Matt Caswell
22b52164aa
More tweaks for comments due indent issues
...
Conflicts:
ssl/ssl_ciph.c
ssl/ssl_locl.h
Conflicts:
ssl/s2_srvr.c
ssl/ssl.h
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:09 +00:00
Matt Caswell
df6741c9a0
Tweaks for comments due to indent's inability to handle them
...
Conflicts:
demos/tunala/tunala.h
engines/e_padlock.c
ssl/s2_clnt.c
ssl/s2_lib.c
ssl/s2_srvr.c
ssl/s3_srvr.c
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:09 +00:00
Matt Caswell
68d39f3ce6
Move more comments that confuse indent
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:09 +00:00
Dr. Stephen Henson
f9be4da00e
Delete trailing whitespace from output.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:09 +00:00
Dr. Stephen Henson
09f4d9c0f9
Add -d debug option to save preprocessed files.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:09 +00:00
Dr. Stephen Henson
f8180c63ec
Test option -nc
...
Add option -nc which sets COMMENTS=true but disables all indent comment
reformatting options.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:09 +00:00
Andy Polyakov
20728adc8f
ec/ecp_nistz256.c: further harmonization with latest rules.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:09 +00:00
Matt Caswell
4664862013
Add ecp_nistz256.c to list of files skipped by openssl-format-source
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:09 +00:00
Matt Caswell
66186aeeb0
Manually reformat aes_x86core.c and add it to the list of files skipped by
...
openssl-format-source
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:09 +00:00
Andy Polyakov
1ab6c607b8
crypto/ofb128.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:09 +00:00
Andy Polyakov
a4ad939fb8
modes/ctr128.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:09 +00:00
Andy Polyakov
b1834b5e13
modes/cfb128.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:09 +00:00
Andy Polyakov
58d47cf004
ec/ecp_nistz256.c: harmonize with latest indent script.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:08 +00:00
Matt Caswell
7a2cb6f034
Fix indent comment corruption issue
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:08 +00:00
Matt Caswell
51428a12e4
Amend openssl-format-source so that it give more repeatable output
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:08 +00:00
Andy Polyakov
f4c46d0aab
bn/bn_const.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:08 +00:00
Andy Polyakov
c27310f938
bn/asm/x86_64-gcc.cL make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:08 +00:00
Andy Polyakov
7cc63545a3
bn/bn_asm.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:08 +00:00
Andy Polyakov
0546db3ef7
bn/bn_exp.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:08 +00:00
Matt Caswell
9d51824b3b
Manually reformat aes_core.c
...
Add aes_core.c to the list of files not processed by openssl-format-source
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:08 +00:00
Matt Caswell
572cee384d
Add obj_dat.h to the list of files that will not be processed by
...
openssl-format-source
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:08 +00:00
Matt Caswell
b853717fc4
Fix strange formatting by indent
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:08 +00:00
Andy Polyakov
1e8f69c6a5
modes/modes_lcl.h: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:08 +00:00
Matt Caswell
dbd87ffc21
indent has problems with comments that are on the right hand side of a line.
...
Sometimes it fails to format them very well, and sometimes it corrupts them!
This commit moves some particularly problematic ones.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:08 +00:00
Andy Polyakov
0107079e5f
modes/gcm128.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:08 +00:00
Andy Polyakov
6ea3d1836b
modes/cts128.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:08 +00:00
Andy Polyakov
061b67f6f5
crypto/mem_dbg.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:07 +00:00
Matt Caswell
a7b1eed566
More indent fixes for STACK_OF
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:07 +00:00
Matt Caswell
c59576881e
Fix indent issue with functions using STACK_OF
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:07 +00:00
Matt Caswell
76712e81e0
Fix indent issue with engine.h
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:07 +00:00
Matt Caswell
24a5f17b6a
Fix logic to check for indent.pro
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:07 +00:00
Andy Polyakov
90b9c78b30
crypto/cryptlib.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:07 +00:00
Andy Polyakov
985a9af813
bn/bntest.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:07 +00:00
Andy Polyakov
e95bbc3ca6
bn/bn_recp.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:07 +00:00
Andy Polyakov
aec4b334f0
engines/e_ubsec.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:07 +00:00
Andy Polyakov
6e81b27012
apps/srp.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:07 +00:00
Andy Polyakov
e751bba4ac
apps/speed.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:07 +00:00
Andy Polyakov
5f0b444899
bn/rsaz_exp.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:07 +00:00
Matt Caswell
2dc57eb5a7
Fix make errors
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:07 +00:00
Richard Levitte
2f1ac20bb3
Make the script a little more location agnostic
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:07 +00:00
Matt Caswell
acb82df4d3
Provide script for filtering data initialisers for structs/unions. indent just can't handle it.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:07 +00:00
Dr. Stephen Henson
6f08264e2f
Script fixes.
...
Don't use double newline for headers.
Don't interpret ASN1_PCTX as start of an ASN.1 module.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:07 +00:00
Richard Levitte
ff7ca7a336
Run expand before perl, to make sure things are properly aligned
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:07 +00:00
Richard Levitte
d09481a10f
Force the use of our indent profile
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:07 +00:00
Tim Hudson
849c80bc5d
Provide source reformating script. Requires GNU indent to be
...
available.
Script written by Tim Hudson, with amendments by Steve Henson, Rich Salz and
Matt Caswell
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-22 09:20:07 +00:00
Matt Caswell
e636e2acd7
Fix source where indent will not be able to cope
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:06 +00:00
Matt Caswell
28470b6095
Yet more comments
...
Conflicts:
crypto/dsa/dsa_asn1.c
crypto/pem/pem_all.c
fips/dh/dh_gen.c
fips/dh/fips_dh_check.c
fips/dh/fips_dh_gen.c
ssl/ssl_ciph.c
Conflicts:
ssl/d1_clnt.c
Conflicts:
ssl/s2_pkt.c
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:06 +00:00
Matt Caswell
23a22b4cf7
More comments
...
Conflicts:
crypto/dsa/dsa_vrf.c
crypto/ec/ec2_smpl.c
crypto/ec/ecp_smpl.c
Conflicts:
demos/bio/saccept.c
ssl/d1_clnt.c
Conflicts:
bugs/dggccbug.c
demos/tunala/cb.c
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:20:06 +00:00
Matt Caswell
c80fd6b215
Further comment changes for reformat (master)
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:19:59 +00:00
Rich Salz
4b618848f9
Cleanup OPENSSL_NO_xxx, part 1
...
OPENSSL_NO_RIPEMD160, OPENSSL_NO_RIPEMD merged into OPENSSL_NO_RMD160
OPENSSL_NO_FP_API merged into OPENSSL_NO_STDIO
Two typo's on #endif comments fixed:
OPENSSL_NO_ECB fixed to OPENSSL_NO_OCB
OPENSSL_NO_HW_SureWare fixed to OPENSSL_NO_HW_SUREWARE
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-01-14 15:57:28 -05:00
Andy Polyakov
b3d7294976
Add Broadwell performance results.
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-01-13 21:40:14 +01:00
Dr. Stephen Henson
a5a412350d
Remove use of BN_init, BN_RECP_CTX_init from bntest
...
BN_init and BN_RECP_CTX_init are deprecated and are not exported
from shared libraries on some platforms (e.g. Windows) convert
bntest to use BN_new and BN_RECP_CTX_new instead.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-13 15:39:37 +00:00
Dr. Stephen Henson
98b3b116ab
For master windows build dsa.h is now needed.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-13 15:39:37 +00:00
Matt Caswell
2d2671790e
Make output from openssl version -f consistent with previous versions
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-01-13 11:27:36 +00:00
Matt Caswell
b1ffc6ca1c
Fix warning where BIO_FLAGS_UPLINK was being redefined.
...
This warning breaks the build in 1.0.0 and 0.9.8
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-01-13 11:21:51 +00:00
Matt Caswell
86d21d0b95
Avoid deprecation problems in Visual Studio 13
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2015-01-13 09:44:59 +00:00
Matt Caswell
964012dc5a
Ensure internal header files are used from mk1mf based builds
...
Reviewed-by: Richard Levitte: <levitte@openssl.org >
2015-01-13 09:26:38 +00:00
Rich Salz
6d23cf9744
RT3548: Remove unsupported platforms
...
This last one for this ticket. Removes WIN16.
So long, MS_CALLBACK and MS_FAR. We won't miss you.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-01-12 17:30:54 -05:00
Rich Salz
31d1d3741f
Allow multiple IDN xn-- indicators
...
Update the X509v3 name parsing to allow multiple xn-- international
domain name indicators in a name. Previously, only allowed one at
the beginning of a name, which was wrong.
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
2015-01-12 12:39:00 -05:00
Rich Salz
fcf64ba0ac
RT3548: Remove some unsupported platforms.
...
This commit removes NCR, Tandem, Cray.
Regenerates TABLE.
Removes another missing BEOS fluff.
The last platform remaining on this ticket is WIN16.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-01-12 10:40:00 -05:00
Rich Salz
9405a9a2e1
RT478: Add uninstall make target
...
Add INSTALLDIRS variable, list of directories where things get
installed. Change install_html_docs to use perl mkdir-p script.
Add uninstall, uninstall_sw, uninstall_docs, uninstall_html_docs
to Makefile.org. The actions of these targets were figured out
by "inverting" the install target.
Recurse into subdirs to do uninstall as needed. Added uninstall
targets whose actions were similarly figured out by "inverting"
the install target.
Also remove some 'space before tab' complaints in Makefile.org
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-12 10:28:05 -05:00
Matt Caswell
732192a079
Fix no-deprecated on Windows
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-01-12 12:06:39 +00:00
Matt Caswell
1211e29c16
make update
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-01-12 12:06:06 +00:00
Matt Caswell
8e96441960
Remove redundant DSO_METHOD_beos declaration in dso.h. BEOS support has been
...
removed.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-01-12 12:05:40 +00:00
Kurt Roeckx
264212b643
Make build reproducible
...
It contained a date on when it was build.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-01-10 16:23:15 +01:00
Matt Caswell
41c9cfbc4e
Further windows specific .gitignore entries
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-09 23:39:54 +00:00
Matt Caswell
448e6f060e
Update .gitignore with windows files to be excluded from git
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-09 11:28:30 +00:00
Matt Caswell
5c5e7e1a7e
Fix build failure on Windows due to undefined cflags identifier
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-08 19:21:24 +00:00
Matt Caswell
103b171d8f
A memory leak can occur in dtls1_buffer_record if either of the calls to
...
ssl3_setup_buffers or pqueue_insert fail. The former will fail if there is a
malloc failure, whilst the latter will fail if attempting to add a duplicate
record to the queue. This should never happen because duplicate records should
be detected and dropped before any attempt to add them to the queue.
Unfortunately records that arrive that are for the next epoch are not being
recorded correctly, and therefore replays are not being detected.
Additionally, these "should not happen" failures that can occur in
dtls1_buffer_record are not being treated as fatal and therefore an attacker
could exploit this by sending repeated replay records for the next epoch,
eventually causing a DoS through memory exhaustion.
Thanks to Chris Mueller for reporting this issue and providing initial
analysis and a patch. Further analysis and the final patch was performed by
Matt Caswell from the OpenSSL development team.
CVE-2015-0206
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2015-01-08 15:49:45 +00:00
Dr. Stephen Henson
1421e0c584
Unauthenticated DH client certificate fix.
...
Fix to prevent use of DH client certificates without sending
certificate verify message.
If we've used a client certificate to generate the premaster secret
ssl3_get_client_key_exchange returns 2 and ssl3_get_cert_verify is
never called.
We can only skip the certificate verify message in
ssl3_get_cert_verify if the client didn't send a certificate.
Thanks to Karthikeyan Bhargavan for reporting this issue.
CVE-2015-0205
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-08 15:49:45 +00:00
Andy Polyakov
a7a44ba55c
Fix for CVE-2014-3570 (with minor bn_asm.c revamp).
...
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2015-01-08 15:49:45 +00:00
Matt Caswell
248385c606
Follow on from CVE-2014-3571. This fixes the code that was the original source
...
of the crash due to p being NULL. Steve's fix prevents this situation from
occuring - however this is by no means obvious by looking at the code for
dtls1_get_record. This fix just makes things look a bit more sane.
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2015-01-08 15:49:27 +00:00
Dr. Stephen Henson
feba02f391
Fix crash in dtls1_get_record whilst in the listen state where you get two
...
separate reads performed - one for the header and one for the body of the
handshake record.
CVE-2014-3571
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-08 11:18:16 +00:00
Dr. Stephen Henson
4a4d415857
fix error discrepancy
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-07 18:10:03 +00:00
Andy Polyakov
e464403d0b
Fix irix-cc build.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-07 18:39:39 +01:00
Dr. Stephen Henson
4138e38825
use correct credit in CHANGES
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-06 22:40:43 +00:00
Emilia Kasper
ac8e9cbe14
Only inherit the session ID context in SSL_set_SSL_CTX if the existing
...
context was also inherited (matches that of the existing SSL_CTX).
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-06 23:09:25 +01:00
Dr. Stephen Henson
cb62ab4b17
use correct function name
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-06 21:03:50 +00:00
Dr. Stephen Henson
77ff1f3b8b
RT3662: Allow leading . in nameConstraints
...
Change by SteveH from original by John Denker (in the RT)
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-01-06 15:29:28 -05:00
Rich Salz
a09474dd2d
Some cleanup of L<> markup in pod files
...
Show only the #define, not the values, in BIO_f_buffer. Data
abstraction and we can remove a "see also" entry.
Remove internal forward reference to NOTES in EVP_EncryptInit; just
say "see below" as we do in the other pages.
Add missing (3) in pem.pod so the L<> entry is consistent.
Fix entry to point to the "master" page, not the symlink'd one.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-06 12:16:24 -05:00
Martin Brejcha
41cd41c441
Fix memory leak.
...
Fix memory leak by freeing up saved_message.data if it is not NULL.
PR#3489
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-06 16:48:04 +00:00
Matt Caswell
3a83462dfe
Further comment amendments to preserve formatting prior to source reformat
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-06 15:45:25 +00:00
Matt Caswell
b691154e18
Remove blank line from start of cflags character array in buildinf.h
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-01-06 15:32:01 +00:00
Andy Polyakov
0548505f4c
CHANGES: mention "universal" ARM support.
...
This is re-commit without unrelated modification.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-06 12:13:36 +01:00
Andy Polyakov
219338115b
Revert "CHANGES: mention "universal" ARM support."
...
This reverts commit 4fec915069 .
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-06 12:11:01 +01:00
Andy Polyakov
4fec915069
CHANGES: mention "universal" ARM support.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-06 11:10:01 +01:00
Dr. Stephen Henson
fb76ad8d43
fix compilation error
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-06 02:17:07 +00:00
Dr. Stephen Henson
ce325c60c7
Only allow ephemeral RSA keys in export ciphersuites.
...
OpenSSL clients would tolerate temporary RSA keys in non-export
ciphersuites. It also had an option SSL_OP_EPHEMERAL_RSA which
enabled this server side. Remove both options as they are a
protocol violation.
Thanks to Karthikeyan Bhargavan for reporting this issue.
(CVE-2015-0204)
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-06 02:06:39 +00:00
Dr. Stephen Henson
b15f876964
ECDH downgrade bug fix.
...
Fix bug where an OpenSSL client would accept a handshake using an
ephemeral ECDH ciphersuites with the server key exchange message omitted.
Thanks to Karthikeyan Bhargavan for reporting this issue.
CVE-2014-3572
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-05 22:59:32 +00:00
Rich Salz
b5526482ef
RT3546: Remove #define IRIX_CC_BUG
...
Leftovers from commit 448155e9bb
Remove now-unused #define's
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-05 16:05:54 -05:00
Dr. Stephen Henson
c05febfa4f
update ordinals
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 31c65a7bc0 )
2015-01-05 16:51:54 +00:00
Adam Langley
61aa44ca99
Ensure that the session ID context of an SSL* is updated
...
when its SSL_CTX is updated.
From BoringSSL commit
https://boringssl.googlesource.com/boringssl/+/a5dc545bbcffd9c24cebe65e9ab5ce72d4535e3a
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-01-05 17:31:56 +01:00
Dr. Stephen Henson
4c52816d35
Constify ASN1_TYPE_cmp add X509_ALGOR_cmp.
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-01-05 14:52:55 +00:00
Dr. Stephen Henson
684400ce19
Fix various certificate fingerprint issues.
...
By using non-DER or invalid encodings outside the signed portion of a
certificate the fingerprint can be changed without breaking the signature.
Although no details of the signed portion of the certificate can be changed
this can cause problems with some applications: e.g. those using the
certificate fingerprint for blacklists.
1. Reject signatures with non zero unused bits.
If the BIT STRING containing the signature has non zero unused bits reject
the signature. All current signature algorithms require zero unused bits.
2. Check certificate algorithm consistency.
Check the AlgorithmIdentifier inside TBS matches the one in the
certificate signature. NB: this will result in signature failure
errors for some broken certificates.
3. Check DSA/ECDSA signatures use DER.
Reencode DSA/ECDSA signatures and compare with the original received
signature. Return an error if there is a mismatch.
This will reject various cases including garbage after signature
(thanks to Antti Karjalainen and Tuomo Untinen from the Codenomicon CROSS
program for discovering this case) and use of BER or invalid ASN.1 INTEGERs
(negative or with leading zeroes).
CVE-2014-8275
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-01-05 14:35:19 +00:00
Matt Caswell
32b07f5a80
Additional fix required for no-srtp to work
...
RT3638
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-01-05 14:17:51 +00:00
Piotr Sikora
e783bae26a
Fix building with no-srtp
...
RT3638
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-01-05 14:17:22 +00:00
Emilia Kasper
cb2bc0543a
Add a clang build target for linux-x86_64
...
This change documents the world as-is, by turning all warnings on,
and then turning warnings that trigger off again.
Reviewed-by: Andy Polyakov <appro@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-01-05 13:46:26 +01:00
Andy Polyakov
c1669e1c20
Remove inconsistency in ARM support.
...
This facilitates "universal" builds, ones that target multiple
architectures, e.g. ARMv5 through ARMv7. See commentary in
Configure for details.
Reviewed-by: Ard Biesheuvel <ard.biesheuvel@linaro.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-04 23:45:08 +01:00
Andy Polyakov
9e557ab262
ecp_nistz256-x86_64.pl: fix occasional failures.
...
RT: 3607
Reviewed-by: Adam Langley <agl@google.com >
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2015-01-04 23:18:04 +01:00
Rich Salz
2c60925d1c
RT2914: NULL check missing in X509_name_canon
...
Check for NULL return from X509_NAME_ENTRY_new()
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2015-01-04 14:51:04 -05:00
Dr. Stephen Henson
9527559939
Remove SGC restart flag.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-02 22:56:54 +00:00
Dr. Stephen Henson
63eab8a620
Remove MS SGC
...
MS Server gated cryptography is obsolete and dates from the time of export
restrictions on strong encryption and is only used by ancient versions of
MSIE.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-02 22:56:54 +00:00
Dr. Stephen Henson
4f605ccb77
Clear existing extension state.
...
When parsing ClientHello clear any existing extension state from
SRP login and SRTP profile.
Thanks to Karthikeyan Bhargavan for reporting this issue.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-02 22:25:52 +00:00
Dominik Neubauer
2a9338ee31
typo in s_client
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
2014-12-31 11:13:48 +01:00
Martin Nowak
b17dcb0d63
remove duplicate defines
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
2014-12-31 11:13:48 +01:00
Cristian Rodríguez
d97ed21986
constify tls 1.2 lookup tables.
...
None of this should live in writable memory
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
2014-12-31 11:13:48 +01:00
Kurt Roeckx
97d5809c2b
Add missing include of sys/time.h
...
gettimeofday was undefined
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
2014-12-31 11:13:48 +01:00
Tim Hudson
1d97c84351
mark all block comments that need format preserving so that
...
indent will not alter them when reformatting comments
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-30 22:10:26 +00:00
Kurt Roeckx
aa8a9266f9
Make "run" volatile
...
RT#3629
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-30 16:46:46 +01:00
Thorsten Glaser
5075e52e6f
Document openssl dgst -hmac option
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-30 16:46:46 +01:00
Kurt Roeckx
c18440956d
dlfcn: always define _GNU_SOURCE
...
We need this for the freebsd kernel with glibc as used in the Debian kfreebsd
ports. There shouldn't be a problem defining this on systems not using glibc.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-30 16:46:46 +01:00
Kurt Roeckx
8c00f4cfd2
Fix memory leak in the apps
...
The BIO_free() allocated ex_data again that we already freed.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-30 16:46:46 +01:00
Rich Salz
32dfde1076
RT3548: Remove unsupported platforms
...
This commit removes DG-UX.
It also flushes out some left-behinds in config.
And regenerates TABLE from Configure (hadn't been done in awhile).
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-28 01:17:52 -05:00
Rich Salz
6c23ca0cbb
RT3548: unsupported platforms
...
This commit removes Sinix/ReliantUNIX RM400
(And a missed piece of BEOS fluff)
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-25 16:16:29 -05:00
Rich Salz
5ad4fdce41
RT3548: Remove unsupported platforms.
...
This commit removes MPE/iX
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-12-22 17:47:28 -05:00
Alok Menghrajani
67472bd82b
Improves certificates HOWTO
...
* adds links to various related documents.
* fixes a few typos.
* rewords a few sentences.
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-12-22 16:23:24 +01:00
Richard Levitte
7cfab40f43
Small typo
...
Reviewed-by: Stephen Henson <steve@openssl.org >
2014-12-22 14:30:23 +01:00
Rich Salz
f231941444
RT3548: Remvoe unsupported platforms
...
This commit removes SunOS (a sentimental favorite of mine).
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-21 23:18:02 -05:00
Michael Tuexen
2521fcd852
Fix incorrect OPENSSL_assert() usage.
...
Return an error code for I/O errors instead of an assertion failure.
PR#3470
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-20 14:45:51 +00:00
Rich Salz
e03b29871b
RT3548: Remove outdated platforms
...
This commit removes all mention of NeXT and NextStep.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-19 21:11:09 -05:00
Matt Caswell
488f16e31b
Fix a problem if CFLAGS is too long cversion.c fails to compile when config
...
is run with --strict-warnings.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-19 14:02:15 +00:00
Matt Caswell
c0fc27f88e
Made it an error to define OPENSSL_USE_DEPRECATED if OpenSSL has been built
...
with OPENSSL_NO_DEPRECATED defined
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-12-18 19:57:44 +00:00
Matt Caswell
bd2bd374b3
Update CHANGES for deprecated updates
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-12-18 19:57:38 +00:00
Matt Caswell
6385043fa1
make update following changes to default config settings
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-12-18 19:57:22 +00:00
Matt Caswell
53e95716f5
Change all instances of OPENSSL_NO_DEPRECATED to OPENSSL_USE_DEPRECATED
...
Introduce use of DECLARE_DEPRECATED
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-12-18 19:57:14 +00:00
Matt Caswell
5bafb04d2e
Remove redundant OPENSSL_NO_DEPRECATED suppression
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-12-18 19:57:05 +00:00
Matt Caswell
07c4c14c47
Turn on OPENSSL_NO_DEPRECATED by default.
...
Also introduce OPENSSL_USE_DEPRECATED. If OPENSSL_NO_DEPRECATED is
defined at config stage then OPENSSL_USE_DEPRECATED has no effect -
deprecated functions are not available.
If OPENSSL_NO_DEPRECATED is not defined at config stage then
applications must define OPENSSL_USE_DEPRECATED in order to access
deprecated functions.
Also introduce compiler warnings for gcc for applications using
deprecated functions
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-12-18 19:56:31 +00:00
Rich Salz
59ff1ce061
RT3548: Remove some obsolete platforms
...
This commit removes Sony NEWS4
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-18 14:17:33 -05:00
Kurt Roeckx
5a1e8c67a9
Return error when a bit string indicates an invalid amount of bits left
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-18 15:03:52 +01:00
Rich Salz
040b60f6fa
Fix yet anoither 'make clean' breakage.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-18 00:13:46 -05:00
Rich Salz
b317819b2e
RT3548: Remove some obsolete platforms
...
This commit removes BEOS.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-17 17:24:51 -05:00
Rich Salz
179f6b2f55
RT3544: Restore MWERKS for NetWare
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-17 17:20:42 -05:00
Dr. Stephen Henson
89f40f369f
Reject invalid constructed encodings.
...
According to X6.90 null, object identifier, boolean, integer and enumerated
types can only have primitive encodings: return an error if any of
these are received with a constructed encoding.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-12-17 14:25:58 +00:00
Emilia Kasper
03af843039
Add a comment noting the padding oracle.
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-12-17 14:55:04 +01:00
Emilia Kasper
4ad2d3ac0e
Revert "RT3425: constant-time evp_enc"
...
Causes more problems than it fixes: even though error codes
are not part of the stable API, several users rely on the
specific error code, and the change breaks them. Conversely,
we don't have any concrete use-cases for constant-time behaviour here.
This reverts commit 4aac102f75 .
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-12-17 14:54:17 +01:00
Emilia Kasper
b597aab84e
Build fixes
...
Various build fixes, mostly uncovered by clang's unused-const-variable
and unused-function errors.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
(cherry picked from commit 0e1c318ece )
2014-12-17 14:31:05 +01:00
Adam Langley
4aecfd4d9f
Premaster secret handling fixes
...
From BoringSSL
- Send an alert when the client key exchange isn't correctly formatted.
- Reject overly short RSA ciphertexts to avoid a (benign) out-of-bounds memory access.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-12-17 14:01:19 +01:00
Richard Levitte
57dc72e018
Clear warnings/errors within RL_DEBUG code sections (RL_DEBUG should be renamed)
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-17 10:15:09 +01:00
Richard Levitte
6dec5e1ca9
Clear warnings/errors within TLS_DEBUG code sections
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-17 10:15:09 +01:00
Richard Levitte
3ddb2914b5
Clear warnings/errors within KSSL_DEBUG code sections
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-17 10:15:09 +01:00
Richard Levitte
a501f647aa
Clear warnings/errors within CIPHER_DEBUG code sections
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-17 10:15:09 +01:00
Richard Levitte
72b5d03b5b
Clear warnings/errors within CIPHER_DEBUG code sections
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-17 10:15:09 +01:00
Richard Levitte
a93891632d
Clear warnings/errors within BN_CTX_DEBUG code sections
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-17 10:15:09 +01:00
Emilia Kasper
a015758d11
Check for invalid divisors in BN_div.
...
Invalid zero-padding in the divisor could cause a division by 0.
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit a43bcd9e96 )
2014-12-17 10:01:04 +01:00
Matt Caswell
789da2c73d
The dtls1_output_cert_chain function no longer exists so remove it from
...
ssl_locl.h
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-16 15:02:03 +00:00
Adam Langley
ec1af3c419
Don't set client_version to the ServerHello version.
...
The client_version needs to be preserved for the RSA key exchange.
This change also means that renegotiation will, like TLS, repeat the old
client_version rather than advertise only the final version. (Either way,
version change on renego is not allowed.) This is necessary in TLS to work
around an SChannel bug, but it's not strictly necessary in DTLS.
(From BoringSSL)
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-12-16 14:44:17 +00:00
Matt Caswell
db812f2d70
Add more meaningful OPENSSL_NO_ECDH error message for suite b mode
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-12-16 14:14:09 +00:00
Matt Caswell
ad500fdc49
Rename gost2814789t.c to gost2814789test.c. The old name caused problems
...
for dummytest if gost is compiled out, since the name of the test is not
standard (dummytest segfaults). Also the old name caused problems for git
because the executable was not in the .gitignore file
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-12-16 14:14:03 +00:00
Matt Caswell
fd86c2b153
Add missing OPENSSL_NO_EC guards
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-12-16 14:13:56 +00:00
Matt Caswell
af6e2d51bf
Add OPENSSL_NO_ECDH guards
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-12-16 14:13:45 +00:00
Matt Caswell
55e530265a
Remove extraneous white space, and add some braces
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-12-16 00:00:25 +00:00
Matt Caswell
1904d21123
DTLS fixes for signed/unsigned issues
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-12-15 23:59:50 +00:00
Rich Salz
129c81b951
RT3497: The ticket that keeps on giving.
...
Don't remove c_rehash that wasn't created by make; this script
is created by configure.
This fix brought to you by the letter "f" and
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2014-12-15 12:26:02 -05:00
Kurt Roeckx
995207bedc
Allow using -SSLv2 again when setting Protocol in the config.
...
RT#3625
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-12-15 18:09:53 +01:00
Rich Salz
56999ba589
RT3497: Fix; don't remove header files
...
Doing 'config ; make clean' broke because clean removed
header files that normal build didn't create. So don't
remove those files. Hopefully will be better addressed by
Geoff's no-symlinks patch.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-15 09:18:11 -05:00
Emilia Kasper
9669d2e1ad
Fix unused variable warning
...
The temporary variable causes unused variable warnings in opt mode with clang,
because the subsequent assert is compiled out.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-12-15 13:12:44 +01:00
Matt Caswell
24097938ad
Fixed memory leak if BUF_MEM_grow fails
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-12-13 00:02:20 +00:00
Rich Salz
c3f22253b1
RT1688: Add dependencies for parallel make
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-12-12 13:17:51 -05:00
Matt Caswell
fd0ba77717
make update
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-11 23:52:47 +00:00
Rich Salz
e03af1789f
Minor doc fixes.
...
In EVP_EncryptInit remove duplicate mention of EVP_idea_cbc()
In EVP_PKEY_CTX_ctrl.pod remove EVP_PKEY_get_default_digest_nid
since it is documented elsewhere.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-11 17:05:57 -05:00
Rich Salz
5ab65c50ef
RT3497: Clean up "dclean" targets
...
Some Makefiles had actions for "dclean" that really belonged
to the "clean" target. This is wrong because clean ends up,
well, not really cleaning everything.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-11 17:01:16 -05:00
Rich Salz
5cf37957fb
RT3543: Remove #ifdef LINT
...
I also replaced some exit/return wrappers in various
programs (from main) to standardize on return.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-10 17:31:04 -05:00
Rich Salz
a4a934119d
Remove old private pod2man
...
Include Richard's point to remove the 'sh -c' wrapper
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-10 17:10:59 -05:00
Kurt Roeckx
5b17b79a89
capi_ctrl, capi_vtrace: check for NULL after allocating and free it
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-10 18:35:18 +01:00
Jonas Maebe
3a7581bf5a
tree_print: check for NULL after allocating err
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-10 18:35:18 +01:00
Jonas Maebe
288b4e4f8f
tls1_heartbeat: check for NULL after allocating buf
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-10 18:35:18 +01:00
Jonas Maebe
c27dc3981c
tls1_process_heartbeat: check for NULL after allocating buffer
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-10 18:35:18 +01:00
Jonas Maebe
fed5b55252
SSL_set_session: check for NULL after allocating s->kssl_ctx->client_princ
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-10 18:35:18 +01:00
Jonas Maebe
e9e688effb
serverinfo_process_buffer: check result of realloc(ctx->cert->key->serverinfo) and don't leak memory if it fails
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-10 18:35:17 +01:00
Jonas Maebe
bf8e7047aa
ssl3_digest_cached_records: check for NULL after allocating s->s3->handshake_dgst
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-10 18:35:17 +01:00
Jonas Maebe
9052ffda91
ssl3_get_certificate_request: check for NULL after allocating s->cert->ctypes
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-10 18:35:17 +01:00
Jonas Maebe
d00b1d62d6
SSL_COMP_add_compression_method: exit if allocating the new compression method struct fails
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-10 18:35:17 +01:00
Matt Caswell
02a62d1a4a
Move bn internal functions into bn_int.h and bn_lcl.h
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 21:41:42 +00:00
Matt Caswell
e35af275d5
Update documentation following BN opaquify
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 21:41:36 +00:00
Matt Caswell
1939187922
Make bn opaque
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 21:41:27 +00:00
Matt Caswell
348d0d148a
Update apps for bn opaque change
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 21:41:19 +00:00
Matt Caswell
29e7a56d54
Disable engines that will fail to build when bn is made opaque
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 21:41:12 +00:00
Matt Caswell
2cbc8d7de5
Implement internally opaque bn access from ts
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 21:41:07 +00:00
Matt Caswell
aeb556f831
Implement internally opaque bn access from srp
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 21:41:02 +00:00
Matt Caswell
18125f7f55
Implement internally opaque bn access from rsa
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 21:40:57 +00:00
Matt Caswell
68c29f61a4
Implement internally opaque bn access from evp
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 21:40:52 +00:00
Matt Caswell
5784a52145
Implement internally opaque bn access from ec
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 21:40:47 +00:00
Matt Caswell
c0d4390194
Implement internally opaque bn access from dsa
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 21:40:41 +00:00
Matt Caswell
829ccf6ab6
Implement internally opaque bn access from dh
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 21:40:32 +00:00
Matt Caswell
76b2a02274
Implement internally opaque bn access from asn1
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 21:40:26 +00:00
Matt Caswell
7a5233118c
Prepare exptest for bn opaquify
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 21:40:19 +00:00
Matt Caswell
85bcf27ccc
Prepare for bn opaquify. Implement internal helper functions.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 21:40:12 +00:00
Matt Caswell
dd703de022
Remove internal bn dependancies from speed.c
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 21:39:38 +00:00
Geoff Thorpe
e52a3c3d14
Include <openssl/foo.h> instead of "foo.h"
...
Exported headers shouldn't be included as "foo.h" by code from the same
module, it should only do so for module-internal headers. This is
because the symlinking of exported headers (from include/openssl/foo.h
to crypto/foo/foo.h) is being removed, and the exported headers are
being moved to the include/openssl/ directory instead.
Change-Id: I4c1d80849544713308ddc6999a549848afc25f94
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-12-08 14:21:35 -05:00
Matt Caswell
41bf250130
Fixed memory leak in the event of a failure of BUF_MEM_grow
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-08 16:43:25 +00:00
Matt Caswell
76e6509085
Fix memory leak in SSL_new if errors occur.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-08 16:42:59 +00:00
Dr. Stephen Henson
7bca0a1db5
Remove fips directories from mkfiles.pl
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 14:01:47 +00:00
Dr. Stephen Henson
71a5f534f1
Remove references to deleted fips directory from Makefile.org
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:25:38 +00:00
Dr. Stephen Henson
73e45b2dd1
remove OPENSSL_FIPSAPI
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:25:38 +00:00
Dr. Stephen Henson
b2ecc05a9a
remove FIPS_*_SIZE_T
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:25:38 +00:00
Dr. Stephen Henson
916e56208b
remove FIPS module code from crypto/evp
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:25:38 +00:00
Dr. Stephen Henson
ebdf37e4b1
remove FIPS module code from crypto/bn
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:25:38 +00:00
Dr. Stephen Henson
1c98de6d81
remove FIPS module code from crypto/ecdh
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:25:38 +00:00
Dr. Stephen Henson
dbfbe10a1f
remove FIPS module code from crypto/ecdsa
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:25:38 +00:00
Dr. Stephen Henson
1bfffe9bd0
Remove FIPS module code from crypto/dh
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:25:38 +00:00
Dr. Stephen Henson
fce8311cae
remove FIPS module code from crypto/dsa
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:25:38 +00:00
Dr. Stephen Henson
8d73db288f
remove FIPS module code from crypto/rsa
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:25:38 +00:00
Dr. Stephen Henson
05417a3476
Remove FIPS error library from openssl.ec mkerr.pl
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:25:38 +00:00
Dr. Stephen Henson
cc2f1045d1
make depend
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:25:38 +00:00
Dr. Stephen Henson
4fa579c58d
Remove fips.h reference.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:25:38 +00:00
Dr. Stephen Henson
e4e5bc39f9
Remove fips_constseg references.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:25:38 +00:00
Dr. Stephen Henson
85129ab579
remove another FIPSCANISTER reference
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:25:37 +00:00
Dr. Stephen Henson
b3da6f496b
remove unnecessary OPENSSL_FIPS reference
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:25:37 +00:00
Dr. Stephen Henson
c603c723ce
Remove OPENSSL_FIPSCANISTER code.
...
OPENSSL_FIPSCANISTER is only set if the fips module is being built
(as opposed to being used). Since the fips module wont be built in
master this is redundant.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:25:16 +00:00
Dr. Stephen Henson
225fce8a98
Remove FIPSCANISTERINTERNAL reference.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:23:54 +00:00
Dr. Stephen Henson
a42366a406
Remove fips utility build rules from test/Makefile
...
The fips test utilities are only build if an FIPS module is being
built from source. As this isn't done in master these are redundant.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:23:48 +00:00
Dr. Stephen Henson
f072785eb4
Remove fipscanister build functionality from makefiles.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:23:45 +00:00
Dr. Stephen Henson
78c990c156
Remove fipscanister from Configure, delete fips directory
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:18:43 +00:00
Dr. Stephen Henson
00b4ee7664
Remove some unnecessary OPENSSL_FIPS references
...
FIPS_mode() exists in all versions of OpenSSL but always returns 0 if OpenSSL is not FIPS
capable.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 13:18:43 +00:00
Matt Caswell
0c1bd7f03f
Add CHANGES entry for OCB
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 10:29:11 +00:00
Matt Caswell
3feb63054a
Added OPENSSL_NO_OCB guards
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 10:29:03 +00:00
Matt Caswell
e4bbee9633
Add documentation for OCB mode
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 10:28:56 +00:00
Matt Caswell
d827c5edb5
Add tests for OCB mode
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 10:28:47 +00:00
Matt Caswell
e6b336efa3
Add EVP support for OCB mode
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 10:28:34 +00:00
Matt Caswell
c857a80c9d
Add support for OCB mode as per RFC7253
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-08 10:27:56 +00:00
Emilia Kasper
376e2ca3e3
Clarify the return values for SSL_get_shared_curve.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-05 18:31:21 +01:00
Emilia Kasper
740580c2b2
Add extra checks for odd-length EC curve lists.
...
Odd-length lists should be rejected everywhere upon parsing. Nevertheless,
be extra careful and add guards against off-by-one reads.
Also, drive-by replace inexplicable double-negation with an explicit comparison.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-05 16:57:58 +01:00
Emilia Kasper
33d5ba8629
Reject elliptic curve lists of odd lengths.
...
The Supported Elliptic Curves extension contains a vector of NamedCurves
of 2 bytes each, so the total length must be even. Accepting odd-length
lists was observed to lead to a non-exploitable one-byte out-of-bounds
read in the latest development branches (1.0.2 and master). Released
versions of OpenSSL are not affected.
Thanks to Felix Groebert of the Google Security Team for reporting this issue.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-05 16:32:39 +01:00
Emilia Kasper
f50ffd10fa
Fix broken build
...
Add includes missing from commit 33eab3f6af
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
2014-12-05 16:18:20 +01:00
Kurt Roeckx
33eab3f6af
Replace GOST_R_MALLOC_FAILURE and GOST_R_NO_MEMORY with ERR_R_MALLOC_FAILURE
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-04 23:48:44 +01:00
Kurt Roeckx
f6fa7c5347
capi_get_provname: Check return values
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-04 23:48:44 +01:00
Jonas Maebe
f5905ba341
ssl_create_cipher_list: check whether push onto cipherstack succeeds
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-04 23:48:44 +01:00
Jonas Maebe
b3b966fb87
ssl_cert_dup: Fix memory leak
...
Always use goto err on failure and call ssl_cert_free() on the error path so all
fields and "ret" itself are freed
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-04 23:48:44 +01:00
Kurt Roeckx
6c42b39c95
dtls1_new: free s on error path
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-04 23:48:44 +01:00
Jonas Maebe
241e2dc936
dtls1_heartbeat: check for NULL after allocating s->cert->ctypes
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-04 23:48:44 +01:00
Jonas Maebe
d15f5df70d
dtls1_process_heartbeat: check for NULL after allocating buffer
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-04 23:48:44 +01:00
Jonas Maebe
b1a08ac71f
capi_get_key: check for NULL after allocating key
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-04 23:48:44 +01:00
Jonas Maebe
8607322765
capi_cert_get_fname: check for NULL after allocating wfname
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-04 23:48:44 +01:00
Jonas Maebe
e2140501fd
capi_get_provname: free name on error if it was malloc'ed
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-04 23:48:44 +01:00
Jonas Maebe
0716f9e405
pkey_gost_mac_keygen: check for NULL after allocating keydata
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-04 23:48:44 +01:00
Jonas Maebe
787e992965
pkey_gost_ctrl: check for NULL after allocating pctx->shared_ukm
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-04 23:48:43 +01:00
Kurt Roeckx
12478cc449
Update changes to indicate that SSLv2 support has been removed
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-04 15:51:28 +01:00
Matt Caswell
71c16698fa
Remove incorrect code inadvertently introduced through commit 59669b6ab.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-04 14:17:50 +00:00
Kurt Roeckx
45f55f6a5b
Remove SSLv2 support
...
The only support for SSLv2 left is receiving a SSLv2 compatible client hello.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-04 11:55:03 +01:00
Rich Salz
616f71e486
New location on website for binaries.
...
Reviewed-by: Bodo Moeller <bodo@openssl.org >
2014-12-03 10:55:31 -05:00
Matt Caswell
4bb8eb9ce4
Remove "#if 0" code
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-03 09:25:00 +00:00
Matt Caswell
047f21593e
Only use the fallback mtu after 2 unsuccessful retransmissions if it is less
...
than the mtu we are already using
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-03 09:24:53 +00:00
Matt Caswell
464ce92026
Updates to s_client and s_server to remove the constant 28 (for IPv4 header
...
and UDP header) when setting an mtu. This constant is not always correct (e.g.
if using IPv6). Use the new DTLS_CTRL functions instead.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-03 09:24:41 +00:00
Matt Caswell
d3d9eef316
If we really get a situation where the underlying mtu is less than the minimum
...
we will support then dtls1_do_write can go into an infinite loop. This commit
fixes that.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-03 09:24:28 +00:00
Matt Caswell
1620a2e49c
Fix dtls_query_mtu so that it will always either complete with an mtu that is
...
at least the minimum or it will fail.
There were some instances in dtls1_query_mtu where the final mtu can end up
being less than the minimum, i.e. where the user has set an mtu manually. This
shouldn't be allowed. Also remove dtls1_guess_mtu that, despite having
logic for guessing an mtu, was actually only ever used to work out the minimum
mtu to use.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-03 09:24:20 +00:00
Matt Caswell
59669b6abf
Remove instances in libssl of the constant 28 (for size of IPv4 header + UDP)
...
and instead use the value provided by the underlying BIO. Also provide some
new DTLS_CTRLs so that the library user can set the mtu without needing to
know this constant. These new DTLS_CTRLs provide the capability to set the
link level mtu to be used (i.e. including this IP/UDP overhead). The previous
DTLS_CTRLs required the library user to subtract this overhead first.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-03 09:24:12 +00:00
Matt Caswell
0d3ae34df5
There are a number of instances throughout the code where the constant 28 is
...
used with no explanation. Some of this was introduced as part of RT#1929. The
value 28 is the length of the IP header (20 bytes) plus the UDP header (8
bytes). However use of this constant is incorrect because there may be
instances where a different value is needed, e.g. an IPv4 header is 20 bytes
but an IPv6 header is 40. Similarly you may not be using UDP (e.g. SCTP).
This commit introduces a new BIO_CTRL that provides the value to be used for
this mtu "overhead". It will be used by subsequent commits.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-03 09:24:04 +00:00
Matt Caswell
6abb0d1f8e
The first call to query the mtu in dtls1_do_write correctly checks that the
...
mtu that we have received is not less than the minimum. If its less it uses the
minimum instead. The second call to query the mtu does not do that, but
instead uses whatever comes back. We have seen an instance in RT#3592 where we
have got an unreasonably small mtu come back. This commit makes both query
checks consistent.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-03 09:23:56 +00:00
Matt Caswell
001235778a
The SSL_OP_NO_QUERY_MTU option is supposed to stop the mtu from being
...
automatically updated, and we should use the one provided instead.
Unfortunately there are a couple of locations where this is not respected.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-03 09:23:46 +00:00
Matt Caswell
cf75017bfd
Verify that we have a sensible message len and fail if not
...
RT#3592 provides an instance where the OPENSSL_assert that this commit
replaces can be hit. I was able to recreate this issue by forcing the
underlying BIO to misbehave and come back with very small mtu values. This
happens the second time around the while loop after we have detected that the
MTU has been exceeded following the call to dtls1_write_bytes.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-03 09:23:09 +00:00
Kurt Roeckx
961d2ddb4b
Use the SSLv23 method by default
...
If SSLv2 and SSLv3 are both disabled we still support SSL/TLS.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-02 11:26:49 +01:00
Rich Salz
8cfe08b4ec
Remove all .cvsignore files
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-11-28 18:32:43 -05:00
Richard Levitte
91316e6765
Check for FindNextFile when defining it rather than FindFirstFile
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-28 23:27:21 +01:00
Richard Levitte
7a04b854d6
[PR3597] Advance to the next state variant when reusing messages.
...
Previously, state variant was not advanced, which resulted in state
being stuck in the st1 variant (usually "_A").
This broke certificate callback retry logic when accepting connections
that were using SSLv2 ClientHello (hence reusing the message), because
their state never advanced to SSL3_ST_SR_CLNT_HELLO_C variant required
for the retry code path.
Reported by Yichun Zhang (agentzh).
Signed-off-by: Piotr Sikora <piotr@cloudflare.com >
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-28 20:47:41 +01:00
Richard Levitte
8123d158ab
Correct some layout issues, convert all remaining tabs to appropriate amounts of spaces.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-28 16:56:37 +01:00
Alok Menghrajani
03b637a730
Improves the proxy certificates howto doc.
...
The current documentation contains a bunch of spelling and grammar mistakes. I also
found it hard to understand some paragraphs, so here is my attempt to improve its
readability.
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-28 16:55:59 +01:00
Matt Caswell
f9ea4deba0
Fix warning in ssl2_enc
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-11-27 21:41:17 +00:00
Matt Caswell
eceef8fb86
Remove more references to dtls1_enc
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-11-27 21:40:59 +00:00
Matt Caswell
81ec01b217
Check EVP_Cipher return values for SSL2
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-11-27 21:40:39 +00:00
Matt Caswell
4b87706d20
Delete unused file
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-11-27 21:40:16 +00:00
Matt Caswell
fe78f08d15
Add checks to the return value of EVP_Cipher to prevent silent encryption failure.
...
PR#1767
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-11-27 21:39:47 +00:00
Matt Caswell
fc3968a25c
Remove redundant checks in ssl_cert_dup. This was causing spurious error messages when using GOST
...
PR#3613
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-11-27 20:50:44 +00:00
Matt Caswell
5e31a40f47
Tidy up ocsp help output
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-27 14:08:07 +00:00
André Guerreiro
de87dd46c1
Add documentation on -timeout option in the ocsp utility
...
PR#3612
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-27 14:07:50 +00:00
Guenter
333fad9f2d
NetWare compilation fix.
...
Workaround for NetWare CodeWarrior compiler which doesn't properly lookup
includes when in same directory as the C file which includes it.
PR#3569
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-11-27 14:02:09 +00:00
Matt Caswell
6484958645
Updates to X509_NAME_get_index_by_NID.pod submitted by user Bernardh via the wiki
...
Minor changes made by Matt Caswell
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-27 13:56:07 +00:00
Matt Caswell
f281b8df70
Updates to X509_NAME_add_entry_by_txt.pod submitted by user Bernardh via the wiki
...
Minor changes made by Matt Caswell.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-27 13:55:54 +00:00
Matt Caswell
34890ac18e
Updates to EVP_PKEY_encrypt.pod submitted by user Bernardh via the wiki
...
Minor changes made by Matt Caswell.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-27 13:55:37 +00:00
Matt Caswell
f67203836c
Add include of ssl.h which is required by srtp.h
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-27 13:16:36 +00:00
Matt Caswell
8a35dbb6d8
Fixed memory leak due to incorrect freeing of DTLS reassembly bit mask
...
PR#3608
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-11-26 10:10:21 +00:00
Matt Caswell
3a0765882c
Corrected comments in ssl.h about SSLv23_method and friends
...
PR#3574
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-25 22:23:24 +00:00
Dr. Stephen Henson
7d4cdededc
Print out Suite B status.
...
When using the -xcert option to test certificate validity print out
if we pass Suite B compliance. We print out "not tested" if we aren't
in Suite B mode.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-20 22:13:05 +00:00
Dr. Stephen Henson
7255ca99df
Fix SuiteB chain checking logic.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-20 22:13:05 +00:00
Annie Yousar
c56a50b229
RT2679: Fix error if keysize too short
...
In keygen, return KEY_SIZE_TOO_SMALL not INVALID_KEYBITS.
** I also increased the minimum from 256 to 512, which is now
documented in CHANGES file. **
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-20 13:45:25 -05:00
Rich Salz
14d3b76be8
RT3488: Update doc for OPENSSL_config
...
Fix CONF_load_modules to CONF_modules_load.
Document that it calls exit.
Advise against using it now.
Add an error print to stderr.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-20 13:40:03 -05:00
David Benjamin
9e189b9dc1
Do not resume a session if the negotiated protocol version does not match
...
the session's version (server).
See also BoringSSL's commit bdf5e72f50e25f0e45e825c156168766d8442dde.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-20 16:29:04 +01:00
Matt Caswell
8d02bebddf
When using EVP_PKEY_derive with a KDF set, a negative error from
...
ECDH_compute_key is silently ignored and the KDF is run on duff data
Thanks to github user tomykaira for the suggested fix.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-20 15:20:37 +00:00
Emilia Kasper
31832e8ff1
Clean up CHANGES
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-20 14:57:15 +01:00
Emilia Kasper
e94a6c0ede
Ensure SSL3_FLAGS_CCS_OK (or d1->change_cipher_spec_ok for DTLS) is reset
...
once the ChangeCipherSpec message is received. Previously, the server would
set the flag once at SSL3_ST_SR_CERT_VRFY and again at SSL3_ST_SR_FINISHED.
This would allow a second CCS to arrive and would corrupt the server state.
(Because the first CCS would latch the correct keys and subsequent CCS
messages would have to be encrypted, a MitM attacker cannot exploit this,
though.)
Thanks to Joeri de Ruiter for reporting this issue.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-20 14:57:15 +01:00
Emilia Kasper
de2c7504eb
Always require an advertised NewSessionTicket message.
...
The server must send a NewSessionTicket message if it advertised one
in the ServerHello, so make a missing ticket message an alert
in the client.
An equivalent change was independently made in BoringSSL, see commit
6444287806d801b9a45baf1f6f02a0e3a16e144c.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-20 14:57:15 +01:00
Emilia Kasper
980bc1ec61
Remove ssl3_check_finished.
...
The client sends a session ID with the session ticket, and uses
the returned ID to detect resumption, so we do not need to peek
at handshake messages: s->hit tells us explicitly if we're resuming.
An equivalent change was independently made in BoringSSL, see commit
407886f589cf2dbaed82db0a44173036c3bc3317.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-20 14:57:15 +01:00
Emilia Kasper
7b3ba508af
Set s->hit when resuming from external pre-shared secret.
...
The same change was independently made in BoringSSL, see commit
9eaeef81fa2d4fd6246dc02b6203fa936a5eaf67
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-20 14:57:15 +01:00
Emilia Kasper
a06cd5d056
Reset s->tlsext_ticket_expected in ssl_scan_serverhello_tlsext.
...
This ensures that it's zeroed even if the SSL object is reused
(as in ssltest.c). It also ensures that it applies to DTLS, too.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-20 14:57:15 +01:00
Matt Caswell
13d568661c
Fix s_server -ssl2. Previously this reported "Error setting EC curve"
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-19 23:55:42 +00:00
Dr. Stephen Henson
764b6a3551
Fix excert logic.
...
If no keyfile has been specified use the certificate file instead.
Fix typo: we need to check the chain is not NULL, not the chain file.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 786370b1b0 )
2014-11-19 22:52:56 +00:00
Dr. Stephen Henson
3881d8106d
New option no-ssl3-method which removes SSLv3_*method
...
When no-ssl3 is set only make SSLv3 disabled by default. Retain -ssl3
options for s_client/s_server/ssltest.
When no-ssl3-method is set SSLv3_*method() is removed and all -ssl3
options.
We should document this somewhere, e.g. wiki, FAQ or manual page.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-11-19 18:11:37 +00:00
Dr. Stephen Henson
5a3d8eebb7
Only handle RI extension for SSLv3
...
Don't send or parse any extensions other than RI (which is needed
to handle secure renegotation) for SSLv3.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-19 15:12:08 +00:00
Dr. Stephen Henson
e469af8d05
Process signature algorithms before deciding on certificate.
...
The supported signature algorithms extension needs to be processed before
the certificate to use is decided and before a cipher is selected (as the
set of shared signature algorithms supported may impact the choice).
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 56e8dc542b )
Conflicts:
ssl/ssl.h
ssl/ssl_err.c
2014-11-19 14:49:12 +00:00
Matt Caswell
bcb245a74a
Added references to RFC 7027
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-18 13:01:45 +00:00
Dr. Stephen Henson
1a14b47ed9
Prevent use of binary curves when OPENSSL_NO_EC2M is defined
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-18 13:01:45 +00:00
Matt Caswell
d253c9cd30
Fixed cms-test.pl for no-ec2m
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-18 13:01:45 +00:00
Matt Caswell
cffeacd91e
Updated comment references to draft-ietf-tls-ecc-12 to refer to RFC4492 instead
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-18 13:01:45 +00:00
Jan Hykel
012aa9ec76
Don't use msg on error.
...
Don't attempt to access msg structure if recvmsg returns an error.
PR#3483
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-11-17 12:40:44 +00:00
Mike Bland
32bb5c3953
Add whrlpool and camellia .s files to perlasm list
...
Change-Id: I626d751f19f24df6b967c17498d6189cc0acb96c
Signed-off-by: Mike Bland <mbland@acm.org >
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-11-16 16:45:11 -05:00
Mike Bland
13d30e27c2
Add missing SRC variable
...
This is the only Makefile without SRC defined. This change enables a
standard Makefile include directive to cover crypto/jpake/*.d files.
This was automatically applied by AddSrcVarIfNeeded() in:
https://code.google.com/p/mike-bland/source/browse/openssl/update_makefiles.py
Change-Id: I030204a1bc873b5de5b06c8ddc0b94bb224c6650
Signed-off-by: Mike Bland <mbland@acm.org >
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-11-16 16:45:01 -05:00
Mike Bland
dbaf608320
Remove redundant test targets outside of test/
...
These correspond to targets of the same name in test/Makefile that clash when
using the single-makefile build method using GitConfigure and GitMake.
Change-Id: If7e900c75f4341b446608b6916a3d76f202026ea
Signed-off-by: Mike Bland <mbland@acm.org >
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-11-16 16:44:51 -05:00
Mike Bland
8308411297
Improve variable parsing when generating MINFO
...
Before this change, variables for which a '=' appeared in the assignment would
be parsed as the entire string up until the final '='. For example:
BUILD_CMD=shlib_target=; if [ -n "$(SHARED_LIBS)" ]; then \
would result in the variable name "BUILD_CMD=shlib_target". This doesn't
appear to harm the current generation of MINFO, but creates problems for other
Makefile-related work I'm attempting.
Change-Id: I1f3a606d67fd5464bb459e8f36c23b3e967b77e1
Signed-off-by: Mike Bland <mbland@acm.org >
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-11-16 16:44:44 -05:00
Mike Bland
a4b8457db9
{,darwin64-}debug-test-64-clang Configure targets
...
These are based on debug-ben-debug-64-clang and is intended to produce
consistent settings for folks involved in the unit testing effort detailed at:
http://wiki.openssl.org/index.php/Unit_Testing
-fsanitize has been removed from the set of clang flags for now. Apparently
clang 3.1, which ships with FreeBSD 9.1, completely ignores -fsanitize. Clang
3.3, which ships with FreeBSD 9.2, compiles with it, but fails to link due to
the absence of libasan:
http://lists.freebsd.org/pipermail/freebsd-hackers/2013-December/043995.html
https://www.mail-archive.com/cfe-commits@cs.uiuc.edu/msg92260.html
http://reviews.llvm.org/D2644
We need -Wno-error=unused-const-variable because of this error:
.../crypto/ec/ec_lib.c:74:19: error: unused variable 'EC_version' [-Werror,-Wunused-const-variable]
static const char EC_version[] = "EC" OPENSSL_VERSION_PTEXT;
Change-Id: I2cba53537137186114c083049ea1233550a741f9
Signed-off-by: Mike Bland <mbland@acm.org >
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-11-16 16:44:37 -05:00
Mike Bland
5444b11bef
Emit PERLASM_SCHEME to fix GitMake on OS X
...
This fixes the errors when trying to assemble .s files using GitMake on OS X.
Change-Id: I2221f558619302d22e0c57d7203173d634155678
Signed-off-by: Mike Bland <mbland@acm.org >
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-11-16 16:44:26 -05:00
Mike Bland
bc095c3d3c
Add cscope.out and .d files to .gitignore
...
cscope.out is generated by cscope as described in:
http://wiki.openssl.org/index.php/Testing_and_Development_Tools_and_Tips
.d files are compiler-generated Makefile dependency files (e.g. using
'gcc -MMD -MP foo.c').
Change-Id: I2338858a6b6ee0527837d10a8b55cff1689023fd
Signed-off-by: Mike Bland <mbland@acm.org >
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-11-16 16:41:40 -05:00
Dr. Stephen Henson
f756f1fc83
Additional output for ssltest.
...
Print out more details of the conection in ssltest specifically:
server certificate curve name for EC, server temporary key (if any)
and peer signing digest.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-13 13:44:23 +00:00
Dr. Stephen Henson
de94222dba
Add SSL_CONF support to ssltest.
...
Add command line support for SSL_CONF: server side arguments are
prefixed by -s_ (e.g. -s_no_ssl3) and client side with -c_.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-13 13:44:22 +00:00
Dr. Stephen Henson
55f7fb8848
Fix cross reference table generator.
...
If the hash or public key algorithm is "undef" the signature type
will receive special handling and shouldn't be included in the
cross reference table.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-11-13 13:34:42 +00:00
Alok Menghrajani
5211e094de
Fixes a minor typo in the EVP docs.
...
Out is the buffer which needs to contain at least inl + cipher_block_size - 1 bytes. Outl
is just an int*.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-11-12 21:03:52 +00:00
Michal Bozon
ae64fb528e
Correct timestamp output when clock_precision_digits > 0
...
PR#3535
Reviewed-by: Stephen Henson <steve@openssl.org >
2014-11-12 20:51:41 +00:00
Matt Caswell
e04d426bf9
Fix free of garbage pointer. PR#3595
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-11-12 20:26:31 +00:00
Kurt Roeckx
67b8bcee95
Fix warning about negative unsigned intergers
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-11-11 15:46:28 +01:00
Russell Coker
f8ae603238
Fix datarace reported by valgrind/helgrind
...
This doesn't really fix the datarace but changes it so it can only happens
once. This isn't really a problem since we always just set it to the same
value. We now just stop writing it after the first time.
PR3584, https://bugs.debian.org/534534
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-11-10 18:34:11 +01:00
Kurt Roeckx
bfc973f46c
Fix spelling of EECDH
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-10 10:57:26 +01:00
Andy Polyakov
6696203963
armv4cpuid.S: fix compilation error in pre-ARMv7 build.
...
PR: 3474
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-10-30 20:24:29 +01:00
Dr. Stephen Henson
ecb9966e7c
Fix WIN32 build by disabling bn* calls.
...
The trial division and probable prime with coprime tests are disabled
on WIN32 builds because they use internal functions not exported from
the WIN32 DLLs.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-10-29 22:23:31 +00:00
Andy Polyakov
c381b63764
ec/asm/ecp_nistz256-x86_64.pl: fix inconsistency in path handling.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-10-29 10:57:46 +01:00
Andy Polyakov
d45282fc7c
md32_common.h: address compiler warning in HOST_c2l.
...
Reviewed-by: Stephen Henson <steve@openssl.org >
2014-10-29 10:48:39 +01:00
Samuel Neves
d2fa182988
Use only unsigned arithmetic in constant-time operations
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-10-28 20:40:45 +01:00
Emilia Kasper
d663df2399
Tighten session ticket handling
...
Tighten client-side session ticket handling during renegotiation:
ensure that the client only accepts a session ticket if the server sends
the extension anew in the ServerHello. Previously, a TLS client would
reuse the old extension state and thus accept a session ticket if one was
announced in the initial ServerHello.
Reviewed-by: Bodo Moeller <bodo@openssl.org >
2014-10-28 17:35:59 +01:00
Emilia Kasper
49b0dfc502
Add missing CHANGES interval [1.0.1h, 1.0.1i]
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-10-27 19:53:21 +01:00
Emilia Kasper
18a2d293f1
Sync CHANGES
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-10-27 17:51:34 +01:00
Emilia Kasper
fd28a41ec8
Fix ssltest logic when some protocols are compiled out.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
2014-10-27 16:25:17 +01:00
Dr. Stephen Henson
14e14bf696
Copy negotiated parameters in SSL_set_SSL_CTX.
...
SSL_set_SSL_CTX is used to change the SSL_CTX for SNI, keep the
supported signature algorithms and raw cipherlist.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-10-24 13:46:37 +01:00
Dr. Stephen Henson
c800c27a8c
Process signature algorithms in ClientHello late.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-10-24 13:46:37 +01:00
Andy Polyakov
3ff08e1dde
ecp_nistz256 update.
...
Facilitate switch to custom scatter-gather routines. This modification
does not change algorithms, only makes it possible to implement
alternative. This is achieved by a) moving precompute table to assembly
(perlasm parses ecp_nistz256_table.c and is free to rearrange data to
match gathering algorithm); b) adhering to explicit scatter subroutine
(which for now is simply a memcpy). First implementations that will use
this option are 32-bit assembly implementations, ARMv4 and x86, where
equivalent of current read-whole-table-select-single-value algorithm
is too time-consuming. [On side note, switching to scatter-gather on
x86_64 would allow to improve server-side ECDSA performance by ~5%].
Reviewed-by: Bodo Moeller <bodo@openssl.org >
2014-10-23 16:08:44 +02:00
Andy Polyakov
b06f7d9ac0
Configure: add ios64 target.
...
Reviewed-by: Steve Marquess <marquess@openssl.org >
2014-10-23 16:04:01 +02:00
Andy Polyakov
9f4bd9d5f9
Add missing credit.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-10-22 09:35:51 +02:00
Bodo Moeller
98f1ac7df5
Fix and improve SSL_MODE_SEND_FALLBACK_SCSV documentation.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-10-21 22:43:08 +02:00
Bodo Moeller
8cb30232ed
When processing ClientHello.cipher_suites, don't ignore cipher suites
...
listed after TLS_FALLBACK_SCSV.
RT: 3575
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2014-10-21 22:24:42 +02:00
Kurt Roeckx
392fa7a952
Keep old method in case of an unsupported protocol
...
When we're configured with no-ssl3 and we receive an SSL v3 Client Hello, we set
the method to NULL. We didn't used to do that, and it breaks things. This is a
regression introduced in 62f45cc27d . Keep the old
method since the code is not able to deal with a NULL method at this time.
CVE-2014-3569, PR#3571
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-10-21 20:45:15 +02:00
Tim Hudson
c882abd522
no-ssl2 with no-ssl3 does not mean drop the ssl lib
...
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
2014-10-20 15:12:17 +10:00
Kurt Cancemi
87d388c955
RT3547: Add missing static qualifier
...
Reviewed-by: Ben Laurie <ben@openssl.org >
2014-10-17 11:41:39 +02:00
Tim Hudson
c6e9b39ce8
Add constant_time_locl.h to HEADERS,
...
so the Win32 compile picks it up correctly.
Reviewed-by: Richard Levitte <levitte@openssl.org >
Conflicts:
crypto/Makefile
2014-10-15 17:00:06 +02:00
Richard Levitte
7f09a8773b
Include "constant_time_locl.h" rather than "../constant_time_locl.h".
...
The different -I compiler parameters will take care of the rest...
Reviewed-by: Tim Hudson <tjh@openssl.org >
Conflicts:
crypto/evp/evp_enc.c
crypto/rsa/rsa_oaep.c
crypto/rsa/rsa_pk1.c
2014-10-15 17:00:06 +02:00
Matt Caswell
ed13270d2e
Updates to NEWS file
...
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2014-10-15 08:56:16 -04:00
Matt Caswell
53afbe12ba
Updates CHANGES file
...
Reviewed-by: Bodo Möller <bodo@openssl.org >
2014-10-15 08:56:16 -04:00
Geoff Thorpe
62f45cc27d
Fix no-ssl3 configuration option
...
CVE-2014-3568
Reviewed-by: Emilia Kasper <emilia@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-10-15 08:56:16 -04:00
Dr. Stephen Henson
7482705548
Fix for session tickets memory leak.
...
CVE-2014-3567
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-10-15 08:56:16 -04:00
Matt Caswell
3dd814ac4d
Fix SRTP compile issues for windows
...
Related to CVE-2014-3513
This fix was developed by the OpenSSL Team
Reviewed-by: Tim Hudson <tjh@openssl.org >
Conflicts:
util/mkdef.pl
util/ssleay.num
2014-10-15 08:56:16 -04:00
Matt Caswell
e659eff2c0
Fix for SRTP Memory Leak
...
CVE-2014-3513
This issue was reported to OpenSSL on 26th September 2014, based on an original
issue and patch developed by the LibreSSL project. Further analysis of the issue
was performed by the OpenSSL team.
The fix was developed by the OpenSSL team.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-10-15 08:56:16 -04:00
Bodo Moeller
0b382a8e8d
Fix SSL_R naming inconsistency.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-10-15 14:48:14 +02:00
Andy Polyakov
69d5747f90
aesni-x86_64.pl: make ECB subroutine Windows ABI compliant.
...
RT: 3553
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2014-10-15 11:10:08 +02:00
Bodo Moeller
fb0e87fb67
Add TLS_FALLBACK_SCSV documentation, and move s_client -fallback_scsv
...
handling out of #ifndef OPENSSL_NO_DTLS1 section.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-10-15 10:43:50 +02:00
Bodo Moeller
cf6da05304
Support TLS_FALLBACK_SCSV.
...
Reviewed-by: Stephen Henson <steve@openssl.org >
2014-10-15 04:03:28 +02:00
Dr. Stephen Henson
ffa08b3242
Remove reference to deleted md4.c
...
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-10-11 13:37:44 +01:00
Dr. Stephen Henson
f3014206a2
Disable encrypt them mac for SSL 3.0 and stream ciphers (RC4 only).
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-10-10 13:23:29 +01:00
Matt Caswell
e0fdea3e49
Removed duplicate definition of PKCS7_type_is_encrypted
...
Patch supplied by Matthieu Patou <mat@matws.net >, and modified to also
remove duplicate definition of PKCS7_type_is_digest.
PR#3551
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-10-06 23:42:13 +01:00
Ben Laurie
71614df485
Fix single makefile.
...
Reviewed-by: Geoffrey Thorpe <geoff@geoffthorpe.net >
2014-10-06 18:07:55 +01:00
Rich Salz
5aed169305
RT3462: Document actions when data==NULL
...
If data is NULL, return the size needed to hold the
derived key. No other API to do this, so document
the behavior.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-10-03 10:39:00 -04:00
Bodo Moeller
429a25b97d
DTLS 1.2 support has been added to 1.0.2.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-10-02 17:56:40 +02:00
Andy Polyakov
ae4af7a067
crypto/cast/asm/cast-586.pl: +5% on PIII and remove obsolete readme.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-10-01 23:59:14 +02:00
Rich Salz
df8c39d522
RT3549: Remove obsolete files in crypto
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-10-01 16:05:47 -04:00
Rich Salz
d5f34443ad
RT2910: Remove des.c and its Makefile target
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-09-30 16:44:10 -04:00
Rich Salz
9208640a36
RT2309: Fix podpage MMNNFFPPS->MNNFFPPS
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-09-30 16:31:11 -04:00
Dr. Stephen Henson
4b6dee2b14
Parse custom extensions after internal extensions.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-09-30 20:10:50 +01:00
Andy Polyakov
55c7a4cf11
e_os.h: refine inline override logic (to address warnings in debug build).
...
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2014-09-30 21:05:33 +02:00
Andy Polyakov
323154be33
crypto/bn/bn_nist.c: bring original failing code back for reference.
...
RT: 3541
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2014-09-30 21:00:44 +02:00
Dr. Stephen Henson
7c4776251e
Add additional explanation to CHANGES entry.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-29 12:25:10 +01:00
Dr. Stephen Henson
1cfd255c91
Add additional DigestInfo checks.
...
Reencode DigestInto in DER and check against the original: this
will reject any improperly encoded DigestInfo structures.
Note: this is a precautionary measure, there is no known attack
which can exploit this.
Thanks to Brian Smith for reporting this issue.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-29 12:01:05 +01:00
Rich Salz
3d81ec5b92
Remove #ifdef's for IRIX_CC_BUG
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-09-25 14:43:24 -04:00
Rich Salz
008bef521c
RT3544: Must update TABLE after Configure change
...
Also add comment to Configure reminding people to do that.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-09-25 13:18:22 -04:00
Emilia Kasper
fdc35a9d3e
Add missing tests
...
Accidentally omitted from commit 455b65dfab
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-09-25 13:46:08 +02:00
Dr. Stephen Henson
5886354dcc
Use correct function name: CMS_add1_signer()
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-09-25 00:03:27 +01:00
Andy Polyakov
8b07c005fe
crypto/bn/bn_nist.c: work around MSC ARM compiler bug.
...
RT: 3541
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2014-09-25 00:42:26 +02:00
Andy Polyakov
40155f4089
e_os.h: allow inline functions to be compiled by legacy compilers.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-09-25 00:32:56 +02:00
Rich Salz
92c7846372
RT3544: Remove MWERKS support
...
The following #ifdef tests were all removed:
__MWERKS__
MAC_OS_pre_X
MAC_OS_GUSI_SOURCE
MAC_OS_pre_X
OPENSSL_SYS_MACINTOSH_CLASSIC
OPENSSL_SYS_MACOSX_RHAPSODY
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-09-24 18:07:29 -04:00
Emilia Kasper
4aac102f75
RT3425: constant-time evp_enc
...
Do the final padding check in EVP_DecryptFinal_ex in constant time to
avoid a timing leak from padding failure.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-09-24 16:19:18 +02:00
Emilia Kasper
455b65dfab
RT3067: simplify patch
...
(Original commit adb46dbc6d )
Use the new constant-time methods consistently in s3_srvr.c
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-09-24 15:35:02 +02:00
Emilia Kasper
294d1e36c2
RT3066: rewrite RSA padding checks to be slightly more constant time.
...
Also tweak s3_cbc.c to use new constant-time methods.
Also fix memory leaks from internal errors in RSA_padding_check_PKCS1_OAEP_mgf1
This patch is based on the original RT submission by Adam Langley <agl@chromium.org >,
as well as code from BoringSSL and OpenSSL.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-09-24 12:45:42 +02:00
Emilia Kasper
51b7be8d5f
make update
...
Sync libeay.num from 1.0.2
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2014-09-23 18:37:23 +02:00
Emilia Kasper
5f85f64f7e
Note i2d_re_X509_tbs and related changes in CHANGES
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit e9128d9401 )
2014-09-23 18:28:10 +02:00
Andy Polyakov
507efe7372
CHANGES: mention ECP_NISTZ256.
...
Reviewed-by: Bodo Moeller <bodo@openssl.org >
2014-09-23 14:54:34 +02:00
Andy Polyakov
4513b1b641
crypto/rsa/rsa_chk.c: harmonize error codes.
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-21 23:05:13 +02:00
Andy Polyakov
be07ae9b10
crypto/ecp_nistz256.c: harmonize error codes.
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-21 15:56:02 +02:00
Tim Hudson
b5ff559ff9
Fixed error introduced in commit f2be92b94d
...
that fixed PR#3450 where an existing cast masked an issue when i was changed
from int to long in that commit
Picked up on z/linux (s390) where sizeof(int)!=sizeof(long)
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-09-21 21:54:31 +10:00
Andy Polyakov
d475b2a3bf
Harmonize Tru64 and Linux make rules.
...
RT: 3333,3165
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-09-20 10:20:38 +02:00
Dr. Stephen Henson
16e5b45f72
Fix warning.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-20 00:08:56 +01:00
Rich Salz
e8185aea87
RT3291: Add -crl and -revoke options to CA.pl
...
Document the new features
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-18 21:45:41 -04:00
Jake Goulding
99b00fd993
RT2301: GetDIBits, not GetBitmapBits in rand_win
...
GetDIBits has been around since Windows2000 and
BitBitmapBits is an old Win16 compatibility function
that is much slower.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-18 16:41:31 -04:00
Andy Polyakov
569e2d1257
crypto/bn/asm/x86_64-mont*.pl: add missing clang detection.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-09-12 00:44:51 +02:00
Andy Polyakov
847147908b
Configure: engage ECP_NISTZ256.
...
RT: 3149
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-09-12 00:38:57 +02:00
Andy Polyakov
4d3fa06fce
Add ECP_NISTZ256 by Shay Gueron, Intel Corp.
...
RT: 3149
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-09-12 00:37:41 +02:00
Andy Polyakov
f54be179aa
Reserve option to use BN_mod_exp_mont_consttime in ECDSA.
...
Submitted by Shay Gueron, Intel Corp.
RT: 3149
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-09-12 00:13:20 +02:00
Andy Polyakov
902b30df19
perlasm/x86_64-xlate.pl: handle inter-bank movd.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-09-12 00:06:00 +02:00
Rich Salz
6f46c3c3b0
RT2772 update: c_rehash was broken
...
Move the readdir() lines out of the if statement, so
that flist is available globally.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-11 13:08:30 -04:00
Rich Salz
cb4bb56bae
RT3271 update; extra; semi-colon; confuses; some;
...
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-09-10 15:08:40 -04:00
Rich Salz
b2aa38a980
RT2560: missing NULL check in ocsp_req_find_signer
...
If we don't find a signer in the internal list, then fall
through and look at the internal list; don't just return NULL.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-10 12:18:50 -04:00
Rich Salz
468ab1c20d
RT2196: Clear up some README wording
...
Say where to email bug reports.
Mention general RT tracker info in a separate paragraph.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-09 17:48:27 -04:00
Matt Caswell
eb63bce040
RT3192: spurious error in DSA verify
...
This is funny; Ben commented in the source, Matt opend a ticket,
and Rich is doing the submit. Need more code-review? :)
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-09 17:10:15 -04:00
Rich Salz
c939cca1a3
Merge branch 'master' of git.openssl.org:openssl
...
Previous commit was reviewed by Geoff, not Stephen:
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
2014-09-09 17:06:50 -04:00
Rich Salz
843921f298
RT3271: Don't use "if !" in shell lines
...
For portability don't use "if ! expr"
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
2014-09-09 17:06:14 -04:00
Rich Salz
b999f66e34
RT3271: Don't use "if !" in shell lines
...
For portability don't use "if ! expr"
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-09 17:05:28 -04:00
Geoff Keating
1f18f50c4b
RT1909: Omit version for v1 certificates
...
When calling X509_set_version to set v1 certificate, that
should mean that the version number field is omitted.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-09 15:15:45 -04:00
Kurt Cancemi
4eadd11cd9
RT3506: typo's in ssltest
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-09 13:57:58 -04:00
Paul Suhler
4cd1119df3
RT2841: Extra return in check_issued
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-08 18:50:07 -04:00
Kurt Roeckx
44e0c2bae4
RT2626: Change default_bits from 1K to 2K
...
This is a more comprehensive fix. It changes all
keygen apps to use 2K keys. It also changes the
default to use SHA256 not SHA1. This is from
Kurt's upstream Debian changes.
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-09-08 17:21:04 -04:00
Rich Salz
5f855569c4
RT2600: Change Win line-endings to Unix.
...
For consistency.
Reviewed-by: Bodo Moeller <bodo@openssl.org >
2014-09-08 16:40:24 -04:00
Matthias Andree
a787c2590e
RT2272: Add old-style hash to c_rehash
...
