Matt Caswell
22c21b60af
Prepare for 1.1.0-pre1 release
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-10 14:23:10 +00:00
Matt Caswell
ac7f47dce1
OpenSSL 1.1.0 is now in pre release
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-10 14:21:59 +00:00
Matt Caswell
b0cae88cc2
make update
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-10 14:21:59 +00:00
Richard Levitte
e798664726
Don't run rehash as part of building the openssl app
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-12-10 15:03:52 +01:00
Matt Caswell
7c31419693
Update CHANGES and NEWS for alpha release
...
Misc updates to the CHANGES and NEWS files ready for the alpha release.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-10 13:10:32 +00:00
Matt Caswell
67f60be8c9
Ensure |rwstate| is set correctly on BIO_flush
...
A BIO_flush call in the DTLS code was not correctly setting the |rwstate|
variable to SSL_WRITING. This means that SSL_get_error() will not return
SSL_ERROR_WANT_WRITE in the event of an IO retry.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-10 12:44:07 +00:00
Matt Caswell
2ad226e88b
Fix DTLS handshake fragment retries
...
If using DTLS and NBIO then if a second or subsequent handshake message
fragment hits a retry, then the retry attempt uses the wrong fragment
offset value. This commit restores the fragment offset from the last
attempt.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-10 12:44:07 +00:00
Andy Polyakov
02dc0b82ab
evp/e_aes.c: wire hardware-assisted block function to OCB.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-10 13:11:46 +01:00
Andy Polyakov
bd30091c97
x86[_64] assembly pack: add optimized AES-NI OCB subroutines.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-10 13:11:26 +01:00
Matt Caswell
2fb5535e64
Fix mkfiles for new directories
...
Add the new chacha and poly1305 directories to mkfiles.pl to enable proper
building on windows.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-12-10 11:58:58 +00:00
Matt Caswell
330dcb09b2
Add a return value check
...
If the call to OBJ_find_sigid_by_algs fails to find the relevant NID then
we should set the NID to NID_undef.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-10 11:50:20 +00:00
Andy Polyakov
44bf7119d6
modes/ocb128.c: fix overstep.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-10 12:36:25 +01:00
Andy Polyakov
c7b5b9f4b1
make update.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-10 12:06:05 +01:00
Andy Polyakov
48f1484555
Configure: make no-chacha and no-poly1305 work.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-10 12:05:50 +01:00
Andy Polyakov
a76ba82ccb
Wire ChaCha20-Poly1305 to TLS.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-10 12:05:30 +01:00
Andy Polyakov
bd3385d845
evp/c_allc.c: wire ChaCha20-Poly1305 and add tests.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-10 12:03:41 +01:00
Andy Polyakov
eb85cb8632
test/evp_test.c: allow generic AEAD ciphers to be tested.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-10 12:00:46 +01:00
Andy Polyakov
bd989745b7
crypto/evp: add e_chacha20_poly1305.c.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-10 12:00:29 +01:00
Andy Polyakov
f6b9427923
evp/evp_enc.c: allow EVP_CIPHER.ctx_size to be 0.
...
In such case it would be EVP_CIPHER.cleanup's reponsibility to wipe
EVP_CIPHEX_CTX.cipher_data.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-10 12:00:05 +01:00
Andy Polyakov
72bb2f64fc
Add ChaCha20-Poly1305 and ChaCha20 NIDs.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-10 11:59:49 +01:00
Andy Polyakov
7dcb21869b
Add reference ChaCha20 and Poly1305 implementations.
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-12-10 11:58:56 +01:00
Dr. Stephen Henson
a0ffedaf7b
make default_ec_key_meth static
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-10 04:00:09 +00:00
Dr. Stephen Henson
59ff61f357
remove deleted directories from mkfiles.pl
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-12-09 23:57:19 +00:00
Richard Levitte
60f43e9e4d
Fix warnings about unused variables when EC is disabled.
...
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-12-09 23:59:04 +01:00
Richard Levitte
f8d3ab4928
Move the definitions of EC_KEY and EC_KEY_METHOD to ossl_typ.h
...
Most of all, that has inclusion of openssl/engine.h work even if EC
has been disabled. This is the same as has been done for DH, DSA, RSA
and more...
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-12-09 23:56:57 +01:00
Dr. Stephen Henson
5e03052560
add CHANGES and NEWS entry
...
Todo: update documentation.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:20 +00:00
Dr. Stephen Henson
8b8689aefa
remove ECDSA error line
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:20 +00:00
Dr. Stephen Henson
970e7b5bf8
add compatibility headers
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:20 +00:00
Dr. Stephen Henson
91e7bcc264
Use NULL comparison
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:20 +00:00
Dr. Stephen Henson
7bb75a5d08
add block comment
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:20 +00:00
Dr. Stephen Henson
77d0d10db7
set standard EC method in eng_openssl
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:20 +00:00
Dr. Stephen Henson
3c4e064e78
make update
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:19 +00:00
Dr. Stephen Henson
62690c6acf
remove ecdsa.h header references.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:19 +00:00
Dr. Stephen Henson
f8d7d2d6df
EC_KEY_METHOD accessors.
...
Set of accessors to set and get each field.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:19 +00:00
Dr. Stephen Henson
89313de5cb
make errors
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:19 +00:00
Dr. Stephen Henson
a200a817ad
Top level ECDSA sign/verify redirection.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:19 +00:00
Dr. Stephen Henson
7d711cbc33
Engine EC_KEY_METHOD functionality.
...
Rename ENGINE _EC_KEY functions to _EC.
Add support for EC_KEY_METHOD in ENGINE_set_default et al. Copy
ec_meth.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:19 +00:00
Dr. Stephen Henson
d2ad1c9617
remove ecdsa from mkdef.pl
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:19 +00:00
Dr. Stephen Henson
1eb97c3ecd
remove ECDSA_METHOD from ENGINE
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:19 +00:00
Dr. Stephen Henson
c8bfd40a92
remove ECDSA_METHOD typedef
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:19 +00:00
Dr. Stephen Henson
180eec1666
add missing prototypes
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:19 +00:00
Dr. Stephen Henson
fb29bb5926
remove ecdsa.h header
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:19 +00:00
Dr. Stephen Henson
cf517a6d3d
add ECDSA_size to ec_asn1.c
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:19 +00:00
Dr. Stephen Henson
c535979126
remove errors
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:19 +00:00
Dr. Stephen Henson
f84f31fc36
remove crypto/ecdsa
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:19 +00:00
Dr. Stephen Henson
8c6ef7869a
add sign/verify methods
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:19 +00:00
Dr. Stephen Henson
6e73d12e76
return errors for unsupported operations
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:19 +00:00
Dr. Stephen Henson
6a774a6625
Remove reference to ECDSA_OpenSSL.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:19 +00:00
Dr. Stephen Henson
bd3602eb89
Move and adapt ECDSA sign and verify functions.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:18 +00:00
Dr. Stephen Henson
cf70b8f5a6
modify ecdsatest to use accessor
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:18 +00:00
Dr. Stephen Henson
7236e3c8f7
Add ECDSA_SIG accessor.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:18 +00:00
Dr. Stephen Henson
ef5b2ba6fb
move ECDSA_SIG prototypes
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:18 +00:00
Dr. Stephen Henson
8c661f76b6
make errors
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:18 +00:00
Dr. Stephen Henson
c0efda00e9
extend EC_KEY_METHOD for signing support
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:18 +00:00
Dr. Stephen Henson
6a47db4502
adapt ossl_ecdsa.c to crypto/ec
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:18 +00:00
Dr. Stephen Henson
714b2abb29
move ECDSA_SIG definition
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:18 +00:00
Dr. Stephen Henson
0a6f1d9733
Move ECDSA implementation to crypto/ec
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:18 +00:00
Dr. Stephen Henson
2d3d00dcd8
Move ECDSA_SIG ASN.1 to crypto/ec
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:18 +00:00
Dr. Stephen Henson
3475bc9675
Add set methods.
...
Add set_group, set_public and set_private methods. An EC_KEY_METHOD can use
these to perform any appropriate operation when the key components are set,
such as caching data in some more convenient ENGINE specific format or
returning an error if the parameters are invalid or the operation is
not supported.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:18 +00:00
Dr. Stephen Henson
ea0392b921
EC_KEY_METHOD copy support
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:18 +00:00
Dr. Stephen Henson
0d6ff6d3d1
EC_KEY_METHOD init and finish support
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:18 +00:00
Dr. Stephen Henson
5196641617
ENGINE fixes
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:18 +00:00
Dr. Stephen Henson
cda302d94f
remove ECDH from mkdef.pl
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:18 +00:00
Dr. Stephen Henson
1e8622297d
remove ECDH_METHOD typedef
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:18 +00:00
Dr. Stephen Henson
30243c9523
remove ecdh.h header
...
Remove redundant ecdh.h header and any references to it.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:18 +00:00
Dr. Stephen Henson
fe74cc0432
remove ECDH error loading
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:17 +00:00
Dr. Stephen Henson
d3bcab845e
Remove crypto/ecdh update Makefile.org
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:17 +00:00
Dr. Stephen Henson
f517ffbb83
remove ECDH_METHOD from ENGINE
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:17 +00:00
Dr. Stephen Henson
53e3189d0c
make errors
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:17 +00:00
Dr. Stephen Henson
a22a7e7089
Add compute key support to EC_KEY_METHOD
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:17 +00:00
Dr. Stephen Henson
647b223875
Adapt ecdh_compute_key
...
Rename ecdh_compute_key into ossl_ecdh_compute_key and modify it
to use EC error codes. Remove superfluous old ECDH functions.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:17 +00:00
Dr. Stephen Henson
168e8374ee
move ECDH implementation to crypto/ec
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:17 +00:00
Dr. Stephen Henson
768c53e1b6
Move ECDH_KDF_X9_62 to crypto/ec
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:17 +00:00
Dr. Stephen Henson
5a6a1029d2
EC_KEY_METHOD keygen support.
...
Add keygen to EC_KEY_METHOD. Redirect EC_KEY_generate_key through
method and set the current EC key generation function as the default.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:17 +00:00
Dr. Stephen Henson
d2fa70d82b
make errors
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:17 +00:00
Dr. Stephen Henson
28572b577c
Support for EC_KEY_METHOD.
...
Add EC_KEY_METHOD. This is part of the EC revision and will make EC behave
more like other algorithms. Specifically:
EC_KEY_METHOD is part of EC_KEY.
It is part of ENGINE.
Default or key specific implementations can be provided to redirect some
or all operations.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-09 22:09:17 +00:00
Ben Laurie
28cbe2ab4a
Link library for backtrace() on BSD...
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-09 13:37:30 +00:00
Richard Levitte
23fe34b47a
NEWS: Add a bit of precision regarding removal of cipher suites
...
Suggested by Benjamin Kaduk <bkaduk@akamai.com >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-12-09 00:35:58 +01:00
Richard Levitte
6f9a3c37db
Additional NEWS
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-12-08 23:36:18 +01:00
Rich Salz
ab29c82a55
Refer to website for acknowledgements.
...
Reviewed-by: Steve Marquess <marquess@openssl.com >
2015-12-08 16:07:09 -05:00
Richard Levitte
3cd7aef34d
Not all 'find's know -xtype, use -type instead
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-08 21:04:53 +01:00
Richard Levitte
382af61f62
Adapt the OS X build to use the OS X tar
...
As part of this, move release creation to a script to be called from
.travis.yml. That makes it much easier to test outside of travis.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-08 21:04:53 +01:00
Richard Levitte
4d3c30a179
Make it possible to affect the way dists are made
...
Introducing DISTTARVARS to propagate changed variables down to the
tar-making target.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-08 21:04:53 +01:00
Dr. Stephen Henson
d05775d703
Update NEWS
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-12-08 16:49:12 +00:00
Dr. Stephen Henson
42a8b3f90a
Extended master secret test script.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-12-08 16:33:04 +00:00
Dr. Stephen Henson
b3fce9c91e
Add extms extension
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-12-08 16:33:04 +00:00
Dr. Stephen Henson
040c878350
TLSProxy update
...
Add function to delete extensions and fix ClientHello repacking.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-12-08 16:33:04 +00:00
Dr. Stephen Henson
4160936143
update errors
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-12-08 16:32:39 +00:00
Dr. Stephen Henson
e7f0d9210c
Extended master secret fixes and checks.
...
Add new flag TLS1_FLAGS_RECEIVED_EXTMS which is set when the peer sends
the extended master secret extension.
Server now sends extms if and only if the client sent extms.
Check consistency of extms extension when resuming sessions following (where
practical) RFC7627.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-12-08 16:32:39 +00:00
Matt Caswell
686cf15e9d
Fix merge error
...
Commit 6140f0365 added some new ctrl constants. However due to a
merge error one of these values was duplicated with an existing
value.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-08 13:00:59 +00:00
Dmitry Belyavskiy
6140f03653
Add some new cipher ctrl constants
...
These are needed for GOST
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-12-08 11:56:39 +00:00
Richard Levitte
c376d170d1
Cleanup the EVP_MD_CTX before exit rather than after
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-12-08 01:01:13 +01:00
Richard Levitte
3cb9fd97ce
Remove double semi (;)
...
When in the middle of declarations, some C compilers will complain.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-12-08 00:11:47 +01:00
Richard Levitte
47abe38004
Remove typedef of HMAC_CTX from crypto/hmac/hmac_lcl.h
...
This is already defined in include/openssl/ossl_typ.h.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-12-07 20:53:17 +01:00
Richard Levitte
39d5193201
Fix clang complaints about uninitialised variables.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-07 20:37:08 +01:00
Richard Levitte
b91dd150d2
Change tar owner and group to just 0
...
It seems like some tar versions don't like the name:id form for
--owner and --group. The closest known anonymous user being 0 (root),
that seems to be the most appropriate user/group to assign ownership
to. It matters very little when unpacking either way.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-07 17:49:15 +01:00
Richard Levitte
507db4c531
Add an entry in CHANGES
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-07 17:40:20 +01:00
Richard Levitte
706e2462f1
Document EVP_MD constructors, destructors and manipulators
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-07 17:40:20 +01:00
Richard Levitte
716854d74e
Document the HMAC changes
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-07 17:40:20 +01:00
Richard Levitte
25191fffb9
Document the EVP_MD_CTX changes
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-07 17:40:20 +01:00
Richard Levitte
b3bb779997
make update
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-07 17:40:20 +01:00
Richard Levitte
a87a0a6e5e
Cleanup: fix all sources that used HMAC_CTX_init
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-07 17:40:20 +01:00
Richard Levitte
dc0099e1dd
Cleanup: rename HMAC_CTX_init to HMAC_CTX_reset
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-07 17:40:20 +01:00
Richard Levitte
e0a3a803d9
Cleanup: support EVP_MD_CTX_(create|init|destroy) for deprecated use
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-07 17:40:20 +01:00
Richard Levitte
bfb0641f93
Cleanup: fix all sources that used EVP_MD_CTX_(create|init|destroy)
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-07 17:40:20 +01:00
Richard Levitte
959ed5316c
Cleanup: rename EVP_MD_CTX_(create|init|destroy) to EVP_MD_CTX_(new|reset|free)
...
Looking over names, it seems like we usually use names ending with
_new and _free as object constructors and destructors. Also, since
EVP_MD_CTX_init is now used to reset a EVP_MD_CTX, it might as well be
named accordingly.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-07 17:39:23 +01:00
Richard Levitte
6756532358
Cleanup: Remove M_EVP_MD_* macros
...
These macros were only meant for crypto/evp, and are now entirely
unused.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-07 17:39:23 +01:00
Richard Levitte
eda34e4bef
Adapt the rest of the source to the removal of (EVP_MD_CTX|HMAC_CTX)_cleanup
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-07 17:39:23 +01:00
Richard Levitte
32fd54a9a3
Remove HMAC_CTX_cleanup and combine its functionality into EVP_MD_CTX_init
...
This follows the same idea as the combination of EVP_MD_CTX_cleanup
and EVP_MD_CTX_init into one function.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-07 17:39:23 +01:00
Richard Levitte
74cabf3fef
Remove EVP_MD_CTX_cleanup and put its functionality into EVP_MD_CTX_init
...
The idea is that with EVP_MD_CTX_create() and EVP_MD_CTX_destroy(),
EVP_MD_CTX_cleanup and EVP_MD_CTX_init is not used the same as before.
Instead, we need a single function that can be used to reinitialise an
existing EVP_MD_CTX that's been created with EVP_MD_CTX_create()
previously. Combining EVP_MD_CTX_cleanup and EVP_MD_CTX_init into
that one function is the answer.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-07 17:39:23 +01:00
Richard Levitte
bf7c68177b
Adapt the rest of the source to the opaque HMAC_CTX
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-07 17:39:23 +01:00
Richard Levitte
3f43aecc59
Make the definition of HMAC_CTX opaque
...
This moves the definition to crypto/hmac/hmac_lcl.h. Constructor and
destructor added, and the typedef moved to include/openssl/ossl_typ.h.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-07 17:39:23 +01:00
Richard Levitte
ab0a14bbc7
Add inclusion of internal/evp_int.h to all crypto/ files that need it
...
These are the files that add new EVP_MDs.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-07 17:39:23 +01:00
Richard Levitte
cddcea8c4b
Adapt all engines that add new EVP_MDs
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-07 17:39:23 +01:00
Richard Levitte
cc9d6655a1
Have the few apps that accessed EVP_MD directly use accessors instead
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-07 17:39:23 +01:00
Richard Levitte
2db6bf6f85
Make the definition of EVP_MD opaque
...
This moves the definition to crypto/include/internal/evp_int.h and
defines all the necessary method creators, destructors, writers and
accessors. The name standard for the latter is inspired from the
corresponding functions to manipulate UI methods.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-07 17:39:23 +01:00
Richard Levitte
6e59a892db
Adjust all accesses to EVP_MD_CTX to use accessor functions.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-07 17:39:23 +01:00
Richard Levitte
9b6c00707e
Document the changed HMAC API.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-07 17:36:57 +01:00
Richard Levitte
fa0c23de83
Adapt HMAC to the EVP_MD_CTX changes
...
This change required some special treatment, as HMAC is intertwined
with EVP_MD. For now, all local HMAC_CTX variables MUST be
initialised with HMAC_CTX_EMPTY, or whatever happens to be on the
stack will be mistaken for actual pointers to EVP_MD_CTX. This will
change as soon as HMAC_CTX becomes opaque.
Also, since HMAC_CTX_init() can fail now, its return type changes from
void to int, and it will return 0 on failure, 1 on success.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-07 17:36:57 +01:00
Richard Levitte
77a01145be
Have other crypto/evp files include evp_locl.h
...
Note: this does not include the files in crypto/evp that are just
instanciations of EVP_MD.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-07 17:36:57 +01:00
Richard Levitte
7638370ca6
Make the definition of EVP_MD_CTX opaque
...
This moves the definitionto crypto/evp/evp_locl.h, along with a few
associated accessor macros. A few accessor/writer functions added.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-07 17:36:57 +01:00
Richard Levitte
451a5bdf03
Do not add symlinks in the source release
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-07 16:12:22 +01:00
Richard Levitte
475fc3d872
In travis, build from a "source release" rather than from the build tree
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-07 16:12:22 +01:00
Richard Levitte
4a544810f0
Small changes to creating dists
...
Make TARFILE include ../ instead of having that hard coded all over the place.
When transforming file names in TAR_COMMAND, use $(NAME) instead of openssl-$(VERSION)
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-07 16:12:22 +01:00
Dr. Stephen Henson
5fa30720e4
Fix and update versions in CHANGES and NEWS
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-12-07 14:30:30 +00:00
Andy Polyakov
a285992763
ARMv4 assembly pack: allow Thumb2 even in iOS build,
...
and engage it in most modules.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-12-07 12:06:06 +01:00
Viktor Dukhovni
d231a4010b
Fix typo and improve a bit of text
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-12-06 22:22:44 -05:00
Viktor Dukhovni
1c735804a2
Really disable 56-bit (single-DES) ciphers
...
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-12-06 12:32:19 -05:00
Kurt Roeckx
361a119127
Remove support for all 40 and 56 bit ciphers.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
MR: #364
2015-12-05 17:45:59 +01:00
Kurt Roeckx
fe6ef2472d
Remove SSL_{CTX_}set_ecdh_auto() and always enable ECDH
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2015-12-04 22:30:36 +01:00
Kurt Roeckx
6977e8ee4a
Make SSL_{CTX}_set_tmp_ecdh() call SSL_{CTX_}set1_curves()
...
SSL_{CTX}_set_tmp_ecdh() allows to set 1 EC curve and then tries to use it. On
the other hand SSL_{CTX_}set1_curves() allows you to set a list of curves, but
only when SSL_{CTX_}set_ecdh_auto() was called to turn it on.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2015-12-04 22:25:11 +01:00
Kurt Roeckx
6f78b9e824
Remove support for SSL_{CTX_}set_tmp_ecdh_callback().
...
This only gets used to set a specific curve without actually checking that the
peer supports it or not and can therefor result in handshake failures that can
be avoided by selecting a different cipher.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2015-12-04 22:22:31 +01:00
Matt Caswell
ad3819c29e
Fix EAP FAST in the new state machine
...
The new state machine code missed an allowed transition when resuming a
session via EAP FAST. This commits adds the missing check for the
transition.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-12-04 20:26:54 +00:00
Viktor Dukhovni
1c86d8fd41
Revert unnecessary SSL_CIPHER_get_bits API change
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-04 13:58:22 -05:00
Richard Levitte
f6e9c55331
Run test/run_tests.pl directly in the test_ordinals target
...
Running 'make TEST=test_ordinals test' starts the whole build process,
which wasn't desired for this target. Instead, we take a shortcut.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-04 17:27:54 +01:00
Andy Polyakov
29851264f1
bn/asm/x86_64-mont5.pl: fix carry propagating bug (CVE-2015-3193).
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-03 13:12:01 +00:00
Andy Polyakov
b5516cfbd6
perlasm/ppc-xlate.pl: comply with ABIs that specify vrsave as reserved.
...
RT#4162
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-03 13:29:53 +01:00
Andy Polyakov
1bbea40384
modes/ocb128.c: fix sanitizer warning.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-02 23:40:05 +01:00
Richard Levitte
16b6081e0d
Fix ./Configure reconf
...
'./Configure reconf' hasn't been working for a while, because a perl
lable needs to be immediately followed by a block.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-12-02 19:39:36 +01:00
Dr. Stephen Henson
19c6d3ea2d
Remove RSA_FLAG_SIGN_VER flag.
...
Remove RSA_FLAG_SIGN_VER: this was origininally used to retain binary
compatibility after RSA_METHOD was extended to include rsa_sign and
rsa_verify fields. It is no longer needed.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-02 18:23:29 +00:00
Richard Levitte
a1d3f3d1d0
Move the backtrace memleak options to a separate variable
...
The contents of this variable ($memleak_devteam_backtrace) is added to
$cflags unless we build for a platform we know doesn't support gcc's
-rdynamic och backtrace() and friends.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-12-02 19:20:45 +01:00
Dr. Stephen Henson
df04754be7
make update
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-02 17:52:01 +00:00
Dr. Stephen Henson
7f572e958b
Remove legacy sign/verify from EVP_MD.
...
Remove sign/verify and required_pkey_type fields of EVP_MD: these are a
legacy from when digests were linked to public key types. All signing is
now handled by the corresponding EVP_PKEY_METHOD.
Only allow supported digest types in RSA EVP_PKEY_METHOD: other algorithms
already block unsupported types.
Remove now obsolete EVP_dss1() and EVP_ecdsa().
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-02 17:52:01 +00:00
Rich Salz
0aca86b313
Run test_ordinals after update
...
Catch a common 'make update' failure: conflicting ordinals.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-02 12:40:38 -05:00
Richard Levitte
f9fd35248c
_BSD_SOURCE is deprecated, use _DEFAULT_SOURCE instead
...
The feature_test_macros(7) manual tells us that _BSD_SOURCE is
deprecated since glibc 2.20 and that the compiler will warn about it
being used, unless _DEFAULT_SOURCE is defined as well.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-02 18:23:16 +01:00
Richard Levitte
012c540850
Add backtrace to memory leak output
...
This is an option for builds with gcc and --strict-warnings.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-02 16:49:08 +01:00
Andy Polyakov
2238e0e45d
crypto/sparcv9cap.c: add SIGILL-free feature detection for Solaris.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-12-02 10:53:33 +01:00
Andy Polyakov
81f3d6323d
modes/ocb128.c: split fixed block xors to aligned and misaligned.
...
Main goal was to improve performance on RISC platforms, e.g. 10%
was measured on MIPS, POWER8...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-12-02 10:50:20 +01:00
Andy Polyakov
b9e3d7e0f6
modes/ocb128.c: ocb_lookup_l to allow non-contiguous lookup
...
and CRYPTO_ocb128_encrypt to handle in==out.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-12-02 10:48:38 +01:00
Rich Salz
338f5727c8
typo fix on function
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-12-01 17:09:19 -05:00
Rich Salz
e6390acac9
ex_data part 2: doc fixes and CRYPTO_free_ex_index.
...
Add CRYPTO_free_ex_index (for shared libraries)
Unify and complete the documentation for all "ex_data" API's and objects.
Replace xxx_get_ex_new_index functions with a macro.
Added an exdata test.
Renamed the ex_data internal datatypes.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-12-01 11:48:37 -05:00
Rich Salz
d59c7c81e3
Remove BN_init
...
Rename it to be an internal function bn_init.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-11-30 16:10:12 -05:00
Dr. Stephen Henson
30c7fea496
Remove GOST special case: handled automatically now.
...
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
2015-11-30 03:49:35 +00:00
Dr. Stephen Henson
7afd231275
Use digest indices for signature algorithms.
...
Don't hard code EVP_sha* etc for signature algorithms: use table
indices instead. Add SHA224 and SHA512 to tables.
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
2015-11-30 03:49:35 +00:00
Dr. Stephen Henson
aa430c7467
For TLS < 1.2 use default digest for client certificate
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-11-30 01:13:51 +00:00
Dr. Stephen Henson
152fbc28e8
Use digest tables for defaults.
...
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
2015-11-30 00:32:57 +00:00
Viktor Dukhovni
9446daac5b
Correct aes-128-cbc cipher name
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-11-28 15:07:34 -05:00
Dr. Stephen Henson
600fdc716f
fix function code discrepancy
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-11-27 21:28:23 +00:00
Dr. Stephen Henson
28ba2541f9
PRF and handshake hash revision.
...
Change handshake hash array into a single digest context simplifying the
handhake hash code. Use EVP_md5_sha1() if needed for handshake hashes in
TLS 1.1 and earlier.
Simplify PRF code to also use a single digest and treat EVP_md5_sha1()
as a special case.
Modify algorithm2 field of ciphers to use a single index value for handshake
hash and PRF instead of a bitmap.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-11-27 19:04:14 +00:00
Matt Caswell
2a9b96548a
Updates to GOST2012
...
Various updates following feedback from the recent commit of the new
GOST2012 code.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-11-27 17:23:14 +00:00
Dr. Stephen Henson
9689a6aeed
Remove X509_VERIFY_PARAM_ID
...
Now that X509_VERIFY_PARAM is opaque X509_VERIFY_PARAM_ID is no longer
needed.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-11-26 16:07:14 +00:00
Matt Caswell
3bbd1d63e2
Fix a NULL deref in an error path
...
The SRP_create_verifier_BN function goes to the |err| label if the |salt|
value passed to it is NULL. It is then deref'd.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-26 12:02:03 +00:00
Matt Caswell
e113c9c59d
Add documentation for BN_with_flags
...
Following on from the previous commit this adds some documentation for the
BN_with_flags function which is easy to misuse.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-11-26 10:20:36 +00:00
Matt Caswell
fd7d252060
Tighten up BN_with_flags usage and avoid a reachable assert
...
The function rsa_ossl_mod_exp uses the function BN_with_flags to create a
temporary copy (local_r1) of a BIGNUM (r1) with modified flags. This
temporary copy shares some state with the original r1. If the state of r1
gets updated then local_r1's state will be stale. This was occurring in the
function so that when local_r1 was freed a call to bn_check_top was made
which failed an assert due to the stale state. To resolve this we must free
local_r1 immediately after we have finished using it and not wait until the
end of the function.
This problem prompted a review of all BN_with_flag usage within the
codebase. All other usage appears to be correct, although often not
obviously so. This commit refactors things to make it much clearer for
these other uses.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-11-26 10:20:36 +00:00
Dr. Stephen Henson
6938c954b0
Remove unused cert_verify_mac code
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-11-25 18:22:12 +00:00
Andy Polyakov
f6739c3db4
Configuratons: add -DFILIO_H to harmonized Solaris targets.
...
Triggered by RT#4144.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-11-24 23:06:13 +01:00
Alessandro Ghedini
da950fd3f1
Remove useless locking code
...
Follow-up to 070c233 .
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Rich Salz <rsalz@akamai.com >
GH: #454
2015-11-24 22:38:32 +01:00
Finn Hakansson
c98d63f250
Fix typo: _REENTERANT -> _REENTRANT
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Richard Levitte <levitte@openssl.org >
GH: #484
2015-11-24 22:32:33 +01:00
Marcus Meissner
434b58457c
mark openssl configuration as loaded at end of OPENSSL_config
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Rich Salz <rsalz@akamai.com >
GH: #466
2015-11-24 22:01:35 +01:00
Quanah Gibson-Mount
c7944cf1f6
Fix grammar errors
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Rich Salz <rsalz@akamai.com >
GH: #481
2015-11-24 22:01:35 +01:00
Pascal Cuoq
a60c151a7d
ssl3_free(): Return if it wasn't created
...
If somewhere in SSL_new() there is a memory allocation failure, ssl3_free() can
get called with s->s3 still being NULL.
Patch also provided by Willy Tarreau <wtarreau@haproxy.com >
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Viktor Dukhovni <openssl-users@dukhovni.org >
2015-11-24 22:01:35 +01:00
Dr. Stephen Henson
00f5263b78
Add ctrl for SHA1 and SSLv3
...
Add SSLv3 ctrl to EVP_sha1() this is only needed if SSLv3 client
authentication is used with DSA/ECDSA.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-11-24 19:18:44 +00:00
Dr. Stephen Henson
9cc6fa1ce8
make update
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-11-24 19:18:44 +00:00
Dr. Stephen Henson
28f4580c1e
Use EVP_md5_sha1() to process client verify
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-11-24 19:18:44 +00:00
Dr. Stephen Henson
a0f63828e3
Use EVP_md5_sha1() to generate client verify
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-11-24 19:18:44 +00:00
Dr. Stephen Henson
396d5fd091
Add EVP_MD_CTX_ctrl function.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-11-24 19:18:44 +00:00
Dr. Stephen Henson
93972b8c72
Add ssl3 ctrl to EVP_md5_sha1().
...
Add a ctrl to EVP_md5_sha1() to handle the additional operations needed
to handle SSL v3 client authentication and finished message.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-11-24 19:18:44 +00:00
Dr. Stephen Henson
e3e11e99ce
Remove RSA exception when generating server key exchange.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-11-24 19:18:44 +00:00
Dr. Stephen Henson
192e4bbbf9
Remove RSA exception when processing server key exchange.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-11-24 19:18:44 +00:00
Dr. Stephen Henson
d18d31a16f
Use MD5+SHA1 for default digest if appropriate.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-11-24 19:18:44 +00:00
Dr. Stephen Henson
2f142ada2c
Add MD5+SHA1
...
Add digest combining MD5 and SHA1. This is used by RSA signatures for
TLS 1.1 and earlier.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-11-24 19:18:44 +00:00
Dr. Stephen Henson
63eb10a07e
Fix uninitialised p error.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-24 16:45:02 +00:00
Dr. Stephen Henson
158e5207a7
Limit depth of ASN1 parse printing.
...
Thanks to Guido Vranken <guidovranken@gmail.com > for reporting this issue.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-11-24 15:25:43 +00:00
Richard Levitte
de17db915e
Drop the old perl start magic and replace it with a normal shebang
...
perlrun(1) leads the way.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-11-24 14:06:45 +01:00
Jacob Bandes-Storch
f4d8f03755
Add perl modeline to Configure scripts
...
Encourages GitHub to perform proper syntax highlighting.
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-11-24 13:12:57 +01:00
Rich Salz
b83fb854da
"make update" after async merge.
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2015-11-23 16:38:50 -05:00
Rich Salz
cc99bfa76b
Fix a few missed "if (!ptr)" cleanups
...
And a scalar !x --> x==0 test
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-11-23 13:51:23 -05:00
Dmitry Belyavsky
e44380a990
Patch containing TLS implementation for GOST 2012
...
This patch contains the necessary changes to provide GOST 2012
ciphersuites in TLS. It requires the use of an external GOST 2012 engine.
Reviewed-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-23 16:09:42 +00:00
Andy Polyakov
76eba0d94b
x86_64 assembly pack: tune clang version detection.
...
RT#4142
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-11-23 16:00:06 +01:00
Andy Polyakov
193ed2d74b
Makefile.org: add LC_ALL=C to unify error [and other] messages.
...
RT#4138
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-11-23 15:59:54 +01:00
Andy Polyakov
2f2c805a26
e_os.h: __sun done right.
...
RT #4144
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
2015-11-23 11:46:15 +01:00
Matt Caswell
46ddbcf2b4
Fix a rebase error
...
During rebasing of the async changes some error codes ended up being
duplicated so that "make errors" fails. This removes the duplication.
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-11-22 22:48:10 +00:00
Viktor Dukhovni
6e8ac50870
Async error handling and MacOS/X fixes
...
In the async code for MacOS/X define _XOPEN_SOURCE (if not already
defined) as early as possible. We must do this before including
any header files, because on MacOS/X <stlib.h> includes <signal.h>
which includes <ucontext.h>. If we delay defining _XOPEN_SOURCE
and include <ucontext.h> after various system headers are included,
we are very likely to end up with the wrong (truncated) definition
of ucontext_t.
Also, better error handling and some code cleanup in POSIX fibre
construction and destruction. We make sure that async_fibre_makecontext()
always initializes the fibre to a state that can be freed.
For all implementations, check for error returns from
async_fibre_makecontext().
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-11-22 16:54:43 -05:00
Kurt Roeckx
3d32218812
Use defined(__sun) instead of defined(sun)
...
Strict ISO confirming C compilers only define __sun
Reviewed-by: Viktor Dukhovni <openssl-users@dukhovni.org >
RT #4144 , MR #1353
2015-11-22 12:16:44 +01:00
Kurt Roeckx
652d4a8c83
Update dasync to use size_t for the sha1 update
...
Reviewed-by: Matt Caswell <matt@openssl.org >
MR #1350
2015-11-22 10:38:56 +01:00
Alessandro Ghedini
68db80e2d1
Add initial AppVeyor configuration
...
Original patch by Frank Morgner.
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Rich Salz <rsalz@akamai.com >
GH: #456
2015-11-21 18:06:31 +01:00
Rich Salz
35cb565a9b
Turn B<...()> into ...()
...
For all functions, consistently use asdf() not B<asdf()>
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-11-21 11:50:01 -05:00
Michal Bozon
e61434b427
Fix "primarility" typo
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Rich Salz <rsalz@akamai.com >
GH: #458
2015-11-21 14:37:24 +01:00
Finn Hakansson
00a8e14676
Minor correction to comment.
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Rich Salz <rsalz@akamai.com >
2015-11-21 14:27:14 +01:00
Andy Polyakov
58a816d645
Fix STRICT_ALIGNMENT for whrlpool
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-11-21 14:22:02 +01:00
Alessandro Ghedini
d011253f7a
Declare cleanse_ctr variable as extern
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-11-21 14:21:49 +01:00
Alessandro Ghedini
fc47ad3b7f
Add no-asm builds to Travis
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-11-21 14:21:28 +01:00
Alessandro Ghedini
3003e0a422
Fix (minor) problems found by ubsan
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-11-21 14:21:04 +01:00
Alessandro Ghedini
c880b3e314
Add Travis builds with undefined behavior sanitizer
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-11-21 14:19:40 +01:00
Dr. Stephen Henson
043b93d732
add -pthread to debug-steve*
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-11-21 12:44:39 +00:00
Viktor Dukhovni
5c649375dd
Good hygiene with size_t output argument.
...
Though the callers check the function return value and ignore the
size_t output argument on failure, it is still often not ideal to
store (-1) in size_t on error. That might signal an unduly large
buffer. Instead set the size_t to 0, to indicate no space.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-11-21 05:27:35 -05:00
Matt Caswell
22a34c2fab
Implement windows async thread local variable support
...
Implements Thread Local Storage in the windows async port. This also has
some knock on effects to the posix and null implementations.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:40:23 +00:00
Matt Caswell
68487a9b06
Convert __thread to pthreads for Thread Local Storage
...
In theory the pthreads approach for Thread Local Storage should be more
portable.
This also changes some APIs in order to accommodate this change. In
particular ASYNC_init_pool is renamed ASYNC_init_thread and
ASYNC_free_pool is renamed ASYNC_cleanup_thread. Also introduced ASYNC_init
and ASYNC_cleanup.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:39:30 +00:00
Matt Caswell
27949c353e
Simplify async pool handling
...
A lot of the pool handling code was in the arch specific files, but was
actually boiler plate and the same across the implementations. This commit
moves as much code as possible out of the arch specific files.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:37:17 +00:00
Matt Caswell
2b2c78d4f0
Swap to using proper windows pipes
...
We were using _pipe to create a pipe on windows. This uses the "int" type
for its file descriptor for compatibility. However most windows functions
expect to use a "HANDLE". Probably we could get away with just casting but
it seems more robust to use the proper type and main stream windows
functions.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:37:17 +00:00
Matt Caswell
e38565f536
Fix some style issues
...
There were a number of places where the async code did not conform to the
OpenSSL coding style.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:37:17 +00:00
Matt Caswell
625146d9fb
Fix async deadlock problem
...
The rand code can aquire locks and then attempt crypto operations. This
can end up in a deadlock if we are using an async engine, because control
returns back to the user code whilst still holding the lock. We need to
force synchronous operation for these sections of code.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:37:17 +00:00
Matt Caswell
e8dfb5bf8e
Add ASYNC_block_pause and ASYNC_unblock_pause
...
There are potential deadlock situations that can occur if code executing
within the context of a job aquires a lock, and then pauses the job. This
adds an ability to temporarily block pauses from occuring whilst performing
work and holding a lock.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:37:17 +00:00
Matt Caswell
f4511d4897
Remove ASYNC NOEXIST functions from libeay.num
...
During development some functions got added and then later taken away.
Since these will never appear in a production version there is no reason
for them to appear in libeay.num flagged as "NOEXIST".
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:36:29 +00:00
Matt Caswell
03dc77e07b
Further OS-X deprecated warnings tweak
...
Even with _XOPEN_SOURCE defined OS-X still displays warnings that
makecontext and friends are deprecated. This isn't a problem until you
try and build with --strict-warnings, and the build fails. This change
suppresses the warnings. We know they are deprecated but there is no
alternative!
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:35:19 +00:00
Matt Caswell
90fa7296c2
Fix bug in async_fibre_makecontext for POSIX
...
async_fibre_makecontext was initialise the fibre first and then calling
getcontext(). It should be the other way around because the getcontext
call may overwrite some of the things we just initialised. This didn't
cause an issue on Linux and so the problem went unnoticed. On OS-X it
causes a crash.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:35:19 +00:00
Matt Caswell
7fecbf6f21
Rename start_async_job to ssl_start_async_job
...
Make it clear that this function is ssl specific.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:35:19 +00:00
Matt Caswell
46a283c01c
Rename some daysnc functions for consistency
...
For some reason the dasync sha1 functions did not start with the
dasync prefix like all of the other functions do. Changed for
consistency.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:35:19 +00:00
Matt Caswell
8227255006
Add clarification to docs on ASYNC_free_pool()
...
Clarify that you must only call this after all async jobs have
completed - otherwise you could get memory leaks.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:35:19 +00:00
Matt Caswell
000cc411b9
Fix compilation error on OS-X
...
OS-X complains if we don't have _XOPEN_SOURCE defined.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:35:19 +00:00
Matt Caswell
d7e404c27b
Fix clang errors
...
Make clang build without errors in the async code
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:35:19 +00:00
Matt Caswell
06b9ff06cc
Swap to using _longjmp/_setjmp instead of longjmp/setjmp
...
_longjmp/_setjmp do not manipulate the signal mask whilst
longjmp/setjmp may do. Online sources suggest this could result
in a significant speed up in the context switching.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:35:19 +00:00
Matt Caswell
4abc76811a
Fix Linux crash
...
If config'd without -d (--debug), asynctest was crashing with:
*** longjmp causes uninitialized stack frame ***
This is because gcc will add certain checks for some functions
(including longjmp). The checks assume you can only longjmp down the
stack not up. However, if we are actually jumping to a different
fibre then it can appear as if we are going up the stack when we are
not really. This change disables the check.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:35:19 +00:00
Matt Caswell
05a6347fec
Tweak async documentation based on feedback
...
Add some clarifications to the async documentation. Also changed
ASYNC_pause_job() so that it returns success if you are not within the
context of a job. This is so that engines can be used either asynchronously
or synchronously and can treat an error from ASYNC_pause_job() as a real
error.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:35:19 +00:00
Matt Caswell
add2f5ca6d
Clean up libssl async calls
...
Tidy up the libssl async calls and make sure all IO functions are covered.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:35:19 +00:00
Matt Caswell
c742f56e94
make update
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:35:19 +00:00
Matt Caswell
079a1a9014
Add ASYNC error codes
...
Add ASYNCerr support to give some meaningful error message in the event of
a failure.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:34:35 +00:00
Matt Caswell
9c8dc051d0
Update CHANGES
...
Add a CHANGES entry for the new async code.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:34:35 +00:00
Matt Caswell
e1b9840ed7
Add s_client support for waiting for async
...
s_server already had the ability to wait on an async file descriptor. This
adds it to s_client too.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:34:35 +00:00
Matt Caswell
9920a58eb2
Fix the error code for SSL_get_async_wait_fd()
...
0 is a valid file descriptor so SSL_get_async_wait_fd should instead return
-1 on error.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:34:35 +00:00
Matt Caswell
bc8857bf70
More async documentation
...
Document the libssl and command line application aspects of async.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:34:35 +00:00
Matt Caswell
636ca4ff64
Normalise ASYNC naming
...
Tidied up the naming of functions and structures to be consistent
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:34:35 +00:00
Matt Caswell
134b28f883
Fix windows compilation warnings
...
Fix some warnings in the async code when compiling on windows.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:34:35 +00:00
Matt Caswell
9f078e1961
Optimise ASYNC_CTX handling
...
Don't recreate a new ASYNC_CTX every time we call ASYNC_start_job() - the
same one can be used for the life of the thread. Instead we only free it
up when we call ASYNC_free_pool().
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:34:35 +00:00
Matt Caswell
7240557b7d
Fix ASYNC null implementation
...
The ASYNC null implementation has not kept pace with the rest of the async
development and so was failing to compile.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:34:35 +00:00
Matt Caswell
5705e05037
Add ASYNC tests
...
Add a suite of tests for the ASYNC_* functions
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:34:35 +00:00
Matt Caswell
44a27ac282
Remove ASYNC_in_job()
...
The ASYNC_in_job() function is redundant. The same effect can be achieved by
using ASYNC_get_current_job().
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:34:34 +00:00
Matt Caswell
c00793da99
Document async capabilities
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:34:34 +00:00
Matt Caswell
4f70d04593
make update
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:34:34 +00:00
Matt Caswell
d63de0ebff
Implement windows async pool and notify support
...
Port the async pool and notify code to windows.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:33:46 +00:00
Matt Caswell
5e6f9775a9
Fix pools for s_client
...
s_client was not freeing up the async pool if async mode was enabled.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:33:46 +00:00
Matt Caswell
64c07bd2d8
Fix s_server bug
...
If an async event occurs during a renegotiation in SSL_read then s_server
was looping around, detecting we were in init and calling
init_ssl_connection instead of re-calling SSL_read.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:33:46 +00:00
Matt Caswell
0ff2b9ac0b
Implement local thread pools
...
Implement the ASYNC_JOB as a local thread pool. Remove the API support
for global pools.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:33:46 +00:00
Matt Caswell
f4da39d200
Initial Async notify code changes
...
Initial API implemented for notifying applications that an ASYNC_JOB
has completed. Currently only s_server is using this. The Dummy Async
engine "cheats" in that it notifies that it has completed *before* it
pauses the job. A normal async engine would not do that.
Only the posix version of this has been implemented so far, so it will
probably fail to compile on Windows at the moment.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:33:46 +00:00
Matt Caswell
252d6d3aa6
Add ASYNC_JOB pools
...
It is expensive to create the ASYNC_JOB objects due to the "makecontext"
call. This change adds support for pools of ASYNC_JOB objects so that we
don't have to create a new ASYNC_JOB every time we want to use one.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:33:46 +00:00
Matt Caswell
7070e5ca2f
Use longjmp at setjmp where possible
...
Where we can we should use longjmp and setjmp in preference to swapcontext/
setcontext as they seem to be more performant.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:33:05 +00:00
Matt Caswell
4cfa6204e8
Fix s_server -WWW with -async
...
The s_server option -WWW was not async aware, and therefore was not
handling SSL_ERROR_WANT_ASYNC conditions. This commit fixes that.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:32:18 +00:00
Matt Caswell
826760945d
Async clean ups
...
Removed the function ASYNC_job_is_waiting() as it was redundant. The only
time user code has a handle on a job is when one is waiting, so all they
need to do is check whether the job is NULL. Also did some cleanups to
make sure the job really is NULL after it has been freed!
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:32:18 +00:00
Matt Caswell
06754949e4
Increase stack size
...
Some assembler code puts a lot of stuff on the stack, so up the stack size.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:32:18 +00:00
Matt Caswell
9ec1e03194
Add null async implementation
...
Create a "null" async implementation for platforms that lack support. This
just does nothing when called and therefore performs synchronously.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:32:18 +00:00
Matt Caswell
5010830495
Async port to windows
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:32:18 +00:00
Matt Caswell
38148a234c
Various windows build fixes to prepare for windows port
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:31:42 +00:00
Matt Caswell
7e25dd6da1
Add s_server and s_client async support
...
A new -async option is added which activates SSL_MODE_ASYNC. Also
SSL_WANT_ASYNC errors are handled appropriately.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:31:42 +00:00
Matt Caswell
07bbc92ccb
Make libssl async aware
...
The following entry points have been made async aware:
SSL_accept
SSL_read
SSL_write
Also added is a new mode - SSL_MODE_ASYNC. Calling the above functions with
the async mode enabled will initiate a new async job. If an async pause is
encountered whilst executing the job (such as for example if using SHA1/RSA
with the Dummy Async engine), then the above functions return with
SSL_WANT_ASYNC. Calling the functions again (with exactly the same args
as per non-blocking IO), will resume the job where it left off.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:31:42 +00:00
Matt Caswell
a14e9ff713
Add the Dummy Async engine (dasync)
...
This engine is for developers of async aware applications. It simulates
asynchronous activity with external hardware. This initial version supports
SHA1 and RSA. Certain operations using those algorithms have async job
"pauses" in them - using the new libcrypto async capability.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:31:42 +00:00
Matt Caswell
a3667c316a
Add async sub-library to libcrypto
...
Provides support for running asynchronous jobs. Currently this is completely
stand alone. Future commits will integrate this into libssl and s_server/
s_client. An asynchronous capable engine will be required to see any benefit
from this capability.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:31:04 +00:00
Matt Caswell
757d14905e
Add pthread support
...
The forthcoming async code needs to use pthread thread local variables. This
updates the various Configurations to add the necessary flags. In many cases
this is an educated guess as I don't have access to most of these
environments! There is likely to be some tweaking needed.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-11-20 23:19:16 +00:00
Matt Caswell
ba4f1331e3
Fix uninitialised variable
...
The al variable could be uninitialised in an error path.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-20 23:15:53 +00:00
Kurt Roeckx
32c748140f
BN_sub: document that r might be the same as a or b
...
Reviewed-by: Rich Salz <rsalz@akamai.com >
RT #4100 , MR #1264
2015-11-20 22:29:57 +01:00
Pascal Cuoq
9f6795e7d2
BN_usub: Don't copy when r and a the same
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Rich Salz <rsalz@akamai.com >
RT #4100 , MR #1264
2015-11-20 22:29:53 +01:00
Dr. Stephen Henson
1786086b05
make update
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-11-20 16:52:20 +00:00
Matt Caswell
5f3d93e4a3
Ensure all EVP calls have their returns checked where appropriate
...
There are lots of calls to EVP functions from within libssl There were
various places where we should probably check the return value but don't.
This adds these checks.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-11-20 15:47:02 +00:00
Dr. Stephen Henson
2cc7acd273
Use better defaults for TSA.
...
Use SHA256 for TSA and setted permitted digests to a sensible value.
Based on PR#4141
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-11-20 13:40:53 +00:00
Dr. Stephen Henson
e20b472751
Add support for signer_digest option in TS.
...
Based on PR#2145
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-11-20 13:40:53 +00:00
Dr. Stephen Henson
fa49924659
Make GOST ciphersuites require TLSv1
...
PR#4141
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
2015-11-19 14:35:39 +00:00
Andy Polyakov
ce24d2ed23
aes/asm/vpaes-ppc.pl: eliminate overhung stores in misaligned cases.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-11-18 11:56:21 +01:00
Andy Polyakov
0ee05b736a
e_os.h: bump minimal _WIN32_WINNT.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-11-18 11:50:40 +01:00
Rich Salz
bf1605518a
Rename RSA_eay_xxx to rsa_ossl_xxx
...
Final part of flushing out SSLEay API's.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-11-17 17:14:28 -05:00
Richard Levitte
a22c01244b
make update
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-11-17 15:17:36 +01:00
Matt Caswell
9ae720b4dc
Check error return from sysconf in secure memory code
...
We use the sysconf function to provide details about the page size in the
secure memory code. This function can return -1 on error so we should check
for this before proceeding.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-11-17 11:23:51 +00:00
Matt Caswell
ae4d0c8d22
Add comment explaining why we don't check a return value
...
A call to X509_verify_cert() is used to build a chain of certs for the
server to send back to the client. It isn't *actually* used for verifying
the cert at all - just building the chain. Therefore the return value is
ignored.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-11-17 11:21:17 +00:00
Matt Caswell
d73ca3efa7
Remove an NULL ptr deref in an error path
...
The |passwd| variable in the code can be NULL if it goes to the err label.
Therefore we cannot call strlen on it without first checking that it is non
NULL.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-11-17 11:17:37 +00:00
Andy Polyakov
e4693b4e2a
bn/asm/ppc64-mont.pl: adapt for little-endian.
...
The problem remained unnoticed so far, because it's never called by default.
You have to craft OPENSSL_ppccap environment variable to trigger the problem.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-11-16 13:40:41 +01:00
Andy Polyakov
27186da715
crypto/sec_mem.c: fix anonymous mmap on legacy systems.
...
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-11-16 13:15:00 +01:00
Andy Polyakov
9d0e4dc635
bn/asm/s390x.S: improve performance on z196 and z13 by up to 26%. [even z10 is couple percent faster]. Triggered by RT#4128, but solves the problem by real modulo-scheduling.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-16 13:10:45 +01:00
Andy Polyakov
a5fd24d19b
aesni-sha256-x86_64.pl: fix crash on AMD Jaguar.
...
It was also found that stich performs suboptimally on AMD Jaguar, hence
execution is limited to XOP-capable and Intel processors.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-11-16 13:06:10 +01:00
Viktor Dukhovni
39e46af6bb
Explicit OpenSSL_version_num() implementation prototype
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-11-15 00:02:57 -05:00
Dr. Stephen Henson
ff7fbfd550
Document new functions
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-11-14 00:13:08 +00:00
Dr. Stephen Henson
699f163524
Use accessors for X509_print_ex().
...
Print certificate details using accessor functions.
Since X509_CERT_AUX_print is only used in one place and can't
be used by applications (it uses an internal X509_CERT_AUX structure)
this has been removed and replaced by a function X509_aux_print which
takes an X509 pointer instead.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-11-14 00:13:08 +00:00
Dr. Stephen Henson
748118a838
Add new X509 accessors
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-11-14 00:13:08 +00:00
Dr. Stephen Henson
bf24ac9b54
Update and clarify ciphers documentation.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-11-14 00:06:33 +00:00
Dr. Stephen Henson
9650919915
add -psk option to ciphers command
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-11-14 00:06:33 +00:00
Dr. Stephen Henson
2a802c8029
add -tls1_2,-tls1_1 options to ciphers command
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-11-14 00:06:33 +00:00
Dr. Stephen Henson
60a25abdab
Add "TLSv1.0" cipher alias.
...
This adds a TLSv1.0 cipher alias for ciphersuites requiring
at least TLSv1.0: currently only PSK ciphersuites using SHA256
or SHA384 MAC (SSLv3 only supports SHA1 and MD5 MAC).
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-11-14 00:06:33 +00:00
Dr. Stephen Henson
2b573382f8
Don't alow TLS v1.0 ciphersuites for SSLv3
...
This disables some ciphersuites which aren't supported in SSL v3:
specifically PSK ciphersuites which use SHA256 or SHA384 for the MAC.
Thanks to the Open Crypto Audit Project for identifying this issue.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-11-14 00:06:32 +00:00
Dr. Stephen Henson
5e3d21fef1
Use SSL_TLSV1 only if at least TLS v1.0 is needed.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-11-14 00:06:32 +00:00
Nathan Phillip Brink
cfb4f1efba
RT2667: Add IRC support to -starttls
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-11-13 17:17:18 -05:00
Graeme Perrow
0704343f13
RT32671: wrong multiple errs TS_check_status_info
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
Signed-off-by: Rich Salz <rsalz@openssl.org >
2015-11-13 16:36:43 -05:00
Dr. Stephen Henson
558ceae7e8
absent identity hint should be NULL
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-11-13 16:00:29 +00:00
Andy Polyakov
fbab8badde
modes/asm/ghash-armv4.pl: extend Apple fix to all clang cases.
...
Triggered by RT#3989.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-11-11 22:09:18 +01:00
Matt Caswell
a974e64aaa
Fix SSL_use_certificate_chain_file
...
The new function SSL_use_certificate_chain_file was always crashing in
the internal function use_certificate_chain_file because it would pass a
NULL value for SSL_CTX *, but use_certificate_chain_file would
unconditionally try to dereference it.
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-11-10 23:02:44 +00:00
Matt Caswell
6329b6092b
Remove redundant check from tls1_get_curvelist
...
The function tls1_get_curvelist() has an explicit check to see if s->cert
is NULL or not. However the check appears *after* calling the tls1_suiteb
macro which derefs s->cert. In reality s->cert can never be NULL because
it is created in SSL_new(). If the malloc fails then the SSL_new call fails
and no SSL object is created.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-11-09 23:07:57 +00:00
Matt Caswell
55646005a9
Continue malloc standardisation in engines
...
Continuing from previous work standardise use of malloc in the engine code.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-11-09 22:48:41 +00:00
Matt Caswell
96487cddd4
Continue standardisation of malloc handling in apps
...
continue on from previous commits but in the apps directory
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-11-09 22:48:41 +00:00
Matt Caswell
90945fa31a
Continue standardising malloc style for libcrypto
...
Continuing from previous commit ensure our style is consistent for malloc
return checks.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-11-09 22:48:41 +00:00
Matt Caswell
a71edf3ba2
Standardise our style for checking malloc failures
...
if we have a malloc |x = OPENSSL_malloc(...)| sometimes we check |x|
for NULL and sometimes we treat it as a boolean |if(!x) ...|. Standardise
the approach in libssl.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-11-09 22:48:41 +00:00
Matt Caswell
3457e7a087
Remove redundant check from SSL_shutdown
...
The SSL object was being deref'd and then there was a later redundant check
to see if it is NULL. We assume all SSL_foo functions pass a non NULL SSL
object and do not check it.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-11-09 15:36:19 +00:00
Richard Levitte
6703c4ea87
Make the match for previous cflags a bit more strict
...
./Configure [target] --strict-warnings -Wno-pedantic-ms-format
would not add '-pedantic' because it matches '-Wno-pedantic-ms-format',
which was added first.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-11-09 09:50:56 +01:00
Dr. Stephen Henson
36e79832d3
Replace L suffix with U
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-11-08 14:03:50 +00:00
Dr. Stephen Henson
90d9e49a4b
Use uint32_t and int32_t for SSL_CIPHER structure.
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-11-08 14:03:50 +00:00
Matt Caswell
d99b0691d3
Fix compilation problems with SCTP
...
The SCTP code is not compiled by default. This fixes some compilation
problems in that code.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-11-06 15:40:31 +00:00
Matt Caswell
8d16c58fa4
Remove some redundant assignments
...
We were setting |s->renegotiate| and |s->new_session| to 0 twice in
tls_finish_handshake. This is redundant so now we just do it once!
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
2015-11-06 15:32:44 +00:00
Matt Caswell
e657515620
Don't finish the handshake twice
...
We finish the handshake when we move into the TLS_ST_OK state. At various
points we were also unnecessarily finishing it when we were reading/writing
the Finished message. It's much simpler just to do it in TLS_ST_OK, so
remove the other calls.
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
2015-11-06 15:32:44 +00:00
Dr. Stephen Henson
b8fb59897b
Rebuild error source files.
...
Rebuild error source files: the new mkerr.pl functionality will now
pick up and translate static function names properly.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-11-05 15:48:37 +00:00
Dr. Stephen Henson
525cc5e777
fix discrepancy
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-11-05 15:48:37 +00:00
Dr. Stephen Henson
f4c38857d7
Read function names from C source files.
...
In mkerr.pl read parse functions names in C source files and use
them for translation and sanity checks.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-11-05 15:48:37 +00:00
Matt Caswell
cf0113eb47
Ensure the dtls1_get_*_methods work with DTLS_ANY_VERSION
...
The various dtls1_get*_methods did not handle the DTLS_ANY_VERSION case,
so this needed to be added.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-11-05 15:05:58 +00:00
Matt Caswell
3d866ea67e
Minor EVP_SignInit_ex doc fix
...
EVP_SignInit_ex was missing from the NAME section of its man page so
typing "man EVP_SignInit_ex" failed to load the page.
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-11-04 14:37:13 +00:00
Richard Levitte
2c9be7d09f
Fix usage of BIO_ctrl_set_connected
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-02 21:18:34 +01:00
Richard Levitte
009e9d99a3
Remove the state parameter from BIO_ctrl_set_connected
...
The actual implementation has the state of the connection being
controlled with the peer parameter, non-NULL meaning connected and
NULL meaning connected.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-11-02 17:36:49 +01:00
Richard Levitte
2443030466
BIO_s_datagram() ctrl doesn't support SEEK/TELL, so don't pretend it does
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-11-02 17:36:49 +01:00
Richard Levitte
f564acdaf5
Correct or add comments indicating what controls belong to what
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-11-02 17:36:49 +01:00
Richard Levitte
7281cbaaa7
Remove PROXY controls that aren't used anywhere
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-11-02 17:36:49 +01:00
Richard Levitte
8976eb249a
Remove dummy argument from BIO_get_bind_mode
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-11-02 17:36:49 +01:00
Richard Levitte
0e474b8b6f
Document how BIO_get_conn_ip and BIO_get_conn_int_port actually work
...
No dummy arguments.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-11-02 17:36:49 +01:00
Richard Levitte
4b72d5f80c
Have BIO_get_conn_int_port use BIO_ctrl instead BIO_int_ctrl
...
BIO_int_ctrl isn't made for the purpose BIO_get_conn_int_port used it
for.
This also changes BIO_C_GET_CONNECT to actually return the port
instead of assigning it to a pointer that was never returned back to
the caller.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-11-02 17:36:49 +01:00
Matt Caswell
f89ee71bc8
Clarify the preferred way of creating patch files
...
Clarify that git format-patch output is preferred for creating patch files.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-11-02 14:32:16 +00:00
Matt Caswell
1c2e5d560d
Remove a reachable assert from ssl3_write_bytes
...
A buggy application that call SSL_write with a different length after a
NBIO event could cause an OPENSSL_assert to be reached. The assert is not
actually necessary because there was an explicit check a little further
down that would catch this scenario. Therefore remove the assert an move
the check a little higher up.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-02 14:29:37 +00:00
Matt Caswell
6929b4477b
Remove an OPENSSL_assert which could fail
...
An OPENSSL_assert was being used which could fail (e.g. on a malloc
failure).
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-02 14:29:37 +00:00
Matt Caswell
267b7789f8
Remove a trivially true OPENSSL_assert
...
This OPENSSL_assert in (d)tls1_hearbeat is trivially always going to be
true because it is testing the sum of values that have been set as
constants just a few lines above and nothing has changed them. Therefore
remove this.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-11-02 14:29:37 +00:00
Soheil Rashidi
9f07c405bb
Fixed typo in rsautl.pod
...
Signed-off-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-11-02 01:57:22 -05:00
Rich Salz
a2aaf8be7e
PR1279: Clean up CONTRIBUTING
...
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-11-01 08:34:13 -05:00
Rich Salz
b06935f439
Various README updates
...
Close GH Issue 69
Close GH PR 457
Some other updates
By Rich Salz, Alessandro Ghedini, Steve Marquess, Collin Anderson
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-11-01 08:15:04 -05:00
Rich Salz
b92fafcc2f
Remove des_ver.h; broke build.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-11-01 08:09:57 -05:00
Rich Salz
b0700d2c8d
Replace "SSLeay" in API with OpenSSL
...
All instances of SSLeay (any combination of case) were replaced with
the case-equivalent OpenSSL.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 17:21:42 -04:00
Matt Caswell
87d9cafa33
Remove some SSLv2 references
...
There were a few remaining references to SSLv2 support which are no longer
relevant now that it has been removed.
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 09:17:22 +00:00
Matt Caswell
b7fa1f989d
Add SRP and PSK to disallowed CertificateRequest ciphersuites
...
There was a discrepancy between what ciphersuites we allowed to send a
CertificateRequest, and what ciphersuites we allowed to receive one. So
add PSK and SRP to the disallowed ones.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:39:47 +00:00
Matt Caswell
bb3e20cf8c
Remove the inline keyword
...
Some functions were marked as inline in statem_srvr.c where they probably
didn't need to be, so remove it.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:39:47 +00:00
Matt Caswell
956de7b287
Remove superfluous check
...
|tls_process_finished| was checking that |peer_finish_md_len| was
non-negative. However neither |tls1_final_finish_mac| or
|ssl3_final_finish_mac| can ever return a negative value, so the check is
superfluous.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:39:47 +00:00
Matt Caswell
fed1767436
Change SSL_state_string return strings to start with a T
...
Due the rest of the state machine changes it makes sense to change the
SSL_state_string return strings from 3* to T*. They are not SSL3 specific
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:39:47 +00:00
Matt Caswell
141eb8c679
Change snprintf to memcpy
...
There was a few uses of snprintf in the DTLS SCTP code which made more
sense to be a memcpy.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:39:47 +00:00
Matt Caswell
8481f583d3
Add ossl_statem prefix to various functions
...
Add the ossl_statem prefix to various funtions to avoid name clashes.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:39:47 +00:00
Matt Caswell
be3583fa40
Convert enums to typedefs
...
Various enums were introduced as part of the state machine rewrite. As a
matter of style it is preferred for these to be typedefs.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:39:47 +00:00
Matt Caswell
3616bb6358
Make dtls1_link_min_mtu static
...
The function dtls1_link_min_mtu() was only used within d1_lib.c so make
it static.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:39:47 +00:00
Matt Caswell
006207d1bc
Fix a bogus clang warning
...
Clang with --strict-warnings was complaining about an uninitalised
variable. In reality it will never be used uninitialised but clang can't
figure out the logic, so just init it anyway to silence the warning.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:39:47 +00:00
Matt Caswell
c9de4a20fa
Fix empty NewSessionTicket processing
...
Rebasing the state machine code introduced a problem with empty
NewSessionTicket processing. The return value from the
tls_process_new_session_ticket() is supposed to be an enum, but a bare
integer was being used. Unfortunately this is valid C so the compiler
doesn't pick it up.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:39:47 +00:00
Matt Caswell
d13dd4beb4
Fix uninitialised variable
...
Fix another instance of |al| being unitialised in certain error scenarios.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:39:47 +00:00
Matt Caswell
9b67c0d810
make update
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:39:47 +00:00
Matt Caswell
f0659bdb00
Fix various error codes
...
A number of error codes were wrong due to a rebase of the state machine
code.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:39:47 +00:00
Matt Caswell
024f543c15
Move in_handshake into STATEM
...
The SSL variable |in_handshake| seems misplaced. It would be better to have
it in the STATEM structure.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:39:47 +00:00
Matt Caswell
20dbe58577
Fix unitialised variable problem
...
tls_process_client_hello() failed to initialise the |al| variable in some
(error) scenarios. This could cause issues with creating the alert.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:39:47 +00:00
Matt Caswell
31fd10e60d
Fix DTLSv1_listen following state machine changes
...
Adding the new state machine broke the DTLSv1_listen code because
calling SSL_in_before() was erroneously returning true after DTLSv1_listen
had successfully completed. This change ensures that SSL_in_before returns
false.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:39:47 +00:00
Matt Caswell
91eac8d567
Add a function to get the info_callback
...
Remove repeated blocks of checking SSL and then SSL_CTX for the
info_callback.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:39:47 +00:00
Matt Caswell
f3ae986218
Remove the old state defines
...
Remove all the defines for the old state machines states. Mapping old to new
is probably going to cause more problems than it solves so it is probably
better to just remove them.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:39:47 +00:00
Matt Caswell
d78052cf4f
Change SUB_STATE_RETURN into a typedef
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:39:46 +00:00
Matt Caswell
d6f1a6e931
Rename STATEM to OSSL_STATEM
...
Add an OSSL_ prefix onto STATEM
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:39:46 +00:00
Matt Caswell
5998e29035
Remove SSL_state and SSL_set_state
...
SSL_state has been replaced by SSL_get_state and SSL_set_state is no longer
supported.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:39:46 +00:00
Matt Caswell
a71a4966a3
Move |no_cert_verify| into state machine
...
The |no_cert_verify| should be in the state machine structure not in SSL
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:39:46 +00:00
Matt Caswell
c874def60a
Remove extraneous parens
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:39:46 +00:00
Matt Caswell
fe3a329117
Change statem prefix to ossl_statem
...
Change various state machine functions to use the prefix ossl_statem
instead.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:39:46 +00:00
Matt Caswell
7c8b535716
Don't depend on SSL structure internals
...
The macros SSL_in_connect_init() and SSL_in_accept_init() inadvertently
depended on SSL structure internals. This fixes it to use public API calls
instead.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:39:46 +00:00
Matt Caswell
35bf6e0537
Change HANDSHAKE_STATE to OSSL_HANDSHAKE_STATE
...
Rename the enum HANDSHAKE_STATE to OSSL_HANDSHAKE_STATE to ensure there are
no namespace clashes, and convert it into a typedef.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:39:46 +00:00
Matt Caswell
a455d0f6ff
Fix some client side transition logic
...
Fixed some issues in the logic for determining whether an SKE should be
expected or not. In particular only allow an SKE for RSA if its export and
the key size is not allowed. Also fix the ephemeral ciphersuite checks and
add in a missing call to ssl3_check_cert_and_algorithm().
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:39:46 +00:00
Matt Caswell
f3b9257f82
Minor documentation tweak
...
Update the return type for SSL_state in the documentation.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:39:46 +00:00
Matt Caswell
264ab6b1cd
Update CHANGES
...
Update the CHANGES file for the state machine rewrite
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:39:46 +00:00
Matt Caswell
075c879585
Remove a call to SSL_set_state from s_server
...
s_server was (ab)using SSL_set_state to force a renegotiation. This is a
bad way to do things and does not work with the new state machine code, so
we need to do it a different way.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:38:18 +00:00
Matt Caswell
e0a51488c3
Fix a comment
...
Fix an out of date reference to old state machine code in a comment
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:38:18 +00:00
Matt Caswell
9d671ad1cf
Remove some unused variables
...
The next_state variable is no longer needed in the new state machine.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:38:18 +00:00
Matt Caswell
f0de395950
Add a state machine README
...
Add some documentation on the thinking behind the state machine.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:38:18 +00:00
Matt Caswell
82c1aa93c9
make update
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:38:18 +00:00
Matt Caswell
61ae935a98
More state machine reorg
...
Move some function definitions around within the state machine to make sure
they are in the correct files. Also create a statem_locl.h header for stuff
entirely local to the state machine code and move various definitions into
it.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:38:18 +00:00
Matt Caswell
8ba708e516
Reorganise state machine files
...
Pull out the state machine into a separate sub directory. Also moved some
functions which were nothing to do with the state machine but were in state
machine files. Pulled all the SSL_METHOD definitions into one place...most
of those files had very little left in them any more.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:38:18 +00:00
Matt Caswell
1aeaa7ec06
Remove ssl_get_message from ssl_method_st
...
ssl_get_message is no longer used so it should be removed from
ssl_method_st
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:38:18 +00:00
Matt Caswell
73999b62a2
Move PACKET creation into the state machine
...
Previously each message specific process function would create its own
PACKET structure. Rather than duplicate all of this code lots of times we
should create it in the state machine itself.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:38:18 +00:00
Matt Caswell
0131df49ee
Remove the SSL state variable
...
The SSL structure contained a "state" variable that kept track of the state
machine in the old code. The new state machine does not use this so it can
be removed.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:38:18 +00:00
Matt Caswell
23a635c0ec
Remove the type variable
...
The SSL structure contained a "type" variable that was set to either
SSL_ST_ACCEPT or SSL_ST_CONNECT depending on whether we are the server or
the client. This duplicates the capability of the "server" variable and was
actually rarely used.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:38:18 +00:00
Matt Caswell
5e41ba031e
Convert DTLSv1_listen to use new state machine code
...
The DTLSv1_listen code set the state value explicitly to move into init.
Change to use state_set_in_init() instead.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:38:18 +00:00
Matt Caswell
c64359db8a
Redefine old state values
...
ssl.h and ssl3.h have a number of defines for the various states in the old
state machine code. Since this is public API it is not desirable to just
remove them. Instead redefine them to the closest equivalent state in the
new state machine code. If an application calls SSL_state then the return
value can still be compared against these old values if necessary. However
not all values have an equivalent state in the new code, so these are just
redefined to a dummy value.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:38:18 +00:00
Matt Caswell
49ae742398
Remove redundant code
...
Clean up and remove lots of code that is now no longer needed due to the
move to the new state machine.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:38:18 +00:00
Matt Caswell
c130dd8ea4
Move server side DTLS to new state machine
...
Implement all of the necessary changes to make DTLS on the server work
with the new state machine code.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:38:18 +00:00
Matt Caswell
94836de2ae
Move server side TLS to new state machine
...
Implement all of the necessary changes for moving TLS server side
processing into the new state machine code.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:38:18 +00:00
Matt Caswell
e27f234a41
Split TLS server functions
...
Split the TLS server ssl3_get_* and ssl3_send_* functions into two ready
for the migration to the new state machine code.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:38:18 +00:00
Matt Caswell
4e3458a565
Delete unused functions
...
Remove all the functions and dead code that is now no longer required as
a result of the DTLS client move into the new state machine code.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:32:44 +00:00
Matt Caswell
473483d42d
Implement DTLS client move to new state machine
...
Move all DTLS client side processing into the new state machine code. A
subsequent commit will clean up the old dead code.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:32:44 +00:00
Matt Caswell
76af303761
dtls_get_message changes for state machine move
...
Create a dtls_get_message function similar to the old dtls1_get_message but
in the format required for the new state machine code. The old function will
eventually be deleted in later commits.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:32:44 +00:00
Matt Caswell
f6a2f2da58
Client TLS state machine rewrite cleanup
...
Remove redundant code following moving client side TLS handling to the new
state machine implementation.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:32:44 +00:00
Matt Caswell
8723588e1b
Implement Client TLS state machine
...
This swaps the implementation of the client TLS state machine to use the
new state machine code instead.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:32:44 +00:00
Matt Caswell
b9908bf9b8
Split client message reading and writing functions
...
The new state machine code will split up the reading and writing of
hanshake messages into discrete phases. In order to facilitate that the
existing "get" type functions will be split into two halves: one to get
the message and one to process it. The "send" type functions will also have
all work relating to constructing the message split out into a separate
function just for that. For some functions there will also be separate
pre and post "work" phases to prepare or update state.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:32:44 +00:00
Matt Caswell
f8e0a55738
Add initial state machine rewrite code
...
This is the first drop of the new state machine code.
The rewrite has the following objectives:
- Remove duplication of state code between client and server
- Remove duplication of state code between TLS and DTLS
- Simplify transitions and bring the logic together in a single location
so that it is easier to validate
- Remove duplication of code between each of the message handling functions
- Receive a message first and then work out whether that is a valid
transition - not the other way around (the other way causes lots of issues
where we are expecting one type of message next but actually get something
else)
- Separate message flow state from handshake state (in order to better
understand each)
- message flow state = when to flush buffers; handling restarts in the
event of NBIO events; handling the common flow of steps for reading a
message and the common flow of steps for writing a message etc
- handshake state = what handshake message are we working on now
- Control complexity: only the state machine can change state: keep all
the state changes local to a file
This builds on previous state machine related work:
- Surface CCS processing in the state machine
- Version negotiation rewrite
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:27:59 +00:00
Matt Caswell
9ab930b27d
Split ssl3_get_message
...
The function ssl3_get_message gets a whole message from the underlying bio
and returns it to the state machine code. The new state machine code will
split this into two discrete steps: get the message header and get the
message body. This commit splits the existing function into these two
sub steps to facilitate the state machine implementation.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-30 08:27:59 +00:00
Pascal Cuoq
94b3664a52
BN_GF2m_mod_inv(): check bn_wexpand return value
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Rich Salz <rsalz@akamai.com >
MR #1276 , RT #4107
2015-10-29 20:34:24 +01:00
Rich Salz
a528d4f0a9
Remove SSLeay history, etc., from docs
...
If something was "present in all versions" of SSLeay, or if it was
added to a version of SSLeay (and therefore predates OpenSSL),
remove mention of it. Documentation history now starts with OpenSSL.
Remove mention of all history before OpenSSL 0.9.8, inclusive.
Remove all AUTHOR sections.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-10-28 17:23:51 -04:00
Rich Salz
6f5c030320
Remove HAMC_cleanup
...
Old API for use with OpenSSL-0.9.6. Remove it.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-10-27 16:07:56 -04:00
Rich Salz
0e56b4b424
Move crypto/threads to demo/threads
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-26 16:36:01 -04:00
Ben Laurie
d2c3d5d4fc
Probably fix travis (wine build).
...
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-10-25 17:23:57 +00:00
Ben Laurie
84cf97af06
Improve make depend.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-24 17:34:21 +01:00
Ben Laurie
2f1a5d1694
Fix undeclared variable warnings.
...
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-10-24 16:42:51 +01:00
Alessandro Ghedini
070c23325a
Remove useless code
...
RT#4081
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-23 19:52:08 +02:00
Alessandro Ghedini
8cf9d71a3a
Check memory allocation
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-23 19:52:08 +02:00
Alessandro Ghedini
3240e7cf5f
Fix references to various RFCs
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-23 19:52:08 +02:00
Alessandro Ghedini
d900a015b5
Fix typos
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-23 19:52:08 +02:00
Alessandro Ghedini
c2319cf9fc
Set salt length after the malloc has succeeded
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-23 19:52:08 +02:00
Alessandro Ghedini
3f6c769187
Fix memory leaks and other mistakes on errors
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-23 19:52:08 +02:00
Alessandro Ghedini
8acaabec42
Replace malloc+strlcpy with strdup
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-23 19:52:08 +02:00
Alessandro Ghedini
4428c7dba8
Do not treat 0 return value from BIO_get_fd() as error
...
0 is a valid file descriptor.
RT#4068
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-23 19:52:08 +02:00
Alessandro Ghedini
dad0b512e6
Remove bugs/ and crypto/threads/
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-23 18:41:04 +02:00
Adam Eijdenberg
8cbb048c3e
Clarify return values for EVP_DigestVerifyFinal.
...
Previous language was unclear. New language isn't pretty but I believe
it is more accurate.
Signed-off-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Ben Laurie <ben@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-22 18:27:48 -04:00
Richard Levitte
5212d39bd9
Only include SRP headers when OPENSSL_NO_SRP is undefined
...
[fixes github issue #447 ]
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-10-22 23:45:45 +02:00
Richard Levitte
489eb74090
Make Configure die when unsupported options are given
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-10-22 17:37:10 +02:00
Richard Levitte
8b527be2db
Add an explicit list of options that can be disabled, enabled, ...
...
Configure has, so far, had no control at all of which 'no-' options it
can be given. This means that, for example, someone could configure
with something absurd like 'no-stack' and then watch the build crumble
to dust... or file a bug report.
This introduces some sanity into the possible choices.
The added list comes from looking for the explicit ones used in
Configure, and from grepping after OPENSSL_NO_ in all source files.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-10-22 17:37:10 +02:00
Richard Levitte
15db6a40d3
make update
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-10-21 23:57:29 +02:00
Richard Levitte
a0e8da5d92
Don't forget to load the CT error strings
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-10-21 23:57:29 +02:00
Richard Levitte
cc79f06c0a
Handle CT error macros separately
...
Because the default error macro generator assumes the header file with
error macros is in include/openssl and therefore generates a C file
with error texts that include <openssl/{name}.h>, we need to generate
the error macros and texts for CT separately, since the CT module
doesn't follow the default criteria.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-10-21 23:57:29 +02:00
Matt Caswell
21cd6e006c
Don't use SSLv23_server_method in an example
...
The function SSLv23_server_method() is an old name. New code should use
TLS_server_method() instead. Therefore don't use SSLv23_server_method() in
an example in the docs.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-21 16:22:19 +01:00
Matt Caswell
3fde6c9276
Avoid undefined behaviour in PACKET_buf_init
...
Change the sanity check in PACKET_buf_init to check for excessive length
buffers, which should catch the interesting cases where len has been cast
from a negative value whilst avoiding any undefined behaviour.
RT#4094
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-21 16:13:53 +01:00
Richard Levitte
788d72ba02
ct_locl.h moved, reflect it in crypto/ct/Makefile
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-10-18 21:31:21 +02:00
Richard Levitte
338cb76220
make update
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-10-18 20:35:22 +02:00
Richard Levitte
d865cb13ba
Add crypto/include/internal to the directories to scan for stack declarations
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-10-18 20:35:22 +02:00
Richard Levitte
eb6d5f9983
Because ct_locl.h is used between modules, move it to internal headers
...
Rename it to ct_int.h
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-10-18 20:35:22 +02:00
Dr. Stephen Henson
76e0cd12f6
Move auto Host adding to query_responder
...
Check for Host header in query_responder instead of process_responder. This
also fixes a memory leak in the old code if the headers was NULL.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-18 14:36:21 +01:00
Dr. Stephen Henson
bb7fc98c43
Fix memory leak with -issuer option.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-18 14:36:21 +01:00
Dr. Stephen Henson
7f3e6f8c24
set string type when embedding
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-10-18 12:13:54 +01:00
Manish Goregaokar
eb05f17344
Move contributing info to CONTRIBUTING
...
Reviewed-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-17 18:28:03 +05:30
Rich Salz
1a3ae7883f
Run tests on Travis for mingw builds as well
...
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-10-16 11:20:22 -04:00
Dmitry Belyavsky
1f08d945a7
Fix error message when loading engines from config
...
When using command line applications errors occur when trying to
load engines specified in a config file. Introduced by commit
a0a82324f9
RT#4093
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-10-16 10:11:46 +01:00
Matt Caswell
8b7080b0b7
Remove Obsolete engines
...
There are a number of engines in the OpenSSL source code which are now
obsolete. The following engines have been removed: 4758cca, aep, atalla,
cswift, nuron, sureware.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-10-15 17:02:06 +01:00
Dr. Stephen Henson
f51e5ed6b4
Fix self signed handling.
...
Don't mark a certificate as self signed if keyUsage is present and
certificate signing not asserted.
PR#3979
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-10-15 15:36:58 +01:00
Dr. Stephen Henson
34a42e1489
embed CRL serial number and signature fields
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-10-15 15:36:58 +01:00
Dr. Stephen Henson
81e4943843
embed certificate serial number and signature fields
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-10-15 15:36:58 +01:00
Dr. Stephen Henson
4392479c08
embed value field of X509_EXTENSION
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-10-15 15:36:58 +01:00
Dr. Stephen Henson
272d917deb
add CHANGES entry for embed
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-10-15 15:36:58 +01:00
Dr. Stephen Henson
4002da0f52
Handle embed flag in ASN1_STRING_copy().
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-10-15 15:36:57 +01:00
Emilia Kasper
f4f78ff7da
PACKET: fix __owur
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-10-15 16:20:22 +02:00
Emilia Kasper
bbafa47b55
Appease gcc's Wmaybe-uninitialized
...
False positive: gcc (4.8) can't figure out the SSL_IS_DTLS logic.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-15 16:19:00 +02:00
Emilia Kasper
6f73d28c20
Remove EVP_CHECK_DES_KEY
...
Thanks to the OpenBSD community for bringing this to our attention.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-10-14 18:45:33 +02:00
Emilia Kasper
b84939cc96
ct_locl.h: fix some comments
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-10-14 17:19:35 +02:00
Emilia Kasper
58dd1ce91a
make depend: prefer clang over makedepend
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-10-14 17:10:20 +02:00
Dr. Stephen Henson
4ec36aff2a
RFC5753 compliance.
...
RFC5753 requires that we omit parameters for AES key wrap and set them
to NULL for 3DES wrap. OpenSSL decrypt uses the received algorithm
parameters so can transparently handle either form.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-10-13 22:57:47 +01:00
Alessandro Ghedini
6220acf887
Add Clang 3.6 and additional GCC 5 builds to travis
...
Follow-up to f386742 .
Signed-off-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-10-13 16:13:07 -04:00
Alessandro Ghedini
f386742cfb
GH429: Add clang to travis
...
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-10-13 14:04:53 -04:00
Andy Polyakov
2d2a83543f
testlib/OpenSSL/Test.pm: remove redundant 'cmd /c', MSWin32 Perl can take care of itself.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-13 19:48:28 +02:00
Andy Polyakov
82987e6119
Harmonize do_rehash_rule with updated test/recipies/25-test_verify.t.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-13 19:48:15 +02:00
Andy Polyakov
85833408b4
Test suite: chomp->s/\R// to harmonize with mingw 'make test'.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-13 19:48:03 +02:00
Andy Polyakov
4ada8be2a6
Test suite: minimal required to get mingw 'make test' work under Linux.
...
(part by Alessandro Ghedini)
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-13 19:46:50 +02:00
Matt Caswell
1dce6c3f9e
Rename -set-serial command to req
...
Previous OpenSSL versions used -set_serial, but master was using
-set-serial - so rename it back to the old version.
RT#4059
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-12 22:42:23 +01:00
Matt Caswell
a0a82324f9
Centralise loading default apps config file
...
Loading the config file after processing command line options can
cause problems, e.g. where an engine provides new ciphers/digests
these are not then recoginised on the command line. Move the
default config file loading to before the command line option
processing. Whilst we're doing this we might as well centralise
this instead of doing it individually for each application. Finally
if we do it before the OpenSSL_add_ssl_algorithms() call then
ciphersuites provided by an engine (e.g. GOST) can be available to
the apps.
RT#4085
RT#4086
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-12 22:31:00 +01:00
Matt Caswell
d175e8a6c2
Fix option name discrepancy
...
There used to be options -macopt and -sigopt in <=1.0.2 for the dgst
command line app. These were incorrectly spelled as -macop and -sigop in
master.
RT#4072
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-10-12 12:45:40 +01:00
Andy Polyakov
dc8980957b
Configurations: move -Wno-pedantic-ms-format to .travis.yml.
...
The option is not available in older toolchains and would cause breakage.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-12 12:07:29 +02:00
Dr. Stephen Henson
af170194a8
embed OCSP_CERTID
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-10-11 20:33:57 +01:00
Dr. Stephen Henson
47c9a1b509
embed support for ASN1_STRING
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-10-11 20:33:57 +01:00
Dr. Stephen Henson
a332635ea0
Embed various OCSP fields.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-10-11 20:33:57 +01:00
Dr. Stephen Henson
44c734e95c
embed support for CHOICE type
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-10-11 20:33:56 +01:00
Dr. Stephen Henson
71a64af331
Skip PSK tests for no-psk
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-10-11 13:38:01 +01:00
Dr. Stephen Henson
9076bd25bf
Make no-psk compile without warnings.
...
PR#4035
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-10-11 13:38:01 +01:00
Dr. Stephen Henson
c69ce93513
Typo.
...
PR#4079
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-10-11 00:06:56 +01:00
Emilia Kasper
3101154481
DTLS: remove unused cookie field
...
Note that this commit constifies a user callback parameter and therefore
will break compilation for applications using this callback. But unless
they are abusing write access to the buffer, the fix is trivial.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-10-09 15:32:35 +02:00
Matt Caswell
0f0cfbe24c
Fix Windows build
...
Add the new ct directory to mkfiles.pl and fix the ct Makefile
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-10-09 12:10:16 +01:00
Adam Eijdenberg
3149baf83c
Initial commit for Certificate Transparency support
...
Original authors:
Rob Stradling <rob@comodo.com >
Dr. Stephen Henson <steve@openssl.org >
Reviewed-by: Emilia Kasper <emilia@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-10-09 11:32:25 +02:00
Emilia Kasper
329428708d
PACKET: simplify ServerKeyExchange parsing
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-10-08 16:44:39 +02:00
Matt Caswell
28dc5d1963
Fix no-ripemd on Windows
...
mkdef.pl was getting confused by:
# ifdef OPENSSL_NO_RMD160
# error RIPEMD is disabled.
# endif
Changing RIPEMD to RMD160 solves it. Fix suggested by Steve Henson.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-10-08 15:31:08 +01:00
Matt Caswell
dffe51091f
Don't treat a bare OCTETSTRING as DigestInfo in int_rsa_verify
...
The function int_rsa_verify is an internal function used for verifying an
RSA signature. It takes an argument |dtype| which indicates the digest type
that was used. Dependant on that digest type the processing of the
signature data will vary. In particular if |dtype == NID_mdc2| and the
signature data is a bare OCTETSTRING then it is treated differently to the
default case where the signature data is treated as a DigestInfo (X509_SIG).
Due to a missing "else" keyword the logic actually correctly processes the
OCTETSTRING format signature first, and then attempts to continue and
process it as DigestInfo. This will invariably fail because we already know
that it is a bare OCTETSTRING.
This failure doesn't actualy make a real difference because it ends up at
the |err| label regardless and still returns a "success" result. This patch
just cleans things up to make it look a bit more sane.
RT#4076
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-08 13:50:41 +01:00
Richard Levitte
5850cc75ea
When ENGINE_add finds that id or name is missing, actually return
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-10-08 11:53:07 +02:00
Pascal Cuoq
8314146ac5
Don't check pointer we just freed, always set it to NULL.
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Rich Salz <rsalz@openssl.org >
MR #1231
2015-10-07 18:54:13 +02:00
Pascal Cuoq
c804d23d73
Move BN_CTX_start() call so the error case can always call BN_CTX_end().
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Rich Salz <rsalz@openssl.org >
MR #1231
2015-10-07 18:54:13 +02:00
Pascal Cuoq
99c2033375
Move BN_CTX_start() call so the error case can always call BN_CTX_end().
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Rich Salz <rsalz@openssl.org >
MR #1231
2015-10-07 18:54:13 +02:00
Pascal Cuoq
d6e92c0bd6
Properly check return type of DH_compute_key()
...
It returns -1 on error, not 0.
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Rich Salz <rsalz@openssl.org >
MR #1231
2015-10-07 18:54:12 +02:00
Pascal Cuoq
f92768e6f5
Set flags to 0 before calling BN_with_flags()
...
BN_with_flags() will read the dest->flags to keep the BN_FLG_MALLOCED but
overwrites everything else.
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Rich Salz <rsalz@openssl.org >
MR #1231
2015-10-07 18:54:12 +02:00
Matt Caswell
68a1662851
Don't advance PACKET in ssl_check_for_safari
...
The function ssl_check_for_safari fingerprints the incoming extensions
to see whether it is one of the broken versions of safari. However it was
failing to reset the PACKET back to the same position it started in, hence
causing some extensions to be skipped incorrectly.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-10-07 16:17:52 +01:00
Alessandro Ghedini
2d28462373
Fix travis builds on master
...
-Allow mingw debug builds to fail on Travis CI
-Fix Travis email notifications config
-Rename a variable to avoid a bogus warning with old GCC
error: declaration of ``dup'' shadows a global declaration [-Werror=shadow]
-Disable pedantic ms-format warnings with mingw
-Properly define const DH parameters
-Restore --debug flag in Travis CI builds; -d would get incorrectly passed
to ./Configure in mingw debug builds.
Signed-off-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-10-06 12:30:47 -04:00
Emilia Kasper
20218b58b5
SSLv2 compat ciphers: clarify comment
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-10-06 18:03:51 +02:00
Dr. Stephen Henson
e58c4d3cdd
Don't try and parse boolean type.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-10-06 15:14:55 +01:00
Andy Polyakov
f4bd5de544
Address more Windows warnings illuminated by mingw.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-10-06 09:44:27 +02:00
Dmitry Belyavskiy
52ee3ed3a1
New cipher and cipher modes standardized in Russia
...
This change introduces short names and NIDs for Russian GOST ciphers
according to GOST R 34.13-2015
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-10-05 21:55:10 +01:00
Alessandro Ghedini
52a48f9eed
Validate ClientHello extension field length
...
RT#4069
Reviewed-by: Emilia Käsper <emilia@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-10-05 19:43:00 +01:00
Emilia Kasper
67202973cf
Add PACKET_copy_all
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-10-05 19:03:52 +02:00
Emilia Kasper
bf0fc41266
ssl_sess.c: grab a copy of the session ID
...
The user callback takes a non-const pointer, so don't pass PACKET data
to it directly; rather, grab a local copy.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-10-05 19:03:52 +02:00
Emilia Kasper
38a3cbfbf7
PACKETize and clean up ssl_bytes_to_cipher_list.
...
Fix alerts.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-10-05 19:03:52 +02:00
Emilia Kasper
b3e2272c59
ssl3_get_client_hello: rearrange logic
...
Move all packet parsing to the beginning of the method. This limits the
SSLv2 compatibility soup to the parsing, and makes the rest of the
processing uniform.
This is also needed for simpler EMS support: EMS servers need to do an
early scan for EMS to make resumption decisions. This'll be easier when
the entire ClientHello is parsed in the beginning.
As a side effect,
1) PACKETize ssl_get_prev_session and tls1_process_ticket; and
2) Delete dead code for SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-10-05 19:03:52 +02:00
Richard Levitte
2ff00bdbc4
make depend
...
Reviewed-by: Ben Laurie <ben@openssl.org >
2015-10-05 11:08:18 +02:00
Richard Levitte
46f4d2bef6
Fix make depend for things being built in subdirectories
...
Some makedepend mechanisms remove all directory information in the
target, so a dependency can looks like this:
ssl3_record.o: record/ssl3_record.c
However, that doesn't quite suit us, our Makefile has us build
record/ssl3_record.o rather than ssl3_record.o.
To clear this up, a change to util/clean-depend.pl takes care of this
case by looking up the original file in the dependencies and restoring
the directory information from it.
Reviewed-by: Ben Laurie <ben@openssl.org >
2015-10-05 11:08:18 +02:00
Andy Polyakov
5f0580ccf1
Harmonize pointer printing and size_t-fy casts.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-05 09:26:19 +02:00
Andy Polyakov
21ff9ac815
bio/bss_log.c: harmonize format string to silence -Wformat.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-05 09:25:54 +02:00
Andy Polyakov
45f1351821
Address Windows warnings in apps/.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-05 09:25:06 +02:00
Andy Polyakov
b13fdc4860
Explicitly cast INVALID_SOCKET to (int) to address warnings on Windows.
...
Even though SOCKET is effectively declared as (void *) on Windows, it's
not actually a pointer, but an index within per-process table of
kernel objects. The table size is actually limited and its upper limit
is far below upper limit for signed 32-bit integer. This is what makes
cast in question possible.
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-10-05 09:22:54 +02:00
Dr. Stephen Henson
f93ad22f6a
Free up ASN.1 structures at top level only.
...
When a decoding error in ASN.1 occurs only free up the partial structure
at the top level. This simplifies embedded handling and fixes freeing
up of structures when presented with malformed input.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-10-05 03:31:41 +01:00
Kurt Roeckx
605236f6a8
Fix more d2i cases to properly update the input pointer
...
Thanks to David Benjamin <davidben@google.com > for pointing them out.
Reviewed-by: Steve Henson <steve@openssl.org >
MR #1198
2015-10-03 13:22:52 +02:00
Rich Salz
9982cbbbf6
Remove BIO_s_file_internal macro.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-10-02 14:22:05 -04:00
Matt Caswell
57e4e926da
Revert "Custom cipher constants"
...
This reverts commit 3aabc1dd1c .
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-10-01 13:51:31 +01:00
Dmitry Belyavskiy
3aabc1dd1c
Custom cipher constants
...
Add some custom ctrls for Engine specific use.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-10-01 10:09:11 +01:00
Richard Levitte
721c2ac0f4
Remove the hard coded -DOPENSSL_NO_DEPRECATED from DEPFLAG
...
Any time you configure with enable-deprecated, make depend would
scream bloody murder. This change has it quiet down a bit.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-30 20:22:23 +02:00
Matt Caswell
c84f7f4a74
Change the DEFAULT ciphersuites to exclude DES, RC4 and RC2
...
This patch updates the "DEFAULT" cipherstring to be
"ALL:!COMPLEMENTOFDEFAULT:!eNULL". COMPLEMENTOFDEFAULT is now defined
internally by a flag on each ciphersuite indicating whether it should be
excluded from DEFAULT or not. This gives us control at an individual
ciphersuite level as to exactly what is in DEFAULT and what is not.
Finally all DES, RC4 and RC2 ciphersuites are added to COMPLEMENTOFDEFAULT
and hence removed from DEFAULT.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-30 19:15:06 +01:00
Andy Polyakov
8eed3289b2
bn/asm/armv4-mont.pl: boost NEON performance.
...
Close difference gap on Cortex-A9, which resulted in further improvement
even on other processors.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-09-30 17:48:30 +02:00
Rich Salz
75f648aa06
Make update / libeay.num fix
...
Looks like someone forgot to do a "make update" since crypto/ts/Makefile
keeps changing. So include that.
Second is that the declare_dh_bn macro fools the libeay.num script.
The declarations are only needed in one file (dh_rfc5114) so remove
them from the header and put the "raw" declarations directly into that
file.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-09-30 11:15:14 -04:00
Matt Caswell
dd35486db6
Fix libeay.num
...
Removed duplicated ordinals from libeay.num
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-09-30 15:36:41 +01:00
Matt Caswell
5530d5187c
Add a test for duplicated ordinals
...
Occaisionally we have had problems where there are duplicated ordinals in
libeay.num or ssleay.num. This adds a test for this issue.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-09-30 15:36:41 +01:00
Ben Laurie
19948ceab7
Display brief help if no options for list.
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-09-30 13:55:56 +01:00
Matt Caswell
c58f3e4293
Add GOST12 cms/smime capabilities
...
Add additional NID references in the CMS/SMIME capabilities code to cater
for GOST12.
Patch supplied by Dmitry Belyavsky <beldmit@gmail.com >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-30 11:39:24 +01:00
David Woodhouse
984d6c6052
Fix no-stdio build
...
Much related/similar work also done by
Ivan Nestlerode <ivan.nestlerode@sonos.com >
+Replace FILE BIO's with dummy ops that fail.
+Include <stdio.h> for sscanf() even with no-stdio (since the declaration
is there). We rely on sscanf() to parse the OPENSSL_ia32cap environment
variable, since it can be larger than a 'long'. And we don't rely on the
availability of strtoull().
+Remove OPENSSL_stderr(); not used.
+Make OPENSSL_showfatal() do nothing (currently without stdio there's
nothing we can do).
+Remove file-based functionality from ssl/. The function
prototypes were already gone, but not the functions themselves.
+Remove unviable conf functionality via SYS_UEFI
+Add fallback definition of BUFSIZ.
+Remove functions taking FILE * from header files.
+Add missing DECLARE_PEM_write_fp_const
+Disable X509_LOOKUP_hash_dir(). X509_LOOKUP_file() was already compiled out,
so remove its prototype.
+Use OPENSSL_showfatal() in CRYPTO_destroy_dynlockid().
+Eliminate SRP_VBASE_init() and supporting functions. Users will need to
build the verifier manually instead.
+Eliminate compiler warning for unused do_pk8pkey_fp().
+Disable TEST_ENG_OPENSSL_PKEY.
+Disable GOST engine as is uses [f]printf all over the place.
+Eliminate compiler warning for unused send_fp_chars().
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-29 21:59:19 -04:00
Andy Polyakov
57ebe74831
engine/e_capi.c: fix various warnings.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-29 18:06:06 +02:00
Andy Polyakov
db40a14ecb
Fix -Wshadow warnings in mingw builds.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-29 18:05:55 +02:00
Andy Polyakov
156561b0ad
Fix pedantic warnings in mingw builds.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-29 18:05:40 +02:00
Andy Polyakov
16a9542a17
Fix prototypes in e_ossttest.c.
...
Problem was exposed in mingw64 build, or in other words on P64 platform.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-29 18:05:29 +02:00
Andy Polyakov
03cbd3b8fa
asn1t.h: silence -Wmissing-prototype in Windows builds.
...
On Windows OPENSSL_EXPORT_VAR_AS_FUNCTION is defined and in a sense
this modification simply harmonizes it with "VAR_AS_VAR".
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-29 18:05:13 +02:00
Andy Polyakov
8be7438f16
Rationalize .gitignore and harmonize pair of Makefiles.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-29 18:02:35 +02:00
Nicholas Cooper
ef85320622
RT3948: Some structs have confusing names.
...
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-28 22:07:29 -04:00
Alessandro Ghedini
fecd04e910
Print debug info for extended master secret extension
...
Signed-off-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-28 13:37:44 -04:00
Michal Bozon
5573ee3669
RT4053: Typo in error message
...
Signed-off-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-28 13:36:46 -04:00
Rich Salz
85a7007c38
Remove obsolete b64 demo's
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-09-28 11:48:05 -04:00
Emilia Kasper
fc5ce51d17
PACKET: simplify ServerHello parsing
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-28 16:22:21 +02:00
Emilia Kasper
cf7f85927c
Empty NewSessionTicket: test session resumption
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-28 16:00:58 +02:00
Emilia Kasper
7f6d90ac75
Empty session ticket: add a test
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-28 16:00:47 +02:00
Emilia Kasper
e711da714b
RT2772: accept empty SessionTicket
...
RFC 5077 section 3.3 says:
If the server determines that it does not want to include a
ticket after it has included the SessionTicket extension in the
ServerHello, then it sends a zero-length ticket in the
NewSessionTicket handshake message.
Previously the client would fail upon attempting to allocate a
zero-length buffer. Now, we have the client ignore the empty ticket and
keep the existing session.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-28 16:00:25 +02:00
Andy Polyakov
51cbee3516
Update year in Windows builds.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-28 15:32:38 +02:00
Andy Polyakov
0589680ee6
Harmonize util/mkrc.pl with header move.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-28 15:32:15 +02:00
Dr. Stephen Henson
d40a1f72b6
SRP memory leak fix
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-09-28 14:29:16 +01:00
Emilia Kasper
3a79618474
Silence Wconditional-uninitialized
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-28 15:28:16 +02:00
Jack Danger Canty
8f4e661f53
Fixing typo in PROBLEMS
...
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-09-27 20:50:40 -04:00
Andy Polyakov
b7f5503fa6
Skylake performance results.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-26 19:50:11 +02:00
Alessandro Ghedini
c9c84a1391
GH408 follow-on: update buflen
...
Some builds break, as documented in:
https://github.com/openssl/openssl/pull/408#issuecomment-142971427
This fixes it.
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-25 20:22:27 -04:00
Rich Salz
5db6336dee
Fix typo in previous commit.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-25 11:44:52 -04:00
Rich Salz
1d4ddb4e1a
Change --debug to -d for compat with old releases.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-25 11:38:43 -04:00
Rich Salz
0c71c88bb3
Remove obsolete OCSP demo
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2015-09-25 11:32:45 -04:00
Matt Caswell
51a6081719
Change ossltest engine to manually allocate cipher_data
...
The ossltest engine wraps the built-in implementation of aes128-cbc.
Normally in an engine the cipher_data structure is automatically allocated
by the EVP layer. However this relies on the engine specifying up front
the size of that cipher_data structure. In the case of ossltest this value
isn't available at compile time. This change makes the ossltest engine
allocate its own cipher_data structure instead of leaving it to the EVP
layer.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-09-25 15:13:57 +01:00
Alessandro Ghedini
a2c1dedc5d
Properly format linux-arm64ilp32 target config
...
Otherwise the ./config script fails with errors like:
> Operating system: x86_64-whatever-linux2
> This system (linux-x86_64) is not supported. See file INSTALL for details.
The failure was introduced by a93d3e0 .
RT#4062
Reviewed-by: Andy Polyakov <appro@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-25 14:59:18 +01:00
Matt Caswell
349b310742
Fix the OCSP test on Windows
...
The windows test uses the pseudo file "nul" to indicate no file for the
-CApath option. This does not work on all versions of Windows. Instead use
the new -no-CApath option.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-09-25 14:50:00 +01:00
Matt Caswell
40e2d76bec
Document -no-CApath and -no-CAfile
...
Add documentation to all the appropriate apps for the new -no-CApath and
-no-CAfile options.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-09-25 14:49:59 +01:00
Matt Caswell
2b6bcb702d
Add support for -no-CApath and -no-CAfile options
...
For those command line options that take the verification options
-CApath and -CAfile, if those options are absent then the default path or
file is used instead. It is not currently possible to specify *no* path or
file at all. This change adds the options -no-CApath and -no-CAfile to
specify that the default locations should not be used to all relevant
applications.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-09-25 14:49:59 +01:00
Matt Caswell
631fb6af5f
Document the default CA path functions
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-09-25 14:49:59 +01:00
Matt Caswell
d84a7b20e3
Add ability to set default CA path and file locations individually
...
Previously you could only set both the default path and file locations
together. This adds the ability to set one without the other.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-09-25 14:49:59 +01:00
Andy Polyakov
a93d3e06a9
Configurations: add linux-arm64ilp32 target.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-25 13:39:02 +02:00
Andy Polyakov
5e5ece561d
Allow ILP32 compilation in AArch64 assembly pack.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-25 13:38:48 +02:00
Andy Polyakov
11208dcfb9
ARMv4 assembly pack: implement support for Thumb2.
...
As some of ARM processors, more specifically Cortex-Mx series, are
Thumb2-only, we need to support Thumb2-only builds even in assembly.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-25 13:34:02 +02:00
Vladimir Kotal
e7a68985d5
fix compilation on Solaris
...
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-24 11:25:25 -04:00
Rich Salz
1c9c243509
Restore the old interactive prompt.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-24 10:27:31 -04:00
Matt Caswell
373dc6e196
Sanity check cookie_len
...
Add a sanity check that the cookie_len returned by app_gen_cookie_cb is
valid.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-09-23 13:53:27 +01:00
Matt Caswell
468f043ece
Clarify DTLSv1_listen documentation
...
Clarify that user code is required to allocate sufficient space for the
addressing scheme in use in the call to DTLSv1_listen.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-09-23 13:53:27 +01:00
Matt Caswell
d8249e99b9
Fix s_server DTLSv1_listen issues
...
Use sockaddr_storage not sockaddr for the client IP address to allow for
IPv6.
Also fixed a section of code which was conditional on OPENSSL_NO_DTLS1
which should not have been.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-09-23 13:53:27 +01:00
Matt Caswell
ca7256fbd9
Add DTLSv1_listen documentation
...
Adds a new man page to cover the DTLSv1_listen() function.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-09-23 13:53:27 +01:00
Matt Caswell
35d15a3952
Add -listen documentation
...
This commit adds documentation for the new -listen option to s_server. Along
the way it also adds documentation for -dtls, -dtls1 and -dtls1_2 which was
missing.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-09-23 13:53:27 +01:00
Matt Caswell
fd4e98ec84
Add support for DTLSv1_listen in s_server
...
DTLSv1_listen is a commonly used function within DTLS solutions for
listening for new incoming connections. This commit adds support to s_server
for using it.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-09-23 13:53:27 +01:00
Matt Caswell
912c89c529
Remove remaining old listen code
...
The old implementation of DTLSv1_listen which has now been replaced still
had a few vestiges scattered throughout the code. This commit removes them.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-09-23 13:53:26 +01:00
Matt Caswell
e3d0dae7cf
DTLSv1_listen rewrite
...
The existing implementation of DTLSv1_listen() is fundamentally flawed. This
function is used in DTLS solutions to listen for new incoming connections
from DTLS clients. A client will send an initial ClientHello. The server
will respond with a HelloVerifyRequest containing a unique cookie. The
client the responds with a second ClientHello - which this time contains the
cookie.
Once the cookie has been verified then DTLSv1_listen() returns to user code,
which is typically expected to continue the handshake with a call to (for
example) SSL_accept().
Whilst listening for incoming ClientHellos, the underlying BIO is usually in
an unconnected state. Therefore ClientHellos can come in from *any* peer.
The arrival of the first ClientHello without the cookie, and the second one
with it, could be interspersed with other intervening messages from
different clients.
The whole purpose of this mechanism is as a defence against DoS attacks. The
idea is to avoid allocating state on the server until the client has
verified that it is capable of receiving messages at the address it claims
to come from. However the existing DTLSv1_listen() implementation completely
fails to do this. It attempts to super-impose itself on the standard state
machine and reuses all of this code. However the standard state machine
expects to operate in a stateful manner with a single client, and this can
cause various problems.
A second more minor issue is that the return codes from this function are
quite confused, with no distinction made between fatal and non-fatal errors.
Most user code treats all errors as non-fatal, and simply retries the call
to DTLSv1_listen().
This commit completely rewrites the implementation of DTLSv1_listen() and
provides a stand alone implementation that does not rely on the existing
state machine. It also provides more consistent return codes.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-09-23 13:53:26 +01:00
Matt Caswell
01b7851aa2
Add BIO_CTRL_DGRAM_SET_PEEK_MODE
...
Add the ability to peek at a message from the DTLS read BIO. This is needed
for the DTLSv1_listen rewrite.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-09-23 13:53:26 +01:00
Matt Caswell
1556d21850
Fix the rehash test on Windows
...
The openssl rehash command is not available on some platforms including
Windows. This change skips the associated tests if rehash is not available.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-09-22 23:27:33 +01:00
Dr. Stephen Henson
e15a18de96
make update
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-22 21:15:55 +01:00
Dr. Stephen Henson
94e84f5e95
header includes
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-22 21:15:55 +01:00
Dr. Stephen Henson
69d492eac8
Document X509_get0_subject_key_id()
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-22 21:15:55 +01:00
Dr. Stephen Henson
d19a50c9fb
New function X509_get0_subject_key_id()
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-22 21:15:55 +01:00
Dr. Stephen Henson
2c81e476fa
Make X509 opaque
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-22 21:15:55 +01:00
Dr. Stephen Henson
7e4188326b
Avoid structure access in crypto/ts
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-22 21:15:55 +01:00
Emilia Kasper
6a12a5740b
PACKET: simplify
...
Get rid of the third field that is no longer needed.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-22 20:42:18 +02:00
Emilia Kasper
e9fa092efc
Remove ssl_put_cipher_by_char
...
Since SSLv3, a CipherSuite is always 2 bytes. The only place where we
need 3-byte ciphers is SSLv2-compatible ClientHello processing.
So, remove the ssl_put_cipher_by_char indirection.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-22 20:34:25 +02:00
Emilia Kasper
21b0fa9118
Document BUF_strnlen
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-22 19:52:41 +02:00
Emilia Kasper
58e3457a82
BUF_strdup and friends: update docs
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-22 19:51:53 +02:00
Emilia Kasper
de8883e11b
BUF_strndup: tidy
...
Fix comment, add another overflow check, tidy style
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-22 19:51:18 +02:00
Alessandro Ghedini
110f7b37de
Make BUF_strndup() read-safe on arbitrary inputs
...
BUF_strndup was calling strlen through BUF_strlcpy, and ended up reading
past the input if the input was not a C string.
Make it explicitly part of BUF_strndup's contract to never read more
than |siz| input bytes. This augments the standard strndup contract to
be safer.
The commit also adds a check for siz overflow and some brief documentation
for BUF_strndup().
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-22 19:50:53 +02:00
Rich Salz
db9defdfe3
GH398: Add mingw cross-compile, etc.
...
For all release branches. It adds travis build support. If you don't
have a config file it uses the default (because we enabled travis for the
project), which uses ruby/rake/rakefiles, and you get confusing "build
still failing" messages.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-09-22 13:42:03 -04:00
Dr. Stephen Henson
2aa707c6ac
Fix path in comments
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-22 16:47:09 +01:00
Dr. Stephen Henson
8bbda94c6e
make depend
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-22 16:37:07 +01:00
Dr. Stephen Henson
1e898fb0f5
Move certificate request and CRL routines to x509 dir.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-22 16:35:55 +01:00
Dr. Stephen Henson
0d0099ea3b
Move functions.
...
Move various functions tagged onto t_x509.c to more appropriate places.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-22 16:05:33 +01:00
Dr. Stephen Henson
035014cd22
Update SEE ALSO sections.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-22 13:42:20 +01:00
Dr. Stephen Henson
dd332cea9f
Document signature accessors.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-22 13:42:20 +01:00
Dr. Stephen Henson
047dd81efe
Extension parsing and encoding docs.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-22 13:15:42 +01:00
Dr. Stephen Henson
d8db9a0df5
Document i2d_re_X509_REQ_tbs() and i2d_re_X509_CRL_tbs().
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-22 13:15:42 +01:00
Dr. Stephen Henson
73a7e8de17
Document X509_REVOKED functions.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-22 13:15:42 +01:00
Dr. Stephen Henson
94eae38011
Document X509 sign and verify functions.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-22 13:15:42 +01:00
Dr. Stephen Henson
e7fabc5ea5
Document X509 public key functions.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-22 13:15:42 +01:00
Dr. Stephen Henson
5571ea886f
Document X509 name get and set functions.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-22 13:15:42 +01:00
Dr. Stephen Henson
5f74a40540
Document X509 version functions.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-22 13:15:42 +01:00
Dr. Stephen Henson
7880e14318
Use accessors in X509_REQ_print().
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-22 13:08:05 +01:00
Dr. Stephen Henson
32f5c25164
Use accessor functions in X509_CRL_print().
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-22 13:07:46 +01:00
Dr. Stephen Henson
1f143e08a5
New accessor X509_REQ_get_X509_PUBKEY()
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-22 13:07:22 +01:00
Dr. Stephen Henson
835911b845
Additional X509_CRL accessors.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-22 13:07:06 +01:00
Dr. Stephen Henson
75ef61d705
typo
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-22 13:00:03 +01:00
Dr. Stephen Henson
40ffdc9cfa
Add comments to x509_int.h
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-09-22 12:28:45 +01:00
Dr. Stephen Henson
dc29030ab6
Add accessors for X509_REVOKED.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-09-22 12:28:45 +01:00
Dr. Stephen Henson
a9732d04fa
Add accessors for request and CRL signatures
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-09-22 12:28:45 +01:00
Rich Salz
18cd23df8a
Remove "noise" comments from TS files.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-22 00:40:31 -04:00
David Woodhouse
ff03599a2f
RT3479: Add UTF8 support to BIO_read_filename()
...
If we use BIO_new_file(), on Windows it'll jump through hoops to work
around their unusual charset/Unicode handling. it'll convert a UTF-8
filename to UCS-16LE and attempt to use _wfopen().
If you use BIO_read_filename(), it doesn't do this. Shouldn't it be
consistent?
It would certainly be nice if SSL_use_certificate_chain_file() worked.
Also made BIO_C_SET_FILENAME work (rsalz)
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-09-21 17:30:54 -04:00
Gunnar Kudrjavets
4cd94416a4
RT3823: Improve the robustness of event logging
...
There are a couple of minor fixes here:
1) Handle the case when RegisterEventSource() fails (which it may for
various reasons) and do the work of logging the event only if it succeeds.
2) Handle the case when ReportEvent() fails and do our best in debug builds
to at least attempt somehow indicate that something has gone wrong. The
typical situation would be someone running tools like DbMon, DBWin32,
DebugView or just having the debugger attached. The intent is to make sure
that at least some data will be captured so that we can save hours and days
of debugging time.
3) Minor fix to change the MessageBox() flag to MB_ICONERROR. Though the
value of MB_ICONERROR is the same value as MB_ICONSTOP, the intent is
better conveyed by using MB_ICONERROR.
Testing performed:
1) Clean compilation for debug-VC-WIN32 and VC-WIN32.
2) Good test results (nmake -f ms\ntdll.mak test) for debug-VC-WIN32 and
VC-WIN32.
3) Stepped through relevant changes using WinDBG and exercised the impacted
code paths.
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-21 14:29:41 -04:00
Matt Caswell
7788638777
GOST PKCS12 support
...
Changes required to add GOST support to PKCS12
Based on a patch provided by Dmitry Belyavsky <beldmit@gmail.com >
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-09-21 10:34:55 +01:00
Matt Caswell
eeb1c3976c
Add GOST extensions to PKCS#5
...
GOST extends PKCS5 PBES2/PBKDF2 with some additional GOST specific PRFs.
Based on a patch provided by Dmitry Belyavsky <beldmit@gmail.com >
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-09-21 10:30:49 +01:00
Matt Caswell
bf95cde287
Fix SRP memory leaks
...
There were some memory leaks in the creation of an SRP verifier (both on
successful completion and also on some error paths).
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-09-21 10:17:58 +01:00
Matt Caswell
dfd6211ce3
Fix -srpvfile option in srp command line
...
The -srpvfile option was broken in the srp command line app. Using it would
always result in "-dbfile and -configfile cannot be specified together."
The error message is also wrong because the option is "-srpvfile" not
"-dbfile", so that has been fixed too.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-09-21 10:17:58 +01:00
Dr. Stephen Henson
4e7e623012
Make SRP work with -www
...
PR#3817
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-20 14:19:49 +01:00
Dr. Stephen Henson
f1c412c9e6
Handle SSL_ERROR_WANT_X509_LOOKUP
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-20 14:19:49 +01:00
Dr. Stephen Henson
01a4e8764d
remove unneeded includes
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-09-20 12:50:56 +01:00
Dr. Stephen Henson
37f3a3b327
make no-dh work
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-09-20 12:50:55 +01:00
Dr. Stephen Henson
8f463dbddd
Move EVP_PKEY_METHOD into private headers.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-09-20 03:46:16 +01:00
Richard Levitte
777ae7c4ee
Simplify Simple.pm further, and make it more verbose
...
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-09-20 02:15:49 +02:00
Richard Levitte
c9f6be4ead
Correct srp test
...
There actually is a "srp" feature to check the availability on
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-09-20 02:06:51 +02:00
Richard Levitte
17979f5526
Correct jpake test
...
There actually is a "jpake" feature to check the availability on
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-09-20 02:06:51 +02:00
Richard Levitte
6ff4211781
Correct sha tests
...
These tests were checking for specific sha variants, when they should
just check if "sha" is disabled.
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-09-20 02:06:51 +02:00
Richard Levitte
7f990b0ee3
Correct whirlpool test
...
It depended on 'openssl no-wp', which always exited with code 0, so
this test would never be performed, and this, I never discovered that
the program it's supposed to run was misspellt. Furthermore, the
feature to check is 'whirlpool', not 'wp'.
All corrected.
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-09-20 02:06:51 +02:00
Richard Levitte
da9a22bb57
Finally, remove a possibly disabled feature
...
I have no clue why MD_GHOST94 was checked on, there is no
OPENSSL_NO_MD_GHOST94 in sight anywhere
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-09-20 01:57:57 +02:00
Richard Levitte
56c1ef0501
Add more features that may be disabled
...
Have a look at the directories in crypto/, I found reason to add
checks on CMAC and HMAC. This might be completely irrelevant, but I
prefered covering too much than not enough.
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-09-20 01:57:57 +02:00
Richard Levitte
2df84dd329
Add more features that may be disabled
...
A grep of OPENSSL_NO_ in the rest of the source tree revealed a few
more features to check.
NOTE: there are some of those macros that I ignore because a check of
them doesn't seem useful to external apps. This might change later on.
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-09-20 01:57:57 +02:00
Richard Levitte
66b14bab0a
Add more features that may be disabled
...
After a grep of OPENSSL_NO_ in apps/*.c, a few more features that may
be interesting to check the availability of came up.
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-09-20 01:57:57 +02:00
Richard Levitte
27dae1b04f
Add more features that may be disabled
...
I've tried to make this list as complete as possible, based on
information found in apps/progs.pl.
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-09-20 01:57:57 +02:00
Richard Levitte
d230bd1ddd
Sort the disabled features alphabetically
...
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-09-20 01:57:57 +02:00
Dr. Stephen Henson
54180592d7
typo
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-09-20 00:04:16 +01:00
Dr. Stephen Henson
01d524fa03
Update Simple.pm to use disabled()
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-09-20 00:04:16 +01:00
Dr. Stephen Henson
340166a9da
Change test recipes to use disabled()
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-09-20 00:04:16 +01:00
Dr. Stephen Henson
0d297b42b5
Add Utils.pm
...
Add Utils.pm for test utilities. This currently just contains one function:
disabled which checks if a feature is disabled based on the output of
openssl list -disabled
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-09-20 00:04:15 +01:00
Richard Levitte
f5349f8ca5
Small typo
...
OPENSSL_NO_ECA changed to OPENSSL_NO_EC
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-09-20 00:46:44 +02:00
Richard Levitte
cc0b19a7fc
Make sure to actually use @smime_cms_comp_test when testing it...
...
Obvious typo, and it took configuring with 'zlib' to discover it,
otherwise there was a previous skip that bypassed this section
entirely.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-19 22:55:55 +02:00
Matt Caswell
50db968aad
Fix some test failures when Configured with zlib
...
TLSProxy was failing if we are Configured with compression because it
doesn't support it. This fix simply switches compression off for the
purposes of the test.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-09-19 20:07:33 +01:00
Dr. Stephen Henson
a760a3805b
Print out a list of disabled features.
...
New option "openssl list -disabled" this lists a set of disabled features
in a form which can be conveniently parsed by the test framework so it
knows which tests to skip.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-09-19 05:57:19 +01:00
Dr. Stephen Henson
331bf00bed
Return shared OIDs when decoding.
...
When an OID is decoded see if it exists in the registered OID table
and if so return the shared OID instead of dynamically allocating
an ASN1_OBJECT.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-19 05:57:19 +01:00
Viktor Dukhovni
4fe1cbdff8
Fix indentation
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-09-19 09:04:16 -04:00
Richard Levitte
e008d1b267
Check if test_rehash is run as root
...
If test/recipes/40-test_rehash.t is executed as root, the last test
will fail, since the created directory will remain writable no matter
what. Make sure it complains loudly about being run as root.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-18 21:32:29 +02:00
Emilia Kasper
88f84eb257
Remove PACKET_back
...
It's unused, and the same functionality can be achieved with saving a
copy of the struct.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-18 13:04:07 +02:00
Matt Caswell
020d8fc83f
Make sure OPENSSL_cleanse checks for NULL
...
In master we have the function OPENSSL_clear_free(x,y), which immediately
returns if x == NULL. In <=1.0.2 this function does not exist so we have to
do:
OPENSSL_cleanse(x, y);
OPENSSL_free(x);
However, previously, OPENSSL_cleanse did not check that if x == NULL, so
the real equivalent check would have to be:
if (x != NULL)
OPENSSL_cleanse(x, y);
OPENSSL_free(x);
It would be easy to get this wrong during cherry-picking to other branches
and therefore, for safety, it is best to just ensure OPENSSL_cleanse also
checks for NULL.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-17 22:29:08 +01:00
Emilia Kasper
b785504a10
base64 decode: check for high bit
...
Previously, the conversion would silently coerce to ASCII. Now, we error
out.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-09-17 21:42:38 +02:00
Emilia Kasper
3cdd1e94b1
RT3757: base64 encoding bugs
...
Rewrite EVP_DecodeUpdate.
In particular: reject extra trailing padding, and padding in the middle
of the content. Don't limit line length. Add tests.
Previously, the behaviour was ill-defined, and depended on the position
of the padding within the input.
In addition, this appears to fix a possible two-byte oob read.
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2015-09-17 19:48:14 +02:00
Emilia Kasper
4bd16463b8
Remove PACKET_(get|goto)_bookmark
...
The bookmark API results in a lot of boilerplate error checking that can
be much more easily achieved with a simple struct copy. It also lays the
path for removing the third PACKET field.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-17 18:47:33 +02:00
Dr. Stephen Henson
6e63c142f2
Embed various signature algorithms.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-17 17:18:59 +01:00
Rich Salz
568b80206a
RT4033: Use OPENSSL_SYS_UNIX not "unix"
...
Real fix for RT 4033
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-09-17 12:05:14 -04:00
Filipe DA SILVA
0e04674e96
RT4047: Set reference count earlier
...
Make sure it's valid very early.
Signed-off-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-09-17 11:58:24 -04:00
Emilia Kasper
20ca916d7d
Disentangle RSA premaster secret parsing
...
Simplify encrypted premaster secret reading by using new methods in the
PACKET API.
Don't overwrite the packet buffer. RSA decrypt accepts truncated
ciphertext with leading zeroes omitted, so it's even possible that by
crafting a valid ciphertext with several leading zeroes, this could
cause a few bytes out-of-bounds write. The write is harmless because of
the size of the underlying message buffer, but nevertheless we shouldn't
write into the packet.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-17 17:26:19 +02:00
Dr. Stephen Henson
95ed0e7c1f
Embed X509_REQ_INFO
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-16 22:33:25 +01:00
Dr. Stephen Henson
5cf6abd805
Embed X509_CINF
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-16 22:33:25 +01:00
Dr. Stephen Henson
7aef39a72a
X509_CRL_INFO embed
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-16 22:17:39 +01:00
Dr. Stephen Henson
2869e79f42
Change X509_VAL in X509 structure to embedded.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-16 22:17:39 +01:00
Dr. Stephen Henson
de17bd5d7f
New ASN.1 embed macro.
...
New ASN.1 macro ASN1_EMBED. This is the same as ASN1_SIMPLE except the
structure is not allocated: it is part of the parent. That is instead of
FOO *x;
it must be:
FOO x;
This reduces memory fragmentation and make it impossible to accidentally
set a mandatory field to NULL.
This currently only works for SEQUENCE and since it is equivalent to
ASN1_SIMPLE it cannot be tagged, OPTIONAL, SET OF or SEQUENCE OF.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-16 22:17:39 +01:00
Alessandro Ghedini
05e97f1d4f
Fix build on mingw
...
When OPENSSL_EXPORT_VAR_AS_FUNCTION is defined, the static_ASN1_ITEM_start
macro doesn't exist so the build fails. This problem was introduced in
commit df2ee0e .
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-16 23:12:22 +01:00
Kurt Roeckx
fae11ec714
Fix return values when adding serverinfo fails.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
MR #1128
2015-09-16 20:54:51 +02:00
Matt Caswell
8011f64efb
make update
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-16 12:40:55 +01:00
Richard Levitte
2e996acf2f
Extend the notes on how to do testing
...
These notes include the use of HARNESS_VERBOSE (see the manual for
Test::Harness) and the method to enumerate specific tests to run.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-09-15 15:26:32 +02:00
Richard Levitte
1780e6d916
Add a method to list available tests
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-09-15 14:07:10 +02:00
Richard Levitte
187bad4c24
Add a few notes on perl
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-09-15 13:14:49 +02:00
Kurt Roeckx
a46c9789ce
d2i: don't update input pointer on failure
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
MR #1005
2015-09-14 23:53:03 +02:00
Dr. Stephen Henson
df6da24bda
Fix PSK identity hint handling.
...
For server use a PSK identity hint value in the CERT structure which
is inherited when SSL_new is called and which allows applications to
set hints on a per-SSL basis. The previous version of
SSL_use_psk_identity_hint tried (wrongly) to use the SSL_SESSION structure.
PR#4039
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-14 19:52:27 +01:00
Dr. Stephen Henson
aabd492320
Constify ECDSA_METHOD_new.
...
PR#3920.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-12 01:53:52 +01:00
Dr. Stephen Henson
bc2a15cdfb
Fix zlib CMS compilation.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-11 23:10:29 +01:00
Dr. Stephen Henson
03706afa30
Use default field separator.
...
If the field separator isn't specified through -nameopt then use
XN_FLAG_SEP_CPLUS_SPC instead of printing nothing and returing an error.
PR#2397
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-11 20:50:48 +01:00
Dr. Stephen Henson
8cf2782399
Fix "defined but not used" warnings.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-11 18:16:23 +01:00
Ben Laurie
df2ee0e27d
Enable -Wmissing-variable-declarations and
...
-Wincompatible-pointer-types-discards-qualifiers (the latter did not require
any code changes).
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-11 04:51:55 +01:00
Rich Salz
4c7103a5ee
Unwriteable directories are errors
...
Make the script and app match the documentation.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-10 16:13:55 -04:00
Dr. Stephen Henson
e7451ed137
EVP_PKEY_METHOD accessor functions.
...
Functions to retrieve the function pointer of an existing method: this
can be used to create a method which intercepts or modifies the behaviour
of an existing method while retaining most of the existing behaviour.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-10 18:20:27 +01:00
Emilia Kasper
e34c66c6b0
RT3754: check for NULL pointer
...
Fix both the caller to error out on malloc failure, as well as the
eventual callee to handle a NULL gracefully.
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
2015-09-10 17:21:23 +02:00
Emilia Kasper
cdde7b49a4
Restore SSLerr on PACKET_strndup failure.
...
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2015-09-10 16:40:26 +02:00
David Woodhouse
05d7bf6c5b
RT3992: Make SCT #ifdeffable.
...
This code does open-coded division on 64-bit quantities and thus when
building with GCC on 32-bit platforms will require functions such as
__umoddi3 and __udivdi3 from libgcc.
In constrained environments such as firmware, those functions may not
be available. So make it possible to compile out SCT support, which in
fact (in the case of UEFI) we don't need anyway.
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-09 18:28:13 -04:00
Richard Levitte
84d90cf335
Add a simple test for the new rehash command
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-09 19:12:09 +02:00
Richard Levitte
ceffb33db2
Make sure the temporary error log resides in a well defined location
...
If a test recipe does something like this:
indir "foo.$$" => sub {
chmod 0500, File::Spec->curdir();
ok(run(app(["something"])));
}
we get a problem, because we were storing the temporary stderr file in
the current directory at all times (so while inside the 'indir', we
would attemp to store it in "foo.$$").
So, change our ways to always store that temporary file in the exact
same location, defined by the environment variable RESULT_D, or
failing that TEST_D, or failing that $TOP/test.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-09 19:12:09 +02:00
Dr. Stephen Henson
2dcac136a8
Fix warning about mixed declarations and code.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-09-09 17:28:17 +01:00
Emilia Kasper
6d41fc80e6
PACKET: add PACKET_memdup and PACKET_strndup
...
Use each once in s3_srvr.c to show how they work.
Also fix a bug introduced in c3fc7eeab8
and made apparent by this change:
ssl3_get_next_proto wasn't updating next_proto_negotiated_len
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-09 12:47:05 +02:00
David Woodhouse
d728f0f5f2
RT3993: Fix error found by VS2008
...
Cast and then negate, don't negate an unsigned.
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-08 23:32:53 -04:00
David Woodhouse
4d60c7e10f
RT3969: Add OPENSSL_SYS_UEFI
...
This provides support for building in the EDK II reference implementation
of UEFI. Most UEFI firmware in existence uses OpenSSL for implementing
the core cryptographic functionality needed for Secure Boot.
This has always previously been handled with external patches to OpenSSL
but we are now making a concerted effort to eliminate those.
In this mode, we don't actually use the OpenSSL makefiles; we process
the MINFO file generated by 'make files' and incorporate it into the
EDK2 build system.
Since EDK II builds for various targets with varying word size and we
need to have a single prepackaged configuration, we deliberately don't
hard-code the setting of SIXTY_FOUR_BIT vs. THIRTY_TWO_BIT in
opensslconf.h. We bypass that for OPENSSL_SYS_UEFI and allow EDK II
itself to set those, depending on the architecture.
For x86_64, EDK II sets SIXTY_FOUR_BIT and thus uses 'long long' for the
64-bit type, even when building with GCC where 'long' is also 64-bit. We
do this because the Microsoft toolchain has 32-bit 'long'.
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-08 23:14:36 -04:00
Rich Salz
ff2f6bb084
Fix rehash/c_rehash doc and behavior.
...
Both now warn once if directory isn't writeable.
Both now warn on file-write errors (multiple times).
Update manpage to describe both program and script correctly.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-09-08 15:13:57 -04:00
Ben Laurie
8c82de991b
Fix uninit warning. Remove unnecessary casts. Nothing to add is an error.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-08 05:46:38 +01:00
Rich Salz
5278dec375
add support for apple os/x
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-09-07 21:58:03 -04:00
Richard Levitte
55b2258859
Fix a few tests that depended on the wrong algorithm check
...
test_ecdh and test_ecdsa are made to depend on no-ec being false.
test_hmac is made not to depend on algorithm at all.
Based on a contribution by Alessandro Ghedini <alessandro@ghedini.me >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-08 02:47:30 +02:00
Richard Levitte
e51fb759a6
Adjust the general fill-column in doc/dir-locals.example.el
...
Having a general fill-column of 78 may look nice at first sight, but
if the edited text gets indented a bit afterward (such as with git
comments in 'git log'), it suddenly turns not so nice on a classic 80
columns terminal. A fill-column of 70 will serve us better.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-08 00:59:50 +02:00
Richard Levitte
6b33d10686
Adjust the verify_extra test recipe to its executable
...
The verify_extra_test was recently changed to take its parameters as
arguments instead of having them hardcoded.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-08 00:54:49 +02:00
Rich Salz
ce249fac57
GH391: Apple port
...
Also make internal functions consistently return values, and
add a comment documenting them.
Reviewed-by: Ben Laurie <ben@openssl.org >
2015-09-07 14:41:00 -04:00
Richard Levitte
a351805733
Make sure that 80-test_ca.t finds all the config files
...
This recipe counted too much on being called with test/ as its current
working directory. That's a mistake on, for example, Windows.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:59 +02:00
Richard Levitte
eb8cd5dec2
Add a recipe for the new null pointer test
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:59 +02:00
Richard Levitte
1c73c3bcf0
Change the 80-test_tsa recipe as per changes in testtsa
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:58 +02:00
Richard Levitte
ca5d7dff72
Add a recipe for the new pbelu test
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:58 +02:00
Richard Levitte
49b147f85b
Remake the testsslproxy tests
...
The testsslproxy tests turned out to be useless as they were. They
were really just for show and the results were ignore. Now they are
changed into a more veerifiable test
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:58 +02:00
Richard Levitte
e3ff089249
Small fix in OpenSSL::Test
...
Be careful when shifting in a function argument, you end up changing
the caller's value. Instead, when it is an array, make a shallow copy
and shift in that instead.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:58 +02:00
Richard Levitte
5beb63c41e
Incorporate recent changes that were originally made in test/testssl
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:58 +02:00
Richard Levitte
5ab4f893ce
Add documentation for the new testing framework
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:58 +02:00
Richard Levitte
24d794de25
Add a recipe for the new gmdiff test
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:58 +02:00
Richard Levitte
50f0a9b3dd
Correct test name
...
Some tests were copied from test_jpake, but the title wasn't changed
accordingly. This might seem like a small thing, but it does affect
the log file name...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:58 +02:00
Richard Levitte
c27a404947
Remake test/sslsessionticktest.pl into a recipe
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:58 +02:00
Richard Levitte
25be5f44b8
Adapt the libssl test harness testing scripts to new testing framework
...
This involves adding $TOP/util as perl library in test/run_tests.pl.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:58 +02:00
Richard Levitte
53520ebe87
Check the validity of MINFO
...
MINFO may be an old file lying around, which might have
00-check_testexes.t produce incorrect results. To make sure this
doesn't happen, check the variable VERSION in it against the same
variable in the top Makefile.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:58 +02:00
Richard Levitte
2511c12bf2
Better method of skipping all the tests in 00-check_testexes.t
...
Before trying to read MINFO, we have no idea how many to test for, and
because skip expects to get an exact number somehow, it's better to
use 'plan skip_all'.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:58 +02:00
Richard Levitte
8de4f3d3a6
Remove special x509 test conversions
...
Following the commit from July 2 that removed netscape formated certs,
it is no longer necessary to have conversion tests for it.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:58 +02:00
Richard Levitte
2a74b62e3a
Add a few missing tests
...
test_clienthello
test_packet
test_verify_extra
test_secmem
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:58 +02:00
Richard Levitte
ca904707b6
Push the line buffer filter on the out BIO on VMS
...
VMS files are normally record oriented rather than stream oriented.
This means that every write() will create a new record, which is seen
as a line of its own, regardless of if there was a \n in there or not.
bntest uses BN_print, which prints out number with more than one
write(), thereby dividing up the numbers in several lines, which
greatly disturbs the post-bntest checks that expect to find a full
formula to calculate on one line.
So, for VMS, we need to push the linebuffer filter on the out BIO.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:58 +02:00
Richard Levitte
8368d46bca
Rework 00-test_checkexes.t for VMS
...
Unfortunately, a file spec with character range globs interfere with
paths on VMS, and are therefore disabled. Rework this test to collect
a list of expected tests and a list of all recipes and compare the two
using grep.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:58 +02:00
Richard Levitte
f5098edb14
Document OpenSSL::Test and OpenSSL::Test::Simple
...
For OpenSSL::Test, it meant rearranging the code to better suite the
structure of the documentation.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:58 +02:00
Richard Levitte
fd99c6b599
Change OpenSSL::Test to be an extension of Test::More
...
It became tedious as well as error prone to have all recipes use
Test::More as well as OpenSSL::Test. The easier way is to make
OpenSSL::Test an extension of Test::More, thereby having all version
checks as well as future checks firmly there. Additionally, that
allows us to extend existing Test::More functions if the need would
arise.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:58 +02:00
Richard Levitte
caadc54381
New feature: STOPTEST
...
When the environment variable STOPTEST is defined (with any value other
than the empty string), the test machinery in OpenSSL::Test goes into a
different mode that will stop all testing at the end of a failing recipe.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:58 +02:00
Richard Levitte
fb921436f3
Add version numbers on some modules we use.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:58 +02:00
Richard Levitte
d6c5b66c1c
Have 'make clean' clean away the log files.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:58 +02:00
Richard Levitte
204e41ed50
Tone down the requirements of a test that will go away.
...
00-check_testexes.t was a way for me to check that I didn't forget a
compiled test app. The way it worked was to require MINFO to be present.
Considering the need for this test has diminished considerably at this
point, I might as well tone down the requirement, and have it skip the
test (and not fail it) if MINFO isn't present.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:58 +02:00
Richard Levitte
71a4f2832c
Remove old testing scripts out of the way.
...
For now, I'm moving them into Attic/. They will be removed later.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:58 +02:00
Richard Levitte
fd9ad2300b
Adapt mk1mf.pl and helpers to the new testing framework.
...
With the new testing framework, building a test target with mk1mf.pl
becomes a very simple thing. And especially, no more need to do the
amount of hackery in unix.pl we did.
Also, some tests need a working apps/CA.pl as well as rehashed certs
in certs/demo. So, move the code creating those files so it gets done
regardless, not just in non-mk1mf environments.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:58 +02:00
Richard Levitte
93de4f58ef
Simplify very simple test recipes further.
...
Very simple test recipes easily become tedious, so they might benefit
from being made as simple as possible. Therefore, OpenSSL::Test::Simple
is born. It currently provides but one function, simple_test(), which
takes a minimum of two parameters (test name and program to run), with
the optional third, being the algorithm to be checked for before
running the test itself.
All recipes with that simple thing to do have been rewritten to be as
minimal as possible.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:58 +02:00
Richard Levitte
d11b43fdd3
Remove test targets from Makefile, have it use run_tests.pl
...
Also remove recipes/00-check_testalltests.t, since it will lack the
information from the now gone alltests target.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:58 +02:00
Richard Levitte
7dc11227a3
Ignore the log files
...
The new test framework produces a lot of log files (one for each
test). Git doesn't need to know.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:58 +02:00
Richard Levitte
127d25903f
Add recipes for misc other things we want to test
...
Note that this required a change in constant_time_test.c, as it says
"ok", which interferes with what Test::Harness expects to see. I had
constant_time_test.c say "success" instead.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:57 +02:00
Richard Levitte
88b8a5279f
Add recipes for the larger protocols
...
This covers the certificate authority commands, the cms and smime
commands, OCSP, SSL and TSA.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:57 +02:00
Richard Levitte
4fb35f8fcb
Add engine and evp test recipes.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:57 +02:00
Richard Levitte
4650de3e43
Add recipes for tests related to certificates
...
Some of them make use of recipes/tconversion.pl.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:57 +02:00
Richard Levitte
0c85cc5069
Add asymetric cipher test recipes
...
Some of them make use of recipes/tconversion.pl.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:57 +02:00
Richard Levitte
904ae33426
Add a helper script for key file format conversion tests
...
As tests are done until now, there are a few scripts that look almost,
but not quite the same. tkey, tx509, tcrl, tpkcs7, treq, tsid and
probably a few more.
recipes/tconversions.pl is a helper script that generalises the
function of each of those, and can then be used in a general manner
from test recipes.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:57 +02:00
Richard Levitte
13350a0c0e
Add the encryption test recipe
...
This tests all available openssl cipher commands.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:57 +02:00
Richard Levitte
894025c642
Add recipes for individual block ciphers, stream ciphers and digests
...
These recipes all correspond to a compiled test program.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:57 +02:00
Richard Levitte
f3356b7f49
Add math tests recipes
...
The math recipes are among the heavier, but also quite important.
For the BN test, we have previously relied on bc to verify the numbers.
Unfortunately, bc doesn't exist everywhere, making tests on some platforms
rather painful. With the new recipe (recipes/10-test_bn.t), we rely
on perl's Math::BigInt and a homegrown simple calculator (recipes/bc.pl)
that can do enough to cover for bc.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:57 +02:00
Richard Levitte
aec27d4d52
Groundwork for a perl based testing framework
...
The idea with this perl based testing framework is to make use of
what's delivered with perl and exists on all sorts of platforms.
The choice came to using Test::More and Test::Harness, as that seems
to be the most widely spread foundation, even if perl is aged.
The main runner of the show is run_tests.pl. As it currently stands,
it's designed to run from inside Makefile, but it's absolutely
possible to run it from the command line as well, like so:
cd test
OPENSSL_SRCDIR=.. perl run_tests.pl
The tester scripts themselves are stored in the subdirectory recipes/,
and initially, we have two such scripts, recipes/00-check_testalltests.t
and recipes/00-check_testexes.t. recipes/00-check_testalltests.t will
pick out the dependencies of "alltests" in test/Makefile, and check if
it can find recipes with corresponding names. recipes/00-check_testexes.t
does something similar, but bases it on existing compiled test binaries.
They make it easy to figure out what's to be added, and will be
removed when this effort is finished.
Individual recipes can be run as well, of course, as they are perl
scripts in themselves. For example, you can run only
recipes/00-check_testexes.t like so:
cd test
OPENSSL_SRCDIR=.. perl recipes/00-check_testexes.t
To make coding easier, there's a routine library OpenSSL::Test, which
is reachable in a perl script like so:
use lib 'testlib';
use OpenSSL::Test;
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-07 16:10:57 +02:00
Matt Caswell
8098fc5663
PACKETise ServerKeyExchange
...
Process the ServerKeyExchange message using the PACKET API
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-07 10:51:41 +01:00
Matt Caswell
50932c4af2
PACKETise ServerHello processing
...
Process ServerHello messages using the PACKET API
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-07 10:45:38 +01:00
Matt Caswell
0e2d091103
Updates for NumericString support
...
Ensure that EBCDIC support works and update a comment.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-07 10:34:44 +01:00
Dmitry Belyavsky
68572c8af3
Add NumericString support
...
GOST requires improved NumericString support.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-07 10:34:44 +01:00
Matt Caswell
26d57a1a92
Fix build break due to rehash command
...
The build was breaking due to a Makefile recipe expecting an openssl
version to be on the PATH with support for the rehash command.
Reviewed-by: Ben Laurie <ben@openssl.org >
2015-09-07 10:08:38 +01:00
Rich Salz
62fdf4ee6c
fix build breakage on windows
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-06 21:39:26 -04:00
Rich Salz
9e0da06089
Fix typo, that broke build on non-unix
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-06 19:01:53 -04:00
Timo Teras
8f6f1441a3
Add rehash command to openssl
...
On Unix/Linux platforms, merge c_rehash script into openssl as a
C program.
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-06 18:03:54 -04:00
Richard Levitte
496f4f9d6a
Small fix: make istext static
...
This takes away a build failure in some cases.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-06 23:41:12 +02:00
Richard Levitte
5f62e044d3
Fix enc so it properly treats BASE64 as text
...
To set both the incoming and outgoing data when 'encrypting' or
'decrypting' to FORMAT_BASE64 wasn't quite the right thing to do.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-06 17:12:39 +02:00
Richard Levitte
8af6082e16
Fixup merge conflicts in util/libeay.num
...
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-09-06 14:13:00 +02:00
Richard Levitte
a60994df34
Change the treatment of stdin and stdout to allow binary data
...
If the output to stdout or the input from stdin is meant to be binary,
it's deeply unsetting to get the occasional LF converted to CRLF or
the other way around. If someone happens to forget to redirect stdin
or stdout, they will get gibberish anyway, line ending conversion will
not change that.
Therefore, let's not have dup_bio_* decide unilaterally what mode the
BIO derived from stdin and stdout, and rather let the app decide by
declaring the intended format.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-06 13:34:49 +02:00
Richard Levitte
a412b89198
dup_bio_* and bio_open_* are utility functions and belong in apps.c
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-06 13:34:48 +02:00
Richard Levitte
297172294c
Remove warning about use of uninitialised variable
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-06 12:56:33 +02:00
Richard Levitte
afc12d76f8
Have binary mode when the format is binary, not the other way around
...
Fixing a small mixup.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-06 01:35:54 +02:00
Richard Levitte
0f81f5f78c
Have the test executables output in text mode
...
The test executables use standard output and standard error for text output,
so let's open the corresponding BIOs in text mode.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-06 01:35:54 +02:00
Richard Levitte
bdd58d9846
Change the way apps open their input and output files
...
The different apps had the liberty to decide whether they would open their
input and output files in binary mode or not, which could be confusing if
two different apps were handling the same type of file in different ways.
The solution is to centralise the decision of low level file organisation,
and that the apps would use a selection of formats to state the intent of
the file.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-06 01:35:54 +02:00
Richard Levitte
d303b9d85e
Make the handling of output and input formats consistent
...
Most of all, we needed to sort out which ones are binary and which
ones are text, and make sure they are treated accordingly and
consistently so
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-06 01:29:36 +02:00
Richard Levitte
e9daa8150a
Make the verify_extra test location agnostic
...
Depending on platform, verify_extra_test may fail because it relies on
test/ being the current working directory. Make it get all the required
files on the command line instead to solve that issue.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-06 01:28:40 +02:00
Dr. Stephen Henson
551a2f26aa
make update
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-06 00:17:37 +01:00
Dr. Stephen Henson
a8d8e06b0a
Avoid direct X509 structure access
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-06 00:17:37 +01:00
Dr. Stephen Henson
f728254a84
Replace X509 macros with functions
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-06 00:17:37 +01:00
Rich Salz
fda23e2d93
Cleanup testtsa script
...
Add RUN function; remove single-use functions and use their body inline.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-05 18:01:45 -04:00
Rich Salz
ca4a494cb7
Make TS structures opaque.
...
Most of the accessors existed and were already used so it was easy.
TS_VERIFY_CTX didn't have accessors/settors so I added the simple and
obvious ones, and changed the app to use them. Also, within crypto/ts,
replaced the functions with direct access to the structure members
since we generally aren't opaque within a directory.
Also fix RT3901.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-05 17:49:20 -04:00
Rich Salz
8e704858f2
RT3955: Reduce some stack usage
...
Use malloc/free instead of big onstack buffers.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-05 17:40:48 -04:00
mrpre
ecdaa1aefd
In X509_STORE_CTX_init, cleanup on failure
...
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-05 17:25:10 -04:00
David Woodhouse
d35ff2c0ad
RT3951: Add X509_V_FLAG_NO_CHECK_TIME to suppress time check
...
In some environments, such as firmware, the current system time is entirely
meaningless. Provide a clean mechanism to suppress the checks against it.
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-05 16:17:15 -04:00
Alessandro Ghedini
2519b4e181
Use the shlib wrapper when running nptest
...
Since there seems to be no way to avoid linking to libssl and libcrypto,
just wrap the test. This unbreaks "shared" builds when using clang and/or
OS X.
Signed-off-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Ben Laurie <ben@openssl.org >
2015-09-05 15:56:29 -04:00
Dr. Stephen Henson
44748efc85
make X509_REVOKED opaque
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-05 12:29:51 +01:00
Benjamin Kaduk
18716ba256
Supply a build rule for the recently added nptest
...
Commit d4ab70f27c added a test program
to check that the NULL pointer is represented as all zero bits, but
did not specify a build rule for that new executable. On many platforms,
the implicit rule sufficed, since nptest is a very simple program, but
for at least darwin-i386-cc, an explicit rule is needed. On darwin-i386-cc,
the implicit rule targetted a 64-bit executable, but the object file
containing the definition of main was a 32-bit object, which the linker
excluded from consideration, resulting in a link failure due to no
definition for _main.
Add the missing build rule to fix the build on such platforms.
Signed-off-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2015-09-04 23:00:58 -04:00
Dr. Stephen Henson
13e228d684
Match SUITEB strings at start of cipher list.
...
PR#4009.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-04 21:17:59 +01:00
Rich Salz
d4ab70f27c
Test for NULL ptr == 0
...
Add a test to ensure that "char *p = NULL" is equivalent to
all-bytes-zero.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-04 14:30:38 -04:00
Rich Salz
b0809bc8ff
RT3998: Allow scrypt to be disabled
...
This does 64-bit division and multiplication, and on 32-bit platforms
pulls in libgcc symbols (and MSVC does similar) which may not be
available. Mostly done by David Woodhouse.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2015-09-04 14:09:14 -04:00
Rich Salz
a939b0aab5
More zalloc nits
...
Found on GitHub by dimman
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-09-04 11:45:44 -04:00
David Woodhouse
47bbaa5b60
Revert "OPENSSL_NO_xxx cleanup: RFC3779"
...
This reverts the non-cleanup parts of commit c73ad69017 . We do actually
have a reasonable use case for OPENSSL_NO_RFC3779 in the EDK2 UEFI
build, since we don't have a strspn() function in our runtime environment
and we don't want the RFC3779 functionality anyway.
In addition, it changes the default behaviour of the Configure script so
that RFC3779 support isn't disabled by default. It was always disabled
from when it was first added in 2006, right up until the point where
OPENSSL_NO_RFC3779 was turned into a no-op, and the code in the
Configure script was left *trying* to disable it, but not actually
working.
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-03 16:31:09 -04:00
Rich Salz
64b25758ed
remove 0 assignments.
...
After openssl_zalloc, cleanup more "set to 0/NULL" assignments.
Many are from github feedback.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-03 16:26:34 -04:00
Long, Qin
fb4844bbc6
Add UEFI flag for rand build
...
Add OPENSSL_SYS_UEFI flag for RAND handling;
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-03 15:41:47 -04:00
Richard Levitte
1912c5d811
Win32 build fix: include internal/numbers.h to get UIN32_MAX
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-03 20:56:16 +02:00
David Bar
e968561d5e
RT3674: Make no-cms build work.
...
Also has changes from from David Woodhouse <David.Woodhouse@intel.com >
and some tweaks from me.
Signed-off-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-03 14:45:15 -04:00
Dr. Stephen Henson
231efb9365
make update
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-03 18:37:27 +01:00
Dr. Stephen Henson
d95466931d
PBE lookup test
...
Add test to check PBE lookups: these can fail if the PBE table is not
correctly orders. Add to "make test".
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-03 18:37:27 +01:00
Alessandro Ghedini
66c103bdab
Add initial Travis CI configuration
...
Closes #63
Signed-off-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Ben Laurie <ben@openssl.org >
2015-09-03 09:41:33 -04:00
Richard Levitte
e56a79784c
Two changes at ones lead to a confused libeay.num. Fix
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-03 10:16:59 +02:00
Rich Salz
3a3cb629d9
Check OPENSSL_gmtime_diff
...
It's test code that only runs on 64bit time_t machines.
Move it to a standalone test/gmdifftest
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-09-02 23:03:43 -04:00
Rich Salz
b51bce9420
Add and use OPENSSL_zalloc
...
There are many places (nearly 50) where we malloc and then memset.
Add an OPENSSL_zalloc routine to encapsulate that.
(Missed one conversion; thanks Richard)
Also fixes GH328
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-09-02 22:05:37 -04:00
Dr. Stephen Henson
66e87a9f09
make update
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-02 21:26:17 +01:00
Dr. Stephen Henson
e3e571925c
make X509_CRL opaque
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-02 21:26:17 +01:00
Dr. Stephen Henson
cf170f558b
Extend ciphersuite test coverage.
...
Add support for testing ECDSA and DSA ciphersuites.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-02 21:23:12 +01:00
Dr. Stephen Henson
04dc8b36ef
Fix CCM support in DTLS
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-02 21:23:12 +01:00
Dr. Stephen Henson
6a096889d7
Update ssltest certificate handling.
...
Use SSL_CONF for certificate handling is ssltest.c, this changes the
behaviour slightly: the -cert and -key options are no longer recognised
and a default certificate file is not used.
This change means that -s_cert and -c_cert can be used mode than once
to support use of multiple certificates.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-02 21:22:44 +01:00
Dr. Stephen Henson
cb0585c2cb
Create DSA and ECDSA certificates.
...
If supported create DSA and ECDSA certificates and test them.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-02 21:22:44 +01:00
Dr. Stephen Henson
0b58c6ad9e
delete unused structure
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-02 21:21:27 +01:00
Rich Salz
8d1d0f4d9e
Move OPENSSL_ITEM to store.h
...
The only place that uses it.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-09-02 11:12:36 -04:00
Viktor Dukhovni
fffc2faeb2
Cleaner handling of "cnid" in do_x509_check
...
Avoid using cnid = 0, use NID_undef instead, and return early instead
of trying to find an instance of that in the subject DN.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-09-02 09:53:44 -04:00
Viktor Dukhovni
a0724ef1c9
Better handling of verify param id peername field
...
Initialize pointers in param id by the book (explicit NULL assignment,
rather than just memset 0).
In x509_verify_param_zero() set peername to NULL after freeing it.
In x509_vfy.c's internal check_hosts(), avoid potential leak of
possibly already non-NULL peername. This is only set when a check
succeeds, so don't need to do this repeatedly in the loop.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-09-02 09:53:29 -04:00
Hiroyuki YAMAMORI
246b52f39a
Fix DTLS1.2 buffers
...
Fix the setup of DTLS1.2 buffers to take account of the Header
Reviewed-by: Emilia Käsper <emilia@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-02 00:34:14 +01:00
Tim Zhang
91d2728b38
Fix the comment for POINT_CONVERSION_UNCOMPRESSED
...
The |z| value should be 0x04 not 0x02
RT#3838
Signed-off-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-01 23:50:49 +01:00
Dr. Stephen Henson
6c41ee7c65
make update
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-01 20:37:45 +01:00
Dr. Stephen Henson
361136f4b3
Document extension functions
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-01 20:37:45 +01:00
Dr. Stephen Henson
063f1f0c69
functions to retrieve certificate flags
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-01 20:37:45 +01:00
Dr. Stephen Henson
af183984c3
use uint32_t for certificate flags
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-01 20:37:44 +01:00
Adam Eijdenberg
fb029cebae
RT3984: Fix clang compiler warning on Mac OS X where %ld is used for uint64_t.
...
clang suggests %llu instead, but it isn't clear that is portable on
all platforms.
C99 and above define a handy macro for us, so we try to use that
definition and fall back to current definition if needed (though we
switch to 'u' for unsigned).
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-01 20:18:46 +02:00
Emilia Kasper
08a721ac61
apps/speed.c: fix memory leak
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-09-01 20:01:55 +02:00
Emilia Kasper
394f7b6fcc
RT4002: check for NULL cipher in p12_crpt.c
...
The NULL cipher case can't actually happen because we have no
EVP_PBE_CTL combinations where cipher_nid is -1 and keygen is
PKCS12_PBE_keyivgen. But make the code more obviously correct.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-01 20:01:38 +02:00
Emilia Kasper
25d6b3401c
RT 3493: fix RSA test
...
- Pass in the right ciphertext length to ensure we're indeed testing
ciphertext corruption (and not truncation).
- Only test one mutation per byte to not make the test too slow.
- Add a separate test for truncated ciphertexts.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-09-01 20:01:24 +02:00
Rich Salz
8db7878106
RT3767: openssl_button.gif should be PNG
...
No, we should just delete it. And updated the README
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-09-01 11:56:14 -04:00
Richard Levitte
d7c02691a5
Ignore .dir-locals.el
...
Because we recently encourage people to have a .dir-locals.el, it's a good
idea to ignore it on a git level.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-09-01 01:17:46 +02:00
Dr. Stephen Henson
25a5d1b8c4
make update
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-08-31 23:18:55 +01:00
Dr. Stephen Henson
05f0fb9f6a
Add X509_up_ref function.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-08-31 23:18:55 +01:00
Dr. Stephen Henson
65cbf983ca
Add X509_CRL_up_ref function
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-08-31 23:18:54 +01:00
mrpre
a7e974c7be
check bn_new return value
...
Slightly modified from the original PR.
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-08-31 16:03:31 -04:00
Dr. Stephen Henson
124055a96e
make X509_REQ opaque
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-08-31 20:58:33 +01:00
Dr. Stephen Henson
bc3686dfb0
make X509_CERT_AUX opaque
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-08-31 20:58:33 +01:00
Dr. Stephen Henson
d8c054f2da
Remove asn1-kludge option.
...
Remove asn1-kludge option from the req utility. It was a decade old
workaround for CAs and software which required an invalid encoding
of PKCS#10 certificate requests: omitting the attributes field even
though it is not OPTIONAL.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-08-31 20:58:33 +01:00
Ben Kaduk
36ac7bc8a9
GH367 follow-up, for more clarity
...
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-08-31 13:46:12 -04:00
Emilia Kasper
a9009e518c
BN_mod_exp_mont_consttime: check for zero modulus.
...
Don't dereference |d| when |top| is zero. Also test that various BIGNUM methods behave correctly on zero/even inputs.
Follow-up to b11980d79a
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-08-31 19:25:59 +02:00
Richard Levitte
6dc08048d9
Remove auto-fill-mode
...
Apparently, emacs sees changes to auto-fill-mode as insecure
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-08-31 18:15:33 +02:00
Richard Levitte
0927f0d822
Add an example .dir-locals.el
...
This file, when copied to .dir-locals.el in the OpenSSL source top,
will make sure that the CC mode style "OpenSSL-II" will be used for
all C files.
Additionally, I makes sure that tabs are never used as indentation
character, regardless of the emacs mode, and that the fill column is
78.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-08-31 18:15:32 +02:00
Richard Levitte
d9b3554b2d
Add emacs CC mode style for OpenSSL
...
This hopefully conforms closely enough to the current code style.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-08-31 18:15:32 +02:00
Emilia Kasper
4d04226c2e
Fix spurious bntest failures.
...
BN_bntest_rand generates a single-word zero BIGNUM with quite a large probability.
A zero BIGNUM in turn will end up having a NULL |d|-buffer, which we shouldn't dereference without checking.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-08-31 16:31:45 +02:00
Rich Salz
9db0c91c39
Remove the "times" directory.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-08-30 16:40:30 -04:00
Rich Salz
1f003251ff
Fix 4c42ebd; forgot to inutil util/libeay.num
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-08-28 15:55:09 -04:00
Alessandro Ghedini
55500ea7c4
GH354: Memory leak fixes
...
Fix more potential leaks in X509_verify_cert()
Fix memory leak in ClientHello test
Fix memory leak in gost2814789 test
Fix potential memory leak in PKCS7_verify()
Fix potential memory leaks in X509_add1_reject_object()
Refactor to use "goto err" in cleanup.
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-08-28 11:18:04 -04:00
Ismo Puustinen
f00a10b897
GH367: Fix dsa keygen for too-short seed
...
If the seed value for dsa key generation is too short (< qsize),
return an error. Also update the documentation.
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-08-27 22:57:00 -04:00
Rich Salz
3c65047d30
Fix memory over-read
...
Fix from David Baggett via tweet.
Signed-off-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-08-27 17:29:46 -04:00
Rich Salz
c03726ca41
Various doc fixes.
...
Make all mention of digest algorithm use "any supported algorithm"
RT2071, some new manpages from Victor B. Wagner <vitus@cryptocom.ru >:
X509_LOOKUP_hash_dir.pod
X509_check_ca.pod
X509_check_issued.pod
RT 1600:
Remove references to non-existant objects(3)
Add RETURN VALUES to BIO_do_accept page.
RT1818:
RSA_sign Can return values other than 0 on failure.
RT3634:
Fix AES CBC aliases (Steffen Nurpmeso <sdaoden@yandex.com >)
RT3678:
Some clarifications to BIO_new_pair
(Devchandra L Meetei <dlmeetei@gmail.com >)
RT3787:
Fix some EVP_ function return values
(Laetitia Baudoin <lbaudoin@google.com >)
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-08-27 14:27:28 -04:00
Hubert Kario
ad775e04f6
GH350: -help text few s_client and s_server flags
...
add -help description of sigalgs, client_sigalgs, curves
and named_curve
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-08-26 17:43:20 -04:00
David Brodski
8cbb153357
Fixed problem with multiple load-unload of comp zlib
...
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-08-26 17:34:52 -04:00
Viktor Dukhovni
208b2d541d
GH correct organizationalUnitName
...
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-08-26 17:31:10 -04:00
Matt Caswell
95cdad6344
Clean up reset of read/write sequences
...
Use sizeof instead of an explicit size, and use the functions for the
purpose.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-08-26 16:22:45 +01:00
Emilia Kasper
ec30e8566e
PACKET: add methods for reading length-prefixed TLS vectors.
...
Rewrite ssl3_get_client_hello to use the new methods.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-08-26 13:25:48 +02:00
Emilia Kasper
9cc3e8f1f2
Fix SSLv2-compatible ClientHello processing.
...
If the client challenge is less than 32 bytes, it is padded with leading - not trailing - zero bytes.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-08-26 13:23:24 +02:00
Emilia Kasper
2aa815c343
PACKET: constify where possible
...
The PACKET should hold a 'const unsigned char*' underneath as well
but the legacy code passes the record buffer around as 'unsigned char*'
(to callbacks, too) so that's a bigger refactor.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-08-26 13:19:12 +02:00
Alessandro Ghedini
b48357d995
GH371: Print debug info for ALPN extension
...
Also known as RT 4106
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-08-26 07:07:47 -04:00
Rich Salz
4c42ebd2f3
Remove _locked memory functions.
...
Undocumented, unused, unnecessary (replaced by secure arena).
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-08-26 07:02:33 -04:00
Rich Salz
22dc08d00a
BN_bin2bn handle leading zero's
...
If a binary sequence is all zero's, call BN_zero.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-08-26 07:00:43 -04:00
Matt Caswell
ddcc5e5b60
Add NewSessionTicket test suite
...
Add a set of tests for checking that NewSessionTicket messages are
behaving as expected.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-08-26 10:38:02 +01:00
Matt Caswell
8af538e5c5
Fix TLSProxy end of test detection
...
Previously TLSProxy would detect a successful handshake once it saw the
server Finished message. This causes problems with abbreviated handshakes,
or if the client fails to process a message from the last server flight.
This change additionally sends some application data and finishes when the
client sends a CloseNotify.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-08-26 10:38:02 +01:00
Matt Caswell
ee4ffd6fcc
Fix DTLS session ticket renewal
...
A DTLS client will abort a handshake if the server attempts to renew the
session ticket. This is caused by a state machine discrepancy between DTLS
and TLS discovered during the state machine rewrite work.
The bug can be demonstrated as follows:
Start a DTLS s_server instance:
openssl s_server -dtls
Start a client and obtain a session but no ticket:
openssl s_client -dtls -sess_out session.pem -no_ticket
Now start a client reusing the session, but allow a ticket:
openssl s_client -dtls -sess_in session.pem
The client will abort the handshake.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-08-26 10:17:49 +01:00
Chris Watts
d6dfa55038
Ignore generated *.S ARM assembly files
...
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-08-25 12:19:40 -04:00
Markus Rinne
fe50cd7ad4
RT4019: Duplicate -hmac flag in dgst.pod
...
Signed-off-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-08-25 12:15:53 -04:00
Rich Salz
32c5e0ba0f
GH372: Remove duplicate flags
...
Signed-off-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-08-25 12:10:54 -04:00
Rich Salz
2c4969708c
Small cleanup of crypto.pod
...
Came up on the mailing list, from Ken Goldman.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-08-24 18:21:54 -04:00
Peter Mosmans
e0d26bb36d
GH337: Need backslash before leading #
...
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-08-24 15:58:26 -04:00
janpopan
a847130696
RT4015: Add missing date to CHANGES
...
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-08-24 15:54:27 -04:00
Dr. Stephen Henson
80eab79de0
More test cases.
...
Add DSA tests.
Add tests to verify signatures against public keys. This will also check
that a public key is read in correctly.
Reviewed-by: Ben Laurie <ben@openssl.org >
2015-08-24 15:12:52 +01:00
Dr. Stephen Henson
9d04f83410
Add DSA digest length checks.
...
Reviewed-by: Ben Laurie <ben@openssl.org >
2015-08-24 15:12:52 +01:00
Rich Salz
9b86974e0c
Fix L<> content in manpages
...
L<foo|foo> is sub-optimal If the xref is the same as the title,
which is what we do, then you only need L<foo>. This fixes all
1457 occurrences in 349 files. Approximately. (And pod used to
need both.)
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-08-21 15:11:50 -04:00
Richard Levitte
3da9505dc0
Add new types to indent.pro
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-08-17 18:21:53 +02:00
Dmitry Belyavsky
31001f8131
Add new GOST OIDs
...
Add new OIDs for latest GOST updates
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-08-17 15:34:30 +01:00
Tim Hudson
dfba17b4f3
Restore previous behaviour of only running one algorithm when -evp alg is used.
...
Submitted by: Eric Young <eay@pobox.com >
Reviewed-by: Ben Laurie <ben@openssl.org >
2015-08-17 22:20:06 +10:00
Tim Hudson
686e344918
restore usage of -elapsed that was disabled in the ifdef reorg
...
Reviewed-by: Ben Laurie <ben@openssl.org >
2015-08-17 22:16:39 +10:00
Rich Salz
eb647452eb
GH345: Remove stderr output
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-08-16 21:08:25 -04:00
Rich Salz
4f46473a86
Move FAQ to the web.
...
Best hope of keeping current.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-08-16 19:02:29 -04:00
Matt Caswell
ac11233201
PACKETise CertificateRequest
...
Process CertificateRequest messages using the PACKET API
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-08-14 17:29:21 +01:00
Matt Caswell
efcdbcbeda
PACKETise ClientKeyExchange processing
...
Use the new PACKET code to process the CKE message
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-08-14 17:19:57 +01:00
Matt Caswell
561e12bbb0
PACKETise NewSessionTicket
...
Process NewSessionTicket messages using the new PACKET API
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-08-14 17:05:46 +01:00
Matt Caswell
c83eda8c22
Fix session tickets
...
Commit 9ceb2426b0 (PACKETise ClientHello) broke session tickets by failing
to detect the session ticket extension in an incoming ClientHello. This
commit fixes the bug.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-08-14 17:00:11 +01:00
Dr. Stephen Henson
f8f5f8369d
add CCM docs
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-08-14 06:57:32 +01:00
Dr. Stephen Henson
176f85a28e
Add CCM ciphersuites from RFC6655 and RFC7251
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-08-14 06:57:32 +01:00
Dr. Stephen Henson
3d3701ea20
ccm8 support
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-08-14 06:56:11 +01:00
Dr. Stephen Henson
e75c5a794e
CCM support.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-08-14 06:56:11 +01:00
Dr. Stephen Henson
2fd7fb99db
Update docs.
...
Clarify and update documention for extra chain certificates.
PR#3878.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-08-14 06:28:00 +01:00
Dr. Stephen Henson
6d5f8265ce
Documentation for SSL_check_chain()
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-08-14 06:24:38 +01:00
Richard Levitte
00bf5001f7
for test_sslvertol, add a value to display SSL version < 3 in debug
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-08-13 22:05:25 +02:00
Richard Levitte
4deefd6567
Fixups in libssl test harness
...
- select an actual file handle for devnull
- do not declare $msgdata twice
- SKE records sometimes seem to come without sig
- in SKE parsing, use and use $pub_key_len when parsing $pub_key
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-08-13 22:05:25 +02:00
Richard Levitte
b3a231db49
Use -I to add to @INC, and use -w to produce warnings
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-08-13 22:05:25 +02:00
Rich Salz
f25825c218
Fix FAQ formatting for new website.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-08-13 15:47:37 -04:00
Matt Caswell
ac63710a3d
PACKETise Certificate Status message
...
Process the Certificate Status message using the PACKET API
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-08-13 20:41:06 +01:00
Matt Caswell
bc6616a434
Enhance PACKET readability
...
Enhance the PACKET code readability, and fix a stale comment. Thanks
to Ben Kaduk (bkaduk@akamai.com ) for pointing this out.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-08-13 20:34:51 +01:00
Matt Caswell
f9f6053442
Add missing return check for PACKET_buf_init
...
The new ClientHello PACKET code is missing a return value check.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-08-13 20:34:51 +01:00
Ismo Puustinen
cc2829e664
GH364: Free memory on an error path
...
Part of RT 3997
Per Ben, just jump to common exit code.
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-08-13 12:13:49 -04:00
Matt Caswell
df758a8569
PACKETise Server Certificate processing
...
Use the PACKET API to process an incoming server Certificate message.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-08-13 09:29:17 +01:00
Dr. Stephen Henson
2acdef5e97
Return error for unsupported modes.
...
PR#3974
PR#3975
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-08-12 13:54:56 +01:00
Dr. Stephen Henson
891eac4604
Fix memory leak if setup fails.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-08-12 13:54:56 +01:00
Dr. Stephen Henson
a187e08d85
Err isn't always malloc failure.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-08-12 13:54:56 +01:00
Rich Salz
ade44dcb16
Remove Gost94 signature algorithm.
...
This was obsolete in 2001. This is not the same as Gost94 digest.
Thanks to Dmitry Belyavsky <beldmit@gmail.com > for review and advice.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-08-11 18:23:29 -04:00
Matt Caswell
f75d5171be
Fix "make test" seg fault with SCTP enabled
...
When config'd with "sctp" running "make test" causes a seg fault. This is
actually due to the way ssltest works - it dives under the covers and frees
up BIOs manually and so some BIOs are NULL when the SCTP code does not
expect it. The simplest fix is just to add some sanity checks to make sure
the BIOs aren't NULL before we use them.
This problem occurs in master and 1.0.2. The fix has also been applied to
1.0.1 to keep the code in sync.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-08-11 22:16:38 +01:00
Matt Caswell
d8e8590ed9
Fix missing return value checks in SCTP
...
There are some missing return value checks in the SCTP code. In master this
was causing a compilation failure when config'd with
"--strict-warnings sctp".
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-08-11 22:16:38 +01:00
Matt Caswell
6142f5c640
make update
...
Run a "make update" for the OSSLTest Engine changes
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-08-11 20:27:46 +01:00
Richard Levitte
c0cbb4c19b
Use dynamic engine for libssl test harness
...
Use a dynamic engine for ossltest engine so that we can build it without
subsequently deploying it during install. We do not want people accidentally
using this engine.
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-08-11 20:27:46 +01:00
Matt Caswell
c2a34c58f5
Add a test for 0 p value in anon DH SKE
...
When using an anon DH ciphersuite a client should reject a 0 value for p.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-08-11 20:27:46 +01:00
Matt Caswell
a1accbb1d7
Extend TLSProxy capabilities
...
Add ServerHello parsing to TLSProxy.
Also add some (very) limited ServerKeyExchange parsing.
Add the capability to set client and server cipher lists
Fix a bug with fragment lengths
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-08-11 20:27:46 +01:00
Matt Caswell
011467ee55
Add some libssl tests
...
Two tests are added: one is a simple version tolerance test; the second is
a test to ensure that OpenSSL operates correctly in the case of a zero
length extensions block. The latter was broken inadvertently (now fixed)
and it would have been helpful to have a test case for it.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-08-11 20:27:46 +01:00
Matt Caswell
631c120633
Add a libssl test harness
...
This commit provides a set of perl modules that support the testing of
libssl. The test harness operates as a man-in-the-middle proxy between
s_server and s_client. Both s_server and s_client must be started using the
"-testmode" option which loads the new OSSLTEST engine.
The test harness enables scripts to be written that can examine the packets
sent during a handshake, as well as (potentially) modifying them so that
otherwise illegal handshake messages can be sent.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-08-11 20:27:46 +01:00
Matt Caswell
2d5d70b155
Add OSSLTest Engine
...
This engine is for testing purposes only. It provides crippled crypto
implementations and therefore must not be used in any instance where
security is required.
This will be used by the forthcoming libssl test harness which will operate
as a man-in-the-middle proxy. The test harness will be able to modify
TLS packets and read their contents. By using this test engine packets are
not encrypted and MAC codes always verify.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-08-11 20:27:46 +01:00
Matt Caswell
6a009812b2
Check for 0 modulus in BN_MONT_CTX_set
...
The function BN_MONT_CTX_set was assuming that the modulus was non-zero
and therefore that |mod->top| > 0. In an error situation that may not be
the case and could cause a seg fault.
This is a follow on from CVE-2015-1794.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-08-11 19:57:01 +01:00
Guy Leaver (guleaver)
61e72d761c
Fix seg fault with 0 p val in SKE
...
If a client receives a ServerKeyExchange for an anon DH ciphersuite with the
value of p set to 0 then a seg fault can occur. This commits adds a test to
reject p, g and pub key parameters that have a 0 value (in accordance with
RFC 5246)
The security vulnerability only affects master and 1.0.2, but the fix is
additionally applied to 1.0.1 for additional confidence.
CVE-2015-1794
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-08-11 19:57:01 +01:00
Matt Caswell
870063c83d
Normalise make errors output
...
make errors wants things in a different order to the way things are
currently defined in the header files. The easiest fix is to just let it
reorder it.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-08-11 19:57:01 +01:00
Rich Salz
fd682e4cdd
GH365: Missing #ifdef rename.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-08-10 12:17:53 -04:00
Rich Salz
fbfcb22439
RT3999: Remove sub-component version strings
...
Especially since after the #ifdef cleanups this is not useful.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-08-10 12:13:32 -04:00
Rich Salz
82c494276d
Fix build break.
...
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
2015-08-10 12:00:23 -04:00
Ben Laurie
4b9cb35d85
Find the right indent on *BSD.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-08-10 13:28:26 +01:00
bluelineXY
ff4a9394a2
GH357: Update ocsp.c
...
Add Host Header in OCSP query if no host header is set via -header
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Ben Laurie <ben@openssl.org >
2015-08-08 18:18:03 -04:00
David Woodhouse
2bfbeb2645
RT3998: fix X509_check_host.pod release to 1.0.2
...
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Ben Laurie <ben@openssl.org >
2015-08-08 18:13:25 -04:00
Adam Eijdenberg
e23a3fc8e3
Fix clang uninitialized variable warning.
...
We could just initialize it, but to be consistent with the rest of the file
it seemed to make more sense to just drop.
Reviewed-by: Ben Laurie <ben@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-08-06 22:45:29 +01:00
Matt Caswell
04fe876b56
Revert "Fix uninitalised warning."
...
This reverts commit 704563f04a .
Reverting in favour of the next commit which removes the underlying cause
of the warning.
Reviewed-by: Ben Laurie <ben@openssl.org >
2015-08-06 22:44:29 +01:00
Ben Laurie
704563f04a
Fix uninitalised warning.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-08-06 21:32:58 +01:00
Anton Blanchard
1125245997
RT3990: Fix #include path.
...
Signed-off-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-08-05 22:06:01 -04:00
Adam Eijdenberg
6f136aa6fc
Change error reason to match previous behaviour.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-08-04 15:15:38 -07:00
Adam Eijdenberg
6c3cca5793
Fix unhandled error condition in sslv2 client hello parsing.
...
--strict-warnings started showing warnings for this today...
Surely an error should be raised if these reads fail?
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-08-04 15:05:01 -07:00
Matt Caswell
e77bdc7310
Fix SRTP s_client/s_server options
...
The -use_srtp s_client/s_server option is supposed to take a colon
separated string as an argument. In master this was incorrectly set to
expect a filename.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-08-04 19:20:11 +01:00
Matt Caswell
c3fc7eeab8
PACKETise NextProto
...
Change NextProto message processing to use the PACKET API.
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-08-04 14:05:10 +01:00
Matt Caswell
f532a35d2a
PACKETise CertificateVerify processing
...
Modify CertificateVerify processing to use the new PACKET API.
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-08-04 13:56:50 +01:00
Matt Caswell
0bc09ecd26
PACKETise ClientCertificate processing
...
Use the PACKET API for processing ClientCertificate messages
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-08-04 13:15:29 +01:00
Matt Caswell
44128847e8
Fix a bug in the new PACKET implementation
...
Some of the PACKET functions were returning incorrect data. An unfortunate
choice of test data in the unit test was masking the failure.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-08-04 13:06:58 +01:00
Matt Caswell
8d11b7c7ee
Fix warning when compiling with no-ec2m
...
EC_KEY_set_public_key_affine_coordinates was using some variables that only
apply if OPENSSL_NO_EC2M is not defined.
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
2015-08-03 20:34:40 +01:00
Matt Caswell
496dbe1855
Fix make errors for the CCS changes
...
The move of CCS into the state machine was causing make errors to fail. This
fixes it.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-08-03 11:18:06 +01:00
Matt Caswell
e9f6b9a1a5
Fix ssl3_read_bytes handshake fragment bug
...
The move of CCS into the state machine introduced a bug in ssl3_read_bytes.
The value of |recvd_type| was not being set if we are satisfying the request
from handshake fragment storage. This can occur, for example, with
renegotiation and causes the handshake to fail.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-08-03 11:18:06 +01:00
Matt Caswell
c69f2adf71
Move DTLS CCS processing into the state machine
...
Continuing on from the previous commit this moves the processing of DTLS
CCS messages out of the record layer and into the state machine.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-08-03 11:18:05 +01:00
Matt Caswell
657da85eea
Move TLS CCS processing into the state machine
...
The handling of incoming CCS records is a little strange. Since CCS is not
a handshake message it is handled differently to normal handshake messages.
Unfortunately whilst technically it is not a handhshake message the reality
is that it must be processed in accordance with the state of the handshake.
Currently CCS records are processed entirely within the record layer. In
order to ensure that it is handled in accordance with the handshake state
a flag is used to indicate that it is an acceptable time to receive a CCS.
Previously this flag did not exist (see CVE-2014-0224), but the flag should
only really be considered a workaround for the problem that CCS is not
visible to the state machine.
Outgoing CCS messages are already handled within the state machine.
This patch makes CCS visible to the TLS state machine. A separate commit
will handle DTLS.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-08-03 11:18:05 +01:00
Matt Caswell
9ceb2426b0
PACKETise ClientHello processing
...
Uses the new PACKET code to process the incoming ClientHello including all
extensions etc.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-08-03 11:01:42 +01:00
Matt Caswell
6fc2ef20a9
PACKET unit tests
...
Add some unit tests for the new PACKET API
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-08-03 11:01:42 +01:00
Matt Caswell
7e729bb5a3
Add initial packet parsing code
...
Provide more robust (inline) functions to replace n2s, n2l, etc. These
functions do the same thing as the previous macros, but also keep track
of the amount of data remaining and return an error if we try to read more
data than we've got.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-08-03 11:01:42 +01:00
Ben Laurie
bb484020c3
Fix refactoring breakage.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-08-02 16:11:16 +01:00
Dr. Stephen Henson
5a168057bc
don't reset return value to 0
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-08-02 14:28:50 +01:00
Ben Laurie
480405e4a9
Add -Wconditional-uninitialized to clang strict warnings.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-08-02 02:45:44 +01:00
Ben Laurie
d237a2739c
Build with --strict-warnings on FreeBSD.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-08-02 02:21:46 +01:00
Ben Laurie
9e83e6cda9
Make BSD make happy with subdirectories.
...
Reviewed-by: Richard Levitte
2015-08-01 22:09:25 +01:00
Dirk Wetter
e36ce2d986
GH336: Return an exit code if report fails
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-08-01 14:32:32 -04:00
Ben Laurie
34750dc25d
Only define PAGE_SIZE if not already defined.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-07-31 20:50:07 +01:00
Matt Caswell
e1e088ec7f
Remove erroneous server_random filling
...
Commit e481f9b90b removed OPENSSL_NO_TLSEXT from the code.
Previously if OPENSSL_NO_TLSEXT *was not* defined then the server random was
filled during getting of the ClientHello. If it *was* defined then the
server random would be filled in ssl3_send_server_hello(). Unfortunately in
commit e481f9b90b the OPENSSL_NO_TLSEXT guards were removed but *both*
server random fillings were left in. This could cause problems for session
ticket callbacks.
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-07-31 20:30:35 +01:00
Loganaden Velvindron
1a586b3942
Clear BN-mont values when free'ing it.
...
From a CloudFlare patch.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2015-07-31 13:38:15 -04:00
Rich Salz
740ceb5b0c
Various doc fixes from GH pull requests
...
Thanks folks:
348 Benjamin Kaduk
317 Christian Brueffer
254 Erik Tews
253 Erik Tews
219 Carl Mehner
155 (ghost)
95 mancha
51 DominikNeubauer
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2015-07-31 12:27:27 -04:00
Kai Engert
898ea7b855
RT3742: Add xmpp_server to s_client.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-07-31 11:19:45 -04:00
Adam Eijdenberg
be0c03618a
RT3963: Allow OCSP stapling with -rev and -www
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-07-31 11:15:42 -04:00
Adam Eijdenberg
e46bcca25e
RT3962: Check accept_count only if not unlimited
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-07-31 11:13:58 -04:00
Adam Eijdenberg
902c6b95a3
RT3961: Fix switch/case errors in flag parsing
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-07-31 11:11:55 -04:00
Nicholas Cooper
119ab03aea
RT3959: Fix misleading comment
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-07-31 11:07:11 -04:00
Dr. Stephen Henson
3df16cc2e2
cleanse psk_identity on error
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-07-30 14:55:34 +01:00
Dr. Stephen Henson
a784665e52
Free and cleanse pms on error
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-07-30 14:55:33 +01:00
Dr. Stephen Henson
a3f7ff2b2d
Don't request certificates for any PSK ciphersuite
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-07-30 14:55:33 +01:00
Dr. Stephen Henson
69a3a9f5d9
CAMELLIA PSK ciphersuites from RFC6367
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-07-30 14:55:33 +01:00
Dr. Stephen Henson
b2f8ab8681
Add PSK ciphersuites to docs
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-07-30 14:55:33 +01:00
Dr. Stephen Henson
23237159f7
Update CHANGES
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-07-30 14:55:33 +01:00
Dr. Stephen Henson
5516fcc0c9
Add RFC4785 ciphersuites
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-07-30 14:43:36 +01:00
Dr. Stephen Henson
ea6114c6d0
Add RFC4279, RFC5487 and RFC5489 ciphersuites.
...
Note: some of the RFC4279 ciphersuites were originally part of PR#2464.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-07-30 14:43:36 +01:00
Dr. Stephen Henson
f40ecbc37c
Initial new PSK ciphersuite defines
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-07-30 14:43:35 +01:00
Dr. Stephen Henson
2a1a04e131
Add full PSK trace support
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-07-30 14:43:35 +01:00
Dr. Stephen Henson
8a0a12e5bf
PSK premaster secret derivation.
...
Move PSK premaster secret algorithm to ssl_generate_master secret so
existing key exchange code can be used and modified slightly to add
the PSK wrapping structure.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-07-30 14:43:35 +01:00
Dr. Stephen Henson
85269210ff
Extended PSK server support.
...
Add support for RSAPSK, DHEPSK and ECDHEPSK server side.
Update various checks to ensure certificate and server key exchange messages
are only sent when required.
Update message handling. PSK server key exchange parsing now include an
identity hint prefix for all PSK server key exchange messages. PSK
client key exchange message expects PSK identity and requests key for
all PSK key exchange ciphersuites.
Update flags for RSA, DH and ECDH so they are also used in PSK.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-07-30 14:43:35 +01:00
Dr. Stephen Henson
7689082b71
Extended PSK client support.
...
Add support for RSAPSK, DHEPSK and ECDHEPSK client side.
Update various checks to ensure certificate and server key exchange messages
are only expected when required.
Update message handling. PSK server key exchange parsing now expects an
identity hint prefix for all PSK server key exchange messages. PSK
client key exchange message requests PSK identity and key for all PSK
key exchange ciphersuites and includes identity in message.
Update flags for RSA, DH and ECDH so they are also used in PSK.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-07-30 14:43:35 +01:00
Dr. Stephen Henson
12053a81c8
PSK PRF correction.
...
For SHA384 PRF PSK ciphersuites we have to switch to default PRF for
TLS < 1.2
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-07-30 14:43:35 +01:00
Dr. Stephen Henson
adc5506adf
Make auto DH work with DHEPSK
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-07-30 14:43:35 +01:00
Dr. Stephen Henson
13be69f3e6
Check for kECDH with extensions.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-07-30 14:43:35 +01:00
Dr. Stephen Henson
526f94ad68
Enable PSK if corresponding mask set.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-07-30 14:43:35 +01:00
Dr. Stephen Henson
fe5eef3a3b
Disable all PSK if no callback.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-07-30 14:43:35 +01:00
Dr. Stephen Henson
332a251fd7
Disable unsupported PSK algorithms
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-07-30 14:43:35 +01:00
Dr. Stephen Henson
8baac6a224
new PSK text constants
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-07-30 14:43:35 +01:00
Dr. Stephen Henson
dcbd50608a
New PSK aliases.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-07-30 14:43:35 +01:00
Dr. Stephen Henson
0096d8f7e0
New PSK keyex text constants
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-07-30 14:43:35 +01:00
Dr. Stephen Henson
64651d3984
fields for PSK key, new constants
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-07-30 14:43:34 +01:00
Matt Caswell
5e8b24dbfb
Fix write failure handling in DTLS1.2
...
The DTLS code is supposed to drop packets if we try to write them out but
the underlying BIO write buffers are full. ssl3_write_pending() contains
an incorrect test for DTLS that controls this. The test only checks for
DTLS1 so DTLS1.2 does not correctly clear the internal OpenSSL buffer which
can later cause an assert to be hit. This commit changes the test to cover
all DTLS versions.
RT#3967
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-07-30 10:17:53 +01:00
Martin Vejnar
fa4629b6a2
RT3774: double-free in DSA
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-07-29 21:21:00 -04:00
Rich Salz
5bb17d1b3c
RT3639: Add -no_comp description to online help
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-07-29 16:58:55 -04:00
Rich Salz
932af1617e
Tweak README about rt and bug reporting.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-07-29 10:37:52 -04:00
Dr. Stephen Henson
14815a99d5
Document signature algorithm setting functions.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-07-28 16:56:04 +01:00
Dr. Stephen Henson
797a89a15a
Add some OCSP documentation.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-07-28 16:56:04 +01:00
Dr. Stephen Henson
431f458dfc
Allow any order for signature algorithm string.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-07-28 16:56:04 +01:00
Matt Caswell
3b848c642c
Add test for SSL_set_session_ticket_ext
...
The function SSL_set_session_ticket_ext sets the ticket data to be sent in
the ClientHello. This is useful for EAP-FAST. This commit adds a test to
ensure that when this function is called the expected ticket data actually
appears in the ClientHello.
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
2015-07-27 16:52:00 +01:00
Matt Caswell
57787ac814
Remove support for SSL3_FLAGS_DELAY_CLIENT_FINISHED
...
This flag was not set anywhere within the codebase (only read). It could
only be set by an app reaching directly into s->s3->flags and setting it
directly. However that method became impossible when libssl was opaquified.
Even in 1.0.2/1.0.1 if an app set the flag directly it is only relevant to
ssl3_connect(), which calls SSL_clear() during initialisation that clears
any flag settings. Therefore it could take effect if the app set the flag
after the handshake has started but before it completed. It seems quite
unlikely that any apps really do this (especially as it is completely
undocumented).
The purpose of the flag is suppress flushing of the write bio on the client
side at the end of the handshake after the client has written the Finished
message whilst resuming a session. This enables the client to send
application data as part of the same flight as the Finished message.
This flag also controls the setting of a second flag SSL3_FLAGS_POP_BUFFER.
There is an interesting comment in the code about this second flag in the
implementation of ssl3_write:
/* This is an experimental flag that sends the
* last handshake message in the same packet as the first
* use data - used to see if it helps the TCP protocol during
* session-id reuse */
It seems the experiment did not work because as far as I can tell nothing
is using this code. The above comment has been in the code since SSLeay.
This commit removes support for SSL3_FLAGS_DELAY_CLIENT_FINISHED, as well
as the associated SSL3_FLAGS_POP_BUFFER.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-07-27 15:00:05 +01:00
Emilia Kasper
f4ee22be03
rsaz_exp.h: align license with the rest of the contribution
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-07-23 14:20:28 +02:00
Dr. Stephen Henson
8a00dbd83e
Document shared sigalgs functions.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-07-23 02:51:38 +01:00
Rich Salz
9f040d6dec
Some cleanups for crypto/bn
...
Create bn_free_d utility routine and use it.
Fix RT3950
Also a missing cleanse, from Loganaden Velvindron (loganaden@gmail.com ),
who noticed it in a Cloudflare patch.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-07-22 14:43:05 -04:00
Dr. Stephen Henson
4445704f91
free names before context
...
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-07-21 14:27:25 +01:00
Dr. Stephen Henson
4fdf17a0ec
typo
...
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-07-21 14:16:09 +01:00
Dr. Stephen Henson
3d9ebc373f
Update demo.
...
Use new SSL_CONF options in demo. Add intermediate and root CAs and
update all to use SHA256.
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
2015-07-21 13:56:24 +01:00
Dr. Stephen Henson
429261d0d8
SSL_CONF additions.
...
Add support for loading verify and chain stores in SSL_CONF.
Commands to set verify mode and client CA names.
Add documentation.
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
2015-07-21 13:56:24 +01:00
Rich Salz
7e5363abe3
Rewrite crypto/ex_data
...
Removed ability to set ex_data impl at runtime. This removed these
three functions:
const CRYPTO_EX_DATA_IMPL *CRYPTO_get_ex_data_implementation(void);
int CRYPTO_set_ex_data_implementation(const CRYPTO_EX_DATA_IMPL *i);
int CRYPTO_ex_data_new_class(void);
It is no longer possible to change the ex_data implementation at
runtime. (Luckily those functions were never documented :)
Also removed the ability to add new exdata "classes." We don't believe
this received much (if any) use, since you can't add it to OpenSSL objects,
and there are probably better (native) methods for developers to add
their own extensible data, if they really need that.
Replaced the internal hash table (of per-"class" stacks) with a simple
indexed array. Reserved an index for "app" application.
Each API used to take the lock twice; now it only locks once.
Use local stack storage for function pointers, rather than malloc,
if possible (i.e., number of ex_data items is under a dozen).
Make CRYPTO_EX_DATA_FUNCS opaque/internal.
Also fixes RT3710; index zero is reserved.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-07-20 01:16:28 -04:00
Dr. Stephen Henson
f7d5348710
Use uint32_t consistently for flags.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-07-18 13:57:05 +01:00
Rich Salz
0bc2f36555
Remove obsolete key formats.
...
Remove support for RSA_NET and Netscape key format (-keyform n).
Also removed documentation of SGC.
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
2015-07-16 01:06:48 -04:00
mancha
31d6c0b2b0
Fix author credit for e5c0bc6
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-07-15 06:48:53 -04:00
Rich Salz
9e2e7b34eb
Revert "Missing perldoc markup around < literal"
...
This reverts commit e5c0bc6cc4 .
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-07-15 06:48:53 -04:00
Ernie Hershey
ad282e638b
GH322: Fix typo in generated comment.
...
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
2015-07-15 03:32:24 -04:00
Viktor Dukhovni
0dc41520f2
Maintain backwards-compatible SSLv23_method macros
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-07-15 01:46:03 -04:00
Rich Salz
5b89036c41
Can't use -trusted with -CA{path,file}
...
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
2015-07-14 07:46:20 -04:00
GitHub User
e5c0bc6cc4
Missing perldoc markup around < literal
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-07-14 01:32:18 -04:00
Richard Levitte
053fa39af6
Conversion to UTF-8 where needed
...
This leaves behind files with names ending with '.iso-8859-1'. These
should be safe to remove. If something went wrong when re-encoding,
there will be some files with names ending with '.utf8' left behind.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-07-14 01:10:01 +02:00
Richard Levitte
f608b4064d
Small script to re-encode files that need it to UTF-8
...
This requires 'iconv' and that 'file' can take the options '-b' and '-i'.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-07-14 01:10:01 +02:00
Richard Levitte
eeb97bce75
Remove extra '; \' in apps/Makefile
...
Fixes GH#330
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-07-13 15:48:57 +02:00
Richard Levitte
da24e6f8a0
Set numeric IDs for tar as well
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-07-10 20:29:16 +02:00
Richard Levitte
27f98436b9
Stop using tardy
...
Instead of piping through tardy, and possibly suffering from bugs in certain
versions, use --transform, --owner and --group directly with GNU tar (we
already expect that tar variant).
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-07-10 15:43:22 +02:00
Dr. Stephen Henson
2fc52c912a
correct example
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-07-09 21:22:42 +01:00
Peter Waltenberg
99dcd88035
Exit on error in ecparam
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-07-09 15:42:52 -04:00
Dr. Stephen Henson
851fdda1a1
make stacks
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-07-09 16:04:09 +01:00
Dr. Stephen Henson
88f4f91260
Sort @sstacklst correctly.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-07-09 16:04:09 +01:00
Matt Caswell
040b93353e
Apply some missing updates from previous commits
...
