quick fix.
...
Submitted by: Nils Larsch
2004-07-16 03:24:51 +00:00
Geoff Thorpe
7f5b4dd1e8
Using Horner's algorithm to evaluate the ec polynomial
...
(suggested by Adam Young <ayoung@cigital.com >)
Submitted by: Nils Larsch
2004-07-16 03:24:19 +00:00
Richard Levitte
5906e8d5fe
I think it could be a good thing to know what went wrong with the tests...
2004-07-12 12:25:54 +00:00
Richard Levitte
5545607c4f
make update
...
(incidently, this also tells VMS that there exists a new symbol in the
SSL library)
2004-07-12 11:25:48 +00:00
Richard Levitte
6ac1571296
Because it's one of our libraries calling new functions in the other,
...
we need to have them among the symbols that should appear in the
transfer table, at least on VMS (and it wouldn't surprise me if
Windows would whine as well).
2004-07-12 11:24:55 +00:00
Bodo Möller
ca74b76f3e
improve wording
2004-07-12 06:23:28 +00:00
Richard Levitte
2b6174c478
Some test programs in crypto/sha were named differently than usual...
2004-07-11 20:30:33 +00:00
Richard Levitte
2b002273f3
'SSL_add_dir_cert_subjects_to_stack' is longer than 31 characters.
...
Lucky me, I had prepared for this :-).
2004-07-11 20:22:37 +00:00
Richard Levitte
15d155e45a
o_dir needs to be compiler with the warnings about dollar signs in
...
identities disabled.
2004-07-11 20:21:56 +00:00
Richard Levitte
b0841348b6
In some cases, EVMSERR isn't visible (that's fairly new...).
...
Don't have a constant that you're going to assign to, that's just
plain stupid (I was the stupidhead here...).
2004-07-11 20:21:19 +00:00
Andy Polyakov
090e81d4aa
Integration of RC4 AMD64 module.
2004-07-11 16:49:09 +00:00
Andy Polyakov
e4528e48e3
RC4 tune-up for AMD64. Performance improvement of 2.22x is measured for
...
linux-x86_64 target.
2004-07-11 16:44:07 +00:00
Bodo Möller
235dee1421
BIS correction/addition
2004-07-11 08:58:43 +00:00
Richard Levitte
d28f7bc74d
make update
2004-07-10 13:18:23 +00:00
Richard Levitte
4083a229b4
Use the new directory reading functions.
2004-07-10 13:17:16 +00:00
Richard Levitte
a2400fcab8
Copy a few files from LPlib (a new project of mine), add a wrapper.
...
Now we have directory reading capabilities for VMS as well, and all
of it in a fairly general manner.
2004-07-10 13:16:02 +00:00
Richard Levitte
dc56eb5079
o_str.c: Windows doesn't have <strings.h>, and since we use _strnicmp() and
...
_stricmp() on that platform, use the appropriate header file for it,
<string.h>.
o_str.h: we only want to get size_t, which is defined in <stddef.h>.
Philippe Bougeret <philippe.bougeret@freesbee.fr > notified us about Windows
not having a <strings.h>
2004-07-08 08:32:48 +00:00
Dr. Stephen Henson
637ff35ef6
Delta CRL support in extension code.
2004-07-06 17:16:40 +00:00
Geoff Thorpe
ace3ebd661
Improve error handling if decompression of an ec point fails, and cleanup
...
ec_curve.c (unify comments, etc).
Submitted by: Nils Larsch
Reviewed by: Bodo Moeller, Geoff Thorpe
2004-07-06 15:50:04 +00:00
Dr. Stephen Henson
eea674567c
Delete non-POSIX header file.
2004-07-04 16:48:27 +00:00
Dr. Stephen Henson
c39c32dd65
PKCS#8 fixes from stable branch.
2004-07-04 16:44:52 +00:00
Dr. Stephen Henson
0efea28dcb
Don't try to parse non string types.
2004-07-01 18:15:33 +00:00
Dr. Stephen Henson
4bab9b763d
Stop compiler warnings with debug-steve
2004-07-01 18:14:31 +00:00
Richard Levitte
70696f4525
Explain a little better what BN_num_bits() and BN_num_bits_word() do.
...
Add a note as to how these functions do not always return the key size, and
how one can deal with that.
PR: 907
2004-07-01 12:33:39 +00:00
Andy Polyakov
80bbc9ceaf
Minor (+12% on P4) performance tweak for sha512_block_sse2.
2004-07-01 11:29:00 +00:00
Andy Polyakov
51ce5230cd
AES assembler implementation for IA-64. Note that there is no anchor from
...
C code yet...
2004-07-01 11:15:23 +00:00
Andy Polyakov
b6d8ba11e9
New SHA algorithms assembler implementation for IA-64. Note that despite
...
module name both SHA-256 and SHA-512 are supported.
2004-07-01 11:13:44 +00:00
Andy Polyakov
e2f2a9af2c
New scalable bn_mul_add_words loop, which provides up to >20% overall
...
performance improvement. Make module more gcc friendly and clarify
copyright issues for division routine.
2004-07-01 11:10:38 +00:00
Richard Levitte
28a8003467
Changes for VOS, submitted by Paul Green <Paul.Green@stratus.com>.
...
PR: 499
2004-06-28 22:01:37 +00:00
Richard Levitte
563cd0f2b0
Make the tests of EVP operations without padding. As a consequence,
...
there's no need for a larger BUFSIZE any more...
PR: 904
2004-06-28 16:32:12 +00:00
Richard Levitte
3ac0f28837
Make sure that the buffers are large enough to contain padding.
...
PR: 904
2004-06-28 12:23:35 +00:00
Richard Levitte
47c1735acd
NetWare fixes provided by Verdon Walker for OpenSSL 0.9.8-dev.
...
The changes have been mailed to <crypt@bis.doc.gov > as well.
PR: 903
2004-06-28 11:55:28 +00:00
Richard Levitte
7d3932e8cf
Linux on ARM needs -ldl
...
PR: 905
2004-06-28 10:31:03 +00:00
Dr. Stephen Henson
8a60547896
Reformat pkcs8 source.
2004-06-24 13:10:54 +00:00
Geoff Thorpe
d459e39012
Tidy up, including;
...
- Remove unused and unuseful debug cruft.
- Remove unnecessary 'top' fudging from BN_copy().
- Fix a potential memory leak and simplify the expansion logic in
BN_bin2bn().
Submitted by: Nils Larsch
Reviewed by: Geoff Thorpe
2004-06-20 04:16:12 +00:00
Geoff Thorpe
340f5856ec
Incomplete initial sweep over the engine code. Mainly reducing some
...
comment-noise to managable levels and inverting the sense of the "uptodate"
boolean (which was counter-intuitive the way I'd left it).
2004-06-19 03:58:42 +00:00
Geoff Thorpe
df11e1e921
Deprecate unused cruft, and "make update".
2004-06-17 23:50:25 +00:00
Geoff Thorpe
6a6592962c
Attempt to bring the 'engine' documentation up to date w.r.t missing
...
prototypes, etc. Also, some fairly significant edits were made to the text
(who wrote this crap anyway? oh wait ...), removing stuff which is
overkill, rewriting stuff that was opaque, correcting things that were just
downright false, etc.
2004-06-17 23:40:14 +00:00
Geoff Thorpe
1275c4569e
Minor change to group like functions together.
2004-06-17 23:35:45 +00:00
Geoff Thorpe
afbe74d386
Actually, that last change to BN_get_word() was a little too simple.
2004-06-17 22:05:40 +00:00
Geoff Thorpe
f18ea6cae9
Get rid of signed/unsigned warnings, and teach CVS about new things to
...
ignore.
2004-06-17 20:28:28 +00:00
Geoff Thorpe
c9ff40cecd
Tweak my debug target flags.
2004-06-17 20:26:21 +00:00
Geoff Thorpe
9088d5f24f
As Nils put it;
...
Yet another question: some time ago you changed BN_set_word.
Why didn't you change BN_get_word as well?
Quite. I'm also removing the older commented-out implementations to improve
readability. This complex stuff seems to date from a time when the types
didn't match up well.
Submitted by: Nils Larsch, Geoff Thorpe
2004-06-17 20:13:50 +00:00
Geoff Thorpe
cf9056cfda
BN_div_word() was breaking when called from BN_bn2dec() (actually, this is
...
the only function that uses it) because it would trip up an assertion in
bn_div_words() when first invoked. This also adds BN_div_word() testing to
bntest.
Submitted by: Nils Larsch
Reviewed by: Geoff Thorpe
2004-06-17 20:03:56 +00:00
Richard Levitte
f7fc4ca1dd
Making some values explicitely unsigned was derived from ongoing work
...
that isn't yet committed. It wasn't meant to be committed already, so
I'm removing it for now.
2004-06-15 12:52:26 +00:00
Richard Levitte
132fc53223
Typo, setting the first element of nids[] to NULL instead of setting
...
*cnids.
2004-06-15 11:45:42 +00:00
Geoff Thorpe
b3b6720944
Correct the return codes for ecdsatest.
...
Submitted by: Nils Larsch
Reviewed by: Geoff Thorpe
2004-06-14 23:37:32 +00:00
Lutz Jänicke
9f6ea7163b
More precise explanation of session id context requirements.
2004-06-14 13:27:28 +00:00
Andy Polyakov
385c8e89f4
SHA fails to compile on x86_64 if compiled with custom flags, without
...
recommended -DMD32_REG_T=int in particular.
PR: 893
Submitted by: Michal Ludvig <michal-list@logix.cz >
2004-06-11 17:50:57 +00:00
Geoff Thorpe
263e3151e2
"no-engine" was being ignored, so remove it from the advertised syntax.
...
Also remove some commented-out lines of code that deny CVS its purpose.
2004-06-03 03:34:53 +00:00
Geoff Thorpe
9081980565
This fixes the installation target for dynamic engines, which was trying to
...
install to a different location than it had created. (BTW, VMS will need a
matching fix in eng_list.c.) Note, these aren't ssl-specific, so I'm
putting "engines/" into the libs directory rather than at the "--prefix"
level or inside "ssl/".
2004-06-01 03:18:58 +00:00
Andy Polyakov
393b704d28
Minimal work-around for ./engine shared builds. "Minimal" means that I
...
think that proper Makefile clean-up is required.
2004-05-31 22:29:26 +00:00
Andy Polyakov
bef26f1158
32-bit PA-RISC requires -Bsymbolic when linking libcrypto.sl. Without
...
this flag RAND_poll ends up in end-less loop calling RAND_add. But
don't ask me why...
2004-05-31 17:10:49 +00:00
Andy Polyakov
bc1ca8605c
Working on HP-UX shared support...
2004-05-31 14:50:19 +00:00
Andy Polyakov
ad5003409d
Mention new SHA algorithms in CHANGES. This completes the integration.
2004-05-31 14:03:02 +00:00
Andy Polyakov
057cfaf2f8
Extend HMAC_MAX_MD_CBLOCK to accomodate SHA-512.
2004-05-31 13:28:23 +00:00
Richard Levitte
914d36ba19
make update
2004-05-31 13:16:08 +00:00
Andy Polyakov
31c2ac1cdc
EVP bindings to new SHA algorithms.
2004-05-31 13:14:08 +00:00
Andy Polyakov
6bca8e3886
objects.txt update for SHA-224/-256/-384/-512. SHA-224 ids still appear
...
"draft," but we have to start somewhere...
Submitted by: Nils Larsch <nlarsch@compuserve.de >
2004-05-31 13:07:19 +00:00
Andy Polyakov
63ba7e293f
Make sha-256/-512 naming in speed.c consistent with their names as they
...
will appear at EVP leyer.
2004-05-31 12:40:22 +00:00
Andy Polyakov
31e9b9b2e9
Typo in commentary section.
2004-05-31 12:30:41 +00:00
Andy Polyakov
7997b13aa3
Final SHA-256/-512 touches. Extra md_len field in SHA[256|512]_CTX
...
reserves for truncated hash function output mode and makes SHA224
thread-safe. Next stop is integration with EVP and we're done...
2004-05-31 12:26:18 +00:00
Andy Polyakov
a2eb9688a4
Kill unused macro and reimplement it for that single context it can
...
actually be used, namely x86* platforms [because they don't bomb on
unaligned access]. This resulted in 30-40% [depending on message
length] improvement for SHA-256 compiled with gcc and running on P4.
In the lack of assembler implementation I give the compiler all the
help it can possibly get:-)
2004-05-31 12:06:27 +00:00
Richard Levitte
af2bf07404
SHA224_Update() and SHA224_Final() aren't implemented, and since
...
SHA224() uses SHA256_Update() and SHA256_Final() instead, let's just
create aliases in form of macros.
make update
2004-05-30 16:58:33 +00:00
Andy Polyakov
8c5dfa4c99
Typo in linux-ppc64 target.
2004-05-29 20:32:54 +00:00
Andy Polyakov
8d9fb0f04a
gcc -Wcast-qual clean-up.
2004-05-29 19:11:29 +00:00
Andy Polyakov
15fd2de37c
hpux-shared rules to cover even for GNU ld.
2004-05-28 22:38:05 +00:00
Andy Polyakov
1a83c37294
Unified hpux-shared rule. Verified with both 32- and 64-bit builds and
...
both vendor and GNU compilers. ./engine shared build are still busted.
I mean always were...
2004-05-28 22:18:48 +00:00
Andy Polyakov
674ee8b72d
Make sure we return 0 if test passed.
2004-05-28 21:42:40 +00:00
Andy Polyakov
1809e858bb
Eliminate compiler warnings and throw in performance table.
2004-05-28 10:15:58 +00:00
Andy Polyakov
2bbc970e10
Attempt to unify hpux-shared rules. More adjustments might be required
...
after more tests...
2004-05-27 22:23:40 +00:00
Andy Polyakov
da8348e938
SHA-224 test vectors added.
2004-05-27 19:46:07 +00:00
Richard Levitte
ef16f45081
Since num is now a size_t, it's not necssary to check for less than 0,
...
AND it avoids warnings on certain systems.
2004-05-27 09:20:42 +00:00
Richard Levitte
4d692e1ba0
Synchronise VMS with the Unixly Malefiles.
2004-05-26 17:05:51 +00:00
Andy Polyakov
6577e16920
Documentation note for Win32 glue between BIO layer and compiler run-time.
2004-05-25 20:32:17 +00:00
Andy Polyakov
3fc378aa0b
Framework for glueing BIO layer and Win32 compiler run-time. Goal is to
...
make it possible to produce for a unified binary build, which can be
used with a variety of Win32 compilers.
2004-05-25 20:31:03 +00:00
Richard Levitte
f2bfbcef76
make update
2004-05-25 09:41:00 +00:00
Richard Levitte
6713a4835f
Move some COMP functions to be inside the #ifndef OPENSSL_NO_COMP
...
wrapping preprocessor directive. This also removes a duplicate
declaration.
2004-05-20 23:47:57 +00:00
Andy Polyakov
46ceb15c39
SHA-256/-512 test and benchmark.
2004-05-20 21:49:38 +00:00
Andy Polyakov
109d3123c3
While size_t-fying let's not forget to update documentation:-)
2004-05-20 21:39:50 +00:00
Andy Polyakov
63077bd40c
SHA-256/-512 update. A bug fix, SHA-512 tune-up for AMD64, hook for SSE2
...
code, Makefile update.
2004-05-20 21:24:41 +00:00
Andy Polyakov
df364f1b00
Stress collector/padding function.
2004-05-20 21:20:19 +00:00
Andy Polyakov
bc767216d9
Final API adaptation. Final, "all openssl" performance numbers [not mixture
...
of different implementations]. Real-life performance improvement is rated
at 2-3x, not 6x as preliminary announced.
2004-05-20 21:18:09 +00:00
Dr. Stephen Henson
cacd830f02
Delete unused function from libeay.num, replace with one
...
that does exist.
2004-05-19 17:08:05 +00:00
Dr. Stephen Henson
eda52e175a
Delete obsolete and unimplemented function.
2004-05-19 17:05:02 +00:00
Dr. Stephen Henson
665560e9a4
Add SHA256 and SHA512 algorithms to mkdef.pl.
...
Fix mkdef.pl script to avoid infinite loop when
parsing sha.h.
2004-05-19 17:03:59 +00:00
Richard Levitte
c4fc8b5bf4
X509_policy_lib_init is declared but not defined, so it raises havoc
...
when trying to build a shared library on VMS or Windows...
2004-05-19 14:19:51 +00:00
Geoff Thorpe
9c52d2cc75
After the latest round of header-hacking, regenerate the dependencies in
...
the Makefiles. NB: this commit is probably going to generate a huge posting
and it is highly uninteresting to read.
2004-05-17 19:26:06 +00:00
Geoff Thorpe
0f814687b9
Deprecate the recursive includes of bn.h from various API headers (asn1.h,
...
dh.h, dsa.h, ec.h, ecdh.h, ecdsa.h, rsa.h), as the opaque bignum types are
already declared in ossl_typ.h. Add explicit includes for bn.h in those C
files that need access to structure internals or API functions+macros.
2004-05-17 19:14:22 +00:00
Geoff Thorpe
f0eae953e2
Remove some unnecessary recursive includes from the internal apps.h header,
...
and include bn.h in those C files that need bignum functionality.
2004-05-17 19:05:32 +00:00
Geoff Thorpe
298a2f9e58
Because of recent reductions in header interdependencies, these files need
...
to include crypto.h directly.
2004-05-17 19:01:15 +00:00
Geoff Thorpe
ac0d0a5ecd
I can't verify this directly, but recent changes will probably require that
...
the cryptodev implementation include bn.h directly (when building with
OPENSSL_NO_DEPRECATED that is).
2004-05-17 18:58:47 +00:00
Geoff Thorpe
f15390bdb4
The inclusion of bn.h from the engine.h API header has been deprecated, so
...
the engine implementations need to include bn.h to manipulate bignums.
2004-05-17 18:56:15 +00:00
Geoff Thorpe
d095b68d63
Deprecate quite a few recursive includes from the ssl.h API header and
...
remove some unnecessary includes from the internal header ssl_locl.h. This
then requires adding includes for bn.h in four C files.
2004-05-17 18:53:47 +00:00
Geoff Thorpe
508999fa7d
Deprecate some recursive includes from the store.h API header, and put back
...
required includes back via the internal header and str_lib.c.
2004-05-17 18:49:06 +00:00
Geoff Thorpe
210a21bc8d
Reduce dependencies on crypto.h by moving the opaque definition of
...
CRYPTO_EX_DATA and the new/free/dup callback prototypes to ossl_typ.h.
2004-05-17 18:39:00 +00:00
Geoff Thorpe
678c1e025b
Moving opaque definitions to ossl_typ.h lets us reduce header dependencies.
...
Deprecate inclusion of crypto.h from ui.h.
2004-05-17 18:01:28 +00:00
Andy Polyakov
1ab61a9179
Make reservations for FIPS code in HEAD branch, so that the moment FIPS
...
comes in we have required macros in place.
2004-05-17 15:49:13 +00:00
Geoff Thorpe
d6dda126b7
Make some more API types opaquely available from ossl_typ.h, meaning the
...
corresponding headers are only required for API functions or structure
details. This now includes the bignum types and BUF_MEM. Subsequent commits
will remove various dependencies on bn.h and buffer.h and update the
makefile dependencies.
2004-05-15 18:32:08 +00:00
Geoff Thorpe
7771b6c5b5
This file implements various functions that have since been redefined as
...
macros. I'm removing this from the NO_DEPRECATED build.
2004-05-15 18:26:15 +00:00
Dr. Stephen Henson
4843acc868
Fixes so alerts are sent properly in s3_pkt.c
...
PR: 851
2004-05-15 17:55:07 +00:00
Andy Polyakov
9e0aad9fd6
size_t-fication of message digest APIs. We should size_t-fy more APIs...
2004-05-15 11:29:55 +00:00
Richard Levitte
1c7a0e2856
Reimplement old functions, so older software that link to libcrypto
...
don't crash and burn.
2004-05-14 17:56:30 +00:00
Richard Levitte
abd23881c1
Synchronise o_str.c between 0.9.8-dev and 0.9.7-stable.
2004-05-13 22:39:56 +00:00
Richard Levitte
d1739eb2d6
make update
2004-05-13 21:38:47 +00:00
Richard Levitte
2faa930bb0
Let's make life easier and have the VMS version of the configuration be
...
generated from the Unixly configuration file.
2004-05-13 21:38:26 +00:00
Andy Polyakov
e14f4aab0a
CHANGES to mention improved PowerPC platform support.
2004-05-13 13:58:44 +00:00
Andy Polyakov
c842261b1b
SHA-224/-256/-384/-512 implementation. This is just sheer code commit.
...
Makefile modifications, make test, etc. will appear later...
2004-05-13 13:48:33 +00:00
Dr. Stephen Henson
df368ecce4
Make self signing option of 'x509' use random serial numbers too.
2004-05-12 18:20:37 +00:00
Andy Polyakov
1e6bccc240
SSE2 SHA512_Transform implementation. No, it's not used anywhere yet and
...
is subject to change as C implementation is added...
2004-05-06 10:41:07 +00:00
Andy Polyakov
d3adc3d3ed
SSE2 accelerated bn_mul_add_words. Code is currently disabled till proper
...
config and run-time support is added.
PR: 788
Submitted by: <dean@arctic.org >
Reviewed by: <appro>
Obtained from: http://arctic.org/~dean/crypto/rsa.html
2004-05-06 10:36:49 +00:00
Andy Polyakov
10e7d6d526
Support for IA-32 SSE2 instruction set.
2004-05-06 10:31:09 +00:00
Richard Levitte
8d472bdd84
Remove the creation of $(INSTALL_PREFIX)$(OPENSSLDIR)/lib, since we don't
...
use it.
Notified by Frédéric L. W. Meunier <0@pervalidus.tk > in PR 713
2004-05-06 09:46:41 +00:00
Richard Levitte
430d7afd80
When the pointer 'from' changes, it's stored length needs to change as
...
well.
Notified by Frank Kardel <kardel@acm.org > in PR 879.
2004-05-06 09:33:22 +00:00
Geoff Thorpe
ca982e4870
Fix realloc usage in ec_curve.c
...
Submitted by: Nils Larsch
Reviewed by: Geoff Thorpe
2004-05-04 20:08:55 +00:00
Bodo Möller
d5f686d808
- update from current 0.9.6-stable CHANGES file
...
- update from current 0.9.7-stable CHANGES file:
Now here we have "CHANGES between 0.9.7e and 0.9.8", and I hope
that all patches mentioned for 0.9.7d and 0.9.7e actually are
in the CVS HEAD, i.e. what is to become 0.9.8.
I have rewritten the 'openssl ca -create_serial' entry (0.9.8)
so that it explains the earlier change that is now listed (0.9.7e).
The ENGINE_set_default typo bug entry has been moved from 0.9.8
to 0.9.7b, which is where it belongs.
2004-05-04 01:15:48 +00:00
Geoff Thorpe
08e1cbc62c
The new BN_CTX code makes this sort of abuse unnecessary.
2004-04-28 18:34:39 +00:00
Andy Polyakov
b6b4fdc9e2
Oops! Typo in ./config...
2004-04-27 22:17:25 +00:00
Andy Polyakov
dd55880644
Improved PowerPC support. Proper ./config support for ppc targets,
...
especially for AIX. But most important BIGNUM assembler implementation
submitted by IBM.
Submitted by: Peter Waltenberg <pwalten@au1.ibm.com >
Reviewed by: appro
2004-04-27 22:05:50 +00:00
Dr. Stephen Henson
bd1640bb01
Make ASN1 code work again...
2004-04-27 18:33:40 +00:00
Geoff Thorpe
081991ac01
With the new dynamic BN_CTX implementation, there should be no need for
...
additional contexts.
2004-04-27 13:24:51 +00:00
Geoff Thorpe
8a85c341fe
The problem of rsa key-generation getting stuck in a loop for (pointlessly)
...
small key sizes seems to result from the code continually regenerating the
same prime value once the range is small enough. From my tests, this change
fixes the problem by setting an escape velocity of 3 repeats for the second
of the two primes.
PR: 874
2004-04-26 15:38:44 +00:00
Geoff Thorpe
bcfea9fb25
Allow RSA key-generation to specify an arbitrary public exponent. Jelte
...
proposed the change and submitted the patch, I jiggled it slightly and
adjusted the other parts of openssl that were affected.