In addition to Matthias's change, I also added -n to
not remove links. And updated the manpage.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-08 11:34:44 -04:00
Bjoern Zeeb
6452a139fe
RT671: export(i2s|s2i|i2v|v2i)_ASN1_(IA5|BIT)STRING
...
The EXT_BITSTRING and EXT_IA5STRING are defined in x509v3.h, but
the low-level functions are not public. They are useful, no need
to make them static. Note that BITSTRING already was exposed since
this RT was created, so now we just export IA5STRING functions.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-08 11:27:07 -04:00
Rich Salz
e9edfc4196
RT468: SSL_CTX_sess_set_cache_size wrong
...
The documentation is wrong about what happens when the
session cache fills up.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-08 11:26:03 -04:00
Erik Auerswald
af4c6e348e
RT3301: Discard too-long heartbeat requests
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-08 11:22:35 -04:00
Dario B
98ecf60ba6
RT3291: Add -crl and -revoke options to CA.pl
...
I added some error-checking while integrating this patch.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-08 11:21:17 -04:00
Scott Schaefer
fe7573042f
RT2518: fix pod2man errors
...
pod2man now complains when item tags are not sequential.
Also complains about missing =back and other tags.
Silence the warnings; most were already done.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-08 11:18:30 -04:00
Rich Salz
2afb29b480
RT992: RSA_check_key should have a callback arg
...
The original RT request included a patch. By the time
we got around to doing it, however, the callback scheme
had changed. So I wrote a new function RSA_check_key_ex()
that uses the BN_GENCB callback. But thanks very much
to Vinet Sharma <vineet.sharma@gmail.com > for the
initial implementation.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-08 11:11:49 -04:00
Rich Salz
be0bd11d69
RT3108: OPENSSL_NO_SOCK should imply OPENSSL_NO_DGRAM
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-08 11:07:45 -04:00
Robin Lee
83e4e03eeb
RT3031: Need to #undef some names for win32
...
Copy the ifdef/undef stanza from x509.h to x509v3.h
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-08 11:05:48 -04:00
Rich Salz
3173622ef6
RT2849: Redundant check of "dsa" variable.
...
In the current code, the check isn't redundant.
And in fact the REAL check was missing.
This avoids a NULL-deref crash.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-08 10:53:59 -04:00
Martin Olsson
683cd7c948
RT2843: Remove another spurious close-comment token
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-08 10:52:00 -04:00
Martin Olsson
6b0dc6eff1
RT2842: Remove spurious close-comment marker.
...
Also, I (rsalz) changed "#ifdef undef" to "#if 0"
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-08 10:50:08 -04:00
Rich Salz
76e8671c5a
Merge branch 'master' of git.openssl.org:openssl
...
empty merge; script hiccup.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-08 10:46:05 -04:00
Rich Salz
4f13dabe72
RT1834: Fix PKCS7_verify return value
...
The function returns 0 or 1, only.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-08 10:43:08 -04:00
Rich Salz
b0e659cfac
RT1832: Fix PKCS7_verify return value
...
The function returns 0 or 1, only.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-08 10:38:29 -04:00
Alon Bar-Lev
8842987e5a
RT1771: Add string.h include.
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-08 10:37:28 -04:00
Viktor Dkhovni
5a8addc432
RT1325,2973: Add more extensions to c_rehash
...
Regexp was bracketed wrong.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-07 18:24:15 -04:00
Emilia Kasper
2f32016bb9
make update
...
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2014-09-05 17:19:36 +02:00
Emilia Kasper
95b1752cc7
Add i2d_re_X509_tbs
...
i2d_re_X509_tbs re-encodes the TBS portion of the certificate.
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2014-09-05 17:18:06 +02:00
Dr. Stephen Henson
b2774f6e17
Add CHANGES entry for SCT viewer code.
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-09-05 13:44:18 +01:00
Dr. Stephen Henson
b0bbe49360
sync ordinals with 1.0.2
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-05 13:44:18 +01:00
Adam Langley
be0d851732
psk_client_callback, 128-byte id bug.
...
Fix a bug in handling of 128 byte long PSK identity in
psk_client_callback.
OpenSSL supports PSK identities of up to (and including) 128 bytes in
length. PSK identity is obtained via the psk_client_callback,
implementors of which are expected to provide a NULL-terminated
identity. However, the callback is invoked with only 128 bytes of
storage thus making it impossible to return a 128 byte long identity and
the required additional NULL byte.
This CL fixes the issue by passing in a 129 byte long buffer into the
psk_client_callback. As a safety precaution, this CL also zeroes out the
buffer before passing it into the callback, uses strnlen for obtaining
the length of the identity returned by the callback, and aborts the
handshake if the identity (without the NULL terminator) is longer than
128 bytes.
(Original patch amended to achieve strnlen in a different way.)
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-09-05 12:21:44 +02:00
Richard Levitte
360928b7d0
Followup on RT3334 fix: make sure that a directory that's the empty
...
string returns 0 with errno = ENOENT.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-09-03 21:57:44 +02:00
Phil Mesnier
6a14fe7576
RT3334: Fix crypto/LPdir_win.c
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-09-03 21:56:40 +02:00
Clang via Jeffrey Walton
0ff3687eab
RT3140: Possibly-unit variable in pem_lib.c
...
Can't really happen, but the flow of control isn't obvious.
Add an initializer.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-09-02 23:37:17 -04:00
Emilia Kasper
86f50b36e6
Make the inline const-time functions static.
...
"inline" without static is not correct as the compiler may choose to ignore it
and will then either emit an external definition, or expect one.
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
2014-09-02 15:21:01 +02:00
Kurt Cancemi
b0426a0f8c
RT3508: Remove unused variable introduced by b09eb24
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-31 23:43:37 -04:00
Adam Williamson
3aba132d61
RT3511: doc fix; req default serial is random
...
RT842, closed back in 2004, changed the default serial number
to be a random number rather than zero. Finally time to update
the doc
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-31 23:40:56 -04:00
Rich Salz
9fc8dc5469
Add explanatory note to crypto/store/README
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-08-31 15:27:17 -04:00
TANABE Hiroyasu
80ec8d4e3e
RT1325,2973: Add more extensions to c_rehash
...
Add .crt/.cer/.crl to the filenames parsed.
I also updated the podpage (since it didn't exist when
this ticket was first created, nor when it was re-created
seven years later).
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-31 00:36:09 -04:00
Andy Polyakov
6019cdd327
Configure: add configuration for crypto/ec/asm extensions.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-30 19:22:51 +02:00
Andy Polyakov
4d86e8df6b
md5-x86_64.pl: work around warning.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-30 19:17:09 +02:00
Andy Polyakov
b59f92e75d
x86[_64] assembly pack: add Silvermont performance data.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-30 19:13:49 +02:00
Rich Salz
0f957287df
Remove some outdated README files, to avoid confusing people.
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-08-30 10:29:35 -04:00
Rich Salz
457f7b14ec
RT2820: case-insensitive filenames on Darwin
...
Andy pointed out there is also darwin64, so tweak the pattern.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-08-30 10:18:51 -04:00
Rich Salz
d1bea969e8
RT2119,3407: Updated to dgst.pod
...
Re-order algorithm list.
Be consistent in command synopsis.
Add content about signing.
Add EXAMPLE section
Add some missing options: -r, -fips-fingerprint -non-fips-allow
Various other fixes.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-08-30 10:03:22 -04:00
Rich Salz
8b77d64e99
RT2379: Additional typo fix
...
Andy found an additional typo "can be can be".
Now I have that silly "Que sera sera" song stuck in my head.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-08-30 09:55:56 -04:00
James Westby
cf2239b3b3
RT1941: c_rehash.pod is missing
...
Add the file written by James Westby, graciously contributed
under the terms of the OpenSSL license.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-08-30 09:50:48 -04:00
Andy Polyakov
e2d03db4b3
apps/speed.c: add -misalign command-line argument.
...
New option allows to perform benchmarks on misaligned data.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-30 10:25:32 +02:00
Rich Salz
07e3b31fae
RT2379: Bug in BIO_set_accept_port.pod
...
The doc says that port can be "*" to mean any port.
That's wrong.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-29 16:45:02 -04:00
Matt Caswell
13be7da81f
Fixed double inclusion of string.h
...
PR2693
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-29 21:42:54 +01:00
Jim Reid
82d9185ae5
RT2880: HFS is case-insensitive filenames
...
Add Darwin to list of case-insensitive filenames when
installing manapges. When doing this, I noticed that
we weren't setting "filecase" for the HTML doc install.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-29 16:38:55 -04:00
Rich Salz
b09eb246e2
RT3246: req command prints version number wrong
...
Make X509_REQ_print_ex do the same thing that
X509_REQ_print does.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-08-28 19:17:05 -04:00
Rich Salz
c7497f34fb
RT1665,2300: Crypto doc cleanups
...
RT1665: aes documentation.
Paul Green wrote a nice aes.pod file.
But we now encourage the EVP interface.
So I took his RT item and used it as impetus to add
the AES modes to EVP_EncryptInit.pod
I also noticed that rc4.pod has spurious references to some other
cipher pages, so I removed them.
RT2300: Clean up MD history (merged into RT1665)
Put HISTORY section only in EVP_DigestInit.pod. Also add words
to discourage use of older cipher-specific API, and remove SEE ALSO
links that point to them.
Make sure digest pages have a NOTE that says use EVP_DigestInit.
Review feedback:
More cleanup in EVP_EncryptInit.pod
Fixed SEE ALSO links in ripemd160.pod, sha.pod, mdc2.pod, blowfish.pod,
rc4.d, and des.pod. Re-order sections in des.pod for consistency
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-08-28 18:55:50 -04:00
l.montecchiani@gmail.com
ac53354b94
RT2193: #ifdef errors in bss_dgram.c
...
Problem with #ifdef in the BIO_CTRL_DGRAM_MTU_DISCOVER case that
is different from the BIO_CTRL_DGRAM_QUERY_MTU one which seems
correct.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-08-28 17:17:36 -04:00
Rich Salz
8d4193305b
RT3102: Document -verify_error_return flag
...
Also moved some options around so all the "verify" options.
are clumped together.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-08-28 17:11:25 -04:00
Dr. Stephen Henson
f47e203975
Fix comments, add new test.
...
Fix comments in ssltest.c: return value of 0 now means extension is
omitted and add_cb is not called for servers if the corresponding
extension is absent in ClientHello.
Test add_cb is not called if extension is not received.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-28 17:06:53 +01:00
Dr. Stephen Henson
f3f56c2a87
Custom extension documentation.
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-28 17:06:53 +01:00
Dr. Stephen Henson
0cfefe4b6d
Rename some callbacks, fix alignment.
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-28 17:06:53 +01:00
Dr. Stephen Henson
8cafe9e8bf
Use consistent function naming.
...
Instead of SSL_CTX_set_custom_cli_ext and SSL_CTX_set_custom_srv_ext
use SSL_CTX_add_client_custom_ext and SSL_CTX_add_server_custom_ext.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-28 17:06:53 +01:00
Dr. Stephen Henson
c846a5f567
New function SSL_extension_supported().
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-28 17:06:53 +01:00
Dr. Stephen Henson
33f653adf3
New extension callback features.
...
Support separate parse and add callback arguments.
Add new callback so an application can free extension data.
Change return value for send functions so < 0 is an error 0
omits extension and > 0 includes it. This is more consistent
with the behaviour of other functions in OpenSSL.
Modify parse_cb handling so <= 0 is an error.
Make SSL_CTX_set_custom_cli_ext and SSL_CTX_set_custom_cli_ext argument
order consistent.
NOTE: these changes WILL break existing code.
Remove (now inaccurate) in line documentation.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-28 17:06:53 +01:00
Dr. Stephen Henson
de2a9e38f3
Callback revision.
...
Use "parse" and "add" for function and callback names instead of
"first" and "second".
Change arguments to callback so the extension type is unsigned int
and the buffer length is size_t. Note: this *will* break existing code.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-28 17:06:53 +01:00
Dr. Stephen Henson
707b026d78
Remove serverinfo checks.
...
Since sanity checks are performed for all custom extensions the
serverinfo checks are no longer needed.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-28 17:06:53 +01:00
Dr. Stephen Henson
28ea0a0c6a
Add custom extension sanity checks.
...
Reject attempts to use extensions handled internally.
Add flags to each extension structure to indicate if an extension
has been sent or received. Enforce RFC5246 compliance by rejecting
duplicate extensions and unsolicited extensions and only send a
server extension if we have sent the corresponding client extension.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-28 17:06:52 +01:00
Dr. Stephen Henson
ecf4d66090
Custom extension revision.
...
Use the same structure for client and server custom extensions.
Add utility functions in new file t1_ext.c.
Use new utility functions to handle custom server and client extensions
and remove a lot of code duplication.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-28 17:06:52 +01:00
Dr. Stephen Henson
879bde123b
fix warning
...
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
2014-08-28 17:06:52 +01:00
Emilia Kasper
5a3d21c058
Constant-time utilities
...
Pull constant-time methods out to a separate header, add tests.
Reviewed-by: Bodo Moeller <bodo@openssl.org >
2014-08-28 15:48:45 +02:00
Raphael Spreitzer
f9fb43e176
RT2400: ASN1_STRING_to_UTF8 missing initializer
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-27 22:59:05 -04:00
Rich Salz
506a3d1f9c
Merge branch 'master' of git.openssl.org:openssl
...
Gah, I hate when I forget to pull before merging.
Reviewed-by: rsalz
2014-08-27 21:36:36 -04:00
Rich Salz
17e80c6bd0
RT2308: Add extern "C" { ... } wrapper
...
Add the wrapper to all public header files (Configure
generates one). Don't bother for those that are just
lists of #define's that do renaming.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-27 21:35:32 -04:00
Emilia Kasper
f34a57202b
Explicitly check for empty ASN.1 strings in d2i_ECPrivateKey
...
The old code implicitly relies on the ASN.1 code returning a \0-prefixed buffer
when the buffer length is 0. Change this to verify explicitly that the ASN.1 string
has positive length.
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2014-08-27 19:49:35 +02:00
Matt Caswell
f063e30fe9
RT3065: automatically generate a missing EC public key
...
When d2i_ECPrivateKey reads a private key with a missing (optional) public key,
generate one automatically from the group and private key.
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2014-08-27 19:49:35 +02:00
Adam Langley
0388ac4c99
RT3065: ec_private_key_dont_crash
...
This change saves several EC routines from crashing when an EC_KEY is
missing a public key. The public key is optional in the EC private key
format and, without this patch, running the following through `openssl
ec` causes a crash:
-----BEGIN EC PRIVATE KEY-----
MBkCAQEECAECAwQFBgcIoAoGCCqGSM49AwEH
-----END EC PRIVATE KEY-----
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2014-08-27 19:49:34 +02:00
Mihai Militaru
7b3e11c544
RT2210: Add missing EVP_cleanup to example
...
I also removed some trailing whitespace and cleaned
up the "see also" list.
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2014-08-27 12:53:40 -04:00
Rich Salz
34ccd24d0e
Add tags/TAGS target; rm tags/TAGS in clean
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-26 20:51:52 -04:00
Rich Salz
ed49eb4a48
Merge branch 'master' of git.openssl.org:openssl
...
Stupid git tricks :(
Reviewed-by: rsalz
2014-08-26 13:55:13 -04:00
David Gatwood
fa60b90950
RT1744: SSL_CTX_set_dump_dh() doc feedback
...
The description of when the server creates a DH key is
confusing. This cleans it up.
(rsalz: also removed trailing whitespace.)
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
2014-08-26 13:47:23 -04:00
David Gatwood
a4d266b824
RT1744: SSL_CTX_set_dump_dh() doc feedback
...
The description of when the server creates a DH key is
confusing. This cleans it up.
(rsalz: also removed trailing whitespace.)
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
2014-08-26 13:36:20 -04:00
Jan Schaumann
fd4592be3a
RT1804: fix EXAMPLE in EVP_EncryptInit.pod
...
The EXAMPLE that used FILE and RC2 doesn't compile due to a
few minor errors. Tweak to use IDEA and AES-128. Remove
examples about RC2 and RC5.
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2014-08-25 10:25:02 -04:00
Matt Caswell
2dd8cb3b95
Typo fixes to evp documentation.
...
This patch was submitted by user "Kox" via the wiki
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-24 21:24:28 +01:00
Emilia Kasper
be0477a8e9
RT 3060: amend patch
...
Use existing error code SSL_R_RECORD_TOO_SMALL for too many empty records.
For ease of backporting the patch to release branches.
Reviewed-by: Bodo Moeller <bodo@openssl.org >
2014-08-22 15:35:42 +02:00
Emilia Kasper
bc46db60f1
RT3061: slightly amend patch
...
Add an extra NULL dereference check
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
2014-08-22 15:23:33 +02:00
Emilia Kasper
d64c533a20
Improve EVP_PKEY_sign documentation
...
Clarify the intended use of EVP_PKEY_sign. Make the code example compile.
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2014-08-22 15:00:11 +02:00
Jeffrey Walton
a520ae3628
RT3142: Extra initialization in state_machine
...
Remove extra initialization calls in the sample program.
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2014-08-21 13:32:17 -04:00
Emilia Kasper
f511b25a73
define inline for Visual Studio
...
In Visual Studio, inline is available in C++ only, however __inline is available for C, see
http://msdn.microsoft.com/en-us/library/z8y1yy88.aspx
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2014-08-21 15:56:58 +02:00
Emilia Kasper
da92be4d68
Fix build when BSAES_ASM is defined but VPAES_ASM is not
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-08-21 15:42:57 +02:00
Andy Polyakov
15735e4f0e
bn/asm/rsaz-*.pl: allow spaces in Perl path name.
...
RT: 2835
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-21 00:17:45 +02:00
Andy Polyakov
e608273a80
sha1-mb-x86_64.pl: add commentary.
...
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2014-08-21 00:15:40 +02:00
Laszlo Papp
09ec8c8e89
PR2490: Remove unused local variable bn ecp_nist.c
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-20 16:36:20 -04:00
Andy Polyakov
2893a302a9
crypto/evp/e_aes_cbc_hmac_sha[1|256].c: fix compiler warnings.
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-20 22:18:14 +02:00
Andy Polyakov
55eb14da20
sha1-mb-x86_64.pl: fix typo.
...
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2014-08-20 22:10:20 +02:00
Martin Olsson
89fb142b49
RT2847: Don't "check" uninitialized memory
...
Don't check err variable until after it's been set.
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2014-08-19 12:47:02 -04:00
Martin Olsson
96208cb182
RT2848: Remove extra NULL check
...
Don't need to check auth for NULL since we did when we
assigned to it.
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2014-08-19 12:43:58 -04:00
Martin Olsson
1afd7fa97c
RT2513: Fix typo's paramter-->parameter
...
I also found a couple of others (padlock and signinit)
and fixed them.
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2014-08-19 11:09:33 -04:00
Rich Salz
0df043f608
Merge branch 'master' of git.openssl.org:openssl
2014-08-19 10:02:05 -04:00
Jeffrey Walton
76b10e13c2
PR2401: Typos in FAQ
...
Also rewrite section on compiler bugs; Matt pointed out that
it has some grammatical issues.
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2014-08-19 10:01:40 -04:00
Jeffrey Walton
bcd3e36c46
PR2401: Typos in FAQ
...
Also rewrite section on compiler bugs; Matt pointed out that
it has some grammatical issues.
2014-08-19 10:01:06 -04:00
John Fitzgibbon
3609b02305
RT2724: Remove extra declaration
...
Extra SSL_get_selected_srtp_profile() declaration in ssl/srtp.h
causes -Werror builds to fail.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-19 09:38:43 -04:00
Laszlo Papp
8b6e517e33
RT2492: Remove extra NULL check.
2014-08-18 17:41:24 -04:00
Laszlo Papp
ddc29125a1
RT2489: Remove extra "sig" local variable.
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-18 17:36:49 -04:00
John Gardiner Myers
fc979b93ee
RT2942: CRYPTO_set_dynlock_create_callback doc fix
...
The file param is "const char*" not "char*"
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-18 16:04:33 -04:00
Doug Goldstein
448155e9bb
RT2163: Remove some unneeded #include's
...
Several files #include stdio.h and don't need it.
Also, per tjh, remove BN_COUNT
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2014-08-18 12:50:00 -04:00
Justin Blanchard
f756fb430e
RT1815: More const'ness improvements
...
Add a dozen more const declarations where appropriate.
These are from Justin; while adding his patch, I noticed
ASN1_BIT_STRING_check could be fixed, too.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-18 11:49:16 -04:00
Jonas Maebe
defe438d47
pub_decode_gost94, pub_decode_gost01: check for NULL after allocating databuf pub_encode_gost94, pub_encode_gost01: check for NULL after allocating databuf and octet
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-17 18:56:52 +02:00
Jonas Maebe
94c0a987c7
engine_md_copy: check for NULL after allocating to_md->HashBuffer
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-17 18:56:44 +02:00
Jonas Maebe
9f01a8acb3
process_pci_value: free (*policy)->data before setting to NULL after failed realloc
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-17 18:56:35 +02:00
Jonas Maebe
259ac68aeb
do_ext_i2d: free ext_der or ext_oct on error path
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-17 18:56:24 +02:00
Jonas Maebe
54298141d3
do_othername: check for NULL after allocating objtmp
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-17 18:56:05 +02:00
Jonas Maebe
f6983d0d76
NETSCAPE_SPKI_b64_encode: free der_spki and b64_str on error path
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-17 18:55:12 +02:00
Jonas Maebe
254f1c8019
get_cert_by_subject: check for NULL when allocating hent
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-17 18:55:01 +02:00
Jonas Maebe
fb7fbf28b3
UI_construct_prompt: check for NULL when allocating prompt
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-17 18:54:49 +02:00
Jonas Maebe
ba494ee593
hashbn: check for NULL result when allocating bin and return an error if it fails all (in)direct callers of hashbn: propagate potential error in hashbn
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-17 18:54:39 +02:00
Jonas Maebe
462319c3e9
JPAKE_CTX_new: check for NULL result when allocating ctx
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-17 18:54:11 +02:00
Jonas Maebe
34374c2d2c
old_hmac_encode: check for NULL result when allocating *pder
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-17 18:52:44 +02:00
Jonas Maebe
6f77f82bfc
dev_crypto_md5_copy: return error if allocating to_md->data fails
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-17 18:52:30 +02:00
Jonas Maebe
771e0c6c7a
dev_crypto_md5_update: check result of realloc(md_data->data) and don't leak memory if it fails
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-17 18:52:14 +02:00
Jonas Maebe
d8513b4abd
dev_crypto_cipher: return immediately if allocating cin/cout failed
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-17 18:51:35 +02:00
Jonas Maebe
c84029dbdc
dev_crypto_init_key: return error if allocating CDATA(ctx)->key failed
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-17 18:51:16 +02:00
Hubert Kario
750487899a
Add support for Camellia HMAC-Based cipher suites from RFC6367
...
While RFC6367 focuses on Camellia-GCM cipher suites, it also adds a few
cipher suites that use SHA-2 based HMAC that can be very easily
added.
Tested against gnutls 3.3.5
PR#3443
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-15 23:41:20 +01:00
Matt Caswell
f2be92b94d
Fixed out-of-bounds read errors in ssl3_get_key_exchange.
...
PR#3450
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-15 23:27:34 +01:00
Rich Salz
c9a81b3026
RT2751: Declare get_issuer_sk() earlier.
...
Add a declaration for get_issuer_sk() so that other
functions in x509_vf.c could use it. (Planned work
around cross-certification chains.)
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-08-15 17:49:03 -04:00
Jonas Maebe
d6f69ae547
cryptodev_digest_copy: return error if allocating dstate->mac_data fails
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-15 22:38:51 +02:00
Jonas Maebe
349e6b2b0a
cryptodev_digest_update: don't leak original state->mac_data if realloc fails
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-15 22:38:36 +02:00
Jonas Maebe
36f7ed5040
cms_SignerInfo_content_sign: free sig on failure path
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-15 22:38:19 +02:00
Jonas Maebe
4e64f671c9
rtcp_new: return failure if allocation of bi->ptr failed
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-15 22:38:05 +02:00
Jonas Maebe
1c4b688cb4
multi_split: check for NULL when allocating parts and bpart, and for failure of sk_BIO_push()
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-15 22:37:48 +02:00
Jonas Maebe
bd4acbc70e
BIO_new_dgram_sctp, dgram_sctp_read: zero entire authchunks
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-15 22:37:28 +02:00
Jonas Maebe
8957278869
mime_hdr_addparam: free tmpname, tmpval and mparam on error path, and check whether sk_MIME_PARAM_push succeeds
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-15 22:37:14 +02:00
Jonas Maebe
15297d962c
mime_hdr_new: free mhdr, tmpname, tmpval on error path
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-15 22:36:54 +02:00
Jonas Maebe
c9c63b0180
ASN1_verify, ASN1_item_verify: cleanse and free buf_in on error path
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-15 22:36:34 +02:00
Jonas Maebe
b9b9f853b5
SetBlob: free rgSetBlob on error path
...
Signed-off-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-15 22:35:11 +02:00
Istvan Noszticzius
865886553d
Fix use after free bug.
...
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-15 16:50:16 +01:00
Frdric Giudicelli
c753e71e0a
RT783: Minor optimization to ASN1_INTEGER_set
...
Remove local variable and avoid extra assignment.
Reviewed-by: Emilia Kasper <emilia@silkandcyanide.net >
2014-08-15 10:54:43 -04:00
Rob Austein
cf8bac4456
RT2465: Silence some gcc warnings
...
"Another machine, another version of gcc, another batch
of compiler warnings." Add "=NULL" to some local variable
declarations that are set by passing thier address into a
utility function; confuses GCC it might not be set.
Reviewed-by: Emilia Ksper <emilia@silkandcyanide.net >
2014-08-15 10:52:06 -04:00
Hans Wennborg
01e438f288
RT3023: Redundant logical expressions
...
Remove some redundant logical expressions
Reviewed-by: Emilia Kasper <emilia@silkandcyanide.net >
2014-08-15 10:45:00 -04:00
Rich Salz
5effa35610
Merge branch 'master' of git.openssl.org:openssl
2014-08-15 10:41:50 -04:00
Claus Assmann
14e961921a
RT3268: Fix spelling errors in CHANGES file.
...
Fix a bunch of typo's and speling (sic) errors in the CHANGES file.
Reviewed-by: Tim Hudson <tjh@cryptsoft.com >
2014-08-15 10:41:13 -04:00
Dr. Stephen Henson
b83294fe30
Revision of custom extension code.
...
Move custom extension structures from SSL_CTX to CERT structure.
This change means the form can be revised in future without binary
compatibility issues. Also since CERT is part of SSL structures
so per-SSL custom extensions could be supported in future as well as
per SSL_CTX.
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-15 12:20:04 +01:00
Dr. Stephen Henson
06f5d12f51
Include error messages on extension check failure.
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-15 12:16:16 +01:00
Emilia Kasper
f0ca9ccaef
make depend
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-14 15:24:58 +02:00
Bodo Moeller
16602b5cd5
Further improve/fix ec_GFp_simple_points_make_affine (ecp_smpl.c) and
...
group_order_tests (ectest.c). Also fix the EC_POINTs_mul documentation (ec.h).
Reviewed-by: emilia@openssl.org
2014-08-13 17:37:19 +02:00
Matt Caswell
690a2b1fa2
RT1665: Fix podpath to get xref's right
...
In Makefile, when build manpages, put the current directory
at the start of the podpath so that cross-refs find the
local directory first.
Reviewed-by: Tim Hudson <tjh@cryptosoft.com >
2014-08-13 00:31:02 -04:00
Ingo Schwarze
bebbb11d13
RT3239: Extra comma in NAME lines of two manpages
...
In two OpenSSL manual pages, in the NAME section, the last word of the
name list is followed by a stray trailing comma. While this may seem
minor, it is worth fixing because it may confuse some makewhatis(8)
implementations.
While here, also add the missing word "size" to the one line
description in SSL_CTX_set_max_cert_list(3).
Reviewed by: Dr Stephen Henson <shenson@drh-consultancy.co.uk >
2014-08-12 15:59:18 -04:00
Rich Salz
1c5be3d7f0
Merge branch 'master' of git.openssl.org:openssl
2014-08-12 15:33:36 -04:00
nnposter@users.sourceforge.net
cde8ad1a28
PR 719: Configure not exiting with child status
...
If subcommand fails, just die.
Reviewed-by: Kurt Roeckx <kurt@roeckx.be >
2014-08-12 14:45:49 -04:00
nnposter@users.sourceforge.net
16caa9a43d
PR 718: Configure not exiting with child status
...
If subcommand fails, just die.
Reviewed-by: Kurt Roeckx <kurt@roeckx.be >
2014-08-12 14:44:51 -04:00
Nick Lewis
9aaa7be8d4
PR 2580: dgst missing current SHA algorithms
...
Update the dgst.pod page to include SHA224...512 algorithms.
Update apps/progs.pl to add them to the digest command table.
Reviewed-by: Tim Hudson <tjh@cryptosoft.com >
2014-08-12 11:29:20 -04:00
Rich Salz
2a1393a4a8
Revert "RT 2820: Case-insensitive filenames on Darwin"
...
This reverts commit 691edc997a .
2014-08-12 11:22:50 -04:00
Nick Urbanik
42ce91cc35
RT2609: Typo in EXAMPLE section of req.pod
...
The x509_extensions should be req_extensions in the
config example in req.pod
Reviewed-by: tjh@cryptsoft.com
2014-08-12 11:16:58 -04:00
Dr Stephen Henson
b00f586a81
Fix d4a4370050
...
Fully remove old error, per drH
Reviewed-by: rsalz
2014-08-11 17:32:57 -04:00
Jim Reid
691edc997a
RT 2820: Case-insensitive filenames on Darwin
...
Add darwin-*-cc as one of the systems for case-insensitive
filenames. Fixes the manpage install so it doesn't create
looping symlinks.
2014-08-11 15:06:54 -04:00
Rich Salz
d9fcd8ec4c
Merge branch 'master' of git.openssl.org:openssl
2014-08-11 13:45:03 -04:00
Rich Salz
cbfc8baddb
Undo 77bf69dced
...
Not approved; mistakenly pushed commit that added README.md
2014-08-11 13:44:25 -04:00
Scott Schaefer
d4a4370050
RT 2517: Various typo's.
...
Reviewed-by: Emilia Kasper
Many of these were already fixed, this catches the last
few that were missed.
2014-08-11 13:43:31 -04:00
Scott Schaefer
590bdcc686
RT 2517: Various typo's.
...
Many of these were already fixed, this catches the last
few that were missed.
2014-08-11 13:12:53 -04:00
Rich Salz
77bf69dced
Add README.md
...
A small markdown README for GitHub users; points them to
the right README and the website and RT tracker.
2014-08-11 11:35:32 -04:00
Dr. Stephen Henson
9e72d496d4
Fix SRP authentication ciphersuites.
...
The addition of SRP authentication needs to be checked in various places
to work properly. Specifically:
A certificate is not sent.
A certificate request must not be sent.
Server key exchange message must not contain a signature.
If appropriate SRP authentication ciphersuites should be chosen.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-08-09 13:21:30 +01:00
Dr. Stephen Henson
562fd0d883
Test SRP authentication ciphersuites.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-08-09 13:21:29 +01:00
Rich Salz
f642ebc1e2
Undo a90081576c
...
Undo unapproved commit that removed DJGPP and WATT32
2014-08-09 08:02:20 -04:00
Viktor Szakats
693b71fa71
RT 1988: Add "const" to SSL_use_RSAPrivateKey_ASN1
...
The "unsigned char *d" should be const.
Reviewed-by: Kurt Roeckx <kurt@roeckx.be >
2014-08-09 07:56:28 -04:00
Matthieu Crapet
6d03125ccf
RT 1505: Use SSL3_AL_FATAL not "2"
...
Use SSL3_AL_FATAL instead of the literal constant "2"
Every bit of cleanup helps.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-08-08 22:47:33 -04:00
Rich Salz
a90081576c
Remove DJGPP (and therefore WATT32) #ifdef's.
...
DJGPP is no longer a supported platform. Remove all #ifdef, etc.,
cases that refer to it. DJGPP also #define'd WATT32, so that
is now removed as well.
2014-08-08 16:54:14 -04:00
Dr. Stephen Henson
0989790b87
Check SRP parameters early.
...
Check SRP parameters when they are received so we can send back an
appropriate alert.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-08-06 20:36:41 +01:00
Dr. Stephen Henson
4a23b12a03
Fix SRP buffer overrun vulnerability.
...
Invalid parameters passed to the SRP code can be overrun an internal
buffer. Add sanity check that g, A, B < N to SRP code.
Thanks to Sean Devlin and Watson Ladd of Cryptography Services, NCC
Group for reporting this issue.
2014-08-06 20:36:41 +01:00
Dr. Stephen Henson
80bd7b41b3
Fix SRP ciphersuite DoS vulnerability.
...
If a client attempted to use an SRP ciphersuite and it had not been
set up correctly it would crash with a null pointer read. A malicious
server could exploit this in a DoS attack.
Thanks to Joonas Kuorilehto and Riku Hietamäki from Codenomicon
for reporting this issue.
CVE-2014-2970
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-06 20:36:41 +01:00
Gabor Tyukasz
fb0bc2b273
Fix race condition in ssl_parse_serverhello_tlsext
...
CVE-2014-3509
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-06 20:36:41 +01:00
Emilia Kasper
0042fb5fd1
Fix OID handling:
...
- Upon parsing, reject OIDs with invalid base-128 encoding.
- Always NUL-terminate the destination buffer in OBJ_obj2txt printing function.
CVE-2014-3508
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-06 20:36:41 +01:00
Emilia Käsper
1716003376
Fix DTLS anonymous EC(DH) denial of service
...
CVE-2014-3510
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-06 20:36:40 +01:00
David Benjamin
280b1f1ad1
Fix protocol downgrade bug in case of fragmented packets
...
CVE-2014-3511
Reviewed-by: Emilia Käsper <emilia@openssl.org >
Reviewed-by: Bodo Möller <bodo@openssl.org >
2014-08-06 20:36:40 +01:00
Adam Langley
4f2011d981
Remove some duplicate DTLS code.
...
In a couple of functions, a sequence number would be calculated twice.
Additionally, in |dtls1_process_out_of_seq_message|, we know that
|frag_len| <= |msg_hdr->msg_len| so the later tests for |frag_len <
msg_hdr->msg_len| can be more clearly written as |frag_len !=
msg_hdr->msg_len|, since that's the only remaining case.
Reviewed-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-06 20:36:40 +01:00
Matt Caswell
f6663338cb
Applying same fix as in dtls1_process_out_of_seq_message. A truncated DTLS fragment would cause *ok to be clear, but the return value would still be the number of bytes read.
...
Problem identified by Emilia Käsper, based on previous issue/patch by Adam
Langley.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-06 20:36:40 +01:00
Adam Langley
b74d1d260f
Fix return code for truncated DTLS fragment.
...
Previously, a truncated DTLS fragment in
|dtls1_process_out_of_seq_message| would cause *ok to be cleared, but
the return value would still be the number of bytes read. This would
cause |dtls1_get_message| not to consider it an error and it would
continue processing as normal until the calling function noticed that
*ok was zero.
I can't see an exploit here because |dtls1_get_message| uses
|s->init_num| as the length, which will always be zero from what I can
see.
Reviewed-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-06 20:36:40 +01:00
Adam Langley
d0a4b7d1a2
Fix memory leak from zero-length DTLS fragments.
...
The |pqueue_insert| function can fail if one attempts to insert a
duplicate sequence number. When handling a fragment of an out of
sequence message, |dtls1_process_out_of_seq_message| would not call
|dtls1_reassemble_fragment| if the fragment's length was zero. It would
then allocate a fresh fragment and attempt to insert it, but ignore the
return value, leaking the fragment.
This allows an attacker to exhaust the memory of a DTLS peer.
Fixes CVE-2014-3507
Reviewed-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-06 20:36:40 +01:00
Matt Caswell
1250f12613
Fix DTLS handshake message size checks.
...
In |dtls1_reassemble_fragment|, the value of
|msg_hdr->frag_off+frag_len| was being checked against the maximum
handshake message size, but then |msg_len| bytes were allocated for the
fragment buffer. This means that so long as the fragment was within the
allowed size, the pending handshake message could consume 16MB + 2MB
(for the reassembly bitmap). Approx 10 outstanding handshake messages
are allowed, meaning that an attacker could consume ~180MB per DTLS
connection.
In the non-fragmented path (in |dtls1_process_out_of_seq_message|), no
check was applied.
Fixes CVE-2014-3506
Wholly based on patch by Adam Langley with one minor amendment.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-06 20:36:40 +01:00
Matt Caswell
11e7982a7c
Added comment for the frag->reassembly == NULL case as per feedback from Emilia
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-06 20:36:40 +01:00
Adam Langley
bff1ce4e6a
Avoid double free when processing DTLS packets.
...
The |item| variable, in both of these cases, may contain a pointer to a
|pitem| structure within |s->d1->buffered_messages|. It was being freed
in the error case while still being in |buffered_messages|. When the
error later caused the |SSL*| to be destroyed, the item would be double
freed.
Thanks to Wah-Teh Chang for spotting that the fix in 1632ef74 was
inconsistent with the other error paths (but correct).
Fixes CVE-2014-3505
Reviewed-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-06 20:36:40 +01:00
Bodo Moeller
a46149c672
Update $default_depflags to match current defaults.
2014-08-01 19:02:10 +02:00
Bodo Moeller
bac6740746
Sync with clean-up 1.0.2 CHANGES file.
...
(If a change is already present in 1.0.1f or 1.0.1h,
don't list it again under changes between 1.0.1h and 1.0.2.)
2014-08-01 18:41:17 +02:00
Bodo Moeller
38c654819c
Sync with current 1.0.2 CHANGES file.
2014-08-01 18:18:52 +02:00
Bodo Moeller
0fe73d6c36
Simplify and fix ec_GFp_simple_points_make_affine
...
(which didn't always handle value 0 correctly).
Reviewed-by: emilia@openssl.org
2014-08-01 17:18:14 +02:00
Dr. Stephen Henson
e0fc7961c4
Add conditional unit testing interface.
...
Don't call internal functions directly call them through
SSL_test_functions(). This also makes unit testing work on
Windows and platforms that don't export internal functions
from shared libraries.
By default unit testing is not enabled: it requires the compile
time option "enable-unit-test".
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
2014-07-24 19:41:29 +01:00
Dr. Stephen Henson
8e55e6de45
Don't call setenv in gost2814789t.c
...
The call to setenv in gost2814789t.c is not portable and may
not reflect the location of the GOST ENGINE on all platforms anyway.
Instead set OPENSSL_ENGINES in test/Makefile
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
2014-07-24 18:18:54 +01:00
Geoff Thorpe
ceea4bf047
Remove demos/tunala
...
This has been unmaintained for a long time. If it's still of interest
to anyone, it can be obtained easily enough by reverting this commit.
(It could join other demo code in some other repository, perhaps.) In
any case we don't want it taking up space in the baseline source
package, so <snip>.
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
2014-07-22 15:16:30 -04:00
Andy Polyakov
7a2b54509c
CHANGES: mention new platforms.
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-07-22 20:19:37 +02:00
Billy Brumley
cba11f57ce
"EC_POINT_invert" was checking "dbl" function pointer instead of "invert".
...
PR#2569
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-07-21 22:18:40 +01:00
Tim Hudson
62352b8138
Remove old unused and unmaintained demonstration code.
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-07-22 05:26:17 +10:00
Andy Polyakov
5c3598307e
sha1-ppc.pl: shave off one cycle from BODY_20_39
...
and improve performance by 10% on POWER[78].
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-07-21 15:29:09 +02:00
Tim Hudson
c8d133e4b6
Minor documentation update removing "really" and a
...
statement of opinion rather than a fact.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-07-21 20:03:50 +10:00
Dr. Stephen Henson
841072ef65
Add test header, sync ordinals with 1.0.2
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-07-20 20:51:06 +01:00
Andy Polyakov
0e716d9207
Engage GHASH for PowerISA 2.0.7.
...
[and split ppccap.c to ppccap.c and ppc_arch.h]
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-07-20 14:16:31 +02:00
Andy Polyakov
f5b798f50c
Add GHASH for PowerISA 2.0.7.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-07-20 14:14:26 +02:00
Dr. Stephen Henson
03c075e572
Windows build fixes.
...
Add cmac.h to mkdef.pl
Remove ENGINE_load_rsax from engine.h: no longer built.
Update ordinals
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-07-19 22:57:37 +01:00
Dr. Stephen Henson
f8c03d4dbf
Fix documentation for RSA_set_method(3)
...
PR#1675
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-07-19 22:57:37 +01:00
Mike Bland
b2e50bcd0e
Check the test registry size during add_test()
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-07-19 19:24:36 +01:00
Mike Bland
50bba6852d
Update heartbeat_test #includes
...
ssl/ssl_locl.h now comes first to ensure that it will compile standalone.
test/testutil.h is considered to be in the same directory as the test file,
since the test file will be linked into test/ and built there.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-07-19 19:24:35 +01:00
Mike Bland
6017a55143
Use testutil registry in heartbeat_test
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-07-19 19:24:35 +01:00
Mike Bland
5e3de8e609
test/testutil.c test registry functions.
...
These help standardize the structure of main() and result reporting.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-07-19 19:24:35 +01:00
Dr. Stephen Henson
d31fed73e2
RFC 5649 support.
...
Add support for RFC5649 key wrapping with padding.
Add RFC5649 tests to evptests.txt
Based on PR#3434 contribution by Petr Spacek <pspacek@redhat.com >.
EVP support and minor changes added by Stephen Henson.
Doxygen comment block updates by Tim Hudson.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-07-18 21:37:13 +01:00
Dr. Stephen Henson
58f4698f67
Make *Final work for key wrap again.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-07-17 23:29:14 +01:00
Dr. Stephen Henson
d12eef1501
Sanity check lengths for AES wrap algorithm.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-07-17 12:57:40 +01:00
Jeffrey Walton
d48e78f0cf
Fix typo, add reference.
...
PR#3456
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-07-17 12:07:37 +01:00
Matt Caswell
2097a17c57
Disabled XTS mode in enc utility as it is not supported
...
PR#3442
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-07-16 20:59:35 +01:00
Andy Polyakov
e91718e80d
Revert "Add GHASH for PowerISA 2.07."
...
This reverts commit 927f2e5dea .
2014-07-16 13:38:15 +02:00
Andy Polyakov
6cd13f70bb
Revert "Engage GHASH for PowerISA 2.07."
...
This reverts commit 14aaf883d9 .
2014-07-16 13:37:37 +02:00
Andy Polyakov
14aaf883d9
Engage GHASH for PowerISA 2.07.
2014-07-16 08:03:34 +02:00
Andy Polyakov
927f2e5dea
Add GHASH for PowerISA 2.07.
2014-07-16 08:01:41 +02:00
Matt Caswell
3bd548192a
Add Matt Caswell's fingerprint, and general update on the fingerprints file to bring it up to date
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-07-15 23:13:37 +01:00
Dr. Stephen Henson
ca2015a617
Clarify -Verify and PSK.
...
PR#3452
2014-07-15 20:22:39 +01:00
Dr. Stephen Henson
c8d710dc5f
Fix DTLS certificate requesting code.
...
Use same logic when determining when to expect a client
certificate for both TLS and DTLS.
PR#3452
2014-07-15 18:23:13 +01:00
Dr. Stephen Henson
199772e534
Don't allow -www etc options with DTLS.
...
The options which emulate a web server don't make sense when doing DTLS.
Exit with an error if an attempt is made to use them.
PR#3453
2014-07-15 12:32:41 +01:00
Rich Salz
6c0a1e2f8c
Merge branch 'master' of git.openssl.org:openssl
2014-07-15 00:05:43 -04:00
Dr. Stephen Henson
1c3e9a7c67
Use case insensitive compare for servername.
...
PR#3445
2014-07-14 23:59:13 +01:00
Hubert Kario
7efd0e777e
document -nextprotoneg option in man pages
...
Add description of the option to advertise support of
Next Protocol Negotiation extension (-nextprotoneg) to
man pages of s_client and s_server.
PR#3444
2014-07-14 23:42:59 +01:00
Dr. Stephen Henson
ec5a992cde
Use more common name for GOST key exchange.
2014-07-14 18:31:55 +01:00
Dr. Stephen Henson
aa224e9719
Fix typo.
2014-07-14 18:31:55 +01:00
Rich Salz
9d6253cfd3
Add tags/TAGS; approved by tjh
2014-07-14 11:27:16 -04:00
Matt Caswell
f8571ce822
Fixed valgrind complaint due to BN_consttime_swap reading uninitialised data.
...
This is actually ok for this function, but initialised to zero anyway if
PURIFY defined.
This does have the impact of masking any *real* unitialised data reads in bn though.
Patch based on approach suggested by Rich Salz.
PR#3415
2014-07-13 22:17:39 +01:00
Peter Mosmans
924e5eda2c
Add names of GOST algorithms.
...
PR#3440
2014-07-13 18:30:07 +01:00
Richard Levitte
8b5dd34091
* crypto/ui/ui_lib.c: misplaced brace in switch statement.
...
Detected by dcruette@qualitesys.com
2014-07-13 19:11:46 +02:00
Ben Laurie
c1d1b0114e
Don't clean up uninitialised EVP_CIPHER_CTX on error (CID 483259).
2014-07-10 17:49:02 +01:00
Matt Caswell
66816c53be
Fix memory leak in BIO_free if there is no destroy function.
...
Based on an original patch by Neitrino Photonov <neitrinoph@gmail.com >
PR#3439
2014-07-09 23:29:17 +01:00
Andy Polyakov
1b0fe79f3e
x86_64 assembly pack: improve masm support.
2014-07-09 20:08:01 +02:00
Andy Polyakov
d11c70b2c2
Please Clang's sanitizer, addendum.
2014-07-08 23:06:59 +02:00
Andy Polyakov
021e5043e5
Please Clang's sanitizer.
...
PR: #3424,#3423,#3422
2014-07-08 22:24:44 +02:00
Andy Polyakov
c4f8efab34
apps/speed.c: fix compiler warnings in multiblock_speed().
2014-07-07 17:02:26 +02:00
Andy Polyakov
07b635cceb
sha[1|512]-x86_64.pl: fix logical errors with $shaext=0.
2014-07-07 17:01:07 +02:00
David Lloyd
9d23f422a3
Prevent infinite loop loading config files.
...
PR#2985
2014-07-07 13:19:57 +01:00
Viktor Dukhovni
b73ac02735
Improve X509_check_host() documentation.
...
Based on feedback from Jeffrey Walton.
2014-07-07 20:34:06 +10:00
Viktor Dukhovni
297c67fcd8
Update API to use (char *) for email addresses and hostnames
...
Reduces number of silly casts in OpenSSL code and likely most
applications. Consistent with (char *) for "peername" value from
X509_check_host() and X509_VERIFY_PARAM_get0_peername().
2014-07-07 19:11:38 +10:00
Dr. Stephen Henson
ee724df75d
Usage for -hack and -prexit -verify_return_error
2014-07-06 22:42:50 +01:00
Dr. Stephen Henson
cba3f1c739
Document certificate status request options.
2014-07-06 22:40:01 +01:00
Dr. Stephen Henson
a44f219c00
s_server usage for certificate status requests
2014-07-06 22:40:01 +01:00
Dr. Stephen Henson
5ecf1141a5
Sanity check keylength in PVK files.
...
PR#2277
2014-07-06 00:36:16 +01:00
Jeffrey Walton
75b7606881
Added reference to platform specific cryptographic acceleration such as AES-NI
2014-07-06 00:03:13 +01:00
Matt Caswell
fd9e244370
Fixed error in pod files with latest versions of pod2man
2014-07-06 00:03:13 +01:00
Andy Polyakov
7eb9680ae1
sha512-x86_64.pl: fix typo.
...
PR: #3431
2014-07-05 23:59:57 +02:00
Andy Polyakov
0e7a32b55e
s3_pkt.c: fix typo.
2014-07-05 23:56:54 +02:00
Andy Polyakov
375a64e349
apps/speed.c: add multi-block benchmark.
2014-07-05 23:53:55 +02:00
Alan Hryngle
fdea4fff8f
Return smaller of ret and f.
...
PR#3418.
2014-07-05 22:37:41 +01:00
Viktor Dukhovni
ced3d9158a
Set optional peername when X509_check_host() succeeds.
...
Pass address of X509_VERIFY_PARAM_ID peername to X509_check_host().
Document modified interface.
2014-07-06 01:50:50 +10:00
Viktor Dukhovni
6e661d458f
New peername element in X509_VERIFY_PARAM_ID
...
Declaration, memory management, accessor and documentation.
2014-07-06 01:50:50 +10:00
Ben Laurie
d2ab55eb5b
Reduce casting nastiness.
2014-07-05 15:00:53 +01:00
Ben Laurie
6835f572a9
Reduce casting nastiness.
2014-07-05 15:00:53 +01:00
Dr. Stephen Henson
7f6e957864
Don't limit message sizes in ssl3_get_cert_verify.
...
PR#319 (reoponed version).
2014-07-05 13:19:12 +01:00
Dr. Stephen Henson
55707a36cc
Add license info.
2014-07-04 18:41:45 +01:00
Dr. Stephen Henson
a9661e45ac
typo
...
(cherry picked from commit 2cfbec1cae )
2014-07-04 13:50:55 +01:00
Dr. Stephen Henson
b948ee27b0
Remove all RFC5878 code.
...
Remove RFC5878 code. It is no longer needed for CT and has numerous bugs
2014-07-04 13:26:35 +01:00
Dr. Stephen Henson
a23a6e85d8
Update ticket callback docs.
2014-07-03 14:50:08 +01:00
Rich Salz
f1112985e8
Close 3170, remove reference to Ariel Glenn's old 0.9.8 doc
2014-07-03 00:07:04 -04:00
Rich Salz
538860a3ce
RT 1638; EVP_*Final() should mention they no longer cleanup the ctx.
2014-07-02 23:38:34 -04:00
Rich Salz
a5a3178728
RT3408; fix some (not all suggested) typo's in openssl.cnf
2014-07-02 23:18:39 -04:00
Rich Salz
b5071dc2f6
Merge branch 'rsalz-docfixes'
2014-07-02 22:44:53 -04:00
Rich Salz
fc1d88f02f
Close a whole bunch of documentation-related tickets:
...
298 424 656 882 939 1630 1807 2263 2294 2311 2424 2623
2637 2686 2697 2921 2922 2940 3055 3112 3156 3177 3277
2014-07-02 22:42:40 -04:00
Andy Polyakov
aab3560b65
e_os.h: limit _MSC_VER trickery to older compilers.
...
PR: #3390
2014-07-02 22:30:54 +02:00
Andy Polyakov
eca441b2b4
bn_exp.c: fix x86_64-specific crash with one-word modulus.
...
PR: #3397
2014-07-02 19:35:50 +02:00
Matt Smart
5cc99c6cf5
Fix doc typo.
...
ERR_get_error(3) references the non-existent
ERR_get_last_error_line_data instead of the one that does exist,
ERR_peek_last_error_line_data.
PR#3283
2014-07-02 03:43:42 +01:00
Thijs Alkemade
7cb472bd0d
Make disabling last cipher work.
2014-07-02 03:32:19 +01:00
Dr. Stephen Henson
398e99fe5e
ASN1 sanity check.
...
Primitive encodings shouldn't use indefinite length constructed
form.
PR#2438 (partial).
2014-07-02 00:59:26 +01:00
Libor Krystek
a5ff18bf90
Add support for SHA2 in CAPI ENGINE.
...
PR#2706 though patch is from PR#3366.
2014-07-02 00:33:10 +01:00
Ben Laurie
22a10c89d7
Fix possible buffer overrun.
...
(cherry picked from commit 2db3ea2929 )
Conflicts:
ssl/t1_lib.c
2014-07-02 00:11:10 +01:00
Rich Salz
e67ddd19af
RT 1528; misleading debug print, "pre-master" should be "master key"
2014-07-01 13:22:38 -04:00
Andy Polyakov
c7ada16d39
perlasm/ppc-xlate.pl update.
2014-07-01 19:11:11 +02:00
Andy Polyakov
cd1922cde0
Engage SHA256/512 for PowerISA 2.07.
2014-07-01 19:09:11 +02:00
Andy Polyakov
eaa4820471
Add SHA256/512 for PowerISA 2.07.
2014-07-01 19:09:11 +02:00
Rich Salz
04f545a0d5
RT 1530; fix incorrect comment
2014-07-01 13:06:18 -04:00
Rich Salz
df8ef5f31a
RT 1229; typo in comment "dont't"->"don't"
2014-07-01 13:02:57 -04:00
Rich Salz
762a44de59
RT 3245; it's "bitwise or" not "logical or"
2014-07-01 13:00:18 -04:00
Rich Salz
854dfcd859
Fix RT 3211; "and are" -->"are"
2014-07-01 12:55:32 -04:00
Rich Salz
7b1d946051
Fix RT 2567; typo in pkeyutl page.
2014-07-01 12:49:20 -04:00
Rich Salz
42b91f28a6
Fix RT 2430; typo's in ca.pod
2014-07-01 12:47:52 -04:00
Rich Salz
d7003c4d7d
Fix RT 3193
2014-07-01 12:44:32 -04:00
Andy Polyakov
29be3f6411
sha512-x86_64.pl: fix linking problem under Windows.
2014-07-01 17:11:22 +02:00
Dr. Stephen Henson
70857a4a00
Windows build fixes.
2014-07-01 14:11:28 +01:00
Dr. Stephen Henson
2580ab4ed7
Fix warning.
...
(cherry picked from commit c97ec5631b )
2014-07-01 13:37:04 +01:00
Dr. Stephen Henson
9cd86abb51
Make NO_SYS_UN_H compile.
2014-07-01 12:44:00 +01:00
Dr. Stephen Henson
387b844ffd
Accessor functions for app_data in ECDSA_METHOD
2014-07-01 12:01:51 +01:00
Dr. Stephen Henson
0d263d2acf
Test copying of contexts in evp_test.
...
Test EVP_CIPHER_CTX_copy in evp_test. This will catch any
problems with copying in underlying ciphers.
2014-07-01 12:01:51 +01:00
Ben Laurie
e3ba6a5f83
Make depend.
2014-06-30 16:03:29 +01:00
Dr. Stephen Henson
c2fd5d79ff
Fix copy for CCM, GCM and XTS.
...
Internal pointers in CCM, GCM and XTS contexts should either be
NULL or set to point to the appropriate key schedule. This needs
to be adjusted when copying contexts.
2014-06-30 12:57:29 +01:00
Dr. Stephen Henson
90c1946e7a
Don't core dump when using CMAC with dgst.
...
We can't unfortunately print the CMAC cipher used without extending the API.
PR#2579
2014-06-29 23:44:44 +01:00
Jeffrey Walton
6e6ba36d98
Clarified that the signature's buffer size, s, is not used as an
...
IN parameter.
Under the old docs, the only thing stated was "at most
EVP_PKEY_size(pkey) bytes will be written". It was kind of misleading
since it appears EVP_PKEY_size(pkey) WILL be written regardless of the
signature's buffer size.
2014-06-29 23:34:21 +01:00
Ben Laurie
161e0a617d
More constification.
2014-06-29 22:13:45 +01:00
ZNV
370bf1d708
Make EVP_CIPHER_CTX_copy work in GCM mode.
...
PR#3272
2014-06-29 22:01:28 +01:00
Oscar Jacobsson
7e6a01bdd4
Add 3072, 7680 and 15360 bit RSA tests to openssl speed
...
PR#3412
2014-06-29 21:38:09 +01:00
Ben Laurie
8892ce7714
Constification - mostly originally from Chromium.
2014-06-29 21:05:23 +01:00
Rich Salz
340daf6a06
Merge branch 'master' of git.openssl.org:openssl
2014-06-29 11:40:39 -04:00
Rich Salz
327f3c040e
Fix typo in message (RT 3107)
2014-06-29 11:40:05 -04:00
Dr. Stephen Henson
44724beead
Fix memory leak.
...
PR#2531
2014-06-29 13:51:30 +01:00
Ken Ballou
76ed5a42ea
Typo.
...
PR#3173
2014-06-29 13:38:55 +01:00
Dr. Stephen Henson
a30bdb55d1
Show errors on CSR verification failure.
...
If CSR verify fails in ca utility print out error messages.
Otherwise some errors give misleading output: for example
if the key size exceeds the library limit.
PR#2875
2014-06-29 13:33:44 +01:00
Dr. Stephen Henson
7ae6a4b659
Make no-ssl3 no-ssl2 do more sensible things.
2014-06-29 03:04:45 +01:00
Dr. Stephen Henson
528b1f9a9f
Clarify protocols supported.
...
Update protocols supported and note that SSLv2 is effectively disabled
by default.
PR#3184
2014-06-29 00:07:08 +01:00
Dr. Stephen Henson
0e7bda79a1
Handle BER length encoding.
...
Tolerate BER length encoding which may include leading zeroes.
PR#2746
2014-06-29 00:07:08 +01:00
Andy Polyakov
a356e488ad
x86_64 assembly pack: refine clang detection.
2014-06-28 17:23:21 +02:00
Dr. Stephen Henson
7c206db928
Typo.
...
PR#3107
2014-06-28 12:42:04 +01:00
Dr. Stephen Henson
0518a3e19e
Don't disable state strings with no-ssl2
...
Some state strings were erronously not compiled when no-ssl2
was set.
PR#3295
2014-06-28 00:54:32 +01:00
yogesh nagarkar
d183545d45
Fix compilation with -DSSL_DEBUG -DTLS_DEBUG -DKSSL_DEBUG
...
PR#3141
2014-06-28 00:40:26 +01:00
Andreas Westfeld
d1d4382dcb
Fix typo in ideatest.c
2014-06-28 00:06:13 +01:00
Ken Ballou
0b33bed969
Remove redundant check.
...
PR#3174
2014-06-27 23:19:39 +01:00
Dr. Stephen Henson
59deb33cbe
Fix for EVP_PBE_alg_add().
...
In EVP_PBE_alg_add don't use the underlying NID for the cipher
as it may have a non-standard key size.
PR#3206
2014-06-27 23:19:39 +01:00
Andy Polyakov
406d4af050
bn/asm/rsaz-avx2.pl: fix occasional failures.
2014-06-27 22:41:58 +02:00
Rich Salz
a0490e02c7
RT 487. Mention that generated primes are "at least" B<bits> long.
2014-06-27 15:59:08 -04:00
Dr. Stephen Henson
11da66f8b1
Tolerate critical AKID in CRLs.
...
PR#3014
2014-06-27 18:49:32 +01:00
PK
e633248921
Add SHA256 Camellia ciphersuites from RFC5932
...
PR#2800
2014-06-27 18:24:05 +01:00
Tom Greenslade
b36f35cda9
Handle IPv6 addresses in OCSP_parse_url.
...
PR#2783
2014-06-27 17:30:59 +01:00
Tomas Mraz
0436369fcc
Don't advertise ECC ciphersuits in SSLv2 compatible client hello.
...
PR#3374
2014-06-27 16:51:26 +01:00
Jeffrey Walton
0535c2d67c
Clarify docs.
...
Document that the certificate passed to SSL_CTX_add_extra_chain_cert()
should not be freed by the application.
PR#3409
2014-06-27 16:39:11 +01:00
Dr. Stephen Henson
abac8e0e08
Rebuild OID table.
2014-06-27 14:35:07 +01:00
Dr. Stephen Henson
95791bf941
Fix OID encoding for one component.
...
OIDs with one component don't have an encoding.
PR#2556 (Bug#1)
2014-06-27 14:35:07 +01:00
Dr. Stephen Henson
d2aea03829
Memory leak and NULL dereference fixes.
...
PR#3403
2014-06-27 14:35:07 +01:00
Huzaifa Sidhpurwala
3b3b69ab25
Make sure BN_sqr can never return a negative value.
...
PR#3410
2014-06-26 23:56:34 +01:00
Dr. Stephen Henson
7be6b27aaf
Remove ancient obsolete files under pkcs7.
2014-06-26 23:56:34 +01:00
Andy Polyakov
f3f620e1e0
bn_exp.c: move check for AD*X to rsaz-avx2.pl.
...
This ensures high performance is situations when assembler supports
AVX2, but not AD*X.
2014-06-27 00:07:15 +02:00
Andy Polyakov
052ecf91d2
aesp8-ppc.pl: rigid input verification in key setup.
2014-06-25 22:13:17 +02:00
Andy Polyakov
7b8c8c4d79
aesv8-armx.pl: rigid input verification in key setup.
2014-06-25 22:10:45 +02:00
Andy Polyakov
7eb0488280
x86_64 assembly pack: addendum to last clang commit.
2014-06-24 08:37:05 +02:00
Andy Polyakov
ac171925ab
x86_64 assembly pack: allow clang to compile AVX code.
2014-06-24 08:24:25 +02:00
Andy Polyakov
015364baf3
aesv8-armx.pl: inclrease interleave factor.
...
This is to compensate for higher aes* instruction latency on Cortex-A57.
2014-06-24 08:08:58 +02:00
Andy Polyakov
0f777aeb50
ARMv8 assembly pack: add Cortex performance numbers.
2014-06-24 08:06:05 +02:00
Viktor Dukhovni
eef1827f89
One more typo when changing !result to result <= 0
2014-06-23 16:26:34 +01:00
Viktor Dukhovni
90b70a6a6b
Fix typo in last commit
2014-06-22 20:39:52 -04:00
Viktor Dukhovni
8abffa4a73
Multiple verifier reference identities.
...
Implemented as STACK_OF(OPENSSL_STRING).
2014-06-22 20:32:35 -04:00
Viktor Dukhovni
66d884f067
Implement sk_deep_copy.
2014-06-22 20:24:18 -04:00
Viktor Dukhovni
29edebe95c
More complete input validation of X509_check_mumble
2014-06-22 20:18:53 -04:00
Viktor Dukhovni
a48fb0400c
X509_check_mumble() failure is <= 0, not just 0
2014-06-22 20:14:53 -04:00
Viktor Dukhovni
b3012c698a
Drop hostlen from X509_VERIFY_PARAM_ID.
...
Just store NUL-terminated strings. This works better when we add
support for multiple hostnames.
2014-06-22 19:52:44 -04:00
Viktor Dukhovni
d241b80409
More complete X509_check_host documentation.
2014-06-22 19:50:02 -04:00
Miod Vallat
2841d6ca9f
Fix off-by-one errors in ssl_cipher_get_evp()
...
In the ssl_cipher_get_evp() function, fix off-by-one errors in index validation before accessing arrays.
Bug discovered and fixed by Miod Vallat from the OpenBSD team.
PR#3375
2014-06-22 23:14:19 +01:00
Matt Caswell
cf1b08cdd7
Revert "Fix off-by-one errors in ssl_cipher_get_evp()"
...
This reverts commit abfb989fe0 .
Incorrect attribution
2014-06-22 22:35:56 +01:00
Matt Caswell
339da43d6c
Fixed Windows compilation failure
2014-06-22 20:16:47 +02:00
Matt Caswell
115e480924
Fix minor typos
2014-06-19 23:45:21 +01:00
Hubert Kario
e42d84be33
add references to verify(1) man page for args_verify() options
...
cms, ocsp, s_client, s_server and smime tools also use args_verify()
for parsing options, that makes them most of the same options
verify tool does. Add those options to man pages and reference
their explanation in the verify man page.
2014-06-19 23:09:21 +01:00
Hubert Kario
2866441a90
sort the options in verify man page alphabetically
...
just making sure the options are listed in the alphabetical order
both in SYNOPSIS and DESCRIPTION, no text changes
2014-06-19 23:09:21 +01:00
Hubert Kario
cd028c8e66
add description of missing options to verify man page
...
The options related to policy used for verification, verification
of subject names in certificate and certificate chain handling
were missing in the verify(1) man page. This fixes this issue.
2014-06-19 23:09:21 +01:00
Hubert Kario
ce21d108bd
smime man page: add missing options in SYNOPSIS
...
-CAfile and -CApath is documented in OPTIONS but is missing
in SYNOPSIS, add them there
2014-06-19 23:09:21 +01:00
Hubert Kario
6d3d579367
Document -trusted_first option in man pages and help.
...
Add -trusted_first description to help messages and man pages
of tools that deal with certificate verification.
2014-06-19 23:09:21 +01:00
Matt Caswell
2d7153e8f9
Tidied up, added include to stdlib, removed "goto bad" usage
2014-06-17 23:35:53 +01:00
rfkrocktk
8a531c22b0
Conform to whitespace conventions
2014-06-17 23:10:14 +01:00
rfkrocktk
96fc4b7250
Added documentation for -iter for PKCS#8
2014-06-17 23:10:14 +01:00
Naftuli Tzvi Kay
8a6c6bbf21
Added custom PBKDF2 iteration count to PKCS8 tool.
2014-06-17 23:10:14 +01:00
Felix Laurie von Massenbach
50cc4f7b3d
Fix signed/unsigned comparisons.
2014-06-17 17:41:46 +01:00
Felix Laurie von Massenbach
1f61d8b5b1
Fix shadow declaration.
2014-06-17 17:41:46 +01:00
Andy Polyakov
9024b84b7c
aesni-sha[1|256]-x86_64.pl: fix logical error and MacOS X build.
2014-06-16 10:11:45 +02:00
Andy Polyakov
764fe518da
aesp8-ppc.pl: add CTR mode.
2014-06-16 08:05:19 +02:00
Viktor Dukhovni
7241a4c7fd
Enforce _X509_CHECK_FLAG_DOT_SUBDOMAINS internal-only
2014-06-14 22:31:29 +01:00
Dr. Stephen Henson
3b77f01702
Accept CCS after sending finished.
...
Allow CCS after finished has been sent by client: at this point
keys have been correctly set up so it is OK to accept CCS from
server. Without this renegotiation can sometimes fail.
PR#3400
2014-06-14 22:31:28 +01:00
Andy Polyakov
ce00c64df9
evp/e_aes_cbc_sha[1|256].c: fix -DPEDANTIC build.
2014-06-14 23:15:39 +02:00
Andy Polyakov
91a6bf80f8
aesni-sha256-x86_64.pl: add missing rex in shaext.
...
PR: 3405
2014-06-14 16:03:06 +02:00
Andy Polyakov
c9cf29cca2
sha1-x86_64.pl: add missing rex prefix in shaext.
...
PR: 3405
2014-06-14 15:27:54 +02:00
Matt Caswell
687721a7dc
Fixed incorrect return code handling in ssl3_final_finish_mac.
...
Based on an original patch by Joel Sing (OpenBSD) who also originally identified the issue.
2014-06-13 15:36:20 +01:00
Matt Caswell
043fd64689
Revert "Fixed incorrect return code handling in ssl3_final_finish_mac"
...
This reverts commit 2f1dffa88e .
Missing attribution.
2014-06-13 15:35:20 +01:00
Viktor Dukhovni
a09e4d24ad
Client-side namecheck wildcards.
...
A client reference identity of ".example.com" matches a server
certificate presented identity that is any sub-domain of "example.com"
(e.g. "www.sub.example.com).
With the X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS flag, it matches
only direct child sub-domains (e.g. "www.sub.example.com").
2014-06-12 23:19:25 +01:00
Kurt Cancemi
abfb989fe0
Fix off-by-one errors in ssl_cipher_get_evp()
...
In the ssl_cipher_get_evp() function, fix off-by-one errors in index validation before accessing arrays.
PR#3375
2014-06-12 21:11:00 +01:00
Andy Polyakov
977f32e852
Facilitate back-porting of AESNI and SHA modules.
...
Fix SEH and stack handling in Win64 build.
2014-06-12 21:45:41 +02:00
Matt Caswell
d84ba7ea23
Added OPENSSL_assert check as per PR#3377 reported by Rainer Jung <rainer.jung@kippdata.de>
2014-06-12 20:40:54 +01:00
Dr. Stephen Henson
a50f71868e
Fix Windows build.
...
(cherry picked from commit 5f4c5a902b0508eab235adecb34b236cdc0048a5)
2014-06-12 10:58:12 +01:00
Andy Polyakov
77a27a5066
Enable multi-block support by default.
2014-06-11 20:40:51 +02:00
Dr. Stephen Henson
9494e99b40
Fix compilation with no-comp
2014-06-11 14:41:00 +01:00
Andy Polyakov
1cf8f57b43
ghash-x86_64.pl: optimize for upcoming Atom.
2014-06-11 11:34:18 +02:00
Andy Polyakov
619b94667c
Add support for Intel SHA extension.
2014-06-11 10:27:45 +02:00
Rob Stradling
fd2309aa29
Separate the SCT List parser from the SCT List viewer
2014-06-10 23:44:13 +01:00
Matt Caswell
2f1dffa88e
Fixed incorrect return code handling in ssl3_final_finish_mac
2014-06-10 23:31:50 +01:00
Andy Polyakov
e2eabed110
aesni-mb-x86_64.pl: add Win64 SEH.
2014-06-10 23:08:06 +02:00
Hubert Kario
343e5cf194
add ECC strings to ciphers(1), point out difference between DH and ECDH
...
* Make a clear distinction between DH and ECDH key exchange.
* Group all key exchange cipher suite identifiers, first DH then ECDH
* add descriptions for all supported *DH* identifiers
* add ECDSA authentication descriptions
* add example showing how to disable all suites that offer no
authentication or encryption
2014-06-10 20:53:07 +01:00
Mike Bland
3ead9f3798
Create test/testutil.h for unit test helper macros
...
Defines SETUP_TEST_FIXTURE and EXECUTE_TEST, and updates ssl/heartbeat_test.c
using these macros. SETUP_TEST_FIXTURE makes use of the new TEST_CASE_NAME
macro, defined to use __func__ or __FUNCTION__ on platforms that support those
symbols, or to use the file name and line number otherwise. This should fix
several reported build problems related to lack of C99 support.
2014-06-10 19:20:25 +01:00
Dr. Stephen Henson
7a9d59c148
Fix null pointer errors.
...
PR#3394
2014-06-10 14:47:29 +01:00
Dr. Stephen Henson
447280ca7b
SRP ciphersuite correction.
...
SRP ciphersuites do not have no authentication. They have authentication
based on SRP. Add new SRP authentication flag and cipher string.
2014-06-09 12:09:52 +01:00
Dr. Stephen Henson
1bea384fd5
Update strength_bits for 3DES.
...
Fix strength_bits to 112 for 3DES.
2014-06-09 12:09:52 +01:00
Kurt Roeckx
95fe635d90
Link heartbeat_test with the static version of the libraries
...
It's using an internal API that that might not be available in the shared
library.
2014-06-09 00:10:24 +01:00
Jakub Wilk
7be1d8764d
Create ~/.rnd with mode 0600 instead of 0666
...
Because of a missing include <fcntl.h> we don't have O_CREATE and don't create
the file with open() using mode 0600 but fall back to using fopen() with the
default umask followed by a chmod().
Problem found by Jakub Wilk <jwilk@debian.org >.
2014-06-08 21:15:48 +01:00
Dr. Stephen Henson
fb8d9ddb9d
Make tls_session_secret_cb work with CVE-2014-0224 fix.
...
If application uses tls_session_secret_cb for session resumption
set the CCS_OK flag.
2014-06-07 15:27:23 +01:00
Dr. Stephen Henson
c43a55407d
Add official extension value.
...
Encrypt then MAC now has an official extension value, see:
http://www.ietf.org/id/draft-ietf-tls-encrypt-then-mac-02.txt
2014-06-07 15:27:23 +01:00
Matt Caswell
fa6bb85ae0
Fixed minor duplication in docs
2014-06-07 12:30:18 +01:00
Andy Polyakov
5dcf70a1c5
ARM assembly pack: get ARMv7 instruction endianness right.
...
Pointer out and suggested by: Ard Biesheuvel.
2014-06-06 21:27:18 +02:00
Andy Polyakov
cd91fd7c32
sha[1|512]-armv8.pl: get instruction endianness right.
...
Submitted by: Ard Biesheuvel.
2014-06-06 20:50:43 +02:00
Andy Polyakov
82741e9c89
Engage GHASH for ARMv8.
2014-06-06 20:48:35 +02:00
Andy Polyakov
2d5a799d27
Add GHASH for ARMv8 Crypto Extension.
...
Result of joint effort with Ard Biesheuvel.
2014-06-06 20:43:02 +02:00
Dr. Stephen Henson
7178c711dd
Update NEWS.
2014-06-06 14:34:23 +01:00
Andy Polyakov
65cad34b10
aesv8-armx.pl update:
...
- fix 32-bit build (submitted by Ard Biesheuvel);
- fix performance issue in CTR;
2014-06-06 12:18:51 +02:00
Dr. Stephen Henson
5111672b8e
Update value to use a free bit.
2014-06-05 13:27:11 +01:00
Dr. Stephen Henson
410e444b71
Fix for CVE-2014-0195
...
A buffer overrun attack can be triggered by sending invalid DTLS fragments
to an OpenSSL DTLS client or server. This is potentially exploitable to
run arbitrary code on a vulnerable client or server.
Fixed by adding consistency check for DTLS fragments.
Thanks to Jüri Aedla for reporting this issue.
(cherry picked from commit 1632ef7448 )
2014-06-05 13:23:05 +01:00
Dr. Stephen Henson
a91be10833
Fix for CVE-2014-0224
...
Only accept change cipher spec when it is expected instead of at any
time. This prevents premature setting of session keys before the master
secret is determined which an attacker could use as a MITM attack.
Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for reporting this issue
and providing the initial fix this patch is based on.
(cherry picked from commit bc8923b1ec )
2014-06-05 13:22:42 +01:00
Dr. Stephen Henson
a7c682fb6f
Additional CVE-2014-0224 protection.
...
Return a fatal error if an attempt is made to use a zero length
master secret.
(cherry picked from commit 006cd7083f )
2014-06-05 13:22:24 +01:00
Dr. Stephen Henson
b4322e1de8
Fix CVE-2014-0221
...
Unnecessary recursion when receiving a DTLS hello request can be used to
crash a DTLS client. Fixed by handling DTLS hello request without recursion.
Thanks to Imre Rad (Search-Lab Ltd.) for discovering this issue.
(cherry picked from commit d3152655d5 )
2014-06-05 13:22:03 +01:00
Dr. Stephen Henson
a5362db460
Fix CVE-2014-3470
...
Check session_cert is not NULL before dereferencing it.
(cherry picked from commit 8011cd56e3 )
2014-06-05 13:21:50 +01:00
Andy Polyakov
d86689e1d9
aesp8-ppc.pl: fix typos.
2014-06-04 08:34:18 +02:00
Andy Polyakov
53a224bb0a
evp/e_aes.c: add erroneously omitted break;
2014-06-04 08:33:06 +02:00
Libor Krystek
8e3231642b
Corrected OPENSSL_NO_EC_NISTP_64_GCC_128 usage in ec_lcl.h. PR#3370
2014-06-03 23:15:58 +01:00
David Benjamin
c7f267397e
Check there is enough room for extension.
2014-06-02 23:55:56 +01:00
zhu qun-ying
470990fee0
Free up s->d1->buffered_app_data.q properly.
...
PR#3286
2014-06-02 23:55:55 +01:00
Andy Polyakov
030a3f9527
evp/e_aes.c: populate HWAES_* to remaning modes.
...
Submitted by: Ard Biesheuvel.
2014-06-02 21:48:02 +02:00
Dr. Stephen Henson
14f47acf23
Allow reordering of certificates when signing.
...
Add certificates if -nocerts and -certfile specified when signing
in smime application. This can be used this to specify the
order certificates appear in the PKCS#7 structure: some broken
applications require a certain ordering.
PR#3316
2014-06-02 14:22:07 +01:00
Sami Farin
13b7896022
Typo: set i to -1 before goto.
...
PR#3302
2014-06-02 14:22:07 +01:00
Andy Polyakov
de51e830a6
Engage POWER8 AES support.
2014-06-01 23:38:11 +02:00
Matt Caswell
a5510df337
Added SSLErr call for internal error in dtls1_buffer_record
2014-06-01 21:36:25 +01:00
David Ramos
d1e1aeef8f
Delays the queue insertion until after the ssl3_setup_buffers() call due to use-after-free bug. PR#3362
2014-06-01 21:36:25 +01:00
Andy Polyakov
723463282f
armv4cpuid.S: switch to CNTVCT tick counter.