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-07-09 09:45:22 +01:00
Matt Caswell
6f47ced015
Update CHANGES and NEWS for the new release
...
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-07-09 09:30:46 +01:00
Matt Caswell
7f3f41d816
Extend -show_chain option to verify to show more info
...
The -show_chain flag to the verify command line app shows information about
the chain that has been built. This commit adds the text "untrusted" against
those certificates that have been used from the untrusted list.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-07-07 21:57:12 +01:00
Matt Caswell
a64ba70dbb
Add help text for some verify options
...
Fills in the help text for a number of options to verify that were blank.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-07-07 21:57:11 +01:00
Matt Caswell
79a55b1f27
Add documentation for some missing verify options
...
Fills in a couple of verify options that were lacking documentation.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-07-07 21:57:11 +01:00
Matt Caswell
aae41f8c54
Reject calls to X509_verify_cert that have not been reinitialised
...
The function X509_verify_cert checks the value of |ctx->chain| at the
beginning, and if it is NULL then it initialises it, along with the value
of ctx->untrusted. The normal way to use X509_verify_cert() is to first
call X509_STORE_CTX_init(); then set up various parameters etc; then call
X509_verify_cert(); then check the results; and finally call
X509_STORE_CTX_cleanup(). The initial call to X509_STORE_CTX_init() sets
|ctx->chain| to NULL. The only place in the OpenSSL codebase where
|ctx->chain| is set to anything other than a non NULL value is in
X509_verify_cert itself. Therefore the only ways that |ctx->chain| could be
non NULL on entry to X509_verify_cert is if one of the following occurs:
1) An application calls X509_verify_cert() twice without re-initialising
in between.
2) An application reaches inside the X509_STORE_CTX structure and changes
the value of |ctx->chain| directly.
With regards to the second of these, we should discount this - it should
not be supported to allow this.
With regards to the first of these, the documentation is not exactly
crystal clear, but the implication is that you must call
X509_STORE_CTX_init() before each call to X509_verify_cert(). If you fail
to do this then, at best, the results would be undefined.
Calling X509_verify_cert() with |ctx->chain| set to a non NULL value is
likely to have unexpected results, and could be dangerous. This commit
changes the behaviour of X509_verify_cert() so that it causes an error if
|ctx->chain| is anything other than NULL (because this indicates that we
have not been initialised properly). It also clarifies the associated
documentation. This is a follow up commit to CVE-2015-1793.
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-07-07 21:57:11 +01:00
Matt Caswell
593e9c638c
Add test for CVE-2015-1793
...
This adds a test for CVE-2015-1793. This adds a new test file
verify_extra_test.c, which could form the basis for additional
verification tests.
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-07-07 21:57:11 +01:00
Matt Caswell
2aacec8f4a
Fix alternate chains certificate forgery issue
...
During certificate verfification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to be
bypassed, such as the CA flag, enabling them to use a valid leaf
certificate to act as a CA and "issue" an invalid certificate.
This occurs where at least one cert is added to the first chain from the
trust store, but that chain still ends up being untrusted. In that case
ctx->last_untrusted is decremented in error.
Patch provided by the BoringSSL project.
CVE-2015-1793
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-07-07 21:57:11 +01:00
Richard Levitte
9cf315ef90
Document the nameopt change
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-07-07 14:50:10 +02:00
Richard Levitte
f1cece554d
Make "oneline" the default for nameopt
...
There's no reason why we should default to a output format that is
old, and confusing in some cases.
This affects the commands "ca", "crl", "req" and "x509".
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-07-07 11:17:14 +02:00
Dr. Stephen Henson
5727582cf5
document -2 return value
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-07-06 18:34:13 +01:00
Dr. Stephen Henson
9cca7be11d
Relax CCM tag check.
...
In CCM mode don't require a tag before initialising decrypt: this allows
the tag length to be set without requiring the tag.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-07-06 15:42:23 +01:00
Dr. Stephen Henson
36f038f104
Dup peer_chain properly in SSL_SESSION
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-06-30 14:00:43 +01:00
Dr. Stephen Henson
5fced2395d
Check for errors with SRP
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-06-29 19:20:23 +01:00
Dr. Stephen Henson
b34f691ddb
make update
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-06-29 11:47:59 +01:00
Dr. Stephen Henson
57b272b01a
Use single master secret generation function.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-06-29 11:47:59 +01:00
Kurt Roeckx
7f098cb436
Check dgram_sctp_write() return value.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-06-28 18:21:06 +02:00
Kurt Roeckx
03a1c85062
Check BIO_dgram_sctp_wait_for_dry() return value for error
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-06-28 18:21:06 +02:00
Dr. Stephen Henson
13cbe5e711
missing break
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-06-25 12:55:56 +01:00
Dr. Stephen Henson
ffbf304d48
Don't output bogus errors in PKCS12_parse
...
PR#3923
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-06-25 04:55:05 +01:00
Dr. Stephen Henson
77672802a6
Add docs for ssl verification parameter functions.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-06-24 22:16:54 +01:00
Rich Salz
d4dfb0baf9
Fix windows build
...
Move #include's inside the #ifdef.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-06-23 18:40:12 -04:00
Dr. Stephen Henson
a16ca4e8ae
Fix PSK client handling.
...
The PSK identity hint should be stored in the SSL_SESSION structure
and not in the parent context (which will overwrite values used
by other SSL structures with the same SSL_CTX).
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-06-23 22:34:47 +01:00
Dr. Stephen Henson
547dba74f3
Add PSK GCM ciphersuites from RFC5487
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-06-23 22:25:20 +01:00
Dr. Stephen Henson
52f782698d
PSK trace keyex fixes.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-06-23 22:25:20 +01:00
Dr. Stephen Henson
c72382048f
Avoid duplication.
...
We always free the handshake buffer when digests are freed so move
it into ssl_free_digest_list()
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-06-23 22:24:09 +01:00
Dr. Stephen Henson
124037fdc0
Tidy up ssl3_digest_cached_records logic.
...
Rewrite ssl3_digest_cached_records handling. Only digest cached records
if digest array is NULL: this means it is safe to call
ssl3_digest_cached_records multiple times (subsequent calls are no op).
Remove flag TLS1_FLAGS_KEEP_HANDSHAKE instead only update handshake buffer
if digest array is NULL.
Add additional "keep" parameter to ssl3_digest_cached_records to indicate
if the handshake buffer should be retained after digesting cached records
(needed for TLS 1.2 client authentication).
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-06-23 22:24:09 +01:00
Rich Salz
74924dcb38
More secure storage of key material.
...
Add secure heap for storage of private keys (when possible).
Add BIO_s_secmem(), CBIGNUM, etc.
Add BIO_CTX_secure_new so all BIGNUM's in the context are secure.
Contributed by Akamai Technologies under the Corporate CLA.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-06-23 17:09:35 -04:00
Rich Salz
ce7e647bc2
Add $! to errors, use script basename.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-06-23 08:39:52 -04:00
Vitezslav Cizek
4ba81134dc
GH297: Fix NAME section of SSL_CTX_use_serverinfo.pod
...
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-06-23 08:19:06 -04:00
Rich Salz
4b8d8e2ad3
RT3682: Avoid double-free on OCSP parse error
...
Found by Kurt Cancemi.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-06-23 08:12:01 -04:00
Russell Webb
2d540402aa
RT3856: Fix memory leaks in test code
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-06-23 07:59:15 -04:00
Richard Levitte
a1c506ae9e
make update
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-06-23 02:59:47 +02:00
Richard Levitte
ed45f3c242
Rearrange rsaz
...
A small rearrangement so the inclusion of rsaz_exp.h would be
unconditional, but what that header defines becomes conditional.
This solves the weirdness where rsaz_exp.h gets in and out of the
dependency list for bn_exp.c, depending on the present architecture.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-06-23 02:59:47 +02:00
Rich Salz
cc3f3fc2b1
RT3907-fix
...
Typo in local variable name; introduced by previous fix.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-06-22 20:49:21 -04:00
Rich Salz
75ba5c58c6
RT3907: avoid "local" in testssl script
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-06-22 15:49:33 -04:00
Dr. Stephen Henson
389ebcecae
Remove SESS_CERT entirely.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-06-22 13:52:24 +01:00
Dr. Stephen Henson
c34b0f9930
Move peer chain to SSL_SESSION structure.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-06-22 13:52:24 +01:00
Dr. Stephen Henson
8df53b7a7c
Remove unnuecessary ifdefs.
...
If RSA or DSA is disabled we will never use a ciphersuite with
RSA/DSA authentication as it is already filtered out by the cipher
list logic.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-06-22 13:52:24 +01:00
Dr. Stephen Henson
a273c6eeee
Remove certificates from sess_cert
...
As numerous comments indicate the certificate and key array is not an
appopriate structure to store the peers certificate: so remove it and
just the s->session->peer instead.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-06-22 13:52:24 +01:00
Dr. Stephen Henson
8d92c1f8a3
Remove peer temp keys from SESS_CERT
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-06-22 13:52:24 +01:00
Rich Salz
7fba8407cc
RT3917: add cleanup on an error path
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-06-21 17:52:12 -04:00
Richard Levitte
8ca96efd24
Cleanup mttest.c : because we no longer use stdio here, don't include it
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-06-21 21:45:48 +02:00
Richard Levitte
d62c98c81c
Add -ldl to the build of mttest.c
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-06-21 21:45:48 +02:00
Richard Levitte
03b672deca
Cleanup mttest.c : use BIO_free only, no preceding hacks
...
Since [sc]_ssl->[rw]bio aren't available, do not try to fiddle with
them. Surely, a BIO_free on the "main" BIOs should be enough
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-06-21 21:45:48 +02:00
Richard Levitte
964626957f
Cleanup mttest.c : do not try to output reference counts when threads are done
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-06-21 21:45:48 +02:00
Richard Levitte
7a1789d254
Cleanup mttest.c : better error reporting when certs are miggins
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-06-21 21:45:47 +02:00
Richard Levitte
f4c73bfe0a
Cleanup mttest.c : make ssl_method a pointer to const
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-06-21 21:45:47 +02:00
Richard Levitte
bb8abd6735
Cleanup mttest.c : modernise output
...
Construct bio_err and bio_stdout from file handles instead of FILE
pointers, since the latter might not be implemented (when OPENSSL_NO_STDIO
is defined).
Convert all output to use BIO_printf.
Change lh_foo to lh_SSL_SESSION_foo.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-06-21 21:45:47 +02:00
Richard Levitte
5c78e18352
Cleanup mttest.c : modernise the threads setup
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-06-21 21:45:47 +02:00
Richard Levitte
a3f9286556
Cleanup mttest.c : remove MS_CALLBACK
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-06-21 21:45:47 +02:00
Dr. Stephen Henson
f6a103133a
Revert "Avoid duplication."
...
This reverts commit d480e182fe .
Commit broke TLS handshakes due to fragility of digest caching: that will be
fixed separately.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-06-21 18:13:05 +01:00
Dr. Stephen Henson
d480e182fe
Avoid duplication.
...
We always free the handshake buffer when digests are freed so move
it into ssl_free_digest_list()
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-06-21 15:29:22 +01:00
Dr. Stephen Henson
85fb6fdaed
remove unnecessary NULL checks
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-06-21 15:29:22 +01:00
Dr. Stephen Henson
bc9567cdc9
typo: should be OPENSSL_free
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-06-20 16:10:54 +01:00
Richard Levitte
b4f0d1a4a8
Make preprocessor error into real preprocessor error
...
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-06-16 13:10:24 +02:00
Richard Levitte
30cf91784b
Remove one extraneous parenthesis
...
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-06-16 13:10:24 +02:00
Rich Salz
3b061a00e3
RT2547: Tighten perms on generated privkey files
...
When generating a private key, try to make the output file be readable
only by the owner. Put it in CHANGES file since it might be noticeable.
Add "int private" flag to apps that write private keys, and check that it's
set whenever we do write a private key. Checked via assert so that this
bug (security-related) gets fixed. Thanks to Viktor for help in tracing
the code-paths where private keys are written.
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
2015-06-15 18:26:56 -04:00
Rich Salz
d31fb0b5b3
Refactor into clear_ciphers; RT3588
...
While closing RT3588 (Remove obsolete comment) Kurt and I saw that a
few lines to completely clear the SSL cipher state could be moved into
a common function.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-06-15 10:08:19 -04:00
Tim Hudson
29eca1c0d5
Fix argument processing error from the option parsing change over.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-06-15 14:55:34 +10:00
Tim Hudson
e58ddf0af8
Fix argument processing error from the option parsing change over.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-06-15 11:36:32 +10:00
Dr. Stephen Henson
f2dc4d517f
Encode b == NULL or blen == 0 as zero.
...
PR#3904
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-06-13 12:25:42 +01:00
Adam Langley
1ae3fdbe6a
Allow a zero length extension block
...
It is valid for an extension block to be present in a ClientHello, but to
be of zero length.
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-06-12 15:40:33 +01:00
Matt Caswell
4b464e7b46
Fix ABI break with HMAC
...
Recent HMAC changes broke ABI compatibility due to a new field in HMAC_CTX.
This backs that change out, and does it a different way.
Thanks to Timo Teras for the concept.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-06-12 13:16:09 +01:00
Matt Caswell
063dccd027
Update CHANGES and NEWS
...
Updates to CHANGES and NEWS to take account of the latest security fixes.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-06-11 13:34:53 +02:00
Andy Polyakov
4924b37ee0
bn/bn_gf2m.c: avoid infinite loop wich malformed ECParamters.
...
CVE-2015-1788
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-06-11 13:34:13 +02:00
Emilia Kasper
59302b600e
PKCS#7: Fix NULL dereference with missing EncryptedContent.
...
CVE-2015-1790
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-06-11 11:06:31 +01:00
Emilia Kasper
f48b83b4fb
Fix length checks in X509_cmp_time to avoid out-of-bounds reads.
...
Also tighten X509_cmp_time to reject more than three fractional
seconds in the time; and to reject trailing garbage after the offset.
CVE-2015-1789
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-06-11 11:06:30 +01:00
Matt Caswell
708cf59358
More ssl_session_dup fixes
...
Fix error handling in ssl_session_dup, as well as incorrect setting up of
the session ticket. Follow on from CVE-2015-1791.
Thanks to LibreSSL project for reporting these issues.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-06-11 10:00:23 +01:00
Andy Polyakov
f0fa5c8306
e_aes_cbc_hmac_sha*.c: address linker warning about OPENSSL_ia32cap_P size mismatch.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-06-11 10:12:54 +02:00
Andy Polyakov
75c4827dfe
gcm.c: address linker warning about OPENSSL_ia32cap_P size mismatch.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-06-10 23:55:59 +02:00
Dr. Stephen Henson
633d49c7b4
Tidy disabled algorithm handling.
...
Determine disabled algorithm masks when algorithms are loaded instead of
recalculating them each time.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-06-10 21:56:23 +01:00
Dr. Stephen Henson
e1fa652d5e
Restore GOST mac setup.
...
Restore GOST mac setup which was accidentally removed during cipher
refactor.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-06-10 21:56:00 +01:00
Emilia Kasper
a8e4ac6a2f
Remove SSL_OP_TLS_BLOCK_PADDING_BUG
...
This is a workaround so old that nobody remembers what buggy clients
it was for. It's also been broken in stable branches for two years and
nobody noticed (see
https://boringssl-review.googlesource.com/#/c/1694/ ).
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-06-10 13:55:11 +02:00
Matt Caswell
91d13f1a76
DTLS handshake message fragments musn't span packets
...
It should not be possible for DTLS message fragments to span multiple
packets. However previously if the message header fitted exactly into one
packet, and the fragment body was in the next packet then this would work.
Obviously this would fail if packets get re-ordered mid-flight.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-06-10 12:06:29 +01:00
Matt Caswell
b821df5f5b
Correct type of RECORD_LAYER_get_rrec_length()
...
The underlying field returned by RECORD_LAYER_get_rrec_length() is an
unsigned int. The return type of the function should match that.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-06-10 12:06:29 +01:00
Matt Caswell
e43a13c807
Fix leak in HMAC error path
...
In the event of an error in the HMAC function, leaks can occur because the
HMAC_CTX does not get cleaned up.
Thanks to the BoringSSL project for reporting this issue.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-06-10 11:03:20 +01:00
Matt Caswell
68886be7e2
EC_POINT_is_on_curve does not return a boolean
...
The function EC_POINT_is_on_curve does not return a boolean value.
It returns 1 if the point is on the curve, 0 if it is not, and -1
on error. Many usages within OpenSSL were incorrectly using this
function and therefore not correctly handling error conditions.
With thanks to the Open Crypto Audit Project for reporting this issue.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-06-10 10:43:53 +01:00
Matt Caswell
b8b12aadd8
Change BIO_number_read and BIO_number_written() to be 64 bit
...
The return type of BIO_number_read() and BIO_number_written() as well as
the corresponding num_read and num_write members in the BIO structure has
been changed from unsigned long to uint64_t. On platforms where an unsigned
long is 32 bits (e.g. Windows) these counters could overflow if >4Gb is
transferred.
With thanks to the Open Crypto Audit Project for reporting this issue.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-06-10 10:40:50 +01:00
Matt Caswell
54e3ad003b
Tighten extension handling
...
This adds additional checks to the processing of extensions in a ClientHello
to ensure that either no extensions are present, or if they are then they
take up the exact amount of space expected.
With thanks to the Open Crypto Audit Project for reporting this issue.
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-06-10 10:09:57 +01:00
Matt Caswell
aec54108ef
Fix memory leaks in BIO_dup_chain()
...
This fixes a memory leak that can occur whilst duplicating a BIO chain if
the call to CRYPTO_dup_ex_data() fails. It also fixes a second memory leak
where if a failure occurs after successfully creating the first BIO in the
chain, then the beginning of the new chain was not freed.
With thanks to the Open Crypto Audit Project for reporting this issue.
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-06-10 10:09:57 +01:00
Matt Caswell
5d80fab086
Replace memset with OPENSSL_clear_free()
...
BUF_MEM_free() attempts to cleanse memory using memset immediately prior
to a free. This is at risk of being optimised away by the compiler, so
replace with a call to OPENSSL_clear_free() instead.
With thanks to the Open Crypto Audit Project for reporting this issue.
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-06-10 10:09:57 +01:00
Richard Levitte
e36c5fc4f5
Make sure test/gost2814789test.c can see configuration macros
...
test/gost2814789test.c needs to include openssl/e_os2.h or it wouldn't
see the defined OPENSSL_NO_* macros.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-06-10 02:03:03 +02:00
Richard Levitte
acaff3b797
When making libcrypto from apps or test, make sure to include engines
...
For librypto to be complete, the stuff in both crypto/ and engines/
have to be built. Doing 'make test' or 'make apps' from a clean
source tree failed to do so.
Corrected by using the new 'build_libcrypto' in the top Makefile.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-06-10 02:01:49 +02:00
Richard Levitte
177b5f9c82
Add and rearrange building of libraries
...
There's a need for a target that will build all of libcrypto, so let's
add 'build_libcrypto' that does this. For ortogonality, let's also
add 'build_libssl'. Have both also depend on 'libcrypto.pc' and
'libssl.pc' so those get built together with the libraries.
This makes 'all' depend on fewer things directly.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-06-10 02:01:49 +02:00
Rich Salz
121ee399c9
Fix -DZLIB build for opaque COMP types
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-06-09 12:49:50 -04:00
Rich Salz
7768e116dc
Use bio_err not stderr in apps.
...
Except for VMS startup code.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-06-09 12:48:55 -04:00
Rich Salz
51b04a6117
No fprintf in the txt_db component
...
Also removed a source file that isn't built, and moved
another one to test for eventual fixing.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-06-09 12:39:08 -04:00
Jeffrey Walton
82c4d79318
Explicitly mention PKCS5_PBKDF2_HMAC in EVP doc.
...
Signed-off-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-06-08 20:20:24 -04:00
Kurt Roeckx
1dece95168
Only allow a temporary rsa key exchange when they key is larger than 512.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
MR #588
2015-06-09 00:46:59 +02:00
Kurt Roeckx
26c79d5641
Properly check certificate in case of export ciphers.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
MR #588
2015-06-09 00:46:59 +02:00
Dr. Stephen Henson
0fb9990480
return correct NID for undefined object
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-06-08 21:44:56 +01:00
Emilia Kasper
2974e3d464
Use CRYPTO_memcmp in ssl3_record.c
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-06-08 14:57:04 +02:00
Emilia Kasper
1e4a355dca
Use CRYPTO_memcmp when comparing authenticators
...
Pointed out by Victor Vasiliev (vasilvv@mit.edu ) via Adam Langley
(Google).
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-06-08 14:55:50 +02:00
Rodger Combs
65d3941f4a
Increase buffer size for passwords in pkcs12 CLI
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-06-06 22:24:01 -04:00
Dr. Stephen Henson
9d3356b118
Update trace code.
...
Add extension and ciphersuites to trace code.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-06-06 13:19:58 +01:00
Dr. Stephen Henson
4336de0c63
Check ASN1_INTEGER_get for errors.
...
Check return value when calling ASN1_INTEGER_get to retrieve a certificate
serial number. If an error occurs (which will be caused by the value being
out of range) revert to hex dump of serial number.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-06-06 13:17:06 +01:00
Rich Salz
c0cf5b84dd
Set error code, no fprintf stderr, on errors.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-06-04 18:03:33 -04:00
Github User
6c40d469b7
GH293: Typo in CHANGES file.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-06-04 18:00:06 -04:00
Kurt Roeckx
3c06513f38
Allow all curves when the client doesn't send an supported elliptic curves extension
...
At least in the case of SSLv3 we can't send an extention.
Reviewed-by: Matt Caswell <matt@openssl.org >
MR #811
2015-06-04 20:48:52 +02:00
Rich Salz
9c422b5b1e
Rename all static TS_xxx to ts_xxx
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-06-04 09:47:18 -04:00
Matt Caswell
f3d889523e
Remove misleading comment
...
Remove a comment that suggested further clean up was required.
DH_free() performs the necessary cleanup.
With thanks to the Open Crypto Audit Project for reporting this issue.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-06-04 11:21:02 +01:00
Matt Caswell
b7ee4815f2
Clean premaster_secret for GOST
...
Ensure OPENSSL_cleanse() is called on the premaster secret value calculated for GOST.
With thanks to the Open Crypto Audit Project for reporting this issue.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-06-04 11:20:51 +01:00
Matt Caswell
c56353071d
Fix off-by-one error in BN_bn2hex
...
A BIGNUM can have the value of -0. The function BN_bn2hex fails to account
for this and can allocate a buffer one byte too short in the event of -0
being used, leading to a one byte buffer overrun. All usage within the
OpenSSL library is considered safe. Any security risk is considered
negligible.
With thanks to Mateusz Kocielski (LogicalTrust), Marek Kroemeke and
Filip Palian for discovering and reporting this issue.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-06-04 09:23:02 +01:00
Matt Caswell
7322abf5ce
Fix DTLS session resumption
...
The session object on the client side is initially created during
construction of the ClientHello. If the client is DTLS1.2 capable then it
will store 1.2 as the version for the session. However if the server is only
DTLS1.0 capable then when the ServerHello comes back the client switches to
using DTLS1.0 from then on. However the session version does not get
updated. Therefore when the client attempts to resume that session the
server throws an alert because of an incorrect protocol version.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-06-04 09:02:39 +01:00
Dr. Stephen Henson
97cacc537e
make update.
...
Make update with manual edit so EVP_PKEY_asn1_set_item uses the same
ordinal as 1.0.2.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-06-03 15:39:29 +01:00
Sergey Agievich
3418f7b7b0
Add funtions to set item_sign and item_verify
...
PR#3872
Reviewed-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Stephen Henson <steve@openssl.org >
(cherry picked from commit ad0fb7f498 )
Conflicts:
crypto/asn1/ameth_lib.c
2015-06-03 15:39:29 +01:00
Matt Caswell
133dce447b
Fix compilation failure for some tool chains
...
Some tool chains (e.g. android) do not define IP_PMTUDISC_PROBE, and so
this build breaks.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-06-02 23:35:28 +01:00
Annie Yousar
591b7aef05
RT3230: Better test for C identifier
...
objects.pl only looked for a space to see if the name could be
used as a C identifier. Improve the test to match the real C
rules.
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-06-02 17:16:54 -04:00
Rich Salz
9c3bcfa027
Standardize handling of #ifdef'd options.
...
Here are the "rules" for handling flags that depend on #ifdef:
- Do not ifdef the enum. Only ifdef the OPTIONS table. All ifdef'd
entries appear at the end; by convention "engine" is last. This
ensures that at run-time, the flag will never be recognized/allowed.
The next two bullets entries are for silencing compiler warnings:
- In the while/switch parsing statement, use #ifdef for the body to
disable it; leave the "case OPT_xxx:" and "break" statements outside
the ifdef/ifndef. See ciphers.c for example.
- If there are multiple options controlled by a single guard, OPT_FOO,
OPT_BAR, etc., put a an #ifdef around the set, and then do "#else"
and a series of case labels and a break. See OPENSSL_NO_AES in cms.c
for example.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-06-02 12:40:24 -04:00
Rich Salz
366e2a60b2
RT832: Use REUSEADDR in ocsp responder
...
I also re-ordered some of #ifdef's.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-06-02 12:22:38 -04:00
Jeffrey Walton
f20bb4eb18
RT3472: Doc pkcs8 -iter flag is in OpenSSL 1.1
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-06-02 11:58:03 -04:00
Richard Levitte
3f131556d6
Add the macro OPENSSL_SYS_WIN64
...
This is for consistency.
Additionally, have its presence define OPENSSL_SYS_WINDOWS as well.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-06-02 17:56:48 +02:00
Gunnar Kudrjavets
45d051c825
RT3848: Call SSL_COMP_free_compression_methods
...
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-06-02 11:53:12 -04:00
Olaf Johansson
8846adbd36
GH249: Fix bad regexp in arg parsing.
...
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-06-02 11:24:44 -04:00
Per Allansson
0baaff1a76
Fix IP_MTU_DISCOVER typo
...
The code in bss_dgram.c checks if IP_MTUDISCOVER is defined, where it
should test for IP_MTU_DISCOVER
RT#3888
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-06-02 12:57:31 +01:00
Matt Caswell
98ece4eebf
Fix race condition in NewSessionTicket
...
If a NewSessionTicket is received by a multi-threaded client when
attempting to reuse a previous ticket then a race condition can occur
potentially leading to a double free of the ticket data.
CVE-2015-1791
This also fixes RT#3808 where a session ID is changed for a session already
in the client session cache. Since the session ID is the key to the cache
this breaks the cache access.
Parts of this patch were inspired by this Akamai change:
c0bf69a791
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-06-02 09:30:12 +01:00
Matt Caswell
8c2b1d872b
Check the message type requested is the type received in DTLS
...
dtls1_get_message has an |mt| variable which is the type of the message that
is being requested. If it is negative then any message type is allowed.
However the value of |mt| is not checked in one of the main code paths, so a
peer can send a message of a completely different type and it will be
processed as if it was the message type that we were expecting. This has
very little practical consequences because the current behaviour will still
fail when the format of the message isn't as expected.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-06-01 00:30:15 +01:00
Rich Salz
1c8a527cff
Silence Clang warning about unit'd variable
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-05-31 17:58:36 -04:00
Dr. Stephen Henson
688c244685
fix warning
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-05-30 23:07:06 +01:00
Rich Salz
e0f9bf1de7
clear/cleanse cleanup
...
Where we called openssl_cleanse, make sure we do it on all error
paths. Be consistent in use of sizeof(foo) when possible.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-05-30 12:28:05 -04:00
Matt Caswell
6218a1f57e
Remove struct ccs_header_st
...
struct ccs_header_st is not used so it should be removed.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-29 16:24:42 +01:00
Dr. Stephen Henson
2d4deb256f
fix asn1parse -inform
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-05-29 12:09:25 +01:00
Richard Levitte
7ea9f90d77
Remove OPENSSL_CONF=/dev/null from tests
...
Almost two months ago, the warning about non-existing config file was
supressed by setting the environment variable OPENSSL_CONF to /dev/null
everywhere. Now that this warning is gone, that practice is no longer
needed.
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-29 12:41:50 +02:00
Richard Levitte
296f54ee21
Restore module loading
...
The module loading feature got broken a while ago, so restore it, but
have it a bit more explicit this time around.
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-05-29 12:41:50 +02:00
Richard Levitte
2142519500
Fix double BIO_free in req
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-05-29 12:41:50 +02:00
Peter Dettman
88f4c6f3d2
Fix build errors with enable-ec_nistp_64_gcc_128
...
RT 3871
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-29 12:40:53 +02:00
Rich Salz
cc01d21756
RT3876: Only load config when needed
...
Create app_load_config(), a routine to load config file. Remove the
"always load config" from the main app. Change the places that used to
load config to call the new common routine.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-28 17:28:33 -04:00
Dr. Stephen Henson
f097f81c89
PEM doc fixes
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-28 18:00:28 +01:00
Dr. Stephen Henson
2849707fa6
check for error when creating PKCS#8 structure
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-28 17:58:03 +01:00
Rich Salz
bca3f06b84
Use enum for X509_LOOKUP_TYPE
...
Using an enum with -Wswitch means all lookup routines handle
all cases. Remove X509_LU_PKEY which was never used.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-28 12:54:27 -04:00
Matt Caswell
d9f1c639d5
Change return type of the new accessors
...
The new accessors SSL_get_client_random, SSL_get_server_random and
SSL_SESSION_get_master_key should return a size_t to match the type of the
|outlen| parameter.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-28 16:55:15 +01:00
Matt Caswell
6b8f5d0d43
Change the new functions to use size_t
...
Change the new SSL_get_client_random(), SSL_get_server_random() and
SSL_SESSION_get_master_key() functions to use size_t for |outlen| instead of
int.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-05-28 16:05:56 +01:00
Nick Mathewson
7470cefcb2
Clarify that SSL3_RANDOM_SIZE is a constant, for now.
...
Signed-off-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-05-28 16:05:49 +01:00
Nick Mathewson
858618e7e0
Add new functions to extract {client,server}_random, master_key
...
Tor uses these values to implement a low-rent clone of RFC 5705 (which,
in our defense, we came up with before RFC 5705 existed). But now that
ssl_st is opaque, we need another way to get at them.
Includes documentation, with suitable warnings about not actually
using these functions.
Signed-off-by: Nick Mathewson <nickm@torproject.org >
Signed-off-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-05-28 16:05:01 +01:00
Nick Mathewson
9ef175148b
Add a documentation clarification suggested by Matt Caswell
...
Signed-off-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-05-28 16:00:47 +01:00
Nick Mathewson
831eef2cf5
Add SSL_get_client_ciphers() to return ciphers from ClientHello
...
On the server side, if you want to know which ciphers the client
offered, you had to use session->ciphers. But that field is no
longer visible, so we need a method to get at it.
Signed-off-by: Nick Mathewson <nickm@torproject.org >
Signed-off-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-05-28 16:00:23 +01:00
Emilia Kasper
15a06488fc
Enable DH tests
...
In master, the 'dh' command is gone, so use 'dhparam' instead to
determine if we're compiled with DH.
Also, set "@SECLEVEL=1" for the weak DH test, so that it actually
passes.
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2015-05-27 17:22:56 +02:00
Dr. Stephen Henson
f2e19cb15e
make update
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-26 13:24:59 +01:00
Dr. Stephen Henson
0ceb8b74f5
scrypt in pkcs8 util
...
Add support for PKCS#8 private key encryption using the scrypt algorithm
in the pkcs8 utility. Update documentation.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-26 13:09:26 +01:00
Dr. Stephen Henson
6355d31538
Add function PKCS8_set0_pbe
...
This adds a new function which will encrypt a private key using PKCS#8
based on an X509_ALGOR structure and reimplements PKCS8_encrypt to use it.
Update pkcs8 utlity to use PKCS8_set0_pbe.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-26 13:09:26 +01:00
Dr. Stephen Henson
fef034f85e
Error if memory limit exceeded.
...
Set a specific error if the parameters are otherwise valid but exceed the
memory limit.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-26 13:09:25 +01:00
Dr. Stephen Henson
764ca96c95
Fix memory leak.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-26 13:09:25 +01:00
Dr. Stephen Henson
351fe21402
Add PBE tests.
...
Add support for PKCS#12 and PBKDF2 password based encryption tests. Add
additional test data.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-26 13:04:13 +01:00
Emilia Kasper
e8356e32ae
Fix ssltest to use 1024-bit DHE parameters
...
Also add more ciphersuite test coverage, and a negative test for
512-bit DHE.
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 1ee85aab75 )
2015-05-26 12:49:26 +02:00
Matt Caswell
9c89d29083
Don't check for a negative SRP extension size
...
The size of the SRP extension can never be negative (the variable
|size| is unsigned). Therefore don't check if it is less than zero.
RT#3862
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-26 10:35:29 +01:00
Matt Caswell
90e7cdff3a
Fix error check in GOST engine
...
The return value of i2d functions can be negative if an error occurs.
Therefore don't assign the return value to an unsigned type and *then*
check if it is negative.
RT#3862
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-26 10:35:22 +01:00
Matt Caswell
fc52ac9028
Handle unsigned struct timeval members
...
The members of struct timeval on OpenVMS are unsigned. The logic for
calculating timeouts needs adjusting to deal with this.
RT#3862
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-26 10:34:56 +01:00
Andy Polyakov
f8a35ccc57
Configure: replace -mv8 with -mcpu=v8 in SPARC config lines.
...
RT#3860
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-05-26 10:19:10 +02:00
Billy Brumley
71f6130b7a
fix copy paste error in ec_GF2m function prototypes
...
RT#3858
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-05-26 10:12:22 +02:00
Andy Polyakov
60c268b21a
bn/bn_lcl.h: fix MIPS-specific gcc version check.
...
RT#3859
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-05-26 10:06:28 +02:00
Hanno Böck
cf89a80e25
RT3861: Mem/bio leak in req command
...
The "out" variable is used for both key and csr. Close it after
writing the first one so it can be re-used when writing the other.
Signed-off-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-05-25 19:13:26 -04:00
Rich Salz
cc630cdbcc
Fix segfault in ec command
...
Thanks to Brian Carpenter <brian.carpenter@gmail.com > for finding this.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-05-25 19:11:22 -04:00
Matt Caswell
02db21dfb4
Don't send an alert if we've just received one
...
If the record received is for a version that we don't support, previously we
were sending an alert back. However if the incoming record already looks
like an alert then probably we shouldn't do that. So suppress an outgoing
alert if it looks like we've got one incoming.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-05-25 17:48:41 +01:00
Rich Salz
fc0eb00bca
fix s_client crash
...
The 'http proxy' commit broke s_client default host/port value.
Thanks to Matt for the simplest fix.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-05-25 12:46:57 -04:00
Matt Caswell
81fc390fd9
Set first_packet for TLS clients
...
Version negotiation was broken (one of the late changes in the review
process broke it). The problem is that TLS clients do not set first_packet,
whereas TLS/DTLS servers and DTLS clients do. The simple fix is to set
first_packet for TLS clients too.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-05-24 23:54:12 +01:00
Andy Polyakov
69567687b0
bn/asm/x86_64-mont5.pl: fix valgrind error.
...
bn_get_bits5 was overstepping array boundary by 1 byte. It was exclusively
read overstep and data could not have been used. The only potential problem
would be if array happens to end on the very edge of last accesible page.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-24 21:30:39 +02:00
Andy Polyakov
86e5d1e32b
bn/bn_gf2m.c: appease STACK, unstable code detector.
...
RT#3852
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-24 21:25:59 +02:00
Richard Levitte
8b822d2566
Fix update and depend in engines/
...
The update: target in engines/ didn't recurse into engines/ccgost.
The update: and depend: targets in engines/ccgost needed a fixup.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-23 06:33:41 +02:00
Richard Levitte
6f45032f67
Missed a couple of spots in the update change
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-23 06:14:22 +02:00
Matt Caswell
fdfe8b06ae
Fix typo setting up certificate masks
...
The certificate masks are used to select which ciphersuite we are going to
use. The variables |emask_k| and |emask_a| relate to export grade key
exchange and authentication respecitively. The variables |mask_k| and
|mask_a| are the equivalent versions for non-export grade. This fixes an
instance where the two usages of export/non-export were mixed up. In
practice it makes little difference since it still works!
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-22 23:59:33 +01:00
Matt Caswell
13f8eb4730
Remove export static DH ciphersuites
...
Remove support for the two export grade static DH ciphersuites. These two
ciphersuites were newly added (along with a number of other static DH
ciphersuites) to 1.0.2. However the two export ones have *never* worked
since they were introduced. It seems strange in any case to be adding new
export ciphersuites, and given "logjam" it also does not seem correct to
fix them.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-22 23:58:52 +01:00
Matt Caswell
efee575ad4
Fix off-by-one in BN_rand
...
If BN_rand is called with |bits| set to 1 and |top| set to 1 then a 1 byte
buffer overflow can occur. There are no such instances within the OpenSSL at
the moment.
Thanks to Mateusz Kocielski (LogicalTrust), Marek Kroemeke, Filip Palian for
discovering and reporting this issue.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-05-22 23:40:38 +01:00
Matt Caswell
7cc18d8158
Reject negative shifts for BN_rshift and BN_lshift
...
The functions BN_rshift and BN_lshift shift their arguments to the right or
left by a specified number of bits. Unpredicatable results (including
crashes) can occur if a negative number is supplied for the shift value.
Thanks to Mateusz Kocielski (LogicalTrust), Marek Kroemeke and Filip Palian
for discovering and reporting this issue.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-05-22 23:15:02 +01:00
Matt Caswell
2c55a0bc93
Add CHANGES entry for OPENSSL_NO_TLSEXT removal
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-22 23:11:22 +01:00
Matt Caswell
e481f9b90b
Remove support for OPENSSL_NO_TLSEXT
...
Given the pervasive nature of TLS extensions it is inadvisable to run
OpenSSL without support for them. It also means that maintaining
the OPENSSL_NO_TLSEXT option within the code is very invasive (and probably
not well tested). Therefore it is being removed.
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-22 23:10:51 +01:00
Michael Trapp
552bf8ec5e
RT266: Add HTTP proxy/CONNECT to s_client
...
Signed-off-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-22 16:56:59 -04:00
Richard Levitte
0f539dc1a2
Fix the update target and remove duplicate file updates
...
We had updates of certain header files in both Makefile.org and the
Makefile in the directory the header file lived in. This is error
prone and also sometimes generates slightly different results (usually
just a comment that differs) depending on which way the update was
done.
This removes the file update targets from the top level Makefile, adds
an update: target in all Makefiles and has it depend on the depend: or
local_depend: targets, whichever is appropriate, so we don't get a
double run through the whole file tree.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-22 18:44:33 +02:00
Matt Caswell
8757bf8377
Ignore files from other branches
...
There are a number of files that are created on other branches that are
not held in git and are not needed in master. When checking out master
after working on another branch these files show up in "git status", so
just add them to .gitignore
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-22 11:09:19 +01:00
Lubom
4dc1aa0436
Lost alert in DTLS
...
If a client receives a bad hello request in DTLS then the alert is not
sent correctly.
RT#2801
Signed-off-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-05-22 09:41:54 +01:00
Matt Caswell
a7f82a1ab2
Fix various OPENSSL_NO_* options
...
This fixes compilation with various OPENSSL_NO_* options that got broken
during the big apps cleanup.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-22 09:38:37 +01:00
Matt Caswell
6b41b3f5ea
Fix a memory leak in compression
...
The function RECORD_LAYER_clear() is supposed to clear the contents of the
RECORD_LAYER structure, but retain certain data such as buffers that are
allocated. Unfortunately one buffer (for compression) got missed and was
inadvertently being wiped, thus causing a memory leak.
In part this is due to the fact that RECORD_LAYER_clear() was reaching
inside SSL3_BUFFERs and SSL3_RECORDs, which it really shouldn't. So, I've
rewritten it to only clear the data it knows about, and to defer clearing
of SSL3_RECORD and SSL3_BUFFER structures to SSL_RECORD_clear() and the
new function SSL3_BUFFER_clear().
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-22 08:08:45 +01:00
Dr. Stephen Henson
3a752c85ee
make update
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-21 12:48:03 +01:00
Dr. Stephen Henson
941fbf711a
correction
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-21 12:48:03 +01:00
Dr. Stephen Henson
e98aa30d55
Add scrypt PBE algorithm code.
...
This adds support for the ASN.1 structures in draft-josefsson-scrypt-kdf-03
Private keys encrypted by scrypt can now be decrypted transparently as long
as they don't exceed the memory limits.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-21 12:48:02 +01:00
Dr. Stephen Henson
96b96d6c45
Add scrypt OID from draft-josefsson-scrypt-kdf-03
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-21 12:48:02 +01:00
Rich Salz
3e8e688f86
Replace switch/assignments with table lookup
...
Typedef STRINT_PAIR to be the same as OPT_PAIR, and use that structure and
a bunch of tables instead of switch statements to lookup various values
out of the SSL/TLS message buffers. Shrinks a bunch of code.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-20 17:51:52 -04:00
Kurt Roeckx
ac38115c1a
Correctly check for export size limit
...
40 bit ciphers are limited to 512 bit RSA, 56 bit ciphers to 1024 bit.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-20 22:18:44 +02:00
Dr. Stephen Henson
c5f2810581
Add functions to convert between uint64_t and ASN1_INTEGER.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-20 15:04:19 +01:00
Emilia Kasper
de57d23729
Only support >= 256-bit elliptic curves with ecdh_auto (server) or by default (client).
...
Also reorder preferences to prefer prime curves to binary curves, and P-256 to everything else.
The result:
$ openssl s_server -named_curves "auto"
This command will negotiate an ECDHE ciphersuite with P-256:
$ openssl s_client
This command will negotiate P-384:
$ openssl s_client -curves "P-384"
This command will not negotiate ECDHE because P-224 is disabled with "auto":
$ openssl s_client -curves "P-224"
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-20 15:47:51 +02:00
Emilia Kasper
1554d55318
Remove dh512.pem
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-20 15:10:26 +02:00
Emilia Kasper
1f302db3e7
Update documentation with Diffie-Hellman best practices.
...
- Do not advise generation of DH parameters with dsaparam to save
computation time.
- Promote use of custom parameters more, and explicitly forbid use of
built-in parameters weaker than 2048 bits.
- Advise the callback to ignore <keylength> - it is currently called
with 1024 bits, but this value can and should be safely ignored by
servers.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-20 15:10:26 +02:00
Emilia Kasper
b5a379aae5
dhparam: fix documentation
...
The default bitlength is now 2048. Also clarify that either the number
of bits or the generator must be present:
$ openssl dhparam -2
and
$ openssl dhparam 2048
generate parameters but
$ openssl dhparam
does not.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-05-20 15:10:26 +02:00
Dr. Stephen Henson
5a1d250906
make update
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-05-20 14:01:19 +01:00
Dr. Stephen Henson
3b53e18a4f
Add scrypt tests.
...
Add scrypt test support to evp_test and add test values from
from draft-josefsson-scrypt-kdf-03.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-20 12:21:31 +01:00
Dr. Stephen Henson
a95fb9e358
Add scrypt support.
...
Add scrypt algorithm as described in draft-josefsson-scrypt-kdf-03
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-20 12:21:31 +01:00
StudioEtrange
3a114e6164
GitHub284: Fix typo in xx-32.pl scripts.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-20 04:18:55 -04:00
Andy Polyakov
579734ced6
bn/asm/vis3-mont.pl: fix intermittent EC failures on SPARC T3.
...
BLKINIT optimization worked on T4, but for some reason appears "too
aggressive" for T3 triggering intermiitent EC failures. It's not clear
why only EC is affected...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-05-20 09:11:25 +02:00
Dr. Stephen Henson
4d69f9e69d
move masks out of CERT structure
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-19 14:05:29 +01:00
Robert Swiecki
00d565cfbe
Don't add write errors into bytecounts
...
Signed-off-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-05-19 07:19:38 -04:00
Dr. Stephen Henson
6383d31645
Move certificate validity flags out of CERT.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-18 18:49:13 +01:00
Dr. Stephen Henson
d376e57d68
Move signing digest out of CERT.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-18 18:49:13 +01:00
Dr. Stephen Henson
76106e60a8
CERT tidy
...
Move per-connection state out of the CERT structure: which should just be
for shared configuration data (e.g. certificates to use).
In particular move temporary premaster secret, raw ciphers, peer signature
algorithms and shared signature algorithms.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-18 18:49:13 +01:00
Dr. Stephen Henson
6c5b6cb035
ASN1 INTEGER refactor.
...
Rewrite and tidy ASN1_INTEGER and ASN1_ENUMERATED handling.
Remove code duplication.
New functions to convert between int64_t and ASN.1 types without the
quirks of the old long conversion functions.
Add documentation.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-18 18:38:42 +01:00
Dr. Stephen Henson
978327bcad
Add types to indent.pro
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-17 18:35:21 +01:00
Matt Caswell
b2ce0337e8
Further version negotiation updates
...
More miscellaneous updates to version negotiation following feedback.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-05-16 09:21:07 +01:00
Matt Caswell
a304d38590
Move SSLv3_*method() functions
...
Move these functions into t1_clnt.c, t1_srvr.c and t1_meth.c and take
advantage of the existing tls1_get*_method() functions that all the other
methods are using. Since these now have to support SSLv3 anyway we might
as well use the same set of get functions for both TLS and SSLv3.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-05-16 09:20:58 +01:00
Matt Caswell
d45ba43dab
Updates following review comments
...
Miscellaneous updates following review comments on the version negotiation
rewrite patches.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-05-16 09:20:52 +01:00
Matt Caswell
a27e81ee54
Version negotiation rewrite doc updates
...
Update various documentation references to the new TLS_*_method names. Also
add a CHANGES entry.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-05-16 09:20:44 +01:00
Matt Caswell
a3680c8f9c
Version negotiation rewrite cleanup
...
Following the version negotiation rewrite all of the previous code that was
dedicated to version negotiation can now be deleted - all six source files
of it!!
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-05-16 09:20:38 +01:00
Matt Caswell
13c9bb3ece
Client side version negotiation rewrite
...
Continuing from the previous commit this changes the way we do client side
version negotiation. Similarly all of the s23* "up front" state machine code
has been avoided and again things now work much the same way as they already
did for DTLS, i.e. we just do most of the work in the
ssl3_get_server_hello() function.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-05-16 09:20:31 +01:00
Matt Caswell
32ec41539b
Server side version negotiation rewrite
...
This commit changes the way that we do server side protocol version
negotiation. Previously we had a whole set of code that had an "up front"
state machine dedicated to the negotiating the protocol version. This adds
significant complexity to the state machine. Historically the justification
for doing this was the support of SSLv2 which works quite differently to
SSLv3+. However, we have now removed support for SSLv2 so there is little
reason to maintain this complexity.
The one slight difficulty is that, although we no longer support SSLv2, we
do still support an SSLv3+ ClientHello in an SSLv2 backward compatible
ClientHello format. This is generally only used by legacy clients. This
commit adds support within the SSLv3 code for these legacy format
ClientHellos.
Server side version negotiation now works in much the same was as DTLS,
i.e. we introduce the concept of TLS_ANY_VERSION. If s->version is set to
that then when a ClientHello is received it will work out the most
appropriate version to respond with. Also, SSLv23_method and
SSLv23_server_method have been replaced with TLS_method and
TLS_server_method respectively. The old SSLv23* names still exist as
macros pointing at the new name, although they are deprecated.
Subsequent commits will look at client side version negotiation, as well of
removal of the old s23* code.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-05-16 09:19:56 +01:00
Rich Salz
756eff7a31
Remove unused #ifdef's from header files
...
And remove a duplicate comment, probably from a merge hiccup.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-05-15 14:39:27 -04:00
Rich Salz
857048a7f3
Use #error in openssl/srp.h
...
Follow the same convention the other OPENSSL_NO_xxx header files
do, and use #error instead of making the header file be a no-op.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-05-15 08:16:21 -04:00
Rich Salz
2eb264a14b
Make up for a missed 'make update' update.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-05-15 06:48:14 -04:00
Rich Salz
9f5be870e8
Update mkdef for moved header file.
...
crypto/cryptlib.h moved to crypto/include/internal; update
the script.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-14 15:58:14 -04:00
Richard Levitte
a3aadb2d9c
make depend
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-14 17:38:31 +02:00
Richard Levitte
a120ed39a6
Add -Iinclude to crypto/ compiles
...
The move of headers from crypto/ to crypto/include/internal/ needs
this extra inclusion directory or the build fails.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-14 17:36:13 +02:00
Richard Levitte
b39fc56061
Identify and move common internal libcrypto header files
...
There are header files in crypto/ that are used by a number of crypto/
submodules. Move those to crypto/include/internal and adapt the
affected source code and Makefiles.
The header files that got moved are:
crypto/cryptolib.h
crypto/md32_common.h
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-14 17:21:40 +02:00
Richard Levitte
7a05eaac5e
Adjust unixly mk1mf after introduction of tkey
...
Added depencies on the public variants of some keys in test to Makefile.
Added the newly introduced key files from test/ in the list of files
to copy in util/pl/unix.pl.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-14 15:55:59 +02:00
Richard Levitte
c40dba984a
make depend
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-05-14 15:14:25 +02:00
Richard Levitte
6857079791
Identify and move OpenSSL internal header files
...
There are header files in crypto/ that are used by the rest of
OpenSSL. Move those to include/internal and adapt the affected source
code, Makefiles and scripts.
The header files that got moved are:
crypto/constant_time_locl.h
crypto/o_dir.h
crypto/o_str.h
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-05-14 15:13:49 +02:00
Richard Levitte
167f6c93b0
Move definition of INTxx_MIN et al to internal header
...
Having the INTxx_MIN et al macros defined in a public header is
unnecessary and risky. Also, it wasn't done for all platforms that
might need it.
So we move those numbers to an internal header file, do the math
ourselves and make sure to account for the integer representations we
know of.
This introduces include/internal, which is unproblematic since we
already use -I$(TOP)/include everywhere. This directory is different
from crypto/include/internal, as the former is more general internal
headers for all of OpenSSL, while the latter is for libcrypto only.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-05-14 12:22:18 +02:00
Dr. Stephen Henson
1c7b2c0ed5
use unit64_t for CPUID and timestamp code
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-05-14 02:06:17 +01:00
Dr. Stephen Henson
c1a623c55a
Allow use of standard integer types.
...
Include appropriate headers for standard integer types in e_os2.h
This should use stdint.h, inttypes.h or a workaround for systems which
have neither.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-05-14 02:06:17 +01:00
Rich Salz
98cd49db1d
Add missing ctype.h
...
Had old patch, forgot to push/patch this to master
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-05-13 14:41:53 -04:00
Rich Salz
fc3cec5350
Fix ocsp bugs
...
Various bugs found by Viktor, Emilia, Matt, etc.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-05-13 13:19:14 -04:00
Rich Salz
580139bd5b
RT3841: memset() cipher_data when allocated
...
If an EVP implementation (such as an engine) fails out early, it's
possible to call EVP_CIPHER_CTX_cleanup() which will call
ctx->cipher->cleanup() before the cipher_data has been initialized
via ctx->cipher->init(). Guarantee it's all-bytes-zero as soon as
it is allocated.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-05-13 13:05:07 -04:00
Rich Salz
c490a5512e
RT1207: document SSL_COMP_free_compression_methods.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-05-13 13:00:37 -04:00
Rich Salz
addaf977e2
Remove some outdated #defines.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-05-13 12:52:03 -04:00
Andy Polyakov
bd576049a9
util/incore update.
...
Support cross-compile platforms that don't support FINGERPRINT_premain,
e.g. VxWorks.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-13 17:23:48 +02:00
Andy Polyakov
7ee7f92025
bn/Makefile: give MacOS X hand to compiler armv8-mont module.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-13 17:14:22 +02:00
Andy Polyakov
d38f1b39f1
bn/asm/armv8-mont.pl: boost performance.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-13 17:14:00 +02:00
Andy Polyakov
d11582f133
Configurations/10-main.conf: update iOS commentary.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-13 17:11:28 +02:00
Andy Polyakov
c4cd831606
aes/asm/bsaes-armv7.pl: fix compilation with Xcode 6.3.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-13 17:11:00 +02:00
Andy Polyakov
82c4a07939
aes/asm/aesni-sha256-x86_64.pl: fix Windows compilation failure with old assembler.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-05-13 16:58:37 +02:00
Hanno Böck
2b8dc08b74
Call of memcmp with null pointers in obj_cmp()
...
The function obj_cmp() (file crypto/objects/obj_dat.c) can in some
situations call memcmp() with a null pointer and a zero length.
This is invalid behaviour. When compiling openssl with undefined
behaviour sanitizer (add -fsanitize=undefined to compile flags) this
can be seen. One example that triggers this behaviour is the pkcs7
command (but there are others, e.g. I've seen it with the timestamp
function):
apps/openssl pkcs7 -in test/testp7.pem
What happens is that obj_cmp takes objects of the type ASN1_OBJECT and
passes their ->data pointer to memcmp. Zero-sized ASN1_OBJECT
structures can have a null pointer as data.
RT#3816
Signed-off-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-13 15:23:57 +01:00
Matt Caswell
c3d734701c
Add CHANGES entry for Kerberos removal
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-13 15:08:17 +01:00
Matt Caswell
e36827f6d1
Remove remaining Kerberos references
...
Following on from the removal of libcrypto and libssl support for Kerberos
this commit removes all remaining references to Kerberos.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-13 15:08:10 +01:00
Matt Caswell
60b3d36df3
Remove Kerberos support from libcrypto
...
Remove libcrypto support for Kerberos following on from the previous commit
which removed it from libssl.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-13 15:08:04 +01:00
Matt Caswell
55a9a16f1c
Remove Kerberos support from libssl
...
Remove RFC2712 Kerberos support from libssl. This code and the associated
standard is no longer considered fit-for-purpose.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-13 15:07:57 +01:00
Matt Caswell
5561419a60
Remove Kerberos support from apps
...
Remove Kerberos related options from the apps to prepare for the
subsequent commits which will remove libcrypto and libssl support for
Kerberos.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-13 15:07:34 +01:00
Matt Caswell
a0bd649336
Don't allow a CCS when expecting a CertificateVerify
...
Currently we set change_cipher_spec_ok to 1 before calling
ssl3_get_cert_verify(). This is because this message is optional and if it
is not sent then the next thing we would expect to get is the CCS. However,
although it is optional, we do actually know whether we should be receiving
one in advance. If we have received a client cert then we should expect
a CertificateVerify message. By the time we get to this point we will
already have bombed out if we didn't get a Certificate when we should have
done, so it is safe just to check whether |peer| is NULL or not. If it is
we won't get a CertificateVerify, otherwise we will. Therefore we should
change the logic so that we only attempt to get the CertificateVerify if
we are expecting one, and not allow a CCS in this scenario.
Whilst this is good practice for TLS it is even more important for DTLS.
In DTLS messages can be lost. Therefore we may be in a situation where a
CertificateVerify message does not arrive even though one was sent. In that
case the next message the server will receive will be the CCS. This could
also happen if messages get re-ordered in-flight. In DTLS if
|change_cipher_spec_ok| is not set and a CCS is received it is ignored.
However if |change_cipher_spec_ok| *is* set then a CCS arrival will
immediately move the server into the next epoch. Any messages arriving for
the previous epoch will be ignored. This means that, in this scenario, the
handshake can never complete. The client will attempt to retransmit
missing messages, but the server will ignore them because they are the wrong
epoch. The server meanwhile will still be waiting for the CertificateVerify
which is never going to arrive.
RT#2958
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-05-13 11:17:17 +01:00
Gunnar Kudrjavets
56d88027f0
Fix the heap corruption in libeay32!OBJ_add_object.
...
Original 'sizeof(ADDED_OBJ)' was replaced with 'sizeof(*ao)'. However,
they return different sizes. Therefore as the result heap gets corrupted
and at some point later debug version of malloc() detects the corruption.
On x86 we can observe that as follows:
sizeof(*ao) == 4
sizeof(*ao[0]) == sizeof(ADDED_OBJ) == 8
Issue reproduces with either enabling CRT debug heap or Application
Verifier's full-page heap.
Basic debugging data from the moment the corruption is first detected:
0:000:x86> |
. 0 id: 283c create name: openssl.exe
0:000:x86> kcn
#
00 MSVCR120D!_heap_alloc_dbg_impl
01 MSVCR120D!_nh_malloc_dbg_impl
02 MSVCR120D!_nh_malloc_dbg
03 MSVCR120D!malloc
04 LIBEAY32!default_malloc_ex
05 LIBEAY32!CRYPTO_malloc
06 LIBEAY32!lh_insert
07 LIBEAY32!OBJ_add_object
08 LIBEAY32!OBJ_create
09 openssl!add_oid_section
0a openssl!req_main
0b openssl!do_cmd
0c openssl!main
0d openssl!__tmainCRTStartup
0e openssl!mainCRTStartup
0f KERNEL32!BaseThreadInitThunk
10 ntdll_77d60000!__RtlUserThreadStart
11 ntdll_77d60000!_RtlUserThreadStart
Signed-off-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-13 09:23:23 +01:00
Dr. Stephen Henson
6b43bbf09c
Fix cipherlist order.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-12 20:51:54 +01:00
Rich Salz
9a555706a3
Make COMP_CTX and COMP_METHOD opaque
...
Since COMP_METHOD is now defined in comp_lcl.h, it is no
longer possible to create new TLS compression methods without
using the OpenSSL source. Only ZLIB is supported by default.
Also, since the types are opaque, #ifdef guards to use "char *"
instead of the real type aren't necessary.
The changes are actually minor. Adding missing copyright to some
files makes the diff misleadingly big.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-05-12 10:24:48 -04:00
Dr. Stephen Henson
253617806d
Additional X509_ALGOR documentation
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-05-12 02:09:49 +01:00
Rich Salz
75ebbd9aa4
Use p==NULL not !p (in if statements, mainly)
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-05-11 10:06:38 -04:00
Kurt Cancemi
344c271eb3
Add missing NULL check in X509V3_parse_list()
...
Matt's note: I added a call to X509V3err to Kurt's original patch.
RT#3840
Signed-off-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-11 12:15:28 +01:00
Kurt Cancemi
7786005d0d
Add missing terminating NULL to speed_options table.
...
This would cause memory corruption in opt_init() because it relies on the
terminating NULL.
RT#3842
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-11 12:09:52 +01:00
Bjoern D. Rasmussen
8f744cceff
Fix for memcpy() and strcmp() being undefined.
...
clang says: "s_cb.c:958:9: error: implicitly declaring library function
'memcpy'"
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-11 12:01:51 +01:00
Matt Caswell
14def5f537
Check sk_SSL_CIPHER_new_null return value
...
If sk_SSL_CIPHER_new_null() returns NULL then ssl_bytes_to_cipher_list()
should also return NULL.
Based on an original patch by mrpre <mrpre@163.com >.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-11 11:47:19 +01:00
Dr. Stephen Henson
fae4772c24
Add SSL_use_certificate_chain_file function
...
Add SSL_use_certiicate_chain file functions: this is works the same
way as SSL_CTX_use_certificate_chain_file but for an SSL structure.
Update SSL_CONF code to use the new function.
Update docs.
Update ordinals.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-08 18:43:44 +01:00
Viktor Dukhovni
9a3bf97315
Fix typo in valid_star
...
Reviewed-by: Rich Salz <rsalz@akamai.com >
2015-05-07 14:02:05 -04:00
Rich Salz
86885c2895
Use "==0" instead of "!strcmp" etc
...
For the various string-compare routines (strcmp, strcasecmp, str.*cmp)
use "strcmp()==0" instead of "!strcmp()"
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-05-06 22:37:53 -04:00
Dr. Stephen Henson
dab18ab596
Digest cached records if not sending a certificate.
...
If server requests a certificate, but the client doesn't send one, cache
digested records. This is an optimisation and ensures the correct finished
mac is used when extended master secret is used with client authentication.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-05-07 00:37:10 +01:00
Rich Salz
45ebd73128
Make sig_app, sigx_app static
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-05-06 16:49:10 -04:00
Richard Levitte
5c4e3a4e60
Make -CAserial a type 's' option
...
The file name given to -CAserial might not exist yet. The
-CAcreateserial option decides if this is ok or not.
Previous to this change, -CAserial was a type '<' option, and in that
case, the existence of the file given as argument is tested quite
early, and is a failure if it doesn't. With the type 's' option, the
argument is just a string that the application can do whatever it
wants with.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-06 19:43:59 +02:00
Richard Levitte
2455eaf43f
Add a -CAserial argument for signing the user cert request
...
This is just to make sure that option is tested on a Unix build. This
option is already present in ms/testss.bat, so it's an easy steal.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-06 19:43:59 +02:00
Dr. Stephen Henson
656b26055c
SSL_CONF table reorganisation.
...
Add command line switch entries to table and return SSL_CONF_TYPE_NONE for
them in SSL_CONF_cmd_value_type.
Update docs.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-06 14:17:42 +01:00
Gunnar Kudrjavets
4c9b0a0314
Initialize potentially uninitialized local variables
...
Compiling OpenSSL code with MSVC and /W4 results in a number of warnings.
One category of warnings is particularly interesting - C4701 (potentially
uninitialized local variable 'name' used). This warning pretty much means
that there's a code path which results in uninitialized variables being used
or returned. Depending on compiler, its options, OS, values in registers
and/or stack, the results can be nondeterministic. Cases like this are very
hard to debug so it's rational to fix these issues.
This patch contains a set of trivial fixes for all the C4701 warnings (just
initializing variables to 0 or NULL or appropriate error code) to make sure
that deterministic values will be returned from all the execution paths.
RT#3835
Signed-off-by: Matt Caswell <matt@openssl.org >
Matt's note: All of these appear to be bogus warnings, i.e. there isn't
actually a code path where an unitialised variable could be used - its just
that the compiler hasn't been able to figure that out from the logic. So
this commit is just about silencing spurious warnings.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-06 13:06:46 +01:00
Matt Caswell
4407d070e5
Fix s_server version specific methods
...
A copy&paste error as a result of the big apps cleanup broke the version
specific methods in s_server.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-06 13:03:43 +01:00
Rich Salz
16f8d4ebf0
memset, memcpy, sizeof consistency fixes
...
Just as with the OPENSSL_malloc calls, consistently use sizeof(*ptr)
for memset and memcpy. Remove needless casts for those functions.
For memset, replace alternative forms of zero with 0.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-05 22:18:59 -04:00
Richard Levitte
12048657a9
ZLIB compression deserves a better comment
...
What could be better than to refer to the RFC that defines it?
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-05-06 02:07:58 +02:00
Matt Caswell
b1ad95e328
Fix windows build
...
Fix error in WIN32_rename() introduced by commit b4faea50c3 .
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-05 22:16:08 +01:00
Richard Levitte
2ed42bf639
make update
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-05-05 21:49:51 +02:00
Richard Levitte
3c161d081e
Remove the last traces of the fake RLE compression
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-05-05 21:48:43 +02:00
Matt Caswell
cefc93910c
Add more error state transitions (DTLS)
...
Ensure all fatal errors transition into the new error state for DTLS.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-05 19:45:59 +01:00
Matt Caswell
cc273a9361
Add more error state transitions (client)
...
Ensure all fatal errors transition into the new error state on the client
side.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-05 19:45:55 +01:00
Matt Caswell
cf9b0b6fb2
Add more error state transitions
...
Ensure all fatal errors transition into the new error state on the server
side.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-05 19:45:37 +01:00
Matt Caswell
a89db885e0
Add Error state
...
Reusing an SSL object when it has encountered a fatal error can
have bad consequences. This is a bug in application code not libssl
but libssl should be more forgiving and not crash.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-05 19:45:17 +01:00
Rich Salz
a28ef860be
Update multi-thread FAQ
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-05-05 12:00:37 -04:00
Rich Salz
ff660b9312
Remove apps cache for gethostbyname
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-05 09:25:29 -04:00
Matt Caswell
cab4cd3fe9
make update
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2015-05-05 09:06:27 +01:00
mancha security
34fd7e68a9
ssl/kssl.c: include missing header to complete SSL structure's defn.
...
Signed-off-by: mancha security <mancha1@zoho.com >
Signed-off-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2015-05-05 09:06:22 +01:00
mancha security
aacb4f1a6e
ssl/ssl_asn1.c: Fix typo introduced via cc5b6a03a3
...
Signed-off-by: mancha security <mancha1@zoho.com >
Signed-off-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2015-05-05 09:06:15 +01:00
Matt Caswell
d13bd6130b
Remove libcrypto to libssl dependency
...
Remove dependency on ssl_locl.h from v3_scts.c, and incidentally fix a build problem with
kerberos (the dependency meant v3_scts.c was trying to include krb5.h, but without having been
passed the relevanant -I flags to the compiler)
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2015-05-05 09:05:51 +01:00
Rich Salz
45ddce21fa
Remove the fake RLE compression method.
...
RLE is a no-op only for testing. Remove it.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-04 15:14:26 -04:00
Rich Salz
0fd75c7e6e
GH271: Warning on </dev/null to CA.pl
...
If CA.pl is reading from /dev/null, then "chop $FILE" gives a warning.
Sigh. Have to add "if $FILE". This just silences a build warning.
Thanks to GitHub user andrejs-igumenovs for help with this.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-04 15:07:52 -04:00
Rich Salz
b4faea50c3
Use safer sizeof variant in malloc
...
For a local variable:
TYPE *p;
Allocations like this are "risky":
p = OPENSSL_malloc(sizeof(TYPE));
if the type of p changes, and the malloc call isn't updated, you
could get memory corruption. Instead do this:
p = OPENSSL_malloc(sizeof(*p));
Also fixed a few memset() calls that I noticed while doing this.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-04 15:00:13 -04:00
Richard Levitte
8920a7cd04
RT2943: Check sizes if -iv and -K arguments
...
RT2943 only complains about the incorrect check of -K argument size,
we might as well do the same thing with the -iv argument.
Before this, we only checked that the given argument wouldn't give a
bitstring larger than EVP_MAX_KEY_LENGTH. we can be more precise and
check against the size of the actual cipher used.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-04 20:15:54 +02:00
Richard Levitte
b256f717f8
Have -K actually take an argument, and correct help text
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-04 20:15:54 +02:00
Rich Salz
23b0fa5ab6
Fix cut/paste error
...
Was memset with wrong sizeof.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-04 10:53:15 -04:00
Rich Salz
b6d3cb543c
RT1369: don't do "helpful" access check.
...
Don't do access check on destination directory; it breaks when euid/egid
is different from real uid/gid.
Reviewed-by: Richard Levitte <levitte@openssl.org >
Signed-off-by: Rich Salz <rsalz@akamai.com >
2015-05-04 10:44:58 -04:00
Dr. Stephen Henson
b8cba00807
Return an error in ASN1_TYPE_unpack_sequence if argument is NULL
...
Thanks to Brian Carpenter for reporting this issue.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-04 13:05:31 +01:00
Dr. Stephen Henson
bdcb1a2cf5
more OSSL_NELEM cases
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-05-04 13:03:49 +01:00
mancha security
59ef580a14
ssl/s3_srvr.c: Fix typo introduced via 69f6823748.
...
Incorrect name used for SSL_AD_INTERNAL_ERROR.
Signed-off-by: mancha security <mancha1@zoho.com >
Signed-off-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-03 23:36:25 +01:00
Alok Menghrajani
5812e6f175
Fixes some typos in doc/ssl/
...
This is the last of Alok's PR260
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-05-03 08:52:11 -04:00
Alok Menghrajani
4c583c3659
Fixes some typos in doc/apps/
...
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-05-03 08:51:43 -04:00
Alok Menghrajani
186bb90705
RT3802: Fixes typos in doc/crypto/
...
Signed-off-by: Rich Salz <rsalz@akamai.com >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-05-03 08:51:23 -04:00
Rich Salz
8332f91cc0
fix various typo's
...
https://github.com/openssl/openssl/pull/176 (CHANGES)
https://rt.openssl.org/Ticket/Display.html?id=3545 (objects.txt)
https://rt.openssl.org/Ticket/Display.html?id=3796 (verify.pod)
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-05-03 08:50:34 -04:00
Dr. Stephen Henson
b6eb9827a6
Add OSSL_NELEM macro.
...
Add OSSL_NELEM macro to e_os.h to determine the number of elements in an
array.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-05-03 12:53:08 +01:00
Richard Levitte
31ff45aa97
Remove obsolete make variables
...
ONEDIRS, EDIRS and WDIRS aren't used anywhere. Most probably remains
from a build system of the past, it's time they get put to rest.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-02 21:51:45 +02:00
Ben Laurie
9598996c93
Clean all .o files.
...
Reviewed-by: Rich Salz
2015-05-02 16:13:44 +01:00
Dr. Stephen Henson
6f4d71ff9d
make X509_VERIFY_PARAM opaque
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-02 14:15:00 +01:00
Richard Levitte
169692d736
Remove shlib/
...
Cleanup of files that haven't been used, touched, or I suspect, even
noticed for a long time.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-05-02 14:39:04 +02:00
Gilles Khouzam
bed2edf1cb
RT3820: Don't call GetDesktopWindow()
...
Signed-off-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-02 08:01:07 -04:00
Rich Salz
53ba0a9e91
RT3776: Wrong size for malloc
...
Use sizeof *foo parameter, to avoid these errors.
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
2015-05-02 07:54:03 -04:00
Hanno Böck
539ed89f68
Fix uninitialized variable.
...
Signed-off-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
2015-05-02 07:44:25 -04:00
Rich Salz
6c26d0df83
Remove outdated RC4 files
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-02 07:23:58 -04:00
Rich Salz
25aaa98aa2
free NULL cleanup -- coda
...
After the finale, the "real" final part. :) Do a recursive grep with
"-B1 -w [a-zA-Z0-9_]*_free" to see if any of the preceeding lines are
an "if NULL" check that can be removed.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-05-01 14:37:16 -04:00
Rich Salz
666964780a
Remove goto inside an if(0) block
...
There were a dozen-plus instances of this construct:
if (0) { label: ..... }
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-05-01 14:29:48 -04:00
Ben Laurie
190c8c60c1
Fix build on MacOS.
...
Reviewed-by: Andy Polyakov
2015-05-01 17:46:17 +01:00
Ben Laurie
8b68b7e97b
Use BN_ULONG format.
...
Reviewed-by: Andy Polyakov
2015-05-01 17:46:17 +01:00
Ben Laurie
dc2a1af86a
u_len may be unused.
...
Reviewed-by: Andy Polyakov
2015-05-01 17:46:17 +01:00
Rich Salz
efa7dd6444
free NULL cleanup 11
...
Don't check for NULL before calling free functions. This gets:
ERR_STATE_free
ENGINE_free
DSO_free
CMAC_CTX_free
COMP_CTX_free
CONF_free
NCONF_free NCONF_free_data _CONF_free_data
A sk_free use within OBJ_sigid_free
TS_TST_INFO_free (rest of TS_ API was okay)
Doc update for UI_free (all uses were fine)
X509V3_conf_free
X509V3_section_free
X509V3_string_free
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-01 10:15:18 -04:00
Rich Salz
b548a1f11c
free null cleanup finale
...
Don't check for NULL before calling OPENSSL_free
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-01 10:02:07 -04:00
Rich Salz
33fbca83dc
Fix some typo's, silence warnings.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-05-01 07:11:17 -04:00
Rich Salz
5a3aa85252
Rewrite CA.pl.in
...
Reformat CA.pl.in to follow coding style.
Also add "use strict" and "use warnings"
Also modify it to exit properly and report only when succeeded.
And some perl tweaks via Richard.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-30 21:44:40 -04:00
Rich Salz
23a1d5e97c
free NULL cleanup 7
...
This gets BN_.*free:
BN_BLINDING_free BN_CTX_free BN_FLG_FREE BN_GENCB_free
BN_MONT_CTX_free BN_RECP_CTX_free BN_clear_free BN_free BUF_MEM_free
Also fix a call to DSA_SIG_free to ccgost engine and remove some #ifdef'd
dead code in engines/e_ubsec.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-30 21:37:06 -04:00
Matt Caswell
34166d4189
Fix buffer overrun in RSA signing
...
The problem occurs in EVP_PKEY_sign() when using RSA with X931 padding.
It is only triggered if the RSA key size is smaller than the digest length.
So with SHA512 you can trigger the overflow with anything less than an RSA
512 bit key. I managed to trigger a 62 byte overflow when using a 16 bit RSA
key. This wasn't sufficient to cause a crash, although your mileage may
vary.
In practice RSA keys of this length are never used and X931 padding is very
rare. Even if someone did use an excessively short RSA key, the chances of
them combining that with a longer digest and X931 padding is very
small. For these reasons I do not believe there is a security implication to
this. Thanks to Kevin Wojtysiak (Int3 Solutions) and Paramjot Oberoi (Int3
Solutions) for reporting this issue.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-04-30 23:12:39 +01:00
Matt Caswell
3deeeeb61b
Add sanity check to print_bin function
...
Add a sanity check to the print_bin function to ensure that the |off|
argument is positive. Thanks to Kevin Wojtysiak (Int3 Solutions) and
Paramjot Oberoi (Int3 Solutions) for reporting this issue.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-04-30 23:12:39 +01:00
Matt Caswell
cb0f400b0c
Add sanity check to ssl_get_prev_session
...
Sanity check the |len| parameter to ensure it is positive. Thanks to Kevin
Wojtysiak (Int3 Solutions) and Paramjot Oberoi (Int3 Solutions) for
reporting this issue.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-04-30 23:12:39 +01:00
Matt Caswell
c427570e50
Sanity check the return from final_finish_mac
...
The return value is checked for 0. This is currently safe but we should
really check for <= 0 since -1 is frequently used for error conditions.
Thanks to Kevin Wojtysiak (Int3 Solutions) and Paramjot Oberoi (Int3
Solutions) for reporting this issue.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-04-30 23:12:39 +01:00
Matt Caswell
29b0a15a48
Add sanity check in ssl3_cbc_digest_record
...
For SSLv3 the code assumes that |header_length| > |md_block_size|. Whilst
this is true for all SSLv3 ciphersuites, this fact is far from obvious by
looking at the code. If this were not the case then an integer overflow
would occur, leading to a subsequent buffer overflow. Therefore I have
added an explicit sanity check to ensure header_length is always valid.
Thanks to Kevin Wojtysiak (Int3 Solutions) and Paramjot Oberoi (Int3
Solutions) for reporting this issue.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-04-30 23:12:39 +01:00
Matt Caswell
9d9e37744c
Clarify logic in BIO_*printf functions
...
The static function dynamically allocates an output buffer if the output
grows larger than the static buffer that is normally used. The original
logic implied that |currlen| could be greater than |maxlen| which is
incorrect (and if so would cause a buffer overrun). Also the original
logic would call OPENSSL_malloc to create a dynamic buffer equal to the
size of the static buffer, and then immediately call OPENSSL_realloc to
make it bigger, rather than just creating a buffer than was big enough in
the first place. Thanks to Kevin Wojtysiak (Int3 Solutions) and Paramjot
Oberoi (Int3 Solutions) for reporting this issue.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-04-30 23:12:39 +01:00
Matt Caswell
b86d7dca69
Sanity check EVP_EncodeUpdate buffer len
...
There was already a sanity check to ensure the passed buffer length is not
zero. Extend this to ensure that it also not negative. Thanks to Kevin
Wojtysiak (Int3 Solutions) and Paramjot Oberoi (Int3 Solutions) for
reporting this issue.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-04-30 23:12:39 +01:00
Matt Caswell
c826988109
Sanity check EVP_CTRL_AEAD_TLS_AAD
...
The various implementations of EVP_CTRL_AEAD_TLS_AAD expect a buffer of at
least 13 bytes long. Add sanity checks to ensure that the length is at
least that. Also add a new constant (EVP_AEAD_TLS1_AAD_LEN) to evp.h to
represent this length. Thanks to Kevin Wojtysiak (Int3 Solutions) and
Paramjot Oberoi (Int3 Solutions) for reporting this issue.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-04-30 23:12:39 +01:00
Matt Caswell
873fb39f20
Sanity check DES_enc_write buffer length
...
Add a sanity check to DES_enc_write to ensure the buffer length provided
is not negative. Thanks to Kevin Wojtysiak (Int3 Solutions) and Paramjot
Oberoi (Int3 Solutions) for reporting this issue.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-04-30 23:12:39 +01:00
Rich Salz
895cba195a
free cleanup 12
...
Don't check for NULL before calling free function. This gets:
NAME_CONSTRAINTS_free GENERAL_SUBTREE_free ECDSA_METHOD_free
JPAKE_CTX_free OCSP_REQ_CTX_free SCT_free SRP_VBASE_free
SRP_gN_free SRP_user_pwd_free TXT_DB_free
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-30 18:10:52 -04:00
Matt Caswell
b0696f8b0b
make update
...
Run make update following previous header file changes.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-30 23:00:44 +01:00
Rich Salz
4b45c6e52b
free cleanup almost the finale
...
Add OPENSSL_clear_free which merges cleanse and free.
(Names was picked to be similar to BN_clear_free, etc.)
Removed OPENSSL_freeFunc macro.
Fixed the small simple ones that are left:
CRYPTO_free CRYPTO_free_locked OPENSSL_free_locked
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-30 17:57:32 -04:00
Rich Salz
68dc682499
In apps, malloc or die
...
No point in proceeding if you're out of memory. So change
*all* OPENSSL_malloc calls in apps to use the new routine which
prints a message and exits.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-30 17:48:31 -04:00
Rich Salz
222561fe8e
free NULL cleanup 5a
...
Don't check for NULL before calling a free routine. This gets X509_.*free:
x509_name_ex_free X509_policy_tree_free X509_VERIFY_PARAM_free
X509_STORE_free X509_STORE_CTX_free X509_PKEY_free
X509_OBJECT_free_contents X509_LOOKUP_free X509_INFO_free
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-30 17:33:59 -04:00
Rich Salz
2ace745022
free NULL cleanup 8
...
Do not check for NULL before calling a free routine. This addresses:
ASN1_BIT_STRING_free ASN1_GENERALIZEDTIME_free ASN1_INTEGER_free
ASN1_OBJECT_free ASN1_OCTET_STRING_free ASN1_PCTX_free ASN1_SCTX_free
ASN1_STRING_clear_free ASN1_STRING_free ASN1_TYPE_free
ASN1_UTCTIME_free M_ASN1_free_of
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-30 11:31:07 -04:00
Rich Salz
5a80d9fbfe
Fix bug, "what mode" test was wrong.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-04-30 11:31:07 -04:00
Matt Caswell
a3ed492f58
Fix windows build
...
The big apps cleanup broke the windows build. This commit
fixes some miscellaneous issues so that it builds again.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-04-30 11:35:18 +01:00
Matt Caswell
fb45690275
Remove redundant includes from dtls1.h
...
There were a set of includes in dtls1.h which are now redundant due to the
libssl opaque work. This commit removes those includes, which also has the
effect of resolving one issue preventing building on windows (i.e. the
include of winsock.h)
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-04-30 11:34:51 +01:00
Rich Salz
995101d654
Add HTTP GET support to OCSP server
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-04-29 17:37:04 -04:00
Rich Salz
db4c08f019
Rewrite parse_name
...
Remove need for multiple arrays, parse the X509 name
one RDN at a time. Thanks to Andy for careful review.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-04-29 14:50:00 -04:00
Rich Salz
2fa45e6ee7
use isxdigit and apps_tohex
...
Replace ad-hoc ascii->hex with isxdigit and new app_tohex.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-04-29 14:15:50 -04:00
Rich Salz
ecf3a1fb18
Remove needless bio_err argument
...
Many functions had a BIO* parameter, and it was always called
with bio_err. Remove the param and just use bio_err.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-04-29 11:27:08 -04:00
Rich Salz
bea6cd3e1c
Make "make rehash" quiet
...
Don't complain about missing config file.
(Got the right env var name this time)
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-28 21:48:44 -04:00
Rich Salz
2d29e2df0c
realloc of NULL is like malloc
...
ANSI C, and OpenSSL's malloc wrapper do this, also.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-28 16:34:52 -04:00
Rich Salz
b196e7d936
remove malloc casts
...
Following ANSI C rules, remove the casts from calls to
OPENSSL_malloc and OPENSSL_realloc.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-28 15:28:14 -04:00
Rich Salz
3e47caff48
ERR_ cleanup
...
Remove ERR_[gs]et_implementation as they were not undocumented and
useless (the data structure was opaque).
Halve the number of lock/unlock calls in almost all ERR_
functions by letting the caller of get_hash or int_thread_set
able to lock. Very useful when looping, such as adding errors,
or when getting the hash and immediately doing a lookup on it.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-28 10:50:54 -04:00
Richard Levitte
0223ca0987
Allow for types with leading underscore when checking error macros.
...
We have an increasing number of function declarations starting with
'__owur'. Unfortunately, util/ck_errf.pl fails to detect them. A
simple change fixes that issue.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-04-28 14:34:58 +02:00
Emilia Kasper
5956b110e3
NISTZ256: owur'ize.
...
__owur'ize static methods to catch calling errors within the module.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-28 12:49:40 +02:00
Emilia Kasper
6038354cf8
NISTZ256: use EC_POINT API and check errors.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-27 19:44:43 +02:00
Rich Salz
31b222da1e
CRYPTO_mem_leaks should ignore it's BIO argument.
...
CRYPTO_mem_leaks takes a BIO* argument. It's not a leak if that
argument hasn't been free'd.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-27 12:29:39 -04:00
Emilia Kasper
a4d5269e6d
NISTZ256: don't swallow malloc errors
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-27 18:03:38 +02:00
Emilia Kasper
4446044a79
NISTZ256: set Z_is_one to boolean 0/1 as is customary.
...
Cosmetic, no real effect.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-27 16:49:25 +02:00
Emilia Kasper
e22d2199e2
Error checking and memory leak fixes in NISTZ256.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-27 16:21:48 +02:00
Emilia Kasper
2f5997b7b9
Fix Wmaybe-uninitialized: initialize variable
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-27 16:17:27 +02:00
Richard Levitte
9e842a5292
Fix the check of test apps in util/mk1mf.pl
...
The previous check assumed that the variables for each test app, ending
with TEST would be indication enough. Experience showed that this isn't
the best way. Instead, simply look for the EXE variable in test/Makefile.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-27 15:55:53 +02:00
Richard Levitte
4c1408962a
Small fixes after the Big apps cleanup
...
This fixes util/mk1mf.pl, which was looking for old variable names from
apps/Makefile.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-27 11:02:36 +02:00
Rich Salz
57d5edada7
Add readline (etc) support
...
Compile with -DREADLINE and the appropriate library.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-26 23:45:12 -04:00
Rich Salz
1bb2daead8
Simplify parse_yesno; remove local variable
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-04-26 21:28:38 -04:00
Rich Salz
bc2f5803cc
Fix typo in help & comment formatting
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-04-26 21:23:43 -04:00
Rich Salz
ce6766de69
Fix error message
...
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
2015-04-26 16:43:18 -04:00
Rich Salz
88806cfc61
Fix main build breakage.
...
A variable declaration got dropped during a merge.
And if a compiler inlines strcmp() and you put a strcmp in an
assert message, the resultant stringification exceeds ANSI string
limits.
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
2015-04-26 13:12:04 -04:00
Rich Salz
2f58faad66
Remove the special list-xxxx commands
...
There's a new "list" command, which takes a flag to say what
to list. Removing the old hacky commands. Re-ordered some
functions to remove some needless declarations.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-26 10:31:48 -04:00
Rich Salz
5d307e7b5a
RT2962: add -keytab and -krb5svc flags.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-25 23:08:00 -04:00
Rich Salz
a194ee7b9a
Free malloc data on encoding errors.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-25 22:55:36 -04:00
Rich Salz
46aa607867
apps-cleanup: the doc fixes
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-25 16:07:28 -04:00
Rich Salz
f92beb98de
Quote HTML entities in s_server output
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-25 16:06:19 -04:00
Rich Salz
c6724060e2
RT2206: Add -issuer flag to ocsp command
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-25 16:04:42 -04:00
Rich Salz
239f2771e1
Remove EFENCE support.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-25 16:03:07 -04:00
Rich Salz
d8c25de595
RT2451: Add telnet to s_client -starttls
...
Also add -xmpphost and -smtphost flags.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-25 16:01:21 -04:00
Rich Salz
6ba8a5b77a
Add -nocommands to s_client.
...
Add flag to disable the 'command letters' from s_client.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-25 15:58:22 -04:00
Rich Salz
333b070ec0
fewer NO_ENGINE #ifdef's
...
Make setup_engine be a dummy if NO_ENGINE is enabled.
The option is not enabled if NO_ENGINE is enabled, so the one "wasted"
variable just sits there. Removes some variables and code.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-25 15:41:29 -04:00
Rich Salz
c54cc2b15d
Add missing BIO_flush() calls
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-25 09:26:48 -04:00
Rich Salz
7e1b748570
Big apps cleanup (option-parsing, etc)
...
This is merges the old "rsalz-monolith" branch over to master. The biggest
change is that option parsing switch from cascasding 'else if strcmp("-foo")'
to a utility routine and somethin akin to getopt. Also, an error in the
command line no longer prints the full summary; use -help (or --help :)
for that. There have been many other changes and code-cleanup, see
bullet list below.
Special thanks to Matt for the long and detailed code review.
TEMPORARY:
For now, comment out CRYPTO_mem_leaks() at end of main
Tickets closed:
RT3515: Use 3DES in pkcs12 if built with no-rc2
RT1766: s_client -reconnect and -starttls broke
RT2932: Catch write errors
RT2604: port should be 'unsigned short'
RT2983: total_bytes undeclared #ifdef RENEG
RT1523: Add -nocert to fix output in x509 app
RT3508: Remove unused variable introduced by b09eb24
RT3511: doc fix; req default serial is random
RT1325,2973: Add more extensions to c_rehash
RT2119,3407: Updated to dgst.pod
RT2379: Additional typo fix
RT2693: Extra include of string.h
RT2880: HFS is case-insensitive filenames
RT3246: req command prints version number wrong
Other changes; incompatibilities marked with *:
Add SCSV support
Add -misalign to speed command
Make dhparam, dsaparam, ecparam, x509 output C in proper style
Make some internal ocsp.c functions void
Only display cert usages with -help in verify
Use global bio_err, remove "BIO*err" parameter from functions
For filenames, - always means stdin (or stdout as appropriate)
Add aliases for -des/aes "wrap" ciphers.
*Remove support for IISSGC (server gated crypto)
*The undocumented OCSP -header flag is now "-header name=value"
*Documented the OCSP -header flag
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-04-24 15:26:15 -04:00
Emilia Kasper
53dd4ddf71
Fix error checking and memory leaks in NISTZ256 precomputation.
...
Thanks to Brian Smith for reporting these issues.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-24 17:45:13 +02:00
Emilia Kasper
c028254b12
Correctly set Z_is_one on the return value in the NISTZ256 implementation.
...
Also add a few comments about constant-timeness.
Thanks to Brian Smith for reporting this issue.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-24 17:33:21 +02:00
Loganaden Velvindron
8031d26b0c
Fix CRYPTO_strdup
...
The function CRYPTO_strdup (aka OPENSSL_strdup) fails to check the return
value from CRYPTO_malloc to see if it is NULL before attempting to use it.
This patch adds a NULL check.
RT3786
Signed-off-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 37b0cf936744d9edb99b5dd82cae78a7eac6ad60)
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 20d21389c8b6f5b754573ffb6a4dc4f3986f2ca4)
2015-04-22 17:18:59 +01:00
Dr. Stephen Henson
98c9ce2f55
SSL_CIPHER lookup functions.
...
Add tables to convert between SSL_CIPHER fields and indices for ciphers
and MACs.
Reorganise ssl_ciph.c to use tables to lookup values and load them.
New functions SSL_CIPHER_get_cipher_nid and SSL_CIPHER_get_digest_nid.
Add documentation.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-22 15:00:53 +01:00
Rich Salz
b95de5ecde
Avoid "no config file" warning message
...
Set config to /dev/null when doing make rehash.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-21 16:57:59 -04:00
Rich Salz
3dca57f8ca
ssltest output cleanup
...
Make only errors go to stderr.
Print count and size before the loop, so you can see it's an 838K
message that will take a few moments.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-21 15:52:51 -04:00
Richard Levitte
a169a93a6f
test/Makefile dclean cleans out a few files too many.
...
The files removed are the ones that were symbolic links before, but
aren't now, so we should not remove them any more.
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-04-21 21:16:54 +02:00
Emilia Kasper
6e3d015363
Repair EAP-FAST session resumption
...
EAP-FAST session resumption relies on handshake message lookahead
to determine server intentions. Commits
980bc1ec61
and
7b3ba508af
removed the lookahead so broke session resumption.
This change partially reverts the commits and brings the lookahead back
in reduced capacity for TLS + EAP-FAST only. Since EAP-FAST does not
support regular session tickets, the lookahead now only checks for a
Finished message.
Regular handshakes are unaffected by this change.
Reviewed-by: David Benjamin <davidben@chromium.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-04-21 18:12:58 +02:00
Andy Polyakov
c3b9bd11f9
Engage ec/asm/ecp_nistz256-sparcv9 module.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-21 09:39:52 +02:00
Andy Polyakov
5557d5f2e2
Add ec/asm/ecp_nistz256-sparcv9.pl.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-21 09:37:44 +02:00
Andy Polyakov
9b6b470afe
modes/asm/ghashv8-armx.pl: additional performance data.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-21 09:17:53 +02:00
Andy Polyakov
7be6bc68c6
aes/asm/aesni-x86.pl: fix typo affecting Windows build.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-04-20 18:39:56 +02:00
Andy Polyakov
23f6eec71d
aes/asm/aesni-x86[_64].pl update.
...
This addresses
- request for improvement for faster key setup in RT#3576;
- clearing registers and stack in RT#3554 (this is more of a gesture to
see if there will be some traction from compiler side);
- more commentary around input parameters handling and stack layout
(desired when RT#3553 was reviewed);
- minor size and single block performance optimization (was lying around);
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-04-20 15:43:05 +02:00
Andy Polyakov
313e6ec11f
Add assembly support for 32-bit iOS.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-20 15:06:22 +02:00
Andy Polyakov
cc98b998b8
Configure: Engage ecp_nistz256-armv8 module.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-20 14:58:01 +02:00
Andy Polyakov
e1613e7c0c
Add ecp_nistz256-armv8 module.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-20 14:56:06 +02:00
Andy Polyakov
5a3d915d77
Configure: add initial support for 64-bit Android.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-20 14:49:16 +02:00
Andy Polyakov
4eb504aedf
crypto/ec/ecp_nistp[224|521].c: fix formatting.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-20 14:45:52 +02:00
Andy Polyakov
ace8f54691
ec/ecp_nistp*.c: fix SEGVs.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-20 14:45:21 +02:00
Andy Polyakov
2c6343bfa3
Configure: engage ARMv8 Montgomery multiplication module.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-20 14:41:10 +02:00
Andy Polyakov
cb2ed54582
Add ARMv8 Montgomery multiplication module.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-20 14:39:34 +02:00
Andy Polyakov
35141544e2
aes/asm/vpaes-armv8.pl: make it compile on iOS.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-20 14:30:50 +02:00
Rich Salz
3b34b7319e
Remove SET oid config file and SET certs
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-04-20 07:24:23 -04:00
Rich Salz
fec669388c
Use 2K RSA and SHA256 in tests
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-04-20 07:23:04 -04:00
Dr. Stephen Henson
a0eed48d37
Fix encoding bug in i2c_ASN1_INTEGER
...
Fix bug where i2c_ASN1_INTEGER mishandles zero if it is marked as
negative.
Thanks to Huzaifa Sidhpurwala <huzaifas@redhat.com > and
Hanno Böck <hanno@hboeck.de > for reporting this issue.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-18 14:41:06 +01:00
Emilia Kasper
3ae91cfb32
Error out immediately on empty ciphers list.
...
A 0-length ciphers list is never permitted. The old code only used to
reject an empty ciphers list for connections with a session ID. It
would later error out on a NULL structure, so this change just moves
the alert closer to the problem source.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-17 18:43:30 +02:00
Emilia Kasper
13efe9d17e
Use -Wall -Wextra with clang
...
The disabled set of -Weverything is hard to maintain across versions.
Use -Wall -Wextra but also document other useful warnings that currently trigger.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-17 18:17:50 +02:00
Viktor Dukhovni
323daa74fc
SunOS non-posix shells do not grok export name=value
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-17 01:33:51 -04:00
Viktor Dukhovni
61986d32f3
Code style: space after 'if'
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-04-16 13:44:59 -04:00
Emilia Kasper
b65558328a
Remove code for deleted function from ssl.h
...
ssl_cert_inst was removed in 2c3823491d
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2015-04-16 17:52:52 +02:00
Dr. Stephen Henson
111b60bea0
Reject empty generation strings.
...
Reported by Hanno Böck <hanno@hboeck.de >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-16 16:04:23 +01:00
Dr. Stephen Henson
c4137b5e82
Limit depth of nested sequences when generating ASN.1
...
Reported by Hanno Böck <hanno@hboeck.de >
PR#3800
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-16 16:04:23 +01:00
Dr. Stephen Henson
5621e7aaf3
Remove obsolete options for debug-steve*
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-15 13:58:38 +01:00
Dr. Stephen Henson
c954448f2c
Add -Wtype-limits to strict warnings.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-15 13:57:51 +01:00
Emilia Kasper
6824941440
Initialize variable
...
newsig may be used (freed) uninitialized on a malloc error.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-15 14:19:12 +02:00
Matt Caswell
5e0a80c1c9
Fix ssl_get_prev_session overrun
...
If OpenSSL is configured with no-tlsext then ssl_get_prev_session can read
past the end of the ClientHello message if the session_id length in the
ClientHello is invalid. This should not cause any security issues since the
underlying buffer is 16k in size. It should never be possible to overrun by
that many bytes.
This is probably made redundant by the previous commit - but you can never be
too careful.
With thanks to Qinghao Tang for reporting this issue.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-14 14:58:49 +01:00
Matt Caswell
5e9f0eebcf
Check for ClientHello message overruns
...
The ClientHello processing is insufficiently rigorous in its checks to make
sure that we don't read past the end of the message. This does not have
security implications due to the size of the underlying buffer - but still
needs to be fixed.
With thanks to Qinghao Tang for reporting this issue.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-14 14:58:25 +01:00
Rich Salz
e0e920b1a0
free NULL cleanup 9
...
Ongoing work to skip NULL check before calling free routine. This gets:
ecp_nistz256_pre_comp_free nistp224_pre_comp_free nistp256_pre_comp_free
nistp521_pre_comp_free PKCS7_free PKCS7_RECIP_INFO_free
PKCS7_SIGNER_INFO_free sk_PKCS7_pop_free PKCS8_PRIV_KEY_INFO_free
PKCS12_free PKCS12_SAFEBAG_free PKCS12_free sk_PKCS12_SAFEBAG_pop_free
SSL_CONF_CTX_free SSL_CTX_free SSL_SESSION_free SSL_free ssl_cert_free
ssl_sess_cert_free
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-04-11 16:32:54 -04:00
Rich Salz
a38537721d
Fix memory leak
...
It should have freed them when != NULL, not when == NULL.
Reviewed-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Viktor Dukhovni <openssl-users@dukhovni.org >
2015-04-11 20:31:29 +02:00
Kurt Roeckx
8ec5c5dd36
do_dirname: Don't change gen on failures
...
It would set gen->d.dirn to a freed pointer in case X509V3_NAME_from_section
failed.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-11 20:30:24 +02:00
Kurt Roeckx
f49baeff50
X509_VERIFY_PARAM_free: Check param for NULL
...
Reviewed-by: Viktor Dukhovni <openssl-users@dukhovni.org >
2015-04-11 20:29:25 +02:00
Rich Salz
62adbcee39
free NULL cleanup 10
...
Avoid checking for NULL before calling free functions. This gets
ssl.*free:
ssl_sess_cert_free ssl_free ssl_excert_free ssl_cert_free
SSL_free SSL_SRP_CTX_free SSL_SESSION_free SSL_CTX_free
SSL_CTX_SRP_CTX_free SSL_CONF_CTX_free
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-04-11 10:22:36 -04:00
Kurt Cancemi
e2010b202a
The wrong ifdef is used to guard usage of PSK code
...
PR#3790
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-10 23:52:32 +01:00
Dr. Stephen Henson
f617b4969a
Don't set *pval to NULL in ASN1_item_ex_new.
...
While *pval is usually a pointer in rare circumstances it can be a long
value. One some platforms (e.g. WIN64) where
sizeof(long) < sizeof(ASN1_VALUE *) this will write past the field.
*pval is initialised correctly in the rest of ASN1_item_ex_new so setting it
to NULL is unecessary anyway.
Thanks to Julien Kauffmann for reporting this issue.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-10 19:50:51 +01:00
Dr. Stephen Henson
9fdbc9df76
Fix ECDH detection, add ECDH keyid test.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-10 18:51:52 +01:00
Dr. Stephen Henson
7a317fa07c
Fix ECDH key identifier support.
...
PR#3789
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-10 18:51:52 +01:00
Viktor Dukhovni
34b0a927ab
Polish shell script to avoid needless complexity.
...
No need for here documents, just use "yes" or </dev/null.
No need for "|| exit 1" clauses, just use "set -e".
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-10 12:28:07 -04:00
Rich Salz
e71cecd551
fix to "test script cleanup"
...
Fix commit 30f54ad295 which used
non-portable syntax for checking exit status.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-04-10 11:40:25 -04:00
Matt Caswell
4118dfdcc8
Fix read_ahead issue
...
Fix a "&" that should have been "!" when processing read_ahead.
RT#3793
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-10 16:21:20 +01:00
Rich Salz
30f54ad295
test script cleanup
...
Removed commented-out tests
Standardize on doing
cmd ... || exit 1
instead of
cmd ...
if [ $? != 0] ; then
exit 1
fi
where that if statement has ben one, three, or four lines, variously.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-10 10:06:17 -04:00
Richard Levitte
2cfdfe0918
Have mkerr.pl treat already existing multiline string defs properly
...
Since source reformat, we ended up with some error reason string
definitions that spanned two lines. That in itself is fine, but we
sometimes edited them to provide better strings than what could be
automatically determined from the reason macro, for example:
{ERR_REASON(SSL_R_NO_GOST_CERTIFICATE_SENT_BY_PEER),
"Peer haven't sent GOST certificate, required for selected ciphersuite"},
However, mkerr.pl didn't treat those two-line definitions right, and
they ended up being retranslated to whatever the macro name would
indicate, for example:
{ERR_REASON(SSL_R_NO_GOST_CERTIFICATE_SENT_BY_PEER),
"No gost certificate sent by peer"},
Clearly not what we wanted. This change fixes this problem.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-04-08 21:44:43 +02:00
Rich Salz
be739b0cc0
Drop CA.sh for CA.pl
...
Remove CA.sh script and use CA.pl for testing, etc.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-08 14:07:39 -04:00
Rich Salz
5adac91eab
consistent test-start logging
...
Output a consistent "start" marker for each test.
Remove "2>/dev/null" from Makefile command lines.
Add OPENSSL_CONFIG=/dev/null for places where it's needed, in
order to suppress a warning message from the openssl CLI.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-08 12:28:15 -04:00
Richard Levitte
37d92b1b2b
Ignore the non-dll windows specific build directories
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-08 17:16:14 +02:00
Richard Levitte
2da2a4349c
Appease clang -Wshadow
...
The macros BSWAP4 and BSWAP8 have statetemnt expressions
implementations that use local variable names that shadow variables
outside the macro call, generating warnings like this
e_aes_cbc_hmac_sha1.c:263:14: warning: declaration shadows a local variable
[-Wshadow]
seqnum = BSWAP8(blocks[0].q[0]);
^
../modes/modes_lcl.h:41:29: note: expanded from macro 'BSWAP8'
^
e_aes_cbc_hmac_sha1.c:223:12: note: previous declaration is here
size_t ret = 0;
^
Have clang be quiet by modifying the macro variable names slightly
(suffixing them with an underscore).
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-04 17:07:03 +02:00
Richard Levitte
04958e84d8
Appease clang -Wgnu-statement-expression
...
We use GNU statement expressions in crypto/md32_common.h, surrounded
by checks that GNU C is indeed used to compile. It seems that clang,
at least on Linux, pretends to be GNU C, therefore finds the statement
expressions and then warns about them.
The solution is to have clang be quiet about it.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-04 17:06:35 +02:00
Richard Levitte
c25dea53e9
Appease clang -Wempty-translation-unit
...
ebcdic.c:284:7: warning: ISO C requires a translation unit to contain at least one
declaration [-Wempty-translation-unit]
^
1 warning generated.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-04 17:05:49 +02:00
Dr. Stephen Henson
40cf454566
update ordinals
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-03 18:31:15 +01:00
Dr. Stephen Henson
19fcbc8949
make depend
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-03 18:31:15 +01:00
Dr. Stephen Henson
865b55ac8e
remove asn1_mac.h
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-03 18:31:15 +01:00
Dr. Stephen Henson
a469a6770a
Remove old ASN.1 functions.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-03 18:30:09 +01:00
Dr. Stephen Henson
1880790e2e
Remove unnecessary use of ASN1_const_CTX
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-03 18:29:48 +01:00
Dr. Stephen Henson
cc5b6a03a3
Rewrite ssl_asn1.c using new ASN.1 code.
...
Complete reimplementation of d2i_SSL_SESSION and i2d_SSL_SESSION using
new ASN.1 code and eliminating use of old ASN.1 macros.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-03 16:58:44 +01:00
Dr. Stephen Henson
4fb6b0def1
Add macro to implement static encode functions.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-03 16:58:44 +01:00
Rich Salz
22ebaae08c
Fewer newlines in comp method output
...
Print "supported compression methods" all on one line.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-04-02 15:58:10 -04:00
Andy Polyakov
7eeeb49e11
modes/asm/ghashv8-armx.pl: up to 90% performance improvement.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-04-02 10:03:09 +02:00
Andy Polyakov
be5a87a1b0
sha/asm/sha*-armv8.pl: add Denver and X-Gene esults.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-02 09:50:06 +02:00
Andy Polyakov
94376cccb4
aes/asm/aesv8-armx.pl: optimize for Cortex-A5x.
...
ARM has optimized Cortex-A5x pipeline to favour pairs of complementary
AES instructions. While modified code improves performance of post-r0p0
Cortex-A53 performance by >40% (for CBC decrypt and CTR), it hurts
original r0p0. We favour later revisions, because one can't prevent
future from coming. Improvement on post-r0p0 Cortex-A57 exceeds 50%,
while new code is not slower on r0p0, or Apple A7 for that matter.
[Update even SHA results for latest Cortex-A53.]
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-04-02 09:47:56 +02:00
Andy Polyakov
7b644df899
perlasm/arm-xlate.pl update (fix end-less loop and prepare for 32-bit iOS).
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-02 09:37:28 +02:00
Andy Polyakov
449e3f2601
Configure: android-arm facelift.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-04-02 09:36:32 +02:00
Emilia Kasper
11305038e9
make update
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-04-01 22:31:28 +02:00
Richard Levitte
0f2596ac54
Remove SSL_TASK, the DECnet Based SSL Engine - addendum
...
A bit of cleanup was forgotten.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-03-31 22:19:22 +02:00
Richard Levitte
5098c029ce
Remove SSL_TASK, the DECnet Based SSL Engine
...
This engine is for VMS only, and isn't really part of the core OpenSSL
but rather a side project of its own that just happens to have tagged
along for a long time. The reasons why it has remained within the
OpenSSL source are long lost in history, and there not being any real
reason for it to remain here, it's time for it to move out.
This side project will appear as a project in its own right, the
location of which will be announced later on.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-03-31 21:59:43 +02:00
Dr. Stephen Henson
b9395187df
Remove old ASN.1 code from evp_asn1.c
...
Rewrite ASN1_TYPE_set_int_octetstring and ASN1_TYPE_get_int_octetstring
to use the new ASN.1 code instead of the old macros.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-03-31 19:18:51 +01:00
Richard Levitte
a72d89fda6
Now that we've removed the need for symlinks, we can safely remove util/mklinks.pl
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-03-31 20:16:01 +02:00
Richard Levitte
0190de80d5
Remove remaining variables for symlinked/copied headers and tests
...
GitConfigure: no more 'no-symlinks'
util/bat.sh, util/mk1mf.pl, util/pl/VC-32.pl, util/pl/unix.pl:
- Remove all uses of EXHEADER.
That includes removing the use if INC_D and INCO_D.
- Replace the check for TEST with a check for [A-Z0-9_]*TEST.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-03-31 20:16:01 +02:00
Richard Levitte
a80e33b991
Remove EXHEADER, TEST, APPS, links:, install: and uninstall: where relevant
...
With no more symlinks, there's no need for those variables, or the links
target. This also goes for all install: and uninstall: targets that do
nothing but copy $(EXHEADER) files, since that's now taken care of by the
top Makefile.
Also, removed METHTEST from test/Makefile. It looks like an old test that's
forgotten...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-03-31 20:16:01 +02:00
Richard Levitte
dee502be89
Stop symlinking, move files to intended directory
...
Rather than making include/openssl/foo.h a symlink to
crypto/foo/foo.h, this change moves the file to include/openssl/foo.h
once and for all.
Likewise, move crypto/foo/footest.c to test/footest.c, instead of
symlinking it there.
Originally-by: Geoff Thorpe <geoff@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-03-31 20:16:01 +02:00
Douglas E Engert
30cd4ff294
Ensure EC private keys retain leading zeros
...
RFC5915 requires the use of the I2OSP primitive as defined in RFC3447
for storing an EC Private Key. This converts the private key into an
OCTETSTRING and retains any leading zeros. This commit ensures that those
leading zeros are present if required.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-03-31 16:33:29 +01:00
Matt Caswell
747e16398d
Clean up record layer
...
Fix up various things that were missed during the record layer work. All
instances where we are breaking the encapsulation rules.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-31 14:39:31 +01:00
Matt Caswell
1b34e25c17
Fix record layer "make clean"
...
The "clean" target in libssl has been updated to handle the new record
layer sub-directory.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-31 14:39:14 +01:00
Richard Levitte
8bf5b8ab22
Fix some faults in util/mk1mf.pl
...
When building on Unix, there are times when the 'EX_LIB' MINFO variable
contains valuable information. Make sure to take care of it.
fixrules in util/pl/unix.pl was previously changed with a simpler fix of
rules, with a comment claiming that's compatible with -j. Unfortunately,
this breaks multiline rules and doesn't change anything for single line
rules. While at it, do not prefix pure echo lines with a 'cd $(TEST_D) &&',
as that's rather silly.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-03-31 15:21:18 +02:00
Dr. Stephen Henson
e93c8748ab
Remove duplicate code.
...
Update code to use ASN1_TYPE_pack_sequence and ASN1_TYPE_unpack_sequence
instead of performing the same operation manually.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-03-30 22:01:31 +01:00
Dr. Stephen Henson
22f5bd3dd2
New ASN1_TYPE SEQUENCE functions.
...
Add new functions ASN1_TYPE_pack_sequence and ASN1_TYPE_unpack_sequence:
these encode and decode ASN.1 SEQUENCE using an ASN1_TYPE structure.
Update ordinals.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-03-30 22:01:31 +01:00
Dr. Stephen Henson
94f4b4b313
Rewrite X509_PKEY_new to avoid old ASN1. macros.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-03-30 22:01:31 +01:00
Dr. Stephen Henson
3a1f43023a
Remove unnecessary asn1_mac.h includes.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-03-30 22:01:30 +01:00
Richard Levitte
06affe3dac
Initialised 'ok' and redo the logic.
...
The logic with how 'ok' was calculated didn't quite convey what's "ok",
so the logic is slightly redone to make it less confusing.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-03-30 05:31:58 +02:00
Andy Polyakov
b1a5d1c652
sha/asm/sha512-armv4.pl: adapt for use in Linux kernel context.
...
Follow-up to sha256-armv4.pl in cooperation with Ard Biesheuvel
(Linaro) and Sami Tolvanen (Google).
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-03-29 15:24:20 +02:00
Andy Polyakov
51f8d09556
sha/asm/sha256-armv4.pl: fix compile issue in kernel
...
and eliminate little-endian dependency.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-03-29 15:22:03 +02:00
Richard Levitte
6a919b44f7
Have a shared library version thats reasonable with our version scheme
...
The FAQ says this:
After the release of OpenSSL 1.0.0 the versioning scheme changed. Letter
releases (e.g. 1.0.1a) can only contain bug and security fixes and no
new features. Minor releases change the last number (e.g. 1.0.2) and
can contain new features that retain binary compatibility. Changes to
the middle number are considered major releases and neither source nor
binary compatibility is guaranteed.
With such a scheme (and with the thinking that it's nice if the shared
library version stays on track with the OpenSSL version), it's rather
futile to keep the minor release number in the shared library version.
The deed already done with OpenSSL 1.0.x can't be changed, but with
1.x.y, x=1 and on, 1.x as shared library version is sufficient.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-03-29 09:42:58 +02:00
Dr. Stephen Henson
79a578b902
Add private/public key conversion tests
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-29 03:26:12 +01:00
Dr. Stephen Henson
b1f3442857
Remove d2i_X509_PKEY and i2d_X509_PKEY
...
Remove partially implemented d2i_X509_PKEY and i2d_X509_PKEY: nothing
uses them and they don't work properly. Update ordinals.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-03-28 15:39:18 +00:00
Andy Polyakov
f0e6871df2
ec/asm/ecp_nistz256-x86_64.pl: update commentary with before-after performance data.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-28 15:59:27 +01:00
Rich Salz
c5ba2d9904
free NULL cleanup
...
EVP_.*free; this gets:
EVP_CIPHER_CTX_free EVP_PKEY_CTX_free EVP_PKEY_asn1_free
EVP_PKEY_asn1_set_free EVP_PKEY_free EVP_PKEY_free_it
EVP_PKEY_meth_free; and also EVP_CIPHER_CTX_cleanup
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-03-28 10:54:15 -04:00
Andy Polyakov
33b188a8e8
Engage vpaes-armv8 module.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-28 15:42:12 +01:00
Andy Polyakov
2779c08436
Add vpaes-amrv8.pl module.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-28 15:41:50 +01:00
Andy Polyakov
1818572d83
Configure: remove unused variables.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-28 15:36:40 +01:00
Dr. Stephen Henson
23dc1706e8
Make asn1_ex_i2c, asn1_ex_c2i static.
...
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-03-28 12:08:48 +00:00
Dr. Stephen Henson
ee9d76371a
Remove combine option from ASN.1 code.
...
Remove the combine option. This was used for compatibility with some
non standard behaviour in ancient versions of OpenSSL: specifically
the X509_ATTRIBUTE and DSAPublicKey handling. Since these have now
been revised it is no longer needed.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 22:04:15 +00:00
Dr. Stephen Henson
ea6b07b54c
Simplify DSA public key handling.
...
DSA public keys could exist in two forms: a single Integer type or a
SEQUENCE containing the parameters and public key with a field called
"write_params" deciding which form to use. These forms are non standard
and were only used by functions containing "DSAPublicKey" in the name.
Simplify code to only use the parameter form and encode the public key
component directly in the DSA public key method.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 22:04:15 +00:00
Dr. Stephen Henson
dd14f91171
ASN1_TYPE documentation.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 21:59:17 +00:00
Matt Caswell
ee3ef9cbe9
Add Record Layer documentation
...
Add some design documentation on how the record layer works to aid future
maintenance.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 17:26:28 +00:00
Matt Caswell
6f7ae319df
Fix formatting oddities
...
Fix some formatting oddities in rec_layer_d1.c.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 17:26:28 +00:00
Matt Caswell
d2200cafd4
Fix record.h formatting
...
Fix some strange formatting in record.h. This was probably originally
introduced as part of the reformat work.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 17:26:26 +00:00
Matt Caswell
e5bf62f716
Define SEQ_NUM_SIZE
...
Replace the hard coded value 8 (the size of the sequence number) with a
constant defined in a macro.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 17:25:48 +00:00
Matt Caswell
3497ac5d33
Fix compilation on windows for record layer
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 15:02:01 +00:00
Matt Caswell
1711f8de45
Rename record layer source files
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 15:02:01 +00:00
Matt Caswell
9e7ba3b2a2
Remove some unneccessary macros
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 15:02:01 +00:00
Matt Caswell
c99c4c11a2
Renamed record layer header files
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 15:02:01 +00:00
Matt Caswell
44cc35d382
Reorganise header files
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 15:02:01 +00:00
Matt Caswell
cca52a844f
Remove last trace of non-record layer code reading and writing sequence
...
numbers directly
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 15:02:01 +00:00
Matt Caswell
3bb8f87d2d
Move last_write_sequence from s->d1 to s->rlayer.d.
...
Also push some usage of last_write_sequence out of dtls1_retransmit_message
and into the record layer.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 15:02:00 +00:00
Matt Caswell
14daae5a62
Move ssl3_record_sequence_update into record layer
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 15:02:00 +00:00
Matt Caswell
24a1e2f2ec
Move buffered_app_data from s->d1 to s->rlayer.d
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 15:02:00 +00:00
Matt Caswell
c661ac1689
Move handshake_fragment, handshake_fragment_len, alert_fragment and
...
alert_fragment_len from s->d1 to s->rlayer.d
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 15:02:00 +00:00
Matt Caswell
5fb6f80cdf
Fix seg fault in dtls1_new
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 15:02:00 +00:00
Matt Caswell
cb2ce7abfd
Moved processed_rcds and unprocessed_rcds from s->d1 to s->rlayer.d
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 15:02:00 +00:00
Matt Caswell
91f93f69ef
Move bitmap and next_bitmap from s->d1 to s->rlayer.d.
...
Create dtls_bitmap.h and dtls_bitmap.c
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 15:02:00 +00:00
Matt Caswell
78a39fe735
Move r_epoch and w_epoch from s->d1 to s->rlayer.d
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 15:02:00 +00:00
Matt Caswell
40f37188a6
Introduce a DTLS_RECORD_LAYER type for DTLS record layer state
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 15:02:00 +00:00
Matt Caswell
bb4203d97e
Move DTLS1_RECORD_DATA into rec_layer.h
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 15:02:00 +00:00
Matt Caswell
de07f311ce
Move read_sequence and write_sequence from s->s3 to s->rlayer
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 15:02:00 +00:00
Matt Caswell
f8caa3c813
Move s->s3->wpend_* to s->rlayer
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 15:02:00 +00:00
Matt Caswell
4aa7389e6c
Move handshake_fragment, handshake_fragment_len, alert_fragment and
...
alert_fragment_len from s->s3 into s->rlayer
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 15:02:00 +00:00
Matt Caswell
e2228d318c
Move s->s3->wnum to s->rlayer.wnum
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 15:02:00 +00:00
Matt Caswell
295c3f4111
Move s->rstate to s->rlayer.rstate
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 15:02:00 +00:00
Matt Caswell
7a7048aff0
Move s->packet and s->packet_length into s->rlayer
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 15:02:00 +00:00
Matt Caswell
24a90afd85
Remove unneccessary use of accessor function now code is moved into record
...
layer
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 15:02:00 +00:00
Matt Caswell
88c2303948
Make rrec, wrec, rbuf and wbuf fully private to the record layer. Also, clean
...
up some access to them. Now that various functions have been moved into the
record layer they no longer need to use the accessor macros.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 15:02:00 +00:00
Matt Caswell
2c60ed0452
Removed dependency on rrec from heartbeat processing
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 15:02:00 +00:00
Matt Caswell
bd2e3a9512
Introduce macro RECORD_LAYER_setup_comp_buffer
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 15:01:59 +00:00
Matt Caswell
75d40c9332
Fix bug where rrec was being released...should have been removed by one of
...
the earlier record layer commits
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 15:01:59 +00:00
Matt Caswell
d5a25ae0de
Move ssl3_pending into the record layer
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 15:01:59 +00:00
Matt Caswell
c036e210f3
Remove RECORD_LAYER_set_ssl and introduce RECORD_LAYER_init
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 15:01:59 +00:00
Matt Caswell
bbcd6d7fe2
Provide RECORD_LAYER_set_data function
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 15:01:59 +00:00
Matt Caswell
f161995e0e
Introduce the functions RECORD_LAYER_release, RECORD_LAYER_read_pending, and
...
RECORD_LAYER_write_pending.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 15:01:59 +00:00
Matt Caswell
af9752e5fa
Create RECORD_LAYER_clear function.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 15:01:59 +00:00
Matt Caswell
a0682a5e26
Tidy up rec_layer.h. Add some comments regarding which functions should be
...
being used for what purpose.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 15:01:59 +00:00
Matt Caswell
999005e493
Moved s3_pkt.c, s23_pkt.c and d1_pkt.c into the record layer.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 15:01:59 +00:00
Matt Caswell
c103c7e266
Split out non record layer functions out of s3_pkt.c and d1_pkt.c into
...
the new files s3_msg.c and s1_msg.c respectively.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 15:01:59 +00:00
Matt Caswell
02a36fdae8
Move more SSL3_RECORD oriented functions into ssl3_record.c
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 15:01:57 +00:00
Matt Caswell
fe589e6175
Move SSL3_RECORD oriented functions into ssl3_record.c
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 13:58:51 +00:00
Matt Caswell
7604202070
Move SSL3_BUFFER set up and release code into ssl3_buffer.c
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 13:56:10 +00:00
Matt Caswell
4e08d4a84c
Move s->s3->wrec to s>rlayer>wrec
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 13:53:07 +00:00
Matt Caswell
92ffa83d8b
Encapsulate s->s3->wrec
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 13:53:07 +00:00
Matt Caswell
cd986e5586
Move s->s3->rrec to s->rlayer->rrec
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 13:53:07 +00:00
Matt Caswell
258f8721a5
Encapsulate s->s3->rrec
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 13:53:07 +00:00
Matt Caswell
ab97b2cd43
Move s->s3->wbuf to s->rlayer->wbuf
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 13:53:07 +00:00
Matt Caswell
db9a32e719
Encapsulate access to s->s3->wbuf
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 13:53:07 +00:00
Matt Caswell
33d23b87a0
Move s->s3->rrec into s->rlayer
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 13:53:07 +00:00
Matt Caswell
28d59af874
Encapsulate SSL3_BUFFER and all access to s->s3->rbuf.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 13:53:07 +00:00
Matt Caswell
52e1d7b152
Create a RECORD_LAYER structure and move read_ahead into it.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-26 13:53:07 +00:00
Dr. Stephen Henson
8e3f0c988f
update ordinals
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-26 00:44:22 +00:00
Dr. Stephen Henson
c315a547e6
Move more internal only functions to asn1_locl.h
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-26 00:44:22 +00:00
Rich Salz
8fdc3734c0
free NULL cleanup.
...
This gets EC_GROUP_clear_free EC_GROUP_free, EC_KEY_free,
EC_POINT_clear_free, EC_POINT_free
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-03-25 18:35:24 -04:00
Matt Caswell
17dd65e6e1
Resolve swallowed returns codes
...
The recent updates to libssl to enforce stricter return code checking, left
a small number of instances behind where return codes were being swallowed
(typically because the function they were being called from was declared as
void). This commit fixes those instances to handle the return codes more
appropriately.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-25 18:52:13 +00:00
Dr. Stephen Henson
cb14aec713
make update
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-25 15:48:16 +00:00
Dr. Stephen Henson
c1ee50aac2
Move internal only ASN.1 functions to asn1_locl.h
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-25 15:48:16 +00:00
Dr. Stephen Henson
e20b57270d
Remove X509_ATTRIBUTE hack.
...
The X509_ATTRIBUTE structure includes a hack to tolerate malformed
attributes that encode as the type instead of SET OF type. This form
is never created by OpenSSL and shouldn't be needed any more.
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-25 15:46:54 +00:00
Rich Salz
ca3a82c3b3
free NULL cleanup
...
This commit handles BIO_ACCEPT_free BIO_CB_FREE BIO_CONNECT_free
BIO_free BIO_free_all BIO_vfree
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-25 11:31:18 -04:00
Dr. Stephen Henson
2011b169fa
Support key loading from certificate file
...
Support loading of key and certificate from the same file if
SSL_CONF_FLAG_REQUIRE_PRIVATE is set. This is done by remembering the
filename used for each certificate type and attempting to load a private
key from the file when SSL_CONF_CTX_finish is called.
Update docs.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-25 14:19:04 +00:00
Dr. Stephen Henson
9837bfbfc7
make depend
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-25 14:15:00 +00:00
Dr. Stephen Henson
2743e38c2f
make X509_NAME opaque
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-25 14:15:00 +00:00
Matt Caswell
70e5fd8778
Fix bug in s_client. Previously default verify locations would only be loaded
...
if CAfile or CApath were also supplied and successfully loaded first.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-25 13:03:57 +00:00
Matt Caswell
c62e94d805
Fix HMAC to pass invalid key len test
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-25 12:54:23 +00:00
Matt Caswell
b352160f81
Add HMAC test for invalid key len
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-25 12:54:18 +00:00
Matt Caswell
e2095c6531
Ensure that both the MD and key have been initialised before attempting to
...
create an HMAC
Inspired by BoringSSL commit 2fe7f2d0d9a6fcc75b4e594eeec306cc55acd594
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-25 12:54:11 +00:00
Matt Caswell
2cfbdd71dd
Add more HMAC tests
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-25 12:54:03 +00:00
Matt Caswell
969467466c
SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG was disabled in 0.9.8q and 1.0.0c.
...
This commit sets the value of SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG to
zero.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-25 12:48:28 +00:00
Matt Caswell
302d38e3f7
Deprecate RAND_pseudo_bytes
...
The justification for RAND_pseudo_bytes is somewhat dubious, and the reality
is that it is frequently being misused. RAND_bytes and RAND_pseudo_bytes in
the default implementation both end up calling ssleay_rand_bytes. Both may
return -1 in an error condition. If there is insufficient entropy then
both will return 0, but RAND_bytes will additionally add an error to the
error queue. They both return 1 on success.
Therefore the fundamental difference between the two is that one will add an
error to the error queue with insufficient entory whilst the other will not.
Frequently there are constructions of this form:
if(RAND_pseudo_bytes(...) <= 1)
goto err;
In the above form insufficient entropy is treated as an error anyway, so
RAND_bytes is probably the better form to use.
This form is also seen:
if(!RAND_pseudo_bytes(...))
goto err;
This is technically not correct at all since a -1 return value is
incorrectly handled - but this form will also treat insufficient entropy as
an error.
Within libssl it is required that you have correctly seeded your entropy
pool and so there seems little benefit in using RAND_pseudo_bytes.
Similarly in libcrypto many operations also require a correctly seeded
entropy pool and so in most interesting cases you would be better off
using RAND_bytes anyway. There is a significant risk of RAND_pseudo_bytes
being incorrectly used in scenarios where security can be compromised by
insufficient entropy.
If you are not using the default implementation, then most engines use the
same function to implement RAND_bytes and RAND_pseudo_bytes in any case.
Given its misuse, limited benefit, and potential to compromise security,
RAND_pseudo_bytes has been deprecated.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-25 12:38:19 +00:00
Matt Caswell
266483d2f5
RAND_bytes updates
...
Ensure RAND_bytes return value is checked correctly, and that we no longer
use RAND_pseudo_bytes.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-25 12:38:07 +00:00
Matt Caswell
8817e2e0c9
Fix return checks in GOST engine
...
Filled in lots of return value checks that were missing the GOST engine, and
added appropriate error handling.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-25 12:33:37 +00:00
Matt Caswell
7b611e5fe8
Fix misc NULL derefs in sureware engine
...
Fix miscellaneous NULL pointer derefs in the sureware engine.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-25 12:33:31 +00:00
Matt Caswell
4f9fab6bd0
Add ticket length before buffering DTLS message
...
In ssl3_send_new_session_ticket the message to be sent is constructed. We
skip adding the length of the session ticket initially, then call
ssl_set_handshake_header, and finally go back and add in the length of the
ticket. Unfortunately, in DTLS, ssl_set_handshake_header also has the side
effect of buffering the message for subsequent retransmission if required.
By adding the ticket length after the call to ssl_set_handshake_header the
message that is buffered is incomplete, causing an invalid message to be
sent on retransmission.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-25 12:24:36 +00:00
Matt Caswell
d5d0a1cb13
Ensure last_write_sequence is saved in DTLS1.2
...
In DTLS, immediately prior to epoch change, the write_sequence is supposed
to be stored in s->d1->last_write_sequence. The write_sequence is then reset
back to 00000000. In the event of retransmits of records from the previous
epoch, the last_write_sequence is restored. This commit fixes a bug in
DTLS1.2 where the write_sequence was being reset before last_write_sequence
was saved, and therefore retransmits are sent with incorrect sequence
numbers.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-25 12:24:10 +00:00
Rich Salz
d64070838e
free NULL cleanup
...
Start ensuring all OpenSSL "free" routines allow NULL, and remove
any if check before calling them.
This gets DH_free, DSA_free, RSA_free
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-24 23:17:16 -04:00
Dr. Stephen Henson
1300705a47
update ordinals
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-24 18:58:51 +00:00
Richard Levitte
e30a64fae7
Update ordinals
...
Thanks to the change of mkdef.pl, a few more deprecated functions were
properly defined in util/libeay.num.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-24 19:46:53 +01:00
Richard Levitte
fa327fafe2
Teach mkdef.pl to handle multiline declarations.
...
For the moment, this is specially crafted for DECLARE_DEPRECATED because
that's where we found the problem, but it can easily be expanded to other
types of special delarations when needed.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-24 19:46:53 +01:00
Dr. Stephen Henson
e5991ec528
Fix verify algorithm.
...
Disable loop checking when we retry verification with an alternative path.
This fixes the case where an intermediate CA is explicitly trusted and part
of the untrusted certificate list. By disabling loop checking for this case
the untrusted CA can be replaced by the explicitly trusted case and
verification will succeed.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-24 17:35:59 +00:00
Dr. Stephen Henson
2e43027757
make ASN1_OBJECT opaque
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-24 17:35:58 +00:00
Dr. Stephen Henson
7b68c30da0
Configuration file examples.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-24 12:22:52 +00:00
Dr. Stephen Henson
4ca5efc287
Make OCSP response verification more flexible.
...
If a set of certificates is supplied to OCSP_basic_verify use those in
addition to any present in the OCSP response as untrusted CAs when
verifying a certificate chain.
PR#3668
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-24 12:12:49 +00:00
Dr. Stephen Henson
86d20cb6fd
make depend
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-24 12:05:05 +00:00
Dr. Stephen Henson
27af42f9ac
Move some EVP internals to evp_int.h
...
Move EVP internals to evp_int.h, remove -Ievp hack from crypto/Makefile
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-24 12:03:36 +00:00
Dr. Stephen Henson
5fe736e5fc
Move some ASN.1 internals to asn1_int.h
...
Move ASN.1 internals used across multiple directories into new internal
header file asn1_int.h remove crypto/Makefile hack which allowed other
directories to include "asn1_locl.h"
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-24 12:03:36 +00:00
Rich Salz
0dfb9398bb
free NULL cleanup
...
Start ensuring all OpenSSL "free" routines allow NULL, and remove
any if check before calling them.
This gets ASN1_OBJECT_free and ASN1_STRING_free.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-24 07:52:24 -04:00
Mike Frysinger
7c82e339a6
Fix malloc define typo
...
Fix compilation failure when SCTP is compiled due to incorrect define.
Reported-by: Conrad Kostecki <ck+gentoobugzilla@bl4ckb0x.de >
URL: https://bugs.gentoo.org/543828
RT#3758
Signed-off-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-03-24 11:33:39 +00:00
Richard Levitte
2383a74be1
Use OPENSSL_malloc rather than malloc/calloc
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-24 12:21:12 +01:00
Richard Levitte
912d7c75d4
Fix eng_cryptodev to not depend on BN internals.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-24 12:21:12 +01:00
Richard Levitte
77b1f87214
Adjust include path
...
Thanks to a -I.., the path does work, at least on unix. However, this
doesn't work so well on VMS. Correcting the path to not rely on given
-I does work on both.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-24 11:59:01 +01:00
Richard Levitte
47b3182788
JPAKE Makefile missing 'files' target
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-24 11:57:14 +01:00
Dr. Stephen Henson
dd12df794a
Remove old style ASN.1 support.
...
Remove old ASN.1 COMPAT type. This was meant as a temporary measure
so older ASN.1 code (from OpenSSL 0.9.6) still worked. It's a hack
which breaks constification and hopefully nothing uses it now, if
it ever did.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-23 23:21:40 +00:00
Kurt Roeckx
4dcb4b91db
return unexpected message when receiving kx with kDHr or kDHd
...
It was saying that it was an illegal parameter / unsupported cipher
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-23 21:08:20 +01:00
Kurt Roeckx
93f1c13619
Don't send a for ServerKeyExchange for kDHr and kDHd
...
The certificate already contains the DH parameters in that case.
ssl3_send_server_key_exchange() would fail in that case anyway.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-23 21:08:20 +01:00
Kurt Roeckx
24a0d3933d
Make sure that cert is never NULL
...
Also removes for it being NULL
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-23 21:08:20 +01:00
Dr. Stephen Henson
06e6aa47de
Fix build.
...
Remove x_exten.c and x_exten.o from crypto/asn1/Makefile: they've moved now.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-23 18:47:05 +00:00
Dr. Stephen Henson
4903abd50a
make X509_EXTENSION opaque
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-03-23 18:27:04 +00:00
Matt Caswell
c7f5b5d7bc
Fix SSL_clear unused return
...
Fix missing return value check in dtls1_listen when calling SSL_clear().
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-23 16:02:21 +00:00
Matt Caswell
77d514c5a0
ssl3_set_handshake_header returns
...
Change ssl_set_handshake_header from return void to returning int, and
handle error return code appropriately.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-23 15:23:24 +00:00
Matt Caswell
ac59d70553
apps return value checks
...
Ensure that all libssl functions called from within the apps have their
return values checked where appropriate.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-23 15:23:18 +00:00
Matt Caswell
69f6823748
Fix missing return value checks
...
Ensure that all functions have their return values checked where
appropriate. This covers all functions defined and called from within
libssl.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-23 15:23:11 +00:00
Matt Caswell
4bcdb4a601
Check libssl function returns
...
Mark most functions returning a result defined in any libssl header file
with __owur to warn if they are used without checking the return value.
Use -DUNUSED_RETURN compiler flag with gcc to activate these warnings.
Some functions returning a result are skipped if it is common and valid to
use these functions without checking the return value.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-23 15:23:00 +00:00
Matt Caswell
913f1042b3
Add -DDEBUG_UNUSED to --strict-warnings
...
In order to receive warnings on unused function return values the flag
-DDEBUG_UNUSED must be passed to the compiler. This change adds that for the
--strict-warnings Configure option.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-23 15:22:36 +00:00
Richard Levitte
d2a5c40d0c
Remove PREFIX, as it's not used any more.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-23 16:16:00 +01:00
Richard Levitte
4a695602d2
Actually remove TABLE from version control
...
Follow up on the earlier "Do not keep TABLE in version control".
Actually removing TABLE from version control was forgotten.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-23 16:16:00 +01:00
Matt Caswell
b79d24101e
Don't check curves that haven't been sent
...
Don't check that the curve appears in the list of acceptable curves for the
peer, if they didn't send us such a list (RFC 4492 does not require that the
extension be sent).
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-03-23 14:03:39 +00:00
Dr. Stephen Henson
4fe67498b0
Remove deleted functions, update ordinals.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-23 13:47:57 +00:00
Dr. Stephen Henson
564df0ddea
Remove {i2d,d2i}_ASN1_BOOLEAN
...
Remove {i2d,d2i}_ASN1_BOOLEAN.
Rewrite single occurrence of d2i_ASN1_BOOLEAN in asn1_parse2
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-03-23 13:15:07 +00:00
Dr. Stephen Henson
f422a51486
Remove old ASN.1 code.
...
Remove old M_ASN1_ macros and replace any occurences with the corresponding
function.
Remove d2i_ASN1_bytes, d2i_ASN1_SET, i2d_ASN1_SET: no longer used internally.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-03-23 13:15:06 +00:00
Andy Polyakov
2ecd32a1f8
sha/asm/sha256-armv4.pl: adapt for use in Linux kernel context.
...
In cooperation with Ard Biesheuvel (Linaro) and Sami Tolvanen (Google).
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-23 13:34:03 +01:00
Richard Levitte
9b956beccd
Refer to $table{$target} rather than $table{$t}.
...
Using $t is an artifact from the earlier changes in Configure and was
unfortunately forgotten as is.
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-03-22 00:57:09 +01:00
Dr. Stephen Henson
77e127ea6e
Add AES unwrap test with invalid key.
...
This tests the unwrap algorithm with an invalid key. The result should
be rejected without returning any plaintext.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-03-20 23:22:17 +00:00
Dr. Stephen Henson
5724bd49a2
Fix memory leak.
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-03-20 23:22:17 +00:00
Richard Godbee
e6abba3ad6
CRYPTO_128_unwrap(): Fix refactoring damage
...
crypto/modes/wrap128.c was heavily refactored to support AES Key Wrap
with Padding, and four bugs were introduced into CRYPTO_128_unwrap() at
that time:
- crypto_128_unwrap_raw()'s return value ('ret') is checked incorrectly,
and the function immediately returns 'ret' in (almost) all cases.
This makes the IV checking code later in the function unreachable, but
callers think the IV check succeeded since CRYPTO_128_unwrap()'s
return value is non-zero.
FIX: Return 0 (error) if crypto_128_unwrap_raw() returned 0 (error).
- crypto_128_unwrap_raw() writes the IV to the 'got_iv' buffer, not to
the first 8 bytes of the output buffer ('out') as the IV checking code
expects. This makes the IV check fail.
FIX: Compare 'iv' to 'got_iv', not 'out'.
- The data written to the output buffer ('out') is "cleansed" if the IV
check fails, but the code passes OPENSSL_cleanse() the input buffer
length ('inlen') instead of the number of bytes that
crypto_128_unwrap_raw() wrote to the output buffer ('ret'). This
means that OPENSSL_cleanse() could potentially write past the end of
'out'.
FIX: Change 'inlen' to 'ret' in the OPENSSL_cleanse() call.
- CRYPTO_128_unwrap() is returning the length of the input buffer
('inlen') instead of the number of bytes written to the output buffer
('ret'). This could cause the caller to read past the end of 'out'.
FIX: Return 'ret' instead of 'inlen' at the end of the function.
PR#3749
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-03-20 23:22:17 +00:00
Richard Godbee
1062ecfc53
wrap128.c: Fix Doxygen comments
...
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-03-20 23:22:17 +00:00
Matt Caswell
3c381e5423
Add DTLS tests to make test
...
Updated test/testssl script to include the new DTLS capability in ssltest.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-03-20 12:00:56 +00:00
David Woodhouse
98b8cdd322
Add DTLS support to ssltest
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-03-20 12:00:48 +00:00
David Woodhouse
504e643e09
Add DTLS to SSL_get_version
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-03-20 12:00:02 +00:00
Richard Levitte
21ab123770
If the target is an old style debug- target, it will not have debugging [cl]flags
...
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-03-19 22:49:51 +01:00
Matt Caswell
5e5d53d341
Fix a failure to NULL a pointer freed on error.
...
Reported by the LibreSSL project as a follow on to CVE-2015-0209
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-19 13:01:13 +00:00
Matt Caswell
367eab2f9f
Update NEWS
...
Resync NEWS with the latest version from 1.0.2
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-19 13:01:13 +00:00
Matt Caswell
bdc234f3c3
Update CHANGES
...
Resync CHANGES with the latest version from 1.0.2.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-19 13:01:13 +00:00
Emilia Kasper
c225c3cf9b
PKCS#7: avoid NULL pointer dereferences with missing content
...
In PKCS#7, the ASN.1 content component is optional.
This typically applies to inner content (detached signatures),
however we must also handle unexpected missing outer content
correctly.
This patch only addresses functions reachable from parsing,
decryption and verification, and functions otherwise associated
with reading potentially untrusted data.
Correcting all low-level API calls requires further work.
CVE-2015-0289
Thanks to Michal Zalewski (Google) for reporting this issue.
Reviewed-by: Steve Henson <steve@openssl.org >
2015-03-19 13:01:13 +00:00
Dr. Stephen Henson
e677e8d135
Fix ASN1_TYPE_cmp
...
Fix segmentation violation when ASN1_TYPE_cmp is passed a boolean type. This
can be triggered during certificate verification so could be a DoS attack
against a client or a server enabling client authentication.
CVE-2015-0286
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-19 13:01:13 +00:00
Matt Caswell
d3cc5e610d
Fix DHE Null CKE vulnerability
...
If client auth is used then a server can seg fault in the event of a DHE
cipher being used and a zero length ClientKeyExchange message being sent
by the client. This could be exploited in a DoS attack.
CVE-2015-1787
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-19 13:01:13 +00:00
Dr. Stephen Henson
34e3edbf3a
Fix for CVE-2015-0291
...
If a client renegotiates using an invalid signature algorithms extension
it will crash a server with a NULL pointer dereference.
Thanks to David Ramos of Stanford University for reporting this bug.
CVE-2015-0291
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-03-19 13:01:13 +00:00
Dr. Stephen Henson
09f06923e6
Reject invalid PSS parameters.
...
Fix a bug where invalid PSS parameters are not rejected resulting in a
NULL pointer exception. This can be triggered during certificate
verification so could be a DoS attack against a client or a server
enabling client authentication.
Thanks to Brian Carpenter for reporting this issues.
CVE-2015-0208
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-03-19 13:01:13 +00:00
Dr. Stephen Henson
8106d61c35
Free up ADB and CHOICE if already initialised.
...
CVE-2015-0287
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-03-19 11:11:02 +00:00
Matt Caswell
e83ee04bb7
Fix Seg fault in DTLSv1_listen
...
The DTLSv1_listen function is intended to be stateless and processes
the initial ClientHello from many peers. It is common for user code to
loop over the call to DTLSv1_listen until a valid ClientHello is received
with an associated cookie. A defect in the implementation of DTLSv1_listen
means that state is preserved in the SSL object from one invokation to the
next that can lead to a segmentation fault. Erorrs processing the initial
ClientHello can trigger this scenario. An example of such an error could
be that a DTLS1.0 only client is attempting to connect to a DTLS1.2 only
server.
CVE-2015-0207
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-19 11:11:02 +00:00
Matt Caswell
1d2a18dc5a
Multiblock corrupted pointer fix
...
OpenSSL 1.0.2 introduced the "multiblock" performance improvement. This
feature only applies on 64 bit x86 architecture platforms that support AES
NI instructions. A defect in the implementation of "multiblock" can cause
OpenSSL's internal write buffer to become incorrectly set to NULL when
using non-blocking IO. Typically, when the user application is using a
socket BIO for writing, this will only result in a failed connection.
However if some other BIO is used then it is likely that a segmentation
fault will be triggered, thus enabling a potential DoS attack.
CVE-2015-0290
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-03-19 11:11:02 +00:00
Andy Polyakov
7ead0c8918
Configure: fold related configurations more aggressively and clean-up.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-18 16:27:00 +01:00
Richard Levitte
9e43c6b5c2
Correct the request of debug builds
...
./config would translate -d into having the target get a 'debug-'
prefix, and then run './Configure LIST' to find out if such a
debugging target exists or not.
With the recent changes, the separate 'debug-foo' targets are
disappearing, and we're giving the normal targets debugging
capabilities instead. Unfortunately, './config' wasn't changed to
match this new behavior.
This change introduces the arguments '--debug' and '--release' - the
latter just for orthogonality - to ./Configure, and ./config now
treats -d by adding '--debug' to the options for ./Configure.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-17 17:01:31 +01:00
Matt Caswell
11abf92259
Dead code removal from apps
...
Some miscellaneous removal of dead code from apps. Also fix an issue with
error handling with pkcs7.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-17 14:49:01 +00:00
Matt Caswell
b7573c597c
Remove dead code from crypto
...
Some miscellaneous removal of dead code from lib crypto.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-17 14:48:44 +00:00
Matt Caswell
e4676e900f
Fix probable_prime over large shift
...
In the probable_prime() function we behave slightly different if the number
of bits we are interested in is <= BN_BITS2 (the num of bits in a BN_ULONG).
As part of the calculation we work out a size_limit as follows:
size_limit = (((BN_ULONG)1) << bits) - BN_get_word(rnd) - 1;
There is a problem though if bits == BN_BITS2. Shifting by that much causes
undefined behaviour. I did some tests. On my system BN_BITS2 == 64. So I
set bits to 64 and calculated the result of:
(((BN_ULONG)1) << bits)
I was expecting to get the result 0. I actually got 1! Strangely this...
(((BN_ULONG)0) << BN_BITS2)
...does equal 0! This means that, on my system at least, size_limit will be
off by 1 when bits == BN_BITS2.
This commit fixes the behaviour so that we always get consistent results.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-03-17 13:41:49 +00:00
Matt Caswell
3475c7a185
Fix unintended sign extension
...
The function CRYPTO_128_unwrap_pad uses an 8 byte AIV (Alternative Initial
Value). The least significant 4 bytes of this is placed into the local
variable |ptext_len|. This is done as follows:
ptext_len = (aiv[4] << 24) | (aiv[5] << 16) | (aiv[6] << 8) | aiv[7];
aiv[4] is an unsigned char, but (aiv[4] << 24) is promoted to a *signed*
int - therefore we could end up shifting into the sign bit and end up with
a negative value. |ptext_len| is a size_t (typically 64-bits). If the
result of the shifts is negative then the upper bits of |ptext_len| will
all be 1.
This commit fixes the issue by explicitly casting to an unsigned int.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-17 13:39:53 +00:00
Matt Caswell
dfef52f6f2
Fix seg fault in s_time
...
Passing a negative value for the "-time" option to s_time results in a seg
fault. This commit fixes it so that time has to be greater than 0.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-03-17 13:39:53 +00:00
Matt Caswell
668f6f08c6
Add sanity check to PRF
...
The function tls1_PRF counts the number of digests in use and partitions
security evenly between them. There always needs to be at least one digest
in use, otherwise this is an internal error. Add a sanity check for this.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-17 13:39:53 +00:00
Matt Caswell
7132ac830f
Fix memset call in stack.c
...
The function sk_zero is supposed to zero the elements held within a stack.
It uses memset to do this. However it calculates the size of each element
as being sizeof(char **) instead of sizeof(char *). This probably doesn't
make much practical difference in most cases, but isn't a portable
assumption.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-17 13:39:53 +00:00
Matt Caswell
be1477adc9
Move malloc fail checks closer to malloc
...
Move memory allocation failure checks closer to the site of the malloc in
dgst app. Only a problem if the debug flag is set...but still should be
fixed.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-03-17 13:39:53 +00:00
Matt Caswell
a561bfe944
Add malloc failure checks
...
Add some missing checks for memory allocation failures in ca app.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-03-17 13:39:53 +00:00
Richard Levitte
e3c159648d
Do not keep TABLE in version control.
...
TABLE was always a debugging tool, and permitted everyone to see the
effect of changes in the string-format configs. The hash-format
configs being much more readable, distributing TABLE becomes much less
necessary.
Being able to produce a TABLE is kept, however, as it still is a
useful debugging tool for configs, what with multi-level inheritance
and all.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-03-16 22:56:43 +01:00
Richard Levitte
a5250ec02f
Configuration cleanup: personal configs
...
Move obviously personal configurations to personal files.
Note: those files should really not be in the main repo at all
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-03-16 22:18:08 +01:00
Richard Levitte
d52dcf8da7
Updated TABLE
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-03-16 22:16:31 +01:00
Richard Levitte
7910044064
Find debug- targets that can be combined with their non-debug counterparts and do so
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-03-16 22:16:31 +01:00
Richard Levitte
5e1b23536a
Change all the main configurations to the new format.
...
As part of this, remove some levitte examples that never were relevant.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-03-16 22:16:30 +01:00
Richard Levitte
b124552999
Rethink templates.
...
Because base templates express inheritance of values, the attribute is
renamed to 'inherit_from', and texts about this talk about 'inheritance(s)'
rather than base templates.
As they were previously implemented, base templates that were listed
together would override one another, the first one acting as defaults for
the next and so on.
However, it was pointed out that a strength of inheritance would be to
base configurations on several templates - for example one for CPU, one
for operating system and one for compiler - and that requires a different
way of combining those templates. With this change, inherited values
from several inheritances are concatenated by default (keep on reading).
Also, in-string templates with the double-curly syntax are removed,
replaced with the possibility to have a configuration value be a coderef
(i.e. a 'sub { /* your code goes here */ }') that gets the list of values
from all inheritances as the list @_. The result of executing such a
coderef on a list of values is assumed to become a string. ANY OTHER
FORM OF VALUE WILL CURRENTLY BREAK.
As a matter of fact, an attribute in the current config with no value is
assumed to have this coderef as value:
sub { join(' ', @_) }
While we're at it, rename debug-[cl]flags to debug_[cl]flags and
nodebug-[cl]flags to release_[cl]flags.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-03-16 22:16:30 +01:00
Richard Levitte
70e4f10346
Provide a few examples by converting my own strings to hash table configurations
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-03-16 22:16:30 +01:00
Richard Levitte
7d46b9426f
Add base template processing.
...
Base templates are templates that are used to inherit from. They can
loosely be compared with parent class inheritance in object orientation.
They can be used for the same purpose as the variables with multi-field
strings are used in old-style string configurations.
Base templates are declared with the base_templates configuration
attribute, like so:
"example_target" => {
base_templates => [ "x86_asm", ... ]
...
}
Note: The value of base_templates MUST be an array reference (an array
enclosed in square brackets).
Any configuration target can be used as a base template by another. It
is also possible to have a target that's a pure template and not meant to
be used directly as a configuration target. Such a target is marked with
the template configuration attribute, like so:
"example_template" => {
template => 1,
cc => "mycc",
...
},
As part of this commit, all variables with multi-field strings have been
translated to pure templates. The variables currently remain since we
can't expect people to shift to hash table configurations immediately.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-03-16 22:16:30 +01:00
Richard Levitte
09816a2e33
Add template reference processing.
...
Template references are words with double brackets, and refer to the
same field in the target pointed at the the double bracketed word.
For example, if a target's configuration has the following entry:
'cflags' => '-DFOO {{x86_debug}}'
... then {{x86_debug}} will be replaced with the 'cflags' value from
target 'x86_debug'.
Note: template references are resolved recursively, and circular
references are not allowed
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-03-16 22:16:30 +01:00
Richard Levitte
aaf878cc97
Rewrite Configure to handle the target values as hash tables.
...
The reasoning is that configuration strings are hard to read and error
prone, and that a better way would be for them to be key => value hashes.
Configure is made to be able to handle target configuration values as a
string as well as a hash. It also does the best it can to combine a
"debug-foo" target with a "foo" target, given that they are similar
except for the cflags and lflags values. The latter are spliced into
options that are common for "debug-foo" and "foo", options that exist
only with "debug-foo" and options that exist only with "foo", and make
them into combinable attributes that holds common cflags, extra cflags
for debuggin and extra cflags for non-debugging configurations.
The next step is to make it possible to have template configurations.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-03-16 22:16:30 +01:00
Dr. Stephen Henson
9b0a453190
Make X509_ATTRIBUTE opaque.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-03-16 15:54:19 +00:00
Carl Jackson
da27006df0
Fix regression in ASN1_UTCTIME_cmp_time_t
...
Previously, ASN1_UTCTIME_cmp_time_t would return 1 if s > t, -1 if
s < t, and 0 if s == t.
This behavior was broken in a refactor [0], resulting in the opposite
time comparison behavior.
[0]: 904348a492
PR#3706
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-03-15 19:46:24 +00:00
Rich Salz
556efe7961
OPENSSL_NO_EC* merge; missed one file
...
Missed one file in the #ifdef merge; thanks Kurt.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-03-15 14:49:15 -04:00
Dr. Stephen Henson
eef53ee50b
Update ordinals, fix error message.
...
Update error messages to say "EC is disabled" these can then be picked up
by mkdef.pl.
Update ordinals.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-03-15 15:56:24 +00:00
Kurt Roeckx
2c3823491d
Remove ssl_cert_inst()
...
It created the cert structure in SSL_CTX or SSL if it was NULL, but they can
never be NULL as the comments already said.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2015-03-15 12:15:08 +01:00
Andy Polyakov
9fbbdd73c5
Avoid reading an unused byte after the buffer
...
Other curves don't have this problem.
Reviewed-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-03-14 18:23:41 +01:00
Emilia Kasper
8b37e5c14f
Fix undefined behaviour in shifts.
...
Td4 and Te4 are arrays of u8. A u8 << int promotes the u8 to an int first then shifts.
If the mathematical result of a shift (as modelled by lhs * 2^{rhs}) is not representable
in an integer, behaviour is undefined. In other words, you can't shift into the sign bit
of a signed integer. Fix this by casting to u32 whenever we're shifting left by 24.
(For consistency, cast other shifts, too.)
Caught by -fsanitize=shift
Submitted by Nick Lewycky (Google)
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-03-13 21:10:13 -07:00
Dr. Stephen Henson
3d6aa6d441
Allocate string types directly.
...
Allocate and free ASN.1 string types directly instead of going through
the ASN.1 item code.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-03-13 16:42:44 +00:00
Petr Spacek
ffa75828dd
Fix key wrapping mode with padding to conform to RFC 5649.
...
According to RFC 5649 section 4.1 step 1) we should not add padding
if plaintext length is multiply of 8 ockets.
This matches pseudo-code in http://dx.doi.org/10.6028/NIST.SP.800-38F
on page 15, section 6.3 KWP, algorithm 5 KWP-AE, step 2.
PR#3675
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-03-13 14:18:59 +00:00
Dr. Stephen Henson
b5f07d6a66
Remove obsolete declarations.
...
Remove DECLARE_ASN1_SET_OF and DECLARE_PKCS12_STACK_OF these haven't been
used internally in OpenSSL for some time.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-03-12 14:12:17 +00:00
Dr. Stephen Henson
f9c850c734
Update mkstack.pl to match safestack.h
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-03-12 14:05:27 +00:00
Dr. Stephen Henson
5dc1247a74
ASN.1 print fix.
...
When printing out an ASN.1 structure if the type is an item template don't
fall thru and attempt to interpret as a primitive type.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-03-12 13:31:43 +00:00
Dr. Stephen Henson
3d764db7a2
additional configuration documentation
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-03-12 13:31:43 +00:00
Matt Caswell
007fd1404f
Fix RSA_X931_derive_ex
...
In the RSA_X931_derive_ex a call to BN_CTX_new is made. This can return
NULL on error. However the return value is not tested until *after* it is
derefed! Also at the top of the function a test is made to ensure that
|rsa| is not NULL. If it is we go to the "err" label. Unfortunately the
error handling code deref's rsa.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-03-12 09:26:14 +00:00
Matt Caswell
d813f9eb38
SSL_check_chain fix
...
If SSL_check_chain is called with a NULL X509 object or a NULL EVP_PKEY
or the type of the public key is unrecognised then the local variable
|cpk| in tls1_check_chain does not get initialised. Subsequently an
attempt is made to deref it (after the "end" label), and a seg fault will
result.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2015-03-12 09:25:32 +00:00
Matt Caswell
c5f2b5336a
Fix missing return checks in v3_cpols.c
...
Fixed assorted missing return value checks in c3_cpols.c
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-03-12 09:24:25 +00:00
Matt Caswell
0c7ca4033d
Fix dsa_pub_encode
...
The return value from ASN1_STRING_new() was not being checked which could
lead to a NULL deref in the event of a malloc failure. Also fixed a mem
leak in the error path.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-03-12 09:23:42 +00:00
Matt Caswell
6aa8dab2bb
Fix dh_pub_encode
...
The return value from ASN1_STRING_new() was not being checked which could
lead to a NULL deref in the event of a malloc failure. Also fixed a mem
leak in the error path.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-03-12 09:22:56 +00:00
Matt Caswell
34a7ed0c39
Fix asn1_item_print_ctx
...
The call to asn1_do_adb can return NULL on error, so we should check the
return value before attempting to use it.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-03-12 09:22:19 +00:00
Matt Caswell
9e488fd6ab
ASN1_primitive_new NULL param handling
...
ASN1_primitive_new takes an ASN1_ITEM * param |it|. There are a couple
of conditional code paths that check whether |it| is NULL or not - but
later |it| is deref'd unconditionally. If |it| was ever really NULL then
this would seg fault. In practice ASN1_primitive_new is marked as an
internal function in the public header file. The only places it is ever
used internally always pass a non NULL parameter for |it|. Therefore, change
the code to sanity check that |it| is not NULL, and remove the conditional
checking.
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-03-12 09:20:45 +00:00
Matt Caswell
a01087027b
Fix EVP_DigestInit_ex with NULL digest
...
Calling EVP_DigestInit_ex which has already had the digest set up for it
should be possible. You are supposed to be able to pass NULL for the type.
However currently this seg faults.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-03-12 09:19:24 +00:00
Matt Caswell
8c5a7b33c6
Fix error handling in bn_exp
...
In the event of an error |rr| could be NULL. Therefore don't assume you can
use |rr| in the error handling code.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-03-12 09:18:22 +00:00
Andy Polyakov
6b937f8b11
ssl/s3_clnt.c: fix intermittent failures.
...
[and respect error return value in ssltest.c]
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-12 08:54:28 +01:00
Rich Salz
10bf4fc2c3
Merge OPENSSL_NO_EC{DH,DSA} into OPENSSL_NO_EC
...
Suggested by John Foley <foleyj@cisco.com >.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-11 09:29:37 -04:00
Matt Caswell
ac5a110621
Fix seg fault in ASN1_generate_v3/ASN1_generate_nconf
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2015-03-11 11:18:15 +00:00
Richard Levitte
97a0cc5281
Move Configurations* out of the way and rename them.
...
Configure would load the glob "Configurations*". The problem with
this is that it also loads all kinds of backups of those
configurations that some editors do, like emacs' classic
'Configurations~'. The solution is to give them an extension, such as
'.conf', and make sure to end the glob with that.
Also, because 'Configurations.conf' makes for a silly name, and
because a possibly large number of configurations will become clutter,
move them to a subdirectory 'Configurations/', and rename them to
something more expressive, as well as something that sets up some form
of sorting order. Thus:
Configurations -> Configurations/10-main.conf
Configurations.team -> Configurations/90-team.conf
Finally, make sure that Configure sorts the list of files that 'glob'
produces, and adapt Makefile.org.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-03-11 12:07:25 +01:00
Matt Caswell
c9dd49a751
Cleanse buffers
...
Cleanse various intermediate buffers used by the PRF.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-11 10:40:44 +00:00
Emilia Kasper
06c6a2b4a3
Harmonize return values in dtls1_buffer_record
...
Ensure all malloc failures return -1.
Reported by Adam Langley (Google).
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-10 12:18:18 -07:00
Richard Godbee
460e920d8a
BIO_debug_callback: Fix output on 64-bit machines
...
BIO_debug_callback() no longer assumes the hexadecimal representation of
a pointer fits in 8 characters.
Signed-off-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-10 12:32:39 +01:00
Matt Caswell
e1b568dd24
Prevent handshake with unseeded PRNG
...
Fix security issue where under certain conditions a client can complete a
handshake with an unseeded PRNG. The conditions are:
- Client is on a platform where the PRNG has not been seeded, and the
user has not seeded manually
- A protocol specific client method version has been used (i.e. not
SSL_client_methodv23)
- A ciphersuite is used that does not require additional random data
from the PRNG beyond the initial ClientHello client random
(e.g. PSK-RC4-SHA)
If the handshake succeeds then the client random that has been used will
have been generated from a PRNG with insufficient entropy and therefore
the output may be predictable.
For example using the following command with an unseeded openssl will
succeed on an unpatched platform:
openssl s_client -psk 1a2b3c4d -tls1_2 -cipher PSK-RC4-SHA
CVE-2015-0285
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-10 10:42:42 +00:00
Dmitry-Me
0b142f022e
Fix wrong numbers being passed as string lengths
...
Signed-off-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-09 21:02:41 +01:00
Dr. Stephen Henson
99e1ad3c4b
update ordinals
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-09 16:55:18 +00:00
David Woodhouse
f7683aaf36
Wrong SSL version in DTLS1_BAD_VER ClientHello
...
Since commit 741c9959 ("DTLS revision."), we put the wrong protocol
version into our ClientHello for DTLS1_BAD_VER. The old DTLS
code which used ssl->version was replaced by the more generic SSL3 code
which uses ssl->client_version. The Cisco ASA no longer likes our
ClientHello.
RT#3711
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-03-09 11:04:39 +00:00
Matt Caswell
5178a16c43
Fix DTLS1_BAD_VER regression
...
Commit 9cf0f187 in HEAD, and 68039af3 in 1.0.2, removed a version check
from dtls1_buffer_message() which was needed to distinguish between DTLS
1.x and Cisco's pre-standard version of DTLS (DTLS1_BAD_VER).
Based on an original patch by David Woodhouse <dwmw2@infradead.org >
RT#3703
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-03-09 10:51:57 +00:00
Dr. Stephen Henson
a8ae0891d4
Cleanse PKCS#8 private key components.
...
New function ASN1_STRING_clear_free which cleanses an ASN1_STRING
structure before freeing it.
Call ASN1_STRING_clear_free on PKCS#8 private key components.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-03-08 16:27:55 +00:00
Dr. Stephen Henson
e3013932df
Additional CMS documentation.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-03-08 16:18:21 +00:00
Andy Polyakov
e390ae50e0
ARMv4 assembly pack: add Cortex-A15 performance data.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-03-08 14:09:32 +01:00
Viktor Szakats
63a3c45582
GitHub 237: Use https for IETF links
...
Signed-off-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-03-07 21:24:40 -05:00
Matt Caswell
f3b9ce90bb
make errors
...
Run make errors on master
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-06 14:06:17 +00:00
Matt Caswell
65aaab2fa6
Update mkerr.pl for new format
...
Make the output from mkerr.pl consistent with the newly reformatted code.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-06 14:06:16 +00:00
Richard Levitte
c7223a115f
update TABLE
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-03-06 10:22:43 +01:00
Richard Levitte
4a577300c2
Cleanup spaces
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-03-06 10:22:43 +01:00
Richard Levitte
cdca82dcde
Catch up the VMS build.
...
crypto/crypto-lib.com - catch up with the OCSP changes
test/maketest.com and test/tests.com - catch up with the addition of test_evp_extra
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-03-05 18:20:06 +01:00
Dr. Stephen Henson
31c2b6ee7a
Make STACK_OF opaque.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-05 15:51:03 +00:00
Dr. Stephen Henson
d62bc5d30f
update ordinals
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-05 15:44:41 +00:00
Dr. Stephen Henson
6ef869d7d0
Make OCSP structures opaque.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-05 14:47:48 +00:00
Kurt Cancemi
fd865cadcb
Use constants not numbers
...
This patch uses warning/fatal constants instead of numbers with comments for
warning/alerts in d1_pkt.c and s3_pkt.c
RT#3725
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-03-05 09:25:53 +00:00
Matt Caswell
918bb86529
Unchecked malloc fixes
...
Miscellaneous unchecked malloc fixes. Also fixed some mem leaks on error
paths as I spotted them along the way.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-03-05 09:09:57 +00:00
Dr. Stephen Henson
618be04e40
add RIPEMD160 whirlpool tests
...
Add RIPEMD160 and whirlpool test data.
Add Count keyword to repeatedly call EVP_DigestUpate.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-04 13:30:42 +00:00
Dr. Stephen Henson
28a00bcd8e
Check public key is not NULL.
...
CVE-2015-0288
PR#3708
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-03-02 15:24:53 +00:00
Dr. Stephen Henson
437b14b533
Fix format script.
...
The format script didn't correctly recognise some ASN.1 macros and
didn't reformat some files as a result. Fix script and reformat
affected files.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-03-02 13:26:29 +00:00
Rich Salz
9f7f8eced5
Cleanup some doc files
...
ACKNOWLEDGEMENTS is now spelled correctly :)
README.ASN1 talked about 0.9.6, so it's deleted.
I turned doc/standards.txt into a set of one-line summaries of RFCs, and
also updated the pointers to original sources (to be web links)
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-01 20:46:38 -05:00
Rich Salz
a258afaf7c
Remove experimental 56bit export ciphers
...
These ciphers are removed:
TLS1_CK_RSA_EXPORT1024_WITH_RC4_56_MD5
TLS1_CK_RSA_EXPORT1024_WITH_RC2_CBC_56_MD5
TLS1_CK_RSA_EXPORT1024_WITH_DES_CBC_SHA
TLS1_CK_DHE_DSS_EXPORT1024_WITH_DES_CBC_SHA
TLS1_CK_RSA_EXPORT1024_WITH_RC4_56_SHA
TLS1_CK_DHE_DSS_EXPORT1024_WITH_RC4_56_SHA
TLS1_CK_DHE_DSS_WITH_RC4_128_SHA
They were defined in a long-expired IETF internet-draft:
draft-ietf-tls-56-bit-ciphersuites-01.txt
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-03-01 16:18:16 -05:00
Matt Caswell
af674d4e20
Fix d2i_SSL_SESSION for DTLS1_BAD_VER
...
Some Cisco appliances use a pre-standard version number for DTLS. We support
this as DTLS1_BAD_VER within the code.
This change fixes d2i_SSL_SESSION for that DTLS version.
Based on an original patch by David Woodhouse <dwmw2@infradead.org >
RT#3704
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-02-27 20:29:03 +00:00
Matt Caswell
eadf70d2c8
Fixed missing return value checks.
...
Added various missing return value checks in tls1_change_cipher_state.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-02-27 15:09:28 +00:00
Matt Caswell
687eaf27a7
Fix missing return value checks.
...
Fixed various missing return value checks in ssl3_send_newsession_ticket.
Also a mem leak on error.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-02-27 15:09:02 +00:00
Dr. Stephen Henson
366448ec5e
reformat evp_test.c
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-02-27 02:50:41 +00:00
Dr. Stephen Henson
2207ba7b44
Add OCB support and test vectors for evp_test.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-02-27 02:48:19 +00:00
Dr. Stephen Henson
578ce42d35
Skip unsupported digests in evp_test
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-02-27 00:18:10 +00:00
Dr. Stephen Henson
7406e32396
add MD4 test data
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-02-27 00:18:10 +00:00
Dr. Stephen Henson
33a89fa66c
Skip unsupported ciphers in evp_test.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-02-27 00:18:10 +00:00
Dr. Stephen Henson
35313768c7
Make OpenSSL compile with no-rc4
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-02-27 00:18:10 +00:00
Dr. Stephen Henson
7a6c979242
Add algorithm skip support.
...
Add support for skipping disabled algorithms: if an attempt to load a
public or private key results in an unknown algorithm error then any
test using that key is automatically skipped.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-02-27 00:16:39 +00:00
Matt Caswell
a988036259
Fix evp_extra_test.c with no-ec
...
When OpenSSL is configured with no-ec, then the new evp_extra_test fails to
pass. This change adds appropriate OPENSSL_NO_EC guards around the code.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-02-26 23:31:03 +00:00
Matt Caswell
cf61ef75be
Remove NETSCAPE_HANG_BUG
...
NETSCAPE_HANG_BUG is a workaround for a browser bug from many years ago
(2000).
It predates DTLS, so certainly has no place in d1_srvr.c.
In s3_srvr.c it forces the ServerDone to appear in the same record as the
CertificateRequest when doing client auth.
BoringSSL have already made the same commit:
79ae85e4f777f94d91b7be19e8a62016cb55b3c5
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-02-26 23:27:09 +00:00
Matt Caswell
7a4dadc3a6
Removed support for SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG. Also removed
...
the "-hack" option from s_server that set this option.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-02-26 23:22:46 +00:00
Matt Caswell
f7812493a0
Update the SHA* documentation
...
Updates to include SHA224, SHA256, SHA384 and SHA512. In particular note
the restriction on setting md to NULL with regards to thread safety.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-02-25 20:52:34 +00:00
Rainer Jung
64d2733176
Fix NAME section of d2i_ECPKParameters to prevent broken symlinks when using
...
the extract-names.pl script.
RT#3718
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-02-25 20:46:51 +00:00
Matt Caswell
12e0ea306a
Fix some minor documentation issues
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-02-25 17:13:34 +00:00
Matt Caswell
535bc8faf6
Remove pointless free, and use preferred way of calling d2i_* functions
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-02-25 17:13:24 +00:00
Matt Caswell
09f278f925
Add dire warnings about the "reuse" capability of the d2i_* functions.
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-02-25 17:13:19 +00:00
Matt Caswell
93b83d0626
Provide documentation for i2d_ECPrivateKey and d2i_ECPrivateKey
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-02-25 17:13:14 +00:00
Matt Caswell
9e442d4850
Fix a failure to NULL a pointer freed on error.
...
Inspired by BoringSSL commit 517073cd4b by Eric Roman <eroman@chromium.org >
CVE-2015-0209
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-02-25 17:13:07 +00:00
Matt Caswell
71ea6b4836
Import evp_test.c from BoringSSL. Unfortunately we already have a file
...
called evp_test.c, so I have called this one evp_extra_test.c
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-02-25 17:12:53 +00:00
Matt Caswell
fa7b01115b
Add documentation for the -no_alt_chains option for various apps, as well as
...
the X509_V_FLAG_NO_ALT_CHAINS flag.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2015-02-25 09:15:10 +00:00
Matt Caswell
25690b7f5f
Add -no_alt_chains option to apps to implement the new
...
X509_V_FLAG_NO_ALT_CHAINS flag. Using this option means that when building
certificate chains, the first chain found will be the one used. Without this
flag, if the first chain found is not trusted then we will keep looking to
see if we can build an alternative chain instead.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2015-02-25 09:15:02 +00:00
Matt Caswell
15dba5be6a
Add flag to inhibit checking for alternate certificate chains. Setting this
...
behaviour will force behaviour as per previous versions of OpenSSL
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2015-02-25 09:14:54 +00:00
Matt Caswell
da084a5ec6
In certain situations the server provided certificate chain may no longer be
...
valid. However the issuer of the leaf, or some intermediate cert is in fact
in the trust store.
When building a trust chain if the first attempt fails, then try to see if
alternate chains could be constructed that are trusted.
RT3637
RT3621
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2015-02-25 09:14:13 +00:00
Rich Salz
5b8aa1a2af
Remove CVS filtering from find targets
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-02-24 17:45:08 -05:00
Rich Salz
f09e7ca94b
Move build config table to separate files.
...
Move the build configuration table into separate files. The Configurations
file is standard configs, and Configurations.team is for openssl-team
members. Any other file, Configurations*, found in the same directory
as the Configure script, is loaded.
To add another file, use --config=FILE flags (which should probably be
an absolute path).
Written by Stefen Eissing <stefan.eissing@greenbytes.de > and Rich Salz
<rsalz@openssl.org >, contributed by Akamai Technologies.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-02-24 17:40:22 -05:00
Dr. Stephen Henson
384dee5124
Document -no_explicit
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-02-24 15:27:33 +00:00
Andy Polyakov
775b669de3
Fix crash in SPARC T4 XTS.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-02-24 10:11:36 +01:00
Andy Polyakov
e620e5ae37
aes/asm/bsaes-armv7: fix kernel-side XTS and harmonize with Linux.
...
XTS bug spotted and fix suggested by Adrian Kotelba.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-02-24 10:08:57 +01:00
Dr. Stephen Henson
ccc227565d
Don't set no_protocol if -tls1 selected.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-02-24 02:28:23 +00:00
Andy Polyakov
2f8d82d641
perlasm/x86masm.pl: make it work.
...
Though this doesn't mean that masm becomes supported, the script is
still provided on don't-ask-in-case-of-doubt-use-nasm basis.
See RT#3650 for background.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-02-22 19:23:25 +01:00
Andy Polyakov
3372c4fffa
sha/asm/sha1-586.pl: fix typo.
...
The typo doesn't affect supported configuration, only unsupported masm.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-02-22 19:19:26 +01:00
Andy Polyakov
1526fea544
evp/evp_test.c: avoid crashes when referencing uninitialized pointers.
...
For some reason failure surfaced on ARM platforms.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-02-22 19:13:35 +01:00
Dr. Stephen Henson
15b5d6585d
typo
...
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2015-02-22 14:43:09 +00:00
Edgar Pek
bcfa19a8d1
Fix null-pointer dereference
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-02-22 13:20:10 +01:00
Kurt Roeckx
edac5dc220
Fix memory leak
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-02-22 13:18:24 +01:00
Doug Hogan
1549a26520
Avoid a double-free in an error path.
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-02-22 13:17:40 +01:00
Richard Levitte
ba4bdee718
Restore -DTERMIO/-DTERMIOS on Windows platforms.
...
The previous defaulting to TERMIOS took away -DTERMIOS / -DTERMIO a
bit too enthusiastically. Windows/DOSish platforms of all sorts get
identified as OPENSSL_SYS_MSDOS, and they get a different treatment
altogether UNLESS -DTERMIO or -DTERMIOS is explicitely given with the
configuration. The answer is to restore those macro definitions for
the affected configuration targets.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-02-22 08:27:36 +01:00
Richard Levitte
64e6bf64b3
Assume TERMIOS is default, remove TERMIO on all Linux.
...
The rationale for this move is that TERMIOS is default, supported by
POSIX-1.2001, and most definitely on Linux. For a few other systems,
TERMIO may still be the termnial interface of preference, so we keep
-DTERMIO on those in Configure.
crypto/ui/ui_openssl.c is simplified in this regard, and will define
TERMIOS for all systems except a select few exceptions.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-02-21 23:51:05 +01:00
Dr. Stephen Henson
146ca72cca
Add additional EC documentation.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-02-21 00:45:06 +00:00
Dr. Stephen Henson
86f300d385
Use named curve parameter encoding by default.
...
Many applications require named curve parameter encoding instead of explicit
parameter encoding (including the TLS library in OpenSSL itself). Set this
encoding by default instead of requiring an explicit call to set it.
Add OPENSSL_EC_EXPLICT_CURVE define.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-02-19 14:44:46 +00:00
Dr. Stephen Henson
f37879d077
More RSA tests.
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-02-14 18:44:49 +00:00
Dr. Stephen Henson
f9e3146392
remove unused method declaration
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-02-13 14:00:21 +00:00
Dr. Stephen Henson
e5bf3c923c
size_t for buffer functions.
...
Change BUF_MEM_grow and BUF_MEM_grow_clean to return size_t.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-02-13 13:50:36 +00:00
Dr. Stephen Henson
d5ec8efc70
Add leak detection, fix leaks.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-02-13 13:28:50 +00:00
Dr. Stephen Henson
b9d4e97c87
Add EVP_PKEY test data.
...
Add some EVP_PKEY test data for sign and verify tests including
failure cases.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-02-13 13:28:50 +00:00
Dr. Stephen Henson
5824cc2981
EVP_PKEY support for evp_test
...
Add two new keywords "PublicKey" and "PrivateKey". These will load a key
in PEM format from the lines immediately following the keyword and assign
it a name according to the value. These will be used later for public and
private key testing operations.
Add tests for Sign, Verify, VerifyRecover and Decrypt.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-02-13 13:28:50 +00:00
Dr. Stephen Henson
16cb8eb013
Add CMAC test data.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-02-13 13:28:50 +00:00
Dr. Stephen Henson
b8c792dc43
Add HMAC test data.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-02-13 13:28:50 +00:00
Dr. Stephen Henson
83251f397b
MAC support for evp_test
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-02-13 13:28:50 +00:00
Dr. Stephen Henson
eff1a4d24f
New macro to set mac key.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-02-13 13:28:50 +00:00
Dr. Stephen Henson
6906a7c1a3
Return error code is any tests fail.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-02-13 13:28:50 +00:00
Richard Levitte
774ccae63c
Transfer a fix from 1.0.1
...
manually picked from e7b85bc402
Reviewed-by: Stephen Henson <steve@openssl.org >
2015-02-13 13:39:05 +01:00
Rich Salz
c81f425eaa
RT937: Enable pilotAttributeType uniqueIdentifier
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-02-12 14:38:31 -05:00
Andy Polyakov
2b8f33a574
evp/evp.h: add missing camellia-ctr declarations.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-02-12 19:26:37 +01:00
Graeme Perrow
b0333e697c
RT3670: Check return from BUF_MEM_grow_clean
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-02-12 13:00:42 -05:00
Clang via Jeffrey Walton
5006c32253
RT3684: rand_egd needs stddef.h
...
And remove backup definition of offsetof.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-02-12 12:50:09 -05:00
Eric Dequin
1d2932de4c
Missing OPENSSL_free on error path.
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-02-12 11:14:57 -05:00
Andy Polyakov
7b4a4b71b5
Engage ecp_nistz256-armv4 module.
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-02-11 20:36:55 +01:00
Andy Polyakov
7a6c9a2e96
Add ec/asm/ecp_nistz256-armv4.pl module.
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-02-11 20:34:18 +01:00
Andy Polyakov
dda8199922
Add Camellia CTR mode.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-02-11 20:30:13 +01:00
Andy Polyakov
c79e17731f
Add more Camellia OIDs.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-02-11 20:28:47 +01:00
Matt Caswell
b7c9187b32
Add SSL_SESSION_get0_ticket API function.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-02-10 22:54:27 +00:00
Matt Caswell
ea6bd26454
Correct reading back of tlsext_tick_lifetime_hint from ASN1.
...
When writing out the hint, if the hint > 0, then we write it out otherwise
we skip it.
Previously when reading the hint back in, if were expecting to see one
(because the ticket length > 0), but it wasn't present then we set the hint
to -1, otherwise we set it to 0. This fails to set the hint to the same as
when it was written out.
The hint should never be negative because the RFC states the hint is
unsigned. It is valid for a server to set the hint to 0 (this means the
lifetime is unspecified according to the RFC). If the server set it to 0, it
should still be 0 when we read it back in.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-02-10 22:54:18 +00:00
Matt Caswell
f2baac27d5
Provide the API functions SSL_SESSION_has_ticket and
...
SSL_SESSION_get_ticket_lifetime_hint. The latter has been reported as
required to fix Qt for OpenSSL 1.1.0. I have also added the former in order
to determine whether a ticket is present or not - otherwise it is difficult
to know whether a zero lifetime hint is because the server set it to 0, or
because there is no ticket.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-02-10 22:54:09 +00:00
Matt Caswell
75ea3632bd
Make tlsext_tick_lifetime_hint an unsigned long (from signed long).
...
From RFC4507:
"The ticket_lifetime_hint field contains a hint from the server about how
long the ticket should be stored. The value indicates the lifetime in
seconds as a 32-bit unsigned integer in network byte order."
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-02-10 22:53:24 +00:00
Andy Polyakov
5afc296aa6
ec/ecp_nistz256.c: fix compiler warnings.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-02-10 22:04:28 +01:00
Andy Polyakov
ea5f8411cd
Configure: disable warning C4090 in Windows builds.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-02-10 22:02:54 +01:00
Andy Polyakov
5029291722
ec/asm/ecp_nistz256-x86.pl: fix typos (error shows in Windows build).
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-02-10 21:52:25 +01:00
Dr. Stephen Henson
b033e5d5ab
New evp_test updates.
...
Print usage message.
Print expected and got values if mismatch.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-02-10 16:18:05 +00:00
Dr. Stephen Henson
7303b472f1
Add new test file.
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-02-10 16:18:05 +00:00
Dr. Stephen Henson
307e3978b9
Initial version of new evp_test program.
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-02-10 16:18:05 +00:00
Emilia Kasper
0923e7df9e
Fix hostname validation in the command-line tool to honour negative return values.
...
Specifically, an ASN.1 NumericString in the certificate CN will fail UTF-8 conversion
and result in a negative return value, which the "x509 -checkhost" command-line option
incorrectly interpreted as success.
Also update X509_check_host docs to reflect reality.
Thanks to Sean Burford (Google) for reporting this issue.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-02-10 15:35:20 +01:00
Matt Caswell
efb4597345
Remove some functions that are no longer used and break the build with:
...
./config --strict-warnings enable-deprecated
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-02-10 14:33:03 +00:00
Matt Caswell
00a5a74bbc
HMAC_cleanup, and HMAC_Init are stated as deprecated in the docs and source.
...
Mark them as such with OPENSSL_USE_DEPRECATED
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-02-10 14:32:56 +00:00
Matt Caswell
a8b4e057b3
Remove -DOPENSSL_NO_DEPRECATED from --strict-warnings flags.
...
In master OPENSSL_NO_DEPRECATED is the default anyway. By including it in
--strict-warnings as well this means you cannot combine enable-deprecated
with --strict-warnings.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-02-10 14:32:29 +00:00
Andy Polyakov
79ee5afa26
Engage ecp_nistz256-x86 module.
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-02-09 23:21:11 +01:00
Andy Polyakov
aa9db2d292
Add ec/asm/ecp_nistz256-x86.pl module.
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-02-09 23:19:16 +01:00
Dr. Stephen Henson
d6c5462ef8
Support for alternative KDFs.
...
Don't hard code NID_id_pbkdf2 in PBES2: look it up in PBE table.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-02-09 16:14:04 +00:00
Andy Polyakov
849037169d
Bring objects.pl output even closer to new format.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-02-09 15:59:09 +01:00
Andy Polyakov
c2cfc956e5
bn/bn_add.c: fix dead code elimination that went bad.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-02-09 15:54:58 +01:00
Dr. Stephen Henson
9c7a780bbe
Fix memory leak reporting.
...
Free up bio_err after memory leak data has been printed to it.
In int_free_ex_data if ex_data is NULL there is nothing to free up
so return immediately and don't reallocate it.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-02-09 12:53:36 +00:00
Dr. Stephen Henson
259c360d0b
Remove obsolete IMPLEMENT_ASN1_SET_OF
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-02-09 12:47:28 +00:00
Andy Polyakov
bdc985b133
evp/e_aes.c: fix pair of SPARC T4-specific problems:
...
- SIGSEGV/ILL in CCM (RT#3688);
- SIGBUS in OCB;
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-02-09 10:26:20 +01:00
Matt Caswell
0350ef69ad
Remove stray "=back". This was causing newer versions of pod2man to choke.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-02-09 09:13:09 +00:00
Andy Polyakov
7ce3862319
Harmonize objects.pl output with new format.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-02-09 09:53:24 +01:00
Andy Polyakov
719122c759
des/asm/des_enc.m4: fix brown-bag typo in last commit.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-02-09 08:58:43 +01:00
Rich Salz
06cf881a3a
Final (for me, for now) dead code cleanup
...
This is a final pass looking for '#if 0'/'#if 1' controls and
removing the appropriate pieces.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-02-08 18:48:09 -05:00
Matt Caswell
3ffbe00808
Apache Traffic Server has a need to set the rbio without touching the wbio.
...
There is no mechanism to do that at the moment - SSL_set_bio makes changes
to the wbio even if you pass in SSL_get_wbio().
This commit introduces two new API functions SSL_set_rbio() and
SSL_set_wbio(). These do the same job as SSL_set_bio() except they enable
you to manage the rbio and wbio individually.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-02-07 14:29:16 +00:00
Rich Salz
05c3234ddf
ui_compat cleanup; makefiles and vms
...
Remove ui_compat.h from Makefile dependencies
And from two VMS build/install scripts.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-02-06 16:49:17 -05:00
Rich Salz
7cd6069c74
Remove ui_compat
...
This is the last of the old DES API.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-02-06 14:52:40 -05:00
Rich Salz
fbf08b79ff
Remove X509_PAIR
...
Unused type; a pair X509 certificates. Intended for LDAP support.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-02-06 10:55:31 -05:00
Rich Salz
6f91b017bb
Live code cleanup: remove #if 1 stuff
...
For code bracketed by "#if 1" then remove the alternate
"#else .. #endif" lines.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-02-06 10:54:20 -05:00
Rich Salz
9e9858d1cf
dead code cleanup: #if 0 in ssl
...
I left many "#if 0" lines, usually because I thought we would
probably want to revisit them later, or because they provided
some useful internal documentation tips.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-02-06 10:52:12 -05:00
Rich Salz
5b18d3025c
util/mkstack.pl now generates entire safestack.h
...
The mkstack.pl script now generates the entire safestack.h file.
It generates output that follows the coding style.
Also, removed all instances of the obsolete IMPLEMENT_STACK_OF
macro.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-02-06 10:47:53 -05:00
Rich Salz
1a53f1d68b
Have mkdef.pl ignore APPLINK settings.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-02-06 10:45:29 -05:00
Dr. Stephen Henson
a283d2a80a
Remove OPENSSL_NO_HMAC
...
Disabling HMAC doesn't work. If it did it would end up disabling a lot of
OpenSSL functionality (it is required for all versions of TLS for example).
Reviewed-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-02-06 12:16:58 +00:00
Matt Caswell
3c33c6f6b1
Remove support for SSL_OP_NETSCAPE_CA_DN_BUG.
...
This is an ancient bug workaround for Netscape clients. The documentation
talks about versions 3.x and 4.x beta.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-02-06 11:35:07 +00:00
Matt Caswell
ae632974f9
Fix error handling in ssltest
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-02-06 10:08:16 +00:00
Rich Salz
fe6d2a339b
Use memset in bn_mont
...
Use memset() not inline code. Compilers are smarter now.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-02-05 15:07:40 -05:00
Rich Salz
8dd94afb18
Live code cleanup; #if 1 removal
...
A few minor cleanups to remove pre-processor "#if 1" stuff.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-02-05 11:47:02 -05:00
Rich Salz
7e35f06ea9
Fixed bad formatting in crypto/des/spr.h
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-02-05 09:44:30 -05:00
Rich Salz
1f7103b6eb
Fix various build breaks
...
TABLE wasn't updated from a previous Configure change
Missed an RMD160/RIPE/RIPEMD unification in mkdef.pl
Makefile install_sw referenced file doc/openssl-shared.txt (RT3686)
Needed to run 'make update' because
- Various old code has been removed
- Varous old #ifdef tests were removed
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-02-04 18:50:00 -05:00
Dr. Stephen Henson
a479d72dba
fix windows build
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-02-04 22:51:01 +00:00
Dr. Stephen Henson
f0983d3953
Updates to reformat script.
...
Don't change files if they're unmodified.
Indicate which files have changed and a summary.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-02-04 19:03:44 +00:00
Dr. Stephen Henson
5496cd3e5d
More unused FIPS module code.
...
Remove fips_algvs.c
Remove unused fips module build code from Configure and Makefile.org
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-02-04 18:54:36 +00:00
Dr. Stephen Henson
6922ddee1b
Make objxref.pl output in correct format
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-02-04 03:50:09 +00:00
Dr. Stephen Henson
a724e79ed7
Preliminary ASN1_TIME documentation.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-02-03 16:47:57 +00:00
Dr. Stephen Henson
3d47c1d331
Remove unused variables.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-02-03 16:47:57 +00:00
Rich Salz
dfb56425b6
Dead code: crypto/dh,modes,pkcs12,ripemd,rsa,srp
...
And an uncompiled C++ test file.
Also remove srp_lcl.h, with help from Richard.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-02-03 11:20:56 -05:00
Dr. Stephen Henson
156a872233
Add SSL_get_extms_support documentation.
...
Document SSL_get_extms_support().
Modify behaviour of SSL_get_extms_support() so it returns -1 if the
master secret support of the peer is not known (e.g. handshake in progress).
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-02-03 14:50:08 +00:00
Dr. Stephen Henson
6668b6b8b0
Add CHANGES entry.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-02-03 14:50:07 +00:00
Dr. Stephen Henson
c536461499
Ctrl to retrieve extms support.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-02-03 14:50:07 +00:00
Dr. Stephen Henson
0cfb0e75b9
Add extms support to master key generation.
...
Update master secret calculation to support extended master secret.
TLS 1.2 client authentication adds a complication because we need to
cache the handshake messages. This is simpllified however because
the point at which the handshake hashes are calculated for extended
master secret is identical to that required for TLS 1.2 client
authentication (immediately after client key exchange which is also
immediately before certificate verify).
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-02-03 14:50:07 +00:00
Dr. Stephen Henson
ddc06b3556
Extended master secret extension support.
...
Add and retrieve extended master secret extension, setting the flag
SSL_SESS_FLAG_EXTMS appropriately.
Note: this just sets the flag and doesn't include the changes to
master secret generation.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-02-03 14:50:07 +00:00
Dr. Stephen Henson
c660ec63a8
Rewrite ssl3_send_client_key_exchange to support extms.
...
Rewrite ssl3_send_client_key_exchange to retain the premaster secret
instead of using it immediately.
This is needed because the premaster secret is used after the client key
exchange message has been sent to compute the extended master secret.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-02-03 14:50:07 +00:00
Dr. Stephen Henson
48fbcbacd2
Utility function to retrieve handshake hashes.
...
Retrieve handshake hashes in a separate function. This tidies the existing
code and will be used for extended master secret generation.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-02-03 14:50:07 +00:00
Dr. Stephen Henson
6f152a15d4
Add flags field to SSL_SESSION.
...
Add a "flags" field to SSL_SESSION. This will contain various flags
such as encrypt-then-mac and extended master secret support.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-02-03 14:50:07 +00:00
Dr. Stephen Henson
52e028b9de
Check PKCS#8 pkey field is valid before cleansing.
...
PR:3683
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-02-03 13:58:14 +00:00
Rich Salz
c303d4d868
old_des fix windows build, remove docs
...
Remove outdated doc files.
Fix windows build after old_des was removed.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-02-02 22:40:36 -05:00
Rich Salz
24956ca00f
Remove old DES API
...
Includes VMS fixes from Richard.
Includes Kurt's destest fixes (RT 1290).
Closes tickets 1290 and 1291
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-02-02 18:46:01 -05:00
Rich Salz
fd22ab9edf
Dead code: if 0 removal from crypto/evp and an unused file.
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-02-02 16:53:54 -05:00
Rich Salz
e2f8018027
Dead code removal; #if 0 from crypto/des
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-02-02 12:43:17 -05:00
Rich Salz
c8fa2356a0
Dead code cleanup: crypto/ec,ecdh,ecdsa
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-02-02 11:56:47 -05:00
Rich Salz
f16a64d11f
Dead code cleanup; remove #if 0 from crypto/engine
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-02-02 11:40:36 -05:00
Rich Salz
9ccc00ef6e
Dead code cleanup: #if 0 dropped from tests
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-02-02 11:11:34 -05:00
Rich Salz
7aa0b02246
Dead code cleanup: crypto/*.c, x509v3, demos
...
Some of the #if 0 code in demo's was kept, but given helpful #ifdef
names, to show more sample code.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-02-02 11:08:16 -05:00
Andy Polyakov
5da05a26f2
cms-test.pl: "localize" /dev/null even further [as follow-up to VMS].
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-02-02 15:27:07 +01:00
Richard Levitte
1d4d68570b
Make the libssl opaque changes compile on VMS
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-31 18:07:32 +00:00
Matt Caswell
78cc1f03e8
Add changes entry for opaquifying of libssl structures
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-01-31 18:07:22 +00:00
Matt Caswell
0c2837564c
Remove OPENSSL_NO_SSL_INTERN as it is now redundant - all internals
...
previously protected by this have been moved into non-public headers
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-01-31 18:07:11 +00:00
Matt Caswell
b6ba401497
Make libssl opaque. Move all structures that were previously protected by
...
OPENSSL_NO_SSL_INTERN into internal header files.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-01-31 18:06:45 +00:00
Ben Laurie
4de8385796
Build correctly for me on FreeBSD 10.
...
Reviewed-by: Rich Salz
Don't debug.
2015-01-30 22:23:17 +00:00
Rich Salz
02a938c953
Dead code removal: #if 0 asn1, pkcs7
...
Keep one #if 0 but rename the symbol to be more descriptive of what
it's doing (you can disable support for old broken Netscape software).
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-30 15:35:49 -05:00
Rich Salz
75d0ebef2a
Dead code clean: #if 0 removal in apps
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-30 14:52:57 -05:00
Rich Salz
d6fbb19409
Dead code removal #if 0 engines
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-01-30 13:24:35 -05:00
Rich Salz
6f1a93ad11
Dead code removal: #if 0 conf, dso, pqueue, threads
...
Mostly, but not completely, debugging print statements.
Some old logic kept for internal documentation reasons, perhaps.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-01-30 12:46:49 -05:00
Andy Polyakov
2e635aa81c
modes/gcm128.c: harmonize ctx->ghash assignment, shortcut *_ctr32
...
in OPENSSL_SMALL_FOOTPRINT build, remove undesired reformat artefact
and inconsistency in pre-processor logic.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-01-30 16:37:21 +01:00
Andy Polyakov
b2991c081a
modes/gcm128.c: fix OPENSSL_SMALL_FOOTPRINT compile failure
...
on affected platforms (PowerPC and AArch64).
For reference, minimalistic #ifdef GHASH is sufficient, because
it's never defined with OPENSSL_SMALL_FOOTPRINT and ctx->ghash
is never referred.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-01-30 16:36:27 +01:00
Richard Levitte
4938ebc406
Since SHA0 was completely removed, also remove the related test
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-01-30 15:14:48 +01:00
Richard Levitte
4fdde1aa0c
Update on the use of logical names for OpenSSL configuration
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-01-30 14:44:46 +01:00
Richard Levitte
e00ab250c8
VMS exit codes weren't handled well enough and were unclear
...
Making a specific variable $failure_code and a bit of commenting in the
VMS section should help clear things up.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-01-30 14:44:36 +01:00
Richard Levitte
09ebad72df
VMS adjustments:
...
Add missing crypto modules and files to copy to crypto/install-crypto.com
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-01-30 14:44:27 +01:00
Richard Levitte
36ed7adfbc
VMS adjustments:
...
test/cms-test.pl adjusted to handle NL: instead of /dev/null on VMS
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-01-30 14:44:18 +01:00
Richard Levitte
36759bb751
VMS build changes
...
crypto/crypto-lib.com:
Remove all APPS building, as they are gone.
Depend on the variable SDIRS that's defined by makevms.com.
Remake the whole partial module list mechanism to check for variables with a counter.
Define the logical name INTERNAL to allow for '#include "internal/foo.h"'.
makevms.com:
Define SDIRS, to allow for removal of crypto modules and pass that information to crypto/crypto-lib.com.
Allow for experimental modules.
Update the allowed things to disable.
Update the things disabled by default to match Configure.
Update headers to be copied.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-01-30 14:44:06 +01:00
Richard Levitte
132536f96e
VMS adjustments:
...
catch up with the Unix build.
A number of new tests, among others test/tocsp.com
Define INTERNAL in ssl/ssl-lib.com to allow for '#include "internal/foo.h"'
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-01-30 14:43:57 +01:00
Richard Levitte
c168a027cf
VMS adjustments:
...
Add new symbols that are longer than 31 chars to symhacks.
VMS doesn't have <sys/un.h>, reflect that in e_os.h.
MS_CALLBACK has been removed, ssl_task.c needs adjustment.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-01-30 14:43:40 +01:00
Richard Levitte
be7b1097e2
dso_vms needs to add the .EXE extension if there is none already
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-01-30 04:44:17 +01:00
Rich Salz
4d428cd250
Dead code removal: #if 0 bio, comp, rand
...