PR: 867
Submitted by: Jelte Jansen
Reviewed by: Geoff Thorpe
2004-04-26 15:31:35 +00:00
Dr. Stephen Henson
f3f52d7f45
More ASN1 reformat/tidy.
2004-04-25 12:46:39 +00:00
Dr. Stephen Henson
8845420f4e
Reformat/tidy some of the ASN1 code.
2004-04-24 17:02:48 +00:00
Dr. Stephen Henson
d735c64905
Fix leak.
...
PR:870
2004-04-22 12:37:16 +00:00
Geoff Thorpe
955d465c2c
As far as I can tell, the bugfix this comment refers to was committed to
...
0.9.7-stable as well as HEAD (and doesn't apply to the 0.9.6-engine
variant).
2004-04-21 15:12:20 +00:00
Geoff Thorpe
8c521c7a34
Extend the index parameter checking from sk_value to sk_set(). Also tidy up
...
some similar code elsewhere.
Thanks to Francesco Petruzzi for bringing this to my attention.
2004-04-21 15:08:56 +00:00
Dr. Stephen Henson
77475142ec
New option to 'x509' -next_serial. This outputs the certificate
...
serial number plus 1 to the output file. Its purpose is to allow
serial number files to be initialized when random serial numbers
are used.
2004-04-21 12:46:20 +00:00
Dr. Stephen Henson
90fac84066
Use X509_get_serialNumber() instead of accessing internals in x509.c
2004-04-21 12:43:21 +00:00
Dr. Stephen Henson
64674bcc8c
Reduce chances of issuer and serial number duplication by use of random
...
initial serial numbers.
PR: 842
2004-04-20 12:05:26 +00:00
Richard Levitte
1dc2d655ad
Whooaaaaa, the BN_CTX_DEBUG macro really produces output these
...
days... A little too much for my tests, currently...
2004-04-20 11:53:33 +00:00
Richard Levitte
863d2b196f
Print the debug thingies on stderr instead of stdout. If for nothing
...
else then at least so bc doesn't have problems parsing the output from
bntest :-).
2004-04-20 10:57:07 +00:00
Geoff Thorpe
c57bc2dc51
make update
2004-04-19 18:33:41 +00:00
Geoff Thorpe
6c0dcdc211
"make update" noticed a new function.
2004-04-19 18:32:19 +00:00
Geoff Thorpe
28ded31b97
More updates for the header cleanups (and apologies, again, for not having
...
consolidated these prior to committing).
2004-04-19 18:30:41 +00:00
Geoff Thorpe
0fc07a0f9c
When generating dependencies in the makefiles, generate the reduced
...
dependencies of the OPENSSL_NO_DEPRECATED mode. This prevents dependencies
being reproduced for "deprecated" header behaviour when a developer doesn't
define the symbol (with the subsequent CVS wars that can ensue).
2004-04-19 18:19:24 +00:00
Geoff Thorpe
823a67b0a9
header cleanup in apps/
2004-04-19 18:13:07 +00:00
Geoff Thorpe
60a938c6bc
(oops) Apologies all, that last header-cleanup commit was from the wrong
...
tree. This further reduces header interdependencies, and makes some
associated cleanups.
2004-04-19 18:09:28 +00:00
Geoff Thorpe
3a87a9b9db
Reduce header interdependencies, initially in engine.h (the rest of the
...
changes are the fallout). As this could break source code that doesn't
directly include headers for interfaces it uses, changes to recursive
includes are covered by the OPENSSL_NO_DEPRECATED symbol. It's better to
define this when building and using openssl, and then adapt code where
necessary - this is how to stay current. However the mechanism exists for
the lethargic.
2004-04-19 17:46:04 +00:00
Dr. Stephen Henson
ae44fc1ec4
Clear error if unique_subject lookup fails.
2004-04-15 00:32:19 +00:00
Dr. Stephen Henson
28722cf212
Add some root CAs.
2004-04-13 17:47:37 +00:00
Geoff Thorpe
2749276b95
Avoid undefined results when the parameter is out of range.
2004-04-02 06:25:11 +00:00
Dr. Stephen Henson
b6a5fdb8a7
Don't use C++ reserved word.
2004-04-01 22:23:46 +00:00
Dr. Stephen Henson
bf5773fa2d
Oops forgot CHANGES entry.
2004-03-31 12:55:33 +00:00
Dr. Stephen Henson
ecf139917d
New function X509_POLICY_NODE_print()
2004-03-31 12:17:24 +00:00
Richard Levitte
ab23d5ffda
Add symbol hacks for some long names.
...
make update
2004-03-29 08:13:49 +00:00
Andy Polyakov
1a979201d5
This is essentially Intel 32-bit compiler tune-up. To start with all
...
available compiler versions generated bogus machine code trying to
compile new crypto/des/cfb_enc.c. Secondly, 8th version defines
__GNUC__ macro, but fails to compile *some* inline assembler correctly.
Note that all versions of icc implement MSC-like _lrot[rl] intrinsic,
which is used now instead of offensive asm. Finally, unnecessary linker
dependencies are eliminated. Most notably dependency from libirc.a
caused trouble at application start-up, if libcrypto.so is linked with
-Bsymbolic (which it is).
2004-03-28 21:27:47 +00:00
Dr. Stephen Henson
216659eb87
Enhance EVP code to generate random symmetric keys of the
...
appropriate form, for example correct DES parity.
Update S/MIME code and EVP_SealInit to use new functions.
PR: 700
2004-03-28 17:38:00 +00:00
Dr. Stephen Henson
5d6383c83f
Make {i2v,v2i}_ASN1_BIT_STRING global.
...
make update
2004-03-28 12:40:11 +00:00
Dr. Stephen Henson
e07d3a021d
Remove obsolete files.
2004-03-28 12:29:05 +00:00
Dr. Stephen Henson
e1a27eb34a
Allow CRLs to be passed into X509_STORE_CTX. This is useful when the
...
verified structure can contain its own CRLs (such as PKCS#7 signedData).
Tidy up some of the verify code.
2004-03-27 22:49:28 +00:00
Dr. Stephen Henson
6446e0c3c8
Extend OID config module format.
2004-03-27 13:30:14 +00:00
Dr. Stephen Henson
beedea2fef
Free up BIO properly when using streaming S/MIME sign.
2004-03-26 00:24:38 +00:00
Dr. Stephen Henson
34be34fdd0
Remove BN_CTX debug from debug-steve
2004-03-25 23:32:06 +00:00
Richard Levitte
0020502a07
SSL_COMP_get_compression_method is a typo (a missing 's' at the end of
...
the symbol name).
2004-03-25 21:32:30 +00:00
Richard Levitte
d530017c00
Move the definition of Win32_rename(), since the macro rename gets undefined
...
in the middle of the code on Windows, and that disrupts operations in functions
later that use rename()...
PR: 853
2004-03-25 20:09:00 +00:00
Richard Levitte
fd9fa844e2
Wrap code starting with a definition.
...
PR: 854
2004-03-25 20:01:01 +00:00
Richard Levitte
c2dc3ee8d9
Change spaces to symbols in names.
...
PR: 856
2004-03-25 19:52:34 +00:00
Richard Levitte
482c2acf02
Make prototypes for some callback pointers.
2004-03-25 16:21:42 +00:00
Richard Levitte
a481b4b52c
A couple more cases where RAND_add() gets an integer instead of a
...
doule as last argument.
2004-03-25 16:04:02 +00:00
Richard Levitte
a87228031f
RAND_add() wants a double as it's last argument.
2004-03-25 15:52:43 +00:00
Dr. Stephen Henson
b79c82eaab
Fix loads of warnings in policy code.
...
I'll remember to try to compile this with warnings enabled next time :-)
2004-03-25 13:45:58 +00:00
Dr. Stephen Henson
69d1d5e6ce
Fix ASN1 warnings.
2004-03-25 13:37:02 +00:00
Geoff Thorpe
c86f2054f3
Adjust various bignum functions to use BN_CTX for variables instead of
...
locally initialising their own.
NB: I've removed the "BN_clear_free()" loops for the exit-paths in some of
these functions, and that may be a major part of the performance
improvements we're seeing. The "free" part can be removed because we're
using BN_CTX. The "clear" part OTOH can be removed because BN_CTX
destruction automatically performs this task, so performing it inside
functions that may be called repeatedly is wasteful. This is currently safe
within openssl due to the fact that BN_CTX objects are never created for
longer than a single high-level operation. However, that is only because
there's currently no mechanism in openssl for thread-local storage. Beyond
that, this might be an issue for applications using the bignum API directly
and caching their own BN_CTX objects. The solution is to introduce a flag
to BN_CTX_start() that allows its variables to be automatically sanitised
on release during BN_CTX_end(). This way any higher-level function (and
perhaps the application) can specify this flag in its own
BN_CTX_start()/BN_CTX_end() pair, and this will cause inner-loop functions
specifying the flag to be ignored so that sanitisation is handled only once
back out at the higher level. I will be implementing this in the near
future.
2004-03-25 04:32:24 +00:00
Geoff Thorpe
5c98b2caf5
Replace the BN_CTX implementation with my current work. I'm leaving the
...
little TODO list in there as well as the debugging code (only enabled if
BN_CTX_DEBUG is defined).
I'd appreciate as much review and testing as can be spared for this. I'll
commit some changes to other parts of the bignum code shortly to make
better use of this implementation (no more fixed size limitations). Note
also that under identical optimisations, I'm seeing a noticable speed
increase over openssl-0.9.7 - so any feedback to confirm/deny this on other
systems would also be most welcome.
2004-03-25 04:16:14 +00:00
Geoff Thorpe
5148710994
Adds warnings about two curves and fixes the "seed" value for two other
...
curves.
Submitted by: Nils Larsch
2004-03-25 03:03:52 +00:00
Geoff Thorpe
ea77fc3380
... and this should likewise fix up those RSA implementations that weren't
...
already built and tested.
2004-03-25 02:55:17 +00:00
Geoff Thorpe
46ef873f0b
By adding a BN_CTX parameter to the 'rsa_mod_exp' callback, private key
...
operations no longer require two distinct BN_CTX structures. This may put
more "strain" on the current BN_CTX implementation (which has a fixed limit
to the number of variables it will hold), but so far this limit is not
triggered by any of the tests pass and I will be changing BN_CTX in the
near future to avoid this problem anyway.
This also changes the default RSA implementation code to use the BN_CTX in
favour of initialising some of its variables locally in each function.
2004-03-25 02:52:04 +00:00
Geoff Thorpe
2d2a5ba32a
Damn, I was a bit hasty with my fix and hadn't spotted the linker
...
dependency from asn1.
2004-03-25 02:41:35 +00:00
Geoff Thorpe
2bd4e3379f
Remove some warnings.
2004-03-25 02:24:38 +00:00
Geoff Thorpe
032c3ecb18
Protect against gcc's "warning: cast does not match function type".
2004-03-25 02:19:42 +00:00
Richard Levitte
e703b46598
Don't define fd for platforms that do not use it, as some may not declare fileno() properly
2004-03-24 10:55:48 +00:00
Richard Levitte
0fa793bc7b
Correct constness problems.
2004-03-24 10:50:42 +00:00
Richard Levitte
ba5477eb1a
Make it easier to buld test applications...
2004-03-24 10:50:25 +00:00
Richard Levitte
5c42f62e48
Only build the PKCS#7 test applications if "pkcs7" is present in
...
SDIRS.
2004-03-24 10:48:50 +00:00
Richard Levitte
a08e05d1be
Add store.h among the exported headers on VMS.
2004-03-24 09:52:16 +00:00
Richard Levitte
d342ec3335
o_str.h isn't a public header file, so make sure it will still be
...
included.
2004-03-24 09:43:03 +00:00
Richard Levitte
3d8b8860cf
o_str.h isn't a public header file.
2004-03-24 09:41:33 +00:00
Richard Levitte
a0b5ebeac6
Typo...
2004-03-24 09:40:59 +00:00
Richard Levitte
8ee18dd520
Make sure toupper() is properly declared.
2004-03-24 09:40:23 +00:00
Richard Levitte
f46e76ef50
Make it clear that for RSA_NO_PADDING, flen must be RSA_size(rsa)
2004-03-23 21:01:34 +00:00
Richard Levitte
e725a9660b
make update
2004-03-23 15:06:33 +00:00
Richard Levitte
d7eed1929b
Sync the VMS build with Unix.
2004-03-23 14:50:16 +00:00
Dr. Stephen Henson
4acc3e907d
Initial support for certificate policy checking and evaluation.
...
This is currently *very* experimental and needs to be more fully integrated
with the main verification code.
2004-03-23 14:14:35 +00:00
Richard Levitte
9449e38504
Correct minor spelling error.
...
PR: 845
2004-03-21 23:03:52 +00:00
Richard Levitte
b8b0b5d856
Change \t to real tab in echo argument.
...
PR: 847
2004-03-21 22:50:20 +00:00
Richard Levitte
ec5d8a54e9
Remove a warning for conversion double->long. This has impacts on Windows.
...
PR: 849
2004-03-21 22:39:52 +00:00
Richard Levitte
18a6333180
Make sure fd is defined where it should.
...
PR: 849
2004-03-21 22:36:27 +00:00
Geoff Thorpe
7f663ce430
Note my bignum hijinx in case app maintainers are using CHANGES for their
...
porting efforts. Also, add Richard's name to the prior change.
2004-03-17 18:30:47 +00:00
Geoff Thorpe
e042540f6b
Variety of belt-tightenings in the bignum code. (Please help test this!)
...
- Remove some unnecessary "+1"-like fudges. Sizes should be handled
exactly, as enlarging size parameters causes needless bloat and may just
make bugs less likely rather than fixing them: bn_expand() macro,
bn_expand_internal(), and BN_sqr().
- Deprecate bn_dup_expand() - it's new since 0.9.7, unused, and not that
useful.
- Remove unnecessary zeroing of unused bytes in bn_expand2().
- Rewrite BN_set_word() - it should be much simpler, the previous
complexities probably date from old mismatched type issues.
- Add missing bn_check_top() macros in bn_word.c
- Improve some degenerate case handling in BN_[add|sub]_word(), add
comments, and avoid a bignum expansion if an overflow isn't possible.
2004-03-17 17:36:54 +00:00
Dr. Stephen Henson
4e8172d6da
Avoid warnings.
2004-03-16 13:51:11 +00:00
Richard Levitte
875a644a90
Constify d2i, s2i, c2i and r2i functions and other associated
...
functions and macros.
This change has associated tags: LEVITTE_before_const and
LEVITTE_after_const. Those will be removed when this change has been
properly reviewed.
2004-03-15 23:15:26 +00:00
Richard Levitte
ec37635c94
It was just pointed out to me that it's better to cast to double...
2004-03-15 23:02:55 +00:00
Richard Levitte
fd836aeee0
Make sure that the last argument to RAND_add() is a float, or some
...
compilers may complain.
2004-03-15 22:37:08 +00:00
Richard Levitte
560f7abb7e
Make sure we use unsigned constants, or come compilers may complain.
2004-03-15 22:33:19 +00:00
Geoff Thorpe
b6358c89a1
Convert openssl code not to assume the deprecated form of BN_zero().
...
Remove certain redundant BN_zero() initialisations, because BN_CTX_get(),
BN_init(), [etc] already initialise to zero.
Correct error checking in bn_sqr.c, and be less wishy-wash about how/why
the result's 'top' value is set (note also, 'max' is always > 0 at this
point).
2004-03-13 23:57:20 +00:00
Geoff Thorpe
5d735465d1
The efforts to eliminate the dual-representation of zero and to ensure
...
bignums are passed in and out of functions and APIs in a consistent form
has highlighted that zero-valued bignums don't need any allocated word
data. The use of BN_set_word() to initialise a bignum to zero causes
needless allocation and gives it a return value that must be checked. This
change converts BN_zero() to a self-contained macro that has no
return/expression value and does not cause any expansion of bignum data.
Note, it would be tempting to rewrite the deprecated version as a
success-valued comma expression, such as;
#define BN_zero(a) ((a)->top = (a)->neg = 0, 1)
However, this evaluates 'a' twice and would confuse initialisation loops
(eg. while(..) { BN_zero(bn++) } ). As such, the deprecated version
continues to use BN_set_word().
2004-03-13 23:04:15 +00:00
Geoff Thorpe
9e051bac13
Document a change I'd already made, and at the same time, correct the
...
change to work properly; BN_zero() should set 'neg' to zero as well as
'top' to match the behaviour of BN_new().
2004-03-13 22:10:15 +00:00
Andy Polyakov
30fbcaa213
IRIX 6.x shared build fix-up.
...
For reference. Note that both cc and gcc support -Wl flag, but we can't
use -Wl,-[not]all with both drivers, because cc rearranges options
passed through -Wl. We can't use -Wl,-all,libcrypto.a,-notall with cc
either, because it refuses to start with "no input" error.
2004-03-12 21:52:54 +00:00
Geoff Thorpe
93825dddad
static
2004-03-10 01:20:26 +00:00
Geoff Thorpe
a8aa764d3c
Minimise the amount of code dependent on BN_DEBUG_RAND. In particular,
...
redefine bn_clear_top2max() to be a NOP in the non-debugging case, and
remove some unnecessary usages in bn_nist.c.
Submitted by: Nils Larsch
Reviewed by: Geoff Thorpe, Ulf Möller
2004-03-09 03:53:40 +00:00
Geoff Thorpe
e7716b7a19
More changes coming out of the bignum auditing. BN_CTX_get() should ideally
...
return a "zero" bignum as BN_new() does - so reset 'top'. During
BN_CTX_end(), released bignums should be consistent so enforce this in
debug builds. Also, reduce the number of wasted BN_clear_free() calls from
BN_CTX_end() (typically by 75% or so).
Submitted by: Nils Larsch
Reviewed by: Geoff Thorpe, Ulf Möller
2004-03-09 03:47:35 +00:00
Dr. Stephen Henson
a4e3150f00
Fix policy constraints syntax.
2004-03-08 18:15:32 +00:00
Dr. Stephen Henson
edec614efd
Support for inhibitAnyPolicy extension.
2004-03-08 13:56:31 +00:00
Ulf Möller
2457c19df1
typo
2004-03-06 08:43:36 +00:00
Dr. Stephen Henson
5fa5eb71a4
Cleanup ASN1 OID module when it exits.
2004-03-05 23:47:56 +00:00
Dr. Stephen Henson
3f39976da3
Call autoconfig code in pkcs7 utility.
2004-03-05 23:46:29 +00:00
Dr. Stephen Henson
216ad9ef58
Memory leak fix.
2004-03-05 23:39:42 +00:00
Dr. Stephen Henson
bc50157010
Various X509 fixes. Disable broken certificate workarounds
...
when X509_V_FLAG_X509_STRICT is set. Check for CRLSign in
CRL issuer certificates. Reject CRLs with unhandled (any)
critical extensions.
2004-03-05 17:16:35 +00:00
Dr. Stephen Henson
91180d45f9
Typos.
...
Reported by: Jose Castejon-Amenedo <Jose.Castejon-Amenedo@hp.com >
2004-03-04 21:44:39 +00:00
Richard Levitte
d9f40bbe55
Make our page with pointers to binary distributions visible in the FAQ
2004-03-04 07:47:40 +00:00
Dr. Stephen Henson
ec7c9ee8b8
Indent some of the code examples.
2004-03-02 13:39:23 +00:00
Dr. Stephen Henson
f82bb9cb9c
Config docs.
2004-03-02 13:31:32 +00:00
Dr. Stephen Henson
5a8922aed5
Documentation of the KISS autoconfig functions.
2004-03-02 01:01:11 +00:00
Dr. Stephen Henson
f2c1812560
More autoconfig docs.
2004-03-01 19:15:24 +00:00
Richard Levitte
4cfa4ae820
Avoid a memory leak in OCSP_parse_url().
...
Notified by Paul Siegel <psiegel@corestreet.com >
2004-03-01 14:58:22 +00:00
Dr. Stephen Henson
a30af36c77
Initial docs for the OpenSSL library configuration via openssl.cnf
2004-03-01 01:04:40 +00:00
Geoff Thorpe
5075521e75
Add ECDSA documentation.
...
Submitted by: Nils Larsch
2004-02-27 23:03:23 +00:00
Richard Levitte
ee3a47a994
AES is spelled AES, not ASE. Oops...
2004-02-27 02:24:49 +00:00
Richard Levitte
f727266ae8
Make sure the given EVP_PKEY is updated in the PEM_STRING_PKCS8INF case also.
...
PR: 833
2004-02-26 22:07:45 +00:00
Richard Levitte
8bb0c8522a
Document the AES options for 'openssl smime'.
...
PR: 834
2004-02-26 21:44:41 +00:00
Geoff Thorpe
c6700d2746
A cleanup of the ecs_ossl.c code and some (doxygen) comments for ecdsa.h
...
Submitted by: Nils Larsch
Reviewed by: Geoff Thorpe
2004-02-22 19:32:53 +00:00
Geoff Thorpe
1b06804491
When adding positive elements, we can use BN_uadd() instead of BN_add().
...
Submitted by: Nils Larsch
Reviewed by: Geoff Thorpe
2004-02-22 19:30:41 +00:00
Dr. Stephen Henson
dc90f64d56
Use an OCTET STRING for the encoding of an OCSP nonce value.
...
The old raw format can't be handled by some implementations
and updates to RFC2560 will make this mandatory.
2004-02-19 18:16:38 +00:00
Geoff Thorpe
6c43032121
minor signed/unsigned warning fixes
2004-02-10 18:46:10 +00:00
Dr. Stephen Henson
37ead9be0b
Fix handling of -offset and -length in asn1parse tool.
...
If -offset exceeds -length of data available exit with an error.
Don't read past end of total data available when -offset supplied.
If -length exceeds total available truncate it.
2004-02-08 13:30:04 +00:00
Andy Polyakov
1751034669
Typo in crypto/bn/asm/x86_64.c, bn_div_words().
...
PR: 821
2004-02-07 09:51:28 +00:00
Dr. Stephen Henson
d4575825f1
Add flag to avoid continuous
...
memory allocate when calling EVP_MD_CTX_copy_ex().
Without this HMAC is several times slower than
< 0.9.7.
2004-02-01 13:39:51 +00:00
Andy Polyakov
d04b1b4656
Typo in PA-RISC 2 rules in crypto/bn/Makefile.ssl
2004-01-30 05:41:23 +00:00
Andy Polyakov
1247092776
HP/UX PA-RISC 2 targets update.
2004-01-29 22:16:08 +00:00
Richard Levitte
7e22a1df55
Remove typos
2004-01-29 11:24:32 +00:00
Richard Levitte
bb5810d21d
-Wtraditional was a little too much...
2004-01-29 10:56:18 +00:00
Richard Levitte
61a88c31c0
Typo
2004-01-29 02:55:43 +00:00
Richard Levitte
b86ed8d18f
In the development branch, it feels quite all right to warn on a lot
...
more stuff.
2004-01-29 00:05:09 +00:00
Richard Levitte
e5886a2388
make update
2004-01-28 19:07:41 +00:00
Richard Levitte
8d1ebe0bd1
Add the missing parts for DES CFB1 and CFB8.
...
Add the corresponding AES parts while I'm at it.
make update
2004-01-28 19:05:35 +00:00
Richard Levitte
1fb724449d
make update
2004-01-28 18:38:33 +00:00
Richard Levitte
721a5e83f9
Unsigned vs. signed problem removed
2004-01-28 08:48:11 +00:00
Andy Polyakov
6df617a59d
#undef _POSIX_C_SOURCE in ui_openssl.c ruined IRIX builds. Comment on why
...
_POSIX_C_SOURCE needed in first place.
2004-01-27 22:06:48 +00:00
Andy Polyakov
8c6336b0aa
CFB DES sync-up with FIPS branch.
2004-01-27 21:47:35 +00:00
Richard Levitte
87203dc99a
Avoid signed vs. unsigned warnings (which are treated like errors on
...
Windows).
2004-01-27 01:16:38 +00:00
Richard Levitte
4de65cbc06
S_IFBLK and S_IFCHR may not exist in some places (like Windows), so
...
let's check for those macros, and if they aren't defined, let's assume
there aren't Unixly devices on this platform.