2014-06-01 22:34:02 +02:00
Andy Polyakov
797d24bee9
sha[1|256]-armv4: harmonize with arm_arch.h.
2014-06-01 22:29:50 +02:00
Andy Polyakov
ddacb8f27b
Engage ARMv8 AES support.
2014-06-01 22:20:37 +02:00
Dr. Stephen Henson
a09220d823
Recognise padding extension.
2014-06-01 18:15:21 +01:00
Dr. Stephen Henson
01f2f18f3c
Option to disable padding extension.
...
Add TLS padding extension to SSL_OP_ALL so it is used with other
"bugs" options and can be turned off.
This replaces SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG which is an ancient
option referring to SSLv2 and SSLREF.
PR#3336
2014-06-01 18:15:21 +01:00
Andy Polyakov
f8aab6174c
linux-aarch64: engage SHA modules.
2014-06-01 18:03:51 +02:00
Andy Polyakov
ddb6b965da
Add SHA for ARMv8.
2014-06-01 18:02:11 +02:00
Andy Polyakov
e8d93e342b
Add linux-aarch64 taget.
...
armcap.c is shared between 32- and 64-bit builds and features link-time
detection of getauxval.
Submitted by: Ard Biesheuvel.
2014-06-01 17:21:06 +02:00
Ben Laurie
992bba11d5
Merge branch 'erbridge-probable_primes'
2014-06-01 15:37:08 +01:00
Ben Laurie
5fc3a5fe49
Credit to Felix.
...
Closes #116 .
2014-06-01 15:31:27 +01:00
Ben Laurie
c93233dbfd
Tidy up, don't exceed the number of requested bits.
2014-06-01 15:31:27 +01:00
Ben Laurie
46838817c7
Constify and reduce coprime random bits to allow for multiplier.
2014-06-01 15:31:27 +01:00
Ben Laurie
0382950c6c
Zero prime doits.
2014-06-01 15:31:27 +01:00
Ben Laurie
5efa13ca7e
Add option to run all prime tests.
2014-06-01 15:31:27 +01:00
Felix Laurie von Massenbach
8927c2786d
Add a test to check we're really generating probable primes.
2014-06-01 15:31:27 +01:00
Felix Laurie von Massenbach
9a3a99748b
Remove unused BIGNUMs.
2014-06-01 15:31:27 +01:00
Felix Laurie von Massenbach
a77889f560
Only count successful generations.
2014-06-01 15:31:26 +01:00
Felix Laurie von Massenbach
c74e148776
Refactor the first prime index.
2014-06-01 15:31:26 +01:00
Felix Laurie von Massenbach
982c42cb20
Try skipping over the adding and just picking a new random number.
...
Generates a number coprime to 2, 3, 5, 7, 11.
Speed:
Trial div (add) : trial div (retry) : coprime
1 : 0.42 : 0.84
2014-06-01 15:31:26 +01:00
Felix Laurie von Massenbach
7e965dcc38
Remove editor barf on updating copyright.
2014-06-01 15:31:26 +01:00
Felix Laurie von Massenbach
8a12085293
Add python script to generate the bits needed for the prime generator.
2014-06-01 15:31:26 +01:00
Felix Laurie von Massenbach
c09ec5d2a0
Generate safe primes not divisible by 3, 5 or 7.
...
~2% speed improvement on trial division.
2014-06-01 15:31:26 +01:00
Felix Laurie von Massenbach
b0513819e0
Add a method to generate a prime that is guaranteed not to be divisible by 3 or 5.
...
Possibly some reduction in bias, but no speed gains.
2014-06-01 15:31:26 +01:00
Felix Laurie von Massenbach
b359642ffd
Run the prime speed tests for 10 seconds.
2014-06-01 15:31:26 +01:00
Felix Laurie von Massenbach
8c9336ce2b
Tidy up speed.c a little.
2014-06-01 15:31:26 +01:00
Felix Laurie von Massenbach
b5419b81ac
Add speed test for prime trial division.
2014-06-01 15:31:26 +01:00
Felix Laurie von Massenbach
e46a059ebf
Remove static from probable_prime_dh.
2014-06-01 15:31:26 +01:00
Felix Laurie von Massenbach
e55fca760b
Remove indentation from the goto targets.
2014-06-01 15:31:26 +01:00
Felix Laurie von Massenbach
fce0ba5fcd
Strip trailing whitespace from Configure.
2014-06-01 15:31:26 +01:00
Felix Laurie von Massenbach
d7f200779c
Add a new target to Configure for me.
2014-06-01 15:31:26 +01:00
Dr. Stephen Henson
3009244da4
Set default global mask to UTF8 only.
2014-06-01 15:03:00 +01:00
David Ramos
92d81ba622
Allocate extra space when NETSCAPE_HANG_BUG defined.
...
Make sure there is an extra 4 bytes for server done message when
NETSCAPE_HANG_BUG is defined.
PR#3361
2014-06-01 14:27:22 +01:00
David Ramos
7e2c6f7eb0
Initialise alg.
...
PR#3313
2014-06-01 13:04:10 +01:00
Dr. Stephen Henson
4fdf91742e
Use correct digest when exporting keying material.
...
PR#3319
2014-05-31 13:43:02 +01:00
Dr. Stephen Henson
7ce79a5bfd
Don't compile heartbeat test code on Windows (for now).
2014-05-31 13:43:02 +01:00
Hubert Kario
9ed03faac4
add description of -attime to man page
...
the verify app man page didn't describe the usage of attime option
even though it was listed as a valid option in the -help message.
This patch fixes this omission.
2014-05-30 23:26:35 +01:00
Hubert Kario
08bef7be1e
add description of -no_ecdhe option to s_server man page
...
While the -help message references this option, the man page
doesn't mention the -no_ecdhe option.
This patch fixes this omission.
2014-05-30 22:59:43 +01:00
Andy Polyakov
e09ea622bb
aesv8-armx.pl: add CTR implementation.
...
Submitted by: Ard Biesheuvel.
2014-05-29 22:45:35 +02:00
Dr. Stephen Henson
46d889f33e
Set version number correctly.
...
PR#3249
2014-05-29 14:33:32 +01:00
František Bořánek
4da0ddc47e
Fix memory leak.
...
PR#3278
2014-05-29 14:33:32 +01:00
Martin Kaiser
1c4575ebc3
remove duplicate 0x for default RSASSA-PSS salt len
2014-05-29 14:33:32 +01:00
Andy Polyakov
7cbdb975c2
aesp8-ppc.pl: optimize CBC decrypt even further.
...
10-19% improvement depending on key length and endianness.
2014-05-29 15:10:12 +02:00
Peter Mosmans
028bac0670
Fix for test_bn regular expression to work on Windows using MSYS. PR#3346
2014-05-27 23:29:32 +01:00
Matt Caswell
3d9243f1b6
Changed -strictpem to use PEM_read_bio
2014-05-26 23:31:37 +01:00
Matt Caswell
6b5c1d940b
Added -strictpem parameter to enable processing of PEM files with data prior to the BEGIN marker
2014-05-26 17:24:11 +01:00
Juli Mallett
487dac87e3
Fix cast of boolean where cast of LHS intended.
...
Closes #74 .
2014-05-26 13:16:12 +01:00
Matt Caswell
15658d0cbf
Fixed error in args for SSL_set_msg_callback and SSL_set_msg_callback_arg
2014-05-25 23:45:12 +01:00
Ben Laurie
ba4477d649
Make it build.
...
Closes #31 .
2014-05-25 17:35:04 +01:00
Christian Heimes
56431240ae
add test case to makefiles
2014-05-25 17:35:04 +01:00
Christian Heimes
4d4a535dcf
Implement tests for PKCS#5 PBKDF2 HMAC
2014-05-25 17:35:04 +01:00
Dr. Stephen Henson
0930251df8
Don't use expired certificates if possible.
...
When looking for the issuer of a certificate, if current candidate is
expired, continue looking. Only return an expired certificate if no valid
certificates are found.
PR#3359
2014-05-25 04:50:15 +01:00
Dr. Stephen Henson
6c21b860ba
Rename vpm_int.h to x509_lcl.h
2014-05-25 04:50:14 +01:00
Matt Caswell
955376fde3
Fix for non compilation with TLS_DEBUG defined
2014-05-24 23:55:27 +01:00
Ben Laurie
894172f207
Only copy opensslconf.h at init time.
2014-05-24 15:42:18 +01:00
Martin Kaiser
c5f0b9bd86
Modify the description of -noout to match the manpage. PR#3364
2014-05-24 00:04:25 +01:00
Martin Kaiser
189ae368d9
Add an NSS output format to sess_id to export to export the session id and the master key in NSS keylog format. PR#3352
2014-05-24 00:02:24 +01:00
Luiz Angelo Daros de Luca
dd36fce023
OpenSSL is able to generate a certificate with name constraints with any possible
...
subjectAltName field. The Name Contraint example in x509v3_config(5) even use IP
as an example:
nameConstraints=permitted;IP:192.168.0.0/255.255.0.0
However, until now, the verify code for IP name contraints did not exist. Any
check with a IP Address Name Constraint results in a "unsupported name constraint
type" error.
This patch implements support for IP Address Name Constraint (v4 and v6). This code
validaded correcly certificates with multiple IPv4/IPv6 address checking against
a CA certificate with these constraints:
permitted;IP.1=10.9.0.0/255.255.0.0
permitted;IP.2=10.48.0.0/255.255.0.0
permitted;IP.3=10.148.0.0/255.255.0.0
permitted;IP.4=fdc8:123f:e31f::/ffff:ffff:ffff::
Signed-off-by: Luiz Angelo Daros de Luca <luizluca@gmail.com >
2014-05-23 23:05:38 +01:00
Andy Polyakov
fda29b6db0
aesp8-ppc.pl: add optimized CBC decrypt.
2014-05-23 20:15:06 +02:00
Andy Polyakov
b83d09f552
vpaes-ppc.pl: comply with ABI.
2014-05-23 20:14:38 +02:00
Ben Laurie
27da939490
Merge branch 'heartbeat-test' of git://github.com/mbland/openssl
2014-05-22 22:00:17 +01:00
Mike Bland
647c70f765
Fix heartbeat_test for -DOPENSSL_NO_HEARTBEATS
...
Replaces the entire test with a trivial implementation when
OPENSSL_NO_HEARTBEATS is defined.
2014-05-22 15:23:10 -04:00
Ben Laurie
eb33348879
Check length first in BUF_strnlen().
2014-05-22 10:13:22 +01:00
Matt Caswell
085ccc542a
Fixed minor copy&paste error, and stray space causing rendering problem
2014-05-22 00:07:35 +01:00
Matt Caswell
df24f29ae6
Fixed unterminated B tag, causing build to fail with newer pod2man versions
2014-05-22 00:00:23 +01:00
Ben Laurie
12f1b3e79f
Remove redundant test.
2014-05-21 12:03:02 +01:00
Ben Laurie
dea4a18404
Implement BUF_strnlen() and use it instead of strlen().
2014-05-21 11:58:03 +01:00
Viktor Dukhovni
397a8e747d
Fixes to host checking.
...
Fixes to host checking wild card support and add support for
setting host checking flags when verifying a certificate
chain.
2014-05-21 11:31:28 +01:00
Dr. Stephen Henson
558c94efc0
Fix for PKCS12_create if no-rc2 specified.
...
Use triple DES for certificate encryption if no-rc2 is
specified.
PR#3357
2014-05-21 11:28:58 +01:00
Dr. Stephen Henson
6f719f063c
Change default cipher in smime app to des3.
...
PR#3357
2014-05-21 11:28:57 +01:00
Andy Polyakov
3e68273326
aesv8-armx.pl: fix typo.
2014-05-20 23:32:12 +02:00
Andy Polyakov
a0a17fcb75
aesv8-armx.pl: optimize by adding 128-bit code paths.
2014-05-20 22:50:28 +02:00
Ben Laurie
d8ac1ea77e
Don't allocate more than is needed in BUF_strndup().
2014-05-20 13:52:31 +01:00
Dr. Stephen Henson
dcca7b13e9
For portability use BUF_strndup instead of strndup.
2014-05-20 11:18:30 +01:00
Dr. Stephen Henson
6db14dbc51
Adding padding extension to trace code.
2014-05-20 11:09:04 +01:00
Dr. Stephen Henson
deffd89af3
Fix bug in signature algorithm copy.
2014-05-20 11:09:04 +01:00
Janpopan
ff626ba5f4
Fix a wrong parameter count ERR_add_error_data
2014-05-19 22:10:14 +01:00
Ben Laurie
814972e1ab
Merge branch 'mbland-heartbeat-test'
2014-05-19 17:40:52 +01:00
Ben Laurie
2ec52dc3a1
Fixup for ancient compilers.
2014-05-19 17:39:41 +01:00
Mike Bland
39dd6f4549
Zero-initialize heartbeat test write buffer
...
The previous calls to memset() were added to tear_down() when I noticed the
test spuriously failing in opt mode, with different results each time. This
appeared to be because the allocator zeros out memory in debug mode, but not
in opt mode. Since the heartbeat functions silently drop the request on error
without modifying the contents of the write buffer, whatever random contents
were in memory before being reallocated to the write buffer used in the test
would cause nondeterministic test failures in the Heartbleed regression cases.
Adding these calls allowed the test to pass in both debug and opt modes.
Ben Laurie notified me offline that the test was aborting in
debug-ben-debug-64-clang mode, configured with GitConfigure and built with
GitMake. Looking into this, I realized the first memset() call was zeroing out
a reference count used by SSL_free() that was checked in
debug-ben-debug-64-clang mode but not in the normal debug mode.
Removing the memset() calls from tear_down() and adding a memset() for the
write buffer in set_up() addresses the issue and allows the test to
successfully execute in debug, opt, and debug-ben-debug-64-clang modes.
2014-05-19 17:39:41 +01:00
Mike Bland
f5ad068b01
More through error checks in set_up
...
Checks the return values of ssl_init_wbio_buffer() and ssl3_setup_buffers().
2014-05-19 17:39:41 +01:00
Ben Laurie
f41231d62a
Make it build/run.
2014-05-19 17:39:41 +01:00
Mike Bland
6af080acaf
Unit/regression test for TLS heartbeats.
...
Regression test against CVE-2014-0160 (Heartbleed).
More info: http://mike-bland.com/tags/heartbleed.html
2014-05-19 17:39:41 +01:00
Andy Polyakov
5727e4dab8
Add "teaser" AES module for ARMv8.
...
"Teaser" means that it's initial proof-of-concept to build EVP module
upon.
2014-05-19 08:46:44 +02:00
Matt Caswell
d4b47504de
Moved note about lack of support for AEAD modes out of BUGS section to SUPPORTED CIPHERS section (bug has been fixed, but still no support for AEAD)
2014-05-15 21:13:38 +01:00
Dr. Stephen Henson
c358651218
Enc doesn't support AEAD ciphers.
...
(cherry picked from commit 09184dddead165901700b31eb39d540ba30f93c5)
2014-05-15 14:16:46 +01:00
Jeffrey Walton
2af071c0bc
Fix grammar error in verify pod. PR#3355
2014-05-14 22:49:30 +01:00
Jeffrey Walton
18c4f522f4
Add information to BUGS section of enc documentation. PR#3354
2014-05-14 22:48:26 +01:00
Michal Bozon
ab6577a46e
Corrected POD syntax errors. PR#3353
2014-05-14 21:07:51 +01:00
Mike Frysinger
e6479c76ca
Have the .pc files depend on each other rather than duplicating the
...
various link settings. PR#3332
2014-05-12 23:31:51 +01:00
Kurt Roeckx
4ee356686f
Check sk_SSL_CIPHER_num() after assigning sk.
2014-05-12 22:56:13 +01:00
Jean-Paul Calderone
a4a442cccf
Correct the return type on the signature for X509_STORE_CTX_get_ex_data given in the pod file.
2014-05-12 22:41:13 +01:00
Serguei E. Leontiev
4a56d9a2ed
Replace manual ASN1 decoder with ASN1_get_object
...
Replace manual ASN.1 decoder with ASN1_get object. This
will decode the tag and length properly and check against
it does not exceed the supplied buffer length.
PR#3335
2014-05-12 18:41:52 +01:00
Dr. Stephen Henson
89e674744d
Correct example.
2014-05-12 18:41:52 +01:00
Andy Polyakov
f75faa16af
Add "teaser" AES module for PowerISA 2.07.
...
"Teaser" means that it's not integrated yet and purpose of this
commit is primarily informational, to exhibit design choices,
such as how to handle alignment and endianness. In other words
it's proof-of-concept code that EVP module will build upon.
2014-05-12 10:35:29 +02:00
Matt Caswell
7b06ac7593
Fixed NULL pointer dereference. See PR#3321
2014-05-12 00:38:37 +01:00
Kurt Roeckx
3b3ecce141
Set authkey to NULL and check malloc return value.
2014-05-12 00:20:08 +01:00
Martin Brejcha
00f3a236e0
dgram_sctp_ctrl: authkey memory leak
...
PR: 3327
2014-05-12 00:20:08 +01:00
Günther Noack
308505b838
Avoid out-of-bounds write in SSL_get_shared_ciphers
...
PR: 3317
2014-05-11 23:52:47 +01:00
Viktor Dukhovni
b00676bb6f
Fix infinite loop. PR#3347
2014-05-11 20:28:56 +01:00
Matt Caswell
971a7c5ff7
Move length check earlier to ensure we don't go beyond the end of the user's buffer. PR#3320
2014-05-11 11:27:26 +01:00
Tim Hudson
c388d8b40c
safety check to ensure we dont send out beyond the users buffer
2014-05-11 11:21:30 +01:00
Matt Caswell
c4afc40a9b
Fixed CRLF in file
2014-05-10 01:19:50 +01:00
Dr. Stephen Henson
0bcb17a777
Return an error if no recipient type matches.
...
If the key type does not match any CMS recipient type return
an error instead of using a random key (MMA mitigation). This
does not leak any useful information to an attacker.
PR#3348
2014-05-09 14:24:54 +01:00
Geoff Thorpe
a935132099
s_client/s_server: support unix domain sockets
...
The "-unix <path>" argument allows s_server and s_client to use a unix
domain socket in the filesystem instead of IPv4 ("-connect", "-port",
"-accept", etc). If s_server exits gracefully, such as when "-naccept"
is used and the requested number of SSL/TLS connections have occurred,
then the domain socket file is removed. On ctrl-C, it is likely that
the stale socket file will be left over, such that s_server would
normally fail to restart with the same arguments. For this reason,
s_server also supports an "-unlink" option, which will clean up any
stale socket file before starting.
If you have any reason to want encrypted IPC within an O/S instance,
this concept might come in handy. Otherwise it just demonstrates that
there is nothing about SSL/TLS that limits it to TCP/IP in any way.
(There might also be benchmarking and profiling use in this path, as
unix domain sockets are much lower overhead than connecting over local
IP addresses).
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
2014-05-08 22:07:09 -04:00
Tim Hudson
b6e69d284b
coverity 966576 - close socket in error path
2014-05-08 23:14:52 +01:00
Tim Hudson
8e94fadd0b
PR#3342 fix resource leak coverity issue 966577
2014-05-08 23:08:33 +01:00
Tim Hudson
630f9fc69d
fix coverity issue 966597 - error line is not always initialised
2014-05-07 23:54:25 +01:00
Matt Caswell
2d2e0479eb
Fixed NULL pointer dereference in PKCS7_dataDecode reported by David Ramos in PR#3339
2014-05-07 23:21:02 +01:00
Geoff Thorpe
fce3821111
evp: prevent underflow in base64 decoding
...
This patch resolves RT ticket #2608 .
Thanks to Robert Dugal for originally spotting this, and to David
Ramos for noticing that the ball had been dropped.
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
2014-05-06 17:52:19 -04:00
Geoff Thorpe
12e9f627f9
bignum: allow concurrent BN_MONT_CTX_set_locked()
...
The lazy-initialisation of BN_MONT_CTX was serialising all threads, as
noted by Daniel Sands and co at Sandia. This was to handle the case that
2 or more threads race to lazy-init the same context, but stunted all
scalability in the case where 2 or more threads are doing unrelated
things! We favour the latter case by punishing the former. The init work
gets done by each thread that finds the context to be uninitialised, and
we then lock the "set" logic after that work is done - the winning
thread's work gets used, the losing threads throw away what they've done.
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
2014-05-06 17:43:35 -04:00
Dr. Stephen Henson
3ba1e406c2
Initialize num properly.
...
PR#3289
PR#3345
2014-05-06 14:07:37 +01:00
Dr. Stephen Henson
546b1b4384
Set Enveloped data version to 2 if ktri version not zero.
2014-05-06 13:59:05 +01:00
Tim Hudson
8bbfd94e36
- fix coverity issues 966593-966596
2014-05-06 00:02:31 +01:00
Geoff Thorpe
e1ce131d4d
apps/s_server: document '-naccept' cmd-line argument
...
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
2014-05-04 22:42:41 -04:00
Andy Polyakov
b943b7d2c7
md5/asm/md5-[586|x86_64].pl: +15% on Atom.
...
[MD5 is hardly relevant, just cleaning up repository]
2014-05-04 16:56:00 +02:00
Andy Polyakov
496f2b148b
C64x+ assembply pack: add RC4 module.
2014-05-04 16:39:59 +02:00
Andy Polyakov
bd227733b9
C64x+ assembly pack: make it work with older toolchain.
2014-05-04 16:38:32 +02:00
Andy Polyakov
9250a30692
sha/asm/sha1-armv4-large.pl: add NEON and ARMv8 code paths.
...
sha/asm/sha256-armv4.pl: add ARMv8 code path.
2014-05-04 10:57:55 +02:00
Andy Polyakov
4afa9f033d
crypto/armcap.c: detect ARMv8 capabilities [in 32-bit build].
2014-05-04 10:55:49 +02:00
David Ramos
16ba70746b
Double free in i2o_ECPublicKey
...
PR: 3338
2014-05-04 00:46:20 +01:00
Geoff Thorpe
da12bfca51
dso: eliminate VMS code on non-VMS systems
...
Even though the meat of dso_vms.c is compiled out on non-VMS builds,
the (pre-)compiler still traverses some of the macro handling. This
trips up at least one non-VMS build configuration, so this commit
makes the skip-VMS case more robust.
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
2014-05-01 21:59:36 -04:00
Jeff Trawick
e5676b8328
typo in SSL_get_peer_cert_chain docs
...
RT: 3304
2014-05-01 13:40:01 +02:00
Matt Caswell
a141effa7b
Fixed spelling error in error message. Fix supplied by Marcos Marado
2014-05-01 00:28:00 +01:00
Geoff Thorpe
a529261891
bignum: fix boundary condition in montgomery logic
...
It's not clear whether this inconsistency could lead to an actual
computation error, but it involved a BIGNUM being passed around the
montgomery logic in an inconsistent state. This was found using flags
-DBN_DEBUG -DBN_DEBUG_RAND, and working backwards from this assertion
in 'ectest';
ectest: bn_mul.c:960: BN_mul: Assertion `(_bnum2->top == 0) ||
(_bnum2->d[_bnum2->top - 1] != 0)' failed
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
2014-04-30 11:49:31 -04:00
Ben Laurie
9cabf6bb80
More warnings.
2014-04-29 18:19:54 +01:00
Matt Caswell
ba1cb9a553
Fix SSL_CONF_cmd missing =back
2014-04-27 18:57:34 +01:00
Matt Caswell
b5450d6349
Fixed minor errors in docs
2014-04-26 21:56:36 +01:00
Matt Caswell
6bcc4475fc
PKCS5_PBKDF2_HMAC documentation submitted by Jeffrey Walton
2014-04-26 21:44:26 +01:00
Chris Rorvick
fa9d77dcd2
doc: Add missing =back directive.
...
Signed-off-by: Chris Rorvick <chris@rorvick.com >
2014-04-26 12:32:53 -05:00
mancha
8acb953880
Fix version documentation.
...
Specify -f is for compilation flags. Add -d to synopsis section.
Closes #77 .
2014-04-26 08:09:53 +01:00
mancha
e14f14d36e
Fix eckey_priv_encode()
...
Fix eckey_priv_encode to return an error on failure of i2d_ECPrivateKey.
2014-04-26 07:59:13 +01:00
Geoff Thorpe
79c6c4e828
make depend
2014-04-25 14:31:05 -04:00
Geoff Thorpe
76c3ff6937
apps: constify some string parameters
...
There are certainly many more constifiable strings in the various
interfaces, which I hope to get to eventually.
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
2014-04-25 14:31:05 -04:00
Geoff Thorpe
647f360e2e
util/mkerr.pl: fix perl warning
...
Gets rid of this;
defined(@array) is deprecated at ../util/mkerr.pl line 792.
(Maybe you should just omit the defined()?)
defined(@array) is deprecated at ../util/mkerr.pl line 800.
(Maybe you should just omit the defined()?)
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
2014-04-25 14:31:05 -04:00
Mark J. Cox
cdcd5dc865
Remove latest version, it's pretty redundant and just one more thing
...
to keep up to date with releases. Reported because
http://www.openssl.org/support/faq.html#MISC1 was out of date
2014-04-25 08:12:13 +01:00
Geoff Thorpe
c9011ec460
util/mkdef.pl: o_time.h doesn't exist any more
...
o_time.h was removed in commit ff49a94 , which breaks "make update"
unless mkdir.pl is updated accordingly.
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
2014-04-25 01:01:17 -04:00
Steve Marquess
d2cc3d8a4e
Add new sponsors
2014-04-24 12:33:03 +01:00
Andy Polyakov
f8cee9d081
bn/asm/armv4-gf2m.pl, modes/asm/ghash-armv4.pl: faster multiplication
...
algorithm suggested in following paper:
Câmara, D.; Gouvêa, C. P. L.; López, J. & Dahab, R.: Fast Software
Polynomial Multiplication on ARM Processors using the NEON Engine.
http://conradoplg.cryptoland.net/files/2010/12/mocrysen13.pdf
2014-04-24 10:24:53 +02:00
Andy Polyakov
558ff0f0c1
aes/asm/bsaes-x86_64.pl: Atom-specific optimization.
2014-04-24 10:13:30 +02:00
Ben Laurie
94d1f4b0f3
Fix use after free.
2014-04-23 07:24:03 +01:00
Ben Laurie
4ba5e63bfd
Fix double frees.
2014-04-22 16:58:43 +01:00
Kaspar Brand
9330a85e04
Fix SSL_CTX_get{first,next}_certificate.
...
Fix typo that stopped SSL_CTX_get_{first,next}_certificate from working.
2014-04-21 16:52:28 +01:00
Dr. Stephen Henson
0dd5b94aeb
Document -debug_decrypt option.
2014-04-16 12:15:43 +01:00
Dr. Stephen Henson
300b9f0b70
Extension checking fixes.
...
When looking for an extension we need to set the last found
position to -1 to properly search all extensions.
PR#3309.
2014-04-15 18:50:53 +01:00
Dr. Stephen Henson
5f8e9a477a
Clarify CMS_decrypt behaviour.
2014-04-15 18:17:12 +01:00
Dr. Stephen Henson
3143a332e8
Add new key fingerprint.
2014-04-11 02:50:51 +01:00
Dr. Stephen Henson
5219d3dd35
Fix free errors in ocsp utility.
...
Keep copy of any host, path and port values allocated by
OCSP_parse_url and free as necessary.
2014-04-09 15:42:40 +01:00
Dr. Stephen Henson
476830fd5b
ssleay_rand_add returns a value in 1.1.0
2014-04-09 15:35:51 +01:00
Dr. Stephen Henson
86f6e8669c
Update NEWS
2014-04-08 22:31:14 +01:00
Dr. Stephen Henson
f74fa33bce
Return if ssleay_rand_add called with zero num.
...
Treat a zero length passed to ssleay_rand_add a no op: the existing logic
zeroes the md value which is very bad. OpenSSL itself never does this
internally and the actual call doesn't make sense as it would be passing
zero bytes of entropy.
Thanks to Marcus Meissner <meissner@suse.de > for reporting this bug.
(cherry picked from commit 5be1ae28ef )
2014-04-07 19:44:45 +01:00
Dr. Stephen Henson
731f431497
Add heartbeat extension bounds check.
...
A missing bounds check in the handling of the TLS heartbeat extension
can be used to reveal up to 64k of memory to a connected client or
server.
Thanks for Neel Mehta of Google Security for discovering this bug and to
Adam Langley <agl@chromium.org > and Bodo Moeller <bmoeller@acm.org > for
preparing the fix (CVE-2014-0160)
(cherry picked from commit 96db9023b8 )
2014-04-07 19:44:38 +01:00
Dr. Stephen Henson
4e6c12f308
Document -verify_return_error option.
2014-04-07 13:02:39 +01:00
Andy Polyakov
997d1aac7c
crypto/modes/gcm128.c: more strict aliasing fixes.
2014-04-06 17:19:54 +02:00
Andy Polyakov
6eebcf3459
vpaes-[x86_64|ppc].pl: fix typo, which for some reason triggers rkhunter.
2014-04-06 12:50:36 +02:00
Dr. Stephen Henson
cd6bd5ffda
Set TLS padding extension value.
...
Enable TLS padding extension using official value from:
http://www.iana.org/assignments/tls-extensiontype-values/tls-extensiontype-values.xhtml
2014-04-05 20:43:54 +01:00
Dr. Stephen Henson
f8dd55bb5b
For more than 160 bits of security disable SHA1 HMAC
2014-04-05 13:39:35 +01:00
Dr. Stephen Henson
b7e46a9bce
Update security framework docs.
2014-04-05 13:29:41 +01:00
Dr. Stephen Henson
6cc0068430
Update FAQ.
2014-04-04 12:46:39 +01:00
Dr. Stephen Henson
7ba08a4d73
Use correct length when prompting for password.
...
Use bufsiz - 1 not BUFSIZ - 1 when prompting for a password in
the openssl utility.
Thanks to Rob Mackinnon, Leviathan Security for reporting this issue.
2014-04-04 12:44:43 +01:00
Dr. Stephen Henson
dbb7654dc1
Document new crl option.
2014-04-03 13:33:50 +01:00
Tim Hudson
de2d97cd79
Add option to generate old hash format.
...
New -hash_old to generate CRL hashes using old
(before OpenSSL 1.0.0) algorithm.
2014-04-03 13:26:32 +01:00
Eric Young
10378fb5f4
Fix base64 decoding bug.
...
A short PEM encoded sequence if passed to the BIO, and the file
had 2 \n following would fail.
PR#3289
2014-04-02 19:54:27 +01:00
Dr. Stephen Henson
b48310627d
Don't try and verify signatures if key is NULL (CVE-2013-0166)
...
Add additional check to catch this in ASN1_item_verify too.
(cherry picked from commit 66e8211c0b )
2014-04-01 16:37:51 +01:00
Ben Laurie
5a49001bde
Fix warning.
2014-03-29 19:51:58 +00:00
Dr. Stephen Henson
0f817d3b27
Add initial security framework docs.
2014-03-28 16:42:18 +00:00
Dr. Stephen Henson
21e0c1d23a
Set security level in cipher string.
...
Allow setting of security level in cipher string using the
@SECLEVEL=N syntax.
2014-03-28 14:56:43 +00:00
Dr. Stephen Henson
77a926e676
Set security level to zero is ssltest
...
Since ssltest needs to test low security ciphersuites and keys
set security level to zero so they aren't rejected.
2014-03-28 14:56:43 +00:00
Dr. Stephen Henson
e03c5b59f0
Security callback debug print out.
...
Add a debugging security callback option to s_client/s_server. This will
print out each security parameter as it is accepted or rejected.
2014-03-28 14:56:43 +00:00
Dr. Stephen Henson
b362ccab5c
Security framework.
...
Security callback: selects which parameters are permitted including
sensible defaults based on bits of security.
The "parameters" which can be selected include: ciphersuites,
curves, key sizes, certificate signature algorithms, supported
signature algorithms, DH parameters, SSL/TLS version, session tickets
and compression.
In some cases prohibiting the use of a parameters will mean they are
not advertised to the peer: for example cipher suites and ECC curves.
In other cases it will abort the handshake: e.g DH parameters or the
peer key size.
Documentation to follow...
2014-03-28 14:56:30 +00:00
Dr. Stephen Henson
66f96fe2d5
Check return value of ssl3_output_cert_chain
2014-03-28 14:49:04 +00:00
Dr. Stephen Henson
8b8e5bed23
Allow return of supported ciphers.
...
New function ssl_cipher_disabled.
Check for disabled client ciphers using ssl_cipher_disabled.
New function to return only supported ciphers.
New option to ciphers utility to print only supported ciphers.
2014-03-28 14:49:04 +00:00
Dr. Stephen Henson
09599b52d4
Auto DH support.
...
Add auto DH parameter support. This is roughly equivalent to the
ECDH auto curve selection but for DH. An application can just call
SSL_CTX_set_auto_dh(ctx, 1);
and appropriate DH parameters will be used based on the size of the
server key.
Unlike ECDH there is no way a peer can indicate the range of DH parameters
it supports. Some peers cannot handle DH keys larger that 1024 bits for
example. In this case if you call:
SSL_CTX_set_auto_dh(ctx, 2);
Only 1024 bit DH parameters will be used.
If the server key is 7680 bits or more in size then 8192 bit DH parameters
will be used: these will be *very* slow.
The old export ciphersuites aren't supported but those are very
insecure anyway.
2014-03-28 14:49:04 +00:00
Dr. Stephen Henson
2514fa79ac
Add functions returning security bits.
...
Add functions to return the "bits of security" for various public key
algorithms. Based on SP800-57.
2014-03-28 14:49:04 +00:00
Dr. Stephen Henson
4563da1d7c
Fix memory leak with client auth.
...
(cherry picked from commit bc5ec653ba )
2014-03-27 16:12:59 +00:00
Dr. Stephen Henson
f0ef019da2
Add -no_resumption_on_reneg to SSL_CONF.
...
(cherry picked from commit 1f44dac24d )
2014-03-27 16:12:40 +00:00
Dr. Stephen Henson
e970f63dc0
Update chain building function.
...
Don't clear verification errors from the error queue unless
SSL_BUILD_CHAIN_FLAG_CLEAR_ERROR is set.
If errors occur during verification and SSL_BUILD_CHAIN_FLAG_IGNORE_ERROR
is set return 2 so applications can issue warnings.
(cherry picked from commit 2dd6976f6d )
2014-03-27 14:24:40 +00:00
Emilia Kasper
7c5718be27
Allow duplicate certs in ssl_build_cert_chain
2014-03-24 12:33:54 +01:00
Dr. Stephen Henson
3a98f9cf20
Workaround for some CMS signature formats.
...
Some CMS SignedData structure use a signature algorithm OID such
as SHA1WithRSA instead of the RSA algorithm OID. Workaround this
case by tolerating the signature if we recognise the OID.
2014-03-19 17:28:01 +00:00
Piotr Sikora
f04665a653
Retry callback only after ClientHello received.
2014-03-18 23:55:32 +00:00
Dr. Stephen Henson
14c67a7004
Update ordinals.
...
Use a previously unused value as we will be updating multiple released
branches.
(cherry picked from commit 0737acd2a8 )
2014-03-12 14:42:08 +00:00
Dr. Stephen Henson
f9b6c0ba4c
Fix for CVE-2014-0076
...
Fix for the attack described in the paper "Recovering OpenSSL
ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack"
by Yuval Yarom and Naomi Benger. Details can be obtained from:
http://eprint.iacr.org/2014/140
Thanks to Yuval Yarom and Naomi Benger for discovering this
flaw and to Yuval Yarom for supplying a fix.
(cherry picked from commit 2198be3483 )
Conflicts:
CHANGES
2014-03-12 14:29:43 +00:00
Dr. Stephen Henson
a029788b0e
typo
2014-03-10 15:47:33 +00:00
Dr. Stephen Henson
d628885e9a
Simplify ssl_add_cert_chain logic.
2014-03-10 15:47:33 +00:00
Dr. Stephen Henson
ab0f880433
Remove -WX option from debug-VC-WIN32
...
(cherry picked from commit 7a3e67f029969620966b8a627b8485d83692cca5)
2014-03-07 19:07:52 +00:00
Andy Polyakov
ea38f02049
engines/ccgost/gosthash.c: simplify and avoid SEGV.
...
PR: 3275
2014-03-07 11:02:25 +01:00
Andy Polyakov
5e44c144e6
SPARC T4 assembly pack: treat zero input length in CBC.
...
The problem is that OpenSSH calls EVP_Cipher, which is not as
protective as EVP_CipherUpdate. Formally speaking we ought to
do more checks in *_cipher methods, including rejecting
lengths not divisible by block size (unless ciphertext stealing
is in place). But for now I implement check for zero length in
low-level based on precedent.
PR: 3087, 2775
2014-03-07 10:30:37 +01:00
Andy Polyakov
53e5161231
dh_check.c: check BN_CTX_get's return value.
2014-03-06 14:19:37 +01:00
Andy Polyakov
687403fb24
test/Makefile: allow emulated test (e.g. under wine).
...
Submitted by: Roumen Petrov
2014-03-06 14:08:02 +01:00
Andy Polyakov
972b0dc350
bss_dgram.c,d1_lib.c: make it compile with mingw.
...
Submitted by: Roumen Petrov
2014-03-06 14:04:56 +01:00
Dr. Stephen Henson
315cd871c4
For self signed root only indicate one error.
...
(cherry picked from commit bdfc0e284c )
2014-03-03 23:36:46 +00:00
Dr. Stephen Henson
5693a30813
PKCS#8 support for alternative PRFs.
...
Add option to set an alternative to the default hmacWithSHA1 PRF
for PKCS#8 private key encryptions. This is used automatically
by PKCS8_encrypt if the nid specified is a PRF.
Add option to pkcs8 utility.
Update docs.
(cherry picked from commit b60272b01f )
2014-03-01 23:16:08 +00:00
Dr. Stephen Henson
01757858fe
Fix memory leak.
...
(cherry picked from commit 124d218889 )
2014-03-01 23:15:53 +00:00
Dr. Stephen Henson
db7b5e0d76
Add function to free compression methods.
...
Although the memory allocated by compression methods is fixed and
cannot grow over time it can cause warnings in some leak checking
tools. The function SSL_COMP_free_compression_methods() will free
and zero the list of supported compression methods. This should
*only* be called in a single threaded context when an application
is shutting down to avoid interfering with existing contexts
attempting to look up compression methods.
(cherry picked from commit 976c58302b )
2014-03-01 23:15:25 +00:00
Andy Polyakov
65370f9bbc
Makefile.org: fix syntax error on Solaris.
...
PR: 3271
2014-02-28 22:54:40 +01:00
Andy Polyakov
4ca026560a
Configure: mark unixware target as elf-1.
2014-02-27 14:27:15 +01:00
Andy Polyakov
b62a4a1c0e
perlasm/x86asm.pl: recognize elf-1 denoting old ELF platforms.
2014-02-27 14:26:12 +01:00
Andy Polyakov
ce876d8316
perlasm/x86gas.pl: limit special OPENSSL_ia32cap_P treatment to ELF.
2014-02-27 14:22:13 +01:00
Andy Polyakov
f861b1d433
rc4/asm/rc4-586.pl: allow for 386-only build.
2014-02-27 14:19:19 +01:00
Andy Polyakov
fd361a67ef
des/asm/des-586.pl: shortcut reference to DES_SPtrans.
2014-02-27 14:17:43 +01:00
Rob Stradling
52f71f8181
CABForum EV OIDs for Subject Jurisdiction of Incorporation or Registration.
2014-02-26 15:33:11 +00:00
Dr. Stephen Henson
031ea2d14a
Fix for WIN32 builds with KRB5
...
(cherry picked from commit 3eddd1706a30cdf3dc9278692d8ee9038eac8a0d)
2014-02-26 15:33:11 +00:00
Andy Polyakov
d49135e7ea
sha/asm/sha256-586.pl: don't try to compile SIMD with no-sse2.
2014-02-26 10:22:13 +01:00
Andy Polyakov
147cca8f53
sha/asm/sha512-x86_64.pl: fix compilation error on Solaris.
2014-02-26 09:30:03 +01:00
Andy Polyakov
7bb9d84e35
Configure: blended processor target in solaris-x86-cc.
2014-02-26 09:28:22 +01:00
Andy Polyakov
03da57fe14
ssl/t1_enc.c: check EVP_MD_CTX_copy return value.
...
PR: 3201
2014-02-25 22:21:54 +01:00
Andy Polyakov
e704741bf3
aes/asm/vpaes-ppc.pl: fix traceback info.
2014-02-25 20:11:34 +01:00
Dr. Stephen Henson
e0520c65d5
Don't use BN_ULLONG in n2l8 use SCTS_TIMESTAMP.
...
(cherry picked from commit 3678161d71 )
2014-02-25 15:06:51 +00:00
Dr. Stephen Henson
3a325c60a3
Fix for v3_scts.c
...
Not all platforms define BN_ULLONG. Define SCTS_TIMESTAMP as a type
which should work on all platforms.
(cherry picked from commit 6634416732 )
2014-02-25 14:56:31 +00:00
Dr. Stephen Henson
86a2f966d0
Add -show_chain option to print out verified chain.
2014-02-25 14:05:22 +00:00
Dr. Stephen Henson
a4cc3c8041
Avoid Windows 8 Getversion deprecated errors.
...
Windows 8 SDKs complain that GetVersion() is deprecated.
We only use GetVersion like this:
(GetVersion() < 0x80000000)
which checks if the Windows version is NT based. Use a macro check_winnt()
which uses GetVersion() on older SDK versions and true otherwise.
2014-02-25 13:40:33 +00:00
Rob Stradling
19f65ddbab
Parse non-v1 SCTs less awkwardly.
2014-02-25 10:14:51 +00:00
Andy Polyakov
63aff3001e
ms/do_win64a.bat: forward to NUL, not NUL:.
...
Allegedly formwarding to NUL: sometimes creates NUL file in file
system.
PR: 3250
2014-02-24 19:29:49 +01:00
Andy Polyakov
779c51c644
BC-32.pl: refresh Borland C support.
...
PR: 3251
Suggested by: Thorsten Schning
2014-02-24 16:42:40 +01:00
Andy Polyakov
758954e0d8
x509/by_dir.c: fix run-away pointer (and potential SEGV)
...
when adding duplicates in add_cert_dir.
PR: 3261
Reported by: Marian Done
2014-02-24 15:16:56 +01:00
Andy Polyakov
d099f0ed6c
config: recognize ARMv8/AArch64 target.
2014-02-24 13:18:40 +01:00
Dr. Stephen Henson
358d352aa2
Only set current certificate to valid values.
...
When setting the current certificate check that it has a corresponding
private key.
2014-02-23 13:46:52 +00:00
Dr. Stephen Henson
13dc3ce9ab
New chain building flags.
...
New flags to build certificate chains. The can be used to rearrange
the chain so all an application needs to do is add all certificates
in arbitrary order and then build the chain to check and correct them.
Add verify error code when building chain.
Update docs.
2014-02-23 13:36:38 +00:00
Dr. Stephen Henson
daddd9a950
Option to set current cert to server certificate.
2014-02-21 19:44:09 +00:00
Andy Polyakov
214368ffee
aes/asm/aesni-x86[_64].pl: minor Atom-specific performance tweak.
2014-02-21 12:14:04 +01:00
Dr. Stephen Henson
47739161c6
fix WIN32 warnings
...
(cherry picked from commit b709f8ef54 )
2014-02-20 22:55:24 +00:00
Dr. Stephen Henson
8764e86339
make depend
2014-02-20 18:48:56 +00:00
Dr. Stephen Henson
ded18639d7
Move CT viewer extension code to crypto/x509v3
2014-02-20 18:48:56 +00:00
Dr. Stephen Henson
4cfeb00be9
make depend
2014-02-19 20:09:08 +00:00
Dr. Stephen Henson
84917787b5
Remove references to o_time.h
2014-02-19 20:06:13 +00:00
Ben Laurie
ff49a94439
Move gmtime functions to crypto.h.
2014-02-19 18:02:04 +00:00
Ben Laurie
e91fb53b38
Make i2r_sctlist static.
2014-02-19 17:57:44 +00:00
Ben Laurie
c0482547b3
Reverse export of o_time.h.
2014-02-19 17:57:07 +00:00
Ben Laurie
765e9ba911
Merge branch 'sct-viewer-master' of https://github.com/robstradling/openssl into sct-viewer
2014-02-19 17:17:14 +00:00
Rob Stradling
b263f21246
Move the SCT List extension parser into libssl.
...
Add the extension parser in the s_client, ocsp and x509 apps.
2014-02-19 13:12:46 +00:00
Dr. Stephen Henson
6ecbc2bb62
Don't use CRYPTO_AES_CTR if it isn't defined.
2014-02-18 22:20:30 +00:00
Dr. Stephen Henson
3c6c139a07
Restore SSL_OP_MSIE_SSLV2_RSA_PADDING
...
The flag SSL_OP_MSIE_SSLV2_RSA_PADDING hasn't done anything since OpenSSL
0.9.7h but deleting it will break source compatibility with any software
that references it. Restore it but #define to zero.
(cherry picked from commit b17d6b8d1d )
2014-02-16 11:43:46 +00:00
Dr. Stephen Henson
f3a3903260
Don't use getcwd in non-copy builds.
2014-02-15 20:16:54 +00:00
Dr. Stephen Henson
5a7652c3e5
Remove duplicate statement.
2014-02-15 01:27:56 +00:00
Klaus-Peter Junghanns
be2c4d9bd9
Add support for aes-128/192/256-ctr to the cryptodev engine.
...
This can be used to speed up SRTP with libsrtp, e.g. on TI omap/sitara based devices.
2014-02-15 00:01:40 +00:00
Rob Stradling
dcfe8df148
Show the contents of the RFC6962 Signed Certificate Timestamp List Certificate/OCSP Extensions.
...
Add the RFC6962 OIDs to the objects table.
2014-02-14 23:24:35 +00:00
Kurt Roeckx
3343220327
Use defaults bits in req when not given
...
If you use "-newkey rsa" it's supposed to read the default number of bits from the
config file. However the value isn't used to generate the key, but it does
print it's generating such a key. The set_keygen_ctx() doesn't call
EVP_PKEY_CTX_set_rsa_keygen_bits() and you end up with the default set in
pkey_rsa_init() (1024). Afterwards the number of bits gets read from the config
file, but nothing is done with that anymore.
We now read the config first and use the value from the config file when no size
is given.
PR: 2592
2014-02-14 22:30:27 +00:00
Kurt Roeckx
e547c45f1c
Fix additional pod errors with numbered items.
2014-02-14 22:30:26 +00:00
Scott Schaefer
2b4ffc659e
Fix various spelling errors
2014-02-14 22:29:12 +00:00
Scott Schaefer
856c6dfb09
Document pkcs12 -password behavior
...
apps/pkcs12.c accepts -password as an argument. The document author
almost certainly meant to write "-password, -passin".
However, that is not correct, either. Actually the code treats
-password as equivalent to -passin, EXCEPT when -export is also
specified, in which case -password as equivalent to -passout.
2014-02-14 22:28:37 +00:00
Andy Polyakov
701134320a
ssl/s3_pkt.c: detect RAND_bytes error in multi-block.
2014-02-14 17:43:31 +01:00
Andy Polyakov
f4d456408d
x86[_64]cpuid.pl: add low-level RDSEED.
2014-02-14 17:24:12 +01:00
Andy Polyakov
5599c7331b
aes/asm/aesni-x86_64.pl: further optimization for Atom Silvermont.
...
Improve CBC decrypt and CTR by ~13/16%, which adds up to ~25/33%
improvement over "pre-Silvermont" version. [Add performance table to
aesni-x86.pl].
2014-02-14 17:06:15 +01:00
Dr. Stephen Henson
385b348666
Include TA in checks/callback with partial chains.
...
When a chain is complete and ends in a trusted root checks are also
performed on the TA and the callback notified with ok==1. For
consistency do the same for chains where the TA is not self signed.
2014-02-14 15:07:01 +00:00
Dr. Stephen Henson
2dac2667d1
Don't do loop detection for self signed check.
2014-02-14 14:52:23 +00:00
Dr. Stephen Henson
847865d0f9
Add suppot for ASCII with CRLF canonicalisation.
2014-02-13 14:35:56 +00:00
Dr. Stephen Henson
4dce704145
fix error discrepancy
...
(cherry picked from commit a2317c3ffd )
2014-02-13 14:35:22 +00:00
Andy Polyakov
9587429fa0
evp/e_aes_cbc_hmac_sha*.c: improve cache locality.
2014-02-13 14:39:55 +01:00
Andy Polyakov
98e143f118
ghash-x86[_64].pl: ~15% improvement on Atom Silvermont
...
(other processors unaffected).
2014-02-13 14:37:28 +01:00
Ben Laurie
fc92396976
Fix warning.
2014-02-13 03:11:58 +00:00
Ben Laurie
6311681236
Build on MacOS.
2014-02-09 12:49:04 +00:00
Dr. Stephen Henson
b45e874d7c
Return previous compression methods when setting them.
2014-02-06 13:57:26 +00:00
Dr. Stephen Henson
c53a5308a5
Oops, get selection logic right.
2014-02-05 18:57:25 +00:00
Ben Laurie
f1f7598ce9
Fix warnings.
2014-02-05 18:25:47 +00:00
Scott Deboy
9dabfce1a8
Don't break out of the custom extension callback loop - continue instead
...
The contract for custom extension callbacks has changed - all custom extension callbacks are triggered
2014-02-05 18:25:47 +00:00
Ben Laurie
0a6028757a
Fix whitespace, new-style comments.
2014-02-05 18:25:46 +00:00
Scott Deboy
e9add063b5
Re-add alert variables removed during rebase
...
Whitespace fixes
2014-02-05 18:25:46 +00:00
Scott Deboy
519531e97e
Updating DTCP authorization type to expected value
2014-02-05 18:25:46 +00:00
Scott Deboy
ac20719d99
Update custom TLS extension and supplemental data 'generate' callbacks to support sending an alert.
...
If multiple TLS extensions are expected but not received, the TLS extension and supplemental data 'generate' callbacks are the only chance for the receive-side to trigger a specific TLS alert during the handshake.
Removed logic which no-op'd TLS extension generate callbacks (as the generate callbacks need to always be called in order to trigger alerts), and updated the serverinfo-specific custom TLS extension callbacks to track which custom TLS extensions were received by the client, where no-ops for 'generate' callbacks are appropriate.
2014-02-05 18:25:46 +00:00
Dr. Stephen Henson
a51f767645
Return per-certificate chain if extra chain is NULL.
...
If an application calls the macro SSL_CTX_get_extra_chain_certs
return either the old "shared" extra certificates or those associated
with the current certificate.
This means applications which call SSL_CTX_use_certificate_chain_file
and retrieve the additional chain using SSL_CTX_get_extra_chain_certs
will still work. An application which only wants to check the shared
extra certificates can call the new macro
SSL_CTX_get_extra_chain_certs_only
2014-02-05 17:05:01 +00:00
Andy Polyakov
5a42c8f07f
e_aes_cbc_hmac_sha[1|256].c: fix compiler warning.
2014-02-05 16:38:22 +01:00
Andy Polyakov
a9c6edcde7
ssl/s3_pkt.c: move multi-block processing to ssl3_write_bytes.
...
This allows to process multiple fragmets of maximum fragment size,
as opposite to chopping maximum-sized fragments to multiple smaller
ones. This approach relies on dynamic allocation of larger buffers,
which we trade for performance improvement, for several *times* in
some situations.
2014-02-05 14:08:44 +01:00
Andy Polyakov
0d5096fbd6
evp/e_aes_cbc_hmac_sha*.c: additional CTRL to query buffer requirements.
2014-02-05 14:05:08 +01:00
Andy Polyakov
3847d15d6b
[aesni|sha*]-mb-x86_64.pl: add data prefetching.
2014-02-05 14:03:35 +01:00
Andy Polyakov
3ef477c69f
s3_pkt.c: move ssl3_release_write_buffer to ssl3_write_bytes.
...
If application has more data than maximum fragment, hold to buffer
for whole write, as opposite to per-fragment strategy.
2014-02-05 13:57:10 +01:00
Dr. Stephen Henson
24e20db4aa
Add quotes as CC can contain spaces.
...
PR#3253
2014-02-03 14:10:24 +00:00
Dr. Stephen Henson
0f78819c8c
New ctrl to set current certificate.
...
New ctrl sets current certificate based on certain criteria. Currently
two options: set the first valid certificate as current and set the
next valid certificate as current. Using these an application can
iterate over all certificates in an SSL_CTX or SSL structure.
2014-02-02 22:58:19 +00:00
Dr. Stephen Henson
9f9ab1dc66
Demo of use of errors in applications.
2014-02-02 22:58:19 +00:00
Andy Polyakov
d162584b11
modes/asm/ghash-s390x.pl: +15% performance improvement on z10.
2014-02-02 00:09:17 +01:00
Andy Polyakov
d8ba0dc977
crypto/aes/asm/aesni-x86[_64].pl update, up to 14% improvement on
...
Atom Silvermont. On other CPUs one can observe 1% loss on some
algorithms.
2014-02-01 21:13:49 +01:00
Andy Polyakov
b217ca63b1
crypto/sha/asm/sha1-x86_64.pl update:
...
+5% on Atom Silvermont, up to +8% improvement of legacy code.
Harmonize sha1-586.pl and aesni-sha1-x86_86.p with sha1-x86_64.pl.
2014-02-01 21:07:16 +01:00
Dr. Stephen Henson
30ea570f0f
Clarify docs.
...
Remove reference to ERR_TXT_MALLOCED in the error library as that is
only used internally. Indicate that returned error data must not be
freed.
(cherry picked from commit f2d678e6e8 )
2014-01-29 01:01:52 +00:00
Dr. Stephen Henson
cb2182676b
typo
2014-01-28 15:35:16 +00:00
Dr. Stephen Henson
73c92dfa0c
Check i before r[i].
...
PR#3244
(cherry picked from commit 9614d2c676 )
2014-01-28 15:15:58 +00:00
Dr. Stephen Henson
717cc85895
Fix demo comment: 0.9.9 never released.
2014-01-28 15:15:26 +00:00
Dr. Stephen Henson
e933f91f50
Add loaded dynamic ENGINEs to list.
...
Always add a dynamically loaded ENGINE to list. Otherwise it can cause
problems when multiply loaded, especially if it adds new public key methods.
For all current engines we only want a single implementation anyway.
2014-01-28 13:51:58 +00:00
Dr. Stephen Henson
cbb6744827
New function to set compression methods so they can be safely freed.
2014-01-27 14:30:29 +00:00
Dr. Stephen Henson
ec492c8a5a
Compare encodings in X509_cmp as well as hash.
2014-01-26 16:29:50 +00:00
Dr. Stephen Henson
3323314fc1
Add cert callback retry test.
2014-01-26 16:29:50 +00:00
Dr. Stephen Henson
46ab9bbd7f
Certificate callback doc.
2014-01-26 16:29:43 +00:00
Dr. Stephen Henson
0ebc965b9c
Support retries in certificate callback
2014-01-26 02:44:34 +00:00
Dr. Stephen Henson
ba168244a1
Add new function SSL_CTX_get_ssl_method().
...
Partial fix for PR#3183.
2014-01-16 14:07:46 +00:00
Kaspar Brand
d0b039d4a3
Omit initial status request callback check.
...
PR#3178
2014-01-16 13:46:31 +00:00
Dr. Stephen Henson
9f10e9293b
typo
2014-01-12 14:13:48 +00:00
Dr. Stephen Henson
ef643cc7bd
Use rdrand as additional entropy source.
...
If available rdrand is used as an additional entropy source for the
PRNG and for additional input in FIPS mode.
2014-01-11 14:19:25 +00:00
Jeff Trawick
4b64e0cbdb
typo
2014-01-10 23:01:30 +00:00
Jeff Trawick
5edce5685f
typo
2014-01-10 23:00:50 +00:00
Dr. Stephen Henson
8f4077ca69
Fix bug in X509_V_FLAG_IGNORE_CRITICAL CRL handling.
2014-01-09 22:52:49 +00:00
Daniel Kahn Gillmor
0ecfd920e5
update remaining documentation to move from EDH to DHE
...
change documentation and comments to indicate that we prefer the
standard "DHE" naming scheme everywhere over the older "EDH"
2014-01-09 15:43:28 +00:00
Daniel Kahn Gillmor
4b5cce664c
Replace EDH-RSA-DES-CBC-SHA, etc. with DHE-RSA-DES-CBC-SHA
...
Replace the full ciphersuites with "EDH-" in their labels with "DHE-"
so that all DHE ciphersuites are referred to in the same way.
Leave backward-compatible aliases for the ciphersuites in question so
that configurations which specify these explicitly will continue
working.
2014-01-09 15:43:28 +00:00
Daniel Kahn Gillmor
889f39c70f
change SSL3_CK_EDH_* to SSL_CK_DHE_* (with backward-compatibility)
...
This change normalizes the SSL_CK_DHE_ #defines to use the common term
"DHE", while permitting older code that uses the more uncommon "EDH"
constants to compile properly.
2014-01-09 15:43:28 +00:00
Daniel Kahn Gillmor
0b30fc903f
documentation should use "DHE" instead of "EDH"
2014-01-09 15:43:28 +00:00
Daniel Kahn Gillmor
5a21cadbeb
use SSL_kDHE throughout instead of SSL_kEDH
...
DHE is the standard term used by the RFCs and by other TLS
implementations. It's useful to have the internal variables use the
standard terminology.
This patch leaves a synonym SSL_kEDH in place, though, so that older
code can still be built against it, since that has been the
traditional API. SSL_kEDH should probably be deprecated at some
point, though.
2014-01-09 15:43:28 +00:00
Daniel Kahn Gillmor
75cb3771b4
emit "DHE" instead of "edh" for kX packet trace output
...
other parts of packet tracing emit the standard "DHE" label instead of
"edh". This change brings the output of ssl_print_client_keyex() and
ssl_print_server_keyex() into accordance with the standard term.
2014-01-09 15:43:27 +00:00
Daniel Kahn Gillmor
7988163c3b
Allow "DHE" and "kDHE" as synonyms of "EDH" and "kEDH" when specifiying ciphers
...
The standard terminology in https://tools.ietf.org/html/rfc5426 is
"DHE". "openssl ciphers" outputs "DHE" (for the most part). But
users of the library currently cannot specify "DHE", they must
currently specify "EDH".
This change allows users to specify the common term in cipher suite
strings without breaking backward compatibility.
2014-01-09 15:43:27 +00:00
Daniel Kahn Gillmor
4082fea81c
use SSL_kECDHE throughout instead of SSL_kEECDH
...
ECDHE is the standard term used by the RFCs and by other TLS
implementations. It's useful to have the internal variables use the
standard terminology.
This patch leaves a synonym SSL_kEECDH in place, though, so that older
code can still be built against it, since that has been the
traditional API. SSL_kEECDH should probably be deprecated at some
point, though.
2014-01-09 15:43:27 +00:00
Daniel Kahn Gillmor
0be085d34a
emit "ECDHE" instead of "EECDH" for kX packet trace output
...
other parts of packet tracing emit the standard "ECDHE" label instead
of "EECDH". This change brings the output of ssl_print_client_keyex()
and ssl_print_server_keyex() into accordance with the standard term.
2014-01-09 15:43:27 +00:00
Daniel Kahn Gillmor
7963ddeb44
Allow "ECDHE" as a synonym of "EECDH" when specifiying ciphers
...
The standard terminology in https://tools.ietf.org/html/rfc4492 is
ECDHE. "openssl ciphers" outputs ECDHE. But users of the library
currently cannot specify ECDHE, they must specify EECDH.
This change allows users to specify the common term in cipher suite
strings without breaking backward compatibility.
2014-01-09 15:43:27 +00:00
Andy Polyakov
eedab5241e
bn/asm/x86_64-mont5.pl: fix compilation error on Solaris.
2014-01-09 13:44:59 +01:00
Dr. Stephen Henson
e02614417d
update FAQ
2014-01-08 14:16:24 +00:00
Andy Polyakov
5dc52b919b
PPC assembly pack: relax 64-bit requirement for little-endian support.
2014-01-07 22:44:21 +01:00
Andy Polyakov
1fb83a3bc2
aes/asm/vpaes-ppc.pl: add little-endian support.
2014-01-07 16:48:04 +01:00
Dr. Stephen Henson
f0170ebb97
update NEWS
2014-01-07 15:44:35 +00:00
Dr. Stephen Henson
8d65fdb62e
Add fix for CVE-2013-4353
...
(cherry picked from commit 6b42ed4e7104898f4b5b69337589719913b36404)
2014-01-07 15:39:21 +00:00
Dr. Stephen Henson
9bd1e2b54a
Sync NEWS.
2014-01-06 21:55:15 +00:00
Andy Polyakov
ad0d2579cf
sha/asm/sha256-armv4.pl: add NEON code path.
...
(and shave off cycle even from integer-only code)
2014-01-04 18:04:53 +01:00
Andy Polyakov
25f7117f0e
aesni-sha1-x86_64.pl: refine Atom-specific optimization.
...
(and update performance data, and fix typo)
2014-01-04 17:13:57 +01:00
Dr. Stephen Henson
5b7f36e857
Add ServerInfoFile to SSL_CONF, update docs.
2014-01-03 23:14:23 +00:00
Dr. Stephen Henson
a4339ea3ba
Use algorithm specific chains for certificates.
...
Fix a limitation in SSL_CTX_use_certificate_chain_file(): use algorithm
specific chains instead of the shared chain.
Update docs.
2014-01-03 22:39:49 +00:00
Andy Polyakov
e8b0dd57c0
ssl/t1_enc.c: optimize PRF (suggested by Intel).
2014-01-03 21:52:49 +01:00
Andy Polyakov
2f3af3dc36
aesni-sha1-x86_64.pl: add stiched decrypt procedure,
...
but keep it disabled, too little gain... Add some Atom-specific
optimization.
2014-01-03 21:40:08 +01:00
Dr. Stephen Henson
b77b58a398
Don't change version number if session established
...
When sending an invalid version number alert don't change the
version number to the client version if a session is already
established.
Thanks to Marek Majkowski for additional analysis of this issue.
PR#3191
2014-01-02 15:05:44 +00:00
Dr. Stephen Henson
f6dfbeed3c
Update curve list size.
...
(cherry picked from commit cfa86987a8d9d2b8cc5e5fea2d3260c46542cdb9)
2013-12-29 16:30:35 +00:00
Andy Polyakov
926725b3d7
sparcv9cap.c: omit random detection.
...
PR: 3202
2013-12-28 13:31:14 +01:00
Andy Polyakov
e796666d34
FAQ: why SIGILL?
2013-12-28 13:20:14 +01:00
Andy Polyakov
2218c296b4
ARM assembly pack: make it work with older toolchain.
2013-12-28 12:17:08 +01:00
Dr. Stephen Henson
cd30f03ac5
Canonicalise input in CMS_verify.
...
If content is detached and not binary mode translate the input to
CRLF format. Before this change the input was verified verbatim
which lead to a discrepancy between sign and verify.
2013-12-22 00:35:29 +00:00
Dr. Stephen Henson
20b82b514d
Fix DTLS retransmission from previous session.
...
For DTLS we might need to retransmit messages from the previous session
so keep a copy of write context in DTLS retransmission buffers instead
of replacing it after sending CCS. CVE-2013-6450.
(cherry picked from commit 34628967f1 )
2013-12-20 23:46:16 +00:00
Dr. Stephen Henson
560b34f2b0
Ignore NULL parameter in EVP_MD_CTX_destroy.
...
(cherry picked from commit a6c62f0c25 )
2013-12-20 23:32:25 +00:00
Andy Polyakov
fc0503a25c
sha1-x86_64.pl: harmonize Win64 SE handlers for SIMD code pathes.
...
(and ensure stack alignment in the process)
2013-12-18 22:12:08 +01:00
Andy Polyakov
e9c80e04c1
evp/e_[aes|camellia].c: fix typo in CBC subroutine.
...
It worked because it was never called.
2013-12-18 21:42:46 +01:00
Andy Polyakov
f0f4b8f126
PPC assembly pack update addendum.
2013-12-18 21:39:15 +01:00
Andy Polyakov
cdd1acd788
sha512.c: fullfull implicit API contract in SHA512_Transform.
...
SHA512_Transform was initially added rather as tribute to tradition
than for practucal reasons. But use was recently found in ssl/s3_cbc.c
and it turned to be problematic on platforms that don't tolerate
misasligned references to memory and lack assembly subroutine.
2013-12-18 21:27:35 +01:00
Andy Polyakov
128e1d101b
PPC assembly pack: improve AIX support (enable vpaes-ppc).
2013-12-18 21:19:08 +01:00
Dr. Stephen Henson
ed496b3d42
Check EVP errors for handshake digests.
...
Partial mitigation of PR#3200
(cherry picked from commit 0294b2be5f )
2013-12-18 13:29:07 +00:00
Dr. Stephen Henson
88c21c47a3
Update demo.
2013-12-18 13:28:44 +00:00
Dr. Stephen Henson
4a253652ee
Add opaque ID structure.
...
Move the IP, email and host checking fields from the public
X509_VERIFY_PARAM structure into an opaque X509_VERIFY_PARAM_ID
structure. By doing this the structure can be modified in future
without risk of breaking any applications.
(cherry picked from commit adc6bd73e3 )
Conflicts:
crypto/x509/x509_vpm.c
2013-12-13 15:42:16 +00:00
Dr. Stephen Henson
4fcdd66fff
Update to pad extension.
...
Fix padding calculation for different SSL_METHOD types. Use the
standard name as used in draft-agl-tls-padding-02
2013-12-13 15:39:55 +00:00
Dr. Stephen Henson
102302b05b
Fix for partial chain notification.
...
For consistency with other cases if we are performing
partial chain verification with just one certificate
notify the callback with ok==1.
(cherry picked from commit 852553d9005e13aed7feb986a5d71cb885b994c7)
2013-12-13 15:39:55 +00:00
Dr. Stephen Henson
7af31968dd
Verify parameter retrieval functions.
...
New functions to retrieve internal pointers to X509_VERIFY_PARAM
for SSL_CTX and SSL structures.
(cherry picked from commit be0c9270690ed9c1799900643cab91de146de857)
2013-12-13 15:39:55 +00:00
Dr. Stephen Henson
8a1956f3ea
Don't use rdrand engine as default unless explicitly requested.
...
(cherry picked from commit 16898401bd47a153fbf799127ff57fdcfcbd324f)
2013-12-13 15:39:55 +00:00
Dr. Stephen Henson
e3bc1f4955
remove obsolete STATUS file
2013-12-10 00:10:05 +00:00
Dr. Stephen Henson
57d7ee3a91
Add release dates to NEWS
2013-12-10 00:08:34 +00:00
Andy Polyakov
41965a84c4
x86_64-xlate.pl: minor update.
2013-12-09 21:23:19 +01:00
Andy Polyakov
ec9cc70f72
bn/asm/x86_64-mont5.pl: add MULX/AD*X code path.
...
This also eliminates code duplication between x86_64-mont and x86_64-mont
and optimizes even original non-MULX code.
2013-12-09 21:02:24 +01:00
Andy Polyakov
d1671f4f1a
bn/asm/armv4-mont.pl: add NEON code path.
2013-12-04 22:37:49 +01:00
Andy Polyakov
26e18383ef
perlasm/ppc-xlate.pl: add support for AltiVec/VMX and VSX.
...
Suggested by: Marcello Cerri
2013-12-04 22:01:31 +01:00
Andy Polyakov
f586d97191
perlasm/ppc-xlate.pl: improve linux64le support.
...
Suggested by: Marcello Cerri
2013-12-04 21:47:43 +01:00
Andy Polyakov
a61e51220f
aes/asm/vpaes-ppc.pl: comply with ABI.
2013-12-04 21:46:40 +01:00
Andy Polyakov
34b1008c93
Configure: remove vpaes-ppc from aix targets.
...
AIX assembler doesn't hanle .align, which is essential for vpaes module.
2013-12-04 21:45:20 +01:00
Andy Polyakov
c5d5f5bd0f
bn/asm/x86_64-mont5.pl: comply with Win64 ABI.
...
PR: 3189
Submitted by: Oscar Ciurana
2013-12-03 23:59:55 +01:00
Andy Polyakov
8bd7ca9996
crypto/bn/asm/rsaz-x86_64.pl: make it work on Win64.
2013-12-03 22:28:48 +01:00
Andy Polyakov
31ed9a2131
crypto/bn/rsaz*: fix licensing note.
...
rsaz_exp.c: harmonize line terminating;
asm/rsaz-*.pl: minor optimizations.
2013-12-03 22:08:29 +01:00
Andy Polyakov
6efef384c6
bn/asm/rsaz-x86_64.pl: fix prototype.
2013-12-03 09:43:06 +01:00
Dr. Stephen Henson
4b27bab993
Simplify and update openssl.spec
2013-11-30 14:11:05 +00:00
Andy Polyakov
89bb96e51d
vpaes-ppc.pl: fix bug in IV handling and comply with ABI.
2013-11-29 14:40:51 +01:00
Andy Polyakov
b9e87d07cb
ppc64-mont.pl: eliminate dependency on GPRs' upper halves.
2013-11-27 22:50:00 +01:00
Andy Polyakov
07f3e4f3f9
Take vpaes-ppc module into loop.
2013-11-27 22:39:13 +01:00
Andy Polyakov
b5c54c914f
Add Vector Permutation AES for PPC.
2013-11-27 22:32:56 +01:00
Dr. Stephen Henson
a25f9adc77
New functions to retrieve certificate from SSL_CTX
...
New functions to retrieve current certificate or private key
from an SSL_CTX.
Constify SSL_get_private_key().
2013-11-18 18:56:48 +00:00
Dr. Stephen Henson
60aeb18750
Don't define SSL_select_next_proto if OPENSSL_NO_TLSEXT set
2013-11-18 16:52:10 +00:00
Dr. Stephen Henson
fdeaf55bf9
Use correct header length in ssl3_send_certifcate_request
2013-11-17 17:48:18 +00:00
Dr. Stephen Henson
0f7fa1b190
Constify.
...
(cherry picked from commit 1abfa78a8b )
2013-11-14 21:05:36 +00:00
Piotr Sikora
2911575c6e
Fix compilation with no-nextprotoneg.
...
PR#3106
2013-11-14 01:20:12 +00:00
Dr. Stephen Henson
afa23c46d9
Flag to disable automatic copying of contexts.
...
Some functions such as EVP_VerifyFinal only finalise a copy of the passed
context in case an application wants to digest more data. Doing this when
it is not needed is inefficient and many applications don't require it.
For compatibility the default is to still finalise a copy unless the
flag EVP_MD_CTX_FLAG_FINALISE is set in which case the passed
context is finalised an *no* further data can be digested after
finalisation.
2013-11-13 23:48:35 +00:00
Dr. Stephen Henson
629b640bbc
Allow match selecting of current certificate.
...
If pointer comparison for current certificate fails check
to see if a match using X509_cmp succeeds for the current
certificate: this is useful for cases where the certificate
pointer is not available.
2013-11-13 23:48:35 +00:00
Rob Stradling
7b6b246fd3
Additional "chain_cert" functions.
...
PR#3169
This patch, which currently applies successfully against master and
1_0_2, adds the following functions:
SSL_[CTX_]select_current_cert() - set the current certificate without
disturbing the existing structure.
SSL_[CTX_]get0_chain_certs() - get the current certificate's chain.
SSL_[CTX_]clear_chain_certs() - clear the current certificate's chain.
The patch also adds these functions to, and fixes some existing errors
in, SSL_CTX_add1_chain_cert.pod.
2013-11-13 23:48:35 +00:00
Krzysztof Kwiatkowski
44314cf64d
Delete duplicate entry.
...
PR#3172
2013-11-13 23:48:35 +00:00
Andy Polyakov
f1982acc12
Configure: add linux-ppc64le target.
...
Submitted by: Marcelo Cerri
2013-11-12 22:36:24 +01:00
Andy Polyakov
2df9ec01d5
srp/srp_grps.h: make it Compaq C-friendly.
...
PR: 3165
Submitted by: Daniel Richard G.
2013-11-12 22:09:55 +01:00
Andy Polyakov
5b63a39241
modes/asm/ghash-alpha.pl: fix typo.
2013-11-12 21:52:18 +01:00
Andy Polyakov
d1cf23ac86
Make Makefiles OSF-make-friendly.
...
PR: 3165
2013-11-12 21:51:37 +01:00
Dr. Stephen Henson
16bc45ba95
Fix memory leak.
2013-11-11 22:39:40 +00:00
Dr. Stephen Henson
85c9ba2342
Support setting of "no purpose" for trust.
...
If the oid parameter is set to NULL in X509_add1_trust_object
create an empty list of trusted purposes corresponding to
"no purpose" if trust is checked.
2013-11-11 22:39:23 +00:00
Dr. Stephen Henson
5fad2c93bc
Update FAQ
2013-11-11 22:25:00 +00:00
Andy Polyakov
d0f1d924ad
Makfile.org: make FIPS build work with BSD make.
2013-11-10 23:09:22 +01:00
Dr. Stephen Henson
9b69a63874
Update FAQ with PGP note.
2013-11-10 16:46:54 +00:00
Dr. Stephen Henson
dd274b1c1c
Fix for some platforms where "char" is unsigned.
2013-11-09 15:09:23 +00:00
Dr. Stephen Henson
9c75461bef
Document RSAPublicKey_{in,out} options.
2013-11-09 15:09:23 +00:00
Dr. Stephen Henson
da15c61608
Add CMS_SignerInfo_get0_signature function.
...
Add function to retrieve the signature from a CMS_SignerInfo structure:
applications can then read or modify it.
2013-11-09 15:09:23 +00:00
Dr. Stephen Henson
534e5fabad
Check for missing components in RSA_check.
2013-11-09 15:09:23 +00:00
Andy Polyakov
33446493f4
modes/asm/ghash-alpha.pl: make it work with older assembler for real.
...
PR: 3165
2013-11-09 11:41:59 +01:00
Andy Polyakov
96180cac04
engines/ccgost/gost89.h: make word32 defintion unconditional.
...
Original definition depended on __LONG_MAX__ that is not guaranteed to
be present. As we don't support platforms with int narrower that 32 bits
it's appropriate to make defition inconditional.
PR: 3165
2013-11-08 23:00:35 +01:00
Andy Polyakov
d24d1d7daf
modes/asm/ghash-alpha.pl: make it work with older assembler.
...
PR: 3165
2013-11-08 22:56:44 +01:00
Dr. Stephen Henson
0467ea6862
Experimental workaround TLS filler (WTF) extension.
...
Based on a suggested workaround for the "TLS hang bug" (see FAQ and PR#2771):
if the TLS Client Hello record length value would otherwise be > 255 and less
that 512 pad with a dummy extension containing zeroes so it is at least 512.
To enable it use an unused extension number (for example 0x4242) using
e.g. -DTLSEXT_TYPE_wtf=0x4242
WARNING: EXPERIMENTAL, SUBJECT TO CHANGE.
2013-11-06 20:49:47 +00:00
Dr. Stephen Henson
e0ffd129c1
Enable PSK in FIPS mode.
...
Enable PSK ciphersuites with AES or DES3 in FIPS mode.
2013-11-06 14:38:28 +00:00
Dr. Stephen Henson
26bda7ef2b
Sync error codes with 1.0.2-stable
2013-11-06 14:18:41 +00:00
Dr. Stephen Henson
b0513fd2bb
Initialise context before using it.
...
(cherry picked from commit a4947e4e06 )
2013-11-06 13:19:13 +00:00
Ben Laurie
c10e3f0cff
PBKDF2 should be efficient. Contributed by Christian Heimes
...
<christian@python.org >.
2013-11-03 17:23:50 +00:00
Dr. Stephen Henson
d519f0831c
Add brainpool curves to trace output.
...
(cherry picked from commit bd80d0229c )
2013-11-02 15:30:03 +00:00
Robin Seggelmann
b814081136
DTLS/SCTP struct authchunks Bug
...