The start of removing dead code.
A remaining #if 0 in bss_conn.c needs more thought.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-01-29 21:38:57 -05:00
Rich Salz
33fc38ff8e
Make output consistency: remove blank line
...
When you use "-s" in the make flag, you see that engines outputs
a blank line because EDIRS isn't set. This is a debug echo that
isn't needed.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-01-29 12:09:14 -05:00
Richard Levitte
c6ef15c494
clang on Linux x86_64 complains about unreachable code.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-01-29 01:54:09 +01:00
Matt Caswell
7317192c64
Fix various windows compilation issues
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-28 22:55:15 +00:00
Rich Salz
537bf4381b
Fix int/unsigned compiler complaint
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-28 15:41:14 -05:00
Rich Salz
68fd6dce73
Remove support for opaque-prf
...
An expired IETF Internet-Draft (seven years old) that nobody
implements, and probably just as good as NSA DRBG work.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-01-28 15:37:16 -05:00
Rich Salz
31b446e212
Add missing declaration for lh_node_usage_stats
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-28 12:27:23 -05:00
Rich Salz
49b05c7d50
Rename index to idx to avoid symbol conflicts.
...
Picky compilers with old index() string functions.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-28 12:23:01 -05:00
Rich Salz
625a9baf11
Finish removal of DSS
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-28 12:21:55 -05:00
Matt Caswell
55467a16c2
Fix warning on some compilers where variable index shadows a global
...
declaration
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-01-28 10:57:14 +00:00
Matt Caswell
dc0e9a35fa
Fix no-ocb for Windows
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-28 10:39:15 +00:00
Matt Caswell
488ede07bd
Rationalise testing of AEAD modes
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-28 10:39:07 +00:00
Matt Caswell
e640fa0200
Harmonise use of EVP_CTRL_GET_TAG/EVP_CTRL_SET_TAG/EVP_CTRL_SET_IVLEN
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-28 10:39:01 +00:00
Matt Caswell
d57d135c33
Replace EVP_CTRL_OCB_SET_TAGLEN with EVP_CTRL_SET_TAG for consistency with
...
CCM
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-28 10:38:38 +00:00
Rich Salz
646e8c1d6b
Dead code removal: Fortezza identifiers
...
Not interested in helping the NSA in the slightest.
And anyway, it was never implemented, #if'd out.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-01-27 21:00:03 -05:00
Rich Salz
1a5adcfb5e
"#if 0" removal: header files
...
Remove all "#if 0" blocks from header files.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-27 17:44:12 -05:00
Rich Salz
63c574f6a6
OPENSSL_NO_XXX cleanup: OPENSSL_NO_BUF_FREELISTS
...
Remove OPENSSL_NO_BUF_FREELISTS. This was turned on by default,
so the work here is removing the 'maintain our own freelist' code.
Also removed a minor old Windows-multibyte/widechar conversion flag.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-01-27 16:43:53 -05:00
Rich Salz
daa48704cc
OPENSSL_NO_XXX cleanup: NO_TLS, NO_TLS1
...
TLS and TLS1 are no longer optional.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-01-27 15:14:12 -05:00
Rich Salz
474e469bbd
OPENSSL_NO_xxx cleanup: SHA
...
Remove support for SHA0 and DSS0 (they were broken), and remove
the ability to attempt to build without SHA (it didn't work).
For simplicity, remove the option of not building various SHA algorithms;
you could argue that SHA_224/256/384/512 should be kept, since they're
like crypto algorithms, but I decided to go the other way.
So these options are gone:
GENUINE_DSA OPENSSL_NO_SHA0
OPENSSL_NO_SHA OPENSSL_NO_SHA1
OPENSSL_NO_SHA224 OPENSSL_NO_SHA256
OPENSSL_NO_SHA384 OPENSSL_NO_SHA512
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-01-27 12:34:45 -05:00
Rich Salz
c73ad69017
OPENSSL_NO_xxx cleanup: RFC3779
...
Remove OPENSSL_NO_RFCF3779.
Also, makevms.com was ignored by some of the other cleanups, so
I caught it up. Sorry I ignored you, poor little VMS...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-01-27 10:19:14 -05:00
Rich Salz
a00ae6c46e
OPENSSL_NO_xxx cleanup: many removals
...
The following compile options (#ifdef's) are removed:
OPENSSL_NO_BIO OPENSSL_NO_BUFFER OPENSSL_NO_CHAIN_VERIFY
OPENSSL_NO_EVP OPENSSL_NO_FIPS_ERR OPENSSL_NO_HASH_COMP
OPENSSL_NO_LHASH OPENSSL_NO_OBJECT OPENSSL_NO_SPEED OPENSSL_NO_STACK
OPENSSL_NO_X509 OPENSSL_NO_X509_VERIFY
This diff is big because of updating the indents on preprocessor lines.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-01-27 10:06:22 -05:00
Rich Salz
109f1031a8
OPENSSL_NO_xxx cleanup: DEC-CBCM removed
...
A DES algorithm mode, known attacks, no EVP support.
Flushed.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-01-27 10:02:39 -05:00
Matt Caswell
8507474564
Provide documentation for all SSL(_CTX)?_(get|set)(_default)?_read_ahead
...
functions.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-01-27 14:28:41 +00:00
Matt Caswell
f400241251
Remove explicit setting of read_ahead for DTLS. It never makes sense not to
...
use read_ahead with DTLS because it doesn't work. Therefore read_ahead needs
to be the default.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-01-27 14:28:41 +00:00
Matt Caswell
8dd4ad0ff5
Make DTLS always act as if read_ahead is set. The actual value of read_ahead
...
is ignored for DTLS.
RT#3657
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-01-27 14:28:41 +00:00
Andy Polyakov
2a4af9478d
Configure: addendum to OPENSSL_NO_[RMD160|RIPEMD] harmonization.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-01-27 12:23:42 +01:00
Andy Polyakov
2863d5f3cd
des/asm/des_enc.m4: strip #ifdef OPENSSL_SYS_ULTRASPARC as part of
...
pre-processor controls cleanup. It doesn't mean that it no longer
works on UltraSPARC, only that it doesn't utilize sparcv9-specific
features like branch prediction hints and load in little-endian byte
order anymore. This "costs" ~3% in EDE3 performance regression on
UltraSPARC.
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-27 12:18:15 +01:00
Rich Salz
3d0cf91807
Remove obsolete support for old code.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-01-26 11:04:26 -05:00
Rich Salz
abdd677125
Make OPENSSL_config truly ignore errors.
...
Per discussion: should not exit. Should not print to stderr.
Errors are ignored. Updated doc to reflect that, and the fact
that this function is to be avoided.
Reviewed-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
2015-01-25 21:07:20 -05:00
Rich Salz
8de24b7927
undef cleanup: use memmove
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-01-24 16:35:07 -05:00
Rich Salz
c436e05bdc
Remove unused eng_rsax and related asm file
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-01-24 16:27:03 -05:00
Rich Salz
a2b18e657e
ifdef cleanup, part 4a: '#ifdef undef'
...
This removes all code surrounded by '#ifdef undef'
One case is left: memmove() replaced by open-coded for loop,
in crypto/stack/stack.c That needs further review.
Also removed a couple of instances of /* dead code */ if I saw them
while doing the main removal.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-24 10:58:38 -05:00
Kurt Roeckx
2747d73c14
Fix segfault with empty fields as last in the config.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-24 14:46:50 +01:00
Viktor Dkhovni
c963c421fb
Replace exit() with error return.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-23 15:39:40 -05:00
Andy Polyakov
04f8bcf196
Keep disclaiming 16-bit support.
...
If you examine changes, you are likely to wonder "but what about ILP64,
elusive as they are, don't they fall victim to 16-bit rationalization?"
No, the case was modeled and verified to work.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-01-23 19:09:01 +01:00
Rich Salz
68b00c2372
ifdef cleanup part 3: OPENSSL_SYSNAME
...
Rename OPENSSL_SYSNAME_xxx to OPENSSL_SYS_xxx
Remove MS_STATIC; it's a relic from platforms <32 bits.
Reviewed-by: Andy Polyakov <appro@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-23 11:58:26 -05:00
Andy Polyakov
9b05cbc33e
Add assembly support to ios64-cross.
...
Fix typos in ios64-cross config line.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-23 15:38:41 +01:00
Rich Salz
27c7609cf8
ifdef cleanup, 2 remove OPENSSL_NO_SETVBUF_IONBF
...
Use setbuf(fp, NULL) instead of setvbuf(). This removes some
ifdef complexity because all of our platforms support setbuf.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-01-22 12:57:29 -05:00
Rich Salz
9c46f4b9cd
Remove obsolete uncomiled dsagen semi-test
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-01-22 12:43:26 -05:00
Rich Salz
39a24e8889
Cleanup old doc/*; remove CHANGES.SSLeay
...
Removed CHANGES.SSLeay
Udpate README to be current.
Updated fignerprints.txt to list only current release signers and
to explain that is what it's used for.
Removed the following:
c-indentation.el -- doesn't go with our coding style
openssl-shared.txt -- old info about shared library aides
openssl.txt -- old info about X509v3 extension support/syntax
ssleay.txt -- old info about OpenSSL's predecessor, back when
programmers coded on COBOL sheets by candlelight
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-01-22 12:38:57 -05:00
Matt Caswell
d2a0d72f33
Fix post-reformat errors preventing windows compilation
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 14:09:37 +00:00
Matt Caswell
a8fe430a0d
Fix formatting error in pem.h
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-01-22 14:09:10 +00:00
Rob Stradling
004efdbb41
Use inner algorithm when printing certificate.
...
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-01-22 12:40:42 +00:00
Corinna Vinschen
732c5a6b92
Drop redundant and outdated __CYGWIN32__ tests.
...
Change OPENSSL_SYSNAME_CYGWIN32 to OPENSSL_SYSNAME_CYGWIN.
Drop outdated Cygwin targets.
RT#3605
Signed-off-by: Corinna Vinschen <vinschen@redhat.com >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 12:55:25 +01:00
Andy Polyakov
c462a6817b
Fix macosx-ppc build (and typos in unwind info).
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 12:13:57 +01:00
Andy Polyakov
52cab56356
sha256-armv4.pl: fix typo.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 12:00:55 +01:00
Matt Caswell
35a1cc90bc
More comment realignment
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:10 +00:00
Matt Caswell
50e735f9e5
Re-align some comments after running the reformat script.
...
This should be a one off operation (subsequent invokation of the
script should not move them)
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:10 +00:00
Matt Caswell
739a5eee61
Rerun util/openssl-format-source -v -c .
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:10 +00:00
Matt Caswell
0f113f3ee4
Run util/openssl-format-source -v -c .
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:09 +00:00
Matt Caswell
22b52164aa
More tweaks for comments due indent issues
...
Conflicts:
ssl/ssl_ciph.c
ssl/ssl_locl.h
Conflicts:
ssl/s2_srvr.c
ssl/ssl.h
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:09 +00:00
Matt Caswell
df6741c9a0
Tweaks for comments due to indent's inability to handle them
...
Conflicts:
demos/tunala/tunala.h
engines/e_padlock.c
ssl/s2_clnt.c
ssl/s2_lib.c
ssl/s2_srvr.c
ssl/s3_srvr.c
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:09 +00:00
Matt Caswell
68d39f3ce6
Move more comments that confuse indent
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:09 +00:00
Dr. Stephen Henson
f9be4da00e
Delete trailing whitespace from output.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:09 +00:00
Dr. Stephen Henson
09f4d9c0f9
Add -d debug option to save preprocessed files.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:09 +00:00
Dr. Stephen Henson
f8180c63ec
Test option -nc
...
Add option -nc which sets COMMENTS=true but disables all indent comment
reformatting options.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:09 +00:00
Andy Polyakov
20728adc8f
ec/ecp_nistz256.c: further harmonization with latest rules.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:09 +00:00
Matt Caswell
4664862013
Add ecp_nistz256.c to list of files skipped by openssl-format-source
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:09 +00:00
Matt Caswell
66186aeeb0
Manually reformat aes_x86core.c and add it to the list of files skipped by
...
openssl-format-source
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:09 +00:00
Andy Polyakov
1ab6c607b8
crypto/ofb128.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:09 +00:00
Andy Polyakov
a4ad939fb8
modes/ctr128.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:09 +00:00
Andy Polyakov
b1834b5e13
modes/cfb128.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:09 +00:00
Andy Polyakov
58d47cf004
ec/ecp_nistz256.c: harmonize with latest indent script.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:08 +00:00
Matt Caswell
7a2cb6f034
Fix indent comment corruption issue
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:08 +00:00
Matt Caswell
51428a12e4
Amend openssl-format-source so that it give more repeatable output
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:08 +00:00
Andy Polyakov
f4c46d0aab
bn/bn_const.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:08 +00:00
Andy Polyakov
c27310f938
bn/asm/x86_64-gcc.cL make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:08 +00:00
Andy Polyakov
7cc63545a3
bn/bn_asm.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:08 +00:00
Andy Polyakov
0546db3ef7
bn/bn_exp.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:08 +00:00
Matt Caswell
9d51824b3b
Manually reformat aes_core.c
...
Add aes_core.c to the list of files not processed by openssl-format-source
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:08 +00:00
Matt Caswell
572cee384d
Add obj_dat.h to the list of files that will not be processed by
...
openssl-format-source
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:08 +00:00
Matt Caswell
b853717fc4
Fix strange formatting by indent
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:08 +00:00
Andy Polyakov
1e8f69c6a5
modes/modes_lcl.h: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:08 +00:00
Matt Caswell
dbd87ffc21
indent has problems with comments that are on the right hand side of a line.
...
Sometimes it fails to format them very well, and sometimes it corrupts them!
This commit moves some particularly problematic ones.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:08 +00:00
Andy Polyakov
0107079e5f
modes/gcm128.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:08 +00:00
Andy Polyakov
6ea3d1836b
modes/cts128.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:08 +00:00
Andy Polyakov
061b67f6f5
crypto/mem_dbg.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:07 +00:00
Matt Caswell
a7b1eed566
More indent fixes for STACK_OF
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:07 +00:00
Matt Caswell
c59576881e
Fix indent issue with functions using STACK_OF
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:07 +00:00
Matt Caswell
76712e81e0
Fix indent issue with engine.h
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:07 +00:00
Matt Caswell
24a5f17b6a
Fix logic to check for indent.pro
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:07 +00:00
Andy Polyakov
90b9c78b30
crypto/cryptlib.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:07 +00:00
Andy Polyakov
985a9af813
bn/bntest.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:07 +00:00
Andy Polyakov
e95bbc3ca6
bn/bn_recp.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:07 +00:00
Andy Polyakov
aec4b334f0
engines/e_ubsec.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:07 +00:00
Andy Polyakov
6e81b27012
apps/srp.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:07 +00:00
Andy Polyakov
e751bba4ac
apps/speed.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:07 +00:00
Andy Polyakov
5f0b444899
bn/rsaz_exp.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:07 +00:00
Matt Caswell
2dc57eb5a7
Fix make errors
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:07 +00:00
Richard Levitte
2f1ac20bb3
Make the script a little more location agnostic
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:07 +00:00
Matt Caswell
acb82df4d3
Provide script for filtering data initialisers for structs/unions. indent just can't handle it.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:07 +00:00
Dr. Stephen Henson
6f08264e2f
Script fixes.
...
Don't use double newline for headers.
Don't interpret ASN1_PCTX as start of an ASN.1 module.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:07 +00:00
Richard Levitte
ff7ca7a336
Run expand before perl, to make sure things are properly aligned
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:07 +00:00
Richard Levitte
d09481a10f
Force the use of our indent profile
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:07 +00:00
Tim Hudson
849c80bc5d
Provide source reformating script. Requires GNU indent to be
...
available.
Script written by Tim Hudson, with amendments by Steve Henson, Rich Salz and
Matt Caswell
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-22 09:20:07 +00:00
Matt Caswell
e636e2acd7
Fix source where indent will not be able to cope
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:06 +00:00
Matt Caswell
28470b6095
Yet more comments
...
Conflicts:
crypto/dsa/dsa_asn1.c
crypto/pem/pem_all.c
fips/dh/dh_gen.c
fips/dh/fips_dh_check.c
fips/dh/fips_dh_gen.c
ssl/ssl_ciph.c
Conflicts:
ssl/d1_clnt.c
Conflicts:
ssl/s2_pkt.c
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:06 +00:00
Matt Caswell
23a22b4cf7
More comments
...
Conflicts:
crypto/dsa/dsa_vrf.c
crypto/ec/ec2_smpl.c
crypto/ec/ecp_smpl.c
Conflicts:
demos/bio/saccept.c
ssl/d1_clnt.c
Conflicts:
bugs/dggccbug.c
demos/tunala/cb.c
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:06 +00:00
Matt Caswell
c80fd6b215
Further comment changes for reformat (master)
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:19:59 +00:00
Rich Salz
4b618848f9
Cleanup OPENSSL_NO_xxx, part 1
...
OPENSSL_NO_RIPEMD160, OPENSSL_NO_RIPEMD merged into OPENSSL_NO_RMD160
OPENSSL_NO_FP_API merged into OPENSSL_NO_STDIO
Two typo's on #endif comments fixed:
OPENSSL_NO_ECB fixed to OPENSSL_NO_OCB
OPENSSL_NO_HW_SureWare fixed to OPENSSL_NO_HW_SUREWARE
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-01-14 15:57:28 -05:00
Andy Polyakov
b3d7294976
Add Broadwell performance results.
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-01-13 21:40:14 +01:00
Dr. Stephen Henson
a5a412350d
Remove use of BN_init, BN_RECP_CTX_init from bntest
...
BN_init and BN_RECP_CTX_init are deprecated and are not exported
from shared libraries on some platforms (e.g. Windows) convert
bntest to use BN_new and BN_RECP_CTX_new instead.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-13 15:39:37 +00:00
Dr. Stephen Henson
98b3b116ab
For master windows build dsa.h is now needed.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-13 15:39:37 +00:00
Matt Caswell
2d2671790e
Make output from openssl version -f consistent with previous versions
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-01-13 11:27:36 +00:00
Matt Caswell
b1ffc6ca1c
Fix warning where BIO_FLAGS_UPLINK was being redefined.
...
This warning breaks the build in 1.0.0 and 0.9.8
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-01-13 11:21:51 +00:00
Matt Caswell
86d21d0b95
Avoid deprecation problems in Visual Studio 13
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-01-13 09:44:59 +00:00
Matt Caswell
964012dc5a
Ensure internal header files are used from mk1mf based builds
...
Reviewed-by: Richard Levitte: <levitte@openssl.org >
2015-01-13 09:26:38 +00:00
Rich Salz
6d23cf9744
RT3548: Remove unsupported platforms
...
This last one for this ticket. Removes WIN16.
So long, MS_CALLBACK and MS_FAR. We won't miss you.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-01-12 17:30:54 -05:00
Rich Salz
31d1d3741f
Allow multiple IDN xn-- indicators
...
Update the X509v3 name parsing to allow multiple xn-- international
domain name indicators in a name. Previously, only allowed one at
the beginning of a name, which was wrong.
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
2015-01-12 12:39:00 -05:00
Rich Salz
fcf64ba0ac
RT3548: Remove some unsupported platforms.
...
This commit removes NCR, Tandem, Cray.
Regenerates TABLE.
Removes another missing BEOS fluff.
The last platform remaining on this ticket is WIN16.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-01-12 10:40:00 -05:00
Rich Salz
9405a9a2e1
RT478: Add uninstall make target
...
Add INSTALLDIRS variable, list of directories where things get
installed. Change install_html_docs to use perl mkdir-p script.
Add uninstall, uninstall_sw, uninstall_docs, uninstall_html_docs
to Makefile.org. The actions of these targets were figured out
by "inverting" the install target.
Recurse into subdirs to do uninstall as needed. Added uninstall
targets whose actions were similarly figured out by "inverting"
the install target.
Also remove some 'space before tab' complaints in Makefile.org
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-12 10:28:05 -05:00
Matt Caswell
732192a079
Fix no-deprecated on Windows
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-01-12 12:06:39 +00:00
Matt Caswell
1211e29c16
make update
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-01-12 12:06:06 +00:00
Matt Caswell
8e96441960
Remove redundant DSO_METHOD_beos declaration in dso.h. BEOS support has been
...
removed.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-01-12 12:05:40 +00:00
Kurt Roeckx
264212b643
Make build reproducible
...
It contained a date on when it was build.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-01-10 16:23:15 +01:00
Matt Caswell
41c9cfbc4e
Further windows specific .gitignore entries
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-09 23:39:54 +00:00
Matt Caswell
448e6f060e
Update .gitignore with windows files to be excluded from git
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-09 11:28:30 +00:00
Matt Caswell
5c5e7e1a7e
Fix build failure on Windows due to undefined cflags identifier
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-08 19:21:24 +00:00
Matt Caswell
103b171d8f
A memory leak can occur in dtls1_buffer_record if either of the calls to
...
ssl3_setup_buffers or pqueue_insert fail. The former will fail if there is a
malloc failure, whilst the latter will fail if attempting to add a duplicate
record to the queue. This should never happen because duplicate records should
be detected and dropped before any attempt to add them to the queue.
Unfortunately records that arrive that are for the next epoch are not being
recorded correctly, and therefore replays are not being detected.
Additionally, these "should not happen" failures that can occur in
dtls1_buffer_record are not being treated as fatal and therefore an attacker
could exploit this by sending repeated replay records for the next epoch,
eventually causing a DoS through memory exhaustion.
Thanks to Chris Mueller for reporting this issue and providing initial
analysis and a patch. Further analysis and the final patch was performed by
Matt Caswell from the OpenSSL development team.
CVE-2015-0206
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2015-01-08 15:49:45 +00:00
Dr. Stephen Henson
1421e0c584
Unauthenticated DH client certificate fix.
...
Fix to prevent use of DH client certificates without sending
certificate verify message.
If we've used a client certificate to generate the premaster secret
ssl3_get_client_key_exchange returns 2 and ssl3_get_cert_verify is
never called.
We can only skip the certificate verify message in
ssl3_get_cert_verify if the client didn't send a certificate.
Thanks to Karthikeyan Bhargavan for reporting this issue.
CVE-2015-0205
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-08 15:49:45 +00:00
Andy Polyakov
a7a44ba55c
Fix for CVE-2014-3570 (with minor bn_asm.c revamp).
...
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2015-01-08 15:49:45 +00:00
Matt Caswell
248385c606
Follow on from CVE-2014-3571. This fixes the code that was the original source
...
of the crash due to p being NULL. Steve's fix prevents this situation from
occuring - however this is by no means obvious by looking at the code for
dtls1_get_record. This fix just makes things look a bit more sane.
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2015-01-08 15:49:27 +00:00
Dr. Stephen Henson
feba02f391
Fix crash in dtls1_get_record whilst in the listen state where you get two
...
separate reads performed - one for the header and one for the body of the
handshake record.
CVE-2014-3571
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-08 11:18:16 +00:00
Dr. Stephen Henson
4a4d415857
fix error discrepancy
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-07 18:10:03 +00:00
Andy Polyakov
e464403d0b
Fix irix-cc build.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-07 18:39:39 +01:00
Dr. Stephen Henson
4138e38825
use correct credit in CHANGES
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-06 22:40:43 +00:00
Emilia Kasper
ac8e9cbe14
Only inherit the session ID context in SSL_set_SSL_CTX if the existing
...
context was also inherited (matches that of the existing SSL_CTX).
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-06 23:09:25 +01:00
Dr. Stephen Henson
cb62ab4b17
use correct function name
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-06 21:03:50 +00:00
Dr. Stephen Henson
77ff1f3b8b
RT3662: Allow leading . in nameConstraints
...
Change by SteveH from original by John Denker (in the RT)
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-01-06 15:29:28 -05:00
Rich Salz
a09474dd2d
Some cleanup of L<> markup in pod files
...
Show only the #define, not the values, in BIO_f_buffer. Data
abstraction and we can remove a "see also" entry.
Remove internal forward reference to NOTES in EVP_EncryptInit; just
say "see below" as we do in the other pages.
Add missing (3) in pem.pod so the L<> entry is consistent.
Fix entry to point to the "master" page, not the symlink'd one.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-06 12:16:24 -05:00
Martin Brejcha
41cd41c441
Fix memory leak.
...
Fix memory leak by freeing up saved_message.data if it is not NULL.
PR#3489
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-06 16:48:04 +00:00
Matt Caswell
3a83462dfe
Further comment amendments to preserve formatting prior to source reformat
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-06 15:45:25 +00:00
Matt Caswell
b691154e18
Remove blank line from start of cflags character array in buildinf.h
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-01-06 15:32:01 +00:00
Andy Polyakov
0548505f4c
CHANGES: mention "universal" ARM support.
...
This is re-commit without unrelated modification.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-06 12:13:36 +01:00
Andy Polyakov
219338115b
Revert "CHANGES: mention "universal" ARM support."
...
This reverts commit 4fec915069 .
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-06 12:11:01 +01:00
Andy Polyakov
4fec915069
CHANGES: mention "universal" ARM support.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-06 11:10:01 +01:00
Dr. Stephen Henson
fb76ad8d43
fix compilation error
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-06 02:17:07 +00:00
Dr. Stephen Henson
ce325c60c7
Only allow ephemeral RSA keys in export ciphersuites.
...
OpenSSL clients would tolerate temporary RSA keys in non-export
ciphersuites. It also had an option SSL_OP_EPHEMERAL_RSA which
enabled this server side. Remove both options as they are a
protocol violation.
Thanks to Karthikeyan Bhargavan for reporting this issue.
(CVE-2015-0204)
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-06 02:06:39 +00:00
Dr. Stephen Henson
b15f876964
ECDH downgrade bug fix.
...
Fix bug where an OpenSSL client would accept a handshake using an
ephemeral ECDH ciphersuites with the server key exchange message omitted.
Thanks to Karthikeyan Bhargavan for reporting this issue.
CVE-2014-3572
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-05 22:59:32 +00:00
Rich Salz
b5526482ef
RT3546: Remove #define IRIX_CC_BUG
...
Leftovers from commit 448155e9bb
Remove now-unused #define's
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-05 16:05:54 -05:00
Dr. Stephen Henson
c05febfa4f
update ordinals
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 31c65a7bc0 )
2015-01-05 16:51:54 +00:00
Adam Langley
61aa44ca99
Ensure that the session ID context of an SSL* is updated
...
when its SSL_CTX is updated.
From BoringSSL commit
https://boringssl.googlesource.com/boringssl/+/a5dc545bbcffd9c24cebe65e9ab5ce72d4535e3a
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-01-05 17:31:56 +01:00
Dr. Stephen Henson
4c52816d35
Constify ASN1_TYPE_cmp add X509_ALGOR_cmp.
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-01-05 14:52:55 +00:00
Dr. Stephen Henson
684400ce19
Fix various certificate fingerprint issues.
...
By using non-DER or invalid encodings outside the signed portion of a
certificate the fingerprint can be changed without breaking the signature.
Although no details of the signed portion of the certificate can be changed
this can cause problems with some applications: e.g. those using the
certificate fingerprint for blacklists.
1. Reject signatures with non zero unused bits.
If the BIT STRING containing the signature has non zero unused bits reject
the signature. All current signature algorithms require zero unused bits.
2. Check certificate algorithm consistency.
Check the AlgorithmIdentifier inside TBS matches the one in the
certificate signature. NB: this will result in signature failure
errors for some broken certificates.
3. Check DSA/ECDSA signatures use DER.
Reencode DSA/ECDSA signatures and compare with the original received
signature. Return an error if there is a mismatch.
This will reject various cases including garbage after signature
(thanks to Antti Karjalainen and Tuomo Untinen from the Codenomicon CROSS
program for discovering this case) and use of BER or invalid ASN.1 INTEGERs
(negative or with leading zeroes).
CVE-2014-8275
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-01-05 14:35:19 +00:00
Matt Caswell
32b07f5a80
Additional fix required for no-srtp to work
...
RT3638
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-01-05 14:17:51 +00:00
Piotr Sikora
e783bae26a
Fix building with no-srtp
...
RT3638
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-01-05 14:17:22 +00:00
Emilia Kasper
cb2bc0543a
Add a clang build target for linux-x86_64
...
This change documents the world as-is, by turning all warnings on,
and then turning warnings that trigger off again.
Reviewed-by: Andy Polyakov <appro@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-01-05 13:46:26 +01:00
Andy Polyakov
c1669e1c20
Remove inconsistency in ARM support.
...
This facilitates "universal" builds, ones that target multiple
architectures, e.g. ARMv5 through ARMv7. See commentary in
Configure for details.
Reviewed-by: Ard Biesheuvel <ard.biesheuvel@linaro.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-04 23:45:08 +01:00
Andy Polyakov
9e557ab262
ecp_nistz256-x86_64.pl: fix occasional failures.
...
RT: 3607
Reviewed-by: Adam Langley <agl@google.com >
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2015-01-04 23:18:04 +01:00
Rich Salz
2c60925d1c
RT2914: NULL check missing in X509_name_canon
...
Check for NULL return from X509_NAME_ENTRY_new()
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2015-01-04 14:51:04 -05:00
Dr. Stephen Henson
9527559939
Remove SGC restart flag.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-02 22:56:54 +00:00
Dr. Stephen Henson
63eab8a620
Remove MS SGC
...
MS Server gated cryptography is obsolete and dates from the time of export
restrictions on strong encryption and is only used by ancient versions of
MSIE.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-02 22:56:54 +00:00
Dr. Stephen Henson
4f605ccb77
Clear existing extension state.
...
When parsing ClientHello clear any existing extension state from
SRP login and SRTP profile.
Thanks to Karthikeyan Bhargavan for reporting this issue.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-02 22:25:52 +00:00
Dominik Neubauer
2a9338ee31
typo in s_client
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
2014-12-31 11:13:48 +01:00
Martin Nowak
b17dcb0d63
remove duplicate defines
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
2014-12-31 11:13:48 +01:00
Cristian Rodríguez
d97ed21986
constify tls 1.2 lookup tables.
...
None of this should live in writable memory
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
2014-12-31 11:13:48 +01:00
Kurt Roeckx
97d5809c2b
Add missing include of sys/time.h
...
gettimeofday was undefined
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
2014-12-31 11:13:48 +01:00
Tim Hudson
1d97c84351
mark all block comments that need format preserving so that
...
indent will not alter them when reformatting comments
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-30 22:10:26 +00:00
Kurt Roeckx
aa8a9266f9
Make "run" volatile
...
RT#3629
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-30 16:46:46 +01:00
Thorsten Glaser
5075e52e6f
Document openssl dgst -hmac option
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-30 16:46:46 +01:00
Kurt Roeckx
c18440956d
dlfcn: always define _GNU_SOURCE
...
We need this for the freebsd kernel with glibc as used in the Debian kfreebsd
ports. There shouldn't be a problem defining this on systems not using glibc.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-30 16:46:46 +01:00
Kurt Roeckx
8c00f4cfd2
Fix memory leak in the apps
...
The BIO_free() allocated ex_data again that we already freed.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-30 16:46:46 +01:00
Rich Salz
32dfde1076
RT3548: Remove unsupported platforms
...
This commit removes DG-UX.
It also flushes out some left-behinds in config.
And regenerates TABLE from Configure (hadn't been done in awhile).
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-28 01:17:52 -05:00
Rich Salz
6c23ca0cbb
RT3548: unsupported platforms
...
This commit removes Sinix/ReliantUNIX RM400
(And a missed piece of BEOS fluff)
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-25 16:16:29 -05:00
Rich Salz
5ad4fdce41
RT3548: Remove unsupported platforms.
...
This commit removes MPE/iX
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-12-22 17:47:28 -05:00
Alok Menghrajani
67472bd82b
Improves certificates HOWTO
...
* adds links to various related documents.
* fixes a few typos.
* rewords a few sentences.
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-12-22 16:23:24 +01:00
Richard Levitte
7cfab40f43
Small typo
...
Reviewed-by: Stephen Henson <steve@openssl.org >
2014-12-22 14:30:23 +01:00
Rich Salz
f231941444
RT3548: Remvoe unsupported platforms
...
This commit removes SunOS (a sentimental favorite of mine).
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-21 23:18:02 -05:00
Michael Tuexen
2521fcd852
Fix incorrect OPENSSL_assert() usage.
...
Return an error code for I/O errors instead of an assertion failure.
PR#3470
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-20 14:45:51 +00:00
Rich Salz
e03b29871b
RT3548: Remove outdated platforms
...
This commit removes all mention of NeXT and NextStep.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-19 21:11:09 -05:00
Matt Caswell
488f16e31b
Fix a problem if CFLAGS is too long cversion.c fails to compile when config
...
is run with --strict-warnings.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-19 14:02:15 +00:00
Matt Caswell
c0fc27f88e
Made it an error to define OPENSSL_USE_DEPRECATED if OpenSSL has been built
...
with OPENSSL_NO_DEPRECATED defined
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-12-18 19:57:44 +00:00
Matt Caswell
bd2bd374b3
Update CHANGES for deprecated updates
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-12-18 19:57:38 +00:00
Matt Caswell
6385043fa1
make update following changes to default config settings
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-12-18 19:57:22 +00:00
Matt Caswell
53e95716f5
Change all instances of OPENSSL_NO_DEPRECATED to OPENSSL_USE_DEPRECATED
...
Introduce use of DECLARE_DEPRECATED
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-12-18 19:57:14 +00:00
Matt Caswell
5bafb04d2e
Remove redundant OPENSSL_NO_DEPRECATED suppression
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-12-18 19:57:05 +00:00
Matt Caswell
07c4c14c47
Turn on OPENSSL_NO_DEPRECATED by default.
...
Also introduce OPENSSL_USE_DEPRECATED. If OPENSSL_NO_DEPRECATED is
defined at config stage then OPENSSL_USE_DEPRECATED has no effect -
deprecated functions are not available.
If OPENSSL_NO_DEPRECATED is not defined at config stage then
applications must define OPENSSL_USE_DEPRECATED in order to access
deprecated functions.
Also introduce compiler warnings for gcc for applications using
deprecated functions
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-12-18 19:56:31 +00:00
Rich Salz
59ff1ce061
RT3548: Remove some obsolete platforms
...
This commit removes Sony NEWS4
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-18 14:17:33 -05:00
Kurt Roeckx
5a1e8c67a9
Return error when a bit string indicates an invalid amount of bits left
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-18 15:03:52 +01:00
Rich Salz
040b60f6fa
Fix yet anoither 'make clean' breakage.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-18 00:13:46 -05:00
Rich Salz
b317819b2e
RT3548: Remove some obsolete platforms
...
This commit removes BEOS.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-17 17:24:51 -05:00
Rich Salz
179f6b2f55
RT3544: Restore MWERKS for NetWare
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-17 17:20:42 -05:00
Dr. Stephen Henson
89f40f369f
Reject invalid constructed encodings.
...
According to X6.90 null, object identifier, boolean, integer and enumerated
types can only have primitive encodings: return an error if any of
these are received with a constructed encoding.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-12-17 14:25:58 +00:00
Emilia Kasper
03af843039
Add a comment noting the padding oracle.
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-12-17 14:55:04 +01:00
Emilia Kasper
4ad2d3ac0e
Revert "RT3425: constant-time evp_enc"
...
Causes more problems than it fixes: even though error codes
are not part of the stable API, several users rely on the
specific error code, and the change breaks them. Conversely,
we don't have any concrete use-cases for constant-time behaviour here.
This reverts commit 4aac102f75 .
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-12-17 14:54:17 +01:00
Emilia Kasper
b597aab84e
Build fixes
...
Various build fixes, mostly uncovered by clang's unused-const-variable
and unused-function errors.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
(cherry picked from commit 0e1c318ece )
2014-12-17 14:31:05 +01:00
Adam Langley
4aecfd4d9f
Premaster secret handling fixes
...
From BoringSSL
- Send an alert when the client key exchange isn't correctly formatted.
- Reject overly short RSA ciphertexts to avoid a (benign) out-of-bounds memory access.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-12-17 14:01:19 +01:00
Richard Levitte
57dc72e018
Clear warnings/errors within RL_DEBUG code sections (RL_DEBUG should be renamed)
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-17 10:15:09 +01:00
Richard Levitte
6dec5e1ca9
Clear warnings/errors within TLS_DEBUG code sections
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-17 10:15:09 +01:00
Richard Levitte
3ddb2914b5
Clear warnings/errors within KSSL_DEBUG code sections
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-17 10:15:09 +01:00
Richard Levitte
a501f647aa
Clear warnings/errors within CIPHER_DEBUG code sections
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-17 10:15:09 +01:00
Richard Levitte
72b5d03b5b
Clear warnings/errors within CIPHER_DEBUG code sections
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-17 10:15:09 +01:00
Richard Levitte
a93891632d
Clear warnings/errors within BN_CTX_DEBUG code sections
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-17 10:15:09 +01:00
Emilia Kasper
a015758d11
Check for invalid divisors in BN_div.
...
Invalid zero-padding in the divisor could cause a division by 0.
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit a43bcd9e96 )
2014-12-17 10:01:04 +01:00
Matt Caswell
789da2c73d
The dtls1_output_cert_chain function no longer exists so remove it from
...
ssl_locl.h
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-16 15:02:03 +00:00
Adam Langley
ec1af3c419
Don't set client_version to the ServerHello version.
...
The client_version needs to be preserved for the RSA key exchange.
This change also means that renegotiation will, like TLS, repeat the old
client_version rather than advertise only the final version. (Either way,
version change on renego is not allowed.) This is necessary in TLS to work
around an SChannel bug, but it's not strictly necessary in DTLS.
(From BoringSSL)
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-12-16 14:44:17 +00:00
Matt Caswell
db812f2d70
Add more meaningful OPENSSL_NO_ECDH error message for suite b mode
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-12-16 14:14:09 +00:00
Matt Caswell
ad500fdc49
Rename gost2814789t.c to gost2814789test.c. The old name caused problems
...
for dummytest if gost is compiled out, since the name of the test is not
standard (dummytest segfaults). Also the old name caused problems for git
because the executable was not in the .gitignore file
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-12-16 14:14:03 +00:00
Matt Caswell
fd86c2b153
Add missing OPENSSL_NO_EC guards
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-12-16 14:13:56 +00:00
Matt Caswell
af6e2d51bf
Add OPENSSL_NO_ECDH guards
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-12-16 14:13:45 +00:00
Matt Caswell
55e530265a
Remove extraneous white space, and add some braces
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-12-16 00:00:25 +00:00
Matt Caswell
1904d21123
DTLS fixes for signed/unsigned issues
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-12-15 23:59:50 +00:00
Rich Salz
129c81b951
RT3497: The ticket that keeps on giving.
...
Don't remove c_rehash that wasn't created by make; this script
is created by configure.
This fix brought to you by the letter "f" and
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2014-12-15 12:26:02 -05:00
Kurt Roeckx
995207bedc
Allow using -SSLv2 again when setting Protocol in the config.
...
RT#3625
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-12-15 18:09:53 +01:00
Rich Salz
56999ba589
RT3497: Fix; don't remove header files
...
Doing 'config ; make clean' broke because clean removed
header files that normal build didn't create. So don't
remove those files. Hopefully will be better addressed by
Geoff's no-symlinks patch.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-15 09:18:11 -05:00
Emilia Kasper
9669d2e1ad
Fix unused variable warning
...
The temporary variable causes unused variable warnings in opt mode with clang,
because the subsequent assert is compiled out.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-12-15 13:12:44 +01:00
Matt Caswell
24097938ad
Fixed memory leak if BUF_MEM_grow fails
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-12-13 00:02:20 +00:00
Rich Salz
c3f22253b1
RT1688: Add dependencies for parallel make
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-12-12 13:17:51 -05:00
Matt Caswell
fd0ba77717
make update
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-11 23:52:47 +00:00
Rich Salz
e03af1789f
Minor doc fixes.
...
In EVP_EncryptInit remove duplicate mention of EVP_idea_cbc()
In EVP_PKEY_CTX_ctrl.pod remove EVP_PKEY_get_default_digest_nid
since it is documented elsewhere.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-11 17:05:57 -05:00
Rich Salz
5ab65c50ef
RT3497: Clean up "dclean" targets
...
Some Makefiles had actions for "dclean" that really belonged
to the "clean" target. This is wrong because clean ends up,
well, not really cleaning everything.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-11 17:01:16 -05:00
Rich Salz
5cf37957fb
RT3543: Remove #ifdef LINT
...
I also replaced some exit/return wrappers in various
programs (from main) to standardize on return.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-10 17:31:04 -05:00
Rich Salz
a4a934119d
Remove old private pod2man
...
Include Richard's point to remove the 'sh -c' wrapper
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-10 17:10:59 -05:00
Kurt Roeckx
5b17b79a89
capi_ctrl, capi_vtrace: check for NULL after allocating and free it
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-10 18:35:18 +01:00
Jonas Maebe
3a7581bf5a
tree_print: check for NULL after allocating err
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-10 18:35:18 +01:00
Jonas Maebe
288b4e4f8f
tls1_heartbeat: check for NULL after allocating buf
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-10 18:35:18 +01:00
Jonas Maebe
c27dc3981c
tls1_process_heartbeat: check for NULL after allocating buffer
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-10 18:35:18 +01:00
Jonas Maebe
fed5b55252
SSL_set_session: check for NULL after allocating s->kssl_ctx->client_princ
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-10 18:35:18 +01:00
Jonas Maebe
e9e688effb
serverinfo_process_buffer: check result of realloc(ctx->cert->key->serverinfo) and don't leak memory if it fails
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-10 18:35:17 +01:00
Jonas Maebe
bf8e7047aa
ssl3_digest_cached_records: check for NULL after allocating s->s3->handshake_dgst
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-10 18:35:17 +01:00
Jonas Maebe
9052ffda91
ssl3_get_certificate_request: check for NULL after allocating s->cert->ctypes
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-10 18:35:17 +01:00
Jonas Maebe
d00b1d62d6
SSL_COMP_add_compression_method: exit if allocating the new compression method struct fails
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-10 18:35:17 +01:00
Matt Caswell
02a62d1a4a
Move bn internal functions into bn_int.h and bn_lcl.h
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 21:41:42 +00:00
Matt Caswell
e35af275d5
Update documentation following BN opaquify
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 21:41:36 +00:00
Matt Caswell
1939187922
Make bn opaque
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 21:41:27 +00:00
Matt Caswell
348d0d148a
Update apps for bn opaque change
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 21:41:19 +00:00
Matt Caswell
29e7a56d54
Disable engines that will fail to build when bn is made opaque
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 21:41:12 +00:00
Matt Caswell
2cbc8d7de5
Implement internally opaque bn access from ts
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 21:41:07 +00:00
Matt Caswell
aeb556f831
Implement internally opaque bn access from srp
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 21:41:02 +00:00
Matt Caswell
18125f7f55
Implement internally opaque bn access from rsa
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 21:40:57 +00:00
Matt Caswell
68c29f61a4
Implement internally opaque bn access from evp
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 21:40:52 +00:00
Matt Caswell
5784a52145
Implement internally opaque bn access from ec
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 21:40:47 +00:00
Matt Caswell
c0d4390194
Implement internally opaque bn access from dsa
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 21:40:41 +00:00
Matt Caswell
829ccf6ab6
Implement internally opaque bn access from dh
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 21:40:32 +00:00
Matt Caswell
76b2a02274
Implement internally opaque bn access from asn1
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 21:40:26 +00:00
Matt Caswell
7a5233118c
Prepare exptest for bn opaquify
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 21:40:19 +00:00
Matt Caswell
85bcf27ccc
Prepare for bn opaquify. Implement internal helper functions.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 21:40:12 +00:00
Matt Caswell
dd703de022
Remove internal bn dependancies from speed.c
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 21:39:38 +00:00
Geoff Thorpe
e52a3c3d14
Include <openssl/foo.h> instead of "foo.h"
...
Exported headers shouldn't be included as "foo.h" by code from the same
module, it should only do so for module-internal headers. This is
because the symlinking of exported headers (from include/openssl/foo.h
to crypto/foo/foo.h) is being removed, and the exported headers are
being moved to the include/openssl/ directory instead.
Change-Id: I4c1d80849544713308ddc6999a549848afc25f94
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-12-08 14:21:35 -05:00
Matt Caswell
41bf250130
Fixed memory leak in the event of a failure of BUF_MEM_grow
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-08 16:43:25 +00:00
Matt Caswell
76e6509085
Fix memory leak in SSL_new if errors occur.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-08 16:42:59 +00:00
Dr. Stephen Henson
7bca0a1db5
Remove fips directories from mkfiles.pl
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 14:01:47 +00:00
Dr. Stephen Henson
71a5f534f1
Remove references to deleted fips directory from Makefile.org
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:25:38 +00:00
Dr. Stephen Henson
73e45b2dd1
remove OPENSSL_FIPSAPI
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:25:38 +00:00
Dr. Stephen Henson
b2ecc05a9a
remove FIPS_*_SIZE_T
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:25:38 +00:00
Dr. Stephen Henson
916e56208b
remove FIPS module code from crypto/evp
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:25:38 +00:00
Dr. Stephen Henson
ebdf37e4b1
remove FIPS module code from crypto/bn
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:25:38 +00:00
Dr. Stephen Henson
1c98de6d81
remove FIPS module code from crypto/ecdh
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:25:38 +00:00
Dr. Stephen Henson
dbfbe10a1f
remove FIPS module code from crypto/ecdsa
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:25:38 +00:00
Dr. Stephen Henson
1bfffe9bd0
Remove FIPS module code from crypto/dh
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:25:38 +00:00
Dr. Stephen Henson
fce8311cae
remove FIPS module code from crypto/dsa
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:25:38 +00:00
Dr. Stephen Henson
8d73db288f
remove FIPS module code from crypto/rsa
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:25:38 +00:00
Dr. Stephen Henson
05417a3476
Remove FIPS error library from openssl.ec mkerr.pl
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:25:38 +00:00
Dr. Stephen Henson
cc2f1045d1
make depend
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:25:38 +00:00
Dr. Stephen Henson
4fa579c58d
Remove fips.h reference.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:25:38 +00:00
Dr. Stephen Henson
e4e5bc39f9
Remove fips_constseg references.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:25:38 +00:00
Dr. Stephen Henson
85129ab579
remove another FIPSCANISTER reference
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:25:37 +00:00
Dr. Stephen Henson
b3da6f496b
remove unnecessary OPENSSL_FIPS reference
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:25:37 +00:00
Dr. Stephen Henson
c603c723ce
Remove OPENSSL_FIPSCANISTER code.
...
OPENSSL_FIPSCANISTER is only set if the fips module is being built
(as opposed to being used). Since the fips module wont be built in
master this is redundant.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:25:16 +00:00
Dr. Stephen Henson
225fce8a98
Remove FIPSCANISTERINTERNAL reference.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:23:54 +00:00
Dr. Stephen Henson
a42366a406
Remove fips utility build rules from test/Makefile
...
The fips test utilities are only build if an FIPS module is being
built from source. As this isn't done in master these are redundant.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:23:48 +00:00
Dr. Stephen Henson
f072785eb4
Remove fipscanister build functionality from makefiles.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:23:45 +00:00
Dr. Stephen Henson
78c990c156
Remove fipscanister from Configure, delete fips directory
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:18:43 +00:00
Dr. Stephen Henson
00b4ee7664
Remove some unnecessary OPENSSL_FIPS references
...
FIPS_mode() exists in all versions of OpenSSL but always returns 0 if OpenSSL is not FIPS
capable.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:18:43 +00:00
Matt Caswell
0c1bd7f03f
Add CHANGES entry for OCB
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 10:29:11 +00:00
Matt Caswell
3feb63054a
Added OPENSSL_NO_OCB guards
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 10:29:03 +00:00
Matt Caswell
e4bbee9633
Add documentation for OCB mode
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 10:28:56 +00:00
Matt Caswell
d827c5edb5
Add tests for OCB mode
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 10:28:47 +00:00
Matt Caswell
e6b336efa3
Add EVP support for OCB mode
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 10:28:34 +00:00
Matt Caswell
c857a80c9d
Add support for OCB mode as per RFC7253
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 10:27:56 +00:00
Emilia Kasper
376e2ca3e3
Clarify the return values for SSL_get_shared_curve.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-05 18:31:21 +01:00
Emilia Kasper
740580c2b2
Add extra checks for odd-length EC curve lists.
...
Odd-length lists should be rejected everywhere upon parsing. Nevertheless,
be extra careful and add guards against off-by-one reads.
Also, drive-by replace inexplicable double-negation with an explicit comparison.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-05 16:57:58 +01:00
Emilia Kasper
33d5ba8629
Reject elliptic curve lists of odd lengths.
...
The Supported Elliptic Curves extension contains a vector of NamedCurves
of 2 bytes each, so the total length must be even. Accepting odd-length
lists was observed to lead to a non-exploitable one-byte out-of-bounds
read in the latest development branches (1.0.2 and master). Released
versions of OpenSSL are not affected.
Thanks to Felix Groebert of the Google Security Team for reporting this issue.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-05 16:32:39 +01:00
Emilia Kasper
f50ffd10fa
Fix broken build
...
Add includes missing from commit 33eab3f6af
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
2014-12-05 16:18:20 +01:00
Kurt Roeckx
33eab3f6af
Replace GOST_R_MALLOC_FAILURE and GOST_R_NO_MEMORY with ERR_R_MALLOC_FAILURE
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-04 23:48:44 +01:00
Kurt Roeckx
f6fa7c5347
capi_get_provname: Check return values
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-04 23:48:44 +01:00
Jonas Maebe
f5905ba341
ssl_create_cipher_list: check whether push onto cipherstack succeeds
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-04 23:48:44 +01:00
Jonas Maebe
b3b966fb87
ssl_cert_dup: Fix memory leak
...
Always use goto err on failure and call ssl_cert_free() on the error path so all
fields and "ret" itself are freed
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-04 23:48:44 +01:00
Kurt Roeckx
6c42b39c95
dtls1_new: free s on error path
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-04 23:48:44 +01:00
Jonas Maebe
241e2dc936
dtls1_heartbeat: check for NULL after allocating s->cert->ctypes
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-04 23:48:44 +01:00
Jonas Maebe
d15f5df70d
dtls1_process_heartbeat: check for NULL after allocating buffer
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-04 23:48:44 +01:00
Jonas Maebe
b1a08ac71f
capi_get_key: check for NULL after allocating key
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-04 23:48:44 +01:00
Jonas Maebe
8607322765
capi_cert_get_fname: check for NULL after allocating wfname
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-04 23:48:44 +01:00
Jonas Maebe
e2140501fd
capi_get_provname: free name on error if it was malloc'ed
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-04 23:48:44 +01:00
Jonas Maebe
0716f9e405
pkey_gost_mac_keygen: check for NULL after allocating keydata
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-04 23:48:44 +01:00
Jonas Maebe
787e992965
pkey_gost_ctrl: check for NULL after allocating pctx->shared_ukm
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-04 23:48:43 +01:00
Kurt Roeckx
12478cc449
Update changes to indicate that SSLv2 support has been removed
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-04 15:51:28 +01:00
Matt Caswell
71c16698fa
Remove incorrect code inadvertently introduced through commit 59669b6ab.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-04 14:17:50 +00:00
Kurt Roeckx
45f55f6a5b
Remove SSLv2 support
...
The only support for SSLv2 left is receiving a SSLv2 compatible client hello.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-04 11:55:03 +01:00
Rich Salz
616f71e486
New location on website for binaries.
...
Reviewed-by: Bodo Moeller <bodo@openssl.org >
2014-12-03 10:55:31 -05:00
Matt Caswell
4bb8eb9ce4
Remove "#if 0" code
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-03 09:25:00 +00:00
Matt Caswell
047f21593e
Only use the fallback mtu after 2 unsuccessful retransmissions if it is less
...
than the mtu we are already using
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-03 09:24:53 +00:00
Matt Caswell
464ce92026
Updates to s_client and s_server to remove the constant 28 (for IPv4 header
...
and UDP header) when setting an mtu. This constant is not always correct (e.g.
if using IPv6). Use the new DTLS_CTRL functions instead.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-03 09:24:41 +00:00
Matt Caswell
d3d9eef316
If we really get a situation where the underlying mtu is less than the minimum
...
we will support then dtls1_do_write can go into an infinite loop. This commit
fixes that.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-03 09:24:28 +00:00
Matt Caswell
1620a2e49c
Fix dtls_query_mtu so that it will always either complete with an mtu that is
...
at least the minimum or it will fail.
There were some instances in dtls1_query_mtu where the final mtu can end up
being less than the minimum, i.e. where the user has set an mtu manually. This
shouldn't be allowed. Also remove dtls1_guess_mtu that, despite having
logic for guessing an mtu, was actually only ever used to work out the minimum
mtu to use.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-03 09:24:20 +00:00
Matt Caswell
59669b6abf
Remove instances in libssl of the constant 28 (for size of IPv4 header + UDP)
...
and instead use the value provided by the underlying BIO. Also provide some
new DTLS_CTRLs so that the library user can set the mtu without needing to
know this constant. These new DTLS_CTRLs provide the capability to set the
link level mtu to be used (i.e. including this IP/UDP overhead). The previous
DTLS_CTRLs required the library user to subtract this overhead first.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-03 09:24:12 +00:00
Matt Caswell
0d3ae34df5
There are a number of instances throughout the code where the constant 28 is
...
used with no explanation. Some of this was introduced as part of RT#1929. The
value 28 is the length of the IP header (20 bytes) plus the UDP header (8
bytes). However use of this constant is incorrect because there may be
instances where a different value is needed, e.g. an IPv4 header is 20 bytes
but an IPv6 header is 40. Similarly you may not be using UDP (e.g. SCTP).
This commit introduces a new BIO_CTRL that provides the value to be used for
this mtu "overhead". It will be used by subsequent commits.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-03 09:24:04 +00:00
Matt Caswell
6abb0d1f8e
The first call to query the mtu in dtls1_do_write correctly checks that the
...
mtu that we have received is not less than the minimum. If its less it uses the
minimum instead. The second call to query the mtu does not do that, but
instead uses whatever comes back. We have seen an instance in RT#3592 where we
have got an unreasonably small mtu come back. This commit makes both query
checks consistent.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-03 09:23:56 +00:00
Matt Caswell
001235778a
The SSL_OP_NO_QUERY_MTU option is supposed to stop the mtu from being
...
automatically updated, and we should use the one provided instead.
Unfortunately there are a couple of locations where this is not respected.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-03 09:23:46 +00:00
Matt Caswell
cf75017bfd
Verify that we have a sensible message len and fail if not
...
RT#3592 provides an instance where the OPENSSL_assert that this commit
replaces can be hit. I was able to recreate this issue by forcing the
underlying BIO to misbehave and come back with very small mtu values. This
happens the second time around the while loop after we have detected that the
MTU has been exceeded following the call to dtls1_write_bytes.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-03 09:23:09 +00:00
Kurt Roeckx
961d2ddb4b
Use the SSLv23 method by default
...
If SSLv2 and SSLv3 are both disabled we still support SSL/TLS.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-02 11:26:49 +01:00
Rich Salz
8cfe08b4ec
Remove all .cvsignore files
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-11-28 18:32:43 -05:00
Richard Levitte
91316e6765
Check for FindNextFile when defining it rather than FindFirstFile
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-28 23:27:21 +01:00
Richard Levitte
7a04b854d6
[PR3597] Advance to the next state variant when reusing messages.
...
Previously, state variant was not advanced, which resulted in state
being stuck in the st1 variant (usually "_A").
This broke certificate callback retry logic when accepting connections
that were using SSLv2 ClientHello (hence reusing the message), because
their state never advanced to SSL3_ST_SR_CLNT_HELLO_C variant required
for the retry code path.
Reported by Yichun Zhang (agentzh).
Signed-off-by: Piotr Sikora <piotr@cloudflare.com >
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-28 20:47:41 +01:00
Richard Levitte
8123d158ab
Correct some layout issues, convert all remaining tabs to appropriate amounts of spaces.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-28 16:56:37 +01:00
Alok Menghrajani
03b637a730
Improves the proxy certificates howto doc.
...
The current documentation contains a bunch of spelling and grammar mistakes. I also
found it hard to understand some paragraphs, so here is my attempt to improve its
readability.
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-28 16:55:59 +01:00
Matt Caswell
f9ea4deba0
Fix warning in ssl2_enc
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-11-27 21:41:17 +00:00
Matt Caswell
eceef8fb86
Remove more references to dtls1_enc
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-11-27 21:40:59 +00:00
Matt Caswell
81ec01b217
Check EVP_Cipher return values for SSL2
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-11-27 21:40:39 +00:00
Matt Caswell
4b87706d20
Delete unused file
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-11-27 21:40:16 +00:00
Matt Caswell
fe78f08d15
Add checks to the return value of EVP_Cipher to prevent silent encryption failure.
...
PR#1767
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-11-27 21:39:47 +00:00
Matt Caswell
fc3968a25c
Remove redundant checks in ssl_cert_dup. This was causing spurious error messages when using GOST
...
PR#3613
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-11-27 20:50:44 +00:00
Matt Caswell
5e31a40f47
Tidy up ocsp help output
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-27 14:08:07 +00:00
André Guerreiro
de87dd46c1
Add documentation on -timeout option in the ocsp utility
...
PR#3612
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-27 14:07:50 +00:00
Guenter
333fad9f2d
NetWare compilation fix.
...
Workaround for NetWare CodeWarrior compiler which doesn't properly lookup
includes when in same directory as the C file which includes it.
PR#3569
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-11-27 14:02:09 +00:00
Matt Caswell
6484958645
Updates to X509_NAME_get_index_by_NID.pod submitted by user Bernardh via the wiki
...
Minor changes made by Matt Caswell
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-27 13:56:07 +00:00
Matt Caswell
f281b8df70
Updates to X509_NAME_add_entry_by_txt.pod submitted by user Bernardh via the wiki
...
Minor changes made by Matt Caswell.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-27 13:55:54 +00:00
Matt Caswell
34890ac18e
Updates to EVP_PKEY_encrypt.pod submitted by user Bernardh via the wiki
...
Minor changes made by Matt Caswell.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-27 13:55:37 +00:00
Matt Caswell
f67203836c
Add include of ssl.h which is required by srtp.h
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-27 13:16:36 +00:00
Matt Caswell
8a35dbb6d8
Fixed memory leak due to incorrect freeing of DTLS reassembly bit mask
...
PR#3608
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-11-26 10:10:21 +00:00
Matt Caswell
3a0765882c
Corrected comments in ssl.h about SSLv23_method and friends
...
PR#3574
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-25 22:23:24 +00:00
Dr. Stephen Henson
7d4cdededc
Print out Suite B status.
...
When using the -xcert option to test certificate validity print out
if we pass Suite B compliance. We print out "not tested" if we aren't
in Suite B mode.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-20 22:13:05 +00:00
Dr. Stephen Henson
7255ca99df
Fix SuiteB chain checking logic.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-20 22:13:05 +00:00
Annie Yousar
c56a50b229
RT2679: Fix error if keysize too short
...
In keygen, return KEY_SIZE_TOO_SMALL not INVALID_KEYBITS.
** I also increased the minimum from 256 to 512, which is now
documented in CHANGES file. **
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-20 13:45:25 -05:00
Rich Salz
14d3b76be8
RT3488: Update doc for OPENSSL_config
...
Fix CONF_load_modules to CONF_modules_load.
Document that it calls exit.
Advise against using it now.
Add an error print to stderr.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-20 13:40:03 -05:00
David Benjamin
9e189b9dc1
Do not resume a session if the negotiated protocol version does not match
...
the session's version (server).
See also BoringSSL's commit bdf5e72f50e25f0e45e825c156168766d8442dde.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-20 16:29:04 +01:00
Matt Caswell
8d02bebddf
When using EVP_PKEY_derive with a KDF set, a negative error from
...
ECDH_compute_key is silently ignored and the KDF is run on duff data
Thanks to github user tomykaira for the suggested fix.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-20 15:20:37 +00:00
Emilia Kasper
31832e8ff1
Clean up CHANGES
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-20 14:57:15 +01:00
Emilia Kasper
e94a6c0ede
Ensure SSL3_FLAGS_CCS_OK (or d1->change_cipher_spec_ok for DTLS) is reset
...
once the ChangeCipherSpec message is received. Previously, the server would
set the flag once at SSL3_ST_SR_CERT_VRFY and again at SSL3_ST_SR_FINISHED.
This would allow a second CCS to arrive and would corrupt the server state.
(Because the first CCS would latch the correct keys and subsequent CCS
messages would have to be encrypted, a MitM attacker cannot exploit this,
though.)
Thanks to Joeri de Ruiter for reporting this issue.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-20 14:57:15 +01:00
Emilia Kasper
de2c7504eb
Always require an advertised NewSessionTicket message.
...
The server must send a NewSessionTicket message if it advertised one
in the ServerHello, so make a missing ticket message an alert
in the client.
An equivalent change was independently made in BoringSSL, see commit
6444287806d801b9a45baf1f6f02a0e3a16e144c.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-20 14:57:15 +01:00
Emilia Kasper
980bc1ec61
Remove ssl3_check_finished.
...
The client sends a session ID with the session ticket, and uses
the returned ID to detect resumption, so we do not need to peek
at handshake messages: s->hit tells us explicitly if we're resuming.
An equivalent change was independently made in BoringSSL, see commit
407886f589cf2dbaed82db0a44173036c3bc3317.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-20 14:57:15 +01:00
Emilia Kasper
7b3ba508af
Set s->hit when resuming from external pre-shared secret.
...
The same change was independently made in BoringSSL, see commit
9eaeef81fa2d4fd6246dc02b6203fa936a5eaf67
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-20 14:57:15 +01:00
Emilia Kasper
a06cd5d056
Reset s->tlsext_ticket_expected in ssl_scan_serverhello_tlsext.
...
This ensures that it's zeroed even if the SSL object is reused
(as in ssltest.c). It also ensures that it applies to DTLS, too.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-20 14:57:15 +01:00
Matt Caswell
13d568661c
Fix s_server -ssl2. Previously this reported "Error setting EC curve"
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-19 23:55:42 +00:00
Dr. Stephen Henson
764b6a3551
Fix excert logic.
...
If no keyfile has been specified use the certificate file instead.
Fix typo: we need to check the chain is not NULL, not the chain file.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 786370b1b0 )
2014-11-19 22:52:56 +00:00
Dr. Stephen Henson
3881d8106d
New option no-ssl3-method which removes SSLv3_*method
...
When no-ssl3 is set only make SSLv3 disabled by default. Retain -ssl3
options for s_client/s_server/ssltest.
When no-ssl3-method is set SSLv3_*method() is removed and all -ssl3
options.
We should document this somewhere, e.g. wiki, FAQ or manual page.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-11-19 18:11:37 +00:00
Dr. Stephen Henson
5a3d8eebb7
Only handle RI extension for SSLv3
...
Don't send or parse any extensions other than RI (which is needed
to handle secure renegotation) for SSLv3.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-19 15:12:08 +00:00
Dr. Stephen Henson
e469af8d05
Process signature algorithms before deciding on certificate.
...
The supported signature algorithms extension needs to be processed before
the certificate to use is decided and before a cipher is selected (as the
set of shared signature algorithms supported may impact the choice).
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 56e8dc542b )
Conflicts:
ssl/ssl.h
ssl/ssl_err.c
2014-11-19 14:49:12 +00:00
Matt Caswell
bcb245a74a
Added references to RFC 7027
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-18 13:01:45 +00:00
Dr. Stephen Henson
1a14b47ed9
Prevent use of binary curves when OPENSSL_NO_EC2M is defined
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-18 13:01:45 +00:00
Matt Caswell
d253c9cd30
Fixed cms-test.pl for no-ec2m
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-18 13:01:45 +00:00
Matt Caswell
cffeacd91e
Updated comment references to draft-ietf-tls-ecc-12 to refer to RFC4492 instead
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-18 13:01:45 +00:00
Jan Hykel
012aa9ec76
Don't use msg on error.
...
Don't attempt to access msg structure if recvmsg returns an error.
PR#3483
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-11-17 12:40:44 +00:00
Mike Bland
32bb5c3953
Add whrlpool and camellia .s files to perlasm list
...
Change-Id: I626d751f19f24df6b967c17498d6189cc0acb96c
Signed-off-by: Mike Bland <mbland@acm.org >
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-11-16 16:45:11 -05:00
Mike Bland
13d30e27c2
Add missing SRC variable
...
This is the only Makefile without SRC defined. This change enables a
standard Makefile include directive to cover crypto/jpake/*.d files.
This was automatically applied by AddSrcVarIfNeeded() in:
https://code.google.com/p/mike-bland/source/browse/openssl/update_makefiles.py
Change-Id: I030204a1bc873b5de5b06c8ddc0b94bb224c6650
Signed-off-by: Mike Bland <mbland@acm.org >
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-11-16 16:45:01 -05:00
Mike Bland
dbaf608320
Remove redundant test targets outside of test/
...
These correspond to targets of the same name in test/Makefile that clash when
using the single-makefile build method using GitConfigure and GitMake.
Change-Id: If7e900c75f4341b446608b6916a3d76f202026ea
Signed-off-by: Mike Bland <mbland@acm.org >
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-11-16 16:44:51 -05:00
Mike Bland
8308411297
Improve variable parsing when generating MINFO
...
Before this change, variables for which a '=' appeared in the assignment would
be parsed as the entire string up until the final '='. For example:
BUILD_CMD=shlib_target=; if [ -n "$(SHARED_LIBS)" ]; then \
would result in the variable name "BUILD_CMD=shlib_target". This doesn't
appear to harm the current generation of MINFO, but creates problems for other
Makefile-related work I'm attempting.
Change-Id: I1f3a606d67fd5464bb459e8f36c23b3e967b77e1
Signed-off-by: Mike Bland <mbland@acm.org >
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-11-16 16:44:44 -05:00
Mike Bland
a4b8457db9
{,darwin64-}debug-test-64-clang Configure targets
...
These are based on debug-ben-debug-64-clang and is intended to produce
consistent settings for folks involved in the unit testing effort detailed at:
http://wiki.openssl.org/index.php/Unit_Testing
-fsanitize has been removed from the set of clang flags for now. Apparently
clang 3.1, which ships with FreeBSD 9.1, completely ignores -fsanitize. Clang
3.3, which ships with FreeBSD 9.2, compiles with it, but fails to link due to
the absence of libasan:
http://lists.freebsd.org/pipermail/freebsd-hackers/2013-December/043995.html
https://www.mail-archive.com/cfe-commits@cs.uiuc.edu/msg92260.html
http://reviews.llvm.org/D2644
We need -Wno-error=unused-const-variable because of this error:
.../crypto/ec/ec_lib.c:74:19: error: unused variable 'EC_version' [-Werror,-Wunused-const-variable]
static const char EC_version[] = "EC" OPENSSL_VERSION_PTEXT;
Change-Id: I2cba53537137186114c083049ea1233550a741f9
Signed-off-by: Mike Bland <mbland@acm.org >
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-11-16 16:44:37 -05:00
Mike Bland
5444b11bef
Emit PERLASM_SCHEME to fix GitMake on OS X
...
This fixes the errors when trying to assemble .s files using GitMake on OS X.
Change-Id: I2221f558619302d22e0c57d7203173d634155678
Signed-off-by: Mike Bland <mbland@acm.org >
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-11-16 16:44:26 -05:00
Mike Bland
bc095c3d3c
Add cscope.out and .d files to .gitignore
...
cscope.out is generated by cscope as described in:
http://wiki.openssl.org/index.php/Testing_and_Development_Tools_and_Tips
.d files are compiler-generated Makefile dependency files (e.g. using
'gcc -MMD -MP foo.c').
Change-Id: I2338858a6b6ee0527837d10a8b55cff1689023fd
Signed-off-by: Mike Bland <mbland@acm.org >
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-11-16 16:41:40 -05:00
Dr. Stephen Henson
f756f1fc83
Additional output for ssltest.
...
Print out more details of the conection in ssltest specifically:
server certificate curve name for EC, server temporary key (if any)
and peer signing digest.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-13 13:44:23 +00:00
Dr. Stephen Henson
de94222dba
Add SSL_CONF support to ssltest.
...
Add command line support for SSL_CONF: server side arguments are
prefixed by -s_ (e.g. -s_no_ssl3) and client side with -c_.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-13 13:44:22 +00:00
Dr. Stephen Henson
55f7fb8848
Fix cross reference table generator.
...
If the hash or public key algorithm is "undef" the signature type
will receive special handling and shouldn't be included in the
cross reference table.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-11-13 13:34:42 +00:00
Alok Menghrajani
5211e094de
Fixes a minor typo in the EVP docs.
...
Out is the buffer which needs to contain at least inl + cipher_block_size - 1 bytes. Outl
is just an int*.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-11-12 21:03:52 +00:00
Michal Bozon
ae64fb528e
Correct timestamp output when clock_precision_digits > 0
...
PR#3535
Reviewed-by: Stephen Henson <steve@openssl.org >
2014-11-12 20:51:41 +00:00
Matt Caswell
e04d426bf9
Fix free of garbage pointer. PR#3595
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-11-12 20:26:31 +00:00
Kurt Roeckx
67b8bcee95
Fix warning about negative unsigned intergers
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-11-11 15:46:28 +01:00
Russell Coker
f8ae603238
Fix datarace reported by valgrind/helgrind
...
This doesn't really fix the datarace but changes it so it can only happens
once. This isn't really a problem since we always just set it to the same
value. We now just stop writing it after the first time.
PR3584, https://bugs.debian.org/534534
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-11-10 18:34:11 +01:00
Kurt Roeckx
bfc973f46c
Fix spelling of EECDH
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-10 10:57:26 +01:00
Andy Polyakov
6696203963
armv4cpuid.S: fix compilation error in pre-ARMv7 build.
...
PR: 3474
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-10-30 20:24:29 +01:00
Dr. Stephen Henson
ecb9966e7c
Fix WIN32 build by disabling bn* calls.
...
The trial division and probable prime with coprime tests are disabled
on WIN32 builds because they use internal functions not exported from
the WIN32 DLLs.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-10-29 22:23:31 +00:00
Andy Polyakov
c381b63764
ec/asm/ecp_nistz256-x86_64.pl: fix inconsistency in path handling.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-10-29 10:57:46 +01:00
Andy Polyakov
d45282fc7c
md32_common.h: address compiler warning in HOST_c2l.
...
Reviewed-by: Stephen Henson <steve@openssl.org >
2014-10-29 10:48:39 +01:00
Samuel Neves
d2fa182988
Use only unsigned arithmetic in constant-time operations
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-10-28 20:40:45 +01:00
Emilia Kasper
d663df2399
Tighten session ticket handling
...
Tighten client-side session ticket handling during renegotiation:
ensure that the client only accepts a session ticket if the server sends
the extension anew in the ServerHello. Previously, a TLS client would
reuse the old extension state and thus accept a session ticket if one was
announced in the initial ServerHello.
Reviewed-by: Bodo Moeller <bodo@openssl.org >
2014-10-28 17:35:59 +01:00
Emilia Kasper
49b0dfc502
Add missing CHANGES interval [1.0.1h, 1.0.1i]
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-10-27 19:53:21 +01:00
Emilia Kasper
18a2d293f1
Sync CHANGES
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-10-27 17:51:34 +01:00
Emilia Kasper
fd28a41ec8
Fix ssltest logic when some protocols are compiled out.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
2014-10-27 16:25:17 +01:00
Dr. Stephen Henson
14e14bf696
Copy negotiated parameters in SSL_set_SSL_CTX.
...
SSL_set_SSL_CTX is used to change the SSL_CTX for SNI, keep the
supported signature algorithms and raw cipherlist.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-10-24 13:46:37 +01:00
Dr. Stephen Henson
c800c27a8c
Process signature algorithms in ClientHello late.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-10-24 13:46:37 +01:00
Andy Polyakov
3ff08e1dde
ecp_nistz256 update.
...
Facilitate switch to custom scatter-gather routines. This modification
does not change algorithms, only makes it possible to implement
alternative. This is achieved by a) moving precompute table to assembly
(perlasm parses ecp_nistz256_table.c and is free to rearrange data to
match gathering algorithm); b) adhering to explicit scatter subroutine
(which for now is simply a memcpy). First implementations that will use
this option are 32-bit assembly implementations, ARMv4 and x86, where
equivalent of current read-whole-table-select-single-value algorithm
is too time-consuming. [On side note, switching to scatter-gather on
x86_64 would allow to improve server-side ECDSA performance by ~5%].
Reviewed-by: Bodo Moeller <bodo@openssl.org >
2014-10-23 16:08:44 +02:00
Andy Polyakov
b06f7d9ac0
Configure: add ios64 target.
...
Reviewed-by: Steve Marquess <marquess@openssl.org >
2014-10-23 16:04:01 +02:00
Andy Polyakov
9f4bd9d5f9
Add missing credit.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-10-22 09:35:51 +02:00
Bodo Moeller
98f1ac7df5
Fix and improve SSL_MODE_SEND_FALLBACK_SCSV documentation.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-10-21 22:43:08 +02:00
Bodo Moeller
8cb30232ed
When processing ClientHello.cipher_suites, don't ignore cipher suites
...
listed after TLS_FALLBACK_SCSV.
RT: 3575
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2014-10-21 22:24:42 +02:00
Kurt Roeckx
392fa7a952
Keep old method in case of an unsupported protocol
...
When we're configured with no-ssl3 and we receive an SSL v3 Client Hello, we set
the method to NULL. We didn't used to do that, and it breaks things. This is a
regression introduced in 62f45cc27d . Keep the old
method since the code is not able to deal with a NULL method at this time.
CVE-2014-3569, PR#3571
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-10-21 20:45:15 +02:00
Tim Hudson
c882abd522
no-ssl2 with no-ssl3 does not mean drop the ssl lib
...
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
2014-10-20 15:12:17 +10:00
Kurt Cancemi
87d388c955
RT3547: Add missing static qualifier
...
Reviewed-by: Ben Laurie <ben@openssl.org >
2014-10-17 11:41:39 +02:00
Tim Hudson
c6e9b39ce8
Add constant_time_locl.h to HEADERS,
...
so the Win32 compile picks it up correctly.
Reviewed-by: Richard Levitte <levitte@openssl.org >
Conflicts:
crypto/Makefile
2014-10-15 17:00:06 +02:00
Richard Levitte
7f09a8773b
Include "constant_time_locl.h" rather than "../constant_time_locl.h".
...
The different -I compiler parameters will take care of the rest...
Reviewed-by: Tim Hudson <tjh@openssl.org >
Conflicts:
crypto/evp/evp_enc.c
crypto/rsa/rsa_oaep.c
crypto/rsa/rsa_pk1.c
2014-10-15 17:00:06 +02:00
Matt Caswell
ed13270d2e
Updates to NEWS file
...
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2014-10-15 08:56:16 -04:00
Matt Caswell
53afbe12ba
Updates CHANGES file
...
Reviewed-by: Bodo Möller <bodo@openssl.org >
2014-10-15 08:56:16 -04:00
Geoff Thorpe
62f45cc27d
Fix no-ssl3 configuration option
...
CVE-2014-3568
Reviewed-by: Emilia Kasper <emilia@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-10-15 08:56:16 -04:00
Dr. Stephen Henson
7482705548
Fix for session tickets memory leak.
...
CVE-2014-3567
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-10-15 08:56:16 -04:00
Matt Caswell
3dd814ac4d
Fix SRTP compile issues for windows
...
Related to CVE-2014-3513
This fix was developed by the OpenSSL Team
Reviewed-by: Tim Hudson <tjh@openssl.org >
Conflicts:
util/mkdef.pl
util/ssleay.num
2014-10-15 08:56:16 -04:00
Matt Caswell
e659eff2c0
Fix for SRTP Memory Leak
...
CVE-2014-3513
This issue was reported to OpenSSL on 26th September 2014, based on an original
issue and patch developed by the LibreSSL project. Further analysis of the issue
was performed by the OpenSSL team.
The fix was developed by the OpenSSL team.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-10-15 08:56:16 -04:00
Bodo Moeller
0b382a8e8d
Fix SSL_R naming inconsistency.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-10-15 14:48:14 +02:00
Andy Polyakov
69d5747f90
aesni-x86_64.pl: make ECB subroutine Windows ABI compliant.
...
RT: 3553
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2014-10-15 11:10:08 +02:00
Bodo Moeller
fb0e87fb67
Add TLS_FALLBACK_SCSV documentation, and move s_client -fallback_scsv
...
handling out of #ifndef OPENSSL_NO_DTLS1 section.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-10-15 10:43:50 +02:00
Bodo Moeller
cf6da05304
Support TLS_FALLBACK_SCSV.
...
Reviewed-by: Stephen Henson <steve@openssl.org >
2014-10-15 04:03:28 +02:00
Dr. Stephen Henson
ffa08b3242
Remove reference to deleted md4.c
...
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-10-11 13:37:44 +01:00
Dr. Stephen Henson
f3014206a2
Disable encrypt them mac for SSL 3.0 and stream ciphers (RC4 only).
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-10-10 13:23:29 +01:00
Matt Caswell
e0fdea3e49
Removed duplicate definition of PKCS7_type_is_encrypted
...
Patch supplied by Matthieu Patou <mat@matws.net >, and modified to also
remove duplicate definition of PKCS7_type_is_digest.
PR#3551
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-10-06 23:42:13 +01:00
Ben Laurie
71614df485
Fix single makefile.
...
Reviewed-by: Geoffrey Thorpe <geoff@geoffthorpe.net >
2014-10-06 18:07:55 +01:00
Rich Salz
5aed169305
RT3462: Document actions when data==NULL
...
If data is NULL, return the size needed to hold the
derived key. No other API to do this, so document
the behavior.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-10-03 10:39:00 -04:00
Bodo Moeller
429a25b97d
DTLS 1.2 support has been added to 1.0.2.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-10-02 17:56:40 +02:00
Andy Polyakov
ae4af7a067
crypto/cast/asm/cast-586.pl: +5% on PIII and remove obsolete readme.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-10-01 23:59:14 +02:00
Rich Salz
df8c39d522
RT3549: Remove obsolete files in crypto
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-10-01 16:05:47 -04:00
Rich Salz
d5f34443ad
RT2910: Remove des.c and its Makefile target
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-09-30 16:44:10 -04:00
Rich Salz
9208640a36
RT2309: Fix podpage MMNNFFPPS->MNNFFPPS
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-09-30 16:31:11 -04:00
Dr. Stephen Henson
4b6dee2b14
Parse custom extensions after internal extensions.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-09-30 20:10:50 +01:00
Andy Polyakov
55c7a4cf11
e_os.h: refine inline override logic (to address warnings in debug build).
...
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2014-09-30 21:05:33 +02:00
Andy Polyakov
323154be33
crypto/bn/bn_nist.c: bring original failing code back for reference.
...
RT: 3541
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2014-09-30 21:00:44 +02:00
Dr. Stephen Henson
7c4776251e
Add additional explanation to CHANGES entry.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-29 12:25:10 +01:00
Dr. Stephen Henson
1cfd255c91
Add additional DigestInfo checks.
...
Reencode DigestInto in DER and check against the original: this
will reject any improperly encoded DigestInfo structures.
Note: this is a precautionary measure, there is no known attack
which can exploit this.
Thanks to Brian Smith for reporting this issue.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-29 12:01:05 +01:00
Rich Salz
3d81ec5b92
Remove #ifdef's for IRIX_CC_BUG
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-09-25 14:43:24 -04:00
Rich Salz
008bef521c
RT3544: Must update TABLE after Configure change
...
Also add comment to Configure reminding people to do that.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-09-25 13:18:22 -04:00
Emilia Kasper
fdc35a9d3e
Add missing tests
...
Accidentally omitted from commit 455b65dfab
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-09-25 13:46:08 +02:00
Dr. Stephen Henson
5886354dcc
Use correct function name: CMS_add1_signer()
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-09-25 00:03:27 +01:00
Andy Polyakov
8b07c005fe
crypto/bn/bn_nist.c: work around MSC ARM compiler bug.
...
RT: 3541
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2014-09-25 00:42:26 +02:00
Andy Polyakov
40155f4089
e_os.h: allow inline functions to be compiled by legacy compilers.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-09-25 00:32:56 +02:00
Rich Salz
92c7846372
RT3544: Remove MWERKS support
...
The following #ifdef tests were all removed:
__MWERKS__
MAC_OS_pre_X
MAC_OS_GUSI_SOURCE
MAC_OS_pre_X
OPENSSL_SYS_MACINTOSH_CLASSIC
OPENSSL_SYS_MACOSX_RHAPSODY
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-09-24 18:07:29 -04:00
Emilia Kasper
4aac102f75
RT3425: constant-time evp_enc
...
Do the final padding check in EVP_DecryptFinal_ex in constant time to
avoid a timing leak from padding failure.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-09-24 16:19:18 +02:00
Emilia Kasper
455b65dfab
RT3067: simplify patch
...
(Original commit adb46dbc6d )
Use the new constant-time methods consistently in s3_srvr.c
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-09-24 15:35:02 +02:00
Emilia Kasper
294d1e36c2
RT3066: rewrite RSA padding checks to be slightly more constant time.
...
Also tweak s3_cbc.c to use new constant-time methods.
Also fix memory leaks from internal errors in RSA_padding_check_PKCS1_OAEP_mgf1
This patch is based on the original RT submission by Adam Langley <agl@chromium.org >,
as well as code from BoringSSL and OpenSSL.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-09-24 12:45:42 +02:00
Emilia Kasper
51b7be8d5f
make update
...
Sync libeay.num from 1.0.2
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2014-09-23 18:37:23 +02:00
Emilia Kasper
5f85f64f7e
Note i2d_re_X509_tbs and related changes in CHANGES
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit e9128d9401 )
2014-09-23 18:28:10 +02:00
Andy Polyakov
507efe7372
CHANGES: mention ECP_NISTZ256.
...
Reviewed-by: Bodo Moeller <bodo@openssl.org >
2014-09-23 14:54:34 +02:00
Andy Polyakov
4513b1b641
crypto/rsa/rsa_chk.c: harmonize error codes.
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-21 23:05:13 +02:00
Andy Polyakov
be07ae9b10
crypto/ecp_nistz256.c: harmonize error codes.
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-21 15:56:02 +02:00
Tim Hudson
b5ff559ff9
Fixed error introduced in commit f2be92b94d
...
that fixed PR#3450 where an existing cast masked an issue when i was changed
from int to long in that commit
Picked up on z/linux (s390) where sizeof(int)!=sizeof(long)
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-09-21 21:54:31 +10:00
Andy Polyakov
d475b2a3bf
Harmonize Tru64 and Linux make rules.
...
RT: 3333,3165
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-09-20 10:20:38 +02:00
Dr. Stephen Henson
16e5b45f72
Fix warning.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-20 00:08:56 +01:00
Rich Salz
e8185aea87
RT3291: Add -crl and -revoke options to CA.pl
...
Document the new features
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-18 21:45:41 -04:00
Jake Goulding
99b00fd993
RT2301: GetDIBits, not GetBitmapBits in rand_win
...
GetDIBits has been around since Windows2000 and
BitBitmapBits is an old Win16 compatibility function
that is much slower.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-18 16:41:31 -04:00
Andy Polyakov
569e2d1257
crypto/bn/asm/x86_64-mont*.pl: add missing clang detection.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-09-12 00:44:51 +02:00
Andy Polyakov
847147908b
Configure: engage ECP_NISTZ256.
...
RT: 3149
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-09-12 00:38:57 +02:00
Andy Polyakov
4d3fa06fce
Add ECP_NISTZ256 by Shay Gueron, Intel Corp.
...
RT: 3149
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-09-12 00:37:41 +02:00
Andy Polyakov
f54be179aa
Reserve option to use BN_mod_exp_mont_consttime in ECDSA.
...
Submitted by Shay Gueron, Intel Corp.
RT: 3149
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-09-12 00:13:20 +02:00
Andy Polyakov
902b30df19
perlasm/x86_64-xlate.pl: handle inter-bank movd.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-09-12 00:06:00 +02:00
Rich Salz
6f46c3c3b0
RT2772 update: c_rehash was broken
...
Move the readdir() lines out of the if statement, so
that flist is available globally.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-11 13:08:30 -04:00
Rich Salz
cb4bb56bae
RT3271 update; extra; semi-colon; confuses; some;
...
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-09-10 15:08:40 -04:00
Rich Salz
b2aa38a980
RT2560: missing NULL check in ocsp_req_find_signer
...
If we don't find a signer in the internal list, then fall
through and look at the internal list; don't just return NULL.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-10 12:18:50 -04:00
Rich Salz
468ab1c20d
RT2196: Clear up some README wording
...
Say where to email bug reports.
Mention general RT tracker info in a separate paragraph.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-09 17:48:27 -04:00
Matt Caswell
eb63bce040
RT3192: spurious error in DSA verify
...
This is funny; Ben commented in the source, Matt opend a ticket,
and Rich is doing the submit. Need more code-review? :)
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-09 17:10:15 -04:00
Rich Salz
c939cca1a3
Merge branch 'master' of git.openssl.org:openssl
...
Previous commit was reviewed by Geoff, not Stephen:
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
2014-09-09 17:06:50 -04:00
Rich Salz
843921f298
RT3271: Don't use "if !" in shell lines
...
For portability don't use "if ! expr"
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
2014-09-09 17:06:14 -04:00
Rich Salz
b999f66e34
RT3271: Don't use "if !" in shell lines
...
For portability don't use "if ! expr"
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-09 17:05:28 -04:00
Geoff Keating
1f18f50c4b
RT1909: Omit version for v1 certificates
...
When calling X509_set_version to set v1 certificate, that
should mean that the version number field is omitted.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-09 15:15:45 -04:00
Kurt Cancemi
4eadd11cd9
RT3506: typo's in ssltest
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-09 13:57:58 -04:00
Paul Suhler
4cd1119df3
RT2841: Extra return in check_issued
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-08 18:50:07 -04:00
Kurt Roeckx
44e0c2bae4
RT2626: Change default_bits from 1K to 2K
...
This is a more comprehensive fix. It changes all
keygen apps to use 2K keys. It also changes the
default to use SHA256 not SHA1. This is from
Kurt's upstream Debian changes.
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-09-08 17:21:04 -04:00
Rich Salz
5f855569c4
RT2600: Change Win line-endings to Unix.
...
For consistency.
Reviewed-by: Bodo Moeller <bodo@openssl.org >
2014-09-08 16:40:24 -04:00
Matthias Andree
a787c2590e
RT2272: Add old-style hash to c_rehash
...
In addition to Matthias's change, I also added -n to
not remove links. And updated the manpage.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-08 11:34:44 -04:00
Bjoern Zeeb
6452a139fe
RT671: export(i2s|s2i|i2v|v2i)_ASN1_(IA5|BIT)STRING
...
The EXT_BITSTRING and EXT_IA5STRING are defined in x509v3.h, but
the low-level functions are not public. They are useful, no need
to make them static. Note that BITSTRING already was exposed since
this RT was created, so now we just export IA5STRING functions.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-08 11:27:07 -04:00
Rich Salz
e9edfc4196
RT468: SSL_CTX_sess_set_cache_size wrong
...
The documentation is wrong about what happens when the
session cache fills up.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-08 11:26:03 -04:00
Erik Auerswald
af4c6e348e
RT3301: Discard too-long heartbeat requests
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-08 11:22:35 -04:00
Dario B
98ecf60ba6
RT3291: Add -crl and -revoke options to CA.pl
...
I added some error-checking while integrating this patch.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-08 11:21:17 -04:00
Scott Schaefer
fe7573042f
RT2518: fix pod2man errors
...
pod2man now complains when item tags are not sequential.
Also complains about missing =back and other tags.
Silence the warnings; most were already done.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-08 11:18:30 -04:00
Rich Salz
2afb29b480
RT992: RSA_check_key should have a callback arg
...
The original RT request included a patch. By the time
we got around to doing it, however, the callback scheme
had changed. So I wrote a new function RSA_check_key_ex()
that uses the BN_GENCB callback. But thanks very much
to Vinet Sharma <vineet.sharma@gmail.com > for the
initial implementation.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-08 11:11:49 -04:00
Rich Salz
be0bd11d69
RT3108: OPENSSL_NO_SOCK should imply OPENSSL_NO_DGRAM
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-08 11:07:45 -04:00
Robin Lee
83e4e03eeb
RT3031: Need to #undef some names for win32
...
Copy the ifdef/undef stanza from x509.h to x509v3.h
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-08 11:05:48 -04:00
Rich Salz
3173622ef6
RT2849: Redundant check of "dsa" variable.
...
In the current code, the check isn't redundant.
And in fact the REAL check was missing.
This avoids a NULL-deref crash.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-08 10:53:59 -04:00
Martin Olsson
683cd7c948
RT2843: Remove another spurious close-comment token
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-08 10:52:00 -04:00
Martin Olsson
6b0dc6eff1
RT2842: Remove spurious close-comment marker.
...
Also, I (rsalz) changed "#ifdef undef" to "#if 0"
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-08 10:50:08 -04:00
Rich Salz
76e8671c5a
Merge branch 'master' of git.openssl.org:openssl
...
empty merge; script hiccup.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-08 10:46:05 -04:00
Rich Salz
4f13dabe72
RT1834: Fix PKCS7_verify return value
...
The function returns 0 or 1, only.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-08 10:43:08 -04:00
Rich Salz
b0e659cfac
RT1832: Fix PKCS7_verify return value
...
The function returns 0 or 1, only.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-08 10:38:29 -04:00
Alon Bar-Lev
8842987e5a
RT1771: Add string.h include.
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-08 10:37:28 -04:00
Viktor Dkhovni
5a8addc432
RT1325,2973: Add more extensions to c_rehash
...
Regexp was bracketed wrong.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-07 18:24:15 -04:00
Emilia Kasper
2f32016bb9
make update
...
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2014-09-05 17:19:36 +02:00
Emilia Kasper
95b1752cc7
Add i2d_re_X509_tbs
...
i2d_re_X509_tbs re-encodes the TBS portion of the certificate.
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2014-09-05 17:18:06 +02:00
Dr. Stephen Henson
b2774f6e17
Add CHANGES entry for SCT viewer code.
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-09-05 13:44:18 +01:00
Dr. Stephen Henson
b0bbe49360
sync ordinals with 1.0.2
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-05 13:44:18 +01:00
Adam Langley
be0d851732
psk_client_callback, 128-byte id bug.
...
Fix a bug in handling of 128 byte long PSK identity in
psk_client_callback.
OpenSSL supports PSK identities of up to (and including) 128 bytes in
length. PSK identity is obtained via the psk_client_callback,
implementors of which are expected to provide a NULL-terminated
identity. However, the callback is invoked with only 128 bytes of
storage thus making it impossible to return a 128 byte long identity and
the required additional NULL byte.
This CL fixes the issue by passing in a 129 byte long buffer into the
psk_client_callback. As a safety precaution, this CL also zeroes out the
buffer before passing it into the callback, uses strnlen for obtaining
the length of the identity returned by the callback, and aborts the
handshake if the identity (without the NULL terminator) is longer than
128 bytes.
(Original patch amended to achieve strnlen in a different way.)
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-09-05 12:21:44 +02:00
Richard Levitte
360928b7d0
Followup on RT3334 fix: make sure that a directory that's the empty
...
string returns 0 with errno = ENOENT.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-09-03 21:57:44 +02:00
Phil Mesnier
6a14fe7576
RT3334: Fix crypto/LPdir_win.c
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-09-03 21:56:40 +02:00
Clang via Jeffrey Walton
0ff3687eab
RT3140: Possibly-unit variable in pem_lib.c
...
Can't really happen, but the flow of control isn't obvious.
Add an initializer.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-09-02 23:37:17 -04:00
Emilia Kasper
86f50b36e6
Make the inline const-time functions static.
...
"inline" without static is not correct as the compiler may choose to ignore it
and will then either emit an external definition, or expect one.
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
2014-09-02 15:21:01 +02:00
Kurt Cancemi
b0426a0f8c
RT3508: Remove unused variable introduced by b09eb24
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-31 23:43:37 -04:00
Adam Williamson
3aba132d61
RT3511: doc fix; req default serial is random
...
RT842, closed back in 2004, changed the default serial number
to be a random number rather than zero. Finally time to update
the doc
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-31 23:40:56 -04:00
Rich Salz
9fc8dc5469
Add explanatory note to crypto/store/README
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-08-31 15:27:17 -04:00
TANABE Hiroyasu
80ec8d4e3e
RT1325,2973: Add more extensions to c_rehash
...
Add .crt/.cer/.crl to the filenames parsed.
I also updated the podpage (since it didn't exist when
this ticket was first created, nor when it was re-created
seven years later).
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-31 00:36:09 -04:00
Andy Polyakov
6019cdd327
Configure: add configuration for crypto/ec/asm extensions.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-30 19:22:51 +02:00
Andy Polyakov
4d86e8df6b
md5-x86_64.pl: work around warning.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-30 19:17:09 +02:00
Andy Polyakov
b59f92e75d
x86[_64] assembly pack: add Silvermont performance data.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-30 19:13:49 +02:00
Rich Salz
0f957287df
Remove some outdated README files, to avoid confusing people.
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-08-30 10:29:35 -04:00
Rich Salz
457f7b14ec
RT2820: case-insensitive filenames on Darwin
...
Andy pointed out there is also darwin64, so tweak the pattern.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-08-30 10:18:51 -04:00
Rich Salz
d1bea969e8
RT2119,3407: Updated to dgst.pod
...
Re-order algorithm list.
Be consistent in command synopsis.
Add content about signing.
Add EXAMPLE section
Add some missing options: -r, -fips-fingerprint -non-fips-allow
Various other fixes.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-08-30 10:03:22 -04:00
Rich Salz
8b77d64e99
RT2379: Additional typo fix
...
Andy found an additional typo "can be can be".
Now I have that silly "Que sera sera" song stuck in my head.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-08-30 09:55:56 -04:00
James Westby
cf2239b3b3
RT1941: c_rehash.pod is missing
...
Add the file written by James Westby, graciously contributed
under the terms of the OpenSSL license.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-08-30 09:50:48 -04:00
Andy Polyakov
e2d03db4b3
apps/speed.c: add -misalign command-line argument.
...
New option allows to perform benchmarks on misaligned data.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-30 10:25:32 +02:00
Rich Salz
07e3b31fae
RT2379: Bug in BIO_set_accept_port.pod
...
The doc says that port can be "*" to mean any port.
That's wrong.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-29 16:45:02 -04:00
Matt Caswell
13be7da81f
Fixed double inclusion of string.h
...
PR2693
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-29 21:42:54 +01:00
Jim Reid
82d9185ae5
RT2880: HFS is case-insensitive filenames
...
Add Darwin to list of case-insensitive filenames when
installing manapges. When doing this, I noticed that
we weren't setting "filecase" for the HTML doc install.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-29 16:38:55 -04:00
Rich Salz
b09eb246e2
RT3246: req command prints version number wrong
...
Make X509_REQ_print_ex do the same thing that
X509_REQ_print does.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-08-28 19:17:05 -04:00
Rich Salz
c7497f34fb
RT1665,2300: Crypto doc cleanups
...
RT1665: aes documentation.
Paul Green wrote a nice aes.pod file.
But we now encourage the EVP interface.
So I took his RT item and used it as impetus to add
the AES modes to EVP_EncryptInit.pod
I also noticed that rc4.pod has spurious references to some other
cipher pages, so I removed them.
RT2300: Clean up MD history (merged into RT1665)
Put HISTORY section only in EVP_DigestInit.pod. Also add words
to discourage use of older cipher-specific API, and remove SEE ALSO
links that point to them.
Make sure digest pages have a NOTE that says use EVP_DigestInit.
Review feedback:
More cleanup in EVP_EncryptInit.pod
Fixed SEE ALSO links in ripemd160.pod, sha.pod, mdc2.pod, blowfish.pod,
rc4.d, and des.pod. Re-order sections in des.pod for consistency
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-08-28 18:55:50 -04:00
l.montecchiani@gmail.com
ac53354b94
RT2193: #ifdef errors in bss_dgram.c
...
Problem with #ifdef in the BIO_CTRL_DGRAM_MTU_DISCOVER case that
is different from the BIO_CTRL_DGRAM_QUERY_MTU one which seems
correct.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-08-28 17:17:36 -04:00
Rich Salz
8d4193305b
RT3102: Document -verify_error_return flag
...
Also moved some options around so all the "verify" options.
are clumped together.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-08-28 17:11:25 -04:00
Dr. Stephen Henson
f47e203975
Fix comments, add new test.
...
Fix comments in ssltest.c: return value of 0 now means extension is
omitted and add_cb is not called for servers if the corresponding
extension is absent in ClientHello.
Test add_cb is not called if extension is not received.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-28 17:06:53 +01:00
Dr. Stephen Henson
f3f56c2a87
Custom extension documentation.
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-28 17:06:53 +01:00
Dr. Stephen Henson
0cfefe4b6d
Rename some callbacks, fix alignment.
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-28 17:06:53 +01:00
Dr. Stephen Henson
8cafe9e8bf
Use consistent function naming.
...
Instead of SSL_CTX_set_custom_cli_ext and SSL_CTX_set_custom_srv_ext
use SSL_CTX_add_client_custom_ext and SSL_CTX_add_server_custom_ext.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-28 17:06:53 +01:00
Dr. Stephen Henson
c846a5f567
New function SSL_extension_supported().
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-28 17:06:53 +01:00
Dr. Stephen Henson
33f653adf3
New extension callback features.
...
Support separate parse and add callback arguments.
Add new callback so an application can free extension data.
Change return value for send functions so < 0 is an error 0
omits extension and > 0 includes it. This is more consistent
with the behaviour of other functions in OpenSSL.
Modify parse_cb handling so <= 0 is an error.
Make SSL_CTX_set_custom_cli_ext and SSL_CTX_set_custom_cli_ext argument
order consistent.
NOTE: these changes WILL break existing code.
Remove (now inaccurate) in line documentation.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-28 17:06:53 +01:00
Dr. Stephen Henson
de2a9e38f3
Callback revision.
...
Use "parse" and "add" for function and callback names instead of
"first" and "second".
Change arguments to callback so the extension type is unsigned int
and the buffer length is size_t. Note: this *will* break existing code.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-28 17:06:53 +01:00
Dr. Stephen Henson
707b026d78
Remove serverinfo checks.
...
Since sanity checks are performed for all custom extensions the
serverinfo checks are no longer needed.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-28 17:06:53 +01:00
Dr. Stephen Henson
28ea0a0c6a
Add custom extension sanity checks.
...
Reject attempts to use extensions handled internally.
Add flags to each extension structure to indicate if an extension
has been sent or received. Enforce RFC5246 compliance by rejecting
duplicate extensions and unsolicited extensions and only send a
server extension if we have sent the corresponding client extension.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-28 17:06:52 +01:00
Dr. Stephen Henson
ecf4d66090
Custom extension revision.
...
Use the same structure for client and server custom extensions.
Add utility functions in new file t1_ext.c.
Use new utility functions to handle custom server and client extensions
and remove a lot of code duplication.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-28 17:06:52 +01:00
Dr. Stephen Henson
879bde123b
fix warning
...
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
2014-08-28 17:06:52 +01:00
Emilia Kasper
5a3d21c058
Constant-time utilities
...
Pull constant-time methods out to a separate header, add tests.
Reviewed-by: Bodo Moeller <bodo@openssl.org >
2014-08-28 15:48:45 +02:00
Raphael Spreitzer
f9fb43e176
RT2400: ASN1_STRING_to_UTF8 missing initializer
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-27 22:59:05 -04:00
Rich Salz
506a3d1f9c
Merge branch 'master' of git.openssl.org:openssl
...
Gah, I hate when I forget to pull before merging.
Reviewed-by: rsalz
2014-08-27 21:36:36 -04:00
Rich Salz
17e80c6bd0
RT2308: Add extern "C" { ... } wrapper
...
Add the wrapper to all public header files (Configure
generates one). Don't bother for those that are just
lists of #define's that do renaming.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-27 21:35:32 -04:00
Emilia Kasper
f34a57202b
Explicitly check for empty ASN.1 strings in d2i_ECPrivateKey
...
The old code implicitly relies on the ASN.1 code returning a \0-prefixed buffer
when the buffer length is 0. Change this to verify explicitly that the ASN.1 string
has positive length.
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2014-08-27 19:49:35 +02:00
Matt Caswell
f063e30fe9
RT3065: automatically generate a missing EC public key
...
When d2i_ECPrivateKey reads a private key with a missing (optional) public key,
generate one automatically from the group and private key.
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2014-08-27 19:49:35 +02:00
Adam Langley
0388ac4c99
RT3065: ec_private_key_dont_crash
...
This change saves several EC routines from crashing when an EC_KEY is
missing a public key. The public key is optional in the EC private key
format and, without this patch, running the following through `openssl
ec` causes a crash:
-----BEGIN EC PRIVATE KEY-----
MBkCAQEECAECAwQFBgcIoAoGCCqGSM49AwEH
-----END EC PRIVATE KEY-----
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2014-08-27 19:49:34 +02:00
Mihai Militaru
7b3e11c544
RT2210: Add missing EVP_cleanup to example
...
I also removed some trailing whitespace and cleaned
up the "see also" list.
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2014-08-27 12:53:40 -04:00
Rich Salz
34ccd24d0e
Add tags/TAGS target; rm tags/TAGS in clean
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-26 20:51:52 -04:00
Rich Salz
ed49eb4a48
Merge branch 'master' of git.openssl.org:openssl
...
Stupid git tricks :(
Reviewed-by: rsalz
2014-08-26 13:55:13 -04:00
David Gatwood
fa60b90950
RT1744: SSL_CTX_set_dump_dh() doc feedback
...
The description of when the server creates a DH key is
confusing. This cleans it up.
(rsalz: also removed trailing whitespace.)
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
2014-08-26 13:47:23 -04:00
David Gatwood
a4d266b824
RT1744: SSL_CTX_set_dump_dh() doc feedback
...
The description of when the server creates a DH key is
confusing. This cleans it up.
(rsalz: also removed trailing whitespace.)
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
2014-08-26 13:36:20 -04:00
Jan Schaumann
fd4592be3a
RT1804: fix EXAMPLE in EVP_EncryptInit.pod
...
The EXAMPLE that used FILE and RC2 doesn't compile due to a
few minor errors. Tweak to use IDEA and AES-128. Remove
examples about RC2 and RC5.
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2014-08-25 10:25:02 -04:00
Matt Caswell
2dd8cb3b95
Typo fixes to evp documentation.
...
This patch was submitted by user "Kox" via the wiki
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-24 21:24:28 +01:00
Emilia Kasper
be0477a8e9
RT 3060: amend patch
...
Use existing error code SSL_R_RECORD_TOO_SMALL for too many empty records.
For ease of backporting the patch to release branches.
Reviewed-by: Bodo Moeller <bodo@openssl.org >
2014-08-22 15:35:42 +02:00
Emilia Kasper
bc46db60f1
RT3061: slightly amend patch
...
Add an extra NULL dereference check
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
2014-08-22 15:23:33 +02:00
Emilia Kasper
d64c533a20
Improve EVP_PKEY_sign documentation
...
Clarify the intended use of EVP_PKEY_sign. Make the code example compile.
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2014-08-22 15:00:11 +02:00
Jeffrey Walton
a520ae3628
RT3142: Extra initialization in state_machine
...
Remove extra initialization calls in the sample program.
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2014-08-21 13:32:17 -04:00
Emilia Kasper
f511b25a73
define inline for Visual Studio
...
In Visual Studio, inline is available in C++ only, however __inline is available for C, see
http://msdn.microsoft.com/en-us/library/z8y1yy88.aspx
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2014-08-21 15:56:58 +02:00
Emilia Kasper
da92be4d68
Fix build when BSAES_ASM is defined but VPAES_ASM is not
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-08-21 15:42:57 +02:00
Andy Polyakov
15735e4f0e
bn/asm/rsaz-*.pl: allow spaces in Perl path name.
...
RT: 2835
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-21 00:17:45 +02:00
Andy Polyakov
e608273a80
sha1-mb-x86_64.pl: add commentary.
...
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2014-08-21 00:15:40 +02:00
Laszlo Papp
09ec8c8e89
PR2490: Remove unused local variable bn ecp_nist.c
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-20 16:36:20 -04:00
Andy Polyakov
2893a302a9
crypto/evp/e_aes_cbc_hmac_sha[1|256].c: fix compiler warnings.
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-20 22:18:14 +02:00
Andy Polyakov
55eb14da20
sha1-mb-x86_64.pl: fix typo.
...
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2014-08-20 22:10:20 +02:00
Martin Olsson
89fb142b49
RT2847: Don't "check" uninitialized memory
...
Don't check err variable until after it's been set.
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2014-08-19 12:47:02 -04:00
Martin Olsson
96208cb182
RT2848: Remove extra NULL check
...
Don't need to check auth for NULL since we did when we
assigned to it.
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2014-08-19 12:43:58 -04:00
Martin Olsson
1afd7fa97c
RT2513: Fix typo's paramter-->parameter
...
I also found a couple of others (padlock and signinit)
and fixed them.
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2014-08-19 11:09:33 -04:00
Rich Salz
0df043f608
Merge branch 'master' of git.openssl.org:openssl
2014-08-19 10:02:05 -04:00
Jeffrey Walton
76b10e13c2
PR2401: Typos in FAQ
...
Also rewrite section on compiler bugs; Matt pointed out that
it has some grammatical issues.
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2014-08-19 10:01:40 -04:00
Jeffrey Walton
bcd3e36c46
PR2401: Typos in FAQ
...
Also rewrite section on compiler bugs; Matt pointed out that
it has some grammatical issues.
2014-08-19 10:01:06 -04:00
John Fitzgibbon
3609b02305
RT2724: Remove extra declaration
...
Extra SSL_get_selected_srtp_profile() declaration in ssl/srtp.h
causes -Werror builds to fail.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-19 09:38:43 -04:00
Laszlo Papp
8b6e517e33
RT2492: Remove extra NULL check.
2014-08-18 17:41:24 -04:00
Laszlo Papp
ddc29125a1
RT2489: Remove extra "sig" local variable.
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-18 17:36:49 -04:00
John Gardiner Myers
fc979b93ee
RT2942: CRYPTO_set_dynlock_create_callback doc fix
...
The file param is "const char*" not "char*"
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-18 16:04:33 -04:00
Doug Goldstein
448155e9bb
RT2163: Remove some unneeded #include's
...
Several files #include stdio.h and don't need it.
Also, per tjh, remove BN_COUNT
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2014-08-18 12:50:00 -04:00
Justin Blanchard
f756fb430e
RT1815: More const'ness improvements
...
Add a dozen more const declarations where appropriate.
These are from Justin; while adding his patch, I noticed
ASN1_BIT_STRING_check could be fixed, too.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-18 11:49:16 -04:00
Jonas Maebe
defe438d47
pub_decode_gost94, pub_decode_gost01: check for NULL after allocating databuf pub_encode_gost94, pub_encode_gost01: check for NULL after allocating databuf and octet
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-17 18:56:52 +02:00
Jonas Maebe
94c0a987c7
engine_md_copy: check for NULL after allocating to_md->HashBuffer
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-17 18:56:44 +02:00
Jonas Maebe
9f01a8acb3
process_pci_value: free (*policy)->data before setting to NULL after failed realloc
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-17 18:56:35 +02:00
Jonas Maebe
259ac68aeb
do_ext_i2d: free ext_der or ext_oct on error path
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-17 18:56:24 +02:00
Jonas Maebe
54298141d3
do_othername: check for NULL after allocating objtmp
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-17 18:56:05 +02:00
Jonas Maebe
f6983d0d76
NETSCAPE_SPKI_b64_encode: free der_spki and b64_str on error path
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-17 18:55:12 +02:00
Jonas Maebe
254f1c8019
get_cert_by_subject: check for NULL when allocating hent
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-17 18:55:01 +02:00
Jonas Maebe
fb7fbf28b3
UI_construct_prompt: check for NULL when allocating prompt
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-17 18:54:49 +02:00
Jonas Maebe
ba494ee593
hashbn: check for NULL result when allocating bin and return an error if it fails all (in)direct callers of hashbn: propagate potential error in hashbn
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-17 18:54:39 +02:00
Jonas Maebe
462319c3e9
JPAKE_CTX_new: check for NULL result when allocating ctx
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-17 18:54:11 +02:00
Jonas Maebe
34374c2d2c
old_hmac_encode: check for NULL result when allocating *pder
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-17 18:52:44 +02:00
Jonas Maebe
6f77f82bfc
dev_crypto_md5_copy: return error if allocating to_md->data fails
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-17 18:52:30 +02:00
Jonas Maebe
771e0c6c7a
dev_crypto_md5_update: check result of realloc(md_data->data) and don't leak memory if it fails
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-17 18:52:14 +02:00
Jonas Maebe
d8513b4abd
dev_crypto_cipher: return immediately if allocating cin/cout failed
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-17 18:51:35 +02:00
Jonas Maebe
c84029dbdc
dev_crypto_init_key: return error if allocating CDATA(ctx)->key failed
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-17 18:51:16 +02:00
Hubert Kario
750487899a
Add support for Camellia HMAC-Based cipher suites from RFC6367
...
While RFC6367 focuses on Camellia-GCM cipher suites, it also adds a few
cipher suites that use SHA-2 based HMAC that can be very easily
added.
Tested against gnutls 3.3.5
PR#3443
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-15 23:41:20 +01:00
Matt Caswell
f2be92b94d
Fixed out-of-bounds read errors in ssl3_get_key_exchange.
...
PR#3450
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-15 23:27:34 +01:00
Rich Salz
c9a81b3026
RT2751: Declare get_issuer_sk() earlier.
...
Add a declaration for get_issuer_sk() so that other
functions in x509_vf.c could use it. (Planned work
around cross-certification chains.)
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-08-15 17:49:03 -04:00
Jonas Maebe
d6f69ae547
cryptodev_digest_copy: return error if allocating dstate->mac_data fails
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-15 22:38:51 +02:00
Jonas Maebe
349e6b2b0a
cryptodev_digest_update: don't leak original state->mac_data if realloc fails
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-15 22:38:36 +02:00
Jonas Maebe
36f7ed5040
cms_SignerInfo_content_sign: free sig on failure path
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-15 22:38:19 +02:00
Jonas Maebe
4e64f671c9
rtcp_new: return failure if allocation of bi->ptr failed
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-15 22:38:05 +02:00
Jonas Maebe
1c4b688cb4
multi_split: check for NULL when allocating parts and bpart, and for failure of sk_BIO_push()
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-15 22:37:48 +02:00
Jonas Maebe
bd4acbc70e
BIO_new_dgram_sctp, dgram_sctp_read: zero entire authchunks
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-15 22:37:28 +02:00
Jonas Maebe
8957278869
mime_hdr_addparam: free tmpname, tmpval and mparam on error path, and check whether sk_MIME_PARAM_push succeeds
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-15 22:37:14 +02:00
Jonas Maebe
15297d962c
mime_hdr_new: free mhdr, tmpname, tmpval on error path
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-15 22:36:54 +02:00
Jonas Maebe
c9c63b0180
ASN1_verify, ASN1_item_verify: cleanse and free buf_in on error path
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-15 22:36:34 +02:00
Jonas Maebe
b9b9f853b5
SetBlob: free rgSetBlob on error path
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-15 22:35:11 +02:00
Istvan Noszticzius
865886553d
Fix use after free bug.
...
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-15 16:50:16 +01:00
Frdric Giudicelli
c753e71e0a
RT783: Minor optimization to ASN1_INTEGER_set
...
Remove local variable and avoid extra assignment.
Reviewed-by: Emilia Kasper <emilia@silkandcyanide.net >
2014-08-15 10:54:43 -04:00
Rob Austein
cf8bac4456
RT2465: Silence some gcc warnings
...
"Another machine, another version of gcc, another batch
of compiler warnings." Add "=NULL" to some local variable
declarations that are set by passing thier address into a
utility function; confuses GCC it might not be set.
Reviewed-by: Emilia Ksper <emilia@silkandcyanide.net >
2014-08-15 10:52:06 -04:00
Hans Wennborg
01e438f288
RT3023: Redundant logical expressions
...
Remove some redundant logical expressions
Reviewed-by: Emilia Kasper <emilia@silkandcyanide.net >
2014-08-15 10:45:00 -04:00
Rich Salz
5effa35610
Merge branch 'master' of git.openssl.org:openssl
2014-08-15 10:41:50 -04:00
Claus Assmann
14e961921a
RT3268: Fix spelling errors in CHANGES file.
...
Fix a bunch of typo's and speling (sic) errors in the CHANGES file.
Reviewed-by: Tim Hudson <tjh@cryptsoft.com >
2014-08-15 10:41:13 -04:00
Dr. Stephen Henson
b83294fe30
Revision of custom extension code.
...
Move custom extension structures from SSL_CTX to CERT structure.
This change means the form can be revised in future without binary
compatibility issues. Also since CERT is part of SSL structures
so per-SSL custom extensions could be supported in future as well as
per SSL_CTX.
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-15 12:20:04 +01:00
Dr. Stephen Henson
06f5d12f51
Include error messages on extension check failure.
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-15 12:16:16 +01:00
Emilia Kasper
f0ca9ccaef
make depend
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-14 15:24:58 +02:00
Bodo Moeller
16602b5cd5
Further improve/fix ec_GFp_simple_points_make_affine (ecp_smpl.c) and
...
group_order_tests (ectest.c). Also fix the EC_POINTs_mul documentation (ec.h).
Reviewed-by: emilia@openssl.org
2014-08-13 17:37:19 +02:00
Matt Caswell
690a2b1fa2
RT1665: Fix podpath to get xref's right
...
In Makefile, when build manpages, put the current directory
at the start of the podpath so that cross-refs find the
local directory first.
Reviewed-by: Tim Hudson <tjh@cryptosoft.com >
2014-08-13 00:31:02 -04:00
Ingo Schwarze
bebbb11d13
RT3239: Extra comma in NAME lines of two manpages
...
In two OpenSSL manual pages, in the NAME section, the last word of the
name list is followed by a stray trailing comma. While this may seem
minor, it is worth fixing because it may confuse some makewhatis(8)
implementations.
While here, also add the missing word "size" to the one line
description in SSL_CTX_set_max_cert_list(3).
Reviewed by: Dr Stephen Henson <shenson@drh-consultancy.co.uk >
2014-08-12 15:59:18 -04:00
Rich Salz
1c5be3d7f0
Merge branch 'master' of git.openssl.org:openssl
2014-08-12 15:33:36 -04:00
nnposter@users.sourceforge.net
cde8ad1a28
PR 719: Configure not exiting with child status
...
If subcommand fails, just die.
Reviewed-by: Kurt Roeckx <kurt@roeckx.be >
2014-08-12 14:45:49 -04:00
nnposter@users.sourceforge.net
16caa9a43d
PR 718: Configure not exiting with child status
...
If subcommand fails, just die.
Reviewed-by: Kurt Roeckx <kurt@roeckx.be >
2014-08-12 14:44:51 -04:00
Nick Lewis
9aaa7be8d4
PR 2580: dgst missing current SHA algorithms
...
Update the dgst.pod page to include SHA224...512 algorithms.
Update apps/progs.pl to add them to the digest command table.
Reviewed-by: Tim Hudson <tjh@cryptosoft.com >
2014-08-12 11:29:20 -04:00
Rich Salz
2a1393a4a8
Revert "RT 2820: Case-insensitive filenames on Darwin"
...
This reverts commit 691edc997a .
2014-08-12 11:22:50 -04:00
Nick Urbanik
42ce91cc35
RT2609: Typo in EXAMPLE section of req.pod
...
The x509_extensions should be req_extensions in the
config example in req.pod
Reviewed-by: tjh@cryptsoft.com
2014-08-12 11:16:58 -04:00
Dr Stephen Henson
b00f586a81
Fix d4a4370050
...
Fully remove old error, per drH
Reviewed-by: rsalz
2014-08-11 17:32:57 -04:00
Jim Reid
691edc997a
RT 2820: Case-insensitive filenames on Darwin
...
Add darwin-*-cc as one of the systems for case-insensitive
filenames. Fixes the manpage install so it doesn't create
looping symlinks.
2014-08-11 15:06:54 -04:00
Rich Salz
d9fcd8ec4c
Merge branch 'master' of git.openssl.org:openssl
2014-08-11 13:45:03 -04:00
Rich Salz
cbfc8baddb
Undo 77bf69dced
...
Not approved; mistakenly pushed commit that added README.md
2014-08-11 13:44:25 -04:00
Scott Schaefer
d4a4370050
RT 2517: Various typo's.
...
Reviewed-by: Emilia Kasper
Many of these were already fixed, this catches the last
few that were missed.
2014-08-11 13:43:31 -04:00
Scott Schaefer
590bdcc686
RT 2517: Various typo's.
...
Many of these were already fixed, this catches the last
few that were missed.
2014-08-11 13:12:53 -04:00
Rich Salz
77bf69dced
Add README.md
...
A small markdown README for GitHub users; points them to
the right README and the website and RT tracker.
2014-08-11 11:35:32 -04:00
Dr. Stephen Henson
9e72d496d4
Fix SRP authentication ciphersuites.
...
The addition of SRP authentication needs to be checked in various places
to work properly. Specifically:
A certificate is not sent.
A certificate request must not be sent.
Server key exchange message must not contain a signature.
If appropriate SRP authentication ciphersuites should be chosen.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-08-09 13:21:30 +01:00
Dr. Stephen Henson
562fd0d883
Test SRP authentication ciphersuites.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-08-09 13:21:29 +01:00
Rich Salz
f642ebc1e2
Undo a90081576c
...
Undo unapproved commit that removed DJGPP and WATT32
2014-08-09 08:02:20 -04:00
Viktor Szakats
693b71fa71
RT 1988: Add "const" to SSL_use_RSAPrivateKey_ASN1
...
The "unsigned char *d" should be const.
Reviewed-by: Kurt Roeckx <kurt@roeckx.be >
2014-08-09 07:56:28 -04:00
Matthieu Crapet
6d03125ccf
RT 1505: Use SSL3_AL_FATAL not "2"
...
Use SSL3_AL_FATAL instead of the literal constant "2"
Every bit of cleanup helps.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-08-08 22:47:33 -04:00
Rich Salz
a90081576c
Remove DJGPP (and therefore WATT32) #ifdef's.
...
DJGPP is no longer a supported platform. Remove all #ifdef, etc.,
cases that refer to it. DJGPP also #define'd WATT32, so that
is now removed as well.
2014-08-08 16:54:14 -04:00
Dr. Stephen Henson
0989790b87
Check SRP parameters early.
...
Check SRP parameters when they are received so we can send back an
appropriate alert.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-08-06 20:36:41 +01:00
Dr. Stephen Henson
4a23b12a03
Fix SRP buffer overrun vulnerability.
...
Invalid parameters passed to the SRP code can be overrun an internal
buffer. Add sanity check that g, A, B < N to SRP code.
Thanks to Sean Devlin and Watson Ladd of Cryptography Services, NCC
Group for reporting this issue.
2014-08-06 20:36:41 +01:00
Dr. Stephen Henson
80bd7b41b3
Fix SRP ciphersuite DoS vulnerability.
...
If a client attempted to use an SRP ciphersuite and it had not been
set up correctly it would crash with a null pointer read. A malicious
server could exploit this in a DoS attack.
Thanks to Joonas Kuorilehto and Riku Hietamäki from Codenomicon
for reporting this issue.
CVE-2014-2970
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-06 20:36:41 +01:00
Gabor Tyukasz
fb0bc2b273
Fix race condition in ssl_parse_serverhello_tlsext
...
CVE-2014-3509
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-06 20:36:41 +01:00
Emilia Kasper
0042fb5fd1
Fix OID handling:
...
- Upon parsing, reject OIDs with invalid base-128 encoding.
- Always NUL-terminate the destination buffer in OBJ_obj2txt printing function.
CVE-2014-3508
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-06 20:36:41 +01:00
Emilia Käsper
1716003376
Fix DTLS anonymous EC(DH) denial of service
...
CVE-2014-3510
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-06 20:36:40 +01:00
David Benjamin
280b1f1ad1
Fix protocol downgrade bug in case of fragmented packets
...
CVE-2014-3511
Reviewed-by: Emilia Käsper <emilia@openssl.org >
Reviewed-by: Bodo Möller <bodo@openssl.org >
2014-08-06 20:36:40 +01:00
Adam Langley
4f2011d981
Remove some duplicate DTLS code.
...
In a couple of functions, a sequence number would be calculated twice.
Additionally, in |dtls1_process_out_of_seq_message|, we know that
|frag_len| <= |msg_hdr->msg_len| so the later tests for |frag_len <
msg_hdr->msg_len| can be more clearly written as |frag_len !=
msg_hdr->msg_len|, since that's the only remaining case.
Reviewed-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-06 20:36:40 +01:00
Matt Caswell
f6663338cb
Applying same fix as in dtls1_process_out_of_seq_message. A truncated DTLS fragment would cause *ok to be clear, but the return value would still be the number of bytes read.
...
Problem identified by Emilia Käsper, based on previous issue/patch by Adam
Langley.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-06 20:36:40 +01:00
Adam Langley
b74d1d260f
Fix return code for truncated DTLS fragment.
...
Previously, a truncated DTLS fragment in
|dtls1_process_out_of_seq_message| would cause *ok to be cleared, but
the return value would still be the number of bytes read. This would
cause |dtls1_get_message| not to consider it an error and it would
continue processing as normal until the calling function noticed that
*ok was zero.
I can't see an exploit here because |dtls1_get_message| uses
|s->init_num| as the length, which will always be zero from what I can
see.
Reviewed-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-06 20:36:40 +01:00
Adam Langley
d0a4b7d1a2
Fix memory leak from zero-length DTLS fragments.
...
The |pqueue_insert| function can fail if one attempts to insert a
duplicate sequence number. When handling a fragment of an out of
sequence message, |dtls1_process_out_of_seq_message| would not call
|dtls1_reassemble_fragment| if the fragment's length was zero. It would
then allocate a fresh fragment and attempt to insert it, but ignore the
return value, leaking the fragment.
This allows an attacker to exhaust the memory of a DTLS peer.
Fixes CVE-2014-3507
Reviewed-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-06 20:36:40 +01:00
Matt Caswell
1250f12613
Fix DTLS handshake message size checks.
...
In |dtls1_reassemble_fragment|, the value of
|msg_hdr->frag_off+frag_len| was being checked against the maximum
handshake message size, but then |msg_len| bytes were allocated for the
fragment buffer. This means that so long as the fragment was within the
allowed size, the pending handshake message could consume 16MB + 2MB
(for the reassembly bitmap). Approx 10 outstanding handshake messages
are allowed, meaning that an attacker could consume ~180MB per DTLS
connection.
In the non-fragmented path (in |dtls1_process_out_of_seq_message|), no
check was applied.
Fixes CVE-2014-3506
Wholly based on patch by Adam Langley with one minor amendment.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-06 20:36:40 +01:00
Matt Caswell
11e7982a7c
Added comment for the frag->reassembly == NULL case as per feedback from Emilia
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-06 20:36:40 +01:00
Adam Langley
bff1ce4e6a
Avoid double free when processing DTLS packets.
...
The |item| variable, in both of these cases, may contain a pointer to a
|pitem| structure within |s->d1->buffered_messages|. It was being freed
in the error case while still being in |buffered_messages|. When the
error later caused the |SSL*| to be destroyed, the item would be double
freed.
Thanks to Wah-Teh Chang for spotting that the fix in 1632ef74 was
inconsistent with the other error paths (but correct).
Fixes CVE-2014-3505
Reviewed-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-06 20:36:40 +01:00
Bodo Moeller
a46149c672
Update $default_depflags to match current defaults.
2014-08-01 19:02:10 +02:00
Bodo Moeller
bac6740746
Sync with clean-up 1.0.2 CHANGES file.
...
(If a change is already present in 1.0.1f or 1.0.1h,
don't list it again under changes between 1.0.1h and 1.0.2.)
2014-08-01 18:41:17 +02:00
Bodo Moeller
38c654819c
Sync with current 1.0.2 CHANGES file.
2014-08-01 18:18:52 +02:00
Bodo Moeller
0fe73d6c36
Simplify and fix ec_GFp_simple_points_make_affine
...
(which didn't always handle value 0 correctly).
Reviewed-by: emilia@openssl.org
2014-08-01 17:18:14 +02:00
Dr. Stephen Henson
e0fc7961c4
Add conditional unit testing interface.
...
Don't call internal functions directly call them through
SSL_test_functions(). This also makes unit testing work on
Windows and platforms that don't export internal functions
from shared libraries.
By default unit testing is not enabled: it requires the compile
time option "enable-unit-test".
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
2014-07-24 19:41:29 +01:00
Dr. Stephen Henson
8e55e6de45
Don't call setenv in gost2814789t.c
...
The call to setenv in gost2814789t.c is not portable and may
not reflect the location of the GOST ENGINE on all platforms anyway.
Instead set OPENSSL_ENGINES in test/Makefile
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
2014-07-24 18:18:54 +01:00
Geoff Thorpe
ceea4bf047
Remove demos/tunala
...
This has been unmaintained for a long time. If it's still of interest
to anyone, it can be obtained easily enough by reverting this commit.
(It could join other demo code in some other repository, perhaps.) In
any case we don't want it taking up space in the baseline source
package, so <snip>.
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
2014-07-22 15:16:30 -04:00
Andy Polyakov
7a2b54509c
CHANGES: mention new platforms.
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-07-22 20:19:37 +02:00
Billy Brumley
cba11f57ce
"EC_POINT_invert" was checking "dbl" function pointer instead of "invert".
...
PR#2569
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-07-21 22:18:40 +01:00
Tim Hudson
62352b8138
Remove old unused and unmaintained demonstration code.
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-07-22 05:26:17 +10:00
Andy Polyakov
5c3598307e
sha1-ppc.pl: shave off one cycle from BODY_20_39
...
and improve performance by 10% on POWER[78].
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-07-21 15:29:09 +02:00
Tim Hudson
c8d133e4b6
Minor documentation update removing "really" and a
...
statement of opinion rather than a fact.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-07-21 20:03:50 +10:00
Dr. Stephen Henson
841072ef65
Add test header, sync ordinals with 1.0.2
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-07-20 20:51:06 +01:00
Andy Polyakov
0e716d9207
Engage GHASH for PowerISA 2.0.7.
...
[and split ppccap.c to ppccap.c and ppc_arch.h]
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-07-20 14:16:31 +02:00
Andy Polyakov
f5b798f50c
Add GHASH for PowerISA 2.0.7.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-07-20 14:14:26 +02:00
Dr. Stephen Henson
03c075e572
Windows build fixes.
...
Add cmac.h to mkdef.pl
Remove ENGINE_load_rsax from engine.h: no longer built.
Update ordinals
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-07-19 22:57:37 +01:00
Dr. Stephen Henson
f8c03d4dbf
Fix documentation for RSA_set_method(3)
...
PR#1675
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-07-19 22:57:37 +01:00
Mike Bland
b2e50bcd0e
Check the test registry size during add_test()
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-07-19 19:24:36 +01:00
Mike Bland
50bba6852d
Update heartbeat_test #includes
...
ssl/ssl_locl.h now comes first to ensure that it will compile standalone.
test/testutil.h is considered to be in the same directory as the test file,
since the test file will be linked into test/ and built there.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-07-19 19:24:35 +01:00
Mike Bland
6017a55143
Use testutil registry in heartbeat_test
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-07-19 19:24:35 +01:00
Mike Bland
5e3de8e609
test/testutil.c test registry functions.
...
These help standardize the structure of main() and result reporting.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-07-19 19:24:35 +01:00
Dr. Stephen Henson
d31fed73e2
RFC 5649 support.
...
Add support for RFC5649 key wrapping with padding.
Add RFC5649 tests to evptests.txt
Based on PR#3434 contribution by Petr Spacek <pspacek@redhat.com >.
EVP support and minor changes added by Stephen Henson.
Doxygen comment block updates by Tim Hudson.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-07-18 21:37:13 +01:00
Dr. Stephen Henson
58f4698f67
Make *Final work for key wrap again.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-07-17 23:29:14 +01:00
Dr. Stephen Henson
d12eef1501
Sanity check lengths for AES wrap algorithm.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-07-17 12:57:40 +01:00
Jeffrey Walton
d48e78f0cf
Fix typo, add reference.
...
PR#3456
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-07-17 12:07:37 +01:00
Matt Caswell
2097a17c57
Disabled XTS mode in enc utility as it is not supported
...
PR#3442
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-07-16 20:59:35 +01:00
Andy Polyakov
e91718e80d
Revert "Add GHASH for PowerISA 2.07."
...
This reverts commit 927f2e5dea .
2014-07-16 13:38:15 +02:00
Andy Polyakov
6cd13f70bb
Revert "Engage GHASH for PowerISA 2.07."
...
This reverts commit 14aaf883d9 .
2014-07-16 13:37:37 +02:00
Andy Polyakov
14aaf883d9
Engage GHASH for PowerISA 2.07.
2014-07-16 08:03:34 +02:00
Andy Polyakov
927f2e5dea
Add GHASH for PowerISA 2.07.
2014-07-16 08:01:41 +02:00
Matt Caswell
3bd548192a
Add Matt Caswell's fingerprint, and general update on the fingerprints file to bring it up to date
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-07-15 23:13:37 +01:00
Dr. Stephen Henson
ca2015a617
Clarify -Verify and PSK.
...
PR#3452
2014-07-15 20:22:39 +01:00
Dr. Stephen Henson
c8d710dc5f
Fix DTLS certificate requesting code.
...
Use same logic when determining when to expect a client
certificate for both TLS and DTLS.
PR#3452
2014-07-15 18:23:13 +01:00
Dr. Stephen Henson
199772e534
Don't allow -www etc options with DTLS.
...
The options which emulate a web server don't make sense when doing DTLS.
Exit with an error if an attempt is made to use them.
PR#3453
2014-07-15 12:32:41 +01:00
Rich Salz
6c0a1e2f8c
Merge branch 'master' of git.openssl.org:openssl
2014-07-15 00:05:43 -04:00
Dr. Stephen Henson
1c3e9a7c67
Use case insensitive compare for servername.
...
PR#3445
2014-07-14 23:59:13 +01:00
Hubert Kario
7efd0e777e
document -nextprotoneg option in man pages
...
Add description of the option to advertise support of
Next Protocol Negotiation extension (-nextprotoneg) to
man pages of s_client and s_server.
PR#3444
2014-07-14 23:42:59 +01:00
Dr. Stephen Henson
ec5a992cde
Use more common name for GOST key exchange.
2014-07-14 18:31:55 +01:00
Dr. Stephen Henson
aa224e9719
Fix typo.
2014-07-14 18:31:55 +01:00
Rich Salz
9d6253cfd3
Add tags/TAGS; approved by tjh
2014-07-14 11:27:16 -04:00
Matt Caswell
f8571ce822
Fixed valgrind complaint due to BN_consttime_swap reading uninitialised data.
...
This is actually ok for this function, but initialised to zero anyway if
PURIFY defined.
This does have the impact of masking any *real* unitialised data reads in bn though.
Patch based on approach suggested by Rich Salz.
PR#3415
2014-07-13 22:17:39 +01:00
Peter Mosmans
924e5eda2c
Add names of GOST algorithms.
...
PR#3440
2014-07-13 18:30:07 +01:00
Richard Levitte
8b5dd34091
* crypto/ui/ui_lib.c: misplaced brace in switch statement.
...
Detected by dcruette@qualitesys.com
2014-07-13 19:11:46 +02:00
Ben Laurie
c1d1b0114e
Don't clean up uninitialised EVP_CIPHER_CTX on error (CID 483259).
2014-07-10 17:49:02 +01:00
Matt Caswell
66816c53be
Fix memory leak in BIO_free if there is no destroy function.
...
Based on an original patch by Neitrino Photonov <neitrinoph@gmail.com >
PR#3439
2014-07-09 23:29:17 +01:00
Andy Polyakov
1b0fe79f3e
x86_64 assembly pack: improve masm support.
2014-07-09 20:08:01 +02:00
Andy Polyakov
d11c70b2c2
Please Clang's sanitizer, addendum.
2014-07-08 23:06:59 +02:00
Andy Polyakov
021e5043e5
Please Clang's sanitizer.
...
PR: #3424,#3423,#3422
2014-07-08 22:24:44 +02:00
Andy Polyakov
c4f8efab34
apps/speed.c: fix compiler warnings in multiblock_speed().
2014-07-07 17:02:26 +02:00
Andy Polyakov
07b635cceb
sha[1|512]-x86_64.pl: fix logical errors with $shaext=0.
2014-07-07 17:01:07 +02:00
David Lloyd
9d23f422a3
Prevent infinite loop loading config files.
...
PR#2985
2014-07-07 13:19:57 +01:00
Viktor Dukhovni
b73ac02735
Improve X509_check_host() documentation.
...
Based on feedback from Jeffrey Walton.
2014-07-07 20:34:06 +10:00
Viktor Dukhovni
297c67fcd8
Update API to use (char *) for email addresses and hostnames
...
Reduces number of silly casts in OpenSSL code and likely most
applications. Consistent with (char *) for "peername" value from
X509_check_host() and X509_VERIFY_PARAM_get0_peername().
2014-07-07 19:11:38 +10:00
Dr. Stephen Henson
ee724df75d
Usage for -hack and -prexit -verify_return_error
2014-07-06 22:42:50 +01:00
Dr. Stephen Henson
cba3f1c739
Document certificate status request options.
2014-07-06 22:40:01 +01:00
Dr. Stephen Henson
a44f219c00
s_server usage for certificate status requests
2014-07-06 22:40:01 +01:00
Dr. Stephen Henson
5ecf1141a5
Sanity check keylength in PVK files.
...
PR#2277
2014-07-06 00:36:16 +01:00
Jeffrey Walton
75b7606881
Added reference to platform specific cryptographic acceleration such as AES-NI
2014-07-06 00:03:13 +01:00
Matt Caswell
fd9e244370
Fixed error in pod files with latest versions of pod2man
2014-07-06 00:03:13 +01:00
Andy Polyakov
7eb9680ae1
sha512-x86_64.pl: fix typo.
...
PR: #3431
2014-07-05 23:59:57 +02:00
Andy Polyakov
0e7a32b55e
s3_pkt.c: fix typo.
2014-07-05 23:56:54 +02:00
Andy Polyakov
375a64e349
apps/speed.c: add multi-block benchmark.
2014-07-05 23:53:55 +02:00
Alan Hryngle
fdea4fff8f
Return smaller of ret and f.
...
PR#3418.
2014-07-05 22:37:41 +01:00
Viktor Dukhovni
ced3d9158a
Set optional peername when X509_check_host() succeeds.
...
Pass address of X509_VERIFY_PARAM_ID peername to X509_check_host().
Document modified interface.
2014-07-06 01:50:50 +10:00
Viktor Dukhovni
6e661d458f
New peername element in X509_VERIFY_PARAM_ID
...
Declaration, memory management, accessor and documentation.
2014-07-06 01:50:50 +10:00
Ben Laurie
d2ab55eb5b
Reduce casting nastiness.
2014-07-05 15:00:53 +01:00
Ben Laurie
6835f572a9
Reduce casting nastiness.
2014-07-05 15:00:53 +01:00
Dr. Stephen Henson
7f6e957864
Don't limit message sizes in ssl3_get_cert_verify.
...
PR#319 (reoponed version).
2014-07-05 13:19:12 +01:00
Dr. Stephen Henson
55707a36cc
Add license info.
2014-07-04 18:41:45 +01:00
Dr. Stephen Henson
a9661e45ac
typo
...
(cherry picked from commit 2cfbec1cae )
2014-07-04 13:50:55 +01:00
Dr. Stephen Henson
b948ee27b0
Remove all RFC5878 code.
...
Remove RFC5878 code. It is no longer needed for CT and has numerous bugs
2014-07-04 13:26:35 +01:00
Dr. Stephen Henson
a23a6e85d8
Update ticket callback docs.
2014-07-03 14:50:08 +01:00
Rich Salz
f1112985e8
Close 3170, remove reference to Ariel Glenn's old 0.9.8 doc
2014-07-03 00:07:04 -04:00
Rich Salz
538860a3ce
RT 1638; EVP_*Final() should mention they no longer cleanup the ctx.
2014-07-02 23:38:34 -04:00
Rich Salz
a5a3178728
RT3408; fix some (not all suggested) typo's in openssl.cnf
2014-07-02 23:18:39 -04:00
Rich Salz
b5071dc2f6
Merge branch 'rsalz-docfixes'
2014-07-02 22:44:53 -04:00
Rich Salz
fc1d88f02f
Close a whole bunch of documentation-related tickets:
...
298 424 656 882 939 1630 1807 2263 2294 2311 2424 2623
2637 2686 2697 2921 2922 2940 3055 3112 3156 3177 3277
2014-07-02 22:42:40 -04:00
Andy Polyakov
aab3560b65
e_os.h: limit _MSC_VER trickery to older compilers.
...
PR: #3390
2014-07-02 22:30:54 +02:00
Andy Polyakov
eca441b2b4
bn_exp.c: fix x86_64-specific crash with one-word modulus.
...
PR: #3397
2014-07-02 19:35:50 +02:00
Matt Smart
5cc99c6cf5
Fix doc typo.
...
ERR_get_error(3) references the non-existent
ERR_get_last_error_line_data instead of the one that does exist,
ERR_peek_last_error_line_data.
PR#3283
2014-07-02 03:43:42 +01:00
Thijs Alkemade
7cb472bd0d
Make disabling last cipher work.
2014-07-02 03:32:19 +01:00
Dr. Stephen Henson
398e99fe5e
ASN1 sanity check.
...
Primitive encodings shouldn't use indefinite length constructed
form.
PR#2438 (partial).
2014-07-02 00:59:26 +01:00
Libor Krystek
a5ff18bf90
Add support for SHA2 in CAPI ENGINE.
...
PR#2706 though patch is from PR#3366.
2014-07-02 00:33:10 +01:00
Ben Laurie
22a10c89d7
Fix possible buffer overrun.
...
(cherry picked from commit 2db3ea2929 )
Conflicts:
ssl/t1_lib.c
2014-07-02 00:11:10 +01:00
Rich Salz
e67ddd19af
RT 1528; misleading debug print, "pre-master" should be "master key"
2014-07-01 13:22:38 -04:00
Andy Polyakov
c7ada16d39
perlasm/ppc-xlate.pl update.
2014-07-01 19:11:11 +02:00
Andy Polyakov
cd1922cde0
Engage SHA256/512 for PowerISA 2.07.
2014-07-01 19:09:11 +02:00
Andy Polyakov
eaa4820471
Add SHA256/512 for PowerISA 2.07.
2014-07-01 19:09:11 +02:00
Rich Salz
04f545a0d5
RT 1530; fix incorrect comment
2014-07-01 13:06:18 -04:00
Rich Salz
df8ef5f31a
RT 1229; typo in comment "dont't"->"don't"
2014-07-01 13:02:57 -04:00
Rich Salz
762a44de59
RT 3245; it's "bitwise or" not "logical or"
2014-07-01 13:00:18 -04:00
Rich Salz
854dfcd859
Fix RT 3211; "and are" -->"are"
2014-07-01 12:55:32 -04:00
Rich Salz
7b1d946051
Fix RT 2567; typo in pkeyutl page.
2014-07-01 12:49:20 -04:00
Rich Salz
42b91f28a6
Fix RT 2430; typo's in ca.pod
2014-07-01 12:47:52 -04:00
Rich Salz
d7003c4d7d
Fix RT 3193
2014-07-01 12:44:32 -04:00
Andy Polyakov
29be3f6411
sha512-x86_64.pl: fix linking problem under Windows.
2014-07-01 17:11:22 +02:00
Dr. Stephen Henson
70857a4a00
Windows build fixes.
2014-07-01 14:11:28 +01:00
Dr. Stephen Henson
2580ab4ed7
Fix warning.
...
(cherry picked from commit c97ec5631b )
2014-07-01 13:37:04 +01:00
Dr. Stephen Henson
9cd86abb51
Make NO_SYS_UN_H compile.
2014-07-01 12:44:00 +01:00
Dr. Stephen Henson
387b844ffd
Accessor functions for app_data in ECDSA_METHOD
2014-07-01 12:01:51 +01:00
Dr. Stephen Henson
0d263d2acf
Test copying of contexts in evp_test.
...
Test EVP_CIPHER_CTX_copy in evp_test. This will catch any
problems with copying in underlying ciphers.
2014-07-01 12:01:51 +01:00
Ben Laurie
e3ba6a5f83
Make depend.
2014-06-30 16:03:29 +01:00
Dr. Stephen Henson
c2fd5d79ff
Fix copy for CCM, GCM and XTS.
...
Internal pointers in CCM, GCM and XTS contexts should either be
NULL or set to point to the appropriate key schedule. This needs
to be adjusted when copying contexts.
2014-06-30 12:57:29 +01:00
Dr. Stephen Henson
90c1946e7a
Don't core dump when using CMAC with dgst.
...
We can't unfortunately print the CMAC cipher used without extending the API.
PR#2579
2014-06-29 23:44:44 +01:00
Jeffrey Walton
6e6ba36d98
Clarified that the signature's buffer size, s, is not used as an
...
IN parameter.
Under the old docs, the only thing stated was "at most
EVP_PKEY_size(pkey) bytes will be written". It was kind of misleading
since it appears EVP_PKEY_size(pkey) WILL be written regardless of the
signature's buffer size.
2014-06-29 23:34:21 +01:00
Ben Laurie
161e0a617d
More constification.
2014-06-29 22:13:45 +01:00
ZNV
370bf1d708
Make EVP_CIPHER_CTX_copy work in GCM mode.
...
PR#3272
2014-06-29 22:01:28 +01:00
Oscar Jacobsson
7e6a01bdd4
Add 3072, 7680 and 15360 bit RSA tests to openssl speed
...
PR#3412
2014-06-29 21:38:09 +01:00
Ben Laurie
8892ce7714
Constification - mostly originally from Chromium.
2014-06-29 21:05:23 +01:00
Rich Salz
340daf6a06
Merge branch 'master' of git.openssl.org:openssl
2014-06-29 11:40:39 -04:00
Rich Salz
327f3c040e
Fix typo in message (RT 3107)
2014-06-29 11:40:05 -04:00
Dr. Stephen Henson
44724beead
Fix memory leak.
...
PR#2531
2014-06-29 13:51:30 +01:00
Ken Ballou
76ed5a42ea
Typo.
...
PR#3173
2014-06-29 13:38:55 +01:00
Dr. Stephen Henson
a30bdb55d1
Show errors on CSR verification failure.
...
If CSR verify fails in ca utility print out error messages.
Otherwise some errors give misleading output: for example
if the key size exceeds the library limit.
PR#2875
2014-06-29 13:33:44 +01:00
Dr. Stephen Henson
7ae6a4b659
Make no-ssl3 no-ssl2 do more sensible things.
2014-06-29 03:04:45 +01:00
Dr. Stephen Henson
528b1f9a9f
Clarify protocols supported.
...
Update protocols supported and note that SSLv2 is effectively disabled
by default.
PR#3184
2014-06-29 00:07:08 +01:00
Dr. Stephen Henson
0e7bda79a1
Handle BER length encoding.
...
Tolerate BER length encoding which may include leading zeroes.
PR#2746
2014-06-29 00:07:08 +01:00
Andy Polyakov
a356e488ad
x86_64 assembly pack: refine clang detection.
2014-06-28 17:23:21 +02:00
Dr. Stephen Henson
7c206db928
Typo.
...
PR#3107
2014-06-28 12:42:04 +01:00
Dr. Stephen Henson
0518a3e19e
Don't disable state strings with no-ssl2
...
Some state strings were erronously not compiled when no-ssl2
was set.
PR#3295
2014-06-28 00:54:32 +01:00
yogesh nagarkar
d183545d45
Fix compilation with -DSSL_DEBUG -DTLS_DEBUG -DKSSL_DEBUG
...
PR#3141
2014-06-28 00:40:26 +01:00
Andreas Westfeld
d1d4382dcb
Fix typo in ideatest.c
2014-06-28 00:06:13 +01:00
Ken Ballou
0b33bed969
Remove redundant check.
...
PR#3174
2014-06-27 23:19:39 +01:00
Dr. Stephen Henson
59deb33cbe
Fix for EVP_PBE_alg_add().
...
In EVP_PBE_alg_add don't use the underlying NID for the cipher
as it may have a non-standard key size.
PR#3206
2014-06-27 23:19:39 +01:00
Andy Polyakov
406d4af050
bn/asm/rsaz-avx2.pl: fix occasional failures.
2014-06-27 22:41:58 +02:00
Rich Salz
a0490e02c7
RT 487. Mention that generated primes are "at least" B<bits> long.
2014-06-27 15:59:08 -04:00
Dr. Stephen Henson
11da66f8b1
Tolerate critical AKID in CRLs.
...
PR#3014
2014-06-27 18:49:32 +01:00
PK
e633248921
Add SHA256 Camellia ciphersuites from RFC5932
...
PR#2800
2014-06-27 18:24:05 +01:00
Tom Greenslade
b36f35cda9
Handle IPv6 addresses in OCSP_parse_url.
...
PR#2783
2014-06-27 17:30:59 +01:00
Tomas Mraz
0436369fcc
Don't advertise ECC ciphersuits in SSLv2 compatible client hello.
...
PR#3374
2014-06-27 16:51:26 +01:00
Jeffrey Walton
0535c2d67c
Clarify docs.
...
Document that the certificate passed to SSL_CTX_add_extra_chain_cert()
should not be freed by the application.
PR#3409
2014-06-27 16:39:11 +01:00
Dr. Stephen Henson
abac8e0e08
Rebuild OID table.
2014-06-27 14:35:07 +01:00
Dr. Stephen Henson
95791bf941
Fix OID encoding for one component.
...
OIDs with one component don't have an encoding.
PR#2556 (Bug#1)
2014-06-27 14:35:07 +01:00
Dr. Stephen Henson
d2aea03829
Memory leak and NULL dereference fixes.
...
PR#3403
2014-06-27 14:35:07 +01:00
Huzaifa Sidhpurwala
3b3b69ab25
Make sure BN_sqr can never return a negative value.
...
PR#3410
2014-06-26 23:56:34 +01:00
Dr. Stephen Henson
7be6b27aaf
Remove ancient obsolete files under pkcs7.
2014-06-26 23:56:34 +01:00
Andy Polyakov
f3f620e1e0
bn_exp.c: move check for AD*X to rsaz-avx2.pl.
...
This ensures high performance is situations when assembler supports
AVX2, but not AD*X.
2014-06-27 00:07:15 +02:00
Andy Polyakov
052ecf91d2
aesp8-ppc.pl: rigid input verification in key setup.
2014-06-25 22:13:17 +02:00
Andy Polyakov
7b8c8c4d79
aesv8-armx.pl: rigid input verification in key setup.
2014-06-25 22:10:45 +02:00
Andy Polyakov
7eb0488280
x86_64 assembly pack: addendum to last clang commit.
2014-06-24 08:37:05 +02:00
Andy Polyakov
ac171925ab
x86_64 assembly pack: allow clang to compile AVX code.
2014-06-24 08:24:25 +02:00
Andy Polyakov
015364baf3
aesv8-armx.pl: inclrease interleave factor.
...
This is to compensate for higher aes* instruction latency on Cortex-A57.
2014-06-24 08:08:58 +02:00
Andy Polyakov
0f777aeb50
ARMv8 assembly pack: add Cortex performance numbers.
2014-06-24 08:06:05 +02:00
Viktor Dukhovni
eef1827f89
One more typo when changing !result to result <= 0
2014-06-23 16:26:34 +01:00
Viktor Dukhovni
90b70a6a6b
Fix typo in last commit
2014-06-22 20:39:52 -04:00
Viktor Dukhovni
8abffa4a73
Multiple verifier reference identities.
...
Implemented as STACK_OF(OPENSSL_STRING).
2014-06-22 20:32:35 -04:00
Viktor Dukhovni
66d884f067
Implement sk_deep_copy.
2014-06-22 20:24:18 -04:00
Viktor Dukhovni
29edebe95c
More complete input validation of X509_check_mumble
2014-06-22 20:18:53 -04:00
Viktor Dukhovni
a48fb0400c
X509_check_mumble() failure is <= 0, not just 0
2014-06-22 20:14:53 -04:00
Viktor Dukhovni
b3012c698a
Drop hostlen from X509_VERIFY_PARAM_ID.
...
Just store NUL-terminated strings. This works better when we add
support for multiple hostnames.
2014-06-22 19:52:44 -04:00
Viktor Dukhovni
d241b80409
More complete X509_check_host documentation.
2014-06-22 19:50:02 -04:00
Miod Vallat
2841d6ca9f
Fix off-by-one errors in ssl_cipher_get_evp()
...
In the ssl_cipher_get_evp() function, fix off-by-one errors in index validation before accessing arrays.
Bug discovered and fixed by Miod Vallat from the OpenBSD team.
PR#3375
2014-06-22 23:14:19 +01:00
Matt Caswell
cf1b08cdd7
Revert "Fix off-by-one errors in ssl_cipher_get_evp()"
...
This reverts commit abfb989fe0 .
Incorrect attribution
2014-06-22 22:35:56 +01:00
Matt Caswell
339da43d6c
Fixed Windows compilation failure
2014-06-22 20:16:47 +02:00
Matt Caswell
115e480924
Fix minor typos
2014-06-19 23:45:21 +01:00
Hubert Kario
e42d84be33
add references to verify(1) man page for args_verify() options
...
cms, ocsp, s_client, s_server and smime tools also use args_verify()
for parsing options, that makes them most of the same options
verify tool does. Add those options to man pages and reference
their explanation in the verify man page.
2014-06-19 23:09:21 +01:00
Hubert Kario
2866441a90
sort the options in verify man page alphabetically
...
just making sure the options are listed in the alphabetical order
both in SYNOPSIS and DESCRIPTION, no text changes
2014-06-19 23:09:21 +01:00
Hubert Kario
cd028c8e66
add description of missing options to verify man page
...
The options related to policy used for verification, verification
of subject names in certificate and certificate chain handling
were missing in the verify(1) man page. This fixes this issue.
2014-06-19 23:09:21 +01:00
Hubert Kario
ce21d108bd
smime man page: add missing options in SYNOPSIS
...
-CAfile and -CApath is documented in OPTIONS but is missing
in SYNOPSIS, add them there
2014-06-19 23:09:21 +01:00
Hubert Kario
6d3d579367
Document -trusted_first option in man pages and help.
...
Add -trusted_first description to help messages and man pages
of tools that deal with certificate verification.
2014-06-19 23:09:21 +01:00
Matt Caswell
2d7153e8f9
Tidied up, added include to stdlib, removed "goto bad" usage
2014-06-17 23:35:53 +01:00
rfkrocktk
8a531c22b0
Conform to whitespace conventions
2014-06-17 23:10:14 +01:00
rfkrocktk
96fc4b7250
Added documentation for -iter for PKCS#8
2014-06-17 23:10:14 +01:00
Naftuli Tzvi Kay
8a6c6bbf21
Added custom PBKDF2 iteration count to PKCS8 tool.
2014-06-17 23:10:14 +01:00
Felix Laurie von Massenbach
50cc4f7b3d
Fix signed/unsigned comparisons.
2014-06-17 17:41:46 +01:00
Felix Laurie von Massenbach
1f61d8b5b1
Fix shadow declaration.
2014-06-17 17:41:46 +01:00
Andy Polyakov
9024b84b7c
aesni-sha[1|256]-x86_64.pl: fix logical error and MacOS X build.
2014-06-16 10:11:45 +02:00
Andy Polyakov
764fe518da
aesp8-ppc.pl: add CTR mode.
2014-06-16 08:05:19 +02:00
Viktor Dukhovni
7241a4c7fd
Enforce _X509_CHECK_FLAG_DOT_SUBDOMAINS internal-only
2014-06-14 22:31:29 +01:00
Dr. Stephen Henson
3b77f01702
Accept CCS after sending finished.
...
Allow CCS after finished has been sent by client: at this point
keys have been correctly set up so it is OK to accept CCS from
server. Without this renegotiation can sometimes fail.
PR#3400
2014-06-14 22:31:28 +01:00
Andy Polyakov
ce00c64df9
evp/e_aes_cbc_sha[1|256].c: fix -DPEDANTIC build.
2014-06-14 23:15:39 +02:00
Andy Polyakov
91a6bf80f8
aesni-sha256-x86_64.pl: add missing rex in shaext.
...
PR: 3405
2014-06-14 16:03:06 +02:00
Andy Polyakov
c9cf29cca2
sha1-x86_64.pl: add missing rex prefix in shaext.
...
PR: 3405
2014-06-14 15:27:54 +02:00
Matt Caswell
687721a7dc
Fixed incorrect return code handling in ssl3_final_finish_mac.
...
Based on an original patch by Joel Sing (OpenBSD) who also originally identified the issue.
2014-06-13 15:36:20 +01:00
Matt Caswell
043fd64689
Revert "Fixed incorrect return code handling in ssl3_final_finish_mac"
...
This reverts commit 2f1dffa88e .
Missing attribution.
2014-06-13 15:35:20 +01:00
Viktor Dukhovni
a09e4d24ad
Client-side namecheck wildcards.
...
A client reference identity of ".example.com" matches a server
certificate presented identity that is any sub-domain of "example.com"
(e.g. "www.sub.example.com).
With the X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS flag, it matches
only direct child sub-domains (e.g. "www.sub.example.com").
2014-06-12 23:19:25 +01:00
Kurt Cancemi
abfb989fe0
Fix off-by-one errors in ssl_cipher_get_evp()
...
In the ssl_cipher_get_evp() function, fix off-by-one errors in index validation before accessing arrays.
PR#3375
2014-06-12 21:11:00 +01:00
Andy Polyakov
977f32e852
Facilitate back-porting of AESNI and SHA modules.
...
Fix SEH and stack handling in Win64 build.
2014-06-12 21:45:41 +02:00
Matt Caswell
d84ba7ea23
Added OPENSSL_assert check as per PR#3377 reported by Rainer Jung <rainer.jung@kippdata.de>
2014-06-12 20:40:54 +01:00
Dr. Stephen Henson
a50f71868e
Fix Windows build.
...
(cherry picked from commit 5f4c5a902b0508eab235adecb34b236cdc0048a5)
2014-06-12 10:58:12 +01:00
Andy Polyakov
77a27a5066
Enable multi-block support by default.
2014-06-11 20:40:51 +02:00
Dr. Stephen Henson
9494e99b40
Fix compilation with no-comp
2014-06-11 14:41:00 +01:00
Andy Polyakov
1cf8f57b43
ghash-x86_64.pl: optimize for upcoming Atom.
2014-06-11 11:34:18 +02:00
Andy Polyakov
619b94667c
Add support for Intel SHA extension.
2014-06-11 10:27:45 +02:00
Rob Stradling
fd2309aa29
Separate the SCT List parser from the SCT List viewer
2014-06-10 23:44:13 +01:00
Matt Caswell
2f1dffa88e
Fixed incorrect return code handling in ssl3_final_finish_mac
2014-06-10 23:31:50 +01:00
Andy Polyakov
e2eabed110
aesni-mb-x86_64.pl: add Win64 SEH.
2014-06-10 23:08:06 +02:00
Hubert Kario
343e5cf194
add ECC strings to ciphers(1), point out difference between DH and ECDH
...
* Make a clear distinction between DH and ECDH key exchange.
* Group all key exchange cipher suite identifiers, first DH then ECDH
* add descriptions for all supported *DH* identifiers
* add ECDSA authentication descriptions
* add example showing how to disable all suites that offer no
authentication or encryption
2014-06-10 20:53:07 +01:00
Mike Bland
3ead9f3798
Create test/testutil.h for unit test helper macros
...
Defines SETUP_TEST_FIXTURE and EXECUTE_TEST, and updates ssl/heartbeat_test.c
using these macros. SETUP_TEST_FIXTURE makes use of the new TEST_CASE_NAME
macro, defined to use __func__ or __FUNCTION__ on platforms that support those
symbols, or to use the file name and line number otherwise. This should fix
several reported build problems related to lack of C99 support.
2014-06-10 19:20:25 +01:00
Dr. Stephen Henson
7a9d59c148
Fix null pointer errors.
...
PR#3394
2014-06-10 14:47:29 +01:00
Dr. Stephen Henson
447280ca7b
SRP ciphersuite correction.
...
SRP ciphersuites do not have no authentication. They have authentication
based on SRP. Add new SRP authentication flag and cipher string.
2014-06-09 12:09:52 +01:00
Dr. Stephen Henson
1bea384fd5
Update strength_bits for 3DES.
...
Fix strength_bits to 112 for 3DES.
2014-06-09 12:09:52 +01:00
Kurt Roeckx
95fe635d90
Link heartbeat_test with the static version of the libraries
...
It's using an internal API that that might not be available in the shared
library.
2014-06-09 00:10:24 +01:00
Jakub Wilk
7be1d8764d
Create ~/.rnd with mode 0600 instead of 0666
...
Because of a missing include <fcntl.h> we don't have O_CREATE and don't create
the file with open() using mode 0600 but fall back to using fopen() with the
default umask followed by a chmod().
Problem found by Jakub Wilk <jwilk@debian.org >.
2014-06-08 21:15:48 +01:00
Dr. Stephen Henson
fb8d9ddb9d
Make tls_session_secret_cb work with CVE-2014-0224 fix.
...
If application uses tls_session_secret_cb for session resumption
set the CCS_OK flag.
2014-06-07 15:27:23 +01:00
Dr. Stephen Henson
c43a55407d
Add official extension value.
...
Encrypt then MAC now has an official extension value, see:
http://www.ietf.org/id/draft-ietf-tls-encrypt-then-mac-02.txt
2014-06-07 15:27:23 +01:00
Matt Caswell
fa6bb85ae0
Fixed minor duplication in docs
2014-06-07 12:30:18 +01:00
Andy Polyakov
5dcf70a1c5
ARM assembly pack: get ARMv7 instruction endianness right.
...
Pointer out and suggested by: Ard Biesheuvel.
2014-06-06 21:27:18 +02:00
Andy Polyakov
cd91fd7c32
sha[1|512]-armv8.pl: get instruction endianness right.
...
Submitted by: Ard Biesheuvel.
2014-06-06 20:50:43 +02:00
Andy Polyakov
82741e9c89
Engage GHASH for ARMv8.
2014-06-06 20:48:35 +02:00
Andy Polyakov
2d5a799d27
Add GHASH for ARMv8 Crypto Extension.
...
Result of joint effort with Ard Biesheuvel.
2014-06-06 20:43:02 +02:00
Dr. Stephen Henson
7178c711dd
Update NEWS.
2014-06-06 14:34:23 +01:00
Andy Polyakov
65cad34b10
aesv8-armx.pl update:
...
- fix 32-bit build (submitted by Ard Biesheuvel);
- fix performance issue in CTR;
2014-06-06 12:18:51 +02:00
Dr. Stephen Henson
5111672b8e
Update value to use a free bit.
2014-06-05 13:27:11 +01:00
Dr. Stephen Henson
410e444b71
Fix for CVE-2014-0195
...
A buffer overrun attack can be triggered by sending invalid DTLS fragments
to an OpenSSL DTLS client or server. This is potentially exploitable to
run arbitrary code on a vulnerable client or server.
Fixed by adding consistency check for DTLS fragments.
Thanks to Jüri Aedla for reporting this issue.
(cherry picked from commit 1632ef7448 )
2014-06-05 13:23:05 +01:00
Dr. Stephen Henson
a91be10833
Fix for CVE-2014-0224
...
Only accept change cipher spec when it is expected instead of at any
time. This prevents premature setting of session keys before the master
secret is determined which an attacker could use as a MITM attack.
Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for reporting this issue
and providing the initial fix this patch is based on.
(cherry picked from commit bc8923b1ec )
2014-06-05 13:22:42 +01:00
Dr. Stephen Henson
a7c682fb6f
Additional CVE-2014-0224 protection.
...
Return a fatal error if an attempt is made to use a zero length
master secret.
(cherry picked from commit 006cd7083f )
2014-06-05 13:22:24 +01:00
Dr. Stephen Henson
b4322e1de8
Fix CVE-2014-0221
...
Unnecessary recursion when receiving a DTLS hello request can be used to
crash a DTLS client. Fixed by handling DTLS hello request without recursion.
Thanks to Imre Rad (Search-Lab Ltd.) for discovering this issue.
(cherry picked from commit d3152655d5 )
2014-06-05 13:22:03 +01:00
Dr. Stephen Henson
a5362db460
Fix CVE-2014-3470
...
Check session_cert is not NULL before dereferencing it.
(cherry picked from commit 8011cd56e3 )
2014-06-05 13:21:50 +01:00
Andy Polyakov
d86689e1d9
aesp8-ppc.pl: fix typos.
2014-06-04 08:34:18 +02:00
Andy Polyakov
53a224bb0a
evp/e_aes.c: add erroneously omitted break;
2014-06-04 08:33:06 +02:00
Libor Krystek
8e3231642b
Corrected OPENSSL_NO_EC_NISTP_64_GCC_128 usage in ec_lcl.h. PR#3370
2014-06-03 23:15:58 +01:00
David Benjamin
c7f267397e
Check there is enough room for extension.
2014-06-02 23:55:56 +01:00
zhu qun-ying
470990fee0
Free up s->d1->buffered_app_data.q properly.
...
PR#3286
2014-06-02 23:55:55 +01:00
Andy Polyakov
030a3f9527
evp/e_aes.c: populate HWAES_* to remaning modes.
...
Submitted by: Ard Biesheuvel.
2014-06-02 21:48:02 +02:00
Dr. Stephen Henson
14f47acf23
Allow reordering of certificates when signing.
...
Add certificates if -nocerts and -certfile specified when signing
in smime application. This can be used this to specify the
order certificates appear in the PKCS#7 structure: some broken
applications require a certain ordering.
PR#3316
2014-06-02 14:22:07 +01:00
Sami Farin
13b7896022
Typo: set i to -1 before goto.
...
PR#3302
2014-06-02 14:22:07 +01:00
Andy Polyakov
de51e830a6
Engage POWER8 AES support.
2014-06-01 23:38:11 +02:00
Matt Caswell
a5510df337
Added SSLErr call for internal error in dtls1_buffer_record
2014-06-01 21:36:25 +01:00
David Ramos
d1e1aeef8f
Delays the queue insertion until after the ssl3_setup_buffers() call due to use-after-free bug. PR#3362
2014-06-01 21:36:25 +01:00
Andy Polyakov
723463282f
armv4cpuid.S: switch to CNTVCT tick counter.
2014-06-01 22:34:02 +02:00
Andy Polyakov
797d24bee9
sha[1|256]-armv4: harmonize with arm_arch.h.
2014-06-01 22:29:50 +02:00
Andy Polyakov
ddacb8f27b
Engage ARMv8 AES support.
2014-06-01 22:20:37 +02:00
Dr. Stephen Henson
a09220d823
Recognise padding extension.
2014-06-01 18:15:21 +01:00
Dr. Stephen Henson
01f2f18f3c
Option to disable padding extension.
...
Add TLS padding extension to SSL_OP_ALL so it is used with other
"bugs" options and can be turned off.
This replaces SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG which is an ancient
option referring to SSLv2 and SSLREF.
PR#3336
2014-06-01 18:15:21 +01:00
Andy Polyakov
f8aab6174c
linux-aarch64: engage SHA modules.
2014-06-01 18:03:51 +02:00
Andy Polyakov
ddb6b965da
Add SHA for ARMv8.
2014-06-01 18:02:11 +02:00
Andy Polyakov
e8d93e342b
Add linux-aarch64 taget.
...
armcap.c is shared between 32- and 64-bit builds and features link-time
detection of getauxval.
Submitted by: Ard Biesheuvel.
2014-06-01 17:21:06 +02:00
Ben Laurie
992bba11d5
Merge branch 'erbridge-probable_primes'
2014-06-01 15:37:08 +01:00
Ben Laurie
5fc3a5fe49
Credit to Felix.
...
Closes #116 .
2014-06-01 15:31:27 +01:00
Ben Laurie
c93233dbfd
Tidy up, don't exceed the number of requested bits.
2014-06-01 15:31:27 +01:00
Ben Laurie
46838817c7
Constify and reduce coprime random bits to allow for multiplier.
2014-06-01 15:31:27 +01:00
Ben Laurie
0382950c6c
Zero prime doits.
2014-06-01 15:31:27 +01:00
Ben Laurie
5efa13ca7e
Add option to run all prime tests.
2014-06-01 15:31:27 +01:00
Felix Laurie von Massenbach
8927c2786d
Add a test to check we're really generating probable primes.
2014-06-01 15:31:27 +01:00
Felix Laurie von Massenbach
9a3a99748b
Remove unused BIGNUMs.
2014-06-01 15:31:27 +01:00
Felix Laurie von Massenbach
a77889f560
Only count successful generations.
2014-06-01 15:31:26 +01:00
Felix Laurie von Massenbach
c74e148776
Refactor the first prime index.
2014-06-01 15:31:26 +01:00
Felix Laurie von Massenbach
982c42cb20
Try skipping over the adding and just picking a new random number.
...
Generates a number coprime to 2, 3, 5, 7, 11.
Speed:
Trial div (add) : trial div (retry) : coprime
1 : 0.42 : 0.84
2014-06-01 15:31:26 +01:00
Felix Laurie von Massenbach
7e965dcc38
Remove editor barf on updating copyright.
2014-06-01 15:31:26 +01:00
Felix Laurie von Massenbach
8a12085293
Add python script to generate the bits needed for the prime generator.
2014-06-01 15:31:26 +01:00
Felix Laurie von Massenbach
c09ec5d2a0
Generate safe primes not divisible by 3, 5 or 7.
...
~2% speed improvement on trial division.
2014-06-01 15:31:26 +01:00
Felix Laurie von Massenbach
b0513819e0
Add a method to generate a prime that is guaranteed not to be divisible by 3 or 5.
...
Possibly some reduction in bias, but no speed gains.
2014-06-01 15:31:26 +01:00
Felix Laurie von Massenbach
b359642ffd
Run the prime speed tests for 10 seconds.
2014-06-01 15:31:26 +01:00
Felix Laurie von Massenbach
8c9336ce2b
Tidy up speed.c a little.
2014-06-01 15:31:26 +01:00
Felix Laurie von Massenbach
b5419b81ac
Add speed test for prime trial division.
2014-06-01 15:31:26 +01:00
Felix Laurie von Massenbach
e46a059ebf
Remove static from probable_prime_dh.
2014-06-01 15:31:26 +01:00
Felix Laurie von Massenbach
e55fca760b
Remove indentation from the goto targets.
2014-06-01 15:31:26 +01:00
Felix Laurie von Massenbach
fce0ba5fcd
Strip trailing whitespace from Configure.
2014-06-01 15:31:26 +01:00
Felix Laurie von Massenbach
d7f200779c
Add a new target to Configure for me.
2014-06-01 15:31:26 +01:00
Dr. Stephen Henson
3009244da4
Set default global mask to UTF8 only.
2014-06-01 15:03:00 +01:00
David Ramos
92d81ba622
Allocate extra space when NETSCAPE_HANG_BUG defined.
...
Make sure there is an extra 4 bytes for server done message when
NETSCAPE_HANG_BUG is defined.
PR#3361
2014-06-01 14:27:22 +01:00
David Ramos
7e2c6f7eb0
Initialise alg.
...
PR#3313
2014-06-01 13:04:10 +01:00
Dr. Stephen Henson
4fdf91742e
Use correct digest when exporting keying material.
...
PR#3319
2014-05-31 13:43:02 +01:00
Dr. Stephen Henson
7ce79a5bfd
Don't compile heartbeat test code on Windows (for now).
2014-05-31 13:43:02 +01:00
Hubert Kario
9ed03faac4
add description of -attime to man page
...
the verify app man page didn't describe the usage of attime option
even though it was listed as a valid option in the -help message.
This patch fixes this omission.
2014-05-30 23:26:35 +01:00
Hubert Kario
08bef7be1e
add description of -no_ecdhe option to s_server man page
...
While the -help message references this option, the man page
doesn't mention the -no_ecdhe option.
This patch fixes this omission.
2014-05-30 22:59:43 +01:00
Andy Polyakov
e09ea622bb
aesv8-armx.pl: add CTR implementation.
...
Submitted by: Ard Biesheuvel.
2014-05-29 22:45:35 +02:00
Dr. Stephen Henson
46d889f33e
Set version number correctly.
...
PR#3249
2014-05-29 14:33:32 +01:00
František Bořánek
4da0ddc47e
Fix memory leak.
...
PR#3278
2014-05-29 14:33:32 +01:00
Martin Kaiser
1c4575ebc3
remove duplicate 0x for default RSASSA-PSS salt len
2014-05-29 14:33:32 +01:00
Andy Polyakov
7cbdb975c2
aesp8-ppc.pl: optimize CBC decrypt even further.
...
10-19% improvement depending on key length and endianness.
2014-05-29 15:10:12 +02:00
Peter Mosmans
028bac0670
Fix for test_bn regular expression to work on Windows using MSYS. PR#3346
2014-05-27 23:29:32 +01:00
Matt Caswell
3d9243f1b6
Changed -strictpem to use PEM_read_bio
2014-05-26 23:31:37 +01:00
Matt Caswell
6b5c1d940b
Added -strictpem parameter to enable processing of PEM files with data prior to the BEGIN marker
2014-05-26 17:24:11 +01:00
Juli Mallett
487dac87e3
Fix cast of boolean where cast of LHS intended.
...
Closes #74 .
2014-05-26 13:16:12 +01:00
Matt Caswell
15658d0cbf
Fixed error in args for SSL_set_msg_callback and SSL_set_msg_callback_arg
2014-05-25 23:45:12 +01:00
Ben Laurie
ba4477d649
Make it build.
...
Closes #31 .
2014-05-25 17:35:04 +01:00
Christian Heimes
56431240ae
add test case to makefiles
2014-05-25 17:35:04 +01:00
Christian Heimes
4d4a535dcf
Implement tests for PKCS#5 PBKDF2 HMAC
2014-05-25 17:35:04 +01:00
Dr. Stephen Henson
0930251df8
Don't use expired certificates if possible.
...
When looking for the issuer of a certificate, if current candidate is
expired, continue looking. Only return an expired certificate if no valid
certificates are found.
PR#3359
2014-05-25 04:50:15 +01:00
Dr. Stephen Henson
6c21b860ba
Rename vpm_int.h to x509_lcl.h
2014-05-25 04:50:14 +01:00
Matt Caswell
955376fde3
Fix for non compilation with TLS_DEBUG defined
2014-05-24 23:55:27 +01:00
Ben Laurie
894172f207
Only copy opensslconf.h at init time.
2014-05-24 15:42:18 +01:00
Martin Kaiser
c5f0b9bd86
Modify the description of -noout to match the manpage. PR#3364
2014-05-24 00:04:25 +01:00
Martin Kaiser
189ae368d9
Add an NSS output format to sess_id to export to export the session id and the master key in NSS keylog format. PR#3352
2014-05-24 00:02:24 +01:00
Luiz Angelo Daros de Luca
dd36fce023
OpenSSL is able to generate a certificate with name constraints with any possible
...
subjectAltName field. The Name Contraint example in x509v3_config(5) even use IP
as an example:
nameConstraints=permitted;IP:192.168.0.0/255.255.0.0
However, until now, the verify code for IP name contraints did not exist. Any
check with a IP Address Name Constraint results in a "unsupported name constraint
type" error.
This patch implements support for IP Address Name Constraint (v4 and v6). This code
validaded correcly certificates with multiple IPv4/IPv6 address checking against
a CA certificate with these constraints:
permitted;IP.1=10.9.0.0/255.255.0.0
permitted;IP.2=10.48.0.0/255.255.0.0
permitted;IP.3=10.148.0.0/255.255.0.0
permitted;IP.4=fdc8:123f:e31f::/ffff:ffff:ffff::
Signed-off-by: Luiz Angelo Daros de Luca <luizluca@gmail.com >
2014-05-23 23:05:38 +01:00
Andy Polyakov
fda29b6db0
aesp8-ppc.pl: add optimized CBC decrypt.
2014-05-23 20:15:06 +02:00
Andy Polyakov
b83d09f552
vpaes-ppc.pl: comply with ABI.
2014-05-23 20:14:38 +02:00
Ben Laurie
27da939490
Merge branch 'heartbeat-test' of git://github.com/mbland/openssl
2014-05-22 22:00:17 +01:00
Mike Bland
647c70f765
Fix heartbeat_test for -DOPENSSL_NO_HEARTBEATS
...
Replaces the entire test with a trivial implementation when
OPENSSL_NO_HEARTBEATS is defined.
2014-05-22 15:23:10 -04:00
Ben Laurie
eb33348879
Check length first in BUF_strnlen().
2014-05-22 10:13:22 +01:00
Matt Caswell
085ccc542a
Fixed minor copy&paste error, and stray space causing rendering problem
2014-05-22 00:07:35 +01:00
Matt Caswell
df24f29ae6
Fixed unterminated B tag, causing build to fail with newer pod2man versions
2014-05-22 00:00:23 +01:00
Ben Laurie
12f1b3e79f
Remove redundant test.
2014-05-21 12:03:02 +01:00
Ben Laurie
dea4a18404
Implement BUF_strnlen() and use it instead of strlen().
2014-05-21 11:58:03 +01:00
Viktor Dukhovni
397a8e747d
Fixes to host checking.
...
Fixes to host checking wild card support and add support for
setting host checking flags when verifying a certificate
chain.
2014-05-21 11:31:28 +01:00
Dr. Stephen Henson
558c94efc0
Fix for PKCS12_create if no-rc2 specified.
...
Use triple DES for certificate encryption if no-rc2 is
specified.
PR#3357
2014-05-21 11:28:58 +01:00
Dr. Stephen Henson
6f719f063c
Change default cipher in smime app to des3.
...
PR#3357
2014-05-21 11:28:57 +01:00
Andy Polyakov
3e68273326
aesv8-armx.pl: fix typo.
2014-05-20 23:32:12 +02:00
Andy Polyakov
a0a17fcb75
aesv8-armx.pl: optimize by adding 128-bit code paths.
2014-05-20 22:50:28 +02:00
Ben Laurie
d8ac1ea77e
Don't allocate more than is needed in BUF_strndup().
2014-05-20 13:52:31 +01:00
Dr. Stephen Henson
dcca7b13e9
For portability use BUF_strndup instead of strndup.
2014-05-20 11:18:30 +01:00
Dr. Stephen Henson
6db14dbc51
Adding padding extension to trace code.
2014-05-20 11:09:04 +01:00
Dr. Stephen Henson
deffd89af3
Fix bug in signature algorithm copy.
2014-05-20 11:09:04 +01:00
Janpopan
ff626ba5f4
Fix a wrong parameter count ERR_add_error_data
2014-05-19 22:10:14 +01:00
Ben Laurie
814972e1ab
Merge branch 'mbland-heartbeat-test'
2014-05-19 17:40:52 +01:00
Ben Laurie
2ec52dc3a1
Fixup for ancient compilers.
2014-05-19 17:39:41 +01:00
Mike Bland
39dd6f4549
Zero-initialize heartbeat test write buffer
...
The previous calls to memset() were added to tear_down() when I noticed the
test spuriously failing in opt mode, with different results each time. This
appeared to be because the allocator zeros out memory in debug mode, but not
in opt mode. Since the heartbeat functions silently drop the request on error
without modifying the contents of the write buffer, whatever random contents
were in memory before being reallocated to the write buffer used in the test
would cause nondeterministic test failures in the Heartbleed regression cases.
Adding these calls allowed the test to pass in both debug and opt modes.
Ben Laurie notified me offline that the test was aborting in
debug-ben-debug-64-clang mode, configured with GitConfigure and built with
GitMake. Looking into this, I realized the first memset() call was zeroing out
a reference count used by SSL_free() that was checked in
debug-ben-debug-64-clang mode but not in the normal debug mode.
Removing the memset() calls from tear_down() and adding a memset() for the
write buffer in set_up() addresses the issue and allows the test to
successfully execute in debug, opt, and debug-ben-debug-64-clang modes.
2014-05-19 17:39:41 +01:00
Mike Bland
f5ad068b01
More through error checks in set_up
...
Checks the return values of ssl_init_wbio_buffer() and ssl3_setup_buffers().
2014-05-19 17:39:41 +01:00
Ben Laurie
f41231d62a
Make it build/run.
2014-05-19 17:39:41 +01:00
Mike Bland
6af080acaf
Unit/regression test for TLS heartbeats.
...
Regression test against CVE-2014-0160 (Heartbleed).
More info: http://mike-bland.com/tags/heartbleed.html
2014-05-19 17:39:41 +01:00
Andy Polyakov
5727e4dab8
Add "teaser" AES module for ARMv8.
...
"Teaser" means that it's initial proof-of-concept to build EVP module
upon.
2014-05-19 08:46:44 +02:00
Matt Caswell
d4b47504de
Moved note about lack of support for AEAD modes out of BUGS section to SUPPORTED CIPHERS section (bug has been fixed, but still no support for AEAD)
2014-05-15 21:13:38 +01:00
Dr. Stephen Henson
c358651218
Enc doesn't support AEAD ciphers.
...
(cherry picked from commit 09184dddead165901700b31eb39d540ba30f93c5)
2014-05-15 14:16:46 +01:00
Jeffrey Walton
2af071c0bc
Fix grammar error in verify pod. PR#3355
2014-05-14 22:49:30 +01:00
Jeffrey Walton
18c4f522f4
Add information to BUGS section of enc documentation. PR#3354
2014-05-14 22:48:26 +01:00
Michal Bozon
ab6577a46e
Corrected POD syntax errors. PR#3353
2014-05-14 21:07:51 +01:00
Mike Frysinger
e6479c76ca
Have the .pc files depend on each other rather than duplicating the
...
various link settings. PR#3332
2014-05-12 23:31:51 +01:00
Kurt Roeckx
4ee356686f
Check sk_SSL_CIPHER_num() after assigning sk.
2014-05-12 22:56:13 +01:00
Jean-Paul Calderone
a4a442cccf
Correct the return type on the signature for X509_STORE_CTX_get_ex_data given in the pod file.
2014-05-12 22:41:13 +01:00
Serguei E. Leontiev
4a56d9a2ed
Replace manual ASN1 decoder with ASN1_get_object
...
Replace manual ASN.1 decoder with ASN1_get object. This
will decode the tag and length properly and check against
it does not exceed the supplied buffer length.
PR#3335
2014-05-12 18:41:52 +01:00
Dr. Stephen Henson
89e674744d
Correct example.
2014-05-12 18:41:52 +01:00
Andy Polyakov
f75faa16af
Add "teaser" AES module for PowerISA 2.07.
...
"Teaser" means that it's not integrated yet and purpose of this
commit is primarily informational, to exhibit design choices,
such as how to handle alignment and endianness. In other words
it's proof-of-concept code that EVP module will build upon.
2014-05-12 10:35:29 +02:00
Matt Caswell
7b06ac7593
Fixed NULL pointer dereference. See PR#3321
2014-05-12 00:38:37 +01:00
Kurt Roeckx
3b3ecce141
Set authkey to NULL and check malloc return value.
2014-05-12 00:20:08 +01:00
Martin Brejcha
00f3a236e0
dgram_sctp_ctrl: authkey memory leak
...
PR: 3327
2014-05-12 00:20:08 +01:00
Günther Noack
308505b838
Avoid out-of-bounds write in SSL_get_shared_ciphers
...
PR: 3317
2014-05-11 23:52:47 +01:00
Viktor Dukhovni
b00676bb6f
Fix infinite loop. PR#3347
2014-05-11 20:28:56 +01:00
Matt Caswell
971a7c5ff7
Move length check earlier to ensure we don't go beyond the end of the user's buffer. PR#3320
2014-05-11 11:27:26 +01:00
Tim Hudson
c388d8b40c
safety check to ensure we dont send out beyond the users buffer
2014-05-11 11:21:30 +01:00
Matt Caswell
c4afc40a9b
Fixed CRLF in file
2014-05-10 01:19:50 +01:00
Dr. Stephen Henson
0bcb17a777
Return an error if no recipient type matches.
...
If the key type does not match any CMS recipient type return
an error instead of using a random key (MMA mitigation). This
does not leak any useful information to an attacker.
PR#3348
2014-05-09 14:24:54 +01:00
Geoff Thorpe
a935132099
s_client/s_server: support unix domain sockets
...
The "-unix <path>" argument allows s_server and s_client to use a unix
domain socket in the filesystem instead of IPv4 ("-connect", "-port",
"-accept", etc). If s_server exits gracefully, such as when "-naccept"
is used and the requested number of SSL/TLS connections have occurred,
then the domain socket file is removed. On ctrl-C, it is likely that
the stale socket file will be left over, such that s_server would
normally fail to restart with the same arguments. For this reason,
s_server also supports an "-unlink" option, which will clean up any
stale socket file before starting.
If you have any reason to want encrypted IPC within an O/S instance,
this concept might come in handy. Otherwise it just demonstrates that
there is nothing about SSL/TLS that limits it to TCP/IP in any way.
(There might also be benchmarking and profiling use in this path, as
unix domain sockets are much lower overhead than connecting over local
IP addresses).
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
2014-05-08 22:07:09 -04:00
Tim Hudson
b6e69d284b
coverity 966576 - close socket in error path
2014-05-08 23:14:52 +01:00
Tim Hudson
8e94fadd0b
PR#3342 fix resource leak coverity issue 966577
2014-05-08 23:08:33 +01:00
Tim Hudson
630f9fc69d
fix coverity issue 966597 - error line is not always initialised
2014-05-07 23:54:25 +01:00
Matt Caswell
2d2e0479eb
Fixed NULL pointer dereference in PKCS7_dataDecode reported by David Ramos in PR#3339
2014-05-07 23:21:02 +01:00
Geoff Thorpe
fce3821111
evp: prevent underflow in base64 decoding
...
This patch resolves RT ticket #2608 .
Thanks to Robert Dugal for originally spotting this, and to David
Ramos for noticing that the ball had been dropped.
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
2014-05-06 17:52:19 -04:00
Geoff Thorpe
12e9f627f9
bignum: allow concurrent BN_MONT_CTX_set_locked()
...
The lazy-initialisation of BN_MONT_CTX was serialising all threads, as
noted by Daniel Sands and co at Sandia. This was to handle the case that
2 or more threads race to lazy-init the same context, but stunted all
scalability in the case where 2 or more threads are doing unrelated
things! We favour the latter case by punishing the former. The init work
gets done by each thread that finds the context to be uninitialised, and
we then lock the "set" logic after that work is done - the winning
thread's work gets used, the losing threads throw away what they've done.
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
2014-05-06 17:43:35 -04:00
Dr. Stephen Henson
3ba1e406c2
Initialize num properly.
...
PR#3289
PR#3345
2014-05-06 14:07:37 +01:00
Dr. Stephen Henson
546b1b4384
Set Enveloped data version to 2 if ktri version not zero.
2014-05-06 13:59:05 +01:00
Tim Hudson
8bbfd94e36
- fix coverity issues 966593-966596
2014-05-06 00:02:31 +01:00
Geoff Thorpe
e1ce131d4d
apps/s_server: document '-naccept' cmd-line argument
...
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
2014-05-04 22:42:41 -04:00
Andy Polyakov
b943b7d2c7
md5/asm/md5-[586|x86_64].pl: +15% on Atom.
...
[MD5 is hardly relevant, just cleaning up repository]
2014-05-04 16:56:00 +02:00
Andy Polyakov
496f2b148b
C64x+ assembply pack: add RC4 module.
2014-05-04 16:39:59 +02:00
Andy Polyakov
bd227733b9
C64x+ assembly pack: make it work with older toolchain.
2014-05-04 16:38:32 +02:00
Andy Polyakov
9250a30692
sha/asm/sha1-armv4-large.pl: add NEON and ARMv8 code paths.
...
sha/asm/sha256-armv4.pl: add ARMv8 code path.
2014-05-04 10:57:55 +02:00
Andy Polyakov
4afa9f033d
crypto/armcap.c: detect ARMv8 capabilities [in 32-bit build].
2014-05-04 10:55:49 +02:00
David Ramos
16ba70746b
Double free in i2o_ECPublicKey
...
PR: 3338
2014-05-04 00:46:20 +01:00
Geoff Thorpe
da12bfca51
dso: eliminate VMS code on non-VMS systems
...
Even though the meat of dso_vms.c is compiled out on non-VMS builds,
the (pre-)compiler still traverses some of the macro handling. This
trips up at least one non-VMS build configuration, so this commit
makes the skip-VMS case more robust.
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
2014-05-01 21:59:36 -04:00
Jeff Trawick
e5676b8328
typo in SSL_get_peer_cert_chain docs
...
RT: 3304
2014-05-01 13:40:01 +02:00
Matt Caswell
a141effa7b
Fixed spelling error in error message. Fix supplied by Marcos Marado
2014-05-01 00:28:00 +01:00
Geoff Thorpe
a529261891
bignum: fix boundary condition in montgomery logic
...
It's not clear whether this inconsistency could lead to an actual
computation error, but it involved a BIGNUM being passed around the
montgomery logic in an inconsistent state. This was found using flags
-DBN_DEBUG -DBN_DEBUG_RAND, and working backwards from this assertion
in 'ectest';
ectest: bn_mul.c:960: BN_mul: Assertion `(_bnum2->top == 0) ||
(_bnum2->d[_bnum2->top - 1] != 0)' failed
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
2014-04-30 11:49:31 -04:00
Ben Laurie
9cabf6bb80
More warnings.
2014-04-29 18:19:54 +01:00
Matt Caswell
ba1cb9a553
Fix SSL_CONF_cmd missing =back
2014-04-27 18:57:34 +01:00
Matt Caswell
b5450d6349
Fixed minor errors in docs
2014-04-26 21:56:36 +01:00
Matt Caswell
6bcc4475fc
PKCS5_PBKDF2_HMAC documentation submitted by Jeffrey Walton
2014-04-26 21:44:26 +01:00
Chris Rorvick
fa9d77dcd2
doc: Add missing =back directive.
...
Signed-off-by: Chris Rorvick <chris@rorvick.com >
2014-04-26 12:32:53 -05:00
mancha
8acb953880
Fix version documentation.
...
Specify -f is for compilation flags. Add -d to synopsis section.
Closes #77 .
2014-04-26 08:09:53 +01:00
mancha
e14f14d36e
Fix eckey_priv_encode()
...
Fix eckey_priv_encode to return an error on failure of i2d_ECPrivateKey.
2014-04-26 07:59:13 +01:00
Geoff Thorpe
79c6c4e828
make depend
2014-04-25 14:31:05 -04:00
Geoff Thorpe
76c3ff6937
apps: constify some string parameters
...
There are certainly many more constifiable strings in the various
interfaces, which I hope to get to eventually.
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
2014-04-25 14:31:05 -04:00
Geoff Thorpe
647f360e2e
util/mkerr.pl: fix perl warning
...
Gets rid of this;
defined(@array) is deprecated at ../util/mkerr.pl line 792.
(Maybe you should just omit the defined()?)
defined(@array) is deprecated at ../util/mkerr.pl line 800.
(Maybe you should just omit the defined()?)
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
2014-04-25 14:31:05 -04:00
Mark J. Cox
cdcd5dc865
Remove latest version, it's pretty redundant and just one more thing
...
to keep up to date with releases. Reported because
http://www.openssl.org/support/faq.html#MISC1 was out of date
2014-04-25 08:12:13 +01:00
Geoff Thorpe
c9011ec460
util/mkdef.pl: o_time.h doesn't exist any more
...
o_time.h was removed in commit ff49a94 , which breaks "make update"
unless mkdir.pl is updated accordingly.
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
2014-04-25 01:01:17 -04:00
Steve Marquess
d2cc3d8a4e
Add new sponsors
2014-04-24 12:33:03 +01:00
Andy Polyakov
f8cee9d081
bn/asm/armv4-gf2m.pl, modes/asm/ghash-armv4.pl: faster multiplication
...
algorithm suggested in following paper:
Câmara, D.; Gouvêa, C. P. L.; López, J. & Dahab, R.: Fast Software
Polynomial Multiplication on ARM Processors using the NEON Engine.
http://conradoplg.cryptoland.net/files/2010/12/mocrysen13.pdf
2014-04-24 10:24:53 +02:00
Andy Polyakov
558ff0f0c1
aes/asm/bsaes-x86_64.pl: Atom-specific optimization.
2014-04-24 10:13:30 +02:00
Ben Laurie
94d1f4b0f3
Fix use after free.
2014-04-23 07:24:03 +01:00
Ben Laurie
4ba5e63bfd
Fix double frees.
2014-04-22 16:58:43 +01:00
Kaspar Brand
9330a85e04
Fix SSL_CTX_get{first,next}_certificate.
...
Fix typo that stopped SSL_CTX_get_{first,next}_certificate from working.
2014-04-21 16:52:28 +01:00
Dr. Stephen Henson
0dd5b94aeb
Document -debug_decrypt option.
2014-04-16 12:15:43 +01:00
Dr. Stephen Henson
300b9f0b70
Extension checking fixes.
...
When looking for an extension we need to set the last found
position to -1 to properly search all extensions.
PR#3309.
2014-04-15 18:50:53 +01:00
Dr. Stephen Henson
5f8e9a477a
Clarify CMS_decrypt behaviour.
2014-04-15 18:17:12 +01:00
Dr. Stephen Henson
3143a332e8
Add new key fingerprint.
2014-04-11 02:50:51 +01:00
Dr. Stephen Henson
5219d3dd35
Fix free errors in ocsp utility.
...
Keep copy of any host, path and port values allocated by
OCSP_parse_url and free as necessary.
2014-04-09 15:42:40 +01:00
Dr. Stephen Henson
476830fd5b
ssleay_rand_add returns a value in 1.1.0
2014-04-09 15:35:51 +01:00
Dr. Stephen Henson
86f6e8669c
Update NEWS
2014-04-08 22:31:14 +01:00
Dr. Stephen Henson
f74fa33bce
Return if ssleay_rand_add called with zero num.
...
Treat a zero length passed to ssleay_rand_add a no op: the existing logic
zeroes the md value which is very bad. OpenSSL itself never does this
internally and the actual call doesn't make sense as it would be passing
zero bytes of entropy.
Thanks to Marcus Meissner <meissner@suse.de > for reporting this bug.
(cherry picked from commit 5be1ae28ef )
2014-04-07 19:44:45 +01:00
Dr. Stephen Henson
731f431497
Add heartbeat extension bounds check.
...
A missing bounds check in the handling of the TLS heartbeat extension
can be used to reveal up to 64k of memory to a connected client or
server.
Thanks for Neel Mehta of Google Security for discovering this bug and to
Adam Langley <agl@chromium.org > and Bodo Moeller <bmoeller@acm.org > for
preparing the fix (CVE-2014-0160)
(cherry picked from commit 96db9023b8 )
2014-04-07 19:44:38 +01:00
Dr. Stephen Henson
4e6c12f308
Document -verify_return_error option.
2014-04-07 13:02:39 +01:00
Andy Polyakov
997d1aac7c
crypto/modes/gcm128.c: more strict aliasing fixes.