2004-01-26 23:45:32 +00:00
Andy Polyakov
27b2b78f90
Even though C specification explicitly says that constant type "stretches"
...
automatically to accomodate the value, some compilers fail to do so. Most
notably 0x0123456789ABCDEF should come out as long long in 32-bit context,
but HP compiler truncates it to 32-bit value. Which in turn breaks GF(2^m)
arithmetics in hpux-parisc2-cc build. Therefore this fix...
2004-01-25 10:53:43 +00:00
Andy Polyakov
3a160f1dc6
Fix declaration inconsistency in ecparam.c.
2004-01-24 16:51:59 +00:00
Andy Polyakov
7f24b1c3e9
Get rid of bogus warning when compiling with Sun vendor compiler.
2004-01-24 16:31:21 +00:00
Richard Levitte
a5e8bcfb7b
We're passed p, so let's use p instead of making assumptions.
2004-01-24 01:16:02 +00:00
Richard Levitte
9d5c3c1939
Typo...
2004-01-22 22:36:46 +00:00
Dr. Stephen Henson
815d7057be
Replace expired certificate.
2004-01-21 13:08:11 +00:00
Andy Polyakov
30cb9ec715
SHA-1 assembler tune-up for Intel P4
2004-01-21 08:17:08 +00:00
Richard Levitte
af6dab9b00
Adding a slash between the directoryt and the file is a problem with
...
VMS. The C RTL can handle it well if the "directory" is a logical
name with no colon, therefore ending being 'logname/file'. However,
if the given logical names actually has a colon, or if you use a full
VMS-syntax directory, you end up with 'logname:/file' or
'dev:[dir1.dir2]/file', and that isn't handled in any good way.
So, on VMS, we need to check if the directory string ends with a
separator (one of ':', ']' or '>' (< and > can be used instead [ and
])), and handle that by not inserting anything between the directory
spec and the file name. In all other cases, it's assumed the
directory spec is a logical name, so we need to place a colon between
it and the file.
Notified by Kevin Greaney <kevin.greaney@hp.com >.
2004-01-10 18:04:38 +00:00
Lutz Jänicke
cdb42bcf0c
Cover all DSA setups when running tests
...
PR: #748
Submitted by: Kirill Kochetkov <kochet@ixbt.com >
2004-01-08 07:46:37 +00:00
Lutz Jänicke
fc56b52924
Updates to s_time manual page
...
PR: #570
Submitted by: Martin Witzel <MWITZEL@de.ibm.com >
2004-01-08 07:38:15 +00:00
Lutz Jänicke
a32fc687de
Add s_time manual page
...
Submitted by: "Martin Witzel" <MWITZEL@de.ibm.com >
PR: #570
2004-01-04 18:59:14 +00:00
Lutz Jänicke
c0017a5a65
Update URI
...
Submitted by: Gertjan van Oosten <gertjan@West.NL >
PR: #804
2004-01-04 18:05:50 +00:00
Lutz Jänicke
344e86645d
unintptr_t and <inttypes.h> are not strictly portable with respect to
...
ANSI C 89.
Undo change to maintain compatibility.
2004-01-04 17:53:21 +00:00
Richard Levitte
075521725d
Fix Perl problems on sparc64.
...
This is part of a large change submitted by Markus Friedl <markus@openbsd.org >
2003-12-27 16:13:18 +00:00
Richard Levitte
5fdf06666c
Avoid including cryptlib.h, it's not really needed.
...
Check if IDEA is being built or not.
This is part of a large change submitted by Markus Friedl <markus@openbsd.org >
2003-12-27 16:10:30 +00:00
Richard Levitte
f28e8bd300
Only use environment variables if uid and gid are the same as euid and egid.
...
This is part of a large change submitted by Markus Friedl <markus@openbsd.org >
2003-12-27 16:07:20 +00:00
Richard Levitte
de02ec2767
Check if a random "file" is really a device file, and treat it
...
specially if it is.
Add a few OpenBSD-specific cases.
This is part of a large change submitted by Markus Friedl <markus@openbsd.org >
2003-12-27 16:02:22 +00:00
Richard Levitte
112341031b
Correct documentation typos.
...
This is part of a large change submitted by Markus Friedl <markus@openbsd.org >
2003-12-27 15:04:54 +00:00
Richard Levitte
7cf803230b
OpenBSD-internal changes.
...
This is part of a large change submitted by Markus Friedl <markus@openbsd.org >
2003-12-27 15:02:56 +00:00
Richard Levitte
79b42e7654
Use sh explicitely to run point.sh
...
This is part of a large change submitted by Markus Friedl <markus@openbsd.org >
2003-12-27 14:59:07 +00:00
Richard Levitte
f0c5db92f7
Include strings.h so strcasecmp() and strncasecmp() get properly declared.
2003-12-27 14:54:48 +00:00
Richard Levitte
d420ac2c7d
Use BUF_strlcpy() instead of strcpy().
...
Use BUF_strlcat() instead of strcat().
Use BIO_snprintf() instead of sprintf().
In some cases, keep better track of buffer lengths.
This is part of a large change submitted by Markus Friedl <markus@openbsd.org >
2003-12-27 14:40:17 +00:00
Richard Levitte
b79aa47a0c
Add a newline at the end of the last line.
...
This is part of a large change submitted by Markus Friedl <markus@openbsd.org >
2003-12-27 14:26:14 +00:00
Dr. Stephen Henson
e88c577738
Typos.
2003-12-20 22:48:21 +00:00
Richard Levitte
a2b0de98af
To figure out if we're going outside the buffer, use the size of the buffer,
...
not the size of the integer used to index in said buffer.
PR: 794
Notified by: Rhett Garber <rhett_garber@hp.com >
2003-12-11 18:01:03 +00:00
Richard Levitte
4775944f81
Document that you need to include x509.h (to get [i2d|d2i]_RSA_PUBKEY()).
...
Correct the typo PUKEY...
2003-12-10 14:31:55 +00:00
Richard Levitte
2abd5b7aa0
Document that you need to include x509.h (to get [i2d|d2i]_DSA_PUBKEY()).
...
Correct the typo PUKEY...
2003-12-10 13:57:51 +00:00
Ulf Möller
380e145daf
Add "dif" variable to clean up the loop implementations.
...
Submitted by: Nils Larsch
2003-12-06 11:55:46 +00:00
Ulf Möller
a9f2330f43
Skip a curve with generator of non-prime order.
...
Submitted by: Nils Larsch
2003-12-06 11:41:22 +00:00
Ulf Möller
ce38bb1a8c
Avoid segfault if ret==0.
...
Submitted by: Nils Larsch
2003-12-06 11:39:37 +00:00
Lutz Jänicke
919f8bcd21
Restructure make targets to allow parallel make.
...
Submitted by: Witold Filipczyk <witekfl@poczta.gazeta.pl >
PR: #513
2003-12-03 16:29:41 +00:00
Geoff Thorpe
2bfd2c74d2
Incremental cleanups to bn_lib.c.
...
- Add missing bn_check_top() calls and relocate some others
- Use BN_is_zero() where appropriate
- Remove assert()s that bn_check_top() is already covering
- Simplify the code in places (esp. bn_expand2())
- Only keep ambiguous zero handling if BN_STRICT isn't defined
- Remove some white-space and make some other aesthetic tweaks
2003-12-02 20:01:30 +00:00
Geoff Thorpe
82b2f57e30
Use the BN_is_odd() macro in place of code that (inconsistently) does much
...
the same thing.
Also, I have some stuff on the back-burner related to some BN_CTX notes
from Peter Gutmann about his cryptlib hacks to the bignum code. The BN_CTX
comments are there to remind me of some relevant points in the code.
2003-12-02 03:28:24 +00:00
Geoff Thorpe
2ae1ea3788
BN_FLG_FREE is of extremely dubious usefulness, and is only referred to
...
once in the source (where it is set for the benefit of no other code
whatsoever). I've deprecated the declaration in the header and likewise
made the use of the flag conditional in bn_lib.c. Note, this change also
NULLs the 'd' pointer in a BIGNUM when it is reset but not deallocated.
2003-12-02 03:16:56 +00:00
Geoff Thorpe
34066d741a
Declare the static BIGNUM "BN_value_one()" more carefully.
2003-12-01 23:13:17 +00:00
Geoff Thorpe
b74cc0776b
Add missing bn_check_top()s to bn_kron.c, remove some miscellaneous
...
white-space, and include extra headers to satisfy debugging builds.
2003-12-01 23:11:45 +00:00
Geoff Thorpe
e7e5fe4705
Add missing bn_check_top()s to bn_gf2m.c and remove some miscellaneous
...
white-space.
2003-12-01 23:10:21 +00:00
Geoff Thorpe
998ae048e7
The bn_set_max() macro is only "used" by the bn_set_[low|high]() macros
...
which, in turn, are used nowhere at all. This is a good thing because
bn_set_max() would currently generate code that wouldn't compile (BIGNUM
has no 'max' element).
The only apparent use for bn_set_[low|high] would be for implementing
windowing algorithms, and all of openssl's seem to use bn_***_words()
helpers instead (including the BN_div() that Nils fixed recently, which had
been using independently-coded versions of what these unused macros are
intended for). I'm therefore consigning these macros to cvs oblivion in the
name of readability.
2003-12-01 22:11:08 +00:00
Geoff Thorpe
e65c2b9872
bn_fix_top() exists for compatibility's sake and is mapped to
...
bn_correct_top() or bn_check_top() depending on debug settings. For
internal source, all bn_fix_top()s should be converted one way or the other
depending on whether the use of bn_correct_top() is justified.
For BN_div_recp(), these cases should not require correction if the other
bignum functions are doing their jobs properly, so convert to
bn_check_top().
2003-12-01 21:59:40 +00:00
Richard Levitte
2fe9ab8e20
It was pointed out to me that if the requested size is 0, we shouldn't
...
ty to allocate anything at all. This will allow eNULL to still work.
PR: 751
Notified by: Lutz Jaenicke
2003-12-01 13:25:37 +00:00
Richard Levitte
1145e03870
Check that OPENSSL_malloc() really returned some memory.
...
PR: 751
Notified by: meder@mcs.anl.gov
Reviewed by: Lutz Jaenicke, Richard Levitte
2003-12-01 12:11:55 +00:00
Richard Levitte
6781efb92f
CRYPTO_malloc(), CRYPTO_realloc() and variants of them should return NULL
...
if the give size is 0.
This is a thought that came up in PR 751.
2003-12-01 12:06:15 +00:00
Lutz Jänicke
0bf1c1d80d
Some more ASFLAGS settings required
...
PR: #735
Submitted by: Tim Rice <tim@multitalents.net >
2003-12-01 08:12:47 +00:00
Geoff Thorpe
6ed474ca66
Add more debugging to my Configure target, and "make update" to incorporate
...
this and a few other changes.
2003-11-30 23:29:27 +00:00
Geoff Thorpe
46cb8d3689
If BN_STRICT is defined, don't accept an ambiguous representation of zero
...
(ie. where top may be zero, or it may be one if the corresponding word is
set to zero). Note, this only affects the macros in bn.h, there are probably
similar corrections required in some c files.
Also, clarify the audit-related macros at the top of the header. Mental
note: I must not forget to clean all this out before 0.9.8 is released ...
2003-11-30 22:23:12 +00:00
Geoff Thorpe
23fc5ac646
Improve a couple of the bignum macros. Note, this doesn't eliminate
...
tolerance of ambiguous zero-representation, it just improves
BN_abs_is_word() and simplifies other macros that depend on it.
2003-11-30 22:02:10 +00:00
Geoff Thorpe
5734bebe05
Make BN_DEBUG_RAND less painfully slow by only consuming one byte of
...
pseudo-random data for each bn_pollute().
2003-11-30 21:21:30 +00:00
Geoff Thorpe
657a919598
This improves the placement of check_top() macros in a couple of bn_lib
...
functions.
2003-11-29 20:34:07 +00:00
Richard Levitte
6859bb1a22
Make sure the documentation matches reality.
...
PR: 755
Notified by: Jakub Bogusz <qboosh@pld-linux.org >
2003-11-29 10:33:25 +00:00
Richard Levitte
3822740ce3
We're getting a clash with C++ because it has a type called 'list'.
...
Therefore, change all instances of the symbol 'list' to something else.
PR: 758
Submitted by: Frédéric Giudicelli <groups@newpki.org >
2003-11-29 10:25:37 +00:00
Richard Levitte
0d78bc3356
Add IPSec/IKE/Oakley curves.
...
PR: 768
Submitted by: Vadim Fedukovich <vf@unity.net >
2003-11-29 09:25:59 +00:00
Richard Levitte
d87b79bf31
Damnit, I'm sick of having to do something special every time a module
...
that gets built before objects barfs all over the place because it
uses a new NID that hasn't had a chance of getting defined yet (in
this case, it was about a couple of new EC curves, and therefore a
couple of new corresponding NIDs).
I'm placing objects first in SDIRS! There.
2003-11-29 09:19:12 +00:00
Richard Levitte
70ef9c5a3d
RSA_size() and DH_size() return the amount of bytes in a key, and we
...
compared it to the amount of bits required...
PR: 770
Submitted by: c zhang <czhang2005@hotmail.com >
2003-11-28 23:03:14 +00:00
Richard Levitte
b727907ae8
1024 is the export key bits limit according to current regulations, not 512.
...
PR: 771
Submitted by: c zhang <czhang2005@hotmail.com >
2003-11-28 22:39:19 +00:00
Geoff Thorpe
444c3a8492
Get rid of some signed/unsigned comparison warnings.
2003-11-28 16:39:16 +00:00
Richard Levitte
0b352c58db
Make a number of changes to the OS/2 build. Submitter's comment below.
...
PR: 732
Submitted by: Ilya Zakharevich <nospam-abuse@ilyaz.org >
Submitter's comment:
This patch:
a) Introduces a new file os2/backwardify.pl.
b) Introduces a new mk1mf.pl variable $preamble. As you can see, it may
be used also to move some OS-specific code to VC-CE too (the the
first chunk of the patch);
c) The DESCRIPTION specifier of the .def file is made more informative:
now it contains the version number too. On OS/2 it is made conformant
to OS/2 conventions; in particular, when one runs the standard command
BLDLEVEL this.DLL
one can see:
Vendor: www.openssl.org/
Revision: 0.9.7c
Description: OpenSSL: implementation of Secure Socket Layer; DLL for library crypto. Build for EMX -Zmtd
[I did not make Win32 descriptions as informative as this - I'm afraid to
break something. Be welcome to fix this.]
d) On OS/2 the generated DLL was hardly usable (it had a shared initialized
data segment).
e) On OS/2 the generated DLLs had names like ssl.dll. However, DLL names on
OS/2 are "global data". It is hard to have several DLLs with the same
name on the system. Thus this precluded coexistence of OpenSSL with DLLs
for other SLL implementations - or other name clashes. I transparently
changed the names of the DLLs to open_ssl.dll and cryptssl.dll.
f) The file added in (a) is used to create "forwarder" DLLs, so the
applications expecting the "old" DLL names may use the new DLLs
transparently. (A presence of these DLLs on the system nullifies (e),
but makes old applications work. This is a stopgap measure until the
old applications are relinked. Systems with no old applications do not
need these DLLs, so may enjoy all the benefits of (e).)
The new DLLs are placed in os2/ and os2/noname subdirectories.
g) The makefiles created with os2/OS2-EMX.cmd did not work (some mysterious
meaningless failures). The change to util/pl/OS2-EMX.pl uses the
variable introduced in (b) to switch the Makefiles to SHELL=sh syntax.
All these backslashes are removed, and the generated Makefiles started to
work.
h) Running os2/OS2-EMX.cmd now prints out what to do next.
2003-11-28 14:51:30 +00:00
Richard Levitte
03ddbdd9b9
Move another common functionality (reproduced so far with cut'n'paste)
...
to apps.c, and give it the hopefully descriptive name parse_yesno().
2003-11-28 14:45:09 +00:00
Richard Levitte
5ebdb39084
Let's use text/plain in the example instead of crapy HTML.
...
PR: 777
Submitted by: Michael Shields <mshields@sunblocksystems.com >
2003-11-28 14:32:31 +00:00
Richard Levitte
d45a098472
Forgot to change the declaration of do_subject() to one of parse_name()...
2003-11-28 14:18:05 +00:00
Richard Levitte
6d5ffb591b
Move do_subject() to apps.c and rename it to parse_name(). The
...
rationale behind the move is that it's use by several applications.
The rationale behind the name change is that it describes what the
function does a bit better.
2003-11-28 14:07:14 +00:00
Richard Levitte
7ce9e425bc
Allow multi-valued rdns in subjects. This adds the -multivalue-rdn option
...
to 'openssl req' and 'openssl ca'.
PR: 779
Submitted by: Michael Bell <michael.bell@cms.hu-berlin.de >
Reviewed by: Richard Levitte
(there will be some follow-up changes)
2003-11-28 14:04:09 +00:00
Richard Levitte
4d8743f490
Netware-specific changes,
...
PR: 780
Submitted by: Verdon Walker <VWalker@novell.com >
Reviewed by: Richard Levitte
2003-11-28 13:10:58 +00:00
Richard Levitte
4c8b4f9d03
Change my debugging entries to do fierce BIGNUM debugging.
2003-11-28 12:54:11 +00:00
Geoff Thorpe
81ba5f6713
Due to recent debugging bursts, openssl should be more or less solid
...
against inconsistent BIGNUMs coming out of any of its API functions. So
this change no longer "fixes" the bn_print.c functions, but it makes for
cleaner code. This patch was a part of ticket 697.
PR: 697
Submitted by: Otto Moerbeek
Reviewed by: Geoff Thorpe
2003-11-25 21:07:59 +00:00
Geoff Thorpe
6defae04f3
Fix some handling in bn_word. This also resolves the issues observed in
...
ticket 697 (though uses a different solution than the proposed one). This
problem was initially raised by Otto Moerbeek.
PR: 697
Submitted by: Nils Larsch
Reviewed by: Geoff Thorpe
2003-11-25 20:39:19 +00:00
Geoff Thorpe
e1064adfd3
Some changes for bn_gf2m.c: better error checking plus some minor
...
optimizations.
Submitted by: Nils Larsch
2003-11-25 03:41:20 +00:00
Lutz Jänicke
d7559f16cd
Free "engine" resource in case of failure to prevent memory leak
...
PR: #778
Submitted by: George Mitchell <george@m5p.com >
2003-11-24 16:48:52 +00:00
Geoff Thorpe
9e989810ba
BN_div() cleanup: replace the use of BN_sub and BN_add with bn_sub_words
...
and bn_add_words to avoid using fake bignums to window other bignums that
can lead to corruption. This change allows all bignum tests to pass with
BN_DEBUG and BN_DEBUG_RAND debugging and valgrind. NB: This should be
tested on a few different architectures and configuration targets, as the
bignum code this deals with is quite preprocessor (and assembly) sensitive.
Submitted by: Nils Narsch
Reviewed by: Geoff Thorpe, Ulf Moeller
2003-11-22 20:23:41 +00:00
Geoff Thorpe
ec2179cf81
Fix a small bug in str_copy: if more than one variable is replaced, make
...
sure the current length is used to calculate the new buffer length instead
of using the old length (prior to any variable substitution).
Submitted by: Nils Larsch
2003-11-21 21:42:35 +00:00
Dr. Stephen Henson
a8287a90ea
Give CRLDP its standard name.
...
Max req -x509 use V1 if extensions section absent.
2003-11-20 22:45:06 +00:00
Andy Polyakov
ad5f0ed509
hpux64-parisc2-gcc target added. Once it is verified, ./config should
...
be modified to choose it instead of hpux64-parisc-gcc, which should
then be removed. hpux64-parisc-cc is removed already now as redundant
[in case you wonder, 64-bit HP-UX ABI *implies* PA-RISC2.0].
2003-11-20 19:10:36 +00:00
Andy Polyakov
0a4c8baf5e
./config failed to correctly detect if gcc uses 64-bit ABI on HP-UX.
...
PR: 772
2003-11-20 18:33:20 +00:00
Lutz Jänicke
95de3d204f
Make sure to initialize AES counters to obtain proper results.
...
Submitted by: Kirill Kochetkov <kochet@ixbt.com >
PR: #748
2003-11-18 18:27:12 +00:00
Ulf Möller
31182ad39b
re-enable the test, keeping the original method for RAND_pseudo_bytes
...
which is used by BN_DEBUG_RAND
Submitted by: Nils Larsch
2003-11-16 19:33:31 +00:00
Lutz Jänicke
f35232e6f3
Catch error condition to prevent NULL pointer dereference.
...
Submitted by: Goetz Babin-Ebell <babin-ebell@trustcenter.de >
PR: #766
2003-11-16 16:30:39 +00:00
Lutz Jänicke
fda5e38551
Provide ASFLAGS in the subdirectories handling assembler code.
...
Submitted by: Tim Rice <tim@multitalents.net >
PR: #735 , #765
2003-11-16 14:38:34 +00:00
Ulf Möller
ac9c6e10a4
The x9.62 tests replace the PRNG with specific numbers,
...
so don't run them if BN_DEBUG_RAND is defined.
Also, fix another small bug.
Submitted by: Nils Larsch
2003-11-16 12:24:45 +00:00
Ulf Möller
1a01733047
BN_set_bit() etc should use "unsigned int".
...
Keep it as is to avoid an API change, but check for negativ values.
Submitted by: Nils Larsch
2003-11-15 08:37:50 +00:00
Richard Levitte
d2cd46127c
Less restrictive debugging build.
2003-11-14 14:06:40 +00:00
Geoff Thorpe
9dde17e8b4
This rewrites two "for" loops in BN_rshift() - equality with zero is
...
generally a more efficient comparison than comparing two integers, and the
first of these two loops was off-by-one (copying one too many values). This
change also removes a superfluous assignment that would set an unused word
to zero (and potentially allow an overrun in some cases).
Submitted by: Nils Larsch
Reviewed by: Geoff Thorpe
2003-11-13 15:03:14 +00:00
Geoff Thorpe
37af03d311
General improvements to the ec_asn1.c code. This squashes at least one bug
...
(where it was impossible to create an EC certificate with a compressed
public key), and has some style improvements based on some comments from
Steve Henson about use of the ASN1 macros.
Submitted by: Nils Larsch
Reviewed by: Geoff Thorpe
2003-11-10 18:09:18 +00:00
Geoff Thorpe
f7a397cc8d
Avoid possible memory leaks in error-handling.
...
Submitted by: Nils Larsch
Reviewed by: Geoff Thorpe
2003-11-10 18:05:22 +00:00
Dr. Stephen Henson
cd2e8a6f2d
Print out GeneralizedTime and UTCTime in ASN1_STRING_print_ex().
2003-11-10 01:37:23 +00:00
Ulf Möller
d18b993c43
Geoff suggested a more succinct description for "top".
2003-11-07 01:33:00 +00:00
Ulf Möller
e6e81c5894
oops... the description of ->top was inaccurate (the example is correct though)
2003-11-07 00:07:28 +00:00
Geoff Thorpe
f75abcefed
This extends the debugging macros to use "pollution" during
...
bn_correct_top(), previously only bn_check_top() did this.
2003-11-06 23:24:44 +00:00
Geoff Thorpe
18f62d4b82
Add debug-screening of input parameters to some functions I'd missed
...
before.
2003-11-06 23:13:04 +00:00
Geoff Thorpe
5c0c22803e
Put more debug screening in BN_div() and correct a comment.
2003-11-06 23:11:07 +00:00
Geoff Thorpe
0ef85c7f45
This is a revert of my previous commit to "improve" the declaration of
...
constant BIGNUMs. It turns out that this trips up different but equally
useful compiler warnings to -Wcast-qual, and so wasn't worth the ugliness
it created. (Thanks to Ulf for the forehead-slap.)
2003-11-05 19:30:29 +00:00
Ulf Möller
078dd1a0f9
typo in comment
2003-11-05 17:28:59 +00:00
Ulf Möller
2b96c95197
cleanup as discussed with Geoff
2003-11-05 17:28:25 +00:00
Ulf Möller
c5f1c7b4d8
Cygwin debugging
2003-11-05 17:27:13 +00:00
Geoff Thorpe
d870740cd7
Put the first stage of my bignum debugging adventures into CVS. This code
...
is itself experimental, and in addition may cause execution to break on
existing openssl "bugs" that previously were harmless or at least
invisible.