PR: 2809
DTLS/SCTP requires DATA and FORWARD-TSN chunks to be protected with
SCTP-AUTH. It is checked if this has been activated successfully for
the local and remote peer. Due to a bug, however, the
gauth_number_of_chunks field of the authchunks struct is missing on
FreeBSD, and was therefore not considered in the OpenSSL implementation.
This patch sets the corresponding pointer for the check correctly
whether or not this bug is present.
(cherry picked from commit f596e3c491 )
2013-11-01 21:41:52 +00:00
Robin Seggelmann
b9ef52b078
DTLS/SCTP Finished Auth Bug
...
PR: 2808
With DTLS/SCTP the SCTP extension SCTP-AUTH is used to protect DATA and
FORWARD-TSN chunks. The key for this extension is derived from the
master secret and changed with the next ChangeCipherSpec, whenever a new
key has been negotiated. The following Finished then already uses the
new key. Unfortunately, the ChangeCipherSpec and Finished are part of
the same flight as the ClientKeyExchange, which is necessary for the
computation of the new secret. Hence, these messages are sent
immediately following each other, leaving the server very little time to
compute the new secret and pass it to SCTP before the finished arrives.
So the Finished is likely to be discarded by SCTP and a retransmission
becomes necessary. To prevent this issue, the Finished of the client is
still sent with the old key.
(cherry picked from commit 9fb523adce )
2013-11-01 21:41:52 +00:00
Piotr Sikora
29b490a458
Fix SSL_OP_SINGLE_ECDH_USE
...
Don't require a public key in tls1_set_ec_id if compression status is
not needed. This fixes a bug where SSL_OP_SINGLE_ECDH_USE wouldn't work.
(cherry picked from commit 5ff68e8f6d )
2013-11-01 21:41:52 +00:00
Dr. Stephen Henson
a9bc1af984
Add -ecdh_single option.
...
Add -ecdh_single option to set SSL_OP_SINGLE_ECDH_USE on the command line.
(cherry picked from commit f14a4a861d )
2013-11-01 21:41:52 +00:00
Dr. Stephen Henson
96e16bddb4
Fix warning.
2013-11-01 21:41:52 +00:00
Dr. Stephen Henson
3f9b187bae
Fix warning.
2013-11-01 21:41:52 +00:00
Andy Polyakov
fb65e65e28
sha/asm/sha512-ppc.pl: fix typo.
...
Submitted by: Marcelo Cerri
2013-10-31 20:21:54 +01:00
Andy Polyakov
0e0a105364
perlas/ppc-xlate.pl: fix typo.
2013-10-31 11:58:50 +01:00
Andy Polyakov
c944f81703
aes/asm/aes-ppc.pl: add little-endian support.
...
Submitted by: Marcelo Cerri
2013-10-31 11:41:26 +01:00
Andy Polyakov
8ff8a829b0
perlasm/ppc-xlate.pl: add .quad directive
...
sha/asm/sha512-ppc.pl: add little-endian support.
Submitted by: Marcelo Cerri
2013-10-31 11:08:51 +01:00
Andy Polyakov
3f9562a669
sha/asm/sha1-ppc.pl: add little-endian support.
...
Submitted by: Marcelo Cerri
2013-10-31 11:07:38 +01:00
Andy Polyakov
e6e29bc4c9
engines/e_aep.c: make it BN_ULONG-size and endian "neutral".
2013-10-28 22:18:48 +01:00
Andy Polyakov
4eeb750d20
bn/asm/x86_64-mont.pl: minor optimization [for Decoded ICache].
2013-10-25 10:14:20 +02:00
Lubomir Rintel
ed77017b59
POD: Fix list termination
...
This fixes problems in POD list formatting: extra or missing =back
sequences.
doc/ssl/SSL_CTX_set1_curves.pod around line 90: =back without =over
doc/ssl/SSL_CTX_set1_verify_cert_store.pod around line 73: =back without =over
doc/ssl/SSL_CTX_add1_chain_cert.pod around line 82: =back without =over
doc/crypto/evp.pod around line 40: '=item' outside of any '=over'
crypto/des/des.pod around line 184: You forgot a '=back' before '=head1'
PR#3147
2013-10-22 07:38:25 +01:00
Lubomir Rintel
c8919dde09
POD: Fix item numbering
...
Newer pod2man considers =item [1-9] part of a numbered list, while =item
0 starts an unnumbered list. Add a zero effect formatting mark to override
this.
doc/apps/smime.pod around line 315: Expected text after =item, not a
number
...
PR#3146
2013-10-22 07:38:25 +01:00
Dr. Stephen Henson
5fdeb58ccd
Update test server details.
2013-10-22 07:38:25 +01:00
Dr. Stephen Henson
c557f921dc
Add SSL_CONF command to set DH Parameters.
2013-10-22 07:38:25 +01:00
Dr. Stephen Henson
abf840e4f7
Fix argument processing.
2013-10-22 05:44:23 +01:00
Dr. Stephen Henson
27f3b65f49
Constification.
2013-10-21 07:19:01 +01:00
Dr. Stephen Henson
ea131a0644
Update demos/bio/README
2013-10-21 03:51:44 +01:00
Ben Laurie
9f944107a9
Remove unused variable.
2013-10-21 03:37:20 +01:00
Nick Mathewson
2927791d77
Fix another gmt_unix_time case in server_random
2013-10-21 03:37:20 +01:00
Nick Mathewson
2016265dfb
Do not include a timestamp in the Client/ServerHello Random field.
...
Instead, send random bytes, unless SSL_SEND_{CLIENT,SERVER}RANDOM_MODE
is set.
This is a forward-port of commits:
4af793036f
f4c93b46ed
3da721dac9
2583270191
While the gmt_unix_time record was added in an ostensible attempt to
mitigate the dangers of a bad RNG, its presence leaks the host's view
of the current time in the clear. This minor leak can help
fingerprint TLS instances across networks and protocols... and what's
worse, it's doubtful thet the gmt_unix_time record does any good at
all for its intended purpose, since:
* It's quite possible to open two TLS connections in one second.
* If the PRNG output is prone to repeat itself, ephemeral
handshakes (and who knows what else besides) are broken.
2013-10-21 03:37:20 +01:00
Dr. Stephen Henson
f3efeaad54
Fix various typos.
2013-10-20 22:31:00 +01:00
Dr. Stephen Henson
d80b0eeee5
Modify sample accept.cnf
2013-10-20 22:21:52 +01:00
Steve Marquess
372566bd99
Remove gratuitous patent references
2013-10-20 22:21:52 +01:00
Dr. Stephen Henson
ebd14bfce9
Add demo for SSL server using SSL_CONF.
2013-10-20 22:21:52 +01:00
Dr. Stephen Henson
ec2f7e568e
Extend SSL_CONF
...
Extend SSL_CONF to return command value types.
Add certificate and key options.
Update documentation.
2013-10-20 22:07:36 +01:00
Dr. Stephen Henson
13af145159
Typo.
2013-10-20 22:07:36 +01:00
Dr. Stephen Henson
c051e521a7
Time value for various platforms.
...
The function gettimeofday() is not supported on all platforms. Use
more portable versions. Adapted from FIPS code.
2013-10-20 22:07:36 +01:00
Dr. Stephen Henson
45473632c5
Prevent use of RSA+MD5 in TLS 1.2 by default.
...
Removing RSA+MD5 from the default signature algorithm list
prevents its use by default.
If a broken implementation attempts to use RSA+MD5 anyway the sanity
checking of signature algorithms will cause a fatal alert.
2013-10-20 22:07:35 +01:00
Ben Laurie
b39d4768e6
Add clang debug target.
2013-10-20 13:10:25 +01:00
Andy Polyakov
76c15d790e
PPC assembly pack: make new .size directives profiler-friendly.
...
Suggested by: Anton Blanchard
2013-10-15 23:40:12 +02:00
Dr. Stephen Henson
6699cb8491
Add brainpool curves to NID table too.
2013-10-15 12:08:47 +01:00
Dr. Stephen Henson
579a759071
Fix warning.
2013-10-15 11:33:30 +01:00
Dr. Stephen Henson
da317b94d9
Add test vectors from RFC7027
2013-10-15 11:33:30 +01:00
Dr. Stephen Henson
c2c76a4d90
RFC7027 (Brainpool for TLS) support.
2013-10-15 11:33:30 +01:00
Dr. Stephen Henson
7f5fd314c0
Sync OID numbers with 1.0.2 branch.
2013-10-15 11:33:30 +01:00
Andy Polyakov
d6019e1654
PPC assembly pack: add .size directives.
2013-10-15 00:14:39 +02:00
Andy Polyakov
30b9c2348d
bn/asm/*x86_64*.pl: correct assembler requirement for ad*x.
2013-10-14 22:41:00 +02:00
Andy Polyakov
039081b809
Initial aarch64 bits.
2013-10-13 19:15:15 +02:00
Andy Polyakov
0c2adb0a9b
MIPS assembly pack: get rid of deprecated instructions.
...
Latest MIPS ISA specification declared 'branch likely' instructions
obsolete. To makes code future-proof replace them with equivalent.
2013-10-13 13:14:52 +02:00
Andy Polyakov
b4f0abd246
evp/e_aes_cbc_hmac_sha*.c: limit multi-block fragmentation to 1KB.
...
Excessive fragmentation put additional burden (of addtional MAC
calculations) on the other size and limiting fragments it to 1KB
limits the overhead to ~6%.
2013-10-12 22:10:28 +02:00
Andy Polyakov
7e1e3334f6
aes/asm/bsaes-x86_64.pl: fix Windows-specific bug in XTS.
...
PR: 3139
2013-10-12 21:37:55 +02:00
Andy Polyakov
fa104be35e
bn/asm/rsax-avx2.pl: minor optimization [for Decoded ICache].
2013-10-10 23:06:43 +02:00
Andy Polyakov
37de2b5c1e
bn/bn_exp.c: prefer MULX/AD*X over AVX2.
2013-10-09 11:08:52 +02:00
Andy Polyakov
2d752737c5
Configure: recognize experimental-multiblock.
2013-10-08 23:41:31 +02:00
Andy Polyakov
78038e095f
ssl/s3_pkt.c: add initial multi-block encrypt.
2013-10-08 23:40:09 +02:00
Andy Polyakov
a69c0a1be5
evp/e_aes_cbc_hmac_sha*.c: harmonize names, fix bugs.
2013-10-08 23:39:26 +02:00
Andy Polyakov
b1de640f03
evp/evp.h: add multi-block contstants and parameter type.
2013-10-08 23:38:05 +02:00
Andy Polyakov
61ba602af5
sha/asm/sha*-mb-x86_64.pl: commentary update.
2013-10-08 23:36:55 +02:00
Ben Laurie
c45a48c186
Constification.
2013-10-07 12:45:26 +01:00
Andy Polyakov
6f6a613032
aes/asm/bsaes-*.pl: improve decrypt performance.
...
Improve decrypt performance by 10-20% depending on platform. Thanks
to Jussi Kivilinna for providing valuable hint. Also thanks to Ard
Biesheuvel.
2013-10-03 23:08:31 +02:00
Ben Laurie
99fb221280
Support new asm files.
2013-10-03 11:37:18 +01:00
Andy Polyakov
524b00c0da
evp/e_des3.c: fix typo with potential integer overflow on 32-bit platforms.
...
Submitted by: Yuriy Kaminskiy
2013-10-03 10:55:49 +02:00
Andy Polyakov
6b2cae0c16
perlasm/sparcv9_modes.pl: make it work even with seasoned perl.
...
PR: 3130
2013-10-03 10:42:11 +02:00
Andy Polyakov
a5bb5bca52
bn/asm/x86_64-mont*.pl: add MULX/ADCX/ADOX code path.
2013-10-03 00:45:04 +02:00
Andy Polyakov
87954638a6
rsaz-x86_64.pl: add MULX/ADCX/ADOX code path.
2013-10-03 00:30:12 +02:00
Andy Polyakov
667053a2f3
x86_64-xlate.pl: fix jrcxz in nasm case.
2013-10-03 00:26:09 +02:00
Andy Polyakov
7f893258f6
evp/e_aes_cbc_hmac_sha*.c: multi-block glue code.
2013-10-03 00:24:03 +02:00
Andy Polyakov
6bcb68da41
Configire: take multi-block modules into build loop.
2013-10-03 00:21:10 +02:00
Andy Polyakov
b783858654
x86_64 assembly pack: add multi-block AES-NI, SHA1 and SHA256.
2013-10-03 00:18:58 +02:00
Andy Polyakov
5f487e0317
evp/e_aes_cbc_hmac_sha256.c: enable is on all AES-NI platforms, not only on AVX.
2013-10-03 00:16:51 +02:00
Andy Polyakov
066caf0551
aes/asm/*-armv*.pl: compensate for inconsistencies in tool-chains.
...
Suggested by: Ard Biesheuvel
2013-10-01 20:33:06 +02:00
Ben Laurie
70d416ec35
Produce PEM we would consume.
2013-09-25 13:57:36 +01:00
Ben Laurie
9725bda766
Show useful errors.
...
Conflicts:
apps/s_server.c
2013-09-25 12:45:48 +01:00
Ben Laurie
3cd8547a20
Mix time into the pool to avoid repetition of the Android duplicated PID problem.
2013-09-20 16:52:07 +01:00
Ben Laurie
7eef2b0cd7
Merge remote-tracking branch 'trevp/pemfix' into trev-pem-fix
2013-09-20 14:39:33 +01:00
Ben Laurie
79b9209883
More diagnostics for invalid OIDs.
2013-09-20 14:38:36 +01:00
Andy Polyakov
e0202d946d
aes-armv4.pl, bsaes-armv7.pl: add Linux kernel and Thumb2 support.
...
Submitted by: Ard Biesheuvel
2013-09-20 13:22:57 +02:00
Dr. Stephen Henson
94c2f77a62
Add functions to set ECDSA_METHOD structure.
...
Add various functions to allocate and set the fields of an ECDSA_METHOD
structure.
2013-09-18 01:22:50 +01:00
Dr. Stephen Henson
9600602267
Fix error code clashes.
2013-09-18 01:22:50 +01:00
Dr. Stephen Henson
40088d8b81
DTLS version usage fixes.
...
Make DTLS behave like TLS when negotiating version: record layer has
DTLS 1.0, message version is 1.2.
Tolerate different version numbers if version hasn't been negotiated
yet.
2013-09-17 18:55:41 +01:00
Bodo Moeller
7d3ba88a98
Move change note for SSL_OP_SAFARI_ECDHE_ECDSA_BUG.
...
(This went into 1.0.2 too, so it's not actually a change
between 1.0.x and 1.1.0.)
2013-09-17 10:06:34 +02:00
Bodo Moeller
cdf84b719c
Move the change note for partial chain verification: this is code from
...
the main branch (http://cvs.openssl.org/chngview?cn=19322 ) later added
to the 1.0.2 branch (http://cvs.openssl.org/chngview?cn=23113 ), and
thus not a change "between 1.0.2 and 1.1.0".
2013-09-17 09:48:23 +02:00
Trevor Perrin
92acab0b6a
Redo deletion of some serverinfo code that supplemental data code mistakenly reinstated.
2013-09-16 17:28:57 +01:00
Bodo Moeller
4dc836773e
Sync CHANGES and NEWS files.
...
(Various changes from the master branch are now in the 1.0.2 branch too.)
2013-09-16 14:55:03 +02:00
Bodo Moeller
ca567a03ad
Fix overly lenient comparisons:
...
- EC_GROUP_cmp shouldn't consider curves equal just because
the curve name is the same. (They really *should* be the same
in this case, but there's an EC_GROUP_set_curve_name API,
which could be misused.)
- EC_POINT_cmp shouldn't return 0 for ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED
or EC_R_INCOMPATIBLE_OBJECTS errors because in a cmp API, 0 indicates
equality (not an error).
Reported by: king cope
2013-09-16 12:59:21 +02:00
Andy Polyakov
8e52a9063a
crypto/armcap.c: fix typo in rdtsc subroutine.
...
PR: 3125
Submitted by: Kyle McMartin
2013-09-15 22:07:49 +02:00
Andy Polyakov
b3ef742cbb
Add support for Cygwin-x86_64.
...
PR: 3110
Submitted by Corinna Vinschen.
2013-09-15 22:01:23 +02:00
Andy Polyakov
612f4e2384
bsaes-armv7.pl: remove partial register operations in CTR subroutine.
2013-09-15 19:47:51 +02:00
Andy Polyakov
29f41e8a80
bsaes-armv7.pl: remove byte order dependency and minor optimization.
2013-09-15 19:44:43 +02:00
Ard Biesheuvel
a2ea9f3ecc
Added support for ARM/NEON based bit sliced AES in XTS mode
...
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org >
2013-09-15 19:37:16 +02:00
Trevor Perrin
deda5ea788
Update docs to mention "BEGIN SERVERINFO FOR ".
2013-09-13 19:48:09 -07:00
Trevor Perrin
c655f40ed2
Require ServerInfo PEMs to be named "BEGIN SERVERINFO FOR"...
2013-09-13 19:32:55 -07:00
Trevor Perrin
9103197591
Redo deletion of some serverinfo code that supplemental data code mistakenly reinstated.
2013-09-13 18:31:48 -07:00
Rob Stradling
785da0e610
Update CHANGES.
2013-09-13 18:15:56 +01:00
Rob Stradling
cbf8123512
Tidy up comments.
2013-09-13 16:24:22 +01:00
Rob Stradling
378341e192
Use TLS version supplied by client when fingerprinting Safari.
2013-09-13 16:24:22 +01:00
Rob Stradling
d89cd382da
Fix compilation with no-ec and/or no-tlsext.
2013-09-13 16:24:22 +01:00
Mat
5628ec6673
typo
2013-09-13 14:29:36 +01:00
Scott Deboy
b0d27cb902
Initialize next_proto in s_server - resolves incorrect attempts to free
2013-09-11 17:22:00 -07:00
Ben Laurie
edf92f1c41
Constification.
2013-09-10 18:04:08 +01:00
Andy Polyakov
7a1a12232a
crypto/modes/asm/aesni-gcm-x86_64.pl: minor optimization.
...
Avoid occasional up to 8% performance drops.
2013-09-09 21:43:21 +02:00
Andy Polyakov
72a158703b
crypto/bn/asm/x86_64-mont.pl: minor optimization.
2013-09-09 21:40:33 +02:00
Dr. Stephen Henson
ce4555967e
Remove ancient PATENTS section and FAQ reference.
2013-09-08 21:24:02 +01:00
Dr. Stephen Henson
52073b7675
Partial path fix.
...
When verifying a partial path always check to see if the EE certificate
is explicitly trusted: the path could contain other untrusted certificates.
2013-09-08 19:26:59 +01:00
Dr. Stephen Henson
a6e7d1c0e3
Document extension clash.
2013-09-08 15:10:46 +01:00
Dr. Stephen Henson
5e3ff62c34
Experimental encrypt-then-mac support.
...
Experimental support for encrypt then mac from
draft-gutmann-tls-encrypt-then-mac-02.txt
To enable it set the appropriate extension number (0x10 for the test server)
using e.g. -DTLSEXT_TYPE_encrypt_then_mac=0x10
For non-compliant peers (i.e. just about everything) this should have no
effect.
2013-09-08 13:14:03 +01:00
Dr. Stephen Henson
226751ae4a
Set TLS v1.2 disabled mask properly.
2013-09-08 00:09:39 +01:00
Ben Laurie
1769dfab06
Const fix.
2013-09-06 14:03:28 +01:00
Scott Deboy
67c408cee9
Free generated supp data after handshake completion, add comment regarding use of num_renegotiations in TLS and supp data generation callbacks
2013-09-06 13:59:14 +01:00
Ben Laurie
5eda213ebe
More cleanup.
2013-09-06 13:59:14 +01:00
Ben Laurie
a6a48e87bc
Make it build.
2013-09-06 13:59:13 +01:00
Scott Deboy
36086186a9
Add callbacks supporting generation and retrieval of supplemental data entries, facilitating RFC 5878 (TLS auth extensions)
...
Removed prior audit proof logic - audit proof support was implemented using the generic TLS extension API
Tests exercising the new supplemental data registration and callback api can be found in ssltest.c.
Implemented changes to s_server and s_client to exercise supplemental data callbacks via the -auth argument, as well as additional flags to exercise supplemental data being sent only during renegotiation.
2013-09-06 13:59:13 +01:00
Ben Laurie
cda01d55ba
s/recommend/recommended/
2013-09-05 21:43:50 +01:00
Veres Lajos
478b50cf67
misspellings fixes by https://github.com/vlajos/misspell_fixer
2013-09-05 21:39:42 +01:00
Ben Laurie
d2625fd657
Clean up layout.
2013-09-05 17:28:05 +01:00
Carlos Alberto Lopez Perez
b98af49d97
Add an "-xmpphost" option to s_client
...
* Many XMPP servers are configured with multiple domains (virtual hosts)
* In order to establish successfully the TLS connection you have to specify
which virtual host you are trying to connect.
* Test this, for example with ::
* Fail:
openssl s_client -connect talk.google.com:5222 -starttls xmpp
* Works:
openssl s_client -connect talk.google.com:5222 -starttls xmpp -xmpphost gmail.com
2013-09-05 17:24:56 +01:00
Carlos Alberto Lopez Perez
50f307a98f
Add "xmpp" to the list of supported starttls protocols on s_client manpage
2013-09-05 17:24:56 +01:00
Carlos Alberto Lopez Perez
4249d4ba86
Fix infinite loop on s_client starttls xmpp
...
* When the host used in "-connect" is not what the remote XMPP server expects
the server will return an error like this:
<stream:error>
<host-unknown xmlns='urn:ietf:params:xml:ns:xmpp-streams'/>
</stream:error>
* But the actual code will stay on the loop forever because the stop condition
"/stream:features>" will never happen,
* Make this more robust: The stop condition should be that BIO_read failed
* Test if for example with ::
openssl s_client -connect random.jabb3r.net:5222 -starttls xmpp
2013-09-05 17:24:56 +01:00
Carlos Alberto Lopez Perez
4e48c77572
Fix XMPP code detection on s_client starttls xmpp
...
* Some XMPP Servers (OpenFire) use double quotes.
* This makes s_client starttls work with this servers.
* Tested with OpenFire servers from http://xmpp.net/ ::
openssl s_client -connect coderollers.com:5222 -starttls xmpp
2013-09-05 17:24:55 +01:00
Rob Stradling
dece3209f2
Don't prefer ECDHE-ECDSA ciphers when the client appears to be Safari on OS X.
...
OS X 10.8..10.8.3 has broken support for ECDHE-ECDSA ciphers.
2013-09-05 13:09:03 +01:00
Dr. Stephen Henson
c3eb33763b
Document supported curve functions.
2013-09-03 15:43:01 +01:00
Dr. Stephen Henson
902efde1cc
Document -force_pubkey option.
2013-08-21 13:43:00 +01:00
Dr. Stephen Henson
36019f70e8
Correct ECDSA example.
2013-08-21 13:43:00 +01:00
Ben Laurie
d5605699a1
Correctly test for no-ec.
2013-08-21 04:21:57 +01:00
Ben Laurie
a0aaa5660a
Fix compile errors.
2013-08-21 04:21:42 +01:00
Dr. Stephen Henson
fcb2bcfe65
Typo: don't call RAND_cleanup during app startup.
...
(cherry picked from commit 90e7f983b5 )
2013-08-18 19:06:51 +01:00
Dr. Stephen Henson
eeb15452a0
Add documentation.
...
Preliminary documentation for chain and verify stores and certificate chain
setting functions.
2013-08-17 17:41:14 +01:00
Dr. Stephen Henson
b85f8afe37
Don't run ECDH CMS tests if EC disabled.
2013-08-17 17:41:14 +01:00
Dr. Stephen Henson
14536c8c9c
Make no-ec compilation work.
2013-08-17 17:41:13 +01:00
Dr. Stephen Henson
42082eda6f
Return 1 when setting ECDH auto mode.
2013-08-17 17:41:13 +01:00
Dr. Stephen Henson
5ef24a806d
Add the server 'hang' issue to the FAQ
2013-08-14 16:38:06 +01:00
Michael Tuexen
b62f4daac0
DTLS message_sequence number wrong in rehandshake ServerHello
...
This fix ensures that
* A HelloRequest is retransmitted if not responded by a ClientHello
* The HelloRequest "consumes" the sequence number 0. The subsequent
ServerHello uses the sequence number 1.
* The client also expects the sequence number of the ServerHello to
be 1 if a HelloRequest was received earlier.
This patch fixes the RFC violation.
2013-08-13 18:53:19 +01:00
Michael Tuexen
0c75eeacd3
DTLS handshake fix.
...
Reported by: Prashant Jaikumar <rmstar@gmail.com >
Fix handling of application data received before a handshake.
2013-08-08 13:30:49 +01:00
Kaspar Brand
5ae8d6bcba
Fix for PEM_X509_INFO_read_bio.
...
PR: 3028
Fix bug introduced in PEM_X509_INFO_bio which wouldn't process RSA keys
correctly if they appeared first.
2013-08-06 16:01:47 +01:00
Dr. Stephen Henson
dfcb42c68e
Update cms docs.
2013-08-05 16:23:22 +01:00
Dr. Stephen Henson
bbc098ffb3
Add X9.42 DH test.
2013-08-05 16:23:22 +01:00
Dr. Stephen Henson
75787fd833
Add X9.42 DH certificate to S/MIME test
2013-08-05 16:23:22 +01:00
Dr. Stephen Henson
bd59f2b91d
CMS RFC2631 X9.42 DH enveloped data support.
2013-08-05 16:23:13 +01:00
Dr. Stephen Henson
dc1ce3bc64
Add KDF for DH.
...
Add X9.42 DH KDF. Move sharedinfo generation code to CMS library as the
same structure is used by DH and ECDH.
Move ASN1_OBJECT typedef to ossl_typ.h so it can be picked up by dh headers
without the need to use ASN1.
2013-08-05 15:45:01 +01:00
Dr. Stephen Henson
3909087801
Extend DH parameter generation support.
...
Add support for DH parameter generation using DSA methods including
FIPS 186-3.
2013-08-05 15:45:01 +01:00
Dr. Stephen Henson
d3cc91eee2
Enhance DH dup functions.
...
Make DHparams_dup work properly with X9.42 DH parameters.
2013-08-05 15:45:01 +01:00
Dr. Stephen Henson
c9577ab5ea
If present print j, seed and counter values for DH
2013-08-05 15:45:00 +01:00
Dr. Stephen Henson
3f6b6f0b8c
Minor optimisation to KDF algorithm.
...
Don't need to use temporary buffer if remaining length equals digest length.
2013-08-05 15:45:00 +01:00
Dr. Stephen Henson
e61f5d55bc
Algorithm parameter support.
...
Check and set AlgorithmIdenfier parameters for key wrap algorithms.
Currently these just set parameters to NULL.
2013-08-05 15:45:00 +01:00
Andy Polyakov
a59f436295
crypto/evp/e_aes.c: fix logical pre-processor bug and formatting.
...
Bug would emerge when XTS is added to bsaes-armv7.pl. Pointed out by
Ard Biesheuvel of Linaro.
2013-08-03 17:09:06 +02:00
Andy Polyakov
fd8ad019e1
crypto/bn/asm/rsax-x86_64.pl: make it work on Darwin.
2013-08-03 16:28:50 +02:00
Andy Polyakov
006784378d
crypto/sha/asm/sha*-x86_64.pl: comply with Win64 ABI.
2013-07-31 23:50:15 +02:00
Trevor Perrin
0b2bde70dd
Various custom extension fixes.
...
Force no SSL2 when custom extensions in use.
Don't clear extension state when cert is set.
Clear on renegotiate.
2013-07-31 14:29:41 +01:00
Adam Langley
a898936218
Add tests for ALPN functionality.
...
Conflicts:
ssl/ssltest.c
2013-07-22 15:47:48 +01:00
Ben Laurie
a108f841ba
Add a no-opt 64-bit target.
2013-07-22 15:28:20 +01:00
Adam Langley
6f017a8f9d
Support ALPN.
...
This change adds support for ALPN[1] in OpenSSL. ALPN is the IETF
blessed version of NPN and we'll be supporting both ALPN and NPN for
some time yet.
[1] https://tools.ietf.org/html/draft-ietf-tls-applayerprotoneg-00
Conflicts:
ssl/ssl3.h
ssl/t1_lib.c
2013-07-22 15:28:20 +01:00
Dr. Stephen Henson
584ac22110
Make ecdsatest work with nonces.
...
Update ecdsatest to use ECDSA_sign_setup and ECDSA_sign_ex, this
avoids the nonce generation which would otherwise break the test.
Reinstate ecdsatest.
2013-07-19 14:11:43 +01:00
Dr. Stephen Henson
527c898ce8
Temporarily disable ECDSA test.
...
Disable ECDSA test temporarily: it is incompatible with ECDSA nonces.
2013-07-19 13:46:48 +01:00
Dr. Stephen Henson
5cdc25a754
New CMS tests.
...
Add some ECDH CMS tests.
2013-07-17 21:45:01 +01:00
Dr. Stephen Henson
a0957d5505
Scripts to recreate S/MIME test certificates.
...
Add a script to generate keys and certificates for the S/MIME and CMS
tests.
Update certificates and add EC examples.
2013-07-17 21:45:01 +01:00
Dr. Stephen Henson
5711885a2b
Custom key wrap option for cms utility.
2013-07-17 21:45:01 +01:00
Dr. Stephen Henson
41b920ef01
Return correct enveloped data type in ASN1 methods.
...
For RSA and DSA keys return an appropriate RecipientInfo type. By setting
CMS_RECIPINFO_NONE for DSA keys an appropriate error is returned if
an attempt is made to use DSA with enveloped data.
2013-07-17 21:45:01 +01:00
Dr. Stephen Henson
88e20b8584
Add support for ECDH KARI.
...
Add support for ECDH in enveloped data. The CMS ctrls for the EC ASN1
method decode/encode the appropriate parameters from the CMS ASN1 data
and send appropriate data to the EC public key method.
2013-07-17 21:45:01 +01:00
Dr. Stephen Henson
25af7a5dbc
Add support for X9.62 KDF.
...
Add X9.62 KDF to EC EVP_PKEY_METHOD.
2013-07-17 21:45:00 +01:00
Dr. Stephen Henson
6af440ced4
Add new OIDs from RFC5753
...
Add OIDs for KDF schemes from RFC5753 and add cross references for
each type and the appropriate digest to use.
2013-07-17 21:45:00 +01:00
Dr. Stephen Henson
17c2764d2e
CMS support for key agreeement recipient info.
...
Add hooks to support key agreement recipient info type (KARI) using
algorithm specific code in the relevant public key ASN1 method.
2013-07-17 21:45:00 +01:00
Dr. Stephen Henson
ff7b6ce9db
Set CMS EnvelopedData version correctly.
2013-07-17 21:45:00 +01:00
Dr. Stephen Henson
97cf1f6c28
EVP support for wrapping algorithms.
...
Add support for key wrap algorithms via EVP interface.
Generalise AES wrap algorithm and add to modes, making existing
AES wrap algorithm a special case.
Move test code to evptests.txt
2013-07-17 21:45:00 +01:00
Dr. Stephen Henson
415ece7301
Typo.
2013-07-17 21:45:00 +01:00
Dr. Stephen Henson
8d6a75dc3a
Avoid need to change function code.
...
Keep original function names for nonce versions so we don't have to change
error function codes.
2013-07-17 21:45:00 +01:00
Adam Langley
190c615d43
Make `safe' (EC)DSA nonces the default.
...
This change updates 8a99cb29 to make the generation of (EC)DSA nonces
using the message digest the default. It also reverts the changes to
(EC)DSA_METHOD structure.
In addition to making it the default, removing the flag from EC_KEY
means that FIPS modules will no longer have an ABI mismatch.
2013-07-15 12:57:48 +01:00
Andy Polyakov
5c57c69f9e
bn/asm/rsaz-avx2.pl: Windows-specific fix.
2013-07-12 18:59:17 +02:00
Dr. Stephen Henson
4b26645c1a
Fix verify loop with CRL checking.
...
PR #3090
Reported by: Franck Youssef <fry@open.ch >
If no new reason codes are obtained after checking a CRL exit with an
error to avoid repeatedly checking the same CRL.
This will only happen if verify errors such as invalid CRL scope are
overridden in a callback.
2013-07-12 17:48:41 +01:00
Ben Laurie
c051cbc83f
Clarify FIXME.
2013-07-12 15:03:43 +01:00
Ben Laurie
8bf0eee8d9
Note non-export of CC.
2013-07-12 14:48:13 +01:00
Ben Laurie
82fe001b8d
Support new rsaz asm stuff.
2013-07-12 12:48:24 +01:00
Ben Laurie
852f837f5e
s/rsaz_eligible/rsaz_avx2_eligible/.
2013-07-12 12:47:39 +01:00
Andy Polyakov
241fba4ea9
sha512-586.pl: fix typo.
...
Submitted by: Gisle Vanem
2013-07-10 09:59:25 +02:00
Andy Polyakov
f5b132d652
Remove RSAX engine, superseded by RSAZ module.
2013-07-05 22:11:28 +02:00
Andy Polyakov
ca48ace5c5
Take RSAZ modules into build loop, add glue and engage.
...
RT: 2582, 2850
2013-07-05 21:39:47 +02:00
Andy Polyakov
0b4bb91db6
Add RSAZ assembly modules.
...
RT: 2582, 2850
2013-07-05 21:30:18 +02:00
Andy Polyakov
26e43b48a3
bn/asm/x86_86-mont.pl: optimize reduction for Intel Core family.
2013-07-05 21:10:56 +02:00
Andy Polyakov
cbce8c4644
bn/bn_exp.c: harmonize.
2013-07-05 20:52:58 +02:00
Jeff Walton
3d7bf77f61
Fix multiple cosmetic typos.
2013-07-04 20:35:53 +01:00
Dr. Stephen Henson
e0f7cfda68
Initialise CMS signature buffer length properly.
2013-07-02 22:12:19 +01:00
Andy Polyakov
c256e69d3f
config: fix executable format detection on latest FreeBSD.
...
Submitted by: Bryan Drewery
PR: 3075
2013-06-30 23:55:55 +02:00
Andy Polyakov
b74ce8d948
bn/bn_exp.c: Solaris-specific fix, T4 MONTMUL relies on alloca.
2013-06-30 23:09:09 +02:00
Andy Polyakov
a9d14832fd
x86_64-xlate.pl: Windows fixes.
2013-06-30 23:07:33 +02:00
Andy Polyakov
42386fdb62
aesni-sha256-x86_64.pl: fix typo in Windows SEH.
2013-06-30 23:06:28 +02:00
Trevor
5382adbf2c
Cosmetic touchups.
2013-06-28 16:01:12 +01:00
Dr. Stephen Henson
ac9ce2cf03
Fix duplicate error code.
2013-06-28 14:21:48 +01:00
Dr. Stephen Henson
5c84d2f560
Update CHANGES
2013-06-21 23:43:06 +01:00
Dr. Stephen Henson
4bf4a6501c
Update cms docs.
...
Document use of -keyopt to use RSA-PSS and RSA-OAEP modes.
2013-06-21 23:43:06 +01:00
Dr. Stephen Henson
32b18e0338
Add new CMS tests.
...
Add new tests to cms-test.pl covering PSS and OAEP.
2013-06-21 23:43:06 +01:00
Dr. Stephen Henson
02498cc885
Add -keyopt option to cms utility.
...
Add support for custom public key parameters in the cms utility using
the -keyopt switch. Works for -sign and also -encrypt if -recip is used.
2013-06-21 23:43:06 +01:00
Dr. Stephen Henson
0574cadf85
CMS RSA-OAEP and RSA-PSS support.
...
Extend RSA ASN1 method to support CMS PSS signatures for both sign
and verify.
For signing the EVP_PKEY_CTX parameters are read and the appropriate
CMS structures set up.
For verification the CMS structures are analysed and the corresponding
parameters in the EVP_PKEY_CTX set.
Also add RSA-OAEP support.
For encrypt the EVP_PKEY_CTX parameters are used.
For decrypt the CMS structure is uses to set the appropriate EVP_PKEY_CTX
parameters.
2013-06-21 23:43:05 +01:00
Dr. Stephen Henson
e365352d6a
CMS public key parameter support.
...
Add support for customisation of CMS handling of signed and enveloped
data from custom public key parameters.
This will provide support for RSA-PSS and RSA-OAEP but could also be
applied to other algorithms.
2013-06-21 21:33:00 +01:00
Dr. Stephen Henson
211a14f627
Update to OAEP support.
...
Add OAEP ctrls to retrieve MD and label. Return errors if
an attempt is made to set or retrieve OAEP parameters when
padding mode is not OAEP.
2013-06-21 21:33:00 +01:00
Dr. Stephen Henson
810639536c
Add control to retrieve signature MD.
2013-06-21 21:33:00 +01:00
Dr. Stephen Henson
e423c360fd
Add new OID to pSpecified from PKCS#1
2013-06-21 21:33:00 +01:00
Trevor
9cd50f738f
Cleanup of custom extension stuff.
...
serverinfo rejects non-empty extensions.
Omit extension if no relevant serverinfo data.
Improve error-handling in serverinfo callback.
Cosmetic cleanups.
s_client documentation.
s_server documentation.
SSL_CTX_serverinfo documentation.
Cleaup -1 and NULL callback handling for custom extensions, add tests.
Cleanup ssl_rsa.c serverinfo code.
Whitespace cleanup.
Improve comments in ssl.h for serverinfo.
Whitespace.
Cosmetic cleanup.
Reject non-zero-len serverinfo extensions.
Whitespace.
Make it build.
2013-06-18 16:13:08 +01:00
Andy Polyakov
8ee3c7e676
SPARC T4 DES support: fix typo.
2013-06-18 10:42:08 +02:00
Andy Polyakov
4ddacd9921
Optimize SPARC T4 MONTMUL support.
...
Improve RSA sing performance by 20-30% by:
- switching from floating-point to integer conditional moves;
- daisy-chaining sqr-sqr-sqr-sqr-sqr-mul sequences;
- using MONTMUL even during powers table setup;
2013-06-18 10:39:38 +02:00
Andy Polyakov
02450ec69d
PA-RISC assembler pack: switch to bve in 64-bit builds.
...
PR: 3074
2013-06-18 10:37:00 +02:00
Adam Langley
8a99cb29d1
Add secure DSA nonce flag.
...
This change adds the option to calculate (EC)DSA nonces by hashing the
message and private key along with entropy to avoid leaking the private
key if the PRNG fails.
2013-06-13 17:26:07 +01:00
Adam Langley
64a786a292
Limit the number of empty records that will be processed consecutively
...
in order to prevent ssl3_get_record from never returning.
Reported by "oftc_must_be_destroyed" and George Kadianakis.
2013-06-13 17:10:52 +01:00
Adam Langley
a54a61e7a9
Don't SEGFAULT when trying to export a public DSA key as a private key.
2013-06-13 17:03:35 +01:00
Adam Langley
adb46dbc6d
This change alters the processing of invalid, RSA pre-master secrets so
...
that bad encryptions are treated like random session keys in constant
time.
2013-06-13 16:58:45 +01:00
Ben Laurie
7e25d81870
Ignore one-makefile stuff.
2013-06-13 15:39:23 +01:00
Matt Caswell
aafbe1ccd2
Document updates from wiki.
...
PR#3071
The primary changes made are:
- Updates to the "NAME" section of many pages to correctly reflect the
functions defined on those pages. This section is automatically parsed
by the util/extract-names.pl script, so if it is not correct then
running "man" will not correctly locate the right manual pages.
- Updates to take account of where functions are now deprecated
- Full documentation of the ec sub-library
- A number of other typo corrections and other minor tweaks
2013-06-12 23:42:08 +01:00
Dr. Stephen Henson
271fef0ef3
Exetended OAEP support.
...
Extend OAEP support. Generalise the OAEP padding functions to support
arbitrary digests. Extend EVP_PKEY RSA method to handle the new OAEP
padding functions and add ctrls to set the additional parameters.
2013-06-12 18:48:17 +01:00
Dr. Stephen Henson
965e06da3c
Typo.
2013-06-12 18:47:28 +01:00
Trevor
a398f821fa
Add support for arbitrary TLS extensions.
...
Contributed by Trevor Perrin.
2013-06-12 17:01:13 +01:00
Ben Laurie
6d84daa5d6
Add aesni-sha256-x86_64.
2013-06-12 14:18:33 +01:00
Andy Polyakov
3b848d3401
aesni-sha1-x86_64.pl: update performance data.
2013-06-10 22:35:22 +02:00
Andy Polyakov
42b9a4177b
aesni-sha256-x86_64.pl: harmonize with latest sha512-x86_64.pl.
2013-06-10 22:34:06 +02:00
Andy Polyakov
cd8d7335af
sha1-x86_64.pl: add AVX2+BMI code path.
2013-06-10 22:30:34 +02:00
Andy Polyakov
c7f690c243
sha512-x86_64.pl: upcoming-Atom-specific optimization.
2013-06-10 22:29:01 +02:00
Andy Polyakov
32213d8d77
sha[256|512]-586.pl: add more SIMD code paths.
2013-06-10 22:26:53 +02:00
Andy Polyakov
b42759158d
ghash-x86_64.pl: add Haswell performance data.
2013-06-10 22:25:12 +02:00
Andy Polyakov
1bc0b68d7b
x86cpuid.pl: fix extended feature flags detection.
2013-06-10 22:20:46 +02:00
Dr. Stephen Henson
2f58cda4ce
Fix PSS signature printing.
...
Fix PSS signature printing: consistently use 0x prefix for hex values for
padding length and trailer fields.
2013-06-05 15:06:03 +01:00
Dr. Stephen Henson
c71fdaed58
Reencode with X509_CRL_ctx_sign too.
2013-06-05 15:06:03 +01:00
Adam Langley
96a4c31be3
Ensure that, when generating small primes, the result is actually of the
...
requested size. Fixes OpenSSL #2701 .
This change does not address the cases of generating safe primes, or
where the |add| parameter is non-NULL.
Conflicts:
crypto/bn/bn.h
crypto/bn/bn_err.c
2013-06-04 18:52:30 +01:00
Adam Langley
2b0180c37f
Ensure that x**0 mod 1 = 0.
2013-06-04 18:47:11 +01:00
Adam Langley
7753a3a684
Add volatile qualifications to two blocks of inline asm to stop GCC from
...
eliminating them as dead code.
Both volatile and "memory" are used because of some concern that the compiler
may still cache values across the asm block without it, and because this was
such a painful debugging session that I wanted to ensure that it's never
repeated.
2013-06-04 18:46:25 +01:00
Ben Laurie
5dcd2deb3e
Remove added ;.
2013-06-04 17:27:18 +01:00
Ben Laurie
b25b8417a7
Missing prototypes.
2013-06-04 16:34:45 +01:00
Andy Polyakov
b69437e1e5
crypto/bn/bn_exp.c: SPARC portability fix.
2013-06-01 09:58:07 +02:00
Andy Polyakov
36df342f9b
aesni-x86_64.pl: optimize XTS.
...
PR: 3042
2013-05-25 19:23:09 +02:00
Andy Polyakov
4df2280b4f
aesni-sha1-x86_64.pl: Atom-specific optimization.
2013-05-25 19:08:39 +02:00
Andy Polyakov
504bbcf3cd
sha512-x86_64.pl: +16% optimization for Atom.
...
(and pending AVX2 changes).
2013-05-25 19:02:57 +02:00
Andy Polyakov
988d11b641
vpaes-x86[_64].pl: minor Atom-specific optimization.
2013-05-25 18:57:03 +02:00
Andy Polyakov
8a97a33063
Add AES-SHA256 stitch.
2013-05-13 22:49:58 +02:00
Andy Polyakov
22de0e6583
x86_64-xlate.pl: minor size/performance improvement.
2013-05-13 16:06:25 +02:00
Andy Polyakov
cd54249c21
aesni-x86_64.pl: minor CTR performance improvement.
2013-05-13 15:49:03 +02:00
Ben Laurie
92584bd3d5
Tests pass!
2013-05-05 16:15:34 +01:00
Ben Laurie
342ec250c3
Ugly hack to avoid recompiling the same thing multiple times in parallel.
2013-05-05 15:06:33 +01:00
Dr. Stephen Henson
c6d8adb8a4
Reencode certificates in X509_sign_ctx.
...
Reencode certificates in X509_sign_ctx as well as X509_sign.
This was causing a problem in the x509 application when it modified an
existing certificate.
2013-05-02 12:19:40 +01:00
Andy Polyakov
9575d1a91a
bsaes-armv7.pl: add bsaes_cbc_encrypt and bsaes_ctr32_encrypt_blocks.
...
Submitted by: Ard Biesheuvel <ard.biesheuvel@linaro.org >
Contributor claims ~50% improvement in CTR and ~9% in CBC decrypt
on Cortex-A15.
2013-04-23 17:52:14 +02:00
Andy Polyakov
75fe422323
bsaes-armv7.pl: take it into build loop.
2013-04-23 17:49:54 +02:00
Dr. Stephen Henson
412834dcf0
Typo.
2013-04-14 01:19:07 +01:00
Andy Polyakov
db05b447a5
Fix Windows linking error in GOST test case.
2013-04-13 23:03:31 +02:00
Andy Polyakov
3bdd80521a
crypto/modes/modes_lcl.h: let STRICT_ALIGNMENT be on ARMv7.
...
While ARMv7 in general is capable of unaligned access, not all instructions
actually are. And trouble is that compiler doesn't seem to differentiate
those capable and incapable of unaligned access. Side effect is that kernel
goes into endless loop retrying same instruction triggering unaligned trap.
Problem was observed in xts128.c and ccm128.c modules. It's possible to
resolve it by using (volatile u32*) casts, but letting STRICT_ALIGNMENT
be feels more appropriate.
2013-04-13 20:57:37 +02:00
Dr. Stephen Henson
4544f0a691
Suite B support for DTLS 1.2
...
Check for Suite B support using method flags instead of version numbers:
anything supporting TLS 1.2 cipher suites will also support Suite B.
Return an error if an attempt to use DTLS 1.0 is made in Suite B mode.
2013-04-09 16:49:13 +01:00
Dr. Stephen Henson
c56f5b8edf
Always return errors in ssl3_get_client_hello
...
If we successfully match a cookie don't set return value to 2 as this
results in other error conditions returning 2 as well.
Instead set return value to -2 which can be checked later if everything
else is OK.
2013-04-09 15:59:47 +01:00
Dr. Stephen Henson
c6913eeb76
Dual DTLS version methods.
...
Add new methods DTLS_*_method() which support both DTLS 1.0 and DTLS 1.2 and
pick the highest version the peer supports during negotiation.
As with SSL/TLS options can change this behaviour specifically
SSL_OP_NO_DTLSv1 and SSL_OP_NO_DTLSv1_2.
2013-04-09 14:02:48 +01:00
Dr. Stephen Henson
04638f2fc3
Set s->d1 to NULL after freeing it.
2013-04-08 18:24:42 +01:00
Dr. Stephen Henson
045b2809f8
Asm build portability.
...
Don't use Win32 specific options in mk1mf.pl to build assembly language
files.
2013-04-08 14:53:54 +01:00
Ben Laurie
29d422e2a0
Make sure all tests are actually run, plus some fixups for things that
...
turn out to be made somewhere by existing Makefiles.
2013-04-07 16:52:54 +01:00
Ben Laurie
a7f5cd7fd5
Use original alltests target for definitive test list.
2013-04-06 20:42:38 +01:00
Ben Laurie
afdf366921
Missing semicolon.
2013-04-06 16:17:14 +01:00
Dr. Stephen Henson
fed45e1879
Fix non-copy builds.
...
Only use -MMD and .sinclude in copy builds: other platforms don't
support them.
2013-04-06 16:05:23 +01:00
Ben Laurie
d07201a2bb
Missing file.
2013-04-06 15:25:43 +01:00
Ben Laurie
bc9e878210
Make executable.
2013-04-06 15:22:28 +01:00
Ben Laurie
9fc3ebda13
Helper scripts for one makefile build.
2013-04-06 15:17:30 +01:00
Ben Laurie
1a70fe953a
Merge, go back to copy-if-different.
2013-04-06 15:15:11 +01:00
Ben Laurie
ea4507ee1c
Fix test_ss.
2013-04-06 15:13:12 +01:00
Ben Laurie
4b9af0a101
Add new asm target.
2013-04-06 15:13:12 +01:00
Ben Laurie
e92ce4e35b
Show start/end of tests.
2013-04-06 15:13:12 +01:00
Ben Laurie
3426b8ed3f
Avoid collisions.
2013-04-06 15:13:12 +01:00
Ben Laurie
f5cd3db541
Make session ID test work.
2013-04-06 15:13:12 +01:00
Ben Laurie
15e5f592c1
Make S/MIME test work.
2013-04-06 15:13:11 +01:00
Ben Laurie
509a83dd36
Make RSA test work.
2013-04-06 15:13:11 +01:00
Ben Laurie
8c7f5f3bec
Make PKCS#7 test work.
2013-04-06 15:13:11 +01:00
Ben Laurie
188f6443ae
Make OCSP test work.
2013-04-06 15:13:11 +01:00
Ben Laurie
3675fb882c
More progress towards working tests.
2013-04-06 15:13:11 +01:00
Ben Laurie
3b4d86bff5
Get closer to a working single Makefile with test support.
2013-04-06 15:11:11 +01:00
Ben Laurie
282a480a35
Fix warnings.
2013-04-06 15:08:44 +01:00
Dr. Stephen Henson
1e2d4cb0e1
Make TLS 1.2 ciphers work again.
...
Since s->method does not reflect the final client version when a client
hello is sent for SSLv23_client_method it can't be relied on to indicate
if TLS 1.2 ciphers should be used. So use the client version instead.
2013-04-04 18:21:58 +01:00
Andy Polyakov
99cda4376e
cryptlib.c: fix typo in OPENSSL_showfatal.
2013-04-04 15:57:43 +02:00
Andy Polyakov
73325b221c
aesni-x86_64.pl: optimize CBC decrypt.
...
Give CBC decrypt approximately same treatment as to CTR and collect 25%.
2013-04-04 15:56:23 +02:00
Andy Polyakov
a42abde699
e_aes.c: reserve for future extensions.
2013-04-04 15:55:49 +02:00
Andy Polyakov
64f7e2c4c0
gcm128.c: fix linking problems in 32-bit Windows build.
2013-04-04 15:54:58 +02:00
Andy Polyakov
7f97d57236
dest4-sparcv9.pl: add clarification comment.
2013-04-04 15:54:08 +02:00
Andy Polyakov
c9a8e3d1c7
evptests.txt: add XTS test vectors
2013-04-04 15:53:01 +02:00
Dr. Stephen Henson
3fce3f6b2b
Use $(PERL) when calling scripts in mk1mf.pl
2013-04-03 22:38:18 +01:00
Dr. Stephen Henson
0ded2a0689
Typo.
2013-03-31 17:42:46 +01:00
Andy Polyakov
c5d975a743
Add support for SPARC T4 DES opcode.
2013-03-31 14:32:05 +02:00
Andy Polyakov
d8f3ed2306
des_enc.m4: add missing #include.
...
Submitted by: David Miller
2013-03-31 14:07:48 +02:00
Andy Polyakov
4e049c5259
Add AES-NI GCM stitch.
2013-03-29 20:45:33 +01:00
Andy Polyakov
b4a9d5bfe8
aesni-x86_64.pl: fix typo and optimize small block performance.
2013-03-29 18:54:24 +01:00
Dr. Stephen Henson
3d1160d58b
Call RAND_cleanup in openssl application.
...
(cherry picked from commit 944bc29f90 )
2013-03-28 14:29:39 +00:00
Dr. Stephen Henson
4221c0dd30
Enable TLS 1.2 ciphers in DTLS 1.2.
...
Port TLS 1.2 GCM code to DTLS. Enable use of TLS 1.2 only ciphers when in
DTLS 1.2 mode too.
2013-03-28 14:14:27 +00:00
Dr. Stephen Henson
fbbaaccaca
Update fixed DH requirements.
...
The relaxed signing requirements for fixed DH certificates apply to DTLS 1.2
too.
2013-03-28 14:14:27 +00:00
Dr. Stephen Henson
04fac50045
DTLS 1.2 cached record support.
...
Add DTLS1.2 support for cached records when computing handshake macs
instead of the MD5+SHA1 case for DTLS < 1.2 (this is a port of the
equivalent TLS 1.2 code to DTLS).
2013-03-28 14:14:27 +00:00
Matt Caswell
94782e0e9c
Make binary curve ASN.1 work in FIPS mode.
...
Don't check for binary curves by checking methods: the values will
be different in FIPS mode as they are redirected to the validated module
version.
2013-03-26 16:56:50 +00:00
Dr. Stephen Henson
c3b344e36a
Provisional DTLS 1.2 support.
...
Add correct flags for DTLS 1.2, update s_server and s_client to handle
DTLS 1.2 methods.
Currently no support for version negotiation: i.e. if client/server selects
DTLS 1.2 it is that or nothing.
2013-03-26 15:16:41 +00:00
Dr. Stephen Henson
9cf0f18754
Remove versions test from dtls1_buffer_message
...
Since this is always called from DTLS code it is safe to assume the header
length should be the DTLS value. This avoids the need to check the version
number and should work with any version of DTLS (not just 1.0).
2013-03-26 15:16:41 +00:00
Dr. Stephen Henson
cfd298b7ae
Extend DTLS method macros.
...
Extend DTLS method creation macros to support version numbers and encryption
methods. Update existing code.
2013-03-26 15:16:41 +00:00
Dr. Stephen Henson
874a18cfad
Enable various DTLS extensions.
...
Some TLS extensions were disabled for DTLS. Possibly because they caused
problems with the old duplicated code. Enable them again.
2013-03-26 15:16:41 +00:00
Andy Polyakov
6c79faaa9d
aesni-x86_64.pl: optimize CTR even further.
...
Based on suggestions from Shay Gueron and Vlad Krasnov.
PR: 3021
2013-03-26 14:29:18 +01:00
Andy Polyakov
1da5d3029e
ghash-x86_64.pl: add AVX code path.
2013-03-24 23:44:35 +01:00
Andy Polyakov
1bc4d009e1
aesni-x86_64.pl: optimize CTR even further.
2013-03-19 20:03:02 +01:00
Andy Polyakov
fbf7c44bbf
ghash-x86_64.pl: minor optimization.
2013-03-19 20:02:11 +01:00
Dr. Stephen Henson
2f0275a4c3
Disable compression for DTLS.
...
The only standard compression method is stateful and is incompatible with
DTLS.
2013-03-19 13:43:06 +00:00
Dr. Stephen Henson
eb7ece1381
Typo.
2013-03-19 12:41:54 +00:00
Andy Polyakov
5c60046553
e_aes_cbc_hmac_sha1.c: fix rare bad record mac on AES-NI plaforms.
...
PR: 3002
2013-03-18 19:29:41 +01:00
Dr. Stephen Henson
cbd64894ec
Use enc_flags when deciding protocol variations.
...
Use the enc_flags field to determine whether we should use explicit IV,
signature algorithms or SHA256 default PRF instead of hard coding which
versions support each requirement.
2013-03-18 15:03:58 +00:00
Dr. Stephen Henson
6de2649a6b
Use appropriate versions of SSL3_ENC_METHOD
2013-03-18 14:53:59 +00:00
Dr. Stephen Henson
173e72e64c
DTLS revision.
...
Revise DTLS code. There was a *lot* of code duplication in the
DTLS code that generates records. This makes it harder to maintain and
sometimes a TLS update is omitted by accident from the DTLS code.
Specifically almost all of the record generation functions have code like
this:
some_pointer = buffer + HANDSHAKE_HEADER_LENGTH;
... Record creation stuff ...
set_handshake_header(ssl, SSL_MT_SOMETHING, message_len);
...
write_handshake_message(ssl);
Where the "Record creation stuff" is identical between SSL/TLS and DTLS or
in some cases has very minor differences.
By adding a few fields to SSL3_ENC to include the header length, some flags
and function pointers for handshake header setting and handshake writing the
code can cope with both cases.
Note: although this passes "make test" and some simple DTLS tests there may
be some minor differences in the DTLS code that have to be accounted for.
2013-03-18 14:36:43 +00:00
Michael Tuexen
80ccc66d7e
Avoid unnecessary fragmentation.
2013-03-18 14:30:38 +00:00
Dr. Stephen Henson
5de18d5d0d
Encode INTEGER correctly.
...
If an ASN1_INTEGER structure is allocated but not explicitly set encode
it as zero: don't generate an invalid zero length INTEGER.
(cherry picked from commit 1643edc63c )
2013-03-18 14:22:08 +00:00
Dr. Stephen Henson
e24fd37cda
Typo.
...
(cherry picked from commit 1546fb780b )
2013-03-18 14:00:39 +00:00
Dr. Stephen Henson
890f2f8b92
DTLS trace support.
...
Add DTLS record header parsing, different client hello format and add
HelloVerifyRequest message type.
Add code to d1_pkt.c to send message headers to the message callback.
2013-03-11 13:05:07 +00:00
Andy Polyakov
ca303d333b
evptests.txt: additional GCM test vectors.
2013-03-06 19:24:05 +01:00
Dr. Stephen Henson
15652f9825
GCM and CCM test support
...
Add code to support GCM an CCM modes in evp_test. On encrypt this
will compare the expected ciphertext and tag. On decrypt it will
compare the expected plaintext: tag comparison is done internally.
Add a simple CCM test case and convert all tests from crypto/modes/gcm128.c
2013-03-06 16:15:42 +00:00
Dr. Stephen Henson
95248de327
Add CCM ciphers to tables.
2013-03-06 16:15:42 +00:00
Andy Polyakov
28997596f2
ghash-x86_64.pl: fix length handling bug.
...
Thanks to Shay Gueron & Vlad Krasnov for report.
2013-03-06 10:42:21 +01:00
Dr. Stephen Henson
bcb157f07f
typo
2013-03-05 21:20:00 +00:00
Dr. Stephen Henson
e942c15451
Initial CCM code.
...
Simple example of CCM code use: translated from the FIPS self tests.
2013-03-05 18:30:53 +00:00
Ben Laurie
897dfd4eaa
Use CFLAG for LFLAGS instead of the nonexistent CFLAGS.
2013-03-05 05:55:19 +00:00
Ben Laurie
c621fe6685
Ignore mk1mf.pl output directories.
2013-03-05 04:29:41 +00:00
Ben Laurie
feb4c32786
Remove unused variable.
2013-03-04 22:48:38 +00:00
Ben Laurie
63d86d067a
Actually comment out the cpuid asm!
2013-03-04 20:31:59 +00:00
Ben Laurie
35ced1f705
Merge branch 'master' of openssl.net:openssl
...
Conflicts:
util/mk1mf.pl
2013-03-04 20:26:17 +00:00
Dr. Stephen Henson
71a16946dc
Fix WIN32 build.
...
Make assembly language handling conditional on the "copy" platform
as Windows does its own thing here.
2013-03-04 19:21:32 +00:00
Andy Polyakov
5702e965d7
x86cpuid.pl: make it work with older CPUs.
...
PR: 3005
2013-03-04 20:05:04 +01:00
Ben Laurie
654d227a86
Only copy headers if they've changed.
2013-03-04 16:56:18 +00:00
Ben Laurie
2f297fce73
Don't make CPUID stuff twice.
2013-03-04 16:10:47 +00:00
Ben Laurie
656829b78f
Handle assembler files.
2013-03-04 14:31:19 +00:00
Ben Laurie
95dd301861
Missing MINFO generation.
2013-03-04 14:31:18 +00:00
Ben Laurie
4e2322892b
Override local vars for MINFO build.
2013-03-04 14:31:18 +00:00
Ben Laurie
7b0d591dc3
Allow variables to be overridden on the command line.
2013-03-04 14:31:18 +00:00
Ben Laurie
7bbb8c5620
Take the first definition of a variable.
2013-03-04 14:31:18 +00:00
Ben Laurie
d0aeeee176
Use "copy" instead of "auto".
2013-03-04 14:31:18 +00:00
Ben Laurie
afc1b1eab7
Remove pointless diagnostic.
2013-03-04 14:31:18 +00:00
Ben Laurie
5108690f19
Preserve the C compiler.
2013-03-04 14:31:18 +00:00
Ben Laurie
3c76bcded0
Inherit CFLAGS when plaform is "auto".
2013-03-04 14:31:18 +00:00
Ben Laurie
ea5003bd1e
Include correctly.
2013-03-04 14:31:18 +00:00
Ben Laurie
45ba475b81
Remove empty command.
2013-03-04 14:31:18 +00:00
Ben Laurie
7067cbc8b5
Spelling.
2013-03-04 14:31:18 +00:00
Ben Laurie
f990fae812
Add dependency on destination directory.
2013-03-04 14:31:18 +00:00
Ben Laurie
a32d9eaf07
Spelling.
2013-03-04 14:31:18 +00:00
Ben Laurie
f953c2d039
Add reallyclean target.
2013-03-04 14:31:18 +00:00
Andy Polyakov
342dbbbe4e
x86_64-gf2m.pl: fix typo.
2013-03-01 22:36:36 +01:00
Andy Polyakov
7c43601d44
x86_64-gf2m.pl: add missing Windows build fix for #2963 .
...
PR: 3004
2013-03-01 21:43:10 +01:00
Ben Laurie
1aaa04191f
Ignore MINFO.
2013-02-26 21:51:13 +00:00
Ben Laurie
e46a281de5
Missing files target.
2013-02-26 21:51:13 +00:00
Dr. Stephen Henson
e1f1d28f34
Add function CMS_RecipientInfo_encrypt
...
Add CMS_RecipientInfo_encrypt: this function encrypts an existing content
encryption key to match the key in the RecipientInfo structure: this is
useful if a new recpient is added to and existing enveloped data structure.
Add documentation.
2013-02-26 16:59:56 +00:00
Dr. Stephen Henson
388aff08dc
Fix error codes.
2013-02-26 16:46:58 +00:00
Dr. Stephen Henson
3646578ae7
Demo code for SSL_CONF API
...
Two example programs one for command line argument processing and
one for configuration file processing.
2013-02-26 16:33:05 +00:00
Dr. Stephen Henson
4365e4aad9
Update SSL_CONF docs.
...
Fix some typos and update version number first added: it has now been
backported to OpenSSL 1.0.2.
2013-02-26 15:29:11 +00:00
Ben Laurie
0850f11855
Fix ignored return value warnings.
...
Not sure why I am getting these now and not before.
2013-02-21 18:30:04 +00:00
Ben Laurie
975dfb1c6c
make depend.
2013-02-21 18:17:38 +00:00
Nick Alcock
5cc2707742
Fix POD errors to stop make install_docs dying with pod2man 2.5.0+
...
podlators 2.5.0 has switched to dying on POD syntax errors. This means
that a bunch of long-standing erroneous POD in the openssl documentation
now leads to fatal errors from pod2man, halting installation.
Unfortunately POD constraints mean that you have to sort numeric lists
in ascending order if they start with 1: you cannot do 1, 0, 2 even if
you want 1 to appear first. I've reshuffled such (alas, I wish there
were a better way but I don't know of one).
2013-02-15 19:36:26 +01:00
Andy Polyakov
47edeb9f59
sha256-586.pl: code refresh.
2013-02-15 11:23:06 +01:00
Andy Polyakov
35c77b7303
sha1-586.pl: code refresh.
2013-02-14 22:20:17 +01:00
Andy Polyakov
273a808180
ghash-x86[_64].pl: code refresh.
2013-02-14 16:28:09 +01:00
Andy Polyakov
7c9e81be40
[aesni-]sha1-x86_64.pl: code refresh.
2013-02-14 16:14:02 +01:00
Andy Polyakov
c4558efbf3
sha512-x86_64.pl: add AVX2 code path.
2013-02-14 15:39:42 +01:00
Andy Polyakov
750398acd8
bn_nist.c: work around clang 3.0 bug.
2013-02-14 09:51:41 +01:00
Dr. Stephen Henson
2527b94fec
Upate FAQ.
...
Add description of "allocate and encode" operation for ASN1 routines.
Document how versioning will for after the letter release reaches
y.
2013-02-12 16:02:45 +00:00
David Woodhouse
d980abb22e
Check DTLS_BAD_VER for version number.
...
The version check for DTLS1_VERSION was redundant as
DTLS1_VERSION > TLS1_1_VERSION, however we do need to
check for DTLS1_BAD_VER for compatibility.
PR:2984
2013-02-12 15:14:14 +00:00
Dr. Stephen Henson
b7c37f2fc0
Fix in ssltest is no-ssl2 configured
...
(cherry picked from commit cbf9b4aed3 )
2013-02-11 18:29:05 +00:00
Dr. Stephen Henson
7e47a69544
update FAQ
2013-02-11 16:20:55 +00:00
Lutz Jaenicke
9fa24352ce
FAQ/README: we are now using Git instead of CVS
...
(cherry picked from commit f88dbb8385 )
2013-02-11 11:33:29 +01:00
Andy Polyakov
3caeef94bd
sparccpuid.S: work around emulator bug on T1.
2013-02-11 10:39:50 +01:00
Andy Polyakov
f93a41877d
s3_cbc.c: make CBC_MAC_ROTATE_IN_PLACE universal.
2013-02-08 21:30:52 +01:00
Andy Polyakov
c98a45452b
s3_cbc.c: get rid of expensive divisions.
2013-02-08 16:36:09 +01:00
Andy Polyakov
0e4f7045ea
s3_cbc.c: fix warning [in Windows build].
2013-02-08 14:22:22 +01:00
Andy Polyakov
2141e6f30b
e_aes_cbc_hmac_sha1.c: align calculated MAC at cache line.
...
It also ensures that valgring is happy.
2013-02-08 10:31:13 +01:00
Andy Polyakov
dd7e60bd70
ssl/*: revert "remove SSL_RECORD->orig_len" and merge "fix IV".
...
Revert is appropriate because binary compatibility is not an issue
in 1.1.
2013-02-08 10:20:48 +01:00
Adam Langley
32620fe9d1
Fix for EXP-RC2-CBC-MD5
...
MD5 should use little endian order. Fortunately the only ciphersuite
affected is EXP-RC2-CBC-MD5 (TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5) which
is a rarely used export grade ciphersuite.
(cherry picked from commit f306b87d76 )
2013-02-06 16:11:31 +00:00
Andy Polyakov
1041ab696e
e_aes_cbc_hmac_sha1.c: cleanse temporary copy of HMAC secret.
...
(cherry picked from commit 529d27ea47 )
2013-02-06 14:19:11 +00:00
Andy Polyakov
9970308c88
e_aes_cbc_hmac_sha1.c: address the CBC decrypt timing issues.
...
Address CBC decrypt timing issues and reenable the AESNI+SHA1 stitch.
(cherry picked from commit 125093b59f )
2013-02-06 14:19:10 +00:00
Andy Polyakov
2aec073a52
ssl/*: remove SSL3_RECORD->orig_len to restore binary compatibility.
...
Kludge alert. This is arranged by passing padding length in unused
bits of SSL3_RECORD->type, so that orig_len can be reconstructed.
(cherry picked from commit 8bfd4c659f )
2013-02-06 14:19:10 +00:00
Dr. Stephen Henson
b714a1fe09
Don't access EVP_MD_CTX internals directly.
...
(cherry picked from commit 04e45b52ee )
2013-02-06 14:19:10 +00:00
Andy Polyakov
bbb4ee8574
s3/s3_cbc.c: allow for compilations with NO_SHA256|512.
...
(cherry picked from commit d5371324d9 )
2013-02-06 14:19:10 +00:00
Andy Polyakov
4af91ec072
ssl/s3_cbc.c: md_state alignment portability fix.
...
RISCs are picky and alignment granted by compiler for md_state can be
insufficient for SHA512.
(cherry picked from commit 36260233e7 )
2013-02-06 14:19:09 +00:00
Andy Polyakov
6b2a843970
ssl/s3_cbc.c: uint64_t portability fix.
...
Break dependency on uint64_t. It's possible to declare bits as
unsigned int, because TLS packets are limited in size and 32-bit
value can't overflow.
(cherry picked from commit cab13fc847 )
2013-02-06 14:19:09 +00:00
Dr. Stephen Henson
6b1f7beeee
typo.
...
(cherry picked from commit 34ab3c8c71 )
2013-02-06 14:19:09 +00:00
Dr. Stephen Henson
8109e8305b
Add ordinal for CRYPTO_memcmp: since this will affect multiple
...
branches it needs to be in a "gap".
(cherry picked from commit 81ce0e14e7 )
2013-02-06 14:19:08 +00:00
Dr. Stephen Henson
c4e6fb1524
Timing fix mitigation for FIPS mode.
...
We have to use EVP in FIPS mode so we can only partially mitigate
timing differences.
Make an extra call to EVP_DigestSignUpdate to hash additonal blocks
to cover any timing differences caused by removal of padding.
(cherry picked from commit b908e88ec1 )
2013-02-06 14:19:08 +00:00
Ben Laurie
a693ead6dc
Oops. Add missing file.
...
(cherry picked from commit 014265eb02 )
2013-02-06 14:19:08 +00:00
Ben Laurie
e33ac0e71d
Update DTLS code to match CBC decoding in TLS.
...
This change updates the DTLS code to match the constant-time CBC
behaviour in the TLS.
(cherry picked from commit 9f27de170d )
2013-02-06 14:19:07 +00:00
Ben Laurie
93cab6b319
Don't crash when processing a zero-length, TLS >= 1.1 record.
...
The previous CBC patch was bugged in that there was a path through enc()
in s3_pkt.c/d1_pkt.c which didn't set orig_len. orig_len would be left
at the previous value which could suggest that the packet was a
sufficient length when it wasn't.
(cherry picked from commit 6cb19b7681 )
2013-02-06 14:19:07 +00:00
Ben Laurie
2acc020b77
Make CBC decoding constant time.
...
This patch makes the decoding of SSLv3 and TLS CBC records constant
time. Without this, a timing side-channel can be used to build a padding
oracle and mount Vaudenay's attack.
This patch also disables the stitched AESNI+SHA mode pending a similar
fix to that code.
In order to be easy to backport, this change is implemented in ssl/,
rather than as a generic AEAD mode. In the future this should be changed
around so that HMAC isn't in ssl/, but crypto/ as FIPS expects.
(cherry picked from commit e130841bcc )
2013-02-06 14:19:07 +00:00
Ben Laurie
7c770d572a
Add and use a constant-time memcmp.
...
This change adds CRYPTO_memcmp, which compares two vectors of bytes in
an amount of time that's independent of their contents. It also changes
several MAC compares in the code to use this over the standard memcmp,
which may leak information about the size of a matching prefix.
(cherry picked from commit 2ee798880a )
2013-02-06 14:16:55 +00:00
Dr. Stephen Henson
ea34a58385
Fix for trace code: SSL3 doesn't include a length value for
...
encrypted premaster secret value.
2013-02-04 15:13:12 +00:00
Andy Polyakov
4568182a8b
x86_64 assembly pack: keep making Windows build more robust.
...
PR: 2963 and a number of others
2013-02-02 19:54:59 +01:00
Dr. Stephen Henson
e511c64a24
Don't use C++ style comments.
2013-01-24 23:22:33 +00:00
Dr. Stephen Henson
c38b76bf69
Fix warning: lenmax isn't used any more.
2013-01-24 14:06:54 +00:00
Dr. Stephen Henson
1703627ba8
Don't include comp.h in cmd_cd.c if OPENSSL_NO_COMP set
2013-01-23 01:09:38 +00:00
Dr. Stephen Henson
498e89fe9d
fix domd
2013-01-23 00:43:09 +00:00
Andy Polyakov
46bf83f07a
x86_64 assembly pack: make Windows build more robust.
...
PR: 2963 and a number of others
2013-01-22 22:27:28 +01:00
Andy Polyakov
7c47f0d946
TABLE update.
2013-01-22 21:21:03 +01:00
Andy Polyakov
058843bd0f
Configure: update linux-mips* lines.
2013-01-22 21:20:34 +01:00
Andy Polyakov
543fd85460
bn/asm/mips.pl: hardwire local call to bn_div_words.
2013-01-22 21:13:37 +01:00
Andy Polyakov
1598af9ac9
sha512-ppc.pl: minimize stack frame.
2013-01-22 21:09:14 +01:00
Andy Polyakov
06b3b640eb
gost2814789t.c: portability fixes.
2013-01-22 14:37:03 +01:00
Ben Laurie
5bdf1f1a89
Fix warnings.
2013-01-21 23:02:17 +00:00
Dr. Stephen Henson
f20c673d0d
Don't include comp.h if no-comp set.
2013-01-20 02:34:25 +00:00
Andy Polyakov
a006fef78e
Improve WINCE support.
...
Submitted by: Pierre Delaage
2013-01-19 21:23:13 +01:00
Ben Laurie
0e5cf7bc09
Merge branch 'master' of openssl.net:openssl
2013-01-19 18:30:10 +00:00
Andy Polyakov
bd2bceb91b
More .gitignore adjustments.
2013-01-19 18:41:44 +01:00
Ben Laurie
6f0a93b069
Merge branch 'master' of openssl.net:openssl
2013-01-19 17:35:41 +00:00
Ben Laurie
ed60d9ded0
Remove kludge to use RC4 asm.
2013-01-19 17:31:46 +00:00
Ben Laurie
e721909d7f
Build/test cleanly on MacOS.
2013-01-19 17:24:40 +00:00
Andy Polyakov
a0dcb8d821
gost_crypt.c: add assertions.
...
Submitted by: Seguei Leontiev
PR: 2821
2013-01-19 18:10:05 +01:00
Andy Polyakov
26906f2d93
engines/ccgost: add test case.
...
Submitted by: Serguei Leontiev
PR: 2821
2013-01-19 17:56:56 +01:00
Andy Polyakov
d4571f43e8
sha512-ppc.pl: add PPC32 code, >2x improvement on in-order cores.
2013-01-19 17:22:05 +01:00
Ben Laurie
eef6935426
Remove extraneous brackets (clang doesn't like them).
2013-01-19 15:12:08 +00:00
Ben Laurie
517dd307f9
Can't check a size_t for < 0.
2013-01-19 15:00:27 +00:00
Ben Laurie
a6bbbf2ff5
Make "make depend" work on MacOS out of the box.
2013-01-19 14:14:30 +00:00
Andy Polyakov
bba43f3f43
.gitignore adjustments
2013-01-19 13:20:21 +01:00
Dr. Stephen Henson
4badfebefc
Typo (PR2959).
2013-01-17 18:20:18 +00:00
Ben Laurie
08e5536445
Fix some clang warnings.
2013-01-13 21:04:39 +00:00
Ben Laurie
e54e123549
Correct EVP_PKEY_verifyrecover to EVP_PKEY_verify_recover (RT 2955).
2013-01-12 12:25:30 +00:00
Dr. Stephen Henson
abd01ea214
Change default bits to 1024
2013-01-07 16:18:31 +00:00
Ben Laurie
a5b2791cc9
Add some missing files, make paths absolute.
2013-01-06 19:06:40 +00:00
Ben Laurie
f00c54ae2e
Fix warning.
2013-01-06 19:03:48 +00:00
Dr. Stephen Henson
e71972d177
Initial .gitignore
2013-01-06 16:47:36 +00:00
Dr. Stephen Henson
c1faa8b5b2
make no-comp compile
2012-12-30 16:04:51 +00:00
Dr. Stephen Henson
b252cf0d98
make JPAKE work again, fix memory leaks
2012-12-29 23:38:20 +00:00
Dr. Stephen Henson
a4c4a7d5ca
stop warning when compiling with no-comp
2012-12-29 23:37:56 +00:00
Dr. Stephen Henson
bdcf772aa5
Portability fix: use BIO_snprintf and pick up strcasecmp alternative
...
definitions from e_os.h
2012-12-26 23:51:56 +00:00
Dr. Stephen Henson
89a5e2f704
missing tab
2012-12-26 19:12:57 +00:00
Dr. Stephen Henson
024e6fed62
typo
2012-12-26 15:23:42 +00:00
Dr. Stephen Henson
48b0951681
Fix tocsp: we don't need -trust_other any more.