2014-04-06 17:19:54 +02:00
Andy Polyakov
6eebcf3459
vpaes-[x86_64|ppc].pl: fix typo, which for some reason triggers rkhunter.
2014-04-06 12:50:36 +02:00
Dr. Stephen Henson
cd6bd5ffda
Set TLS padding extension value.
...
Enable TLS padding extension using official value from:
http://www.iana.org/assignments/tls-extensiontype-values/tls-extensiontype-values.xhtml
2014-04-05 20:43:54 +01:00
Dr. Stephen Henson
f8dd55bb5b
For more than 160 bits of security disable SHA1 HMAC
2014-04-05 13:39:35 +01:00
Dr. Stephen Henson
b7e46a9bce
Update security framework docs.
2014-04-05 13:29:41 +01:00
Dr. Stephen Henson
6cc0068430
Update FAQ.
2014-04-04 12:46:39 +01:00
Dr. Stephen Henson
7ba08a4d73
Use correct length when prompting for password.
...
Use bufsiz - 1 not BUFSIZ - 1 when prompting for a password in
the openssl utility.
Thanks to Rob Mackinnon, Leviathan Security for reporting this issue.
2014-04-04 12:44:43 +01:00
Dr. Stephen Henson
dbb7654dc1
Document new crl option.
2014-04-03 13:33:50 +01:00
Tim Hudson
de2d97cd79
Add option to generate old hash format.
...
New -hash_old to generate CRL hashes using old
(before OpenSSL 1.0.0) algorithm.
2014-04-03 13:26:32 +01:00
Eric Young
10378fb5f4
Fix base64 decoding bug.
...
A short PEM encoded sequence if passed to the BIO, and the file
had 2 \n following would fail.
PR#3289
2014-04-02 19:54:27 +01:00
Dr. Stephen Henson
b48310627d
Don't try and verify signatures if key is NULL (CVE-2013-0166)
...
Add additional check to catch this in ASN1_item_verify too.
(cherry picked from commit 66e8211c0b )
2014-04-01 16:37:51 +01:00
Ben Laurie
5a49001bde
Fix warning.
2014-03-29 19:51:58 +00:00
Dr. Stephen Henson
0f817d3b27
Add initial security framework docs.
2014-03-28 16:42:18 +00:00
Dr. Stephen Henson
21e0c1d23a
Set security level in cipher string.
...
Allow setting of security level in cipher string using the
@SECLEVEL=N syntax.
2014-03-28 14:56:43 +00:00
Dr. Stephen Henson
77a926e676
Set security level to zero is ssltest
...
Since ssltest needs to test low security ciphersuites and keys
set security level to zero so they aren't rejected.
2014-03-28 14:56:43 +00:00
Dr. Stephen Henson
e03c5b59f0
Security callback debug print out.
...
Add a debugging security callback option to s_client/s_server. This will
print out each security parameter as it is accepted or rejected.
2014-03-28 14:56:43 +00:00
Dr. Stephen Henson
b362ccab5c
Security framework.
...
Security callback: selects which parameters are permitted including
sensible defaults based on bits of security.
The "parameters" which can be selected include: ciphersuites,
curves, key sizes, certificate signature algorithms, supported
signature algorithms, DH parameters, SSL/TLS version, session tickets
and compression.
In some cases prohibiting the use of a parameters will mean they are
not advertised to the peer: for example cipher suites and ECC curves.
In other cases it will abort the handshake: e.g DH parameters or the
peer key size.
Documentation to follow...
2014-03-28 14:56:30 +00:00
Dr. Stephen Henson
66f96fe2d5
Check return value of ssl3_output_cert_chain
2014-03-28 14:49:04 +00:00
Dr. Stephen Henson
8b8e5bed23
Allow return of supported ciphers.
...
New function ssl_cipher_disabled.
Check for disabled client ciphers using ssl_cipher_disabled.
New function to return only supported ciphers.
New option to ciphers utility to print only supported ciphers.
2014-03-28 14:49:04 +00:00
Dr. Stephen Henson
09599b52d4
Auto DH support.
...
Add auto DH parameter support. This is roughly equivalent to the
ECDH auto curve selection but for DH. An application can just call
SSL_CTX_set_auto_dh(ctx, 1);
and appropriate DH parameters will be used based on the size of the
server key.
Unlike ECDH there is no way a peer can indicate the range of DH parameters
it supports. Some peers cannot handle DH keys larger that 1024 bits for
example. In this case if you call:
SSL_CTX_set_auto_dh(ctx, 2);
Only 1024 bit DH parameters will be used.
If the server key is 7680 bits or more in size then 8192 bit DH parameters
will be used: these will be *very* slow.
The old export ciphersuites aren't supported but those are very
insecure anyway.
2014-03-28 14:49:04 +00:00
Dr. Stephen Henson
2514fa79ac
Add functions returning security bits.
...
Add functions to return the "bits of security" for various public key
algorithms. Based on SP800-57.
2014-03-28 14:49:04 +00:00
Dr. Stephen Henson
4563da1d7c
Fix memory leak with client auth.
...
(cherry picked from commit bc5ec653ba )
2014-03-27 16:12:59 +00:00
Dr. Stephen Henson
f0ef019da2
Add -no_resumption_on_reneg to SSL_CONF.
...
(cherry picked from commit 1f44dac24d )
2014-03-27 16:12:40 +00:00
Dr. Stephen Henson
e970f63dc0
Update chain building function.
...
Don't clear verification errors from the error queue unless
SSL_BUILD_CHAIN_FLAG_CLEAR_ERROR is set.
If errors occur during verification and SSL_BUILD_CHAIN_FLAG_IGNORE_ERROR
is set return 2 so applications can issue warnings.
(cherry picked from commit 2dd6976f6d )
2014-03-27 14:24:40 +00:00
Emilia Kasper
7c5718be27
Allow duplicate certs in ssl_build_cert_chain
2014-03-24 12:33:54 +01:00
Dr. Stephen Henson
3a98f9cf20
Workaround for some CMS signature formats.
...
Some CMS SignedData structure use a signature algorithm OID such
as SHA1WithRSA instead of the RSA algorithm OID. Workaround this
case by tolerating the signature if we recognise the OID.
2014-03-19 17:28:01 +00:00
Piotr Sikora
f04665a653
Retry callback only after ClientHello received.
2014-03-18 23:55:32 +00:00
Dr. Stephen Henson
14c67a7004
Update ordinals.
...
Use a previously unused value as we will be updating multiple released
branches.
(cherry picked from commit 0737acd2a8 )
2014-03-12 14:42:08 +00:00
Dr. Stephen Henson
f9b6c0ba4c
Fix for CVE-2014-0076
...
Fix for the attack described in the paper "Recovering OpenSSL
ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack"
by Yuval Yarom and Naomi Benger. Details can be obtained from:
http://eprint.iacr.org/2014/140
Thanks to Yuval Yarom and Naomi Benger for discovering this
flaw and to Yuval Yarom for supplying a fix.
(cherry picked from commit 2198be3483 )
Conflicts:
CHANGES
2014-03-12 14:29:43 +00:00
Dr. Stephen Henson
a029788b0e
typo
2014-03-10 15:47:33 +00:00
Dr. Stephen Henson
d628885e9a
Simplify ssl_add_cert_chain logic.
2014-03-10 15:47:33 +00:00
Dr. Stephen Henson
ab0f880433
Remove -WX option from debug-VC-WIN32
...
(cherry picked from commit 7a3e67f029969620966b8a627b8485d83692cca5)
2014-03-07 19:07:52 +00:00
Andy Polyakov
ea38f02049
engines/ccgost/gosthash.c: simplify and avoid SEGV.
...
PR: 3275
2014-03-07 11:02:25 +01:00
Andy Polyakov
5e44c144e6
SPARC T4 assembly pack: treat zero input length in CBC.
...
The problem is that OpenSSH calls EVP_Cipher, which is not as
protective as EVP_CipherUpdate. Formally speaking we ought to
do more checks in *_cipher methods, including rejecting
lengths not divisible by block size (unless ciphertext stealing
is in place). But for now I implement check for zero length in
low-level based on precedent.
PR: 3087, 2775
2014-03-07 10:30:37 +01:00
Andy Polyakov
53e5161231
dh_check.c: check BN_CTX_get's return value.
2014-03-06 14:19:37 +01:00
Andy Polyakov
687403fb24
test/Makefile: allow emulated test (e.g. under wine).
...
Submitted by: Roumen Petrov
2014-03-06 14:08:02 +01:00
Andy Polyakov
972b0dc350
bss_dgram.c,d1_lib.c: make it compile with mingw.
...
Submitted by: Roumen Petrov
2014-03-06 14:04:56 +01:00
Dr. Stephen Henson
315cd871c4
For self signed root only indicate one error.
...
(cherry picked from commit bdfc0e284c )
2014-03-03 23:36:46 +00:00
Dr. Stephen Henson
5693a30813
PKCS#8 support for alternative PRFs.
...
Add option to set an alternative to the default hmacWithSHA1 PRF
for PKCS#8 private key encryptions. This is used automatically
by PKCS8_encrypt if the nid specified is a PRF.
Add option to pkcs8 utility.
Update docs.
(cherry picked from commit b60272b01f )
2014-03-01 23:16:08 +00:00
Dr. Stephen Henson
01757858fe
Fix memory leak.
...
(cherry picked from commit 124d218889 )
2014-03-01 23:15:53 +00:00
Dr. Stephen Henson
db7b5e0d76
Add function to free compression methods.
...
Although the memory allocated by compression methods is fixed and
cannot grow over time it can cause warnings in some leak checking
tools. The function SSL_COMP_free_compression_methods() will free
and zero the list of supported compression methods. This should
*only* be called in a single threaded context when an application
is shutting down to avoid interfering with existing contexts
attempting to look up compression methods.
(cherry picked from commit 976c58302b )
2014-03-01 23:15:25 +00:00
Andy Polyakov
65370f9bbc
Makefile.org: fix syntax error on Solaris.
...
PR: 3271
2014-02-28 22:54:40 +01:00
Andy Polyakov
4ca026560a
Configure: mark unixware target as elf-1.
2014-02-27 14:27:15 +01:00
Andy Polyakov
b62a4a1c0e
perlasm/x86asm.pl: recognize elf-1 denoting old ELF platforms.
2014-02-27 14:26:12 +01:00
Andy Polyakov
ce876d8316
perlasm/x86gas.pl: limit special OPENSSL_ia32cap_P treatment to ELF.
2014-02-27 14:22:13 +01:00
Andy Polyakov
f861b1d433
rc4/asm/rc4-586.pl: allow for 386-only build.
2014-02-27 14:19:19 +01:00
Andy Polyakov
fd361a67ef
des/asm/des-586.pl: shortcut reference to DES_SPtrans.
2014-02-27 14:17:43 +01:00
Rob Stradling
52f71f8181
CABForum EV OIDs for Subject Jurisdiction of Incorporation or Registration.
2014-02-26 15:33:11 +00:00
Dr. Stephen Henson
031ea2d14a
Fix for WIN32 builds with KRB5
...
(cherry picked from commit 3eddd1706a30cdf3dc9278692d8ee9038eac8a0d)
2014-02-26 15:33:11 +00:00
Andy Polyakov
d49135e7ea
sha/asm/sha256-586.pl: don't try to compile SIMD with no-sse2.
2014-02-26 10:22:13 +01:00
Andy Polyakov
147cca8f53
sha/asm/sha512-x86_64.pl: fix compilation error on Solaris.
2014-02-26 09:30:03 +01:00
Andy Polyakov
7bb9d84e35
Configure: blended processor target in solaris-x86-cc.
2014-02-26 09:28:22 +01:00
Andy Polyakov
03da57fe14
ssl/t1_enc.c: check EVP_MD_CTX_copy return value.
...
PR: 3201
2014-02-25 22:21:54 +01:00
Andy Polyakov
e704741bf3
aes/asm/vpaes-ppc.pl: fix traceback info.
2014-02-25 20:11:34 +01:00
Dr. Stephen Henson
e0520c65d5
Don't use BN_ULLONG in n2l8 use SCTS_TIMESTAMP.
...
(cherry picked from commit 3678161d71 )
2014-02-25 15:06:51 +00:00
Dr. Stephen Henson
3a325c60a3
Fix for v3_scts.c
...
Not all platforms define BN_ULLONG. Define SCTS_TIMESTAMP as a type
which should work on all platforms.
(cherry picked from commit 6634416732 )
2014-02-25 14:56:31 +00:00
Dr. Stephen Henson
86a2f966d0
Add -show_chain option to print out verified chain.
2014-02-25 14:05:22 +00:00
Dr. Stephen Henson
a4cc3c8041
Avoid Windows 8 Getversion deprecated errors.
...
Windows 8 SDKs complain that GetVersion() is deprecated.
We only use GetVersion like this:
(GetVersion() < 0x80000000)
which checks if the Windows version is NT based. Use a macro check_winnt()
which uses GetVersion() on older SDK versions and true otherwise.
2014-02-25 13:40:33 +00:00
Rob Stradling
19f65ddbab
Parse non-v1 SCTs less awkwardly.
2014-02-25 10:14:51 +00:00
Andy Polyakov
63aff3001e
ms/do_win64a.bat: forward to NUL, not NUL:.
...
Allegedly formwarding to NUL: sometimes creates NUL file in file
system.
PR: 3250
2014-02-24 19:29:49 +01:00
Andy Polyakov
779c51c644
BC-32.pl: refresh Borland C support.
...
PR: 3251
Suggested by: Thorsten Schning
2014-02-24 16:42:40 +01:00
Andy Polyakov
758954e0d8
x509/by_dir.c: fix run-away pointer (and potential SEGV)
...
when adding duplicates in add_cert_dir.
PR: 3261
Reported by: Marian Done
2014-02-24 15:16:56 +01:00
Andy Polyakov
d099f0ed6c
config: recognize ARMv8/AArch64 target.
2014-02-24 13:18:40 +01:00
Dr. Stephen Henson
358d352aa2
Only set current certificate to valid values.
...
When setting the current certificate check that it has a corresponding
private key.
2014-02-23 13:46:52 +00:00
Dr. Stephen Henson
13dc3ce9ab
New chain building flags.
...
New flags to build certificate chains. The can be used to rearrange
the chain so all an application needs to do is add all certificates
in arbitrary order and then build the chain to check and correct them.
Add verify error code when building chain.
Update docs.
2014-02-23 13:36:38 +00:00
Dr. Stephen Henson
daddd9a950
Option to set current cert to server certificate.
2014-02-21 19:44:09 +00:00
Andy Polyakov
214368ffee
aes/asm/aesni-x86[_64].pl: minor Atom-specific performance tweak.
2014-02-21 12:14:04 +01:00
Dr. Stephen Henson
47739161c6
fix WIN32 warnings
...
(cherry picked from commit b709f8ef54 )
2014-02-20 22:55:24 +00:00
Dr. Stephen Henson
8764e86339
make depend
2014-02-20 18:48:56 +00:00
Dr. Stephen Henson
ded18639d7
Move CT viewer extension code to crypto/x509v3
2014-02-20 18:48:56 +00:00
Dr. Stephen Henson
4cfeb00be9
make depend
2014-02-19 20:09:08 +00:00
Dr. Stephen Henson
84917787b5
Remove references to o_time.h
2014-02-19 20:06:13 +00:00
Ben Laurie
ff49a94439
Move gmtime functions to crypto.h.
2014-02-19 18:02:04 +00:00
Ben Laurie
e91fb53b38
Make i2r_sctlist static.
2014-02-19 17:57:44 +00:00
Ben Laurie
c0482547b3
Reverse export of o_time.h.
2014-02-19 17:57:07 +00:00
Ben Laurie
765e9ba911
Merge branch 'sct-viewer-master' of https://github.com/robstradling/openssl into sct-viewer
2014-02-19 17:17:14 +00:00
Rob Stradling
b263f21246
Move the SCT List extension parser into libssl.
...
Add the extension parser in the s_client, ocsp and x509 apps.
2014-02-19 13:12:46 +00:00
Dr. Stephen Henson
6ecbc2bb62
Don't use CRYPTO_AES_CTR if it isn't defined.
2014-02-18 22:20:30 +00:00
Dr. Stephen Henson
3c6c139a07
Restore SSL_OP_MSIE_SSLV2_RSA_PADDING
...
The flag SSL_OP_MSIE_SSLV2_RSA_PADDING hasn't done anything since OpenSSL
0.9.7h but deleting it will break source compatibility with any software
that references it. Restore it but #define to zero.
(cherry picked from commit b17d6b8d1d )
2014-02-16 11:43:46 +00:00
Dr. Stephen Henson
f3a3903260
Don't use getcwd in non-copy builds.
2014-02-15 20:16:54 +00:00
Dr. Stephen Henson
5a7652c3e5
Remove duplicate statement.
2014-02-15 01:27:56 +00:00
Klaus-Peter Junghanns
be2c4d9bd9
Add support for aes-128/192/256-ctr to the cryptodev engine.
...
This can be used to speed up SRTP with libsrtp, e.g. on TI omap/sitara based devices.
2014-02-15 00:01:40 +00:00
Rob Stradling
dcfe8df148
Show the contents of the RFC6962 Signed Certificate Timestamp List Certificate/OCSP Extensions.
...
Add the RFC6962 OIDs to the objects table.
2014-02-14 23:24:35 +00:00
Kurt Roeckx
3343220327
Use defaults bits in req when not given
...
If you use "-newkey rsa" it's supposed to read the default number of bits from the
config file. However the value isn't used to generate the key, but it does
print it's generating such a key. The set_keygen_ctx() doesn't call
EVP_PKEY_CTX_set_rsa_keygen_bits() and you end up with the default set in
pkey_rsa_init() (1024). Afterwards the number of bits gets read from the config
file, but nothing is done with that anymore.
We now read the config first and use the value from the config file when no size
is given.
PR: 2592
2014-02-14 22:30:27 +00:00
Kurt Roeckx
e547c45f1c
Fix additional pod errors with numbered items.
2014-02-14 22:30:26 +00:00
Scott Schaefer
2b4ffc659e
Fix various spelling errors
2014-02-14 22:29:12 +00:00
Scott Schaefer
856c6dfb09
Document pkcs12 -password behavior
...
apps/pkcs12.c accepts -password as an argument. The document author
almost certainly meant to write "-password, -passin".
However, that is not correct, either. Actually the code treats
-password as equivalent to -passin, EXCEPT when -export is also
specified, in which case -password as equivalent to -passout.
2014-02-14 22:28:37 +00:00
Andy Polyakov
701134320a
ssl/s3_pkt.c: detect RAND_bytes error in multi-block.
2014-02-14 17:43:31 +01:00
Andy Polyakov
f4d456408d
x86[_64]cpuid.pl: add low-level RDSEED.
2014-02-14 17:24:12 +01:00
Andy Polyakov
5599c7331b
aes/asm/aesni-x86_64.pl: further optimization for Atom Silvermont.
...
Improve CBC decrypt and CTR by ~13/16%, which adds up to ~25/33%
improvement over "pre-Silvermont" version. [Add performance table to
aesni-x86.pl].
2014-02-14 17:06:15 +01:00
Dr. Stephen Henson
385b348666
Include TA in checks/callback with partial chains.
...
When a chain is complete and ends in a trusted root checks are also
performed on the TA and the callback notified with ok==1. For
consistency do the same for chains where the TA is not self signed.
2014-02-14 15:07:01 +00:00
Dr. Stephen Henson
2dac2667d1
Don't do loop detection for self signed check.
2014-02-14 14:52:23 +00:00
Dr. Stephen Henson
847865d0f9
Add suppot for ASCII with CRLF canonicalisation.
2014-02-13 14:35:56 +00:00
Dr. Stephen Henson
4dce704145
fix error discrepancy
...
(cherry picked from commit a2317c3ffd )
2014-02-13 14:35:22 +00:00
Andy Polyakov
9587429fa0
evp/e_aes_cbc_hmac_sha*.c: improve cache locality.
2014-02-13 14:39:55 +01:00
Andy Polyakov
98e143f118
ghash-x86[_64].pl: ~15% improvement on Atom Silvermont
...
(other processors unaffected).
2014-02-13 14:37:28 +01:00
Ben Laurie
fc92396976
Fix warning.
2014-02-13 03:11:58 +00:00
Ben Laurie
6311681236
Build on MacOS.
2014-02-09 12:49:04 +00:00
Dr. Stephen Henson
b45e874d7c
Return previous compression methods when setting them.
2014-02-06 13:57:26 +00:00
Dr. Stephen Henson
c53a5308a5
Oops, get selection logic right.
2014-02-05 18:57:25 +00:00
Ben Laurie
f1f7598ce9
Fix warnings.
2014-02-05 18:25:47 +00:00
Scott Deboy
9dabfce1a8
Don't break out of the custom extension callback loop - continue instead
...
The contract for custom extension callbacks has changed - all custom extension callbacks are triggered
2014-02-05 18:25:47 +00:00
Ben Laurie
0a6028757a
Fix whitespace, new-style comments.
2014-02-05 18:25:46 +00:00
Scott Deboy
e9add063b5
Re-add alert variables removed during rebase
...
Whitespace fixes
2014-02-05 18:25:46 +00:00
Scott Deboy
519531e97e
Updating DTCP authorization type to expected value
2014-02-05 18:25:46 +00:00
Scott Deboy
ac20719d99
Update custom TLS extension and supplemental data 'generate' callbacks to support sending an alert.
...
If multiple TLS extensions are expected but not received, the TLS extension and supplemental data 'generate' callbacks are the only chance for the receive-side to trigger a specific TLS alert during the handshake.
Removed logic which no-op'd TLS extension generate callbacks (as the generate callbacks need to always be called in order to trigger alerts), and updated the serverinfo-specific custom TLS extension callbacks to track which custom TLS extensions were received by the client, where no-ops for 'generate' callbacks are appropriate.
2014-02-05 18:25:46 +00:00
Dr. Stephen Henson
a51f767645
Return per-certificate chain if extra chain is NULL.
...
If an application calls the macro SSL_CTX_get_extra_chain_certs
return either the old "shared" extra certificates or those associated
with the current certificate.
This means applications which call SSL_CTX_use_certificate_chain_file
and retrieve the additional chain using SSL_CTX_get_extra_chain_certs
will still work. An application which only wants to check the shared
extra certificates can call the new macro
SSL_CTX_get_extra_chain_certs_only
2014-02-05 17:05:01 +00:00
Andy Polyakov
5a42c8f07f
e_aes_cbc_hmac_sha[1|256].c: fix compiler warning.
2014-02-05 16:38:22 +01:00
Andy Polyakov
a9c6edcde7
ssl/s3_pkt.c: move multi-block processing to ssl3_write_bytes.
...
This allows to process multiple fragmets of maximum fragment size,
as opposite to chopping maximum-sized fragments to multiple smaller
ones. This approach relies on dynamic allocation of larger buffers,
which we trade for performance improvement, for several *times* in
some situations.
2014-02-05 14:08:44 +01:00
Andy Polyakov
0d5096fbd6
evp/e_aes_cbc_hmac_sha*.c: additional CTRL to query buffer requirements.
2014-02-05 14:05:08 +01:00
Andy Polyakov
3847d15d6b
[aesni|sha*]-mb-x86_64.pl: add data prefetching.
2014-02-05 14:03:35 +01:00
Andy Polyakov
3ef477c69f
s3_pkt.c: move ssl3_release_write_buffer to ssl3_write_bytes.
...
If application has more data than maximum fragment, hold to buffer
for whole write, as opposite to per-fragment strategy.
2014-02-05 13:57:10 +01:00
Dr. Stephen Henson
24e20db4aa
Add quotes as CC can contain spaces.
...
PR#3253
2014-02-03 14:10:24 +00:00
Dr. Stephen Henson
0f78819c8c
New ctrl to set current certificate.
...
New ctrl sets current certificate based on certain criteria. Currently
two options: set the first valid certificate as current and set the
next valid certificate as current. Using these an application can
iterate over all certificates in an SSL_CTX or SSL structure.
2014-02-02 22:58:19 +00:00
Dr. Stephen Henson
9f9ab1dc66
Demo of use of errors in applications.
2014-02-02 22:58:19 +00:00
Andy Polyakov
d162584b11
modes/asm/ghash-s390x.pl: +15% performance improvement on z10.
2014-02-02 00:09:17 +01:00
Andy Polyakov
d8ba0dc977
crypto/aes/asm/aesni-x86[_64].pl update, up to 14% improvement on
...
Atom Silvermont. On other CPUs one can observe 1% loss on some
algorithms.
2014-02-01 21:13:49 +01:00
Andy Polyakov
b217ca63b1
crypto/sha/asm/sha1-x86_64.pl update:
...
+5% on Atom Silvermont, up to +8% improvement of legacy code.
Harmonize sha1-586.pl and aesni-sha1-x86_86.p with sha1-x86_64.pl.
2014-02-01 21:07:16 +01:00
Dr. Stephen Henson
30ea570f0f
Clarify docs.
...
Remove reference to ERR_TXT_MALLOCED in the error library as that is
only used internally. Indicate that returned error data must not be
freed.
(cherry picked from commit f2d678e6e8 )
2014-01-29 01:01:52 +00:00
Dr. Stephen Henson
cb2182676b
typo
2014-01-28 15:35:16 +00:00
Dr. Stephen Henson
73c92dfa0c
Check i before r[i].
...
PR#3244
(cherry picked from commit 9614d2c676 )
2014-01-28 15:15:58 +00:00
Dr. Stephen Henson
717cc85895
Fix demo comment: 0.9.9 never released.
2014-01-28 15:15:26 +00:00
Dr. Stephen Henson
e933f91f50
Add loaded dynamic ENGINEs to list.
...
Always add a dynamically loaded ENGINE to list. Otherwise it can cause
problems when multiply loaded, especially if it adds new public key methods.
For all current engines we only want a single implementation anyway.
2014-01-28 13:51:58 +00:00
Dr. Stephen Henson
cbb6744827
New function to set compression methods so they can be safely freed.
2014-01-27 14:30:29 +00:00
Dr. Stephen Henson
ec492c8a5a
Compare encodings in X509_cmp as well as hash.
2014-01-26 16:29:50 +00:00
Dr. Stephen Henson
3323314fc1
Add cert callback retry test.
2014-01-26 16:29:50 +00:00
Dr. Stephen Henson
46ab9bbd7f
Certificate callback doc.
2014-01-26 16:29:43 +00:00
Dr. Stephen Henson
0ebc965b9c
Support retries in certificate callback
2014-01-26 02:44:34 +00:00
Dr. Stephen Henson
ba168244a1
Add new function SSL_CTX_get_ssl_method().
...
Partial fix for PR#3183.
2014-01-16 14:07:46 +00:00
Kaspar Brand
d0b039d4a3
Omit initial status request callback check.
...
PR#3178
2014-01-16 13:46:31 +00:00
Dr. Stephen Henson
9f10e9293b
typo
2014-01-12 14:13:48 +00:00
Dr. Stephen Henson
ef643cc7bd
Use rdrand as additional entropy source.
...
If available rdrand is used as an additional entropy source for the
PRNG and for additional input in FIPS mode.
2014-01-11 14:19:25 +00:00
Jeff Trawick
4b64e0cbdb
typo
2014-01-10 23:01:30 +00:00
Jeff Trawick
5edce5685f
typo
2014-01-10 23:00:50 +00:00
Dr. Stephen Henson
8f4077ca69
Fix bug in X509_V_FLAG_IGNORE_CRITICAL CRL handling.
2014-01-09 22:52:49 +00:00
Daniel Kahn Gillmor
0ecfd920e5
update remaining documentation to move from EDH to DHE
...
change documentation and comments to indicate that we prefer the
standard "DHE" naming scheme everywhere over the older "EDH"
2014-01-09 15:43:28 +00:00
Daniel Kahn Gillmor
4b5cce664c
Replace EDH-RSA-DES-CBC-SHA, etc. with DHE-RSA-DES-CBC-SHA
...
Replace the full ciphersuites with "EDH-" in their labels with "DHE-"
so that all DHE ciphersuites are referred to in the same way.
Leave backward-compatible aliases for the ciphersuites in question so
that configurations which specify these explicitly will continue
working.
2014-01-09 15:43:28 +00:00
Daniel Kahn Gillmor
889f39c70f
change SSL3_CK_EDH_* to SSL_CK_DHE_* (with backward-compatibility)
...
This change normalizes the SSL_CK_DHE_ #defines to use the common term
"DHE", while permitting older code that uses the more uncommon "EDH"
constants to compile properly.
2014-01-09 15:43:28 +00:00
Daniel Kahn Gillmor
0b30fc903f
documentation should use "DHE" instead of "EDH"
2014-01-09 15:43:28 +00:00
Daniel Kahn Gillmor
5a21cadbeb
use SSL_kDHE throughout instead of SSL_kEDH
...
DHE is the standard term used by the RFCs and by other TLS
implementations. It's useful to have the internal variables use the
standard terminology.
This patch leaves a synonym SSL_kEDH in place, though, so that older
code can still be built against it, since that has been the
traditional API. SSL_kEDH should probably be deprecated at some
point, though.
2014-01-09 15:43:28 +00:00
Daniel Kahn Gillmor
75cb3771b4
emit "DHE" instead of "edh" for kX packet trace output
...
other parts of packet tracing emit the standard "DHE" label instead of
"edh". This change brings the output of ssl_print_client_keyex() and
ssl_print_server_keyex() into accordance with the standard term.
2014-01-09 15:43:27 +00:00
Daniel Kahn Gillmor
7988163c3b
Allow "DHE" and "kDHE" as synonyms of "EDH" and "kEDH" when specifiying ciphers
...
The standard terminology in https://tools.ietf.org/html/rfc5426 is
"DHE". "openssl ciphers" outputs "DHE" (for the most part). But
users of the library currently cannot specify "DHE", they must
currently specify "EDH".
This change allows users to specify the common term in cipher suite
strings without breaking backward compatibility.
2014-01-09 15:43:27 +00:00
Daniel Kahn Gillmor
4082fea81c
use SSL_kECDHE throughout instead of SSL_kEECDH
...
ECDHE is the standard term used by the RFCs and by other TLS
implementations. It's useful to have the internal variables use the
standard terminology.
This patch leaves a synonym SSL_kEECDH in place, though, so that older
code can still be built against it, since that has been the
traditional API. SSL_kEECDH should probably be deprecated at some
point, though.
2014-01-09 15:43:27 +00:00
Daniel Kahn Gillmor
0be085d34a
emit "ECDHE" instead of "EECDH" for kX packet trace output
...
other parts of packet tracing emit the standard "ECDHE" label instead
of "EECDH". This change brings the output of ssl_print_client_keyex()
and ssl_print_server_keyex() into accordance with the standard term.
2014-01-09 15:43:27 +00:00
Daniel Kahn Gillmor
7963ddeb44
Allow "ECDHE" as a synonym of "EECDH" when specifiying ciphers
...
The standard terminology in https://tools.ietf.org/html/rfc4492 is
ECDHE. "openssl ciphers" outputs ECDHE. But users of the library
currently cannot specify ECDHE, they must specify EECDH.
This change allows users to specify the common term in cipher suite
strings without breaking backward compatibility.
2014-01-09 15:43:27 +00:00
Andy Polyakov
eedab5241e
bn/asm/x86_64-mont5.pl: fix compilation error on Solaris.
2014-01-09 13:44:59 +01:00
Dr. Stephen Henson
e02614417d
update FAQ
2014-01-08 14:16:24 +00:00
Andy Polyakov
5dc52b919b
PPC assembly pack: relax 64-bit requirement for little-endian support.
2014-01-07 22:44:21 +01:00
Andy Polyakov
1fb83a3bc2
aes/asm/vpaes-ppc.pl: add little-endian support.
2014-01-07 16:48:04 +01:00
Dr. Stephen Henson
f0170ebb97
update NEWS
2014-01-07 15:44:35 +00:00
Dr. Stephen Henson
8d65fdb62e
Add fix for CVE-2013-4353
...
(cherry picked from commit 6b42ed4e7104898f4b5b69337589719913b36404)
2014-01-07 15:39:21 +00:00
Dr. Stephen Henson
9bd1e2b54a
Sync NEWS.
2014-01-06 21:55:15 +00:00
Andy Polyakov
ad0d2579cf
sha/asm/sha256-armv4.pl: add NEON code path.
...
(and shave off cycle even from integer-only code)
2014-01-04 18:04:53 +01:00
Andy Polyakov
25f7117f0e
aesni-sha1-x86_64.pl: refine Atom-specific optimization.
...
(and update performance data, and fix typo)
2014-01-04 17:13:57 +01:00
Dr. Stephen Henson
5b7f36e857
Add ServerInfoFile to SSL_CONF, update docs.
2014-01-03 23:14:23 +00:00
Dr. Stephen Henson
a4339ea3ba
Use algorithm specific chains for certificates.
...
Fix a limitation in SSL_CTX_use_certificate_chain_file(): use algorithm
specific chains instead of the shared chain.
Update docs.
2014-01-03 22:39:49 +00:00
Andy Polyakov
e8b0dd57c0
ssl/t1_enc.c: optimize PRF (suggested by Intel).
2014-01-03 21:52:49 +01:00
Andy Polyakov
2f3af3dc36
aesni-sha1-x86_64.pl: add stiched decrypt procedure,
...
but keep it disabled, too little gain... Add some Atom-specific
optimization.
2014-01-03 21:40:08 +01:00
Dr. Stephen Henson
b77b58a398
Don't change version number if session established
...
When sending an invalid version number alert don't change the
version number to the client version if a session is already
established.
Thanks to Marek Majkowski for additional analysis of this issue.
PR#3191
2014-01-02 15:05:44 +00:00
Dr. Stephen Henson
f6dfbeed3c
Update curve list size.
...
(cherry picked from commit cfa86987a8d9d2b8cc5e5fea2d3260c46542cdb9)
2013-12-29 16:30:35 +00:00
Andy Polyakov
926725b3d7
sparcv9cap.c: omit random detection.
...
PR: 3202
2013-12-28 13:31:14 +01:00
Andy Polyakov
e796666d34
FAQ: why SIGILL?
2013-12-28 13:20:14 +01:00
Andy Polyakov
2218c296b4
ARM assembly pack: make it work with older toolchain.
2013-12-28 12:17:08 +01:00
Dr. Stephen Henson
cd30f03ac5
Canonicalise input in CMS_verify.
...
If content is detached and not binary mode translate the input to
CRLF format. Before this change the input was verified verbatim
which lead to a discrepancy between sign and verify.
2013-12-22 00:35:29 +00:00
Dr. Stephen Henson
20b82b514d
Fix DTLS retransmission from previous session.
...
For DTLS we might need to retransmit messages from the previous session
so keep a copy of write context in DTLS retransmission buffers instead
of replacing it after sending CCS. CVE-2013-6450.
(cherry picked from commit 34628967f1 )
2013-12-20 23:46:16 +00:00
Dr. Stephen Henson
560b34f2b0
Ignore NULL parameter in EVP_MD_CTX_destroy.
...
(cherry picked from commit a6c62f0c25 )
2013-12-20 23:32:25 +00:00
Andy Polyakov
fc0503a25c
sha1-x86_64.pl: harmonize Win64 SE handlers for SIMD code pathes.
...
(and ensure stack alignment in the process)
2013-12-18 22:12:08 +01:00
Andy Polyakov
e9c80e04c1
evp/e_[aes|camellia].c: fix typo in CBC subroutine.
...
It worked because it was never called.
2013-12-18 21:42:46 +01:00
Andy Polyakov
f0f4b8f126
PPC assembly pack update addendum.
2013-12-18 21:39:15 +01:00
Andy Polyakov
cdd1acd788
sha512.c: fullfull implicit API contract in SHA512_Transform.
...
SHA512_Transform was initially added rather as tribute to tradition
than for practucal reasons. But use was recently found in ssl/s3_cbc.c
and it turned to be problematic on platforms that don't tolerate
misasligned references to memory and lack assembly subroutine.
2013-12-18 21:27:35 +01:00
Andy Polyakov
128e1d101b
PPC assembly pack: improve AIX support (enable vpaes-ppc).
2013-12-18 21:19:08 +01:00
Dr. Stephen Henson
ed496b3d42
Check EVP errors for handshake digests.
...
Partial mitigation of PR#3200
(cherry picked from commit 0294b2be5f )
2013-12-18 13:29:07 +00:00
Dr. Stephen Henson
88c21c47a3
Update demo.
2013-12-18 13:28:44 +00:00
Dr. Stephen Henson
4a253652ee
Add opaque ID structure.
...
Move the IP, email and host checking fields from the public
X509_VERIFY_PARAM structure into an opaque X509_VERIFY_PARAM_ID
structure. By doing this the structure can be modified in future
without risk of breaking any applications.
(cherry picked from commit adc6bd73e3 )
Conflicts:
crypto/x509/x509_vpm.c
2013-12-13 15:42:16 +00:00
Dr. Stephen Henson
4fcdd66fff
Update to pad extension.
...
Fix padding calculation for different SSL_METHOD types. Use the
standard name as used in draft-agl-tls-padding-02
2013-12-13 15:39:55 +00:00
Dr. Stephen Henson
102302b05b
Fix for partial chain notification.
...
For consistency with other cases if we are performing
partial chain verification with just one certificate
notify the callback with ok==1.
(cherry picked from commit 852553d9005e13aed7feb986a5d71cb885b994c7)
2013-12-13 15:39:55 +00:00
Dr. Stephen Henson
7af31968dd
Verify parameter retrieval functions.
...
New functions to retrieve internal pointers to X509_VERIFY_PARAM
for SSL_CTX and SSL structures.
(cherry picked from commit be0c9270690ed9c1799900643cab91de146de857)
2013-12-13 15:39:55 +00:00
Dr. Stephen Henson
8a1956f3ea
Don't use rdrand engine as default unless explicitly requested.
...
(cherry picked from commit 16898401bd47a153fbf799127ff57fdcfcbd324f)
2013-12-13 15:39:55 +00:00
Dr. Stephen Henson
e3bc1f4955
remove obsolete STATUS file
2013-12-10 00:10:05 +00:00
Dr. Stephen Henson
57d7ee3a91
Add release dates to NEWS
2013-12-10 00:08:34 +00:00
Andy Polyakov
41965a84c4
x86_64-xlate.pl: minor update.
2013-12-09 21:23:19 +01:00
Andy Polyakov
ec9cc70f72
bn/asm/x86_64-mont5.pl: add MULX/AD*X code path.
...
This also eliminates code duplication between x86_64-mont and x86_64-mont
and optimizes even original non-MULX code.
2013-12-09 21:02:24 +01:00
Andy Polyakov
d1671f4f1a
bn/asm/armv4-mont.pl: add NEON code path.
2013-12-04 22:37:49 +01:00
Andy Polyakov
26e18383ef
perlasm/ppc-xlate.pl: add support for AltiVec/VMX and VSX.
...
Suggested by: Marcello Cerri
2013-12-04 22:01:31 +01:00
Andy Polyakov
f586d97191
perlasm/ppc-xlate.pl: improve linux64le support.
...
Suggested by: Marcello Cerri
2013-12-04 21:47:43 +01:00
Andy Polyakov
a61e51220f
aes/asm/vpaes-ppc.pl: comply with ABI.
2013-12-04 21:46:40 +01:00
Andy Polyakov
34b1008c93
Configure: remove vpaes-ppc from aix targets.
...
AIX assembler doesn't hanle .align, which is essential for vpaes module.
2013-12-04 21:45:20 +01:00
Andy Polyakov
c5d5f5bd0f
bn/asm/x86_64-mont5.pl: comply with Win64 ABI.
...
PR: 3189
Submitted by: Oscar Ciurana
2013-12-03 23:59:55 +01:00
Andy Polyakov
8bd7ca9996
crypto/bn/asm/rsaz-x86_64.pl: make it work on Win64.
2013-12-03 22:28:48 +01:00
Andy Polyakov
31ed9a2131
crypto/bn/rsaz*: fix licensing note.
...
rsaz_exp.c: harmonize line terminating;
asm/rsaz-*.pl: minor optimizations.
2013-12-03 22:08:29 +01:00
Andy Polyakov
6efef384c6
bn/asm/rsaz-x86_64.pl: fix prototype.
2013-12-03 09:43:06 +01:00
Dr. Stephen Henson
4b27bab993
Simplify and update openssl.spec
2013-11-30 14:11:05 +00:00
Andy Polyakov
89bb96e51d
vpaes-ppc.pl: fix bug in IV handling and comply with ABI.
2013-11-29 14:40:51 +01:00
Andy Polyakov
b9e87d07cb
ppc64-mont.pl: eliminate dependency on GPRs' upper halves.
2013-11-27 22:50:00 +01:00
Andy Polyakov
07f3e4f3f9
Take vpaes-ppc module into loop.
2013-11-27 22:39:13 +01:00
Andy Polyakov
b5c54c914f
Add Vector Permutation AES for PPC.
2013-11-27 22:32:56 +01:00
Dr. Stephen Henson
a25f9adc77
New functions to retrieve certificate from SSL_CTX
...
New functions to retrieve current certificate or private key
from an SSL_CTX.
Constify SSL_get_private_key().
2013-11-18 18:56:48 +00:00
Dr. Stephen Henson
60aeb18750
Don't define SSL_select_next_proto if OPENSSL_NO_TLSEXT set
2013-11-18 16:52:10 +00:00
Dr. Stephen Henson
fdeaf55bf9
Use correct header length in ssl3_send_certifcate_request
2013-11-17 17:48:18 +00:00
Dr. Stephen Henson
0f7fa1b190
Constify.
...
(cherry picked from commit 1abfa78a8b )
2013-11-14 21:05:36 +00:00
Piotr Sikora
2911575c6e
Fix compilation with no-nextprotoneg.
...
PR#3106
2013-11-14 01:20:12 +00:00
Dr. Stephen Henson
afa23c46d9
Flag to disable automatic copying of contexts.
...
Some functions such as EVP_VerifyFinal only finalise a copy of the passed
context in case an application wants to digest more data. Doing this when
it is not needed is inefficient and many applications don't require it.
For compatibility the default is to still finalise a copy unless the
flag EVP_MD_CTX_FLAG_FINALISE is set in which case the passed
context is finalised an *no* further data can be digested after
finalisation.
2013-11-13 23:48:35 +00:00
Dr. Stephen Henson
629b640bbc
Allow match selecting of current certificate.
...
If pointer comparison for current certificate fails check
to see if a match using X509_cmp succeeds for the current
certificate: this is useful for cases where the certificate
pointer is not available.
2013-11-13 23:48:35 +00:00
Rob Stradling
7b6b246fd3
Additional "chain_cert" functions.
...
PR#3169
This patch, which currently applies successfully against master and
1_0_2, adds the following functions:
SSL_[CTX_]select_current_cert() - set the current certificate without
disturbing the existing structure.
SSL_[CTX_]get0_chain_certs() - get the current certificate's chain.
SSL_[CTX_]clear_chain_certs() - clear the current certificate's chain.
The patch also adds these functions to, and fixes some existing errors
in, SSL_CTX_add1_chain_cert.pod.
2013-11-13 23:48:35 +00:00
Krzysztof Kwiatkowski
44314cf64d
Delete duplicate entry.
...
PR#3172
2013-11-13 23:48:35 +00:00
Andy Polyakov
f1982acc12
Configure: add linux-ppc64le target.
...
Submitted by: Marcelo Cerri
2013-11-12 22:36:24 +01:00
Andy Polyakov
2df9ec01d5
srp/srp_grps.h: make it Compaq C-friendly.
...
PR: 3165
Submitted by: Daniel Richard G.
2013-11-12 22:09:55 +01:00
Andy Polyakov
5b63a39241
modes/asm/ghash-alpha.pl: fix typo.
2013-11-12 21:52:18 +01:00
Andy Polyakov
d1cf23ac86
Make Makefiles OSF-make-friendly.
...
PR: 3165
2013-11-12 21:51:37 +01:00
Dr. Stephen Henson
16bc45ba95
Fix memory leak.
2013-11-11 22:39:40 +00:00
Dr. Stephen Henson
85c9ba2342
Support setting of "no purpose" for trust.
...
If the oid parameter is set to NULL in X509_add1_trust_object
create an empty list of trusted purposes corresponding to
"no purpose" if trust is checked.
2013-11-11 22:39:23 +00:00
Dr. Stephen Henson
5fad2c93bc
Update FAQ
2013-11-11 22:25:00 +00:00
Andy Polyakov
d0f1d924ad
Makfile.org: make FIPS build work with BSD make.
2013-11-10 23:09:22 +01:00
Dr. Stephen Henson
9b69a63874
Update FAQ with PGP note.
2013-11-10 16:46:54 +00:00
Dr. Stephen Henson
dd274b1c1c
Fix for some platforms where "char" is unsigned.
2013-11-09 15:09:23 +00:00
Dr. Stephen Henson
9c75461bef
Document RSAPublicKey_{in,out} options.
2013-11-09 15:09:23 +00:00
Dr. Stephen Henson
da15c61608
Add CMS_SignerInfo_get0_signature function.
...
Add function to retrieve the signature from a CMS_SignerInfo structure:
applications can then read or modify it.
2013-11-09 15:09:23 +00:00
Dr. Stephen Henson
534e5fabad
Check for missing components in RSA_check.
2013-11-09 15:09:23 +00:00
Andy Polyakov
33446493f4
modes/asm/ghash-alpha.pl: make it work with older assembler for real.
...
PR: 3165
2013-11-09 11:41:59 +01:00
Andy Polyakov
96180cac04
engines/ccgost/gost89.h: make word32 defintion unconditional.
...
Original definition depended on __LONG_MAX__ that is not guaranteed to
be present. As we don't support platforms with int narrower that 32 bits
it's appropriate to make defition inconditional.
PR: 3165
2013-11-08 23:00:35 +01:00
Andy Polyakov
d24d1d7daf
modes/asm/ghash-alpha.pl: make it work with older assembler.
...
PR: 3165
2013-11-08 22:56:44 +01:00
Dr. Stephen Henson
0467ea6862
Experimental workaround TLS filler (WTF) extension.
...
Based on a suggested workaround for the "TLS hang bug" (see FAQ and PR#2771):
if the TLS Client Hello record length value would otherwise be > 255 and less
that 512 pad with a dummy extension containing zeroes so it is at least 512.
To enable it use an unused extension number (for example 0x4242) using
e.g. -DTLSEXT_TYPE_wtf=0x4242
WARNING: EXPERIMENTAL, SUBJECT TO CHANGE.
2013-11-06 20:49:47 +00:00
Dr. Stephen Henson
e0ffd129c1
Enable PSK in FIPS mode.
...
Enable PSK ciphersuites with AES or DES3 in FIPS mode.
2013-11-06 14:38:28 +00:00
Dr. Stephen Henson
26bda7ef2b
Sync error codes with 1.0.2-stable
2013-11-06 14:18:41 +00:00
Dr. Stephen Henson
b0513fd2bb
Initialise context before using it.
...
(cherry picked from commit a4947e4e06 )
2013-11-06 13:19:13 +00:00
Ben Laurie
c10e3f0cff
PBKDF2 should be efficient. Contributed by Christian Heimes
...
<christian@python.org >.
2013-11-03 17:23:50 +00:00
Dr. Stephen Henson
d519f0831c
Add brainpool curves to trace output.
...
(cherry picked from commit bd80d0229c )
2013-11-02 15:30:03 +00:00
Robin Seggelmann
b814081136
DTLS/SCTP struct authchunks Bug
...
PR: 2809
DTLS/SCTP requires DATA and FORWARD-TSN chunks to be protected with
SCTP-AUTH. It is checked if this has been activated successfully for
the local and remote peer. Due to a bug, however, the
gauth_number_of_chunks field of the authchunks struct is missing on
FreeBSD, and was therefore not considered in the OpenSSL implementation.
This patch sets the corresponding pointer for the check correctly
whether or not this bug is present.
(cherry picked from commit f596e3c491 )
2013-11-01 21:41:52 +00:00
Robin Seggelmann
b9ef52b078
DTLS/SCTP Finished Auth Bug
...
PR: 2808
With DTLS/SCTP the SCTP extension SCTP-AUTH is used to protect DATA and
FORWARD-TSN chunks. The key for this extension is derived from the
master secret and changed with the next ChangeCipherSpec, whenever a new
key has been negotiated. The following Finished then already uses the
new key. Unfortunately, the ChangeCipherSpec and Finished are part of
the same flight as the ClientKeyExchange, which is necessary for the
computation of the new secret. Hence, these messages are sent
immediately following each other, leaving the server very little time to
compute the new secret and pass it to SCTP before the finished arrives.
So the Finished is likely to be discarded by SCTP and a retransmission
becomes necessary. To prevent this issue, the Finished of the client is
still sent with the old key.
(cherry picked from commit 9fb523adce )
2013-11-01 21:41:52 +00:00
Piotr Sikora
29b490a458
Fix SSL_OP_SINGLE_ECDH_USE
...
Don't require a public key in tls1_set_ec_id if compression status is
not needed. This fixes a bug where SSL_OP_SINGLE_ECDH_USE wouldn't work.
(cherry picked from commit 5ff68e8f6d )
2013-11-01 21:41:52 +00:00
Dr. Stephen Henson
a9bc1af984
Add -ecdh_single option.
...
Add -ecdh_single option to set SSL_OP_SINGLE_ECDH_USE on the command line.
(cherry picked from commit f14a4a861d )
2013-11-01 21:41:52 +00:00
Dr. Stephen Henson
96e16bddb4
Fix warning.
2013-11-01 21:41:52 +00:00
Dr. Stephen Henson
3f9b187bae
Fix warning.
2013-11-01 21:41:52 +00:00
Andy Polyakov
fb65e65e28
sha/asm/sha512-ppc.pl: fix typo.
...
Submitted by: Marcelo Cerri
2013-10-31 20:21:54 +01:00
Andy Polyakov
0e0a105364
perlas/ppc-xlate.pl: fix typo.
2013-10-31 11:58:50 +01:00
Andy Polyakov
c944f81703
aes/asm/aes-ppc.pl: add little-endian support.
...
Submitted by: Marcelo Cerri
2013-10-31 11:41:26 +01:00
Andy Polyakov
8ff8a829b0
perlasm/ppc-xlate.pl: add .quad directive
...
sha/asm/sha512-ppc.pl: add little-endian support.
Submitted by: Marcelo Cerri
2013-10-31 11:08:51 +01:00
Andy Polyakov
3f9562a669
sha/asm/sha1-ppc.pl: add little-endian support.
...
Submitted by: Marcelo Cerri
2013-10-31 11:07:38 +01:00
Andy Polyakov
e6e29bc4c9
engines/e_aep.c: make it BN_ULONG-size and endian "neutral".
2013-10-28 22:18:48 +01:00
Andy Polyakov
4eeb750d20
bn/asm/x86_64-mont.pl: minor optimization [for Decoded ICache].
2013-10-25 10:14:20 +02:00
Lubomir Rintel
ed77017b59
POD: Fix list termination
...
This fixes problems in POD list formatting: extra or missing =back
sequences.
doc/ssl/SSL_CTX_set1_curves.pod around line 90: =back without =over
doc/ssl/SSL_CTX_set1_verify_cert_store.pod around line 73: =back without =over
doc/ssl/SSL_CTX_add1_chain_cert.pod around line 82: =back without =over
doc/crypto/evp.pod around line 40: '=item' outside of any '=over'
crypto/des/des.pod around line 184: You forgot a '=back' before '=head1'
PR#3147
2013-10-22 07:38:25 +01:00
Lubomir Rintel
c8919dde09
POD: Fix item numbering
...
Newer pod2man considers =item [1-9] part of a numbered list, while =item
0 starts an unnumbered list. Add a zero effect formatting mark to override
this.
doc/apps/smime.pod around line 315: Expected text after =item, not a
number
...
PR#3146
2013-10-22 07:38:25 +01:00
Dr. Stephen Henson
5fdeb58ccd
Update test server details.
2013-10-22 07:38:25 +01:00
Dr. Stephen Henson
c557f921dc
Add SSL_CONF command to set DH Parameters.
2013-10-22 07:38:25 +01:00
Dr. Stephen Henson
abf840e4f7
Fix argument processing.
2013-10-22 05:44:23 +01:00
Dr. Stephen Henson
27f3b65f49
Constification.
2013-10-21 07:19:01 +01:00
Dr. Stephen Henson
ea131a0644
Update demos/bio/README
2013-10-21 03:51:44 +01:00
Ben Laurie
9f944107a9
Remove unused variable.
2013-10-21 03:37:20 +01:00
Nick Mathewson
2927791d77
Fix another gmt_unix_time case in server_random
2013-10-21 03:37:20 +01:00
Nick Mathewson
2016265dfb
Do not include a timestamp in the Client/ServerHello Random field.
...
Instead, send random bytes, unless SSL_SEND_{CLIENT,SERVER}RANDOM_MODE
is set.
This is a forward-port of commits:
4af793036f
f4c93b46ed
3da721dac9
2583270191
While the gmt_unix_time record was added in an ostensible attempt to
mitigate the dangers of a bad RNG, its presence leaks the host's view
of the current time in the clear. This minor leak can help
fingerprint TLS instances across networks and protocols... and what's
worse, it's doubtful thet the gmt_unix_time record does any good at
all for its intended purpose, since:
* It's quite possible to open two TLS connections in one second.
* If the PRNG output is prone to repeat itself, ephemeral
handshakes (and who knows what else besides) are broken.
2013-10-21 03:37:20 +01:00
Dr. Stephen Henson
f3efeaad54
Fix various typos.
2013-10-20 22:31:00 +01:00
Dr. Stephen Henson
d80b0eeee5
Modify sample accept.cnf
2013-10-20 22:21:52 +01:00
Steve Marquess
372566bd99
Remove gratuitous patent references
2013-10-20 22:21:52 +01:00
Dr. Stephen Henson
ebd14bfce9
Add demo for SSL server using SSL_CONF.
2013-10-20 22:21:52 +01:00
Dr. Stephen Henson
ec2f7e568e
Extend SSL_CONF
...
Extend SSL_CONF to return command value types.
Add certificate and key options.
Update documentation.
2013-10-20 22:07:36 +01:00
Dr. Stephen Henson
13af145159
Typo.
2013-10-20 22:07:36 +01:00
Dr. Stephen Henson
c051e521a7
Time value for various platforms.
...
The function gettimeofday() is not supported on all platforms. Use
more portable versions. Adapted from FIPS code.
2013-10-20 22:07:36 +01:00
Dr. Stephen Henson
45473632c5
Prevent use of RSA+MD5 in TLS 1.2 by default.
...
Removing RSA+MD5 from the default signature algorithm list
prevents its use by default.
If a broken implementation attempts to use RSA+MD5 anyway the sanity
checking of signature algorithms will cause a fatal alert.
2013-10-20 22:07:35 +01:00
Ben Laurie
b39d4768e6
Add clang debug target.
2013-10-20 13:10:25 +01:00
Andy Polyakov
76c15d790e
PPC assembly pack: make new .size directives profiler-friendly.
...
Suggested by: Anton Blanchard
2013-10-15 23:40:12 +02:00
Dr. Stephen Henson
6699cb8491
Add brainpool curves to NID table too.
2013-10-15 12:08:47 +01:00
Dr. Stephen Henson
579a759071
Fix warning.
2013-10-15 11:33:30 +01:00
Dr. Stephen Henson
da317b94d9
Add test vectors from RFC7027
2013-10-15 11:33:30 +01:00
Dr. Stephen Henson
c2c76a4d90
RFC7027 (Brainpool for TLS) support.
2013-10-15 11:33:30 +01:00
Dr. Stephen Henson
7f5fd314c0
Sync OID numbers with 1.0.2 branch.
2013-10-15 11:33:30 +01:00
Andy Polyakov
d6019e1654
PPC assembly pack: add .size directives.
2013-10-15 00:14:39 +02:00
Andy Polyakov
30b9c2348d
bn/asm/*x86_64*.pl: correct assembler requirement for ad*x.
2013-10-14 22:41:00 +02:00
Andy Polyakov
039081b809
Initial aarch64 bits.
2013-10-13 19:15:15 +02:00
Andy Polyakov
0c2adb0a9b
MIPS assembly pack: get rid of deprecated instructions.
...
Latest MIPS ISA specification declared 'branch likely' instructions
obsolete. To makes code future-proof replace them with equivalent.
2013-10-13 13:14:52 +02:00
Andy Polyakov
b4f0abd246
evp/e_aes_cbc_hmac_sha*.c: limit multi-block fragmentation to 1KB.
...
Excessive fragmentation put additional burden (of addtional MAC
calculations) on the other size and limiting fragments it to 1KB
limits the overhead to ~6%.
2013-10-12 22:10:28 +02:00
Andy Polyakov
7e1e3334f6
aes/asm/bsaes-x86_64.pl: fix Windows-specific bug in XTS.
...
PR: 3139
2013-10-12 21:37:55 +02:00
Andy Polyakov
fa104be35e
bn/asm/rsax-avx2.pl: minor optimization [for Decoded ICache].
2013-10-10 23:06:43 +02:00
Andy Polyakov
37de2b5c1e
bn/bn_exp.c: prefer MULX/AD*X over AVX2.
2013-10-09 11:08:52 +02:00
Andy Polyakov
2d752737c5
Configure: recognize experimental-multiblock.
2013-10-08 23:41:31 +02:00
Andy Polyakov
78038e095f
ssl/s3_pkt.c: add initial multi-block encrypt.
2013-10-08 23:40:09 +02:00
Andy Polyakov
a69c0a1be5
evp/e_aes_cbc_hmac_sha*.c: harmonize names, fix bugs.
2013-10-08 23:39:26 +02:00
Andy Polyakov
b1de640f03
evp/evp.h: add multi-block contstants and parameter type.
2013-10-08 23:38:05 +02:00
Andy Polyakov
61ba602af5
sha/asm/sha*-mb-x86_64.pl: commentary update.
2013-10-08 23:36:55 +02:00
Ben Laurie
c45a48c186
Constification.
2013-10-07 12:45:26 +01:00
Andy Polyakov
6f6a613032
aes/asm/bsaes-*.pl: improve decrypt performance.
...
Improve decrypt performance by 10-20% depending on platform. Thanks
to Jussi Kivilinna for providing valuable hint. Also thanks to Ard
Biesheuvel.
2013-10-03 23:08:31 +02:00
Ben Laurie
99fb221280
Support new asm files.
2013-10-03 11:37:18 +01:00
Andy Polyakov
524b00c0da
evp/e_des3.c: fix typo with potential integer overflow on 32-bit platforms.
...
Submitted by: Yuriy Kaminskiy
2013-10-03 10:55:49 +02:00
Andy Polyakov
6b2cae0c16
perlasm/sparcv9_modes.pl: make it work even with seasoned perl.
...
PR: 3130
2013-10-03 10:42:11 +02:00
Andy Polyakov
a5bb5bca52
bn/asm/x86_64-mont*.pl: add MULX/ADCX/ADOX code path.
2013-10-03 00:45:04 +02:00
Andy Polyakov
87954638a6
rsaz-x86_64.pl: add MULX/ADCX/ADOX code path.
2013-10-03 00:30:12 +02:00
Andy Polyakov
667053a2f3
x86_64-xlate.pl: fix jrcxz in nasm case.
2013-10-03 00:26:09 +02:00
Andy Polyakov
7f893258f6
evp/e_aes_cbc_hmac_sha*.c: multi-block glue code.
2013-10-03 00:24:03 +02:00
Andy Polyakov
6bcb68da41
Configire: take multi-block modules into build loop.
2013-10-03 00:21:10 +02:00
Andy Polyakov
b783858654
x86_64 assembly pack: add multi-block AES-NI, SHA1 and SHA256.
2013-10-03 00:18:58 +02:00
Andy Polyakov
5f487e0317
evp/e_aes_cbc_hmac_sha256.c: enable is on all AES-NI platforms, not only on AVX.
2013-10-03 00:16:51 +02:00
Andy Polyakov
066caf0551
aes/asm/*-armv*.pl: compensate for inconsistencies in tool-chains.
...
Suggested by: Ard Biesheuvel
2013-10-01 20:33:06 +02:00
Ben Laurie
70d416ec35
Produce PEM we would consume.
2013-09-25 13:57:36 +01:00
Ben Laurie
9725bda766
Show useful errors.
...
Conflicts:
apps/s_server.c
2013-09-25 12:45:48 +01:00
Ben Laurie
3cd8547a20
Mix time into the pool to avoid repetition of the Android duplicated PID problem.
2013-09-20 16:52:07 +01:00
Ben Laurie
7eef2b0cd7
Merge remote-tracking branch 'trevp/pemfix' into trev-pem-fix
2013-09-20 14:39:33 +01:00
Ben Laurie
79b9209883
More diagnostics for invalid OIDs.
2013-09-20 14:38:36 +01:00
Andy Polyakov
e0202d946d
aes-armv4.pl, bsaes-armv7.pl: add Linux kernel and Thumb2 support.
...
Submitted by: Ard Biesheuvel
2013-09-20 13:22:57 +02:00
Dr. Stephen Henson
94c2f77a62
Add functions to set ECDSA_METHOD structure.
...
Add various functions to allocate and set the fields of an ECDSA_METHOD
structure.
2013-09-18 01:22:50 +01:00
Dr. Stephen Henson
9600602267
Fix error code clashes.
2013-09-18 01:22:50 +01:00
Dr. Stephen Henson
40088d8b81
DTLS version usage fixes.
...
Make DTLS behave like TLS when negotiating version: record layer has
DTLS 1.0, message version is 1.2.
Tolerate different version numbers if version hasn't been negotiated
yet.
2013-09-17 18:55:41 +01:00
Bodo Moeller
7d3ba88a98
Move change note for SSL_OP_SAFARI_ECDHE_ECDSA_BUG.
...
(This went into 1.0.2 too, so it's not actually a change
between 1.0.x and 1.1.0.)
2013-09-17 10:06:34 +02:00
Bodo Moeller
cdf84b719c
Move the change note for partial chain verification: this is code from
...
the main branch (http://cvs.openssl.org/chngview?cn=19322 ) later added
to the 1.0.2 branch (http://cvs.openssl.org/chngview?cn=23113 ), and
thus not a change "between 1.0.2 and 1.1.0".
2013-09-17 09:48:23 +02:00
Trevor Perrin
92acab0b6a
Redo deletion of some serverinfo code that supplemental data code mistakenly reinstated.
2013-09-16 17:28:57 +01:00
Bodo Moeller
4dc836773e
Sync CHANGES and NEWS files.
...
(Various changes from the master branch are now in the 1.0.2 branch too.)
2013-09-16 14:55:03 +02:00
Bodo Moeller
ca567a03ad
Fix overly lenient comparisons:
...
- EC_GROUP_cmp shouldn't consider curves equal just because
the curve name is the same. (They really *should* be the same
in this case, but there's an EC_GROUP_set_curve_name API,
which could be misused.)
- EC_POINT_cmp shouldn't return 0 for ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED
or EC_R_INCOMPATIBLE_OBJECTS errors because in a cmp API, 0 indicates
equality (not an error).
Reported by: king cope
2013-09-16 12:59:21 +02:00
Andy Polyakov
8e52a9063a
crypto/armcap.c: fix typo in rdtsc subroutine.
...
PR: 3125
Submitted by: Kyle McMartin
2013-09-15 22:07:49 +02:00
Andy Polyakov
b3ef742cbb
Add support for Cygwin-x86_64.
...
PR: 3110
Submitted by Corinna Vinschen.
2013-09-15 22:01:23 +02:00
Andy Polyakov
612f4e2384
bsaes-armv7.pl: remove partial register operations in CTR subroutine.
2013-09-15 19:47:51 +02:00
Andy Polyakov
29f41e8a80
bsaes-armv7.pl: remove byte order dependency and minor optimization.
2013-09-15 19:44:43 +02:00
Ard Biesheuvel
a2ea9f3ecc
Added support for ARM/NEON based bit sliced AES in XTS mode
...
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org >
2013-09-15 19:37:16 +02:00
Trevor Perrin
deda5ea788
Update docs to mention "BEGIN SERVERINFO FOR ".
2013-09-13 19:48:09 -07:00
Trevor Perrin
c655f40ed2
Require ServerInfo PEMs to be named "BEGIN SERVERINFO FOR"...
2013-09-13 19:32:55 -07:00
Trevor Perrin
9103197591
Redo deletion of some serverinfo code that supplemental data code mistakenly reinstated.
2013-09-13 18:31:48 -07:00
Rob Stradling
785da0e610
Update CHANGES.
2013-09-13 18:15:56 +01:00
Rob Stradling
cbf8123512
Tidy up comments.
2013-09-13 16:24:22 +01:00
Rob Stradling
378341e192
Use TLS version supplied by client when fingerprinting Safari.
2013-09-13 16:24:22 +01:00
Rob Stradling
d89cd382da
Fix compilation with no-ec and/or no-tlsext.
2013-09-13 16:24:22 +01:00
Mat
5628ec6673
typo
2013-09-13 14:29:36 +01:00
Scott Deboy
b0d27cb902
Initialize next_proto in s_server - resolves incorrect attempts to free
2013-09-11 17:22:00 -07:00
Ben Laurie
edf92f1c41
Constification.
2013-09-10 18:04:08 +01:00
Andy Polyakov
7a1a12232a
crypto/modes/asm/aesni-gcm-x86_64.pl: minor optimization.
...
Avoid occasional up to 8% performance drops.
2013-09-09 21:43:21 +02:00
Andy Polyakov
72a158703b
crypto/bn/asm/x86_64-mont.pl: minor optimization.
2013-09-09 21:40:33 +02:00
Dr. Stephen Henson
ce4555967e
Remove ancient PATENTS section and FAQ reference.
2013-09-08 21:24:02 +01:00
Dr. Stephen Henson
52073b7675
Partial path fix.
...
When verifying a partial path always check to see if the EE certificate
is explicitly trusted: the path could contain other untrusted certificates.
2013-09-08 19:26:59 +01:00
Dr. Stephen Henson
a6e7d1c0e3
Document extension clash.
2013-09-08 15:10:46 +01:00
Dr. Stephen Henson
5e3ff62c34
Experimental encrypt-then-mac support.
...
Experimental support for encrypt then mac from
draft-gutmann-tls-encrypt-then-mac-02.txt
To enable it set the appropriate extension number (0x10 for the test server)
using e.g. -DTLSEXT_TYPE_encrypt_then_mac=0x10
For non-compliant peers (i.e. just about everything) this should have no
effect.
2013-09-08 13:14:03 +01:00
Dr. Stephen Henson
226751ae4a
Set TLS v1.2 disabled mask properly.
2013-09-08 00:09:39 +01:00
Ben Laurie
1769dfab06
Const fix.
2013-09-06 14:03:28 +01:00
Scott Deboy
67c408cee9
Free generated supp data after handshake completion, add comment regarding use of num_renegotiations in TLS and supp data generation callbacks
2013-09-06 13:59:14 +01:00
Ben Laurie
5eda213ebe
More cleanup.
2013-09-06 13:59:14 +01:00
Ben Laurie
a6a48e87bc
Make it build.
2013-09-06 13:59:13 +01:00
Scott Deboy
36086186a9
Add callbacks supporting generation and retrieval of supplemental data entries, facilitating RFC 5878 (TLS auth extensions)
...
Removed prior audit proof logic - audit proof support was implemented using the generic TLS extension API
Tests exercising the new supplemental data registration and callback api can be found in ssltest.c.
Implemented changes to s_server and s_client to exercise supplemental data callbacks via the -auth argument, as well as additional flags to exercise supplemental data being sent only during renegotiation.
2013-09-06 13:59:13 +01:00
Ben Laurie
cda01d55ba
s/recommend/recommended/
2013-09-05 21:43:50 +01:00
Veres Lajos
478b50cf67
misspellings fixes by https://github.com/vlajos/misspell_fixer
2013-09-05 21:39:42 +01:00
Ben Laurie
d2625fd657
Clean up layout.
2013-09-05 17:28:05 +01:00
Carlos Alberto Lopez Perez
b98af49d97
Add an "-xmpphost" option to s_client
...
* Many XMPP servers are configured with multiple domains (virtual hosts)
* In order to establish successfully the TLS connection you have to specify
which virtual host you are trying to connect.
* Test this, for example with ::
* Fail:
openssl s_client -connect talk.google.com:5222 -starttls xmpp
* Works:
openssl s_client -connect talk.google.com:5222 -starttls xmpp -xmpphost gmail.com
2013-09-05 17:24:56 +01:00
Carlos Alberto Lopez Perez
50f307a98f
Add "xmpp" to the list of supported starttls protocols on s_client manpage
2013-09-05 17:24:56 +01:00
Carlos Alberto Lopez Perez
4249d4ba86
Fix infinite loop on s_client starttls xmpp
...
* When the host used in "-connect" is not what the remote XMPP server expects
the server will return an error like this:
<stream:error>
<host-unknown xmlns='urn:ietf:params:xml:ns:xmpp-streams'/>
</stream:error>
* But the actual code will stay on the loop forever because the stop condition
"/stream:features>" will never happen,
* Make this more robust: The stop condition should be that BIO_read failed
* Test if for example with ::
openssl s_client -connect random.jabb3r.net:5222 -starttls xmpp
2013-09-05 17:24:56 +01:00
Carlos Alberto Lopez Perez
4e48c77572
Fix XMPP code detection on s_client starttls xmpp
...
* Some XMPP Servers (OpenFire) use double quotes.
* This makes s_client starttls work with this servers.
* Tested with OpenFire servers from http://xmpp.net/ ::
openssl s_client -connect coderollers.com:5222 -starttls xmpp
2013-09-05 17:24:55 +01:00
Rob Stradling
dece3209f2
Don't prefer ECDHE-ECDSA ciphers when the client appears to be Safari on OS X.
...
OS X 10.8..10.8.3 has broken support for ECDHE-ECDSA ciphers.
2013-09-05 13:09:03 +01:00
Dr. Stephen Henson
c3eb33763b
Document supported curve functions.
2013-09-03 15:43:01 +01:00
Dr. Stephen Henson
902efde1cc
Document -force_pubkey option.
2013-08-21 13:43:00 +01:00
Dr. Stephen Henson
36019f70e8
Correct ECDSA example.
2013-08-21 13:43:00 +01:00
Ben Laurie
d5605699a1
Correctly test for no-ec.
2013-08-21 04:21:57 +01:00
Ben Laurie
a0aaa5660a
Fix compile errors.
2013-08-21 04:21:42 +01:00
Dr. Stephen Henson
fcb2bcfe65
Typo: don't call RAND_cleanup during app startup.
...
(cherry picked from commit 90e7f983b5 )
2013-08-18 19:06:51 +01:00
Dr. Stephen Henson
eeb15452a0
Add documentation.
...
Preliminary documentation for chain and verify stores and certificate chain
setting functions.
2013-08-17 17:41:14 +01:00
Dr. Stephen Henson
b85f8afe37
Don't run ECDH CMS tests if EC disabled.
2013-08-17 17:41:14 +01:00
Dr. Stephen Henson
14536c8c9c
Make no-ec compilation work.
2013-08-17 17:41:13 +01:00
Dr. Stephen Henson
42082eda6f
Return 1 when setting ECDH auto mode.
2013-08-17 17:41:13 +01:00
Dr. Stephen Henson
5ef24a806d
Add the server 'hang' issue to the FAQ
2013-08-14 16:38:06 +01:00
Michael Tuexen
b62f4daac0
DTLS message_sequence number wrong in rehandshake ServerHello
...
This fix ensures that
* A HelloRequest is retransmitted if not responded by a ClientHello
* The HelloRequest "consumes" the sequence number 0. The subsequent
ServerHello uses the sequence number 1.
* The client also expects the sequence number of the ServerHello to
be 1 if a HelloRequest was received earlier.
This patch fixes the RFC violation.
2013-08-13 18:53:19 +01:00
Michael Tuexen
0c75eeacd3
DTLS handshake fix.
...
Reported by: Prashant Jaikumar <rmstar@gmail.com >
Fix handling of application data received before a handshake.
2013-08-08 13:30:49 +01:00
Kaspar Brand
5ae8d6bcba
Fix for PEM_X509_INFO_read_bio.
...
PR: 3028
Fix bug introduced in PEM_X509_INFO_bio which wouldn't process RSA keys
correctly if they appeared first.
2013-08-06 16:01:47 +01:00
Dr. Stephen Henson
dfcb42c68e
Update cms docs.
2013-08-05 16:23:22 +01:00
Dr. Stephen Henson
bbc098ffb3
Add X9.42 DH test.
2013-08-05 16:23:22 +01:00
Dr. Stephen Henson
75787fd833
Add X9.42 DH certificate to S/MIME test
2013-08-05 16:23:22 +01:00
Dr. Stephen Henson
bd59f2b91d
CMS RFC2631 X9.42 DH enveloped data support.
2013-08-05 16:23:13 +01:00
Dr. Stephen Henson
dc1ce3bc64
Add KDF for DH.
...
Add X9.42 DH KDF. Move sharedinfo generation code to CMS library as the
same structure is used by DH and ECDH.
Move ASN1_OBJECT typedef to ossl_typ.h so it can be picked up by dh headers
without the need to use ASN1.
2013-08-05 15:45:01 +01:00
Dr. Stephen Henson
3909087801
Extend DH parameter generation support.
...
Add support for DH parameter generation using DSA methods including
FIPS 186-3.
2013-08-05 15:45:01 +01:00
Dr. Stephen Henson
d3cc91eee2
Enhance DH dup functions.
...
Make DHparams_dup work properly with X9.42 DH parameters.
2013-08-05 15:45:01 +01:00
Dr. Stephen Henson
c9577ab5ea
If present print j, seed and counter values for DH
2013-08-05 15:45:00 +01:00
Dr. Stephen Henson
3f6b6f0b8c
Minor optimisation to KDF algorithm.
...
Don't need to use temporary buffer if remaining length equals digest length.
2013-08-05 15:45:00 +01:00
Dr. Stephen Henson
e61f5d55bc
Algorithm parameter support.
...
Check and set AlgorithmIdenfier parameters for key wrap algorithms.
Currently these just set parameters to NULL.
2013-08-05 15:45:00 +01:00
Andy Polyakov
a59f436295
crypto/evp/e_aes.c: fix logical pre-processor bug and formatting.
...
Bug would emerge when XTS is added to bsaes-armv7.pl. Pointed out by
Ard Biesheuvel of Linaro.
2013-08-03 17:09:06 +02:00
Andy Polyakov
fd8ad019e1
crypto/bn/asm/rsax-x86_64.pl: make it work on Darwin.
2013-08-03 16:28:50 +02:00
Andy Polyakov
006784378d
crypto/sha/asm/sha*-x86_64.pl: comply with Win64 ABI.
2013-07-31 23:50:15 +02:00
Trevor Perrin
0b2bde70dd
Various custom extension fixes.
...
Force no SSL2 when custom extensions in use.
Don't clear extension state when cert is set.
Clear on renegotiate.
2013-07-31 14:29:41 +01:00
Adam Langley
a898936218
Add tests for ALPN functionality.
...
Conflicts:
ssl/ssltest.c
2013-07-22 15:47:48 +01:00
Ben Laurie
a108f841ba
Add a no-opt 64-bit target.
2013-07-22 15:28:20 +01:00
Adam Langley
6f017a8f9d
Support ALPN.
...
This change adds support for ALPN[1] in OpenSSL. ALPN is the IETF
blessed version of NPN and we'll be supporting both ALPN and NPN for
some time yet.
[1] https://tools.ietf.org/html/draft-ietf-tls-applayerprotoneg-00
Conflicts:
ssl/ssl3.h
ssl/t1_lib.c
2013-07-22 15:28:20 +01:00
Dr. Stephen Henson
584ac22110
Make ecdsatest work with nonces.
...
Update ecdsatest to use ECDSA_sign_setup and ECDSA_sign_ex, this
avoids the nonce generation which would otherwise break the test.
Reinstate ecdsatest.
2013-07-19 14:11:43 +01:00
Dr. Stephen Henson
527c898ce8
Temporarily disable ECDSA test.
...
Disable ECDSA test temporarily: it is incompatible with ECDSA nonces.
2013-07-19 13:46:48 +01:00
Dr. Stephen Henson
5cdc25a754
New CMS tests.
...
Add some ECDH CMS tests.
2013-07-17 21:45:01 +01:00
Dr. Stephen Henson
a0957d5505
Scripts to recreate S/MIME test certificates.
...
Add a script to generate keys and certificates for the S/MIME and CMS
tests.
Update certificates and add EC examples.
2013-07-17 21:45:01 +01:00
Dr. Stephen Henson
5711885a2b
Custom key wrap option for cms utility.
2013-07-17 21:45:01 +01:00
Dr. Stephen Henson
41b920ef01
Return correct enveloped data type in ASN1 methods.
...
For RSA and DSA keys return an appropriate RecipientInfo type. By setting
CMS_RECIPINFO_NONE for DSA keys an appropriate error is returned if
an attempt is made to use DSA with enveloped data.
2013-07-17 21:45:01 +01:00
Dr. Stephen Henson
88e20b8584
Add support for ECDH KARI.
...
Add support for ECDH in enveloped data. The CMS ctrls for the EC ASN1
method decode/encode the appropriate parameters from the CMS ASN1 data
and send appropriate data to the EC public key method.
2013-07-17 21:45:01 +01:00
Dr. Stephen Henson
25af7a5dbc
Add support for X9.62 KDF.
...
Add X9.62 KDF to EC EVP_PKEY_METHOD.
2013-07-17 21:45:00 +01:00
Dr. Stephen Henson
6af440ced4
Add new OIDs from RFC5753
...
Add OIDs for KDF schemes from RFC5753 and add cross references for
each type and the appropriate digest to use.
2013-07-17 21:45:00 +01:00
Dr. Stephen Henson
17c2764d2e
CMS support for key agreeement recipient info.
...
Add hooks to support key agreement recipient info type (KARI) using
algorithm specific code in the relevant public key ASN1 method.
2013-07-17 21:45:00 +01:00
Dr. Stephen Henson
ff7b6ce9db
Set CMS EnvelopedData version correctly.
2013-07-17 21:45:00 +01:00
Dr. Stephen Henson
97cf1f6c28
EVP support for wrapping algorithms.
...
Add support for key wrap algorithms via EVP interface.
Generalise AES wrap algorithm and add to modes, making existing
AES wrap algorithm a special case.
Move test code to evptests.txt
2013-07-17 21:45:00 +01:00
Dr. Stephen Henson
415ece7301
Typo.
2013-07-17 21:45:00 +01:00
Dr. Stephen Henson
8d6a75dc3a
Avoid need to change function code.
...
Keep original function names for nonce versions so we don't have to change
error function codes.
2013-07-17 21:45:00 +01:00
Adam Langley
190c615d43
Make `safe' (EC)DSA nonces the default.
...
This change updates 8a99cb29 to make the generation of (EC)DSA nonces
using the message digest the default. It also reverts the changes to
(EC)DSA_METHOD structure.
In addition to making it the default, removing the flag from EC_KEY
means that FIPS modules will no longer have an ABI mismatch.
2013-07-15 12:57:48 +01:00
Andy Polyakov
5c57c69f9e
bn/asm/rsaz-avx2.pl: Windows-specific fix.
2013-07-12 18:59:17 +02:00
Dr. Stephen Henson
4b26645c1a
Fix verify loop with CRL checking.
...
PR #3090
Reported by: Franck Youssef <fry@open.ch >
If no new reason codes are obtained after checking a CRL exit with an
error to avoid repeatedly checking the same CRL.
This will only happen if verify errors such as invalid CRL scope are
overridden in a callback.
2013-07-12 17:48:41 +01:00
Ben Laurie
c051cbc83f
Clarify FIXME.
2013-07-12 15:03:43 +01:00
Ben Laurie
8bf0eee8d9
Note non-export of CC.
2013-07-12 14:48:13 +01:00
Ben Laurie
82fe001b8d
Support new rsaz asm stuff.
2013-07-12 12:48:24 +01:00
Ben Laurie
852f837f5e
s/rsaz_eligible/rsaz_avx2_eligible/.
2013-07-12 12:47:39 +01:00
Andy Polyakov
241fba4ea9
sha512-586.pl: fix typo.
...
Submitted by: Gisle Vanem
2013-07-10 09:59:25 +02:00
Andy Polyakov
f5b132d652
Remove RSAX engine, superseded by RSAZ module.
2013-07-05 22:11:28 +02:00
Andy Polyakov
ca48ace5c5
Take RSAZ modules into build loop, add glue and engage.
...
RT: 2582, 2850
2013-07-05 21:39:47 +02:00
Andy Polyakov
0b4bb91db6
Add RSAZ assembly modules.
...
RT: 2582, 2850
2013-07-05 21:30:18 +02:00
Andy Polyakov
26e43b48a3
bn/asm/x86_86-mont.pl: optimize reduction for Intel Core family.
2013-07-05 21:10:56 +02:00
Andy Polyakov
cbce8c4644
bn/bn_exp.c: harmonize.
2013-07-05 20:52:58 +02:00
Jeff Walton
3d7bf77f61
Fix multiple cosmetic typos.
2013-07-04 20:35:53 +01:00
Dr. Stephen Henson
e0f7cfda68
Initialise CMS signature buffer length properly.
2013-07-02 22:12:19 +01:00
Andy Polyakov
c256e69d3f
config: fix executable format detection on latest FreeBSD.
...
Submitted by: Bryan Drewery
PR: 3075
2013-06-30 23:55:55 +02:00
Andy Polyakov
b74ce8d948
bn/bn_exp.c: Solaris-specific fix, T4 MONTMUL relies on alloca.
2013-06-30 23:09:09 +02:00
Andy Polyakov
a9d14832fd
x86_64-xlate.pl: Windows fixes.
2013-06-30 23:07:33 +02:00
Andy Polyakov
42386fdb62
aesni-sha256-x86_64.pl: fix typo in Windows SEH.
2013-06-30 23:06:28 +02:00
Trevor
5382adbf2c
Cosmetic touchups.
2013-06-28 16:01:12 +01:00
Dr. Stephen Henson
ac9ce2cf03
Fix duplicate error code.
2013-06-28 14:21:48 +01:00
Dr. Stephen Henson
5c84d2f560
Update CHANGES
2013-06-21 23:43:06 +01:00
Dr. Stephen Henson
4bf4a6501c
Update cms docs.
...
Document use of -keyopt to use RSA-PSS and RSA-OAEP modes.
2013-06-21 23:43:06 +01:00
Dr. Stephen Henson
32b18e0338
Add new CMS tests.
...
Add new tests to cms-test.pl covering PSS and OAEP.
2013-06-21 23:43:06 +01:00
Dr. Stephen Henson
02498cc885
Add -keyopt option to cms utility.
...
Add support for custom public key parameters in the cms utility using
the -keyopt switch. Works for -sign and also -encrypt if -recip is used.
2013-06-21 23:43:06 +01:00
Dr. Stephen Henson
0574cadf85
CMS RSA-OAEP and RSA-PSS support.
...
Extend RSA ASN1 method to support CMS PSS signatures for both sign
and verify.
For signing the EVP_PKEY_CTX parameters are read and the appropriate
CMS structures set up.
For verification the CMS structures are analysed and the corresponding
parameters in the EVP_PKEY_CTX set.
Also add RSA-OAEP support.
For encrypt the EVP_PKEY_CTX parameters are used.
For decrypt the CMS structure is uses to set the appropriate EVP_PKEY_CTX
parameters.
2013-06-21 23:43:05 +01:00
Dr. Stephen Henson
e365352d6a
CMS public key parameter support.
...
Add support for customisation of CMS handling of signed and enveloped
data from custom public key parameters.
This will provide support for RSA-PSS and RSA-OAEP but could also be
applied to other algorithms.
2013-06-21 21:33:00 +01:00
Dr. Stephen Henson
211a14f627
Update to OAEP support.
...
Add OAEP ctrls to retrieve MD and label. Return errors if
an attempt is made to set or retrieve OAEP parameters when
padding mode is not OAEP.
2013-06-21 21:33:00 +01:00
Dr. Stephen Henson
810639536c
Add control to retrieve signature MD.
2013-06-21 21:33:00 +01:00
Dr. Stephen Henson
e423c360fd
Add new OID to pSpecified from PKCS#1
2013-06-21 21:33:00 +01:00
Trevor
9cd50f738f
Cleanup of custom extension stuff.
...
serverinfo rejects non-empty extensions.
Omit extension if no relevant serverinfo data.
Improve error-handling in serverinfo callback.
Cosmetic cleanups.
s_client documentation.
s_server documentation.
SSL_CTX_serverinfo documentation.
Cleaup -1 and NULL callback handling for custom extensions, add tests.
Cleanup ssl_rsa.c serverinfo code.
Whitespace cleanup.
Improve comments in ssl.h for serverinfo.
Whitespace.
Cosmetic cleanup.
Reject non-zero-len serverinfo extensions.
Whitespace.
Make it build.
2013-06-18 16:13:08 +01:00
Andy Polyakov
8ee3c7e676
SPARC T4 DES support: fix typo.
2013-06-18 10:42:08 +02:00
Andy Polyakov
4ddacd9921
Optimize SPARC T4 MONTMUL support.
...
Improve RSA sing performance by 20-30% by:
- switching from floating-point to integer conditional moves;
- daisy-chaining sqr-sqr-sqr-sqr-sqr-mul sequences;
- using MONTMUL even during powers table setup;
2013-06-18 10:39:38 +02:00
Andy Polyakov
02450ec69d
PA-RISC assembler pack: switch to bve in 64-bit builds.
...
PR: 3074
2013-06-18 10:37:00 +02:00
Adam Langley
8a99cb29d1
Add secure DSA nonce flag.
...
This change adds the option to calculate (EC)DSA nonces by hashing the
message and private key along with entropy to avoid leaking the private
key if the PRNG fails.
2013-06-13 17:26:07 +01:00
Adam Langley
64a786a292
Limit the number of empty records that will be processed consecutively
...
in order to prevent ssl3_get_record from never returning.
Reported by "oftc_must_be_destroyed" and George Kadianakis.
2013-06-13 17:10:52 +01:00
Adam Langley
a54a61e7a9
Don't SEGFAULT when trying to export a public DSA key as a private key.
2013-06-13 17:03:35 +01:00
Adam Langley
adb46dbc6d
This change alters the processing of invalid, RSA pre-master secrets so
...
that bad encryptions are treated like random session keys in constant
time.
2013-06-13 16:58:45 +01:00
Ben Laurie
7e25d81870
Ignore one-makefile stuff.
2013-06-13 15:39:23 +01:00
Matt Caswell
aafbe1ccd2
Document updates from wiki.
...
PR#3071
The primary changes made are:
- Updates to the "NAME" section of many pages to correctly reflect the
functions defined on those pages. This section is automatically parsed
by the util/extract-names.pl script, so if it is not correct then
running "man" will not correctly locate the right manual pages.
- Updates to take account of where functions are now deprecated
- Full documentation of the ec sub-library
- A number of other typo corrections and other minor tweaks
2013-06-12 23:42:08 +01:00
Dr. Stephen Henson
271fef0ef3
Exetended OAEP support.
...
Extend OAEP support. Generalise the OAEP padding functions to support
arbitrary digests. Extend EVP_PKEY RSA method to handle the new OAEP
padding functions and add ctrls to set the additional parameters.
2013-06-12 18:48:17 +01:00
Dr. Stephen Henson
965e06da3c
Typo.
2013-06-12 18:47:28 +01:00
Trevor
a398f821fa
Add support for arbitrary TLS extensions.
...
Contributed by Trevor Perrin.
2013-06-12 17:01:13 +01:00
Ben Laurie
6d84daa5d6
Add aesni-sha256-x86_64.
2013-06-12 14:18:33 +01:00
Andy Polyakov
3b848d3401
aesni-sha1-x86_64.pl: update performance data.
2013-06-10 22:35:22 +02:00
Andy Polyakov
42b9a4177b
aesni-sha256-x86_64.pl: harmonize with latest sha512-x86_64.pl.
2013-06-10 22:34:06 +02:00
Andy Polyakov
cd8d7335af
sha1-x86_64.pl: add AVX2+BMI code path.
2013-06-10 22:30:34 +02:00
Andy Polyakov
c7f690c243
sha512-x86_64.pl: upcoming-Atom-specific optimization.
2013-06-10 22:29:01 +02:00
Andy Polyakov
32213d8d77
sha[256|512]-586.pl: add more SIMD code paths.
2013-06-10 22:26:53 +02:00
Andy Polyakov
b42759158d
ghash-x86_64.pl: add Haswell performance data.
2013-06-10 22:25:12 +02:00
Andy Polyakov
1bc0b68d7b
x86cpuid.pl: fix extended feature flags detection.
2013-06-10 22:20:46 +02:00
Dr. Stephen Henson
2f58cda4ce
Fix PSS signature printing.
...
Fix PSS signature printing: consistently use 0x prefix for hex values for
padding length and trailer fields.
2013-06-05 15:06:03 +01:00
Dr. Stephen Henson
c71fdaed58
Reencode with X509_CRL_ctx_sign too.
2013-06-05 15:06:03 +01:00
Adam Langley
96a4c31be3
Ensure that, when generating small primes, the result is actually of the
...
requested size. Fixes OpenSSL #2701 .
This change does not address the cases of generating safe primes, or
where the |add| parameter is non-NULL.
Conflicts:
crypto/bn/bn.h
crypto/bn/bn_err.c
2013-06-04 18:52:30 +01:00
Adam Langley
2b0180c37f
Ensure that x**0 mod 1 = 0.
2013-06-04 18:47:11 +01:00
Adam Langley
7753a3a684
Add volatile qualifications to two blocks of inline asm to stop GCC from
...
eliminating them as dead code.
Both volatile and "memory" are used because of some concern that the compiler
may still cache values across the asm block without it, and because this was
such a painful debugging session that I wanted to ensure that it's never
repeated.
2013-06-04 18:46:25 +01:00
Ben Laurie
5dcd2deb3e
Remove added ;.
2013-06-04 17:27:18 +01:00
Ben Laurie
b25b8417a7
Missing prototypes.
2013-06-04 16:34:45 +01:00
Andy Polyakov
b69437e1e5
crypto/bn/bn_exp.c: SPARC portability fix.
2013-06-01 09:58:07 +02:00
Andy Polyakov
36df342f9b
aesni-x86_64.pl: optimize XTS.
...
PR: 3042
2013-05-25 19:23:09 +02:00
Andy Polyakov
4df2280b4f
aesni-sha1-x86_64.pl: Atom-specific optimization.
2013-05-25 19:08:39 +02:00
Andy Polyakov
504bbcf3cd
sha512-x86_64.pl: +16% optimization for Atom.
...
(and pending AVX2 changes).
2013-05-25 19:02:57 +02:00
Andy Polyakov
988d11b641
vpaes-x86[_64].pl: minor Atom-specific optimization.
2013-05-25 18:57:03 +02:00
Andy Polyakov
8a97a33063
Add AES-SHA256 stitch.
2013-05-13 22:49:58 +02:00
Andy Polyakov
22de0e6583
x86_64-xlate.pl: minor size/performance improvement.
2013-05-13 16:06:25 +02:00
Andy Polyakov
cd54249c21
aesni-x86_64.pl: minor CTR performance improvement.
2013-05-13 15:49:03 +02:00
Ben Laurie
92584bd3d5
Tests pass!
2013-05-05 16:15:34 +01:00
Ben Laurie
342ec250c3
Ugly hack to avoid recompiling the same thing multiple times in parallel.
2013-05-05 15:06:33 +01:00
Dr. Stephen Henson
c6d8adb8a4
Reencode certificates in X509_sign_ctx.
...
Reencode certificates in X509_sign_ctx as well as X509_sign.
This was causing a problem in the x509 application when it modified an
existing certificate.
2013-05-02 12:19:40 +01:00
Andy Polyakov
9575d1a91a
bsaes-armv7.pl: add bsaes_cbc_encrypt and bsaes_ctr32_encrypt_blocks.
...
Submitted by: Ard Biesheuvel <ard.biesheuvel@linaro.org >
Contributor claims ~50% improvement in CTR and ~9% in CBC decrypt
on Cortex-A15.
2013-04-23 17:52:14 +02:00
Andy Polyakov
75fe422323
bsaes-armv7.pl: take it into build loop.
2013-04-23 17:49:54 +02:00
Dr. Stephen Henson
412834dcf0
Typo.
2013-04-14 01:19:07 +01:00
Andy Polyakov
db05b447a5
Fix Windows linking error in GOST test case.
2013-04-13 23:03:31 +02:00
Andy Polyakov
3bdd80521a
crypto/modes/modes_lcl.h: let STRICT_ALIGNMENT be on ARMv7.
...
While ARMv7 in general is capable of unaligned access, not all instructions
actually are. And trouble is that compiler doesn't seem to differentiate
those capable and incapable of unaligned access. Side effect is that kernel
goes into endless loop retrying same instruction triggering unaligned trap.
Problem was observed in xts128.c and ccm128.c modules. It's possible to
resolve it by using (volatile u32*) casts, but letting STRICT_ALIGNMENT
be feels more appropriate.
2013-04-13 20:57:37 +02:00
Dr. Stephen Henson
4544f0a691
Suite B support for DTLS 1.2
...
Check for Suite B support using method flags instead of version numbers:
anything supporting TLS 1.2 cipher suites will also support Suite B.
Return an error if an attempt to use DTLS 1.0 is made in Suite B mode.
2013-04-09 16:49:13 +01:00
Dr. Stephen Henson
c56f5b8edf
Always return errors in ssl3_get_client_hello
...
If we successfully match a cookie don't set return value to 2 as this
results in other error conditions returning 2 as well.
Instead set return value to -2 which can be checked later if everything
else is OK.
2013-04-09 15:59:47 +01:00
Dr. Stephen Henson
c6913eeb76
Dual DTLS version methods.
...
Add new methods DTLS_*_method() which support both DTLS 1.0 and DTLS 1.2 and
pick the highest version the peer supports during negotiation.
As with SSL/TLS options can change this behaviour specifically
SSL_OP_NO_DTLSv1 and SSL_OP_NO_DTLSv1_2.
2013-04-09 14:02:48 +01:00
Dr. Stephen Henson
04638f2fc3
Set s->d1 to NULL after freeing it.
2013-04-08 18:24:42 +01:00
Dr. Stephen Henson
045b2809f8
Asm build portability.
...
Don't use Win32 specific options in mk1mf.pl to build assembly language
files.
2013-04-08 14:53:54 +01:00
Ben Laurie
29d422e2a0
Make sure all tests are actually run, plus some fixups for things that
...
turn out to be made somewhere by existing Makefiles.
2013-04-07 16:52:54 +01:00
Ben Laurie
a7f5cd7fd5
Use original alltests target for definitive test list.
2013-04-06 20:42:38 +01:00
Ben Laurie
afdf366921
Missing semicolon.
2013-04-06 16:17:14 +01:00
Dr. Stephen Henson
fed45e1879
Fix non-copy builds.
...
Only use -MMD and .sinclude in copy builds: other platforms don't
support them.
2013-04-06 16:05:23 +01:00
Ben Laurie
d07201a2bb
Missing file.
2013-04-06 15:25:43 +01:00
Ben Laurie
bc9e878210
Make executable.
2013-04-06 15:22:28 +01:00
Ben Laurie
9fc3ebda13
Helper scripts for one makefile build.
2013-04-06 15:17:30 +01:00
Ben Laurie
1a70fe953a
Merge, go back to copy-if-different.
2013-04-06 15:15:11 +01:00
Ben Laurie
ea4507ee1c
Fix test_ss.
2013-04-06 15:13:12 +01:00
Ben Laurie
4b9af0a101
Add new asm target.
2013-04-06 15:13:12 +01:00
Ben Laurie
e92ce4e35b
Show start/end of tests.
2013-04-06 15:13:12 +01:00
Ben Laurie
3426b8ed3f
Avoid collisions.
2013-04-06 15:13:12 +01:00
Ben Laurie
f5cd3db541
Make session ID test work.
2013-04-06 15:13:12 +01:00
Ben Laurie
15e5f592c1
Make S/MIME test work.
2013-04-06 15:13:11 +01:00
Ben Laurie
509a83dd36
Make RSA test work.
2013-04-06 15:13:11 +01:00
Ben Laurie
8c7f5f3bec
Make PKCS#7 test work.
2013-04-06 15:13:11 +01:00
Ben Laurie
188f6443ae
Make OCSP test work.
2013-04-06 15:13:11 +01:00
Ben Laurie
3675fb882c
More progress towards working tests.
2013-04-06 15:13:11 +01:00
Ben Laurie
3b4d86bff5
Get closer to a working single Makefile with test support.
2013-04-06 15:11:11 +01:00
Ben Laurie
282a480a35
Fix warnings.
2013-04-06 15:08:44 +01:00
Dr. Stephen Henson
1e2d4cb0e1
Make TLS 1.2 ciphers work again.
...
Since s->method does not reflect the final client version when a client
hello is sent for SSLv23_client_method it can't be relied on to indicate
if TLS 1.2 ciphers should be used. So use the client version instead.
2013-04-04 18:21:58 +01:00
Andy Polyakov
99cda4376e
cryptlib.c: fix typo in OPENSSL_showfatal.
2013-04-04 15:57:43 +02:00
Andy Polyakov
73325b221c
aesni-x86_64.pl: optimize CBC decrypt.
...
Give CBC decrypt approximately same treatment as to CTR and collect 25%.
2013-04-04 15:56:23 +02:00
Andy Polyakov
a42abde699
e_aes.c: reserve for future extensions.
2013-04-04 15:55:49 +02:00
Andy Polyakov
64f7e2c4c0
gcm128.c: fix linking problems in 32-bit Windows build.
2013-04-04 15:54:58 +02:00
Andy Polyakov
7f97d57236
dest4-sparcv9.pl: add clarification comment.
2013-04-04 15:54:08 +02:00
Andy Polyakov
c9a8e3d1c7
evptests.txt: add XTS test vectors
2013-04-04 15:53:01 +02:00
Dr. Stephen Henson
3fce3f6b2b
Use $(PERL) when calling scripts in mk1mf.pl
2013-04-03 22:38:18 +01:00
Dr. Stephen Henson
0ded2a0689
Typo.
2013-03-31 17:42:46 +01:00
Andy Polyakov
c5d975a743
Add support for SPARC T4 DES opcode.
2013-03-31 14:32:05 +02:00
Andy Polyakov
d8f3ed2306
des_enc.m4: add missing #include.
...
Submitted by: David Miller
2013-03-31 14:07:48 +02:00
Andy Polyakov
4e049c5259
Add AES-NI GCM stitch.
2013-03-29 20:45:33 +01:00
Andy Polyakov
b4a9d5bfe8
aesni-x86_64.pl: fix typo and optimize small block performance.
2013-03-29 18:54:24 +01:00
Dr. Stephen Henson
3d1160d58b
Call RAND_cleanup in openssl application.
...
(cherry picked from commit 944bc29f90 )
2013-03-28 14:29:39 +00:00
Dr. Stephen Henson
4221c0dd30
Enable TLS 1.2 ciphers in DTLS 1.2.
...
Port TLS 1.2 GCM code to DTLS. Enable use of TLS 1.2 only ciphers when in
DTLS 1.2 mode too.
2013-03-28 14:14:27 +00:00
Dr. Stephen Henson
fbbaaccaca
Update fixed DH requirements.
...
The relaxed signing requirements for fixed DH certificates apply to DTLS 1.2
too.
2013-03-28 14:14:27 +00:00
Dr. Stephen Henson
04fac50045
DTLS 1.2 cached record support.
...
Add DTLS1.2 support for cached records when computing handshake macs
instead of the MD5+SHA1 case for DTLS < 1.2 (this is a port of the
equivalent TLS 1.2 code to DTLS).
2013-03-28 14:14:27 +00:00
Matt Caswell
94782e0e9c
Make binary curve ASN.1 work in FIPS mode.
...
Don't check for binary curves by checking methods: the values will
be different in FIPS mode as they are redirected to the validated module
version.
2013-03-26 16:56:50 +00:00
Dr. Stephen Henson
c3b344e36a
Provisional DTLS 1.2 support.
...
Add correct flags for DTLS 1.2, update s_server and s_client to handle
DTLS 1.2 methods.
Currently no support for version negotiation: i.e. if client/server selects
DTLS 1.2 it is that or nothing.
2013-03-26 15:16:41 +00:00
Dr. Stephen Henson
9cf0f18754
Remove versions test from dtls1_buffer_message
...
Since this is always called from DTLS code it is safe to assume the header
length should be the DTLS value. This avoids the need to check the version
number and should work with any version of DTLS (not just 1.0).
2013-03-26 15:16:41 +00:00
Dr. Stephen Henson
cfd298b7ae
Extend DTLS method macros.
...
Extend DTLS method creation macros to support version numbers and encryption
methods. Update existing code.
2013-03-26 15:16:41 +00:00
Dr. Stephen Henson
874a18cfad
Enable various DTLS extensions.
...
Some TLS extensions were disabled for DTLS. Possibly because they caused
problems with the old duplicated code. Enable them again.
2013-03-26 15:16:41 +00:00
Andy Polyakov
6c79faaa9d
aesni-x86_64.pl: optimize CTR even further.
...
Based on suggestions from Shay Gueron and Vlad Krasnov.
PR: 3021
2013-03-26 14:29:18 +01:00
Andy Polyakov
1da5d3029e
ghash-x86_64.pl: add AVX code path.
2013-03-24 23:44:35 +01:00
Andy Polyakov
1bc4d009e1
aesni-x86_64.pl: optimize CTR even further.
2013-03-19 20:03:02 +01:00
Andy Polyakov
fbf7c44bbf
ghash-x86_64.pl: minor optimization.
2013-03-19 20:02:11 +01:00
Dr. Stephen Henson
2f0275a4c3
Disable compression for DTLS.
...
The only standard compression method is stateful and is incompatible with
DTLS.
2013-03-19 13:43:06 +00:00
Dr. Stephen Henson
eb7ece1381
Typo.
2013-03-19 12:41:54 +00:00
Andy Polyakov
5c60046553
e_aes_cbc_hmac_sha1.c: fix rare bad record mac on AES-NI plaforms.
...
PR: 3002
2013-03-18 19:29:41 +01:00
Dr. Stephen Henson
cbd64894ec
Use enc_flags when deciding protocol variations.
...
Use the enc_flags field to determine whether we should use explicit IV,
signature algorithms or SHA256 default PRF instead of hard coding which
versions support each requirement.
2013-03-18 15:03:58 +00:00
Dr. Stephen Henson
6de2649a6b
Use appropriate versions of SSL3_ENC_METHOD
2013-03-18 14:53:59 +00:00
Dr. Stephen Henson
173e72e64c
DTLS revision.
...
Revise DTLS code. There was a *lot* of code duplication in the
DTLS code that generates records. This makes it harder to maintain and
sometimes a TLS update is omitted by accident from the DTLS code.
Specifically almost all of the record generation functions have code like
this:
some_pointer = buffer + HANDSHAKE_HEADER_LENGTH;
... Record creation stuff ...
set_handshake_header(ssl, SSL_MT_SOMETHING, message_len);
...
write_handshake_message(ssl);
Where the "Record creation stuff" is identical between SSL/TLS and DTLS or
in some cases has very minor differences.
By adding a few fields to SSL3_ENC to include the header length, some flags
and function pointers for handshake header setting and handshake writing the
code can cope with both cases.
Note: although this passes "make test" and some simple DTLS tests there may
be some minor differences in the DTLS code that have to be accounted for.
2013-03-18 14:36:43 +00:00
Michael Tuexen
80ccc66d7e
Avoid unnecessary fragmentation.
2013-03-18 14:30:38 +00:00
Dr. Stephen Henson
5de18d5d0d
Encode INTEGER correctly.
...
If an ASN1_INTEGER structure is allocated but not explicitly set encode
it as zero: don't generate an invalid zero length INTEGER.
(cherry picked from commit 1643edc63c )
2013-03-18 14:22:08 +00:00
Dr. Stephen Henson
e24fd37cda
Typo.
...
(cherry picked from commit 1546fb780b )
2013-03-18 14:00:39 +00:00
Dr. Stephen Henson
890f2f8b92
DTLS trace support.
...
Add DTLS record header parsing, different client hello format and add
HelloVerifyRequest message type.
Add code to d1_pkt.c to send message headers to the message callback.
2013-03-11 13:05:07 +00:00
Andy Polyakov
ca303d333b
evptests.txt: additional GCM test vectors.
2013-03-06 19:24:05 +01:00
Dr. Stephen Henson
15652f9825
GCM and CCM test support
...
Add code to support GCM an CCM modes in evp_test. On encrypt this
will compare the expected ciphertext and tag. On decrypt it will
compare the expected plaintext: tag comparison is done internally.
Add a simple CCM test case and convert all tests from crypto/modes/gcm128.c
2013-03-06 16:15:42 +00:00
Dr. Stephen Henson
95248de327
Add CCM ciphers to tables.
2013-03-06 16:15:42 +00:00
Andy Polyakov
28997596f2
ghash-x86_64.pl: fix length handling bug.
...
Thanks to Shay Gueron & Vlad Krasnov for report.
2013-03-06 10:42:21 +01:00
Dr. Stephen Henson
bcb157f07f
typo
2013-03-05 21:20:00 +00:00
Dr. Stephen Henson
e942c15451
Initial CCM code.
...
Simple example of CCM code use: translated from the FIPS self tests.
2013-03-05 18:30:53 +00:00
Ben Laurie
897dfd4eaa
Use CFLAG for LFLAGS instead of the nonexistent CFLAGS.
2013-03-05 05:55:19 +00:00
Ben Laurie
c621fe6685
Ignore mk1mf.pl output directories.
2013-03-05 04:29:41 +00:00
Ben Laurie
feb4c32786
Remove unused variable.
2013-03-04 22:48:38 +00:00
Ben Laurie
63d86d067a
Actually comment out the cpuid asm!
2013-03-04 20:31:59 +00:00
Ben Laurie
35ced1f705
Merge branch 'master' of openssl.net:openssl
...
Conflicts:
util/mk1mf.pl
2013-03-04 20:26:17 +00:00
Dr. Stephen Henson
71a16946dc
Fix WIN32 build.
...
Make assembly language handling conditional on the "copy" platform
as Windows does its own thing here.
2013-03-04 19:21:32 +00:00
Andy Polyakov
5702e965d7
x86cpuid.pl: make it work with older CPUs.
...
PR: 3005
2013-03-04 20:05:04 +01:00
Ben Laurie
654d227a86
Only copy headers if they've changed.
2013-03-04 16:56:18 +00:00
Ben Laurie
2f297fce73
Don't make CPUID stuff twice.
2013-03-04 16:10:47 +00:00
Ben Laurie
656829b78f
Handle assembler files.
2013-03-04 14:31:19 +00:00
Ben Laurie
95dd301861
Missing MINFO generation.
2013-03-04 14:31:18 +00:00
Ben Laurie
4e2322892b
Override local vars for MINFO build.
2013-03-04 14:31:18 +00:00
Ben Laurie
7b0d591dc3
Allow variables to be overridden on the command line.
2013-03-04 14:31:18 +00:00
Ben Laurie
7bbb8c5620
Take the first definition of a variable.
2013-03-04 14:31:18 +00:00
Ben Laurie
d0aeeee176
Use "copy" instead of "auto".
2013-03-04 14:31:18 +00:00
Ben Laurie
afc1b1eab7
Remove pointless diagnostic.
2013-03-04 14:31:18 +00:00
Ben Laurie
5108690f19
Preserve the C compiler.
2013-03-04 14:31:18 +00:00
Ben Laurie
3c76bcded0
Inherit CFLAGS when plaform is "auto".
2013-03-04 14:31:18 +00:00
Ben Laurie
ea5003bd1e
Include correctly.
2013-03-04 14:31:18 +00:00
Ben Laurie
45ba475b81
Remove empty command.
2013-03-04 14:31:18 +00:00
Ben Laurie
7067cbc8b5
Spelling.
2013-03-04 14:31:18 +00:00
Ben Laurie
f990fae812
Add dependency on destination directory.
2013-03-04 14:31:18 +00:00
Ben Laurie
a32d9eaf07
Spelling.
2013-03-04 14:31:18 +00:00
Ben Laurie
f953c2d039
Add reallyclean target.
2013-03-04 14:31:18 +00:00
Andy Polyakov
342dbbbe4e
x86_64-gf2m.pl: fix typo.
2013-03-01 22:36:36 +01:00
Andy Polyakov
7c43601d44
x86_64-gf2m.pl: add missing Windows build fix for #2963 .
...
PR: 3004
2013-03-01 21:43:10 +01:00
Ben Laurie
1aaa04191f
Ignore MINFO.
2013-02-26 21:51:13 +00:00
Ben Laurie
e46a281de5
Missing files target.
2013-02-26 21:51:13 +00:00
Dr. Stephen Henson
e1f1d28f34
Add function CMS_RecipientInfo_encrypt
...
Add CMS_RecipientInfo_encrypt: this function encrypts an existing content
encryption key to match the key in the RecipientInfo structure: this is
useful if a new recpient is added to and existing enveloped data structure.
Add documentation.
2013-02-26 16:59:56 +00:00
Dr. Stephen Henson
388aff08dc
Fix error codes.
2013-02-26 16:46:58 +00:00
Dr. Stephen Henson
3646578ae7
Demo code for SSL_CONF API
...
Two example programs one for command line argument processing and
one for configuration file processing.
2013-02-26 16:33:05 +00:00
Dr. Stephen Henson
4365e4aad9
Update SSL_CONF docs.
...
Fix some typos and update version number first added: it has now been
backported to OpenSSL 1.0.2.
2013-02-26 15:29:11 +00:00
Ben Laurie
0850f11855
Fix ignored return value warnings.
...
Not sure why I am getting these now and not before.
2013-02-21 18:30:04 +00:00
Ben Laurie
975dfb1c6c
make depend.
2013-02-21 18:17:38 +00:00
Nick Alcock
5cc2707742
Fix POD errors to stop make install_docs dying with pod2man 2.5.0+
...
podlators 2.5.0 has switched to dying on POD syntax errors. This means
that a bunch of long-standing erroneous POD in the openssl documentation
now leads to fatal errors from pod2man, halting installation.
Unfortunately POD constraints mean that you have to sort numeric lists
in ascending order if they start with 1: you cannot do 1, 0, 2 even if
you want 1 to appear first. I've reshuffled such (alas, I wish there
were a better way but I don't know of one).
2013-02-15 19:36:26 +01:00
Andy Polyakov
47edeb9f59
sha256-586.pl: code refresh.
2013-02-15 11:23:06 +01:00
Andy Polyakov
35c77b7303
sha1-586.pl: code refresh.
2013-02-14 22:20:17 +01:00
Andy Polyakov
273a808180
ghash-x86[_64].pl: code refresh.
2013-02-14 16:28:09 +01:00
Andy Polyakov
7c9e81be40
[aesni-]sha1-x86_64.pl: code refresh.
2013-02-14 16:14:02 +01:00
Andy Polyakov
c4558efbf3
sha512-x86_64.pl: add AVX2 code path.
2013-02-14 15:39:42 +01:00
Andy Polyakov
750398acd8
bn_nist.c: work around clang 3.0 bug.
2013-02-14 09:51:41 +01:00
Dr. Stephen Henson
2527b94fec
Upate FAQ.
...
Add description of "allocate and encode" operation for ASN1 routines.
Document how versioning will for after the letter release reaches
y.
2013-02-12 16:02:45 +00:00
David Woodhouse
d980abb22e
Check DTLS_BAD_VER for version number.
...
The version check for DTLS1_VERSION was redundant as
DTLS1_VERSION > TLS1_1_VERSION, however we do need to
check for DTLS1_BAD_VER for compatibility.
PR:2984
2013-02-12 15:14:14 +00:00
Dr. Stephen Henson
b7c37f2fc0
Fix in ssltest is no-ssl2 configured
...
(cherry picked from commit cbf9b4aed3 )
2013-02-11 18:29:05 +00:00
Dr. Stephen Henson
7e47a69544
update FAQ
2013-02-11 16:20:55 +00:00
Lutz Jaenicke
9fa24352ce
FAQ/README: we are now using Git instead of CVS
...
(cherry picked from commit f88dbb8385 )
2013-02-11 11:33:29 +01:00
Andy Polyakov
3caeef94bd
sparccpuid.S: work around emulator bug on T1.
2013-02-11 10:39:50 +01:00
Andy Polyakov
f93a41877d
s3_cbc.c: make CBC_MAC_ROTATE_IN_PLACE universal.
2013-02-08 21:30:52 +01:00
Andy Polyakov
c98a45452b
s3_cbc.c: get rid of expensive divisions.
2013-02-08 16:36:09 +01:00
Andy Polyakov
0e4f7045ea
s3_cbc.c: fix warning [in Windows build].
2013-02-08 14:22:22 +01:00
Andy Polyakov
2141e6f30b
e_aes_cbc_hmac_sha1.c: align calculated MAC at cache line.
...
It also ensures that valgring is happy.
2013-02-08 10:31:13 +01:00
Andy Polyakov
dd7e60bd70
ssl/*: revert "remove SSL_RECORD->orig_len" and merge "fix IV".
...
Revert is appropriate because binary compatibility is not an issue
in 1.1.
2013-02-08 10:20:48 +01:00
Adam Langley
32620fe9d1
Fix for EXP-RC2-CBC-MD5
...
MD5 should use little endian order. Fortunately the only ciphersuite
affected is EXP-RC2-CBC-MD5 (TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5) which
is a rarely used export grade ciphersuite.
(cherry picked from commit f306b87d76 )
2013-02-06 16:11:31 +00:00
Andy Polyakov
1041ab696e
e_aes_cbc_hmac_sha1.c: cleanse temporary copy of HMAC secret.
...
(cherry picked from commit 529d27ea47 )
2013-02-06 14:19:11 +00:00
Andy Polyakov
9970308c88
e_aes_cbc_hmac_sha1.c: address the CBC decrypt timing issues.
...
Address CBC decrypt timing issues and reenable the AESNI+SHA1 stitch.
(cherry picked from commit 125093b59f )
2013-02-06 14:19:10 +00:00
Andy Polyakov
2aec073a52
ssl/*: remove SSL3_RECORD->orig_len to restore binary compatibility.
...
Kludge alert. This is arranged by passing padding length in unused
bits of SSL3_RECORD->type, so that orig_len can be reconstructed.
(cherry picked from commit 8bfd4c659f )
2013-02-06 14:19:10 +00:00
Dr. Stephen Henson
b714a1fe09
Don't access EVP_MD_CTX internals directly.
...
(cherry picked from commit 04e45b52ee )
2013-02-06 14:19:10 +00:00
Andy Polyakov
bbb4ee8574
s3/s3_cbc.c: allow for compilations with NO_SHA256|512.
...
(cherry picked from commit d5371324d9 )
2013-02-06 14:19:10 +00:00
Andy Polyakov
4af91ec072
ssl/s3_cbc.c: md_state alignment portability fix.
...
RISCs are picky and alignment granted by compiler for md_state can be
insufficient for SHA512.
(cherry picked from commit 36260233e7 )
2013-02-06 14:19:09 +00:00
Andy Polyakov
6b2a843970
ssl/s3_cbc.c: uint64_t portability fix.
...
Break dependency on uint64_t. It's possible to declare bits as
unsigned int, because TLS packets are limited in size and 32-bit
value can't overflow.
(cherry picked from commit cab13fc847 )
2013-02-06 14:19:09 +00:00
Dr. Stephen Henson
6b1f7beeee
typo.
...
(cherry picked from commit 34ab3c8c71 )
2013-02-06 14:19:09 +00:00
Dr. Stephen Henson
8109e8305b
Add ordinal for CRYPTO_memcmp: since this will affect multiple
...
branches it needs to be in a "gap".
(cherry picked from commit 81ce0e14e7 )
2013-02-06 14:19:08 +00:00
Dr. Stephen Henson
c4e6fb1524
Timing fix mitigation for FIPS mode.
...
We have to use EVP in FIPS mode so we can only partially mitigate
timing differences.
Make an extra call to EVP_DigestSignUpdate to hash additonal blocks
to cover any timing differences caused by removal of padding.
(cherry picked from commit b908e88ec1 )
2013-02-06 14:19:08 +00:00
Ben Laurie
a693ead6dc
Oops. Add missing file.
...
(cherry picked from commit 014265eb02 )
2013-02-06 14:19:08 +00:00
Ben Laurie
e33ac0e71d
Update DTLS code to match CBC decoding in TLS.
...
This change updates the DTLS code to match the constant-time CBC
behaviour in the TLS.
(cherry picked from commit 9f27de170d )
2013-02-06 14:19:07 +00:00
Ben Laurie
93cab6b319
Don't crash when processing a zero-length, TLS >= 1.1 record.
...
The previous CBC patch was bugged in that there was a path through enc()
in s3_pkt.c/d1_pkt.c which didn't set orig_len. orig_len would be left
at the previous value which could suggest that the packet was a
sufficient length when it wasn't.
(cherry picked from commit 6cb19b7681 )
2013-02-06 14:19:07 +00:00
Ben Laurie
2acc020b77
Make CBC decoding constant time.
...
This patch makes the decoding of SSLv3 and TLS CBC records constant
time. Without this, a timing side-channel can be used to build a padding
oracle and mount Vaudenay's attack.
This patch also disables the stitched AESNI+SHA mode pending a similar
fix to that code.
In order to be easy to backport, this change is implemented in ssl/,
rather than as a generic AEAD mode. In the future this should be changed
around so that HMAC isn't in ssl/, but crypto/ as FIPS expects.
(cherry picked from commit e130841bcc )
2013-02-06 14:19:07 +00:00
Ben Laurie
7c770d572a
Add and use a constant-time memcmp.
...
This change adds CRYPTO_memcmp, which compares two vectors of bytes in
an amount of time that's independent of their contents. It also changes
several MAC compares in the code to use this over the standard memcmp,
which may leak information about the size of a matching prefix.
(cherry picked from commit 2ee798880a )
2013-02-06 14:16:55 +00:00
Dr. Stephen Henson
ea34a58385
Fix for trace code: SSL3 doesn't include a length value for
...
encrypted premaster secret value.
2013-02-04 15:13:12 +00:00
Andy Polyakov
4568182a8b
x86_64 assembly pack: keep making Windows build more robust.
...
PR: 2963 and a number of others
2013-02-02 19:54:59 +01:00
Dr. Stephen Henson
e511c64a24
Don't use C++ style comments.
2013-01-24 23:22:33 +00:00
Dr. Stephen Henson
c38b76bf69
Fix warning: lenmax isn't used any more.
2013-01-24 14:06:54 +00:00
Dr. Stephen Henson
1703627ba8
Don't include comp.h in cmd_cd.c if OPENSSL_NO_COMP set
2013-01-23 01:09:38 +00:00
Dr. Stephen Henson
498e89fe9d
fix domd
2013-01-23 00:43:09 +00:00
Andy Polyakov
46bf83f07a
x86_64 assembly pack: make Windows build more robust.
...
PR: 2963 and a number of others
2013-01-22 22:27:28 +01:00
Andy Polyakov
7c47f0d946
TABLE update.
2013-01-22 21:21:03 +01:00
Andy Polyakov
058843bd0f
Configure: update linux-mips* lines.
2013-01-22 21:20:34 +01:00
Andy Polyakov
543fd85460
bn/asm/mips.pl: hardwire local call to bn_div_words.
2013-01-22 21:13:37 +01:00
Andy Polyakov
1598af9ac9
sha512-ppc.pl: minimize stack frame.
2013-01-22 21:09:14 +01:00
Andy Polyakov
06b3b640eb
gost2814789t.c: portability fixes.
2013-01-22 14:37:03 +01:00
Ben Laurie
5bdf1f1a89
Fix warnings.
2013-01-21 23:02:17 +00:00
Dr. Stephen Henson
f20c673d0d
Don't include comp.h if no-comp set.
2013-01-20 02:34:25 +00:00
Andy Polyakov
a006fef78e
Improve WINCE support.
...
Submitted by: Pierre Delaage
2013-01-19 21:23:13 +01:00
Ben Laurie
0e5cf7bc09
Merge branch 'master' of openssl.net:openssl
2013-01-19 18:30:10 +00:00
Andy Polyakov
bd2bceb91b
More .gitignore adjustments.
2013-01-19 18:41:44 +01:00
Ben Laurie
6f0a93b069
Merge branch 'master' of openssl.net:openssl
2013-01-19 17:35:41 +00:00
Ben Laurie
ed60d9ded0
Remove kludge to use RC4 asm.
2013-01-19 17:31:46 +00:00
Ben Laurie
e721909d7f
Build/test cleanly on MacOS.
2013-01-19 17:24:40 +00:00
Andy Polyakov
a0dcb8d821
gost_crypt.c: add assertions.
...
Submitted by: Seguei Leontiev
PR: 2821
2013-01-19 18:10:05 +01:00
Andy Polyakov
26906f2d93
engines/ccgost: add test case.
...
Submitted by: Serguei Leontiev
PR: 2821
2013-01-19 17:56:56 +01:00
Andy Polyakov
d4571f43e8
sha512-ppc.pl: add PPC32 code, >2x improvement on in-order cores.
2013-01-19 17:22:05 +01:00
Ben Laurie
eef6935426
Remove extraneous brackets (clang doesn't like them).
2013-01-19 15:12:08 +00:00
Ben Laurie
517dd307f9
Can't check a size_t for < 0.
2013-01-19 15:00:27 +00:00
Ben Laurie
a6bbbf2ff5
Make "make depend" work on MacOS out of the box.
2013-01-19 14:14:30 +00:00
Andy Polyakov
bba43f3f43
.gitignore adjustments
2013-01-19 13:20:21 +01:00
Dr. Stephen Henson
4badfebefc
Typo (PR2959).
2013-01-17 18:20:18 +00:00
Ben Laurie
08e5536445
Fix some clang warnings.
2013-01-13 21:04:39 +00:00
Ben Laurie
e54e123549
Correct EVP_PKEY_verifyrecover to EVP_PKEY_verify_recover (RT 2955).
2013-01-12 12:25:30 +00:00
Dr. Stephen Henson
abd01ea214
Change default bits to 1024
2013-01-07 16:18:31 +00:00
Ben Laurie
a5b2791cc9
Add some missing files, make paths absolute.
2013-01-06 19:06:40 +00:00
Ben Laurie
f00c54ae2e
Fix warning.
2013-01-06 19:03:48 +00:00
Dr. Stephen Henson
e71972d177
Initial .gitignore
2013-01-06 16:47:36 +00:00
Dr. Stephen Henson
c1faa8b5b2
make no-comp compile
2012-12-30 16:04:51 +00:00
Dr. Stephen Henson
b252cf0d98
make JPAKE work again, fix memory leaks
2012-12-29 23:38:20 +00:00
Dr. Stephen Henson
a4c4a7d5ca
stop warning when compiling with no-comp
2012-12-29 23:37:56 +00:00
Dr. Stephen Henson
bdcf772aa5
Portability fix: use BIO_snprintf and pick up strcasecmp alternative
...
definitions from e_os.h
2012-12-26 23:51:56 +00:00
Dr. Stephen Henson
89a5e2f704
missing tab
2012-12-26 19:12:57 +00:00
Dr. Stephen Henson
024e6fed62
typo
2012-12-26 15:23:42 +00:00
Dr. Stephen Henson
48b0951681
Fix tocsp: we don't need -trust_other any more.
...
Fix typo.
2012-12-21 18:32:33 +00:00
Dr. Stephen Henson
2dabd82236
Make partial chain checking work if we only have the EE certificate in
...
the trust store.
2012-12-21 18:31:32 +00:00
Dr. Stephen Henson
09d0d67c13
add missing newline
2012-12-21 16:24:48 +00:00
Dr. Stephen Henson
0028a23b9f
revert OCSP_basic_verify changes: they aren't needed now we support partial chain verification and can pass verify options to ocsp utility
2012-12-20 18:51:00 +00:00
Dr. Stephen Henson
032b33059e
Update test OCSP script "tocsp" to use shell functions and to use
...
December 17th as check date to avoid certificate expiry errors.
2012-12-20 18:48:11 +00:00
Andy Polyakov
3a3f964eda
gost_crypt.c: more intuitive ceiling.
2012-12-19 17:24:46 +00:00
Dr. Stephen Henson
b7d1a1af76
correct CHANGES
2012-12-19 14:34:39 +00:00
Andy Polyakov
8cfb6411ff
engines/cchost/gost_crypt.c: fix typo.
2012-12-19 11:06:00 +00:00
Andy Polyakov
2c0093d294
engines/e_capi.c: fix typo.
...
Submitted by: Pierre Delaage
2012-12-19 10:54:47 +00:00
Andy Polyakov
947e129219
engine/cchost: fix bugs.
...
PR: 2821
Submitted by: Dmitry Belyavsky, Serguei Leontiev
2012-12-19 10:45:13 +00:00
Andy Polyakov
0a2d5003df
dso/dso_win32.c: fix compiler warning.
2012-12-18 18:19:54 +00:00
Andy Polyakov
fb0a520897
util/pl/VC-32.pl fix typo.
2012-12-18 18:07:20 +00:00
Dr. Stephen Henson
230ec17d74
Use client version when deciding which cipher suites to disable.
2012-12-18 13:25:47 +00:00
Andy Polyakov
668bcfd5ca
util/pl/VC-32.pl: refresh, switch to ws2, add crypt32, fix typo (based on
...
suggestions from Pierre Delaage).
2012-12-18 09:42:31 +00:00
Andy Polyakov
8774f78d1b
VC-32.pl: fix typo.
...
Submitted by: Pierre Delaage
2012-12-16 19:39:24 +00:00
Andy Polyakov
f469880c61
d1_lib.c,bss_dgram.c: eliminate dependency on _ftime.
2012-12-16 19:02:59 +00:00
Dr. Stephen Henson
bbdfbacdef
add -rmd option to set OCSP response signing digest
2012-12-16 00:10:03 +00:00
Dr. Stephen Henson
e9754726d2
Check chain is not NULL before assuming we have a validated chain.
...
The modification to the OCSP helper purpose breaks normal OCSP verification.
It is no longer needed now we can trust partial chains.
2012-12-15 02:58:00 +00:00
Dr. Stephen Henson
99fc818e93
Return success when the responder is active.
...
Don't verify our own responses.
2012-12-15 02:56:02 +00:00
Dr. Stephen Henson
265f835e3e
typo
2012-12-15 00:29:12 +00:00
Dr. Stephen Henson
33826fd028
Add support for '-' as input and output filenames in ocsp utility.
...
Recognise verification arguments.
2012-12-14 23:30:56 +00:00
Dr. Stephen Henson
92821996de
oops, revert, committed in error
2012-12-14 23:29:58 +00:00
Dr. Stephen Henson
11e2957d5f
apps/ocsp.c
2012-12-14 23:28:19 +00:00
Ben Laurie
3a778a2913
Documentation improvements by Chris Palmer (Google).
2012-12-14 13:28:49 +00:00
Andy Polyakov
4d2654783c
fips/fipsld: improve cross-compile support.
2012-12-13 22:51:01 +00:00
Dr. Stephen Henson
2a21cdbe6b
Use new partial chain flag instead of modifying input parameters.
2012-12-13 18:20:47 +00:00
Dr. Stephen Henson
51e7a4378a
New verify flag to return success if we have any certificate in the
...
trusted store instead of the default which is to return an error if
we can't build the complete chain.
2012-12-13 18:14:46 +00:00
Ben Laurie
74cc3b583d
Document -pubkey.
2012-12-13 16:17:55 +00:00
Ben Laurie
e7cf2b1022
Improve my 64-bit debug target.
2012-12-12 14:14:43 +00:00
Dr. Stephen Henson
60938ae772
add -crl_download option to s_server
2012-12-12 03:35:31 +00:00
Dr. Stephen Henson
4e71d95260
add -cert_chain option to s_client
2012-12-12 00:50:26 +00:00
Ben Laurie
fefc111a2a
Make openssl verify return errors.
2012-12-11 16:05:14 +00:00
Ben Laurie
b204ab6506
Update ignores.
2012-12-11 15:52:10 +00:00
Ben Laurie
ec40e5ff42
Tabification. Remove accidental duplication.
2012-12-10 16:52:17 +00:00
Dr. Stephen Henson
b34aa49c25
revert SUITEB128ONLY patch, anything wanting to use P-384 can use SUITEB128 instead
2012-12-10 02:02:16 +00:00
Dr. Stephen Henson
1e8b9e7e69
add -badsig option to ocsp utility too.
2012-12-09 16:21:46 +00:00
Dr. Stephen Henson
d372d36592
allow ECDSA+SHA384 signature algorithm in SUITEB128ONLY mode
2012-12-09 16:03:34 +00:00
Dr. Stephen Henson
36b5bb6f2f
send out the raw SSL/TLS headers to the msg_callback and display them in SSL_trace
2012-12-07 23:42:33 +00:00
Ben Laurie
30c278aa6b
Fix OCSP checking.
2012-12-07 18:47:47 +00:00
Dr. Stephen Henson
083bec780d
typo
2012-12-07 13:23:49 +00:00
Dr. Stephen Henson
1edf8f1b4e
really fix automatic ;-)
2012-12-07 12:41:13 +00:00
Dr. Stephen Henson
65f2a56580
documentation fixes
2012-12-06 23:26:11 +00:00
Dr. Stephen Henson
f1f5c70a04
fix handling of "automatic" in file mode
2012-12-06 21:53:05 +00:00
Dr. Stephen Henson
0090a686c0
Add code to download CRLs based on CRLDP extension.
...
Just a sample, real world applications would have to be cleverer.
2012-12-06 18:43:40 +00:00
Dr. Stephen Henson
f5a7d5b164
remove print_ssl_cert_checks() from openssl application: it is no longer used
2012-12-06 18:36:51 +00:00
Dr. Stephen Henson
abd2ed012b
Fix two bugs which affect delta CRL handling:
...
Use -1 to check all extensions in CRLs.
Always set flag for freshest CRL.
2012-12-06 18:24:28 +00:00
Dr. Stephen Henson
3bf15e2974
Integrate host, email and IP address checks into X509_verify.
...
Add new verify options to set checks.
Remove previous -check* commands from s_client and s_server.
2012-12-05 18:35:20 +00:00
Andy Polyakov
8df400cf8d
aes-s390x.pl: fix XTS bugs in z196-specific code path.
2012-12-05 17:44:45 +00:00
Dr. Stephen Henson
fbeb85ecb9
don't print verbose policy check messages when -quiet is selected even on error
2012-12-04 23:18:44 +00:00
Andy Polyakov
3766e7ccab
ghash-sparcv9.pl: shave off one more xmulx, improve T3 performance by 7%.
2012-12-04 20:21:24 +00:00
Dr. Stephen Henson
2e8cb108dc
initial support for delta CRL generations by diffing two full CRLs
2012-12-04 18:35:36 +00:00
Dr. Stephen Henson
256f9573c5
make -subj always override config file
2012-12-04 18:35:04 +00:00
Dr. Stephen Henson
b6b094fb77
check mval for NULL too
2012-12-04 17:25:34 +00:00
Dr. Stephen Henson
0db46a7dd7
fix leak
2012-12-03 16:32:52 +00:00
Dr. Stephen Henson
2537d46903
oops, really check brief mode only ;-)
2012-12-03 03:40:57 +00:00
Dr. Stephen Henson
5447f836a0
don't check errno is zero, just print out message
2012-12-03 03:39:23 +00:00
Dr. Stephen Henson
66d9f2e521
if no error code and -brief selected print out connection closed instead of read error
2012-12-03 03:33:44 +00:00
Dr. Stephen Henson
139cd16cc5
add -badsig option to corrupt CRL signatures for testing too
2012-12-02 16:48:25 +00:00
Dr. Stephen Henson
fdb78f3d88
New option to add CRLs for s_client and s_server.
2012-12-02 16:16:28 +00:00
Dr. Stephen Henson
95ea531864
add option to get a certificate or CRL from a URL
2012-12-02 14:00:22 +00:00
Dr. Stephen Henson
4842dde80c
return error if Suite B mode is selected and TLS 1.2 can't be used. Correct error coded
2012-12-01 18:33:21 +00:00
Andy Polyakov
f91926a240
cryptlib.c: fix logical error.
2012-12-01 18:24:20 +00:00
Andy Polyakov
9282c33596
aesni-x86_64.pl: CTR face lift, +25% on Bulldozer.
2012-12-01 18:20:39 +00:00
Andy Polyakov
c3cddeaec8
aes-s390x.pl: harmonize software-only code path [and minor optimization].
2012-12-01 11:06:19 +00:00
Dr. Stephen Henson
df316fd43c
Add new test option set the version in generated certificates: this
...
is needed to test some profiles/protocols which reject certificates
with unsupported versions.
2012-11-30 19:24:13 +00:00
Dr. Stephen Henson
2fceff5ba3
PR: 2803
...
Submitted by: jean-etienne.schwartz@bull.net
In OCSP_basic_varify return an error if X509_STORE_CTX_init fails.
2012-11-29 19:15:14 +00:00
Dr. Stephen Henson
f404278186
add wrapper function for certificate download
2012-11-29 01:15:09 +00:00
Dr. Stephen Henson
68f5500d31
constify
2012-11-29 01:13:38 +00:00
Dr. Stephen Henson
6f9076ff37
Generalise OCSP I/O functions to support dowloading of other ASN1
...
structures using HTTP. Add wrapper function to handle CRL download.
2012-11-28 16:22:53 +00:00
Andy Polyakov
904732f68b
C64x+ assembly pack: improve EABI support.
2012-11-28 13:19:10 +00:00
Andy Polyakov
cf5ecc3e1f
Update support for Intel compiler: add linux-x86_64-icc and fix problems.
2012-11-28 13:05:13 +00:00
Dr. Stephen Henson
2c340864be
New functions to set lookup_crls callback and to retrieve internal X509_STORE
...
from X509_STORE_CTX.
2012-11-27 23:47:48 +00:00
Dr. Stephen Henson
84bafb7471
Print out point format list for clients too.
2012-11-26 18:39:38 +00:00
Dr. Stephen Henson
5087afa108
Use default point formats extension for server side as well as client
...
side, if possible.
Don't advertise compressed char2 for SuiteB as it is not supported.
2012-11-26 18:38:10 +00:00
Dr. Stephen Henson
93c2c9befc
change inaccurate error message
2012-11-26 15:47:32 +00:00
Dr. Stephen Henson
d900c0ae14
set auto ecdh parameter selction for Suite B
2012-11-26 15:10:50 +00:00
Dr. Stephen Henson
55b66f084d
set cmdline flag in s_server
2012-11-26 12:51:12 +00:00
Dr. Stephen Henson
96cfba0fb4
option to output corrupted signature in certificates for testing purposes
2012-11-25 22:29:52 +00:00
Andy Polyakov
cd68694646
AES for SPARC T4: add XTS, reorder subroutines to improve TLB locality.
2012-11-24 21:55:23 +00:00
Dr. Stephen Henson
1c16fd1f03
add Suite B 128 bit mode offering only combination 2
2012-11-24 00:59:51 +00:00
Dr. Stephen Henson
a5afc0a8f4
Don't display messages about verify depth in s_server if -quiet it set.
...
Add support for separate verify and chain stores in s_client.
2012-11-23 18:56:25 +00:00
Dr. Stephen Henson
20b431e3a9
Add support for printing out and retrieving EC point formats extension.
2012-11-22 15:20:53 +00:00
Dr. Stephen Henson
e83aefb3a0
reject zero length point format list or supported curves extensions
2012-11-22 14:15:44 +00:00
Dr. Stephen Henson
1740c9fbfc
support -quiet with -msg or -trace
2012-11-21 17:11:42 +00:00
Dr. Stephen Henson
2588d4ca41
curves can be set in both client and server
2012-11-21 17:01:46 +00:00
Dr. Stephen Henson
878b5d07ef
use correct return values when callin cmd
2012-11-21 16:59:33 +00:00
Dr. Stephen Henson
191b3f0ba9
only use a default curve if not already set
2012-11-21 16:47:25 +00:00
Dr. Stephen Henson
46a6cec699
Reorganise parameters for OPENSSL_gmtime_diff.
...
Make ASN1_UTCTIME_cmp_time_t more robust by using the new time functions.
2012-11-21 14:13:20 +00:00
Dr. Stephen Henson
472af806ce
Submitted by: Florian Weimer <fweimer@redhat.com>
...
PR: 2909
Update test cases to cover internal error return values.
Remove IDNA wildcard filter.
2012-11-21 14:10:48 +00:00
Dr. Stephen Henson
5c1393bfc3
PR: 2908
...
Submitted by: Dmitry Belyavsky <beldmit@gmail.com >
Fix DH double free if parameter generation fails.
2012-11-21 14:02:40 +00:00
Dr. Stephen Henson
f7ac0ec89d
fix printout of expiry days if -enddate is used in ca
2012-11-20 15:22:15 +00:00
Dr. Stephen Henson
598c423e65
don't use psec or pdays if NULL
2012-11-20 15:20:40 +00:00
Dr. Stephen Henson
360ef6769e
first parameter is difference in days, not years
2012-11-20 15:19:53 +00:00
Dr. Stephen Henson
13cfb04343
reorganise SSL_CONF_cmd manual page and update some links
2012-11-20 01:01:33 +00:00
Dr. Stephen Henson
22b5d7c80b
fix leaks
2012-11-20 00:24:52 +00:00
Dr. Stephen Henson
685755937a
with -rev close connection if client sends "CLOSE"
2012-11-19 23:41:24 +00:00
Dr. Stephen Henson
7c8ac50504
update usage messages
2012-11-19 23:20:40 +00:00
Dr. Stephen Henson
095db6bdb8
correct docs
2012-11-19 20:06:44 +00:00
Dr. Stephen Henson
8dbeb110fb
document -trace and -msgfile options
2012-11-19 16:37:18 +00:00
Dr. Stephen Henson
765b413794
update docs for s_server/s_client
2012-11-19 16:07:53 +00:00
Dr. Stephen Henson
d223dfe641
make depend
2012-11-19 15:13:33 +00:00
Dr. Stephen Henson
1c455bc084
new function ASN1_TIME_diff to calculate difference between two ASN1_TIME structures
2012-11-19 15:12:07 +00:00
Andy Polyakov
9f6b0635ad
x86_64-gcc.c: resore early clobber constraint.
...
Submitted by: Florian Weimer
2012-11-19 15:02:00 +00:00
Dr. Stephen Henson
98a7edf9f0
make depend
2012-11-19 13:18:09 +00:00
Dr. Stephen Henson
7831969634
don't call gethostbyname if OPENSSL_SSL_DEBUG_BROKEN_PROTOCOL is set
2012-11-19 12:36:04 +00:00
Dr. Stephen Henson
9ba297e49f
remove obsolete code
2012-11-19 03:46:49 +00:00
Dr. Stephen Henson
ddd13d677b
fix typo and warning
2012-11-19 02:46:46 +00:00
Dr. Stephen Henson
821244cf67
clarify docs
2012-11-18 18:06:16 +00:00
Dr. Stephen Henson
edb128ce00
fix manual page file name
2012-11-18 17:58:45 +00:00
Dr. Stephen Henson
642aa226db
document -naccept option
2012-11-18 15:51:26 +00:00
Dr. Stephen Henson
b5cadfb564
add -naccept <n> option to s_server to automatically exit after <n> connections
2012-11-18 15:45:16 +00:00
Dr. Stephen Henson
c4fc172240
PR: 2880
...
Submitted by: "Florian Rüchel" <florian.ruechel@ruhr-uni-bochum.de >
Correctly handle local machine keys in the capi ENGINE.
2012-11-18 15:24:37 +00:00
Dr. Stephen Henson
d88926f181
PR: 2909
...
Contributed by: Florian Weimer <fweimer@redhat.com >
Fixes to X509 hostname and email address checking. Wildcard matching support.
New test program and manual page.
2012-11-18 15:13:55 +00:00
Dr. Stephen Henson
24f77b34d5
remove redundant code from demo
2012-11-18 14:47:25 +00:00
Andy Polyakov
cccf27c89a
cryptlib.c: revert typo.
2012-11-17 21:42:57 +00:00
Andy Polyakov
c5cd28bd64
Extend OPENSSL_ia32cap_P with extra word to accomodate AVX2 capability.
2012-11-17 19:04:15 +00:00
Andy Polyakov
b3aee265c5
perlasm/sparcv9_modes.pl: addendum to commit#22966.
2012-11-17 18:34:17 +00:00
Dr. Stephen Henson
9fc81acae6
fix error messages
2012-11-17 15:22:50 +00:00
Dr. Stephen Henson
5d2e07f182
Delegate command line handling for many common options in s_client/s_server
...
to the SSL_CONF APIs.
This is complicated a little because the SSL_CTX structure is not available
when the command line is processed: so just check syntax of commands initially
and store them, ready to apply later.
2012-11-17 14:42:22 +00:00
Dr. Stephen Henson
aa714f3af4
initial decription of GCM/CCM usage via EVP
2012-11-17 14:38:20 +00:00
Andy Polyakov
68c06bf6b2
Support for SPARC T4 MONT[MUL|SQR] instructions.
...
Submitted by: David Miller, Andy Polyakov
2012-11-17 10:34:11 +00:00
Dr. Stephen Henson
c7b7984ac9
fix typos in SSL_CONF documentation
2012-11-17 00:21:34 +00:00
Dr. Stephen Henson
3db935a9e5
add SSL_CONF functions and documentation
2012-11-16 19:12:24 +00:00
Dr. Stephen Henson
63d103ea48
typo
2012-11-16 12:49:14 +00:00
Dr. Stephen Henson
999ffeca6c
update ciphers documentation to indicate implemented fixed DH ciphersuites
2012-11-16 01:15:15 +00:00
Dr. Stephen Henson
ffa4579679
initial update of ciphers doc
2012-11-16 00:42:38 +00:00
Dr. Stephen Henson
51b9115b6d
new command line option -stdname to ciphers utility
2012-11-16 00:35:46 +00:00
Dr. Stephen Henson
8ab92fc646
add "missing" TLSv1.2 cipher alias
2012-11-15 19:14:47 +00:00
Andy Polyakov
98dc178494
aes-x86_64.pl: Atom-specific optimizations, +10%.
...
vpaes-x86_64.pl: minor performance squeeze.
2012-11-12 17:52:41 +00:00
Andy Polyakov
89f1eb8213
aes-586.pl: Atom-specific optimization, +44/29%, minor improvement on others.
...
vpaes-x86.pl: minor performance squeeze.
2012-11-12 17:50:19 +00:00
Andy Polyakov
f717abd7c1
ppccap.c: fix typo.
2012-11-10 20:27:18 +00:00
Andy Polyakov
d5630dd60e
ppccap.c: restrict features on AIX 5.
2012-11-10 20:24:51 +00:00
Andy Polyakov
134c00659a
bn_word.c: fix overflow bug in BN_add_word.
2012-11-09 13:58:40 +00:00
Dr. Stephen Henson
8bb870df9e
new feature: if ctx==NULL in SSL_CTX_ctrl perform syntax checking only for some operations (currently curves and signature algorithms)
2012-11-08 14:24:51 +00:00
Dr. Stephen Henson
95bba34b83
contify
2012-11-05 19:38:32 +00:00
Andy Polyakov
96a4cf8c29
crypto/modes: even more strict aliasing fixes [and fix bug in cbc128.c from
...
previous cbc128.c commit].
2012-11-05 17:03:39 +00:00
Ben Laurie
da01515c40
More strict aliasing fix.
2012-11-05 14:23:55 +00:00
Dr. Stephen Henson
7c43ea50fd
correct error function code
2012-11-05 13:34:29 +00:00
Andy Polyakov
c0832990f5
cbc128.c: fix strict aliasing warning.
2012-11-05 10:04:02 +00:00
Andy Polyakov
7cb81398b7
e_camillia.c: remove copy-n-paste artifact, EVP_CIPH_FLAG_FIPS, and
...
leave comment about CTR mode.
2012-11-05 09:20:41 +00:00
Andy Polyakov
24798c5e59
ghash-sparcv9.pl: 22% improvement on T4.
2012-11-05 08:47:26 +00:00
Ben Laurie
5b0e3daf50
Remove unused static function.
2012-11-05 02:01:07 +00:00
Ben Laurie
53d6bf40c1
Fix gcc 4.8 warning (strict aliasing violation).
2012-11-05 01:59:33 +00:00
Andy Polyakov
1e98169086
mk1mf.pl: correct flags.
2012-10-29 22:23:58 +00:00
Andy Polyakov
866f1f41d1
e_os.h: keep stdin redifinitions to "normal" Windows.
2012-10-29 20:55:08 +00:00
Andy Polyakov
536a16435b
util/fipslink.pl: further adjustments.
2012-10-27 23:36:43 +00:00
Andy Polyakov
7f5bf370db
util/fipslink.pl: fix typo.
2012-10-27 21:21:09 +00:00
Andy Polyakov
2c7af9cb6e
e_os.h: skip redundant headers in fipscanister build.
2012-10-27 21:17:48 +00:00
Andy Polyakov
fe5772e9d0
util/fipslink.pl: allow for single-step link.
2012-10-27 21:16:45 +00:00
Andy Polyakov
8be18f3459
util/pl/VC-32.pl: make fipscanister.lib universally usable.
2012-10-27 21:16:00 +00:00
Dr. Stephen Henson
226afe4956
typo
2012-10-27 18:05:56 +00:00
Andy Polyakov
cfb399ad55
test_t4: cover even Camellia.
2012-10-25 12:10:44 +00:00
Andy Polyakov
1efd583085
SPARCv9 assembly pack: harmonize ABI handling (so that it's handled in one
...
place at a time, by pre-processor in .S case and perl - in .s).
2012-10-25 12:07:32 +00:00
Andy Polyakov
8ed11a815e
[aes|cmll]t4-sparcv9.pl: unify argument handling.
2012-10-25 12:03:41 +00:00
Andy Polyakov
38049c2bb9
perlasm/sparcv9_modes.pl: fix typo in IV save code and switch to less
...
aggressive ASI.
2012-10-25 12:02:37 +00:00
Dr. Stephen Henson
918e613a32
oops, add missing asn_mstbl.c
2012-10-24 13:27:46 +00:00
Andy Polyakov
23328d4b27
ghash-sparcv9.pl: add VIS3 code path.
2012-10-24 08:21:10 +00:00
Dr. Stephen Henson
30765fed55
New config module for string tables. This can be used to add new
...
multi string components (as used in DN fields or request attributes)
or change the values of existing ones.
2012-10-22 13:05:54 +00:00
Dr. Stephen Henson
6a45ea4f88
use correct year automatically
2012-10-22 13:02:42 +00:00
Andy Polyakov
78c3e20579
linux-pcc: make it more robust and recognize KERNEL_BITS variable.
2012-10-21 18:19:41 +00:00
Andy Polyakov
0c832ec5c6
Add VIS3-capable sparcv9-gf2m module.
2012-10-20 15:59:14 +00:00
Andy Polyakov
947d78275b
Add VIS3 Montgomery multiplication.
2012-10-20 09:13:21 +00:00
Dr. Stephen Henson
d35c0ff30b
fix ASN1_STRING_TABLE_add so it can override existing string table values
2012-10-19 15:06:31 +00:00
Dr. Stephen Henson
057c8a2b9e
fix error code
2012-10-18 16:21:39 +00:00
Dr. Stephen Henson
07a4ff79d2
add simple AES GCM code example
2012-10-16 23:03:45 +00:00
Dr. Stephen Henson
964eaad78c
Don't require tag before ciphertext in AESGCM mode
2012-10-16 22:46:08 +00:00
Andy Polyakov
3bc522a246
aix[64]-cc: get MT support right (gcc targets are not affected).
2012-10-16 08:06:51 +00:00
Andy Polyakov
fd3b0eb01d
sparcv9_modes.pl: membars are reported as must-have.
2012-10-15 14:04:52 +00:00
Andy Polyakov
d17b59e49f
md5-sparcv9.pl: avoid %asi modifications, improve short input performance
...
by 30-20%.
2012-10-14 16:51:27 +00:00
Andy Polyakov
aea4126e4e
[md5|sha1|sha512]-sparcv9.pl: "cooperative" optimizations based on
...
suggestions from David Miller.
2012-10-14 14:46:56 +00:00
Andy Polyakov
eec82a0e1f
[aes|cmll]t4-sparcv9.pl: addendum to previous sparcv9_modes.pl commit.
2012-10-14 14:42:27 +00:00
Andy Polyakov
dea8068015
perlasm/sparcv9_modes.pl: "cooperative" optimizations based on suggestions
...
from David Miller.
2012-10-14 14:25:00 +00:00
Andy Polyakov
4739ccdb39
Add SPARC T4 Camellia support.
...
Submitted by: David Miller
2012-10-11 18:35:18 +00:00
Andy Polyakov
54a1f4480e
aest4-sparcv9.pl: split it to AES-specific and reusable part.
2012-10-11 18:30:35 +00:00
Dr. Stephen Henson
671c9e2dc8
oops, fix compilation errors in s_server
2012-10-11 18:03:42 +00:00
Dr. Stephen Henson
a70da5b3ec
New functions to check a hostname email or IP address against a
...
certificate. Add options to s_client, s_server and x509 utilities
to print results of checks.
2012-10-08 15:10:07 +00:00
Andy Polyakov
c5f6da54fc
Add SPARC T4 AES support.
...
Submitted by: David Miller
2012-10-06 18:08:09 +00:00
Bodo Möller
f11d0c7908
Fix EC_KEY initialization race.
...
Submitted by: Adam Langley
2012-10-05 20:50:11 +00:00
Dr. Stephen Henson
323fa64559
If OPENSSL_SSL_DEBUG_BROKEN_PROTOCOL is set allow the use of "SCSV" as
...
a ciphersuite to position the SCSV value in different places for testing
purposes.
2012-09-30 12:39:27 +00:00
Andy Polyakov
3ed6e22771
sha[1|512]-sparcv9.pl: add hardware SPARC T4 support.
...
Submitted by: David Miller
2012-09-28 09:35:39 +00:00
Andy Polyakov
e66055b8f7
md5-sparcv9.pl: add hardware SPARC T4 support.
...
Submitted by: David Miller
2012-09-28 09:34:09 +00:00
Andy Polyakov
b460c8f896
sparc_arch.h: add assembler helpers (and make it work on Solaris).
...
Submitted by: David Miller
2012-09-28 09:31:40 +00:00
Andy Polyakov
27e0c86307
md5-sparcv9.pl: more accurate performance result.
2012-09-28 09:25:49 +00:00
Bodo Möller
7f429a5dbf
Fix Valgrind warning.
...
Submitted by: Adam Langley
2012-09-24 19:49:16 +00:00
Richard Levitte
c9d3ec6943
* Configure: make the debug-levitte-linux{elf,noasm} less extreme.
2012-09-24 18:48:37 +00:00
Andy Polyakov
e98c526b68
Add md5-sparcv9.pl.
2012-09-23 20:39:53 +00:00
Andy Polyakov
1fda639ae7
sparcv9cap.c: add SPARC-T4 feature detection.
...
Submitted by: David Miller
2012-09-23 20:29:03 +00:00
Richard Levitte
4d88fc8173
* ssl/t1_enc.c (tls1_change_cipher_state): Stupid bug. Fortunately in
...
debugging code that's seldom used.
2012-09-21 13:08:24 +00:00
Andy Polyakov
b8c5929130
config: detect linux-mips* targets.
2012-09-19 20:58:07 +00:00
Andy Polyakov
800a4a707d
Configure: allow for compiler options starting with double dash.
2012-09-18 12:54:35 +00:00
Andy Polyakov
5cc2159526
MIPS assembly pack: add support for SmartMIPS ASE.
2012-09-18 12:52:23 +00:00
Bodo Möller
6373af15d3
Fix warning.
...
Submitted by: Chromium Authors
2012-09-17 17:21:58 +00:00
Andy Polyakov
63d8834c26
Configure: add MIPS targets.
2012-09-15 11:21:50 +00:00
Andy Polyakov
8df5518bd9
MIPS assembly pack: add MIPS[32|64]R2 code.
2012-09-15 11:18:20 +00:00
Andy Polyakov
9b222748e7
aes-mips.pl: interleave load and integer instructions for better performance.
2012-09-15 11:15:02 +00:00
Andy Polyakov
17e820aec3
sha512-sparcv9.pl: fix binutils compilation error.
...
Submitted by: David Miller
2012-09-15 08:53:25 +00:00
Andy Polyakov
244ed51a0d
e_aes.c: uninitialized variable in aes_ccm_init_key.
...
PR: 2874
Submitted by: Tomas Mraz
2012-09-15 08:45:42 +00:00
Dr. Stephen Henson
4f3df8bea2
Add -rev test option to s_server to just reverse order of characters received
...
by client and send back to server. Also prints an abbreviated summary of
the connection parameters.
2012-09-14 13:27:05 +00:00
Dr. Stephen Henson
2a7cbe77b3
Add -brief option to s_client and s_server to summarise connection details.
...
New option -verify_quiet to shut up the verify callback unless there is
an error.
2012-09-12 23:14:28 +00:00
Dr. Stephen Henson
94a209d8e1
Add ctrl and utility functions to retrieve raw cipher list sent by client in
...
client hello message. Previously this could only be retrieved on an initial
connection and it was impossible to determine the cipher IDs of any uknown
ciphersuites.
2012-09-12 13:57:48 +00:00
Dr. Stephen Henson
24edfa9df9
enhance EC method to support setting curve type when generating keys and add parameter encoding option
2012-09-11 13:54:09 +00:00
Dr. Stephen Henson
0a17b8de06
fix memory leak
2012-09-11 13:43:57 +00:00
Dr. Stephen Henson
e5db9c3b67
Minor enhancement to PR#2836 fix. Instead of modifying SSL_get_certificate
...
change the current certificate (in s->cert->key) to the one used and then
SSL_get_certificate and SSL_get_privatekey will automatically work.
2012-09-11 13:34:08 +00:00
Ben Laurie
2daceb0342
Call OCSP Stapling callback after ciphersuite has been chosen, so the
...
right response is stapled. Also change SSL_get_certificate() so it
returns the certificate actually sent. See
http://rt.openssl.org/Ticket/Display.html?id=2836 .
2012-09-11 12:57:46 +00:00
Dr. Stephen Henson
147d4c96b0
fix memory leak
2012-09-09 21:19:32 +00:00
Dr. Stephen Henson
61d24f102d
update README
2012-09-09 20:47:36 +00:00
Dr. Stephen Henson
79b184fb4b
Extend certificate creation examples to include CRL generation and sample
...
scripts running the test OCSP responder.
2012-09-09 20:43:49 +00:00
Dr. Stephen Henson
648f551a4a
New -valid option to add a certificate to the ca index.txt that is valid and not revoked
2012-09-09 12:58:49 +00:00
Dr. Stephen Henson
33a8de69dc
new ctrl to retrive value of received temporary key in server key exchange message, print out details in s_client
2012-09-08 13:59:51 +00:00
Dr. Stephen Henson
319354eb6c
store and print out message digest peer signed with in TLS 1.2
2012-09-07 12:53:42 +00:00
Andy Polyakov
e7db9896bb
bsaes-armv7.pl: closest shave. While 0.3 cpb improvement on S4 appears
...
insignificant, it's actually 4 cycles less for 14 instructions sequence!
2012-09-07 12:29:18 +00:00
Andy Polyakov
4f16215b9d
bsaes-armv7.pl: even closer shave.
2012-09-04 14:39:05 +00:00
Andy Polyakov
a903e6919c
bsaes-armv7.pl: minor performance squeeze on Snapdragon S4.
2012-09-04 08:26:50 +00:00
Andy Polyakov
f26328c2f3
sha512-armv4.pl: optimize for Snapdragon S4.
2012-09-04 08:25:37 +00:00
Andy Polyakov
a58fdc7a34
bn_lcl.h: gcc removed support for "h" constraint, which broke inline
...
assembler.
2012-09-01 13:17:32 +00:00
Dr. Stephen Henson
d21bf10dea
Don't load GOST ENGINE if it is already loaded.
...
Multiple copies of the ENGINE will cause problems when it is cleaned up as
the methods are stored in static structures which will be overwritten and
freed up more than once.
Set static methods to NULL when the ENGINE is freed so it can be reloaded.
2012-09-01 11:30:53 +00:00
Dr. Stephen Henson
d47c01a31a
perform sanity checks on server certificate type as soon as it is received instead of waiting until server key exchange
2012-08-31 11:18:54 +00:00
Dr. Stephen Henson
ef6b34bec2
make EC test certificates usable for ECDH
2012-08-31 11:15:44 +00:00
Dr. Stephen Henson
becfdb995b
give more meaningful error if presented with wrong certificate type by server
2012-08-30 12:46:22 +00:00
Andy Polyakov
6206682a35
x86cpuid.pl: hide symbols [backport from x86_64].
2012-08-29 14:19:59 +00:00
Andy Polyakov
88d6b87fca
TABLE update addendum to commit#22775.
2012-08-29 14:15:18 +00:00
Andy Polyakov
0e1f390bad
Harmonize CHANGES in HEAD.
2012-08-29 14:14:05 +00:00
Andy Polyakov
be0d31b166
Add linux-x32 target.
2012-08-29 14:08:46 +00:00
Dr. Stephen Henson
ed83ba5321
Add compilation flag to disable certain protocol checks and allow use of
...
some invalid operations for testing purposes. Currently this can be used
to sign using digests the peer doesn't support, EC curves the peer
doesn't support and use certificates which don't match the type associated
with a ciphersuite.
2012-08-29 13:18:34 +00:00
Dr. Stephen Henson
81f57e5a69
oops, typo
2012-08-28 23:19:25 +00:00
Dr. Stephen Henson
1cf218bcaa
New compile time option OPENSSL_SSL_TRACE_CRYPTO, when set this passes
...
all derived keys to the message callback.
Add code to SSL_trace to include support for printing out keys.
2012-08-28 23:17:28 +00:00
Dr. Stephen Henson
093050b660
update debug-steve* configurations
2012-08-28 23:06:12 +00:00
Dr. Stephen Henson
0db17852cd
PR: 2786
...
Reported by: Tomas Mraz <tmraz@redhat.com >
Treat a NULL value passed to drbg_free_entropy callback as non-op. This
can happen if the call to fips_get_entropy fails.
2012-08-22 22:43:23 +00:00
Andy Polyakov
1a9d60d2e3
sha1-armv4-large.pl: comply with ABI.
2012-08-17 19:57:04 +00:00
Andy Polyakov
9a10ea3fc0
Configure: add mips-mont to MIPS32 builds.
2012-08-17 09:38:45 +00:00
Andy Polyakov
1a002d88ad
MIPS assembly pack: assign default value to $flavour.
2012-08-17 09:10:31 +00:00
Bodo Möller
619aab841c
Oops - didn't mean to change Makefile on previous submit
2012-08-16 13:49:34 +00:00
Bodo Möller
a4aafeeef4
Enable message names for TLS 1.1, 1.2 with -msg.
2012-08-16 13:41:40 +00:00
Dr. Stephen Henson
2ea8035460
Add three Suite B modes to TLS code, supporting RFC6460.
2012-08-15 15:15:05 +00:00
Andy Polyakov
5833e4f5d6
bss_dgram.c: fix compilation failure and warning on Windows with
...
contemporary SDK.
2012-08-14 09:53:24 +00:00
Andy Polyakov
99e59d634a
gosthash.c: use memmove in circle_xor8, as input pointers can be equal.
...
PR: 2858
2012-08-13 16:36:51 +00:00
Andy Polyakov
cb726fe8d4
./Configure: libcrypto.a can grow to many GB because of ar bug.
...
PR: 2838
2012-08-13 16:10:08 +00:00
Andy Polyakov
9ddd859d2a
gcm128.c: fix AAD-only case with AAD length not divisible by 16.
...
PR: 2859
Submitted by: John Foley
2012-08-13 15:07:37 +00:00
Andy Polyakov
f6ff1aa8e0
sha512-x86_64.pl: revert previous change and solve the problem through
...
perlasm/x86_64-xlate.pl instead.
2012-08-13 12:34:36 +00:00
Andy Polyakov
3a5485a9f8
sha512-x86_64.pl: minimum gas requirement for AMD XOP.
2012-08-13 11:01:44 +00:00
Dr. Stephen Henson
9053c139fd
update ordinals
2012-08-05 18:14:21 +00:00
Dr. Stephen Henson
3b0648ebc9
Rename Suite B functions for consistency.
...
New function X509_chain_up_ref to dup and up the reference count of
a STACK_OF(X509): replace equivalent functionality in several places
by the equivalent call.
2012-08-03 15:58:15 +00:00
Dr. Stephen Henson
3ad344a517
add suite B chain validation flags and associated verify errors
2012-08-03 13:51:43 +00:00
Dr. Stephen Henson
6dbb6219e7
Make tls1_check_chain return a set of flags indicating checks passed
...
by a certificate chain. Add additional tests to handle client
certificates: checks for matching certificate type and issuer name
comparison.
Print out results of checks for each candidate chain tested in
s_server/s_client.
2012-07-27 13:39:23 +00:00
Dr. Stephen Henson
ec4a50b3c3
Abort handshake if signature algorithm used not supported by peer.
2012-07-24 18:11:27 +00:00
Dr. Stephen Henson
d18b716d25
check EC tmp key matches preferences
2012-07-24 13:47:40 +00:00
Dr. Stephen Henson
1e4cb467e1
typo
2012-07-24 13:32:40 +00:00
Dr. Stephen Henson
74ecfab401
Add support for certificate stores in CERT structure. This makes it
...
possible to have different stores per SSL structure or one store in
the parent SSL_CTX. Include distint stores for certificate chain
verification and chain building. New ctrl SSL_CTRL_BUILD_CERT_CHAIN
to build and store a certificate chain in CERT structure: returing
an error if the chain cannot be built: this will allow applications
to test if a chain is correctly configured.
Note: if the CERT based stores are not set then the parent SSL_CTX
store is used to retain compatibility with existing behaviour.
2012-07-23 23:34:28 +00:00
Dr. Stephen Henson
5818a07a4f
update NEWS
2012-07-20 15:24:06 +00:00
Dr. Stephen Henson
050ce4ca42
set ciphers to NULL before calling cert_cb
2012-07-20 15:21:23 +00:00
Dr. Stephen Henson
8e2a06bf5c
stop warning
2012-07-19 16:57:19 +00:00
Dr. Stephen Henson
a1644902eb
add ssl_locl.h to err header files, rebuild ssl error strings
2012-07-19 14:45:36 +00:00
Dr. Stephen Henson
bff9ce4db3
Don't ignore (\!) reference count in X509_STORE_free
2012-07-19 12:44:09 +00:00
Dr. Stephen Henson
b7bfe69b66
New function ssl_set_client_disabled to set masks for any ciphersuites
...
that are disabled for this session (as opposed to always disabled by
configuration).
2012-07-18 14:09:46 +00:00
Dr. Stephen Henson
5180f57c65
reinclude crypto.h: this is needed in HEAD only to get the __fips_constseg definition
2012-07-18 14:07:50 +00:00
Dr. Stephen Henson
63fe4ee14c
update trace messages
2012-07-18 13:53:56 +00:00
Andy Polyakov
69f45c520c
sha1-[586|x86_64].pl: shave off one instruction from body_40_59, it's
...
2% less instructions in SIMD code paths, so 2% improvement in average:-)
2012-07-15 20:33:30 +00:00
Andy Polyakov
7bb98eee3c
mk1mf.pl: replace chop to make it work in mixture of perls for Windows.
2012-07-15 13:40:04 +00:00
Andy Polyakov
799379215e
test_aesni: harmonize with AES-NI support at EVP layer.
2012-07-15 13:38:51 +00:00
Andy Polyakov
701d593f70
wp-x86_64.pl: ~10% performance improvement.
2012-07-15 13:37:35 +00:00
Andy Polyakov
ee923b4cef
sha512-s390x.pl: lingering comment update.
2012-07-15 13:36:57 +00:00
Andy Polyakov
46a2b3387a
sha512-ia64.pl: 15-20% performance improvement.
2012-07-15 13:36:25 +00:00
Andy Polyakov
e09039c01c
sha256-armv4.pl: 4% performance improvement.
2012-07-15 13:35:10 +00:00
Andy Polyakov
da3bd2779d
sha1-s390x.pl: lingering comment update.
2012-07-15 13:34:26 +00:00
Andy Polyakov
b046d70676
rc5.h: stop wasting space on 64-bit platforms [breaks binary compatibility!].
2012-07-15 13:33:05 +00:00
Andy Polyakov
ae007d4d09
wp-mmx.pl: ~10% performance improvement.
2012-07-15 13:29:23 +00:00
Andy Polyakov
660164a9ed
sha512-586.pl: optimize SSE2 code path, +5-7% on most CPUs, +13% on AMD K8.
2012-07-15 13:28:15 +00:00
Andy Polyakov
367b126491
sha1-586.pl: let masm compile AVX code.
2012-07-15 13:25:31 +00:00
Andy Polyakov
ac82e51f57
x86gas.pl: treat OPENSSL_ia32cap_P accordingly to .hidden status.
2012-07-15 13:24:43 +00:00
Dr. Stephen Henson
9f27b1eec3
Add new ctrl to retrieve client certificate types, print out
...
details in s_client.
Also add ctrl to set client certificate types. If not used sensible values
will be included based on supported signature algorithms: for example if
we don't include any DSA signing algorithms the DSA certificate type is
omitted.
Fix restriction in old code where certificate types would be truncated
if it exceeded TLS_CT_NUMBER.
2012-07-08 14:22:45 +00:00
Richard Levitte
9fd603be07
Install srtp.h
2012-07-05 13:20:19 +00:00
Richard Levitte
bec44866f1
Add d1_srtp and t1_trce.
2012-07-05 13:20:02 +00:00
Richard Levitte
5dbf4f42fb
Add the missing modules for Camellia, as well as dh_rfc5114 and evp_cnf.
2012-07-05 13:19:06 +00:00
Richard Levitte
c58de759c8
Harmonise symhacks.h in this branch with lower versions.
...
Add aliases for SSL_CTX_set_not_resumable_session_callback and
SSL_set_not_resumable_session_callback on top of that.
2012-07-05 13:17:44 +00:00
Dr. Stephen Henson
44488723de
add missing evp_cnf.c file
2012-07-04 13:15:10 +00:00
Dr. Stephen Henson
ea1d84358b
PR: 2840
...
Reported by: David McCullough <david_mccullough@mcafee.com >
Restore fips configuration module from 0.9.8.
2012-07-03 20:30:40 +00:00
Dr. Stephen Henson
dd25165968
Fix memory leak.
...
Always perform nexproto callback argument initialisation in s_server
otherwise we use uninitialised data if -nocert is specified.
2012-07-03 16:37:50 +00:00
Dr. Stephen Henson
657e29c199
cert_flags is unsigned
2012-07-03 14:54:59 +00:00
Dr. Stephen Henson
3208fc59db
add support for client certificate callbak, fix memory leak
2012-07-03 14:53:27 +00:00
Dr. Stephen Henson
87adf1fa96
new function SSL_is_server to which returns 1 is the corresponding SSL context is for a server
2012-07-03 14:25:17 +00:00
Dr. Stephen Henson
15a70fe510
no need to check s->server as default_nid is never used for TLS 1.2 client authentication
2012-07-03 14:24:33 +00:00
Dr. Stephen Henson
3dbc46dfcd
Separate client and server permitted signature algorithm support: by default
...
the permitted signature algorithms for server and client authentication
are the same but it is now possible to set different algorithms for client
authentication only.
2012-07-03 12:51:14 +00:00
Andy Polyakov
32e03a3016
bn_nist.c: compensate for VC bug [with optimization off!].
...
PR: 2837
2012-07-02 13:30:32 +00:00
Andy Polyakov
8d00f34239
crypto/bn/*.h: move PTR_SIZE_INT to private header.
2012-07-02 13:27:30 +00:00
Dr. Stephen Henson
df53820170
remove unnecessary attempt to automatically call OPENSSL_init
2012-07-01 22:25:04 +00:00
Dr. Stephen Henson
c65c5d05fd
Fix Win32 build.
2012-07-01 22:14:32 +00:00
Dr. Stephen Henson
8fdb4f1af3
recognise OPENSSL_NO_SSL_TRACE
2012-07-01 22:12:03 +00:00
Andy Polyakov
ae432028d1
bss_dgram.c: fix typos in Windows code.
2012-07-01 09:11:47 +00:00
Andy Polyakov
2dce10c56d
sha256-586.pl: fix typos.
2012-07-01 08:46:38 +00:00
Dr. Stephen Henson
18d7158809
Add certificate callback. If set this is called whenever a certificate
...
is required by client or server. An application can decide which
certificate chain to present based on arbitrary criteria: for example
supported signature algorithms. Add very simple example to s_server.
This fixes many of the problems and restrictions of the existing client
certificate callback: for example you can now clear existing certificates
and specify the whole chain.
2012-06-29 14:24:42 +00:00
Dr. Stephen Henson
0f39bab0df
Function tls1_check_ec_server_key is now redundant as we make
...
appropriate checks in tls1_check_chain.
2012-06-28 13:02:14 +00:00
Dr. Stephen Henson
d61ff83be9
Add new "valid_flags" field to CERT_PKEY structure which determines what
...
the certificate can be used for (if anything). Set valid_flags field
in new tls1_check_chain function. Simplify ssl_set_cert_masks which used
to have similar checks in it.
Add new "cert_flags" field to CERT structure and include a "strict mode".
This enforces some TLS certificate requirements (such as only permitting
certificate signature algorithms contained in the supported algorithms
extension) which some implementations ignore: this option should be used
with caution as it could cause interoperability issues.
2012-06-28 12:45:49 +00:00
Dr. Stephen Henson
be681e123c
don't use pseudo digests for default values of keys
2012-06-27 14:12:47 +00:00
Andy Polyakov
6251989eb6
x86_64 assembly pack: make it possible to compile with Perl located on
...
path with spaces.
PR: 2835
2012-06-27 10:08:23 +00:00
Andy Polyakov
faee82c1bc
sha512-x86_64.pl: fix typo.
2012-06-25 17:13:15 +00:00
Dr. Stephen Henson
4453cd8c73
Reorganise supported signature algorithm extension processing.
...
Only store encoded versions of peer and configured signature algorithms.
Determine shared signature algorithms and cache the result along with NID
equivalents of each algorithm.
2012-06-25 14:32:30 +00:00
Andy Polyakov
a8f3b8b519
sha512-x86_64.pl: add SIMD code paths.
2012-06-24 19:22:06 +00:00
Dr. Stephen Henson
0f229cce65
Add support for application defined signature algorithms for use with
...
TLS v1.2. These are sent as an extension for clients and during a certificate
request for servers.
TODO: add support for shared signature algorithms, respect shared algorithms
when deciding which ciphersuites and certificates to permit.
2012-06-22 14:03:31 +00:00
Dr. Stephen Henson
020091406c
oops, add -debug_decrypt option which was accidenatally left out
2012-06-19 13:39:30 +00:00
Andy Polyakov
ad880dc469
sha512-x86_64.pl: fix typo.
2012-06-19 07:50:10 +00:00
Andy Polyakov
42a36658c1
sha256-586.pl: fix linking error.
2012-06-19 07:49:36 +00:00
Dr. Stephen Henson
c4ff5d1147
fix clashing error code
2012-06-18 13:11:09 +00:00
Dr. Stephen Henson
a5ee80b910
Make it possible to delete all certificates from an SSL structure.
2012-06-18 12:56:59 +00:00
Dr. Stephen Henson
93ab9e421e
Initial record tracing code. Print out all fields in SSL/TLS records
...
for debugging purposes. Needs "enable-ssl-trace" configuration option.
2012-06-15 12:46:09 +00:00
Dr. Stephen Henson
dfcf48f499
New functions to retrieve certificate signatures and signature OID NID.
2012-06-13 13:08:12 +00:00
Andy Polyakov
0bf8f110e0
sha256t.c: make sure unrolled loop is tested.
2012-06-12 14:40:41 +00:00
Andy Polyakov
f3eac74bc5
sha256-586.pl: add AVX and XOP code paths.
2012-06-12 14:40:11 +00:00
Andy Polyakov
3a9b3852c6
sha256-586.pl: squeeze some more, most notably ~10% on Nehalem.
2012-06-12 14:38:01 +00:00
Andy Polyakov
d2e1803197
x86[_64] assembly pack: update benchmark results.
2012-06-12 14:18:21 +00:00
Dr. Stephen Henson
4b9e0b5f74
print out issuer and subject unique identifier fields in certificates
2012-06-12 13:41:18 +00:00
Andy Polyakov
447e1319b1
bss_dgram.c: add BIO_CTRL_DGRAM_SET_DONT_FRAG.
...
PR: 2830
Submitted by: Robin Seggelmann
2012-06-11 14:56:25 +00:00
Andy Polyakov
e77ec2ba6f
bss_dgram.c: make getsockopt work in cases when optlen is 64-bit value.
2012-06-11 14:27:56 +00:00
Ben Laurie
195b9eeeed
Fix memory leak.
2012-06-11 09:23:55 +00:00
Andy Polyakov
80c42f3e0c
b_sock.c: make getsockopt work in cases when optlen is 64-bit value.
2012-06-11 08:52:11 +00:00
Ben Laurie
7a71af86ce
Rearrange and test authz extension.
2012-06-07 13:20:47 +00:00
Ben Laurie
32e62d1cc4
Fix memory leak.
2012-06-06 13:03:42 +00:00
Ben Laurie
aeda172afd
Parse authz correctly.
2012-06-06 12:52:19 +00:00
Andy Polyakov
8d1b199d26
Revert random changes from commit#22606.
2012-06-04 22:12:10 +00:00
Ben Laurie
71fa451343
Version skew reduction: trivia (I hope).
2012-06-03 22:00:21 +00:00
Ben Laurie
a9e1c50bb0
RFC 5878 support.
2012-05-30 10:10:58 +00:00
Ben Laurie
03c1d9f99d
Build on FreeBSD with gcc 4.6.
2012-05-30 09:34:44 +00:00
Andy Polyakov
f889bb0384
sha256-586.pl: full unroll to deliver additional ~16%, add Sandy Bridge-
...
specific code path.
2012-05-28 17:50:57 +00:00
Andy Polyakov
83698d3191
sha512-x86_64.pl: >5% better performance.
2012-05-28 17:47:15 +00:00
Andy Polyakov
6a40ebe86b
aesni-x86_64.pl: make it possibel to use in Linux kernel.
2012-05-24 07:39:44 +00:00
Andy Polyakov
d4bb6bddf8
sha256-586.pl: tune away regression on Nehalem core and incidentally
...
improve performance on Atom and P4.
2012-05-24 07:39:04 +00:00
Andy Polyakov
ee9bf3eb6c
sha256-586.pl optimization.
2012-05-19 10:10:30 +00:00
Andy Polyakov
41409651be
s2_clnt.c: compensate for compiler bug.
2012-05-16 12:47:36 +00:00
Andy Polyakov
fd05495748
ppccap.c: assume no features under 32-bit AIX kernel.
...
PR: 2810
2012-05-16 12:42:32 +00:00
Dr. Stephen Henson
4242a090c7
PR: 2813
...
Reported by: Constantine Sapuntzakis <csapuntz@gmail.com >
Fix possible deadlock when decoding public keys.
2012-05-11 13:53:37 +00:00
Dr. Stephen Henson
c3b1303387
PR: 2811
...
Reported by: Phil Pennock <openssl-dev@spodhuis.org >
Make renegotiation work for TLS 1.2, 1.1 by not using a lower record
version client hello workaround if renegotiating.
2012-05-11 13:34:29 +00:00
Ben Laurie
5762f7778d
Fix warning.
2012-05-10 20:29:00 +00:00
Ben Laurie
7a412ded50
Padlock doesn't build. I don't even know what it is.
2012-05-10 20:28:02 +00:00
Dr. Stephen Henson
efb19e1330
PR: 2806
...
Submitted by: PK <runningdoglackey@yahoo.com >
Correct ciphersuite signature algorithm definitions.
2012-05-10 18:25:39 +00:00
Dr. Stephen Henson
c46ecc3a55
Sanity check record length before skipping explicit IV in TLS 1.2, 1.1 and
...
DTLS to fix DoS attack.
Thanks to Codenomicon for discovering this issue using Fuzz-o-Matic
fuzzing as a service testing platform.
(CVE-2012-2333)
2012-05-10 16:03:52 +00:00
Dr. Stephen Henson
7388b43cae
update FAQ
2012-05-10 15:37:16 +00:00
Dr. Stephen Henson
225055c30b
Reported by: Solar Designer of Openwall
...
Make sure tkeylen is initialised properly when encrypting CMS messages.
2012-05-10 13:46:09 +00:00
Richard Levitte
e0311481b8
Correct environment variable is OPENSSL_ALLOW_PROXY_CERTS.
2012-05-04 10:43:15 +00:00
Andy Polyakov
f9c5e5d92e
perlasm: fix symptom-less bugs, missing semicolons and 'my' declarations.
2012-04-28 10:36:58 +00:00
Andy Polyakov
9474483ab7
ppccpuid.pl: branch hints in OPENSSL_cleanse impact small block performance
...
of digest algorithms, mosty SHA, on Power7. Mystery of century, why SHA,
why slower algorithm are affected more...
PR: 2794
Submitted by: Ashley Lai
2012-04-27 20:17:45 +00:00
Dr. Stephen Henson
a708609945
Don't try to use unvalidated composite ciphers in FIPS mode
2012-04-26 18:55:01 +00:00
Dr. Stephen Henson
a9e6c091d5
update NEWS
2012-04-26 11:13:30 +00:00
Dr. Stephen Henson
df5705442c
update FAQ
2012-04-26 11:10:24 +00:00
Andy Polyakov
a2b21191d9
CHANGES: clarify.
2012-04-26 07:33:26 +00:00
Andy Polyakov
396f8b71ac
CHANGES: fix typos and clarify.
2012-04-26 07:20:06 +00:00
Dr. Stephen Henson
43d5b4ff31
Change value of SSL_OP_NO_TLSv1_1 to avoid clash with SSL_OP_ALL and
...
OpenSSL 1.0.0. Add CHANGES entry noting the consequences.
2012-04-25 23:04:42 +00:00
Andy Polyakov
f2ad35821c
s23_clnt.c: ensure interoperability by maitaining client "version capability"
...
vector contiguous.
PR: 2802
2012-04-25 22:06:32 +00:00
Dr. Stephen Henson
09e4e4b98e
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr>
...
Reviewed by: steve
Improved localisation of TLS extension handling and code tidy.
2012-04-24 12:22:23 +00:00
Dr. Stephen Henson
ce33b42bc6
oops, not yet ;-)
2012-04-23 21:58:29 +00:00
Dr. Stephen Henson
579d553464
update NEWS
2012-04-23 21:56:33 +00:00
Andy Polyakov
71fa3bc5ec
objxref.pl: improve portability.
2012-04-22 21:18:30 +00:00
Dr. Stephen Henson
e2f53b675a
correct error code
2012-04-22 13:31:09 +00:00
Dr. Stephen Henson
797c61aa2d
check correctness of errors before updating them so we don't get bogus errors added
2012-04-22 13:25:51 +00:00
Dr. Stephen Henson
597dab0fa8
correct old FAQ answers
2012-04-22 13:20:28 +00:00
Dr. Stephen Henson
b36bab7812
PR: 2239
...
Submitted by: Dominik Oepen <oepen@informatik.hu-berlin.de >
Add Brainpool curves from RFC5639.
Original patch by Annie Yousar <a.yousar@informatik.hu-berlin.de >
2012-04-22 13:06:51 +00:00
Andy Polyakov
8ea92ddd13
e_rc4_hmac_md5.c: last commit was inappropriate for non-x86[_64] platforms.
...
PR: 2792
2012-04-19 20:38:05 +00:00
Dr. Stephen Henson
d9a9d10f4f
Check for potentially exploitable overflows in asn1_d2i_read_bio
...
BUF_mem_grow and BUF_mem_grow_clean. Refuse attempts to shrink buffer
in CRYPTO_realloc_clean.
Thanks to Tavis Ormandy, Google Security Team, for discovering this
issue and to Adam Langley <agl@chromium.org > for fixing it. (CVE-2012-2110)
2012-04-19 16:19:56 +00:00
Dr. Stephen Henson
0d2baadfb4
update FAQ
2012-04-19 12:33:23 +00:00
Andy Polyakov
dce1cc2a59
Makefile.org: clear yet another environment variable.
...
PR: 2793
2012-04-19 06:39:40 +00:00
Dr. Stephen Henson
b214184160
recognise X9.42 DH certificates on servers
2012-04-18 17:03:29 +00:00
Dr. Stephen Henson
aa09c2c631
correct error codes
2012-04-18 15:36:12 +00:00
Andy Polyakov
6dd9b0fc43
e_rc4_hmac_md5.c: harmonize zero-length fragment handling with
...
e_aes_cbc_hmac_sha1.c (mostly for aesthetic reasons).
2012-04-18 14:55:39 +00:00
Andy Polyakov
e36f6b9cfa
e_rc4_hmac_md5.c: oops, can't use rc4_hmac_md5_cipher on legacy Intel CPUs.
...
PR: 2792
2012-04-18 14:50:28 +00:00
Andy Polyakov
3e181369dd
C64x+ assembler pack. linux-c64xplus build is *not* tested nor can it be
...
tested, because kernel is not in shape to handle it *yet*. The code is
committed mostly to stimulate the kernel development.
2012-04-18 13:01:36 +00:00
Bodo Möller
d3ddf0228e
Disable SHA-2 ciphersuites in < TLS 1.2 connections.
...
(TLS 1.2 clients could end up negotiating these with an OpenSSL server
with TLS 1.2 disabled, which is problematic.)
Submitted by: Adam Langley
2012-04-17 15:23:03 +00:00
Dr. Stephen Henson
800e1cd969
Additional workaround for PR#2771
...
If OPENSSL_MAX_TLS1_2_CIPHER_LENGTH is set then limit the size of client
ciphersuites to this value. A value of 50 should be sufficient.
Document workarounds in CHANGES.
2012-04-17 15:12:09 +00:00
Dr. Stephen Henson
293706e72c
Partial workaround for PR#2771.
...
Some servers hang when presented with a client hello record length exceeding
255 bytes but will work with longer client hellos if the TLS record version
in client hello does not exceed TLS v1.0. Unfortunately this doesn't fix all
cases...
2012-04-17 13:21:19 +00:00
Andy Polyakov
4a1fbd13ee
OPENSSL_NO_SOCK fixes.
...
PR: 2791
Submitted by: Ben Noordhuis
2012-04-16 17:42:36 +00:00
Andy Polyakov
9eba5614fe
Minor compatibility fixes.
...
PR: 2790
Submitted by: Alexei Khlebnikov
2012-04-16 17:35:30 +00:00
Andy Polyakov
3b1fb1a022
s3_srvr.c: fix typo.
...
PR: 2538
2012-04-15 17:22:57 +00:00
Andy Polyakov
fc90e42c86
e_aes_cbc_hmac_sha1.c: handle zero-length payload and engage empty frag
...
countermeasure.
PR: 2778
2012-04-15 14:14:22 +00:00
Andy Polyakov
26e6bac143
ghash-s390x.pl: fix typo [that can induce SEGV in 31-bit build].
2012-04-12 06:44:34 +00:00
Dr. Stephen Henson
fc6fc7ff38
Add options to set additional type specific certificate chains to
...
s_server.
2012-04-11 16:53:11 +00:00
Dr. Stephen Henson
adfd95c2ac
use different variable for chain iteration
2012-04-11 16:01:08 +00:00
Dr. Stephen Henson
80eb43519e
fix reset fix
2012-04-11 15:05:07 +00:00
Dr. Stephen Henson
bbe0c8c5be
make reinitialisation work for CMAC
2012-04-11 12:26:41 +00:00
Dr. Stephen Henson
5a34fcd76e
update rather ancient EVP digest documentation
2012-04-10 22:28:01 +00:00
Andy Polyakov
b1fd0ccb38
aes-s390x.pl: fix crash in AES_set_decrypt_key in linux32-s390x build.
2012-04-09 15:12:13 +00:00
Dr. Stephen Henson
b2284ed34a
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr>
...
Localize client hello extension parsing in t1_lib.c
2012-04-06 11:18:40 +00:00
Dr. Stephen Henson
a43526302f
Add support for automatic ECDH temporary key parameter selection. When
...
enabled instead of requiring an application to hard code a (possibly
inappropriate) parameter set and delve into EC internals we just
automatically use the preferred curve.
2012-04-05 13:38:27 +00:00
Dr. Stephen Henson
2131ce570a
add FAQ about version numbers
2012-04-05 13:16:37 +00:00
Andy Polyakov
45cd45bbbc
aes-armv4.pl: make it more foolproof [inspired by aes-s390x.pl in 1.0.1].
2012-04-05 08:30:22 +00:00
Andy Polyakov
bc9583efa2
aes-s390x.pl: make it more foolproof [inspired by 1.0.1].
2012-04-05 08:22:09 +00:00
Andy Polyakov
a20152bdaf
ssl/ssl_ciph.c: interim solution for assertion in d1_pkt.c(444).
...
PR: 2778
2012-04-04 20:45:51 +00:00
Dr. Stephen Henson
fd2b65ce53
Tidy up EC parameter check code: instead of accessing internal structures
...
add utility functions to t1_lib.c to check if EC certificates and parameters
are consistent with peer.
2012-04-04 14:41:01 +00:00
Dr. Stephen Henson
263c62467d
Update ordinals.
2012-04-03 23:13:23 +00:00
Andy Polyakov
82c5ac4599
CHANGES: harmonize with 1.0.0 and 1.0.1.
2012-03-31 18:56:27 +00:00
Dr. Stephen Henson
94e9215fbc
PR: 2778(part)
...
Submitted by: John Fitzgibbon <john_fitzgibbon@yahoo.com >
Time is always encoded as 4 bytes, not sizeof(Time).
2012-03-31 18:03:02 +00:00
Andy Polyakov
f62f792057
modes_lcl.h: make it work on i386.
...
PR: 2780
2012-03-31 17:02:46 +00:00
Andy Polyakov
5db9645f1b
vpaes-x86[_64].pl: handle zero length in vpaes_cbc_encrypt.
...
PR: 2775
2012-03-31 16:53:34 +00:00
Andy Polyakov
86963f40f8
util/cygwin.sh update.
...
PR: 2761
Submitted by: Corinna Vinschen
2012-03-31 11:06:46 +00:00
Dr. Stephen Henson
d3379de5a9
don't shadow
2012-03-30 15:43:32 +00:00
Andy Polyakov
4736eab947
bn/bn_gf2m.c: make new BN_GF2m_mod_inv work with BN_DEBUG_RAND.
2012-03-29 21:35:28 +00:00
Andy Polyakov
23a05fa0c1
modes/gcm128.c: fix self-test.
2012-03-29 18:25:38 +00:00
Andy Polyakov
482a7d80cf
sha512-armv4.pl: optimize NEON code path by utilizing vbsl, bitwise select.
2012-03-29 18:20:11 +00:00
Andy Polyakov
ee743dca53
perlasm/x86masm.pl: fix last fix.
2012-03-29 18:09:36 +00:00
Andy Polyakov
6da165c631
ans1/tasn_prn.c: avoid bool in variable names.
...
PR: 2776
2012-03-29 17:48:19 +00:00
Dr. Stephen Henson
d0595f170c
Initial revision of ECC extension handling.
...
Tidy some code up.
Don't allocate a structure to handle ECC extensions when it is used for
default values.
Make supported curves configurable.
Add ctrls to retrieve shared curves: not fully integrated with rest of
ECC code yet.
2012-03-28 15:05:04 +00:00
Dr. Stephen Henson
751e26cb9b
fix leak
2012-03-22 16:28:07 +00:00
Dr. Stephen Henson
f404acfa2c
Submitted by: Markus Friedl <mfriedl@gmail.com>
...
Fix memory leaks in 'goto err' cases.
2012-03-22 15:44:51 +00:00
Dr. Stephen Henson
7744ef1ada
use client version when deciding whether to send supported signature algorithms extension
2012-03-21 21:33:23 +00:00
Andy Polyakov
ed998634cd
e_padlock-x86[_64].pl: better understanding of prefetch errata and proper
...
workaround.
2012-03-19 20:23:32 +00:00
Andy Polyakov
884c580e05
eng_all.c: revert previous "disable Padlock" commit, which was unjustified.
2012-03-19 20:20:41 +00:00
Dr. Stephen Henson
bbbe61c958
Always use SSLv23_{client,server}_method in s_client.c and s_server.c,
...
the old code came from SSLeay days before TLS was even supported.
2012-03-18 18:16:46 +00:00
Andy Polyakov
df27a35137
vpaes-x86_64.pl: out-of-date Apple assembler fails to calculate
...
distance between local labels.
PR: 2762
2012-03-17 16:06:31 +00:00
Andy Polyakov
f9ef874a21
bsaes-x86_64.pl: optimize key conversion.
2012-03-16 21:44:19 +00:00
Andy Polyakov
442c9f13d4
bsaes-armv7.pl: optmize Sbox and key conversion.
2012-03-16 21:41:48 +00:00
Dr. Stephen Henson
156421a2af
oops, revert unrelated patches
2012-03-14 13:46:50 +00:00
Dr. Stephen Henson
61ad8262a0
update FAQ, NEWS
2012-03-14 13:44:57 +00:00
Andy Polyakov
5c88dcca5b
ghash-x86.pl: omit unreferenced rem_8bit from no-sse2 build.
2012-03-13 19:43:42 +00:00
Andy Polyakov
d2add2efaa
ssl/t1_enc.c: pay attention to EVP_CIPH_FLAG_CUSTOM_CIPHER.
2012-03-13 19:20:55 +00:00
Andy Polyakov
b2ae61ecf2
x86_64-xlate.pl: remove old kludge.
...
PR: 2435,2440
2012-03-13 19:19:08 +00:00
Dr. Stephen Henson
78dfd43955
corrected fix to PR#2711 and also cover mime_param_cmp
2012-03-12 16:32:19 +00:00
Dr. Stephen Henson
146b52edd1
Fix for CMS/PKCS7 MMA. If RSA decryption fails use a random key and
...
continue with symmetric decryption process to avoid leaking timing
information to an attacker.
Thanks to Ivan Nestlerode <inestlerode@us.ibm.com > for discovering
this issue. (CVE-2012-0884)
2012-03-12 16:31:39 +00:00
Dr. Stephen Henson
13747c6fda
update NEWS
2012-03-12 16:23:00 +00:00
Dr. Stephen Henson
174b07be93
PR: 2744
...
Submitted by: Dmitry Belyavsky <beldmit@gmail.com >
CMS support for ccgost engine
2012-03-11 13:40:17 +00:00
Dr. Stephen Henson
15a40af2ed
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr>
...
Add more extension names in s_cb.c extension printing code.
2012-03-09 18:38:35 +00:00
Dr. Stephen Henson
ea6e386008
PR: 2756
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix DTLS timeout handling.