2003-11-04 22:54:49 +00:00
Geoff Thorpe
d8ec0dcf45
Avoid some shadowed variable names.
...
Submitted by: Nils Larsch
2003-11-04 00:51:32 +00:00
Geoff Thorpe
c465e7941e
This is the least unacceptable way I've found for declaring the bignum data
...
and structures as constant without having to cast away const at any point.
There is still plenty of other code that makes gcc's "-Wcast-qual" unhappy,
but crypto/bn/ is now ok. Purists are welcome to suggest alternatives.
2003-11-04 00:29:09 +00:00
Richard Levitte
933398f110
Engines are usually binary, and should therefore be in INSTALLTOP
...
rather than OPENSSLDIR.
2003-10-31 10:48:48 +00:00
Richard Levitte
cfd06a6223
Let exit codes propagate from within for loops.
2003-10-31 06:58:24 +00:00
Geoff Thorpe
a9fd78f9da
bn_div() does some pretty nasty things with temporary variables,
...
constructing BIGNUM structures with pointers offset into other bignums
(among other things). This corrects some of it that is too plainly insane,
and tries to ensure that bignums are normalised when passed to other
functions.
2003-10-31 01:35:16 +00:00
Geoff Thorpe
5f747c7f4b
When a BN_CTX is used for temporary workspace, the variables are sometimes
...
left in an inconsistent state when they are released for later reuse. This
change resets the BIGNUMs when they are released back to the context.
2003-10-30 01:07:56 +00:00
Geoff Thorpe
c4db1a8b5c
This fixes a couple of cases where an inconsistent BIGNUM could be passed as
...
input to a function.
2003-10-30 01:03:31 +00:00
Geoff Thorpe
f7939fcd9a
make update
2003-10-29 23:25:52 +00:00
Geoff Thorpe
d531c9014d
Tighten up my compiler settings.
2003-10-29 23:25:34 +00:00
Geoff Thorpe
aca95e0b2f
Remove a line that was causing redundant declarations.
...
Obtained from: Stephen Henson <steve@openssl.org >
2003-10-29 22:55:19 +00:00
Geoff Thorpe
bc3c578208
Copy-n-paste bug (don't mix variable declarations and code). This sets the
...
callback structure just before it is needed.
2003-10-29 22:30:45 +00:00
Geoff Thorpe
06e4024d98
Oops, this file already had the "empty source file" workaround but it
...
requires -DPEDANTIC and was hidden at the bottom of the file. This moves it
to the top and removes the redundant declaration.
2003-10-29 22:25:04 +00:00
Geoff Thorpe
8087d8f7ea
Make md32_common.h friendlier to compiler warnings.
...
Obtained from: Andy Polyakov <appro@openssl.org >
2003-10-29 20:55:03 +00:00
Geoff Thorpe
31166ec8f3
Some provisional bignum debugging has begun to detect inconsistent BIGNUM
...
structures being passed in to or out of API functions, and this corrects a
couple of cases found so far.
Also, lop off a couple of bytes of white-space.
2003-10-29 20:47:49 +00:00
Geoff Thorpe
2754597013
A general spring-cleaning (in autumn) to fix up signed/unsigned warnings.
...
I have tried to convert 'len' type variable declarations to unsigned as a
means to address these warnings when appropriate, but when in doubt I have
used casts in the comparisons instead. The better solution (that would get
us all lynched by API users) would be to go through and convert all the
function prototypes and structure definitions to use unsigned variables
except when signed is necessary. The proliferation of (signed) "int" for
strictly non-negative uses is unfortunate.
2003-10-29 20:24:15 +00:00
Geoff Thorpe
2ce90b9b74
BN_CTX is opaque and the static initialiser BN_CTX_init() is not used
...
except internally to the allocator BN_CTX_new(), as such this deprecates
the use of BN_CTX_init() in the API. Moreover, the structure definition of
BN_CTX is taken out of bn_lcl.h and moved into bn_ctx.c itself.
NDEBUG should probably only be "forced" in the top-level configuration, but
until it is I will avoid removing it from bn_ctx.c which might surprise
people with massive slow-downs in their keygens. So I've left it in
bn_ctx.c but tidied up the preprocessor logic a touch and made it more
tolerant of debugging efforts.
2003-10-29 18:04:37 +00:00
Richard Levitte
4e952ae4fc
Removing those memcpy()s also took away the possibility for in and out to
...
be the same. Therefore, the removed memcpy()s need to be restored.
2003-10-29 06:21:22 +00:00
Geoff Thorpe
db59141467
remove accidentally committed debugging cruft.
2003-10-29 05:35:31 +00:00
Geoff Thorpe
8a66d17899
Remove an unnecessary cast that causes certain compilers (eg. mine) some
...
confusion. Also silence a couple of signed/unsigned warnings.
2003-10-29 05:00:57 +00:00
Geoff Thorpe
2eeaa0261e
Remove redundant declaration.
2003-10-29 04:58:23 +00:00
Geoff Thorpe
8dc344ccbf
Relax some over-zealous constification that gave some lhash-based code no
...
choice but to have to cast away "const" qualifiers from their prototypes.
This does not remove constification restrictions from hash/compare
callbacks, but allows destructor commands to be run over a tables' elements
without bad casts.
2003-10-29 04:57:05 +00:00
Geoff Thorpe
6bcd3f903a
Comments out some unimplemented functions instead of redeclaring them.
2003-10-29 04:42:29 +00:00
Geoff Thorpe
40f935f5b4
Avoid "empty source file" warnings.
2003-10-29 04:41:19 +00:00
Geoff Thorpe
0991f07034
For whatever reason (compiler or header bugs), at least one commonly-used
...
linux system (namely mine) chokes on our definitions and uses of the "HZ"
symbol in crypto/tmdiff.[ch] and apps/speed.c as a "bad function cast"
(when in fact there is no function casting involved at all). In both cases,
it is easily worked around by not defining a cast into the macro and
jiggling the expressions slightly.
In addition - this highlights some cruft in openssl that needs sorting out.
The tmdiff.h header is exported as part of the openssl API despite the fact
that it is ugly as the driven sludge and not used anywhere in the library,
applications, or utilities. More weird still, almost identical code exists
in apps/speed.c though it looks to be slightly tweaked - so either tmdiff
should be updated and used by speed.c, or it should be dumped because it's
obviously not useful enough.
Rather than removing it for now, I've changed the API for tmdiff to at
least make sense. This involves taking the object type (MS_TM) from the
implementation and using it in the header rather than using "char *" in the
API and casting mercilessly in the code (ugh). If someone doesn't like
"MS_TM" and the "ms_time_***" naming, by all means change it. This should
be a harmless improvement, because the existing API is clearly not very
useful (eg. we reimplement it rather than using it in our own utils).
However, someone still needs to take a hack at consolidating speed.c and
tmdiff.[ch] somehow.
2003-10-29 04:40:13 +00:00
Geoff Thorpe
2aaec9cced
Update any code that was using deprecated functions so that everything builds
...
and links with OPENSSL_NO_DEPRECATED defined.
2003-10-29 04:14:08 +00:00
Geoff Thorpe
9d473aa2e4
When OPENSSL_NO_DEPRECATED is defined, deprecated functions are (or should
...
be) precompiled out in the API headers. This change is to ensure that if
it is defined when compiling openssl, the deprecated functions aren't
implemented either.
2003-10-29 04:06:50 +00:00
Geoff Thorpe
6145b0b183
The "cryptodev" engine preprocessor logic used undefined symbols in
...
comparisons. It's better not to allow this, because it gives false
positives when using compiler warnings that detect mistyped symbols.
2003-10-29 04:00:14 +00:00
Geoff Thorpe
2a85f77146
Add my own debug config target.
2003-10-28 22:57:18 +00:00
Geoff Thorpe
66b82f5aad
make update
2003-10-28 22:10:47 +00:00
Geoff Thorpe
12bdceac8a
Ignore derived file.
2003-10-28 17:26:46 +00:00
Geoff Thorpe
aea293e3bc
crypto/evp/evptests.txt is copied to tests/ rather than symlinked because
...
of windows (see checkin 1.75 of crypto/evp/Makefile.ssl), so quiet cvs
noise for the copied version.
2003-10-28 17:24:29 +00:00
Geoff Thorpe
8ad7e3ad2a
Remove duplicate prototypes have already been (correctly) added to rsa.h,
...
as this is already included by x509.h anyway.
2003-10-24 16:17:11 +00:00
Richard Levitte
0b6956b474
Correct serious bug in AES-CBC decryption when the message length isn't
...
a multiple of AES_BLOCK_SIZE.
Optimize decryption of all complete blocks in AES-CBC by removing an
unnecessary memcpy().
The error was notified by James Fernandes <jf210032@exchange.DAYTONOH.NCR.com >.
The unnecessary memcpy() was found as an effect of investigating that error.
2003-10-15 09:00:14 +00:00
Richard Levitte
0bb6187e71
The object file is o_str.o, not o_str.c.
...
Thanks to Peter Sylvester <Peter.Sylvester@EdelWeb.fr > for the notification.
2003-10-13 11:34:40 +00:00
Dr. Stephen Henson
c5a5546389
Add support for digested data PKCS#7 type.
2003-10-11 22:11:45 +00:00
Dr. Stephen Henson
77fe058c10
Simplify cipher and digest lookup in PKCS#7 code.
2003-10-11 16:46:40 +00:00
Dr. Stephen Henson
8d9086dfa2
New function to initialize a PKCS7 structure of type other.
2003-10-10 23:40:47 +00:00
Dr. Stephen Henson
0602abf5bd
Initialize digested data type in PKCS7_set_type().
2003-10-10 23:31:53 +00:00
Dr. Stephen Henson
caf044cb3e
Retrieve correct content to sign when the
...
type is "other".
2003-10-10 23:25:43 +00:00
Dr. Stephen Henson
a08ced78c8
Avoid warnings: add missing prototype, don't shadow.
2003-10-10 23:07:24 +00:00
Richard Levitte
83eb412da8
In realloc, don't destroy the old memory area if a new one couldn't be
...
allocated.
Notified by Daniel Lucq <daniel@lucq.org >
2003-10-07 12:09:39 +00:00
Richard Levitte
4d1c443123
make update
2003-10-06 12:22:42 +00:00
Richard Levitte
f44e184ec6
s_client should inform the user of any compression/expansion methods used.
2003-10-06 12:19:38 +00:00
Richard Levitte
377dcdba44
Add functionality to get information on compression methods (not quite complete).
2003-10-06 12:18:39 +00:00
Richard Levitte
8242354952
Make sure int SSL_COMP_add_compression_method() checks if a certain
...
compression identity is already present among the registered
compression methods, and if so, reject the addition request.
Declare SSL_COMP_get_compression_method() so it can be used properly.
Change ssltest.c so it checks what compression methods are available
and enumerates them. As a side-effect, built-in compression methods
will be automagically loaded that way. Additionally, change the
identities for ZLIB and RLE to be conformant to
draft-ietf-tls-compression-05.txt.
Finally, make update.
Next on my list: have the built-in compression methods added
"automatically" instead of requiring that the author call
SSL_COMP_add_compression_method() or
SSL_COMP_get_compression_methods().
2003-10-06 11:00:15 +00:00
Richard Levitte
c40b9bdefb
Setting the ex_data index is unsafe in a threaded environment, so
...
let's wrap it with a lock.
2003-10-06 09:09:44 +00:00
Richard Levitte
6895cca89d
Remove unused code, don't use zlib functions that are really macros
...
and provide missing prototypes.
2003-10-04 09:09:19 +00:00
Richard Levitte
f82ab534c6
Check for errors from SSL_COMP_add_compression_method().
...
Notified by Andrew Marlow <AMARLOW1@bloomberg.net >
2003-10-02 10:41:48 +00:00
Richard Levitte
f6e8c19ed1
Correct a mixup of return values
2003-10-02 10:38:44 +00:00
Richard Levitte
cf89b40584
Include e_os.h to get a proper definition of memmove on the platforms
...
that do not have it.
2003-10-01 20:43:03 +00:00
Richard Levitte
c076599c18
Corrected misplacement of one of the greps...
2003-10-01 15:06:36 +00:00
Richard Levitte
4d8148fa98
Remove leading and trailing spaces and tabs
2003-10-01 15:04:13 +00:00
Richard Levitte
aed29ce5ea
Avoid 'file names' with spaces
2003-10-01 15:03:15 +00:00
Richard Levitte
9ad82c123a
Use correct case for manual page references
2003-10-01 15:02:45 +00:00
Richard Levitte
eeff6bb6b3
Correct incorrect mode bits change.
2003-09-30 17:31:48 +00:00
Richard Levitte
d90e74c50c
Correct buggy PODs (missing commas and a prepended space).
2003-09-30 17:22:19 +00:00
Dr. Stephen Henson
2990244980
ASN1 parse fix and release file changes.
2003-09-30 16:47:33 +00:00
Richard Levitte
c798868d96
Further VxWorks changes from Bob Bradley <bob@chaoticsoftware.com>, this
...
time involving VxWorks on MIPS
2003-09-28 14:06:57 +00:00
Richard Levitte
057a04398d
Synchronise util/libeay.num with the 0.9.7-stable one.
...
make update
2003-09-28 09:34:50 +00:00
Richard Levitte
7f3ba9428f
Uhmm, It seem to have forgotten one file when I committed the MSDOS
...
change yesterday.
PR: 669
2003-09-28 07:11:33 +00:00
Richard Levitte
3c02e24bb3
Change the indentation from 12 to indent+4.
...
PR: 657
2003-09-27 22:48:33 +00:00
Richard Levitte
1be02dd842
Make MD5 assembler code able to handle messages larger than 2GB on 32-bit
...
systems and above.
PR: 664
2003-09-27 22:14:39 +00:00
Richard Levitte
3d7c4a5a6d
Selected changes for MSDOS, contributed by Gisle Vanem <giva@bgnett.no>.
...
PR: 669
2003-09-27 21:56:08 +00:00
Richard Levitte
11171f3c74
Add reference counting around the thread state hash table.
...
Unfortunately, this means that the dynamic ENGINE version just went up, and
isn't backward compatible.
PR: 678
2003-09-27 20:29:05 +00:00
Richard Levitte
ba9f80c5d5
Have ssl3_ssl3_send_client_verify() change the state to SSL3_ST_SW_CERT_VRFY_B.
...
PR: 679
2003-09-27 19:32:06 +00:00
Richard Levitte
e59659dc41
Have ssl3_send_certificate_request() change the state to SSL3_ST_SW_CERT_REQ_B.
...
PR: 680
2003-09-27 19:27:06 +00:00
Richard Levitte
253e893c2b
Include the instance in the Kerberos ticket information.
...
In s_server, print the received Kerberos information.
PR: 693
2003-09-27 17:55:13 +00:00
Richard Levitte
0ad2c4f85b
Correct small documentation error.
...
PR: 698
2003-09-27 10:39:16 +00:00
Richard Levitte
0e6c20da46
Free the Kerberos context upon freeing the SSL.
...
Contributed by Andrew Mann <amann@tccgi.com >
2003-09-27 07:35:07 +00:00
Richard Levitte
f6b659cba4
Add necessary changes to be able to build on VxWorks for PPC860.
...
Contributed by Bob Bradley <bob@chaoticsoftware.com >
2003-09-27 07:34:49 +00:00
Ralf S. Engelschall
6bd27f8644
Fix prime generation loop in crypto/bn/bn_prime.pl by making
...
sure the loop does correctly stop and breaking ("division by zero")
modulus operations are not performed. The (pre-generated) prime
table crypto/bn/bn_prime.h was already correct, but it could not be
re-generated on some platforms because of the "division by zero"
situation in the script.
2003-09-25 13:57:58 +00:00
Dr. Stephen Henson
dfe399e7d9
Add -passin support to rsautl
2003-09-21 02:20:02 +00:00
Dr. Stephen Henson
7068c8b1a6
In order to get the expected self signed error when
...
calling X509_verify_cert() in x509.c the cert should
not be added to the trusted store.
2003-09-21 02:18:15 +00:00
Dr. Stephen Henson
837685c522
file testfipsssl was added on branch OpenSSL_1_0_1-stable on 2011-06-14 15:35:49 +0000
2003-09-13 17:03:55 +00:00
Dr. Stephen Henson
82384690e2
Typos.
2003-09-09 23:44:39 +00:00
Richard Levitte
e6fa67fa93
Generalise the definition of strcasecmp() and strncasecmp() for
...
platforms that don't (necessarely) have it. In the case of VMS, this
means moving a couple of functions from apps/ to crypto/ and make them
general (although only used privately).
2003-09-09 14:48:36 +00:00
Geoff Thorpe
9ea72d3705
These should be write-locks, not read-locks.
2003-09-08 15:47:55 +00:00
Bodo Möller
a907751350
certain changes have to be listed twice in this file because OpenSSL
...
0.9.6h forked into 0.9.6i and 0.9.7 ...
2003-09-04 12:52:56 +00:00
Dr. Stephen Henson
560dfd2a02
New -ignore_err option in ocsp application to stop the server
...
exiting on the first error in a request.
2003-09-03 23:56:01 +00:00
Dr. Stephen Henson
14f3d7c5cc
Only accept a client certificate if the server requests
...
one, as required by SSL/TLS specs.
2003-09-03 23:47:34 +00:00
Dr. Stephen Henson
510dc1ecd0
outlen should be int * in out_utf8.
2003-08-21 12:32:12 +00:00
Bodo Möller
563c05e2dc
fix out-of-bounds check in lock_dbg_cb (was too lose to detect all
...
invalid cases)
PR: 674
2003-08-14 10:33:56 +00:00
Bodo Möller
643ecd2ed6
make sure no error is left in the queue that is intentionally ignored
2003-08-11 18:56:22 +00:00
Richard Levitte
88401ed449
Correct two problems, found by Martin Kochanski <cardbox@easynet.co.uk>:
...
1. CreateToolhelp32Snapshot returns INVALID_HANDLE_VALUE, not NULL, on error.
2. On Windows CE, a snapshot handle is closed with CloseToolhelp32Snapshot,
not CloseHandle.
2003-08-07 11:57:42 +00:00
Bodo Möller
3aa8d3a7f1
add OpenSSL license
...
fix typo
2003-08-06 10:36:25 +00:00
Richard Levitte
5b6e7c8c65
Inclusion of openssl/engine.h should always be wrapped with a check that
...
OPENSSL_NO_ENGINE is not defined.
2003-08-04 10:12:36 +00:00
Dr. Stephen Henson
f96d1af449
Avoid clashes with Win32 names in WinCrypt.h
2003-07-23 00:10:43 +00:00
Bodo Möller
968766cad8
updates for draft-ietf-tls-ecc-03.txt
...
Submitted by: Douglas Stebila
Reviewed by: Bodo Moeller
2003-07-22 12:34:21 +00:00
Bodo Möller
652ae06bad
add test for secp160r1
...
add code for kP+lQ timings
Submitted by: Douglas Stebila <douglas.stebila@sun.com >
Reviewed by: Bodo Moeller
2003-07-22 10:39:10 +00:00
Bodo Möller
ddc38679ce
tolerate extra data at end of client hello for SSL 3.0
...
PR: 659
2003-07-21 15:17:46 +00:00
Bodo Möller
02e0559477
fix: 0.9.7 is based on 0.9.6h, not on 0.9.6k
...
typo in 0.9.6k section
2003-07-21 15:08:01 +00:00
Bodo Möller
ada0e717fa
new function EC_GROUP_cmp() (used by EVP_PKEY_cmp())
...
Submitted by: Nils Larsch
2003-07-21 13:43:28 +00:00
Bodo Möller
2c789c82be
manpages for 'openssl ec' and 'openssl ecparam'
...
Submitted by: Nils Larsch
2003-07-21 13:40:02 +00:00
Richard Levitte
d143dce03c
A document that has a very rough description of the X509
...
functionality. This is mostly so there's a way to get from the
crypto.html page to the function descriptions.
2003-07-10 08:49:03 +00:00
Richard Levitte
f9d183c209
Replace CCITT with ITU-T. Keep CCITT around as an alias.
...
make update
PR: 80
2003-07-04 15:45:04 +00:00
Richard Levitte
182cd19dea
Make sure openssl.pc is readable by everyone.
...
PR: 654
2003-07-04 11:41:13 +00:00
Richard Levitte
61f00386ab
The counter is big-endian. Since it comes as an array of char,
...
there's absolutely no need to special-case it on little-endian
machines.
Notified by Thierry Boivin <Thierry.Boivin@celsecat.com >
2003-07-04 11:37:50 +00:00
Richard Levitte
2ae0352b0f
Oops, I forgot to replace 'counter' with 'ivec' when used...
2003-07-03 20:50:44 +00:00
Richard Levitte
94805c84d1
Add -issuer_hash and make -subject_hash the default way to get the
...
subject hash, with -hash a synonym kept around for backward
compatibility reasons.
PR: 650
2003-07-03 20:45:09 +00:00
Richard Levitte
6f2f534b58
The convenience argumetn for -nameopt and -certopt is ca_default, not
...
default_ca.
PR: 653
2003-07-03 07:46:52 +00:00
Richard Levitte
da6c44fc97
The 'counter' is really the IV.
2003-07-03 06:42:43 +00:00
Richard Levitte
da0d33560f
Change AES-CTR to increment the IV by 1 instead of 2^64.
2003-07-03 06:41:30 +00:00
Lutz Jänicke
9d19fbc4fc
Clarify wording of verify_callback() behaviour.
2003-06-26 14:03:03 +00:00
Richard Levitte
aa5ae4841e
Only remove old files if they exist. [Maing32].
...
Notified by Michael Gerdau <mgd@technosis.de >
2003-06-26 11:58:02 +00:00
Richard Levitte
eb3d68c454
Nils Larsch told me I could remove that variable entirely.
2003-06-26 11:52:23 +00:00
Richard Levitte
c89f31def0
make update
2003-06-26 10:27:11 +00:00
Richard Levitte
ed5fae580e
Implement missing functions.
...
Have the f parameter to _ctrl functions have the prototype (*)(void)
rather than (*)(), for the sake of C++ compilers.
Disable unimplemented functionality.
2003-06-26 10:26:42 +00:00
Richard Levitte
d55141ed7a
"Remove" unused variable
2003-06-26 10:23:00 +00:00
Richard Levitte
a99ce1a574
Conform with the standard prototype for engine control functions.
2003-06-26 07:10:10 +00:00
Richard Levitte
c687a3d5d5
Scan through the engines directory as well.
2003-06-26 07:05:19 +00:00
Richard Levitte
dfc3151925
The definition of dynamic_ctrl() should change along with the
...
declaration :-).
2003-06-26 07:03:49 +00:00
Bodo Möller
0fbffe7a71
implement PKCS #8 / SEC1 private key format for ECC
...
Submitted by: Nils Larsch
2003-06-25 21:35:05 +00:00
Dr. Stephen Henson
037f6e73f1
Return EOF when an S/MIME part have been read.
2003-06-24 17:11:44 +00:00
Richard Levitte
cf82439de8
Make sure the compiler knows we run with pedantic settings.
2003-06-20 00:57:18 +00:00
Richard Levitte
37fcd48f86
make update
2003-06-19 23:00:50 +00:00
Richard Levitte
cf9a88cad7
Document the last change.
...
PR: 587
2003-06-19 19:04:13 +00:00
Richard Levitte
4f1cd8324c
Prepare for changes in the 0.9.6 branch
2003-06-19 19:01:05 +00:00
Richard Levitte
ed7f1d0bc6
Prepare for changes in the 0.9.6 branch
2003-06-19 18:59:27 +00:00
Richard Levitte
f6b9cd7f82
We set the export flag for 512 *bit* keys, not 512 *byte* ones.
...
PR: 587
2003-06-19 18:55:50 +00:00
Richard Levitte
8fbb2af392
Add documentation for the new crlnumber configuration option.
2003-06-19 17:52:57 +00:00
Richard Levitte
c5aba56c5b
Typo.
2003-06-19 17:50:37 +00:00
Richard Levitte
fd4ef69913
Implement CRL numbers.
...