...
Fix typo.
2012-12-21 18:32:33 +00:00
Dr. Stephen Henson
2dabd82236
Make partial chain checking work if we only have the EE certificate in
...
the trust store.
2012-12-21 18:31:32 +00:00
Dr. Stephen Henson
09d0d67c13
add missing newline
2012-12-21 16:24:48 +00:00
Dr. Stephen Henson
0028a23b9f
revert OCSP_basic_verify changes: they aren't needed now we support partial chain verification and can pass verify options to ocsp utility
2012-12-20 18:51:00 +00:00
Dr. Stephen Henson
032b33059e
Update test OCSP script "tocsp" to use shell functions and to use
...
December 17th as check date to avoid certificate expiry errors.
2012-12-20 18:48:11 +00:00
Andy Polyakov
3a3f964eda
gost_crypt.c: more intuitive ceiling.
2012-12-19 17:24:46 +00:00
Dr. Stephen Henson
b7d1a1af76
correct CHANGES
2012-12-19 14:34:39 +00:00
Andy Polyakov
8cfb6411ff
engines/cchost/gost_crypt.c: fix typo.
2012-12-19 11:06:00 +00:00
Andy Polyakov
2c0093d294
engines/e_capi.c: fix typo.
...
Submitted by: Pierre Delaage
2012-12-19 10:54:47 +00:00
Andy Polyakov
947e129219
engine/cchost: fix bugs.
...
PR: 2821
Submitted by: Dmitry Belyavsky, Serguei Leontiev
2012-12-19 10:45:13 +00:00
Andy Polyakov
0a2d5003df
dso/dso_win32.c: fix compiler warning.
2012-12-18 18:19:54 +00:00
Andy Polyakov
fb0a520897
util/pl/VC-32.pl fix typo.
2012-12-18 18:07:20 +00:00
Dr. Stephen Henson
230ec17d74
Use client version when deciding which cipher suites to disable.
2012-12-18 13:25:47 +00:00
Andy Polyakov
668bcfd5ca
util/pl/VC-32.pl: refresh, switch to ws2, add crypt32, fix typo (based on
...
suggestions from Pierre Delaage).
2012-12-18 09:42:31 +00:00
Andy Polyakov
8774f78d1b
VC-32.pl: fix typo.
...
Submitted by: Pierre Delaage
2012-12-16 19:39:24 +00:00
Andy Polyakov
f469880c61
d1_lib.c,bss_dgram.c: eliminate dependency on _ftime.
2012-12-16 19:02:59 +00:00
Dr. Stephen Henson
bbdfbacdef
add -rmd option to set OCSP response signing digest
2012-12-16 00:10:03 +00:00
Dr. Stephen Henson
e9754726d2
Check chain is not NULL before assuming we have a validated chain.
...
The modification to the OCSP helper purpose breaks normal OCSP verification.
It is no longer needed now we can trust partial chains.
2012-12-15 02:58:00 +00:00
Dr. Stephen Henson
99fc818e93
Return success when the responder is active.
...
Don't verify our own responses.
2012-12-15 02:56:02 +00:00
Dr. Stephen Henson
265f835e3e
typo
2012-12-15 00:29:12 +00:00
Dr. Stephen Henson
33826fd028
Add support for '-' as input and output filenames in ocsp utility.
...
Recognise verification arguments.
2012-12-14 23:30:56 +00:00
Dr. Stephen Henson
92821996de
oops, revert, committed in error
2012-12-14 23:29:58 +00:00
Dr. Stephen Henson
11e2957d5f
apps/ocsp.c
2012-12-14 23:28:19 +00:00
Ben Laurie
3a778a2913
Documentation improvements by Chris Palmer (Google).
2012-12-14 13:28:49 +00:00
Andy Polyakov
4d2654783c
fips/fipsld: improve cross-compile support.
2012-12-13 22:51:01 +00:00
Dr. Stephen Henson
2a21cdbe6b
Use new partial chain flag instead of modifying input parameters.
2012-12-13 18:20:47 +00:00
Dr. Stephen Henson
51e7a4378a
New verify flag to return success if we have any certificate in the
...
trusted store instead of the default which is to return an error if
we can't build the complete chain.
2012-12-13 18:14:46 +00:00
Ben Laurie
74cc3b583d
Document -pubkey.
2012-12-13 16:17:55 +00:00
Ben Laurie
e7cf2b1022
Improve my 64-bit debug target.
2012-12-12 14:14:43 +00:00
Dr. Stephen Henson
60938ae772
add -crl_download option to s_server
2012-12-12 03:35:31 +00:00
Dr. Stephen Henson
4e71d95260
add -cert_chain option to s_client
2012-12-12 00:50:26 +00:00
Ben Laurie
fefc111a2a
Make openssl verify return errors.
2012-12-11 16:05:14 +00:00
Ben Laurie
b204ab6506
Update ignores.
2012-12-11 15:52:10 +00:00
Ben Laurie
ec40e5ff42
Tabification. Remove accidental duplication.
2012-12-10 16:52:17 +00:00
Dr. Stephen Henson
b34aa49c25
revert SUITEB128ONLY patch, anything wanting to use P-384 can use SUITEB128 instead
2012-12-10 02:02:16 +00:00
Dr. Stephen Henson
1e8b9e7e69
add -badsig option to ocsp utility too.
2012-12-09 16:21:46 +00:00
Dr. Stephen Henson
d372d36592
allow ECDSA+SHA384 signature algorithm in SUITEB128ONLY mode
2012-12-09 16:03:34 +00:00
Dr. Stephen Henson
36b5bb6f2f
send out the raw SSL/TLS headers to the msg_callback and display them in SSL_trace
2012-12-07 23:42:33 +00:00
Ben Laurie
30c278aa6b
Fix OCSP checking.
2012-12-07 18:47:47 +00:00
Dr. Stephen Henson
083bec780d
typo
2012-12-07 13:23:49 +00:00
Dr. Stephen Henson
1edf8f1b4e
really fix automatic ;-)
2012-12-07 12:41:13 +00:00
Dr. Stephen Henson
65f2a56580
documentation fixes
2012-12-06 23:26:11 +00:00
Dr. Stephen Henson
f1f5c70a04
fix handling of "automatic" in file mode
2012-12-06 21:53:05 +00:00
Dr. Stephen Henson
0090a686c0
Add code to download CRLs based on CRLDP extension.
...
Just a sample, real world applications would have to be cleverer.
2012-12-06 18:43:40 +00:00
Dr. Stephen Henson
f5a7d5b164
remove print_ssl_cert_checks() from openssl application: it is no longer used
2012-12-06 18:36:51 +00:00
Dr. Stephen Henson
abd2ed012b
Fix two bugs which affect delta CRL handling:
...
Use -1 to check all extensions in CRLs.
Always set flag for freshest CRL.
2012-12-06 18:24:28 +00:00
Dr. Stephen Henson
3bf15e2974
Integrate host, email and IP address checks into X509_verify.
...
Add new verify options to set checks.
Remove previous -check* commands from s_client and s_server.
2012-12-05 18:35:20 +00:00
Andy Polyakov
8df400cf8d
aes-s390x.pl: fix XTS bugs in z196-specific code path.
2012-12-05 17:44:45 +00:00
Dr. Stephen Henson
fbeb85ecb9
don't print verbose policy check messages when -quiet is selected even on error
2012-12-04 23:18:44 +00:00
Andy Polyakov
3766e7ccab
ghash-sparcv9.pl: shave off one more xmulx, improve T3 performance by 7%.
2012-12-04 20:21:24 +00:00
Dr. Stephen Henson
2e8cb108dc
initial support for delta CRL generations by diffing two full CRLs
2012-12-04 18:35:36 +00:00
Dr. Stephen Henson
256f9573c5
make -subj always override config file
2012-12-04 18:35:04 +00:00
Dr. Stephen Henson
b6b094fb77
check mval for NULL too
2012-12-04 17:25:34 +00:00
Dr. Stephen Henson
0db46a7dd7
fix leak
2012-12-03 16:32:52 +00:00
Dr. Stephen Henson
2537d46903
oops, really check brief mode only ;-)
2012-12-03 03:40:57 +00:00
Dr. Stephen Henson
5447f836a0
don't check errno is zero, just print out message
2012-12-03 03:39:23 +00:00
Dr. Stephen Henson
66d9f2e521
if no error code and -brief selected print out connection closed instead of read error
2012-12-03 03:33:44 +00:00
Dr. Stephen Henson
139cd16cc5
add -badsig option to corrupt CRL signatures for testing too
2012-12-02 16:48:25 +00:00
Dr. Stephen Henson
fdb78f3d88
New option to add CRLs for s_client and s_server.
2012-12-02 16:16:28 +00:00
Dr. Stephen Henson
95ea531864
add option to get a certificate or CRL from a URL
2012-12-02 14:00:22 +00:00
Dr. Stephen Henson
4842dde80c
return error if Suite B mode is selected and TLS 1.2 can't be used. Correct error coded
2012-12-01 18:33:21 +00:00
Andy Polyakov
f91926a240
cryptlib.c: fix logical error.
2012-12-01 18:24:20 +00:00
Andy Polyakov
9282c33596
aesni-x86_64.pl: CTR face lift, +25% on Bulldozer.
2012-12-01 18:20:39 +00:00
Andy Polyakov
c3cddeaec8
aes-s390x.pl: harmonize software-only code path [and minor optimization].
2012-12-01 11:06:19 +00:00
Dr. Stephen Henson
df316fd43c
Add new test option set the version in generated certificates: this
...
is needed to test some profiles/protocols which reject certificates
with unsupported versions.
2012-11-30 19:24:13 +00:00
Dr. Stephen Henson
2fceff5ba3
PR: 2803
...
Submitted by: jean-etienne.schwartz@bull.net
In OCSP_basic_varify return an error if X509_STORE_CTX_init fails.
2012-11-29 19:15:14 +00:00
Dr. Stephen Henson
f404278186
add wrapper function for certificate download
2012-11-29 01:15:09 +00:00
Dr. Stephen Henson
68f5500d31
constify
2012-11-29 01:13:38 +00:00
Dr. Stephen Henson
6f9076ff37
Generalise OCSP I/O functions to support dowloading of other ASN1
...
structures using HTTP. Add wrapper function to handle CRL download.
2012-11-28 16:22:53 +00:00
Andy Polyakov
904732f68b
C64x+ assembly pack: improve EABI support.
2012-11-28 13:19:10 +00:00
Andy Polyakov
cf5ecc3e1f
Update support for Intel compiler: add linux-x86_64-icc and fix problems.
2012-11-28 13:05:13 +00:00
Dr. Stephen Henson
2c340864be
New functions to set lookup_crls callback and to retrieve internal X509_STORE
...
from X509_STORE_CTX.
2012-11-27 23:47:48 +00:00
Dr. Stephen Henson
84bafb7471
Print out point format list for clients too.
2012-11-26 18:39:38 +00:00
Dr. Stephen Henson
5087afa108
Use default point formats extension for server side as well as client
...
side, if possible.
Don't advertise compressed char2 for SuiteB as it is not supported.
2012-11-26 18:38:10 +00:00
Dr. Stephen Henson
93c2c9befc
change inaccurate error message
2012-11-26 15:47:32 +00:00
Dr. Stephen Henson
d900c0ae14
set auto ecdh parameter selction for Suite B
2012-11-26 15:10:50 +00:00
Dr. Stephen Henson
55b66f084d
set cmdline flag in s_server
2012-11-26 12:51:12 +00:00
Dr. Stephen Henson
96cfba0fb4
option to output corrupted signature in certificates for testing purposes
2012-11-25 22:29:52 +00:00
Andy Polyakov
cd68694646
AES for SPARC T4: add XTS, reorder subroutines to improve TLB locality.
2012-11-24 21:55:23 +00:00
Dr. Stephen Henson
1c16fd1f03
add Suite B 128 bit mode offering only combination 2
2012-11-24 00:59:51 +00:00
Dr. Stephen Henson
a5afc0a8f4
Don't display messages about verify depth in s_server if -quiet it set.
...
Add support for separate verify and chain stores in s_client.
2012-11-23 18:56:25 +00:00
Dr. Stephen Henson
20b431e3a9
Add support for printing out and retrieving EC point formats extension.
2012-11-22 15:20:53 +00:00
Dr. Stephen Henson
e83aefb3a0
reject zero length point format list or supported curves extensions
2012-11-22 14:15:44 +00:00
Dr. Stephen Henson
1740c9fbfc
support -quiet with -msg or -trace
2012-11-21 17:11:42 +00:00
Dr. Stephen Henson
2588d4ca41
curves can be set in both client and server
2012-11-21 17:01:46 +00:00
Dr. Stephen Henson
878b5d07ef
use correct return values when callin cmd
2012-11-21 16:59:33 +00:00
Dr. Stephen Henson
191b3f0ba9
only use a default curve if not already set
2012-11-21 16:47:25 +00:00
Dr. Stephen Henson
46a6cec699
Reorganise parameters for OPENSSL_gmtime_diff.
...
Make ASN1_UTCTIME_cmp_time_t more robust by using the new time functions.
2012-11-21 14:13:20 +00:00
Dr. Stephen Henson
472af806ce
Submitted by: Florian Weimer <fweimer@redhat.com>
...
PR: 2909
Update test cases to cover internal error return values.
Remove IDNA wildcard filter.
2012-11-21 14:10:48 +00:00
Dr. Stephen Henson
5c1393bfc3
PR: 2908
...
Submitted by: Dmitry Belyavsky <beldmit@gmail.com >
Fix DH double free if parameter generation fails.
2012-11-21 14:02:40 +00:00
Dr. Stephen Henson
f7ac0ec89d
fix printout of expiry days if -enddate is used in ca
2012-11-20 15:22:15 +00:00
Dr. Stephen Henson
598c423e65
don't use psec or pdays if NULL
2012-11-20 15:20:40 +00:00
Dr. Stephen Henson
360ef6769e
first parameter is difference in days, not years
2012-11-20 15:19:53 +00:00
Dr. Stephen Henson
13cfb04343
reorganise SSL_CONF_cmd manual page and update some links
2012-11-20 01:01:33 +00:00
Dr. Stephen Henson
22b5d7c80b
fix leaks
2012-11-20 00:24:52 +00:00
Dr. Stephen Henson
685755937a
with -rev close connection if client sends "CLOSE"
2012-11-19 23:41:24 +00:00
Dr. Stephen Henson
7c8ac50504
update usage messages
2012-11-19 23:20:40 +00:00
Dr. Stephen Henson
095db6bdb8
correct docs
2012-11-19 20:06:44 +00:00
Dr. Stephen Henson
8dbeb110fb
document -trace and -msgfile options
2012-11-19 16:37:18 +00:00
Dr. Stephen Henson
765b413794
update docs for s_server/s_client
2012-11-19 16:07:53 +00:00
Dr. Stephen Henson
d223dfe641
make depend
2012-11-19 15:13:33 +00:00
Dr. Stephen Henson
1c455bc084
new function ASN1_TIME_diff to calculate difference between two ASN1_TIME structures
2012-11-19 15:12:07 +00:00
Andy Polyakov
9f6b0635ad
x86_64-gcc.c: resore early clobber constraint.
...
Submitted by: Florian Weimer
2012-11-19 15:02:00 +00:00
Dr. Stephen Henson
98a7edf9f0
make depend
2012-11-19 13:18:09 +00:00
Dr. Stephen Henson
7831969634
don't call gethostbyname if OPENSSL_SSL_DEBUG_BROKEN_PROTOCOL is set
2012-11-19 12:36:04 +00:00
Dr. Stephen Henson
9ba297e49f
remove obsolete code
2012-11-19 03:46:49 +00:00
Dr. Stephen Henson
ddd13d677b
fix typo and warning
2012-11-19 02:46:46 +00:00
Dr. Stephen Henson
821244cf67
clarify docs
2012-11-18 18:06:16 +00:00
Dr. Stephen Henson
edb128ce00
fix manual page file name
2012-11-18 17:58:45 +00:00
Dr. Stephen Henson
642aa226db
document -naccept option
2012-11-18 15:51:26 +00:00
Dr. Stephen Henson
b5cadfb564
add -naccept <n> option to s_server to automatically exit after <n> connections
2012-11-18 15:45:16 +00:00
Dr. Stephen Henson
c4fc172240
PR: 2880
...
Submitted by: "Florian Rüchel" <florian.ruechel@ruhr-uni-bochum.de >
Correctly handle local machine keys in the capi ENGINE.
2012-11-18 15:24:37 +00:00
Dr. Stephen Henson
d88926f181
PR: 2909
...
Contributed by: Florian Weimer <fweimer@redhat.com >
Fixes to X509 hostname and email address checking. Wildcard matching support.
New test program and manual page.
2012-11-18 15:13:55 +00:00
Dr. Stephen Henson
24f77b34d5
remove redundant code from demo
2012-11-18 14:47:25 +00:00
Andy Polyakov
cccf27c89a
cryptlib.c: revert typo.
2012-11-17 21:42:57 +00:00
Andy Polyakov
c5cd28bd64
Extend OPENSSL_ia32cap_P with extra word to accomodate AVX2 capability.
2012-11-17 19:04:15 +00:00
Andy Polyakov
b3aee265c5
perlasm/sparcv9_modes.pl: addendum to commit#22966.
2012-11-17 18:34:17 +00:00
Dr. Stephen Henson
9fc81acae6
fix error messages
2012-11-17 15:22:50 +00:00
Dr. Stephen Henson
5d2e07f182
Delegate command line handling for many common options in s_client/s_server
...
to the SSL_CONF APIs.
This is complicated a little because the SSL_CTX structure is not available
when the command line is processed: so just check syntax of commands initially
and store them, ready to apply later.
2012-11-17 14:42:22 +00:00
Dr. Stephen Henson
aa714f3af4
initial decription of GCM/CCM usage via EVP
2012-11-17 14:38:20 +00:00
Andy Polyakov
68c06bf6b2
Support for SPARC T4 MONT[MUL|SQR] instructions.
...
Submitted by: David Miller, Andy Polyakov
2012-11-17 10:34:11 +00:00
Dr. Stephen Henson
c7b7984ac9
fix typos in SSL_CONF documentation
2012-11-17 00:21:34 +00:00
Dr. Stephen Henson
3db935a9e5
add SSL_CONF functions and documentation
2012-11-16 19:12:24 +00:00
Dr. Stephen Henson
63d103ea48
typo
2012-11-16 12:49:14 +00:00
Dr. Stephen Henson
999ffeca6c
update ciphers documentation to indicate implemented fixed DH ciphersuites
2012-11-16 01:15:15 +00:00
Dr. Stephen Henson
ffa4579679
initial update of ciphers doc
2012-11-16 00:42:38 +00:00
Dr. Stephen Henson
51b9115b6d
new command line option -stdname to ciphers utility
2012-11-16 00:35:46 +00:00
Dr. Stephen Henson
8ab92fc646
add "missing" TLSv1.2 cipher alias
2012-11-15 19:14:47 +00:00
Andy Polyakov
98dc178494
aes-x86_64.pl: Atom-specific optimizations, +10%.
...
vpaes-x86_64.pl: minor performance squeeze.
2012-11-12 17:52:41 +00:00
Andy Polyakov
89f1eb8213
aes-586.pl: Atom-specific optimization, +44/29%, minor improvement on others.
...
vpaes-x86.pl: minor performance squeeze.
2012-11-12 17:50:19 +00:00
Andy Polyakov
f717abd7c1
ppccap.c: fix typo.
2012-11-10 20:27:18 +00:00
Andy Polyakov
d5630dd60e
ppccap.c: restrict features on AIX 5.
2012-11-10 20:24:51 +00:00
Andy Polyakov
134c00659a
bn_word.c: fix overflow bug in BN_add_word.
2012-11-09 13:58:40 +00:00
Dr. Stephen Henson
8bb870df9e
new feature: if ctx==NULL in SSL_CTX_ctrl perform syntax checking only for some operations (currently curves and signature algorithms)
2012-11-08 14:24:51 +00:00
Dr. Stephen Henson
95bba34b83
contify
2012-11-05 19:38:32 +00:00
Andy Polyakov
96a4cf8c29
crypto/modes: even more strict aliasing fixes [and fix bug in cbc128.c from
...
previous cbc128.c commit].
2012-11-05 17:03:39 +00:00
Ben Laurie
da01515c40
More strict aliasing fix.
2012-11-05 14:23:55 +00:00
Dr. Stephen Henson
7c43ea50fd
correct error function code
2012-11-05 13:34:29 +00:00
Andy Polyakov
c0832990f5
cbc128.c: fix strict aliasing warning.
2012-11-05 10:04:02 +00:00
Andy Polyakov
7cb81398b7
e_camillia.c: remove copy-n-paste artifact, EVP_CIPH_FLAG_FIPS, and
...
leave comment about CTR mode.
2012-11-05 09:20:41 +00:00
Andy Polyakov
24798c5e59
ghash-sparcv9.pl: 22% improvement on T4.
2012-11-05 08:47:26 +00:00
Ben Laurie
5b0e3daf50
Remove unused static function.
2012-11-05 02:01:07 +00:00
Ben Laurie
53d6bf40c1
Fix gcc 4.8 warning (strict aliasing violation).
2012-11-05 01:59:33 +00:00
Andy Polyakov
1e98169086
mk1mf.pl: correct flags.
2012-10-29 22:23:58 +00:00
Andy Polyakov
866f1f41d1
e_os.h: keep stdin redifinitions to "normal" Windows.
2012-10-29 20:55:08 +00:00
Andy Polyakov
536a16435b
util/fipslink.pl: further adjustments.
2012-10-27 23:36:43 +00:00
Andy Polyakov
7f5bf370db
util/fipslink.pl: fix typo.
2012-10-27 21:21:09 +00:00
Andy Polyakov
2c7af9cb6e
e_os.h: skip redundant headers in fipscanister build.
2012-10-27 21:17:48 +00:00
Andy Polyakov
fe5772e9d0
util/fipslink.pl: allow for single-step link.
2012-10-27 21:16:45 +00:00
Andy Polyakov
8be18f3459
util/pl/VC-32.pl: make fipscanister.lib universally usable.
2012-10-27 21:16:00 +00:00
Dr. Stephen Henson
226afe4956
typo
2012-10-27 18:05:56 +00:00
Andy Polyakov
cfb399ad55
test_t4: cover even Camellia.
2012-10-25 12:10:44 +00:00
Andy Polyakov
1efd583085
SPARCv9 assembly pack: harmonize ABI handling (so that it's handled in one
...
place at a time, by pre-processor in .S case and perl - in .s).
2012-10-25 12:07:32 +00:00
Andy Polyakov
8ed11a815e
[aes|cmll]t4-sparcv9.pl: unify argument handling.
2012-10-25 12:03:41 +00:00
Andy Polyakov
38049c2bb9
perlasm/sparcv9_modes.pl: fix typo in IV save code and switch to less
...
aggressive ASI.
2012-10-25 12:02:37 +00:00
Dr. Stephen Henson
918e613a32
oops, add missing asn_mstbl.c
2012-10-24 13:27:46 +00:00
Andy Polyakov
23328d4b27
ghash-sparcv9.pl: add VIS3 code path.
2012-10-24 08:21:10 +00:00
Dr. Stephen Henson
30765fed55
New config module for string tables. This can be used to add new
...
multi string components (as used in DN fields or request attributes)
or change the values of existing ones.
2012-10-22 13:05:54 +00:00
Dr. Stephen Henson
6a45ea4f88
use correct year automatically
2012-10-22 13:02:42 +00:00
Andy Polyakov
78c3e20579
linux-pcc: make it more robust and recognize KERNEL_BITS variable.
2012-10-21 18:19:41 +00:00
Andy Polyakov
0c832ec5c6
Add VIS3-capable sparcv9-gf2m module.
2012-10-20 15:59:14 +00:00
Andy Polyakov
947d78275b
Add VIS3 Montgomery multiplication.
2012-10-20 09:13:21 +00:00
Dr. Stephen Henson
d35c0ff30b
fix ASN1_STRING_TABLE_add so it can override existing string table values
2012-10-19 15:06:31 +00:00
Dr. Stephen Henson
057c8a2b9e
fix error code
2012-10-18 16:21:39 +00:00
Dr. Stephen Henson
07a4ff79d2
add simple AES GCM code example
2012-10-16 23:03:45 +00:00
Dr. Stephen Henson
964eaad78c
Don't require tag before ciphertext in AESGCM mode
2012-10-16 22:46:08 +00:00
Andy Polyakov
3bc522a246
aix[64]-cc: get MT support right (gcc targets are not affected).
2012-10-16 08:06:51 +00:00
Andy Polyakov
fd3b0eb01d
sparcv9_modes.pl: membars are reported as must-have.
2012-10-15 14:04:52 +00:00
Andy Polyakov
d17b59e49f
md5-sparcv9.pl: avoid %asi modifications, improve short input performance
...
by 30-20%.
2012-10-14 16:51:27 +00:00
Andy Polyakov
aea4126e4e
[md5|sha1|sha512]-sparcv9.pl: "cooperative" optimizations based on
...
suggestions from David Miller.
2012-10-14 14:46:56 +00:00
Andy Polyakov
eec82a0e1f
[aes|cmll]t4-sparcv9.pl: addendum to previous sparcv9_modes.pl commit.
2012-10-14 14:42:27 +00:00
Andy Polyakov
dea8068015
perlasm/sparcv9_modes.pl: "cooperative" optimizations based on suggestions
...
from David Miller.
2012-10-14 14:25:00 +00:00
Andy Polyakov
4739ccdb39
Add SPARC T4 Camellia support.
...
Submitted by: David Miller
2012-10-11 18:35:18 +00:00
Andy Polyakov
54a1f4480e
aest4-sparcv9.pl: split it to AES-specific and reusable part.
2012-10-11 18:30:35 +00:00
Dr. Stephen Henson
671c9e2dc8
oops, fix compilation errors in s_server
2012-10-11 18:03:42 +00:00
Dr. Stephen Henson
a70da5b3ec
New functions to check a hostname email or IP address against a
...
certificate. Add options to s_client, s_server and x509 utilities
to print results of checks.
2012-10-08 15:10:07 +00:00
Andy Polyakov
c5f6da54fc
Add SPARC T4 AES support.
...
Submitted by: David Miller
2012-10-06 18:08:09 +00:00
Bodo Möller
f11d0c7908
Fix EC_KEY initialization race.
...
Submitted by: Adam Langley
2012-10-05 20:50:11 +00:00
Dr. Stephen Henson
323fa64559
If OPENSSL_SSL_DEBUG_BROKEN_PROTOCOL is set allow the use of "SCSV" as
...
a ciphersuite to position the SCSV value in different places for testing
purposes.
2012-09-30 12:39:27 +00:00
Andy Polyakov
3ed6e22771
sha[1|512]-sparcv9.pl: add hardware SPARC T4 support.
...
Submitted by: David Miller
2012-09-28 09:35:39 +00:00
Andy Polyakov
e66055b8f7
md5-sparcv9.pl: add hardware SPARC T4 support.
...
Submitted by: David Miller
2012-09-28 09:34:09 +00:00
Andy Polyakov
b460c8f896
sparc_arch.h: add assembler helpers (and make it work on Solaris).
...
Submitted by: David Miller
2012-09-28 09:31:40 +00:00
Andy Polyakov
27e0c86307
md5-sparcv9.pl: more accurate performance result.
2012-09-28 09:25:49 +00:00
Bodo Möller
7f429a5dbf
Fix Valgrind warning.
...
Submitted by: Adam Langley
2012-09-24 19:49:16 +00:00
Richard Levitte
c9d3ec6943
* Configure: make the debug-levitte-linux{elf,noasm} less extreme.
2012-09-24 18:48:37 +00:00
Andy Polyakov
e98c526b68
Add md5-sparcv9.pl.
2012-09-23 20:39:53 +00:00
Andy Polyakov
1fda639ae7
sparcv9cap.c: add SPARC-T4 feature detection.
...
Submitted by: David Miller
2012-09-23 20:29:03 +00:00
Richard Levitte
4d88fc8173
* ssl/t1_enc.c (tls1_change_cipher_state): Stupid bug. Fortunately in
...
debugging code that's seldom used.
2012-09-21 13:08:24 +00:00
Andy Polyakov
b8c5929130
config: detect linux-mips* targets.
2012-09-19 20:58:07 +00:00
Andy Polyakov
800a4a707d
Configure: allow for compiler options starting with double dash.
2012-09-18 12:54:35 +00:00
Andy Polyakov
5cc2159526
MIPS assembly pack: add support for SmartMIPS ASE.
2012-09-18 12:52:23 +00:00
Bodo Möller
6373af15d3
Fix warning.
...
Submitted by: Chromium Authors
2012-09-17 17:21:58 +00:00
Andy Polyakov
63d8834c26
Configure: add MIPS targets.
2012-09-15 11:21:50 +00:00
Andy Polyakov
8df5518bd9
MIPS assembly pack: add MIPS[32|64]R2 code.
2012-09-15 11:18:20 +00:00
Andy Polyakov
9b222748e7
aes-mips.pl: interleave load and integer instructions for better performance.
2012-09-15 11:15:02 +00:00
Andy Polyakov
17e820aec3
sha512-sparcv9.pl: fix binutils compilation error.
...
Submitted by: David Miller
2012-09-15 08:53:25 +00:00
Andy Polyakov
244ed51a0d
e_aes.c: uninitialized variable in aes_ccm_init_key.
...
PR: 2874
Submitted by: Tomas Mraz
2012-09-15 08:45:42 +00:00
Dr. Stephen Henson
4f3df8bea2
Add -rev test option to s_server to just reverse order of characters received
...
by client and send back to server. Also prints an abbreviated summary of
the connection parameters.
2012-09-14 13:27:05 +00:00
Dr. Stephen Henson
2a7cbe77b3
Add -brief option to s_client and s_server to summarise connection details.
...
New option -verify_quiet to shut up the verify callback unless there is
an error.
2012-09-12 23:14:28 +00:00
Dr. Stephen Henson
94a209d8e1
Add ctrl and utility functions to retrieve raw cipher list sent by client in
...
client hello message. Previously this could only be retrieved on an initial
connection and it was impossible to determine the cipher IDs of any uknown
ciphersuites.
2012-09-12 13:57:48 +00:00
Dr. Stephen Henson
24edfa9df9
enhance EC method to support setting curve type when generating keys and add parameter encoding option
2012-09-11 13:54:09 +00:00
Dr. Stephen Henson
0a17b8de06
fix memory leak
2012-09-11 13:43:57 +00:00
Dr. Stephen Henson
e5db9c3b67
Minor enhancement to PR#2836 fix. Instead of modifying SSL_get_certificate
...
change the current certificate (in s->cert->key) to the one used and then
SSL_get_certificate and SSL_get_privatekey will automatically work.
2012-09-11 13:34:08 +00:00
Ben Laurie
2daceb0342
Call OCSP Stapling callback after ciphersuite has been chosen, so the
...
right response is stapled. Also change SSL_get_certificate() so it
returns the certificate actually sent. See
http://rt.openssl.org/Ticket/Display.html?id=2836 .
2012-09-11 12:57:46 +00:00
Dr. Stephen Henson
147d4c96b0
fix memory leak
2012-09-09 21:19:32 +00:00
Dr. Stephen Henson
61d24f102d
update README
2012-09-09 20:47:36 +00:00
Dr. Stephen Henson
79b184fb4b
Extend certificate creation examples to include CRL generation and sample
...
scripts running the test OCSP responder.
2012-09-09 20:43:49 +00:00
Dr. Stephen Henson
648f551a4a
New -valid option to add a certificate to the ca index.txt that is valid and not revoked
2012-09-09 12:58:49 +00:00
Dr. Stephen Henson
33a8de69dc
new ctrl to retrive value of received temporary key in server key exchange message, print out details in s_client
2012-09-08 13:59:51 +00:00
Dr. Stephen Henson
319354eb6c
store and print out message digest peer signed with in TLS 1.2
2012-09-07 12:53:42 +00:00
Andy Polyakov
e7db9896bb
bsaes-armv7.pl: closest shave. While 0.3 cpb improvement on S4 appears
...
insignificant, it's actually 4 cycles less for 14 instructions sequence!
2012-09-07 12:29:18 +00:00
Andy Polyakov
4f16215b9d
bsaes-armv7.pl: even closer shave.
2012-09-04 14:39:05 +00:00
Andy Polyakov
a903e6919c
bsaes-armv7.pl: minor performance squeeze on Snapdragon S4.
2012-09-04 08:26:50 +00:00
Andy Polyakov
f26328c2f3
sha512-armv4.pl: optimize for Snapdragon S4.
2012-09-04 08:25:37 +00:00
Andy Polyakov
a58fdc7a34
bn_lcl.h: gcc removed support for "h" constraint, which broke inline
...
assembler.
2012-09-01 13:17:32 +00:00
Dr. Stephen Henson
d21bf10dea
Don't load GOST ENGINE if it is already loaded.
...
Multiple copies of the ENGINE will cause problems when it is cleaned up as
the methods are stored in static structures which will be overwritten and
freed up more than once.
Set static methods to NULL when the ENGINE is freed so it can be reloaded.
2012-09-01 11:30:53 +00:00
Dr. Stephen Henson
d47c01a31a
perform sanity checks on server certificate type as soon as it is received instead of waiting until server key exchange
2012-08-31 11:18:54 +00:00
Dr. Stephen Henson
ef6b34bec2
make EC test certificates usable for ECDH
2012-08-31 11:15:44 +00:00
Dr. Stephen Henson
becfdb995b
give more meaningful error if presented with wrong certificate type by server
2012-08-30 12:46:22 +00:00
Andy Polyakov
6206682a35
x86cpuid.pl: hide symbols [backport from x86_64].
2012-08-29 14:19:59 +00:00
Andy Polyakov
88d6b87fca
TABLE update addendum to commit#22775.
2012-08-29 14:15:18 +00:00
Andy Polyakov
0e1f390bad
Harmonize CHANGES in HEAD.
2012-08-29 14:14:05 +00:00
Andy Polyakov
be0d31b166
Add linux-x32 target.
2012-08-29 14:08:46 +00:00
Dr. Stephen Henson
ed83ba5321
Add compilation flag to disable certain protocol checks and allow use of
...
some invalid operations for testing purposes. Currently this can be used
to sign using digests the peer doesn't support, EC curves the peer
doesn't support and use certificates which don't match the type associated
with a ciphersuite.
2012-08-29 13:18:34 +00:00
Dr. Stephen Henson
81f57e5a69
oops, typo
2012-08-28 23:19:25 +00:00
Dr. Stephen Henson
1cf218bcaa
New compile time option OPENSSL_SSL_TRACE_CRYPTO, when set this passes
...
all derived keys to the message callback.
Add code to SSL_trace to include support for printing out keys.
2012-08-28 23:17:28 +00:00
Dr. Stephen Henson
093050b660
update debug-steve* configurations
2012-08-28 23:06:12 +00:00
Dr. Stephen Henson
0db17852cd
PR: 2786
...
Reported by: Tomas Mraz <tmraz@redhat.com >
Treat a NULL value passed to drbg_free_entropy callback as non-op. This
can happen if the call to fips_get_entropy fails.
2012-08-22 22:43:23 +00:00
Andy Polyakov
1a9d60d2e3
sha1-armv4-large.pl: comply with ABI.
2012-08-17 19:57:04 +00:00
Andy Polyakov
9a10ea3fc0
Configure: add mips-mont to MIPS32 builds.
2012-08-17 09:38:45 +00:00
Andy Polyakov
1a002d88ad
MIPS assembly pack: assign default value to $flavour.
2012-08-17 09:10:31 +00:00
Bodo Möller
619aab841c
Oops - didn't mean to change Makefile on previous submit
2012-08-16 13:49:34 +00:00
Bodo Möller
a4aafeeef4
Enable message names for TLS 1.1, 1.2 with -msg.
2012-08-16 13:41:40 +00:00
Dr. Stephen Henson
2ea8035460
Add three Suite B modes to TLS code, supporting RFC6460.
2012-08-15 15:15:05 +00:00
Andy Polyakov
5833e4f5d6
bss_dgram.c: fix compilation failure and warning on Windows with
...
contemporary SDK.
2012-08-14 09:53:24 +00:00
Andy Polyakov
99e59d634a
gosthash.c: use memmove in circle_xor8, as input pointers can be equal.
...
PR: 2858
2012-08-13 16:36:51 +00:00
Andy Polyakov
cb726fe8d4
./Configure: libcrypto.a can grow to many GB because of ar bug.
...
PR: 2838
2012-08-13 16:10:08 +00:00
Andy Polyakov
9ddd859d2a
gcm128.c: fix AAD-only case with AAD length not divisible by 16.
...
PR: 2859
Submitted by: John Foley
2012-08-13 15:07:37 +00:00
Andy Polyakov
f6ff1aa8e0
sha512-x86_64.pl: revert previous change and solve the problem through
...
perlasm/x86_64-xlate.pl instead.
2012-08-13 12:34:36 +00:00
Andy Polyakov
3a5485a9f8
sha512-x86_64.pl: minimum gas requirement for AMD XOP.
2012-08-13 11:01:44 +00:00
Dr. Stephen Henson
9053c139fd
update ordinals
2012-08-05 18:14:21 +00:00
Dr. Stephen Henson
3b0648ebc9
Rename Suite B functions for consistency.
...
New function X509_chain_up_ref to dup and up the reference count of
a STACK_OF(X509): replace equivalent functionality in several places
by the equivalent call.
2012-08-03 15:58:15 +00:00
Dr. Stephen Henson
3ad344a517
add suite B chain validation flags and associated verify errors
2012-08-03 13:51:43 +00:00
Dr. Stephen Henson
6dbb6219e7
Make tls1_check_chain return a set of flags indicating checks passed
...
by a certificate chain. Add additional tests to handle client
certificates: checks for matching certificate type and issuer name
comparison.
Print out results of checks for each candidate chain tested in
s_server/s_client.
2012-07-27 13:39:23 +00:00
Dr. Stephen Henson
ec4a50b3c3
Abort handshake if signature algorithm used not supported by peer.
2012-07-24 18:11:27 +00:00
Dr. Stephen Henson
d18b716d25
check EC tmp key matches preferences
2012-07-24 13:47:40 +00:00
Dr. Stephen Henson
1e4cb467e1
typo
2012-07-24 13:32:40 +00:00
Dr. Stephen Henson
74ecfab401
Add support for certificate stores in CERT structure. This makes it
...
possible to have different stores per SSL structure or one store in
the parent SSL_CTX. Include distint stores for certificate chain
verification and chain building. New ctrl SSL_CTRL_BUILD_CERT_CHAIN
to build and store a certificate chain in CERT structure: returing
an error if the chain cannot be built: this will allow applications
to test if a chain is correctly configured.
Note: if the CERT based stores are not set then the parent SSL_CTX
store is used to retain compatibility with existing behaviour.
2012-07-23 23:34:28 +00:00
Dr. Stephen Henson
5818a07a4f
update NEWS
2012-07-20 15:24:06 +00:00
Dr. Stephen Henson
050ce4ca42
set ciphers to NULL before calling cert_cb
2012-07-20 15:21:23 +00:00
Dr. Stephen Henson
8e2a06bf5c
stop warning
2012-07-19 16:57:19 +00:00
Dr. Stephen Henson
a1644902eb
add ssl_locl.h to err header files, rebuild ssl error strings
2012-07-19 14:45:36 +00:00
Dr. Stephen Henson
bff9ce4db3
Don't ignore (\!) reference count in X509_STORE_free
2012-07-19 12:44:09 +00:00
Dr. Stephen Henson
b7bfe69b66
New function ssl_set_client_disabled to set masks for any ciphersuites
...
that are disabled for this session (as opposed to always disabled by
configuration).
2012-07-18 14:09:46 +00:00
Dr. Stephen Henson
5180f57c65
reinclude crypto.h: this is needed in HEAD only to get the __fips_constseg definition
2012-07-18 14:07:50 +00:00
Dr. Stephen Henson
63fe4ee14c
update trace messages
2012-07-18 13:53:56 +00:00
Andy Polyakov
69f45c520c
sha1-[586|x86_64].pl: shave off one instruction from body_40_59, it's
...
2% less instructions in SIMD code paths, so 2% improvement in average:-)
2012-07-15 20:33:30 +00:00
Andy Polyakov
7bb98eee3c
mk1mf.pl: replace chop to make it work in mixture of perls for Windows.
2012-07-15 13:40:04 +00:00
Andy Polyakov
799379215e
test_aesni: harmonize with AES-NI support at EVP layer.
2012-07-15 13:38:51 +00:00
Andy Polyakov
701d593f70
wp-x86_64.pl: ~10% performance improvement.
2012-07-15 13:37:35 +00:00
Andy Polyakov
ee923b4cef
sha512-s390x.pl: lingering comment update.
2012-07-15 13:36:57 +00:00
Andy Polyakov
46a2b3387a
sha512-ia64.pl: 15-20% performance improvement.
2012-07-15 13:36:25 +00:00
Andy Polyakov
e09039c01c
sha256-armv4.pl: 4% performance improvement.
2012-07-15 13:35:10 +00:00
Andy Polyakov
da3bd2779d
sha1-s390x.pl: lingering comment update.
2012-07-15 13:34:26 +00:00
Andy Polyakov
b046d70676
rc5.h: stop wasting space on 64-bit platforms [breaks binary compatibility!].
2012-07-15 13:33:05 +00:00
Andy Polyakov
ae007d4d09
wp-mmx.pl: ~10% performance improvement.
2012-07-15 13:29:23 +00:00
Andy Polyakov
660164a9ed
sha512-586.pl: optimize SSE2 code path, +5-7% on most CPUs, +13% on AMD K8.
2012-07-15 13:28:15 +00:00
Andy Polyakov
367b126491
sha1-586.pl: let masm compile AVX code.
2012-07-15 13:25:31 +00:00
Andy Polyakov
ac82e51f57
x86gas.pl: treat OPENSSL_ia32cap_P accordingly to .hidden status.
2012-07-15 13:24:43 +00:00
Dr. Stephen Henson
9f27b1eec3
Add new ctrl to retrieve client certificate types, print out
...
details in s_client.
Also add ctrl to set client certificate types. If not used sensible values
will be included based on supported signature algorithms: for example if
we don't include any DSA signing algorithms the DSA certificate type is
omitted.
Fix restriction in old code where certificate types would be truncated
if it exceeded TLS_CT_NUMBER.
2012-07-08 14:22:45 +00:00
Richard Levitte
9fd603be07
Install srtp.h
2012-07-05 13:20:19 +00:00
Richard Levitte
bec44866f1
Add d1_srtp and t1_trce.
2012-07-05 13:20:02 +00:00
Richard Levitte
5dbf4f42fb
Add the missing modules for Camellia, as well as dh_rfc5114 and evp_cnf.
2012-07-05 13:19:06 +00:00
Richard Levitte
c58de759c8
Harmonise symhacks.h in this branch with lower versions.
...
Add aliases for SSL_CTX_set_not_resumable_session_callback and
SSL_set_not_resumable_session_callback on top of that.
2012-07-05 13:17:44 +00:00
Dr. Stephen Henson
44488723de
add missing evp_cnf.c file
2012-07-04 13:15:10 +00:00
Dr. Stephen Henson
ea1d84358b
PR: 2840
...
Reported by: David McCullough <david_mccullough@mcafee.com >
Restore fips configuration module from 0.9.8.
2012-07-03 20:30:40 +00:00
Dr. Stephen Henson
dd25165968
Fix memory leak.
...
Always perform nexproto callback argument initialisation in s_server
otherwise we use uninitialised data if -nocert is specified.
2012-07-03 16:37:50 +00:00
Dr. Stephen Henson
657e29c199
cert_flags is unsigned
2012-07-03 14:54:59 +00:00
Dr. Stephen Henson
3208fc59db
add support for client certificate callbak, fix memory leak
2012-07-03 14:53:27 +00:00
Dr. Stephen Henson
87adf1fa96
new function SSL_is_server to which returns 1 is the corresponding SSL context is for a server
2012-07-03 14:25:17 +00:00
Dr. Stephen Henson
15a70fe510
no need to check s->server as default_nid is never used for TLS 1.2 client authentication
2012-07-03 14:24:33 +00:00
Dr. Stephen Henson
3dbc46dfcd
Separate client and server permitted signature algorithm support: by default
...
the permitted signature algorithms for server and client authentication
are the same but it is now possible to set different algorithms for client
authentication only.
2012-07-03 12:51:14 +00:00
Andy Polyakov
32e03a3016
bn_nist.c: compensate for VC bug [with optimization off!].
...
PR: 2837
2012-07-02 13:30:32 +00:00
Andy Polyakov
8d00f34239
crypto/bn/*.h: move PTR_SIZE_INT to private header.
2012-07-02 13:27:30 +00:00
Dr. Stephen Henson
df53820170
remove unnecessary attempt to automatically call OPENSSL_init
2012-07-01 22:25:04 +00:00
Dr. Stephen Henson
c65c5d05fd
Fix Win32 build.
2012-07-01 22:14:32 +00:00
Dr. Stephen Henson
8fdb4f1af3
recognise OPENSSL_NO_SSL_TRACE
2012-07-01 22:12:03 +00:00
Andy Polyakov
ae432028d1
bss_dgram.c: fix typos in Windows code.
2012-07-01 09:11:47 +00:00
Andy Polyakov
2dce10c56d
sha256-586.pl: fix typos.
2012-07-01 08:46:38 +00:00
Dr. Stephen Henson
18d7158809
Add certificate callback. If set this is called whenever a certificate
...
is required by client or server. An application can decide which
certificate chain to present based on arbitrary criteria: for example
supported signature algorithms. Add very simple example to s_server.
This fixes many of the problems and restrictions of the existing client
certificate callback: for example you can now clear existing certificates
and specify the whole chain.
2012-06-29 14:24:42 +00:00
Dr. Stephen Henson
0f39bab0df
Function tls1_check_ec_server_key is now redundant as we make
...
appropriate checks in tls1_check_chain.
2012-06-28 13:02:14 +00:00
Dr. Stephen Henson
d61ff83be9
Add new "valid_flags" field to CERT_PKEY structure which determines what
...
the certificate can be used for (if anything). Set valid_flags field
in new tls1_check_chain function. Simplify ssl_set_cert_masks which used
to have similar checks in it.
Add new "cert_flags" field to CERT structure and include a "strict mode".
This enforces some TLS certificate requirements (such as only permitting
certificate signature algorithms contained in the supported algorithms
extension) which some implementations ignore: this option should be used
with caution as it could cause interoperability issues.
2012-06-28 12:45:49 +00:00
Dr. Stephen Henson
be681e123c
don't use pseudo digests for default values of keys
2012-06-27 14:12:47 +00:00
Andy Polyakov
6251989eb6
x86_64 assembly pack: make it possible to compile with Perl located on
...
path with spaces.
PR: 2835
2012-06-27 10:08:23 +00:00
Andy Polyakov
faee82c1bc
sha512-x86_64.pl: fix typo.
2012-06-25 17:13:15 +00:00
Dr. Stephen Henson
4453cd8c73
Reorganise supported signature algorithm extension processing.
...
Only store encoded versions of peer and configured signature algorithms.
Determine shared signature algorithms and cache the result along with NID
equivalents of each algorithm.
2012-06-25 14:32:30 +00:00
Andy Polyakov
a8f3b8b519
sha512-x86_64.pl: add SIMD code paths.
2012-06-24 19:22:06 +00:00
Dr. Stephen Henson
0f229cce65
Add support for application defined signature algorithms for use with
...
TLS v1.2. These are sent as an extension for clients and during a certificate
request for servers.
TODO: add support for shared signature algorithms, respect shared algorithms
when deciding which ciphersuites and certificates to permit.
2012-06-22 14:03:31 +00:00
Dr. Stephen Henson
020091406c
oops, add -debug_decrypt option which was accidenatally left out
2012-06-19 13:39:30 +00:00
Andy Polyakov
ad880dc469
sha512-x86_64.pl: fix typo.
2012-06-19 07:50:10 +00:00
Andy Polyakov
42a36658c1
sha256-586.pl: fix linking error.
2012-06-19 07:49:36 +00:00
Dr. Stephen Henson
c4ff5d1147
fix clashing error code
2012-06-18 13:11:09 +00:00
Dr. Stephen Henson
a5ee80b910
Make it possible to delete all certificates from an SSL structure.
2012-06-18 12:56:59 +00:00
Dr. Stephen Henson
93ab9e421e
Initial record tracing code. Print out all fields in SSL/TLS records
...
for debugging purposes. Needs "enable-ssl-trace" configuration option.
2012-06-15 12:46:09 +00:00
Dr. Stephen Henson
dfcf48f499
New functions to retrieve certificate signatures and signature OID NID.
2012-06-13 13:08:12 +00:00
Andy Polyakov
0bf8f110e0
sha256t.c: make sure unrolled loop is tested.
2012-06-12 14:40:41 +00:00
Andy Polyakov
f3eac74bc5
sha256-586.pl: add AVX and XOP code paths.
2012-06-12 14:40:11 +00:00
Andy Polyakov
3a9b3852c6
sha256-586.pl: squeeze some more, most notably ~10% on Nehalem.
2012-06-12 14:38:01 +00:00
Andy Polyakov
d2e1803197
x86[_64] assembly pack: update benchmark results.
2012-06-12 14:18:21 +00:00
Dr. Stephen Henson
4b9e0b5f74
print out issuer and subject unique identifier fields in certificates
2012-06-12 13:41:18 +00:00
Andy Polyakov
447e1319b1
bss_dgram.c: add BIO_CTRL_DGRAM_SET_DONT_FRAG.
...
PR: 2830
Submitted by: Robin Seggelmann
2012-06-11 14:56:25 +00:00
Andy Polyakov
e77ec2ba6f
bss_dgram.c: make getsockopt work in cases when optlen is 64-bit value.
2012-06-11 14:27:56 +00:00
Ben Laurie
195b9eeeed
Fix memory leak.
2012-06-11 09:23:55 +00:00
Andy Polyakov
80c42f3e0c
b_sock.c: make getsockopt work in cases when optlen is 64-bit value.
2012-06-11 08:52:11 +00:00
Ben Laurie
7a71af86ce
Rearrange and test authz extension.
2012-06-07 13:20:47 +00:00
Ben Laurie
32e62d1cc4
Fix memory leak.
2012-06-06 13:03:42 +00:00
Ben Laurie
aeda172afd
Parse authz correctly.
2012-06-06 12:52:19 +00:00
Andy Polyakov
8d1b199d26
Revert random changes from commit#22606.
2012-06-04 22:12:10 +00:00
Ben Laurie
71fa451343
Version skew reduction: trivia (I hope).
2012-06-03 22:00:21 +00:00
Ben Laurie
a9e1c50bb0
RFC 5878 support.
2012-05-30 10:10:58 +00:00
Ben Laurie
03c1d9f99d
Build on FreeBSD with gcc 4.6.
2012-05-30 09:34:44 +00:00
Andy Polyakov
f889bb0384
sha256-586.pl: full unroll to deliver additional ~16%, add Sandy Bridge-
...
specific code path.
2012-05-28 17:50:57 +00:00
Andy Polyakov
83698d3191
sha512-x86_64.pl: >5% better performance.
2012-05-28 17:47:15 +00:00
Andy Polyakov
6a40ebe86b
aesni-x86_64.pl: make it possibel to use in Linux kernel.
2012-05-24 07:39:44 +00:00
Andy Polyakov
d4bb6bddf8
sha256-586.pl: tune away regression on Nehalem core and incidentally
...
improve performance on Atom and P4.
2012-05-24 07:39:04 +00:00
Andy Polyakov
ee9bf3eb6c
sha256-586.pl optimization.
2012-05-19 10:10:30 +00:00
Andy Polyakov
41409651be
s2_clnt.c: compensate for compiler bug.
2012-05-16 12:47:36 +00:00
Andy Polyakov
fd05495748
ppccap.c: assume no features under 32-bit AIX kernel.
...
PR: 2810
2012-05-16 12:42:32 +00:00
Dr. Stephen Henson
4242a090c7
PR: 2813
...
Reported by: Constantine Sapuntzakis <csapuntz@gmail.com >
Fix possible deadlock when decoding public keys.
2012-05-11 13:53:37 +00:00
Dr. Stephen Henson
c3b1303387
PR: 2811
...
Reported by: Phil Pennock <openssl-dev@spodhuis.org >
Make renegotiation work for TLS 1.2, 1.1 by not using a lower record
version client hello workaround if renegotiating.
2012-05-11 13:34:29 +00:00
Ben Laurie
5762f7778d
Fix warning.
2012-05-10 20:29:00 +00:00
Ben Laurie
7a412ded50
Padlock doesn't build. I don't even know what it is.
2012-05-10 20:28:02 +00:00
Dr. Stephen Henson
efb19e1330
PR: 2806
...
Submitted by: PK <runningdoglackey@yahoo.com >
Correct ciphersuite signature algorithm definitions.
2012-05-10 18:25:39 +00:00
Dr. Stephen Henson
c46ecc3a55
Sanity check record length before skipping explicit IV in TLS 1.2, 1.1 and
...
DTLS to fix DoS attack.
Thanks to Codenomicon for discovering this issue using Fuzz-o-Matic
fuzzing as a service testing platform.
(CVE-2012-2333)
2012-05-10 16:03:52 +00:00
Dr. Stephen Henson
7388b43cae
update FAQ
2012-05-10 15:37:16 +00:00
Dr. Stephen Henson
225055c30b
Reported by: Solar Designer of Openwall
...
Make sure tkeylen is initialised properly when encrypting CMS messages.
2012-05-10 13:46:09 +00:00
Richard Levitte
e0311481b8
Correct environment variable is OPENSSL_ALLOW_PROXY_CERTS.
2012-05-04 10:43:15 +00:00
Andy Polyakov
f9c5e5d92e
perlasm: fix symptom-less bugs, missing semicolons and 'my' declarations.
2012-04-28 10:36:58 +00:00
Andy Polyakov
9474483ab7
ppccpuid.pl: branch hints in OPENSSL_cleanse impact small block performance
...
of digest algorithms, mosty SHA, on Power7. Mystery of century, why SHA,
why slower algorithm are affected more...
PR: 2794
Submitted by: Ashley Lai
2012-04-27 20:17:45 +00:00
Dr. Stephen Henson
a708609945
Don't try to use unvalidated composite ciphers in FIPS mode
2012-04-26 18:55:01 +00:00
Dr. Stephen Henson
a9e6c091d5
update NEWS
2012-04-26 11:13:30 +00:00
Dr. Stephen Henson
df5705442c
update FAQ
2012-04-26 11:10:24 +00:00
Andy Polyakov
a2b21191d9
CHANGES: clarify.
2012-04-26 07:33:26 +00:00
Andy Polyakov
396f8b71ac
CHANGES: fix typos and clarify.
2012-04-26 07:20:06 +00:00
Dr. Stephen Henson
43d5b4ff31
Change value of SSL_OP_NO_TLSv1_1 to avoid clash with SSL_OP_ALL and
...
OpenSSL 1.0.0. Add CHANGES entry noting the consequences.
2012-04-25 23:04:42 +00:00
Andy Polyakov
f2ad35821c
s23_clnt.c: ensure interoperability by maitaining client "version capability"
...
vector contiguous.
PR: 2802
2012-04-25 22:06:32 +00:00
Dr. Stephen Henson
09e4e4b98e
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr>
...
Reviewed by: steve
Improved localisation of TLS extension handling and code tidy.
2012-04-24 12:22:23 +00:00
Dr. Stephen Henson
ce33b42bc6
oops, not yet ;-)
2012-04-23 21:58:29 +00:00
Dr. Stephen Henson
579d553464
update NEWS
2012-04-23 21:56:33 +00:00
Andy Polyakov
71fa3bc5ec
objxref.pl: improve portability.
2012-04-22 21:18:30 +00:00
Dr. Stephen Henson
e2f53b675a
correct error code
2012-04-22 13:31:09 +00:00
Dr. Stephen Henson
797c61aa2d
check correctness of errors before updating them so we don't get bogus errors added
2012-04-22 13:25:51 +00:00
Dr. Stephen Henson
597dab0fa8
correct old FAQ answers
2012-04-22 13:20:28 +00:00
Dr. Stephen Henson
b36bab7812
PR: 2239
...
Submitted by: Dominik Oepen <oepen@informatik.hu-berlin.de >
Add Brainpool curves from RFC5639.
Original patch by Annie Yousar <a.yousar@informatik.hu-berlin.de >
2012-04-22 13:06:51 +00:00
Andy Polyakov
8ea92ddd13
e_rc4_hmac_md5.c: last commit was inappropriate for non-x86[_64] platforms.
...
PR: 2792
2012-04-19 20:38:05 +00:00
Dr. Stephen Henson
d9a9d10f4f
Check for potentially exploitable overflows in asn1_d2i_read_bio
...
BUF_mem_grow and BUF_mem_grow_clean. Refuse attempts to shrink buffer
in CRYPTO_realloc_clean.
Thanks to Tavis Ormandy, Google Security Team, for discovering this
issue and to Adam Langley <agl@chromium.org > for fixing it. (CVE-2012-2110)
2012-04-19 16:19:56 +00:00
Dr. Stephen Henson
0d2baadfb4
update FAQ
2012-04-19 12:33:23 +00:00
Andy Polyakov
dce1cc2a59
Makefile.org: clear yet another environment variable.
...
PR: 2793
2012-04-19 06:39:40 +00:00
Dr. Stephen Henson
b214184160
recognise X9.42 DH certificates on servers
2012-04-18 17:03:29 +00:00
Dr. Stephen Henson
aa09c2c631
correct error codes
2012-04-18 15:36:12 +00:00
Andy Polyakov
6dd9b0fc43
e_rc4_hmac_md5.c: harmonize zero-length fragment handling with
...
e_aes_cbc_hmac_sha1.c (mostly for aesthetic reasons).
2012-04-18 14:55:39 +00:00
Andy Polyakov
e36f6b9cfa
e_rc4_hmac_md5.c: oops, can't use rc4_hmac_md5_cipher on legacy Intel CPUs.
...
PR: 2792
2012-04-18 14:50:28 +00:00
Andy Polyakov
3e181369dd
C64x+ assembler pack. linux-c64xplus build is *not* tested nor can it be
...
tested, because kernel is not in shape to handle it *yet*. The code is
committed mostly to stimulate the kernel development.
2012-04-18 13:01:36 +00:00
Bodo Möller
d3ddf0228e
Disable SHA-2 ciphersuites in < TLS 1.2 connections.
...
(TLS 1.2 clients could end up negotiating these with an OpenSSL server
with TLS 1.2 disabled, which is problematic.)
Submitted by: Adam Langley
2012-04-17 15:23:03 +00:00
Dr. Stephen Henson
800e1cd969
Additional workaround for PR#2771
...
If OPENSSL_MAX_TLS1_2_CIPHER_LENGTH is set then limit the size of client
ciphersuites to this value. A value of 50 should be sufficient.
Document workarounds in CHANGES.
2012-04-17 15:12:09 +00:00
Dr. Stephen Henson
293706e72c
Partial workaround for PR#2771.
...
Some servers hang when presented with a client hello record length exceeding
255 bytes but will work with longer client hellos if the TLS record version
in client hello does not exceed TLS v1.0. Unfortunately this doesn't fix all
cases...
2012-04-17 13:21:19 +00:00
Andy Polyakov
4a1fbd13ee
OPENSSL_NO_SOCK fixes.
...
PR: 2791
Submitted by: Ben Noordhuis
2012-04-16 17:42:36 +00:00
Andy Polyakov
9eba5614fe
Minor compatibility fixes.
...
PR: 2790
Submitted by: Alexei Khlebnikov
2012-04-16 17:35:30 +00:00
Andy Polyakov
3b1fb1a022
s3_srvr.c: fix typo.
...
PR: 2538
2012-04-15 17:22:57 +00:00
Andy Polyakov
fc90e42c86
e_aes_cbc_hmac_sha1.c: handle zero-length payload and engage empty frag
...
countermeasure.
PR: 2778
2012-04-15 14:14:22 +00:00
Andy Polyakov
26e6bac143
ghash-s390x.pl: fix typo [that can induce SEGV in 31-bit build].
2012-04-12 06:44:34 +00:00
Dr. Stephen Henson
fc6fc7ff38
Add options to set additional type specific certificate chains to
...
s_server.
2012-04-11 16:53:11 +00:00
Dr. Stephen Henson
adfd95c2ac
use different variable for chain iteration
2012-04-11 16:01:08 +00:00
Dr. Stephen Henson
80eb43519e
fix reset fix
2012-04-11 15:05:07 +00:00
Dr. Stephen Henson
bbe0c8c5be
make reinitialisation work for CMAC
2012-04-11 12:26:41 +00:00
Dr. Stephen Henson
5a34fcd76e
update rather ancient EVP digest documentation
2012-04-10 22:28:01 +00:00
Andy Polyakov
b1fd0ccb38
aes-s390x.pl: fix crash in AES_set_decrypt_key in linux32-s390x build.
2012-04-09 15:12:13 +00:00
Dr. Stephen Henson
b2284ed34a
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr>
...
Localize client hello extension parsing in t1_lib.c
2012-04-06 11:18:40 +00:00
Dr. Stephen Henson
a43526302f
Add support for automatic ECDH temporary key parameter selection. When
...
enabled instead of requiring an application to hard code a (possibly
inappropriate) parameter set and delve into EC internals we just
automatically use the preferred curve.
2012-04-05 13:38:27 +00:00
Dr. Stephen Henson
2131ce570a
add FAQ about version numbers
2012-04-05 13:16:37 +00:00
Andy Polyakov
45cd45bbbc
aes-armv4.pl: make it more foolproof [inspired by aes-s390x.pl in 1.0.1].
2012-04-05 08:30:22 +00:00
Andy Polyakov
bc9583efa2
aes-s390x.pl: make it more foolproof [inspired by 1.0.1].
2012-04-05 08:22:09 +00:00
Andy Polyakov
a20152bdaf
ssl/ssl_ciph.c: interim solution for assertion in d1_pkt.c(444).
...
PR: 2778
2012-04-04 20:45:51 +00:00
Dr. Stephen Henson
fd2b65ce53
Tidy up EC parameter check code: instead of accessing internal structures
...
add utility functions to t1_lib.c to check if EC certificates and parameters
are consistent with peer.
2012-04-04 14:41:01 +00:00
Dr. Stephen Henson
263c62467d
Update ordinals.
2012-04-03 23:13:23 +00:00
Andy Polyakov
82c5ac4599
CHANGES: harmonize with 1.0.0 and 1.0.1.
2012-03-31 18:56:27 +00:00
Dr. Stephen Henson
94e9215fbc
PR: 2778(part)
...
Submitted by: John Fitzgibbon <john_fitzgibbon@yahoo.com >
Time is always encoded as 4 bytes, not sizeof(Time).
2012-03-31 18:03:02 +00:00
Andy Polyakov
f62f792057
modes_lcl.h: make it work on i386.
...
PR: 2780
2012-03-31 17:02:46 +00:00
Andy Polyakov
5db9645f1b
vpaes-x86[_64].pl: handle zero length in vpaes_cbc_encrypt.
...
PR: 2775
2012-03-31 16:53:34 +00:00
Andy Polyakov
86963f40f8
util/cygwin.sh update.
...
PR: 2761
Submitted by: Corinna Vinschen
2012-03-31 11:06:46 +00:00
Dr. Stephen Henson
d3379de5a9
don't shadow
2012-03-30 15:43:32 +00:00
Andy Polyakov
4736eab947
bn/bn_gf2m.c: make new BN_GF2m_mod_inv work with BN_DEBUG_RAND.
2012-03-29 21:35:28 +00:00
Andy Polyakov
23a05fa0c1
modes/gcm128.c: fix self-test.
2012-03-29 18:25:38 +00:00
Andy Polyakov
482a7d80cf
sha512-armv4.pl: optimize NEON code path by utilizing vbsl, bitwise select.
2012-03-29 18:20:11 +00:00
Andy Polyakov
ee743dca53
perlasm/x86masm.pl: fix last fix.
2012-03-29 18:09:36 +00:00
Andy Polyakov
6da165c631
ans1/tasn_prn.c: avoid bool in variable names.
...
PR: 2776
2012-03-29 17:48:19 +00:00
Dr. Stephen Henson
d0595f170c
Initial revision of ECC extension handling.
...
Tidy some code up.
Don't allocate a structure to handle ECC extensions when it is used for
default values.
Make supported curves configurable.
Add ctrls to retrieve shared curves: not fully integrated with rest of
ECC code yet.
2012-03-28 15:05:04 +00:00
Dr. Stephen Henson
751e26cb9b
fix leak
2012-03-22 16:28:07 +00:00
Dr. Stephen Henson
f404acfa2c
Submitted by: Markus Friedl <mfriedl@gmail.com>
...
Fix memory leaks in 'goto err' cases.
2012-03-22 15:44:51 +00:00
Dr. Stephen Henson
7744ef1ada
use client version when deciding whether to send supported signature algorithms extension
2012-03-21 21:33:23 +00:00
Andy Polyakov
ed998634cd
e_padlock-x86[_64].pl: better understanding of prefetch errata and proper
...
workaround.
2012-03-19 20:23:32 +00:00
Andy Polyakov
884c580e05
eng_all.c: revert previous "disable Padlock" commit, which was unjustified.
2012-03-19 20:20:41 +00:00
Dr. Stephen Henson
bbbe61c958
Always use SSLv23_{client,server}_method in s_client.c and s_server.c,
...
the old code came from SSLeay days before TLS was even supported.
2012-03-18 18:16:46 +00:00
Andy Polyakov
df27a35137
vpaes-x86_64.pl: out-of-date Apple assembler fails to calculate
...
distance between local labels.
PR: 2762
2012-03-17 16:06:31 +00:00
Andy Polyakov
f9ef874a21
bsaes-x86_64.pl: optimize key conversion.
2012-03-16 21:44:19 +00:00
Andy Polyakov
442c9f13d4
bsaes-armv7.pl: optmize Sbox and key conversion.
2012-03-16 21:41:48 +00:00
Dr. Stephen Henson
156421a2af
oops, revert unrelated patches
2012-03-14 13:46:50 +00:00
Dr. Stephen Henson
61ad8262a0
update FAQ, NEWS
2012-03-14 13:44:57 +00:00
Andy Polyakov
5c88dcca5b
ghash-x86.pl: omit unreferenced rem_8bit from no-sse2 build.
2012-03-13 19:43:42 +00:00
Andy Polyakov
d2add2efaa
ssl/t1_enc.c: pay attention to EVP_CIPH_FLAG_CUSTOM_CIPHER.
2012-03-13 19:20:55 +00:00
Andy Polyakov
b2ae61ecf2
x86_64-xlate.pl: remove old kludge.
...
PR: 2435,2440
2012-03-13 19:19:08 +00:00
Dr. Stephen Henson
78dfd43955
corrected fix to PR#2711 and also cover mime_param_cmp
2012-03-12 16:32:19 +00:00
Dr. Stephen Henson
146b52edd1
Fix for CMS/PKCS7 MMA. If RSA decryption fails use a random key and
...
continue with symmetric decryption process to avoid leaking timing
information to an attacker.
Thanks to Ivan Nestlerode <inestlerode@us.ibm.com > for discovering
this issue. (CVE-2012-0884)
2012-03-12 16:31:39 +00:00
Dr. Stephen Henson
13747c6fda
update NEWS
2012-03-12 16:23:00 +00:00
Dr. Stephen Henson
174b07be93
PR: 2744
...
Submitted by: Dmitry Belyavsky <beldmit@gmail.com >
CMS support for ccgost engine
2012-03-11 13:40:17 +00:00
Dr. Stephen Henson
15a40af2ed
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr>
...
Add more extension names in s_cb.c extension printing code.
2012-03-09 18:38:35 +00:00
Dr. Stephen Henson
ea6e386008
PR: 2756
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix DTLS timeout handling.
2012-03-09 15:52:33 +00:00
Dr. Stephen Henson
34b61f5a25
check return value of BIO_write in PKCS7_decrypt
2012-03-08 14:10:23 +00:00
Dr. Stephen Henson
e7f8ff4382
New ctrls to retrieve supported signature algorithms and curves and
...
extensions to s_client and s_server to print out retrieved valued.
Extend CERT structure to cache supported signature algorithm data.
2012-03-06 14:28:21 +00:00
Dr. Stephen Henson
62b6948a27
PR: 2755
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reduce MTU after failed transmissions.
2012-03-06 13:47:43 +00:00
Dr. Stephen Henson
0fbf8b9cea
PR: 2748
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix possible DTLS timer deadlock.
2012-03-06 13:26:15 +00:00
Dr. Stephen Henson
d895f7f060
don't do loop check for single self signed certificate
2012-03-05 15:48:13 +00:00
Andy Polyakov
ce0ed3b778
Configure: make no-whirlpool work.
2012-03-03 13:17:47 +00:00
Andy Polyakov
358c372d16
bsaes-armv7.pl: change preferred contact.
2012-03-03 13:04:53 +00:00
Andy Polyakov
c4a52a6dca
Add bit-sliced AES for ARM NEON. This initial version is effectively
...
reference implementation, it does not interface to OpenSSL yet.
2012-03-03 12:33:28 +00:00
Dr. Stephen Henson
797a2a102d
PR: 2743
...
Reported by: Dmitry Belyavsky <beldmit@gmail.com >
Fix memory leak if invalid GOST MAC key given.
2012-02-29 14:13:00 +00:00
Dr. Stephen Henson
3c6a7cd44b
PR: 2742
...
Reported by: Dmitry Belyavsky <beldmit@gmail.com >
If resigning with detached content in CMS just copy data across.
2012-02-29 14:02:02 +00:00
Dr. Stephen Henson
dc4f678cdc
Fix memory leak cause by race condition when creating public keys.
...
Thanks to Ivan Nestlerode <inestlerode@us.ibm.com > for reporting this bug.
2012-02-28 14:47:02 +00:00
Andy Polyakov
0f2ece872d
x86cpuid.pl: fix processor capability detection on pre-586.
2012-02-28 14:20:21 +00:00
Dr. Stephen Henson
68a7b5ae1e
PR: 2736
...
Reported by: Remi Gacogne <rgacogne-bugs@coredump.fr >
Preserve unused bits value in non-canonicalised ASN1_STRING structures
by using ASN1_STRING_copy which preseves flags.
2012-02-27 18:45:28 +00:00
Dr. Stephen Henson
161c9b4262
PR: 2737
...
Submitted by: Remi Gacogne <rgacogne-bugs@coredump.fr >
Fix double free in PKCS12_parse if we run out of memory.
2012-02-27 16:46:34 +00:00
Dr. Stephen Henson
57cb030cea
PR: 2739
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix padding bugs in Heartbeat support.
2012-02-27 16:38:24 +00:00
Dr. Stephen Henson
d441e6d8db
PR: 2735
...
Make cryptodev digests work. Thanks to Nikos Mavrogiannopoulos for
this fix.
2012-02-27 16:33:34 +00:00
Dr. Stephen Henson
228a8599ff
free headers after use in error message
2012-02-27 16:27:17 +00:00
Dr. Stephen Henson
d16bb406d4
Detect symmetric crypto errors in PKCS7_decrypt.
...
Thanks to Ivan Nestlerode <inestlerode@us.ibm.com > for reporting this bug.
2012-02-27 15:22:41 +00:00
Andy Polyakov
f7ef20c5ee
Configure: I remove adding of -D_XPG4_2 -D__EXTENSIONS__ in sctp builds for
...
following reasons:
- it's not the way to engage XPG4v2 mode, defining _XOPEN_SOURCE to
value less than 500 is (see standards(5));
- we need to work out strategy to handle _XOPEN_SOURCE, current state
when we define e.g. _XOPEN_SOURCE to 500 in some files is inappropriate;
- sctp implementation on Solaris is incomplete, in sense that bss_dgram.c
doesn't compile, because not all structures are defined, so that
enabling sctp doesn't work anyway;
2012-02-26 22:02:59 +00:00
Andy Polyakov
d0e68a98c5
seed.c: incredibly enough seed.c can fail to compile on Solaris with certain
...
flags, because SS is defined after inclusion of <stdlib.h>, in <sys/regset.h>
2012-02-26 21:52:43 +00:00
Dr. Stephen Henson
a36fb72584
PR: 2730
...
Submitted by: Arpadffy Zoltan <Zoltan.Arpadffy@scientificgames.se >
VMS fixes: disable SCTP by default.
2012-02-25 17:59:40 +00:00
Dr. Stephen Henson
8f27a92754
ABI fixes from 1.0.1-stable
2012-02-23 22:25:52 +00:00
Dr. Stephen Henson
6941b7b918
PR: 2711
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Tolerate bad MIME headers in parser.
2012-02-23 21:50:44 +00:00
Dr. Stephen Henson
ef570cc869
PR: 2696
...
Submitted by: Rob Austein <sra@hactrn.net >
Fix inverted range problem in RFC3779 code.
Thanks to Andrew Chi for generating test cases for this bug.
2012-02-23 21:31:37 +00:00
Dr. Stephen Henson
4d3670fa50
PR: 2727
...
Submitted by: Bruce Stephens <bruce.stephens@isode.com >
Use same construct for EXHEADER in srp/Makefile as other makefiles to cope
with possibly empty EXHEADER.
2012-02-23 13:49:35 +00:00
Dr. Stephen Henson
5421196eca
ABI compliance fixes.
...
Move new structure fields to end of structures.
2012-02-22 15:39:54 +00:00
Dr. Stephen Henson
74b4b49494
SSL export fixes (from Adam Langley) [original from 1.0.1]
2012-02-22 15:06:56 +00:00
Dr. Stephen Henson
de2b5b7439
initialise i if n == 0
2012-02-22 15:03:44 +00:00
Dr. Stephen Henson
64095ce9d7
Add new APIs EC_curve_nist2nid and EC_curve_nid2nist which convert
...
between NIDs and the more common NIST names such as "P-256". Enhance
ecparam utility and ECC method to recognise the NIST names for curves.
2012-02-21 14:41:13 +00:00
Dr. Stephen Henson
206310c305
Fix bug in CVE-2011-4619: check we have really received a client hello
...
before rejecting multiple SGC restarts.
2012-02-16 15:26:04 +00:00
Dr. Stephen Henson
5863163732
Additional compatibility fix for MDC2 signature format.
...
Update RSA EVP_PKEY_METHOD to use the OCTET STRING form of MDC2 signature:
this will make all versions of MDC2 signature equivalent.
2012-02-15 14:27:25 +00:00
Dr. Stephen Henson
83cb7c4635
An incompatibility has always existed between the format used for RSA
...
signatures and MDC2 using EVP or RSA_sign. This has become more apparent
when the dgst utility in OpenSSL 1.0.0 and later switched to using the
EVP_DigestSign functions which call RSA_sign.
This means that the signature format OpenSSL 1.0.0 and later used with
dgst -sign and MDC2 is incompatible with previous versions.
Add detection in RSA_verify so either format works.
Note: MDC2 is disabled by default in OpenSSL and very rarely used in practice.
2012-02-15 14:04:00 +00:00
Dr. Stephen Henson
04296664e0
PR: 2713
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Move libraries that are not needed for dynamic linking to Libs.private in
the .pc files
2012-02-12 18:47:47 +00:00
Dr. Stephen Henson
fc7dae5229
PR: 2717
...
Submitted by: Tim Rice <tim@multitalents.net >
Make compilation work on OpenServer 5.0.7
2012-02-11 23:41:19 +00:00
Dr. Stephen Henson
be81f4dd81
PR: 2716
...
Submitted by: Adam Langley <agl@google.com >
Fix handling of exporter return value and use OpenSSL indentation in
s_client, s_server.
2012-02-11 23:20:53 +00:00
Dr. Stephen Henson
e626c77808
PR: 2703
...
Submitted by: Alexey Melnikov <alexey.melnikov@isode.com >
Fix some memory and resource leaks in CAPI ENGINE.
2012-02-11 23:13:10 +00:00
Dr. Stephen Henson
da2a5a79ef
PR: 2705
...
Submitted by: Alexey Melnikov <alexey.melnikov@isode.com >
Only create ex_data indices once for CAPI engine.
