Richard Levitte
43257b9f51
Define CFLAGS as cflags on VMS as well
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-14 00:14:20 +01:00
Andy Polyakov
10771e3421
Add Broadwell performance results.
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit b3d7294976 )
2015-01-13 21:42:13 +01:00
Matt Caswell
36f694e09a
Make output from openssl version -f consistent with previous versions
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit 2d2671790e )
2015-01-13 11:28:54 +00:00
Matt Caswell
635ca4446f
Fix warning where BIO_FLAGS_UPLINK was being redefined.
...
This warning breaks the build in 1.0.0 and 0.9.8
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit b1ffc6ca1c )
2015-01-13 11:24:52 +00:00
Matt Caswell
bd00b8dc65
Avoid deprecation problems in Visual Studio 13
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit 86d21d0b95 )
2015-01-13 09:47:09 +00:00
Rich Salz
2194b36979
Allow multiple IDN xn-- indicators
...
Update the X509v3 name parsing to allow multiple xn-- international
domain name indicators in a name. Previously, only allowed one at
the beginning of a name, which was wrong.
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
(cherry picked from commit 31d1d3741f )
2015-01-12 12:40:29 -05:00
Kurt Roeckx
e81a83657c
Make build reproducible
...
It contained a date on when it was build.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-01-10 16:31:27 +01:00
Matt Caswell
cbbb952f3a
Further windows specific .gitignore entries
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 41c9cfbc4e )
2015-01-09 23:40:41 +00:00
Matt Caswell
04f670cf3d
Update .gitignore with windows files to be excluded from git
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
Conflicts:
.gitignore
2015-01-09 11:30:07 +00:00
Matt Caswell
5cee72382c
Fix build failure on Windows due to undefined cflags identifier
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 5c5e7e1a7e )
2015-01-08 19:24:09 +00:00
Matt Caswell
7c6a3cf237
A memory leak can occur in dtls1_buffer_record if either of the calls to
...
ssl3_setup_buffers or pqueue_insert fail. The former will fail if there is a
malloc failure, whilst the latter will fail if attempting to add a duplicate
record to the queue. This should never happen because duplicate records should
be detected and dropped before any attempt to add them to the queue.
Unfortunately records that arrive that are for the next epoch are not being
recorded correctly, and therefore replays are not being detected.
Additionally, these "should not happen" failures that can occur in
dtls1_buffer_record are not being treated as fatal and therefore an attacker
could exploit this by sending repeated replay records for the next epoch,
eventually causing a DoS through memory exhaustion.
Thanks to Chris Mueller for reporting this issue and providing initial
analysis and a patch. Further analysis and the final patch was performed by
Matt Caswell from the OpenSSL development team.
CVE-2015-0206
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
(cherry picked from commit 652ff0f4796eecd8729b4690f2076d1c7ccb2862)
2015-01-08 15:46:42 +00:00
Dr. Stephen Henson
be3fb8d15d
Unauthenticated DH client certificate fix.
...
Fix to prevent use of DH client certificates without sending
certificate verify message.
If we've used a client certificate to generate the premaster secret
ssl3_get_client_key_exchange returns 2 and ssl3_get_cert_verify is
never called.
We can only skip the certificate verify message in
ssl3_get_cert_verify if the client didn't send a certificate.
Thanks to Karthikeyan Bhargavan for reporting this issue.
CVE-2015-0205
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-08 15:46:42 +00:00
Matt Caswell
fb73f12a9c
Follow on from CVE-2014-3571. This fixes the code that was the original source
...
of the crash due to p being NULL. Steve's fix prevents this situation from
occuring - however this is by no means obvious by looking at the code for
dtls1_get_record. This fix just makes things look a bit more sane.
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2015-01-08 15:46:19 +00:00
Dr. Stephen Henson
25d738c3a4
Fix crash in dtls1_get_record whilst in the listen state where you get two
...
separate reads performed - one for the header and one for the body of the
handshake record.
CVE-2014-3571
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-08 11:20:29 +00:00
Andy Polyakov
49446ea62f
Fix for CVE-2014-3570 (with minor bn_asm.c revamp).
...
Reviewed-by: Emilia Kasper <emilia@openssl.org >
(cherry picked from commit 56df92efb6893abe323307939425957ce878c8f0)
2015-01-08 11:20:29 +00:00
Dr. Stephen Henson
f33ab61b5f
fix error discrepancy
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 4a4d415857 )
2015-01-07 18:10:38 +00:00
Andy Polyakov
2d63d0c84a
Fix irix-cc build.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit e464403d0b )
2015-01-07 18:41:17 +01:00
Richard Levitte
cfb5d6c10a
VMS fixups for 1.0.2
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-01-07 02:15:35 +01:00
Dr. Stephen Henson
a936ba1148
use correct credit in CHANGES
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 4138e38825 )
2015-01-06 22:41:27 +00:00
Emilia Kasper
ed736ddd74
Only inherit the session ID context in SSL_set_SSL_CTX if the existing
...
context was also inherited (matches that of the existing SSL_CTX).
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit ac8e9cbe14 )
2015-01-06 23:10:03 +01:00
Dr. Stephen Henson
c7c2a56a1b
use correct function name
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit cb62ab4b17 )
2015-01-06 21:04:38 +00:00
Dr. Stephen Henson
129344a8fb
RT3662: Allow leading . in nameConstraints
...
Change by SteveH from original by John Denker (in the RT)
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 77ff1f3b8b )
2015-01-06 15:33:41 -05:00
Martin Brejcha
be6e766953
Fix memory leak.
...
Fix memory leak by freeing up saved_message.data if it is not NULL.
PR#3489
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 41cd41c441 )
2015-01-06 16:49:36 +00:00
Matt Caswell
8dc461eccf
Remove blank line from start of cflags character array in buildinf.h
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit b691154e18 )
2015-01-06 15:35:15 +00:00
Dr. Stephen Henson
4b4c1fcc88
Only allow ephemeral RSA keys in export ciphersuites.
...
OpenSSL clients would tolerate temporary RSA keys in non-export
ciphersuites. It also had an option SSL_OP_EPHEMERAL_RSA which
enabled this server side. Remove both options as they are a
protocol violation.
Thanks to Karthikeyan Bhargavan for reporting this issue.
(CVE-2015-0204)
Reviewed-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-06 12:45:10 +00:00
Andy Polyakov
1cfd7cf3cc
CHANGES: mention "universal" ARM support.
...
This is re-commit without unrelated modification.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 0548505f4c )
2015-01-06 12:15:40 +01:00
Andy Polyakov
2996157127
Revert "CHANGES: mention "universal" ARM support."
...
This reverts commit caeed719fe .
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-06 12:12:15 +01:00
Andy Polyakov
caeed719fe
CHANGES: mention "universal" ARM support.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 4fec915069 )
2015-01-06 11:21:12 +01:00
Andy Polyakov
f4868c9921
Remove inconsistency in ARM support.
...
This facilitates "universal" builds, ones that target multiple
architectures, e.g. ARMv5 through ARMv7. See commentary in
Configure for details.
Reviewed-by: Ard Biesheuvel <ard.biesheuvel@linaro.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit c1669e1c20 )
2015-01-06 11:14:23 +01:00
Dr. Stephen Henson
4aaf1e493c
ECDH downgrade bug fix.
...
Fix bug where an OpenSSL client would accept a handshake using an
ephemeral ECDH ciphersuites with the server key exchange message omitted.
Thanks to Karthikeyan Bhargavan for reporting this issue.
CVE-2014-3572
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit b15f876964 )
2015-01-05 23:34:57 +00:00
Dr. Stephen Henson
d96c24926d
update ordinals
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 31c65a7bc0 )
2015-01-05 16:51:41 +00:00
Adam Langley
d9b277e085
Ensure that the session ID context of an SSL* is updated
...
when its SSL_CTX is updated.
From BoringSSL commit
https://boringssl.googlesource.com/boringssl/+/a5dc545bbcffd9c24cebe65e9ab5ce72d4535e3a
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 61aa44ca99 )
2015-01-05 17:33:02 +01:00
Dr. Stephen Henson
aace6dbcb3
Constify ASN1_TYPE_cmp add X509_ALGOR_cmp.
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 4c52816d35 )
2015-01-05 14:54:38 +00:00
Dr. Stephen Henson
85cfc188c0
Fix various certificate fingerprint issues.
...
By using non-DER or invalid encodings outside the signed portion of a
certificate the fingerprint can be changed without breaking the signature.
Although no details of the signed portion of the certificate can be changed
this can cause problems with some applications: e.g. those using the
certificate fingerprint for blacklists.
1. Reject signatures with non zero unused bits.
If the BIT STRING containing the signature has non zero unused bits reject
the signature. All current signature algorithms require zero unused bits.
2. Check certificate algorithm consistency.
Check the AlgorithmIdentifier inside TBS matches the one in the
certificate signature. NB: this will result in signature failure
errors for some broken certificates.
3. Check DSA/ECDSA signatures use DER.
Reencode DSA/ECDSA signatures and compare with the original received
signature. Return an error if there is a mismatch.
This will reject various cases including garbage after signature
(thanks to Antti Karjalainen and Tuomo Untinen from the Codenomicon CROSS
program for discovering this case) and use of BER or invalid ASN.1 INTEGERs
(negative or with leading zeroes).
CVE-2014-8275
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 684400ce19 )
2015-01-05 14:36:06 +00:00
Matt Caswell
6ee7de1eb3
Additional fix required for no-srtp to work
...
RT3638
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-01-05 14:28:40 +00:00
Piotr Sikora
7b0194db42
Fix building with no-srtp
...
RT3638
Reviewed-by: Emilia Käsper <emilia@openssl.org >
Conflicts:
ssl/t1_lib.c
2015-01-05 14:28:40 +00:00
Emilia Kasper
bfaf796241
Add a clang build target for linux-x86_64
...
This change documents the world as-is, by turning all warnings on,
and then turning warnings that trigger off again.
Reviewed-by: Andy Polyakov <appro@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-01-05 14:10:33 +01:00
Andy Polyakov
c02e2d6a71
ecp_nistz256-x86_64.pl: fix occasional failures.
...
RT: 3607
Reviewed-by: Adam Langley <agl@google.com >
Reviewed-by: Emilia Kasper <emilia@openssl.org >
(cherry picked from commit 9e557ab262 )
2015-01-04 23:22:06 +01:00
Rich Salz
9f49067c9e
RT2914: NULL check missing in X509_name_canon
...
Check for NULL return from X509_NAME_ENTRY_new()
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 2c60925d1c )
2015-01-04 14:52:01 -05:00
Dr. Stephen Henson
5396c1190f
Update SGC flag comment.
...
Since SGC has been removed from OpenSSL 1.0.2 the
SSL3_FLAGS_SGC_RESTART_DONE is no longer used. However the #define is
retained for compatibility.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-02 23:12:37 +00:00
Dr. Stephen Henson
cf95b2d66a
Remove MS SGC
...
MS Server gated cryptography is obsolete and dates from the time of export
restrictions on strong encryption and is only used by ancient versions of
MSIE.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 63eab8a620 )
2015-01-02 23:01:38 +00:00
Dr. Stephen Henson
47606dda67
Clear existing extension state.
...
When parsing ClientHello clear any existing extension state from
SRP login and SRTP profile.
Thanks to Karthikeyan Bhargavan for reporting this issue.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 4f605ccb77 )
Conflicts:
ssl/t1_lib.c
2015-01-02 22:27:40 +00:00
Dominik Neubauer
c30c876176
typo in s_client
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
2014-12-31 11:19:03 +01:00
Kurt Roeckx
73bda31b4c
Make "run" volatile
...
RT#3629
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-30 16:54:56 +01:00
Thorsten Glaser
dc00fb9d51
Document openssl dgst -hmac option
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-30 16:53:48 +01:00
Kurt Roeckx
06c3e65deb
dlfcn: always define _GNU_SOURCE
...
We need this for the freebsd kernel with glibc as used in the Debian kfreebsd
ports. There shouldn't be a problem defining this on systems not using glibc.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-30 16:53:48 +01:00
Kurt Roeckx
5984c7e3d5
Fix memory leak in the apps
...
The BIO_free() allocated ex_data again that we already freed.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-30 16:53:48 +01:00
Alok Menghrajani
beef278bd7
Improves certificates HOWTO
...
* adds links to various related documents.
* fixes a few typos.
* rewords a few sentences.
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 67472bd82b )
2014-12-22 16:26:03 +01:00
Richard Levitte
58191465ef
Small typo
...
Reviewed-by: Stephen Henson <steve@openssl.org >
(cherry picked from commit 7cfab40f43 )
2014-12-22 15:36:42 +01:00
Michael Tuexen
5760c8b82f
Fix incorrect OPENSSL_assert() usage.
...
Return an error code for I/O errors instead of an assertion failure.
PR#3470
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 2521fcd852 )
2014-12-20 14:46:28 +00:00
Matt Caswell
b651407268
Fix a problem if CFLAGS is too long cversion.c fails to compile when config
...
is run with --strict-warnings.
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit 488f16e31b )
2014-12-19 14:05:25 +00:00
Kurt Roeckx
a760dde681
Return error when a bit string indicates an invalid amount of bits left
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-18 15:04:58 +01:00
Dr. Stephen Henson
f5e4b6b5b5
Reject invalid constructed encodings.
...
According to X6.90 null, object identifier, boolean, integer and enumerated
types can only have primitive encodings: return an error if any of
these are received with a constructed encoding.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-12-17 14:34:36 +00:00
Emilia Kasper
9ca2cc78a9
Add a comment noting the padding oracle.
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit 03af843039 )
2014-12-17 14:55:47 +01:00
Emilia Kasper
0cf552230e
Revert "RT3425: constant-time evp_enc"
...
Causes more problems than it fixes: even though error codes
are not part of the stable API, several users rely on the
specific error code, and the change breaks them. Conversely,
we don't have any concrete use-cases for constant-time behaviour here.
This reverts commit 738911cde6 .
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-12-17 14:55:39 +01:00
Emilia Kasper
0e1c318ece
Build fixes
...
Various build fixes, mostly uncovered by clang's unused-const-variable
and unused-function errors.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-12-17 14:27:49 +01:00
Richard Levitte
8bc8450a26
Clear warnings/errors within RL_DEBUG code sections (RL_DEBUG should be renamed)
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-12-17 14:17:54 +01:00
Richard Levitte
bf68456f53
Clear warnings/errors within TLS_DEBUG code sections
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-12-17 14:17:54 +01:00
Richard Levitte
53332a75d1
Clear warnings/errors within KSSL_DEBUG code sections
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-12-17 14:17:54 +01:00
Richard Levitte
cd387d21da
Clear warnings/errors within CIPHER_DEBUG code sections
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-12-17 14:17:54 +01:00
Richard Levitte
0c403e80a9
Clear warnings/errors within CIPHER_DEBUG code sections
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-12-17 14:17:54 +01:00
Richard Levitte
553affbef7
Clear warnings/errors within BN_CTX_DEBUG code sections
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-12-17 14:17:54 +01:00
Adam Langley
1ecfb67335
Premaster secret handling fixes
...
From BoringSSL
- Send an alert when the client key exchange isn't correctly formatted.
- Reject overly short RSA ciphertexts to avoid a (benign) out-of-bounds memory access.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
(cherry picked from commit 4aecfd4d9f )
2014-12-17 14:03:43 +01:00
Bodo Möller
bb565cd29e
Backport regression test
...
master branch has a specific regression test for a bug in x86_64-mont5 code,
see commit cdfe0fdde6 .
This code is now in 1.0.2/1.0.1, so also backport the test.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-17 12:00:17 +01:00
Emilia Kasper
a43bcd9e96
Check for invalid divisors in BN_div.
...
Invalid zero-padding in the divisor could cause a division by 0.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-17 10:00:17 +01:00
Dr. Stephen Henson
c8667a2e46
Check return value of ssl3_output_cert_chain
...
(cherry picked from commit 66f96fe2d5 )
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-16 15:01:29 +00:00
Matt Caswell
5ee441162e
The dtls1_output_cert_chain function no longer exists so remove it from
...
ssl_locl.h
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-16 15:01:11 +00:00
Adam Langley
63ef0db60f
Don't set client_version to the ServerHello version.
...
The client_version needs to be preserved for the RSA key exchange.
This change also means that renegotiation will, like TLS, repeat the old
client_version rather than advertise only the final version. (Either way,
version change on renego is not allowed.) This is necessary in TLS to work
around an SChannel bug, but it's not strictly necessary in DTLS.
(From BoringSSL)
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit ec1af3c419 )
2014-12-16 14:46:57 +00:00
Matt Caswell
f74f5c8586
Add more meaningful OPENSSL_NO_ECDH error message for suite b mode
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit db812f2d70 )
2014-12-16 14:17:32 +00:00
Matt Caswell
a38ae11c48
Add OPENSSL_NO_ECDH guards
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit af6e2d51bf )
2014-12-16 14:17:12 +00:00
Matt Caswell
4ca0e95b92
Remove extraneous white space, and add some braces
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 55e530265a )
2014-12-16 00:13:36 +00:00
Matt Caswell
f9398b92de
DTLS fixes for signed/unsigned issues
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 1904d21123 )
2014-12-16 00:13:36 +00:00
Emilia Kasper
6af16ec5ee
Fix unused variable warning
...
The temporary variable causes unused variable warnings in opt mode with clang,
because the subsequent assert is compiled out.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-12-15 13:15:30 +01:00
Matt Caswell
d04a1e0b5b
Fix memory leak in s2_srvr.c if BUF_MEM_grow fails
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-12-13 00:04:32 +00:00
Matt Caswell
bb1ddd3d9a
Fixed memory leak if BUF_MEM_grow fails
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-12-13 00:03:58 +00:00
Matt Caswell
6806b69084
Fixed memory leak in the event of a failure of BUF_MEM_grow
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit 41bf250130 )
2014-12-08 16:44:09 +00:00
Matt Caswell
9809ab965b
Fix memory leak in SSL_new if errors occur.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit 76e6509085 )
2014-12-08 16:44:09 +00:00
Emilia Kasper
bd34823e55
Clarify the return values for SSL_get_shared_curve.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 376e2ca3e3 )
2014-12-05 18:31:57 +01:00
Emilia Kasper
533814c6b5
Add extra checks for odd-length EC curve lists.
...
Odd-length lists should be rejected everywhere upon parsing. Nevertheless,
be extra careful and add guards against off-by-one reads.
Also, drive-by replace inexplicable double-negation with an explicit comparison.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-05 18:24:54 +01:00
Emilia Kasper
b32474a40b
Make 'make update' succeed and run it
...
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2014-12-05 18:20:51 +01:00
Emilia Kasper
f6e725e868
Reject elliptic curve lists of odd lengths.
...
The Supported Elliptic Curves extension contains a vector of NamedCurves
of 2 bytes each, so the total length must be even. Accepting odd-length
lists was observed to lead to a non-exploitable one-byte out-of-bounds
read in the latest development branches (1.0.2 and master). Released
versions of OpenSSL are not affected.
Thanks to Felix Groebert of the Google Security Team for reporting this issue.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 33d5ba8629 )
2014-12-05 16:44:12 +01:00
Richard Levitte
7005eda3b6
s_client and s_server take -verify_{host,email,ip}, not -check*
...
RT3596
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-04 23:16:38 +01:00
Matt Caswell
9a6e994240
Remove incorrect code inadvertently introduced through commit 59669b6ab.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-04 14:18:45 +00:00
Matt Caswell
0b3c13092c
Remove "#if 0" code
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 4bb8eb9ce4 )
2014-12-03 09:31:39 +00:00
Matt Caswell
dfa2762bba
Only use the fallback mtu after 2 unsuccessful retransmissions if it is less
...
than the mtu we are already using
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 047f21593e )
2014-12-03 09:31:39 +00:00
Matt Caswell
c0b90b3237
Updates to s_client and s_server to remove the constant 28 (for IPv4 header
...
and UDP header) when setting an mtu. This constant is not always correct (e.g.
if using IPv6). Use the new DTLS_CTRL functions instead.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 464ce92026 )
2014-12-03 09:31:39 +00:00
Matt Caswell
788a5bad17
If we really get a situation where the underlying mtu is less than the minimum
...
we will support then dtls1_do_write can go into an infinite loop. This commit
fixes that.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit d3d9eef316 )
2014-12-03 09:31:39 +00:00
Matt Caswell
1872083ca1
Fix dtls_query_mtu so that it will always either complete with an mtu that is
...
at least the minimum or it will fail.
There were some instances in dtls1_query_mtu where the final mtu can end up
being less than the minimum, i.e. where the user has set an mtu manually. This
shouldn't be allowed. Also remove dtls1_guess_mtu that, despite having
logic for guessing an mtu, was actually only ever used to work out the minimum
mtu to use.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 1620a2e49c )
2014-12-03 09:31:39 +00:00
Matt Caswell
05e769f269
Remove instances in libssl of the constant 28 (for size of IPv4 header + UDP)
...
and instead use the value provided by the underlying BIO. Also provide some
new DTLS_CTRLs so that the library user can set the mtu without needing to
know this constant. These new DTLS_CTRLs provide the capability to set the
link level mtu to be used (i.e. including this IP/UDP overhead). The previous
DTLS_CTRLs required the library user to subtract this overhead first.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 59669b6abf )
Conflicts:
ssl/d1_both.c
2014-12-03 09:31:35 +00:00
Matt Caswell
ccecdb130c
There are a number of instances throughout the code where the constant 28 is
...
used with no explanation. Some of this was introduced as part of RT#1929. The
value 28 is the length of the IP header (20 bytes) plus the UDP header (8
bytes). However use of this constant is incorrect because there may be
instances where a different value is needed, e.g. an IPv4 header is 20 bytes
but an IPv6 header is 40. Similarly you may not be using UDP (e.g. SCTP).
This commit introduces a new BIO_CTRL that provides the value to be used for
this mtu "overhead". It will be used by subsequent commits.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 0d3ae34df5 )
2014-12-03 09:30:21 +00:00
Matt Caswell
80d09058af
The first call to query the mtu in dtls1_do_write correctly checks that the
...
mtu that we have received is not less than the minimum. If its less it uses the
minimum instead. The second call to query the mtu does not do that, but
instead uses whatever comes back. We have seen an instance in RT#3592 where we
have got an unreasonably small mtu come back. This commit makes both query
checks consistent.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 6abb0d1f8e )
2014-12-03 09:30:21 +00:00
Matt Caswell
3cc0c0d21c
The SSL_OP_NO_QUERY_MTU option is supposed to stop the mtu from being
...
automatically updated, and we should use the one provided instead.
Unfortunately there are a couple of locations where this is not respected.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 001235778a )
2014-12-03 09:30:21 +00:00
Matt Caswell
5e47008b61
Verify that we have a sensible message len and fail if not
...
RT#3592 provides an instance where the OPENSSL_assert that this commit
replaces can be hit. I was able to recreate this issue by forcing the
underlying BIO to misbehave and come back with very small mtu values. This
happens the second time around the while loop after we have detected that the
MTU has been exceeded following the call to dtls1_write_bytes.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit cf75017bfd )
2014-12-03 09:30:21 +00:00
Kurt Roeckx
e9f47de1f0
Use the SSLv23 method by default
...
If SSLv2 and SSLv3 are both disabled we still support SSL/TLS.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-02 11:28:42 +01:00
Richard Levitte
6a7a4a4e19
Check for FindNextFile when defining it rather than FindFirstFile
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-28 23:31:28 +01:00
Richard Levitte
67a0ea702b
[PR3597] Advance to the next state variant when reusing messages.
...
Previously, state variant was not advanced, which resulted in state
being stuck in the st1 variant (usually "_A").
This broke certificate callback retry logic when accepting connections
that were using SSLv2 ClientHello (hence reusing the message), because
their state never advanced to SSL3_ST_SR_CLNT_HELLO_C variant required
for the retry code path.
Reported by Yichun Zhang (agentzh).
Signed-off-by: Piotr Sikora <piotr@cloudflare.com >
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-28 23:31:28 +01:00
Richard Levitte
89e1e5c84d
Correct some layout issues, convert all remaining tabs to appropriate amounts of spaces.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 8123d158ab )
2014-11-28 17:04:15 +01:00
Alok Menghrajani
7cae6eeed0
Improves the proxy certificates howto doc.
...
The current documentation contains a bunch of spelling and grammar mistakes. I also
found it hard to understand some paragraphs, so here is my attempt to improve its
readability.
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 03b637a730 )
2014-11-28 17:04:15 +01:00
Matt Caswell
4b12a17fe3
Fix warning in ssl2_enc
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit f9ea4deba0 )
2014-11-27 21:46:04 +00:00
Matt Caswell
2e524475cd
Remove more references to dtls1_enc
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit eceef8fb86 )
2014-11-27 21:46:04 +00:00
Matt Caswell
ac3dc3ee87
Check EVP_Cipher return values for SSL2
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit 81ec01b217 )
2014-11-27 21:46:04 +00:00
Matt Caswell
63039a177a
Delete unused file
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit 4b87706d20 )
Conflicts:
ssl/d1_enc.c
2014-11-27 21:46:00 +00:00
Matt Caswell
ca88bd4112
Add checks to the return value of EVP_Cipher to prevent silent encryption failure.
...
PR#1767
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit fe78f08d15 )
2014-11-27 21:44:03 +00:00
Matt Caswell
1e7b4891cb
Remove redundant checks in ssl_cert_dup. This was causing spurious error messages when using GOST
...
PR#3613
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit fc3968a25c )
2014-11-27 20:51:59 +00:00
Matt Caswell
3623e24b45
Remove duplicated code
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-27 14:30:36 +00:00
Matt Caswell
e164582690
Tidy up ocsp help output
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 5e31a40f47 )
Conflicts:
apps/ocsp.c
2014-11-27 14:16:49 +00:00
André Guerreiro
4d3df37bc7
Add documentation on -timeout option in the ocsp utility
...
PR#3612
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit de87dd46c1 )
2014-11-27 14:14:52 +00:00
Guenter
261e64b85e
NetWare compilation fix.
...
Workaround for NetWare CodeWarrior compiler which doesn't properly lookup
includes when in same directory as the C file which includes it.
PR#3569
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit 333fad9f2d )
2014-11-27 14:03:57 +00:00
Matt Caswell
23cf88440c
Updates to X509_NAME_get_index_by_NID.pod submitted by user Bernardh via the wiki
...
Minor changes made by Matt Caswell
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 6484958645 )
2014-11-27 13:57:11 +00:00
Matt Caswell
bd8192604a
Updates to X509_NAME_add_entry_by_txt.pod submitted by user Bernardh via the wiki
...
Minor changes made by Matt Caswell.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit f281b8df70 )
2014-11-27 13:57:11 +00:00
Matt Caswell
8f8e7cec83
Updates to EVP_PKEY_encrypt.pod submitted by user Bernardh via the wiki
...
Minor changes made by Matt Caswell.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 34890ac18e )
2014-11-27 13:57:11 +00:00
Matt Caswell
14332e4331
Add include of ssl.h which is required by srtp.h
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit f67203836c )
2014-11-27 13:17:56 +00:00
Matt Caswell
60de554e4f
Fixed memory leak due to incorrect freeing of DTLS reassembly bit mask
...
PR#3608
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 8a35dbb6d8 )
2014-11-26 10:11:25 +00:00
Matt Caswell
c57400e86c
Corrected comments in ssl.h about SSLv23_method and friends
...
PR#3574
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 3a0765882c )
2014-11-25 22:24:34 +00:00
Dr. Stephen Henson
f90fd2b017
Print out Suite B status.
...
When using the -xcert option to test certificate validity print out
if we pass Suite B compliance. We print out "not tested" if we aren't
in Suite B mode.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 7d4cdededc )
2014-11-20 22:14:45 +00:00
Dr. Stephen Henson
8d325d1d36
Fix SuiteB chain checking logic.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 7255ca99df )
2014-11-20 22:14:29 +00:00
David Benjamin
03d14f5887
Do not resume a session if the negotiated protocol version does not match
...
the session's version (server).
See also BoringSSL's commit bdf5e72f50e25f0e45e825c156168766d8442dde.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 9e189b9dc1 )
2014-11-20 16:31:35 +01:00
Matt Caswell
6f71d7da64
When using EVP_PKEY_derive with a KDF set, a negative error from
...
ECDH_compute_key is silently ignored and the KDF is run on duff data
Thanks to github user tomykaira for the suggested fix.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 8d02bebddf )
2014-11-20 15:21:37 +00:00
Emilia Kasper
0b9e82763f
Clean up CHANGES
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 31832e8ff1 )
Conflicts:
CHANGES
2014-11-20 15:19:42 +01:00
Emilia Kasper
e5f261df73
Ensure SSL3_FLAGS_CCS_OK (or d1->change_cipher_spec_ok for DTLS) is reset
...
once the ChangeCipherSpec message is received. Previously, the server would
set the flag once at SSL3_ST_SR_CERT_VRFY and again at SSL3_ST_SR_FINISHED.
This would allow a second CCS to arrive and would corrupt the server state.
(Because the first CCS would latch the correct keys and subsequent CCS
messages would have to be encrypted, a MitM attacker cannot exploit this,
though.)
Thanks to Joeri de Ruiter for reporting this issue.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit e94a6c0ede )
2014-11-20 15:17:36 +01:00
Emilia Kasper
9baee0216f
Always require an advertised NewSessionTicket message.
...
The server must send a NewSessionTicket message if it advertised one
in the ServerHello, so make a missing ticket message an alert
in the client.
An equivalent change was independently made in BoringSSL, see commit
6444287806d801b9a45baf1f6f02a0e3a16e144c.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit de2c7504eb )
2014-11-20 15:17:36 +01:00
Emilia Kasper
5d23e1303c
Remove ssl3_check_finished.
...
The client sends a session ID with the session ticket, and uses
the returned ID to detect resumption, so we do not need to peek
at handshake messages: s->hit tells us explicitly if we're resuming.
An equivalent change was independently made in BoringSSL, see commit
407886f589cf2dbaed82db0a44173036c3bc3317.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 980bc1ec61 )
Conflicts:
ssl/s3_clnt.c
2014-11-20 15:17:30 +01:00
Emilia Kasper
f7c7aa69f7
Set s->hit when resuming from external pre-shared secret.
...
The same change was independently made in BoringSSL, see commit
9eaeef81fa2d4fd6246dc02b6203fa936a5eaf67
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 7b3ba508af )
2014-11-20 15:09:45 +01:00
Emilia Kasper
ce5f32cfa7
Reset s->tlsext_ticket_expected in ssl_scan_serverhello_tlsext.
...
This ensures that it's zeroed even if the SSL object is reused
(as in ssltest.c). It also ensures that it applies to DTLS, too.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit a06cd5d056 )
2014-11-20 15:09:45 +01:00
Matt Caswell
5891c226d8
Fix s_server -ssl2. Previously this reported "Error setting EC curve"
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 13d568661c )
2014-11-19 23:57:02 +00:00
Dr. Stephen Henson
017a15cbd2
New option no-ssl3-method which removes SSLv3_*method
...
When no-ssl3 is set only make SSLv3 disabled by default. Retain -ssl3
options for s_client/s_server/ssltest.
When no-ssl3-method is set SSLv3_*method() is removed and all -ssl3
options.
We should document this somewhere, e.g. wiki, FAQ or manual page.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 3881d8106d )
2014-11-19 22:54:30 +00:00
Dr. Stephen Henson
786370b1b0
Fix excert logic.
...
If no keyfile has been specified use the certificate file instead.
Fix typo: we need to check the chain is not NULL, not the chain file.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-19 22:50:00 +00:00
Dr. Stephen Henson
56e8dc542b
Process signature algorithms before deciding on certificate.
...
The supported signature algorithms extension needs to be processed before
the certificate to use is decided and before a cipher is selected (as the
set of shared signature algorithms supported may impact the choice).
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-19 14:44:42 +00:00
Matt Caswell
9ef1d283fe
Added RFC 7027 references
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-18 13:10:41 +00:00
Matt Caswell
5a4a949904
Fixed cms-test.pl for no-ec2m
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-18 13:10:23 +00:00
Matt Caswell
ffa69c1ced
Added OPENSSL_NO_EC2M guards around the default EC curves
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-18 13:10:01 +00:00
Jan Hykel
305e2b4111
Don't use msg on error.
...
Don't attempt to access msg structure if recvmsg returns an error.
PR#3483
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 012aa9ec76 )
2014-11-17 12:41:47 +00:00
Dr. Stephen Henson
ba7aaa5622
Fix cross reference table generator.
...
If the hash or public key algorithm is "undef" the signature type
will receive special handling and shouldn't be included in the
cross reference table.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 55f7fb8848 )
2014-11-13 13:35:25 +00:00
Alok Menghrajani
2ad842b86a
Fixes a minor typo in the EVP docs.
...
Out is the buffer which needs to contain at least inl + cipher_block_size - 1 bytes. Outl
is just an int*.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 5211e094de )
2014-11-12 21:05:01 +00:00
Michal Bozon
297a8fd4ac
Correct timestamp output when clock_precision_digits > 0
...
PR#3535
Reviewed-by: Stephen Henson <steve@openssl.org >
2014-11-12 20:52:52 +00:00
Matt Caswell
5b3a5e3e90
Fix free of garbage pointer. PR#3595
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit e04d426bf9 )
2014-11-12 20:29:27 +00:00
Kurt Roeckx
40e214a23b
Fix warning about negative unsigned intergers
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-11-11 15:47:54 +01:00
Russell Coker
39679d858a
Fix datarace reported by valgrind/helgrind
...
This doesn't really fix the datarace but changes it so it can only happens
once. This isn't really a problem since we always just set it to the same
value. We now just stop writing it after the first time.
PR3584, https://bugs.debian.org/534534
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-11-10 18:35:50 +01:00
Daniel Kahn Gillmor
0ec6898c67
Allow ECDHE and DHE as forward-compatible aliases for EECDH and EDH
...
see RT #3203
Future versions of OpenSSL use the canonical terms "ECDHE" and "DHE"
as configuration strings and compilation constants. This patch
introduces aliases so that the stable 1.0.2 branch can be
forward-compatible with code and configuration scripts that use the
normalized terms, while avoiding changing any library output for
stable users.
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-10 10:58:49 +01:00
Andy Polyakov
1e10aee2a7
armv4cpuid.S: fix compilation error in pre-ARMv7 build.
...
PR: 3474
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
(cherry picked from commit 6696203963 )
2014-10-30 20:31:50 +01:00
Andy Polyakov
34a136d90f
md32_common.h: address compiler warning in HOST_c2l.
...
Reviewed-by: Stephen Henson <steve@openssl.org >
(cherry picked from commit d45282fc7c )
2014-10-29 10:55:15 +01:00
Samuel Neves
42af669ff2
Use only unsigned arithmetic in constant-time operations
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-10-28 20:42:22 +01:00
Emilia Kasper
4c75f4e5ca
Tighten session ticket handling
...
Tighten client-side session ticket handling during renegotiation:
ensure that the client only accepts a session ticket if the server sends
the extension anew in the ServerHello. Previously, a TLS client would
reuse the old extension state and thus accept a session ticket if one was
announced in the initial ServerHello.
Reviewed-by: Bodo Moeller <bodo@openssl.org >
(cherry picked from commit d663df2399 )
2014-10-28 17:38:23 +01:00
Emilia Kasper
1380317483
Sync CHANGES
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-10-27 17:52:15 +01:00
Emilia Kasper
a35f7adf5c
Fix ssltest logic when some protocols are compiled out.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
(cherry picked from commit fd28a41ec8 )
Conflicts:
ssl/ssltest.c
2014-10-27 16:33:28 +01:00
Dr. Stephen Henson
1ce95f1960
Copy negotiated parameters in SSL_set_SSL_CTX.
...
SSL_set_SSL_CTX is used to change the SSL_CTX for SNI, keep the
supported signature algorithms and raw cipherlist.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 14e14bf696 )
2014-10-24 14:01:01 +01:00
Dr. Stephen Henson
51695b98f1
Process signature algorithms in ClientHello late.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit c800c27a8c )
Conflicts:
ssl/ssl.h
ssl/ssl_err.c
ssl/ssl_locl.h
2014-10-24 13:57:23 +01:00
Dr. Stephen Henson
82182413a4
Parse custom extensions after SNI.
...
Since SNI will typically switch the SSL_CTX structure to the one
corresponding to the appopriate server we need to parse custom
extensions using the switched SSL_CTX not the original one. This
is done by parsing custom extensions *after* SNI.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-10-23 14:45:30 +01:00
Andy Polyakov
0ce2dbfb5b
Add missing credit.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 9f4bd9d5f9 )
2014-10-22 09:38:40 +02:00
Bodo Moeller
981545e1e7
Fix and improve SSL_MODE_SEND_FALLBACK_SCSV documentation.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-10-21 22:39:26 +02:00
Bodo Moeller
d60de314f4
When processing ClientHello.cipher_suites, don't ignore cipher suites
...
listed after TLS_FALLBACK_SCSV.
RT: 3575
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2014-10-21 22:32:09 +02:00
Kurt Roeckx
b6ece4c1fc
Keep old method in case of an unsupported protocol
...
When we're configured with no-ssl3 and we receive an SSL v3 Client Hello, we set
the method to NULL. We didn't used to do that, and it breaks things. This is a
regression introduced in 62f45cc27d . Keep the old
method since the code is not able to deal with a NULL method at this time.
CVE-2014-3569, PR#3571
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 392fa7a952 )
2014-10-21 21:04:09 +02:00
Tim Hudson
bb086221dd
no-ssl2 with no-ssl3 does not mean drop the ssl lib
...
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
(cherry picked from commit c882abd522 )
2014-10-20 15:26:16 +10:00
Kurt Cancemi
b4b8969df8
RT3547: Add missing static qualifier
...
Reviewed-by: Ben Laurie <ben@openssl.org >
(cherry picked from commit 87d388c955 )
2014-10-17 11:48:32 +02:00
Matt Caswell
010d37621d
Updates to NEWS file
...
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2014-10-15 08:54:27 -04:00
Matt Caswell
84d4f99d31
Updates to CHANGES file
...
Reviewed-by: Bodo Möller <bodo@openssl.org >
2014-10-15 08:54:26 -04:00
Geoff Thorpe
82180dcc0a
Fix no-ssl3 configuration option
...
CVE-2014-3568
Reviewed-by: Emilia Kasper <emilia@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-10-15 08:54:26 -04:00
Dr. Stephen Henson
c2b90b398d
Fix for session tickets memory leak.
...
CVE-2014-3567
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 5dc6070a03779cd524f0e67f76c945cb0ac38320)
2014-10-15 08:54:26 -04:00
Matt Caswell
c2a2ff3f0a
Fix SRTP compile issues for windows
...
Related to CVE-2014-3513
This fix was developed by the OpenSSL Team
Reviewed-by: Tim Hudson <tjh@openssl.org >
Conflicts:
util/mkdef.pl
util/ssleay.num
Conflicts:
util/mkdef.pl
2014-10-15 08:54:26 -04:00
Matt Caswell
d64b6c980c
Fix for SRTP Memory Leak
...
CVE-2014-3513
This issue was reported to OpenSSL on 26th September 2014, based on an original
issue and patch developed by the LibreSSL project. Further analysis of the issue
was performed by the OpenSSL team.
The fix was developed by the OpenSSL team.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-10-15 08:54:26 -04:00
Bodo Moeller
05df9b9ae5
Fix SSL_R naming inconsistency.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-10-15 14:48:00 +02:00
Andy Polyakov
3e3cc471c2
aesni-x86_64.pl: make ECB subroutine Windows ABI compliant.
...
RT: 3553
Reviewed-by: Emilia Kasper <emilia@openssl.org >
(cherry picked from commit 69d5747f90 )
2014-10-15 11:12:24 +02:00
Bodo Moeller
80fb4820cb
Add TLS_FALLBACK_SCSV documentation, and move s_client -fallback_scsv
...
handling out of #ifndef OPENSSL_NO_DTLS1 section.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-10-15 10:50:53 +02:00
Bodo Moeller
2229fe5b94
Oop: revert unintentional change committed along with
...
TLS_FALLBACK_SCSV support, restoring a reviewed state instead.
Reviewed-by: Stephen Henson (steve@openssl.org )
2014-10-15 04:50:13 +02:00
Bodo Moeller
a46c705214
Support TLS_FALLBACK_SCSV.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-10-15 04:04:55 +02:00
Matt Caswell
dc7bca8bcc
Removed duplicate definition of PKCS7_type_is_encrypted
...
Patch supplied by Matthieu Patou <mat@matws.net >, and modified to also
remove duplicate definition of PKCS7_type_is_digest.
PR#3551
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit e0fdea3e49 )
2014-10-06 23:43:49 +01:00
Ben Laurie
f58cfe0422
Fix single makefile.
...
Reviewed-by: Geoffrey Thorpe <geoff@geoffthorpe.net >
2014-10-06 18:06:18 +01:00
Rich Salz
20d1c8111f
RT3462: Document actions when data==NULL
...
If data is NULL, return the size needed to hold the
derived key. No other API to do this, so document
the behavior.
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit 5aed169305 )
2014-10-03 10:39:32 -04:00
Bodo Moeller
c578fe37d9
DTLS 1.2 support has been added to 1.0.2.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-10-02 17:58:10 +02:00
Rich Salz
a4ee5bbc77
RT2309: Fix podpage MMNNFFPPS->MNNFFPPS
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 9208640a36 )
2014-09-30 16:31:44 -04:00
Andy Polyakov
8ad9050318
e_os.h: refine inline override logic (to address warnings in debug build).
...
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
(cherry picked from commit 55c7a4cf11 )
2014-09-30 21:07:59 +02:00
Dr. Stephen Henson
5df07a7210
Add additional DigestInfo checks.
...
Reencode DigestInto in DER and check against the original: this
will reject any improperly encoded DigestInfo structures.
Note: this is a precautionary measure, there is no known attack
which can exploit this.
Thanks to Brian Smith for reporting this issue.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-29 12:24:04 +01:00
Matt Caswell
0853b2c5e4
Prepare for 1.0.2-beta4-dev
...
Reviewed-by: Stephen Henson <steve@openssl.org >
2014-09-25 21:35:35 +01:00
Matt Caswell
2c5db8dac3
Prepare for 1.0.2-beta3 release
...
Reviewed-by: Stephen Henson <steve@openssl.org >
2014-09-25 21:31:40 +01:00
Matt Caswell
bffd5a7f35
make update
...
Reviewed-by: Stephen Henson <steve@openssl.org >
2014-09-25 21:31:40 +01:00
Matt Caswell
5e60396fe7
Added 1.0.1i CHANGES and NEWS updates
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-25 21:29:25 +01:00
Emilia Kasper
0d6a11a91f
Add missing tests
...
Accidentally omitted from commit 455b65dfab
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
(cherry picked from commit fdc35a9d3e )
2014-09-25 13:46:55 +02:00
Tim Hudson
f9fac6163e
Add constant_time_locl.h to HEADERS,
...
so the Win32 compile picks it up correctly.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-09-25 08:08:51 +02:00
Richard Levitte
ef8055cbb7
Add the constant time test to the VMS build and tests
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-25 08:07:54 +02:00
Richard Levitte
3b7ab6f4b8
Include "constant_time_locl.h" rather than "../constant_time_locl.h".
...
The different -I compiler parameters will take care of the rest...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-25 08:06:47 +02:00
Dr. Stephen Henson
3b4a761853
Don't allow non-FIPS curves in FIPS mode.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-25 00:20:56 +01:00
Dr. Stephen Henson
255401756d
Use correct function name: CMS_add1_signer()
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 5886354dcc )
2014-09-25 00:06:46 +01:00
Andy Polyakov
ec65b83d65
crypto/bn/bn_nist.c: work around MSC ARM compiler bug.
...
RT: 3541
Reviewed-by: Emilia Kasper <emilia@openssl.org >
(cherry picked from commit 8b07c005fe )
2014-09-25 00:46:45 +02:00
Andy Polyakov
d169bf9cab
e_os.h: allow inline functions to be compiled by legacy compilers.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 40155f4089 )
2014-09-25 00:36:10 +02:00
Emilia Kasper
738911cde6
RT3425: constant-time evp_enc
...
Do the final padding check in EVP_DecryptFinal_ex in constant time to
avoid a timing leak from padding failure.
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 4aac102f75 )
Conflicts:
crypto/evp/evp_enc.c
2014-09-24 16:25:04 +02:00
Emilia Kasper
e1080ea3c7
RT3067: simplify patch
...
(Original commit adb46dbc6d )
Use the new constant-time methods consistently in s3_srvr.c
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
(cherry picked from commit 455b65dfab )
2014-09-24 15:54:51 +02:00
Adam Langley
941af48fec
This change alters the processing of invalid, RSA pre-master secrets so
...
that bad encryptions are treated like random session keys in constant
time.
(cherry picked from commit adb46dbc6d )
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-09-24 15:42:43 +02:00
Emilia Kasper
9bed73adaa
RT3066: rewrite RSA padding checks to be slightly more constant time.
...
Also tweak s3_cbc.c to use new constant-time methods.
Also fix memory leaks from internal errors in RSA_padding_check_PKCS1_OAEP_mgf1
This patch is based on the original RT submission by Adam Langley <agl@chromium.org >,
as well as code from BoringSSL and OpenSSL.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
Conflicts:
crypto/rsa/rsa_oaep.c
crypto/rsa/rsa_pk1.c
ssl/s3_cbc.c
2014-09-24 12:47:19 +02:00
Emilia Kasper
e9128d9401
Note i2d_re_X509_tbs and related changes in CHANGES
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-23 18:26:42 +02:00
Emilia Kasper
972868b23d
make update
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-09-23 18:20:26 +02:00
Emilia Kasper
e774a3055b
Add i2d_re_X509_tbs
...
i2d_re_X509_tbs re-encodes the TBS portion of the certificate.
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
(cherry picked from commit 95b1752cc7 )
2014-09-23 18:20:26 +02:00
Emilia Kasper
d9f99d4ef3
Revert "Add accessor for x509.cert_info."
...
This reverts commit 519ad9b384 .
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-09-23 18:20:26 +02:00
Emilia Kasper
6ce2a64191
Revert "Add more accessors."
...
This reverts commit cacdfcb247 .
Conflicts:
crypto/x509/x509.h
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-09-23 18:20:26 +02:00
Andy Polyakov
d2a1226b81
CHANGES: mention ECP_NISTZ256.
...
Reviewed-by: Bodo Moeller <bodo@openssl.org >
(cherry picked from commit 507efe7372 )
2014-09-23 14:56:46 +02:00
Andy Polyakov
9fa9370b6f
crypto/ecp_nistz256.c: harmonize error codes.
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit be07ae9b10 )
2014-09-22 00:11:04 +02:00
Dr. Stephen Henson
12f14b1d8f
Fix warning.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 16e5b45f72 )
2014-09-22 00:10:53 +02:00
Andy Polyakov
27918b7c25
crypto/ec: harmonize new code with FIPS module.
...
RT: 3149
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-22 00:07:44 +02:00
Andy Polyakov
2e31c47adb
Configure: engage ECP_NISTZ256.
...
RT: 3149
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 847147908b )
Resolved conflicts:
Configure
TABLE
2014-09-22 00:07:44 +02:00
Andy Polyakov
3842a64d36
Add ECP_NISTZ256 by Shay Gueron, Intel Corp.
...
RT: 3149
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 4d3fa06fce )
2014-09-22 00:07:44 +02:00
Andy Polyakov
8aed2a7548
Reserve option to use BN_mod_exp_mont_consttime in ECDSA.
...
Submitted by Shay Gueron, Intel Corp.
RT: 3149
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit f54be179aa )
2014-09-22 00:07:44 +02:00
Andy Polyakov
f7835e1c20
perlasm/x86_64-xlate.pl: handle inter-bank movd.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 902b30df19 )
2014-09-22 00:07:44 +02:00
Andy Polyakov
11d8abb331
Configure: add configuration for crypto/ec/asm extensions.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 6019cdd327 )
Resolved conflicts:
Configure
Makefile.org
TABLE
2014-09-22 00:07:44 +02:00
Tim Hudson
320d949781
Fixed error introduced in commit f2be92b94d
...
that fixed PR#3450 where an existing cast masked an issue when i was changed
from int to long in that commit
Picked up on z/linux (s390) where sizeof(int)!=sizeof(long)
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit b5ff559ff9 )
2014-09-22 06:35:57 +10:00
Andy Polyakov
dfb5de6fc0
Harmonize Tru64 and Linux make rules.
...
RT: 3333,3165
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit d475b2a3bf )
2014-09-20 10:22:13 +02:00
Jake Goulding
5015a93ded
RT2301: GetDIBits, not GetBitmapBits in rand_win
...
GetDIBits has been around since Windows2000 and
BitBitmapBits is an old Win16 compatibility function
that is much slower.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 99b00fd993 )
2014-09-18 16:42:07 -04:00
Rich Salz
478b3470ff
RT2772 update: c_rehash was broken
...
Move the readdir() lines out of the if statement, so
that flist is available globally.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 6f46c3c3b0 )
2014-09-11 13:09:56 -04:00
Rich Salz
3258429883
RT3271 update; extra; semi-colon; confuses; some;
...
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
(cherry picked from commit cb4bb56bae )
2014-09-10 15:09:53 -04:00
Rich Salz
a9d928a8b6
RT2560: missing NULL check in ocsp_req_find_signer
...
If we don't find a signer in the internal list, then fall
through and look at the internal list; don't just return NULL.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit b2aa38a980 )
2014-09-10 12:20:15 -04:00
Rich Salz
3aa2d2d08f
RT2196: Clear up some README wording
...
Say where to email bug reports.
Mention general RT tracker info in a separate paragraph.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 468ab1c20d )
2014-09-09 17:49:04 -04:00
Matt Caswell
f33ce36aff
RT3192: spurious error in DSA verify
...
This is funny; Ben commented in the source, Matt opend a ticket,
and Rich is doing the submit. Need more code-review? :)
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit eb63bce040 )
2014-09-09 17:10:57 -04:00
Rich Salz
e61c648fd6
RT3271: Don't use "if !" in shell lines
...
For portability don't use "if ! expr"
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit b999f66e34 )
2014-09-09 17:05:50 -04:00
Geoff Keating
8c0d19d857
RT1909: Omit version for v1 certificates
...
When calling X509_set_version to set v1 certificate, that
should mean that the version number field is omitted.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 1f18f50c4b )
2014-09-09 15:16:42 -04:00
Kurt Cancemi
283a8fd1aa
RT3506: typo's in ssltest
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 4eadd11cd9 )
2014-09-09 13:58:33 -04:00
Paul Suhler
b8d687bb56
RT2841: Extra return in check_issued
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 4cd1119df3 )
2014-09-08 18:50:40 -04:00
Kurt Roeckx
57c932dafd
RT2626: Change default_bits from 1K to 2K
...
This is a more comprehensive fix. It changes all
keygen apps to use 2K keys. It also changes the
default to use SHA256 not SHA1. This is from
Kurt's upstream Debian changes.
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
(cherry picked from commit 44e0c2bae4 )
2014-09-08 17:23:37 -04:00
Matthias Andree
ef720a67ab
RT2272: Add old-style hash to c_rehash
...
In addition to Matthias's change, I also added -n to
not remove links. And updated the manpage.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit a787c2590e )
2014-09-08 11:35:25 -04:00
Rich Salz
f28c48d07e
RT468: SSL_CTX_sess_set_cache_size wrong
...
The documentation is wrong about what happens when the
session cache fills up.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit e9edfc4196 )
2014-09-08 11:26:19 -04:00
Erik Auerswald
ff89be854e
RT3301: Discard too-long heartbeat requests
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit af4c6e348e )
2014-09-08 11:23:02 -04:00
Scott Schaefer
61a44b76a0
RT2518: fix pod2man errors
...
pod2man now complains when item tags are not sequential.
Also complains about missing =back and other tags.
Silence the warnings; most were already done.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit fe7573042f )
2014-09-08 11:18:58 -04:00
Rich Salz
45236ed6a4
RT3108: OPENSSL_NO_SOCK should imply OPENSSL_NO_DGRAM
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit be0bd11d69 )
2014-09-08 11:08:01 -04:00
Robin Lee
240635c0b2
RT3031: Need to #undef some names for win32
...
Copy the ifdef/undef stanza from x509.h to x509v3.h
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 83e4e03eeb )
2014-09-08 11:06:07 -04:00
Martin Olsson
610ac0525d
RT2843: Remove another spurious close-comment token
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 683cd7c948 )
2014-09-08 10:52:19 -04:00
Martin Olsson
9c096d0bbf
RT2842: Remove spurious close-comment marker.
...
Also, I (rsalz) changed "#ifdef undef" to "#if 0"
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 6b0dc6eff1 )
2014-09-08 10:50:33 -04:00
Rich Salz
1915744a64
Merge branch 'OpenSSL_1_0_2-stable' of git.openssl.org:openssl into OpenSSL_1_0_2-stable
...
another empty merge???
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-08 10:47:03 -04:00
Rich Salz
c387f7d0ea
Empty merge
...
Merge branch 'OpenSSL_1_0_2-stable' of git.openssl.org:openssl into OpenSSL_1_0_2-stable
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-08 10:45:53 -04:00
Rich Salz
eee95fc64f
Empty merge
...
Merge branch 'OpenSSL_1_0_2-stable' of git.openssl.org:openssl into OpenSSL_1_0_2-stable
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-08 10:45:31 -04:00
Rich Salz
dd3c21b2d2
RT1834: Fix PKCS7_verify return value
...
The function returns 0 or 1, only.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit b0e659cfac )
2014-09-08 10:43:32 -04:00
Rich Salz
dd13aadf9e
RT1832: Fix PKCS7_verify return value
...
The function returns 0 or 1, only.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit b0e659cfac )
2014-09-08 10:39:12 -04:00
Alon Bar-Lev
2a49fef28e
RT1771: Add string.h include.
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 8842987e5a )
2014-09-08 10:38:08 -04:00
Viktor Dkhovni
c56be26d9f
RT1325,2973: Add more extensions to c_rehash
...
Regexp was bracketed wrong.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 5a8addc432 )
2014-09-07 18:25:59 -04:00
Dr. Stephen Henson
2102c53caa
Add CHANGES entry for SCT viewer code.
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit b2774f6e17 )
2014-09-05 13:45:45 +01:00
Adam Langley
e12e875759
psk_client_callback, 128-byte id bug.
...
Fix a bug in handling of 128 byte long PSK identity in
psk_client_callback.
OpenSSL supports PSK identities of up to (and including) 128 bytes in
length. PSK identity is obtained via the psk_client_callback,
implementors of which are expected to provide a NULL-terminated
identity. However, the callback is invoked with only 128 bytes of
storage thus making it impossible to return a 128 byte long identity and
the required additional NULL byte.
This CL fixes the issue by passing in a 129 byte long buffer into the
psk_client_callback. As a safety precaution, this CL also zeroes out the
buffer before passing it into the callback, uses strnlen for obtaining
the length of the identity returned by the callback, and aborts the
handshake if the identity (without the NULL terminator) is longer than
128 bytes.
(Original patch amended to achieve strnlen in a different way.)
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit be0d851732 )
2014-09-05 12:22:33 +02:00
Adam Langley
0600a5cd49
Ensure that x**0 mod 1 = 0.
...
(cherry picked from commit 2b0180c37f )
Reviewed-by: Ben Laurie <ben@openssl.org >
2014-09-04 16:05:57 +02:00
Richard Levitte
a91b73fd29
Followup on RT3334 fix: make sure that a directory that's the empty
...
string returns 0 with errno = ENOENT.
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit 360928b7d0 )
2014-09-03 22:23:34 +02:00
Phil Mesnier
02c38e37a6
RT3334: Fix crypto/LPdir_win.c
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit 6a14fe7576 )
2014-09-03 22:23:34 +02:00
Clang via Jeffrey Walton
fa2ae04c40
RT3140: Possibly-unit variable in pem_lib.c
...
Can't really happen, but the flow of control isn't obvious.
Add an initializer.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 0ff3687eab )
2014-09-02 23:38:15 -04:00
Emilia Kasper
27739e9265
Make the inline const-time functions static.
...
"inline" without static is not correct as the compiler may choose to ignore it
and will then either emit an external definition, or expect one.
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
(cherry picked from commit 86f50b36e6 )
2014-09-02 15:24:54 +02:00
Adam Williamson
157c345175
RT3511: doc fix; req default serial is random
...
RT842, closed back in 2004, changed the default serial number
to be a random number rather than zero. Finally time to update
the doc
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 3aba132d61 )
2014-08-31 23:41:51 -04:00
Richard Levitte
770b98d02e
Add t1_ext and ssl_utst to the VMS build as well.
...
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2014-08-31 18:22:02 +02:00
TANABE Hiroyasu
8475416fe7
RT1325,2973: Add more extensions to c_rehash
...
Add .crt/.cer/.crl to the filenames parsed.
I also updated the podpage (since it didn't exist when
this ticket was first created, nor when it was re-created
seven years later).
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 80ec8d4e3e )
2014-08-31 00:37:54 -04:00
Andy Polyakov
30b7d5e1d8
md5-x86_64.pl: work around warning.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 4d86e8df6b )
2014-08-30 19:18:12 +02:00
Andy Polyakov
9dd6240201
x86[_64] assembly pack: add Silvermont performance data.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit b59f92e75d )
2014-08-30 19:14:49 +02:00
Rich Salz
63eacabb61
RT2820: case-insensitive filenames on Darwin
...
Andy pointed out there is also darwin64, so tweak the pattern.
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit 457f7b14ec )
2014-08-30 10:20:28 -04:00
Rich Salz
0996ccc077
Add tags/TAGS
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 9d6253cfd3 )
2014-08-30 10:09:01 -04:00
Rich Salz
6aa9dbab0f
RT2119,3407: Updated to dgst.pod
...
Re-order algorithm list.
Be consistent in command synopsis.
Add content about signing.
Add EXAMPLE section
Add some missing options: -r, -fips-fingerprint -non-fips-allow
Various other fixes.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-08-30 10:05:19 -04:00
James Westby
c1071ab4f1
RT1941: c_rehash.pod is missing
...
Add the file written by James Westby, graciously contributed
under the terms of the OpenSSL license.
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit cf2239b3b3 )
2014-08-30 09:51:36 -04:00
Rich Salz
5decce4db0
RT2379: Bug in BIO_set_accept_port.pod
...
The doc says that port can be "*" to mean any port.
That's wrong.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 07e3b31fae )
2014-08-29 16:46:16 -04:00
Jim Reid
12dabfc560
RT2880: HFS is case-insensitive filenames
...
Add Darwin to list of case-insensitive filenames when
installing manapges. When doing this, I noticed that
we weren't setting "filecase" for the HTML doc install.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 82d9185ae5 )
2014-08-29 16:39:38 -04:00
Dr. Stephen Henson
39d64e9351
update ordinals
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-28 18:24:14 +01:00
Dr. Stephen Henson
f9784baf0e
Fix comments, add new test.
...
Fix comments in ssltest.c: return value of 0 now means extension is
omitted and add_cb is not called for servers if the corresponding
extension is absent in ClientHello.
Test add_cb is not called if extension is not received.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit f47e203975 )
2014-08-28 18:10:21 +01:00
Dr. Stephen Henson
8fb57b29d6
Custom extension documentation.
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit f3f56c2a87 )
2014-08-28 18:10:21 +01:00
Dr. Stephen Henson
cf8d6c1000
Rename some callbacks, fix alignment.
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 0cfefe4b6d )
2014-08-28 18:10:21 +01:00
Dr. Stephen Henson
4164d631bb
Use consistent function naming.
...
Instead of SSL_CTX_set_custom_cli_ext and SSL_CTX_set_custom_srv_ext
use SSL_CTX_add_client_custom_ext and SSL_CTX_add_server_custom_ext.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 8cafe9e8bf )
2014-08-28 18:10:21 +01:00
Dr. Stephen Henson
46a1b9ef4f
New function SSL_extension_supported().
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit c846a5f567 )
2014-08-28 18:10:21 +01:00
Dr. Stephen Henson
6db2239c60
New extension callback features.
...
Support separate parse and add callback arguments.
Add new callback so an application can free extension data.
Change return value for send functions so < 0 is an error 0
omits extension and > 0 includes it. This is more consistent
with the behaviour of other functions in OpenSSL.
Modify parse_cb handling so <= 0 is an error.
Make SSL_CTX_set_custom_cli_ext and SSL_CTX_set_custom_cli_ext argument
order consistent.
NOTE: these changes WILL break existing code.
Remove (now inaccurate) in line documentation.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 33f653adf3 )
2014-08-28 18:10:21 +01:00
Dr. Stephen Henson
423ceb8319
Callback revision.
...
Use "parse" and "add" for function and callback names instead of
"first" and "second".
Change arguments to callback so the extension type is unsigned int
and the buffer length is size_t. Note: this *will* break existing code.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit de2a9e38f3 )
2014-08-28 18:10:21 +01:00
Dr. Stephen Henson
cd2e17020e
Remove serverinfo checks.
...
Since sanity checks are performed for all custom extensions the
serverinfo checks are no longer needed.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 707b026d78 )
Conflicts:
ssl/ssl3.h
ssl/t1_lib.c
2014-08-28 18:09:59 +01:00
Dr. Stephen Henson
9346c75cb8
Add custom extension sanity checks.
...
Reject attempts to use extensions handled internally.
Add flags to each extension structure to indicate if an extension
has been sent or received. Enforce RFC5246 compliance by rejecting
duplicate extensions and unsolicited extensions and only send a
server extension if we have sent the corresponding client extension.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 28ea0a0c6a )
2014-08-28 18:09:39 +01:00
Dr. Stephen Henson
0a4fe37fc6
Custom extension revision.
...
Use the same structure for client and server custom extensions.
Add utility functions in new file t1_ext.c.
Use new utility functions to handle custom server and client extensions
and remove a lot of code duplication.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit ecf4d66090 )
Conflicts:
ssl/ssl_lib.c
ssl/ssl_locl.h
ssl/t1_lib.c
2014-08-28 18:09:05 +01:00
Dr. Stephen Henson
da67a0ae34
Revision of custom extension code.
...
Move custom extension structures from SSL_CTX to CERT structure.
This change means the form can be revised in future without binary
compatibility issues. Also since CERT is part of SSL structures
so per-SSL custom extensions could be supported in future as well as
per SSL_CTX.
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit b83294fe30 )
Conflicts:
ssl/ssl.h
ssl/ssl_cert.c
ssl/ssl_locl.h
2014-08-28 17:06:50 +01:00
Emilia Kasper
9a9b0c0401
Constant-time utilities
...
Pull constant-time methods out to a separate header, add tests.
Reviewed-by: Bodo Moeller <bodo@openssl.org >
(cherry picked from commit 5a3d21c058 )
Conflicts:
ssl/s3_cbc.c
test/Makefile
2014-08-28 16:26:01 +02:00
Raphael Spreitzer
b85d461cdf
RT2400: ASN1_STRING_to_UTF8 missing initializer
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit f9fb43e176 )
2014-08-27 22:59:40 -04:00
Rich Salz
089f10e69e
RT2308: Add extern "C" { ... } wrapper
...
Add the wrapper to all public header files (Configure
generates one). Don't bother for those that are just
lists of #define's that do renaming.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Cherry-pick of commit 17e80c6bd0
2014-08-27 21:45:09 -04:00
Emilia Kasper
7f7c05ca63
Explicitly check for empty ASN.1 strings in d2i_ECPrivateKey
...
The old code implicitly relies on the ASN.1 code returning a \0-prefixed buffer
when the buffer length is 0. Change this to verify explicitly that the ASN.1 string
has positive length.
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
(cherry picked from commit 82dc08de54ce443c2a9ac478faffe79e76157795)
2014-08-27 19:50:15 +02:00
Matt Caswell
2083f7c465
RT3065: automatically generate a missing EC public key
...
When d2i_ECPrivateKey reads a private key with a missing (optional) public key,
generate one automatically from the group and private key.
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
(cherry picked from commit ed383f847156940e93f256fed78599873a4a9b28)
2014-08-27 19:50:15 +02:00
Adam Langley
1f2b943254
RT3065: ec_private_key_dont_crash
...
This change saves several EC routines from crashing when an EC_KEY is
missing a public key. The public key is optional in the EC private key
format and, without this patch, running the following through `openssl
ec` causes a crash:
-----BEGIN EC PRIVATE KEY-----
MBkCAQEECAECAwQFBgcIoAoGCCqGSM49AwEH
-----END EC PRIVATE KEY-----
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
(cherry picked from commit b391570bdeb386d4fd325917c248d593d3c43930)
2014-08-27 19:50:15 +02:00
Mihai Militaru
dc5c3d7370
RT2210: Add missing EVP_cleanup to example
...
I also removed some trailing whitespace and cleaned
up the "see also" list.
Reviewed-by: Emilia Kasper <emilia@openssl.org >
(cherry picked from commit 7b3e11c544 )
2014-08-27 13:25:36 -04:00
John Fitzgibbon
383f0e349f
RT2724: Remove extra declaration
...
Extra SSL_get_selected_srtp_profile() declaration in ssl/srtp.h
causes -Werror builds to fail.
Cherry-picked from 3609b02305
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-26 16:55:54 -04:00
David Gatwood
0a64a864b4
RT1744: SSL_CTX_set_dump_dh() doc feedback
...
The description of when the server creates a DH key is
confusing. This cleans it up.
(rsalz: also removed trailing whitespace.)
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
2014-08-26 13:38:27 -04:00
Jan Schaumann
dec128313b
RT1804: fix EXAMPLE in EVP_EncryptInit.pod
...
The EXAMPLE that used FILE and RC2 doesn't compile due to a
few minor errors. Tweak to use IDEA and AES-128. Remove
examples about RC2 and RC5.
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2014-08-25 10:26:17 -04:00
Matt Caswell
1d4f214eaf
Typo fixes to evp documentation.
...
This patch was submitted by user "Kox" via the wiki
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 2dd8cb3b95 )
2014-08-24 21:26:02 +01:00
Adam Langley
3aac17a82f
RT3060: Limit the number of empty records.
...
Limit the number of empty records that will be processed consecutively
in order to prevent ssl3_get_record from never returning.
Reported by "oftc_must_be_destroyed" and George Kadianakis.
Reviewed-by: Bodo Moeller <bodo@openssl.org >
2014-08-22 15:36:06 +02:00
Adam Langley
e19c93811f
RT3061: Don't SEGFAULT when trying to export a public DSA key as a private key.
...
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-22 15:21:12 +02:00
Emilia Kasper
108e907645
Improve EVP_PKEY_sign documentation
...
Clarify the intended use of EVP_PKEY_sign. Make the code example compile.
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
(cherry picked from commit d64c533a20 )
2014-08-22 15:05:55 +02:00
Emilia Kasper
8958be3946
define inline for Visual Studio
...
In Visual Studio, inline is available in C++ only, however __inline is available for C, see
http://msdn.microsoft.com/en-us/library/z8y1yy88.aspx
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
(cherry picked from commit f511b25a73 )
2014-08-21 16:07:44 +02:00
Emilia Kasper
ebf221ee25
Fix build when BSAES_ASM is defined but VPAES_ASM is not
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit da92be4d68 )
2014-08-21 15:48:10 +02:00
Andy Polyakov
ef90877721
bn/asm/rsaz-*.pl: allow spaces in Perl path name.
...
RT: 2835
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 15735e4f0e )
2014-08-21 00:19:24 +02:00
Andy Polyakov
a89adc148e
sha1-mb-x86_64.pl: add commentary.
...
Reviewed-by: Emilia Kasper <emilia@openssl.org >
(cherry picked from commit e608273a80 )
2014-08-21 00:16:32 +02:00
Andy Polyakov
b698c427de
crypto/evp/e_aes_cbc_hmac_sha[1|256].c: fix compiler warnings.
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 2893a302a9 )
2014-08-20 22:20:21 +02:00
Andy Polyakov
e99ac8b868
sha1-mb-x86_64.pl: fix typo.
...
Reviewed-by: Emilia Kasper <emilia@openssl.org >
(cherry picked from commit 55eb14da20 )
2014-08-20 22:12:50 +02:00
Matt Caswell
43312c624d
Fixed out-of-bounds read errors in ssl3_get_key_exchange.
...
PR#3450
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-15 23:28:52 +01:00
Istvan Noszticzius
beeb0fa7be
Fix use after free bug.
...
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 5afa57fb7b17aa51cfba1ffa94e900fc7a5f0e04)
2014-08-15 16:46:14 +01:00
Bodo Moeller
267e6f3cc0
Further improve/fix ec_GFp_simple_points_make_affine (ecp_smpl.c) and
...
group_order_tests (ectest.c). Also fix the EC_POINTs_mul documentation (ec.h).
Reviewed-by: emilia@openssl.org
2014-08-13 17:40:33 +02:00
Dr. Stephen Henson
5ed0b6ac0c
Fix SRP authentication ciphersuites.
...
The addition of SRP authentication needs to be checked in various places
to work properly. Specifically:
A certificate is not sent.
A certificate request must not be sent.
Server key exchange message must not contain a signature.
If appropriate SRP authentication ciphersuites should be chosen.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 8f5a8805b82d1ae81168b11b7f1506db9e047dec)
2014-08-09 00:09:14 +01:00
Dr. Stephen Henson
90a549ddfb
Test SRP authentication ciphersuites.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 193c1c07165b0042abd217274a084b49459d4443)
2014-08-09 00:09:01 +01:00
Dr. Stephen Henson
bc792813f0
Only use FIPS EC methods in FIPS mode.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 1433cac53c )
2014-08-07 02:11:53 +01:00
Dr. Stephen Henson
bb4c9ffd02
Check SRP parameters early.
...
Check SRP parameters when they are received so we can send back an
appropriate alert.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-08-06 20:41:53 +01:00
Dr. Stephen Henson
53348780e9
Fix SRP buffer overrun vulnerability.
...
Invalid parameters passed to the SRP code can be overrun an internal
buffer. Add sanity check that g, A, B < N to SRP code.
Thanks to Sean Devlin and Watson Ladd of Cryptography Services, NCC
Group for reporting this issue.
2014-08-06 20:41:24 +01:00
Dr. Stephen Henson
f338c2e0c2
Fix SRP ciphersuite DoS vulnerability.
...
If a client attempted to use an SRP ciphersuite and it had not been
set up correctly it would crash with a null pointer read. A malicious
server could exploit this in a DoS attack.
Thanks to Joonas Kuorilehto and Riku Hietamäki from Codenomicon
for reporting this issue.
CVE-2014-2970
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-06 20:41:24 +01:00
Gabor Tyukasz
92aa73bcbf
Fix race condition in ssl_parse_serverhello_tlsext
...
CVE-2014-3509
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-06 20:41:24 +01:00
Emilia Kasper
c01618dd82
Fix OID handling:
...
- Upon parsing, reject OIDs with invalid base-128 encoding.
- Always NUL-terminate the destination buffer in OBJ_obj2txt printing function.
CVE-2014-3508
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-06 20:41:24 +01:00
Emilia Käsper
1d7d0ed9c2
Fix DTLS anonymous EC(DH) denial of service
...
CVE-2014-3510
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-06 20:41:24 +01:00
David Benjamin
40a2200d89
Fix protocol downgrade bug in case of fragmented packets
...
CVE-2014-3511
Reviewed-by: Emilia Käsper <emilia@openssl.org >
Reviewed-by: Bodo Möller <bodo@openssl.org >
2014-08-06 20:41:24 +01:00
Adam Langley
d345a24569
Remove some duplicate DTLS code.
...
In a couple of functions, a sequence number would be calculated twice.
Additionally, in |dtls1_process_out_of_seq_message|, we know that
|frag_len| <= |msg_hdr->msg_len| so the later tests for |frag_len <
msg_hdr->msg_len| can be more clearly written as |frag_len !=
msg_hdr->msg_len|, since that's the only remaining case.
Reviewed-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-06 20:41:24 +01:00
Matt Caswell
3d5dceac43
Applying same fix as in dtls1_process_out_of_seq_message. A truncated DTLS fragment would cause *ok to be clear, but the return value would still be the number of bytes read.
...
Problem identified by Emilia Käsper, based on previous issue/patch by Adam
Langley.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-06 20:41:23 +01:00
Adam Langley
aad61c0a57
Fix return code for truncated DTLS fragment.
...
Previously, a truncated DTLS fragment in
|dtls1_process_out_of_seq_message| would cause *ok to be cleared, but
the return value would still be the number of bytes read. This would
cause |dtls1_get_message| not to consider it an error and it would
continue processing as normal until the calling function noticed that
*ok was zero.
I can't see an exploit here because |dtls1_get_message| uses
|s->init_num| as the length, which will always be zero from what I can
see.
Reviewed-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-06 20:41:23 +01:00
Adam Langley
8ca4c4b25e
Fix memory leak from zero-length DTLS fragments.
...
The |pqueue_insert| function can fail if one attempts to insert a
duplicate sequence number. When handling a fragment of an out of
sequence message, |dtls1_process_out_of_seq_message| would not call
|dtls1_reassemble_fragment| if the fragment's length was zero. It would
then allocate a fresh fragment and attempt to insert it, but ignore the
return value, leaking the fragment.
This allows an attacker to exhaust the memory of a DTLS peer.
Fixes CVE-2014-3507
Reviewed-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-06 20:41:23 +01:00
Matt Caswell
0598468fc0
Fix DTLS handshake message size checks.
...
In |dtls1_reassemble_fragment|, the value of
|msg_hdr->frag_off+frag_len| was being checked against the maximum
handshake message size, but then |msg_len| bytes were allocated for the
fragment buffer. This means that so long as the fragment was within the
allowed size, the pending handshake message could consume 16MB + 2MB
(for the reassembly bitmap). Approx 10 outstanding handshake messages
are allowed, meaning that an attacker could consume ~180MB per DTLS
connection.
In the non-fragmented path (in |dtls1_process_out_of_seq_message|), no
check was applied.
Fixes CVE-2014-3506
Wholly based on patch by Adam Langley with one minor amendment.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-06 20:41:23 +01:00
Matt Caswell
ea7cb53974
Added comment for the frag->reassembly == NULL case as per feedback from Emilia
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-06 20:41:23 +01:00
Adam Langley
4985007555
Avoid double free when processing DTLS packets.
...
The |item| variable, in both of these cases, may contain a pointer to a
|pitem| structure within |s->d1->buffered_messages|. It was being freed
in the error case while still being in |buffered_messages|. When the
error later caused the |SSL*| to be destroyed, the item would be double
freed.
Thanks to Wah-Teh Chang for spotting that the fix in 1632ef74 was
inconsistent with the other error paths (but correct).
Fixes CVE-2014-3505
Reviewed-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-06 20:41:23 +01:00
Dr. Stephen Henson
89d2f8f1a9
make update
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-01 21:21:03 +01:00
Dr. Stephen Henson
2c3673cd3f
Fix error discrepancy.
...
We can't rename ssleay_rand_bytes to md_rand_bytes_lock as this will cause
an error code discrepancy. Instead keep ssleay_rand_bytes and add an
extra parameter: since ssleay_rand_bytes is not part of the public API
this wont cause any binary compatibility issues.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-08-01 18:42:41 +01:00
Bodo Moeller
ba5f75d53e
Update $default_depflags to match current defaults.
2014-08-01 19:03:03 +02:00
Bodo Moeller
be804523cf
Clean up CHANGES files: If a change is already present in 1.0.1f or 1.0.1h,
...
don't list it again under changes between 1.0.1h and 1.0.2.
2014-08-01 18:38:56 +02:00
Bodo Moeller
d5213519c0
Simplify and fix ec_GFp_simple_points_make_affine
...
(which didn't always handle value 0 correctly).
Reviewed-by: emilia@openssl.org
2014-08-01 17:27:59 +02:00
Dr. Stephen Henson
a3efe1b6e9
Avoid multiple lock using FIPS DRBG.
...
Don't use multiple locks when SP800-90 DRBG is used outside FIPS mode.
PR#3176
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-07-30 21:08:07 +01:00
Dr. Stephen Henson
789b12599d
Add conditional unit testing interface.
...
Don't call internal functions directly call them through
SSL_test_functions(). This also makes unit testing work on
Windows and platforms that don't export internal functions
from shared libraries.
By default unit testing is not enabled: it requires the compile
time option "enable-unit-test".
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
(cherry picked from commit e0fc7961c4 )
Conflicts:
ssl/heartbeat_test.c
ssl/ssl.h
util/mkdef.pl
2014-07-24 19:42:26 +01:00
Matt Caswell
371d9a627b
Prepare for 1.0.2-beta3-dev
...
Reviewed-by: Stephen Henson <steve@openssl.org >
2014-07-22 21:31:04 +01:00
Matt Caswell
2f63ad1c6d
Prepare for 1.0.2-beta2 release
...
Reviewed-by: Stephen Henson <steve@openssl.org >
2014-07-22 21:30:33 +01:00
Matt Caswell
0e32035292
make update
...
Reviewed-by: Stephen Henson <steve@openssl.org >
2014-07-22 21:30:33 +01:00
Dr. Stephen Henson
f5ce8d6a61
update $default_depflags
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-07-22 21:12:25 +01:00
Andy Polyakov
0ae6ba18ab
CHANGES: mention new platforms.
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-07-22 20:18:06 +02:00
Billy Brumley
4ccc2c19e2
"EC_POINT_invert" was checking "dbl" function pointer instead of "invert".
...
PR#2569
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit cba11f57ce )
2014-07-21 22:28:09 +01:00
Tim Hudson
b5e611a973
Remove old unused and unmaintained demonstration code.
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 62352b8138 )
2014-07-22 07:26:55 +10:00
Andy Polyakov
a2f34441ab
sha1-ppc.pl: shave off one cycle from BODY_20_39
...
and improve performance by 10% on POWER[78].
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
(cherry picked from commit 5c3598307e )
2014-07-21 15:30:59 +02:00
Tim Hudson
2be9425514
Minor documentation update removing "really" and a
...
statement of opinion rather than a fact.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit c8d133e4b6 )
2014-07-21 20:25:14 +10:00
Dr. Stephen Henson
f284fc7cc3
Add test header to Makefile, update ordinals
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-07-20 20:50:38 +01:00
Andy Polyakov
c991d8ae8b
Initial POWER8 support from development branch.
...
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-07-20 14:36:49 +02:00
Dr. Stephen Henson
be12cb3e24
Fix documentation for RSA_set_method(3)
...
PR#1675
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 197400c3f0d617d71ad8167b52fb73046d334320)
2014-07-19 18:25:53 +01:00
Dr. Stephen Henson
4c05b1f8d6
Make *Final work for key wrap again.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 58f4698f67 )
2014-07-17 23:31:11 +01:00
Dr. Stephen Henson
6e1e5996df
Sanity check lengths for AES wrap algorithm.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit d12eef1501 )
2014-07-17 12:58:42 +01:00
Jeffrey Walton
6ccd120f5f
Fix typo, add reference.
...
PR#3456
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit d48e78f0cf )
2014-07-17 12:08:26 +01:00
Matt Caswell
ca818b322d
Disabled XTS mode in enc utility as it is not supported
...
PR#3442
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 2097a17c57 )
2014-07-16 21:01:38 +01:00
Matt Caswell
b11c24110c
Add Matt Caswell's fingerprint, and general update on the fingerprints file to bring it up to date
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 3bd548192a )
2014-07-15 23:22:49 +01:00
Dr. Stephen Henson
beac6cb5aa
Clarify -Verify and PSK.
...
PR#3452
(cherry picked from commit ca2015a617 )
2014-07-15 20:23:25 +01:00
Dr. Stephen Henson
666a597ffb
Fix DTLS certificate requesting code.
...
Use same logic when determining when to expect a client
certificate for both TLS and DTLS.
PR#3452
(cherry picked from commit c8d710dc5f )
2014-07-15 18:23:35 +01:00
Dr. Stephen Henson
d4dbabb814
Don't allow -www etc options with DTLS.
...
The options which emulate a web server don't make sense when doing DTLS.
Exit with an error if an attempt is made to use them.
PR#3453
(cherry picked from commit 58a2aaeade8bdecd0f9f0df41927f7cff3012547)
2014-07-15 12:25:19 +01:00
Dr. Stephen Henson
c71e37aa6c
Use case insensitive compare for servername.
...
PR#3445
(cherry picked from commit 1c3e9a7c67 )
2014-07-14 23:59:58 +01:00
Hubert Kario
cdae9a58e6
document -nextprotoneg option in man pages
...
Add description of the option to advertise support of
Next Protocol Negotiation extension (-nextprotoneg) to
man pages of s_client and s_server.
PR#3444
(cherry picked from commit 7efd0e777e )
2014-07-14 23:43:21 +01:00
Dr. Stephen Henson
fa2b54c83a
Use more common name for GOST key exchange.
...
(cherry picked from commit 7aabd9c92fe6f0ea2a82869e5171dcc4518cee85)
2014-07-14 18:31:55 +01:00
Matt Caswell
14b5d0d029
Fixed valgrind complaint due to BN_consttime_swap reading uninitialised data.
...
This is actually ok for this function, but initialised to zero anyway if
PURIFY defined.
This does have the impact of masking any *real* unitialised data reads in bn though.
Patch based on approach suggested by Rich Salz.
PR#3415
(cherry picked from commit 77747e2d9a5573b1dbc15e247ce18c03374c760c)
2014-07-13 22:20:15 +01:00
Peter Mosmans
2fbd94252a
Add names of GOST algorithms.
...
PR#3440
(cherry picked from commit 924e5eda2c )
2014-07-13 18:31:09 +01:00
Richard Levitte
5b9188454b
* crypto/ui/ui_lib.c: misplaced brace in switch statement.
...
Detected by dcruette@qualitesys.com
(cherry picked from commit 8b5dd34091 )
2014-07-13 19:13:38 +02:00
Ben Laurie
5e189b4b8d
Don't clean up uninitialised EVP_CIPHER_CTX on error (CID 483259).
...
(cherry picked from commit c1d1b0114e )
2014-07-10 17:49:53 +01:00
Matt Caswell
23bd628735
Fix memory leak in BIO_free if there is no destroy function.
...
Based on an original patch by Neitrino Photonov <neitrinoph@gmail.com >
PR#3439
(cherry picked from commit 66816c53be )
2014-07-09 23:32:18 +01:00
Andy Polyakov
371feee876
x86_64 assembly pack: improve masm support.
...
(cherry picked from commit 1b0fe79f3e )
2014-07-09 22:46:13 +02:00
Andy Polyakov
f50f0c6aa3
Please Clang's sanitizer, addendum.
...
(cherry picked from commit d11c70b2c2 )
2014-07-09 22:45:52 +02:00
Andy Polyakov
2064e2db08
Please Clang's sanitizer.
...
PR: #3424,#3423,#3422
(cherry picked from commit 021e5043e5 )
2014-07-09 22:45:38 +02:00
Andy Polyakov
de222838fe
apps/speed.c: fix compiler warnings in multiblock_speed().
...
(cherry picked from commit c4f8efab34 )
2014-07-07 17:03:27 +02:00
Andy Polyakov
0ad2a0a303
sha[1|512]-x86_64.pl: fix logical errors with $shaext=0.
...
(cherry picked from commit 07b635cceb )
2014-07-07 17:02:00 +02:00
David Lloyd
2cb761c1f4
Prevent infinite loop loading config files.
...
PR#2985
(cherry picked from commit 9d23f422a3 )
2014-07-07 13:54:11 +01:00
Viktor Dukhovni
3ebcecf5c4
Improve X509_check_host() documentation.
...
Based on feedback from Jeffrey Walton.
(cherry picked from commit b73ac02735 )
2014-07-07 20:35:49 +10:00
Viktor Dukhovni
e83c913723
Update API to use (char *) for email addresses and hostnames
...
Reduces number of silly casts in OpenSSL code and likely most
applications. Consistent with (char *) for "peername" value from
X509_check_host() and X509_VERIFY_PARAM_get0_peername().
(cherry picked from commit 297c67fcd8 )
2014-07-07 19:20:34 +10:00
Viktor Dukhovni
55fe56837a
Set optional peername when X509_check_host() succeeds.
...
Pass address of X509_VERIFY_PARAM_ID peername to X509_check_host().
Document modified interface.
(cherry picked from commit ced3d9158a )
2014-07-07 19:20:34 +10:00
Viktor Dukhovni
1eb57ae2b7
New peername element in X509_VERIFY_PARAM_ID
...
Declaration, memory management, accessor and documentation.
(cherry picked from commit 6e661d458f )
2014-07-07 19:20:34 +10:00
Viktor Dukhovni
41e3ebd5ab
One more typo when changing !result to result <= 0
...
(cherry picked from commit eef1827f89 )
2014-07-07 19:19:13 +10:00
Viktor Dukhovni
9624b50d51
Fix typo in last commit
...
(cherry picked from commit 90b70a6a6b )
2014-07-07 19:19:13 +10:00
Viktor Dukhovni
449d864515
Multiple verifier reference identities.
...
Implemented as STACK_OF(OPENSSL_STRING).
(cherry picked from commit 8abffa4a73 )
2014-07-07 19:19:13 +10:00
Viktor Dukhovni
7f7e11ee5c
Implement sk_deep_copy.
...
(cherry picked from commit 66d884f067 )
2014-07-07 19:19:13 +10:00
Dr. Stephen Henson
43f534b986
Usage for -hack and -prexit -verify_return_error
...
(cherry picked from commit ee724df75d )
2014-07-06 22:45:20 +01:00
Dr. Stephen Henson
fbe8ea3abe
Document certificate status request options.
...
(cherry picked from commit cba3f1c739 )
2014-07-06 22:45:20 +01:00
Dr. Stephen Henson
affc941ea6
s_server usage for certificate status requests
...
(cherry picked from commit a44f219c00 )
2014-07-06 22:45:20 +01:00
Dr. Stephen Henson
012f7474f7
Update ticket callback docs.
...
(cherry picked from commit a23a6e85d8 )
2014-07-06 12:40:16 +01:00
Dr. Stephen Henson
5c1b373be6
Sanity check keylength in PVK files.
...
PR#2277
(cherry picked from commit 733a6c882e92f8221bd03a51643bb47f5f81bb81)
2014-07-06 00:36:14 +01:00
Jeffrey Walton
648a9f7c2f
Added reference to platform specific cryptographic acceleration such as AES-NI
2014-07-06 00:04:09 +01:00
Matt Caswell
623acb90cc
Fixed error in pod files with latest versions of pod2man
...
(cherry picked from commit 07255f0a76d9d349d915e14f969b9ff2ee0d1953)
2014-07-06 00:04:09 +01:00
Andy Polyakov
6ce295a301
sha512-x86_64.pl: fix typo.
...
PR: #3431
(cherry picked from commit 7eb9680ae1 )
2014-07-06 00:00:34 +02:00
Andy Polyakov
0359ccfd8b
s3_pkt.c: fix typo.
...
(cherry picked from commit 0e7a32b55e )
2014-07-05 23:57:28 +02:00
Andy Polyakov
9c1cf94f34
apps/speed.c: add multi-block benchmark.
...
(cherry picked from commit 375a64e349 )
2014-07-05 23:54:43 +02:00
Alan Hryngle
ff5b11f547
Return smaller of ret and f.
...
PR#3418.
(cherry picked from commit fdea4fff8f )
2014-07-05 22:38:17 +01:00
Dr. Stephen Henson
8358302d47
Don't limit message sizes in ssl3_get_cert_verify.
...
PR#319 (reoponed version).
(cherry picked from commit 7f6e957864 )
2014-07-05 13:30:38 +01:00
Dr. Stephen Henson
534656a997
Add license info.
...
(cherry picked from commit 55707a36cc )
2014-07-04 18:43:06 +01:00
Dr. Stephen Henson
2cfbec1cae
typo
2014-07-04 13:50:26 +01:00
Dr. Stephen Henson
22db480daf
Remove all RFC5878 code.
...
Remove RFC5878 code. It is no longer needed for CT and has numerous bugs.
2014-07-04 13:42:05 +01:00
Rich Salz
d107382214
Merge branch 'rsalz-docfixes'
2014-07-03 12:57:16 -04:00
Rich Salz
03ae3ca621
Close 3170, remove reference to Ariel Glenn's old 0.9.8 doc
...
(cherry picked from commit f1112985e8 )
2014-07-03 12:54:31 -04:00
Andy Polyakov
61df34e924
e_os.h: limit _MSC_VER trickery to older compilers.
...
PR: #3390
(cherry picked from commit aab3560b65 )
2014-07-02 22:34:02 +02:00
Andy Polyakov
47b9e06cfd
bn_exp.c: fix x86_64-specific crash with one-word modulus.
...
PR: #3397
(cherry picked from commit eca441b2b4 )
2014-07-02 21:16:45 +02:00
Matt Smart
88822622a1
Fix doc typo.
...
ERR_get_error(3) references the non-existent
ERR_get_last_error_line_data instead of the one that does exist,
ERR_peek_last_error_line_data.
PR#3283
(cherry picked from commit 5cc99c6cf5 )
2014-07-02 03:45:01 +01:00
Thijs Alkemade
8f243ab6c1
Make disabling last cipher work.
...
(cherry picked from commit 7cb472bd0d )
2014-07-02 03:32:42 +01:00
Dr. Stephen Henson
9223a31eb7
ASN1 sanity check.
...
Primitive encodings shouldn't use indefinite length constructed
form.
PR#2438 (partial).
(cherry picked from commit 398e99fe5e )
2014-07-02 00:59:44 +01:00
Dr. Stephen Henson
654ae3d6ad
Accessor functions for app_data in ECDSA_METHOD
...
(cherry picked from commit 387b844ffd )
2014-07-02 00:59:43 +01:00
Ben Laurie
70c739b8db
Fix possible buffer overrun.
...
(cherry picked from commit 2db3ea2929 )
Conflicts:
ssl/ssl_locl.h
ssl/t1_lib.c
2014-07-02 00:09:39 +01:00
Andy Polyakov
daa96141d3
sha512-x86_64.pl: fix linking problem under Windows.
...
(cherry picked from commit 29be3f6411 )
2014-07-01 17:12:41 +02:00
Dr. Stephen Henson
802fdcda1e
Fix copy for CCM, GCM and XTS.
...
Internal pointers in CCM, GCM and XTS contexts should either be
NULL or set to point to the appropriate key schedule. This needs
to be adjusted when copying contexts.
(cherry picked from commit c2fd5d79ff )
2014-06-30 13:59:38 +01:00
Dr. Stephen Henson
6006e352ad
Make EVP_Digest* work again.
2014-06-30 13:59:29 +01:00
Dr. Stephen Henson
2af68ef774
Don't core dump when using CMAC with dgst.
...
We can't unfortunately print the CMAC cipher used without extending the API.
PR#2579
(cherry picked from commit 79e31a2842e10271581cbfdaae0145dd4bd35107)
2014-06-29 23:44:44 +01:00
Dr. Stephen Henson
df401f4796
Make CMAC work with EVP_PKEY.
...
Add patch originally accidentally omitted to allow CMAC to work with
EVP_PKEY APIs.
2014-06-29 23:44:44 +01:00
Jeffrey Walton
3875ee59ba
Clarified that the signature's buffer size, s, is not used as an
...
IN parameter.
Under the old docs, the only thing stated was "at most
EVP_PKEY_size(pkey) bytes will be written". It was kind of misleading
since it appears EVP_PKEY_size(pkey) WILL be written regardless of the
signature's buffer size.
(cherry picked from commit 6e6ba36d98 )
2014-06-29 23:36:22 +01:00
ZNV
14183e50e7
Make EVP_CIPHER_CTX_copy work in GCM mode.
...
PR#3272
(cherry picked from commit 370bf1d708 )
2014-06-29 22:02:23 +01:00
Dr. Stephen Henson
15de0f609c
Fix memory leak.
...
PR#2531
(cherry picked from commit 44724beead )
2014-06-29 13:51:57 +01:00
Ken Ballou
4824e7d6e9
Typo.
...
PR#3173
(cherry picked from commit 76ed5a42ea )
2014-06-29 13:39:20 +01:00
Dr. Stephen Henson
a3b8cd242a
Show errors on CSR verification failure.
...
If CSR verify fails in ca utility print out error messages.
Otherwise some errors give misleading output: for example
if the key size exceeds the library limit.
PR#2875
(cherry picked from commit a30bdb55d1 )
2014-06-29 13:34:25 +01:00
Dr. Stephen Henson
d1cc95f781
Make no-ssl3 no-ssl2 do more sensible things.
...
(cherry picked from commit 7ae6a4b659 )
2014-06-29 03:05:21 +01:00
Dr. Stephen Henson
6d02baf6ab
Clarify protocols supported.
...
Update protocols supported and note that SSLv2 is effectively disabled
by default.
PR#3184
(cherry picked from commit 1b13a4f38dfc385d5e776f6b3e06c5795874cf9b)
2014-06-29 00:07:07 +01:00
Andy Polyakov
377551b9c4
x86_64 assembly pack: refine clang detection.
...
(cherry picked from commit a356e488ad )
Resolved conflicts:
crypto/bn/asm/rsaz-avx2.pl
2014-06-28 17:26:03 +02:00
Dr. Stephen Henson
361fd136e9
Typo.
...
PR#3107
(cherry picked from commit 7c206db928 )
2014-06-28 12:42:59 +01:00
Dr. Stephen Henson
4950a528ce
Don't disable state strings with no-ssl2
...
Some state strings were erronously not compiled when no-ssl2
was set.
PR#3295
(cherry picked from commit 0518a3e19e )
2014-06-28 00:56:27 +01:00
yogesh nagarkar
00ab230a3f
Fix compilation with -DSSL_DEBUG -DTLS_DEBUG -DKSSL_DEBUG
...
PR#3141
(cherry picked from commit d183545d45 )
2014-06-28 00:41:31 +01:00
Andreas Westfeld
e99980e8fd
Fix typo in ideatest.c
...
(cherry picked from commit d1d4382dcb )
2014-06-28 00:06:32 +01:00
Ken Ballou
ec77f276e1
Remove redundant check.
...
PR#3174
(cherry picked from commit fd331c0bb9b557903dd2ce88398570a3327b5ef0)
2014-06-27 23:19:37 +01:00
Dr. Stephen Henson
d0ba994483
Fix for EVP_PBE_alg_add().
...
In EVP_PBE_alg_add don't use the underlying NID for the cipher
as it may have a non-standard key size.
PR#3206
(cherry picked from commit efb7caef637a1de8468ca109efd355a9d0e73a45)
2014-06-27 23:19:37 +01:00
Andy Polyakov
52f856526c
x86_64 assembly pack: addendum to last clang commit.
...
(cherry picked from commit 7eb0488280 )
2014-06-27 22:55:22 +02:00
Andy Polyakov
912f08dd5e
x86_64 assembly pack: allow clang to compile AVX code.
...
(cherry picked from commit ac171925ab )
2014-06-27 22:55:07 +02:00
Andy Polyakov
1067663d85
bn/asm/rsaz-avx2.pl: fix occasional failures.
...
(cherry picked from commit 406d4af050 )
2014-06-27 22:43:43 +02:00
Dr. Stephen Henson
22228d2d40
Tolerate critical AKID in CRLs.
...
PR#3014
(cherry picked from commit 11da66f8b1 )
2014-06-27 18:50:19 +01:00
Tom Greenslade
c57745596c
Handle IPv6 addresses in OCSP_parse_url.
...
PR#2783
(cherry picked from commit b36f35cda9 )
2014-06-27 17:31:37 +01:00
Dr. Stephen Henson
65e4dca40c
Rebuild OID table.
2014-06-27 16:58:41 +01:00
Dr. Stephen Henson
ff4cfc4c58
Fix OID encoding for one component.
...
OIDs with one component don't have an encoding.
PR#2556 (Bug#1)
(cherry picked from commit 95791bf941 )
2014-06-27 16:58:16 +01:00
Tomas Mraz
f4623ab996
Don't advertise ECC ciphersuits in SSLv2 compatible client hello.
...
PR#3374
(cherry picked from commit 0436369fcc )
2014-06-27 16:52:00 +01:00
Jeffrey Walton
6ef350952c
Clarify docs.
...
Document that the certificate passed to SSL_CTX_add_extra_chain_cert()
should not be freed by the application.
PR#3409
(cherry picked from commit 0535c2d67c )
2014-06-27 16:39:39 +01:00
Dr. Stephen Henson
e42c208235
Memory leak and NULL dereference fixes.
...
PR#3403
(cherry picked from commit d2aea03829 )
2014-06-27 14:52:36 +01:00
Dr. Stephen Henson
e86951ca2a
Remove ancient obsolete files under pkcs7.
...
(cherry picked from commit 7be6b27aaf )
2014-06-27 13:53:23 +01:00
Huzaifa Sidhpurwala
b7a4f98b15
Make sure BN_sqr can never return a negative value.
...
PR#3410
(cherry picked from commit e14e764c0d5d469da63d0819c6ffc0e1e9e7f0bb)
2014-06-26 23:56:32 +01:00
Andy Polyakov
82a9dafe32
bn_exp.c: move check for AD*X to rsaz-avx2.pl.
...
This ensures high performance is situations when assembler supports
AVX2, but not AD*X.
(cherry picked from commit f3f620e1e0 )
Resolved conflicts:
crypto/bn/asm/rsaz-avx2.pl
2014-06-27 00:36:05 +02:00
Andy Polyakov
1536bcfd56
aesv8-armx.pl: rigid input verification in key setup.
...
(cherry picked from commit 7b8c8c4d79 )
2014-06-25 22:12:08 +02:00
Viktor Dukhovni
3fc0b1edad
X509_check_mumble() failure is <= 0, not just 0
...
(cherry picked from commit a48fb0400c )
2014-06-25 18:21:36 +01:00
Viktor Dukhovni
3d15d58e55
More complete input validation of X509_check_mumble
...
(cherry picked from commit 29edebe95c )
2014-06-25 18:21:35 +01:00
Viktor Dukhovni
d93edc0aab
Drop hostlen from X509_VERIFY_PARAM_ID.
...
Just store NUL-terminated strings. This works better when we add
support for multiple hostnames.
(cherry picked from commit b3012c698a )
2014-06-25 18:21:35 +01:00
Viktor Dukhovni
609daababb
More complete X509_check_host documentation.
...
(cherry picked from commit d241b80409 )
2014-06-25 18:21:35 +01:00
Andy Polyakov
a073ceeff4
aesv8-armx.pl: inclrease interleave factor.
...
This is to compensate for higher aes* instruction latency on Cortex-A57.
(cherry picked from commit 015364baf3 )
2014-06-24 08:10:37 +02:00
Andy Polyakov
5cd8ce42ec
ARMv8 assembly pack: add Cortex performance numbers.
...
(cherry picked from commit 0f777aeb50 )
2014-06-24 08:07:04 +02:00
Miod Vallat
d15f2d98ef
Fix off-by-one errors in ssl_cipher_get_evp()
...
In the ssl_cipher_get_evp() function, fix off-by-one errors in index validation before accessing arrays.
Bug discovered and fixed by Miod Vallat from the OpenBSD team.
PR#3375
2014-06-22 23:18:15 +01:00
Matt Caswell
00f5ee445b
Revert "Fix off-by-one errors in ssl_cipher_get_evp()"
...
This reverts commit 3d86077427 .
Incorrect attribution.
2014-06-22 23:17:40 +01:00
Matt Caswell
e7911530a9
Fixed Windows compilation failure
2014-06-22 20:18:09 +02:00
Richard Levitte
6ff73426c3
Make sure test/tests.com exit gracefully, even when openssl.exe wasn't
...
properly built.
2014-06-18 13:43:10 +02:00
Richard Levitte
a61e509e9b
Adjust VMS build to Unix build. Most of all, make it so the disabled
...
algorithms MD2 and RC5 don't get built.
Also, disable building the test apps in crypto/des and crypto/pkcs7, as
they have no support at all.
2014-06-18 13:43:09 +02:00
Felix Laurie von Massenbach
1b823494de
Fix signed/unsigned comparisons.
...
(cherry picked from commit 50cc4f7b3d )
2014-06-17 18:38:36 +01:00
Felix Laurie von Massenbach
6657e68bf2
Fix shadow declaration.
...
(cherry picked from commit 1f61d8b5b1 )
2014-06-17 18:36:48 +01:00
Richard Levitte
23351c607b
Remove unused DANE macros. This should be the last DANE stuff...
2014-06-17 12:38:20 +02:00
Richard Levitte
9a6112d16a
DCL doesn't do well with empty lines, or lines starting with #
2014-06-16 13:25:16 +02:00
Richard Levitte
b9c0dae28e
Spaces were added in some strings for better readability. However, those spaces do not belong in file names, so when picking out the individual parts, remove the spaces
2014-06-16 13:25:16 +02:00
Andy Polyakov
d940b3b9c7
aesni-sha[1|256]-x86_64.pl: fix logical error and MacOS X build.
...
(cherry picked from commit 9024b84b7c )
2014-06-16 10:12:56 +02:00
Viktor Dukhovni
cfbc10fb32
Enforce _X509_CHECK_FLAG_DOT_SUBDOMAINS internal-only
...
(cherry picked from commit d435e23959f1c2cb4feadbfba9ad884c59f37db9)
2014-06-14 22:31:28 +01:00
Dr. Stephen Henson
90d94ce39e
Accept CCS after sending finished.
...
Allow CCS after finished has been sent by client: at this point
keys have been correctly set up so it is OK to accept CCS from
server. Without this renegotiation can sometimes fail.
PR#3400
(cherry picked from commit 99cd6a91fcb0931feaebbb4832681d40a66fad41)
2014-06-14 22:31:28 +01:00
Andy Polyakov
79b960c046
evp/e_aes_cbc_sha[1|256].c: fix -DPEDANTIC build.
...
(cherry picked from commit ce00c64df9 )
2014-06-14 23:16:29 +02:00
Richard Levitte
66a6e2b2b6
Adjust VMS build files to the Unix ones
2014-06-14 16:58:11 +02:00
Richard Levitte
1be1d05184
Make sure that disabling the MAYLOSEDATA3 warning is only done when the
...
compiler supports it. Otherwise, there are warnings about it lacking
everywhere, which is quite tedious to read through while trying to check
for other warnings.
2014-06-14 16:58:11 +02:00
Richard Levitte
9f8c183283
Update the VMS tests according to the latest unixly tests.
...
Partly provided by Zoltan Arpadffy <arpadffy@polarhome.com >
2014-06-14 16:58:11 +02:00
Andy Polyakov
8301245a5e
aesni-sha256-x86_64.pl: add missing rex in shaext.
...
PR: 3405
(cherry picked from commit 91a6bf80f8 )
2014-06-14 16:04:04 +02:00
Andy Polyakov
1f6d207625
sha1-x86_64.pl: add missing rex prefix in shaext.
...
PR: 3405
(cherry picked from commit c9cf29cca2 )
2014-06-14 15:28:38 +02:00
Matt Caswell
561ba12463
Fixed incorrect return code handling in ssl3_final_finish_mac.
...
Based on an original patch by Joel Sing (OpenBSD) who also originally identified the issue.
2014-06-13 15:50:58 +01:00
Matt Caswell
7f133c357b
Revert "Fixed incorrect return code handling in ssl3_final_finish_mac"
...
This reverts commit 728bd41a15 .
Missing attribution.
2014-06-13 15:50:28 +01:00
Viktor Dukhovni
3cc8a3f234
Client-side namecheck wildcards.
...
A client reference identity of ".example.com" matches a server
certificate presented identity that is any sub-domain of "example.com"
(e.g. "www.sub.example.com).
With the X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS flag, it matches
only direct child sub-domains (e.g. "www.sub.example.com").
(cherry picked from commit e52c52f10bb8e34aaf8f28f3e5b56939e8f6b357)
2014-06-12 23:19:24 +01:00
Kurt Cancemi
3d86077427
Fix off-by-one errors in ssl_cipher_get_evp()
...
In the ssl_cipher_get_evp() function, fix off-by-one errors in index validation before accessing arrays.
PR#3375
2014-06-12 21:12:43 +01:00
Andy Polyakov
56ba280ccd
Facilitate back-porting of AESNI and SHA modules.
...
Fix SEH and stack handling in Win64 build.