2012-03-09 15:52:33 +00:00
Dr. Stephen Henson
34b61f5a25
check return value of BIO_write in PKCS7_decrypt
2012-03-08 14:10:23 +00:00
Dr. Stephen Henson
e7f8ff4382
New ctrls to retrieve supported signature algorithms and curves and
...
extensions to s_client and s_server to print out retrieved valued.
Extend CERT structure to cache supported signature algorithm data.
2012-03-06 14:28:21 +00:00
Dr. Stephen Henson
62b6948a27
PR: 2755
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reduce MTU after failed transmissions.
2012-03-06 13:47:43 +00:00
Dr. Stephen Henson
0fbf8b9cea
PR: 2748
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix possible DTLS timer deadlock.
2012-03-06 13:26:15 +00:00
Dr. Stephen Henson
d895f7f060
don't do loop check for single self signed certificate
2012-03-05 15:48:13 +00:00
Andy Polyakov
ce0ed3b778
Configure: make no-whirlpool work.
2012-03-03 13:17:47 +00:00
Andy Polyakov
358c372d16
bsaes-armv7.pl: change preferred contact.
2012-03-03 13:04:53 +00:00
Andy Polyakov
c4a52a6dca
Add bit-sliced AES for ARM NEON. This initial version is effectively
...
reference implementation, it does not interface to OpenSSL yet.
2012-03-03 12:33:28 +00:00
Dr. Stephen Henson
797a2a102d
PR: 2743
...
Reported by: Dmitry Belyavsky <beldmit@gmail.com >
Fix memory leak if invalid GOST MAC key given.
2012-02-29 14:13:00 +00:00
Dr. Stephen Henson
3c6a7cd44b
PR: 2742
...
Reported by: Dmitry Belyavsky <beldmit@gmail.com >
If resigning with detached content in CMS just copy data across.
2012-02-29 14:02:02 +00:00
Dr. Stephen Henson
dc4f678cdc
Fix memory leak cause by race condition when creating public keys.
...
Thanks to Ivan Nestlerode <inestlerode@us.ibm.com > for reporting this bug.
2012-02-28 14:47:02 +00:00
Andy Polyakov
0f2ece872d
x86cpuid.pl: fix processor capability detection on pre-586.
2012-02-28 14:20:21 +00:00
Dr. Stephen Henson
68a7b5ae1e
PR: 2736
...
Reported by: Remi Gacogne <rgacogne-bugs@coredump.fr >
Preserve unused bits value in non-canonicalised ASN1_STRING structures
by using ASN1_STRING_copy which preseves flags.
2012-02-27 18:45:28 +00:00
Dr. Stephen Henson
161c9b4262
PR: 2737
...
Submitted by: Remi Gacogne <rgacogne-bugs@coredump.fr >
Fix double free in PKCS12_parse if we run out of memory.
2012-02-27 16:46:34 +00:00
Dr. Stephen Henson
57cb030cea
PR: 2739
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix padding bugs in Heartbeat support.
2012-02-27 16:38:24 +00:00
Dr. Stephen Henson
d441e6d8db
PR: 2735
...
Make cryptodev digests work. Thanks to Nikos Mavrogiannopoulos for
this fix.
2012-02-27 16:33:34 +00:00
Dr. Stephen Henson
228a8599ff
free headers after use in error message
2012-02-27 16:27:17 +00:00
Dr. Stephen Henson
d16bb406d4
Detect symmetric crypto errors in PKCS7_decrypt.
...
Thanks to Ivan Nestlerode <inestlerode@us.ibm.com > for reporting this bug.
2012-02-27 15:22:41 +00:00
Andy Polyakov
f7ef20c5ee
Configure: I remove adding of -D_XPG4_2 -D__EXTENSIONS__ in sctp builds for
...
following reasons:
- it's not the way to engage XPG4v2 mode, defining _XOPEN_SOURCE to
value less than 500 is (see standards(5));
- we need to work out strategy to handle _XOPEN_SOURCE, current state
when we define e.g. _XOPEN_SOURCE to 500 in some files is inappropriate;
- sctp implementation on Solaris is incomplete, in sense that bss_dgram.c
doesn't compile, because not all structures are defined, so that
enabling sctp doesn't work anyway;
2012-02-26 22:02:59 +00:00
Andy Polyakov
d0e68a98c5
seed.c: incredibly enough seed.c can fail to compile on Solaris with certain
...
flags, because SS is defined after inclusion of <stdlib.h>, in <sys/regset.h>
2012-02-26 21:52:43 +00:00
Dr. Stephen Henson
a36fb72584
PR: 2730
...
Submitted by: Arpadffy Zoltan <Zoltan.Arpadffy@scientificgames.se >
VMS fixes: disable SCTP by default.
2012-02-25 17:59:40 +00:00
Dr. Stephen Henson
8f27a92754
ABI fixes from 1.0.1-stable
2012-02-23 22:25:52 +00:00
Dr. Stephen Henson
6941b7b918
PR: 2711
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Tolerate bad MIME headers in parser.
2012-02-23 21:50:44 +00:00
Dr. Stephen Henson
ef570cc869
PR: 2696
...
Submitted by: Rob Austein <sra@hactrn.net >
Fix inverted range problem in RFC3779 code.
Thanks to Andrew Chi for generating test cases for this bug.
2012-02-23 21:31:37 +00:00
Dr. Stephen Henson
4d3670fa50
PR: 2727
...
Submitted by: Bruce Stephens <bruce.stephens@isode.com >
Use same construct for EXHEADER in srp/Makefile as other makefiles to cope
with possibly empty EXHEADER.
2012-02-23 13:49:35 +00:00
Dr. Stephen Henson
5421196eca
ABI compliance fixes.
...
Move new structure fields to end of structures.
2012-02-22 15:39:54 +00:00
Dr. Stephen Henson
74b4b49494
SSL export fixes (from Adam Langley) [original from 1.0.1]
2012-02-22 15:06:56 +00:00
Dr. Stephen Henson
de2b5b7439
initialise i if n == 0
2012-02-22 15:03:44 +00:00
Dr. Stephen Henson
64095ce9d7
Add new APIs EC_curve_nist2nid and EC_curve_nid2nist which convert
...
between NIDs and the more common NIST names such as "P-256". Enhance
ecparam utility and ECC method to recognise the NIST names for curves.
2012-02-21 14:41:13 +00:00
Dr. Stephen Henson
206310c305
Fix bug in CVE-2011-4619: check we have really received a client hello
...
before rejecting multiple SGC restarts.
2012-02-16 15:26:04 +00:00
Dr. Stephen Henson
5863163732
Additional compatibility fix for MDC2 signature format.
...
Update RSA EVP_PKEY_METHOD to use the OCTET STRING form of MDC2 signature:
this will make all versions of MDC2 signature equivalent.
2012-02-15 14:27:25 +00:00
Dr. Stephen Henson
83cb7c4635
An incompatibility has always existed between the format used for RSA
...
signatures and MDC2 using EVP or RSA_sign. This has become more apparent
when the dgst utility in OpenSSL 1.0.0 and later switched to using the
EVP_DigestSign functions which call RSA_sign.
This means that the signature format OpenSSL 1.0.0 and later used with
dgst -sign and MDC2 is incompatible with previous versions.
Add detection in RSA_verify so either format works.
Note: MDC2 is disabled by default in OpenSSL and very rarely used in practice.
2012-02-15 14:04:00 +00:00
Dr. Stephen Henson
04296664e0
PR: 2713
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Move libraries that are not needed for dynamic linking to Libs.private in
the .pc files
2012-02-12 18:47:47 +00:00
Dr. Stephen Henson
fc7dae5229
PR: 2717
...
Submitted by: Tim Rice <tim@multitalents.net >
Make compilation work on OpenServer 5.0.7
2012-02-11 23:41:19 +00:00
Dr. Stephen Henson
be81f4dd81
PR: 2716
...
Submitted by: Adam Langley <agl@google.com >
Fix handling of exporter return value and use OpenSSL indentation in
s_client, s_server.
2012-02-11 23:20:53 +00:00
Dr. Stephen Henson
e626c77808
PR: 2703
...
Submitted by: Alexey Melnikov <alexey.melnikov@isode.com >
Fix some memory and resource leaks in CAPI ENGINE.
2012-02-11 23:13:10 +00:00
Dr. Stephen Henson
da2a5a79ef
PR: 2705
...
Submitted by: Alexey Melnikov <alexey.melnikov@isode.com >
Only create ex_data indices once for CAPI engine.
2012-02-11 23:08:08 +00:00
Dr. Stephen Henson
11eaec9ae4
Submitted by: Eric Rescorla <ekr@rtfm.com>
...
Further fixes for use_srtp extension.
2012-02-11 22:53:31 +00:00
Andy Polyakov
cbc0b0ec2d
apps/s_cb.c: recognized latest TLS version.
2012-02-11 13:30:47 +00:00
Dr. Stephen Henson
1df80b6561
PR: 2704
...
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr >
Fix srp extension.
2012-02-10 20:08:36 +00:00
Dr. Stephen Henson
3770b988c0
PR: 2710
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Check return codes for load_certs_crls.
2012-02-10 19:54:54 +00:00
Dr. Stephen Henson
9641be2aac
PR: 2714
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Make no-srp work.
2012-02-10 19:43:14 +00:00
Dr. Stephen Henson
f94cfe6a12
only cleanup ctx if we need to, save ctx flags when we do
2012-02-10 16:55:17 +00:00
Dr. Stephen Henson
7951c2699f
add fips blocking overrides to command line utilities
2012-02-10 16:47:40 +00:00
Dr. Stephen Henson
5997efca83
Submitted by: Eric Rescorla <ekr@rtfm.com>
...
Fix encoding of use_srtp extension to be compliant with RFC5764
2012-02-10 00:07:18 +00:00
Dr. Stephen Henson
57559471bf
oops, revert unrelated changes
2012-02-09 15:43:58 +00:00
Dr. Stephen Henson
f4e1169341
Modify client hello version when renegotiating to enhance interop with
...
some servers.
2012-02-09 15:42:10 +00:00
Dr. Stephen Henson
febec8ff23
typo
2012-02-02 19:18:24 +00:00
Andy Polyakov
0208ab2e3f
bn_nist.c: make new optimized code dependent on BN_LLONG.
2012-02-02 07:46:05 +00:00
Andy Polyakov
faed798c32
hpux-parisc2-*: engage assembler.
2012-02-02 07:41:29 +00:00
Dr. Stephen Henson
f71c6e52f7
Add support for distinct certificate chains per key type and per SSL
...
structure.
Before this the only way to add a custom chain was in the parent SSL_CTX
(which is shared by all key types and SSL structures) or rely on auto
chain building (which is performed on each handshake) from the trust store.
2012-01-31 14:00:10 +00:00
Dr. Stephen Henson
9ade64dedf
code tidy
2012-01-27 14:21:38 +00:00
Dr. Stephen Henson
c526ed410c
Revise ssl code to use a CERT_PKEY structure when outputting a
...
certificate chain instead of an X509 structure.
This makes it easier to enhance code in future and the chain
output functions have access to the CERT_PKEY structure being
used.
2012-01-26 16:00:34 +00:00
Dr. Stephen Henson
4379d0e457
Tidy/enhance certificate chain output code.
...
New function ssl_add_cert_chain which adds a certificate chain to
SSL internal BUF_MEM. Use this function in ssl3_output_cert_chain
and dtls1_output_cert_chain instead of partly duplicating code.
2012-01-26 15:47:32 +00:00
Dr. Stephen Henson
7568d15acd
allow key agreement for SSL/TLS certificates
2012-01-26 14:57:45 +00:00
Dr. Stephen Henson
08e4ea4884
initialise dh_clnt
2012-01-26 14:37:46 +00:00
Andy Polyakov
98909c1d5b
ghash-x86.pl: engage original MMX version in no-sse2 builds.
2012-01-25 17:56:08 +00:00
Dr. Stephen Henson
ccd395cbcc
add example for DH certificate generation
2012-01-25 16:33:39 +00:00
Dr. Stephen Henson
0d60939515
add support for use of fixed DH client certificates
2012-01-25 14:51:49 +00:00
Dr. Stephen Henson
2ff5ac55c5
oops revert debug change
2012-01-22 13:52:39 +00:00
Dr. Stephen Henson
1db5f356f5
return error if md is NULL
2012-01-22 13:12:14 +00:00
Andy Polyakov
e6903980af
x86_64-xlate.pl: proper solution for RT#2620.
2012-01-21 11:34:53 +00:00
Dr. Stephen Henson
855d29184e
Fix for DTLS DoS issue introduced by fix for CVE-2011-4109.
...
Thanks to Antonio Martin, Enterprise Secure Access Research and
Development, Cisco Systems, Inc. for discovering this bug and
preparing a fix. (CVE-2012-0050)
2012-01-18 18:15:27 +00:00
Dr. Stephen Henson
ac07bc8602
fix CHANGES entry
2012-01-17 14:20:32 +00:00
Dr. Stephen Henson
8e1dc4d7ca
Support for fixed DH ciphersuites.
...
The cipher definitions of these ciphersuites have been around since SSLeay
but were always disabled. Now OpenSSL supports DH certificates they can be
finally enabled.
Various additional changes were needed to make them work properly: many
unused fixed DH sections of code were untested.
2012-01-16 18:19:14 +00:00
Andy Polyakov
a985410d2d
cryptlib.c: sscanf warning.
2012-01-15 17:13:57 +00:00
Andy Polyakov
0ecedec82d
Fix OPNESSL vs. OPENSSL typos.
...
PR: 2613
Submitted by: Leena Heino
2012-01-15 13:39:10 +00:00
Dr. Stephen Henson
9bd20155ba
fix warning
2012-01-15 13:30:41 +00:00
Andy Polyakov
5d13669a2c
cryptlib.c: make even non-Windows builds "strtoull-agnostic".
2012-01-14 18:46:15 +00:00
Andy Polyakov
adb5a2694a
sha512-sparcv9.pl: work around V8+ warning.
2012-01-13 09:18:05 +00:00
Andy Polyakov
23b93b587b
aes-ppc.pl, sha512-ppc.pl: comply even with Embedded ABI specification
...
(most restrictive about r2 and r13 usage).
2012-01-13 09:16:52 +00:00
Andy Polyakov
a50bce82ec
Sanitize usage of <ctype.h> functions. It's important that characters
...
are passed zero-extended, not sign-extended.
PR: 2682
2012-01-12 16:21:35 +00:00
Andy Polyakov
713f49119f
ec_pmeth.c: fix typo in commentary.
...
PR: 2677
Submitted by: Annue Yousar
2012-01-12 13:22:51 +00:00
Andy Polyakov
677741f87a
doc/apps: formatting fixes.
...
PR: 2683
Submitted by: Annie Yousar
2012-01-11 21:58:19 +00:00
Andy Polyakov
5beb93e114
speed.c: typo in pkey_print_message.
...
PR: 2681
Submitted by: Annie Yousar
2012-01-11 21:48:31 +00:00
Andy Polyakov
62d7dd5ffd
ecdsa.pod: typo.
...
PR: 2678
Submitted by: Annie Yousar
2012-01-11 21:41:32 +00:00
Andy Polyakov
6e913f9901
asn1/t_x509.c: fix serial number print, harmonize with a_int.c.
...
PR: 2675
Submitted by: Annie Yousar
2012-01-11 21:12:22 +00:00
Andy Polyakov
e255024bf7
aes-sparcv9.pl: clean up regexp
...
PR: 2685
2012-01-11 15:30:53 +00:00
Dr. Stephen Henson
8fa397a6bc
fix warning (revert original patch)
2012-01-10 14:36:41 +00:00
Andy Polyakov
03cf7e784c
cmac.c: optimize make_kn and move zero_iv to const segment.
2012-01-06 13:19:16 +00:00
Andy Polyakov
ce0727f9bd
bn_nist.c: harmonize buf in BN_nist_mod_256 with other mod functions.
2012-01-06 13:17:47 +00:00
Bodo Möller
8e85545284
Update for 0.9.8s and 1.0.0f, and for 1.0.1 branch.
...
(While the 1.0.0f CHANGES entry on VOS PRNG seeding was missing
in HEAD, the actual code is here already.)
2012-01-05 13:48:55 +00:00
Bodo Möller
6620bf3444
Fix usage indentation
2012-01-05 13:16:30 +00:00
Bodo Möller
7bb1cc9505
Fix for builds without DTLS support.
...
Submitted by: Brian Carlstrom
2012-01-05 10:22:41 +00:00
Dr. Stephen Henson
59e68615ce
PR: 2671
...
Submitted by: steve
Update maximum message size for certifiate verify messages to support
4096 bit RSA keys again as TLS v1.2 messages is two bytes longer.
2012-01-05 00:28:43 +00:00
Dr. Stephen Henson
192540b522
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de>
...
Reviewed by: steve
Send fatal alert if heartbeat extension has an illegal value.
2012-01-05 00:23:17 +00:00
Dr. Stephen Henson
e2ca32fc2b
disable heartbeats if tlsext disabled
2012-01-05 00:07:46 +00:00
Dr. Stephen Henson
4d0bafb4ae
update CHANGES
2012-01-04 23:54:17 +00:00
Dr. Stephen Henson
e745572493
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de>, Michael Tuexen <tuexen@fh-muenster.de>
...
Reviewed by: steve
Fix for DTLS plaintext recovery attack discovered by Nadhem Alfardan and
Kenny Paterson.
2012-01-04 23:52:26 +00:00
Dr. Stephen Henson
27dfffd5b7
Clear bytes used for block padding of SSL 3.0 records. (CVE-2011-4576)
2012-01-04 23:16:15 +00:00
Dr. Stephen Henson
d0dc991c62
Only allow one SGC handshake restart for SSL/TLS. (CVE-2011-4619)
2012-01-04 23:15:51 +00:00
Dr. Stephen Henson
2ec0497f08
fix CHANGES
2012-01-04 23:10:44 +00:00
Dr. Stephen Henson
6bf896d9b1
Check GOST parameters are not NULL (CVE-2012-0027)
2012-01-04 23:03:40 +00:00
Dr. Stephen Henson
be71c37296
Prevent malformed RFC3779 data triggering an assertion failure (CVE-2011-4577)
2012-01-04 23:01:54 +00:00
Dr. Stephen Henson
0015572372
update FAQ
2012-01-04 20:05:58 +00:00
Dr. Stephen Henson
6074fb0979
fix warnings
2012-01-04 14:45:47 +00:00
Dr. Stephen Henson
25536ea6a7
Submitted by: Adam Langley <agl@chromium.org>
...
Reviewed by: steve
Fix memory leaks.
2012-01-04 14:25:42 +00:00
Dr. Stephen Henson
b3720c34e5
oops, revert wrong patch
2012-01-03 22:06:21 +00:00
Dr. Stephen Henson
5733919dbc
only send heartbeat extension from server if client sent one
2012-01-03 22:03:20 +00:00
Dr. Stephen Henson
b333905011
incomplete provisional OAEP CMS decrypt support
2012-01-02 18:25:37 +00:00
Dr. Stephen Henson
918fc30fa4
recognise HEARTBEATS in mkdef.pl script
2011-12-31 23:50:01 +00:00
Dr. Stephen Henson
0b9f5ef809
update CHANGES
2011-12-31 23:08:15 +00:00
Dr. Stephen Henson
4817504d06
PR: 2658
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Support for TLS/DTLS heartbeats.
2011-12-31 22:59:57 +00:00
Dr. Stephen Henson
84b6e277d4
make update
2011-12-27 14:46:03 +00:00
Dr. Stephen Henson
fa2c72e549
update default depflags
2011-12-27 14:45:32 +00:00
Dr. Stephen Henson
ffdfce8d14
fix error code
2011-12-27 14:40:21 +00:00
Dr. Stephen Henson
816e243a87
fix deprecated statement
2011-12-27 14:39:13 +00:00
Dr. Stephen Henson
c79f22c63a
PR: 1794
...
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr >
Reviewed by: steve
- remove some unncessary SSL_err and permit
an srp user callback to allow a worker to obtain
a user verifier.
- cleanup and comments in s_server and demonstration
for asynchronous srp user lookup
2011-12-27 14:21:45 +00:00
Dr. Stephen Henson
f3d781bb43
PR: 2326
...
Submitted by: Tianjie Mao <tjmao@tjmao.net >
Reviewed by: steve
Fix incorrect comma expressions and goto f_err as alert has been set.
2011-12-26 19:37:58 +00:00
Dr. Stephen Henson
995a6b10e1
recognise no-sctp
2011-12-25 14:59:52 +00:00
Dr. Stephen Henson
9ef562bcc6
recognise SCTP in mkdef.pl script
2011-12-25 14:46:15 +00:00
Dr. Stephen Henson
7e159e0133
PR: 2535
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Add SCTP support for DTLS (RFC 6083).
2011-12-25 14:45:15 +00:00
Dr. Stephen Henson
b9e1488865
typo
2011-12-23 15:03:03 +00:00
Dr. Stephen Henson
e43bfb2906
recognise DECLARE_PEM_write_const, update ordinals
2011-12-23 14:58:30 +00:00
Dr. Stephen Henson
9c52c3e07c
delete unimplemented function from header file, update ordinals
2011-12-23 14:09:30 +00:00
Dr. Stephen Henson
1394b29120
sync and update ordinals
2011-12-22 16:11:47 +00:00
Dr. Stephen Henson
b646fc409d
remove prototype for deleted SRP function
2011-12-22 16:05:02 +00:00
Dr. Stephen Henson
f9b0b45238
New ctrl values to clear or retrieve extra chain certs from an SSL_CTX.
...
New function to retrieve compression method from SSL_SESSION structure.
Delete SSL_SESSION_get_id_len and SSL_SESSION_get0_id functions
as they duplicate functionality of SSL_SESSION_get_id. Note: these functions
have never appeared in any release version of OpenSSL.
2011-12-22 15:14:32 +00:00
Dr. Stephen Henson
ad89bf7894
PR: 2563
...
Submitted by: Paul Green <Paul.Green@stratus.com >
Reviewed by: steve
Improved PRNG seeding for VOS.
2011-12-19 17:01:37 +00:00
Andy Polyakov
e75440d2c9
update CHANGES.
2011-12-19 14:48:49 +00:00
Dr. Stephen Henson
188c53f7e8
update CHANGES
2011-12-19 14:41:03 +00:00
Andy Polyakov
7aba22ba28
apps/speed.c: fix typo in last commit.
2011-12-19 14:33:09 +00:00
Andy Polyakov
bdba45957a
apps/speed.c: Cygwin alarm() fails sometimes.
...
PR: 2655
2011-12-15 22:30:03 +00:00
Andy Polyakov
0e1467a64c
vpaes-x86.pl: revert previous commit and solve the problem through x86masm.pl.
...
PR: 2657
2011-12-15 22:20:05 +00:00
Dr. Stephen Henson
f2fc30751e
PR: 1794
...
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr >
Reviewed by: steve
Remove unnecessary code for srp and to add some comments to
s_client.
- the callback to provide a user during client connect is
no longer necessary since rfc 5054 a connection attempt
with an srp cipher and no user is terminated when the
cipher is acceptable
- comments to indicate in s_client the (non-)usefulness of
th primalaty tests for non known group parameters.
2011-12-14 22:17:06 +00:00
Dr. Stephen Henson
1bfdb34f70
Add private keys and generation scripts for test certificates in apps
...
directory.
2011-12-14 22:14:47 +00:00
Andy Polyakov
405edfdcab
vpaes-x86.pl: portability fix.
...
PR: 2657
2011-12-14 21:29:32 +00:00
Ben Laurie
3c0ff9f939
Remove redundant TLS exporter.
2011-12-13 15:57:39 +00:00
Ben Laurie
b9ef708e40
Padlock engine doesn't build (the asm parts are not built for some reason),
...
so remove for now.
2011-12-13 15:56:40 +00:00
Ben Laurie
e166891e0d
Fix warning.
2011-12-13 15:55:35 +00:00
Ben Laurie
9a436c0f89
Back out redundant verification time change.
2011-12-13 15:00:43 +00:00
Ben Laurie
7fd5df6b12
Make it possible to set a time for verification.
2011-12-13 14:38:12 +00:00
Andy Polyakov
8c98b2591f
modexp512-x86_64.pl: Solaris protability fix.
...
PR: 2656
2011-12-12 15:10:14 +00:00
Dr. Stephen Henson
be16cc23c6
detect and use older PKITS data
2011-12-11 16:39:25 +00:00
Dr. Stephen Henson
4fa35e7336
Updates from fips2 branch: close streams in test utilities, use cofactor ECDH
...
add new key and signature generation tests to fips_test_suite.
2011-12-10 13:38:34 +00:00
Dr. Stephen Henson
a3a2e3a43d
add cofactor ECDH support from fips branch
2011-12-10 13:35:11 +00:00
Dr. Stephen Henson
67ef4f63f1
use different names for asm temp files to avoid problems on some platforms
2011-12-10 13:29:38 +00:00
Dr. Stephen Henson
3bfe583b8d
add commented out option to allow use of older PKITS data
2011-12-10 00:49:55 +00:00
Dr. Stephen Henson
627b044536
update CHANGES
2011-12-10 00:49:05 +00:00
Dr. Stephen Henson
16363c0165
implement -attime option as a verify parameter then it works with all relevant applications
2011-12-10 00:37:22 +00:00
Andy Polyakov
7ffa48ad38
perlasm/x86gas.pl: give a hand old assemblers assembling loop instruction.
2011-12-09 19:16:20 +00:00
Andy Polyakov
5711dd8eac
x86-mont.pl: fix bug in integer-only squaring path.
...
PR: 2648
2011-12-09 14:21:25 +00:00
Dr. Stephen Henson
990390ab52
Replace expired test server and client certificates with new ones.
2011-12-08 14:44:05 +00:00
Dr. Stephen Henson
2ca873e8d8
transparently handle X9.42 DH parameters
2011-12-07 12:44:03 +00:00
Dr. Stephen Henson
7a2362611f
fix error discrepancy
2011-12-07 12:28:40 +00:00
Dr. Stephen Henson
618eb125f0
Document RFC5114 "generation" options.
2011-12-07 00:42:22 +00:00
Dr. Stephen Henson
afb14cda8c
Initial experimental support for X9.42 DH parameter format to handle
...
RFC5114 parameters and X9.42 DH public and private keys.
2011-12-07 00:32:34 +00:00
Dr. Stephen Henson
df0cdf4ceb
The default CN prompt message can be confusing when often the CN needs to
...
be the server FQDN: change it.
[Reported by PSW Group]
2011-12-06 00:00:30 +00:00
Bodo Möller
19b0d0e75b
Resolve a stack set-up race condition (if the list of compression
...
methods isn't presorted, it will be sorted on first read).
Submitted by: Adam Langley
2011-12-02 12:52:00 +00:00
Bodo Möller
ea8c77a55b
Fix ecdsatest.c.
...
Submitted by: Emilia Kasper
2011-12-02 12:41:17 +00:00
Bodo Möller
a7c71d8955
Update HEAD CHANGES file.
2011-12-02 12:28:20 +00:00
Bodo Möller
390c579568
Fix BIO_f_buffer().
...
Submitted by: Adam Langley
Reviewed by: Bodo Moeller
2011-12-02 12:25:03 +00:00
Dr. Stephen Henson
0798170966
Update DH_check() to peform sensible checks when q parameter is present.
2011-12-01 17:27:36 +00:00
Dr. Stephen Henson
28ff14779e
Correct some parameter values.
2011-12-01 17:26:58 +00:00
Andy Polyakov
6600126825
bn/asm/mips.pl: fix typos.
2011-12-01 12:16:09 +00:00
Dr. Stephen Henson
f6c0bd641c
return error if counter exceeds limit and seed value supplied
2011-11-25 16:03:42 +00:00
Dr. Stephen Henson
ea7fe214c4
check counter value against 4 * L, not 4096
2011-11-25 15:01:23 +00:00
Dr. Stephen Henson
ebba6c4895
PR: 1794
...
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr >
Reviewed by: steve
Make SRP conformant to rfc 5054.
Changes are:
- removal of the addition state after client hello
- removal of all pre-rfc srp alert ids
- sending a fatal alert when there is no srp extension but when the
server wants SRP
- removal of unnecessary code in the client.
2011-11-25 00:17:44 +00:00
Bodo Möller
6f31dd72d2
Fix NPN implementation for renegotiation.
...
(Problem pointed out by Ben Murphy.)
Submitted by: Adam Langley
2011-11-24 21:07:01 +00:00
Dr. Stephen Henson
4521eda739
sync and update ordinals
2011-11-22 14:46:09 +00:00
Dr. Stephen Henson
5b6aaac9e6
add cryptlib.h to mkdef.pl
2011-11-22 14:44:58 +00:00
Dr. Stephen Henson
8ce6421803
sync and update ordinals
2011-11-21 22:57:41 +00:00
Dr. Stephen Henson
2c3ee8ad80
add strp.h to mkdef.pl headers
2011-11-21 22:55:23 +00:00
Dr. Stephen Henson
1c78c43bd3
move internal functions to ssl_locl.h
2011-11-21 22:52:13 +00:00
Dr. Stephen Henson
21b52dd3eb
bcmp doesn't exist on all platforms, replace with memcmp
2011-11-21 22:28:29 +00:00
Andy Polyakov
d127ef78ad
bsaes-x86_64.pl: fix buffer overrun in tail processing.
2011-11-16 23:34:01 +00:00
Dr. Stephen Henson
d674bb4bc8
In EC_KEY_set_public_key_affine_coordinates include explicit check to see passed components do not exceed field order
2011-11-16 13:28:35 +00:00
Ben Laurie
e0af04056c
Add TLS exporter.
2011-11-15 23:50:52 +00:00
Ben Laurie
333f926d67
Add DTLS-SRTP.
2011-11-15 22:59:20 +00:00
Andy Polyakov
dce7f142a6
Configure: reimplement commit#21695.
2011-11-15 12:32:18 +00:00
Andy Polyakov
77aae9654f
Configure, e_aes.c: allow for XTS assembler implementation.
2011-11-15 12:18:40 +00:00
Ben Laurie
ae55176091
Fix some warnings caused by __owur. Temporarily (I hope) remove the more
...
aspirational __owur annotations.
2011-11-14 00:36:10 +00:00
Andy Polyakov
fe06864836
bsaes-x86_64.pl: add Win64 SEH and "hadrware" calls to aes-x86_64.pl.
2011-11-13 20:33:41 +00:00
Andy Polyakov
0985bd4f80
bn_nist.c: fix strict-aliasing compiler warning.
2011-11-13 17:31:03 +00:00
Dr. Stephen Henson
20bee9684d
Add RFC5114 DH parameters to OpenSSL. Add test data to dhtest.
2011-11-13 14:07:36 +00:00
Dr. Stephen Henson
0c58d22ad9
PR: 1794
...
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr >
Reviewed by: steve
Document unknown_psk_identify alert, remove pre-RFC 5054 string from
ssl_stat.c
2011-11-13 13:13:01 +00:00
Andy Polyakov
6a828b7a8e
rc4test.c: commit#21684 broke x86_64 shared Linux build. This is temporary
...
solution so that one can build rc4test...
2011-11-12 13:37:20 +00:00
Andy Polyakov
32268b183f
e_aes.c: additional sanity check in aes_xts_cipher.
2011-11-12 13:26:36 +00:00
Andy Polyakov
ff6f9f96fd
cryptlib.c, etc.: fix linker warnings in 64-bit Darwin build.
2011-11-12 13:10:00 +00:00
Andy Polyakov
4a5397fb68
Configure, x86gas.pl: fix linker warnings in 32-bit Darwin build.
2011-11-12 12:16:11 +00:00
Andy Polyakov
f9542a4231
engines/: get rid of cvs warnings on MacOS X, proper clean in ccgost.
2011-11-12 12:13:13 +00:00
Andy Polyakov
acb2f06af1
Makefile.org: proper libclean on MacOS X.
2011-11-12 11:57:54 +00:00
Dr. Stephen Henson
33387d4a88
portability fix for some perl versions
2011-11-11 19:01:25 +00:00
Andy Polyakov
60d4e99cf3
bsaes-x86_64.pl: add bsaes_xts_[en|de]crypt.
2011-11-10 22:41:31 +00:00
Andy Polyakov
3c075bf07f
arm_arch.h: allow to specify __ARM_ARCH__ elsewhere.
2011-11-09 20:08:44 +00:00
Andy Polyakov
bdf40fd251
x86cpuid.pl: compensate for imaginary virtual machines.
2011-11-08 21:27:44 +00:00
Andy Polyakov
3f54a7460c
Configure: harmonize darwin64-x86_64-cc line with assembler pack.
2011-11-08 18:32:07 +00:00
Andy Polyakov
bba391a99a
config: KERNEL_BITS envrionment variable to control choice between 32-
...
and 64-bit Solaris builds.
2011-11-08 14:40:33 +00:00
Andy Polyakov
af0368458a
config: KERNEL_BITS envrionment variable to control choice between 32- and
...
64-bit darwin builds.
2011-11-08 13:31:28 +00:00
Andy Polyakov
a2570242a9
Configure: initial support for iOS.
2011-11-08 13:02:57 +00:00
Andy Polyakov
f6666ad19d
Configure: allow ./config to pass compiler flags with white spaces.
2011-11-08 12:45:00 +00:00
Andy Polyakov
d43a7f2cc6
fips_canister.c: add cross-compiler support for iOS (it applies even to
...
MacOS X, because it's easier to handle it this way).
2011-11-08 12:21:32 +00:00
Andy Polyakov
7467b76fbf
fips_premain.c: fix warning about _exit on MacOS X.
2011-11-08 12:15:04 +00:00
Andy Polyakov
6a0ea5d239
fipsld, incore: switch to new cross-compile support.
2011-11-06 23:22:58 +00:00
Andy Polyakov
9a480169cd
e_aes.c: fold aesni_xts_cipher and [most importantly] fix aes_xts_cipher's
...
return value after custom flag was rightly reverted.
2011-11-06 19:48:39 +00:00
Dr. Stephen Henson
85a1a836a2
check for unset entropy and nonce callbacks
2011-11-06 13:08:41 +00:00
Dr. Stephen Henson
a98b8ce652
Update fips_test_suite to take multiple command line options and
...
an induced error checking function.
2011-11-06 12:53:13 +00:00
Dr. Stephen Henson
980e7e8bcd
typo
2011-11-05 18:25:40 +00:00
Dr. Stephen Henson
f45c90bb1c
make post failure simulation reversible in all cases
2011-11-05 18:14:42 +00:00
Dr. Stephen Henson
4692f9f7b6
typo: use key for POST callback
2011-11-05 18:11:05 +00:00
Dr. Stephen Henson
835d355b97
fix set but unused warnings
2011-11-05 18:04:31 +00:00
Andy Polyakov
29fd6746f5
armv4cpuid.S, armv4-gf2m.pl: make newest code compilable by older assembler.
2011-11-05 13:07:18 +00:00
Andy Polyakov
e879dd4386
x86cpuid.pl: don't punish "last-year" OSes on "this-year" CPUs.
...
PR: 2633
2011-11-05 10:44:12 +00:00
Andy Polyakov
09f40a3cb9
ppc.pl: fix bug in bn_mul_comba4.
...
PR: 2636
Submitted by: Charles Bryant
2011-11-05 10:16:04 +00:00
Dr. Stephen Henson
f4324e51dd
Add single call public key sign and verify functions.
2011-11-05 01:34:36 +00:00
Dr. Stephen Henson
69569dd168
Add support for memory leak checking in fips_algvs.
...
Fix many memory leaks in algorithm test utilities.
2011-11-02 19:17:30 +00:00
Dr. Stephen Henson
12cc43782c
Remove duplicate test from health check.
...
Fix memory leaks by uninstantiating DRBG before reinitialising it.
2011-11-02 16:58:17 +00:00
Dr. Stephen Henson
400b3b3614
Print out an error for "make test" in FIPS builds. (from FIPS stable)
2011-11-02 00:58:17 +00:00
Dr. Stephen Henson
3ec9dceb15
Add fips_algvs utility (from FIPS 2.0 stable branch).
2011-11-02 00:57:22 +00:00
Richard Levitte
92064785ec
Typo...
2011-10-30 14:43:53 +00:00
Andy Polyakov
a75a52a43e
bsaes-x86_64.pl: add CBC decrypt and engage it in e_aes.c.
2011-10-30 12:15:56 +00:00
Richard Levitte
ada35f9c2c
Add missing algorithms to disable, and in particular, disable
...
EC_NISTP_64_GCC_128 by default, as GCC isn't currently supported on
VMS. Synchronise with Unix.
2011-10-30 11:46:07 +00:00
Richard Levitte
6aaa942d53
Teach mkshared.com to have a look for disabled algorithms in opensslconf.h
2011-10-30 11:40:54 +00:00
Andy Polyakov
0933887112
bn_exp.c: fix corner case in new constant-time code.
...
Submitted by: Emilia Kasper
2011-10-29 19:25:13 +00:00
Andy Polyakov
b08259cdfe
bsaes-x86_64.pl: optimize InvMixColumns.
2011-10-29 11:56:21 +00:00
Andy Polyakov
28507577b1
bsaes-x86_64.pl: add decryption procedure (with unoptimized reference
...
InvMixColumns).
2011-10-29 11:47:20 +00:00
Dr. Stephen Henson
930e801214
PR: 2628
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Send alert instead of assertion failure for incorrectly formatted DTLS
fragments.
2011-10-27 13:06:52 +00:00
Dr. Stephen Henson
fe0e302dff
PR: 2628
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix for ECC keys and DTLS.
2011-10-27 13:01:33 +00:00
Dr. Stephen Henson
32cf5baeae
PR: 2632
...
Submitted by: emmanuel.azencot@bull.net
Reviewed by: steve
Return -1 immediately if not affine coordinates as BN_CTX has not been
set up.
2011-10-26 16:43:34 +00:00
Dr. Stephen Henson
45906fe63b
Use correct tag for SRP username.
2011-10-25 12:51:22 +00:00
Dr. Stephen Henson
482cdf2489
typo
2011-10-24 13:23:51 +00:00
Andy Polyakov
f2784994ec
e_aes.c: fold even aesni_ccm_cipher.
2011-10-24 06:00:06 +00:00
Andy Polyakov
507b0d9d38
e_aes.c: prevent potential DoS in aes_gcm_tls_cipher.
2011-10-23 22:58:40 +00:00
Andy Polyakov
181fbb77f3
cryptlib.c: remove stdio dependency in Windows fipscanister.lib.
2011-10-23 19:41:00 +00:00
Dr. Stephen Henson
f59a5d6079
No need for custom flag in XTS mode: block length is 1.
2011-10-23 17:06:28 +00:00
Andy Polyakov
005cdace99
fips_canister.c: harmonize fingerprinting for all Windows, CE or not.
2011-10-23 15:17:30 +00:00
Andy Polyakov
8b8d2dccf1
config: in cross-compile case interrogate cross-compiler, not host, work
...
around sub-shell limitation.
2011-10-23 15:12:37 +00:00
Dr. Stephen Henson
5fd722600b
Check for selftest failure in various places.
2011-10-22 17:24:27 +00:00
Andy Polyakov
5b198d5eea
x86gas.pl: relax .init segment alignment.
2011-10-22 10:49:52 +00:00
Andy Polyakov
16190a71ff
mk1mk.pl: cleanup engines' handling and make fips build work on WIN64I.
2011-10-21 19:34:48 +00:00
Dr. Stephen Henson
8d742dd561
Update error codes.
2011-10-21 11:46:16 +00:00
Andy Polyakov
0cde099f86
fips.c: remove preprocessor artefact.
2011-10-21 06:03:45 +00:00
Dr. Stephen Henson
dfe9a47519
fix (?) AVX clearing
2011-10-21 01:57:37 +00:00
Dr. Stephen Henson
af4bfa151c
Check for uninitialised DRBG_CTX and don't free up default DRBG_CTX.
2011-10-21 00:12:53 +00:00
Andy Polyakov
3b5930442d
fips.c: x86[_64] capability masking.
2011-10-20 21:03:09 +00:00
Andy Polyakov
033a25cef5
armcap.c: auto-setup processor capability vector.
2011-10-20 20:52:26 +00:00
Dr. Stephen Henson
43760a2cf0
Fix error codes.
2011-10-20 13:56:01 +00:00
Andy Polyakov
5f132a0356
fips/fips_[canister|premain].c: make it work with VC6 and add sentinels
...
even to code segments.
2011-10-20 12:09:13 +00:00
Andy Polyakov
d528caa725
sha1-mips.pl: fix typo.
2011-10-20 08:39:29 +00:00
Andy Polyakov
d22870bc00
Drain unused MacOS directory.
2011-10-20 08:28:06 +00:00
Dr. Stephen Henson
4ff2999e88
Add "nopass" for empty password too.
2011-10-19 23:23:35 +00:00
Dr. Stephen Henson
5e4eb9954b
add authentication parameter to FIPS_module_mode_set
2011-10-19 22:34:53 +00:00
Andy Polyakov
227a822ab6
vxworks-mips: unify and add assembler.
2011-10-19 21:49:20 +00:00
Andy Polyakov
a9cf0b81fa
Remove superseded MIPS assembler modules.
2011-10-19 21:42:21 +00:00
Andy Polyakov
552e412abc
fips_canister.c: more cross-compiler platfroms verified.
2011-10-19 21:05:53 +00:00
Andy Polyakov
3ee4d41fe1
arm_arch.h: add missing pre-defined macro, __ARM_ARCH_5TEJ__.
2011-10-19 18:57:03 +00:00
Bodo Möller
f391750205
"make update" (partial)
2011-10-19 15:29:14 +00:00
Bodo Möller
e5641d7f05
BN_BLINDING multi-threading fix.
...
Submitted by: Emilia Kasper (Google)
2011-10-19 14:59:27 +00:00
Dr. Stephen Henson
6d4c65835d
Typo (?)
2011-10-19 12:05:08 +00:00
Dr. Stephen Henson
0a7fcce8df
Build fipscanister.o only by default. Utility build now needs
...
make build_tests
2011-10-19 11:47:21 +00:00
Dr. Stephen Henson
6b0ac883d0
Recognise new option.
2011-10-19 11:44:25 +00:00
Bodo Möller
7d8bb91233
Fix indentation
2011-10-19 09:24:22 +00:00
Bodo Möller
e0d6132b8c
Fix warnings.
...
Also, use the common Configure mechanism for enabling/disabling the 64-bit ECC code.
2011-10-19 08:59:53 +00:00
Dr. Stephen Henson
e3fed9f41e
Update premain fingerprint.
2011-10-18 22:11:11 +00:00
Bodo Möller
3e00b4c9db
Improve optional 64-bit NIST-P224 implementation, and add NIST-P256 and
...
NIST-P521. (Now -DEC_NISTP_64_GCC_128 enables all three of these;
-DEC_NISTP224_64_GCC_128 no longer works.)
Submitted by: Google Inc.
2011-10-18 19:43:16 +00:00
Andy Polyakov
4c3a7a0263
fipssyms.h: assign alias to newly introduced bn_gather5.
2011-10-18 18:59:33 +00:00
Andy Polyakov
10db9f9f48
fips/*: extend fipsro segmenting to all _MSC_VER builds (including WinCE).
2011-10-18 18:56:09 +00:00
Andy Polyakov
9f0d2e1464
fips_enc.c: assign minimal block size to bad_cipher [to avoid arithmetic
...
exceptions in TLS layer].
2011-10-18 18:52:05 +00:00
Andy Polyakov
5d77cdc591
engines/.cvsignore: stop whining about e_padlock-*.s.
2011-10-18 13:39:47 +00:00
Andy Polyakov
07904e0c6c
evp/e_aes.c: fold AES-NI modes that heavily rely on indirect calls
...
(trade 2% small-block performance), engage bit-sliced AES in GCM.
2011-10-18 13:37:26 +00:00
Andy Polyakov
4010b341b7
x86_64-xlate.pl: make vpaes-x86_64.pl and rc4-md5-x86_64 work with ml64,
...
fix bug in .crt section alignment.
PR: 2620, 2624
2011-10-18 09:50:23 +00:00
Andy Polyakov
5a326467dc
bsaes-x86_64.pl: make it work with ml64.
2011-10-18 09:22:04 +00:00
Andy Polyakov
3b7c14bb90
[bs|vp]aes-x86[_64].pl: typos and clarifications.
2011-10-18 08:03:02 +00:00
Andy Polyakov
e2473dcc7d
c_allc.c: add aes-xts to loop.
2011-10-18 07:53:50 +00:00
Dr. Stephen Henson
1db4a63bc3
Do global replace to remove assembly language object files.
2011-10-18 00:02:42 +00:00
Andy Polyakov
78f288d5c9
bn_mont.c: get corner cases right in updated BN_from_montgomery_word.
2011-10-17 23:35:00 +00:00
Andy Polyakov
8329e2e776
bn_exp.c: further optimizations using more ideas from
...
http://eprint.iacr.org/2011/239 .
2011-10-17 17:41:49 +00:00
Andy Polyakov
3f66f2040a
x86_64-mont.pl: minor optimization.
2011-10-17 17:39:59 +00:00
Andy Polyakov
2534891874
bn_mont.c: simplify BN_from_montgomery_word.
2011-10-17 17:24:28 +00:00
Andy Polyakov
79ba545c09
bn_shift.c: minimize reallocations, which allows BN_FLG_STATIC_DATA to
...
be shifted in specific cases.
2011-10-17 17:20:48 +00:00
Andy Polyakov
993adc0531
Engage bsaes-x86_64.pl, bit-sliced AES.
2011-10-17 17:10:54 +00:00
Dr. Stephen Henson
bc1b04d255
L=3072, N=256 provides 128 bits of security not 112.
2011-10-16 12:31:49 +00:00
Andy Polyakov
8fcdb1e60f
Add android-x86.
2011-10-15 08:32:16 +00:00
Dr. Stephen Henson
e1db7c4e7a
Clarify usage message.
2011-10-14 23:51:58 +00:00
Dr. Stephen Henson
ffbfbef943
more vxworks patches
2011-10-14 22:04:14 +00:00
Dr. Stephen Henson
1fb2e0f940
Allow override of GCCVER and noexecstack checking from environment.
...
Vxworks support.
2011-10-14 17:28:10 +00:00
Dr. Stephen Henson
41a846c694
Don't use TPREFIX shell variable for minimal script.
2011-10-14 15:15:20 +00:00
Dr. Stephen Henson
3335b6f265
Add usage messages.
2011-10-14 13:00:08 +00:00
Andy Polyakov
027026df9f
e_aes.c: fix bug in aesni_gcm_tls_cipher.
2011-10-14 09:32:06 +00:00
Andy Polyakov
9ee5916d97
aesni-x86[_64].pl: fix bug in CCM code.
2011-10-14 09:15:19 +00:00
Andy Polyakov
af9b610cef
Remove eng_aesni.c as AES-NI support is integrated directly at EVP.
2011-10-13 19:46:44 +00:00
Bodo Möller
8bfc6479a8
use -no_ecdhe when using -no_dhe
2011-10-13 15:07:08 +00:00
Bodo Möller
4f2015742d
Oops - ectest.c finds further problems beyond those exposed by bntext.c
2011-10-13 14:29:59 +00:00
Bodo Möller
0a06ad76a1
Avoid failed assertion in BN_DEBUG builds
2011-10-13 14:21:39 +00:00
Bodo Möller
bf6d2f986d
Make CTR mode behaviour consistent with other modes:
...
- clear ctx->num in EVP_CipherInit_ex
- adapt e_eas.c changes from http://cvs.openssl.org/chngview?cn=19816
for eng_aesni.c
Submitted by: Emilia Kasper
2011-10-13 13:41:34 +00:00
Bodo Möller
9d74befd23
Clarify warning
2011-10-13 13:27:09 +00:00
Bodo Möller
8b37d33a94
typo
2011-10-13 13:20:33 +00:00
Bodo Möller
3ddc06f082
In ssl3_clear, preserve s3->init_extra along with s3->rbuf.
...
Submitted by: Bob Buckholz <bbuckholz@google.com >
2011-10-13 13:05:58 +00:00
Bodo Möller
cdfe0fdde6
Fix OPENSSL_BN_ASM_MONT5 for corner cases; add a test.
...
Submitted by: Emilia Kasper
2011-10-13 12:35:10 +00:00
Dr. Stephen Henson
5936521495
Print curve type for signature tests.
2011-10-12 22:41:33 +00:00
Dr. Stephen Henson
35882b60d8
increase test RSA key size to 1024 bits
2011-10-12 21:55:03 +00:00
Dr. Stephen Henson
ce01482e0f
Update README.FIPS for new FIPS 2.0 testvectors.
2011-10-12 18:48:01 +00:00
Dr. Stephen Henson
7fc78f11e8
Remove o_init.o special case from Makefile: this doesn't work.
2011-10-12 17:27:08 +00:00
Dr. Stephen Henson
98bc806749
Skip ECDH sanity check. Add --compare-all to run comparison tests on
...
all files instead of sanity checks.
2011-10-12 17:18:38 +00:00
Dr. Stephen Henson
a2b6dc97f6
Handle partial test where H is absent: needed to check g generation.
2011-10-12 17:03:15 +00:00
Dr. Stephen Henson
df36faaaa2
Update instructions.
2011-10-12 15:35:34 +00:00
Dr. Stephen Henson
e15acd9d9e
Updates to handle some verification of v2 tests.
...
Now enable v2 by default and require a --disable-v2 option to run the
old v1 tests.
2011-10-12 15:33:54 +00:00
Dr. Stephen Henson
a854818ea9
Handle broken test on verify too.
2011-10-12 15:32:57 +00:00
Dr. Stephen Henson
c1f63b5cb3
ECDH POST selftest failure inducing support.
2011-10-12 13:17:19 +00:00
Dr. Stephen Henson
cf61940534
Fix warnings.
2011-10-12 13:06:45 +00:00
Dr. Stephen Henson
dafd5b5d74
Only include one ECDH selftest.
2011-10-12 12:55:58 +00:00
Andy Polyakov
6c8ce3c2ff
e_padlock-x86[_64].pl: protection against prefetch errata.
2011-10-11 21:07:53 +00:00
Dr. Stephen Henson
3231e42d72
update pkey method initialisation and copy
2011-10-11 18:15:31 +00:00
Dr. Stephen Henson
cd366cf7ec
print out subgroup order if present
2011-10-11 17:44:26 +00:00
Dr. Stephen Henson
a59163f6b6
def_rsa_finish not used any more.
2011-10-10 20:35:09 +00:00
Dr. Stephen Henson
fe4394cf1d
remove some debugging code
2011-10-10 19:09:01 +00:00
Dr. Stephen Henson
84a75ba38c
fix leak properly this time...
2011-10-10 14:08:55 +00:00
Dr. Stephen Henson
eb47b2fb13
add GCM ciphers in SSL_library_init
2011-10-10 12:56:18 +00:00
Dr. Stephen Henson
a0f21307e0
disable GCM if not available
2011-10-10 12:41:11 +00:00
Dr. Stephen Henson
7d7c13cbab
Don't disable TLS v1.2 by default now.
2011-10-09 23:26:39 +00:00
Dr. Stephen Henson
0feb83e222
Synv ordinals with 1.0.1-stable.
2011-10-09 23:16:20 +00:00
Dr. Stephen Henson
ccbb9badba
fix CHANGES entry
2011-10-09 23:11:55 +00:00
Dr. Stephen Henson
42753a4f67
fix memory leaks
2011-10-09 23:08:15 +00:00
Andy Polyakov
b1d3e9de63
e_padlock-x86_64.pl: brown-bag bug in stack pointer handling.
2011-10-09 21:53:53 +00:00
Dr. Stephen Henson
7bd4095b12
Sync ordinals with 1.0.1-stable.
2011-10-09 15:29:43 +00:00
Dr. Stephen Henson
58b75e9c26
PR: 2482
...
Submitted by: Rob Austein <sra@hactrn.net >
Reviewed by: steve
Don't allow inverted ranges in RFC3779 code, discovered by Frank Ellermann.
2011-10-09 00:56:52 +00:00
Andy Polyakov
08d62e9f1a
e_padlock-x86[_64].pl: SHA fixes, comply with specification and fix bug.
2011-10-08 21:37:44 +00:00
Dr. Stephen Henson
549cd657fd
Add fips/ecdh directory.
2011-10-07 18:18:50 +00:00
Dr. Stephen Henson
43206a2d7c
New -force_pubkey option to x509 utility to supply a different public
...
key to the one in a request. This is useful for cases where the public
key cannot be used for signing e.g. DH.
2011-10-07 15:18:09 +00:00
Dr. Stephen Henson
6dd547398a
use client version when eliminating TLS v1.2 ciphersuites in client hello
2011-10-07 15:07:19 +00:00
Dr. Stephen Henson
66bb328e11
? crypto/aes/aes-armv4.S
...
? crypto/aes/aesni-sha1-x86_64.s
? crypto/aes/aesni-x86_64.s
? crypto/aes/foo.pl
? crypto/aes/vpaes-x86_64.s
? crypto/bn/.bn_lib.c.swp
? crypto/bn/armv4-gf2m.S
? crypto/bn/diffs
? crypto/bn/modexp512-x86_64.s
? crypto/bn/x86_64-gf2m.s
? crypto/bn/x86_64-mont5.s
? crypto/ec/bc.txt
? crypto/ec/diffs
? crypto/modes/a.out
? crypto/modes/diffs
? crypto/modes/ghash-armv4.S
? crypto/modes/ghash-x86_64.s
? crypto/modes/op.h
? crypto/modes/tst.c
? crypto/modes/x.h
? crypto/objects/.obj_xref.txt.swp
? crypto/rand/diffs
? crypto/sha/sha-512
? crypto/sha/sha1-armv4-large.S
? crypto/sha/sha256-armv4.S
? crypto/sha/sha512-armv4.S
Index: crypto/objects/obj_xref.c
===================================================================
RCS file: /v/openssl/cvs/openssl/crypto/objects/obj_xref.c,v
retrieving revision 1.9
diff -u -r1.9 obj_xref.c
--- crypto/objects/obj_xref.c 5 Nov 2008 18:38:58 -0000 1.9
+++ crypto/objects/obj_xref.c 6 Oct 2011 20:30:21 -0000
@@ -110,8 +110,10 @@
#endif
if (rv == NULL)
return 0;
- *pdig_nid = rv->hash_id;
- *ppkey_nid = rv->pkey_id;
+ if (pdig_nid)
+ *pdig_nid = rv->hash_id;
+ if (ppkey_nid)
+ *ppkey_nid = rv->pkey_id;
return 1;
}
@@ -144,7 +146,8 @@
#endif
if (rv == NULL)
return 0;
- *psignid = (*rv)->sign_id;
+ if (psignid)
+ *psignid = (*rv)->sign_id;
return 1;
}
Index: crypto/x509/x509type.c
===================================================================
RCS file: /v/openssl/cvs/openssl/crypto/x509/x509type.c,v
retrieving revision 1.10
diff -u -r1.10 x509type.c
--- crypto/x509/x509type.c 26 Oct 2007 12:06:33 -0000 1.10
+++ crypto/x509/x509type.c 6 Oct 2011 20:36:04 -0000
@@ -100,20 +100,26 @@
break;
}
- i=X509_get_signature_type(x);
- switch (i)
+ i=OBJ_obj2nid(x->sig_alg->algorithm);
+ if (i && OBJ_find_sigid_algs(i, NULL, &i))
{
- case EVP_PKEY_RSA:
- ret|=EVP_PKS_RSA;
- break;
- case EVP_PKEY_DSA:
- ret|=EVP_PKS_DSA;
- break;
- case EVP_PKEY_EC:
- ret|=EVP_PKS_EC;
- break;
- default:
- break;
+
+ switch (i)
+ {
+ case NID_rsaEncryption:
+ case NID_rsa:
+ ret|=EVP_PKS_RSA;
+ break;
+ case NID_dsa:
+ case NID_dsa_2:
+ ret|=EVP_PKS_DSA;
+ break;
+ case NID_X9_62_id_ecPublicKey:
+ ret|=EVP_PKS_EC;
+ break;
+ default:
+ break;
+ }
}
if (EVP_PKEY_size(pk) <= 1024/8)/* /8 because it's 1024 bits we look
2011-10-06 20:44:02 +00:00
Andy Polyakov
50452b2e60
e_padlock: add CTR mode.
2011-10-05 17:03:44 +00:00
Andy Polyakov
d18762f7c9
e_padlock-x86_64.pl: fix typo.
2011-10-04 11:21:33 +00:00
Andy Polyakov
149ca7128c
e_padlock-x86*.pl: Nano-related update.
2011-10-04 11:05:16 +00:00
Dr. Stephen Henson
4cc2bbab67
Make fips algorithm test utilities use RESP_EOL for end of line character(s).
...
This should be CRLF even under *nix.
2011-10-01 20:42:52 +00:00
Andy Polyakov
04c3aa5c1a
e_padlock-x86.pl: previous C3-specific fix was incomplete.
2011-10-01 10:44:51 +00:00
Andy Polyakov
3edc26a256
e_padlock-x86.pl: make it work on VIA C3 (which doesn't support SSE2).
2011-10-01 10:16:13 +00:00
Dr. Stephen Henson
10465aca60
Never echo Num lines for PQGGen DSA2 test.
2011-09-30 11:58:59 +00:00
Dr. Stephen Henson
3f1ebb8f42
make depend
2011-09-29 23:17:59 +00:00
Dr. Stephen Henson
2bfeb7dc83
Add FIPS selftests for ECDH algorithm.
2011-09-29 23:08:23 +00:00
Dr. Stephen Henson
55831cd6ee
Remove s = s * P deferral.
2011-09-29 18:22:37 +00:00
Dr. Stephen Henson
884c33b5c4
Check return codes properly.
2011-09-29 16:24:00 +00:00
Dr. Stephen Henson
54bb3f68e1
Fix output format for DSA2 parameter generation.
2011-09-28 22:35:30 +00:00
Andy Polyakov
112726486d
bsaes-x86_64.pl: add due credit.
2011-09-27 19:34:40 +00:00
Dr. Stephen Henson
fca38e350b
fix signed/unsigned warning
2011-09-26 17:04:32 +00:00
Dr. Stephen Henson
a846a7ff32
Add a --disable-all option to disable all tests.
2011-09-25 22:12:39 +00:00
Dr. Stephen Henson
bac3db9cc1
Handle provable prime parameters for canonical g generation which are
...
sometimes erroneously included.
2011-09-25 22:04:43 +00:00
Andy Polyakov
4ec93a10bd
Add bit-sliced AES x86_64 assembler, see http://homes.esat.kuleuven.be/~ekasper/#software for background information. It's not integrated into build system yet.
2011-09-25 15:31:51 +00:00
Dr. Stephen Henson
d18a0df0a6
make sure eivlen is initialised
2011-09-24 23:06:20 +00:00
Dr. Stephen Henson
1579e65604
use keyformat for -x509toreq, don't hard code PEM
2011-09-23 21:48:34 +00:00
Dr. Stephen Henson
c2035bffe7
PR: 2606
...
Submitted by: Christoph Viethen <cv@kawo2.rwth-aachen.de >
Reviewed by: steve
Handle timezones correctly in UTCTime.
2011-09-23 13:39:23 +00:00
Dr. Stephen Henson
1d7392f219
PR: 2602
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS bug which prevents manual MTU setting
2011-09-23 13:34:48 +00:00
Dr. Stephen Henson
07dda896cb
PR: 2347
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Reviewed by: steve
Fix usage message.
2011-09-23 13:12:25 +00:00
Dr. Stephen Henson
af70f1a35d
Run PQGVer test before DSA2 tests.
2011-09-23 01:03:37 +00:00
Dr. Stephen Henson
ddf00ffab8
Typo.
2011-09-22 14:15:07 +00:00
Dr. Stephen Henson
cb71870dfa
Use function name FIPS_drbg_health_check() for health check function.
...
Add explanatory comments to health check code.
2011-09-22 14:01:25 +00:00
Dr. Stephen Henson
456d883a25
Don't print out errors in cases where errors are expected: testing
...
DSA parameter validity and EC public key validity.
2011-09-21 18:42:12 +00:00
Dr. Stephen Henson
d57cc97f24
Remove unused variable.
2011-09-21 18:36:53 +00:00
Dr. Stephen Henson
05272d4c51
Perform health check on all reseed operations not associated with
...
prediction resistance requests. Although SP 800-90 is arguably unclear
on whether this is necessary adding an additional check has minimal
penalty (very few applications will make an explicit reseed request).
2011-09-21 18:24:12 +00:00
Dr. Stephen Henson
4420b3b17a
Revise DRBG to split between internal and external flags.
...
One demand health check function.
Perform generation test in fips_test_suite.
Option to skip dh test if fips_test_suite.
2011-09-21 17:04:56 +00:00
Dr. Stephen Henson
e74ac3f830
Update error codes.
2011-09-21 16:17:18 +00:00
Dr. Stephen Henson
a5799bdc48
Allow reseed interval to be set.
2011-09-18 19:36:27 +00:00
Andy Polyakov
2b1f17f83f
Make latest assembler additions (vpaes and e_padlock) work in Windows build.
2011-09-18 15:40:11 +00:00
Andy Polyakov
7470276a25
sha256-586.pl: minor optimization, +0-2% on all CPUs, +7% on Westmere.
2011-09-17 12:57:33 +00:00
Andy Polyakov
d2fd65f6f6
sha512-x86_64.pl: +15% better performance on Westmere and incidentally Atom.
...
Other Intel processors +5%, Opteron -2%.
2011-09-17 11:30:28 +00:00
Dr. Stephen Henson
819cf4b886
Sync error codes with 1.0.1-stable.
2011-09-17 00:17:46 +00:00
Dr. Stephen Henson
45fcfcb99f
clarify comment
2011-09-16 17:40:16 +00:00
Dr. Stephen Henson
e248740d67
Minor code tidy and bug fix: need to set t = s after first pass and
...
t and s do not need to have independent values after the first pass
so set t = s.
2011-09-16 17:35:40 +00:00
Dr. Stephen Henson
b63698b70d
Don't use vpaes in fips builds and exclude from restricted tarball.
2011-09-15 21:06:37 +00:00
Andy Polyakov
8ca28da0a7
Integrate Vector Permutation AES into build system.
2011-09-15 20:22:59 +00:00
Dr. Stephen Henson
b889a6046b
Make HMAC kat symbols static.
2011-09-15 14:28:46 +00:00
Dr. Stephen Henson
00b0f2cb3e
Fix warning.
2011-09-15 14:08:24 +00:00
Andy Polyakov
03e389cf04
Allow for dynamic base in Win64 FIPS module.
2011-09-14 20:48:49 +00:00
Dr. Stephen Henson
93256bf5d1
Update CMAC/HMAC sefltests to use NIDs instead of function pointers.
...
Simplify HMAC selftest as each test currently uses the same key and
hash data.
2011-09-14 15:49:50 +00:00
Dr. Stephen Henson
d47d0d2b0d
Remove fipsdso target: it isn't supported in the 2.0 module.
2011-09-14 15:20:59 +00:00
Dr. Stephen Henson
15094852de
new function to lookup FIPS supported ciphers by NID
2011-09-14 13:25:48 +00:00
Dr. Stephen Henson
a11f06b2dc
More extensive DRBG health check. New function to call health check
...
for all DRBG combinations.
2011-09-12 18:47:39 +00:00
Dr. Stephen Henson
361d18a208
Check length of additional input in DRBG generate function.
2011-09-12 18:45:05 +00:00
Dr. Stephen Henson
de2132de93
Delete strength parameter from FIPS_drbg_generate. It isn't very useful
...
(strength can be queried using FIPS_drbg_get_strength ) and adds a
substantial extra overhead to health check (need to check every combination
of parameters).
2011-09-12 13:20:57 +00:00
Dr. Stephen Henson
9e56c99e1a
Check we recognise DRBG type in fips_drbgvs.c initialised DRBG_CTX if we
...
don't set type in FIPS_drbg_new().
2011-09-12 12:56:20 +00:00
Andy Polyakov
543dfa9f0e
vpaes-x86[_64]*.pl: fix typo.
2011-09-12 12:50:00 +00:00
Andy Polyakov
a87ff751b7
Add so called Vector Permutation AES x86[_64] assembler, see
...
http://crypto.stanford.edu/vpaes/ for background information.
It's not integrated into build system yet.
2011-09-12 08:25:14 +00:00
Dr. Stephen Henson
288fe07a6e
Fix 3DES Monte Carlo test file output which previously outputted
...
extra bogus lines. Update fipsalgtest.pl to tolerate the old format.
2011-09-11 18:05:40 +00:00
Dr. Stephen Henson
7fdcb45745
Add support for Dual EC DRBG from SP800-90. Include updates to algorithm
...
tests and POST code.
2011-09-09 17:16:43 +00:00
Dr. Stephen Henson
e4588dc486
Add /fixed option to linker with fips builds.
2011-09-08 13:55:47 +00:00
Dr. Stephen Henson
d98360392a
Put quick DRBG selftest return after first generate operation.
2011-09-07 10:26:38 +00:00
Andy Polyakov
33987f2f45
engines/asm/e_padlock-x86_64.pl: name it right and fix small bug.
2011-09-06 22:53:34 +00:00
Dr. Stephen Henson
bbb19418e6
Add error codes for DRBG KAT failures.
...
Add abbreviated DRBG KAT for POST which only performs a single generate
operations instead of four.
2011-09-06 20:46:27 +00:00
Andy Polyakov
ed28aef8b4
Padlock engine: make it independent of inline assembler.
2011-09-06 20:45:36 +00:00
Dr. Stephen Henson
0486cce653
Initialise X509_STORE_CTX properly so CRLs with nextUpdate date in the past
...
produce an error (CVE-2011-3207)
2011-09-06 15:15:09 +00:00
Dr. Stephen Henson
0f8d4d49dc
Update FAQ.
2011-09-06 13:55:22 +00:00
Andy Polyakov
f952716745
config: don't add -Wa options with no-asm.
2011-09-05 16:31:51 +00:00
Andy Polyakov
dd83d0f4a7
crypto/bn/bn_gf2m.c: make it work with BN_DEBUG.
2011-09-05 16:14:43 +00:00
Dr. Stephen Henson
ea17b0feec
Check reseed interval before generating output.
2011-09-05 15:45:13 +00:00
Dr. Stephen Henson
7634137b8a
Place DRBG in error state if health check fails.
2011-09-05 15:32:32 +00:00
Bodo Möller
2c472780c0
oops
2011-09-05 13:43:56 +00:00
Bodo Möller
c519e89f5c
Fix session handling.
2011-09-05 13:36:23 +00:00
Bodo Möller
612fcfbd29
Fix d2i_SSL_SESSION.
2011-09-05 13:31:17 +00:00
Bodo Möller
e7928282d0
(EC)DH memory handling fixes.
...
Submitted by: Adam Langley
2011-09-05 10:25:31 +00:00
Bodo Möller
837e1b6812
Fix memory leak on bad inputs.
2011-09-05 09:57:20 +00:00
Bodo Möller
ae53b299fa
make update
2011-09-05 09:46:15 +00:00
Bodo Möller
03a64ef56d
Fix expected DEFFLAG for default config.
2011-09-05 09:43:44 +00:00
Bodo Möller
f0ecb86666
Fix error codes.
2011-09-05 09:42:34 +00:00
Bodo Möller
acb4ab34a4
Synchronize with 1.0.1 CHANGES file.
2011-09-05 09:30:50 +00:00
Dr. Stephen Henson
74c40744ca
Don't perform full DRBG health check on all DRBG types on power up, just
...
one shorter KAT per mechanism.
2011-09-04 22:48:06 +00:00
Dr. Stephen Henson
1567b3904c
Update dependencies.
2011-09-04 18:44:28 +00:00
Dr. Stephen Henson
06e771b580
Add header to Makefile.
2011-09-04 18:36:20 +00:00
Dr. Stephen Henson
eb9e63df61
Extension of DRBG selftests using new data.
...
Test PR and no PR and test initial generate before the reseed too.
Move selftest data to separate fips_drbg_selftest.h header file.
2011-09-04 18:35:33 +00:00
Dr. Stephen Henson
fa85c1dbf5
Rename some more symbols for fips module.
2011-09-02 15:10:54 +00:00
Dr. Stephen Henson
a60cc6b4f0
Don't use *from++ in tolower as this is implemented as a macro on some
...
platforms. Thanks to Shayne Murray <Shayne.Murray@Polycom.com > for
reporting this issue.
2011-09-02 11:28:27 +00:00
Dr. Stephen Henson
2c1f5ce4b1
PR: 2576
...
Submitted by: Doug Goldstein <cardoe@gentoo.org >
Reviewed by: steve
Include header file stdlib.h which is needed on some platforms to get
getenv() declaration.
2011-09-02 11:20:15 +00:00
Dr. Stephen Henson
c41b505459
Sync ordinals with 1.0.1-stable.
2011-09-01 17:12:35 +00:00
Dr. Stephen Henson
74e056edbc
PR: 2340
...
Submitted by: "Mauro H. Leggieri" <mxmauro@caiman.com.ar >
Reviewed by: steve
Stop warnings if OPENSSL_NO_DGRAM is defined.
2011-09-01 15:01:35 +00:00
Dr. Stephen Henson
ff7231043f
make timing attack protection unconditional
2011-09-01 14:23:09 +00:00
Dr. Stephen Henson
5e92fd244c
Stop warnings.
2011-09-01 14:15:47 +00:00
Dr. Stephen Henson
d41ce00b8c
PR: 2573
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS buffering and decryption bug.
2011-09-01 14:02:23 +00:00
Dr. Stephen Henson
04485c5bc0
PR: 2589
...
Submitted by: Thomas Jarosch <thomas.jarosch@intra2net.com >
Reviewed by: steve
Initialise p pointer.
2011-09-01 13:52:48 +00:00
Dr. Stephen Henson
d77a970669
PR: 2588
...
Submitted by: Thomas Jarosch <thomas.jarosch@intra2net.com >
Reviewed by: steve
Close file pointer.
2011-09-01 13:49:16 +00:00
Dr. Stephen Henson
f7924634d4
PR: 2586
...
Submitted by: Thomas Jarosch <thomas.jarosch@intra2net.com >
Reviewed by: steve
Zero structure fields properly.
2011-09-01 13:45:46 +00:00
Dr. Stephen Henson
d3f6a5a01d
PR: 2586
...
Submitted by: Thomas Jarosch <thomas.jarosch@intra2net.com >
Reviewed by: steve
Fix brace mismatch.
2011-09-01 13:37:37 +00:00
Dr. Stephen Henson
d35c284b73
Print private key component is -exout parameter is given.
2011-08-29 16:09:07 +00:00
Dr. Stephen Henson
00220f8111
Fix ecdh primitives test command line.
2011-08-29 15:35:35 +00:00
Andy Polyakov
cfdbff23ab
bn_exp.c: improve portability.
2011-08-27 19:38:55 +00:00
Andy Polyakov
f7eb0ab9ac
util/incore: fix typo.
2011-08-27 19:37:25 +00:00
Dr. Stephen Henson
2abaa9caaf
Add support for DSA2 PQG generation of g parameter.
2011-08-27 12:30:47 +00:00
Dr. Stephen Henson
f55f5f775e
Add support for canonical generation of DSA parameter g.
...
Modify fips_dssvs to support appropriate file format.
2011-08-26 14:51:49 +00:00
Dr. Stephen Henson
7daf0efad9
Fix warning.
2011-08-25 19:50:51 +00:00
Dr. Stephen Henson
edd4d402c6
Don't use some object files in FIPS build.
2011-08-23 23:35:30 +00:00
Dr. Stephen Henson
e6133727fb
Rename sparc symbols.
2011-08-23 21:06:44 +00:00
Andy Polyakov
c608171d9c
Add RC4-MD5 and AESNI-SHA1 "stitched" implementations.
2011-08-23 20:51:38 +00:00
Andy Polyakov
c2d4c2867b
eng_rsax.c: improve portability.
2011-08-22 19:01:16 +00:00
Dr. Stephen Henson
46883b67de
Correct maximum request length. SP800-90 quotes maximum bits, not bytes.
2011-08-19 23:25:10 +00:00
Andy Polyakov
6c01cbb6a0
modexp512-x86_64.pl: make it work with ml64.
2011-08-19 06:30:32 +00:00
Dr. Stephen Henson
c20de0386a
Fix fipsalgtest.pl to still work with old test vectors.
2011-08-18 16:06:24 +00:00
Dr. Stephen Henson
eea98320a0
typo
2011-08-16 12:45:26 +00:00
Dr. Stephen Henson
4c1d92c56f
Update instructions to recommend use of included incore script.
2011-08-16 11:25:56 +00:00
Andy Polyakov
d341e40264
Makefile.org: get commit#21249 right.
2011-08-16 08:56:07 +00:00
Dr. Stephen Henson
142625b534
Delete library install from Makefile.fips: it isn't used.
...
Revert change to Makefile.org: it breaks install.
2011-08-15 20:38:16 +00:00
Dr. Stephen Henson
7cbab63f5a
quote LIBS to copy with empty string
2011-08-15 18:16:55 +00:00
Dr. Stephen Henson
9015ee1826
Enable rsa-pss0 for non-v2 tests.
2011-08-15 14:50:00 +00:00
Dr. Stephen Henson
1f59a84308
Remove hard coded ecdsaWithSHA1 hack in ssl routines and check for RSA
...
using OBJ xref utilities instead of string comparison with OID name.
This removes the arbitrary restriction on using SHA1 only with some ECC
ciphersuites.
2011-08-14 13:45:19 +00:00
Andy Polyakov
bf3dfe7fee
bn_div.c: remove duplicate code by merging BN_div and BN_div_no_branch.
2011-08-14 11:31:35 +00:00
Andy Polyakov
e7d1363d12
x86_64-mont5.pl: add missing Win64 support.
2011-08-14 09:06:06 +00:00
Andy Polyakov
f744bcfd73
eng_rdrand.c: make it link in './config 386' case.
2011-08-14 08:30:56 +00:00
Andy Polyakov
10bd69bf4f
armv4-mont.pl: profiler-assisted optimization gives 8%-14% improvement
...
(more for longer keys) on RSA/DSA.
2011-08-13 12:38:41 +00:00
Andy Polyakov
ae8b47f07f
SPARC assembler pack: fix FIPS linking errors.
2011-08-12 21:38:19 +00:00
Andy Polyakov
272ba87017
x86_64-xlate.pl: fix movzw.
2011-08-12 21:24:19 +00:00
Andy Polyakov
361512da0d
This commit completes recent modular exponentiation optimizations on
...
x86_64 platform. It targets specifically RSA1024 sign (using ideas
from http://eprint.iacr.org/2011/239 ) and adds more than 10% on most
platforms. Overall performance improvement relative to 1.0.0 is ~40%
in average, with best result of 54% on Westmere. Incidentally ~40%
is average improvement even for longer key lengths.
2011-08-12 16:44:32 +00:00
Andy Polyakov
20735f4c81
alphacpuid.pl: fix alignment bug.
...
alpha-mont.pl: fix typo.
PR: 2577
2011-08-12 12:28:52 +00:00
Dr. Stephen Henson
ab1ec69843
aesni TLS GCM support
2011-08-11 23:06:19 +00:00
Dr. Stephen Henson
19ad345739
prevent compilation errors and warnings
2011-08-11 21:12:17 +00:00
Dr. Stephen Henson
513e28c0a4
Include armcap.c in fips tarball.
2011-08-11 17:30:07 +00:00
Dr. Stephen Henson
7f06921eca
Remove redundant assignment.
2011-08-11 13:22:04 +00:00
Andy Polyakov
37f010e248
Add provisory support for RDRAND instruction.
2011-08-10 18:52:42 +00:00
Andy Polyakov
85ec54a417
x86_64-mont.pl: futher optimization resulting in up to 48% improvement
...
(4096-bit RSA sign benchmark on Core2) in comparison to initial version
from 2005.
2011-08-09 13:05:05 +00:00
Dr. Stephen Henson
20f12e63ff
Add HMAC DRBG from SP800-90
2011-08-08 22:07:38 +00:00
Dr. Stephen Henson
b38fd40db4
Use "resp" for default directory name for .rsp files.
2011-08-08 18:06:40 +00:00
Dr. Stephen Henson
8d7fbd021b
Fix DSA to skip EOL test when parsing mod line.
2011-08-08 14:47:51 +00:00
Dr. Stephen Henson
49e9b97885
Initial support for tests for 2.0 module. Not complete and not all working
...
yet.
Allow test type to be determined by a regexp on the pathname. So tests like:
DSA/SigVer, DSA2/SigVer, ECDSA/SigVer, ECDSA2/SigVer can all be
distinguished.
2011-08-08 14:47:04 +00:00
Andy Polyakov
267b481c47
aes/asm/aesni-*.pl: fix CCM and further optimize it.
...
modes/ccm128.c: minor branch optimization.
2011-08-07 17:47:56 +00:00
Dr. Stephen Henson
8a8cc84f74
fix memory leak
2011-08-03 16:39:58 +00:00
Dr. Stephen Henson
28dd49faec
Expand range of ctrls for AES GCM to support retrieval and setting of
...
invocation field.
Add complete support for AES GCM ciphersuites including all those in
RFC5288 and RFC5289.
2011-08-03 15:37:22 +00:00
Dr. Stephen Henson
3699ec6056
recognise ecdsaWithSHA1 OID
2011-07-28 14:40:01 +00:00
Dr. Stephen Henson
a678580bb8
Fix warnings.
2011-07-25 21:58:11 +00:00
Dr. Stephen Henson
fe8aeffa92
Update CHANGES.
2011-07-25 21:43:57 +00:00
Dr. Stephen Henson
31475a370c
oops, remove debug option
2011-07-25 21:38:41 +00:00
Dr. Stephen Henson
d09677ac45
Add HMAC ECC ciphersuites from RFC5289. Include SHA384 PRF support and
...
prohibit use of these ciphersuites for TLS < 1.2
2011-07-25 20:41:32 +00:00
Andy Polyakov
2667162d33
cryptlib.c: OPENSSL_ia32cap environment variable to interpret ~ as cpuid mask.
2011-07-23 12:10:26 +00:00
Dr. Stephen Henson
66b86a4fd5
More symbol renaming.
2011-07-22 14:29:27 +00:00
Dr. Stephen Henson
1d5121552d
Make sure OPENSSL_FIPSCANISTER is visible to ARM assembly language files.
2011-07-22 14:20:50 +00:00
Andy Polyakov
057037e719
util/incore: fix brown-bag bug.
2011-07-22 10:24:40 +00:00
Andy Polyakov
b7724f6f55
util/incore: make transition smoother.
2011-07-22 10:13:52 +00:00
Andy Polyakov
167cb62537
fips_canister.c: add support for embedded ppc linux.
2011-07-22 09:42:11 +00:00
Dr. Stephen Henson
4f275f248e
stop warnings
2011-07-21 13:45:06 +00:00
Dr. Stephen Henson
1ad2e14aaa
Rename another symbol.
2011-07-21 13:43:19 +00:00
Andy Polyakov
7b41f350d4
aes-ppc.pl: minor optimization favoring embedded processors (performance
...
of "big" processors is unaffected).
2011-07-20 22:16:27 +00:00
Andy Polyakov
be9a8cc2af
Add RSAX builtin engine. It optimizes RSA1024 sign benchmark.
2011-07-20 21:49:46 +00:00
Dr. Stephen Henson
dafce90ae5
PR: 2559
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS socket error bug
2011-07-20 15:22:11 +00:00
Dr. Stephen Henson
0445ab3ae0
PR: 2555
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS sequence number bug
2011-07-20 15:17:51 +00:00
Dr. Stephen Henson
bb48f4ce6e
PR: 2550
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS HelloVerifyRequest Timer bug
2011-07-20 15:14:24 +00:00
Andy Polyakov
9df286b13a
sha512-sparcv9.pl: minor optimization of sha256.
2011-07-18 11:34:07 +00:00
Dr. Stephen Henson
81c2920849
Add support for ECCCDH test format.
2011-07-18 00:45:05 +00:00
Andy Polyakov
87873f4328
ARM assembler pack: add platform run-time detection.
2011-07-17 17:40:29 +00:00
Dr. Stephen Henson
9fe51d5f73
PR: 2556 (partial)
...
Reported by: Daniel Marschall <daniel-marschall@viathinksoft.de >
Reviewed by: steve
Fix OID routines.
Check on encoding leading zero rejection should start at beginning of
encoding.
Allow for initial digit when testing when to use BIGNUMs which can increase
first value by 2 * 40.
2011-07-14 12:01:53 +00:00
Andy Polyakov
b79853c262
fips/Makefile: HP-UX-specific update.
2011-07-13 22:30:33 +00:00
Andy Polyakov
b429c4cbb9
ms/uplink.c: fix Visual Studio 2010 warning.
2011-07-13 14:54:38 +00:00
Andy Polyakov
2966c2ec31
config: detect if assembler supports --noexecstack and pass it down.
2011-07-13 14:23:19 +00:00
Andy Polyakov
4195a369fd
perlasm/cbc.pl: fix tail processing bug.
...
PR: 2557
2011-07-13 06:20:30 +00:00
Andy Polyakov
146e1fc7b3
ssl/ssl_ciph.c: allow to switch to predefined "composite" cipher/mac
...
combos that can be implemented as AEAD ciphers.
2011-07-11 14:00:43 +00:00
Andy Polyakov
7532071aa3
ssl/t1_enc.c: initial support for AEAD ciphers.
2011-07-11 13:58:59 +00:00
Andy Polyakov
a355cf9bf5
evp.h: add flag to distinguish AEAD ciphers and pair of control codes...
2011-07-11 13:54:53 +00:00
Bodo Möller
735ebc2de7
Fix typo.
...
Submitted by: Jim Morrison
2011-07-11 12:13:55 +00:00
Richard Levitte
b520e4b1d5
Add a tool that (semi)automatically created the API documentation
...
required for FIPS.
2011-07-05 15:40:58 +00:00
Dr. Stephen Henson
449f2517c6
Rename symbol.
2011-07-05 11:12:41 +00:00
Andy Polyakov
6179f06077
x86_64-mont.pl: add squaring procedure and improve RSA sign performance
...
by up to 38% (4096-bit benchmark on Core2).
2011-07-05 09:21:03 +00:00
Dr. Stephen Henson
01a9a7592e
Add functions to return FIPS module version.
2011-07-04 23:38:16 +00:00
Andy Polyakov
6fa4c7c43b
x86_64-xlate.pl: sha1 and md5 warnings made it to nasm 2.09, extend gnu
...
assembler workaround to all assemblers.
2011-07-04 13:10:50 +00:00
Andy Polyakov
169a274a41
sha1-x86_64.pl: nasm 2.07 screws up labels if AVX path is compiled.
2011-07-04 13:00:24 +00:00
Andy Polyakov
02a73e2bed
s390x-gf2m.pl: commentary update (final performance numbers turned to be
...
higher).
2011-07-04 11:20:33 +00:00
Dr. Stephen Henson
c540aa2fb1
If make clean fails it is not a fatal error.
2011-07-03 12:35:06 +00:00
Dr. Stephen Henson
eca7358be3
Additional error checking.
2011-07-02 15:57:35 +00:00
Andy Polyakov
da5e9871e9
sha1-x86_64.pl: fix win64-specific typos and add masm support.
2011-07-01 21:23:13 +00:00
Andy Polyakov
94c64f9a1c
x86_64-xlate.pl: masm-specific update.
2011-07-01 21:21:14 +00:00
Dr. Stephen Henson
1f77a27c16
Delete any EXARG value first.
2011-07-01 14:52:09 +00:00
Dr. Stephen Henson
e780b5f1f1
Add no-asm argument to Configure if needed.
2011-07-01 14:43:34 +00:00
Dr. Stephen Henson
01f06617b1
Recognise fipscheck option and call fipsas for WIN64 builds.
2011-06-30 19:18:41 +00:00
Andy Polyakov
be6ddecb8b
crypto/aes/Makefile: make it work on IRIX.
2011-06-28 12:55:39 +00:00
Andy Polyakov
450853cd04
crypto/whrlpool/wp_block.c: harmonize OPENSSL_ia32cap_P.
2011-06-28 12:42:10 +00:00
Andy Polyakov
5a0876cb8c
crypto/sha/asm/sha[1|512]-mips.pl: minor updates.
2011-06-28 12:41:19 +00:00
Andy Polyakov
a908b711ac
rc4-586.pl: add Atom performance results.
2011-06-28 12:36:10 +00:00
Andy Polyakov
2036c9a59a
md5-x86_86.pl: remove redundant instructions.
2011-06-28 12:33:58 +00:00
Andy Polyakov
b247f7387f
crypto/bn/Makefile: fix typo.
2011-06-28 08:52:36 +00:00
Dr. Stephen Henson
bdd454973d
auto detect configuration using KERNEL_BITS and CC
2011-06-27 11:38:48 +00:00
Andy Polyakov
12b1b9a4fa
Configure: clean up linux32-s390x line.
2011-06-27 10:53:27 +00:00
Andy Polyakov
0c237e42a4
s390x assembler pack: add s390x-gf2m.pl and harmonize AES_xts_[en|de]crypt.
2011-06-27 10:00:31 +00:00
Andy Polyakov
0772f3b4f6
rc4-x86_64.pl: commentary update.
2011-06-27 09:46:16 +00:00
Andy Polyakov
0a9a692e4e
Minor x86_64 perlasm update.
2011-06-27 09:45:10 +00:00
Dr. Stephen Henson
fc30530402
Fix CPRNG test for Hash DRBG.
2011-06-26 12:29:26 +00:00
Dr. Stephen Henson
a96b90b66b
typo
2011-06-24 15:30:21 +00:00
Dr. Stephen Henson
d1a70cc9eb
Add stub for HMAC DRBG.
2011-06-24 14:28:34 +00:00
Dr. Stephen Henson
9fa8f3a610
allow KERNEL_BITS to be specified in the environment
2011-06-24 14:04:03 +00:00
Dr. Stephen Henson
dbfa236977
get the filename right
2011-06-24 13:48:18 +00:00
Dr. Stephen Henson
419989d2ec
Add sparcv9cap.c to restricted tarball.
2011-06-24 13:45:44 +00:00
Richard Levitte
021270af37
Add a symbol for the first parameter to OPENSSL_showfatal().
2011-06-23 09:46:27 +00:00
Richard Levitte
ab688c234d
Add symbols for the parameters on a couple more functions.
2011-06-23 09:43:54 +00:00
Dr. Stephen Henson
9a4be82388
PR: 2470
...
Submitted by: Corinna Vinschen <vinschen@redhat.com >
Reviewed by: steve
Don't call ERR_remove_state from DllMain.
2011-06-22 15:38:21 +00:00
Dr. Stephen Henson
861a7e5c9f
PR: 2543
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Correctly handle errors in DTLSv1_handle_timeout()
2011-06-22 15:30:14 +00:00
Dr. Stephen Henson
8038e7e44c
PR: 2540
...
Submitted by: emmanuel.azencot@bull.net
Reviewed by: steve
Prevent infinite loop in BN_GF2m_mod_inv().
2011-06-22 15:24:05 +00:00
Dr. Stephen Henson
b507284c7e
correctly encode OIDs near 2^32
2011-06-22 15:15:58 +00:00
Dr. Stephen Henson
cb551bfab7
typo
2011-06-22 12:59:53 +00:00
Dr. Stephen Henson
2d9fda6241
stop complaints about no CVS version
2011-06-22 12:38:39 +00:00
Dr. Stephen Henson
ce02589259
Now the FIPS capable OpenSSL is available simplify the various FIPS test
...
build options.
All fispcanisterbuild builds only build fipscanister.o and include symbol
renaming.
Move all renamed symbols to fipssyms.h
Update README.FIPS
2011-06-22 12:30:18 +00:00
Dr. Stephen Henson
93dd7d3848
add symbol rename
2011-06-22 11:41:31 +00:00
Dr. Stephen Henson
a52b7b44b2
allow MD5 use for computing old format hash links
2011-06-22 02:18:19 +00:00
Dr. Stephen Henson
ff053fc847
Don't set FIPS rand method at same time as RAND method as this can cause the
...
FIPS library to fail. Applications that want to set the FIPS rand method can do
so explicitly and presumably they know what they are doing...
2011-06-21 17:10:21 +00:00
Dr. Stephen Henson
279a0001b6
Add prototype for null cipher.
2011-06-21 16:14:01 +00:00
Dr. Stephen Henson
af17d99245
make EVP_dss() work for DSA signing
2011-06-20 20:05:51 +00:00
Dr. Stephen Henson
ee033faa43
typo
2011-06-20 19:58:12 +00:00
Dr. Stephen Henson
9ebc37e667
add null cipher to FIPS module
2011-06-20 19:48:44 +00:00
Dr. Stephen Henson
a2ab6986e4
Correction.
2011-06-18 17:21:27 +00:00
Dr. Stephen Henson
0b41fcc2cb
Strip CRs when installing fips_premain.c Correct compat library rule
...
in FIPS mode.
2011-06-18 17:18:25 +00:00
Dr. Stephen Henson
6cdcb92513
Initial FIPS capable OpenSSL information
2011-06-17 21:08:15 +00:00
Dr. Stephen Henson
9945b460e2
Give parameters names in prototypes.
2011-06-17 16:47:41 +00:00
Dr. Stephen Henson
b234848879
Option "fipscheck" which checks to see if FIPS is autodetected in
...
a build. Use this for WIN32 builds.
2011-06-16 16:27:36 +00:00
Dr. Stephen Henson
fdb65c836c
Don't include des.h any more: it is not needed.
2011-06-16 14:12:42 +00:00
Dr. Stephen Henson
c3de647e7d
Update to mk1mf.pl and ms\do_fips.bat to install relevant files for
...
WIN32 FIPS builds.
2011-06-15 21:04:09 +00:00
Bodo Möller
e66cb363d6
Fix the version history: changes going into 1.1.0 that are also going
...
into 1.0.1 should not be listed as "changes between 1.0.1 and 1.0.0".
This makes the OpenSSL_1_0_1-stable and HEAD versions of this file
consistent with each other (the HEAD version has the additional 1.1.0
section, but doesn't otherwise differ).
2011-06-15 14:49:17 +00:00
Dr. Stephen Henson
70051b1d88
set FIPS allow before initialising ctx
2011-06-14 15:25:21 +00:00
Dr. Stephen Henson
bd6386f59c
make sure custom cipher flag doesn't use any mode bits
2011-06-13 23:06:43 +00:00
Dr. Stephen Henson
1d55dd86dd
Allow applications to specify alternative FIPS RAND methods if they
...
are sure they are OK.
API to retrieve FIPS rand method.
2011-06-13 20:28:45 +00:00
Dr. Stephen Henson
38f90d06d7
sync and update ordinals
2011-06-12 15:40:06 +00:00
Dr. Stephen Henson
19cd2049f7
Don't export functions marked as FIPSCAPABLE.
2011-06-12 15:38:36 +00:00
Dr. Stephen Henson
b08e372bf6
Use FIPSCAPABLE for FIPS module functions used in FIPS capable OpenSSL.
2011-06-12 15:37:51 +00:00
Dr. Stephen Henson
0435dc1902
HMAC fips prototypes
2011-06-12 15:02:53 +00:00
Dr. Stephen Henson
e6e7b4e825
CMAC FIPS prototypes.
2011-06-12 14:11:57 +00:00
Dr. Stephen Henson
f41154b206
#undef bn_div_words as it is defined for FIPS builds.
2011-06-10 14:03:27 +00:00
Dr. Stephen Henson
3096d53b46
Update dependencies for m_dss.c too.
2011-06-10 14:00:02 +00:00
Dr. Stephen Henson
068291cd44
Remove x509.h from SHA1 clone digests, update dependencies.
2011-06-10 13:52:44 +00:00
Dr. Stephen Henson
a1a8a71cf7
Install FIPS module in FIPSDIR if set.
2011-06-09 21:52:44 +00:00
Dr. Stephen Henson
603bc9395c
more prototypes in fips.h
2011-06-09 15:18:55 +00:00
Dr. Stephen Henson
da9234130a
Add more prototypes.
2011-06-09 13:50:53 +00:00
Dr. Stephen Henson
ca9335760b
fix memory leak
2011-06-08 15:55:43 +00:00
Dr. Stephen Henson
4960411e1f
Add flags for DH FIPS method.
...
Update/fix prototypes in fips.h
2011-06-08 15:53:08 +00:00
Dr. Stephen Henson
6b6abd627c
Set flags in ECDH and ECDSA methods for FIPS.
2011-06-08 13:52:36 +00:00
Andy Polyakov
7eabad423c
rc4_skey.c: remove dead/redundant code (it's never compiled) and
...
misleading/obsolete comment.
2011-06-06 20:02:26 +00:00
Dr. Stephen Henson
7f0d1be3a6
Add prototypes for some FIPS EC functions.
2011-06-06 15:24:02 +00:00
Dr. Stephen Henson
1c13c122d8
Set SSL_FIPS flag in ECC ciphersuites.
2011-06-06 14:14:41 +00:00
Dr. Stephen Henson
644ce07ecd
Move function prototype to fips.h
2011-06-06 11:56:58 +00:00
Andy Polyakov
17f121de9d
e_aes.c: move AES-NI run-time switch and implement the switch for remaining modes.
2011-06-06 11:40:03 +00:00
Andy Polyakov
4d01f2761d
x86_64cpuid.pl: fix typo.
2011-06-04 13:08:25 +00:00
Andy Polyakov
301799b803
x86[_64]cpuid.pl: add function accessing rdrand instruction.
2011-06-04 12:20:45 +00:00
Richard Levitte
8d515259e2
No spaces in assignements in a shell script...
2011-06-04 09:00:59 +00:00
Dr. Stephen Henson
4f8f8bf3a4
fix error discrepancy
2011-06-03 18:50:24 +00:00
Dr. Stephen Henson
b8b90804b6
license correction, no EAY code included in this file
2011-06-03 17:56:17 +00:00
Dr. Stephen Henson
549c4ad35b
Add "OPENSSL_FIPSCAPABLE" define for a version of OpenSSL which is
...
FIPS capable: i.e. FIPS module is supplied externally.
2011-06-03 16:26:58 +00:00
Dr. Stephen Henson
267229b141
Constify RSA signature buffer.
2011-06-03 12:38:18 +00:00
Dr. Stephen Henson
946f57105f
Typo.
2011-06-02 18:20:55 +00:00
Dr. Stephen Henson
2280dc7c43
Remove FIPS RSA functions from crypto/rsa.
2011-06-02 17:52:39 +00:00
Dr. Stephen Henson
0cabe4e172
Move FIPS RSA function definitions to fips.h
...
New function to lookup digests by NID in module.
Minor optimisation: if supplied hash is NULL to FIPS RSA functions and
we are using PKCS padding get digest NID from otherwise unused saltlen
parameter instead.
2011-06-02 17:30:22 +00:00
Dr. Stephen Henson
b6df360b9e
Simple automated certificate creation demo.
2011-06-01 18:36:49 +00:00
Dr. Stephen Henson
e7ee10d3dc
Clone digest prototypes.
2011-06-01 14:18:28 +00:00
Dr. Stephen Henson
bce1af7762
Add DSA and ECDSA "clone digests" to module for compatibility with old
...
applications.
2011-06-01 14:07:32 +00:00
Dr. Stephen Henson
654ac273c1
typo
2011-06-01 11:10:35 +00:00
Dr. Stephen Henson
8f119a0357
set FIPS permitted flag before initalising digest
2011-05-31 16:24:19 +00:00
Dr. Stephen Henson
06843f826f
Fake CPU caps so fips_standalone_sha1 compiles.
...
Initialise update function for bad digest inits.
2011-05-31 16:22:21 +00:00
Dr. Stephen Henson
1b2047c5c0
Don't round up partitioned premaster secret length if there is only one
...
digest in use: this caused the PRF to fail for an odd premaster secret
length.
2011-05-31 10:34:43 +00:00
Dr. Stephen Henson
eda3766b53
Output supported curves in preference order instead of numerically.
2011-05-30 17:58:13 +00:00
Andy Polyakov
62b6c5c404
e_aes.c: fix typo.
2011-05-30 10:13:42 +00:00
Andy Polyakov
e76cbcf686
e_aes.c: fix aes_cfb1_cipher.
2011-05-30 10:10:05 +00:00
Andy Polyakov
d1fff483d6
e_aes.c: integrate AESNI directly into EVP.
2011-05-30 09:16:01 +00:00
Andy Polyakov
8da721ee2b
aesni-x86[_64].pl: relax alignment requirement.
2011-05-30 09:15:16 +00:00
Dr. Stephen Henson
3e2e231852
Add more cipher prototypes.
2011-05-29 16:16:55 +00:00
Dr. Stephen Henson
87829ac926
Prototypes for more FIPS functions for use in FIPS capable OpenSSL.
2011-05-29 15:56:23 +00:00
Andy Polyakov
fe9a5107be
Various mingw64 fixes.
2011-05-29 13:51:14 +00:00
Andy Polyakov
afa4b38671
sha1-586|x86_64.pl: minor portability fix.
2011-05-29 13:48:57 +00:00
Andy Polyakov
18f5603c53
x86cpuid.pl: last commit broke platforms with perl with 64-bit integer.
2011-05-29 12:50:02 +00:00
Andy Polyakov
0c149802a2
sha1-586|x86_64.pl: add SSSE3 and AVX code paths.
2011-05-29 12:39:48 +00:00
Dr. Stephen Henson
c33066900c
Add FIPS_digestinit prototype for FIPS capable OpenSSL.
2011-05-28 23:02:23 +00:00
Dr. Stephen Henson
f87ff24bc4
Add prototypes for FIPS EVP implementations: for use in FIPS capable
...
OpenSSL.
2011-05-28 21:03:31 +00:00
Andy Polyakov
cf3aeae419
aes-ppc.pl: handle unaligned data on page boundaries.
2011-05-28 09:41:36 +00:00
Dr. Stephen Henson
9a205e5981
Rename many internal only module functions from FIPS_* to fips_*.
2011-05-27 21:11:54 +00:00
Andy Polyakov
f44cb15fab
rc4-x86_64.pl: fix due credit.
2011-05-27 18:58:37 +00:00
Andy Polyakov
986289604e
rc4-x86_64.pl: RC4_options fix-up.
2011-05-27 16:15:12 +00:00
Andy Polyakov
4bb90087d7
x86[_64]cpuid.pl: harmonize usage of reserved bits #20 and #30 .
2011-05-27 15:32:43 +00:00
Andy Polyakov
6715034002
PPC assembler pack: adhere closer to ABI specs, add PowerOpen traceback data.
2011-05-27 13:32:34 +00:00
Andy Polyakov
0ca9a483af
rc4-x86_64.pl: major optimization for contemporary Intel CPUs.
2011-05-27 09:51:09 +00:00
Andy Polyakov
0dff8ba248
rc4-586.pl: optimize even further...
2011-05-27 09:46:19 +00:00
Dr. Stephen Henson
eb62cd807b
Typo.
2011-05-26 22:01:49 +00:00
Dr. Stephen Henson
64f5178d67
Use FIPSLD_LIBCRYPTO for consistency with other env variables in fipsld.
...
Use current directory for fips_premain_dso
2011-05-26 21:20:14 +00:00
Dr. Stephen Henson
e558c2aa3f
In fipsld use FIPSLIBCRYPTO environment variable to specify an alternative
...
location for libcrypto.a, support shared library builds in different
source tree.
2011-05-26 21:15:45 +00:00
Dr. Stephen Henson
ed0a35f222
Install fips_standalone_sha1 and make use of it in fipsld script.
2011-05-26 13:59:11 +00:00
Andy Polyakov
2bc3ad28b3
x86_64cpuid.pl: get AVX masking right.
2011-05-26 13:16:26 +00:00
Dr. Stephen Henson
d67813f878
Only install FIPS related files for fipscanisteronly build.
2011-05-26 11:00:06 +00:00
Dr. Stephen Henson
ecfe2d1753
More symbol renaming.
2011-05-25 16:01:37 +00:00
Dr. Stephen Henson
ebc5e72fe5
Don't advertise or use MD5 for TLS v1.2 in FIPS mode
2011-05-25 15:31:32 +00:00
Dr. Stephen Henson
3d52f1d52b
PR: 2533
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Setting SSL_MODE_RELEASE_BUFFERS should be ignored for DTLS, but instead causes
the program to crash. This is due to missing version checks and is fixed with
this patch.
2011-05-25 15:20:49 +00:00
Dr. Stephen Henson
fd60dfa0f2
PR: 2529
...
Submitted by: Marcus Meissner <meissner@suse.de >
Reviewed by: steve
Call ssl_new() to reallocate SSL BIO internals if we want to replace
the existing internal SSL structure.
2011-05-25 15:16:10 +00:00
Dr. Stephen Henson
be1242cbd1
PR: 2527
...
Submitted by: Marcus Meissner <meissner@suse.de >
Reviewed by: steve
Set cnf to NULL to avoid possible double free.
2011-05-25 15:05:39 +00:00
Dr. Stephen Henson
a26e245ecd
Fix the ECDSA timing attack mentioned in the paper at:
...
http://eprint.iacr.org/2011/232.pdf
Thanks to the original authors Billy Bob Brumley and Nicola Tuveri for
bringing this to our attention.
2011-05-25 14:52:21 +00:00
Dr. Stephen Henson
992bdde62d
Fix the ECDSA timing attack mentioned in the paper at:
...
http://eprint.iacr.org/2011/232.pdf
Thanks to the original authors Billy Bob Brumley and Nicola Tuveri for
bringing this to our attention.
2011-05-25 14:41:56 +00:00
Dr. Stephen Henson
bbcf3a9b30
Some nextproto patches broke DTLS: fix
2011-05-25 14:31:47 +00:00
Dr. Stephen Henson
006b54a8eb
Oops use up to date patch for PR#2506
2011-05-25 14:30:20 +00:00
Dr. Stephen Henson
44ddb27fa6
PR: 2512
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix BIO_accept so it can be bound to IPv4 or IPv6 sockets consistently.
2011-05-25 12:37:07 +00:00
Dr. Stephen Henson
7832d6ab1c
PR: 2506
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fully implement SSL_clear for DTLS.
2011-05-25 12:28:06 +00:00
Dr. Stephen Henson
ee4b5cebef
PR: 2505
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS session resumption timer bug.
2011-05-25 12:25:01 +00:00
Dr. Stephen Henson
238b63613b
use TLS1_get_version macro to check version so TLS v1.2 changes don't interfere with DTLS
2011-05-25 11:43:07 +00:00
Andy Polyakov
87f6b97e89
e_padlock.c: fix typo.
2011-05-25 10:02:20 +00:00
Andy Polyakov
6a99984b57
rc4-586.pl: optimize unused code path.
2011-05-25 09:36:13 +00:00
Andy Polyakov
67d8487bb8
e_padlock.c: last x86_64 commit didn't work with some optimizers.
2011-05-24 17:18:19 +00:00
Andy Polyakov
760d2551fb
rc4-586.pl: 50% improvement on Core2 and 80% on Westmere.
2011-05-24 13:07:29 +00:00
Dr. Stephen Henson
73ab341130
PR: 2522
...
Submitted by: Henrik Grindal Bakken <henribak@cisco.com >
Don't compare past end of buffer.
2011-05-23 12:27:43 +00:00
Andy Polyakov
62f29eb1cf
spacrv9cap.c: addenum to recent EC optimizations.
2011-05-23 08:14:32 +00:00
Andy Polyakov
f8501464cc
aesni-x86[_64].pl: optimize for Sandy Bridge and add XTS mode.
2011-05-22 18:38:00 +00:00
Andy Polyakov
96abea332c
x86_64-gf2m.pl: add Win64 SEH.
2011-05-22 18:29:11 +00:00
Andy Polyakov
2e75ed332f
ppccap.c: addenum to recent EC optimizations.
2011-05-21 10:17:02 +00:00
Andy Polyakov
d8ea368c41
ec_cvt.c: ARM comparison results were wrong, clarify the background.
2011-05-21 08:40:18 +00:00
Andy Polyakov
fdf6dac859
ec_cvt.c: avoid EC_GFp_nist_method on platforms with bn_mul_mont [see
...
commentary for details].
2011-05-20 20:31:37 +00:00
Dr. Stephen Henson
f37f20ffd3
PR: 2295
...
Submitted by: Alexei Khlebnikov <alexei.khlebnikov@opera.com >
Reviewed by: steve
OOM checking. Leak in OOM fix. Fall-through comment. Duplicate code
elimination.
2011-05-20 14:56:29 +00:00
Dr. Stephen Henson
101e6e19f2
Add CHANGES entry: add FIPS support to ssl
2011-05-19 18:10:25 +00:00
Dr. Stephen Henson
086e32a6c7
Implement FIPS_mode and FIPS_mode_set
2011-05-19 18:09:02 +00:00
Dr. Stephen Henson
05b4fc6c22
oops
2011-05-19 17:55:15 +00:00
Dr. Stephen Henson
0fba7a8fa8
update date
2011-05-19 17:53:04 +00:00
Dr. Stephen Henson
92b4d936cb
inherit HMAC flags from MD_CTX
2011-05-19 17:38:25 +00:00
Dr. Stephen Henson
4f7533eb84
set encodedPoint to NULL after freeing it
2011-05-19 16:17:47 +00:00
Andy Polyakov
fb2f3411ea
aesni-x86_64.pl: make it compile on MacOS X.
2011-05-18 17:05:24 +00:00
Andy Polyakov
c30a2505e2
x86gas.pl: don't omit .comm OPENSSL_ia32cap_P on MacOS X.
2011-05-18 16:28:53 +00:00
Andy Polyakov
c7b903e01d
x86_64-xlate.pl: add inter-register movq and make x86_64-gfm.s compile on
...
Solaris, MacOS X, elderly gas...
2011-05-18 16:26:03 +00:00
Andy Polyakov
ddc20d4da9
x86_64cpuid.pl: allow shared build to work without -Bsymbolic.
...
PR: 2466
2011-05-18 16:24:19 +00:00
Andy Polyakov
b50842036f
e_padlock.c: make it compile on MacOS X.
2011-05-18 16:21:54 +00:00
Andy Polyakov
b906422149
x86[_64]cpuid.pl: handle new extensions.
2011-05-16 20:35:11 +00:00
Andy Polyakov
a3e07010b4
ppc-xlate.pl: get linux64 declaration right.
2011-05-16 19:52:41 +00:00
Andy Polyakov
9c437e2fad
cms-test.pl: make it work with not-so-latest perl.
2011-05-16 18:11:45 +00:00
Andy Polyakov
2b9a8ca15b
x86gas.pl: add palignr and move pclmulqdq.
2011-05-16 18:07:00 +00:00
Andy Polyakov
afebe623c5
x86_64 assembler pack: add x86_64-gf2m module.
2011-05-16 17:46:45 +00:00
Andy Polyakov
b5c6aab57e
x86_64-xlate.pl: allow "base-less" effective address, add palignr, move
...
pclmulqdq.
2011-05-16 17:44:38 +00:00
Dr. Stephen Henson
b9b0a177f8
new flag to stop ENGINE methods being registered
2011-05-15 15:56:49 +00:00
Dr. Stephen Henson
9609ea869d
NULL is a valid cspname
2011-05-15 11:44:14 +00:00
Dr. Stephen Henson
ff636340f5
Typo.
2011-05-13 12:43:41 +00:00
Dr. Stephen Henson
3ece592886
typo
2011-05-13 12:37:40 +00:00
Dr. Stephen Henson
a75829deef
Recognise NO_NISTP224-64-GCC-128
2011-05-13 12:35:05 +00:00
Dr. Stephen Henson
d39c495130
Enter FIPS mode by calling FIPS_module_mode_set in openssl.c until
...
FIPS_mode_set is implemented.
2011-05-12 17:59:47 +00:00
Dr. Stephen Henson
855a54a9a5
Provisional support for TLS v1.2 client authentication: client side only.
...
Parse certificate request message and set digests appropriately.
Generate new TLS v1.2 format certificate verify message.
Keep handshake caches around for longer as they are needed for client auth.
2011-05-12 17:35:03 +00:00
Dr. Stephen Henson
8f82912460
Process signature algorithms during TLS v1.2 client authentication.
...
Make sure message is long enough for signature algorithms.
2011-05-12 14:38:01 +00:00
Dr. Stephen Henson
f76b1baf86
Fix error discrepancy.
2011-05-12 14:28:09 +00:00
Dr. Stephen Henson
b1d00b9611
Add SSL_INTERN definition.
2011-05-12 13:13:07 +00:00
Dr. Stephen Henson
c76e024dde
Sync ordinals.
2011-05-11 23:04:10 +00:00
Dr. Stephen Henson
4f7a2ab8b1
make kerberos work with OPENSSL_NO_SSL_INTERN
2011-05-11 22:50:18 +00:00
Andy Polyakov
b0188c4f07
bn_nist.c: fix shadowing warnings.
2011-05-11 20:19:00 +00:00
Andy Polyakov
f24e95b72c
fips_canister.c: pick more neutral macro name.
2011-05-11 20:17:06 +00:00
Dr. Stephen Henson
fc101f88b6
Reorder signature algorithms in strongest hash first order.
2011-05-11 16:33:28 +00:00
Dr. Stephen Henson
2f38b38986
Set FIPS mode for values other than 1. The only current effect
...
is to return a consistent value. So calling FIPS_module_mode_set(n)
for n != 0 will result in FIPS_module_mode() returning n. This
will support future expansion of more FIPS modes e.g. a Suite B mode.
2011-05-11 14:49:01 +00:00
Dr. Stephen Henson
c2fd598994
Rename FIPS_mode_set and FIPS_mode. Theses symbols will be defined in
...
the FIPS capable OpenSSL.
2011-05-11 14:43:38 +00:00
Dr. Stephen Henson
5024b79f5c
Inlcude README.ECC in FIPS restricted tarball.
2011-05-11 12:52:51 +00:00
Dr. Stephen Henson
c5ee394b58
Add NSA sublicense info.
2011-05-11 12:50:57 +00:00
Dr. Stephen Henson
21a40da045
Update instructions.
2011-05-10 10:59:25 +00:00
Dr. Stephen Henson
7919c07947
Typo.
2011-05-10 10:57:03 +00:00
Andy Polyakov
ab67c517ae
fips_canister.c: fix typo.
2011-05-10 10:03:23 +00:00
Andy Polyakov
31b46ebb62
fips_canister.c: initial support for cross-compiling. "Initial" refers
...
to the two-entry list of verified platforms in #ifndef
FIPS_REF_POINT_IS_SAFE_TO_CROSS_COMPILE pre-processor section.
2011-05-10 09:53:59 +00:00
Dr. Stephen Henson
dc7995eeb8
Initialise rc.
2011-05-09 21:21:29 +00:00
Dr. Stephen Henson
a2f9200fba
Initial TLS v1.2 client support. Include a default supported signature
...
algorithms extension (including everything we support). Swicth to new
signature format where needed and relax ECC restrictions.
Not TLS v1.2 client certifcate support yet but client will handle case
where a certificate is requested and we don't have one.
2011-05-09 15:44:01 +00:00
Dr. Stephen Henson
0b59755f43
Call fipsas.pl directly for pa-risc targets.
2011-05-09 15:23:00 +00:00
Andy Polyakov
1fb97e1313
Optimized bn_nist.c. Performance improvement varies from one benchmark
...
and platform to another. It was measured to deliver 20-30% better
performance on x86 platforms and 30-40% on x86_64, on nistp384 benchmark.
2011-05-09 10:16:32 +00:00
Dr. Stephen Henson
fc683d7213
allow SHA384, SHA512 wit DSA
2011-05-08 12:38:35 +00:00
Dr. Stephen Henson
03bc500a9f
Remove gf2m modules from bn_asm if no-ec2m set.
2011-05-07 22:56:56 +00:00
Dr. Stephen Henson
bfe1d2f895
Remove FIXME comments.
2011-05-07 22:37:58 +00:00
Dr. Stephen Henson
ed1afd327d
Omit GF2m properly this time ;-)
2011-05-07 22:36:03 +00:00
Dr. Stephen Henson
dacdd5203d
Don't include GF2m source files is NOEC2M set.
2011-05-07 22:22:37 +00:00
Andy Polyakov
56c5f703c1
IA-64 assembler pack: fix typos and make it work on HP-UX.
2011-05-07 20:36:05 +00:00
Andy Polyakov
58cc21fdea
x86 assembler pack: add bn_GF2m_mul_2x2 implementations (see x86-gf2m.pl for
...
details and performance data).
2011-05-07 10:31:06 +00:00
Dr. Stephen Henson
4fa3c4c3e9
Fixes for WIN64 FIPS build.
2011-05-06 23:47:23 +00:00
Dr. Stephen Henson
524289baa5
Get OPENSSL_FIPSSYMS from environment in fipsas.pl, include ppccap.c and .S
...
files in fipsdist.
2011-05-06 21:42:34 +00:00
Dr. Stephen Henson
2677d85631
Don't fail WIN32 builds on warnings.
2011-05-06 17:55:59 +00:00
Dr. Stephen Henson
ad4784953d
Return error codes for selftest failure instead of hard assertion errors.
2011-05-06 17:38:39 +00:00
Dr. Stephen Henson
6b7be581e5
Continuing TLS v1.2 support: add support for server parsing of
...
signature algorithms extension and correct signature format for
server key exchange.
All ciphersuites should now work on the server but no client support and
no client certificate support yet.
2011-05-06 13:00:07 +00:00
Dr. Stephen Henson
c184711124
Hide more symbols.
2011-05-05 23:10:32 +00:00
Andy Polyakov
925596f85b
ARM assembler pack: engage newly introduced armv4-gf2m module.
2011-05-05 21:57:11 +00:00
Dr. Stephen Henson
8d3cdd5b58
Fix warning of signed/unsigned comparison.
2011-05-05 14:47:38 +00:00
Andy Polyakov
75359644d0
ARM assembler pack. Add bn_GF2m_mul_2x2 implementation (see source code
...
for details and performance data).
2011-05-05 07:21:17 +00:00
Dr. Stephen Henson
6313d628da
Remove superfluous PRNG self tests.
...
Print timer resolution.
2011-05-04 23:17:29 +00:00
Andy Polyakov
c7d0d0ae09
xts128.c: minor optimizaton.
2011-05-04 20:57:43 +00:00
Dr. Stephen Henson
c9adde0699
Update status.
2011-05-04 18:43:32 +00:00
Dr. Stephen Henson
614dd926cb
Remove debugging print.
...
Explicitly use LINKDIRS for fipsdist links.
2011-05-04 18:33:42 +00:00
Andy Polyakov
034688ec4d
bn_gf2m.c: optimized BN_GF2m_mod_inv delivers sometimes 2x of ECDSA sign.
...
Exact improvement coefficients vary from one benchmark and platform to
another, e.g. it performs 70%-33% better on ARM, hereafter less for
longer keys, and 100%-90% better on x86_64.
2011-05-04 15:22:53 +00:00
Dr. Stephen Henson
d16765919d
Fix warning.
2011-05-04 14:34:36 +00:00
Dr. Stephen Henson
a95bbadb57
Include fipssyms.h for ARM builds to translate symbols.
...
Translate arm symbol to fips_*.
2011-05-04 14:16:03 +00:00
Dr. Stephen Henson
e350458a63
Remove useless setting.
2011-05-04 01:09:52 +00:00
Dr. Stephen Henson
e9093c9832
PR: 2499
...
Submitted by: "James 'J.C.' Jones" <james.jc.jones@gmail.com >
Typos.
2011-05-02 23:29:57 +00:00
Dr. Stephen Henson
2e2a962aad
Fix do_fips script.
2011-05-02 17:11:54 +00:00
Dr. Stephen Henson
9243a86d75
Use faster curves for ECDSA self test.
2011-05-02 12:13:04 +00:00
Dr. Stephen Henson
fc98a4377d
Use more portable clock_gettime() for fips_test_suite timing.
...
Output times of each subtest.
2011-05-02 11:09:38 +00:00
Dr. Stephen Henson
fd600c0037
Stop warning in VxWorks.
2011-05-01 20:55:05 +00:00
Dr. Stephen Henson
a32ad6891b
Quick hack to time POST.
2011-05-01 20:54:42 +00:00
Dr. Stephen Henson
2325315ba3
Two more symbol renames.
2011-05-01 19:07:16 +00:00
Dr. Stephen Henson
8a2024ea59
Handle multiple CPUID_OBJ correctly.
2011-05-01 19:06:39 +00:00
Dr. Stephen Henson
42c7c6764e
Rename some more symbols.
2011-05-01 17:51:40 +00:00
Dr. Stephen Henson
9f7b2c76b1
Include crypto.h in ppccap.c
2011-05-01 16:54:24 +00:00
Dr. Stephen Henson
1c6807c9d6
Add ppc_cap.c to restricted tarball.
2011-05-01 16:46:28 +00:00
Dr. Stephen Henson
bd4b0137fc
For FIPS algorithm test utilities use our own version of strcasecmp and
...
strncasecmp to cover cases where platforms don't support them.
2011-05-01 16:18:52 +00:00
Dr. Stephen Henson
2f6efd6acb
Some changes to support VxWorks in the validted module.
2011-05-01 15:36:54 +00:00
Dr. Stephen Henson
823df31be7
Disable SHA256 if not supported.
2011-05-01 15:36:16 +00:00
Dr. Stephen Henson
ee872e99f7
Update symbol translation table.
2011-05-01 14:33:59 +00:00
Dr. Stephen Henson
9a85e53813
no need to include memory.h
2011-04-30 23:37:42 +00:00
Dr. Stephen Henson
7409d7ad51
Initial incomplete TLS v1.2 support. New ciphersuites added, new version
...
checking added, SHA256 PRF support added.
At present only RSA key exchange ciphersuites work with TLS v1.2 as the
new signature format is not yet implemented.
2011-04-29 22:56:51 +00:00
Dr. Stephen Henson
08557cf22c
Initial "opaque SSL" framework. If an application defines
...
OPENSSL_NO_SSL_INTERN all ssl related structures are opaque
and internals cannot be directly accessed. Many applications
will need some modification to support this and most likely some
additional functions added to OpenSSL.
The advantage of this option is that any application supporting
it will still be binary compatible if SSL structures change.
2011-04-29 22:37:12 +00:00
Dr. Stephen Henson
c4d162873f
Don't assume version of rm supports -rf: use RM instead.
2011-04-28 20:52:21 +00:00
Dr. Stephen Henson
1eb8939695
Stop warnings about undefined _exit on Android.
...
Additional script output options to fipsalgtest.pl
2011-04-28 12:20:12 +00:00
Dr. Stephen Henson
7c50694f05
Fix warning.
2011-04-24 12:40:26 +00:00
Dr. Stephen Henson
7979626995
Recognise invalid enable/disable options.
...
Option to shut up bogus warnings.
2011-04-24 12:13:32 +00:00
Dr. Stephen Henson
c36ce81cf5
Clarification.
2011-04-24 11:38:22 +00:00
Andy Polyakov
3f0d14055b
gcm128.c: minor optimization.
2011-04-24 11:10:54 +00:00
Andy Polyakov
f855b9d719
ccm128.c: add CRYPTO_ccm128_[en|de]crypt_ccm64 and minor optimization.
2011-04-24 11:10:14 +00:00
Richard Levitte
ce67647605
fips_check_dsa_prng() should only be built when OPENSSL_FIPS is defined.
2011-04-24 10:07:17 +00:00
Richard Levitte
171edf7ff4
Error discrepancy corrected.
2011-04-24 08:59:15 +00:00
Dr. Stephen Henson
69a80f7d5e
More fixes for DSA FIPS overrides.
2011-04-23 21:59:12 +00:00
Dr. Stephen Henson
dc03504d09
Make sure overrides work for RSA/DSA.
2011-04-23 21:15:05 +00:00
Dr. Stephen Henson
383bc117bb
Oops, work out expanded buffer length before allocating it...
2011-04-23 20:24:55 +00:00
Dr. Stephen Henson
e0d1a2f80a
Always return multiple of block length bytes from default DRBG seed
...
callback.
Handle case where no multiple of the block size is in the interval
[min_len, max_len].
2011-04-23 20:05:19 +00:00
Dr. Stephen Henson
cac4fb58e0
Add PRNG security strength checking.
2011-04-23 19:55:55 +00:00
Andy Polyakov
9e5fe439b4
xts128.c: fix bug introduced in commit#20704. Bug affected encryption of
...
vectors whose lenght was not multiples of 16 bytes.
2011-04-23 09:15:03 +00:00
Dr. Stephen Henson
74fac927b0
Return errors instead of aborting when selftest fails.
2011-04-22 11:12:56 +00:00
Dr. Stephen Henson
da9ead8db2
Add XTS test vector support to fipsalgtest.pl
2011-04-22 01:05:53 +00:00
Dr. Stephen Henson
bef5013961
Rewrite OutputValue to avoid use of buffer when printing out hex values.
...
Delete unused functions from fips_utl.h.
Increase xts line buffer.
2011-04-22 00:41:35 +00:00
Dr. Stephen Henson
79170bc97a
Initial do_fips.bat build script for WIN32 fipscanister.
2011-04-21 21:06:12 +00:00
Dr. Stephen Henson
95c9e774f9
Reconise no-ec-nistp224-64-gcc-128 option.
2011-04-21 20:55:35 +00:00
Dr. Stephen Henson
e161120eff
Make fipscanisteronly auto detect work on WIN32.
2011-04-21 16:58:51 +00:00
Dr. Stephen Henson
84ed90f88b
Fix WIN32 warning.
2011-04-21 14:54:33 +00:00
Dr. Stephen Henson
065d050e7a
Update ordinals.
2011-04-21 14:54:13 +00:00
Dr. Stephen Henson
b8b6a13a56
Add continuous RNG test to entropy source. Entropy callbacks now need
...
to specify a "block length".
2011-04-21 14:17:15 +00:00
Dr. Stephen Henson
7608978861
Update DRBG to use new POST scheme.
2011-04-20 18:05:05 +00:00
Dr. Stephen Henson
14264b19de
Add periodic DRBG health checks as required by SP800-90.
2011-04-20 17:06:38 +00:00
Dr. Stephen Henson
8da18ea1a5
Add partial GCM tests to fipsalgtest.pl
2011-04-20 15:06:44 +00:00
Dr. Stephen Henson
7aaa88e55c
Add partial DH and ECDH primitives only testing to fipsalgtest.pl
2011-04-20 14:33:39 +00:00
Dr. Stephen Henson
84c7a8f7dc
Warn if lines are truncated in algorithm test utilities.
...
Support for new test files: DRBG and CCM.
2011-04-20 13:20:31 +00:00
Andy Polyakov
daaf5088fd
xts128.c: minor optimization and clarified prototype.
2011-04-20 08:13:58 +00:00
Andy Polyakov
e382e4e603
perlasm/x86gas.pl: make OPENSSL_instrument_bus[2] compile.
2011-04-19 19:09:18 +00:00
Dr. Stephen Henson
cb1b3aa151
Add AES CCM selftest.
2011-04-19 18:57:58 +00:00
Dr. Stephen Henson
8c7096835b
Use 0 for tbslen to perform strlen.
2011-04-19 11:10:54 +00:00
Dr. Stephen Henson
befcced53e
Add fips/cmac directory to WIN32 build.
2011-04-18 23:30:59 +00:00
Dr. Stephen Henson
b5dd178740
Fix EVP CCM decrypt. Add decrypt support to algorithm test program.
2011-04-18 22:48:40 +00:00
Dr. Stephen Henson
98279c1629
Typo.
2011-04-18 21:01:24 +00:00
Andy Polyakov
a0cc46f8e4
ccm128.c: fix Win32 compiler warning.
2011-04-18 20:19:23 +00:00
Andy Polyakov
70d01a7f82
perlasm/x86[nm]asm.pl: make OPENSSL_instrument_bus[2] compile.
2011-04-18 20:18:03 +00:00
Andy Polyakov
5f1b10ed2e
ccm128.c: fix STRICT_ALIGNMENT another bug in CRYPTO_ccm128_decrypt.
2011-04-18 19:17:28 +00:00
Dr. Stephen Henson
62dc7ed67c
Override flag for XTS length limit.
2011-04-18 17:31:28 +00:00
Dr. Stephen Henson
b3a45e7db5
CCM encrypt algorithm test support.
2011-04-18 16:31:11 +00:00
Dr. Stephen Henson
2391681082
Initial untested CCM support via EVP.
2011-04-18 14:25:11 +00:00
Dr. Stephen Henson
6386b1b34d
Compile ccm128.c, move some structures to modes_lcl.h add prototypes.
2011-04-18 13:15:37 +00:00
Dr. Stephen Henson
3b4a855778
Don't need separate tag buffer for GCM mode: use EVP_CIPHER_CTX buf
...
field which is not unused for custom ciphers.
2011-04-18 11:28:41 +00:00
Dr. Stephen Henson
ca8630ba81
Remove shlib_wrap.sh as it is not needed (all algorithm tests are
...
staticly linked to fipscanister.o). Add option to generate a shell
script to run all tests: this is useful for platforms that don't have
perl.
2011-04-17 15:39:47 +00:00
Andy Polyakov
5fabb88a78
Multiple assembler packs: add experimental memory bus instrumentation.
2011-04-17 12:46:00 +00:00
Dr. Stephen Henson
764ef43962
Remove PSS salt length detection hack from fipslagtest.pl by allowing a regexp
...
search of the file to determine its type. This will be needed for other tests
later...
2011-04-16 23:54:19 +00:00
Andy Polyakov
7e5b4d6779
ccm128.c: minor optimization and bugfix in CRYPTO_ccm128_[en|de]crypt.
2011-04-16 22:57:58 +00:00
Dr. Stephen Henson
75707a324f
Add "post" option to fips_test_suite to run the POST only and exit.
2011-04-15 20:09:34 +00:00
Dr. Stephen Henson
45321c41e2
Add length limitation from SP800-38E.
2011-04-15 12:01:53 +00:00
Dr. Stephen Henson
bf8131f79f
Add XTS selftest, include in fips_test_suite.
2011-04-15 11:30:19 +00:00
Dr. Stephen Henson
06b7e5a0e4
Add algorithm driver for XTS mode. Fix several bugs in EVP XTS implementation.
2011-04-15 02:49:30 +00:00
Dr. Stephen Henson
706735aea3
Add new POST support to X9.31 PRNG.
2011-04-14 18:29:49 +00:00
Dr. Stephen Henson
8f331999f5
Report each cipher used with CMAC tests.
...
Only add one error to error queue if a specific test type fails.
2011-04-14 16:38:20 +00:00
Dr. Stephen Henson
9338f290d1
Revise fips_test_suite to use table of IDs for human readable strings.
...
Modify HMAC selftest callbacks to notify each digest type used.
2011-04-14 16:14:41 +00:00
Dr. Stephen Henson
8038511c27
Update CMAC, HMAC, GCM to use new POST system.
...
Fix crash if callback not set.
2011-04-14 13:10:00 +00:00
Dr. Stephen Henson
a6311f856b
Remove several of the old obsolete FIPS_corrupt_*() functions.
2011-04-14 11:30:51 +00:00
Dr. Stephen Henson
ac892b7aa6
Initial incomplete POST overhaul: add support for POST callback to
...
allow status of POST to be monitored and/or failures induced.
2011-04-14 11:15:10 +00:00
Dr. Stephen Henson
77394d7e8f
Remove duplicate flag.
2011-04-13 00:11:53 +00:00
Dr. Stephen Henson
114c8e220b
Use consistent FIPS tarball name.
...
Add XTS to FIPS build.
Hide XTS symbol names.
2011-04-12 23:59:05 +00:00
Dr. Stephen Henson
32a2d8ddfe
Provisional AES XTS support.
2011-04-12 23:21:33 +00:00
Dr. Stephen Henson
4bd1e895fa
Update fips_pkey_signature_test: use fixed string if supplies tbs is
...
NULL. Always allocate signature buffer.
Update ECDSA selftest to use fips_pkey_signature_test. Add copyright notice
to file.
2011-04-12 17:41:53 +00:00
Dr. Stephen Henson
9b08dbe903
Complete rewrite of FIPS_selftest_dsa(). Use hardcoded 2048 bit DSA key
...
and SHA384. Use fips_pkey_signature_test().
2011-04-12 16:26:52 +00:00
Dr. Stephen Henson
3d607309e6
Update RSA selftest code to use a 2048 bit RSA and only a single KAT
...
for PSS+SHA256
2011-04-12 15:38:34 +00:00
Dr. Stephen Henson
49cb5e0b40
Fix memory leaks: uninstantiate DRBG during health checks. Cleanup md_ctx
...
when performing ECDSA selftest.
2011-04-12 14:28:06 +00:00
Dr. Stephen Henson
e2abfd58cc
Stop warning and fix memory leaks.
2011-04-12 13:02:56 +00:00
Dr. Stephen Henson
364ce53cef
No need to disable leak checking for FIPS builds now we use internal
...
memory callbacks.
2011-04-12 13:01:40 +00:00
Dr. Stephen Henson
6223352683
Update ECDSA selftest to use hard coded private keys. Include tests for
...
prime and binary fields.
2011-04-12 11:49:35 +00:00
Dr. Stephen Henson
1a4d93bfb5
Update fips_premain.c fingerprint.
2011-04-12 11:48:00 +00:00
Dr. Stephen Henson
63c82f8abb
Update copyright year.
...
Zero ciphertext and plaintext temporary buffers.
Check FIPS_cipher() return value.
2011-04-11 21:32:51 +00:00
Dr. Stephen Henson
4fd7256b77
Use correct version number.
2011-04-11 14:55:19 +00:00
Dr. Stephen Henson
1ccc003b82
Add mem_clr.c explicity for no-asm builds.
2011-04-11 14:53:40 +00:00
Dr. Stephen Henson
48da9b8f2a
Fix warning.
2011-04-11 14:52:59 +00:00
Dr. Stephen Henson
6909dccc32
Set length to 41 (40 hex characters + null).
2011-04-11 14:50:11 +00:00
Dr. Stephen Henson
b93e331ba4
Reorder headers to get definitions before they are used.
2011-04-11 14:01:33 +00:00
Dr. Stephen Henson
f9bf6314ea
Don't give dependency warning for fips builds.
...
Give error for "make depend" in restricted tarball builds.
Document how restricted tarballs work.
2011-04-11 00:22:42 +00:00
Dr. Stephen Henson
ac319dd82b
Typo: fix duplicate call.
2011-04-10 23:32:19 +00:00
Dr. Stephen Henson
284e2d2b37
fix fipscanisteronly autodetect
2011-04-10 23:28:24 +00:00
Dr. Stephen Henson
4582626544
Auto detect no-ec2m add option to make no-ec2m tarball.
2011-04-10 18:30:13 +00:00
Dr. Stephen Henson
ccc5784e37
set OPENSSL_FIPSSYMS for restricted buils and auto detect no-ec2m
2011-04-10 17:31:03 +00:00
Dr. Stephen Henson
8742ae6e19
Clarify README.FIPS.
2011-04-10 16:23:31 +00:00
Dr. Stephen Henson
c105c96bac
Auto configure for fips is from restricted tarball.
...
Remove more unnecessary files form fips tarball.
2011-04-10 16:18:19 +00:00
Dr. Stephen Henson
6ceb1e8efb
Remove unused build targets from Makefile.fips, add cmac to dist list.
2011-04-10 01:14:58 +00:00
Dr. Stephen Henson
1f91af5e56
remove ENGINE dependency from ecdh
2011-04-10 01:14:25 +00:00
Dr. Stephen Henson
55e328f580
Add error for health check failure.
...
Rebuild all FIPS error codes to clean out old obsolete codes.
2011-04-09 17:46:31 +00:00
Dr. Stephen Henson
f3823ddfcf
Before initalising a live DRBG (i.e. not in test mode) run a complete health
...
check on a DRBG of the same type.
2011-04-09 17:27:07 +00:00
Dr. Stephen Henson
68ea88b8d1
New function to return security strength of PRNG.
2011-04-09 16:49:59 +00:00
Dr. Stephen Henson
31360957fb
DH keys have an (until now) unused 'q' parameter. When creating
...
from DSA copy q across and if q present generate DH key in the
correct range.
2011-04-07 15:01:48 +00:00
Dr. Stephen Henson
d80399a357
Only use fake rand once per operation. This stops the EC
...
pairwise consistency test interfering with the test.
2011-04-06 23:42:55 +00:00
Dr. Stephen Henson
d7a3ce989c
Update CHANGES.
2011-04-06 23:41:19 +00:00
Dr. Stephen Henson
1ee49722dc
Add fips hmac key to dgst utility.
2011-04-06 23:40:46 +00:00
Dr. Stephen Henson
6653c6f2e8
Update OpenSSL DRBG support code. Use date time vector as additional data.
...
Set FIPS RAND_METHOD at same time as OpenSSL RAND_METHOD.
2011-04-06 23:40:22 +00:00
Dr. Stephen Henson
4c8855b975
Add missing error code strings.
2011-04-06 18:17:05 +00:00
Dr. Stephen Henson
e71bbd26e7
Remove rand files from fipscanister.o
2011-04-06 18:16:44 +00:00
Dr. Stephen Henson
acd410dc15
check buffer is larger enough before overwriting
2011-04-06 18:06:41 +00:00
Dr. Stephen Henson
161cc82df1
updated FIPS status
2011-04-06 13:40:36 +00:00
Dr. Stephen Henson
42bd0a6b3c
Update fipssyms.h to keep all symbols in FIPS,fips namespace.
...
Rename drbg_cprng_test to fips_drbg_cprng_test.
Remove rand files from Makefile.fips.
2011-04-05 15:48:05 +00:00
Dr. Stephen Henson
05e24c87dd
Extensive reorganisation of PRNG handling in FIPS module: all calls
...
now use an internal RAND_METHOD. All dependencies to OpenSSL standard
PRNG are now removed: it is the applications resposibility to setup
the FIPS PRNG and initalise it.
Initial OpenSSL RAND_init_fips() function that will setup the DRBG
for the "FIPS capable OpenSSL".
2011-04-05 15:24:10 +00:00
Dr. Stephen Henson
cab0595c14
Rename deprecated FIPS_rand functions to FIPS_x931. These shouldn't be
...
used by applications directly and the X9.31 PRNG is deprecated by new
FIPS140-2 rules anyway.
2011-04-05 12:42:31 +00:00
Dr. Stephen Henson
856650deb0
FIPS mode support for openssl utility: doesn't work properly yet due
...
to missing DRBG support in libcrypto.
2011-04-04 17:16:28 +00:00
Dr. Stephen Henson
ab1415d2f5
Updated error codes for FIPS library.
2011-04-04 17:05:09 +00:00
Dr. Stephen Henson
f4bd65dae3
Set error code is additional data callback fails.
2011-04-04 17:03:35 +00:00
Dr. Stephen Henson
ac1ee8e877
Use environment when builds libcrypto shared library so CC value is picked up
...
in FIPS builds.
2011-04-04 17:01:58 +00:00
Dr. Stephen Henson
8776ef63c1
Change FIPS locking functions to macros so we get useful line information.
...
Set fips_thread_set properly.
2011-04-04 15:38:21 +00:00
Andy Polyakov
7af0400297
gcm128.c: fix shadow warnings.
2011-04-04 15:24:09 +00:00
Dr. Stephen Henson
1d59fe5267
Disable test fprintf.
2011-04-04 14:52:20 +00:00
Dr. Stephen Henson
ded1999702
Change RNG test to block oriented instead of request oriented, add option
...
to test a "stuck" DRBG.
2011-04-04 14:47:31 +00:00
Dr. Stephen Henson
a255e5bc98
check RAND_pseudo_bytes return value
2011-04-04 14:43:20 +00:00
Dr. Stephen Henson
4058861f69
PR: 2462
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS Retransmission Buffer Bug
2011-04-03 17:14:35 +00:00
Dr. Stephen Henson
f74a0c0c93
PR: 2458
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Don't change state when answering DTLS ClientHello.
2011-04-03 16:25:29 +00:00
Dr. Stephen Henson
6e28b60aa5
PR: 2457
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS fragment reassembly bug.
2011-04-03 15:47:58 +00:00
Dr. Stephen Henson
3b5c1dc565
Make WIN32 static builds work again.
2011-04-02 16:51:04 +00:00
Andy Polyakov
e512375186
ARM assembler pack: add missing arm_arch.h.
2011-04-01 21:09:09 +00:00
Andy Polyakov
1e86318091
ARM assembler pack: profiler-assisted optimizations and NEON support.
2011-04-01 20:58:34 +00:00
Andy Polyakov
d8d958323b
gcm128.c: tidy up, minor optimization, rearrange gcm128_context.
2011-04-01 20:52:35 +00:00
Dr. Stephen Henson
30b26b551f
restore .cvsignore
2011-04-01 18:49:24 +00:00
Dr. Stephen Henson
7d48743b95
restore .cvsignore
2011-04-01 18:40:30 +00:00
Dr. Stephen Henson
b26f324824
delete lib file
2011-04-01 18:40:05 +00:00
Dr. Stephen Henson
02eb92abad
temporarily update .cvsignore
2011-04-01 18:38:51 +00:00
Dr. Stephen Henson
e5cadaf8db
Only zeroise sensitive parts of DRBG context, so the type and flags
...
are undisturbed.
Allow setting of "rand" callbacks for DRBG.
2011-04-01 17:49:45 +00:00
Dr. Stephen Henson
8cf88778ea
Allow FIPS malloc callback setting. Automatically set some callbacks
...
in OPENSSL_init().
2011-04-01 16:23:16 +00:00
Dr. Stephen Henson
c4acfb1fd0
Add additional OPENSSL_init() handling add dummy call to (hopefully)
...
ensure OPENSSL_init() is always linked into an application.
2011-04-01 15:46:03 +00:00
Dr. Stephen Henson
3f7468318d
Provisional support for auto called OPENSSL_init() function. This can be
...
used to set up any appropriate functions such as FIPS callbacks without
requiring an explicit application call.
2011-04-01 14:49:30 +00:00
Dr. Stephen Henson
011c865640
Initial switch to DRBG base PRNG in FIPS mode. Include bogus seeding for
...
test applications.
2011-04-01 14:46:07 +00:00
Dr. Stephen Henson
212a08080c
Unused, untested, provisional RAND interface for DRBG.
2011-03-31 18:06:07 +00:00
Dr. Stephen Henson
e06de4dd35
Remove redundant definitions. Give error code if DRBG sefltest fails.
2011-03-31 17:23:12 +00:00
Dr. Stephen Henson
52b6ee8245
Reorganise DRBG API so the entropy and nonce callbacks can return a
...
pointer to a buffer instead of copying to a fixed length buffer. This
removes the entropy and nonce length restrictions.
2011-03-31 17:15:54 +00:00
Dr. Stephen Henson
bb61a6c80d
fix warnings
2011-03-31 17:12:49 +00:00
Dr. Stephen Henson
79837e8c10
Update .cvsignore
2011-03-25 16:41:11 +00:00
Dr. Stephen Henson
5198009885
Add .cvsignore
2011-03-25 16:37:30 +00:00
Dr. Stephen Henson
cd22dfbf01
Have all algorithm test programs call fips_algtest_init() at startup:
...
this will perform all standalone operations such as setting error
callbacks, entering FIPS mode etc.
2011-03-25 16:36:46 +00:00
Dr. Stephen Henson
d4178c8fb1
Disable cmac tests by default so the old algorithm test vectors work.
2011-03-25 16:34:20 +00:00
Richard Levitte
3a660e7364
Corrections to the VMS build system.
...
Submitted by Steven M. Schweda <sms@antinode.info >
2011-03-25 16:20:35 +00:00
Dr. Stephen Henson
dad7851485
Allow setting of get_entropy and get_nonce callbacks outside test mode.
...
Test mode is now set when a DRBG context is initialised.
2011-03-25 14:38:37 +00:00
Dr. Stephen Henson
9db6974f77
Add .cvsignore
2011-03-25 14:26:23 +00:00
Dr. Stephen Henson
8e5dbc23df
Remove unused function.
2011-03-25 14:24:23 +00:00
Dr. Stephen Henson
bd7e6bd44b
Fix compiler warnings.
2011-03-25 12:36:02 +00:00
Dr. Stephen Henson
97057a1a7d
Make some Unix builds work again.
2011-03-25 12:09:29 +00:00
Dr. Stephen Henson
8e51aef611
Typo.
2011-03-25 12:00:16 +00:00
Richard Levitte
4ec3e8ca51
For VMS, implement the possibility to choose 64-bit pointers with
...
different options:
"64" The build system will choose /POINTER_SIZE=64=ARGV if
the compiler supports it, otherwise /POINTER_SIZE=64.
"64=" The build system will force /POINTER_SIZE=64.
"64=ARGV" The build system will force /POINTER_SIZE=64=ARGV.
2011-03-25 09:40:48 +00:00
Richard Levitte
5d0137aa14
make update
2011-03-25 09:30:52 +00:00
Richard Levitte
30fafdebf3
* Configure, crypto/ec/ec.h, crypto/ec/ecp_nistp224.c, util/mkdef.pl:
...
Have EC_NISTP224_64_GCC_128 treated like any algorithm, and have
disabled by default. If we don't do it this way, it screws up
libeay.num.
* util/libeay.num: make update
2011-03-25 09:29:46 +00:00
Richard Levitte
e775bbc464
* fips/cmac/fips_cmac_selftest.c: Because the examples in SP_800-38B
...
aren't trustworthy (see examples 13 and 14, they have the same mac,
as do examples 17 and 18), use examples from official test vectors
instead.
2011-03-25 09:24:02 +00:00
Richard Levitte
d8ba2a42e9
* fips/fipsalgtest.pl: Test the testvectors for all the CMAC ciphers
...
we support.
2011-03-25 08:48:26 +00:00
Richard Levitte
af267e4315
* fips/cmac/fips_cmactest.c: Some say TDEA, others say TDES. Support
...
both names.
2011-03-25 08:44:37 +00:00
Richard Levitte
d15467d582
* fips/cmac/fips_cmactest.c: Changed to accept all the ciphers we
...
support (Two Key TDEA is not supported), to handle really big
messages (some of the test vectors have messages 65536 bytes long),
and to handle cases where there are several keys (Three Key TDEA)
2011-03-25 08:40:33 +00:00
Richard Levitte
9507979228
* Makefile.fips: Update and add details about cmac.
2011-03-25 07:17:17 +00:00
Richard Levitte
c6dbe90895
make update
2011-03-24 22:59:02 +00:00
Richard Levitte
37942b93af
Implement FIPS CMAC.
...
* fips/fips_test_suite.c, fips/fipsalgtest.pl, test/Makefile: Hook in
test cases and build test program.
2011-03-24 22:57:52 +00:00
Richard Levitte
399aa6b5ff
Implement FIPS CMAC.
...
* fips/cmac/*: Implement the basis for FIPS CMAC, using FIPS HMAC as
an example.
* crypto/cmac/cmac.c: Enable the FIPS API. Change to use M_EVP macros
where possible.
* crypto/evp/evp.h: (some of the macros get added with this change)
* fips/fips.h, fips/utl/fips_enc.c: Add a few needed functions and use
macros to have cmac.c use these functions.
* Makefile.org, fips/Makefile, fips/fips.c: Hook it in.
2011-03-24 22:55:02 +00:00
Richard Levitte
487b023f3d
make update (1.1.0-dev)
...
This meant alarger renumbering in util/libeay.num due to symbols
appearing in 1.0.0-stable and 1.0.1-stable. However, since there's
been no release on this branch yet, it should be harmless.
2011-03-23 00:11:32 +00:00
Richard Levitte
1f9c2b3f71
* crypto/crypto-lib.com: Add a few more missing modules.
2011-03-23 00:10:16 +00:00
Richard Levitte
486ec55503
* util/mkdef.pl: Add crypto/o_str.h and crypto/o_time.h. Maybe some
...
more need to be added...
2011-03-22 23:54:18 +00:00
Dr. Stephen Henson
4fc02f1229
Use a signed value to check return value of do_cipher().
2011-03-21 17:37:27 +00:00
Dr. Stephen Henson
beb895083c
Free DRBG context in self tests.
2011-03-21 14:40:57 +00:00
Richard Levitte
2d1122b802
* apps/makeapps.com: Add srp.
2011-03-20 17:34:04 +00:00
Richard Levitte
f0d9196237
* apps/makeapps.com: Forgot to end the check for /POINTER_SIZE=64=ARGV
...
with turning trapping back on.
* test/maketests.com: Do the same check for /POINTER_SIZE=64=ARGV
here.
* test/clean-test.com: A new script for cleaning up.
2011-03-20 14:02:20 +00:00
Richard Levitte
8ecef24a66
* apps/openssl.c: For VMS, take care of copying argv if needed much earlier,
...
directly in main(). 'if needed' also includes when argv is a 32 bit
pointer in an otherwise 64 bit environment.
* apps/makeapps.com: When using /POINTER_SIZE=64, try to use the additional
=ARGV, but only if it's supported. Fortunately, DCL is very helpful
telling us in this case.
2011-03-20 13:15:33 +00:00
Richard Levitte
3d62b1f22d
A few more long symbols need shortening.
2011-03-20 10:23:51 +00:00
Richard Levitte
9e67d24743
Add missing source. Also, have the compile also use [.MODES] as
...
include directory, as other parts (notably, EVP) seem to need it.
2011-03-20 10:23:27 +00:00
Richard Levitte
537c982306
After some adjustments, apply the changes OpenSSL 1.0.0d on OpenVMS
...
submitted by Steven M. Schweda <sms@antinode.info >
2011-03-19 10:58:14 +00:00
Dr. Stephen Henson
5904882eaa
Typo.
2011-03-18 18:17:55 +00:00
Dr. Stephen Henson
1e803100de
Implement continuous RNG test for SP800-90 DRBGs.
2011-03-17 18:53:33 +00:00
Dr. Stephen Henson
96ec46f7c0
Implement health checks needed by SP800-90.
...
Fix warnings.
Instantiate DRBGs at maximum strength.
2011-03-17 16:55:24 +00:00
Dr. Stephen Henson
27131fe8f7
Fix warnings about ignored return values.
2011-03-17 14:43:13 +00:00
Dr. Stephen Henson
23bc7961d2
Fix broken SRP error/function code assignment.
2011-03-16 16:17:46 +00:00
Dr. Stephen Henson
fbbabb646c
Add extensive DRBG selftest data and option to corrupt it in fips_test_suite.
2011-03-16 15:52:12 +00:00
Ben Laurie
8cd3d99f57
Missing SRP files.
2011-03-16 11:50:33 +00:00
Ben Laurie
d4f3dd5fb6
Fix Tom Wu's email.
2011-03-16 11:28:43 +00:00
Dr. Stephen Henson
aa24c4a736
PR: 2469
...
Submitted by: Jim Studt <jim@studt.net >
Reviewed by: steve
Check mac is present before trying to retrieve mac iteration count.
2011-03-13 18:20:01 +00:00
Dr. Stephen Henson
d70fcb96ac
Fix warnings: signed/unisgned comparison, shadowing (in some cases global
...
functions such as rand() ).
2011-03-12 17:27:03 +00:00
Dr. Stephen Henson
5e374d2ee8
Remove redundant check to stop compiler warning.
2011-03-12 17:06:35 +00:00
Ben Laurie
0deea0e03c
Note SRP support.
2011-03-12 17:04:07 +00:00
Ben Laurie
edc032b5e3
Add SRP support.
2011-03-12 17:01:19 +00:00
Ben Laurie
0c4e67102e
Fix warning.
2011-03-12 13:55:24 +00:00
Dr. Stephen Henson
1b76fac5ae
Check requested security strength in DRBG. Add function to retrieve the
...
security strength.
2011-03-11 17:42:11 +00:00
Dr. Stephen Henson
329c744f51
make no-dsa work again
2011-03-10 18:26:50 +00:00
Dr. Stephen Henson
4d5d28675e
Update status.
2011-03-10 14:01:34 +00:00
Dr. Stephen Henson
1acc24a8ba
Make no-ec2m work again.
2011-03-10 01:00:30 +00:00
Dr. Stephen Henson
f52e552a93
Add a few more symbol renames.
2011-03-09 23:53:41 +00:00
Dr. Stephen Henson
8857b380e2
Add ECDH to validated module.
2011-03-09 23:44:06 +00:00
Dr. Stephen Henson
a6de7133bb
Enter FIPS mode in fips_dhvs. Support file I/O in fips_ecdsavs.
2011-03-09 14:55:10 +00:00
Dr. Stephen Henson
0fa714a4f0
Update fips_dhvs to handle functional test by generating keys.
2011-03-09 14:39:54 +00:00
Dr. Stephen Henson
3c9baf25f1
Update .cvsignore
2011-03-09 14:35:31 +00:00
Dr. Stephen Henson
0392f94fbc
Typo.
2011-03-08 21:29:07 +00:00
Dr. Stephen Henson
11e80de3ee
New initial DH algorithm test driver.
2011-03-08 19:10:17 +00:00
Dr. Stephen Henson
bc91494e06
New SP 800-56A compliant version of DH_compute_key().
2011-03-08 19:07:26 +00:00
Dr. Stephen Henson
a1e7883edb
Add meaningful error codes to DRBG.
2011-03-08 14:16:30 +00:00
Dr. Stephen Henson
dd0d2df562
Add file I/O to fips_drbgvs program.
2011-03-08 13:51:34 +00:00
Dr. Stephen Henson
ce57f0d5c2
Support I/O with files in new fips_gcmtest program.
2011-03-08 13:42:21 +00:00
Dr. Stephen Henson
c34a652e1e
Remove redirection from fipsalgtest.pl script.
2011-03-08 13:29:46 +00:00
Dr. Stephen Henson
12b77cbec3
Remove need for redirection on RNG and DSS algorithm test programs: some
...
platforms don't support it.
2011-03-08 13:27:29 +00:00
Dr. Stephen Henson
e45c6c4e25
Uninstantiate and free functions for DRBG.
2011-03-07 16:51:17 +00:00
Dr. Stephen Henson
ff4a19a471
Fix couple of bugs in CTR DRBG implementation.
2011-03-06 13:10:37 +00:00
Dr. Stephen Henson
868f12988c
Updates to DRBG: fix bugs in infrastructure. Add initial experimental
...
algorithm test generator.
2011-03-06 12:35:09 +00:00
Dr. Stephen Henson
591cbfae3c
Initial, provisional, subject to wholesale change, untested, probably
...
not working, incomplete and unused SP800-90 DRBGs for CTR and Hash modes.
Did I say this was untested?
2011-03-04 18:00:21 +00:00
Andy Polyakov
a000759a5c
ia64-mont.pl: optimize short-key performance.
2011-03-04 13:27:29 +00:00
Andy Polyakov
bc5b136c5c
ghash-x86.pl: optimize for Sandy Bridge.
2011-03-04 13:21:41 +00:00
Andy Polyakov
16cb0d9591
xts128.c: minor optimization.
2011-03-04 13:17:19 +00:00
Andy Polyakov
0ab8fd58e1
s390x assembler pack: tune-up and support for new z196 hardware.
2011-03-04 13:09:16 +00:00
Dr. Stephen Henson
8aa6cff40f
Update status information.
2011-02-23 16:06:50 +00:00
Dr. Stephen Henson
949c6f8ccf
Stop warnings.
2011-02-23 16:06:33 +00:00
Dr. Stephen Henson
199e92bb57
Use more portable options when making links in Makefile.fips
2011-02-23 16:06:07 +00:00
Dr. Stephen Henson
30ff3278ae
Add DllMain to fips symbols: will need to call this in FIPS capable OpenSSL.
2011-02-23 15:16:12 +00:00
Dr. Stephen Henson
071eb6b592
Add new symbols to fipssyms.h
2011-02-23 15:04:06 +00:00
Dr. Stephen Henson
548b4763e1
Make -DOPENSSL_FIPSSYMS work under WIN32: run perl script when
...
WIN32 assembly language files are created, add norunasm option
to just translate and not run the assembler.
2011-02-23 15:03:43 +00:00
Dr. Stephen Henson
227d6a9347
Make mkfiles.pl work with fipscanisteronly.
2011-02-22 17:02:14 +00:00
Dr. Stephen Henson
f6e76a67f0
Include ms directory for fips distribution.
2011-02-22 16:48:30 +00:00
Dr. Stephen Henson
d989e4f8c2
Make fipscanisteronly work with WIN32 build system.
2011-02-22 16:36:20 +00:00
Dr. Stephen Henson
558ddad34f
Add fips/ecdsa directory to mkfiles.pl
2011-02-22 14:52:23 +00:00
Dr. Stephen Henson
f8c39f3cd0
Remove duplicate test rule.
2011-02-22 14:50:05 +00:00
Dr. Stephen Henson
324abf1d20
Add modes_lcl.h to header list.
2011-02-22 14:06:54 +00:00
Dr. Stephen Henson
6d7f706d08
Removing debugging print.
2011-02-22 12:46:17 +00:00
Dr. Stephen Henson
227437d292
Don't try and update c_rehash for fipscanisteronly builds.
2011-02-22 12:44:29 +00:00
Dr. Stephen Henson
3e446ba347
Make "make links" work in fipscanisteronly builds.
2011-02-22 12:34:46 +00:00
Dr. Stephen Henson
147e6f4465
typo
2011-02-21 19:58:54 +00:00
Dr. Stephen Henson
94a0a96cd8
Initial perl script to filter out unneeded files for a fips tarball.
2011-02-21 19:36:55 +00:00
Dr. Stephen Henson
83dfcd727b
Call Makefile.fips when making a fips tarball.
2011-02-21 19:30:13 +00:00
Dr. Stephen Henson
4e712c48ab
Remove debugging option.
2011-02-21 19:29:48 +00:00
Dr. Stephen Henson
bfba6e05b8
*** empty log message ***
2011-02-21 18:14:59 +00:00
Dr. Stephen Henson
f18c19f5e8
Remove unnecessary link directories.
2011-02-21 18:07:28 +00:00
Dr. Stephen Henson
b7056b6414
Update dependencies.
2011-02-21 17:51:59 +00:00
Dr. Stephen Henson
620baecf91
Create fips links even if not compiling in fips mode.
2011-02-21 17:45:45 +00:00
Dr. Stephen Henson
37eae9909a
Remove unnecessary dependencies.
2011-02-21 17:35:53 +00:00
Dr. Stephen Henson
6892d0eb03
Need to link additional directories for fipscanisteronly build.
2011-02-21 16:37:42 +00:00
Dr. Stephen Henson
3deb010dc0
x509v3.h header file not needed in fips algorithm test utilities.
2011-02-21 16:36:47 +00:00
Dr. Stephen Henson
4a716f5beb
tools and rehash not needed for fips build.
2011-02-21 16:00:21 +00:00
Dr. Stephen Henson
e3496215a2
*** empty log message ***
2011-02-21 15:15:58 +00:00
Dr. Stephen Henson
eead69f5ed
Make fipscanisteronly build only required files.
2011-02-21 14:07:15 +00:00
Dr. Stephen Henson
ab8a4e54db
Move gcm128_context definition to modes_lcl.h (along with some related
...
definitions) so we can use it in EVP GCM code avoiding need to allocate
it.
2011-02-19 22:16:52 +00:00
Dr. Stephen Henson
947ff113d2
add ECDSA POST
2011-02-18 17:25:00 +00:00
Dr. Stephen Henson
acf254f86e
AES GCM selftests.
2011-02-18 17:09:33 +00:00
Dr. Stephen Henson
5d439d6955
Make -DOPENSSL_FIPSSYMS work for assembly language builds.
2011-02-17 19:03:52 +00:00
Dr. Stephen Henson
38bae7baa5
Experimental perl script to edit assembly language source files,
...
call the assembler, then restore original file.
This makes OPENSSL_FIPSSYMS work for assembly language builds.
2011-02-17 18:08:59 +00:00
Dr. Stephen Henson
d47691ecfe
Correct fipssyms.h for more assembly language symbols.
2011-02-17 17:45:09 +00:00
Dr. Stephen Henson
223ef1db41
Update auto generated comment.
2011-02-17 15:35:43 +00:00
Dr. Stephen Henson
01ad8195aa
Remove debugging command.
...
Reorder fipssyms.h to include assembly language symbols at the end.
2011-02-17 15:33:32 +00:00
Dr. Stephen Henson
d87f52cb94
Don't need err library for Makefile.fips
2011-02-16 18:07:57 +00:00
Dr. Stephen Henson
a3654f0586
Include openssl/crypto.h first in several other files so FIPS renaming
...
is picked up.
2011-02-16 17:25:01 +00:00
Dr. Stephen Henson
017bc57bf9
Experimental FIPS symbol renaming.
...
Fixups under fips/ to make symbol renaming work.
2011-02-16 14:49:50 +00:00
Dr. Stephen Henson
d749e1080a
Experimental symbol renaming to avoid clashes with regular OpenSSL.
...
Make sure crypto.h is included first in any affected files.
2011-02-16 14:40:06 +00:00
Dr. Stephen Henson
0fbf8f447b
Add pairwise consistency test to EC.
2011-02-15 16:58:28 +00:00
Dr. Stephen Henson
c81f8f59be
Use SHA-256 in fips_test_suite.
2011-02-15 16:58:06 +00:00
Dr. Stephen Henson
225a9e296b
Update pairwise consistency checks to use SHA-256.
2011-02-15 16:18:18 +00:00
Dr. Stephen Henson
25c6542944
Add non-FIPS algorithm blocking and selftest checking.
2011-02-15 16:03:47 +00:00
Dr. Stephen Henson
14567b1451
Add FIPS flags to AES ciphers and SHA* digests.
2011-02-15 15:57:54 +00:00
Dr. Stephen Henson
fe082202c0
Ignore final '\n' when checking if hex line length is odd.
2011-02-15 15:56:13 +00:00
Dr. Stephen Henson
fbc164ec2f
Add support for SigGen and KeyPair tests.
2011-02-15 14:16:57 +00:00
Dr. Stephen Henson
943a0ceed0
Update ECDSA test program to handle ECDSA2 format files.
...
Correctly handle hex strings with an odd number of digits.
2011-02-14 19:42:49 +00:00
Dr. Stephen Henson
5d2f1538a0
Add .cvsignore.
2011-02-14 17:28:28 +00:00
Dr. Stephen Henson
fe26d066ff
Add ECDSA functionality to fips module. Initial very incomplete version
...
of algorithm test program.
2011-02-14 17:14:55 +00:00
Dr. Stephen Henson
c876a4b7b1
Include support for an add_lock callback to tiny FIPS locking API.
2011-02-14 17:05:42 +00:00
Dr. Stephen Henson
c966120412
Don't use FIPS api for ec2_oct.c
2011-02-14 16:55:28 +00:00
Dr. Stephen Henson
84b08eee4b
Reorganise ECC code for inclusion in FIPS module.
...
Move compression, point2oct and oct2point functions into separate files.
Add a flags field to EC_METHOD.
Add a flag EC_FLAGS_DEFAULT_OCT to use the default compession and oct
functions (all existing methods do this). This removes dependencies from
EC_METHOD while keeping original functionality.
2011-02-14 16:52:12 +00:00
Dr. Stephen Henson
bf2546f947
Use BN_nist_mod_func to avoid need to peek error queue.
2011-02-14 16:45:28 +00:00
Dr. Stephen Henson
133291f8e7
New function BN_nist_mod_func which returns an appropriate function
...
if the passed prime is a NIST prime.
2011-02-14 16:44:29 +00:00
Dr. Stephen Henson
e990b4f838
Remove dependency of dsa_sign.o and dsa_vrf.o: new functions FIPS_dsa_sig_new
...
and FIPS_dsa_sig_free, reimplment DSA_SIG_new and DSA_SIG_free from ASN1
library.
2011-02-13 18:45:41 +00:00
Dr. Stephen Henson
e47af46cd8
Change FIPS source and utilities to use the "FIPS_" names directly
...
instead of using regular OpenSSL API names.
2011-02-12 18:25:18 +00:00
Dr. Stephen Henson
36246be915
Make no-ec2m work on Win32 build. Add nexprotoneg support too.
2011-02-12 17:38:40 +00:00
Dr. Stephen Henson
c9a90645a5
Disable some functions in headers with no-ec2m
2011-02-12 17:38:06 +00:00
Dr. Stephen Henson
b331016124
New option to disable characteristic two fields in EC code.
2011-02-12 17:23:32 +00:00
Andy Polyakov
afb4191304
dso_dlfcn.c: make it work on Tru64 4.0.
...
PR: 2316
2011-02-12 16:43:41 +00:00
Andy Polyakov
874b0bd968
Configure: engage assembler in Android target.
2011-02-12 16:13:59 +00:00
Andy Polyakov
a6d915e0ef
gcm128.c: make it work with no-sse2.
2011-02-12 11:47:55 +00:00
Dr. Stephen Henson
975138edaa
Add Makefile.fips.
2011-02-11 20:56:24 +00:00
Dr. Stephen Henson
30b56225cc
New "fispcanisteronly" build option: only build fipscanister.o and
...
associated utilities. This functionality will be used by the validated
tarball.
2011-02-11 19:02:34 +00:00
Dr. Stephen Henson
dc527a62a1
Make Windows build work with GCM.
2011-02-11 16:49:01 +00:00
Dr. Stephen Henson
ed12c2f7ca
In FIPS mode only use "Generation by Testing Candidates" equivalent.
2011-02-11 15:19:54 +00:00
Dr. Stephen Henson
16a7fcc447
Return security strength for supported DSA parameters: will be used
...
later.
2011-02-11 14:38:39 +00:00
Dr. Stephen Henson
a1a5885b64
Free keys if DSA pairwise error.
2011-02-11 14:21:01 +00:00
Andy Polyakov
f84a8ea526
x86gas.pl: make data_short work on legacy systems.
2011-02-10 21:24:24 +00:00
Andy Polyakov
01be5db64e
xts128.c: initial draft.
2011-02-10 21:16:21 +00:00
Dr. Stephen Henson
a4113c52b2
Disable FIPS restrictions when doing GCM testing.
2011-02-10 01:46:25 +00:00
Dr. Stephen Henson
b3d8022edd
Add GCM IV generator. Add some FIPS restrictions to GCM. Update fips_gcmtest.
2011-02-09 16:21:43 +00:00
Andy Polyakov
632d83f0a3
ccm128.c: initialize ctx->block (what I was smoking?).
2011-02-08 23:08:02 +00:00
Andy Polyakov
d3fad7cb51
ccm128.c: initial draft.
2011-02-08 23:02:45 +00:00
Dr. Stephen Henson
f4bfe97fc9
Equally experimental encrypt side for fips_gcmtest. Currently this uses IVs
...
in the request file need to update it to generate IVs once we have an IV
generator in place.
2011-02-08 19:25:24 +00:00
Bodo Möller
c415adc26f
Sync with 1.0.1 branch.
...
(CVE-2011-0014 OCSP stapling fix has been applied to HEAD as well.)
2011-02-08 19:09:08 +00:00
Dr. Stephen Henson
9afe95099d
Set values to NULL after freeing them.
2011-02-08 18:25:57 +00:00
Dr. Stephen Henson
9dd346c90d
Experimental incomplete AES GCM algorithm test program.
2011-02-08 18:15:59 +00:00
Bodo Möller
9770924f9b
OCSP stapling fix (OpenSSL 0.9.8r/1.0.0d)
...
Submitted by: Neel Mehta, Adam Langley, Bodo Moeller
2011-02-08 17:48:57 +00:00
Dr. Stephen Henson
f4001a0d19
Link GCM into FIPS module. Check return value in EVP gcm.
2011-02-08 15:10:42 +00:00
Bodo Möller
cea73f9db3
Synchronize with 1.0.0 branch
2011-02-08 08:48:51 +00:00
Andy Polyakov
1f2502eb58
gcm128.c: add boundary condition checks.
2011-02-07 19:11:13 +00:00
Dr. Stephen Henson
bdaa54155c
Initial *very* experimental EVP support for AES-GCM. Note: probably very
...
broken and subject to change.
2011-02-07 18:16:33 +00:00
Dr. Stephen Henson
fd3dbc1dbf
Add CRYPTO_gcm128_tag() function to retrieve the tag.
2011-02-07 18:05:27 +00:00
Dr. Stephen Henson
d45087c672
Use 0 not -1 (since type is size_t) for finalisation argument to do_cipher:
...
the NULL value for the input buffer is sufficient to notice this case.
2011-02-07 18:04:27 +00:00
Dr. Stephen Henson
634b66186a
Typo.
2011-02-07 14:36:55 +00:00
Dr. Stephen Henson
3da0ca796c
New flags EVP_CIPH_FLAG_CUSTOM_CIPHER in cipher structures if an underlying
...
cipher handles all cipher symantics itself.
2011-02-07 14:36:08 +00:00
Dr. Stephen Henson
f9678b8b57
Fix memory leak.
2011-02-07 13:34:00 +00:00
Dr. Stephen Henson
83e9c36261
Use default ASN1 if flag set.
2011-02-07 12:47:16 +00:00
Andy Polyakov
b68c13154e
gcm128.c: allow multiple calls to CRYPTO_gcm128_aad.
2011-02-06 23:50:05 +00:00
Andy Polyakov
68e2586bd3
gcm128.c: fix bug in OPENSSL_SMALL_FOOTPRINT decrypt.
...
PR: 2432
Submitted by: Michael Heyman
2011-02-06 23:48:32 +00:00
Dr. Stephen Henson
61f477f4ab
Fix duplicate code and typo.
2011-02-06 00:51:05 +00:00
Dr. Stephen Henson
7e95116064
Remove unneeded functions, make some functions and variables static.
2011-02-04 17:56:57 +00:00
Dr. Stephen Henson
06b433acad
Add FIPS support to the WIN32 build system.
2011-02-03 23:12:04 +00:00
Dr. Stephen Henson
14ae26f2e4
Transfer error redirection to fips.h, add OPENSSL_FIPSAPI to source files
...
that use it.
2011-02-03 17:00:24 +00:00
Dr. Stephen Henson
3710d1aae9
Rename crypto/fips_err.c to fips_ers.c to avoid clash with other fips_err.c
2011-02-03 16:16:30 +00:00
Dr. Stephen Henson
cc5c772abd
Include fips header file in err_all.c if needed.
2011-02-03 16:03:21 +00:00
Dr. Stephen Henson
65041aa27e
Add FIPS error codes.
2011-02-03 15:58:43 +00:00
Dr. Stephen Henson
7dbbd4b357
add -stripcr option to copy.pl from 0.9.8
2011-02-03 14:57:51 +00:00
Dr. Stephen Henson
544c84b720
Add Windows FIPS build utilities.
2011-02-03 14:20:59 +00:00
Dr. Stephen Henson
65847ca378
For now disable EC_GFp_nistp224_method() for WIN32 so the WIN32 build
...
completes without linker errors.
2011-02-03 13:00:08 +00:00
Dr. Stephen Henson
53f7633739
Add FIPS support to mkdef.pl script, update ordinals.
2011-02-03 12:59:01 +00:00
Dr. Stephen Henson
c2a459315a
Use single X931 key generation source file for FIPS and non-FIPS builds.
2011-02-03 12:47:56 +00:00
Bodo Möller
e2b798c8b3
Assorted bugfixes:
...
- safestack macro changes for C++ were incomplete
- RLE decompression boundary case
- SSL 2.0 key arg length check
Submitted by: Google (Adam Langley, Neel Mehta, Bodo Moeller)
2011-02-03 12:03:51 +00:00
Bodo Möller
9bda745876
fix omissions
2011-02-03 11:13:29 +00:00
Bodo Möller
88f2a4cf9c
CVE-2010-4180 fix (from OpenSSL_1_0_0-stable)
2011-02-03 10:43:00 +00:00
Bodo Möller
9d0397e977
make update
2011-02-03 10:17:53 +00:00
Bodo Möller
2440d8b1db
Fix error codes.
2011-02-03 10:03:23 +00:00
Dr. Stephen Henson
ee9884654b
Cope with new DSA2 file format where some p/q only tests are made.
2011-02-02 17:48:03 +00:00
Dr. Stephen Henson
5f885f1ea4
Fix target config errors.
2011-02-02 15:11:40 +00:00
Dr. Stephen Henson
7a4ec19a5f
Make no-asm work in fips mode. Add android platform.
2011-02-02 15:07:13 +00:00
Dr. Stephen Henson
a5b196a22c
Add sign/verify digest API to handle an explicit digest instead of finalising
...
a context.
2011-02-02 14:21:33 +00:00
Dr. Stephen Henson
b6104f9ad8
Remove DSA parameter generation from DSA selftest. It is unnecessary and
...
can be very slow on embedded platforms. Hard code DSA parameters instead.
2011-02-02 14:20:45 +00:00
Dr. Stephen Henson
96d5997f5b
Don't try to set pmd if it is NULL.
2011-02-01 19:15:12 +00:00
Dr. Stephen Henson
92eb4c551d
Add DSA2 support to final algorithm tests: keypair and keyver.
2011-02-01 18:53:48 +00:00
Dr. Stephen Henson
89f63d06f8
Support more DSA2 tests.
2011-02-01 17:54:23 +00:00
Dr. Stephen Henson
2ecc150530
Tolerate mixed case and leading zeroes when comparing.
2011-02-01 17:15:53 +00:00
Dr. Stephen Henson
3c2c4cc5f2
fixes for DSA2 parameter generation
2011-02-01 17:15:19 +00:00
Dr. Stephen Henson
5eedacc904
update README.FIPS
2011-02-01 17:14:07 +00:00
Dr. Stephen Henson
7f64c26588
Since FIPS 186-3 specifies we use the leftmost bits of the digest
...
we shouldn't reject digest lengths larger than SHA256: the FIPS
algorithm tests include SHA384 and SHA512 tests.
2011-02-01 12:52:01 +00:00
Dr. Stephen Henson
3dd9b31dc4
Provisional, experimental support for DSA2 parameter generation algorithm.
...
Not properly integrated or tested yet.
2011-01-31 19:44:09 +00:00
Dr. Stephen Henson
eb164d0b12
stop warnings about no previous prototype when compiling shared engines
2011-01-30 01:30:48 +00:00
Dr. Stephen Henson
225c272193
Fix shared build for fips
2011-01-30 01:14:34 +00:00
Dr. Stephen Henson
9fdb2cc592
Add fips option into Configure, disable endian code for no-asm and FIPS.
...
Make shared library default for fips.
2011-01-30 00:01:09 +00:00
Dr. Stephen Henson
cc8bd54569
add fiplibdir and basedir options to Configure
2011-01-29 23:45:02 +00:00
Dr. Stephen Henson
0c02a37548
use different default fips install directory
2011-01-29 23:05:15 +00:00
Dr. Stephen Henson
166c9cb0b8
update version to 2.0
2011-01-29 21:51:59 +00:00
Dr. Stephen Henson
5084af288d
typo
2011-01-29 21:45:04 +00:00
Dr. Stephen Henson
7e23e857f6
don't descend fips directory if not in fips mode
2011-01-29 21:39:33 +00:00
Dr. Stephen Henson
44f54a130b
Add preliminary FIPS information.
2011-01-29 17:05:25 +00:00
Dr. Stephen Henson
7edfe67456
Move all FIPSAPI renames into fips.h header file, include early in
...
crypto.h if needed.
Modify source tree to handle change.
2011-01-27 19:10:56 +00:00
Dr. Stephen Henson
d8ad2e6112
add .cvsignore
2011-01-27 18:11:36 +00:00
Dr. Stephen Henson
1097bde192
add FIPS API malloc/free
2011-01-27 18:09:05 +00:00
Dr. Stephen Henson
7cc684f4f7
Redirect FIPS memory allocation to FIPS_malloc() routine, remove
...
OpenSSL malloc dependencies.
2011-01-27 17:23:43 +00:00
Dr. Stephen Henson
e36d6b8f79
add fips_dsatest.c file
2011-01-27 16:52:49 +00:00
Dr. Stephen Henson
aa87945f47
Update source files to handle new FIPS_lock() location. Add FIPS_lock()
...
definition. Remove stale function references from fips.h
2011-01-27 15:57:31 +00:00
Dr. Stephen Henson
7c8ced94c3
Change OPENSSL_FIPSEVP to OPENSSL_FIPSAPI as it doesn't just refer
...
to EVP any more.
Move locking #define into fips.h.
Set FIPS locking callbacks at same time as OpenSSL locking callbacks.
2011-01-27 15:22:26 +00:00
Dr. Stephen Henson
d5df1b3f0d
Include thread ID code in fips module.
2011-01-27 14:50:41 +00:00
Dr. Stephen Henson
6ff9c48811
New FIPS_lock() function for minimal FIPS locking API: to avoid dependencies
...
on OpenSSL locking code. Use API in some internal FIPS files.
Remove redundant ENGINE defines from fips.h
2011-01-27 14:29:48 +00:00
Dr. Stephen Henson
ad6019d6c0
Move locking and thread ID functions into new files lock.c and thr_id.c,
...
redirect locking to minimal FIPS_lock() function where required.
2011-01-27 14:27:24 +00:00
Dr. Stephen Henson
a27de7b7fd
use FIPSEVP in some bn and rsa files
2011-01-27 14:24:42 +00:00
Dr. Stephen Henson
54e02a234c
update .cvsignore
2011-01-27 13:33:47 +00:00
Dr. Stephen Henson
879bd6e38c
Internal version of BN_mod_inverse allowing checking of no-inverse without
...
need to inspect error queue.
2011-01-26 16:59:47 +00:00
Dr. Stephen Henson
6f1a3a310c
FIPS changes to test/Makefile: rules to build FIPS test applications.
2011-01-26 16:47:51 +00:00
Dr. Stephen Henson
6f4b3e7c09
Use ARX in crypto/Makefile
2011-01-26 16:22:03 +00:00
Dr. Stephen Henson
6dff52e858
FIPS HMAC changes:
...
Use EVP macros.
Use tiny EVP in FIPS mode.
2011-01-26 16:15:38 +00:00
Dr. Stephen Henson
df6de39fe7
Change AR to ARX to allow exclusion of fips object modules
2011-01-26 16:08:08 +00:00
Dr. Stephen Henson
5ca9cb7cbd
FIPS mode ERR changes. Redirect errors to tiny FIPS callbacks to avoid ERR
...
library dependencies.
2011-01-26 15:53:07 +00:00
Dr. Stephen Henson
83c3410b94
FIPS DH changes: selftest checks and key range checks.
2011-01-26 15:47:19 +00:00
Dr. Stephen Henson
20818e00fd
FIPS mode DSA changes:
...
Check for selftest failures.
Pairwise consistency test for RSA key generation.
Use some EVP macros instead of EVP functions.
Use minimal FIPS EVP where needed.
Key size restrictions.
2011-01-26 15:46:26 +00:00
Dr. Stephen Henson
c553721e8b
FIPS mode RSA changes:
...
Check for selftest failures.
Pairwise consistency test for RSA key generation.
Use some EVP macros instead of EVP functions.
Use minimal FIPS EVP where needed.
2011-01-26 15:37:41 +00:00
Dr. Stephen Henson
1588a3cae7
add new RAND errors
2011-01-26 15:33:51 +00:00
Dr. Stephen Henson
7a4bd34a4f
FIPS mode EVP changes:
...
Set EVP_CIPH_FLAG_FIPS on approved ciphers.
Support "default ASN1" flag which avoids need for ASN1 dependencies in FIPS
code.
Include some defines to redirect operations to a "tiny EVP" implementation
in some FIPS source files.
Change m_sha1.c to use EVP_PKEY_NULL_method: the EVP_MD sign/verify functions
are not used in OpenSSL 1.0 and later for SHA1 and SHA2 ciphers: the EVP_PKEY
API is used instead.
2011-01-26 15:25:33 +00:00
Dr. Stephen Henson
4ead4e5241
FIPS mode changes to make RNG compile (this will need updating later as we
...
need a whole new PRNG for FIPS).
1. avoid use of ERR_peek().
2. If compiling with FIPS use small FIPS EVP and disable ENGINE
2011-01-26 14:52:04 +00:00
Dr. Stephen Henson
1ab2f7f1cb
Add fipscanisterbuild configuration option and update Makefile.org: doesn't compile yet
2011-01-26 12:31:30 +00:00
Dr. Stephen Henson
9bafd8f7b3
FIPS_allow_md5() no longer exists and is no longer required
2011-01-26 12:23:58 +00:00
Richard Levitte
373048395e
Add rsa_crpt
2011-01-26 06:51:35 +00:00
Dr. Stephen Henson
3d6a8954f8
update mkerr.pl for use fips directory, add arx.pl script
2011-01-26 01:35:07 +00:00
Dr. Stephen Henson
c11845a4ab
add fips_premain.c.sha1
2011-01-26 01:15:54 +00:00
Dr. Stephen Henson
ec3657f81f
add fips_sha1_selftest.c
2011-01-26 01:11:12 +00:00
Dr. Stephen Henson
d69c6653ef
add fips/sha files
2011-01-26 01:09:52 +00:00
Dr. Stephen Henson
aaff7a0464
add fips/aes/Makefile
2011-01-26 01:05:48 +00:00
Dr. Stephen Henson
1d44454d6d
add fips/des/Makefile
2011-01-26 01:04:53 +00:00
Dr. Stephen Henson
5d3bfb9066
add fips/Makefile
2011-01-26 01:03:54 +00:00
Dr. Stephen Henson
aeb8996c38
add some missing fips files
2011-01-26 00:58:09 +00:00
Dr. Stephen Henson
2b4b28dc32
And so it begins... again.
...
Initial FIPS 140-2 code ported to HEAD. Doesn't even compile yet, may have
missing files, extraneous files and other nastiness.
In other words: it's experimental ATM, OK?
2011-01-26 00:56:19 +00:00
Dr. Stephen Henson
72a267331a
Move RSA encryption functions to new file crypto/rsa/rsa_crpt.c to separate
...
crypto and ENGINE dependencies in RSA library.
2011-01-25 17:35:10 +00:00
Dr. Stephen Henson
13a5519208
Move BN_options function to bn_print.c to remove dependency for BIO printf
...
routines from bn_lib.c
2011-01-25 17:10:30 +00:00
Dr. Stephen Henson
f7a2afa652
Move DSA_sign, DSA_verify to dsa_asn1.c and include separate versions of
...
DSA_SIG_new() and DSA_SIG_free() to remove ASN1 dependencies from DSA_do_sign()
and DSA_do_verify().
2011-01-25 16:55:15 +00:00
Dr. Stephen Henson
245a7eee17
recalculate DSA signature if r or s is zero (FIPS 186-3 requirement)
2011-01-25 16:01:29 +00:00
Dr. Stephen Henson
6e0375d504
revert Makefile change
2011-01-25 12:15:10 +00:00
Dr. Stephen Henson
7d05edd12e
PR: 2433
...
Submitted by: Chris Wilson <chris@qwirx.com >
Reviewed by: steve
Constify ASN1_STRING_set_default_mask_asc().
2011-01-24 16:19:52 +00:00
Dr. Stephen Henson
fef1c40bf1
New function EC_KEY_set_affine_coordinates() this performs all the
...
NIST PKV tests.
2011-01-24 16:07:40 +00:00
Dr. Stephen Henson
a428ac4750
check EC public key isn't point at infinity
2011-01-24 15:04:34 +00:00
Dr. Stephen Henson
0aa1aedbce
PR: 1612
...
Submitted by: Robert Jackson <robert@rjsweb.net >
Reviewed by: steve
Fix EC_POINT_cmp function for case where b but not a is the point at infinity.
2011-01-24 14:41:34 +00:00
Dr. Stephen Henson
dd616752a1
oops, revert mistakenly committed EC changes
2011-01-19 14:42:42 +00:00
Dr. Stephen Henson
198ce9a611
Add additional parameter to dsa_builtin_paramgen to output the generated
...
seed to: this doesn't introduce any binary compatibility issues as the
function is only used internally.
The seed output is needed for FIPS 140-2 algorithm testing: the functionality
used to be in DSA_generate_parameters_ex() but was removed in OpenSSL 1.0.0
2011-01-19 14:35:53 +00:00
Dr. Stephen Henson
78c4572296
add va_list version of ERR_add_error_data
2011-01-14 15:13:37 +00:00
Dr. Stephen Henson
d3f17e5ed3
stop warning with no-engine
2011-01-13 15:41:58 +00:00
Richard Levitte
ff66ff0a9b
PR: 2425
...
Synchronise VMS build with Unixly build.
2011-01-10 20:55:21 +00:00
Ben Laurie
105d62cbf1
Constify.
2011-01-09 17:50:18 +00:00
Ben Laurie
c13d7c0296
Fix warning.
2011-01-09 17:50:06 +00:00
Dr. Stephen Henson
114f511f17
missed change in ACKNOWLEDGEMENTS file
2011-01-09 13:37:09 +00:00
Dr. Stephen Henson
778b14b72d
move some string utilities to buf_str.c to reduce some dependencies (from 0.9.8 branch).
2011-01-09 13:32:57 +00:00
Dr. Stephen Henson
7b1a04519f
add X9.31 prime generation routines from 0.9.8 branch
2011-01-09 13:02:14 +00:00
Richard Levitte
5b301b2fe3
PR: 2407
...
Fix fault include.
Submitted by Arpadffy Zoltan <Zoltan.Arpadffy@scientificgames.se >
2011-01-06 20:56:02 +00:00
Dr. Stephen Henson
722521594c
Don't use decryption_failed alert for TLS v1.1 or later.
2011-01-04 19:39:27 +00:00
Dr. Stephen Henson
a47577164c
Since DTLS 1.0 is based on TLS 1.1 we should never return a decryption_failed
...
alert.
2011-01-04 19:34:20 +00:00
Dr. Stephen Henson
09d84e03e8
oops missed an assert
2011-01-03 12:54:08 +00:00
Dr. Stephen Henson
85881c1d92
PR: 2411
...
Submitted by: Rob Austein <sra@hactrn.net >
Reviewed by: steve
Fix corner cases in RFC3779 code.
2011-01-03 01:40:53 +00:00
Dr. Stephen Henson
968062b7d3
Fix escaping code for string printing. If *any* escaping is enabled we
...
must escape the escape character itself (backslash).
2011-01-03 01:31:24 +00:00
Dr. Stephen Henson
e82f75577b
PR: 2410
...
Submitted by: Rob Austein <sra@hactrn.net >
Reviewed by: steve
Use OPENSSL_assert() instead of assert().
2011-01-03 01:22:41 +00:00
Dr. Stephen Henson
88ea810e25
PR: 2413
...
Submitted by: Michael Bergandi <mbergandi@gmail.com >
Reviewed by: steve
Fix typo in crypto/bio/bss_dgram.c
2011-01-03 01:07:35 +00:00
Dr. Stephen Henson
2b3936e882
avoid verification loops in trusted store when path building
2010-12-25 20:45:59 +00:00
Richard Levitte
c596b2ab5b
Part of the IF structure didn't get pasted here...
...
PR: 2393
2010-12-14 21:44:31 +00:00
Andy Polyakov
c329c6bac7
e_capi.c: rearrange #include-s to improve portability.
...
PR: 2394
2010-12-14 20:39:17 +00:00
Richard Levitte
b7ef916c38
First attempt at adding the possibility to set the pointer size for the builds on VMS.
...
PR: 2393
2010-12-14 19:19:04 +00:00
Dr. Stephen Henson
d7d5a55d22
Support routines for ASN1 scanning function, doesn't do much yet.
2010-12-13 18:15:28 +00:00
Andy Polyakov
cc4c230653
e_capi.c: change from ANSI to TCHAR domain. This makes it compilable on
...
Windows CE/Mobile, yet keeps it normal Windows loop.
PR: 2350
2010-12-12 20:26:09 +00:00
Andy Polyakov
de3bb266f4
apps/x590.c: harmonize usage of STDout and out_err.
...
PR: 2323
2010-12-12 10:52:56 +00:00
Andy Polyakov
05e4fbf801
bss_file.c: refine UTF8 logic.
...
PR: 2382
2010-12-11 14:53:14 +00:00
Dr. Stephen Henson
ef3026a325
ignore leading null fields
2010-12-03 19:31:34 +00:00
Dr. Stephen Henson
420ce9eb98
update FAQ
2010-12-02 19:55:56 +00:00
Dr. Stephen Henson
73334e8da1
PR: 2386
...
Submitted by: Stefan Birrer <stefan.birrer@adnovum.ch >
Reviewed by: steve
Correct SKM_ASN1_SET_OF_d2i macro.
2010-12-02 18:02:29 +00:00
Dr. Stephen Henson
6f413ef406
fix doc typos
2010-12-02 13:44:53 +00:00
Dr. Stephen Henson
85171f83b8
use right version this time in FAQ
2010-12-02 00:08:12 +00:00
Dr. Stephen Henson
a550d351fc
update FAQ
2010-12-02 00:01:44 +00:00
Andy Polyakov
cbecd29a27
Configure: make -mno-cygwin optional on mingw platforms.
...
PR: 2381
2010-11-30 22:18:02 +00:00
Dr. Stephen Henson
09c1dc850c
PR: 2385
...
Submitted by: Stefan Birrer <stefan.birrer@adnovum.ch >
Reviewed by: steve
Zero key->pkey.ptr after it is freed so the structure can be reused.
2010-11-30 19:37:21 +00:00
Richard Levitte
4585fd0734
Better method for creating SSLROOT:.
...
Make sure to include the path to evptest.txt.
2010-11-29 22:27:15 +00:00
Andy Polyakov
e3c1854b0c
TABLE update.
2010-11-29 21:17:54 +00:00
Andy Polyakov
e822c756b6
s390x assembler pack: adapt for -m31 build, see commentary in Configure
...
for more details.
2010-11-29 20:52:43 +00:00
Dr. Stephen Henson
300b1d76fe
apply J-PKAKE fix to HEAD (original by Ben)
2010-11-29 18:32:05 +00:00
Dr. Stephen Henson
ae3fff5034
Some of the MS_STATIC use in crypto/evp is a legacy from the days when
...
EVP_MD_CTX was much larger: it isn't needed anymore.
2010-11-27 17:37:03 +00:00
Dr. Stephen Henson
d0205686bb
PR: 2240
...
Submitted by: Jack Lloyd <lloyd@randombit.net >, "Mounir IDRASSI" <mounir.idrassi@idrix.net >, steve
Reviewed by: steve
As required by RFC4492 an absent supported points format by a server is
not an error: it should be treated as equivalent to an extension only
containing uncompressed.
2010-11-25 12:27:09 +00:00
Dr. Stephen Henson
290be870d6
using_ecc doesn't just apply to TLSv1
2010-11-25 11:51:31 +00:00
Dr. Stephen Henson
fa71cc7bce
fix typo in HMAC redirection, add HMAC INIT tracing
2010-11-24 19:14:59 +00:00
Dr. Stephen Henson
e77906b9fa
VERY EXPERIMENTAL HMAC redirection example in OpenSSL ENGINE. Untested at this
...
stage and probably wont work properly.
2010-11-24 18:32:06 +00:00
Dr. Stephen Henson
f830c68f4d
add "missing" functions to copy EVP_PKEY_METHOD and examine info
2010-11-24 16:08:20 +00:00
Dr. Stephen Henson
6f678c4081
oops, revert invalid change
2010-11-24 14:03:25 +00:00
Dr. Stephen Henson
e9be051f3a
use generalise mac API for SSL key generation
2010-11-24 13:16:59 +00:00
Dr. Stephen Henson
46fc96d4ba
constify EVP_PKEY_new_mac_key()
2010-11-24 13:13:49 +00:00
Andy Polyakov
da64e0d898
INSTALL.W32: document trouble with symlinks under MSYS.
...
PR: 2377
2010-11-23 22:56:45 +00:00
Richard Levitte
88868c0786
Use the same directory for architecture dependent header files as in
...
the branches OpenSSL-1_0_0-stable and OpenSSL-1_0_1-stable.
2010-11-23 02:43:20 +00:00
Richard Levitte
c5ef4bb49a
Implement bc test strategy as submitted by Steven M. Schweda <sms@antinode.info>.
...
Make sure we move to '__here' before trying to use it to build local sslroot:
2010-11-23 02:12:07 +00:00
Richard Levitte
01bfc480c6
Print openssl version information at the end of the tests
2010-11-23 01:06:08 +00:00
Richard Levitte
2631a0210e
Give the architecture dependent directory higher priority
2010-11-23 01:05:26 +00:00
Richard Levitte
feb592bcc9
Don't define an empty CFLAGS, it's much more honest not to defined it at all.
...
Make sure to remove any [.CRYTO]BUILDINF.H so it doesn't get used instead of
[.''ARCH'.CRYPTO]BUILDINF.H
2010-11-23 01:03:18 +00:00
Richard Levitte
fbd7d524be
* tests.com: Add the symbol openssl_conf, so the openssl application
...
stops complaining about a missing configuration file. Define the logical
name PERL_ENV_TABLES with values to Perl considers the DCL symbol table
as part of the environment (see 'man perlvms' for details), so cms-test.pl
can get the value of EXE_DIR from tests.com, among others.
* cms-test.pl: Make changes to have it work on VMS as well. Upper or mixed
case options need to be quoted and the openssl command needs a VMS-specific
treatment. It all should work properly on Unix, I hope it does on Windows
as well...
2010-11-22 23:42:45 +00:00
Richard Levitte
d5dfa7cd82
Better way to build tests. Taken from OpenSSL-1_0_1-stable
2010-11-22 22:17:23 +00:00
Richard Levitte
c8f0610d99
Synchronise with Unix and do all other needed modifications to have it
...
build on VMS again.
2010-11-22 22:04:41 +00:00
Andy Polyakov
dd128715a2
s390x.S: fix typo in bn_mul_words.
...
PR: 2380
2010-11-22 21:55:07 +00:00
Richard Levitte
ec44f0ebfa
Taken from OpenSSL_1_0_0-stable:
...
Include proper header files for time functions.
Submitted by Arpadffy Zoltan <Zoltan.Arpadffy@scientificgames.se >
2010-11-22 18:25:04 +00:00
Dr. Stephen Henson
6377953816
add pice of PR#2295 not committed to HEAD
2010-11-22 16:14:56 +00:00
Dr. Stephen Henson
e322fa2872
PR: 2376
...
Submitted by: Guenter <lists@gknw.net >
Reviewed by: steve
Cleanup alloca use, fix Win32 target for OpenWatcom.
2010-11-19 00:12:01 +00:00
Dr. Stephen Henson
9ac0708f37
PR: 2375
...
Submitted by: Guenter <lists@gknw.net >
Reviewed by: steve
cleanup/fix e_aep.c for OpenWatcom
2010-11-18 23:00:02 +00:00
Dr. Stephen Henson
6b02f9fafb
PR: 2374
...
Submitted by: Guenter <lists@gknw.net >
Reviewed by: steve
Don't compile capi ENGINE on mingw32
2010-11-18 22:57:02 +00:00
Richard Levitte
4878ad687f
Tell the user what test is being performed.
2010-11-18 22:46:46 +00:00
Richard Levitte
908df4d0f7
We expect these scripts not to bail on error, so make sure that's what happens.
2010-11-18 22:44:48 +00:00
Richard Levitte
6c1982c5ce
Synchronise with Unix tests
2010-11-18 22:36:16 +00:00
Richard Levitte
40844c9f68
We redid the structure on architecture dependent source files, but
...
apparently forgot to adapt the copying to the installation directory.