2012-02-11 23:08:08 +00:00
Dr. Stephen Henson
11eaec9ae4
Submitted by: Eric Rescorla <ekr@rtfm.com>
...
Further fixes for use_srtp extension.
2012-02-11 22:53:31 +00:00
Andy Polyakov
cbc0b0ec2d
apps/s_cb.c: recognized latest TLS version.
2012-02-11 13:30:47 +00:00
Dr. Stephen Henson
1df80b6561
PR: 2704
...
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr >
Fix srp extension.
2012-02-10 20:08:36 +00:00
Dr. Stephen Henson
3770b988c0
PR: 2710
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Check return codes for load_certs_crls.
2012-02-10 19:54:54 +00:00
Dr. Stephen Henson
9641be2aac
PR: 2714
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Make no-srp work.
2012-02-10 19:43:14 +00:00
Dr. Stephen Henson
f94cfe6a12
only cleanup ctx if we need to, save ctx flags when we do
2012-02-10 16:55:17 +00:00
Dr. Stephen Henson
7951c2699f
add fips blocking overrides to command line utilities
2012-02-10 16:47:40 +00:00
Dr. Stephen Henson
5997efca83
Submitted by: Eric Rescorla <ekr@rtfm.com>
...
Fix encoding of use_srtp extension to be compliant with RFC5764
2012-02-10 00:07:18 +00:00
Dr. Stephen Henson
57559471bf
oops, revert unrelated changes
2012-02-09 15:43:58 +00:00
Dr. Stephen Henson
f4e1169341
Modify client hello version when renegotiating to enhance interop with
...
some servers.
2012-02-09 15:42:10 +00:00
Dr. Stephen Henson
febec8ff23
typo
2012-02-02 19:18:24 +00:00
Andy Polyakov
0208ab2e3f
bn_nist.c: make new optimized code dependent on BN_LLONG.
2012-02-02 07:46:05 +00:00
Andy Polyakov
faed798c32
hpux-parisc2-*: engage assembler.
2012-02-02 07:41:29 +00:00
Dr. Stephen Henson
f71c6e52f7
Add support for distinct certificate chains per key type and per SSL
...
structure.
Before this the only way to add a custom chain was in the parent SSL_CTX
(which is shared by all key types and SSL structures) or rely on auto
chain building (which is performed on each handshake) from the trust store.
2012-01-31 14:00:10 +00:00
Dr. Stephen Henson
9ade64dedf
code tidy
2012-01-27 14:21:38 +00:00
Dr. Stephen Henson
c526ed410c
Revise ssl code to use a CERT_PKEY structure when outputting a
...
certificate chain instead of an X509 structure.
This makes it easier to enhance code in future and the chain
output functions have access to the CERT_PKEY structure being
used.
2012-01-26 16:00:34 +00:00
Dr. Stephen Henson
4379d0e457
Tidy/enhance certificate chain output code.
...
New function ssl_add_cert_chain which adds a certificate chain to
SSL internal BUF_MEM. Use this function in ssl3_output_cert_chain
and dtls1_output_cert_chain instead of partly duplicating code.
2012-01-26 15:47:32 +00:00
Dr. Stephen Henson
7568d15acd
allow key agreement for SSL/TLS certificates
2012-01-26 14:57:45 +00:00
Dr. Stephen Henson
08e4ea4884
initialise dh_clnt
2012-01-26 14:37:46 +00:00
Andy Polyakov
98909c1d5b
ghash-x86.pl: engage original MMX version in no-sse2 builds.
2012-01-25 17:56:08 +00:00
Dr. Stephen Henson
ccd395cbcc
add example for DH certificate generation
2012-01-25 16:33:39 +00:00
Dr. Stephen Henson
0d60939515
add support for use of fixed DH client certificates
2012-01-25 14:51:49 +00:00
Dr. Stephen Henson
2ff5ac55c5
oops revert debug change
2012-01-22 13:52:39 +00:00
Dr. Stephen Henson
1db5f356f5
return error if md is NULL
2012-01-22 13:12:14 +00:00
Andy Polyakov
e6903980af
x86_64-xlate.pl: proper solution for RT#2620.
2012-01-21 11:34:53 +00:00
Dr. Stephen Henson
855d29184e
Fix for DTLS DoS issue introduced by fix for CVE-2011-4109.
...
Thanks to Antonio Martin, Enterprise Secure Access Research and
Development, Cisco Systems, Inc. for discovering this bug and
preparing a fix. (CVE-2012-0050)
2012-01-18 18:15:27 +00:00
Dr. Stephen Henson
ac07bc8602
fix CHANGES entry
2012-01-17 14:20:32 +00:00
Dr. Stephen Henson
8e1dc4d7ca
Support for fixed DH ciphersuites.
...
The cipher definitions of these ciphersuites have been around since SSLeay
but were always disabled. Now OpenSSL supports DH certificates they can be
finally enabled.
Various additional changes were needed to make them work properly: many
unused fixed DH sections of code were untested.
2012-01-16 18:19:14 +00:00
Andy Polyakov
a985410d2d
cryptlib.c: sscanf warning.
2012-01-15 17:13:57 +00:00
Andy Polyakov
0ecedec82d
Fix OPNESSL vs. OPENSSL typos.
...
PR: 2613
Submitted by: Leena Heino
2012-01-15 13:39:10 +00:00
Dr. Stephen Henson
9bd20155ba
fix warning
2012-01-15 13:30:41 +00:00
Andy Polyakov
5d13669a2c
cryptlib.c: make even non-Windows builds "strtoull-agnostic".
2012-01-14 18:46:15 +00:00
Andy Polyakov
adb5a2694a
sha512-sparcv9.pl: work around V8+ warning.
2012-01-13 09:18:05 +00:00
Andy Polyakov
23b93b587b
aes-ppc.pl, sha512-ppc.pl: comply even with Embedded ABI specification
...
(most restrictive about r2 and r13 usage).
2012-01-13 09:16:52 +00:00
Andy Polyakov
a50bce82ec
Sanitize usage of <ctype.h> functions. It's important that characters
...
are passed zero-extended, not sign-extended.
PR: 2682
2012-01-12 16:21:35 +00:00
Andy Polyakov
713f49119f
ec_pmeth.c: fix typo in commentary.
...
PR: 2677
Submitted by: Annue Yousar
2012-01-12 13:22:51 +00:00
Andy Polyakov
677741f87a
doc/apps: formatting fixes.
...
PR: 2683
Submitted by: Annie Yousar
2012-01-11 21:58:19 +00:00
Andy Polyakov
5beb93e114
speed.c: typo in pkey_print_message.
...
PR: 2681
Submitted by: Annie Yousar
2012-01-11 21:48:31 +00:00
Andy Polyakov
62d7dd5ffd
ecdsa.pod: typo.
...
PR: 2678
Submitted by: Annie Yousar
2012-01-11 21:41:32 +00:00
Andy Polyakov
6e913f9901
asn1/t_x509.c: fix serial number print, harmonize with a_int.c.
...
PR: 2675
Submitted by: Annie Yousar
2012-01-11 21:12:22 +00:00
Andy Polyakov
e255024bf7
aes-sparcv9.pl: clean up regexp
...
PR: 2685
2012-01-11 15:30:53 +00:00
Dr. Stephen Henson
8fa397a6bc
fix warning (revert original patch)
2012-01-10 14:36:41 +00:00
Andy Polyakov
03cf7e784c
cmac.c: optimize make_kn and move zero_iv to const segment.
2012-01-06 13:19:16 +00:00
Andy Polyakov
ce0727f9bd
bn_nist.c: harmonize buf in BN_nist_mod_256 with other mod functions.
2012-01-06 13:17:47 +00:00
Bodo Möller
8e85545284
Update for 0.9.8s and 1.0.0f, and for 1.0.1 branch.
...
(While the 1.0.0f CHANGES entry on VOS PRNG seeding was missing
in HEAD, the actual code is here already.)
2012-01-05 13:48:55 +00:00
Bodo Möller
6620bf3444
Fix usage indentation
2012-01-05 13:16:30 +00:00
Bodo Möller
7bb1cc9505
Fix for builds without DTLS support.
...
Submitted by: Brian Carlstrom
2012-01-05 10:22:41 +00:00
Dr. Stephen Henson
59e68615ce
PR: 2671
...
Submitted by: steve
Update maximum message size for certifiate verify messages to support
4096 bit RSA keys again as TLS v1.2 messages is two bytes longer.
2012-01-05 00:28:43 +00:00
Dr. Stephen Henson
192540b522
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de>
...
Reviewed by: steve
Send fatal alert if heartbeat extension has an illegal value.
2012-01-05 00:23:17 +00:00
Dr. Stephen Henson
e2ca32fc2b
disable heartbeats if tlsext disabled
2012-01-05 00:07:46 +00:00
Dr. Stephen Henson
4d0bafb4ae
update CHANGES
2012-01-04 23:54:17 +00:00
Dr. Stephen Henson
e745572493
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de>, Michael Tuexen <tuexen@fh-muenster.de>
...
Reviewed by: steve
Fix for DTLS plaintext recovery attack discovered by Nadhem Alfardan and
Kenny Paterson.
2012-01-04 23:52:26 +00:00
Dr. Stephen Henson
27dfffd5b7
Clear bytes used for block padding of SSL 3.0 records. (CVE-2011-4576)
2012-01-04 23:16:15 +00:00
Dr. Stephen Henson
d0dc991c62
Only allow one SGC handshake restart for SSL/TLS. (CVE-2011-4619)
2012-01-04 23:15:51 +00:00
Dr. Stephen Henson
2ec0497f08
fix CHANGES
2012-01-04 23:10:44 +00:00
Dr. Stephen Henson
6bf896d9b1
Check GOST parameters are not NULL (CVE-2012-0027)
2012-01-04 23:03:40 +00:00
Dr. Stephen Henson
be71c37296
Prevent malformed RFC3779 data triggering an assertion failure (CVE-2011-4577)
2012-01-04 23:01:54 +00:00
Dr. Stephen Henson
0015572372
update FAQ
2012-01-04 20:05:58 +00:00
Dr. Stephen Henson
6074fb0979
fix warnings
2012-01-04 14:45:47 +00:00
Dr. Stephen Henson
25536ea6a7
Submitted by: Adam Langley <agl@chromium.org>
...
Reviewed by: steve
Fix memory leaks.
2012-01-04 14:25:42 +00:00
Dr. Stephen Henson
b3720c34e5
oops, revert wrong patch
2012-01-03 22:06:21 +00:00
Dr. Stephen Henson
5733919dbc
only send heartbeat extension from server if client sent one
2012-01-03 22:03:20 +00:00
Dr. Stephen Henson
b333905011
incomplete provisional OAEP CMS decrypt support
2012-01-02 18:25:37 +00:00
Dr. Stephen Henson
918fc30fa4
recognise HEARTBEATS in mkdef.pl script
2011-12-31 23:50:01 +00:00
Dr. Stephen Henson
0b9f5ef809
update CHANGES
2011-12-31 23:08:15 +00:00
Dr. Stephen Henson
4817504d06
PR: 2658
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Support for TLS/DTLS heartbeats.
2011-12-31 22:59:57 +00:00
Dr. Stephen Henson
84b6e277d4
make update
2011-12-27 14:46:03 +00:00
Dr. Stephen Henson
fa2c72e549
update default depflags
2011-12-27 14:45:32 +00:00
Dr. Stephen Henson
ffdfce8d14
fix error code
2011-12-27 14:40:21 +00:00
Dr. Stephen Henson
816e243a87
fix deprecated statement
2011-12-27 14:39:13 +00:00
Dr. Stephen Henson
c79f22c63a
PR: 1794
...
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr >
Reviewed by: steve
- remove some unncessary SSL_err and permit
an srp user callback to allow a worker to obtain
a user verifier.
- cleanup and comments in s_server and demonstration
for asynchronous srp user lookup
2011-12-27 14:21:45 +00:00
Dr. Stephen Henson
f3d781bb43
PR: 2326
...
Submitted by: Tianjie Mao <tjmao@tjmao.net >
Reviewed by: steve
Fix incorrect comma expressions and goto f_err as alert has been set.
2011-12-26 19:37:58 +00:00
Dr. Stephen Henson
995a6b10e1
recognise no-sctp
2011-12-25 14:59:52 +00:00
Dr. Stephen Henson
9ef562bcc6
recognise SCTP in mkdef.pl script
2011-12-25 14:46:15 +00:00
Dr. Stephen Henson
7e159e0133
PR: 2535
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Add SCTP support for DTLS (RFC 6083).
2011-12-25 14:45:15 +00:00
Dr. Stephen Henson
b9e1488865
typo
2011-12-23 15:03:03 +00:00
Dr. Stephen Henson
e43bfb2906
recognise DECLARE_PEM_write_const, update ordinals
2011-12-23 14:58:30 +00:00
Dr. Stephen Henson
9c52c3e07c
delete unimplemented function from header file, update ordinals
2011-12-23 14:09:30 +00:00
Dr. Stephen Henson
1394b29120
sync and update ordinals
2011-12-22 16:11:47 +00:00
Dr. Stephen Henson
b646fc409d
remove prototype for deleted SRP function
2011-12-22 16:05:02 +00:00
Dr. Stephen Henson
f9b0b45238
New ctrl values to clear or retrieve extra chain certs from an SSL_CTX.
...
New function to retrieve compression method from SSL_SESSION structure.
Delete SSL_SESSION_get_id_len and SSL_SESSION_get0_id functions
as they duplicate functionality of SSL_SESSION_get_id. Note: these functions
have never appeared in any release version of OpenSSL.
2011-12-22 15:14:32 +00:00
Dr. Stephen Henson
ad89bf7894
PR: 2563
...
Submitted by: Paul Green <Paul.Green@stratus.com >
Reviewed by: steve
Improved PRNG seeding for VOS.
2011-12-19 17:01:37 +00:00
Andy Polyakov
e75440d2c9
update CHANGES.
2011-12-19 14:48:49 +00:00
Dr. Stephen Henson
188c53f7e8
update CHANGES
2011-12-19 14:41:03 +00:00
Andy Polyakov
7aba22ba28
apps/speed.c: fix typo in last commit.
2011-12-19 14:33:09 +00:00
Andy Polyakov
bdba45957a
apps/speed.c: Cygwin alarm() fails sometimes.
...
PR: 2655
2011-12-15 22:30:03 +00:00
Andy Polyakov
0e1467a64c
vpaes-x86.pl: revert previous commit and solve the problem through x86masm.pl.
...
PR: 2657
2011-12-15 22:20:05 +00:00
Dr. Stephen Henson
f2fc30751e
PR: 1794
...
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr >
Reviewed by: steve
Remove unnecessary code for srp and to add some comments to
s_client.
- the callback to provide a user during client connect is
no longer necessary since rfc 5054 a connection attempt
with an srp cipher and no user is terminated when the
cipher is acceptable
- comments to indicate in s_client the (non-)usefulness of
th primalaty tests for non known group parameters.
2011-12-14 22:17:06 +00:00
Dr. Stephen Henson
1bfdb34f70
Add private keys and generation scripts for test certificates in apps
...
directory.
2011-12-14 22:14:47 +00:00
Andy Polyakov
405edfdcab
vpaes-x86.pl: portability fix.
...
PR: 2657
2011-12-14 21:29:32 +00:00
Ben Laurie
3c0ff9f939
Remove redundant TLS exporter.
2011-12-13 15:57:39 +00:00
Ben Laurie
b9ef708e40
Padlock engine doesn't build (the asm parts are not built for some reason),
...
so remove for now.
2011-12-13 15:56:40 +00:00
Ben Laurie
e166891e0d
Fix warning.
2011-12-13 15:55:35 +00:00
Ben Laurie
9a436c0f89
Back out redundant verification time change.
2011-12-13 15:00:43 +00:00
Ben Laurie
7fd5df6b12
Make it possible to set a time for verification.
2011-12-13 14:38:12 +00:00
Andy Polyakov
8c98b2591f
modexp512-x86_64.pl: Solaris protability fix.
...
PR: 2656
2011-12-12 15:10:14 +00:00
Dr. Stephen Henson
be16cc23c6
detect and use older PKITS data
2011-12-11 16:39:25 +00:00
Dr. Stephen Henson
4fa35e7336
Updates from fips2 branch: close streams in test utilities, use cofactor ECDH
...
add new key and signature generation tests to fips_test_suite.
2011-12-10 13:38:34 +00:00
Dr. Stephen Henson
a3a2e3a43d
add cofactor ECDH support from fips branch
2011-12-10 13:35:11 +00:00
Dr. Stephen Henson
67ef4f63f1
use different names for asm temp files to avoid problems on some platforms
2011-12-10 13:29:38 +00:00
Dr. Stephen Henson
3bfe583b8d
add commented out option to allow use of older PKITS data
2011-12-10 00:49:55 +00:00
Dr. Stephen Henson
627b044536
update CHANGES
2011-12-10 00:49:05 +00:00
Dr. Stephen Henson
16363c0165
implement -attime option as a verify parameter then it works with all relevant applications
2011-12-10 00:37:22 +00:00
Andy Polyakov
7ffa48ad38
perlasm/x86gas.pl: give a hand old assemblers assembling loop instruction.
2011-12-09 19:16:20 +00:00
Andy Polyakov
5711dd8eac
x86-mont.pl: fix bug in integer-only squaring path.
...
PR: 2648
2011-12-09 14:21:25 +00:00
Dr. Stephen Henson
990390ab52
Replace expired test server and client certificates with new ones.
2011-12-08 14:44:05 +00:00
Dr. Stephen Henson
2ca873e8d8
transparently handle X9.42 DH parameters
2011-12-07 12:44:03 +00:00
Dr. Stephen Henson
7a2362611f
fix error discrepancy
2011-12-07 12:28:40 +00:00
Dr. Stephen Henson
618eb125f0
Document RFC5114 "generation" options.
2011-12-07 00:42:22 +00:00
Dr. Stephen Henson
afb14cda8c
Initial experimental support for X9.42 DH parameter format to handle
...
RFC5114 parameters and X9.42 DH public and private keys.
2011-12-07 00:32:34 +00:00
Dr. Stephen Henson
df0cdf4ceb
The default CN prompt message can be confusing when often the CN needs to
...
be the server FQDN: change it.
[Reported by PSW Group]
2011-12-06 00:00:30 +00:00
Bodo Möller
19b0d0e75b
Resolve a stack set-up race condition (if the list of compression
...
methods isn't presorted, it will be sorted on first read).
Submitted by: Adam Langley
2011-12-02 12:52:00 +00:00
Bodo Möller
ea8c77a55b
Fix ecdsatest.c.
...
Submitted by: Emilia Kasper
2011-12-02 12:41:17 +00:00
Bodo Möller
a7c71d8955
Update HEAD CHANGES file.
2011-12-02 12:28:20 +00:00
Bodo Möller
390c579568
Fix BIO_f_buffer().
...
Submitted by: Adam Langley
Reviewed by: Bodo Moeller
2011-12-02 12:25:03 +00:00
Dr. Stephen Henson
0798170966
Update DH_check() to peform sensible checks when q parameter is present.
2011-12-01 17:27:36 +00:00
Dr. Stephen Henson
28ff14779e
Correct some parameter values.
2011-12-01 17:26:58 +00:00
Andy Polyakov
6600126825
bn/asm/mips.pl: fix typos.
2011-12-01 12:16:09 +00:00
Dr. Stephen Henson
f6c0bd641c
return error if counter exceeds limit and seed value supplied
2011-11-25 16:03:42 +00:00
Dr. Stephen Henson
ea7fe214c4
check counter value against 4 * L, not 4096
2011-11-25 15:01:23 +00:00
Dr. Stephen Henson
ebba6c4895
PR: 1794
...
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr >
Reviewed by: steve
Make SRP conformant to rfc 5054.
Changes are:
- removal of the addition state after client hello
- removal of all pre-rfc srp alert ids
- sending a fatal alert when there is no srp extension but when the
server wants SRP
- removal of unnecessary code in the client.
2011-11-25 00:17:44 +00:00
Bodo Möller
6f31dd72d2
Fix NPN implementation for renegotiation.
...
(Problem pointed out by Ben Murphy.)
Submitted by: Adam Langley
2011-11-24 21:07:01 +00:00
Dr. Stephen Henson
4521eda739
sync and update ordinals
2011-11-22 14:46:09 +00:00
Dr. Stephen Henson
5b6aaac9e6
add cryptlib.h to mkdef.pl
2011-11-22 14:44:58 +00:00
Dr. Stephen Henson
8ce6421803
sync and update ordinals
2011-11-21 22:57:41 +00:00
Dr. Stephen Henson
2c3ee8ad80
add strp.h to mkdef.pl headers
2011-11-21 22:55:23 +00:00
Dr. Stephen Henson
1c78c43bd3
move internal functions to ssl_locl.h
2011-11-21 22:52:13 +00:00
Dr. Stephen Henson
21b52dd3eb
bcmp doesn't exist on all platforms, replace with memcmp
2011-11-21 22:28:29 +00:00
Andy Polyakov
d127ef78ad
bsaes-x86_64.pl: fix buffer overrun in tail processing.
2011-11-16 23:34:01 +00:00
Dr. Stephen Henson
d674bb4bc8
In EC_KEY_set_public_key_affine_coordinates include explicit check to see passed components do not exceed field order
2011-11-16 13:28:35 +00:00
Ben Laurie
e0af04056c
Add TLS exporter.
2011-11-15 23:50:52 +00:00
Ben Laurie
333f926d67
Add DTLS-SRTP.
2011-11-15 22:59:20 +00:00
Andy Polyakov
dce7f142a6
Configure: reimplement commit#21695.
2011-11-15 12:32:18 +00:00
Andy Polyakov
77aae9654f
Configure, e_aes.c: allow for XTS assembler implementation.
2011-11-15 12:18:40 +00:00
Ben Laurie
ae55176091
Fix some warnings caused by __owur. Temporarily (I hope) remove the more
...
aspirational __owur annotations.
2011-11-14 00:36:10 +00:00
Andy Polyakov
fe06864836
bsaes-x86_64.pl: add Win64 SEH and "hadrware" calls to aes-x86_64.pl.
2011-11-13 20:33:41 +00:00
Andy Polyakov
0985bd4f80
bn_nist.c: fix strict-aliasing compiler warning.
2011-11-13 17:31:03 +00:00
Dr. Stephen Henson
20bee9684d
Add RFC5114 DH parameters to OpenSSL. Add test data to dhtest.
2011-11-13 14:07:36 +00:00
Dr. Stephen Henson
0c58d22ad9
PR: 1794
...
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr >
Reviewed by: steve
Document unknown_psk_identify alert, remove pre-RFC 5054 string from
ssl_stat.c
2011-11-13 13:13:01 +00:00
Andy Polyakov
6a828b7a8e
rc4test.c: commit#21684 broke x86_64 shared Linux build. This is temporary
...
solution so that one can build rc4test...
2011-11-12 13:37:20 +00:00
Andy Polyakov
32268b183f
e_aes.c: additional sanity check in aes_xts_cipher.
2011-11-12 13:26:36 +00:00
Andy Polyakov
ff6f9f96fd
cryptlib.c, etc.: fix linker warnings in 64-bit Darwin build.
2011-11-12 13:10:00 +00:00
Andy Polyakov
4a5397fb68
Configure, x86gas.pl: fix linker warnings in 32-bit Darwin build.
2011-11-12 12:16:11 +00:00
Andy Polyakov
f9542a4231
engines/: get rid of cvs warnings on MacOS X, proper clean in ccgost.
2011-11-12 12:13:13 +00:00
Andy Polyakov
acb2f06af1
Makefile.org: proper libclean on MacOS X.
2011-11-12 11:57:54 +00:00
Dr. Stephen Henson
33387d4a88
portability fix for some perl versions
2011-11-11 19:01:25 +00:00
Andy Polyakov
60d4e99cf3
bsaes-x86_64.pl: add bsaes_xts_[en|de]crypt.
2011-11-10 22:41:31 +00:00
Andy Polyakov
3c075bf07f
arm_arch.h: allow to specify __ARM_ARCH__ elsewhere.
2011-11-09 20:08:44 +00:00
Andy Polyakov
bdf40fd251
x86cpuid.pl: compensate for imaginary virtual machines.
2011-11-08 21:27:44 +00:00
Andy Polyakov
3f54a7460c
Configure: harmonize darwin64-x86_64-cc line with assembler pack.
2011-11-08 18:32:07 +00:00
Andy Polyakov
bba391a99a
config: KERNEL_BITS envrionment variable to control choice between 32-
...
and 64-bit Solaris builds.
2011-11-08 14:40:33 +00:00
Andy Polyakov
af0368458a
config: KERNEL_BITS envrionment variable to control choice between 32- and
...
64-bit darwin builds.
2011-11-08 13:31:28 +00:00
Andy Polyakov
a2570242a9
Configure: initial support for iOS.
2011-11-08 13:02:57 +00:00
Andy Polyakov
f6666ad19d
Configure: allow ./config to pass compiler flags with white spaces.
2011-11-08 12:45:00 +00:00
Andy Polyakov
d43a7f2cc6
fips_canister.c: add cross-compiler support for iOS (it applies even to
...
MacOS X, because it's easier to handle it this way).
2011-11-08 12:21:32 +00:00
Andy Polyakov
7467b76fbf
fips_premain.c: fix warning about _exit on MacOS X.
2011-11-08 12:15:04 +00:00
Andy Polyakov
6a0ea5d239
fipsld, incore: switch to new cross-compile support.
2011-11-06 23:22:58 +00:00
Andy Polyakov
9a480169cd
e_aes.c: fold aesni_xts_cipher and [most importantly] fix aes_xts_cipher's
...
return value after custom flag was rightly reverted.
2011-11-06 19:48:39 +00:00
Dr. Stephen Henson
85a1a836a2
check for unset entropy and nonce callbacks
2011-11-06 13:08:41 +00:00
Dr. Stephen Henson
a98b8ce652
Update fips_test_suite to take multiple command line options and
...
an induced error checking function.
2011-11-06 12:53:13 +00:00
Dr. Stephen Henson
980e7e8bcd
typo
2011-11-05 18:25:40 +00:00
Dr. Stephen Henson
f45c90bb1c
make post failure simulation reversible in all cases
2011-11-05 18:14:42 +00:00
Dr. Stephen Henson
4692f9f7b6
typo: use key for POST callback
2011-11-05 18:11:05 +00:00
Dr. Stephen Henson
835d355b97
fix set but unused warnings
2011-11-05 18:04:31 +00:00
Andy Polyakov
29fd6746f5
armv4cpuid.S, armv4-gf2m.pl: make newest code compilable by older assembler.
2011-11-05 13:07:18 +00:00
Andy Polyakov
e879dd4386
x86cpuid.pl: don't punish "last-year" OSes on "this-year" CPUs.
...
PR: 2633
2011-11-05 10:44:12 +00:00
Andy Polyakov
09f40a3cb9
ppc.pl: fix bug in bn_mul_comba4.
...
PR: 2636
Submitted by: Charles Bryant
2011-11-05 10:16:04 +00:00
Dr. Stephen Henson
f4324e51dd
Add single call public key sign and verify functions.
2011-11-05 01:34:36 +00:00
Dr. Stephen Henson
69569dd168
Add support for memory leak checking in fips_algvs.
...
Fix many memory leaks in algorithm test utilities.
2011-11-02 19:17:30 +00:00
Dr. Stephen Henson
12cc43782c
Remove duplicate test from health check.
...
Fix memory leaks by uninstantiating DRBG before reinitialising it.
2011-11-02 16:58:17 +00:00
Dr. Stephen Henson
400b3b3614
Print out an error for "make test" in FIPS builds. (from FIPS stable)
2011-11-02 00:58:17 +00:00
Dr. Stephen Henson
3ec9dceb15
Add fips_algvs utility (from FIPS 2.0 stable branch).
2011-11-02 00:57:22 +00:00
Richard Levitte
92064785ec
Typo...
2011-10-30 14:43:53 +00:00
Andy Polyakov
a75a52a43e
bsaes-x86_64.pl: add CBC decrypt and engage it in e_aes.c.
2011-10-30 12:15:56 +00:00
Richard Levitte
ada35f9c2c
Add missing algorithms to disable, and in particular, disable
...
EC_NISTP_64_GCC_128 by default, as GCC isn't currently supported on
VMS. Synchronise with Unix.
2011-10-30 11:46:07 +00:00
Richard Levitte
6aaa942d53
Teach mkshared.com to have a look for disabled algorithms in opensslconf.h
2011-10-30 11:40:54 +00:00
Andy Polyakov
0933887112
bn_exp.c: fix corner case in new constant-time code.
...
Submitted by: Emilia Kasper
2011-10-29 19:25:13 +00:00
Andy Polyakov
b08259cdfe
bsaes-x86_64.pl: optimize InvMixColumns.
2011-10-29 11:56:21 +00:00
Andy Polyakov
28507577b1
bsaes-x86_64.pl: add decryption procedure (with unoptimized reference
...
InvMixColumns).
2011-10-29 11:47:20 +00:00
Dr. Stephen Henson
930e801214
PR: 2628
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Send alert instead of assertion failure for incorrectly formatted DTLS
fragments.
2011-10-27 13:06:52 +00:00
Dr. Stephen Henson
fe0e302dff
PR: 2628
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix for ECC keys and DTLS.
2011-10-27 13:01:33 +00:00
Dr. Stephen Henson
32cf5baeae
PR: 2632
...
Submitted by: emmanuel.azencot@bull.net
Reviewed by: steve
Return -1 immediately if not affine coordinates as BN_CTX has not been
set up.
2011-10-26 16:43:34 +00:00
Dr. Stephen Henson
45906fe63b
Use correct tag for SRP username.
2011-10-25 12:51:22 +00:00
Dr. Stephen Henson
482cdf2489
typo
2011-10-24 13:23:51 +00:00
Andy Polyakov
f2784994ec
e_aes.c: fold even aesni_ccm_cipher.
2011-10-24 06:00:06 +00:00
Andy Polyakov
507b0d9d38
e_aes.c: prevent potential DoS in aes_gcm_tls_cipher.
2011-10-23 22:58:40 +00:00
Andy Polyakov
181fbb77f3
cryptlib.c: remove stdio dependency in Windows fipscanister.lib.
2011-10-23 19:41:00 +00:00
Dr. Stephen Henson
f59a5d6079
No need for custom flag in XTS mode: block length is 1.
2011-10-23 17:06:28 +00:00
Andy Polyakov
005cdace99
fips_canister.c: harmonize fingerprinting for all Windows, CE or not.
2011-10-23 15:17:30 +00:00
Andy Polyakov
8b8d2dccf1
config: in cross-compile case interrogate cross-compiler, not host, work
...
around sub-shell limitation.
2011-10-23 15:12:37 +00:00
Dr. Stephen Henson
5fd722600b
Check for selftest failure in various places.
2011-10-22 17:24:27 +00:00
Andy Polyakov
5b198d5eea
x86gas.pl: relax .init segment alignment.
2011-10-22 10:49:52 +00:00
Andy Polyakov
16190a71ff
mk1mk.pl: cleanup engines' handling and make fips build work on WIN64I.
2011-10-21 19:34:48 +00:00
Dr. Stephen Henson
8d742dd561
Update error codes.
2011-10-21 11:46:16 +00:00
Andy Polyakov
0cde099f86
fips.c: remove preprocessor artefact.
2011-10-21 06:03:45 +00:00
Dr. Stephen Henson
dfe9a47519
fix (?) AVX clearing
2011-10-21 01:57:37 +00:00
Dr. Stephen Henson
af4bfa151c
Check for uninitialised DRBG_CTX and don't free up default DRBG_CTX.
2011-10-21 00:12:53 +00:00
Andy Polyakov
3b5930442d
fips.c: x86[_64] capability masking.
2011-10-20 21:03:09 +00:00
Andy Polyakov
033a25cef5
armcap.c: auto-setup processor capability vector.
2011-10-20 20:52:26 +00:00
Dr. Stephen Henson
43760a2cf0
Fix error codes.
2011-10-20 13:56:01 +00:00
Andy Polyakov
5f132a0356
fips/fips_[canister|premain].c: make it work with VC6 and add sentinels
...
even to code segments.
2011-10-20 12:09:13 +00:00
Andy Polyakov
d528caa725
sha1-mips.pl: fix typo.
2011-10-20 08:39:29 +00:00
Andy Polyakov
d22870bc00
Drain unused MacOS directory.
2011-10-20 08:28:06 +00:00
Dr. Stephen Henson
4ff2999e88
Add "nopass" for empty password too.
2011-10-19 23:23:35 +00:00
Dr. Stephen Henson
5e4eb9954b
add authentication parameter to FIPS_module_mode_set
2011-10-19 22:34:53 +00:00
Andy Polyakov
227a822ab6
vxworks-mips: unify and add assembler.
2011-10-19 21:49:20 +00:00
Andy Polyakov
a9cf0b81fa
Remove superseded MIPS assembler modules.
2011-10-19 21:42:21 +00:00
Andy Polyakov
552e412abc
fips_canister.c: more cross-compiler platfroms verified.
2011-10-19 21:05:53 +00:00
Andy Polyakov
3ee4d41fe1
arm_arch.h: add missing pre-defined macro, __ARM_ARCH_5TEJ__.
2011-10-19 18:57:03 +00:00
Bodo Möller
f391750205
"make update" (partial)
2011-10-19 15:29:14 +00:00
Bodo Möller
e5641d7f05
BN_BLINDING multi-threading fix.
...
Submitted by: Emilia Kasper (Google)
2011-10-19 14:59:27 +00:00
Dr. Stephen Henson
6d4c65835d
Typo (?)
2011-10-19 12:05:08 +00:00
Dr. Stephen Henson
0a7fcce8df
Build fipscanister.o only by default. Utility build now needs
...
make build_tests
2011-10-19 11:47:21 +00:00
Dr. Stephen Henson
6b0ac883d0
Recognise new option.
2011-10-19 11:44:25 +00:00
Bodo Möller
7d8bb91233
Fix indentation
2011-10-19 09:24:22 +00:00
Bodo Möller
e0d6132b8c
Fix warnings.
...
Also, use the common Configure mechanism for enabling/disabling the 64-bit ECC code.
2011-10-19 08:59:53 +00:00
Dr. Stephen Henson
e3fed9f41e
Update premain fingerprint.
2011-10-18 22:11:11 +00:00
Bodo Möller
3e00b4c9db
Improve optional 64-bit NIST-P224 implementation, and add NIST-P256 and
...
NIST-P521. (Now -DEC_NISTP_64_GCC_128 enables all three of these;
-DEC_NISTP224_64_GCC_128 no longer works.)
Submitted by: Google Inc.
2011-10-18 19:43:16 +00:00
Andy Polyakov
4c3a7a0263
fipssyms.h: assign alias to newly introduced bn_gather5.
2011-10-18 18:59:33 +00:00
Andy Polyakov
10db9f9f48
fips/*: extend fipsro segmenting to all _MSC_VER builds (including WinCE).
2011-10-18 18:56:09 +00:00
Andy Polyakov
9f0d2e1464
fips_enc.c: assign minimal block size to bad_cipher [to avoid arithmetic
...
exceptions in TLS layer].
2011-10-18 18:52:05 +00:00
Andy Polyakov
5d77cdc591
engines/.cvsignore: stop whining about e_padlock-*.s.
2011-10-18 13:39:47 +00:00
Andy Polyakov
07904e0c6c
evp/e_aes.c: fold AES-NI modes that heavily rely on indirect calls
...
(trade 2% small-block performance), engage bit-sliced AES in GCM.
2011-10-18 13:37:26 +00:00
Andy Polyakov
4010b341b7
x86_64-xlate.pl: make vpaes-x86_64.pl and rc4-md5-x86_64 work with ml64,
...
fix bug in .crt section alignment.
PR: 2620, 2624
2011-10-18 09:50:23 +00:00
Andy Polyakov
5a326467dc
bsaes-x86_64.pl: make it work with ml64.
2011-10-18 09:22:04 +00:00
Andy Polyakov
3b7c14bb90
[bs|vp]aes-x86[_64].pl: typos and clarifications.
2011-10-18 08:03:02 +00:00
Andy Polyakov
e2473dcc7d
c_allc.c: add aes-xts to loop.
2011-10-18 07:53:50 +00:00
Dr. Stephen Henson
1db4a63bc3
Do global replace to remove assembly language object files.
2011-10-18 00:02:42 +00:00
Andy Polyakov
78f288d5c9
bn_mont.c: get corner cases right in updated BN_from_montgomery_word.
2011-10-17 23:35:00 +00:00
Andy Polyakov
8329e2e776
bn_exp.c: further optimizations using more ideas from
...
http://eprint.iacr.org/2011/239 .
2011-10-17 17:41:49 +00:00
Andy Polyakov
3f66f2040a
x86_64-mont.pl: minor optimization.
2011-10-17 17:39:59 +00:00
Andy Polyakov
2534891874
bn_mont.c: simplify BN_from_montgomery_word.
2011-10-17 17:24:28 +00:00
Andy Polyakov
79ba545c09
bn_shift.c: minimize reallocations, which allows BN_FLG_STATIC_DATA to
...
be shifted in specific cases.
2011-10-17 17:20:48 +00:00
Andy Polyakov
993adc0531
Engage bsaes-x86_64.pl, bit-sliced AES.
2011-10-17 17:10:54 +00:00
Dr. Stephen Henson
bc1b04d255
L=3072, N=256 provides 128 bits of security not 112.
2011-10-16 12:31:49 +00:00
Andy Polyakov
8fcdb1e60f
Add android-x86.
2011-10-15 08:32:16 +00:00
Dr. Stephen Henson
e1db7c4e7a
Clarify usage message.
2011-10-14 23:51:58 +00:00
Dr. Stephen Henson
ffbfbef943
more vxworks patches
2011-10-14 22:04:14 +00:00
Dr. Stephen Henson
1fb2e0f940
Allow override of GCCVER and noexecstack checking from environment.
...
Vxworks support.
2011-10-14 17:28:10 +00:00
Dr. Stephen Henson
41a846c694
Don't use TPREFIX shell variable for minimal script.
2011-10-14 15:15:20 +00:00
Dr. Stephen Henson
3335b6f265
Add usage messages.
2011-10-14 13:00:08 +00:00
Andy Polyakov
027026df9f
e_aes.c: fix bug in aesni_gcm_tls_cipher.
2011-10-14 09:32:06 +00:00
Andy Polyakov
9ee5916d97
aesni-x86[_64].pl: fix bug in CCM code.
2011-10-14 09:15:19 +00:00
Andy Polyakov
af9b610cef
Remove eng_aesni.c as AES-NI support is integrated directly at EVP.
2011-10-13 19:46:44 +00:00
Bodo Möller
8bfc6479a8
use -no_ecdhe when using -no_dhe
2011-10-13 15:07:08 +00:00
Bodo Möller
4f2015742d
Oops - ectest.c finds further problems beyond those exposed by bntext.c
2011-10-13 14:29:59 +00:00
Bodo Möller
0a06ad76a1
Avoid failed assertion in BN_DEBUG builds
2011-10-13 14:21:39 +00:00
Bodo Möller
bf6d2f986d
Make CTR mode behaviour consistent with other modes:
...
- clear ctx->num in EVP_CipherInit_ex
- adapt e_eas.c changes from http://cvs.openssl.org/chngview?cn=19816
for eng_aesni.c
Submitted by: Emilia Kasper
2011-10-13 13:41:34 +00:00
Bodo Möller
9d74befd23
Clarify warning
2011-10-13 13:27:09 +00:00
Bodo Möller
8b37d33a94
typo
2011-10-13 13:20:33 +00:00
Bodo Möller
3ddc06f082
In ssl3_clear, preserve s3->init_extra along with s3->rbuf.
...
Submitted by: Bob Buckholz <bbuckholz@google.com >
2011-10-13 13:05:58 +00:00
Bodo Möller
cdfe0fdde6
Fix OPENSSL_BN_ASM_MONT5 for corner cases; add a test.
...
Submitted by: Emilia Kasper
2011-10-13 12:35:10 +00:00
Dr. Stephen Henson
5936521495
Print curve type for signature tests.
2011-10-12 22:41:33 +00:00
Dr. Stephen Henson
35882b60d8
increase test RSA key size to 1024 bits
2011-10-12 21:55:03 +00:00
Dr. Stephen Henson
ce01482e0f
Update README.FIPS for new FIPS 2.0 testvectors.
2011-10-12 18:48:01 +00:00
Dr. Stephen Henson
7fc78f11e8
Remove o_init.o special case from Makefile: this doesn't work.
2011-10-12 17:27:08 +00:00
Dr. Stephen Henson
98bc806749
Skip ECDH sanity check. Add --compare-all to run comparison tests on
...
all files instead of sanity checks.
2011-10-12 17:18:38 +00:00
Dr. Stephen Henson
a2b6dc97f6
Handle partial test where H is absent: needed to check g generation.
2011-10-12 17:03:15 +00:00
Dr. Stephen Henson
df36faaaa2
Update instructions.
2011-10-12 15:35:34 +00:00
Dr. Stephen Henson
e15acd9d9e
Updates to handle some verification of v2 tests.
...
Now enable v2 by default and require a --disable-v2 option to run the
old v1 tests.
2011-10-12 15:33:54 +00:00
Dr. Stephen Henson
a854818ea9
Handle broken test on verify too.
2011-10-12 15:32:57 +00:00
Dr. Stephen Henson
c1f63b5cb3
ECDH POST selftest failure inducing support.
2011-10-12 13:17:19 +00:00
Dr. Stephen Henson
cf61940534
Fix warnings.
2011-10-12 13:06:45 +00:00
Dr. Stephen Henson
dafd5b5d74
Only include one ECDH selftest.
2011-10-12 12:55:58 +00:00
Andy Polyakov
6c8ce3c2ff
e_padlock-x86[_64].pl: protection against prefetch errata.
2011-10-11 21:07:53 +00:00
Dr. Stephen Henson
3231e42d72
update pkey method initialisation and copy
2011-10-11 18:15:31 +00:00
Dr. Stephen Henson
cd366cf7ec
print out subgroup order if present
2011-10-11 17:44:26 +00:00
Dr. Stephen Henson
a59163f6b6
def_rsa_finish not used any more.
2011-10-10 20:35:09 +00:00
Dr. Stephen Henson
fe4394cf1d
remove some debugging code
2011-10-10 19:09:01 +00:00
Dr. Stephen Henson
84a75ba38c
fix leak properly this time...
2011-10-10 14:08:55 +00:00
Dr. Stephen Henson
eb47b2fb13
add GCM ciphers in SSL_library_init
2011-10-10 12:56:18 +00:00
Dr. Stephen Henson
a0f21307e0
disable GCM if not available
2011-10-10 12:41:11 +00:00
Dr. Stephen Henson
7d7c13cbab
Don't disable TLS v1.2 by default now.
2011-10-09 23:26:39 +00:00
Dr. Stephen Henson
0feb83e222
Synv ordinals with 1.0.1-stable.
2011-10-09 23:16:20 +00:00
Dr. Stephen Henson
ccbb9badba
fix CHANGES entry
2011-10-09 23:11:55 +00:00
Dr. Stephen Henson
42753a4f67
fix memory leaks
2011-10-09 23:08:15 +00:00
Andy Polyakov
b1d3e9de63
e_padlock-x86_64.pl: brown-bag bug in stack pointer handling.
2011-10-09 21:53:53 +00:00
Dr. Stephen Henson
7bd4095b12
Sync ordinals with 1.0.1-stable.
2011-10-09 15:29:43 +00:00
Dr. Stephen Henson
58b75e9c26
PR: 2482
...
Submitted by: Rob Austein <sra@hactrn.net >
Reviewed by: steve
Don't allow inverted ranges in RFC3779 code, discovered by Frank Ellermann.
2011-10-09 00:56:52 +00:00
Andy Polyakov
08d62e9f1a
e_padlock-x86[_64].pl: SHA fixes, comply with specification and fix bug.
2011-10-08 21:37:44 +00:00
Dr. Stephen Henson
549cd657fd
Add fips/ecdh directory.
2011-10-07 18:18:50 +00:00
Dr. Stephen Henson
43206a2d7c
New -force_pubkey option to x509 utility to supply a different public
...
key to the one in a request. This is useful for cases where the public
key cannot be used for signing e.g. DH.
2011-10-07 15:18:09 +00:00
Dr. Stephen Henson
6dd547398a
use client version when eliminating TLS v1.2 ciphersuites in client hello
2011-10-07 15:07:19 +00:00
Dr. Stephen Henson
66bb328e11
? crypto/aes/aes-armv4.S
...
? crypto/aes/aesni-sha1-x86_64.s
? crypto/aes/aesni-x86_64.s
? crypto/aes/foo.pl
? crypto/aes/vpaes-x86_64.s
? crypto/bn/.bn_lib.c.swp
? crypto/bn/armv4-gf2m.S
? crypto/bn/diffs
? crypto/bn/modexp512-x86_64.s
? crypto/bn/x86_64-gf2m.s
? crypto/bn/x86_64-mont5.s
? crypto/ec/bc.txt
? crypto/ec/diffs
? crypto/modes/a.out
? crypto/modes/diffs
? crypto/modes/ghash-armv4.S
? crypto/modes/ghash-x86_64.s
? crypto/modes/op.h
? crypto/modes/tst.c
? crypto/modes/x.h
? crypto/objects/.obj_xref.txt.swp
? crypto/rand/diffs
? crypto/sha/sha-512
? crypto/sha/sha1-armv4-large.S
? crypto/sha/sha256-armv4.S
? crypto/sha/sha512-armv4.S
Index: crypto/objects/obj_xref.c
===================================================================
RCS file: /v/openssl/cvs/openssl/crypto/objects/obj_xref.c,v
retrieving revision 1.9
diff -u -r1.9 obj_xref.c
--- crypto/objects/obj_xref.c 5 Nov 2008 18:38:58 -0000 1.9
+++ crypto/objects/obj_xref.c 6 Oct 2011 20:30:21 -0000
@@ -110,8 +110,10 @@
#endif
if (rv == NULL)
return 0;
- *pdig_nid = rv->hash_id;
- *ppkey_nid = rv->pkey_id;
+ if (pdig_nid)
+ *pdig_nid = rv->hash_id;
+ if (ppkey_nid)
+ *ppkey_nid = rv->pkey_id;
return 1;
}
@@ -144,7 +146,8 @@
#endif
if (rv == NULL)
return 0;
- *psignid = (*rv)->sign_id;
+ if (psignid)
+ *psignid = (*rv)->sign_id;
return 1;
}
Index: crypto/x509/x509type.c
===================================================================
RCS file: /v/openssl/cvs/openssl/crypto/x509/x509type.c,v
retrieving revision 1.10
diff -u -r1.10 x509type.c
--- crypto/x509/x509type.c 26 Oct 2007 12:06:33 -0000 1.10
+++ crypto/x509/x509type.c 6 Oct 2011 20:36:04 -0000
@@ -100,20 +100,26 @@
break;
}
- i=X509_get_signature_type(x);
- switch (i)
+ i=OBJ_obj2nid(x->sig_alg->algorithm);
+ if (i && OBJ_find_sigid_algs(i, NULL, &i))
{
- case EVP_PKEY_RSA:
- ret|=EVP_PKS_RSA;
- break;
- case EVP_PKEY_DSA:
- ret|=EVP_PKS_DSA;
- break;
- case EVP_PKEY_EC:
- ret|=EVP_PKS_EC;
- break;
- default:
- break;
+
+ switch (i)
+ {
+ case NID_rsaEncryption:
+ case NID_rsa:
+ ret|=EVP_PKS_RSA;
+ break;
+ case NID_dsa:
+ case NID_dsa_2:
+ ret|=EVP_PKS_DSA;
+ break;
+ case NID_X9_62_id_ecPublicKey:
+ ret|=EVP_PKS_EC;
+ break;
+ default:
+ break;
+ }
}
if (EVP_PKEY_size(pk) <= 1024/8)/* /8 because it's 1024 bits we look
2011-10-06 20:44:02 +00:00
Andy Polyakov
50452b2e60
e_padlock: add CTR mode.
2011-10-05 17:03:44 +00:00
Andy Polyakov
d18762f7c9
e_padlock-x86_64.pl: fix typo.
2011-10-04 11:21:33 +00:00
Andy Polyakov
149ca7128c
e_padlock-x86*.pl: Nano-related update.
2011-10-04 11:05:16 +00:00
Dr. Stephen Henson
4cc2bbab67
Make fips algorithm test utilities use RESP_EOL for end of line character(s).
...
This should be CRLF even under *nix.
2011-10-01 20:42:52 +00:00
Andy Polyakov
04c3aa5c1a
e_padlock-x86.pl: previous C3-specific fix was incomplete.
2011-10-01 10:44:51 +00:00
Andy Polyakov
3edc26a256
e_padlock-x86.pl: make it work on VIA C3 (which doesn't support SSE2).
2011-10-01 10:16:13 +00:00
Dr. Stephen Henson
10465aca60
Never echo Num lines for PQGGen DSA2 test.
2011-09-30 11:58:59 +00:00
Dr. Stephen Henson
3f1ebb8f42
make depend
2011-09-29 23:17:59 +00:00
Dr. Stephen Henson
2bfeb7dc83
Add FIPS selftests for ECDH algorithm.
2011-09-29 23:08:23 +00:00
Dr. Stephen Henson
55831cd6ee
Remove s = s * P deferral.
2011-09-29 18:22:37 +00:00
Dr. Stephen Henson
884c33b5c4
Check return codes properly.
2011-09-29 16:24:00 +00:00
Dr. Stephen Henson
54bb3f68e1
Fix output format for DSA2 parameter generation.
2011-09-28 22:35:30 +00:00
Andy Polyakov
112726486d
bsaes-x86_64.pl: add due credit.
2011-09-27 19:34:40 +00:00
Dr. Stephen Henson
fca38e350b
fix signed/unsigned warning
2011-09-26 17:04:32 +00:00
Dr. Stephen Henson
a846a7ff32
Add a --disable-all option to disable all tests.
2011-09-25 22:12:39 +00:00
Dr. Stephen Henson
bac3db9cc1
Handle provable prime parameters for canonical g generation which are
...
sometimes erroneously included.
2011-09-25 22:04:43 +00:00
Andy Polyakov
4ec93a10bd
Add bit-sliced AES x86_64 assembler, see http://homes.esat.kuleuven.be/~ekasper/#software for background information. It's not integrated into build system yet.
2011-09-25 15:31:51 +00:00
Dr. Stephen Henson
d18a0df0a6
make sure eivlen is initialised
2011-09-24 23:06:20 +00:00
Dr. Stephen Henson
1579e65604
use keyformat for -x509toreq, don't hard code PEM
2011-09-23 21:48:34 +00:00
Dr. Stephen Henson
c2035bffe7
PR: 2606
...
Submitted by: Christoph Viethen <cv@kawo2.rwth-aachen.de >
Reviewed by: steve
Handle timezones correctly in UTCTime.
2011-09-23 13:39:23 +00:00
Dr. Stephen Henson
1d7392f219
PR: 2602
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS bug which prevents manual MTU setting
2011-09-23 13:34:48 +00:00
Dr. Stephen Henson
07dda896cb
PR: 2347
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Reviewed by: steve
Fix usage message.
2011-09-23 13:12:25 +00:00
Dr. Stephen Henson
af70f1a35d
Run PQGVer test before DSA2 tests.
2011-09-23 01:03:37 +00:00
Dr. Stephen Henson
ddf00ffab8
Typo.
2011-09-22 14:15:07 +00:00
Dr. Stephen Henson
cb71870dfa
Use function name FIPS_drbg_health_check() for health check function.
...
Add explanatory comments to health check code.
2011-09-22 14:01:25 +00:00
Dr. Stephen Henson
456d883a25
Don't print out errors in cases where errors are expected: testing
...
DSA parameter validity and EC public key validity.
2011-09-21 18:42:12 +00:00
Dr. Stephen Henson
d57cc97f24
Remove unused variable.
2011-09-21 18:36:53 +00:00
Dr. Stephen Henson
05272d4c51
Perform health check on all reseed operations not associated with
...
prediction resistance requests. Although SP 800-90 is arguably unclear
on whether this is necessary adding an additional check has minimal
penalty (very few applications will make an explicit reseed request).
2011-09-21 18:24:12 +00:00
Dr. Stephen Henson
4420b3b17a
Revise DRBG to split between internal and external flags.
...
One demand health check function.
Perform generation test in fips_test_suite.
Option to skip dh test if fips_test_suite.
2011-09-21 17:04:56 +00:00
Dr. Stephen Henson
e74ac3f830
Update error codes.
2011-09-21 16:17:18 +00:00
Dr. Stephen Henson
a5799bdc48
Allow reseed interval to be set.
2011-09-18 19:36:27 +00:00
Andy Polyakov
2b1f17f83f
Make latest assembler additions (vpaes and e_padlock) work in Windows build.
2011-09-18 15:40:11 +00:00
Andy Polyakov
7470276a25
sha256-586.pl: minor optimization, +0-2% on all CPUs, +7% on Westmere.
2011-09-17 12:57:33 +00:00
Andy Polyakov
d2fd65f6f6
sha512-x86_64.pl: +15% better performance on Westmere and incidentally Atom.
...
Other Intel processors +5%, Opteron -2%.
2011-09-17 11:30:28 +00:00
Dr. Stephen Henson
819cf4b886
Sync error codes with 1.0.1-stable.
2011-09-17 00:17:46 +00:00
Dr. Stephen Henson
45fcfcb99f
clarify comment
2011-09-16 17:40:16 +00:00
Dr. Stephen Henson
e248740d67
Minor code tidy and bug fix: need to set t = s after first pass and
...
t and s do not need to have independent values after the first pass
so set t = s.
2011-09-16 17:35:40 +00:00
Dr. Stephen Henson
b63698b70d
Don't use vpaes in fips builds and exclude from restricted tarball.
2011-09-15 21:06:37 +00:00
Andy Polyakov
8ca28da0a7
Integrate Vector Permutation AES into build system.
2011-09-15 20:22:59 +00:00
Dr. Stephen Henson
b889a6046b
Make HMAC kat symbols static.
2011-09-15 14:28:46 +00:00
Dr. Stephen Henson
00b0f2cb3e
Fix warning.
2011-09-15 14:08:24 +00:00
Andy Polyakov
03e389cf04
Allow for dynamic base in Win64 FIPS module.
2011-09-14 20:48:49 +00:00
Dr. Stephen Henson
93256bf5d1
Update CMAC/HMAC sefltests to use NIDs instead of function pointers.
...
Simplify HMAC selftest as each test currently uses the same key and
hash data.
2011-09-14 15:49:50 +00:00
Dr. Stephen Henson
d47d0d2b0d
Remove fipsdso target: it isn't supported in the 2.0 module.
2011-09-14 15:20:59 +00:00
Dr. Stephen Henson
15094852de
new function to lookup FIPS supported ciphers by NID
2011-09-14 13:25:48 +00:00
Dr. Stephen Henson
a11f06b2dc
More extensive DRBG health check. New function to call health check
...
for all DRBG combinations.
2011-09-12 18:47:39 +00:00
Dr. Stephen Henson
361d18a208
Check length of additional input in DRBG generate function.
2011-09-12 18:45:05 +00:00
Dr. Stephen Henson
de2132de93
Delete strength parameter from FIPS_drbg_generate. It isn't very useful
...
(strength can be queried using FIPS_drbg_get_strength ) and adds a
substantial extra overhead to health check (need to check every combination
of parameters).
2011-09-12 13:20:57 +00:00
Dr. Stephen Henson
9e56c99e1a
Check we recognise DRBG type in fips_drbgvs.c initialised DRBG_CTX if we
...
don't set type in FIPS_drbg_new().
2011-09-12 12:56:20 +00:00
Andy Polyakov
543dfa9f0e
vpaes-x86[_64]*.pl: fix typo.
2011-09-12 12:50:00 +00:00
Andy Polyakov
a87ff751b7
Add so called Vector Permutation AES x86[_64] assembler, see
...
http://crypto.stanford.edu/vpaes/ for background information.
It's not integrated into build system yet.
2011-09-12 08:25:14 +00:00
Dr. Stephen Henson
288fe07a6e
Fix 3DES Monte Carlo test file output which previously outputted
...
extra bogus lines. Update fipsalgtest.pl to tolerate the old format.
2011-09-11 18:05:40 +00:00
Dr. Stephen Henson
7fdcb45745
Add support for Dual EC DRBG from SP800-90. Include updates to algorithm
...
tests and POST code.
2011-09-09 17:16:43 +00:00
Dr. Stephen Henson
e4588dc486
Add /fixed option to linker with fips builds.
2011-09-08 13:55:47 +00:00
Dr. Stephen Henson
d98360392a
Put quick DRBG selftest return after first generate operation.
2011-09-07 10:26:38 +00:00
Andy Polyakov
33987f2f45
engines/asm/e_padlock-x86_64.pl: name it right and fix small bug.
2011-09-06 22:53:34 +00:00
Dr. Stephen Henson
bbb19418e6
Add error codes for DRBG KAT failures.
...
Add abbreviated DRBG KAT for POST which only performs a single generate
operations instead of four.
2011-09-06 20:46:27 +00:00
Andy Polyakov
ed28aef8b4
Padlock engine: make it independent of inline assembler.
2011-09-06 20:45:36 +00:00
Dr. Stephen Henson
0486cce653
Initialise X509_STORE_CTX properly so CRLs with nextUpdate date in the past
...
produce an error (CVE-2011-3207)
2011-09-06 15:15:09 +00:00
Dr. Stephen Henson
0f8d4d49dc
Update FAQ.
2011-09-06 13:55:22 +00:00
Andy Polyakov
f952716745
config: don't add -Wa options with no-asm.
2011-09-05 16:31:51 +00:00
Andy Polyakov
dd83d0f4a7
crypto/bn/bn_gf2m.c: make it work with BN_DEBUG.
2011-09-05 16:14:43 +00:00
Dr. Stephen Henson
ea17b0feec
Check reseed interval before generating output.
2011-09-05 15:45:13 +00:00
Dr. Stephen Henson
7634137b8a
Place DRBG in error state if health check fails.
2011-09-05 15:32:32 +00:00
Bodo Möller
2c472780c0
oops
2011-09-05 13:43:56 +00:00
Bodo Möller
c519e89f5c
Fix session handling.
2011-09-05 13:36:23 +00:00
Bodo Möller
612fcfbd29
Fix d2i_SSL_SESSION.
2011-09-05 13:31:17 +00:00
Bodo Möller
e7928282d0
(EC)DH memory handling fixes.
...
Submitted by: Adam Langley
2011-09-05 10:25:31 +00:00
Bodo Möller
837e1b6812
Fix memory leak on bad inputs.
2011-09-05 09:57:20 +00:00
Bodo Möller
ae53b299fa
make update
2011-09-05 09:46:15 +00:00
Bodo Möller
03a64ef56d
Fix expected DEFFLAG for default config.
2011-09-05 09:43:44 +00:00
Bodo Möller
f0ecb86666
Fix error codes.
2011-09-05 09:42:34 +00:00
Bodo Möller
acb4ab34a4
Synchronize with 1.0.1 CHANGES file.
2011-09-05 09:30:50 +00:00
Dr. Stephen Henson
74c40744ca
Don't perform full DRBG health check on all DRBG types on power up, just
...
one shorter KAT per mechanism.
2011-09-04 22:48:06 +00:00
Dr. Stephen Henson
1567b3904c
Update dependencies.
2011-09-04 18:44:28 +00:00
Dr. Stephen Henson
06e771b580
Add header to Makefile.
2011-09-04 18:36:20 +00:00
Dr. Stephen Henson
eb9e63df61
Extension of DRBG selftests using new data.
...
Test PR and no PR and test initial generate before the reseed too.
Move selftest data to separate fips_drbg_selftest.h header file.
2011-09-04 18:35:33 +00:00
Dr. Stephen Henson
fa85c1dbf5
Rename some more symbols for fips module.
2011-09-02 15:10:54 +00:00
Dr. Stephen Henson
a60cc6b4f0
Don't use *from++ in tolower as this is implemented as a macro on some
...
platforms. Thanks to Shayne Murray <Shayne.Murray@Polycom.com > for
reporting this issue.
2011-09-02 11:28:27 +00:00
Dr. Stephen Henson
2c1f5ce4b1
PR: 2576
...
Submitted by: Doug Goldstein <cardoe@gentoo.org >
Reviewed by: steve
Include header file stdlib.h which is needed on some platforms to get
getenv() declaration.
2011-09-02 11:20:15 +00:00
Dr. Stephen Henson
c41b505459
Sync ordinals with 1.0.1-stable.
2011-09-01 17:12:35 +00:00
Dr. Stephen Henson
74e056edbc
PR: 2340
...
Submitted by: "Mauro H. Leggieri" <mxmauro@caiman.com.ar >
Reviewed by: steve
Stop warnings if OPENSSL_NO_DGRAM is defined.
2011-09-01 15:01:35 +00:00
Dr. Stephen Henson
ff7231043f
make timing attack protection unconditional
2011-09-01 14:23:09 +00:00
Dr. Stephen Henson
5e92fd244c
Stop warnings.
2011-09-01 14:15:47 +00:00
Dr. Stephen Henson
d41ce00b8c
PR: 2573
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS buffering and decryption bug.
2011-09-01 14:02:23 +00:00
Dr. Stephen Henson
04485c5bc0
PR: 2589
...
Submitted by: Thomas Jarosch <thomas.jarosch@intra2net.com >
Reviewed by: steve
Initialise p pointer.
2011-09-01 13:52:48 +00:00
Dr. Stephen Henson
d77a970669
PR: 2588
...
Submitted by: Thomas Jarosch <thomas.jarosch@intra2net.com >
Reviewed by: steve
Close file pointer.
2011-09-01 13:49:16 +00:00
Dr. Stephen Henson
f7924634d4
PR: 2586
...
Submitted by: Thomas Jarosch <thomas.jarosch@intra2net.com >
Reviewed by: steve
Zero structure fields properly.
2011-09-01 13:45:46 +00:00
Dr. Stephen Henson
d3f6a5a01d
PR: 2586
...
Submitted by: Thomas Jarosch <thomas.jarosch@intra2net.com >
Reviewed by: steve
Fix brace mismatch.
2011-09-01 13:37:37 +00:00
Dr. Stephen Henson
d35c284b73
Print private key component is -exout parameter is given.
2011-08-29 16:09:07 +00:00
Dr. Stephen Henson
00220f8111
Fix ecdh primitives test command line.
2011-08-29 15:35:35 +00:00
Andy Polyakov
cfdbff23ab
bn_exp.c: improve portability.
2011-08-27 19:38:55 +00:00
Andy Polyakov
f7eb0ab9ac
util/incore: fix typo.
2011-08-27 19:37:25 +00:00
Dr. Stephen Henson
2abaa9caaf
Add support for DSA2 PQG generation of g parameter.
2011-08-27 12:30:47 +00:00
Dr. Stephen Henson
f55f5f775e
Add support for canonical generation of DSA parameter g.
...
Modify fips_dssvs to support appropriate file format.
2011-08-26 14:51:49 +00:00
Dr. Stephen Henson
7daf0efad9
Fix warning.
2011-08-25 19:50:51 +00:00
Dr. Stephen Henson
edd4d402c6
Don't use some object files in FIPS build.
2011-08-23 23:35:30 +00:00
Dr. Stephen Henson
e6133727fb
Rename sparc symbols.
2011-08-23 21:06:44 +00:00
Andy Polyakov
c608171d9c
Add RC4-MD5 and AESNI-SHA1 "stitched" implementations.
2011-08-23 20:51:38 +00:00
Andy Polyakov
c2d4c2867b
eng_rsax.c: improve portability.
2011-08-22 19:01:16 +00:00
Dr. Stephen Henson
46883b67de
Correct maximum request length. SP800-90 quotes maximum bits, not bytes.
2011-08-19 23:25:10 +00:00
Andy Polyakov
6c01cbb6a0
modexp512-x86_64.pl: make it work with ml64.
2011-08-19 06:30:32 +00:00
Dr. Stephen Henson
c20de0386a
Fix fipsalgtest.pl to still work with old test vectors.
2011-08-18 16:06:24 +00:00
Dr. Stephen Henson
eea98320a0
typo
2011-08-16 12:45:26 +00:00
Dr. Stephen Henson
4c1d92c56f
Update instructions to recommend use of included incore script.
2011-08-16 11:25:56 +00:00
Andy Polyakov
d341e40264
Makefile.org: get commit#21249 right.
2011-08-16 08:56:07 +00:00
Dr. Stephen Henson
142625b534
Delete library install from Makefile.fips: it isn't used.
...
Revert change to Makefile.org: it breaks install.
2011-08-15 20:38:16 +00:00
Dr. Stephen Henson
7cbab63f5a
quote LIBS to copy with empty string
2011-08-15 18:16:55 +00:00
Dr. Stephen Henson
9015ee1826
Enable rsa-pss0 for non-v2 tests.
2011-08-15 14:50:00 +00:00
Dr. Stephen Henson
1f59a84308
Remove hard coded ecdsaWithSHA1 hack in ssl routines and check for RSA
...
using OBJ xref utilities instead of string comparison with OID name.
This removes the arbitrary restriction on using SHA1 only with some ECC
ciphersuites.
2011-08-14 13:45:19 +00:00
Andy Polyakov
bf3dfe7fee
bn_div.c: remove duplicate code by merging BN_div and BN_div_no_branch.
2011-08-14 11:31:35 +00:00
Andy Polyakov
e7d1363d12
x86_64-mont5.pl: add missing Win64 support.
2011-08-14 09:06:06 +00:00
Andy Polyakov
f744bcfd73
eng_rdrand.c: make it link in './config 386' case.
2011-08-14 08:30:56 +00:00
Andy Polyakov
10bd69bf4f
armv4-mont.pl: profiler-assisted optimization gives 8%-14% improvement
...
(more for longer keys) on RSA/DSA.
2011-08-13 12:38:41 +00:00
Andy Polyakov
ae8b47f07f
SPARC assembler pack: fix FIPS linking errors.
2011-08-12 21:38:19 +00:00
Andy Polyakov
272ba87017
x86_64-xlate.pl: fix movzw.
2011-08-12 21:24:19 +00:00
Andy Polyakov
361512da0d
This commit completes recent modular exponentiation optimizations on
...
x86_64 platform. It targets specifically RSA1024 sign (using ideas
from http://eprint.iacr.org/2011/239 ) and adds more than 10% on most
platforms. Overall performance improvement relative to 1.0.0 is ~40%
in average, with best result of 54% on Westmere. Incidentally ~40%
is average improvement even for longer key lengths.
2011-08-12 16:44:32 +00:00
Andy Polyakov
20735f4c81
alphacpuid.pl: fix alignment bug.
...
alpha-mont.pl: fix typo.
PR: 2577
2011-08-12 12:28:52 +00:00
Dr. Stephen Henson
ab1ec69843
aesni TLS GCM support
2011-08-11 23:06:19 +00:00
Dr. Stephen Henson
19ad345739
prevent compilation errors and warnings
2011-08-11 21:12:17 +00:00
Dr. Stephen Henson
513e28c0a4
Include armcap.c in fips tarball.
2011-08-11 17:30:07 +00:00
Dr. Stephen Henson
7f06921eca
Remove redundant assignment.
2011-08-11 13:22:04 +00:00
Andy Polyakov
37f010e248
Add provisory support for RDRAND instruction.
2011-08-10 18:52:42 +00:00
Andy Polyakov
85ec54a417
x86_64-mont.pl: futher optimization resulting in up to 48% improvement
...
(4096-bit RSA sign benchmark on Core2) in comparison to initial version
from 2005.
2011-08-09 13:05:05 +00:00
Dr. Stephen Henson
20f12e63ff
Add HMAC DRBG from SP800-90
2011-08-08 22:07:38 +00:00
Dr. Stephen Henson
b38fd40db4
Use "resp" for default directory name for .rsp files.
2011-08-08 18:06:40 +00:00
Dr. Stephen Henson
8d7fbd021b
Fix DSA to skip EOL test when parsing mod line.
2011-08-08 14:47:51 +00:00
Dr. Stephen Henson
49e9b97885
Initial support for tests for 2.0 module. Not complete and not all working
...
yet.
Allow test type to be determined by a regexp on the pathname. So tests like:
DSA/SigVer, DSA2/SigVer, ECDSA/SigVer, ECDSA2/SigVer can all be
distinguished.
2011-08-08 14:47:04 +00:00
Andy Polyakov
267b481c47
aes/asm/aesni-*.pl: fix CCM and further optimize it.
...
modes/ccm128.c: minor branch optimization.
2011-08-07 17:47:56 +00:00
Dr. Stephen Henson
8a8cc84f74
fix memory leak
2011-08-03 16:39:58 +00:00
Dr. Stephen Henson
28dd49faec
Expand range of ctrls for AES GCM to support retrieval and setting of
...
invocation field.
Add complete support for AES GCM ciphersuites including all those in
RFC5288 and RFC5289.
2011-08-03 15:37:22 +00:00
Dr. Stephen Henson
3699ec6056
recognise ecdsaWithSHA1 OID
2011-07-28 14:40:01 +00:00
Dr. Stephen Henson
a678580bb8
Fix warnings.
2011-07-25 21:58:11 +00:00
Dr. Stephen Henson
fe8aeffa92
Update CHANGES.
2011-07-25 21:43:57 +00:00
Dr. Stephen Henson
31475a370c
oops, remove debug option
2011-07-25 21:38:41 +00:00
Dr. Stephen Henson
d09677ac45
Add HMAC ECC ciphersuites from RFC5289. Include SHA384 PRF support and
...
prohibit use of these ciphersuites for TLS < 1.2
2011-07-25 20:41:32 +00:00
Andy Polyakov
2667162d33
cryptlib.c: OPENSSL_ia32cap environment variable to interpret ~ as cpuid mask.
2011-07-23 12:10:26 +00:00
Dr. Stephen Henson
66b86a4fd5
More symbol renaming.
2011-07-22 14:29:27 +00:00
Dr. Stephen Henson
1d5121552d
Make sure OPENSSL_FIPSCANISTER is visible to ARM assembly language files.
2011-07-22 14:20:50 +00:00
Andy Polyakov
057037e719
util/incore: fix brown-bag bug.
2011-07-22 10:24:40 +00:00
Andy Polyakov
b7724f6f55
util/incore: make transition smoother.
2011-07-22 10:13:52 +00:00
Andy Polyakov
167cb62537
fips_canister.c: add support for embedded ppc linux.
2011-07-22 09:42:11 +00:00
Dr. Stephen Henson
4f275f248e
stop warnings
2011-07-21 13:45:06 +00:00
Dr. Stephen Henson
1ad2e14aaa
Rename another symbol.
2011-07-21 13:43:19 +00:00
Andy Polyakov
7b41f350d4
aes-ppc.pl: minor optimization favoring embedded processors (performance
...
of "big" processors is unaffected).
2011-07-20 22:16:27 +00:00
Andy Polyakov
be9a8cc2af
Add RSAX builtin engine. It optimizes RSA1024 sign benchmark.
2011-07-20 21:49:46 +00:00
Dr. Stephen Henson
dafce90ae5
PR: 2559
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS socket error bug
2011-07-20 15:22:11 +00:00
Dr. Stephen Henson
0445ab3ae0
PR: 2555
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS sequence number bug
2011-07-20 15:17:51 +00:00
Dr. Stephen Henson
bb48f4ce6e
PR: 2550
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS HelloVerifyRequest Timer bug
2011-07-20 15:14:24 +00:00
Andy Polyakov
9df286b13a
sha512-sparcv9.pl: minor optimization of sha256.
2011-07-18 11:34:07 +00:00
Dr. Stephen Henson
81c2920849
Add support for ECCCDH test format.
2011-07-18 00:45:05 +00:00
Andy Polyakov
87873f4328
ARM assembler pack: add platform run-time detection.
2011-07-17 17:40:29 +00:00
Dr. Stephen Henson
9fe51d5f73
PR: 2556 (partial)
...
Reported by: Daniel Marschall <daniel-marschall@viathinksoft.de >
Reviewed by: steve
Fix OID routines.
Check on encoding leading zero rejection should start at beginning of
encoding.
Allow for initial digit when testing when to use BIGNUMs which can increase
first value by 2 * 40.
2011-07-14 12:01:53 +00:00
Andy Polyakov
b79853c262
fips/Makefile: HP-UX-specific update.
2011-07-13 22:30:33 +00:00
Andy Polyakov
b429c4cbb9
ms/uplink.c: fix Visual Studio 2010 warning.
2011-07-13 14:54:38 +00:00
Andy Polyakov
2966c2ec31
config: detect if assembler supports --noexecstack and pass it down.
2011-07-13 14:23:19 +00:00
Andy Polyakov
4195a369fd
perlasm/cbc.pl: fix tail processing bug.
...
PR: 2557
2011-07-13 06:20:30 +00:00
Andy Polyakov
146e1fc7b3
ssl/ssl_ciph.c: allow to switch to predefined "composite" cipher/mac
...
combos that can be implemented as AEAD ciphers.
2011-07-11 14:00:43 +00:00
Andy Polyakov
7532071aa3
ssl/t1_enc.c: initial support for AEAD ciphers.
2011-07-11 13:58:59 +00:00
Andy Polyakov
a355cf9bf5
evp.h: add flag to distinguish AEAD ciphers and pair of control codes...
2011-07-11 13:54:53 +00:00
Bodo Möller
735ebc2de7
Fix typo.
...
Submitted by: Jim Morrison
2011-07-11 12:13:55 +00:00
Richard Levitte
b520e4b1d5
Add a tool that (semi)automatically created the API documentation
...
required for FIPS.
2011-07-05 15:40:58 +00:00
Dr. Stephen Henson
449f2517c6
Rename symbol.
2011-07-05 11:12:41 +00:00
Andy Polyakov
6179f06077
x86_64-mont.pl: add squaring procedure and improve RSA sign performance
...
by up to 38% (4096-bit benchmark on Core2).
2011-07-05 09:21:03 +00:00
Dr. Stephen Henson
01a9a7592e
Add functions to return FIPS module version.
2011-07-04 23:38:16 +00:00
Andy Polyakov
6fa4c7c43b
x86_64-xlate.pl: sha1 and md5 warnings made it to nasm 2.09, extend gnu
...
assembler workaround to all assemblers.
2011-07-04 13:10:50 +00:00
Andy Polyakov
169a274a41
sha1-x86_64.pl: nasm 2.07 screws up labels if AVX path is compiled.
2011-07-04 13:00:24 +00:00
Andy Polyakov
02a73e2bed
s390x-gf2m.pl: commentary update (final performance numbers turned to be
...
higher).
2011-07-04 11:20:33 +00:00
Dr. Stephen Henson
c540aa2fb1
If make clean fails it is not a fatal error.
2011-07-03 12:35:06 +00:00
Dr. Stephen Henson
eca7358be3
Additional error checking.
2011-07-02 15:57:35 +00:00
Andy Polyakov
da5e9871e9
sha1-x86_64.pl: fix win64-specific typos and add masm support.
2011-07-01 21:23:13 +00:00
Andy Polyakov
94c64f9a1c
x86_64-xlate.pl: masm-specific update.
2011-07-01 21:21:14 +00:00
Dr. Stephen Henson
1f77a27c16
Delete any EXARG value first.
2011-07-01 14:52:09 +00:00
Dr. Stephen Henson
e780b5f1f1
Add no-asm argument to Configure if needed.
2011-07-01 14:43:34 +00:00
Dr. Stephen Henson
01f06617b1
Recognise fipscheck option and call fipsas for WIN64 builds.
2011-06-30 19:18:41 +00:00
Andy Polyakov
be6ddecb8b
crypto/aes/Makefile: make it work on IRIX.
2011-06-28 12:55:39 +00:00
Andy Polyakov
450853cd04
crypto/whrlpool/wp_block.c: harmonize OPENSSL_ia32cap_P.
2011-06-28 12:42:10 +00:00
Andy Polyakov
5a0876cb8c
crypto/sha/asm/sha[1|512]-mips.pl: minor updates.
2011-06-28 12:41:19 +00:00
Andy Polyakov
a908b711ac
rc4-586.pl: add Atom performance results.