Contributed in whole by Laurent Genier <Laurent.Genier@intrinsec.com >
PR: 644
2003-06-19 17:40:16 +00:00
Richard Levitte
834ac33a37
dynamic_ctrl() didn't have exactly the same prototype as defined by
...
ENGINE_CTRL_FUNC_PTR.
2003-06-19 16:57:38 +00:00
Richard Levitte
4e9023f4d2
Unsigned vs. signed fixed.
2003-06-19 16:56:48 +00:00
Richard Levitte
d3a28e8b8d
EXIT() should mainly be exit(n), not return(n). OPENSSL_EXIT() will
...
take care of returning if necessary.
2003-06-19 16:56:19 +00:00
Richard Levitte
0bd71d3b7e
Add the application data type to the README.
2003-06-18 07:14:52 +00:00
Richard Levitte
d97322f0e6
Missing string and potential memory leaks.
...
Notified by Goetz Babin-Ebell <goetz@shomitefo.de >
2003-06-18 07:12:28 +00:00
Richard Levitte
b52d512dfa
Slightly better check of attributes. Now, mem_list_next can actually stop when the searched for key doesn't have it's attributes within the range of the checked key.
2003-06-12 21:32:54 +00:00
Richard Levitte
a3a2ff4cd9
Beautify
2003-06-12 18:13:27 +00:00
Richard Levitte
5a1fd87ec1
Typo.
...
PR: 584
2003-06-12 01:04:05 +00:00
Richard Levitte
8645c415cf
Do not try to use non-existent gmtime_r() on SunOS4.
...
PR: 585
2003-06-12 00:57:25 +00:00
Richard Levitte
700d86ea18
Make sure ssize_t is defined on SunOS4.
...
PR: 585
2003-06-12 00:56:27 +00:00
Richard Levitte
54bbde3c3f
Make sure DSO-dlfcn works properly on SunOS4.
...
PR: 585
2003-06-12 00:51:54 +00:00
Richard Levitte
c14b337570
Typo.
...
PR: 593
2003-06-11 22:45:53 +00:00
Richard Levitte
e666c4599f
Add the possibility to have symbols loaded globally with DSO.
2003-06-11 22:42:28 +00:00
Richard Levitte
98cec7fc7b
make update
2003-06-11 22:27:19 +00:00
Richard Levitte
fadd2246a0
Avoid warnings saying that the format takes a void*.
2003-06-11 22:26:02 +00:00
Richard Levitte
c78b4f1d3d
Remove unused variable
2003-06-11 21:47:21 +00:00
Richard Levitte
33862b90bb
Add an entry for X509_TRUST_OBJECT_SIGN in trstandard[].
...
PR: 617
2003-06-11 21:22:30 +00:00
Richard Levitte
36bad5cdfd
Add documentation for ERR_set_mark() and ERR_pop_to_mark().
2003-06-11 20:51:49 +00:00
Richard Levitte
54f6451670
Add functionality to set marks on the error stack and to pop all errors to the next mark.
2003-06-11 20:49:58 +00:00
Richard Levitte
490967195a
Handle des_modes.pod properly.
...
PR: 634
2003-06-11 19:44:37 +00:00
Richard Levitte
606c8048a0
Make sure to NUL-terminate the string on end-of-file (and error)
...
PR: 643
2003-06-11 18:43:45 +00:00
Richard Levitte
e66d863cd0
Add crypto/store to the directories to look through.
2003-06-11 04:46:08 +00:00
Richard Levitte
a069460015
Document the AES_cbc_encrypt() change
2003-06-10 04:42:38 +00:00
Richard Levitte
55b12f8641
The output from AES_cbc_encrypt() should be exact multiple blocks when encrypting
2003-06-10 04:11:42 +00:00
Richard Levitte
40e5b9abeb
Typo
2003-06-09 07:56:18 +00:00
Geoff Thorpe
dcfb57c736
This memset() in the ubsec ENGINE is a bug. Zeroing out the result array
...
should not be necessary in any case, but more importantly the result and
input BIGNUMs could be the same, in which case this is clearly a problem.
Submitted by: Jonathan Hersch
Reviewed by: Joe Orton
Approved by: Geoff Thorpe
2003-06-06 17:51:34 +00:00
Richard Levitte
2ee67f1dad
Make sure the sigaction structure and fileno function are properly declared with an ANSI compiler on Solaris (and possibly others).
2003-06-04 09:13:19 +00:00
Richard Levitte
4af3184662
Remove extra ;
2003-06-04 09:11:44 +00:00
Richard Levitte
e31047744a
Make sure the function definitions match their declaration.
2003-06-04 09:11:15 +00:00
Richard Levitte
f6eba601b0
Make sure that size_t matches size_t.
2003-06-04 09:10:43 +00:00
Richard Levitte
f796dc5c06
Make sure debug-solaris-sparcv9-gcc is consistent with solaris-sparcv9-gcc.
2003-06-04 09:10:11 +00:00
Dr. Stephen Henson
50078051bd
Really get X509_CRL_CHECK_ALL right this time...
2003-06-04 00:40:05 +00:00
Lutz Jänicke
db01746978
Clarify return value of SSL_connect() and SSL_accept() in case of the
...
WANT_READ and WANT_WRITE conditions.
2003-06-03 09:59:44 +00:00
Dr. Stephen Henson
63b815583b
Update CHANGES to reflect base64 fix added to 0.9.7
2003-06-03 00:16:47 +00:00
Dr. Stephen Henson
ca82ac1fee
Only count 'LF' as EOL in pk7_mime.c, this avoids incorrect
...
results if CR+LF straddles the line buffer.
2003-06-02 17:53:42 +00:00
Dr. Stephen Henson
aff0542844
Stop checking for CRLF when start of buffer is reached.
...
Add rest of long line fix which got missed before
2003-06-02 01:12:01 +00:00
Dr. Stephen Henson
beab098d53
Various S/MIME bug and compatibility fixes.
2003-06-01 20:51:58 +00:00
Lutz Jänicke
02b95b7499
Clarify ordering of certificates when using certificate chains
2003-05-30 07:45:07 +00:00
Richard Levitte
c4d471552f
Include openssl/e_os.h so OPENSSL_SYSNAME_ULTRASPARC and other configuration
...
macros get properly defined.
2003-05-29 22:22:30 +00:00
Richard Levitte
01fc834bc9
Have ASFLAGS be defined the same way as CFLAGS
2003-05-29 22:20:47 +00:00
Richard Levitte
f7f8d82aaa
PR: 630
...
Avoid looking outside the key_data array.
2003-05-29 20:59:38 +00:00
Lutz Jänicke
4f17dfcd75
Add minimum POP3 STLS hack to s_client.c (as was provided for STARTTLS before)
...
Submitted by: dg@sunet.ru (Daniel Ginsburg)
PR: #613
2003-05-28 20:24:57 +00:00
Lutz Jänicke
83b4f49c0a
Move header file inclusion to prevent irritation of users forgetting to
...
call "make depend" after enabling or disabling ciphers...
Submitted by: Tal Mozes <talm@cyber-ark.com >
PR: #628
2003-05-28 19:56:46 +00:00
Dr. Stephen Henson
60790aff6f
PR: 627
...
Allocate certificatePolicies correctly if CPS field is absent.
Fix various memory leaks in certificatePolicies.
2003-05-28 17:28:11 +00:00
Dr. Stephen Henson
e19d0ef068
PR: 631
...
Submitted by: Doug Sauder <dws+001@hunnysoft.com >
Fix bug in X509V3_get_d2i() when idx in not NULL.
2003-05-28 16:57:08 +00:00
Richard Levitte
f5f7dffdd1
Make sure to compare unsigned against unsigned.
2003-05-28 10:34:29 +00:00
Richard Levitte
edd55d08f5
Brackets are now allowed, after a small hack in the processing of the
...
docs-on-web.
2003-05-23 09:08:59 +00:00
Richard Levitte
83743ad039
Fix sign bugs.
...
PR: 621
2003-05-21 14:29:13 +00:00
Richard Levitte
163f5b236c
Correct signedness
2003-05-21 14:21:26 +00:00
Richard Levitte
513c01a591
Make sure EC_window_bits_for_scalar_size() returns a size_t
2003-05-21 08:40:06 +00:00
Richard Levitte
d9a2a89a17
I have no idea how I cut away that piece of text...
2003-05-21 06:50:51 +00:00
Richard Levitte
31939f1544
I don't remember what my thinking was with str_compat.h. Maybe it'll
...
come back to me...
2003-05-20 09:00:59 +00:00
Richard Levitte
11ce33a71d
make update
2003-05-20 08:59:37 +00:00
Richard Levitte
9acef3bbd7
Misspelled functions.
2003-05-20 08:50:18 +00:00
Richard Levitte
164bc7dae8
Some misspelled function names.
2003-05-20 08:49:12 +00:00
Richard Levitte
f59c941950
Make the function STORE_new_engine() public.
2003-05-19 23:06:09 +00:00
Richard Levitte
0239876511
Remove certain functions
2003-05-19 23:03:43 +00:00
Dr. Stephen Henson
93c929e411
The square brackets in BIO_s_bio.pod for some
...
reason cause wml to bomb out with the error
message:
** Slice:Error: Some slices were not closed:
** WML:Break: Error in Pass 9 (rc=1).
** WMK:Error: Error in WML (rc=256)
As a workaround delete them for now.
2003-05-19 21:28:49 +00:00
Dr. Stephen Henson
c2dac35a02
Fix docs.
2003-05-18 23:10:46 +00:00
Dr. Stephen Henson
727ef76ebd
Add correct DN entry for serialNumber.
2003-05-07 23:20:58 +00:00
Richard Levitte
bca52f7d4e
Define the two authentication parameter types for passphrase and
...
Kerberos 5 authentications.
2003-05-07 21:17:30 +00:00
Richard Levitte
48c36fdb2a
Add the possibility to hand execution parameters (for example
...
authentication material) to the STORE functions.
Suggested by Götz Babin-Ebell <babin-ebell@trustcenter.de >.
2003-05-07 21:06:15 +00:00
Richard Levitte
9b2042fac3
/usr/lib/pkgconfig/openssl.pc was never installed in the RPM.
...
Notified by Bennett Todd <bet@rahul.net >.
2003-05-07 12:02:31 +00:00
Richard Levitte
816d785721
DO NOT constify RSA* in RSA_sign() and RSA_verify(), since there are function
...
called downstream that need it to be non-const. The fact that the RSA_METHOD
functions take the RSA* as a const doesn't matter, it just expresses that
*they* won't touch it.
PR: 602
2003-05-07 11:38:10 +00:00
Richard Levitte
742b139f54
Add the possibility to store arbitrary data in a STORE.
...
Suggested by Götz Babin-Ebell <babin-ebell@trustcenter.de >.
2003-05-06 08:02:14 +00:00
Richard Levitte
3b30121bd9
Constify RSA_sign() and RSA_verify().
...
PR: 602
2003-05-05 13:55:18 +00:00
Richard Levitte
9ee789e6c3
Yeah, right, an object file ending with .c, that'll work!
2003-05-03 06:58:08 +00:00
Dr. Stephen Henson
b9d2d20086
Make DER option work again.
...
Fix typo.
2003-05-02 11:41:40 +00:00
Richard Levitte
b9d7ca9748
It's usually best if the function name matches everywhere...
2003-05-02 07:25:54 +00:00
Richard Levitte
5b194dfbd5
STORE was created 2003, darnit!
2003-05-01 20:44:20 +00:00
Richard Levitte
7f6af7d9db
Get the year right...
2003-05-01 20:15:35 +00:00
Richard Levitte
42b2b6a2d5
Provide some extra comments about the STORE_Memory STORE method.
2003-05-01 04:31:12 +00:00
Richard Levitte
d1465bac90
make update
2003-05-01 04:10:32 +00:00
Richard Levitte
3bbb0212f3
Add STORE support in ENGINE.
2003-05-01 03:57:46 +00:00
Richard Levitte
a5db6fa576
Define a STORE type. For documentation, read the entry in CHANGES,
...
crypto/store/README, crypto/store/store.h and crypto/store/str_locl.h.
2003-05-01 03:53:12 +00:00
Richard Levitte
9236b5b013
Define a STORE lock (the STORE type will be committed later).
2003-05-01 03:46:10 +00:00
Richard Levitte
535fba4907
Define the OPENSSL_ITEM structure.
2003-05-01 03:45:18 +00:00
Richard Levitte
7e4140f73f
make update
2003-04-29 22:24:17 +00:00
Richard Levitte
1ae0a83bdd
Add BUF_strndup() and BUF_memdup(). Not currently used, but I've code
...
that uses them that I'll commit in a few days.
2003-04-29 22:08:57 +00:00
Richard Levitte
7ae46c6761
make update
2003-04-29 21:35:28 +00:00
Richard Levitte
d584fd6b66
Include objects.h to get a correct declaration of OBJ_bsearch_ex(),
...
not to mention the OBJ_BSEARCH_* macros.
2003-04-29 20:46:32 +00:00
Richard Levitte
54dbdd9837
Some variables were uninitialised...
2003-04-29 20:45:36 +00:00
Richard Levitte
9d6c32d6d1
Correct documentation. sk_find_ex() doesn't return a pointer, it
...
returns an index.
2003-04-29 20:31:58 +00:00
Richard Levitte
26851b6b42
Add an extended variant of sk_find() which returns a non-NULL pointer
...
even if an exact match wasn't found.
2003-04-29 20:30:55 +00:00
Richard Levitte
ea5240a5ed
Add an extended variant of OBJ_bsearch() that can be given a few
...
flags.
2003-04-29 20:25:21 +00:00
Bodo Möller
eec7968f18
fix typo
...
Submitted by: Nils Larsch
2003-04-22 08:29:21 +00:00
Richard Levitte
1cc087fe4f
Make it possible to affect the extension of man pages.
...
PR: 578
2003-04-21 22:00:36 +00:00
Richard Levitte
040c687ce4
Memory leak fix: RSA_blinding_on() didn't free Ai under certain circumstances.
...
Memory leak fix: RSA_blinding_on() would leave a dangling pointer in
rsa->blinding under certain circumstances.
Double definition fix: RSA_FLAG_NO_BLINDING was defined twice.
2003-04-16 06:25:21 +00:00
Richard Levitte
cd1226bc6a
Memory leak fix: local blinding structure not freed in rsa_eay_private_decrypt()
2003-04-15 13:01:37 +00:00
Bodo Möller
7a04fdd87f
include 'Changes between 0.9.6i and 0.9.6j'
2003-04-11 15:03:12 +00:00
Richard Levitte
138f970e6e
Add the 0.9.6j news.
2003-04-10 20:38:24 +00:00
Richard Levitte
1a0c1f9052
make update
2003-04-10 20:11:09 +00:00
Richard Levitte
1774e22d6f
New NEWS
2003-04-10 19:33:09 +00:00
Richard Levitte
26abc8f01a
Remove all those infernal stupid CR characters
2003-04-10 19:11:32 +00:00
Richard Levitte
5924c21608
There's a problem building shared libraries on the sco5-gcc target. However,
...
it's time for a release, so I'm just adding an enty in PROBLEMS, and will
hopefully solve this for a later release
2003-04-10 18:36:31 +00:00
Richard Levitte
c93fbfaebc
Explicitely tell the compiler we're mips3 for the target irix-mips3-cc.
2003-04-10 05:46:51 +00:00
Dr. Stephen Henson
0b1c00abeb
Typo.
2003-04-10 00:04:02 +00:00
Richard Levitte
721688c2f8
Include rand.h, so RAND_status() and friends get properly declared.
2003-04-08 11:07:05 +00:00
Richard Levitte
a109220107
Correct a few typos.
...
It seems that svr3 and svr5 differ, after all.
2003-04-08 09:27:43 +00:00
Richard Levitte
4a4a04622e
A single quote too many.
2003-04-08 08:58:56 +00:00
Richard Levitte
d6fd88fffd
I forgot to continuation mark.
2003-04-08 08:57:23 +00:00
Richard Levitte
e96133e4cf
It seems like OpenUnix's ld uses LD_LIBRARY_PATH to search for
...
libraries. What's worse, the directories given in LD_LIBRARY_PATH are
checked first! Therefore, we need a hack to prepend all the
directories we give with -L to the current value of LD_LIBRARY_PATH,
thereby temporarly forming a hacked value.
Only copy LIBEXTRAS if they are given.
Svr5 doesn't use -z allextract...
2003-04-08 08:36:20 +00:00
Lutz Jänicke
f65a75786b
Fix ordering of compare functions: strncmp() must be used first, a
...
the cipher name in the list is not guaranteed to be at least "buflen"
long.
PR: 567
Submitted by: "Matt Harren" <matth@cs.berkeley.edu >
2003-04-08 06:31:36 +00:00
Richard Levitte
0b55368306
We seem to carry some rests of the 0.9.6 [engine] ENGINE framework, here in
...
form of unneeded direct calls through the engine pointer..
2003-04-08 06:01:55 +00:00
Richard Levitte
43eb3b0130
We seem to carry some rests of the 0.9.6 [engine] ENGINE framework in form
...
of unneeded includes of openssl/engine.h.
2003-04-08 06:00:05 +00:00
Richard Levitte
0a861ab7f3
RSA_FLAG_SIGN_VER indicates the special rsa_sign and rsa_verify function
...
pointers should be used. It doesn't necessarely mean it should go through
the ENGINE framework.
2003-04-07 19:15:25 +00:00
Richard Levitte
7b36590b17
What was I smoking? EVP_PKEY_cmp() should return with 0 if
...
EVP_PKEY_cmp_parameters() returned 0, otherwise it should
go on processing the public key component. Thia has nothing
to do with the proper handling of EC parameters or not.
2003-04-07 10:15:32 +00:00
Richard Levitte
a8b728445c
Correct a typo.
...
Have EVP_PKEY_cmp() call EVP_PKEY_cmp_parameters(), and make a note
about the lack of parameter comparison for EC.
2003-04-07 10:09:44 +00:00
Richard Levitte
af0f0f3e8f
Constify
2003-04-06 15:31:18 +00:00
Richard Levitte
8d570498a2
Do not call ENGINE_setup_bsd_cryptodev() when OPENSSL_NO_ENGINE is defined.
...
PR: 564
2003-04-05 21:21:26 +00:00
Richard Levitte
4c771796d5
Convert save_serial() to work like save_index(), and add a
...
rotate_serial() that works like rotate_index().
2003-04-04 15:10:35 +00:00
Richard Levitte
d6df2b281f
Add documentation on the added functionality in 'openssl ca'.
2003-04-04 14:39:44 +00:00
Richard Levitte
6fcf735497
make update
2003-04-04 14:19:15 +00:00
Richard Levitte
b5f96e8818
There's no need to check for __attribute__ with ANSI functions, since
...
we only check to the opening parenthesis anyway...
2003-04-04 14:19:00 +00:00
Richard Levitte
3ae70939ba
Correct a lot of printing calls. Remove extra arguments...
2003-04-03 23:39:48 +00:00
Richard Levitte
c433d72593
Make %p and %# work properly, at least with pointers and floats.
2003-04-03 23:35:14 +00:00
Richard Levitte
68b42986cb
Add GCC attributes when compiled with gcc. This helps find out if
...
we're using the printing functions correctly or not.
I used the corresponding attributes found in the header files of my
Linux installation.
2003-04-03 23:06:05 +00:00
Richard Levitte
57544ee224
Counter for GCC attributes.
2003-04-03 23:04:48 +00:00
Richard Levitte
83b23ed967
One more debug line to conditionalise.
2003-04-03 23:01:20 +00:00
Richard Levitte
4342c5c1a0
Add a CA section, to make sure the test will work with the changes in
...
CA.sh.
2003-04-03 22:38:31 +00:00
Richard Levitte
16b1b03543
Implement self-signing in 'openssl ca'. This makes it easier to have
...
the CA certificate part of the CA database, and combined with
'unique_subject=no', it should make operations like CA certificate
roll-over easier.
2003-04-03 22:33:59 +00:00
Richard Levitte
e6526fbf4d
Add functionality to help making self-signed certificate.
2003-04-03 22:27:24 +00:00
Richard Levitte
8152d88799
It's recommended to use req rather than x509 to create self-signed certificates
2003-04-03 22:12:48 +00:00
Richard Levitte
4ce4884a5b
Typo correction
2003-04-03 21:55:55 +00:00
Richard Levitte
db598fbce2
Don't try to free NULL values...
2003-04-03 20:03:23 +00:00
Richard Levitte
8382ec5d37
Reindent for readability.
2003-04-03 19:10:32 +00:00
Richard Levitte
0998cfaadd
Remove unused variable.
2003-04-03 19:07:27 +00:00
Richard Levitte
c4448f60d6
Reset the version number of the issuer certificate? I believe this
...
hasn't been tested in a long while...
2003-04-03 18:50:15 +00:00
Richard Levitte
63b6fe2bf6
Conditionalise all debug strings.
2003-04-03 18:07:39 +00:00
Richard Levitte
f85b68cd49
Make it possible to have multiple active certificates with the same
...
subject.
2003-04-03 16:33:03 +00:00
Bodo Möller
5679bcce07
make RSA blinding thread-safe
2003-04-02 09:50:22 +00:00
Richard Levitte
24692fc5d7
It seems like gcc-drivven shared library building on OpenUnix 8 requires
...
-shared rather than -G.
2003-04-01 10:59:15 +00:00
Dr. Stephen Henson
4390d66179
Update from stable branch.
2003-03-31 22:29:25 +00:00
Richard Levitte
d678cc07ed
No need to test -setalias twice.
...
PR: 556
2003-03-31 13:56:52 +00:00
Richard Levitte
6dd6da6005
Don't feil when indent is 0.
...
PR: 559
2003-03-31 13:24:02 +00:00
Richard Levitte
03eeb07152
Add usage string for -fingerprint.
...
PR: 560
2003-03-31 13:06:24 +00:00
Dr. Stephen Henson
1a15c89988
Multi valued AVA support.
2003-03-30 01:51:16 +00:00
Richard Levitte
d0a4bd00b6
OpenUNIX 8 has some problems using -G with gcc. Maybe using gnu-shared works better (will be tested tonight).
2003-03-28 08:57:04 +00:00
Lutz Jänicke
423b1a840c
Add warning about unwanted side effect when calling SSL_CTX_free():
...
sessions in the external session cache might be removed.
Submitted by: "Nadav Har'El" <nyh@math.technion.ac.il >
PR: 547
2003-03-27 22:04:05 +00:00
Richard Levitte
a47789e849
Update VMS building system
2003-03-26 14:34:38 +00:00
Dr. Stephen Henson
e5b0508a14
Update ocsp usage message and docs.
2003-03-26 00:46:47 +00:00
Richard Levitte
c4d00669a0
Let's limit the extent of the definition of _XOPEN_SOURCE.
2003-03-25 21:17:28 +00:00
Richard Levitte
d6cab100fa
Missed a few dollars.
...
PR: 528
2003-03-25 20:56:06 +00:00
Dr. Stephen Henson
81bd0446a9
make update
2003-03-24 17:06:25 +00:00
Dr. Stephen Henson
520b76ffd9
Support for name constraints.
2003-03-24 17:04:44 +00:00
Dr. Stephen Henson
1c2d141238
Name Constraints OID.
2003-03-24 00:56:09 +00:00
Lutz Jänicke
32e75dd3f0
Add SCO5 shared library scripts.
...
Upate SVR5 scripts for the upcoming 0.9.7b.
Submitted by: Boyd Lynn Gerber <gerberb@zenez.com >
2003-03-23 10:18:05 +00:00
Richard Levitte
abfc6a3a9b
To define OPENSSL_NO_FP_API for all MSDOS type targets was unfair
...
against DJGPP, and much more restricted than previous definitions.
2003-03-22 22:33:52 +00:00
Dr. Stephen Henson
5cc5ec1bba
make update
2003-03-21 16:28:29 +00:00
Dr. Stephen Henson
f80153e20b
Support for policy constraints.
2003-03-21 16:26:20 +00:00
Bodo Möller
33b34a9d8f
remove patch ID (which is supposed to appear in patched variants of
...
old OpenSSL releases, but not in new releases)
2003-03-21 13:11:14 +00:00
Richard Levitte
9b94f215b1
Define COMP method function prototypes properly.
2003-03-21 00:05:14 +00:00
Richard Levitte
8b5bcef798
Make sure to declare mem*() properly.