2010-11-18 20:03:07 +00:00
Dr. Stephen Henson
b71f815f6b
remove duplicate statement
2010-11-18 17:33:17 +00:00
Dr. Stephen Henson
833ebea189
compile cts128.c on VMS
2010-11-18 17:04:18 +00:00
Dr. Stephen Henson
91f0828c95
fix no SIGALRM case in speed.c
2010-11-18 13:22:53 +00:00
Dr. Stephen Henson
70a5f5f9ab
PR: 2372
...
Submitted by: "W.C.A. Wijngaards" <wouter@nlnetlabs.nl >
Reviewed by: steve
Fix OpenBSD compilation failure.
2010-11-18 12:30:01 +00:00
Dr. Stephen Henson
ac7797a722
oops, reinstate TLSv1 string
2010-11-17 18:17:08 +00:00
Dr. Stephen Henson
7d5686d355
Don't assume a decode error if session tlsext_ecpointformatlist is not NULL: it can be legitimately set elsewhere.
2010-11-17 17:37:23 +00:00
Dr. Stephen Henson
732d31beee
bring HEAD up to date, add CVE-2010-3864 fix, update NEWS files
2010-11-16 14:18:51 +00:00
Dr. Stephen Henson
f7d2f17a07
add TLS v1.1 options to s_server
2010-11-16 14:16:00 +00:00
Dr. Stephen Henson
ad889de097
If EVP_PKEY structure contains an ENGINE the key is ENGINE specific and
...
we should use its method instead of any generic one.
2010-11-16 12:11:46 +00:00
Dr. Stephen Henson
e15320f652
Only use explicit IV if cipher is in CBC mode.
2010-11-14 17:47:45 +00:00
Dr. Stephen Henson
e827b58711
Get correct GOST private key instead of just assuming the last one is
...
correct: this isn't always true if we have more than one certificate.
2010-11-14 13:50:55 +00:00
Dr. Stephen Henson
80f0bcbabb
preliminary acknowledgments file
2010-11-12 20:06:05 +00:00
Dr. Stephen Henson
eba2b51d9e
Submitted By: Bogdan Harjoc <harjoc@gmail.com>
...
Add missing debug WIN64 targets.
2010-11-11 15:21:45 +00:00
Dr. Stephen Henson
838ea7f824
PR: 2366
...
Submitted by: Damien Miller <djm@mindrot.org >
Reviewed by: steve
Stop pkeyutl crashing if some arguments are missing. Also make str2fmt
tolerate NULL parameter.
2010-11-11 14:42:50 +00:00
Dr. Stephen Henson
da7b0b2261
Submitted by: Jonathan Dixon <joth@chromium.org>
...
Reviewed by: steve
If store is NULL set flags correctly.
2010-11-02 15:58:58 +00:00
Andy Polyakov
beee17c428
Configure: update mips[32|64]_asm lines.
2010-10-22 20:18:15 +00:00
Andy Polyakov
c242dda4a4
sha512-mips.pl: add missing 64-bit byte swap.
2010-10-22 20:16:22 +00:00
Andy Polyakov
bb55003882
Add aes-mips.pl assembler module.
2010-10-21 15:56:55 +00:00
Andy Polyakov
ca32ceb773
sha512-mips.pl: fix "little-endian" typos.
2010-10-21 15:56:24 +00:00
Dr. Stephen Henson
776654adff
PR: 2295
...
Submitted by: Alexei Khlebnikov <alexei.khlebnikov@opera.com >
Reviewed by: steve
OOM checking. Leak in OOM fix. Fall-through comment. Duplicate code
elimination.
2010-10-11 23:49:22 +00:00
Andy Polyakov
d6522548dd
x86_64-xlate.pl: fix LNK4078 and LNK4210 link warnings.
...
PR 2356
2010-10-10 21:07:55 +00:00
Dr. Stephen Henson
e49af2ac38
move CHANGES entry to correct place
2010-10-10 12:24:13 +00:00
Dr. Stephen Henson
5759425810
PR: 2314
...
Submitted by: Mounir IDRASSI <mounir.idrassi@idrix.net >
Reviewed by: steve
Fix for double free bug in ssl/s3_clnt.c CVE-2010-2939
2010-10-10 12:15:47 +00:00
Dr. Stephen Henson
983768997e
We can't always read 6 bytes in an OCSP response: fix so error statuses
...
are read correctly for non-blocking I/O.
2010-10-06 18:00:59 +00:00
Dr. Stephen Henson
8ec3fa0597
fix signature printing routines
2010-10-04 13:58:41 +00:00
Dr. Stephen Henson
0c7246ed4b
fix warnings
2010-10-04 13:45:15 +00:00
Dr. Stephen Henson
7e0de9e8a6
Minor documentation fixes, PR#2345
2010-10-04 13:28:46 +00:00
Dr. Stephen Henson
0d638dc1f6
Minor documentation fixes, PR#2344
2010-10-04 13:23:53 +00:00
Dr. Stephen Henson
c17171c625
Typo, PR#2346
2010-10-04 13:19:28 +00:00
Dr. Stephen Henson
39239280f3
Add call to ENGINE_register_all_complete() to ENGINE_load_builtin_engines(),
...
this means that some implementations will be used automatically, e.g. aesni,
we do this for cryptodev anyway.
Setup cpuid in ENGINE_load_builtin_engines() too as some ENGINEs use it.
2010-10-03 18:58:09 +00:00
Andy Polyakov
5ad83922ca
sha512-mips.pl: add missing byte swap for little-endians.
2010-10-02 12:43:04 +00:00
Andy Polyakov
d466588788
MIPS assembler pack: enable it in Configure, add SHA2 module, fix make rules,
...
update commentary...
2010-10-02 11:47:17 +00:00
Andy Polyakov
da4d239dad
Add unified mips.pl, which will replace mips3.s.
2010-09-27 21:19:43 +00:00
Andy Polyakov
0985473636
sha1-mips.pl, mips-mont.pl: unify MIPS assembler modules in respect to
...
ABI and binutils.
2010-09-22 08:43:09 +00:00
Andy Polyakov
8986e37249
ghash-s390x.pl: reschedule instructions for better performance.
2010-09-21 11:37:00 +00:00
Andy Polyakov
90ba3a28f8
s390x assembler pack: extend OPENSSL_s390xcap_P to 128 bits.
2010-09-18 08:46:53 +00:00
Andy Polyakov
bc9092f726
VC-32.pl: default to nasm if neither nasm or nasmw is is found at the moment.
...
PR: 2338
2010-09-13 16:15:17 +00:00
Andy Polyakov
f8927c89d0
Alpha assembler pack: adapt for Linux.
...
PR: 2335
2010-09-13 13:28:52 +00:00
Andy Polyakov
3739a772e9
sha1-armv4-large.pl: more readable input pickup.
2010-09-10 15:41:08 +00:00
Andy Polyakov
c504f0a921
Configure: remove redundant -DMD32_REG_T=int.
2010-09-10 15:37:50 +00:00
Andy Polyakov
6415dd7b2f
crypto/ppc[cpuid|cap]: call CPU detection once and detect AltiVec.
2010-09-10 15:00:51 +00:00
Andy Polyakov
dd4a0af370
crypto/bn/asm/s390x.S: drop redundant instructions.
2010-09-10 14:53:36 +00:00
Andy Polyakov
7d1f55e9d9
Add ghash-s390x.pl.
2010-09-10 14:50:17 +00:00
Andy Polyakov
d52d5ad147
modes/asm/ghash-*.pl: switch to [more reproducible] performance results
...
collected with 'apps/openssl speed ghash'.
2010-09-05 19:52:14 +00:00
Andy Polyakov
a3b0c44b1b
ghash-ia64.pl: 50% performance improvement of gcm_ghash_4bit.
2010-09-05 19:49:54 +00:00
Andy Polyakov
4b2603e46c
sparcv9cap.c: disengange Solaris-specific CPU detection routine in favour
...
of unified procedure relying on SIGILL.
PR: 2321
2010-09-05 19:41:41 +00:00
Ben Laurie
bf48836c7c
Fixes to NPN from Adam Langley.
2010-09-05 17:14:01 +00:00
Ben Laurie
d9a268b9f9
NPN tests.
2010-09-05 16:35:10 +00:00
Ben Laurie
5df2a2497a
Fix warnings.
2010-09-05 16:34:49 +00:00
Dr. Stephen Henson
4ed7b78b56
make no-gost work on Windows
2010-09-02 17:45:23 +00:00
Dr. Stephen Henson
2ec4ccee1f
fix bug in AES_unwrap()
2010-08-30 23:59:14 +00:00
Bodo Möller
396cb5657b
More C language police work.
2010-08-27 13:17:59 +00:00
Bodo Möller
eb8ef241eb
C conformity fixes: Move declarations before statements in all blocks.
2010-08-27 12:07:35 +00:00
Bodo Möller
1b5af90b45
C conformity fixes:
...
- Move declarations before statements in all blocks.
- Where 64-bit type is required, use it explicitly (not 1l).
2010-08-27 11:29:30 +00:00
Dr. Stephen Henson
bdd5350804
PR: 1833
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix other cases not covered by original patch.
2010-08-27 11:29:15 +00:00
Bodo Möller
7b3a9b0099
Update version numbers
2010-08-26 18:45:45 +00:00
Bodo Möller
7c2d4fee25
For better forward-security support, add functions
...
SSL_[CTX_]set_not_resumable_session_callback.
Submitted by: Emilia Kasper (Google)
[A part of this change affecting ssl/s3_lib.c was accidentally commited
separately, together with a compilation fix for that file;
see s3_lib.c CVS revision 1.133 (http://cvs.openssl.org/chngview?cn=19855 ).]
2010-08-26 15:15:47 +00:00
Bodo Möller
f16176dab4
Patch from PR #1833 was broken: there's no s->s3->new_session
...
(only s->new_session).
2010-08-26 14:54:16 +00:00
Bodo Möller
76af94eb27
(formatting error)
2010-08-26 14:40:11 +00:00
Bodo Möller
04daec862c
New 64-bit optimized implementation EC_GFp_nistp224_method().
...
This will only be compiled in if explicitly requested
(#ifdef EC_NISTP224_64_GCC_128).
Submitted by: Emilia Kasper (Google)
2010-08-26 14:29:55 +00:00
Dr. Stephen Henson
d3bb63fc68
sync and update ordinals
2010-08-26 14:27:17 +00:00
Dr. Stephen Henson
44959ee456
PR: 1833
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Support for abbreviated handshakes when renegotiating.
2010-08-26 14:23:52 +00:00
Bodo Möller
c94f7f657b
ECC library bugfixes.
...
Submitted by: Emilia Kasper (Google)
2010-08-26 12:11:01 +00:00
Bodo Möller
173350bcca
Harmonize with OpenSSL_1_0_1-stable version of CHANGES.
2010-08-26 11:22:33 +00:00
Andy Polyakov
1e024f05b2
util/cygwin.sh: maintainer's update.
...
Submitted by: Corinna Vinschen
2010-08-24 21:51:08 +00:00
Andy Polyakov
f2c88f5282
engine/Makefile: harmonize engine install rule for .dylib extension on MacOS X.
...
PR: 2319
2010-08-24 21:45:41 +00:00
Andy Polyakov
836ea45350
gcm128.c: fix typo in CRYPTO_gcm128_encrypt_ctr32 name.
2010-08-23 14:32:20 +00:00
Andy Polyakov
72f421934a
Makefile.share: fix brown-bag typo in link_o.darwin.
2010-08-21 11:34:46 +00:00
Andy Polyakov
3fdd168ffc
crypto/modes/Makefile: fix typo in ghash-parisc.s rule.
2010-08-21 11:20:25 +00:00
Dr. Stephen Henson
0b789adc67
PR: 2315
...
Use consistent calculation for PSS salt length.
2010-08-10 13:01:49 +00:00
Andy Polyakov
33d9c8348a
sha1-armv4-large.pl: reschedule instructions for dual-issue pipeline.
2010-08-03 15:34:57 +00:00
Andy Polyakov
dbe3611bbd
rc5_locl.h: make inline assembler clang-friendly.
2010-08-02 21:51:07 +00:00
Andy Polyakov
f71c6aceeb
gcm128.c: add CRYPTO_gcm128_[en|de]crypt_ctr32.
2010-08-02 21:39:51 +00:00
Andy Polyakov
30ab7af242
md32_common.h: modify MD32_REG_T pre-processing logic [triggered by clang].
2010-08-02 09:32:26 +00:00
Dr. Stephen Henson
2948fbab3a
Fix ctr mode properly this time....
2010-07-28 16:53:28 +00:00
Dr. Stephen Henson
081464fa14
Make ctr mode behaviour consistent with other modes.
2010-07-28 11:03:09 +00:00
Ben Laurie
ee2ffc2794
Add Next Protocol Negotiation.
2010-07-28 10:06:55 +00:00
Andy Polyakov
b122e482f9
alphacpuid.pl: fix brown-bag bug.
2010-07-28 08:17:15 +00:00
Ben Laurie
3c530fef67
Sign mismatch.
2010-07-27 16:57:05 +00:00
Ben Laurie
a7a6aade9d
Missing prototype.
2010-07-27 16:34:29 +00:00
Andy Polyakov
20d171377f
aes-x86_64.pl: commit#19797 was overzealous, partially reverse.
2010-07-26 22:56:07 +00:00
Andy Polyakov
149b18078e
Replace alphacpuid.s with alphacpuid.pl to ensure it makes to release tar-balls.
...
PR: 2309
2010-07-26 22:04:31 +00:00
Andy Polyakov
39438ff6e2
ms/: update do_win64*.bat and remove redundant mingw32.bat.
2010-07-26 21:58:23 +00:00
Andy Polyakov
d5fe8c3459
sha1-alpha.pl: commentary update.
2010-07-26 21:57:10 +00:00
Andy Polyakov
6219d2c294
rc4-s390x.pl: harmonize build rule with other similar rules.
2010-07-26 21:56:16 +00:00
Andy Polyakov
85e28dfa6f
ghash-ia64.pl: excuse myself from implementing "528B" variant.
2010-07-26 21:54:21 +00:00
Andy Polyakov
6559b40df0
modes/Makefile: update clean rule.
2010-07-26 21:53:01 +00:00
Andy Polyakov
3d85668ba2
eng_aesni.c: switch to CRYPTO_ctr128_encrypt_ctr32.
2010-07-26 21:50:39 +00:00
Andy Polyakov
058d83cfe9
aes-x86_64.pl: remove redundant instructions.
2010-07-26 21:48:39 +00:00
Andy Polyakov
a9e790b95a
perlasm/x86_64-xlate.pl: extend SSE>2 to ml64.
2010-07-26 21:45:38 +00:00
Andy Polyakov
02f358da49
aesni-x86_64.pl: fix typos.
2010-07-26 21:44:03 +00:00
Andy Polyakov
133a7f9a50
perlasm/x86asm.pl: move aesni and pclmulqdq opcodes to aesni-x86.pl and
...
ghash-x86.pl.
2010-07-26 21:42:07 +00:00
Dr. Stephen Henson
eb1c48be6f
Add new type ossl_ssize_t instead of ssize_t and move definitions to
...
e_os2.h, this should fix WIN32 compilation issues and hopefully avoid
conflicts with other headers which may workaround ssize_t in different ways.
2010-07-26 18:15:59 +00:00
Dr. Stephen Henson
2fd9664b0b
#if out deleted function from headers so it isn't picked up by WIN32 build
...
system.
2010-07-26 18:15:13 +00:00
Dr. Stephen Henson
aa763c0f6d
WIN32 build fix.
2010-07-26 13:17:17 +00:00
Dr. Stephen Henson
75a96dd059
Sync ordinals and update.
2010-07-25 19:13:30 +00:00
Dr. Stephen Henson
843b5a250a
Update symhacks.
2010-07-25 19:12:45 +00:00
Dr. Stephen Henson
18f3385dea
Add modes.h and cmac to WIN32 build system.
2010-07-25 18:12:44 +00:00
Andy Polyakov
d7d119a3c9
aesni-x86[_64].pl: fine-tune, add CCM subroutine, add performance data.
2010-07-25 15:17:01 +00:00
Dr. Stephen Henson
223c59eae5
Fix WIN32 build system to correctly link ENGINE DLLs contained in a
...
directory: currently the GOST ENGINE is the only case.
2010-07-24 17:52:43 +00:00
Dr. Stephen Henson
7bbd0de88d
Add call to ENGINE_register_all_complete() to ENGINE_load_builtin_engines(),
...
this means that some implementations will be used automatically, e.g. aesni,
we do this for cryptodev anyway.
Setup cpuid in ENGINE_load_builtin_engines() too as some ENGINEs use it.
2010-07-21 16:14:48 +00:00
Dr. Stephen Henson
f96ccf36ff
PR: 1830
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >, Steve Henson
Support for RFC5705 key extractor.
2010-07-18 17:43:18 +00:00
Dr. Stephen Henson
b9e7793dd7
oops, revert wrong patch..
2010-07-18 17:43:01 +00:00
Dr. Stephen Henson
d135da5192
Fix warnings (From HEAD, original patch by Ben).
2010-07-18 16:52:47 +00:00
Andy Polyakov
75db4b2f7b
Makefile.shared: link_o.darwin comment update.
2010-07-16 08:15:28 +00:00
Andy Polyakov
b730b03f2f
Configure: suppress $multilib with non-system $prefix.
...
PR: 2307
2010-07-16 08:13:39 +00:00
Andy Polyakov
1dc02bbaf5
Makefile.shared: debugging line slipped through in previous commit.
2010-07-15 13:55:38 +00:00
Andy Polyakov
cad6650f52
Makefile.shared: update link_o.dawrin rule.
...
PR: 2306
2010-07-15 13:53:23 +00:00
Andy Polyakov
26064d7f77
aes-s390x.pl: revisit buffer allocation and add performance data.
2010-07-14 08:43:38 +00:00
Andy Polyakov
c981086d40
sha1-armv4-large.pl: add performance data for Cortex A8 core.
2010-07-13 14:11:44 +00:00
Andy Polyakov
2d22e08083
ARM assembler pack: reschedule instructions for dual-issue pipeline.
...
Modest improvement coefficients mean that code already had some
parallelism and there was not very much room for improvement. Special
thanks to Ted Krovetz for benchmarking the code with such patience.
2010-07-13 14:03:31 +00:00
Dr. Stephen Henson
0852f90c30
PR: 2297
...
Submitted by: Antony, Benoy <bantony@ebay.com >
Approved by: steve@openssl.org
Fix bug in AES wrap code when t > 0xff.
2010-07-09 17:26:04 +00:00
Andy Polyakov
2765001610
Configure: fix aes_ctr.o regexp.
2010-07-09 16:19:41 +00:00
Andy Polyakov
653215a127
INSTALL.W32: mention _OPENSSL_isservice().
...
PR: 2194
2010-07-09 14:30:54 +00:00
Andy Polyakov
6acb4ff389
gcm128.c: API modification and readability improvements,
...
add ghash benchmark to apps/speed.c.
2010-07-09 14:10:51 +00:00
Andy Polyakov
874a3757af
Rework framework for assembler support for AES counter mode and add
...
AES_ctr32_encrypt to aes-s390x.pl.
2010-07-09 12:21:52 +00:00
Andy Polyakov
1cbdca7bf2
Harmonize s390x assembler modules with "catch-all" rules from commit#19749.
2010-07-09 12:11:12 +00:00
Andy Polyakov
e216cd6ee9
armv4-mont.pl: addenum to previous commit#19749.
2010-07-08 15:06:01 +00:00
Andy Polyakov
396df7311e
crypto/*/Makefile: unify "catch-all" assembler make rules and harmonize
...
ARM assembler modules.
2010-07-08 15:03:42 +00:00
Andy Polyakov
f04f3873f8
rand_nw.c: compensate for gcc bug (using %edx instead of %eax at -O3).
...
PR: 2296
2010-07-08 09:14:00 +00:00
Andy Polyakov
df72970951
PROBLEMS: MacOS X is not necessarily a problem anymore.
2010-07-08 09:00:00 +00:00
Andy Polyakov
7c5889bf7a
sparcv9cap.c: reiterate CPU detection logic.
2010-07-08 07:47:35 +00:00
Dr. Stephen Henson
dc53a037b0
i variable is used on some platforms
2010-07-05 11:05:24 +00:00
Andy Polyakov
acbcc271b1
ghash-armv4.pl: excuse myself from implementing "528B" flavour.
2010-07-02 08:14:12 +00:00
Andy Polyakov
b28750877c
ghash-sparcv9.pl: fix Makefile rule and add performance data for T1.
2010-07-02 08:09:30 +00:00
Andy Polyakov
d9218e11e2
crypto/sparc*: eliminate _sparcv9_rdwrasi.
2010-07-02 08:06:56 +00:00
Andy Polyakov
c32fcca6f4
SPARCv9 assembler pack: refine CPU detection on Linux, fix for "unaligned
...
opcodes detected in executable segment" error.
2010-07-01 07:34:56 +00:00
Dr. Stephen Henson
9674de7d3d
no need for empty fragments with TLS 1.1 and later due to explicit IV
2010-06-27 14:43:03 +00:00
Dr. Stephen Henson
a7c64928c8
clarify comment
2010-06-16 13:15:31 +00:00
Ben Laurie
c8bbd98a2b
Fix warnings.
2010-06-12 14:13:23 +00:00
Andy Polyakov
57ae37a003
VC-32.pl: fix /Fd name generation.
...
PR: 2284
2010-06-09 15:48:25 +00:00
Andy Polyakov
d364506a24
ghash-x86_64.pl: "528B" variant delivers further >30% improvement.
2010-06-09 15:05:59 +00:00
Andy Polyakov
04e2b793d6
ghash-x86.pl: commentary updates.
2010-06-09 15:05:14 +00:00
Andy Polyakov
8525950e7e
ghash-x86.pl: "528B" variant of gcm_ghash_4bit_mmx gives 20-40%
...
improvement.
2010-06-04 13:21:01 +00:00
Andy Polyakov
d08eae1bda
x86 perlasm: add support for 16-bit values.
2010-06-04 13:13:18 +00:00
Dr. Stephen Henson
e8107c35b1
update FAQ
2010-06-01 15:23:21 +00:00
Dr. Stephen Henson
3cbb15ee81
add CVE-2010-0742 and CVS-2010-1633 fixes
2010-06-01 14:39:01 +00:00
Andy Polyakov
2d060267b1
VC-32.pl: unconditionally generate symbols.pdb.
2010-06-01 06:02:47 +00:00
Andy Polyakov
f9a152bd90
x86_64-xlate.pl: refine mingw support and regexps, update commentary.
2010-06-01 05:56:24 +00:00
Andy Polyakov
af9fafdbd1
Configure: update mingw config-lines.
2010-06-01 05:52:39 +00:00
Dr. Stephen Henson
eadfa019b3
fix PR#2261 in a different way
2010-05-31 13:18:21 +00:00
Dr. Stephen Henson
9799937510
PR: 2278
...
Submitted By: Mattias Ellert <mattias.ellert@fysast.uu.se >
Fix type checking macro SKM_ASN1_SET_OF_i2d
2010-05-29 12:49:20 +00:00
Dr. Stephen Henson
417a24dba5
update NEWS
2010-05-27 15:05:30 +00:00
Dr. Stephen Henson
4e96633ac7
PR: 2262
...
Submitted By: Victor Wagner <vitus@cryptocom.ru >
Fix error reporting in load_key function.
2010-05-27 14:09:03 +00:00
Dr. Stephen Henson
77cf9e09b0
PR: 2261
...
Submitted By: De Rudder, Stephen L." <s_derudder@tditx.com >
Workaround for newer Windows headers which define EADDRINUSE but not to the
same value as WSAEADDRINUSE.
2010-05-27 13:07:22 +00:00
Dr. Stephen Henson
cb877ccb35
PR: 2258
...
Submitted By: Ger Hobbelt <ger@hobbelt.com >
Base64 BIO fixes:
Use OPENSSL_assert() instead of assert().
Use memmove() as buffers overlap.
Fix write retry logic.
2010-05-27 12:41:05 +00:00
Dr. Stephen Henson
3d4fc82c0e
PR: 2266
...
Submitted By: Jonathan Gray <jsg@goblin.cx >
Correct ioctl definitions.
2010-05-26 23:23:34 +00:00
Andy Polyakov
e747f4d418
gcm128.c: P.-M. Hager has tipped about possibility to fold reductions
...
in gcm_ghash_4bit. Taking the idea a step further I've added extra
256+16 bytes of per-key storage, so that one can speak about 3rd variant
in addition to "256B" and "4KB": "528B" one. Commonly it should be
~50% faster than "256B" implementation or ~25% slower than "4KB" one.
2010-05-26 21:36:36 +00:00
Dr. Stephen Henson
19a45b8d47
Avoid use of ex_data free function in Chil ENGINE so it can be safely
...
reloaded.
2010-05-26 16:17:16 +00:00
Andy Polyakov
07e29c1234
ghash-x86.pl: MMX optimization (+20-40%) and commentary update.
2010-05-23 12:37:01 +00:00
Andy Polyakov
fb2d5a91e9
gcm128.c: commentary update.
2010-05-23 12:35:41 +00:00
Dr. Stephen Henson
ae7c67cace
PR: 2254
...
Submitted by: Ger Hobbelt <ger@hobbelt.com >
Approved by: steve@openssl.org
Check for <= 0 i2d return value.
2010-05-22 00:40:38 +00:00
Dr. Stephen Henson
ca96d38981
PR: 2251
...
Submitted by: Ger Hobbelt <ger@hobbelt.com >
Approved by: steve@openssl.org
Memleak, BIO chain leak and realloc checks in v3_pci.c
2010-05-22 00:30:41 +00:00
Dr. Stephen Henson
9f08866940
Stop compiler complaining in pedantic mode: may be a better way to do this...
2010-05-22 00:20:42 +00:00
Dr. Stephen Henson
aa6d91e85b
oops, typo
2010-05-20 17:36:05 +00:00
Dr. Stephen Henson
fdce8a355f
Update cms-test.pl to handle some Unix like Windows environments where
...
calling shlib_wrap.sh doesn't work.
2010-05-20 17:28:37 +00:00
Dr. Stephen Henson
7837c7ec45
PR: 2259
...
Submitted By: Artem Chuprina <ran@cryptocom.ru >
Check return values of HMAC in tls_P_hash and tls1_generate_key_block.
Although the previous version could in theory crash that would only happen if a
digest call failed. The standard software methods can never fail and only one
ENGINE currently uses digests and it is not compiled in by default.
2010-05-17 11:27:22 +00:00
Dr. Stephen Henson
acf635b9b2
oops, revert test patch
2010-05-15 00:35:39 +00:00
Dr. Stephen Henson
19674b5a1d
PR: 2253
...
Submitted By: Ger Hobbelt <ger@hobbelt.com >
Check callback return value when outputting errors.
2010-05-15 00:34:06 +00:00
Dr. Stephen Henson
e855d538de
PR: 2255
...
Submitted By: Ger Hobbelt <ger@hobbelt.com >
Place RSA dependent variable under #ifndef OPENSSL_NO_RSA
2010-05-15 00:19:44 +00:00
Andy Polyakov
629fd3aa91
rc4-x86_64.pl: "Westmere" optimization.
2010-05-13 21:01:24 +00:00
Andy Polyakov
1aa8a6297c
ghash-x86[_64].pl: add due credit.
2010-05-13 17:21:52 +00:00
Andy Polyakov
c1f092d14e
GCM "jumbo" update:
...
- gcm128.c: support for Intel PCLMULQDQ, readability improvements;
- asm/ghash-x86.pl: splitted vanilla, MMX, PCLMULQDQ subroutines;
- asm/ghash-x86_64.pl: add PCLMULQDQ implementations.
2010-05-13 15:32:43 +00:00
Andy Polyakov
ea7239cf15
x86asm.pl: consistency imrovements.
2010-05-13 15:28:07 +00:00
Andy Polyakov
046ea30864
x86_64-xlate.pl: refine some regexp's and add support for OWORD/QWORD PTR.
2010-05-13 15:26:46 +00:00
Andy Polyakov
3efe51a407
Revert previous Linux-specific/centric commit#19629. If it really has to
...
be done, it's definitely not the way to do it. So far answer to the
question was to ./config -Wa,--noexecstack (adopted by RedHat).
2010-05-05 22:05:39 +00:00
Ben Laurie
0e3ef596e5
Non-executable stack in asm.
2010-05-05 15:50:13 +00:00
Andy Polyakov
f472ec8c2f
"Jumbo" update for crypto/modes:
...
- introduce common modes_lcl.h;
- ctr128.c: implement additional CRYPTO_ctr128_encrypt_ctr32 interface;
- gcm128.c: add omitted ARM initialization, remove ctx.ctr;
2010-05-04 19:23:02 +00:00
Andy Polyakov
8a682556b4
Add ghash-armv4.pl.
2010-05-03 18:23:29 +00:00
Dr. Stephen Henson
827f3d5f39
PR: 2252
...
Submitted By: Ger Hobbelt <ger@hobbelt.com >
Update docs to BIO_f_buffer()
2010-05-03 15:30:07 +00:00
Dr. Stephen Henson
6006ae148c
PR: 2230
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix bug in bitmask macros and stop warnings.
2010-05-03 13:01:40 +00:00
Dr. Stephen Henson
efcf5f1c50
PR: 2244
...
Submitted By: "PMHager" <hager@dortmund.net >
Initialise pkey callback to 0.
2010-05-03 12:50:36 +00:00
Dr. Stephen Henson
a033c3c72b
PR: 2250
...
Submitted By: Ger Hobbelt <ger@hobbelt.com >
Don't overwrite return value with strlen(f).
2010-05-03 12:24:01 +00:00
Dr. Stephen Henson
359b0c9fb8
experimental function to convert ASN1_TIME to tm, not used or even compiled in yet
2010-05-03 12:17:44 +00:00
Ben Laurie
19f7e5e24a
Missing declarations, no assembler in PEDANTIC.
2010-05-01 14:41:25 +00:00
Andy Polyakov
bb92e2c89b
bss_file.c: refine UTF-8 logic on Windows.
2010-04-28 20:02:28 +00:00
Andy Polyakov
5e19ee96f6
Add ghash-parisc.pl.
2010-04-28 18:51:45 +00:00
Andy Polyakov
8a1c92ce49
Take gcm128.c and ghash assembler modules into the build loop.
2010-04-22 21:36:26 +00:00
Andy Polyakov
d183244b43
bss_file.c: reserve for option to encode file name with UTF-8.
2010-04-21 20:38:21 +00:00
Andy Polyakov
5e60dba84f
md5-ia64.S: fix assembler warning.
2010-04-20 20:40:46 +00:00
Dr. Stephen Henson
9a8a7d58af
PR: 2241
...
Submitted By: Artemy Lebedev <vagran.ast@gmail.com >
Typo.
2010-04-20 12:53:18 +00:00
Dr. Stephen Henson
1bf508c9cf
new function to diff tm structures
2010-04-15 13:25:26 +00:00
Dr. Stephen Henson
799668c1ce
oops revert patch not part of Configure diff
2010-04-15 13:24:20 +00:00
Dr. Stephen Henson
7f7f155103
oops, commit Configure part of PR#2234
2010-04-15 13:17:15 +00:00
Dr. Stephen Henson
45078e6c52
PR: 2234
...
Submitted By: Matthias Andree <matthias.andree@gmx.de >
Use correct path to openssl utility in c_rehash script.
2010-04-14 23:07:12 +00:00
Dr. Stephen Henson
d7f573fea6
PR: 2235
...
Submitted By: Bruce Stephens <bruce.stephens@isode.com >
Make ts/Makefile consistent with other Makefiles.
2010-04-14 23:04:12 +00:00
Andy Polyakov
1fd79f66ea
x86_64cpuid.pl: ml64 is allergic to db on label line.
2010-04-14 19:24:48 +00:00
Andy Polyakov
4f39edbff1
gcm128.c and assembler modules: change argument order for gcm_ghash_4bit.
...
ghash-x86*.pl: fix performance numbers for Core2, as it turned out
previous ones were "tainted" by variable clock frequency.
2010-04-14 19:04:51 +00:00
Dr. Stephen Henson
8decc967dc
update FAQ
2010-04-14 13:21:21 +00:00
Andy Polyakov
6a1823b371
[co]fb128.c: fix "n=0" bug.
2010-04-14 07:47:28 +00:00
Dr. Stephen Henson
45106caab7
fix signed/unsigned comparison warnings
2010-04-14 00:41:14 +00:00
Dr. Stephen Henson
5d1a50ac2a
fix bug in ccgost CFB mode code
2010-04-14 00:33:06 +00:00
Dr. Stephen Henson
af73b08ac0
check ASN1 type before using it
2010-04-14 00:30:32 +00:00
Dr. Stephen Henson
934e22e814
PR: 2230
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix various DTLS fragment reassembly bugs.
2010-04-14 00:17:55 +00:00
Dr. Stephen Henson
3122d1d382
PR: 2229
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Don't drop DTLS connection if mac or decryption failed.
2010-04-14 00:10:05 +00:00
Dr. Stephen Henson
b7463c8818
PR: 2228
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix DTLS buffer record MAC failure bug.
2010-04-14 00:03:27 +00:00
Andy Polyakov
109757d254
aes-ppc.pl: 10% performance improvement on Power6.
2010-04-10 14:53:17 +00:00
Andy Polyakov
49535cc409
AESNI engine: update test_aesni.
2010-04-10 14:07:40 +00:00
Andy Polyakov
a595baff9f
gcm128.c: commentary and formatting updates.
2010-04-10 14:02:26 +00:00
Andy Polyakov
67a315b60b
cts128.c: add support for NIST "Ciphertext Stealing" proposal.
2010-04-10 14:01:02 +00:00
Andy Polyakov
6c83629bd9
AESNI engine: add counter mode.
2010-04-10 13:56:59 +00:00
Andy Polyakov
fead253986
perlasm/x86*: add support to SSE>2 and pclmulqdq. x86_64-xlate.pl provides
...
correct solution to problem addressed in committ #19244 .
2010-04-10 13:55:05 +00:00
Andy Polyakov
9a649f3b46
sha1-alpha.pl: addenum till commit #19547 .
2010-04-10 13:51:20 +00:00
Andy Polyakov
f62df694ad
ctr129.c: fix typo, simplify ctr128_inc and fix "n=0" bug.
2010-04-10 13:46:53 +00:00
Andy Polyakov
42feba4797
Add ghash-alpha.pl assembler module.
2010-04-10 13:44:20 +00:00
Andy Polyakov
3c01a1e89e
sha1-alpha.pl: engage it in build.
2010-04-10 13:43:26 +00:00
Andy Polyakov
6a79b3cb93
sparccpuid.S: some assembler is allergic to apostrophes in comments.
2010-04-10 13:36:34 +00:00
Andy Polyakov
d23f4e9d5a
alpha-mont.pl: comply with stack alignment requirements.
2010-04-10 13:33:04 +00:00
Dr. Stephen Henson
172f6b2d62
make GOST MAC work again
2010-04-08 10:55:04 +00:00
Dr. Stephen Henson
c0b8eb606f
Add SHA2 algorithms to SSL_library_init(). Although these aren't used
...
directly by SSL/TLS SHA2 certificates are becoming more common and
applications that only call SSL_library_init() and not
OpenSSL_add_all_alrgorithms() will fail when verifying certificates.
Update docs.
2010-04-07 13:18:07 +00:00
Dr. Stephen Henson
d4a45bf31a
Remove obsolete PRNG note. Add comment about use of SHA256 et al.
2010-04-06 15:03:27 +00:00
Dr. Stephen Henson
60e24554bb
PR: 2209
...
Submitted Daniel Mentz <danielml@sent.com >
Documentation typo.
2010-04-06 14:45:18 +00:00
Dr. Stephen Henson
ff12f88b8e
PR: 2218
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fixes for DTLS replay bug.
2010-04-06 12:45:04 +00:00
Dr. Stephen Henson
47e6a60e42
PR: 2219
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fixes for DTLS buffering bug.
2010-04-06 12:40:19 +00:00
Dr. Stephen Henson
87a37cbadd
PR: 2223
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fixes for DTLS timeout bug
2010-04-06 12:29:31 +00:00
Dr. Stephen Henson
00a37b5a9b
PR: 2220
...
Fixes to make OpenSSL compile with no-rc4
2010-04-06 11:18:59 +00:00
Dr. Stephen Henson
bc494872b8
fix FAQ (again)
2010-03-31 11:50:30 +00:00
Dr. Stephen Henson
4b0771c146
update FAQ
2010-03-30 16:43:51 +00:00
Dr. Stephen Henson
a1a80e0786
fix FAQ
2010-03-30 16:36:59 +00:00
Dr. Stephen Henson
1676bec94c
update FAQ
2010-03-30 16:35:41 +00:00
Dr. Stephen Henson
c25a0aae6b
update FAQ
2010-03-30 16:24:53 +00:00
Dr. Stephen Henson
46bdf0f34d
update HEAD FAQ
2010-03-30 00:49:36 +00:00
Andy Polyakov
471d0eb397
cryptlib.c: allow application to override OPENSSL_isservice.
...
PR: 2194
2010-03-29 10:06:01 +00:00
Andy Polyakov
97a6a01f0f
ARMv4 assembler: fix compilation failure. Fix is actually unconfirmed, but
...
I can't think of any other cause for failure
2010-03-29 09:55:19 +00:00
Andy Polyakov
2a460c1aa8
dso_dlfcn.c: fix compile failure on Tru64.
2010-03-29 09:50:02 +00:00
Dr. Stephen Henson
216811b216
PR: 1696
...
Check return value if d2i_PBEPARAM().
2010-03-28 00:42:38 +00:00
Dr. Stephen Henson
3ac75e21a1
PR: 1763
...
Remove useless num = 0 assignment.
Remove redundant cases on sock_ctrl(): default case handles them.
2010-03-27 23:28:09 +00:00
Dr. Stephen Henson
14021cb821
sync ordinals with 1.0.0
2010-03-27 19:32:11 +00:00
Dr. Stephen Henson
08df41277a
PR: 1904
...
Submitted by: David Woodhouse <dwmw2@infradead.org >
Pass passphrase minimum length down to UI.
2010-03-27 19:31:55 +00:00
Dr. Stephen Henson
ac495542a6
PR: 1813
...
Submitted by: Torsten Hilbrich <torsten.hilbrich@secunet.com >
Fix memory leak when engine name cannot be loaded.
2010-03-27 18:28:02 +00:00
Dr. Stephen Henson
085e5f4859
update FAQ
2010-03-25 12:08:19 +00:00
Bodo Möller
3e8b6485b3
Fix for "Record of death" vulnerability CVE-2010-0740.
...
Also, add missing CHANGES entry for CVE-2009-3245 (code changes submitted to this branch on 23 Feb 2010),
and further harmonize this version of CHANGES with the versions in the current branches.
2010-03-25 11:25:30 +00:00
Dr. Stephen Henson
f2e8488b85
initialise buf if wrong_info not used
2010-03-24 23:42:05 +00:00
Dr. Stephen Henson
a3a06e6543
PR: 1731 and maybe 2197
...
Clear error queue in a few places in SSL code where errors are expected
so they don't stay in the queue.
2010-03-24 23:17:15 +00:00
Andy Polyakov
26c00de46d
rand_win.c: fix logical bug in readscreen.
2010-03-22 22:44:22 +00:00
Andy Polyakov
3dd303129f
bss_file.c: fix MSC 6.0 warning.
2010-03-22 22:38:56 +00:00
Andy Polyakov
c3473126b1
GHASH assembler: new ghash-sparcv9.pl module and saner descriptions.
2010-03-22 17:24:18 +00:00
Andy Polyakov
82f385d71d
e_capi.c: fix typo.
2010-03-15 22:28:48 +00:00
Andy Polyakov
f2fccce4bd
Fix UPLINK typo.
2010-03-15 22:25:57 +00:00
Andy Polyakov
480cd6ab6e
ghash-ia64.pl: new file, GHASH for Itanium.
...
ghash-x86_64.pl: minimize stack frame usage.
ghash-x86.pl: modulo-scheduling MMX loop in respect to input vector
results in up to 10% performance improvement.
2010-03-15 19:07:52 +00:00
Dr. Stephen Henson
6c6bdd543d
workaround for missing definition in some headers
2010-03-15 13:10:08 +00:00
Dr. Stephen Henson
e19f6678f5
print signature parameters with CRLs too
2010-03-14 13:10:48 +00:00
Dr. Stephen Henson
624fbfcadb
free up sigopts STACK
2010-03-14 13:09:00 +00:00
Dr. Stephen Henson
510777f2fc
clear bogus errors in ca utility
2010-03-14 13:07:48 +00:00
Dr. Stephen Henson
be449448dc
update CHANGES
2010-03-14 12:55:15 +00:00
Dr. Stephen Henson
4c623cddbe
add -sigopt option to ca utility
2010-03-14 12:54:45 +00:00
Dr. Stephen Henson
8d207ee3d1
add X509_CRL_sign_ctx function
2010-03-14 12:52:38 +00:00
Dr. Stephen Henson
cdb182b55a
new sigopt and PSS support for req and x509 utilities
2010-03-12 14:41:00 +00:00
Dr. Stephen Henson
00947cea0c
PR: 2192
...
Submitted By: Jaroslav Imrich <jaroslav.imrich@disig.sk >
The prompt_info and wrong_info parameters can be empty strings which
can produce confusing prompts. Treat empty string same as NULL.
2010-03-12 12:48:32 +00:00
Dr. Stephen Henson
e45c32fabf
missing goto meant signature was never printed out
2010-03-12 12:06:48 +00:00
Mark J. Cox
fb75f349b7
This entry was in 0.9.8m changelog but missing from here, since it's
...
security relevent we'd better list it.
2010-03-12 08:36:44 +00:00
Dr. Stephen Henson
a907165250
Submitted by: Martin Kaiser
...
Reject PSS signatures with unsupported trailer value.
2010-03-11 23:11:36 +00:00
Dr. Stephen Henson
e62774c3b9
alg2 can be NULL
2010-03-11 19:27:03 +00:00
Andy Polyakov
f093794e55
Add GHASH x86_64 assembler.
2010-03-11 16:19:46 +00:00
Dr. Stephen Henson
f26cf9957f
typo
2010-03-11 14:19:46 +00:00
Dr. Stephen Henson
17c63d1cca
RSA PSS ASN1 signing method
2010-03-11 14:06:46 +00:00
Dr. Stephen Henson
877669d69c
typo
2010-03-11 14:04:54 +00:00
Dr. Stephen Henson
1c8d92997d
ctrl operations to retrieve RSA algorithm settings
2010-03-11 13:55:18 +00:00
Dr. Stephen Henson
bf8883b351
Add support for new PSS functions in RSA EVP_PKEY_METHOD
2010-03-11 13:45:42 +00:00
Dr. Stephen Henson
e8254d406f
Extend PSS padding code to support different digests for MGF1 and message.
2010-03-11 13:40:42 +00:00
Dr. Stephen Henson
85522a074c
Algorithm specific ASN1 signing functions.
2010-03-11 13:32:38 +00:00
Dr. Stephen Henson
31d66c2a98
update cms code to use X509_ALGOR_set_md instead of internal function
2010-03-11 13:29:39 +00:00
Dr. Stephen Henson
ce25c7207b
New function X509_ALGOR_set_md() to set X509_ALGOR (DigestAlgorithmIdentifier)
...
from a digest algorithm.
2010-03-11 13:27:05 +00:00
Dr. Stephen Henson
77163b6234
don't leave bogus errors in the queue
2010-03-10 13:48:09 +00:00
Andy Polyakov
e3a510f8a6
Add GHASH x86 assembler.
2010-03-09 23:03:33 +00:00
Dr. Stephen Henson
b17bdc7734
PR: 2188
...
Submitted By: Jaroslav Imrich <jaroslav.imrich@disig.sk >
Add "missing" functions to get and set prompt constructor.
2010-03-09 17:24:33 +00:00
Dr. Stephen Henson
a0e4a8e10a
PR: 2186
...
Submitted By: "Joel Rabinovitch" <Joel.Rabinovitch@tecsys.com >
Detect aix64-gcc
2010-03-09 17:08:48 +00:00
Dr. Stephen Henson
d6eebf6d8a
reserve a few more bits for future cipher modes
2010-03-08 23:48:21 +00:00
Andy Polyakov
2262beef2e
gcm128.c: add option for streamed GHASH, simple benchmark, minor naming
...
change.
2010-03-08 22:44:37 +00:00
Dr. Stephen Henson
31904ecdf3
RSA PSS verification support including certificates and certificate
...
requests. Add new ASN1 signature initialisation function to handle this
case.
2010-03-08 18:10:35 +00:00
Dr. Stephen Henson
a4d9c12f99
correct error code
2010-03-08 18:07:05 +00:00
Dr. Stephen Henson
809cd0a22d
print outermost signature algorithm parameters too
2010-03-07 17:02:47 +00:00
Dr. Stephen Henson
bea29921a8
oops
2010-03-07 16:41:54 +00:00
Dr. Stephen Henson
7ed485bc9f
The OID sanity check was incorrect. It should only disallow *leading* 0x80
...
values.
2010-03-07 16:40:05 +00:00
Dr. Stephen Henson
069d4cfea5
although AES is a variable length cipher, AES EVP methods have a fixed key length
2010-03-07 15:54:26 +00:00
Dr. Stephen Henson
49436b59b5
oops, make EVP ctr mode work again
2010-03-07 15:52:41 +00:00
Dr. Stephen Henson
9ef6fe8c2e
typo
2010-03-07 15:37:37 +00:00
Dr. Stephen Henson
63b825c9d4
add separate PSS decode function, rename PSS parameters to RSA_PSS_PARAMS
2010-03-07 13:34:51 +00:00
Dr. Stephen Henson
77f4b6ba4f
add MGF1 digest ctrl
2010-03-07 13:34:15 +00:00
Dr. Stephen Henson
a5667732b9
update ASN1 sign/verify to use EVP_DigestSign and EVP_DigestVerify
2010-03-07 12:05:45 +00:00
Dr. Stephen Henson
1708456220
don't add digest alias if signature algorithm is undefined
2010-03-06 20:47:30 +00:00
Dr. Stephen Henson
ff04bbe363
Add PSS algorithm printing. This is an initial step towards full PSS support.
...
Uses ASN1 module in Martin Kaiser's PSS patch.
2010-03-06 19:55:25 +00:00
Dr. Stephen Henson
148924c1f4
fix indent, newline
2010-03-06 18:14:13 +00:00
Dr. Stephen Henson
fa1ba589f3
Add algorithm specific signature printing. An individual ASN1 method can
...
now print out signatures instead of the standard hex dump.
More complex signatures (e.g. PSS) can print out more meaningful information.
Sample DSA version included that prints out the signature parameters r, s.
[Note EVP_PKEY_ASN1_METHOD is an application opaque structure so adding
new fields in the middle has no compatibility issues]
2010-03-06 18:05:05 +00:00
Dr. Stephen Henson
8c4ce7bab2
Fix memory leak: free up ENGINE functional reference if digest is not
...
found in an ENGINE.
2010-03-05 13:33:21 +00:00
Dr. Stephen Henson
bb845ee044
Add -engine_impl option to dgst which will use an implementation of
...
an algorithm from the supplied engine instead of just the default one.
2010-03-05 13:28:21 +00:00
Dr. Stephen Henson
b5cfc2f590
option to replace extensions with new ones: mainly for creating cross-certificates
2010-03-03 20:13:30 +00:00
Dr. Stephen Henson
ebaa2cf5b2
PR: 2183
...
PR#1999 broke fork detection by assuming HAVE_FORK was set for all platforms.
Include original HAVE_FORK detection logic while allowing it to be
overridden on specific platforms with -DHAVE_FORK=1 or -DHAVE_FORK=0
2010-03-03 19:56:34 +00:00
Dr. Stephen Henson
cca1cd9a34
Submitted by: Tomas Hoger <thoger@redhat.com>
...
Fix for CVE-2010-0433 where some kerberos enabled versions of OpenSSL
could be crashed if the relevant tables were not present (e.g. chrooted).
2010-03-03 15:41:18 +00:00
Dr. Stephen Henson
2c772c8700
don't mix definitions and code
2010-03-03 15:30:42 +00:00
Andy Polyakov
e7f5b1cd42
Initial version of Galois Counter Mode implementation. Interface is still
...
subject to change...
2010-03-02 16:33:25 +00:00
Andy Polyakov
80dfadfdf3
ppccap.c: portability fix.
2010-03-02 16:28:29 +00:00
Andy Polyakov
d8c7bd6e11
Fix s390x-specific HOST_l2c|c2l.
...
Submitted by: Andreas Krebbel
2010-03-02 16:23:40 +00:00
Dr. Stephen Henson
f84c85b0e3
PR: 2178
...
Submitted by: "Kennedy, Brendan" <brendan.kennedy@intel.com >
Handle error codes correctly: cryptodev returns 0 for success whereas OpenSSL
returns 1.
2010-03-01 23:54:47 +00:00
Dr. Stephen Henson
a05b8d0ede
use supplied ENGINE in genrsa
2010-03-01 14:22:21 +00:00
Dr. Stephen Henson
ff2fdbf2f8
oops, reinstate correct prototype
2010-03-01 03:01:27 +00:00
Dr. Stephen Henson
da3955256d
'typo'
2010-03-01 01:53:34 +00:00
Dr. Stephen Henson
5e28ccb798
make USE_CRYPTODEV_DIGESTS work
2010-03-01 01:19:18 +00:00
Dr. Stephen Henson
a6575572c6
load cryptodev if HAVE_CRYPTODEV is set too
2010-03-01 00:40:10 +00:00
Dr. Stephen Henson
c3951d8973
update cryptodev to match 1.0.0 stable branch version
2010-03-01 00:37:58 +00:00
Ben Laurie
19ec2f4194
Fix warnings (note that gcc 4.2 has a bug that makes one of its
...
warnings hard to fix without major surgery).
2010-02-28 14:22:56 +00:00
Dr. Stephen Henson
2b13f80360
algorithms field has changed in 1.0.0 and later: update
2010-02-28 00:24:04 +00:00
Dr. Stephen Henson
40c5eaeeec
oops, revert verify.c change
2010-02-27 23:03:26 +00:00
Dr. Stephen Henson
c1ca9d3238
Add Kerberos fix which was in 0.9.8-stable but never committed to HEAD and
...
1.0.0. Original fix was on 2007-Mar-09 and had the log message: "Fix kerberos
ciphersuite bugs introduced with PR:1336."
2010-02-27 23:02:41 +00:00
Dr. Stephen Henson
48435b2098
include TVS 1.1 version string
2010-02-26 19:38:33 +00:00
Dr. Stephen Henson
37c541faed
Revert CFB block length change. Despite what SP800-38a says the input to
...
CFB mode does *not* have to be a multiple of the block length and several
other specifications (e.g. PKCS#11) do not require this.
2010-02-26 14:41:58 +00:00
Dr. Stephen Henson
0f776277bc
oops, use correct date
2010-02-26 12:13:36 +00:00
Dr. Stephen Henson
5814d829e6
update NEWS
2010-02-25 18:20:30 +00:00
Dr. Stephen Henson
f6bb465f87
update FAQ
2010-02-25 18:18:46 +00:00
Dr. Stephen Henson
db28aa86e0
add -trusted_first option and verify flag
2010-02-25 12:21:48 +00:00
Dr. Stephen Henson
2da2ff5065
tidy verify code. xn not used any more and check for self signed more efficiently
2010-02-25 11:18:26 +00:00
Dr. Stephen Henson
fbd2164044
Experimental support for partial chain verification: if an intermediate
...
certificate is explicitly trusted (using -addtrust option to x509 utility
for example) the verification is sucessful even if the chain is not complete.
2010-02-25 00:17:22 +00:00
Dr. Stephen Henson
04e4b82726
allow setting of verify names in command line utilities and print out verify names in verify utility
2010-02-25 00:11:32 +00:00
Dr. Stephen Henson
9b3d75706e
verify parameter enumeration functions
2010-02-25 00:08:23 +00:00
Dr. Stephen Henson
b1efb7161f
Include self-signed flag in certificates by checking SKID/AKID as well
...
as issuer and subject names. Although this is an incompatible change
it should have little impact in pratice because self-issued certificates
that are not self-signed are rarely encountered.
2010-02-25 00:01:38 +00:00
Dr. Stephen Henson
df4c395c6d
add anyExtendedKeyUsage OID
2010-02-24 15:53:58 +00:00
Dr. Stephen Henson
385a488c43
prevent warning
2010-02-24 15:24:19 +00:00
Andy Polyakov
ea746dad5e
Reserve for option to implement AES counter in assembler.
2010-02-23 16:51:24 +00:00
Andy Polyakov
d976f99294
Add AES counter mode to EVP.
2010-02-23 16:48:41 +00:00
Andy Polyakov
e5a4de9e44
Add assigned OIDs, as well as "anonymous" ones for AES counter mode.
2010-02-23 16:47:17 +00:00
Dr. Stephen Henson
7d3d1788a5
The meaning of the X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY and
...
X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT error codes were reversed in
the verify application documentation.
2010-02-23 14:09:09 +00:00
Bodo Möller
2d9dcd4ff0
Always check bn_wexpend() return values for failure (CVE-2009-3245).
...
(The CHANGES entry covers the change from PR #2111 as well, submitted by
Martin Olsson.)
Submitted by: Neel Mehta
2010-02-23 10:36:35 +00:00
Bodo Möller
a839755329
Fix X509_STORE locking
2010-02-19 18:27:07 +00:00
Dr. Stephen Henson
69582a592e
clarify documentation
2010-02-18 12:41:33 +00:00
Dr. Stephen Henson
7512141162
OR default SSL_OP_LEGACY_SERVER_CONNECT so existing options are preserved
2010-02-17 19:43:56 +00:00
Dr. Stephen Henson
c2c49969e2
Allow renegotiation if SSL_OP_LEGACY_SERVER_CONNECT is set as well as
...
initial connection to unpatched servers. There are no additional security
concerns in doing this as clients don't see renegotiation during an
attack anyway.
2010-02-17 18:38:31 +00:00
Dr. Stephen Henson
47e0a1c335
PR: 2100
...
Submitted by: James Baker <jbaker@tableausoftware.com > et al.
Workaround for slow Heap32Next on some versions of Windows.
2010-02-17 14:32:41 +00:00
Dr. Stephen Henson
439aab3afc
Submitted by: Dmitry Ivanov <vonami@gmail.com>
...
Don't leave dangling pointers in GOST engine if calls fail.
2010-02-16 14:30:29 +00:00
Dr. Stephen Henson
8d934c2585
PR: 2171
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Since SSLv2 doesn't support renegotiation at all don't reject it if
legacy renegotiation isn't enabled.
Also can now use SSL2 compatible client hello because RFC5746 supports it.
2010-02-16 14:21:11 +00:00
Dr. Stephen Henson
1458b931eb
The "block length" for CFB mode was incorrectly coded as 1 all the time. It
...
should be the number of feedback bits expressed in bytes. For CFB1 mode set
this to 1 by rounding up to the nearest multiple of 8.
2010-02-15 19:40:16 +00:00
Dr. Stephen Henson
20eb7238cb
Correct ECB mode EVP_CIPHER definition: IV length is 0
2010-02-15 19:26:02 +00:00
Dr. Stephen Henson
79cfc3ac54
add EVP_CIPH_FLAG_LENGTH_BITS from 0.9.8-stable
2010-02-15 19:20:13 +00:00
Dr. Stephen Henson
918a5d04e4
PR: 2164
...
Submitted by: "Noszticzius, Istvan" <inoszticzius@rightnow.com >
Don't clear the output buffer: ciphers should correctly the same input
and output buffers.
2010-02-15 19:00:12 +00:00
Dr. Stephen Henson
f959598866
update references to new RI RFC
2010-02-12 21:59:31 +00:00
Dr. Stephen Henson
5a9e3f05ff
PR: 2170
...
Submitted by: Magnus Lilja <lilja.magnus@gmail.com >
Make -c option in dgst work again.
2010-02-12 17:07:16 +00:00
Dr. Stephen Henson
29e722f031
Fix memory leak in ENGINE autoconfig code. Improve error logging.
2010-02-09 14:17:14 +00:00
Dr. Stephen Henson
05566760da
update year
2010-02-09 14:12:49 +00:00
Dr. Stephen Henson
e3e31ff482
Use supplied ENGINE when initialising CMAC. Restore pctx setting.
2010-02-08 16:31:28 +00:00
Dr. Stephen Henson
bae060c06a
add cvsignore
2010-02-08 15:34:02 +00:00
Dr. Stephen Henson
0ff907caf8
Make update.
2010-02-08 15:33:23 +00:00
Dr. Stephen Henson
c8ef656df2
Make CMAC API similar to HMAC API. Add methods for CMAC.
2010-02-08 15:31:35 +00:00
Dr. Stephen Henson
8c968e0355
Initial experimental CMAC implementation.
2010-02-07 18:01:07 +00:00
Dr. Stephen Henson
cc0661374f
make update
2010-02-07 13:54:30 +00:00
Dr. Stephen Henson
089f02c577
oops, use new value for new flag
2010-02-07 13:50:36 +00:00
Dr. Stephen Henson
c2bf720842
Add missing function EVP_CIPHER_CTX_copy(). Current code uses memcpy() to copy
...
an EVP_CIPHER_CTX structure which may have problems with external ENGINEs
who need to duplicate internal handles etc.
2010-02-07 13:39:39 +00:00
Dr. Stephen Henson
c95bf51167
don't assume 0x is at start of string
2010-02-03 18:19:22 +00:00
Dr. Stephen Henson
2712a2f625
tolerate broken CMS/PKCS7 implementations using signature OID instead of digest
2010-02-02 14:30:39 +00:00
Dr. Stephen Henson
17ebc10ffa
PR: 2161
...
Submitted by: Doug Goldstein <cardoe@gentoo.org >, Steve.
Make no-dsa, no-ecdsa and no-rsa compile again.
2010-02-02 13:35:27 +00:00
Dr. Stephen Henson
434745dc19
PR: 2160
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Make session tickets work with DTLS.
2010-02-01 16:51:09 +00:00
Dr. Stephen Henson
b380f9b884
PR: 2159
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Typo in PR#1949 bug, oops!
2010-02-01 12:43:45 +00:00
Richard Levitte
749af8cb61
Typo.
2010-01-29 12:07:46 +00:00
Richard Levitte
1d62de0395
The previous take went wrong, try again.
2010-01-29 12:02:50 +00:00
Richard Levitte
d7b99700c0
Architecture specific header files need special handling.
2010-01-29 11:44:36 +00:00
Richard Levitte
cd6bc02b29
If opensslconf.h and buildinf.h are to be in an architecture specific
...
directory, place it in the same tree as the other architecture
specific things.
2010-01-29 11:43:50 +00:00
Dr. Stephen Henson
da454e4c67
typo
2010-01-29 00:09:33 +00:00
Dr. Stephen Henson
08c239701b
Experimental renegotiation support in s_server test -www server.
2010-01-28 19:48:36 +00:00
Dr. Stephen Henson
92714455af
In engine_table_select() don't clear out entire error queue: just clear
...
out any we added using ERR_set_mark() and ERR_pop_to_mark() otherwise
errors from other sources (e.g. SSL library) can be wiped.
2010-01-28 17:49:25 +00:00
Dr. Stephen Henson
00b525781b
oops revert test code accidentally committed
2010-01-28 16:48:39 +00:00
Dr. Stephen Henson
891d3c7a60
revert previous change
2010-01-28 14:17:39 +00:00
Dr. Stephen Henson
9fb6fd34f8
reword RI description
2010-01-27 18:53:33 +00:00
Dr. Stephen Henson
c2963f5b87
revert wrongly committed test code
2010-01-27 17:49:33 +00:00
Dr. Stephen Henson
99b36a8c31
update documentation to reflect new renegotiation options
2010-01-27 17:46:24 +00:00
Dr. Stephen Henson
89e56aebef
Some shells print out the directory name if CDPATH is set breaking the
...
pod2man test. Use ./util instead to avoid this.
2010-01-27 16:07:17 +00:00
Dr. Stephen Henson
4ba1aa393b
typo
2010-01-27 14:05:39 +00:00
Dr. Stephen Henson
1e27847d4e
PR: 2157
...
Submitted by: "Green, Paul" <Paul.Green@stratus.com >
Typo.
2010-01-27 12:54:58 +00:00
Richard Levitte
407a410136
Have the VMS build system catch up with the 1.0.0-stable branch.
2010-01-27 09:18:42 +00:00
Richard Levitte
9921f865e4
Apparently, test/testtsa.com was only half done
2010-01-27 01:19:07 +00:00
Richard Levitte
c8c07be883
size_t doesn't compare less than zero...
2010-01-27 01:18:21 +00:00
Dr. Stephen Henson
d5e7f2f2c3
PR: 1949
...
Submitted by: steve@openssl.org
More robust fix and workaround for PR#1949. Don't try to work out if there
is any write pending data as this can be unreliable: always flush.
2010-01-26 19:47:37 +00:00
Dr. Stephen Henson
1bfdbd8e75
PR: 2138
...
Submitted by: Kevin Regan <k.regan@f5.com >
Clear stat structure if -DPURIFY is set to avoid problems on some
platforms which include unitialised fields.
2010-01-26 18:07:26 +00:00
Dr. Stephen Henson
e92f9f45e8
Add flags functions which were added to 0.9.8 for fips but not 1.0.0 and
...
later.
2010-01-26 14:29:06 +00:00
Dr. Stephen Henson
8c02119e39
OPENSSL_isservice is now defined on all platforms not just WIN32
2010-01-26 13:59:32 +00:00
Dr. Stephen Henson
ca9f55f710
export OPENSSL_isservice and make update
2010-01-26 13:52:36 +00:00
Dr. Stephen Henson
58c0da84dd
Typo
2010-01-26 12:30:00 +00:00
Andy Polyakov
964ed94649
parisc-mont.pl: PA-RISC 2.0 code path optimization based on intruction-
...
level profiling data resulted in almost 50% performance improvement.
PA-RISC 1.1 is also reordered in same manner, mostly to be consistent,
as no gain was observed, not on PA-7100LC.
2010-01-25 23:12:00 +00:00
Dr. Stephen Henson
cab6de03a2
PR: 2149
...
Submitted by: Douglas Stebila <douglas@stebila.ca >
Fix wap OIDs.
2010-01-25 16:07:42 +00:00
Richard Levitte
2d851ab919
There's really no need to use $ENV::HOME
2010-01-25 00:22:57 +00:00
Richard Levitte
04dbf0272e
Forgot to correct the definition of __arch in this file.
...
Submitted by Steven M. Schweda <sms@antinode.info >
2010-01-25 00:21:12 +00:00
Richard Levitte
d15dd388c1
It seems like sslroot: needs to be defined for some tests to work.
...
Submitted by Steven M. Schweda <sms@antinode.info >
2010-01-25 00:20:29 +00:00
Richard Levitte
c3502985b2
Compile t1_reneg on VMS as well.
...
Submitted by Steven M. Schweda <sms@antinode.info >
2010-01-25 00:19:31 +00:00
Richard Levitte
6fa0608eaf
A few more macros for long symbols.
...
Submitted by Steven M. Schweda <sms@antinode.info >
2010-01-25 00:18:29 +00:00
Andy Polyakov
3f2a98acbf
ia64cpuid.S: OPENSSL_cleanse to accept zero length parameter.
2010-01-24 17:08:52 +00:00
Dr. Stephen Henson
bc120a54c9
PR: 2153, 2125
...
Submitted by: steve@openssl.org
The original fix for PR#2125 broke compilation on some Unixware platforms:
revert and make conditional on VMS.
2010-01-24 16:57:20 +00:00
Andy Polyakov
82a66ce313
pariscid.pl: OPENSSL_cleanse to compile on PA-RISC 2.0W and to accept zero
...
length parameter.
2010-01-24 15:04:28 +00:00
Andy Polyakov
7676eebf42
OPENSSL_cleanse to accept zero length parameter [matching C implementation].
2010-01-24 14:54:24 +00:00
Dr. Stephen Henson
21a5c040e5
The fix for PR#1949 unfortunately broke cases where the BIO_CTRL_WPENDING
...
ctrl is incorrectly implemented (e.g. some versions of Apache). As a workaround
call both BIO_CTRL_INFO and BIO_CTRL_WPENDING if it returns zero. This should
both address the original bug and retain compatibility with the old behaviour.
2010-01-24 13:54:20 +00:00
Dr. Stephen Henson
ba64ae6cd1
Tolerate PKCS#8 DSA format with negative private key.
2010-01-22 20:17:12 +00:00
Dr. Stephen Henson
3a88efd48c
If legacy renegotiation is not permitted then send a fatal alert if a patched
...
server attempts to renegotiate with an unpatched client.
2010-01-22 18:49:34 +00:00
Dr. Stephen Henson
3243698f1d
typo
2010-01-21 18:46:15 +00:00
Dr. Stephen Henson
55f39a199d
fix comments
2010-01-21 01:17:17 +00:00
Dr. Stephen Henson
49371e3acb
oops
2010-01-20 17:59:53 +00:00
Dr. Stephen Henson
eb125795d2
update NEWS file
2010-01-20 17:56:34 +00:00
Dr. Stephen Henson
3ec5f38b47
Update demo
2010-01-20 14:06:21 +00:00
Dr. Stephen Henson
a70e377fd8
Support -L options in VC++ link.
2010-01-20 14:04:44 +00:00
Andy Polyakov
b3020393f2
rand_win.c: fix time limit logic.
2010-01-19 20:35:22 +00:00
Dr. Stephen Henson
071ef65cfa
The use of NIDs in the password based encryption table can result in
...
algorithms not found when an application uses PKCS#12 and only calls
SSL_library_init() instead of OpenSSL_add_all_algorithms(). Simple
work around is to add the missing algorithm (40 bit RC2) in
SSL_library_init().
2010-01-19 19:56:06 +00:00
Dr. Stephen Henson
d5e8d8b547
PR: 2141
...
Submitted by: "NARUSE, Yui" <naruse@airemix.jp >
Remove non-ASCII comment which causes compilation errors on some versions
of VC++.
2010-01-19 19:28:18 +00:00
Dr. Stephen Henson
0debb681e1
PR: 2144
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Better fix for PR#2144
2010-01-19 19:11:35 +00:00
Andy Polyakov
46c42e78ff
Enable PA-RISC assembler in Configure (feedback from PA-RISC 2.0 is still
...
needed).
2010-01-19 17:10:24 +00:00
Andy Polyakov
ee2b8ed2f5
x86_64-xlate.pl: refine sign extension logic when handling lea.
...
PR: 2094,2095
2010-01-19 16:15:23 +00:00
Andy Polyakov
7a6e0901ff
rand_win.c: handle GetTickCount wrap-around.
2010-01-19 13:48:18 +00:00
Andy Polyakov
91fdacb2c3
s390x assembler update: add support for run-time facility detection.
2010-01-19 12:24:59 +00:00
Andy Polyakov
d582c98d8f
apps/speed.c: limit loop counters to 2^31 in order to avoid overflows
...
in performance calculations. For the moment there is only one code
fast enough to suffer from this: Intel AES-NI engine.
PR: 2096
2010-01-17 17:31:38 +00:00
Andy Polyakov
78a533cb93
Minor updates to ppccap.c and ppccpuid.pl.
2010-01-17 13:44:14 +00:00
Andy Polyakov
4f38565204
bn_lcl.h: add MIPS III-specific BN_UMULT_LOHI as alternative to porting
...
crypto/bn/asm/mips3.s from IRIX. Performance improvement is not as
impressive as with complete assembler, but still... it's almost 2.5x
[on R5000].
2010-01-17 12:08:24 +00:00
Andy Polyakov
4407700c40
ia64-mont.pl: add shorter vector support ("shorter" refers to 512 bits and
...
less).
2010-01-17 11:33:59 +00:00
Dr. Stephen Henson
72a9776abc
PR: 2135
...
Submitted by: Mike Frysinger <vapier@gentoo.org >
Change missed references to lib to $(LIBDIR)
2010-01-16 20:05:59 +00:00
Dr. Stephen Henson
8d39d2800a
PR: 2144
...
Submitted by: steve@openssl.org
Fix DTLS connection so new_session is reset if we read second client hello:
new_session is used to detect renegotiation.
2010-01-16 19:46:10 +00:00
Dr. Stephen Henson
598b562a7f
PR: 2133
...
Submitted by: steve@openssl.org
Add missing DTLS state strings.
2010-01-16 19:20:52 +00:00
Dr. Stephen Henson
dac40f87df
convert to Unix EOL form
2010-01-15 15:26:12 +00:00
Dr. Stephen Henson
031c78901b
make update
2010-01-15 15:24:19 +00:00
Dr. Stephen Henson
ce1ec9c35e
PR: 2125
...
Submitted by: "Alon Bar-Lev" <alon.barlev@gmail.com >
Fix gcc-aix compilation issue.
2010-01-14 17:51:29 +00:00
Dr. Stephen Henson
bd5f21a4ae
Fix version handling so it can cope with a major version >3.
...
Although it will be many years before TLS v2.0 or later appears old versions
of servers have a habit of hanging around for a considerable time so best
if we handle this properly now.
2010-01-13 19:08:02 +00:00
Dr. Stephen Henson
1b31b5ad56
Modify compression code so it avoids using ex_data free functions. This
...
stops applications that call CRYPTO_free_all_ex_data() prematurely leaking
memory.
2010-01-13 18:57:40 +00:00
Dr. Stephen Henson
97438f38df
update and sync ordinals
2010-01-12 17:34:39 +00:00
Dr. Stephen Henson
0e0c6821fa
PR: 2136
...
Submitted by: Willy Weisz <weisz@vcpc.univie.ac.at >
Add options to output hash using older algorithm compatible with OpenSSL
versions before 1.0.0
2010-01-12 17:29:34 +00:00
Dr. Stephen Henson
423c66f10e
Simplify RI+SCSV logic:
...
1. Send SCSV is not renegotiating, never empty RI.
2. Send RI if renegotiating.
2010-01-07 19:04:52 +00:00
Andy Polyakov
74f2260694
ia64-mont.pl: addp4 is not needed when referring to stack (this is 32-bit
...
HP-UX thing).
2010-01-07 15:36:59 +00:00
Andy Polyakov
25d1d62275
http://cvs.openssl.org/chngview?cn=19053 made me wonder if bind() and
...
connect() are as finicky as sendto() when it comes to socket address
length. As it turned out they are, therefore the fix. Note that you
can't reproduce the problem on Linux, it was failing on Solaris,
FreeBSD, most likely on more...
2010-01-07 13:12:30 +00:00
Andy Polyakov
9b5ca55695
sendto is reportedly picky about destination socket address length.
...
PR: 2114
Submitted by: Robin Seggelmann
2010-01-07 10:42:39 +00:00
Andy Polyakov
cba9ffc32a
Fix compilation on older Linux. Linux didn't always have sockaddr_storage,
...
not to mention that first sockaddr_storage had __ss_family, not ss_family.
In other words it makes more sense to avoid sockaddr_storage...
2010-01-06 21:22:56 +00:00
Dr. Stephen Henson
76998a71bc
Updates to conform with draft-ietf-tls-renegotiation-03.txt:
...
1. Add provisional SCSV value.
2. Don't send SCSV and RI at same time.
3. Fatal error is SCSV received when renegotiating.
2010-01-06 17:37:09 +00:00
Dr. Stephen Henson
dd792d6222
Missing commit from change ofr compress_meth to unsigned
2010-01-06 17:35:27 +00:00
Dr. Stephen Henson
82a107eaa8
compress_meth should be unsigned
2010-01-06 14:01:45 +00:00
Dr. Stephen Henson
f8e1ab79f5
ENGINE_load_capi() now exists on all platforms (but no op on non-WIN32)
2010-01-06 13:21:08 +00:00
Andy Polyakov
1f23001d07
ppc64-mont.pl: commentary update.
2010-01-06 10:58:59 +00:00
Andy Polyakov
dacdcf3c15
Add Montgomery multiplication module for IA-64.
2010-01-06 10:57:55 +00:00
Dr. Stephen Henson
60c52245e1
PR: 2102
...
Submitted by: John Fitzgibbon <john_fitzgibbon@yahoo.com >
Remove duplicate definitions.
2010-01-05 17:57:33 +00:00
Dr. Stephen Henson
2a30fec786
Typo
2010-01-05 17:49:49 +00:00
Dr. Stephen Henson
3ddf85033d
PR: 2132
...
Submitted by: steve
Fix bundled pod2man.pl to handle alternative comment formats.
2010-01-05 17:32:54 +00:00
Dr. Stephen Henson
6084c797a8
Remove tabs on blank lines: they produce warnings in pod2man
2010-01-05 17:16:54 +00:00
Dr. Stephen Henson
2be3d6ebc8
Client side compression algorithm sanity checks: ensure old compression
...
algorithm matches current and give error if compression is disabled and
server requests it (shouldn't happen unless server is broken).
2010-01-01 14:39:37 +00:00
Dr. Stephen Henson
e6f418bcb7
Compression handling on session resume was badly broken: it always
...
used compression algorithms in client hello (a legacy from when
the compression algorithm wasn't serialized with SSL_SESSION).
2009-12-31 14:13:30 +00:00
Dr. Stephen Henson
5e63121758
Include CHANGES entry for external cache
2009-12-31 13:58:57 +00:00
Andy Polyakov
2f4c1dc86c
b_sock.c: correct indirect calls on WinSock platforms.
...
PR: 2130
Submitted by: Eugeny Gostyukhin
2009-12-30 12:55:23 +00:00
Andy Polyakov
f87e307875
Adapt mingw config for newer mingw environment. Note modified conditional
...
compilation in e_capi.c.
PR: 2113
2009-12-30 11:46:54 +00:00
Andy Polyakov
70b76d392f
ppccap.c: fix compiler warning and perform sanity check outside signal masking.
...
ppc64-mont.pl: clarify comment and fix spelling.
2009-12-29 11:18:16 +00:00
Andy Polyakov
6a9d28f9e4
Deploy multilib config-line parameter. It was added in February to allow
...
for kind of installation suggested in ticket #2003 from August. What it
effectively does now, is arrange pre-configured default $libdir value.
Note that it also fixes ENGINESDIR, i.e. harmonizes it with install path.
2009-12-29 10:33:37 +00:00
Andy Polyakov
3fc2efd241
PA-RISC assembler: missing symbol and typos.
2009-12-28 16:13:35 +00:00
Dr. Stephen Henson
76774c5ea1
return v1.1 methods for client/server
2009-12-28 00:31:16 +00:00
Dr. Stephen Henson
35b0ea4efe
Add simple external session cache to s_server. This serialises sessions
...
just like a "real" server making it easier to trace any problems.
2009-12-27 23:24:45 +00:00
Dr. Stephen Henson
73527122c9
Typo
2009-12-27 23:02:50 +00:00
Dr. Stephen Henson
d68015764e
Update RI to match latest spec.
...
MCSV is now called SCSV.
Don't send SCSV if renegotiating.
Also note if RI is empty in debug messages.
2009-12-27 22:58:55 +00:00
Andy Polyakov
b57599b70c
Update sha512-parisc.pl and add make rules.
2009-12-27 21:05:19 +00:00
Andy Polyakov
cb3b9b1323
Throw in more PA-RISC assembler.
2009-12-27 20:49:40 +00:00
Andy Polyakov
beef714599
Switch to new uplink assembler.
2009-12-27 20:38:32 +00:00
Andy Polyakov
d741cf2267
ppccap.c: tidy up.
...
ppc64-mont.pl: missing predicate in commentary.
2009-12-27 11:25:24 +00:00
Andy Polyakov
b4b48a107c
ppc64-mont.pl: adapt for 32-bit and engage for all builds.
2009-12-26 21:30:13 +00:00
Dr. Stephen Henson
7e765bf29a
Traditional Yuletide commit ;-)
...
Add Triple DES CFB1 and CFB8 to algorithm list and NID translation.
2009-12-25 14:13:11 +00:00
Bodo Möller
8580f8015f
Use properly local variables for thread-safety.
...
Submitted by: Martin Rex
2009-12-22 11:52:17 +00:00
Bodo Möller
f21516075f
Constify crypto/cast.
2009-12-22 11:46:00 +00:00
Bodo Möller
7427379e9b
Constify crypto/cast.
2009-12-22 10:58:33 +00:00
Dr. Stephen Henson
fbed9f8158
Alert to use is now defined in spec: update code
2009-12-17 15:42:52 +00:00
Dr. Stephen Henson
e50858c559
PR: 2127
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Check for lookup failures in EVP_PBE_CipherInit().
2009-12-17 15:27:57 +00:00
Dr. Stephen Henson
ef51b4b9b4
New option to enable/disable connection to unpatched servers
2009-12-16 20:25:59 +00:00
Dr. Stephen Henson
c27c9cb4f7
Allow initial connection (but no renegoriation) to servers which don't support
...
RI.
Reorganise RI checking code and handle some missing cases.
2009-12-14 13:56:04 +00:00
Dr. Stephen Henson
22c2155595
Move SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION out of SSL_OP_ALL and move SSL_OP_NO_TLSv1_1
2009-12-11 00:23:12 +00:00
Dr. Stephen Henson
b5c002d5a8
clarify docs
2009-12-09 18:16:50 +00:00
Dr. Stephen Henson
4db82571ba
Document option clearning functions.
...
Initial secure renegotiation documentation.
2009-12-09 17:59:29 +00:00
Dr. Stephen Henson
89408580ed
remove DEBUG_UNUSED from config for now
2009-12-09 15:56:24 +00:00
Dr. Stephen Henson
a8640f0a7d
Check s3 is not NULL
2009-12-09 15:03:44 +00:00
Dr. Stephen Henson
338a61b94e
Add patch to crypto/evp which didn't apply from PR#2124
2009-12-09 15:01:39 +00:00
Dr. Stephen Henson
e4bcadb302
Revert lhash patch for PR#2124
2009-12-09 14:59:47 +00:00
Dr. Stephen Henson
fdb2c6e4e5
PR: 2124
...
Submitted by: Jan Pechanec <Jan.Pechanec@Sun.COM >
Check for memory allocation failures.
2009-12-09 13:38:05 +00:00
Dr. Stephen Henson
7661ccadf0
Add ctrls to clear options and mode.
...
Change RI ctrl so it doesn't clash.
2009-12-09 13:25:16 +00:00
Dr. Stephen Henson
82e610e2cf
Send no_renegotiation alert as required by spec.
2009-12-08 19:06:26 +00:00
Dr. Stephen Henson
5430200b8b
Add ctrl and macro so we can determine if peer support secure renegotiation.
2009-12-08 13:42:08 +00:00
Dr. Stephen Henson
13f6d57b1e
Add support for magic cipher suite value (MCSV). Make secure renegotiation
...
work in SSLv3: initial handshake has no extensions but includes MCSV, if
server indicates RI support then renegotiation handshakes include RI.
NB: current MCSV value is bogus for testing only, will be updated when we
have an official value.
Change mismatch alerts to handshake_failure as required by spec.
Also have some debugging fprintfs so we can clearly see what is going on
if OPENSSL_RI_DEBUG is set.
2009-12-08 13:14:03 +00:00
Dr. Stephen Henson
8025e25113
PR: 2121
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Add extension support to DTLS code mainly using existing implementation for
TLS.
2009-12-08 11:37:40 +00:00
Dr. Stephen Henson
637f374ad4
Initial experimental TLSv1.1 support
2009-12-07 13:31:02 +00:00
Dr. Stephen Henson
7e4cae1d2f
PR: 2111
...
Submitted by: Martin Olsson <molsson@opera.com >
Check for bn_wexpand errors in bn_mul.c
2009-12-02 15:28:42 +00:00
Dr. Stephen Henson
9d9530255b
Update CHANGES.
2009-12-02 15:28:27 +00:00
Dr. Stephen Henson
3533ab1fee
Replace the broken SPKAC certification with the correct version.
2009-12-02 14:41:51 +00:00
Dr. Stephen Henson
ec7d16ffdd
Check it actually compiles this time ;-)
2009-12-02 14:25:40 +00:00
Dr. Stephen Henson
5656f33cea
PR: 2120
...
Submitted by: steve@openssl.org
Initialize fields correctly if pem_str or info are NULL in EVP_PKEY_asn1_new().
2009-12-02 13:56:45 +00:00
Dr. Stephen Henson
7f354fa42d
Ooops...
2009-12-01 18:40:50 +00:00
Dr. Stephen Henson
6732e14278
check DSA_sign() return value properly
2009-12-01 18:39:33 +00:00
Dr. Stephen Henson
499684404c
PR: 2115
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Add Renegotiation extension to DTLS, fix DTLS ClientHello processing bug.
2009-12-01 17:42:15 +00:00
Dr. Stephen Henson
606c46fb6f
PR: 1432
...
Submitted by: "Andrzej Chmielowiec" <achmielowiec@enigma.com.pl >, steve@openssl.org
Approved by: steve@openssl.org
Truncate hash if it is too large: as required by FIPS 186-3.
2009-12-01 17:32:44 +00:00
Dr. Stephen Henson
fed8dbf46d
PR: 2118
...
Submitted by: Mounir IDRASSI <mounir.idrassi@idrix.net >
Approved by: steve@openssl.org
Check return value of ECDSA_sign() properly.
2009-11-30 13:56:04 +00:00
Dr. Stephen Henson
c2f0203da0
typo
2009-11-29 13:45:42 +00:00
Andy Polyakov
b6bf9e2ea7
bss_dgram.c: re-fix BIO_CTRL_DGRAM_GET_PEER.
...
PR: 2110
2009-11-26 20:52:08 +00:00
Dr. Stephen Henson
d2a53c2238
Experimental CMS password based recipient Info support.
2009-11-26 18:57:39 +00:00
Bodo Möller
480af99ef4
Make CHANGES in CVS head consistent with the CHANGES files in the
...
branches.
This means that http://www.openssl.org/news/changelog.html will
finally describe 0.9.8l.
2009-11-26 18:43:17 +00:00
Dr. Stephen Henson
f2334630a7
Add OID for PWRI KEK algorithm.
2009-11-25 22:07:49 +00:00
Dr. Stephen Henson
007f7ec1bd
Add PBKFD2 prototype.
2009-11-25 22:07:22 +00:00
Dr. Stephen Henson
3d63b3966f
Split PBES2 into cipher and PBKDF2 versions. This tidies the code somewhat
...
and is a pre-requisite to adding password based CMS support.
2009-11-25 22:01:06 +00:00
Andy Polyakov
451038b40c
cms-test.pl: use EXE_EXT.
...
PR: 2107
2009-11-23 20:28:17 +00:00
Andy Polyakov
7766bc1a19
util/pl/VC-32.pl: bufferoverflowu.lib only when actually needed and
...
eliminate duplicate code.
PR: 2086
2009-11-19 22:29:03 +00:00
Dr. Stephen Henson
6cef3a7f9c
Servers can't end up talking SSLv2 with legacy renegotiation disabled
2009-11-18 15:09:44 +00:00
Dr. Stephen Henson
4d09323a63
Don't use SSLv2 compatible client hello if we don't tolerate legacy renegotiation
2009-11-18 14:45:48 +00:00
Dr. Stephen Henson
64abf5e657
Include a more meaningful error message when rejecting legacy renegotiation
2009-11-18 14:20:21 +00:00
Dr. Stephen Henson
446a6a8af7
PR: 2103
...
Submitted by: Rob Austein <sra@hactrn.net >
Approved by: steve@openssl.org
Initialise atm.flags to 0.
2009-11-17 13:25:53 +00:00
Dr. Stephen Henson
320d3fd6af
PR: 2101 (additional)
...
Submitted by: Roumen Petrov <openssl@roumenpetrov.info >
Approved by: steve@openssl.org
Another mingw fix.
2009-11-15 19:05:13 +00:00
Andy Polyakov
cca3ea1e71
OPENSSL_ia32cap.pod update.
2009-11-15 17:34:24 +00:00
Andy Polyakov
a83f83aac8
Add sha512-parisc.pl.
2009-11-15 17:29:31 +00:00
Andy Polyakov
5727f1f790
SHA1 assembler show off: minor performance updates and new modules for
...
forgotten CPUs.
2009-11-15 17:26:11 +00:00
Andy Polyakov
53f73afc4d
sha512.c: there apparently is ILP32 PowerPC platform, where it is safe to
...
inline 64-bit assembler instructions. Normally it's inappropriate, because
signalling doesn't preserve upper halves of general purpose registers.
Meaning that it's only safe if signals are blocked for the time "wide"
code executes.
PR: 1998
2009-11-15 17:19:49 +00:00
Andy Polyakov
10232bdc0e
x86_64-xlate.pl: new gas requires sign extention in lea instruction.
...
This resolves md5-x86_64.pl and sha1-x86_64.pl bugs, but without modifying
the code.
PR: 2094,2095
2009-11-15 17:11:38 +00:00
Andy Polyakov
55ff3aff8c
x86masm.pl: eliminate linker "multiple sections found with different
...
attributes" warning.
2009-11-15 17:06:44 +00:00
Andy Polyakov
b7cec490fa
bss_dgram.c: more elegant solution to PR#2069. Use socklen_t heuristic
...
from b_sock.c, don't assume that caller always passes pointer to buffer
large enough to hold sockaddr_storage.
PR: 2069
2009-11-15 17:03:33 +00:00
Andy Polyakov
2335e8a9cc
b_sock.c: fix compiler warning.
2009-11-15 16:52:11 +00:00
Andy Polyakov
6f766a4181
aesni-x86.pl: eliminate development comments.
2009-11-15 16:40:22 +00:00
Dr. Stephen Henson
f741382b3c
PR: 2101
...
Submitted by: Doug Kaufman <dkaufman@rahul.net >
Approved by: steve@openssl.org
Fixes for tests in cms-test.pl
2009-11-13 13:44:25 +00:00
Dr. Stephen Henson
c18e51ba5e
PR: 2088
...
Submitted by: Aleksey Samsonov <s4ms0n0v@gmail.com >
Approved by: steve@openssl.org
Fix memory leak in d2i_PublicKey().
2009-11-12 19:56:56 +00:00
Dr. Stephen Henson
773b63d6f9
set engine to NULL after releasing it
2009-11-12 19:25:37 +00:00
Richard Levitte
0a02d1db34
Update from 1.0.0-stable
2009-11-12 17:03:10 +00:00
Dr. Stephen Henson
ff094bc2d1
PR: 2098
...
Submitted by: Corinna Vinschen <vinschen@redhat.com >
Approved by: steve@openssl.org
For Cygwin enable zlib and mdc2 by default.
2009-11-11 19:05:20 +00:00
Dr. Stephen Henson
860c3dd1b6
add missing parts of reneg port, fix apps patch
2009-11-11 14:51:19 +00:00
Dr. Stephen Henson
2942dde56c
commit missing apps code for reneg fix
2009-11-11 14:10:24 +00:00
Dr. Stephen Henson
0f6e21385e
PR: 1686
...
Submitted by: Hanno Böck <hanno@hboeck.de >
Approved by: steve@openssl.org
Create engines dir if it doesn't already exist.
2009-11-10 01:52:41 +00:00
Dr. Stephen Henson
709a395d1c
PR: 2091
...
Submitted by: Martin Kaiser <lists@kaiser.cx >, Stephen Henson
Approved by: steve@openssl.org
If an OID has no short name or long name return the numerical representation.
2009-11-10 01:00:07 +00:00
Dr. Stephen Henson
b599006751
PR: 2090
...
Submitted by: Martin Kaiser <lists@kaiser.cx >, Stephen Henson
Approved by: steve@openssl.org
Improve error checking in asn1_gen.c
2009-11-10 00:48:07 +00:00
Dr. Stephen Henson
e0e7997212
First cut of renegotiation extension. (port to HEAD)
2009-11-09 19:03:34 +00:00
Dr. Stephen Henson
befbd0619b
update CHANGES
2009-11-09 17:33:32 +00:00
Dr. Stephen Henson
f423c63bb0
make udpate
2009-11-09 14:56:33 +00:00
Dr. Stephen Henson
9acc65006c
Remove BF_PTR2 from configuration: it doesn't improve performance any more and causes gcc warnings about arrays out of range
2009-11-09 14:13:23 +00:00
Dr. Stephen Henson
7ba3838a4b
If it is a new session don't send the old TLS ticket: send a zero length
...
ticket to request a new session.
2009-11-08 14:36:12 +00:00
Dr. Stephen Henson
4398222457
Ooops, revert committed conflict.
2009-11-07 22:22:40 +00:00
Dr. Stephen Henson
71af26b57b
PR: 2089
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
DTLS Fragment size bug fix.
2009-11-02 13:38:22 +00:00
Dr. Stephen Henson
2008e714f3
Add missing functions to allow access to newer X509_STORE_CTX status
...
information. Add more informative message to verify callback to indicate
when CRL path validation is taking place.
2009-10-31 19:22:18 +00:00
Dr. Stephen Henson
245d2ee3d0
Add option to allow in-band CRL loading in verify utility. Add function
...
load_crls and tidy up load_certs. Remove useless purpose variable from
verify utility: now done with args_verify.
2009-10-31 13:33:57 +00:00
Dr. Stephen Henson
4b4ba6a887
Generate stateless session ID just after the ticket is received instead
...
of when a session is loaded. This will mean that applications that
just hold onto SSL_SESSION structures and never call d2i_SSL_SESSION()
will still work.
2009-10-30 14:06:03 +00:00
Dr. Stephen Henson
bb4060c5b5
Move CHANGES entry to 0.9.8l section
2009-10-30 13:29:30 +00:00
Dr. Stephen Henson
661dc1431f
Fix statless session resumption so it can coexist with SNI
2009-10-30 13:22:24 +00:00
Dr. Stephen Henson
213f08a65a
Don't attempt session resumption if no ticket is present and session
...
ID length is zero.
2009-10-28 19:52:18 +00:00
Dr. Stephen Henson
3e24d43931
oops!
2009-10-28 19:50:59 +00:00
Dr. Stephen Henson
b57329ba90
PR: 2085
...
Submitted by: Mike Frysinger <vapier@gentoo.org >
Approved by: steve@openssl.org
Change domd test to match 1.0.0+ version: check $MAKEDEPEND
ends in "gcc" to support cross compilers.
2009-10-28 19:48:09 +00:00
Dr. Stephen Henson
d4be92896c
Add -no_cache option to s_server
2009-10-28 17:49:30 +00:00
Dr. Stephen Henson
8844a69cd3
Don't replace whole AR line
2009-10-28 15:33:32 +00:00
Dr. Stephen Henson
970097ae2c
PR: 2081
...
Submitted by: Mike Frysinger <vapier@gentoo.org >
Approved by: steve@openssl.org
Respect AR and RANLIB environment variables if set.
2009-10-28 14:00:29 +00:00
Dr. Stephen Henson
dafd83334a
PR: 2080
...
Submitted by: Mike Frysinger <vapier@gentoo.org >
Approved by: steve@openssl.org
Respect MAKE environment variable if set.
2009-10-28 13:55:44 +00:00
Dr. Stephen Henson
d6245b8952
PR: 2078
...
Submitted by: Dale Anderson <dra@redevised.net >
Approved by: steve@openssl.org
Corrections to bn_internal documentation.
2009-10-28 13:52:07 +00:00
Dr. Stephen Henson
13d7524698
Clarification
2009-10-23 12:36:41 +00:00
Dr. Stephen Henson
dd57b657a8
Add an FAQ.
2009-10-23 12:22:54 +00:00
Dr. Stephen Henson
45cd59ac71
If not checking all certificates don't attempt to find a CRL
...
for the leaf certificate of a CRL path.
2009-10-23 12:06:35 +00:00
Dr. Stephen Henson
d11d977da4
Need to check <= 0 here.
2009-10-22 23:12:05 +00:00
Dr. Stephen Henson
4a1b71fb0c
PR: 2070
...
Submitted by: Alexander Nikitovskiy <Nikitovski@ya.ru >
Approved by: steve@openssl.org
Fix wrong cast.
2009-10-19 13:16:01 +00:00
Dr. Stephen Henson
19a9d0fcea
make update
2009-10-18 14:53:00 +00:00
Dr. Stephen Henson
6aa1770c6d
Use new X509_STORE_set_verify_cb function instead of old macro.
2009-10-18 14:40:33 +00:00
Dr. Stephen Henson
122276a7b4
take install prefix from the environment
2009-10-18 14:27:01 +00:00
Dr. Stephen Henson
1e6b8d39f1
Document more error codes.
2009-10-18 14:01:17 +00:00
Dr. Stephen Henson
e05d6c7d3c
Verification callback functions.
2009-10-18 13:26:08 +00:00
Dr. Stephen Henson
a5b37fca0a
Add "missing" function X509_STORE_set_verify_cb().
2009-10-18 13:24:16 +00:00
Dr. Stephen Henson
9074df8684
Clarification.
2009-10-17 23:08:32 +00:00
Dr. Stephen Henson
6c17629f91
Preliminary documentation for X509_VERIFY_PARAM.
2009-10-17 23:00:18 +00:00
Dr. Stephen Henson
db57663241
Add docs for X509_STORE_CTX_new() and related functions.
2009-10-17 18:05:53 +00:00
Dr. Stephen Henson
53246488bd
More X509 verification docs.
2009-10-17 17:07:17 +00:00
Dr. Stephen Henson
1f164f5ed9
Typo.
2009-10-17 17:06:19 +00:00
Dr. Stephen Henson
b8c182a499
Manual page for X509_verify_cert()
2009-10-17 12:46:52 +00:00
Dr. Stephen Henson
11c4c02ce3
PR: 2074
...
Submitted by: Bram Neijt <bneijt@gmail.com >
Approved by: steve@openssl.org
Typo: "contet".
2009-10-16 15:30:13 +00:00
Dr. Stephen Henson
c6bec6ef0d
PR: 2072
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Approved by: steve@openssl.org
Avoid potential doublefree and reuse of freed handshake_buffer.
2009-10-16 15:24:07 +00:00
Dr. Stephen Henson
7c3908dd19
PR: 2073
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Approved by: steve@openssl.org
Don't access freed SSL_CTX in SSL_free().
2009-10-16 13:41:39 +00:00
Dr. Stephen Henson
3477592385
Fixes to CROSS_COMPILE, don't override command line option from environment
2009-10-15 23:43:54 +00:00
Dr. Stephen Henson
be45636661
Fix for WIN32 and possibly other platforms which don't define in_port_t.
2009-10-15 18:49:30 +00:00
Dr. Stephen Henson
6fb3233778
Update ordinals.
2009-10-15 18:08:05 +00:00
Dr. Stephen Henson
636b6b450d
PR: 2069
...
Submitted by: Michael Tuexen <tuexen@fh-muenster.de >
Approved by: steve@openssl.org
IPv6 support for DTLS.
2009-10-15 17:41:31 +00:00
Dr. Stephen Henson
2c55c0d367
PR: 1847
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Approved by: steve@openssl.org
Integrated patches to CA.sh to bring it into line with CA.pl functionality.
2009-10-15 17:27:34 +00:00
Dr. Stephen Henson
0431941ec5
Revert extra changes from previous commit.
2009-10-15 17:17:45 +00:00
Dr. Stephen Henson
42733b3bea
PR: 2066
...
Submitted by: Guenter <lists@gknw.net >
Approved by: steve@openssl.org
Add -r option to dgst to produce format compatible with core utilities.
2009-10-15 17:13:54 +00:00
Dr. Stephen Henson
8aab301b66
Rename CROSS_COMPILE_PREFIX to CROSS_COMPILE
2009-10-15 13:05:04 +00:00
Dr. Stephen Henson
19a0192b42
Allow uname values to be overridden by the environment
2009-10-07 16:44:03 +00:00
Dr. Stephen Henson
f99f41cf5c
Allow cross compilation prefix to come from CROSS_COMPILE environment variable
2009-10-07 16:41:14 +00:00
Andy Polyakov
b34d449c42
Combat gcc 4.4.1 aliasing rules.
2009-10-06 07:17:57 +00:00
Dr. Stephen Henson
04f9095d9e
Fix unitialized warnings
2009-10-04 16:52:51 +00:00
Dr. Stephen Henson
0e039aa797
Fix warnings about ignoring fgets return value
2009-10-04 16:42:56 +00:00
Dr. Stephen Henson
c21869fb07
Prevent ignored return value warning
2009-10-04 14:04:27 +00:00
Dr. Stephen Henson
9a0c776c60
Prevent aliasing warning
2009-10-04 14:02:22 +00:00
Dr. Stephen Henson
77db140f94
Typo.
2009-10-02 18:20:22 +00:00
Dr. Stephen Henson
fecef70773
Yes it is a typo ;-)
2009-10-01 12:17:44 +00:00
Dr. Stephen Henson
b48315d9b6
PR: 2061
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct i2b_PVK_bio error handling in rsa.c, dsa.c
2009-10-01 00:25:24 +00:00
Dr. Stephen Henson
e8a682f223
PR: 2062
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct BN_rand error handling in bntest.c
2009-10-01 00:21:20 +00:00
Dr. Stephen Henson
98fbfff417
PR: 2059
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct EVP_SealInit error handling in pem_seal.c
2009-10-01 00:17:59 +00:00
Dr. Stephen Henson
78ca13a272
PR: 2056
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct BIO_wirte error handling in asn1_par.c
2009-10-01 00:11:04 +00:00
Dr. Stephen Henson
d4778ae47e
PR: 2055
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct BIO_ctrl error handling in s2_srvr.c
2009-10-01 00:06:14 +00:00
Dr. Stephen Henson
ff613640e2
PR: 2054
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct BIO_ctrl error handling
2009-10-01 00:02:52 +00:00
Dr. Stephen Henson
aec13c1a9f
PR: 2063
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct BIO_write error handling in ocsp_prn.c
2009-09-30 23:58:37 +00:00
Dr. Stephen Henson
64f0f80eb6
PR: 2057
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct BIO_write, BIO_printf, i2a_ASN1_INTEGER and i2a_ASN1_OBJECT
error handling in OCSP print routines.
2009-09-30 23:55:53 +00:00
Dr. Stephen Henson
d71061122c
PR: 2058
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct EVP_DigestVerifyFinal error handling.
2009-09-30 23:49:11 +00:00
Dr. Stephen Henson
fb552ac616
Change version from 0.9.9 to 1.0.0 in docs
2009-09-30 23:43:01 +00:00
Dr. Stephen Henson
18e503f30f
PR: 2064, 728
...
Submitted by: steve@openssl.org
Add support for custom headers in OCSP requests.
2009-09-30 21:40:55 +00:00
Dr. Stephen Henson
37fc562bd8
Free SSL_CTX after BIO
2009-09-30 21:36:17 +00:00
Dr. Stephen Henson
a0b3e0de6c
Fixup sureware ENGINE to handle new RAND_METHOD
2009-09-23 23:49:04 +00:00
Dr. Stephen Henson
b6dcdbfc94
Audit libcrypto for unchecked return values: fix all cases enountered
2009-09-23 23:43:49 +00:00
Dr. Stephen Henson
cd4f7cddc7
Add more return value checking attributes to evp.h and hmac.h
2009-09-23 23:40:13 +00:00
Dr. Stephen Henson
3db244261d
Add DEBUG_UNUSED to debug-steve* entries
2009-09-23 16:29:20 +00:00
Dr. Stephen Henson
acf20c7dbd
Add attribute to check if return value of certain functions is incorrectly
...
ignored.
2009-09-23 16:27:10 +00:00
Dr. Stephen Henson
7c75f462e8
PR: 2050
...
Submitted by: Michael Tuexen <tuexen@fh-muenster.de >
Approved by: steve@openssl.org
Fix handling of ENOTCONN and EMSGSIZE for dgram BIOs.
2009-09-22 11:34:45 +00:00
Dr. Stephen Henson
d636aa7109
PR: 2047
...
Submitted by: David Lee <live4thee@gmail.com >, steve@openssl.org
Approved by: steve@openssl.org
Fix for IPv6 handling in BIO_get_accept_socket().
2009-09-20 16:41:27 +00:00
Dr. Stephen Henson
1d42dbaf1e
Ooops, missing close quote
2009-09-20 12:46:55 +00:00
Dr. Stephen Henson
44c8b81eea
Don't use __try+__except unless on VC++
2009-09-20 12:39:32 +00:00
Dr. Stephen Henson
23129dec6f
add version info for VC-WIN64I too
2009-09-20 11:40:13 +00:00
Dr. Stephen Henson
0287ead9aa
PR: 2048
...
Submitted by: john blair <mailtome200420032002@yahoo.com >
Approved by: steve@openssl.org
Add version info in VC-WIN64A too.
2009-09-19 23:00:55 +00:00
Andy Polyakov
282feebab3
cmll-x86_64.pl: small buglet in CBC subroutine.
...
PR: 2035
2009-09-17 19:35:13 +00:00
Dr. Stephen Henson
e9f613acea
PR: 2039
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
DTLS listen bug fix,
2009-09-15 22:48:57 +00:00
Dr. Stephen Henson
a25f33d28a
Submitted by: Julia Lawall <julia@diku.dk>
...
The functions ENGINE_ctrl(), OPENSSL_isservice(), EVP_PKEY_sign(),
CMS_get1_RecipientRequest() and RAND_bytes() can return <=0 on error fix
so the return code is checked correctly.
2009-09-13 11:29:29 +00:00
Dr. Stephen Henson
94480b57db
PR: 2023
...
Submitted by: James Beckett <jmb.openssl@nospam.hackery.net >, steve
Approved by: steve@openssl.org
Fix documentation errors in d2i_X509 manual pages.
2009-09-12 23:34:41 +00:00
Dr. Stephen Henson
7689ed34d3
PR: 2025
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Approved by: steve@openssl.org
Constify SSL_CIPHER_description
2009-09-12 23:17:39 +00:00
Dr. Stephen Henson
33130b07ce
PR: 1411
...
Submitted by: steve@openssl.org
Allow use of trusted certificates in SSL_CTX_use_chain_file()
2009-09-12 23:09:45 +00:00
Dr. Stephen Henson
08882ac5be
PR: 2038
...
Submitted by: Artem Chuprina <ran@cryptocom.ru >
Approved by: steve@openssl.org
Avoid double call to BIO_free().
2009-09-11 11:02:52 +00:00
Dr. Stephen Henson
1fc3ac806d
PR: 2033
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
DTLS listen support.
2009-09-09 17:05:18 +00:00
Dr. Stephen Henson
0c28f277d1
Add new option --strict-warnings to Configure script. This is used to add
...
in devteam warnings into other configurations.
2009-09-09 16:31:32 +00:00
Dr. Stephen Henson
8c7168698e
Seed PRNG with DSA and ECDSA digests for additional protection against
...
possible PRNG state duplication.
2009-09-09 12:15:08 +00:00
Dr. Stephen Henson
b5ca7df5aa
PR: 2031
...
Submitted by: steve@openssl.org
Tolerate application/timestamp-response which some servers send out.
2009-09-07 17:57:18 +00:00
Dr. Stephen Henson
14b148d390
Typo presumably....
2009-09-06 17:56:30 +00:00
Dr. Stephen Henson
e0d4e97c1a
Make update, deleting bogus DTLS error code
2009-09-06 15:58:19 +00:00
Dr. Stephen Henson
f4274da164
PR: 1644
...
Submitted by: steve@openssl.org
Fix to make DHparams_dup() et al work in C++.
For 1.0 fix the final argument to ASN1_dup() so it is void *. Replace some
*_dup macros with functions.
2009-09-06 15:49:46 +00:00
Dr. Stephen Henson
07a9d1a2c2
PR: 2028
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Fix DTLS cookie management bugs.
2009-09-04 17:42:53 +00:00
Dr. Stephen Henson
88a3dd7896
Correction: salt is now default
2009-09-04 12:27:12 +00:00
Dr. Stephen Henson
4f59432c06
Oops, s can be NULL
2009-09-04 11:30:59 +00:00
Dr. Stephen Henson
2d1cbca960
PR: 2020
...
Submitted by: Keith Beckman <kbeckman@mcg.edu >, Tomas Mraz <tmraz@redhat.com >
Checked by: steve@openssl.org
Fix improperly capitalized references to WWW::Curl::Easy.
2009-09-02 15:57:24 +00:00
Dr. Stephen Henson
fc68056917
PR: 2029
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Checked by: steve@openssl.org
Fix so that the legacy digest EVP_dss1() still works.
2009-09-02 15:51:19 +00:00
Dr. Stephen Henson
17b5326ba9
PR: 2013
...
Submitted by: steve@openssl.org
Include a flag ASN1_STRING_FLAG_MSTRING when a multi string type is created.
This makes it possible to tell if the underlying type is UTCTime,
GeneralizedTime or Time when the structure is reused and X509_time_adj_ex()
can handle each case in an appropriate manner.
Add error checking to CRL generation in ca utility when nextUpdate is being
set.
2009-09-02 13:54:50 +00:00
Dr. Stephen Henson
3d9b105fe0
PR: 2009
...
Submitted by: "Alexei Khlebnikov" <alexei.khlebnikov@opera.com >
Approved by: steve@openssl.org
Avoid memory leak and fix error reporting in d2i_SSL_SESSION(). NB: although
the ticket mentions buffer overruns this isn't a security issue because
the SSL_SESSION structure is generated internally and it should never be
possible to supply its contents from an untrusted application (this would
among other things destroy session cache security).
2009-09-02 13:20:32 +00:00
Dr. Stephen Henson
70dc09ebe4
PR: 2022
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Fix DTLS record header length bug.
2009-09-02 12:53:52 +00:00
Dr. Stephen Henson
1771668096
Tidy up and fix verify callbacks to avoid structure dereference, use of
...
obsolete functions and enhance to handle new conditions such as policy printing.
2009-09-02 12:47:28 +00:00
Dr. Stephen Henson
38663fcc82
Missing break.
2009-08-31 22:19:26 +00:00
Dr. Stephen Henson
a6dab873d9
PR: 2005
...
Submitted by: steve@openssl.org
Some systems have broken IPv6 headers and/or implementations. If
OPENSSL_USE_IPV6 is set to 0 IPv6 is not used, if it is set to 1 it is used
and if undefined an attempt is made to detect at compile time by checking
if AF_INET6 is set and excluding known problem platforms.
2009-08-26 15:15:15 +00:00
Dr. Stephen Henson
480b9e5d29
PR: 2006
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Do not use multiple DTLS records for a single user message
2009-08-26 11:51:57 +00:00
Dr. Stephen Henson
19c5314f28
PR: 2015
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Define LIBDIR properly.
2009-08-26 11:42:11 +00:00
Andy Polyakov
c372482c1b
sha1-x86* assembler update: F_40_59 and Atom-specific optimizations.
2009-08-18 19:24:50 +00:00
Dr. Stephen Henson
ba4526e071
Stop unused variable warning on WIN32 et al.
2009-08-18 11:15:33 +00:00
Dr. Stephen Henson
98c08a6312
Use SHA1 and not deprecated MD5 in demos.
2009-08-15 11:01:09 +00:00
Dr. Stephen Henson
3ed3603b60
Update default dependency flags.
...
Make error name discrepancies a fatal error.
Fix error codes.
make update
2009-08-12 17:30:37 +00:00
Dr. Stephen Henson
f2589af1cf
Enable mdc2 support by default as the patent has now expired.
2009-08-12 16:46:26 +00:00
Dr. Stephen Henson
0e37c90925
Update README with bug report and contribution details.
2009-08-12 16:44:33 +00:00
Dr. Stephen Henson
b972fbaa8f
PR: 1997
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
DTLS timeout handling fix.
2009-08-12 13:19:54 +00:00
Dr. Stephen Henson
77c7f17a5e
Typo
2009-08-10 15:52:49 +00:00
Dr. Stephen Henson
b318cfb169
PR: 1999
...
Submitted by: "Bayram Kurumahmut" <kbayram@ubicom.com >
Approved by: steve@openssl.org
Don't use HAVE_FORK in apps/speed.c it can conflict with configured version.
2009-08-10 15:30:40 +00:00
Dr. Stephen Henson
e33d290159
PR: 2004
...
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr >
Approved by: steve@openssl.org
Handle fractional seconds properly in ASN1_GENERALIZEDTIME_print
2009-08-10 14:56:57 +00:00
Dr. Stephen Henson
6727565a84
PR: 2003
...
Make it possible to install OpenSSL in directories with name other
than "lib" for example "lib64". Based on patch from Jeremy Utley.
2009-08-10 14:48:40 +00:00
Dr. Stephen Henson
a0778bfae5
Add COMP error strings.
2009-08-09 14:58:37 +00:00
Dr. Stephen Henson
0f1d77a870
Fix error code.
2009-08-06 16:39:34 +00:00
Dr. Stephen Henson
d9d0f1b52c
Reject leading 0x80 in OID subidentifiers.
2009-08-06 16:32:54 +00:00
Dr. Stephen Henson
e075341d66
PR: 2002
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Obtained from: steve@openssl.org
Fix bug in libssl and krb5 linking in Makefile.org
2009-08-05 15:51:39 +00:00
Dr. Stephen Henson
bc32dbbea9
Oops!
2009-08-05 15:32:10 +00:00
Dr. Stephen Henson
f10f4447da
Update from 1.0.0-stable.
2009-08-05 15:29:58 +00:00
Dr. Stephen Henson
d76b8c89ec
PR: 2001
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Approved by: steve@openssl.org
Add patch: http://cvs.openssl.org/chngview?cn=14635 which never made it to
1.0.0, HEAD.
2009-08-05 14:55:20 +00:00
Dr. Stephen Henson
512d359e26
Update from 1.0.0-stable.
2009-07-27 21:22:02 +00:00
Dr. Stephen Henson
c869da8839
Update from 1.0.0-stable
2009-07-27 21:10:00 +00:00
Ben Laurie
d80866041e
Fix warnings.
2009-07-26 12:09:21 +00:00
Dr. Stephen Henson
75a86fa024
Update from 0.9.8-stable.
2009-07-24 13:48:07 +00:00
Dr. Stephen Henson
6b3bf0edf3
Remove MD2 test from WIN32 as we don't compile it in by default any more.
2009-07-24 13:43:59 +00:00
Dr. Stephen Henson
3ca16bfdd9
Fix typos.
2009-07-24 13:37:18 +00:00
Dr. Stephen Henson
59281ca03a
New debug targets from 1.0.0-stable
2009-07-24 13:31:12 +00:00
Dr. Stephen Henson
6aa220c935
PR: 1990
...
Update from 0.9.8-stable
2009-07-24 13:07:30 +00:00
Dr. Stephen Henson
3fa39ed723
Document removal of digest+signature algorithm link.
2009-07-24 13:01:40 +00:00
Dr. Stephen Henson
0f65d5eba5
PR: 1993
...
Fix from 0.9.8-stable.
2009-07-24 11:52:55 +00:00
Dr. Stephen Henson
1587761819
Fix from 0.9.8-stable
2009-07-24 11:34:59 +00:00
Dr. Stephen Henson
83019f7e12
Update from 0.9.8-stable.
2009-07-24 11:25:13 +00:00
Dr. Stephen Henson
bdfa4ff947
Update from 0.9.8-stable
2009-07-24 11:17:10 +00:00
Dr. Stephen Henson
8b69d9d2b5
Update from 0.9.8-stable
2009-07-24 11:11:30 +00:00
Dr. Stephen Henson
3c630352e2
Use correct extension and OSX detection.
2009-07-16 09:52:59 +00:00
Dr. Stephen Henson
4a620922e2
Updates from 1.0.0-stable
2009-07-15 18:00:04 +00:00
Dr. Stephen Henson
4b06d778ad
Update from 1.0.0-stable.
2009-07-15 11:33:24 +00:00
Dr. Stephen Henson
6bb7dc1e90
Updates from 1.0.0-stable
2009-07-15 11:02:24 +00:00
Dr. Stephen Henson
3f7c592082
Updates from 1.0.0-stable.
2009-07-14 15:30:05 +00:00
Dr. Stephen Henson
0e4bc56347
Document MD2 deprecation.
2009-07-13 11:58:05 +00:00
Dr. Stephen Henson
5c168710ac
Update from 1.0.0-stable.
2009-07-13 11:44:30 +00:00
Dr. Stephen Henson
6053ef80e5
Use new time routines to avoid possible overflow.
2009-07-13 11:40:14 +00:00
Dr. Stephen Henson
55a4a77a52
Update from 0.9.8-stable
2009-07-11 22:36:59 +00:00
Dr. Stephen Henson
1e8569398c
PR: 1624
...
Submitted by: "Simon L. Nielsen" <simon@FreeBSD.org >
Obtained from: steve@openssl.org
Correct FreeBSD check.
2009-07-11 22:28:45 +00:00
Dr. Stephen Henson
6e0c9e6008
Update from 1.0.0-stable.
2009-07-11 21:43:50 +00:00
Dr. Stephen Henson
c55d27ac33
Make update.
2009-07-08 09:19:53 +00:00
Dr. Stephen Henson
4e9de7aa3a
Delete MD2 from algorithm tables as in 0.9.8-stable. However since this is
...
a new branch we can also disable it by default.
2009-07-08 08:49:17 +00:00
Dr. Stephen Henson
fc007d021e
Fix warnings.
2009-07-04 12:04:06 +00:00
Dr. Stephen Henson
baacd8d4e5
PR: 1981
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
DTLS record header bugfix.
2009-07-04 11:38:40 +00:00
Dr. Stephen Henson
6c495bdb5d
Upadte from 1.0.0-stable
2009-07-01 15:47:04 +00:00
Dr. Stephen Henson
8b96875052
Update from 1.0.0-stable.
2009-07-01 15:43:04 +00:00
Dr. Stephen Henson
b53e076988
Update from 1.0.0-stable
2009-07-01 15:37:17 +00:00
Dr. Stephen Henson
0e698584a0
Update from 1.0.0-stable
2009-07-01 15:26:00 +00:00
Dr. Stephen Henson
15c7adb0c9
Update from 1.0.0-stable
2009-07-01 11:46:03 +00:00
Dr. Stephen Henson
9a6d8ee5b5
Update from 1.0.0-stable
2009-07-01 11:40:19 +00:00
Dr. Stephen Henson
9458530d45
Update from 1.0.0-stable
2009-07-01 11:29:25 +00:00
Dr. Stephen Henson
9de014a7f8
Update from 0.9.8-stable
2009-06-30 22:27:33 +00:00
Dr. Stephen Henson
4f761f5956
Typo.
2009-06-30 18:27:03 +00:00
Dr. Stephen Henson
db99779bee
Use common verify parameters instead of the small ad-hoc subset in
...
s_client, s_server.
2009-06-30 15:56:35 +00:00
Dr. Stephen Henson
e5b2b0f91f
Updates from 1.0.0-stable
2009-06-30 15:28:16 +00:00
Dr. Stephen Henson
ccf117510d
Update from 1.0.0-stable.
2009-06-30 11:58:10 +00:00
Dr. Stephen Henson
746570e575
Update from 1.0.0-stable.
2009-06-30 11:42:04 +00:00
Dr. Stephen Henson
508c535221
Update from 1.0.0-stable
2009-06-30 11:24:57 +00:00
Dr. Stephen Henson
9a5faeaa42
Allow setting of verify depth in verify parameters (as opposed to the depth
...
implemented using the verify callback).
2009-06-29 16:09:37 +00:00
Dr. Stephen Henson
d2f6d28298
Update from 0.9.8-stable.
2009-06-28 16:24:37 +00:00
Dr. Stephen Henson
a5f78bf3ba
Fix from 0.9.8-stable.
2009-06-26 23:14:39 +00:00
Dr. Stephen Henson
ce92bb54d1
Update from 0.9.8-stable.
2009-06-26 15:03:35 +00:00
Dr. Stephen Henson
f3be6c7b7d
Update from 1.0.0-stable.
2009-06-26 11:29:26 +00:00
Dr. Stephen Henson
4aa902ebaf
Stop warnings in gcc where "a" is const passed as a non-const argument.
2009-06-25 17:10:44 +00:00
Dr. Stephen Henson
e30dd20c0e
Update from 1.0.0-stable
2009-06-25 11:29:30 +00:00
Dr. Stephen Henson
2693812db2
Update FAQ with note about online docs.
2009-06-24 13:50:05 +00:00
Dr. Stephen Henson
f20339e6d7
Initialize outlen.
2009-06-24 13:29:29 +00:00
Dr. Stephen Henson
fd621f7dfd
Add beos as a supported DSO scheme.
2009-06-17 12:19:09 +00:00
Dr. Stephen Henson
c05353c50a
Rename asc2uni and uni2asc functions to avoid clashes.
2009-06-17 12:04:56 +00:00
Dr. Stephen Henson
73ea416070
Update from 1.0.0-stable.
2009-06-17 11:48:22 +00:00
Dr. Stephen Henson
4f33534c8a
PR: 1958
...
Submitted by: Sean Boudreau <seanb@qnx.com >
Approved by: steve@openssl.org
qnx6 support.
2009-06-17 11:37:44 +00:00
Dr. Stephen Henson
eddee61671
PR: 1956
...
Submitted by: Guenter <lists@gknw.net >
Approved by: steve@openssl.org
Netware doesn't have strings.h
2009-06-17 11:32:59 +00:00
Dr. Stephen Henson
d70323f1c5
Submitted by: Peter Gutmann <pgut001@cs.auckland.ac.nz>
...
Approved by: steve@openssl.org
Check return values for NULL in case of malloc failure.
2009-06-17 11:25:42 +00:00
Dr. Stephen Henson
716cddc03c
PR: 1946
...
Submitted by: Guenter <lists@gknw.net >
Approved by: steve@openssl.org
Netware header fix.
2009-06-16 16:54:44 +00:00
Dr. Stephen Henson
f0288f05b9
Submitted by: Artem Chuprina <ran@cryptocom.ru>
...
Reviewed by: steve@openssl.org
Various GOST ciphersuite and ENGINE fixes. Including...
Allow EVP_PKEY_set_derive_peerkey() in encryption operations.
New flag when certificate verify should be omitted in client key exchange.
2009-06-16 16:38:47 +00:00
Dr. Stephen Henson
31db43df08
Update from 0.9.8-stable.
2009-06-15 15:01:00 +00:00
Dr. Stephen Henson
512cab0128
Fix error codes.
2009-06-15 11:18:31 +00:00
Dr. Stephen Henson
779558b9e5
Update from 1.0.0-stable.
2009-06-15 10:27:22 +00:00
Dr. Stephen Henson
21b25ed4b8
PR: 1952
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve@openssl.org
ECDH negotiation bug.
2009-06-13 20:46:30 +00:00
Dr. Stephen Henson
58f41a926a
Updates from 1.0.0-stable
2009-06-05 14:59:26 +00:00
Dr. Stephen Henson
81d06ef2fd
Update from 1.0.0-stable.
2009-06-05 11:52:23 +00:00
Dr. Stephen Henson
225f303a9d
PR: 1946
...
Submitted by: Guenter <lists@gknw.net >
Reviewed by: steve@openssl.org
Get timeval definition on Netware.
2009-06-02 11:23:13 +00:00
Dr. Stephen Henson
ff6e530359
PR: 1938
...
Submitted by: Mark Phalan <Mark.Phalan@Sun.COM >
Reviewed by: steve@openssl.org
Patch to pem and hmac manual pages NAME sections.
2009-06-02 11:05:33 +00:00
Dr. Stephen Henson
0176842592
PR: 1945
...
Submitted by: Guenter <lists@gknw.net >
Approved by: steve@openssl.org
Netware compilation fix for nonexistent header.
2009-06-01 12:13:44 +00:00
Dr. Stephen Henson
d741ccadb5
Oops, update CHANGES entry.
2009-05-31 17:13:55 +00:00
Dr. Stephen Henson
6cf41fec72
Update from 1.0.0-stable.
2009-05-31 17:13:09 +00:00
Dr. Stephen Henson
8132d3ac40
Update from 1.0.0-stable.
2009-05-30 18:11:26 +00:00
Dr. Stephen Henson
43e12b6f1c
Add ignored FIPS options to evp.h change clashing flag value.
2009-05-29 18:57:31 +00:00
Dr. Stephen Henson
0b36857866
Update from 0.9.8-stable.
2009-05-29 14:02:57 +00:00
Dr. Stephen Henson
cc9001cb3f
Update from 1.0.0-stable
2009-05-28 21:41:47 +00:00
Dr. Stephen Henson
b1b9530165
Sync ordinals from 1.0.0-stable
2009-05-28 21:41:08 +00:00
Dr. Stephen Henson
caa97ef149
Update from 1.0.0-stable.
2009-05-28 18:11:29 +00:00
Dr. Stephen Henson
d0b72cf45b
Add CHANGES entries from 0.9.8-stable.
2009-05-18 17:37:33 +00:00
Dr. Stephen Henson
4243a7f796
Update from 1.0.0-stable.
2009-05-18 16:12:24 +00:00
Dr. Stephen Henson
046f210112
Update from 1.0.0-stable.
2009-05-17 16:04:58 +00:00
Dr. Stephen Henson
16cd15e688
Update from 1.0.0-stable.
2009-05-17 14:48:31 +00:00
Richard Levitte
98a711b479
Stupid typo
2009-05-17 07:22:11 +00:00
Dr. Stephen Henson
481547f0fe
Fix from 1.0.0-stable.
2009-05-16 16:23:14 +00:00
Dr. Stephen Henson
8d932f6fd7
Update from 1.0.0-stable
2009-05-16 16:18:19 +00:00
Dr. Stephen Henson
48fd490c6d
Update from 1.0.0-stable.
2009-05-16 11:16:43 +00:00
Dr. Stephen Henson
9289f21b7d
Update from 1.0.0 stable branch.
2009-05-16 11:15:42 +00:00
Dr. Stephen Henson
d3d4f9f5e9
PR: 1929
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
DTLS MTU bug.
2009-05-15 23:06:41 +00:00
Dr. Stephen Henson
eb38b26dbc
Update from 1.0.0-stable.
2009-05-15 22:58:40 +00:00
Dr. Stephen Henson
8bbe29f2ca
Update from 1.0.0-stable.
2009-05-15 22:50:33 +00:00
Richard Levitte
cc8cc9a3a1
Functional VMS changes submitted by sms@antinode.info (Steven M. Schweda).
...
Thank you\!
(note: not tested for now, a few nightly builds should give indications though)
2009-05-15 16:36:56 +00:00
Richard Levitte
af55c09d9f
Have mkdef.pl also handle VAX and Non-VAX differences for VMS
2009-05-15 16:01:39 +00:00
Richard Levitte
4531c1aa5e
Add a comment about libeay.num and ssleay.num
2009-05-15 16:00:04 +00:00
Andy Polyakov
761393bba7
x86[_64]cpuid.pl: further refine shared cache detection.
2009-05-14 18:17:26 +00:00
Dr. Stephen Henson
6f71e5ee6a
Update from stable branch.
2009-05-13 16:38:51 +00:00
Dr. Stephen Henson
715feb3104
Update from 1.0.0-stable.
2009-05-13 11:52:01 +00:00
Dr. Stephen Henson
83d8fa7dd1
Update from stable branch.
2009-05-13 11:32:46 +00:00
Andy Polyakov
586723138e
x86cpuid.pl: sync OPENSSL_ia32_cpuid with x86_64cpuid.pl.
2009-05-12 21:19:41 +00:00
Andy Polyakov
5cd91b5055
x86_64cpuid.pl: refine shared cache detection logic.
2009-05-12 21:01:13 +00:00
Andy Polyakov
6dd9066e0e
x86_64-xlate.pl: small commentary update.
2009-05-12 20:29:27 +00:00
Andy Polyakov
3dccfc1e68
e_padlock.c: fix typo (missing #endif) and switch to __builtin_alloca
...
(with introduction of 64-bit support alloca must be declared and there
is no standard way of doing that, switching to __bultin_alloca is
considered appropriate because code explicitly targets gcc anyway).
2009-05-12 20:19:09 +00:00
Richard Levitte
804ab1e0a4
Forgotten comma...
2009-05-12 05:03:42 +00:00
Dr. Stephen Henson
8002e3073b
Typo.
2009-05-07 16:40:52 +00:00
Dr. Stephen Henson
ac6f377754
Typo.
2009-05-06 16:57:19 +00:00
Dr. Stephen Henson
71b7858b1d
Update from 1.0.0-stable branch.
2009-05-06 16:55:55 +00:00
Richard Levitte
7da74281d2
Do not try to link the support file(s), as they aren't a complete
...
engine ;-)
2009-05-06 13:56:50 +00:00
Richard Levitte
e6b0c0007f
Make sure the padlock code compiles correctly even on hardware that
...
doesn't have padlocks.
2009-05-06 13:55:40 +00:00
Richard Levitte
eb2b33c2b9
Synchronise VMS with Unixly build.
2009-05-06 13:54:39 +00:00
Dr. Stephen Henson
eed15a831c
Fix from 1.0.0-stable.
2009-05-06 10:28:37 +00:00
Richard Levitte
5d6a017931
Move the time fetching code to its own static function, and thereby
...
make sure that BOTH instances of said code get the VMS modification.
2009-05-05 08:45:33 +00:00
Andy Polyakov
6022fe81a2
cryptlib.c: refine logic in OpenSSLDie (addenum to commit#18118).
2009-05-04 06:23:05 +00:00
Andy Polyakov
8b6fe84404
libeay.num: add ENGINE_load_aesni.
2009-05-03 14:23:16 +00:00
Andy Polyakov
3b58c74c98
Avoid double dialogs in OpenSSLDie on Windows.
2009-05-03 14:16:40 +00:00
Andy Polyakov
7752d34c61
Make it possible to compile CAPI engine under mingw64.
2009-05-03 13:54:01 +00:00
Andy Polyakov
01483c269e
Make CAPI engine UNICODE aware (it didn't work on Win64).
2009-05-03 13:52:01 +00:00
Andy Polyakov
03e13ca3f1
eng_aesni.c: win32 fix.
2009-05-03 13:48:54 +00:00
Andy Polyakov
065c5d6328
Engage cmll-x86_64.pl in Win64 build and make it compile correctly.
2009-05-02 21:18:52 +00:00
Andy Polyakov
f00fdcd14d
cryptlib.c: eliminate dependency on _strtoui64, older Windows CRT don't have it.
2009-05-02 12:51:37 +00:00
Andy Polyakov
194274cb68
ec_mult.c: fix C4334 win64 compiler warning.
2009-05-02 11:18:44 +00:00
Andy Polyakov
0fe4621e19
eng_aesni.c: fix assembler declarations.
2009-05-02 11:00:07 +00:00
Andy Polyakov
c5036d785a
aesni-x86_64.pl: resolve LNK1223 error.
2009-05-02 10:21:29 +00:00
Andy Polyakov
d608b4d662
AES-NI engine jumbo update.
2009-05-02 09:04:17 +00:00
Dr. Stephen Henson
b3f6fe919a
Updates from 1.0.0 stable branch.
2009-04-29 14:13:22 +00:00
Richard Levitte
d1417be75c
Make the NULL definition of OPENSSL_ia32cap_loc() compatible with the
...
declaration in crypto.h.
2009-04-29 13:40:28 +00:00
Dr. Stephen Henson
e7deff3cdf
Typo.
2009-04-28 22:36:33 +00:00
Dr. Stephen Henson
5f8f94a661
Update from 1.0.0-stable.
2009-04-28 22:10:54 +00:00
Richard Levitte
3c3f98dc93
Reimplement time check for VMS to mimic the way it's done on Windows.
...
Reason: gettimeofday() is deprecated.
2009-04-28 12:50:32 +00:00
Richard Levitte
f8a2233457
Stupid typo
2009-04-28 12:48:02 +00:00
Andy Polyakov
051742fb6c
v3_alt.c: otherName parsing fix.
...
Submitted by: Love Hörnquist Åstrand
2009-04-27 19:35:16 +00:00
Andy Polyakov
b066c3cd50
Update test/test_padlock script.
2009-04-27 19:04:23 +00:00
Andy Polyakov
eda2da3235
aesni-x86.pl: fix another typo and add test script.
2009-04-27 15:46:32 +00:00
Andy Polyakov
c0b03d44fb
aesni-x86.pl: fix typos.
2009-04-27 12:50:44 +00:00
Andy Polyakov
d64a7232d4
Intel AES-NI engine.
...
Submitted by: Huang Ying
2009-04-27 05:55:13 +00:00
Richard Levitte
876708c67d
Add padlock data
...
Redo the loop so it really compiles all objects for one engine, then
links the engine (until now, it still thought every file was an engine
of its own...).
2009-04-27 00:04:33 +00:00
Dr. Stephen Henson
d4f0339c66
Update from 1.0.0-stable.
2009-04-26 22:18:22 +00:00
Andy Polyakov
127186bf57
e_padlock: add support for x86_64 gcc.
2009-04-26 18:14:58 +00:00
Andy Polyakov
f06d0072fc
Minor shaX-s390x.pl update.
2009-04-26 18:11:25 +00:00
Andy Polyakov
f81e86d791
Improve readability of bio/b_sock.c
2009-04-26 18:06:14 +00:00
Andy Polyakov
2ff2710ccf
Engage nasm optimizations in Win64 build.
2009-04-26 18:05:19 +00:00
Andy Polyakov
ff65e94e04
Addenum to commit#18074: Expand OPENSSL_ia32cap to 64 bits.
2009-04-26 18:02:06 +00:00
Andy Polyakov
6c8b9259fc
AESNI perlasm update.
2009-04-26 17:58:58 +00:00
Andy Polyakov
75d448dde4
Handle push/pop %rbx in epi/prologue (this is Win64 SEH thing).
2009-04-26 17:58:01 +00:00
Andy Polyakov
e303f55fc7
Expand OPENSS_ia32cap to 64 bits.
2009-04-26 17:49:41 +00:00
Richard Levitte
d2617165ad
Add local symbol hacks for OpenVMS
2009-04-26 12:26:00 +00:00
Richard Levitte
7184ef1210
Cast to avoid signedness confusion
2009-04-26 12:16:08 +00:00
Richard Levitte
93caba129b
Include sys/time.h to declare gettimeofday().
2009-04-26 11:23:15 +00:00
Richard Levitte
6e177343f7
A DTLS1 symbol needs to be chopped off a bit.
2009-04-26 11:22:26 +00:00
Dr. Stephen Henson
ef236ec3b2
Merge from 1.0.0-stable branch.
2009-04-23 16:32:42 +00:00
Dr. Stephen Henson
8711efb498
Updates from 1.0.0-stable branch.
2009-04-20 11:33:12 +00:00
Dr. Stephen Henson
e5fa864f62
Updates from 1.0.0-stable.
2009-04-15 15:27:03 +00:00
Dr. Stephen Henson
22c98d4aad
Update from 1.0.0-stable
2009-04-08 16:16:35 +00:00
Dr. Stephen Henson
cc7399e79c
Changes from 1.0.0-stable.
2009-04-07 16:33:26 +00:00
Dr. Stephen Henson
14b3f1007e
Update from 0.9.8-stable.
2009-04-07 12:11:21 +00:00
Dr. Stephen Henson
645532b999
Update from 1.0.0-stable
2009-04-06 21:42:37 +00:00
Dr. Stephen Henson
220bd84911
Updates from 1.0.0-stable
2009-04-06 15:22:01 +00:00
Andy Polyakov
dec95a126a
Camellia update: make it respect NO_[INLINE_]ASM and typo in assembler.
2009-04-06 15:13:16 +00:00
Ben Laurie
a79b668b8f
Autogeneration seems to have changed slightly.
2009-04-05 10:21:05 +00:00
Dr. Stephen Henson
06ddf8eb08
Updates from 1.0.0-stable
2009-04-04 19:54:06 +00:00
Dr. Stephen Henson
71fca64d96
Update version info.
2009-04-03 11:47:05 +00:00
Dr. Stephen Henson
14023fe352
Merge from 1.0.0-stable branch.
2009-04-03 11:45:19 +00:00
Dr. Stephen Henson
b6b0b0d7a5
Update from 1.0.0-stable.
2009-04-01 14:59:49 +00:00
Dr. Stephen Henson
d6e460d44c
Update from 1.0.0-stable
2009-03-31 22:05:04 +00:00
Dr. Stephen Henson
0089a9dfa8
Fix from 1.0.0-stable
2009-03-31 21:58:01 +00:00
Dr. Stephen Henson
a5910673a6
Ooops reverse previous patch.
2009-03-31 21:39:37 +00:00
Dr. Stephen Henson
8e93eff8c6
Update from 0.9.8-stable
2009-03-31 21:36:30 +00:00
Dr. Stephen Henson
70b2186e24
Stop warnings.
2009-03-31 19:54:51 +00:00
Dr. Stephen Henson
64ecdaeca9
HEAD is now 1.1.0
...
The 1.0.0 branch is now OpenSSL_1_0_0-stable
2009-03-31 10:38:37 +00:00
Dr. Stephen Henson
4e74239df1
Update STATUS and NEWS.
2009-03-30 11:33:03 +00:00
Dr. Stephen Henson
aaf35f11d7
Allow use of algorithm and cipher names for dgsts and enc utilities instead
...
of having to manually include each one.
2009-03-30 11:31:50 +00:00
Dr. Stephen Henson
093f5d2c15
Nothing to see here... move along....
2009-03-28 17:12:51 +00:00
Dr. Stephen Henson
7f1c086b21
Update NEWS file.
2009-03-28 16:21:44 +00:00
Dr. Stephen Henson
77ea8c3002
Fix typo in CHANGES.
2009-03-25 22:21:12 +00:00
Dr. Stephen Henson
ddcfc25a6d
Update from stable branch.
2009-03-25 19:02:22 +00:00
Dr. Stephen Henson
4d7b7c62c3
Update CHANGES.
2009-03-25 12:57:50 +00:00
Dr. Stephen Henson
dd009fe655
Update FAQ.
2009-03-25 12:54:47 +00:00
Dr. Stephen Henson
73ba116e96
Update from stable branch.
2009-03-25 12:54:14 +00:00
Dr. Stephen Henson
80b2ff978d
Update from stable branch.
2009-03-25 12:53:50 +00:00
Dr. Stephen Henson
7ce8c95d58
Update from stable branch.
2009-03-25 12:53:26 +00:00
Dr. Stephen Henson
38b6e6c07b
Typo in usage message.
2009-03-23 21:04:23 +00:00
Dr. Stephen Henson
e4e949192b
Submitted by: Victor B. Wagner <vitus@cryptocom.ru>
...
Reviewed by: steve@openssl.org
Check return codes properly in md BIO and dgst command.
2009-03-18 18:53:08 +00:00
Andy Polyakov
4e52b9845e
aes-390x.pl: commentary update.
2009-03-17 20:04:11 +00:00
Andy Polyakov
e22b864846
Make SPARC assembler modules *really* Purify-friendly.
2009-03-17 18:31:08 +00:00
Dr. Stephen Henson
b6af2c7e3e
Submitted by: "Victor B. Wagner" <vitus@cryptocom.ru>
...
Reviewed by: steve@openssl.org
Update ccgost engine to support parameter files.
2009-03-17 15:38:34 +00:00
Andy Polyakov
57db09906b
Excuse myself from integrating sha1-sparcv9a.pl into build system, but
...
make it Purify-friendly...
2009-03-16 13:48:42 +00:00
Andy Polyakov
4c78bc05c4
Make SPARC assembler Pirify-friendly (Purify can't cope with certain
...
PIC constructs).
2009-03-16 13:32:38 +00:00
Dr. Stephen Henson
ef8e772805
Use OPENSSL_assert() instead of assert.
2009-03-15 14:04:42 +00:00
Dr. Stephen Henson
54571ba004
Use correct ctx name.
2009-03-15 14:03:47 +00:00
Dr. Stephen Henson
237d7b6cae
Fix from stable branch.
2009-03-15 13:37:34 +00:00
Dr. Stephen Henson
854a225a27
Update from stable branch.
2009-03-14 18:33:49 +00:00
Dr. Stephen Henson
e39acc1c90
PR: 1864
...
Submitted by: Ger Hobbelt <ger@hobbelt.com >
Reviewed by: steve@openssl.org
Check return value.
2009-03-14 12:39:05 +00:00
Dr. Stephen Henson
a0b76569b2
Update from stable branch.
2009-03-14 12:26:48 +00:00
Dr. Stephen Henson
78625cac82
Submitted by: Victor Duchovni <Victor.Duchovni@morganstanley.com>
...
Reviewed by: steve@openssl.org
Check return value of sk_SSL_COMP_find() properly.
2009-03-12 17:30:29 +00:00
Dr. Stephen Henson
c28a9165f2
PR: 1862
...
Typo.
2009-03-12 17:13:15 +00:00
Dr. Stephen Henson
617298dca3
Update from stable branch.
2009-03-12 17:10:26 +00:00
Dr. Stephen Henson
33ab2e31f3
PR: 1854
...
Submitted by: Oliver Martin <oliver@volatilevoid.net >
Reviewed by: steve@openssl.org
Support GeneralizedTime in ca utility.
2009-03-09 13:59:07 +00:00
Dr. Stephen Henson
bb7ccdfbe2
Update from stable branch.
2009-03-09 13:08:04 +00:00
Dr. Stephen Henson
c836f8ef73
Update from stable branch.
2009-03-09 12:30:10 +00:00
Dr. Stephen Henson
4df100935f
Update from stable branch.
2009-03-09 12:21:19 +00:00
Dr. Stephen Henson
2a0ff7ad20
Typo.
2009-03-08 12:01:20 +00:00
Ben Laurie
c2a548a884
Print IPv6 all 0s correctly (Rob Austein).
2009-03-08 10:54:45 +00:00
Dr. Stephen Henson
77202a85a0
Update from stable branch.
2009-03-07 17:00:23 +00:00
Ben Laurie
73bfcf2226
Don't ask for -iv for ciphers that need no IV.
2009-03-03 15:14:33 +00:00
Ben Laurie
2121f15daf
Use the right length (reported by Quanhong Wang).
2009-03-03 15:12:56 +00:00
Dr. Stephen Henson
b2cf7c6452
Submitted by: "Victor B. Wagner" <vitus@cryptocom.ru>
...
Approved by: steve
Recognise "enable-zlib" in mkdef.pl to handle "zlib" option when passed
to Configure.
2009-02-25 11:55:15 +00:00
Ben Laurie
7587347bc4
Fix memory leak.
2009-02-23 16:40:59 +00:00
Richard Levitte
ae3b4f2336
Make STORE an experimental feature.
2009-02-19 09:43:18 +00:00
Richard Levitte
605b04f661
Make it possible to disable STORE.
2009-02-19 09:42:51 +00:00
Richard Levitte
97132a0f8e
Reference bug.
2009-02-19 09:42:32 +00:00
Dr. Stephen Henson
30e5e39a3d
PR: 1778
...
Increase default verify depth to 100.
2009-02-16 23:23:21 +00:00
Dr. Stephen Henson
2c618ab993
Submitted by: "Victor B. Wagner" <vitus@cryptocom.ru>
...
Reviewed by: steve@openssl.org
Change default Gost parameter set to id_Gost28147_89_CryptoPro_A_ParamSet
2009-02-16 21:52:01 +00:00
Dr. Stephen Henson
b5d5c0a21f
PR: 1843
...
Use correct array size for SHA1 hash.
2009-02-16 21:42:48 +00:00
Richard Levitte
f8ea4757cc
Data not initialised.
...
Notified by Gerardo Ganis <gerardo.ganis@cern.ch >
2009-02-16 15:17:24 +00:00
Dr. Stephen Henson
0ed6b52687
Stop warning about use of *printf() without a format.
2009-02-15 15:29:59 +00:00
Dr. Stephen Henson
a63bf2c53c
Make no-engine work again.
2009-02-15 15:28:18 +00:00
Ben Laurie
b3f3407850
Use new common flags and fix resulting warnings.
2009-02-15 14:08:51 +00:00
Dr. Stephen Henson
477fd4596f
PR: 1835
...
Submitted by: Damien Miller <djm@mindrot.org >
Approved by: steve@openssl.org
Fix various typos.
2009-02-14 21:49:38 +00:00
Dr. Stephen Henson
30b1b28aff
Return correct exit code.
2009-02-12 18:06:11 +00:00
Dr. Stephen Henson
46400c97a9
Avoid leaks in pkcs8 app, tidy code up.
2009-02-12 18:02:47 +00:00
Andy Polyakov
c558c99fd8
rc4-s390x.pl: allow for older assembler and optimize character loop.
2009-02-12 14:48:49 +00:00
Andy Polyakov
13c3a1defa
RC4 for s390x.
2009-02-11 10:01:36 +00:00
Dr. Stephen Henson
aaa29f9e83
Add error checking to obj_xref.pl and add command line support for data
...
file locations.
2009-02-10 13:03:31 +00:00
Dr. Stephen Henson
ede6ef5e08
Submitted by: Peter Sylvester <Peter.Sylvester@edelweb.fr>
...
Reviewed by: steve
If tagging is universal and SET or SEQUENCE set constructed bit.
2009-02-10 12:13:08 +00:00
Andy Polyakov
0f529cbdc3
s390x-mont.pl: optimize prologue.
2009-02-10 08:46:48 +00:00
Andy Polyakov
eb55b9fc19
linux-s390x failed link after assembler pack update.
2009-02-10 07:43:48 +00:00
Andy Polyakov
7012d2a8fa
sha1-sparcv9a.pl: fix bug in commentary section.
2009-02-09 16:03:33 +00:00
Andy Polyakov
8626230a02
s390x assembler pack update.
2009-02-09 15:42:04 +00:00
Andy Polyakov
c23632d3f1
Reserve for "multilib" suffix, the one allowing to perform multi-ABI
...
installations. It's not enabled in Makefiles yet.
2009-02-09 15:11:22 +00:00
Dr. Stephen Henson
3859d7ee78
Just to be awkward Ubuntu 8.10 doesn't like _XOPEN_SOURCE_EXTENDED...
2009-02-06 16:43:52 +00:00
Bodo Möller
d615bceb2d
For -hex, print just one \n
2009-02-02 00:40:29 +00:00
Bodo Möller
7ca1cfbac3
-hex option for openssl rand
...
PR: 1831
Submitted by: Damien Miller
2009-02-02 00:01:28 +00:00
Bodo Möller
d8e8fc4803
Put back a variable deleted by the previous revision,
...
but used in the code.
2009-02-01 01:08:13 +00:00
Dr. Stephen Henson
57f39cc826
Print out UTF8 and NumericString types in ASN1 parsing utility.
2009-01-28 12:54:52 +00:00
Dr. Stephen Henson
6489573224
Update from stable branch.
2009-01-28 12:36:14 +00:00
Dr. Stephen Henson
079e00e646
Typo: just copy across an unknown type.
2009-01-28 12:32:03 +00:00
Richard Levitte
5871ddb016
Because DEC C - sorry, HP C - is picky about features, we need to
...
define _XOPEN_SOURCE_EXTENDED to reach fd_set and timeval types and
functionality.
2009-01-28 07:38:14 +00:00
Richard Levitte
c7ba21493a
Hopefully resolve signed vs unsigned issue.
2009-01-28 07:09:23 +00:00
Richard Levitte
8bf5001612
Do the Camellia part right
2009-01-28 07:01:29 +00:00
Richard Levitte
6ed9dfb23a
Synchronise with Unix build
2009-01-20 05:39:24 +00:00
Ben Laurie
7f62532030
Allow CC to be overridden.
2009-01-18 12:06:37 +00:00
Dr. Stephen Henson
c2c99e2860
Update certificate hash line format to handle canonical format
...
and avoid MD5 dependency.
2009-01-15 13:22:39 +00:00
Dr. Stephen Henson
8125d9f99c
Make PKCS#8 the standard write format for private keys, replacing the
...
ancient SSLeay format.
2009-01-15 12:52:38 +00:00
Dr. Stephen Henson
8e6925b0cd
Add CRYPTO_MDEBUG_ABORT to abort() is there are any memory leaks. This will
...
cause "make test" failures and make resource leaks more obvious.
2009-01-11 20:36:50 +00:00
Dr. Stephen Henson
d7ecd42255
Fix warnings properly this time ;-)
2009-01-11 20:34:23 +00:00
Dr. Stephen Henson
41b7619596
Fix missing prototype warnings then fix different prototype warnings ;-)
2009-01-11 16:17:26 +00:00
Dr. Stephen Henson
211655fcdd
Fix sign-compare warnings.
2009-01-11 15:58:51 +00:00
Dr. Stephen Henson
363bd0b48e
Add a set of standard gcc warning options which are designed to be the
...
minimum requirement for committed code. Added to debug-steve* config targets
for now.
2009-01-11 15:56:32 +00:00
Ben Laurie
60aee6ce15
Add missing entry.
2009-01-09 12:48:02 +00:00
Dr. Stephen Henson
bab534057b
Updatde from stable branch.
2009-01-07 23:44:27 +00:00
Dr. Stephen Henson
cec2af7510
Update FAQ.
2009-01-07 12:15:15 +00:00
Andy Polyakov
6de3683908
Add UltraSPARC VIS-powered SHA1 block procedure.
2009-01-05 14:52:31 +00:00
Lutz Jänicke
fceac0bc74
Fix compilation with -no-comp by adding some more #ifndef OPENSSL_NO_COMP
...
Some #include statements were not properly protected. This will go unnoted
on most systems as openssl/comp.h tends to be installed as a system header
file by default but may become visible when cross compiling.
2009-01-05 14:43:05 +00:00
Richard Levitte
792bbc2374
VMS stuff I forgot...
2009-01-03 09:25:32 +00:00
Ben Laurie
4a94003a51
srvr_ecdh cannot be NULL at this point (Coverity ID 232).
2009-01-02 12:49:07 +00:00
Andy Polyakov
ab4d689832
Makefile.shared: improve portability of commit#17753.
2009-01-02 09:02:27 +00:00
Ben Laurie
23b973e600
Calculate offset correctly. (Coverity ID 233)
2009-01-01 18:30:51 +00:00
Andy Polyakov
b3b201b6f7
Styling update to makefiles: eliminate redundant pipes.
2008-12-30 13:20:17 +00:00
Ben Laurie
d41c785d69
Document dead code.
2008-12-30 13:02:02 +00:00
Andy Polyakov
a370537bde
Styling update to makefiles: $() to denote make substitutions and $${} -
...
shell ones.
2008-12-29 16:17:52 +00:00
Ben Laurie
2bd45dc94c
Apparently s->ctx could be NULL. (Coverity ID 147).
2008-12-29 16:15:27 +00:00
Ben Laurie
121f9e743c
Apparently s->ctx could be NULL at this point (see earlier
...
test). (Coverity ID 148).
2008-12-29 16:13:49 +00:00
Ben Laurie
0eab41fb78
If we're going to return errors (no matter how stupid), then we should
...
test for them!
2008-12-29 16:11:58 +00:00
Ben Laurie
8aa02e97a7
Make sure a bad parameter to RSA_verify_PKCS1_PSS() doesn't lead to a crash.
...
(Coverity ID 135).
2008-12-29 13:35:08 +00:00
Andy Polyakov
a68c7b9171
bn_lib.c: [re-]fix Win64 compiler warning.
2008-12-29 12:44:33 +00:00
Andy Polyakov
5cabcf96e7
Fix "possible loss of data" Win64 compiler warnings.
2008-12-29 12:35:49 +00:00
Ben Laurie
85e878f224
Die earlier if hash is NULL. (Coverity IDs 137 & 138).
2008-12-29 11:54:56 +00:00
Ben Laurie
fe1c7fecf1
Reverse incorrect earlier fix.
2008-12-29 11:47:08 +00:00
Ben Laurie
0e941da6fa
Die earlier if we have no hash function.
2008-12-29 11:46:44 +00:00
Dr. Stephen Henson
2d1cbc85c8
Add standard .cvsignore file.
2008-12-29 00:27:06 +00:00
Dr. Stephen Henson
d195d60a5f
Update steve-debug* options.
2008-12-29 00:25:54 +00:00
Andy Polyakov
e81695205e
x86_64-xlate.pl: support for binary constants, such as 0b1010101.
2008-12-27 14:00:37 +00:00
Andy Polyakov
fe150ac25d
Add modes/cts128.c, Ciphertext Stealing implementation.
2008-12-27 13:40:45 +00:00
Andy Polyakov
bec45a35bb
cmll-x86_64.pl: fix bug in cbc tail processing and comply with Win64 ABI spec.
2008-12-27 13:39:38 +00:00
Andy Polyakov
3b0ee0d2bf
Revisit RT#1801 and complete fix.
2008-12-27 13:32:21 +00:00
Ben Laurie
dde5b979d2
Remove dead code. (Coverity ID 2)
2008-12-27 02:36:24 +00:00
Ben Laurie
57a6ac7c4f
Check scalar->d before we use it (in BN_num_bits()). (Coverity ID 129)
2008-12-27 02:15:16 +00:00
Ben Laurie
9b9cb004f7
Deal with the unlikely event that EVP_MD_CTX_size() returns an error.
...
(Coverity ID 140).
2008-12-27 02:09:24 +00:00
Ben Laurie
6ba71a7173
Handle the unlikely event that BIO_get_mem_data() returns -ve.
2008-12-27 02:00:38 +00:00
Richard Levitte
4ded7b44a8
More synchronisation with Unix
2008-12-26 23:52:06 +00:00
Ben Laurie
1457619e13
Remove misleading dead code. Constify. (Coverity ID 142)
2008-12-26 17:17:21 +00:00
Ben Laurie
ccf529928f
!a && !a->b is clearly wrong! Changed to !a || !a->b (Coverity ID 145).
2008-12-26 15:32:59 +00:00
Ben Laurie
5ceb595dfa
pval must always be set when pk7_cb() does anything (Coverity ID 146).
2008-12-26 15:29:02 +00:00
Richard Levitte
44390fadc0
In BIO_write(), update the write statistics, not the read statistics.
...
PR: 1803
2008-12-25 22:24:17 +00:00
Richard Levitte
974d05a323
Further synchronisation with Unix
2008-12-25 22:04:42 +00:00
Andy Polyakov
0f76640fba
Windows-specific addenum to "engage crypto/modes" commit #17716 .
2008-12-23 15:15:44 +00:00
Andy Polyakov
a11974180f
Patch the omission from prvious commit #17716 .
2008-12-23 11:38:33 +00:00
Andy Polyakov
5d48a66a6a
Engage crypto/modes.
2008-12-23 11:33:01 +00:00
Andy Polyakov
63fc7f848d
crypto/modes: make modes.h selfsufficient and rename block_f to block128_t.
2008-12-23 11:18:45 +00:00
Andy Polyakov
830457ce4f
Optimize CAST for size on 64-bit platforms. For reference, CAST_LONG being
...
unsigned long must be attributed to 16-bit support. As we don't support
16-bit platoforms anymore, there is no reason to waste twice required
space on CAST S-boxes (16KB vs. 8KB) or key schedule.
2008-12-22 15:21:59 +00:00
Andy Polyakov
ea4d5005d9
cmll-x86_64.pl: Win64 SEH section to handle pushf/popf in CBC routine.
2008-12-22 14:15:11 +00:00
Andy Polyakov
9f03d0fc04
Optimize #undef DES_UNROLL for size.
2008-12-22 14:10:42 +00:00
Andy Polyakov
2140659b00
Incidentally http://cvs.openssl.org/chngview?cn=17710 also made it possible
...
to build the library without -D_CRT_NONSTDC_NO_DEPRECATE. This commit
expands it even to apps catalog and actually omits the macro in question
from Configure.
2008-12-22 14:05:42 +00:00
Andy Polyakov
e527201f6b
This _WIN32-specific patch makes it possible to "wrap" OpenSSL in another
...
.DLL, in particular static build. The issue has been discussed in RT#1230
and later on openssl-dev, and mutually exclusive approaches were suggested.
This completes compromise solution suggested in RT#1230.
PR: 1230
2008-12-22 13:54:12 +00:00
Dr. Stephen Henson
70531c147c
Make no-engine work again.
2008-12-20 17:04:40 +00:00
Andy Polyakov
75bbf6e14c
make depend to work with cross-gcc, compensate for msys glitch.
...
PR: 1753
Submitted by: Alon Bar-Lev
2008-12-19 13:35:09 +00:00
Andy Polyakov
702e742515
cmll-x86_64.pl: bug fix and size optimization of Win64 SEH section.
2008-12-19 11:19:19 +00:00
Andy Polyakov
be01f79d3d
x86_64 assembler pack: add support for Win64 SEH.
2008-12-19 11:17:29 +00:00
Andy Polyakov
bf785c9849
x86_64-xlate.pl: fix masm hexadecimal constants.
2008-12-19 11:14:38 +00:00
Andy Polyakov
4db4882402
perlasm/x86* update: support for 3 and 4 argument instructions.
2008-12-17 19:56:48 +00:00
Andy Polyakov
6786f52ada
SEGV in AES_cbc_encrypt in aes-x86_64 assembler module.
...
PR: 1801
Submitted by: Huang Ying
2008-12-17 14:11:30 +00:00
Richard Levitte
2e6a7b3efc
Constify where needed
2008-12-16 13:41:49 +00:00
Richard Levitte
63461b8db1
Remove extraneous semicolons
2008-12-16 10:56:05 +00:00
Richard Levitte
e77228ba11
Stack changes made dso_vms.c not compile properly.
2008-12-16 10:55:26 +00:00
Richard Levitte
5c60b1637a
A few more symbols that are a little bit long for VMS
2008-12-16 10:54:53 +00:00
Richard Levitte
26397d2e8c
Synchronise VMS build system with the Unixly one
2008-12-16 10:54:28 +00:00
Andy Polyakov
85b2c0ce7f
128-bit block cipher modes consolidation. As consolidated functions
...
rely on indirect call to block functions, they are not as fast as
non-consolidated routines. However, performance loss(*) is within
measurement error and consolidation advantages are considered to
outweigh it.
(*) actually one can observe performance *improvement* on e.g.
CBC benchmarks thanks to optimization, which also becomes
shared among ciphers.
2008-12-16 08:39:21 +00:00
Andy Polyakov
f826bf7798
SEED to support OPENSSL_SMALL_FOOTPRINT: ~2x size decrease on x86.
2008-12-16 07:41:21 +00:00
Andy Polyakov
3ebbe8853f
Bring C bn_mul_mont template closer to assembler.
2008-12-16 07:28:38 +00:00
Andy Polyakov
ac71d81e84
no-asm didn't exclude Camellia assembler.
2008-12-16 07:26:53 +00:00
Ben Laurie
a9dbe71ee0
Back out pointless change.
2008-12-13 17:45:49 +00:00
Ben Laurie
ecd3370ba0
*** empty log message ***
2008-12-13 17:45:27 +00:00
Ben Laurie
19d300d07c
Return error if DH_new() fails (Coverity ID 150).
2008-12-13 17:39:53 +00:00
Ben Laurie
071920d9f6
Check for NULL before use (Coverity ID 203).
2008-12-13 17:28:25 +00:00
Ben Laurie
1f6e9bce21
Missing return values (Coverity ID 204).
2008-12-13 17:19:40 +00:00
Dr. Stephen Henson
434ba03ca9
Fix from stable branch.
2008-12-10 17:35:21 +00:00
Lutz Jänicke
d88d941c87
apps/speed.c: children should not inherit buffered I/O
...
PR: 1787
Submitted by: Artur Klauser <aklauser@google.com >
2008-12-10 08:03:47 +00:00
Dr. Stephen Henson
9d44cd1642
Oops should check zero_pos >= 0.
2008-12-08 19:13:06 +00:00
Dr. Stephen Henson
1d4e879106
Handle case where v6stat.zero_pos == 0 correctly.
...
Reported by: Kurt Roeckx <kurt@roeckx.be >, Tobias Ginzler <ginzler@fgan.de > (Debian bug #506111 )
2008-12-07 23:58:44 +00:00
Andy Polyakov
ae381fef5c
Add Camellia assembler x86 and x86_64 modules.
2008-12-03 09:22:51 +00:00
Bodo Möller
48114ec952
experimental-foo support for mk1mf.pl.
2008-12-02 23:50:22 +00:00
Bodo Möller
7a76219774
Implement Configure option pattern "experimental-foo"
...
(specifically, "experimental-jpake").
2008-12-02 01:21:39 +00:00
Dr. Stephen Henson
2900fc8ae1
Don't stop -cipher from working.
2008-11-30 22:01:31 +00:00
Dr. Stephen Henson
e9afa08cd1
Update from stable branch.
2008-11-30 16:09:04 +00:00
Geoff Thorpe
bcaa36fd11
Fix compilation with -DOPENSSL_NO_DEPRECATED.
2008-11-28 22:06:55 +00:00
Geoff Thorpe
71702f7ed0
Clarify a 'chil' engine param that is a little unintuitive.
...
Submitted by: Sander Temme <sander@temme.net >
2008-11-28 22:04:49 +00:00
Dr. Stephen Henson
fd252de312
Update libeay.num
2008-11-24 17:46:29 +00:00
Dr. Stephen Henson
349e78e2e8
Stop warning about different const qualifiers.
2008-11-24 17:39:42 +00:00
Dr. Stephen Henson
79bd20fd17
Update from stable-branch.
2008-11-24 17:27:08 +00:00
Dr. Stephen Henson
d0c3628834
Set memory BIOs up properly when stripping text headers from S/MIME messages.
2008-11-21 18:18:13 +00:00
Geoff Thorpe
31636a3ed1
Allow the CHIL engine to load even if dynamic locks aren't registered.
...
Submitted by: Sander Temme
2008-11-19 14:21:27 +00:00
Ben Laurie
f3b7bdadbc
Integrate J-PAKE and TLS-PSK. Increase PSK buffer size. Fix memory leaks.
2008-11-16 12:47:12 +00:00
Ben Laurie
ad7159ea84
Ignore generated ASM.
2008-11-16 12:32:14 +00:00
Dr. Stephen Henson
0b0dbb2cac
Don't disable JPAKE by default in head...
2008-11-15 17:36:49 +00:00
Dr. Stephen Henson
12bf56c017
PR: 1574
...
Submitted by: Jouni Malinen <j@w1.fi >
Approved by: steve@openssl.org
Ticket override support for EAP-FAST.
2008-11-15 17:18:12 +00:00
Andy Polyakov
93c4ba07d7
x86_64-xlate.pl update, engage x86_64 assembler in mingw64.
2008-11-14 16:40:37 +00:00
Bodo Möller
36d46234c7
warnings (mostly)
2008-11-14 00:22:02 +00:00
Ben Laurie
774b2fe700
Aftermath of a clashing size_t fix (now only format changes).
2008-11-13 09:48:47 +00:00
Ben Laurie
6c901ae8c1
Ignore saved Makefile.
2008-11-13 09:31:37 +00:00
Ben Laurie
90c65a9838
J-PAKE is not experimental in HEAD.
2008-11-13 09:31:08 +00:00
Dr. Stephen Henson
5eba1ab346
Oops...
2008-11-12 19:02:25 +00:00
Dr. Stephen Henson
4e50072d56
mk1mf.pl update from stable branch.
2008-11-12 18:52:58 +00:00
Dr. Stephen Henson
dd9557a8ba
Revert another size_t change.
2008-11-12 18:47:24 +00:00
Dr. Stephen Henson
ed551cddf7
Update from stable branch.
2008-11-12 17:28:18 +00:00
Dr. Stephen Henson
5aca224ecd
Reinstate camellia header fix patch.
2008-11-12 17:02:40 +00:00
Andy Polyakov
dab6293482
Configure update: clean-ups and most notably engage x86_64 assembler
...
on MacOS X.
2008-11-12 08:21:20 +00:00
Andy Polyakov
1416aec60d
Update make rules for x86_64 assembler pack.
2008-11-12 08:19:04 +00:00
Andy Polyakov
aa8f38e49b
x86_64 assembler pack to comply with updated styling x86_64-xlate.pl rules.
2008-11-12 08:15:52 +00:00
Andy Polyakov
8525377265
x86_64-xlate.pl to support MacOS X and mingw64.
2008-11-12 08:05:58 +00:00
Andy Polyakov
2fbc8a2aad
Revert commit #17603 , it should have been part of #17617 .
2008-11-12 07:27:36 +00:00
Geoff Thorpe
6343829a39
Revert the size_t modifications from HEAD that had led to more
...
knock-on work than expected - they've been extracted into a patch
series that can be completed elsewhere, or in a different branch,
before merging back to HEAD.
2008-11-12 03:58:08 +00:00
Dr. Stephen Henson
2401debe83
Tolerate -----BEGIN PKCS #7 SIGNED DATA----- header lines as used by some
...
implementations.
2008-11-11 12:38:25 +00:00
Dr. Stephen Henson
5c61111bff
Update from stable branch.
2008-11-11 12:23:18 +00:00
Dr. Stephen Henson
bc645199c0
Update from stable branch.
2008-11-11 10:17:54 +00:00
Bodo Möller
0a8c9f7de1
symbol deobnoxification
2008-11-11 07:08:59 +00:00
Dr. Stephen Henson
7b808412c9
Make -DKSSL_DEBUG work again.
2008-11-10 19:08:37 +00:00
Lutz Jänicke
706c5a4d35
Clarify (non-)blocking behavior of EGD socket interface used by RAND_egd().
2008-11-10 11:26:44 +00:00
Dr. Stephen Henson
0afc9f5bc0
PR: 1777
...
Submitted by: "Alon Bar-Lev" <alon.barlev@gmail.com >
Approved by: steve@openssl.org
Fix some size_t issues.
2008-11-05 23:14:32 +00:00
Dr. Stephen Henson
2e5975285e
Update obsolete email address...
2008-11-05 18:39:08 +00:00
Dr. Stephen Henson
5947ca0409
Don't use clobbered 'i' for checking UTCTime and GeneralizedTime length.
2008-11-05 18:28:24 +00:00
Ben Laurie
d40a1b865f
Only one of these needs to be signed.
2008-11-04 15:16:23 +00:00
Ben Laurie
f80921b6a6
Formatting.
2008-11-04 12:06:09 +00:00
Andy Polyakov
9be5481297
Add initial support for mingw64.
...
PR: 1693
Submitted by: Alon Bar-Lev
2008-11-03 21:15:07 +00:00
Andy Polyakov
8fe8bae15a
Minor perlasm updates.
2008-11-03 08:46:07 +00:00
Dr. Stephen Henson
f2c0230518
Not sure about this one... seems to be needed to make 64 bit release
...
builds work properly...
2008-11-02 18:29:27 +00:00
Dr. Stephen Henson
e6e0c9018c
Fix prototypes.
2008-11-02 18:12:36 +00:00
Dr. Stephen Henson
9619b730b4
Use stddef.h to pick up size_t def.
2008-11-02 16:56:13 +00:00
Dr. Stephen Henson
2766515fca
Fix prototypes.
2008-11-02 16:13:19 +00:00
Dr. Stephen Henson
87d52468aa
Update HMAC functions to return an error where relevant.
2008-11-02 16:00:39 +00:00
Dr. Stephen Henson
70d71f6185
Fix warnings: printf format mismatches on 64 bit platforms.
...
Change assert to OPENSSL_assert().
Fix e_padlock prototype.
2008-11-02 15:41:30 +00:00
Ben Laurie
5ee92a5ec1
Fix asserts. Fix incorrect dependency.
2008-11-02 13:15:06 +00:00
Dr. Stephen Henson
c76fd290be
Fix warnings about mismatched prototypes, undefined size_t and value computed
...
not used.
2008-11-02 12:50:48 +00:00
Ben Laurie
d0a20cafa1
Fix warnings.
2008-11-02 09:22:29 +00:00
Ben Laurie
8da07655ee
Fix warning.
2008-11-02 09:00:25 +00:00
Andy Polyakov
befe1fbc29
Fix bss_log.c on Windows.
2008-11-01 21:09:54 +00:00
Ben Laurie
5e4430e70d
More size_tification.
2008-11-01 16:40:37 +00:00
Ben Laurie
4d6e1e4f29
size_tification.
2008-11-01 14:37:00 +00:00
Andy Polyakov
122396f2db
Fix SHA512 and optimize BN for mingw64.
2008-11-01 12:46:18 +00:00
Andy Polyakov
09a60c9833
Fix warnings after commit#17578.
2008-10-31 20:20:54 +00:00
Andy Polyakov
b444ac3e6f
size_t-fy EVP_CIPHER. Note that being size_t-fied it doesn't require
...
underlying cipher to be size_t-fied, it allows for size_t, signed and
unsigned long. It maintains source and even binary compatibility.
2008-10-31 19:48:25 +00:00
Andy Polyakov
f768be81d8
size_t-fy AES, Camellia and RC4.
2008-10-31 19:30:11 +00:00
Dr. Stephen Henson
91173829db
Add install target to crypto/jpake/Makefile
2008-10-31 12:06:25 +00:00
Ben Laurie
bfaead2b12
Fix warning.
2008-10-29 05:10:09 +00:00
Andy Polyakov
e6b4578540
randfile.c: .rnd can become orphaned on VMS.
...
Submitted by: David North
2008-10-28 16:25:47 +00:00
Andy Polyakov
0dd4850ee0
.cvsignore update: ignore all flavors of shared objects.
2008-10-28 15:29:25 +00:00
Andy Polyakov
c650168a4f
Fix typo in ./config.
...
Submitted by: Sander Temme
2008-10-28 15:09:06 +00:00
Andy Polyakov
ea71ec1b11
ec2_mult.c readability update.
2008-10-28 13:53:51 +00:00
Andy Polyakov
f1455b3063
Minor clean-up in bn_lib.c: constification and optimization.
2008-10-28 13:52:51 +00:00
Andy Polyakov
b764f82c64
Fix crash in BN_rshift.
...
PR: 1663
2008-10-28 13:46:14 +00:00
Andy Polyakov
436bdcff4e
Harmonize Camellia API with version 1.x.
2008-10-28 12:13:52 +00:00
Andy Polyakov
27f864e8ac
Camellia update. Quoting camellia.c:
...
/*
* This release balances code size and performance. In particular key
* schedule setup is fully unrolled, because doing so *significantly*
* reduces amount of instructions per setup round and code increase is
* justifiable. In block functions on the other hand only inner loops
* are unrolled, as full unroll gives only nominal performance boost,
* while code size grows 4 or 7 times. Also, unlike previous versions
* this one "encourages" compiler to keep intermediate variables in
* registers, which should give better "all round" results, in other
* words reasonable performance even with not so modern compilers.
*/
2008-10-28 08:47:24 +00:00
Andy Polyakov
80aa9cc985
x86_64-xlate.pl update: refine SEH support.
2008-10-28 08:40:07 +00:00
Dr. Stephen Henson
ab7e09f59b
Win32 fixes... add new directory to build system. Fix warnings.
2008-10-27 12:31:13 +00:00
Dr. Stephen Henson
e9eda23ae6
Fix warnings and various issues.
...
C++ style comments.
Signed/unsigned warning in apps.c
Missing targets in jpake/Makefile
2008-10-27 12:02:52 +00:00
Ben Laurie
6caa4edd3e
Add JPAKE.
2008-10-26 18:40:52 +00:00
Dr. Stephen Henson
ac786241a2
Add support for -crlnumber option in crl utility.
2008-10-22 19:54:55 +00:00
Dr. Stephen Henson
df0681e554
Add permanentIdentifier OID.
2008-10-22 18:48:11 +00:00
Dr. Stephen Henson
e19106f5fb
Create function of the form OBJ_bsearch_xxx() in bsearch typesafe macros
...
with the appropriate parameters which calls OBJ_bsearch(). A compiler will
typically inline this.
This avoids the need for cmp_xxx variables and fixes unchecked const issues
with CHECKED_PTR_OF()
2008-10-22 15:43:01 +00:00
Geoff Thorpe
ae7ec4c71d
Apparently '__top' is also risky, obfuscate further. (All this to
...
avoid inlines...)
2008-10-22 12:00:15 +00:00
Lutz Jänicke
020d67fb89
Allow detection of input EOF in quiet mode by adding -no_ign_eof option
...
to s_client application.
PR: #1761
Submitted by: David Woodhouse <dwmw2@infradead.org >
2008-10-22 06:46:14 +00:00
Geoff Thorpe
3fdc6c11aa
Use of a 'top' var creates "shadow variable" warnings.
2008-10-22 01:25:45 +00:00
Dr. Stephen Henson
dcf6b3e9b6
Reinstate obj_xref.h as it is not auto generated on all platforms.
2008-10-20 15:12:48 +00:00
Dr. Stephen Henson
606f6c477a
Fix a shed load or warnings:
...
Duplicate const.
Use of ; outside function.
2008-10-20 15:12:00 +00:00
Lutz Jänicke
1581f82243
Add missing "-d" to option list of openssl version.
...
Submitted by: Alex Chen <alex_chen@filemaker.com >
2008-10-20 12:53:36 +00:00
Ben Laurie
0d6f9c7181
Constification.
2008-10-19 22:51:27 +00:00
Dr. Stephen Henson
640b86cb24
Fix Warning...
2008-10-19 17:22:34 +00:00
Dr. Stephen Henson
111a6e2a23
Fix multiple ; warning.
2008-10-18 15:02:59 +00:00
Ben Laurie
d764e7edb8
Fix warning a different way.
2008-10-18 12:12:34 +00:00
Andy Polyakov
aff8259510
Fix argument order in BN_nnmod call and implement rigorous boundary
...
condition check.
2008-10-16 07:54:41 +00:00
Andy Polyakov
256b3e9c5f
Optimize bn_correct_top.
2008-10-15 10:48:52 +00:00
Andy Polyakov
762a2e3cab
Remove redundant BN_ucmp, fix boundary condition in BN_nist_mod_224 and
...
reimplement BN_nist_mod_521.
2008-10-15 10:47:48 +00:00
Ben Laurie
28b6d5020e
Set comparison function in v3_add_canonize().
2008-10-14 19:27:07 +00:00
Ben Laurie
d5bbead449
Add XMPP STARTTLS support.
2008-10-14 19:11:26 +00:00
Dr. Stephen Henson
0f7efbc859
Ooops... remove code accidentally commited from FIPS version.
2008-10-14 15:44:14 +00:00
Dr. Stephen Henson
a7ae4abfd9
Add missing lock definitions...
2008-10-14 15:24:49 +00:00
Dr. Stephen Henson
30661b1b01
Add missing lock definitions.
2008-10-14 15:22:11 +00:00
Ben Laurie
1ea6472e60
Type-safe OBJ_bsearch_ex.
2008-10-14 08:10:52 +00:00
Lutz Jänicke
b8dfde2a36
Remove the DTLS1_BAD_VER thing from 0.9.9-dev. It is present in 0.9.8
...
but has been omitted from HEAD (0.9.9), see commit
http://cvs.openssl.org/chngview?cn=16627
by appro.
2008-10-13 06:45:59 +00:00
Lutz Jänicke
570006f3a2
Half of the commit for 0.9.8 as the bitmap handling has changed.
...
(Firstly... ommitted)
Secondly, it wasn't even _dropping_ the offending packets, in the
non-blocking case. It was just returning garbage instead.
PR: #1752
Submitted by: David Woodhouse <dwmw2@infradead.org >
2008-10-13 06:43:03 +00:00
Ben Laurie
babb379849
Type-checked (and modern C compliant) OBJ_bsearch.
2008-10-12 14:32:47 +00:00
Ben Laurie
6665ef303e
Add missing DTLS1_BAD_VER (hope I got the value right).
2008-10-12 14:04:34 +00:00
Lutz Jänicke
7e7af0bc51
When the underlying BIO_write() fails to send a datagram, we leave the
...
offending record queued as 'pending'. The DTLS code doesn't expect this,
and we end up hitting an OPENSSL_assert() in do_dtls1_write().
The simple fix is just _not_ to leave it queued. In DTLS, dropping
packets is perfectly acceptable -- and even preferable. If we wanted a
service with retries and guaranteed delivery, we'd be using TCP.
PR: #1703
Submitted by: David Woodhouse <dwmw2@infradead.org >
2008-10-10 10:41:35 +00:00
Dr. Stephen Henson
87d3a0cd90
Experimental new date handling routines. These fix issues with X509_time_adj()
...
and should avoid any OS date limitations such as the year 2038 bug.
2008-10-07 22:55:27 +00:00
Lutz Jänicke
1e369b375e
Fix incorrect command for assember file generation on IA64
...
Submitted by: Amadeu A. Barbosa Jr <amadeu@tecgraf.puc-rio.br >
2008-10-06 10:34:49 +00:00
Andy Polyakov
6bf24568bc
Fix EC_KEY_check_key.
2008-09-23 17:33:11 +00:00
Bodo Möller
837f2fc7a4
Make sure that SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG can't
...
enable disabled ciphersuites.
2008-09-22 21:22:47 +00:00
Bodo Möller
1a489c9af1
From branch OpenSSL_0_9_8-stable: Allow soft-loading engines.
...
Also, fix CHANGES (consistency with stable branch).
2008-09-15 20:41:24 +00:00
Dr. Stephen Henson
8c864e5466
Add missing CHANGES entry.
2008-09-15 20:30:58 +00:00
Bodo Möller
be5707c820
from 0.9.8 branch
2008-09-15 20:30:17 +00:00
Dr. Stephen Henson
4a4f3071ec
Update FAQ.
2008-09-15 11:27:58 +00:00
Andy Polyakov
d7235a9d68
Fix yesterday typos in bss_dgram.c.
2008-09-15 05:43:04 +00:00
Geoff Thorpe
fa0f834c20
Fix build warnings.
2008-09-15 04:02:37 +00:00
Bodo Möller
96562f2fb3
update comment
2008-09-14 19:50:55 +00:00
Andy Polyakov
b9790c1cd4
Winsock handles SO_RCVTIMEO in unique manner...
...
PR: 1648
2008-09-14 19:22:52 +00:00
Bodo Möller
fcbdde0dfe
oops
2008-09-14 18:16:07 +00:00
Andy Polyakov
51ec776b7d
dtls1_write_bytes consumers expect amount of bytes written per call, not
...
overall.
PR: 1604
2008-09-14 17:56:15 +00:00
Bodo Möller
e65bcbcef0
Fix SSL state transitions.
...
Submitted by: Nagendra Modadugu
2008-09-14 14:02:07 +00:00
Bodo Möller
e710de12ce
Note about CVS branch inconsistency.
2008-09-14 13:53:18 +00:00
Bodo Möller
db99c52509
Really get rid of unsafe double-checked locking.
...
Also, "CHANGES" clean-ups.
2008-09-14 13:51:44 +00:00
Bodo Möller
f8d6be3f81
Some precautions to avoid potential security-relevant problems.
2008-09-14 13:42:34 +00:00
Andy Polyakov
d493899579
DTLS didn't handle alerts correctly.
...
PR: 1632
2008-09-13 18:24:38 +00:00
Andy Polyakov
492279f6f3
AIX build updates.
2008-09-12 14:45:54 +00:00
Dr. Stephen Henson
3ad74edce8
Add SSL_FIPS flag for FIPS 140-2 approved ciphersuites and add a new
...
strength "FIPS" to represent all FIPS approved ciphersuites without NULL
encryption.
2008-09-10 16:02:09 +00:00
Ben Laurie
2b7b1cad10
Ignoring errors in makedepend can hide problems.
2008-09-09 19:08:40 +00:00
Ben Laurie
43048d13c8
Fix warning.
2008-09-07 13:22:34 +00:00
Dr. Stephen Henson
e8da6a1d0f
Fix from stable branch.
2008-09-03 22:17:11 +00:00
Dr. Stephen Henson
305514000c
Do not discard cached handshake records during resumed sessions:
...
they are used for mac computation.
2008-09-03 12:36:16 +00:00
Dr. Stephen Henson
0702150f53
Make no-tlsext compile.
2008-09-03 12:29:57 +00:00
Dr. Stephen Henson
a0ee081515
Perl script to run and verify OpenSSL against PKITS RFC3280 compliance
...
test suite.
2008-09-01 15:53:53 +00:00
Dr. Stephen Henson
d43c4497ce
Initial support for delta CRLs. If "use deltas" flag is set attempt to find
...
a delta CRL in addition to a full CRL. Check and search delta in addition to
the base.
2008-09-01 15:15:16 +00:00
Dr. Stephen Henson
4b96839f06
Add support for CRLs partitioned by reason code.
...
Tidy CRL scoring system.
Add new CRL path validation error.
2008-08-29 11:37:21 +00:00
Dr. Stephen Henson
249a77f5fb
Add support for freshest CRL extension.
2008-08-27 15:52:05 +00:00
Dr. Stephen Henson
d0fff69dc9
Initial indirect CRL support.
2008-08-20 16:42:19 +00:00
Dr. Stephen Henson
8c9bd89338
Support for certificateIssuer CRL entry extension.
2008-08-18 16:48:47 +00:00
Bodo Möller
2e415778f2
Don't use assertions to check application-provided arguments;
...
and don't unnecessarily fail on input size 0.
2008-08-14 21:37:51 +00:00
Bodo Möller
1cbf663a6c
sanity check
...
PR: 1679
2008-08-13 19:45:06 +00:00
Bodo Möller
9be8035b11
fix error function codes
2008-08-13 19:44:15 +00:00
Bodo Möller
2ecd2edede
Mention ERR_remove_state() deprecation, and ERR_remove_thread_state(NULL).
2008-08-13 19:30:01 +00:00
Dr. Stephen Henson
9d84d4ed5e
Initial support for CRL path validation. This supports distinct certificate
...
and CRL signing keys.
2008-08-13 16:00:11 +00:00
Dr. Stephen Henson
2e0c7db950
Initial code to support distinct certificate and CRL signing keys where the
...
CRL issuer is not part of the main path.
Not complete yet and not compiled in because the CRL issuer certificate is
not validated.
2008-08-12 16:07:52 +00:00
Dr. Stephen Henson
002e66c0e8
Support for policy mappings extension.
...
Delete X509_POLICY_REF code.
Fix handling of invalid policy extensions to return the correct error.
Add command line option to inhibit policy mappings.
2008-08-12 10:32:56 +00:00
Dr. Stephen Henson
e9746e03ee
Initial support for name constraints certificate extension.
...
TODO: robustness checking on name forms.
2008-08-08 15:35:29 +00:00
Geoff Thorpe
ab9c689ad3
Correct the FAQ and the threads man page re: CRYPTO_THREADID changes.
2008-08-06 16:41:50 +00:00
Geoff Thorpe
4c3296960d
Remove the dual-callback scheme for numeric and pointer thread IDs,
...
deprecate the original (numeric-only) scheme, and replace with the
CRYPTO_THREADID object. This hides the platform-specifics and should reduce
the possibility for programming errors (where failing to explicitly check
both thread ID forms could create subtle, platform-specific bugs).
Thanks to Bodo, for invaluable review and feedback.
2008-08-06 15:54:15 +00:00
Andy Polyakov
96826bfc84
sha1-armv4-large cosmetics.
2008-08-06 08:58:45 +00:00
Andy Polyakov
eb1aa135d8
sha1-armv4-large.pl performance improvement. On PXA255 it gives +10% on
...
8KB block, +60% on 1KB, +160% on 256B...
2008-08-06 08:47:07 +00:00
Geoff Thorpe
99649b5990
Fix signed/unsigned warning.
2008-08-05 17:48:02 +00:00
Dr. Stephen Henson
6d6c47980e
Correctly handle errors in CMS I/O code.
2008-08-05 15:55:53 +00:00
Bodo Möller
474b3b1cc8
Fix error codes for memory-saving patch.
...
Also, get rid of compile-time switch OPENSSL_NO_RELEASE_BUFFERS
because it was rather pointless (the new behavior has to be explicitly
requested by setting SSL_MODE_RELEASE_BUFFERS anyway).
2008-08-04 22:10:38 +00:00
Dr. Stephen Henson
3e727a3b37
Add support for nameRelativeToCRLIssuer field in distribution point name
...
fields.
2008-08-04 15:34:27 +00:00
Dr. Stephen Henson
a9ff742e42
Make explicit_policy handling match expected RFC3280 behaviour.
2008-08-02 11:16:35 +00:00
Lutz Jänicke
787287af40
Refer to SSL_pending from the man page for SSL_read
2008-08-01 15:03:20 +00:00
Dr. Stephen Henson
5cbd203302
Initial support for alternative CRL issuing certificates.
...
Allow inibit any policy flag to be set in apps.
2008-07-30 15:49:12 +00:00
Dr. Stephen Henson
592a207b94
Policy validation fixes.
...
Inhibit any policy count should ignore self issued certificates.
Require explicit policy is the number certificate before an explict policy
is required.
2008-07-30 15:41:42 +00:00
Ralf S. Engelschall
6bcbac0abb
remove a doubled entry for '-binary' in the usage message
2008-07-27 15:51:35 +00:00
Andy Polyakov
4c048211f1
Split ms/uplink.pl to corresponding platform versions.
2008-07-22 08:47:35 +00:00
Andy Polyakov
b94551e823
perlasm update: implement dataseg directive.
2008-07-22 08:44:31 +00:00
Andy Polyakov
9b634c9b37
x86_64-xlate.pl: implement indirect jump/calls, support for Win64 SEH.
2008-07-22 08:42:06 +00:00
Bodo Möller
5b331ab77a
We should check the eight bytes starting at p[-9] for rollback attack
...
detection, or the probability for an erroneous RSA_R_SSLV3_ROLLBACK_ATTACK
will be larger than necessary.
PR: 1695
2008-07-17 22:11:53 +00:00
Andy Polyakov
dd6f479ea8
mem_dbg.c: avoid compiler warnings.
...
PR: 1693
Submitted by: Stefan Neis
2008-07-17 13:58:21 +00:00
Andy Polyakov
87facba376
Remove junk argument to function_begin in sha/asm/*-586.pl.
...
PR: 1681
2008-07-17 09:50:56 +00:00
Andy Polyakov
e4662fdb62
x86masm.pl: harmonize functions' alignment.
2008-07-17 09:46:09 +00:00
Bodo Möller
efa73a77e4
Make sure not to read beyond end of buffer
2008-07-16 18:10:27 +00:00
Andy Polyakov
89778b7f3f
x86_64cpuid.pl cosmetics: harmonize $dir treatment with other modules.
2008-07-15 19:52:20 +00:00
Andy Polyakov
c79c5a256b
des-596.pl update: short-circuit reference to DES_SPtrans.
2008-07-15 13:24:16 +00:00
Andy Polyakov
9960bdc6fa
x86masm.pl cosmetics.
2008-07-15 13:16:42 +00:00
Andy Polyakov
23dcb447ff
x86nasm.pl update: use pre-defined macros and allow for /safeseh link.
2008-07-15 12:50:44 +00:00
Andy Polyakov
39c63e162c
Reaffirm that NASM is the only supported assembler for Win32 build.
2008-07-15 12:48:53 +00:00
Dr. Stephen Henson
34d05a4023
Zero is a valid value for any_skip and map_skip
2008-07-13 22:38:18 +00:00
Dr. Stephen Henson
dcc0c29876
We support inhibit any policy extension, add to table.
2008-07-13 15:55:37 +00:00
Dr. Stephen Henson
db50661fce
X509 verification fixes.
...
Ignore self issued certificates when checking path length constraints.
Duplicate OIDs in policy tree in case they are allocated.
Use anyPolicy from certificate cache and not current tree level.
2008-07-13 14:25:36 +00:00
Geoff Thorpe
f9afd9f861
If --prefix="C:\foo\bar" is supplied to Configure for a windows target,
...
then the backslashes need escaping to avoid being treated as switches in
the auto-generated strings in opensslconf.h. Perl users are welcome to
suggest a less hokey way of doing this ...
2008-07-10 20:08:47 +00:00
Dr. Stephen Henson
d4cdbab99b
Avoid warnings with -pedantic, specifically:
...
Conversion between void * and function pointer.
Value computed not used.
Signed/unsigned argument.
2008-07-04 23:12:52 +00:00
Geoff Thorpe
5f834ab123
Revert my earlier CRYPTO_THREADID commit, I will commit a reworked
...
version some time soon.
2008-07-03 19:59:25 +00:00
Dr. Stephen Henson
8528128b2a
Update from stable branch.
2008-06-26 23:27:31 +00:00
Dr. Stephen Henson
a0f3679b52
Update from stable branch.
2008-06-25 10:43:07 +00:00
Bodo Möller
8228fd89fc
avoid potential infinite loop in final reduction round of BN_GF2m_mod_arr()
...
Submitted by: Huang Ying
Reviewed by: Douglas Stebila
2008-06-23 20:46:24 +00:00
Dr. Stephen Henson
869eb9e767
Update ordinals.
2008-06-22 01:09:14 +00:00
Dr. Stephen Henson
6c2878344f
Fix from stable branch.
2008-06-21 23:28:55 +00:00
Dr. Stephen Henson
2836cb3816
Update from stable branch.
2008-06-18 15:08:41 +00:00
Dr. Stephen Henson
46d4782888
Update from stable branch.
2008-06-18 12:06:10 +00:00
Dr. Stephen Henson
a01a351cc2
Update from stable branch.
2008-06-16 15:51:48 +00:00
Dr. Stephen Henson
adb92d56eb
Add acknowledgement.
2008-06-09 16:48:42 +00:00
Dr. Stephen Henson
ce04f91951
Sync ordinals.
2008-06-06 15:57:16 +00:00
Dr. Stephen Henson
6cb9fca70d
Fix memory leak. The canonical X509_NAME_ENTRY STACK is reallocated rather
...
than referencing existing X509_NAME_ENTRY structures so needs to be
completely freed.
2008-06-06 11:26:07 +00:00
Dr. Stephen Henson
ec0bfca7e7
Remove uidlg library from VC-32.pl, it is now bound at runtime.
2008-06-05 23:42:04 +00:00
Dr. Stephen Henson
1cd504e7be
Don't change _WIN32_WINNT and detect GetConsoleWindow() and
...
CryptUIDlgSelectCertificateFromStore() at runtime. Add callback function
for selection mechanism.
2008-06-05 23:19:56 +00:00
Dr. Stephen Henson
11f3cee93b
Update from stable branch.
2008-06-05 17:04:16 +00:00
Dr. Stephen Henson
6bf79e30ea
Update CHANGES.
2008-06-05 15:34:24 +00:00
Dr. Stephen Henson
7555c9337f
Update from stable branch.
2008-06-05 15:13:45 +00:00
Dr. Stephen Henson
ffc2b3e927
Update from stable branch.
2008-06-05 11:45:25 +00:00
Dr. Stephen Henson
9ab89286a2
Sync ordinals with stable branch.
2008-06-05 11:10:49 +00:00
Dr. Stephen Henson
5329130333
Link in extra CryptoAPI related libraries if needed.
2008-06-05 10:51:48 +00:00
Dr. Stephen Henson
e1451bb51d
Update from stable branch.
2008-06-04 23:03:28 +00:00
Dr. Stephen Henson
0b44c26d78
Remove test fprintf.
2008-06-04 22:39:05 +00:00
Dr. Stephen Henson
4db9677bac
Compilation option to use a specific ssl client auth engine automatically.
2008-06-04 22:34:38 +00:00
Dr. Stephen Henson
1381bf90f4
Use an appropriate Window for selection dialog.
2008-06-04 16:45:05 +00:00
Dr. Stephen Henson
e0f7b87227
Add support for Windoes dialog box based certificate selection.
2008-06-04 16:10:09 +00:00
Dr. Stephen Henson
985de86340
Remove old non-safestack code.
2008-06-04 14:34:39 +00:00
Dr. Stephen Henson
b814c01a76
Tidy up and add comments to selection code.
2008-06-04 12:03:57 +00:00
Dr. Stephen Henson
c07a126fb2
Make DSO WIN32 compile again.
2008-06-04 11:53:14 +00:00
Dr. Stephen Henson
09a6e19431
Update ordinals.
2008-06-04 11:52:36 +00:00
Dr. Stephen Henson
863d447e0b
Remove store from Windows build.
2008-06-04 11:45:15 +00:00
Ben Laurie
5ce278a77b
More type-checking.
2008-06-04 11:01:43 +00:00
Dr. Stephen Henson
37cf49a3df
Avoid name clash.
2008-06-04 10:57:38 +00:00
Ben Laurie
f79262e94b
Only include windows headers when under windows.
2008-06-04 05:21:13 +00:00
Dr. Stephen Henson
7d537d4fc7
Add initial support for multiple SSL client certifcate selection in
...
CryptoAPI ENGINE.
2008-06-03 23:54:31 +00:00
Dr. Stephen Henson
ca89fc1fb4
Match empty CA list to anything for ssl client auth in CryptoAPI engine.
2008-06-03 11:37:52 +00:00
Dr. Stephen Henson
59d2d48f64
Add support for client cert engine setting in s_client app.
...
Add appropriate #ifdefs round client cert functions in headers.
2008-06-03 11:26:27 +00:00
Dr. Stephen Henson
b3c8dd4eab
Add preliminary SSL client auth callback to CryptoAPI ENGINE.
2008-06-03 10:27:39 +00:00
Dr. Stephen Henson
45d3767d28
Prevent signed/unsigned warning on VC++
2008-06-03 10:17:45 +00:00
Ben Laurie
8671b89860
Memory saving patch.
2008-06-03 02:48:34 +00:00
Dr. Stephen Henson
4f7f411719
Update year.
2008-06-02 23:41:38 +00:00
Dr. Stephen Henson
eac442ddd3
Windows batch file to rebuild error codes for CryptoAPI ENGINE.
2008-06-02 23:10:34 +00:00
Dr. Stephen Henson
55bef26d8a
#undef OCSP_RESPONSE: CryptoAPI uses this too.
2008-06-02 23:09:04 +00:00
Dr. Stephen Henson
2aa2a5775f
Fix indentation.
2008-06-02 14:29:32 +00:00
Dr. Stephen Henson
c451bd828f
Avoid case in ca.c fix.
2008-06-02 12:10:06 +00:00
Dr. Stephen Henson
8ecfbedd85
Revert, doesn't fix warning :-(
2008-06-02 10:42:57 +00:00
Dr. Stephen Henson
c173fce4e2
Avoid cast with wrapper function.
2008-06-02 10:37:53 +00:00
Dr. Stephen Henson
953174f46e
Free old store name (if any).
2008-06-01 23:45:11 +00:00
Dr. Stephen Henson
c621c7e432
Add ctrl for alternative certificate store names.
2008-06-01 23:42:49 +00:00
Dr. Stephen Henson
2bbe8f9129
Use keyspec for DSA too.
2008-06-01 23:28:17 +00:00
Dr. Stephen Henson
4be0a5d429
Get and note keyspec when signing.
2008-06-01 23:24:53 +00:00
Dr. Stephen Henson
bdfe932dca
Release engine reference when calling SSL_CTX_free().
2008-06-01 23:06:48 +00:00
Dr. Stephen Henson
3fc59c8406
Allow ENGINE client cert callback to specify a set of other certs, for
...
the rest of the certificate chain. Currently unused.
2008-06-01 22:45:08 +00:00
Dr. Stephen Henson
c61915c659
Update error codes.
2008-06-01 22:34:40 +00:00
Dr. Stephen Henson
368888bcb6
Add client cert engine to SSL routines.