2011-06-28 12:36:10 +00:00
Andy Polyakov
2036c9a59a
md5-x86_86.pl: remove redundant instructions.
2011-06-28 12:33:58 +00:00
Andy Polyakov
b247f7387f
crypto/bn/Makefile: fix typo.
2011-06-28 08:52:36 +00:00
Dr. Stephen Henson
bdd454973d
auto detect configuration using KERNEL_BITS and CC
2011-06-27 11:38:48 +00:00
Andy Polyakov
12b1b9a4fa
Configure: clean up linux32-s390x line.
2011-06-27 10:53:27 +00:00
Andy Polyakov
0c237e42a4
s390x assembler pack: add s390x-gf2m.pl and harmonize AES_xts_[en|de]crypt.
2011-06-27 10:00:31 +00:00
Andy Polyakov
0772f3b4f6
rc4-x86_64.pl: commentary update.
2011-06-27 09:46:16 +00:00
Andy Polyakov
0a9a692e4e
Minor x86_64 perlasm update.
2011-06-27 09:45:10 +00:00
Dr. Stephen Henson
fc30530402
Fix CPRNG test for Hash DRBG.
2011-06-26 12:29:26 +00:00
Dr. Stephen Henson
a96b90b66b
typo
2011-06-24 15:30:21 +00:00
Dr. Stephen Henson
d1a70cc9eb
Add stub for HMAC DRBG.
2011-06-24 14:28:34 +00:00
Dr. Stephen Henson
9fa8f3a610
allow KERNEL_BITS to be specified in the environment
2011-06-24 14:04:03 +00:00
Dr. Stephen Henson
dbfa236977
get the filename right
2011-06-24 13:48:18 +00:00
Dr. Stephen Henson
419989d2ec
Add sparcv9cap.c to restricted tarball.
2011-06-24 13:45:44 +00:00
Richard Levitte
021270af37
Add a symbol for the first parameter to OPENSSL_showfatal().
2011-06-23 09:46:27 +00:00
Richard Levitte
ab688c234d
Add symbols for the parameters on a couple more functions.
2011-06-23 09:43:54 +00:00
Dr. Stephen Henson
9a4be82388
PR: 2470
...
Submitted by: Corinna Vinschen <vinschen@redhat.com >
Reviewed by: steve
Don't call ERR_remove_state from DllMain.
2011-06-22 15:38:21 +00:00
Dr. Stephen Henson
861a7e5c9f
PR: 2543
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Correctly handle errors in DTLSv1_handle_timeout()
2011-06-22 15:30:14 +00:00
Dr. Stephen Henson
8038e7e44c
PR: 2540
...
Submitted by: emmanuel.azencot@bull.net
Reviewed by: steve
Prevent infinite loop in BN_GF2m_mod_inv().
2011-06-22 15:24:05 +00:00
Dr. Stephen Henson
b507284c7e
correctly encode OIDs near 2^32
2011-06-22 15:15:58 +00:00
Dr. Stephen Henson
cb551bfab7
typo
2011-06-22 12:59:53 +00:00
Dr. Stephen Henson
2d9fda6241
stop complaints about no CVS version
2011-06-22 12:38:39 +00:00
Dr. Stephen Henson
ce02589259
Now the FIPS capable OpenSSL is available simplify the various FIPS test
...
build options.
All fispcanisterbuild builds only build fipscanister.o and include symbol
renaming.
Move all renamed symbols to fipssyms.h
Update README.FIPS
2011-06-22 12:30:18 +00:00
Dr. Stephen Henson
93dd7d3848
add symbol rename
2011-06-22 11:41:31 +00:00
Dr. Stephen Henson
a52b7b44b2
allow MD5 use for computing old format hash links
2011-06-22 02:18:19 +00:00
Dr. Stephen Henson
ff053fc847
Don't set FIPS rand method at same time as RAND method as this can cause the
...
FIPS library to fail. Applications that want to set the FIPS rand method can do
so explicitly and presumably they know what they are doing...
2011-06-21 17:10:21 +00:00
Dr. Stephen Henson
279a0001b6
Add prototype for null cipher.
2011-06-21 16:14:01 +00:00
Dr. Stephen Henson
af17d99245
make EVP_dss() work for DSA signing
2011-06-20 20:05:51 +00:00
Dr. Stephen Henson
ee033faa43
typo
2011-06-20 19:58:12 +00:00
Dr. Stephen Henson
9ebc37e667
add null cipher to FIPS module
2011-06-20 19:48:44 +00:00
Dr. Stephen Henson
a2ab6986e4
Correction.
2011-06-18 17:21:27 +00:00
Dr. Stephen Henson
0b41fcc2cb
Strip CRs when installing fips_premain.c Correct compat library rule
...
in FIPS mode.
2011-06-18 17:18:25 +00:00
Dr. Stephen Henson
6cdcb92513
Initial FIPS capable OpenSSL information
2011-06-17 21:08:15 +00:00
Dr. Stephen Henson
9945b460e2
Give parameters names in prototypes.
2011-06-17 16:47:41 +00:00
Dr. Stephen Henson
b234848879
Option "fipscheck" which checks to see if FIPS is autodetected in
...
a build. Use this for WIN32 builds.
2011-06-16 16:27:36 +00:00
Dr. Stephen Henson
fdb65c836c
Don't include des.h any more: it is not needed.
2011-06-16 14:12:42 +00:00
Dr. Stephen Henson
c3de647e7d
Update to mk1mf.pl and ms\do_fips.bat to install relevant files for
...
WIN32 FIPS builds.
2011-06-15 21:04:09 +00:00
Bodo Möller
e66cb363d6
Fix the version history: changes going into 1.1.0 that are also going
...
into 1.0.1 should not be listed as "changes between 1.0.1 and 1.0.0".
This makes the OpenSSL_1_0_1-stable and HEAD versions of this file
consistent with each other (the HEAD version has the additional 1.1.0
section, but doesn't otherwise differ).
2011-06-15 14:49:17 +00:00
Dr. Stephen Henson
70051b1d88
set FIPS allow before initialising ctx
2011-06-14 15:25:21 +00:00
Dr. Stephen Henson
bd6386f59c
make sure custom cipher flag doesn't use any mode bits
2011-06-13 23:06:43 +00:00
Dr. Stephen Henson
1d55dd86dd
Allow applications to specify alternative FIPS RAND methods if they
...
are sure they are OK.
API to retrieve FIPS rand method.
2011-06-13 20:28:45 +00:00
Dr. Stephen Henson
38f90d06d7
sync and update ordinals
2011-06-12 15:40:06 +00:00
Dr. Stephen Henson
19cd2049f7
Don't export functions marked as FIPSCAPABLE.
2011-06-12 15:38:36 +00:00
Dr. Stephen Henson
b08e372bf6
Use FIPSCAPABLE for FIPS module functions used in FIPS capable OpenSSL.
2011-06-12 15:37:51 +00:00
Dr. Stephen Henson
0435dc1902
HMAC fips prototypes
2011-06-12 15:02:53 +00:00
Dr. Stephen Henson
e6e7b4e825
CMAC FIPS prototypes.
2011-06-12 14:11:57 +00:00
Dr. Stephen Henson
f41154b206
#undef bn_div_words as it is defined for FIPS builds.
2011-06-10 14:03:27 +00:00
Dr. Stephen Henson
3096d53b46
Update dependencies for m_dss.c too.
2011-06-10 14:00:02 +00:00
Dr. Stephen Henson
068291cd44
Remove x509.h from SHA1 clone digests, update dependencies.
2011-06-10 13:52:44 +00:00
Dr. Stephen Henson
a1a8a71cf7
Install FIPS module in FIPSDIR if set.
2011-06-09 21:52:44 +00:00
Dr. Stephen Henson
603bc9395c
more prototypes in fips.h
2011-06-09 15:18:55 +00:00
Dr. Stephen Henson
da9234130a
Add more prototypes.
2011-06-09 13:50:53 +00:00
Dr. Stephen Henson
ca9335760b
fix memory leak
2011-06-08 15:55:43 +00:00
Dr. Stephen Henson
4960411e1f
Add flags for DH FIPS method.
...
Update/fix prototypes in fips.h
2011-06-08 15:53:08 +00:00
Dr. Stephen Henson
6b6abd627c
Set flags in ECDH and ECDSA methods for FIPS.
2011-06-08 13:52:36 +00:00
Andy Polyakov
7eabad423c
rc4_skey.c: remove dead/redundant code (it's never compiled) and
...
misleading/obsolete comment.
2011-06-06 20:02:26 +00:00
Dr. Stephen Henson
7f0d1be3a6
Add prototypes for some FIPS EC functions.
2011-06-06 15:24:02 +00:00
Dr. Stephen Henson
1c13c122d8
Set SSL_FIPS flag in ECC ciphersuites.
2011-06-06 14:14:41 +00:00
Dr. Stephen Henson
644ce07ecd
Move function prototype to fips.h
2011-06-06 11:56:58 +00:00
Andy Polyakov
17f121de9d
e_aes.c: move AES-NI run-time switch and implement the switch for remaining modes.
2011-06-06 11:40:03 +00:00
Andy Polyakov
4d01f2761d
x86_64cpuid.pl: fix typo.
2011-06-04 13:08:25 +00:00
Andy Polyakov
301799b803
x86[_64]cpuid.pl: add function accessing rdrand instruction.
2011-06-04 12:20:45 +00:00
Richard Levitte
8d515259e2
No spaces in assignements in a shell script...
2011-06-04 09:00:59 +00:00
Dr. Stephen Henson
4f8f8bf3a4
fix error discrepancy
2011-06-03 18:50:24 +00:00
Dr. Stephen Henson
b8b90804b6
license correction, no EAY code included in this file
2011-06-03 17:56:17 +00:00
Dr. Stephen Henson
549c4ad35b
Add "OPENSSL_FIPSCAPABLE" define for a version of OpenSSL which is
...
FIPS capable: i.e. FIPS module is supplied externally.
2011-06-03 16:26:58 +00:00
Dr. Stephen Henson
267229b141
Constify RSA signature buffer.
2011-06-03 12:38:18 +00:00
Dr. Stephen Henson
946f57105f
Typo.
2011-06-02 18:20:55 +00:00
Dr. Stephen Henson
2280dc7c43
Remove FIPS RSA functions from crypto/rsa.
2011-06-02 17:52:39 +00:00
Dr. Stephen Henson
0cabe4e172
Move FIPS RSA function definitions to fips.h
...
New function to lookup digests by NID in module.
Minor optimisation: if supplied hash is NULL to FIPS RSA functions and
we are using PKCS padding get digest NID from otherwise unused saltlen
parameter instead.
2011-06-02 17:30:22 +00:00
Dr. Stephen Henson
b6df360b9e
Simple automated certificate creation demo.
2011-06-01 18:36:49 +00:00
Dr. Stephen Henson
e7ee10d3dc
Clone digest prototypes.
2011-06-01 14:18:28 +00:00
Dr. Stephen Henson
bce1af7762
Add DSA and ECDSA "clone digests" to module for compatibility with old
...
applications.
2011-06-01 14:07:32 +00:00
Dr. Stephen Henson
654ac273c1
typo
2011-06-01 11:10:35 +00:00
Dr. Stephen Henson
8f119a0357
set FIPS permitted flag before initalising digest
2011-05-31 16:24:19 +00:00
Dr. Stephen Henson
06843f826f
Fake CPU caps so fips_standalone_sha1 compiles.
...
Initialise update function for bad digest inits.
2011-05-31 16:22:21 +00:00
Dr. Stephen Henson
1b2047c5c0
Don't round up partitioned premaster secret length if there is only one
...
digest in use: this caused the PRF to fail for an odd premaster secret
length.
2011-05-31 10:34:43 +00:00
Dr. Stephen Henson
eda3766b53
Output supported curves in preference order instead of numerically.
2011-05-30 17:58:13 +00:00
Andy Polyakov
62b6c5c404
e_aes.c: fix typo.
2011-05-30 10:13:42 +00:00
Andy Polyakov
e76cbcf686
e_aes.c: fix aes_cfb1_cipher.
2011-05-30 10:10:05 +00:00
Andy Polyakov
d1fff483d6
e_aes.c: integrate AESNI directly into EVP.
2011-05-30 09:16:01 +00:00
Andy Polyakov
8da721ee2b
aesni-x86[_64].pl: relax alignment requirement.
2011-05-30 09:15:16 +00:00
Dr. Stephen Henson
3e2e231852
Add more cipher prototypes.
2011-05-29 16:16:55 +00:00
Dr. Stephen Henson
87829ac926
Prototypes for more FIPS functions for use in FIPS capable OpenSSL.
2011-05-29 15:56:23 +00:00
Andy Polyakov
fe9a5107be
Various mingw64 fixes.
2011-05-29 13:51:14 +00:00
Andy Polyakov
afa4b38671
sha1-586|x86_64.pl: minor portability fix.
2011-05-29 13:48:57 +00:00
Andy Polyakov
18f5603c53
x86cpuid.pl: last commit broke platforms with perl with 64-bit integer.
2011-05-29 12:50:02 +00:00
Andy Polyakov
0c149802a2
sha1-586|x86_64.pl: add SSSE3 and AVX code paths.
2011-05-29 12:39:48 +00:00
Dr. Stephen Henson
c33066900c
Add FIPS_digestinit prototype for FIPS capable OpenSSL.
2011-05-28 23:02:23 +00:00
Dr. Stephen Henson
f87ff24bc4
Add prototypes for FIPS EVP implementations: for use in FIPS capable
...
OpenSSL.
2011-05-28 21:03:31 +00:00
Andy Polyakov
cf3aeae419
aes-ppc.pl: handle unaligned data on page boundaries.
2011-05-28 09:41:36 +00:00
Dr. Stephen Henson
9a205e5981
Rename many internal only module functions from FIPS_* to fips_*.
2011-05-27 21:11:54 +00:00
Andy Polyakov
f44cb15fab
rc4-x86_64.pl: fix due credit.
2011-05-27 18:58:37 +00:00
Andy Polyakov
986289604e
rc4-x86_64.pl: RC4_options fix-up.
2011-05-27 16:15:12 +00:00
Andy Polyakov
4bb90087d7
x86[_64]cpuid.pl: harmonize usage of reserved bits #20 and #30 .
2011-05-27 15:32:43 +00:00
Andy Polyakov
6715034002
PPC assembler pack: adhere closer to ABI specs, add PowerOpen traceback data.
2011-05-27 13:32:34 +00:00
Andy Polyakov
0ca9a483af
rc4-x86_64.pl: major optimization for contemporary Intel CPUs.
2011-05-27 09:51:09 +00:00
Andy Polyakov
0dff8ba248
rc4-586.pl: optimize even further...
2011-05-27 09:46:19 +00:00
Dr. Stephen Henson
eb62cd807b
Typo.
2011-05-26 22:01:49 +00:00
Dr. Stephen Henson
64f5178d67
Use FIPSLD_LIBCRYPTO for consistency with other env variables in fipsld.
...
Use current directory for fips_premain_dso
2011-05-26 21:20:14 +00:00
Dr. Stephen Henson
e558c2aa3f
In fipsld use FIPSLIBCRYPTO environment variable to specify an alternative
...
location for libcrypto.a, support shared library builds in different
source tree.
2011-05-26 21:15:45 +00:00
Dr. Stephen Henson
ed0a35f222
Install fips_standalone_sha1 and make use of it in fipsld script.
2011-05-26 13:59:11 +00:00
Andy Polyakov
2bc3ad28b3
x86_64cpuid.pl: get AVX masking right.
2011-05-26 13:16:26 +00:00
Dr. Stephen Henson
d67813f878
Only install FIPS related files for fipscanisteronly build.
2011-05-26 11:00:06 +00:00
Dr. Stephen Henson
ecfe2d1753
More symbol renaming.
2011-05-25 16:01:37 +00:00
Dr. Stephen Henson
ebc5e72fe5
Don't advertise or use MD5 for TLS v1.2 in FIPS mode
2011-05-25 15:31:32 +00:00
Dr. Stephen Henson
3d52f1d52b
PR: 2533
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Setting SSL_MODE_RELEASE_BUFFERS should be ignored for DTLS, but instead causes
the program to crash. This is due to missing version checks and is fixed with
this patch.
2011-05-25 15:20:49 +00:00
Dr. Stephen Henson
fd60dfa0f2
PR: 2529
...
Submitted by: Marcus Meissner <meissner@suse.de >
Reviewed by: steve
Call ssl_new() to reallocate SSL BIO internals if we want to replace
the existing internal SSL structure.
2011-05-25 15:16:10 +00:00
Dr. Stephen Henson
be1242cbd1
PR: 2527
...
Submitted by: Marcus Meissner <meissner@suse.de >
Reviewed by: steve
Set cnf to NULL to avoid possible double free.
2011-05-25 15:05:39 +00:00
Dr. Stephen Henson
a26e245ecd
Fix the ECDSA timing attack mentioned in the paper at:
...
http://eprint.iacr.org/2011/232.pdf
Thanks to the original authors Billy Bob Brumley and Nicola Tuveri for
bringing this to our attention.
2011-05-25 14:52:21 +00:00
Dr. Stephen Henson
992bdde62d
Fix the ECDSA timing attack mentioned in the paper at:
...
http://eprint.iacr.org/2011/232.pdf
Thanks to the original authors Billy Bob Brumley and Nicola Tuveri for
bringing this to our attention.
2011-05-25 14:41:56 +00:00
Dr. Stephen Henson
bbcf3a9b30
Some nextproto patches broke DTLS: fix
2011-05-25 14:31:47 +00:00
Dr. Stephen Henson
006b54a8eb
Oops use up to date patch for PR#2506
2011-05-25 14:30:20 +00:00
Dr. Stephen Henson
44ddb27fa6
PR: 2512
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix BIO_accept so it can be bound to IPv4 or IPv6 sockets consistently.
2011-05-25 12:37:07 +00:00
Dr. Stephen Henson
7832d6ab1c
PR: 2506
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fully implement SSL_clear for DTLS.
2011-05-25 12:28:06 +00:00
Dr. Stephen Henson
ee4b5cebef
PR: 2505
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS session resumption timer bug.
2011-05-25 12:25:01 +00:00
Dr. Stephen Henson
238b63613b
use TLS1_get_version macro to check version so TLS v1.2 changes don't interfere with DTLS
2011-05-25 11:43:07 +00:00
Andy Polyakov
87f6b97e89
e_padlock.c: fix typo.
2011-05-25 10:02:20 +00:00
Andy Polyakov
6a99984b57
rc4-586.pl: optimize unused code path.
2011-05-25 09:36:13 +00:00
Andy Polyakov
67d8487bb8
e_padlock.c: last x86_64 commit didn't work with some optimizers.
2011-05-24 17:18:19 +00:00
Andy Polyakov
760d2551fb
rc4-586.pl: 50% improvement on Core2 and 80% on Westmere.
2011-05-24 13:07:29 +00:00
Dr. Stephen Henson
73ab341130
PR: 2522
...
Submitted by: Henrik Grindal Bakken <henribak@cisco.com >
Don't compare past end of buffer.
2011-05-23 12:27:43 +00:00
Andy Polyakov
62f29eb1cf
spacrv9cap.c: addenum to recent EC optimizations.
2011-05-23 08:14:32 +00:00
Andy Polyakov
f8501464cc
aesni-x86[_64].pl: optimize for Sandy Bridge and add XTS mode.
2011-05-22 18:38:00 +00:00
Andy Polyakov
96abea332c
x86_64-gf2m.pl: add Win64 SEH.
2011-05-22 18:29:11 +00:00
Andy Polyakov
2e75ed332f
ppccap.c: addenum to recent EC optimizations.
2011-05-21 10:17:02 +00:00
Andy Polyakov
d8ea368c41
ec_cvt.c: ARM comparison results were wrong, clarify the background.
2011-05-21 08:40:18 +00:00
Andy Polyakov
fdf6dac859
ec_cvt.c: avoid EC_GFp_nist_method on platforms with bn_mul_mont [see
...
commentary for details].
2011-05-20 20:31:37 +00:00
Dr. Stephen Henson
f37f20ffd3
PR: 2295
...
Submitted by: Alexei Khlebnikov <alexei.khlebnikov@opera.com >
Reviewed by: steve
OOM checking. Leak in OOM fix. Fall-through comment. Duplicate code
elimination.
2011-05-20 14:56:29 +00:00
Dr. Stephen Henson
101e6e19f2
Add CHANGES entry: add FIPS support to ssl
2011-05-19 18:10:25 +00:00
Dr. Stephen Henson
086e32a6c7
Implement FIPS_mode and FIPS_mode_set
2011-05-19 18:09:02 +00:00
Dr. Stephen Henson
05b4fc6c22
oops
2011-05-19 17:55:15 +00:00
Dr. Stephen Henson
0fba7a8fa8
update date
2011-05-19 17:53:04 +00:00
Dr. Stephen Henson
92b4d936cb
inherit HMAC flags from MD_CTX
2011-05-19 17:38:25 +00:00
Dr. Stephen Henson
4f7533eb84
set encodedPoint to NULL after freeing it
2011-05-19 16:17:47 +00:00
Andy Polyakov
fb2f3411ea
aesni-x86_64.pl: make it compile on MacOS X.
2011-05-18 17:05:24 +00:00
Andy Polyakov
c30a2505e2
x86gas.pl: don't omit .comm OPENSSL_ia32cap_P on MacOS X.
2011-05-18 16:28:53 +00:00
Andy Polyakov
c7b903e01d
x86_64-xlate.pl: add inter-register movq and make x86_64-gfm.s compile on
...
Solaris, MacOS X, elderly gas...
2011-05-18 16:26:03 +00:00
Andy Polyakov
ddc20d4da9
x86_64cpuid.pl: allow shared build to work without -Bsymbolic.
...
PR: 2466
2011-05-18 16:24:19 +00:00
Andy Polyakov
b50842036f
e_padlock.c: make it compile on MacOS X.
2011-05-18 16:21:54 +00:00
Andy Polyakov
b906422149
x86[_64]cpuid.pl: handle new extensions.
2011-05-16 20:35:11 +00:00
Andy Polyakov
a3e07010b4
ppc-xlate.pl: get linux64 declaration right.
2011-05-16 19:52:41 +00:00
Andy Polyakov
9c437e2fad
cms-test.pl: make it work with not-so-latest perl.
2011-05-16 18:11:45 +00:00
Andy Polyakov
2b9a8ca15b
x86gas.pl: add palignr and move pclmulqdq.
2011-05-16 18:07:00 +00:00
Andy Polyakov
afebe623c5
x86_64 assembler pack: add x86_64-gf2m module.
2011-05-16 17:46:45 +00:00
Andy Polyakov
b5c6aab57e
x86_64-xlate.pl: allow "base-less" effective address, add palignr, move
...
pclmulqdq.
2011-05-16 17:44:38 +00:00
Dr. Stephen Henson
b9b0a177f8
new flag to stop ENGINE methods being registered
2011-05-15 15:56:49 +00:00
Dr. Stephen Henson
9609ea869d
NULL is a valid cspname
2011-05-15 11:44:14 +00:00
Dr. Stephen Henson
ff636340f5
Typo.
2011-05-13 12:43:41 +00:00
Dr. Stephen Henson
3ece592886
typo
2011-05-13 12:37:40 +00:00
Dr. Stephen Henson
a75829deef
Recognise NO_NISTP224-64-GCC-128
2011-05-13 12:35:05 +00:00
Dr. Stephen Henson
d39c495130
Enter FIPS mode by calling FIPS_module_mode_set in openssl.c until
...
FIPS_mode_set is implemented.
2011-05-12 17:59:47 +00:00
Dr. Stephen Henson
855a54a9a5
Provisional support for TLS v1.2 client authentication: client side only.
...
Parse certificate request message and set digests appropriately.
Generate new TLS v1.2 format certificate verify message.
Keep handshake caches around for longer as they are needed for client auth.
2011-05-12 17:35:03 +00:00
Dr. Stephen Henson
8f82912460
Process signature algorithms during TLS v1.2 client authentication.
...
Make sure message is long enough for signature algorithms.
2011-05-12 14:38:01 +00:00
Dr. Stephen Henson
f76b1baf86
Fix error discrepancy.
2011-05-12 14:28:09 +00:00
Dr. Stephen Henson
b1d00b9611
Add SSL_INTERN definition.
2011-05-12 13:13:07 +00:00
Dr. Stephen Henson
c76e024dde
Sync ordinals.
2011-05-11 23:04:10 +00:00
Dr. Stephen Henson
4f7a2ab8b1
make kerberos work with OPENSSL_NO_SSL_INTERN
2011-05-11 22:50:18 +00:00
Andy Polyakov
b0188c4f07
bn_nist.c: fix shadowing warnings.
2011-05-11 20:19:00 +00:00
Andy Polyakov
f24e95b72c
fips_canister.c: pick more neutral macro name.
2011-05-11 20:17:06 +00:00
Dr. Stephen Henson
fc101f88b6
Reorder signature algorithms in strongest hash first order.
2011-05-11 16:33:28 +00:00
Dr. Stephen Henson
2f38b38986
Set FIPS mode for values other than 1. The only current effect
...
is to return a consistent value. So calling FIPS_module_mode_set(n)
for n != 0 will result in FIPS_module_mode() returning n. This
will support future expansion of more FIPS modes e.g. a Suite B mode.
2011-05-11 14:49:01 +00:00
Dr. Stephen Henson
c2fd598994
Rename FIPS_mode_set and FIPS_mode. Theses symbols will be defined in
...
the FIPS capable OpenSSL.
2011-05-11 14:43:38 +00:00
Dr. Stephen Henson
5024b79f5c
Inlcude README.ECC in FIPS restricted tarball.
2011-05-11 12:52:51 +00:00
Dr. Stephen Henson
c5ee394b58
Add NSA sublicense info.
2011-05-11 12:50:57 +00:00
Dr. Stephen Henson
21a40da045
Update instructions.
2011-05-10 10:59:25 +00:00
Dr. Stephen Henson
7919c07947
Typo.
2011-05-10 10:57:03 +00:00
Andy Polyakov
ab67c517ae
fips_canister.c: fix typo.
2011-05-10 10:03:23 +00:00
Andy Polyakov
31b46ebb62
fips_canister.c: initial support for cross-compiling. "Initial" refers
...
to the two-entry list of verified platforms in #ifndef
FIPS_REF_POINT_IS_SAFE_TO_CROSS_COMPILE pre-processor section.
2011-05-10 09:53:59 +00:00
Dr. Stephen Henson
dc7995eeb8
Initialise rc.
2011-05-09 21:21:29 +00:00
Dr. Stephen Henson
a2f9200fba
Initial TLS v1.2 client support. Include a default supported signature
...
algorithms extension (including everything we support). Swicth to new
signature format where needed and relax ECC restrictions.
Not TLS v1.2 client certifcate support yet but client will handle case
where a certificate is requested and we don't have one.
2011-05-09 15:44:01 +00:00
Dr. Stephen Henson
0b59755f43
Call fipsas.pl directly for pa-risc targets.
2011-05-09 15:23:00 +00:00
Andy Polyakov
1fb97e1313
Optimized bn_nist.c. Performance improvement varies from one benchmark
...
and platform to another. It was measured to deliver 20-30% better
performance on x86 platforms and 30-40% on x86_64, on nistp384 benchmark.
2011-05-09 10:16:32 +00:00
Dr. Stephen Henson
fc683d7213
allow SHA384, SHA512 wit DSA
2011-05-08 12:38:35 +00:00
Dr. Stephen Henson
03bc500a9f
Remove gf2m modules from bn_asm if no-ec2m set.
2011-05-07 22:56:56 +00:00
Dr. Stephen Henson
bfe1d2f895
Remove FIXME comments.
2011-05-07 22:37:58 +00:00
Dr. Stephen Henson
ed1afd327d
Omit GF2m properly this time ;-)
2011-05-07 22:36:03 +00:00
Dr. Stephen Henson
dacdd5203d
Don't include GF2m source files is NOEC2M set.
2011-05-07 22:22:37 +00:00
Andy Polyakov
56c5f703c1
IA-64 assembler pack: fix typos and make it work on HP-UX.
2011-05-07 20:36:05 +00:00
Andy Polyakov
58cc21fdea
x86 assembler pack: add bn_GF2m_mul_2x2 implementations (see x86-gf2m.pl for
...
details and performance data).
2011-05-07 10:31:06 +00:00
Dr. Stephen Henson
4fa3c4c3e9
Fixes for WIN64 FIPS build.
2011-05-06 23:47:23 +00:00
Dr. Stephen Henson
524289baa5
Get OPENSSL_FIPSSYMS from environment in fipsas.pl, include ppccap.c and .S
...
files in fipsdist.
2011-05-06 21:42:34 +00:00
Dr. Stephen Henson
2677d85631
Don't fail WIN32 builds on warnings.
2011-05-06 17:55:59 +00:00
Dr. Stephen Henson
ad4784953d
Return error codes for selftest failure instead of hard assertion errors.
2011-05-06 17:38:39 +00:00
Dr. Stephen Henson
6b7be581e5
Continuing TLS v1.2 support: add support for server parsing of
...
signature algorithms extension and correct signature format for
server key exchange.
All ciphersuites should now work on the server but no client support and
no client certificate support yet.
2011-05-06 13:00:07 +00:00
Dr. Stephen Henson
c184711124
Hide more symbols.
2011-05-05 23:10:32 +00:00
Andy Polyakov
925596f85b
ARM assembler pack: engage newly introduced armv4-gf2m module.
2011-05-05 21:57:11 +00:00
Dr. Stephen Henson
8d3cdd5b58
Fix warning of signed/unsigned comparison.
2011-05-05 14:47:38 +00:00
Andy Polyakov
75359644d0
ARM assembler pack. Add bn_GF2m_mul_2x2 implementation (see source code
...
for details and performance data).
2011-05-05 07:21:17 +00:00
Dr. Stephen Henson
6313d628da
Remove superfluous PRNG self tests.
...
Print timer resolution.
2011-05-04 23:17:29 +00:00
Andy Polyakov
c7d0d0ae09
xts128.c: minor optimizaton.
2011-05-04 20:57:43 +00:00
Dr. Stephen Henson
c9adde0699
Update status.
2011-05-04 18:43:32 +00:00
Dr. Stephen Henson
614dd926cb
Remove debugging print.
...
Explicitly use LINKDIRS for fipsdist links.
2011-05-04 18:33:42 +00:00
Andy Polyakov
034688ec4d
bn_gf2m.c: optimized BN_GF2m_mod_inv delivers sometimes 2x of ECDSA sign.
...
Exact improvement coefficients vary from one benchmark and platform to
another, e.g. it performs 70%-33% better on ARM, hereafter less for
longer keys, and 100%-90% better on x86_64.
2011-05-04 15:22:53 +00:00
Dr. Stephen Henson
d16765919d
Fix warning.
2011-05-04 14:34:36 +00:00
Dr. Stephen Henson
a95bbadb57
Include fipssyms.h for ARM builds to translate symbols.
...
Translate arm symbol to fips_*.
2011-05-04 14:16:03 +00:00
Dr. Stephen Henson
e350458a63
Remove useless setting.
2011-05-04 01:09:52 +00:00
Dr. Stephen Henson
e9093c9832
PR: 2499
...
Submitted by: "James 'J.C.' Jones" <james.jc.jones@gmail.com >
Typos.
2011-05-02 23:29:57 +00:00
Dr. Stephen Henson
2e2a962aad
Fix do_fips script.
2011-05-02 17:11:54 +00:00
Dr. Stephen Henson
9243a86d75
Use faster curves for ECDSA self test.
2011-05-02 12:13:04 +00:00
Dr. Stephen Henson
fc98a4377d
Use more portable clock_gettime() for fips_test_suite timing.
...
Output times of each subtest.
2011-05-02 11:09:38 +00:00
Dr. Stephen Henson
fd600c0037
Stop warning in VxWorks.
2011-05-01 20:55:05 +00:00
Dr. Stephen Henson
a32ad6891b
Quick hack to time POST.
2011-05-01 20:54:42 +00:00
Dr. Stephen Henson
2325315ba3
Two more symbol renames.
2011-05-01 19:07:16 +00:00
Dr. Stephen Henson
8a2024ea59
Handle multiple CPUID_OBJ correctly.
2011-05-01 19:06:39 +00:00
Dr. Stephen Henson
42c7c6764e
Rename some more symbols.
2011-05-01 17:51:40 +00:00
Dr. Stephen Henson
9f7b2c76b1
Include crypto.h in ppccap.c
2011-05-01 16:54:24 +00:00
Dr. Stephen Henson
1c6807c9d6
Add ppc_cap.c to restricted tarball.
2011-05-01 16:46:28 +00:00
Dr. Stephen Henson
bd4b0137fc
For FIPS algorithm test utilities use our own version of strcasecmp and
...
strncasecmp to cover cases where platforms don't support them.
2011-05-01 16:18:52 +00:00
Dr. Stephen Henson
2f6efd6acb
Some changes to support VxWorks in the validted module.
2011-05-01 15:36:54 +00:00
Dr. Stephen Henson
823df31be7
Disable SHA256 if not supported.
2011-05-01 15:36:16 +00:00
Dr. Stephen Henson
ee872e99f7
Update symbol translation table.
2011-05-01 14:33:59 +00:00
Dr. Stephen Henson
9a85e53813
no need to include memory.h
2011-04-30 23:37:42 +00:00
Dr. Stephen Henson
7409d7ad51
Initial incomplete TLS v1.2 support. New ciphersuites added, new version
...
checking added, SHA256 PRF support added.
At present only RSA key exchange ciphersuites work with TLS v1.2 as the
new signature format is not yet implemented.
2011-04-29 22:56:51 +00:00
Dr. Stephen Henson
08557cf22c
Initial "opaque SSL" framework. If an application defines
...
OPENSSL_NO_SSL_INTERN all ssl related structures are opaque
and internals cannot be directly accessed. Many applications
will need some modification to support this and most likely some
additional functions added to OpenSSL.
The advantage of this option is that any application supporting
it will still be binary compatible if SSL structures change.
2011-04-29 22:37:12 +00:00
Dr. Stephen Henson
c4d162873f
Don't assume version of rm supports -rf: use RM instead.
2011-04-28 20:52:21 +00:00
Dr. Stephen Henson
1eb8939695
Stop warnings about undefined _exit on Android.
...
Additional script output options to fipsalgtest.pl
2011-04-28 12:20:12 +00:00
Dr. Stephen Henson
7c50694f05
Fix warning.
2011-04-24 12:40:26 +00:00
Dr. Stephen Henson
7979626995
Recognise invalid enable/disable options.
...
Option to shut up bogus warnings.
2011-04-24 12:13:32 +00:00
Dr. Stephen Henson
c36ce81cf5
Clarification.
2011-04-24 11:38:22 +00:00
Andy Polyakov
3f0d14055b
gcm128.c: minor optimization.
2011-04-24 11:10:54 +00:00
Andy Polyakov
f855b9d719
ccm128.c: add CRYPTO_ccm128_[en|de]crypt_ccm64 and minor optimization.
2011-04-24 11:10:14 +00:00
Richard Levitte
ce67647605
fips_check_dsa_prng() should only be built when OPENSSL_FIPS is defined.
2011-04-24 10:07:17 +00:00
Richard Levitte
171edf7ff4
Error discrepancy corrected.
2011-04-24 08:59:15 +00:00
Dr. Stephen Henson
69a80f7d5e
More fixes for DSA FIPS overrides.
2011-04-23 21:59:12 +00:00
Dr. Stephen Henson
dc03504d09
Make sure overrides work for RSA/DSA.
2011-04-23 21:15:05 +00:00
Dr. Stephen Henson
383bc117bb
Oops, work out expanded buffer length before allocating it...
2011-04-23 20:24:55 +00:00
Dr. Stephen Henson
e0d1a2f80a
Always return multiple of block length bytes from default DRBG seed
...
callback.
Handle case where no multiple of the block size is in the interval
[min_len, max_len].
2011-04-23 20:05:19 +00:00
Dr. Stephen Henson
cac4fb58e0
Add PRNG security strength checking.
2011-04-23 19:55:55 +00:00
Andy Polyakov
9e5fe439b4
xts128.c: fix bug introduced in commit#20704. Bug affected encryption of
...
vectors whose lenght was not multiples of 16 bytes.
2011-04-23 09:15:03 +00:00
Dr. Stephen Henson
74fac927b0
Return errors instead of aborting when selftest fails.
2011-04-22 11:12:56 +00:00
Dr. Stephen Henson
da9ead8db2
Add XTS test vector support to fipsalgtest.pl
2011-04-22 01:05:53 +00:00
Dr. Stephen Henson
bef5013961
Rewrite OutputValue to avoid use of buffer when printing out hex values.
...
Delete unused functions from fips_utl.h.
Increase xts line buffer.
2011-04-22 00:41:35 +00:00
Dr. Stephen Henson
79170bc97a
Initial do_fips.bat build script for WIN32 fipscanister.
2011-04-21 21:06:12 +00:00
Dr. Stephen Henson
95c9e774f9
Reconise no-ec-nistp224-64-gcc-128 option.
2011-04-21 20:55:35 +00:00
Dr. Stephen Henson
e161120eff
Make fipscanisteronly auto detect work on WIN32.
2011-04-21 16:58:51 +00:00
Dr. Stephen Henson
84ed90f88b
Fix WIN32 warning.
2011-04-21 14:54:33 +00:00
Dr. Stephen Henson
065d050e7a
Update ordinals.
2011-04-21 14:54:13 +00:00
Dr. Stephen Henson
b8b6a13a56
Add continuous RNG test to entropy source. Entropy callbacks now need
...
to specify a "block length".
2011-04-21 14:17:15 +00:00
Dr. Stephen Henson
7608978861
Update DRBG to use new POST scheme.
2011-04-20 18:05:05 +00:00
Dr. Stephen Henson
14264b19de
Add periodic DRBG health checks as required by SP800-90.
2011-04-20 17:06:38 +00:00
Dr. Stephen Henson
8da18ea1a5
Add partial GCM tests to fipsalgtest.pl
2011-04-20 15:06:44 +00:00
Dr. Stephen Henson
7aaa88e55c
Add partial DH and ECDH primitives only testing to fipsalgtest.pl
2011-04-20 14:33:39 +00:00
Dr. Stephen Henson
84c7a8f7dc
Warn if lines are truncated in algorithm test utilities.
...
Support for new test files: DRBG and CCM.
2011-04-20 13:20:31 +00:00
Andy Polyakov
daaf5088fd
xts128.c: minor optimization and clarified prototype.
2011-04-20 08:13:58 +00:00
Andy Polyakov
e382e4e603
perlasm/x86gas.pl: make OPENSSL_instrument_bus[2] compile.
2011-04-19 19:09:18 +00:00
Dr. Stephen Henson
cb1b3aa151
Add AES CCM selftest.
2011-04-19 18:57:58 +00:00
Dr. Stephen Henson
8c7096835b
Use 0 for tbslen to perform strlen.
2011-04-19 11:10:54 +00:00
Dr. Stephen Henson
befcced53e
Add fips/cmac directory to WIN32 build.
2011-04-18 23:30:59 +00:00
Dr. Stephen Henson
b5dd178740
Fix EVP CCM decrypt. Add decrypt support to algorithm test program.
2011-04-18 22:48:40 +00:00
Dr. Stephen Henson
98279c1629
Typo.
2011-04-18 21:01:24 +00:00
Andy Polyakov
a0cc46f8e4
ccm128.c: fix Win32 compiler warning.
2011-04-18 20:19:23 +00:00
Andy Polyakov
70d01a7f82
perlasm/x86[nm]asm.pl: make OPENSSL_instrument_bus[2] compile.
2011-04-18 20:18:03 +00:00
Andy Polyakov
5f1b10ed2e
ccm128.c: fix STRICT_ALIGNMENT another bug in CRYPTO_ccm128_decrypt.
2011-04-18 19:17:28 +00:00
Dr. Stephen Henson
62dc7ed67c
Override flag for XTS length limit.
2011-04-18 17:31:28 +00:00
Dr. Stephen Henson
b3a45e7db5
CCM encrypt algorithm test support.
2011-04-18 16:31:11 +00:00
Dr. Stephen Henson
2391681082
Initial untested CCM support via EVP.
2011-04-18 14:25:11 +00:00
Dr. Stephen Henson
6386b1b34d
Compile ccm128.c, move some structures to modes_lcl.h add prototypes.
2011-04-18 13:15:37 +00:00
Dr. Stephen Henson
3b4a855778
Don't need separate tag buffer for GCM mode: use EVP_CIPHER_CTX buf
...
field which is not unused for custom ciphers.
2011-04-18 11:28:41 +00:00
Dr. Stephen Henson
ca8630ba81
Remove shlib_wrap.sh as it is not needed (all algorithm tests are
...
staticly linked to fipscanister.o). Add option to generate a shell
script to run all tests: this is useful for platforms that don't have
perl.
2011-04-17 15:39:47 +00:00
Andy Polyakov
5fabb88a78
Multiple assembler packs: add experimental memory bus instrumentation.
2011-04-17 12:46:00 +00:00
Dr. Stephen Henson
764ef43962
Remove PSS salt length detection hack from fipslagtest.pl by allowing a regexp
...
search of the file to determine its type. This will be needed for other tests
later...
2011-04-16 23:54:19 +00:00
Andy Polyakov
7e5b4d6779
ccm128.c: minor optimization and bugfix in CRYPTO_ccm128_[en|de]crypt.
2011-04-16 22:57:58 +00:00
Dr. Stephen Henson
75707a324f
Add "post" option to fips_test_suite to run the POST only and exit.
2011-04-15 20:09:34 +00:00
Dr. Stephen Henson
45321c41e2
Add length limitation from SP800-38E.
2011-04-15 12:01:53 +00:00
Dr. Stephen Henson
bf8131f79f
Add XTS selftest, include in fips_test_suite.
2011-04-15 11:30:19 +00:00
Dr. Stephen Henson
06b7e5a0e4
Add algorithm driver for XTS mode. Fix several bugs in EVP XTS implementation.
2011-04-15 02:49:30 +00:00
Dr. Stephen Henson
706735aea3
Add new POST support to X9.31 PRNG.
2011-04-14 18:29:49 +00:00
Dr. Stephen Henson
8f331999f5
Report each cipher used with CMAC tests.
...
Only add one error to error queue if a specific test type fails.
2011-04-14 16:38:20 +00:00
Dr. Stephen Henson
9338f290d1
Revise fips_test_suite to use table of IDs for human readable strings.
...
Modify HMAC selftest callbacks to notify each digest type used.
2011-04-14 16:14:41 +00:00
Dr. Stephen Henson
8038511c27
Update CMAC, HMAC, GCM to use new POST system.
...
Fix crash if callback not set.
2011-04-14 13:10:00 +00:00
Dr. Stephen Henson
a6311f856b
Remove several of the old obsolete FIPS_corrupt_*() functions.
2011-04-14 11:30:51 +00:00
Dr. Stephen Henson
ac892b7aa6
Initial incomplete POST overhaul: add support for POST callback to
...
allow status of POST to be monitored and/or failures induced.
2011-04-14 11:15:10 +00:00
Dr. Stephen Henson
77394d7e8f
Remove duplicate flag.
2011-04-13 00:11:53 +00:00
Dr. Stephen Henson
114c8e220b
Use consistent FIPS tarball name.
...
Add XTS to FIPS build.
Hide XTS symbol names.
2011-04-12 23:59:05 +00:00
Dr. Stephen Henson
32a2d8ddfe
Provisional AES XTS support.
2011-04-12 23:21:33 +00:00
Dr. Stephen Henson
4bd1e895fa
Update fips_pkey_signature_test: use fixed string if supplies tbs is
...
NULL. Always allocate signature buffer.
Update ECDSA selftest to use fips_pkey_signature_test. Add copyright notice
to file.
2011-04-12 17:41:53 +00:00
Dr. Stephen Henson
9b08dbe903
Complete rewrite of FIPS_selftest_dsa(). Use hardcoded 2048 bit DSA key
...
and SHA384. Use fips_pkey_signature_test().
2011-04-12 16:26:52 +00:00
Dr. Stephen Henson
3d607309e6
Update RSA selftest code to use a 2048 bit RSA and only a single KAT
...
for PSS+SHA256
2011-04-12 15:38:34 +00:00
Dr. Stephen Henson
49cb5e0b40
Fix memory leaks: uninstantiate DRBG during health checks. Cleanup md_ctx
...
when performing ECDSA selftest.
2011-04-12 14:28:06 +00:00
Dr. Stephen Henson
e2abfd58cc
Stop warning and fix memory leaks.
2011-04-12 13:02:56 +00:00
Dr. Stephen Henson
364ce53cef
No need to disable leak checking for FIPS builds now we use internal
...
memory callbacks.
2011-04-12 13:01:40 +00:00
Dr. Stephen Henson
6223352683
Update ECDSA selftest to use hard coded private keys. Include tests for
...
prime and binary fields.
2011-04-12 11:49:35 +00:00
Dr. Stephen Henson
1a4d93bfb5
Update fips_premain.c fingerprint.
2011-04-12 11:48:00 +00:00
Dr. Stephen Henson
63c82f8abb
Update copyright year.
...
Zero ciphertext and plaintext temporary buffers.
Check FIPS_cipher() return value.
2011-04-11 21:32:51 +00:00
Dr. Stephen Henson
4fd7256b77
Use correct version number.
2011-04-11 14:55:19 +00:00
Dr. Stephen Henson
1ccc003b82
Add mem_clr.c explicity for no-asm builds.
2011-04-11 14:53:40 +00:00
Dr. Stephen Henson
48da9b8f2a
Fix warning.
2011-04-11 14:52:59 +00:00
Dr. Stephen Henson
6909dccc32
Set length to 41 (40 hex characters + null).
2011-04-11 14:50:11 +00:00
Dr. Stephen Henson
b93e331ba4
Reorder headers to get definitions before they are used.
2011-04-11 14:01:33 +00:00
Dr. Stephen Henson
f9bf6314ea
Don't give dependency warning for fips builds.
...
Give error for "make depend" in restricted tarball builds.
Document how restricted tarballs work.
2011-04-11 00:22:42 +00:00
Dr. Stephen Henson
ac319dd82b
Typo: fix duplicate call.
2011-04-10 23:32:19 +00:00
Dr. Stephen Henson
284e2d2b37
fix fipscanisteronly autodetect
2011-04-10 23:28:24 +00:00
Dr. Stephen Henson
4582626544
Auto detect no-ec2m add option to make no-ec2m tarball.
2011-04-10 18:30:13 +00:00
Dr. Stephen Henson
ccc5784e37
set OPENSSL_FIPSSYMS for restricted buils and auto detect no-ec2m
2011-04-10 17:31:03 +00:00
Dr. Stephen Henson
8742ae6e19
Clarify README.FIPS.
2011-04-10 16:23:31 +00:00
Dr. Stephen Henson
c105c96bac
Auto configure for fips is from restricted tarball.
...
Remove more unnecessary files form fips tarball.
2011-04-10 16:18:19 +00:00
Dr. Stephen Henson
6ceb1e8efb
Remove unused build targets from Makefile.fips, add cmac to dist list.
2011-04-10 01:14:58 +00:00
Dr. Stephen Henson
1f91af5e56
remove ENGINE dependency from ecdh
2011-04-10 01:14:25 +00:00
Dr. Stephen Henson
55e328f580
Add error for health check failure.
...
Rebuild all FIPS error codes to clean out old obsolete codes.
2011-04-09 17:46:31 +00:00
Dr. Stephen Henson
f3823ddfcf
Before initalising a live DRBG (i.e. not in test mode) run a complete health
...
check on a DRBG of the same type.
2011-04-09 17:27:07 +00:00
Dr. Stephen Henson
68ea88b8d1
New function to return security strength of PRNG.
2011-04-09 16:49:59 +00:00
Dr. Stephen Henson
31360957fb
DH keys have an (until now) unused 'q' parameter. When creating
...
from DSA copy q across and if q present generate DH key in the
correct range.
2011-04-07 15:01:48 +00:00
Dr. Stephen Henson
d80399a357
Only use fake rand once per operation. This stops the EC
...
pairwise consistency test interfering with the test.
2011-04-06 23:42:55 +00:00
Dr. Stephen Henson
d7a3ce989c
Update CHANGES.
2011-04-06 23:41:19 +00:00
Dr. Stephen Henson
1ee49722dc
Add fips hmac key to dgst utility.
2011-04-06 23:40:46 +00:00
Dr. Stephen Henson
6653c6f2e8
Update OpenSSL DRBG support code. Use date time vector as additional data.
...
Set FIPS RAND_METHOD at same time as OpenSSL RAND_METHOD.
2011-04-06 23:40:22 +00:00
Dr. Stephen Henson
4c8855b975
Add missing error code strings.
2011-04-06 18:17:05 +00:00
Dr. Stephen Henson
e71bbd26e7
Remove rand files from fipscanister.o
2011-04-06 18:16:44 +00:00
Dr. Stephen Henson
acd410dc15
check buffer is larger enough before overwriting
2011-04-06 18:06:41 +00:00
Dr. Stephen Henson
161cc82df1
updated FIPS status
2011-04-06 13:40:36 +00:00
Dr. Stephen Henson
42bd0a6b3c
Update fipssyms.h to keep all symbols in FIPS,fips namespace.
...
Rename drbg_cprng_test to fips_drbg_cprng_test.
Remove rand files from Makefile.fips.
2011-04-05 15:48:05 +00:00
Dr. Stephen Henson
05e24c87dd
Extensive reorganisation of PRNG handling in FIPS module: all calls
...
now use an internal RAND_METHOD. All dependencies to OpenSSL standard
PRNG are now removed: it is the applications resposibility to setup
the FIPS PRNG and initalise it.
Initial OpenSSL RAND_init_fips() function that will setup the DRBG
for the "FIPS capable OpenSSL".
2011-04-05 15:24:10 +00:00
Dr. Stephen Henson
cab0595c14
Rename deprecated FIPS_rand functions to FIPS_x931. These shouldn't be
...
used by applications directly and the X9.31 PRNG is deprecated by new
FIPS140-2 rules anyway.
2011-04-05 12:42:31 +00:00
Dr. Stephen Henson
856650deb0
FIPS mode support for openssl utility: doesn't work properly yet due
...
to missing DRBG support in libcrypto.
2011-04-04 17:16:28 +00:00
Dr. Stephen Henson
ab1415d2f5
Updated error codes for FIPS library.
2011-04-04 17:05:09 +00:00
Dr. Stephen Henson
f4bd65dae3
Set error code is additional data callback fails.
2011-04-04 17:03:35 +00:00
Dr. Stephen Henson
ac1ee8e877
Use environment when builds libcrypto shared library so CC value is picked up
...
in FIPS builds.
2011-04-04 17:01:58 +00:00
Dr. Stephen Henson
8776ef63c1
Change FIPS locking functions to macros so we get useful line information.
...
Set fips_thread_set properly.
2011-04-04 15:38:21 +00:00
Andy Polyakov
7af0400297
gcm128.c: fix shadow warnings.
2011-04-04 15:24:09 +00:00
Dr. Stephen Henson
1d59fe5267
Disable test fprintf.
2011-04-04 14:52:20 +00:00
Dr. Stephen Henson
ded1999702
Change RNG test to block oriented instead of request oriented, add option
...
to test a "stuck" DRBG.
2011-04-04 14:47:31 +00:00
Dr. Stephen Henson
a255e5bc98
check RAND_pseudo_bytes return value
2011-04-04 14:43:20 +00:00
Dr. Stephen Henson
4058861f69
PR: 2462
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS Retransmission Buffer Bug
2011-04-03 17:14:35 +00:00
Dr. Stephen Henson
f74a0c0c93
PR: 2458
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Don't change state when answering DTLS ClientHello.
2011-04-03 16:25:29 +00:00
Dr. Stephen Henson
6e28b60aa5
PR: 2457
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS fragment reassembly bug.
2011-04-03 15:47:58 +00:00
Dr. Stephen Henson
3b5c1dc565
Make WIN32 static builds work again.
2011-04-02 16:51:04 +00:00
Andy Polyakov
e512375186
ARM assembler pack: add missing arm_arch.h.
2011-04-01 21:09:09 +00:00
Andy Polyakov
1e86318091
ARM assembler pack: profiler-assisted optimizations and NEON support.
2011-04-01 20:58:34 +00:00
Andy Polyakov
d8d958323b
gcm128.c: tidy up, minor optimization, rearrange gcm128_context.
2011-04-01 20:52:35 +00:00
Dr. Stephen Henson
30b26b551f
restore .cvsignore
2011-04-01 18:49:24 +00:00
Dr. Stephen Henson
7d48743b95
restore .cvsignore
2011-04-01 18:40:30 +00:00
Dr. Stephen Henson
b26f324824
delete lib file
2011-04-01 18:40:05 +00:00
Dr. Stephen Henson
02eb92abad
temporarily update .cvsignore
2011-04-01 18:38:51 +00:00
Dr. Stephen Henson
e5cadaf8db
Only zeroise sensitive parts of DRBG context, so the type and flags
...
are undisturbed.
Allow setting of "rand" callbacks for DRBG.
2011-04-01 17:49:45 +00:00
Dr. Stephen Henson
8cf88778ea
Allow FIPS malloc callback setting. Automatically set some callbacks
...
in OPENSSL_init().
2011-04-01 16:23:16 +00:00
Dr. Stephen Henson
c4acfb1fd0
Add additional OPENSSL_init() handling add dummy call to (hopefully)
...
ensure OPENSSL_init() is always linked into an application.
2011-04-01 15:46:03 +00:00
Dr. Stephen Henson
3f7468318d
Provisional support for auto called OPENSSL_init() function. This can be
...
used to set up any appropriate functions such as FIPS callbacks without
requiring an explicit application call.
2011-04-01 14:49:30 +00:00
Dr. Stephen Henson
011c865640
Initial switch to DRBG base PRNG in FIPS mode. Include bogus seeding for
...
test applications.
2011-04-01 14:46:07 +00:00
Dr. Stephen Henson
212a08080c
Unused, untested, provisional RAND interface for DRBG.
2011-03-31 18:06:07 +00:00
Dr. Stephen Henson
e06de4dd35
Remove redundant definitions. Give error code if DRBG sefltest fails.
2011-03-31 17:23:12 +00:00
Dr. Stephen Henson
52b6ee8245
Reorganise DRBG API so the entropy and nonce callbacks can return a
...
pointer to a buffer instead of copying to a fixed length buffer. This
removes the entropy and nonce length restrictions.
2011-03-31 17:15:54 +00:00
Dr. Stephen Henson
bb61a6c80d
fix warnings
2011-03-31 17:12:49 +00:00
Dr. Stephen Henson
79837e8c10
Update .cvsignore
2011-03-25 16:41:11 +00:00
Dr. Stephen Henson
5198009885
Add .cvsignore
2011-03-25 16:37:30 +00:00
Dr. Stephen Henson
cd22dfbf01
Have all algorithm test programs call fips_algtest_init() at startup:
...
this will perform all standalone operations such as setting error
callbacks, entering FIPS mode etc.
2011-03-25 16:36:46 +00:00
Dr. Stephen Henson
d4178c8fb1
Disable cmac tests by default so the old algorithm test vectors work.
2011-03-25 16:34:20 +00:00
Richard Levitte
3a660e7364
Corrections to the VMS build system.
...
Submitted by Steven M. Schweda <sms@antinode.info >
2011-03-25 16:20:35 +00:00
Dr. Stephen Henson
dad7851485
Allow setting of get_entropy and get_nonce callbacks outside test mode.
...
Test mode is now set when a DRBG context is initialised.
2011-03-25 14:38:37 +00:00
Dr. Stephen Henson
9db6974f77
Add .cvsignore
2011-03-25 14:26:23 +00:00
Dr. Stephen Henson
8e5dbc23df
Remove unused function.
2011-03-25 14:24:23 +00:00
Dr. Stephen Henson
bd7e6bd44b
Fix compiler warnings.
2011-03-25 12:36:02 +00:00
Dr. Stephen Henson
97057a1a7d
Make some Unix builds work again.
2011-03-25 12:09:29 +00:00
Dr. Stephen Henson
8e51aef611
Typo.
2011-03-25 12:00:16 +00:00
Richard Levitte
4ec3e8ca51
For VMS, implement the possibility to choose 64-bit pointers with
...
different options:
"64" The build system will choose /POINTER_SIZE=64=ARGV if
the compiler supports it, otherwise /POINTER_SIZE=64.
"64=" The build system will force /POINTER_SIZE=64.
"64=ARGV" The build system will force /POINTER_SIZE=64=ARGV.
2011-03-25 09:40:48 +00:00
Richard Levitte
5d0137aa14
make update
2011-03-25 09:30:52 +00:00
Richard Levitte
30fafdebf3
* Configure, crypto/ec/ec.h, crypto/ec/ecp_nistp224.c, util/mkdef.pl:
...
Have EC_NISTP224_64_GCC_128 treated like any algorithm, and have
disabled by default. If we don't do it this way, it screws up
libeay.num.
* util/libeay.num: make update
2011-03-25 09:29:46 +00:00
Richard Levitte
e775bbc464
* fips/cmac/fips_cmac_selftest.c: Because the examples in SP_800-38B
...
aren't trustworthy (see examples 13 and 14, they have the same mac,
as do examples 17 and 18), use examples from official test vectors
instead.
2011-03-25 09:24:02 +00:00
Richard Levitte
d8ba2a42e9
* fips/fipsalgtest.pl: Test the testvectors for all the CMAC ciphers
...
we support.
2011-03-25 08:48:26 +00:00
Richard Levitte
af267e4315
* fips/cmac/fips_cmactest.c: Some say TDEA, others say TDES. Support
...
both names.
2011-03-25 08:44:37 +00:00
Richard Levitte
d15467d582
* fips/cmac/fips_cmactest.c: Changed to accept all the ciphers we
...
support (Two Key TDEA is not supported), to handle really big
messages (some of the test vectors have messages 65536 bytes long),
and to handle cases where there are several keys (Three Key TDEA)
2011-03-25 08:40:33 +00:00
Richard Levitte
9507979228
* Makefile.fips: Update and add details about cmac.
2011-03-25 07:17:17 +00:00
Richard Levitte
c6dbe90895
make update
2011-03-24 22:59:02 +00:00
Richard Levitte
37942b93af
Implement FIPS CMAC.
...
* fips/fips_test_suite.c, fips/fipsalgtest.pl, test/Makefile: Hook in
test cases and build test program.
2011-03-24 22:57:52 +00:00
Richard Levitte
399aa6b5ff
Implement FIPS CMAC.
...
* fips/cmac/*: Implement the basis for FIPS CMAC, using FIPS HMAC as
an example.
* crypto/cmac/cmac.c: Enable the FIPS API. Change to use M_EVP macros
where possible.
* crypto/evp/evp.h: (some of the macros get added with this change)
* fips/fips.h, fips/utl/fips_enc.c: Add a few needed functions and use
macros to have cmac.c use these functions.
* Makefile.org, fips/Makefile, fips/fips.c: Hook it in.
2011-03-24 22:55:02 +00:00
Richard Levitte
487b023f3d
make update (1.1.0-dev)
...
This meant alarger renumbering in util/libeay.num due to symbols
appearing in 1.0.0-stable and 1.0.1-stable. However, since there's
been no release on this branch yet, it should be harmless.
2011-03-23 00:11:32 +00:00
Richard Levitte
1f9c2b3f71
* crypto/crypto-lib.com: Add a few more missing modules.
2011-03-23 00:10:16 +00:00
Richard Levitte
486ec55503
* util/mkdef.pl: Add crypto/o_str.h and crypto/o_time.h. Maybe some
...
more need to be added...
2011-03-22 23:54:18 +00:00
Dr. Stephen Henson
4fc02f1229
Use a signed value to check return value of do_cipher().
2011-03-21 17:37:27 +00:00
Dr. Stephen Henson
beb895083c
Free DRBG context in self tests.
2011-03-21 14:40:57 +00:00
Richard Levitte
2d1122b802
* apps/makeapps.com: Add srp.
2011-03-20 17:34:04 +00:00
Richard Levitte
f0d9196237
* apps/makeapps.com: Forgot to end the check for /POINTER_SIZE=64=ARGV
...
with turning trapping back on.
* test/maketests.com: Do the same check for /POINTER_SIZE=64=ARGV
here.
* test/clean-test.com: A new script for cleaning up.
2011-03-20 14:02:20 +00:00
Richard Levitte
8ecef24a66
* apps/openssl.c: For VMS, take care of copying argv if needed much earlier,
...
directly in main(). 'if needed' also includes when argv is a 32 bit
pointer in an otherwise 64 bit environment.
* apps/makeapps.com: When using /POINTER_SIZE=64, try to use the additional
=ARGV, but only if it's supported. Fortunately, DCL is very helpful
telling us in this case.
2011-03-20 13:15:33 +00:00
Richard Levitte
3d62b1f22d
A few more long symbols need shortening.
2011-03-20 10:23:51 +00:00
Richard Levitte
9e67d24743
Add missing source. Also, have the compile also use [.MODES] as
...
include directory, as other parts (notably, EVP) seem to need it.
2011-03-20 10:23:27 +00:00
Richard Levitte
537c982306
After some adjustments, apply the changes OpenSSL 1.0.0d on OpenVMS
...
submitted by Steven M. Schweda <sms@antinode.info >
2011-03-19 10:58:14 +00:00
Dr. Stephen Henson
5904882eaa
Typo.
2011-03-18 18:17:55 +00:00
Dr. Stephen Henson
1e803100de
Implement continuous RNG test for SP800-90 DRBGs.
2011-03-17 18:53:33 +00:00
Dr. Stephen Henson
96ec46f7c0
Implement health checks needed by SP800-90.
...
Fix warnings.
Instantiate DRBGs at maximum strength.
2011-03-17 16:55:24 +00:00
Dr. Stephen Henson
27131fe8f7
Fix warnings about ignored return values.
2011-03-17 14:43:13 +00:00
Dr. Stephen Henson
23bc7961d2
Fix broken SRP error/function code assignment.
2011-03-16 16:17:46 +00:00
Dr. Stephen Henson
fbbabb646c
Add extensive DRBG selftest data and option to corrupt it in fips_test_suite.
2011-03-16 15:52:12 +00:00
Ben Laurie
8cd3d99f57
Missing SRP files.
2011-03-16 11:50:33 +00:00
Ben Laurie
d4f3dd5fb6
Fix Tom Wu's email.
2011-03-16 11:28:43 +00:00
Dr. Stephen Henson
aa24c4a736
PR: 2469
...
Submitted by: Jim Studt <jim@studt.net >
Reviewed by: steve
Check mac is present before trying to retrieve mac iteration count.
2011-03-13 18:20:01 +00:00
Dr. Stephen Henson
d70fcb96ac
Fix warnings: signed/unisgned comparison, shadowing (in some cases global
...
functions such as rand() ).
2011-03-12 17:27:03 +00:00
Dr. Stephen Henson
5e374d2ee8
Remove redundant check to stop compiler warning.
2011-03-12 17:06:35 +00:00
Ben Laurie
0deea0e03c
Note SRP support.
2011-03-12 17:04:07 +00:00
Ben Laurie
edc032b5e3
Add SRP support.
2011-03-12 17:01:19 +00:00
Ben Laurie
0c4e67102e
Fix warning.
2011-03-12 13:55:24 +00:00
Dr. Stephen Henson
1b76fac5ae
Check requested security strength in DRBG. Add function to retrieve the
...
security strength.
2011-03-11 17:42:11 +00:00
Dr. Stephen Henson
329c744f51
make no-dsa work again
2011-03-10 18:26:50 +00:00
Dr. Stephen Henson
4d5d28675e
Update status.
2011-03-10 14:01:34 +00:00
Dr. Stephen Henson
1acc24a8ba
Make no-ec2m work again.
2011-03-10 01:00:30 +00:00
Dr. Stephen Henson
f52e552a93
Add a few more symbol renames.
2011-03-09 23:53:41 +00:00
Dr. Stephen Henson
8857b380e2
Add ECDH to validated module.
2011-03-09 23:44:06 +00:00
Dr. Stephen Henson
a6de7133bb
Enter FIPS mode in fips_dhvs. Support file I/O in fips_ecdsavs.
2011-03-09 14:55:10 +00:00
Dr. Stephen Henson
0fa714a4f0
Update fips_dhvs to handle functional test by generating keys.
2011-03-09 14:39:54 +00:00
Dr. Stephen Henson
3c9baf25f1
Update .cvsignore
2011-03-09 14:35:31 +00:00
Dr. Stephen Henson
0392f94fbc
Typo.
2011-03-08 21:29:07 +00:00
Dr. Stephen Henson
11e80de3ee
New initial DH algorithm test driver.
2011-03-08 19:10:17 +00:00
Dr. Stephen Henson
bc91494e06
New SP 800-56A compliant version of DH_compute_key().
2011-03-08 19:07:26 +00:00
Dr. Stephen Henson
a1e7883edb
Add meaningful error codes to DRBG.
2011-03-08 14:16:30 +00:00
Dr. Stephen Henson
dd0d2df562
Add file I/O to fips_drbgvs program.
2011-03-08 13:51:34 +00:00
Dr. Stephen Henson
ce57f0d5c2
Support I/O with files in new fips_gcmtest program.
2011-03-08 13:42:21 +00:00
Dr. Stephen Henson
c34a652e1e
Remove redirection from fipsalgtest.pl script.
2011-03-08 13:29:46 +00:00
Dr. Stephen Henson
12b77cbec3
Remove need for redirection on RNG and DSS algorithm test programs: some
...
platforms don't support it.
2011-03-08 13:27:29 +00:00
Dr. Stephen Henson
e45c6c4e25
Uninstantiate and free functions for DRBG.
2011-03-07 16:51:17 +00:00
Dr. Stephen Henson
ff4a19a471
Fix couple of bugs in CTR DRBG implementation.
2011-03-06 13:10:37 +00:00
Dr. Stephen Henson
868f12988c
Updates to DRBG: fix bugs in infrastructure. Add initial experimental
...
algorithm test generator.
2011-03-06 12:35:09 +00:00
Dr. Stephen Henson
591cbfae3c
Initial, provisional, subject to wholesale change, untested, probably
...
not working, incomplete and unused SP800-90 DRBGs for CTR and Hash modes.
Did I say this was untested?
2011-03-04 18:00:21 +00:00
Andy Polyakov
a000759a5c
ia64-mont.pl: optimize short-key performance.
2011-03-04 13:27:29 +00:00
Andy Polyakov
bc5b136c5c
ghash-x86.pl: optimize for Sandy Bridge.
2011-03-04 13:21:41 +00:00
Andy Polyakov
16cb0d9591
xts128.c: minor optimization.
2011-03-04 13:17:19 +00:00
Andy Polyakov
0ab8fd58e1
s390x assembler pack: tune-up and support for new z196 hardware.
2011-03-04 13:09:16 +00:00
Dr. Stephen Henson
8aa6cff40f
Update status information.
2011-02-23 16:06:50 +00:00
Dr. Stephen Henson
949c6f8ccf
Stop warnings.
2011-02-23 16:06:33 +00:00
Dr. Stephen Henson
199e92bb57
Use more portable options when making links in Makefile.fips
2011-02-23 16:06:07 +00:00
Dr. Stephen Henson
30ff3278ae
Add DllMain to fips symbols: will need to call this in FIPS capable OpenSSL.
2011-02-23 15:16:12 +00:00
Dr. Stephen Henson
071eb6b592
Add new symbols to fipssyms.h
2011-02-23 15:04:06 +00:00
Dr. Stephen Henson
548b4763e1
Make -DOPENSSL_FIPSSYMS work under WIN32: run perl script when
...
WIN32 assembly language files are created, add norunasm option
to just translate and not run the assembler.
2011-02-23 15:03:43 +00:00
Dr. Stephen Henson
227d6a9347
Make mkfiles.pl work with fipscanisteronly.
2011-02-22 17:02:14 +00:00
Dr. Stephen Henson
f6e76a67f0
Include ms directory for fips distribution.
2011-02-22 16:48:30 +00:00
Dr. Stephen Henson
d989e4f8c2
Make fipscanisteronly work with WIN32 build system.
2011-02-22 16:36:20 +00:00
Dr. Stephen Henson
558ddad34f
Add fips/ecdsa directory to mkfiles.pl
2011-02-22 14:52:23 +00:00
Dr. Stephen Henson
f8c39f3cd0
Remove duplicate test rule.
2011-02-22 14:50:05 +00:00
Dr. Stephen Henson
324abf1d20
Add modes_lcl.h to header list.
2011-02-22 14:06:54 +00:00
Dr. Stephen Henson
6d7f706d08
Removing debugging print.
2011-02-22 12:46:17 +00:00
Dr. Stephen Henson
227437d292
Don't try and update c_rehash for fipscanisteronly builds.
2011-02-22 12:44:29 +00:00
Dr. Stephen Henson
3e446ba347
Make "make links" work in fipscanisteronly builds.
2011-02-22 12:34:46 +00:00
Dr. Stephen Henson
147e6f4465
typo
2011-02-21 19:58:54 +00:00
Dr. Stephen Henson
94a0a96cd8
Initial perl script to filter out unneeded files for a fips tarball.
2011-02-21 19:36:55 +00:00
Dr. Stephen Henson
83dfcd727b
Call Makefile.fips when making a fips tarball.
2011-02-21 19:30:13 +00:00
Dr. Stephen Henson
4e712c48ab
Remove debugging option.
2011-02-21 19:29:48 +00:00
Dr. Stephen Henson
bfba6e05b8
*** empty log message ***
2011-02-21 18:14:59 +00:00
Dr. Stephen Henson
f18c19f5e8
Remove unnecessary link directories.
2011-02-21 18:07:28 +00:00
Dr. Stephen Henson
b7056b6414
Update dependencies.
2011-02-21 17:51:59 +00:00
Dr. Stephen Henson
620baecf91
Create fips links even if not compiling in fips mode.
2011-02-21 17:45:45 +00:00
Dr. Stephen Henson
37eae9909a
Remove unnecessary dependencies.
2011-02-21 17:35:53 +00:00
Dr. Stephen Henson
6892d0eb03
Need to link additional directories for fipscanisteronly build.
2011-02-21 16:37:42 +00:00
Dr. Stephen Henson
3deb010dc0
x509v3.h header file not needed in fips algorithm test utilities.
2011-02-21 16:36:47 +00:00
Dr. Stephen Henson
4a716f5beb
tools and rehash not needed for fips build.
2011-02-21 16:00:21 +00:00
Dr. Stephen Henson
e3496215a2
*** empty log message ***
2011-02-21 15:15:58 +00:00
Dr. Stephen Henson
eead69f5ed
Make fipscanisteronly build only required files.
2011-02-21 14:07:15 +00:00
Dr. Stephen Henson
ab8a4e54db
Move gcm128_context definition to modes_lcl.h (along with some related
...
definitions) so we can use it in EVP GCM code avoiding need to allocate
it.
2011-02-19 22:16:52 +00:00
Dr. Stephen Henson
947ff113d2
add ECDSA POST
2011-02-18 17:25:00 +00:00
Dr. Stephen Henson
acf254f86e
AES GCM selftests.
2011-02-18 17:09:33 +00:00
Dr. Stephen Henson
5d439d6955
Make -DOPENSSL_FIPSSYMS work for assembly language builds.
2011-02-17 19:03:52 +00:00
Dr. Stephen Henson
38bae7baa5
Experimental perl script to edit assembly language source files,
...
call the assembler, then restore original file.
This makes OPENSSL_FIPSSYMS work for assembly language builds.
2011-02-17 18:08:59 +00:00
Dr. Stephen Henson
d47691ecfe
Correct fipssyms.h for more assembly language symbols.
2011-02-17 17:45:09 +00:00
Dr. Stephen Henson
223ef1db41
Update auto generated comment.
2011-02-17 15:35:43 +00:00
Dr. Stephen Henson
01ad8195aa
Remove debugging command.
...
Reorder fipssyms.h to include assembly language symbols at the end.
2011-02-17 15:33:32 +00:00
Dr. Stephen Henson
d87f52cb94
Don't need err library for Makefile.fips
2011-02-16 18:07:57 +00:00
Dr. Stephen Henson
a3654f0586
Include openssl/crypto.h first in several other files so FIPS renaming
...
is picked up.
2011-02-16 17:25:01 +00:00
Dr. Stephen Henson
017bc57bf9
Experimental FIPS symbol renaming.
...
Fixups under fips/ to make symbol renaming work.
2011-02-16 14:49:50 +00:00
Dr. Stephen Henson
d749e1080a
Experimental symbol renaming to avoid clashes with regular OpenSSL.
...
Make sure crypto.h is included first in any affected files.
2011-02-16 14:40:06 +00:00
Dr. Stephen Henson
0fbf8f447b
Add pairwise consistency test to EC.
2011-02-15 16:58:28 +00:00
Dr. Stephen Henson
c81f8f59be
Use SHA-256 in fips_test_suite.
2011-02-15 16:58:06 +00:00
Dr. Stephen Henson
225a9e296b
Update pairwise consistency checks to use SHA-256.
2011-02-15 16:18:18 +00:00
Dr. Stephen Henson
25c6542944
Add non-FIPS algorithm blocking and selftest checking.
2011-02-15 16:03:47 +00:00
Dr. Stephen Henson
14567b1451
Add FIPS flags to AES ciphers and SHA* digests.
2011-02-15 15:57:54 +00:00
Dr. Stephen Henson
fe082202c0
Ignore final '\n' when checking if hex line length is odd.
2011-02-15 15:56:13 +00:00
Dr. Stephen Henson
fbc164ec2f
Add support for SigGen and KeyPair tests.
2011-02-15 14:16:57 +00:00
Dr. Stephen Henson
943a0ceed0
Update ECDSA test program to handle ECDSA2 format files.
...
Correctly handle hex strings with an odd number of digits.
2011-02-14 19:42:49 +00:00
Dr. Stephen Henson
5d2f1538a0
Add .cvsignore.
2011-02-14 17:28:28 +00:00
Dr. Stephen Henson
fe26d066ff
Add ECDSA functionality to fips module. Initial very incomplete version
...
of algorithm test program.
2011-02-14 17:14:55 +00:00
Dr. Stephen Henson
c876a4b7b1
Include support for an add_lock callback to tiny FIPS locking API.
2011-02-14 17:05:42 +00:00
Dr. Stephen Henson
c966120412
Don't use FIPS api for ec2_oct.c
2011-02-14 16:55:28 +00:00
Dr. Stephen Henson
84b08eee4b
Reorganise ECC code for inclusion in FIPS module.
...
Move compression, point2oct and oct2point functions into separate files.
Add a flags field to EC_METHOD.
Add a flag EC_FLAGS_DEFAULT_OCT to use the default compession and oct
functions (all existing methods do this). This removes dependencies from
EC_METHOD while keeping original functionality.
2011-02-14 16:52:12 +00:00
Dr. Stephen Henson
bf2546f947
Use BN_nist_mod_func to avoid need to peek error queue.
2011-02-14 16:45:28 +00:00
Dr. Stephen Henson
133291f8e7
New function BN_nist_mod_func which returns an appropriate function
...
if the passed prime is a NIST prime.
2011-02-14 16:44:29 +00:00
Dr. Stephen Henson
e990b4f838
Remove dependency of dsa_sign.o and dsa_vrf.o: new functions FIPS_dsa_sig_new
...
and FIPS_dsa_sig_free, reimplment DSA_SIG_new and DSA_SIG_free from ASN1
library.
2011-02-13 18:45:41 +00:00
Dr. Stephen Henson
e47af46cd8
Change FIPS source and utilities to use the "FIPS_" names directly
...
instead of using regular OpenSSL API names.
2011-02-12 18:25:18 +00:00
Dr. Stephen Henson
36246be915
Make no-ec2m work on Win32 build. Add nexprotoneg support too.
2011-02-12 17:38:40 +00:00
Dr. Stephen Henson
c9a90645a5
Disable some functions in headers with no-ec2m
2011-02-12 17:38:06 +00:00
Dr. Stephen Henson
b331016124
New option to disable characteristic two fields in EC code.