2003-03-21 00:04:14 +00:00
Richard Levitte
ea17e1f00f
make update
2003-03-20 23:54:33 +00:00
Richard Levitte
543105ac17
Don't put configuration macro definitions on the command line, we're
...
just fooling ourselves and then screwing up for other applications.
2003-03-20 23:52:41 +00:00
Richard Levitte
3789284807
Sometimes, we have partial comments on the same line as other stuff we
...
parse. Make sure to read in the whole comment, so it can be entirely
removed.
2003-03-20 23:51:35 +00:00
Richard Levitte
be9bec9bc7
Make sure we get the definition of OPENSSL_NO_RSA.
2003-03-20 23:34:28 +00:00
Richard Levitte
9c35452842
Make sure we get the definition of OPENSSL_NO_HMAC and OPENSSL_NO_SHA.
2003-03-20 23:34:08 +00:00
Richard Levitte
69104cdf34
Make sure we get the definition of OPENSSL_NO_SHA.
2003-03-20 23:32:16 +00:00
Richard Levitte
dfefdb41f7
Make sure we get the definition of OPENSSL_NO_RIPEMD.
2003-03-20 23:31:56 +00:00
Richard Levitte
cd6ab56da0
Make sure we get the definition of OPENSSL_NO_MDC2.
2003-03-20 23:31:44 +00:00
Richard Levitte
c988c9b839
Make sure we get the definition of OPENSSL_NO_MD5.
2003-03-20 23:31:34 +00:00
Richard Levitte
bff8e1dddb
Make sure we get the definition of OPENSSL_NO_MD4.
2003-03-20 23:31:24 +00:00
Richard Levitte
641e6ef2cb
Make sure we get the definition of OPENSSL_NO_MD2.
2003-03-20 23:30:04 +00:00
Richard Levitte
9e9e8cb6a8
Make sure we get the definition of OPENSSL_NO_DES.
2003-03-20 23:29:38 +00:00
Richard Levitte
f118514501
Make sure we get the definition of OPENSSL_NO_RC5.
2003-03-20 23:29:26 +00:00
Richard Levitte
39c4b7092c
Make sure we get the definition of OPENSSL_NO_RC4.
2003-03-20 23:29:17 +00:00
Richard Levitte
c7e7fc3ee4
Make sure we get the definition of OPENSSL_NO_RC2.
2003-03-20 23:29:06 +00:00
Richard Levitte
786b0075d5
Make sure we get the definition of OPENSSL_NO_IDEA.
2003-03-20 23:28:55 +00:00
Richard Levitte
fb10590910
Make sure we get the definition of OPENSSL_NO_CAST.
2003-03-20 23:28:27 +00:00
Richard Levitte
abf21308d2
Make sure we get the definition of OPENSSL_NO_BF.
2003-03-20 23:28:16 +00:00
Richard Levitte
8c84b677e2
Make sure we get the definition of OPENSSL_NO_AES.
2003-03-20 23:28:03 +00:00
Richard Levitte
d5ef144222
Make sure we get the definition of a number of OPENSSL_NO_* macros.
2003-03-20 23:27:17 +00:00
Richard Levitte
741dae576f
Make sure we get the definition of OPENSSL_NO_BIO.
2003-03-20 23:26:46 +00:00
Richard Levitte
59ade20500
Include e_os.h correctly.
2003-03-20 23:26:32 +00:00
Richard Levitte
c11b9af75e
Make sure we get the definition of OPENSSL_NO_MD2.
2003-03-20 23:24:59 +00:00
Richard Levitte
08a54f6e6a
Make sure we get the definition of OPENSSL_NO_FP_API.
2003-03-20 23:24:47 +00:00
Richard Levitte
8305477157
Make sure we get the definition of OPENSSL_NO_IDEA and IDEA_INT.
2003-03-20 23:24:32 +00:00
Richard Levitte
e8cc7de4f4
Make sure we get the definition of OPENSSL_NO_HMAC.
2003-03-20 23:23:43 +00:00
Richard Levitte
3b6aa36c77
Make sure we get the definition of OPENSSL_NO_ECDSA.
2003-03-20 23:22:31 +00:00
Richard Levitte
03829b2b47
Make sure we get the definition of OPENSSL_NO_ECDH.
2003-03-20 23:22:17 +00:00
Richard Levitte
87c9c659de
Make sure we get the definition of OPENSSL_NO_EC.
2003-03-20 23:22:06 +00:00
Richard Levitte
751ff1d376
Make sure we get the definition of OPENSSL_NO_DSA and OPENSSL_NO_SHA.
2003-03-20 23:21:51 +00:00
Richard Levitte
d3ae5b1c8a
Make sure we get the definition of OPENSSL_NO_DH.
2003-03-20 23:21:27 +00:00
Richard Levitte
0f3879455b
Make sure we get the definition of OPENSSL_EXTERN, OPENSSL_NO_DES,
...
DES_LONG and OPENSSL_NO_DESCBCM.
2003-03-20 23:21:10 +00:00
Richard Levitte
0c7d61ee0e
Make sure we get the definition of OPENSSL_NO_CAST.
2003-03-20 23:20:15 +00:00
Richard Levitte
78951e7711
Make sure we get the definition of OPENSSL_NO_ERR.
2003-03-20 23:19:41 +00:00
Richard Levitte
9ba4cc007b
Make sure we get the definition of OPENSSL_NO_SOCK.
2003-03-20 23:18:32 +00:00
Richard Levitte
7b5a6c7a62
Make sure we get the definition of OPENSSL_NO_FP_API.
2003-03-20 23:17:23 +00:00
Richard Levitte
44deca977d
Make sure we get the definition of OPENSSL_NO_BF.
2003-03-20 23:17:04 +00:00
Richard Levitte
536b73e78e
Make sure we get the definition of OPENSSL_NO_BIO and OPENSSL_NO_RSA.
2003-03-20 23:16:45 +00:00
Richard Levitte
940767b03f
Make sure we get the definition of OPENSSL_NO_AES.
2003-03-20 23:15:51 +00:00
Richard Levitte
d4a47a5778
Because it may be needed in public header files, move the definition
...
of OPENSSL_NO_FP_API on existence of OPENSSL_SYS_MSDOS to e_os2.h.
2003-03-20 23:14:49 +00:00
Dr. Stephen Henson
b24668626e
make update
2003-03-20 17:59:39 +00:00
Dr. Stephen Henson
ea3675b5b6
New ASN1 macros to just implement and declare the new and free functions
...
and changes to mkdef.pl so it recognises them.
Use these in policyMappings extension.
2003-03-20 17:58:33 +00:00
Bodo Möller
c554155b58
make sure RSA blinding works when the PRNG is not properly seeded;
...
enable it automatically for the built-in engine
2003-03-20 17:31:30 +00:00
Dr. Stephen Henson
a1d12daed2
Support for policyMappings
2003-03-20 17:26:44 +00:00
Dr. Stephen Henson
6f528cac5a
Typo: OID should be policyMappings
2003-03-20 17:14:27 +00:00
Dr. Stephen Henson
10a66ad389
Avoid warning.
2003-03-20 17:09:46 +00:00
Richard Levitte
e986704d24
Add documentation for -starttls (s_client) and -id_prefix (s_server).
...
PR: 542
2003-03-20 16:34:27 +00:00
Dr. Stephen Henson
ce06265a37
make update
2003-03-20 14:21:36 +00:00
Richard Levitte
439909a068
Some shells (ksh in this case) don't say 'command not found'.
...
PR: 540
2003-03-20 11:44:28 +00:00
Richard Levitte
d177e6180d
Spelling errors.
...
PR: 538
2003-03-20 11:41:59 +00:00
Richard Levitte
48f1fa7482
Make sure that all the library paths are modified in prepend mode, not
...
replace mode.
PR: 528
2003-03-20 11:37:47 +00:00
Richard Levitte
aa9d896b0d
hinv may generate more than one line (1 line per CPU).
...
PR: 520
2003-03-20 11:15:12 +00:00
Richard Levitte
42a559163d
Shut up an ANSI compiler about uninitialised variables.
...
PR: 517
2003-03-20 10:57:09 +00:00
Richard Levitte
3285eb336c
Add the target linux-ia64-ecc, suggested by Keith Thompson <kst@sdsc.edu>.
...
PR: 516
2003-03-20 10:50:36 +00:00
Bodo Möller
02da5bcd83
countermeasure against new Klima-Pokorny-Rosa atack
2003-03-19 19:19:53 +00:00
Dr. Stephen Henson
9ed1fa4813
Fix Certificate and CRL adding in X509_load_cert_crl_file:
...
an X509_INFO structure can contain more than one object,
for example a certififcate and a CRL.
2003-03-19 13:55:48 +00:00
Bodo Möller
500df82a96
fix formatting
2003-03-18 12:52:02 +00:00
Dr. Stephen Henson
e8e0e3716a
Fix for no-ec on Windows.
2003-03-15 01:28:55 +00:00
Dr. Stephen Henson
bc441b739b
Don't give an error if response reason absent in OCSP HTTP.
2003-03-14 23:38:34 +00:00
Dr. Stephen Henson
e6539fe22d
Add entry for domainComponent so it is treated correctly.
...
Add table order test to end of a_strnid.c
2003-03-14 01:44:42 +00:00
Dr. Stephen Henson
ba5df66a8b
Add some OIDs.
2003-03-13 23:37:55 +00:00
Dr. Stephen Henson
12d4e7b8c8
Fix PEDANTIC stuff...
2003-03-13 21:28:03 +00:00
Geoff Thorpe
bba2cb3ada
Fix a bone-head bug. This warrants a CHANGES entry because it could affect
...
applications if they were passing a bogus 'flags' parameter yet having
things work as they wanted anyway.
2003-03-13 20:28:42 +00:00
Dr. Stephen Henson
52c4c51f02
Return an error if gmtime returns NULL.
2003-03-13 14:13:53 +00:00
Dr. Stephen Henson
767712fa62
Avoid warnings for no-engine and PEDANTIC
2003-03-12 02:38:57 +00:00
Dr. Stephen Henson
90e8a3102b
Fixes for EVP_DigestInit_ex() and OPENSSL_NO_ENGINE.
2003-03-12 02:31:40 +00:00
Geoff Thorpe
879650b866
The default implementation of DSA_METHOD has an interdependence on the
...
dsa_mod_exp() and bn_mod_exp() handlers from dsa_do_verify() and
dsa_sign_setup(). When another DSA_METHOD implementation does not define
these lower-level handlers, it becomes impossible to do a fallback to
software on errors using a simple DSA_OpenSSL()->fn(key).
This change allows the default DSA_METHOD to function in such circumstances
by only using dsa_mod_exp() and bn_mod_exp() handlers if they exist,
otherwise using BIGNUM implementations directly (which is what those
handlers did before this change). There should be no noticable difference
for the software case, or indeed any custom case that didn't already
segfault, except perhaps that there is now one less level of indirection in
all cases.
PR: 507
2003-03-11 01:49:21 +00:00
Bodo Möller
176f31ddec
- new ECDH_compute_key interface (KDF is no longer a fixed built-in)
...
- bugfix: in ECDH_compute_key, pad x coordinate with leading zeros if necessary
2003-02-28 15:37:10 +00:00
Bodo Möller
fe14ee96db
memset problem has been handled
...
PR: 343
2003-02-28 15:17:45 +00:00
Bodo Möller
57376542a0
use tabs for indentation, not spaces
2003-02-28 15:07:10 +00:00
Dr. Stephen Henson
b8dc9693a7
Encryption BIOs misbehave when used with non blocking I/O.
...
Two fixes:
1. If BIO_write() fails inside enc_write() it should return the
total number of bytes successfully written.
2. If BIO_write() fails during BIO_flush() it should return immediately
with the error code: previously it would fall through to the final
encrypt, corrupting the buffer.
2003-02-27 14:07:59 +00:00
Dr. Stephen Henson
6ac26a5ce5
Typo.
2003-02-27 13:02:46 +00:00
Bodo Möller
155bd1137e
add Certicom licensing e-mail address
2003-02-27 12:25:35 +00:00
Dr. Stephen Henson
f0dc08e656
Support for dirName from config files in GeneralName extensions.
2003-02-27 01:54:11 +00:00
Dr. Stephen Henson
e9ec63961b
Fix indefinite length encoding so EOC correctly updates
...
the buffer pointer.
Rename PKCS7_PARTSIGN to PKCS7_STREAM.
Guess what that's for :-)
2003-02-25 19:03:31 +00:00
Bodo Möller
0185803cc2
year 2003
2003-02-24 17:18:01 +00:00
Bodo Möller
5c9a9c9c33
include OpenSSL license (in addition to EAY license)
2003-02-24 17:15:28 +00:00
Ulf Möller
63ff3e83fc
Add instructions for building the MinGW target in Cygwin, and
...
rearrange some of the other text for better readability.
2003-02-22 23:03:42 +00:00
Ulf Möller
b4f43344d5
Copy rather than symlink the test data.
...
This is needed because Windows doesn't support symlinks.
The Cygwin/MinGW build now passes "make test".
2003-02-22 22:19:48 +00:00
Ulf Möller
c8c5cec1f9
remove some more useless code. The mingw target can now be built
...
under cygwin.
2003-02-22 22:15:31 +00:00
Ulf Möller
66ecdf3bfb
more mingw related cleanups.
2003-02-22 18:00:14 +00:00
Richard Levitte
7841edc9c1
Remove duplication and have clean depend on libclean
2003-02-22 15:04:03 +00:00
Richard Levitte
132eaa59da
Allow building applications against static libraries with Makefile.shared.
2003-02-22 14:41:34 +00:00
Dr. Stephen Henson
5562cfaca4
Base64 bio fixes. The base64 bio was seriously broken
...
when reading from a non blocking BIO.
It would incorrectly interpret retries as EOF, incorrectly
buffer initial data and have no buffering at all after initial
data (data would be sent one byte at a time to EVP_DecodeUpdate).
2003-02-22 02:12:52 +00:00
Ulf Möller
c8252b71b5
add test
2003-02-22 01:20:55 +00:00
Ulf Möller
94949a50aa
avoid duplicate definiton of bn_sub_part_words
2003-02-21 23:19:50 +00:00
Ulf Möller
0214893e6a
clean up MinGW build. MinGW make now supports the Windows path name
...
conventions.
2003-02-21 22:59:20 +00:00
Ulf Möller
5be4a42e99
update mingw info
2003-02-21 22:09:52 +00:00
Bodo Möller
f2aa055ec6
treat 'out' like i2d functions do; cf. asn1_item_flags_i2d (crypto/asn/tasn_enc.c)
2003-02-21 16:06:39 +00:00
Bodo Möller
62e3163b1b
ECPublicKey_set_octet_string and ECPublicKey_get_octet_string
...
behaviour was not quite consistent with the conventions
for d2i and i2d functions as far as handling of the 'out'
or 'in' pointer is concerned.
This patch changes this behaviour, and renames the functions to
o2i_ECPublicKey and i2o_ECPublicKey (not 'd2i' and 'i2d' because the
external encoding is just a raw object string without any DER icing).
Submitted by: Nils Larsch
2003-02-21 13:58:23 +00:00
Dr. Stephen Henson
8214e74f76
Ooops forgot to recognise V_ASN1_GENERALSTRING.
2003-02-20 17:13:21 +00:00
Dr. Stephen Henson
542a1b1a2e
Re enable the read side non blocking test BIO code.
...
For some reason it was disabled...
2003-02-20 13:39:30 +00:00
Dr. Stephen Henson
5672e3a321
Fix bug in base64 bios during write an non blocking I/O:
...
if the write fails when flushing the buffer return the
value to the application so it can retry.
2003-02-20 13:37:48 +00:00
Bodo Möller
fbbfd86b67
typo
...
PR: 511
Submitted by: Eric Cronin
2003-02-19 16:29:47 +00:00
Richard Levitte
d8cbc93585
Update release information
2003-02-19 14:02:37 +00:00
Richard Levitte
5b0b0e98ce
Security fix: Vaudenay timing attack on CBC.
...
An advisory will be posted to the web. Expect a release within the hour.
2003-02-19 12:03:59 +00:00
Richard Levitte
d5234c7b3a
Make sure the memory allocation routines check for negative sizes
2003-02-19 11:54:42 +00:00
Richard Levitte
77e270d10e
Borland C++ Builder 5 complains about unreachable statements.
2003-02-19 11:22:15 +00:00
Dr. Stephen Henson
c893bffae7
Update debub-steve* entries.
2003-02-19 01:04:34 +00:00
Dr. Stephen Henson
988e8458ad
Typo.
2003-02-18 12:46:47 +00:00
Richard Levitte
758f942b88
Make the no-err option work properly
2003-02-18 12:14:57 +00:00
Bodo Möller
26e9724458
Remove "+Olibcalls" option from HPUX targets.
...
Reportedly this option is deprecated, and on some systems
"make test" fails if it is included.
PR: 495
2003-02-16 20:10:23 +00:00
Geoff Thorpe
4879ec7bf3
Session cache implementations shouldn't have to access SSL_SESSION
...
elements directly, so this missing functionality is required.
PR: 276
2003-02-15 20:38:57 +00:00
Geoff Thorpe
b653327d47
Declare prototypes for function pointer types, even if they are likely to
...
be cast later on.
2003-02-15 20:32:13 +00:00
Dr. Stephen Henson
4cadedef57
Update docs.
2003-02-15 01:09:55 +00:00
Dr. Stephen Henson
27068df7e0
Single pass processing to cleartext S/MIME signing.
2003-02-15 00:50:55 +00:00
Geoff Thorpe
b12753dffc
We cache a montgomery form for 'n' if the PUBLIC flag is set, not PRIVATE.
...
Also, I've added handling for other mod_exp calls that were not using any
cached montgomery forms. These cases matter only for special RSA keys (eg.
ones that are missing information) so are unlikely to be used in normal
circumstances.
2003-02-15 00:18:38 +00:00
Geoff Thorpe
79221bc265
David Brumley <dbrumley@stanford.edu> noted and corrected a case in the
...
verification step of CRT private key operations in the RSA code -
previously no montgomery form was checked or used for 'n', and so it would
be generated on the fly each time. As a result, private key operations are
now a percent or two faster.
Rather than adding this as another repetition of the nearly-identical
montgomery "check for first-use" initialisation code blocks, I've taken
this chance to create a helper function and macro-wrapper to replace them.
PR: 475
2003-02-14 23:21:19 +00:00
Bodo Möller
ffa49dc3d9
make update
2003-02-14 14:21:58 +00:00
Richard Levitte
b7bbac72c4
Add support for IA64.
...
PR: 454
2003-02-14 13:30:35 +00:00
Richard Levitte
c1269c81fd
Handle krb5 libraries separately and make sure only libssl.so depends
...
on it.
2003-02-14 13:12:00 +00:00
Richard Levitte
794a386af3
Update linux-mips and linux-mipsel to support threads and shared libraries.
...
I also updated the bn_ops field with values taken from OpenBSD-mips.
PR: 498
2003-02-14 08:56:21 +00:00
Richard Levitte
e270cf9c5e
Pay attention to disabled SSL versions.
...
PR: 500
2003-02-14 05:24:22 +00:00
Richard Levitte
7e38616d1f
Change no_rmd160 to no_ripemd for consistency.
...
PR: 500
2003-02-14 05:20:25 +00:00
Richard Levitte
85d686e723
Make it possible to disable OCSP, the speed application, and the use of sockets.
...
PR: 358
2003-02-14 01:02:58 +00:00
Richard Levitte
2d3de726c5
Add full support for -rpath/-R, both in shared libraries and
...
applications, at least on the platforms where it's known how
to do it.
Note: this has only been tested on GNU-based platforms (Linux), and
needs to be tested on all others. Additionally, it's not yet
supported on the following platforms, for lack of information:
Darwin (MacOS X)
Cygwin
OSF1/Alpha
SVR3
ReliantUNIX
Please help out with testing and the platforms we don't yet know well
enough.
2003-02-13 23:52:54 +00:00
Richard Levitte
4989f0599f
Another long name to deal with
2003-02-13 13:21:13 +00:00
Richard Levitte
e4b52ac353
Oh, the destest program did look at the return value...
2003-02-13 08:53:40 +00:00
Bodo Möller
abd22c9c46
new lock for EC_PRE_COMP structures
...
Submitted by: Nils Larsch
2003-02-12 22:01:12 +00:00
Bodo Möller
ba729265a8
Allow EC_GROUP objects to share precomputation for improved memory
...
efficiency (EC_PRE_COMP objects are now constant once completed).
Extend 'extra_data' API to support arbitrarily many slots (although we
need only one at the moment).
Modify EC internal 'extra_data' API: EC_GROUP_[clear_]free_extra_data
now frees only a single slot (the previous functions are available as
EC_GROUP_[clear_]free_all_extra_data).
Submitted by: Nils Larsch
Reviewed by: Bodo Moeller
2003-02-12 18:30:16 +00:00
Richard Levitte
9ec1d35f29
Adjust DES_cbc_cksum() so the returned value is the same as MIT's
...
mit_des_cbc_cksum(). The difference was first observed, then verified by
looking at the MIT source.
2003-02-12 17:20:39 +00:00
Dr. Stephen Henson
cf56663fb7
Option to disable SSL auto chain build
2003-02-12 17:06:02 +00:00
Bodo Möller
ea513641d0
comments
2003-02-12 14:17:41 +00:00
Bodo Möller
8537943e8b
first section is now "Changes between 0.9.7a and 0.9.8", not "... 0.9.7 and 0.9.8"
2003-02-11 16:42:30 +00:00
Dr. Stephen Henson
a8f5b2ed50
GeneralString support in mini-ASN1 compiler
2003-02-11 14:06:27 +00:00
Dr. Stephen Henson
33075f229e
Typo.
2003-02-10 17:52:10 +00:00
Richard Levitte
28f573a28d
Make sure memcpy() is properly declared by including string.h.
2003-02-10 11:14:35 +00:00
Bodo Möller
e2c9c91b5b
fix EC_GROUP_copy for EC_GFp_nist_method()
...
Submitted by: Nils Larsch
2003-02-08 19:51:37 +00:00
Bodo Möller
d42d2d1ab6
avoid coredump
...
Submitted by: Nils Larsch
2003-02-08 19:49:16 +00:00
Bodo Möller
65b254e8c0
remove debugging leftovers
2003-02-08 15:56:05 +00:00
Bodo Möller
82871eaa17
comment
2003-02-07 11:54:57 +00:00
Bodo Möller
24893ca999
typo
2003-02-06 19:32:06 +00:00
Richard Levitte
27a9bf17c7
PKCS#1 has a new RFC, which we do implement
2003-02-06 19:30:06 +00:00
Bodo Möller
37c660ff9b
implement fast point multiplication with precomputation
...
Submitted by: Nils Larsch
Reviewed by: Bodo Moeller
2003-02-06 19:25:12 +00:00
Bodo Möller
772ec4135c
typo in WIN16 section
...
Submitted by: Toni Andjelkovic <toni@soth.at >
2003-02-05 16:54:10 +00:00
Bodo Möller
0e9035ac98
SSL_add_dir_cert_subjects_to_stack now exists for WIN32
2003-02-05 16:40:29 +00:00
Dr. Stephen Henson
4e5d3a7f98
IPv6 display and input support for extensions usingh GeneralName.
2003-02-05 00:34:31 +00:00
Bodo Möller
379e568950
typo
2003-02-04 12:57:34 +00:00
Bodo Möller
c09a297892
Update PRNG entry:
...
- OpenSSL version differences
- Sun /dev/urandom patch information
2003-02-04 12:28:11 +00:00
Ben Laurie
2619676256
Old-style callbacks can be NULL!
2003-02-01 20:58:59 +00:00
Ben Laurie
33cc07f79a
Fix warning.
2003-02-01 20:55:29 +00:00
Richard Levitte
c029841e36
We can't say in advance what the argument to BIO_socket_ioctl() should be, so
...
let's make that a void *. Also, BIO_socket_nbio() should send it an int
argument, not a long.
PR: 457
2003-01-31 12:20:35 +00:00
Richard Levitte
bfa3555081
Document -engine where missing.
...
PR: 424
2003-01-30 22:02:27 +00:00
Richard Levitte
5d780babe3
A few small bugs with BIO popping.
...