(cherry picked from commit 977f32e852 )
2014-06-12 21:51:35 +02:00
Matt Caswell
955bfbc268
Added OPENSSL_assert check as per PR#3377 reported by Rainer Jung <rainer.jung@kippdata.de>
2014-06-12 20:42:33 +01:00
Dr. Stephen Henson
2eab488c02
remove some more DANE code
2014-06-12 11:09:14 +01:00
Dr. Stephen Henson
fa7a0efbac
make update
2014-06-12 10:52:49 +01:00
Dr. Stephen Henson
3fe8f005b0
Fix Windows build.
2014-06-12 10:52:49 +01:00
Dr. Stephen Henson
5af09776ce
Remove unimplemented functions.
2014-06-12 10:52:49 +01:00
Richard Levitte
995d08d104
Update the VMS build according to the latest unixly build.
...
Partly provided by Zoltan Arpadffy <arpadffy@polarhome.com >
2014-06-12 16:59:47 +02:00
Richard Levitte
ca422f3563
The 1.0.2 cms-test.pl had some changes that don't quite work on VMS...
2014-06-12 16:58:39 +02:00
Richard Levitte
68a1e0bc35
Bring in the 1.0.1g to 1.0.1h changes into CHANGES.
2014-06-12 12:22:24 +02:00
Richard Levitte
ed6c278f60
Small cleanup, double entry in CHANGES.
2014-06-12 12:18:13 +02:00
Andy Polyakov
d85a772ec3
Enable multi-block support by default.
...
(cherry picked from commit 77a27a5066 )
2014-06-11 20:41:46 +02:00
Dr. Stephen Henson
fb2f9f266c
Fix compilation with no-comp
...
(cherry picked from commit 7239a09c7b5757ed8d0e9869f3e9b03c0e11f4d1)
2014-06-11 14:41:00 +01:00
Andy Polyakov
66aeaec067
ghash-x86_64.pl: optimize for upcoming Atom.
...
(cherry picked from commit 1cf8f57b43 )
2014-06-11 11:35:23 +02:00
Andy Polyakov
70fddbe32a
Add support for Intel SHA extension.
...
(cherry picked from commit 619b94667c )
2014-06-11 10:30:31 +02:00
Rob Stradling
5fc3d333c7
Separate the SCT List parser from the SCT List viewer
...
(cherry picked from commit fd2309aa29 )
2014-06-11 00:10:45 +01:00
Matt Caswell
728bd41a15
Fixed incorrect return code handling in ssl3_final_finish_mac
2014-06-10 23:32:27 +01:00
Andy Polyakov
77fb5a303b
Engage GHASH for ARMv8.
...
(cherry picked from commit 82741e9c89 )
2014-06-11 00:10:00 +02:00
Andy Polyakov
7344089dc3
Add GHASH for ARMv8 Crypto Extension.
...
Result of joint effort with Ard Biesheuvel.
(cherry picked from commit 2d5a799d27 )
2014-06-11 00:09:35 +02:00
Andy Polyakov
7e03acf2be
Engage ARMv8 AES support [from HEAD].
2014-06-11 00:08:03 +02:00
Andy Polyakov
9af4cb3d3b
Add AES module for ARMv8 Crypto Extension [from HEAD].
2014-06-11 00:06:27 +02:00
Andy Polyakov
a00caa0257
sha[1|512]-armv8.pl: get instruction endianness right.
...
Submitted by: Ard Biesheuvel.
(cherry picked from commit cd91fd7c32 )
2014-06-10 23:34:53 +02:00
Andy Polyakov
4672acfa7d
linux-aarch64: engage SHA modules.
...
(cherry picked from commit f8aab6174c )
2014-06-10 23:32:26 +02:00
Andy Polyakov
ea61b32719
Add SHA for ARMv8.
...
(cherry picked from commit ddb6b965da )
2014-06-10 23:32:16 +02:00
Andy Polyakov
dabfbea7d9
Add linux-aarch64 taget.
...
armcap.c is shared between 32- and 64-bit builds and features link-time
detection of getauxval.
Submitted by: Ard Biesheuvel.
(cherry picked from commit e8d93e342b )
2014-06-10 23:20:55 +02:00
Andy Polyakov
56d973709c
aesni-mb-x86_64.pl: add Win64 SEH.
...
(cherry picked from commit e2eabed110 )
2014-06-10 23:09:04 +02:00
Andy Polyakov
3a97ebb16b
ARM assembly pack: get ARMv7 instruction endianness right.
...
Pointer out and suggested by: Ard Biesheuvel.
(cherry picked from commit 5dcf70a1c5 )
2014-06-10 22:51:15 +02:00
Andy Polyakov
16f4d2e32f
armv4cpuid.S: switch to CNTVCT tick counter.
...
(cherry picked from commit 723463282f )
2014-06-10 22:50:18 +02:00
Andy Polyakov
1f72a76f98
sha[1|256]-armv4: harmonize with arm_arch.h.
...
(cherry picked from commit 797d24bee9 )
2014-06-10 22:49:54 +02:00
Andy Polyakov
f5247cea39
sha/asm/sha1-armv4-large.pl: add NEON and ARMv8 code paths.
...
sha/asm/sha256-armv4.pl: add ARMv8 code path.
(cherry picked from commit 9250a30692 )
2014-06-10 22:48:27 +02:00
Andy Polyakov
3da2c3df78
crypto/armcap.c: detect ARMv8 capabilities [in 32-bit build].
...
(cherry picked from commit 4afa9f033d )
2014-06-10 22:47:19 +02:00
Hubert Kario
4ceddeea6c
backport changes to ciphers(1) man page
...
Backport of patch:
add ECC strings to ciphers(1), point out difference between DH and ECDH
and backport of other other assorted fixes to this man page
* Make a clear distinction between DH and ECDH key exchange.
* Group all key exchange cipher suite identifiers, first DH then ECDH
* add descriptions for all supported *DH* identifiers
* add ECDSA authentication descriptions
* add example showing how to disable all suites that offer no
authentication or encryption
* update status of static DH (it's now supported)
* backport descriptions of AES128, AES256, AESGCM
* backport descriptions of CAMELLIA128, CAMELLIA256
* backport listing of standard names for ECC cipher suites
and TLSv1.2 cipher suites
* backport description of PSK cipher suites
2014-06-10 20:55:14 +01:00
Mike Bland
2fddc5fc09
Create test/testutil.h for unit test helper macros
...
Defines SETUP_TEST_FIXTURE and EXECUTE_TEST, and updates ssl/heartbeat_test.c
using these macros. SETUP_TEST_FIXTURE makes use of the new TEST_CASE_NAME
macro, defined to use __func__ or __FUNCTION__ on platforms that support those
symbols, or to use the file name and line number otherwise. This should fix
several reported build problems related to lack of C99 support.
2014-06-10 19:24:46 +01:00
Dr. Stephen Henson
e3beef1e1b
Remove experimental DANE code.
...
Remove experimental DANE/dnssec code: not ready for use in an
official release yet.
2014-06-10 14:59:10 +01:00
Dr. Stephen Henson
cea5a1d5f2
Fix null pointer errors.
...
PR#3394
(cherry picked from commit 7a9d59c148 )
2014-06-10 14:48:02 +01:00
Dr. Stephen Henson
f472ada006
SRP ciphersuite correction.
...
SRP ciphersuites do not have no authentication. They have authentication
based on SRP. Add new SRP authentication flag and cipher string.
(cherry picked from commit a86b88acc373ac1fb0ca709a5fb8a8fa74683f67)
2014-06-09 12:09:51 +01:00
Dr. Stephen Henson
05b2210476
Update strength_bits for 3DES.
...
Fix strength_bits to 112 for 3DES.
(cherry picked from commit 837c203719205ab19b5609b2df7151be8df05687)
2014-06-09 12:09:51 +01:00
Kurt Roeckx
33e1a1d652
Link heartbeat_test with the static version of the libraries
...
It's using an internal API that that might not be available in the shared
library.
2014-06-09 00:12:37 +01:00
Jakub Wilk
38956b071a
Create ~/.rnd with mode 0600 instead of 0666
...
Because of a missing include <fcntl.h> we don't have O_CREATE and don't create
the file with open() using mode 0600 but fall back to using fopen() with the
default umask followed by a chmod().
Problem found by Jakub Wilk <jwilk@debian.org >.
2014-06-08 21:20:34 +01:00
Dr. Stephen Henson
a21f350a76
Make tls_session_secret_cb work with CVE-2014-0224 fix.
...
If application uses tls_session_secret_cb for session resumption
set the CCS_OK flag.
(cherry picked from commit 953c592572e8811b7956cc09fbd8e98037068b58)
2014-06-07 15:27:23 +01:00
Dr. Stephen Henson
74360af359
Update NEWS.
2014-06-07 15:27:23 +01:00
Matt Caswell
5400882ca3
Fixed minor duplication in docs
2014-06-07 12:31:38 +01:00
Dr. Stephen Henson
eb6508d50c
Fix for CVE-2014-0195
...
A buffer overrun attack can be triggered by sending invalid DTLS fragments
to an OpenSSL DTLS client or server. This is potentially exploitable to
run arbitrary code on a vulnerable client or server.
Fixed by adding consistency check for DTLS fragments.
Thanks to Jüri Aedla for reporting this issue.
(cherry picked from commit 1632ef7448 )
2014-06-05 13:24:50 +01:00
Dr. Stephen Henson
77719aefb8
Fix for CVE-2014-0224
...
Only accept change cipher spec when it is expected instead of at any
time. This prevents premature setting of session keys before the master
secret is determined which an attacker could use as a MITM attack.
Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for reporting this issue
and providing the initial fix this patch is based on.
(cherry picked from commit bc8923b1ec )
2014-06-05 13:24:46 +01:00
Dr. Stephen Henson
9d2c9dd1e1
Additional CVE-2014-0224 protection.
...
Return a fatal error if an attempt is made to use a zero length
master secret.
(cherry picked from commit 006cd7083f )
2014-06-05 13:24:40 +01:00
Dr. Stephen Henson
8942b92c7c
Fix CVE-2014-0221
...
Unnecessary recursion when receiving a DTLS hello request can be used to
crash a DTLS client. Fixed by handling DTLS hello request without recursion.
Thanks to Imre Rad (Search-Lab Ltd.) for discovering this issue.
(cherry picked from commit d3152655d5 )
2014-06-05 13:24:36 +01:00
Dr. Stephen Henson
e5f706590c
Fix CVE-2014-3470
...
Check session_cert is not NULL before dereferencing it.
(cherry picked from commit 8011cd56e3 )
2014-06-05 13:24:30 +01:00
Libor Krystek
a5d03c54ab
Corrected OPENSSL_NO_EC_NISTP_64_GCC_128 usage in ec_lcl.h. PR#3370
2014-06-03 23:17:21 +01:00
David Benjamin
56b94a38b9
Check there is enough room for extension.
...
(cherry picked from commit 7d89b3bf42e4b4067371ab33ef7631434e41d1e4)
2014-06-02 18:59:48 +01:00
zhu qun-ying
d52eb82781
Free up s->d1->buffered_app_data.q properly.
...
PR#3286
(cherry picked from commit 71e95000afb2227fe5cac1c79ae884338bcd8d0b)
2014-06-02 14:40:05 +01:00
Dr. Stephen Henson
4967a832ab
Allow reordering of certificates when signing.
...
Add certificates if -nocerts and -certfile specified when signing
in smime application. This can be used this to specify the
order certificates appear in the PKCS#7 structure: some broken
applications require a certain ordering.
PR#3316
(cherry picked from commit e114abee9ec084a56c1d6076ac6de8a7a3a5cf34)
2014-06-02 14:19:43 +01:00
Sami Farin
6468866823
Typo: set i to -1 before goto.
...
PR#3302
(cherry picked from commit 9717f01951f976f76dd40a38d9fc7307057fa4c4)
2014-06-02 13:53:54 +01:00
Matt Caswell
de8a5b523f
Added SSLErr call for internal error in dtls1_buffer_record
2014-06-01 21:40:31 +01:00
David Ramos
8de85b0048
Delays the queue insertion until after the ssl3_setup_buffers() call due to use-after-free bug. PR#3362
2014-06-01 21:40:25 +01:00
Dr. Stephen Henson
8d71574142
Recognise padding extension.
...
(cherry picked from commit ea2bb861f0daaa20819bf9ac8c146f7593feacd4)
Conflicts:
apps/s_cb.c
2014-06-01 16:50:25 +01:00
Dr. Stephen Henson
623a01df49
Option to disable padding extension.
...
Add TLS padding extension to SSL_OP_ALL so it is used with other
"bugs" options and can be turned off.
This replaces SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG which is an ancient
option referring to SSLv2 and SSLREF.
PR#3336
(cherry picked from commit 758415b2259fa45d3fe17d8e53ae1341b7b6e482)
Conflicts:
ssl/t1_lib.c
2014-06-01 16:50:25 +01:00
Dr. Stephen Henson
08b172b975
Set default global mask to UTF8 only.
...
(cherry picked from commit 3009244da4 )
2014-06-01 15:04:21 +01:00
David Ramos
856a4585d6
Allocate extra space when NETSCAPE_HANG_BUG defined.
...
Make sure there is an extra 4 bytes for server done message when
NETSCAPE_HANG_BUG is defined.
PR#3361
(cherry picked from commit 92d81ba622 )
2014-06-01 14:27:58 +01:00
David Ramos
3329765bba
Initialise alg.
...
PR#3313
(cherry picked from commit 7e2c6f7eb0 )
2014-06-01 13:05:08 +01:00
Dr. Stephen Henson
87a0cbdf2e
Use correct digest when exporting keying material.
...
PR#3319
(cherry picked from commit 84691390eae86befd33c83721dacedb539ae34e6)
2014-05-30 13:24:36 +01:00
Dr. Stephen Henson
b5bdde9e0e
Don't compile heartbeat test code on Windows (for now).
...
(cherry picked from commit 2c575907d2c8601a18716f718ce309ed4e1f1783)
2014-05-30 13:12:26 +01:00
Dr. Stephen Henson
1788072b9e
Set version number correctly.
...
PR#3249
(cherry picked from commit 8909bf20269035d295743fca559207ef2eb84eb3)
2014-05-29 14:08:54 +01:00
František Bořánek
5f2b5e3823
Fix memory leak.
...
PR#3278
(cherry picked from commit de56fe797081fc09ebd1add06d6e2df42a324fd5)
2014-05-29 13:49:50 +01:00
Martin Kaiser
42d73874ed
remove duplicate 0x for default RSASSA-PSS salt len
...
(cherry picked from commit 3820fec3a09faecba7fe9912aa20ef7fcda8337b)
2014-05-29 13:32:41 +01:00
Matt Caswell
88d3d6c9ae
Fixed error in args for SSL_set_msg_callback and SSL_set_msg_callback_arg
2014-05-25 23:47:32 +01:00
Ben Laurie
3435ef467f
Only copy opensslconf.h at init time.
2014-05-24 15:48:24 +01:00
Andy Polyakov
c90c694bc4
vpaes-ppc.pl: comply with ABI.
...
(cherry picked from commit b83d09f552 )
2014-05-23 20:16:21 +02:00
Mike Bland
8db2ba4b84
Fix heartbeat_test for -DOPENSSL_NO_HEARTBEATS
...
Replaces the entire test with a trivial implementation when
OPENSSL_NO_HEARTBEATS is defined.
2014-05-22 22:02:46 +01:00
Ben Laurie
d77501d8fd
Check length first in BUF_strnlen().
2014-05-22 10:12:10 +01:00
Matt Caswell
15e4565984
Fixed minor copy&paste error, and stray space causing rendering problem
2014-05-22 00:11:40 +01:00
Matt Caswell
5757766550
Fixed unterminated B tag, causing build to fail with newer pod2man versions
2014-05-22 00:01:33 +01:00
Ben Laurie
4f7236edc7
Remove redundant test.
2014-05-21 12:03:50 +01:00
Ben Laurie
ed693e4332
Implement BUF_strnlen() and use it instead of strlen().
2014-05-21 11:56:21 +01:00
Viktor Dukhovni
a2219f6be3
Fixes to host checking.
...
Fixes to host checking wild card support and add support for
setting host checking flags when verifying a certificate
chain.
(cherry picked from commit 397a8e747d )
2014-05-21 11:32:19 +01:00
Dr. Stephen Henson
03b5b78c09
Fix for PKCS12_create if no-rc2 specified.
...
Use triple DES for certificate encryption if no-rc2 is
specified.
PR#3357
2014-05-21 11:28:57 +01:00
Dr. Stephen Henson
cd302feb5d
Change default cipher in smime app to des3.
...
PR#3357
(cherry picked from commit ca3ffd9670f2b589bf8cc04923f953e06d6fbc58)
2014-05-21 11:28:57 +01:00
Ben Laurie
5cd1a6fc3e
Fix signed/unsigned warning.
2014-05-20 15:14:30 +01:00
Ben Laurie
4ceb430a46
Don't allocate more than is needed in BUF_strndup().
2014-05-20 13:53:35 +01:00
Dr. Stephen Henson
81ce94f8dc
For portability use BUF_strndup instead of strndup.
...
(cherry picked from commit dcca7b13e9 )
2014-05-20 11:22:33 +01:00
Dr. Stephen Henson
feaa3b380b
Adding padding extension to trace code.
...
(cherry picked from commit 6db14dbc51 )
2014-05-20 11:22:15 +01:00
Janpopan
5d8e9f2ae0
Fix a wrong parameter count ERR_add_error_data
2014-05-19 22:15:27 +01:00
Ben Laurie
6c1d36a649
Merge branch 'mbland-heartbeat-test-1.0.2' into OpenSSL_1_0_2-stable
2014-05-19 18:04:41 +01:00
Mike Bland
2312a84ca1
Unit/regression test for TLS heartbeats.
...
Regression test against CVE-2014-0160 (Heartbleed).
More info: http://mike-bland.com/tags/heartbleed.html
(based on commit 35cb55988b75573105eefd00d27d0138eebe40b1)
2014-05-18 10:23:59 -04:00
Matt Caswell
a99d2a22e1
Moved note about lack of support for AEAD modes out of BUGS section to SUPPORTED CIPHERS section (bug has been fixed, but still no support for AEAD)
2014-05-15 21:15:21 +01:00
Dr. Stephen Henson
2fa65aa7d8
Enc doesn't support AEAD ciphers.
...
(cherry picked from commit 09184dddead165901700b31eb39d540ba30f93c5)
2014-05-15 14:16:45 +01:00
Jeffrey Walton
4907cf0845
Fix grammar error in verify pod. PR#3355
2014-05-14 22:58:19 +01:00
Jeffrey Walton
28b4820f70
Add information to BUGS section of enc documentation. PR#3354
2014-05-14 22:58:19 +01:00
Michal Bozon
72967d5be9
Corrected POD syntax errors. PR#3353
2014-05-14 22:58:19 +01:00
Mike Frysinger
4aebb2c8b8
Have the .pc files depend on each other rather than duplicating the
...
various link settings. PR#3332
2014-05-12 23:33:35 +01:00
Kurt Roeckx
1f5bce2dce
Check sk_SSL_CIPHER_num() after assigning sk.
2014-05-12 22:59:11 +01:00
Jean-Paul Calderone
b953b02849
Correct the return type on the signature for X509_STORE_CTX_get_ex_data given in the pod file.
2014-05-12 22:49:00 +01:00
Serguei E. Leontiev
d6e55b4001
Replace manual ASN1 decoder with ASN1_get_object
...
Replace manual ASN.1 decoder with ASN1_get object. This
will decode the tag and length properly and check against
it does not exceed the supplied buffer length.
PR#3335
(cherry picked from commit b0308dddd1cc6a8e1de803ef29ba6da25ee072c2)
2014-05-12 18:41:51 +01:00
Matt Caswell
f710c3f198
Fixed NULL pointer dereference. See PR#3321
2014-05-12 00:39:43 +01:00
Kurt Roeckx
99a3d167d9
Set authkey to NULL and check malloc return value.
2014-05-12 00:22:52 +01:00
Martin Brejcha
c622649513
dgram_sctp_ctrl: authkey memory leak
...
PR: 3327
2014-05-12 00:22:52 +01:00
Günther Noack
8571902e23
Avoid out-of-bounds write in SSL_get_shared_ciphers
...
PR: 3317
2014-05-11 23:55:06 +01:00
Viktor Dukhovni
711bb9bc88
Fix infinite loop. PR#3347
2014-05-11 21:09:56 +01:00
Matt Caswell
f2ebe2a60e
Move length check earlier to ensure we don't go beyond the end of the user's buffer. PR#3320
2014-05-11 11:32:17 +01:00
Tim Hudson
011ee91105
safety check to ensure we dont send out beyond the users buffer
2014-05-11 11:32:17 +01:00
Dr. Stephen Henson
2c4144638a
Return an error if no recipient type matches.
...
If the key type does not match any CMS recipient type return
an error instead of using a random key (MMA mitigation). This
does not leak any useful information to an attacker.
PR#3348
(cherry picked from commit bd43b4cf778a53ffa5d77510ecd408a009dc00d2)
2014-05-09 14:24:53 +01:00
Tim Hudson
2fc04cb872
coverity 966576 - close socket in error path
2014-05-08 23:22:28 +01:00
Tim Hudson
62cc5ff623
PR#3342 fix resource leak coverity issue 966577
2014-05-08 23:22:21 +01:00
Tim Hudson
afe343c3a7
fix coverity issue 966597 - error line is not always initialised
2014-05-07 23:57:00 +01:00
Matt Caswell
e0d2139045
Fixed NULL pointer dereference in PKCS7_dataDecode reported by David Ramos in PR#3339
2014-05-07 23:23:15 +01:00
Geoff Thorpe
d60f019321
dso: eliminate VMS code on non-VMS systems
...
Even though the meat of dso_vms.c is compiled out on non-VMS builds,
the (pre-)compiler still traverses some of the macro handling. This
trips up at least one non-VMS build configuration, so this commit
makes the skip-VMS case more robust.
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
2014-05-06 18:03:52 -04:00
Geoff Thorpe
65402586c0
evp: prevent underflow in base64 decoding
...
This patch resolves RT ticket #2608 .
Thanks to Robert Dugal for originally spotting this, and to David
Ramos for noticing that the ball had been dropped.
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
2014-05-06 18:02:02 -04:00
Geoff Thorpe
bf43446835
bignum: allow concurrent BN_MONT_CTX_set_locked()
...
The lazy-initialisation of BN_MONT_CTX was serialising all threads, as
noted by Daniel Sands and co at Sandia. This was to handle the case that
2 or more threads race to lazy-init the same context, but stunted all
scalability in the case where 2 or more threads are doing unrelated
things! We favour the latter case by punishing the former. The init work
gets done by each thread that finds the context to be uninitialised, and
we then lock the "set" logic after that work is done - the winning
thread's work gets used, the losing threads throw away what they've done.
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
2014-05-06 18:01:59 -04:00
Dr. Stephen Henson
7169e56d6b
Initialize num properly.
...
PR#3289
PR#3345
(cherry picked from commit 3ba1e406c2 )
2014-05-06 14:09:07 +01:00
Dr. Stephen Henson
1047b8c84d
Set Enveloped data version to 2 if ktri version not zero.
...
(cherry picked from commit 546b1b4384 )
2014-05-06 14:00:11 +01:00
Tim Hudson
9740a03695
- fix coverity issues 966593-966596
2014-05-06 00:04:59 +01:00
David Ramos
e34af3ec2b
Double free in i2o_ECPublicKey
...
PR: 3338
2014-05-04 00:50:42 +01:00
Jeff Trawick
d576146ebf
typo in SSL_get_peer_cert_chain docs
...
RT: 3304
2014-05-02 00:26:05 +01:00
Matt Caswell
7441e7dbe9
Fixed spelling error in error message. Fix supplied by Marcos Marado
2014-05-01 00:27:02 +01:00
Matt Caswell
1d3f432b53
Fixed various pod errors
2014-05-01 00:07:28 +01:00
Lubomir Rintel
15a4add72d
POD: Fix item numbering
...
Newer pod2man considers =item [1-9] part of a numbered list, while =item
0 starts an unnumbered list. Add a zero effect formatting mark to override
this.
doc/apps/smime.pod around line 315: Expected text after =item, not a
number
...
PR#3146
2014-04-30 23:44:54 +01:00
Geoff Thorpe
3cc546a3bb
bignum: fix boundary condition in montgomery logic
...
It's not clear whether this inconsistency could lead to an actual
computation error, but it involved a BIGNUM being passed around the
montgomery logic in an inconsistent state. This was found using flags
-DBN_DEBUG -DBN_DEBUG_RAND, and working backwards from this assertion
in 'ectest';
ectest: bn_mul.c:960: BN_mul: Assertion `(_bnum2->top == 0) ||
(_bnum2->d[_bnum2->top - 1] != 0)' failed
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
(cherry picked from commit a529261891 )
2014-04-30 11:53:09 -04:00
Geoff Thorpe
c434f7f80f
util/mkerr.pl: fix perl warning
...
Gets rid of this;
defined(@array) is deprecated at ../util/mkerr.pl line 792.
(Maybe you should just omit the defined()?)
defined(@array) is deprecated at ../util/mkerr.pl line 800.
(Maybe you should just omit the defined()?)
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
(cherry picked from commit 647f360e2e )
2014-04-30 11:52:08 -04:00
mancha
e6a01b47e4
Fix version documentation.
...
Specify -f is for compilation flags. Add -d to synopsis section.
(cherry picked from commit 006397ea62bbcae22c8664d53c2222b808c4bdd1)
Closes #78 .
2014-04-26 11:20:00 +01:00
mancha
3f1b3d9675
Fix eckey_priv_encode()
...
Fix eckey_priv_encode to return an error on failure of i2d_ECPrivateKey.
2014-04-24 19:31:49 +00:00
Steve Marquess
3e124d66c8
Add new sponsors
...
(cherry picked from commit 351f0a124bffaa94d2a8abdec2e7dde5ae9c457d)
2014-04-24 12:33:01 +01:00
Andy Polyakov
0fb3d5b4fd
bn/asm/armv4-gf2m.pl, modes/asm/ghash-armv4.pl: faster multiplication
...
algorithm suggested in following paper:
Câmara, D.; Gouvêa, C. P. L.; López, J. & Dahab, R.: Fast Software
Polynomial Multiplication on ARM Processors using the NEON Engine.
http://conradoplg.cryptoland.net/files/2010/12/mocrysen13.pdf
(cherry picked from commit f8cee9d081 )
2014-04-24 10:27:52 +02:00
Andy Polyakov
ffdff9f12f
aes/asm/bsaes-x86_64.pl: Atom-specific optimization.
...
(cherry picked from commit 558ff0f0c1 )
2014-04-24 10:14:46 +02:00
Ben Laurie
a0fe2e72c4
Fix use after free.
2014-04-23 07:30:16 +01:00
Ben Laurie
3b21abfd6c
Fix double frees.
...
Conflicts:
CHANGES
2014-04-22 17:00:52 +01:00
Kaspar Brand
5aeb43393b
Fix SSL_CTX_get{first,next}_certificate.
...
Fix typo that stopped SSL_CTX_get_{first,next}_certificate from working.
(cherry picked from commit 9330a85e04 )
2014-04-21 16:53:48 +01:00
Dr. Stephen Henson
6e85eba11b
Document -debug_decrypt option.
...
(cherry picked from commit 0dd5b94aeb )
2014-04-16 12:35:54 +01:00
Dr. Stephen Henson
5cd5e0219d
Extension checking fixes.
...
When looking for an extension we need to set the last found
position to -1 to properly search all extensions.
PR#3309.
(cherry picked from commit 300b9f0b70 )
2014-04-15 18:52:50 +01:00
Dr. Stephen Henson
9c1d63540f
Clarify CMS_decrypt behaviour.
...
(cherry picked from commit 5f8e9a477a )
2014-04-15 18:19:26 +01:00
Dr. Stephen Henson
db34be4224
Add new key fingerprint.
...
(cherry picked from commit 3143a332e8 )
2014-04-11 02:51:34 +01:00
Dr. Stephen Henson
b9ce05acc4
Fix free errors in ocsp utility.
...
Keep copy of any host, path and port values allocated by
OCSP_parse_url and free as necessary.
(cherry picked from commit 5219d3dd35 )
2014-04-09 15:45:16 +01:00
Steven M. Schweda
6ef9d9bacf
VMS build fix #2 .
...
(cherry picked from commit a74bee5fc7 )
2014-04-08 17:28:23 +01:00
Steven M. Schweda
40a44a7c3d
VMS build fix for older compilers.
...
(cherry picked from commit 55c9e24875 )
2014-04-07 23:15:31 +01:00
Dr. Stephen Henson
13738d5fa1
update CHANGES
2014-04-07 21:56:34 +01:00
Dr. Stephen Henson
363dede7a5
Update NEWS.
2014-04-07 21:32:56 +01:00
Dr. Stephen Henson
43866bd6fc
update NEWS
2014-04-07 19:29:04 +01:00
Dr. Stephen Henson
cd29ced6de
Return if ssleay_rand_add called with zero num.
...
Treat a zero length passed to ssleay_rand_add a no op: the existing logic
zeroes the md value which is very bad. OpenSSL itself never does this
internally and the actual call doesn't make sense as it would be passing
zero bytes of entropy.
Thanks to Marcus Meissner <meissner@suse.de > for reporting this bug.
(cherry picked from commit 5be1ae28ef )
2014-04-07 19:27:46 +01:00
Dr. Stephen Henson
7e840163c0
Add heartbeat extension bounds check.
...
A missing bounds check in the handling of the TLS heartbeat extension
can be used to reveal up to 64k of memory to a connected client or
server.
Thanks for Neel Mehta of Google Security for discovering this bug and to
Adam Langley <agl@chromium.org > and Bodo Moeller <bmoeller@acm.org > for
preparing the fix (CVE-2014-0160)
(cherry picked from commit 96db9023b8 )
2014-04-07 19:25:34 +01:00
Dr. Stephen Henson
a4896327e3
Document -verify_return_error option.
...
(cherry picked from commit 4e6c12f308 )
2014-04-07 13:03:54 +01:00
Andy Polyakov
f396e9f4fc
crypto/modes/gcm128.c: more strict aliasing fixes.
...
(cherry picked from commit 997d1aac7c )
2014-04-06 17:22:12 +02:00
Andy Polyakov
dacb698ada
vpaes-[x86_64|ppc].pl: fix typo, which for some reason triggers rkhunter.
...
(cherry picked from commit 6eebcf3459 )
2014-04-06 12:53:17 +02:00
Dr. Stephen Henson
6411b83e52
Set TLS padding extension value.
...
Enable TLS padding extension using official value from:
http://www.iana.org/assignments/tls-extensiontype-values/tls-extensiontype-values.xhtml
(cherry picked from commit cd6bd5ffda )
Conflicts:
CHANGES
2014-04-05 20:49:09 +01:00
Dr. Stephen Henson
bb98beade9
Use correct length when prompting for password.
...
Use bufsiz - 1 not BUFSIZ - 1 when prompting for a password in
the openssl utility.
Thanks to Rob Mackinnon, Leviathan Security for reporting this issue.
(cherry picked from commit 7ba08a4d73 )
2014-04-04 13:06:49 +01:00
Dr. Stephen Henson
b8d208c549
Update FAQ.
...
(cherry picked from commit 6cc0068430 )
2014-04-04 13:05:56 +01:00
Dr. Stephen Henson
04f35a8909
Document new crl option.
...
(cherry picked from commit dbb7654dc1 )
2014-04-03 13:35:48 +01:00
Tim Hudson
68bd06eb6e
Add option to generate old hash format.
...
New -hash_old to generate CRL hashes using old
(before OpenSSL 1.0.0) algorithm.
(cherry picked from commit de2d97cd79 )
2014-04-03 13:35:22 +01:00
Dr. Stephen Henson
686b616ea9
VMS build fix
2014-04-02 21:46:13 +01:00
Eric Young
0bb37c5e23
Fix base64 decoding bug.
...
A short PEM encoded sequence if passed to the BIO, and the file
had 2 \n following would fail.
PR#3289
(cherry picked from commit 10378fb5f4 )
2014-04-02 19:57:06 +01:00
Dr. Stephen Henson
e9b4b8afbd
Don't try and verify signatures if key is NULL (CVE-2013-0166)
...
Add additional check to catch this in ASN1_item_verify too.
(cherry picked from commit 66e8211c0b )
2014-04-01 16:39:35 +01:00
Dr. Stephen Henson
bc5ec653ba
Fix memory leak with client auth.
2014-03-27 16:10:50 +00:00
Dr. Stephen Henson
1f44dac24d
Add -no_resumption_on_reneg to SSL_CONF.
2014-03-27 15:51:25 +00:00
Dr. Stephen Henson
2dd6976f6d
Update chain building function.
...
Don't clear verification errors from the error queue unless
SSL_BUILD_CHAIN_FLAG_CLEAR_ERROR is set.
If errors occur during verification and SSL_BUILD_CHAIN_FLAG_IGNORE_ERROR
is set return 2 so applications can issue warnings.
2014-03-27 14:23:46 +00:00
Emilia Kasper
662239183d
Allow duplicate certs in ssl_build_cert_chain
2014-03-25 17:28:04 +00:00
Dr. Stephen Henson
66243398bb
Workaround for some CMS signature formats.
...
Some CMS SignedData structure use a signature algorithm OID such
as SHA1WithRSA instead of the RSA algorithm OID. Workaround this
case by tolerating the signature if we recognise the OID.
(cherry picked from commit 3a98f9cf20 )
2014-03-19 17:29:55 +00:00
Piotr Sikora
aa10982c49
Retry callback only after ClientHello received.
...
(cherry picked from commit f04665a653 )
2014-03-18 23:58:39 +00:00
Dr. Stephen Henson
8b0336c810
Update ordinals.
...
Use a previously unused value as we will be updating multiple released
branches.
(cherry picked from commit 0737acd2a8 )
2014-03-12 14:41:52 +00:00
Dr. Stephen Henson
0a9f7780e5
Fix for CVE-2014-0076
...
Fix for the attack described in the paper "Recovering OpenSSL
ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack"
by Yuval Yarom and Naomi Benger. Details can be obtained from:
http://eprint.iacr.org/2014/140
Thanks to Yuval Yarom and Naomi Benger for discovering this
flaw and to Yuval Yarom for supplying a fix.
(cherry picked from commit 2198be3483 )
Conflicts:
CHANGES
2014-03-12 14:23:21 +00:00
Dr. Stephen Henson
44f7e399d3
typo
...
(cherry picked from commit a029788b0e )
2014-03-10 15:48:12 +00:00
Dr. Stephen Henson
8419df95e1
Remove -WX option from debug-VC-WIN32
...
(cherry picked from commit 7a3e67f029969620966b8a627b8485d83692cca5)
2014-03-07 19:07:51 +00:00
Andy Polyakov
59314f304e
engines/ccgost/gosthash.c: simplify and avoid SEGV.
...
PR: 3275
(cherry picked from commit ea38f02049 )
2014-03-07 11:03:25 +01:00
Andy Polyakov
cc6dc9b229
SPARC T4 assembly pack: treat zero input length in CBC.
...
The problem is that OpenSSH calls EVP_Cipher, which is not as
protective as EVP_CipherUpdate. Formally speaking we ought to
do more checks in *_cipher methods, including rejecting
lengths not divisible by block size (unless ciphertext stealing
is in place). But for now I implement check for zero length in
low-level based on precedent.
PR: 3087, 2775
(cherry picked from commit 5e44c144e6 )
2014-03-07 10:48:51 +01:00
Andy Polyakov
fe69e6be6e
dh_check.c: check BN_CTX_get's return value.
...
(cherry picked from commit 53e5161231 )
2014-03-06 14:21:17 +01:00
Andy Polyakov
430c5ca02e
test/Makefile: allow emulated test (e.g. under wine) [from master].
...
Submitted by: Roumen Petrov
2014-03-06 14:09:58 +01:00
Andy Polyakov
25ebd9e3ce
bss_dgram.c,d1_lib.c: make it compile with mingw.
...
Submitted by: Roumen Petrov
(cherry picked from commit 972b0dc350 )
2014-03-06 14:07:16 +01:00
Dr. Stephen Henson
bdfc0e284c
For self signed root only indicate one error.
2014-03-03 23:33:51 +00:00
Dr. Stephen Henson
12c56e4888
Sync crypto documentation with master branch.
2014-03-03 15:12:17 +00:00
Dr. Stephen Henson
1bd4ee1da1
Use nid not cipher type as some ciphers don't have OIDs.
2014-03-02 15:00:21 +00:00
Dr. Stephen Henson
3956bfce60
Make null cipher work in FIPS mode.
2014-03-02 13:50:06 +00:00
Dr. Stephen Henson
8394109c89
Add new VMS hack symbol, update ordinals.
2014-03-02 13:50:06 +00:00
Dr. Stephen Henson
813cfd9c0a
Add additional FIPS digests.
...
Add a few special case digests not returned by FIPS_get_digestbynid().
Thanks to Roumen Petrov <openssl@roumenpetrov.info > for reporting this
issue.
2014-03-01 23:14:08 +00:00
Dr. Stephen Henson
976c58302b
Add function to free compression methods.
...
Although the memory allocated by compression methods is fixed and
cannot grow over time it can cause warnings in some leak checking
tools. The function SSL_COMP_free_compression_methods() will free
and zero the list of supported compression methods. This should
*only* be called in a single threaded context when an application
is shutting down to avoid interfering with existing contexts
attempting to look up compression methods.
2014-03-01 23:14:08 +00:00
Dr. Stephen Henson
b60272b01f
PKCS#8 support for alternative PRFs.
...
Add option to set an alternative to the default hmacWithSHA1 PRF
for PKCS#8 private key encryptions. This is used automatically
by PKCS8_encrypt if the nid specified is a PRF.
Add option to pkcs8 utility.
Update docs.
2014-03-01 23:14:08 +00:00
Dr. Stephen Henson
124d218889
Fix memory leak.
2014-03-01 23:14:08 +00:00
Andy Polyakov
cd077dab08
Makefile.org: fix syntax error on Solaris.
...
PR: 3271
(cherry picked from commit 65370f9bbc )
2014-02-28 22:55:44 +01:00
Dr. Stephen Henson
d1201e3195
Fix compilation errors with no-nextprotoneg
2014-02-28 13:35:30 +00:00
Dr. Stephen Henson
5f2329b82a
Fix fips flag handling.
...
Don't set the fips flags in cipher and digests as the implementations
aren't suitable for FIPS mode and will be redirected to the FIPS module
versions anyway.
Return EVP_CIPH_FLAG_FIPS or EVP_MD_FLAG_FIPS if a FIPS implementation
exists when calling EVP_CIPHER_flags and EVP_MD_flags repectively.
Remove unused FIPS code from e_aes.c: the 1.0.2 branch will never be
used to build a FIPS module.
2014-02-27 19:18:58 +00:00
Dr. Stephen Henson
01fb5e133f
Remove unused file.
...
The file evp_fips.c isn't used in OpenSSL 1.0.2 as FIPS and non-FIPS
implementations of algorithms can coexist.
2014-02-27 19:08:53 +00:00
Andy Polyakov
fd2c85f6ae
evp/e_aes.c: harmonize with 1.0.1.
2014-02-27 17:47:23 +01:00
Andy Polyakov
41977c2e04
Configure: mark unixware target as elf-1.
...
(cherry picked from commit 4ca026560a )
2014-02-27 14:32:46 +01:00
Andy Polyakov
ca88a1d439
perlasm/x86asm.pl: recognize elf-1 denoting old ELF platforms.
...
(cherry picked from commit b62a4a1c0e )
2014-02-27 14:30:42 +01:00
Andy Polyakov
5615196f7b
perlasm/x86gas.pl: limit special OPENSSL_ia32cap_P treatment to ELF.
...
(cherry picked from commit ce876d8316 )
2014-02-27 14:29:07 +01:00
Andy Polyakov
1f59eb5f11
rc4/asm/rc4-586.pl: allow for 386-only build.
...
(cherry picked from commit f861b1d433 )
2014-02-27 14:28:54 +01:00
Andy Polyakov
4bf6d66e67
des/asm/des-586.pl: shortcut reference to DES_SPtrans.
...
(cherry picked from commit fd361a67ef )
2014-02-27 14:28:44 +01:00
Andy Polyakov
2f34088e5e
Makefile.org: mask touch's exit code
...
[but don't let it mask make's].
PR: 3269
2014-02-27 12:35:02 +01:00
Andy Polyakov
559e69f9b4
crypto/Makefile: make it OSF-make-friendly
...
PR: 3165
2014-02-26 16:42:57 +01:00
Rob Stradling
f3b7e522d8
CABForum EV OIDs for Subject Jurisdiction of Incorporation or Registration.
...
(cherry picked from commit ffcc832ba6e17859d45779eea87e38467561dd5d)
2014-02-26 15:33:10 +00:00
Dr. Stephen Henson
73be56a21d
Fix for WIN32 builds with KRB5
2014-02-26 15:33:10 +00:00
Andy Polyakov
d00ae7cf70
sha/asm/sha256-586.pl: don't try to compile SIMD with no-sse2.
...
(cherry picked from commit d49135e7ea )
2014-02-26 10:23:56 +01:00
Andy Polyakov
f92926e331
sha/asm/sha512-x86_64.pl: fix compilation error on Solaris.
...
(cherry picked from commit 147cca8f53 )
2014-02-26 09:31:40 +01:00
Andy Polyakov
241c8004ce
Configure: blended processor target in solaris-x86-cc.
...
(cherry picked from commit 7bb9d84e35 )
2014-02-26 09:31:26 +01:00
Andy Polyakov
8d08627c94
ssl/t1_enc.c: check EVP_MD_CTX_copy return value.
...
PR: 3201
(cherry picked from commit 03da57fe14 )
2014-02-25 22:23:49 +01:00
Andy Polyakov
aa1bb606f3
aes/asm/vpaes-ppc.pl: fix traceback info.
...
(cherry picked from commit e704741bf3 )
2014-02-25 20:13:41 +01:00
Zoltan Arpadffy
dabd4f1986
OpenVMS fixes.
2014-02-25 15:16:03 +00:00
Dr. Stephen Henson
251c47001b
update NEWS with v3_scts.c issue
2014-02-25 15:08:45 +00:00
Dr. Stephen Henson
3678161d71
Don't use BN_ULLONG in n2l8 use SCTS_TIMESTAMP.
2014-02-25 15:05:08 +00:00
Dr. Stephen Henson
6634416732
Fix for v3_scts.c
...
Not all platforms define BN_ULLONG. Define SCTS_TIMESTAMP as a type
which should work on all platforms.
2014-02-25 14:54:09 +00:00
Dr. Stephen Henson
7101fd705c
update NEWS
2014-02-25 13:56:40 +00:00
Dr. Stephen Henson
0f9bcf3319
Avoid Windows 8 Getversion deprecated errors.
...
Windows 8 SDKs complain that GetVersion() is deprecated.
We only use GetVersion like this:
(GetVersion() < 0x80000000)
which checks if the Windows version is NT based. Use a macro check_winnt()
which uses GetVersion() on older SDK versions and true otherwise.
(cherry picked from commit a4cc3c8041 )
2014-02-25 13:41:53 +00:00
Rob Stradling
a948732e1c
Parse non-v1 SCTs less awkwardly.
...
(cherry picked from commit 19f65ddbab )
2014-02-25 13:04:21 +00:00
Andy Polyakov
c3006e0f5a
util/pl/VC-32.pl: harmonize with 1.0.1 and fix typo.
2014-02-25 13:41:40 +01:00
Andy Polyakov
efe835eb5a
ms/do_win64a.bat: forward to NUL, not NUL:.
...
Allegedly formwarding to NUL: sometimes creates NUL file in file
system.
PR: 3250
(cherry picked from commit 63aff3001e )
2014-02-24 19:37:48 +01:00
Dr. Stephen Henson
ab03ead035
we need /MD for fips builds
2014-02-24 18:21:35 +00:00
Dr. Stephen Henson
6a6e08960e
Update NEWS with known issue.
2014-02-24 16:31:44 +00:00
Andy Polyakov
aedabeee3a
BC-32.pl: refresh Borland C support.
...
PR: 3251
Suggested by: Thorsten Schning
(cherry picked from commit 779c51c644 )
2014-02-24 16:45:15 +01:00
Andy Polyakov
83fe7b9c83
x509/by_dir.c: fix run-away pointer (and potential SEGV)
...
when adding duplicates in add_cert_dir.
PR: 3261
Reported by: Marian Done
(cherry picked from commit 758954e0d8 )
2014-02-24 15:21:37 +01:00
Dr. Stephen Henson
97654d7e28
Prepare for 1.0.2-beta2-dev
2014-02-24 13:52:51 +00:00
Dr. Stephen Henson
94f4166017
Prepare for 1.0.2-beta1 release
2014-02-24 13:51:34 +00:00
Dr. Stephen Henson
a74c9c9e10
OpenSSL 1.0.2 is now in beta
2014-02-24 13:50:38 +00:00
Dr. Stephen Henson
d2a3c4497f
make update
2014-02-24 13:50:38 +00:00
Andy Polyakov
a129850922
config: recognize ARMv8/AArch64 target.
...
(cherry picked from commit d099f0ed6c )
2014-02-24 13:21:14 +01:00
Dr. Stephen Henson
c3f5d3d93a
Only set current certificate to valid values.
...
When setting the current certificate check that it has a corresponding
private key.
(cherry picked from commit 358d352aa2 )
2014-02-23 13:49:21 +00:00
Dr. Stephen Henson
c5ea65b157
New chain building flags.
...
New flags to build certificate chains. The can be used to rearrange
the chain so all an application needs to do is add all certificates
in arbitrary order and then build the chain to check and correct them.
Add verify error code when building chain.
Update docs.
(cherry picked from commit 13dc3ce9ab )
2014-02-23 13:49:21 +00:00
Dr. Stephen Henson
58b86e4235
Option to set current cert to server certificate.
...
(cherry picked from commit daddd9a950 )
2014-02-23 13:49:21 +00:00
Ben Laurie
a466be6243
Fix typo.
2014-02-23 11:21:39 +00:00
Ben Laurie
60327ce41a
Add debug flag.
2014-02-23 11:21:28 +00:00
Andy Polyakov
2d4d9623da
aes/asm/aesni-x86[_64].pl: minor Atom-specific performance tweak.
...
(cherry picked from commit 214368ffee )
2014-02-21 12:15:07 +01:00
Andy Polyakov
6b3b6beaa1
ssl/ssl_cert.c: DANE update.
2014-02-21 12:12:25 +01:00
Dr. Stephen Henson
7743be3aac
make update
2014-02-20 22:57:24 +00:00
Dr. Stephen Henson
b709f8ef54
fix WIN32 warnings
2014-02-20 22:41:06 +00:00
Rob Stradling
c74ce24cd2
Show the contents of the RFC6962 Signed Certificate Timestamp List Certificate/OCSP Extensions.
...
Add the RFC6962 OIDs to the objects table.
(backport from master branch)
2014-02-20 21:43:54 +00:00
Dr. Stephen Henson
612566e752
Don't use CRYPTO_AES_CTR if it isn't defined.
...
(cherry picked from commit 6ecbc2bb62 )
2014-02-18 22:21:41 +00:00
Dr. Stephen Henson
3ecce3dbeb
Don't use getcwd in non-copy builds.
...
(cherry picked from commit f3a3903260 )
2014-02-15 20:17:59 +00:00
Dr. Stephen Henson
71eca86c30
Don't override $srcd for non copy builds.
2014-02-15 20:16:13 +00:00
Dr. Stephen Henson
dd1e3bd8d4
recognise multiblock
2014-02-15 18:19:35 +00:00
Dr. Stephen Henson
c55fef76f7
Add /fixed flag for FIPS links where appropriate.
2014-02-15 17:16:19 +00:00
Dr. Stephen Henson
eb70d4407f
Remove duplicate statement.
...
(cherry picked from commit 5a7652c3e5 )
2014-02-15 01:29:24 +00:00
Klaus-Peter Junghanns
b335b5440a
Add support for aes-128/192/256-ctr to the cryptodev engine.
...
This can be used to speed up SRTP with libsrtp, e.g. on TI omap/sitara based devices.
(cherry picked from commit be2c4d9bd9 )
2014-02-15 00:06:43 +00:00
Kurt Roeckx
a8eeedb603
Use defaults bits in req when not given
...
If you use "-newkey rsa" it's supposed to read the default number of bits from the
config file. However the value isn't used to generate the key, but it does
print it's generating such a key. The set_keygen_ctx() doesn't call
EVP_PKEY_CTX_set_rsa_keygen_bits() and you end up with the default set in
pkey_rsa_init() (1024). Afterwards the number of bits gets read from the config
file, but nothing is done with that anymore.
We now read the config first and use the value from the config file when no size
is given.
PR: 2592
(cherry picked from commit 3343220327 )
2014-02-14 22:35:15 +00:00
Kurt Roeckx
b3d8de7903
Fix additional pod errors with numbered items.
...
(cherry picked from commit e547c45f1c )
2014-02-14 22:35:15 +00:00
Scott Schaefer
0413ea5801
Fix various spelling errors
...
(cherry picked from commit 2b4ffc659e )
2014-02-14 22:35:15 +00:00
Scott Schaefer
2f6fba6772
Document pkcs12 -password behavior
...
apps/pkcs12.c accepts -password as an argument. The document author
almost certainly meant to write "-password, -passin".
However, that is not correct, either. Actually the code treats
-password as equivalent to -passin, EXCEPT when -export is also
specified, in which case -password as equivalent to -passout.
(cherry picked from commit 856c6dfb09 )
2014-02-14 22:35:15 +00:00
Dr. Stephen Henson
d69acceca9
Fix error discrepancy with 1.0.1
2014-02-14 17:50:20 +00:00
Andy Polyakov
aff78bb39a
ssl/s3_pkt.c: detect RAND_bytes error in multi-block.
...
(cherry picked from commit 701134320a )
2014-02-14 17:45:33 +01:00
Andy Polyakov
104c032b7b
x86[_64]cpuid.pl: add low-level RDSEED.
...
(cherry picked from commit f4d456408d )
2014-02-14 17:25:14 +01:00
Andy Polyakov
b347341c75
aes/asm/aesni-x86_64.pl: further optimization for Atom Silvermont.
...
Improve CBC decrypt and CTR by ~13/16%, which adds up to ~25/33%
improvement over "pre-Silvermont" version. [Add performance table to
aesni-x86.pl].
(cherry picked from commit 5599c7331b )
2014-02-14 17:17:39 +01:00
Dr. Stephen Henson
c00f8d697a
Include self-signed flag in certificates by checking SKID/AKID as well
...
as issuer and subject names. Although this is an incompatible change
it should have little impact in pratice because self-issued certificates
that are not self-signed are rarely encountered.
(cherry picked from commit b1efb7161f )
2014-02-14 15:27:30 +00:00
Dr. Stephen Henson
b07e4f2f46
Include TA in checks/callback with partial chains.
...
When a chain is complete and ends in a trusted root checks are also
performed on the TA and the callback notified with ok==1. For
consistency do the same for chains where the TA is not self signed.
(cherry picked from commit 385b348666 )
2014-02-14 15:12:53 +00:00
Dr. Stephen Henson
ced6dc5cef
Add cert_self_signed function to simplify verify
...
(from master)
2014-02-14 15:12:52 +00:00
Dr. Stephen Henson
bf2d129194
Simplify X509_STORE_CTX_get1_chain (from master).
2014-02-14 15:12:52 +00:00
Andy Polyakov
d59d0b7c21
ssl/ssl[3].h: retain binary compatibility.
2014-02-13 17:03:14 +01:00
Andy Polyakov
dbd512e1b7
Configure: restore binary compatibility in darwin64-x86_64-cc.
...
(and remove duplicates).
2014-02-13 15:23:36 +01:00
Andy Polyakov
fcc6f699e3
evp/e_aes_cbc_hmac_sha*.c: improve cache locality.
...
(cherry picked from commit 9587429fa0 )
2014-02-13 14:41:10 +01:00
Andy Polyakov
7078d93307
ghash-x86[_64].pl: ~15% improvement on Atom Silvermont
...
(other processors unaffected).
(cherry picked from commit 98e143f118 )
2014-02-13 14:38:59 +01:00
Dr. Stephen Henson
a2317c3ffd
fix error discrepancy
2014-02-09 21:12:12 +00:00
Dr. Stephen Henson
75917fac8e
Make upate.
...
Revert libssl ordinals to OpenSSL 1.0.1 values first to tidy up and
avoid entries for deleted functions.
2014-02-09 19:59:54 +00:00
Dr. Stephen Henson
295fd057ce
fix error number clash
2014-02-09 19:57:27 +00:00
Ben Laurie
8c4e09f74f
Whitespace fixes.
2014-02-09 19:31:07 +00:00
Ben Laurie
e32cbae224
Merge branch '102_stable_tlsext_suppdata_changes' of git://github.com/scottdeboy/openssl into scottdeboy-102_stable_tlsext_suppdata_changes
2014-02-09 19:17:42 +00:00
Scott Deboy
f6fd8db2a4
Restore copyright symbol - ISO-8859-1 encoding for Configure file
2014-02-09 08:26:04 -08:00
Ben Laurie
d65db21976
Const fix.
2014-02-09 08:07:16 -08:00
Ben Laurie
8acf1ff4b4
More cleanup.
...
(cherry picked from commit 5eda213ebe )
Conflicts:
apps/s_client.c
apps/s_server.c
2014-02-09 08:07:04 -08:00
Ben Laurie
8b41df41c2
Make it build.
...
(cherry picked from commit a6a48e87bc )
Conflicts:
ssl/s3_clnt.c
ssl/t1_lib.c
2014-02-09 08:02:40 -08:00
Scott Deboy
c32ebefaa8
Reverting 1.0.2-only changes supporting the prior authz RFC5878-based tests from commit 835d104f46
2014-02-09 07:49:44 -08:00
Ben Laurie
ed0dc93d89
Add new asm modules.
2014-02-09 12:18:16 +00:00
Scott Deboy
5a32dd8930
Don't break out of the custom extension callback loop - continue instead
...
The contract for custom extension callbacks has changed - all custom extension callbacks are triggered
2014-02-08 16:19:30 -08:00
Ben Laurie
130ebe34c8
Fix whitespace, new-style comments.
2014-02-08 16:19:30 -08:00
Scott Deboy
7612511b3b
Re-add alert variables removed during rebase
...
Whitespace fixes
(cherry picked from commit e9add063b5 )
Conflicts:
ssl/s3_clnt.c
2014-02-08 16:19:01 -08:00
Scott Deboy
19a28a8aa3
Updating DTCP authorization type to expected value
2014-02-08 16:18:11 -08:00
Scott Deboy
fc213217e8
Update custom TLS extension and supplemental data 'generate' callbacks to support sending an alert.
...
If multiple TLS extensions are expected but not received, the TLS extension and supplemental data 'generate' callbacks are the only chance for the receive-side to trigger a specific TLS alert during the handshake.
Removed logic which no-op'd TLS extension generate callbacks (as the generate callbacks need to always be called in order to trigger alerts), and updated the serverinfo-specific custom TLS extension callbacks to track which custom TLS extensions were received by the client, where no-ops for 'generate' callbacks are appropriate.
(cherry picked from commit ac20719d99 )
Conflicts:
ssl/t1_lib.c
2014-02-08 16:17:24 -08:00
Trevor Perrin
7198c5af1f
Redo deletion of some serverinfo code that supplemental data code mistakenly reinstated.
2014-02-08 16:15:10 -08:00
Scott Deboy
40632f6b77
Free generated supp data after handshake completion, add comment regarding use of num_renegotiations in TLS and supp data generation callbacks
...
(cherry picked from commit 67c408cee9 )
Conflicts:
apps/s_client.c
apps/s_server.c
2014-02-08 16:14:23 -08:00
Scott Deboy
038bec784e
Add callbacks supporting generation and retrieval of supplemental data entries, facilitating RFC 5878 (TLS auth extensions)
...
Removed prior audit proof logic - audit proof support was implemented using the generic TLS extension API
Tests exercising the new supplemental data registration and callback api can be found in ssltest.c.
Implemented changes to s_server and s_client to exercise supplemental data callbacks via the -auth argument, as well as additional flags to exercise supplemental data being sent only during renegotiation.
(cherry picked from commit 36086186a9 )
Conflicts:
Configure
apps/s_client.c
apps/s_server.c
ssl/ssl.h
ssl/ssl3.h
ssl/ssltest.c
2014-02-08 16:12:15 -08:00
Dr. Stephen Henson
f407eec799
make update
2014-02-06 14:31:09 +00:00
Dr. Stephen Henson
bd618bebbe
update default depflags
2014-02-06 14:28:49 +00:00
Andy Polyakov
e2884b3e9a
Configure: recognize experimental-multiblock.
...
(cherry picked from commit 2d752737c5 )
2014-02-06 14:26:01 +00:00
Dr. Stephen Henson
c41e242e5c
Return previous compression methods when setting them.
...
(cherry picked from commit b45e874d7c )
2014-02-06 13:58:18 +00:00
Andy Polyakov
9578319394
ssl/s3_pkt.c: add multi-block processing [from master].
2014-02-05 21:43:17 +01:00
Andy Polyakov
16eaca2c79
config: recognize little-endian Linux PPC64.
2014-02-05 20:36:11 +01:00
Dr. Stephen Henson
3bff195dca
Oops, get selection logic right.
...
(cherry picked from commit 3880579240d476d21f68fd01a391dd325920f479)
2014-02-05 18:57:23 +00:00
Andy Polyakov
41cf2d2518
evp/e_aes_cbc_hmac_sha[1|256].c: add multi-block implementations [from master].
2014-02-05 19:52:38 +01:00
Dr. Stephen Henson
e0d4272a58
Return per-certificate chain if extra chain is NULL.
...
If an application calls the macro SSL_CTX_get_extra_chain_certs
return either the old "shared" extra certificates or those associated
with the current certificate.
This means applications which call SSL_CTX_use_certificate_chain_file
and retrieve the additional chain using SSL_CTX_get_extra_chain_certs
will still work. An application which only wants to check the shared
extra certificates can call the new macro
SSL_CTX_get_extra_chain_certs_only
(cherry picked from commit a51f767645 )
2014-02-05 17:06:56 +00:00
Andy Polyakov
41c373fa3e
[aesni|sha*]-mb-x86_64.pl: add multi-block assembly modules [from master].
2014-02-05 14:33:44 +01:00
Dr. Stephen Henson
7f6e09b531
Add quotes as CC can contain spaces.
...
PR#3253
2014-02-03 14:13:04 +00:00
Dr. Stephen Henson
e2f06800bc
New ctrl to set current certificate.
...
New ctrl sets current certificate based on certain criteria. Currently
two options: set the first valid certificate as current and set the
next valid certificate as current. Using these an application can
iterate over all certificates in an SSL_CTX or SSL structure.
(cherry picked from commit 0f78819c8c )
2014-02-02 23:12:06 +00:00
Dr. Stephen Henson
1180833643
Fix various typos.
...
(cherry picked from commit f3efeaad54 )
2014-02-02 23:12:06 +00:00
Dr. Stephen Henson
130eed01cc
Update demo.
...
(cherry picked from commit 88c21c47a3 )
2014-02-02 23:06:16 +00:00
Dr. Stephen Henson
2ded87355f
Update demos/bio/README
...
(cherry picked from commit ea131a0644 )
2014-02-02 23:05:52 +00:00
Dr. Stephen Henson
b1ae02e2ff
Modify sample accept.cnf
...
(cherry picked from commit d80b0eeee5 )
2014-02-02 23:05:34 +00:00
Dr. Stephen Henson
381417089a
Add demo for SSL server using SSL_CONF.
...
(cherry picked from commit ebd14bfce9 )
2014-02-02 23:05:15 +00:00
Ben Laurie
984a30423d
Add extension free function.
2014-02-02 15:22:47 +00:00
Andy Polyakov
2ad673c611
engines/e_capi.c: TCHAR support (cumilative update from master).
2014-02-02 00:17:38 +01:00
Andy Polyakov
0693dd954e
modes/asm/ghash-s390x.pl: +15% performance improvement on z10.
...
(cherry picked from commit d162584b11 )
2014-02-02 00:10:41 +01:00
Andy Polyakov
9071b36d9a
Add AES-NI+SHA256 stitch registrations (from master).
2014-02-02 00:05:02 +01:00
Andy Polyakov
eb6af20d2e
dso/dso_win32.c: fix compiler warning.
...
(cherry picked from commit 0a2d5003df )
2014-02-01 23:32:19 +01:00
Andy Polyakov
8087969c5b
crypto/cryptlib.c: remove stdio dependency (update from master).
2014-02-01 23:27:49 +01:00
Andy Polyakov
cb437c66d1
camellia/asm/cmll-x86_64.pl: fix symptomless bugs (update from master).
2014-02-01 23:14:33 +01:00
Ben Laurie
40b0d0765e
Remove redundant accessor (you can do the same thing, and more, with
...
X509_ALGOR_[gs]et0()).
2014-02-01 22:03:40 +00:00
Andy Polyakov
41235f30fb
util/pl/VC-32.pl fix typo.
...
(cherry picked from commit fb0a520897 )
2014-02-01 22:55:25 +01:00
Andy Polyakov
130c15ef5a
util/pl/VC-32.pl: refresh, switch to ws2, add crypt32, fix typo (based on
...
suggestions from Pierre Delaage).
(cherry picked from commit 668bcfd5ca )
Resolved conflicts:
util/pl/VC-32.pl
2014-02-01 22:53:24 +01:00
Andy Polyakov
2cc5142fb1
Improve WINCE support.
...
Submitted by: Pierre Delaage
(cherry picked from commit a006fef78e )
Resolved conflicts:
crypto/bio/bss_dgram.c
ssl/d1_lib.c
util/pl/VC-32.pl
2014-02-01 22:48:56 +01:00
Andy Polyakov
d451ece4e7
b_sock.c: make getsockopt work in cases when optlen is 64-bit value.
...
(cherry picked from commit 80c42f3e0c )
2014-02-01 22:33:02 +01:00
Andy Polyakov
1121ba1b74
wp-mmx.pl: ~10% performance improvement.
...
(cherry picked from commit ae007d4d09 )
2014-02-01 22:27:07 +01:00
Andy Polyakov
1fb039fde2
wp-x86_64.pl: ~10% performance improvement.
...
(cherry picked from commit 701d593f70 )
2014-02-01 22:26:45 +01:00
Andy Polyakov
3073927e42
sha512-ia64.pl: 15-20% performance improvement.
...
(cherry picked from commit 46a2b3387a )
2014-02-01 22:21:57 +01:00
Andy Polyakov
b6c2029931
objxref.pl: improve portability.
...
(cherry picked from commit 71fa3bc5ec )
2014-02-01 22:17:36 +01:00
Adam Langley
45d010255f
Add volatile qualifications to two blocks of inline asm to stop GCC from
...
eliminating them as dead code.
Both volatile and "memory" are used because of some concern that the compiler
may still cache values across the asm block without it, and because this was
such a painful debugging session that I wanted to ensure that it's never
repeated.
(cherry picked from commit 7753a3a684 )
2014-02-01 22:01:46 +01:00
Andy Polyakov
7e569022c5
PPC assembly pack: ppc64-mont update from master.
2014-02-01 21:51:51 +01:00
Andy Polyakov
50f1b47c7f
PPC assembly pack: jumbo update from master.
...
Add Vector Permutation AES and little-endian support.
2014-02-01 21:48:31 +01:00
Andy Polyakov
5572bc4e2f
crypto/aes/asm/aesni-x86[_64].pl: jumbo update from master.
2014-02-01 21:27:46 +01:00
Andy Polyakov
729d334106
crypto/sha/asm/sha1-x86_64.pl: jumbo update from master.
2014-02-01 21:24:55 +01:00
Ben Laurie
cacdfcb247
Add more accessors.
2014-02-01 18:30:23 +00:00
Ben Laurie
519ad9b384
Add accessor for x509.cert_info.
2014-02-01 18:30:23 +00:00
Ben Laurie
7b2d785d20
Fix warning.
2014-01-29 17:57:32 +01:00
Dr. Stephen Henson
f2d678e6e8
Clarify docs.
...
Remove reference to ERR_TXT_MALLOCED in the error library as that is
only used internally. Indicate that returned error data must not be
freed.
2014-01-29 00:59:35 +00:00
Dr. Stephen Henson
448e9b7cf1
typo
...
(cherry picked from commit cb2182676b )
2014-01-28 15:36:15 +00:00
Dr. Stephen Henson
2c4c9867e7
Fix demo comment: 0.9.9 never released.
...
(cherry picked from commit 717cc85895 )
2014-01-28 15:17:32 +00:00
Dr. Stephen Henson
a99540a6de
Check i before r[i].
...
PR#3244
(cherry picked from commit 9614d2c676 )
2014-01-28 15:14:47 +00:00
Dr. Stephen Henson
9614ed695d
Add loaded dynamic ENGINEs to list.
...
Always add a dynamically loaded ENGINE to list. Otherwise it can cause
problems when multiply loaded, especially if it adds new public key methods.
For all current engines we only want a single implementation anyway.
(cherry picked from commit e933f91f50 )
2014-01-28 13:57:14 +00:00
Dr. Stephen Henson
aabfee601e
Certificate callback doc.
...
(cherry picked from commit 46ab9bbd7f )
2014-01-28 13:38:55 +00:00
Dr. Stephen Henson
cee1d9e02f
make update
2014-01-27 14:59:46 +00:00
Dr. Stephen Henson
285f7fb0f9
Add cert callback retry test.
...
(cherry picked from commit 3323314fc1 )
2014-01-27 14:41:38 +00:00
Dr. Stephen Henson
ede90b1121
Support retries in certificate callback
...
(cherry picked from commit 0ebc965b9c )
Conflicts:
ssl/s3_srvr.c
ssl/ssl3.h
2014-01-27 14:41:38 +00:00
Dr. Stephen Henson
5e7329d156
Compare encodings in X509_cmp as well as hash.
...
(cherry picked from commit ec492c8a5a )
2014-01-27 14:33:10 +00:00
Dr. Stephen Henson
9f1979b94a
New function to set compression methods so they can be safely freed.
...
(cherry picked from commit cbb6744827 )
2014-01-27 14:32:44 +00:00
Dr. Stephen Henson
3fcf327e26
Add -engine_impl option to dgst which will use an implementation of
...
an algorithm from the supplied engine instead of just the default one.
(cherry picked from commit bb845ee044 )
2014-01-23 18:35:42 +00:00
Dr. Stephen Henson
3f4742b48c
make update
2014-01-23 17:13:37 +00:00
Dr. Stephen Henson
c4f01c533b
Add new function SSL_CTX_get_ssl_method().
...
Partial fix for PR#3183.
(cherry picked from commit ba168244a1 )
2014-01-16 14:08:42 +00:00
Kaspar Brand
b7a8550988
Omit initial status request callback check.
...
PR#3178
(cherry picked from commit d0b039d4a3 )
2014-01-16 13:48:23 +00:00
Zoltan Arpadffy
e775891708
VMS fixes
2014-01-11 22:44:04 +00:00
Jeff Trawick
ae6fbb5df0
typo
...
(cherry picked from commit 5edce5685f )
2014-01-10 23:02:46 +00:00
Jeff Trawick
f9c1f03754
typo
...
(cherry picked from commit 4b64e0cbdb )
2014-01-10 23:02:20 +00:00
Dr. Stephen Henson
50701af9d5
Fix bug in X509_V_FLAG_IGNORE_CRITICAL CRL handling.
...
(cherry picked from commit 8f4077ca69 )
2014-01-09 22:53:50 +00:00
Dr. Stephen Henson
1d6af3d430
update NEWS
2014-01-09 22:50:07 +00:00
Andy Polyakov
392fd8f89c
bn/asm/x86_64-mont5.pl: fix compilation error on Solaris.
...
(cherry picked from commit eedab5241e )
2014-01-09 13:47:53 +01:00
Dr. Stephen Henson
802db0fab2
Sync CHANGES
2014-01-07 15:41:11 +00:00
Dr. Stephen Henson
2f972419a3
Add fix for CVE-2013-4353
2014-01-07 15:41:11 +00:00
Dr. Stephen Henson
a05a2c67ef
Update NEWS.
2014-01-07 15:41:04 +00:00
Andy Polyakov
e34140620e
sha/asm/sha256-armv4.pl: add NEON code path.
...
(and shave off cycle even from integer-only code)
(cherry picked from commit ad0d2579cf )
2014-01-04 18:06:36 +01:00
Andy Polyakov
acd9121085
aesni-sha1-x86_64.pl: harmonize [Atom-specific optimizations] with master branch.
2014-01-04 17:42:13 +01:00
Dr. Stephen Henson
b17d6b8d1d
Restore SSL_OP_MSIE_SSLV2_RSA_PADDING
...
The flag SSL_OP_MSIE_SSLV2_RSA_PADDING hasn't done anything since OpenSSL
0.9.7h but deleting it will break source compatibility with any software
that references it. Restore it but #define to zero.
2014-01-04 13:58:51 +00:00
Dr. Stephen Henson
b9fa413a08
Use algorithm specific chains for certificates.
...
Fix a limitation in SSL_CTX_use_certificate_chain_file(): use algorithm
specific chains instead of the shared chain.
Update docs.
(cherry picked from commit a4339ea3ba )
Conflicts:
CHANGES
2014-01-03 22:45:20 +00:00
Andy Polyakov
4abe148444
ssl/t1_enc.c: optimize PRF (suggested by Intel).
...
(cherry picked from commit e8b0dd57c0 )
2014-01-03 21:56:03 +01:00
Dr. Stephen Henson
04d6940436
update NEWS
2014-01-02 19:12:47 +00:00
Dr. Stephen Henson
8511b5f594
Don't change version number if session established
...
When sending an invalid version number alert don't change the
version number to the client version if a session is already
established.
Thanks to Marek Majkowski for additional analysis of this issue.
PR#3191
(cherry picked from commit b77b58a398 )
2014-01-02 15:07:51 +00:00
Dr. Stephen Henson
546d6760b9
Update curve list size.
2013-12-29 16:30:34 +00:00
Andy Polyakov
ccbb8d5e95
sparcv9cap.c: omit random detection.
...
PR: 3202
(cherry picked from commit 926725b3d7 )
2013-12-28 13:32:45 +01:00
Andy Polyakov
d7d7e7b038
ARM assembly pack: make it work with older toolchain.
...
(cherry picked from commit 2218c296b4 )
2013-12-28 12:18:11 +01:00
Dr. Stephen Henson
80b6d97585
Fix DTLS retransmission from previous session.
...
For DTLS we might need to retransmit messages from the previous session
so keep a copy of write context in DTLS retransmission buffers instead
of replacing it after sending CCS. CVE-2013-6450.
(cherry picked from commit 34628967f1 )
2013-12-20 23:25:41 +00:00
Dr. Stephen Henson
ff64ab32ae
Ignore NULL parameter in EVP_MD_CTX_destroy.
...
(cherry picked from commit a6c62f0c25 )
2013-12-20 23:24:26 +00:00
Andy Polyakov
fc9c9e47f7
sha1-x86_64.pl: harmonize Win64 SE handlers for SIMD code pathes.
...
(and ensure stack alignment in the process)
(cherry picked from commit fc0503a25c )
2013-12-18 22:57:14 +01:00
Andy Polyakov
68e6ac4379
evp/e_[aes|camellia].c: fix typo in CBC subroutine.
...
It worked because it was never called.
(cherry picked from commit e9c80e04c1 )
2013-12-18 22:56:24 +01:00
Andy Polyakov
e34b7e99fd
sha512.c: fullfull implicit API contract in SHA512_Transform.
...
SHA512_Transform was initially added rather as tribute to tradition
than for practucal reasons. But use was recently found in ssl/s3_cbc.c
and it turned to be problematic on platforms that don't tolerate
misasligned references to memory and lack assembly subroutine.
(cherry picked from commit cdd1acd788 )
2013-12-18 22:56:00 +01:00
Dr. Stephen Henson
a32ba49352
Check EVP errors for handshake digests.
...
Partial mitigation of PR#3200
(cherry picked from commit 0294b2be5f )
2013-12-18 13:27:15 +00:00
Dr. Stephen Henson
3a0c71541b
verify parameter enumeration functions
...
(cherry picked from commit 9b3d75706e )
Conflicts:
crypto/x509/x509_vpm.c
2013-12-13 15:52:27 +00:00
Dr. Stephen Henson
adc6bd73e3
Add opaque ID structure.
...
Move the IP, email and host checking fields from the public
X509_VERIFY_PARAM structure into an opaque X509_VERIFY_PARAM_ID
structure. By doing this the structure can be modified in future
without risk of breaking any applications.
2013-12-13 15:36:31 +00:00
Dr. Stephen Henson
8c6d8c2a49
Backport TLS padding extension from master.
2013-12-13 15:29:26 +00:00
Dr. Stephen Henson
53a8f8c26d
Fix for partial chain notification.
...
For consistency with other cases if we are performing
partial chain verification with just one certificate
notify the callback with ok==1.
2013-12-13 15:29:26 +00:00
Dr. Stephen Henson
bf4863b3f5
Verify parameter retrieval functions.
...
New functions to retrieve internal pointers to X509_VERIFY_PARAM
for SSL_CTX and SSL structures.
2013-12-13 15:29:26 +00:00
Dr. Stephen Henson
8f68678989
Don't use rdrand engine as default unless explicitly requested.
2013-12-13 15:29:26 +00:00
Dr. Stephen Henson
57c4e42d75
Get FIPS checking logic right.
...
We need to lock when *not* in FIPS mode.
2013-12-10 12:52:27 +00:00
Dr. Stephen Henson
ff672cf8dd
remove obsolete STATUS file
2013-12-10 00:10:41 +00:00
Dr. Stephen Henson
d43b040773
Add release dates to NEWS
2013-12-10 00:08:33 +00:00
Andy Polyakov
422c8c36e5
ARM assembly pack: SHA update from master.
2013-12-09 23:53:42 +01:00
Andy Polyakov
b76310ba74
ARM assembly pack: AES update from master (including bit-sliced module).
2013-12-09 23:44:45 +01:00
Andy Polyakov
c012f6e576
bn/asm/armv4-mont.pl: add NEON code path.
...
(cherry picked from commit d1671f4f1a )
2013-12-09 22:46:29 +01:00
Andy Polyakov
cf6d55961c
crypto/bn/asm/x86_64-mont*.pl: update from master.
...
Add MULX/AD*X code paths and optimize even original code path.
2013-12-09 22:40:53 +01:00
Andy Polyakov
3aa1b1ccbb
x86_64-xlate.pl: fix jrcxz in nasm case.
...
(cherry picked from commit 667053a2f3 )
2013-12-09 22:19:34 +01:00
Andy Polyakov
3dcae82fa9
x86_64-xlate.pl: minor update.
...
(cherry picked from commit 41965a84c4 )
2013-12-09 21:53:41 +01:00
Dr. Stephen Henson
86b81ecb73
update $default_depflags
2013-12-08 13:21:02 +00:00
Dr. Stephen Henson
c43dc3dd77
Avoid multiple locks in FIPS mode.
...
PR: 3176.
In FIPS mode ssleay_rand_bytes is only used for PRNG seeding and is
performed in either a single threaded context (when the PRNG is first
initialised) or under a lock (reseeding). To avoid multiple locks disable
use of CRYPTO_LOCK_RAND in FIPS mode in ssleay_rand_bytes.
2013-12-08 13:21:02 +00:00
Andy Polyakov
e5eab8a199
bn/asm/x86_64-mont5.pl: comply with Win64 ABI.
...
PR: 3189
Submitted by: Oscar Ciurana
(cherry picked from commit c5d5f5bd0f )
2013-12-04 00:02:18 +01:00
Andy Polyakov
7bab6eb6f0
crypto/bn/asm/rsaz-x86_64.pl: make it work on Win64.
...
(cherry picked from commit 8bd7ca9996 )
2013-12-03 22:30:00 +01:00
Andy Polyakov
87d9526d0c
crypto/bn/rsaz*: fix licensing note.
...
rsaz_exp.c: harmonize line terminating;
asm/rsaz-*.pl: minor optimizations.
asm/rsaz-x86_64.pl: sync from master.
(cherry picked from commit 31ed9a2131 )
2013-12-03 22:17:55 +01:00
Andy Polyakov
36982f056a
bn/asm/rsaz-x86_64.pl: fix prototype.
...
(cherry picked from commit 6efef384c6 )
2013-12-03 09:44:24 +01:00
Dr. Stephen Henson
c97ec5631b
Fix warning.
2013-12-01 23:30:21 +00:00
Dr. Stephen Henson
fdb0d5dd8f
Change header order to pick up OPENSSL_SYS_WIN32
2013-12-01 23:29:40 +00:00
Dr. Stephen Henson
81b6dfe40d
Recongnise no-dane and no-libunbound
2013-12-01 23:12:27 +00:00
Dr. Stephen Henson
bc35b8e435
make update
2013-12-01 23:09:44 +00:00
Dr. Stephen Henson
6859f3fc12
Fix warnings.
2013-12-01 23:08:13 +00:00
Dr. Stephen Henson
8b2d5cc4a7
WIN32 fixes.
2013-12-01 23:07:18 +00:00
Dr. Stephen Henson
74184b6f21
RSAX no longer compiled.
2013-12-01 23:06:33 +00:00
Dr. Stephen Henson
6416aed586
Simplify and update openssl.spec
2013-11-27 15:35:02 +00:00
Dr. Stephen Henson
2a1b7bd380
New functions to retrieve certificate from SSL_CTX
...
New functions to retrieve current certificate or private key
from an SSL_CTX.
Constify SSL_get_private_key().
(cherry picked from commit a25f9adc77 )
2013-11-18 18:59:18 +00:00
Dr. Stephen Henson
4bba0bda61
Don't define SSL_select_next_proto if OPENSSL_NO_TLSEXT set
...
(cherry picked from commit 60aeb18750 )
2013-11-18 18:59:03 +00:00
Dr. Stephen Henson
27baa8317a
Use correct header length in ssl3_send_certifcate_request
...
(cherry picked from commit fdeaf55bf9 )
2013-11-17 17:50:11 +00:00
Dr. Stephen Henson
1abfa78a8b
Constify.
2013-11-14 21:00:40 +00:00
Piotr Sikora
edc687ba0f
Fix compilation with no-nextprotoneg.
...
PR#3106
2013-11-14 01:20:58 +00:00
Dr. Stephen Henson
ff0bdbed85
Allow match selecting of current certificate.
...
If pointer comparison for current certificate fails check
to see if a match using X509_cmp succeeds for the current
certificate: this is useful for cases where the certificate
pointer is not available.
(cherry picked from commit 6856b288a6e66edd23907b7fa264f42e05ac9fc7)
2013-11-13 23:47:49 +00:00
Rob Stradling
dc4bdf592f
Additional "chain_cert" functions.
...
PR#3169
This patch, which currently applies successfully against master and
1_0_2, adds the following functions:
SSL_[CTX_]select_current_cert() - set the current certificate without
disturbing the existing structure.
SSL_[CTX_]get0_chain_certs() - get the current certificate's chain.
SSL_[CTX_]clear_chain_certs() - clear the current certificate's chain.
The patch also adds these functions to, and fixes some existing errors
in, SSL_CTX_add1_chain_cert.pod.
(cherry picked from commit 2f56c9c015dbca45379c9a725915b3b8e765a119)
2013-11-13 23:47:37 +00:00
Krzysztof Kwiatkowski
b03d0513d0
Delete duplicate entry.
...
PR#3172
(cherry picked from commit 4f055e34c3598cad00fca097d812fa3e6436d967)
2013-11-13 23:47:26 +00:00
Andy Polyakov
0de70011ad
srp/srp_grps.h: make it Compaq C-friendly.
...
PR: 3165
Submitted by: Daniel Richard G.
(cherry picked from commit 2df9ec01d5 )
2013-11-12 22:19:40 +01:00
Andy Polyakov
220d1e5353
modes/asm/ghash-alpha.pl: update from HEAD.
...
PR: 3165
2013-11-12 21:59:01 +01:00
Andy Polyakov
ca44f72938
Make Makefiles OSF-make-friendly.
...
PR: 3165
(cherry picked from commit d1cf23ac86 )
2013-11-12 21:53:39 +01:00
Dr. Stephen Henson
18f49508a5
Fix memory leak.
...
(cherry picked from commit 16bc45ba95 )
2013-11-11 23:55:18 +00:00
Dr. Stephen Henson
5c50462e1e
Typo.
2013-11-11 22:24:08 +00:00
Dr. Stephen Henson
a257865303
Fix for some platforms where "char" is unsigned.
...
(cherry picked from commit 08b433540416c5bc9a874ba0343e35ba490c65f1)
2013-11-11 22:18:07 +00:00
Andy Polyakov
60adefa610
Makefile.org: make FIPS build work with BSD make.
2013-11-10 23:06:41 +01:00
Dr. Stephen Henson
b5dde6bcc6
Check for missing components in RSA_check.
...
(cherry picked from commit 01be36ef70525e81fc358d2e559bdd0a0d9427a5)
2013-11-09 15:09:22 +00:00
Dr. Stephen Henson
024dbfd44c
Document RSAPublicKey_{in,out} options.
...
(cherry picked from commit 7040d73d22987532faa503630d6616cf2788c975)
2013-11-09 15:09:22 +00:00
Dr. Stephen Henson
233069f8db
Add CMS_SignerInfo_get0_signature function.
...
Add function to retrieve the signature from a CMS_SignerInfo structure:
applications can then read or modify it.
(cherry picked from commit e8df6cec4c09b9a94c4c07abcf0402d31ec82cc1)
2013-11-09 15:09:22 +00:00
Andy Polyakov
c76d6922b1
engines/ccgost/gost89.h: make word32 defintion unconditional.
...
Original definition depended on __LONG_MAX__ that is not guaranteed to
be present. As we don't support platforms with int narrower that 32 bits
it's appropriate to make defition inconditional.
PR: 3165
(cherry picked from commit 96180cac04 )
2013-11-08 23:10:21 +01:00
Andy Polyakov
3241496144
modes/asm/ghash-alpha.pl: make it work with older assembler.
...
PR: 3165
(cherry picked from commit d24d1d7daf )
2013-11-08 23:10:09 +01:00
Dr. Stephen Henson
63fe69c12e
Enable PSK in FIPS mode.
...
Enable PSK ciphersuites with AES or DES3 in FIPS mode.
(cherry picked from commit e0ffd129c1 )
2013-11-06 14:39:41 +00:00
Dr. Stephen Henson
a4947e4e06
Initialise context before using it.
2013-11-06 13:16:50 +00:00
Ben Laurie
262f1c524e
PBKDF2 should be efficient. Contributed by Christian Heimes
...
<christian@python.org >.
2013-11-03 17:27:12 +00:00
Dr. Stephen Henson
bd80d0229c
Add brainpool curves to trace output.
2013-11-02 14:07:21 +00:00
Dr. Stephen Henson
163d794845
Fix warning.
...
(cherry picked from commit 96e16bddb4 )
2013-11-02 14:02:00 +00:00
Dr. Stephen Henson
0b33466b3f
Add SSL_CONF command to set DH Parameters.
...
(cherry picked from commit c557f921dc )
2013-11-02 13:42:03 +00:00
Dr. Stephen Henson
bed27f4db3
Fix argument processing.
...
(cherry picked from commit abf840e4f7 )
2013-11-02 13:41:51 +00:00
Dr. Stephen Henson
738a224bd0
Constification.
...
(cherry picked from commit 27f3b65f49 )
2013-11-02 13:41:38 +00:00
Dr. Stephen Henson
044f8ca87d
Extend SSL_CONF
...
Extend SSL_CONF to return command value types.
Add certificate and key options.
Update documentation.
(cherry picked from commit ec2f7e568e )
2013-11-02 13:41:19 +00:00
Dr. Stephen Henson
45ee08d99b
Typo.
...
(cherry picked from commit 13af145159 )
2013-11-02 13:41:06 +00:00
Piotr Sikora
5ff68e8f6d
Fix SSL_OP_SINGLE_ECDH_USE
...
Don't require a public key in tls1_set_ec_id if compression status is
not needed. This fixes a bug where SSL_OP_SINGLE_ECDH_USE wouldn't work.
2013-11-01 21:37:46 +00:00
Dr. Stephen Henson
f14a4a861d
Add -ecdh_single option.
...
Add -ecdh_single option to set SSL_OP_SINGLE_ECDH_USE on the command line.
2013-11-01 21:35:00 +00:00
Robin Seggelmann
f596e3c491
DTLS/SCTP struct authchunks Bug
...
PR: 2809
DTLS/SCTP requires DATA and FORWARD-TSN chunks to be protected with
SCTP-AUTH. It is checked if this has been activated successfully for
the local and remote peer. Due to a bug, however, the
gauth_number_of_chunks field of the authchunks struct is missing on
FreeBSD, and was therefore not considered in the OpenSSL implementation.
This patch sets the corresponding pointer for the check correctly
whether or not this bug is present.
2013-10-30 14:37:22 +00:00
Robin Seggelmann
9fb523adce
DTLS/SCTP Finished Auth Bug
...
PR: 2808
With DTLS/SCTP the SCTP extension SCTP-AUTH is used to protect DATA and
FORWARD-TSN chunks. The key for this extension is derived from the
master secret and changed with the next ChangeCipherSpec, whenever a new
key has been negotiated. The following Finished then already uses the
new key. Unfortunately, the ChangeCipherSpec and Finished are part of
the same flight as the ClientKeyExchange, which is necessary for the
computation of the new secret. Hence, these messages are sent
immediately following each other, leaving the server very little time to
compute the new secret and pass it to SCTP before the finished arrives.
So the Finished is likely to be discarded by SCTP and a retransmission
becomes necessary. To prevent this issue, the Finished of the client is
still sent with the old key.
2013-10-30 14:37:22 +00:00
Ben Laurie
cecf4d98d0
Remove unused variable.
2013-10-21 03:34:00 +01:00
Nick Mathewson
070e40e2f5
Fix another gmt_unix_time case in server_random
2013-10-20 15:08:58 -07:00
Nick Mathewson
d757097bbc
Do not include a timestamp in the Client/ServerHello Random field.
...
Instead, send random bytes, unless SSL_SEND_{CLIENT,SERVER}RANDOM_MODE
is set.
This is a forward-port of commits:
4af793036f
f4c93b46ed
3da721dac9
2583270191
While the gmt_unix_time record was added in an ostensible attempt to
mitigate the dangers of a bad RNG, its presence leaks the host's view
of the current time in the clear. This minor leak can help
fingerprint TLS instances across networks and protocols... and what's
worse, it's doubtful thet the gmt_unix_time record does any good at
all for its intended purpose, since:
* It's quite possible to open two TLS connections in one second.
* If the PRNG output is prone to repeat itself, ephemeral
handshakes (and who knows what else besides) are broken.
2013-10-20 15:03:24 -07:00
Steve Marquess
7b112c2766
Remove gratuitous patent references
2013-10-20 22:19:47 +01:00
Dr. Stephen Henson
03ee8c2ed7
Fix no-ssl-trace
2013-10-20 22:07:33 +01:00
Dr. Stephen Henson
3495842bb0
Prevent use of RSA+MD5 in TLS 1.2 by default.
...
Removing RSA+MD5 from the default signature algorithm list
prevents its use by default.
If a broken implementation attempts to use RSA+MD5 anyway the sanity
checking of signature algorithms will cause a fatal alert.
(cherry picked from commit 77a0f740d00ecf8f6b01c0685a2f858c3f65a3dd)
2013-10-20 22:07:33 +01:00
Ben Laurie
face65dab8
Add clang debug target.
2013-10-20 13:23:14 +01:00
Andy Polyakov
e41a49c625
PPC assembly pack: make new .size directives profiler-friendly.
...
Suggested by: Anton Blanchard
(cherry picked from commit 76c15d790e )
2013-10-15 23:42:18 +02:00
Dr. Stephen Henson
3a55a42bff
Add brainpool curves to NID table too.
...
(cherry picked from commit 6699cb8491 )
2013-10-15 12:09:54 +01:00
Dr. Stephen Henson
72550c52ed
Fix warning.
...
(cherry picked from commit f6983769c1bcd6c3c6b6bbfbbc41848f6dccf127)
2013-10-15 11:33:58 +01:00
Dr. Stephen Henson
a9d0c56de1
Add test vectors from RFC7027
...
(cherry picked from commit 8ba2d4ed7f128e400693562efd35985068c45e4d)
2013-10-15 11:33:58 +01:00
Dr. Stephen Henson
469bcb0c24
RFC7027 (Brainpool for TLS) support.
...
(cherry picked from commit 695e8c36528f9c3275f5f56e9633ac6a0c11f2e3)
2013-10-15 11:33:58 +01:00
Andy Polyakov
43ce9cdde9
PPC assembly pack: update from master branch.
...
Includes multiple updates: AES module to comply with more ABI
flavors, SHA512 for PPC32, .size directives.
2013-10-15 00:31:45 +02:00
Andy Polyakov
011f89893c
Add support for Cygwin-x86_64.
...
PR: 3110
Submitted by Corinna Vinschen.
(cherry picked from commit b3ef742cbb )
2013-10-14 16:59:05 +02:00
Andy Polyakov
958608ca1c
Initial aarch64 bits.
...
(cherry picked from commit 039081b809 )
2013-10-13 19:24:22 +02:00
Andy Polyakov
1aecb23f5b
MIPS assembly pack: get rid of deprecated instructions.
...
Latest MIPS ISA specification declared 'branch likely' instructions
obsolete. To makes code future-proof replace them with equivalent.
(cherry picked from commit 0c2adb0a9b )
2013-10-13 13:18:21 +02:00
Andy Polyakov
9ed6fba2b4
aes/asm/bsaes-x86_64.pl: update from master.
...
Performance improvement and Windows-specific bugfix (PR#3139).
2013-10-12 21:47:54 +02:00
Andy Polyakov
df5c435c0b
bn/asm/rsax-avx2.pl: minor optimization [for Decoded ICache].
...
(cherry picked from commit fa104be35e )
2013-10-10 23:09:54 +02:00
Ben Laurie
1ebaf97c44
Constification.
2013-10-07 12:44:40 +01:00
Ben Laurie
c8c6914aac
Merge branch 'OpenSSL_1_0_2-stable' into pre-aead
2013-10-05 21:20:24 +01:00
Andy Polyakov
c99028f252
evp/e_des3.c: fix typo with potential integer overflow on 32-bit platforms.
...
Submitted by: Yuriy Kaminskiy
(cherry picked from commit 524b00c0da )
2013-10-05 21:09:50 +01:00
Andy Polyakov
90d8c5862b
perlasm/sparcv9_modes.pl: make it work even with seasoned perl.
...
PR: 3130
(cherry picked from commit 6b2cae0c16 )
2013-10-05 21:09:39 +01:00
Ben Laurie
2d5dd00f9e
Merge branch 'OpenSSL_1_0_2-stable' into agl-1.0.2aead
2013-10-04 12:59:03 +01:00
Ben Laurie
cb52183836
Tidy.
2013-10-04 12:58:08 +01:00
Ben Laurie
ab3b624b0c
Merge branch 'OpenSSL_1_0_2-stable' into agl-1.0.2aead
2013-10-04 12:48:24 +01:00
Ben Laurie
7c81de9a91
Make it build and test.
2013-10-03 19:02:58 +01:00
Andy Polyakov
4dfac659ff
evp/e_des3.c: fix typo with potential integer overflow on 32-bit platforms.
...
Submitted by: Yuriy Kaminskiy
(cherry picked from commit 524b00c0da )
2013-10-03 10:57:45 +02:00
Andy Polyakov
66e0f9db08
perlasm/sparcv9_modes.pl: make it work even with seasoned perl.
...
PR: 3130
(cherry picked from commit 6b2cae0c16 )
2013-10-03 10:45:36 +02:00
Adam Langley
a2eef41993
AEAD Tests.
...
Add tests for AEAD functions: AES-128-GCM, AES-256-GCM and
ChaCha20+Poly1305.
2013-10-01 15:34:44 -04:00
Adam Langley
9a8646510b
chacha20poly1305
...
Add support for Chacha20 + Poly1305.
2013-10-01 14:59:22 -04:00
Adam Langley
fa03d0117a
Use AEAD for AES-GCM.
...
Switches AES-GCM ciphersuites to use AEAD interfaces.
2013-10-01 13:09:12 -04:00
Adam Langley
03614034e9
AEAD support in ssl/
...
This change allows AEADs to be used in ssl/ to implement SSL/TLS
ciphersuites.
2013-10-01 12:49:50 -04:00
Adam Langley
444b1d416b
AEAD support.
...
This change adds an AEAD interface to EVP and an AES-GCM implementation
suitable for use in TLS.
2013-10-01 12:30:52 -04:00
Adam Langley
4055ca1f9e
Rework tls1_change_cipher_state.
...
The previous version of the function made adding AEAD changes very
difficult. This change should be a semantic no-op - it should be purely
a cleanup.
2013-10-01 11:31:30 -04:00
Ben Laurie
7a216dfee5
Constification.
2013-10-01 14:51:04 +01:00
Dr. Stephen Henson
a78b21fc67
Update cms docs.
...
(cherry picked from commit dfcb42c68e )
2013-10-01 14:01:19 +01:00
Ben Laurie
a808002bc3
Correctly test for no-ec.
...
(cherry picked from commit d5605699a1 )
2013-10-01 14:01:19 +01:00
Dr. Stephen Henson
2fc368c111
Don't run ECDH CMS tests if EC disabled.
...
(cherry picked from commit b85f8afe37 )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
6ed3af7d50
Add X9.42 DH test.
...
(cherry picked from commit bbc098ffb3 )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
d037e0d30c
New CMS tests.
...
Add some ECDH CMS tests.
(cherry picked from commit 5cdc25a754 )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
51cb950904
Add X9.42 DH certificate to S/MIME test
...
(cherry picked from commit 75787fd833 )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
4bfa88bb4c
Scripts to recreate S/MIME test certificates.
...
Add a script to generate keys and certificates for the S/MIME and CMS
tests.
Update certificates and add EC examples.
(cherry picked from commit a0957d5505 )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
9d1e475db6
Custom key wrap option for cms utility.
...
(cherry picked from commit 5711885a2b )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
3e792793f6
add cofactor ECDH support from fips branch
...
(cherry picked from commit a3a2e3a43d )
2013-10-01 14:01:18 +01:00
Ben Laurie
ac5cb33356
Fix compile errors.
...
(cherry picked from commit a0aaa5660a )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
aaf74259ec
CMS RFC2631 X9.42 DH enveloped data support.
...
(cherry picked from commit bd59f2b91d )
Conflicts:
crypto/dh/dh.h
crypto/dh/dh_err.c
Sync error codes with 1.0.1.
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
ecf9ceb90d
Minor optimisation to KDF algorithm.
...
Don't need to use temporary buffer if remaining length equals digest length.
(cherry picked from commit 3f6b6f0b8c )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
5c4ff8ad37
Add KDF for DH.
...
Add X9.42 DH KDF. Move sharedinfo generation code to CMS library as the
same structure is used by DH and ECDH.
Move ASN1_OBJECT typedef to ossl_typ.h so it can be picked up by dh headers
without the need to use ASN1.
(cherry picked from commit dc1ce3bc64 )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
dc427fc8e2
Return correct enveloped data type in ASN1 methods.
...
For RSA and DSA keys return an appropriate RecipientInfo type. By setting
CMS_RECIPINFO_NONE for DSA keys an appropriate error is returned if
an attempt is made to use DSA with enveloped data.
(cherry picked from commit 41b920ef01 )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
e1e6c4dae7
Algorithm parameter support.
...
Check and set AlgorithmIdenfier parameters for key wrap algorithms.
Currently these just set parameters to NULL.
(cherry picked from commit e61f5d55bc )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
1747fd1cc6
Add support for ECDH KARI.
...
Add support for ECDH in enveloped data. The CMS ctrls for the EC ASN1
method decode/encode the appropriate parameters from the CMS ASN1 data
and send appropriate data to the EC public key method.
(cherry picked from commit 88e20b8584 )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
a119822b90
Add support for X9.62 KDF.
...
Add X9.62 KDF to EC EVP_PKEY_METHOD.
(cherry picked from commit 25af7a5dbc )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
8c798690ce
CMS support for key agreeement recipient info.
...
Add hooks to support key agreement recipient info type (KARI) using
algorithm specific code in the relevant public key ASN1 method.
(cherry picked from commit 17c2764d2e )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
ea6bf26657
Add new CMS tests.
...
Add new tests to cms-test.pl covering PSS and OAEP.
(cherry picked from commit 32b18e0338 )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
4a26fd6e3b
Add -keyopt option to cms utility.
...
Add support for custom public key parameters in the cms utility using
the -keyopt switch. Works for -sign and also -encrypt if -recip is used.
(cherry picked from commit 02498cc885 )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
dddb38834e
Update cms docs.
...
Document use of -keyopt to use RSA-PSS and RSA-OAEP modes.
(cherry picked from commit 4bf4a6501c )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
af7d6b936b
CMS RSA-OAEP and RSA-PSS support.
...
Extend RSA ASN1 method to support CMS PSS signatures for both sign
and verify.
For signing the EVP_PKEY_CTX parameters are read and the appropriate
CMS structures set up.
For verification the CMS structures are analysed and the corresponding
parameters in the EVP_PKEY_CTX set.
Also add RSA-OAEP support.
For encrypt the EVP_PKEY_CTX parameters are used.
For decrypt the CMS structure is uses to set the appropriate EVP_PKEY_CTX
parameters.
(cherry picked from commit 0574cadf85 )
Also sync error codes with OpenSSL 1.0.1 and add new ones.
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
a64b8786b5
Update to OAEP support.
...
Add OAEP ctrls to retrieve MD and label. Return errors if
an attempt is made to set or retrieve OAEP parameters when
padding mode is not OAEP.
(cherry picked from commit 211a14f627 )
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
25f93585a7
Exetended OAEP support.
...
Extend OAEP support. Generalise the OAEP padding functions to support
arbitrary digests. Extend EVP_PKEY RSA method to handle the new OAEP
padding functions and add ctrls to set the additional parameters.
(cherry picked from commit 271fef0ef3 )
Conflicts:
CHANGES
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
0d5a49e150
Add FIPS RSA error code.
...
Add some RSA error codes used by the FIPS module.
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
5c49a98c5e
Set CMS EnvelopedData version correctly.
...
(cherry picked from commit ff7b6ce9db )
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
869772ff08
Initialise CMS signature buffer length properly.
...
(cherry picked from commit e0f7cfda68 )
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
f2edf3181e
CMS public key parameter support.
...
Add support for customisation of CMS handling of signed and enveloped
data from custom public key parameters.
This will provide support for RSA-PSS and RSA-OAEP but could also be
applied to other algorithms.
(cherry picked from commit e365352d6a )
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
d6dc5c506a
Add control to retrieve signature MD.
...
(cherry picked from commit 810639536c )
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
eebd5e5dd7
Add new OIDs from RFC5753
...
Add OIDs for KDF schemes from RFC5753 and add cross references for
each type and the appropriate digest to use.
(cherry picked from commit 6af440ced4 )
Conflicts:
crypto/objects/obj_dat.h
crypto/objects/obj_mac.num
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
868b266451
Add new OID to pSpecified from PKCS#1
...
(cherry picked from commit e423c360fd )
Conflicts:
crypto/objects/obj_dat.h
crypto/objects/obj_mac.num
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
3fa23ff0f1
Add FIPS 186-2 DSA parameter generation algorithm.
...
Backport support for FIPS 186-2 DSA parameter generation from
HEAD. Redirect to FIPS in FIPS mode and workaround prototype error.
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
c275fb091e
Extend DH parameter generation support.
...
Add support for DH parameter generation using DSA methods including
FIPS 186-3.
(cherry picked from commit 3909087801 )
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
90c341c601
Enhance DH dup functions.
...
Make DHparams_dup work properly with X9.42 DH parameters.
(cherry picked from commit d3cc91eee2 )
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
52d0e1ca4e
If present print j, seed and counter values for DH
...
(cherry picked from commit c9577ab5ea )
Conflicts:
crypto/dh/dh_ameth.c
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
c6f3386577
EVP support for wrapping algorithms.
...
Add support for key wrap algorithms via EVP interface.
Generalise AES wrap algorithm and add to modes, making existing
AES wrap algorithm a special case.
Move test code to evptests.txt
(cherry picked from commit 97cf1f6c28 )
Conflicts:
CHANGES
2013-10-01 14:01:17 +01:00
Andy Polyakov
cf65a07256
evptests.txt: add XTS test vectors
...
(cherry picked from commit c9a8e3d1c7 )
2013-10-01 14:01:17 +01:00
Andy Polyakov
051dc9db2b
evptests.txt: additional GCM test vectors.
...
(cherry picked from commit ca303d333b )
2013-10-01 14:01:17 +01:00
Ben Laurie
93a886b45a
Fix warnings.
...
(cherry picked from commit 282a480a35 )
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
ec19082ecc
GCM and CCM test support
...
Add code to support GCM an CCM modes in evp_test. On encrypt this
will compare the expected ciphertext and tag. On decrypt it will
compare the expected plaintext: tag comparison is done internally.
Add a simple CCM test case and convert all tests from crypto/modes/gcm128.c
(cherry picked from commit 15652f9825 )
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
0eff7c7c88
Add CCM ciphers to tables.
...
(cherry picked from commit 95248de327 )
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
6c4b3514d7
New SP 800-56A compliant version of DH_compute_key().
...
(cherry picked from commit bc91494e06 )
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
d84cca7447
Typo.
...
(cherry picked from commit 415ece7301 )
2013-10-01 14:01:16 +01:00
Ben Laurie
3a8b23bfd9
Re-add accidentally deleted #endif.
2013-10-01 12:34:44 +01:00
Ben Laurie
63fe322160
Merge remote-tracking branch 'agl/1.0.2alpn' into agl-alpn
...
Conflicts:
ssl/ssl3.h
ssl/t1_lib.c
2013-10-01 12:20:02 +01:00
Ben Laurie
c808798013
Produce PEM we would consume.
2013-09-25 13:55:06 +01:00
Ben Laurie
379f21ce5c
Show useful errors.
2013-09-24 23:13:22 +01:00
Ben Laurie
4f3b1b3eb9
Merge remote-tracking branch 'trevp/pempick' into OpenSSL_1_0_2-stable
2013-09-24 12:47:54 +01:00
Dr. Stephen Henson
b49df9502e
Disable Dual EC DRBG.
...
Return an error if an attempt is made to enable the Dual EC DRBG: it
is not used by default.
(cherry picked from commit a4870de5aa )
2013-09-22 18:25:58 +01:00
Ben Laurie
4f8a706dc7
Merge remote-tracking branch 'trevp/pemfix' into trev-pem-fix
2013-09-20 15:39:08 -07:00
Dr. Stephen Henson
7560f63909
Fix warning.
2013-09-18 15:10:22 +01:00
Dr. Stephen Henson
1dfb1b103c
DTLS version usage fixes.
...
Make DTLS behave like TLS when negotiating version: record layer has
DTLS 1.0, message version is 1.2.
Tolerate different version numbers if version hasn't been negotiated
yet.
(cherry picked from commit 40088d8b81 )
2013-09-18 13:47:05 +01:00
Dr. Stephen Henson
6e1987ca1d
DTLS trace support.
...
Add DTLS record header parsing, different client hello format and add
HelloVerifyRequest message type.
Add code to d1_pkt.c to send message headers to the message callback.
(cherry picked from commit 890f2f8b92 )
Conflicts:
ssl/ssl_locl.h
2013-09-18 13:46:03 +01:00
Dr. Stephen Henson
d307176931
Suite B support for DTLS 1.2
...
Check for Suite B support using method flags instead of version numbers:
anything supporting TLS 1.2 cipher suites will also support Suite B.
Return an error if an attempt to use DTLS 1.0 is made in Suite B mode.
(cherry picked from commit 4544f0a691 )
2013-09-18 13:46:03 +01:00
Dr. Stephen Henson
c391a74266
Always return errors in ssl3_get_client_hello
...
If we successfully match a cookie don't set return value to 2 as this
results in other error conditions returning 2 as well.
Instead set return value to -2 which can be checked later if everything
else is OK.