2008-06-01 22:33:24 +00:00
Dr. Stephen Henson
eafd6e5110
Update error codes, move typedef of SSL, SSL_CTX to ossl_typ.h
2008-06-01 21:18:47 +00:00
Dr. Stephen Henson
05935c47b2
Add support for ENGINE supplied SSL client auth.
2008-06-01 21:10:30 +00:00
Dr. Stephen Henson
d8bd55a364
Update from stable branch.
2008-06-01 11:07:34 +00:00
Dr. Stephen Henson
841c91d6e4
Update from stable branch.
2008-05-31 23:48:02 +00:00
Dr. Stephen Henson
a4792168ec
Update VC-32.pl and load CryptoAPI engine in the right place.
2008-05-31 23:21:40 +00:00
Dr. Stephen Henson
90b96776cd
More CryptoAPI engine code from stable branch.
2008-05-31 22:53:16 +00:00
Dr. Stephen Henson
408f906592
Add CryptoAPI error file too.
2008-05-31 22:50:00 +00:00
Dr. Stephen Henson
7a18ecb2df
Add CryptoAPI ENGINE from stable branch.
2008-05-31 22:49:32 +00:00
Dr. Stephen Henson
174c86a216
Recognize LHASH_OF().
2008-05-31 21:20:53 +00:00
Dr. Stephen Henson
c6ddacf7f8
Stop const mismatch warning.
2008-05-31 19:28:57 +00:00
Dr. Stephen Henson
ab3eafd5b5
Stop warning about extra ';' outside of function.
2008-05-31 19:17:25 +00:00
Dr. Stephen Henson
dd043cd501
Stop const mismatch warning in VC++.
2008-05-31 18:55:23 +00:00
Bodo Möller
a75c662fd1
Everyone's had a few years to port their favorite additions to 0.9.7
...
to HEAD (and the 0.9.8 branch). Remove the reminder.
2008-05-31 13:42:53 +00:00
Dr. Stephen Henson
83574cf808
Fix from stable branch.
2008-05-30 10:57:49 +00:00
Bodo Möller
2cd81830ef
sync with 0.9.8 branch
2008-05-28 22:30:28 +00:00
Bodo Möller
e194fe8f47
From HEAD:
...
Fix flaw if 'Server Key exchange message' is omitted from a TLS
handshake which could lead to a cilent crash as found using the
Codenomicon TLS test suite (CVE-2008-1672)
Reviewed by: openssl-security@openssl.org
Obtained from: mark@awe.com
2008-05-28 22:17:34 +00:00
Bodo Möller
40a706286f
From HEAD:
...
Fix double-free in TLS server name extensions which could lead to a remote
crash found by Codenomicon TLS test suite (CVE-2008-0891)
Reviewed by: openssl-security@openssl.org
Obtained from: jorton@redhat.com
2008-05-28 22:15:48 +00:00
Bodo Möller
c6f6c380c7
grammar
2008-05-27 18:43:20 +00:00
Bodo Möller
8f395e0f4d
year 2008
2008-05-27 18:41:09 +00:00
Dr. Stephen Henson
595852f3b5
Avoid "duplicate const" warnings.
2008-05-27 11:44:03 +00:00
Dr. Stephen Henson
0a56761f19
Avoid warning about empty structures and always define CHECKED_PTR_OF
2008-05-27 11:28:49 +00:00
Dr. Stephen Henson
220903f92e
C++ style comments fixed.
2008-05-26 15:39:36 +00:00
Ben Laurie
3c1d6bbc92
LHASH revamp. make depend.
2008-05-26 11:24:29 +00:00
Lutz Jänicke
cab14b9803
Add README about removed root CA certificates.
2008-05-26 06:23:57 +00:00
Lutz Jänicke
17a4a4dff8
Reword comment to be much shorter to stop other people from complaining
...
about "overcommenting".
2008-05-26 06:21:13 +00:00
Lutz Jänicke
c2c2e7a438
Clear error queue when starting SSL_CTX_use_certificate_chain_file
...
PR: 1417, 1513
Submitted by: Erik de Castro Lopo <mle+openssl@mega-nerd.com >
2008-05-23 10:37:52 +00:00
Lutz Jänicke
d18ef847f4
Remove all root CA files (beyond test CAs including private key)
...
from the OpenSSL distribution.
2008-05-23 08:59:23 +00:00
Dr. Stephen Henson
5c0d90a699
Typo.
2008-05-20 18:49:00 +00:00
Dr. Stephen Henson
f434730524
Typo.
2008-05-20 16:13:57 +00:00
Dr. Stephen Henson
65fd877515
Update ordinals.
2008-05-20 12:23:38 +00:00
Dr. Stephen Henson
64ddafc6b6
Update from stable branch.
2008-05-20 11:52:57 +00:00
Dr. Stephen Henson
781f0a9bb5
Fix from stable branch.
2008-05-20 11:30:27 +00:00
Lutz Jänicke
3de5a7745f
Correctly adjust location of comment
...
Submitted by: Ben Laurie <ben@links.org >
2008-05-20 08:10:48 +00:00
Dr. Stephen Henson
94fd382f8b
Fix two invalid memory reads in RSA OAEP mode.
...
Submitted by: Ivan Nestlerode <inestlerode@us.ibm.com >
Reviewed by: steve
2008-05-19 21:33:55 +00:00
Bodo Möller
4bd4afa34e
Change use of CRYPTO_THREADID so that we always use both the ulong and
...
ptr members.
(So if the id_callback is bogus, we still have &errno.)
2008-05-19 20:45:25 +00:00
Bodo Möller
148bb9515c
Disable code that clearly doesn't currently serve any useful purpose.
...
(Buggy line reported by Matthias Koenig.)
2008-05-19 19:44:45 +00:00
Lutz Jänicke
51e00db226
Document "openssl s_server" -crl_check* options
...
Submitted by: Daniel Black <daniel.subs@internode.on.net >
2008-05-19 07:52:15 +00:00
Lutz Jänicke
a92ebf2290
Provide information about "openssl dgst" -hmac option.
2008-05-19 07:43:34 +00:00
Lutz Jänicke
f49c687507
Typo. (From 0.9.8-stable/S. Henson)
...
PR: 1672
2008-05-19 06:21:05 +00:00
Lutz Jänicke
8b99c79fae
Another occurance of possible valgrind/purify "uninitialized memory"
...
complaint related to the PRNG: with PURIFY policy don't feed uninitialized
memory into the PRNG.
Submitted by: Bodo Moeller <bmoeller@openssl.org > :-)
2008-05-16 07:14:26 +00:00
Dr. Stephen Henson
718f8f7a9e
Fix from stable branch.
2008-05-12 16:24:31 +00:00
Dr. Stephen Henson
e718520cc5
Add missing cast.
2008-05-09 23:16:24 +00:00
Andy Polyakov
4f46934269
Depict future Win64/x64 development.
2008-05-03 18:34:59 +00:00
Bodo Möller
fabe640f5e
Clarifying comment.
2008-05-02 18:47:48 +00:00
Dr. Stephen Henson
19048b5c8d
New function CMS_add1_crl().
2008-05-02 17:27:01 +00:00
Dr. Stephen Henson
156ee88285
Indicate support for digest init ctrl.
2008-05-02 11:24:40 +00:00
Dr. Stephen Henson
c386f8ac38
Typo.
2008-05-01 23:35:36 +00:00
Dr. Stephen Henson
4a954b56c9
Use "cont" consistently in cms-examples.pl
...
Add a -certsout option to output any certificates in a message.
Add test for example 4.11
2008-05-01 23:30:06 +00:00
Bodo Möller
d05a474556
Montgomery-related minor cleanups/documentation
2008-05-01 18:48:20 +00:00
Dr. Stephen Henson
8a2062fefe
Update from stable branch.
2008-04-30 16:14:02 +00:00
Dr. Stephen Henson
2f63ad5b35
Update from stable branch.
2008-04-29 17:22:35 +00:00
Dr. Stephen Henson
c78bba2343
Oops!
2008-04-29 16:46:46 +00:00
Dr. Stephen Henson
d26c905c67
Update from stable branch.
2008-04-29 16:44:51 +00:00
Dr. Stephen Henson
8fcc9caecc
Update from stable branch.
2008-04-29 16:39:03 +00:00
Geoff Thorpe
e7b097f558
Fix auto-discovery of ENGINEs. See the CHANGES entry for details (and/or
...
ticket #1668 ).
PR: 1668
Submitted by: Ian Lister
Reviewed by: Geoff Thorpe
2008-04-28 21:39:09 +00:00
Geoff Thorpe
5ee6f96cea
Paul Sheer optimised the OpenSSL to/from libGMP conversions for the case
...
where they both use the same limb size. I've tweaked his patch slightly, so
blame me if it breaks.
Submitted by: Paul Sheer
Reviewed by: Geoff Thorpe
2008-04-27 18:41:23 +00:00
Dr. Stephen Henson
dc634aff25
Don't send zero length session ID if stateless session resupmtion is
...
successful. Check be seeing if there is a cache hit.
2008-04-25 16:27:04 +00:00
Dr. Stephen Henson
8e3b2dbb31
Disable debugging fprintf.
2008-04-25 11:33:32 +00:00
Andy Polyakov
ba6f95e81b
Add 64-bit support to BN_nist_mod_244 and engage BN_nist_mod_* on 64-bit
...
platforms.
2008-04-24 10:04:26 +00:00
Andy Polyakov
281066cb03
Compensate inline assembler in sha512.c for gcc 2.7.2 compiler bug.
...
PR: 1667
2008-04-24 09:59:45 +00:00
Andy Polyakov
830b8877ba
Takanori Yanagisawa has shown how to correctly use pre-computed values.
...
So in a sense this commit reverts few latest ones fixing bugs in original
code and improving it, most notably adding 64-bit support [though not in
BN_nist_mod_224 yet].
PR: 1593
2008-04-23 08:10:25 +00:00
Andy Polyakov
9912ab6770
Resolve __DECC warning and keep disclaiming support for 16-bit platforms.
2008-04-18 15:47:30 +00:00
Andy Polyakov
299ab428ce
Fix remaining BN_nist_mod_*.
...
PR: 1593
2008-04-18 15:40:57 +00:00
Dr. Stephen Henson
e6ef05d5f3
Make certs argument work in CMS_sign() add test case.
...
PR:1664
2008-04-18 11:18:20 +00:00
Lutz Jänicke
0f401ff08b
Add missing 'extern "C" {' to some _err.h files in crypto/engines/
...
PR: 1609
2008-04-18 07:43:26 +00:00
Lutz Jänicke
5558128541
Another minor update from the mingw development
...
PR: 1552
Submitted by: Roumen Petrov <openssl@roumenpetrov.info >
2008-04-18 06:35:55 +00:00
Richard Levitte
e33c72dfc6
Synchronise with Unix.
2008-04-18 06:04:03 +00:00
Lutz Jänicke
44a877aa88
Fix incorrect return value in apps/apps.c:parse_yesno()
...
PR: 1607
Submitted by: "Christophe Macé" <mace.christophe@gmail.com >
2008-04-17 14:15:27 +00:00
Lutz Jänicke
6b6fe3d8e4
Correctly handle case of bad arguments supplied to rsautl
...
PR: 1659
2008-04-17 13:36:13 +00:00
Lutz Jänicke
4c1a6e004a
Apply mingw patches as supplied by Roumen Petrov an Alon Bar-Lev
...
PR: 1552
Submitted by: Roumen Petrov <openssl@roumenpetrov.info >, "Alon Bar-Lev" <alon.barlev@gmail.com >
2008-04-17 10:19:16 +00:00
Richard Levitte
6e6ada18c6
Further synchronisation with Unix build. I hadn't noticed pq_compat.h
...
was gone...
2008-04-12 08:41:05 +00:00
Richard Levitte
b35a131069
Provide other forms for symbols that are too long or that clash with others
2008-04-12 08:40:01 +00:00
Dr. Stephen Henson
1728756255
Detached encrypt/decrypt example, fix decrypt sample.
2008-04-11 23:52:26 +00:00
Dr. Stephen Henson
a12a6b9962
Correct argument order for CMS_decrypt() in docs.
2008-04-11 23:49:03 +00:00
Dr. Stephen Henson
852bd35065
Fix prototype for CMS_decrypt(), don't free up detached content.
2008-04-11 23:45:52 +00:00
Dr. Stephen Henson
a5db50d005
Revert argument swap change... oops CMS_uncompress() was consistent...
2008-04-11 23:23:18 +00:00
Dr. Stephen Henson
f3eba36c4c
Fix comments.
2008-04-11 17:50:20 +00:00
Dr. Stephen Henson
529d329ce1
Make CMS_uncompress() argument order consistent with other functions.
2008-04-11 17:34:13 +00:00
Dr. Stephen Henson
47a6d388c7
CMS compressed data examples.
2008-04-11 17:33:29 +00:00
Dr. Stephen Henson
c02b6b6b21
Fix for compression and updated CMS_final().
2008-04-11 17:07:01 +00:00
Dr. Stephen Henson
3b28bc9910
PKCS#7 examples converted to CMS.
2008-04-11 16:52:45 +00:00
Richard Levitte
fc003bcecb
Synchronise with Unix build
2008-04-11 01:53:16 +00:00
Dr. Stephen Henson
38d3a73808
Reformat, fix typos and clarify CMS API docs.
2008-04-10 23:28:25 +00:00
Dr. Stephen Henson
73b3c2d861
Correct HISTORY reference.
2008-04-10 15:59:40 +00:00
Dr. Stephen Henson
4670e00ff5
Typo.
2008-04-10 15:56:27 +00:00
Dr. Stephen Henson
287df2fe49
Add docs for CMS_final() and BIO_new_CMS().
2008-04-10 11:55:57 +00:00
Dr. Stephen Henson
e0fbd07309
Add additional parameter to CMS_final() to handle detached content.
2008-04-10 11:22:14 +00:00
Dr. Stephen Henson
eaee098e1f
Ignore nonsensical flags for signed receipts.
2008-04-10 11:12:42 +00:00
Dr. Stephen Henson
43d9e9d07f
Add CMS signed receipt genration and verification docs.
2008-04-10 11:00:47 +00:00
Dr. Stephen Henson
c420fab52b
Spellcheck CMS docs.
2008-04-10 10:46:11 +00:00
Dr. Stephen Henson
6469a1fda3
Signed receipt request function documentation.
2008-04-09 23:13:49 +00:00
Dr. Stephen Henson
7f50d9a4b0
Correct references to smime in cms app.
2008-04-09 22:09:45 +00:00
Dr. Stephen Henson
da6ea110b5
Update docs.
2008-04-09 20:59:45 +00:00
Dr. Stephen Henson
fb777e1f79
Add CMS_uncompress manual page.
2008-04-09 20:55:55 +00:00
Dr. Stephen Henson
360bb61d86
Add CMS_compress() docs.
2008-04-09 17:04:36 +00:00
Dr. Stephen Henson
847e551f39
More CMS API documentation.
2008-04-09 16:08:16 +00:00
Andy Polyakov
d4122504a2
Clarifying comment.
2008-04-09 12:06:42 +00:00
Andy Polyakov
2c4226c42b
Do BN_nist_mod_384 by the book, as cheating doesn't work. Other functions
...
will be revised too.
PR: 1593
2008-04-09 11:36:04 +00:00
Dr. Stephen Henson
86173db853
Fix various typos, update SMIMECapabilities description.
2008-04-08 22:44:56 +00:00
Dr. Stephen Henson
9034c56c6c
Correct d2i/i2d typos.
2008-04-08 22:35:32 +00:00
Dr. Stephen Henson
e33ffaca12
Initial CMS API documentation.
2008-04-08 22:27:10 +00:00
Dr. Stephen Henson
853eae51e0
Implement CMS_NOCRL.
2008-04-07 11:00:44 +00:00
Lutz Jänicke
b4be380889
Fix URI of OpenSSL Request Tracker information
...
PR: 1661
2008-04-07 06:37:05 +00:00
Dr. Stephen Henson
ff80280b01
Set contentType attribute just before signing to allow encapsulated content
...
type to be set at any time in applications.
2008-04-06 16:29:47 +00:00
Dr. Stephen Henson
e45641bd17
Fix typo and add header files to err library.
2008-04-06 15:53:29 +00:00
Dr. Stephen Henson
d5a37b0293
Give consistent return value and add error code for duplicate certificates.
2008-04-06 15:41:25 +00:00
Dr. Stephen Henson
6819050722
Delete nonexistant function from pkcs7.h header file. WIN32 build fix from
...
stable branch. Sync and update ordinals.
2008-04-04 00:06:43 +00:00
Dr. Stephen Henson
88db4e6b9e
Make mk1mf.pl recognize no-cms.
2008-04-03 23:29:15 +00:00
Dr. Stephen Henson
be86dd85e4
Rename runex.pl to cms-examples.pl
2008-04-03 23:25:43 +00:00
Dr. Stephen Henson
3df9357103
Update CHANGES.
2008-04-02 11:44:00 +00:00
Dr. Stephen Henson
992e92a46e
Update CHANGES.
2008-04-02 11:24:22 +00:00
Dr. Stephen Henson
3247812e34
Since OID NIDs with 0.9.8.
2008-04-02 10:48:34 +00:00
Dr. Stephen Henson
a5cdb7d5bd
Avoid warnings.
2008-04-01 16:29:42 +00:00
Dr. Stephen Henson
4a6bb116c4
Add signed receipt tests.
2008-04-01 15:16:15 +00:00
Andy Polyakov
2819ffb520
Fix fast reduction on NIST curves (as well BN_NIST_ADD_ONE macro).
...
PR: 1593
2008-04-01 08:39:08 +00:00
Dr. Stephen Henson
964c7e8f6d
Fix it properly this time....
2008-03-31 18:21:30 +00:00
Dr. Stephen Henson
f6a45ac5ac
Fix macro.
2008-03-31 18:14:10 +00:00
Dr. Stephen Henson
2e86f0d8d7
Use correct headers for signed receipts. Use consistent naming.
...
Update cms-test.pl to support OpenSSL 0.9.8.
2008-03-31 15:03:55 +00:00
Dr. Stephen Henson
e2a29d49ca
Update dependencies.
2008-03-29 21:11:25 +00:00
Dr. Stephen Henson
b99674103d
Remove unnecessary header.
2008-03-29 21:08:37 +00:00
Dr. Stephen Henson
41f81a0143
Update docs.
2008-03-29 00:54:24 +00:00
Dr. Stephen Henson
36309aa2be
Signed receipt generation code.
2008-03-28 19:43:16 +00:00
Dr. Stephen Henson
eb9d8d8cd4
Support for verification of signed receipts.
2008-03-28 13:15:39 +00:00
Geoff Thorpe
f7ccba3edf
There was a need to support thread ID types that couldn't be reliably cast
...
to 'unsigned long' (ie. odd platforms/compilers), so a pointer-typed
version was added but it required portable code to check *both* modes to
determine equality. This commit maintains the availability of both thread
ID types, but deprecates the type-specific accessor APIs that invoke the
callbacks - instead a single type-independent API is used. This simplifies
software that calls into this interface, and should also make it less
error-prone - as forgetting to call and compare *both* thread ID accessors
could have led to hard-to-debug/infrequent bugs (that might only affect
certain platforms or thread implementations). As the CHANGES note says,
there were corresponding deprecations and replacements in the
thread-related functions for BN_BLINDING and ERR too.
2008-03-28 02:49:43 +00:00
Geoff Thorpe
eb77ebe26c
Update tunala so it builds ok with OPENSSL_NO_DEPRECATED, and improve the
...
autoungunk.sh logic (autobits have grown since I last tried this...).
2008-03-28 01:56:08 +00:00
Dr. Stephen Henson
f5e2354c9d
Add support for signed receipt request printout and generation.
2008-03-26 17:40:22 +00:00
Dr. Stephen Henson
f4cc56f494
Signed Receipt Request utility functions and option on CMS utility to
...
print out receipt requests.
2008-03-26 13:10:21 +00:00
Dr. Stephen Henson
be86c7fc87
Add signed receipt ASN1 structures. Initial GENERAL_NAME utility functions.
2008-03-24 22:14:02 +00:00
Dr. Stephen Henson
6205171362
Add support for CMS structure printing in cms utility.
2008-03-24 21:53:07 +00:00
Dr. Stephen Henson
ab568a17cf
Fix duplicate asn1 ctrl values.
2008-03-23 14:13:45 +00:00
Dr. Stephen Henson
fe591284be
Update dependencies.
2008-03-22 18:52:03 +00:00
Dr. Stephen Henson
7122aafce5
Preliminary documentation for CMS utility.
2008-03-21 13:09:26 +00:00
Geoff Thorpe
5ffba305c8
Comment out a (currently) unused CMS function. (Sorry Steve, but I need
...
-Werror right now to help me code-by-domino :-)
2008-03-19 23:08:20 +00:00
Geoff Thorpe
ceee538af5
Fork my debug configuration into 32-bit and 64-bit versions.
2008-03-19 23:05:48 +00:00
Dr. Stephen Henson
054307e7ed
Allow alternate eContentType oids to be set in cms utility.
...
Add id-ct-asciiTextWithCRLF OID.
Give more meaninful error message is attempt to use key ID from a certificate
without a key ID.
2008-03-19 19:34:30 +00:00
Dr. Stephen Henson
8cd358bef8
Rebuild CMS error codes.
2008-03-19 18:42:02 +00:00
Dr. Stephen Henson
eeb9cdfc94
Add support for KEK decrypt in cms utility.
2008-03-19 18:39:51 +00:00
Dr. Stephen Henson
16fe5f8b50
Produce meaningful error if sanity check fails.
...
Delete trailing whitespace from objects.txt
Delete duplicate NIDs.
2008-03-19 17:01:12 +00:00
Dr. Stephen Henson
041e7f2eee
Additional sanity check.
2008-03-19 14:18:36 +00:00
Dr. Stephen Henson
ab12438030
Add support for KEKRecipientInfo in cms application.
2008-03-19 13:53:52 +00:00
Dr. Stephen Henson
c220e58f9e
Make 3DES default cipher in cms utility.
2008-03-18 19:03:03 +00:00
Dr. Stephen Henson
6bd05ad472
Delete standard out and err temp files too.
2008-03-18 18:53:12 +00:00
Dr. Stephen Henson
90ec4c0af0
Delete tmp files, silence openssl commands, compare extracted content.
2008-03-18 18:51:44 +00:00
Dr. Stephen Henson
52e9196d7e
Add enveloped data keyid test.
2008-03-18 18:29:54 +00:00
Dr. Stephen Henson
f7e85c371e
Uninitialized variable bug fix.
2008-03-18 18:18:25 +00:00
Dr. Stephen Henson
f5cbf8fbe1
Fixes for S/MIME consistency checker and flexibility enhancements.
2008-03-18 17:33:46 +00:00
Dr. Stephen Henson
7d7e640e0b
Add extensive PCKS7 and CMS consistency test script.
2008-03-18 14:37:59 +00:00
Dr. Stephen Henson
e4f0e40eac
Various tidies/fixes:
...
Make streaming support in cms cleaner.
Note errors in various S/MIME functions if CMS_final() fails.
Add streaming support for enveloped data.
2008-03-18 13:45:43 +00:00
Dr. Stephen Henson
6e3bc4f073
More support for KEK RecipientInfo.
...
Generalise RecipientInfo and enveloped data handling so applications can
add their own key lookup routines as well as using the standard ones.
2008-03-18 01:00:38 +00:00
Dr. Stephen Henson
c36e936b60
Partial support for KEKRecipientInfo type.
2008-03-17 18:11:27 +00:00
Dr. Stephen Henson
761ffa729f
Preliminary support for enveloped data content type creation.
...
Fix signed data creation so versions are only corrected if structure is
being created.
2008-03-17 13:38:51 +00:00
Geoff Thorpe
1e26a8baed
Fix a variety of warnings generated by some elevated compiler-fascism,
...
OPENSSL_NO_DEPRECATED, etc. Steve, please double-check the CMS stuff...
2008-03-16 21:05:46 +00:00
Dr. Stephen Henson
7c337e00d2
Fix some warnings.
2008-03-16 20:59:10 +00:00
Geoff Thorpe
7e8481afd1
Fix a nasty cast issue that my compiler was choking on.
2008-03-16 20:57:12 +00:00
Geoff Thorpe
1266cec2fe
Fix my debug-geoff configuration.
2008-03-16 20:49:32 +00:00
Dr. Stephen Henson
3667a6f5b3
Adapt to diffrent OpenSSL utility locations.
2008-03-16 19:10:02 +00:00
Dr. Stephen Henson
deb21fbae9
Remove deleted function from header file, update mkfiles.pl
2008-03-16 18:41:20 +00:00
Dr. Stephen Henson
057039f782
Don't need to check for examples directory any more.
2008-03-16 18:31:18 +00:00
Dr. Stephen Henson
d7c738a09a
Extend runex.pl to extract examples directly from RFC text.
2008-03-16 18:03:48 +00:00
Dr. Stephen Henson
a981e2adbc
Add support for random key generation: this will be needed by enveloped data.
2008-03-16 13:05:03 +00:00
Dr. Stephen Henson
88fce8539f
Initial support for enveloped data decrypt. Extent runex.pl to cover these
...
examples. All RFC4134 examples can now be processed.
2008-03-15 23:21:34 +00:00
Dr. Stephen Henson
4f1aa191b3
Initial support for enveloped data decrypt. Extent runex.pl to cover these
...
examples. All RFC4134 examples can not be processed.
2008-03-15 23:21:33 +00:00
Dr. Stephen Henson
e540d1cd77
Check for cipher BIO errors and set key length after parameter decode.
2008-03-15 13:37:32 +00:00
Dr. Stephen Henson
fd47c36136
Return error if no cipher set for encrypted data type.
...
Update CHANGES.
2008-03-15 00:02:23 +00:00
Dr. Stephen Henson
d9f5f07e28
Initial support for Encrypted Data type generation.
2008-03-14 23:30:56 +00:00
Dr. Stephen Henson
b31db9ee96
Delete temp files.
2008-03-14 19:40:40 +00:00
Dr. Stephen Henson
1021f9aa5e
Typos.
2008-03-14 19:38:44 +00:00
Dr. Stephen Henson
320bfc1be7
Reorganise encrypted content info code to avoid duplication and be more
...
consistent with other content types.
2008-03-14 19:37:56 +00:00
Dr. Stephen Henson
b820455c6e
Encrypted Data type processing. Add options to cms utility and run section 7
...
tests in RFC4134.
2008-03-14 13:21:48 +00:00
Dr. Stephen Henson
5c4436c977
New utility functions for encryptedData content type which will also be used
...
by envelopedData.
Use PRE and not POST when freeing up RecipientInfo.
2008-03-14 00:58:43 +00:00
Dr. Stephen Henson
a78a03744d
Only call free once in CHOICE type.
2008-03-14 00:57:01 +00:00
Dr. Stephen Henson
a329fdde51
RFC4134 S/MIME examples test script.
2008-03-13 01:04:47 +00:00
Dr. Stephen Henson
31d3c84422
.cvignore file for cms
2008-03-13 00:50:02 +00:00
Dr. Stephen Henson
afff52a3ba
Free up additional data in RecipientInfo structure
2008-03-13 00:48:59 +00:00
Dr. Stephen Henson
8931b30d84
And so it begins...
...
Initial support for CMS.
Add zlib compression BIO.
Add AES key wrap implementation.
Generalize S/MIME MIME code to support CMS and/or PKCS7.
2008-03-12 21:14:28 +00:00
Dr. Stephen Henson
27dc105f51
Update year.
2008-03-12 13:05:07 +00:00
Dr. Stephen Henson
3964038fe6
#undef X509_EXTENSIONS to avoid conflict with CryptoAPI.
2008-03-12 00:37:31 +00:00
Dr. Stephen Henson
b510d77535
We already have an object for "zlib compression" but it was a place
...
holder and its actual encoding never used.
Just as well because it's value looks like it was made up in the mists of
time...
Now there is a registered value for zlib compression (used in S/MIME
compressedData content type) use that instead.
2008-02-29 14:24:52 +00:00
Dr. Stephen Henson
56c7754cab
Avoid warnings.
2008-02-28 14:05:01 +00:00
Dr. Stephen Henson
92e2c81aff
Fix error code function name mismatches in GOST engine, rebuild errors.
2008-02-28 13:45:06 +00:00
Dr. Stephen Henson
a70a49a018
Fix typo and avoid warning.
2008-02-28 13:18:26 +00:00
Andy Polyakov
61b05a0025
Make x86_64-mont.pl work with debug Win64 build.
2008-02-27 20:09:28 +00:00
Bodo Möller
7c9882eb24
fix BIGNUM flag handling
2008-02-27 06:01:28 +00:00
Dr. Stephen Henson
0d7f6fc76a
Clarification and fix typo.
2008-02-25 18:11:47 +00:00
Dr. Stephen Henson
a9e96d724d
Use default value for $dir if it is empty.
2008-02-25 13:14:06 +00:00
Bodo Möller
d9e427f09c
Make sure to set indent-tabs-mode so that we get tabs, not spaces.
2008-02-21 07:24:12 +00:00
Andy Polyakov
a23e3dbee1
Support for NASM>=2 in Win64/x64 build.
2008-02-13 13:07:52 +00:00
Dr. Stephen Henson
400ca0e467
Add OIDs for compressedData content type and zlib compression.
2008-02-12 13:48:10 +00:00
Dr. Stephen Henson
9536b85c07
Typo.
2008-02-12 01:24:50 +00:00
Dr. Stephen Henson
4d318c79b2
Utility attribute function to retrieve attribute data from an expected
...
type. Useful for many attributes which are single valued and can only
have one type.
2008-02-11 17:52:38 +00:00
Dr. Stephen Henson
1ad90a916b
Extend attribute setting routines to support non-string types.
2008-02-11 13:59:33 +00:00
Andy Polyakov
8ab9025e31
Ad-hockery for Platform SDK ml64.
2008-02-11 13:04:39 +00:00
Dr. Stephen Henson
9e5df8e448
Support custom primitive type printing routines and add one to LONG type.
2008-02-08 13:07:04 +00:00
Andy Polyakov
96d13fe62b
Micro-profiling assisted "optimization" for Power6. Essentially it's so
...
to say educational commit. Reordering instructions doesn't improve
performance much, rather exhibits Power6 limitations.
2008-02-06 10:18:19 +00:00
Andy Polyakov
089458b096
ppc64-mont optimization.
2008-02-05 13:10:14 +00:00
Lutz Jänicke
7c1722c60d
Add missing colon in manpage
...
Submitted by: Richard Hartmann <richih.mailinglist@gmail.com >
2008-01-30 08:26:59 +00:00
Dr. Stephen Henson
c020c3213e
Add Global Sign root CA.
2008-01-26 23:42:58 +00:00
Dr. Stephen Henson
930875ef77
Clarify FAQ.
2008-01-23 19:21:00 +00:00
Dr. Stephen Henson
3b979c5450
Clarify BITLIST format and include an example.
2008-01-23 19:10:53 +00:00
Andy Polyakov
339ad7ce73
rc5/asm/rc5-586.pl was erroneously omitted from last perlasm unification.
2008-01-17 19:48:01 +00:00
Andy Polyakov
676517e08e
crypto/rc5/Makefile was erroneously omitted from last perlasm unification.
...
Also remove obsolete and now misleading comments.
2008-01-15 11:27:06 +00:00
Dr. Stephen Henson
52108cecc0
<strings.h> does not exist under WIN32.
2008-01-14 18:10:55 +00:00
Andy Polyakov
addd641f3a
Unify ppc assembler make rules.
2008-01-13 22:01:30 +00:00
Andy Polyakov
f63e4be392
Automate assembler support for Win64 targets (more work is needed).
2008-01-13 17:56:02 +00:00
Andy Polyakov
ca55d11f84
Allow to specify filename on sha1-ia64.pl command line.
2008-01-13 17:43:11 +00:00
Andy Polyakov
abe7f8b457
Make all x86_64 modules independent on current working directory.
2008-01-13 17:42:04 +00:00
Andy Polyakov
a078befcbe
rc4-x86_64 portability fix.
2008-01-12 11:29:45 +00:00
Ben Laurie
f12797a447
Missing headers.
2008-01-12 11:22:31 +00:00
Andy Polyakov
fa8e921f66
Unify x86 perlasm make rules.
2008-01-11 13:15:11 +00:00
Andy Polyakov
4287ade5b4
Automate assembler support in mk1mf even further.
2008-01-11 11:59:37 +00:00
Dr. Stephen Henson
7398053149
Experimental support for import of more options from Configure
...
(via top level Makefile) into mk1mf builds. This avoids the need
to duplicate the CFLAG handling and can auto build assembly language
source files from perl scripts.
Extend VC-WIN32 Configure entry to include new options.
2008-01-06 00:36:22 +00:00
Dr. Stephen Henson
4d1f3f7a6c
Update perl asm scripts include paths for perlasm.
2008-01-05 22:28:38 +00:00
Andy Polyakov
aff686df91
Fix unsigned/signed warnings in ssl.
2008-01-05 21:35:34 +00:00
Andy Polyakov
637f90621d
Cygwin compatibility fix to apps/ocsp.c.
2008-01-05 21:32:29 +00:00
Andy Polyakov
6d0624aca3
Compensate for BSDi shell bug.
2008-01-05 21:30:59 +00:00
Andy Polyakov
085ea80371
engine/ccgost Win32 portability fixes.
2008-01-05 21:28:53 +00:00
Andy Polyakov
ab0ff06205
Make aes-x86_64 work with debug Win64 build.
2008-01-05 18:17:20 +00:00
Andy Polyakov
79eeb47031
Make AES_T[ed] private to aes-586 module.
2008-01-05 08:58:18 +00:00
Dr. Stephen Henson
9911b7496f
Include Mont asm files in WIN32 build.
2008-01-05 00:45:27 +00:00
Dr. Stephen Henson
3dbd453f41
Add extra SHA2 defines.
2008-01-05 00:44:33 +00:00
Andy Polyakov
731339627f
Last dso_dlfcn.c check-in said "Use Dl_info only on systems where it is
...
known to exist. It does not exist on AIX 4.3.3, AIX 5.1, SCO 5, or Cygwin"
and disabled it on banch of systems it's known to exists, such as FreeBSD,
Solaris, 64-bit HP-UX, MacOS X. Get it straight.
2008-01-04 23:03:23 +00:00
Andy Polyakov
26e71a1850
x86gas.pl update.
2008-01-04 22:58:50 +00:00
Dr. Stephen Henson
db01bad30f
Add sha2 defines.
2008-01-04 16:32:39 +00:00
Dr. Stephen Henson
6ff28e017d
Update netware to use new SHA2 assembly language modules.
2008-01-04 13:18:09 +00:00
Dr. Stephen Henson
4664eb5230
Update WIN32 nasm build to use new asm files.
2008-01-04 00:48:14 +00:00
Dr. Stephen Henson
744ecaa5b6
Avoid WIN32 signed/unsigned warnings.
2008-01-04 00:37:23 +00:00
Dr. Stephen Henson
76d761ccd3
Move CHANGES entry. Revert include file install line.
2008-01-03 22:57:50 +00:00
Dr. Stephen Henson
eef0c1f34c
Netware support.
...
Submitted by: Guenter Knauf <eflash@gmx.net >
2008-01-03 22:43:04 +00:00
Andy Polyakov
82a2431327
NASM has recently changed name of win32 pre-compiled binary.
...
PR: 1627
2008-01-03 17:09:56 +00:00
Dr. Stephen Henson
96fc37f145
Add quotes to Win32 install directories.
...
Submitted by: Mladen Turk <mturk@apache.org >
2008-01-03 16:37:00 +00:00
Andy Polyakov
3a87756fed
perlasm/x86*.pl updates.
2008-01-03 16:21:06 +00:00
Andy Polyakov
c8ec4a1b0b
Final (for this commit series) optimized version and with commentary section.
2007-12-29 20:30:09 +00:00
Andy Polyakov
699e1a3a82
This is also informational commit exposing loop modulo scheduling "factor."
2007-12-29 20:28:01 +00:00
Andy Polyakov
64214a2183
New Montgomery multiplication module, ppc64-mont.pl. Reference, non-optimized
...
implementation. This is essentially informational commit.
2007-12-29 20:26:46 +00:00
Andy Polyakov
0fcb905b0d
ppc-xlate.pl update.
2007-12-29 18:50:44 +00:00
Andy Polyakov
4be63cfb55
Source readability fix, which incidentally works around XLC compiler bug.
2007-12-29 18:32:34 +00:00
Andy Polyakov
ca64056836
Engage x86 assembler in Mac OS X build.
2007-12-18 17:33:49 +00:00
Andy Polyakov
df77428443
Mac OS X x86 assembler support.
2007-12-18 17:28:22 +00:00
Andy Polyakov
3e583572b3
Disable support for Metrowerks assembler. Assembler itself is broken,
...
specifically it incorrectly encodes EA offsets between 128 and 255.
2007-12-18 09:32:20 +00:00
Andy Polyakov
43d8f27dca
x86 perlasm overhaul.
2007-12-18 09:18:49 +00:00
Dr. Stephen Henson
b045299113
Avoid aliasing warning.
2007-12-16 13:57:44 +00:00
Dr. Stephen Henson
13baedc55b
Update ordinals
2007-12-16 13:16:58 +00:00
Dr. Stephen Henson
9400d9ac83
Initialize sigsize.
2007-12-14 16:53:50 +00:00
Dr. Stephen Henson
341e18b497
Handle non-SHA1 digests for certids in OCSP test responder.
2007-12-14 12:43:50 +00:00
Andy Polyakov
339a1820fd
gmp engine was non-operational.
2007-12-04 20:28:52 +00:00
Dr. Stephen Henson
cec2538ca9
Submitted by: Victor B. Wagner <vitus@cryptocom.ru>, steve
...
Use default algorithms for OCSP request and response signing. New command
line option to support other digest use for OCSP certificate IDs.
2007-12-04 12:41:28 +00:00
Richard Levitte
28f7e60d47
Change submitted by Doug Kaufman. He writes:
...
I just compiled the 9.9-dev version from the 12022007 tarball under
DJGPP. There were only 2 changes needed, one for b_sock.c, since
DJGPP with WATT32 doesn't define socklen_t and one for testtsa to
handle DOS style path separators. I also noted what seems to be a
typographical error in ts.pod. The test suite passes. The patch is
attached.
Since I am in the US, I have sent notifications to the Bureau of
Industry and Security and to the NSA.
2007-12-03 09:02:29 +00:00
Andy Polyakov
544b82e493
Some assembler are allergic to lea reg,BYTE PTR[...].
...
Submitted by: Guenter Knauf
2007-12-02 21:32:03 +00:00
Andy Polyakov
8789af8db8
Structure symbol decorations, optimize label handling...
2007-11-24 16:03:57 +00:00
Dr. Stephen Henson
1ad6a1b5e9
Rebuild OID database: duplicates got in there somehow??
2007-11-23 00:34:00 +00:00
Dr. Stephen Henson
6e150083bb
Fix from stable branch.
2007-11-23 00:19:24 +00:00
Dr. Stephen Henson
98d8baabbd
Add caRepository OID and sync object NIDs with OpenSSL 0.9.8.
2007-11-23 00:14:59 +00:00
Andy Polyakov
c1d2e00ec5
Synchronize x86nasm.pl with x86unix.pl.
2007-11-22 21:21:35 +00:00
Andy Polyakov
ad8bd4ece8
Combat [bogus] relocations in some assember modules.
2007-11-22 20:51:48 +00:00
Dr. Stephen Henson
2f0550c4c1
Lookup public key ASN1 methods by string by iterating through all
...
implementations instead of all added ENGINEs to cover case where an
ENGINE is not added.
2007-11-21 17:25:58 +00:00
Dr. Stephen Henson
98057eba77
Submitted by: "Victor B. Wagner" <vitus@cryptocom.ru>
...
Update gost algorithm print routines.
2007-11-21 12:39:12 +00:00
Dr. Stephen Henson
097f9d8c52
Avoid warning.
2007-11-20 17:52:02 +00:00
Dr. Stephen Henson
60447e59ef
Update debug-steve targets.
2007-11-20 17:51:45 +00:00
Dr. Stephen Henson
94e6ae7a69
Submitted by: "Victor B. Wagner" <vitus@cryptocom.ru>
...
Make {d2i,i2d}_PrivateKey() fall back to PKCS#8 format if no legacy format
supported. Add support in d2i_AutoPrivateKey().
2007-11-20 13:37:51 +00:00
Dr. Stephen Henson
f670738987
Rebuild object cross reference table.
2007-11-20 13:04:45 +00:00
Lutz Jänicke
b6a338cb29
Typos in man pages: dependant->dependent
...
Submitted by: Tobias Stoeckmann <tobias@bugol.de >
2007-11-19 09:18:03 +00:00
Bodo Möller
4726fcfc25
Should reject signatures that we can't properly verify
...
and couldn't generate
(as pointed out by Ernst G Giessmann)
2007-11-19 07:25:55 +00:00
Bodo Möller
15bd07e923
fix typos
...
Submitted by: Ernst G. Giessmann
2007-11-19 07:24:08 +00:00
Ben Laurie
fdf355878c
Fix buffer overflow.
2007-11-16 14:41:09 +00:00
Bodo Möller
da989402f2
The hash length check wasn't strict enough,
...
as pointed out by Ernst G Giessmann
2007-11-16 13:01:14 +00:00
Ben Laurie
10f0c85cfc
Fix warnings.
2007-11-16 03:03:01 +00:00
Andy Polyakov
70ba4ee5d5
Commit #16325 fixed one thing but broke DH with certain moduli.
2007-11-03 20:09:04 +00:00
Dr. Stephen Henson
31f528b15d
Fix from stable branch.
2007-11-03 13:09:34 +00:00
Lutz Jänicke
86140095b5
Add OIDs by CMP (RFC 4210) and CRMF (RFC 4211)
...
Submitted by: Martin Peylo <martinmeis@googlemail.com >
2007-11-01 08:24:56 +00:00
Dr. Stephen Henson
8e1d3ba50e
Fix duplicate error codes.
2007-10-26 23:54:46 +00:00
Dr. Stephen Henson
37210fe7e2
GOST ENGINE information.
2007-10-26 23:50:40 +00:00
Dr. Stephen Henson
0e1dba934f
1. Changes for s_client.c to make it return non-zero exit code in case
...
of handshake failure
2. Changes to x509_certificate_type function (crypto/x509/x509type.c) to
make it recognize GOST certificates as EVP_PKT_SIGN|EVP_PKT_EXCH
(required for s3_srvr to accept GOST client certificates).
3. Changes to EVP
- adding of function EVP_PKEY_CTX_get0_peerkey
- Make function EVP_PKEY_derive_set_peerkey work for context with
ENCRYPT operation, because we use peerkey field in the context to
pass non-ephemeral secret key to GOST encrypt operation.
- added EVP_PKEY_CTRL_SET_IV control command. It is really
GOST-specific, but it is used in SSL code, so it has to go
in some header file, available during libssl compilation
4. Fix to HMAC to avoid call of OPENSSL_cleanse on undefined data
5. Include des.h if KSSL_DEBUG is defined into some libssl files, to
make debugging output which depends on constants defined there, work
and other KSSL_DEBUG output fixes
6. Declaration of real GOST ciphersuites, two authentication methods
SSL_aGOST94 and SSL_aGOST2001 and one key exchange method SSL_kGOST
7. Implementation of these methods.
8. Support for sending unsolicited serverhello extension if GOST
ciphersuite is selected. It is require for interoperability with
CryptoPro CSP 3.0 and 3.6 and controlled by
SSL_OP_CRYPTOPRO_TLSEXT_BUG constant.
This constant is added to SSL_OP_ALL, because it does nothing, if
non-GOST ciphersuite is selected, and all implementation of GOST
include compatibility with CryptoPro.
9. Support for CertificateVerify message without length field. It is
another CryptoPro bug, but support is made unconditional, because it
does no harm for draft-conforming implementation.
10. In tls1_mac extra copy of stream mac context is no more done.
When I've written currently commited code I haven't read
EVP_DigestSignFinal manual carefully enough and haven't noticed that
it does an internal digest ctx copying.
This implementation was tested against
1. CryptoPro CSP 3.6 client and server
2. Cryptopro CSP 3.0 server
2007-10-26 12:06:36 +00:00
Lutz Jänicke
11d01d371f
Release OpenSSL 0.9.8g with various fixes to issues introduced with 0.9.8f
2007-10-19 08:26:03 +00:00
Dr. Stephen Henson
76c3ef7446
Fix from stable branch.
2007-10-18 11:42:47 +00:00
Andy Polyakov
659f7f3168
Don't let DTLS ChangeCipherSpec increment handshake sequence number.
...
PR: 1587
2007-10-17 21:15:48 +00:00
Dr. Stephen Henson
3d3bf9c730
Don't lookup zero length session ID.
...
PR: 1591
2007-10-17 17:31:57 +00:00
Dr. Stephen Henson
4017e8706c
Fix from stable branch.
2007-10-17 11:49:27 +00:00
Andy Polyakov
3ce54f35b3
Make ssl compile [from 098-stable, bug is masked by default].
2007-10-14 14:09:13 +00:00
Andy Polyakov
ebc06fba67
Bunch of constifications.
2007-10-13 15:51:32 +00:00
Andy Polyakov
e979c039f9
Fix warnings in d1_both.c [from 0.9.8-stable].
2007-10-13 11:00:52 +00:00
Andy Polyakov
90acf770b5
DTLS fixes from 0.9.8-stable.
2007-10-13 10:57:02 +00:00
Andy Polyakov
0d89e45690
Synchronize CHANGES between 0.9.8 and HEAD.
2007-10-13 10:55:30 +00:00
Ben Laurie
1948c7e6dd
0.9.8f.
2007-10-12 10:56:10 +00:00
Dr. Stephen Henson
a6db6a0070
Update CHANGES. Keep ordinals consistent.
2007-10-12 00:15:09 +00:00
Ben Laurie
fdb2fe6dc2
New release.
2007-10-11 19:31:29 +00:00
Andy Polyakov
a2115c5d17
Respect cookie length set by app_gen_cookie_cb.
...
Submitted by: Alex Lam
2007-10-09 19:31:18 +00:00
Andy Polyakov
4fe55663df
Make DTLS1 record layer MAC calculation RFC compliant.
...
Submitted by: Alex Lam
2007-10-09 19:19:07 +00:00
Andy Polyakov
ae1552ee99
Addendum to commit #16654 .
2007-10-09 16:37:24 +00:00
Andy Polyakov
debf380122
size_t-fy crypto/buffer.
2007-10-09 15:52:07 +00:00
Ralf S. Engelschall
ddb038d349
ignore a few additionally generated files
2007-10-09 09:56:44 +00:00
Andy Polyakov
b7cc9dffac
Addendum to commit #16651 .
2007-10-07 14:34:59 +00:00
Andy Polyakov
e1b81fed33
Make it possible to link VC static lib with either /MT or /MD application.
...
PR: 1230
2007-10-07 12:55:36 +00:00
Andy Polyakov
5d58f1bbfe
Prohibit RC4 in DTLS.
2007-10-05 21:04:56 +00:00
Dr. Stephen Henson
fcd1cb666c
Fix from fips branch.
2007-10-05 16:53:31 +00:00
Dr. Stephen Henson
4f19a9cb9f
Off by one fix from stable branch.
2007-10-04 12:07:52 +00:00
Andy Polyakov
0023adb47a
Switch to bn-s390x (it's faster on keys longer than 512 bits) and mention
...
s390x assembler pack in CHANAGES.
2007-10-01 07:38:32 +00:00
Andy Polyakov
81fe8dcfe1
Oops! This was erroneously left out commit #16632 .
2007-10-01 06:27:21 +00:00
Andy Polyakov
d527834a1d
Basic idea behind explicit IV is to make it unpredictable for attacker.
...
Until now it was xor between CBC residue and 1st block from last datagram,
or in other words still predictable.
2007-09-30 22:01:36 +00:00
Andy Polyakov
89c333e3e5
Make ChangeCipherSpec compliant with DTLS RFC4347.
2007-09-30 21:19:30 +00:00
Andy Polyakov
0d97d00b6c
DTLS RFC4347 says HelloVerifyRequest resets Finished MAC.
2007-09-30 19:34:36 +00:00
Andy Polyakov
e7adda52b3
DTLS RFC4347 requires client to use rame random field in reply to
...
HelloVerifyRequest.
2007-09-30 19:15:27 +00:00
Andy Polyakov
7432d073af
Switch to RFC-compliant version encoding in DTLS.
2007-09-30 18:53:54 +00:00
Dr. Stephen Henson
04e2ab2c02
Move no status notification to ssl_check_serverhello_tlsext() to ensure
...
no status is notified even if no server extensions are present.
2007-09-28 17:45:11 +00:00
Dr. Stephen Henson
b7fcc08976
Typo.
2007-09-28 17:18:18 +00:00
Andy Polyakov
7722e53f12
Yet another ARM update. It appears to be more appropriate to make
...
developers responsible for -march choice.
2007-09-27 16:27:03 +00:00
Andy Polyakov
2c3ee16272
Move -march=armv4t to ./config.
2007-09-27 07:43:58 +00:00
Andy Polyakov
19112771d6
Minor ARMv4 update.
2007-09-27 07:20:31 +00:00
Andy Polyakov
4c7c5ff667
ARMv4 assembler pack.
2007-09-27 07:09:46 +00:00
Andy Polyakov
d7e915616d
10% performance tweak in 64-bit mode.
2007-09-27 06:19:25 +00:00
Dr. Stephen Henson
67c8e7f414
Support for certificate status TLS extension.
2007-09-26 21:56:59 +00:00
Andy Polyakov
74eb3e0914
Make sha512-armv4.pl byte-order neutral.
2007-09-26 12:17:33 +00:00
Andy Polyakov
79fe664f19
Clarify commentary in sha512-sparcv9.pl.
2007-09-26 12:16:32 +00:00
Lutz Jänicke
5f0477f47b
Typos
...
PR: 1578
Submitted by: Charles Longeau <chl@tuxfamily.org >
2007-09-24 11:22:58 +00:00
Lutz Jänicke
7bbce69721
Port from 0.9.8-stable
2007-09-24 11:01:18 +00:00
Dr. Stephen Henson
870d6541f2
Use accept flag for new session ticket write.
2007-09-23 15:55:15 +00:00
Bodo Möller
02c27b113c
properly handle length-zero opaque PRF input values
...
(which are pointless, but still might occur)
2007-09-23 11:30:53 +00:00
Bodo Möller
86d4bc3aea
fix length parameter in SSL_set_tlsext_opaque_prf_input() calls
2007-09-23 11:08:59 +00:00
Bodo Möller
761772d7e1
Implement the Opaque PRF Input TLS extension
...
(draft-rescorla-tls-opaque-prf-input-00.txt), and do some cleanups and
bugfixes on the way. In particular, this fixes the buffer bounds
checks in ssl_add_clienthello_tlsext() and in ssl_add_serverhello_tlsext().
Note that the opaque PRF Input TLS extension is not compiled by default;
see CHANGES.
2007-09-21 06:54:24 +00:00
Andy Polyakov
54ef01b54b
Fix indentation in d1_both.c.
2007-09-19 16:38:15 +00:00
Ben Laurie
9311c4421a
Fix dependencies. Make depend.
2007-09-19 14:53:18 +00:00
Ben Laurie
aaa4f448cf
The other half of make errors.
2007-09-19 14:51:28 +00:00
Ben Laurie
5f8b524619
make errors.
2007-09-19 14:29:59 +00:00
Bodo Möller
08111768a2
fix warning
2007-09-19 01:43:59 +00:00
Bodo Möller
1b827d7b6f
Clean up error codes a bit.
...
(engines/ccgost/ remains utter chaos, though; "make errors" is not happy.)
2007-09-19 00:58:58 +00:00
Andy Polyakov
a005fb019f
Addenum to "Constify obj_dat.[ch]."
2007-09-18 22:15:31 +00:00
Andy Polyakov
b5e5760d01
Minor formatting fixes in crypto/sha/asm.
2007-09-18 21:12:02 +00:00
Andy Polyakov
cf2bc94e5c
Wire RC4 key_table to read-only segment.
2007-09-18 21:10:32 +00:00
Andy Polyakov
26f0cf69d3
Constify obj_dat.[ch], as well as minimize linker relocations.
2007-09-18 21:05:21 +00:00
Andy Polyakov
61836c1b70
Wire DES weak_keys to read-only segment.
2007-09-18 20:58:33 +00:00
Andy Polyakov
2a1b0c8d65
Eliminate redundant make rule.
2007-09-18 20:57:06 +00:00
Andy Polyakov
75a8e30f4f
Minimize stack utilization in probable_prime.
2007-09-18 20:52:05 +00:00
Andy Polyakov
716b87a026
Remove excessive whitespaces from bio.h
2007-09-18 20:48:39 +00:00
Bodo Möller
08b229e13f
Make sure that BN_from_montgomery keeps the BIGNUMS in proper format
2007-09-18 16:35:28 +00:00
Dr. Stephen Henson
a529a80108
Update from stable branch.
2007-09-17 17:54:31 +00:00
Dr. Stephen Henson
c81898cbc4
Update from stable branch.
2007-09-17 17:31:53 +00:00
Andy Polyakov
330591fdfc
Mention aes in enc.pod.
...
PR: 1529
2007-09-17 16:42:35 +00:00
Andy Polyakov
c7503f5240
Mention SHA2 in openssl.pod.
...
PR: 1575
2007-09-17 15:56:55 +00:00
Andy Polyakov
eff371c866
Remove pq_compat.h.
2007-09-16 19:29:35 +00:00
Andy Polyakov
8dc899dee4
Minor sha[256|512]-586 performance tweaks.
2007-09-16 18:47:24 +00:00
Andy Polyakov
cc3d7bd0fc
It's inappropraite to override application signal, nor is it appropriate
...
to shut down Winsock unless we know it won't be used [and we never do].
PR: 1439
2007-09-16 18:35:02 +00:00
Andy Polyakov
7df4c86bdd
Minor fix in link_[oa].hpux.
2007-09-16 14:11:00 +00:00
Andy Polyakov
c313e32a8b
BSD run-time linkers apparently demand RPATH on .so objects.
...
PR: 1381
2007-09-16 12:23:47 +00:00
Andy Polyakov
77519b51db
Make bn2dec work on "SIXTY_FOUR_BIT" platforms.
...
PR: 1456
2007-09-15 17:05:11 +00:00
Andy Polyakov
1a01868e35
Remove sha512-sse2.pl.
2007-09-15 13:45:17 +00:00
Andy Polyakov
563d3e5948
Engage new x86 assembler modules.
2007-09-14 21:06:14 +00:00
Andy Polyakov
1187ee7dad
More Intel cc fix-ups.
2007-09-14 19:32:33 +00:00
Dr. Stephen Henson
7c5921e736
Handle empty case in X509_NAME canonical encoding.
2007-09-14 18:11:17 +00:00
Andy Polyakov
399f94bfb4
Commentary updates.
2007-09-13 07:27:10 +00:00
Andy Polyakov
1fa29843fa
SHA512 for ARMv4.
2007-09-13 07:26:35 +00:00
Andy Polyakov
ee0449b17c
SHA256/512 for x86.
2007-09-13 07:26:19 +00:00
Ben Laurie
e28eddc51f
Typo? Why did this work, anyway?
2007-09-08 15:58:51 +00:00
Dr. Stephen Henson
d82a612a90
Fix warning: print format option not compatible with size_t.
2007-09-07 13:34:46 +00:00
Dr. Stephen Henson
e7e8f4b333
Fix another warning.
2007-09-07 13:27:40 +00:00
Dr. Stephen Henson
a6fbcb4220
Change safestack reimplementation to match 0.9.8.
...
Fix additional gcc 4.2 value not used warnings.
2007-09-07 13:25:15 +00:00
Dr. Stephen Henson
8164032a2e
Fix warnings: computed value not use, incompatible pointer initialization
...
and cast from pointer to int of different size (linux-x86_64 and align).
2007-09-07 13:03:25 +00:00
Andy Polyakov
a5804a750b
Add sha512_block implementation optimized for small register bank.
...
On x86 it gives same performance, while code size shrinks >10 times.
2007-09-07 12:34:45 +00:00
Dr. Stephen Henson
81025661a9
Update ssl code to support digests other than MD5+SHA1 in handshake.
...
Submitted by: Victor B. Wagner <vitus@cryptocom.ru >
2007-08-31 12:42:53 +00:00
Andy Polyakov
4ece7eb6f4
Constify seed and md2.
2007-08-31 10:12:35 +00:00
Andy Polyakov
0bb01b7df0
Offer darwin64-x86_64-cc as option.
2007-08-31 10:09:34 +00:00
Andy Polyakov
1c56e95e28
Compress and more aggressively constify ec_curve.c [the latter is
...
achieved by minimizing link relocations].
2007-08-31 09:36:43 +00:00
Dr. Stephen Henson
446124a258
Check return code when attempting to receive new session ticket message.
2007-08-31 00:28:01 +00:00
Andy Polyakov
583b0b67ab
Unify RC4 settings among darwin platforms.
2007-08-30 08:09:12 +00:00
Andy Polyakov
584502d4a0
Add darwin64-x86_64-cc target.
2007-08-30 07:54:23 +00:00
Andy Polyakov
d8803d5ae6
aes_ige suffered SIGBUS on RISC platforms.
2007-08-29 21:30:13 +00:00
Andy Polyakov
acfb4b5b9f
Improve cache locality in linux64-sparcv9.
2007-08-29 20:46:11 +00:00
Andy Polyakov
0ddd3ea217
Make naming more consistent.
2007-08-28 21:02:38 +00:00
Andy Polyakov
6a8517f274
Make room for Camellia assembler.
2007-08-28 20:45:25 +00:00
Dr. Stephen Henson
94d511cdbd
Add ctrls to set and get RFC4507bis keys to enable several contexts to
...
reuse the same tickets.
2007-08-28 01:08:45 +00:00
Dr. Stephen Henson
ec5d747328
Add Google sponsorship note.
2007-08-27 23:41:36 +00:00
Andy Polyakov
c6880b2533
shlib_wrap commentary update.
2007-08-27 08:51:59 +00:00
Andy Polyakov
eb6eb3e630
shlib_wrap update, IRIX section.
2007-08-27 08:42:01 +00:00
Andy Polyakov
ae4eb3c9ac
IRIX and Tru64 platform updates.
2007-08-26 14:12:30 +00:00
Dr. Stephen Henson
ba0e826d83
Update from stable branch.
2007-08-23 22:59:09 +00:00
Dr. Stephen Henson
f3fef74b09
Document ticket disabling option.
2007-08-23 22:49:13 +00:00
Dr. Stephen Henson
014f62b649
Add usage message for -sess_out, -sess_in
2007-08-23 12:20:36 +00:00
Andy Polyakov
55eab3b74b
Make x86_64 modules work under Win64/x64.
2007-08-23 12:01:58 +00:00
Andy Polyakov
dc0fcb98df
Workaround MSVC6 compiler bug.
2007-08-23 11:59:53 +00:00
Dr. Stephen Henson
d24a9c8f5a
Docs and usage messages for RFC4507bis support.
2007-08-23 11:34:48 +00:00
Richard Levitte
42fe218b9f
VAX C can't handle 64 bit integers, making SHA512 impossible...
2007-08-22 20:58:50 +00:00
Dr. Stephen Henson
956006b741
Use SHA256 for ticket HMAC if possible.
2007-08-20 12:35:20 +00:00
Dr. Stephen Henson
167066fed4
Fix for asm/no-asm on WIN32.
2007-08-13 02:24:26 +00:00
Dr. Stephen Henson
525de5d335
OPENSSL_NO_TLS1 WIN32 build support. Fix so normal build works again.
2007-08-12 23:59:05 +00:00
Dr. Stephen Henson
367eb1f125
Fix warning and make no-tlsext work.
2007-08-12 18:56:14 +00:00
Dr. Stephen Henson
3444961787
Typo.
2007-08-12 18:05:20 +00:00
Dr. Stephen Henson
710069c19e
Fix warnings.
2007-08-12 17:44:32 +00:00
Dr. Stephen Henson
ddd3a617ca
Remove debugging fprintfs, fix typo.
2007-08-12 17:06:28 +00:00
Dr. Stephen Henson
6434abbfc6
RFC4507 (including RFC4507bis) TLS stateless session resumption support
...
for OpenSSL.
2007-08-11 23:18:29 +00:00
Andy Polyakov
e45c100762
Typos in ./config.
...
PR: 1563
2007-08-01 11:20:39 +00:00
Andy Polyakov
5a22a8e7f9
MacOS X update.
2007-07-31 19:30:13 +00:00
Andy Polyakov
d6c764573c
Proper support for shared build under MacOS X.
2007-07-31 18:24:41 +00:00
Andy Polyakov
9d35d08ab6
Typo in ppccpuid.pl.
2007-07-31 18:19:40 +00:00
Bodo Möller
f7b61702a0
document -S and -nopad options in usage information
2007-07-31 09:42:47 +00:00
Andy Polyakov
983180bb8b
Buglet fixes and minor optimization in aes-x86_86 assembler.
2007-07-30 16:42:57 +00:00
Andy Polyakov
cdb0392159
Make preprocessor logic more fail-safe.
2007-07-30 11:53:01 +00:00
Andy Polyakov
1891f5b395
As for inline vs. __inline. The original code implies that most compilers
...
understand inline, while WIN32 ones insist on __inline. Well, there are
other compilers that insist on __inline. At the same time it turned out
that most compilers understand both __inline and inline. I could find
only one that doesn't understand __inline, Sun C. In other words it seems
that __inline as preferred choice provides better coverage...
2007-07-30 11:42:08 +00:00
Andy Polyakov
a3963619f6
Make ppccpuid AIX friendly.
2007-07-30 08:47:32 +00:00
Andy Polyakov
34994068a4
Respect ISO aliasing rules.
...
PR: 1296
2007-07-27 20:34:10 +00:00
Andy Polyakov
afaad0ada6
AES for IA64 update.
2007-07-27 18:20:52 +00:00
Andy Polyakov
05f9cb3b77
ia64cpuid update.
2007-07-27 18:03:27 +00:00
Andy Polyakov
1988a456a7
x86 perlasm updates.
2007-07-25 12:38:11 +00:00
Andy Polyakov
69216cc5a5
Configure update from 098.
2007-07-24 14:41:20 +00:00
Dr. Stephen Henson
2cf6fa4c8b
Update debug-steve
2007-07-24 00:27:25 +00:00
Andy Polyakov
a61710b868
Allow for option to skip hardware support.
2007-07-23 20:38:57 +00:00
Andy Polyakov
20f7563f3d
md32_common.h update.
2007-07-23 13:57:15 +00:00
Andy Polyakov
3df2eff4bd
x86*cpuid update.
2007-07-21 14:46:27 +00:00
Andy Polyakov
a415ebd026
Complete synchronization of aes-x86_64 with aes-586.
2007-07-21 14:20:46 +00:00
Andy Polyakov
52ee3d01ae
Lppc_AES_[en|de]crypt_compact: size optimization.
2007-07-19 15:31:22 +00:00
Andy Polyakov
e59f992be6
Minor optimization in AES_set_encryption_key for x86_64.
2007-07-19 14:59:26 +00:00
Andy Polyakov
8bae7722a2
_x86_64_AES_[en|de]crypt_compact: size optimization and aggressive
...
T[ed]4 prefetch.
2007-07-19 14:29:41 +00:00
Dr. Stephen Henson
0d7dba92c8
WIN32 VC++ build fixes.
2007-07-18 17:40:49 +00:00
Andy Polyakov
ce1390aedc
shlib_wrap.sh update.
2007-07-16 14:00:08 +00:00
Andy Polyakov
287a9ee76e
gas -g doesn't tolerate unpadded .bytes in code segment.
2007-07-13 21:35:56 +00:00
Andy Polyakov
96b0f6c16d
Various minor updates to AES assembler modules.
2007-07-13 17:42:13 +00:00
Andy Polyakov
e1612ea59d
Add _x86_64_AES_[en|de]crypt_compact.
2007-07-13 17:39:40 +00:00
Andy Polyakov
71f4ea44eb
EVP_*_cfb1 was broken.
...
PR: 1318
2007-07-08 19:14:02 +00:00
Andy Polyakov
35295bdbee
bn_mul_recursive doesn't handle all cases correctly, which results in
...
BN_mul failures at certain key-length mixes.
PR: 1427
2007-07-08 18:53:03 +00:00
Andy Polyakov
aa8d6f3e86
Typo in str_lib.c
...
PR: 1177
2007-07-07 20:11:12 +00:00
Andy Polyakov
62aa5dd415
Fix build problem on Tru64.
2007-06-29 13:11:45 +00:00
Andy Polyakov
673c55a2fe
Latest bn_mont.c modification broke ECDSA test. I've got math wrong, which
...
is fixed now.
2007-06-29 13:10:19 +00:00
Ben Laurie
949ce10e88
Fix warning.
2007-06-23 18:47:51 +00:00
Ben Laurie
8dee823e61
Inline function declarations have to be prototypes.
2007-06-23 18:40:16 +00:00
Andy Polyakov
5d86336746
Flush output in x86_64cpuid.pl.
2007-06-21 11:39:35 +00:00
Andy Polyakov
5b89f78a89
Typo in x86_64-mont.pl.
...
PR: 1549
2007-06-21 11:38:52 +00:00
Andy Polyakov
85a5668dba
CHANGES update from 098-stable.
2007-06-20 17:46:43 +00:00
Andy Polyakov
c943ca5404
Optimize OPENSSL_cleanse.
2007-06-20 17:36:39 +00:00
Andy Polyakov
1c7f8707fd
bn_asm for s390x.
2007-06-20 14:10:16 +00:00
Andy Polyakov
a21c46e70b
Typo in Linux part of sparcv9cap.c
...
PR: 1532
2007-06-20 13:02:34 +00:00
Andy Polyakov
f3c26535ad
Make some shortcuts in sparcv9cap.c. Trouble is that di_walk_node result
...
is inconsistent among CPU generations.
2007-06-20 13:00:59 +00:00
Andy Polyakov
2329694222
SPARC Solaris and Linux assemblers treat .align directive differently.
...
PR: 1547
2007-06-20 12:24:22 +00:00
Dr. Stephen Henson
206a975752
Update from stable branch.
2007-06-19 15:43:48 +00:00
Dr. Stephen Henson
9677bf0f30
Update .cvsignore
2007-06-18 12:40:24 +00:00
Dr. Stephen Henson
6d6496ed52
Make ordinals consistent with OpenSSL 0.9.8
2007-06-18 12:35:56 +00:00
Andy Polyakov
7d9cf7c0bb
Eliminate conditional final subtraction in Montgomery assembler modules.
2007-06-17 17:10:03 +00:00
Andy Polyakov
55525742f4
Privatize BN_*_no_branch.
2007-06-11 16:33:03 +00:00
Andy Polyakov
c693b5a55c
Commentary updates and minor optimization for bn_mont.c.
2007-06-11 08:53:52 +00:00
Andy Polyakov
6b6443dead
Eliminate conditional final subtraction in Montgomery multiplication.
2007-06-10 19:34:38 +00:00
Dr. Stephen Henson
54b5fd537f
WIN32 fixes.
2007-06-08 00:26:16 +00:00
Dr. Stephen Henson
0b99d4f1d1
Remove unnecessary casts and avoid some warnings with gcc 4.2.
2007-06-07 16:07:57 +00:00
Dr. Stephen Henson
3c07d3a3d3
Finish gcc 4.2 changes.
2007-06-07 13:14:42 +00:00
Dr. Stephen Henson
1d1a64653c
Back out safestack.h change for now: seems to break some things.
2007-06-04 22:18:20 +00:00
Dr. Stephen Henson
297e6f1917
Avoid use of function pointer casts in pem library. Modify safestack to
...
always use inline functions.
2007-06-04 17:53:04 +00:00
Dr. Stephen Henson
b948e2c59e
Update ssl library to support EVP_PKEY MAC API. Include generic MAC support.
2007-06-04 17:04:40 +00:00
Dr. Stephen Henson
18096abb29
Handle NULL parameter in some EVP utility functions.
2007-05-31 12:39:21 +00:00
Dr. Stephen Henson
0aa08a2e34
Fix for GOST engine on platforms where sizeof(size_t) != sizeof(int).
2007-05-31 12:32:27 +00:00
Andy Polyakov
f20af72312
AES_set_[en|de]crypt_key for ARMv4.
2007-05-30 15:57:31 +00:00
Andy Polyakov
7ef643360d
s390x gas can't handle .align 128.
2007-05-28 16:32:50 +00:00
Andy Polyakov
76c828c627
AES_set_[en|de]crypt_key for s390x.
2007-05-28 16:30:18 +00:00
Dr. Stephen Henson
281cfff026
Update ordinals.
2007-05-24 10:17:49 +00:00
Dr. Stephen Henson
64a5c5d1be
Fix X509_REQ_print_ex() to process extension options.
2007-05-22 23:31:29 +00:00
Dr. Stephen Henson
7b8b797375
Revert broken change to ccgost.
...
Initialize context properly for HMAC pkey method.
2007-05-22 12:58:39 +00:00
Andy Polyakov
a1a382dbc9
SHA256 for ARMv4.
2007-05-22 09:56:45 +00:00
Bodo Möller
19f6c524bf
Fix crypto/ec/ec_mult.c to work properly with scalars of value 0
2007-05-22 09:47:43 +00:00
Dr. Stephen Henson
8dbdf6314c
Typo.
2007-05-21 16:36:09 +00:00
Dr. Stephen Henson
9c54e18bf0
Fixes for dgst tool. Initialize md_name, sig_name properly. Return error code
...
on failure. Keep output format consistent with previous versions.
Also flush stdout after printing ACCEPT in s_server.
2007-05-21 15:53:30 +00:00
Dr. Stephen Henson
9aba74e55a
Fix warning and back out bad modification.
2007-05-21 12:16:36 +00:00
Andy Polyakov
e4317d2031
OPENSSL_IMPLEMENT_GLOBAL caused more grief than it's worth (it's used twice
...
in legacy code). I'd rather just remove it along with legacy interface,
but it's probably not as appropriate as I'd like. Reimplement the macro.
2007-05-20 20:11:19 +00:00
Andy Polyakov
61775daf00
Padlock engine fails to compile with -O0 -fPIC.
2007-05-20 07:13:45 +00:00
Andy Polyakov
86d8f3ee19
Typo in aes-ppc.pl.
2007-05-19 20:00:33 +00:00
Andy Polyakov
cb1fbf9f63
--enable-auto-image-base in cygwin build.
...
PR: 1517
Submitted by: vinschen@redhat.com
2007-05-19 19:40:15 +00:00
Andy Polyakov
3005764c18
Typo in x509_txt.c.
...
Submitted by: Martin.Kraemer@Fujitsu-Siemens.com
2007-05-19 18:03:21 +00:00
Andy Polyakov
b1e8b4e65d
x86cpuid fixes.
...
PR: 1526
2007-05-19 17:52:51 +00:00
Andy Polyakov
c6149e2f02
ppc-xlate.pl update.
2007-05-19 17:32:06 +00:00
Andy Polyakov
aa5c99fa01
sparccpuid.s update.
2007-05-19 17:26:48 +00:00
Andy Polyakov
9c200f5471
Initial draft of AES for PPC.
2007-05-19 17:16:27 +00:00
Dr. Stephen Henson
ec06417d52
Updated GOST MAC support.
...
Submitted by: vitus@cryptocom.ru
2007-05-18 15:55:55 +00:00
Dr. Stephen Henson
a4346646f1
Initial GOST MAC support. Not fully working yet...
2007-05-17 17:44:09 +00:00
Dr. Stephen Henson
a70c09e2a2
Add .cvsignore to seed dir.
2007-05-17 16:43:15 +00:00
Dr. Stephen Henson
0f9e0abbee
Set len to buffer size.
2007-05-17 16:42:05 +00:00
Dr. Stephen Henson
e77dbf325f
Prepend signature name in dgst output.
2007-05-17 16:19:17 +00:00
Dr. Stephen Henson
f03620ea15
Use default md if none specified in dgst utility.
2007-05-17 12:55:03 +00:00
Dr. Stephen Henson
47b2e238e5
Use EVP_DigestVerify() in dgst.c if verifying.
2007-05-17 12:35:32 +00:00
Dr. Stephen Henson
ad35cdac74
PR: 1516
...
Revert change in 1516 because it breaks Windows build. Use a modified version
of the headers from s_client.c which has used similar functionality without
any problems.
2007-05-16 12:16:49 +00:00
Dr. Stephen Henson
4eba5d8c86
Fix error code name.
2007-05-16 00:14:32 +00:00
Dr. Stephen Henson
e69adea539
New function EVP_PKEY_asn1_copy(). Use default MD if type param is NULL.
2007-05-15 23:52:03 +00:00
Dr. Stephen Henson
9660cbcd6b
Change C++ style comments.
2007-05-15 23:50:55 +00:00
Andy Polyakov
9c9c83ccb9
Throw in ppccpuid module.
2007-05-15 20:51:48 +00:00
Andy Polyakov
1d42fb5f4a
Fix linking error after adding alphacpuid.s.
2007-05-15 07:11:23 +00:00
Andy Polyakov
e119769480
Add alphacpuid.s
2007-05-15 06:36:17 +00:00
Andy Polyakov
b2dba9bf1f
Profiling revealed that OPENSSL_cleanse consumes *more* CPU time than
...
sha1_block_data_order when hashing short messages. Move OPENSSL_cleanse
to "cpuid" assembler module and gain 2x.
2007-05-14 21:35:25 +00:00
Andy Polyakov
932cc129ee
x86_64 assembler updates.
2007-05-14 15:57:19 +00:00
Andy Polyakov
1a42839ba7
As all assembler modules are alignment neutral, allow C to pass unaligned
...
content.
2007-05-13 15:16:44 +00:00
Andy Polyakov
232a938c75
Make sha*-ia64 modules alignment neutral.
2007-05-13 15:15:24 +00:00
Ben Laurie
69ab085290
More IGE speedup.
2007-05-13 15:14:38 +00:00
Ben Laurie
5f09d0ecc2
AES IGE mode speedup.
2007-05-13 12:57:59 +00:00
Dr. Stephen Henson
76b46e7707
Document streaming options.
2007-05-11 12:08:38 +00:00
Dr. Stephen Henson
6217896145
Improve error detection when streaming S/MIME.
...
Only use streaming when appropriate for detached data in smime utility.
2007-05-10 17:37:15 +00:00
Dr. Stephen Henson
ee7ca0941a
Tidy up docs, remove warning.
2007-05-10 17:35:37 +00:00
Dr. Stephen Henson
f8492ffeaa
More useful ASN1 macros for static allocation functions.
2007-05-10 17:34:42 +00:00
Andy Polyakov
308595638a
Mention Core2 in sha1-x86_64.
2007-05-10 07:34:50 +00:00
Andy Polyakov
0bd8d6e2e1
Commentary updates to SHA for sparcv9.
2007-05-10 06:48:28 +00:00
Andy Polyakov
160065c5bb
Detect UltraSPARC T1 in ./config.
2007-05-04 13:04:17 +00:00
Andy Polyakov
ae0d6e3e36
Engage SHA for sparcv9.
2007-05-04 12:54:02 +00:00
Andy Polyakov
6fa8a01c72
SHA for sparcv9.
2007-05-04 12:52:54 +00:00
Andy Polyakov
3f6916cf29
Fix bug introduced in cn#16195.
2007-05-03 09:12:47 +00:00
Andy Polyakov
a4470ae7b2
Fine reading of manual suggests that km can return non-normal completion code.
2007-05-03 07:26:27 +00:00
Andy Polyakov
251718e4c1
Fix s390x bugs and correct performance coefficients.
2007-05-02 11:44:02 +00:00
Richard Levitte
c504a5e783
Synchronise VMS with Unix.
2007-05-01 12:25:15 +00:00
Andy Polyakov
f6fb2c95ef
Revert irrelevant changes from commit #16191 .
2007-04-30 17:22:09 +00:00
Andy Polyakov
708311267a
rll does not seem to be available on legacy s390.
2007-04-30 17:19:12 +00:00
Andy Polyakov
cdd1d7a618
Typo in commit #16187 .
2007-04-30 15:55:00 +00:00
Andy Polyakov
2f324768b2
Typo in s390x_asm.
2007-04-30 15:48:54 +00:00
Andy Polyakov
6ef18c21c9
Bug in apps/dgst.c.
2007-04-30 15:20:10 +00:00
Andy Polyakov
b38c0add30
s390x optimizations.
2007-04-30 13:26:06 +00:00
Andy Polyakov
b900df5258
Engage s390x assembler modules.
2007-04-30 09:22:27 +00:00
Andy Polyakov
a2a54ffc5f
s390x assembler pack.
2007-04-30 08:42:54 +00:00
Andy Polyakov
20c04a13e6
Reimplement rc4-586.pl, relicense rc4-x86_64.pl.
2007-04-26 20:48:38 +00:00
Bodo Möller
a291745eeb
fix function codes for error
2007-04-24 01:06:19 +00:00
Bodo Möller
0862caf27e
remove leftover from editing ...
2007-04-24 00:47:53 +00:00
Bodo Möller
cb1bab1a04
All ciphersuites should have a strength designator.
2007-04-24 00:13:51 +00:00
Bodo Möller
96afc1cfd5
Add SEED encryption algorithm.
...
PR: 1503
Submitted by: KISA
Reviewed by: Bodo Moeller
2007-04-23 23:48:59 +00:00
Bodo Möller
24a8c25ab5
fix error codes
2007-04-19 15:14:21 +00:00
Bodo Möller
d1e7d1d96c
don't violate the bn_check_top assertion in BN_mod_inverse_no_branch()
2007-04-19 14:45:57 +00:00
Dr. Stephen Henson
18f547734e
New function ASN1_STRING_copy() to copy to an already
...
alloacted ASN1_STRING structure.
2007-04-14 17:53:55 +00:00
Dr. Stephen Henson
be3b365a34
Sample text files for S/MIME test programs.
2007-04-13 20:41:42 +00:00
Dr. Stephen Henson
b2b2dafc28
Add a bunch of S/MIME sample programs and data.
2007-04-13 20:40:47 +00:00
Dr. Stephen Henson
14ab6cdd69
Flush b64 BIO.
2007-04-13 18:00:45 +00:00
Dr. Stephen Henson
eeec060df0
Don't finalize signerinfo if reuse and partial both set.
2007-04-13 16:41:52 +00:00
Dr. Stephen Henson
0efb7b1eea
PKCS7_sign_add_signer() docs.
2007-04-13 16:31:08 +00:00
Dr. Stephen Henson
f000f705ea
More docs for streaming functions.
2007-04-13 15:43:15 +00:00
Dr. Stephen Henson
2749cc1ede
Typo.
2007-04-13 13:23:31 +00:00
Dr. Stephen Henson
a44e4f2cf8
d2i_PKCS7_bio_stream() docs.
2007-04-13 13:22:15 +00:00
Dr. Stephen Henson
30b10f947a
Oops...
2007-04-13 13:20:46 +00:00
Dr. Stephen Henson
731c6802d7
Update docs.
2007-04-13 13:13:14 +00:00
Dr. Stephen Henson
4cfb986f27
Update docs.
2007-04-13 12:57:48 +00:00
Dr. Stephen Henson
9cfc8a9d5c
Update smime utility to support streaming for -encrypt and -sign -nodetach
...
options. Add new streaming i2d (though strictly speaking it is BER format
when streaming) and PEM functions.
These all process content on the fly without storing it all in memory.
2007-04-13 01:06:41 +00:00
Dr. Stephen Henson
18327cd0e4
Copy update callback across when copying EVP_MD_CTX.
...
Remove unnecessary reference to EVP_MD_CTX in HMAC pkey method.
2007-04-12 13:02:31 +00:00
Dr. Stephen Henson
2022cfe07e
New -mac and -macopt options to dgst utility. Reimplement -hmac option in
...
terms of new API.
2007-04-11 17:20:40 +00:00
Dr. Stephen Henson
47b71e6ee9
Update CHANGES.
2007-04-11 12:33:28 +00:00
Dr. Stephen Henson
74633553a9
Experimental HMAC support via EVP_PKEY_METHOD.
2007-04-11 12:33:06 +00:00
Dr. Stephen Henson
376bf1d4aa
Constification.
2007-04-11 12:26:53 +00:00
Dr. Stephen Henson
d318fb79d2
Don't ignore config_name parameter passed to OPENSSL_config(). Use
...
"openssl_conf" in config file if config_name variable is missing.
2007-04-09 11:45:54 +00:00
Dr. Stephen Henson
0cc361f3e7
Fix from stable branch.
2007-04-08 17:45:47 +00:00
Dr. Stephen Henson
baecb96e8a
Fix digest signing so digest type is set after init.
2007-04-08 16:53:50 +00:00
Dr. Stephen Henson
6181f5e404
Preliminary support for signctx/verifyctx callbacks.
2007-04-08 13:03:26 +00:00
Dr. Stephen Henson
d952c79a7b
New -sigopt option for dgst utility.
2007-04-08 12:47:18 +00:00
Ben Laurie
3dfb6b3353
Yet another resource leak. Coverity ID 123.
2007-04-07 13:20:09 +00:00
Ben Laurie
48bd505c0b
If you're going to check for negative, use an signed integer! Coverity ID 122.
2007-04-05 17:31:29 +00:00
Ben Laurie
ab2d91bd6b
Don't copy from a nonexistent next. Coverity ID 47.
2007-04-05 17:23:51 +00:00
Ben Laurie
3b2eead381
Fix duplicate error number.
2007-04-05 17:09:43 +00:00
Ben Laurie
f3d2a9db09
Errors should actually be errors.
2007-04-05 17:03:09 +00:00
Ben Laurie
8bbf6ac010
Don't dereference NULL argument. Coverity ID 52.
2007-04-05 16:58:39 +00:00
Ben Laurie
38e952e8ae
Missing config file.
2007-04-05 16:57:07 +00:00
Ben Laurie
fa9fed1c3a
Don't use a negative number as a length. Coverity ID 57.
2007-04-05 16:28:48 +00:00
Ben Laurie
f6301f6888
Avoid overrun. Coverity ID 60.
2007-04-05 15:45:58 +00:00
Ben Laurie
44907e6064
Free memory. Coverity ID 62.
2007-04-05 15:45:22 +00:00
Nils Larsch
907e99623c
check return value of ASN1_item_i2d(), Coverity ID 55
2007-04-04 19:41:20 +00:00
Ben Laurie
231671b9ff
Resource leak.
2007-04-04 16:00:03 +00:00
Ben Laurie
4f1a0b2c21
Handle bad content type. Coverity ID 99.
2007-04-04 15:31:17 +00:00
Ben Laurie
260c497cdd
Fix buffer overrun. Coverity ID 106.
2007-04-04 15:13:31 +00:00
Ben Laurie
313fce7b61
Don't free a NULL. Coverity ID 112.
2007-04-04 14:59:20 +00:00
Ben Laurie
2f877235a3
Missing return on error. Coverity ID 115.
2007-04-04 14:38:59 +00:00
Ben Laurie
309fa55bbb
Return an error if the serial number is badly formed. (Coverity ID 116).
2007-04-04 14:35:56 +00:00
Ben Laurie
4b8747e440
Die if serial number is invalid.
2007-04-04 13:41:33 +00:00
Ben Laurie
2ff7a0edef
Make sure we detect corruption.
2007-04-04 13:21:15 +00:00
Nils Larsch
442cbb062d
check correct pointer before freeing it (Coverity CID 79,86)
2007-04-02 20:29:40 +00:00
Nils Larsch
c971ca4c86
check if pointer is != NULL before dereferencing it (Coverity CID 40)
2007-04-02 20:02:27 +00:00
Andy Polyakov
9babf3929b
RC4_set_key for x86_64 and Core2 optimization.
...
PR: 1447
2007-04-02 09:50:14 +00:00
Ben Laurie
2ec0be9e77
Don't die if the value is NULL (Coverity CID 98).
2007-04-01 18:00:52 +00:00
Ben Laurie
c2d1c2d319
Fix warning.
2007-04-01 17:56:25 +00:00
Andy Polyakov
162f677def
Update x86cpuid.pl to correctly detect shared cache and to support new
...
RC4_set_key.
2007-04-01 17:28:08 +00:00
Andy Polyakov
2875462425
Reserve for assembler implementation of RC4_set_key and implement x86 one.
2007-04-01 17:01:12 +00:00
Richard Levitte
a1d915990b
Apply a more modern way to get the definition of select(), except for VMS.
...
Submitted by Corinna Vinschen <vinschen@redhat.com >
2007-03-29 18:34:57 +00:00
Bodo Möller
b002265ee3
make BN_FLG_CONSTTIME semantics more fool-proof
2007-03-28 18:41:23 +00:00
Bodo Möller
bd31fb2145
Change to mitigate branch prediction attacks
...
Submitted by: Matthew D Wood
Reviewed by: Bodo Moeller
2007-03-28 00:15:28 +00:00
Andy Polyakov
b506821d43
Allow shared builds for aix[64]-gcc targets.
2007-03-25 15:20:35 +00:00
Andy Polyakov
4bfb49b3cf
aix[64]-cc config lines update.
2007-03-25 15:13:51 +00:00
Dr. Stephen Henson
9981a51e42
Stage 1 GOST ciphersuite support.
...
Submitted by: ran@cryptocom.ru
Reviewed by: steve@openssl.org
2007-03-23 17:04:05 +00:00
Richard Levitte
ebb326afe6
Synchronise the VMS build with recent movements in the Unix build.
2007-03-23 09:36:33 +00:00
Andy Polyakov
0d1aa74d6f
Fixes for aix-shared rules.
2007-03-22 08:46:33 +00:00
Bodo Möller
0f32c841a6
stricter session ID context matching
2007-03-21 14:33:16 +00:00
Bodo Möller
41a8d5167f
clarification regarding libdes files
2007-03-21 10:58:45 +00:00
Andy Polyakov
8f41e4fa4d
link warnings caused by nasm modules.
2007-03-20 09:37:06 +00:00
Andy Polyakov
de50494505
Two extra instructions in RC4 character loop give 80% performance
...
improvement on Core2. I still need to detect Core2 and choose this
path...
2007-03-20 09:13:07 +00:00
Andy Polyakov
3d1def0132
Remove obsolete comment.
2007-03-20 09:07:19 +00:00
Andy Polyakov
0a29f5110d
Various PowerPC config updates.
2007-03-20 08:57:18 +00:00
Andy Polyakov
8b71d35458
nasm fixes.
2007-03-20 08:55:58 +00:00
Andy Polyakov
760e353528
sparcv9a-mont was modified to handle 32-bit aligned input, but check
...
for 64-bit alignment was not removed.
2007-03-20 08:54:51 +00:00
Dr. Stephen Henson
3627fedbea
Win32 fixes. Add GOST algorithm to mkdef, update ordinals. Signed/unsigned fixes.
2007-03-16 22:20:55 +00:00
Dr. Stephen Henson
bbb5cf05db
Fix from stable branch.
2007-03-05 00:09:08 +00:00
Nils Larsch
ebb01b84b8
size_t -> int
2007-03-02 19:56:29 +00:00
Nils Larsch
a0d48e7e7e
remove unused file
2007-03-02 19:42:16 +00:00
Lutz Jänicke
1fcfa22222
Initialize "buf" to 0 to make valgrind happy :-)
...
Note: the RAND_bytes() manual page says:
RAND_bytes() puts num cryptographically strong pseudo-random bytes into buf.
It does not talk about using the previous contents of buf so we are working
as documented.
2007-03-02 17:54:51 +00:00
Lutz Jänicke
c9fb4e2c8d
Do not use uninitialized memory to seed the PRNG as it may confuse
...
code checking tools.
PR: 1499
2007-03-02 17:46:25 +00:00
Dr. Stephen Henson
6e7ca5e1eb
Update from stable branch.
2007-02-27 18:43:42 +00:00
Ralf S. Engelschall
954b274789
small cosmetics: align title with the other similar manual page
2007-02-27 07:41:54 +00:00
Nils Larsch
0d5ac5a738
allow EVP_PKEY_CTX_free(NULL)
2007-02-26 18:32:53 +00:00
Nils Larsch
c209a35820
remove dead code
2007-02-26 18:21:19 +00:00
Bodo Möller
dd2b6750db
include complete 0.9.7 history
...
include release date of 0.9.8e
2007-02-26 10:49:59 +00:00
Bodo Möller
4bb89bca9e
use 2007 copyright for generated files
2007-02-26 10:48:10 +00:00
Dr. Stephen Henson
ac63b8370e
Update FAQ,NEWS in HEAD.
2007-02-23 13:16:38 +00:00
Bodo Möller
882d29dd87
Fix incorrect substitution that happened during the recent ciphersuite
...
selection remodeling
Submitted by: Victor Duchovni
2007-02-22 21:31:19 +00:00
Lutz Jänicke
ee373e7f19
Fix problem with multi line responses in -starttls by using a buffering
...
BIO and BIO_gets().
2007-02-22 17:39:47 +00:00
Lutz Jänicke
8d72476e2b
Extend SMTP and IMAP protocol handling to perform the required
...
EHLO or CAPABILITY handshake before sending STARTTLS
Submitted by: Goetz Babin-Ebell <goetz@shomitefo.de >
2007-02-21 18:20:41 +00:00
Lutz Jänicke
02756aa8ba
Add automatic detection for Linux on SuperH
...
PR: 1152
Submitted by: Mike Frysinger <vapier@gentoo.org >
2007-02-21 18:10:20 +00:00
Lutz Jänicke
072dfb9e4e
Add support for m68k linux
...
PR: 1277
Submitted by: Mike Frysinger <vapier@gentoo.org >
2007-02-21 17:58:54 +00:00
Lutz Jänicke
0636c39bb1
Fix incorrect handling of special characters
...
PR: 1459
Submitted by: tnitschke@innominate.com
Reviewed by: steve@openssl.org
2007-02-21 17:44:53 +00:00
Dr. Stephen Henson
a2e623c011
Update from 0.9.7-stable.
2007-02-21 13:49:35 +00:00
Bodo Möller
aa79dd6895
prefer SHA1 over MD5 (this affects the Kerberos ciphersuites)
2007-02-21 09:33:14 +00:00
Bodo Möller
60cad2caed
delete obsolete comment
2007-02-21 09:32:17 +00:00
Bodo Möller
114c9c36b1
SSL_kKRB5 ciphersuites shouldn't be preferred by default
2007-02-20 16:39:58 +00:00
Bodo Möller
fd5bc65cc8
Improve ciphersuite order stability when disabling ciphersuites.
...
Change ssl_create_cipher_list() to prefer ephemeral ECDH over
ephemeral DH.
2007-02-20 16:36:58 +00:00
Bodo Möller
e041863905
fix a typo in the new ciphersuite ordering code
2007-02-20 13:25:36 +00:00
Bodo Möller
0a05123a6c
Include "!eNULL" in SSL_DEFAULT_CIPHER_LIST to make sure that a
...
ciphersuite string such as "DEFAULT:RSA" cannot enable
authentication-only ciphersuites.
Also, change ssl_create_cipher_list() so that it no longer
starts with an arbitrary ciphersuite ordering, but instead
uses the logic that we previously had in SSL_DEFEAULT_CIPHER_LIST.
SSL_DEFAULT_CIPHER_LIST simplifies into just "ALL:!aNULL:!eNULL".
2007-02-19 18:41:41 +00:00
Bodo Möller
2afe316721
fix warnings for CIPHER_DEBUG builds
2007-02-19 16:59:13 +00:00
Bodo Möller
7e69565fe6
fix warnings/inconsistencies caused by the recent changes to the
...
ciphersuite selection code in HEAD
Submitted by: Victor Duchovni
2007-02-19 14:53:18 +00:00
Bodo Möller
ccae144d62
fix incorrect strength bit values for certain Kerberos ciphersuites
...
Submitted by: Victor Duchovni
2007-02-19 14:49:12 +00:00
Dr. Stephen Henson
5d5ca32fa1
Updates from 0.9.8-stable branch.
2007-02-18 18:21:57 +00:00
Bodo Möller
52b8dad8ec
Reorganize the data used for SSL ciphersuite pattern matching.
...
This change resolves a number of problems and obviates multiple kludges.
A new feature is that you can now say "AES256" or "AES128" (not just
"AES", which enables both).
In some cases the ciphersuite list generated from a given string is
affected by this change. I hope this is just in those cases where the
previous behaviour did not make sense.
2007-02-17 06:45:38 +00:00
Nils Larsch
cc684e330b
ensure that the EVP_CIPHER_CTX object is initialized
...
PR: 1490
2007-02-16 20:34:15 +00:00
Richard Levitte
85c6749216
Add STARTTLS support for IMAP and FTP.
...
Submitted by Kees Cook <kees@outflux.net >
2007-02-16 18:12:16 +00:00
Nils Larsch
30e5e8aca5
- use OPENSSL_malloc() etc. in zlib
...
- move zlib_stateful_ex_idx initialization to COMP_zlib()
PR: 1468
2007-02-14 21:52:01 +00:00
Nils Larsch
b900a6b42f
avoid shifting input
2007-02-11 19:33:21 +00:00
Nils Larsch
15780a1ea0
use user-supplied malloc functions for persistent kssl objects
...
PR: 1467
Submitted by: Andrei Pelinescu-Onciul <andrei@iptel.org >
2007-02-10 10:42:48 +00:00
Nils Larsch
92ada7cc52
remove unreachable code
2007-02-10 09:45:07 +00:00
Dr. Stephen Henson
53ca4761cc
PR: 1483
...
Add support for GOST 28147-89 in Gost ENGINE.
2007-02-09 19:43:04 +00:00
Dr. Stephen Henson
52cfa39716
Add -hmac option to dgst from 0.9.7 stable branch.
2007-02-08 19:07:43 +00:00
Nils Larsch
b3bad17d1a
remove unused variable
2007-02-07 20:49:58 +00:00
Nils Larsch
feaaf1dbea
ensure that a ec key is used
...
PR: 1476
2007-02-07 20:28:19 +00:00
Richard Levitte
82bf227e91
After objects have been freed, NULLify the pointers so there will be no double
...
free of those objects
2007-02-07 01:42:46 +00:00
Nils Larsch
8807a2dfc4
fix typo
2007-02-06 19:48:42 +00:00
Nils Larsch
bcb38217c4
add note about 56 bit ciphers
...
PR: 1461
2007-02-06 19:41:01 +00:00
Dr. Stephen Henson
af32f9fdda
Update from fips2 branch.
2007-02-03 17:32:49 +00:00
Nils Larsch
357d5de5b9
add support for DSA with SHA2
2007-02-03 14:41:12 +00:00
Nils Larsch
0501f02b06
fix documentation
...
PR: 1466
2007-02-03 10:28:08 +00:00
Nils Larsch
689f9faba4
fix potential memory leaks
...
PR: 1462
2007-02-03 09:55:42 +00:00
Andy Polyakov
82686bdcaa
Minimize aes_core.c footprint when AES_[en|de]crypt is implemented in
...
assembler.
2007-01-25 20:47:00 +00:00
Andy Polyakov
14b1d089b6
Minor touch to aes-armv4.pl.
2007-01-25 11:28:07 +00:00
Andy Polyakov
a296239bdd
AES for ARMv4.
2007-01-25 10:44:48 +00:00
Andy Polyakov
0b0896cdd2
Minor optimization for sha1-armv4 module.
2007-01-25 10:44:18 +00:00
Dr. Stephen Henson
2d3e956ae0
Update from 0.9.7-stable.
2007-01-23 17:53:48 +00:00
Andy Polyakov
36b7c06975
SHA1 for ARMv4 and Thumb.
2007-01-22 20:33:46 +00:00
Dr. Stephen Henson
42182852f5
Constify version strings is ssl lib.
2007-01-21 16:06:05 +00:00
Dr. Stephen Henson
560b79cbff
Constify version strings and some structures.
2007-01-21 13:07:17 +00:00
Dr. Stephen Henson
a6d799d705
Add AOL an AOLTW root CAs to bundle.
2007-01-18 21:24:44 +00:00
Andy Polyakov
64aecc6720
Make armv4t-mont module backward binary compatible with armv4 and rename it
...
accordingly.
2007-01-17 20:12:41 +00:00
Lutz Jänicke
8ac40b4dea
Update to new home page
2007-01-12 18:47:13 +00:00
Andy Polyakov
43b8fe1cd0
Montgomery multiplication for ARMv4.
2007-01-11 21:43:25 +00:00
Nils Larsch
39d764ed58
remove undefined constant
2007-01-03 20:00:32 +00:00
Andy Polyakov
a6ebe229e3
opensslwrap.sh to respect $OPENSSL_ENGINES.
2006-12-29 15:00:36 +00:00
Andy Polyakov
5c914f204a
#include <stddef.h> in digest headers.
...
Submitted by: Kurt Roeckx <kurt@roeckx.be >
2006-12-29 14:51:42 +00:00
Andy Polyakov
8876e58f34
Montgomery multiplication for MIPS III/IV. Not engaged.
2006-12-29 11:09:33 +00:00
Andy Polyakov
7321a84d4c
Minor clean-up in crypto/bn/asm.
2006-12-29 11:05:20 +00:00
Andy Polyakov
bb11c28246
Minor clean-up in crypto/engine.
2006-12-29 10:55:43 +00:00
Andy Polyakov
8d9f136d06
Allow opensslwrap.sh to access engines from build tree.
2006-12-29 10:53:09 +00:00
Andy Polyakov
00b4e083fd
Move eng_padlock.c to ./engines.
...
Submitted by: Michal Ludvig <michal@logix.cz >
2006-12-29 10:42:24 +00:00
Andy Polyakov
4cfe3df1f5
Minor performance improvements to x86-mont.pl.
2006-12-28 12:43:16 +00:00
Andy Polyakov
8f2d60ec26
Fix for "strange errors" exposed by ccgost engine. The fix is
...
two extra insructions in sqradd loop at line #503 .
2006-12-27 10:59:51 +00:00
Nils Larsch
123b23fa95
fix return value of get_cert_chain()
...
PR: 1441
2006-12-27 09:40:52 +00:00
Richard Levitte
423a5d54a1
Synchronise a bit more with Unixly build
2006-12-26 21:20:15 +00:00
Richard Levitte
8bbf6bcf17
Needed definition of _XOPEN_SOURCE_EXTENDED so DEC C on VMS will see
...
the declarations of fd_set, select() and so on.
2006-12-25 10:54:14 +00:00
Richard Levitte
ea46f5e0e5
Replace strdup() with BUF_strdup().
2006-12-25 09:43:46 +00:00
Richard Levitte
7f6c848242
Synchronise with Unixly build, again ;-)
2006-12-24 20:25:51 +00:00
Dr. Stephen Henson
559d50138f
Add bit I missed from PKCS#7 streaming encoder.
2006-12-24 16:46:47 +00:00
Dr. Stephen Henson
11d8cdc6ad
Experimental streaming PKCS#7 support.
...
I thought it was about time I dusted this off. This stuff had been sitting on
my hard drive for *ages* (2003 in fact). Hasn't been tested well and may not
work properly.
Nothing uses it at present which is just as well.
Think of this as a traditional Christmas present which looks far more
impressive in the adverts and on the box, some of the bits are missing and
falls to bits if you play with it too much.
2006-12-24 16:22:56 +00:00
Richard Levitte
e49978dafe
Synchronise with Unixly build
2006-12-24 09:27:23 +00:00
Andy Polyakov
e1d9e533b5
Oops! New prototype code creeped through...
2006-12-22 15:47:01 +00:00
Andy Polyakov
f946dd7198
Make sha.h more "portable."
2006-12-22 15:42:06 +00:00
Andy Polyakov
1702c8c4bf
x86-mont.pl sse2 tune-up and integer-only squaring procedure.
2006-12-22 15:28:07 +00:00
Nils Larsch
afda1385bd
use OPENSSL_NO_DYNAMIC_ENGINE macro, disable debug messages
...
PR: 1440
Submitted by: Victor B. Wagner" <vitus@cryptocom.ru >
2006-12-22 09:21:29 +00:00
Nils Larsch
fec38ca4ed
fix typos
...
PR: 1354, 1355, 1398, 1408
2006-12-21 21:13:27 +00:00
Nils Larsch
ec1edeb5fa
update pkcs12 help message + manpage
...
PR: 1443
Submitted by: Artem Chuprina <ran@cryptocom.ru >
2006-12-21 20:36:15 +00:00
Nils Larsch
b0ec114685
fix order
...
PR: 1442
2006-12-21 19:50:48 +00:00
Nils Larsch
c92da5a605
update
2006-12-21 19:48:47 +00:00
Nils Larsch
06e2dd037e
add support for ecdsa-with-sha256 etc.
2006-12-20 08:58:54 +00:00
Nils Larsch
34f0a19309
remove trailing '\'
...
PR: 1438
2006-12-19 19:49:02 +00:00
Bodo Möller
772e3c07b4
Fix the BIT STRING encoding of EC points or parameter seeds
...
(need to prevent the removal of trailing zero bits).
2006-12-19 15:11:37 +00:00
Nils Larsch
360ff3cf58
fix order
2006-12-18 22:20:27 +00:00
Nils Larsch
5dfe910023
properly initialize SSL context, check return value
2006-12-13 22:06:37 +00:00
Nils Larsch
91b73acb19
use const ASN1_TIME *
2006-12-11 22:35:51 +00:00
Andy Polyakov
87d3af6475
Eliminate 64-bit alignment limitation in sparcv9a-mont.
2006-12-08 15:18:41 +00:00
Andy Polyakov
98c1509f34
Engage alpha-mont module. Actually verified on Tru64 only.
2006-12-08 14:42:19 +00:00
Andy Polyakov
98939a05b6
alpha-mont.pl: gcc portability fix and make-rule.
2006-12-08 14:18:58 +00:00
Andy Polyakov
d28134b8f3
Minor, +10%, tune-up for x86_64-mont.pl.
2006-12-08 10:13:51 +00:00
Andy Polyakov
8583eba015
Montgomery multiplication routine for Alpha.
2006-12-08 10:12:56 +00:00
Dr. Stephen Henson
5894b98f99
Update from 0.9.7-stable branch.
2006-12-07 13:29:08 +00:00
Dr. Stephen Henson
5de3a0ff3d
Sync OID NIDs with OpenSSL 0.9.8.
2006-12-06 13:44:21 +00:00
Dr. Stephen Henson
10ca15f3fa
Fix change to OPENSSL_NO_RFC3779
2006-12-06 13:36:48 +00:00
Nils Larsch
da736b31b2
fix documentation
...
PR: 1343
2006-12-06 09:10:59 +00:00
Nils Larsch
fa9ac569b8
avoid duplicate entries in add_cert_dir()
...
PR: 1407
Submitted by: Tomas Mraz <tmraz@redhat.com >
2006-12-05 21:21:37 +00:00
Nils Larsch
10a10fb834
return 0 if 'noout' is used and no error has occurred
...
PR: 1435
Submitted by: "Haridharan" <haridharan@gmail.com >
2006-12-05 20:09:25 +00:00
Nils Larsch
0f997d0dc3
allocate a new attributes entry in X509_REQ_add_extensions()
...
if it's NULL (in case of a malformed pkcs10 request)
PR: 1347
Submitted by: Remo Inverardi <invi@your.toilet.ch >
2006-12-04 19:11:57 +00:00
Nils Larsch
b0eedd77f6
add "Certificate Issuer" and "Subject Directory Attributes" OIDs
...
PR: 1433
2006-12-04 18:51:06 +00:00
Andy Polyakov
502aef5aaf
Eliminate redundant variable in Camellia CBC routine.
2006-12-02 11:52:50 +00:00
Andy Polyakov
9f8cfb1c62
Improve Camellia code readability.
2006-12-02 11:12:13 +00:00
Andy Polyakov
c163b5f7a0
Fix bugs in Camellia CBC routine.
2006-12-02 10:56:45 +00:00
Andy Polyakov
20da8b8f90
Camellia portability fixes.
...
Submitted by: Masashi Fujita, NTT
2006-12-02 10:38:40 +00:00
Nils Larsch
ae93dc13ab
add support for whirlpool in apps/speed
...
PR: 1338
Submitted by: justin@soze.net
2006-12-01 21:42:55 +00:00
Dr. Stephen Henson
77e87e6148
Fix default dependency flags.
2006-11-30 13:55:30 +00:00
Dr. Stephen Henson
a6e700e665
Import ordinals from 0.9.8 and update.
2006-11-30 13:47:22 +00:00
Dr. Stephen Henson
4d7aff707e
Update dependencies.
2006-11-30 13:41:47 +00:00
Dr. Stephen Henson
d137b56a5b
Win32 fixes from stable branch.
2006-11-30 13:39:34 +00:00
Nils Larsch
7806f3dd4b
replace macros with functions
...
Submitted by: Tracy Camp <tracyx.e.camp@intel.com >
2006-11-29 20:54:57 +00:00
Bodo Möller
1e24b3a09e
fix support for receiving fragmented handshake messages
2006-11-29 14:45:50 +00:00
Andy Polyakov
73b979e601
Clarify HAL SPARC64 support situation in sparcv9a-mont.pl.
2006-11-28 11:07:36 +00:00
Andy Polyakov
ebae8092cb
Minor optimizations based on intruction level profiler feedback.
2006-11-28 10:34:51 +00:00
Andy Polyakov
2e21922eb6
Modulo-schedule loops in sparcv9a-mont.pl. Overall improvement factor
...
over 0.9.8 is up to 3x on USI&II cores and up to 80% - on USIII&IV.
2006-11-28 07:24:26 +00:00
Andy Polyakov
1c3d2b94be
This is "informational" commit. Its mere purpose is to expose "modulo
...
factor" in inner loops.
2006-11-28 07:20:36 +00:00
Andy Polyakov
48d2335d73
Non-SSE2 path to bn_mul_mont. But it's disabled, because it currently
...
doesn't give performance improvement.
2006-11-27 14:59:35 +00:00
Ben Laurie
96ea4ae91c
Add RFC 3779 support.
2006-11-27 14:18:05 +00:00
Andy Polyakov
7af5726108
sha512-ppc.pl mutli-thread safety fix.
2006-11-27 13:11:15 +00:00
Nils Larsch
69d4646f4e
register the engine as default engine in ENGINE_set_default()
...
PR: 1431
2006-11-24 18:37:43 +00:00
Dr. Stephen Henson
8bd11f3ec2
Add .cvsignore
2006-11-21 21:37:41 +00:00
Dr. Stephen Henson
47a9d527ab
Update from 0.9.8 stable. Eliminate duplicate error codes.
2006-11-21 21:29:44 +00:00
Ulf Möller
d9907c972b
wording (can't really call shared libs experimental after several years in the major Linux distributions)
2006-11-21 20:51:25 +00:00
Dr. Stephen Henson
1444bfb2c8
Update ordinals.
2006-11-16 00:56:01 +00:00
Dr. Stephen Henson
14975faa60
Remove illegal IMPLEMENT macros from header file.
2006-11-16 00:55:33 +00:00
Dr. Stephen Henson
3f12464861
Remove redundant PREDECLARE statement.
2006-11-16 00:52:49 +00:00
Dr. Stephen Henson
de12116417
Initial, incomplete support for typesafe macros without using function
...
casts.
2006-11-16 00:19:39 +00:00
Dr. Stephen Henson
28b987aec9
Don't assume requestorName is present for signed requests. ASN1 OCSP module
...
fix: certs field is OPTIONAL.
2006-11-13 13:21:47 +00:00
Dr. Stephen Henson
fb596f3bb7
OCSP library tidy. Use extension to encode OCSP extensions instead of doing
...
it manually. Make OCSP_CERTID_dup() a real function instead of a macro.
2006-11-13 13:18:28 +00:00
Ben Laurie
84948b39df
Fix various warnings.
2006-11-08 09:45:12 +00:00
Dr. Stephen Henson
cf32ad7fe3
Make TSA tests use the noprompt mode of utilities rather than piping
...
the result into interative utilities.
2006-11-07 16:21:16 +00:00
Dr. Stephen Henson
ad0e439604
Avoid shadow warning.
2006-11-07 16:20:14 +00:00
Dr. Stephen Henson
5456583294
Don't add the TS EKU by default in openssl.cnf because it then
...
makes certificates genereated by ca, CA.pl etc useless for anything else.
2006-11-07 14:27:55 +00:00
Dr. Stephen Henson
f1845cbee8
Typo.
2006-11-07 13:46:37 +00:00
Dr. Stephen Henson
51cc37b69d
Fix link for ASN1_generate_nconf
2006-11-07 13:44:03 +00:00
Dr. Stephen Henson
ff1b10dca1
Typo.
2006-11-07 13:17:02 +00:00
Dr. Stephen Henson
ebeb17e2e0
Add v3 ref to see also sections.
2006-11-07 13:13:14 +00:00
Dr. Stephen Henson
137de5b157
Add documentetion for noCheck extension and add a few cross references to
...
the extension documentation.
2006-11-07 12:51:27 +00:00
Nils Larsch
224328e404
fix warning
2006-11-06 20:10:44 +00:00
Nils Larsch
1611b9ed80
remove SSLEAY_MACROS code
2006-11-06 19:53:39 +00:00
Nils Larsch
8a4af56fc6
update md docs
2006-10-27 21:58:09 +00:00
Nils Larsch
05cfe06607
fix OPENSSL_NO_foo defines
2006-10-27 21:25:53 +00:00
Dr. Stephen Henson
b37a68cc8f
Initialize old_priv_encode, old_priv_decode.
2006-10-27 11:43:27 +00:00
Andy Polyakov
a2688c872d
Minor portability update to c_rehash.
2006-10-26 10:52:12 +00:00
Andy Polyakov
5b50f99e1e
Further mingw build procedure updates.
2006-10-24 22:14:20 +00:00
Andy Polyakov
b8994b6130
Harmonize dll naming in mingw builds.
2006-10-23 11:54:18 +00:00
Andy Polyakov
d7917c584a
Yet another mingw warning.
2006-10-23 07:45:52 +00:00
Andy Polyakov
544d845585
OPENSSL_ia32cap.pod update.
2006-10-23 07:44:51 +00:00
Andy Polyakov
a6efc2d1b8
Fix mingw warnings.
2006-10-23 07:41:05 +00:00
Andy Polyakov
3189772e07
Switch Win32/64 targets to Winsock2. Updates to ISNTALL.W32 cover even
...
recent mingw modifications.
2006-10-23 07:38:30 +00:00
Andy Polyakov
08a638237d
Allow for mingw cross-compile configuration.
2006-10-23 07:30:19 +00:00
Andy Polyakov
d8cdd1567f
Make c_rehash more platform neutral and make it work in mixed environment,
...
such as MSYS with "native" Win32 perl.
2006-10-21 16:28:03 +00:00
Andy Polyakov
cbfb39d1be
Rudimentary support for cross-compiling.
2006-10-21 13:38:16 +00:00
Andy Polyakov
a4d64c7f49
Align data payload for better performance.
2006-10-20 11:26:00 +00:00
Andy Polyakov
1e7b6c029c
Avoid application relink on every make invocation.
2006-10-20 11:23:35 +00:00
Andy Polyakov
3634d7e97a
Gcc over-optimizes PadLock AES CFB codepath, tell it not to.
2006-10-19 20:55:05 +00:00
Andy Polyakov
53d7efea76
Temporary fix for sha256 IA64 assembler.
2006-10-18 09:42:56 +00:00
Andy Polyakov
002684d693
Fix bug in big-endian path and optimize it for size.
2006-10-18 08:15:16 +00:00
Andy Polyakov
c038b8aa56
Typo in perlasm/x86asm.pl.
2006-10-17 16:21:28 +00:00
Andy Polyakov
c5f17d45c1
Further synchronizations with md32_common.h update, consistent naming
...
for low-level SHA block routines.
2006-10-17 16:13:18 +00:00
Andy Polyakov
31439046e0
bn/asm/ppc.pl to use ppc-xlate.pl.
2006-10-17 14:37:07 +00:00
Andy Polyakov
11d0ebc841
Further synchronizations with md32_common.h update.
2006-10-17 13:38:10 +00:00
Andy Polyakov
cecfdbf72d
VIA-specific Montgomery multiplication routine.
2006-10-17 07:04:48 +00:00
Andy Polyakov
f0f61f6d0d
Synchronize SHA1 assembler with md32_common.h update.
2006-10-17 07:00:23 +00:00
Andy Polyakov
d68ff71004
Support for .asciz directive in perlasm modules.
2006-10-17 06:43:11 +00:00
Andy Polyakov
591e85e928
Linking errors on IA64 and typo in aes-ia64.S.
2006-10-17 06:41:27 +00:00
Andy Polyakov
c69ed6ea39
Re-implement md32_common.h [make it simpler!] and eliminate code rendered
...
redundant as result.
2006-10-11 11:55:11 +00:00
Dr. Stephen Henson
55a08fac68
Typo.
2006-10-05 21:59:50 +00:00
Nils Larsch
2fc281d01f
return an error if the supplied precomputed values lead to an invalid signature
2006-10-04 19:37:17 +00:00
Bodo Möller
d326582cab
ASN1_item_verify needs to initialize ctx before any "goto err" can
...
happen; the new code for the OID cross reference table failed to do so.
2006-10-04 06:14:36 +00:00
Dr. Stephen Henson
f4c630abb3
Place standard CRL behaviour in default X509_CRL_METHOD new functions to
...
create, free and set default CRL method.
2006-10-03 02:47:59 +00:00
Mark J. Cox
c2cccfc585
Initialise ctx to NULL to avoid uninitialized free, noticed by
...
Steve Kiernan
2006-09-29 08:21:41 +00:00
Bodo Möller
3c5406b35c
All 0.9.8d patches have been applied to HEAD now, so we no longer need
...
the redundant entries under the 0.9.9 heading.
2006-09-28 13:50:41 +00:00
Bodo Möller
5e3225cc44
Introduce limits to prevent malicious keys being able to
...
cause a denial of service. (CVE-2006-2940)
[Steve Henson, Bodo Moeller]
2006-09-28 13:45:34 +00:00
Bodo Möller
61118caa86
include 0.9.8d and 0.9.7l information
2006-09-28 13:35:01 +00:00
Mark J. Cox
348be7ec60
Fix ASN.1 parsing of certain invalid structures that can result
...
in a denial of service. (CVE-2006-2937) [Steve Henson]
2006-09-28 13:20:44 +00:00
Mark J. Cox
3ff55e9680
Fix buffer overflow in SSL_get_shared_ciphers() function.
...
(CVE-2006-3738) [Tavis Ormandy and Will Drewry, Google Security Team]
Fix SSL client code which could crash if connecting to a
malicious SSLv2 server. (CVE-2006-4343)
[Tavis Ormandy and Will Drewry, Google Security Team]
2006-09-28 13:18:43 +00:00
Richard Levitte
cbb92dfaf0
Fixes for the following claims:
...
1) Certificate Message with no certs
OpenSSL implementation sends the Certificate message during SSL
handshake, however as per the specification, these have been omitted.
-- RFC 2712 --
CertificateRequest, and the ServerKeyExchange shown in Figure 1
will be omitted since authentication and the establishment of a
master secret will be done using the client's Kerberos credentials
for the TLS server. The client's certificate will be omitted for
the same reason.
-- RFC 2712 --
3) Pre-master secret Protocol version
The pre-master secret generated by OpenSSL does not have the correct
client version.
RFC 2712 says, if the Kerberos option is selected, the pre-master
secret structure is the same as that used in the RSA case.
TLS specification defines pre-master secret as:
struct {
ProtocolVersion client_version;
opaque random[46];
} PreMasterSecret;
where client_version is the latest protocol version supported by the
client
The pre-master secret generated by OpenSSL does not have the correct
client version. The implementation does not update the first 2 bytes
of random secret for Kerberos Cipher suites. At the server-end, the
client version from the pre-master secret is not validated.
PR: 1336
2006-09-28 12:22:58 +00:00
Dr. Stephen Henson
019bfef899
Initialize new callbacks and make sure hent is always initialized.
2006-09-26 13:25:19 +00:00
Richard Levitte
0709249f4c
Complete the change for VMS.
2006-09-25 08:35:35 +00:00
Dr. Stephen Henson
89c9c66736
Submitted by: Brad Spencer <spencer@jacknife.org>
...
Reviewed by: steve
2006-09-23 17:29:49 +00:00
Dr. Stephen Henson
347ed3b93c
Buffer size handling fix for enc.
...
PR:1374
2006-09-22 17:14:22 +00:00
Dr. Stephen Henson
5b73c3609b
Using correct lock for X509_REQ.
...
PR:1348
2006-09-22 17:06:09 +00:00
Dr. Stephen Henson
eebeb52b29
Update length if copying MSB set in asn1_string_canon().
2006-09-22 13:37:15 +00:00
Dr. Stephen Henson
6ec6cfc767
Updated file.
2006-09-21 16:19:10 +00:00
Dr. Stephen Henson
44181ea836
Add missing prototype. Fix various warnings (C++ comments, ; outside function).
2006-09-21 13:24:46 +00:00
Dr. Stephen Henson
c80c7bf999
Make int_rsa_sign function match prototype.
...
PR: 1383
2006-09-21 13:11:24 +00:00
Dr. Stephen Henson
ffa5ebf3f4
Compile in gost engine.
2006-09-21 13:07:57 +00:00
Dr. Stephen Henson
926c41bd29
Updated version of gost engine.
2006-09-21 13:04:43 +00:00
Dr. Stephen Henson
1182301ca7
Do CRL method init after other operations.
2006-09-21 12:48:56 +00:00
Dr. Stephen Henson
010fa0b331
Tidy up CRL handling by checking for critical extensions when it is
...
loaded. Add new function X509_CRL_get0_by_serial() to lookup a revoked
entry to avoid the need to access the structure directly.
Add new X509_CRL_METHOD to allow common CRL operations (verify, lookup) to be
redirected.
2006-09-21 12:42:15 +00:00
Andy Polyakov
4ca7d975af
Build error on non-unix.
...
PR: 1390
2006-09-18 19:50:54 +00:00
Andy Polyakov
b774111020
Race condition in ms/uplink.c.
...
PR: 1382
2006-09-18 19:41:37 +00:00
Andy Polyakov
78260d890b
As x86ms.pl is out, remove do_masm.bat and mention to it in INSTALL.W32.
2006-09-18 19:20:43 +00:00
Andy Polyakov
4b67fefe5a
Remove x86ms.pl and reimplement x86*.pl.
2006-09-18 19:17:09 +00:00
Andy Polyakov
3a8012cbf2
Improve 386 portability of aes-586.pl.
2006-09-18 19:13:15 +00:00
Bodo Möller
a53cdc5b08
Ensure that the addition mods[i]+delta cannot overflow in probable_prime().
...
[Problem pointed out by Adam Young <adamy (at) acm.org>]
2006-09-18 14:00:49 +00:00
Dr. Stephen Henson
5d20c4fb35
Overhaul of by_dir code to handle dynamic loading of CRLs.
2006-09-17 17:16:28 +00:00
Dr. Stephen Henson
a04549cc75
GOST public key algorithm ENGINE donated to the OpenSSL by Cryptocom.
...
Very early version, doesn't do much yet, not even added to the build system.
2006-09-17 13:00:18 +00:00
Dr. Stephen Henson
bc7535bc7f
Support for AKID in CRLs and partial support for IDP. Overhaul of CRL
...
handling to support this.
2006-09-14 17:25:02 +00:00
Dr. Stephen Henson
83357f047d
Update docs.
2006-09-13 03:28:42 +00:00
Bodo Möller
b6699c3f07
Update
2006-09-12 14:42:19 +00:00
Dr. Stephen Henson
016bc5ceb3
Fixes for new CRL/cert callbacks. Update CRL processing code to use new
...
callbacks.
2006-09-11 13:00:52 +00:00
Bodo Möller
ed65f7dc34
ensure that ciphersuite strings such as "RC4-MD5" match the SSL 2.0
...
ciphersuite as well
2006-09-11 09:49:03 +00:00
Dr. Stephen Henson
4d50a2b4d6
Add verify callback functions to lookup a STACK of matching certs or CRLs
...
based on subject name.
New thread safe functions to retrieve matching STACK from X509_STORE.
Cache some IDP components.
2006-09-10 12:38:37 +00:00
Bodo Möller
7f4301668f
Make sure the int_rsa_verify() prototype matches the implementation
...
(m_len currently is 'unsigned int', not 'size_t')
Submitted by: Gisle Vanem
2006-09-08 06:00:40 +00:00
Dr. Stephen Henson
29a1bb07e5
Additional detail.
2006-09-06 11:59:04 +00:00
Bodo Möller
99e9a90081
update information on "current version" ...
2006-09-06 11:54:19 +00:00
Dr. Stephen Henson
715020e334
Add an FAQ.
2006-09-06 11:53:50 +00:00
Bodo Möller
2952886010
Remove non-functional part of recent patch, after discussion with
...
Colin Percival (this would have caused more problems than solved,
and isn't really necessary anyway)
2006-09-06 06:43:11 +00:00
Bodo Möller
613e7d2a65
Make consistent with 0.9.8-branch version of this file
2006-09-06 06:42:11 +00:00
Bodo Möller
6a2c471077
Every change so far that is in the 0.9.8 branch is (or should be) in HEAD
2006-09-06 06:34:52 +00:00
Mark J. Cox
b79aa05e3b
Avoid PKCS #1 v1.5 signature attack discovered by Daniel Bleichenbacher
...
(CVE-2006-4339)
Submitted by: Ben Laurie, Google Security Team
Reviewed by: bmoeller, mjc, shenson
2006-09-05 08:58:03 +00:00
Andy Polyakov
500b5a181d
Rewrite sha1-586.pl.
2006-08-31 21:27:30 +00:00
Andy Polyakov
2b8a5406f9
Fix bug in aes-586.pl.
2006-08-31 21:15:38 +00:00
Andy Polyakov
2f35ae90fe
Fix bug in x86unix.pl introduced in latest update.
...
PR: 1380
2006-08-31 21:12:17 +00:00
Dr. Stephen Henson
0fca32a7aa
Kill more C++ comments.
2006-08-31 21:01:15 +00:00
Dr. Stephen Henson
02c9b66a6c
Fix C++ style comments, change assert to OPENSSL_assert, stop warning with
...
pedantic mode.
2006-08-31 20:56:20 +00:00
Dr. Stephen Henson
539d4c1030
Fix leak
2006-08-31 20:10:37 +00:00
Ben Laurie
aa6d1a0c19
Forward port of IGE mode.
2006-08-31 14:04:04 +00:00
Ben Laurie
777c47acbe
Make things static that should be. Declare stuff in headers that should be.
...
Fix warnings.
2006-08-28 17:01:04 +00:00
Richard Levitte
5776c3c4c6
According to documentation, including time.h declares select() on
...
OpenVMS, and possibly more.
Ref: http://h71000.www7.hp.com/doc/82final/6529/6529pro_019.html#r_select
2006-08-20 05:54:35 +00:00
Richard Levitte
0c3d346cb7
Correct warnings about signedness.
2006-08-20 05:18:12 +00:00
Ulf Möller
1c23bc5670
Use gmtime on cygwin
...
Submitted by: Corinna Vinschen
2006-08-13 09:03:38 +00:00
Andy Polyakov
8ea975d070
+20% tune-up for Power5.
2006-08-09 15:40:30 +00:00
Andy Polyakov
6c69aa532e
Revised AES_cbc_encrypt in x86 assembler module.
2006-08-07 09:05:52 +00:00
Ulf Möller
6264c9b2a9
Correct punctuation.
...
PR: 1367
2006-08-05 20:45:06 +00:00
Andy Polyakov
fc92414273
Agressively prefetch S-box in SSE codepatch, relax alignment requirement,
...
check for SSE bit instead of MMX, as pshufw was introduces in PIII, minor
optimization, typos...
2006-08-02 22:38:16 +00:00
Andy Polyakov
53154d71c3
Switch to compact S-box when generating AES key schedule.
2006-08-02 07:46:56 +00:00
Andy Polyakov
8cebec9802
Switch to compact S-box when generating AES key schedule.
2006-08-01 22:10:39 +00:00
Andy Polyakov
0209d1605d
Real Bourne shell doesn't interpret ==, but =.
2006-08-01 16:12:10 +00:00
Andy Polyakov
c8a0d0aaf9
Engage assembler in solaris64-x86_64-cc.
2006-07-31 22:28:40 +00:00
Andy Polyakov
0cc46efa09
perlasm/x86unix.pl update.
2006-07-31 22:26:40 +00:00
Andy Polyakov
22c268e6c9
Next generation aes-586.pl featuring AES_[en|de]crypt, accessing exclusively
...
256 byte S-box. AES_cbc_encrypt needs further work as it should also use
slow routines when processing smaller amount of data.
2006-07-31 20:03:56 +00:00
Bodo Möller
dd0514e2cc
Camellia IPR information
2006-07-31 11:50:01 +00:00
Dr. Stephen Henson
f6e7d01450
Support for multiple CRLs with same issuer name in X509_STORE. Modify
...
verify logic to try to use an unexpired CRL if possible.
2006-07-25 17:39:38 +00:00
Dr. Stephen Henson
edc540211c
Cache some CRL related extensions.
2006-07-24 12:39:22 +00:00
Dr. Stephen Henson
2eed3a3cc8
Avoid warning.
2006-07-21 22:46:19 +00:00
Dr. Stephen Henson
1aa44cc797
Avoid WIN32 warning.
2006-07-21 22:28:48 +00:00
Dr. Stephen Henson
37c8fd0eba
Avoid warnings.
2006-07-21 22:26:31 +00:00
Dr. Stephen Henson
786aa98da1
Use correct pointer types for various functions.
2006-07-20 16:56:47 +00:00
Bodo Möller
413e0853d7
New Camellia implementation (replacing previous version)
...
Submitted by: NTT
2006-07-19 13:38:26 +00:00
Bodo Möller
8e4560c42f
Camellia information
2006-07-19 13:36:40 +00:00
Dr. Stephen Henson
450ea83495
Store canonical encodings of Name structures. Update X509_NAME_cmp() to use
...
them.
2006-07-18 12:36:19 +00:00
Andy Polyakov
af8c1d81a3
Reimplement outer rounds as "compact" in x86 assembler. This has rather
...
strong impact on decrypt performance, 20-25%. One probably should consider
switching between slower and faster routines depending on how much data
we were asked to process.
2006-07-18 10:05:38 +00:00
Dr. Stephen Henson
b589427941
WIN32 fixes signed/unsigned issues and slightly socket semantics.
2006-07-17 18:52:51 +00:00
Dr. Stephen Henson
f0fa285f75
Update .cvsignore again.
2006-07-17 16:42:06 +00:00
Dr. Stephen Henson
a0b5b07010
Update .cvsignore
2006-07-17 16:40:20 +00:00
Dr. Stephen Henson
5c95c2ac23
Fix various error codes to match functions.
2006-07-17 16:33:31 +00:00
Dr. Stephen Henson
454dbbc593
Add -timeout option to ocsp utility.
2006-07-17 13:26:54 +00:00
Dr. Stephen Henson
c1c6c0bf45
New non-blocking OCSP functionality.
2006-07-17 12:18:28 +00:00
Andy Polyakov
dff2922aa7
Add option for "compact" rounds to aes_x86core.c. "Compact" rounds are
...
those referencing compact, 256-byte, S-boxes.
2006-07-14 09:57:55 +00:00
Dr. Stephen Henson
f253a058d3
There is should be no need to rewind the input stream any more.
...
For S/MIME multipart/signed type the signature is calculated on the fly.
For other detached data forms the stream isn't used after the single pass to
calculate signatures.
For non-detached the data is stored in a memory BIO.
2006-07-13 20:29:55 +00:00
Dr. Stephen Henson
b3c6a33185
In genpkey, also look for algorithm string name in any supplied ENGINE.
2006-07-12 18:00:20 +00:00
Dr. Stephen Henson
31780d0e26
Bugfix: don't look in internal table for signature if found in application
...
supplied list.
2006-07-12 16:30:40 +00:00
Dr. Stephen Henson
f489ab3147
Typo.
2006-07-12 13:28:44 +00:00
Dr. Stephen Henson
29cf84c692
New docs for EVP_Digest{Sign,Verify}*() function. Update existing docs.
2006-07-12 12:31:30 +00:00
Dr. Stephen Henson
e454929558
Add docs for pkeyparam. Update some existing docs.
2006-07-10 23:10:26 +00:00
Dr. Stephen Henson
105f6a6323
Update some usage messages.
2006-07-10 22:49:08 +00:00
Dr. Stephen Henson
8845701719
make update
2006-07-10 18:40:42 +00:00
Dr. Stephen Henson
b7683e3a5d
Allow digests to supply S/MIME micalg values from a ctrl.
...
Send ctrls to EVP_PKEY_METHOD during signing of PKCS7 structure so
customisation is possible.
2006-07-10 18:36:55 +00:00
Dr. Stephen Henson
0ee2166cc5
New functions to add and free up application defined signature OIDs.
2006-07-09 16:05:43 +00:00
Dr. Stephen Henson
067707e367
Set detached flag in PKCS7 structure earlier to avoid eating up memory.
...
PR: 1071
2006-07-09 12:02:08 +00:00
Dr. Stephen Henson
8211a33c7f
Public key comparison and printing routine functions.
2006-07-09 11:26:13 +00:00
Dr. Stephen Henson
7441052be6
EVP_PKEY_get_default_digest() manual page.
2006-07-09 11:01:49 +00:00
Dr. Stephen Henson
90ccf05f82
EVP_PKEY_CTX_ctrl() docs.
2006-07-09 10:51:03 +00:00
Dr. Stephen Henson
112161bd33
Update docs.
2006-07-09 01:59:30 +00:00
Dr. Stephen Henson
5ba4bf35c5
New functions to enumerate digests and ciphers.
2006-07-09 00:53:45 +00:00
Dr. Stephen Henson
aa93b18c2c
Keygen docs.
2006-07-08 21:42:49 +00:00
Dr. Stephen Henson
ba702545fc
EVP_PKEY_derive() docs.
2006-07-08 12:47:52 +00:00
Dr. Stephen Henson
436369100d
Add some examples.
2006-07-08 12:46:51 +00:00
Dr. Stephen Henson
6535bd42e6
EVP_PKEY_verify() docs.
2006-07-08 11:22:23 +00:00
Dr. Stephen Henson
64cee65ebc
New docs.
2006-07-08 11:13:01 +00:00
Dr. Stephen Henson
ba544377fb
Update docs.
2006-07-08 10:55:03 +00:00
Dr. Stephen Henson
5165148f72
Add some EVP_PKEY_METHOD docs.
2006-07-08 10:45:08 +00:00
Dr. Stephen Henson
8d970ca70b
Update docs with algorithm options.
2006-07-08 10:01:33 +00:00
Dr. Stephen Henson
383b8b8ca9
Typo.
2006-07-08 00:50:25 +00:00
Dr. Stephen Henson
5ce60a20f2
Initial docs for pkeyutl.
2006-07-08 00:47:04 +00:00
Dr. Stephen Henson
49131a7d94
Docs for new utilities.
2006-07-08 00:24:47 +00:00
Dr. Stephen Henson
d884c5bad1
Add documentation for new smime options.
2006-07-07 21:44:23 +00:00
Andy Polyakov
86bdc0a3ee
Fix compiler warnings.
2006-07-04 20:29:50 +00:00
Andy Polyakov
1a4e245f3e
Unsigned vs signed comparison warning.
2006-07-04 20:29:14 +00:00
Andy Polyakov
975efcbaee
Typos(?) in HEAD/crypto/evp/p_lib.c.
2006-07-04 20:27:44 +00:00
Dr. Stephen Henson
90e1b1fd7d
dsa_pub_cmp() doesn't need to check parameters because that is done in
...
EVP_PKEY_cmp().
2006-07-02 21:13:39 +00:00
Dr. Stephen Henson
86207c1960
Make return value from EVP_PKEY_cmp() and EVP_PKEY_cmp_parameters() consistent.
2006-07-02 21:12:40 +00:00
Andy Polyakov
9c62bca11a
Prepare playground for AES experimental code.
2006-07-02 09:18:00 +00:00
Bodo Möller
75d61b33bc
documentation for "HIGH" vs. "MEDIUM" was not up-to-date
2006-06-30 22:00:13 +00:00
Bodo Möller
3df760b83a
use <poll.h> as by Single Unix Specification
2006-06-30 08:14:39 +00:00
Bodo Möller
e34aa5a3b3
always read in RAND_poll() if we can't use select because of a too
...
large FD: it's non-blocking mode anyway
2006-06-28 14:50:12 +00:00
Andy Polyakov
985e4c4154
Mitigate the hazard of cache-collision timing attack on last round. The
...
only chance for T[ed]4 to get evicted in this module is when its cache
"overlaps" with last 128 bits of key schedule.
2006-06-28 08:52:16 +00:00
Andy Polyakov
9598fa8759
Mitigate the hazard of cache-collision timing attack on last round. Well,
...
prefetch could have been moved closer to Td4 references. Something for
later consideration...
2006-06-28 08:48:54 +00:00
Andy Polyakov
ac8173515a
Mitigate cache-collision timing attack on last round.
2006-06-28 08:39:06 +00:00
Dr. Stephen Henson
944f858021
Fix EVP_PKEY_CTX_dup() to return correct value and handle NULL keys in
...
the source.
2006-06-27 17:23:24 +00:00
Richard Levitte
27a3d9f9aa
Use poll() when possible to gather Unix randomness entropy
2006-06-27 06:31:34 +00:00
Bodo Möller
48fc582f66
New functions CRYPTO_set_idptr_callback(),
...
CRYPTO_get_idptr_callback(), CRYPTO_thread_idptr() for a 'void *' type
thread ID, since the 'unsigned long' type of the existing thread ID
does not always work well.
2006-06-23 15:21:36 +00:00
Bodo Möller
81de1028bc
Change in 0.9.8 branch:
...
Put ECCdraft ciphersuites back into default build (but disabled
unless specifically requested)
2006-06-22 12:37:28 +00:00
Bodo Möller
850815cb6e
Remove ECC ciphersuites from 0.9.8 branch (should use 0.9.9 branch)
2006-06-20 08:50:42 +00:00
Bodo Möller
c4e7870ac1
Change array representation of binary polynomials to make GF2m part of
...
the BN library more generally useful.
Submitted by: Douglas Stebila
2006-06-18 22:00:57 +00:00
Bodo Möller
4584eccea0
another thread-safety fix
2006-06-16 01:00:47 +00:00
Bodo Möller
ed3ecd801e
Error messages for client ECC cert verification.
...
Also, change the default ciphersuite to give some prefererence to
ciphersuites with forwared secrecy (rather than using a random order).
2006-06-15 19:58:22 +00:00
Bodo Möller
b166f13eb5
Call 'print_stuff' even if a handshake failed.
2006-06-15 19:00:34 +00:00
Bodo Möller
076944d920
Fix algorithm handling for ECC ciphersuites: Adapt to recent changes,
...
and allow more general RSA OIDs for ECC certs with RSA CA sig.
2006-06-15 18:28:00 +00:00
Bodo Möller
09e20e0bd8
Fix another new bug in the cipherstring logic.
2006-06-15 17:17:06 +00:00
Bodo Möller
a717831da4
Fix another bug introduced yesterday when deleting Fortezza stuff:
...
make sure 'mask' is initialized in ssl_cipher_get_disabled().
Also simplify code by removing some unused arguments in static functions.
2006-06-15 16:54:20 +00:00
Bodo Möller
4dfc8f1f0b
Oops ... deleted too much in the previous commit when I deleted
...
the Fortezza stuff
2006-06-15 16:07:10 +00:00
Bodo Möller
5b57fe0a1e
Disable invalid ciphersuites
2006-06-14 17:51:46 +00:00
Bodo Möller
89bbe14c50
Ciphersuite string bugfixes, and ECC-related (re-)definitions.
2006-06-14 17:40:31 +00:00
Bodo Möller
6635b48cd1
Make sure that AES ciphersuites get priority over Camellia
...
ciphersuites in the default cipher string.
2006-06-14 13:58:48 +00:00
Bodo Möller
675f605d44
Thread-safety fixes
2006-06-14 08:55:23 +00:00
Bodo Möller
6a983d4287
Fix a bug recently introduced when updating this file to use the new
...
keygen API: make sure that 'pkey_type' is actually visible to MAIN().
2006-06-14 01:16:22 +00:00
Richard Levitte
1a159e08af
Keep synchronised with Unix
2006-06-12 06:46:18 +00:00
Bodo Möller
dd030860c4
Camellia cipher, contributed by NTT
...
Submitted by: Masashi Fujita
Reviewed by: Bodo Moeller
2006-06-11 01:09:07 +00:00
Richard Levitte
2d09372434
Keep synchronised with the Unix build
2006-06-10 05:38:23 +00:00
Bodo Möller
67912e0032
Camellia cipher, contributed by NTT
...
Submitted by: Masashi Fujita
Reviewed by: Bodo Moeller
2006-06-09 22:29:40 +00:00
Bodo Möller
f3dea9a595
Camellia cipher, contributed by NTT
...
Submitted by: Masashi Fujita
Reviewed by: Bodo Moeller
2006-06-09 15:44:59 +00:00
Dr. Stephen Henson
fb7b393278
Output MIME parameter micalg according to RFC3851 and RFC4490 instead of hard
...
coding it to "sha1".
2006-06-06 13:27:36 +00:00
Dr. Stephen Henson
61e5ec4b1e
Add AES and GOST S/MIME capabilities if algorithms are supported.
2006-06-06 12:35:05 +00:00
Andy Polyakov
6f344eab03
Fix obvious typo.
2006-06-05 16:04:09 +00:00
Dr. Stephen Henson
41eacc84a0
Clarify comment and add #ifdef.
2006-06-05 12:38:22 +00:00
Dr. Stephen Henson
01b8b3c7d2
Complete EVP_PKEY_ASN1_METHOD ENGINE support.
2006-06-05 11:52:46 +00:00
Andy Polyakov
8fecd4b4f1
Sync aes.h with http://cvs.openssl.org/chngview?cn=15336 .
2006-06-05 10:43:41 +00:00
Andy Polyakov
41fc5f2dbe
Reimplement AES_ofb128_encrypt.
2006-06-05 10:40:54 +00:00
Andy Polyakov
bcfd3d68f5
Correct logical error in STRICT_ALIGNMENT check and remove copy of
...
eay licence, as module is practically rewritten from scratch [well,
even original submission was obviously "almost, but not quite,
entirely unlike" any other eay *_cfb.c module, not to mention new
functions].
2006-06-05 10:40:28 +00:00
Andy Polyakov
d3a6461d71
Minor ppc-xlate.pl update.
2006-06-05 09:42:31 +00:00
Andy Polyakov
17478fdede
Add sha512-ppc.pl module.
2006-06-05 09:37:55 +00:00
Andy Polyakov
4dca00cec8
Minor sha1-ppc.pl update.
2006-06-05 09:35:50 +00:00
Richard Levitte
061d774b99
A few more ENGINE strings that need shortening.
2006-06-04 08:22:25 +00:00
Richard Levitte
20469da285
Synchronise with Unix
2006-06-03 02:17:49 +00:00
Dr. Stephen Henson
e18e3eba76
Make update.
2006-06-02 17:54:47 +00:00
Dr. Stephen Henson
de9fcfe348
Initial public key ASN1 method engine support. Not integrated yet.
2006-06-02 17:52:27 +00:00
Dr. Stephen Henson
7e5b06813d
Automatically free up dynamically allocated public key methods when
...
and ENGINE is destroyed.
2006-06-02 17:09:17 +00:00
Dr. Stephen Henson
1892c8bf97
Extend default method string to include public key methods.
...
Add missing prototypes.
Fix engine method lookup.
2006-06-02 13:09:59 +00:00
Dr. Stephen Henson
5e428e7d0d
Typo.
2006-06-02 12:37:02 +00:00
Dr. Stephen Henson
c9777d2659
Add ENGINE support for EVP_PKEY_METHOD including lookups of ENGINE
...
implementations and functional reference counting when a context
is allocated, free or copied.
2006-06-02 12:33:39 +00:00
Richard Levitte
3aedd213a9
Synchronise with the Unixly build.
2006-06-01 12:50:56 +00:00
Dr. Stephen Henson
e0c1ea9038
Fix error code. make update
2006-06-01 12:43:39 +00:00
Dr. Stephen Henson
6f88c6a634
Add missing prototype. Extend engine utility to print public key algorithms.
2006-06-01 12:38:22 +00:00
Dr. Stephen Henson
58aa573ac2
Add engine table for EVP_PKEY_METHOD. Doesn't do much yet.
2006-06-01 11:38:50 +00:00
Richard Levitte
0ed110b969
Because all object files are now in a file, we don't need to mention
...
any of them on the linker command line. Besides, OBJECT_FILE now
represents the last compiled file, and using it here only results in
getting warnings about multiple definitions of the symbols in that
file.
2006-06-01 10:24:47 +00:00
Dr. Stephen Henson
b28dea4e10
New pkey functions for keygen callbacks and retrieving operation type.
2006-05-31 17:34:14 +00:00
Andy Polyakov
21f0db692d
Tune up AES CFB. Performance improvement varies from 10% to 50% from
...
platform to platform. Its absolute value is within few percents
marginal from that of ECB.
2006-05-30 07:20:13 +00:00
Richard Levitte
4d4e08ec1c
Use a new signed int ii instead of j (which is unsigned) to handle the
...
return value from sk_SSL_CIPHER_find().
2006-05-28 19:44:27 +00:00
Richard Levitte
25074d6c22
Deal with another name that's longer than 31 characters.
2006-05-28 19:39:36 +00:00
Richard Levitte
0cfc80c4c3
rslen is unsigned, so it can never go below 0.
2006-05-28 19:36:29 +00:00
Dr. Stephen Henson
b8bb15fb51
Install openssl.cnf to OPENSSLDIR in mk1mf.pl
2006-05-28 00:49:49 +00:00
Dr. Stephen Henson
994df5a248
Flush p7bio when all data has been copied.
2006-05-26 17:14:23 +00:00
Dr. Stephen Henson
6657b9c73a
Fix warnings.
2006-05-26 13:27:58 +00:00
Dr. Stephen Henson
ba0d04a986
Update pkeyutl to use size_t for pkey functions.
2006-05-26 12:24:49 +00:00
Richard Levitte
3cb9eb30d3
Signed vs. unsigned conflict
2006-05-25 23:40:04 +00:00
Richard Levitte
e0b624e20e
There was a problem with too long command lines, so I rebuilt to make
...
it work better.
2006-05-25 23:37:03 +00:00
Dr. Stephen Henson
c27309edcb
Allow any supported cipher to be used with smime -encrypt.
2006-05-25 16:53:52 +00:00
Dr. Stephen Henson
3207e61222
Add prototypes, update Win32 ordinals.
2006-05-25 11:44:05 +00:00
Richard Levitte
3671233089
Keep in sync with Unix
2006-05-25 10:40:01 +00:00
Dr. Stephen Henson
3a828611e9
Update EVP_MD_CTX_copy_ex() to use EVP_PKEY_CTX_dup().
2006-05-25 00:55:00 +00:00
Dr. Stephen Henson
8bdcef40e4
New function to dup EVP_PKEY_CTX. This will be needed to make new signing
...
functions and EVP_MD_CTX_copy work properly.
2006-05-24 23:49:30 +00:00
Dr. Stephen Henson
91c9e62123
New functions for enchanced digest sign/verify.
2006-05-24 17:30:09 +00:00
Dr. Stephen Henson
0e3453536e
Fix warnings.
2006-05-24 13:29:32 +00:00
Dr. Stephen Henson
eaff5a1412
Use size_t for new crypto size parameters.
2006-05-24 12:33:46 +00:00
Dr. Stephen Henson
216e0d5b91
Fix smime -pk7out.
2006-05-22 13:37:16 +00:00
Dr. Stephen Henson
0965991600
Add ctrl to EVP_MD and EVP_PKEY_CTX to EVP_MD_CTX. These will be used
...
for enhanced sign/verify operations.
2006-05-22 13:01:01 +00:00
Andy Polyakov
74aa1a4378
Tiny up hpux targets.
2006-05-20 08:52:34 +00:00
Dr. Stephen Henson
5531192151
Add -resign and -md options to smime command to support resigning an
...
existing structure and using alternative digest for signing.
2006-05-18 23:44:44 +00:00
Dr. Stephen Henson
a620626a33
Code tidy.
2006-05-18 18:06:03 +00:00
Dr. Stephen Henson
f13a71c66b
Typo.
2006-05-18 17:46:56 +00:00
Dr. Stephen Henson
3ef3e07a49
make update
2006-05-18 17:22:31 +00:00
Dr. Stephen Henson
76fa8f1838
More S/MIME tidy. Place some common attribute operations in utility
...
functions.
2006-05-18 17:20:23 +00:00
Dr. Stephen Henson
f2b139ed1f
Remove old digest type hacks for non RSA keys.
2006-05-18 13:05:20 +00:00
Dr. Stephen Henson
a6e7fcd140
Multiple signer support in smime application.
2006-05-18 12:41:28 +00:00
Dr. Stephen Henson
76cf3fcb43
Reformat smime.c utility.
2006-05-18 11:54:16 +00:00
Dr. Stephen Henson
121dd39f9f
New option to pkcs12 utility to set alternative MAC digest algorithm.
2006-05-17 18:46:22 +00:00
Dr. Stephen Henson
a263253545
Don't try to print PBE information if it can't be decoded.
2006-05-17 18:24:35 +00:00
Dr. Stephen Henson
76d6ac4b06
PKCS#12 mac key length should equal digest length.
2006-05-17 18:19:51 +00:00
Dr. Stephen Henson
60f20632e2
Tidy up of S/MIME code and add new functions which will make is easier
...
to create S/MIME signed data with multiple signers.
2006-05-17 17:17:01 +00:00
Dr. Stephen Henson
ae519a247f
Extended PBES2 function supporting application supplied IV and PRF NID.
2006-05-17 12:47:17 +00:00
Dr. Stephen Henson
8de916bcee
Oops...
2006-05-17 12:29:16 +00:00
Dr. Stephen Henson
1631d5f9b9
HMAC OIDs from RFC4231.
2006-05-17 12:27:45 +00:00
Dr. Stephen Henson
98c82b899e
Gather keygen options in req and only use them after all other options have
...
been processed. This allows any ENGINE changing operations to be processed
first (for example a config file).
2006-05-16 12:11:14 +00:00
Dr. Stephen Henson
6d3a1eac3b
Add PRF preference ctrl to ciphers.
2006-05-15 18:35:13 +00:00
Dr. Stephen Henson
b8f702a0af
Change builting PBE to use static table. Add entries for HMAC and MD5, GOST.
2006-05-15 17:34:36 +00:00
Dr. Stephen Henson
43c9825c2a
Update old **EVIL** PEM_X509_INFO_read_bio() function to correctly assign
...
private keys.
FIXME: this function should really be rewritten because it is *horrible*.
2006-05-15 13:28:00 +00:00
Dr. Stephen Henson
fbf6643607
Bugfix: the NONE string for PBE algorithms wasn't working.
2006-05-15 13:23:15 +00:00
Dr. Stephen Henson
3f36baa9f4
Correctly handle missing DSA parameters.
2006-05-15 01:26:52 +00:00
Dr. Stephen Henson
b0e69a0500
Add feature to PKCS12_create() if the encryption NID corresponds to a
...
supported encryption algorithm instead of a PBE NID then use that
algorithm with PBES2.
2006-05-15 00:45:10 +00:00
Dr. Stephen Henson
856640b54f
Extend PBE code to support non default PKCS#5 v2.0 PRFs.
2006-05-14 18:40:53 +00:00
Dr. Stephen Henson
76240b3a39
Check for deprecated private key types before PKCS#8 types.
2006-05-14 18:35:42 +00:00
Dr. Stephen Henson
34b3c72e4e
Typo.
2006-05-14 16:50:22 +00:00
Ulf Möller
c264592d69
Add includes in synopsis.
...
Submitted by: Mike Frysinger <vapier@gentoo.org >
2006-05-14 11:28:00 +00:00
Dr. Stephen Henson
1bd06bd0c4
In interactive mode only config OpenSSL once.
2006-05-12 17:11:58 +00:00
Dr. Stephen Henson
9540ccdf1f
Stop warnings about deprecated -mcpu option.
2006-05-12 16:06:12 +00:00
Richard Levitte
98bf13c36b
make update
2006-05-12 15:31:28 +00:00
Richard Levitte
7e76e56387
Someone made a mistake, and some function and reason codes got
...
duplicate numbers. Renumbering.
2006-05-12 15:27:52 +00:00
Dr. Stephen Henson
759d8ac6ee
Typo.
2006-05-12 00:27:39 +00:00
Dr. Stephen Henson
959e8dfe06
Update 'req' command to use new keygen API.
2006-05-11 21:39:00 +00:00
Dr. Stephen Henson
7f57b076a6
New functions to get key types without dereferncing EVP_PKEY.
...
More error checking for RSA pmeth.
2006-05-11 21:33:00 +00:00
Dr. Stephen Henson
7144c4212a
Update PKCS#7 decrypt routines to use new API.
2006-05-08 16:38:19 +00:00
Dr. Stephen Henson
399a6f0bd1
Update PKCS#7 enveloped data to new API.
2006-05-08 12:44:25 +00:00
Dr. Stephen Henson
3d47929968
Update S/MIME code to use default digest.
2006-05-07 17:22:58 +00:00
Dr. Stephen Henson
03919683f9
Add support for default public key digest type ctrl.
2006-05-07 17:09:39 +00:00
Dr. Stephen Henson
5cda6c4582
Fix from stable branch.
2006-05-07 12:30:37 +00:00
Ulf Möller
83ed49149c
bug fix.
...
PR: 1326
Submitted by: John Skodon
2006-05-06 18:26:12 +00:00
Andy Polyakov
67d990904e
Futher minor PPC assembler update.
2006-05-04 21:30:41 +00:00
Dr. Stephen Henson
f3df90b2bb
Update from stable branch.
2006-05-04 16:32:31 +00:00
Dr. Stephen Henson
11e46bd7ae
Update FAQ.
2006-05-04 14:22:00 +00:00
Andy Polyakov
c09a0318b7
Minor PPC assembler updates.
2006-05-03 14:07:34 +00:00
Andy Polyakov
fe716ba686
PPC assembler distiller update.
2006-05-03 13:39:34 +00:00
Andy Polyakov
9a97800813
Typo in linux-ppc line.
2006-05-03 13:38:50 +00:00
Dr. Stephen Henson
e881f6175a
Update from stable branch.
2006-05-03 13:19:06 +00:00
Ulf Möller
36e77b1059
Bug fix.
...
PR: 1307
Submitted by: Oliver Tappe <zooey@hirschkaefer.de >
2006-05-01 18:49:26 +00:00
Andy Polyakov
a9c32ace06
SHA1 for PowerPC.
2006-05-01 13:35:03 +00:00
Andy Polyakov
2c5d4daac5
Yet another "teaser" Montgomery multiplication module, for PowerPC.
2006-04-30 21:15:29 +00:00
Dr. Stephen Henson
b46343583c
Update EVP_PKEY_cmp() and X509_check_private() to return sensible values and
...
handle unsupported key types.
2006-04-28 12:27:37 +00:00
Dr. Stephen Henson
816c2b5a79
Fix from stable branch.
2006-04-28 00:30:49 +00:00
Dr. Stephen Henson
a78568b7e9
Replace RSA specific PKCS7_RECIP_INFO set up with an public key algorithm
...
ctrl.
2006-04-27 18:20:34 +00:00
Dr. Stephen Henson
ee5b2a1e51
Code tidy.
2006-04-27 00:42:51 +00:00
Dr. Stephen Henson
e4b21c74fc
New function to extract AlgorithmIdentifier for PKCS7_RECIP_INFO.
2006-04-27 00:29:50 +00:00
Dr. Stephen Henson
4edcb93dca
Don't free up parameter. The public key ASN1 method can do that if it needs
...
to.
2006-04-27 00:20:43 +00:00
Dr. Stephen Henson
15f80eea31
Fix usage message for pkeyutl.
2006-04-26 15:42:29 +00:00
Dr. Stephen Henson
81cebb8b79
Add prototypes and pkey accessor function for EVP_PKEY_CTX.
2006-04-26 11:52:36 +00:00
Dr. Stephen Henson
a4e75b3dfd
Correct copyright notice... this doesn't contain any SSLeay code.
2006-04-24 00:07:26 +00:00
Dr. Stephen Henson
cddaba8ede
Add 'flags' parameter to EVP_PKEY_asn1_meth_new() to set algorithm flags.
2006-04-21 17:38:58 +00:00
Nils Larsch
49c5f38d3d
undo accidental commit
2006-04-20 13:54:34 +00:00
Nils Larsch
f8296228f1
as we encrypt every bit separately we need to loop through the number
...
of bits; thanks to Michael McDougall <mmcdouga@saul.cis.upenn.edu >
PR: 1318
2006-04-20 13:11:52 +00:00
Nils Larsch
930b0c4b8a
make local function static
2006-04-20 09:53:49 +00:00
Dr. Stephen Henson
3d153f7985
Remove dss1 hack from S/MIME code.
2006-04-19 17:47:15 +00:00
Dr. Stephen Henson
ee1d9ec019
Remove link between digests and signature algorithms.
...
Use cross reference table in ASN1_item_sign(), ASN1_item_verify() to eliminate
the need for algorithm specific code.
2006-04-19 17:05:59 +00:00
Dr. Stephen Henson
614b448a67
Remove comment from SSLeay days about EVP_PKEY_METHOD.
2006-04-19 12:16:58 +00:00
Richard Levitte
a19c9f179d
Make sure obj_xref.h is updated during a "make update"
2006-04-19 06:45:06 +00:00
Richard Levitte
a784b943c1
Synchronise with Unixly build.
...
(Geez, a lot is happening right now, eh? :-))
2006-04-19 06:44:07 +00:00
Dr. Stephen Henson
d202709808
Add OID cross reference table.
...
Fix some typos in GOST OIDs.
Update dependencies.
2006-04-18 23:36:07 +00:00
Richard Levitte
51ff0abb05
Synchronise
2006-04-17 17:19:59 +00:00
Dr. Stephen Henson
492a9e2415
Allow public key ASN1 methods to set PKCS#7 SignerInfo structures.
2006-04-17 17:12:23 +00:00
Dr. Stephen Henson
7bf7333d68
If we include winsock2.h then FD_SET wants an unsigned type for an fd.
2006-04-17 12:22:13 +00:00
Dr. Stephen Henson
c20276e4ae
Fix (most) WIN32 warnings and errors.
2006-04-17 12:08:22 +00:00
Dr. Stephen Henson
9ca7047d71
Provisional support for EC pkey method, supporting ECDH and ECDSA.
2006-04-16 16:15:59 +00:00
Andy Polyakov
ba3b2f1538
SHA-1 for x86_64.
2006-04-16 14:42:54 +00:00
Dr. Stephen Henson
b010b7c434
Use more flexible method of determining output length, by setting &outlen
...
value of the passed output buffer is NULL.
The old method of using EVP_PKEY_size(pkey) isn't flexible enough to cover all
cases where the output length may depend on the operation or the parameters
associated with it.
2006-04-15 18:50:56 +00:00
Dr. Stephen Henson
9dc17a2536
Fix from 0.9.7-stable branch.
2006-04-15 17:43:43 +00:00
Dr. Stephen Henson
5950bf7943
Revert to original...
2006-04-15 13:15:25 +00:00
Dr. Stephen Henson
4141c803d8
Oops...
2006-04-15 13:12:42 +00:00
Dr. Stephen Henson
ba1ba5f0fb
If cipher list contains a match for an explicit ciphersuite only match that
...
one suite.
2006-04-15 00:22:05 +00:00
Richard Levitte
51aa7bd321
Got sick and tired of duplicating... Too error-prone (i.e. I forget
...
to update both...)!
2006-04-14 19:56:28 +00:00
Dr. Stephen Henson
09b88a4a55
Update copyright notices on a few files where all original SSLeay code has
...
been deleted.
2006-04-14 17:36:18 +00:00
Dr. Stephen Henson
f3481ca28f
Print out zero length string properly.
2006-04-14 16:47:18 +00:00
Dr. Stephen Henson
ba30bad57b
Add functions to allow setting and adding external EVP_PKEY_METHOD.
2006-04-14 12:41:35 +00:00
Dr. Stephen Henson
ffb1ac674c
Complete key derivation support.
2006-04-13 20:16:56 +00:00
Dr. Stephen Henson
3be34589e8
Update dependencies.
2006-04-13 13:00:45 +00:00
Dr. Stephen Henson
d87e615209
Add key derivation support.
2006-04-13 12:56:41 +00:00
Dr. Stephen Henson
92511cff48
Change the option setting command line switch to "-pkeyopt" to avoid confusion
...
with algorithm parameters.
2006-04-13 12:38:46 +00:00
Richard Levitte
7b82159865
Synchronise what what's happening with the Unix build
2006-04-13 09:59:52 +00:00
Dr. Stephen Henson
52c11dce31
Typo.
2006-04-13 00:26:05 +00:00
Dr. Stephen Henson
3ba0885a3e
Extend DH ASN1 method, add DH EVP_PKEY_METHOD.
2006-04-12 23:51:24 +00:00
Dr. Stephen Henson
023c9d8dd5
Fix leak.
2006-04-12 23:38:45 +00:00
Dr. Stephen Henson
4c97a04e2e
PKCS#3 DH PKCS#8 ASN1 support.
2006-04-12 23:06:10 +00:00
Ulf Möller
fb05e1cdf6
declare as in prototype
...
Submitted by: Gisle Vanem
2006-04-12 19:24:45 +00:00
Dr. Stephen Henson
ceb4678956
Extend DH ASN1 method to support public key encode/decode and parameter
...
utilities.
2006-04-12 17:14:48 +00:00
Dr. Stephen Henson
0cb8499b73
Compare parameters when comparing public keys.
2006-04-12 17:01:19 +00:00
Dr. Stephen Henson
4d62ec32e0
Add file dso_beos.c missing from original commit.
...
PR: 1312
2006-04-12 11:46:16 +00:00
Dr. Stephen Henson
75ef718820
Support for DSA keygen, fix for genpkey.
2006-04-12 11:14:11 +00:00
Dr. Stephen Henson
c927df3fa1
Initial DSA EVP_PKEY_METHOD. Fixup some error codes.
2006-04-12 10:20:47 +00:00
Ulf Möller
4700aea951
Add BeOS support.
...
PR: 1312
Submitted by: Oliver Tappe <zooey@hirschkaefer.de >
Reviewed by: Ulf Moeller
2006-04-11 21:34:21 +00:00
Ulf Möller
60cdb821db
manual pages as HTML
...
Submitted by: Oliver Tappe <zooey@hirschkaefer.de >
2006-04-11 21:09:57 +00:00
Ulf Möller
0ef888cd3e
Use Dl_info only on systems where it is known to exist. It does not
...
exist on AIX 4.3.3, AIX 5.1, SCO 5, or Cygwin.
2006-04-11 21:00:13 +00:00
Ulf Möller
26c777d516
uncomment; that one slipped through
2006-04-11 20:09:31 +00:00
Ulf Möller
9555339007
improve make dclean to remove files generated during build
...
PR: 1308
Submitted by: Oliver Tappe <zooey@hirschkaefer.de >
Reviewed by: Ulf Moeller
2006-04-11 20:05:23 +00:00
Dr. Stephen Henson
2fbe371f53
Fix parameter error messages.
2006-04-11 18:30:25 +00:00
Dr. Stephen Henson
15181d7811
Write parameters if -genparam option include.
2006-04-11 18:21:40 +00:00
Dr. Stephen Henson
1edba2110f
Add parameter generation option to genpkey.
2006-04-11 18:18:14 +00:00
Dr. Stephen Henson
54d853ebc3
Add support for setting keybits and public exponent value for pkey RSA keygen.
2006-04-11 17:28:37 +00:00
Dr. Stephen Henson
f5cda4cbb1
Initial keygen support.
2006-04-11 13:28:52 +00:00
Dr. Stephen Henson
f9a6348a53
ctrls to set PSS salt length.
2006-04-10 12:55:04 +00:00
Dr. Stephen Henson
a7ffd9d19c
Preliminary PSS support.
2006-04-10 12:41:21 +00:00
Dr. Stephen Henson
29db322e8f
Beginnings of PSS support.
2006-04-10 11:48:35 +00:00
Richard Levitte
25dc89eb9b
Synchronise with the Unix build
2006-04-10 11:39:49 +00:00
Dr. Stephen Henson
716630c0eb
Change operation values so they can be used as a mask.
...
Fix rsa_pkey_method.
2006-04-10 11:16:11 +00:00
Dr. Stephen Henson
4f59b6587f
Implementation of pkey_rsa_verify. Some constification.
2006-04-10 01:06:17 +00:00
Dr. Stephen Henson
9befdf1d20
New utility function to reverse a buffer, either by copying or in-place.
2006-04-10 00:11:30 +00:00
Dr. Stephen Henson
75d44c0452
Store digests as EVP_MD instead of a NID.
...
Add digest size sanity checks.
2006-04-09 21:24:48 +00:00
Dr. Stephen Henson
a58a636838
Constification.
2006-04-09 20:53:19 +00:00
Dr. Stephen Henson
9fdab72dd7
Bugfix X9.31 padding.
2006-04-09 20:44:00 +00:00
Dr. Stephen Henson
b2a97be7f4
Support for digest signing and X931 in rsa_pkey_meth.
2006-04-09 19:17:25 +00:00
Dr. Stephen Henson
6471c9f478
Add checking to padding ctrl.
2006-04-09 12:53:55 +00:00
Dr. Stephen Henson
4a3dc3c0e3
Add RSA ctrl for padding mode, add ctrl support in pkeyutl.
2006-04-09 12:42:09 +00:00
Dr. Stephen Henson
a2318e86bd
Fix typo. Add EVP_PKEY_CTX control function for later use by command line
...
utilities.
2006-04-09 00:34:00 +00:00
Dr. Stephen Henson
a9164153d1
Reformat pkeyutl.c, add support for verify operation but nothing actually
...
supports it (yet).
2006-04-08 22:25:47 +00:00
Dr. Stephen Henson
8795d38906
Update dependencies.
2006-04-08 13:04:31 +00:00
Dr. Stephen Henson
8cd44e3630
Implement encrypt/decrypt using RSA.
2006-04-08 13:02:04 +00:00
Dr. Stephen Henson
07e970c7e6
Initial functions for RSA EVP_PKEY_METHOD.
...
Update dependencies.
2006-04-08 00:15:07 +00:00
Dr. Stephen Henson
d1aa0d38c5
If <operatio>_init function is zero interpret as noop.
2006-04-07 23:11:49 +00:00
Dr. Stephen Henson
9e4d0f0be2
New utility 'pkeyutl' a general purpose version of 'rsautl'.
2006-04-07 19:33:28 +00:00
Dr. Stephen Henson
cd7638980a
Include EVP_PKEY argument in EVP_PKEY_CTX_new(). This avoids the
...
need for a separate EVP_PKEY parameter in the other operation
initialization routines.
2006-04-07 17:28:56 +00:00
Dr. Stephen Henson
f733a5ef0e
Initial functions for main EVP_PKEY_METHOD operations.
...
No method implementations yet.
2006-04-07 16:42:09 +00:00
Dr. Stephen Henson
5da98aa687
Updated to EVP_PKEY_METHOD code... still doesn't do much.
2006-04-06 17:32:43 +00:00
Dr. Stephen Henson
0b6f3c66cd
Initial definitions and a few functions for EVP_PKEY_METHOD: an extension
...
of the EVP routines to public key algorithms.
2006-04-06 13:02:06 +00:00
Bodo Möller
a01d9ac558
Remove ECC extension information from external representation
...
of the session -- we don't really need it once the handshake
has completed.
2006-04-05 17:11:19 +00:00
Dr. Stephen Henson
e46691a0bc
New function to add dynamic alias.
2006-04-05 13:24:19 +00:00
Dr. Stephen Henson
732a40e107
Last arg to EVP_PKEY_assign() should be void *.
2006-04-05 13:04:02 +00:00
Dr. Stephen Henson
29da3ade3c
Rebuild mac table to avoid duplicates.
2006-04-05 12:09:09 +00:00
Dr. Stephen Henson
de908d6319
Typos in a few OID names.
2006-04-05 12:06:32 +00:00
Dr. Stephen Henson
9c9c98ad2e
Typo.
2006-04-05 12:00:22 +00:00
Dr. Stephen Henson
5e0e9fce5d
Minor object name edit.
2006-04-05 11:29:31 +00:00
Dr. Stephen Henson
53ec8809cf
Add an explicit load_config() call so any added algorithms are
...
visible.
2006-04-04 18:47:20 +00:00
Dr. Stephen Henson
863779065e
Fix dynamic public key method lookup.
2006-04-04 18:32:19 +00:00
Dr. Stephen Henson
0b33dac310
New function to retrieve ASN1 info on public key algorithms. New command
...
line option to print out info.
2006-04-04 18:16:03 +00:00
Dr. Stephen Henson
e2bce37720
Stop warning.
2006-04-04 18:11:49 +00:00
Dr. Stephen Henson
228b4e426b
Update and add last (?) set of GOST OIDs.
2006-04-04 15:53:21 +00:00
Bodo Möller
a4974de937
clarification
2006-04-03 14:11:23 +00:00
Bodo Möller
22f41c9b99
check length properly
...
Submitted by: Peter Sylvester
2006-04-03 13:57:56 +00:00
Bodo Möller
a123c552cd
simplify: use s2n macro
2006-04-03 13:07:18 +00:00
Bodo Möller
b2172f4f8e
Avoid hard-coded table length where we can use sizeof.
...
Submitted by: Peter Sylvester
Reviewed by: Bodo Moeller
2006-04-03 11:56:30 +00:00
Bodo Möller
dc1d1b6934
fix memory leak
...
Submitted by: Peter Sylvester
2006-04-03 11:49:18 +00:00
Richard Levitte
67475a7ed7
Change chop to chomp when reading lines, so CRLF is properly processed on
...
the operating systems where they are the normal line endings
2006-04-03 09:15:15 +00:00
Dr. Stephen Henson
362ab3e4f9
More GOST OIDs
2006-04-02 13:22:39 +00:00
Dr. Stephen Henson
2aed84d16b
Add GOST parameter set OIDs.
2006-04-02 03:01:27 +00:00
Dr. Stephen Henson
5deea1c015
Don't free up key in priv_decode.
2006-03-31 18:16:22 +00:00
Dr. Stephen Henson
99516f81b1
Initialize pval.
2006-03-31 18:11:54 +00:00
Richard Levitte
d6091d5a39
If we declare a function, like d2i_TS_MSG_IMPRINT_bio(), we'd better
...
*define* it too, or things like shared libraries might be a bit sad.
2006-03-31 12:25:24 +00:00
Dr. Stephen Henson
5a47825ece
Fix gost OIDs.
2006-03-31 10:57:32 +00:00
Richard Levitte
16f66ae794
Synchronise with recent changes
2006-03-30 04:30:45 +00:00
Richard Levitte
7ce1d9e9a6
The -config option flag needs to be in the SSLEAY_CONFIG value.
...
PR: 1300
2006-03-30 04:29:38 +00:00
Bodo Möller
a70183bc80
fix for hostname extension
...
Submitted by: Kaspar Brand, Peter Sylvester
2006-03-30 02:53:30 +00:00
Bodo Möller
332737217a
Implement Supported Elliptic Curves Extension.
...
Submitted by: Douglas Stebila
2006-03-30 02:44:56 +00:00
Bodo Möller
bcbe37b716
Change default curve (for compatibility with a
...
soon-to-be-widely-deployed implementation that doesn't support the
previous default)
Submitted by: Douglas Stebila
2006-03-30 02:41:30 +00:00
Bodo Möller
f393b7449d
Implement cipher-suite selection logic given Supported Point Formats Extension.
...
Submitted by: Douglas Stebila
2006-03-30 02:35:09 +00:00
Dr. Stephen Henson
531308d929
Fix typo.
2006-03-29 15:58:55 +00:00
Dr. Stephen Henson
74e564cd46
Add some GOST OIDs.
2006-03-29 13:02:21 +00:00
Dr. Stephen Henson
42eae426df
Add missing function declaration.
2006-03-29 12:18:26 +00:00
Dr. Stephen Henson
246e09319c
Fix bug where freed OIDs could be accessed in EVP_cleanup() by
...
defering freeing in OBJ_cleanup().
2006-03-28 17:23:48 +00:00
Dr. Stephen Henson
f7a3296d8c
Typo.
2006-03-28 14:48:42 +00:00
Dr. Stephen Henson
3e4585c8fd
New utility pkeyparam. Enhance and bugfix algorithm specific parameter
...
functions to support it.
2006-03-28 14:35:32 +00:00
Dr. Stephen Henson
3e84b6e15f
New general public key utility 'pkey'.
2006-03-28 12:34:45 +00:00
Richard Levitte
d505d1ef4a
Small bug. apps/CA.sh and apps/CA.com look at SSLEAY_CONFIG, not
...
OPENSSL_CONF.
2006-03-28 10:26:12 +00:00
Richard Levitte
70b2ae3edf
Since we're moving between directories, let's get an absolute path to
...
openssl.exe.
2006-03-27 14:39:06 +00:00
Bodo Möller
9e5dba197c
Simplify ASN.1 for point format list
...
Submitted by: Douglas Stebila
2006-03-26 10:53:52 +00:00
Richard Levitte
a61114c38b
Only try to remove the tsa.dir subdirectory if it actually exists.
2006-03-25 10:24:22 +00:00
Dr. Stephen Henson
db98bbc114
Initial support for generalized public key parameters.
2006-03-24 13:46:58 +00:00
Dr. Stephen Henson
e42633140e
Add support for legacy PEM format private keys in EVP_PKEY_ASN1_METHOD.
2006-03-23 18:02:23 +00:00
Dr. Stephen Henson
bd50e31325
Typo.
2006-03-23 14:08:33 +00:00
Dr. Stephen Henson
b2c0518e6a
Fix bug in DSA, EC methods.
2006-03-23 14:04:39 +00:00
Dr. Stephen Henson
d82e2718e2
Add information and pem strings. Update dependencies.
2006-03-23 11:54:51 +00:00
Dr. Stephen Henson
18e377b4ff
Make EVP_PKEY_ASN1_METHOD opaque. Add application level functions to
...
initialize it. Initial support for application added public key ASN1.
2006-03-22 17:59:49 +00:00
Richard Levitte
043b2e9c2e
Keep up with the changes in the Unix build system.
2006-03-22 14:31:03 +00:00
Dr. Stephen Henson
1b593194be
Move algorithm specific print code from crypto/asn1/t_pkey.c to separate
...
*_prn.c files in each algorithm directory.
2006-03-22 13:34:19 +00:00
Dr. Stephen Henson
35208f368c
Gather printing routines into EVP_PKEY_ASN1_METHOD.
2006-03-22 13:09:35 +00:00
Richard Levitte
c788e59365
VMS doesn't support includes of paths very well.
2006-03-22 11:26:57 +00:00
Richard Levitte
cb08f4a6a3
Synchronise with recent changes
2006-03-21 06:22:36 +00:00
Dr. Stephen Henson
adbc603d24
DH EVP_PKEY_ASN1_METHOD, doesn't do much (yet?).
2006-03-20 18:37:40 +00:00
Dr. Stephen Henson
6f81892e6b
Transfer parameter handling and key comparison to algorithm methods.
2006-03-20 17:56:05 +00:00
Dr. Stephen Henson
448be74335
Initial support for pluggable public key ASN1 support. Process most public
...
key ASN1 handling through a single EVP_PKEY_ASN1_METHOD structure and move
the spaghetti algorithm specific code to a single ASN1 module for each
algorithm.
2006-03-20 12:22:24 +00:00
Dr. Stephen Henson
1a5a1a93f6
Stop compiler warnings.
2006-03-20 11:44:34 +00:00
Nils Larsch
d917188a46
fix last commit: return NULL is TS_RESP_CTX_set_status_info_cond() failed
2006-03-19 21:09:48 +00:00
Nils Larsch
b4e88ccb28
ensure the pointer is valid before using it
2006-03-18 14:27:41 +00:00
Nils Larsch
d916ba1ba1
check if con != NULL before using it
2006-03-18 14:24:02 +00:00
Nils Larsch
33af4421f2
remove unnecessary code
2006-03-18 14:22:20 +00:00
Richard Levitte
95e362c6da
Typo...
2006-03-18 10:36:15 +00:00
Ulf Möller
c58d983e3b
*** empty log message ***
2006-03-17 19:29:35 +00:00
Ulf Möller
a84c9d1ed9
Clarification for CPU specific config options.
2006-03-17 19:22:35 +00:00
Nils Larsch
c6a27f0178
fix for OPENSSL_NO_EC
...
PR: 1293
2006-03-15 19:17:56 +00:00
Nils Larsch
67b6f1ca88
fix problems found by coverity: remove useless code
2006-03-15 17:45:43 +00:00
Richard Levitte
a4ff392503
tlsext_ecpointformatlist_length is unsigned, so check if it's less
...
than zero will only result in pissing of some compilers...
2006-03-15 09:57:16 +00:00
Nils Larsch
40f51f506c
create BN_CTX object
2006-03-15 08:37:35 +00:00
Nils Larsch
eeb821f707
fix error found by coverity: check if ctx is != NULL before calling BN_CTX_end()
2006-03-14 22:48:41 +00:00
Nils Larsch
47d5566646
fix error found by coverity: check if ctx is != NULL before calling BN_CTX_end()
2006-03-13 23:14:57 +00:00
Nils Larsch
90bdfd97a6
signed vs. unsigned
2006-03-13 22:07:05 +00:00
Richard Levitte
b9865f110e
Oh, now I noticed Bodo's change that made tlsext_ecpointformatlist
...
unsigned...
2006-03-13 12:37:19 +00:00
Richard Levitte
07ef612968
Resolve signed vs. unsigned issues
2006-03-13 12:32:51 +00:00
Bodo Möller
019fdc7850
fix sign problems
2006-03-13 09:55:06 +00:00
Nils Larsch
7c382796be
remove unused variables
2006-03-13 07:21:39 +00:00
Bodo Möller
b6acb8d0de
udpate Supported Point Formats Extension code
...
Submitted by: Douglas Stebila
2006-03-13 01:24:38 +00:00
Nils Larsch
6adbcb9755
fix comment
...
Submitted by: Peter Sylvester
2006-03-12 23:00:32 +00:00
Nils Larsch
e968089485
use BIO_snprintf() instead of snprintf + use BIO_FP_TEXT for text output
...
Submitted by: Gisle Vanem
2006-03-12 22:16:57 +00:00
Nils Larsch
c2cd422ac6
note that SSL_library_init() is not reentrant
2006-03-12 00:37:55 +00:00
Bodo Möller
36ca4ba63d
Implement the Supported Point Formats Extension for ECC ciphersuites
...
Submitted by: Douglas Stebila
2006-03-11 23:46:37 +00:00
Bodo Möller
ed4a1d12b9
clarification
2006-03-11 22:10:34 +00:00
Nils Larsch
a0aa8b4b61
fix signed vs. unsigned warning
2006-03-11 12:18:11 +00:00
Nils Larsch
2c059d58d9
fix "missing initializer" warning
2006-03-11 11:58:47 +00:00
Nils Larsch
cd346d3e22
fix signed vs. unsigned warning
2006-03-11 11:54:27 +00:00
Nils Larsch
561d93aa00
make update
2006-03-10 23:08:31 +00:00
Nils Larsch
ddac197404
add initial support for RFC 4279 PSK SSL ciphersuites
...
PR: 1191
Submitted by: Mika Kousa and Pasi Eronen of Nokia Corporation
Reviewed by: Nils Larsch
2006-03-10 23:06:27 +00:00
Richard Levitte
0e8e6f19b2
Remember to *build* WP_TEST on VMS, as well :-)
2006-03-08 10:45:23 +00:00
Nils Larsch
c03e4f9bf0
fix function name in error message
2006-03-07 10:22:45 +00:00
Ulf Möller
c3bb1f8166
unused function
2006-03-06 17:58:25 +00:00
Richard Levitte
959a7201b8
The actual whirlpool test was missing on VMS...
2006-03-06 12:09:34 +00:00
Nils Larsch
6c73d01142
constify some print and ts functions
2006-03-05 20:19:05 +00:00
Dr. Stephen Henson
2932ad5677
Typo.
2006-03-05 01:19:48 +00:00
Nils Larsch
036bbcc53f
no need to cast away the const
2006-03-04 13:55:55 +00:00
Nils Larsch
6384e46da3
make some parameters const
2006-03-04 13:55:02 +00:00
Richard Levitte
6e2fcc44bd
Make shorter TS symbols for OpenVMS.
...
Don't convert a function pointer to a void*, ISO C doesn't like that.
2006-03-02 13:55:40 +00:00
Richard Levitte
8721fc2d0b
Forgot the TSA application...
2006-03-02 13:28:52 +00:00
Dr. Stephen Henson
c1facbb681
Check EVP_DigestInit_ex() return value in EVP_BytesToKey().
2006-03-01 21:17:13 +00:00
Nils Larsch
f2c33fa6fd
force C locale when using [a-z] in sed expressions
...
PR: 1283
Submitted by: Mike Frysinger
2006-03-01 19:51:37 +00:00
Nils Larsch
5aae935038
fix "#ifndef HZ" statement
...
PR: 1287
2006-02-28 19:52:15 +00:00
Ulf Möller
11503177d1
TS bugfixes: Do not hardcode message digest algorithms; fix ASN1 decoding.
...
Submitted by: Zoltan Glozik <zglozik@opentsa.org >
2006-02-26 23:34:53 +00:00
Richard Levitte
9ab899a660
Synchronise with openss.cnf
2006-02-26 10:48:40 +00:00
Richard Levitte
8937a13e0c
Add a TSA test. testtsa.com is a manual sh to dcl translation of
...
testtsa.
2006-02-26 10:47:57 +00:00
Richard Levitte
19017d4061
Add TS to the VMS build.
2006-02-26 10:46:39 +00:00
Richard Levitte
f53ac639c6
Break out deltree in its' own command procedure.
2006-02-26 10:44:57 +00:00
Nils Larsch
f71165b556
fix no-dh configure option; patch supplied by Peter Meerwald
2006-02-24 17:58:43 +00:00
Dr. Stephen Henson
350a404cb8
Print out <INVALID> if an OID value is invalid.
2006-02-21 01:00:08 +00:00
Dr. Stephen Henson
827c55741b
Tolerate a SEQUENCE in DN components.
2006-02-19 13:44:47 +00:00
Ulf Möller
e0c8c08936
ignore
2006-02-16 20:43:04 +00:00
Ulf Möller
4e397d07ea
message style
2006-02-16 20:33:47 +00:00
Ulf Möller
9eb8794149
oops
2006-02-16 20:30:58 +00:00
Ulf Möller
dc24110311
wrap shlib for testtsa
...
Submitted by: David Somers <dsomers@omz13.com >
2006-02-16 20:20:24 +00:00
Nils Larsch
b3e72fc37f
make some internal functions static; patch supplied by Kurt Roeckx
2006-02-15 20:20:20 +00:00
Nils Larsch
90076b96df
fix typos
...
PR: 1280
2006-02-15 19:42:22 +00:00
Dr. Stephen Henson
9c339a7227
Fix from stable branch.
2006-02-15 15:04:42 +00:00
Dr. Stephen Henson
e7a8b47f1a
Fix warnings.
2006-02-15 14:45:31 +00:00
Ulf Möller
7ac7a4bc37
shorter filenames
2006-02-15 00:35:46 +00:00
Nils Larsch
a628901dda
use asn1 callbacks for new, free and d2i
2006-02-14 07:55:03 +00:00
Nils Larsch
2ab75dee27
don't use the l length modifier for int
2006-02-13 09:50:04 +00:00
Nils Larsch
a3f586cdab
use stricter prototypes, fix warnings
2006-02-13 09:46:02 +00:00
Nils Larsch
fcfd87168a
fix warning: add missing prototype
2006-02-13 09:43:31 +00:00
Nils Larsch
95a0e8ab31
fix warning
2006-02-13 08:45:53 +00:00
Nils Larsch
0c9caf04de
fix typo: pass pre-computed parameters to the underlying signature function; thanks to Lucas Newman
2006-02-13 08:16:00 +00:00
Ulf Möller
21e8bbf290
*** empty log message ***
2006-02-12 23:36:58 +00:00
Ulf Möller
3b408d83fe
make update
2006-02-12 23:21:56 +00:00
Ulf Möller
8573552e8c
time stamp Makefile, test files
...
Submitted by: Zoltan Glozik <zglozik@opentsa.org >
2006-02-12 23:19:25 +00:00
Ulf Möller
c7235be6e3
RFC 3161 compliant time stamp request creation, response generation
...
and response verification.
Submitted by: Zoltan Glozik <zglozik@opentsa.org >
Reviewed by: Ulf Moeller
2006-02-12 23:11:56 +00:00
Dr. Stephen Henson
1c17d91c53
Minor clarification.
2006-02-11 01:54:19 +00:00
Dr. Stephen Henson
a070f0dac5
Add FAQ about AKID.
2006-02-11 00:46:34 +00:00
Richard Levitte
b480283c56
Document the building macros.
2006-02-10 08:48:43 +00:00
Richard Levitte
f5ce5e1465
As an effect of revisions 1.261, BUILD_CMD was changed so $(DIRS)
...
wasn't respected when using it to build different parts of OpenSSL.
1.269 was an attempt to correct that, but unfortunately meant that we
built every part that was given i $(DIRS) 7 times. This change puts
back the original intent with BUILD_CMD via the new macro
BUILD_ONE_CMD while keeping the intent with RECURSIVE_BUILD_CMD.
2006-02-10 08:04:59 +00:00
Dr. Stephen Henson
d7db77a0cb
Fix warnings about "sin" conflicting with sin(3) definition.
2006-02-09 17:17:41 +00:00
Dr. Stephen Henson
346ac30120
Avoid warnings about shadowed definitions.
2006-02-09 17:11:12 +00:00
Dr. Stephen Henson
07bb51b6b4
Update from 0.9.7-stable.
2006-02-09 12:29:21 +00:00
Nils Larsch
bbab9b61dd
remove unnecessary check
2006-02-08 18:52:43 +00:00
Nils Larsch
82e8372f17
p could be uninitialized
2006-02-08 18:51:17 +00:00
Bodo Möller
e67ed82877
move new member of SSL_SESSION to the end
...
(minimize changes to binary format)
Submitted by: Peter Sylvester
2006-02-07 14:26:43 +00:00
Dr. Stephen Henson
15ac971681
Update filenames in makefiles.
2006-02-04 01:45:59 +00:00
Dr. Stephen Henson
0c21e13012
Recognize mingw in perlasm.
2006-02-04 01:25:19 +00:00
Nils Larsch
d5fd72fd0d
fix if statement: call conn_state() if the BIO is not in the BIO_CONN_S_OK state
2006-02-02 22:11:02 +00:00
Dr. Stephen Henson
c7474d077b
Ignore zero length constructed segments.
2006-01-31 18:36:29 +00:00
Lutz Jänicke
826b52d26f
Typo
...
Submitted by: Girish Venkatachalam <girish1729@gmail.com >
2006-01-30 17:06:00 +00:00
Nils Larsch
8c5a2bd6bb
add additional checks + cleanup
...
Submitted by: David Hartman <david_hartman@symantec.com >
2006-01-29 23:12:22 +00:00
Dr. Stephen Henson
25a58453ff
Fixes for BOOL handling: produce errors for invalid string for mini-compiler,
...
correctly encode FALSE for BOOL in ASN1_TYPE.
2006-01-19 17:16:56 +00:00
Nils Larsch
00fe865dbe
recent changes from 0.9.8: fix cipher list order in s3_lib.c,
...
make "no-ssl2" work again
PR: 1217
2006-01-15 17:35:28 +00:00
Dr. Stephen Henson
9e9bececa9
Fix from stable branch.
2006-01-15 17:31:08 +00:00
Dr. Stephen Henson
90890074b0
Typo.
2006-01-15 13:55:31 +00:00
Dr. Stephen Henson
31676a3540
Update from stable branch.
2006-01-15 13:50:10 +00:00
Richard Levitte
6b9e941ee3
signed vs. unsigned clash.
2006-01-14 11:49:24 +00:00
Nils Larsch
802d7fa6d5
support numeric strings in ASN1_generate_nconf
2006-01-14 09:21:33 +00:00
Nils Larsch
3798cb8182
fix comment
...
PR: 1270
2006-01-13 23:50:26 +00:00
Nils Larsch
2c5fadbce3
2 is a prime
...
PR: 1266
2006-01-13 23:27:59 +00:00
Bodo Möller
58ece83395
Further TLS extension improvements
...
Submitted by: Peter Sylvester
2006-01-13 09:21:10 +00:00
Richard Levitte
c75c096aa8
Forgot to initialize CC6DISABLEWARNINGS properly...
2006-01-11 18:55:42 +00:00
Richard Levitte
ab961dc8b0
Typo...
2006-01-11 13:31:04 +00:00
Bodo Möller
6ad47e83b4
improvements for alert handling
2006-01-11 07:18:35 +00:00
Bodo Möller
241520e66d
More TLS extension related changes.
...
Submitted by: Peter Sylvester
2006-01-11 06:10:40 +00:00
Bodo Möller
a13c20f603
Further TLS extension updates
...
Submitted by: Peter Sylvester
2006-01-09 19:49:05 +00:00
Richard Levitte
db6251ad54
Disable the Mixed Linkage warning for some selected modules. This is
...
because the Compaq C compiler will not accept that a variable be
declared extern then defined static without a warning.
2006-01-09 19:23:01 +00:00
Bodo Möller
51eb1b81f6
Avoid contradictive error code assignments.
...
"make errors".
2006-01-08 21:54:24 +00:00
Bodo Möller
2adc42e43e
Detect more errors.
...
Change assignment strategy: rathern than using max+r for new codes,
find first hole in list of existing codes.
2006-01-08 21:43:36 +00:00
Bodo Möller
52cc46a237
Detect SSL error code mishandling.
2006-01-08 20:03:08 +00:00
Bodo Möller
a07b4dc038
include max. codes in debug output
2006-01-08 19:54:32 +00:00
Bodo Möller
739a543ea8
Some error code cleanups (SSL lib. used SSL_R_... codes reserved for alerts)
2006-01-08 19:42:30 +00:00
Bodo Möller
01c76c6606
There's no such things as DTLS1_AD_MISSING_HANDSHAKE_MESSAGE.
...
For now, anyway.
2006-01-07 20:44:29 +00:00
Bodo Möller
d32f888db1
prepare for additional RFC3546 alerts
2006-01-07 20:33:16 +00:00
Bodo Möller
f7914dbf9a
make sure that the unrecognized_name alert actually gets sent
...
Submitted by: Peter Sylvester
2006-01-07 20:29:50 +00:00
Bodo Möller
3ff94a009b
complete and correct RFC3546 error codes
2006-01-07 20:28:11 +00:00
Bodo Möller
1aeb3da83f
Fixes for TLS server_name extension
...
Submitted by: Peter Sylvester
2006-01-06 09:08:59 +00:00
Bodo Möller
e8e5b46e2b
Add names for people who provided the TLS extension patch.
2006-01-04 17:35:51 +00:00
Richard Levitte
c9d67d4ddf
The VMS I run on doesn't know socklen_t and uses size_t instead.
2006-01-04 12:03:47 +00:00
Richard Levitte
8de5b7f548
Fix signed/unsigned char clashes.
2006-01-04 12:02:43 +00:00
Dr. Stephen Henson
9ee0f7b7e0
In ASN1_parse() show tag value for ASN1 tags > 30.
2006-01-03 14:20:07 +00:00
Bodo Möller
f1fd4544a3
Various changes in the new TLS extension code, including the following:
...
- fix indentation
- rename some functions and macros
- fix up confusion between SSL_ERROR_... and SSL_AD_... values
2006-01-03 03:27:19 +00:00
Bodo Möller
349eb12fd5
Make sure that after the change from revision 1.261,
...
it's still possible to do a partial build.
2006-01-03 03:05:08 +00:00
Richard Levitte
6a8f17de1e
Missing files in the VMS installation
2006-01-02 23:33:36 +00:00
Bodo Möller
b1277b9902
C style fix-up
2006-01-02 23:29:12 +00:00
Bodo Möller
ed3883d21b
Support TLS extensions (specifically, HostName)
...
Submitted by: Peter Sylvester
2006-01-02 23:14:37 +00:00
Andy Polyakov
ea558241e0
Refine login in b_sock.c.
2006-01-02 16:05:26 +00:00
Andy Polyakov
61aa2134a4
Compile Windows with winsock2.h. But note that we still link with wsock32!
...
This works because wsock32 commonly loads ws2_32 anyway and we [intend to]
check upon presense of winsock2-specific API at run-time.
2006-01-02 13:44:06 +00:00
Andy Polyakov
4eb76e2397
Fix typo and purify logic in b_sock.c
2006-01-02 12:26:36 +00:00
Andy Polyakov
68e575362f
./util update, which covers various issues, but most importantly mkerr.pl
...
and mkdef.pl spinning in endless loop.
2006-01-02 12:13:07 +00:00
Andy Polyakov
aab3bb04cf
Typo in win32_globallookup.
2006-01-02 12:06:22 +00:00
Andy Polyakov
481d81cb76
Make b_sock.c IPv6 savvy.
2006-01-02 09:12:46 +00:00
Andy Polyakov
c6cb42e4fb
"Relax" prototype and rename DSO_global_lookup_func to DSO_global_lookup.
2006-01-02 08:59:20 +00:00
Andy Polyakov
2d43a89488
util/mkerr.pl update to address various mkerr.pl problems [such as failure
...
to handle multi-line comments and endless loop while parsing overloaded
gnu-ish __attribute__].
2006-01-01 18:42:05 +00:00
Andy Polyakov
302ea8c260
Fix mapping "leak" in newly introduced win32_globallookup.
2006-01-01 18:38:59 +00:00
Andy Polyakov
a1f3462bc0
Oops! Remove junk...
2005-12-31 14:54:22 +00:00
Bodo Möller
7476f3ac3b
Rewrite timeout computation in a way that is less prone to overflow.
...
(Problem reported by Peter Sylvester.)
2005-12-30 23:51:36 +00:00
Andy Polyakov
68b64fb610
Add DSO_global_lookup_func implementation. See commentary in dso_lib.c
...
for further details.
2005-12-30 22:53:59 +00:00
Andy Polyakov
34b537ee66
Fix CFB and OFB modes in eng_padlock.c. Engine was consistent with itself,
...
but not interoperable with the rest of the world. test_padlock script is
added mostly for reference.
2005-12-28 16:16:56 +00:00
Andy Polyakov
7a5dbeb782
Minor sparcv9 clean-ups.
2005-12-27 21:27:39 +00:00
Andy Polyakov
6c06918ede
Lower PADLOCK_CHUNK till value, which doesn't affect the benchmark results.
...
Well, it's even contrary, 512 was observed to *improve* performance by 5%.