PR: 364
2003-01-30 21:49:12 +00:00
Richard Levitte
5cd48abf9f
The util scripts need to handled no-hw.
...
PR: 327
2003-01-30 20:03:45 +00:00
Richard Levitte
db5006df04
The MASM situation is more difficult than described so far. It is part of VC++ 7.
...
PR: 327
2003-01-30 19:05:25 +00:00
Richard Levitte
3d6a84c42a
For VC++7 and up, the file is VSVARS32.BAT.
...
PR: 327
2003-01-30 19:01:56 +00:00
Richard Levitte
5fe11c7533
The OPENSSL_NO_ENGINE has small problem: it changes certain structures. That's
...
bad, so let's not check OPENSSL_NO_ENGINE in those places. Fortunately, all
the header files where the problem existed include ossl_typ.h, which makes
a 'forward declaration' of the ENGINE type.
2003-01-30 18:52:46 +00:00
Richard Levitte
a1d57849b3
make update
2003-01-30 17:53:02 +00:00
Richard Levitte
0b13e9f055
Add the possibility to build without the ENGINE framework.
...
PR: 287
2003-01-30 17:39:26 +00:00
Geoff Thorpe
96f7065f63
Summarise the last couple of commits.
2003-01-30 15:52:40 +00:00
Geoff Thorpe
f3c22ef10d
This glues the GMP wrapper ENGINE into OpenSSL if it is being built (ie. if
...
the OPENSSL_USE_GMP symbol is defined). Also, I've re-ordered the listing
of other builtin ENGINEs to be alphabetical (though "dynamic" will still
come first).
2003-01-30 15:49:03 +00:00
Geoff Thorpe
a85bef1899
Commit a slightly modified version of an old experiment to do RSA private
...
key operations using the GMP library. The default is not to build (or use)
this code unless OPENSSL_USE_GMP is defined (because it will impose header
and linker dependencies that might need specifying too).
2003-01-30 15:43:07 +00:00
Geoff Thorpe
bb3e67f315
"openssl engine" will not display ENGINE/DSO load failure errors when
...
testing availability of engines with "-t" - the old behaviour of is
produced by increasing the feature's verbosity with "-tt".
2003-01-30 14:58:44 +00:00
Richard Levitte
c0a93e31ab
Small typo, OENSSL should really be spelled OPENSSL.
...
PR: 476
2003-01-30 11:08:44 +00:00
Richard Levitte
2e60ea7634
Fix a memory leak in SSL.
...
PR: 477
2003-01-30 11:00:34 +00:00
Richard Levitte
4e78074b39
cert_sk isn't always allocated, so freeing it may cause a crash.
...
PR: 481
2003-01-30 10:27:43 +00:00
Richard Levitte
b637670f03
DVCS (see RFC 3029) was missing among the possible purposes.
...
Notified privately to me by Peter Sylvester <Peter.Sylvester@EdelWeb.fr >,
one of the authors of said RFC
2003-01-29 15:06:35 +00:00
Bodo Möller
bd1217a176
simplify
...
Submitted by: Nils Larsch
2003-01-28 13:08:21 +00:00
Dr. Stephen Henson
da45180de4
Correct EVP_SealInit() documentation, iv is an output
...
parameter.
2003-01-26 13:38:56 +00:00
Bodo Möller
82516e3baf
cofactor is optional in parameter encodings
...
Submitted by: Nils Larsch
2003-01-25 15:28:49 +00:00
Bodo Möller
c1862f9136
consistency
2003-01-24 22:28:32 +00:00
Bodo Möller
9048c7245b
For ecdsa-with-SHA1, as for id-dsa-with-sha1, omit 'parameters'
...
in AlgorithmIdentifier
Submitted by: Nils Larsch
2003-01-24 21:43:08 +00:00
Andy Polyakov
02bf9a151a
Provide "dummy" &main::picmeup even in Windows perlasm modules.
2003-01-24 09:39:31 +00:00
Dr. Stephen Henson
d3b5cb5343
Check return value of gmtime() and add error codes
...
where it fails in ASN1_TIME_set().
Edit asn1.h so the new error code is the same in 0.9.7
and 0.9.8, rebuild new error codes.
Clear error queue in req.c if *_min or *_max is absent.
2003-01-24 01:12:01 +00:00
Andy Polyakov
97e6bf6b22
Workaround for lame compiler bug introduced in "CPU pack" for MSVC6SP5.
2003-01-23 10:05:39 +00:00
Andy Polyakov
04da4558dd
The patch speaks for itself.
2003-01-23 09:52:34 +00:00
Richard Levitte
0c3426da86
Missing 0 broke FreeBSD build.
...
PR: 470
2003-01-23 08:10:04 +00:00
Bodo Möller
9b3f03d5a2
fix warnings
...
Submitted by: Nils Larsch
2003-01-21 09:53:14 +00:00
Andy Polyakov
9abff96b2f
Suggestion was to change ${MACHINE} to i586 in lines in question. Well,
...
"whatever" doesn't the same (avoids 386 being passed to ./Configure),
consistent with other elder SCO targets and denotes that we probably
shouldn't care much about every out-of-date platform.
2003-01-19 21:47:06 +00:00
Andy Polyakov
722d17cbac
This is an *initial* tune-up. This update puts Itanium2 back on par with
...
Itanium. I mean if overall performance improvement over C version was X
for Itanium, it's X even for Itanium2.
2003-01-19 21:29:59 +00:00
Andy Polyakov
59b846c515
Oops! Missed closing quote... Didn't have time to verify before a snapshot
...
was cut...
2003-01-19 11:39:19 +00:00
Andy Polyakov
42bf2a5cdc
SCO target missed .so suffix.
2003-01-18 21:57:30 +00:00
Andy Polyakov
80bcbaa02f
-lresolv is not present on SCO Unix, RT#460.
2003-01-18 18:12:23 +00:00
Andy Polyakov
7c4e24af38
Caldera/SCO targets erroneously limit themselves to 386. See RT#464.
2003-01-18 15:17:26 +00:00
Andy Polyakov
726c223143
Fix for AIX shared build, see RT#463.
2003-01-18 15:13:03 +00:00
Dr. Stephen Henson
59ae8c9419
EVP_DecryptInit() should call EVP_CipherInit() not EVP_CipherInit_ex().
2003-01-17 00:48:47 +00:00
Richard Levitte
0bdd2da5d2
Ingore the correct flag file.
2003-01-16 21:36:17 +00:00
Richard Levitte
2f09524501
A few more files to ignore
2003-01-16 21:32:56 +00:00
Richard Levitte
06492aef01
make update
2003-01-16 21:20:30 +00:00
Richard Levitte
c00cee00fd
FreeBSD has /dev/crypto as well.
...
PR: 462
2003-01-16 18:29:30 +00:00
Richard Levitte
8228f302dd
Add some debugging output.
2003-01-16 17:28:46 +00:00
Lutz Jänicke
018c56fdca
Armor against systems without ranlib...
...
Submitted by: Thierry Lelegard <thierry.lelegard@canal-plus.fr >
PR: 461
2003-01-16 17:22:30 +00:00
Bodo Möller
d745af4b0c
avoid potential confusion about curves (prime192v1 and prime256v1 are
...
also known as secp192r1 and secp256r1, respectively)
Submitted by: Nils Larsch, Bodo Moeller
2003-01-16 16:05:23 +00:00
Richard Levitte
44ea41cfff
make update
2003-01-16 13:01:36 +00:00
Lutz Jänicke
acad5755a2
ncr-scde target needs -lc89 for strcasecmp() and ftime() (Tim Rice, Martin
...
Megele).
PR: 450
2003-01-16 07:54:52 +00:00
Richard Levitte
28b958f732
Fix possible NULL dereferencial.
...
Notified by Verdon Walker <VWalker@novell.com >
2003-01-16 06:00:55 +00:00
Richard Levitte
4e59cd3bb6
Add verbosity
2003-01-15 17:23:16 +00:00
Lutz Jänicke
a74333f905
Fix initialization sequence to prevent freeing of unitialized objects.
...
Submitted by: Nils Larsch <nla@trustcenter.de >
PR: 459
2003-01-15 14:54:59 +00:00
Bodo Möller
365e14622a
update error library for EC... changes
...
Submitted by: Nils Larsch
2003-01-15 11:47:28 +00:00
Lutz Jänicke
8ec16ce711
Really fix SSLv2 session ID handling
...
PR: 377
2003-01-15 09:51:22 +00:00
Geoff Thorpe
0e4aa0d2d2
As with RSA, which was modified recently, this change makes it possible to
...
override key-generation implementations by placing handlers in the methods
for DSA and DH. Also, parameter generation for DSA and DH is possible by
another new handler for each method.
2003-01-15 02:01:55 +00:00
Dr. Stephen Henson
08cb96bba2
Set EXPORT_VAR_AS_FN for BC-32 to work around a compiler bug,
2003-01-14 20:54:18 +00:00
Richard Levitte
cdc5b4a41e
Extend the HOWTO on creating certificates, and add a HOWTO in creating keys.
...
PR: 422
2003-01-14 15:42:16 +00:00
Lutz Jänicke
52e5e5c2ba
Document hpux-parisc2-cc problems, probably due to optimizer bug.
...
PR: 426
2003-01-14 13:57:06 +00:00
Richard Levitte
c653b56937
Correct an example that has a few typos.
...
PR: 458
2003-01-14 13:56:38 +00:00
Richard Levitte
04aff67de4
Merge from 0.9.7-stable.
2003-01-13 17:16:25 +00:00
Andy Polyakov
1a6356b2ca
Minor FAQ update
2003-01-13 16:34:05 +00:00
Bodo Möller
b05645902a
"!Cname surname" has now become redundant ...
2003-01-13 15:57:33 +00:00
Bodo Möller
54d4f8c320
undo part of a recent change: it's "surname", not "surName"
...
(see X.520 aka ISO/IEC 9594-6)
2003-01-13 15:52:04 +00:00
Richard Levitte
c76153f31d
Make sure not to declare a clashing read() for DJGPP.
...
PR: 440
2003-01-13 15:35:22 +00:00
Richard Levitte
8cbb91c857
DJGPP doesn't have DLLs, so skip adding to %PATH% in that environment.
...
PR: 453
2003-01-13 15:16:40 +00:00
Bodo Möller
aaae0aa48b
add something to the '$no_shared_warn' text
2003-01-13 14:58:49 +00:00
Richard Levitte
0535d3b25f
Correct a misleading comment.
...
PR: 456
2003-01-13 14:53:43 +00:00
Richard Levitte
62be003150
Revert: the names of the cygwin distribution will not be named openssl2-*.
...
Requested by Corinna Vinschen <vinschen@redhat.com >
2003-01-13 14:47:52 +00:00
Richard Levitte
364c7cd621
UI_UTIL_read_pw() misinterpreted the values returned from UI functions.
...
PR: 456
2003-01-13 14:17:43 +00:00
Bodo Möller
9d5390a049
document BN_GENCB API by adding an example
2003-01-13 13:44:20 +00:00
Bodo Möller
bda2fa364d
Typo.
...
NB: This and other manual pages should be updated for the new
BN_GENCB interface.
2003-01-13 13:18:22 +00:00
Richard Levitte
caa7b2ad4f
tty_in will never be stderr, so it will always be closed, which means stdin
...
might get closed...
Reported by Mark Daniel <Mark.Daniel@wasd.vsm.com.au >
2003-01-13 13:15:16 +00:00
Bodo Möller
c14b4d6b38
typo
2003-01-13 12:52:33 +00:00
Andy Polyakov
0382c95e4d
OpenBSD FAQ update. Apparently gas from binutils-2.x makes it impossible to
...
use gcc -fPIC ... on OpenBSD-i386. Alternative solution is provided.
2003-01-12 21:39:13 +00:00
Andy Polyakov
fda20f08d0
Just an extra comment.
2003-01-12 15:50:59 +00:00
Richard Levitte
afd41c9fc7
Add better support for FreeBSD on non-x86 machines.
...
Add specific support for FreeBSD on sparc64.
PR: 427
2003-01-12 04:43:44 +00:00
Richard Levitte
2964ba8c6a
If the user said 'shared' and we haven't included support for shared libraries,
...
warn him or her.
Reminder by Andrew Marlow <apm35@student.open.ac.uk >
2003-01-11 11:40:39 +00:00
Richard Levitte
c0cc5c3059
Double the dollars that are intended for the command line.
...
PR: 423
2003-01-10 16:32:32 +00:00
Richard Levitte
e68cb95d84
Add documentation on how to handle the shared libaries.
...
PR: 423
2003-01-10 16:14:32 +00:00
Richard Levitte
448666239c
Name the flag file correctly
2003-01-10 16:04:07 +00:00
Richard Levitte
c0ac323360
CFLAG, not CFLAGS
2003-01-10 11:30:44 +00:00
Richard Levitte
a0cd3ca62b
It's recommended to do 'make clean' after having prepared a new build tree.
...
PR: 437
2003-01-10 11:00:50 +00:00
Richard Levitte
4a9476dd8d
When preparing a separate build tree, don't make softlinks to softlinks.
...
Add instructions in INSTALL, for easy access.
PR: 437
2003-01-10 10:56:14 +00:00
Richard Levitte
8d2511688d
Force the removal.
...
PR: 437
2003-01-10 10:54:59 +00:00
Richard Levitte
969511d2cb
Certain files must be removed before generating them, in case they point
...
into a read-only source tree.
PR: 437
2003-01-10 10:54:18 +00:00
Andy Polyakov
989f48d8c1
Avoid unnecessary pollution of object module name table. Cygwin shared
...
build workaround (DJGPP swallows it too). One probably should do same
as with ELF calling it COFF, but I'm very short in COFF platforms, so
I just go for easy ad-hoc solution. I'll take care of merge to 0.9.7
later.
2003-01-10 10:16:39 +00:00
Richard Levitte
f8ea5cb579
Make sure everything that may be freed is allocated or initiated.
...
PR: 446
2003-01-10 08:59:46 +00:00
Richard Levitte
360e506710
Typos corrected.
...
PR: 445
2003-01-10 08:54:01 +00:00
Dr. Stephen Henson
09ad2458b8
Typo.
2003-01-09 16:54:21 +00:00
Richard Levitte
ad200a864e
The naming scheme wasn't quite correct for Cygwin
2003-01-09 16:15:46 +00:00
Andy Polyakov
9d1b5614f9
At least OpenBSD implements PIC in the same way ELF does.
2003-01-09 16:06:09 +00:00
Richard Levitte
416b19c6fc
gcc wants character constants to be correct. Before this change, the
...
following would happen on Solaris:
m4 -B 8192 asm/des_enc.m4 > asm/des_enc-sparc.S
gcc -DOPENSSL_SYSNAME_ULTRASPARC -DOPENSSL_NO_STATIC_ENGINE -fPIC -DOPENSSL_PIC -DOPENSSL_THREADS -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -DOPENSSL_NO_KRB5 -m32 -mcpu=ultrasparc -O3 -fomit-frame-pointer -Wall -DB_ENDIAN -DBN_DIV2W -DMD5_ASM -c -o asm/des_enc-sparc.o asm/des_enc-sparc.S
asm/des_enc-sparc.S:2007: unterminated character constant
asm/des_enc-sparc.S:2008: unterminated character constant
2003-01-09 13:25:14 +00:00
Dr. Stephen Henson
5b7249f302
NULL tofree when it is freed to avoid double free.
...
Make sure key is not NULL before freeing it.
2003-01-09 13:06:49 +00:00
Andy Polyakov
699543e4a2
Finalizing asm support for UnixWare, SCO, OpenUnix... Note that I've
...
replaced #if logic around bn_sub_part_words in bn_mul.c. I rely upon
OPENSSL_BN_ASM_PART_WORDS being added by ./Configure script. Would it
still work on non-Unix platforms?
2003-01-09 08:42:04 +00:00
Lutz Jänicke
4309c4ad46
Third argument to shl_load() is "long address", not a pointer.
...
(Didn't influence functionality, as on HP-UX 32bit the NULL pointer
is a 32bit 0-value and thus is identical to the required 0L.)
PR: 443
2003-01-08 08:27:50 +00:00
Geoff Thorpe
4ebb5293fc
RSA_METHOD now supports key-generation, but (for now) none of these
...
ENGINEs implement it.
2003-01-07 05:53:58 +00:00
Geoff Thorpe
2814c62915
This is the first step in allowing RSA_METHODs to implement their own key
...
generation. This prototype matches the new API function
RSA_generate_key_ex(), though both may be subject to change during
development before 0.9.8.
2003-01-07 05:51:39 +00:00
Dr. Stephen Henson
876e96fdbf
Fix leak.
2003-01-04 18:25:24 +00:00
Andy Polyakov
f68843e3d7
Fix a typo.
2003-01-04 15:18:00 +00:00
Andy Polyakov
19a97a1df0
Another GAS fix-up and some commentary...
2003-01-04 14:41:09 +00:00
Andy Polyakov
72997517b0
GAS can't stand stub, which is stb's synonym.
2003-01-04 12:49:38 +00:00
Andy Polyakov
2a9fca82d2
Oops! I've toasted Cygwin! Fixed now.
2003-01-03 21:49:49 +00:00
Andy Polyakov
55b1516770
Redundant now as it's moved to ./Makefile.org.
2003-01-03 20:45:59 +00:00
Andy Polyakov
3cc9a89dda
Unified targets for ELF assembler modules. Tested on Linux, Solaris and
...
FreeBSD. Goal is to extend support even to SCO5, UnixWare/OpenUnix...
2003-01-03 17:37:53 +00:00
Andy Polyakov
46a0d4fbcb
Support for ILP32 on HPUX-IA64.
2003-01-03 15:10:46 +00:00
Andy Polyakov
04945fda66
pa-risc2.s was not PIC, see RT#426. I strip call to fprintf as it's
...
never called anyway (it's a debugging assertion). If pa-risc2W.s is
PIC remains to be seen...
2003-01-03 10:52:40 +00:00
Andy Polyakov
97e2e71ef9
HP/UX 11i make gets upset by this line containing nothing but a Tab
2003-01-03 10:32:04 +00:00
Richard Levitte
c8a647846c
Rijndael should be called AES everywhere
2003-01-03 08:51:45 +00:00
Andy Polyakov
90ce14cd84
Support for Intel compiler. More details will be provided in closing note
...
for RT#17 as snapshot becomes available for download.
2003-01-02 23:32:24 +00:00
Andy Polyakov
28e276f139
Complete integration of SPARC assembler DES implementation. Tested on Solaris
...
only. I'll keep my eyes open for Linux and OpenBSD targets.
2003-01-02 23:26:46 +00:00
Andy Polyakov
f22e1e4dd2
UltraSPARC assembler DES implementation tune-up. The code can be
...
compiled for any SPARC CPU (UltraSPARC performance is *not* affected),
can be compiled for 64-bit ABI and is position-independent.
2003-01-02 17:40:33 +00:00
Andy Polyakov
e0d769caa2
Very old submission (from 2000) of UltraSPARC assembler DES implementation.
...
It was not accepted because code is not PIC, too UltraSPARC-specific when
it doesn't have to and 32-bit only. I'm committing the original version
mostly for reference purposes. 64, PIC, blended CPU tune-up follows shortly.
Obtained from: http://inet.uni2.dk/~svolaf/des.htm
2003-01-02 17:36:26 +00:00
Andy Polyakov
4a37c48789
I implemented this when troubleshooting performance problem on SPARC Solaris.
...
As there is an apparent interest for optimization for footprint, I figured
that this can eventually become useful.
2003-01-02 17:19:05 +00:00
Richard Levitte
ad492c3601
Link engines against libcrypto, even when a TCP/IP implementation is
...
specified...
2003-01-02 00:26:01 +00:00
Richard Levitte
0c055b201e
Adjust the parameter lists in some not commonly used files.
...
PR: 428
2003-01-01 23:41:46 +00:00
Richard Levitte
7eed0fc041
Make sure the last character of the ASN.1 time string (the 'Z') is copied.
...
PR: 429
2003-01-01 03:40:59 +00:00
Richard Levitte
7a1c6aa2a3
It's rather silly to believe we'd release 0.9.7a in 2002 :-).
...
It's even more silly to pretend we know which year 0.9.8 will be
released.
2002-12-31 01:00:06 +00:00
Richard Levitte
948dcdb81b
Merge in changes from 0.9.7-stable.
2002-12-31 00:02:10 +00:00
Richard Levitte
08101d72ce
Merge in changes from 0.9.7-stable.
2002-12-30 23:56:09 +00:00
Andy Polyakov
75c4028585
My English is definitely not good as my assembly skills:-) And it looks like
...
titles can't be multi-line...
2002-12-30 20:17:20 +00:00
Andy Polyakov
85f258d1c2
It probably belongs in PROBLEMS, but it's more likely to be a FAQ.
2002-12-30 11:10:03 +00:00
Richard Levitte
49be7042dc
Since we're including Kerberos 5 headers in our exported header files (when
...
OpenSSL is configured to use Kerberos), we'd better tell pkg-config users
where they can be found.
PR: 421
2002-12-29 23:03:12 +00:00
Lutz Jänicke
44fcd3ef3e
Add information about AES cipher suites to ciphers manual page.
...
If no authentication method is mentioned in the cipher suite name (e.g.
AES128-SHA), RSA authentication is used (PR #396 ).
2002-12-29 21:24:50 +00:00
Lutz Jänicke
21cde7a41c
Fix wrong handling of session ID in SSLv2 client code.
...
PR: 377
2002-12-29 20:59:35 +00:00
Ben Laurie
8598289936
Correct asm exclusions.
2002-12-29 17:57:09 +00:00
Richard Levitte
35dde7480f
OS/2 does binary by default, apparently.
...
Reported by Brian Havard <brianh@kheldar.apana.org.au >.
2002-12-29 10:19:58 +00:00
Richard Levitte
5e42f9ab46
make update
2002-12-29 01:38:15 +00:00
Richard Levitte
7acf00a633
Finally get rid of all the algorithm inclusions that were done from
...
evp.h.
Application authors BEWARE! If you have had the habit to count on
evp.h to provide all those lower-level algorithm functions, you need
to think again! Please change your programs NOW, or you will be sorry
when 0.9.8 gets release (it's quite some time away...).
2002-12-29 01:37:35 +00:00
Richard Levitte
69339d254b
make update
2002-12-28 02:42:05 +00:00
Richard Levitte
ec517d25e8
Merge from 0.9.7-stable.
2002-12-28 02:41:17 +00:00
Andy Polyakov
ce9b1b0573
I can't confirm the claim being removed and nobody seems to speak up for it.
2002-12-27 15:04:45 +00:00
Andy Polyakov
0a2407a851
UltraSPARC performance "tune-up."
2002-12-27 14:51:49 +00:00
Andy Polyakov
76a03d568e
FAQ addenum as discussed in RT#417.
2002-12-27 14:27:48 +00:00
Richard Levitte
7c03f26393
Kenneth R. Robinette just told me the latest snapshot works well with
...
MIT Kerberos.
2002-12-27 14:01:40 +00:00
Richard Levitte
9ff9e406ea
Can't find the referense to errors on XP with Kerberos
2002-12-27 08:09:08 +00:00
Richard Levitte
b5beb13abb
Add SPKM among the related stanrds.
2002-12-26 22:35:04 +00:00
Richard Levitte
ceb12d3074
Updates
2002-12-26 22:25:02 +00:00
Richard Levitte
59c0dd56ab
Update our list of implemented and related standards.
2002-12-26 00:21:53 +00:00
Richard Levitte
dcf19c173c
Update our list of implemented and related standards.
2002-12-26 00:17:46 +00:00
Richard Levitte
e235000169
Spelling error.
...
This patch was taken from the OpenBSD copy of OpenSSL 0.9.7 beta3 with patches
2002-12-25 22:16:56 +00:00
Richard Levitte
821951b851
Avoid double definition of config.
...
PR: 420
2002-12-24 23:53:46 +00:00
Richard Levitte
35ba1f17dc
Updates
2002-12-24 23:52:07 +00:00
Lutz Jänicke
ea8e0cc7c2
Some more adjustments
...
Submitted by: Jeffrey Altman <jaltman@columbia.edu >, "Kenneth R. Robinette" <support@securenetterm.com >
2002-12-24 21:55:57 +00:00
Richard Levitte
cb661c56b0
Cygwin needs the library locatin for .DLLs to be set in PATH. Unfortunately,
...
the conditional was set to add the library directory to PATH when the
platform is NOT Cygwin. Corrected.