(cherry picked from commit c56f5b8edf )
2013-09-18 13:46:02 +01:00
Dr. Stephen Henson
65a87d3cc3
Dual DTLS version methods.
...
Add new methods DTLS_*_method() which support both DTLS 1.0 and DTLS 1.2 and
pick the highest version the peer supports during negotiation.
As with SSL/TLS options can change this behaviour specifically
SSL_OP_NO_DTLSv1 and SSL_OP_NO_DTLSv1_2.
(cherry picked from commit c6913eeb76 )
Conflicts:
CHANGES
2013-09-18 13:46:02 +01:00
Dr. Stephen Henson
b60b9e7afe
Enable TLS 1.2 ciphers in DTLS 1.2.
...
Port TLS 1.2 GCM code to DTLS. Enable use of TLS 1.2 only ciphers when in
DTLS 1.2 mode too.
(cherry picked from commit 4221c0dd30 )
2013-09-18 13:46:02 +01:00
Dr. Stephen Henson
919834dc84
Update fixed DH requirements.
...
The relaxed signing requirements for fixed DH certificates apply to DTLS 1.2
too.
(cherry picked from commit fbbaaccaca )
2013-09-18 13:46:02 +01:00
Dr. Stephen Henson
efc17286f8
DTLS 1.2 cached record support.
...
Add DTLS1.2 support for cached records when computing handshake macs
instead of the MD5+SHA1 case for DTLS < 1.2 (this is a port of the
equivalent TLS 1.2 code to DTLS).
(cherry picked from commit 04fac50045 )
2013-09-18 13:46:02 +01:00
Dr. Stephen Henson
acec5a6244
Provisional DTLS 1.2 support.
...
Add correct flags for DTLS 1.2, update s_server and s_client to handle
DTLS 1.2 methods.
Currently no support for version negotiation: i.e. if client/server selects
DTLS 1.2 it is that or nothing.
(cherry picked from commit c3b344e36a )
Conflicts:
apps/s_server.c
2013-09-18 13:46:02 +01:00
Dr. Stephen Henson
68039af3e7
Remove versions test from dtls1_buffer_message
...
Since this is always called from DTLS code it is safe to assume the header
length should be the DTLS value. This avoids the need to check the version
number and should work with any version of DTLS (not just 1.0).
(cherry picked from commit 9cf0f18754 )
2013-09-18 13:46:02 +01:00
Dr. Stephen Henson
da1247d653
Extend DTLS method macros.
...
Extend DTLS method creation macros to support version numbers and encryption
methods. Update existing code.
(cherry picked from commit cfd298b7ae )
2013-09-18 13:46:02 +01:00
Dr. Stephen Henson
052d0358f2
Enable various DTLS extensions.
...
Some TLS extensions were disabled for DTLS. Possibly because they caused
problems with the old duplicated code. Enable them again.
(cherry picked from commit 874a18cfad )
2013-09-18 13:46:02 +01:00
Dr. Stephen Henson
1b6ab411d3
Use enc_flags when deciding protocol variations.
...
Use the enc_flags field to determine whether we should use explicit IV,
signature algorithms or SHA256 default PRF instead of hard coding which
versions support each requirement.
(cherry picked from commit cbd64894ec )
Conflicts:
ssl/ssl_locl.h
2013-09-18 13:46:02 +01:00
Dr. Stephen Henson
d88d98edd3
Use appropriate versions of SSL3_ENC_METHOD
...
(cherry picked from commit 6de2649a6b )
2013-09-18 13:46:02 +01:00
Dr. Stephen Henson
741c9959f6
DTLS revision.
...
Revise DTLS code. There was a *lot* of code duplication in the
DTLS code that generates records. This makes it harder to maintain and
sometimes a TLS update is omitted by accident from the DTLS code.
Specifically almost all of the record generation functions have code like
this:
some_pointer = buffer + HANDSHAKE_HEADER_LENGTH;
... Record creation stuff ...
set_handshake_header(ssl, SSL_MT_SOMETHING, message_len);
...
write_handshake_message(ssl);
Where the "Record creation stuff" is identical between SSL/TLS and DTLS or
in some cases has very minor differences.
By adding a few fields to SSL3_ENC to include the header length, some flags
and function pointers for handshake header setting and handshake writing the
code can cope with both cases.
(cherry picked from commit 173e72e64c )
2013-09-18 13:46:02 +01:00
Dr. Stephen Henson
7c23127fde
Add functions to set ECDSA_METHOD structure.
...
Add various functions to allocate and set the fields of an ECDSA_METHOD
structure.
(cherry picked from commit 94c2f77a62 )
2013-09-18 01:23:40 +01:00
Bodo Moeller
8b9722a3c0
Merge branch 'OpenSSL_1_0_2-stable' of openssl.net:openssl into OpenSSL_1_0_2-stable
2013-09-17 09:59:14 +02:00
Bodo Moeller
8c149cfd83
Sync with version from master.
2013-09-17 09:55:27 +02:00
Trevor Perrin
6da498991c
Various custom extension fixes.
...
Force no SSL2 when custom extensions in use.
Don't clear extension state when cert is set.
Clear on renegotiate.
Conflicts:
ssl/t1_lib.c
2013-09-16 18:40:53 +01:00
Rob Stradling
86a66deb7e
Update CHANGES.
2013-09-16 14:03:22 +01:00
Rob Stradling
9409e18179
Tidy up comments.
2013-09-16 14:03:21 +01:00
Rob Stradling
6a0b803fc0
Use TLS version supplied by client when fingerprinting Safari.
2013-09-16 14:03:21 +01:00
Rob Stradling
5fa3b54788
Fix compilation with no-ec and/or no-tlsext.
2013-09-16 14:03:21 +01:00
Rob Stradling
07df5018be
Don't prefer ECDHE-ECDSA ciphers when the client appears to be Safari on OS X.
...
OS X 10.8..10.8.3 has broken support for ECDHE-ECDSA ciphers.
2013-09-16 14:03:21 +01:00
Bodo Moeller
1b9a59c36a
Sync CHANGES and NEWS files.
2013-09-16 14:54:34 +02:00
Bodo Moeller
8f89c33451
Merge branch 'OpenSSL_1_0_2-stable' of /usr/local/google/home/bmoeller/openssl/openssl into OpenSSL_1_0_2-stable
2013-09-16 14:51:10 +02:00
Bodo Moeller
485d7d5904
Fix overly lenient comparisons:
...
- EC_GROUP_cmp shouldn't consider curves equal just because
the curve name is the same. (They really *should* be the same
in this case, but there's an EC_GROUP_set_curve_name API,
which could be misused.)
- EC_POINT_cmp shouldn't return 0 for ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED
or EC_R_INCOMPATIBLE_OBJECTS errors because in a cmp API, 0 indicates
equality (not an error).
Reported by: king cope
(cherry picked from commit 312a46791ab465cfa3bf26764361faed0e5df014)
2013-09-16 14:50:48 +02:00
Bodo Moeller
e3720888c7
Fix overly lenient comparisons:
...
- EC_GROUP_cmp shouldn't consider curves equal just because
the curve name is the same. (They really *should* be the same
in this case, but there's an EC_GROUP_set_curve_name API,
which could be misused.)
- EC_POINT_cmp shouldn't return 0 for ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED
or EC_R_INCOMPATIBLE_OBJECTS errors because in a cmp API, 0 indicates
equality (not an error).
Reported by: king cope
(cherry picked from commit 312a46791ab465cfa3bf26764361faed0e5df014)
2013-09-16 13:06:30 +02:00
Andy Polyakov
d75e384ff8
Extend OPENSSL_ia32cap_P (backport from HEAD).
2013-09-15 22:13:54 +02:00
Andy Polyakov
c340c7a88c
crypto/armcap.c: fix typo in rdtsc subroutine.
...
PR: 3125
Submitted by: Kyle McMartin
(cherry picked from commit 8e52a9063a )
2013-09-15 22:10:49 +02:00
Dr. Stephen Henson
9ecf6e93af
add -badsig option to corrupt CRL signatures for testing too
...
(cherry picked from commit 139cd16cc5 )
2013-09-14 13:53:44 +01:00
Dr. Stephen Henson
a41735288c
Add missing code from SSL_CONF backport.
2013-09-14 13:53:44 +01:00
Scott Deboy
8ae78c6bd9
Initialize next_proto in s_server - resolves incorrect attempts to free
...
Cherry pick of b0d27cb902 .
2013-09-13 11:31:39 -04:00
Adam Langley
cb3cec4adf
Add tests for ALPN functionality.
...
Cherry-picked from a898936218 .
2013-09-13 11:27:26 -04:00
Adam Langley
b0d6f3c58f
Support ALPN.
...
This change adds support for ALPN[1] in OpenSSL. ALPN is the IETF
blessed version of NPN and we'll be supporting both ALPN and NPN for
some time yet.
Cherry-picked from 6f017a8f9d .
[1] https://tools.ietf.org/html/draft-ietf-tls-applayerprotoneg-00
2013-09-13 11:27:22 -04:00
Ben Laurie
0338648426
Constification.
2013-09-10 17:58:44 +01:00
Andy Polyakov
c7dc404188
crypto/modes/asm/aesni-gcm-x86_64.pl: minor optimization.
...
Avoid occasional up to 8% performance drops.
(cherry picked from commit 7a1a12232a )
2013-09-09 21:46:02 +02:00
Andy Polyakov
08853158b6
crypto/bn/asm/x86_64-mont.pl: minor optimization.
...
(cherry picked from commit 72a158703b )
2013-09-09 21:42:48 +02:00
Andy Polyakov
74e0187663
Revert "x86cpuid.pl: fix extended feature flags detection."
...
This reverts commit 514f1a7835 .
2013-09-09 21:35:15 +02:00
Dr. Stephen Henson
bb4aa95c81
Remove ancient PATENTS section and FAQ reference.
...
(cherry picked from commit ce4555967e )
2013-09-08 21:25:38 +01:00
Dr. Stephen Henson
5117d50b7e
Partial path fix.
...
When verifying a partial path always check to see if the EE certificate
is explicitly trusted: the path could contain other untrusted certificates.
(cherry picked from commit 52073b7675 )
2013-09-08 21:25:10 +01:00
Dr. Stephen Henson
593605d3ec
Document supported curve functions.
...
(cherry picked from commit c3eb33763b )
2013-09-03 15:43:59 +01:00
Dr. Stephen Henson
c9ea4df8f9
Document -force_pubkey option.
...
(cherry picked from commit b093a06866bf632a97a9a0286e2d08f69c3cf7dd)
2013-08-21 13:41:17 +01:00
Dr. Stephen Henson
89ff56faf1
Correct ECDSA example.
...
(cherry picked from commit 3a918ea2bbf4175d9461f81be1403d3781b2c0dc)
2013-08-20 17:30:16 +01:00
Dr. Stephen Henson
9855026c43
fix printout of expiry days if -enddate is used in ca
...
(cherry picked from commit f7ac0ec89d )
2013-08-19 21:55:07 +01:00
Dr. Stephen Henson
904348a492
Time difference functions.
...
Backport of ASN1_TIME_diff and OPENSSL_gmtime_diff functions from master
branch.
2013-08-19 21:55:07 +01:00
Dr. Stephen Henson
aaaa18392d
new command line option -stdname to ciphers utility
...
(cherry picked from commit 51b9115b6d )
2013-08-19 20:25:39 +01:00
Dr. Stephen Henson
8c33e40d2e
Add new test option set the version in generated certificates: this
...
is needed to test some profiles/protocols which reject certificates
with unsupported versions.
(cherry picked from commit df316fd43c )
2013-08-19 18:10:04 +01:00
Dr. Stephen Henson
0d04af1e72
option to output corrupted signature in certificates for testing purposes
...
(cherry picked from commit 96cfba0fb4 )
2013-08-19 18:09:44 +01:00
Dr. Stephen Henson
8f17495800
update usage messages
...
(cherry picked from commit 7c8ac50504 )
2013-08-19 18:09:26 +01:00
Dr. Stephen Henson
95c1a24853
add -naccept <n> option to s_server to automatically exit after <n> connections
...
(cherry picked from commit b5cadfb564 )
2013-08-19 17:42:02 +01:00
Dr. Stephen Henson
08374de10f
with -rev close connection if client sends "CLOSE"
...
(cherry picked from commit 685755937a )
2013-08-19 14:14:05 +01:00
Dr. Stephen Henson
506e70a216
Add simple external session cache to s_server. This serialises sessions
...
just like a "real" server making it easier to trace any problems.
(manually applied from commit 35b0ea4efe )
2013-08-19 14:13:56 +01:00
Dr. Stephen Henson
0cca92cdd3
Remove commented out debug line.
2013-08-19 14:13:38 +01:00
Dr. Stephen Henson
5b430cfc44
Make no-ec compilation work.
...
(cherry picked from commit 14536c8c9c )
2013-08-19 14:13:38 +01:00
Dr. Stephen Henson
171c4da568
Add -rev test option to s_server to just reverse order of characters received
...
by client and send back to server. Also prints an abbreviated summary of
the connection parameters.
(cherry picked from commit 4f3df8bea2 )
2013-08-19 14:13:38 +01:00
Dr. Stephen Henson
04611fb0f1
Add -brief option to s_client and s_server to summarise connection details.
...
New option -verify_quiet to shut up the verify callback unless there is
an error.
(manually applied from commit 2a7cbe77b3 )
2013-08-19 14:13:24 +01:00
Dr. Stephen Henson
df430489cf
Add documentation.
...
Preliminary documentation for chain and verify stores and certificate chain
setting functions.
(cherry picked from commit eeb15452a0 )
2013-08-18 13:53:32 +01:00
Dr. Stephen Henson
5085e57fb5
Return 1 when setting ECDH auto mode.
...
(cherry picked from commit 42082eda6f )
2013-08-18 13:53:00 +01:00
Michael Tuexen
75b81247a0
DTLS message_sequence number wrong in rehandshake ServerHello
...
This fix ensures that
* A HelloRequest is retransmitted if not responded by a ClientHello
* The HelloRequest "consumes" the sequence number 0. The subsequent
ServerHello uses the sequence number 1.
* The client also expects the sequence number of the ServerHello to
be 1 if a HelloRequest was received earlier.
This patch fixes the RFC violation.
(cherry picked from commit b62f4daac0 )
2013-08-13 18:55:16 +01:00
Michael Tuexen
2c1a5c1039
DTLS handshake fix.
...
Reported by: Prashant Jaikumar <rmstar@gmail.com >
Fix handling of application data received before a handshake.
(cherry picked from commit 0c75eeacd3 )
2013-08-08 13:31:54 +01:00
Dr. Stephen Henson
71c34b7f2d
Fix verify loop with CRL checking.
...
PR #3090
Reported by: Franck Youssef <fry@open.ch >
If no new reason codes are obtained after checking a CRL exit with an
error to avoid repeatedly checking the same CRL.
This will only happen if verify errors such as invalid CRL scope are
overridden in a callback.
(cherry picked from commit 4b26645c1a )
2013-08-06 16:08:04 +01:00
Kaspar Brand
b0cfaf58ad
Fix for PEM_X509_INFO_read_bio.
...
PR: 3028
Fix bug introduced in PEM_X509_INFO_bio which wouldn't process RSA keys
correctly if they appeared first.
(cherry picked from commit 5ae8d6bcba )
2013-08-06 16:04:52 +01:00
Andy Polyakov
9dc07f04c3
crypto/evp/e_aes.c: fix logical pre-processor bug and formatting.
...
Bug would emerge when XTS is added to bsaes-armv7.pl. Pointed out by
Ard Biesheuvel of Linaro.
(cherry picked from commit 044f63086051d7542fa9485a1432498c39c4d8fa)
2013-08-03 17:09:37 +02:00
Andy Polyakov
f15c16200b
crypto/bn/asm/rsax-x86_64.pl: make it work on Darwin.
...
(cherry picked from commit fd8ad019e1 )
2013-08-03 16:30:40 +02:00
Andy Polyakov
4e09add6f8
crypto/sha/asm/sha*-x86_64.pl: comply with Win64 ABI.
...
(cherry picked from commit 006784378d )
2013-07-31 23:52:21 +02:00
Trevor
355a6236be
Cosmetic touchups.
2013-07-31 16:38:43 +01:00
Ben Laurie
6d7fa9c25c
Support new rsaz asm stuff.
2013-07-31 16:37:19 +01:00
Andy Polyakov
82ae22ef4d
bn/asm/rsaz-avx2.pl: Windows-specific fix.
...
(cherry picked from commit 5c57c69f9e )
2013-07-12 19:01:23 +02:00
Ben Laurie
b56bae5126
s/rsaz_eligible/rsaz_avx2_eligible/.
...
(cherry picked from commit 852f837f5e )
2013-07-12 18:53:05 +02:00
Andy Polyakov
2d3f31e0a1
sha512-586.pl: fix typo.
...
Submitted by: Gisle Vanem
(cherry picked from commit 241fba4ea9 )
2013-07-10 10:02:34 +02:00
Andy Polyakov
ae74191e38
Remove RSAX engine, superseded by RSAZ module.
...
(cherry picked from commit f5b132d652 )
Conflicts [resloved]:
Configure
2013-07-05 22:16:10 +02:00
Andy Polyakov
ab8233ab81
Take RSAZ modules into build loop, add glue and engage.
...
RT: 2582, 2850
(cherry picked from commit ca48ace5c5 )
Conflicts:
Configure
2013-07-05 21:53:05 +02:00
Andy Polyakov
d5572bdc64
Add RSAZ assembly modules.
...
RT: 2582, 2850
(cherry picked from commit 0b4bb91db6 )
2013-07-05 21:49:19 +02:00
Andy Polyakov
e3990db59c
bn/asm/x86_86-mont.pl: optimize reduction for Intel Core family.
...
(cherry picked from commit 26e43b48a3 )
2013-07-05 21:15:16 +02:00
Andy Polyakov
87d90528ac
bn/bn_exp.c: harmonize.
...
(cherry picked from commit cbce8c4644 )
2013-07-05 21:01:51 +02:00
Trevor
e27711cfdd
Trying cherrypick:
...
Add support for arbitrary TLS extensions.
Contributed by Trevor Perrin.
Conflicts:
CHANGES
ssl/ssl.h
ssl/ssltest.c
test/testssl
Fix compilation due to #endif.
Cherrypicking more stuff.
Cleanup of custom extension stuff.
serverinfo rejects non-empty extensions.
Omit extension if no relevant serverinfo data.
Improve error-handling in serverinfo callback.
Cosmetic cleanups.
s_client documentation.
s_server documentation.
SSL_CTX_serverinfo documentation.
Cleaup -1 and NULL callback handling for custom extensions, add tests.
Cleanup ssl_rsa.c serverinfo code.
Whitespace cleanup.
Improve comments in ssl.h for serverinfo.
Whitespace.
Cosmetic cleanup.
Reject non-zero-len serverinfo extensions.
Whitespace.
Make it build.
Conflicts:
test/testssl
2013-07-03 11:53:30 +01:00
Andy Polyakov
28c08222c0
config: fix executable format detection on latest FreeBSD.
...
Submitted by: Bryan Drewery
PR: 3075
(cherry picked from commit c256e69d3f )
2013-06-30 23:59:30 +02:00
Andy Polyakov
8508a80998
bn/bn_exp.c: Solaris-specific fix, T4 MONTMUL relies on alloca.
...
(cherry picked from commit b74ce8d948 )
2013-06-30 23:14:31 +02:00
Andy Polyakov
7850a8bc04
x86_64-xlate.pl: Windows fixes.
...
(cherry picked from commit a9d14832fd )
2013-06-30 23:14:19 +02:00
Andy Polyakov
fccec89084
aesni-sha256-x86_64.pl: fix typo in Windows SEH.
...
(cherry picked from commit 42386fdb62 )
2013-06-30 23:14:04 +02:00
Andy Polyakov
6c7fa27404
PA-RISC assembler pack: switch to bve in 64-bit builds.
...
PR: 3074
(cherry picked from commit 02450ec69d )
2013-06-30 23:13:23 +02:00
Andy Polyakov
e7f9c08ab8
SPARC T4 DES support: fix typo.
...
(cherry picked from commit 8ee3c7e676 )
2013-06-18 11:07:24 +02:00
Andy Polyakov
03c8441b14
Optimize SPARC T4 MONTMUL support.
...
Improve RSA sing performance by 20-30% by:
- switching from floating-point to integer conditional moves;
- daisy-chaining sqr-sqr-sqr-sqr-sqr-mul sequences;
- using MONTMUL even during powers table setup;
(cherry picked from commit 4ddacd9921 )
2013-06-18 11:07:16 +02:00
Ben Laurie
e887c4187e
Backport single makefile from master.
2013-06-13 15:09:48 +01:00
Ben Laurie
933aee6199
Wrong include path.
2013-06-13 13:26:22 +01:00
Dr. Stephen Henson
90e7f983b5
Typo: don't call RAND_cleanup during app startup.
2013-06-12 21:16:31 +01:00
Andy Polyakov
f00962aaf3
aesni-sha1-x86_64.pl: update performance data.
...
(cherry picked from commit 3b848d3401 )
2013-06-10 22:52:06 +02:00
Andy Polyakov
3eccd2e53a
aesni-sha256-x86_64.pl: harmonize with latest sha512-x86_64.pl.
...
(cherry picked from commit 42b9a4177b )
2013-06-10 22:51:55 +02:00
Andy Polyakov
fcd0e61c24
sha1-x86_64.pl: add AVX2+BMI code path.
...
(cherry picked from commit cd8d7335af )
2013-06-10 22:51:47 +02:00
Andy Polyakov
e7a02b24c1
sha512-x86_64.pl: upcoming-Atom-specific optimization.
...
(cherry picked from commit c7f690c243 )
2013-06-10 22:51:31 +02:00
Andy Polyakov
cbe6bb54e6
sha[256|512]-586.pl: add more SIMD code paths.
...
(cherry picked from commit 32213d8d77 )
2013-06-10 22:50:32 +02:00
Andy Polyakov
23966faca4
ghash-x86_64.pl: add Haswell performance data.
...
(cherry picked from commit b42759158d )
2013-06-10 22:50:23 +02:00
Andy Polyakov
514f1a7835
x86cpuid.pl: fix extended feature flags detection.
...
(cherry picked from commit 1bc0b68d7b )
2013-06-10 22:49:35 +02:00
Dr. Stephen Henson
af908bc48b
Don't use RC2 with PKCS#12 files in FIPS mode.
...
(cherry picked from commit cdb6c48445 )
2013-06-05 15:06:02 +01:00
Dr. Stephen Henson
233ebcb543
Fix PSS signature printing.
...
Fix PSS signature printing: consistently use 0x prefix for hex values for
padding length and trailer fields.
(cherry picked from commit deb24ad53147f5a8dd63416224a5edd7bbc0e74a)
2013-06-05 15:06:02 +01:00
Dr. Stephen Henson
da0c007254
Reencode with X509_CRL_ctx_sign too.
...
(cherry picked from commit 96940f4f2d0300c033379a87db0ff19e598c6264)
2013-06-05 15:06:02 +01:00
Ben Laurie
01bc7dcafc
Header needed for SOCK_STREAM on FreeBSD.
2013-06-04 16:27:05 +01:00
Ben Laurie
83e2ff8c51
Fix missing/incorrect prototype.
2013-06-04 16:17:30 +01:00
Ben Laurie
e3120586fb
Missing prototypes.
2013-06-04 15:14:18 +01:00
Ben Laurie
3941aa12f1
Remove added ;.
2013-06-04 15:05:18 +01:00
Andy Polyakov
0c10cf0ad6
crypto/modes: even more strict aliasing fixes [and fix bug in cbc128.c from
...
previous cbc128.c commit].
2013-06-04 14:31:23 +01:00
Andy Polyakov
62874a5a69
cbc128.c: fix strict aliasing warning.
2013-06-04 14:30:49 +01:00
Andy Polyakov
8c1f9c56fd
crypto/bn/bn_exp.c: SPARC portability fix.
...
(cherry picked from commit b69437e1e5 )
2013-06-01 09:59:54 +02:00
Andy Polyakov
75063c1527
aesni-sha1-x86_64.pl: Atom-specific optimization.
...
(cherry picked from commit 4df2280b4f )
2013-05-25 19:09:47 +02:00
Andy Polyakov
5de583aa91
sha512-x86_64.pl: +16% optimization for Atom.
...
(and pending AVX2 changes).
(cherry picked from commit 504bbcf3cd )
2013-05-25 19:04:48 +02:00
Andy Polyakov
a0675d8149
vpaes-x86[_64].pl: minor Atom-specific optimization.
...
(cherry picked from commit 988d11b641 )
2013-05-25 18:58:54 +02:00
Andy Polyakov
a7e9ed95ec
evp/e_aes.c: engage SPARC T4 AES support [from master].
2013-05-20 16:36:53 +02:00
Andy Polyakov
615d0edf1f
evp/e_aes.c: engage AES-NI GCM stitch.
2013-05-20 16:30:21 +02:00
Andy Polyakov
e775755dec
evp/evp_err.c: update from master.
2013-05-20 16:16:34 +02:00
Andy Polyakov
a1bf7de5a7
evp/e_camellia.c: engage SPARC T5 Camellia support [from master].
2013-05-20 16:09:13 +02:00
Andy Polyakov
047c02e8db
evp/e_des[3].c: engage SPARC T4 DES support.
2013-05-20 16:08:39 +02:00
Andy Polyakov
c92989d2b7
Add BN support for SPARC VIS3 and T4 [from master].
2013-05-20 15:48:13 +02:00
Andy Polyakov
039e7875ff
md5_locl.h: enable assembly support on SPARC [from master].
2013-05-20 00:33:09 +02:00
Andy Polyakov
48b7b96bd0
sparcv9cap.c: update from master.
2013-05-20 00:16:18 +02:00
Andy Polyakov
747b7a636a
Add MD5 SPARC T4 code from master.
2013-05-20 00:08:15 +02:00
Andy Polyakov
635f56fabd
Add SHA SPARC T4 code from master.
2013-05-20 00:04:38 +02:00
Andy Polyakov
c617bc0054
Add Camellia SPARC T4 module from master.
2013-05-19 23:58:54 +02:00
Andy Polyakov
d215724753
Add AES SPARC T4 module from master.
2013-05-19 23:54:34 +02:00
Andy Polyakov
9c1ee1bed5
Add DES SPARC T4 module from master.
2013-05-19 23:51:22 +02:00
Andy Polyakov
14ef63c15e
Add perlasm/sparcv9_modes.pl from master.
2013-05-19 23:47:38 +02:00
Andy Polyakov
5a456140c1
des_enc.m4: update from master.
2013-05-19 23:43:12 +02:00
Andy Polyakov
1ff546737b
evp/Makefile: fix typo.
2013-05-19 23:11:03 +02:00
Andy Polyakov
56f0b25754
Add EVP glue to AES-NI SHA256 stich [from master].
2013-05-19 22:35:37 +02:00
Andy Polyakov
b0f78dc018
Add AES-NI SHA256 stitch and take it into build loop [from master].
2013-05-19 22:23:18 +02:00
Andy Polyakov
1f2d194acf
aesni-sha1-x86_64.pl: update from master.
2013-05-19 22:18:52 +02:00
Andy Polyakov
aacfb2a2c6
Add AES-NI GCM stich and take it into build loop [from master].
2013-05-19 22:06:18 +02:00
Andy Polyakov
0ba304dd31
gcm128.c: update from master (add AVX and VIS3 support).
2013-05-19 21:55:30 +02:00
Andy Polyakov
8eb2da5fbb
ghash-sparcv9.pl: update from master.
2013-05-19 21:53:14 +02:00
Andy Polyakov
d1896e8ccd
ghash-x86_64.pl: update from master.
2013-05-19 21:51:19 +02:00
Andy Polyakov
0edcb7a556
ghash-x86.pl: update from master.
2013-05-19 21:46:03 +02:00
Andy Polyakov
ecc2c5d81a
sha512-x86_64.pl: update from master.
2013-05-19 21:36:54 +02:00
Andy Polyakov
441dec8e9f
sha512-586.pl: update from master.
2013-05-19 21:36:38 +02:00
Andy Polyakov
4f566c360b
sha256-598.pl: update from master.
2013-05-19 21:35:55 +02:00
Andy Polyakov
e10cd58090
sha1-x86_64.pl: update from master.
2013-05-19 21:33:04 +02:00
Andy Polyakov
5c8ae6d93e
sha1-586.pl: update from master.
2013-05-19 21:32:29 +02:00
Andy Polyakov
e72f7677bf
crypto/perlasm: update from master.
2013-05-19 21:27:59 +02:00
Andy Polyakov
e815d72b1f
RFC6689 support: add missing commit (git noob alert).
2013-05-15 20:41:51 +02:00
Andy Polyakov
ddf918673d
ssl/dnssec.c: compilation errors.
2013-05-15 20:38:58 +02:00
Andy Polyakov
8517d0c00d
Initial support for RFC6689, a.k.a. DANE.
...
Note that it initially applies to 1.0.2, and not to HEAD. This is
in order to allow development with existing libunbound installations
that are dependent on OpenSSL 1.0.x. More details in RT.
RT: 3003
2013-05-13 15:36:06 +02:00
Dr. Stephen Henson
8659dc73f4
Reencode certificates in X509_sign_ctx.
...
Reencode certificates in X509_sign_ctx as well as X509_sign.
This was causing a problem in the x509 application when it modified an
existing certificate.
(cherry picked from commit c6d8adb8a4 )
2013-05-02 12:24:33 +01:00
Andy Polyakov
07464787a8
crypto/modes/modes_lcl.h: let STRICT_ALIGNMENT be on ARMv7.
...
While ARMv7 in general is capable of unaligned access, not all instructions
actually are. And trouble is that compiler doesn't seem to differentiate
those capable and incapable of unaligned access. Side effect is that kernel
goes into endless loop retrying same instruction triggering unaligned trap.
Problem was observed in xts128.c and ccm128.c modules. It's possible to
resolve it by using (volatile u32*) casts, but letting STRICT_ALIGNMENT
be feels more appropriate.
(cherry picked from commit 3bdd80521a )
2013-04-13 21:19:16 +02:00
Dr. Stephen Henson
e9a3aa9721
Set s->d1 to NULL after freeing it.
...
(cherry picked from commit 04638f2fc3 )
2013-04-08 18:39:52 +01:00
Dr. Stephen Henson
a8cc9f1873
Typo.
...
(cherry picked from commit 0ded2a0689 )
2013-03-31 17:43:42 +01:00
Dr. Stephen Henson
f25c3c0542
Call RAND_cleanup in openssl application.
...
(cherry picked from commit 944bc29f90 )
2013-03-28 14:29:11 +00:00
Matt Caswell
4e5b9645e8
Make binary curve ASN.1 work in FIPS mode.
...
Don't check for binary curves by checking methods: the values will
be different in FIPS mode as they are redirected to the validated module
version.
(cherry picked from commit 94782e0e9c )
2013-03-26 16:58:29 +00:00
Dr. Stephen Henson
04347839ea
enhance EC method to support setting curve type when generating keys and add parameter encoding option
...
(cherry picked from commit 24edfa9df9 )
2013-03-20 15:54:05 +00:00
Dr. Stephen Henson
e14b8410ca
Disable compression for DTLS.
...
The only standard compression method is stateful and is incompatible with
DTLS.
2013-03-19 13:46:57 +00:00
Andy Polyakov
2a1ab7b438
x86cpuid.pl: make it work with older CPUs.
...
PR: 3005
(cherry picked from commit 5702e965d7 )
2013-03-18 19:50:09 +01:00
Andy Polyakov
dd1e4fbcc0
e_aes_cbc_hmac_sha1.c: fix rare bad record mac on AES-NI plaforms.
...
PR: 3002
(cherry picked from commit 5c60046553 )
2013-03-18 19:35:20 +01:00
Michael Tuexen
3f84d34c37
Avoid unnecessary fragmentation.
...
(cherry picked from commit 80ccc66d7e )
2013-03-18 14:32:59 +00:00
Dr. Stephen Henson
d7e429b91d
Encode INTEGER correctly.
...
If an ASN1_INTEGER structure is allocated but not explicitly set encode
it as zero: don't generate an invalid zero length INTEGER.
(cherry picked from commit 1643edc63c )
2013-03-18 14:22:01 +00:00
Dr. Stephen Henson
155ef13c67
Typo.
...
(cherry picked from commit 1546fb780b )
2013-03-18 13:59:57 +00:00
Dr. Stephen Henson
c3466040ec
Update ordinals.
2013-03-04 19:28:57 +00:00
Andy Polyakov
2d9be79407
x86_64-gf2m.pl: fix typo.
...
(cherry picked from commit 342dbbbe4e )
2013-03-01 22:37:53 +01:00
Andy Polyakov
2e4b7eede3
x86_64-gf2m.pl: add missing Windows build fix for #2963 .
...
PR: 3004
(cherry picked from commit 7c43601d44 )
2013-03-01 21:57:25 +01:00
Dr. Stephen Henson
e1dee801b9
Add function CMS_RecipientInfo_encrypt
...
Add CMS_RecipientInfo_encrypt: this function encrypts an existing content
encryption key to match the key in the RecipientInfo structure: this is
useful if a new recpient is added to and existing enveloped data structure.
Add documentation.
(cherry picked from commit e1f1d28f34 )
2013-02-26 17:06:08 +00:00
Dr. Stephen Henson
3c53fd892c
Fix error codes.
...
(cherry picked from commit 388aff08dc )
2013-02-26 17:05:39 +00:00
Dr. Stephen Henson
c46990b13b
Demo code for SSL_CONF API
...
Two example programs one for command line argument processing and
one for configuration file processing.
(cherry picked from commit 3646578ae7 )
2013-02-26 16:34:23 +00:00
Dr. Stephen Henson
1510b1f4c2
Update SSL_CONF docs.
...
Fix some typos and update version number first added: it has now been
backported to OpenSSL 1.0.2.
(cherry picked from commit 4365e4aad9 )
2013-02-26 15:29:49 +00:00
Dr. Stephen Henson
f8a69166ed
New -force_pubkey option to x509 utility to supply a different public
...
key to the one in a request. This is useful for cases where the public
key cannot be used for signing e.g. DH.
(cherry picked from commit 43206a2d7c )
2013-02-25 15:25:27 +00:00
Andy Polyakov
b9eef98883
bn_nist.c: work around clang 3.0 bug.
...
(cherry picked from commit 750398acd8 )
2013-02-16 11:37:38 +01:00
Nick Alcock
ae5c1ca377
Fix POD errors to stop make install_docs dying with pod2man 2.5.0+
...
podlators 2.5.0 has switched to dying on POD syntax errors. This means
that a bunch of long-standing erroneous POD in the openssl documentation
now leads to fatal errors from pod2man, halting installation.
Unfortunately POD constraints mean that you have to sort numeric lists
in ascending order if they start with 1: you cannot do 1, 0, 2 even if
you want 1 to appear first. I've reshuffled such (alas, I wish there
were a better way but I don't know of one).
(cherry picked from commit 5cc2707742 )
2013-02-15 19:39:59 +01:00
Andy Polyakov
188ab7df98
cms-test.pl: make it work with not-so-latest perl.
...
(cherry picked from commit 9c437e2fad )
2013-02-14 16:39:06 +01:00
Dr. Stephen Henson
2e3d02fe1a
Upate FAQ.
...
Add description of "allocate and encode" operation for ASN1 routines.
Document how versioning will for after the letter release reaches
y.
(cherry picked from commit 2527b94fec )
2013-02-12 16:05:02 +00:00
David Woodhouse
3a3a1af1da
Check DTLS_BAD_VER for version number.
...
The version check for DTLS1_VERSION was redundant as
DTLS1_VERSION > TLS1_1_VERSION, however we do need to
check for DTLS1_BAD_VER for compatibility.
PR:2984
(cherry picked from commit d980abb22e )
2013-02-12 15:15:32 +00:00
Dr. Stephen Henson
0ced72c608
Fix in ssltest is no-ssl2 configured
...
(cherry picked from commit cbf9b4aed3 )
2013-02-11 18:28:48 +00:00
Lutz Jaenicke
5584a95490
FAQ/README: we are now using Git instead of CVS
...
(cherry picked from commit f88dbb8385 )
2013-02-11 11:33:19 +01:00
Andy Polyakov
a3e66779d3
sparccpuid.S: work around emulator bug on T1.
...
(cherry picked from commit 3caeef94bd )
2013-02-11 10:41:22 +01:00
Andy Polyakov
919eab8a8b
s3_cbc.c: make CBC_MAC_ROTATE_IN_PLACE universal.
...
(cherry picked from commit f93a41877d )
2013-02-08 21:36:06 +01:00
Andy Polyakov
e9baceab5a
s3_cbc.c: get rid of expensive divisions [from master].
2013-02-08 16:59:26 +01:00
Andy Polyakov
b05561c4b7
ssl/[d1|s3]_pkt.c: harmomize orig_len handling.
...
(cherry picked from commit 8545f73b89 )
2013-02-08 10:40:51 +01:00
Dr. Stephen Henson
b7355af421
Fix IV check and padding removal.
...
Fix the calculation that checks there is enough room in a record
after removing padding and optional explicit IV. (by Steve)
For AEAD remove the correct number of padding bytes (by Andy)
(cherry picked from commit 32cc2479b4 )
2013-02-08 10:40:39 +01:00
Adam Langley
0462eedf5e
Fix for EXP-RC2-CBC-MD5
...
MD5 should use little endian order. Fortunately the only ciphersuite
affected is EXP-RC2-CBC-MD5 (TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5) which
is a rarely used export grade ciphersuite.
(cherry picked from commit f306b87d76 )
2013-02-08 10:40:13 +01:00
Andy Polyakov
82425f2c28
e_aes_cbc_hmac_sha1.c: align calculated MAC at cache line.
...
It also ensures that valgring is happy.
(cherry picked from commit 2141e6f30b )
2013-02-08 10:35:02 +01:00
Andy Polyakov
af010edd55
e_aes_cbc_hmac_sha1.c: cleanse temporary copy of HMAC secret.
...
(cherry picked from commit 529d27ea47 )
2013-02-06 13:56:15 +00:00
Andy Polyakov
5966f4d973
e_aes_cbc_hmac_sha1.c: address the CBC decrypt timing issues.
...
Address CBC decrypt timing issues and reenable the AESNI+SHA1 stitch.
(cherry picked from commit 125093b59f )
2013-02-06 13:56:15 +00:00
Andy Polyakov
eeb486a5f4
ssl/*: remove SSL3_RECORD->orig_len to restore binary compatibility.
...
Kludge alert. This is arranged by passing padding length in unused
bits of SSL3_RECORD->type, so that orig_len can be reconstructed.
(cherry picked from commit 8bfd4c659f )
2013-02-06 13:56:15 +00:00
Dr. Stephen Henson
d7f55e76f2
Don't access EVP_MD_CTX internals directly.
...
(cherry picked from commit 04e45b52ee )
2013-02-06 13:56:14 +00:00
Andy Polyakov
7d9e781a1d
s3/s3_cbc.c: allow for compilations with NO_SHA256|512.
...
(cherry picked from commit d5371324d9 )
2013-02-06 13:56:14 +00:00
Andy Polyakov
e0c21a0b6b
ssl/s3_cbc.c: md_state alignment portability fix.
...
RISCs are picky and alignment granted by compiler for md_state can be
insufficient for SHA512.
(cherry picked from commit 36260233e7 )
2013-02-06 13:56:14 +00:00
Andy Polyakov
1dfb4b9400
ssl/s3_cbc.c: uint64_t portability fix.
...
Break dependency on uint64_t. It's possible to declare bits as
unsigned int, because TLS packets are limited in size and 32-bit
value can't overflow.
(cherry picked from commit cab13fc847 )
2013-02-06 13:56:14 +00:00
Dr. Stephen Henson
e5cb774323
typo.
...
(cherry picked from commit 34ab3c8c71 )
2013-02-06 13:56:14 +00:00
Dr. Stephen Henson
73390e6ba5
Add ordinal for CRYPTO_memcmp: since this will affect multiple
...
branches it needs to be in a "gap".
(cherry picked from commit 81ce0e14e7 )
2013-02-06 13:56:13 +00:00
Dr. Stephen Henson
d91d9acc58
Timing fix mitigation for FIPS mode.
...
We have to use EVP in FIPS mode so we can only partially mitigate
timing differences.
Make an extra call to EVP_DigestSignUpdate to hash additonal blocks
to cover any timing differences caused by removal of padding.
(cherry picked from commit b908e88ec1 )
2013-02-06 13:56:13 +00:00
Ben Laurie
820988a0c0
Oops. Add missing file.
...
(cherry picked from commit 014265eb02 )
2013-02-06 13:56:13 +00:00
Ben Laurie
1326a64a33
Update DTLS code to match CBC decoding in TLS.
...
This change updates the DTLS code to match the constant-time CBC
behaviour in the TLS.
(cherry picked from commit 9f27de170d )
2013-02-06 13:56:13 +00:00
Ben Laurie
e0da2c2ed2
Don't crash when processing a zero-length, TLS >= 1.1 record.
...
The previous CBC patch was bugged in that there was a path through enc()
in s3_pkt.c/d1_pkt.c which didn't set orig_len. orig_len would be left
at the previous value which could suggest that the packet was a
sufficient length when it wasn't.
(cherry picked from commit 6cb19b7681 )
2013-02-06 13:56:13 +00:00
Ben Laurie
fb0a59cc58
Make CBC decoding constant time.
...
This patch makes the decoding of SSLv3 and TLS CBC records constant
time. Without this, a timing side-channel can be used to build a padding
oracle and mount Vaudenay's attack.
This patch also disables the stitched AESNI+SHA mode pending a similar
fix to that code.
In order to be easy to backport, this change is implemented in ssl/,
rather than as a generic AEAD mode. In the future this should be changed
around so that HMAC isn't in ssl/, but crypto/ as FIPS expects.
(cherry picked from commit e130841bcc )
2013-02-06 13:56:12 +00:00
Ben Laurie
f5cd3561ba
Add and use a constant-time memcmp.
...
This change adds CRYPTO_memcmp, which compares two vectors of bytes in
an amount of time that's independent of their contents. It also changes
several MAC compares in the code to use this over the standard memcmp,
which may leak information about the size of a matching prefix.
(cherry picked from commit 2ee798880a )
2013-02-06 13:56:12 +00:00
Dr. Stephen Henson
115f7fa562
Merge branch 'OpenSSL_1_0_2-stable' of /home/steve/src/git/openssl into OpenSSL_1_0_2-stable
2013-02-04 15:14:11 +00:00
Dr. Stephen Henson
c867d87180
Fix for trace code: SSL3 doesn't include a length value for
...
encrypted premaster secret value.
(cherry picked from commit ea34a58385 )
2013-02-04 15:14:00 +00:00
Andy Polyakov
2a713eadc3
bn_word.c: fix overflow bug in BN_add_word.
...
(cherry picked from commit 134c00659a )
2013-02-02 22:37:35 +01:00
Andy Polyakov
2e7900b624
x86_64 assembly pack: keep making Windows build more robust.
...
PR: 2963 and a number of others
(cherry picked from commit 4568182a8b )
2013-02-02 19:56:43 +01:00
Dr. Stephen Henson
f8435919a1
Fix warning: lenmax isn't used any more.
2013-01-24 14:08:28 +00:00
Dr. Stephen Henson
1db4354b53
Don't include comp.h in cmd_cd.c if OPENSSL_NO_COMP set
2013-01-23 01:11:05 +00:00
Andy Polyakov
3f233a1e77
x86_64 assembly pack: make Windows build more robust [from master].
...
PR: 2963 and a number of others
2013-01-22 22:51:29 +01:00
Andy Polyakov
25917e972d
TABLE update.
2013-01-22 21:22:20 +01:00
Andy Polyakov
8812a81bdd
Configure: update linux-mips* lines [from master].
2013-01-22 21:21:44 +01:00
Andy Polyakov
b17ffba915
bn/asm/mips.pl: hardwire local call to bn_div_words.
2013-01-22 21:16:02 +01:00
Dr. Stephen Henson
3619e34f50
Don't include comp.h if no-comp set.
2013-01-20 01:10:03 +00:00
Ben Laurie
6924686b78
Merge branch 'OpenSSL_1_0_2-stable' of openssl.net:openssl into OpenSSL_1_0_2-stable
2013-01-19 18:36:44 +00:00
Ben Laurie
92745f8116
Remove extraneous brackets (clang doesn't like them).
2013-01-19 18:24:00 +00:00
Ben Laurie
17cf9864e0
Add MacOS 64-bit debug target.
2013-01-19 18:23:36 +00:00
Andy Polyakov
5cfefd3ce3
engines/ccgost: GOST fixes [from master].
...
Submitted by: Dmitry Belyavsky, Seguei Leontiev
PR: 2821
2013-01-19 18:24:03 +01:00
Ben Laurie
9ccc6f4382
Can't check a size_t for < 0.
2013-01-19 15:01:18 +00:00
Andy Polyakov
3c92471723
.gitignore adjustments
2013-01-19 13:31:29 +01:00
Dr. Stephen Henson
1a932ae094
-named_curve option handled automatically now.
2013-01-18 15:41:06 +00:00
Dr. Stephen Henson
57912ed329
Add code to download CRLs based on CRLDP extension.
...
Just a sample, real world applications would have to be cleverer.
2013-01-18 15:38:13 +00:00
Dr. Stephen Henson
e998f8aeb8
cipher is not used in s_server any more.
2013-01-18 15:05:28 +00:00
Dr. Stephen Henson
e318431e54
New option to add CRLs for s_client and s_server.
2013-01-18 14:37:14 +00:00
Dr. Stephen Henson
6a10f38daa
initial support for delta CRL generations by diffing two full CRLs
2013-01-17 18:51:50 +00:00
Dr. Stephen Henson
c095078890
Typo (PR2959).
2013-01-17 18:21:54 +00:00
Dr. Stephen Henson
c644b83227
constify
2013-01-17 16:35:50 +00:00
Dr. Stephen Henson
75f535315a
New functions to set lookup_crls callback and to retrieve internal X509_STORE
...
from X509_STORE_CTX.
2013-01-17 16:32:33 +00:00
Dr. Stephen Henson
7c283d9e97
add option to get a certificate or CRL from a URL
2013-01-17 16:08:02 +00:00
Dr. Stephen Henson
2aa3ef78b6
print out issuer and subject unique identifier fields in certificates
2013-01-16 15:08:34 +00:00
Dr. Stephen Henson
1c0964e87f
add wrapper function for certificate download
2013-01-15 18:01:54 +00:00
Dr. Stephen Henson
5c8d41be85
Generalise OCSP I/O functions to support dowloading of other ASN1
...
structures using HTTP. Add wrapper function to handle CRL download.
2013-01-15 18:01:31 +00:00
Dr. Stephen Henson
b286640360
Update default dependency flags.
2013-01-15 16:26:04 +00:00
Dr. Stephen Henson
75a8ff9263
make update
2013-01-15 16:24:07 +00:00
Dr. Stephen Henson
50b5966e57
Add support for broken protocol tests (backport from master branch)
2013-01-15 16:18:13 +00:00
Dr. Stephen Henson
8eb4456f93
Make whitespace consistent with master branch.
2013-01-15 15:55:54 +00:00
Ben Laurie
24c45faba0
Fix some clang warnings.
2013-01-13 21:06:36 +00:00
Ben Laurie
010ac38a98
Correct EVP_PKEY_verifyrecover to EVP_PKEY_verify_recover (RT 2955).
2013-01-12 12:51:58 +00:00
Dr. Stephen Henson
1c25ed5dbb
In FIPS mode use PKCS#8 format when writing private keys:
...
traditional format uses MD5 which is prohibited in FIPS mode.
2013-01-07 16:16:43 +00:00
Dr. Stephen Henson
bf1d32e52a
Change default bits to 1024
2013-01-07 16:13:48 +00:00
Dr. Stephen Henson
6c86b69729
Add .gitignore from master branch.
2013-01-06 21:34:51 +00:00
Ben Laurie
72dfff2d5e
Fix warning.
2013-01-06 21:03:05 +00:00
Dr. Stephen Henson
3341b820cc
add support for separate verify can chain stores to s_client (backport from HEAD)
2012-12-30 16:27:15 +00:00
Dr. Stephen Henson
ede5f6cf74
add -chain options to s_client (backrpot from HEAD)
2012-12-30 16:17:29 +00:00
Dr. Stephen Henson
321a9fea75
make no-comp compile
2012-12-30 16:05:03 +00:00
Dr. Stephen Henson
2e00f46b51
stop warning when compiling with no-comp
2012-12-30 01:12:19 +00:00
Dr. Stephen Henson
8c3f868983
remove unused cipher functionality from s_client
2012-12-30 00:03:40 +00:00
Dr. Stephen Henson
d03cc94f47
Update debug-steve* options.
2012-12-29 23:59:18 +00:00
Dr. Stephen Henson
5477ff9ba2
make JPAKE work again, fix memory leaks
2012-12-29 23:58:44 +00:00
Dr. Stephen Henson
46b11600b0
update ordinals
2012-12-29 14:18:14 +00:00
Dr. Stephen Henson
15387e4ce0
Delegate command line handling for many common options in s_client/s_server to
...
the SSL_CONF APIs.
This is complicated a little because the SSL_CTX structure is not available
when the command line is processed: so just check syntax of commands initially
and store them, ready to apply later.
(backport from HEAD)
2012-12-29 14:16:41 +00:00
Dr. Stephen Henson
49ef33fa34
add SSL_CONF functions and documentation (backport from HEAD)
2012-12-29 13:30:56 +00:00
Dr. Stephen Henson
1166323530
Update ordinals.
2012-12-26 23:53:52 +00:00
Dr. Stephen Henson
29113688a1
Portability fix: use BIO_snprintf and pick up strcasecmp alternative
...
definitions from e_os.h
2012-12-26 23:51:41 +00:00
Dr. Stephen Henson
44c970746f
typo
2012-12-26 22:43:43 +00:00
Dr. Stephen Henson
bc200e691c
SSL/TLS record tracing code (backport from HEAD).
2012-12-26 22:40:46 +00:00
Dr. Stephen Henson
a08f8d73cc
Reject zero length ec point format list.
...
Give more meaningful error is attempt made to use incorrect curve.
(from HEAD)
2012-12-26 18:26:11 +00:00
Dr. Stephen Henson
b52f12b3ba
handle point format list retrieval for clients too (from HEAD)
2012-12-26 18:20:07 +00:00
Dr. Stephen Henson
78b5d89ddf
Add support for printing out and retrieving EC point formats extension.
...
(backport from HEAD)
2012-12-26 18:13:49 +00:00
Dr. Stephen Henson
b79df62eff
return error if Suite B mode is selected and TLS 1.2 can't be used.
...
(backport from HEAD)
2012-12-26 17:39:02 +00:00
Dr. Stephen Henson
e3c76874ad
set auto ecdh parameter selction for Suite B
...
(backport from HEAD)
2012-12-26 17:35:02 +00:00
Dr. Stephen Henson
4347394a27
add Suite B 128 bit mode offering only combination 2
...
(backport from HEAD)
2012-12-26 17:34:50 +00:00
Dr. Stephen Henson
53bb723834
Use client version when deciding which cipher suites to disable.
...
(backport from HEAD)
2012-12-26 17:09:39 +00:00
Dr. Stephen Henson
684a2264c5
Use default point formats extension for server side as well as client
...
side, if possible.
Don't advertise compressed char2 for SuiteB as it is not supported.
(backport from HEAD)
2012-12-26 17:09:14 +00:00
Dr. Stephen Henson
fde8dc1798
add Suite B verification flags
2012-12-26 16:57:39 +00:00
Dr. Stephen Henson
3c87a2bdfa
contify
...
(backport from HEAD)
2012-12-26 16:49:59 +00:00
Dr. Stephen Henson
1520e6c084
Add ctrl and utility functions to retrieve raw cipher list sent by client in
...
client hello message. Previously this could only be retrieved on an initial
connection and it was impossible to determine the cipher IDs of any uknown
ciphersuites.
(backport from HEAD)
2012-12-26 16:25:06 +00:00
Dr. Stephen Henson
2001129f09
new ctrl to retrive value of received temporary key in server key exchange message, print out details in s_client
...
(backport from HEAD)
2012-12-26 16:23:36 +00:00
Dr. Stephen Henson
a50ecaee56
store and print out message digest peer signed with in TLS 1.2
...
(backport from HEAD)
2012-12-26 16:23:13 +00:00
Dr. Stephen Henson
67d9dcf003
perform sanity checks on server certificate type as soon as it is received instead of waiting until server key exchange
...
(backport from HEAD)
2012-12-26 16:22:19 +00:00
Dr. Stephen Henson
79dcae32ef
give more meaningful error if presented with wrong certificate type by server
...
(backport from HEAD)
2012-12-26 16:18:15 +00:00
Dr. Stephen Henson
ccf6a19e2d
Add three Suite B modes to TLS code, supporting RFC6460.
...
(backport from HEAD)
2012-12-26 16:17:40 +00:00
Dr. Stephen Henson
28fbbe3b1b
Add missing prototype to x509.h
2012-12-26 16:11:10 +00:00
Dr. Stephen Henson
8d2dbe6ac0
New function X509_chain_up_ref to dup and up the reference count of
...
a STACK_OF(X509): replace equivalent functionality in several places
by the equivalent call.
(backport from HEAD)
2012-12-26 16:04:03 +00:00
Dr. Stephen Henson
ba8bdea771
add suite B chain validation flags and associated verify errors
...
(backport from HEAD)
2012-12-26 16:01:31 +00:00
Dr. Stephen Henson
3d9916298a
Oops, add missing v3nametest.c
2012-12-26 15:59:57 +00:00
Dr. Stephen Henson
87054c4f0e
New -valid option to add a certificate to the ca index.txt that is valid and not revoked
...
(backport from HEAD)
2012-12-26 15:32:13 +00:00
Dr. Stephen Henson
6660baee66
Make tls1_check_chain return a set of flags indicating checks passed
...
by a certificate chain. Add additional tests to handle client
certificates: checks for matching certificate type and issuer name
comparison.
Print out results of checks for each candidate chain tested in
s_server/s_client.
(backport from HEAD)
2012-12-26 15:27:44 +00:00
Dr. Stephen Henson
25d4c9254c
Abort handshake if signature algorithm used not supported by peer.
...
(backport from HEAD)
2012-12-26 15:27:24 +00:00
Dr. Stephen Henson
44adfeb6c0
check EC tmp key matches preferences
...
(backport from HEAD)
2012-12-26 15:27:04 +00:00
Dr. Stephen Henson
5ff2ef79e6
typo
2012-12-26 15:23:16 +00:00
Dr. Stephen Henson
b762acadeb
Add support for certificate stores in CERT structure. This makes it
...
possible to have different stores per SSL structure or one store in
the parent SSL_CTX. Include distint stores for certificate chain
verification and chain building. New ctrl SSL_CTRL_BUILD_CERT_CHAIN
to build and store a certificate chain in CERT structure: returing
an error if the chain cannot be built: this will allow applications
to test if a chain is correctly configured.
Note: if the CERT based stores are not set then the parent SSL_CTX
store is used to retain compatibility with existing behaviour.
(backport from HEAD)
2012-12-26 15:21:53 +00:00
Dr. Stephen Henson
7d779eefb4
add ssl_locl.h to err header files, rebuild ssl error strings
...
(backport from HEAD)
2012-12-26 15:09:16 +00:00
Dr. Stephen Henson
35b7757f9b
set ciphers to NULL before calling cert_cb
...
(backport from HEAD)
2012-12-26 14:56:40 +00:00
Dr. Stephen Henson
23195e4dcc
stop warning
...
(backport from HEAD)
2012-12-26 14:56:27 +00:00
Dr. Stephen Henson
b28fbdfa7d
New function ssl_set_client_disabled to set masks for any ciphersuites
...
that are disabled for this session (as opposed to always disabled by
configuration).
(backport from HEAD)
2012-12-26 14:55:46 +00:00
Dr. Stephen Henson
a897502cd9
Add new ctrl to retrieve client certificate types, print out
...
details in s_client.
Also add ctrl to set client certificate types. If not used sensible values
will be included based on supported signature algorithms: for example if
we don't include any DSA signing algorithms the DSA certificate type is
omitted.
Fix restriction in old code where certificate types would be truncated
if it exceeded TLS_CT_NUMBER.
(backport from HEAD)
2012-12-26 14:51:37 +00:00
Dr. Stephen Henson
8546add692
cert_flags is unsigned
...
(backport from HEAD)
2012-12-26 14:48:05 +00:00
Dr. Stephen Henson
aa5c5eb4c1
add support for client certificate callbak, fix memory leak
...
(backport from HEAD)
2012-12-26 14:47:31 +00:00
Dr. Stephen Henson
731abd3bd7
new function SSL_is_server to which returns 1 is the corresponding SSL context is for a server
...
(backport from HEAD)
2012-12-26 14:45:46 +00:00
Dr. Stephen Henson
7531dd18dc
no need to check s->server as default_nid is never used for TLS 1.2 client authentication
...
(backport from HEAD)
2012-12-26 14:45:27 +00:00
Dr. Stephen Henson
04c32cddaa
Separate client and server permitted signature algorithm support: by default
...
the permitted signature algorithms for server and client authentication
are the same but it is now possible to set different algorithms for client
authentication only.
(backport from HEAD)
2012-12-26 14:44:56 +00:00
Dr. Stephen Henson
623a5e24cb
Add certificate callback. If set this is called whenever a certificate
...
is required by client or server. An application can decide which
certificate chain to present based on arbitrary criteria: for example
supported signature algorithms. Add very simple example to s_server.
This fixes many of the problems and restrictions of the existing client
certificate callback: for example you can now clear existing certificates
and specify the whole chain.
(backport from HEAD)
2012-12-26 14:43:51 +00:00
Dr. Stephen Henson
bd9fc1d667
New functions to retrieve certificate signatures and signature OID NID.
...
(backport from HEAD)
2012-12-26 14:31:05 +00:00
Dr. Stephen Henson
c550f2e37b
Function tls1_check_ec_server_key is now redundant as we make
...
appropriate checks in tls1_check_chain.
(backport from HEAD)
2012-12-26 14:27:27 +00:00
Dr. Stephen Henson
484f876235
Add new "valid_flags" field to CERT_PKEY structure which determines what
...
the certificate can be used for (if anything). Set valid_flags field
in new tls1_check_chain function. Simplify ssl_set_cert_masks which used
to have similar checks in it.
Add new "cert_flags" field to CERT structure and include a "strict mode".
This enforces some TLS certificate requirements (such as only permitting
certificate signature algorithms contained in the supported algorithms
extension) which some implementations ignore: this option should be used
with caution as it could cause interoperability issues.
(backport from HEAD)
2012-12-26 14:26:53 +00:00
Dr. Stephen Henson
c70a1fee71
Reorganise supported signature algorithm extension processing.
...
Only store encoded versions of peer and configured signature algorithms.
Determine shared signature algorithms and cache the result along with NID
equivalents of each algorithm.
(backport from HEAD)
2012-12-26 14:26:16 +00:00
Dr. Stephen Henson
0b362de5f5
Add support for application defined signature algorithms for use with
...
TLS v1.2. These are sent as an extension for clients and during a certificate
request for servers.
TODO: add support for shared signature algorithms, respect shared algorithms
when deciding which ciphersuites and certificates to permit.
(backport from HEAD)
2012-12-26 14:25:29 +00:00
Dr. Stephen Henson
d312f7be37
Make it possible to delete all certificates from an SSL structure.
...
(backport from HEAD)
2012-12-26 14:18:50 +00:00
Dr. Stephen Henson
2b5e5c3d08
Revert incompatible OCSP_basic_verify changes.
...
Make partial chain chekcing work with EE certificates only.
Remove unneeded -trust_other option from tocsp.
(Backport from HEAD)
2012-12-26 14:12:09 +00:00
Dr. Stephen Henson
708454f010
add missing \n
2012-12-23 18:12:28 +00:00
Dr. Stephen Henson
f1aec4dec3
fix typo
2012-12-21 18:33:53 +00:00
Dr. Stephen Henson
1c53a72f17
update/fix tocsp script (from HEAD)
2012-12-20 19:15:35 +00:00
Dr. Stephen Henson
9b157602e0
Backport enhancements to OCSP utility from HEAD:
...
Support - as a file for standard input or output.
Add -badsig option to generate invalid signatures for testing.
New -rmd option to specify digest to sign OCSP responses with.
2012-12-20 19:06:39 +00:00
Dr. Stephen Henson
67e217c84c
revert, missing commit message
2012-12-20 19:01:55 +00:00
Dr. Stephen Henson
e6b650df0a
oops, revert
2012-12-20 19:01:34 +00:00
Dr. Stephen Henson
7b7b667ddc
apps/ocsp.c
2012-12-20 18:59:09 +00:00
Dr. Stephen Henson
70cd3c6b95
Integrate host, email and IP address checks into X509_verify.
...
Add new verify options to set checks.
(backport from HEAD)
2012-12-19 15:14:10 +00:00
Dr. Stephen Henson
db05bc512d
Return success when the responder is active.
...
Don't verify our own responses.
(backport from HEAD)
2012-12-19 15:02:58 +00:00
Dr. Stephen Henson
45da1efcdb
Backport X509 hostname, IP address and email checking code from HEAD.
2012-12-19 15:01:59 +00:00
Dr. Stephen Henson
54a0076e94
Check chain is not NULL before assuming we have a validated chain. The
...
modification to the OCSP helper purpose breaks normal OCSP verification. It is
no longer needed now we can trust partial chains.
2012-12-19 15:01:32 +00:00
Andy Polyakov
f8cab37bc1
VC-32.pl: fix typo [from HEAD].
...
Submitted by: Pierre Delaage
2012-12-16 19:40:51 +00:00
Dr. Stephen Henson
2e65277695
Use new partial chain flag instead of modifying input parameters.
...
(backport from HEAD)
2012-12-14 14:31:16 +00:00
Dr. Stephen Henson
9a1f59cd31
New verify flag to return success if we have any certificate in the trusted
...
store instead of the default which is to return an error if we can't build
the complete chain. [backport from HEAD]
2012-12-14 14:30:46 +00:00
Ben Laurie
4e72220fd6
Documentation improvements by Chris Palmer (Google).
2012-12-14 13:29:17 +00:00
Ben Laurie
d65b8b2162
Backport OCSP fixes.
2012-12-14 12:53:53 +00:00
Ben Laurie
5dca1e338c
Document -pubkey option.
2012-12-13 16:16:48 +00:00
Ben Laurie
5f4cf08864
Make verify return errors.
2012-12-13 15:49:15 +00:00
Ben Laurie
2a2e537983
Ignore more.
2012-12-13 12:43:18 +00:00
Ben Laurie
d79fc8da02
Add my 64-bit debug target.
2012-12-12 13:45:32 +00:00
Dr. Stephen Henson
e04ccbc5cc
Fix two bugs which affect delta CRL handling:
...
Use -1 to check all extensions in CRLs.
Always set flag for freshest CRL.
2012-12-06 18:24:47 +00:00
Andy Polyakov
bc946bfb97
aes-s390x.pl: fix XTS bugs in z196-specific code path [from HEAD].
2012-12-05 17:45:09 +00:00
Dr. Stephen Henson
38680fa466
check mval for NULL too
2012-12-04 17:26:04 +00:00
Dr. Stephen Henson
a902b6bd98
fix leak
2012-12-03 16:33:15 +00:00
Andy Polyakov
c5e91a9ae9
aes-s390x.pl: harmonize software-only path [from HEAD].
2012-12-01 11:09:13 +00:00
Dr. Stephen Henson
b5f57f455a
PR: 2803
...
Submitted by: jean-etienne.schwartz@bull.net
In OCSP_basic_varify return an error if X509_STORE_CTX_init fails.
2012-11-29 19:15:27 +00:00
Andy Polyakov
ad00a52f2d
Intel compiler support update from HEAD.
2012-11-28 13:12:09 +00:00
Dr. Stephen Henson
e08c7f15b4
change inaccurate error message
2012-11-26 15:47:44 +00:00
Dr. Stephen Henson
7469af4484
reject zero length point format list or supported curves extensions
2012-11-22 14:15:36 +00:00
Dr. Stephen Henson
ec76d850af
PR: 2908
...
Submitted by: Dmitry Belyavsky <beldmit@gmail.com >
Fix DH double free if parameter generation fails.
2012-11-21 14:02:30 +00:00
Dr. Stephen Henson
cedf19f356
fix leaks
2012-11-20 00:28:22 +00:00
Dr. Stephen Henson
1d5f3f4640
correct docs
2012-11-19 20:06:57 +00:00
Andy Polyakov
a060fc3b8e
x86_64-gcc.c: resore early clobber constraint [from HEAD].
...
Submitted by: Florian Weimer
2012-11-19 15:02:34 +00:00
Dr. Stephen Henson
bda5153703
PR: 2880
...
Submitted by: "Florian Rüchel" <florian.ruechel@ruhr-uni-bochum.de >
Correctly handle local machine keys in the capi ENGINE.
2012-11-18 15:21:12 +00:00
Dr. Stephen Henson
6f539399ef
add "missing" TLSv1.2 cipher alias
2012-11-15 19:15:07 +00:00
Andy Polyakov
d90bf2ab21
[vp]aes-x86[_64].pl: update from HEAD.
2012-11-12 18:11:17 +00:00
Andy Polyakov
02620cfcd5
Cumulative updates from HEAD.
2012-10-29 22:29:29 +00:00
Dr. Stephen Henson
74daafaa94
use correct year automatically
2012-10-22 13:03:31 +00:00
Andy Polyakov
aa963813ed
linux-ppc: make it more robust [from HEAD].
2012-10-21 18:25:29 +00:00
Dr. Stephen Henson
9a6aff50ff
Don't require tag before ciphertext in AESGCM mode
2012-10-16 22:46:32 +00:00
Andy Polyakov
c7d16ac8da
aix[64]-cc: get MT support right [from HEAD].
...
PR: 2896
2012-10-16 08:09:20 +00:00
Bodo Möller
b626f0396c
Fix EC_KEY initialization race.
...
Submitted by: Adam Langley
2012-10-05 20:50:38 +00:00
Dr. Stephen Henson
9d2006d8ed
add -trusted_first option and verify flag (backport from HEAD)
2012-09-26 13:50:42 +00:00
Bodo Möller
abf1e32f2f
Fix Valgrind warning.
...
Submitted by: Adam Langley
2012-09-24 19:49:25 +00:00
Richard Levitte
fc1e09bf81
* Configure: make the debug-levitte-linux{elf,noasm} less extreme.
2012-09-24 18:49:07 +00:00
Richard Levitte
451cec33df
* ssl/t1_enc.c (tls1_change_cipher_state): Stupid bug. Fortunately in
...
debugging code that's seldom used.
2012-09-21 13:08:30 +00:00
Andy Polyakov
16c92916c7
Configure: allow for compiler options starting with double dash [from HEAD].
2012-09-19 21:00:35 +00:00
Andy Polyakov
988037fe18
MIPS assembly pack: jumbo update from HEAD.
2012-09-19 20:59:18 +00:00
Bodo Möller
9a7f80c869
Fix warning.
...
Submitted by: Chromium Authors
2012-09-17 17:23:43 +00:00
Andy Polyakov
507e5c3a61
e_aes.c: uninitialized variable in aes_ccm_init_key [from HEAD].
...
PR: 2874
Submitted by: Tomas Mraz
2012-09-15 08:46:08 +00:00
Dr. Stephen Henson
f8b90b5a5d
fix memory leak
2012-09-11 13:44:19 +00:00
Dr. Stephen Henson
dc14441757
Minor enhancement to PR#2836 fix. Instead of modifying SSL_get_certificate
...
change the current certificate (in s->cert->key) to the one used and then
SSL_get_certificate and SSL_get_privatekey will automatically work.
2012-09-11 13:35:14 +00:00
Ben Laurie
da8512aaff
Call OCSP Stapling callback after ciphersuite has been chosen, so the
...
right response is stapled. Also change SSL_get_certificate() so it
returns the certificate actually sent. See
http://rt.openssl.org/Ticket/Display.html?id=2836 .
2012-09-11 12:00:25 +00:00
Andy Polyakov
d46a1a6178
bn_lcl.h: gcc removed support for "h" constraint, which broke inline
...
assembler [from HEAD].
2012-09-01 13:21:24 +00:00
Dr. Stephen Henson
957c7c0e88
Don't load GOST ENGINE if it is already loaded.
...
Multiple copies of the ENGINE will cause problems when it is cleaned up as
the methods are stored in static structures which will be overwritten and
freed up more than once.
Set static methods to NULL when the ENGINE is freed so it can be reloaded.
2012-09-01 11:30:35 +00:00
Andy Polyakov
3ebe87473c
x86cpuid.pl: hide symbols [backport from x86_64, from HEAD].
2012-08-29 14:24:18 +00:00
Andy Polyakov
0e05b51fe5
Add linux-x32 target [from HEAD].
2012-08-29 14:12:10 +00:00
Dr. Stephen Henson
c759e453bc
PR: 2786
...
Reported by: Tomas Mraz <tmraz@redhat.com >
Treat a NULL value passed to drbg_free_entropy callback as non-op. This
can happen if the call to fips_get_entropy fails.
2012-08-22 22:43:03 +00:00
Andy Polyakov
40ce8fca73
sha1-armv4-large.pl: comply with ABI [from HEAD].
2012-08-17 19:58:34 +00:00
Andy Polyakov
8e1c33e160
MIPS assembly pack updates from HEAD.
2012-08-17 09:41:30 +00:00
Andy Polyakov
13b0cae256
aes-mips.pl: harmonize with fips module.
...
PR: 2863
Submitted by: Duane Sand
2012-08-17 09:03:57 +00:00
Bodo Möller
6d78a93b5b
Enable message names for TLS 1.1, 1.2 with -msg.
2012-08-16 13:42:37 +00:00
Andy Polyakov
ae92994645
bss_dgram.c: fix compilation failure and warning on Windows with
...
contemporary SDK [from HEAD].
2012-08-14 09:53:41 +00:00
Andy Polyakov
c4aa6b041b
gosthash.c: use memmove in circle_xor8, as input pointers can be equal
...
[from HEAD].
PR: 2858
2012-08-13 16:37:58 +00:00
Andy Polyakov
80158304f0
./Configure: libcrypto.a can grow to many GB on Solaris 10, because of ar bug
...
[from HEAD].
PR: 2838
2012-08-13 16:16:24 +00:00
Andy Polyakov
f0a069c1a2
gcm128.c: fix AAD-only case with AAD length not divisible by 16 [from HEAD].
...
PR: 2859
Submitted by: John Foley
2012-08-13 15:31:10 +00:00
Dr. Stephen Henson
5b4b9ce976
Don't ignore (!) reference count in X509_STORE_free.
2012-07-19 12:48:02 +00:00
Dr. Stephen Henson
7fbcc2f24a
type
2012-07-13 11:17:56 +00:00
Richard Levitte
e4be79a383
Add the missing dh_rfc5114 and evp_cnf.
2012-07-05 13:00:45 +00:00
Richard Levitte
658604473f
Added aliases for symbols longer than 31 chars.
2012-07-05 09:08:18 +00:00
Richard Levitte
86bea6455c
remove duplicate symbol in crypto/symhacks.h
...
Have the new names start in column 48, that makes it easy to see when
the 31 character limit is reached (on a 80 column display, do the math)
2012-07-05 08:53:43 +00:00
Dr. Stephen Henson
1e4a6e7b7f
add missing evp_cnf.c file
2012-07-04 13:14:44 +00:00
Andy Polyakov
fd6a72fa1c
crypto/bn/*.h: move PTR_SIZE_INT to private header [from HEAD].
2012-07-04 08:51:44 +00:00
Dr. Stephen Henson
ccffdb3fdc
revert unrelated test code
2012-07-03 20:21:35 +00:00
Dr. Stephen Henson
74d89b0d93
PR: 2840
...
Reported by: David McCullough <david_mccullough@mcafee.com >
Restore fips configuration module from 0.9.8.
2012-07-03 20:20:11 +00:00
Dr. Stephen Henson
f142a71c3d
Fix memory leak.
...
Always perform nexproto callback argument initialisation in s_server
otherwise we use uninitialised data if -nocert is specified.
2012-07-03 16:37:31 +00:00
Andy Polyakov
5b7af6de43
bn_nist.c: harmonize buf in BN_nist_mod_256 with other mod functions and
...
compensate for VC buf [from HEAD].
PR: 2837
2012-07-02 14:38:22 +00:00
Andy Polyakov
ae414a0e42
bss_dgram.c: fix typos in Windows code [from HEAD].
2012-07-01 09:12:03 +00:00
Dr. Stephen Henson
a240ea8ab8
don't use pseudo digests for default values of keys
2012-06-27 14:12:01 +00:00
Andy Polyakov
8b654459be
x86_64 assembly pack: make it possible to compile with Perl located
...
on path with spaces [from HEAD].
PR: 2835
2012-06-27 12:48:50 +00:00
Dr. Stephen Henson
93cf058334
oops, add -debug_decrypt option which was accidenatally left out
2012-06-19 13:39:17 +00:00
Andy Polyakov
3e8b4b5055
bss_dgram.c: add BIO_CTRL_DGRAM_SET_DONT_FRAG, fix bugs [from HEAD].
...
PR: 2830, 2833
2012-06-19 12:28:47 +00:00
Ben Laurie
3c56d65a41
Fix memory leak.
2012-06-11 09:23:38 +00:00
Dr. Stephen Henson
e51ec51af9
revert more "version skew" changes that break FIPS builds
2012-06-10 23:02:06 +00:00
Dr. Stephen Henson
ff1c55e983
Revert "version skew" patches that break FIPS compilation
2012-06-09 23:36:38 +00:00
Ben Laurie
835d104f46
Rearrange and test authz extension.
2012-06-07 13:20:20 +00:00
Ben Laurie
aeba1ef352
Fix memory leak.
2012-06-06 12:58:35 +00:00
Ben Laurie
49e9f751a4
Fix authz parsing.
2012-06-06 12:45:14 +00:00
Ben Laurie
ff46820da6
Version skew reduction.
2012-06-06 12:41:46 +00:00
Andy Polyakov
6fba65e20d
x86gas.pl: update from HEAD.
2012-06-04 22:14:25 +00:00
Ben Laurie
68d2cf51bc
Reduce version skew: trivia (I hope).
2012-06-03 22:03:37 +00:00
Ben Laurie
19eedffcaf
Don't insert in the middle.
2012-05-29 18:58:43 +00:00
Ben Laurie
4e14996e8a
Missing from previous commit.
2012-05-29 18:39:32 +00:00
Ben Laurie
8a02a46a5c
RFC 5878 support.
2012-05-29 17:27:48 +00:00
Ben Laurie
0de5a0feee
Work around macro issue with FreeBSD and gcc 4.6.
2012-05-18 12:40:28 +00:00
Andy Polyakov
4d321e0767
s2_clnt.c: compensate for compiler bug [from HEAD].
2012-05-16 18:22:15 +00:00
Andy Polyakov
67fda0c12e
ppccap.c: assume no features under 32-bit AIX kernel [from HEAD].
...
PR: 2810
2012-05-16 18:18:14 +00:00
Dr. Stephen Henson
1dded7f7e8
Experimental multi-implementation support for FIPS capable OpenSSL.
...
When in FIPS mode the approved implementations are used as normal,
when not in FIPS mode the internal unapproved versions are used instead.
This means that the FIPS capable OpenSSL isn't forced to use the
(often lower perfomance) FIPS implementations outside FIPS mode.
2012-05-13 18:40:12 +00:00
Dr. Stephen Henson
482f238069
PR: 2813
...
Reported by: Constantine Sapuntzakis <csapuntz@gmail.com >
Fix possible deadlock when decoding public keys.
2012-05-11 13:53:23 +00:00
Dr. Stephen Henson
5e145e54cc
PR: 2811
...
Reported by: Phil Pennock <openssl-dev@spodhuis.org >
Make renegotiation work for TLS 1.2, 1.1 by not using a lower record
version client hello workaround if renegotiating.
2012-05-11 13:33:34 +00:00
Dr. Stephen Henson
df73e68a43
PR: 2806
...
Submitted by: PK <runningdoglackey@yahoo.com >
Correct ciphersuite signature algorithm definitions.
2012-05-10 18:25:31 +00:00
Dr. Stephen Henson
e7c8483891
Sanity check record length before skipping explicit IV in TLS 1.2, 1.1 and
...
DTLS to fix DoS attack.
Thanks to Codenomicon for discovering this issue using Fuzz-o-Matic
fuzzing as a service testing platform.
(CVE-2012-2333)
2012-05-10 16:03:36 +00:00
Richard Levitte
712d523484
Don't forget to install srtp.h as well
2012-05-10 15:01:26 +00:00
Dr. Stephen Henson
24547c23ca
Reported by: Solar Designer of Openwall
...
Make sure tkeylen is initialised properly when encrypting CMS messages.
2012-05-10 13:44:24 +00:00
Richard Levitte
8baf604a39
Correct environment variable is OPENSSL_ALLOW_PROXY_CERTS.
2012-05-04 10:43:24 +00:00
Andy Polyakov
95416ce5b3
ppccpuid.pl: branch hints in OPENSSL_cleanse impact small block performance
...
of digest algorithms, mosty SHA, on Power7. Mystery of century, why SHA,
why slower algorithm are affected more... [from HEAD].
PR: 2794
Submitted by: Ashley Lai
2012-04-27 20:19:23 +00:00
Dr. Stephen Henson
a56f9a612b
Don't try to use unvalidated composite ciphers in FIPS mode
2012-04-26 18:51:26 +00:00
Andy Polyakov
0ae89cf32e
CHANGES: clarify.
2012-04-26 07:34:09 +00:00
Andy Polyakov
7e0c9630a3
CHANGES: fix typos and clarify.
2012-04-26 07:24:28 +00:00
Dr. Stephen Henson
a6df6702c6
Change value of SSL_OP_NO_TLSv1_1 to avoid clash with SSL_OP_ALL and
...
OpenSSL 1.0.0. Add CHANGES entry noting the consequences.
2012-04-25 23:06:31 +00:00
Andy Polyakov
f69abd5321
s23_clnt.c: ensure interoperability by maitaining client "version capability"
...
vector contiguous [from HEAD].
PR: 2802
2012-04-25 22:07:03 +00:00
Dr. Stephen Henson
fe9ce2b7d6
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr>
...
Reviewed by: steve
Improved localisation of TLS extension handling and code tidy.
2012-04-24 12:15:17 +00:00
Andy Polyakov
8e7ccf6ff7
objxref.pl: improve portability [from HEAD].
2012-04-22 21:19:41 +00:00
Dr. Stephen Henson
51b77c0337
correct error code
2012-04-22 13:31:19 +00:00
Dr. Stephen Henson
85d179d4eb
check correctness of errors before updating them so we don't get bogus errors added
2012-04-22 13:25:41 +00:00
Dr. Stephen Henson
890f5ada82
correct old FAQ answers, sync with HEAD
2012-04-22 13:21:15 +00:00
Dr. Stephen Henson
1cc8410e36
PR: 2239
...
Submitted by: Dominik Oepen <oepen@informatik.hu-berlin.de >
Add Brainpool curves from RFC5639.
Original patch by Annie Yousar <a.yousar@informatik.hu-berlin.de >
2012-04-22 13:11:48 +00:00
Andy Polyakov
6ca7af9ec0
e_rc4_hmac_md5.c: reapply commit#21726, which was erroneously omitted [from 1.0.1].
...
PR: 2797, 2792
2012-04-20 21:45:21 +00:00
Dr. Stephen Henson
bc2c8efc80
call OPENSSL_init when calling FIPS_mode too
2012-04-20 14:43:14 +00:00
Dr. Stephen Henson
00bb875240
make ciphers work again for FIPS builds
2012-04-20 00:08:32 +00:00
Andy Polyakov
c3cb563d87
e_rc4_hmac_md5.c: last commit was inappropriate for non-x86[_64] platforms
...
[from HEAD].
PR: 2792
2012-04-19 20:42:24 +00:00
Dr. Stephen Henson
d6ef8165bb
update date
2012-04-19 16:21:49 +00:00
Dr. Stephen Henson
564a503b1b
Check for potentially exploitable overflows in asn1_d2i_read_bio
...
BUF_mem_grow and BUF_mem_grow_clean. Refuse attempts to shrink buffer
in CRYPTO_realloc_clean.
Thanks to Tavis Ormandy, Google Security Team, for discovering this
issue and to Adam Langley <agl@chromium.org > for fixing it. (CVE-2012-2110)
2012-04-19 16:19:07 +00:00
Andy Polyakov
56eeb1b28c
Makefile.org: clear yet another environment variable [from HEAD].
...
PR: 2793
2012-04-19 06:40:21 +00:00
Dr. Stephen Henson
068fc255ac
only call FIPS_cipherinit in FIPS mode
2012-04-18 22:42:06 +00:00
Andy Polyakov
cc8f2fb917
e_rc4_hmac_md5.c: update from HEAD, fixes crash on legacy Intel CPUs.
...
PR: 2792
2012-04-18 17:51:26 +00:00
Dr. Stephen Henson
b583ebb7dd
recognise X9.42 DH certificates on servers
2012-04-18 17:03:45 +00:00
Dr. Stephen Henson
f897fe4146
correct error code
2012-04-18 15:17:39 +00:00
Bodo Möller
bb3add20f3
Disable SHA-2 ciphersuites in < TLS 1.2 connections.
...
(TLS 1.2 clients could end up negotiating these with an OpenSSL server
with TLS 1.2 disabled, which is problematic.)
Submitted by: Adam Langley
2012-04-17 15:21:29 +00:00
Dr. Stephen Henson
48e0f6667b
Additional workaround for PR#2771
...
If OPENSSL_MAX_TLS1_2_CIPHER_LENGTH is set then limit the size of client
ciphersuites to this value. A value of 50 should be sufficient.
Document workarounds in CHANGES.
2012-04-17 14:47:14 +00:00
Dr. Stephen Henson
32213fb25a
Partial workaround for PR#2771.
...
Some servers hang when presented with a client hello record length exceeding
255 bytes but will work with longer client hellos if the TLS record version
in client hello does not exceed TLS v1.0. Unfortunately this doesn't fix all
cases...
2012-04-17 13:20:37 +00:00
Andy Polyakov
f6a1939f0f
OPENSSL_NO_SOCK fixes [from HEAD].
...
PR: 2791
Submitted by: Ben Noordhuis
2012-04-16 17:43:02 +00:00
Andy Polyakov
94c666479d
Minor compatibility fixes [from HEAD].
...
PR: 2790
Submitted by: Alexei Khlebnikov
2012-04-16 17:35:48 +00:00
Andy Polyakov
09f17419a6
s3_srvr.c: fix typo [from HEAD].
...
PR: 2538
2012-04-15 17:23:54 +00:00
Andy Polyakov
eb8a65db16
e_aes_cbc_hmac_sha1.c: handle zero-length payload and engage empty frag
...
countermeasure [from HEAD].
PR: 2778
2012-04-15 14:23:26 +00:00
Andy Polyakov
e6255a7d1e
s390x asm pack: fix typos.
2012-04-12 06:46:49 +00:00
Dr. Stephen Henson
65a0f68484
Add options to set additional type specific certificate chains to
...
s_server.
2012-04-11 16:54:07 +00:00
Dr. Stephen Henson
e1a7db8fdd
use different variable for chain iteration
2012-04-11 16:01:20 +00:00
Dr. Stephen Henson
65331f225a
oops, macro not present in OpenSSL 1.0.2
2012-04-11 15:10:48 +00:00
Dr. Stephen Henson
64e8dc7981
fix reset fix
2012-04-11 15:05:33 +00:00
Dr. Stephen Henson
737fe7ea29
make reinitialisation work for CMAC
2012-04-11 12:26:27 +00:00
Dr. Stephen Henson
b344a826ad
update rather ancient EVP digest documentation
2012-04-10 22:28:13 +00:00
Andy Polyakov
bc0f56d6d7
aes-s390x.pl: fix crash in AES_set_decrypt_key in linux32-s390x build [from HEAD].
2012-04-09 15:12:30 +00:00
Dr. Stephen Henson
3a89e9f106
update year
2012-04-07 22:14:16 +00:00
Dr. Stephen Henson
79e75e04ea
recognise DECLARE_PEM_write_const, update ordinals
...
(backport from HEAD)
2012-04-07 20:48:12 +00:00
Dr. Stephen Henson
c3cb069108
transparently handle X9.42 DH parameters
...
(backport from HEAD)
2012-04-07 20:42:44 +00:00
Dr. Stephen Henson
cdb41713a4
Document RFC5114 "generation" options.
...
(backport from HEAD)
2012-04-07 20:42:17 +00:00
Dr. Stephen Henson
491734eb21
Initial experimental support for X9.42 DH parameter format to handle
...
RFC5114 parameters and X9.42 DH public and private keys.
(backport from HEAD)
2012-04-07 20:22:11 +00:00
Dr. Stephen Henson
4e891a191d
branches: 1.2.2;
...
Correct some parameter values.
(backport from HEAD)
2012-04-07 17:41:51 +00:00
Dr. Stephen Henson
b73a69a9c2
Update DH_check() to peform sensible checks when q parameter is present.
...
(backport from HEAD)
2012-04-07 17:40:08 +00:00
Dr. Stephen Henson
e811eff5a9
Add RFC5114 DH parameters to OpenSSL. Add test data to dhtest.
...
(backport from HEAD)
2012-04-07 12:19:50 +00:00
Dr. Stephen Henson
1d0c47fd55
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr>
...
Localize client hello extension parsing in t1_lib.c
(backport from HEAD)
2012-04-06 20:16:09 +00:00
Dr. Stephen Henson
e46c807e4f
Add support for automatic ECDH temporary key parameter selection. When
...
enabled instead of requiring an application to hard code a (possibly
inappropriate) parameter set and delve into EC internals we just
automatically use the preferred curve.
(backport from HEAD)
2012-04-06 20:15:50 +00:00
Dr. Stephen Henson
c132ca95c0
Tidy up EC parameter check code: instead of accessing internal structures
...
add utility functions to t1_lib.c to check if EC certificates and parameters
are consistent with peer.
(backport from HEAD)
2012-04-06 20:14:53 +00:00
Dr. Stephen Henson
6b870763ac
Initial revision of ECC extension handling.
...
Tidy some code up.
Don't allocate a structure to handle ECC extensions when it is used for
default values.
Make supported curves configurable.
Add ctrls to retrieve shared curves: not fully integrated with rest of
ECC code yet.
(backport from HEAD)
2012-04-06 20:12:35 +00:00
Dr. Stephen Henson
5505818199
New ctrls to retrieve supported signature algorithms and curves and
...
extensions to s_client and s_server to print out retrieved valued.
Extend CERT structure to cache supported signature algorithm data.
(backport from HEAD)
2012-04-06 19:29:49 +00:00
Dr. Stephen Henson
7493bcc659
initialise i if n == 0
...
(backport from HEAD)
2012-04-06 17:36:40 +00:00
Dr. Stephen Henson
a068a1d0e3
Add new APIs EC_curve_nist2nid and EC_curve_nid2nist which convert
...
between NIDs and the more common NIST names such as "P-256". Enhance
ecparam utility and ECC method to recognise the NIST names for curves.
(backport from HEAD)
2012-04-06 17:35:01 +00:00
Dr. Stephen Henson
37b16c84bb
Add support for distinct certificate chains per key type and per SSL
...
structure.
Before this the only way to add a custom chain was in the parent SSL_CTX
(which is shared by all key types and SSL structures) or rely on auto
chain building (which is performed on each handshake) from the trust store.
(backport from HEAD)
2012-04-06 17:22:48 +00:00
Dr. Stephen Henson
0ac89e8f54
Backport: code tidy (from HEAD)
2012-04-06 12:02:43 +00:00
Dr. Stephen Henson
7e65b21a24
Backport: Revise ssl code to use CERT_PKEY structure when outputting a certificate chain (from HEAD)
2012-04-06 12:00:24 +00:00
Dr. Stephen Henson
736d69750d
Backport: tidy/enhance certificate chain output code (from HEAD)
2012-04-06 11:58:17 +00:00
Dr. Stephen Henson
0cb9dbed4e
Backport: allow key agreement in SSL/TLS certificates (from HEAD)
2012-04-06 11:36:35 +00:00
Dr. Stephen Henson
6cfccfec33
Backport: initialise dh_clnt (from HEAD)
2012-04-06 11:35:45 +00:00
Dr. Stephen Henson
c523eb98d1
Backport DH client certificate support (from HEAD)
2012-04-06 11:34:42 +00:00
Dr. Stephen Henson
0ffa49970b
Backport support for fixed DH ciphersuites (from HEAD)
2012-04-06 11:33:12 +00:00
Andy Polyakov
8cd2ea552e
aes-armv4.pl: make it more foolproof [inspired by aes-s390x.pl in 1.0.1].
2012-04-05 08:32:08 +00:00
Andy Polyakov
3f0becbf75
aes-s390x.pl: fix endless loop in linux32-s390x build [from 1.0.1].
2012-04-05 08:17:47 +00:00
Andy Polyakov
1b0ae81f4a
ssl/ssl_ciph.c: interim solution for assertion in d1_pkt.c(444) [from HEAD].
...
PR: 2778
2012-04-04 20:50:58 +00:00
Andy Polyakov
54543b954c
CHANGES: harmonize with 1.0.0 and 1.0.1.
2012-03-31 18:56:07 +00:00
Dr. Stephen Henson
5e2187f7ee
PR: 2778(part)
...
Submitted by: John Fitzgibbon <john_fitzgibbon@yahoo.com >
Time is always encoded as 4 bytes, not sizeof(Time).
2012-03-31 18:02:53 +00:00
Andy Polyakov
7b087bf4a9
modes_lcl.h: make it work on i386 [from HEAD].
...
PR: 2780
2012-03-31 17:03:43 +00:00
Andy Polyakov
9df9c9d102
vpaes-x86[_64].pl: handle zero length in vpaes_cbc_encrypt [from HEAD].
...
PR: 2775
2012-03-31 16:55:34 +00:00
Andy Polyakov
7e8b5493a4
util/cygwin.sh update [from HEAD].
...
PR: 2761
Submitted by: Corinna Vinschen
2012-03-31 11:07:09 +00:00
Andy Polyakov
265863c6a4
bn/bn_gf2m.c: make new BN_GF2m_mod_inv work with BN_DEBUG_RAND [from HEAD].
2012-03-30 17:41:00 +00:00
Andy Polyakov
2fee1e0666
ans1/tasn_prn.c: avoid bool in variable names [from HEAD].
...
PR: 2776
2012-03-29 19:11:59 +00:00
Andy Polyakov
b4ff166cbc
perlasm/x86masm.pl: fix last fix [from HEAD].
2012-03-29 19:11:08 +00:00
Dr. Stephen Henson
861a0722c2
fix leak
2012-03-22 16:28:21 +00:00
Dr. Stephen Henson
b1cef8d984
Submitted by: Markus Friedl <mfriedl@gmail.com>
...
Fix memory leaks in 'goto err' cases.
2012-03-22 15:43:28 +00:00
Dr. Stephen Henson
b911523977
set version to 1.0.2-dev
2012-03-22 15:29:21 +00:00
cvs2svn
247c3f6049
This commit was manufactured by cvs2svn to create branch
...
'OpenSSL_1_0_2-stable'.
2012-03-21 21:32:58 +00:00
Dr. Stephen Henson
78c5d2a9bb
use client version when deciding whether to send supported signature algorithms extension
2012-03-21 21:32:57 +00:00
Dr. Stephen Henson
3bf4e14cc3
Always use SSLv23_{client,server}_method in s_client.c and s_server.c,
...
the old code came from SSLeay days before TLS was even supported.
2012-03-18 18:16:05 +00:00
Andy Polyakov
d68d160cb7
bsaes-x86_64.pl: optimize key conversion [from HEAD].
2012-03-16 21:45:51 +00:00
Dr. Stephen Henson
202cb42fbb
remove trailing slash
2012-03-14 22:20:40 +00:00
Richard Levitte
49f6cb968f
cipher should only be set to PSK if JPAKE is used.
2012-03-14 12:39:00 +00:00
Dr. Stephen Henson
07e120b7da
update STATUS
2012-03-14 12:14:06 +00:00
Dr. Stephen Henson
f3dcae15ac
prepare for 1.0.1 release
2012-03-14 12:04:40 +00:00
Dr. Stephen Henson
25ec498dc7
update NEWS
2012-03-13 22:49:27 +00:00
Andy Polyakov
9cc42cb091
ssl/t1_enc.c: pay attention to EVP_CIPH_FLAG_CUSTOM_CIPHER [from HEAD].
2012-03-13 19:21:15 +00:00
Andy Polyakov
bcf9cf89e7
x86_64-xlate.pl: remove old kludge.
...
PR: 2435,2440
2012-03-13 19:19:31 +00:00
Dr. Stephen Henson
f0729fc3e0
corrected fix to PR#2711 and also cover mime_param_cmp
2012-03-12 16:29:47 +00:00
Dr. Stephen Henson
8186c00ef3
Fix for CMS/PKCS7 MMA. If RSA decryption fails use a random key and
...
continue with symmetric decryption process to avoid leaking timing
information to an attacker.
Thanks to Ivan Nestlerode <inestlerode@us.ibm.com > for discovering
this issue. (CVE-2012-0884)
2012-03-12 16:27:50 +00:00
Dr. Stephen Henson
c0b31ccb87
PR: 2744
...
Submitted by: Dmitry Belyavsky <beldmit@gmail.com >
CMS support for ccgost engine
2012-03-11 13:40:05 +00:00
Dr. Stephen Henson
267c950c5f
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr>
...
Add more extension names in s_cb.c extension printing code.
2012-03-09 18:37:41 +00:00
Dr. Stephen Henson
ce1605b508
PR: 2756
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix DTLS timeout handling.
2012-03-09 15:52:20 +00:00
Dr. Stephen Henson
66fdb1c0d4
check return value of BIO_write in PKCS7_decrypt
2012-03-08 14:02:51 +00:00
Dr. Stephen Henson
25bfdca16a
PR: 2755
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reduce MTU after failed transmissions.
2012-03-06 13:47:27 +00:00
Dr. Stephen Henson
9c284f9651
PR: 2748
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix possible DTLS timer deadlock.
2012-03-06 13:24:16 +00:00
Andy Polyakov
6d78c381f6
Configure: make no-whirlpool work [from HEAD].
2012-03-03 13:18:06 +00:00
Richard Levitte
784e2080df
On OpenVMS, try sha256 and sha512 et al as well.
2012-03-01 21:29:58 +00:00
Richard Levitte
70505bc334
For OpenVMS, use inttypes.h instead of stdint.h
2012-03-01 21:29:16 +00:00
Dr. Stephen Henson
8e8b247341
PR: 2743
...
Reported by: Dmitry Belyavsky <beldmit@gmail.com >
Fix memory leak if invalid GOST MAC key given.
2012-02-29 14:12:52 +00:00
Dr. Stephen Henson
a8595879ec
PR: 2742
...
Reported by: Dmitry Belyavsky <beldmit@gmail.com >
If resigning with detached content in CMS just copy data across.
2012-02-29 14:01:53 +00:00
Dr. Stephen Henson
33a688e806
Fix memory leak cause by race condition when creating public keys.
...
Thanks to Ivan Nestlerode <inestlerode@us.ibm.com > for reporting this bug.
2012-02-28 14:47:16 +00:00
Andy Polyakov
5c2bfad9b4
x86cpuid.pl: fix processor capability detection on pre-586 [from HEAD].
2012-02-28 14:20:34 +00:00
Dr. Stephen Henson
250f979237
PR: 2736
...
Reported by: Remi Gacogne <rgacogne-bugs@coredump.fr >
Preserve unused bits value in non-canonicalised ASN1_STRING structures
by using ASN1_STRING_copy which preseves flags.
2012-02-27 18:45:18 +00:00
Dr. Stephen Henson
b527b6e8ff
PR: 2737
...
Submitted by: Remi Gacogne <rgacogne-bugs@coredump.fr >
Fix double free in PKCS12_parse if we run out of memory.
2012-02-27 16:46:45 +00:00
Dr. Stephen Henson
a54ce007e6
PR: 2739
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix padding bugs in Heartbeat support.
2012-02-27 16:38:10 +00:00
Dr. Stephen Henson
4ed1f3490e
PR: 2735
...
Make cryptodev digests work. Thanks to Nikos Mavrogiannopoulos for
this fix.
2012-02-27 16:33:25 +00:00
Dr. Stephen Henson
0a082e9b37
free headers after use in error message
2012-02-27 16:27:09 +00:00
Dr. Stephen Henson
236a99a409
Detect symmetric crypto errors in PKCS7_decrypt.
...
Thanks to Ivan Nestlerode <inestlerode@us.ibm.com > for reporting this bug.
2012-02-27 15:22:54 +00:00
Andy Polyakov
04b4363ec8
Configure: remove adding of -D_XPG4_2 -D__EXTENSIONS__ in sctp builds,
...
see corresponding commit to HEAD for details.
2012-02-26 22:03:41 +00:00
Andy Polyakov
37ebc20093
seed.c: Solaris portability fix from HEAD.
2012-02-26 21:53:28 +00:00
Dr. Stephen Henson
cef781cc87
PR: 2730
...
Submitted by: Arpadffy Zoltan <Zoltan.Arpadffy@scientificgames.se >
VMS fixes: disable SCTP by default.
2012-02-25 17:58:03 +00:00
Dr. Stephen Henson
08e4c7a967
correct CHANGES
2012-02-23 22:13:59 +00:00
Dr. Stephen Henson
697e4edcad
PR: 2711
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Tolerate bad MIME headers in parser.
2012-02-23 21:50:32 +00:00
Dr. Stephen Henson
b26297ca51
PR: 2696
...
Submitted by: Rob Austein <sra@hactrn.net >
Fix inverted range problem in RFC3779 code.
Thanks to Andrew Chi for generating test cases for this bug.
2012-02-23 21:31:22 +00:00
Dr. Stephen Henson
6ca7dba0cf
PR: 2727
...
Submitted by: Bruce Stephens <bruce.stephens@isode.com >
Use same construct for EXHEADER in srp/Makefile as other makefiles to cope
with possibly empty EXHEADER.
2012-02-23 13:49:22 +00:00
Dr. Stephen Henson
f1fa05b407
ABI compliance fixes.
...
Move new structure fields to end of structures.
Import library codes from 1.0.0 and recreate new ones.
2012-02-22 14:01:44 +00:00
Dr. Stephen Henson
02e22c35fe
update NEWS
2012-02-21 14:21:32 +00:00
Dr. Stephen Henson
b935714237
typo
2012-02-17 17:31:32 +00:00
Dr. Stephen Henson
a8314df902
Fix bug in CVE-2011-4619: check we have really received a client hello
...
before rejecting multiple SGC restarts.
2012-02-16 15:25:39 +00:00
Dr. Stephen Henson
0cd7a0325f
Additional compatibility fix for MDC2 signature format.
...
Update RSA EVP_PKEY_METHOD to use the OCTET STRING form of MDC2 signature:
this will make all versions of MDC2 signature equivalent.
2012-02-15 14:14:01 +00:00
Dr. Stephen Henson
16b7c81d55
An incompatibility has always existed between the format used for RSA
...
signatures and MDC2 using EVP or RSA_sign. This has become more apparent
when the dgst utility in OpenSSL 1.0.0 and later switched to using the
EVP_DigestSign functions which call RSA_sign.
This means that the signature format OpenSSL 1.0.0 and later used with
dgst -sign and MDC2 is incompatible with previous versions.
Add detection in RSA_verify so either format works.
Note: MDC2 is disabled by default in OpenSSL and very rarely used in practice.
2012-02-15 14:00:09 +00:00
Dr. Stephen Henson
424ba8b588
PR: 2708
...
Submitted by: Bruce Stephens <bruce.stephens@isode.com >
Translate path separators correctly for $fipsdir in util/mk1mf.pl
2012-02-12 23:20:21 +00:00
Dr. Stephen Henson
bf493e8d62
PR: 2713
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Move libraries that are not needed for dynamic linking to Libs.private in
the .pc files
2012-02-12 18:47:36 +00:00
Dr. Stephen Henson
c714e43c8d
PR: 2717
...
Submitted by: Tim Rice <tim@multitalents.net >
Make compilation work on OpenServer 5.0.7
2012-02-11 23:38:49 +00:00
Dr. Stephen Henson
cdf9d6f6ed
PR: 2716
...
Submitted by: Adam Langley <agl@google.com >
Fix handling of exporter return value and use OpenSSL indentation in
s_client, s_server.
2012-02-11 23:21:09 +00:00
Dr. Stephen Henson
cc4b48c27c
PR: 2703
...
Submitted by: Alexey Melnikov <alexey.melnikov@isode.com >
Fix some memory and resource leaks in CAPI ENGINE.
2012-02-11 23:12:59 +00:00
Dr. Stephen Henson
cac9c92cc0
PR: 2705
...
Submitted by: Alexey Melnikov <alexey.melnikov@isode.com >
Only create ex_data indices once for CAPI engine.
2012-02-11 23:07:58 +00:00
Dr. Stephen Henson
d40abf1689
Submitted by: Eric Rescorla <ekr@rtfm.com>
...
Further fixes for use_srtp extension.
2012-02-11 22:53:48 +00:00
Andy Polyakov
69e9c69e70
apps/s_cb.c: recognize latest TLS versions [from HEAD].
2012-02-11 13:31:16 +00:00
Dr. Stephen Henson
c489ea7d01
PR: 2704
...
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr >
Fix srp extension.
2012-02-10 20:08:49 +00:00
Dr. Stephen Henson
26c6857a59
PR: 2710
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Check return codes for load_certs_crls.
2012-02-10 19:54:46 +00:00
Dr. Stephen Henson
508bd3d1aa
PR: 2714
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Make no-srp work.
2012-02-10 19:44:00 +00:00
Dr. Stephen Henson
8705846710
only cleanup ctx if we need to, save ctx flags when we do
2012-02-10 16:54:56 +00:00
Dr. Stephen Henson
c944a9696e
add fips hmac option and fips blocking overrides to command line utilities
2012-02-10 16:46:19 +00:00
Dr. Stephen Henson
943cc09d8a
Submitted by: Eric Rescorla <ekr@rtfm.com>
...
Fix encoding of use_srtp extension to be compliant with RFC5764
2012-02-10 00:03:37 +00:00
Dr. Stephen Henson
fc6800d19f
Modify client hello version when renegotiating to enhance interop with
...
some servers.
2012-02-09 15:41:44 +00:00
Andy Polyakov
d06f047b04
bn_nist.c: make new optimized code dependent on BN_LLONG [from HEAD].
2012-02-02 07:46:19 +00:00
Andy Polyakov
ddc899bada
hpux-parisc2-*: engage assembler [from HEAD] and make it link.
2012-02-02 07:42:31 +00:00
Andy Polyakov
bd479e25c7
ghash-x86.pl: engage original MMX version in no-sse2 builds [from HEAD].
2012-01-25 17:56:25 +00:00
Andy Polyakov
eaf5bd168e
x86_64-xlate.pl: 1.0.1-specific typo.
2012-01-25 17:50:23 +00:00
Dr. Stephen Henson
d7ecc206ba
only include bn.h once
2012-01-24 23:00:36 +00:00
Dr. Stephen Henson
11ea212e8c
only include evp.h once
2012-01-24 22:59:46 +00:00
Dr. Stephen Henson
cb29d8c11f
only include string.h once
2012-01-24 22:58:46 +00:00
Dr. Stephen Henson
adcea5a043
return error if md is NULL
2012-01-22 13:12:50 +00:00
Andy Polyakov
f02f7c2c4a
cryptlib.c: make even non-Windows builds "strtoull-agnostic" [from HEAD].
2012-01-21 12:18:29 +00:00
Andy Polyakov
a1e44cc14f
x86_64-xlate.pl: proper solution for RT#2620 [from HEAD].
2012-01-21 11:35:20 +00:00
Dr. Stephen Henson
d2d09bf68c
change version to beta3-dev
2012-01-19 17:14:17 +00:00
Dr. Stephen Henson
e2dfb655f7
update files for beta2 release
2012-01-19 15:46:43 +00:00
Dr. Stephen Henson
463e76b63c
prepare for beta2
2012-01-19 15:37:57 +00:00
Dr. Stephen Henson
2dc4b0dbe8
Fix for DTLS DoS issue introduced by fix for CVE-2011-4109.