Excuse ourselves from treating C7 specially.
2005-12-27 21:21:56 +00:00
Richard Levitte
ee8f293701
Whoops, we were copying instead of comparing at the end of trying to
...
find a queue element.
Notified by nagendra modadugu <nagendra@cs.stanford.edu >
2005-12-20 07:03:10 +00:00
Andy Polyakov
3b4a0225e2
As SPARCV9 CPU flavor is [expected to be] detected at run-time, we can
...
afford to relax SPARCV9/8+ compiler command line and produce "unversal"
binaries as we used to.
2005-12-19 09:10:06 +00:00
Ulf Möller
c8e1edaae5
comments
2005-12-18 20:59:25 +00:00
Andy Polyakov
63d3fc9106
Eliminate possible mapping leak.
2005-12-18 19:14:01 +00:00
Andy Polyakov
5d7324e42d
Typo in sparcv8cap.c.
2005-12-18 19:13:03 +00:00
Andy Polyakov
be7b4458f2
Keep disclaiming 16-bit platform support. For now remove WIN16 references
...
from .h files...
2005-12-18 19:11:37 +00:00
Andy Polyakov
7304956e39
Missing CFLAG in couple of depend: targets.
...
PR: 1247
Submitted by: Doug Kaufman
2005-12-18 19:00:54 +00:00
Andy Polyakov
c510eec090
Put back OPENSSL_SYS_MSDOS definition to revive DJGPP built.
...
PR: 1247
2005-12-18 18:55:55 +00:00
Andy Polyakov
1b167a4343
Make bio.h resistant to gnu-ish __attribute__ redefenitions.
...
PR: 1252
2005-12-16 21:21:41 +00:00
Andy Polyakov
9ab5170197
Fix typos in osf1 shared rules.
...
PR: 1248
Submitted by: Nikola Milutinovic
2005-12-16 20:51:03 +00:00
Andy Polyakov
a00e414faf
Unify sparcv9 assembler naming and build rules among 32- and 64-bit builds.
...
Engage run-time switch between bn_mul_mont_fpu and bn_mul_mont_int.
2005-12-16 17:39:57 +00:00
Andy Polyakov
4c5e19b6c6
Make framework for Whirlpool assembler flexible.
2005-12-16 13:23:57 +00:00
Andy Polyakov
ed26604a71
Engage Whirlpool assembler and mention Whirlpool in CHANGES.
2005-12-16 12:55:33 +00:00
Andy Polyakov
0fbd4bf044
Make room for Whirlpool assembler in Configure.
2005-12-16 11:53:31 +00:00
Andy Polyakov
d719e60cb4
Allow for warning-free passing of -Wl options on config command line. One
...
possible usage is to pass -Wl,-z,-noexecstack on Linux to ensure the stack
is marked non-executable. Well, -Wa,--noexecstack works fine too...
2005-12-16 11:29:19 +00:00
Andy Polyakov
0cb9d93d0c
Mention bn(64,64) to bn(64,32) switch on 64-bit SPARCv9 targets in CHANGES.
2005-12-16 11:12:42 +00:00
Andy Polyakov
f5826b8014
We all make typos:-) Fix just introduced ones in bn.h
2005-12-16 10:43:33 +00:00
Andy Polyakov
4a47f55639
Eliminate warning induced by http://cvs.openssl.org/chngview?cn=14690 and
...
keep disclaiming narrower than 32-bit support.
2005-12-16 10:37:24 +00:00
Andy Polyakov
b884556ed8
To exclude contention for shared FPU on T1, trade 3% of DES performance.
2005-12-15 22:55:16 +00:00
Andy Polyakov
c06b0f3d5e
sparccpuid module update.
2005-12-15 22:50:36 +00:00
Andy Polyakov
68ea60683a
Add IALU-only bn_mul_mont for SPARCv9. See commentary section for details.
2005-12-15 22:43:33 +00:00
Andy Polyakov
6df8c74d5b
Switch 64-bit sparcv9 platforms from bn(64,64) to bn(64,32). This doesn't
...
have impact on performance, because amount of multiplications does not
increase with this switch, not on sparcv9 that is. On the contrary, it
actually improves performance, because it spares a load of instructions
used to chase carries. Not to mention that BN assembler modules can be
shared more freely between 32- and 64-bit builts.
2005-12-15 22:40:58 +00:00
Andy Polyakov
877e8e970c
Allow for bn(64,32) on LP64 platforms.
2005-12-15 22:31:16 +00:00
Bodo Möller
d56349a2aa
update TLS-ECC code
...
Submitted by: Douglas Stebila
2005-12-13 07:33:35 +00:00
Bodo Möller
67c03ff185
comment
2005-12-13 05:46:33 +00:00
Andy Polyakov
35e00cc2d8
Minor aes-sparcv9.pl optimization.
2005-12-10 12:32:22 +00:00
Andy Polyakov
064f6cb6f2
Engage AES for UltraSPARC in sparcv9 targets.
2005-12-10 11:24:07 +00:00
Andy Polyakov
20ab8b4b41
Revoke the option to share AES S-boxes between C and assembler. It wastes
...
space, but gives total flexibility [back].
2005-12-10 11:22:57 +00:00
Andy Polyakov
7395d852c3
Initial draft for AES for UltraSPARC assembler.
2005-12-10 11:19:56 +00:00
Andy Polyakov
3ebf898e88
Support for indirect calls in x86 assembler modules.
2005-12-06 18:43:59 +00:00
Dr. Stephen Henson
a4c886e4c8
Add cpuid code to VC++ build.
2005-12-06 16:35:40 +00:00
Dr. Stephen Henson
1291dfdead
Don't include zlib header dir if it is not defined.
2005-12-06 13:36:59 +00:00
Andy Polyakov
df278aff3e
Fix typos in wp-mmx.pl.
2005-12-06 09:34:09 +00:00
Dr. Stephen Henson
7c510d6f43
Initial attempt at Whirlpool assembler support on VC++.
2005-12-06 02:04:58 +00:00
Dr. Stephen Henson
7bbcb2f690
Avoid warnings on VC++ 2005.
2005-12-05 17:21:22 +00:00
Dr. Stephen Henson
ad2695b1b7
Update from 0.9.8-stable.
2005-12-05 13:46:46 +00:00
Dr. Stephen Henson
9cbf062a70
Update from stable branch.
2005-12-05 00:53:36 +00:00
Dr. Stephen Henson
ec645d9017
Make mk1mf.pl and friends recognize Whirlpool.
2005-12-05 00:53:10 +00:00
Dr. Stephen Henson
0d894c9dbe
Make ZLIB without ZLIB_SHARED compiled again.
2005-12-03 17:42:11 +00:00
Andy Polyakov
c6709b89c4
Couple other benchmark comparisons for wp-x86_64.pl.
2005-12-03 11:59:25 +00:00
Andy Polyakov
061bebc0d8
x86cpuid.pl update.
2005-12-03 11:56:55 +00:00
Dr. Stephen Henson
802e1d692b
Oops...
2005-12-02 14:06:35 +00:00
Dr. Stephen Henson
dbf33b344c
Update ordinals and include changes from 0.9.8.
2005-12-02 13:59:00 +00:00
Dr. Stephen Henson
b40228a61d
New functions to support opaque EVP_CIPHER_CTX handling.
2005-12-02 13:46:39 +00:00
Dr. Stephen Henson
da5a0e8722
Add error checking to avoid crashing when zlib cannot be loaded.
2005-12-02 13:27:19 +00:00
Dr. Stephen Henson
200fc02848
Include EVP_whirlpool() prototype in evp.h
2005-12-02 13:25:52 +00:00
Richard Levitte
7096217d39
wq instead of wp? That's gotta be among the more amazing typos I've
...
made...
2005-12-02 09:30:25 +00:00
Richard Levitte
f1eb83a013
Whirlpool was added to EVP, so let's build it on VMS as well.
2005-12-01 03:06:10 +00:00
Andy Polyakov
fec82dbc86
Whirlpool for x86_64.
2005-11-30 21:03:36 +00:00
Andy Polyakov
7b1b47a8e6
Mention Whirlpool in dgst -help.
2005-11-30 20:58:41 +00:00
Andy Polyakov
8b9afce53a
Add Whirlpool to EVP.
2005-11-30 20:57:23 +00:00
Andy Polyakov
137db78b46
Adapt Whirlpool API for EVP.
2005-11-30 20:53:14 +00:00
Andy Polyakov
a3344c8e5e
Fix typos in wp-mmx.pl.
2005-11-30 20:52:27 +00:00
Dr. Stephen Henson
c173d09c56
Typo
2005-11-30 19:25:55 +00:00
Dr. Stephen Henson
cb49a3cfa1
Make CA.pl script use CA extensions when creating a root CA.
2005-11-30 18:31:36 +00:00
Richard Levitte
adab80053d
Build Whirlpool on VMS as well
2005-11-29 12:46:17 +00:00
Andy Polyakov
f106fb85d4
Add Whirlpool OID.
2005-11-28 20:51:46 +00:00
Andy Polyakov
5fa6d850a2
Remove development leftover from whrlpool/asm/wp-mmx.pl.
2005-11-28 20:29:01 +00:00
Andy Polyakov
4adfe93cc5
Add missing Makefile and fix couple of typos in commentary.
2005-11-28 20:16:56 +00:00
Andy Polyakov
d1593e6b15
Whirlpool hash implementation. The fact that subdirectory and .h file are
...
called whrlpool is not a typo, but a way to keep the names shorter than
8 characters. Remaining TODO list comprises adding OID, EVP, corresponding
flag to apps/openssl dgst, benchmark, engage assembler...
2005-11-28 20:09:58 +00:00
Richard Levitte
a53cb070e3
When using POSIXly functions, we need to define _POSIX_C_SOURCE, at
...
least when the source is compiled with ANSI settings.
2005-11-27 15:32:57 +00:00
Dr. Stephen Henson
452ae49db5
Extensive OID code enhancement and fixes.
2005-11-20 13:07:47 +00:00
Richard Levitte
8c5c5b6517
Synchronise with the Unix build.
2005-11-19 07:57:53 +00:00
Bodo Möller
6f44d4d247
deFUDify: don't require OPENSSL_EC_BIN_PT_COMP
2005-11-16 04:07:43 +00:00
Bodo Möller
d804f86b88
disable some invalid ciphersuites
2005-11-15 23:32:11 +00:00
Bodo Möller
8dee9f844f
deFUDify: don't require OPENSSL_EC_BIN_PT_COMP
2005-11-15 21:08:38 +00:00
Andy Polyakov
963ba10012
Keep shutting up VC8.
...
PR: 1243
2005-11-15 08:07:25 +00:00
Andy Polyakov
07645deeb8
Apply "better safe than sorry" approach after addressing sporadic SEGV in
...
bn_sub_words to the rest of the sparcv8plus.S.
2005-11-15 08:02:10 +00:00
Andy Polyakov
c52c82ffc1
Attempt to resolve sporadic SEGV crashes in bn_sub_words in OpenSSH. I'm
...
baffled why it crashes and does it sporadically...
2005-11-11 20:07:07 +00:00
Dr. Stephen Henson
d6a03a23a8
Update from stable branch.
2005-11-11 13:00:07 +00:00
Andy Polyakov
e347b0da2b
Throw in comment so that one doesn't get tempted to optimize it away.
2005-11-09 20:46:37 +00:00
Andy Polyakov
52b1fbbd99
Avoid end-less loop when libcrypto.a is manually deleted, but 'make clean'
...
was not executed. It doesn't excuse user from running 'make clean', it
simply avoids process table exhaustion.
PR: 1236
Submitted by: Michael Richardson
2005-11-09 20:41:21 +00:00
Andy Polyakov
65613f23ba
Mention PROBLEMS in FAQ.
2005-11-09 19:43:40 +00:00
Andy Polyakov
4f92a764f1
AIX -blibpath is not accumulative, one apparently has to specify even
...
self-obvious /usr/lib:/lib.
PR: 1239
2005-11-09 17:27:19 +00:00
Andy Polyakov
6a3a7f3076
Minor perlasm clean-up.
2005-11-09 17:20:26 +00:00
Andy Polyakov
63d3a9c5ea
Tidying up WinCE support.
2005-11-09 17:19:38 +00:00
Andy Polyakov
2c730f6fc2
Improve cross-compiler portability of applink.c module and mention
...
CRYPTO_malloc_init in FAQ.
2005-11-09 17:11:03 +00:00
Dr. Stephen Henson
df8dae1df4
Update docs.
2005-11-07 00:35:22 +00:00
Dr. Stephen Henson
2e9f1bf0e1
Update from stable branch.
2005-11-07 00:10:36 +00:00
Andy Polyakov
b1e0ccbaa8
One of Win64 rules lacked bufferoverflowu.lib.
2005-11-06 22:41:13 +00:00
Andy Polyakov
bd2abcae37
Move declaration for optional bn_mul_mont to bn_lcl.h in order to hide
...
it from mkdef.pl.
2005-11-06 22:10:38 +00:00
Andy Polyakov
f1fbd4c7d1
Address MASM-specific problems introduced with
...
http://cvs.openssl.org/chngview?cn=14547 .
2005-11-06 22:01:27 +00:00
Andy Polyakov
eed22ac4ac
Eliminate VC compiler warning.
2005-11-06 21:11:41 +00:00
Andy Polyakov
176a614899
First draft for WCE PortSDK support. Once again! It's *draft* which requires
...
more work, i.e. more modifications are due...
2005-11-06 20:52:26 +00:00
Dr. Stephen Henson
f858d222f2
Make DLL engines the default in 0.9.9 and VC++.
2005-11-06 20:51:49 +00:00
Dr. Stephen Henson
16094305bc
Add symbols for ASN1 print functions, update ordinal file.
2005-11-06 20:33:33 +00:00
Dr. Stephen Henson
fbf002bb88
Update from stable branch.
2005-11-06 17:58:26 +00:00
Andy Polyakov
9135fddb0e
Revive app_tminterval for Netware.
2005-11-06 17:11:04 +00:00
Andy Polyakov
d88fcf73f1
Revive app_tminterval for vxworks.
2005-11-06 16:55:44 +00:00
Andy Polyakov
a950f28762
Revive app_tminterval for VMS.
2005-11-06 16:16:38 +00:00
Andy Polyakov
c629204688
Keep removing references to tmdiff.
2005-11-06 12:53:28 +00:00
Andy Polyakov
e22f63f231
The typos never stop. Fix one in apps/apps.c.
2005-11-06 12:15:12 +00:00
Andy Polyakov
d256b95768
x86_64-xlate.pl commentary section update.
2005-11-06 11:59:39 +00:00
Andy Polyakov
f530138876
Fix newly introduced typos and warnings in ./apps.
2005-11-06 11:58:22 +00:00
Andy Polyakov
0a39d8f207
Collect timing procedures in apps/apps.c. It's a bit cruel patch, as it
...
temporarily[!] removes support for couple of esoteric platforms [well,
Netware, vxWorks and VMS].
2005-11-06 11:40:59 +00:00
Andy Polyakov
6852d1d8c3
Eliminate crypto/tmdiff.[ch].
2005-11-06 11:38:18 +00:00
Andy Polyakov
a1ad253f17
Eliminate remaining calls to stat in apps/apps.c and unify WIN32_rename for
...
all Windows targets.
2005-11-04 16:12:05 +00:00
Andy Polyakov
ffa101872f
Eliminate dependency on read/write/stat in apps under _WIN32.
2005-11-04 09:30:55 +00:00
Andy Polyakov
4d24b4c466
Engage OPENSSL_NO_POSIX_IO on Windows CE.
2005-11-03 16:50:03 +00:00
Andy Polyakov
474b8a9716
Make cygwin work in directories mounted with 'text' attribute.
2005-11-03 16:43:53 +00:00
Andy Polyakov
53261831f1
Get rid of arcane reference to _fmode in apps/apps.h. Binary open is
...
handles properly by bss_file.c, which renders _fmode redundant.
2005-11-03 16:42:57 +00:00
Andy Polyakov
49e3c9d8e6
Mask libcrypto references to stat with OPENSSL_NO_POSIX_IO.
2005-11-03 16:22:40 +00:00
Andy Polyakov
1715e4885a
Reserve for OPENSSL_NO_POSIX_IO macro which is to eliminate references
...
to open/read/write/close. First OPENSSL_NO_POSIX_IO target would be
Windows CE.
2005-11-03 15:50:50 +00:00
Andy Polyakov
eff7cb41d1
Disable BIO_s_fd on CE and disable fd:N as password passing option on
...
all _WIN32 [see commentary for clarification].
2005-11-03 15:31:28 +00:00
Andy Polyakov
7a6f825f0f
Make pshufw optional and update performance table in sha512-sse2.pl
...
[as per http://cvs.openssl.org/chngview?cn=14551 ].
2005-11-03 15:23:11 +00:00
Nils Larsch
29afd31dd1
fix typo, pointed out by Patrick Guio
2005-11-02 22:19:32 +00:00
Nils Larsch
d86b0f1f5f
compile sstrsep only if HAVE_FORK is defined; patch supplied by Johan Gill <johane@lysator.liu.se>
2005-11-02 22:13:43 +00:00
Richard Levitte
998ac55e19
Document it
2005-11-01 07:53:37 +00:00
Richard Levitte
d6f25d70f1
Fix numerous bugs in the Win32 path splitter
2005-11-01 07:49:45 +00:00
Richard Levitte
b02da8eb50
A slight change in documentation that makes it so much more comprehensible
2005-11-01 04:56:25 +00:00
Dr. Stephen Henson
2f52a41054
Include kerberos libraries (if used) when linking test apps: some need it.
2005-10-29 12:51:43 +00:00
Andy Polyakov
99c675b2f7
Add -install_name in link_a.darwin rule.
...
PR: 1218
2005-10-28 08:10:47 +00:00
Bodo Möller
72dce7685e
Add fixes for CAN-2005-2969.
...
(This were in 0.9.7-stable and 0.9.8-stable, but not in HEAD so far.)
2005-10-26 19:40:45 +00:00
Bodo Möller
ee8836c442
fix stupid typo
2005-10-26 19:30:10 +00:00
Bodo Möller
a1006c373d
harmonize with 0.9.7-stable and 0.9.8-stable variants of CHANGES
2005-10-26 19:28:04 +00:00
Andy Polyakov
755c5b3330
Fix install problems on MacOS X and HP-UX.
...
PR: 1218,1185
2005-10-25 21:58:59 +00:00
Andy Polyakov
ce6aa1e496
+20% SHA512 performance improvement on x86.
2005-10-25 17:08:55 +00:00
Andy Polyakov
6c1fc273f3
Eliminate false preprocessor dependencies introduced with VOS support.
2005-10-25 15:55:06 +00:00
Andy Polyakov
aa8b03b415
Fix typos in macos x targets.
2005-10-25 15:51:00 +00:00
Andy Polyakov
96ec4abd07
Eliminate ~3.5KB of duplicate code in des-586.pl and reserve for folded
...
loop option, which can give further 3KB code reduction.
2005-10-25 15:47:09 +00:00
Andy Polyakov
70532b7d6b
Move DES_SPtrans to where it really belongs, dec_enc to be specific.
2005-10-25 15:43:18 +00:00
Andy Polyakov
a4d729f31d
Clarify binary compatibility with HAL/Fujitsu SPARC64 family.
2005-10-25 15:39:47 +00:00
Andy Polyakov
fcbc5a3fdd
Integrate sparcv9a-mont.pl into UltraSPARC builds.
2005-10-22 20:21:41 +00:00
Andy Polyakov
8c0ceb17a2
bn_asm.c update.
2005-10-22 20:20:06 +00:00
Andy Polyakov
c2012f9b82
Eliminate gcc warning in bn_mont.c.
2005-10-22 20:17:01 +00:00
Andy Polyakov
aa2be094ae
Add support for 32-bit ABI to sparcv9a-mont.pl module.
2005-10-22 18:16:09 +00:00
Andy Polyakov
4d524040bc
Change bn_mul_mont declaration and BN_MONT_CTX. Update CHANGES.
2005-10-22 17:57:18 +00:00
Andy Polyakov
0fe120ba25
Add rudimentary aix64-gcc target.
...
Submitted by: Stefan Neis
2005-10-19 18:46:20 +00:00
Andy Polyakov
2e7aa150f7
util/pl/OS2-EMX.pl sync.
...
Submitted by: Stefan Neis, Brian Havard
2005-10-19 18:37:36 +00:00
Mark J. Cox
04fac37311
one time CAN->CVE update
2005-10-19 11:00:39 +00:00
Andy Polyakov
bcb43bb358
Yet another "teaser" Montgomery multiply module, for UltraSPARC. It's not
...
integrated yet, but it's tested and benchmarked [see commentary section
for further details].
2005-10-19 07:12:06 +00:00
Richard Levitte
89ec4332ec
Add in CHANGES for 0.9.7i.
2005-10-15 04:26:57 +00:00
Andy Polyakov
34736de4c0
Flip saved argument block and tp [required for non-SSE2 path].
2005-10-14 16:05:21 +00:00
Andy Polyakov
5f50d597f2
Make sure x86-mont.pl returns zero even if compiled with no-sse2.
2005-10-14 15:24:06 +00:00
Andy Polyakov
df94f187b9
Fix bug in SMALL_FOOTPRINT path and clarify comment.
2005-10-14 15:22:27 +00:00
Andy Polyakov
b92c0df834
Broaden compatibility amount Win32 headers even further [some don't have
...
SIZE_T].
2005-10-13 19:06:43 +00:00
Mark J. Cox
d357be38b9
Make sure head CHANGES is up to date, we refer to this in announce.txt
2005-10-11 11:10:19 +00:00
Richard Levitte
912e296070
Renumber to follow what happens with 0.9.8.
2005-10-11 10:14:44 +00:00
Andy Polyakov
35593b33f4
Add timestamp to x86-mont.pl.
2005-10-09 10:26:56 +00:00
Andy Polyakov
54f3d200d3
Throw in bn/asm/x86-mont.pl Montgomery multiplication "teaser".
2005-10-09 09:53:58 +00:00
Dr. Stephen Henson
3f67e11fab
Add PVK support to dsa utility.
2005-10-08 17:32:07 +00:00
Dr. Stephen Henson
c1de1a190d
Avoid warning on Win32.
2005-10-08 17:31:18 +00:00
Dr. Stephen Henson
566dda07ba
New option SSL_OP_NO_COMP to disable compression. New ctrls to set
...
maximum send fragment size. Allocate I/O buffers accordingly.
2005-10-08 00:18:53 +00:00
Andy Polyakov
7a2f4cbfe8
x86_64-mont.pl readability improvement.
2005-10-07 15:18:16 +00:00
Andy Polyakov
5ac7bde7c9
Throw in Montgomery multiplication assembler for x86_64.
2005-10-07 14:18:06 +00:00
Andy Polyakov
9b4eab501a
Refine logic in bn_mont.c and eliminate redundant BN_CTX pulls.
2005-10-06 13:12:28 +00:00
Andy Polyakov
ca04d7a208
Leave the decision to call/implement bn_sqr_mont to assembler developer.
2005-10-06 09:12:39 +00:00
Dr. Stephen Henson
40a3c12305
Initialize bignum constants using BN_bin2bn() instead of BN_hex2bn(). This
...
saves a bit of space and avoids a compiler warning about string length.
2005-10-05 17:51:43 +00:00
Andy Polyakov
3001a770ed
Mention "no-dso doesn't remove -ldl" in PROBLEMS.
...
PR: 1160
2005-10-04 06:30:52 +00:00
Andy Polyakov
2608383c5e
Fix typo in INSTALL.WCE.
2005-10-04 06:26:09 +00:00
Andy Polyakov
3d6312e807
Zap DES_UNROLL when SMALL_FOOTPRINT is in effect.
2005-10-04 06:25:39 +00:00
Andy Polyakov
22cd982566
Fix typo in exptest.c.
2005-10-04 06:23:15 +00:00
Andy Polyakov
682b112abc
Reserve for SMALL_FOOTPRINT bn_asm.c. Currently OPENSSL_SMALL_FOOTPRINT
...
is defined on Windows CE targets.
2005-10-04 06:22:11 +00:00
Andy Polyakov
e738280547
Add reference implementation for bn_[mul|sqr]_mont, new candidates for
...
assembler implementation.
2005-10-04 06:19:29 +00:00
Dr. Stephen Henson
8265328def
Oops :-)
2005-10-02 12:41:11 +00:00
Dr. Stephen Henson
231b98a5e1
Make OPENSSL_NO_COMP work under Win32.
2005-10-02 12:28:40 +00:00
Bodo Möller
13e4670c29
new option "openssl ciphers -V"
2005-10-01 04:08:48 +00:00
Dr. Stephen Henson
d08b6b44ba
Fix compilation without OPENSSL_NO_COMP :-)
2005-10-01 00:40:34 +00:00
Dr. Stephen Henson
09b6c2ef15
Make OPENSSL_NO_COMP compile again.
2005-09-30 23:35:33 +00:00
Nils Larsch
cc29c1204b
successfully updating the db shouldn't result in an error message
2005-09-30 16:47:38 +00:00
Andy Polyakov
94c00f3d4d
Fix typo.
2005-09-29 20:16:04 +00:00
Andy Polyakov
3c2b73672e
Fix missing applink call.
2005-09-29 16:56:21 +00:00
Richard Levitte
23acb0eeb2
Change a comment so it corresponds to reality. Put back a character that
...
was previously replaced with a NUL for parsing purposes. This seems to
fix a very weird parsing bug involving two variable references in the same
value.
2005-09-28 18:02:41 +00:00
Dr. Stephen Henson
bfa4b8c5ab
Update from stable branch.
2005-09-26 11:18:04 +00:00
Nils Larsch
ce75ca04b1
protect BN_BLINDING_invert with a write lock and BN_BLINDING_convert
...
with a read lock
Submitted by: Leandro Santi <lesanti@fiuba7504.com.ar >
2005-09-22 23:37:37 +00:00
Andy Polyakov
9dba0554a5
Fix SunOS 4 building issue.
...
PR: 1196
2005-09-22 20:37:50 +00:00
Andy Polyakov
59947880f4
Broaden compatibility among Windows SDK versions. Elder versions don't have
...
ULONG_PTR, so we replace it with equally wide SIZE_T.
2005-09-22 20:28:30 +00:00
Dr. Stephen Henson
61094cf3dc
128 bit AES ciphersuites should be classified as HIGH.
2005-09-21 00:55:42 +00:00
Andy Polyakov
6d00101e9d
Latest MSVCR80 doesn't tolerate unsupported signal numbers, throwing
...
fatal exceptions.
2005-09-20 20:30:15 +00:00
Andy Polyakov
7a06050cd3
"Overload" SunOS 4.x memcmp, which ruins ASN1_OBJECT table lookups.
...
PR: 1196
Submitted by: Russel Ruby
2005-09-20 20:19:07 +00:00
Andy Polyakov
6f9afa68cd
IA-32 BN tune-up. Performance imrpovement varies with platform and
...
keylength, this time larger improvement for shorter keys, and reaches
15%. Both SSE2 and IALU code pathes are improved.
2005-09-20 12:26:54 +00:00
Andy Polyakov
c038b90619
Fix typo: "powepc" vs "powerpc." G-r-r-r-r.
...
PR: 1198
2005-09-20 12:15:31 +00:00
Andy Polyakov
9c4fe78260
MD5 x86_64 assembler update.
...
Submitted by: Marc Bevand and Charles Liu
2005-09-20 07:56:03 +00:00
Andy Polyakov
60dd08573d
Refine AIX support.
...
PR: 1198
2005-09-20 07:43:27 +00:00
Andy Polyakov
f5204c61fb
BC-32.pl updates.
...
Submitted by: Old Wolf, Jon Bright
2005-09-20 07:05:32 +00:00
Andy Polyakov
9ddeefe39d
Proper solution to nasm compilation problems in Borland context.
2005-09-20 06:13:06 +00:00
Andy Polyakov
0293371a1b
Mention BN_sqr failure on x86 platforms in ./RPOBLEMS.
...
PR: 1176 [and others]
2005-09-19 14:57:44 +00:00
Andy Polyakov
dd31c6fcb0
Another missing space in VC-32.pl [from 0.9.8].
2005-09-19 14:44:17 +00:00
Andy Polyakov
6708df7bf0
Missing space in VC-32.pl.
2005-09-19 14:42:09 +00:00
Andy Polyakov
6d9c46b811
Oops-type typo.
...
PR: 1195
2005-09-19 13:12:00 +00:00
Andy Polyakov
af2c2823a7
bswapl usage should be masked by I386_ONLY.
...
PR: 1195
2005-09-19 13:06:46 +00:00
Nils Larsch
b17ecb642b
cleanup doxygen comments
2005-09-19 08:32:56 +00:00
Nils Larsch
ba12070f7e
add some doxygen comments
2005-09-19 08:10:10 +00:00
Dr. Stephen Henson
29b9763d9f
Change openssl.cnf to use UTF8Strings by default and not always include issuer
...
and serial versions of AKID.
2005-09-16 11:58:28 +00:00
Dr. Stephen Henson
270da80bfa
Fix for Win32.
2005-09-16 11:45:55 +00:00
Nils Larsch
701d35d12f
fix typos
...
PR: 1201
2005-09-15 19:00:55 +00:00
Bodo Möller
2238e8e477
correct+extend publication info
2005-09-12 01:39:46 +00:00
Nils Larsch
4b08da5538
bugfix: register engine as default engine in ENGINE_set_default_DSA
...
Submitted by: Jonathon Green
2005-09-09 07:50:09 +00:00
Richard Levitte
8a616a5a5f
Remove warnings about signed vs. unsigned...
2005-09-05 07:04:40 +00:00
Richard Levitte
9455d430cb
Synchronise VMS build with Unixly build.
2005-09-05 04:20:26 +00:00
Nils Larsch
137023dd0c
fix function name in error
2005-09-03 08:01:08 +00:00
Dr. Stephen Henson
2a45408c4a
Update print macro properly this time...
2005-09-03 00:49:26 +00:00
Dr. Stephen Henson
9e201014f8
Update ASN1 print implement macro.
2005-09-03 00:48:13 +00:00
Dr. Stephen Henson
0c072a0b46
Update asn1t.h too for ASN1 print.
2005-09-03 00:44:08 +00:00
Dr. Stephen Henson
c11c64fbe0
Update to ASN1 printing code.
2005-09-03 00:40:40 +00:00
Dr. Stephen Henson
f022c177db
Two new verify flags functions.
2005-09-02 22:49:54 +00:00
Nils Larsch
5f10073c95
fix typo in sbgp names
...
PR: 1194
2005-09-02 21:23:25 +00:00
Nils Larsch
33ac8b3139
don't try to load cert/key when the "-nocert" option is set
2005-09-02 12:44:59 +00:00
Dr. Stephen Henson
244847591f
Extend callback function to support print customization.
2005-09-01 20:42:52 +00:00
Dr. Stephen Henson
5abe32d861
Return 2 from X509_NAME printing routine to add newline.
2005-09-01 18:02:51 +00:00
Dr. Stephen Henson
9194296de8
Update ASN1 printing code and add a -print option to 'pkcs7' utility for
...
initial testing.
2005-09-01 18:00:56 +00:00
Richard Levitte
6273a91cb7
Synchronise with Unixly build.
2005-09-01 14:24:43 +00:00
Dr. Stephen Henson
1ef7acfe92
Initial support for ASN1 print code.
...
WARNING WARNING WARNING, experimental code, handle with care, use at
your own risk, may contain nuts.
2005-09-01 13:59:16 +00:00
Dr. Stephen Henson
a0156a926f
Integrated support for PVK files.
2005-08-31 16:37:54 +00:00
Richard Levitte
96998822b5
Last synchronisationn with Unixly build. I hope...
2005-08-30 06:00:32 +00:00
Nils Larsch
8215e7a938
fix warnings when building openssl with the following compiler options:
...
-Wmissing-prototypes -Wcomment -Wformat -Wimplicit -Wmain -Wmultichar
-Wswitch -Wshadow -Wtrigraphs -Werror -Wchar-subscripts
-Wstrict-prototypes -Wreturn-type -Wpointer-arith -W -Wunused
-Wno-unused-parameter -Wuninitialized
2005-08-28 22:49:57 +00:00
Richard Levitte
f7622f86d9
More synchronisation with the Unixly build.
2005-08-28 11:28:48 +00:00
Ben Laurie
337e368239
Fix warnings.
2005-08-27 12:10:34 +00:00
Richard Levitte
64b6840d8d
Synchronise with Unix changes.
2005-08-27 04:31:57 +00:00
Nils Larsch
6e119bb02e
Keep cipher lists sorted in the source instead of sorting them at
...
runtime, thus removing the need for a lock. Add a test to ssltest
to verify that the cipher lists are sorted.
2005-08-25 07:29:54 +00:00
Ben Laurie
2c2e46dbf5
Generate primes, too.
2005-08-23 13:48:17 +00:00
Bodo Möller
770bc596e1
recent DH change does not avoid *all* possible small-subgroup attacks;
...
let's be clear about that
2005-08-23 06:54:33 +00:00
Bodo Möller
7534d131d6
avoid potential spurious BN_free()
...
Submitted by: David Heine <dlheine@suif.Stanford.EDU >
2005-08-23 04:14:40 +00:00
Nils Larsch
7f3c9036ea
initialize cipher/digest methods table in SSL_library_init() and hence remove the need for a lock
2005-08-21 23:06:23 +00:00
Nils Larsch
725111f7cb
add missing file
2005-08-21 23:02:05 +00:00
Ben Laurie
bf3d6c0c9b
Make D-H safer, include well-known primes.
2005-08-21 16:00:17 +00:00
Ben Laurie
b8e8ccdc79
Fix warning.
2005-08-21 15:59:10 +00:00
Dr. Stephen Henson
6b80c20bdb
Use correct date and filename.
2005-08-21 12:25:52 +00:00
Dr. Stephen Henson
eea374fd19
Command line support for RSAPublicKey format.
2005-08-21 00:18:26 +00:00
Dr. Stephen Henson
2e8879fa6e
Delete old ASN1_METHOD files.
2005-08-20 19:48:58 +00:00
Dr. Stephen Henson
f5a07779dd
Add file which includes new ASN1 NETSCAPE format for certificates.
2005-08-20 19:46:52 +00:00
Dr. Stephen Henson
c51f2d4238
Update from stable branch.
2005-08-20 19:34:49 +00:00
Dr. Stephen Henson
45e2738585
Remove ASN1_METHOD code replace with new ASN1 alternative.
2005-08-20 18:12:45 +00:00
Dr. Stephen Henson
b173acfc96
New version of ASN1 print code, still not compiled in though.
2005-08-20 00:08:29 +00:00
Nils Larsch
4ebb342fcd
Let the TLSv1_method() etc. functions return a const SSL_METHOD
...
pointer and make the SSL_METHOD parameter in SSL_CTX_new,
SSL_CTX_set_ssl_version and SSL_set_ssl_method const.
2005-08-14 21:48:33 +00:00
Andy Polyakov
8e5ef8538a
Eliminate reference to removed platform line.
2005-08-11 09:38:59 +00:00
Andy Polyakov
ff82bf3b07
Pedantic polish to WCE-specific #if clause in ectest.c
2005-08-11 08:42:46 +00:00
Andy Polyakov
5147c3c914
Fix typo in WCE section in VC-32.pl
2005-08-11 08:18:42 +00:00
Andy Polyakov
fbbbffc5a8
Mention wcecompat update INSTALL.WCE.
2005-08-10 08:39:10 +00:00
Andy Polyakov
7cfe2a5e65
Fix Intel assembler warnings.
2005-08-10 08:28:36 +00:00
Andy Polyakov
df2a346b30
Suppress "deprecated" warnings introduced in VC8.
2005-08-09 22:44:54 +00:00
Andy Polyakov
270512ab12
Add support for more recent WCE SDK.
2005-08-09 22:19:35 +00:00
Nils Larsch
eba63ef58b
a ssl object needs it's own instance of a ecdh key; remove obsolete comment
2005-08-08 20:02:18 +00:00
Nils Larsch
01a9792f05
remove unused internal foo_base_method functions
2005-08-08 19:04:37 +00:00
Andy Polyakov
0491e05833
Final(?) WinCE update.
2005-08-07 22:21:49 +00:00
Nils Larsch
9a1a5b8785
avoid infinite recursion if dynamic engine isn't loaded
...
Submitted by: Jonathon Green <jonathon_au@yahoo.com >
2005-08-06 10:46:19 +00:00
Dr. Stephen Henson
f3b656b246
Initialize SSL_METHOD structures at compile time. This removes the need
...
for locking code. The CRYPTO_LOCK_SSL_METHOD lock is now no longer used.
2005-08-05 23:56:11 +00:00
Nils Larsch
53b38d37a9
fix potential memory leak + improved error checking
...
PR: 1182
2005-08-05 09:42:45 +00:00
Dr. Stephen Henson
8f2e4fdf86
Allow PKCS7_decrypt() to work if no cert supplied.
2005-08-04 22:15:22 +00:00
Andy Polyakov
11de71b04c
3-4 times better RSA/DSA performance on WIN64A target. Well, on AMD64 CPU,
...
EMT64T will hardly exhibit better performance...
2005-08-04 17:35:42 +00:00
Andy Polyakov
19bd66fe74
WCE update, mostly typos.
2005-08-03 19:56:36 +00:00
Andy Polyakov
45771abbd6
PIC-ify SPARC assembler in alternative manner to eliminate dependency on
...
OPENSSL_PIC macro.
2005-08-03 10:42:21 +00:00
Andy Polyakov
573969cd53
Abstain from GUI calls in rand_win.c in NT service context.
2005-08-02 22:09:14 +00:00
Andy Polyakov
34be0bb1a5
WCE-specific update for VC-32.pl.
2005-08-02 22:08:03 +00:00
Andy Polyakov
2031eca588
WCE-specific fix for cryptlib.c.
2005-08-02 22:07:28 +00:00
Andy Polyakov
6321c3a034
Keep disclaiming 16-bit support.
2005-08-02 22:04:11 +00:00
Andy Polyakov
1fda6c4f8c
Optimize for space on embedded WCE.
2005-08-02 14:09:44 +00:00
Andy Polyakov
11a4e58fc1
Stick to -DWCE_PLATFORM_$wceplatf, as that's what is apparently set by
...
Visual Studio IDE.
2005-08-02 12:21:18 +00:00
Andy Polyakov
8a35fb3bea
Eliminate bogus #if WCEPLATFORM!=MS_HPC_PRO [which by the way unconditionally
...
invalidated the whole clause] and replace it with #if _WIN32_WCE>=210.
2005-08-02 11:58:39 +00:00
Andy Polyakov
e85d67af9f
Type in OSF1 platform name.
2005-08-02 10:56:10 +00:00
Andy Polyakov
b37fb16dcb
Implement complementary LoadLibraryA shim under WCE.
2005-08-02 10:55:43 +00:00
Andy Polyakov
1e1c5047f2
Eliminate dependency on 3rd party wcedefs.mak.
2005-07-30 19:43:56 +00:00
Andy Polyakov
b2be099d16
Fix #if _MSC_VER clause in aes_locl.h
2005-07-30 19:42:50 +00:00
Nils Larsch
28d8362934
add comment
2005-07-29 19:46:42 +00:00
Nils Larsch
01039d0bff
remove unused variable
2005-07-27 20:20:53 +00:00
Nils Larsch
c755c5fd8b
improved error checking and some fixes
...
PR: 1170
Submitted by: Yair Elharrar
Reviewed and edited by: Nils Larsch
2005-07-26 21:10:34 +00:00
Dr. Stephen Henson
5c8e9139d1
Handle case where it==NULL
2005-07-26 12:25:06 +00:00
Dr. Stephen Henson
56defd9a98
Update ASN1 printing code. Highly experimental, not working properly (neither
...
did the old code) and not compiled in yet...
2005-07-26 11:46:23 +00:00
Dr. Stephen Henson
8eb7217580
Add declaration for IDP ASN1 functions.
2005-07-26 11:43:11 +00:00
Richard Levitte
b2a9d36a7f
bytes_to_long_long isn't used anywhere any more, so let's remove it
...
entirely.
2005-07-26 05:10:50 +00:00
Richard Levitte
04f15edb91
I'm reversing this change, as it seems the error is somewhere else.
2005-07-26 04:53:21 +00:00
Geoff Thorpe
4e98a44593
Silence two more generated files.
2005-07-26 04:52:52 +00:00
Geoff Thorpe
1385ddbb14
add a .cvsignore
2005-07-26 04:50:36 +00:00
Geoff Thorpe
7f0c65703a
"make update"
2005-07-26 04:48:54 +00:00
Geoff Thorpe
3a6dec8a05
Change my debug build for amd64.
2005-07-26 04:47:50 +00:00
Geoff Thorpe
209b12814f
Fix compilation when HAVE_LONG_LONG isn't defined.
2005-07-26 04:43:31 +00:00
Geoff Thorpe
f920c5b590
Fix signed/unsigned warnings.
2005-07-26 04:25:05 +00:00
Geoff Thorpe
05fc7018f8
Fix PEDANTIC compilation, using the same trick as elsewhere.
2005-07-26 04:05:03 +00:00
Geoff Thorpe
a384002724
Fix 64-bit compilation when PQ_64BIT_IS_INTEGER isn't defined.
2005-07-26 04:01:50 +00:00
Nils Larsch
0260405c68
fix BN_mod_word and give a more reasonable return value if an error occurred
2005-07-25 22:57:54 +00:00
Dr. Stephen Henson
0537f9689c
Add support for setting IDP too.
2005-07-25 22:35:36 +00:00
Dr. Stephen Henson
0c010a1517
Don't use @syntax for extended CRLDP format.
2005-07-25 18:55:40 +00:00
Dr. Stephen Henson
0745d0892d
Allow setting of all fields in CRLDP. Few cosmetic changes to output.
2005-07-25 18:42:29 +00:00
Dr. Stephen Henson
5e64f8c44c
Typo which prevents mult valued RDNs being created.
2005-07-25 18:39:44 +00:00
Andy Polyakov
4a5b8a5bee
Commentary section update in sha512-x86_64.pl.
2005-07-25 13:29:42 +00:00
Andy Polyakov
b3836ed3cb
Unify VC-32.pl and VC-CE.pl scripts and update INSTALL.W32.
2005-07-24 21:48:04 +00:00
Andy Polyakov
47738cbad7
Pull up mkdef.pl from 0.9.8.
2005-07-24 21:45:45 +00:00
Andy Polyakov
0a882b6394
Eliminate gcc warning in dso_win32.c.
2005-07-24 21:45:08 +00:00
Andy Polyakov
612a91110f
Engage SHA-256/-512 x86_64 assembler module.
2005-07-24 12:30:26 +00:00
Andy Polyakov
2337eb5823
SHA-256/-512 x86_64 assembler module.
2005-07-24 12:28:04 +00:00
Dr. Stephen Henson
9aa9d70ddb
Print out previously unsupported fields in CRLDP by i2r instead of i2v.
...
Cosmetic changes to IDP printout.
2005-07-24 00:23:57 +00:00
Dr. Stephen Henson
231493c93c
Initial print only support for IDP CRL extension.
2005-07-23 23:33:06 +00:00
Geoff Thorpe
20a90e3a76
Fix some signed/unsigned warnings.
2005-07-22 03:36:30 +00:00
Nils Larsch
17a2994dbd
set correct bn->top value
2005-07-21 22:40:39 +00:00
Nils Larsch
b554eef43b
the final byte of a pkcs7 padded plaintext can never be 0
...
Submitted by: K S Sreeram <sreeram@tachyontech.net >
2005-07-20 22:03:36 +00:00
Andy Polyakov
0066590f98
Pedantic polish to aes-ia64 and sha512-ia64.
2005-07-20 15:15:22 +00:00
Andy Polyakov
165a28abae
Pedantic polish to md5-ia64.S.
2005-07-20 12:24:04 +00:00
Andy Polyakov
63999e5299
Syncronize BSD-ia64 with other IA64-based platforms.
2005-07-20 12:10:41 +00:00
Andy Polyakov
2802ec65c2
Pedantic polish to rc4-ia64.pl.
2005-07-20 11:47:47 +00:00
Andy Polyakov
b3f56e8b38
Typo in version number.
2005-07-20 11:11:14 +00:00
Andy Polyakov
5826e4f481
Perl stylistic/cosmetic update for aes-x86_64.pl.
2005-07-20 11:09:02 +00:00
Andy Polyakov
66ee67be03
Fix bug [SHA1 IA-64 being disabled] introduced with Stratus VOS update.
...
PR: 1130
2005-07-19 23:04:57 +00:00
Andy Polyakov
a7ad2afa5e
Engage MD5 assembler module.
2005-07-19 22:37:57 +00:00
Andy Polyakov
0f04379d9c
This update gets endianness-neutrality right and adds second required
...
entry point, md5_block_asm_data_order.
2005-07-19 22:33:03 +00:00
Andy Polyakov
7e4d335943
MD5 IA-64 assembler implementation. Original copy for reference purposes.
...
Submitted by: David Mosberger
Obtained from: http://www.hpl.hp.com/research/linux/crypto/
2005-07-19 22:27:02 +00:00
Andy Polyakov
26c07054a1
Retire original rc4-ia64.S.
2005-07-18 18:59:21 +00:00
Andy Polyakov
843d9d0b39
Switch to new RC4 IA-64 module.
2005-07-18 18:56:16 +00:00
Andy Polyakov
4ac210c16a
This update implements following improvements.
...
1. Original submission required minor modification to RC4_set_key, which
we don't want to tolerate and therefore we fix assembler instead.
2. Eliminate remaining byte-order dependence [look for RC4_BIG_ENDIAN].
3. Eliminate logical error [when key->x is referred prior key is verified].
4. HP-UX assembler puked on MODSCHED_RC4 macro with "syntax error,"
macro has to be splitted in two.
5. Deploy parallel compare in function prologue.
6. Eliminate redundant instuctions and nops.
7. Eliminate assembler warnings.
2005-07-18 17:11:13 +00:00
Andy Polyakov
02703c74a4
Unrolled RC4 IA-64 loop gives 40% improvement over current assembler
...
implementation [as predicted].
Submitted by: David Mosberger
Obtained from: http://www.hpl.hp.com/research/linux/crypto/
2005-07-18 16:55:52 +00:00
Andy Polyakov
ef428d5681
Fix unwind directives in IA-64 assembler modules. This helps symbolic
...
debugging and doesn't affect functionality.
Submitted by: David Mosberger
Obtained from: http://www.hpl.hp.com/research/linux/crypto/
2005-07-18 09:54:14 +00:00
Andy Polyakov
afbe674edb
~15% better AES x86_64 assembler.
2005-07-18 09:15:04 +00:00
Nils Larsch
f42e6d24f2
fix typo
2005-07-17 21:04:19 +00:00
Nils Larsch
449bd384ed
bugfix: 0 - w (w != 0) is actually negative
2005-07-17 16:09:09 +00:00
Nils Larsch
3eeaab4bed
make
...
./configure no-deprecated [no-dsa] [no-dh] [no-ec] [no-rsa]
make depend all test
work again
PR: 1159
2005-07-16 12:37:36 +00:00
Nils Larsch
57eb1d3250
add missing entries for "-multivalue-rdn" and "-utf8" in ca.pod and req.pod
...
PR: 1158
Submitted by: Michael Bell <michael.bell@cms.hu-berlin.de >
2005-07-15 09:49:03 +00:00
Andy Polyakov
b4f5e5c959
Commentary section update.
2005-07-14 13:16:31 +00:00
Nils Larsch
0d2848b3ba
the second argument of d2i_X509, d2i_X509_CRL and d2i_X509_REQ is const
...
PR: 1156
Submitted by: Michael Bell <michael.bell@cms.hu-berlin.de >
2005-07-13 22:01:33 +00:00
Andy Polyakov
e84b663a93
complementary x86_64-xlate.pl update.
2005-07-12 22:11:22 +00:00
Andy Polyakov
d85185217b
AES x86_64 assembler implementation.
2005-07-12 15:44:58 +00:00
Andy Polyakov
8f3bdc72d0
Latest Intel compiler means every word in "if copying [with memcpy] takes
...
place between objects that overlap, the behavior is undefined." It's hard
to comprehend, but it reportedly manages to be case.
2005-07-08 16:46:22 +00:00
Richard Levitte
7d368fcbd8
On case insensitive systems, 'install' gets mixed up with the existing file
...
'INSTALL', so we need to put some force into installing
2005-07-08 10:13:22 +00:00
Richard Levitte
2bd2cd9b78
Changes from the 0.9.8 branch.
2005-07-05 19:16:24 +00:00
Richard Levitte
c83101248a
Changes from the 0.9.8 branch.
2005-07-05 18:36:42 +00:00
Andy Polyakov
8d3509b937
CHANGES and TABLE sync with 0.9.8.
2005-07-05 11:48:38 +00:00
Andy Polyakov
1875e6db29
Pull up Win64 support from 0.9.8.
2005-07-05 11:44:45 +00:00
Richard Levitte
0962fbbf98
Add libcrypto.pc and libssl.pc, and install them along with openssl.pc.
...
PR: 1143
2005-07-05 05:14:17 +00:00
Dr. Stephen Henson
cbdac46d58
Update from stable branch.
2005-07-04 23:12:04 +00:00
Richard Levitte
d2e0c81720
The private key should never have ended up in newreq.pem.
...
Now, it ends up in newkey.pem instead.
2005-07-04 21:44:16 +00:00
Andy Polyakov
109080ae48
Fix bugs in bug-fix to x509/by_dir.c.
...
PR: 1131
2005-07-03 13:10:45 +00:00
Andy Polyakov
31efffbdba
Trap condition should be 64-bit when it's due.
2005-07-03 09:17:50 +00:00
Andy Polyakov
aaa5dc614f
More elegant solution to "sparse decimal printout on PPC" problem.
2005-07-02 08:58:55 +00:00
Andy Polyakov
8be97c01d1
Decimal printout of a BN is wrong on PPC, it's sparse with very few
...
significant digits. As soon it verifies elsewhere it goes to 0.9.8 and
0.9.7.
2005-07-01 17:49:47 +00:00
Nils Larsch
9e1a112336
initialize newly allocated data
...
PR: 1145
2005-07-01 16:08:14 +00:00
Andy Polyakov
4e28f13209
Pedantic polish to aes-586.pl:-)
2005-07-01 10:13:30 +00:00
Andy Polyakov
53a20bfd94
Typos in commentary section.
2005-06-30 22:09:03 +00:00
Andy Polyakov
a28062338c
AES_cbc_encrypt to allow end-user to retain small blocks performance by
...
aligning the key schedule in a specific manner.
2005-06-30 22:06:35 +00:00
Dr. Stephen Henson
1c2f1fe505
Check PKCS7 structures in PKCS#12 files are of type data.
2005-06-30 11:34:58 +00:00
Richard Levitte
14365bd820
Actually, the 64bit format specifier differs between SIXTY_FOUR_BIT and
...
SIXTY_FOUR_BIT_LONG
2005-06-29 18:48:08 +00:00
Ben Laurie
a51a97262d
Brought forward from 0.9.8 - 64 bit warning fixes and fussy compiler fixes.
2005-06-29 11:02:15 +00:00
Ben Laurie
45d8574b93
Fix warnings.
2005-06-29 10:25:06 +00:00
Richard Levitte
417f8973ff
asn1parse doesn't support any TXT format, so let's stop pretending
...
it does.
2005-06-28 15:44:11 +00:00
Nils Larsch
b3b72cd92c
remove OPENSSL_NO_ASM dependency
2005-06-28 15:05:02 +00:00
Andy Polyakov
bb00084863
Replace _int64 with __int64, which is more widely accepted among Win32
...
compiler vendors.
2005-06-28 11:50:50 +00:00
Andy Polyakov
db22e5faa6
A report suggests that there're nasm version, which defaults to 16-bit
...
segmenting...
2005-06-28 11:28:43 +00:00
Andy Polyakov
55d03c3179
Mention hpux64-ia64-cc blowfish failure in PROBLEMS.
2005-06-28 09:57:04 +00:00
Richard Levitte
7e0a494f13
There are a few showstoppers. Unfortunately, I only remember one. Please fill this in.
2005-06-28 05:55:22 +00:00
Andy Polyakov
83e68987b3
Eliminate dependency on UNICODE macro.
2005-06-27 21:27:23 +00:00
Andy Polyakov
53bb3bee34
Fix typos in apps/apps.c
2005-06-27 15:56:53 +00:00
Dr. Stephen Henson
c9edf6fe98
Sync libeay.num
2005-06-27 00:45:38 +00:00
Andy Polyakov
14cc0aaf7b
Unify some SCO targets.
2005-06-26 18:06:38 +00:00
Andy Polyakov
2f3c39bc62
Minor (final?) Makefiles polish.
2005-06-26 17:47:44 +00:00
Andy Polyakov
c5de8b2a27
Minimum requirement for Solaris x86 was always Pentium. Reflect this in
...
Configure line. TABLE update accomodates other recent ./Configure changes...
2005-06-26 17:17:11 +00:00
Andy Polyakov
a4022932ee
Omit padding in RC4_KEY on IA-64. The idea behind padding was to reserve
...
room for aligning of the key schedule itself [specific alignment is
required for future performance improvements], but OpenSSH "abuses"
our API by making copies and restoring RC4_KEY, thus ruining the
alignment and making it impossible to recover the key schedule.
PR: 1114
2005-06-26 16:09:29 +00:00
Richard Levitte
0e3b6b70df
Updated status from 0.9.8-stable.
2005-06-24 22:27:57 +00:00
Andy Polyakov
c49a0aa08d
Replace emms with finit in x86cpuid.
2005-06-24 16:32:10 +00:00
Dr. Stephen Henson
5503b6a352
Add Argen root CAs.
2005-06-24 11:07:13 +00:00
Richard Levitte
60021d9165
Someone did some cutting and pasting and didn't quite finish the job :-).
...
Notified by Steffen Pankratz <kratz00@gmx.de >
2005-06-24 05:13:08 +00:00
Richard Levitte
97b708910a
Wrap the inclusion of openssl/engine.h with a protective check for
...
the absence of OPENSSL_NO_ENGINE.
2005-06-23 22:08:47 +00:00
Richard Levitte
2f6ebed1dc
Wrap the inclusion of openssl/engine.h with a protective check for
...
the absence of OPENSSL_NO_ENGINE.
PR: 1123
2005-06-23 21:57:40 +00:00
Richard Levitte
156f657209
Do not defined des_crypt(), since it clashes with Solaris crypt.h.
...
PR: 1125
2005-06-23 21:53:56 +00:00
Richard Levitte
816f74d1c7
Initialise dir to avoid a compiler warning.
2005-06-23 21:49:21 +00:00
Richard Levitte
ec14c80c7c
The NAME section of a man page is required to have a dash followed by a
...
short description, at least according to pod2man.
PR: 1127
2005-06-23 21:45:37 +00:00
Richard Levitte
543b4ecc13
DCC doesn't like argument names in returned function pointers.
...
PR: 1122
2005-06-23 21:35:25 +00:00
Richard Levitte
1110cea007
Update for Stratus VOS.
...
PR: 1130
2005-06-23 21:27:21 +00:00
Richard Levitte
0ed64ce310
Configure update for Stratus VOS.
...
PR: 1129
2005-06-23 21:21:45 +00:00
Richard Levitte
0e441bc2be
Change dir_ctrl to check for the environment variable before using the default
...
directory instead of the other way around.
PR: 1131
2005-06-23 21:14:15 +00:00
Richard Levitte
d996a9af2b
Strip the engine shared libraries as well.
...
Submitted by Corinna Vinschen <vinschen@redhat.com >
2005-06-23 20:55:38 +00:00
Andy Polyakov
ab6cf1b8a2
Darwin specific update for Configure and Makefile.shared.
2005-06-23 20:44:27 +00:00
Andy Polyakov
c25f2f1cbf
Missed -c in IRIX rules.
2005-06-23 20:37:29 +00:00
Andy Polyakov
62526671e9
Typo in bn-mips3 rule.
2005-06-23 16:24:51 +00:00
Andy Polyakov
88ebf53577
Rename mips3.o to bn-mips3.o [it's better in long run] and adjust the
...
rule to accomodate gcc4, which no longer support SGI as.
2005-06-23 16:23:06 +00:00
Andy Polyakov
a41b0aade2
HP-UX specific updates to Makefile.org and Makefile.shared.
2005-06-23 15:36:15 +00:00
Andy Polyakov
02c31fa461
Jumbo Makfiles update.
...
- eliminate ambiguities between GNU-ish and SysV-ish make flavors;
- switch [back] to -e;
- fold/unify rules;
This is follow-up to the patch introducing common BUILDENV. Idea is
to collect as much parameters in $(TOP) as possible and "strip" lower
Makefiles for most variables [and thus makes them more readable].
2005-06-23 00:03:26 +00:00
Andy Polyakov
5df70a9e21
no-asm didn't prevent make from compiling assembler modules.
2005-06-22 23:44:44 +00:00
Andy Polyakov
cbe52c3166
TABLE was out-of-sync.
2005-06-22 23:43:12 +00:00
Andy Polyakov
7858cc03da
Solaris-specific Makefile.shared update from 098.
2005-06-22 23:42:34 +00:00
Dr. Stephen Henson
bbada33271
Typo.
2005-06-22 18:54:54 +00:00
Dr. Stephen Henson
f5d51a9362
Fix extension ordering.
2005-06-22 13:26:23 +00:00
Richard Levitte
0fc6b2c9e2
Do no try to pretend we're at the end of anything unless we're at the end
...
of a 4-character block.
2005-06-20 22:11:14 +00:00
Richard Levitte
7a5ad5d5a1
Check for 'usage' and 'Usage'.
...
Submitted by Tim Rice <tim@multitalents.net >. His comment is:
I noticed "make report" didn't show the cc version on most of
my System V platforms. This patch corrects this.
2005-06-20 20:48:21 +00:00
Andy Polyakov
44eff497e8
Fix typo in ssl/d1_pkt.c.
2005-06-20 19:36:34 +00:00
Andy Polyakov
8b452002e8
Refine ELF detection on BSD platforms.
2005-06-20 17:39:10 +00:00
Andy Polyakov
e442c36252
Solaris x86_64 /usr/ccs/bin/as support.
2005-06-20 14:56:48 +00:00
Andy Polyakov
50ec3951dc
Handle wrap-arounds and revive missing assignment.
2005-06-20 12:40:37 +00:00
Richard Levitte
11cd239707
Add crypto/bn/bn_prime.h to the collection of generated files. In the
...
update target, place the dependency on depend last, so all necessary files
are generated *before* the dependencies are figured out.
PR: 1121
2005-06-20 04:29:50 +00:00
Richard Levitte
f6098f2dda
With DJGPP, it seems like the return code from grep, even when in the
...
middle of a pipe, is noted. Counter that by forcing a true return code
when the return code has no importance.
PR: 1085
2005-06-19 20:31:15 +00:00
Richard Levitte
857c6092b6
Undefine DECRANDOM before redefining it.
...
PR: 1110
2005-06-19 20:20:24 +00:00
Richard Levitte
eef468e330
Add better documentation on how id_function() should be defined and what
...
issues there are.
PR: 1096
2005-06-18 05:52:16 +00:00
Richard Levitte
4bd46774bb
Move the definition of DEVRANDOM for DJGPP from Configure to e_os.h.
...
That should solve the issues with propagating it through the Makefiles.
PR: 1110
2005-06-18 04:42:24 +00:00
Richard Levitte
283c3e2437
Only define ZLIB_SHARED if it hasn't already been defined (on the command
...
line, for example).
PR: 1112
2005-06-18 04:32:12 +00:00
Richard Levitte
306aae6cee
Have pod2man.pl accept '=for comment ...' before the '=head1 NAME' line.
...
PR: 1113
2005-06-18 04:27:06 +00:00
Nils Larsch
edb0600583
clear dso pointer in case of an error
...
PR: 816
2005-06-17 21:26:36 +00:00
Nils Larsch
ac86d923fc
update for the cswift engine:
...
- fix the problem described in bug report 825
- fix a segfault when the engine fails to initialize
- let the engine switch to software when keysize > 2048
PR: 825, 826
Submitted by: Frédéric Giudicelli
2005-06-17 20:27:41 +00:00
Richard Levitte
fbd63d0784
Do not undefine _XOPEN_SOURCE. This is currently experimental, and
...
will be firmed up as soon as it's been verified not to break anything.
2005-06-16 22:20:55 +00:00
Richard Levitte
78ebeee2c4
0.9.8-beta5 works on Gentoo/arml but not /armb, and works on Linux AMD64
2005-06-14 05:42:52 +00:00
Richard Levitte
55805fd2d0
Data about which Cygwin versions 0.9.8-beta5 work on
2005-06-13 17:10:03 +00:00
Richard Levitte
7ebd220a8f
0.9.8-beta5 works on SuSE 9.3
2005-06-13 17:03:13 +00:00
Richard Levitte
e8a1f6d190
0.9.8-beta5 works on Cygwin
2005-06-13 17:00:18 +00:00
Nils Larsch
034bae10fc
update FAQ
2005-06-13 08:38:02 +00:00
Richard Levitte
a7c924c041
0.9.8-beta5 works on VMS/Alpha
2005-06-13 04:17:12 +00:00
Richard Levitte
27b762af60
Status update
2005-06-13 03:36:58 +00:00
Richard Levitte
b764ab9537
Netware patch submitted by Verdon Walker" <VWalker@novell.com> in PR
...
1107. He says:
This is a followup to the NetWare patch that was applied to beta3. It
does the following:
- Fixes a problem in the CLib build with undefined symbols.
- Adds the ability to use BSD sockets as the default for the OpenSSL
socket BIO. NetWare supports 2 flavors of sockets and our Apache
developers need BSD sockets as a configurable option when building
OpenSSL. This adds that for them.
- Updates to the INSTALL.NW file to explain new options.
I have tried very hard to make sure all the changes are in NetWare
specific files or guarded carefully to make sure they only impact
NetWare builds. I have tested the Windows build to make sure it does
not break that since we have made changes to mk1mf.pl.
We are still working the gcc cross compile for NetWare issue and hope
to have a patch for that before beta 6 is released.
2005-06-13 03:23:50 +00:00
Richard Levitte
a761b89d2f
Show what the offending target was.
...
PR: 1108
2005-06-13 02:39:05 +00:00
Nils Larsch
a136862afe
replace the deprecated "-m486" gcc option with "-march=i486"
...
PR: 1049
2005-06-12 10:34:42 +00:00
Nils Larsch
f0747cd950
- let SSL_CTX_set_cipher_list and SSL_set_cipher_list return an
...
error if the cipher list is empty
- fix last commit in ssl_create_cipher_list
- clean up ssl_create_cipher_list
2005-06-10 19:55:26 +00:00
Andy Polyakov
21ac2b964b
Eliminate gcc -pedantic warnings.
2005-06-09 21:41:44 +00:00
Andy Polyakov
79e1dd65ab
Allow for dso load by explicit path on HP-UX.
2005-06-09 20:52:24 +00:00
Richard Levitte
13e393607b
When the return type of the function is int, it's better to return an
...
in than NULL, especially when an error is signalled with a negative
value.
2005-06-09 17:28:53 +00:00
Nils Larsch
052ec89927
use "=" instead of "|=", fix typo
2005-06-08 22:22:33 +00:00
Richard Levitte
2073d95fb4
Avoid endless loops. Really, we were using the same variable for two
...
different conditions...
2005-06-08 21:59:47 +00:00
Nils Larsch
cbed917fee
ssl_create_cipher_list should return an error if no cipher could be
...
collected (see SSL_CTX_set_cipher_list manpage). Fix handling of
"cipher1+cipher2" expressions in ssl_cipher_process_rulestr.
PR: 836 + 1005
2005-06-08 21:19:14 +00:00
Andy Polyakov
dffdb56b7f
"Liberate" dtls from BN dependency. Fix bug in replay/update.
2005-06-07 22:21:14 +00:00
Dr. Stephen Henson
a78c0632ed
Fix for padding X9.31 padding check and zero padding bytes.
2005-06-06 22:39:43 +00:00
Andy Polyakov
8fa6a40be2
Allow BIO_s_file to open and sequentially access files larger than 2GB on
...
affected platforms.
PR: 973
2005-06-06 11:58:31 +00:00
Andy Polyakov
4b5598682a
FAQ to mention no-sha512 as option for compilers without support for 64-bit
...
integer type.
2005-06-06 09:32:01 +00:00
Richard Levitte
e9f5428d3a
Pass INSTALL_PREFIX in BUILDENV.
...
PR: 1100
2005-06-06 08:52:19 +00:00
Richard Levitte
34f0b26424
Skipping all tests just because one algorithm is disabled seems a bit harsch.
...
PR: 1089
2005-06-06 08:38:05 +00:00
Andy Polyakov
cd27b13b1d
Change mention of Makefile.ssl to Makefile.
2005-06-06 08:35:49 +00:00
Richard Levitte
3ecbd099eb
_GNU_SOURCE needs to be defined before any standard header.
2005-06-06 00:50:52 +00:00
Richard Levitte
e43d03e30e
Update from 0.9.8-stable.
2005-06-06 00:42:24 +00:00
Richard Levitte
d1acb9b44f
Further change pq_compat.h to generate the flag macros PQ_64BIT_IS_INTEGER
...
and PQ_64BIT_IS_BIGNUM with the values 0 (for false) and 1 (for true),
depending on which is true. Use those flags everywhere else to provide
the correct implementation for handling certain operations in q PQ_64BIT.
2005-06-06 00:32:11 +00:00
Richard Levitte
acd1c4b5af
Document the change and update the version number (d'oh!).
2005-06-05 23:25:29 +00:00
Richard Levitte
40808cedc1
Remove the incorrect installation of '%{openssldir}/lib'.
...
PR: 1074
2005-06-05 23:15:03 +00:00
Richard Levitte
51054a1b39
Change pq_compat.h to trust the macros defined by bn.h a bit more, and thereby
...
provide better generic support for environments that do not have 64-bit
integers. Among others, this should solve PR 1086
2005-06-05 22:42:58 +00:00
Richard Levitte
e774a3299e
gcc 2.95.3 on Ultrix supports long long.
...
PR: 1091
2005-06-05 22:19:24 +00:00
Richard Levitte
99febc8b9a
Correct typo ia64.o -> bn-ia64.o.
...
PR: 1094
2005-06-05 22:09:10 +00:00
Richard Levitte
1ce8efbdda
Add support for the new Intel compiler, icc.
...
Submitted by Keith Thompson <kst@sdsc.edu >
PR: 1095
2005-06-05 22:01:18 +00:00
Richard Levitte
0b0a60d861
Old typo...
...
PR: 1097
2005-06-05 21:54:48 +00:00
Richard Levitte
9e5b378081
Updated support for NetWare, submitted by Verdon Walker <VWalker@novell.com>.
...
PR: 1098
2005-06-05 21:47:19 +00:00
Andy Polyakov
7ed876533a
New function, DSO_pathbyaddr, to find pathname for loaded shared object
...
by an address within it. Tested on Linux, Solaris, IRIX, Tru64, Darwin,
HP-UX, Win32, few BSD flavors...
2005-06-05 18:13:38 +00:00
Andy Polyakov
b2d91a6913
Unify BSDi target.
2005-06-05 18:10:19 +00:00
Andy Polyakov
ce074604c4
./PROBLEMS to mention workarounds for ULTRIX build problems.
...
PR: 1092
2005-06-05 18:03:37 +00:00
Richard Levitte
19ac190252
The macro THREADS was changed to OPENSSL_THREADS a long time ago.
...
PR: 1096
2005-06-04 08:44:02 +00:00
Richard Levitte
02c5ddf91e
From 0.9.8-stable:
...
handshake_write_seq is an unsigned short, so treat it like one
2005-06-04 04:18:26 +00:00
Dr. Stephen Henson
1aaeaf8a3d
Use correct name for config file env variable.
2005-06-02 23:19:56 +00:00
Dr. Stephen Henson
5d6c4985d1
Typo.
2005-06-02 20:29:32 +00:00
Dr. Stephen Henson
b615ad90c8
Update CHANGES.
2005-06-02 20:11:16 +00:00
Andy Polyakov
c7aaf3918d
Fix inconsistensy between 8 and HEAD.
2005-06-02 18:28:27 +00:00
Andy Polyakov
d51204f1b1
PSS update [from 0.9.7].
2005-06-02 18:25:36 +00:00
Nils Larsch
b3f6325988
check return value
2005-06-01 22:35:01 +00:00
Dr. Stephen Henson
3129acbd83
Update from 0.9.7-stable.
2005-06-01 22:14:04 +00:00
Richard Levitte
12f89d32b5
Synchronise yet a little more with the Unixly build
2005-06-01 16:24:15 +00:00
Nils Larsch
1d42741a19
clear error queue on success and return NULL if no cert could be read
...
PR: 1088
2005-06-01 08:38:44 +00:00
Nils Larsch
88737991d2
fix assertion
2005-05-31 20:39:16 +00:00
Richard Levitte
75c00536ba
Synchronise more with the Unix build.
2005-05-31 20:28:41 +00:00
Nils Larsch
63d740752f
changes from 0.9.8
2005-05-31 18:22:53 +00:00
Nils Larsch
6e04afb8c5
include opensslconf.h if OPENSSL_NO_* is used
2005-05-31 17:36:06 +00:00
Andy Polyakov
165fca51e0
"Show" more respect to no-sha* config options.
...
PR: 1086
2005-05-31 16:36:27 +00:00
Andy Polyakov
db6b4e3791
Mention more GCC bugs in ./PROBLEMS.
2005-05-31 12:39:54 +00:00
Andy Polyakov
20a85e9f69
Missing sparcv8.o rule.
...
PR: 1082
2005-05-31 12:17:35 +00:00
Andy Polyakov
2a6144a1b6
Fix typo in ./config.
2005-05-31 11:34:33 +00:00
Andy Polyakov
f8bc3e1bd8
Platform update from 8-stable.
2005-05-31 11:07:27 +00:00
Andy Polyakov
5b737a0731
Platform update from 8-stable.
2005-05-31 09:39:03 +00:00
Richard Levitte
6e0ef10915
Merge from 0.9.8-stable.
2005-05-30 23:26:04 +00:00
Richard Levitte
7017605dce
Merge in the new news from 0.9.8-stable.
2005-05-30 22:51:28 +00:00
Richard Levitte
b29228836a
DJGPP changes. Contributed by Doug Kaufman <dkaufman@rahul.net>
2005-05-30 22:37:44 +00:00
Richard Levitte
188b05792f
pqueue and dtls uses 64-bit values. Unfortunately, OpenSSL doesn't
...
have a uniform representation for those over all architectures, so a
little bit of hackery is needed.
Contributed by nagendra modadugu <nagendra@cs.stanford.edu >
2005-05-30 22:34:37 +00:00
Richard Levitte
575901e537
Synchronise with Unixly build
2005-05-30 22:26:30 +00:00
Richard Levitte
2333d65880
Change all relevant occurences of 'ncipher' to 'chil'. That's what nCipher always wanted...
2005-05-30 05:17:02 +00:00
Dr. Stephen Henson
ffd1df0579
Update from stable branch.
2005-05-30 00:29:16 +00:00
Geoff Thorpe
a2c32e2d7f
Change the source and output paths for 'chil' and '4758cca' engines so that
...
dynamic loading is consistent with respect to engine ids.
2005-05-29 19:14:21 +00:00
Richard Levitte
80b168a5a9
We have some source with \r\n as line ends. DEC C informs about that,
...
and I really can't be bothered...
2005-05-29 12:13:51 +00:00
Richard Levitte
9426364be9
Typo
2005-05-29 12:11:50 +00:00
Dr. Stephen Henson
429168e7ee
Add pss/x931 files.
2005-05-28 20:44:37 +00:00
Dr. Stephen Henson
499fca2db3
Update from 0.9.7-stable. Also repatch and rebuild error codes.
2005-05-28 20:44:02 +00:00
Bodo Möller
a28a5d9c62
Use BN_with_flags() in a cleaner way.
2005-05-27 15:38:53 +00:00
Dr. Stephen Henson
3f791ca818
Assing check_{cert,crl}_time to 'ok' variable so it returns errors on
...
expiry.
2005-05-27 13:19:25 +00:00
Bodo Möller
0ebfcc8f92
make sure DSA signing exponentiations really are constant-time
2005-05-26 04:40:52 +00:00
Bodo Möller
c61f571ce0
check BN_copy() return value
2005-05-26 04:30:49 +00:00
Geoff Thorpe
60192e96b8
Handle differences between engine IDs and their dynamic library names (and
...
source files, for that matter) by tolerating the alternatives. It would be
preferable to also change the generated shared library names, but that will
be taken up separately.
2005-05-25 02:54:28 +00:00
Richard Levitte
85991994df
It seems like mkdef.pl couldn't quite understand that #ifdef OPENSSL_NO_SHA512
...
was still active when it came down to the functions. mkdef.pl should really
be corrected, but that'll be another day...
2005-05-24 03:39:08 +00:00
Richard Levitte
b325518f45
Typo correction
2005-05-24 03:27:15 +00:00
Richard Levitte
b172dec864
DEC C complains about bad subscript, but we know better, so let's shut it up.
2005-05-24 03:22:53 +00:00
Andy Polyakov
61391e2314
Be more consistent with OPENSSL_NO_SHA256.
2005-05-22 10:27:59 +00:00
Andy Polyakov
4b23506594
OPENSSL_NO_SHA512 to mask even SHA512_CTX declaration. This is done to
...
make no-sha512 more effective on platforms, which don't support 64-bit
integer type of *any* kind.
2005-05-22 08:55:15 +00:00
Andy Polyakov
82d3dda8a1
Still SEGV trouble in .init segment under Solaris x86...
2005-05-21 17:49:10 +00:00
Richard Levitte
fe8bf9560d
When _XOPEN_SOURCE is defined, make sure it's defined to 500. Required in
...
http://www.opengroup.org/onlinepubs/007908799/xsh/compilation.html .
Notified by David Wolfe <dwolfe5272@yahoo.com >
2005-05-21 17:39:43 +00:00
Andy Polyakov
e4c9b85e65
Default to no-sse2 on selected platforms.
2005-05-21 16:50:27 +00:00
Richard Levitte
447aa49007
Patches for Cygwin, provided by Corinna Vinschen <vinschen@redhat.com>
2005-05-21 16:41:34 +00:00
Ben Laurie
fe977f7512
Propagate BUILDENV into subdirectories.
2005-05-21 16:13:36 +00:00
Andy Polyakov
e476f94212
Move _WIN32_WINNT definition from command line to e_os.h. The change is
...
inspired by VC6 failure report. In addition abstain from taking screen
snapshots when running in NT service context.
2005-05-21 13:19:27 +00:00
Nils Larsch
bbbd67108f
fix typo, add prototype
2005-05-20 22:55:10 +00:00
Nils Larsch
7f246621b5
fix potential memory leak
...
Submitted by: Goetz Babin-Ebell
2005-05-19 22:10:40 +00:00
Nils Larsch
b67d988915
update ecdsa doc
2005-05-19 20:54:30 +00:00
Andy Polyakov
851e31ff07
FAQ to mention no-sse2.
2005-05-19 19:54:49 +00:00
Richard Levitte
decc9ffc18
Update status information
2005-05-19 19:43:28 +00:00
Nils Larsch
3f4657d131
fix "dereferencing type-punned pointer will break strict-aliasing rules"
...
warning when using gcc 4.0
2005-05-19 12:01:51 +00:00
Nils Larsch
67ffa18cce
make the type parameter const when ID2_OF_const() is used
2005-05-18 22:30:38 +00:00
Andy Polyakov
788e67e227
FAQ update to mention Applink.
2005-05-18 13:35:54 +00:00
Andy Polyakov
c50226594d
Don't emit SSE2 instructions unless were asked to.
...
PR: 1073
2005-05-18 08:42:08 +00:00
Andy Polyakov
51ff6bde38
Engage Applink in mingw. Note that application-side module is not
...
compiled into *our* aplpications. That's because mingw is always
consistent with itself. Having library-side code linked into .dll
makes it possible to deploy the .dll with user-code compiled with
another compiler [which is pretty much the whole point behind Applink].
2005-05-18 08:16:46 +00:00
Richard Levitte
28e4fe34e4
Version changes where needed.
2005-05-18 04:04:12 +00:00
Richard Levitte
c800a070b5
I just branched 0.9.8, so HEAD needs to be bumped to 0.9.9-dev.
...
The 0.9.8 branch is called OpenSSL_0_9_8-stable.
2005-05-18 03:58:34 +00:00
Andy Polyakov
53d8996764
Engage Applink for VC builds.
2005-05-17 16:50:46 +00:00
Andy Polyakov
32b1843ec6
Keep disclaming 16-bit support.
2005-05-17 13:51:36 +00:00
Nils Larsch
8712009778
simplify EC_KEY_dup
2005-05-17 12:23:16 +00:00
Andy Polyakov
b8994f44e7
mdc2test is not built by default anymore.
2005-05-17 06:57:45 +00:00
Bodo Möller
f468e3824a
fix memory leak (BIO_free_all needs pointer to first BIO)
...
PR: 1070
2005-05-17 05:52:24 +00:00
Andy Polyakov
ea1b02db6a
OPENSSL_Applink update.
2005-05-17 00:08:28 +00:00
Andy Polyakov
2c4b354d32
Disclaim 16-bit support.
2005-05-17 00:07:13 +00:00
Andy Polyakov
25a66ee3cb
Move cryptlib.h prior bio.h. Actually it makes sense to include cryptlib.h
...
first everywhere in crypto and skip stdio.h and string.h [because it
includes them].
2005-05-17 00:01:48 +00:00
Andy Polyakov
0978dec131
Improve shell portability of new rules in Makefile.shared.
2005-05-16 21:05:09 +00:00
Bodo Möller
91b17fbad4
Change wording for BN_mod_exp_mont_consttime() entry
2005-05-16 19:14:34 +00:00
Andy Polyakov
ce92b6eb9c
Further BUILDENV refinement, further fool-proofing of Makefiles and
...
[most importantly] put back dependencies accidentaly eliminated in
check-in #13342 .
2005-05-16 16:55:47 +00:00
Andy Polyakov
7abbffc3fb
Further BUILDENV clean-up, 'make depend' is operational again.
2005-05-16 14:24:45 +00:00
Nils Larsch
9dd8405341
ecc api cleanup; summary:
...
- hide the EC_KEY structure definition in ec_lcl.c + add
some functions to use/access the EC_KEY fields
- change the way how method specific data (ecdsa/ecdh) is
attached to a EC_KEY
- add ECDSA_sign_ex and ECDSA_do_sign_ex functions with
additional parameters for pre-computed values
- rebuild libeay.num from 0.9.7
2005-05-16 10:11:04 +00:00
Bodo Möller
46a643763d
Implement fixed-window exponentiation to mitigate hyper-threading
...
timing attacks.
BN_FLG_EXP_CONSTTIME requests this algorithm, and this done by default for
RSA/DSA/DH private key computations unless
RSA_FLAG_NO_EXP_CONSTTIME/DSA_FLAG_NO_EXP_CONSTTIME/
DH_FLAG_NO_EXP_CONSTTIME is set.
Submitted by: Matthew D Wood
Reviewed by: Bodo Moeller
2005-05-16 01:43:31 +00:00
Bodo Möller
92c4468572
rebuild to synchronize with additions to 0.9.7 branch
2005-05-16 00:29:29 +00:00
Bodo Möller
10cde5010d
make update
2005-05-16 00:27:37 +00:00
Andy Polyakov
c4cd925cc0
Make Makefile.shared quiet again.
2005-05-16 00:01:49 +00:00
Andy Polyakov
f210eb7b89
Simplify shared rules, link run-path into applications only.
2005-05-15 23:59:04 +00:00
Andy Polyakov
734540f887
Consolidate BUILDENV [idea is to keep all variables in one place].
2005-05-15 23:53:34 +00:00
Andy Polyakov
804515425a
+20% performance improvement of P4-specific RC4_CHAR loop.
2005-05-15 22:43:00 +00:00
Andy Polyakov
81a86fcf17
Fool-proofing Makefiles
2005-05-15 22:23:26 +00:00
Dr. Stephen Henson
a534bb09d3
Make update.
2005-05-15 00:56:47 +00:00
Dr. Stephen Henson
b6995add5c
Make -CSP option work again in pkcs12 utility by checking for
...
attribute in EVP_PKEY structure.
2005-05-15 00:54:45 +00:00
Dr. Stephen Henson
8ccd06c66c
openssl_fcast should always be defined, not just with DEBUG_SAFESTACK
2005-05-14 12:58:20 +00:00
Dr. Stephen Henson
fe86616c72
Some C compilers produce warnings or compilation errors if an attempt
...
is made to directly cast a function of one type to what it considers and
incompatible type. In particular gcc 3.4.2.
Add new openssl_fcast macro to place functions into a form where the compiler
will allow them to be cast.
The current version achives this by casting to: void function(void).
2005-05-12 23:01:44 +00:00
Dr. Stephen Henson
ba2ba27008
Avoid warnings.
2005-05-12 22:40:19 +00:00
Dr. Stephen Henson
f795123c4a
Fix from stable branch.
2005-05-12 22:39:42 +00:00
Dr. Stephen Henson
c596c795bf
Typo.
2005-05-12 17:28:53 +00:00
Bodo Möller
3f19bbf4e3
fix msg_callback() arguments for SSL 2.0 compatible client hello
...
(previous revision got this wrong)
2005-05-12 06:24:25 +00:00
Bodo Möller
b874ce4dc2
Move another item into ChangeLog.0_9_7-stable_not-in-head_FIPS
2005-05-11 18:36:47 +00:00
Bodo Möller
c6c2e3135d
Don't use the SSL 2.0 Client Hello format if SSL 2.0 is disabled
...
with the SSL_OP_NO_SSLv2 option.
2005-05-11 18:25:49 +00:00
Ben Laurie
4b26fe30de
There must be an explicit way to build the .o!
2005-05-11 16:39:05 +00:00
Bodo Möller
4a8224b598
Move some entries from ChangeLog.0_9_7-stable_not-in-head
...
to ChangeLog.0_9_7-stable_not-in-head_FIPS.
2005-05-11 03:54:21 +00:00
Bodo Möller
8afca8d9c6
Fix more error codes.
...
(Also improve util/ck_errf.pl script, and occasionally
fix source code formatting.)
2005-05-11 03:45:39 +00:00
Nils Larsch
35e8510e60
use 'p' as conversion specifier for printf to avoid truncation of
...
pointers on 64 bit platforms. Patch supplied by Daniel Gryniewicz
via Mike Frysinger <vapier@gentoo.org >.
PR: 1064
2005-05-10 11:55:28 +00:00
Nils Larsch
8b15c74018
give EC_GROUP_new_by_nid a more meanigful name:
...
EC_GROUP_new_by_nid -> EC_GROUP_new_by_curve_name
2005-05-10 11:37:47 +00:00
Nils Larsch
3afa6cf866
improve command line argument checking
...
PR: 1061
2005-05-10 09:51:29 +00:00
Andy Polyakov
e19e549041
Comply with optimization manual (no data should share cache-line with code).
2005-05-09 21:48:01 +00:00
Andy Polyakov
d7561ac576
Allow for 64-bit cache-line alignments in code segment.
2005-05-09 21:27:40 +00:00
Bodo Möller
fbeaa3c47d
Update util/ck_errf.pl script, and have it run automatically
...
during "make errors" and thus during "make update".
Fix lots of bugs that util/ck_errf.pl can detect automatically.
Various others of these are still left to fix; that's why
"make update" will complain loudly when run now.
2005-05-09 00:27:37 +00:00
Bodo Möller
ee2262b8d7
rebuild (starting with state from 0.9.7-stable branch) to avoid clutter
2005-05-09 00:22:02 +00:00
Bodo Möller
b0ac0a8ef8
improve comment readability
2005-05-09 00:06:54 +00:00
Bodo Möller
0f4499360e
give EC_GROUP_*_nid functions a more meaningful name
...
EC_GROUP_get_nid -> EC_GROUP_get_curve_name
EC_GROUP_set_nid -> EC_GROUP_set_curve_name
2005-05-09 00:05:17 +00:00
Nils Larsch
7dc17a6cf0
give EC_GROUP_*_nid functions a more meaningful name
...
EC_GROUP_get_nid -> EC_GROUP_get_curve_name
EC_GROUP_set_nid -> EC_GROUP_set_curve_name
2005-05-08 22:09:12 +00:00
Andy Polyakov
b6223d2f70
Eliminate "statement with no effect" warning when OPENSSL_assert macro
...
is used with constant assertion.
2005-05-08 19:54:33 +00:00
Richard Levitte
256b5d5877
I was incorrect about VMS/Alpha. Defining BN_LLONG with
...
SIXTY_FOUR_BIT could cause havoc, so don't (it's lucky bn.h undefines
BN_LLONG when SIXTY_FOUR_BIT is defined).
2005-05-07 21:21:17 +00:00
Andy Polyakov
5d0d60e2f5
x86_64 assembler translator update.
2005-05-07 08:13:51 +00:00
Andy Polyakov
57ee007035
Fix constants.
...
PR: 1059
2005-05-07 08:11:50 +00:00
Richard Levitte
82e8cb403a
Since BN_LLONG will only be defined for Alpha/VMS and not VAX/VMS,
...
there's no need to undefine it here. Then, let's get a bit paranoid
and not define BN_ULLONG on THIRTY_TWO_BIT machines when BN_LLONG
isn't defined.
2005-05-06 13:34:35 +00:00
Richard Levitte
abee01c6f8
Actually, C on VMS/Alpha knows very well what a long long is, and
...
knows how to make use of it. So let's stop pretending the Alpha
doesn't know long long...
2005-05-06 13:33:16 +00:00
Nils Larsch
2c288b2a7e
fix compiler warning; pow10 is also in math.h
2005-05-05 20:57:37 +00:00
Richard Levitte
831721ef49
A few more fingerprints...
2005-05-05 06:38:55 +00:00
Andy Polyakov
0ee883650d
Commentary update motivating code update in 0.9.7.
2005-05-04 14:51:38 +00:00
Andy Polyakov
70cf309517
x86_64 assembler translator update.
2005-05-04 08:42:47 +00:00
Andy Polyakov
8b5bf52ac2
Cvs missed adapted module itself, here it goes...
2005-05-03 23:03:31 +00:00
Andy Polyakov
73a9485081
Engage md5-x86_64 assembler module.
2005-05-03 22:59:17 +00:00
Andy Polyakov
d37a65bc81
Throw in md5-x86_64 assembler.
2005-05-03 22:56:15 +00:00
Andy Polyakov
34c7ff6dc9
Cygwin doesn't expose Win32 [not "officially"].
2005-05-03 21:20:17 +00:00
Andy Polyakov
647907918d
Commentary update.
2005-05-03 21:16:42 +00:00
Andy Polyakov
cee73df3bd
Cpuid modules updates.
2005-05-03 21:05:06 +00:00
Nils Larsch
07481951f9
remove false positive
2005-05-03 20:58:24 +00:00
Nils Larsch
f15c448a72
remove BN_ncopy, it was only used in bn_nist.c and wasn't particular
...
useful anyway
2005-05-03 20:27:00 +00:00
Nils Larsch
fcb41c0ee8
rewrite of bn_nist.c, disable support for some curves on 64 bit platforms
...
for now (it was broken anyway)
2005-05-03 20:23:33 +00:00
Nils Larsch
9b62318311
fix typo
...
PR: 1054
2005-05-03 18:34:01 +00:00
Andy Polyakov
5f1841cdca
Rename amd64 modules to x86_64 and update RC4 implementation.
2005-05-03 15:42:05 +00:00
Andy Polyakov
4b45051902
x86_64 assembler translator update.
2005-05-03 15:35:14 +00:00
Nils Larsch
9e5790ce21
backport fix from the stable branch
2005-05-03 10:00:16 +00:00
Ben Laurie
fce8c6cc53
Redundant changes.
2005-05-01 13:55:41 +00:00
Ben Laurie
0ff469d38d
Add prototype.
2005-05-01 13:49:56 +00:00
Dr. Stephen Henson
05338b58ce
Support for smime-type MIME parameter.
2005-05-01 12:46:57 +00:00
Andy Polyakov
081057c3ff
Remove false positives and resolve some of remaining ones.
2005-04-30 23:48:17 +00:00
Andy Polyakov
94c1672ef0
Cygwin/mingw sync with stable.
2005-04-30 23:45:53 +00:00
Andy Polyakov
405d9761a5
Allow for ./config no-sha0 [from stable].
2005-04-30 21:51:41 +00:00
Andy Polyakov
4c3a2d64e4
Fold rules in test/Makefiles [from stable].
2005-04-30 21:39:39 +00:00
Dr. Stephen Henson
98a2fd32a0
Typo.
2005-04-30 18:07:30 +00:00
Dr. Stephen Henson
7bdeeb64ac
Don't attempt to parse nested ASN1 strings by default.
2005-04-30 18:02:54 +00:00
Richard Levitte
43b45a42fd
Some true positives fixed, toss some false positives.
2005-04-30 15:25:04 +00:00
Richard Levitte
9af1bfb3d5
From branch OpenSSL_0_9_7-stable, 2004-09-11 11:45:
...
Makefile.ssl changed name to Makefile...
2005-04-30 15:23:14 +00:00
Richard Levitte
aed14edd12
From branch OpenSSL_0_9_7-stable, 2004-08-11 22:34:
...
Another missing module in the VMS build files.I believe this is
the last, though...
2005-04-30 15:21:40 +00:00
Richard Levitte
14a948e6ad
All kinds of changes from branch OpenSSL_0_9_7-stable
2005-04-30 15:17:05 +00:00
Richard Levitte
af2fcf3a65
This one deserves a note. In the change to CHANGES, there's the
...
following:
+ NOTE: This is for the 0.9.7 series ONLY. This hack will never
+ appear in 0.9.8 or later. We EXPECT application authors to have
+ dealt properly with this when 0.9.8 is released (unless we actually
+ make such changes in the libcrypto locking code that changes will
+ have to be made anyway).
That makes this one a false positive.
2005-04-30 14:41:51 +00:00
Richard Levitte
4a676ac4f8
Remove a bunch of false positives, and fix some true positives.
2005-04-30 14:40:19 +00:00
Richard Levitte
37e27219f2
From branch OpenSSL_0_9_7-stable, 2002-11-13 15:30:
...
The loading functions should be static if we build a dynamic
engine.
2005-04-30 14:34:28 +00:00
Richard Levitte
d2284ab5d1
Remove a bunch of false positives, fix one true positive.
2005-04-30 13:50:57 +00:00
Richard Levitte
78e91e7574
From branch OpenSSL_0_9_7-stable, revision 1.1.4.1, 2002-05-23 17:25:
...
Forgot this file.
2005-04-30 13:42:02 +00:00
Dr. Stephen Henson
e1cc0671ac
Use more efficient way to locate end of an ASN1 structure.
2005-04-30 13:06:45 +00:00
Nils Larsch
c1a8a5de13
don't let BN_CTX_free(NULL) segfault
2005-04-29 21:20:31 +00:00
Nils Larsch
e3d0e0a792
remove false positive
2005-04-29 20:41:38 +00:00
Nils Larsch
7c7667b86b
check return value of RAND_pseudo_bytes; backport from the stable branch
2005-04-29 20:10:06 +00:00
Nils Larsch
38be5db93b
remove some false positive
2005-04-29 19:24:50 +00:00
Nils Larsch
6a50d0a422
hide the definition of ECDSA_METHOD and ECDSA_DATA (and mutatis mutandis
...
for ecdh)
2005-04-29 15:56:06 +00:00
Nils Larsch
7ab2d30349
add 192 bit prime curve to the command line options
2005-04-29 15:21:09 +00:00
Nils Larsch
d753c3f582
add reference to BN_BLINDING_new.pod
2005-04-29 15:07:34 +00:00
Nils Larsch
1897c89302
avoid warnings when building on systems where sizeof(void *) > sizeof(int)
2005-04-29 14:26:59 +00:00
Andy Polyakov
3cc54008eb
Pointer to BN_MONT_CTX could be used uninitialized.
2005-04-28 08:49:01 +00:00
Richard Levitte
ff8bcccdd4
Synchronise with Unix build system.
2005-04-28 04:55:28 +00:00
Dr. Stephen Henson
a93b01be57
Increase offset for BIO_f_enc() to avoid problems with overlapping buffers
...
when decrypting data.
2005-04-28 00:21:29 +00:00
Dr. Stephen Henson
04b304d346
Update default dependency flags.
2005-04-27 16:32:30 +00:00
Dr. Stephen Henson
6c61726b2a
Lots of Win32 fixes for DTLS.
...
1. "unsigned long long" isn't portable changed: to BN_ULLONG.
2. The LL prefix isn't allowed in VC++ but it isn't needed where it is used.
2. Avoid lots of compiler warnings about signed/unsigned mismatches.
3. Include new library directory pqueue in mk1mf build system.
4. Update symbols.
2005-04-27 16:27:14 +00:00
Nils Larsch
cd202fe2f9
get rid of Makefile.ssl in util/
2005-04-27 08:56:15 +00:00
Nils Larsch
69af4faec1
no Makefile.ssl anymore
2005-04-27 08:48:55 +00:00
Nils Larsch
df9e0bf507
add missing parentheses
2005-04-27 07:57:50 +00:00
Dr. Stephen Henson
879b19801a
Change method_mont_p from (char *) to (BN_MONT_CTX *) and remove several
...
casts.
2005-04-27 00:04:59 +00:00
Dr. Stephen Henson
6ec8e63af6
Port BN_MONT_CTX_set_locked() from stable branch.
...
The function rsa_eay_mont_helper() has been removed because it is no longer
needed after this change.
2005-04-26 23:58:54 +00:00
Dr. Stephen Henson
465b9f6b26
Stop unused variable warning.
2005-04-26 23:45:49 +00:00
Dr. Stephen Henson
0c9c87a76e
Remove more false positives.
2005-04-26 23:33:47 +00:00
Bodo Möller
a7a90b2f00
there's no such thing as Makefile.ssl anymore
2005-04-26 23:22:49 +00:00
Bodo Möller
4d6e7733fa
util/mk1mf.pl issues have been resolved
2005-04-26 23:22:25 +00:00
Dr. Stephen Henson
2deadf1672
Port from stable branch.
2005-04-26 23:21:49 +00:00
Dr. Stephen Henson
9ea862e0b3
More false positives and cases covered by port of prime.c
2005-04-26 23:19:21 +00:00
Bodo Möller
11c9b7cfeb
"PS" to Steve's commit (Port prime utility across from stable branch).
2005-04-26 23:11:05 +00:00
Dr. Stephen Henson
b08868c48a
Port prime utility across from stable branch.
2005-04-26 23:02:52 +00:00
Nils Larsch
9ca46ff609
add docu for BN_BLINDING functions
2005-04-26 22:33:36 +00:00
Nils Larsch
800e400de5
some updates for the blinding code; summary:
...
- possibility of re-creation of the blinding parameters after a
fixed number of uses (suggested by Bodo)
- calculatition of the rsa::e in case it's absent and p and q
are present (see bug report #785 )
- improve the performance when if one rsa structure is shared by
more than a thread (see bug report #555 )
- fix the problem described in bug report #827
- hide the definition ot the BN_BLINDING structure in bn_blind.c
2005-04-26 22:31:48 +00:00
Dr. Stephen Henson
05886a6f77
Remove more false positives.
2005-04-26 22:25:10 +00:00
Dr. Stephen Henson
667aef4c6a
Port from stable branch.
2005-04-26 22:07:17 +00:00
Dr. Stephen Henson
49e179cc52
Remove more false positives.
2005-04-26 22:05:19 +00:00
Bodo Möller
aa4ce7315f
Fix various incorrect error function codes.
...
("perl util/ck_errf.pl */*.c */*/*.c" still reports many more.)
2005-04-26 18:53:22 +00:00
Bodo Möller
c741b83762
take OPENSSL_NO_DGRAM into account
...
(via make update)
2005-04-26 18:48:02 +00:00
Bodo Möller
64387788a9
let mkdef.pl know about OPENSSL_NO_DGRAM
...
(which appears in the new file crypto/bio/bss_dgram.c)
2005-04-26 18:21:25 +00:00
Bodo Möller
480506bd49
remove some functions from exported headers
2005-04-26 18:18:35 +00:00
Bodo Möller
0d5ea7613e
make update
2005-04-26 18:09:21 +00:00
Bodo Möller
beb056b303
fix SSLerr stuff for DTLS1 code;
...
move some functions from exported header <openssl/dtl1.h> into "ssl_locl.h";
fix silly indentation (a TAB is *not* always 4 spaces)
2005-04-26 18:08:00 +00:00
Dr. Stephen Henson
4e321ffaff
Fixes for signed/unsigned warnings and shadows.
2005-04-26 17:43:53 +00:00
Dr. Stephen Henson
6ededa42db
False positive removed.
2005-04-26 17:37:21 +00:00
Ben Laurie
36d16f8ee0
Add DTLS support.
2005-04-26 16:02:40 +00:00
Ben Laurie
ab781a0cb6
make depend.
2005-04-26 13:56:36 +00:00
Nils Larsch
19c2987eb6
remove false positive
2005-04-26 08:17:58 +00:00
Bodo Möller
b09af97686
some more false positives to remove
2005-04-25 23:19:07 +00:00
Bodo Möller
a7b1c7732f
make update
2005-04-25 23:17:30 +00:00
Bodo Möller
abc64463af
move some more entries into FIPS file
2005-04-25 23:16:58 +00:00
Bodo Möller
2e7245f5a3
Use OPENSSL_NO_CAST, not OPENSSL_NO_CAST5 in e_old.c
...
PR: 959
2005-04-25 23:09:00 +00:00
Bodo Möller
f76b062e16
Remove some more entries that are false positives, or have been
...
resolved by recent commits.
2005-04-25 23:06:15 +00:00
Bodo Möller
cc1717eaa4
Sort out changes in FIPS and other changes, collected in separate files.
...
(Also remove another "make update".)
2005-04-25 22:55:24 +00:00
Bodo Möller
c5156d952e
remove some more false positives
2005-04-25 22:08:13 +00:00
Bodo Möller
0b2d0d7d13
remove some more false positives
2005-04-25 22:02:34 +00:00
Bodo Möller
b732a8cf5f
remove some more changes that came from HEAD
2005-04-25 21:54:14 +00:00
Bodo Möller
a7dc451ebe
fix editing error, and remove a false positive
2005-04-25 21:53:08 +00:00
Bodo Möller
87357fc0b8
update
2005-04-25 21:42:14 +00:00
Bodo Möller
a2c96d888d
remove extra whitespace; fix link
2005-04-25 21:36:56 +00:00
Bodo Möller
9a6c6b99bf
remove some false positives
2005-04-25 21:32:52 +00:00
Bodo Möller
033c79dff1
add recent changes; now this file is up-to-date
2005-04-25 21:25:48 +00:00
Bodo Möller
b362536275
bring up-to-date
2005-04-25 21:22:08 +00:00
Bodo Möller
aa16a28631
first step to melt down ChangeLog.0_9_7-stable_not-in-head :-)
2005-04-25 21:06:05 +00:00
Bodo Möller
2757c67da2
This is a collection of those CVS change log entries for the 0.9.7
...
branch (OpenSSL_0_9_7-stable) that do not appear similarly in
0.9.8-dev (CVS head).
Some obvious false positives have been eliminated: e.g., we do not
care about a simple "make update"; and we don't care about changes
identified to the 0.9.7 branch that were explicitly identified as
backports from head.
Eliminating all other entries (and finally this file), either as false
positives or as things that should go into 0.9.8, remains to be done.
2005-04-25 21:01:31 +00:00
Andy Polyakov
3d5fd31280
Avoid L1 cache aliasing even between key and S-boxes.
2005-04-24 21:09:20 +00:00
Ben Laurie
c7199e62f1
Flag changes in Configure and config, too.
...
Update dependencies.
2005-04-24 12:02:49 +00:00
Nils Larsch
0b3fc6e63b
update
2005-04-24 09:17:48 +00:00
Dr. Stephen Henson
c2db9cfb52
Oops...
2005-04-24 02:24:53 +00:00
Dr. Stephen Henson
6bc8e6b898
Recognize zlib and krb5 options in mk1mf.pl
2005-04-24 02:21:02 +00:00
Nils Larsch
9edf4e8157
make asn.1 field names const
2005-04-23 13:45:49 +00:00
Nils Larsch
965a1cb92e
change prototype of the ecdh KDF: make input parameter const and the outlen argument more flexible
2005-04-23 10:11:16 +00:00
Ben Laurie
e9ad6665a5
Add debug target, remove cast, note possible bug.
2005-04-23 06:05:24 +00:00
Ben Laurie
b5855b2f32
Add prototypes.
2005-04-22 23:57:46 +00:00
Nils Larsch
a0bee97e55
more const
2005-04-22 21:57:36 +00:00
Nils Larsch
e7076c5a80
make update
2005-04-22 20:17:17 +00:00
Nils Larsch
ff22e913a3
- use BN_set_negative and BN_is_negative instead of BN_set_sign
...
and BN_get_sign
- implement BN_set_negative as a function
- always use "#define BN_is_zero(a) ((a)->top == 0)"
2005-04-22 20:02:44 +00:00
Andy Polyakov
04d0d0accf
Avoid aliasing between stack frames and S-boxes. Compress prefetch code.
2005-04-22 11:49:32 +00:00
Nils Larsch
00df894701
the pointer to the message digest is const
2005-04-21 09:43:09 +00:00
Richard Levitte
630e4a6e59
Provide a default OPENSSL_ia32cap_loc for non-Intel platforms where
...
util/libeay.num is important when building shared libraries, like
VMS.
2005-04-21 09:10:19 +00:00
Dr. Stephen Henson
bf2336f478
Don't use standard kerberos library locations in MK1MF builds.
...
Fix typo in mk1mf.pl
2005-04-21 00:46:28 +00:00
Dr. Stephen Henson
384dba6edb
Make kerberos ciphersuite code compile again.
...
Avoid more shadow warnings.
2005-04-20 21:48:48 +00:00
Dr. Stephen Henson
2c45bf2bc9
Rename typed version of M_ASN1_get M_ASN1_get_x to avoid conflicts.
...
Remove more bogus shadow warnings.
2005-04-20 21:48:06 +00:00
Dr. Stephen Henson
836ec0c764
Stop compiler warnings about deprecated lvalue casts.
2005-04-20 21:39:13 +00:00
Dr. Stephen Henson
5e72fb063a
Stop bogus shadowing warning.
2005-04-20 21:34:29 +00:00
Dr. Stephen Henson
2dc08d5f5d
Process MINFO file earlier in mk1mf.pl so it can modify variables like CFLAGS.
...
Process kerberos include and library options.
2005-04-20 16:22:58 +00:00
Dr. Stephen Henson
00b8abee61
Handle similar mk1mf.pl options with a hash table.
2005-04-20 16:01:50 +00:00
Richard Levitte
7efebab9fd
signed vs. unsigned.
2005-04-20 13:21:10 +00:00
Richard Levitte
a74286d636
Make sure id2_func is properly cast as well...
2005-04-20 13:17:42 +00:00
Richard Levitte
254cfe878e
signed vs. unsigned.
2005-04-20 13:12:33 +00:00
Richard Levitte
ed824195a1
Avoid compiler complaint about mismatched function signatures
...
(void * != char *)
2005-04-20 13:09:46 +00:00
Richard Levitte
22c3600e4c
Resolve signed vs. unsigned.
2005-04-20 12:55:15 +00:00
Richard Levitte
49f386578e
Type mismatch detected by DEC C compiler. void* != void**
2005-04-20 12:53:50 +00:00
Richard Levitte
7c671508bd
Avoid compiler complaint about mismatched function signatures
...
(void * != RSA *)
2005-04-20 10:02:16 +00:00
Dr. Stephen Henson
d3fdc27aa8
Fix logic in mkdef.pl function is_valid.
...
Update symbols
2005-04-19 23:54:44 +00:00
Dr. Stephen Henson
40e950aed6
Stop perl warning.
2005-04-19 18:57:17 +00:00
Dr. Stephen Henson
987bebaf8c
New "algorithm define" OPENSSL_NO_GMP. Update mkdef.pl and Configure script
...
to use it.
2005-04-19 13:24:44 +00:00
Dr. Stephen Henson
65f0efe198
Ignore TYPEDEF_OF in mkdef.pl
2005-04-19 11:49:25 +00:00
Dr. Stephen Henson
e77d8f2ecd
Update year.
2005-04-19 00:15:18 +00:00
Dr. Stephen Henson
f68854b4c3
Various Win32 and other fixes for warnings and compilation errors.
...
Fix Win32 build system to use 'Makefile' instead of 'Makefile.ssl'.
2005-04-19 00:12:36 +00:00
Andy Polyakov
1cfd258ed6
Throw in x86_64 AT&T to MASM assembler converter to facilitate development
...
of dual-ABI Unix/Win64 modules.
2005-04-17 21:05:57 +00:00
Dr. Stephen Henson
04d7d51ea2
Fix from stable branch.
2005-04-17 13:59:36 +00:00
Richard Levitte
2906dc8601
Synchronise with ec/Makefile.
2005-04-17 09:07:37 +00:00
Andy Polyakov
c8d5c71af5
Mitigate cache-timing attack in CBC mode. This is done by implementing
...
compressed tables (2x compression factor) and by pre-fetching them into
processor cache prior every CBC en-/decryption pass. One can argue why
just CBC? Well, it's commonly used mode in real-life applications and
API allows us to amortize the prefetch costs for larger data chunks...
2005-04-16 15:23:21 +00:00
Nils Larsch
ff990440ee
const fixes
2005-04-15 18:29:33 +00:00
Nils Larsch
0e304b7f41
EVP_CIPHER_CTX_init is a void function + fix typo
...
PR: 1044 + 1045
2005-04-15 16:01:35 +00:00
Dr. Stephen Henson
fbe6ba81e9
Check return values of <Digest>_Init functions in low level digest calls.
2005-04-14 22:58:44 +00:00
Andy Polyakov
2b85e23d2e
Prototype mnemonics in padlock_verify_context for better portability
...
[read support for Solaris assembler].
2005-04-14 07:47:10 +00:00
Andy Polyakov
026bb0b96a
Fix for bug emerged in openvpn conext.
2005-04-14 07:41:29 +00:00
Andy Polyakov
6424498226
Final touch to mingw shared.
2005-04-13 23:54:28 +00:00
Andy Polyakov
3ed449e94a
More cover-ups, removing OPENSSL_GLOBAL/EXTERNS. We can remove more...
2005-04-13 21:46:30 +00:00
Andy Polyakov
4f1c33b430
Addenum to http://cvs.openssl.org/chngview?cn=13054 .
2005-04-13 21:10:07 +00:00
Andy Polyakov
1334462ab3
Final(?) touches to mingw shared support.
2005-04-13 21:08:39 +00:00
Andy Polyakov
e62991a07c
Zap OPENSSL_EXTERN on symbols, which are not meant to be local to DLL.
2005-04-13 20:51:42 +00:00
Nils Larsch
52272327f3
Makefile.ssl -> Makefile
2005-04-13 19:09:43 +00:00
Andy Polyakov
1bf955920a
Fix typos.
2005-04-13 15:41:11 +00:00
Andy Polyakov
51d28013db
Introduce OPENSSL_NONPIC_relocated to denote relocated DLLs.
2005-04-13 08:46:35 +00:00
Andy Polyakov
8861ba355d
Parameterize do_solaris rules in Makefile.shared.
2005-04-13 07:22:41 +00:00
Andy Polyakov
9e88c82703
Minor cryptlib.c update: compiler warnings in OPENSSL_showfatal and
...
OPENSSL_stderr stub.
2005-04-13 06:55:42 +00:00
Dr. Stephen Henson
9d2f51c086
Update FAQ.
2005-04-12 16:38:00 +00:00
Dr. Stephen Henson
ad0db060b1
More overwritten stuff...
2005-04-12 16:36:36 +00:00
Dr. Stephen Henson
3547478fc8
Replace overwritten lines before error codes.
2005-04-12 16:17:53 +00:00
Dr. Stephen Henson
29dc350813
Rebuild error codes.
2005-04-12 16:15:22 +00:00
Dr. Stephen Henson
bc3cae7e7d
Include error library value in C error source files instead of fixing up
...
at runtime.
2005-04-12 13:31:14 +00:00
Nils Larsch
37942fab51
include limits.h for UINT_MAX etc.
2005-04-11 20:59:58 +00:00
Richard Levitte
36521f0150
Add a NEWS item for 0.9.7g.
2005-04-11 15:05:45 +00:00
Richard Levitte
4bb61becbb
Add emacs cache files to .cvsignore.
2005-04-11 14:17:07 +00:00
Dr. Stephen Henson
b392e52050
Move allow_proxy_certs declaration to start of function.
2005-04-10 23:41:09 +00:00
Dr. Stephen Henson
0858b71b41
Make kerberos ciphersuite code work with newer header files
2005-04-09 23:55:55 +00:00
Richard Levitte
d9bfe4f97c
Added restrictions on the use of proxy certificates, as they may pose
...
a security threat on unexpecting applications. Document and test.
2005-04-09 16:07:12 +00:00
Nils Larsch
dc0ed30cfe
add support for DER encoded private keys to SSL_CTX_use_PrivateKey_file()
...
and SSL_use_PrivateKey_file()
PR: 1035
Submitted by: Walter Goulet
Reviewed by: Nils Larsch
2005-04-08 22:52:42 +00:00
Nils Larsch
e248596bac
improve docu of SSL_CTX_use_PrivateKey()
2005-04-08 22:49:57 +00:00
Nils Larsch
6049399baf
get rid of very buggy and very imcomplete DH cert support
...
Reviewed by: Bodo Moeller
2005-04-07 23:19:17 +00:00
Nils Larsch
f763e0b5ae
make sure error queue is totally emptied
...
PR: 359
2005-04-07 22:53:35 +00:00
Nils Larsch
eb3eab20a8
const fixes
2005-04-07 22:48:33 +00:00
Andy Polyakov
4848cbf1cf
Recognize MSYS/MINGW environment.
2005-04-07 20:24:29 +00:00
Andy Polyakov
9f2027e56d
Implement OPENSSL_showfatal and make it Win32 GUI and service aware
...
[meaning that it will detect in which context application is running
and either write message to stderr, post a dialog or log an event].
2005-04-07 18:39:45 +00:00
Andy Polyakov
e1d51de41f
Harmonize cygwin/mingw and VC targets.
2005-04-07 15:51:55 +00:00
Andy Polyakov
81ee80ab88
+45% RC4 performance boost on Intel EM64T core. Unrolled loop providing
...
further +35% will follow...
Submitted by: Zou Nanhai
2005-04-06 09:45:42 +00:00
Nils Larsch
7d727231b7
some const fixes
2005-04-05 19:11:19 +00:00
Nils Larsch
69740c2b3f
update progs.pl to reflect changes in progs.h
2005-04-05 18:17:13 +00:00
Nils Larsch
119d1a1dd4
fix example in docu
...
PR: 800
2005-04-05 11:17:03 +00:00
Nils Larsch
70f34a5841
some const fixes and cleanup
2005-04-05 10:29:43 +00:00
Nils Larsch
c2e40d0f9a
remove unused recp method
2005-04-04 18:15:59 +00:00
Andy Polyakov
0abfd60604
Extend Solaris x86 support to amd64.
2005-04-04 17:10:53 +00:00
Andy Polyakov
e5dbccc182
Solaris x86 linker erroneously pads .init segment with zeros instead of
...
nops, which causes SEGV at startup. So I don't align anymore.
2005-04-04 17:07:16 +00:00
Andy Polyakov
f8fa22d826
Some non-GNU compilers (such as Sun C) define __i386.
2005-04-04 17:05:06 +00:00
Bodo Möller
c393222280
HISTORY section: point out change of default digest
2005-04-03 23:53:48 +00:00
Andy Polyakov
60fd574cdf
Make bn/asm/x86_64-gcc.c gcc4 savvy. +r is likely to be initially
...
introduced for a reason [like bug in initial gcc port], but proposed
=&r is treated correctly by senior 3.2, so we can assume it's safe now.
PR: 1031
2005-04-03 18:53:29 +00:00
Ben Laurie
73705abc34
If input is bad, we still need to clear the buffer.
2005-04-03 16:38:22 +00:00
Nils Larsch
12bdb64375
use SHA-1 as the default digest for the apps/openssl commands
2005-04-02 09:29:15 +00:00
Dr. Stephen Henson
7bdf8eed69
Typo
2005-04-01 21:56:15 +00:00
Nils Larsch
48c832b6b7
really clear the error queue here
...
PR: 860
2005-04-01 17:50:09 +00:00
Nils Larsch
f3e427f6f9
use SSL3_VERSION_MAJOR instead of SSL3_VERSION etc.
...
PR: 658
2005-04-01 17:35:32 +00:00
Ben Laurie
8bb826ee53
Consistency.
2005-03-31 13:57:54 +00:00
Richard Levitte
5d1430f390
Add a file with fingerprints that have recently been used to sign
...
OpenSSL distributions, or are about to. This has been requested a
little now and then by users, for years :-/...
2005-03-31 11:51:47 +00:00
Ben Laurie
45d10efc35
Simplicate and add lightness.
2005-03-31 10:55:55 +00:00
Ben Laurie
db3cb0e97a
Get rid of irritating noise.
2005-03-31 10:34:59 +00:00
Ben Laurie
41a15c4f0f
Give everything prototypes (well, everything that's actually used).
2005-03-31 09:26:39 +00:00
Nils Larsch
fea4280a8b
fix header
2005-03-30 21:38:29 +00:00
Nils Larsch
e852b8533f
Makefile.ssl doesn't exist anymore
2005-03-30 21:37:05 +00:00
Ben Laurie
20a3439ea9
Take account of Makefile.ssl removal.
2005-03-30 14:44:50 +00:00
Ben Laurie
a273a2824c
Make tags target useful.
2005-03-30 14:19:21 +00:00
Ben Laurie
24c97c819d
Don't debug.
2005-03-30 14:15:14 +00:00
Ben Laurie
42ba5d2329
Blow away Makefile.ssl.
2005-03-30 13:05:57 +00:00
Nils Larsch
c3e6402857
update docs (recent constification)
2005-03-30 11:50:14 +00:00
Ben Laurie
0821bcd4de
Constification.
2005-03-30 10:26:02 +00:00
Nils Larsch
4a6a2032ed
the second argument of EVP_SealInit is const
2005-03-29 17:50:08 +00:00
Nils Larsch
c01d2b974e
when building with OPENSSL_NO_DEPRECATED defined BN_zero is a macro
...
which cannot be evaluated in an if statement
2005-03-28 15:06:29 +00:00
Bodo Möller
b0ef321cc8
Harmonize with CHANGES as distributed in OpenSSL 0.9.7f.
2005-03-24 01:37:07 +00:00
Ulf Möller
7a8c728860
undo Cygwin change
2005-03-24 00:14:59 +00:00
Richard Levitte
6141b86a49
Change the memory leak FAQ entry to describe the levels of thread safety in each function
2005-03-23 21:14:59 +00:00
Dr. Stephen Henson
23fadaa084
Update FAQ
2005-03-22 20:10:38 +00:00
Dr. Stephen Henson
e27a259696
Doc fixes.
2005-03-22 17:55:33 +00:00
Nils Larsch
41e455bfc4
test, remove unnecessary const cast
2005-03-22 17:55:18 +00:00
Dr. Stephen Henson
59b6836ab2
Ensure (SSL_RANDOM_BYTES - 4) of pseudo random data is used for server and
...
client random values.
2005-03-22 14:11:06 +00:00
Richard Levitte
9fc9b55237
There are cases when there are no files left to verify. Make sure to
...
handle that properly.
2005-03-21 13:52:12 +00:00
Nils Larsch
689c6f2542
add new curves to the loop (with some cleanup from me)
...
Submitted by: Jean-Luc Duval
Reviewed by: Nils Larsch
2005-03-20 23:12:13 +00:00
Nils Larsch
f4bfd357e5
some const fixes
2005-03-20 22:56:07 +00:00
Ulf Möller
130db968b8
Use Windows randomness code on Cygwin
2005-03-19 11:39:17 +00:00
Ulf Möller
8d274837e5
fix breakage for Perl versions that do boolean operations on long words
2005-03-19 11:13:30 +00:00
Ulf Möller
5855038049
typo
2005-03-19 10:19:45 +00:00
Richard Levitte
d18685d959
Added HOWTO about proxy certificates.
2005-03-14 15:39:25 +00:00
Bodo Möller
9f6715d4bb
"make depend". This takes into account the algorithms that are now
...
disabled by default (MDC2 and RC5), which until now were skipped
by "make links" and yet supposedly required by some of the Makefiles,
meaning that the recent snapshots failed to compile.
Problem reported by Nils Larsch.
2005-03-13 19:49:47 +00:00
Bodo Möller
ab185b6038
It seems that Configure revision 1.404 broke "make depend" by hiding
...
from it which algorithms were disabled. With these new changes,
"make depend" will properly take into account algorithms that are skipped.
2005-03-13 19:46:58 +00:00
Andy Polyakov
1642000707
Cygwin to use DSO_FLFCN and mingw to use DSO_WIN32.
2005-03-12 11:28:41 +00:00
Andy Polyakov
f7f2125522
Avoid re-build avalanches with HP-UX make.
2005-03-12 09:12:44 +00:00
Bodo Möller
2b61034b0b
fix potential memory leak when allocation fails
...
PR: 801
Submitted by: Nils Larsch
2005-03-11 09:01:24 +00:00
Bodo Möller
80c808b90b
Fix typo
...
PR: 1017
Submitted by: ciresh@yahoo.com
Reviewed by: Nils Larsch
2005-03-09 19:08:02 +00:00
Bodo Möller
af1048c25c
Take MDC2 patent into account.
2005-03-02 20:22:58 +00:00
Bodo Möller
ecc5ef8793
In addition to RC5, also exclude MDC2 from compilation unless
...
the algorithm is explicitly requested.
2005-03-02 20:11:31 +00:00
Bodo Möller
c9a112f540
Change ./Configure so that certain algorithms can be disabled by default.
...
This is now the case for RC5.
As a side effect, the OPTIONS in the Makefile will usually look a
little different now, but they are essentially only for information
anyway.
2005-02-22 10:29:51 +00:00
Lutz Jänicke
5286db697f
Fix typo on blowfish manual page
...
PR: 1010
Submitted by: Marc Balmer <mbalmer@openbsd.org >
2005-02-19 10:26:18 +00:00
Lutz Jänicke
f69a8aebab
Fix hang in EGD/PRNGD query when communication socket is closed
...
prematurely by EGD/PRNGD.
PR: 1014
Submitted by: Darren Tucker <dtucker@zip.com.au >
2005-02-19 10:19:07 +00:00
Dr. Stephen Henson
9d10b15ef9
Fix possible memory leak.
2005-02-14 21:53:24 +00:00
Andy Polyakov
da30c74a27
Remove unused assembler modules.
2005-02-06 13:43:02 +00:00
Andy Polyakov
67ea999d4a
This patch was "ignited" by OpenBSD 3>=4 support. They've switched to ELF
...
and GNU binutils, but kept BSD make... And I took the opportunity to
unify other targets to this common least denominator...
2005-02-06 13:23:34 +00:00
Andy Polyakov
e1892f2370
Reliable BSD-x86-elf detection in ./config.
2005-02-06 13:20:23 +00:00
Andy Polyakov
fe28866d71
Make Makefile.shared BSD make-friendly, remove more redundant -lc, set up
...
OBJECT_MODE for AIX.
2005-02-06 13:18:40 +00:00
Andy Polyakov
de4ab1e629
Make util/shlib_wrap.sh [Open]BSD-friendly.
2005-02-06 13:15:21 +00:00
Andy Polyakov
216ddfaf6b
Mention no-sse2 option in INSTALL note.
2005-02-06 13:10:23 +00:00
Dr. Stephen Henson
8aa36bcac9
In mkdef.pl ignore trailing whitespace in #ifdef lines
2005-02-05 17:22:14 +00:00
Andy Polyakov
485e30dbe1
Drop redundant -lc from a number of rules in Makefile.shared. It's
...
perfectly safe [compiler driver adds it] and in some situation even
perfectly appropriate [mixing -pthread and -lc on FreeBSD can have
lethal effect on apps/openssl]. I'd say we should get rid of more,
but I remove those I can test myself...
2005-02-03 22:40:40 +00:00
Andy Polyakov
877dbcb8a0
Shut whiny make's up.
2005-02-03 10:19:59 +00:00
Andy Polyakov
62d27939c2
Address run-time linker problems: LD_PRELOAD issue on multi-ABI platforms
...
and SafeDllSearchMode in Windows.
Submitted by: Richard Levitte
2005-02-01 23:48:37 +00:00
Richard Levitte
8c3c570134
The first argument to load_iv should really be a char ** instead of an
...
unsigned char **, since it points at text.
Thanks to Nils Larsch <nils.larsch@cybertrust.com > for pointing out
the inelegance of our code :-)
2005-01-27 11:42:28 +00:00
Richard Levitte
97a1630e81
Oops, == should really be = when used with test ([ and ]).
...
I guess I use bash too much...
Thanks to Peter Sylvester <Peter.Sylvester@edelweb.fr > for pointing it
out to me.
2005-01-27 10:59:36 +00:00
Richard Levitte
bf746f0f46
Check for errors from EVP_VerifyInit_ex(), or EVP_VerifyUpdate might
...
cause a segfault... This was uncovered because EVP_VerifyInit() may fail
in FIPS mode if the wrong algorithm is chosen...
2005-01-27 01:49:25 +00:00
Richard Levitte
a229e3038e
Get rid if the annoying warning
2005-01-27 01:47:31 +00:00
Richard Levitte
4aca9297dc
The mix of CFLAGS and LDFLAGS is a bit confusing in my opinion, and
...
Makefile.shared was a bit overcomplicated.
Make the shell variables LDFLAGS and SHAREDFLAGS in Makefile.shared
get the values of $(CFLAGS) or $(LDFLAGS) as appropriate depending on
the value the shell variables LDCMD and SHAREDCMD get. That leaves
much less chance of confusion, since those pairs of shell variables
always are defined together.
2005-01-26 23:51:20 +00:00
Andy Polyakov
b2c5960935
Respect the fact that most interactive shells don't restore stty settings
...
and make it work in non-interactive mode...
2005-01-26 19:58:15 +00:00
Andy Polyakov
fbdce13e5a
Please BSD make...
2005-01-25 22:09:11 +00:00
Andy Polyakov
e532a6c449
FreeBSD 5 refuses to #include <malloc.h>. Fix compiler warning after
...
http://cvs.openssl.org/chngview?cn=12843 .
2005-01-25 22:07:22 +00:00
Andy Polyakov
14bcdb087f
./Configure to respect $thread_cflag variable.
2005-01-24 15:58:25 +00:00
Andy Polyakov
b7efa56a4a
Fold a bunch of linux and *BSD targets into [linux|BSD]-generic[32|64].
...
Idea is to provide unified "fall-down" case for all rare platforms out
there. ./config is free to enable some optimizations, such as endianness
specification, specific -mcpu flags...
2005-01-24 14:38:14 +00:00
Andy Polyakov
8359421d90
Default to AES u32 being unsinged int and not long. This improves cache
...
locality on 64-bit platforms (and fixes IA64 assembler-empowered build:-).
The choice is guarded by newly introduced AES_LONG macro, which needs
to be defined only on 16-bit platforms which we don't support (not that
I know of). Meaning that one could as well skip long option altogether.
2005-01-24 14:22:05 +00:00
Andy Polyakov
efde5230f1
Improve ECB performance (48+14*rounds -> 18+13*rounds) and reserve for
...
hand-coded zero-copy AES_cbc_encrypt.
2005-01-24 14:14:53 +00:00
Andy Polyakov
f5ffad9d1d
linux-arm target update.
...
PR: 991
2005-01-21 10:32:57 +00:00
Andy Polyakov
57a68b2129
linux-parisc update.
...
PR: 990
Submitted by: Mike Frysinger <vapier@gentoo.org >
2005-01-20 17:00:14 +00:00
Andy Polyakov
bac252a5e3
Bug-fix in CBC encrypt tail processing and commentary section update.
2005-01-20 10:33:37 +00:00
Richard Levitte
a963395a7b
Apparently, at least with my VMS C environment, defining _XOPEN_SOURCE
...
gets _POSIX_C_SOURC and _ANSI_C_SOURCE defined, which stops u_int from
being defined, and that breaks havock into the rest of the standard
headers... *sigh*
2005-01-19 17:03:07 +00:00
Richard Levitte
d8863f0bdb
Small thing. It seems like we have to defined _XOPEN_SOURCE to get
...
isascii() on DEC/Compaq/HP C for VMS.
2005-01-18 16:46:02 +00:00
Andy Polyakov
addb6e16a8
Throw in AES CBC assembler, up to +40% on aes-128-cbc benchmark.
2005-01-18 01:04:41 +00:00
Andy Polyakov
4d27c4c960
Fix a typo in a.out assembler modules.
2005-01-18 00:46:55 +00:00
Andy Polyakov
ed65fab910
Reserve for AES CBC assembler implementation...
2005-01-18 00:43:32 +00:00
Andy Polyakov
90cc40911b
Don't zap AES CBC IV, when decrypting truncated content in place.
2005-01-18 00:26:52 +00:00
Richard Levitte
a7201e9a1b
Changes concering RFC 3820 (proxy certificates) integration:
...
- Enforce that there should be no policy settings when the language
is one of id-ppl-independent or id-ppl-inheritAll.
- Add functionality to ssltest.c so that it can process proxy rights
and check that they are set correctly. Rights consist of ASCII
letters, and the condition is a boolean expression that includes
letters, parenthesis, &, | and ^.
- Change the proxy certificate configurations so they get proxy
rights that are understood by ssltest.c.
- Add a script that tests proxy certificates with SSL operations.
Other changes:
- Change the copyright end year in mkerr.pl.
- make update.
2005-01-17 17:06:58 +00:00
Dr. Stephen Henson
fcd5cca418
PKCS7_verify() performance optimization. When the content is large and a
...
memory BIO (for example from SMIME_read_PKCS7 and detached data) avoid lots
of slow memory copies from the memory BIO by saving the content in a
temporary read only memory BIO.
2005-01-14 17:52:24 +00:00
Andy Polyakov
9222bc6b4e
INSTALL.DJGPP sync.
...
PR: 989
2005-01-14 16:25:36 +00:00
Andy Polyakov
e6d27baf52
Rely on e_os.h to appropriately define str[n]casecmp in non-POSIX
...
environments.
2005-01-13 15:46:09 +00:00
Andy Polyakov
e7e1150706
"Monolithic" x86 assembler replacement for aes_core.c. Up to +15% better
...
performance on recent microarchitectures.
2005-01-13 15:35:44 +00:00
Andy Polyakov
5d727078ac
Fix an "oops" typo! Well, it was a debugging left-over...
2005-01-13 15:25:30 +00:00
Andy Polyakov
108159ffcc
O_NOFOLLOW is not appropriate when opening /dev/* entries on Solaris.
...
PR: 998
2005-01-13 15:20:42 +00:00
Richard Levitte
c4d423511a
Small typo, `mask' got the same value ORed to it twice instead of
...
`mask' and `emask' getting that operation done once each.
Patch supplied by Nils Larsch <nils.larsch@cybertrust.com >
2005-01-12 16:40:48 +00:00
Richard Levitte
b15a93a9c5
Correct a faulty address assignment, and add a length check (not
...
really needed now, but may be needed in the future, who knows?).
2005-01-12 09:53:20 +00:00
Andy Polyakov
d9248e5780
FAQ update to mention no-sha0 as possible workaround for Tru64 compiler bug.
...
Well, no-options seem to be busted in HEAD currently, which should/will be
fixed one way or another (see PR#989 for a possible alternative).
2005-01-09 20:42:33 +00:00
Andy Polyakov
0b52f89b81
DJGPP documentation note update.
2005-01-09 20:14:04 +00:00
Andy Polyakov
7de4b5b060
Permit "monolithic" AES assembler implementations, i.e. such which would
...
replace *whole* aes_core.c, not only AES_[de|en]crypt routines.
2005-01-09 16:01:58 +00:00
Andy Polyakov
02a00bb054
DJGPP update.
...
PR: 989
Submitted by: Doug Kaufman
2005-01-04 10:28:38 +00:00
Andy Polyakov
3b4de6e4cc
Borrow #include <string[s].h> from e_os.h.
2004-12-31 00:00:05 +00:00
Andy Polyakov
bdbc9b4d1a
Make whiny compilers stop complaining about missing prototype.
2004-12-30 23:40:31 +00:00
Andy Polyakov
09ef94d2c9
Fix Win32 test-suit.
2004-12-30 22:55:28 +00:00
Andy Polyakov
3ffb8d42bc
Remove naming conflict between variable and label.
2004-12-30 11:10:11 +00:00
Andy Polyakov
25866e3982
Commentary update for AES IA-64 assembler module.
2004-12-30 10:55:02 +00:00
Andy Polyakov
3b3df98ca6
Minor AES x86 assembler tune-up.
2004-12-30 10:46:03 +00:00
Andy Polyakov
2e4a99f38b
AES-CFB[18] 2x optimization. Well, I bet nobody cares about AES-CFB1
...
performance, but anyway...
2004-12-30 10:43:33 +00:00
Dr. Stephen Henson
e90faddaf8
Prompt for passphrases for PKCS12 input format
2004-12-29 01:07:14 +00:00
Andy Polyakov
f1ce306f30
Oops-kind typos in aes-ia64.S...
2004-12-28 17:10:42 +00:00
Richard Levitte
37b11ca78e
iv needs to be const because it sometimes takes it's value from a
...
const.
2004-12-28 10:35:13 +00:00
Richard Levitte
a17af9e277
Forgot to synchronise the VMS build scripts.
2004-12-28 10:22:00 +00:00
Richard Levitte
6951c23afd
Add functionality needed to process proxy certificates.
2004-12-28 00:21:35 +00:00
Andy Polyakov
de421076a5
Minor cygwin update.
...
PR: 949
2004-12-27 21:27:46 +00:00
Andy Polyakov
bd16cd6bcc
As new major IRIX release is highly unlikely to appear [and break following],
...
I change from -notall to -none synonym in irix rules to improve backward
compatibility with IRIX 5.x.
PR: 987
2004-12-27 14:59:36 +00:00
Andy Polyakov
0c51600203
Remove CPU detect for IRIX targets. Performance gain is less than 1%,
...
it makes more sense to strive for broader binary compatibility...
2004-12-27 14:57:54 +00:00
Andy Polyakov
9850f7f6b2
Remove yet another redundant memcpy. Not at least performance critical,
...
essentially cosmetic modification...
2004-12-26 13:05:40 +00:00
Andy Polyakov
131e064e4a
Eliminate redundant memcpy of IV material. Performance improvement varies
...
from platform to platform and can be as large as 20%.
2004-12-26 12:31:37 +00:00
Andy Polyakov
556b8f3f77
Engage AES x86 assembler module for COFF and a.out targets.
2004-12-26 10:58:39 +00:00
Andy Polyakov
045d3285e2
Engage AES x86 assembler module on ELF platforms.
2004-12-23 21:44:28 +00:00
Andy Polyakov
d1df5b4339
x86 perlasm update to accomodate aes-586.pl.
2004-12-23 21:43:25 +00:00
Andy Polyakov
25558bf743
Eliminate copies of TeN and TdN, use those found in assembler module.
2004-12-23 21:40:23 +00:00
Andy Polyakov
713147109c
AES x86 assembler implementation.
2004-12-23 21:32:34 +00:00
Andy Polyakov
76ef6ac956
Refine PowerPC platform support.
2004-12-20 13:44:34 +00:00
Dr. Stephen Henson
a842df6659
Remove unused buffer 'buf'.
2004-12-20 00:49:36 +00:00
Dr. Stephen Henson
c05a7f5dfd
Don't use multiple storage types.
2004-12-19 01:21:18 +00:00
Geoff Thorpe
627bd6709c
Fix typos in the ecparam doc.
...
Submitted by: Nils Larsch
2004-12-17 05:42:00 +00:00
Richard Levitte
fbf218b8c3
make update (oops, missed this file)
2004-12-13 22:57:39 +00:00
Richard Levitte
3c97bd833b
Change libeay.num so it's synchronised with additions in 0.9.7-stable.
...
make update
2004-12-13 22:57:08 +00:00
Dr. Stephen Henson
abbc186bd2
Fix s_client so it works without a certificate again.
2004-12-13 18:02:23 +00:00
Richard Levitte
de6859e442
Propagate a few more variables to Makefile.shared when linking
...
programs.
2004-12-13 17:28:44 +00:00
Dr. Stephen Henson
5e8904f289
Remove duplicate lines.
2004-12-12 13:15:49 +00:00
Andy Polyakov
0c0788ba0a
Solaris x86 perlasm update.
2004-12-10 11:24:42 +00:00
Andy Polyakov
905fd45b36
Engage SHA1 IA64 assembler on IA64 platforms.
2004-12-09 15:39:55 +00:00
Dr. Stephen Henson
c162b132eb
Automatically mark the CRL cached encoding as invalid when some operations
...
are performed.
2004-12-09 13:35:06 +00:00
Andy Polyakov
b4e0ce5165
SHA1 assembler for IA-64.
2004-12-09 11:57:38 +00:00
Andy Polyakov
17f0e916db
Extend RC4 test.
2004-12-07 11:55:56 +00:00
Dr. Stephen Henson
3dfa23cbc4
Update 'certs' directory. Move expired certificates to expired directory
...
and zero assurance demontrations CAs to 'demo'.
2004-12-05 19:48:02 +00:00
Dr. Stephen Henson
a37e22d866
Use X509_cmp_time() in -checkend option, to support GeneralizedTime.
2004-12-05 18:26:19 +00:00
Dr. Stephen Henson
41c70d47d7
Remaing bits of PR:620 relevant to 0.9.8.
2004-12-05 01:50:56 +00:00
Dr. Stephen Henson
a0e7c8eede
Add lots of checks for memory allocation failure, error codes to indicate
...
failure and freeing up memory if a failure occurs.
PR:620
2004-12-05 01:03:15 +00:00
Dr. Stephen Henson
a8e00b17ce
Update year.
2004-12-05 00:51:41 +00:00
Dr. Stephen Henson
3e66ee9f01
In by_file.c check last error for no start line, not first error.
2004-12-04 21:25:51 +00:00
Dr. Stephen Henson
5b40d7dd97
Add -passin argument to dgst command.
2004-12-03 12:26:56 +00:00
Dr. Stephen Henson
8f284faaec
V1 certificates that aren't self signed can't be accepted as CAs.
2004-12-03 00:10:34 +00:00
Andy Polyakov
f774accdbf
Fix rc4-ia64.S to pass more exhaustive regression tests.
2004-12-02 10:07:55 +00:00
Dr. Stephen Henson
8544a80776
Add couple of OIDs. Resync NIDs for consistency with 0.9.7.
2004-12-01 18:09:53 +00:00
Andy Polyakov
7c69478064
I've introduced a bug to i386 RC4 assembler, which would emerge with
...
certain mix of calls to RC4 routine not covered by rc4test.c.
It's fixed now. In addition this patch inadvertently fixes minor
performance problem: in 0.9.7 context P4 was performing 12% slower
than the original implementation...
2004-12-01 15:28:18 +00:00
Dr. Stephen Henson
1862dae862
Perform partial comparison of different character types in X509_NAME_cmp().
2004-12-01 01:45:30 +00:00
Andy Polyakov
b7b46c9a87
Add 0.9.7 specific comments to RC4 assembler modules.
2004-11-30 15:46:46 +00:00
Mark J. Cox
e6e1f4cb5e
Mention that the keys likely to have signed the distribution are now
...
listed on the web site for easy finding and downloading
2004-11-30 14:34:16 +00:00
Richard Levitte
5073ff0346
Split X509_check_ca() into a small self and an internal function
...
check_ca(), to resolve constness issue. check_ca() is called from the
purpose checkers instead of X509_check_ca(), since the stuff done by
the latter (except for calling check_ca()) is also done by
X509_check_purpose().
2004-11-30 12:18:55 +00:00
Andy Polyakov
fc7fc5678f
sha1_block_asm_data_order can't hash if message crosses 2GB boundary.
2004-11-29 21:19:56 +00:00
Andy Polyakov
7a3240e319
Final touches to rc4/asm/rc4-596.pl, +52% better performance on AMD core.
2004-11-29 21:12:58 +00:00
Richard Levitte
5022e4ecdf
Document the change.
2004-11-29 11:57:00 +00:00
Richard Levitte
30b415b076
Make an explicit check during certificate validation to see that the
...
CA setting in each certificate on the chain is correct. As a side-
effect always do the following basic checks on extensions, not just
when there's an associated purpose to the check:
- if there is an unhandled critical extension (unless the user has
chosen to ignore this fault)
- if the path length has been exceeded (if one is set at all)
- that certain extensions fit the associated purpose (if one has been
given)
2004-11-29 11:28:08 +00:00
Andy Polyakov
914c2a28c0
perlasm/x86[ms|nasm] update to accomodate updated RC4 assembler module.
2004-11-27 15:14:58 +00:00
Andy Polyakov
ea681ba872
Summarize recent RC4 tune-ups.
2004-11-26 15:26:09 +00:00
Andy Polyakov
bc3e7fabe7
Engage RC4 IA-64 assembler module.
2004-11-26 15:12:17 +00:00
Andy Polyakov
d675c74d14
RC4 IA-64 assembler implementation.
2004-11-26 15:07:50 +00:00
Dr. Stephen Henson
59c7029862
Typo.
2004-11-26 01:04:55 +00:00
Dr. Stephen Henson
1582a4073e
Add errstr manual page
2004-11-25 18:21:26 +00:00
Dr. Stephen Henson
401ee37a3e
Allow alternative manual sections to be embedded in .pod file comments.
2004-11-25 17:47:31 +00:00
Dr. Stephen Henson
cb26a20cb1
Update docs
2004-11-25 14:14:25 +00:00
Dr. Stephen Henson
82c4674e47
Update docs.
2004-11-25 14:11:25 +00:00
Dr. Stephen Henson
9d2996b82f
Check return code of EVP_CipherInit() in PKCS#12 code.
2004-11-24 01:21:03 +00:00
Dr. Stephen Henson
3fee255102
Typo.
2004-11-23 21:40:10 +00:00
Dr. Stephen Henson
16df5f066a
Fix memory leak.
2004-11-23 21:22:21 +00:00
Andy Polyakov
959f9b1158
linux-x86_64 didn't link after EM64T RC4 tune-up...
2004-11-23 09:06:12 +00:00
Andy Polyakov
376729e130
RC4 tune-up for Intel P4 core, both 32- and 64-bit ones. As it's
...
apparently impossible to compose blended code with would perform
satisfactory on all x86 and x86_64 cores, an extra RC4_CHAR
code-path is introduced and P4 core is detected at run-time. This
way we keep original performance on non-P4 implementations and
turbo-charge P4 performance by factor of 2.8x (on 32-bit core).
2004-11-21 10:36:25 +00:00
Dr. Stephen Henson
00dd8f6d6e
In "req" exit immediately if configuration file is needed and it can't
...
be loaded instead of giving the misleading:
"unable to find 'distinguised_name' in config"
error message.
2004-11-17 18:36:13 +00:00
Dr. Stephen Henson
5dd87981bf
Update X509v3 doc.
2004-11-17 00:55:43 +00:00
Dr. Stephen Henson
37dccd8ff2
Update X509v3 docs.
2004-11-16 17:45:13 +00:00
Dr. Stephen Henson
826a42a088
PR: 910
...
Add command line options -certform, -keyform and -pass to s_client and
s_server. This supports the use of alternative passphrase sources, key formats
and keys handled by an ENGINE.
Update docs.
2004-11-16 17:30:59 +00:00
Dr. Stephen Henson
19f39703f7
Initial pod documentation of X509V3 config file format.
2004-11-16 14:09:12 +00:00
Dr. Stephen Henson
151368ccba
PR: 940
...
Typo: use prompt_info, not cb_data->prompt_info.
2004-11-14 15:40:00 +00:00
Dr. Stephen Henson
4451c2558e
PR: 923
...
Typo.
2004-11-14 15:11:37 +00:00
Dr. Stephen Henson
4a64f3d665
PR: 938
...
Typo.
2004-11-14 13:55:16 +00:00
Dr. Stephen Henson
5fee606442
Zap obsolete der_chop script.
2004-11-14 00:08:36 +00:00
Dr. Stephen Henson
521aaafc6a
PR: 969
...
Submitted by: David Holmes <davidh@3blackdogs.com >
2004-11-13 13:38:34 +00:00
Dr. Stephen Henson
78df5a2f1e
Fix x509.c so it creates serial number file again if no
...
serial number is supplied on command line.
2004-11-13 13:26:06 +00:00
Richard Levitte
6c9f57d629
Cut'n'paste mistake. All tested OK now...
2004-11-11 19:36:08 +00:00
Richard Levitte
382342ce1d
Whoops, syntactic mistake...
2004-11-11 18:58:01 +00:00
Richard Levitte
69c922f5d2
Some find it confusing that environment variables are set when shared
...
libraries aren't built or used. I can see the point, so I'm
reorganising a little for clarity.
2004-11-11 18:18:43 +00:00
Dr. Stephen Henson
10c8505734
Use the default_md config file value when signing CRLs.
...
PR:662
2004-11-11 13:47:06 +00:00
Dr. Stephen Henson
10f92aac33
Don't return an error with crl -noout.
...
PR:917
Sumbmitted by: Michael Konietzka <konietzka@schlund.de >
2004-11-11 02:13:08 +00:00
Andy Polyakov
68d9e764cb
As was shown by Marc Bevand reordering of couple of load operations
...
results in even higher performance gain of 3.3x:-) At least on
Opteron...
2004-11-09 17:23:26 +00:00
Richard Levitte
8de69cf2c6
Make sure LD_PRELOAD is only set when we build shared libraries (and
...
therefore link with them). Add LD_PRELOAD setting code where it was
still missing.
PR: 966
2004-11-05 09:12:10 +00:00
Richard Levitte
a2ac429da2
Don't use $(EXHEADER) directly in for loops, as most shells will break
...
if $(EXHEADER) is empty.
Notified by many, solution suggested by Carson Gaspar <carson@taltos.org >
2004-11-02 23:55:01 +00:00
Richard Levitte
ffd0f93f14
Because -rpath/-R may have been used, our settings of LD_LIBRARY_PATH
...
and friends may be entirely useless. In such a case, LD_PRELOAD is
the answer, at least on platforms using LD_LIBRARY_PATH. There might
be other variables to set on other platforms, please fill us in...
For now, we only do this with the tests, so they won't fail for silly
reasons like getting dynamically linked to older installed libraries
rather than the newly built ones...
PR: 960
2004-11-02 01:13:04 +00:00
Richard Levitte
1a4b8e7cee
Make sure memmove() is defined, even on SunOS 4.1.4.
...
PR: 963
2004-11-01 07:58:38 +00:00
Dr. Stephen Henson
03386677ed
Update NEWS
2004-10-25 17:11:19 +00:00
Dr. Stephen Henson
559f90ff60
Update FAQ.
2004-10-25 12:36:33 +00:00
Dr. Stephen Henson
c284f20f00
Fix race condition when SSL ciphers are initialized.
2004-10-25 11:14:16 +00:00
Geoff Thorpe
58ae65cd1a
Update ECDSA and ECDH for OPENSSL_NO_ENGINE.
...
Reported by: Maxim Masiutin
Submitted by: Nils Larsch
2004-10-21 00:06:14 +00:00
Richard Levitte
5b0f1f7d13
Because libraries on Windows lack useful version information, the zlib
...
guys had to change the name to differentiate with older versions when
a backward incompatibility came up. Of course, we need to adapt.
This change simply tries to load the library through the newer name
(ZLIB1) first, and if that fails, it tries the good old ZLIB.
2004-10-14 05:48:59 +00:00
Dr. Stephen Henson
785e827323
Oops!
2004-10-04 17:28:31 +00:00
Dr. Stephen Henson
2f605e8d24
Fix race condition when CRL checking is enabled.
2004-10-04 16:30:12 +00:00
Dr. Stephen Henson
5e2216bfa1
Update debug-steve
2004-10-01 11:35:38 +00:00
Dr. Stephen Henson
175ac6811a
Don't use C++ reserved work "explicit".
2004-10-01 11:21:53 +00:00
Andy Polyakov
07d488daf6
Fix Solaris 10_x86 shared build. -Bsymbolic is required to avoid
...
"remaining relocations" in assembler modules. The latter seems to
be new behaviour, elder as/ld managed to resolve this relocations
as internal. It's possible to address this problem differently,
but I settle for -Bsymbolic...
PR: 546
2004-09-28 20:45:10 +00:00
Richard Levitte
d1360f6ecc
usr/doc has recently changed to usr/share/doc on Cygwin.
...
Notified by Corinna Vinschen <vinschen@redhat.com >
2004-09-28 13:10:16 +00:00
Richard Levitte
c38ff58b6b
Move the declaration of alloca() so it's ony declared when really
...
necessary.
2004-09-27 21:59:44 +00:00
Andy Polyakov
c29ef588dc
SHA1 asm Pentium tune-up. Performance loss is not as bad anymore.
2004-09-27 09:37:03 +00:00
Andy Polyakov
968c31bd84
sha256_block advances the input pointer double as fast sometimes. Fix the
...
bug and test that it's actually gone.
PR: 950
2004-09-27 09:35:59 +00:00
Geoff Thorpe
c743966156
Nils Larsch reported that this include is required. Strange that this had
...
gone unnoticed ...
2004-09-24 23:37:52 +00:00
Richard Levitte
bb09fd2bb6
Import changed files from LPlib. The changes are logged as follows
...
for LPdir_unix.c in LPlib. For the other files, only the last log
entry applies.
----------------------------
revision 1.11
date: 2004/09/23 22:07:22; author: _cvs_levitte; state: Exp; lines: +20 -6
Define my own macro LP_ENTRY_SIZE to express the size of my own
buffering of directory entries, and make it depend on whichever comes
first of PATH_MAX and NAME_MAX. As a fallback, make sure it's set to
255 if neither PATH_MAX or NAME_MAX were defined. Also, if the size
given from PATH_MAX or NAME_MAX is less than 255, force LP_ENTRY_SIZE
to be 255.
It makes no harm whatsoever if LP_ENTRY_SIZE is larger than the
maximum local path name limit. It does make a lot of harm if
LP_ENTRY_SIZE is smaller. 255 seemed like a fairly acceptable default
when nothing else is available.
----------------------------
revision 1.10
date: 2004/08/26 13:36:05; author: _cvs_levitte; state: Exp; lines: +13 -13
License correction. I am not REGENTS, just a COPYRIGHT HOLDER.
----------------------------
2004-09-23 22:11:39 +00:00
Geoff Thorpe
280eb33b59
Remove distracting comments and code. Thanks to Nils for picking up on the
...
outstanding ticket.
PR: 926
2004-09-19 04:55:15 +00:00
Geoff Thorpe
f79110c633
Two TODO comments taken care of. Nils pointed out that one of them had already
...
been done, and took care of the other one (which hadn't).
Submitted by: Nils Larsch
Reviewed by: Geoff Thorpe
2004-09-19 04:43:46 +00:00
Geoff Thorpe
6ef2ff62fc
Make -Werror happy again.
2004-09-18 01:32:32 +00:00
Dr. Stephen Henson
980aea7860
Check ASN1_TYPE structure type is a SEQUENCE in PKCS7_get_smimecap().
2004-09-15 23:47:25 +00:00
Dr. Stephen Henson
bd9327baa9
Change values of MBSTRING_* to the form MBSTRING_FLAG|nbyte as assumed
...
in ASN1_STRING_to_UTF8().
2004-09-13 22:33:56 +00:00
Richard Levitte
6f9bafafa3
- There's no more need for the snprintf macro.
...
- Move the inclusion of malloc.h until after all other includes, so we
can do proper tests of system macros.
- Make sure the correct header file is included to get the builtin
"alloca" under VMS, and define a macro to map the symbol 'alloca' to
it.
2004-09-13 09:15:06 +00:00
Richard Levitte
422a4a33a5
Synchronise with Unix build.
2004-09-12 13:02:04 +00:00
Dr. Stephen Henson
58606421ae
When looking for request extensions in a certificate look first
...
for the PKCS#9 OID then the non standard MS OID.
2004-09-10 20:20:54 +00:00
Richard Levitte
d813ff2ac1
make update
2004-09-10 10:30:33 +00:00
Andy Polyakov
36734b2bab
Make VIA Padlock engine more platform friendly and eliminate compiler
...
warning.
Submitted by: Doug Kaufman <dkaufman@rahul.net >
2004-09-09 14:54:12 +00:00
Andy Polyakov
c85c5c408a
x86 assembler updates: more instructions, new OPENSSL_instrument_halt
...
[for DJGPP]...
2004-09-09 14:50:32 +00:00
Richard Levitte
2c1677d703
Synchronise VMS build files with Unixly Makefiles.
2004-09-08 08:13:34 +00:00
Richard Levitte
72348cbb8d
Another symbol longer than 31 characters...
2004-09-08 08:13:03 +00:00
Dr. Stephen Henson
c431798e82
Reformat smime utility.
...
Add support for policy checking in verify utility.
2004-09-07 18:38:46 +00:00
Dr. Stephen Henson
fb80794568
Don't use 'explicit' for variable name.
2004-09-07 00:31:08 +00:00
Dr. Stephen Henson
4ec3d785e5
Reformat smime.c
2004-09-07 00:28:17 +00:00
Dr. Stephen Henson
5d7c222db8
New X509_VERIFY_PARAM structure and associated functionality.
...
This tidies up verify parameters and adds support for integrated policy
checking.
Add support for policy related command line options. Currently only in smime
application.
WARNING: experimental code subject to change.
2004-09-06 18:43:01 +00:00
Dr. Stephen Henson
d993addbed
Stop compiler warnings.
2004-09-06 18:37:46 +00:00
Andy Polyakov
476b6ab541
TABLE OpenBSD-i386 update
2004-08-29 22:05:02 +00:00
Andy Polyakov
16760a3089
Proper support for OpenBSD-i386 shared build, including assember modules!
...
"Proper" means "compiles and passes test." Versioning is broken (I think).
2004-08-29 21:36:37 +00:00
Andy Polyakov
2b247cf81f
OPENSSL_ia32cap final touches. Note that OPENSSL_ia32cap is no longer a
...
symbol, but a macro expanded as (*(OPENSSL_ia32cap_loc())). The latter
is the only one to be exported to application.
2004-08-29 16:36:05 +00:00
Andy Polyakov
746fc2526f
Fix compiler warnings in crypto/evp/bio_ok.c as pointed out by Geoff.
2004-08-29 16:19:27 +00:00
Andy Polyakov
a8c65b400c
crypto/perlasm update primarily to unify Netware modules. Once it's verified
...
x86*_nw.pl will be deleted. In addition this update implements initseg
on several additional [in addition to ELF] platforms. Functions registered
with initseg are supposed to be called prior main().
2004-08-29 16:10:27 +00:00
Andy Polyakov
526975906b
Minor VIA Padlock engine update: eliminate -Wunused warning when *not*
...
compiling the engine and inline memcpy in performance critical pathes.
2004-08-24 09:01:09 +00:00
Andy Polyakov
14fa6ad9f9
Make aes_ctr.c 64-bit savvy.
2004-08-23 22:19:51 +00:00
Richard Levitte
e544b0dc2a
'compatibility', not 'computability' :-)...
2004-08-18 15:48:33 +00:00
Richard Levitte
2549564009
On systems that use case-insensitive symbol names (i.e. they're all
...
converted to upper case or something like that), the application-
level bio_dump_cb() has a name clash with the new library function
BIO_dump_cb(). The easiest fix is to rename the function at the
application level.
2004-08-12 08:58:55 +00:00
Richard Levitte
bb1a915c24
Basically, I wanted to be able to make a dump to a FILE*, and not have
...
to bother creating a BIO around it. So here's a few more functions to
make it possible to make the dump using a printing callback, and to
print to a FILE* (based on the callback variant), done in the same
style as the functions in crypto/err/err_prn.c.
2004-08-11 21:13:57 +00:00
Richard Levitte
b94f886b22
Stupid casts...
2004-08-11 17:41:15 +00:00
Dr. Stephen Henson
6ef7b78e7c
Update FAQ.
2004-08-11 17:22:13 +00:00
Dr. Stephen Henson
e08aad1d14
Make ASN1_INTEGER_cmp() work as expected with negative integers.
2004-08-10 17:40:14 +00:00
Dr. Stephen Henson
b5a93e2250
Call setup_engine after autoconfig.
2004-08-06 12:44:34 +00:00
Dr. Stephen Henson
c128bb0fa2
Don't ignore return value of EVP_DigestInit_ex() in md BIOs and dgst utility.
2004-08-05 18:09:50 +00:00
Geoff Thorpe
30fe028f07
Make a note of the new engine.
2004-08-04 22:42:29 +00:00
Andy Polyakov
b88606c28e
Padlock engine update to fix a typo in MSC assembler and to address
...
potential corruption problem if user manages to inter-leave aligined
and misaligned requests [as well as some MSC-specific tweaks].
2004-08-04 12:58:26 +00:00
Richard Levitte
2ea6abf6e5
DJGPP has opendir() and friends, according to Gisle Vanem <giva@bgnett.no>.
2004-08-03 19:15:21 +00:00
Andy Polyakov
f8c469de73
If they ask for 386, keep it as 386 as possible...
2004-08-02 22:41:19 +00:00
Andy Polyakov
42096e05f7
Avoid a.out name table pollition.
2004-08-02 22:02:17 +00:00
Andy Polyakov
7d15a556f8
Minor clean-up to make Microsoft compiler shut up.
2004-08-02 21:54:40 +00:00
Andy Polyakov
5b17246324
VIA C3 processor extends IA-32 instruction set with instuctions
...
performing AES encryption in hardware, as well as one accessing
hardware RNG. As you surely imagine this engine access this
extended instruction set. Well, only AES for the moment, support
for RNG is to be added later on...
PR: 889
Submitted by: Michal Ludvig <michal@logix.cz >
Obtained from: http://www.logix.cz/michal/devel/padlock/
2004-08-02 21:48:11 +00:00
Andy Polyakov
c77094415f
Cygwin fix-up for shared build.
2004-08-01 21:24:34 +00:00
Andy Polyakov
34413fca84
OpenBSD fix-up for new a.out targets. OpenBSD .s.o rule is busted...
2004-08-01 21:16:26 +00:00
Andy Polyakov
ec38ddc765
Clean-up GAS targets: get rid of "cpp" stuff and replace it with "purified"
...
COFF and a.out targets [similar to ELF targets]. You might notice some
rudementary support for shared mingw builds under cygwin. It works (it
produces cryptoeay32.dll and ssleay32.dll with everything exported by
name), but it's primarily for testing/debugging purposes, at least for
now...
2004-08-01 17:33:58 +00:00
Andy Polyakov
8aae01e223
Deprecate cpp and gaswin targets. New coff fills in for gaswin, but cpp is
...
going out...
2004-08-01 17:03:50 +00:00
Andy Polyakov
00555c2f2f
DLLEntryPoint is a collective name, not what linker looks for. However,
...
if we explicitly intruct the linker to set entry point, then we become
obliged to initialize run-time library. Instead we can pick name run-time
will call and such name is DllMain. Note that this applies to both
"native" Win32 environment and Cygwin:-)
2004-08-01 14:27:43 +00:00
Richard Levitte
07d80f6f35
We build the crypto stuff, not the ssl stuff, in this command procedure...
2004-07-29 22:25:59 +00:00
Richard Levitte
4591850561
The compiler may complain about what looks like a double definition of a
...
static variable
2004-07-27 13:58:27 +00:00
Dr. Stephen Henson
a25aca2943
Oops, wrong version...
2004-07-27 00:19:58 +00:00
Dr. Stephen Henson
48c524827b
Add FIPS library name to error routines.
2004-07-27 00:19:18 +00:00
Andy Polyakov
ebaec63e3e
This is so to say "damage control" for jumbo "cpuid" patch, see
...
http://cvs.openssl.org/chngview?cn=12493 . Now all platform should
be operational, while SSE2 code pathes get engaged on ELF platforms
only.
2004-07-26 22:01:50 +00:00
Andy Polyakov
14e21f863a
Add framework for yet another assembler module dubbed "cpuid." Idea
...
is to have a placeholder to small routines, which can be written only
in assembler. In IA-32 case this includes processor capability
identification and access to Time-Stamp Counter. As discussed earlier
OPENSSL_ia32cap is introduced to control recently added SSE2 code
pathes (see docs/crypto/OPENSSL_ia32cap.pod). For the moment the
code is operational on ELF platforms only. I haven't checked it yet,
but I have all reasons to believe that Windows build should fail to
link too. I'll be looking into it shortly...
2004-07-26 20:18:55 +00:00
Andy Polyakov
f10725a6e1
Zero key-length for HMAC is apparently OK.
2004-07-25 20:24:49 +00:00
Andy Polyakov
0f71b77d5c
Make bio_ok.c Microsoft compiler savvy.
2004-07-25 20:13:30 +00:00
Andy Polyakov
d6bb6a88be
Typos, typos...
2004-07-25 20:09:56 +00:00
Andy Polyakov
3205db2bfe
Make bio_ok.c 64-bit savvy.
2004-07-25 19:37:41 +00:00
Andy Polyakov
6f86850eec
Stricter boundary condition check in HMAC_Init_ex.
2004-07-25 19:25:05 +00:00
Andy Polyakov
16ab8a93bc
Minor 64-bit md32_common.h update and minor unsignification of digests.
2004-07-25 19:10:43 +00:00
Andy Polyakov
c88f8f76b5
'apps/openssl dgst -help' update and minor apps/speed.c update.
2004-07-25 18:57:35 +00:00
Andy Polyakov
fbf96849e9
Make SHA-256/-512 optional. Note that no-sha switches off *all* SHA.
2004-07-25 18:25:24 +00:00
Andy Polyakov
d70e2507f8
Some compilers are just too whiny. Nothing makes Microsoft compiler
...
stop complaining about loss of precision, but explicit cast.
2004-07-25 17:00:56 +00:00
Andy Polyakov
2fcf435d73
Some compilers are just too whiny. DEC C doesn't like long long...
2004-07-25 16:54:08 +00:00
Andy Polyakov
da2ee71de5
Typos and due casts. As for the latter. It's "safe" to cast as below,
...
because "wrong" casts will either be optimized away or never performed.
2004-07-25 16:48:28 +00:00
Andy Polyakov
8611934352
Minor HP-UX make update. IA-64-based HP-UX favor .so extension for shared
...
libraries. Old .sl extension works just fine, but it .so which is default.
2004-07-24 14:17:32 +00:00
Andy Polyakov
01e94efd46
TABLE update.
2004-07-23 23:29:25 +00:00
Andy Polyakov
33c3ecf741
Build-n-link new IA-64 modules on Linux and HP-UX.
2004-07-23 23:27:10 +00:00
Andy Polyakov
5bd4c26057
Various IA-64 assembler fix-ups.
2004-07-23 22:54:18 +00:00
Andy Polyakov
4aa5889e1a
VC-NT was taken away by mistake, putting it back...
2004-07-23 20:46:41 +00:00
Andy Polyakov
bafcc7e060
Win64 placeholder targets. This is merely naming suggestion. As we know
...
Win64 comes in two flavors, IA-64/Itanium and AMD64/Opteron. The
suggestion is to refer to former as WIN64I and latter - WIN64A
2004-07-23 19:18:20 +00:00
Andy Polyakov
afe67fb28e
Adapt rc4-amd64.pl for Win64/AMD64 assembler.
2004-07-23 17:51:17 +00:00
Richard Levitte
f744f92adb
From LPlib:
...
Apparently, the length *including* the NUL byte should be used.
Contributed by Andy Polyakov <appro@fy.chalmers.se >
2004-07-22 18:34:06 +00:00
Richard Levitte
75f134c077
From LPlib:
...
Make a nicer comment, as we don't really know for sure that it's
really needed, and just want to play on the safe side.
Suggest by Andy Polyakov <appro@fy.chalmers.se >
2004-07-22 13:00:14 +00:00
Andy Polyakov
d8d25c9603
WinCE should always be compiled as UNICODE, even debugging version...
2004-07-22 11:08:31 +00:00
Andy Polyakov
f1bdf1d518
#include <limits.h> is required at least on HP-UX and IRIX. And what's
...
with HP-UX offering 14 for NAME_MAX?
2004-07-22 10:53:26 +00:00
Andy Polyakov
d58caee734
EVP_Digest is size_t-fied, clean up test programs accordingly.
2004-07-22 10:25:52 +00:00
Andy Polyakov
e39c2548f5
Run SHA-256/-512 tests through EVP...
2004-07-22 10:21:13 +00:00
Andy Polyakov
8169dd73f9
All SIXTY_FOUR_BIT platforms (mind the difference between SIXTY_FOUR_BIT and
...
SIXTY_FOUR_BIT_LONG) were failing to pass 'cd test; make test_bn'.
2004-07-22 09:32:11 +00:00
Richard Levitte
765e231a7c
From LPlib:
...
Some code beautification.
Change the macro CP_THREAD_ACP to CP_ACP, because the latter is more
widely defined.
Add a conditional macro definition in case FindFirstFile and
FindNextFile aren't properly defined (might happen on WinCE).
Suggested by Andy Polyakov <appro@fy.chalmers.se >
2004-07-21 21:16:21 +00:00
Andy Polyakov
89c53672c2
Make rand_win.c UNICODE savvy.
2004-07-21 17:17:30 +00:00
Richard Levitte
64ba6cf222
From LPlib:
...
Windows changes that detects if multibyte characters are available and
deals with them properly.
Contributed by Andy Polyakov <appro@fy.chalmers.se >
2004-07-20 21:24:43 +00:00
Richard Levitte
210a4f78ae
Imported from LPlib, making sure the entry name (at least on Unix) is
...
NUL-teminated at all times, and that we don't make unneeded calls to
free().
2004-07-19 16:36:28 +00:00
Richard Levitte
334ef04949
Since version 7.0, The C RTL in VMS handles time in terms of UTC
...
instead of local time.
2004-07-19 07:50:43 +00:00
Andy Polyakov
859ceeeb51
Anchor AES and SHA-256/-512 assembler from C.
2004-07-18 17:26:01 +00:00
Andy Polyakov
22edcae7fa
Type in Configure and TABLE update.
2004-07-18 16:22:53 +00:00
Andy Polyakov
d0590fe6b2
Add anchors for AES, SHA-256/-512 assembler modules and SSE2 code pathes.
...
I also used this opportunity to clean up some out-of-date targets and
re-group targets by OS.
2004-07-18 16:19:34 +00:00
Andy Polyakov
2232b10f5a
Add licensing terms.
2004-07-17 13:24:58 +00:00
Andy Polyakov
e34794dd1b
IA-64 is intolerant to misaligned access. It was a problem on Win64 as
...
we were mislead by _MSC_VER macro, which is defined by *all* Windows
Microsoft compilers.
2004-07-17 12:55:55 +00:00
Geoff Thorpe
0210065bbd
Quick fix.
...
Submitted by: Nils Larsch
2004-07-16 03:24:51 +00:00
Geoff Thorpe
7f5b4dd1e8
Using Horner's algorithm to evaluate the ec polynomial
...
(suggested by Adam Young <ayoung@cigital.com >)
Submitted by: Nils Larsch
2004-07-16 03:24:19 +00:00
Richard Levitte
5906e8d5fe
I think it could be a good thing to know what went wrong with the tests...
2004-07-12 12:25:54 +00:00
Richard Levitte
5545607c4f
make update
...
(incidently, this also tells VMS that there exists a new symbol in the
SSL library)
2004-07-12 11:25:48 +00:00
Richard Levitte
6ac1571296
Because it's one of our libraries calling new functions in the other,
...
we need to have them among the symbols that should appear in the
transfer table, at least on VMS (and it wouldn't surprise me if
Windows would whine as well).
2004-07-12 11:24:55 +00:00
Bodo Möller
ca74b76f3e
improve wording
2004-07-12 06:23:28 +00:00
Richard Levitte
2b6174c478
Some test programs in crypto/sha were named differently than usual...
2004-07-11 20:30:33 +00:00
Richard Levitte
2b002273f3
'SSL_add_dir_cert_subjects_to_stack' is longer than 31 characters.
...
Lucky me, I had prepared for this :-).
2004-07-11 20:22:37 +00:00
Richard Levitte
15d155e45a
o_dir needs to be compiler with the warnings about dollar signs in
...
identities disabled.
2004-07-11 20:21:56 +00:00
Richard Levitte
b0841348b6
In some cases, EVMSERR isn't visible (that's fairly new...).
...
Don't have a constant that you're going to assign to, that's just
plain stupid (I was the stupidhead here...).
2004-07-11 20:21:19 +00:00
Andy Polyakov
090e81d4aa
Integration of RC4 AMD64 module.
2004-07-11 16:49:09 +00:00
Andy Polyakov
e4528e48e3
RC4 tune-up for AMD64. Performance improvement of 2.22x is measured for
...
linux-x86_64 target.
2004-07-11 16:44:07 +00:00
Bodo Möller
235dee1421
BIS correction/addition
2004-07-11 08:58:43 +00:00
Richard Levitte
d28f7bc74d
make update
2004-07-10 13:18:23 +00:00
Richard Levitte
4083a229b4
Use the new directory reading functions.
2004-07-10 13:17:16 +00:00
Richard Levitte
a2400fcab8
Copy a few files from LPlib (a new project of mine), add a wrapper.
...
Now we have directory reading capabilities for VMS as well, and all
of it in a fairly general manner.
2004-07-10 13:16:02 +00:00
Richard Levitte
dc56eb5079
o_str.c: Windows doesn't have <strings.h>, and since we use _strnicmp() and
...
_stricmp() on that platform, use the appropriate header file for it,
<string.h>.
o_str.h: we only want to get size_t, which is defined in <stddef.h>.
Philippe Bougeret <philippe.bougeret@freesbee.fr > notified us about Windows
not having a <strings.h>
2004-07-08 08:32:48 +00:00
Dr. Stephen Henson
637ff35ef6
Delta CRL support in extension code.
2004-07-06 17:16:40 +00:00
Geoff Thorpe
ace3ebd661
Improve error handling if decompression of an ec point fails, and cleanup
...
ec_curve.c (unify comments, etc).
Submitted by: Nils Larsch
Reviewed by: Bodo Moeller, Geoff Thorpe
2004-07-06 15:50:04 +00:00
Dr. Stephen Henson
eea674567c
Delete non-POSIX header file.
2004-07-04 16:48:27 +00:00
Dr. Stephen Henson
c39c32dd65
PKCS#8 fixes from stable branch.
2004-07-04 16:44:52 +00:00
Dr. Stephen Henson
0efea28dcb
Don't try to parse non string types.
2004-07-01 18:15:33 +00:00
Dr. Stephen Henson
4bab9b763d
Stop compiler warnings with debug-steve
2004-07-01 18:14:31 +00:00
Richard Levitte
70696f4525
Explain a little better what BN_num_bits() and BN_num_bits_word() do.
...
Add a note as to how these functions do not always return the key size, and
how one can deal with that.
PR: 907
2004-07-01 12:33:39 +00:00
Andy Polyakov
80bbc9ceaf
Minor (+12% on P4) performance tweak for sha512_block_sse2.
2004-07-01 11:29:00 +00:00
Andy Polyakov
51ce5230cd
AES assembler implementation for IA-64. Note that there is no anchor from
...
C code yet...
2004-07-01 11:15:23 +00:00
Andy Polyakov
b6d8ba11e9
New SHA algorithms assembler implementation for IA-64. Note that despite
...
module name both SHA-256 and SHA-512 are supported.
2004-07-01 11:13:44 +00:00
Andy Polyakov
e2f2a9af2c
New scalable bn_mul_add_words loop, which provides up to >20% overall
...
performance improvement. Make module more gcc friendly and clarify
copyright issues for division routine.
2004-07-01 11:10:38 +00:00
Richard Levitte
28a8003467
Changes for VOS, submitted by Paul Green <Paul.Green@stratus.com>.
...
PR: 499
2004-06-28 22:01:37 +00:00
Richard Levitte
563cd0f2b0
Make the tests of EVP operations without padding. As a consequence,
...
there's no need for a larger BUFSIZE any more...
PR: 904
2004-06-28 16:32:12 +00:00
Richard Levitte
3ac0f28837
Make sure that the buffers are large enough to contain padding.
...
PR: 904
2004-06-28 12:23:35 +00:00
Richard Levitte
47c1735acd
NetWare fixes provided by Verdon Walker for OpenSSL 0.9.8-dev.
...
The changes have been mailed to <crypt@bis.doc.gov > as well.
PR: 903
2004-06-28 11:55:28 +00:00
Richard Levitte
7d3932e8cf
Linux on ARM needs -ldl
...
PR: 905
2004-06-28 10:31:03 +00:00
Dr. Stephen Henson
8a60547896
Reformat pkcs8 source.
2004-06-24 13:10:54 +00:00
Geoff Thorpe
d459e39012
Tidy up, including;
...
- Remove unused and unuseful debug cruft.
- Remove unnecessary 'top' fudging from BN_copy().
- Fix a potential memory leak and simplify the expansion logic in
BN_bin2bn().
Submitted by: Nils Larsch
Reviewed by: Geoff Thorpe
2004-06-20 04:16:12 +00:00
Geoff Thorpe
340f5856ec
Incomplete initial sweep over the engine code. Mainly reducing some
...
comment-noise to managable levels and inverting the sense of the "uptodate"
boolean (which was counter-intuitive the way I'd left it).
2004-06-19 03:58:42 +00:00
Geoff Thorpe
df11e1e921
Deprecate unused cruft, and "make update".
2004-06-17 23:50:25 +00:00
Geoff Thorpe
6a6592962c
Attempt to bring the 'engine' documentation up to date w.r.t missing
...
prototypes, etc. Also, some fairly significant edits were made to the text
(who wrote this crap anyway? oh wait ...), removing stuff which is
overkill, rewriting stuff that was opaque, correcting things that were just
downright false, etc.
2004-06-17 23:40:14 +00:00
Geoff Thorpe
1275c4569e
Minor change to group like functions together.
2004-06-17 23:35:45 +00:00
Geoff Thorpe
afbe74d386
Actually, that last change to BN_get_word() was a little too simple.
2004-06-17 22:05:40 +00:00
Geoff Thorpe
f18ea6cae9
Get rid of signed/unsigned warnings, and teach CVS about new things to
...
ignore.
2004-06-17 20:28:28 +00:00
Geoff Thorpe
c9ff40cecd
Tweak my debug target flags.
2004-06-17 20:26:21 +00:00
Geoff Thorpe
9088d5f24f
As Nils put it;
...
Yet another question: some time ago you changed BN_set_word.
Why didn't you change BN_get_word as well?
Quite. I'm also removing the older commented-out implementations to improve
readability. This complex stuff seems to date from a time when the types
didn't match up well.
Submitted by: Nils Larsch, Geoff Thorpe
2004-06-17 20:13:50 +00:00
Geoff Thorpe
cf9056cfda
BN_div_word() was breaking when called from BN_bn2dec() (actually, this is
...
the only function that uses it) because it would trip up an assertion in
bn_div_words() when first invoked. This also adds BN_div_word() testing to
bntest.
Submitted by: Nils Larsch
Reviewed by: Geoff Thorpe
2004-06-17 20:03:56 +00:00
Richard Levitte
f7fc4ca1dd
Making some values explicitely unsigned was derived from ongoing work
...
that isn't yet committed. It wasn't meant to be committed already, so
I'm removing it for now.
2004-06-15 12:52:26 +00:00
Richard Levitte
132fc53223
Typo, setting the first element of nids[] to NULL instead of setting
...
*cnids.
2004-06-15 11:45:42 +00:00
Geoff Thorpe
b3b6720944
Correct the return codes for ecdsatest.
...
Submitted by: Nils Larsch
Reviewed by: Geoff Thorpe
2004-06-14 23:37:32 +00:00
Lutz Jänicke
9f6ea7163b
More precise explanation of session id context requirements.
2004-06-14 13:27:28 +00:00
Andy Polyakov
385c8e89f4
SHA fails to compile on x86_64 if compiled with custom flags, without
...
recommended -DMD32_REG_T=int in particular.
PR: 893
Submitted by: Michal Ludvig <michal-list@logix.cz >
2004-06-11 17:50:57 +00:00
Geoff Thorpe
263e3151e2
"no-engine" was being ignored, so remove it from the advertised syntax.
...
Also remove some commented-out lines of code that deny CVS its purpose.
2004-06-03 03:34:53 +00:00
Geoff Thorpe
9081980565
This fixes the installation target for dynamic engines, which was trying to
...
install to a different location than it had created. (BTW, VMS will need a
matching fix in eng_list.c.) Note, these aren't ssl-specific, so I'm
putting "engines/" into the libs directory rather than at the "--prefix"
level or inside "ssl/".
2004-06-01 03:18:58 +00:00
Andy Polyakov
393b704d28
Minimal work-around for ./engine shared builds. "Minimal" means that I
...
think that proper Makefile clean-up is required.
2004-05-31 22:29:26 +00:00
Andy Polyakov
bef26f1158
32-bit PA-RISC requires -Bsymbolic when linking libcrypto.sl. Without
...
this flag RAND_poll ends up in end-less loop calling RAND_add. But
don't ask me why...
2004-05-31 17:10:49 +00:00
Andy Polyakov
bc1ca8605c
Working on HP-UX shared support...
2004-05-31 14:50:19 +00:00
Andy Polyakov
ad5003409d
Mention new SHA algorithms in CHANGES. This completes the integration.
2004-05-31 14:03:02 +00:00
Andy Polyakov
057cfaf2f8
Extend HMAC_MAX_MD_CBLOCK to accomodate SHA-512.
2004-05-31 13:28:23 +00:00
Richard Levitte
914d36ba19
make update
2004-05-31 13:16:08 +00:00
Andy Polyakov
31c2ac1cdc
EVP bindings to new SHA algorithms.
2004-05-31 13:14:08 +00:00
Andy Polyakov
6bca8e3886
objects.txt update for SHA-224/-256/-384/-512. SHA-224 ids still appear
...
"draft," but we have to start somewhere...
Submitted by: Nils Larsch <nlarsch@compuserve.de >
2004-05-31 13:07:19 +00:00
Andy Polyakov
63ba7e293f
Make sha-256/-512 naming in speed.c consistent with their names as they
...
will appear at EVP leyer.
2004-05-31 12:40:22 +00:00
Andy Polyakov
31e9b9b2e9
Typo in commentary section.
2004-05-31 12:30:41 +00:00
Andy Polyakov
7997b13aa3
Final SHA-256/-512 touches. Extra md_len field in SHA[256|512]_CTX
...
reserves for truncated hash function output mode and makes SHA224
thread-safe. Next stop is integration with EVP and we're done...
2004-05-31 12:26:18 +00:00
Andy Polyakov
a2eb9688a4
Kill unused macro and reimplement it for that single context it can
...
actually be used, namely x86* platforms [because they don't bomb on
unaligned access]. This resulted in 30-40% [depending on message
length] improvement for SHA-256 compiled with gcc and running on P4.
In the lack of assembler implementation I give the compiler all the
help it can possibly get:-)
2004-05-31 12:06:27 +00:00
Richard Levitte
af2bf07404
SHA224_Update() and SHA224_Final() aren't implemented, and since
...
SHA224() uses SHA256_Update() and SHA256_Final() instead, let's just
create aliases in form of macros.
make update
2004-05-30 16:58:33 +00:00
Andy Polyakov
8c5dfa4c99
Typo in linux-ppc64 target.
2004-05-29 20:32:54 +00:00
Andy Polyakov
8d9fb0f04a
gcc -Wcast-qual clean-up.
2004-05-29 19:11:29 +00:00
Andy Polyakov
15fd2de37c
hpux-shared rules to cover even for GNU ld.
2004-05-28 22:38:05 +00:00
Andy Polyakov
1a83c37294
Unified hpux-shared rule. Verified with both 32- and 64-bit builds and
...
both vendor and GNU compilers. ./engine shared build are still busted.
I mean always were...
2004-05-28 22:18:48 +00:00
Andy Polyakov
674ee8b72d
Make sure we return 0 if test passed.
2004-05-28 21:42:40 +00:00
Andy Polyakov
1809e858bb
Eliminate compiler warnings and throw in performance table.
2004-05-28 10:15:58 +00:00
Andy Polyakov
2bbc970e10
Attempt to unify hpux-shared rules. More adjustments might be required
...
after more tests...
2004-05-27 22:23:40 +00:00
Andy Polyakov
da8348e938
SHA-224 test vectors added.
2004-05-27 19:46:07 +00:00
Richard Levitte
ef16f45081
Since num is now a size_t, it's not necssary to check for less than 0,
...
AND it avoids warnings on certain systems.
2004-05-27 09:20:42 +00:00
Richard Levitte
4d692e1ba0
Synchronise VMS with the Unixly Malefiles.
2004-05-26 17:05:51 +00:00
Andy Polyakov
6577e16920
Documentation note for Win32 glue between BIO layer and compiler run-time.
2004-05-25 20:32:17 +00:00
Andy Polyakov
3fc378aa0b
Framework for glueing BIO layer and Win32 compiler run-time. Goal is to
...
make it possible to produce for a unified binary build, which can be
used with a variety of Win32 compilers.
2004-05-25 20:31:03 +00:00
Richard Levitte
f2bfbcef76
make update
2004-05-25 09:41:00 +00:00
Richard Levitte
6713a4835f
Move some COMP functions to be inside the #ifndef OPENSSL_NO_COMP
...
wrapping preprocessor directive. This also removes a duplicate
declaration.
2004-05-20 23:47:57 +00:00
Andy Polyakov
46ceb15c39
SHA-256/-512 test and benchmark.
2004-05-20 21:49:38 +00:00
Andy Polyakov
109d3123c3
While size_t-fying let's not forget to update documentation:-)
2004-05-20 21:39:50 +00:00
Andy Polyakov
63077bd40c
SHA-256/-512 update. A bug fix, SHA-512 tune-up for AMD64, hook for SSE2
...
code, Makefile update.
2004-05-20 21:24:41 +00:00
Andy Polyakov
df364f1b00
Stress collector/padding function.
2004-05-20 21:20:19 +00:00
Andy Polyakov
bc767216d9
Final API adaptation. Final, "all openssl" performance numbers [not mixture
...
of different implementations]. Real-life performance improvement is rated
at 2-3x, not 6x as preliminary announced.
2004-05-20 21:18:09 +00:00
Dr. Stephen Henson
cacd830f02
Delete unused function from libeay.num, replace with one
...
that does exist.
2004-05-19 17:08:05 +00:00
Dr. Stephen Henson
eda52e175a
Delete obsolete and unimplemented function.
2004-05-19 17:05:02 +00:00
Dr. Stephen Henson
665560e9a4
Add SHA256 and SHA512 algorithms to mkdef.pl.
...
Fix mkdef.pl script to avoid infinite loop when
parsing sha.h.
2004-05-19 17:03:59 +00:00
Richard Levitte
c4fc8b5bf4
X509_policy_lib_init is declared but not defined, so it raises havoc
...
when trying to build a shared library on VMS or Windows...
2004-05-19 14:19:51 +00:00
Geoff Thorpe
9c52d2cc75
After the latest round of header-hacking, regenerate the dependencies in
...
the Makefiles. NB: this commit is probably going to generate a huge posting
and it is highly uninteresting to read.
2004-05-17 19:26:06 +00:00
Geoff Thorpe
0f814687b9
Deprecate the recursive includes of bn.h from various API headers (asn1.h,
...
dh.h, dsa.h, ec.h, ecdh.h, ecdsa.h, rsa.h), as the opaque bignum types are
already declared in ossl_typ.h. Add explicit includes for bn.h in those C
files that need access to structure internals or API functions+macros.
2004-05-17 19:14:22 +00:00
Geoff Thorpe
f0eae953e2
Remove some unnecessary recursive includes from the internal apps.h header,
...
and include bn.h in those C files that need bignum functionality.
2004-05-17 19:05:32 +00:00
Geoff Thorpe
298a2f9e58
Because of recent reductions in header interdependencies, these files need
...
to include crypto.h directly.
2004-05-17 19:01:15 +00:00
Geoff Thorpe
ac0d0a5ecd
I can't verify this directly, but recent changes will probably require that
...
the cryptodev implementation include bn.h directly (when building with
OPENSSL_NO_DEPRECATED that is).
2004-05-17 18:58:47 +00:00
Geoff Thorpe
f15390bdb4
The inclusion of bn.h from the engine.h API header has been deprecated, so
...
the engine implementations need to include bn.h to manipulate bignums.
2004-05-17 18:56:15 +00:00
Geoff Thorpe
d095b68d63
Deprecate quite a few recursive includes from the ssl.h API header and
...
remove some unnecessary includes from the internal header ssl_locl.h. This
then requires adding includes for bn.h in four C files.
2004-05-17 18:53:47 +00:00
Geoff Thorpe
508999fa7d
Deprecate some recursive includes from the store.h API header, and put back
...
required includes back via the internal header and str_lib.c.
2004-05-17 18:49:06 +00:00
Geoff Thorpe
210a21bc8d
Reduce dependencies on crypto.h by moving the opaque definition of
...
CRYPTO_EX_DATA and the new/free/dup callback prototypes to ossl_typ.h.
2004-05-17 18:39:00 +00:00
Geoff Thorpe
678c1e025b
Moving opaque definitions to ossl_typ.h lets us reduce header dependencies.
...
Deprecate inclusion of crypto.h from ui.h.
2004-05-17 18:01:28 +00:00
Andy Polyakov
1ab61a9179
Make reservations for FIPS code in HEAD branch, so that the moment FIPS
...
comes in we have required macros in place.
2004-05-17 15:49:13 +00:00
Geoff Thorpe
d6dda126b7
Make some more API types opaquely available from ossl_typ.h, meaning the
...
corresponding headers are only required for API functions or structure
details. This now includes the bignum types and BUF_MEM. Subsequent commits
will remove various dependencies on bn.h and buffer.h and update the
makefile dependencies.
2004-05-15 18:32:08 +00:00
Geoff Thorpe
7771b6c5b5
This file implements various functions that have since been redefined as
...
macros. I'm removing this from the NO_DEPRECATED build.
2004-05-15 18:26:15 +00:00
Dr. Stephen Henson
4843acc868
Fixes so alerts are sent properly in s3_pkt.c
...
PR: 851
2004-05-15 17:55:07 +00:00
Andy Polyakov
9e0aad9fd6
size_t-fication of message digest APIs. We should size_t-fy more APIs...
2004-05-15 11:29:55 +00:00
Richard Levitte
1c7a0e2856
Reimplement old functions, so older software that link to libcrypto
...
don't crash and burn.
2004-05-14 17:56:30 +00:00
Richard Levitte
abd23881c1
Synchronise o_str.c between 0.9.8-dev and 0.9.7-stable.
2004-05-13 22:39:56 +00:00
Richard Levitte
d1739eb2d6
make update
2004-05-13 21:38:47 +00:00
Richard Levitte
2faa930bb0
Let's make life easier and have the VMS version of the configuration be
...
generated from the Unixly configuration file.
2004-05-13 21:38:26 +00:00
Andy Polyakov
e14f4aab0a
CHANGES to mention improved PowerPC platform support.
2004-05-13 13:58:44 +00:00
Andy Polyakov
c842261b1b
SHA-224/-256/-384/-512 implementation. This is just sheer code commit.
...
Makefile modifications, make test, etc. will appear later...
2004-05-13 13:48:33 +00:00
Dr. Stephen Henson
df368ecce4
Make self signing option of 'x509' use random serial numbers too.
2004-05-12 18:20:37 +00:00
Andy Polyakov
1e6bccc240
SSE2 SHA512_Transform implementation. No, it's not used anywhere yet and
...
is subject to change as C implementation is added...
2004-05-06 10:41:07 +00:00
Andy Polyakov
d3adc3d3ed
SSE2 accelerated bn_mul_add_words. Code is currently disabled till proper
...
config and run-time support is added.
PR: 788
Submitted by: <dean@arctic.org >
Reviewed by: <appro>
Obtained from: http://arctic.org/~dean/crypto/rsa.html
2004-05-06 10:36:49 +00:00
Andy Polyakov
10e7d6d526
Support for IA-32 SSE2 instruction set.
2004-05-06 10:31:09 +00:00
Richard Levitte
8d472bdd84
Remove the creation of $(INSTALL_PREFIX)$(OPENSSLDIR)/lib, since we don't
...
use it.
Notified by Frédéric L. W. Meunier <0@pervalidus.tk > in PR 713
2004-05-06 09:46:41 +00:00
Richard Levitte
430d7afd80
When the pointer 'from' changes, it's stored length needs to change as
...
well.
Notified by Frank Kardel <kardel@acm.org > in PR 879.
2004-05-06 09:33:22 +00:00
Geoff Thorpe
ca982e4870
Fix realloc usage in ec_curve.c
...
Submitted by: Nils Larsch
Reviewed by: Geoff Thorpe
2004-05-04 20:08:55 +00:00
Bodo Möller
d5f686d808
- update from current 0.9.6-stable CHANGES file
...
- update from current 0.9.7-stable CHANGES file:
Now here we have "CHANGES between 0.9.7e and 0.9.8", and I hope
that all patches mentioned for 0.9.7d and 0.9.7e actually are
in the CVS HEAD, i.e. what is to become 0.9.8.
I have rewritten the 'openssl ca -create_serial' entry (0.9.8)
so that it explains the earlier change that is now listed (0.9.7e).
The ENGINE_set_default typo bug entry has been moved from 0.9.8
to 0.9.7b, which is where it belongs.
2004-05-04 01:15:48 +00:00
Geoff Thorpe
08e1cbc62c
The new BN_CTX code makes this sort of abuse unnecessary.
2004-04-28 18:34:39 +00:00
Andy Polyakov
b6b4fdc9e2
Oops! Typo in ./config...
2004-04-27 22:17:25 +00:00
Andy Polyakov
dd55880644
Improved PowerPC support. Proper ./config support for ppc targets,
...
especially for AIX. But most important BIGNUM assembler implementation
submitted by IBM.
Submitted by: Peter Waltenberg <pwalten@au1.ibm.com >
Reviewed by: appro
2004-04-27 22:05:50 +00:00
Dr. Stephen Henson
bd1640bb01
Make ASN1 code work again...
2004-04-27 18:33:40 +00:00
Geoff Thorpe
081991ac01
With the new dynamic BN_CTX implementation, there should be no need for
...
additional contexts.
2004-04-27 13:24:51 +00:00
Geoff Thorpe
8a85c341fe
The problem of rsa key-generation getting stuck in a loop for (pointlessly)
...
small key sizes seems to result from the code continually regenerating the
same prime value once the range is small enough. From my tests, this change
fixes the problem by setting an escape velocity of 3 repeats for the second
of the two primes.
PR: 874
2004-04-26 15:38:44 +00:00
Geoff Thorpe
bcfea9fb25
Allow RSA key-generation to specify an arbitrary public exponent. Jelte
...
proposed the change and submitted the patch, I jiggled it slightly and
adjusted the other parts of openssl that were affected.
PR: 867
Submitted by: Jelte Jansen
Reviewed by: Geoff Thorpe
2004-04-26 15:31:35 +00:00
Dr. Stephen Henson
f3f52d7f45
More ASN1 reformat/tidy.
2004-04-25 12:46:39 +00:00
Dr. Stephen Henson
8845420f4e
Reformat/tidy some of the ASN1 code.
2004-04-24 17:02:48 +00:00
Dr. Stephen Henson
d735c64905
Fix leak.
...
PR:870
2004-04-22 12:37:16 +00:00
Geoff Thorpe
955d465c2c
As far as I can tell, the bugfix this comment refers to was committed to
...
0.9.7-stable as well as HEAD (and doesn't apply to the 0.9.6-engine
variant).
2004-04-21 15:12:20 +00:00
Geoff Thorpe
8c521c7a34
Extend the index parameter checking from sk_value to sk_set(). Also tidy up
...
some similar code elsewhere.
Thanks to Francesco Petruzzi for bringing this to my attention.
2004-04-21 15:08:56 +00:00
Dr. Stephen Henson
77475142ec
New option to 'x509' -next_serial. This outputs the certificate
...
serial number plus 1 to the output file. Its purpose is to allow
serial number files to be initialized when random serial numbers
are used.
2004-04-21 12:46:20 +00:00
Dr. Stephen Henson
90fac84066
Use X509_get_serialNumber() instead of accessing internals in x509.c
2004-04-21 12:43:21 +00:00
Dr. Stephen Henson
64674bcc8c
Reduce chances of issuer and serial number duplication by use of random
...
initial serial numbers.
PR: 842
2004-04-20 12:05:26 +00:00
Richard Levitte
1dc2d655ad
Whooaaaaa, the BN_CTX_DEBUG macro really produces output these
...
days... A little too much for my tests, currently...
2004-04-20 11:53:33 +00:00
Richard Levitte
863d2b196f
Print the debug thingies on stderr instead of stdout. If for nothing
...
else then at least so bc doesn't have problems parsing the output from
bntest :-).
2004-04-20 10:57:07 +00:00
Geoff Thorpe
c57bc2dc51
make update
2004-04-19 18:33:41 +00:00
Geoff Thorpe
6c0dcdc211
"make update" noticed a new function.
2004-04-19 18:32:19 +00:00
Geoff Thorpe
28ded31b97
More updates for the header cleanups (and apologies, again, for not having
...
consolidated these prior to committing).
2004-04-19 18:30:41 +00:00
Geoff Thorpe
0fc07a0f9c
When generating dependencies in the makefiles, generate the reduced
...
dependencies of the OPENSSL_NO_DEPRECATED mode. This prevents dependencies
being reproduced for "deprecated" header behaviour when a developer doesn't
define the symbol (with the subsequent CVS wars that can ensue).
2004-04-19 18:19:24 +00:00
Geoff Thorpe
823a67b0a9
header cleanup in apps/
2004-04-19 18:13:07 +00:00
Geoff Thorpe
60a938c6bc
(oops) Apologies all, that last header-cleanup commit was from the wrong
...
tree. This further reduces header interdependencies, and makes some
associated cleanups.
2004-04-19 18:09:28 +00:00
Geoff Thorpe
3a87a9b9db
Reduce header interdependencies, initially in engine.h (the rest of the
...
changes are the fallout). As this could break source code that doesn't
directly include headers for interfaces it uses, changes to recursive
includes are covered by the OPENSSL_NO_DEPRECATED symbol. It's better to
define this when building and using openssl, and then adapt code where
necessary - this is how to stay current. However the mechanism exists for
the lethargic.
2004-04-19 17:46:04 +00:00
Dr. Stephen Henson
ae44fc1ec4
Clear error if unique_subject lookup fails.
2004-04-15 00:32:19 +00:00