PR: 404
2002-12-24 10:50:11 +00:00
Richard Levitte
e904bd0ddc
All VMS-specific problems have been solved.
...
Confirmed by Mark Daniel <Mark.Daniel@wasd.vsm.com.au >
2002-12-24 10:38:05 +00:00
Richard Levitte
e9883d285d
Finally, a bn_div_words() in VAX assembler that goes through all tests.
...
PR: 413
2002-12-23 11:25:51 +00:00
Richard Levitte
8d6ad9e39d
Stop a possible memory leak.
...
(I wonder why s2_connect() handles the initial buffer allocation slightly
differently...)
PR: 416
2002-12-21 23:49:21 +00:00
Richard Levitte
aa18245f7e
Make AES_ENCRYPT and AES_DECRYPT macros instead of static constants.
...
PR: 411
2002-12-20 18:21:35 +00:00
Andy Polyakov
316bfb77b5
Fix for "shift count too large" when compiling for hpux-parisc2 and
...
irix-mips. The bug was introduced with accelerated support for x86_64.
My fault! Fixed now.
2002-12-20 18:11:30 +00:00
Richard Levitte
9b58214e4a
More accurate comments.
2002-12-20 16:38:36 +00:00
Richard Levitte
3c801fa460
A little debugging.
2002-12-20 16:38:06 +00:00
Richard Levitte
1c9202004b
Propagate MAKEDEPPROG to the subdirs under crypto/.
2002-12-20 15:28:42 +00:00
Lutz Jänicke
1004c99c29
Fix Kerberos5/SSL interaction
...
Submitted by: "Kenneth R. Robinette" <support@securenetterm.com >
Reviewed by:
PR:
2002-12-20 12:48:00 +00:00
Richard Levitte
c9ecb1edd8
Keep the internal lowercase 'surname', for programmer's sake.
2002-12-20 09:39:34 +00:00
Richard Levitte
8baf5fdca0
Be consistent with capitalisation of object names.
2002-12-20 09:24:17 +00:00
Richard Levitte
aafafa314d
Be consistent with capitalisation of object names.
2002-12-20 09:18:18 +00:00
Richard Levitte
49e42a1f60
There was a mixup between INSTALLTOP and OPENSSLDIR...
2002-12-20 07:51:03 +00:00
Richard Levitte
9cd16b1dea
We stupidly had a separate LIBKRB5 variable for KRB5 library dependencies,
...
and then didn't support it very well. And that when there already is a
useful variable for exactly this kind of thing; EX_LIBS...
2002-12-19 22:10:12 +00:00
Richard Levitte
12cd28258d
Because the contents of openssl.pc may have to change when a configuration
...
has been performed (and possibly changed), have it depend on Makefile.ssl.
2002-12-19 21:56:40 +00:00
Richard Levitte
9564997222
Small tweaks for code consistency.
2002-12-19 21:55:48 +00:00
Richard Levitte
f968059c67
To avoid any future programming glitches, let's make each and every
...
assignment (modulo those I missed) individual statements.
2002-12-19 21:13:29 +00:00
Richard Levitte
0b900a5e93
I have no idea what possesed me to compile s_socket.c as POSIXly code.
...
Incidently, it now compiles so much better without _POSIX_C_SOURCE.
2002-12-19 19:42:53 +00:00
Richard Levitte
09867a47a4
If _XOPEN_SOURCE_EXTENDED or _XOPEN_SOURCE are defined, _POSIX_C_SOURCE gets
...
defined in DECC$TYPES.H. If _POSIX_C_SOURCE is defined, certain types do
not get defined (u_char, u_int, ...). DECC.H gets included by assert.h
and others. Now, in6.h uses the types u_char, u_int and so on, and gets
included as part of other header inclusions, and will of course fail because
of the missing types.
On the other hand, _XOPEN_SOURCE_EXTENDED is needed to get gethostname()
properly declared...
Solution: define _XOPEN_SOURCE_EXTENDED much later, so DECC$TYPES.H has
a chance to be included *first*, so the otherwise missing types get defined
properly.
Personal: *mumble* *mumble*
2002-12-19 19:39:30 +00:00
Richard Levitte
9d5c42b61b
It was pointed out to me that .pc files are normally stored in
...
${prefix}/lib/pkgconfig, not ${prefix}/lib/pkginfo.
2002-12-19 17:44:42 +00:00
Richard Levitte
8e7a8b68d2
It was pointed out to me that .pc files are normally stored in
...
${prefix}/lib/pkgconfig, not ${prefix}/lib/pkginfo.
2002-12-19 17:42:23 +00:00
Richard Levitte
4d625031a5
Update the current status
2002-12-18 10:24:02 +00:00
Andy Polyakov
26a60b2eb0
Better wording?
2002-12-18 09:42:51 +00:00
Andy Polyakov
07d09fdb66
Fix for RT#405, Solaris refuses to invoke preprocessor if egrep returns 1.
...
Linux for example doesn't exhibit this behaviour, but I add "exit 0" to all
potentially affected rules, just to be on the safe side.
2002-12-18 09:03:48 +00:00
Andy Polyakov
4553ed276b
Make "perl des-586.pl a.out" work, see RT#402
2002-12-17 08:05:49 +00:00
Andy Polyakov
62966f3829
'a=b c=$a; echo $c' doesn't necessarily prints "b", '' vs. "", $s in
...
Makefiles... I suppose it wasn't tested very much...
2002-12-16 23:35:17 +00:00
Richard Levitte
c445142505
Transfer the Solaris shared library building changes from
...
0.9.7-stable.
2002-12-16 20:33:38 +00:00
Richard Levitte
f70ddce761
Protect loading routines with a lock.
...
PR: 373
2002-12-16 06:06:03 +00:00
Richard Levitte
e29246cb17
Synchronise with Makefiles.
2002-12-15 20:59:24 +00:00
Andy Polyakov
146e6776f5
Always forget this one...
2002-12-15 16:01:21 +00:00
Andy Polyakov
a45051fbfc
DES PIC-ification. "Cygwin" companion. Problem was that preprocessor macro
...
is not expanded if prepended with a $-sign.
2002-12-15 10:06:27 +00:00
Richard Levitte
ec9f67f610
Make sure manual pages are properly linked to on systems that have case
...
insensitive file names, as well as those that do not have symlinks.
Incidently, both these cases apply on DOS/Windows...
2002-12-15 06:45:43 +00:00
Richard Levitte
30c08f2e3d
Update the make system for installations:
...
- define a HERE variable to indicate where the source tree is (used
very little right now)
- make more use of copying and making attribute changes to {file}.new,
and then move it to {file}
- use 'mv -f' to avoid all those questions to the user when the file
in question doesn't have write attributes for that user.
2002-12-15 05:59:13 +00:00
Richard Levitte
9f100cf344
Don't define macros in terms of asm() when __STRICT_ANSI is defined.
2002-12-15 05:54:56 +00:00
Richard Levitte
a5a01e9051
Bring des_locl.h at the same level as in the 0.9.7 branch.
...
Don't define macros in terms of asm() when __STRICT_ANSI is defined.
2002-12-15 05:54:26 +00:00
Andy Polyakov
6be4688bdc
Ooops! No ROTATE on some platforms after x86_64 performance patch...
2002-12-15 00:47:47 +00:00
Andy Polyakov
717c5cdcc7
As you might have noticed I tried to change for . prefix, because it's
...
the one to be used to denote local labels in single function scope.
Problem is that SHA uses same label set across functions, therefore I
have to switch back to $ prefix.
2002-12-14 23:14:00 +00:00
Andy Polyakov
0654bba39f
Solaris shared build fix-ups. See RT#238,239 for details.
2002-12-14 21:46:46 +00:00
Andy Polyakov
4d77d5b316
New DETECT_GNU_LD procedure.
2002-12-14 20:52:19 +00:00
Andy Polyakov
2f98abbcb6
x86_64 performance patch.
2002-12-14 20:42:05 +00:00
Andy Polyakov
270fa8aeda
DES PIC-ification. Windows companion.
2002-12-14 17:54:30 +00:00
Geoff Thorpe
4329db3726
The ampersand is not required in these constructs, and was giving AIX
...
warnings.
Reported by: Bernhard Simon.
2002-12-13 22:01:46 +00:00
Andy Polyakov
6f7ac8e1b0
IA-32 assembler modules (primarily DES) PIC-ification. Idea is to keep
...
shared libraries shared.
2002-12-13 17:56:14 +00:00
Richard Levitte
a1457874c6
OK, there's at least one application author who has provided dynamic locking
...
callbacks
2002-12-13 07:30:53 +00:00
Richard Levitte
18be6c4116
BIO_new_bio_pair() was unnecessarily described in it's own page as well as in
...
BIO_s_bio.pod. The most logical is to move everything needed from
BIO_new_bio_pair.pod to BIO_s_bio.pod (including the nice example)
and toss BIO_new_bio_pair.pod. I hope I got all the info over properly.
PR: 370
2002-12-12 22:12:02 +00:00
Richard Levitte
dad1535f7a
BIO_set_nbio() is enumerated, but not explained. Remove it from enumeration
...
since it's both enumerated and explained in BIO_s_connect.pod.
PR: 370
2002-12-12 22:08:49 +00:00
Richard Levitte
f60e6604b8
I forgot one item I intend to work on.
2002-12-12 19:40:55 +00:00
Richard Levitte
0d3f2ccb62
Skip DH-specific tests when no-dh has been configured.
...
PR: 353
2002-12-12 18:43:10 +00:00
Richard Levitte
14676ffcd6
Document the modifications in 0.9.7 that will make the hw_ncipher.c
...
engine work properly even in bad situations.
2002-12-12 17:40:15 +00:00
Geoff Thorpe
e5a08ce44d
Make 'tunala' link with zlib if possible (so it works if openssl was
...
configured with zlib support).
2002-12-11 19:07:03 +00:00
Richard Levitte
b9b6e14b4a
In CRYPTO_lock(), check that the application cares about locking (provided
...
callbacks) before attempting to lock.
2002-12-11 08:56:35 +00:00
Richard Levitte
442d42300b
sk_*_push() returns the number of items on the stack, not the index of the
...
pushed item. The index is the number of items - 1. And if a NULL item was
found, actually use it.
Finally, provide a little bit of safety in CRYPTO_lock() by asserting the a
requested dynamic lock really must exist, instead of just being silent about it
2002-12-11 08:33:31 +00:00
Richard Levitte
75e1c74724
Let's not forget the other places where HEADER_DES_H and HEADER_DES_OLD_H
...
were defined.
2002-12-11 07:37:54 +00:00
Richard Levitte
5db2b5e573
Let's not forget the other places where HEADER_DES_H and HEADER_DES_OLD_H
...
were defined.
2002-12-11 07:24:43 +00:00
Richard Levitte
005ef84c5d
Since HEADER_DES_H has been the protector of des.h since libdes
...
(before SSLeay, maybe?), it's better to have that macro protect
the compatibility header des_old.h. In the new des.h, let's use
a slightly different protecting macro.
The rationale is that there are application that might include (via
other header files, perhaps) both an old libdes des.h and OpenSSL's
des.h. Whichever comes first would overshadow the other because of
the clash in protecting macro. This fix solves that problem.
2002-12-11 06:59:16 +00:00
Geoff Thorpe
f92570f00a
This stops a compiler warning from -Wmissing-prototypes.
...
(Noticed by Nils Larsch)
2002-12-11 03:34:26 +00:00
Lutz Jänicke
9314e366c8
Update -Olimit setting.
...
Submitted by: Bernhard Simon <simon@zid.tuwien.ac.at >
Reviewed by:
PR:
2002-12-10 18:48:14 +00:00
Ralf S. Engelschall
b22c7a1cfb
test commit (just removing tailing blanks) #2 after migration
2002-12-10 12:01:39 +00:00
Ralf S. Engelschall
99efc0f50f
test commit (removing trailing blanks) after migration
2002-12-10 10:51:18 +00:00
Ralf S. Engelschall
d979d09ccc
test blank-line commit after migration -- just ignore
2002-12-10 10:49:22 +00:00
Richard Levitte
c17810b087
A memset() too many got converted into a OPENSSL_cleanse().
...
PR: 393
2002-12-10 08:26:05 +00:00
Andy Polyakov
e0b2073fd4
BN_sqr test failure entry.
2002-12-09 13:43:38 +00:00
Lutz Jänicke
123e5dfc3a
Fix wrong URI.
...
Submitted by: assar@kth.se
Reviewed by:
PR: 390
2002-12-09 08:49:58 +00:00
Richard Levitte
0edad88a31
make update
2002-12-09 02:19:27 +00:00
Richard Levitte
4ccfe5f49b
Hmm, Geoff's change made things quite interesting. We can now give
...
users the option of disabling deprecated functions, which should of
course be reflected in libeay.num and .def files. Quite nice,
actually.
2002-12-09 02:18:16 +00:00
Geoff Thorpe
e189872486
Nils Larsch submitted;
...
- a patch to fix a memory leak in rsa_gen.c
- a note about compiler warnings with unions
- a note about improving structure element names
This applies his patch and implements a solution to the notes.
2002-12-08 16:45:26 +00:00
Richard Levitte
fdaea9ed2e
Since it's defined in draft-ietf-tls-compression-04.txt, let's make
...
ZLIB a known compression method, with the identity 1.
2002-12-08 09:31:41 +00:00
Geoff Thorpe
5daec7ea0e
Undefine OPENSSL_NO_DEPRECATED inside openssl application code if we are
...
being built with it defined - it is not a symbol to affect how openssl
itself builds, but to alter the way openssl headers can be used from an API
point of view. The "deprecated" function wrappers will always remain inside
OpenSSL at least as long as they're still being used internally. :-)
The exception is dsaparam which has been updated to the BN_GENCB-based
functions to test the new functionality. If GENCB_TEST is defined, dsaparam
will support a "-timebomb <n>" switch to cancel parameter-generation if it
gets as far as 'n' seconds without completion.
2002-12-08 05:38:44 +00:00
Geoff Thorpe
e9224c7177
This is a first-cut at improving the callback mechanisms used in
...
key-generation and prime-checking functions. Rather than explicitly passing
callback functions and caller-defined context data for the callbacks, a new
structure BN_GENCB is defined that encapsulates this; a pointer to the
structure is passed to all such functions instead.
This wrapper structure allows the encapsulation of "old" and "new" style
callbacks - "new" callbacks return a boolean result on the understanding
that returning FALSE should terminate keygen/primality processing. The
BN_GENCB abstraction will allow future callback modifications without
needing to break binary compatibility nor change the API function
prototypes. The new API functions have been given names ending in "_ex" and
the old functions are implemented as wrappers to the new ones. The
OPENSSL_NO_DEPRECATED symbol has been introduced so that, if defined,
declaration of the older functions will be skipped. NB: Some
openssl-internal code will stick with the older callbacks for now, so
appropriate "#undef" logic will be put in place - this is in case the user
is *building* openssl (rather than *including* its headers) with this
symbol defined.
There is another change in the new _ex functions; the key-generation
functions do not return key structures but operate on structures passed by
the caller, the return value is a boolean. This will allow for a smoother
transition to having key-generation as "virtual function" in the various
***_METHOD tables.
2002-12-08 05:24:31 +00:00
Geoff Thorpe
e90e719739
Fix a warning, and do some constification as a lucky side-effect :-)
2002-12-08 05:19:43 +00:00
Richard Levitte
7ba666fa0e
Since it's defined in draft-ietf-tls-compression-04.txt, let's make
...
ZLIB a known compression method, with the identity 1.
2002-12-08 02:41:11 +00:00
Richard Levitte
86a62cf15c
Implement a stateful variant if the ZLIB compression method. The old
...
stateless variant is kept, but isn't used anywhere.
2002-12-08 02:39:38 +00:00
Richard Levitte
b11405723d
Forgot one.
2002-12-07 20:03:42 +00:00
Richard Levitte
4c3a2b4f8a
Add a few items I intend to work on for 0.9.8 and on.
2002-12-07 20:02:20 +00:00
Andy Polyakov
bbf8198feb
Workaround for GCC-ia64 compiler bug.
...
Submitted by: <appro>
Reviewed by:
PR:
2002-12-06 17:18:10 +00:00
Richard Levitte
3dda0dd2a2
Some compilers are quite picky about non-void functions that don't return
...
anything.
2002-12-06 08:50:06 +00:00
Richard Levitte
fa63a98ad8
Apparently, bash is more forgiving than sh. To be backward
...
compatible, don't use ==, use = instead...
2002-12-06 08:43:41 +00:00
Richard Levitte
1fc73fef48
Keep NEWS in HEAD up to date.
2002-12-06 00:39:03 +00:00
Richard Levitte
90543bd07a
Keep STATUS in HEAD up to date.
2002-12-05 23:01:17 +00:00
Richard Levitte
43ecece595
Merge in relevant changes from the OpenSSL 0.9.6h release.
2002-12-05 21:50:13 +00:00
Richard Levitte
4ba8cabf62
SSL_CERT_FILE should be used in place of the system default file, not as
...
a first alternative to try
2002-12-05 21:07:26 +00:00
Richard Levitte
f68bb3c51f
Corrected DJGPP patch
2002-12-05 20:50:25 +00:00
Andy Polyakov
6d4ac67ac1
linux64-sparcv9 support finally debugged and tested.
...
Submitted by:
Reviewed by:
PR:
2002-12-05 13:17:52 +00:00
Richard Levitte
b84d5b72f1
Make sure to implement the cryptodev engine only when /dev/crypto exists.
2002-12-05 10:16:28 +00:00
Richard Levitte
8cbccedf7c
make update
2002-12-05 01:55:48 +00:00
Richard Levitte
1c24347062
Declare another general file.
2002-12-05 01:42:14 +00:00
Richard Levitte
9ef888130d
Allow users to modify /MD to /MT.
...
PR: 380
2002-12-05 01:35:04 +00:00
Richard Levitte
4387f47832
Make sure using SSL_CERT_FILE actually works, and has priority over system defaults.
...
PR: 376
2002-12-05 01:20:47 +00:00
Richard Levitte
38d6e4bb50
If an application supports static locks, it MUST support dynamic locks as
...
well to be able to use the CHIL engine.
PR: 281
2002-12-05 00:56:58 +00:00
Richard Levitte
ced621e3c2
PR: 381
2002-12-05 00:05:48 +00:00
Richard Levitte
85940ea8ea
Only check for a result buffer if the allocated string is a prompt string.
...
PR: 381
2002-12-05 00:04:30 +00:00
Richard Levitte
439ae4d398
Do not implement RC4 stuff if RC4 is disabled. Concequently, apply the same
...
rule for SHA stuff.
PR: 381
2002-12-04 22:54:02 +00:00
Richard Levitte
4fbe40c54f
gethostname() is more a BSD feature than an XOPEN one.
...
PR: 379
2002-12-04 22:48:01 +00:00
Richard Levitte
578ca7e4cd
Correct a few typos that I introduced after applying DJGPP patches.
2002-12-04 19:13:43 +00:00
Bodo Möller
7e8c30b589
In ECPKParameters_print, output the private key length correctly
...
(length of the order of the group, not length of the actual key, which
will be shorter in some cases).
Submitted by: Nils Larsch
2002-12-04 17:43:01 +00:00
Bodo Möller
2b32b28191
Don't compute timings here, we can do this elsewhere.
...
Include X9.62 signature examples.
Submitted by: Nils Larsch
2002-12-04 17:38:40 +00:00
Lutz Jänicke
532215f2db
Missing ")"
...
Submitted by: Christian Hohnstaedt <chohnstaedt@innominate.com >
Reviewed by:
PR:
2002-12-04 13:30:58 +00:00
Richard Levitte
5319be4438
DJGPP patches.
...
PR: 347
2002-12-04 09:54:10 +00:00
Richard Levitte
f7a3e73ef6
Add support for x86_64.
...
PR: 348
2002-12-04 09:17:43 +00:00
Richard Levitte
ff3345cb72
A gcc 3.0 bug is triggered by our code. Add a section about it in PROBLEMS.
...
PR: 375
2002-12-04 08:24:18 +00:00
Dr. Stephen Henson
716b2079dc
Make ASN1_TYPE_get() work for V_ASN1_NULL type.
2002-12-04 00:49:46 +00:00
Dr. Stephen Henson
e7b6228fd3
Typo in X509v3_get_ext_by_critical
2002-12-04 00:16:00 +00:00
Dr. Stephen Henson
2053c43de2
In asn1_d2i_read_bio, don't assume BIO_read will
...
return the requested number of bytes when reading
content.
2002-12-03 23:50:59 +00:00
Richard Levitte
1c3e4a3660
EXIT() may mean return(). That's confusing, so let's have it really mean
...
exit() in whatever way works for the intended platform, and define
OPENSSL_EXIT() to have the old meaning (the name is of course because
it's only used in the openssl program)
2002-12-03 16:33:03 +00:00
Richard Levitte
4707991520
Make CRYPTO_cleanse() independent of endianness.
2002-12-03 16:06:40 +00:00
Richard Levitte
7a1f92fdc3
Windows CE updates, contributed by Steven Reddie <smr@essemer.com.au>
2002-12-03 14:20:44 +00:00
Richard Levitte
e7a285694e
define USE_SOCKETS so sys/param.h gets included (and thusly, MAXHOSTNAMELEN
...
gets defined).
PR: 371
2002-12-02 22:49:02 +00:00
Richard Levitte
6ab285bf4c
I think I got it now. Apparently, the case of having to shift down
...
the divisor was a bit more complex than I first saw. The lost bit
can't just be discarded, as there are cases where it is important.
For example, look at dividing 320000 with 80000 vs. 80001 (all
decimals), the difference is crucial. The trick here is to check if
that lost bit was 1, and in that case, do the following:
1. subtract the quotient from the remainder
2. as long as the remainder is negative, add the divisor (the whole
divisor, not the shofted down copy) to it, and decrease the
quotient by one.
There's probably a nice mathematical proof for this already, but I
won't bother with that, unless someone requests it from me.
2002-12-02 21:31:45 +00:00
Richard Levitte
1d3159bcca
Make some names consistent.
2002-12-02 02:40:27 +00:00
Richard Levitte
f60ceb54eb
Through some experimentation and thinking, I think I finally got the
...
proper implementation of bn_div_words() for VAX.
If the tests go through well, the next step will be to test on Alpha.
2002-12-02 02:28:27 +00:00
Richard Levitte
0f995b2f40
Small bugfix: even when r == d, we need to adjust r and q.
...
PR: 366
2002-12-01 02:17:23 +00:00
Richard Levitte
848f735ae4
EXIT() needs to be in a function that returns int.
2002-12-01 01:23:35 +00:00
Richard Levitte
a678430602
Redo the VAX assembler version of bn_div_words().
...
PR: 366
2002-12-01 00:49:36 +00:00
Richard Levitte
e9b553dac1
Remove incorrect assert.
...
PR: 360
2002-11-29 15:18:22 +00:00
Richard Levitte
db3758923b
Make it so all names mentioned in the NAME section of each manpage becomes a
...
symlink to said manpage.
PR: 242
2002-11-29 15:00:58 +00:00
Richard Levitte
5e4a75e79f
Correct some names.
2002-11-29 14:21:54 +00:00
Richard Levitte
43d601641f
A few more memset()s converted to OPENSSL_cleanse().
...
I *think* I got them all covered by now, bu please, if you find any more,
tell me and I'll correct it.
PR: 343
2002-11-29 11:30:45 +00:00
Richard Levitte
55f78baf32
Have all tests use EXIT() to exit rather than exit(), since the latter doesn't
...
always give the expected result on some platforms.
2002-11-28 18:54:30 +00:00
Richard Levitte
6c359479d7
Make sure EXIT() can always be used as one statement.
2002-11-28 18:52:14 +00:00
Richard Levitte
4579924b7e
Cleanse memory using the new OPENSSL_cleanse() function.
...
I've covered all the memset()s I felt safe modifying, but may have missed some.
2002-11-28 08:04:36 +00:00
Richard Levitte
2047bda6fb
Unused variable removed.
2002-11-27 13:40:41 +00:00
Richard Levitte
406c6f6962
Extra ; removed.
2002-11-27 13:40:11 +00:00