...
Thanks to Antonio Martin, Enterprise Secure Access Research and
Development, Cisco Systems, Inc. for discovering this bug and
preparing a fix. (CVE-2012-0050)
2012-01-18 18:14:56 +00:00
Dr. Stephen Henson
7b23c126e6
undef some symbols that cause problems with make depend for fips builds
2012-01-18 01:40:36 +00:00
Dr. Stephen Henson
25e3d2225a
fix CHANGES entry
2012-01-17 14:19:09 +00:00
Andy Polyakov
c8e0b5d7b6
1.0.1-specific OPNESSL vs. OPENSSL typo.
...
PR: 2613
Submitted by: Leena Heino
2012-01-15 13:42:50 +00:00
Andy Polyakov
4fb7e2b445
Fix OPNESSL vs. OPENSSL typos [from HEAD].
...
PR: 2613
Submitted by: Leena Heino
2012-01-15 13:40:21 +00:00
Dr. Stephen Henson
9138e3c061
fix warning
2012-01-15 13:30:52 +00:00
Andy Polyakov
9b2a29660b
Sanitize usage of <ctype.h> functions. It's important that characters
...
are passed zero-extended, not sign-extended [from HEAD].
PR: 2682
2012-01-12 16:28:03 +00:00
Andy Polyakov
b7b4a9fa57
sparcv9cap.c: omit unused variable.
2012-01-12 14:19:52 +00:00
Andy Polyakov
1fb07a7de8
doc/apps: formatting fixes [from HEAD].
...
PR: 2683
Submitted by: Annie Yousar
2012-01-11 21:58:42 +00:00
Andy Polyakov
b9cbcaad58
speed.c: typo in pkey_print_message [from HEAD].
...
PR: 2681
Submitted by: Annie Yousar
2012-01-11 21:49:16 +00:00
Andy Polyakov
c6706a6f6c
ecdsa.pod: typo.
...
PR: 2678
Submitted by: Annie Yousar
2012-01-11 21:41:50 +00:00
Andy Polyakov
958e6a75a1
asn1/t_x509.c: fix serial number print, harmonize with a_int.c [from HEAD].
...
PR: 2675
Submitted by: Annie Yousar
2012-01-11 21:12:47 +00:00
Andy Polyakov
397977726c
aes-sparcv9.pl: clean up regexp [from HEAD].
...
PR: 2685
2012-01-11 15:32:08 +00:00
Dr. Stephen Henson
285d9189c7
PR: 2652
...
Submitted by: Arpadffy Zoltan <Zoltan.Arpadffy@scientificgames.se >
OpenVMS fixes.
2012-01-05 14:30:08 +00:00
Bodo Möller
767d3e0054
Update for 0.9.8s and 1.0.0f.
...
(While the 1.0.0f CHANGES entry on VOS PRNG seeding was missing
in the 1.0.1 branch, the actual code is here already.)
2012-01-05 13:46:27 +00:00
Bodo Möller
409d2a1b71
Fix for builds without DTLS support.
...
Submitted by: Brian Carlstrom
2012-01-05 10:22:39 +00:00
Dr. Stephen Henson
e0b9678d7f
PR: 2671
...
Submitted by: steve
Update maximum message size for certifiate verify messages to support
4096 bit RSA keys again as TLS v1.2 messages is two bytes longer.
2012-01-05 00:28:29 +00:00
Dr. Stephen Henson
166dea6ac8
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de>
...
Reviewed by: steve
Send fatal alert if heartbeat extension has an illegal value.
2012-01-05 00:23:31 +00:00
Dr. Stephen Henson
52bef4d677
disable heartbeats if tlsext disabled
2012-01-05 00:07:34 +00:00
Dr. Stephen Henson
801e5ef840
update CHANGES
2012-01-04 23:53:52 +00:00
Dr. Stephen Henson
0044739ae5
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de>, Michael Tuexen <tuexen@fh-muenster.de>
...
Reviewed by: steve
Fix for DTLS plaintext recovery attack discovered by Nadhem Alfardan and
Kenny Paterson.
2012-01-04 23:52:05 +00:00
Dr. Stephen Henson
4e44bd3650
Clear bytes used for block padding of SSL 3.0 records. (CVE-2011-4576)
2012-01-04 23:13:29 +00:00
Dr. Stephen Henson
0cffb0cd3e
fix CHANGES
2012-01-04 23:11:43 +00:00
Dr. Stephen Henson
aaa3850ccd
Only allow one SGC handshake restart for SSL/TLS. (CVE-2011-4619)
2012-01-04 23:07:54 +00:00
Dr. Stephen Henson
a17b5d5a4f
Check GOST parameters are not NULL (CVE-2012-0027)
2012-01-04 23:03:20 +00:00
Dr. Stephen Henson
2f97765bc3
Prevent malformed RFC3779 data triggering an assertion failure (CVE-2011-4577)
2012-01-04 23:01:19 +00:00
Dr. Stephen Henson
3205ca8deb
fix warnings
2012-01-04 14:46:04 +00:00
Dr. Stephen Henson
1cb4d65b87
Submitted by: Adam Langley <agl@chromium.org>
...
Reviewed by: steve
Fix memory leaks.
2012-01-04 14:25:28 +00:00
Dr. Stephen Henson
7b2dd292bc
only send heartbeat extension from server if client sent one
2012-01-03 22:03:07 +00:00
Dr. Stephen Henson
ab585551c0
prepare for 1.0.1-beta1
2012-01-03 13:30:28 +00:00
Dr. Stephen Henson
6cf0d7b999
OpenSSL 1.0.1 is now in beta.
2012-01-02 18:28:28 +00:00
Dr. Stephen Henson
9d972207f0
incomplete provisional OAEP CMS decrypt support
2012-01-02 18:16:40 +00:00
Dr. Stephen Henson
d9834ff24b
make update
2012-01-02 16:41:11 +00:00
Dr. Stephen Henson
d9c3ba05e7
update NEWS
2012-01-02 16:31:46 +00:00
Dr. Stephen Henson
03467ce6bd
recognise HEARTBEATS in mkdef.pl script
2011-12-31 23:49:45 +00:00
Dr. Stephen Henson
6e750fcb1e
update CHANGES
2011-12-31 23:07:28 +00:00
Dr. Stephen Henson
bd6941cfaa
PR: 2658
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Support for TLS/DTLS heartbeats.
2011-12-31 23:00:36 +00:00
Dr. Stephen Henson
578519edd0
make error code checking strict
2011-12-27 15:17:50 +00:00
Dr. Stephen Henson
5c05f69450
make update
2011-12-27 14:38:27 +00:00
Dr. Stephen Henson
f529dca488
fix error code
2011-12-27 14:37:43 +00:00
Dr. Stephen Henson
296aca9dcf
fix deprecated statement
2011-12-27 14:36:57 +00:00
Dr. Stephen Henson
b170703128
update default depflags
2011-12-27 14:28:25 +00:00
Dr. Stephen Henson
b300fb7734
PR: 1794
...
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr >
Reviewed by: steve
- remove some unncessary SSL_err and permit
an srp user callback to allow a worker to obtain
a user verifier.
- cleanup and comments in s_server and demonstration
for asynchronous srp user lookup
2011-12-27 14:23:22 +00:00
Dr. Stephen Henson
f89af47438
PR: 2326
...
Submitted by: Tianjie Mao <tjmao@tjmao.net >
Reviewed by: steve
Fix incorrect comma expressions and goto f_err as alert has been set.
2011-12-26 19:38:09 +00:00
Dr. Stephen Henson
7bb4f8ff12
recognise no-sctp
2011-12-25 14:59:40 +00:00
Dr. Stephen Henson
7dd6407a4c
update ordinals
2011-12-25 14:48:44 +00:00
Dr. Stephen Henson
53de315b78
recognise SCTP in mkdef.pl script
2011-12-25 14:47:46 +00:00
Dr. Stephen Henson
e065e6cda2
PR: 2535
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Add SCTP support for DTLS (RFC 6083).
2011-12-25 14:45:40 +00:00
Dr. Stephen Henson
60553cc209
typo
2011-12-23 15:03:16 +00:00
Dr. Stephen Henson
2d4c9ab518
delete unimplemented function from header file, update ordinals
2011-12-23 14:10:35 +00:00
Dr. Stephen Henson
50771f7ce3
update ordinals
2011-12-22 16:10:04 +00:00
Dr. Stephen Henson
242f8d644c
remove prototype for deleted SRP function
2011-12-22 16:01:23 +00:00
Dr. Stephen Henson
f5575cd167
New ctrl values to clear or retrieve extra chain certs from an SSL_CTX.
...
New function to retrieve compression method from SSL_SESSION structure.
Delete SSL_SESSION_get_id_len and SSL_SESSION_get0_id functions
as they duplicate functionality of SSL_SESSION_get_id. Note: these functions
have never appeared in any release version of OpenSSL.
2011-12-22 15:01:16 +00:00
Ben Laurie
dd0ddc3e78
Fix DTLS.
2011-12-20 15:05:03 +00:00
Dr. Stephen Henson
62308f3f4a
PR: 2563
...
Submitted by: Paul Green <Paul.Green@stratus.com >
Reviewed by: steve
Improved PRNG seeding for VOS.
2011-12-19 17:02:35 +00:00
Andy Polyakov
cecafcce94
update CHANGES.
2011-12-19 14:49:05 +00:00
Dr. Stephen Henson
ca0efb7594
update CHANGES
2011-12-19 14:40:02 +00:00
Andy Polyakov
1d05ff2779
apps/speed.c: fix typo in last commit.
2011-12-19 14:33:37 +00:00
Andy Polyakov
941811ccb9
apps/speed.c: Cygwin alarm() fails sometimes.
...
PR: 2655
2011-12-15 22:30:11 +00:00
Andy Polyakov
700384be8e
vpaes-x86.pl: revert previous commit and solve the problem through x86masm.pl [from HEAD].
...
PR: 2657
2011-12-15 22:20:26 +00:00
Dr. Stephen Henson
b8a22c40e0
PR: 1794
...
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr >
Reviewed by: steve
Remove unnecessary code for srp and to add some comments to
s_client.
- the callback to provide a user during client connect is
no longer necessary since rfc 5054 a connection attempt
with an srp cipher and no user is terminated when the
cipher is acceptable
- comments to indicate in s_client the (non-)usefulness of
th primalaty tests for non known group parameters.
2011-12-14 22:18:03 +00:00
Andy Polyakov
3918de9ad1
vpaes-x86.pl: portability fix.
...
PR: 2657
2011-12-14 21:30:25 +00:00
Ben Laurie
96fe35e7d4
Remove redundant TLS exporter.
2011-12-13 14:35:12 +00:00
Ben Laurie
e87afb1518
SSL export fixes (from Adam Langley).
2011-12-13 14:25:11 +00:00
Andy Polyakov
7b467c6b81
modexp512-x86_64.pl: Solaris portability fix [from HEAD].
...
PR: 2656
2011-12-12 15:12:09 +00:00
Dr. Stephen Henson
eb8ebafe87
detect and use older PKITS data
2011-12-11 16:39:56 +00:00
Dr. Stephen Henson
e559febaf1
typo
2011-12-10 01:37:55 +00:00
Dr. Stephen Henson
6bcc6d38c7
add commented out option to allow use of older PKITS data
2011-12-10 00:50:16 +00:00
Dr. Stephen Henson
8173960305
remove old -attime code, new version includes all old functionality
2011-12-10 00:42:48 +00:00
Dr. Stephen Henson
f2e590942e
implement -attime option as a verify parameter then it works with all relevant applications
2011-12-10 00:37:42 +00:00
Ben Laurie
6a4b87eb9d
Fix warning.
2011-12-09 20:15:48 +00:00
Andy Polyakov
edcba19c23
perlasm/x86gas.pl: give a hand old assemblers assembling loop instruction
...
[from HEAD].
2011-12-09 19:16:35 +00:00
Andy Polyakov
b140ae9137
cryptlib.c: allow for OPENSSL_ia32cap=~0x????? syntax for environment value
...
in question.
2011-12-09 15:46:41 +00:00
Andy Polyakov
8ee0591f28
x86-mont.pl: fix bug in integer-only squaring path.
...
PR: 2648
2011-12-09 14:26:28 +00:00
Dr. Stephen Henson
97d0c596a1
Replace expired test server and client certificates with new ones.
2011-12-08 14:45:15 +00:00
Dr. Stephen Henson
7454cba4fa
fix error discrepancy
2011-12-07 12:28:50 +00:00
Dr. Stephen Henson
5713411893
The default CN prompt message can be confusing when often the CN needs to
...
be the server FQDN: change it.
[Reported by PSW Group]
2011-12-06 00:00:51 +00:00
Ben Laurie
a0cf79e841
Fix exporter.
2011-12-02 16:49:32 +00:00
Ben Laurie
825e1a7c56
Fix warnings.
2011-12-02 14:39:41 +00:00
Bodo Möller
9f2b453338
Resolve a stack set-up race condition (if the list of compression
...
methods isn't presorted, it will be sorted on first read).
Submitted by: Adam Langley
2011-12-02 12:51:41 +00:00
Bodo Möller
a0dce9be76
Fix ecdsatest.c.
...
Submitted by: Emilia Kasper
2011-12-02 12:40:42 +00:00
Bodo Möller
cf2b938529
Fix BIO_f_buffer().
...
Submitted by: Adam Langley
Reviewed by: Bodo Moeller
2011-12-02 12:24:48 +00:00
Andy Polyakov
62f685a9cd
bn/asm/mips.pl: fix typos [from HEAD].
2011-12-01 12:17:20 +00:00
Dr. Stephen Henson
2c7d978c2d
PR: 1794
...
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr >
Reviewed by: steve
Make SRP conformant to rfc 5054.
Changes are:
- removal of the addition state after client hello
- removal of all pre-rfc srp alert ids
- sending a fatal alert when there is no srp extension but when the
server wants SRP
- removal of unnecessary code in the client.
2011-11-25 00:18:10 +00:00
Ben Laurie
8cd897a42c
Don't send NPN during renegotiation.
2011-11-24 18:22:06 +00:00
Ben Laurie
1dc44d3130
Indent.
2011-11-24 16:51:15 +00:00
Dr. Stephen Henson
2a6e3ef37e
update ordinals
2011-11-22 14:45:27 +00:00
Dr. Stephen Henson
115d528c23
add cryptlib.h to mkdef.pl
2011-11-22 14:44:42 +00:00
Dr. Stephen Henson
a310428527
Workaround so "make depend" works for fips builds.
2011-11-22 12:50:59 +00:00
Dr. Stephen Henson
7e0fd45ce3
update ordinals
2011-11-21 22:56:33 +00:00
Dr. Stephen Henson
b138ea54ee
add strp.h to mkdef.pl headers
2011-11-21 22:55:12 +00:00
Dr. Stephen Henson
d7125d8d85
move internal functions to ssl_locl.h
2011-11-21 22:52:01 +00:00
Dr. Stephen Henson
9c115a4acc
recognise NEXTPROTONEG
2011-11-21 22:35:35 +00:00
Dr. Stephen Henson
43716567f5
bcmp doesn't exist on all platforms, replace with memcmp
2011-11-21 22:29:16 +00:00
Andy Polyakov
0a8f00af34
bsaes-x86_64.pl: fix buffer overrun in tail processing [from HEAD].
2011-11-16 23:36:40 +00:00
Ben Laurie
b1d7429186
Add TLS exporter.
2011-11-15 23:51:22 +00:00
Ben Laurie
060a38a2c0
Add DTLS-SRTP.
2011-11-15 23:02:16 +00:00
Andy Polyakov
58402976b4
aes-armv4.pl: make it link.
2011-11-15 13:55:52 +00:00
Andy Polyakov
cd7b854bbb
e_rc4_hmac_md5.c: make it work on darwin64, which is configured with RC4_CHAR.
2011-11-15 12:39:48 +00:00
Andy Polyakov
aecc0756e8
aes-s390x.pl: make it link.
2011-11-15 12:20:55 +00:00
Andy Polyakov
e6ccc6ed70
Configure, e_aes.c: allow for XTS assembler implementation [from HEAD].
2011-11-15 12:19:56 +00:00
Andy Polyakov
e959a01fac
e_aes.c: jumbo update from HEAD.
2011-11-14 21:17:08 +00:00
Andy Polyakov
17674bfdf7
ec_cvt.c: performance update from HEAD.
2011-11-14 21:14:53 +00:00
Andy Polyakov
d807d4c21f
c_allc.c: add XTS ciphers [from HEAD].
2011-11-14 21:13:35 +00:00
Andy Polyakov
b4690d2eab
config: platform and poratbility updates from HEAD.
2011-11-14 21:12:53 +00:00
Andy Polyakov
886657a641
Configure, etc.: engage additional assembler modules.
2011-11-14 21:12:05 +00:00
Andy Polyakov
db896db5a7
speed.c: add ghash benchmark [from HEAD].
2011-11-14 21:09:30 +00:00
Andy Polyakov
2357ae17e7
x86 assembler pack update from HEAD.
2011-11-14 21:06:50 +00:00
Andy Polyakov
9f1c5491d2
BN update from HEAD.
2011-11-14 21:05:42 +00:00
Andy Polyakov
70b52222f5
x86_64 assembler pack update from HEAD.
2011-11-14 21:01:21 +00:00
Andy Polyakov
88cb59727c
ARM assembler pack update from HEAD.
2011-11-14 20:58:01 +00:00
Andy Polyakov
781bfdc314
Alpha assembler pack update from HEAD.
2011-11-14 20:56:15 +00:00
Andy Polyakov
b66723b23e
MIPS assembler pack update from HEAD.
2011-11-14 20:55:24 +00:00
Andy Polyakov
cf96d71c22
PPC assembler pack update from HEAD.
2011-11-14 20:54:17 +00:00
Andy Polyakov
1a111921da
PA-RISC assembler pack update from HEAD.
2011-11-14 20:50:15 +00:00
Andy Polyakov
5d9bb428bb
SPARCv9 assembler pack update from HEAD.
2011-11-14 20:48:35 +00:00
Andy Polyakov
9833757b5d
s390x assembler pack update from HEAD.
2011-11-14 20:47:22 +00:00
Andy Polyakov
4195343c0d
IA64 assembler pack update from HEAD.
2011-11-14 20:45:57 +00:00
Andy Polyakov
042bee4e5c
perlasm update from HEAD.
2011-11-14 20:44:20 +00:00
Andy Polyakov
4afba1f3d9
Mafiles updates to accomodate assembler update from HEAD.
2011-11-14 20:42:22 +00:00
Dr. Stephen Henson
5999d45a5d
DH keys have an (until now) unused 'q' parameter. When creating from DSA copy
...
q across and if q present generate DH key in the correct range. (from HEAD)
2011-11-14 14:16:09 +00:00
Dr. Stephen Henson
f69e5d6a19
Call OPENSSL_init after we've checked to see if customisation is permissible.
2011-11-14 14:15:29 +00:00
Ben Laurie
3517637702
Ignorance.
2011-11-14 02:42:26 +00:00
Ben Laurie
e2809bfb42
Next Protocol Negotiation.
2011-11-14 02:25:04 +00:00
Ben Laurie
68b33cc5c7
Add Next Protocol Negotiation.
2011-11-13 21:55:42 +00:00
Ben Laurie
4c02cf8ecc
make depend.
2011-11-13 20:23:34 +00:00
Ben Laurie
271daaf768
Fix one of the no-tlsext build errors (there are more).
2011-11-13 20:19:21 +00:00
Dr. Stephen Henson
efbb7ee432
PR: 1794
...
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr >
Reviewed by: steve
Document unknown_psk_identify alert, remove pre-RFC 5054 string from
ssl_stat.c
2011-11-13 13:13:14 +00:00
Andy Polyakov
6471ec71aa
x86cpuid.pl: compensate for imaginary virtual machines [from HEAD].
...
PR: 2633
2011-11-08 21:28:14 +00:00
Andy Polyakov
cb45708061
x86cpuid.pl: don't punish "last-year" OSes on "this-year" CPUs.
...
PR: 2633
2011-11-05 10:44:25 +00:00
Andy Polyakov
02597f2885
ppc.pl: fix bug in bn_mul_comba4 [from HEAD].
...
PR: 2636
Submitted by: Charles Bryant
2011-11-05 10:16:30 +00:00
Richard Levitte
8c6a514edf
Add missing algorithms to disable, and in particular, disable
...
EC_NISTP_64_GCC_128 by default, as GCC isn't currently supported on
VMS. Add CMAC to the modules to build, and synchronise with Unix.
2011-10-30 11:45:30 +00:00
Richard Levitte
7f3fdab793
Teach mkshared.com to have a look for disabled algorithms in opensslconf.h
2011-10-30 11:40:56 +00:00
Dr. Stephen Henson
5372f5f989
PR: 2628
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Send alert instead of assertion failure for incorrectly formatted DTLS
fragments.
2011-10-27 13:06:43 +00:00
Dr. Stephen Henson
6d24c09a69
PR: 2628
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix for ECC keys and DTLS.
2011-10-27 13:01:20 +00:00
Dr. Stephen Henson
a8d72c79db
PR: 2632
...
Submitted by: emmanuel.azencot@bull.net
Reviewed by: steve
Return -1 immediately if not affine coordinates as BN_CTX has not been
set up.
2011-10-26 16:43:23 +00:00
Dr. Stephen Henson
1f713e0106
Use correct tag for SRP username.
2011-10-25 12:52:47 +00:00
Dr. Stephen Henson
03f84c8260
Update error codes for FIPS.
...
Add support for authentication in FIPS_mode_set().
2011-10-21 13:04:27 +00:00
Dr. Stephen Henson
6d5eb464c9
Recognise new ECC option (from HEAD).
2011-10-21 12:53:07 +00:00
Bodo Möller
67f8de9ab8
"make update"
2011-10-19 15:24:44 +00:00
Bodo Möller
2d95ceedc5
BN_BLINDING multi-threading fix.
...
Submitted by: Emilia Kasper (Google)
2011-10-19 14:58:59 +00:00
Bodo Möller
6526d765fc
Fix indentation
2011-10-19 09:24:05 +00:00
Bodo Möller
3d520f7c2d
Fix warnings.
...
Also, use the common Configure mechanism for enabling/disabling the 64-bit ECC code.
2011-10-19 08:58:35 +00:00
Bodo Möller
9c37519b55
Improve optional 64-bit NIST-P224 implementation, and add NIST-P256 and
...
NIST-P521. (Now -DEC_NISTP_64_GCC_128 enables all three of these;
-DEC_NISTP224_64_GCC_128 no longer works.)
Submitted by: Google Inc.
2011-10-18 19:43:54 +00:00
Dr. Stephen Henson
7e9cfcd0dc
Recognise no-rsax option.
2011-10-15 13:22:26 +00:00
Andy Polyakov
a99ce1f5b1
e_aes.c: fix bug in aesni_gcm_tls_cipher [in HEAD].
2011-10-14 09:34:14 +00:00
Andy Polyakov
42660b3cf1
aesni-x86[_64].pl: pull from HEAD.
2011-10-14 09:21:03 +00:00
Bodo Möller
f30258c439
use -no_ecdhe when using -no_dhe
2011-10-13 15:07:05 +00:00
Bodo Möller
93ff4c69f7
Make CTR mode behaviour consistent with other modes:
...
clear ctx->num in EVP_CipherInit_ex
Submitted by: Emilia Kasper
2011-10-13 13:42:29 +00:00
Bodo Möller
79571bb1ca
Clarify warning
2011-10-13 13:25:03 +00:00
Bodo Möller
f72c1a58cb
In ssl3_clear, preserve s3->init_extra along with s3->rbuf.
...
Submitted by: Bob Buckholz <bbuckholz@google.com >
2011-10-13 13:05:35 +00:00
Dr. Stephen Henson
2461396f69
For now disable RSAX ENGINE for FIPS builds: it sets a non-FIPS RSA
...
method which stops FIPS mode working.
2011-10-13 11:43:44 +00:00
Dr. Stephen Henson
81a071df2f
increase test RSA key size to 1024 bits
2011-10-12 21:55:42 +00:00
Dr. Stephen Henson
6841abe842
update pkey method initialisation and copy
2011-10-11 18:16:02 +00:00
Dr. Stephen Henson
cb70355d87
Backport ossl_ssize_t type from HEAD.
2011-10-10 22:33:50 +00:00
Dr. Stephen Henson
b17442bb04
def_rsa_finish not used anymore.
2011-10-10 20:34:17 +00:00
Dr. Stephen Henson
4874e235fb
fix leak properly this time...
2011-10-10 14:09:05 +00:00
Dr. Stephen Henson
06afa6eb94
add GCM ciphers in SSL_library_init
2011-10-10 12:56:11 +00:00
Dr. Stephen Henson
58e4205d6c
disable GCM if not available
2011-10-10 12:40:13 +00:00
Dr. Stephen Henson
733394d6dd
Add some entries for 1.0.1 in NEWS.
2011-10-10 00:27:52 +00:00
Dr. Stephen Henson
2de9558dea
sync NEWS with 1.0.0 branch
2011-10-10 00:23:14 +00:00
Dr. Stephen Henson
6bd173fced
Don't disable TLS v1.2 by default any more.
2011-10-09 23:28:25 +00:00
Dr. Stephen Henson
6b00cd746a
Update ordinals.
2011-10-09 23:14:20 +00:00
Dr. Stephen Henson
9309ea6617
Backport PSS signature support from HEAD.
2011-10-09 23:13:50 +00:00
Dr. Stephen Henson
05c9e3aea5
fix CHANGES entry
2011-10-09 23:11:09 +00:00
Dr. Stephen Henson
88bac3e664
fix memory leaks
2011-10-09 23:09:22 +00:00
Dr. Stephen Henson
5473b6bc2f
Fix memory leak. From HEAD.
2011-10-09 16:04:17 +00:00
Dr. Stephen Henson
38e408076e
Update ordinals.
2011-10-09 15:28:52 +00:00
Dr. Stephen Henson
dc100d87b5
Backport of password based CMS support from HEAD.
2011-10-09 15:28:02 +00:00
Dr. Stephen Henson
6f6b31dadc
PR: 2482
...
Submitted by: Rob Austein <sra@hactrn.net >
Reviewed by: steve
Don't allow inverted ranges in RFC3779 code, discovered by Frank Ellermann.
2011-10-09 00:56:43 +00:00
Dr. Stephen Henson
b08b158b44
use client version when eliminating TLS v1.2 ciphersuites in client hello
2011-10-07 15:07:36 +00:00
Dr. Stephen Henson
177f27d71e
? crypto/aes/aes-armv4.S
...
? crypto/aes/aesni-sha1-x86_64.s
? crypto/aes/aesni-x86_64.s
? crypto/aes/foo.pl
? crypto/aes/vpaes-x86_64.s
? crypto/bn/.bn_lib.c.swp
? crypto/bn/armv4-gf2m.S
? crypto/bn/diffs
? crypto/bn/modexp512-x86_64.s
? crypto/bn/x86_64-gf2m.s
? crypto/bn/x86_64-mont5.s
? crypto/ec/bc.txt
? crypto/ec/diffs
? crypto/modes/a.out
? crypto/modes/diffs
? crypto/modes/ghash-armv4.S
? crypto/modes/ghash-x86_64.s
? crypto/modes/op.h
? crypto/modes/tst.c
? crypto/modes/x.h
? crypto/objects/.obj_xref.txt.swp
? crypto/rand/diffs
? crypto/sha/sha-512
? crypto/sha/sha1-armv4-large.S
? crypto/sha/sha256-armv4.S
? crypto/sha/sha512-armv4.S
Index: crypto/objects/obj_xref.c
===================================================================
RCS file: /v/openssl/cvs/openssl/crypto/objects/obj_xref.c,v
retrieving revision 1.9
diff -u -r1.9 obj_xref.c
--- crypto/objects/obj_xref.c 5 Nov 2008 18:38:58 -0000 1.9
+++ crypto/objects/obj_xref.c 6 Oct 2011 20:30:21 -0000
@@ -110,8 +110,10 @@
#endif
if (rv == NULL)
return 0;
- *pdig_nid = rv->hash_id;
- *ppkey_nid = rv->pkey_id;
+ if (pdig_nid)
+ *pdig_nid = rv->hash_id;
+ if (ppkey_nid)
+ *ppkey_nid = rv->pkey_id;
return 1;
}
@@ -144,7 +146,8 @@
#endif
if (rv == NULL)
return 0;
- *psignid = (*rv)->sign_id;
+ if (psignid)
+ *psignid = (*rv)->sign_id;
return 1;
}
Index: crypto/x509/x509type.c
===================================================================
RCS file: /v/openssl/cvs/openssl/crypto/x509/x509type.c,v
retrieving revision 1.10
diff -u -r1.10 x509type.c
--- crypto/x509/x509type.c 26 Oct 2007 12:06:33 -0000 1.10
+++ crypto/x509/x509type.c 6 Oct 2011 20:36:04 -0000
@@ -100,20 +100,26 @@
break;
}
- i=X509_get_signature_type(x);
- switch (i)
+ i=OBJ_obj2nid(x->sig_alg->algorithm);
+ if (i && OBJ_find_sigid_algs(i, NULL, &i))
{
- case EVP_PKEY_RSA:
- ret|=EVP_PKS_RSA;
- break;
- case EVP_PKEY_DSA:
- ret|=EVP_PKS_DSA;
- break;
- case EVP_PKEY_EC:
- ret|=EVP_PKS_EC;
- break;
- default:
- break;
+
+ switch (i)
+ {
+ case NID_rsaEncryption:
+ case NID_rsa:
+ ret|=EVP_PKS_RSA;
+ break;
+ case NID_dsa:
+ case NID_dsa_2:
+ ret|=EVP_PKS_DSA;
+ break;
+ case NID_X9_62_id_ecPublicKey:
+ ret|=EVP_PKS_EC;
+ break;
+ default:
+ break;
+ }
}
if (EVP_PKEY_size(pk) <= 1024/8)/* /8 because it's 1024 bits we look
2011-10-06 20:45:08 +00:00
Dr. Stephen Henson
928bd9a149
fix signed/unsigned warning
2011-09-26 17:04:41 +00:00
Dr. Stephen Henson
e53113b8ac
make sure eivlen is initialised
2011-09-24 23:06:35 +00:00
Dr. Stephen Henson
1fe83b4afe
use keyformat for -x509toreq, don't hard code PEM
2011-09-23 21:48:50 +00:00
Dr. Stephen Henson
e8f31f80d1
PR: 2606
...
Submitted by: Christoph Viethen <cv@kawo2.rwth-aachen.de >
Reviewed by: steve
Handle timezones correctly in UTCTime.
2011-09-23 13:39:35 +00:00
Dr. Stephen Henson
56f5ab43c2
PR: 2602
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS bug which prevents manual MTU setting
2011-09-23 13:35:05 +00:00
Dr. Stephen Henson
370385571c
PR: 2347
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Reviewed by: steve
Fix usage message.
2011-09-23 13:12:41 +00:00
Dr. Stephen Henson
e34a303ce1
make depend
2011-09-16 23:15:22 +00:00
Dr. Stephen Henson
36f120cd20
Improved error checking for DRBG calls.
...
New functionality to allow default DRBG type to be set during compilation or during runtime.
2011-09-16 23:12:34 +00:00
Dr. Stephen Henson
0ae7c43fa5
Improved error checking for DRBG calls.
...
New functionality to allow default DRBG type to be set during compilation
or during runtime.
2011-09-16 23:08:57 +00:00
Dr. Stephen Henson
c0d2943952
Typo.
2011-09-16 23:04:07 +00:00
Dr. Stephen Henson
7d453a3b49
Fix warnings (from HEAD).
2011-09-10 21:18:37 +00:00
Dr. Stephen Henson
cd447875e6
Initialise X509_STORE_CTX properly so CRLs with nextUpdate date in the past
...
produce an error (CVE-2011-3207)
2011-09-06 15:14:41 +00:00
Andy Polyakov
692a94293c
config: don't add -Wa options with no-asm [from HEAD].
2011-09-05 16:33:48 +00:00
Bodo Möller
efebb10829
oops
2011-09-05 13:43:53 +00:00
Bodo Möller
3c3f025923
Fix session handling.
2011-09-05 13:36:55 +00:00
Bodo Möller
5ff6e2dfbb
Fix d2i_SSL_SESSION.
2011-09-05 13:31:07 +00:00
Bodo Möller
61ac68f9f6
(EC)DH memory handling fixes.
...
Submitted by: Adam Langley
2011-09-05 10:25:27 +00:00
Bodo Möller
7f1022a8b1
Fix memory leak on bad inputs.
2011-09-05 09:57:15 +00:00
Bodo Möller
edf6b025b1
make update
2011-09-05 09:44:54 +00:00
Bodo Möller
d799df36b3
Fix expected DEFFLAG for default config.
2011-09-05 09:43:56 +00:00
Bodo Möller
9e96812934
Fix error codes.
2011-09-05 09:42:55 +00:00
Dr. Stephen Henson
91e97cbe4c
Don't use *from++ in tolower as this is implemented as a macro on some
...
platforms. Thanks to Shayne Murray <Shayne.Murray@Polycom.com > for
reporting this issue.
2011-09-02 11:28:18 +00:00
Dr. Stephen Henson
63ee3b32fe
PR: 2576
...
Submitted by: Doug Goldstein <cardoe@gentoo.org >
Reviewed by: steve
Include header file stdlib.h which is needed on some platforms to get
getenv() declaration.
2011-09-02 11:20:32 +00:00
Dr. Stephen Henson
4ff1a2da10
PR: 2340
...
Submitted by: "Mauro H. Leggieri" <mxmauro@caiman.com.ar >
Reviewed by: steve
Stop warnings if OPENSSL_NO_DGRAM is defined.
2011-09-01 15:01:55 +00:00
Dr. Stephen Henson
4c3c975066
make timing attack protection unconditional
2011-09-01 14:23:22 +00:00
Dr. Stephen Henson
ec5d74f868
PR: 2573
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS buffering and decryption bug.
2011-09-01 14:02:14 +00:00
Dr. Stephen Henson
be0853358c
PR: 2589
...
Submitted by: Thomas Jarosch <thomas.jarosch@intra2net.com >
Reviewed by: steve
Initialise p pointer.
2011-09-01 13:52:38 +00:00
Dr. Stephen Henson
fea15b553d
PR: 2588
...
Submitted by: Thomas Jarosch <thomas.jarosch@intra2net.com >
Reviewed by: steve
Close file pointer.
2011-09-01 13:49:08 +00:00
Dr. Stephen Henson
88ef78745e
PR: 2586
...
Submitted by: Thomas Jarosch <thomas.jarosch@intra2net.com >
Reviewed by: steve
Zero structure fields properly.
2011-09-01 13:45:35 +00:00
Dr. Stephen Henson
be79342515
PR: 2586
...
Submitted by: Thomas Jarosch <thomas.jarosch@intra2net.com >
Reviewed by: steve
Fix brace mismatch.
2011-09-01 13:37:28 +00:00
Dr. Stephen Henson
064a6176ac
Update ordinals.
2011-08-26 10:45:17 +00:00
Andy Polyakov
84e7485bfb
Add RC4-MD5 and AESNI-SHA1 "stitched" implementations [from HEAD].
2011-08-23 20:53:34 +00:00
Andy Polyakov
f56f72f219
eng_rsax.c: improve portability [from HEAD].
2011-08-22 19:01:41 +00:00
Andy Polyakov
2bfb23f102
modexp512-x86_64.pl: make it work with ml64 [from HEAD].
2011-08-19 06:31:27 +00:00
Dr. Stephen Henson
cf199fec52
Remove hard coded ecdsaWithSHA1 hack in ssl routines and check for RSA
...
using OBJ xref utilities instead of string comparison with OID name.
This removes the arbitrary restriction on using SHA1 only with some ECC
ciphersuites.
2011-08-14 13:47:30 +00:00
Andy Polyakov
165c20c2c4
eng_rsax.c: make it work on Win64.
2011-08-14 08:38:04 +00:00
Andy Polyakov
625c6ba4c7
eng_rdrand.c: make it link in './config 386' case [from HEAD].
2011-08-14 08:31:14 +00:00
Andy Polyakov
a32bede701
x86_64-xlate.pl: fix movzw [from HEAD].
2011-08-12 21:25:23 +00:00
Andy Polyakov
8ff5c8874f
Alpha assembler fixed from HEAD.
...
PR: 2577
2011-08-12 12:31:08 +00:00
Dr. Stephen Henson
c5d38fc262
aesni TLS GCM support
2011-08-11 23:06:37 +00:00
Dr. Stephen Henson
6b71970520
Sync EVP AES modes from HEAD.
2011-08-11 22:52:06 +00:00
Dr. Stephen Henson
0209e111f6
Add XTS OIDs from HEAD.
2011-08-11 22:51:37 +00:00
Dr. Stephen Henson
dc01af7723
Sync ASM/modes to add CCM and XTS modes and assembly language optimisation
...
(from HEAD, original by Andy).
2011-08-11 22:36:19 +00:00
Dr. Stephen Henson
5435d0412f
prevent compilation errors and warnings
2011-08-11 21:12:01 +00:00
Andy Polyakov
922ac25f64
Add provisory support for RDRAND [from HEAD].
2011-08-10 18:53:13 +00:00
Dr. Stephen Henson
aed53d6c5a
Backport GCM support from HEAD.
2011-08-04 11:13:28 +00:00
Dr. Stephen Henson
61cdb9f36a
Backport GCM support from HEAD. Minimal support at present: no assembly
...
language optimisation. [original by Andy]
2011-08-04 11:12:38 +00:00
Dr. Stephen Henson
1acd042c85
fix memory leak
2011-08-03 16:40:14 +00:00
Dr. Stephen Henson
572712d82a
recognise ecdsaWithSHA1 OID
2011-07-28 14:42:53 +00:00
Dr. Stephen Henson
d1697a7556
Disable rsax for Windows: it doesn't currently work.
2011-07-25 23:45:49 +00:00
Dr. Stephen Henson
c8c6e9ecd9
Add HMAC ECC ciphersuites from RFC5289. Include SHA384 PRF support and
...
prohibit use of these ciphersuites for TLS < 1.2
2011-07-25 21:45:17 +00:00
Andy Polyakov
90f3e4cf05
Back-port TLS AEAD framework [from HEAD].
2011-07-21 19:22:57 +00:00
Dr. Stephen Henson
7bd8bf58bb
stop warnings
2011-07-21 13:45:17 +00:00
Andy Polyakov
1190d3f442
Add RSAX builtin engine [from HEAD].
2011-07-20 21:51:33 +00:00
Dr. Stephen Henson
0e4f5cfbab
PR: 2559
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS socket error bug
2011-07-20 15:22:02 +00:00
Dr. Stephen Henson
f1c8db9f8c
PR: 2555
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS sequence number bug
2011-07-20 15:17:42 +00:00
Dr. Stephen Henson
2c9abbd554
PR: 2550
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS HelloVerifyRequest Timer bug
2011-07-20 15:13:43 +00:00
Dr. Stephen Henson
2305ae5d8c
PR: 2556 (partial)
...
Reported by: Daniel Marschall <daniel-marschall@viathinksoft.de >
Reviewed by: steve
Fix OID routines.
Check on encoding leading zero rejection should start at beginning of
encoding.
Allow for initial digit when testing when to use BIGNUMs which can increase
first value by 2 * 40.
2011-07-14 12:01:36 +00:00
Andy Polyakov
dec54bd0ba
ms/uplink.c: fix Visual Studio 2010 warning [from HEAD].
2011-07-13 14:54:56 +00:00
Andy Polyakov
aade369737
config: config: detect if assembler supports --noexecstack and pass it down
...
[from HEAD].
2011-07-13 14:25:22 +00:00
Andy Polyakov
2a5e042c70
perlasm/cbc.pl: fix tail processing bug [from HEAD].
...
PR: 2557
2011-07-13 06:22:46 +00:00
Bodo Möller
1dc4c8c727
Fix typo.
...
Submitted by: Jim Morrison
2011-07-11 12:13:56 +00:00
Dr. Stephen Henson
7ca035db88
Update ordinals.
2011-07-08 12:12:30 +00:00
Andy Polyakov
a460c42f94
x86_64-xlate.pl: update from HEAD.
2011-07-04 13:11:55 +00:00
Andy Polyakov
d16743e728
sha1-x86_64.pl: nasm-related update from HEAD.
2011-07-04 13:01:42 +00:00
Andy Polyakov
4a29fa8caf
sha1-x86_64.pl: fix win64-specific typos and add masm support [from HEAD].
2011-07-01 21:24:39 +00:00
Andy Polyakov
250bb54dba
x86_64-xlate.pl: masm-specific update.
2011-07-01 21:22:13 +00:00
Dr. Stephen Henson
847d05d0b4
No need for trailing slash any more.
2011-07-01 14:15:02 +00:00
Dr. Stephen Henson
8315aa03fc
Fix assembly language function renaming so it works on WIN64.
2011-07-01 14:13:52 +00:00
Andy Polyakov
b7a4c480d6
Configure: add aesni-x86_64.o to VC-WIN64A line.
2011-06-28 18:20:25 +00:00
Andy Polyakov
9a35faaa29
rc4-x86[_64].pl: back-sync with original 1.0.1.
2011-06-28 15:04:31 +00:00
Andy Polyakov
fbe2e28911
AES-NI backport from HEAD. Note that e_aes.c doesn't implement all modes
...
from HEAD yet, more will be back-ported later.
2011-06-28 14:49:35 +00:00
Andy Polyakov
84968e25f3
x86[_64] assembler pack: back-port SHA1 and RC4 from HEAD.
2011-06-28 13:53:50 +00:00
Andy Polyakov
10fd0b7b55
x86[_64]cpuid.pl: harmonize OPENSSL_ia32_cpuid [from HEAD].
2011-06-28 13:40:19 +00:00
Andy Polyakov
4a46dc6e5c
x86[_64] perlasm: pull-in from HEAD.
2011-06-28 13:33:47 +00:00
Andy Polyakov
0ec55604c0
Expand OPENSSL_ia32cap_P to 64 bits. It might appear controversial, because
...
such operation can be considered as breaking binary compatibility. However!
OPNESSL_ia32cap_P is accessed by application through pointer returned by
OPENSSL_ia32cap_loc() and such change of *internal* OPENSSL_ia32cap_P
declaration is possible specifically on little-endian platforms, such as
x86[_64] ones in question. In addition, if 32-bit application calls
OPENSSL_ia32cap_loc(), it clears upper half of capability vector maintaining
the illusion that it's still 32 bits wide.
2011-06-28 13:31:58 +00:00
Dr. Stephen Henson
500007c9ed
auto detect configuration using KERNEL_BITS and CC
2011-06-27 11:39:01 +00:00
Dr. Stephen Henson
f75abba013
allow KERNEL_BITS to be specified in the environment
2011-06-24 14:04:18 +00:00
Dr. Stephen Henson
dea113b428
PR: 2470
...
Submitted by: Corinna Vinschen <vinschen@redhat.com >
Reviewed by: steve
Don't call ERR_remove_state from DllMain.
2011-06-22 15:38:40 +00:00
Dr. Stephen Henson
6abc406a69
PR: 2543
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Correctly handle errors in DTLSv1_handle_timeout()
2011-06-22 15:30:04 +00:00
Dr. Stephen Henson
dcbe723bc5
PR: 2540
...
Submitted by: emmanuel.azencot@bull.net
Reviewed by: steve
Prevent infinite loop in BN_GF2m_mod_inv().
2011-06-22 15:23:40 +00:00
Dr. Stephen Henson
33c98a28ac
correctly encode OIDs near 2^32
2011-06-22 15:15:48 +00:00
Dr. Stephen Henson
b2ddddfb20
allow MD5 use for computing old format hash links
2011-06-22 02:18:06 +00:00
Dr. Stephen Henson
c24367ebb9
Don't set FIPS rand method at same time as RAND method as this can cause
...
the FIPS library to fail. Applications that want to set the FIPS rand
method can do so explicitly and presumably they know what they are doing...
2011-06-21 17:08:25 +00:00
Dr. Stephen Henson
7397b35379
Add FIPS error codes.
2011-06-21 16:58:10 +00:00
Dr. Stephen Henson
baee44c3de
Stop warning.
2011-06-21 16:42:15 +00:00
Dr. Stephen Henson
1f2e4ecc30
Rename all AES_set*() functions using private_ prefix.
2011-06-21 16:23:42 +00:00
Dr. Stephen Henson
955e28006d
make EVP_dss() work for DSA signing
2011-06-20 20:05:13 +00:00
Dr. Stephen Henson
bf0736eb1f
Redirect null cipher to FIPS module.
2011-06-20 20:00:10 +00:00
Dr. Stephen Henson
3a5b97b7f1
Don't set default public key methods in FIPS mode so applications
...
can switch between modes.
2011-06-20 19:41:13 +00:00
Dr. Stephen Henson
45bf825066
Set FIPSLINK correctly now trailing slash is removed from FIPSDIR.
2011-06-18 19:35:03 +00:00
Dr. Stephen Henson
4a18d5c89b
Don't add trailing slash to FIPSDIR: it causes problems with Windows builds.
2011-06-18 19:02:12 +00:00
Dr. Stephen Henson
174b26c497
Preliminary WIN32 support for FIPS capable OpenSSL building.
2011-06-17 12:50:40 +00:00
Bodo Möller
5cacc82f61
Fix the version history: given that 1.0.1 has yet to be released,
...
we should list "Changes between 1.0.0e and 1.0.1",
not "between 1.0.0d and 1.0.1".
2011-06-15 14:23:44 +00:00
Dr. Stephen Henson
29a90816ff
Update key sizes to 2048 bits.
...
Only build ssltest with fipsld.
Include FIPS mode test for ssltest.
2011-06-14 15:35:49 +00:00
Dr. Stephen Henson
4bea454021
set FIPS allow before initialising ctx
2011-06-14 15:25:41 +00:00
Dr. Stephen Henson
8bfd0ae4c4
typo
2011-06-14 13:47:25 +00:00
Dr. Stephen Henson
378943ce67
Use include dir when copiling fips_premain_dso.
2011-06-14 12:58:35 +00:00
Dr. Stephen Henson
c65d409afd
Fix warnings in shared builds.
2011-06-14 12:58:00 +00:00
Dr. Stephen Henson
ed1bbe2cad
make sure custom cipher flag doesn't use any mode bits
2011-06-13 23:10:34 +00:00
Dr. Stephen Henson
b0b3d09063
Set rand method in FIPS_mode_set() not in rand library.
2011-06-13 21:18:00 +00:00
Dr. Stephen Henson
0ede2af7a0
Redirect RAND to FIPS module in FIPS mode.
2011-06-13 20:40:52 +00:00
Dr. Stephen Henson
e8d23f7811
Redirect HMAC and CMAC operations to module.
2011-06-12 15:07:26 +00:00
Dr. Stephen Henson
907cd7217e
update ordinals
2011-06-10 17:17:55 +00:00
Dr. Stephen Henson
7c402e5af3
Disable GCM, CCM, XTS outside FIPS mode this will be updated
...
when backported.
2011-06-10 14:22:42 +00:00
Dr. Stephen Henson
b8d78a5520
add cmac to Windows build, update ordinals
2011-06-10 14:12:55 +00:00
Dr. Stephen Henson
dfa5862960
Add android platforms. Let fipsdir come from environment.
2011-06-09 21:54:13 +00:00
Dr. Stephen Henson
4276908f51
add android support to DSO (from HEAD)
2011-06-09 21:49:24 +00:00
Ben Laurie
be23b71e87
Add -attime.
2011-06-09 17:09:31 +00:00
Ben Laurie
f851acbfff
Fix warnings/errors(!).
2011-06-09 17:09:08 +00:00
Ben Laurie
78ef9b0205
Fix warnings.
2011-06-09 16:03:18 +00:00
Dr. Stephen Henson
ed9b0e5cba
Redirect DH key and parameter generation.
2011-06-09 15:21:46 +00:00
Dr. Stephen Henson
752c1a0ce9
Redirect DSA operations to FIPS module in FIPS mode.
2011-06-09 13:54:09 +00:00
Dr. Stephen Henson
cc30415d0c
Use method rsa keygen first if FIPS mode if it is a FIPS method.
2011-06-09 13:18:07 +00:00
Dr. Stephen Henson
03e16611a3
Redirect DH operations to FIPS module. Block non-FIPS methods.
...
Sync DH error codes with HEAD.
2011-06-08 15:58:59 +00:00
Dr. Stephen Henson
8e2f3c1c83
fix memory leak
2011-06-08 15:55:57 +00:00
Dr. Stephen Henson
b6d63b2516
Check fips method flags for ECDH, ECDSA.
2011-06-08 14:01:00 +00:00
Dr. Stephen Henson
e6b88d02bd
Implement Camellia_set_key properly for FIPS builds.
2011-06-08 13:11:46 +00:00
Andy Polyakov
125060ca63
rc4_skey.c: remove dead/redundant code (it's never compiled) and
...
misleading/obsolete comment [from HEAD].
2011-06-06 20:04:33 +00:00
Dr. Stephen Henson
b4baca9261
Recognise "fips" in mkdef.pl script.
2011-06-06 15:46:25 +00:00
Dr. Stephen Henson
6342b6e332
Redirection of ECDSA, ECDH operations to FIPS module.
...
Also use FIPS EC methods unconditionally for now: might want to use them
only in FIPS mode or with a switch later.
2011-06-06 15:39:17 +00:00
Dr. Stephen Henson
a6dc77822b
Set SSL_FIPS flag in ECC ciphersuites.
2011-06-06 14:14:14 +00:00
Dr. Stephen Henson
59bc67052b
Add flags field to EC_KEY structure (backport from HEAD).
2011-06-06 13:18:03 +00:00
Dr. Stephen Henson
c090562828
Make no-ec2m work again (backport from HEAD).
2011-06-06 13:00:30 +00:00
Dr. Stephen Henson
69e2ec63c5
Reorganise ECC code so it can use FIPS module.
...
Move compression, point2oct and oct2point functions into separate files.
Add a flags field to EC_METHOD.
Add a flag EC_FLAGS_DEFAULT_OCT to use the default compession and oct functions
(all existing methods do this). This removes dependencies from EC_METHOD while
keeping original functionality.
Backport from HEAD with minor changes.
2011-06-06 12:54:51 +00:00
Dr. Stephen Henson
f610a516a0
Backport from HEAD:
...
New option to disable characteristic two fields in EC code.
Make no-ec2m work on Win32 build.
2011-06-06 11:49:36 +00:00
Dr. Stephen Henson
2e51a4caa3
Function not used outside FIPS builds.
2011-06-06 11:24:47 +00:00
Dr. Stephen Henson
c6fa97a6d6
FIPS low level blocking for AES, RC4 and Camellia. This is complicated by
...
use of assembly language routines: rename the assembly language function
to the private_* variant unconditionally and perform tests from a small
C wrapper.
2011-06-05 17:36:44 +00:00
Dr. Stephen Henson
24d7159abd
Backport libcrypto audit: check return values of EVP functions instead
...
of assuming they will always suceed.
2011-06-03 20:53:00 +00:00
Dr. Stephen Henson
7978dc989d
fix error discrepancy
2011-06-03 18:50:49 +00:00
Dr. Stephen Henson
d99e6b5014
New function X509_ALGOR_set_md() to set X509_ALGOR (DigestAlgorithmIdentifier) from a digest algorithm (backport from HEAD).
2011-06-03 18:35:49 +00:00
Dr. Stephen Henson
2cf40fc2b8
license correction, no EAY code included in this file
2011-06-03 17:56:51 +00:00
Dr. Stephen Henson
260d08b814
Backport CMAC support from HEAD.
2011-06-03 15:08:42 +00:00
Dr. Stephen Henson
53dd05d8f6
Redirect RSA keygen, sign, verify to FIPS module.
2011-06-03 13:16:16 +00:00
Dr. Stephen Henson
fbe7055370
Redirection of low level APIs to FIPS module.
...
Digest sign, verify operations are not redirected at this stage.
2011-06-02 18:22:42 +00:00
Dr. Stephen Henson
a5b386205f
Backport extended PSS support from HEAD: allow setting of mgf1Hash explicitly.
...
This is needed to handle FIPS redirection fully.
2011-06-02 18:13:33 +00:00
Dr. Stephen Henson
916bcab28e
Prohibit low level cipher APIs in FIPS mode.
...
Not complete: ciphers with assembly language key setup are not
covered yet.
2011-06-01 16:54:06 +00:00
Dr. Stephen Henson
c7373c3dee
For consistency define clone digests in evp_fips.c
2011-06-01 15:11:00 +00:00
Dr. Stephen Henson
9f2c8eb2a1
Redirect clone digests to FIPS module for FIPS builds.
2011-06-01 14:28:21 +00:00
Dr. Stephen Henson
65300dcfb0
Prohibit use of low level digest APIs in FIPS mode.
2011-06-01 13:39:45 +00:00
Dr. Stephen Henson
9ddc574f9a
typo
2011-06-01 11:10:50 +00:00
Dr. Stephen Henson
2dd9e67874
set FIPS permitted flag before initalising digest
2011-05-31 16:24:06 +00:00
Dr. Stephen Henson
f93b03a5e6
Don't round up partitioned premaster secret length if there is only one
...
digest in use: this caused the PRF to fail for an odd premaster secret
length.
2011-05-31 10:35:22 +00:00
Dr. Stephen Henson
55a47cd30f
Output supported curves in preference order instead of numerically.
2011-05-30 17:58:29 +00:00
Dr. Stephen Henson
5792219d1d
Redirect cipher operations to FIPS module for FIPS builds.
2011-05-29 16:18:38 +00:00
Dr. Stephen Henson
293c58c1e7
Use approved API for EVP digest operations in FIPS builds.
...
Call OPENSSL_init() in a few more places to make sure it is always called
at least once.
Initial cipher API redirection (incomplete).
2011-05-29 15:55:13 +00:00
Dr. Stephen Henson
9f375a752e
Add default ASN1 handling to support FIPS.
2011-05-29 02:32:05 +00:00
Dr. Stephen Henson
04dc5a9ca6
Redirect digests to FIPS module for FIPS builds.
...
Use FIPS API when initialising digests.
Sync header file evp.h and error codes with HEAD for necessary FIPS
definitions.
2011-05-28 23:01:26 +00:00
Dr. Stephen Henson
ae6cb5483e
Use || instead of && so build doesn't fail.
2011-05-26 22:10:28 +00:00
Dr. Stephen Henson
a168ec1d27
Support shared library builds of FIPS capable OpenSSL, add fipscanister.o
...
to libcrypto.a so linking to libcrypto.a works.
2011-05-26 21:23:11 +00:00
Dr. Stephen Henson
2a35144327
Make test utility link work for fips build.
2011-05-26 14:36:56 +00:00
Dr. Stephen Henson
7207eca1ee
The first of many changes to make OpenSSL 1.0.1 FIPS capable.
...
Add static build support to openssl utility.
Add new "fips" option to Configure.
Make use of installed fipsld and fips_standalone_sha1
Initialise FIPS error callbacks, locking and DRBG.
Doesn't do anything much yet: no crypto is redirected to the FIPS module.
Doesn't completely build either but the openssl utility can enter FIPS mode:
which doesn't do anything much either.
2011-05-26 14:19:19 +00:00
Dr. Stephen Henson
9c34782478
Don't advertise or use MD5 for TLS v1.2 in FIPS mode
2011-05-25 15:33:29 +00:00
Dr. Stephen Henson
20e6d22709
PR: 2533
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Setting SSL_MODE_RELEASE_BUFFERS should be ignored for DTLS, but instead causes
the program to crash. This is due to missing version checks and is fixed with
this patch.
2011-05-25 15:21:01 +00:00
Dr. Stephen Henson
24dd0c61ef
PR: 2529
...
Submitted by: Marcus Meissner <meissner@suse.de >
Reviewed by: steve
Call ssl_new() to reallocate SSL BIO internals if we want to replace
the existing internal SSL structure.
2011-05-25 15:16:01 +00:00
Dr. Stephen Henson
565c15363c
PR: 2527
...
Submitted by: Marcus Meissner <meissner@suse.de >
Reviewed by: steve
Set cnf to NULL to avoid possible double free.
2011-05-25 15:05:56 +00:00
Dr. Stephen Henson
ed67f7b7a7
Fix the ECDSA timing attack mentioned in the paper at:
...
http://eprint.iacr.org/2011/232.pdf
Thanks to the original authors Billy Bob Brumley and Nicola Tuveri for
bringing this to our attention.
2011-05-25 14:52:33 +00:00
Dr. Stephen Henson
6ea8d138d3
Fix the ECDSA timing attack mentioned in the paper at:
...
http://eprint.iacr.org/2011/232.pdf
Thanks to the original authors Billy Bob Brumley and Nicola Tuveri for
bringing this to our attention.
2011-05-25 14:42:27 +00:00
Dr. Stephen Henson
4159ac43aa
Oops use up to date patch for PR#2506
2011-05-25 14:30:05 +00:00
Dr. Stephen Henson
419b09b053
PR: 2512
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix BIO_accept so it can be bound to IPv4 or IPv6 sockets consistently.
2011-05-25 12:36:59 +00:00
Dr. Stephen Henson
88530f6b76
PR: 2506
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fully implement SSL_clear for DTLS.
2011-05-25 12:28:16 +00:00
Dr. Stephen Henson
a8cb8177f6
PR: 2505
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS session resumption timer bug.
2011-05-25 12:24:43 +00:00
Dr. Stephen Henson
277f8a34f4
use TLS1_get_version macro to check version so TLS v1.2 changes don't interfere with DTLS
2011-05-25 11:43:17 +00:00
Dr. Stephen Henson
4dde470865
Add tls12_sigalgs which somehow didn't get added to the backport.
2011-05-21 17:40:23 +00:00
Richard Levitte
ab08405984
LIBOBJ contained o_fips.c, now o_fips.o.
2011-05-21 09:17:54 +00:00
Dr. Stephen Henson
b81fde02aa
Add server client certificate support for TLS v1.2 . This is more complex
...
than client side as we need to keep the handshake record cache frozen when
it contains all the records need to process the certificate verify message.
(backport from HEAD).
2011-05-20 14:58:45 +00:00
Dr. Stephen Henson
57dd2ea808
add FIPS support to openssl utility (backport from HEAD)
2011-05-19 18:23:24 +00:00
Dr. Stephen Henson
7043fa702f
add FIPS support to ssl: doesn't do anything on this branch yet as there is no FIPS compilation support
2011-05-19 18:22:16 +00:00
Dr. Stephen Henson
f98d2e5cc1
Implement FIPS_mode and FIPS_mode_set
2011-05-19 18:19:07 +00:00
Dr. Stephen Henson
1a5538251f
update date
2011-05-19 17:56:12 +00:00
Dr. Stephen Henson
f4ddbb5ad1
inherit HMAC flags from MD_CTX
2011-05-19 17:38:57 +00:00
Dr. Stephen Henson
74bf705ea8
set encodedPoint to NULL after freeing it
2011-05-19 16:18:11 +00:00
Dr. Stephen Henson
676cd3a283
new flag to stop ENGINE methods being registered
2011-05-15 15:58:38 +00:00
Dr. Stephen Henson
c6ead3cdd3
Recognise and ignore no-ec-nistp224-64-gcc-128 (from HEAD).
2011-05-13 12:46:12 +00:00
Dr. Stephen Henson
2d53648ce7
typo
2011-05-13 12:44:37 +00:00
Dr. Stephen Henson
64ca6ac26b
Recognise NO_NISTP224-64-GCC-128
2011-05-13 12:38:02 +00:00
Dr. Stephen Henson
4fe4c00eca
Provisional support for TLS v1.2 client authentication: client side only.
...
Parse certificate request message and set digests appropriately.
Generate new TLS v1.2 format certificate verify message.
Keep handshake caches around for longer as they are needed for client auth.
2011-05-12 17:49:15 +00:00
Dr. Stephen Henson
376838a606
Process signature algorithms during TLS v1.2 client authentication.
...
Make sure message is long enough for signature algorithms.
(backport from HEAD).
2011-05-12 17:44:59 +00:00
Dr. Stephen Henson
d768a816aa
Ooops fix typo.
2011-05-12 13:59:04 +00:00
Dr. Stephen Henson
766e0cb7d1
SRP fixes from HEAD which weren't in 1.0.1-stable.
2011-05-12 13:46:40 +00:00
Dr. Stephen Henson
6a6b0c8b51
Add SSL_INTERN definition.
2011-05-12 13:12:49 +00:00
Dr. Stephen Henson
e24b01cc6f
Have EC_NISTP224_64_GCC_128 treated like any algorithm, and have disabled by
...
default. If we don't do it this way, it screws up libeay.num.
(update from HEAD, original from levitte).
2011-05-12 13:10:27 +00:00
Dr. Stephen Henson
7f9ef5621a
Oops, add missing declaration.
2011-05-12 13:02:25 +00:00
Dr. Stephen Henson
d7fc9ffc51
Update ordinals.
2011-05-11 23:03:06 +00:00
Dr. Stephen Henson
39348038df
make kerberos work with OPENSSL_NO_SSL_INTERN
2011-05-11 22:52:34 +00:00
Dr. Stephen Henson
9472baae0d
Backport TLS v1.2 support from HEAD.
...
This includes TLS v1.2 server and client support but at present
client certificate support is not implemented.
2011-05-11 13:37:52 +00:00
Dr. Stephen Henson
ae17b9ecd5
Typo.
2011-05-11 13:22:54 +00:00
Dr. Stephen Henson
74096890ba
Initial "opaque SSL" framework. If an application defines OPENSSL_NO_SSL_INTERN
...
all ssl related structures are opaque and internals cannot be directly
accessed. Many applications will need some modification to support this and
most likely some additional functions added to OpenSSL.
The advantage of this option is that any application supporting it will still
be binary compatible if SSL structures change.
(backport from HEAD).
2011-05-11 12:56:38 +00:00
Dr. Stephen Henson
889c2282a5
allow SHA384, SHA512 with DSA
2011-05-08 12:38:51 +00:00
Dr. Stephen Henson
dca30c44f5
no need to include memory.h
2011-04-30 23:38:05 +00:00
Dr. Stephen Henson
f2c358c6ce
check buffer is larger enough before overwriting
2011-04-06 18:06:54 +00:00
Dr. Stephen Henson
2ab42de1ec
PR: 2462
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS Retransmission Buffer Bug
2011-04-03 17:14:48 +00:00
Dr. Stephen Henson
ac2024ccbf
PR: 2458
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Don't change state when answering DTLS ClientHello.
2011-04-03 16:25:54 +00:00
Dr. Stephen Henson
93164a7d64
PR: 2457
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS fragment reassembly bug.
2011-04-03 15:48:32 +00:00
Richard Levitte
ecff2e5ce1
Corrections to the VMS build system.
...
Submitted by Steven M. Schweda <sms@antinode.info >
2011-03-25 16:21:08 +00:00
Dr. Stephen Henson
c9d630dab6
make some non-VMS builds work again
2011-03-25 15:07:18 +00:00
Richard Levitte
d135906dbc
For VMS, implement the possibility to choose 64-bit pointers with
...
different options:
"64" The build system will choose /POINTER_SIZE=64=ARGV if
the compiler supports it, otherwise /POINTER_SIZE=64.
"64=" The build system will force /POINTER_SIZE=64.
"64=ARGV" The build system will force /POINTER_SIZE=64=ARGV.
2011-03-25 09:39:46 +00:00
Richard Levitte
9f427a52cb
make update (1.0.1-stable)
...
This meant a slight renumbering in util/libeay.num due to symbols
appearing in 1.0.0-stable. However, since there's been no release on
this branch yet, it should be harmless.
2011-03-23 00:06:04 +00:00
Richard Levitte
5a39d3a838
* util/mkdef.pl: Add crypto/o_str.h and crypto/o_time.h. Maybe some
...
more need to be added...
2011-03-22 23:54:15 +00:00
Richard Levitte
013f3d999f
* apps/makeapps.com: Add srp.
2011-03-20 17:34:06 +00:00
Richard Levitte
64d30d7adc
* apps/makeapps.com: Forgot to end the check for /POINTER_SIZE=64=ARGV
...
with turning trapping back on.
* test/maketests.com: Do the same check for /POINTER_SIZE=64=ARGV
here.
* test/clean-test.com: A new script for cleaning up.
2011-03-20 14:01:49 +00:00
Richard Levitte
7062cb56a9
file clean_test.com was added on branch OpenSSL_1_0_1-stable on 2011-03-20 14:01:48 +0000
2011-03-20 14:01:18 +00:00
Richard Levitte
9d57828d66
* apps/openssl.c: For VMS, take care of copying argv if needed much earlier,
...
directly in main(). 'if needed' also includes when argv is a 32 bit
pointer in an otherwise 64 bit environment.
* apps/makeapps.com: When using /POINTER_SIZE=64, try to use the additional
=ARGV, but only if it's supported. Fortunately, DCL is very helpful
telling us in this case.
2011-03-20 13:15:37 +00:00
Richard Levitte
9ed8dee71b
A few more long symbols needing shortening.
2011-03-19 11:03:41 +00:00
Richard Levitte
4692b3345d
Keep file references in the VMS build files in the same order as they
...
are in the Unix Makefiles, and add SRP tests.
2011-03-19 10:46:21 +00:00
Richard Levitte
e59fb00735
SRP was introduced, add it for OpenVMS.
2011-03-19 09:55:35 +00:00
Richard Levitte
9275853084
A few more symbols that need shorter versions on OpenVMS.
2011-03-19 09:54:47 +00:00
Richard Levitte
0c81aa29f9
Change INSTALL.VMS to reflect the changes done on the build and
...
install scripts. This could need some more work.
2011-03-19 09:48:15 +00:00
Richard Levitte
01d2e27a2b
Apply all the changes submitted by Steven M. Schweda <sms@antinode.info>
2011-03-19 09:47:47 +00:00
Richard Levitte
dd7aadf7b2
file install-ssl.com was added on branch OpenSSL_1_0_1-stable on 2011-03-19 09:47:33 +0000
2011-03-19 09:44:39 +00:00
Richard Levitte
b2fdf501c5
file vms_rms.h was added on branch OpenSSL_1_0_1-stable on 2011-03-19 09:47:25 +0000
2011-03-19 09:44:30 +00:00
Richard Levitte
345e515735
file install-crypto.com was added on branch OpenSSL_1_0_1-stable on 2011-03-19 09:47:25 +0000
2011-03-19 09:44:29 +00:00
Richard Levitte
945982b0b2
file vms_decc_init.c was added on branch OpenSSL_1_0_1-stable on 2011-03-19 09:47:21 +0000
2011-03-19 09:44:27 +00:00
Richard Levitte
18ad9cbd10
file install-apps.com was added on branch OpenSSL_1_0_1-stable on 2011-03-19 09:47:21 +0000
2011-03-19 09:44:26 +00:00
Richard Levitte
f433a75569
file openssl_undo.com was added on branch OpenSSL_1_0_1-stable on 2011-03-19 09:47:19 +0000
2011-03-19 09:44:25 +00:00
Richard Levitte
b05389c825
file openssl_startup.com was added on branch OpenSSL_1_0_1-stable on 2011-03-19 09:47:19 +0000
2011-03-19 09:44:24 +00:00
Richard Levitte
68875fdf32
file install-vms.com was added on branch OpenSSL_1_0_1-stable on 2011-03-19 09:47:19 +0000
2011-03-19 09:44:23 +00:00
Dr. Stephen Henson
3393e0c02c
Fix SRP error codes (from HEAD).
2011-03-16 16:55:12 +00:00
Ben Laurie
a149b2466e
Add SRP.
2011-03-16 11:26:40 +00:00
Dr. Stephen Henson
13e230d505
PR: 2469
...
Submitted by: Jim Studt <jim@studt.net >
Reviewed by: steve
Check mac is present before trying to retrieve mac iteration count.
2011-03-13 18:20:23 +00:00
Dr. Stephen Henson
80b3d7a3c9
Remove redundant check to stop compiler warning.
2011-03-12 17:05:58 +00:00
Ben Laurie
4bd48de60c
Fix warning.
2011-03-12 12:18:34 +00:00
Dr. Stephen Henson
2eab92f8e3
make no-dsa work again
2011-03-10 18:27:13 +00:00
Andy Polyakov
2bbd82cf24
s390x-mont.pl: optimize for z196.
2011-03-04 13:13:04 +00:00
Andy Polyakov
1bfd3d7f58
dso_dlfcn.c: make it work on Tru64 4.0 [from HEAD].
2011-02-12 16:47:12 +00:00
Bodo Möller
cd77b3e88b
Sync with 1.0.0 branch.
...
(CVE-2011-0014 OCSP stapling fix has been applied to the 1.0.1 branch as well.)
2011-02-08 19:08:32 +00:00
Bodo Möller
8c93c4dd42
OCSP stapling fix (OpenSSL 0.9.8r/1.0.0d)
...
Submitted by: Neel Mehta, Adam Langley, Bodo Moeller
2011-02-08 17:48:41 +00:00
Bodo Möller
45d63a5408
Synchronize with 1.0.0 branch
2011-02-08 08:48:34 +00:00
Dr. Stephen Henson
decef971f4
add -stripcr option to copy.pl from 0.9.8
2011-02-03 14:58:02 +00:00
Bodo Möller
a288aaefc4
Assorted bugfixes:
...
- safestack macro changes for C++ were incomplete
- RLE decompression boundary case
- SSL 2.0 key arg length check
Submitted by: Google (Adam Langley, Neel Mehta, Bodo Moeller)
2011-02-03 12:03:57 +00:00
Bodo Möller
eed56c77b4
fix omission
2011-02-03 11:19:52 +00:00
Bodo Möller
346601bc32
CVE-2010-4180 fix (from OpenSSL_1_0_0-stable)
2011-02-03 10:42:00 +00:00
Dr. Stephen Henson
5080fbbef0
Since FIPS 186-3 specifies we use the leftmost bits of the digest
...
we shouldn't reject digest lengths larger than SHA256: the FIPS
algorithm tests include SHA384 and SHA512 tests.
2011-02-01 12:53:47 +00:00
Dr. Stephen Henson
b5b724348d
stop warnings about no previous prototype when compiling shared engines
2011-01-30 01:55:29 +00:00
Dr. Stephen Henson
c3ee90d8ca
FIPS mode changes to make RNG compile (this will need updating later as we
...
need a whole new PRNG for FIPS).
1. avoid use of ERR_peek().
2. If compiling with FIPS use small FIPS EVP and disable ENGINE
2011-01-26 14:55:23 +00:00
Dr. Stephen Henson
e1435034ae
FIPS_allow_md5() no longer exists and is no longer required
2011-01-26 12:25:51 +00:00
Richard Levitte
bf35c5dc7f
Add rsa_crpt
2011-01-26 06:32:22 +00:00
Dr. Stephen Henson
c42d223ac2
Move RSA encryption functions to new file crypto/rsa/rsa_crpt.c to separate
...
crypto and ENGINE dependencies in RSA library.
2011-01-25 17:43:20 +00:00
Dr. Stephen Henson
d5654d2b20
Move BN_options function to bn_print.c to remove dependency for BIO printf
...
routines from bn_lib.c
2011-01-25 17:10:42 +00:00
Dr. Stephen Henson
a7508fec1a
Move DSA_sign, DSA_verify to dsa_asn1.c and include separate versions of
...
DSA_SIG_new() and DSA_SIG_free() to remove ASN1 dependencies from DSA_do_sign()
and DSA_do_verify().
2011-01-25 16:55:27 +00:00
Dr. Stephen Henson
c31945e682
recalculate DSA signature if r or s is zero (FIPS 186-3 requirement)
2011-01-25 16:02:27 +00:00
Dr. Stephen Henson
d3203b931e
PR: 2433
...
Submitted by: Chris Wilson <chris@qwirx.com >
Reviewed by: steve
Constify ASN1_STRING_set_default_mask_asc().
2011-01-24 16:20:05 +00:00
Dr. Stephen Henson
947f4e90c3
New function EC_KEY_set_affine_coordinates() this performs all the
...
NIST PKV tests.
2011-01-24 16:09:57 +00:00
Dr. Stephen Henson
d184c7b271
check EC public key isn't point at infinity
2011-01-24 15:07:47 +00:00
Dr. Stephen Henson
913488c066
PR: 1612
...
Submitted by: Robert Jackson <robert@rjsweb.net >
Reviewed by: steve
Fix EC_POINT_cmp function for case where b but not a is the point at infinity.
2011-01-24 14:41:49 +00:00
Dr. Stephen Henson
7fa27d9ac6
Add additional parameter to dsa_builtin_paramgen to output the generated
...
seed to: this doesn't introduce any binary compatibility issues as the
function is only used internally.
The seed output is needed for FIPS 140-2 algorithm testing: the functionality
used to be in DSA_generate_parameters_ex() but was removed in OpenSSL 1.0.0
2011-01-19 14:46:42 +00:00
Dr. Stephen Henson
c341b9cce5
add va_list version of ERR_add_error_data
2011-01-14 15:13:59 +00:00
Dr. Stephen Henson
bbbf0d45ba
stop warning with no-engine
2011-01-13 15:42:47 +00:00
Richard Levitte
114c402d9e
PR: 2425
...
Synchronise VMS build with Unixly build.
2011-01-10 20:55:27 +00:00
Dr. Stephen Henson
d51519eba4
add buf_str.c file
2011-01-09 13:30:58 +00:00
Dr. Stephen Henson
e650f9988b
move some string utilities to buf_str.c to reduce some dependencies (from 0.9.8 branch).
2011-01-09 13:30:34 +00:00
Dr. Stephen Henson
8ed8454115
add X9.31 prime generation routines from 0.9.8 branch
2011-01-09 13:22:47 +00:00
Richard Levitte
6e101bebb1
PR: 2407
...
Fix fault include.
Submitted by Arpadffy Zoltan <Zoltan.Arpadffy@scientificgames.se >
2011-01-06 20:56:04 +00:00
Dr. Stephen Henson
4577b38d22
Don't use decryption_failed alert for TLS v1.1 or later.
2011-01-04 19:39:42 +00:00
Dr. Stephen Henson
a8515e2d28
Since DTLS 1.0 is based on TLS 1.1 we should never return a decryption_failed
...
alert.
2011-01-04 19:33:30 +00:00
Dr. Stephen Henson
964e91052e
oops missed an assert
2011-01-03 12:52:11 +00:00
Dr. Stephen Henson
4e55e69bff
PR: 2411
...
Submitted by: Rob Austein <sra@hactrn.net >
Reviewed by: steve
Fix corner cases in RFC3779 code.
2011-01-03 01:40:45 +00:00
Dr. Stephen Henson
e501dbb658
Fix escaping code for string printing. If *any* escaping is enabled we
...
must escape the escape character itself (backslash).
2011-01-03 01:30:58 +00:00
Dr. Stephen Henson
20e505e4b7
PR: 2410
...
Submitted by: Rob Austein <sra@hactrn.net >
Reviewed by: steve
Use OPENSSL_assert() instead of assert().
2011-01-03 01:22:27 +00:00
Dr. Stephen Henson
291a26e6e3
PR: 2413
...
Submitted by: Michael Bergandi <mbergandi@gmail.com >
Reviewed by: steve
Fix typo in crypto/bio/bss_dgram.c
2011-01-03 01:07:20 +00:00
Dr. Stephen Henson
0383911887
PR: 2416
...
Submitted by: Mark Phalan <mark.phalan@oracle.com >
Reviewed by: steve
Use L suffix in version number.
2011-01-03 00:26:21 +00:00
Richard Levitte
a5c5eb77b5
Part of the IF structure didn't get pasted here...
...
PR: 2393
2010-12-14 21:44:33 +00:00
Richard Levitte
90d02be7c5
First attempt at adding the possibility to set the pointer size for the builds on VMS.
...
PR: 2393
2010-12-14 19:18:58 +00:00
Andy Polyakov
04221983ac
bss_file.c: refine UTF8 logic [from HEAD].
...
PR: 2382
2010-12-11 14:54:48 +00:00
Dr. Stephen Henson
dfda027ae8
ignore leading null fields
2010-12-03 19:31:23 +00:00
Dr. Stephen Henson
21b5a79121
update FAQ
2010-12-02 19:56:03 +00:00
Dr. Stephen Henson
411a388c62
PR: 2386
...
Submitted by: Stefan Birrer <stefan.birrer@adnovum.ch >
Reviewed by: steve
Correct SKM_ASN1_SET_OF_d2i macro.
2010-12-02 18:02:14 +00:00
Dr. Stephen Henson
61c10d42f6
fix doc typos
2010-12-02 13:45:25 +00:00
Dr. Stephen Henson
68ecfb69a5
use consistent FAQ between version
2010-12-02 00:11:21 +00:00
Andy Polyakov
e62fee8eb3
Configure: make -mno-cygwin optional on mingw platforms [from HEAD].
...
PR: 2381
2010-11-30 22:18:46 +00:00
Dr. Stephen Henson
5566d49103
PR: 2385
...
Submitted by: Stefan Birrer <stefan.birrer@adnovum.ch >
Reviewed by: steve
Zero key->pkey.ptr after it is freed so the structure can be reused.
2010-11-30 19:45:31 +00:00
Richard Levitte
48337a4a35
Better method for creating SSLROOT:.
...
Make sure to include the path to evptest.txt.
2010-11-29 22:27:18 +00:00
Dr. Stephen Henson
2c5c4fca14
apply J-PKAKE fix to HEAD (original by Ben)
2010-11-29 18:33:28 +00:00
Dr. Stephen Henson
4fab95ed20
Some of the MS_STATIC use in crypto/evp is a legacy from the days when
...
EVP_MD_CTX was much larger: it isn't needed anymore.
2010-11-27 17:35:56 +00:00
Dr. Stephen Henson
6c36ca4628
PR: 2240
...
Submitted by: Jack Lloyd <lloyd@randombit.net >, "Mounir IDRASSI" <mounir.idrassi@idrix.net >, steve
Reviewed by: steve
As required by RFC4492 an absent supported points format by a server is
not an error: it should be treated as equivalent to an extension only
containing uncompressed.
2010-11-25 12:27:39 +00:00
Dr. Stephen Henson
9c61c57896
using_ecc doesn't just apply to TLSv1
2010-11-25 11:51:46 +00:00
Dr. Stephen Henson
a618011ca1
add "missing" functions to copy EVP_PKEY_METHOD and examine info
2010-11-24 16:07:45 +00:00
Dr. Stephen Henson
95eef4df79
use generalised mac API for SSL key generation
2010-11-24 13:17:48 +00:00
Dr. Stephen Henson
ec1e714ac1
constify EVP_PKEY_new_mac_key()
2010-11-24 13:14:03 +00:00
Andy Polyakov
736d658080
INSTALL.W32: document trouble with symlinks under MSYS [from HEAD].
...
PR: 2377
2010-11-23 23:01:22 +00:00
Richard Levitte
aa2920584e
Implement bc test strategy as submitted by Steven M. Schweda <sms@antinode.info>.
...
Make sure we move to '__here' before trying to use it to build local sslroot:
2010-11-23 02:12:14 +00:00
Richard Levitte
9d13bfc258
Print openssl version information at the end of the tests
2010-11-23 01:06:13 +00:00
Richard Levitte
e43633011c
Give the architecture dependent directory higher priority
2010-11-23 01:05:32 +00:00
Richard Levitte
97027f7fb3
Don't define an empty CFLAGS, it's much more honest not to defined it at all.
...
Make sure to remove any [.CRYTO]BUILDINF.H so it doesn't get used instead of
[.CRYPTO._''ARCH'BUILDINF.H
2010-11-23 01:04:07 +00:00
Richard Levitte
bf5adc9be4
* tests.com: Add the symbol openssl_conf, so the openssl application
...
stops complaining about a missing configuration file. Define the logical
name PERL_ENV_TABLES with values to Perl considers the DCL symbol table
as part of the environment (see 'man perlvms' for details), so cms-test.pl
can get the value of EXE_DIR from tests.com, among others.
* cms-test.pl: Make changes to have it work on VMS as well. Upper or mixed
case options need to be quoted and the openssl command needs a VMS-specific
treatment. It all should work properly on Unix, I hope it does on Windows
as well...
2010-11-22 23:42:48 +00:00
Andy Polyakov
7665b436f0
s390x.S: fix typo in bn_mul_words [from HEAD].
...
PR: 2380
2010-11-22 21:57:29 +00:00
Dr. Stephen Henson
ffca7b85c2
PR: 2376
...
Submitted by: Guenter <lists@gknw.net >
Reviewed by: steve
Cleanup alloca use, fix Win32 target for OpenWatcom.
2010-11-19 00:11:44 +00:00
Dr. Stephen Henson
eef2fa00d9
PR: 2375
...
Submitted by: Guenter <lists@gknw.net >
Reviewed by: steve
cleanup/fix e_aep.c for OpenWatcom
2010-11-18 22:59:53 +00:00
Dr. Stephen Henson
c55551ad7c
PR: 2374
...
Submitted by: Guenter <lists@gknw.net >
Reviewed by: steve
Don't compile capi ENGINE on mingw32
2010-11-18 22:56:53 +00:00
Richard Levitte
c91b521111
Tell the user what test is being performed.
2010-11-18 22:46:55 +00:00
Richard Levitte
deb35e3e2c
Make sure the source directory for ASN1TEST is defined.
2010-11-18 22:45:29 +00:00
Richard Levitte
5e2d3c9ec1
We expect these scripts not to bail on error, so make sure that's what happens.
2010-11-18 22:31:01 +00:00
Richard Levitte
dda454434b
Synchronise with Unix tests
2010-11-18 22:24:22 +00:00
Richard Levitte
b97d371ce0
We redid the structure on architecture dependent source files, but
...
apparently forgot to adapt the copying to the installation directory.
2010-11-18 20:02:54 +00:00
Dr. Stephen Henson
a25c98ac73
remove duplicate statement
2010-11-18 17:33:44 +00:00
Dr. Stephen Henson
fd47013111
add ACKNOWLEDGEMENTS file to 1.0.1 branch
2010-11-18 17:26:51 +00:00
Dr. Stephen Henson
b3aa469c21
compile cts128.c on VMS
2010-11-18 17:04:37 +00:00
Dr. Stephen Henson
981c0de27a
fix no SIGALRM case in speed.c
2010-11-18 13:22:42 +00:00
Dr. Stephen Henson
1bfe9acbbf
PR: 2372
...
Submitted by: "W.C.A. Wijngaards" <wouter@nlnetlabs.nl >
Reviewed by: steve
Fix OpenBSD compilation failure.
2010-11-18 12:29:38 +00:00
Dr. Stephen Henson
2d1e9ce753
oops, reinstate TLSv1 string
2010-11-17 18:16:57 +00:00
Dr. Stephen Henson
19043426b9
backport AES EVP ctr mode changes from HEAD
2010-11-17 17:46:23 +00:00
Dr. Stephen Henson
6e21ce592e
fix CVE-2010-3864
2010-11-17 17:36:29 +00:00
Dr. Stephen Henson
975c6efbe4
sync OIDs with HEAD
2010-11-17 17:26:10 +00:00
Dr. Stephen Henson
972491aece
If EVP_PKEY structure contains an ENGINE the key is ENGINE specific and
...
we should use its method instead of any generic one.
2010-11-16 12:11:31 +00:00
Dr. Stephen Henson
1a8ecda3ee
Only use explicit IV if cipher is in CBC mode.
2010-11-14 17:47:21 +00:00
Dr. Stephen Henson
d36c7b618d
Get correct GOST private key instead of just assuming the last one is
...
correct: this isn't always true if we have more than one certificate.
2010-11-14 13:50:42 +00:00
Dr. Stephen Henson
251431ff4f
add TLS v1.1 options to s_server
2010-11-13 12:44:17 +00:00
Dr. Stephen Henson
1a3052793e
Submitted By: Bogdan Harjoc <harjoc@gmail.com>
...
Add missing debug WIN64 targets.
2010-11-11 15:23:32 +00:00
Dr. Stephen Henson
84fbc56fd0
PR: 2366
...
Submitted by: Damien Miller <djm@mindrot.org >
Reviewed by: steve
Stop pkeyutl crashing if some arguments are missing. Also make str2fmt
tolerate NULL parameter.
2010-11-11 14:42:34 +00:00
Dr. Stephen Henson
4444ff7632
Submitted by: Jonathan Dixon <joth@chromium.org>
...
Reviewed by: steve
If store is NULL set flags correctly.
2010-11-02 15:58:05 +00:00
Dr. Stephen Henson
7770da4b41
PR: 2295
...
Submitted by: Alexei Khlebnikov <alexei.khlebnikov@opera.com >
Reviewed by: steve
OOM checking. Leak in OOM fix. Fall-through comment. Duplicate code
elimination.
2010-10-11 23:25:23 +00:00
Andy Polyakov
7202a4d42b
x86_64-xlate.pl: fix LNK4078 and LNK4210 link warnings [from HEAD].
...
PR: 2356
2010-10-10 21:12:18 +00:00
Dr. Stephen Henson
3fa29765fd
PR: 2314
...
Submitted by: Mounir IDRASSI <mounir.idrassi@idrix.net >
Reviewed by: steve
Fix for double free bug in ssl/s3_clnt.c CVE-2010-2939
2010-10-10 12:27:19 +00:00
Dr. Stephen Henson
b9e468c163
We can't always read 6 bytes in an OCSP response: fix so error statuses
...
are read correctly for non-blocking I/O.
2010-10-06 18:01:14 +00:00
Dr. Stephen Henson
0172ad2902
Minor documentation fixes, PR#2345
2010-10-04 13:28:27 +00:00
Dr. Stephen Henson
d9aa352ff0
Minor documentation fixes, PR#2344
2010-10-04 13:24:07 +00:00
Dr. Stephen Henson
945ba0300d
Add call to ENGINE_register_all_complete() to ENGINE_load_builtin_engines(),
...
this means that some implementations will be used automatically, e.g. aesni,
we do this for cryptodev anyway.
Setup cpuid in ENGINE_load_builtin_engines() too as some ENGINEs use it.
2010-10-03 18:56:25 +00:00
Andy Polyakov
9e15cc606e
Alpha assembler pack: adapt for Linux [from HEAD].
...
PR: 2335
2010-09-13 20:32:53 +00:00
Andy Polyakov
e011160f3c
VC-32.pl: default to nasm if neither nasm or nasmw is is found at the moment [from HEAD].
...
PR: 2338
2010-09-13 16:29:00 +00:00
Andy Polyakov
9447da5065
crypto/bn/asm/s390x.S: drop redundant instructions [from HEAD].
2010-09-10 14:55:34 +00:00
Andy Polyakov
387ed39f6d
sparcv9cap.c: disengange Solaris-specific CPU detection routine in favour
...
of unified procedure relying on SIGILL [from HEAD].
PR: 2321
2010-09-05 19:48:19 +00:00
Dr. Stephen Henson
e50e5f9336
make no-gost work on Windows
2010-09-02 17:23:58 +00:00
Dr. Stephen Henson
6f0d9950f3
fix bug in AES_unwrap()
2010-08-30 23:58:47 +00:00
Bodo Möller
4705ff7d6d
More C language police work.
2010-08-27 13:17:58 +00:00
Dr. Stephen Henson
36778eb231
PR: 1833
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix other cases not covered by original patch. (correct patch this time!)
2010-08-27 12:12:07 +00:00
Dr. Stephen Henson
c6dd154b3e
oops, revert previous patch
2010-08-27 12:10:12 +00:00
Bodo Möller
74b5feea7b
C conformity fixes: Move declarations before statements in all blocks.
2010-08-27 12:07:12 +00:00
Dr. Stephen Henson
35cae95032
PR: 1833
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix other cases not covered by original patch.
2010-08-27 11:57:42 +00:00
Bodo Möller
11a36aa96f
C conformity fixes:
...
- Move declarations before statements in all blocks.
- Where 64-bit type is required, use it explicitly (not 1l).
2010-08-27 11:29:09 +00:00
Bodo Möller
9b0e97ae10
Update version numbers
2010-08-26 18:45:21 +00:00
Bodo Möller
02ba02604c
Patch from PR #1833 was broken: there's no s->s3->new_session
...
(only s->new_session).
2010-08-26 14:54:18 +00:00
Bodo Möller
42ecf418f5
(formatting error)
2010-08-26 14:38:49 +00:00
Bodo Möller
48ce525d16
New 64-bit optimized implementation EC_GFp_nistp224_method().
...
Binary compatibility is not affected as this will only be
compiled in if explicitly requested (#ifdef EC_NISTP224_64_GCC_128).
Submitted by: Emilia Kasper (Google)
2010-08-26 14:29:27 +00:00
Dr. Stephen Henson
3081e2ca73
update ordinals
2010-08-26 14:25:53 +00:00
Dr. Stephen Henson
48ae85b6ff
PR: 1833
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Support for abbreviated handshakes when renegotiating.
2010-08-26 14:22:40 +00:00
Bodo Möller
82281ce47d
ECC library bugfixes.
...
Submitted by: Emilia Kapser (Google)
2010-08-26 12:10:57 +00:00
Bodo Möller
4ecd2bafbb
Harmonize with OpenSSL_1_0_0-stable version of CHANGES.
2010-08-26 11:21:49 +00:00
Andy Polyakov
308b9ad8f0
util/cygwin.sh: maintainer's update [from HEAD].
...
Submitted by: Corinna Vinschen
2010-08-24 21:52:15 +00:00
Andy Polyakov
73b408c242
engine/Makefile: harmonize engine install rule for .dylib extension on MacOS X [from HEAD].
...
PR: 2319
2010-08-24 21:46:58 +00:00
Andy Polyakov
51c9eb321a
Makefile.shared: fix brown-bag typo in link_o.darwin [from HEAD].
...
PR: 2319
2010-08-21 11:37:17 +00:00
Andy Polyakov
1657fca2f4
sha1-armv4-large.pl: reschedule instructions for dual-issue pipeline [from HEAD]
...
.
2010-08-03 15:36:52 +00:00
Andy Polyakov
0d25aad90d
Make inline assembler clang-friendly [from HEAD].
2010-08-02 21:54:48 +00:00
Andy Polyakov
b8c1cb1c2c
alphacpuid.pl: fix brown-bag bug [from HEAD].
2010-07-28 08:18:46 +00:00
Andy Polyakov
6e1d44fd56
Replace alphacpuid.s with alphacpuid.pl to ensure it makes to release tar-balls [from HEAD].
...
PR: 2309
2010-07-26 22:11:23 +00:00
Dr. Stephen Henson
528ff4b451
Add modes.h to mkdef.pl, update ordinals.
2010-07-25 17:48:35 +00:00
Dr. Stephen Henson
f6c29ba3dc
Fix WIN32 build system to correctly link ENGINE DLLs contained in a
...
directory: currently the GOST ENGINE is the only case.
2010-07-24 17:55:47 +00:00
Dr. Stephen Henson
160f9b5bf6
Add call to ENGINE_register_all_complete() to ENGINE_load_builtin_engines(),
...
this means that some implementations will be used automatically, e.g. aesni,
we do this for cryptodev anyway.
Setup cpuid in ENGINE_load_builtin_engines() too as some ENGINEs use it.
2010-07-21 16:23:59 +00:00
Dr. Stephen Henson
53e7985c8d
PR: 1830
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >, Steve Henson
Support for RFC5705 key extractor.
2010-07-18 17:39:46 +00:00
Andy Polyakov
9102342795
Configure: suppress $multilib with non-system $prefix [from HEAD].
...
PR: 2307
2010-07-16 08:14:11 +00:00
Andy Polyakov
c4488936b2
Makefile.shared: update link_o.darwin rule [from HEAD].
...
PR: 2306
2010-07-16 08:11:43 +00:00
Andy Polyakov
4e2b990734
ARM assembler pack: reschedule instructions for dual-issue pipeline [from HEAD].
...
Modest improvement coefficients mean that code already had some
parallelism and there was not very much room for improvement. Special
thanks to Ted Krovetz for benchmarking the code with such patience.
2010-07-13 14:08:22 +00:00
Dr. Stephen Henson
6ca1418587
PR: 2297
...
Submitted by: Antony, Benoy <bantony@ebay.com >
Approved by: steve@openssl.org
Fix bug in AES wrap code when t > 0xff.
2010-07-09 17:25:46 +00:00
Andy Polyakov
30dd06812e
INSTALL.W32: mention _OPENSSL_isservice() [from HEAD].
...
PR: 2194
2010-07-09 14:32:22 +00:00
Andy Polyakov
b29b89ef21
rand_nw.c: compensate for gcc bug (using %edx instead of %eax at -O3)
...
[from HEAD].
PR: 2296
2010-07-08 09:15:49 +00:00
Andy Polyakov
81ae27d56a
PROBLEMS: MacOS X is not necessarily a problem anymore [from HEAD].
2010-07-08 09:02:22 +00:00
Andy Polyakov
f90bf72280
sparcv9cap.c: reiterate CPU detection logic [from HEAD].
2010-07-08 07:52:36 +00:00
Dr. Stephen Henson
abcf7aa591
crypto/sparc*: elininate _sparcv9_rdwrasi [from HEAD], original from Andy.
2010-07-05 22:22:22 +00:00
Dr. Stephen Henson
40b6d49387
SPARCv9 assembler pack: refine CPU detection on Linux, fix for "unaligned
...
opcodes detected in executable segment" error [from HEAD], original from Andy.
2010-07-05 22:20:36 +00:00
Dr. Stephen Henson
497b4f92d2
i variable is used on some platforms
2010-07-05 11:03:50 +00:00
Dr. Stephen Henson
28566b4966
no need for empty fragments with TLS 1.1 and later due to explicit IV
2010-06-27 14:42:43 +00:00
Dr. Stephen Henson
b4b15f68c0
Backport TLS v1.1 support from HEAD, ssl/ changes
2010-06-27 14:22:11 +00:00
Dr. Stephen Henson
1eb1cf452b
Backport TLS v1.1 support from HEAD
2010-06-27 14:15:02 +00:00
Dr. Stephen Henson
c549810def
update versions for 1.0.1
2010-06-16 13:48:00 +00:00
cvs2svn
0d0ed9187a
This commit was manufactured by cvs2svn to create branch
...
'OpenSSL_1_0_1-stable'.
2010-06-16 13:37:23 +00:00
Dr. Stephen Henson
dfa81d9efb
update README, fix opensslv.h
2010-06-16 13:37:22 +00:00
Dr. Stephen Henson
1dba06e7b0
update for next version
2010-06-16 13:34:33 +00:00
Dr. Stephen Henson
daac87be95
clarify comment
2010-06-16 13:17:22 +00:00
Dr. Stephen Henson
e97359435e
Fix warnings (From HEAD, original patch by Ben).
2010-06-15 17:25:15 +00:00
Andy Polyakov
afce9bcca1
VC-32.pl: fix /Fd name generation [from HEAD].
...
PR: 2284
2010-06-09 15:49:09 +00:00
Dr. Stephen Henson
9c7baca820
prepare for release
2010-06-01 13:31:38 +00:00
Dr. Stephen Henson
618265e645
Fix CVE-2010-1633 and CVE-2010-0742.
2010-06-01 13:17:06 +00:00
Andy Polyakov
9728978b75
VC-32.pl: unconditionally generate symbols.pdb [from HEAD].
2010-06-01 06:03:20 +00:00
Andy Polyakov
938c0bbae1
x86_64-xlate.pl: updates from HEAD.
2010-06-01 05:57:26 +00:00
Andy Polyakov
a0cd818831
Configure: update mingw config-lines [from HEAD].
2010-06-01 05:53:35 +00:00
Dr. Stephen Henson
31c4ab5401
fix PR#2261 in a different way
2010-05-31 13:18:08 +00:00
Dr. Stephen Henson
1f65529824
PR: 2278
...
Submitted By: Mattias Ellert <mattias.ellert@fysast.uu.se >
Fix type checking macro SKM_ASN1_SET_OF_i2d
2010-05-29 12:49:48 +00:00
Dr. Stephen Henson
5b3a6eedd1
update NEWS
2010-05-27 15:05:01 +00:00
Dr. Stephen Henson
6938440d68
PR: 2262
...
Submitted By: Victor Wagner <vitus@cryptocom.ru >
Fix error reporting in load_key function.
2010-05-27 14:09:13 +00:00
Dr. Stephen Henson
57ec6c9bad
PR: 2261
...
Submitted By: De Rudder, Stephen L." <s_derudder@tditx.com >
Workaround for newer Windows headers which define EADDRINUSE but not to the
same value as WSAEADDRINUSE.
2010-05-27 13:07:45 +00:00
Dr. Stephen Henson
7a09bc4068
PR: 2258
...
Submitted By: Ger Hobbelt <ger@hobbelt.com >
Base64 BIO fixes:
Use OPENSSL_assert() instead of assert().
Use memmove() as buffers overlap.
Fix write retry logic.
2010-05-27 12:41:20 +00:00
Dr. Stephen Henson
deb15645a8
PR: 2266
...
Submitted By: Jonathan Gray <jsg@goblin.cx >
Correct ioctl definitions.
2010-05-26 23:23:44 +00:00
Dr. Stephen Henson
f0b358e8b9
Avoid use of ex_data free function in Chil ENGINE so it can be safely
...
reloaded.
2010-05-26 16:17:06 +00:00
Dr. Stephen Henson
dce2b5a8fc
PR: 2254
...
Submitted by: Ger Hobbelt <ger@hobbelt.com >
Approved by: steve@openssl.org
Check for <= 0 i2d return value.
2010-05-22 00:40:58 +00:00
Dr. Stephen Henson
59d100d959
PR: 2251
...
Submitted by: Ger Hobbelt <ger@hobbelt.com >
Approved by: steve@openssl.org
Memleak, BIO chain leak and realloc checks in v3_pci.c
2010-05-22 00:31:02 +00:00
Dr. Stephen Henson
d497b5362b
oops, typo
2010-05-20 17:35:37 +00:00
Dr. Stephen Henson
369b0abdc2
Update cms-test.pl to handle some Unix like Windows environments where
...
calling shlib_wrap.sh doesn't work.
2010-05-20 17:28:51 +00:00
Dr. Stephen Henson
72240ab31a
PR: 2259
...
Submitted By: Artem Chuprina <ran@cryptocom.ru >
Check return values of HMAC in tls_P_hash and tls1_generate_key_block.
Although the previous version could in theory crash that would only happen if a
digest call failed. The standard software methods can never fail and only one
ENGINE currently uses digests and it is not compiled in by default.
2010-05-17 11:26:56 +00:00
Dr. Stephen Henson
dc4e1ddc9f
PR: 2253
...
Submitted By: Ger Hobbelt <ger@hobbelt.com >
Check callback return value when outputting errors.
2010-05-15 00:36:12 +00:00
Dr. Stephen Henson
ff656346fa
PR: 2255
...
Submitted By: Ger Hobbelt <ger@hobbelt.com >
Place RSA dependent variable under #ifndef OPENSSL_NO_RSA
2010-05-15 00:19:57 +00:00
Dr. Stephen Henson
ca91057d50
PR: 2252
...
Submitted By: Ger Hobbelt <ger@hobbelt.com >
Update docs to BIO_f_buffer()
2010-05-03 15:29:51 +00:00
Dr. Stephen Henson
8c1e7de6cb
PR: 2230
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix bug in bitmask macros and stop warnings.
2010-05-03 13:01:50 +00:00
Dr. Stephen Henson
207886cd3a
PR: 2244
...
Submitted By: "PMHager" <hager@dortmund.net >
Initialise pkey callback to 0.
2010-05-03 12:50:52 +00:00
Andy Polyakov
336d1ee733
bss_file.c: reserve for option to encode file name in UTF-8 on Windows
...
[from HEAD].
2010-04-28 20:04:37 +00:00
Andy Polyakov
bed2b769f5
md5-ia64.S: fix assembler warning [from HEAD].
2010-04-20 20:41:23 +00:00
Dr. Stephen Henson
26029d9c4c
PR: 2241
...
Submitted By: Artemy Lebedev <vagran.ast@gmail.com >
Typo.
2010-04-20 12:53:05 +00:00
Dr. Stephen Henson
c64c888929
oops, commit Configure part of PR#2234
2010-04-15 13:17:05 +00:00
Dr. Stephen Henson
8d9db41880
PR: 2234
...
Submitted By: Matthias Andree <matthias.andree@gmx.de >
Use correct path to openssl utility in c_rehash script.
2010-04-14 23:07:28 +00:00
Dr. Stephen Henson
4fae54a8e0
PR: 2235
...
Submitted By: Bruce Stephens <bruce.stephens@isode.com >
Make ts/Makefile consistent with other Makefiles.
2010-04-14 23:04:19 +00:00
Andy Polyakov
9f35928719
x86_64cpuid.pl: ml64 is allergic to db on label line [from HEAD].
2010-04-14 19:25:09 +00:00
Dr. Stephen Henson
c5af032df5
update FAQ
2010-04-14 13:20:53 +00:00
Andy Polyakov
8a898a6fcc
[co]cf128.c: fix "n=0" bug [from HEAD].
2010-04-14 07:47:53 +00:00
Dr. Stephen Henson
9f827ded1c
fix signed/unsigned comparison warnings
2010-04-14 00:41:01 +00:00
Dr. Stephen Henson
5daa9411a0
fix bug in ccgost CFB mode code
2010-04-14 00:33:22 +00:00
Dr. Stephen Henson
094d4019b8
check ASN1 type before using it
2010-04-14 00:30:12 +00:00
Dr. Stephen Henson
1507f3abba
PR: 2230
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix various DTLS fragment reassembly bugs.
2010-04-14 00:17:29 +00:00
Dr. Stephen Henson
30e8defe52
PR: 2229
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Don't drop DTLS connection if mac or decryption failed.
2010-04-14 00:09:55 +00:00
Dr. Stephen Henson
9f4dd3e3e3
PR: 2228
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix DTLS buffer record MAC failure bug.
2010-04-14 00:03:13 +00:00
Dr. Stephen Henson
8c00014d7e
make update
2010-04-13 17:08:50 +00:00
Richard Levitte
1cf12a6350
No need to look for the file if none was entered.
2010-04-13 14:39:58 +00:00
Richard Levitte
dc9461e23f
A few more things that aren't built on VAX
2010-04-13 14:39:08 +00:00
Richard Levitte
72d57050df
Since test modules aren't copied to the test/ directory any more on
...
VMS, we need to rework this script with knowledge of where they are.
2010-04-13 14:38:39 +00:00
Richard Levitte
49d1f665a4
Rework the way engines are built
2010-04-13 14:37:43 +00:00
Richard Levitte
2c25edc4c1
Too long symbols
2010-04-13 14:36:58 +00:00
Richard Levitte
d2f098b33d
Spelling
2010-04-13 14:34:48 +00:00
Richard Levitte
6f4f7f35f3
Rework the configuration of avoided algorithms.
...
Avoid copying test modules.
2010-04-13 14:33:04 +00:00
Richard Levitte
0a4fe6c8db
Undo the previous change, it was incorrect in this branch.
2010-04-13 11:10:07 +00:00
Richard Levitte
7bba401d5d
Third argument to dtls1_buffer_record is by reference
2010-04-13 08:41:58 +00:00
Andy Polyakov
c73cff12f1
aes-ppc.pl: 10% performance improvement on Power6 [from HEAD].
2010-04-10 14:54:34 +00:00
Andy Polyakov
b32d93840e
cryptlib.c: allow application to override OPENSSL_isservice [from HEAD].
2010-04-10 14:13:12 +00:00
Andy Polyakov
cb457849fd
ctr129.c: fix typo, simplify ctr128_inc and fix "n=0" bug [from HEAD].
2010-04-10 13:47:11 +00:00
Andy Polyakov
cb3c30059a
darwin-ppc-cc: add -Wa,-force_cpusubtype_ALL to produce binaries not
...
specific to G5. This was already added to HEAD earlier.
PR: 2231
2010-04-10 13:41:58 +00:00
Andy Polyakov
20dc93e49e
sparccpuid.S: some assembler is allergic to apostrophes in comments [from HEAD].
2010-04-10 13:37:06 +00:00
Andy Polyakov
b620447dcc
alpha-mont.pl: comply with stack alignment requirement [from HEAD].
2010-04-10 13:33:46 +00:00
Dr. Stephen Henson
4ffd2ad1d3
make GOST MAC work again
2010-04-08 10:54:54 +00:00
Dr. Stephen Henson
acc9938ba5
Add SHA2 algorithms to SSL_library_init(). Although these aren't used
...
directly by SSL/TLS SHA2 certificates are becoming more common and
applications that only call SSL_library_init() and not
OpenSSL_add_all_alrgorithms() will fail when verifying certificates.
Update docs.
2010-04-07 13:18:30 +00:00
Dr. Stephen Henson
f6d13ac8cf
Remove obsolete PRNG note. Add comment about use of SHA256 et al.
2010-04-06 15:05:47 +00:00
Dr. Stephen Henson
24cb653c6b
PR: 2209
...
Submitted Daniel Mentz <danielml@sent.com >
Documentation typo.
2010-04-06 14:45:31 +00:00
Dr. Stephen Henson
6dfd3cf68e
PR: 2218
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fixes for DTLS replay bug.
2010-04-06 12:44:55 +00:00
Dr. Stephen Henson
073775cbbb
PR: 2219
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fixes for DTLS buffering bug.
2010-04-06 12:40:10 +00:00
Dr. Stephen Henson
e995d5044e
PR: 2223
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fixes for DTLS timeout bug
2010-04-06 12:29:21 +00:00
Dr. Stephen Henson
5b0a79a27a
PR: 2220
...
Fixes to make OpenSSL compile with no-rc4
2010-04-06 11:18:32 +00:00
Dr. Stephen Henson
6747de655e
updates for next release
2010-03-30 00:55:00 +00:00
Dr. Stephen Henson
91bad2b09e
Prepare for 1.0.0 release - finally ;-)
2010-03-29 13:11:54 +00:00
Andy Polyakov
1244d5b713
ARMv4 assembler: [unconfirmed] fix for compilation failure [from HEAD].
2010-03-29 09:59:58 +00:00
Andy Polyakov
c0ed5cd47b
dso_dlfcn.c: fix compile failure on Tru64 [from HEAD].
2010-03-29 09:50:33 +00:00
Dr. Stephen Henson
c8281fd38e
PR: 1696
...
Check return value if d2i_PBEPARAM().
2010-03-28 00:42:29 +00:00
Dr. Stephen Henson
fe8e6bff9b
PR: 1763
...
Remove useless num = 0 assignment.
Remove redundant cases on sock_ctrl(): default case handles them.
2010-03-27 23:28:23 +00:00
Dr. Stephen Henson
9caf25d144
PR: 1904
...
Submitted by: David Woodhouse <dwmw2@infradead.org >
Pass passphrase minimum length down to UI.
2010-03-27 19:27:51 +00:00
Dr. Stephen Henson
348620c7ac
PR: 1813
...
Submitted by: Torsten Hilbrich <torsten.hilbrich@secunet.com >
Fix memory leak when engine name cannot be loaded.
2010-03-27 18:28:13 +00:00
Dr. Stephen Henson
30fc2ab92b
update FAQ
2010-03-25 12:07:45 +00:00
Bodo Möller
5b5464d525
Fix for "Record of death" vulnerability CVE-2010-0740.
...
Also, add missing CHANGES entry for CVE-2009-3245 (code changes submitted to this branch on 23 Feb 2010).
2010-03-25 11:22:42 +00:00
Dr. Stephen Henson
cd15a0528f
initialise buf if wrong_info not used
2010-03-24 23:42:20 +00:00
Dr. Stephen Henson
7b52778eff
PR: 1731 and maybe 2197
...
Clear error queue in a few places in SSL code where errors are expected
so they don't stay in the queue.
2010-03-24 23:16:49 +00:00
Andy Polyakov
162de2f2b5
rand_win.c: fix logical bug in readscreen [from HEAD].
2010-03-22 22:44:35 +00:00
Andy Polyakov
f6e4af6fd7
bss_file.c: fix MSC 6.0 warning [from HEAD].
2010-03-22 22:39:46 +00:00
Andy Polyakov
32b76dcdac
e_capi.c: fix typo.
2010-03-15 22:29:20 +00:00
Andy Polyakov
bcfd252052
Fix UPLINK typo [from HEAD].
2010-03-15 22:26:33 +00:00
Dr. Stephen Henson
32c452779e
workaround for missing definition in some headers
2010-03-15 13:09:39 +00:00
Dr. Stephen Henson
118b90c59e
PR: 2192
...
Submitted By: Jaroslav Imrich <jaroslav.imrich@disig.sk >
The prompt_info and wrong_info parameters can be empty strings which
can produce confusing prompts. Treat empty string same as NULL.
2010-03-12 12:48:46 +00:00
Dr. Stephen Henson
f6a61b140e
missing goto meant signature was never printed out
2010-03-12 12:07:05 +00:00
Dr. Stephen Henson
75ece4b5cf
don't leave bogus errors in the queue
2010-03-10 13:48:21 +00:00
Dr. Stephen Henson
724cca4178
make update
2010-03-09 17:23:51 +00:00
Dr. Stephen Henson
5b3fdb0181
PR: 2188
...
Submitted By: Jaroslav Imrich <jaroslav.imrich@disig.sk >
Add "missing" functions to get and set prompt constructor.
2010-03-09 17:18:17 +00:00
Dr. Stephen Henson
fcc3d0265d
PR: 2186
...
Submitted By: "Joel Rabinovitch" <Joel.Rabinovitch@tecsys.com >
Detect aix64-gcc
2010-03-09 17:08:39 +00:00
Dr. Stephen Henson
5356ea7cde
reserve a few more bits for future cipher modes
2010-03-08 23:47:57 +00:00
Dr. Stephen Henson
06226df1a9
The OID sanity check was incorrect. It should only disallow *leading* 0x80
...
values.
2010-03-07 16:40:19 +00:00
Dr. Stephen Henson
bf638ef026
don't add digest alias if signature algorithm is undefined
2010-03-06 20:47:45 +00:00
Dr. Stephen Henson
07973d5db8
Fix memory leak: free up ENGINE functional reference if digest is not
...
found in an ENGINE.
2010-03-05 13:33:43 +00:00
Dr. Stephen Henson
3b3f71121b
PR: 2183
...
PR#1999 broke fork detection by assuming HAVE_FORK was set for all platforms.
Include original HAVE_FORK detection logic while allowing it to be
overridden on specific platforms with -DHAVE_FORK=1 or -DHAVE_FORK=0
2010-03-03 19:56:17 +00:00
Dr. Stephen Henson
47333a34d5
Submitted by: Tomas Hoger <thoger@redhat.com>
...
Fix for CVE-2010-0433 where some kerberos enabled versions of OpenSSL
could be crashed if the relevant tables were not present (e.g. chrooted).
2010-03-03 15:41:00 +00:00
Dr. Stephen Henson
d92138f703
don't mix definitions and code
2010-03-03 15:30:26 +00:00
Andy Polyakov
b2bf335327
Fix s390x-specific HOST_l2c|c2l [from HEAD].
...
Submitted by: Andreas Krebbel
2010-03-02 16:25:10 +00:00
Dr. Stephen Henson
33bec62a20
PR: 2178
...
Submitted by: "Kennedy, Brendan" <brendan.kennedy@intel.com >
Handle error codes correctly: cryptodev returns 0 for success whereas OpenSSL
returns 1.
2010-03-01 23:54:34 +00:00
Dr. Stephen Henson
2e630b1847
use supplied ENGINE in genrsa
2010-03-01 14:22:02 +00:00
Dr. Stephen Henson
002d3fe863
use correct prototype as in HEAD
2010-03-01 03:01:56 +00:00
Dr. Stephen Henson
fb24311e7c
'typo'
2010-03-01 01:52:47 +00:00
Dr. Stephen Henson
90278430d9
make USE_CRYPTODEV_DIGESTS work
2010-03-01 01:19:36 +00:00
Ben Laurie
bcd9d12a8d
Fix warning.
2010-02-28 13:38:16 +00:00
Dr. Stephen Henson
79363339b7
algorithms field has changed in 1.0.0 and later: update
2010-02-28 00:24:24 +00:00
Dr. Stephen Henson
fbe2c6b33e
Add Kerberos fix which was in 0.9.8-stable but never committed to HEAD and
...
1.0.0. Original fix was on 2007-Mar-09 and had the log message: "Fix kerberos
ciphersuite bugs introduced with PR:1336."
2010-02-27 23:04:10 +00:00
Dr. Stephen Henson
fc11f47229
Revert CFB block length change. Despite what SP800-38a says the input to
...
CFB mode does *not* have to be a multiple of the block length and several
other specifications (e.g. PKCS#11) do not require this.
2010-02-26 14:41:48 +00:00
Dr. Stephen Henson
2b23d89d14
oops, use correct date
2010-02-26 12:14:30 +00:00
Dr. Stephen Henson
9cfa3cff54
update FAQ, NEWS
2010-02-25 18:21:20 +00:00
Dr. Stephen Henson
6507653e72
The meaning of the X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY and
...
X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT error codes were reversed in
the verify application documentation.
2010-02-23 14:09:22 +00:00
Bodo Möller
7fe747d1eb
Always check bn_wexpend() return values for failure (CVE-2009-3245).
...
(The CHANGES entry covers the change from PR #2111 as well, submitted by
Martin Olsson.)
Submitted by: Neel Mehta
2010-02-23 10:36:30 +00:00
Bodo Möller
32567c9f3b
Fix X509_STORE locking
2010-02-19 18:26:23 +00:00
Dr. Stephen Henson
4f3d52fedc
clarify documentation
2010-02-18 12:41:50 +00:00
Dr. Stephen Henson
8321bab39c
OR default SSL_OP_LEGACY_SERVER_CONNECT so existing options are preserved
2010-02-17 19:43:46 +00:00
Dr. Stephen Henson
989238802a
Allow renegotiation if SSL_OP_LEGACY_SERVER_CONNECT is set as well as
...
initial connection to unpatched servers. There are no additional security
concerns in doing this as clients don't see renegotiation during an
attack anyway.
2010-02-17 18:38:10 +00:00
Dr. Stephen Henson
9051fc538f
PR: 2100
...
Submitted by: James Baker <jbaker@tableausoftware.com > et al.
Workaround for slow Heap32Next on some versions of Windows.
2010-02-17 14:32:25 +00:00
Dr. Stephen Henson
03fd7f27db
Submitted by: Dmitry Ivanov <vonami@gmail.com>
...
Don't leave dangling pointers in GOST engine if calls fail.
2010-02-16 14:30:19 +00:00
Dr. Stephen Henson
45d6a15ae9
PR: 2171
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Since SSLv2 doesn't support renegotiation at all don't reject it if
legacy renegotiation isn't enabled.
Also can now use SSL2 compatible client hello because RFC5746 supports it.
2010-02-16 14:20:40 +00:00
Dr. Stephen Henson
6c6ca18664
The "block length" for CFB mode was incorrectly coded as 1 all the time. It
...
should be the number of feedback bits expressed in bytes. For CFB1 mode set
this to 1 by rounding up to the nearest multiple of 8.
2010-02-15 19:40:30 +00:00
Dr. Stephen Henson
97fe2b40c1
Correct ECB mode EVP_CIPHER definition: IV length is 0
2010-02-15 19:25:52 +00:00
Dr. Stephen Henson
f689ab5017
add EVP_CIPH_FLAG_LENGTH_BITS from 0.9.8-stable
2010-02-15 19:17:55 +00:00
Dr. Stephen Henson
edb7cac271
PR: 2164
...
Submitted by: "Noszticzius, Istvan" <inoszticzius@rightnow.com >
Don't clear the output buffer: ciphers should correctly the same input
and output buffers.
2010-02-15 19:01:56 +00:00
Dr. Stephen Henson
81d87a2a28
update references to new RI RFC
2010-02-12 21:59:57 +00:00
Dr. Stephen Henson
7366f0b304
PR: 2170
...
Submitted by: Magnus Lilja <lilja.magnus@gmail.com >
Make -c option in dgst work again.
2010-02-12 17:07:24 +00:00
Dr. Stephen Henson
1d8fa09c80
Make assembly language versions of OPENSSL_cleanse() accept zero length
...
parameter. Backport from HEAD, orginal by appro.
2010-02-12 17:02:13 +00:00
Dr. Stephen Henson
e085e6c84c
Fix memory leak in ENGINE autoconfig code. Improve error logging.
2010-02-09 14:17:57 +00:00
Dr. Stephen Henson
008fa4584d
update year
2010-02-09 14:13:00 +00:00
Dr. Stephen Henson
c8c49133d9
oops, use new value for new flag
2010-02-07 13:54:54 +00:00
Dr. Stephen Henson
961f1dea06
make update
2010-02-07 13:47:08 +00:00
Dr. Stephen Henson
1700426256
Add missing function EVP_CIPHER_CTX_copy(). Current code uses memcpy() to copy
...
an EVP_CIPHER_CTX structure which may have problems with external ENGINEs
who need to duplicate internal handles etc.
2010-02-07 13:41:23 +00:00
Dr. Stephen Henson
aa7f5baad2
don't assume 0x is at start of string
2010-02-03 18:19:05 +00:00
Dr. Stephen Henson
45acdd6f6d
tolerate broken CMS/PKCS7 implementations using signature OID instead of digest
2010-02-02 14:26:32 +00:00
Dr. Stephen Henson
8b354e776b
PR: 2161
...
Submitted by: Doug Goldstein <cardoe@gentoo.org >, Steve.
Make no-dsa, no-ecdsa and no-rsa compile again.
2010-02-02 13:36:05 +00:00
Dr. Stephen Henson
868f5e44ca
PR: 2160
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Make session tickets work with DTLS.
2010-02-01 16:49:42 +00:00
Dr. Stephen Henson
4e5fdd11ea
PR: 2159
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Typo in PR#1949 bug, oops!
2010-02-01 12:44:11 +00:00
Richard Levitte
d552a3391a
Typo.
2010-01-29 12:07:50 +00:00
Richard Levitte
d023b4e2dd
The previous take went wrong, try again.
2010-01-29 12:02:54 +00:00
Richard Levitte
fa79cc9c23
Architecture specific header files need special handling.
2010-01-29 11:44:40 +00:00
Richard Levitte
06daa75fb9
If opensslconf.h and buildinf.h are to be in an architecture specific
...
directory, place it in the same tree as the other architecture
specific things.
2010-01-29 11:43:53 +00:00
Dr. Stephen Henson
ffa304c838
oops, revert more test code arghh!
2010-01-28 17:52:18 +00:00
Dr. Stephen Henson
df21765a3e
In engine_table_select() don't clear out entire error queue: just clear
...
out any we added using ERR_set_mark() and ERR_pop_to_mark() otherwise
errors from other sources (e.g. SSL library) can be wiped.
2010-01-28 17:50:23 +00:00
Dr. Stephen Henson
5a6ae115f8
reword RI description
2010-01-27 18:53:49 +00:00
Dr. Stephen Henson
5e5df40b9b
update documentation to reflect new renegotiation options
2010-01-27 17:50:20 +00:00
Dr. Stephen Henson
6d4943e81f
Some shells print out the directory name if CDPATH is set breaking the
...
pod2man test. Use ./util instead to avoid this.
2010-01-27 16:06:58 +00:00
Dr. Stephen Henson
57cffe901f
typo
2010-01-27 14:05:15 +00:00
Dr. Stephen Henson
a758f61793
PR: 2157
...
Submitted by: "Green, Paul" <Paul.Green@stratus.com >
Typo.
2010-01-27 12:55:52 +00:00
Richard Levitte
b3b35df2a2
Cosmetic changes, including changing a confusing example.
2010-01-27 09:18:05 +00:00
Richard Levitte
5ad50246fc
Apparently, test/testtsa.com was only half done
2010-01-27 01:19:12 +00:00
Richard Levitte
d89b895cfd
size_t doesn't compare less than zero...
2010-01-27 01:18:26 +00:00
Dr. Stephen Henson
d793c292cb
add CHANGES entry
2010-01-26 19:48:10 +00:00
Dr. Stephen Henson
57749b1b9f
PR: 1949
...
Submitted by: steve@openssl.org
More robust fix and workaround for PR#1949. Don't try to work out if there
is any write pending data as this can be unreliable: always flush.
2010-01-26 19:46:30 +00:00
Dr. Stephen Henson
1cdb7854a5
PR: 2138
...
Submitted by: Kevin Regan <k.regan@f5.com >
Clear stat structure if -DPURIFY is set to avoid problems on some
platforms which include unitialised fields.
2010-01-26 18:07:41 +00:00
Dr. Stephen Henson
704d33b347
Add flags functions which were added to 0.9.8 for fips but not 1.0.0 and
...
later.
2010-01-26 14:33:52 +00:00
Dr. Stephen Henson
b2a7515ee8
OPENSSL_isservice is now defined on all platforms not just WIN32
2010-01-26 13:58:49 +00:00
Dr. Stephen Henson
f4f2b52995
oops
2010-01-26 13:56:15 +00:00
Dr. Stephen Henson
c7d5edbf5e
export OPENSSL_isservice and make update
2010-01-26 13:55:33 +00:00
Dr. Stephen Henson
d8f07f1674
Typo
2010-01-26 12:29:48 +00:00
Dr. Stephen Henson
78bfb45b07
PR: 2149
...
Submitted by: Douglas Stebila <douglas@stebila.ca >
Fix wap OIDs.
2010-01-25 16:07:51 +00:00
Richard Levitte
6ad4d60555
There's really no need to use $ENV::HOME
2010-01-25 00:22:52 +00:00
Richard Levitte
2fad8aa209
Forgot to correct the definition of __arch in this file.
...
Submitted by Steven M. Schweda <sms@antinode.info >
2010-01-25 00:21:14 +00:00
Richard Levitte
74397d45b2
It seems like sslroot: needs to be defined for some tests to work.
...
Submitted by Steven M. Schweda <sms@antinode.info >
2010-01-25 00:20:32 +00:00
Richard Levitte
c8ca769d3b
Compile t1_reneg on VMS as well.
...
Submitted by Steven M. Schweda <sms@antinode.info >
2010-01-25 00:19:33 +00:00
Richard Levitte
25d42c17e3
A few more macros for long symbols.
...
Submitted by Steven M. Schweda <sms@antinode.info >
2010-01-25 00:18:31 +00:00
Dr. Stephen Henson
a377811f15
PR: 2153, 2125
...
Submitted by: steve@openssl.org
The original fix for PR#2125 broke compilation on some Unixware platforms:
revert and make conditional on VMS.
2010-01-24 16:57:38 +00:00
Dr. Stephen Henson
ef1b6b2cf2
The fix for PR#1949 unfortunately broke cases where the BIO_CTRL_WPENDING
...
ctrl is incorrectly implemented (e.g. some versions of Apache). As a workaround
call both BIO_CTRL_INFO and BIO_CTRL_WPENDING if it returns zero. This should
both address the original bug and retain compatibility with the old behaviour.
2010-01-24 13:54:07 +00:00
Dr. Stephen Henson
1699389a46
Tolerate PKCS#8 DSA format with negative private key.
2010-01-22 20:17:30 +00:00
Dr. Stephen Henson
ad8ee3d7d1
If legacy renegotiation is not permitted then send a fatal alert if a patched
...
server attempts to renegotiate with an unpatched client.
2010-01-22 18:49:19 +00:00
Dr. Stephen Henson
39f0a4d8e9
typo
2010-01-21 18:46:28 +00:00
Dr. Stephen Henson
15a9821cc2
fix comments
2010-01-21 01:17:45 +00:00
Dr. Stephen Henson
53e97e7433
update version for next beta if we have one...
2010-01-20 15:40:27 +00:00
Dr. Stephen Henson
bc0ecd202a
make update
2010-01-20 15:05:52 +00:00
Dr. Stephen Henson
b307daa23f
Prepare for beta5 release
2010-01-20 15:00:49 +00:00
Dr. Stephen Henson
4c95b1bfda
Update demo
2010-01-20 14:05:56 +00:00
Dr. Stephen Henson
9359fc5ff2
Support -L options in VC++ link.
2010-01-20 14:04:55 +00:00
Andy Polyakov
a238d7d1eb
rand_win.c: handel GetTickCount wrap-around [from HEAD].
2010-01-19 21:44:07 +00:00
Andy Polyakov
0e92313331
x86_64-xlate.pl: refine sign extension logic when handling lea [from HEAD].
...
PR: 2094,2095
2010-01-19 21:43:05 +00:00
Andy Polyakov
3e719c99f5
s390x assembler update: add support for run-time facility detection [from HEAD].
2010-01-19 21:40:58 +00:00
Dr. Stephen Henson
2a4d0dcb89
The use of NIDs in the password based encryption table can result in
...
algorithms not found when an application uses PKCS#12 and only calls
SSL_library_init() instead of OpenSSL_add_all_algorithms(). Simple
work around is to add the missing algorithm (40 bit RC2) in
SSL_library_init().
2010-01-19 19:55:47 +00:00
Dr. Stephen Henson
2e155fde39
PR: 2141
...
Submitted by: "NARUSE, Yui" <naruse@airemix.jp >
Remove non-ASCII comment which causes compilation errors on some versions
of VC++.
2010-01-19 19:28:03 +00:00
Dr. Stephen Henson
9a8c8cb22e
stop asn1test compilation producing link errors
2010-01-19 19:25:16 +00:00
Dr. Stephen Henson
04aa7441ab
PR: 2144
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Better fix for PR#2144
2010-01-19 19:11:21 +00:00
Dr. Stephen Henson
28dc54f6d9
Reverted patch for PR#2095. Addressed by Andy now in x86_64-xlate.pl
2010-01-17 16:58:56 +00:00
Dr. Stephen Henson
a1e1165200
PR: 2135
...
Submitted by: Mike Frysinger <vapier@gentoo.org >
Change missed references to lib to $(LIBDIR)
2010-01-16 20:06:10 +00:00
Dr. Stephen Henson
ddba003d5e
PR: 2144
...
Submitted by: steve@openssl.org
Fix DTLS connection so new_session is reset if we read second client hello:
new_session is used to detect renegotiation.
2010-01-16 19:45:59 +00:00
Dr. Stephen Henson
e59d9a34c9
PR: 2133
...
Submitted by: steve@openssl.org
Add missing DTLS state strings.
2010-01-16 19:20:38 +00:00
Ben Laurie
9e198c4bd0
Fix type-checking/casting issue.
2010-01-16 13:32:14 +00:00
Dr. Stephen Henson
7eceffbfef
convert to Unix EOL form
2010-01-15 15:26:32 +00:00
Dr. Stephen Henson
8043f01b13
PR: 2125
...
Submitted by: "Alon Bar-Lev" <alon.barlev@gmail.com >
Fix gcc-aix compilation issue.
2010-01-14 17:51:52 +00:00
Dr. Stephen Henson
41c0f68630
Fix version handling so it can cope with a major version >3.
...
Although it will be many years before TLS v2.0 or later appears old versions
of servers have a habit of hanging around for a considerable time so best
if we handle this properly now.
2010-01-13 19:08:29 +00:00
Dr. Stephen Henson
2c627637c5
Modify compression code so it avoids using ex_data free functions. This
...
stops applications that call CRYPTO_free_all_ex_data() prematurely leaking
memory.
2010-01-13 18:46:01 +00:00
Dr. Stephen Henson
58f4b3511e
update ordinals
2010-01-12 17:33:59 +00:00
Dr. Stephen Henson
93fac08ec3
PR: 2136
...
Submitted by: Willy Weisz <weisz@vcpc.univie.ac.at >
Add options to output hash using older algorithm compatible with OpenSSL
versions before 1.0.0
2010-01-12 17:27:11 +00:00
Dr. Stephen Henson
23c3bee970
make update
2010-01-12 01:59:11 +00:00
Dr. Stephen Henson
73ff97ad76
Simplify RI+SCSV logic:
...
1. Send SCSV is not renegotiating, never empty RI.
2. Send RI if renegotiating.
2010-01-07 19:05:03 +00:00
Andy Polyakov
0d8ffc2007
b_sock.c: bind/connect are picky about socket address length [from HEAD].
2010-01-07 13:15:39 +00:00
Andy Polyakov
a32f7fb832
sendto is reportedly picky about destination socket address length [from HEAD].
...
PR: 2114
Submitted by: Robin Seggelmann
2010-01-07 10:44:21 +00:00
Andy Polyakov
496cf69e40
Fix compilation on older Linux [from HEAD].
2010-01-06 21:25:22 +00:00
Dr. Stephen Henson
eb17330837
Updates to conform with draft-ietf-tls-renegotiation-03.txt:
...
1. Add provisional SCSV value.
2. Don't send SCSV and RI at same time.
3. Fatal error is SCSV received when renegotiating.
2010-01-06 17:37:38 +00:00
Dr. Stephen Henson
2708603bb4
ENGINE_load_capi() now exists on all platforms (but no op on non-WIN32)
2010-01-06 13:20:52 +00:00
Dr. Stephen Henson
e4f1cda7de
PR: 2102
...
Submitted by: John Fitzgibbon <john_fitzgibbon@yahoo.com >
Remove duplicate definitions.
2010-01-05 17:58:15 +00:00
Dr. Stephen Henson
4359b88bbe
Typo
2010-01-05 17:50:01 +00:00
Dr. Stephen Henson
c079fde3f7
PR: 2132
...
Submitted by: steve
Fix bundled pod2man.pl to handle alternative comment formats.
2010-01-05 17:33:09 +00:00
Dr. Stephen Henson
6e94156199
Remove tabs on blank lines: they produce warnings in pod2man
2010-01-05 17:17:20 +00:00
Dr. Stephen Henson
1f67a3a985
compress_meth should be unsigned
2010-01-05 16:46:39 +00:00
Dr. Stephen Henson
4cba294d79
Client side compression algorithm sanity checks: ensure old compression
...
algorithm matches current and give error if compression is disabled and
server requests it (shouldn't happen unless server is broken).
2010-01-01 14:39:51 +00:00
Dr. Stephen Henson
e642fd7a1c
Compression handling on session resume was badly broken: it always
...
used compression algorithms in client hello (a legacy from when
the compression algorithm wasn't serialized with SSL_SESSION).
2010-01-01 00:44:36 +00:00
Andy Polyakov
5448e6739c
b_sock.c: correct indirect calls on WinSock platforms [from HEAD].
...
PR: 2130
Submitted by: Eugeny Gostyukhin
2009-12-30 12:56:16 +00:00
Andy Polyakov
f0389d8d37
Adapt mingw config for newer mingw environment [from HEAD].
...
PR: 2113
2009-12-30 11:57:39 +00:00
Andy Polyakov
a5313cf360
sha512.c update for esoteric PPC platfrom(s) [from HEAD].
...
PR: 1998
2009-12-30 11:53:33 +00:00
Andy Polyakov
b26c45b033
Deploy multilib config-line parameter [from HEAD].
2009-12-29 10:46:46 +00:00
Dr. Stephen Henson
986093affa
Typo
2009-12-27 23:03:25 +00:00
Dr. Stephen Henson
f88e0acb0e
Update RI to match latest spec.
...
MCSV is now called SCSV.
Don't send SCSV if renegotiating.
Also note if RI is empty in debug messages.
2009-12-27 22:59:09 +00:00
Dr. Stephen Henson
aed461b431
Traditional Yuletide commit ;-)
...
Add Triple DES CFB1 and CFB8 to algorithm list and NID translation.
2009-12-25 14:12:24 +00:00
Bodo Möller
8bbd0e826c
Use properly local variables for thread-safety.
...
Submitted by: Martin Rex
2009-12-22 11:52:15 +00:00
Bodo Möller
40c45f86d4
Constify crypto/cast.
2009-12-22 11:45:59 +00:00
Bodo Möller
a0b7277724
Constify crypto/cast.
2009-12-22 10:58:01 +00:00
Dr. Stephen Henson
54bc369ad7
Alert to use is now defined in spec: update code
2009-12-17 15:42:43 +00:00
Dr. Stephen Henson
2d3855fc6e
PR: 2127
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Check for lookup failures in EVP_PBE_CipherInit().
2009-12-17 15:28:45 +00:00
Dr. Stephen Henson
1cd47f5f6e
Ooops revert stuff which shouldn't have been part of previous commit.
2009-12-16 20:33:11 +00:00
Dr. Stephen Henson
675564835c
New option to enable/disable connection to unpatched servers
2009-12-16 20:28:30 +00:00
Dr. Stephen Henson
2456cd58c4
Allow initial connection (but no renegoriation) to servers which don't support
...
RI.
Reorganise RI checking code and handle some missing cases.
2009-12-14 13:55:39 +00:00
Ben Laurie
43a107026d
Missing error code.
2009-12-12 15:57:53 +00:00
Ben Laurie
ef0498a00b
Use gcc 4.4.
2009-12-12 15:57:19 +00:00
Dr. Stephen Henson
f1784f2fd2
Move SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION out of SSL_OP_ALL
2009-12-11 00:20:58 +00:00
Dr. Stephen Henson
730f5752ff
clarify docs
2009-12-09 18:17:09 +00:00
Dr. Stephen Henson
a88c73b43a
Document option clearning functions.
...
Initial secure renegotiation documentation.
2009-12-09 18:00:52 +00:00
Dr. Stephen Henson
a6d204e241
Add patch to crypto/evp which didn't apply from PR#2124
2009-12-09 15:02:14 +00:00
Dr. Stephen Henson
941baf6641
Revert lhash patch for PR#2124
2009-12-09 15:00:20 +00:00
Dr. Stephen Henson
b41a614686
Check s3 is not NULL
2009-12-09 14:53:51 +00:00
Dr. Stephen Henson
aac751832a
PR: 2124
...
Submitted by: Jan Pechanec <Jan.Pechanec@Sun.COM >
Check for memory allocation failures.
2009-12-09 13:38:20 +00:00
Dr. Stephen Henson
52a08e90d1
Add ctrls to clear options and mode.
...
Change RI ctrl so it doesn't clash.
2009-12-09 13:25:38 +00:00
Dr. Stephen Henson
6b5f0458fe
Send no_renegotiation alert as required by spec.
2009-12-08 19:06:09 +00:00
Dr. Stephen Henson
b52a2738d4
Add ctrl and macro so we can determine if peer support secure renegotiation.
2009-12-08 13:42:32 +00:00
Dr. Stephen Henson
10f99d7b77
Add support for magic cipher suite value (MCSV). Make secure renegotiation
...
work in SSLv3: initial handshake has no extensions but includes MCSV, if
server indicates RI support then renegotiation handshakes include RI.
NB: current MCSV value is bogus for testing only, will be updated when we
have an official value.
Change mismatch alerts to handshake_failure as required by spec.
Also have some debugging fprintfs so we can clearly see what is going on
if OPENSSL_RI_DEBUG is set.
2009-12-08 13:15:12 +00:00
Dr. Stephen Henson
593222afe1
PR: 2121
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Add extension support to DTLS code mainly using existing implementation for
TLS.
2009-12-08 11:38:18 +00:00
Dr. Stephen Henson
7b1856e5a1
PR: 2111
...
Submitted by: Martin Olsson <molsson@opera.com >
Check for bn_wexpand errors in bn_mul.c
2009-12-02 15:28:05 +00:00
Dr. Stephen Henson
3d5d81bf39
Replace the broken SPKAC certification with the correct version.
2009-12-02 14:41:24 +00:00
Dr. Stephen Henson
50f06b46f4
Check it actually compiles this time ;-)
2009-12-02 14:25:55 +00:00
Dr. Stephen Henson
be6076c0ad
PR: 2120
...
Submitted by: steve@openssl.org
Initialize fields correctly if pem_str or info are NULL in EVP_PKEY_asn1_new().
2009-12-02 13:57:03 +00:00
Dr. Stephen Henson
6125e07d79
check DSA_sign() return value properly
2009-12-01 18:41:50 +00:00
Dr. Stephen Henson
d5b8c46499
PR: 2115
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Add Renegotiation extension to DTLS, fix DTLS ClientHello processing bug.
2009-12-01 17:41:42 +00:00
Dr. Stephen Henson
7805e23588
PR: 1432
...
Submitted by: "Andrzej Chmielowiec" <achmielowiec@enigma.com.pl >, steve@openssl.org
Approved by: steve@openssl.org
Truncate hash if it is too large: as required by FIPS 186-3.
2009-12-01 17:32:33 +00:00
Dr. Stephen Henson
9117b9d17a
PR: 2118
...
Submitted by: Mounir IDRASSI <mounir.idrassi@idrix.net >
Approved by: steve@openssl.org
Check return value of ECDSA_sign() properly.
2009-11-30 13:53:42 +00:00
Dr. Stephen Henson
e274c8fb72
typo
2009-11-29 13:45:18 +00:00
Andy Polyakov
e8dbd66e2b
cms-test.pl: use EXE_EXT (from HEAD).
...
PR: 2107
2009-11-26 21:12:12 +00:00
Andy Polyakov
8b9b23603f
bss_dgram.c: re-fix BIO_CTRL_DGRAM_GET_PEER (from HEAD).
2009-11-26 20:56:05 +00:00
Bodo Möller
aefb9dc5e5
Make CHANGES in the OpenSSL_1_0_0-stable branch consistent with the
...
one in the OpenSSL_0_9_8-stable branch.
2009-11-26 18:37:11 +00:00
Andy Polyakov
a8c1b19a31
x86_64-xlate.pl: fix typo introduced in last commit.
...
PR: 2109
2009-11-23 19:51:24 +00:00
Andy Polyakov
29c8d2a54a
x86_64-xlate.pl: new gas requires sign extension.
...
x86masm.pl: fix linker warning.
PR: 2094,2095
2009-11-22 12:52:18 +00:00
Andy Polyakov
87827be0c2
VC-32.pl: bufferoverlowu.lib only when needed and remove duplicate code
...
(update from HEAD).
PR: 2086
2009-11-22 12:26:15 +00:00
Andy Polyakov
e4572e5210
bio_sock.c and bss_dgram.c: update from HEAD.
...
PR: 2069
2009-11-22 12:24:43 +00:00
Dr. Stephen Henson
3e8e12a6b6
Servers can't end up talking SSLv2 with legacy renegotiation disabled
2009-11-18 15:09:35 +00:00
Dr. Stephen Henson
5ddbb8f41a
Don't use SSLv2 compatible client hello if we don't tolerate legacy renegotiation
2009-11-18 14:45:32 +00:00
Dr. Stephen Henson
3c44e92bcb
Include a more meaningful error message when rejecting legacy renegotiation
2009-11-18 14:19:52 +00:00
Dr. Stephen Henson
5e8d95f590
PR: 2103
...
Submitted by: Rob Austein <sra@hactrn.net >
Approved by: steve@openssl.org
Initialise atm.flags to 0.
2009-11-17 13:25:35 +00:00
Dr. Stephen Henson
2156704924
PR: 2101 (additional)
...
Submitted by: Roumen Petrov <openssl@roumenpetrov.info >
Approved by: steve@openssl.org
Another mingw fix.
2009-11-15 19:06:21 +00:00
Dr. Stephen Henson
4e49aa0ca3
PR: 2095
...
Submitted by: Arkadiusz Miskiewicz <arekm@maven.pl >
Approved by: steve@openssl.org
Fix for out range of signed 32bit displacement error on newer binutils
in file sha1-x86_64.pl
2009-11-13 14:23:44 +00:00
Dr. Stephen Henson
d5d1c53735
PR: 2101
...
Submitted by: Doug Kaufman <dkaufman@rahul.net >
Approved by: steve@openssl.org
Fixes for tests in cms-test.pl
2009-11-13 13:44:14 +00:00
Richard Levitte
1aac5c0ee8
Add test_cms
2009-11-13 08:45:52 +00:00
Dr. Stephen Henson
4434328b0a
PR: 2088
...
Submitted by: Aleksey Samsonov <s4ms0n0v@gmail.com >
Approved by: steve@openssl.org
Fix memory leak in d2i_PublicKey().
2009-11-12 19:57:39 +00:00
Dr. Stephen Henson
9b2cfb890c
set engine to NULL after releasing it
2009-11-12 19:24:34 +00:00
Richard Levitte
b2f364ec62
Compiling vms.mar doesn't work on other than VAX.
2009-11-12 14:05:04 +00:00
Richard Levitte
b7aeb4c9b5
Another symbol longer than 31 characters.
2009-11-12 14:04:26 +00:00
Richard Levitte
370f48da2a
Typo
2009-11-12 14:03:57 +00:00
Richard Levitte
32def77ace
Everywhere was a little too much.
2009-11-12 14:03:35 +00:00
Dr. Stephen Henson
531c81ece8
PR: 2098
...
Submitted by: Corinna Vinschen <vinschen@redhat.com >
Approved by: steve@openssl.org
For Cygwin enable zlib and mdc2 by default.
2009-11-11 19:04:56 +00:00
Dr. Stephen Henson
73582b8117
add missing parts of reneg port, fix apps patch
2009-11-11 14:51:29 +00:00
Dr. Stephen Henson
5c33091cfa
commit missing apps code for reneg fix
2009-11-11 14:10:09 +00:00
Dr. Stephen Henson
56327ebe6a
make update
2009-11-10 13:23:04 +00:00
Dr. Stephen Henson
e0031b1c78
Prepare for beta4 release
2009-11-10 13:15:09 +00:00
Dr. Stephen Henson
b2ac5cb2d0
PR: 1686
...
Submitted by: Hanno Böck <hanno@hboeck.de >
Approved by: steve@openssl.org
Create engines dir if it doesn't already exist.
2009-11-10 01:52:52 +00:00
Dr. Stephen Henson
6757ef89b3
PR: 2091
...
Submitted by: Martin Kaiser <lists@kaiser.cx >, Stephen Henson
Approved by: steve@openssl.org
If an OID has no short name or long name return the numerical representation.
2009-11-10 01:00:23 +00:00
Dr. Stephen Henson
bf6eea6536
PR: 2090
...
Submitted by: Martin Kaiser <lists@kaiser.cx >, Stephen Henson
Approved by: steve@openssl.org
Improve error checking in asn1_gen.c
2009-11-10 00:47:37 +00:00
Dr. Stephen Henson
ec4346f6f9
oops, add missing prototypes
2009-11-09 18:58:50 +00:00
Dr. Stephen Henson
e42ff486a8
fix CHANGES
2009-11-09 18:46:59 +00:00
Dr. Stephen Henson
bc9058d041
First cut of renegotiation extension. (port to 1.0.0-stable)
2009-11-09 18:45:42 +00:00
Dr. Stephen Henson
4a276f3039
make update
2009-11-09 14:35:30 +00:00
Dr. Stephen Henson
acf47d8f24
Remove BF_PTR2 from configuration: it doesn't improve performance any more and causes gcc warnings about arrays out of range
2009-11-09 14:11:13 +00:00
Dr. Stephen Henson
f62d1ea3d5
Combat gcc 4.4.1 aliasing rules. (from HEAD)
2009-11-09 14:09:53 +00:00
Dr. Stephen Henson
f923bba73c
file t1_reneg.c was added on branch OpenSSL_1_0_0-stable on 2009-11-09 18:45:42 +0000
2009-11-08 14:51:55 +00:00
Dr. Stephen Henson
e3738c49b8
If it is a new session don't send the old TLS ticket: send a zero length
...
ticket to request a new session.
2009-11-08 14:36:32 +00:00
Dr. Stephen Henson
41746da8c2
Update ordinals.
2009-11-04 13:29:58 +00:00
Dr. Stephen Henson
23b97c6bb5
PR: 2089
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
DTLS Fragment size bug fix.
2009-11-02 13:37:17 +00:00
Dr. Stephen Henson
4a7f7171f5
Add missing functions to allow access to newer X509_STORE_CTX status
...
information. Add more informative message to verify callback to indicate
when CRL path validation is taking place.
2009-10-31 19:21:47 +00:00
Dr. Stephen Henson
961092281f
Add option to allow in-band CRL loading in verify utility. Add function
...
load_crls and tidy up load_certs. Remove useless purpose variable from
verify utility: now done with args_verify.
2009-10-31 13:34:19 +00:00
Dr. Stephen Henson
036b3f331b
Generate stateless session ID just after the ticket is received instead
...
of when a session is loaded. This will mean that applications that
just hold onto SSL_SESSION structures and never call d2i_SSL_SESSION()
will still work.
2009-10-30 14:06:18 +00:00
Dr. Stephen Henson
9ac5c355a2
Move CHANGES entry to 0.9.8l section
2009-10-30 13:29:08 +00:00
Dr. Stephen Henson
3d0b604c14
Fix statless session resumption so it can coexist with SNI
2009-10-30 13:22:44 +00:00
Dr. Stephen Henson
257b2bfb6c
Don't attempt session resumption if no ticket is present and session
...
ID length is zero.
2009-10-28 19:52:35 +00:00
Dr. Stephen Henson
90528846e8
Add -no_cache option to s_server
2009-10-28 17:49:37 +00:00
Dr. Stephen Henson
32509c9731
Don't replace whole AR line
2009-10-28 15:33:20 +00:00
Dr. Stephen Henson
d3f940833d
PR: 2081
...
Submitted by: Mike Frysinger <vapier@gentoo.org >
Approved by: steve@openssl.org
Respect AR and RANLIB environment variables if set.
2009-10-28 14:00:41 +00:00
Dr. Stephen Henson
b335e351d4
PR: 2080
...
Submitted by: Mike Frysinger <vapier@gentoo.org >
Approved by: steve@openssl.org
Respect MAKE environment variable if set.
2009-10-28 13:55:55 +00:00
Dr. Stephen Henson
67bcde9ba8
PR: 2078
...
Submitted by: Dale Anderson <dra@redevised.net >
Approved by: steve@openssl.org
Corrections to bn_internal documentation.
2009-10-28 13:51:56 +00:00
Dr. Stephen Henson
169bfde4d4
Clarification
2009-10-23 12:47:01 +00:00
Dr. Stephen Henson
0a7f291268
Sync FAQ with HEAD.
2009-10-23 12:24:54 +00:00
Dr. Stephen Henson
0c2c2e71a6
If not checking all certificates don't attempt to find a CRL
...
for the leaf certificate of a CRL path.
2009-10-23 12:05:54 +00:00
Dr. Stephen Henson
d1d746afb4
Need to check <= 0 here.
2009-10-22 23:14:12 +00:00
Dr. Stephen Henson
db6e41f0ed
PR: 2070
...
Submitted by: Alexander Nikitovskiy <Nikitovski@ya.ru >
Approved by: steve@openssl.org
Fix wrong cast.
2009-10-19 13:13:14 +00:00
Dr. Stephen Henson
5b2b60ae98
Document additions for X509 chain verification from HEAD
2009-10-18 15:28:59 +00:00
Dr. Stephen Henson
c90a1ae0c9
make update
2009-10-18 14:44:51 +00:00
Dr. Stephen Henson
c679fb298e
Add new function X509_STORE_set_verify_cb and use it in apps
2009-10-18 14:42:27 +00:00
Dr. Stephen Henson
17c7cad545
take install prefix from the environment
2009-10-18 14:26:46 +00:00
Dr. Stephen Henson
164c263b5c
PR: 2074
...
Submitted by: Bram Neijt <bneijt@gmail.com >
Approved by: steve@openssl.org
Typo: "contet".
2009-10-16 15:29:34 +00:00
Dr. Stephen Henson
a9bb9d0eb4
PR: 2072
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Approved by: steve@openssl.org
Avoid potential doublefree and reuse of freed handshake_buffer.
2009-10-16 15:24:19 +00:00
Dr. Stephen Henson
cc6688d796
PR: 2073
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Approved by: steve@openssl.org
Don't access freed SSL_CTX in SSL_free().
2009-10-16 13:41:52 +00:00
Dr. Stephen Henson
9b1f24df3d
Fixes to CROSS_COMPILE, don't override command line option from environment
2009-10-15 23:44:11 +00:00
Dr. Stephen Henson
595e804ae3
Fix for WIN32 (and possibly other platforms) which don't define in_port_t.
2009-10-15 18:48:47 +00:00
Dr. Stephen Henson
b381e9b952
Update ordinals.
2009-10-15 18:04:43 +00:00
Dr. Stephen Henson
28418076b2
PR: 2069
...
Submitted by: Michael Tuexen <tuexen@fh-muenster.de >
Approved by: steve@openssl.org
IPv6 support for DTLS.
2009-10-15 17:41:44 +00:00
Dr. Stephen Henson
abdfdb029e
PR: 1847
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Approved by: steve@openssl.org
Integrated patches to CA.sh to bring it into line with CA.pl functionality.
2009-10-15 17:27:47 +00:00
Dr. Stephen Henson
8465b81d50
PR: 2066
...
Submitted by: Guenter <lists@gknw.net >
Approved by: steve@openssl.org
Add -r option to dgst to produce format compatible with core utilities.
2009-10-15 17:18:03 +00:00
Dr. Stephen Henson
ed65b6e512
Rename CROSS_COMPILE_PREFIX to CROSS_COMPILE
2009-10-15 13:05:41 +00:00
Dr. Stephen Henson
d793544518
Allow uname values to be overridden by the environment
2009-10-07 16:46:51 +00:00
Dr. Stephen Henson
53480a673b
Allow cross compilation prefix to come from CROSS_COMPILE environment variable
2009-10-07 16:41:33 +00:00
Dr. Stephen Henson
ad187f8905
Fix unitialized warnings
2009-10-04 16:52:35 +00:00
Dr. Stephen Henson
2280f82fc6
Fix warnings about ignoring fgets return value
2009-10-04 16:43:21 +00:00
Dr. Stephen Henson
e6714faffb
Prevent ignored return value warning
2009-10-04 14:04:14 +00:00
Dr. Stephen Henson
af8f2bb174
Prevent aliasing warning
2009-10-04 14:02:03 +00:00
Dr. Stephen Henson
d7501c16bf
Yes it is a typo ;-)
2009-10-01 12:17:18 +00:00
Dr. Stephen Henson
804196a418
PR: 2061
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct i2b_PVK_bio error handling in rsa.c, dsa.c
2009-10-01 00:26:07 +00:00
Dr. Stephen Henson
50d70c01d6
PR: 2062
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct BN_rand error handling in bntest.c
2009-10-01 00:21:55 +00:00
Dr. Stephen Henson
9fc601cfbb
PR: 2059
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct EVP_SealInit error handling in pem_seal.c
2009-10-01 00:17:35 +00:00
Dr. Stephen Henson
fed5333248
PR: 2056
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct BIO_wirte error handling in asn1_par.c
2009-10-01 00:11:49 +00:00
Dr. Stephen Henson
3d1dab4404
PR: 2055
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct BIO_ctrl error handling in s2_srvr.c
2009-10-01 00:07:10 +00:00
Dr. Stephen Henson
29c2fd46d2
PR: 2054
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct BIO_ctrl error handling
2009-10-01 00:03:50 +00:00
Dr. Stephen Henson
a3d5cdb07c
PR: 2063
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct BIO_write error handling in ocsp_prn.c
2009-09-30 23:59:16 +00:00
Dr. Stephen Henson
d99c0f6b4a
PR: 2057
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct BIO_write, BIO_printf, i2a_ASN1_INTEGER and i2a_ASN1_OBJECT
error handling in OCSP print routines.
2009-09-30 23:55:29 +00:00
Dr. Stephen Henson
43f21e62aa
PR: 2058
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct EVP_DigestVerifyFinal error handling.
2009-09-30 23:50:10 +00:00
Dr. Stephen Henson
50425bc137
Change version from 0.9.9 to 1.0.0 in docs
2009-09-30 23:40:52 +00:00
Dr. Stephen Henson
0c690586e0
PR: 2064, 728
...
Submitted by: steve@openssl.org
Add support for custom headers in OCSP requests.
2009-09-30 21:41:53 +00:00
Dr. Stephen Henson
bc8c5fe58d
Free SSL_CTX after BIO
2009-09-30 21:35:26 +00:00
Dr. Stephen Henson
0cc0db32e3
PR: 2050
...
Submitted by: Michael Tuexen <tuexen@fh-muenster.de >
Approved by: steve@openssl.org
Fix handling of ENOTCONN and EMSGSIZE for dgram BIOs.
2009-09-22 11:34:25 +00:00
Dr. Stephen Henson
d68f7641a3
PR: 2047
...
Submitted by: David Lee <live4thee@gmail.com >, steve@openssl.org
Approved by: steve@openssl.org
Fix for IPv6 handling in BIO_get_accept_socket().
2009-09-20 16:40:59 +00:00
Dr. Stephen Henson
4fcbaa3dd9
Ooops, missing close quote
2009-09-20 12:47:04 +00:00
Dr. Stephen Henson
5e56584285
Don't use __try+__except unless on VC++
2009-09-20 12:39:16 +00:00
Dr. Stephen Henson
ca26ccb083
add version info for VC-WIN64I too
2009-09-20 11:39:59 +00:00
Dr. Stephen Henson
3e8b713b06
PR: 2048
...
Submitted by: john blair <mailtome200420032002@yahoo.com >
Approved by: steve@openssl.org
Add version info in VC-WIN64A too.
2009-09-19 23:01:24 +00:00
Andy Polyakov
13eca7d782
cmll-x86_64.pl: small buglet in CBC subroutine [from HEAD].
...
PR: 2035
2009-09-17 19:35:49 +00:00
Dr. Stephen Henson
af3d4e1b02
PR: 2039
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
DTLS listen bug fix,
2009-09-15 22:48:30 +00:00
Dr. Stephen Henson
80afb40ae3
Submitted by: Julia Lawall <julia@diku.dk>
...
The functions ENGINE_ctrl(), OPENSSL_isservice(), EVP_PKEY_sign(),
CMS_get1_RecipientRequest() and RAND_bytes() can return <=0 on error fix
so the return code is checked correctly.
2009-09-13 11:27:27 +00:00
Dr. Stephen Henson
3333428b44
PR: 2023
...
Submitted by: James Beckett <jmb.openssl@nospam.hackery.net >, steve
Approved by: steve@openssl.org
Fix documentation errors in d2i_X509 manual pages.
2009-09-12 23:34:56 +00:00
Dr. Stephen Henson
a131de9bb2
PR: 2025
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Approved by: steve@openssl.org
Constify SSL_CIPHER_description
2009-09-12 23:18:09 +00:00
Dr. Stephen Henson
0ddd002f60
PR: 1411
...
Submitted by: steve@openssl.org
Allow use of trusted certificates in SSL_CTX_use_chain_file()
2009-09-12 23:09:26 +00:00
Dr. Stephen Henson
e7209103e6
PR: 2038
...
Submitted by: Artem Chuprina <ran@cryptocom.ru >
Approved by: steve@openssl.org
Avoid double call to BIO_free().
2009-09-11 11:03:31 +00:00
Dr. Stephen Henson
53f062d050
PR: 2033
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
DTLS listen support.
2009-09-09 17:05:42 +00:00
Dr. Stephen Henson
b5b65403a4
Add new option --strict-warnings to Configure script. This is used to add
...
in devteam warnings into other configurations.
2009-09-09 16:32:19 +00:00
Dr. Stephen Henson
1a3914fe0c
Seed PRNG with DSA and ECDSA digests for additional protection against
...
possible PRNG state duplication.
2009-09-09 12:14:36 +00:00
Dr. Stephen Henson
b7e3cb31a5
PR: 2031
...
Submitted by: steve@openssl.org
Tolerate application/timestamp-response which some servers send out.
2009-09-07 17:57:02 +00:00
Dr. Stephen Henson
9769137a43
Typo presumably...
2009-09-06 17:55:40 +00:00
Dr. Stephen Henson
c0688f1aef
Make update, deleting bogus DTLS error code
2009-09-06 15:55:54 +00:00
Dr. Stephen Henson
6c29853bf2
PR: 1644
...
Submitted by: steve@openssl.org
Fix to make DHparams_dup() et al work in C++.
For 1.0 fix the final argument to ASN1_dup() so it is void *. Replace some
*_dup macros with functions.
2009-09-06 15:49:12 +00:00
Dr. Stephen Henson
2e9802b7a7
PR: 2028
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Fix DTLS cookie management bugs.
2009-09-04 17:42:06 +00:00
Dr. Stephen Henson
7483896e15
Correction: salt is now default
2009-09-04 12:27:01 +00:00
Dr. Stephen Henson
4b4f249e0d
Oops, s can be NULL
2009-09-04 11:31:19 +00:00
Dr. Stephen Henson
196dcf93bc
PR: 2020
...
Submitted by: Keith Beckman <kbeckman@mcg.edu >, Tomas Mraz <tmraz@redhat.com >
Checked by: steve@openssl.org
Fix improperly capitalized references to WWW::Curl::Easy.
2009-09-02 15:57:12 +00:00
Dr. Stephen Henson
2c11ec308b
PR: 2029
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Checked by: steve@openssl.org
Fix so that the legacy digest EVP_dss1() still works.
2009-09-02 15:51:28 +00:00
Dr. Stephen Henson
e5eb96c83a
PR: 2013
...
Submitted by: steve@openssl.org
Include a flag ASN1_STRING_FLAG_MSTRING when a multi string type is created.
This makes it possible to tell if the underlying type is UTCTime,
GeneralizedTime or Time when the structure is reused and X509_time_adj_ex()
can handle each case in an appropriate manner.
Add error checking to CRL generation in ca utility when nextUpdate is being
set.
2009-09-02 13:55:22 +00:00
Dr. Stephen Henson
54ed003ace
PR: 2009
...
Submitted by: "Alexei Khlebnikov" <alexei.khlebnikov@opera.com >
Approved by: steve@openssl.org
Avoid memory leak and fix error reporting in d2i_SSL_SESSION(). NB: although
the ticket mentions buffer overruns this isn't a security issue because
the SSL_SESSION structure is generated internally and it should never be
possible to supply its contents from an untrusted application (this would
among other things destroy session cache security).
2009-09-02 13:20:22 +00:00
Dr. Stephen Henson
f18e10253d
PR: 2022
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Fix DTLS record header length bug.
2009-09-02 12:53:32 +00:00
Dr. Stephen Henson
c9add317a9
Tidy up and fix verify callbacks to avoid structure dereference, use of
...
obsolete functions and enhance to handle new conditions such as policy
printing.
2009-09-02 12:45:19 +00:00
Dr. Stephen Henson
6d1741030b
Missing break.
2009-08-31 22:21:01 +00:00
Dr. Stephen Henson
b8dc932c05
PR: 2005
...
Submitted by: steve@openssl.org
Some systems have broken IPv6 headers and/or implementations. If
OPENSSL_USE_IPV6 is set to 0 IPv6 is not used, if it is set to 1 it is used
and if undefined an attempt is made to detect at compile time by checking
if AF_INET6 is set and excluding known problem platforms.
2009-08-26 15:13:43 +00:00
Dr. Stephen Henson
17f8d8db61
PR: 2006
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Do not use multiple DTLS records for a single user message
2009-08-26 11:51:23 +00:00
Dr. Stephen Henson
38437fa135
PR: 2015
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Define LIBDIR properly.
2009-08-26 11:41:32 +00:00
Richard Levitte
82f35daaaf
Moving up the inclusion of e_os.h was a bad idea.
...
Put it back where it was and place an inclusion of e_os2.h to get platform
macros defined...
2009-08-26 11:21:50 +00:00
Richard Levitte
b529bba4bf
Make sure ENGINES can be separately compiled as well.
...
Make sure _XOPEN_SOURCE_EXTENDED is defined in opensslconf.h
Submitted by Zoltan Arpadffy <zoli@polarhome.com >
2009-08-25 07:30:02 +00:00
Richard Levitte
dde33ea9c3
Remove tmdiff.h from EXHEADERS as it doesn't exist.
...
Don't have separate installation directory variables for VAX and AXP.
Submitted by Zoltan Arpadffy <zoli@polarhome.com >
2009-08-25 07:28:12 +00:00
Richard Levitte
cb0d89705b
Define EXE_DIR earlier.
...
Make sure S_SOCKET also gets compiled with _POSIX_C_SOURCE defined.
Submitted by Zoltan Arpadffy <zoli@polarhome.com >
2009-08-25 07:25:55 +00:00
Richard Levitte
f49353b42f
Move up the inclusion of e_os.h so OPENSSL_SYS_VMS_DECC has a chance
...
to be properly defined.
2009-08-25 07:23:21 +00:00
Richard Levitte
573c61dcde
Make it possible to compile non-assembler routines on AXP as well.
...
Submitted by Zoltan Arpadffy <arpadffy@polarhome.com >
2009-08-25 07:22:08 +00:00
Richard Levitte
51f38e6c2d
Make engines compile on VMS for ia64 as well.
...
Parse file types in a more secure manner.
Submitted by sms@antinode.info (Steven M. Schweda)
2009-08-25 07:19:20 +00:00
Richard Levitte
2de213732a
Correct some typos and missing things.
...
Submitted by Arpadffy Zoltan <Zoltan.Arpadffy@scientificgames.se >
2009-08-25 07:17:13 +00:00
Richard Levitte
3798c36686
Include proper header files for time functions.
...
Submitted by Arpadffy Zoltan <Zoltan.Arpadffy@scientificgames.se >
2009-08-25 07:10:09 +00:00
Dr. Stephen Henson
209abea1db
Stop unused variable warning on WIN32 et al.
2009-08-18 11:14:12 +00:00
Dr. Stephen Henson
250705e7b5
Use SHA1 and not deprecated MD5 in demos.
2009-08-15 10:51:37 +00:00
Dr. Stephen Henson
5a96822f2c
Update default dependency flags.
...
Make error name discrepancies a fatal error.
Fix error codes.
make update
2009-08-12 17:08:44 +00:00
Dr. Stephen Henson
23b34259e0
Re-enable mdc2 default by default as the patent is now expired.
2009-08-12 16:45:35 +00:00
Dr. Stephen Henson
11b6cb8aae
Update README with bug report and contribution details.
2009-08-12 16:41:46 +00:00
Dr. Stephen Henson
a4bade7aac
PR: 1997
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
DTLS timeout handling fix.
2009-08-12 13:21:26 +00:00
Dr. Stephen Henson
e322b5d167
Typo
2009-08-10 15:53:11 +00:00
Dr. Stephen Henson
01af4edcfe
PR: 1999
...
Submitted by: "Bayram Kurumahmut" <kbayram@ubicom.com >
Approved by: steve@openssl.org
Don't use HAVE_FORK in apps/speed.c it can conflict with configured version.
2009-08-10 15:30:29 +00:00
Dr. Stephen Henson
ff0945cbdc
PR: 2004
...
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr >
Approved by: steve@openssl.org
Handle fractional seconds properly in ASN1_GENERALIZEDTIME_print
2009-08-10 14:57:11 +00:00
Dr. Stephen Henson
d5ec7d66a8
PR: 2003
...
Make it possible to install OpenSSL in directories with name other
than "lib" for example "lib64". Based on patch from Jeremy Utley.
2009-08-10 14:42:05 +00:00
Dr. Stephen Henson
dc0aebabe6
Add COMP error strings.
2009-08-09 14:58:05 +00:00
Dr. Stephen Henson
52828ca214
Add missing CHANGES entry.
2009-08-06 16:29:42 +00:00
Dr. Stephen Henson
757e9886a0
Update from HEAD.
2009-08-05 15:52:06 +00:00
Dr. Stephen Henson
f45e8c7bdd
PR: 2000
...
Submitted by: Vadim Zeitlin <vz-openssl@zeitlins.org >
Approved by: steve@openssl.org
Make no-comp compile without warnings.
2009-08-05 15:29:14 +00:00
Dr. Stephen Henson
ea904b4074
Update from HEAD.
2009-08-05 15:04:16 +00:00
Dr. Stephen Henson
ec6158d029
PR: 1996
...
Submitted by: steve@openssl.org
Change conflicting name "BLOCK" to "OPENSSL_BLOCK".
2009-07-27 21:21:25 +00:00
Dr. Stephen Henson
4386445c18
Change STRING to OPENSSL_STRING etc as common words such
...
as "STRING" cause conflicts with other headers/libraries.
2009-07-27 21:08:53 +00:00
Ben Laurie
a585aa6750
Fix warnings.
2009-07-26 12:26:38 +00:00
Dr. Stephen Henson
2475a52061
Update from 0.9.8-stable.
2009-07-24 13:47:52 +00:00
Dr. Stephen Henson
001dfac061
Remove MD2 test from WIN32 tests.
2009-07-24 13:43:23 +00:00
Dr. Stephen Henson
1b37c55e26
Fix typo.
2009-07-24 13:36:36 +00:00
Dr. Stephen Henson
3442781798
Update TABLE.
2009-07-24 13:29:45 +00:00
Dr. Stephen Henson
c9d3f123a6
Add new debug targets.
2009-07-24 13:29:13 +00:00
Dr. Stephen Henson
d069a4d15d
PR: 1990
...
Update from 0.9.8-stable.
2009-07-24 13:07:08 +00:00
Dr. Stephen Henson
f1ad8fb627
Doc update from HEAD.
2009-07-24 13:02:55 +00:00
Dr. Stephen Henson
d7406b1528
PR: 1993
...
Fix from 0.9.8-stable.
2009-07-24 11:52:32 +00:00
Dr. Stephen Henson
02ce897e80
Fix from 0.9.8-stable
2009-07-24 11:34:41 +00:00
Dr. Stephen Henson
0bd9d3a60e
Update from 0.9.8-stable.
2009-07-24 11:24:45 +00:00
Dr. Stephen Henson
b4c81fb6db
Update from 0.9.8-stable
2009-07-24 11:15:55 +00:00
Dr. Stephen Henson
0f566bda2b
Update from 0.9.8-stable.
2009-07-24 11:10:57 +00:00
Dr. Stephen Henson
f97a8149cd
Update from HEAD.
2009-07-16 09:54:49 +00:00
Dr. Stephen Henson
f4b6a3e9c0
Call CMS tests with "make test"
2009-07-15 17:59:17 +00:00
Dr. Stephen Henson
7dfae89768
Handle OSX ".dynlib" DSO extension.
2009-07-15 17:58:57 +00:00
Dr. Stephen Henson
d41ca3f0e2
Update for next beta.
2009-07-15 12:08:35 +00:00
Dr. Stephen Henson
65fc4c55be
Preparation for beta3 release.
2009-07-15 11:37:45 +00:00
Dr. Stephen Henson
5135d6b985
Fix error codes and indentation.
2009-07-15 11:32:58 +00:00
Dr. Stephen Henson
2202edeff0
PR: 1980
...
Submitted by: Victor Wagner <vitus@wagner.pp.ru >
Approved by: steve@openssl.org
Fix memory leaks.
2009-07-15 11:01:40 +00:00
Dr. Stephen Henson
c8f759ec74
Stop warning of signed/unsigned compare.
2009-07-14 15:28:44 +00:00
Dr. Stephen Henson
5fda10c6f1
Oops, use right function name...
2009-07-14 15:14:39 +00:00
Dr. Stephen Henson
11ba084e1b
Document MD2 deprecation.
2009-07-13 11:57:15 +00:00
Dr. Stephen Henson
cddd00166c
PR: 1984
...
Submitted by: Michael Tüxen <Michael.Tuexen@lurchi.franken.de >
Approved by: steve@openssl.org
Don't concatenate reads in DTLS.
2009-07-13 11:44:04 +00:00
Dr. Stephen Henson
0190aa7353
Update from HEAD.
2009-07-13 11:40:46 +00:00
Dr. Stephen Henson
1546de87f0
Fix from 0.9.8-stable.
2009-07-11 22:36:27 +00:00
Dr. Stephen Henson
affffaed3d
Update from HEAD.
2009-07-11 22:30:02 +00:00
Dr. Stephen Henson
0c644f1462
PR: 1985
...
Submitted by: Artem Chuprina <ran@cryptocom.ru >
Approved by: steve@openssl.org
Initialise flags.
2009-07-11 21:42:47 +00:00
Dr. Stephen Henson
a2da5c7daa
Make update.
2009-07-08 09:13:24 +00:00
Dr. Stephen Henson
c155d83f5b
Delete MD2 from algorithm tables and default compilation.
2009-07-08 08:50:53 +00:00
Dr. Stephen Henson
5a03e3ac3f
Fix from HEAD.
2009-07-04 12:05:14 +00:00
Dr. Stephen Henson
08b2097967
Update from HEAD.
2009-07-04 11:44:01 +00:00
Dr. Stephen Henson
15401859b5
PR: 1976
...
Submitted by: David McCullough <david_mccullough@securecomputing.com >
Approved by: steve@openssl.org
Cleanup some compile time warnings/magic numbers.
2009-07-01 15:46:43 +00:00
Dr. Stephen Henson
6f24165170
PR: 1974(partial)
...
Submitted by: David McCullough <david_mccullough@securecomputing.com >
Approved by: steve@openssl.org
Cryptodev digest support.
2009-07-01 15:42:38 +00:00
Dr. Stephen Henson
a8afd9382c
192, 256 bit AES and RC4 support for cryptodev.
2009-07-01 15:36:55 +00:00
Dr. Stephen Henson
caddf00d78
PR: 1974(partial)
...
Submitted by: David McCullough <david_mccullough@securecomputing.com >
Approved by: steve@openssl.org
Fix up RSA API compliance for rsa_nocrt_mod_exp method.
2009-07-01 15:25:17 +00:00
Dr. Stephen Henson
e105098b3f
PR: 1974 (partial)
...
Submitted by: David McCullough <david_mccullough@securecomputing.com >
Approved by: steve@openssl.org
If -DHAVE_CRYPTODEV is set enable cryptodev support
2009-07-01 14:55:59 +00:00
Dr. Stephen Henson
9852e7e4d7
PR: 1972
...
Submitted by: David McCullough <david_mccullough@securecomputing.com >
Approved by: steve@openssl.org
Add support for building with the uClinux-dist.
2009-07-01 11:43:57 +00:00
Dr. Stephen Henson
b855560192
PR: 1970
...
Submitted by: David McCullough <david_mccullough@securecomputing.com >
Reviewed by: steve@openssl.org
Fix unused variable "words" and uninitialised data "b".
2009-07-01 11:39:59 +00:00
Dr. Stephen Henson
f2f50efea3
PR: 1965
...
Submitted by: David McCullough <david_mccullough@securecomputing.com >
Approved by: steve@openssl.org
Make sure defines to remove SHA are correct.
2009-07-01 11:35:46 +00:00
Dr. Stephen Henson
2b3cd246e5
PR: 1962
...
Submitted by: Daniel Mentz <daniel.m@sent.com >
Reviewed by: steve@openssl.org
Fix "for dtls1_get_record() returns a bad record in one edge case" bug.
2009-07-01 11:29:01 +00:00
Dr. Stephen Henson
7171ade2c2
Submitted by: "Victor B. Wagner" <vitus@cryptocom.ru>
...
Reviewed by: steve@openssl.org
EVP_CTRL_PBE_PRF_NID suppot for Gost engine.
2009-07-01 11:23:07 +00:00
Dr. Stephen Henson
76ec9151d1
Update from 0.9.8-stable.
2009-06-30 22:26:28 +00:00
Dr. Stephen Henson
6c24dd9005
Typo.
2009-06-30 20:55:55 +00:00
Dr. Stephen Henson
e323afb0ce
Update from HEAD.
2009-06-30 16:10:24 +00:00
Dr. Stephen Henson
1fd43fd86e
PR: 1969
...
Submitted by: David McCullough <david_mccullough@securecomputing.com >
Approved by: steve@openssl.org
Don't use repeating key when testing algs.
2009-06-30 15:21:48 +00:00
Dr. Stephen Henson
3e70c81ed9
PR: 1967
...
Submitted by: David McCullough <david_mccullough@securecomputing.com >
Approved by: steve@openssl.org
Don't go past end of params array.
2009-06-30 15:10:54 +00:00
Dr. Stephen Henson
6e07229564
PR: 1966
...
Submitted by: David McCullough <david_mccullough@securecomputing.com >
Reviewed by: steve@openssl.org
Make no-ocsp work properly.
2009-06-30 15:08:38 +00:00
Dr. Stephen Henson
859d5eb2d7
PR: 1963
...
Submitted by: David McCullough <david_mccullough@securecomputing.com >
Approved by: steve@openssl.org
Make build fail if makedepend not present.
2009-06-30 14:59:59 +00:00
Dr. Stephen Henson
29b0c4a01c
Add "missing" functions for setting all verify parameters for SSL_CTX and SSL
...
structures.
2009-06-30 11:57:24 +00:00
Dr. Stephen Henson
b824f0f458
Redundant check: s->param is always non-NULL, it is set in SSL_new().
2009-06-30 11:41:35 +00:00
Dr. Stephen Henson
43ea53a04a
Inherit parameters properly in SSL contexts: any parameters set should
...
replace those in the current list.
2009-06-30 11:21:00 +00:00
Dr. Stephen Henson
fa07f00aaf
Update from HEAD.
2009-06-29 16:09:58 +00:00
Dr. Stephen Henson
dbb834ffeb
Update from 0.9.8-stable.
2009-06-28 16:24:11 +00:00
Dr. Stephen Henson
8549a8a5dc
Fix from 0.9.8-stable
2009-06-26 23:14:11 +00:00
Dr. Stephen Henson
887c250852
Update from 0.9.8-stable.
2009-06-26 15:04:22 +00:00
Dr. Stephen Henson
710c1c34d1
Allow checking of self-signed certifictes if a flag is set.
2009-06-26 11:28:52 +00:00
Dr. Stephen Henson
e16818108f
Fix from HEAD.
2009-06-25 17:11:48 +00:00
Dr. Stephen Henson
0cb76e79df
PR: 1748
...
Fix nasty SSL BIO pop bug. Since this changes the behaviour of SSL BIOs and
will break applications that worked around the bug only included in 1.0.0 and
later.
2009-06-25 11:26:45 +00:00
Ben Laurie
6cb419673e
DEBUG_BN_CTX doesn't really debug anything (it is essentially verbosity) and
...
has made make test far too noisy.
2009-06-25 10:15:06 +00:00
Dr. Stephen Henson
72d668c332
Update from HEAD.
2009-06-24 13:30:07 +00:00
Dr. Stephen Henson
5ce4799a38
Update from HEAD.
2009-06-17 12:19:35 +00:00
Dr. Stephen Henson
6178da0142
Update from HEAD.
2009-06-17 12:05:51 +00:00
Dr. Stephen Henson
27713e3fc2
Check t too.
2009-06-17 11:47:54 +00:00
Dr. Stephen Henson
3492c47b18
Update from HEAD.
2009-06-17 11:38:26 +00:00
Dr. Stephen Henson
43dc001b62
Update from HEAD.
2009-06-17 11:33:17 +00:00
Dr. Stephen Henson
8280b43a62
Update from HEAD.
2009-06-17 11:26:09 +00:00
Dr. Stephen Henson
85d9b02d16
Update from HEAD.
2009-06-16 16:55:01 +00:00
Dr. Stephen Henson
bfd502f027
Updates from HEAD.
2009-06-16 16:39:20 +00:00
Dr. Stephen Henson
f1ed5fa827
Update from 0.9.8-stable.
2009-06-15 15:00:19 +00:00
Dr. Stephen Henson
5bb9e1b4d4
Update from HEAD.
2009-06-15 11:23:33 +00:00
Ben Laurie
7de819237d
Two digits is not wide enough.
2009-06-14 10:23:29 +00:00
Ben Laurie
6cfab29b71
Make depend.
2009-06-14 02:37:22 +00:00
Dr. Stephen Henson
55708796af
Update from HEAD.
2009-06-13 20:47:09 +00:00
Dr. Stephen Henson
7074f1df07
Stop gcc bracket warning.
2009-06-05 14:57:10 +00:00
Dr. Stephen Henson
67d8ab07e6
Stop warning if dtls disabled.
2009-06-05 14:56:48 +00:00
Dr. Stephen Henson
4e63da0669
PR: 1950
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve@openssl.org
DTLS fragment retransmission bug.
2009-06-05 14:46:49 +00:00
Ben Laurie
15b0a5651c
Not always used.
2009-06-05 08:35:54 +00:00
Dr. Stephen Henson
4e66723517
Update from HEAD.
2009-06-02 11:23:30 +00:00
Dr. Stephen Henson
3e53c86001
Update from HEAD.
2009-06-02 11:06:28 +00:00
Dr. Stephen Henson
524e5b844b
Update from HEAD.
2009-06-01 12:14:15 +00:00
Dr. Stephen Henson
e1f09dfd84
PR: 1921
...
Submitted by: Michael Tuexen <tuexen@fh-muenster.de >
Reviewed by: steve@openssl.org
Add ECDHE and PSK support to DTLS.
2009-05-31 17:11:24 +00:00
Dr. Stephen Henson
f16411ccfd
Ensure canonical encodings of X509_NAME structures are valid.
2009-05-30 18:10:59 +00:00
Dr. Stephen Henson
2bbcd45b05
Update from HEAD.
2009-05-29 18:58:59 +00:00
Dr. Stephen Henson
fdc6c6ef08
Update from 0.9.8-stable.
2009-05-29 14:02:30 +00:00
Dr. Stephen Henson
6e87cc8da6
Need definition of struct timeval for dtls1.h which broke WIN32 builds,
...
so include winsock.h. (might be a cleaner way to do this...)
2009-05-28 20:53:16 +00:00
Dr. Stephen Henson
2d0b6c72b8
Update ordinals and sync with 0.9.8
2009-05-28 20:49:29 +00:00
Dr. Stephen Henson
3e84046f90
make errors
2009-05-28 20:45:26 +00:00
Dr. Stephen Henson
cc1cb996f1
Submitted by: Artem Chuprina <ran@cryptocom.ru>
...
Reviewed by: steve@openssl.org
Fix to match latest GOST in TLS draft.
2009-05-28 18:10:47 +00:00
Dr. Stephen Henson
32fbeacdfb
Add CHANGES entries from 0.9.8-stable.
2009-05-18 17:37:13 +00:00
Dr. Stephen Henson
431aad3c15
Delete line which should have gone with PR#1922.
2009-05-18 16:11:58 +00:00
Dr. Stephen Henson
0454f2c490
PR: 1929
...
Submitted by: Michael Tuexen <tuexen@fh-muenster.de >
Approved by: steve@openssl.org
Updated DTLS MTU bug fix.
2009-05-17 16:04:21 +00:00
Dr. Stephen Henson
5f911774bf
Revert previous MTU patch from PR#1929
2009-05-17 15:57:51 +00:00
Dr. Stephen Henson
66b7e42790
PR: 1599
...
Reformat PKCS12_parse manual page, document return values.
2009-05-17 14:48:02 +00:00
Richard Levitte
6a419388fc
Stupid typo
2009-05-17 07:22:15 +00:00
Dr. Stephen Henson
abda7c1147
PR: 1931
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Fix fragment handling memory leak.
2009-05-16 16:22:11 +00:00
Dr. Stephen Henson
88b48dc680
PR: 1930
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Limit size of DTLS record buffer queue.
2009-05-16 16:17:46 +00:00
Dr. Stephen Henson
661d35dfb2
Disable ECDHE in DTLS in a cleaner way.
2009-05-16 11:16:15 +00:00
Dr. Stephen Henson
f99c9daa39
Make the stuff compile again, fix missing prototype warnings.
2009-05-16 11:14:55 +00:00
Dr. Stephen Henson
019b3f3e5a
Update from HEAD.
2009-05-15 23:07:41 +00:00
Dr. Stephen Henson
d6584eba8c
PR: 1922
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
DTLS Timer bug fix.
2009-05-15 22:58:13 +00:00
Dr. Stephen Henson
a379c433a3
PR: 1925
...
Submitted by: "Green, Paul" <Paul.Green@stratus.com >
Approved by: steve@openssl.org
VOS extended name support.
2009-05-15 22:50:12 +00:00
Richard Levitte
006c7c6bb1
Functional VMS changes submitted by sms@antinode.info (Steven M. Schweda).
...
Thank you\!
(note: not tested for now, a few nightly builds should give indications though)
2009-05-15 16:37:08 +00:00
Richard Levitte
bd4a902a15
Have mkdef.pl also handle VAX and Non-VAX differences for VMS
2009-05-15 16:01:42 +00:00
Richard Levitte
17ae5e9f13
Add a comment about libeay.num and ssleay.num
2009-05-15 16:00:08 +00:00
Andy Polyakov
baa5f52422
x86[_64]cpuid.pl: update from HEAD.
2009-05-14 18:25:29 +00:00
Dr. Stephen Henson
b3620451b2
PR: 1921
...
Submitted by: steve@openssl.org
Our DTLS implementation doesn't currently handle ECDHE so don't include
unsupported ciphers in client hello.
2009-05-13 16:25:35 +00:00
Dr. Stephen Henson
d2f17d9615
Print out DTLS versions too.
2009-05-13 16:24:12 +00:00
Dr. Stephen Henson
561cbe5678
PR: 1923
...
Submitted by: Daniel Mentz <daniel.m@sent.com >, Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Don't access freed data structure.
2009-05-13 11:51:30 +00:00
Dr. Stephen Henson
756d2074b8
PR: 1924
...
Submitted by: "Green, Paul" <Paul.Green@stratus.com >
Approved by: steve@openssl.org
Fix _POSIX_C_SOURCE usage.
2009-05-13 11:32:24 +00:00
Andy Polyakov
c65db618bb
e_padlock.c: update from HEAD.
2009-05-12 20:24:23 +00:00
Dr. Stephen Henson
8355647403
Typo.
2009-05-07 16:26:44 +00:00
Dr. Stephen Henson
b839d73411
Typo.
2009-05-06 16:58:27 +00:00
Dr. Stephen Henson
4563c1e043
Add debug-VC-WIN32 target and let mk1mf.pl auto detect it, update docs.
2009-05-06 16:54:25 +00:00
Richard Levitte
11f35a036d
Select updates from HEAD
2009-05-06 14:03:24 +00:00
Dr. Stephen Henson
d8646dab14
Don't use -D_CRT_NONSTDC_NO_DEPRECATE, fix bio_lcl.h instead.
2009-05-06 10:23:39 +00:00
Andy Polyakov
47b3cd98f2
Configure: update from HEAD (Camellia assembler in VC-WIN64A, CAPI engine
...
in mingw64).
2009-05-05 19:25:53 +00:00
Andy Polyakov
27c7e53882
ec_mult.c: update from HEAD (Win64 compile warnings).
2009-05-05 19:23:45 +00:00
Andy Polyakov
b2b28803fb
cryptlib.c: update from HEAD.
2009-05-05 19:23:14 +00:00
Andy Polyakov
8e92b1b9ce
perlasm: update from HEAD.
2009-05-05 19:21:12 +00:00
Andy Polyakov
0f41ccf370
e_capi.c: update from HEAD.
2009-05-05 19:17:00 +00:00
Richard Levitte
c44544a1d7
Update from HEAD
2009-05-05 08:46:30 +00:00
Dr. Stephen Henson
4e50f02638
If an SSLv2 method is explicitly asked for use the SSLv2 cipher string:
...
assume an application *really* wants SSLv2 if they do that.
Otherwise stick with the default which excludes all SSLv2 cipher suites.
2009-04-29 14:12:54 +00:00
Dr. Stephen Henson
174ea15647
Typo.
2009-04-28 22:35:42 +00:00
Dr. Stephen Henson
18f8258a87
PR: 1629
...
Submitted by: Kaspar Brand <ossl-rt@velox.ch >
Approved by: steve@openssl.org
Don't use extensions if using SSLv3: this chokes some broken servers.
2009-04-28 22:01:53 +00:00
Dr. Stephen Henson
376bbb5887
PR: 1914
...
Make safestack work with C++.
2009-04-28 21:56:04 +00:00
Richard Levitte
2c8275409e
Update from HEAD.
2009-04-28 13:00:50 +00:00
Andy Polyakov
892582b541
v3_alt.c: otherName parsing fix from HEAD.
...
Submitted by: Love Hoernquist Aastrand
2009-04-27 19:37:23 +00:00
Andy Polyakov
57b53c1b0a
VC-32.pl: update from HEAD.
2009-04-27 19:32:13 +00:00
Andy Polyakov
004c3ca521
test_padlock: update from HEAD.
2009-04-27 19:31:52 +00:00
Andy Polyakov
f0f00f9272
sha*-s390x.pl: minor update from HEAD.
2009-04-27 19:31:30 +00:00
Andy Polyakov
a243c68736
rc4-x86_64.pl: Win64 SEH update from HEAD.
2009-04-27 19:31:04 +00:00
Andy Polyakov
467d9f2a34
b_sock.c: readability update from HEAD.
2009-04-27 19:30:36 +00:00
Richard Levitte
226a94963a
Updates from HEAD
2009-04-27 00:08:50 +00:00
Dr. Stephen Henson
d7f0d147b1
Update docs: can use backslashes now.
2009-04-26 15:50:55 +00:00
Dr. Stephen Henson
26902b9aad
Prevent warning if WINCE not used.
2009-04-26 15:04:06 +00:00
Dr. Stephen Henson
3c69d6bec4
Add extra no deprecate flags in Configure.
2009-04-26 14:54:23 +00:00
Dr. Stephen Henson
4f44677a41
This at least break WIN32 which doesn't have sys/time.h might need to make
...
this a bit more generous later...
2009-04-26 14:53:58 +00:00
Richard Levitte
88d9f669c5
Add local symbol hacks for OpenVMS
2009-04-26 12:26:04 +00:00
Richard Levitte
22e1421672
Cast to avoid signedness confusion
2009-04-26 12:16:12 +00:00
Richard Levitte
5409414eff
Updates from HEAD
2009-04-26 11:35:58 +00:00
Dr. Stephen Henson
7134507de0
Make no-rsa, no-dsa and no-dh compile again.
2009-04-23 17:16:40 +00:00
Dr. Stephen Henson
fe41d9853c
Make no-ec work
2009-04-23 16:25:00 +00:00
Dr. Stephen Henson
d07692cd96
Make no-gost work properly.
2009-04-23 16:12:09 +00:00
Dr. Stephen Henson
82ae57136b
Some no-ec fixes (not complete yet).
2009-04-23 15:24:27 +00:00
Dr. Stephen Henson
30baeaaeab
CryptoAPI engine only exists on WIN32.
2009-04-22 17:36:45 +00:00
Dr. Stephen Henson
87a0f4b92e
PR: 1902
...
Add ecdsa/ecdh algorithms to default for speed utility.
2009-04-22 17:31:04 +00:00
Dr. Stephen Henson
1b08bcbfe3
Find openssl utility if on the PATH.
2009-04-22 16:50:42 +00:00
Dr. Stephen Henson
346b1001eb
PR: 1903
...
Submitted by: "Paul Smedley" <pauldespam@despamsmedley.id.au >
Approved by: steve@openssl.org
OS/2 fixes (excludes Makefile.shared patch for now).
2009-04-22 16:21:20 +00:00
Dr. Stephen Henson
b61a84c8e6
Fix WIN32 warnings.
2009-04-22 15:40:54 +00:00
Dr. Stephen Henson
a543ea44bc
Fix WIN32 warning.
2009-04-22 12:17:02 +00:00
Dr. Stephen Henson
b0dd3d1b94
Another kerberos fix.
2009-04-21 22:30:54 +00:00
Dr. Stephen Henson
461be68b75
Change version to beta3-dev
2009-04-21 22:27:41 +00:00
Dr. Stephen Henson
21fb688d26
Some fixes for kerberos builds.
2009-04-21 22:20:12 +00:00
Dr. Stephen Henson
d8faad27b7
Fix RFC num.
2009-04-21 15:42:01 +00:00
Dr. Stephen Henson
dab7075946
Update STATUS.
2009-04-21 15:19:15 +00:00
Dr. Stephen Henson
dfc8e96daa
Fix warning.
2009-04-21 15:11:59 +00:00
Dr. Stephen Henson
71d3eaf358
make update.
2009-04-21 15:02:20 +00:00
Dr. Stephen Henson
ef6b25be63
Beta 2 preparation.
2009-04-21 14:58:57 +00:00
Dr. Stephen Henson
b452f43322
PR: 1751
...
Submitted by: David Woodhouse <dwmw2@infradead.org >
Approved by: steve@openssl.org
Compatibility patches for Cisco VPN client DTLS.
2009-04-19 18:03:13 +00:00
Dr. Stephen Henson
52891f832f
Fix error header files and error files too.
2009-04-19 17:58:01 +00:00
Dr. Stephen Henson
9990cb75c1
PR: 1894
...
Submitted by: Ger Hobbelt <ger@hobbelt.com >
Approved by: steve@openssl.org
Fix various typos and stuff.
2009-04-16 17:22:51 +00:00
Dr. Stephen Henson
a5cc69c7ae
PR: 1900
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Remove unnecessary included header file.
2009-04-16 16:42:02 +00:00
Dr. Stephen Henson
0b4b8ba64e
PR: 1895
...
Submitted by: Ger Hobbelt <ger@hobbelt.com >
Approved by: steve@openssl.org
Updates to mkerr.pl script.
2009-04-15 15:16:29 +00:00
Dr. Stephen Henson
268e78c305
PR: 1899
...
Submitted by: Ger Hobbelt <ger@hobbelt.com >
Approved by: steve@openssl.org
Check for <= 0 when verifying CRL issuers.
2009-04-15 15:07:09 +00:00
Dr. Stephen Henson
c900a78c99
PR: 1828
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Updated DTLS Rentransmission bug patch.
2009-04-15 14:49:36 +00:00
Dr. Stephen Henson
46ffb2dc97
PR #1828 reverted: state save/restore incompatible with 1.0.0-stable.
2009-04-14 15:29:34 +00:00
Dr. Stephen Henson
10acacb3bf
Fix typo and stop WIN32 warnings.
2009-04-14 15:13:35 +00:00
Dr. Stephen Henson
aab790a656
PR: 1829
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
DTLS Timer Bug fix.
2009-04-14 14:33:12 +00:00
Dr. Stephen Henson
1319aad994
PR: 1647
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Update patch for PR#1647.
2009-04-14 14:22:26 +00:00
Dr. Stephen Henson
3c0ce01cea
PR: 1827
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Updated patch for PR #1827
2009-04-14 14:20:57 +00:00
Dr. Stephen Henson
9fcbefebdb
PR: 1828
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Update from 0.9.8-stable.
2009-04-14 14:19:46 +00:00
Dr. Stephen Henson
017d2a887f
PR: 1838
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Updated patch from 0.9.8-stable.
2009-04-14 14:18:16 +00:00
Dr. Stephen Henson
0416482605
Make update.
2009-04-13 11:40:00 +00:00
Dr. Stephen Henson
0f17424918
PR: 1786
...
Submitted by: Ger Hobbelt <ger@hobbelt.com >
Approved by: steve@openssl.org
Add missing IMPLEMENT.
2009-04-13 11:36:19 +00:00
Dr. Stephen Henson
55ed10db21
PR: 1785
...
Submitted by: Ger Hobbelt <ger@hobbelt.com >
Approved by: steve@openssl.org
Properly handle malloc failure.
2009-04-13 11:31:22 +00:00
Dr. Stephen Henson
3877b6bfe9
PR: 1896
...
Submitted by: Ger Hobbelt <ger@hobbelt.com >
Approved by: steve@openssl.org
Remove double sk_*_free() definition and add missing definition to mkstack.pl
2009-04-13 11:26:31 +00:00
Dr. Stephen Henson
a0f32454b6
PR: 1898
...
Submitted by: Ger Hobbelt <ger@hobbelt.com >
Approved by: steve@openssl.org
Include correct headers in selftest.pl generated code.
2009-04-13 11:22:55 +00:00
Dr. Stephen Henson
6fda4d7e5d
PR: 1887
...
Submitted by: "Victor B. Wagner" <vitus@cryptocom.ru >
Approved by: steve@openssl.org
Document/clarify use of some options and include details of GOST algorihthm
usage.
2009-04-10 16:42:28 +00:00
Dr. Stephen Henson
36a252ea46
Typo.
2009-04-10 11:35:31 +00:00
Dr. Stephen Henson
a31a195246
PR: 1887 (part, modified)
...
Submitted by: "Victor B. Wagner" <vitus@cryptocom.ru >
Approved by: steve@openssl.org
Use correct command names in -engine description and fix typo.
2009-04-10 11:25:54 +00:00
Dr. Stephen Henson
5f590d2218
PR: 1887 (part)
...
Submitted by: "Victor B. Wagner" <vitus@cryptocom.ru >
Approved by: steve@openssl.org
Added error codes for ccgost.
2009-04-10 11:07:35 +00:00
Dr. Stephen Henson
791b7bc715
Fix usage messages and lookup digests later in req command.
...
(part of PR #1887 )
2009-04-10 11:00:12 +00:00
Dr. Stephen Henson
19ae090787
Print out registered digest names in dgst utility instead of hard
...
coding them. Modify EVP_MD_do_all() to include registered digest name.
This is a modified version of part of PR#1887.
2009-04-10 10:30:27 +00:00
Dr. Stephen Henson
db3076621b
PR: 1892
...
Fix memory leak when email:move option used.
2009-04-08 15:58:07 +00:00
Dr. Stephen Henson
9ae5743515
Disable SSLv2 cipher suites by default and avoid SSLv2 compatible client
...
hello if no SSLv2 cipher suites are included. This effectively disables
the broken SSLv2 use by default.
2009-04-07 17:01:07 +00:00
Dr. Stephen Henson
c184b140df
Update from 0.9.8-stable.
2009-04-07 16:30:32 +00:00
Dr. Stephen Henson
9d80aa7e3f
Update from 0.9.8-stable
2009-04-07 12:10:59 +00:00
Dr. Stephen Henson
15671a90a9
PR: 1677
...
Submitted by: Vennemann <rvennemann@cool.ms >
Approved by: steve@openssl.org
Call RSA_new() after ENGINE has been set up.
2009-04-06 21:42:11 +00:00
Dr. Stephen Henson
0048464449
Use basename of objxref.pl not whole path in generated header.
2009-04-06 16:16:23 +00:00
Dr. Stephen Henson
b422166ce0
Updates from HEAD.
2009-04-06 16:02:51 +00:00
Dr. Stephen Henson
81be661ae2
PR: 1626
...
Submitted by: Cerutti Pietro <pietro.cerutti@bfh.ch >
Fix manual page.
2009-04-06 15:16:41 +00:00
Dr. Stephen Henson
8681c66eec
PR: 1890
...
Submitted by: "Green, Paul" <Paul.Green@stratus.com >
Approved by: steve@openssl.org
Fixes to --with-zlib-include and --with-zlib-lib and init PRNG for VOS.
2009-04-06 14:31:36 +00:00
Dr. Stephen Henson
69a0034e50
PR: 1899
...
Submitted by: Doug Kaufman <dkaufman@rahul.net >
Approved by: steve@openssl.org
Mingw fixes.
2009-04-06 14:25:02 +00:00
Dr. Stephen Henson
c9a1778134
Fix error codes.
2009-04-05 11:54:34 +00:00
Dr. Stephen Henson
326794e9c6
Change default openssl.cnf to only use issuer+serial option in AKID if no
...
SKID.
2009-04-04 18:09:43 +00:00
Dr. Stephen Henson
2dd5ca1fbc
Make no-ssl2 work including on Win32 builds.
2009-04-04 17:57:34 +00:00
Ben Laurie
3042945ac8
Fix warning.
2009-04-04 13:39:48 +00:00
Dr. Stephen Henson
da29b0d335
Fix for VC++ 6 which chokes on the empty argument.
2009-04-04 11:44:48 +00:00
Dr. Stephen Henson
6abbc68188
PR: 1870
...
Submitted by: kilroy <kilroy@mail.zutom.sk >
Approved by: steve@openssl.org
Handle pkcs12 format correctly by not assuming PEM format straight away.
2009-04-03 17:06:35 +00:00
Dr. Stephen Henson
25f6c7fd8b
Update from 0.9.8-stable.
2009-04-03 16:54:37 +00:00
Dr. Stephen Henson
1cf3571ea4
PR: 1888
...
Submitted by: Tim Rice <tim@multitalents.net >
Approved by: steve@openssl.org
Allow SOCKLEN_T type to be overridden at config time e.g.
./config -DSOCKLEN_T=int
2009-04-03 16:44:40 +00:00
Dr. Stephen Henson
d769e7a58c
PR: 1613
...
Submitted by: "Jean Rebiffe" <jrebiffe@gmail.com >
Approved by: steve@openssl.org
Free section.
2009-04-03 16:21:01 +00:00
Dr. Stephen Henson
fa3619f233
Update version info, fix typo.
2009-04-03 11:50:59 +00:00
Dr. Stephen Henson
a414cbcad3
Update from 0.9.8-stable.
2009-04-03 11:37:47 +00:00
Dr. Stephen Henson
c6196da587
Update from 0.9.8-stable.
2009-04-02 22:28:52 +00:00
Dr. Stephen Henson
5d48762647
Make PKCS12_parse() handle some PKCS#12 files which have their own ideas
...
about settings for local key id...
2009-04-02 17:44:50 +00:00
Dr. Stephen Henson
77e749405d
Fix demo program.
2009-04-02 17:39:25 +00:00
Dr. Stephen Henson
9ccd4e224f
Add USE_SOCKETS.
2009-04-02 15:19:03 +00:00
Dr. Stephen Henson
1dad4f3672
PR: 1882
...
Submitted by: Corinna Vinschen <vinschen@redhat.com >
Approved by: steve@openssl.org
Typo.
2009-04-02 15:04:01 +00:00
Dr. Stephen Henson
59745556b4
Add another one...
2009-04-01 15:22:00 +00:00
Dr. Stephen Henson
fab4447179
PR: 1880
...
Document -ocsp_uri command line switch to x509 utility.
2009-04-01 15:06:28 +00:00
Dr. Stephen Henson
417b8d4705
PR:1880
...
Load config in ts utility.
2009-04-01 14:59:18 +00:00
Dr. Stephen Henson
e614ec4769
Update README.
2009-04-01 08:57:37 +00:00
Dr. Stephen Henson
a6b03f4138
Make update fixing duplicate ASN1 error codes.
2009-04-01 08:55:54 +00:00
Dr. Stephen Henson
809fa4cc59
Update for first beta.
2009-04-01 08:47:28 +00:00
Dr. Stephen Henson
463f448595
Win32 build fixes.
2009-03-31 22:04:25 +00:00
Dr. Stephen Henson
5cd0cf8cce
Fix other read call too.
2009-03-31 21:57:26 +00:00
Dr. Stephen Henson
49cb959494
Use OPENSSL_SYS_WIN32 instead of _WIN32
2009-03-31 21:45:29 +00:00
Dr. Stephen Henson
783a73c47f
Oops.
2009-03-31 21:39:54 +00:00
Dr. Stephen Henson
99bf516908
Add update from 0.9.8-stable branch.
2009-03-31 21:35:55 +00:00
Dr. Stephen Henson
a26c372cfc
Fix shlib version.
2009-03-31 21:21:42 +00:00
Dr. Stephen Henson
ed5ac22e5b
Correct version.
2009-03-31 21:19:17 +00:00
cvs2svn
3d11b8f896
This commit was manufactured by cvs2svn to create branch
...
'OpenSSL_1_0_0-stable'.
2009-03-31 19:54:52 +00:00
Dr. Stephen Henson
70b2186e24
Stop warnings.
2009-03-31 19:54:51 +00:00
Dr. Stephen Henson
64ecdaeca9
HEAD is now 1.1.0
...
The 1.0.0 branch is now OpenSSL_1_0_0-stable
2009-03-31 10:38:37 +00:00
Dr. Stephen Henson
4e74239df1
Update STATUS and NEWS.
2009-03-30 11:33:03 +00:00
Dr. Stephen Henson
aaf35f11d7
Allow use of algorithm and cipher names for dgsts and enc utilities instead
...
of having to manually include each one.
2009-03-30 11:31:50 +00:00
Dr. Stephen Henson
093f5d2c15
Nothing to see here... move along....
2009-03-28 17:12:51 +00:00
Dr. Stephen Henson
7f1c086b21
Update NEWS file.
2009-03-28 16:21:44 +00:00
Dr. Stephen Henson
77ea8c3002
Fix typo in CHANGES.
2009-03-25 22:21:12 +00:00
Dr. Stephen Henson
ddcfc25a6d
Update from stable branch.
2009-03-25 19:02:22 +00:00
Dr. Stephen Henson
4d7b7c62c3
Update CHANGES.
2009-03-25 12:57:50 +00:00
Dr. Stephen Henson
dd009fe655
Update FAQ.
2009-03-25 12:54:47 +00:00
Dr. Stephen Henson
73ba116e96
Update from stable branch.
2009-03-25 12:54:14 +00:00
Dr. Stephen Henson
80b2ff978d
Update from stable branch.
2009-03-25 12:53:50 +00:00
Dr. Stephen Henson
7ce8c95d58
Update from stable branch.
2009-03-25 12:53:26 +00:00
Dr. Stephen Henson
38b6e6c07b
Typo in usage message.
2009-03-23 21:04:23 +00:00
Dr. Stephen Henson
e4e949192b
Submitted by: Victor B. Wagner <vitus@cryptocom.ru>
...
Reviewed by: steve@openssl.org
Check return codes properly in md BIO and dgst command.
2009-03-18 18:53:08 +00:00
Andy Polyakov
4e52b9845e
aes-390x.pl: commentary update.
2009-03-17 20:04:11 +00:00
Andy Polyakov
e22b864846
Make SPARC assembler modules *really* Purify-friendly.
2009-03-17 18:31:08 +00:00
Dr. Stephen Henson
b6af2c7e3e
Submitted by: "Victor B. Wagner" <vitus@cryptocom.ru>
...
Reviewed by: steve@openssl.org
Update ccgost engine to support parameter files.
2009-03-17 15:38:34 +00:00
Andy Polyakov
57db09906b
Excuse myself from integrating sha1-sparcv9a.pl into build system, but
...
make it Purify-friendly...
2009-03-16 13:48:42 +00:00
Andy Polyakov
4c78bc05c4
Make SPARC assembler Pirify-friendly (Purify can't cope with certain
...
PIC constructs).
2009-03-16 13:32:38 +00:00
Dr. Stephen Henson
ef8e772805
Use OPENSSL_assert() instead of assert.
2009-03-15 14:04:42 +00:00
Dr. Stephen Henson
54571ba004
Use correct ctx name.
2009-03-15 14:03:47 +00:00
Dr. Stephen Henson
237d7b6cae
Fix from stable branch.
2009-03-15 13:37:34 +00:00
Dr. Stephen Henson
854a225a27
Update from stable branch.
2009-03-14 18:33:49 +00:00
Dr. Stephen Henson
e39acc1c90
PR: 1864
...
Submitted by: Ger Hobbelt <ger@hobbelt.com >
Reviewed by: steve@openssl.org
Check return value.
2009-03-14 12:39:05 +00:00
Dr. Stephen Henson
a0b76569b2
Update from stable branch.
2009-03-14 12:26:48 +00:00
Dr. Stephen Henson
78625cac82
Submitted by: Victor Duchovni <Victor.Duchovni@morganstanley.com>
...
Reviewed by: steve@openssl.org
Check return value of sk_SSL_COMP_find() properly.
2009-03-12 17:30:29 +00:00
Dr. Stephen Henson
c28a9165f2
PR: 1862
...
Typo.
2009-03-12 17:13:15 +00:00
Dr. Stephen Henson
617298dca3
Update from stable branch.
2009-03-12 17:10:26 +00:00
Dr. Stephen Henson
33ab2e31f3
PR: 1854
...
Submitted by: Oliver Martin <oliver@volatilevoid.net >
Reviewed by: steve@openssl.org
Support GeneralizedTime in ca utility.
2009-03-09 13:59:07 +00:00
Dr. Stephen Henson
bb7ccdfbe2
Update from stable branch.
2009-03-09 13:08:04 +00:00
Dr. Stephen Henson
c836f8ef73
Update from stable branch.
2009-03-09 12:30:10 +00:00
Dr. Stephen Henson
4df100935f
Update from stable branch.
2009-03-09 12:21:19 +00:00
Dr. Stephen Henson
2a0ff7ad20
Typo.
2009-03-08 12:01:20 +00:00
Ben Laurie
c2a548a884
Print IPv6 all 0s correctly (Rob Austein).
2009-03-08 10:54:45 +00:00
Dr. Stephen Henson
77202a85a0
Update from stable branch.
2009-03-07 17:00:23 +00:00
Ben Laurie
73bfcf2226
Don't ask for -iv for ciphers that need no IV.
2009-03-03 15:14:33 +00:00
Ben Laurie
2121f15daf
Use the right length (reported by Quanhong Wang).
2009-03-03 15:12:56 +00:00
Dr. Stephen Henson
b2cf7c6452
Submitted by: "Victor B. Wagner" <vitus@cryptocom.ru>
...
Approved by: steve
Recognise "enable-zlib" in mkdef.pl to handle "zlib" option when passed
to Configure.
2009-02-25 11:55:15 +00:00
Ben Laurie
7587347bc4
Fix memory leak.
2009-02-23 16:40:59 +00:00
Richard Levitte
ae3b4f2336
Make STORE an experimental feature.
2009-02-19 09:43:18 +00:00
Richard Levitte
605b04f661
Make it possible to disable STORE.
2009-02-19 09:42:51 +00:00
Richard Levitte
97132a0f8e
Reference bug.
2009-02-19 09:42:32 +00:00
Dr. Stephen Henson
30e5e39a3d
PR: 1778
...
Increase default verify depth to 100.
2009-02-16 23:23:21 +00:00
Dr. Stephen Henson
2c618ab993
Submitted by: "Victor B. Wagner" <vitus@cryptocom.ru>
...
Reviewed by: steve@openssl.org
Change default Gost parameter set to id_Gost28147_89_CryptoPro_A_ParamSet
2009-02-16 21:52:01 +00:00
Dr. Stephen Henson
b5d5c0a21f
PR: 1843
...
Use correct array size for SHA1 hash.
2009-02-16 21:42:48 +00:00
Richard Levitte
f8ea4757cc
Data not initialised.
...
Notified by Gerardo Ganis <gerardo.ganis@cern.ch >
2009-02-16 15:17:24 +00:00
Dr. Stephen Henson
0ed6b52687
Stop warning about use of *printf() without a format.
2009-02-15 15:29:59 +00:00
Dr. Stephen Henson
a63bf2c53c
Make no-engine work again.
2009-02-15 15:28:18 +00:00
Ben Laurie
b3f3407850
Use new common flags and fix resulting warnings.
2009-02-15 14:08:51 +00:00
Dr. Stephen Henson
477fd4596f
PR: 1835
...
Submitted by: Damien Miller <djm@mindrot.org >
Approved by: steve@openssl.org
Fix various typos.
2009-02-14 21:49:38 +00:00
Dr. Stephen Henson
30b1b28aff
Return correct exit code.
2009-02-12 18:06:11 +00:00
Dr. Stephen Henson
46400c97a9
Avoid leaks in pkcs8 app, tidy code up.
2009-02-12 18:02:47 +00:00
Andy Polyakov
c558c99fd8
rc4-s390x.pl: allow for older assembler and optimize character loop.
2009-02-12 14:48:49 +00:00
Andy Polyakov
13c3a1defa
RC4 for s390x.
2009-02-11 10:01:36 +00:00
Dr. Stephen Henson
aaa29f9e83
Add error checking to obj_xref.pl and add command line support for data
...
file locations.
2009-02-10 13:03:31 +00:00
Dr. Stephen Henson
ede6ef5e08
Submitted by: Peter Sylvester <Peter.Sylvester@edelweb.fr>
...
Reviewed by: steve
If tagging is universal and SET or SEQUENCE set constructed bit.
2009-02-10 12:13:08 +00:00
Andy Polyakov
0f529cbdc3
s390x-mont.pl: optimize prologue.
2009-02-10 08:46:48 +00:00
Andy Polyakov
eb55b9fc19
linux-s390x failed link after assembler pack update.
2009-02-10 07:43:48 +00:00
Andy Polyakov
7012d2a8fa
sha1-sparcv9a.pl: fix bug in commentary section.
2009-02-09 16:03:33 +00:00
Andy Polyakov
8626230a02
s390x assembler pack update.
2009-02-09 15:42:04 +00:00
Andy Polyakov
c23632d3f1
Reserve for "multilib" suffix, the one allowing to perform multi-ABI
...
installations. It's not enabled in Makefiles yet.
2009-02-09 15:11:22 +00:00
Dr. Stephen Henson
3859d7ee78
Just to be awkward Ubuntu 8.10 doesn't like _XOPEN_SOURCE_EXTENDED...
2009-02-06 16:43:52 +00:00
Bodo Möller
d615bceb2d
For -hex, print just one \n
2009-02-02 00:40:29 +00:00
Bodo Möller
7ca1cfbac3
-hex option for openssl rand
...
PR: 1831
Submitted by: Damien Miller
2009-02-02 00:01:28 +00:00
Bodo Möller
d8e8fc4803
Put back a variable deleted by the previous revision,
...
but used in the code.
2009-02-01 01:08:13 +00:00
Dr. Stephen Henson
57f39cc826
Print out UTF8 and NumericString types in ASN1 parsing utility.
2009-01-28 12:54:52 +00:00
Dr. Stephen Henson
6489573224
Update from stable branch.
2009-01-28 12:36:14 +00:00
Dr. Stephen Henson
079e00e646
Typo: just copy across an unknown type.
2009-01-28 12:32:03 +00:00
Richard Levitte
5871ddb016
Because DEC C - sorry, HP C - is picky about features, we need to
...
define _XOPEN_SOURCE_EXTENDED to reach fd_set and timeval types and
functionality.
2009-01-28 07:38:14 +00:00
Richard Levitte
c7ba21493a
Hopefully resolve signed vs unsigned issue.
2009-01-28 07:09:23 +00:00
Richard Levitte
8bf5001612
Do the Camellia part right
2009-01-28 07:01:29 +00:00
Richard Levitte
6ed9dfb23a
Synchronise with Unix build
2009-01-20 05:39:24 +00:00
Ben Laurie
7f62532030
Allow CC to be overridden.
2009-01-18 12:06:37 +00:00
Dr. Stephen Henson
c2c99e2860
Update certificate hash line format to handle canonical format
...
and avoid MD5 dependency.
2009-01-15 13:22:39 +00:00
Dr. Stephen Henson
8125d9f99c
Make PKCS#8 the standard write format for private keys, replacing the
...
ancient SSLeay format.
2009-01-15 12:52:38 +00:00
Dr. Stephen Henson
8e6925b0cd
Add CRYPTO_MDEBUG_ABORT to abort() is there are any memory leaks. This will
...
cause "make test" failures and make resource leaks more obvious.
2009-01-11 20:36:50 +00:00
Dr. Stephen Henson
d7ecd42255
Fix warnings properly this time ;-)
2009-01-11 20:34:23 +00:00
Dr. Stephen Henson
41b7619596
Fix missing prototype warnings then fix different prototype warnings ;-)
2009-01-11 16:17:26 +00:00
Dr. Stephen Henson
211655fcdd
Fix sign-compare warnings.
2009-01-11 15:58:51 +00:00
Dr. Stephen Henson
363bd0b48e
Add a set of standard gcc warning options which are designed to be the
...
minimum requirement for committed code. Added to debug-steve* config targets
for now.
2009-01-11 15:56:32 +00:00
Ben Laurie
60aee6ce15
Add missing entry.
2009-01-09 12:48:02 +00:00
Dr. Stephen Henson
bab534057b
Updatde from stable branch.
2009-01-07 23:44:27 +00:00
Dr. Stephen Henson
cec2af7510
Update FAQ.
2009-01-07 12:15:15 +00:00
Andy Polyakov
6de3683908
Add UltraSPARC VIS-powered SHA1 block procedure.
2009-01-05 14:52:31 +00:00
Lutz Jänicke
fceac0bc74
Fix compilation with -no-comp by adding some more #ifndef OPENSSL_NO_COMP
...
Some #include statements were not properly protected. This will go unnoted
on most systems as openssl/comp.h tends to be installed as a system header
file by default but may become visible when cross compiling.
2009-01-05 14:43:05 +00:00
Richard Levitte
792bbc2374
VMS stuff I forgot...
2009-01-03 09:25:32 +00:00
Ben Laurie
4a94003a51
srvr_ecdh cannot be NULL at this point (Coverity ID 232).
2009-01-02 12:49:07 +00:00
Andy Polyakov
ab4d689832
Makefile.shared: improve portability of commit#17753.
2009-01-02 09:02:27 +00:00
Ben Laurie
23b973e600
Calculate offset correctly. (Coverity ID 233)
2009-01-01 18:30:51 +00:00
Andy Polyakov
b3b201b6f7
Styling update to makefiles: eliminate redundant pipes.
2008-12-30 13:20:17 +00:00
Ben Laurie
d41c785d69
Document dead code.
2008-12-30 13:02:02 +00:00
Andy Polyakov
a370537bde
Styling update to makefiles: $() to denote make substitutions and $${} -
...
shell ones.
2008-12-29 16:17:52 +00:00
Ben Laurie
2bd45dc94c
Apparently s->ctx could be NULL. (Coverity ID 147).
2008-12-29 16:15:27 +00:00
Ben Laurie
121f9e743c
Apparently s->ctx could be NULL at this point (see earlier
...
test). (Coverity ID 148).
2008-12-29 16:13:49 +00:00
Ben Laurie
0eab41fb78
If we're going to return errors (no matter how stupid), then we should
...
test for them!
2008-12-29 16:11:58 +00:00
Ben Laurie
8aa02e97a7
Make sure a bad parameter to RSA_verify_PKCS1_PSS() doesn't lead to a crash.
...
(Coverity ID 135).
2008-12-29 13:35:08 +00:00
Andy Polyakov
a68c7b9171
bn_lib.c: [re-]fix Win64 compiler warning.
2008-12-29 12:44:33 +00:00
Andy Polyakov
5cabcf96e7
Fix "possible loss of data" Win64 compiler warnings.
2008-12-29 12:35:49 +00:00
Ben Laurie
85e878f224
Die earlier if hash is NULL. (Coverity IDs 137 & 138).
2008-12-29 11:54:56 +00:00
Ben Laurie
fe1c7fecf1
Reverse incorrect earlier fix.
2008-12-29 11:47:08 +00:00
Ben Laurie
0e941da6fa
Die earlier if we have no hash function.
2008-12-29 11:46:44 +00:00
Dr. Stephen Henson
2d1cbc85c8
Add standard .cvsignore file.
2008-12-29 00:27:06 +00:00
Dr. Stephen Henson
d195d60a5f
Update steve-debug* options.
2008-12-29 00:25:54 +00:00
Andy Polyakov
e81695205e
x86_64-xlate.pl: support for binary constants, such as 0b1010101.
2008-12-27 14:00:37 +00:00
Andy Polyakov
fe150ac25d
Add modes/cts128.c, Ciphertext Stealing implementation.
2008-12-27 13:40:45 +00:00
Andy Polyakov
bec45a35bb
cmll-x86_64.pl: fix bug in cbc tail processing and comply with Win64 ABI spec.
2008-12-27 13:39:38 +00:00
Andy Polyakov
3b0ee0d2bf
Revisit RT#1801 and complete fix.
2008-12-27 13:32:21 +00:00
Ben Laurie
dde5b979d2
Remove dead code. (Coverity ID 2)
2008-12-27 02:36:24 +00:00
Ben Laurie
57a6ac7c4f
Check scalar->d before we use it (in BN_num_bits()). (Coverity ID 129)
2008-12-27 02:15:16 +00:00
Ben Laurie
9b9cb004f7
Deal with the unlikely event that EVP_MD_CTX_size() returns an error.
...
(Coverity ID 140).
2008-12-27 02:09:24 +00:00
Ben Laurie
6ba71a7173
Handle the unlikely event that BIO_get_mem_data() returns -ve.
2008-12-27 02:00:38 +00:00
Richard Levitte
4ded7b44a8
More synchronisation with Unix
2008-12-26 23:52:06 +00:00
Ben Laurie
1457619e13
Remove misleading dead code. Constify. (Coverity ID 142)
2008-12-26 17:17:21 +00:00
Ben Laurie
ccf529928f
!a && !a->b is clearly wrong! Changed to !a || !a->b (Coverity ID 145).
2008-12-26 15:32:59 +00:00
Ben Laurie
5ceb595dfa
pval must always be set when pk7_cb() does anything (Coverity ID 146).
2008-12-26 15:29:02 +00:00
Richard Levitte
44390fadc0
In BIO_write(), update the write statistics, not the read statistics.
...
PR: 1803
2008-12-25 22:24:17 +00:00
Richard Levitte
974d05a323
Further synchronisation with Unix
2008-12-25 22:04:42 +00:00
Andy Polyakov
0f76640fba
Windows-specific addenum to "engage crypto/modes" commit #17716 .
2008-12-23 15:15:44 +00:00
Andy Polyakov
a11974180f
Patch the omission from prvious commit #17716 .
2008-12-23 11:38:33 +00:00
Andy Polyakov
5d48a66a6a
Engage crypto/modes.
2008-12-23 11:33:01 +00:00
Andy Polyakov
63fc7f848d
crypto/modes: make modes.h selfsufficient and rename block_f to block128_t.
2008-12-23 11:18:45 +00:00
Andy Polyakov
830457ce4f
Optimize CAST for size on 64-bit platforms. For reference, CAST_LONG being
...
unsigned long must be attributed to 16-bit support. As we don't support
16-bit platoforms anymore, there is no reason to waste twice required
space on CAST S-boxes (16KB vs. 8KB) or key schedule.
2008-12-22 15:21:59 +00:00
Andy Polyakov
ea4d5005d9
cmll-x86_64.pl: Win64 SEH section to handle pushf/popf in CBC routine.
2008-12-22 14:15:11 +00:00
Andy Polyakov
9f03d0fc04
Optimize #undef DES_UNROLL for size.
2008-12-22 14:10:42 +00:00
Andy Polyakov
2140659b00
Incidentally http://cvs.openssl.org/chngview?cn=17710 also made it possible
...
to build the library without -D_CRT_NONSTDC_NO_DEPRECATE. This commit
expands it even to apps catalog and actually omits the macro in question
from Configure.
2008-12-22 14:05:42 +00:00
Andy Polyakov
e527201f6b
This _WIN32-specific patch makes it possible to "wrap" OpenSSL in another
...
.DLL, in particular static build. The issue has been discussed in RT#1230
and later on openssl-dev, and mutually exclusive approaches were suggested.
This completes compromise solution suggested in RT#1230.
PR: 1230
2008-12-22 13:54:12 +00:00
Dr. Stephen Henson
70531c147c
Make no-engine work again.
2008-12-20 17:04:40 +00:00
Andy Polyakov
75bbf6e14c
make depend to work with cross-gcc, compensate for msys glitch.
...
PR: 1753
Submitted by: Alon Bar-Lev
2008-12-19 13:35:09 +00:00
Andy Polyakov
702e742515
cmll-x86_64.pl: bug fix and size optimization of Win64 SEH section.
2008-12-19 11:19:19 +00:00
Andy Polyakov
be01f79d3d
x86_64 assembler pack: add support for Win64 SEH.
2008-12-19 11:17:29 +00:00
Andy Polyakov
bf785c9849
x86_64-xlate.pl: fix masm hexadecimal constants.
2008-12-19 11:14:38 +00:00
Andy Polyakov
4db4882402
perlasm/x86* update: support for 3 and 4 argument instructions.
2008-12-17 19:56:48 +00:00
Andy Polyakov
6786f52ada
SEGV in AES_cbc_encrypt in aes-x86_64 assembler module.
...
PR: 1801
Submitted by: Huang Ying
2008-12-17 14:11:30 +00:00
Richard Levitte
2e6a7b3efc
Constify where needed
2008-12-16 13:41:49 +00:00
Richard Levitte
63461b8db1
Remove extraneous semicolons
2008-12-16 10:56:05 +00:00
Richard Levitte
e77228ba11
Stack changes made dso_vms.c not compile properly.
2008-12-16 10:55:26 +00:00
Richard Levitte
5c60b1637a
A few more symbols that are a little bit long for VMS
2008-12-16 10:54:53 +00:00
Richard Levitte
26397d2e8c
Synchronise VMS build system with the Unixly one
2008-12-16 10:54:28 +00:00
Andy Polyakov
85b2c0ce7f
128-bit block cipher modes consolidation. As consolidated functions
...
rely on indirect call to block functions, they are not as fast as
non-consolidated routines. However, performance loss(*) is within
measurement error and consolidation advantages are considered to
outweigh it.
(*) actually one can observe performance *improvement* on e.g.
CBC benchmarks thanks to optimization, which also becomes
shared among ciphers.
2008-12-16 08:39:21 +00:00
Andy Polyakov
f826bf7798
SEED to support OPENSSL_SMALL_FOOTPRINT: ~2x size decrease on x86.
2008-12-16 07:41:21 +00:00
Andy Polyakov
3ebbe8853f
Bring C bn_mul_mont template closer to assembler.
2008-12-16 07:28:38 +00:00
Andy Polyakov
ac71d81e84
no-asm didn't exclude Camellia assembler.
2008-12-16 07:26:53 +00:00
Ben Laurie
a9dbe71ee0
Back out pointless change.
2008-12-13 17:45:49 +00:00
Ben Laurie
ecd3370ba0
*** empty log message ***
2008-12-13 17:45:27 +00:00
Ben Laurie
19d300d07c
Return error if DH_new() fails (Coverity ID 150).
2008-12-13 17:39:53 +00:00
Ben Laurie
071920d9f6
Check for NULL before use (Coverity ID 203).
2008-12-13 17:28:25 +00:00
Ben Laurie
1f6e9bce21
Missing return values (Coverity ID 204).
2008-12-13 17:19:40 +00:00
Dr. Stephen Henson
434ba03ca9
Fix from stable branch.
2008-12-10 17:35:21 +00:00
Lutz Jänicke
d88d941c87
apps/speed.c: children should not inherit buffered I/O
...
PR: 1787
Submitted by: Artur Klauser <aklauser@google.com >
2008-12-10 08:03:47 +00:00
Dr. Stephen Henson
9d44cd1642
Oops should check zero_pos >= 0.
2008-12-08 19:13:06 +00:00
Dr. Stephen Henson
1d4e879106
Handle case where v6stat.zero_pos == 0 correctly.
...
Reported by: Kurt Roeckx <kurt@roeckx.be >, Tobias Ginzler <ginzler@fgan.de > (Debian bug #506111 )
2008-12-07 23:58:44 +00:00
Andy Polyakov
ae381fef5c
Add Camellia assembler x86 and x86_64 modules.
2008-12-03 09:22:51 +00:00
Bodo Möller
48114ec952
experimental-foo support for mk1mf.pl.
2008-12-02 23:50:22 +00:00
Bodo Möller
7a76219774
Implement Configure option pattern "experimental-foo"
...
(specifically, "experimental-jpake").
2008-12-02 01:21:39 +00:00
Dr. Stephen Henson
2900fc8ae1
Don't stop -cipher from working.
2008-11-30 22:01:31 +00:00
Dr. Stephen Henson
e9afa08cd1
Update from stable branch.
2008-11-30 16:09:04 +00:00
Geoff Thorpe
bcaa36fd11
Fix compilation with -DOPENSSL_NO_DEPRECATED.
2008-11-28 22:06:55 +00:00
Geoff Thorpe
71702f7ed0
Clarify a 'chil' engine param that is a little unintuitive.
...
Submitted by: Sander Temme <sander@temme.net >
2008-11-28 22:04:49 +00:00
Dr. Stephen Henson
fd252de312
Update libeay.num
2008-11-24 17:46:29 +00:00
Dr. Stephen Henson
349e78e2e8
Stop warning about different const qualifiers.
2008-11-24 17:39:42 +00:00
Dr. Stephen Henson
79bd20fd17
Update from stable-branch.
2008-11-24 17:27:08 +00:00
Dr. Stephen Henson
d0c3628834
Set memory BIOs up properly when stripping text headers from S/MIME messages.
2008-11-21 18:18:13 +00:00
Geoff Thorpe
31636a3ed1
Allow the CHIL engine to load even if dynamic locks aren't registered.
...
Submitted by: Sander Temme
2008-11-19 14:21:27 +00:00
Ben Laurie
f3b7bdadbc
Integrate J-PAKE and TLS-PSK. Increase PSK buffer size. Fix memory leaks.
2008-11-16 12:47:12 +00:00
Ben Laurie
ad7159ea84
Ignore generated ASM.
2008-11-16 12:32:14 +00:00
Dr. Stephen Henson
0b0dbb2cac
Don't disable JPAKE by default in head...
2008-11-15 17:36:49 +00:00
Dr. Stephen Henson
12bf56c017
PR: 1574
...
Submitted by: Jouni Malinen <j@w1.fi >
Approved by: steve@openssl.org
Ticket override support for EAP-FAST.
2008-11-15 17:18:12 +00:00
Andy Polyakov
93c4ba07d7
x86_64-xlate.pl update, engage x86_64 assembler in mingw64.
2008-11-14 16:40:37 +00:00
Bodo Möller
36d46234c7
warnings (mostly)
2008-11-14 00:22:02 +00:00
Ben Laurie
774b2fe700
Aftermath of a clashing size_t fix (now only format changes).
2008-11-13 09:48:47 +00:00
Ben Laurie
6c901ae8c1
Ignore saved Makefile.
2008-11-13 09:31:37 +00:00
Ben Laurie
90c65a9838
J-PAKE is not experimental in HEAD.
2008-11-13 09:31:08 +00:00
Dr. Stephen Henson
5eba1ab346
Oops...
2008-11-12 19:02:25 +00:00
Dr. Stephen Henson
4e50072d56
mk1mf.pl update from stable branch.
2008-11-12 18:52:58 +00:00
Dr. Stephen Henson
dd9557a8ba
Revert another size_t change.
2008-11-12 18:47:24 +00:00
Dr. Stephen Henson
ed551cddf7
Update from stable branch.
2008-11-12 17:28:18 +00:00
Dr. Stephen Henson
5aca224ecd
Reinstate camellia header fix patch.
2008-11-12 17:02:40 +00:00
Andy Polyakov
dab6293482
Configure update: clean-ups and most notably engage x86_64 assembler
...
on MacOS X.
2008-11-12 08:21:20 +00:00
Andy Polyakov
1416aec60d
Update make rules for x86_64 assembler pack.
2008-11-12 08:19:04 +00:00
Andy Polyakov
aa8f38e49b
x86_64 assembler pack to comply with updated styling x86_64-xlate.pl rules.
2008-11-12 08:15:52 +00:00
Andy Polyakov
8525377265
x86_64-xlate.pl to support MacOS X and mingw64.
2008-11-12 08:05:58 +00:00
Andy Polyakov
2fbc8a2aad
Revert commit #17603 , it should have been part of #17617 .
2008-11-12 07:27:36 +00:00
Geoff Thorpe
6343829a39
Revert the size_t modifications from HEAD that had led to more
...
knock-on work than expected - they've been extracted into a patch
series that can be completed elsewhere, or in a different branch,
before merging back to HEAD.
2008-11-12 03:58:08 +00:00
Dr. Stephen Henson
2401debe83
Tolerate -----BEGIN PKCS #7 SIGNED DATA----- header lines as used by some
...
implementations.
2008-11-11 12:38:25 +00:00
Dr. Stephen Henson
5c61111bff
Update from stable branch.
2008-11-11 12:23:18 +00:00
Dr. Stephen Henson
bc645199c0
Update from stable branch.
2008-11-11 10:17:54 +00:00
Bodo Möller
0a8c9f7de1
symbol deobnoxification
2008-11-11 07:08:59 +00:00
Dr. Stephen Henson
7b808412c9
Make -DKSSL_DEBUG work again.
2008-11-10 19:08:37 +00:00
Lutz Jänicke
706c5a4d35
Clarify (non-)blocking behavior of EGD socket interface used by RAND_egd().
2008-11-10 11:26:44 +00:00
Dr. Stephen Henson
0afc9f5bc0
PR: 1777
...
Submitted by: "Alon Bar-Lev" <alon.barlev@gmail.com >
Approved by: steve@openssl.org
Fix some size_t issues.
2008-11-05 23:14:32 +00:00
Dr. Stephen Henson
2e5975285e
Update obsolete email address...
2008-11-05 18:39:08 +00:00
Dr. Stephen Henson
5947ca0409
Don't use clobbered 'i' for checking UTCTime and GeneralizedTime length.
2008-11-05 18:28:24 +00:00
Ben Laurie
d40a1b865f
Only one of these needs to be signed.
2008-11-04 15:16:23 +00:00
Ben Laurie
f80921b6a6
Formatting.
2008-11-04 12:06:09 +00:00
Andy Polyakov
9be5481297
Add initial support for mingw64.
...
PR: 1693
Submitted by: Alon Bar-Lev
2008-11-03 21:15:07 +00:00
Andy Polyakov
8fe8bae15a
Minor perlasm updates.
2008-11-03 08:46:07 +00:00
Dr. Stephen Henson
f2c0230518
Not sure about this one... seems to be needed to make 64 bit release
...
builds work properly...
2008-11-02 18:29:27 +00:00
Dr. Stephen Henson
e6e0c9018c
Fix prototypes.
2008-11-02 18:12:36 +00:00
Dr. Stephen Henson
9619b730b4
Use stddef.h to pick up size_t def.
2008-11-02 16:56:13 +00:00
Dr. Stephen Henson
2766515fca
Fix prototypes.
2008-11-02 16:13:19 +00:00
Dr. Stephen Henson
87d52468aa
Update HMAC functions to return an error where relevant.
2008-11-02 16:00:39 +00:00
Dr. Stephen Henson
70d71f6185
Fix warnings: printf format mismatches on 64 bit platforms.
...
Change assert to OPENSSL_assert().
Fix e_padlock prototype.
2008-11-02 15:41:30 +00:00
Ben Laurie
5ee92a5ec1
Fix asserts. Fix incorrect dependency.
2008-11-02 13:15:06 +00:00
Dr. Stephen Henson
c76fd290be
Fix warnings about mismatched prototypes, undefined size_t and value computed
...
not used.
2008-11-02 12:50:48 +00:00
Ben Laurie
d0a20cafa1
Fix warnings.
2008-11-02 09:22:29 +00:00
Ben Laurie
8da07655ee
Fix warning.
2008-11-02 09:00:25 +00:00
Andy Polyakov
befe1fbc29
Fix bss_log.c on Windows.
2008-11-01 21:09:54 +00:00
Ben Laurie
5e4430e70d
More size_tification.
2008-11-01 16:40:37 +00:00
Ben Laurie
4d6e1e4f29
size_tification.
2008-11-01 14:37:00 +00:00
Andy Polyakov
122396f2db
Fix SHA512 and optimize BN for mingw64.
2008-11-01 12:46:18 +00:00
Andy Polyakov
09a60c9833
Fix warnings after commit#17578.
2008-10-31 20:20:54 +00:00
Andy Polyakov
b444ac3e6f
size_t-fy EVP_CIPHER. Note that being size_t-fied it doesn't require
...
underlying cipher to be size_t-fied, it allows for size_t, signed and
unsigned long. It maintains source and even binary compatibility.
2008-10-31 19:48:25 +00:00
Andy Polyakov
f768be81d8
size_t-fy AES, Camellia and RC4.
2008-10-31 19:30:11 +00:00
Dr. Stephen Henson
91173829db
Add install target to crypto/jpake/Makefile
2008-10-31 12:06:25 +00:00
Ben Laurie
bfaead2b12
Fix warning.
2008-10-29 05:10:09 +00:00
Andy Polyakov
e6b4578540
randfile.c: .rnd can become orphaned on VMS.
...
Submitted by: David North
2008-10-28 16:25:47 +00:00
Andy Polyakov
0dd4850ee0
.cvsignore update: ignore all flavors of shared objects.
2008-10-28 15:29:25 +00:00
Andy Polyakov
c650168a4f
Fix typo in ./config.
...
Submitted by: Sander Temme
2008-10-28 15:09:06 +00:00
Andy Polyakov
ea71ec1b11
ec2_mult.c readability update.
2008-10-28 13:53:51 +00:00
Andy Polyakov
f1455b3063
Minor clean-up in bn_lib.c: constification and optimization.
2008-10-28 13:52:51 +00:00
Andy Polyakov
b764f82c64
Fix crash in BN_rshift.
...
PR: 1663
2008-10-28 13:46:14 +00:00
Andy Polyakov
436bdcff4e
Harmonize Camellia API with version 1.x.
2008-10-28 12:13:52 +00:00
Andy Polyakov
27f864e8ac
Camellia update. Quoting camellia.c:
...
/*
* This release balances code size and performance. In particular key
* schedule setup is fully unrolled, because doing so *significantly*
* reduces amount of instructions per setup round and code increase is
* justifiable. In block functions on the other hand only inner loops
* are unrolled, as full unroll gives only nominal performance boost,
* while code size grows 4 or 7 times. Also, unlike previous versions
* this one "encourages" compiler to keep intermediate variables in
* registers, which should give better "all round" results, in other
* words reasonable performance even with not so modern compilers.
*/
2008-10-28 08:47:24 +00:00
Andy Polyakov
80aa9cc985
x86_64-xlate.pl update: refine SEH support.
2008-10-28 08:40:07 +00:00
Dr. Stephen Henson
ab7e09f59b
Win32 fixes... add new directory to build system. Fix warnings.
2008-10-27 12:31:13 +00:00
Dr. Stephen Henson
e9eda23ae6
Fix warnings and various issues.
...
C++ style comments.
Signed/unsigned warning in apps.c
Missing targets in jpake/Makefile
2008-10-27 12:02:52 +00:00
Ben Laurie
6caa4edd3e
Add JPAKE.
2008-10-26 18:40:52 +00:00
Dr. Stephen Henson
ac786241a2
Add support for -crlnumber option in crl utility.
2008-10-22 19:54:55 +00:00
Dr. Stephen Henson
df0681e554
Add permanentIdentifier OID.
2008-10-22 18:48:11 +00:00
Dr. Stephen Henson
e19106f5fb
Create function of the form OBJ_bsearch_xxx() in bsearch typesafe macros
...
with the appropriate parameters which calls OBJ_bsearch(). A compiler will
typically inline this.
This avoids the need for cmp_xxx variables and fixes unchecked const issues
with CHECKED_PTR_OF()
2008-10-22 15:43:01 +00:00
Geoff Thorpe
ae7ec4c71d
Apparently '__top' is also risky, obfuscate further. (All this to
...
avoid inlines...)
2008-10-22 12:00:15 +00:00
Lutz Jänicke
020d67fb89
Allow detection of input EOF in quiet mode by adding -no_ign_eof option
...
to s_client application.
PR: #1761
Submitted by: David Woodhouse <dwmw2@infradead.org >
2008-10-22 06:46:14 +00:00
Geoff Thorpe
3fdc6c11aa
Use of a 'top' var creates "shadow variable" warnings.
2008-10-22 01:25:45 +00:00
Dr. Stephen Henson
dcf6b3e9b6
Reinstate obj_xref.h as it is not auto generated on all platforms.
2008-10-20 15:12:48 +00:00
Dr. Stephen Henson
606f6c477a
Fix a shed load or warnings:
...
Duplicate const.
Use of ; outside function.
2008-10-20 15:12:00 +00:00
Lutz Jänicke
1581f82243
Add missing "-d" to option list of openssl version.
...
Submitted by: Alex Chen <alex_chen@filemaker.com >
2008-10-20 12:53:36 +00:00
Ben Laurie
0d6f9c7181
Constification.
2008-10-19 22:51:27 +00:00
Dr. Stephen Henson
640b86cb24
Fix Warning...
2008-10-19 17:22:34 +00:00
Dr. Stephen Henson
111a6e2a23
Fix multiple ; warning.
2008-10-18 15:02:59 +00:00
Ben Laurie
d764e7edb8
Fix warning a different way.
2008-10-18 12:12:34 +00:00
Andy Polyakov
aff8259510
Fix argument order in BN_nnmod call and implement rigorous boundary
...
condition check.
2008-10-16 07:54:41 +00:00
Andy Polyakov
256b3e9c5f
Optimize bn_correct_top.
2008-10-15 10:48:52 +00:00
Andy Polyakov
762a2e3cab
Remove redundant BN_ucmp, fix boundary condition in BN_nist_mod_224 and
...
reimplement BN_nist_mod_521.
2008-10-15 10:47:48 +00:00
Ben Laurie
28b6d5020e
Set comparison function in v3_add_canonize().
2008-10-14 19:27:07 +00:00
Ben Laurie
d5bbead449
Add XMPP STARTTLS support.
2008-10-14 19:11:26 +00:00
Dr. Stephen Henson
0f7efbc859
Ooops... remove code accidentally commited from FIPS version.
2008-10-14 15:44:14 +00:00
Dr. Stephen Henson
a7ae4abfd9
Add missing lock definitions...
2008-10-14 15:24:49 +00:00
Dr. Stephen Henson
30661b1b01
Add missing lock definitions.
2008-10-14 15:22:11 +00:00
Ben Laurie
1ea6472e60
Type-safe OBJ_bsearch_ex.
2008-10-14 08:10:52 +00:00
Lutz Jänicke
b8dfde2a36
Remove the DTLS1_BAD_VER thing from 0.9.9-dev. It is present in 0.9.8
...
but has been omitted from HEAD (0.9.9), see commit
http://cvs.openssl.org/chngview?cn=16627
by appro.
2008-10-13 06:45:59 +00:00
Lutz Jänicke
570006f3a2
Half of the commit for 0.9.8 as the bitmap handling has changed.
...
(Firstly... ommitted)
Secondly, it wasn't even _dropping_ the offending packets, in the
non-blocking case. It was just returning garbage instead.
PR: #1752
Submitted by: David Woodhouse <dwmw2@infradead.org >
2008-10-13 06:43:03 +00:00
Ben Laurie
babb379849
Type-checked (and modern C compliant) OBJ_bsearch.
2008-10-12 14:32:47 +00:00
Ben Laurie
6665ef303e
Add missing DTLS1_BAD_VER (hope I got the value right).
2008-10-12 14:04:34 +00:00
Lutz Jänicke
7e7af0bc51
When the underlying BIO_write() fails to send a datagram, we leave the
...
offending record queued as 'pending'. The DTLS code doesn't expect this,
and we end up hitting an OPENSSL_assert() in do_dtls1_write().
The simple fix is just _not_ to leave it queued. In DTLS, dropping
packets is perfectly acceptable -- and even preferable. If we wanted a
service with retries and guaranteed delivery, we'd be using TCP.
PR: #1703
Submitted by: David Woodhouse <dwmw2@infradead.org >
2008-10-10 10:41:35 +00:00
Dr. Stephen Henson
87d3a0cd90
Experimental new date handling routines. These fix issues with X509_time_adj()
...
and should avoid any OS date limitations such as the year 2038 bug.
2008-10-07 22:55:27 +00:00
Lutz Jänicke
1e369b375e
Fix incorrect command for assember file generation on IA64
...
Submitted by: Amadeu A. Barbosa Jr <amadeu@tecgraf.puc-rio.br >
2008-10-06 10:34:49 +00:00
Andy Polyakov
6bf24568bc
Fix EC_KEY_check_key.
2008-09-23 17:33:11 +00:00
Bodo Möller
837f2fc7a4
Make sure that SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG can't
...
enable disabled ciphersuites.
2008-09-22 21:22:47 +00:00
Bodo Möller
1a489c9af1
From branch OpenSSL_0_9_8-stable: Allow soft-loading engines.
...
Also, fix CHANGES (consistency with stable branch).
2008-09-15 20:41:24 +00:00
Dr. Stephen Henson
8c864e5466
Add missing CHANGES entry.
2008-09-15 20:30:58 +00:00
Bodo Möller
be5707c820
from 0.9.8 branch
2008-09-15 20:30:17 +00:00
Dr. Stephen Henson
4a4f3071ec
Update FAQ.
2008-09-15 11:27:58 +00:00
Andy Polyakov
d7235a9d68
Fix yesterday typos in bss_dgram.c.
2008-09-15 05:43:04 +00:00
Geoff Thorpe
fa0f834c20
Fix build warnings.
2008-09-15 04:02:37 +00:00
Bodo Möller
96562f2fb3
update comment
2008-09-14 19:50:55 +00:00
Andy Polyakov
b9790c1cd4
Winsock handles SO_RCVTIMEO in unique manner...
...
PR: 1648
2008-09-14 19:22:52 +00:00
Bodo Möller
fcbdde0dfe
oops
2008-09-14 18:16:07 +00:00
Andy Polyakov
51ec776b7d
dtls1_write_bytes consumers expect amount of bytes written per call, not
...
overall.
PR: 1604
2008-09-14 17:56:15 +00:00
Bodo Möller
e65bcbcef0
Fix SSL state transitions.
...
Submitted by: Nagendra Modadugu
2008-09-14 14:02:07 +00:00
Bodo Möller
e710de12ce
Note about CVS branch inconsistency.
2008-09-14 13:53:18 +00:00
Bodo Möller
db99c52509
Really get rid of unsafe double-checked locking.
...
Also, "CHANGES" clean-ups.
2008-09-14 13:51:44 +00:00
Bodo Möller
f8d6be3f81
Some precautions to avoid potential security-relevant problems.
2008-09-14 13:42:34 +00:00
Andy Polyakov
d493899579
DTLS didn't handle alerts correctly.
...
PR: 1632
2008-09-13 18:24:38 +00:00
Andy Polyakov
492279f6f3
AIX build updates.
2008-09-12 14:45:54 +00:00
Dr. Stephen Henson
3ad74edce8
Add SSL_FIPS flag for FIPS 140-2 approved ciphersuites and add a new
...
strength "FIPS" to represent all FIPS approved ciphersuites without NULL
encryption.
2008-09-10 16:02:09 +00:00
Ben Laurie
2b7b1cad10
Ignoring errors in makedepend can hide problems.
2008-09-09 19:08:40 +00:00
Ben Laurie
43048d13c8
Fix warning.
2008-09-07 13:22:34 +00:00
Dr. Stephen Henson
e8da6a1d0f
Fix from stable branch.
2008-09-03 22:17:11 +00:00
Dr. Stephen Henson
305514000c
Do not discard cached handshake records during resumed sessions:
...
they are used for mac computation.
2008-09-03 12:36:16 +00:00
Dr. Stephen Henson
0702150f53
Make no-tlsext compile.
2008-09-03 12:29:57 +00:00
Dr. Stephen Henson
a0ee081515
Perl script to run and verify OpenSSL against PKITS RFC3280 compliance
...
test suite.
2008-09-01 15:53:53 +00:00
Dr. Stephen Henson
d43c4497ce
Initial support for delta CRLs. If "use deltas" flag is set attempt to find
...
a delta CRL in addition to a full CRL. Check and search delta in addition to
the base.
2008-09-01 15:15:16 +00:00
Dr. Stephen Henson
4b96839f06
Add support for CRLs partitioned by reason code.
...
Tidy CRL scoring system.
Add new CRL path validation error.
2008-08-29 11:37:21 +00:00
Dr. Stephen Henson
249a77f5fb
Add support for freshest CRL extension.
2008-08-27 15:52:05 +00:00
Dr. Stephen Henson
d0fff69dc9
Initial indirect CRL support.
2008-08-20 16:42:19 +00:00
Dr. Stephen Henson
8c9bd89338
Support for certificateIssuer CRL entry extension.
2008-08-18 16:48:47 +00:00
Bodo Möller
2e415778f2
Don't use assertions to check application-provided arguments;
...
and don't unnecessarily fail on input size 0.
2008-08-14 21:37:51 +00:00
Bodo Möller
1cbf663a6c
sanity check
...
PR: 1679
2008-08-13 19:45:06 +00:00
Bodo Möller
9be8035b11
fix error function codes
2008-08-13 19:44:15 +00:00
Bodo Möller
2ecd2edede
Mention ERR_remove_state() deprecation, and ERR_remove_thread_state(NULL).
2008-08-13 19:30:01 +00:00
Dr. Stephen Henson
9d84d4ed5e
Initial support for CRL path validation. This supports distinct certificate
...
and CRL signing keys.
2008-08-13 16:00:11 +00:00
Dr. Stephen Henson
2e0c7db950
Initial code to support distinct certificate and CRL signing keys where the
...
CRL issuer is not part of the main path.
Not complete yet and not compiled in because the CRL issuer certificate is
not validated.
2008-08-12 16:07:52 +00:00
Dr. Stephen Henson
002e66c0e8
Support for policy mappings extension.
...
Delete X509_POLICY_REF code.
Fix handling of invalid policy extensions to return the correct error.
Add command line option to inhibit policy mappings.
2008-08-12 10:32:56 +00:00
Dr. Stephen Henson
e9746e03ee
Initial support for name constraints certificate extension.
...
TODO: robustness checking on name forms.
2008-08-08 15:35:29 +00:00
Geoff Thorpe
ab9c689ad3
Correct the FAQ and the threads man page re: CRYPTO_THREADID changes.
2008-08-06 16:41:50 +00:00
Geoff Thorpe
4c3296960d
Remove the dual-callback scheme for numeric and pointer thread IDs,
...
deprecate the original (numeric-only) scheme, and replace with the
CRYPTO_THREADID object. This hides the platform-specifics and should reduce
the possibility for programming errors (where failing to explicitly check
both thread ID forms could create subtle, platform-specific bugs).
Thanks to Bodo, for invaluable review and feedback.
2008-08-06 15:54:15 +00:00
Andy Polyakov
96826bfc84
sha1-armv4-large cosmetics.
2008-08-06 08:58:45 +00:00
Andy Polyakov
eb1aa135d8
sha1-armv4-large.pl performance improvement. On PXA255 it gives +10% on
...
8KB block, +60% on 1KB, +160% on 256B...
2008-08-06 08:47:07 +00:00
Geoff Thorpe
99649b5990
Fix signed/unsigned warning.
2008-08-05 17:48:02 +00:00
Dr. Stephen Henson
6d6c47980e
Correctly handle errors in CMS I/O code.
2008-08-05 15:55:53 +00:00
Bodo Möller
474b3b1cc8
Fix error codes for memory-saving patch.
...
Also, get rid of compile-time switch OPENSSL_NO_RELEASE_BUFFERS
because it was rather pointless (the new behavior has to be explicitly
requested by setting SSL_MODE_RELEASE_BUFFERS anyway).
2008-08-04 22:10:38 +00:00
Dr. Stephen Henson
3e727a3b37
Add support for nameRelativeToCRLIssuer field in distribution point name
...
fields.
2008-08-04 15:34:27 +00:00
Dr. Stephen Henson
a9ff742e42
Make explicit_policy handling match expected RFC3280 behaviour.
2008-08-02 11:16:35 +00:00
Lutz Jänicke
787287af40
Refer to SSL_pending from the man page for SSL_read
2008-08-01 15:03:20 +00:00
Dr. Stephen Henson
5cbd203302
Initial support for alternative CRL issuing certificates.
...
Allow inibit any policy flag to be set in apps.
2008-07-30 15:49:12 +00:00
Dr. Stephen Henson
592a207b94
Policy validation fixes.
...
Inhibit any policy count should ignore self issued certificates.
Require explicit policy is the number certificate before an explict policy
is required.
2008-07-30 15:41:42 +00:00
Ralf S. Engelschall
6bcbac0abb
remove a doubled entry for '-binary' in the usage message
2008-07-27 15:51:35 +00:00
Andy Polyakov
4c048211f1
Split ms/uplink.pl to corresponding platform versions.
2008-07-22 08:47:35 +00:00
Andy Polyakov
b94551e823
perlasm update: implement dataseg directive.
2008-07-22 08:44:31 +00:00
Andy Polyakov
9b634c9b37
x86_64-xlate.pl: implement indirect jump/calls, support for Win64 SEH.
2008-07-22 08:42:06 +00:00
Bodo Möller
5b331ab77a
We should check the eight bytes starting at p[-9] for rollback attack
...
detection, or the probability for an erroneous RSA_R_SSLV3_ROLLBACK_ATTACK
will be larger than necessary.
PR: 1695
2008-07-17 22:11:53 +00:00
Andy Polyakov
dd6f479ea8
mem_dbg.c: avoid compiler warnings.
...
PR: 1693
Submitted by: Stefan Neis
2008-07-17 13:58:21 +00:00
Andy Polyakov
87facba376
Remove junk argument to function_begin in sha/asm/*-586.pl.
...
PR: 1681
2008-07-17 09:50:56 +00:00
Andy Polyakov
e4662fdb62
x86masm.pl: harmonize functions' alignment.
2008-07-17 09:46:09 +00:00
Bodo Möller
efa73a77e4
Make sure not to read beyond end of buffer
2008-07-16 18:10:27 +00:00
Andy Polyakov
89778b7f3f
x86_64cpuid.pl cosmetics: harmonize $dir treatment with other modules.
2008-07-15 19:52:20 +00:00
Andy Polyakov
c79c5a256b
des-596.pl update: short-circuit reference to DES_SPtrans.
2008-07-15 13:24:16 +00:00
Andy Polyakov
9960bdc6fa
x86masm.pl cosmetics.
2008-07-15 13:16:42 +00:00
Andy Polyakov
23dcb447ff
x86nasm.pl update: use pre-defined macros and allow for /safeseh link.
2008-07-15 12:50:44 +00:00
Andy Polyakov
39c63e162c
Reaffirm that NASM is the only supported assembler for Win32 build.
2008-07-15 12:48:53 +00:00
Dr. Stephen Henson
34d05a4023
Zero is a valid value for any_skip and map_skip
2008-07-13 22:38:18 +00:00
Dr. Stephen Henson
dcc0c29876
We support inhibit any policy extension, add to table.
2008-07-13 15:55:37 +00:00
Dr. Stephen Henson
db50661fce
X509 verification fixes.
...
Ignore self issued certificates when checking path length constraints.
Duplicate OIDs in policy tree in case they are allocated.
Use anyPolicy from certificate cache and not current tree level.
2008-07-13 14:25:36 +00:00
Geoff Thorpe
f9afd9f861
If --prefix="C:\foo\bar" is supplied to Configure for a windows target,
...
then the backslashes need escaping to avoid being treated as switches in
the auto-generated strings in opensslconf.h. Perl users are welcome to
suggest a less hokey way of doing this ...
2008-07-10 20:08:47 +00:00
Dr. Stephen Henson
d4cdbab99b
Avoid warnings with -pedantic, specifically:
...
Conversion between void * and function pointer.
Value computed not used.
Signed/unsigned argument.
2008-07-04 23:12:52 +00:00
Geoff Thorpe
5f834ab123
Revert my earlier CRYPTO_THREADID commit, I will commit a reworked
...
version some time soon.
2008-07-03 19:59:25 +00:00
Dr. Stephen Henson
8528128b2a
Update from stable branch.
2008-06-26 23:27:31 +00:00
Dr. Stephen Henson
a0f3679b52
Update from stable branch.
2008-06-25 10:43:07 +00:00
Bodo Möller
8228fd89fc
avoid potential infinite loop in final reduction round of BN_GF2m_mod_arr()
...
Submitted by: Huang Ying
Reviewed by: Douglas Stebila
2008-06-23 20:46:24 +00:00
Dr. Stephen Henson
869eb9e767
Update ordinals.
2008-06-22 01:09:14 +00:00
Dr. Stephen Henson
6c2878344f
Fix from stable branch.
2008-06-21 23:28:55 +00:00
Dr. Stephen Henson
2836cb3816
Update from stable branch.
2008-06-18 15:08:41 +00:00
Dr. Stephen Henson
46d4782888
Update from stable branch.
2008-06-18 12:06:10 +00:00
Dr. Stephen Henson
a01a351cc2
Update from stable branch.
2008-06-16 15:51:48 +00:00
Dr. Stephen Henson
adb92d56eb
Add acknowledgement.
2008-06-09 16:48:42 +00:00
Dr. Stephen Henson
ce04f91951
Sync ordinals.
2008-06-06 15:57:16 +00:00
Dr. Stephen Henson
6cb9fca70d
Fix memory leak. The canonical X509_NAME_ENTRY STACK is reallocated rather
...
than referencing existing X509_NAME_ENTRY structures so needs to be
completely freed.
2008-06-06 11:26:07 +00:00
Dr. Stephen Henson
ec0bfca7e7
Remove uidlg library from VC-32.pl, it is now bound at runtime.
2008-06-05 23:42:04 +00:00
Dr. Stephen Henson
1cd504e7be
Don't change _WIN32_WINNT and detect GetConsoleWindow() and
...
CryptUIDlgSelectCertificateFromStore() at runtime. Add callback function
for selection mechanism.
2008-06-05 23:19:56 +00:00
Dr. Stephen Henson
11f3cee93b
Update from stable branch.
2008-06-05 17:04:16 +00:00
Dr. Stephen Henson
6bf79e30ea
Update CHANGES.
2008-06-05 15:34:24 +00:00
Dr. Stephen Henson
7555c9337f
Update from stable branch.
2008-06-05 15:13:45 +00:00
Dr. Stephen Henson
ffc2b3e927
Update from stable branch.
2008-06-05 11:45:25 +00:00
Dr. Stephen Henson
9ab89286a2
Sync ordinals with stable branch.
2008-06-05 11:10:49 +00:00
Dr. Stephen Henson
5329130333
Link in extra CryptoAPI related libraries if needed.
2008-06-05 10:51:48 +00:00
Dr. Stephen Henson
e1451bb51d
Update from stable branch.
2008-06-04 23:03:28 +00:00
Dr. Stephen Henson
0b44c26d78
Remove test fprintf.
2008-06-04 22:39:05 +00:00
Dr. Stephen Henson
4db9677bac
Compilation option to use a specific ssl client auth engine automatically.
2008-06-04 22:34:38 +00:00
Dr. Stephen Henson
1381bf90f4
Use an appropriate Window for selection dialog.
2008-06-04 16:45:05 +00:00
Dr. Stephen Henson
e0f7b87227
Add support for Windoes dialog box based certificate selection.
2008-06-04 16:10:09 +00:00
Dr. Stephen Henson
985de86340
Remove old non-safestack code.
2008-06-04 14:34:39 +00:00
Dr. Stephen Henson
b814c01a76
Tidy up and add comments to selection code.
2008-06-04 12:03:57 +00:00
Dr. Stephen Henson
c07a126fb2
Make DSO WIN32 compile again.
2008-06-04 11:53:14 +00:00
Dr. Stephen Henson
09a6e19431
Update ordinals.
2008-06-04 11:52:36 +00:00
Dr. Stephen Henson
863d447e0b
Remove store from Windows build.
2008-06-04 11:45:15 +00:00
Ben Laurie
5ce278a77b
More type-checking.
2008-06-04 11:01:43 +00:00
Dr. Stephen Henson
37cf49a3df
Avoid name clash.
2008-06-04 10:57:38 +00:00
Ben Laurie
f79262e94b
Only include windows headers when under windows.
2008-06-04 05:21:13 +00:00
Dr. Stephen Henson
7d537d4fc7
Add initial support for multiple SSL client certifcate selection in
...
CryptoAPI ENGINE.
2008-06-03 23:54:31 +00:00
Dr. Stephen Henson
ca89fc1fb4
Match empty CA list to anything for ssl client auth in CryptoAPI engine.
2008-06-03 11:37:52 +00:00
Dr. Stephen Henson
59d2d48f64
Add support for client cert engine setting in s_client app.
...
Add appropriate #ifdefs round client cert functions in headers.
2008-06-03 11:26:27 +00:00
Dr. Stephen Henson
b3c8dd4eab
Add preliminary SSL client auth callback to CryptoAPI ENGINE.
2008-06-03 10:27:39 +00:00
Dr. Stephen Henson
45d3767d28
Prevent signed/unsigned warning on VC++
2008-06-03 10:17:45 +00:00
Ben Laurie
8671b89860
Memory saving patch.
2008-06-03 02:48:34 +00:00
Dr. Stephen Henson
4f7f411719
Update year.
2008-06-02 23:41:38 +00:00
Dr. Stephen Henson
eac442ddd3
Windows batch file to rebuild error codes for CryptoAPI ENGINE.
2008-06-02 23:10:34 +00:00
Dr. Stephen Henson
55bef26d8a
#undef OCSP_RESPONSE: CryptoAPI uses this too.
2008-06-02 23:09:04 +00:00
Dr. Stephen Henson
2aa2a5775f
Fix indentation.
2008-06-02 14:29:32 +00:00
Dr. Stephen Henson
c451bd828f
Avoid case in ca.c fix.
2008-06-02 12:10:06 +00:00
Dr. Stephen Henson
8ecfbedd85
Revert, doesn't fix warning :-(
2008-06-02 10:42:57 +00:00
Dr. Stephen Henson
c173fce4e2
Avoid cast with wrapper function.
2008-06-02 10:37:53 +00:00
Dr. Stephen Henson
953174f46e
Free old store name (if any).
2008-06-01 23:45:11 +00:00
Dr. Stephen Henson
c621c7e432
Add ctrl for alternative certificate store names.
2008-06-01 23:42:49 +00:00
Dr. Stephen Henson
2bbe8f9129
Use keyspec for DSA too.
2008-06-01 23:28:17 +00:00
Dr. Stephen Henson
4be0a5d429
Get and note keyspec when signing.
2008-06-01 23:24:53 +00:00
Dr. Stephen Henson
bdfe932dca
Release engine reference when calling SSL_CTX_free().
2008-06-01 23:06:48 +00:00
Dr. Stephen Henson
3fc59c8406
Allow ENGINE client cert callback to specify a set of other certs, for
...
the rest of the certificate chain. Currently unused.
2008-06-01 22:45:08 +00:00
Dr. Stephen Henson
c61915c659
Update error codes.
2008-06-01 22:34:40 +00:00
Dr. Stephen Henson
368888bcb6
Add client cert engine to SSL routines.
2008-06-01 22:33:24 +00:00
Dr. Stephen Henson
eafd6e5110
Update error codes, move typedef of SSL, SSL_CTX to ossl_typ.h
2008-06-01 21:18:47 +00:00
Dr. Stephen Henson
05935c47b2
Add support for ENGINE supplied SSL client auth.
2008-06-01 21:10:30 +00:00
Dr. Stephen Henson
d8bd55a364
Update from stable branch.
2008-06-01 11:07:34 +00:00
Dr. Stephen Henson
841c91d6e4
Update from stable branch.
2008-05-31 23:48:02 +00:00
Dr. Stephen Henson
a4792168ec
Update VC-32.pl and load CryptoAPI engine in the right place.
2008-05-31 23:21:40 +00:00
Dr. Stephen Henson
90b96776cd
More CryptoAPI engine code from stable branch.
2008-05-31 22:53:16 +00:00
Dr. Stephen Henson
408f906592
Add CryptoAPI error file too.
2008-05-31 22:50:00 +00:00
Dr. Stephen Henson
7a18ecb2df
Add CryptoAPI ENGINE from stable branch.
2008-05-31 22:49:32 +00:00
Dr. Stephen Henson
174c86a216
Recognize LHASH_OF().
2008-05-31 21:20:53 +00:00
Dr. Stephen Henson
c6ddacf7f8
Stop const mismatch warning.
2008-05-31 19:28:57 +00:00
Dr. Stephen Henson
ab3eafd5b5
Stop warning about extra ';' outside of function.
2008-05-31 19:17:25 +00:00
Dr. Stephen Henson
dd043cd501
Stop const mismatch warning in VC++.
2008-05-31 18:55:23 +00:00
Bodo Möller
a75c662fd1
Everyone's had a few years to port their favorite additions to 0.9.7
...
to HEAD (and the 0.9.8 branch). Remove the reminder.
2008-05-31 13:42:53 +00:00
Dr. Stephen Henson
83574cf808
Fix from stable branch.
2008-05-30 10:57:49 +00:00
Bodo Möller
2cd81830ef
sync with 0.9.8 branch
2008-05-28 22:30:28 +00:00
Bodo Möller
e194fe8f47
From HEAD:
...
Fix flaw if 'Server Key exchange message' is omitted from a TLS
handshake which could lead to a cilent crash as found using the
Codenomicon TLS test suite (CVE-2008-1672)
Reviewed by: openssl-security@openssl.org
Obtained from: mark@awe.com
2008-05-28 22:17:34 +00:00
Bodo Möller
40a706286f
From HEAD:
...
Fix double-free in TLS server name extensions which could lead to a remote
crash found by Codenomicon TLS test suite (CVE-2008-0891)
Reviewed by: openssl-security@openssl.org
Obtained from: jorton@redhat.com
2008-05-28 22:15:48 +00:00
Bodo Möller
c6f6c380c7
grammar
2008-05-27 18:43:20 +00:00
Bodo Möller
8f395e0f4d
year 2008
2008-05-27 18:41:09 +00:00
Dr. Stephen Henson
595852f3b5
Avoid "duplicate const" warnings.
2008-05-27 11:44:03 +00:00
Dr. Stephen Henson
0a56761f19
Avoid warning about empty structures and always define CHECKED_PTR_OF
2008-05-27 11:28:49 +00:00
Dr. Stephen Henson
220903f92e
C++ style comments fixed.
2008-05-26 15:39:36 +00:00
Ben Laurie
3c1d6bbc92
LHASH revamp. make depend.
2008-05-26 11:24:29 +00:00
Lutz Jänicke
cab14b9803
Add README about removed root CA certificates.
2008-05-26 06:23:57 +00:00
Lutz Jänicke
17a4a4dff8
Reword comment to be much shorter to stop other people from complaining
...
about "overcommenting".
2008-05-26 06:21:13 +00:00
Lutz Jänicke
c2c2e7a438
Clear error queue when starting SSL_CTX_use_certificate_chain_file
...
PR: 1417, 1513
Submitted by: Erik de Castro Lopo <mle+openssl@mega-nerd.com >
2008-05-23 10:37:52 +00:00
Lutz Jänicke
d18ef847f4
Remove all root CA files (beyond test CAs including private key)
...
from the OpenSSL distribution.
2008-05-23 08:59:23 +00:00
Dr. Stephen Henson
5c0d90a699
Typo.
2008-05-20 18:49:00 +00:00
Dr. Stephen Henson
f434730524
Typo.
2008-05-20 16:13:57 +00:00
Dr. Stephen Henson
65fd877515
Update ordinals.
2008-05-20 12:23:38 +00:00
Dr. Stephen Henson
64ddafc6b6
Update from stable branch.
2008-05-20 11:52:57 +00:00
Dr. Stephen Henson
781f0a9bb5
Fix from stable branch.
2008-05-20 11:30:27 +00:00
Lutz Jänicke
3de5a7745f
Correctly adjust location of comment
...
Submitted by: Ben Laurie <ben@links.org >
2008-05-20 08:10:48 +00:00
Dr. Stephen Henson
94fd382f8b
Fix two invalid memory reads in RSA OAEP mode.
...
Submitted by: Ivan Nestlerode <inestlerode@us.ibm.com >
Reviewed by: steve
2008-05-19 21:33:55 +00:00
Bodo Möller
4bd4afa34e
Change use of CRYPTO_THREADID so that we always use both the ulong and
...
ptr members.
(So if the id_callback is bogus, we still have &errno.)
2008-05-19 20:45:25 +00:00
Bodo Möller
148bb9515c
Disable code that clearly doesn't currently serve any useful purpose.
...
(Buggy line reported by Matthias Koenig.)
2008-05-19 19:44:45 +00:00
Lutz Jänicke
51e00db226
Document "openssl s_server" -crl_check* options
...
Submitted by: Daniel Black <daniel.subs@internode.on.net >
2008-05-19 07:52:15 +00:00
Lutz Jänicke
a92ebf2290
Provide information about "openssl dgst" -hmac option.
2008-05-19 07:43:34 +00:00
Lutz Jänicke
f49c687507
Typo. (From 0.9.8-stable/S. Henson)
...
PR: 1672
2008-05-19 06:21:05 +00:00
Lutz Jänicke
8b99c79fae
Another occurance of possible valgrind/purify "uninitialized memory"
...
complaint related to the PRNG: with PURIFY policy don't feed uninitialized
memory into the PRNG.
Submitted by: Bodo Moeller <bmoeller@openssl.org > :-)
2008-05-16 07:14:26 +00:00
Dr. Stephen Henson
718f8f7a9e
Fix from stable branch.
2008-05-12 16:24:31 +00:00
Dr. Stephen Henson
e718520cc5
Add missing cast.
2008-05-09 23:16:24 +00:00
Andy Polyakov
4f46934269
Depict future Win64/x64 development.
2008-05-03 18:34:59 +00:00
Bodo Möller
fabe640f5e
Clarifying comment.
2008-05-02 18:47:48 +00:00
Dr. Stephen Henson
19048b5c8d
New function CMS_add1_crl().
2008-05-02 17:27:01 +00:00
Dr. Stephen Henson
156ee88285
Indicate support for digest init ctrl.
2008-05-02 11:24:40 +00:00
Dr. Stephen Henson
c386f8ac38
Typo.
2008-05-01 23:35:36 +00:00
Dr. Stephen Henson
4a954b56c9
Use "cont" consistently in cms-examples.pl
...
Add a -certsout option to output any certificates in a message.
Add test for example 4.11
2008-05-01 23:30:06 +00:00
Bodo Möller
d05a474556
Montgomery-related minor cleanups/documentation
2008-05-01 18:48:20 +00:00
Dr. Stephen Henson
8a2062fefe
Update from stable branch.
2008-04-30 16:14:02 +00:00
Dr. Stephen Henson
2f63ad5b35
Update from stable branch.
2008-04-29 17:22:35 +00:00
Dr. Stephen Henson
c78bba2343
Oops!
2008-04-29 16:46:46 +00:00
Dr. Stephen Henson
d26c905c67
Update from stable branch.
2008-04-29 16:44:51 +00:00
Dr. Stephen Henson
8fcc9caecc
Update from stable branch.
2008-04-29 16:39:03 +00:00
Geoff Thorpe
e7b097f558
Fix auto-discovery of ENGINEs. See the CHANGES entry for details (and/or
...
ticket #1668 ).
PR: 1668
Submitted by: Ian Lister
Reviewed by: Geoff Thorpe
2008-04-28 21:39:09 +00:00
Geoff Thorpe
5ee6f96cea
Paul Sheer optimised the OpenSSL to/from libGMP conversions for the case
...
where they both use the same limb size. I've tweaked his patch slightly, so
blame me if it breaks.
Submitted by: Paul Sheer
Reviewed by: Geoff Thorpe
2008-04-27 18:41:23 +00:00
Dr. Stephen Henson
dc634aff25
Don't send zero length session ID if stateless session resupmtion is
...
successful. Check be seeing if there is a cache hit.
2008-04-25 16:27:04 +00:00
Dr. Stephen Henson
8e3b2dbb31
Disable debugging fprintf.
2008-04-25 11:33:32 +00:00
Andy Polyakov
ba6f95e81b
Add 64-bit support to BN_nist_mod_244 and engage BN_nist_mod_* on 64-bit
...
platforms.
2008-04-24 10:04:26 +00:00
Andy Polyakov
281066cb03
Compensate inline assembler in sha512.c for gcc 2.7.2 compiler bug.
...
PR: 1667
2008-04-24 09:59:45 +00:00
Andy Polyakov
830b8877ba
Takanori Yanagisawa has shown how to correctly use pre-computed values.
...
So in a sense this commit reverts few latest ones fixing bugs in original
code and improving it, most notably adding 64-bit support [though not in
BN_nist_mod_224 yet].
PR: 1593
2008-04-23 08:10:25 +00:00
Andy Polyakov
9912ab6770
Resolve __DECC warning and keep disclaiming support for 16-bit platforms.
2008-04-18 15:47:30 +00:00
Andy Polyakov
299ab428ce
Fix remaining BN_nist_mod_*.
...
PR: 1593
2008-04-18 15:40:57 +00:00
Dr. Stephen Henson
e6ef05d5f3
Make certs argument work in CMS_sign() add test case.
...
PR:1664
2008-04-18 11:18:20 +00:00
Lutz Jänicke
0f401ff08b
Add missing 'extern "C" {' to some _err.h files in crypto/engines/
...
PR: 1609
2008-04-18 07:43:26 +00:00
Lutz Jänicke
5558128541
Another minor update from the mingw development
...
PR: 1552
Submitted by: Roumen Petrov <openssl@roumenpetrov.info >
2008-04-18 06:35:55 +00:00
Richard Levitte
e33c72dfc6
Synchronise with Unix.
2008-04-18 06:04:03 +00:00
Lutz Jänicke
44a877aa88
Fix incorrect return value in apps/apps.c:parse_yesno()
...
PR: 1607
Submitted by: "Christophe Macé" <mace.christophe@gmail.com >
2008-04-17 14:15:27 +00:00
Lutz Jänicke
6b6fe3d8e4
Correctly handle case of bad arguments supplied to rsautl
...
PR: 1659
2008-04-17 13:36:13 +00:00
Lutz Jänicke
4c1a6e004a
Apply mingw patches as supplied by Roumen Petrov an Alon Bar-Lev
...
PR: 1552
Submitted by: Roumen Petrov <openssl@roumenpetrov.info >, "Alon Bar-Lev" <alon.barlev@gmail.com >
2008-04-17 10:19:16 +00:00
Richard Levitte
6e6ada18c6
Further synchronisation with Unix build. I hadn't noticed pq_compat.h
...
was gone...
2008-04-12 08:41:05 +00:00
Richard Levitte
b35a131069
Provide other forms for symbols that are too long or that clash with others
2008-04-12 08:40:01 +00:00
Dr. Stephen Henson
1728756255
Detached encrypt/decrypt example, fix decrypt sample.
2008-04-11 23:52:26 +00:00
Dr. Stephen Henson
a12a6b9962
Correct argument order for CMS_decrypt() in docs.
2008-04-11 23:49:03 +00:00
Dr. Stephen Henson
852bd35065
Fix prototype for CMS_decrypt(), don't free up detached content.
2008-04-11 23:45:52 +00:00
Dr. Stephen Henson
a5db50d005
Revert argument swap change... oops CMS_uncompress() was consistent...
2008-04-11 23:23:18 +00:00
Dr. Stephen Henson
f3eba36c4c
Fix comments.
2008-04-11 17:50:20 +00:00
Dr. Stephen Henson
529d329ce1
Make CMS_uncompress() argument order consistent with other functions.
2008-04-11 17:34:13 +00:00
Dr. Stephen Henson
47a6d388c7
CMS compressed data examples.
2008-04-11 17:33:29 +00:00
Dr. Stephen Henson
c02b6b6b21
Fix for compression and updated CMS_final().
2008-04-11 17:07:01 +00:00
Dr. Stephen Henson
3b28bc9910
PKCS#7 examples converted to CMS.
2008-04-11 16:52:45 +00:00
Richard Levitte
fc003bcecb
Synchronise with Unix build
2008-04-11 01:53:16 +00:00
Dr. Stephen Henson
38d3a73808
Reformat, fix typos and clarify CMS API docs.
2008-04-10 23:28:25 +00:00
Dr. Stephen Henson
73b3c2d861
Correct HISTORY reference.
2008-04-10 15:59:40 +00:00
Dr. Stephen Henson
4670e00ff5
Typo.
2008-04-10 15:56:27 +00:00
Dr. Stephen Henson
287df2fe49
Add docs for CMS_final() and BIO_new_CMS().
2008-04-10 11:55:57 +00:00
Dr. Stephen Henson
e0fbd07309
Add additional parameter to CMS_final() to handle detached content.
2008-04-10 11:22:14 +00:00
Dr. Stephen Henson
eaee098e1f
Ignore nonsensical flags for signed receipts.
2008-04-10 11:12:42 +00:00
Dr. Stephen Henson
43d9e9d07f
Add CMS signed receipt genration and verification docs.
2008-04-10 11:00:47 +00:00
Dr. Stephen Henson
c420fab52b
Spellcheck CMS docs.
2008-04-10 10:46:11 +00:00
Dr. Stephen Henson
6469a1fda3
Signed receipt request function documentation.
2008-04-09 23:13:49 +00:00
Dr. Stephen Henson
7f50d9a4b0
Correct references to smime in cms app.
2008-04-09 22:09:45 +00:00
Dr. Stephen Henson
da6ea110b5
Update docs.
2008-04-09 20:59:45 +00:00
Dr. Stephen Henson
fb777e1f79
Add CMS_uncompress manual page.
2008-04-09 20:55:55 +00:00
Dr. Stephen Henson
360bb61d86
Add CMS_compress() docs.
2008-04-09 17:04:36 +00:00
Dr. Stephen Henson
847e551f39
More CMS API documentation.
2008-04-09 16:08:16 +00:00
Andy Polyakov
d4122504a2
Clarifying comment.
2008-04-09 12:06:42 +00:00
Andy Polyakov
2c4226c42b
Do BN_nist_mod_384 by the book, as cheating doesn't work. Other functions
...
will be revised too.
PR: 1593
2008-04-09 11:36:04 +00:00
Dr. Stephen Henson
86173db853
Fix various typos, update SMIMECapabilities description.
2008-04-08 22:44:56 +00:00
Dr. Stephen Henson
9034c56c6c
Correct d2i/i2d typos.
2008-04-08 22:35:32 +00:00
Dr. Stephen Henson
e33ffaca12
Initial CMS API documentation.
2008-04-08 22:27:10 +00:00
Dr. Stephen Henson
853eae51e0
Implement CMS_NOCRL.
2008-04-07 11:00:44 +00:00
Lutz Jänicke
b4be380889
Fix URI of OpenSSL Request Tracker information
...
PR: 1661
2008-04-07 06:37:05 +00:00
Dr. Stephen Henson
ff80280b01
Set contentType attribute just before signing to allow encapsulated content
...
type to be set at any time in applications.
2008-04-06 16:29:47 +00:00
Dr. Stephen Henson
e45641bd17
Fix typo and add header files to err library.
2008-04-06 15:53:29 +00:00
Dr. Stephen Henson
d5a37b0293
Give consistent return value and add error code for duplicate certificates.
2008-04-06 15:41:25 +00:00
Dr. Stephen Henson
6819050722
Delete nonexistant function from pkcs7.h header file. WIN32 build fix from
...
stable branch. Sync and update ordinals.
2008-04-04 00:06:43 +00:00
Dr. Stephen Henson
88db4e6b9e
Make mk1mf.pl recognize no-cms.
2008-04-03 23:29:15 +00:00
Dr. Stephen Henson
be86dd85e4
Rename runex.pl to cms-examples.pl
2008-04-03 23:25:43 +00:00
Dr. Stephen Henson
3df9357103
Update CHANGES.
2008-04-02 11:44:00 +00:00
Dr. Stephen Henson
992e92a46e
Update CHANGES.
2008-04-02 11:24:22 +00:00
Dr. Stephen Henson
3247812e34
Since OID NIDs with 0.9.8.
2008-04-02 10:48:34 +00:00
Dr. Stephen Henson
a5cdb7d5bd
Avoid warnings.
2008-04-01 16:29:42 +00:00
Dr. Stephen Henson
4a6bb116c4
Add signed receipt tests.
2008-04-01 15:16:15 +00:00
Andy Polyakov
2819ffb520
Fix fast reduction on NIST curves (as well BN_NIST_ADD_ONE macro).
...
PR: 1593
2008-04-01 08:39:08 +00:00
Dr. Stephen Henson
964c7e8f6d
Fix it properly this time....
2008-03-31 18:21:30 +00:00
Dr. Stephen Henson
f6a45ac5ac
Fix macro.
2008-03-31 18:14:10 +00:00
Dr. Stephen Henson
2e86f0d8d7
Use correct headers for signed receipts. Use consistent naming.
...
Update cms-test.pl to support OpenSSL 0.9.8.
2008-03-31 15:03:55 +00:00
Dr. Stephen Henson
e2a29d49ca
Update dependencies.
2008-03-29 21:11:25 +00:00
Dr. Stephen Henson
b99674103d
Remove unnecessary header.
2008-03-29 21:08:37 +00:00
Dr. Stephen Henson
41f81a0143
Update docs.
2008-03-29 00:54:24 +00:00
Dr. Stephen Henson
36309aa2be
Signed receipt generation code.
2008-03-28 19:43:16 +00:00
Dr. Stephen Henson
eb9d8d8cd4
Support for verification of signed receipts.
2008-03-28 13:15:39 +00:00
Geoff Thorpe
f7ccba3edf
There was a need to support thread ID types that couldn't be reliably cast
...
to 'unsigned long' (ie. odd platforms/compilers), so a pointer-typed
version was added but it required portable code to check *both* modes to
determine equality. This commit maintains the availability of both thread
ID types, but deprecates the type-specific accessor APIs that invoke the
callbacks - instead a single type-independent API is used. This simplifies
software that calls into this interface, and should also make it less
error-prone - as forgetting to call and compare *both* thread ID accessors
could have led to hard-to-debug/infrequent bugs (that might only affect
certain platforms or thread implementations). As the CHANGES note says,
there were corresponding deprecations and replacements in the
thread-related functions for BN_BLINDING and ERR too.
2008-03-28 02:49:43 +00:00
Geoff Thorpe
eb77ebe26c
Update tunala so it builds ok with OPENSSL_NO_DEPRECATED, and improve the
...
autoungunk.sh logic (autobits have grown since I last tried this...).
2008-03-28 01:56:08 +00:00
Dr. Stephen Henson
f5e2354c9d
Add support for signed receipt request printout and generation.
2008-03-26 17:40:22 +00:00
Dr. Stephen Henson
f4cc56f494
Signed Receipt Request utility functions and option on CMS utility to
...
print out receipt requests.
2008-03-26 13:10:21 +00:00
Dr. Stephen Henson
be86c7fc87
Add signed receipt ASN1 structures. Initial GENERAL_NAME utility functions.
2008-03-24 22:14:02 +00:00
Dr. Stephen Henson
6205171362
Add support for CMS structure printing in cms utility.
2008-03-24 21:53:07 +00:00
Dr. Stephen Henson
ab568a17cf
Fix duplicate asn1 ctrl values.
2008-03-23 14:13:45 +00:00
Dr. Stephen Henson
fe591284be
Update dependencies.
2008-03-22 18:52:03 +00:00
Dr. Stephen Henson
7122aafce5
Preliminary documentation for CMS utility.
2008-03-21 13:09:26 +00:00
Geoff Thorpe
5ffba305c8
Comment out a (currently) unused CMS function. (Sorry Steve, but I need
...
-Werror right now to help me code-by-domino :-)
2008-03-19 23:08:20 +00:00
Geoff Thorpe
ceee538af5
Fork my debug configuration into 32-bit and 64-bit versions.
2008-03-19 23:05:48 +00:00
Dr. Stephen Henson
054307e7ed
Allow alternate eContentType oids to be set in cms utility.
...
Add id-ct-asciiTextWithCRLF OID.
Give more meaninful error message is attempt to use key ID from a certificate
without a key ID.
2008-03-19 19:34:30 +00:00
Dr. Stephen Henson
8cd358bef8
Rebuild CMS error codes.
2008-03-19 18:42:02 +00:00
Dr. Stephen Henson
eeb9cdfc94
Add support for KEK decrypt in cms utility.
2008-03-19 18:39:51 +00:00
Dr. Stephen Henson
16fe5f8b50
Produce meaningful error if sanity check fails.
...
Delete trailing whitespace from objects.txt
Delete duplicate NIDs.
2008-03-19 17:01:12 +00:00
Dr. Stephen Henson
041e7f2eee
Additional sanity check.
2008-03-19 14:18:36 +00:00
Dr. Stephen Henson
ab12438030
Add support for KEKRecipientInfo in cms application.
2008-03-19 13:53:52 +00:00
Dr. Stephen Henson
c220e58f9e
Make 3DES default cipher in cms utility.
2008-03-18 19:03:03 +00:00
Dr. Stephen Henson
6bd05ad472
Delete standard out and err temp files too.
2008-03-18 18:53:12 +00:00
Dr. Stephen Henson
90ec4c0af0
Delete tmp files, silence openssl commands, compare extracted content.
2008-03-18 18:51:44 +00:00
Dr. Stephen Henson
52e9196d7e
Add enveloped data keyid test.
2008-03-18 18:29:54 +00:00
Dr. Stephen Henson
f7e85c371e
Uninitialized variable bug fix.
2008-03-18 18:18:25 +00:00
Dr. Stephen Henson
f5cbf8fbe1
Fixes for S/MIME consistency checker and flexibility enhancements.
2008-03-18 17:33:46 +00:00
Dr. Stephen Henson
7d7e640e0b
Add extensive PCKS7 and CMS consistency test script.
2008-03-18 14:37:59 +00:00
Dr. Stephen Henson
e4f0e40eac
Various tidies/fixes:
...
Make streaming support in cms cleaner.
Note errors in various S/MIME functions if CMS_final() fails.
Add streaming support for enveloped data.
2008-03-18 13:45:43 +00:00
Dr. Stephen Henson
6e3bc4f073
More support for KEK RecipientInfo.
...
Generalise RecipientInfo and enveloped data handling so applications can
add their own key lookup routines as well as using the standard ones.
2008-03-18 01:00:38 +00:00
Dr. Stephen Henson
c36e936b60
Partial support for KEKRecipientInfo type.
2008-03-17 18:11:27 +00:00
Dr. Stephen Henson
761ffa729f
Preliminary support for enveloped data content type creation.
...
Fix signed data creation so versions are only corrected if structure is
being created.
2008-03-17 13:38:51 +00:00
Geoff Thorpe
1e26a8baed
Fix a variety of warnings generated by some elevated compiler-fascism,
...
OPENSSL_NO_DEPRECATED, etc. Steve, please double-check the CMS stuff...
2008-03-16 21:05:46 +00:00
Dr. Stephen Henson
7c337e00d2
Fix some warnings.
2008-03-16 20:59:10 +00:00
Geoff Thorpe
7e8481afd1
Fix a nasty cast issue that my compiler was choking on.
2008-03-16 20:57:12 +00:00
Geoff Thorpe
1266cec2fe
Fix my debug-geoff configuration.
2008-03-16 20:49:32 +00:00
Dr. Stephen Henson
3667a6f5b3
Adapt to diffrent OpenSSL utility locations.
2008-03-16 19:10:02 +00:00
Dr. Stephen Henson
deb21fbae9
Remove deleted function from header file, update mkfiles.pl
2008-03-16 18:41:20 +00:00
Dr. Stephen Henson
057039f782
Don't need to check for examples directory any more.
2008-03-16 18:31:18 +00:00
Dr. Stephen Henson
d7c738a09a
Extend runex.pl to extract examples directly from RFC text.
2008-03-16 18:03:48 +00:00
Dr. Stephen Henson
a981e2adbc
Add support for random key generation: this will be needed by enveloped data.
2008-03-16 13:05:03 +00:00
Dr. Stephen Henson
88fce8539f
Initial support for enveloped data decrypt. Extent runex.pl to cover these
...
examples. All RFC4134 examples can now be processed.
2008-03-15 23:21:34 +00:00
Dr. Stephen Henson
4f1aa191b3
Initial support for enveloped data decrypt. Extent runex.pl to cover these
...
examples. All RFC4134 examples can not be processed.
2008-03-15 23:21:33 +00:00
Dr. Stephen Henson
e540d1cd77
Check for cipher BIO errors and set key length after parameter decode.
2008-03-15 13:37:32 +00:00
Dr. Stephen Henson
fd47c36136
Return error if no cipher set for encrypted data type.
...
Update CHANGES.
2008-03-15 00:02:23 +00:00
Dr. Stephen Henson
d9f5f07e28
Initial support for Encrypted Data type generation.
2008-03-14 23:30:56 +00:00
Dr. Stephen Henson
b31db9ee96
Delete temp files.
2008-03-14 19:40:40 +00:00
Dr. Stephen Henson
1021f9aa5e
Typos.
2008-03-14 19:38:44 +00:00
Dr. Stephen Henson
320bfc1be7
Reorganise encrypted content info code to avoid duplication and be more
...
consistent with other content types.
2008-03-14 19:37:56 +00:00
Dr. Stephen Henson
b820455c6e
Encrypted Data type processing. Add options to cms utility and run section 7
...
tests in RFC4134.
2008-03-14 13:21:48 +00:00
Dr. Stephen Henson
5c4436c977
New utility functions for encryptedData content type which will also be used
...
by envelopedData.
Use PRE and not POST when freeing up RecipientInfo.
2008-03-14 00:58:43 +00:00
Dr. Stephen Henson
a78a03744d
Only call free once in CHOICE type.
2008-03-14 00:57:01 +00:00
Dr. Stephen Henson
a329fdde51
RFC4134 S/MIME examples test script.
2008-03-13 01:04:47 +00:00
Dr. Stephen Henson
31d3c84422
.cvignore file for cms
2008-03-13 00:50:02 +00:00
Dr. Stephen Henson
afff52a3ba
Free up additional data in RecipientInfo structure
2008-03-13 00:48:59 +00:00
Dr. Stephen Henson
8931b30d84
And so it begins...
...
Initial support for CMS.
Add zlib compression BIO.
Add AES key wrap implementation.
Generalize S/MIME MIME code to support CMS and/or PKCS7.
2008-03-12 21:14:28 +00:00
Dr. Stephen Henson
27dc105f51
Update year.
2008-03-12 13:05:07 +00:00
Dr. Stephen Henson
3964038fe6
#undef X509_EXTENSIONS to avoid conflict with CryptoAPI.
2008-03-12 00:37:31 +00:00
Dr. Stephen Henson
b510d77535
We already have an object for "zlib compression" but it was a place
...
holder and its actual encoding never used.
Just as well because it's value looks like it was made up in the mists of
time...
Now there is a registered value for zlib compression (used in S/MIME
compressedData content type) use that instead.
2008-02-29 14:24:52 +00:00
Dr. Stephen Henson
56c7754cab
Avoid warnings.
2008-02-28 14:05:01 +00:00
Dr. Stephen Henson
92e2c81aff
Fix error code function name mismatches in GOST engine, rebuild errors.
2008-02-28 13:45:06 +00:00
Dr. Stephen Henson
a70a49a018
Fix typo and avoid warning.
2008-02-28 13:18:26 +00:00
Andy Polyakov
61b05a0025
Make x86_64-mont.pl work with debug Win64 build.
2008-02-27 20:09:28 +00:00
Bodo Möller
7c9882eb24
fix BIGNUM flag handling
2008-02-27 06:01:28 +00:00
Dr. Stephen Henson
0d7f6fc76a
Clarification and fix typo.
2008-02-25 18:11:47 +00:00
Dr. Stephen Henson
a9e96d724d
Use default value for $dir if it is empty.
2008-02-25 13:14:06 +00:00
Bodo Möller
d9e427f09c
Make sure to set indent-tabs-mode so that we get tabs, not spaces.
2008-02-21 07:24:12 +00:00
Andy Polyakov
a23e3dbee1
Support for NASM>=2 in Win64/x64 build.
2008-02-13 13:07:52 +00:00
Dr. Stephen Henson
400ca0e467
Add OIDs for compressedData content type and zlib compression.
2008-02-12 13:48:10 +00:00
Dr. Stephen Henson
9536b85c07
Typo.
2008-02-12 01:24:50 +00:00
Dr. Stephen Henson
4d318c79b2
Utility attribute function to retrieve attribute data from an expected
...
type. Useful for many attributes which are single valued and can only
have one type.
2008-02-11 17:52:38 +00:00
Dr. Stephen Henson
1ad90a916b
Extend attribute setting routines to support non-string types.
2008-02-11 13:59:33 +00:00
Andy Polyakov
8ab9025e31
Ad-hockery for Platform SDK ml64.
2008-02-11 13:04:39 +00:00
Dr. Stephen Henson
9e5df8e448
Support custom primitive type printing routines and add one to LONG type.
2008-02-08 13:07:04 +00:00
Andy Polyakov
96d13fe62b
Micro-profiling assisted "optimization" for Power6. Essentially it's so
...
to say educational commit. Reordering instructions doesn't improve
performance much, rather exhibits Power6 limitations.
2008-02-06 10:18:19 +00:00
Andy Polyakov
089458b096
ppc64-mont optimization.
2008-02-05 13:10:14 +00:00
Lutz Jänicke
7c1722c60d
Add missing colon in manpage
...
Submitted by: Richard Hartmann <richih.mailinglist@gmail.com >
2008-01-30 08:26:59 +00:00
Dr. Stephen Henson
c020c3213e
Add Global Sign root CA.
2008-01-26 23:42:58 +00:00
Dr. Stephen Henson
930875ef77
Clarify FAQ.
2008-01-23 19:21:00 +00:00
Dr. Stephen Henson
3b979c5450
Clarify BITLIST format and include an example.
2008-01-23 19:10:53 +00:00
Andy Polyakov
339ad7ce73
rc5/asm/rc5-586.pl was erroneously omitted from last perlasm unification.
2008-01-17 19:48:01 +00:00
Andy Polyakov
676517e08e
crypto/rc5/Makefile was erroneously omitted from last perlasm unification.
...
Also remove obsolete and now misleading comments.
2008-01-15 11:27:06 +00:00
Dr. Stephen Henson
52108cecc0
<strings.h> does not exist under WIN32.
2008-01-14 18:10:55 +00:00
Andy Polyakov
addd641f3a
Unify ppc assembler make rules.
2008-01-13 22:01:30 +00:00
Andy Polyakov
f63e4be392
Automate assembler support for Win64 targets (more work is needed).
2008-01-13 17:56:02 +00:00
Andy Polyakov
ca55d11f84
Allow to specify filename on sha1-ia64.pl command line.
2008-01-13 17:43:11 +00:00
Andy Polyakov
abe7f8b457
Make all x86_64 modules independent on current working directory.
2008-01-13 17:42:04 +00:00
Andy Polyakov
a078befcbe
rc4-x86_64 portability fix.
2008-01-12 11:29:45 +00:00
Ben Laurie
f12797a447
Missing headers.
2008-01-12 11:22:31 +00:00
Andy Polyakov
fa8e921f66
Unify x86 perlasm make rules.
2008-01-11 13:15:11 +00:00
Andy Polyakov
4287ade5b4
Automate assembler support in mk1mf even further.
2008-01-11 11:59:37 +00:00
Dr. Stephen Henson
7398053149
Experimental support for import of more options from Configure
...
(via top level Makefile) into mk1mf builds. This avoids the need
to duplicate the CFLAG handling and can auto build assembly language
source files from perl scripts.
Extend VC-WIN32 Configure entry to include new options.
2008-01-06 00:36:22 +00:00
Dr. Stephen Henson
4d1f3f7a6c
Update perl asm scripts include paths for perlasm.
2008-01-05 22:28:38 +00:00
Andy Polyakov
aff686df91
Fix unsigned/signed warnings in ssl.
2008-01-05 21:35:34 +00:00
Andy Polyakov
637f90621d
Cygwin compatibility fix to apps/ocsp.c.
2008-01-05 21:32:29 +00:00
Andy Polyakov
6d0624aca3
Compensate for BSDi shell bug.
2008-01-05 21:30:59 +00:00
Andy Polyakov
085ea80371
engine/ccgost Win32 portability fixes.
2008-01-05 21:28:53 +00:00
Andy Polyakov
ab0ff06205
Make aes-x86_64 work with debug Win64 build.
2008-01-05 18:17:20 +00:00
Andy Polyakov
79eeb47031
Make AES_T[ed] private to aes-586 module.
2008-01-05 08:58:18 +00:00
Dr. Stephen Henson
9911b7496f
Include Mont asm files in WIN32 build.
2008-01-05 00:45:27 +00:00
Dr. Stephen Henson
3dbd453f41
Add extra SHA2 defines.
2008-01-05 00:44:33 +00:00
Andy Polyakov
731339627f
Last dso_dlfcn.c check-in said "Use Dl_info only on systems where it is
...
known to exist. It does not exist on AIX 4.3.3, AIX 5.1, SCO 5, or Cygwin"
and disabled it on banch of systems it's known to exists, such as FreeBSD,
Solaris, 64-bit HP-UX, MacOS X. Get it straight.
2008-01-04 23:03:23 +00:00
Andy Polyakov
26e71a1850
x86gas.pl update.
2008-01-04 22:58:50 +00:00
Dr. Stephen Henson
db01bad30f
Add sha2 defines.
2008-01-04 16:32:39 +00:00
Dr. Stephen Henson
6ff28e017d
Update netware to use new SHA2 assembly language modules.
2008-01-04 13:18:09 +00:00
Dr. Stephen Henson
4664eb5230
Update WIN32 nasm build to use new asm files.
2008-01-04 00:48:14 +00:00
Dr. Stephen Henson
744ecaa5b6
Avoid WIN32 signed/unsigned warnings.
2008-01-04 00:37:23 +00:00
Dr. Stephen Henson
76d761ccd3
Move CHANGES entry. Revert include file install line.
2008-01-03 22:57:50 +00:00
Dr. Stephen Henson
eef0c1f34c
Netware support.
...
Submitted by: Guenter Knauf <eflash@gmx.net >
2008-01-03 22:43:04 +00:00
Andy Polyakov
82a2431327
NASM has recently changed name of win32 pre-compiled binary.
...
PR: 1627
2008-01-03 17:09:56 +00:00
Dr. Stephen Henson
96fc37f145
Add quotes to Win32 install directories.
...
Submitted by: Mladen Turk <mturk@apache.org >
2008-01-03 16:37:00 +00:00
Andy Polyakov
3a87756fed
perlasm/x86*.pl updates.
2008-01-03 16:21:06 +00:00
Andy Polyakov
c8ec4a1b0b
Final (for this commit series) optimized version and with commentary section.
2007-12-29 20:30:09 +00:00
Andy Polyakov
699e1a3a82
This is also informational commit exposing loop modulo scheduling "factor."
2007-12-29 20:28:01 +00:00
Andy Polyakov
64214a2183
New Montgomery multiplication module, ppc64-mont.pl. Reference, non-optimized
...
implementation. This is essentially informational commit.
2007-12-29 20:26:46 +00:00
Andy Polyakov
0fcb905b0d
ppc-xlate.pl update.
2007-12-29 18:50:44 +00:00
Andy Polyakov
4be63cfb55
Source readability fix, which incidentally works around XLC compiler bug.
2007-12-29 18:32:34 +00:00
Andy Polyakov
ca64056836
Engage x86 assembler in Mac OS X build.
2007-12-18 17:33:49 +00:00
Andy Polyakov
df77428443
Mac OS X x86 assembler support.
2007-12-18 17:28:22 +00:00
Andy Polyakov
3e583572b3
Disable support for Metrowerks assembler. Assembler itself is broken,
...
specifically it incorrectly encodes EA offsets between 128 and 255.
2007-12-18 09:32:20 +00:00
Andy Polyakov
43d8f27dca
x86 perlasm overhaul.
2007-12-18 09:18:49 +00:00
Dr. Stephen Henson
b045299113
Avoid aliasing warning.
2007-12-16 13:57:44 +00:00
Dr. Stephen Henson
13baedc55b
Update ordinals
2007-12-16 13:16:58 +00:00
Dr. Stephen Henson
9400d9ac83
Initialize sigsize.
2007-12-14 16:53:50 +00:00
Dr. Stephen Henson
341e18b497
Handle non-SHA1 digests for certids in OCSP test responder.
2007-12-14 12:43:50 +00:00
Andy Polyakov
339a1820fd
gmp engine was non-operational.
2007-12-04 20:28:52 +00:00
Dr. Stephen Henson
cec2538ca9
Submitted by: Victor B. Wagner <vitus@cryptocom.ru>, steve
...
Use default algorithms for OCSP request and response signing. New command
line option to support other digest use for OCSP certificate IDs.
2007-12-04 12:41:28 +00:00
Richard Levitte
28f7e60d47
Change submitted by Doug Kaufman. He writes:
...
I just compiled the 9.9-dev version from the 12022007 tarball under
DJGPP. There were only 2 changes needed, one for b_sock.c, since
DJGPP with WATT32 doesn't define socklen_t and one for testtsa to
handle DOS style path separators. I also noted what seems to be a
typographical error in ts.pod. The test suite passes. The patch is
attached.
Since I am in the US, I have sent notifications to the Bureau of
Industry and Security and to the NSA.
2007-12-03 09:02:29 +00:00
Andy Polyakov
544b82e493
Some assembler are allergic to lea reg,BYTE PTR[...].
...
Submitted by: Guenter Knauf
2007-12-02 21:32:03 +00:00
Andy Polyakov
8789af8db8
Structure symbol decorations, optimize label handling...
2007-11-24 16:03:57 +00:00
Dr. Stephen Henson
1ad6a1b5e9
Rebuild OID database: duplicates got in there somehow??
2007-11-23 00:34:00 +00:00
Dr. Stephen Henson
6e150083bb
Fix from stable branch.
2007-11-23 00:19:24 +00:00
Dr. Stephen Henson
98d8baabbd
Add caRepository OID and sync object NIDs with OpenSSL 0.9.8.
2007-11-23 00:14:59 +00:00
Andy Polyakov
c1d2e00ec5
Synchronize x86nasm.pl with x86unix.pl.
2007-11-22 21:21:35 +00:00
Andy Polyakov
ad8bd4ece8
Combat [bogus] relocations in some assember modules.
2007-11-22 20:51:48 +00:00
Dr. Stephen Henson
2f0550c4c1
Lookup public key ASN1 methods by string by iterating through all
...
implementations instead of all added ENGINEs to cover case where an
ENGINE is not added.
2007-11-21 17:25:58 +00:00
Dr. Stephen Henson
98057eba77
Submitted by: "Victor B. Wagner" <vitus@cryptocom.ru>
...
Update gost algorithm print routines.
2007-11-21 12:39:12 +00:00
Dr. Stephen Henson
097f9d8c52
Avoid warning.
2007-11-20 17:52:02 +00:00
Dr. Stephen Henson
60447e59ef
Update debug-steve targets.
2007-11-20 17:51:45 +00:00
Dr. Stephen Henson
94e6ae7a69
Submitted by: "Victor B. Wagner" <vitus@cryptocom.ru>
...
Make {d2i,i2d}_PrivateKey() fall back to PKCS#8 format if no legacy format
supported. Add support in d2i_AutoPrivateKey().
2007-11-20 13:37:51 +00:00
Dr. Stephen Henson
f670738987
Rebuild object cross reference table.
2007-11-20 13:04:45 +00:00
Lutz Jänicke
b6a338cb29
Typos in man pages: dependant->dependent
...
Submitted by: Tobias Stoeckmann <tobias@bugol.de >
2007-11-19 09:18:03 +00:00
Bodo Möller
4726fcfc25
Should reject signatures that we can't properly verify
...
and couldn't generate
(as pointed out by Ernst G Giessmann)
2007-11-19 07:25:55 +00:00
Bodo Möller
15bd07e923
fix typos
...
Submitted by: Ernst G. Giessmann
2007-11-19 07:24:08 +00:00
Ben Laurie
fdf355878c
Fix buffer overflow.
2007-11-16 14:41:09 +00:00
Bodo Möller
da989402f2
The hash length check wasn't strict enough,
...
as pointed out by Ernst G Giessmann
2007-11-16 13:01:14 +00:00
Ben Laurie
10f0c85cfc
Fix warnings.
2007-11-16 03:03:01 +00:00
Andy Polyakov
70ba4ee5d5
Commit #16325 fixed one thing but broke DH with certain moduli.
2007-11-03 20:09:04 +00:00
Dr. Stephen Henson
31f528b15d
Fix from stable branch.
2007-11-03 13:09:34 +00:00
Lutz Jänicke
86140095b5
Add OIDs by CMP (RFC 4210) and CRMF (RFC 4211)
...
Submitted by: Martin Peylo <martinmeis@googlemail.com >
2007-11-01 08:24:56 +00:00
Dr. Stephen Henson
8e1d3ba50e
Fix duplicate error codes.
2007-10-26 23:54:46 +00:00
Dr. Stephen Henson
37210fe7e2
GOST ENGINE information.
2007-10-26 23:50:40 +00:00
Dr. Stephen Henson
0e1dba934f
1. Changes for s_client.c to make it return non-zero exit code in case
...
of handshake failure
2. Changes to x509_certificate_type function (crypto/x509/x509type.c) to
make it recognize GOST certificates as EVP_PKT_SIGN|EVP_PKT_EXCH
(required for s3_srvr to accept GOST client certificates).
3. Changes to EVP
- adding of function EVP_PKEY_CTX_get0_peerkey
- Make function EVP_PKEY_derive_set_peerkey work for context with
ENCRYPT operation, because we use peerkey field in the context to
pass non-ephemeral secret key to GOST encrypt operation.
- added EVP_PKEY_CTRL_SET_IV control command. It is really
GOST-specific, but it is used in SSL code, so it has to go
in some header file, available during libssl compilation
4. Fix to HMAC to avoid call of OPENSSL_cleanse on undefined data
5. Include des.h if KSSL_DEBUG is defined into some libssl files, to
make debugging output which depends on constants defined there, work
and other KSSL_DEBUG output fixes
6. Declaration of real GOST ciphersuites, two authentication methods
SSL_aGOST94 and SSL_aGOST2001 and one key exchange method SSL_kGOST
7. Implementation of these methods.
8. Support for sending unsolicited serverhello extension if GOST
ciphersuite is selected. It is require for interoperability with
CryptoPro CSP 3.0 and 3.6 and controlled by
SSL_OP_CRYPTOPRO_TLSEXT_BUG constant.
This constant is added to SSL_OP_ALL, because it does nothing, if
non-GOST ciphersuite is selected, and all implementation of GOST
include compatibility with CryptoPro.
9. Support for CertificateVerify message without length field. It is
another CryptoPro bug, but support is made unconditional, because it
does no harm for draft-conforming implementation.
10. In tls1_mac extra copy of stream mac context is no more done.
When I've written currently commited code I haven't read
EVP_DigestSignFinal manual carefully enough and haven't noticed that
it does an internal digest ctx copying.
This implementation was tested against
1. CryptoPro CSP 3.6 client and server
2. Cryptopro CSP 3.0 server
2007-10-26 12:06:36 +00:00
Lutz Jänicke
11d01d371f
Release OpenSSL 0.9.8g with various fixes to issues introduced with 0.9.8f
2007-10-19 08:26:03 +00:00
Dr. Stephen Henson
76c3ef7446
Fix from stable branch.
2007-10-18 11:42:47 +00:00
Andy Polyakov
659f7f3168
Don't let DTLS ChangeCipherSpec increment handshake sequence number.
...
PR: 1587
2007-10-17 21:15:48 +00:00
Dr. Stephen Henson
3d3bf9c730
Don't lookup zero length session ID.
...
PR: 1591
2007-10-17 17:31:57 +00:00
Dr. Stephen Henson
4017e8706c
Fix from stable branch.
2007-10-17 11:49:27 +00:00
Andy Polyakov
3ce54f35b3
Make ssl compile [from 098-stable, bug is masked by default].
2007-10-14 14:09:13 +00:00
Andy Polyakov
ebc06fba67
Bunch of constifications.
2007-10-13 15:51:32 +00:00
Andy Polyakov
e979c039f9
Fix warnings in d1_both.c [from 0.9.8-stable].
2007-10-13 11:00:52 +00:00
Andy Polyakov
90acf770b5
DTLS fixes from 0.9.8-stable.
2007-10-13 10:57:02 +00:00
Andy Polyakov
0d89e45690
Synchronize CHANGES between 0.9.8 and HEAD.
2007-10-13 10:55:30 +00:00
Ben Laurie
1948c7e6dd
0.9.8f.
2007-10-12 10:56:10 +00:00
Dr. Stephen Henson
a6db6a0070
Update CHANGES. Keep ordinals consistent.
2007-10-12 00:15:09 +00:00
Ben Laurie
fdb2fe6dc2
New release.
2007-10-11 19:31:29 +00:00
Andy Polyakov
a2115c5d17
Respect cookie length set by app_gen_cookie_cb.
...
Submitted by: Alex Lam
2007-10-09 19:31:18 +00:00
Andy Polyakov
4fe55663df
Make DTLS1 record layer MAC calculation RFC compliant.
...
Submitted by: Alex Lam
2007-10-09 19:19:07 +00:00
Andy Polyakov
ae1552ee99
Addendum to commit #16654 .
2007-10-09 16:37:24 +00:00
Andy Polyakov
debf380122
size_t-fy crypto/buffer.
2007-10-09 15:52:07 +00:00
Ralf S. Engelschall
ddb038d349
ignore a few additionally generated files
2007-10-09 09:56:44 +00:00
Andy Polyakov
b7cc9dffac
Addendum to commit #16651 .
2007-10-07 14:34:59 +00:00
Andy Polyakov
e1b81fed33
Make it possible to link VC static lib with either /MT or /MD application.
...
PR: 1230
2007-10-07 12:55:36 +00:00
Andy Polyakov
5d58f1bbfe
Prohibit RC4 in DTLS.
2007-10-05 21:04:56 +00:00
Dr. Stephen Henson
fcd1cb666c
Fix from fips branch.
2007-10-05 16:53:31 +00:00
Dr. Stephen Henson
4f19a9cb9f
Off by one fix from stable branch.
2007-10-04 12:07:52 +00:00
Andy Polyakov
0023adb47a
Switch to bn-s390x (it's faster on keys longer than 512 bits) and mention
...
s390x assembler pack in CHANAGES.
2007-10-01 07:38:32 +00:00
Andy Polyakov
81fe8dcfe1
Oops! This was erroneously left out commit #16632 .
2007-10-01 06:27:21 +00:00
Andy Polyakov
d527834a1d
Basic idea behind explicit IV is to make it unpredictable for attacker.
...
Until now it was xor between CBC residue and 1st block from last datagram,
or in other words still predictable.
2007-09-30 22:01:36 +00:00
Andy Polyakov
89c333e3e5
Make ChangeCipherSpec compliant with DTLS RFC4347.
2007-09-30 21:19:30 +00:00
Andy Polyakov
0d97d00b6c
DTLS RFC4347 says HelloVerifyRequest resets Finished MAC.
2007-09-30 19:34:36 +00:00
Andy Polyakov
e7adda52b3
DTLS RFC4347 requires client to use rame random field in reply to
...
HelloVerifyRequest.
2007-09-30 19:15:27 +00:00
Andy Polyakov
7432d073af
Switch to RFC-compliant version encoding in DTLS.
2007-09-30 18:53:54 +00:00
Dr. Stephen Henson
04e2ab2c02
Move no status notification to ssl_check_serverhello_tlsext() to ensure
...
no status is notified even if no server extensions are present.
2007-09-28 17:45:11 +00:00
Dr. Stephen Henson
b7fcc08976
Typo.
2007-09-28 17:18:18 +00:00
Andy Polyakov
7722e53f12
Yet another ARM update. It appears to be more appropriate to make
...
developers responsible for -march choice.
2007-09-27 16:27:03 +00:00
Andy Polyakov
2c3ee16272
Move -march=armv4t to ./config.
2007-09-27 07:43:58 +00:00
Andy Polyakov
19112771d6
Minor ARMv4 update.
2007-09-27 07:20:31 +00:00
Andy Polyakov
4c7c5ff667
ARMv4 assembler pack.
2007-09-27 07:09:46 +00:00
Andy Polyakov
d7e915616d
10% performance tweak in 64-bit mode.
2007-09-27 06:19:25 +00:00
Dr. Stephen Henson
67c8e7f414
Support for certificate status TLS extension.
2007-09-26 21:56:59 +00:00
Andy Polyakov
74eb3e0914
Make sha512-armv4.pl byte-order neutral.
2007-09-26 12:17:33 +00:00
Andy Polyakov
79fe664f19
Clarify commentary in sha512-sparcv9.pl.
2007-09-26 12:16:32 +00:00
Lutz Jänicke
5f0477f47b
Typos
...
PR: 1578
Submitted by: Charles Longeau <chl@tuxfamily.org >
2007-09-24 11:22:58 +00:00
Lutz Jänicke
7bbce69721
Port from 0.9.8-stable
2007-09-24 11:01:18 +00:00
Dr. Stephen Henson
870d6541f2
Use accept flag for new session ticket write.
2007-09-23 15:55:15 +00:00
Bodo Möller
02c27b113c
properly handle length-zero opaque PRF input values
...
(which are pointless, but still might occur)
2007-09-23 11:30:53 +00:00
Bodo Möller
86d4bc3aea
fix length parameter in SSL_set_tlsext_opaque_prf_input() calls
2007-09-23 11:08:59 +00:00
Bodo Möller
761772d7e1
Implement the Opaque PRF Input TLS extension
...
(draft-rescorla-tls-opaque-prf-input-00.txt), and do some cleanups and
bugfixes on the way. In particular, this fixes the buffer bounds
checks in ssl_add_clienthello_tlsext() and in ssl_add_serverhello_tlsext().
Note that the opaque PRF Input TLS extension is not compiled by default;
see CHANGES.
2007-09-21 06:54:24 +00:00
Andy Polyakov
54ef01b54b
Fix indentation in d1_both.c.
2007-09-19 16:38:15 +00:00
Ben Laurie
9311c4421a
Fix dependencies. Make depend.
2007-09-19 14:53:18 +00:00
Ben Laurie
aaa4f448cf
The other half of make errors.
2007-09-19 14:51:28 +00:00
Ben Laurie
5f8b524619
make errors.
2007-09-19 14:29:59 +00:00
Bodo Möller
08111768a2
fix warning
2007-09-19 01:43:59 +00:00
Bodo Möller
1b827d7b6f
Clean up error codes a bit.
...
(engines/ccgost/ remains utter chaos, though; "make errors" is not happy.)
2007-09-19 00:58:58 +00:00
Andy Polyakov
a005fb019f
Addenum to "Constify obj_dat.[ch]."
2007-09-18 22:15:31 +00:00
Andy Polyakov
b5e5760d01
Minor formatting fixes in crypto/sha/asm.
2007-09-18 21:12:02 +00:00
Andy Polyakov
cf2bc94e5c
Wire RC4 key_table to read-only segment.
2007-09-18 21:10:32 +00:00
Andy Polyakov
26f0cf69d3
Constify obj_dat.[ch], as well as minimize linker relocations.
2007-09-18 21:05:21 +00:00
Andy Polyakov
61836c1b70
Wire DES weak_keys to read-only segment.
2007-09-18 20:58:33 +00:00
Andy Polyakov
2a1b0c8d65
Eliminate redundant make rule.
2007-09-18 20:57:06 +00:00
Andy Polyakov
75a8e30f4f
Minimize stack utilization in probable_prime.
2007-09-18 20:52:05 +00:00
Andy Polyakov
716b87a026
Remove excessive whitespaces from bio.h
2007-09-18 20:48:39 +00:00
Bodo Möller
08b229e13f
Make sure that BN_from_montgomery keeps the BIGNUMS in proper format
2007-09-18 16:35:28 +00:00
Dr. Stephen Henson
a529a80108
Update from stable branch.
2007-09-17 17:54:31 +00:00
Dr. Stephen Henson
c81898cbc4
Update from stable branch.
2007-09-17 17:31:53 +00:00
Andy Polyakov
330591fdfc
Mention aes in enc.pod.
...
PR: 1529
2007-09-17 16:42:35 +00:00
Andy Polyakov
c7503f5240
Mention SHA2 in openssl.pod.
...
PR: 1575
2007-09-17 15:56:55 +00:00
Andy Polyakov
eff371c866
Remove pq_compat.h.
2007-09-16 19:29:35 +00:00
Andy Polyakov
8dc899dee4
Minor sha[256|512]-586 performance tweaks.
2007-09-16 18:47:24 +00:00
Andy Polyakov
cc3d7bd0fc
It's inappropraite to override application signal, nor is it appropriate
...
to shut down Winsock unless we know it won't be used [and we never do].
PR: 1439
2007-09-16 18:35:02 +00:00
Andy Polyakov
7df4c86bdd
Minor fix in link_[oa].hpux.
2007-09-16 14:11:00 +00:00
Andy Polyakov
c313e32a8b
BSD run-time linkers apparently demand RPATH on .so objects.
...
PR: 1381
2007-09-16 12:23:47 +00:00
Andy Polyakov
77519b51db
Make bn2dec work on "SIXTY_FOUR_BIT" platforms.
...
PR: 1456
2007-09-15 17:05:11 +00:00
Andy Polyakov
1a01868e35
Remove sha512-sse2.pl.
2007-09-15 13:45:17 +00:00
Andy Polyakov
563d3e5948
Engage new x86 assembler modules.
2007-09-14 21:06:14 +00:00
Andy Polyakov
1187ee7dad
More Intel cc fix-ups.
2007-09-14 19:32:33 +00:00
Dr. Stephen Henson
7c5921e736
Handle empty case in X509_NAME canonical encoding.
2007-09-14 18:11:17 +00:00
Andy Polyakov
399f94bfb4
Commentary updates.
2007-09-13 07:27:10 +00:00
Andy Polyakov
1fa29843fa
SHA512 for ARMv4.
2007-09-13 07:26:35 +00:00
Andy Polyakov
ee0449b17c
SHA256/512 for x86.
2007-09-13 07:26:19 +00:00
Ben Laurie
e28eddc51f
Typo? Why did this work, anyway?
2007-09-08 15:58:51 +00:00
Dr. Stephen Henson
d82a612a90
Fix warning: print format option not compatible with size_t.
2007-09-07 13:34:46 +00:00
Dr. Stephen Henson
e7e8f4b333
Fix another warning.
2007-09-07 13:27:40 +00:00
Dr. Stephen Henson
a6fbcb4220
Change safestack reimplementation to match 0.9.8.
...
Fix additional gcc 4.2 value not used warnings.
2007-09-07 13:25:15 +00:00
Dr. Stephen Henson
8164032a2e
Fix warnings: computed value not use, incompatible pointer initialization
...
and cast from pointer to int of different size (linux-x86_64 and align).
2007-09-07 13:03:25 +00:00
Andy Polyakov
a5804a750b
Add sha512_block implementation optimized for small register bank.
...
On x86 it gives same performance, while code size shrinks >10 times.
2007-09-07 12:34:45 +00:00
Dr. Stephen Henson
81025661a9
Update ssl code to support digests other than MD5+SHA1 in handshake.
...
Submitted by: Victor B. Wagner <vitus@cryptocom.ru >
2007-08-31 12:42:53 +00:00
Andy Polyakov
4ece7eb6f4
Constify seed and md2.
2007-08-31 10:12:35 +00:00
Andy Polyakov
0bb01b7df0
Offer darwin64-x86_64-cc as option.
2007-08-31 10:09:34 +00:00
Andy Polyakov
1c56e95e28
Compress and more aggressively constify ec_curve.c [the latter is
...
achieved by minimizing link relocations].
2007-08-31 09:36:43 +00:00
Dr. Stephen Henson
446124a258
Check return code when attempting to receive new session ticket message.
2007-08-31 00:28:01 +00:00
Andy Polyakov
583b0b67ab
Unify RC4 settings among darwin platforms.
2007-08-30 08:09:12 +00:00
Andy Polyakov
584502d4a0
Add darwin64-x86_64-cc target.
2007-08-30 07:54:23 +00:00
Andy Polyakov
d8803d5ae6
aes_ige suffered SIGBUS on RISC platforms.
2007-08-29 21:30:13 +00:00
Andy Polyakov
acfb4b5b9f
Improve cache locality in linux64-sparcv9.
2007-08-29 20:46:11 +00:00
Andy Polyakov
0ddd3ea217
Make naming more consistent.
2007-08-28 21:02:38 +00:00
Andy Polyakov
6a8517f274
Make room for Camellia assembler.
2007-08-28 20:45:25 +00:00
Dr. Stephen Henson
94d511cdbd
Add ctrls to set and get RFC4507bis keys to enable several contexts to
...
reuse the same tickets.
2007-08-28 01:08:45 +00:00
Dr. Stephen Henson
ec5d747328
Add Google sponsorship note.
2007-08-27 23:41:36 +00:00
Andy Polyakov
c6880b2533
shlib_wrap commentary update.
2007-08-27 08:51:59 +00:00
Andy Polyakov
eb6eb3e630
shlib_wrap update, IRIX section.
2007-08-27 08:42:01 +00:00
Andy Polyakov
ae4eb3c9ac
IRIX and Tru64 platform updates.
2007-08-26 14:12:30 +00:00
Dr. Stephen Henson
ba0e826d83
Update from stable branch.
2007-08-23 22:59:09 +00:00
Dr. Stephen Henson
f3fef74b09
Document ticket disabling option.
2007-08-23 22:49:13 +00:00
Dr. Stephen Henson
014f62b649
Add usage message for -sess_out, -sess_in
2007-08-23 12:20:36 +00:00
Andy Polyakov
55eab3b74b
Make x86_64 modules work under Win64/x64.
2007-08-23 12:01:58 +00:00
Andy Polyakov
dc0fcb98df
Workaround MSVC6 compiler bug.
2007-08-23 11:59:53 +00:00
Dr. Stephen Henson
d24a9c8f5a
Docs and usage messages for RFC4507bis support.
2007-08-23 11:34:48 +00:00
Richard Levitte
42fe218b9f
VAX C can't handle 64 bit integers, making SHA512 impossible...
2007-08-22 20:58:50 +00:00
Dr. Stephen Henson
956006b741
Use SHA256 for ticket HMAC if possible.
2007-08-20 12:35:20 +00:00
Dr. Stephen Henson
167066fed4
Fix for asm/no-asm on WIN32.
2007-08-13 02:24:26 +00:00
Dr. Stephen Henson
525de5d335
OPENSSL_NO_TLS1 WIN32 build support. Fix so normal build works again.
2007-08-12 23:59:05 +00:00
Dr. Stephen Henson
367eb1f125
Fix warning and make no-tlsext work.
2007-08-12 18:56:14 +00:00
Dr. Stephen Henson
3444961787
Typo.
2007-08-12 18:05:20 +00:00
Dr. Stephen Henson
710069c19e
Fix warnings.
2007-08-12 17:44:32 +00:00
Dr. Stephen Henson
ddd3a617ca
Remove debugging fprintfs, fix typo.
2007-08-12 17:06:28 +00:00
Dr. Stephen Henson
6434abbfc6
RFC4507 (including RFC4507bis) TLS stateless session resumption support
...
for OpenSSL.
2007-08-11 23:18:29 +00:00
Andy Polyakov
e45c100762
Typos in ./config.
...
PR: 1563
2007-08-01 11:20:39 +00:00
Andy Polyakov
5a22a8e7f9
MacOS X update.
2007-07-31 19:30:13 +00:00
Andy Polyakov
d6c764573c
Proper support for shared build under MacOS X.
2007-07-31 18:24:41 +00:00
Andy Polyakov
9d35d08ab6
Typo in ppccpuid.pl.
2007-07-31 18:19:40 +00:00
Bodo Möller
f7b61702a0
document -S and -nopad options in usage information
2007-07-31 09:42:47 +00:00
Andy Polyakov
983180bb8b
Buglet fixes and minor optimization in aes-x86_86 assembler.
2007-07-30 16:42:57 +00:00
Andy Polyakov
cdb0392159
Make preprocessor logic more fail-safe.
2007-07-30 11:53:01 +00:00
Andy Polyakov
1891f5b395
As for inline vs. __inline. The original code implies that most compilers
...
understand inline, while WIN32 ones insist on __inline. Well, there are
other compilers that insist on __inline. At the same time it turned out
that most compilers understand both __inline and inline. I could find
only one that doesn't understand __inline, Sun C. In other words it seems
that __inline as preferred choice provides better coverage...
2007-07-30 11:42:08 +00:00
Andy Polyakov
a3963619f6
Make ppccpuid AIX friendly.
2007-07-30 08:47:32 +00:00
Andy Polyakov
34994068a4
Respect ISO aliasing rules.
...
PR: 1296
2007-07-27 20:34:10 +00:00
Andy Polyakov
afaad0ada6
AES for IA64 update.
2007-07-27 18:20:52 +00:00
Andy Polyakov
05f9cb3b77
ia64cpuid update.
2007-07-27 18:03:27 +00:00
Andy Polyakov
1988a456a7
x86 perlasm updates.
2007-07-25 12:38:11 +00:00
Andy Polyakov
69216cc5a5
Configure update from 098.
2007-07-24 14:41:20 +00:00
Dr. Stephen Henson
2cf6fa4c8b
Update debug-steve
2007-07-24 00:27:25 +00:00
Andy Polyakov
a61710b868
Allow for option to skip hardware support.
2007-07-23 20:38:57 +00:00
Andy Polyakov
20f7563f3d
md32_common.h update.
2007-07-23 13:57:15 +00:00
Andy Polyakov
3df2eff4bd
x86*cpuid update.
2007-07-21 14:46:27 +00:00
Andy Polyakov
a415ebd026
Complete synchronization of aes-x86_64 with aes-586.
2007-07-21 14:20:46 +00:00
Andy Polyakov
52ee3d01ae
Lppc_AES_[en|de]crypt_compact: size optimization.
2007-07-19 15:31:22 +00:00
Andy Polyakov
e59f992be6
Minor optimization in AES_set_encryption_key for x86_64.
2007-07-19 14:59:26 +00:00
Andy Polyakov
8bae7722a2
_x86_64_AES_[en|de]crypt_compact: size optimization and aggressive
...
T[ed]4 prefetch.
2007-07-19 14:29:41 +00:00
Dr. Stephen Henson
0d7dba92c8
WIN32 VC++ build fixes.
2007-07-18 17:40:49 +00:00
Andy Polyakov
ce1390aedc
shlib_wrap.sh update.
2007-07-16 14:00:08 +00:00
Andy Polyakov
287a9ee76e
gas -g doesn't tolerate unpadded .bytes in code segment.
2007-07-13 21:35:56 +00:00
Andy Polyakov
96b0f6c16d
Various minor updates to AES assembler modules.
2007-07-13 17:42:13 +00:00
Andy Polyakov
e1612ea59d
Add _x86_64_AES_[en|de]crypt_compact.
2007-07-13 17:39:40 +00:00
Andy Polyakov
71f4ea44eb
EVP_*_cfb1 was broken.
...
PR: 1318
2007-07-08 19:14:02 +00:00
Andy Polyakov
35295bdbee
bn_mul_recursive doesn't handle all cases correctly, which results in
...
BN_mul failures at certain key-length mixes.
PR: 1427
2007-07-08 18:53:03 +00:00
Andy Polyakov
aa8d6f3e86
Typo in str_lib.c
...
PR: 1177
2007-07-07 20:11:12 +00:00
Andy Polyakov
62aa5dd415
Fix build problem on Tru64.
2007-06-29 13:11:45 +00:00
Andy Polyakov
673c55a2fe
Latest bn_mont.c modification broke ECDSA test. I've got math wrong, which
...
is fixed now.
2007-06-29 13:10:19 +00:00
Ben Laurie
949ce10e88
Fix warning.
2007-06-23 18:47:51 +00:00
Ben Laurie
8dee823e61
Inline function declarations have to be prototypes.
2007-06-23 18:40:16 +00:00
Andy Polyakov
5d86336746
Flush output in x86_64cpuid.pl.
2007-06-21 11:39:35 +00:00
Andy Polyakov
5b89f78a89
Typo in x86_64-mont.pl.
...
PR: 1549
2007-06-21 11:38:52 +00:00
Andy Polyakov
85a5668dba
CHANGES update from 098-stable.
2007-06-20 17:46:43 +00:00
Andy Polyakov
c943ca5404
Optimize OPENSSL_cleanse.
2007-06-20 17:36:39 +00:00
Andy Polyakov
1c7f8707fd
bn_asm for s390x.
2007-06-20 14:10:16 +00:00
Andy Polyakov
a21c46e70b
Typo in Linux part of sparcv9cap.c
...
PR: 1532
2007-06-20 13:02:34 +00:00
Andy Polyakov
f3c26535ad
Make some shortcuts in sparcv9cap.c. Trouble is that di_walk_node result
...
is inconsistent among CPU generations.
2007-06-20 13:00:59 +00:00
Andy Polyakov
2329694222
SPARC Solaris and Linux assemblers treat .align directive differently.
...
PR: 1547
2007-06-20 12:24:22 +00:00
Dr. Stephen Henson
206a975752
Update from stable branch.
2007-06-19 15:43:48 +00:00
Dr. Stephen Henson
9677bf0f30
Update .cvsignore
2007-06-18 12:40:24 +00:00
Dr. Stephen Henson
6d6496ed52
Make ordinals consistent with OpenSSL 0.9.8
2007-06-18 12:35:56 +00:00
Andy Polyakov
7d9cf7c0bb
Eliminate conditional final subtraction in Montgomery assembler modules.
2007-06-17 17:10:03 +00:00
Andy Polyakov
55525742f4
Privatize BN_*_no_branch.
2007-06-11 16:33:03 +00:00
Andy Polyakov
c693b5a55c
Commentary updates and minor optimization for bn_mont.c.
2007-06-11 08:53:52 +00:00
Andy Polyakov
6b6443dead
Eliminate conditional final subtraction in Montgomery multiplication.
2007-06-10 19:34:38 +00:00
Dr. Stephen Henson
54b5fd537f
WIN32 fixes.
2007-06-08 00:26:16 +00:00
Dr. Stephen Henson
0b99d4f1d1
Remove unnecessary casts and avoid some warnings with gcc 4.2.
2007-06-07 16:07:57 +00:00
Dr. Stephen Henson
3c07d3a3d3
Finish gcc 4.2 changes.
2007-06-07 13:14:42 +00:00
Dr. Stephen Henson
1d1a64653c
Back out safestack.h change for now: seems to break some things.
2007-06-04 22:18:20 +00:00
Dr. Stephen Henson
297e6f1917
Avoid use of function pointer casts in pem library. Modify safestack to
...
always use inline functions.
2007-06-04 17:53:04 +00:00
Dr. Stephen Henson
b948e2c59e
Update ssl library to support EVP_PKEY MAC API. Include generic MAC support.
2007-06-04 17:04:40 +00:00
Dr. Stephen Henson
18096abb29
Handle NULL parameter in some EVP utility functions.
2007-05-31 12:39:21 +00:00
Dr. Stephen Henson
0aa08a2e34
Fix for GOST engine on platforms where sizeof(size_t) != sizeof(int).
2007-05-31 12:32:27 +00:00
Andy Polyakov
f20af72312
AES_set_[en|de]crypt_key for ARMv4.
2007-05-30 15:57:31 +00:00
Andy Polyakov
7ef643360d
s390x gas can't handle .align 128.
2007-05-28 16:32:50 +00:00
Andy Polyakov
76c828c627
AES_set_[en|de]crypt_key for s390x.
2007-05-28 16:30:18 +00:00
Dr. Stephen Henson
281cfff026
Update ordinals.
2007-05-24 10:17:49 +00:00
Dr. Stephen Henson
64a5c5d1be
Fix X509_REQ_print_ex() to process extension options.
2007-05-22 23:31:29 +00:00
Dr. Stephen Henson
7b8b797375
Revert broken change to ccgost.
...
Initialize context properly for HMAC pkey method.
2007-05-22 12:58:39 +00:00
Andy Polyakov
a1a382dbc9
SHA256 for ARMv4.
2007-05-22 09:56:45 +00:00
Bodo Möller
19f6c524bf
Fix crypto/ec/ec_mult.c to work properly with scalars of value 0
2007-05-22 09:47:43 +00:00
Dr. Stephen Henson
8dbdf6314c
Typo.
2007-05-21 16:36:09 +00:00
Dr. Stephen Henson
9c54e18bf0
Fixes for dgst tool. Initialize md_name, sig_name properly. Return error code
...
on failure. Keep output format consistent with previous versions.
Also flush stdout after printing ACCEPT in s_server.
2007-05-21 15:53:30 +00:00
Dr. Stephen Henson
9aba74e55a
Fix warning and back out bad modification.
2007-05-21 12:16:36 +00:00
Andy Polyakov
e4317d2031
OPENSSL_IMPLEMENT_GLOBAL caused more grief than it's worth (it's used twice
...
in legacy code). I'd rather just remove it along with legacy interface,
but it's probably not as appropriate as I'd like. Reimplement the macro.
2007-05-20 20:11:19 +00:00
Andy Polyakov
61775daf00
Padlock engine fails to compile with -O0 -fPIC.
2007-05-20 07:13:45 +00:00
Andy Polyakov
86d8f3ee19
Typo in aes-ppc.pl.
2007-05-19 20:00:33 +00:00
Andy Polyakov
cb1fbf9f63
--enable-auto-image-base in cygwin build.
...
PR: 1517
Submitted by: vinschen@redhat.com
2007-05-19 19:40:15 +00:00
Andy Polyakov
3005764c18
Typo in x509_txt.c.
...
Submitted by: Martin.Kraemer@Fujitsu-Siemens.com
2007-05-19 18:03:21 +00:00
Andy Polyakov
b1e8b4e65d
x86cpuid fixes.
...
PR: 1526
2007-05-19 17:52:51 +00:00
Andy Polyakov
c6149e2f02
ppc-xlate.pl update.
2007-05-19 17:32:06 +00:00
Andy Polyakov
aa5c99fa01
sparccpuid.s update.
2007-05-19 17:26:48 +00:00
Andy Polyakov
9c200f5471
Initial draft of AES for PPC.
2007-05-19 17:16:27 +00:00
Dr. Stephen Henson
ec06417d52
Updated GOST MAC support.
...
Submitted by: vitus@cryptocom.ru
2007-05-18 15:55:55 +00:00
Dr. Stephen Henson
a4346646f1
Initial GOST MAC support. Not fully working yet...
2007-05-17 17:44:09 +00:00
Dr. Stephen Henson
a70c09e2a2
Add .cvsignore to seed dir.
2007-05-17 16:43:15 +00:00
Dr. Stephen Henson
0f9e0abbee
Set len to buffer size.
2007-05-17 16:42:05 +00:00
Dr. Stephen Henson
e77dbf325f
Prepend signature name in dgst output.
2007-05-17 16:19:17 +00:00
Dr. Stephen Henson
f03620ea15
Use default md if none specified in dgst utility.
2007-05-17 12:55:03 +00:00
Dr. Stephen Henson
47b2e238e5
Use EVP_DigestVerify() in dgst.c if verifying.
2007-05-17 12:35:32 +00:00
Dr. Stephen Henson
ad35cdac74
PR: 1516
...
Revert change in 1516 because it breaks Windows build. Use a modified version
of the headers from s_client.c which has used similar functionality without
any problems.
2007-05-16 12:16:49 +00:00
Dr. Stephen Henson
4eba5d8c86
Fix error code name.
2007-05-16 00:14:32 +00:00
Dr. Stephen Henson
e69adea539
New function EVP_PKEY_asn1_copy(). Use default MD if type param is NULL.
2007-05-15 23:52:03 +00:00
Dr. Stephen Henson
9660cbcd6b
Change C++ style comments.
2007-05-15 23:50:55 +00:00
Andy Polyakov
9c9c83ccb9
Throw in ppccpuid module.
2007-05-15 20:51:48 +00:00
Andy Polyakov
1d42fb5f4a
Fix linking error after adding alphacpuid.s.
2007-05-15 07:11:23 +00:00
Andy Polyakov
e119769480
Add alphacpuid.s
2007-05-15 06:36:17 +00:00
Andy Polyakov
b2dba9bf1f
Profiling revealed that OPENSSL_cleanse consumes *more* CPU time than
...
sha1_block_data_order when hashing short messages. Move OPENSSL_cleanse
to "cpuid" assembler module and gain 2x.
2007-05-14 21:35:25 +00:00
Andy Polyakov
932cc129ee
x86_64 assembler updates.
2007-05-14 15:57:19 +00:00
Andy Polyakov
1a42839ba7
As all assembler modules are alignment neutral, allow C to pass unaligned
...
content.
2007-05-13 15:16:44 +00:00
Andy Polyakov
232a938c75
Make sha*-ia64 modules alignment neutral.
2007-05-13 15:15:24 +00:00
Ben Laurie
69ab085290
More IGE speedup.
2007-05-13 15:14:38 +00:00
Ben Laurie
5f09d0ecc2
AES IGE mode speedup.
2007-05-13 12:57:59 +00:00
Dr. Stephen Henson
76b46e7707
Document streaming options.
2007-05-11 12:08:38 +00:00
Dr. Stephen Henson
6217896145
Improve error detection when streaming S/MIME.
...
Only use streaming when appropriate for detached data in smime utility.
2007-05-10 17:37:15 +00:00
Dr. Stephen Henson
ee7ca0941a
Tidy up docs, remove warning.
2007-05-10 17:35:37 +00:00
Dr. Stephen Henson
f8492ffeaa
More useful ASN1 macros for static allocation functions.
2007-05-10 17:34:42 +00:00
Andy Polyakov
308595638a
Mention Core2 in sha1-x86_64.
2007-05-10 07:34:50 +00:00
Andy Polyakov
0bd8d6e2e1
Commentary updates to SHA for sparcv9.
2007-05-10 06:48:28 +00:00
Andy Polyakov
160065c5bb
Detect UltraSPARC T1 in ./config.
2007-05-04 13:04:17 +00:00
Andy Polyakov
ae0d6e3e36
Engage SHA for sparcv9.
2007-05-04 12:54:02 +00:00
Andy Polyakov
6fa8a01c72
SHA for sparcv9.
2007-05-04 12:52:54 +00:00
Andy Polyakov
3f6916cf29
Fix bug introduced in cn#16195.
2007-05-03 09:12:47 +00:00
Andy Polyakov
a4470ae7b2
Fine reading of manual suggests that km can return non-normal completion code.
2007-05-03 07:26:27 +00:00
Andy Polyakov
251718e4c1
Fix s390x bugs and correct performance coefficients.
2007-05-02 11:44:02 +00:00
Richard Levitte
c504a5e783
Synchronise VMS with Unix.
2007-05-01 12:25:15 +00:00
Andy Polyakov
f6fb2c95ef
Revert irrelevant changes from commit #16191 .
2007-04-30 17:22:09 +00:00
Andy Polyakov
708311267a
rll does not seem to be available on legacy s390.
2007-04-30 17:19:12 +00:00
Andy Polyakov
cdd1d7a618
Typo in commit #16187 .
2007-04-30 15:55:00 +00:00
Andy Polyakov
2f324768b2
Typo in s390x_asm.
2007-04-30 15:48:54 +00:00
Andy Polyakov
6ef18c21c9
Bug in apps/dgst.c.
2007-04-30 15:20:10 +00:00
Andy Polyakov
b38c0add30
s390x optimizations.
2007-04-30 13:26:06 +00:00
Andy Polyakov
b900df5258
Engage s390x assembler modules.
2007-04-30 09:22:27 +00:00
Andy Polyakov
a2a54ffc5f
s390x assembler pack.
2007-04-30 08:42:54 +00:00
Andy Polyakov
20c04a13e6
Reimplement rc4-586.pl, relicense rc4-x86_64.pl.
2007-04-26 20:48:38 +00:00
Bodo Möller
a291745eeb
fix function codes for error
2007-04-24 01:06:19 +00:00
Bodo Möller
0862caf27e
remove leftover from editing ...
2007-04-24 00:47:53 +00:00
Bodo Möller
cb1bab1a04
All ciphersuites should have a strength designator.
2007-04-24 00:13:51 +00:00
Bodo Möller
96afc1cfd5
Add SEED encryption algorithm.
...
PR: 1503
Submitted by: KISA
Reviewed by: Bodo Moeller
2007-04-23 23:48:59 +00:00
Bodo Möller
24a8c25ab5
fix error codes
2007-04-19 15:14:21 +00:00
Bodo Möller
d1e7d1d96c
don't violate the bn_check_top assertion in BN_mod_inverse_no_branch()
2007-04-19 14:45:57 +00:00
Dr. Stephen Henson
18f547734e
New function ASN1_STRING_copy() to copy to an already
...
alloacted ASN1_STRING structure.
2007-04-14 17:53:55 +00:00
Dr. Stephen Henson
be3b365a34
Sample text files for S/MIME test programs.
2007-04-13 20:41:42 +00:00
Dr. Stephen Henson
b2b2dafc28
Add a bunch of S/MIME sample programs and data.
2007-04-13 20:40:47 +00:00
Dr. Stephen Henson
14ab6cdd69
Flush b64 BIO.
2007-04-13 18:00:45 +00:00
Dr. Stephen Henson
eeec060df0
Don't finalize signerinfo if reuse and partial both set.
2007-04-13 16:41:52 +00:00
Dr. Stephen Henson
0efb7b1eea
PKCS7_sign_add_signer() docs.
2007-04-13 16:31:08 +00:00
Dr. Stephen Henson
f000f705ea
More docs for streaming functions.
2007-04-13 15:43:15 +00:00
Dr. Stephen Henson
2749cc1ede
Typo.
2007-04-13 13:23:31 +00:00
Dr. Stephen Henson
a44e4f2cf8
d2i_PKCS7_bio_stream() docs.
2007-04-13 13:22:15 +00:00
Dr. Stephen Henson
30b10f947a
Oops...
2007-04-13 13:20:46 +00:00
Dr. Stephen Henson
731c6802d7
Update docs.
2007-04-13 13:13:14 +00:00
Dr. Stephen Henson
4cfb986f27
Update docs.
2007-04-13 12:57:48 +00:00
Dr. Stephen Henson
9cfc8a9d5c
Update smime utility to support streaming for -encrypt and -sign -nodetach
...
options. Add new streaming i2d (though strictly speaking it is BER format
when streaming) and PEM functions.
These all process content on the fly without storing it all in memory.
2007-04-13 01:06:41 +00:00
Dr. Stephen Henson
18327cd0e4
Copy update callback across when copying EVP_MD_CTX.
...
Remove unnecessary reference to EVP_MD_CTX in HMAC pkey method.
2007-04-12 13:02:31 +00:00
Dr. Stephen Henson
2022cfe07e
New -mac and -macopt options to dgst utility. Reimplement -hmac option in
...
terms of new API.
2007-04-11 17:20:40 +00:00
Dr. Stephen Henson
47b71e6ee9
Update CHANGES.
2007-04-11 12:33:28 +00:00
Dr. Stephen Henson
74633553a9
Experimental HMAC support via EVP_PKEY_METHOD.
2007-04-11 12:33:06 +00:00
Dr. Stephen Henson
376bf1d4aa
Constification.
2007-04-11 12:26:53 +00:00
Dr. Stephen Henson
d318fb79d2
Don't ignore config_name parameter passed to OPENSSL_config(). Use
...
"openssl_conf" in config file if config_name variable is missing.
2007-04-09 11:45:54 +00:00
Dr. Stephen Henson
2840dcd2a6
file evp_cnf.c was added on branch OpenSSL_1_0_1-stable on 2012-07-04 13:14:11 +0000
2007-04-08 17:50:59 +00:00
Dr. Stephen Henson
bd5770c6b1
file evp_cnf.c was added on branch OpenSSL_1_0_2-stable on 2012-07-04 13:14:44 +0000
2007-04-08 17:50:58 +00:00
Dr. Stephen Henson
0cc361f3e7
Fix from stable branch.
2007-04-08 17:45:47 +00:00
Dr. Stephen Henson
baecb96e8a
Fix digest signing so digest type is set after init.
2007-04-08 16:53:50 +00:00
Dr. Stephen Henson
6181f5e404
Preliminary support for signctx/verifyctx callbacks.
2007-04-08 13:03:26 +00:00
Dr. Stephen Henson
d952c79a7b
New -sigopt option for dgst utility.
2007-04-08 12:47:18 +00:00
Ben Laurie
3dfb6b3353
Yet another resource leak. Coverity ID 123.
2007-04-07 13:20:09 +00:00
Ben Laurie
48bd505c0b
If you're going to check for negative, use an signed integer! Coverity ID 122.
2007-04-05 17:31:29 +00:00
Ben Laurie
ab2d91bd6b
Don't copy from a nonexistent next. Coverity ID 47.
2007-04-05 17:23:51 +00:00
Ben Laurie
3b2eead381
Fix duplicate error number.
2007-04-05 17:09:43 +00:00
Ben Laurie
f3d2a9db09
Errors should actually be errors.
2007-04-05 17:03:09 +00:00
Ben Laurie
8bbf6ac010
Don't dereference NULL argument. Coverity ID 52.
2007-04-05 16:58:39 +00:00
Ben Laurie
38e952e8ae
Missing config file.
2007-04-05 16:57:07 +00:00
Ben Laurie
fa9fed1c3a
Don't use a negative number as a length. Coverity ID 57.
2007-04-05 16:28:48 +00:00
Ben Laurie
f6301f6888
Avoid overrun. Coverity ID 60.
2007-04-05 15:45:58 +00:00
Ben Laurie
44907e6064
Free memory. Coverity ID 62.
2007-04-05 15:45:22 +00:00
Nils Larsch
907e99623c
check return value of ASN1_item_i2d(), Coverity ID 55
2007-04-04 19:41:20 +00:00
Ben Laurie
231671b9ff
Resource leak.
2007-04-04 16:00:03 +00:00
Ben Laurie
4f1a0b2c21
Handle bad content type. Coverity ID 99.
2007-04-04 15:31:17 +00:00
Ben Laurie
260c497cdd
Fix buffer overrun. Coverity ID 106.
2007-04-04 15:13:31 +00:00
Ben Laurie
313fce7b61
Don't free a NULL. Coverity ID 112.
2007-04-04 14:59:20 +00:00
Ben Laurie
2f877235a3
Missing return on error. Coverity ID 115.
2007-04-04 14:38:59 +00:00
Ben Laurie
309fa55bbb
Return an error if the serial number is badly formed. (Coverity ID 116).
2007-04-04 14:35:56 +00:00
Ben Laurie
4b8747e440
Die if serial number is invalid.
2007-04-04 13:41:33 +00:00
Ben Laurie
2ff7a0edef
Make sure we detect corruption.
2007-04-04 13:21:15 +00:00
Nils Larsch
442cbb062d
check correct pointer before freeing it (Coverity CID 79,86)
2007-04-02 20:29:40 +00:00
Nils Larsch
c971ca4c86
check if pointer is != NULL before dereferencing it (Coverity CID 40)
2007-04-02 20:02:27 +00:00
Andy Polyakov
9babf3929b
RC4_set_key for x86_64 and Core2 optimization.
...
PR: 1447
2007-04-02 09:50:14 +00:00
Ben Laurie
2ec0be9e77
Don't die if the value is NULL (Coverity CID 98).
2007-04-01 18:00:52 +00:00
Ben Laurie
c2d1c2d319
Fix warning.
2007-04-01 17:56:25 +00:00
Andy Polyakov
162f677def
Update x86cpuid.pl to correctly detect shared cache and to support new
...
RC4_set_key.
2007-04-01 17:28:08 +00:00
Andy Polyakov
2875462425
Reserve for assembler implementation of RC4_set_key and implement x86 one.
2007-04-01 17:01:12 +00:00
Richard Levitte
a1d915990b
Apply a more modern way to get the definition of select(), except for VMS.
...
Submitted by Corinna Vinschen <vinschen@redhat.com >
2007-03-29 18:34:57 +00:00
Bodo Möller
b002265ee3
make BN_FLG_CONSTTIME semantics more fool-proof
2007-03-28 18:41:23 +00:00
Bodo Möller
bd31fb2145
Change to mitigate branch prediction attacks
...
Submitted by: Matthew D Wood
Reviewed by: Bodo Moeller
2007-03-28 00:15:28 +00:00
Andy Polyakov
b506821d43
Allow shared builds for aix[64]-gcc targets.
2007-03-25 15:20:35 +00:00
Andy Polyakov
4bfb49b3cf
aix[64]-cc config lines update.
2007-03-25 15:13:51 +00:00
Dr. Stephen Henson
9981a51e42
Stage 1 GOST ciphersuite support.
...
Submitted by: ran@cryptocom.ru
Reviewed by: steve@openssl.org
2007-03-23 17:04:05 +00:00
Richard Levitte
ebb326afe6
Synchronise the VMS build with recent movements in the Unix build.
2007-03-23 09:36:33 +00:00
Andy Polyakov
0d1aa74d6f
Fixes for aix-shared rules.
2007-03-22 08:46:33 +00:00
Dr. Stephen Henson
a9c5de8654
file buf_str.c was added on branch OpenSSL_1_0_1-stable on 2011-01-09 13:30:58 +0000
2007-03-22 00:37:54 +00:00
Bodo Möller
0f32c841a6
stricter session ID context matching
2007-03-21 14:33:16 +00:00
Bodo Möller
41a8d5167f
clarification regarding libdes files
2007-03-21 10:58:45 +00:00
Andy Polyakov
8f41e4fa4d
link warnings caused by nasm modules.
2007-03-20 09:37:06 +00:00
Andy Polyakov
de50494505
Two extra instructions in RC4 character loop give 80% performance
...
improvement on Core2. I still need to detect Core2 and choose this
path...
2007-03-20 09:13:07 +00:00
Andy Polyakov
3d1def0132
Remove obsolete comment.
2007-03-20 09:07:19 +00:00
Andy Polyakov
0a29f5110d
Various PowerPC config updates.
2007-03-20 08:57:18 +00:00
Andy Polyakov
8b71d35458
nasm fixes.
2007-03-20 08:55:58 +00:00
Andy Polyakov
760e353528
sparcv9a-mont was modified to handle 32-bit aligned input, but check
...
for 64-bit alignment was not removed.
2007-03-20 08:54:51 +00:00
Dr. Stephen Henson
3627fedbea
Win32 fixes. Add GOST algorithm to mkdef, update ordinals. Signed/unsigned fixes.
2007-03-16 22:20:55 +00:00
Dr. Stephen Henson
bbb5cf05db
Fix from stable branch.
2007-03-05 00:09:08 +00:00
Nils Larsch
ebb01b84b8
size_t -> int
2007-03-02 19:56:29 +00:00
Nils Larsch
a0d48e7e7e
remove unused file
2007-03-02 19:42:16 +00:00
Lutz Jänicke
1fcfa22222
Initialize "buf" to 0 to make valgrind happy :-)
...
Note: the RAND_bytes() manual page says:
RAND_bytes() puts num cryptographically strong pseudo-random bytes into buf.
It does not talk about using the previous contents of buf so we are working
as documented.
2007-03-02 17:54:51 +00:00
Lutz Jänicke
c9fb4e2c8d
Do not use uninitialized memory to seed the PRNG as it may confuse
...
code checking tools.
PR: 1499
2007-03-02 17:46:25 +00:00
Dr. Stephen Henson
6e7ca5e1eb
Update from stable branch.
2007-02-27 18:43:42 +00:00
Ralf S. Engelschall
954b274789
small cosmetics: align title with the other similar manual page
2007-02-27 07:41:54 +00:00
Nils Larsch
0d5ac5a738
allow EVP_PKEY_CTX_free(NULL)
2007-02-26 18:32:53 +00:00
Nils Larsch
c209a35820
remove dead code
2007-02-26 18:21:19 +00:00
Bodo Möller
dd2b6750db
include complete 0.9.7 history
...
include release date of 0.9.8e
2007-02-26 10:49:59 +00:00
Bodo Möller
4bb89bca9e
use 2007 copyright for generated files
2007-02-26 10:48:10 +00:00
Dr. Stephen Henson
ac63b8370e
Update FAQ,NEWS in HEAD.
2007-02-23 13:16:38 +00:00
Bodo Möller
882d29dd87
Fix incorrect substitution that happened during the recent ciphersuite
...
selection remodeling
Submitted by: Victor Duchovni
2007-02-22 21:31:19 +00:00
Lutz Jänicke
ee373e7f19
Fix problem with multi line responses in -starttls by using a buffering
...
BIO and BIO_gets().
2007-02-22 17:39:47 +00:00
Lutz Jänicke
8d72476e2b
Extend SMTP and IMAP protocol handling to perform the required
...
EHLO or CAPABILITY handshake before sending STARTTLS
Submitted by: Goetz Babin-Ebell <goetz@shomitefo.de >
2007-02-21 18:20:41 +00:00
Lutz Jänicke
02756aa8ba
Add automatic detection for Linux on SuperH
...
PR: 1152
Submitted by: Mike Frysinger <vapier@gentoo.org >
2007-02-21 18:10:20 +00:00
Lutz Jänicke
072dfb9e4e
Add support for m68k linux
...
PR: 1277
Submitted by: Mike Frysinger <vapier@gentoo.org >
2007-02-21 17:58:54 +00:00
Lutz Jänicke
0636c39bb1
Fix incorrect handling of special characters
...
PR: 1459
Submitted by: tnitschke@innominate.com
Reviewed by: steve@openssl.org
2007-02-21 17:44:53 +00:00
Dr. Stephen Henson
a2e623c011
Update from 0.9.7-stable.
2007-02-21 13:49:35 +00:00
Bodo Möller
aa79dd6895
prefer SHA1 over MD5 (this affects the Kerberos ciphersuites)
2007-02-21 09:33:14 +00:00
Bodo Möller
60cad2caed
delete obsolete comment
2007-02-21 09:32:17 +00:00
Bodo Möller
114c9c36b1
SSL_kKRB5 ciphersuites shouldn't be preferred by default
2007-02-20 16:39:58 +00:00
Bodo Möller
fd5bc65cc8
Improve ciphersuite order stability when disabling ciphersuites.
...
Change ssl_create_cipher_list() to prefer ephemeral ECDH over
ephemeral DH.
2007-02-20 16:36:58 +00:00
Bodo Möller
e041863905
fix a typo in the new ciphersuite ordering code
2007-02-20 13:25:36 +00:00
Bodo Möller
0a05123a6c
Include "!eNULL" in SSL_DEFAULT_CIPHER_LIST to make sure that a
...
ciphersuite string such as "DEFAULT:RSA" cannot enable
authentication-only ciphersuites.
Also, change ssl_create_cipher_list() so that it no longer
starts with an arbitrary ciphersuite ordering, but instead
uses the logic that we previously had in SSL_DEFEAULT_CIPHER_LIST.
SSL_DEFAULT_CIPHER_LIST simplifies into just "ALL:!aNULL:!eNULL".
2007-02-19 18:41:41 +00:00
Bodo Möller
2afe316721
fix warnings for CIPHER_DEBUG builds
2007-02-19 16:59:13 +00:00
Bodo Möller
7e69565fe6
fix warnings/inconsistencies caused by the recent changes to the
...
ciphersuite selection code in HEAD
Submitted by: Victor Duchovni
2007-02-19 14:53:18 +00:00
Bodo Möller
ccae144d62
fix incorrect strength bit values for certain Kerberos ciphersuites
...
Submitted by: Victor Duchovni
2007-02-19 14:49:12 +00:00
Dr. Stephen Henson
5d5ca32fa1
Updates from 0.9.8-stable branch.
2007-02-18 18:21:57 +00:00
Bodo Möller
52b8dad8ec
Reorganize the data used for SSL ciphersuite pattern matching.
...
This change resolves a number of problems and obviates multiple kludges.
A new feature is that you can now say "AES256" or "AES128" (not just
"AES", which enables both).
In some cases the ciphersuite list generated from a given string is
affected by this change. I hope this is just in those cases where the
previous behaviour did not make sense.
2007-02-17 06:45:38 +00:00
Nils Larsch
cc684e330b
ensure that the EVP_CIPHER_CTX object is initialized
...
PR: 1490
2007-02-16 20:34:15 +00:00
Richard Levitte
85c6749216
Add STARTTLS support for IMAP and FTP.
...
Submitted by Kees Cook <kees@outflux.net >
2007-02-16 18:12:16 +00:00
Nils Larsch
30e5e8aca5
- use OPENSSL_malloc() etc. in zlib
...
- move zlib_stateful_ex_idx initialization to COMP_zlib()
PR: 1468
2007-02-14 21:52:01 +00:00
Nils Larsch
b900a6b42f
avoid shifting input
2007-02-11 19:33:21 +00:00
Nils Larsch
15780a1ea0
use user-supplied malloc functions for persistent kssl objects
...
PR: 1467
Submitted by: Andrei Pelinescu-Onciul <andrei@iptel.org >
2007-02-10 10:42:48 +00:00
Nils Larsch
92ada7cc52
remove unreachable code
2007-02-10 09:45:07 +00:00
Dr. Stephen Henson
53ca4761cc
PR: 1483
...
Add support for GOST 28147-89 in Gost ENGINE.
2007-02-09 19:43:04 +00:00
Dr. Stephen Henson
52cfa39716
Add -hmac option to dgst from 0.9.7 stable branch.
2007-02-08 19:07:43 +00:00
Nils Larsch
b3bad17d1a
remove unused variable
2007-02-07 20:49:58 +00:00
Nils Larsch
feaaf1dbea
ensure that a ec key is used
...
PR: 1476
2007-02-07 20:28:19 +00:00
Richard Levitte
82bf227e91
After objects have been freed, NULLify the pointers so there will be no double
...
free of those objects
2007-02-07 01:42:46 +00:00
Nils Larsch
8807a2dfc4
fix typo
2007-02-06 19:48:42 +00:00
Nils Larsch
bcb38217c4
add note about 56 bit ciphers
...
PR: 1461
2007-02-06 19:41:01 +00:00
Dr. Stephen Henson
af32f9fdda
Update from fips2 branch.
2007-02-03 17:32:49 +00:00
Nils Larsch
357d5de5b9
add support for DSA with SHA2
2007-02-03 14:41:12 +00:00
Nils Larsch
0501f02b06
fix documentation
...
PR: 1466
2007-02-03 10:28:08 +00:00
Nils Larsch
689f9faba4
fix potential memory leaks
...
PR: 1462
2007-02-03 09:55:42 +00:00
Andy Polyakov
82686bdcaa
Minimize aes_core.c footprint when AES_[en|de]crypt is implemented in
...
assembler.
2007-01-25 20:47:00 +00:00
Andy Polyakov
14b1d089b6
Minor touch to aes-armv4.pl.
2007-01-25 11:28:07 +00:00
Andy Polyakov
a296239bdd
AES for ARMv4.
2007-01-25 10:44:48 +00:00
Andy Polyakov
0b0896cdd2
Minor optimization for sha1-armv4 module.
2007-01-25 10:44:18 +00:00
Dr. Stephen Henson
2d3e956ae0
Update from 0.9.7-stable.
2007-01-23 17:53:48 +00:00
Andy Polyakov
36b7c06975
SHA1 for ARMv4 and Thumb.
2007-01-22 20:33:46 +00:00
Dr. Stephen Henson
42182852f5
Constify version strings is ssl lib.
2007-01-21 16:06:05 +00:00
Dr. Stephen Henson
560b79cbff
Constify version strings and some structures.
2007-01-21 13:07:17 +00:00
Dr. Stephen Henson
a6d799d705
Add AOL an AOLTW root CAs to bundle.
2007-01-18 21:24:44 +00:00
Andy Polyakov
64aecc6720
Make armv4t-mont module backward binary compatible with armv4 and rename it
...
accordingly.
2007-01-17 20:12:41 +00:00
Lutz Jänicke
8ac40b4dea
Update to new home page
2007-01-12 18:47:13 +00:00
Andy Polyakov
43b8fe1cd0
Montgomery multiplication for ARMv4.
2007-01-11 21:43:25 +00:00
Nils Larsch
39d764ed58
remove undefined constant
2007-01-03 20:00:32 +00:00
Andy Polyakov
a6ebe229e3
opensslwrap.sh to respect $OPENSSL_ENGINES.
2006-12-29 15:00:36 +00:00
Andy Polyakov
5c914f204a
#include <stddef.h> in digest headers.
...
Submitted by: Kurt Roeckx <kurt@roeckx.be >
2006-12-29 14:51:42 +00:00
Andy Polyakov
8876e58f34
Montgomery multiplication for MIPS III/IV. Not engaged.
2006-12-29 11:09:33 +00:00
Andy Polyakov
7321a84d4c
Minor clean-up in crypto/bn/asm.
2006-12-29 11:05:20 +00:00
Andy Polyakov
bb11c28246
Minor clean-up in crypto/engine.
2006-12-29 10:55:43 +00:00
Andy Polyakov
8d9f136d06
Allow opensslwrap.sh to access engines from build tree.
2006-12-29 10:53:09 +00:00
Andy Polyakov
00b4e083fd
Move eng_padlock.c to ./engines.
...
Submitted by: Michal Ludvig <michal@logix.cz >
2006-12-29 10:42:24 +00:00
Andy Polyakov
4cfe3df1f5
Minor performance improvements to x86-mont.pl.
2006-12-28 12:43:16 +00:00
Andy Polyakov
8f2d60ec26
Fix for "strange errors" exposed by ccgost engine. The fix is
...
two extra insructions in sqradd loop at line #503 .
2006-12-27 10:59:51 +00:00
Nils Larsch
123b23fa95
fix return value of get_cert_chain()
...
PR: 1441
2006-12-27 09:40:52 +00:00
Richard Levitte
423a5d54a1
Synchronise a bit more with Unixly build
2006-12-26 21:20:15 +00:00
Richard Levitte
8bbf6bcf17
Needed definition of _XOPEN_SOURCE_EXTENDED so DEC C on VMS will see
...
the declarations of fd_set, select() and so on.
2006-12-25 10:54:14 +00:00
Richard Levitte
ea46f5e0e5
Replace strdup() with BUF_strdup().
2006-12-25 09:43:46 +00:00
Richard Levitte
7f6c848242
Synchronise with Unixly build, again ;-)
2006-12-24 20:25:51 +00:00
Dr. Stephen Henson
559d50138f
Add bit I missed from PKCS#7 streaming encoder.
2006-12-24 16:46:47 +00:00
Dr. Stephen Henson
11d8cdc6ad
Experimental streaming PKCS#7 support.
...
I thought it was about time I dusted this off. This stuff had been sitting on
my hard drive for *ages* (2003 in fact). Hasn't been tested well and may not
work properly.
Nothing uses it at present which is just as well.
Think of this as a traditional Christmas present which looks far more
impressive in the adverts and on the box, some of the bits are missing and
falls to bits if you play with it too much.
2006-12-24 16:22:56 +00:00
Richard Levitte
e49978dafe
Synchronise with Unixly build
2006-12-24 09:27:23 +00:00
Andy Polyakov
e1d9e533b5
Oops! New prototype code creeped through...
2006-12-22 15:47:01 +00:00
Andy Polyakov
f946dd7198
Make sha.h more "portable."
2006-12-22 15:42:06 +00:00
Andy Polyakov
1702c8c4bf
x86-mont.pl sse2 tune-up and integer-only squaring procedure.
2006-12-22 15:28:07 +00:00
Nils Larsch
afda1385bd
use OPENSSL_NO_DYNAMIC_ENGINE macro, disable debug messages
...
PR: 1440
Submitted by: Victor B. Wagner" <vitus@cryptocom.ru >
2006-12-22 09:21:29 +00:00
Nils Larsch
fec38ca4ed
fix typos
...
PR: 1354, 1355, 1398, 1408
2006-12-21 21:13:27 +00:00
Nils Larsch
ec1edeb5fa
update pkcs12 help message + manpage
...
PR: 1443
Submitted by: Artem Chuprina <ran@cryptocom.ru >
2006-12-21 20:36:15 +00:00
Nils Larsch
b0ec114685
fix order
...
PR: 1442
2006-12-21 19:50:48 +00:00
Nils Larsch
c92da5a605
update
2006-12-21 19:48:47 +00:00
Nils Larsch
06e2dd037e
add support for ecdsa-with-sha256 etc.
2006-12-20 08:58:54 +00:00
Nils Larsch
34f0a19309
remove trailing '\'
...
PR: 1438
2006-12-19 19:49:02 +00:00
Bodo Möller
772e3c07b4
Fix the BIT STRING encoding of EC points or parameter seeds
...
(need to prevent the removal of trailing zero bits).
2006-12-19 15:11:37 +00:00
Nils Larsch
360ff3cf58
fix order
2006-12-18 22:20:27 +00:00
Nils Larsch
5dfe910023
properly initialize SSL context, check return value
2006-12-13 22:06:37 +00:00
Nils Larsch
91b73acb19
use const ASN1_TIME *
2006-12-11 22:35:51 +00:00
Andy Polyakov
87d3af6475
Eliminate 64-bit alignment limitation in sparcv9a-mont.
2006-12-08 15:18:41 +00:00
Andy Polyakov
98c1509f34
Engage alpha-mont module. Actually verified on Tru64 only.
2006-12-08 14:42:19 +00:00
Andy Polyakov
98939a05b6
alpha-mont.pl: gcc portability fix and make-rule.
2006-12-08 14:18:58 +00:00
Andy Polyakov
d28134b8f3
Minor, +10%, tune-up for x86_64-mont.pl.
2006-12-08 10:13:51 +00:00
Andy Polyakov
8583eba015
Montgomery multiplication routine for Alpha.
2006-12-08 10:12:56 +00:00
Dr. Stephen Henson
5894b98f99
Update from 0.9.7-stable branch.
2006-12-07 13:29:08 +00:00
Dr. Stephen Henson
5de3a0ff3d
Sync OID NIDs with OpenSSL 0.9.8.
2006-12-06 13:44:21 +00:00
Dr. Stephen Henson
10ca15f3fa
Fix change to OPENSSL_NO_RFC3779
2006-12-06 13:36:48 +00:00
Nils Larsch
da736b31b2
fix documentation
...
PR: 1343
2006-12-06 09:10:59 +00:00
Nils Larsch
fa9ac569b8
avoid duplicate entries in add_cert_dir()
...
PR: 1407
Submitted by: Tomas Mraz <tmraz@redhat.com >
2006-12-05 21:21:37 +00:00
Nils Larsch
10a10fb834
return 0 if 'noout' is used and no error has occurred
...
PR: 1435
Submitted by: "Haridharan" <haridharan@gmail.com >
2006-12-05 20:09:25 +00:00
Nils Larsch
0f997d0dc3
allocate a new attributes entry in X509_REQ_add_extensions()
...
if it's NULL (in case of a malformed pkcs10 request)
PR: 1347
Submitted by: Remo Inverardi <invi@your.toilet.ch >
2006-12-04 19:11:57 +00:00
Nils Larsch
b0eedd77f6
add "Certificate Issuer" and "Subject Directory Attributes" OIDs
...
PR: 1433
2006-12-04 18:51:06 +00:00
Andy Polyakov
502aef5aaf
Eliminate redundant variable in Camellia CBC routine.
2006-12-02 11:52:50 +00:00
Andy Polyakov
9f8cfb1c62
Improve Camellia code readability.
2006-12-02 11:12:13 +00:00
Andy Polyakov
c163b5f7a0
Fix bugs in Camellia CBC routine.
2006-12-02 10:56:45 +00:00
Andy Polyakov
20da8b8f90
Camellia portability fixes.
...
Submitted by: Masashi Fujita, NTT
2006-12-02 10:38:40 +00:00
Nils Larsch
ae93dc13ab
add support for whirlpool in apps/speed
...
PR: 1338
Submitted by: justin@soze.net
2006-12-01 21:42:55 +00:00
Dr. Stephen Henson
77e87e6148
Fix default dependency flags.
2006-11-30 13:55:30 +00:00
Dr. Stephen Henson
a6e700e665
Import ordinals from 0.9.8 and update.
2006-11-30 13:47:22 +00:00
Dr. Stephen Henson
4d7aff707e
Update dependencies.
2006-11-30 13:41:47 +00:00
Dr. Stephen Henson
d137b56a5b
Win32 fixes from stable branch.
2006-11-30 13:39:34 +00:00
Nils Larsch
7806f3dd4b
replace macros with functions
...
Submitted by: Tracy Camp <tracyx.e.camp@intel.com >
2006-11-29 20:54:57 +00:00
Bodo Möller
1e24b3a09e
fix support for receiving fragmented handshake messages
2006-11-29 14:45:50 +00:00
Andy Polyakov
73b979e601
Clarify HAL SPARC64 support situation in sparcv9a-mont.pl.
2006-11-28 11:07:36 +00:00
Andy Polyakov
ebae8092cb
Minor optimizations based on intruction level profiler feedback.
2006-11-28 10:34:51 +00:00
Andy Polyakov
2e21922eb6
Modulo-schedule loops in sparcv9a-mont.pl. Overall improvement factor
...
over 0.9.8 is up to 3x on USI&II cores and up to 80% - on USIII&IV.
2006-11-28 07:24:26 +00:00
Andy Polyakov
1c3d2b94be
This is "informational" commit. Its mere purpose is to expose "modulo
...
factor" in inner loops.
2006-11-28 07:20:36 +00:00
Andy Polyakov
48d2335d73
Non-SSE2 path to bn_mul_mont. But it's disabled, because it currently
...
doesn't give performance improvement.
2006-11-27 14:59:35 +00:00
Ben Laurie
96ea4ae91c
Add RFC 3779 support.
2006-11-27 14:18:05 +00:00
Andy Polyakov
7af5726108
sha512-ppc.pl mutli-thread safety fix.
2006-11-27 13:11:15 +00:00
Nils Larsch
69d4646f4e
register the engine as default engine in ENGINE_set_default()
...
PR: 1431
2006-11-24 18:37:43 +00:00
Dr. Stephen Henson
8bd11f3ec2
Add .cvsignore
2006-11-21 21:37:41 +00:00
Dr. Stephen Henson
47a9d527ab
Update from 0.9.8 stable. Eliminate duplicate error codes.
2006-11-21 21:29:44 +00:00
Ulf Möller
d9907c972b
wording (can't really call shared libs experimental after several years in the major Linux distributions)
2006-11-21 20:51:25 +00:00
Dr. Stephen Henson
1444bfb2c8
Update ordinals.
2006-11-16 00:56:01 +00:00
Dr. Stephen Henson
14975faa60
Remove illegal IMPLEMENT macros from header file.
2006-11-16 00:55:33 +00:00
Dr. Stephen Henson
3f12464861
Remove redundant PREDECLARE statement.
2006-11-16 00:52:49 +00:00
Dr. Stephen Henson
de12116417
Initial, incomplete support for typesafe macros without using function
...
casts.
2006-11-16 00:19:39 +00:00
Dr. Stephen Henson
28b987aec9
Don't assume requestorName is present for signed requests. ASN1 OCSP module
...
fix: certs field is OPTIONAL.
2006-11-13 13:21:47 +00:00
Dr. Stephen Henson
fb596f3bb7
OCSP library tidy. Use extension to encode OCSP extensions instead of doing
...
it manually. Make OCSP_CERTID_dup() a real function instead of a macro.
2006-11-13 13:18:28 +00:00
Ben Laurie
84948b39df
Fix various warnings.
2006-11-08 09:45:12 +00:00
Dr. Stephen Henson
cf32ad7fe3
Make TSA tests use the noprompt mode of utilities rather than piping
...
the result into interative utilities.
2006-11-07 16:21:16 +00:00
Dr. Stephen Henson
ad0e439604
Avoid shadow warning.
2006-11-07 16:20:14 +00:00
Dr. Stephen Henson
5456583294
Don't add the TS EKU by default in openssl.cnf because it then
...
makes certificates genereated by ca, CA.pl etc useless for anything else.
2006-11-07 14:27:55 +00:00
Dr. Stephen Henson
f1845cbee8
Typo.
2006-11-07 13:46:37 +00:00
Dr. Stephen Henson
51cc37b69d
Fix link for ASN1_generate_nconf
2006-11-07 13:44:03 +00:00
Dr. Stephen Henson
ff1b10dca1
Typo.
2006-11-07 13:17:02 +00:00
Dr. Stephen Henson
ebeb17e2e0
Add v3 ref to see also sections.
2006-11-07 13:13:14 +00:00
Dr. Stephen Henson
137de5b157
Add documentetion for noCheck extension and add a few cross references to
...
the extension documentation.
2006-11-07 12:51:27 +00:00
Nils Larsch
224328e404
fix warning
2006-11-06 20:10:44 +00:00
Nils Larsch
1611b9ed80
remove SSLEAY_MACROS code
2006-11-06 19:53:39 +00:00
Nils Larsch
8a4af56fc6
update md docs
2006-10-27 21:58:09 +00:00
Nils Larsch
05cfe06607
fix OPENSSL_NO_foo defines
2006-10-27 21:25:53 +00:00
Dr. Stephen Henson
b37a68cc8f
Initialize old_priv_encode, old_priv_decode.
2006-10-27 11:43:27 +00:00
Andy Polyakov
a2688c872d
Minor portability update to c_rehash.
2006-10-26 10:52:12 +00:00
Andy Polyakov
5b50f99e1e
Further mingw build procedure updates.
2006-10-24 22:14:20 +00:00
Andy Polyakov
b8994b6130
Harmonize dll naming in mingw builds.
2006-10-23 11:54:18 +00:00
Andy Polyakov
d7917c584a
Yet another mingw warning.
2006-10-23 07:45:52 +00:00
Andy Polyakov
544d845585
OPENSSL_ia32cap.pod update.
2006-10-23 07:44:51 +00:00
Andy Polyakov
a6efc2d1b8
Fix mingw warnings.
2006-10-23 07:41:05 +00:00
Andy Polyakov
3189772e07
Switch Win32/64 targets to Winsock2. Updates to ISNTALL.W32 cover even
...
recent mingw modifications.
2006-10-23 07:38:30 +00:00
Andy Polyakov
08a638237d
Allow for mingw cross-compile configuration.
2006-10-23 07:30:19 +00:00
Andy Polyakov
d8cdd1567f
Make c_rehash more platform neutral and make it work in mixed environment,
...
such as MSYS with "native" Win32 perl.
2006-10-21 16:28:03 +00:00
Andy Polyakov
cbfb39d1be
Rudimentary support for cross-compiling.
2006-10-21 13:38:16 +00:00
Andy Polyakov
a4d64c7f49
Align data payload for better performance.
2006-10-20 11:26:00 +00:00
Andy Polyakov
1e7b6c029c
Avoid application relink on every make invocation.
2006-10-20 11:23:35 +00:00
Andy Polyakov
3634d7e97a
Gcc over-optimizes PadLock AES CFB codepath, tell it not to.
2006-10-19 20:55:05 +00:00
Andy Polyakov
53d7efea76
Temporary fix for sha256 IA64 assembler.
2006-10-18 09:42:56 +00:00
Andy Polyakov
002684d693
Fix bug in big-endian path and optimize it for size.
2006-10-18 08:15:16 +00:00
Andy Polyakov
c038b8aa56
Typo in perlasm/x86asm.pl.
2006-10-17 16:21:28 +00:00
Andy Polyakov
c5f17d45c1
Further synchronizations with md32_common.h update, consistent naming
...
for low-level SHA block routines.
2006-10-17 16:13:18 +00:00
Andy Polyakov
31439046e0
bn/asm/ppc.pl to use ppc-xlate.pl.
2006-10-17 14:37:07 +00:00
Andy Polyakov
11d0ebc841
Further synchronizations with md32_common.h update.
2006-10-17 13:38:10 +00:00
Andy Polyakov
cecfdbf72d
VIA-specific Montgomery multiplication routine.
2006-10-17 07:04:48 +00:00
Andy Polyakov
f0f61f6d0d
Synchronize SHA1 assembler with md32_common.h update.
2006-10-17 07:00:23 +00:00
Andy Polyakov
d68ff71004
Support for .asciz directive in perlasm modules.
2006-10-17 06:43:11 +00:00
Andy Polyakov
591e85e928
Linking errors on IA64 and typo in aes-ia64.S.
2006-10-17 06:41:27 +00:00
Andy Polyakov
c69ed6ea39
Re-implement md32_common.h [make it simpler!] and eliminate code rendered
...
redundant as result.
2006-10-11 11:55:11 +00:00
Dr. Stephen Henson
55a08fac68
Typo.
2006-10-05 21:59:50 +00:00
Nils Larsch
2fc281d01f
return an error if the supplied precomputed values lead to an invalid signature
2006-10-04 19:37:17 +00:00
Bodo Möller
d326582cab
ASN1_item_verify needs to initialize ctx before any "goto err" can
...
happen; the new code for the OID cross reference table failed to do so.
2006-10-04 06:14:36 +00:00
Dr. Stephen Henson
f4c630abb3
Place standard CRL behaviour in default X509_CRL_METHOD new functions to
...
create, free and set default CRL method.
2006-10-03 02:47:59 +00:00
Mark J. Cox
c2cccfc585
Initialise ctx to NULL to avoid uninitialized free, noticed by
...
Steve Kiernan
2006-09-29 08:21:41 +00:00
Bodo Möller
3c5406b35c
All 0.9.8d patches have been applied to HEAD now, so we no longer need
...
the redundant entries under the 0.9.9 heading.
2006-09-28 13:50:41 +00:00
Bodo Möller
5e3225cc44
Introduce limits to prevent malicious keys being able to
...
cause a denial of service. (CVE-2006-2940)
[Steve Henson, Bodo Moeller]
2006-09-28 13:45:34 +00:00
Bodo Möller
61118caa86
include 0.9.8d and 0.9.7l information
2006-09-28 13:35:01 +00:00
Mark J. Cox
348be7ec60
Fix ASN.1 parsing of certain invalid structures that can result
...
in a denial of service. (CVE-2006-2937) [Steve Henson]
2006-09-28 13:20:44 +00:00
Mark J. Cox
3ff55e9680
Fix buffer overflow in SSL_get_shared_ciphers() function.
...
(CVE-2006-3738) [Tavis Ormandy and Will Drewry, Google Security Team]
Fix SSL client code which could crash if connecting to a
malicious SSLv2 server. (CVE-2006-4343)
[Tavis Ormandy and Will Drewry, Google Security Team]
2006-09-28 13:18:43 +00:00
Richard Levitte
cbb92dfaf0
Fixes for the following claims:
...
1) Certificate Message with no certs
OpenSSL implementation sends the Certificate message during SSL
handshake, however as per the specification, these have been omitted.
-- RFC 2712 --
CertificateRequest, and the ServerKeyExchange shown in Figure 1
will be omitted since authentication and the establishment of a
master secret will be done using the client's Kerberos credentials
for the TLS server. The client's certificate will be omitted for
the same reason.
-- RFC 2712 --
3) Pre-master secret Protocol version
The pre-master secret generated by OpenSSL does not have the correct
client version.
RFC 2712 says, if the Kerberos option is selected, the pre-master
secret structure is the same as that used in the RSA case.
TLS specification defines pre-master secret as:
struct {
ProtocolVersion client_version;
opaque random[46];
} PreMasterSecret;
where client_version is the latest protocol version supported by the
client
The pre-master secret generated by OpenSSL does not have the correct
client version. The implementation does not update the first 2 bytes
of random secret for Kerberos Cipher suites. At the server-end, the
client version from the pre-master secret is not validated.
PR: 1336
2006-09-28 12:22:58 +00:00
Dr. Stephen Henson
019bfef899
Initialize new callbacks and make sure hent is always initialized.
2006-09-26 13:25:19 +00:00
Richard Levitte
0709249f4c
Complete the change for VMS.
2006-09-25 08:35:35 +00:00
Dr. Stephen Henson
89c9c66736
Submitted by: Brad Spencer <spencer@jacknife.org>
...
Reviewed by: steve
2006-09-23 17:29:49 +00:00
Dr. Stephen Henson
347ed3b93c
Buffer size handling fix for enc.
...
PR:1374
2006-09-22 17:14:22 +00:00
Dr. Stephen Henson
5b73c3609b
Using correct lock for X509_REQ.
...
PR:1348
2006-09-22 17:06:09 +00:00
Dr. Stephen Henson
eebeb52b29
Update length if copying MSB set in asn1_string_canon().
2006-09-22 13:37:15 +00:00
Dr. Stephen Henson
6ec6cfc767
Updated file.
2006-09-21 16:19:10 +00:00
Dr. Stephen Henson
44181ea836
Add missing prototype. Fix various warnings (C++ comments, ; outside function).
2006-09-21 13:24:46 +00:00
Dr. Stephen Henson
c80c7bf999
Make int_rsa_sign function match prototype.
...
PR: 1383
2006-09-21 13:11:24 +00:00
Dr. Stephen Henson
ffa5ebf3f4
Compile in gost engine.
2006-09-21 13:07:57 +00:00
Dr. Stephen Henson
926c41bd29
Updated version of gost engine.
2006-09-21 13:04:43 +00:00
Dr. Stephen Henson
1182301ca7
Do CRL method init after other operations.
2006-09-21 12:48:56 +00:00
Dr. Stephen Henson
010fa0b331
Tidy up CRL handling by checking for critical extensions when it is
...
loaded. Add new function X509_CRL_get0_by_serial() to lookup a revoked
entry to avoid the need to access the structure directly.
Add new X509_CRL_METHOD to allow common CRL operations (verify, lookup) to be
redirected.
2006-09-21 12:42:15 +00:00
Andy Polyakov
4ca7d975af
Build error on non-unix.
...
PR: 1390
2006-09-18 19:50:54 +00:00
Andy Polyakov
b774111020
Race condition in ms/uplink.c.
...
PR: 1382
2006-09-18 19:41:37 +00:00
Andy Polyakov
78260d890b
As x86ms.pl is out, remove do_masm.bat and mention to it in INSTALL.W32.
2006-09-18 19:20:43 +00:00
Andy Polyakov
4b67fefe5a
Remove x86ms.pl and reimplement x86*.pl.
2006-09-18 19:17:09 +00:00
Andy Polyakov
3a8012cbf2
Improve 386 portability of aes-586.pl.
2006-09-18 19:13:15 +00:00
Bodo Möller
a53cdc5b08
Ensure that the addition mods[i]+delta cannot overflow in probable_prime().
...
[Problem pointed out by Adam Young <adamy (at) acm.org>]
2006-09-18 14:00:49 +00:00
Dr. Stephen Henson
5d20c4fb35
Overhaul of by_dir code to handle dynamic loading of CRLs.
2006-09-17 17:16:28 +00:00
Dr. Stephen Henson
a04549cc75
GOST public key algorithm ENGINE donated to the OpenSSL by Cryptocom.
...
Very early version, doesn't do much yet, not even added to the build system.
2006-09-17 13:00:18 +00:00
Dr. Stephen Henson
bc7535bc7f
Support for AKID in CRLs and partial support for IDP. Overhaul of CRL
...
handling to support this.
2006-09-14 17:25:02 +00:00
Dr. Stephen Henson
83357f047d
Update docs.
2006-09-13 03:28:42 +00:00
Bodo Möller
b6699c3f07
Update
2006-09-12 14:42:19 +00:00
Dr. Stephen Henson
016bc5ceb3
Fixes for new CRL/cert callbacks. Update CRL processing code to use new
...
callbacks.
2006-09-11 13:00:52 +00:00
Bodo Möller
ed65f7dc34
ensure that ciphersuite strings such as "RC4-MD5" match the SSL 2.0
...
ciphersuite as well
2006-09-11 09:49:03 +00:00
Dr. Stephen Henson
4d50a2b4d6
Add verify callback functions to lookup a STACK of matching certs or CRLs
...
based on subject name.
New thread safe functions to retrieve matching STACK from X509_STORE.
Cache some IDP components.
2006-09-10 12:38:37 +00:00
Bodo Möller
7f4301668f
Make sure the int_rsa_verify() prototype matches the implementation
...
(m_len currently is 'unsigned int', not 'size_t')
Submitted by: Gisle Vanem
2006-09-08 06:00:40 +00:00
Dr. Stephen Henson
29a1bb07e5
Additional detail.
2006-09-06 11:59:04 +00:00
Bodo Möller
99e9a90081
update information on "current version" ...
2006-09-06 11:54:19 +00:00
Dr. Stephen Henson
715020e334
Add an FAQ.
2006-09-06 11:53:50 +00:00
Bodo Möller
2952886010
Remove non-functional part of recent patch, after discussion with
...
Colin Percival (this would have caused more problems than solved,
and isn't really necessary anyway)
2006-09-06 06:43:11 +00:00
Bodo Möller
613e7d2a65
Make consistent with 0.9.8-branch version of this file
2006-09-06 06:42:11 +00:00
Bodo Möller
6a2c471077
Every change so far that is in the 0.9.8 branch is (or should be) in HEAD
2006-09-06 06:34:52 +00:00
Mark J. Cox
b79aa05e3b
Avoid PKCS #1 v1.5 signature attack discovered by Daniel Bleichenbacher
...
(CVE-2006-4339)
Submitted by: Ben Laurie, Google Security Team
Reviewed by: bmoeller, mjc, shenson
2006-09-05 08:58:03 +00:00
Andy Polyakov
500b5a181d
Rewrite sha1-586.pl.
2006-08-31 21:27:30 +00:00
Andy Polyakov
2b8a5406f9
Fix bug in aes-586.pl.
2006-08-31 21:15:38 +00:00
Andy Polyakov
2f35ae90fe
Fix bug in x86unix.pl introduced in latest update.
...
PR: 1380
2006-08-31 21:12:17 +00:00
Dr. Stephen Henson
0fca32a7aa
Kill more C++ comments.
2006-08-31 21:01:15 +00:00
Dr. Stephen Henson
02c9b66a6c
Fix C++ style comments, change assert to OPENSSL_assert, stop warning with
...
pedantic mode.
2006-08-31 20:56:20 +00:00
Dr. Stephen Henson
539d4c1030
Fix leak
2006-08-31 20:10:37 +00:00
Ben Laurie
aa6d1a0c19
Forward port of IGE mode.
2006-08-31 14:04:04 +00:00
Ben Laurie
777c47acbe
Make things static that should be. Declare stuff in headers that should be.
...
Fix warnings.
2006-08-28 17:01:04 +00:00
Richard Levitte
5776c3c4c6
According to documentation, including time.h declares select() on
...
OpenVMS, and possibly more.
Ref: http://h71000.www7.hp.com/doc/82final/6529/6529pro_019.html#r_select
2006-08-20 05:54:35 +00:00
Richard Levitte
0c3d346cb7
Correct warnings about signedness.
2006-08-20 05:18:12 +00:00
Ulf Möller
1c23bc5670
Use gmtime on cygwin
...
Submitted by: Corinna Vinschen
2006-08-13 09:03:38 +00:00
Andy Polyakov
8ea975d070
+20% tune-up for Power5.
2006-08-09 15:40:30 +00:00
Andy Polyakov
6c69aa532e
Revised AES_cbc_encrypt in x86 assembler module.
2006-08-07 09:05:52 +00:00
Ulf Möller
6264c9b2a9
Correct punctuation.
...
PR: 1367
2006-08-05 20:45:06 +00:00
Andy Polyakov
fc92414273
Agressively prefetch S-box in SSE codepatch, relax alignment requirement,
...
check for SSE bit instead of MMX, as pshufw was introduces in PIII, minor
optimization, typos...
2006-08-02 22:38:16 +00:00
Andy Polyakov
53154d71c3
Switch to compact S-box when generating AES key schedule.
2006-08-02 07:46:56 +00:00
Andy Polyakov
8cebec9802
Switch to compact S-box when generating AES key schedule.
2006-08-01 22:10:39 +00:00
Andy Polyakov
0209d1605d
Real Bourne shell doesn't interpret ==, but =.
2006-08-01 16:12:10 +00:00
Andy Polyakov
c8a0d0aaf9
Engage assembler in solaris64-x86_64-cc.
2006-07-31 22:28:40 +00:00
Andy Polyakov
0cc46efa09
perlasm/x86unix.pl update.
2006-07-31 22:26:40 +00:00
Andy Polyakov
22c268e6c9
Next generation aes-586.pl featuring AES_[en|de]crypt, accessing exclusively
...
256 byte S-box. AES_cbc_encrypt needs further work as it should also use
slow routines when processing smaller amount of data.
2006-07-31 20:03:56 +00:00
Bodo Möller
dd0514e2cc
Camellia IPR information
2006-07-31 11:50:01 +00:00
Dr. Stephen Henson
f6e7d01450
Support for multiple CRLs with same issuer name in X509_STORE. Modify
...
verify logic to try to use an unexpired CRL if possible.
2006-07-25 17:39:38 +00:00
Dr. Stephen Henson
edc540211c
Cache some CRL related extensions.
2006-07-24 12:39:22 +00:00
Dr. Stephen Henson
2eed3a3cc8
Avoid warning.
2006-07-21 22:46:19 +00:00
Dr. Stephen Henson
1aa44cc797
Avoid WIN32 warning.
2006-07-21 22:28:48 +00:00
Dr. Stephen Henson
37c8fd0eba
Avoid warnings.
2006-07-21 22:26:31 +00:00
Dr. Stephen Henson
786aa98da1
Use correct pointer types for various functions.
2006-07-20 16:56:47 +00:00
Bodo Möller
413e0853d7
New Camellia implementation (replacing previous version)
...
Submitted by: NTT
2006-07-19 13:38:26 +00:00
Bodo Möller
8e4560c42f
Camellia information
2006-07-19 13:36:40 +00:00
Dr. Stephen Henson
450ea83495
Store canonical encodings of Name structures. Update X509_NAME_cmp() to use
...
them.
2006-07-18 12:36:19 +00:00
Andy Polyakov
af8c1d81a3
Reimplement outer rounds as "compact" in x86 assembler. This has rather
...
strong impact on decrypt performance, 20-25%. One probably should consider
switching between slower and faster routines depending on how much data
we were asked to process.
2006-07-18 10:05:38 +00:00
Dr. Stephen Henson
b589427941
WIN32 fixes signed/unsigned issues and slightly socket semantics.
2006-07-17 18:52:51 +00:00
Dr. Stephen Henson
f0fa285f75
Update .cvsignore again.
2006-07-17 16:42:06 +00:00
Dr. Stephen Henson
a0b5b07010
Update .cvsignore
2006-07-17 16:40:20 +00:00
Dr. Stephen Henson
5c95c2ac23
Fix various error codes to match functions.
2006-07-17 16:33:31 +00:00
Dr. Stephen Henson
454dbbc593
Add -timeout option to ocsp utility.
2006-07-17 13:26:54 +00:00
Dr. Stephen Henson
c1c6c0bf45
New non-blocking OCSP functionality.
2006-07-17 12:18:28 +00:00
Andy Polyakov
dff2922aa7
Add option for "compact" rounds to aes_x86core.c. "Compact" rounds are
...
those referencing compact, 256-byte, S-boxes.
2006-07-14 09:57:55 +00:00
Dr. Stephen Henson
f253a058d3
There is should be no need to rewind the input stream any more.
...
For S/MIME multipart/signed type the signature is calculated on the fly.
For other detached data forms the stream isn't used after the single pass to
calculate signatures.
For non-detached the data is stored in a memory BIO.
2006-07-13 20:29:55 +00:00
Dr. Stephen Henson
b3c6a33185
In genpkey, also look for algorithm string name in any supplied ENGINE.
2006-07-12 18:00:20 +00:00
Dr. Stephen Henson
31780d0e26
Bugfix: don't look in internal table for signature if found in application
...
supplied list.
2006-07-12 16:30:40 +00:00
Dr. Stephen Henson
f489ab3147
Typo.
2006-07-12 13:28:44 +00:00
Dr. Stephen Henson
29cf84c692
New docs for EVP_Digest{Sign,Verify}*() function. Update existing docs.
2006-07-12 12:31:30 +00:00
Dr. Stephen Henson
e454929558
Add docs for pkeyparam. Update some existing docs.
2006-07-10 23:10:26 +00:00
Dr. Stephen Henson
105f6a6323
Update some usage messages.
2006-07-10 22:49:08 +00:00
Dr. Stephen Henson
8845701719
make update
2006-07-10 18:40:42 +00:00
Dr. Stephen Henson
b7683e3a5d
Allow digests to supply S/MIME micalg values from a ctrl.
...
Send ctrls to EVP_PKEY_METHOD during signing of PKCS7 structure so
customisation is possible.
2006-07-10 18:36:55 +00:00
Dr. Stephen Henson
0ee2166cc5
New functions to add and free up application defined signature OIDs.
2006-07-09 16:05:43 +00:00
Dr. Stephen Henson
067707e367
Set detached flag in PKCS7 structure earlier to avoid eating up memory.
...
PR: 1071
2006-07-09 12:02:08 +00:00
Dr. Stephen Henson
8211a33c7f
Public key comparison and printing routine functions.
2006-07-09 11:26:13 +00:00
Dr. Stephen Henson
7441052be6
EVP_PKEY_get_default_digest() manual page.
2006-07-09 11:01:49 +00:00
Dr. Stephen Henson
90ccf05f82
EVP_PKEY_CTX_ctrl() docs.
2006-07-09 10:51:03 +00:00
Dr. Stephen Henson
112161bd33
Update docs.
2006-07-09 01:59:30 +00:00
Dr. Stephen Henson
5ba4bf35c5
New functions to enumerate digests and ciphers.
2006-07-09 00:53:45 +00:00
Dr. Stephen Henson
aa93b18c2c
Keygen docs.
2006-07-08 21:42:49 +00:00
Dr. Stephen Henson
ba702545fc
EVP_PKEY_derive() docs.
2006-07-08 12:47:52 +00:00
Dr. Stephen Henson
436369100d
Add some examples.
2006-07-08 12:46:51 +00:00
Dr. Stephen Henson
6535bd42e6
EVP_PKEY_verify() docs.
2006-07-08 11:22:23 +00:00
Dr. Stephen Henson
64cee65ebc
New docs.
2006-07-08 11:13:01 +00:00
Dr. Stephen Henson
ba544377fb
Update docs.
2006-07-08 10:55:03 +00:00
Dr. Stephen Henson
5165148f72
Add some EVP_PKEY_METHOD docs.
2006-07-08 10:45:08 +00:00
Dr. Stephen Henson
8d970ca70b
Update docs with algorithm options.
2006-07-08 10:01:33 +00:00
Dr. Stephen Henson
383b8b8ca9
Typo.
2006-07-08 00:50:25 +00:00
Dr. Stephen Henson
5ce60a20f2
Initial docs for pkeyutl.
2006-07-08 00:47:04 +00:00
Dr. Stephen Henson
49131a7d94
Docs for new utilities.
2006-07-08 00:24:47 +00:00
Dr. Stephen Henson
d884c5bad1
Add documentation for new smime options.
2006-07-07 21:44:23 +00:00
Andy Polyakov
86bdc0a3ee
Fix compiler warnings.
2006-07-04 20:29:50 +00:00
Andy Polyakov
1a4e245f3e
Unsigned vs signed comparison warning.
2006-07-04 20:29:14 +00:00
Andy Polyakov
975efcbaee
Typos(?) in HEAD/crypto/evp/p_lib.c.
2006-07-04 20:27:44 +00:00
Dr. Stephen Henson
90e1b1fd7d
dsa_pub_cmp() doesn't need to check parameters because that is done in
...
EVP_PKEY_cmp().
2006-07-02 21:13:39 +00:00
Dr. Stephen Henson
86207c1960
Make return value from EVP_PKEY_cmp() and EVP_PKEY_cmp_parameters() consistent.
2006-07-02 21:12:40 +00:00
Andy Polyakov
9c62bca11a
Prepare playground for AES experimental code.
2006-07-02 09:18:00 +00:00
Bodo Möller
75d61b33bc
documentation for "HIGH" vs. "MEDIUM" was not up-to-date
2006-06-30 22:00:13 +00:00
Bodo Möller
3df760b83a
use <poll.h> as by Single Unix Specification
2006-06-30 08:14:39 +00:00
Bodo Möller
e34aa5a3b3
always read in RAND_poll() if we can't use select because of a too
...
large FD: it's non-blocking mode anyway
2006-06-28 14:50:12 +00:00
Andy Polyakov
985e4c4154
Mitigate the hazard of cache-collision timing attack on last round. The
...
only chance for T[ed]4 to get evicted in this module is when its cache
"overlaps" with last 128 bits of key schedule.
2006-06-28 08:52:16 +00:00
Andy Polyakov
9598fa8759
Mitigate the hazard of cache-collision timing attack on last round. Well,
...
prefetch could have been moved closer to Td4 references. Something for
later consideration...
2006-06-28 08:48:54 +00:00
Andy Polyakov
ac8173515a
Mitigate cache-collision timing attack on last round.
2006-06-28 08:39:06 +00:00
Dr. Stephen Henson
944f858021
Fix EVP_PKEY_CTX_dup() to return correct value and handle NULL keys in
...
the source.
2006-06-27 17:23:24 +00:00
Richard Levitte
27a3d9f9aa
Use poll() when possible to gather Unix randomness entropy
2006-06-27 06:31:34 +00:00
Bodo Möller
48fc582f66
New functions CRYPTO_set_idptr_callback(),
...
CRYPTO_get_idptr_callback(), CRYPTO_thread_idptr() for a 'void *' type
thread ID, since the 'unsigned long' type of the existing thread ID
does not always work well.
2006-06-23 15:21:36 +00:00
Bodo Möller
81de1028bc
Change in 0.9.8 branch:
...
Put ECCdraft ciphersuites back into default build (but disabled
unless specifically requested)
2006-06-22 12:37:28 +00:00
Bodo Möller
850815cb6e
Remove ECC ciphersuites from 0.9.8 branch (should use 0.9.9 branch)
2006-06-20 08:50:42 +00:00
Bodo Möller
c4e7870ac1
Change array representation of binary polynomials to make GF2m part of
...
the BN library more generally useful.
Submitted by: Douglas Stebila
2006-06-18 22:00:57 +00:00
Bodo Möller
4584eccea0
another thread-safety fix
2006-06-16 01:00:47 +00:00
Bodo Möller
ed3ecd801e
Error messages for client ECC cert verification.
...
Also, change the default ciphersuite to give some prefererence to
ciphersuites with forwared secrecy (rather than using a random order).
2006-06-15 19:58:22 +00:00
Bodo Möller
b166f13eb5
Call 'print_stuff' even if a handshake failed.
2006-06-15 19:00:34 +00:00
Bodo Möller
076944d920
Fix algorithm handling for ECC ciphersuites: Adapt to recent changes,
...
and allow more general RSA OIDs for ECC certs with RSA CA sig.
2006-06-15 18:28:00 +00:00
Bodo Möller
09e20e0bd8
Fix another new bug in the cipherstring logic.
2006-06-15 17:17:06 +00:00
Bodo Möller
a717831da4
Fix another bug introduced yesterday when deleting Fortezza stuff:
...
make sure 'mask' is initialized in ssl_cipher_get_disabled().
Also simplify code by removing some unused arguments in static functions.
2006-06-15 16:54:20 +00:00
Bodo Möller
4dfc8f1f0b
Oops ... deleted too much in the previous commit when I deleted
...
the Fortezza stuff
2006-06-15 16:07:10 +00:00
Bodo Möller
5b57fe0a1e
Disable invalid ciphersuites
2006-06-14 17:51:46 +00:00
Bodo Möller
89bbe14c50
Ciphersuite string bugfixes, and ECC-related (re-)definitions.
2006-06-14 17:40:31 +00:00
Bodo Möller
6635b48cd1
Make sure that AES ciphersuites get priority over Camellia
...
ciphersuites in the default cipher string.
2006-06-14 13:58:48 +00:00
Bodo Möller
675f605d44
Thread-safety fixes
2006-06-14 08:55:23 +00:00
Bodo Möller
6a983d4287
Fix a bug recently introduced when updating this file to use the new
...
keygen API: make sure that 'pkey_type' is actually visible to MAIN().
2006-06-14 01:16:22 +00:00
Richard Levitte
1a159e08af
Keep synchronised with Unix
2006-06-12 06:46:18 +00:00
Bodo Möller
dd030860c4
Camellia cipher, contributed by NTT
...
Submitted by: Masashi Fujita
Reviewed by: Bodo Moeller
2006-06-11 01:09:07 +00:00
Richard Levitte
2d09372434
Keep synchronised with the Unix build
2006-06-10 05:38:23 +00:00
Bodo Möller
67912e0032
Camellia cipher, contributed by NTT
...
Submitted by: Masashi Fujita
Reviewed by: Bodo Moeller
2006-06-09 22:29:40 +00:00
Bodo Möller
f3dea9a595
Camellia cipher, contributed by NTT
...
Submitted by: Masashi Fujita
Reviewed by: Bodo Moeller
2006-06-09 15:44:59 +00:00
Dr. Stephen Henson
fb7b393278
Output MIME parameter micalg according to RFC3851 and RFC4490 instead of hard
...
coding it to "sha1".
2006-06-06 13:27:36 +00:00
Dr. Stephen Henson
61e5ec4b1e
Add AES and GOST S/MIME capabilities if algorithms are supported.
2006-06-06 12:35:05 +00:00
Andy Polyakov
6f344eab03
Fix obvious typo.
2006-06-05 16:04:09 +00:00
Dr. Stephen Henson
41eacc84a0
Clarify comment and add #ifdef.
2006-06-05 12:38:22 +00:00
Dr. Stephen Henson
01b8b3c7d2
Complete EVP_PKEY_ASN1_METHOD ENGINE support.
2006-06-05 11:52:46 +00:00
Andy Polyakov
8fecd4b4f1
Sync aes.h with http://cvs.openssl.org/chngview?cn=15336 .
2006-06-05 10:43:41 +00:00
Andy Polyakov
41fc5f2dbe
Reimplement AES_ofb128_encrypt.
2006-06-05 10:40:54 +00:00
Andy Polyakov
bcfd3d68f5
Correct logical error in STRICT_ALIGNMENT check and remove copy of
...
eay licence, as module is practically rewritten from scratch [well,
even original submission was obviously "almost, but not quite,
entirely unlike" any other eay *_cfb.c module, not to mention new
functions].
2006-06-05 10:40:28 +00:00
Andy Polyakov
d3a6461d71
Minor ppc-xlate.pl update.
2006-06-05 09:42:31 +00:00
Andy Polyakov
17478fdede
Add sha512-ppc.pl module.
2006-06-05 09:37:55 +00:00
Andy Polyakov
4dca00cec8
Minor sha1-ppc.pl update.
2006-06-05 09:35:50 +00:00
Richard Levitte
061d774b99
A few more ENGINE strings that need shortening.
2006-06-04 08:22:25 +00:00
Richard Levitte
20469da285
Synchronise with Unix
2006-06-03 02:17:49 +00:00
Dr. Stephen Henson
e18e3eba76
Make update.
2006-06-02 17:54:47 +00:00
Dr. Stephen Henson
de9fcfe348
Initial public key ASN1 method engine support. Not integrated yet.
2006-06-02 17:52:27 +00:00
Dr. Stephen Henson
7e5b06813d
Automatically free up dynamically allocated public key methods when
...
and ENGINE is destroyed.
2006-06-02 17:09:17 +00:00
Dr. Stephen Henson
1892c8bf97
Extend default method string to include public key methods.
...
Add missing prototypes.
Fix engine method lookup.
2006-06-02 13:09:59 +00:00
Dr. Stephen Henson
5e428e7d0d
Typo.
2006-06-02 12:37:02 +00:00
Dr. Stephen Henson
c9777d2659
Add ENGINE support for EVP_PKEY_METHOD including lookups of ENGINE
...
implementations and functional reference counting when a context
is allocated, free or copied.
2006-06-02 12:33:39 +00:00
Richard Levitte
3aedd213a9
Synchronise with the Unixly build.
2006-06-01 12:50:56 +00:00
Dr. Stephen Henson
e0c1ea9038
Fix error code. make update
2006-06-01 12:43:39 +00:00
Dr. Stephen Henson
6f88c6a634
Add missing prototype. Extend engine utility to print public key algorithms.
2006-06-01 12:38:22 +00:00
Dr. Stephen Henson
58aa573ac2
Add engine table for EVP_PKEY_METHOD. Doesn't do much yet.
2006-06-01 11:38:50 +00:00
Richard Levitte
0ed110b969
Because all object files are now in a file, we don't need to mention
...
any of them on the linker command line. Besides, OBJECT_FILE now
represents the last compiled file, and using it here only results in
getting warnings about multiple definitions of the symbols in that
file.
2006-06-01 10:24:47 +00:00
Dr. Stephen Henson
b28dea4e10
New pkey functions for keygen callbacks and retrieving operation type.
2006-05-31 17:34:14 +00:00
Andy Polyakov
21f0db692d
Tune up AES CFB. Performance improvement varies from 10% to 50% from
...
platform to platform. Its absolute value is within few percents
marginal from that of ECB.
2006-05-30 07:20:13 +00:00
Richard Levitte
4d4e08ec1c
Use a new signed int ii instead of j (which is unsigned) to handle the
...
return value from sk_SSL_CIPHER_find().
2006-05-28 19:44:27 +00:00
Richard Levitte
25074d6c22
Deal with another name that's longer than 31 characters.
2006-05-28 19:39:36 +00:00
Richard Levitte
0cfc80c4c3
rslen is unsigned, so it can never go below 0.
2006-05-28 19:36:29 +00:00
Dr. Stephen Henson
b8bb15fb51
Install openssl.cnf to OPENSSLDIR in mk1mf.pl
2006-05-28 00:49:49 +00:00
Dr. Stephen Henson
994df5a248
Flush p7bio when all data has been copied.
2006-05-26 17:14:23 +00:00
Dr. Stephen Henson
6657b9c73a
Fix warnings.
2006-05-26 13:27:58 +00:00
Dr. Stephen Henson
ba0d04a986
Update pkeyutl to use size_t for pkey functions.
2006-05-26 12:24:49 +00:00
Richard Levitte
3cb9eb30d3
Signed vs. unsigned conflict
2006-05-25 23:40:04 +00:00
Richard Levitte
e0b624e20e
There was a problem with too long command lines, so I rebuilt to make
...
it work better.
2006-05-25 23:37:03 +00:00
Dr. Stephen Henson
c27309edcb
Allow any supported cipher to be used with smime -encrypt.
2006-05-25 16:53:52 +00:00
Dr. Stephen Henson
3207e61222
Add prototypes, update Win32 ordinals.
2006-05-25 11:44:05 +00:00
Richard Levitte
3671233089
Keep in sync with Unix
2006-05-25 10:40:01 +00:00
Dr. Stephen Henson
3a828611e9
Update EVP_MD_CTX_copy_ex() to use EVP_PKEY_CTX_dup().
2006-05-25 00:55:00 +00:00
Dr. Stephen Henson
8bdcef40e4
New function to dup EVP_PKEY_CTX. This will be needed to make new signing
...
functions and EVP_MD_CTX_copy work properly.
2006-05-24 23:49:30 +00:00
Dr. Stephen Henson
91c9e62123
New functions for enchanced digest sign/verify.
2006-05-24 17:30:09 +00:00
Dr. Stephen Henson
0e3453536e
Fix warnings.
2006-05-24 13:29:32 +00:00
Dr. Stephen Henson
eaff5a1412
Use size_t for new crypto size parameters.
2006-05-24 12:33:46 +00:00
Dr. Stephen Henson
216e0d5b91
Fix smime -pk7out.
2006-05-22 13:37:16 +00:00
Dr. Stephen Henson
0965991600
Add ctrl to EVP_MD and EVP_PKEY_CTX to EVP_MD_CTX. These will be used
...
for enhanced sign/verify operations.
2006-05-22 13:01:01 +00:00
Andy Polyakov
74aa1a4378
Tiny up hpux targets.
2006-05-20 08:52:34 +00:00
Dr. Stephen Henson
5531192151
Add -resign and -md options to smime command to support resigning an
...
existing structure and using alternative digest for signing.
2006-05-18 23:44:44 +00:00
Dr. Stephen Henson
a620626a33
Code tidy.
2006-05-18 18:06:03 +00:00
Dr. Stephen Henson
f13a71c66b
Typo.
2006-05-18 17:46:56 +00:00
Dr. Stephen Henson
3ef3e07a49
make update
2006-05-18 17:22:31 +00:00
Dr. Stephen Henson
76fa8f1838
More S/MIME tidy. Place some common attribute operations in utility
...
functions.
2006-05-18 17:20:23 +00:00
Dr. Stephen Henson
f2b139ed1f
Remove old digest type hacks for non RSA keys.
2006-05-18 13:05:20 +00:00
Dr. Stephen Henson
a6e7fcd140
Multiple signer support in smime application.
2006-05-18 12:41:28 +00:00
Dr. Stephen Henson
76cf3fcb43
Reformat smime.c utility.
2006-05-18 11:54:16 +00:00
Dr. Stephen Henson
121dd39f9f
New option to pkcs12 utility to set alternative MAC digest algorithm.
2006-05-17 18:46:22 +00:00
Dr. Stephen Henson
a263253545
Don't try to print PBE information if it can't be decoded.
2006-05-17 18:24:35 +00:00
Dr. Stephen Henson
76d6ac4b06
PKCS#12 mac key length should equal digest length.
2006-05-17 18:19:51 +00:00
Dr. Stephen Henson
60f20632e2
Tidy up of S/MIME code and add new functions which will make is easier
...
to create S/MIME signed data with multiple signers.
2006-05-17 17:17:01 +00:00
Dr. Stephen Henson
ae519a247f
Extended PBES2 function supporting application supplied IV and PRF NID.
2006-05-17 12:47:17 +00:00
Dr. Stephen Henson
8de916bcee
Oops...
2006-05-17 12:29:16 +00:00
Dr. Stephen Henson
1631d5f9b9
HMAC OIDs from RFC4231.
2006-05-17 12:27:45 +00:00
Dr. Stephen Henson
98c82b899e
Gather keygen options in req and only use them after all other options have
...
been processed. This allows any ENGINE changing operations to be processed
first (for example a config file).
2006-05-16 12:11:14 +00:00
Dr. Stephen Henson
6d3a1eac3b
Add PRF preference ctrl to ciphers.
2006-05-15 18:35:13 +00:00
Dr. Stephen Henson
b8f702a0af
Change builting PBE to use static table. Add entries for HMAC and MD5, GOST.
2006-05-15 17:34:36 +00:00
Dr. Stephen Henson
43c9825c2a
Update old **EVIL** PEM_X509_INFO_read_bio() function to correctly assign
...
private keys.
FIXME: this function should really be rewritten because it is *horrible*.
2006-05-15 13:28:00 +00:00
Dr. Stephen Henson
fbf6643607
Bugfix: the NONE string for PBE algorithms wasn't working.
2006-05-15 13:23:15 +00:00
Dr. Stephen Henson
3f36baa9f4
Correctly handle missing DSA parameters.
2006-05-15 01:26:52 +00:00
Dr. Stephen Henson
b0e69a0500
Add feature to PKCS12_create() if the encryption NID corresponds to a
...
supported encryption algorithm instead of a PBE NID then use that
algorithm with PBES2.
2006-05-15 00:45:10 +00:00
Dr. Stephen Henson
856640b54f
Extend PBE code to support non default PKCS#5 v2.0 PRFs.
2006-05-14 18:40:53 +00:00
Dr. Stephen Henson
76240b3a39
Check for deprecated private key types before PKCS#8 types.
2006-05-14 18:35:42 +00:00
Dr. Stephen Henson
34b3c72e4e
Typo.
2006-05-14 16:50:22 +00:00
Ulf Möller
c264592d69
Add includes in synopsis.
...
Submitted by: Mike Frysinger <vapier@gentoo.org >
2006-05-14 11:28:00 +00:00
Dr. Stephen Henson
1bd06bd0c4
In interactive mode only config OpenSSL once.
2006-05-12 17:11:58 +00:00
Dr. Stephen Henson
9540ccdf1f
Stop warnings about deprecated -mcpu option.
2006-05-12 16:06:12 +00:00
Richard Levitte
98bf13c36b
make update
2006-05-12 15:31:28 +00:00
Richard Levitte
7e76e56387
Someone made a mistake, and some function and reason codes got
...
duplicate numbers. Renumbering.
2006-05-12 15:27:52 +00:00
Dr. Stephen Henson
759d8ac6ee
Typo.
2006-05-12 00:27:39 +00:00
Dr. Stephen Henson
959e8dfe06
Update 'req' command to use new keygen API.
2006-05-11 21:39:00 +00:00
Dr. Stephen Henson
7f57b076a6
New functions to get key types without dereferncing EVP_PKEY.
...
More error checking for RSA pmeth.
2006-05-11 21:33:00 +00:00
Dr. Stephen Henson
7144c4212a
Update PKCS#7 decrypt routines to use new API.
2006-05-08 16:38:19 +00:00
Dr. Stephen Henson
399a6f0bd1
Update PKCS#7 enveloped data to new API.
2006-05-08 12:44:25 +00:00
Dr. Stephen Henson
3d47929968
Update S/MIME code to use default digest.
2006-05-07 17:22:58 +00:00
Dr. Stephen Henson
03919683f9
Add support for default public key digest type ctrl.
2006-05-07 17:09:39 +00:00
Dr. Stephen Henson
5cda6c4582
Fix from stable branch.
2006-05-07 12:30:37 +00:00
Ulf Möller
83ed49149c
bug fix.
...
PR: 1326
Submitted by: John Skodon
2006-05-06 18:26:12 +00:00
Andy Polyakov
67d990904e
Futher minor PPC assembler update.
2006-05-04 21:30:41 +00:00
Dr. Stephen Henson
f3df90b2bb
Update from stable branch.
2006-05-04 16:32:31 +00:00
Dr. Stephen Henson
11e46bd7ae
Update FAQ.
2006-05-04 14:22:00 +00:00
Andy Polyakov
c09a0318b7
Minor PPC assembler updates.
2006-05-03 14:07:34 +00:00
Andy Polyakov
fe716ba686
PPC assembler distiller update.
2006-05-03 13:39:34 +00:00
Andy Polyakov
9a97800813
Typo in linux-ppc line.
2006-05-03 13:38:50 +00:00
Dr. Stephen Henson
e881f6175a
Update from stable branch.
2006-05-03 13:19:06 +00:00
Ulf Möller
36e77b1059
Bug fix.
...
PR: 1307
Submitted by: Oliver Tappe <zooey@hirschkaefer.de >
2006-05-01 18:49:26 +00:00
Andy Polyakov
a9c32ace06
SHA1 for PowerPC.
2006-05-01 13:35:03 +00:00
Andy Polyakov
2c5d4daac5
Yet another "teaser" Montgomery multiplication module, for PowerPC.
2006-04-30 21:15:29 +00:00
Dr. Stephen Henson
b46343583c
Update EVP_PKEY_cmp() and X509_check_private() to return sensible values and
...
handle unsupported key types.
2006-04-28 12:27:37 +00:00
Dr. Stephen Henson
816c2b5a79
Fix from stable branch.
2006-04-28 00:30:49 +00:00
Dr. Stephen Henson
a78568b7e9
Replace RSA specific PKCS7_RECIP_INFO set up with an public key algorithm
...
ctrl.
2006-04-27 18:20:34 +00:00
Dr. Stephen Henson
ee5b2a1e51
Code tidy.
2006-04-27 00:42:51 +00:00
Dr. Stephen Henson
e4b21c74fc
New function to extract AlgorithmIdentifier for PKCS7_RECIP_INFO.
2006-04-27 00:29:50 +00:00
Dr. Stephen Henson
4edcb93dca
Don't free up parameter. The public key ASN1 method can do that if it needs
...
to.
2006-04-27 00:20:43 +00:00
Dr. Stephen Henson
15f80eea31
Fix usage message for pkeyutl.
2006-04-26 15:42:29 +00:00
Dr. Stephen Henson
81cebb8b79
Add prototypes and pkey accessor function for EVP_PKEY_CTX.
2006-04-26 11:52:36 +00:00
Dr. Stephen Henson
a4e75b3dfd
Correct copyright notice... this doesn't contain any SSLeay code.
2006-04-24 00:07:26 +00:00
Dr. Stephen Henson
cddaba8ede
Add 'flags' parameter to EVP_PKEY_asn1_meth_new() to set algorithm flags.
2006-04-21 17:38:58 +00:00
Nils Larsch
49c5f38d3d
undo accidental commit
2006-04-20 13:54:34 +00:00
Nils Larsch
f8296228f1
as we encrypt every bit separately we need to loop through the number
...
of bits; thanks to Michael McDougall <mmcdouga@saul.cis.upenn.edu >
PR: 1318
2006-04-20 13:11:52 +00:00
Nils Larsch
930b0c4b8a
make local function static
2006-04-20 09:53:49 +00:00
Dr. Stephen Henson
3d153f7985
Remove dss1 hack from S/MIME code.
2006-04-19 17:47:15 +00:00
Dr. Stephen Henson
ee1d9ec019
Remove link between digests and signature algorithms.
...
Use cross reference table in ASN1_item_sign(), ASN1_item_verify() to eliminate
the need for algorithm specific code.
2006-04-19 17:05:59 +00:00
Dr. Stephen Henson
614b448a67
Remove comment from SSLeay days about EVP_PKEY_METHOD.
2006-04-19 12:16:58 +00:00
Richard Levitte
a19c9f179d
Make sure obj_xref.h is updated during a "make update"
2006-04-19 06:45:06 +00:00
Richard Levitte
a784b943c1
Synchronise with Unixly build.
...
(Geez, a lot is happening right now, eh? :-))
2006-04-19 06:44:07 +00:00
Dr. Stephen Henson
d202709808
Add OID cross reference table.
...
Fix some typos in GOST OIDs.
Update dependencies.
2006-04-18 23:36:07 +00:00
Richard Levitte
51ff0abb05
Synchronise
2006-04-17 17:19:59 +00:00
Dr. Stephen Henson
492a9e2415
Allow public key ASN1 methods to set PKCS#7 SignerInfo structures.
2006-04-17 17:12:23 +00:00
Dr. Stephen Henson
7bf7333d68
If we include winsock2.h then FD_SET wants an unsigned type for an fd.
2006-04-17 12:22:13 +00:00
Dr. Stephen Henson
c20276e4ae
Fix (most) WIN32 warnings and errors.
2006-04-17 12:08:22 +00:00
Dr. Stephen Henson
9ca7047d71
Provisional support for EC pkey method, supporting ECDH and ECDSA.
2006-04-16 16:15:59 +00:00
Andy Polyakov
ba3b2f1538
SHA-1 for x86_64.
2006-04-16 14:42:54 +00:00
Dr. Stephen Henson
b010b7c434
Use more flexible method of determining output length, by setting &outlen
...
value of the passed output buffer is NULL.
The old method of using EVP_PKEY_size(pkey) isn't flexible enough to cover all
cases where the output length may depend on the operation or the parameters
associated with it.
2006-04-15 18:50:56 +00:00
Dr. Stephen Henson
9dc17a2536
Fix from 0.9.7-stable branch.
2006-04-15 17:43:43 +00:00
Dr. Stephen Henson
5950bf7943
Revert to original...
2006-04-15 13:15:25 +00:00
Dr. Stephen Henson
4141c803d8
Oops...
2006-04-15 13:12:42 +00:00
Dr. Stephen Henson
ba1ba5f0fb
If cipher list contains a match for an explicit ciphersuite only match that
...
one suite.
2006-04-15 00:22:05 +00:00
Richard Levitte
51aa7bd321
Got sick and tired of duplicating... Too error-prone (i.e. I forget
...
to update both...)!
2006-04-14 19:56:28 +00:00
Dr. Stephen Henson
09b88a4a55
Update copyright notices on a few files where all original SSLeay code has
...
been deleted.
2006-04-14 17:36:18 +00:00
Dr. Stephen Henson
f3481ca28f
Print out zero length string properly.
2006-04-14 16:47:18 +00:00
Dr. Stephen Henson
ba30bad57b
Add functions to allow setting and adding external EVP_PKEY_METHOD.
2006-04-14 12:41:35 +00:00
Dr. Stephen Henson
ffb1ac674c
Complete key derivation support.
2006-04-13 20:16:56 +00:00
Dr. Stephen Henson
3be34589e8
Update dependencies.
2006-04-13 13:00:45 +00:00
Dr. Stephen Henson
d87e615209
Add key derivation support.
2006-04-13 12:56:41 +00:00
Dr. Stephen Henson
92511cff48
Change the option setting command line switch to "-pkeyopt" to avoid confusion
...
with algorithm parameters.
2006-04-13 12:38:46 +00:00
Richard Levitte
7b82159865
Synchronise what what's happening with the Unix build
2006-04-13 09:59:52 +00:00
Dr. Stephen Henson
52c11dce31
Typo.
2006-04-13 00:26:05 +00:00
Dr. Stephen Henson
3ba0885a3e
Extend DH ASN1 method, add DH EVP_PKEY_METHOD.
2006-04-12 23:51:24 +00:00
Dr. Stephen Henson
023c9d8dd5
Fix leak.
2006-04-12 23:38:45 +00:00
Dr. Stephen Henson
4c97a04e2e
PKCS#3 DH PKCS#8 ASN1 support.
2006-04-12 23:06:10 +00:00
Ulf Möller
fb05e1cdf6
declare as in prototype
...
Submitted by: Gisle Vanem
2006-04-12 19:24:45 +00:00
Dr. Stephen Henson
ceb4678956
Extend DH ASN1 method to support public key encode/decode and parameter
...
utilities.
2006-04-12 17:14:48 +00:00
Dr. Stephen Henson
0cb8499b73
Compare parameters when comparing public keys.
2006-04-12 17:01:19 +00:00
Dr. Stephen Henson
4d62ec32e0
Add file dso_beos.c missing from original commit.
...
PR: 1312
2006-04-12 11:46:16 +00:00
Dr. Stephen Henson
75ef718820
Support for DSA keygen, fix for genpkey.
2006-04-12 11:14:11 +00:00
Dr. Stephen Henson
c927df3fa1
Initial DSA EVP_PKEY_METHOD. Fixup some error codes.
2006-04-12 10:20:47 +00:00
Ulf Möller
4700aea951
Add BeOS support.
...
PR: 1312
Submitted by: Oliver Tappe <zooey@hirschkaefer.de >
Reviewed by: Ulf Moeller
2006-04-11 21:34:21 +00:00
Ulf Möller
60cdb821db
manual pages as HTML
...
Submitted by: Oliver Tappe <zooey@hirschkaefer.de >
2006-04-11 21:09:57 +00:00
Ulf Möller
0ef888cd3e
Use Dl_info only on systems where it is known to exist. It does not
...
exist on AIX 4.3.3, AIX 5.1, SCO 5, or Cygwin.
2006-04-11 21:00:13 +00:00
Ulf Möller
26c777d516
uncomment; that one slipped through
2006-04-11 20:09:31 +00:00
Ulf Möller
9555339007
improve make dclean to remove files generated during build
...
PR: 1308
Submitted by: Oliver Tappe <zooey@hirschkaefer.de >
Reviewed by: Ulf Moeller
2006-04-11 20:05:23 +00:00
Dr. Stephen Henson
2fbe371f53
Fix parameter error messages.
2006-04-11 18:30:25 +00:00
Dr. Stephen Henson
15181d7811
Write parameters if -genparam option include.
2006-04-11 18:21:40 +00:00
Dr. Stephen Henson
1edba2110f
Add parameter generation option to genpkey.
2006-04-11 18:18:14 +00:00
Dr. Stephen Henson
54d853ebc3
Add support for setting keybits and public exponent value for pkey RSA keygen.
2006-04-11 17:28:37 +00:00
Dr. Stephen Henson
f5cda4cbb1
Initial keygen support.
2006-04-11 13:28:52 +00:00
Dr. Stephen Henson
f9a6348a53
ctrls to set PSS salt length.
2006-04-10 12:55:04 +00:00
Dr. Stephen Henson
a7ffd9d19c
Preliminary PSS support.
2006-04-10 12:41:21 +00:00
Dr. Stephen Henson
29db322e8f
Beginnings of PSS support.
2006-04-10 11:48:35 +00:00
Richard Levitte
25dc89eb9b
Synchronise with the Unix build
2006-04-10 11:39:49 +00:00
Dr. Stephen Henson
716630c0eb
Change operation values so they can be used as a mask.
...
Fix rsa_pkey_method.
2006-04-10 11:16:11 +00:00
Dr. Stephen Henson
4f59b6587f
Implementation of pkey_rsa_verify. Some constification.
2006-04-10 01:06:17 +00:00
Dr. Stephen Henson
9befdf1d20
New utility function to reverse a buffer, either by copying or in-place.
2006-04-10 00:11:30 +00:00
Dr. Stephen Henson
75d44c0452
Store digests as EVP_MD instead of a NID.
...
Add digest size sanity checks.
2006-04-09 21:24:48 +00:00
Dr. Stephen Henson
a58a636838
Constification.
2006-04-09 20:53:19 +00:00
Dr. Stephen Henson
9fdab72dd7
Bugfix X9.31 padding.
2006-04-09 20:44:00 +00:00
Dr. Stephen Henson
b2a97be7f4
Support for digest signing and X931 in rsa_pkey_meth.
2006-04-09 19:17:25 +00:00
Dr. Stephen Henson
6471c9f478
Add checking to padding ctrl.
2006-04-09 12:53:55 +00:00
Dr. Stephen Henson
4a3dc3c0e3
Add RSA ctrl for padding mode, add ctrl support in pkeyutl.
2006-04-09 12:42:09 +00:00
Dr. Stephen Henson
a2318e86bd
Fix typo. Add EVP_PKEY_CTX control function for later use by command line
...
utilities.
2006-04-09 00:34:00 +00:00
Dr. Stephen Henson
a9164153d1
Reformat pkeyutl.c, add support for verify operation but nothing actually
...
supports it (yet).
2006-04-08 22:25:47 +00:00
Dr. Stephen Henson
8795d38906
Update dependencies.
2006-04-08 13:04:31 +00:00
Dr. Stephen Henson
8cd44e3630
Implement encrypt/decrypt using RSA.
2006-04-08 13:02:04 +00:00
Dr. Stephen Henson
07e970c7e6
Initial functions for RSA EVP_PKEY_METHOD.
...
Update dependencies.
2006-04-08 00:15:07 +00:00
Dr. Stephen Henson
d1aa0d38c5
If <operatio>_init function is zero interpret as noop.
2006-04-07 23:11:49 +00:00
Dr. Stephen Henson
9e4d0f0be2
New utility 'pkeyutl' a general purpose version of 'rsautl'.
2006-04-07 19:33:28 +00:00
Dr. Stephen Henson
cd7638980a
Include EVP_PKEY argument in EVP_PKEY_CTX_new(). This avoids the
...
need for a separate EVP_PKEY parameter in the other operation
initialization routines.
2006-04-07 17:28:56 +00:00
Dr. Stephen Henson
f733a5ef0e
Initial functions for main EVP_PKEY_METHOD operations.
...
No method implementations yet.
2006-04-07 16:42:09 +00:00
Dr. Stephen Henson
5da98aa687
Updated to EVP_PKEY_METHOD code... still doesn't do much.
2006-04-06 17:32:43 +00:00
Dr. Stephen Henson
0b6f3c66cd
Initial definitions and a few functions for EVP_PKEY_METHOD: an extension
...
of the EVP routines to public key algorithms.
2006-04-06 13:02:06 +00:00
Bodo Möller
a01d9ac558
Remove ECC extension information from external representation
...
of the session -- we don't really need it once the handshake
has completed.
2006-04-05 17:11:19 +00:00
Dr. Stephen Henson
e46691a0bc
New function to add dynamic alias.
2006-04-05 13:24:19 +00:00
Dr. Stephen Henson
732a40e107
Last arg to EVP_PKEY_assign() should be void *.
2006-04-05 13:04:02 +00:00
Dr. Stephen Henson
29da3ade3c
Rebuild mac table to avoid duplicates.
2006-04-05 12:09:09 +00:00
Dr. Stephen Henson
de908d6319
Typos in a few OID names.
2006-04-05 12:06:32 +00:00
Dr. Stephen Henson
9c9c98ad2e
Typo.
2006-04-05 12:00:22 +00:00
Dr. Stephen Henson
5e0e9fce5d
Minor object name edit.
2006-04-05 11:29:31 +00:00
Dr. Stephen Henson
53ec8809cf
Add an explicit load_config() call so any added algorithms are
...
visible.
2006-04-04 18:47:20 +00:00
Dr. Stephen Henson
863779065e
Fix dynamic public key method lookup.
2006-04-04 18:32:19 +00:00
Dr. Stephen Henson
0b33dac310
New function to retrieve ASN1 info on public key algorithms. New command
...
line option to print out info.
2006-04-04 18:16:03 +00:00
Dr. Stephen Henson
e2bce37720
Stop warning.
2006-04-04 18:11:49 +00:00
Dr. Stephen Henson
228b4e426b
Update and add last (?) set of GOST OIDs.
2006-04-04 15:53:21 +00:00
Bodo Möller
a4974de937
clarification
2006-04-03 14:11:23 +00:00
Bodo Möller
22f41c9b99
check length properly
...
Submitted by: Peter Sylvester
2006-04-03 13:57:56 +00:00
Bodo Möller
a123c552cd
simplify: use s2n macro
2006-04-03 13:07:18 +00:00
Bodo Möller
b2172f4f8e
Avoid hard-coded table length where we can use sizeof.
...
Submitted by: Peter Sylvester
Reviewed by: Bodo Moeller
2006-04-03 11:56:30 +00:00
Bodo Möller
dc1d1b6934
fix memory leak
...
Submitted by: Peter Sylvester
2006-04-03 11:49:18 +00:00
Richard Levitte
67475a7ed7
Change chop to chomp when reading lines, so CRLF is properly processed on
...
the operating systems where they are the normal line endings
2006-04-03 09:15:15 +00:00
Dr. Stephen Henson
362ab3e4f9
More GOST OIDs
2006-04-02 13:22:39 +00:00
Dr. Stephen Henson
2aed84d16b
Add GOST parameter set OIDs.
2006-04-02 03:01:27 +00:00
Dr. Stephen Henson
5deea1c015
Don't free up key in priv_decode.
2006-03-31 18:16:22 +00:00
Dr. Stephen Henson
99516f81b1
Initialize pval.
2006-03-31 18:11:54 +00:00
Richard Levitte
d6091d5a39
If we declare a function, like d2i_TS_MSG_IMPRINT_bio(), we'd better
...
*define* it too, or things like shared libraries might be a bit sad.
2006-03-31 12:25:24 +00:00
Dr. Stephen Henson
5a47825ece
Fix gost OIDs.
2006-03-31 10:57:32 +00:00
Richard Levitte
16f66ae794
Synchronise with recent changes
2006-03-30 04:30:45 +00:00
Richard Levitte
7ce1d9e9a6
The -config option flag needs to be in the SSLEAY_CONFIG value.
...
PR: 1300
2006-03-30 04:29:38 +00:00
Bodo Möller
a70183bc80
fix for hostname extension
...
Submitted by: Kaspar Brand, Peter Sylvester
2006-03-30 02:53:30 +00:00
Bodo Möller
332737217a
Implement Supported Elliptic Curves Extension.
...
Submitted by: Douglas Stebila
2006-03-30 02:44:56 +00:00
Bodo Möller
bcbe37b716
Change default curve (for compatibility with a
...
soon-to-be-widely-deployed implementation that doesn't support the
previous default)
Submitted by: Douglas Stebila
2006-03-30 02:41:30 +00:00
Bodo Möller
f393b7449d
Implement cipher-suite selection logic given Supported Point Formats Extension.
...
Submitted by: Douglas Stebila
2006-03-30 02:35:09 +00:00
Dr. Stephen Henson
531308d929
Fix typo.
2006-03-29 15:58:55 +00:00
Dr. Stephen Henson
74e564cd46
Add some GOST OIDs.
2006-03-29 13:02:21 +00:00
Dr. Stephen Henson
42eae426df
Add missing function declaration.
2006-03-29 12:18:26 +00:00
Dr. Stephen Henson
246e09319c
Fix bug where freed OIDs could be accessed in EVP_cleanup() by
...
defering freeing in OBJ_cleanup().
2006-03-28 17:23:48 +00:00
Dr. Stephen Henson
f7a3296d8c
Typo.
2006-03-28 14:48:42 +00:00
Dr. Stephen Henson
3e4585c8fd
New utility pkeyparam. Enhance and bugfix algorithm specific parameter
...
functions to support it.
2006-03-28 14:35:32 +00:00
Dr. Stephen Henson
3e84b6e15f
New general public key utility 'pkey'.
2006-03-28 12:34:45 +00:00
Richard Levitte
d505d1ef4a
Small bug. apps/CA.sh and apps/CA.com look at SSLEAY_CONFIG, not
...
OPENSSL_CONF.
2006-03-28 10:26:12 +00:00
Richard Levitte
70b2ae3edf
Since we're moving between directories, let's get an absolute path to
...
openssl.exe.
2006-03-27 14:39:06 +00:00
Bodo Möller
9e5dba197c
Simplify ASN.1 for point format list
...
Submitted by: Douglas Stebila
2006-03-26 10:53:52 +00:00
Richard Levitte
a61114c38b
Only try to remove the tsa.dir subdirectory if it actually exists.
2006-03-25 10:24:22 +00:00
Dr. Stephen Henson
db98bbc114
Initial support for generalized public key parameters.
2006-03-24 13:46:58 +00:00
Dr. Stephen Henson
e42633140e
Add support for legacy PEM format private keys in EVP_PKEY_ASN1_METHOD.
2006-03-23 18:02:23 +00:00
Dr. Stephen Henson
bd50e31325
Typo.
2006-03-23 14:08:33 +00:00
Dr. Stephen Henson
b2c0518e6a
Fix bug in DSA, EC methods.
2006-03-23 14:04:39 +00:00
Dr. Stephen Henson
d82e2718e2
Add information and pem strings. Update dependencies.
2006-03-23 11:54:51 +00:00
Dr. Stephen Henson
18e377b4ff
Make EVP_PKEY_ASN1_METHOD opaque. Add application level functions to
...
initialize it. Initial support for application added public key ASN1.
2006-03-22 17:59:49 +00:00
Richard Levitte
043b2e9c2e
Keep up with the changes in the Unix build system.
2006-03-22 14:31:03 +00:00
Dr. Stephen Henson
1b593194be
Move algorithm specific print code from crypto/asn1/t_pkey.c to separate
...
*_prn.c files in each algorithm directory.
2006-03-22 13:34:19 +00:00
Dr. Stephen Henson
35208f368c
Gather printing routines into EVP_PKEY_ASN1_METHOD.
2006-03-22 13:09:35 +00:00
Richard Levitte
c788e59365
VMS doesn't support includes of paths very well.
2006-03-22 11:26:57 +00:00
Richard Levitte
cb08f4a6a3
Synchronise with recent changes
2006-03-21 06:22:36 +00:00
Dr. Stephen Henson
adbc603d24
DH EVP_PKEY_ASN1_METHOD, doesn't do much (yet?).
2006-03-20 18:37:40 +00:00
Dr. Stephen Henson
6f81892e6b
Transfer parameter handling and key comparison to algorithm methods.
2006-03-20 17:56:05 +00:00
Dr. Stephen Henson
448be74335
Initial support for pluggable public key ASN1 support. Process most public
...
key ASN1 handling through a single EVP_PKEY_ASN1_METHOD structure and move
the spaghetti algorithm specific code to a single ASN1 module for each
algorithm.
2006-03-20 12:22:24 +00:00
Dr. Stephen Henson
1a5a1a93f6
Stop compiler warnings.
2006-03-20 11:44:34 +00:00
Nils Larsch
d917188a46
fix last commit: return NULL is TS_RESP_CTX_set_status_info_cond() failed
2006-03-19 21:09:48 +00:00
Nils Larsch
b4e88ccb28
ensure the pointer is valid before using it
2006-03-18 14:27:41 +00:00
Nils Larsch
d916ba1ba1
check if con != NULL before using it
2006-03-18 14:24:02 +00:00
Nils Larsch
33af4421f2
remove unnecessary code
2006-03-18 14:22:20 +00:00
Richard Levitte
95e362c6da
Typo...
2006-03-18 10:36:15 +00:00
Ulf Möller
c58d983e3b
*** empty log message ***
2006-03-17 19:29:35 +00:00
Ulf Möller
a84c9d1ed9
Clarification for CPU specific config options.
2006-03-17 19:22:35 +00:00
Nils Larsch
c6a27f0178
fix for OPENSSL_NO_EC
...
PR: 1293
2006-03-15 19:17:56 +00:00
Nils Larsch
67b6f1ca88
fix problems found by coverity: remove useless code
2006-03-15 17:45:43 +00:00
Richard Levitte
a4ff392503
tlsext_ecpointformatlist_length is unsigned, so check if it's less
...
than zero will only result in pissing of some compilers...
2006-03-15 09:57:16 +00:00
Nils Larsch
40f51f506c
create BN_CTX object
2006-03-15 08:37:35 +00:00
Nils Larsch
eeb821f707
fix error found by coverity: check if ctx is != NULL before calling BN_CTX_end()
2006-03-14 22:48:41 +00:00
Nils Larsch
47d5566646
fix error found by coverity: check if ctx is != NULL before calling BN_CTX_end()
2006-03-13 23:14:57 +00:00
Nils Larsch
90bdfd97a6
signed vs. unsigned
2006-03-13 22:07:05 +00:00
Richard Levitte
b9865f110e
Oh, now I noticed Bodo's change that made tlsext_ecpointformatlist
...
unsigned...
2006-03-13 12:37:19 +00:00
Richard Levitte
07ef612968
Resolve signed vs. unsigned issues
2006-03-13 12:32:51 +00:00
Bodo Möller
019fdc7850
fix sign problems
2006-03-13 09:55:06 +00:00
Nils Larsch
7c382796be
remove unused variables
2006-03-13 07:21:39 +00:00
Bodo Möller
b6acb8d0de
udpate Supported Point Formats Extension code
...
Submitted by: Douglas Stebila
2006-03-13 01:24:38 +00:00
Nils Larsch
6adbcb9755
fix comment
...
Submitted by: Peter Sylvester
2006-03-12 23:00:32 +00:00
Nils Larsch
e968089485
use BIO_snprintf() instead of snprintf + use BIO_FP_TEXT for text output
...
Submitted by: Gisle Vanem
2006-03-12 22:16:57 +00:00
Nils Larsch
c2cd422ac6
note that SSL_library_init() is not reentrant
2006-03-12 00:37:55 +00:00
Bodo Möller
36ca4ba63d
Implement the Supported Point Formats Extension for ECC ciphersuites
...
Submitted by: Douglas Stebila
2006-03-11 23:46:37 +00:00
Bodo Möller
ed4a1d12b9
clarification
2006-03-11 22:10:34 +00:00
Nils Larsch
a0aa8b4b61
fix signed vs. unsigned warning
2006-03-11 12:18:11 +00:00
Nils Larsch
2c059d58d9
fix "missing initializer" warning
2006-03-11 11:58:47 +00:00
Nils Larsch
cd346d3e22
fix signed vs. unsigned warning
2006-03-11 11:54:27 +00:00
Nils Larsch
561d93aa00
make update
2006-03-10 23:08:31 +00:00
Nils Larsch
ddac197404
add initial support for RFC 4279 PSK SSL ciphersuites
...
PR: 1191
Submitted by: Mika Kousa and Pasi Eronen of Nokia Corporation
Reviewed by: Nils Larsch
2006-03-10 23:06:27 +00:00
Richard Levitte
0e8e6f19b2
Remember to *build* WP_TEST on VMS, as well :-)
2006-03-08 10:45:23 +00:00
Nils Larsch
c03e4f9bf0
fix function name in error message
2006-03-07 10:22:45 +00:00
Ulf Möller
c3bb1f8166
unused function
2006-03-06 17:58:25 +00:00
Richard Levitte
959a7201b8
The actual whirlpool test was missing on VMS...
2006-03-06 12:09:34 +00:00
Nils Larsch
6c73d01142
constify some print and ts functions
2006-03-05 20:19:05 +00:00
Dr. Stephen Henson
2932ad5677
Typo.
2006-03-05 01:19:48 +00:00
Nils Larsch
036bbcc53f
no need to cast away the const
2006-03-04 13:55:55 +00:00
Nils Larsch
6384e46da3
make some parameters const
2006-03-04 13:55:02 +00:00
Richard Levitte
6e2fcc44bd
Make shorter TS symbols for OpenVMS.
...
Don't convert a function pointer to a void*, ISO C doesn't like that.
2006-03-02 13:55:40 +00:00
Richard Levitte
8721fc2d0b
Forgot the TSA application...
2006-03-02 13:28:52 +00:00
Dr. Stephen Henson
c1facbb681
Check EVP_DigestInit_ex() return value in EVP_BytesToKey().
2006-03-01 21:17:13 +00:00
Nils Larsch
f2c33fa6fd
force C locale when using [a-z] in sed expressions
...
PR: 1283
Submitted by: Mike Frysinger
2006-03-01 19:51:37 +00:00
Nils Larsch
5aae935038
fix "#ifndef HZ" statement
...
PR: 1287
2006-02-28 19:52:15 +00:00
Ulf Möller
11503177d1
TS bugfixes: Do not hardcode message digest algorithms; fix ASN1 decoding.
...
Submitted by: Zoltan Glozik <zglozik@opentsa.org >
2006-02-26 23:34:53 +00:00
Richard Levitte
9ab899a660
Synchronise with openss.cnf
2006-02-26 10:48:40 +00:00
Richard Levitte
8937a13e0c
Add a TSA test. testtsa.com is a manual sh to dcl translation of
...
testtsa.
2006-02-26 10:47:57 +00:00
Richard Levitte
19017d4061
Add TS to the VMS build.
2006-02-26 10:46:39 +00:00
Richard Levitte
f53ac639c6
Break out deltree in its' own command procedure.
2006-02-26 10:44:57 +00:00
Nils Larsch
f71165b556
fix no-dh configure option; patch supplied by Peter Meerwald
2006-02-24 17:58:43 +00:00
Dr. Stephen Henson
350a404cb8
Print out <INVALID> if an OID value is invalid.
2006-02-21 01:00:08 +00:00
Dr. Stephen Henson
827c55741b
Tolerate a SEQUENCE in DN components.
2006-02-19 13:44:47 +00:00
Ulf Möller
e0c8c08936
ignore
2006-02-16 20:43:04 +00:00
Ulf Möller
4e397d07ea
message style
2006-02-16 20:33:47 +00:00
Ulf Möller
9eb8794149
oops
2006-02-16 20:30:58 +00:00
Ulf Möller
dc24110311
wrap shlib for testtsa
...
Submitted by: David Somers <dsomers@omz13.com >
2006-02-16 20:20:24 +00:00
Nils Larsch
b3e72fc37f
make some internal functions static; patch supplied by Kurt Roeckx
2006-02-15 20:20:20 +00:00
Nils Larsch
90076b96df
fix typos
...
PR: 1280
2006-02-15 19:42:22 +00:00
Dr. Stephen Henson
9c339a7227
Fix from stable branch.
2006-02-15 15:04:42 +00:00
Dr. Stephen Henson
e7a8b47f1a
Fix warnings.
2006-02-15 14:45:31 +00:00
Ulf Möller
7ac7a4bc37
shorter filenames
2006-02-15 00:35:46 +00:00
Nils Larsch
a628901dda
use asn1 callbacks for new, free and d2i
2006-02-14 07:55:03 +00:00
Nils Larsch
2ab75dee27
don't use the l length modifier for int
2006-02-13 09:50:04 +00:00
Nils Larsch
a3f586cdab
use stricter prototypes, fix warnings
2006-02-13 09:46:02 +00:00
Nils Larsch
fcfd87168a
fix warning: add missing prototype
2006-02-13 09:43:31 +00:00
Nils Larsch
95a0e8ab31
fix warning
2006-02-13 08:45:53 +00:00
Nils Larsch
0c9caf04de
fix typo: pass pre-computed parameters to the underlying signature function; thanks to Lucas Newman
2006-02-13 08:16:00 +00:00
Ulf Möller
21e8bbf290
*** empty log message ***
2006-02-12 23:36:58 +00:00
Ulf Möller
3b408d83fe
make update
2006-02-12 23:21:56 +00:00
Ulf Möller
8573552e8c
time stamp Makefile, test files
...
Submitted by: Zoltan Glozik <zglozik@opentsa.org >
2006-02-12 23:19:25 +00:00
Ulf Möller
c7235be6e3
RFC 3161 compliant time stamp request creation, response generation
...
and response verification.
Submitted by: Zoltan Glozik <zglozik@opentsa.org >
Reviewed by: Ulf Moeller
2006-02-12 23:11:56 +00:00
Dr. Stephen Henson
1c17d91c53
Minor clarification.
2006-02-11 01:54:19 +00:00
Dr. Stephen Henson
a070f0dac5
Add FAQ about AKID.
2006-02-11 00:46:34 +00:00
Richard Levitte
b480283c56
Document the building macros.
2006-02-10 08:48:43 +00:00
Richard Levitte
f5ce5e1465
As an effect of revisions 1.261, BUILD_CMD was changed so $(DIRS)
...
wasn't respected when using it to build different parts of OpenSSL.
1.269 was an attempt to correct that, but unfortunately meant that we
built every part that was given i $(DIRS) 7 times. This change puts
back the original intent with BUILD_CMD via the new macro
BUILD_ONE_CMD while keeping the intent with RECURSIVE_BUILD_CMD.
2006-02-10 08:04:59 +00:00
Dr. Stephen Henson
d7db77a0cb
Fix warnings about "sin" conflicting with sin(3) definition.
2006-02-09 17:17:41 +00:00
Dr. Stephen Henson
346ac30120
Avoid warnings about shadowed definitions.
2006-02-09 17:11:12 +00:00
Dr. Stephen Henson
07bb51b6b4
Update from 0.9.7-stable.
2006-02-09 12:29:21 +00:00
Nils Larsch
bbab9b61dd
remove unnecessary check
2006-02-08 18:52:43 +00:00
Nils Larsch
82e8372f17
p could be uninitialized
2006-02-08 18:51:17 +00:00
Bodo Möller
e67ed82877
move new member of SSL_SESSION to the end
...
(minimize changes to binary format)
Submitted by: Peter Sylvester
2006-02-07 14:26:43 +00:00
Dr. Stephen Henson
15ac971681
Update filenames in makefiles.
2006-02-04 01:45:59 +00:00
Dr. Stephen Henson
0c21e13012
Recognize mingw in perlasm.
2006-02-04 01:25:19 +00:00
Nils Larsch
d5fd72fd0d
fix if statement: call conn_state() if the BIO is not in the BIO_CONN_S_OK state
2006-02-02 22:11:02 +00:00
Dr. Stephen Henson
c7474d077b
Ignore zero length constructed segments.
2006-01-31 18:36:29 +00:00
Lutz Jänicke
826b52d26f
Typo
...
Submitted by: Girish Venkatachalam <girish1729@gmail.com >
2006-01-30 17:06:00 +00:00
Nils Larsch
8c5a2bd6bb
add additional checks + cleanup
...
Submitted by: David Hartman <david_hartman@symantec.com >
2006-01-29 23:12:22 +00:00
Dr. Stephen Henson
25a58453ff
Fixes for BOOL handling: produce errors for invalid string for mini-compiler,
...
correctly encode FALSE for BOOL in ASN1_TYPE.
2006-01-19 17:16:56 +00:00
Nils Larsch
00fe865dbe
recent changes from 0.9.8: fix cipher list order in s3_lib.c,
...
make "no-ssl2" work again
PR: 1217
2006-01-15 17:35:28 +00:00
Dr. Stephen Henson
9e9bececa9
Fix from stable branch.
2006-01-15 17:31:08 +00:00
Dr. Stephen Henson
90890074b0
Typo.
2006-01-15 13:55:31 +00:00
Dr. Stephen Henson
31676a3540
Update from stable branch.
2006-01-15 13:50:10 +00:00
Richard Levitte
6b9e941ee3
signed vs. unsigned clash.
2006-01-14 11:49:24 +00:00
Nils Larsch
802d7fa6d5
support numeric strings in ASN1_generate_nconf
2006-01-14 09:21:33 +00:00
Nils Larsch
3798cb8182
fix comment
...
PR: 1270
2006-01-13 23:50:26 +00:00
Nils Larsch
2c5fadbce3
2 is a prime
...
PR: 1266
2006-01-13 23:27:59 +00:00
Bodo Möller
58ece83395
Further TLS extension improvements
...
Submitted by: Peter Sylvester
2006-01-13 09:21:10 +00:00
Richard Levitte
c75c096aa8
Forgot to initialize CC6DISABLEWARNINGS properly...
2006-01-11 18:55:42 +00:00
Richard Levitte
ab961dc8b0
Typo...
2006-01-11 13:31:04 +00:00
Bodo Möller
6ad47e83b4
improvements for alert handling
2006-01-11 07:18:35 +00:00
Bodo Möller
241520e66d
More TLS extension related changes.
...
Submitted by: Peter Sylvester
2006-01-11 06:10:40 +00:00
Bodo Möller
a13c20f603
Further TLS extension updates
...
Submitted by: Peter Sylvester
2006-01-09 19:49:05 +00:00
Richard Levitte
db6251ad54
Disable the Mixed Linkage warning for some selected modules. This is
...
because the Compaq C compiler will not accept that a variable be
declared extern then defined static without a warning.
2006-01-09 19:23:01 +00:00
Bodo Möller
51eb1b81f6
Avoid contradictive error code assignments.
...
"make errors".
2006-01-08 21:54:24 +00:00
Bodo Möller
2adc42e43e
Detect more errors.
...
Change assignment strategy: rathern than using max+r for new codes,
find first hole in list of existing codes.
2006-01-08 21:43:36 +00:00
Bodo Möller
52cc46a237
Detect SSL error code mishandling.
2006-01-08 20:03:08 +00:00
Bodo Möller
a07b4dc038
include max. codes in debug output
2006-01-08 19:54:32 +00:00
Bodo Möller
739a543ea8
Some error code cleanups (SSL lib. used SSL_R_... codes reserved for alerts)
2006-01-08 19:42:30 +00:00
Bodo Möller
01c76c6606
There's no such things as DTLS1_AD_MISSING_HANDSHAKE_MESSAGE.
...
For now, anyway.
2006-01-07 20:44:29 +00:00
Bodo Möller
d32f888db1
prepare for additional RFC3546 alerts
2006-01-07 20:33:16 +00:00
Bodo Möller
f7914dbf9a
make sure that the unrecognized_name alert actually gets sent
...
Submitted by: Peter Sylvester
2006-01-07 20:29:50 +00:00
Bodo Möller
3ff94a009b
complete and correct RFC3546 error codes
2006-01-07 20:28:11 +00:00
Bodo Möller
1aeb3da83f
Fixes for TLS server_name extension
...
Submitted by: Peter Sylvester
2006-01-06 09:08:59 +00:00
Bodo Möller
e8e5b46e2b
Add names for people who provided the TLS extension patch.
2006-01-04 17:35:51 +00:00
Richard Levitte
c9d67d4ddf
The VMS I run on doesn't know socklen_t and uses size_t instead.
2006-01-04 12:03:47 +00:00
Richard Levitte
8de5b7f548
Fix signed/unsigned char clashes.
2006-01-04 12:02:43 +00:00
Dr. Stephen Henson
9ee0f7b7e0
In ASN1_parse() show tag value for ASN1 tags > 30.
2006-01-03 14:20:07 +00:00
Bodo Möller
f1fd4544a3
Various changes in the new TLS extension code, including the following:
...
- fix indentation
- rename some functions and macros
- fix up confusion between SSL_ERROR_... and SSL_AD_... values
2006-01-03 03:27:19 +00:00
Bodo Möller
349eb12fd5
Make sure that after the change from revision 1.261,
...
it's still possible to do a partial build.
2006-01-03 03:05:08 +00:00
Richard Levitte
6a8f17de1e
Missing files in the VMS installation
2006-01-02 23:33:36 +00:00
Bodo Möller
b1277b9902
C style fix-up
2006-01-02 23:29:12 +00:00
Bodo Möller
ed3883d21b
Support TLS extensions (specifically, HostName)
...
Submitted by: Peter Sylvester
2006-01-02 23:14:37 +00:00
Andy Polyakov
ea558241e0
Refine login in b_sock.c.
2006-01-02 16:05:26 +00:00
Andy Polyakov
61aa2134a4
Compile Windows with winsock2.h. But note that we still link with wsock32!
...
This works because wsock32 commonly loads ws2_32 anyway and we [intend to]
check upon presense of winsock2-specific API at run-time.
2006-01-02 13:44:06 +00:00
Andy Polyakov
4eb76e2397
Fix typo and purify logic in b_sock.c
2006-01-02 12:26:36 +00:00
Andy Polyakov
68e575362f
./util update, which covers various issues, but most importantly mkerr.pl
...
and mkdef.pl spinning in endless loop.
2006-01-02 12:13:07 +00:00
Andy Polyakov
aab3bb04cf
Typo in win32_globallookup.
2006-01-02 12:06:22 +00:00
Andy Polyakov
481d81cb76
Make b_sock.c IPv6 savvy.
2006-01-02 09:12:46 +00:00
Andy Polyakov
c6cb42e4fb
"Relax" prototype and rename DSO_global_lookup_func to DSO_global_lookup.
2006-01-02 08:59:20 +00:00
Andy Polyakov
2d43a89488
util/mkerr.pl update to address various mkerr.pl problems [such as failure
...
to handle multi-line comments and endless loop while parsing overloaded
gnu-ish __attribute__].
2006-01-01 18:42:05 +00:00
Andy Polyakov
302ea8c260
Fix mapping "leak" in newly introduced win32_globallookup.
2006-01-01 18:38:59 +00:00
Andy Polyakov
a1f3462bc0
Oops! Remove junk...
2005-12-31 14:54:22 +00:00
Bodo Möller
7476f3ac3b
Rewrite timeout computation in a way that is less prone to overflow.
...
(Problem reported by Peter Sylvester.)
2005-12-30 23:51:36 +00:00
Andy Polyakov
68b64fb610
Add DSO_global_lookup_func implementation. See commentary in dso_lib.c
...
for further details.
2005-12-30 22:53:59 +00:00
Andy Polyakov
34b537ee66
Fix CFB and OFB modes in eng_padlock.c. Engine was consistent with itself,
...
but not interoperable with the rest of the world. test_padlock script is
added mostly for reference.
2005-12-28 16:16:56 +00:00
Andy Polyakov
7a5dbeb782
Minor sparcv9 clean-ups.
2005-12-27 21:27:39 +00:00
Andy Polyakov
6c06918ede
Lower PADLOCK_CHUNK till value, which doesn't affect the benchmark results.
...
Well, it's even contrary, 512 was observed to *improve* performance by 5%.
Excuse ourselves from treating C7 specially.
2005-12-27 21:21:56 +00:00
Richard Levitte
ee8f293701
Whoops, we were copying instead of comparing at the end of trying to
...
find a queue element.
Notified by nagendra modadugu <nagendra@cs.stanford.edu >
2005-12-20 07:03:10 +00:00
Andy Polyakov
3b4a0225e2
As SPARCV9 CPU flavor is [expected to be] detected at run-time, we can
...
afford to relax SPARCV9/8+ compiler command line and produce "unversal"
binaries as we used to.
2005-12-19 09:10:06 +00:00
Ulf Möller
c8e1edaae5
comments
2005-12-18 20:59:25 +00:00
Andy Polyakov
63d3fc9106
Eliminate possible mapping leak.
2005-12-18 19:14:01 +00:00
Andy Polyakov
5d7324e42d
Typo in sparcv8cap.c.
2005-12-18 19:13:03 +00:00
Andy Polyakov
be7b4458f2
Keep disclaiming 16-bit platform support. For now remove WIN16 references
...
from .h files...
2005-12-18 19:11:37 +00:00
Andy Polyakov
7304956e39
Missing CFLAG in couple of depend: targets.
...
PR: 1247
Submitted by: Doug Kaufman
2005-12-18 19:00:54 +00:00
Andy Polyakov
c510eec090
Put back OPENSSL_SYS_MSDOS definition to revive DJGPP built.
...
PR: 1247
2005-12-18 18:55:55 +00:00
Andy Polyakov
1b167a4343
Make bio.h resistant to gnu-ish __attribute__ redefenitions.
...
PR: 1252
2005-12-16 21:21:41 +00:00
Andy Polyakov
9ab5170197
Fix typos in osf1 shared rules.
...
PR: 1248
Submitted by: Nikola Milutinovic
2005-12-16 20:51:03 +00:00
Andy Polyakov
a00e414faf
Unify sparcv9 assembler naming and build rules among 32- and 64-bit builds.
...
Engage run-time switch between bn_mul_mont_fpu and bn_mul_mont_int.
2005-12-16 17:39:57 +00:00
Andy Polyakov
4c5e19b6c6
Make framework for Whirlpool assembler flexible.
2005-12-16 13:23:57 +00:00
Andy Polyakov
ed26604a71
Engage Whirlpool assembler and mention Whirlpool in CHANGES.
2005-12-16 12:55:33 +00:00
Andy Polyakov
0fbd4bf044
Make room for Whirlpool assembler in Configure.
2005-12-16 11:53:31 +00:00
Andy Polyakov
d719e60cb4
Allow for warning-free passing of -Wl options on config command line. One
...
possible usage is to pass -Wl,-z,-noexecstack on Linux to ensure the stack
is marked non-executable. Well, -Wa,--noexecstack works fine too...
2005-12-16 11:29:19 +00:00
Andy Polyakov
0cb9d93d0c
Mention bn(64,64) to bn(64,32) switch on 64-bit SPARCv9 targets in CHANGES.
2005-12-16 11:12:42 +00:00
Andy Polyakov
f5826b8014
We all make typos:-) Fix just introduced ones in bn.h
2005-12-16 10:43:33 +00:00
Andy Polyakov
4a47f55639
Eliminate warning induced by http://cvs.openssl.org/chngview?cn=14690 and
...
keep disclaiming narrower than 32-bit support.
2005-12-16 10:37:24 +00:00
Andy Polyakov
b884556ed8
To exclude contention for shared FPU on T1, trade 3% of DES performance.
2005-12-15 22:55:16 +00:00
Andy Polyakov
c06b0f3d5e
sparccpuid module update.
2005-12-15 22:50:36 +00:00
Andy Polyakov
68ea60683a
Add IALU-only bn_mul_mont for SPARCv9. See commentary section for details.
2005-12-15 22:43:33 +00:00
Andy Polyakov
6df8c74d5b
Switch 64-bit sparcv9 platforms from bn(64,64) to bn(64,32). This doesn't
...
have impact on performance, because amount of multiplications does not
increase with this switch, not on sparcv9 that is. On the contrary, it
actually improves performance, because it spares a load of instructions
used to chase carries. Not to mention that BN assembler modules can be
shared more freely between 32- and 64-bit builts.
2005-12-15 22:40:58 +00:00
Andy Polyakov
877e8e970c
Allow for bn(64,32) on LP64 platforms.
2005-12-15 22:31:16 +00:00
Bodo Möller
d56349a2aa
update TLS-ECC code
...
Submitted by: Douglas Stebila
2005-12-13 07:33:35 +00:00
Bodo Möller
67c03ff185
comment
2005-12-13 05:46:33 +00:00
Andy Polyakov
35e00cc2d8
Minor aes-sparcv9.pl optimization.
2005-12-10 12:32:22 +00:00
Andy Polyakov
064f6cb6f2
Engage AES for UltraSPARC in sparcv9 targets.
2005-12-10 11:24:07 +00:00
Andy Polyakov
20ab8b4b41
Revoke the option to share AES S-boxes between C and assembler. It wastes
...
space, but gives total flexibility [back].
2005-12-10 11:22:57 +00:00
Andy Polyakov
7395d852c3
Initial draft for AES for UltraSPARC assembler.
2005-12-10 11:19:56 +00:00
Andy Polyakov
3ebf898e88
Support for indirect calls in x86 assembler modules.
2005-12-06 18:43:59 +00:00
Dr. Stephen Henson
a4c886e4c8
Add cpuid code to VC++ build.
2005-12-06 16:35:40 +00:00
Dr. Stephen Henson
1291dfdead
Don't include zlib header dir if it is not defined.
2005-12-06 13:36:59 +00:00
Andy Polyakov
df278aff3e
Fix typos in wp-mmx.pl.
2005-12-06 09:34:09 +00:00
Dr. Stephen Henson
7c510d6f43
Initial attempt at Whirlpool assembler support on VC++.
2005-12-06 02:04:58 +00:00
Dr. Stephen Henson
7bbcb2f690
Avoid warnings on VC++ 2005.
2005-12-05 17:21:22 +00:00
Dr. Stephen Henson
ad2695b1b7
Update from 0.9.8-stable.
2005-12-05 13:46:46 +00:00
Dr. Stephen Henson
9cbf062a70
Update from stable branch.
2005-12-05 00:53:36 +00:00
Dr. Stephen Henson
ec645d9017
Make mk1mf.pl and friends recognize Whirlpool.
2005-12-05 00:53:10 +00:00
Dr. Stephen Henson
0d894c9dbe
Make ZLIB without ZLIB_SHARED compiled again.
2005-12-03 17:42:11 +00:00
Andy Polyakov
c6709b89c4
Couple other benchmark comparisons for wp-x86_64.pl.
2005-12-03 11:59:25 +00:00
Andy Polyakov
061bebc0d8
x86cpuid.pl update.
2005-12-03 11:56:55 +00:00
Dr. Stephen Henson
802e1d692b
Oops...
2005-12-02 14:06:35 +00:00
Dr. Stephen Henson
dbf33b344c
Update ordinals and include changes from 0.9.8.
2005-12-02 13:59:00 +00:00
Dr. Stephen Henson
b40228a61d
New functions to support opaque EVP_CIPHER_CTX handling.
2005-12-02 13:46:39 +00:00
Dr. Stephen Henson
da5a0e8722
Add error checking to avoid crashing when zlib cannot be loaded.
2005-12-02 13:27:19 +00:00
Dr. Stephen Henson
200fc02848
Include EVP_whirlpool() prototype in evp.h
2005-12-02 13:25:52 +00:00
Richard Levitte
7096217d39
wq instead of wp? That's gotta be among the more amazing typos I've
...
made...
2005-12-02 09:30:25 +00:00
Richard Levitte
f1eb83a013
Whirlpool was added to EVP, so let's build it on VMS as well.
2005-12-01 03:06:10 +00:00
Andy Polyakov
fec82dbc86
Whirlpool for x86_64.
2005-11-30 21:03:36 +00:00
Andy Polyakov
7b1b47a8e6
Mention Whirlpool in dgst -help.
2005-11-30 20:58:41 +00:00
Andy Polyakov
8b9afce53a
Add Whirlpool to EVP.
2005-11-30 20:57:23 +00:00
Andy Polyakov
137db78b46
Adapt Whirlpool API for EVP.
2005-11-30 20:53:14 +00:00
Andy Polyakov
a3344c8e5e
Fix typos in wp-mmx.pl.
2005-11-30 20:52:27 +00:00
Dr. Stephen Henson
c173d09c56
Typo
2005-11-30 19:25:55 +00:00
Dr. Stephen Henson
cb49a3cfa1
Make CA.pl script use CA extensions when creating a root CA.
2005-11-30 18:31:36 +00:00
Richard Levitte
adab80053d
Build Whirlpool on VMS as well
2005-11-29 12:46:17 +00:00
Andy Polyakov
f106fb85d4
Add Whirlpool OID.
2005-11-28 20:51:46 +00:00
Andy Polyakov
5fa6d850a2
Remove development leftover from whrlpool/asm/wp-mmx.pl.
2005-11-28 20:29:01 +00:00
Andy Polyakov
4adfe93cc5
Add missing Makefile and fix couple of typos in commentary.
2005-11-28 20:16:56 +00:00
Andy Polyakov
d1593e6b15
Whirlpool hash implementation. The fact that subdirectory and .h file are
...
called whrlpool is not a typo, but a way to keep the names shorter than
8 characters. Remaining TODO list comprises adding OID, EVP, corresponding
flag to apps/openssl dgst, benchmark, engage assembler...
2005-11-28 20:09:58 +00:00
Richard Levitte
a53cb070e3
When using POSIXly functions, we need to define _POSIX_C_SOURCE, at
...
least when the source is compiled with ANSI settings.
2005-11-27 15:32:57 +00:00
Dr. Stephen Henson
452ae49db5
Extensive OID code enhancement and fixes.
2005-11-20 13:07:47 +00:00
Richard Levitte
8c5c5b6517
Synchronise with the Unix build.
2005-11-19 07:57:53 +00:00
Bodo Möller
6f44d4d247
deFUDify: don't require OPENSSL_EC_BIN_PT_COMP
2005-11-16 04:07:43 +00:00
Bodo Möller
d804f86b88
disable some invalid ciphersuites
2005-11-15 23:32:11 +00:00
Bodo Möller
8dee9f844f
deFUDify: don't require OPENSSL_EC_BIN_PT_COMP
2005-11-15 21:08:38 +00:00
Andy Polyakov
963ba10012
Keep shutting up VC8.
...
PR: 1243
2005-11-15 08:07:25 +00:00
Andy Polyakov
07645deeb8
Apply "better safe than sorry" approach after addressing sporadic SEGV in
...
bn_sub_words to the rest of the sparcv8plus.S.
2005-11-15 08:02:10 +00:00
Andy Polyakov
c52c82ffc1
Attempt to resolve sporadic SEGV crashes in bn_sub_words in OpenSSH. I'm
...
baffled why it crashes and does it sporadically...
2005-11-11 20:07:07 +00:00
Dr. Stephen Henson
d6a03a23a8
Update from stable branch.
2005-11-11 13:00:07 +00:00
Andy Polyakov
e347b0da2b
Throw in comment so that one doesn't get tempted to optimize it away.
2005-11-09 20:46:37 +00:00
Andy Polyakov
52b1fbbd99
Avoid end-less loop when libcrypto.a is manually deleted, but 'make clean'
...
was not executed. It doesn't excuse user from running 'make clean', it
simply avoids process table exhaustion.
PR: 1236
Submitted by: Michael Richardson
2005-11-09 20:41:21 +00:00
Andy Polyakov
65613f23ba
Mention PROBLEMS in FAQ.
2005-11-09 19:43:40 +00:00
Andy Polyakov
4f92a764f1
AIX -blibpath is not accumulative, one apparently has to specify even
...
self-obvious /usr/lib:/lib.
PR: 1239
2005-11-09 17:27:19 +00:00
Andy Polyakov
6a3a7f3076
Minor perlasm clean-up.
2005-11-09 17:20:26 +00:00
Andy Polyakov
63d3a9c5ea
Tidying up WinCE support.
2005-11-09 17:19:38 +00:00
Andy Polyakov
2c730f6fc2
Improve cross-compiler portability of applink.c module and mention
...
CRYPTO_malloc_init in FAQ.
2005-11-09 17:11:03 +00:00
Dr. Stephen Henson
df8dae1df4
Update docs.
2005-11-07 00:35:22 +00:00
Dr. Stephen Henson
2e9f1bf0e1
Update from stable branch.
2005-11-07 00:10:36 +00:00
Andy Polyakov
b1e0ccbaa8
One of Win64 rules lacked bufferoverflowu.lib.
2005-11-06 22:41:13 +00:00
Andy Polyakov
bd2abcae37
Move declaration for optional bn_mul_mont to bn_lcl.h in order to hide
...
it from mkdef.pl.
2005-11-06 22:10:38 +00:00
Andy Polyakov
f1fbd4c7d1
Address MASM-specific problems introduced with
...
http://cvs.openssl.org/chngview?cn=14547 .
2005-11-06 22:01:27 +00:00
Andy Polyakov
eed22ac4ac
Eliminate VC compiler warning.
2005-11-06 21:11:41 +00:00
Andy Polyakov
176a614899
First draft for WCE PortSDK support. Once again! It's *draft* which requires
...
more work, i.e. more modifications are due...
2005-11-06 20:52:26 +00:00
Dr. Stephen Henson
f858d222f2
Make DLL engines the default in 0.9.9 and VC++.
2005-11-06 20:51:49 +00:00
Dr. Stephen Henson
16094305bc
Add symbols for ASN1 print functions, update ordinal file.
2005-11-06 20:33:33 +00:00
Dr. Stephen Henson
fbf002bb88
Update from stable branch.
2005-11-06 17:58:26 +00:00
Andy Polyakov
9135fddb0e
Revive app_tminterval for Netware.
2005-11-06 17:11:04 +00:00
Andy Polyakov
d88fcf73f1
Revive app_tminterval for vxworks.
2005-11-06 16:55:44 +00:00
Andy Polyakov
a950f28762
Revive app_tminterval for VMS.
2005-11-06 16:16:38 +00:00
Andy Polyakov
c629204688
Keep removing references to tmdiff.
2005-11-06 12:53:28 +00:00
Andy Polyakov
e22f63f231
The typos never stop. Fix one in apps/apps.c.
2005-11-06 12:15:12 +00:00
Andy Polyakov
d256b95768
x86_64-xlate.pl commentary section update.
2005-11-06 11:59:39 +00:00
Andy Polyakov
f530138876
Fix newly introduced typos and warnings in ./apps.
2005-11-06 11:58:22 +00:00
Andy Polyakov
0a39d8f207
Collect timing procedures in apps/apps.c. It's a bit cruel patch, as it
...
temporarily[!] removes support for couple of esoteric platforms [well,
Netware, vxWorks and VMS].
2005-11-06 11:40:59 +00:00
Andy Polyakov
6852d1d8c3
Eliminate crypto/tmdiff.[ch].
2005-11-06 11:38:18 +00:00
Andy Polyakov
a1ad253f17
Eliminate remaining calls to stat in apps/apps.c and unify WIN32_rename for
...
all Windows targets.
2005-11-04 16:12:05 +00:00
Andy Polyakov
ffa101872f
Eliminate dependency on read/write/stat in apps under _WIN32.
2005-11-04 09:30:55 +00:00
Andy Polyakov
4d24b4c466
Engage OPENSSL_NO_POSIX_IO on Windows CE.
2005-11-03 16:50:03 +00:00
Andy Polyakov
474b8a9716
Make cygwin work in directories mounted with 'text' attribute.
2005-11-03 16:43:53 +00:00
Andy Polyakov
53261831f1
Get rid of arcane reference to _fmode in apps/apps.h. Binary open is
...
handles properly by bss_file.c, which renders _fmode redundant.
2005-11-03 16:42:57 +00:00
Andy Polyakov
49e3c9d8e6
Mask libcrypto references to stat with OPENSSL_NO_POSIX_IO.
2005-11-03 16:22:40 +00:00
Andy Polyakov
1715e4885a
Reserve for OPENSSL_NO_POSIX_IO macro which is to eliminate references
...
to open/read/write/close. First OPENSSL_NO_POSIX_IO target would be
Windows CE.
2005-11-03 15:50:50 +00:00
Andy Polyakov
eff7cb41d1
Disable BIO_s_fd on CE and disable fd:N as password passing option on
...
all _WIN32 [see commentary for clarification].
2005-11-03 15:31:28 +00:00
Andy Polyakov
7a6f825f0f
Make pshufw optional and update performance table in sha512-sse2.pl
...
[as per http://cvs.openssl.org/chngview?cn=14551 ].
2005-11-03 15:23:11 +00:00
Nils Larsch
29afd31dd1
fix typo, pointed out by Patrick Guio
2005-11-02 22:19:32 +00:00
Nils Larsch
d86b0f1f5f
compile sstrsep only if HAVE_FORK is defined; patch supplied by Johan Gill <johane@lysator.liu.se>
2005-11-02 22:13:43 +00:00
Richard Levitte
998ac55e19
Document it
2005-11-01 07:53:37 +00:00
Richard Levitte
d6f25d70f1
Fix numerous bugs in the Win32 path splitter
2005-11-01 07:49:45 +00:00
Richard Levitte
b02da8eb50
A slight change in documentation that makes it so much more comprehensible
2005-11-01 04:56:25 +00:00
Dr. Stephen Henson
2f52a41054
Include kerberos libraries (if used) when linking test apps: some need it.
2005-10-29 12:51:43 +00:00
Andy Polyakov
99c675b2f7
Add -install_name in link_a.darwin rule.
...
PR: 1218
2005-10-28 08:10:47 +00:00
Bodo Möller
72dce7685e
Add fixes for CAN-2005-2969.
...
(This were in 0.9.7-stable and 0.9.8-stable, but not in HEAD so far.)
2005-10-26 19:40:45 +00:00
Bodo Möller
ee8836c442
fix stupid typo
2005-10-26 19:30:10 +00:00
Bodo Möller
a1006c373d
harmonize with 0.9.7-stable and 0.9.8-stable variants of CHANGES
2005-10-26 19:28:04 +00:00
Andy Polyakov
755c5b3330
Fix install problems on MacOS X and HP-UX.
...
PR: 1218,1185
2005-10-25 21:58:59 +00:00
Andy Polyakov
ce6aa1e496
+20% SHA512 performance improvement on x86.
2005-10-25 17:08:55 +00:00
Andy Polyakov
6c1fc273f3
Eliminate false preprocessor dependencies introduced with VOS support.
2005-10-25 15:55:06 +00:00
Andy Polyakov
aa8b03b415
Fix typos in macos x targets.
2005-10-25 15:51:00 +00:00
Andy Polyakov
96ec4abd07
Eliminate ~3.5KB of duplicate code in des-586.pl and reserve for folded
...
loop option, which can give further 3KB code reduction.
2005-10-25 15:47:09 +00:00
Andy Polyakov
70532b7d6b
Move DES_SPtrans to where it really belongs, dec_enc to be specific.
2005-10-25 15:43:18 +00:00
Andy Polyakov
a4d729f31d
Clarify binary compatibility with HAL/Fujitsu SPARC64 family.
2005-10-25 15:39:47 +00:00
Andy Polyakov
fcbc5a3fdd
Integrate sparcv9a-mont.pl into UltraSPARC builds.
2005-10-22 20:21:41 +00:00
Andy Polyakov
8c0ceb17a2
bn_asm.c update.
2005-10-22 20:20:06 +00:00
Andy Polyakov
c2012f9b82
Eliminate gcc warning in bn_mont.c.
2005-10-22 20:17:01 +00:00
Andy Polyakov
aa2be094ae
Add support for 32-bit ABI to sparcv9a-mont.pl module.
2005-10-22 18:16:09 +00:00
Andy Polyakov
4d524040bc
Change bn_mul_mont declaration and BN_MONT_CTX. Update CHANGES.
2005-10-22 17:57:18 +00:00
Andy Polyakov
0fe120ba25
Add rudimentary aix64-gcc target.
...
Submitted by: Stefan Neis
2005-10-19 18:46:20 +00:00
Andy Polyakov
2e7aa150f7
util/pl/OS2-EMX.pl sync.
...
Submitted by: Stefan Neis, Brian Havard
2005-10-19 18:37:36 +00:00
Mark J. Cox
04fac37311
one time CAN->CVE update
2005-10-19 11:00:39 +00:00
Andy Polyakov
bcb43bb358
Yet another "teaser" Montgomery multiply module, for UltraSPARC. It's not
...
integrated yet, but it's tested and benchmarked [see commentary section
for further details].
2005-10-19 07:12:06 +00:00
Richard Levitte
89ec4332ec
Add in CHANGES for 0.9.7i.
2005-10-15 04:26:57 +00:00
Andy Polyakov
34736de4c0
Flip saved argument block and tp [required for non-SSE2 path].
2005-10-14 16:05:21 +00:00
Andy Polyakov
5f50d597f2
Make sure x86-mont.pl returns zero even if compiled with no-sse2.
2005-10-14 15:24:06 +00:00
Andy Polyakov
df94f187b9
Fix bug in SMALL_FOOTPRINT path and clarify comment.
2005-10-14 15:22:27 +00:00
Andy Polyakov
b92c0df834
Broaden compatibility amount Win32 headers even further [some don't have
...
SIZE_T].
2005-10-13 19:06:43 +00:00
Mark J. Cox
d357be38b9
Make sure head CHANGES is up to date, we refer to this in announce.txt
2005-10-11 11:10:19 +00:00
Richard Levitte
912e296070
Renumber to follow what happens with 0.9.8.
2005-10-11 10:14:44 +00:00
Andy Polyakov
35593b33f4
Add timestamp to x86-mont.pl.
2005-10-09 10:26:56 +00:00
Andy Polyakov
54f3d200d3
Throw in bn/asm/x86-mont.pl Montgomery multiplication "teaser".
2005-10-09 09:53:58 +00:00
Dr. Stephen Henson
3f67e11fab
Add PVK support to dsa utility.
2005-10-08 17:32:07 +00:00
Dr. Stephen Henson
c1de1a190d
Avoid warning on Win32.
2005-10-08 17:31:18 +00:00
Dr. Stephen Henson
566dda07ba
New option SSL_OP_NO_COMP to disable compression. New ctrls to set
...
maximum send fragment size. Allocate I/O buffers accordingly.
2005-10-08 00:18:53 +00:00
Andy Polyakov
7a2f4cbfe8
x86_64-mont.pl readability improvement.
2005-10-07 15:18:16 +00:00
Andy Polyakov
5ac7bde7c9
Throw in Montgomery multiplication assembler for x86_64.
2005-10-07 14:18:06 +00:00
Andy Polyakov
9b4eab501a
Refine logic in bn_mont.c and eliminate redundant BN_CTX pulls.
2005-10-06 13:12:28 +00:00
Andy Polyakov
ca04d7a208
Leave the decision to call/implement bn_sqr_mont to assembler developer.
2005-10-06 09:12:39 +00:00
Dr. Stephen Henson
40a3c12305
Initialize bignum constants using BN_bin2bn() instead of BN_hex2bn(). This
...
saves a bit of space and avoids a compiler warning about string length.
2005-10-05 17:51:43 +00:00
Andy Polyakov
3001a770ed
Mention "no-dso doesn't remove -ldl" in PROBLEMS.
...
PR: 1160
2005-10-04 06:30:52 +00:00
Andy Polyakov
2608383c5e
Fix typo in INSTALL.WCE.
2005-10-04 06:26:09 +00:00
Andy Polyakov
3d6312e807
Zap DES_UNROLL when SMALL_FOOTPRINT is in effect.
2005-10-04 06:25:39 +00:00
Andy Polyakov
22cd982566
Fix typo in exptest.c.
2005-10-04 06:23:15 +00:00
Andy Polyakov
682b112abc
Reserve for SMALL_FOOTPRINT bn_asm.c. Currently OPENSSL_SMALL_FOOTPRINT
...
is defined on Windows CE targets.
2005-10-04 06:22:11 +00:00
Andy Polyakov
e738280547
Add reference implementation for bn_[mul|sqr]_mont, new candidates for
...
assembler implementation.
2005-10-04 06:19:29 +00:00
Dr. Stephen Henson
8265328def
Oops :-)
2005-10-02 12:41:11 +00:00
Dr. Stephen Henson
231b98a5e1
Make OPENSSL_NO_COMP work under Win32.
2005-10-02 12:28:40 +00:00
Bodo Möller
13e4670c29
new option "openssl ciphers -V"
2005-10-01 04:08:48 +00:00
Dr. Stephen Henson
d08b6b44ba
Fix compilation without OPENSSL_NO_COMP :-)
2005-10-01 00:40:34 +00:00
Dr. Stephen Henson
09b6c2ef15
Make OPENSSL_NO_COMP compile again.
2005-09-30 23:35:33 +00:00
Nils Larsch
cc29c1204b
successfully updating the db shouldn't result in an error message
2005-09-30 16:47:38 +00:00
Andy Polyakov
94c00f3d4d
Fix typo.
2005-09-29 20:16:04 +00:00
Andy Polyakov
3c2b73672e
Fix missing applink call.
2005-09-29 16:56:21 +00:00
Richard Levitte
23acb0eeb2
Change a comment so it corresponds to reality. Put back a character that
...
was previously replaced with a NUL for parsing purposes. This seems to
fix a very weird parsing bug involving two variable references in the same
value.
2005-09-28 18:02:41 +00:00
Dr. Stephen Henson
bfa4b8c5ab
Update from stable branch.
2005-09-26 11:18:04 +00:00
Nils Larsch
ce75ca04b1
protect BN_BLINDING_invert with a write lock and BN_BLINDING_convert
...
with a read lock
Submitted by: Leandro Santi <lesanti@fiuba7504.com.ar >
2005-09-22 23:37:37 +00:00
Andy Polyakov
9dba0554a5
Fix SunOS 4 building issue.
...
PR: 1196
2005-09-22 20:37:50 +00:00
Andy Polyakov
59947880f4
Broaden compatibility among Windows SDK versions. Elder versions don't have
...
ULONG_PTR, so we replace it with equally wide SIZE_T.
2005-09-22 20:28:30 +00:00
Dr. Stephen Henson
61094cf3dc
128 bit AES ciphersuites should be classified as HIGH.
2005-09-21 00:55:42 +00:00
Andy Polyakov
6d00101e9d
Latest MSVCR80 doesn't tolerate unsupported signal numbers, throwing
...
fatal exceptions.
2005-09-20 20:30:15 +00:00
Andy Polyakov
7a06050cd3
"Overload" SunOS 4.x memcmp, which ruins ASN1_OBJECT table lookups.
...
PR: 1196
Submitted by: Russel Ruby
2005-09-20 20:19:07 +00:00
Andy Polyakov
6f9afa68cd
IA-32 BN tune-up. Performance imrpovement varies with platform and
...
keylength, this time larger improvement for shorter keys, and reaches
15%. Both SSE2 and IALU code pathes are improved.
2005-09-20 12:26:54 +00:00
Andy Polyakov
c038b90619
Fix typo: "powepc" vs "powerpc." G-r-r-r-r.
...
PR: 1198
2005-09-20 12:15:31 +00:00
Andy Polyakov
9c4fe78260
MD5 x86_64 assembler update.
...
Submitted by: Marc Bevand and Charles Liu
2005-09-20 07:56:03 +00:00
Andy Polyakov
60dd08573d
Refine AIX support.
...
PR: 1198
2005-09-20 07:43:27 +00:00
Andy Polyakov
f5204c61fb
BC-32.pl updates.
...
Submitted by: Old Wolf, Jon Bright
2005-09-20 07:05:32 +00:00
Andy Polyakov
9ddeefe39d
Proper solution to nasm compilation problems in Borland context.
2005-09-20 06:13:06 +00:00
Andy Polyakov
0293371a1b
Mention BN_sqr failure on x86 platforms in ./RPOBLEMS.
...
PR: 1176 [and others]
2005-09-19 14:57:44 +00:00
Andy Polyakov
dd31c6fcb0
Another missing space in VC-32.pl [from 0.9.8].
2005-09-19 14:44:17 +00:00
Andy Polyakov
6708df7bf0
Missing space in VC-32.pl.
2005-09-19 14:42:09 +00:00
Andy Polyakov
6d9c46b811
Oops-type typo.
...
PR: 1195
2005-09-19 13:12:00 +00:00
Andy Polyakov
af2c2823a7
bswapl usage should be masked by I386_ONLY.
...
PR: 1195
2005-09-19 13:06:46 +00:00
Nils Larsch
b17ecb642b
cleanup doxygen comments
2005-09-19 08:32:56 +00:00
Nils Larsch
ba12070f7e
add some doxygen comments
2005-09-19 08:10:10 +00:00
Dr. Stephen Henson
29b9763d9f
Change openssl.cnf to use UTF8Strings by default and not always include issuer
...
and serial versions of AKID.
2005-09-16 11:58:28 +00:00
Dr. Stephen Henson
270da80bfa
Fix for Win32.
2005-09-16 11:45:55 +00:00
Nils Larsch
701d35d12f
fix typos
...
PR: 1201
2005-09-15 19:00:55 +00:00
Bodo Möller
2238e8e477
correct+extend publication info
2005-09-12 01:39:46 +00:00
Nils Larsch
4b08da5538
bugfix: register engine as default engine in ENGINE_set_default_DSA
...
Submitted by: Jonathon Green
2005-09-09 07:50:09 +00:00
Richard Levitte
8a616a5a5f
Remove warnings about signed vs. unsigned...
2005-09-05 07:04:40 +00:00
Richard Levitte
9455d430cb
Synchronise VMS build with Unixly build.
2005-09-05 04:20:26 +00:00
Nils Larsch
137023dd0c
fix function name in error
2005-09-03 08:01:08 +00:00
Dr. Stephen Henson
2a45408c4a
Update print macro properly this time...
2005-09-03 00:49:26 +00:00
Dr. Stephen Henson
9e201014f8
Update ASN1 print implement macro.
2005-09-03 00:48:13 +00:00
Dr. Stephen Henson
0c072a0b46
Update asn1t.h too for ASN1 print.
2005-09-03 00:44:08 +00:00
Dr. Stephen Henson
c11c64fbe0
Update to ASN1 printing code.
2005-09-03 00:40:40 +00:00
Dr. Stephen Henson
f022c177db
Two new verify flags functions.
2005-09-02 22:49:54 +00:00
Nils Larsch
5f10073c95
fix typo in sbgp names
...
PR: 1194
2005-09-02 21:23:25 +00:00
Nils Larsch
33ac8b3139
don't try to load cert/key when the "-nocert" option is set
2005-09-02 12:44:59 +00:00
Dr. Stephen Henson
244847591f
Extend callback function to support print customization.
2005-09-01 20:42:52 +00:00
Dr. Stephen Henson
5abe32d861
Return 2 from X509_NAME printing routine to add newline.
2005-09-01 18:02:51 +00:00
Dr. Stephen Henson
9194296de8
Update ASN1 printing code and add a -print option to 'pkcs7' utility for
...
initial testing.
2005-09-01 18:00:56 +00:00
Richard Levitte
6273a91cb7
Synchronise with Unixly build.
2005-09-01 14:24:43 +00:00
Dr. Stephen Henson
1ef7acfe92
Initial support for ASN1 print code.
...
WARNING WARNING WARNING, experimental code, handle with care, use at
your own risk, may contain nuts.
2005-09-01 13:59:16 +00:00
Dr. Stephen Henson
a0156a926f
Integrated support for PVK files.
2005-08-31 16:37:54 +00:00
Richard Levitte
96998822b5
Last synchronisationn with Unixly build. I hope...
2005-08-30 06:00:32 +00:00
Nils Larsch
8215e7a938
fix warnings when building openssl with the following compiler options:
...
-Wmissing-prototypes -Wcomment -Wformat -Wimplicit -Wmain -Wmultichar
-Wswitch -Wshadow -Wtrigraphs -Werror -Wchar-subscripts
-Wstrict-prototypes -Wreturn-type -Wpointer-arith -W -Wunused
-Wno-unused-parameter -Wuninitialized
2005-08-28 22:49:57 +00:00
Richard Levitte
f7622f86d9
More synchronisation with the Unixly build.
2005-08-28 11:28:48 +00:00
Ben Laurie
337e368239
Fix warnings.
2005-08-27 12:10:34 +00:00
Richard Levitte
64b6840d8d
Synchronise with Unix changes.
2005-08-27 04:31:57 +00:00
Nils Larsch
6e119bb02e
Keep cipher lists sorted in the source instead of sorting them at
...
runtime, thus removing the need for a lock. Add a test to ssltest
to verify that the cipher lists are sorted.
2005-08-25 07:29:54 +00:00
Ben Laurie
2c2e46dbf5
Generate primes, too.
2005-08-23 13:48:17 +00:00
Bodo Möller
770bc596e1
recent DH change does not avoid *all* possible small-subgroup attacks;
...
let's be clear about that
2005-08-23 06:54:33 +00:00
Bodo Möller
7534d131d6
avoid potential spurious BN_free()
...
Submitted by: David Heine <dlheine@suif.Stanford.EDU >
2005-08-23 04:14:40 +00:00
Nils Larsch
7f3c9036ea
initialize cipher/digest methods table in SSL_library_init() and hence remove the need for a lock
2005-08-21 23:06:23 +00:00
Nils Larsch
725111f7cb
add missing file
2005-08-21 23:02:05 +00:00
Ben Laurie
bf3d6c0c9b
Make D-H safer, include well-known primes.
2005-08-21 16:00:17 +00:00
Ben Laurie
b8e8ccdc79
Fix warning.
2005-08-21 15:59:10 +00:00
Dr. Stephen Henson
6b80c20bdb
Use correct date and filename.
2005-08-21 12:25:52 +00:00
Dr. Stephen Henson
eea374fd19
Command line support for RSAPublicKey format.
2005-08-21 00:18:26 +00:00
Dr. Stephen Henson
2e8879fa6e
Delete old ASN1_METHOD files.
2005-08-20 19:48:58 +00:00
Dr. Stephen Henson
f5a07779dd
Add file which includes new ASN1 NETSCAPE format for certificates.
2005-08-20 19:46:52 +00:00
Dr. Stephen Henson
c51f2d4238
Update from stable branch.
2005-08-20 19:34:49 +00:00
Dr. Stephen Henson
45e2738585
Remove ASN1_METHOD code replace with new ASN1 alternative.
2005-08-20 18:12:45 +00:00
Dr. Stephen Henson
b173acfc96
New version of ASN1 print code, still not compiled in though.
2005-08-20 00:08:29 +00:00
Nils Larsch
4ebb342fcd
Let the TLSv1_method() etc. functions return a const SSL_METHOD
...
pointer and make the SSL_METHOD parameter in SSL_CTX_new,
SSL_CTX_set_ssl_version and SSL_set_ssl_method const.
2005-08-14 21:48:33 +00:00
Andy Polyakov
8e5ef8538a
Eliminate reference to removed platform line.
2005-08-11 09:38:59 +00:00
Andy Polyakov
ff82bf3b07
Pedantic polish to WCE-specific #if clause in ectest.c
2005-08-11 08:42:46 +00:00
Andy Polyakov
5147c3c914
Fix typo in WCE section in VC-32.pl
2005-08-11 08:18:42 +00:00
Andy Polyakov
fbbbffc5a8
Mention wcecompat update INSTALL.WCE.
2005-08-10 08:39:10 +00:00
Andy Polyakov
7cfe2a5e65
Fix Intel assembler warnings.
2005-08-10 08:28:36 +00:00
Andy Polyakov
df2a346b30
Suppress "deprecated" warnings introduced in VC8.
2005-08-09 22:44:54 +00:00
Andy Polyakov
270512ab12
Add support for more recent WCE SDK.
2005-08-09 22:19:35 +00:00
Nils Larsch
eba63ef58b
a ssl object needs it's own instance of a ecdh key; remove obsolete comment
2005-08-08 20:02:18 +00:00
Nils Larsch
01a9792f05
remove unused internal foo_base_method functions
2005-08-08 19:04:37 +00:00
Andy Polyakov
0491e05833
Final(?) WinCE update.
2005-08-07 22:21:49 +00:00
Nils Larsch
9a1a5b8785
avoid infinite recursion if dynamic engine isn't loaded
...
Submitted by: Jonathon Green <jonathon_au@yahoo.com >
2005-08-06 10:46:19 +00:00
Dr. Stephen Henson
f3b656b246
Initialize SSL_METHOD structures at compile time. This removes the need
...
for locking code. The CRYPTO_LOCK_SSL_METHOD lock is now no longer used.
2005-08-05 23:56:11 +00:00
Nils Larsch
53b38d37a9
fix potential memory leak + improved error checking
...
PR: 1182
2005-08-05 09:42:45 +00:00
Dr. Stephen Henson
8f2e4fdf86
Allow PKCS7_decrypt() to work if no cert supplied.
2005-08-04 22:15:22 +00:00
Andy Polyakov
11de71b04c
3-4 times better RSA/DSA performance on WIN64A target. Well, on AMD64 CPU,
...
EMT64T will hardly exhibit better performance...
2005-08-04 17:35:42 +00:00
Andy Polyakov
19bd66fe74
WCE update, mostly typos.
2005-08-03 19:56:36 +00:00
Andy Polyakov
45771abbd6
PIC-ify SPARC assembler in alternative manner to eliminate dependency on
...
OPENSSL_PIC macro.
2005-08-03 10:42:21 +00:00
Andy Polyakov
573969cd53
Abstain from GUI calls in rand_win.c in NT service context.
2005-08-02 22:09:14 +00:00
Andy Polyakov
34be0bb1a5
WCE-specific update for VC-32.pl.
2005-08-02 22:08:03 +00:00
Andy Polyakov
2031eca588
WCE-specific fix for cryptlib.c.
2005-08-02 22:07:28 +00:00
Andy Polyakov
6321c3a034
Keep disclaiming 16-bit support.
2005-08-02 22:04:11 +00:00
Andy Polyakov
1fda6c4f8c
Optimize for space on embedded WCE.
2005-08-02 14:09:44 +00:00
Andy Polyakov
11a4e58fc1
Stick to -DWCE_PLATFORM_$wceplatf, as that's what is apparently set by
...
Visual Studio IDE.
2005-08-02 12:21:18 +00:00
Andy Polyakov
8a35fb3bea
Eliminate bogus #if WCEPLATFORM!=MS_HPC_PRO [which by the way unconditionally
...
invalidated the whole clause] and replace it with #if _WIN32_WCE>=210.
2005-08-02 11:58:39 +00:00
Andy Polyakov
e85d67af9f
Type in OSF1 platform name.
2005-08-02 10:56:10 +00:00
Andy Polyakov
b37fb16dcb
Implement complementary LoadLibraryA shim under WCE.
2005-08-02 10:55:43 +00:00
Andy Polyakov
1e1c5047f2
Eliminate dependency on 3rd party wcedefs.mak.
2005-07-30 19:43:56 +00:00
Andy Polyakov
b2be099d16
Fix #if _MSC_VER clause in aes_locl.h
2005-07-30 19:42:50 +00:00
Nils Larsch
28d8362934
add comment
2005-07-29 19:46:42 +00:00
Nils Larsch
01039d0bff
remove unused variable
2005-07-27 20:20:53 +00:00
Nils Larsch
c755c5fd8b
improved error checking and some fixes
...
PR: 1170
Submitted by: Yair Elharrar
Reviewed and edited by: Nils Larsch
2005-07-26 21:10:34 +00:00
Dr. Stephen Henson
5c8e9139d1
Handle case where it==NULL
2005-07-26 12:25:06 +00:00
Dr. Stephen Henson
56defd9a98
Update ASN1 printing code. Highly experimental, not working properly (neither
...
did the old code) and not compiled in yet...
2005-07-26 11:46:23 +00:00
Dr. Stephen Henson
8eb7217580
Add declaration for IDP ASN1 functions.
2005-07-26 11:43:11 +00:00
Richard Levitte
b2a9d36a7f
bytes_to_long_long isn't used anywhere any more, so let's remove it
...
entirely.
2005-07-26 05:10:50 +00:00
Richard Levitte
04f15edb91
I'm reversing this change, as it seems the error is somewhere else.
2005-07-26 04:53:21 +00:00
Geoff Thorpe
4e98a44593
Silence two more generated files.
2005-07-26 04:52:52 +00:00
Geoff Thorpe
1385ddbb14
add a .cvsignore
2005-07-26 04:50:36 +00:00
Geoff Thorpe
7f0c65703a
"make update"
2005-07-26 04:48:54 +00:00
Geoff Thorpe
3a6dec8a05
Change my debug build for amd64.
2005-07-26 04:47:50 +00:00
Geoff Thorpe
209b12814f
Fix compilation when HAVE_LONG_LONG isn't defined.
2005-07-26 04:43:31 +00:00
Geoff Thorpe
f920c5b590
Fix signed/unsigned warnings.
2005-07-26 04:25:05 +00:00
Geoff Thorpe
05fc7018f8
Fix PEDANTIC compilation, using the same trick as elsewhere.
2005-07-26 04:05:03 +00:00
Geoff Thorpe
a384002724
Fix 64-bit compilation when PQ_64BIT_IS_INTEGER isn't defined.
2005-07-26 04:01:50 +00:00
Nils Larsch
0260405c68
fix BN_mod_word and give a more reasonable return value if an error occurred
2005-07-25 22:57:54 +00:00
Dr. Stephen Henson
0537f9689c
Add support for setting IDP too.
2005-07-25 22:35:36 +00:00
Dr. Stephen Henson
0c010a1517
Don't use @syntax for extended CRLDP format.
2005-07-25 18:55:40 +00:00
Dr. Stephen Henson
0745d0892d
Allow setting of all fields in CRLDP. Few cosmetic changes to output.
2005-07-25 18:42:29 +00:00
Dr. Stephen Henson
5e64f8c44c
Typo which prevents mult valued RDNs being created.
2005-07-25 18:39:44 +00:00
Andy Polyakov
4a5b8a5bee
Commentary section update in sha512-x86_64.pl.
2005-07-25 13:29:42 +00:00
Andy Polyakov
b3836ed3cb
Unify VC-32.pl and VC-CE.pl scripts and update INSTALL.W32.
2005-07-24 21:48:04 +00:00
Andy Polyakov
47738cbad7
Pull up mkdef.pl from 0.9.8.
2005-07-24 21:45:45 +00:00
Andy Polyakov
0a882b6394
Eliminate gcc warning in dso_win32.c.
2005-07-24 21:45:08 +00:00
Andy Polyakov
612a91110f
Engage SHA-256/-512 x86_64 assembler module.
2005-07-24 12:30:26 +00:00
Andy Polyakov
2337eb5823
SHA-256/-512 x86_64 assembler module.
2005-07-24 12:28:04 +00:00
Dr. Stephen Henson
9aa9d70ddb
Print out previously unsupported fields in CRLDP by i2r instead of i2v.
...
Cosmetic changes to IDP printout.
2005-07-24 00:23:57 +00:00
Dr. Stephen Henson
231493c93c
Initial print only support for IDP CRL extension.
2005-07-23 23:33:06 +00:00
Geoff Thorpe
20a90e3a76
Fix some signed/unsigned warnings.
2005-07-22 03:36:30 +00:00
Nils Larsch
17a2994dbd
set correct bn->top value
2005-07-21 22:40:39 +00:00
Nils Larsch
b554eef43b
the final byte of a pkcs7 padded plaintext can never be 0
...
Submitted by: K S Sreeram <sreeram@tachyontech.net >
2005-07-20 22:03:36 +00:00
Andy Polyakov
0066590f98
Pedantic polish to aes-ia64 and sha512-ia64.
2005-07-20 15:15:22 +00:00
Andy Polyakov
165a28abae
Pedantic polish to md5-ia64.S.
2005-07-20 12:24:04 +00:00
Andy Polyakov
63999e5299
Syncronize BSD-ia64 with other IA64-based platforms.
2005-07-20 12:10:41 +00:00
Andy Polyakov
2802ec65c2
Pedantic polish to rc4-ia64.pl.
2005-07-20 11:47:47 +00:00
Andy Polyakov
b3f56e8b38
Typo in version number.
2005-07-20 11:11:14 +00:00
Andy Polyakov
5826e4f481
Perl stylistic/cosmetic update for aes-x86_64.pl.
2005-07-20 11:09:02 +00:00
Andy Polyakov
66ee67be03
Fix bug [SHA1 IA-64 being disabled] introduced with Stratus VOS update.
...
PR: 1130
2005-07-19 23:04:57 +00:00
Andy Polyakov
a7ad2afa5e
Engage MD5 assembler module.
2005-07-19 22:37:57 +00:00
Andy Polyakov
0f04379d9c
This update gets endianness-neutrality right and adds second required
...
entry point, md5_block_asm_data_order.
2005-07-19 22:33:03 +00:00
Andy Polyakov
7e4d335943
MD5 IA-64 assembler implementation. Original copy for reference purposes.
...
Submitted by: David Mosberger
Obtained from: http://www.hpl.hp.com/research/linux/crypto/
2005-07-19 22:27:02 +00:00
Andy Polyakov
26c07054a1
Retire original rc4-ia64.S.
2005-07-18 18:59:21 +00:00
Andy Polyakov
843d9d0b39
Switch to new RC4 IA-64 module.
2005-07-18 18:56:16 +00:00
Andy Polyakov
4ac210c16a
This update implements following improvements.
...
1. Original submission required minor modification to RC4_set_key, which
we don't want to tolerate and therefore we fix assembler instead.
2. Eliminate remaining byte-order dependence [look for RC4_BIG_ENDIAN].
3. Eliminate logical error [when key->x is referred prior key is verified].
4. HP-UX assembler puked on MODSCHED_RC4 macro with "syntax error,"
macro has to be splitted in two.
5. Deploy parallel compare in function prologue.
6. Eliminate redundant instuctions and nops.
7. Eliminate assembler warnings.
2005-07-18 17:11:13 +00:00
Andy Polyakov
02703c74a4
Unrolled RC4 IA-64 loop gives 40% improvement over current assembler
...
implementation [as predicted].
Submitted by: David Mosberger
Obtained from: http://www.hpl.hp.com/research/linux/crypto/
2005-07-18 16:55:52 +00:00
Andy Polyakov
ef428d5681
Fix unwind directives in IA-64 assembler modules. This helps symbolic
...
debugging and doesn't affect functionality.
Submitted by: David Mosberger
Obtained from: http://www.hpl.hp.com/research/linux/crypto/
2005-07-18 09:54:14 +00:00
Andy Polyakov
afbe674edb
~15% better AES x86_64 assembler.
2005-07-18 09:15:04 +00:00
Nils Larsch
f42e6d24f2
fix typo
2005-07-17 21:04:19 +00:00
Nils Larsch
449bd384ed
bugfix: 0 - w (w != 0) is actually negative
2005-07-17 16:09:09 +00:00
Nils Larsch
3eeaab4bed
make
...
./configure no-deprecated [no-dsa] [no-dh] [no-ec] [no-rsa]
make depend all test
work again
PR: 1159
2005-07-16 12:37:36 +00:00
Nils Larsch
57eb1d3250
add missing entries for "-multivalue-rdn" and "-utf8" in ca.pod and req.pod
...
PR: 1158
Submitted by: Michael Bell <michael.bell@cms.hu-berlin.de >
2005-07-15 09:49:03 +00:00
Andy Polyakov
b4f5e5c959
Commentary section update.
2005-07-14 13:16:31 +00:00
Nils Larsch
0d2848b3ba
the second argument of d2i_X509, d2i_X509_CRL and d2i_X509_REQ is const
...
PR: 1156
Submitted by: Michael Bell <michael.bell@cms.hu-berlin.de >
2005-07-13 22:01:33 +00:00
Andy Polyakov
e84b663a93
complementary x86_64-xlate.pl update.
2005-07-12 22:11:22 +00:00
Andy Polyakov
d85185217b
AES x86_64 assembler implementation.
2005-07-12 15:44:58 +00:00
Andy Polyakov
8f3bdc72d0
Latest Intel compiler means every word in "if copying [with memcpy] takes
...
place between objects that overlap, the behavior is undefined." It's hard
to comprehend, but it reportedly manages to be case.
2005-07-08 16:46:22 +00:00
Richard Levitte
7d368fcbd8
On case insensitive systems, 'install' gets mixed up with the existing file
...
'INSTALL', so we need to put some force into installing
2005-07-08 10:13:22 +00:00
Richard Levitte
2bd2cd9b78
Changes from the 0.9.8 branch.
2005-07-05 19:16:24 +00:00
Richard Levitte
c83101248a
Changes from the 0.9.8 branch.
2005-07-05 18:36:42 +00:00
Andy Polyakov
8d3509b937
CHANGES and TABLE sync with 0.9.8.
2005-07-05 11:48:38 +00:00
Andy Polyakov
1875e6db29
Pull up Win64 support from 0.9.8.
2005-07-05 11:44:45 +00:00
Richard Levitte
0962fbbf98
Add libcrypto.pc and libssl.pc, and install them along with openssl.pc.
...
PR: 1143
2005-07-05 05:14:17 +00:00
Dr. Stephen Henson
cbdac46d58
Update from stable branch.
2005-07-04 23:12:04 +00:00
Richard Levitte
d2e0c81720
The private key should never have ended up in newreq.pem.
...
Now, it ends up in newkey.pem instead.
2005-07-04 21:44:16 +00:00
Andy Polyakov
109080ae48
Fix bugs in bug-fix to x509/by_dir.c.
...
PR: 1131
2005-07-03 13:10:45 +00:00
Andy Polyakov
31efffbdba
Trap condition should be 64-bit when it's due.
2005-07-03 09:17:50 +00:00
Andy Polyakov
aaa5dc614f
More elegant solution to "sparse decimal printout on PPC" problem.
2005-07-02 08:58:55 +00:00
Andy Polyakov
8be97c01d1
Decimal printout of a BN is wrong on PPC, it's sparse with very few
...
significant digits. As soon it verifies elsewhere it goes to 0.9.8 and
0.9.7.
2005-07-01 17:49:47 +00:00
Nils Larsch
9e1a112336
initialize newly allocated data
...
PR: 1145
2005-07-01 16:08:14 +00:00
Andy Polyakov
4e28f13209
Pedantic polish to aes-586.pl:-)
2005-07-01 10:13:30 +00:00
Andy Polyakov
53a20bfd94
Typos in commentary section.
2005-06-30 22:09:03 +00:00
Andy Polyakov
a28062338c
AES_cbc_encrypt to allow end-user to retain small blocks performance by
...
aligning the key schedule in a specific manner.
2005-06-30 22:06:35 +00:00
Dr. Stephen Henson
1c2f1fe505
Check PKCS7 structures in PKCS#12 files are of type data.
2005-06-30 11:34:58 +00:00
Richard Levitte
14365bd820
Actually, the 64bit format specifier differs between SIXTY_FOUR_BIT and
...
SIXTY_FOUR_BIT_LONG
2005-06-29 18:48:08 +00:00
Ben Laurie
a51a97262d
Brought forward from 0.9.8 - 64 bit warning fixes and fussy compiler fixes.
2005-06-29 11:02:15 +00:00
Ben Laurie
45d8574b93
Fix warnings.
2005-06-29 10:25:06 +00:00
Richard Levitte
417f8973ff
asn1parse doesn't support any TXT format, so let's stop pretending
...
it does.
2005-06-28 15:44:11 +00:00
Nils Larsch
b3b72cd92c
remove OPENSSL_NO_ASM dependency
2005-06-28 15:05:02 +00:00
Andy Polyakov
bb00084863
Replace _int64 with __int64, which is more widely accepted among Win32
...
compiler vendors.
2005-06-28 11:50:50 +00:00
Andy Polyakov
db22e5faa6
A report suggests that there're nasm version, which defaults to 16-bit
...
segmenting...
2005-06-28 11:28:43 +00:00
Andy Polyakov
55d03c3179
Mention hpux64-ia64-cc blowfish failure in PROBLEMS.
2005-06-28 09:57:04 +00:00
Richard Levitte
7e0a494f13
There are a few showstoppers. Unfortunately, I only remember one. Please fill this in.
2005-06-28 05:55:22 +00:00
Andy Polyakov
83e68987b3
Eliminate dependency on UNICODE macro.
2005-06-27 21:27:23 +00:00
Andy Polyakov
53bb3bee34
Fix typos in apps/apps.c
2005-06-27 15:56:53 +00:00
Dr. Stephen Henson
c9edf6fe98
Sync libeay.num
2005-06-27 00:45:38 +00:00
Andy Polyakov
14cc0aaf7b
Unify some SCO targets.
2005-06-26 18:06:38 +00:00
Andy Polyakov
2f3c39bc62
Minor (final?) Makefiles polish.
2005-06-26 17:47:44 +00:00
Andy Polyakov
c5de8b2a27
Minimum requirement for Solaris x86 was always Pentium. Reflect this in
...
Configure line. TABLE update accomodates other recent ./Configure changes...
2005-06-26 17:17:11 +00:00
Andy Polyakov
a4022932ee
Omit padding in RC4_KEY on IA-64. The idea behind padding was to reserve
...
room for aligning of the key schedule itself [specific alignment is
required for future performance improvements], but OpenSSH "abuses"
our API by making copies and restoring RC4_KEY, thus ruining the
alignment and making it impossible to recover the key schedule.
PR: 1114
2005-06-26 16:09:29 +00:00
Richard Levitte
0e3b6b70df
Updated status from 0.9.8-stable.
2005-06-24 22:27:57 +00:00
Andy Polyakov
c49a0aa08d
Replace emms with finit in x86cpuid.
2005-06-24 16:32:10 +00:00
Dr. Stephen Henson
5503b6a352
Add Argen root CAs.
2005-06-24 11:07:13 +00:00
Richard Levitte
60021d9165
Someone did some cutting and pasting and didn't quite finish the job :-).
...
Notified by Steffen Pankratz <kratz00@gmx.de >
2005-06-24 05:13:08 +00:00
Richard Levitte
97b708910a
Wrap the inclusion of openssl/engine.h with a protective check for
...
the absence of OPENSSL_NO_ENGINE.
2005-06-23 22:08:47 +00:00
Richard Levitte
2f6ebed1dc
Wrap the inclusion of openssl/engine.h with a protective check for
...
the absence of OPENSSL_NO_ENGINE.
PR: 1123
2005-06-23 21:57:40 +00:00
Richard Levitte
156f657209
Do not defined des_crypt(), since it clashes with Solaris crypt.h.
...
PR: 1125
2005-06-23 21:53:56 +00:00
Richard Levitte
816f74d1c7
Initialise dir to avoid a compiler warning.
2005-06-23 21:49:21 +00:00
Richard Levitte
ec14c80c7c
The NAME section of a man page is required to have a dash followed by a
...
short description, at least according to pod2man.
PR: 1127
2005-06-23 21:45:37 +00:00
Richard Levitte
543b4ecc13
DCC doesn't like argument names in returned function pointers.
...
PR: 1122
2005-06-23 21:35:25 +00:00
Richard Levitte
1110cea007
Update for Stratus VOS.
...
PR: 1130
2005-06-23 21:27:21 +00:00
Richard Levitte
0ed64ce310
Configure update for Stratus VOS.
...
PR: 1129
2005-06-23 21:21:45 +00:00
Richard Levitte
0e441bc2be
Change dir_ctrl to check for the environment variable before using the default
...
directory instead of the other way around.
PR: 1131
2005-06-23 21:14:15 +00:00
Richard Levitte
d996a9af2b
Strip the engine shared libraries as well.
...
Submitted by Corinna Vinschen <vinschen@redhat.com >
2005-06-23 20:55:38 +00:00
Andy Polyakov
ab6cf1b8a2
Darwin specific update for Configure and Makefile.shared.
2005-06-23 20:44:27 +00:00
Andy Polyakov
c25f2f1cbf
Missed -c in IRIX rules.
2005-06-23 20:37:29 +00:00
Andy Polyakov
62526671e9
Typo in bn-mips3 rule.
2005-06-23 16:24:51 +00:00
Andy Polyakov
88ebf53577
Rename mips3.o to bn-mips3.o [it's better in long run] and adjust the
...
rule to accomodate gcc4, which no longer support SGI as.
2005-06-23 16:23:06 +00:00
Andy Polyakov
a41b0aade2
HP-UX specific updates to Makefile.org and Makefile.shared.
2005-06-23 15:36:15 +00:00
Andy Polyakov
02c31fa461
Jumbo Makfiles update.
...
- eliminate ambiguities between GNU-ish and SysV-ish make flavors;
- switch [back] to -e;
- fold/unify rules;
This is follow-up to the patch introducing common BUILDENV. Idea is
to collect as much parameters in $(TOP) as possible and "strip" lower
Makefiles for most variables [and thus makes them more readable].
2005-06-23 00:03:26 +00:00
Andy Polyakov
5df70a9e21
no-asm didn't prevent make from compiling assembler modules.
2005-06-22 23:44:44 +00:00
Andy Polyakov
cbe52c3166
TABLE was out-of-sync.
2005-06-22 23:43:12 +00:00
Andy Polyakov
7858cc03da
Solaris-specific Makefile.shared update from 098.
2005-06-22 23:42:34 +00:00
Dr. Stephen Henson
bbada33271
Typo.
2005-06-22 18:54:54 +00:00
Dr. Stephen Henson
f5d51a9362
Fix extension ordering.
2005-06-22 13:26:23 +00:00
Richard Levitte
0fc6b2c9e2
Do no try to pretend we're at the end of anything unless we're at the end
...
of a 4-character block.
2005-06-20 22:11:14 +00:00
Richard Levitte
7a5ad5d5a1
Check for 'usage' and 'Usage'.
...
Submitted by Tim Rice <tim@multitalents.net >. His comment is:
I noticed "make report" didn't show the cc version on most of
my System V platforms. This patch corrects this.
2005-06-20 20:48:21 +00:00
Andy Polyakov
44eff497e8
Fix typo in ssl/d1_pkt.c.
2005-06-20 19:36:34 +00:00
Andy Polyakov
8b452002e8
Refine ELF detection on BSD platforms.
2005-06-20 17:39:10 +00:00
Andy Polyakov
e442c36252
Solaris x86_64 /usr/ccs/bin/as support.
2005-06-20 14:56:48 +00:00
Andy Polyakov
50ec3951dc
Handle wrap-arounds and revive missing assignment.
2005-06-20 12:40:37 +00:00
Richard Levitte
11cd239707
Add crypto/bn/bn_prime.h to the collection of generated files. In the
...
update target, place the dependency on depend last, so all necessary files
are generated *before* the dependencies are figured out.
PR: 1121
2005-06-20 04:29:50 +00:00
Richard Levitte
f6098f2dda
With DJGPP, it seems like the return code from grep, even when in the
...
middle of a pipe, is noted. Counter that by forcing a true return code
when the return code has no importance.
PR: 1085
2005-06-19 20:31:15 +00:00
Richard Levitte
857c6092b6
Undefine DECRANDOM before redefining it.
...
PR: 1110
2005-06-19 20:20:24 +00:00
Richard Levitte
eef468e330
Add better documentation on how id_function() should be defined and what
...
issues there are.
PR: 1096
2005-06-18 05:52:16 +00:00
Richard Levitte
4bd46774bb
Move the definition of DEVRANDOM for DJGPP from Configure to e_os.h.
...
That should solve the issues with propagating it through the Makefiles.
PR: 1110
2005-06-18 04:42:24 +00:00
Richard Levitte
283c3e2437
Only define ZLIB_SHARED if it hasn't already been defined (on the command
...
line, for example).
PR: 1112
2005-06-18 04:32:12 +00:00
Richard Levitte
306aae6cee
Have pod2man.pl accept '=for comment ...' before the '=head1 NAME' line.
...
PR: 1113
2005-06-18 04:27:06 +00:00
Nils Larsch
edb0600583
clear dso pointer in case of an error
...
PR: 816
2005-06-17 21:26:36 +00:00
Nils Larsch
ac86d923fc
update for the cswift engine:
...
- fix the problem described in bug report 825
- fix a segfault when the engine fails to initialize
- let the engine switch to software when keysize > 2048
PR: 825, 826
Submitted by: Frédéric Giudicelli
2005-06-17 20:27:41 +00:00
Richard Levitte
fbd63d0784
Do not undefine _XOPEN_SOURCE. This is currently experimental, and
...
will be firmed up as soon as it's been verified not to break anything.
2005-06-16 22:20:55 +00:00
Richard Levitte
78ebeee2c4
0.9.8-beta5 works on Gentoo/arml but not /armb, and works on Linux AMD64
2005-06-14 05:42:52 +00:00
Richard Levitte
55805fd2d0
Data about which Cygwin versions 0.9.8-beta5 work on
2005-06-13 17:10:03 +00:00
Richard Levitte
7ebd220a8f
0.9.8-beta5 works on SuSE 9.3
2005-06-13 17:03:13 +00:00
Richard Levitte
e8a1f6d190
0.9.8-beta5 works on Cygwin
2005-06-13 17:00:18 +00:00
Nils Larsch
034bae10fc
update FAQ
2005-06-13 08:38:02 +00:00
Richard Levitte
a7c924c041
0.9.8-beta5 works on VMS/Alpha
2005-06-13 04:17:12 +00:00
Richard Levitte
27b762af60
Status update
2005-06-13 03:36:58 +00:00
Richard Levitte
b764ab9537
Netware patch submitted by Verdon Walker" <VWalker@novell.com> in PR
...
1107. He says:
This is a followup to the NetWare patch that was applied to beta3. It
does the following:
- Fixes a problem in the CLib build with undefined symbols.
- Adds the ability to use BSD sockets as the default for the OpenSSL
socket BIO. NetWare supports 2 flavors of sockets and our Apache
developers need BSD sockets as a configurable option when building
OpenSSL. This adds that for them.
- Updates to the INSTALL.NW file to explain new options.
I have tried very hard to make sure all the changes are in NetWare
specific files or guarded carefully to make sure they only impact
NetWare builds. I have tested the Windows build to make sure it does
not break that since we have made changes to mk1mf.pl.
We are still working the gcc cross compile for NetWare issue and hope
to have a patch for that before beta 6 is released.
2005-06-13 03:23:50 +00:00
Richard Levitte
a761b89d2f
Show what the offending target was.
...
PR: 1108
2005-06-13 02:39:05 +00:00
Nils Larsch
a136862afe
replace the deprecated "-m486" gcc option with "-march=i486"
...
PR: 1049
2005-06-12 10:34:42 +00:00
Nils Larsch
f0747cd950
- let SSL_CTX_set_cipher_list and SSL_set_cipher_list return an
...
error if the cipher list is empty
- fix last commit in ssl_create_cipher_list
- clean up ssl_create_cipher_list
2005-06-10 19:55:26 +00:00
Andy Polyakov
21ac2b964b
Eliminate gcc -pedantic warnings.
2005-06-09 21:41:44 +00:00
Andy Polyakov
79e1dd65ab
Allow for dso load by explicit path on HP-UX.
2005-06-09 20:52:24 +00:00
Richard Levitte
13e393607b
When the return type of the function is int, it's better to return an
...
in than NULL, especially when an error is signalled with a negative
value.
2005-06-09 17:28:53 +00:00
Nils Larsch
052ec89927
use "=" instead of "|=", fix typo
2005-06-08 22:22:33 +00:00
Richard Levitte
2073d95fb4
Avoid endless loops. Really, we were using the same variable for two
...
different conditions...
2005-06-08 21:59:47 +00:00
Nils Larsch
cbed917fee
ssl_create_cipher_list should return an error if no cipher could be
...
collected (see SSL_CTX_set_cipher_list manpage). Fix handling of
"cipher1+cipher2" expressions in ssl_cipher_process_rulestr.
PR: 836 + 1005
2005-06-08 21:19:14 +00:00
Andy Polyakov
dffdb56b7f
"Liberate" dtls from BN dependency. Fix bug in replay/update.
2005-06-07 22:21:14 +00:00
Dr. Stephen Henson
a78c0632ed
Fix for padding X9.31 padding check and zero padding bytes.
2005-06-06 22:39:43 +00:00
Andy Polyakov
8fa6a40be2
Allow BIO_s_file to open and sequentially access files larger than 2GB on
...
affected platforms.
PR: 973
2005-06-06 11:58:31 +00:00
Andy Polyakov
4b5598682a
FAQ to mention no-sha512 as option for compilers without support for 64-bit
...
integer type.
2005-06-06 09:32:01 +00:00
Richard Levitte
e9f5428d3a
Pass INSTALL_PREFIX in BUILDENV.
...
PR: 1100
2005-06-06 08:52:19 +00:00
Richard Levitte
34f0b26424
Skipping all tests just because one algorithm is disabled seems a bit harsch.
...
PR: 1089
2005-06-06 08:38:05 +00:00
Andy Polyakov
cd27b13b1d
Change mention of Makefile.ssl to Makefile.
2005-06-06 08:35:49 +00:00
Richard Levitte
3ecbd099eb
_GNU_SOURCE needs to be defined before any standard header.
2005-06-06 00:50:52 +00:00
Richard Levitte
e43d03e30e
Update from 0.9.8-stable.
2005-06-06 00:42:24 +00:00
Richard Levitte
d1acb9b44f
Further change pq_compat.h to generate the flag macros PQ_64BIT_IS_INTEGER
...
and PQ_64BIT_IS_BIGNUM with the values 0 (for false) and 1 (for true),
depending on which is true. Use those flags everywhere else to provide
the correct implementation for handling certain operations in q PQ_64BIT.
2005-06-06 00:32:11 +00:00
Richard Levitte
acd1c4b5af
Document the change and update the version number (d'oh!).
2005-06-05 23:25:29 +00:00
Richard Levitte
40808cedc1
Remove the incorrect installation of '%{openssldir}/lib'.
...
PR: 1074
2005-06-05 23:15:03 +00:00
Richard Levitte
51054a1b39
Change pq_compat.h to trust the macros defined by bn.h a bit more, and thereby
...
provide better generic support for environments that do not have 64-bit
integers. Among others, this should solve PR 1086
2005-06-05 22:42:58 +00:00
Richard Levitte
e774a3299e
gcc 2.95.3 on Ultrix supports long long.
...
PR: 1091
2005-06-05 22:19:24 +00:00
Richard Levitte
99febc8b9a
Correct typo ia64.o -> bn-ia64.o.
...
PR: 1094
2005-06-05 22:09:10 +00:00
Richard Levitte
1ce8efbdda
Add support for the new Intel compiler, icc.
...
Submitted by Keith Thompson <kst@sdsc.edu >
PR: 1095
2005-06-05 22:01:18 +00:00
Richard Levitte
0b0a60d861
Old typo...
...
PR: 1097
2005-06-05 21:54:48 +00:00
Richard Levitte
9e5b378081
Updated support for NetWare, submitted by Verdon Walker <VWalker@novell.com>.
...
PR: 1098
2005-06-05 21:47:19 +00:00
Andy Polyakov
7ed876533a
New function, DSO_pathbyaddr, to find pathname for loaded shared object
...
by an address within it. Tested on Linux, Solaris, IRIX, Tru64, Darwin,
HP-UX, Win32, few BSD flavors...
2005-06-05 18:13:38 +00:00
Andy Polyakov
b2d91a6913
Unify BSDi target.
2005-06-05 18:10:19 +00:00
Andy Polyakov
ce074604c4
./PROBLEMS to mention workarounds for ULTRIX build problems.
...
PR: 1092
2005-06-05 18:03:37 +00:00
Richard Levitte
19ac190252
The macro THREADS was changed to OPENSSL_THREADS a long time ago.
...
PR: 1096
2005-06-04 08:44:02 +00:00
Richard Levitte
02c5ddf91e
From 0.9.8-stable:
...
handshake_write_seq is an unsigned short, so treat it like one
2005-06-04 04:18:26 +00:00
Dr. Stephen Henson
1aaeaf8a3d
Use correct name for config file env variable.
2005-06-02 23:19:56 +00:00
Dr. Stephen Henson
5d6c4985d1
Typo.
2005-06-02 20:29:32 +00:00
Dr. Stephen Henson
b615ad90c8
Update CHANGES.
2005-06-02 20:11:16 +00:00
Andy Polyakov
c7aaf3918d
Fix inconsistensy between 8 and HEAD.
2005-06-02 18:28:27 +00:00
Andy Polyakov
d51204f1b1
PSS update [from 0.9.7].
2005-06-02 18:25:36 +00:00
Nils Larsch
b3f6325988
check return value
2005-06-01 22:35:01 +00:00
Dr. Stephen Henson
3129acbd83
Update from 0.9.7-stable.
2005-06-01 22:14:04 +00:00
Richard Levitte
12f89d32b5
Synchronise yet a little more with the Unixly build
2005-06-01 16:24:15 +00:00
Nils Larsch
1d42741a19
clear error queue on success and return NULL if no cert could be read
...
PR: 1088
2005-06-01 08:38:44 +00:00
Nils Larsch
88737991d2
fix assertion
2005-05-31 20:39:16 +00:00
Richard Levitte
75c00536ba
Synchronise more with the Unix build.
2005-05-31 20:28:41 +00:00
Nils Larsch
63d740752f
changes from 0.9.8
2005-05-31 18:22:53 +00:00
Nils Larsch
6e04afb8c5
include opensslconf.h if OPENSSL_NO_* is used
2005-05-31 17:36:06 +00:00
Andy Polyakov
165fca51e0
"Show" more respect to no-sha* config options.
...
PR: 1086
2005-05-31 16:36:27 +00:00
Andy Polyakov
db6b4e3791
Mention more GCC bugs in ./PROBLEMS.
2005-05-31 12:39:54 +00:00
Andy Polyakov
20a85e9f69
Missing sparcv8.o rule.
...
PR: 1082
2005-05-31 12:17:35 +00:00
Andy Polyakov
2a6144a1b6
Fix typo in ./config.
2005-05-31 11:34:33 +00:00
Andy Polyakov
f8bc3e1bd8
Platform update from 8-stable.
2005-05-31 11:07:27 +00:00
Andy Polyakov
5b737a0731
Platform update from 8-stable.
2005-05-31 09:39:03 +00:00
Richard Levitte
6e0ef10915
Merge from 0.9.8-stable.
2005-05-30 23:26:04 +00:00
Richard Levitte
7017605dce
Merge in the new news from 0.9.8-stable.
2005-05-30 22:51:28 +00:00
Richard Levitte
b29228836a
DJGPP changes. Contributed by Doug Kaufman <dkaufman@rahul.net>
2005-05-30 22:37:44 +00:00
Richard Levitte
188b05792f
pqueue and dtls uses 64-bit values. Unfortunately, OpenSSL doesn't
...
have a uniform representation for those over all architectures, so a
little bit of hackery is needed.
Contributed by nagendra modadugu <nagendra@cs.stanford.edu >
2005-05-30 22:34:37 +00:00
Richard Levitte
575901e537
Synchronise with Unixly build
2005-05-30 22:26:30 +00:00
Richard Levitte
2333d65880
Change all relevant occurences of 'ncipher' to 'chil'. That's what nCipher always wanted...
2005-05-30 05:17:02 +00:00
Dr. Stephen Henson
ffd1df0579
Update from stable branch.
2005-05-30 00:29:16 +00:00
Dr. Stephen Henson
837685c522
file testfipsssl was added on branch OpenSSL_1_0_1-stable on 2011-06-14 15:35:49 +0000
2003-09-13 17:03:55 +00:00