2011-02-12 17:23:32 +00:00
Andy Polyakov
afb4191304
dso_dlfcn.c: make it work on Tru64 4.0.
...
PR: 2316
2011-02-12 16:43:41 +00:00
Andy Polyakov
874b0bd968
Configure: engage assembler in Android target.
2011-02-12 16:13:59 +00:00
Andy Polyakov
a6d915e0ef
gcm128.c: make it work with no-sse2.
2011-02-12 11:47:55 +00:00
Dr. Stephen Henson
975138edaa
Add Makefile.fips.
2011-02-11 20:56:24 +00:00
Dr. Stephen Henson
30b56225cc
New "fispcanisteronly" build option: only build fipscanister.o and
...
associated utilities. This functionality will be used by the validated
tarball.
2011-02-11 19:02:34 +00:00
Dr. Stephen Henson
dc527a62a1
Make Windows build work with GCM.
2011-02-11 16:49:01 +00:00
Dr. Stephen Henson
ed12c2f7ca
In FIPS mode only use "Generation by Testing Candidates" equivalent.
2011-02-11 15:19:54 +00:00
Dr. Stephen Henson
16a7fcc447
Return security strength for supported DSA parameters: will be used
...
later.
2011-02-11 14:38:39 +00:00
Dr. Stephen Henson
a1a5885b64
Free keys if DSA pairwise error.
2011-02-11 14:21:01 +00:00
Andy Polyakov
f84a8ea526
x86gas.pl: make data_short work on legacy systems.
2011-02-10 21:24:24 +00:00
Andy Polyakov
01be5db64e
xts128.c: initial draft.
2011-02-10 21:16:21 +00:00
Dr. Stephen Henson
a4113c52b2
Disable FIPS restrictions when doing GCM testing.
2011-02-10 01:46:25 +00:00
Dr. Stephen Henson
b3d8022edd
Add GCM IV generator. Add some FIPS restrictions to GCM. Update fips_gcmtest.
2011-02-09 16:21:43 +00:00
Andy Polyakov
632d83f0a3
ccm128.c: initialize ctx->block (what I was smoking?).
2011-02-08 23:08:02 +00:00
Andy Polyakov
d3fad7cb51
ccm128.c: initial draft.
2011-02-08 23:02:45 +00:00
Dr. Stephen Henson
f4bfe97fc9
Equally experimental encrypt side for fips_gcmtest. Currently this uses IVs
...
in the request file need to update it to generate IVs once we have an IV
generator in place.
2011-02-08 19:25:24 +00:00
Bodo Möller
c415adc26f
Sync with 1.0.1 branch.
...
(CVE-2011-0014 OCSP stapling fix has been applied to HEAD as well.)
2011-02-08 19:09:08 +00:00
Dr. Stephen Henson
9afe95099d
Set values to NULL after freeing them.
2011-02-08 18:25:57 +00:00
Dr. Stephen Henson
9dd346c90d
Experimental incomplete AES GCM algorithm test program.
2011-02-08 18:15:59 +00:00
Bodo Möller
9770924f9b
OCSP stapling fix (OpenSSL 0.9.8r/1.0.0d)
...
Submitted by: Neel Mehta, Adam Langley, Bodo Moeller
2011-02-08 17:48:57 +00:00
Dr. Stephen Henson
f4001a0d19
Link GCM into FIPS module. Check return value in EVP gcm.
2011-02-08 15:10:42 +00:00
Bodo Möller
cea73f9db3
Synchronize with 1.0.0 branch
2011-02-08 08:48:51 +00:00
Andy Polyakov
1f2502eb58
gcm128.c: add boundary condition checks.
2011-02-07 19:11:13 +00:00
Dr. Stephen Henson
bdaa54155c
Initial *very* experimental EVP support for AES-GCM. Note: probably very
...
broken and subject to change.
2011-02-07 18:16:33 +00:00
Dr. Stephen Henson
fd3dbc1dbf
Add CRYPTO_gcm128_tag() function to retrieve the tag.
2011-02-07 18:05:27 +00:00
Dr. Stephen Henson
d45087c672
Use 0 not -1 (since type is size_t) for finalisation argument to do_cipher:
...
the NULL value for the input buffer is sufficient to notice this case.
2011-02-07 18:04:27 +00:00
Dr. Stephen Henson
634b66186a
Typo.
2011-02-07 14:36:55 +00:00
Dr. Stephen Henson
3da0ca796c
New flags EVP_CIPH_FLAG_CUSTOM_CIPHER in cipher structures if an underlying
...
cipher handles all cipher symantics itself.
2011-02-07 14:36:08 +00:00
Dr. Stephen Henson
f9678b8b57
Fix memory leak.
2011-02-07 13:34:00 +00:00
Dr. Stephen Henson
83e9c36261
Use default ASN1 if flag set.
2011-02-07 12:47:16 +00:00
Andy Polyakov
b68c13154e
gcm128.c: allow multiple calls to CRYPTO_gcm128_aad.
2011-02-06 23:50:05 +00:00
Andy Polyakov
68e2586bd3
gcm128.c: fix bug in OPENSSL_SMALL_FOOTPRINT decrypt.
...
PR: 2432
Submitted by: Michael Heyman
2011-02-06 23:48:32 +00:00
Dr. Stephen Henson
61f477f4ab
Fix duplicate code and typo.
2011-02-06 00:51:05 +00:00
Dr. Stephen Henson
7e95116064
Remove unneeded functions, make some functions and variables static.
2011-02-04 17:56:57 +00:00
Dr. Stephen Henson
06b433acad
Add FIPS support to the WIN32 build system.
2011-02-03 23:12:04 +00:00
Dr. Stephen Henson
14ae26f2e4
Transfer error redirection to fips.h, add OPENSSL_FIPSAPI to source files
...
that use it.
2011-02-03 17:00:24 +00:00
Dr. Stephen Henson
3710d1aae9
Rename crypto/fips_err.c to fips_ers.c to avoid clash with other fips_err.c
2011-02-03 16:16:30 +00:00
Dr. Stephen Henson
cc5c772abd
Include fips header file in err_all.c if needed.
2011-02-03 16:03:21 +00:00
Dr. Stephen Henson
65041aa27e
Add FIPS error codes.
2011-02-03 15:58:43 +00:00
Dr. Stephen Henson
7dbbd4b357
add -stripcr option to copy.pl from 0.9.8
2011-02-03 14:57:51 +00:00
Dr. Stephen Henson
544c84b720
Add Windows FIPS build utilities.
2011-02-03 14:20:59 +00:00
Dr. Stephen Henson
65847ca378
For now disable EC_GFp_nistp224_method() for WIN32 so the WIN32 build
...
completes without linker errors.
2011-02-03 13:00:08 +00:00
Dr. Stephen Henson
53f7633739
Add FIPS support to mkdef.pl script, update ordinals.
2011-02-03 12:59:01 +00:00
Dr. Stephen Henson
c2a459315a
Use single X931 key generation source file for FIPS and non-FIPS builds.
2011-02-03 12:47:56 +00:00
Bodo Möller
e2b798c8b3
Assorted bugfixes:
...
- safestack macro changes for C++ were incomplete
- RLE decompression boundary case
- SSL 2.0 key arg length check
Submitted by: Google (Adam Langley, Neel Mehta, Bodo Moeller)
2011-02-03 12:03:51 +00:00
Bodo Möller
9bda745876
fix omissions
2011-02-03 11:13:29 +00:00
Bodo Möller
88f2a4cf9c
CVE-2010-4180 fix (from OpenSSL_1_0_0-stable)
2011-02-03 10:43:00 +00:00
Bodo Möller
9d0397e977
make update
2011-02-03 10:17:53 +00:00
Bodo Möller
2440d8b1db
Fix error codes.
2011-02-03 10:03:23 +00:00
Dr. Stephen Henson
ee9884654b
Cope with new DSA2 file format where some p/q only tests are made.
2011-02-02 17:48:03 +00:00
Dr. Stephen Henson
5f885f1ea4
Fix target config errors.
2011-02-02 15:11:40 +00:00
Dr. Stephen Henson
7a4ec19a5f
Make no-asm work in fips mode. Add android platform.
2011-02-02 15:07:13 +00:00
Dr. Stephen Henson
a5b196a22c
Add sign/verify digest API to handle an explicit digest instead of finalising
...
a context.
2011-02-02 14:21:33 +00:00
Dr. Stephen Henson
b6104f9ad8
Remove DSA parameter generation from DSA selftest. It is unnecessary and
...
can be very slow on embedded platforms. Hard code DSA parameters instead.
2011-02-02 14:20:45 +00:00
Dr. Stephen Henson
96d5997f5b
Don't try to set pmd if it is NULL.
2011-02-01 19:15:12 +00:00
Dr. Stephen Henson
92eb4c551d
Add DSA2 support to final algorithm tests: keypair and keyver.
2011-02-01 18:53:48 +00:00
Dr. Stephen Henson
89f63d06f8
Support more DSA2 tests.
2011-02-01 17:54:23 +00:00
Dr. Stephen Henson
2ecc150530
Tolerate mixed case and leading zeroes when comparing.
2011-02-01 17:15:53 +00:00
Dr. Stephen Henson
3c2c4cc5f2
fixes for DSA2 parameter generation
2011-02-01 17:15:19 +00:00
Dr. Stephen Henson
5eedacc904
update README.FIPS
2011-02-01 17:14:07 +00:00
Dr. Stephen Henson
7f64c26588
Since FIPS 186-3 specifies we use the leftmost bits of the digest
...
we shouldn't reject digest lengths larger than SHA256: the FIPS
algorithm tests include SHA384 and SHA512 tests.
2011-02-01 12:52:01 +00:00
Dr. Stephen Henson
3dd9b31dc4
Provisional, experimental support for DSA2 parameter generation algorithm.
...
Not properly integrated or tested yet.
2011-01-31 19:44:09 +00:00
Dr. Stephen Henson
eb164d0b12
stop warnings about no previous prototype when compiling shared engines
2011-01-30 01:30:48 +00:00
Dr. Stephen Henson
225c272193
Fix shared build for fips
2011-01-30 01:14:34 +00:00
Dr. Stephen Henson
9fdb2cc592
Add fips option into Configure, disable endian code for no-asm and FIPS.
...
Make shared library default for fips.
2011-01-30 00:01:09 +00:00
Dr. Stephen Henson
cc8bd54569
add fiplibdir and basedir options to Configure
2011-01-29 23:45:02 +00:00
Dr. Stephen Henson
0c02a37548
use different default fips install directory
2011-01-29 23:05:15 +00:00
Dr. Stephen Henson
166c9cb0b8
update version to 2.0
2011-01-29 21:51:59 +00:00
Dr. Stephen Henson
5084af288d
typo
2011-01-29 21:45:04 +00:00
Dr. Stephen Henson
7e23e857f6
don't descend fips directory if not in fips mode
2011-01-29 21:39:33 +00:00
Dr. Stephen Henson
44f54a130b
Add preliminary FIPS information.
2011-01-29 17:05:25 +00:00
Dr. Stephen Henson
7edfe67456
Move all FIPSAPI renames into fips.h header file, include early in
...
crypto.h if needed.
Modify source tree to handle change.
2011-01-27 19:10:56 +00:00
Dr. Stephen Henson
d8ad2e6112
add .cvsignore
2011-01-27 18:11:36 +00:00
Dr. Stephen Henson
1097bde192
add FIPS API malloc/free
2011-01-27 18:09:05 +00:00
Dr. Stephen Henson
7cc684f4f7
Redirect FIPS memory allocation to FIPS_malloc() routine, remove
...
OpenSSL malloc dependencies.
2011-01-27 17:23:43 +00:00
Dr. Stephen Henson
e36d6b8f79
add fips_dsatest.c file
2011-01-27 16:52:49 +00:00
Dr. Stephen Henson
aa87945f47
Update source files to handle new FIPS_lock() location. Add FIPS_lock()
...
definition. Remove stale function references from fips.h
2011-01-27 15:57:31 +00:00
Dr. Stephen Henson
7c8ced94c3
Change OPENSSL_FIPSEVP to OPENSSL_FIPSAPI as it doesn't just refer
...
to EVP any more.
Move locking #define into fips.h.
Set FIPS locking callbacks at same time as OpenSSL locking callbacks.
2011-01-27 15:22:26 +00:00
Dr. Stephen Henson
d5df1b3f0d
Include thread ID code in fips module.
2011-01-27 14:50:41 +00:00
Dr. Stephen Henson
6ff9c48811
New FIPS_lock() function for minimal FIPS locking API: to avoid dependencies
...
on OpenSSL locking code. Use API in some internal FIPS files.
Remove redundant ENGINE defines from fips.h
2011-01-27 14:29:48 +00:00
Dr. Stephen Henson
ad6019d6c0
Move locking and thread ID functions into new files lock.c and thr_id.c,
...
redirect locking to minimal FIPS_lock() function where required.
2011-01-27 14:27:24 +00:00
Dr. Stephen Henson
a27de7b7fd
use FIPSEVP in some bn and rsa files
2011-01-27 14:24:42 +00:00
Dr. Stephen Henson
54e02a234c
update .cvsignore
2011-01-27 13:33:47 +00:00
Dr. Stephen Henson
879bd6e38c
Internal version of BN_mod_inverse allowing checking of no-inverse without
...
need to inspect error queue.
2011-01-26 16:59:47 +00:00
Dr. Stephen Henson
6f1a3a310c
FIPS changes to test/Makefile: rules to build FIPS test applications.
2011-01-26 16:47:51 +00:00
Dr. Stephen Henson
6f4b3e7c09
Use ARX in crypto/Makefile
2011-01-26 16:22:03 +00:00
Dr. Stephen Henson
6dff52e858
FIPS HMAC changes:
...
Use EVP macros.
Use tiny EVP in FIPS mode.
2011-01-26 16:15:38 +00:00
Dr. Stephen Henson
df6de39fe7
Change AR to ARX to allow exclusion of fips object modules
2011-01-26 16:08:08 +00:00
Dr. Stephen Henson
5ca9cb7cbd
FIPS mode ERR changes. Redirect errors to tiny FIPS callbacks to avoid ERR
...
library dependencies.
2011-01-26 15:53:07 +00:00
Dr. Stephen Henson
83c3410b94
FIPS DH changes: selftest checks and key range checks.
2011-01-26 15:47:19 +00:00
Dr. Stephen Henson
20818e00fd
FIPS mode DSA changes:
...
Check for selftest failures.
Pairwise consistency test for RSA key generation.
Use some EVP macros instead of EVP functions.
Use minimal FIPS EVP where needed.
Key size restrictions.
2011-01-26 15:46:26 +00:00
Dr. Stephen Henson
c553721e8b
FIPS mode RSA changes:
...
Check for selftest failures.
Pairwise consistency test for RSA key generation.
Use some EVP macros instead of EVP functions.
Use minimal FIPS EVP where needed.
2011-01-26 15:37:41 +00:00
Dr. Stephen Henson
1588a3cae7
add new RAND errors
2011-01-26 15:33:51 +00:00
Dr. Stephen Henson
7a4bd34a4f
FIPS mode EVP changes:
...
Set EVP_CIPH_FLAG_FIPS on approved ciphers.
Support "default ASN1" flag which avoids need for ASN1 dependencies in FIPS
code.
Include some defines to redirect operations to a "tiny EVP" implementation
in some FIPS source files.
Change m_sha1.c to use EVP_PKEY_NULL_method: the EVP_MD sign/verify functions
are not used in OpenSSL 1.0 and later for SHA1 and SHA2 ciphers: the EVP_PKEY
API is used instead.
2011-01-26 15:25:33 +00:00
Dr. Stephen Henson
4ead4e5241
FIPS mode changes to make RNG compile (this will need updating later as we
...
need a whole new PRNG for FIPS).
1. avoid use of ERR_peek().
2. If compiling with FIPS use small FIPS EVP and disable ENGINE
2011-01-26 14:52:04 +00:00
Dr. Stephen Henson
1ab2f7f1cb
Add fipscanisterbuild configuration option and update Makefile.org: doesn't compile yet
2011-01-26 12:31:30 +00:00
Dr. Stephen Henson
9bafd8f7b3
FIPS_allow_md5() no longer exists and is no longer required
2011-01-26 12:23:58 +00:00
Richard Levitte
373048395e
Add rsa_crpt
2011-01-26 06:51:35 +00:00
Dr. Stephen Henson
3d6a8954f8
update mkerr.pl for use fips directory, add arx.pl script
2011-01-26 01:35:07 +00:00
Dr. Stephen Henson
c11845a4ab
add fips_premain.c.sha1
2011-01-26 01:15:54 +00:00
Dr. Stephen Henson
ec3657f81f
add fips_sha1_selftest.c
2011-01-26 01:11:12 +00:00
Dr. Stephen Henson
d69c6653ef
add fips/sha files
2011-01-26 01:09:52 +00:00
Dr. Stephen Henson
aaff7a0464
add fips/aes/Makefile
2011-01-26 01:05:48 +00:00
Dr. Stephen Henson
1d44454d6d
add fips/des/Makefile
2011-01-26 01:04:53 +00:00
Dr. Stephen Henson
5d3bfb9066
add fips/Makefile
2011-01-26 01:03:54 +00:00
Dr. Stephen Henson
aeb8996c38
add some missing fips files
2011-01-26 00:58:09 +00:00
Dr. Stephen Henson
2b4b28dc32
And so it begins... again.
...
Initial FIPS 140-2 code ported to HEAD. Doesn't even compile yet, may have
missing files, extraneous files and other nastiness.
In other words: it's experimental ATM, OK?
2011-01-26 00:56:19 +00:00
Dr. Stephen Henson
72a267331a
Move RSA encryption functions to new file crypto/rsa/rsa_crpt.c to separate
...
crypto and ENGINE dependencies in RSA library.
2011-01-25 17:35:10 +00:00
Dr. Stephen Henson
13a5519208
Move BN_options function to bn_print.c to remove dependency for BIO printf
...
routines from bn_lib.c
2011-01-25 17:10:30 +00:00
Dr. Stephen Henson
f7a2afa652
Move DSA_sign, DSA_verify to dsa_asn1.c and include separate versions of
...
DSA_SIG_new() and DSA_SIG_free() to remove ASN1 dependencies from DSA_do_sign()
and DSA_do_verify().
2011-01-25 16:55:15 +00:00
Dr. Stephen Henson
245a7eee17
recalculate DSA signature if r or s is zero (FIPS 186-3 requirement)
2011-01-25 16:01:29 +00:00
Dr. Stephen Henson
6e0375d504
revert Makefile change
2011-01-25 12:15:10 +00:00
Dr. Stephen Henson
7d05edd12e
PR: 2433
...
Submitted by: Chris Wilson <chris@qwirx.com >
Reviewed by: steve
Constify ASN1_STRING_set_default_mask_asc().
2011-01-24 16:19:52 +00:00
Dr. Stephen Henson
fef1c40bf1
New function EC_KEY_set_affine_coordinates() this performs all the
...
NIST PKV tests.
2011-01-24 16:07:40 +00:00
Dr. Stephen Henson
a428ac4750
check EC public key isn't point at infinity
2011-01-24 15:04:34 +00:00
Dr. Stephen Henson
0aa1aedbce
PR: 1612
...
Submitted by: Robert Jackson <robert@rjsweb.net >
Reviewed by: steve
Fix EC_POINT_cmp function for case where b but not a is the point at infinity.
2011-01-24 14:41:34 +00:00
Dr. Stephen Henson
dd616752a1
oops, revert mistakenly committed EC changes
2011-01-19 14:42:42 +00:00
Dr. Stephen Henson
198ce9a611
Add additional parameter to dsa_builtin_paramgen to output the generated
...
seed to: this doesn't introduce any binary compatibility issues as the
function is only used internally.
The seed output is needed for FIPS 140-2 algorithm testing: the functionality
used to be in DSA_generate_parameters_ex() but was removed in OpenSSL 1.0.0
2011-01-19 14:35:53 +00:00
Dr. Stephen Henson
78c4572296
add va_list version of ERR_add_error_data
2011-01-14 15:13:37 +00:00
Dr. Stephen Henson
d3f17e5ed3
stop warning with no-engine
2011-01-13 15:41:58 +00:00
Richard Levitte
ff66ff0a9b
PR: 2425
...
Synchronise VMS build with Unixly build.
2011-01-10 20:55:21 +00:00
Ben Laurie
105d62cbf1
Constify.
2011-01-09 17:50:18 +00:00
Ben Laurie
c13d7c0296
Fix warning.
2011-01-09 17:50:06 +00:00
Dr. Stephen Henson
114f511f17
missed change in ACKNOWLEDGEMENTS file
2011-01-09 13:37:09 +00:00
Dr. Stephen Henson
778b14b72d
move some string utilities to buf_str.c to reduce some dependencies (from 0.9.8 branch).
2011-01-09 13:32:57 +00:00
Dr. Stephen Henson
7b1a04519f
add X9.31 prime generation routines from 0.9.8 branch
2011-01-09 13:02:14 +00:00
Richard Levitte
5b301b2fe3
PR: 2407
...
Fix fault include.
Submitted by Arpadffy Zoltan <Zoltan.Arpadffy@scientificgames.se >
2011-01-06 20:56:02 +00:00
Dr. Stephen Henson
722521594c
Don't use decryption_failed alert for TLS v1.1 or later.
2011-01-04 19:39:27 +00:00
Dr. Stephen Henson
a47577164c
Since DTLS 1.0 is based on TLS 1.1 we should never return a decryption_failed
...
alert.
2011-01-04 19:34:20 +00:00
Dr. Stephen Henson
09d84e03e8
oops missed an assert
2011-01-03 12:54:08 +00:00
Dr. Stephen Henson
85881c1d92
PR: 2411
...
Submitted by: Rob Austein <sra@hactrn.net >
Reviewed by: steve
Fix corner cases in RFC3779 code.
2011-01-03 01:40:53 +00:00
Dr. Stephen Henson
968062b7d3
Fix escaping code for string printing. If *any* escaping is enabled we
...
must escape the escape character itself (backslash).
2011-01-03 01:31:24 +00:00
Dr. Stephen Henson
e82f75577b
PR: 2410
...
Submitted by: Rob Austein <sra@hactrn.net >
Reviewed by: steve
Use OPENSSL_assert() instead of assert().
2011-01-03 01:22:41 +00:00
Dr. Stephen Henson
88ea810e25
PR: 2413
...
Submitted by: Michael Bergandi <mbergandi@gmail.com >
Reviewed by: steve
Fix typo in crypto/bio/bss_dgram.c
2011-01-03 01:07:35 +00:00
Dr. Stephen Henson
2b3936e882
avoid verification loops in trusted store when path building
2010-12-25 20:45:59 +00:00
Richard Levitte
c596b2ab5b
Part of the IF structure didn't get pasted here...
...
PR: 2393
2010-12-14 21:44:31 +00:00
Andy Polyakov
c329c6bac7
e_capi.c: rearrange #include-s to improve portability.
...
PR: 2394
2010-12-14 20:39:17 +00:00
Richard Levitte
b7ef916c38
First attempt at adding the possibility to set the pointer size for the builds on VMS.
...
PR: 2393
2010-12-14 19:19:04 +00:00
Dr. Stephen Henson
d7d5a55d22
Support routines for ASN1 scanning function, doesn't do much yet.
2010-12-13 18:15:28 +00:00
Andy Polyakov
cc4c230653
e_capi.c: change from ANSI to TCHAR domain. This makes it compilable on
...
Windows CE/Mobile, yet keeps it normal Windows loop.
PR: 2350
2010-12-12 20:26:09 +00:00
Andy Polyakov
de3bb266f4
apps/x590.c: harmonize usage of STDout and out_err.
...
PR: 2323
2010-12-12 10:52:56 +00:00
Andy Polyakov
05e4fbf801
bss_file.c: refine UTF8 logic.
...
PR: 2382
2010-12-11 14:53:14 +00:00
Dr. Stephen Henson
ef3026a325
ignore leading null fields
2010-12-03 19:31:34 +00:00
Dr. Stephen Henson
420ce9eb98
update FAQ
2010-12-02 19:55:56 +00:00
Dr. Stephen Henson
73334e8da1
PR: 2386
...
Submitted by: Stefan Birrer <stefan.birrer@adnovum.ch >
Reviewed by: steve
Correct SKM_ASN1_SET_OF_d2i macro.
2010-12-02 18:02:29 +00:00
Dr. Stephen Henson
6f413ef406
fix doc typos
2010-12-02 13:44:53 +00:00
Dr. Stephen Henson
85171f83b8
use right version this time in FAQ
2010-12-02 00:08:12 +00:00
Dr. Stephen Henson
a550d351fc
update FAQ
2010-12-02 00:01:44 +00:00
Andy Polyakov
cbecd29a27
Configure: make -mno-cygwin optional on mingw platforms.
...
PR: 2381
2010-11-30 22:18:02 +00:00
Dr. Stephen Henson
09c1dc850c
PR: 2385
...
Submitted by: Stefan Birrer <stefan.birrer@adnovum.ch >
Reviewed by: steve
Zero key->pkey.ptr after it is freed so the structure can be reused.
2010-11-30 19:37:21 +00:00
Richard Levitte
4585fd0734
Better method for creating SSLROOT:.
...
Make sure to include the path to evptest.txt.
2010-11-29 22:27:15 +00:00
Andy Polyakov
e3c1854b0c
TABLE update.
2010-11-29 21:17:54 +00:00
Andy Polyakov
e822c756b6
s390x assembler pack: adapt for -m31 build, see commentary in Configure
...
for more details.
2010-11-29 20:52:43 +00:00
Dr. Stephen Henson
300b1d76fe
apply J-PKAKE fix to HEAD (original by Ben)
2010-11-29 18:32:05 +00:00
Dr. Stephen Henson
ae3fff5034
Some of the MS_STATIC use in crypto/evp is a legacy from the days when
...
EVP_MD_CTX was much larger: it isn't needed anymore.
2010-11-27 17:37:03 +00:00
Dr. Stephen Henson
d0205686bb
PR: 2240
...
Submitted by: Jack Lloyd <lloyd@randombit.net >, "Mounir IDRASSI" <mounir.idrassi@idrix.net >, steve
Reviewed by: steve
As required by RFC4492 an absent supported points format by a server is
not an error: it should be treated as equivalent to an extension only
containing uncompressed.
2010-11-25 12:27:09 +00:00
Dr. Stephen Henson
290be870d6
using_ecc doesn't just apply to TLSv1
2010-11-25 11:51:31 +00:00
Dr. Stephen Henson
fa71cc7bce
fix typo in HMAC redirection, add HMAC INIT tracing
2010-11-24 19:14:59 +00:00
Dr. Stephen Henson
e77906b9fa
VERY EXPERIMENTAL HMAC redirection example in OpenSSL ENGINE. Untested at this
...
stage and probably wont work properly.
2010-11-24 18:32:06 +00:00
Dr. Stephen Henson
f830c68f4d
add "missing" functions to copy EVP_PKEY_METHOD and examine info
2010-11-24 16:08:20 +00:00
Dr. Stephen Henson
6f678c4081
oops, revert invalid change
2010-11-24 14:03:25 +00:00
Dr. Stephen Henson
e9be051f3a
use generalise mac API for SSL key generation
2010-11-24 13:16:59 +00:00
Dr. Stephen Henson
46fc96d4ba
constify EVP_PKEY_new_mac_key()
2010-11-24 13:13:49 +00:00
Andy Polyakov
da64e0d898
INSTALL.W32: document trouble with symlinks under MSYS.
...
PR: 2377
2010-11-23 22:56:45 +00:00
Richard Levitte
88868c0786
Use the same directory for architecture dependent header files as in
...
the branches OpenSSL-1_0_0-stable and OpenSSL-1_0_1-stable.
2010-11-23 02:43:20 +00:00
Richard Levitte
c5ef4bb49a
Implement bc test strategy as submitted by Steven M. Schweda <sms@antinode.info>.
...
Make sure we move to '__here' before trying to use it to build local sslroot:
2010-11-23 02:12:07 +00:00
Richard Levitte
01bfc480c6
Print openssl version information at the end of the tests
2010-11-23 01:06:08 +00:00
Richard Levitte
2631a0210e
Give the architecture dependent directory higher priority
2010-11-23 01:05:26 +00:00
Richard Levitte
feb592bcc9
Don't define an empty CFLAGS, it's much more honest not to defined it at all.
...
Make sure to remove any [.CRYTO]BUILDINF.H so it doesn't get used instead of
[.''ARCH'.CRYPTO]BUILDINF.H
2010-11-23 01:03:18 +00:00
Richard Levitte
fbd7d524be
* tests.com: Add the symbol openssl_conf, so the openssl application
...
stops complaining about a missing configuration file. Define the logical
name PERL_ENV_TABLES with values to Perl considers the DCL symbol table
as part of the environment (see 'man perlvms' for details), so cms-test.pl
can get the value of EXE_DIR from tests.com, among others.
* cms-test.pl: Make changes to have it work on VMS as well. Upper or mixed
case options need to be quoted and the openssl command needs a VMS-specific
treatment. It all should work properly on Unix, I hope it does on Windows
as well...
2010-11-22 23:42:45 +00:00
Richard Levitte
d5dfa7cd82
Better way to build tests. Taken from OpenSSL-1_0_1-stable
2010-11-22 22:17:23 +00:00
Richard Levitte
c8f0610d99
Synchronise with Unix and do all other needed modifications to have it
...
build on VMS again.
2010-11-22 22:04:41 +00:00
Andy Polyakov
dd128715a2
s390x.S: fix typo in bn_mul_words.
...
PR: 2380
2010-11-22 21:55:07 +00:00
Richard Levitte
ec44f0ebfa
Taken from OpenSSL_1_0_0-stable:
...
Include proper header files for time functions.
Submitted by Arpadffy Zoltan <Zoltan.Arpadffy@scientificgames.se >
2010-11-22 18:25:04 +00:00
Dr. Stephen Henson
6377953816
add pice of PR#2295 not committed to HEAD
2010-11-22 16:14:56 +00:00
Dr. Stephen Henson
e322fa2872
PR: 2376
...
Submitted by: Guenter <lists@gknw.net >
Reviewed by: steve
Cleanup alloca use, fix Win32 target for OpenWatcom.
2010-11-19 00:12:01 +00:00
Dr. Stephen Henson
9ac0708f37
PR: 2375
...
Submitted by: Guenter <lists@gknw.net >
Reviewed by: steve
cleanup/fix e_aep.c for OpenWatcom
2010-11-18 23:00:02 +00:00
Dr. Stephen Henson
6b02f9fafb
PR: 2374
...
Submitted by: Guenter <lists@gknw.net >
Reviewed by: steve
Don't compile capi ENGINE on mingw32
2010-11-18 22:57:02 +00:00
Richard Levitte
4878ad687f
Tell the user what test is being performed.
2010-11-18 22:46:46 +00:00
Richard Levitte
908df4d0f7
We expect these scripts not to bail on error, so make sure that's what happens.
2010-11-18 22:44:48 +00:00
Richard Levitte
6c1982c5ce
Synchronise with Unix tests
2010-11-18 22:36:16 +00:00
Richard Levitte
40844c9f68
We redid the structure on architecture dependent source files, but
...
apparently forgot to adapt the copying to the installation directory.
2010-11-18 20:03:07 +00:00
Dr. Stephen Henson
b71f815f6b
remove duplicate statement
2010-11-18 17:33:17 +00:00
Dr. Stephen Henson
833ebea189
compile cts128.c on VMS
2010-11-18 17:04:18 +00:00
Dr. Stephen Henson
91f0828c95
fix no SIGALRM case in speed.c
2010-11-18 13:22:53 +00:00
Dr. Stephen Henson
70a5f5f9ab
PR: 2372
...
Submitted by: "W.C.A. Wijngaards" <wouter@nlnetlabs.nl >
Reviewed by: steve
Fix OpenBSD compilation failure.
2010-11-18 12:30:01 +00:00
Dr. Stephen Henson
ac7797a722
oops, reinstate TLSv1 string
2010-11-17 18:17:08 +00:00
Dr. Stephen Henson
7d5686d355
Don't assume a decode error if session tlsext_ecpointformatlist is not NULL: it can be legitimately set elsewhere.
2010-11-17 17:37:23 +00:00
Dr. Stephen Henson
732d31beee
bring HEAD up to date, add CVE-2010-3864 fix, update NEWS files
2010-11-16 14:18:51 +00:00
Dr. Stephen Henson
f7d2f17a07
add TLS v1.1 options to s_server
2010-11-16 14:16:00 +00:00
Dr. Stephen Henson
ad889de097
If EVP_PKEY structure contains an ENGINE the key is ENGINE specific and
...
we should use its method instead of any generic one.
2010-11-16 12:11:46 +00:00
Dr. Stephen Henson
e15320f652
Only use explicit IV if cipher is in CBC mode.
2010-11-14 17:47:45 +00:00
Dr. Stephen Henson
e827b58711
Get correct GOST private key instead of just assuming the last one is
...
correct: this isn't always true if we have more than one certificate.
2010-11-14 13:50:55 +00:00
Dr. Stephen Henson
80f0bcbabb
preliminary acknowledgments file
2010-11-12 20:06:05 +00:00
Dr. Stephen Henson
eba2b51d9e
Submitted By: Bogdan Harjoc <harjoc@gmail.com>
...
Add missing debug WIN64 targets.
2010-11-11 15:21:45 +00:00
Dr. Stephen Henson
838ea7f824
PR: 2366
...
Submitted by: Damien Miller <djm@mindrot.org >
Reviewed by: steve
Stop pkeyutl crashing if some arguments are missing. Also make str2fmt
tolerate NULL parameter.
2010-11-11 14:42:50 +00:00
Dr. Stephen Henson
da7b0b2261
Submitted by: Jonathan Dixon <joth@chromium.org>
...
Reviewed by: steve
If store is NULL set flags correctly.
2010-11-02 15:58:58 +00:00
Andy Polyakov
beee17c428
Configure: update mips[32|64]_asm lines.
2010-10-22 20:18:15 +00:00
Andy Polyakov
c242dda4a4
sha512-mips.pl: add missing 64-bit byte swap.
2010-10-22 20:16:22 +00:00
Andy Polyakov
bb55003882
Add aes-mips.pl assembler module.
2010-10-21 15:56:55 +00:00
Andy Polyakov
ca32ceb773
sha512-mips.pl: fix "little-endian" typos.
2010-10-21 15:56:24 +00:00
Dr. Stephen Henson
776654adff
PR: 2295
...
Submitted by: Alexei Khlebnikov <alexei.khlebnikov@opera.com >
Reviewed by: steve
OOM checking. Leak in OOM fix. Fall-through comment. Duplicate code
elimination.
2010-10-11 23:49:22 +00:00
Andy Polyakov
d6522548dd
x86_64-xlate.pl: fix LNK4078 and LNK4210 link warnings.
...
PR 2356
2010-10-10 21:07:55 +00:00
Dr. Stephen Henson
e49af2ac38
move CHANGES entry to correct place
2010-10-10 12:24:13 +00:00
Dr. Stephen Henson
5759425810
PR: 2314
...
Submitted by: Mounir IDRASSI <mounir.idrassi@idrix.net >
Reviewed by: steve
Fix for double free bug in ssl/s3_clnt.c CVE-2010-2939
2010-10-10 12:15:47 +00:00
Dr. Stephen Henson
983768997e
We can't always read 6 bytes in an OCSP response: fix so error statuses
...
are read correctly for non-blocking I/O.
2010-10-06 18:00:59 +00:00
Dr. Stephen Henson
8ec3fa0597
fix signature printing routines
2010-10-04 13:58:41 +00:00
Dr. Stephen Henson
0c7246ed4b
fix warnings
2010-10-04 13:45:15 +00:00
Dr. Stephen Henson
7e0de9e8a6
Minor documentation fixes, PR#2345
2010-10-04 13:28:46 +00:00
Dr. Stephen Henson
0d638dc1f6
Minor documentation fixes, PR#2344
2010-10-04 13:23:53 +00:00
Dr. Stephen Henson
c17171c625
Typo, PR#2346
2010-10-04 13:19:28 +00:00
Dr. Stephen Henson
39239280f3
Add call to ENGINE_register_all_complete() to ENGINE_load_builtin_engines(),
...
this means that some implementations will be used automatically, e.g. aesni,
we do this for cryptodev anyway.
Setup cpuid in ENGINE_load_builtin_engines() too as some ENGINEs use it.
2010-10-03 18:58:09 +00:00
Andy Polyakov
5ad83922ca
sha512-mips.pl: add missing byte swap for little-endians.
2010-10-02 12:43:04 +00:00
Andy Polyakov
d466588788
MIPS assembler pack: enable it in Configure, add SHA2 module, fix make rules,
...
update commentary...
2010-10-02 11:47:17 +00:00
Andy Polyakov
da4d239dad
Add unified mips.pl, which will replace mips3.s.
2010-09-27 21:19:43 +00:00
Andy Polyakov
0985473636
sha1-mips.pl, mips-mont.pl: unify MIPS assembler modules in respect to
...
ABI and binutils.
2010-09-22 08:43:09 +00:00
Andy Polyakov
8986e37249
ghash-s390x.pl: reschedule instructions for better performance.
2010-09-21 11:37:00 +00:00
Andy Polyakov
90ba3a28f8
s390x assembler pack: extend OPENSSL_s390xcap_P to 128 bits.
2010-09-18 08:46:53 +00:00
Andy Polyakov
bc9092f726
VC-32.pl: default to nasm if neither nasm or nasmw is is found at the moment.
...
PR: 2338
2010-09-13 16:15:17 +00:00
Andy Polyakov
f8927c89d0
Alpha assembler pack: adapt for Linux.
...
PR: 2335
2010-09-13 13:28:52 +00:00
Andy Polyakov
3739a772e9
sha1-armv4-large.pl: more readable input pickup.
2010-09-10 15:41:08 +00:00
Andy Polyakov
c504f0a921
Configure: remove redundant -DMD32_REG_T=int.
2010-09-10 15:37:50 +00:00
Andy Polyakov
6415dd7b2f
crypto/ppc[cpuid|cap]: call CPU detection once and detect AltiVec.
2010-09-10 15:00:51 +00:00
Andy Polyakov
dd4a0af370
crypto/bn/asm/s390x.S: drop redundant instructions.
2010-09-10 14:53:36 +00:00
Andy Polyakov
7d1f55e9d9
Add ghash-s390x.pl.
2010-09-10 14:50:17 +00:00
Andy Polyakov
d52d5ad147
modes/asm/ghash-*.pl: switch to [more reproducible] performance results
...
collected with 'apps/openssl speed ghash'.
2010-09-05 19:52:14 +00:00
Andy Polyakov
a3b0c44b1b
ghash-ia64.pl: 50% performance improvement of gcm_ghash_4bit.
2010-09-05 19:49:54 +00:00
Andy Polyakov
4b2603e46c
sparcv9cap.c: disengange Solaris-specific CPU detection routine in favour
...
of unified procedure relying on SIGILL.
PR: 2321
2010-09-05 19:41:41 +00:00
Ben Laurie
bf48836c7c
Fixes to NPN from Adam Langley.
2010-09-05 17:14:01 +00:00
Ben Laurie
d9a268b9f9
NPN tests.
2010-09-05 16:35:10 +00:00
Ben Laurie
5df2a2497a
Fix warnings.
2010-09-05 16:34:49 +00:00
Dr. Stephen Henson
4ed7b78b56
make no-gost work on Windows
2010-09-02 17:45:23 +00:00
Dr. Stephen Henson
2ec4ccee1f
fix bug in AES_unwrap()
2010-08-30 23:59:14 +00:00
Bodo Möller
396cb5657b
More C language police work.
2010-08-27 13:17:59 +00:00
Bodo Möller
eb8ef241eb
C conformity fixes: Move declarations before statements in all blocks.
2010-08-27 12:07:35 +00:00
Bodo Möller
1b5af90b45
C conformity fixes:
...
- Move declarations before statements in all blocks.
- Where 64-bit type is required, use it explicitly (not 1l).
2010-08-27 11:29:30 +00:00
Dr. Stephen Henson
bdd5350804
PR: 1833
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix other cases not covered by original patch.
2010-08-27 11:29:15 +00:00
Bodo Möller
7b3a9b0099
Update version numbers
2010-08-26 18:45:45 +00:00
Bodo Möller
7c2d4fee25
For better forward-security support, add functions
...
SSL_[CTX_]set_not_resumable_session_callback.
Submitted by: Emilia Kasper (Google)
[A part of this change affecting ssl/s3_lib.c was accidentally commited
separately, together with a compilation fix for that file;
see s3_lib.c CVS revision 1.133 (http://cvs.openssl.org/chngview?cn=19855 ).]
2010-08-26 15:15:47 +00:00
Bodo Möller
f16176dab4
Patch from PR #1833 was broken: there's no s->s3->new_session
...
(only s->new_session).
2010-08-26 14:54:16 +00:00
Bodo Möller
76af94eb27
(formatting error)
2010-08-26 14:40:11 +00:00
Bodo Möller
04daec862c
New 64-bit optimized implementation EC_GFp_nistp224_method().
...
This will only be compiled in if explicitly requested
(#ifdef EC_NISTP224_64_GCC_128).
Submitted by: Emilia Kasper (Google)
2010-08-26 14:29:55 +00:00
Dr. Stephen Henson
d3bb63fc68
sync and update ordinals
2010-08-26 14:27:17 +00:00
Dr. Stephen Henson
44959ee456
PR: 1833
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Support for abbreviated handshakes when renegotiating.
2010-08-26 14:23:52 +00:00
Bodo Möller
c94f7f657b
ECC library bugfixes.
...
Submitted by: Emilia Kasper (Google)
2010-08-26 12:11:01 +00:00
Bodo Möller
173350bcca
Harmonize with OpenSSL_1_0_1-stable version of CHANGES.
2010-08-26 11:22:33 +00:00
Andy Polyakov
1e024f05b2
util/cygwin.sh: maintainer's update.
...
Submitted by: Corinna Vinschen
2010-08-24 21:51:08 +00:00
Andy Polyakov
f2c88f5282
engine/Makefile: harmonize engine install rule for .dylib extension on MacOS X.
...
PR: 2319
2010-08-24 21:45:41 +00:00
Andy Polyakov
836ea45350
gcm128.c: fix typo in CRYPTO_gcm128_encrypt_ctr32 name.
2010-08-23 14:32:20 +00:00
Andy Polyakov
72f421934a
Makefile.share: fix brown-bag typo in link_o.darwin.
2010-08-21 11:34:46 +00:00
Andy Polyakov
3fdd168ffc
crypto/modes/Makefile: fix typo in ghash-parisc.s rule.
2010-08-21 11:20:25 +00:00
Dr. Stephen Henson
0b789adc67
PR: 2315
...
Use consistent calculation for PSS salt length.
2010-08-10 13:01:49 +00:00
Andy Polyakov
33d9c8348a
sha1-armv4-large.pl: reschedule instructions for dual-issue pipeline.
2010-08-03 15:34:57 +00:00
Andy Polyakov
dbe3611bbd
rc5_locl.h: make inline assembler clang-friendly.
2010-08-02 21:51:07 +00:00
Andy Polyakov
f71c6aceeb
gcm128.c: add CRYPTO_gcm128_[en|de]crypt_ctr32.
2010-08-02 21:39:51 +00:00
Andy Polyakov
30ab7af242
md32_common.h: modify MD32_REG_T pre-processing logic [triggered by clang].
2010-08-02 09:32:26 +00:00
Dr. Stephen Henson
2948fbab3a
Fix ctr mode properly this time....
2010-07-28 16:53:28 +00:00
Dr. Stephen Henson
081464fa14
Make ctr mode behaviour consistent with other modes.
2010-07-28 11:03:09 +00:00
Ben Laurie
ee2ffc2794
Add Next Protocol Negotiation.
2010-07-28 10:06:55 +00:00
Andy Polyakov
b122e482f9
alphacpuid.pl: fix brown-bag bug.
2010-07-28 08:17:15 +00:00
Ben Laurie
3c530fef67
Sign mismatch.
2010-07-27 16:57:05 +00:00
Ben Laurie
a7a6aade9d
Missing prototype.
2010-07-27 16:34:29 +00:00
Andy Polyakov
20d171377f
aes-x86_64.pl: commit#19797 was overzealous, partially reverse.
2010-07-26 22:56:07 +00:00
Andy Polyakov
149b18078e
Replace alphacpuid.s with alphacpuid.pl to ensure it makes to release tar-balls.
...
PR: 2309
2010-07-26 22:04:31 +00:00
Andy Polyakov
39438ff6e2
ms/: update do_win64*.bat and remove redundant mingw32.bat.
2010-07-26 21:58:23 +00:00
Andy Polyakov
d5fe8c3459
sha1-alpha.pl: commentary update.
2010-07-26 21:57:10 +00:00
Andy Polyakov
6219d2c294
rc4-s390x.pl: harmonize build rule with other similar rules.
2010-07-26 21:56:16 +00:00
Andy Polyakov
85e28dfa6f
ghash-ia64.pl: excuse myself from implementing "528B" variant.
2010-07-26 21:54:21 +00:00
Andy Polyakov
6559b40df0
modes/Makefile: update clean rule.
2010-07-26 21:53:01 +00:00
Andy Polyakov
3d85668ba2
eng_aesni.c: switch to CRYPTO_ctr128_encrypt_ctr32.
2010-07-26 21:50:39 +00:00
Andy Polyakov
058d83cfe9
aes-x86_64.pl: remove redundant instructions.
2010-07-26 21:48:39 +00:00
Andy Polyakov
a9e790b95a
perlasm/x86_64-xlate.pl: extend SSE>2 to ml64.
2010-07-26 21:45:38 +00:00
Andy Polyakov
02f358da49
aesni-x86_64.pl: fix typos.
2010-07-26 21:44:03 +00:00
Andy Polyakov
133a7f9a50
perlasm/x86asm.pl: move aesni and pclmulqdq opcodes to aesni-x86.pl and
...
ghash-x86.pl.
2010-07-26 21:42:07 +00:00
Dr. Stephen Henson
eb1c48be6f
Add new type ossl_ssize_t instead of ssize_t and move definitions to
...
e_os2.h, this should fix WIN32 compilation issues and hopefully avoid
conflicts with other headers which may workaround ssize_t in different ways.
2010-07-26 18:15:59 +00:00
Dr. Stephen Henson
2fd9664b0b
#if out deleted function from headers so it isn't picked up by WIN32 build
...
system.
2010-07-26 18:15:13 +00:00
Dr. Stephen Henson
aa763c0f6d
WIN32 build fix.
2010-07-26 13:17:17 +00:00
Dr. Stephen Henson
75a96dd059
Sync ordinals and update.
2010-07-25 19:13:30 +00:00
Dr. Stephen Henson
843b5a250a
Update symhacks.
2010-07-25 19:12:45 +00:00
Dr. Stephen Henson
18f3385dea
Add modes.h and cmac to WIN32 build system.
2010-07-25 18:12:44 +00:00
Andy Polyakov
d7d119a3c9
aesni-x86[_64].pl: fine-tune, add CCM subroutine, add performance data.
2010-07-25 15:17:01 +00:00
Dr. Stephen Henson
223c59eae5
Fix WIN32 build system to correctly link ENGINE DLLs contained in a
...
directory: currently the GOST ENGINE is the only case.
2010-07-24 17:52:43 +00:00
Dr. Stephen Henson
7bbd0de88d
Add call to ENGINE_register_all_complete() to ENGINE_load_builtin_engines(),
...
this means that some implementations will be used automatically, e.g. aesni,
we do this for cryptodev anyway.
Setup cpuid in ENGINE_load_builtin_engines() too as some ENGINEs use it.
2010-07-21 16:14:48 +00:00
Dr. Stephen Henson
f96ccf36ff
PR: 1830
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >, Steve Henson
Support for RFC5705 key extractor.
2010-07-18 17:43:18 +00:00
Dr. Stephen Henson
b9e7793dd7
oops, revert wrong patch..
2010-07-18 17:43:01 +00:00
Dr. Stephen Henson
d135da5192
Fix warnings (From HEAD, original patch by Ben).
2010-07-18 16:52:47 +00:00
Andy Polyakov
75db4b2f7b
Makefile.shared: link_o.darwin comment update.
2010-07-16 08:15:28 +00:00
Andy Polyakov
b730b03f2f
Configure: suppress $multilib with non-system $prefix.
...
PR: 2307
2010-07-16 08:13:39 +00:00
Andy Polyakov
1dc02bbaf5
Makefile.shared: debugging line slipped through in previous commit.
2010-07-15 13:55:38 +00:00
Andy Polyakov
cad6650f52
Makefile.shared: update link_o.dawrin rule.
...
PR: 2306
2010-07-15 13:53:23 +00:00
Andy Polyakov
26064d7f77
aes-s390x.pl: revisit buffer allocation and add performance data.
2010-07-14 08:43:38 +00:00
Andy Polyakov
c981086d40
sha1-armv4-large.pl: add performance data for Cortex A8 core.
2010-07-13 14:11:44 +00:00
Andy Polyakov
2d22e08083
ARM assembler pack: reschedule instructions for dual-issue pipeline.
...
Modest improvement coefficients mean that code already had some
parallelism and there was not very much room for improvement. Special
thanks to Ted Krovetz for benchmarking the code with such patience.
2010-07-13 14:03:31 +00:00
Dr. Stephen Henson
0852f90c30
PR: 2297
...
Submitted by: Antony, Benoy <bantony@ebay.com >
Approved by: steve@openssl.org
Fix bug in AES wrap code when t > 0xff.
2010-07-09 17:26:04 +00:00
Andy Polyakov
2765001610
Configure: fix aes_ctr.o regexp.
2010-07-09 16:19:41 +00:00
Andy Polyakov
653215a127
INSTALL.W32: mention _OPENSSL_isservice().
...
PR: 2194
2010-07-09 14:30:54 +00:00
Andy Polyakov
6acb4ff389
gcm128.c: API modification and readability improvements,
...
add ghash benchmark to apps/speed.c.
2010-07-09 14:10:51 +00:00
Andy Polyakov
874a3757af
Rework framework for assembler support for AES counter mode and add
...
AES_ctr32_encrypt to aes-s390x.pl.
2010-07-09 12:21:52 +00:00
Andy Polyakov
1cbdca7bf2
Harmonize s390x assembler modules with "catch-all" rules from commit#19749.
2010-07-09 12:11:12 +00:00
Andy Polyakov
e216cd6ee9
armv4-mont.pl: addenum to previous commit#19749.
2010-07-08 15:06:01 +00:00
Andy Polyakov
396df7311e
crypto/*/Makefile: unify "catch-all" assembler make rules and harmonize
...
ARM assembler modules.
2010-07-08 15:03:42 +00:00
Andy Polyakov
f04f3873f8
rand_nw.c: compensate for gcc bug (using %edx instead of %eax at -O3).
...
PR: 2296
2010-07-08 09:14:00 +00:00
Andy Polyakov
df72970951
PROBLEMS: MacOS X is not necessarily a problem anymore.
2010-07-08 09:00:00 +00:00
Andy Polyakov
7c5889bf7a
sparcv9cap.c: reiterate CPU detection logic.
2010-07-08 07:47:35 +00:00
Dr. Stephen Henson
dc53a037b0
i variable is used on some platforms
2010-07-05 11:05:24 +00:00
Andy Polyakov
acbcc271b1
ghash-armv4.pl: excuse myself from implementing "528B" flavour.
2010-07-02 08:14:12 +00:00
Andy Polyakov
b28750877c
ghash-sparcv9.pl: fix Makefile rule and add performance data for T1.
2010-07-02 08:09:30 +00:00
Andy Polyakov
d9218e11e2
crypto/sparc*: eliminate _sparcv9_rdwrasi.
2010-07-02 08:06:56 +00:00
Andy Polyakov
c32fcca6f4
SPARCv9 assembler pack: refine CPU detection on Linux, fix for "unaligned
...
opcodes detected in executable segment" error.
2010-07-01 07:34:56 +00:00
Dr. Stephen Henson
9674de7d3d
no need for empty fragments with TLS 1.1 and later due to explicit IV
2010-06-27 14:43:03 +00:00
Dr. Stephen Henson
a7c64928c8
clarify comment
2010-06-16 13:15:31 +00:00
Ben Laurie
c8bbd98a2b
Fix warnings.
2010-06-12 14:13:23 +00:00
Andy Polyakov
57ae37a003
VC-32.pl: fix /Fd name generation.
...
PR: 2284
2010-06-09 15:48:25 +00:00
Andy Polyakov
d364506a24
ghash-x86_64.pl: "528B" variant delivers further >30% improvement.
2010-06-09 15:05:59 +00:00
Andy Polyakov
04e2b793d6
ghash-x86.pl: commentary updates.
2010-06-09 15:05:14 +00:00
Andy Polyakov
8525950e7e
ghash-x86.pl: "528B" variant of gcm_ghash_4bit_mmx gives 20-40%
...
improvement.
2010-06-04 13:21:01 +00:00
Andy Polyakov
d08eae1bda
x86 perlasm: add support for 16-bit values.
2010-06-04 13:13:18 +00:00
Dr. Stephen Henson
e8107c35b1
update FAQ
2010-06-01 15:23:21 +00:00
Dr. Stephen Henson
3cbb15ee81
add CVE-2010-0742 and CVS-2010-1633 fixes
2010-06-01 14:39:01 +00:00
Andy Polyakov
2d060267b1
VC-32.pl: unconditionally generate symbols.pdb.
2010-06-01 06:02:47 +00:00
Andy Polyakov
f9a152bd90
x86_64-xlate.pl: refine mingw support and regexps, update commentary.
2010-06-01 05:56:24 +00:00
Andy Polyakov
af9fafdbd1
Configure: update mingw config-lines.
2010-06-01 05:52:39 +00:00
Dr. Stephen Henson
eadfa019b3
fix PR#2261 in a different way
2010-05-31 13:18:21 +00:00
Dr. Stephen Henson
9799937510
PR: 2278
...
Submitted By: Mattias Ellert <mattias.ellert@fysast.uu.se >
Fix type checking macro SKM_ASN1_SET_OF_i2d
2010-05-29 12:49:20 +00:00
Dr. Stephen Henson
417a24dba5
update NEWS
2010-05-27 15:05:30 +00:00
Dr. Stephen Henson
4e96633ac7
PR: 2262
...
Submitted By: Victor Wagner <vitus@cryptocom.ru >
Fix error reporting in load_key function.
2010-05-27 14:09:03 +00:00
Dr. Stephen Henson
77cf9e09b0
PR: 2261
...
Submitted By: De Rudder, Stephen L." <s_derudder@tditx.com >
Workaround for newer Windows headers which define EADDRINUSE but not to the
same value as WSAEADDRINUSE.
2010-05-27 13:07:22 +00:00
Dr. Stephen Henson
cb877ccb35
PR: 2258
...
Submitted By: Ger Hobbelt <ger@hobbelt.com >
Base64 BIO fixes:
Use OPENSSL_assert() instead of assert().
Use memmove() as buffers overlap.
Fix write retry logic.
2010-05-27 12:41:05 +00:00
Dr. Stephen Henson
3d4fc82c0e
PR: 2266
...
Submitted By: Jonathan Gray <jsg@goblin.cx >
Correct ioctl definitions.
2010-05-26 23:23:34 +00:00
Andy Polyakov
e747f4d418
gcm128.c: P.-M. Hager has tipped about possibility to fold reductions
...
in gcm_ghash_4bit. Taking the idea a step further I've added extra
256+16 bytes of per-key storage, so that one can speak about 3rd variant
in addition to "256B" and "4KB": "528B" one. Commonly it should be
~50% faster than "256B" implementation or ~25% slower than "4KB" one.
2010-05-26 21:36:36 +00:00
Dr. Stephen Henson
19a45b8d47
Avoid use of ex_data free function in Chil ENGINE so it can be safely
...
reloaded.
2010-05-26 16:17:16 +00:00
Andy Polyakov
07e29c1234
ghash-x86.pl: MMX optimization (+20-40%) and commentary update.
2010-05-23 12:37:01 +00:00
Andy Polyakov
fb2d5a91e9
gcm128.c: commentary update.
2010-05-23 12:35:41 +00:00
Dr. Stephen Henson
ae7c67cace
PR: 2254
...
Submitted by: Ger Hobbelt <ger@hobbelt.com >
Approved by: steve@openssl.org
Check for <= 0 i2d return value.
2010-05-22 00:40:38 +00:00
Dr. Stephen Henson
ca96d38981
PR: 2251
...
Submitted by: Ger Hobbelt <ger@hobbelt.com >
Approved by: steve@openssl.org
Memleak, BIO chain leak and realloc checks in v3_pci.c
2010-05-22 00:30:41 +00:00
Dr. Stephen Henson
9f08866940
Stop compiler complaining in pedantic mode: may be a better way to do this...
2010-05-22 00:20:42 +00:00
Dr. Stephen Henson
aa6d91e85b
oops, typo
2010-05-20 17:36:05 +00:00
Dr. Stephen Henson
fdce8a355f
Update cms-test.pl to handle some Unix like Windows environments where
...
calling shlib_wrap.sh doesn't work.
2010-05-20 17:28:37 +00:00
Dr. Stephen Henson
7837c7ec45
PR: 2259
...
Submitted By: Artem Chuprina <ran@cryptocom.ru >
Check return values of HMAC in tls_P_hash and tls1_generate_key_block.
Although the previous version could in theory crash that would only happen if a
digest call failed. The standard software methods can never fail and only one
ENGINE currently uses digests and it is not compiled in by default.
2010-05-17 11:27:22 +00:00
Dr. Stephen Henson
acf635b9b2
oops, revert test patch
2010-05-15 00:35:39 +00:00
Dr. Stephen Henson
19674b5a1d
PR: 2253
...
Submitted By: Ger Hobbelt <ger@hobbelt.com >
Check callback return value when outputting errors.
2010-05-15 00:34:06 +00:00
Dr. Stephen Henson
e855d538de
PR: 2255
...
Submitted By: Ger Hobbelt <ger@hobbelt.com >
Place RSA dependent variable under #ifndef OPENSSL_NO_RSA
2010-05-15 00:19:44 +00:00
Andy Polyakov
629fd3aa91
rc4-x86_64.pl: "Westmere" optimization.
2010-05-13 21:01:24 +00:00
Andy Polyakov
1aa8a6297c
ghash-x86[_64].pl: add due credit.
2010-05-13 17:21:52 +00:00
Andy Polyakov
c1f092d14e
GCM "jumbo" update:
...
- gcm128.c: support for Intel PCLMULQDQ, readability improvements;
- asm/ghash-x86.pl: splitted vanilla, MMX, PCLMULQDQ subroutines;
- asm/ghash-x86_64.pl: add PCLMULQDQ implementations.
2010-05-13 15:32:43 +00:00
Andy Polyakov
ea7239cf15
x86asm.pl: consistency imrovements.
2010-05-13 15:28:07 +00:00
Andy Polyakov
046ea30864
x86_64-xlate.pl: refine some regexp's and add support for OWORD/QWORD PTR.
2010-05-13 15:26:46 +00:00
Andy Polyakov
3efe51a407
Revert previous Linux-specific/centric commit#19629. If it really has to
...
be done, it's definitely not the way to do it. So far answer to the
question was to ./config -Wa,--noexecstack (adopted by RedHat).
2010-05-05 22:05:39 +00:00
Ben Laurie
0e3ef596e5
Non-executable stack in asm.
2010-05-05 15:50:13 +00:00
Andy Polyakov
f472ec8c2f
"Jumbo" update for crypto/modes:
...
- introduce common modes_lcl.h;
- ctr128.c: implement additional CRYPTO_ctr128_encrypt_ctr32 interface;
- gcm128.c: add omitted ARM initialization, remove ctx.ctr;
2010-05-04 19:23:02 +00:00
Andy Polyakov
8a682556b4
Add ghash-armv4.pl.
2010-05-03 18:23:29 +00:00
Dr. Stephen Henson
827f3d5f39
PR: 2252
...
Submitted By: Ger Hobbelt <ger@hobbelt.com >
Update docs to BIO_f_buffer()
2010-05-03 15:30:07 +00:00
Dr. Stephen Henson
6006ae148c
PR: 2230
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix bug in bitmask macros and stop warnings.
2010-05-03 13:01:40 +00:00
Dr. Stephen Henson
efcf5f1c50
PR: 2244
...
Submitted By: "PMHager" <hager@dortmund.net >
Initialise pkey callback to 0.
2010-05-03 12:50:36 +00:00
Dr. Stephen Henson
a033c3c72b
PR: 2250
...
Submitted By: Ger Hobbelt <ger@hobbelt.com >
Don't overwrite return value with strlen(f).
2010-05-03 12:24:01 +00:00
Dr. Stephen Henson
359b0c9fb8
experimental function to convert ASN1_TIME to tm, not used or even compiled in yet
2010-05-03 12:17:44 +00:00
Ben Laurie
19f7e5e24a
Missing declarations, no assembler in PEDANTIC.
2010-05-01 14:41:25 +00:00
Andy Polyakov
bb92e2c89b
bss_file.c: refine UTF-8 logic on Windows.
2010-04-28 20:02:28 +00:00
Andy Polyakov
5e19ee96f6
Add ghash-parisc.pl.
2010-04-28 18:51:45 +00:00
Andy Polyakov
8a1c92ce49
Take gcm128.c and ghash assembler modules into the build loop.
2010-04-22 21:36:26 +00:00
Andy Polyakov
d183244b43
bss_file.c: reserve for option to encode file name with UTF-8.
2010-04-21 20:38:21 +00:00
Andy Polyakov
5e60dba84f
md5-ia64.S: fix assembler warning.
2010-04-20 20:40:46 +00:00
Dr. Stephen Henson
9a8a7d58af
PR: 2241
...
Submitted By: Artemy Lebedev <vagran.ast@gmail.com >
Typo.
2010-04-20 12:53:18 +00:00
Dr. Stephen Henson
1bf508c9cf
new function to diff tm structures
2010-04-15 13:25:26 +00:00
Dr. Stephen Henson
799668c1ce
oops revert patch not part of Configure diff
2010-04-15 13:24:20 +00:00
Dr. Stephen Henson
7f7f155103
oops, commit Configure part of PR#2234
2010-04-15 13:17:15 +00:00
Dr. Stephen Henson
45078e6c52
PR: 2234
...
Submitted By: Matthias Andree <matthias.andree@gmx.de >
Use correct path to openssl utility in c_rehash script.
2010-04-14 23:07:12 +00:00
Dr. Stephen Henson
d7f573fea6
PR: 2235
...
Submitted By: Bruce Stephens <bruce.stephens@isode.com >
Make ts/Makefile consistent with other Makefiles.
2010-04-14 23:04:12 +00:00
Andy Polyakov
1fd79f66ea
x86_64cpuid.pl: ml64 is allergic to db on label line.
2010-04-14 19:24:48 +00:00
Andy Polyakov
4f39edbff1
gcm128.c and assembler modules: change argument order for gcm_ghash_4bit.
...
ghash-x86*.pl: fix performance numbers for Core2, as it turned out
previous ones were "tainted" by variable clock frequency.
2010-04-14 19:04:51 +00:00
Dr. Stephen Henson
8decc967dc
update FAQ
2010-04-14 13:21:21 +00:00
Andy Polyakov
6a1823b371
[co]fb128.c: fix "n=0" bug.
2010-04-14 07:47:28 +00:00
Dr. Stephen Henson
45106caab7
fix signed/unsigned comparison warnings
2010-04-14 00:41:14 +00:00
Dr. Stephen Henson
5d1a50ac2a
fix bug in ccgost CFB mode code
2010-04-14 00:33:06 +00:00
Dr. Stephen Henson
af73b08ac0
check ASN1 type before using it
2010-04-14 00:30:32 +00:00
Dr. Stephen Henson
934e22e814
PR: 2230
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix various DTLS fragment reassembly bugs.
2010-04-14 00:17:55 +00:00
Dr. Stephen Henson
3122d1d382
PR: 2229
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Don't drop DTLS connection if mac or decryption failed.
2010-04-14 00:10:05 +00:00
Dr. Stephen Henson
b7463c8818
PR: 2228
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix DTLS buffer record MAC failure bug.
2010-04-14 00:03:27 +00:00
Andy Polyakov
109757d254
aes-ppc.pl: 10% performance improvement on Power6.
2010-04-10 14:53:17 +00:00
Andy Polyakov
49535cc409
AESNI engine: update test_aesni.
2010-04-10 14:07:40 +00:00
Andy Polyakov
a595baff9f
gcm128.c: commentary and formatting updates.
2010-04-10 14:02:26 +00:00
Andy Polyakov
67a315b60b
cts128.c: add support for NIST "Ciphertext Stealing" proposal.
2010-04-10 14:01:02 +00:00
Andy Polyakov
6c83629bd9
AESNI engine: add counter mode.
2010-04-10 13:56:59 +00:00
Andy Polyakov
fead253986
perlasm/x86*: add support to SSE>2 and pclmulqdq. x86_64-xlate.pl provides
...
correct solution to problem addressed in committ #19244 .
2010-04-10 13:55:05 +00:00
Andy Polyakov
9a649f3b46
sha1-alpha.pl: addenum till commit #19547 .
2010-04-10 13:51:20 +00:00
Andy Polyakov
f62df694ad
ctr129.c: fix typo, simplify ctr128_inc and fix "n=0" bug.
2010-04-10 13:46:53 +00:00
Andy Polyakov
42feba4797
Add ghash-alpha.pl assembler module.
2010-04-10 13:44:20 +00:00
Andy Polyakov
3c01a1e89e
sha1-alpha.pl: engage it in build.
2010-04-10 13:43:26 +00:00
Andy Polyakov
6a79b3cb93
sparccpuid.S: some assembler is allergic to apostrophes in comments.
2010-04-10 13:36:34 +00:00
Andy Polyakov
d23f4e9d5a
alpha-mont.pl: comply with stack alignment requirements.
2010-04-10 13:33:04 +00:00
Dr. Stephen Henson
172f6b2d62
make GOST MAC work again
2010-04-08 10:55:04 +00:00
Dr. Stephen Henson
c0b8eb606f
Add SHA2 algorithms to SSL_library_init(). Although these aren't used
...
directly by SSL/TLS SHA2 certificates are becoming more common and
applications that only call SSL_library_init() and not
OpenSSL_add_all_alrgorithms() will fail when verifying certificates.
Update docs.
2010-04-07 13:18:07 +00:00
Dr. Stephen Henson
d4a45bf31a
Remove obsolete PRNG note. Add comment about use of SHA256 et al.
2010-04-06 15:03:27 +00:00
Dr. Stephen Henson
60e24554bb
PR: 2209
...
Submitted Daniel Mentz <danielml@sent.com >
Documentation typo.
2010-04-06 14:45:18 +00:00
Dr. Stephen Henson
ff12f88b8e
PR: 2218
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fixes for DTLS replay bug.
2010-04-06 12:45:04 +00:00
Dr. Stephen Henson
47e6a60e42
PR: 2219
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fixes for DTLS buffering bug.
2010-04-06 12:40:19 +00:00
Dr. Stephen Henson
87a37cbadd
PR: 2223
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fixes for DTLS timeout bug
2010-04-06 12:29:31 +00:00
Dr. Stephen Henson
00a37b5a9b
PR: 2220
...
Fixes to make OpenSSL compile with no-rc4
2010-04-06 11:18:59 +00:00
Dr. Stephen Henson
bc494872b8
fix FAQ (again)
2010-03-31 11:50:30 +00:00
Dr. Stephen Henson
4b0771c146
update FAQ
2010-03-30 16:43:51 +00:00
Dr. Stephen Henson
a1a80e0786
fix FAQ
2010-03-30 16:36:59 +00:00
Dr. Stephen Henson
1676bec94c
update FAQ
2010-03-30 16:35:41 +00:00
Dr. Stephen Henson
c25a0aae6b
update FAQ
2010-03-30 16:24:53 +00:00
Dr. Stephen Henson
46bdf0f34d
update HEAD FAQ
2010-03-30 00:49:36 +00:00
Andy Polyakov
471d0eb397
cryptlib.c: allow application to override OPENSSL_isservice.
...
PR: 2194
2010-03-29 10:06:01 +00:00
Andy Polyakov
97a6a01f0f
ARMv4 assembler: fix compilation failure. Fix is actually unconfirmed, but
...
I can't think of any other cause for failure
2010-03-29 09:55:19 +00:00
Andy Polyakov
2a460c1aa8
dso_dlfcn.c: fix compile failure on Tru64.
2010-03-29 09:50:02 +00:00
Dr. Stephen Henson
216811b216
PR: 1696
...
Check return value if d2i_PBEPARAM().
2010-03-28 00:42:38 +00:00
Dr. Stephen Henson
3ac75e21a1
PR: 1763
...
Remove useless num = 0 assignment.
Remove redundant cases on sock_ctrl(): default case handles them.
2010-03-27 23:28:09 +00:00
Dr. Stephen Henson
14021cb821
sync ordinals with 1.0.0
2010-03-27 19:32:11 +00:00
Dr. Stephen Henson
08df41277a
PR: 1904
...
Submitted by: David Woodhouse <dwmw2@infradead.org >
Pass passphrase minimum length down to UI.
2010-03-27 19:31:55 +00:00
Dr. Stephen Henson
ac495542a6
PR: 1813
...
Submitted by: Torsten Hilbrich <torsten.hilbrich@secunet.com >
Fix memory leak when engine name cannot be loaded.
2010-03-27 18:28:02 +00:00
Dr. Stephen Henson
085e5f4859
update FAQ
2010-03-25 12:08:19 +00:00
Bodo Möller
3e8b6485b3
Fix for "Record of death" vulnerability CVE-2010-0740.
...
Also, add missing CHANGES entry for CVE-2009-3245 (code changes submitted to this branch on 23 Feb 2010),
and further harmonize this version of CHANGES with the versions in the current branches.
2010-03-25 11:25:30 +00:00
Dr. Stephen Henson
f2e8488b85
initialise buf if wrong_info not used
2010-03-24 23:42:05 +00:00
Dr. Stephen Henson
a3a06e6543
PR: 1731 and maybe 2197
...
Clear error queue in a few places in SSL code where errors are expected
so they don't stay in the queue.
2010-03-24 23:17:15 +00:00
Andy Polyakov
26c00de46d
rand_win.c: fix logical bug in readscreen.
2010-03-22 22:44:22 +00:00
Andy Polyakov
3dd303129f
bss_file.c: fix MSC 6.0 warning.
2010-03-22 22:38:56 +00:00
Andy Polyakov
c3473126b1
GHASH assembler: new ghash-sparcv9.pl module and saner descriptions.
2010-03-22 17:24:18 +00:00
Andy Polyakov
82f385d71d
e_capi.c: fix typo.
2010-03-15 22:28:48 +00:00
Andy Polyakov
f2fccce4bd
Fix UPLINK typo.
2010-03-15 22:25:57 +00:00
Andy Polyakov
480cd6ab6e
ghash-ia64.pl: new file, GHASH for Itanium.
...
ghash-x86_64.pl: minimize stack frame usage.
ghash-x86.pl: modulo-scheduling MMX loop in respect to input vector
results in up to 10% performance improvement.
2010-03-15 19:07:52 +00:00
Dr. Stephen Henson
6c6bdd543d
workaround for missing definition in some headers
2010-03-15 13:10:08 +00:00
Dr. Stephen Henson
e19f6678f5
print signature parameters with CRLs too
2010-03-14 13:10:48 +00:00
Dr. Stephen Henson
624fbfcadb
free up sigopts STACK
2010-03-14 13:09:00 +00:00
Dr. Stephen Henson
510777f2fc
clear bogus errors in ca utility
2010-03-14 13:07:48 +00:00
Dr. Stephen Henson
be449448dc
update CHANGES
2010-03-14 12:55:15 +00:00
Dr. Stephen Henson
4c623cddbe
add -sigopt option to ca utility
2010-03-14 12:54:45 +00:00
Dr. Stephen Henson
8d207ee3d1
add X509_CRL_sign_ctx function
2010-03-14 12:52:38 +00:00
Dr. Stephen Henson
cdb182b55a
new sigopt and PSS support for req and x509 utilities
2010-03-12 14:41:00 +00:00
Dr. Stephen Henson
00947cea0c
PR: 2192
...
Submitted By: Jaroslav Imrich <jaroslav.imrich@disig.sk >
The prompt_info and wrong_info parameters can be empty strings which
can produce confusing prompts. Treat empty string same as NULL.
2010-03-12 12:48:32 +00:00
Dr. Stephen Henson
e45c32fabf
missing goto meant signature was never printed out
2010-03-12 12:06:48 +00:00
Mark J. Cox
fb75f349b7
This entry was in 0.9.8m changelog but missing from here, since it's
...
security relevent we'd better list it.
2010-03-12 08:36:44 +00:00
Dr. Stephen Henson
a907165250
Submitted by: Martin Kaiser
...
Reject PSS signatures with unsupported trailer value.
2010-03-11 23:11:36 +00:00
Dr. Stephen Henson
e62774c3b9
alg2 can be NULL
2010-03-11 19:27:03 +00:00
Andy Polyakov
f093794e55
Add GHASH x86_64 assembler.
2010-03-11 16:19:46 +00:00
Dr. Stephen Henson
f26cf9957f
typo
2010-03-11 14:19:46 +00:00
Dr. Stephen Henson
17c63d1cca
RSA PSS ASN1 signing method
2010-03-11 14:06:46 +00:00
Dr. Stephen Henson
877669d69c
typo
2010-03-11 14:04:54 +00:00
Dr. Stephen Henson
1c8d92997d
ctrl operations to retrieve RSA algorithm settings
2010-03-11 13:55:18 +00:00
Dr. Stephen Henson
bf8883b351
Add support for new PSS functions in RSA EVP_PKEY_METHOD
2010-03-11 13:45:42 +00:00
Dr. Stephen Henson
e8254d406f
Extend PSS padding code to support different digests for MGF1 and message.
2010-03-11 13:40:42 +00:00
Dr. Stephen Henson
85522a074c
Algorithm specific ASN1 signing functions.
2010-03-11 13:32:38 +00:00
Dr. Stephen Henson
31d66c2a98
update cms code to use X509_ALGOR_set_md instead of internal function
2010-03-11 13:29:39 +00:00
Dr. Stephen Henson
ce25c7207b
New function X509_ALGOR_set_md() to set X509_ALGOR (DigestAlgorithmIdentifier)
...
from a digest algorithm.
2010-03-11 13:27:05 +00:00
Dr. Stephen Henson
77163b6234
don't leave bogus errors in the queue
2010-03-10 13:48:09 +00:00
Andy Polyakov
e3a510f8a6
Add GHASH x86 assembler.
2010-03-09 23:03:33 +00:00
Dr. Stephen Henson
b17bdc7734
PR: 2188
...
Submitted By: Jaroslav Imrich <jaroslav.imrich@disig.sk >
Add "missing" functions to get and set prompt constructor.
2010-03-09 17:24:33 +00:00
Dr. Stephen Henson
a0e4a8e10a
PR: 2186
...
Submitted By: "Joel Rabinovitch" <Joel.Rabinovitch@tecsys.com >
Detect aix64-gcc
2010-03-09 17:08:48 +00:00
Dr. Stephen Henson
d6eebf6d8a
reserve a few more bits for future cipher modes
2010-03-08 23:48:21 +00:00
Andy Polyakov
2262beef2e
gcm128.c: add option for streamed GHASH, simple benchmark, minor naming
...
change.
2010-03-08 22:44:37 +00:00
Dr. Stephen Henson
31904ecdf3
RSA PSS verification support including certificates and certificate
...
requests. Add new ASN1 signature initialisation function to handle this
case.
2010-03-08 18:10:35 +00:00
Dr. Stephen Henson
a4d9c12f99
correct error code
2010-03-08 18:07:05 +00:00
Dr. Stephen Henson
809cd0a22d
print outermost signature algorithm parameters too
2010-03-07 17:02:47 +00:00
Dr. Stephen Henson
bea29921a8
oops
2010-03-07 16:41:54 +00:00
Dr. Stephen Henson
7ed485bc9f
The OID sanity check was incorrect. It should only disallow *leading* 0x80
...
values.
2010-03-07 16:40:05 +00:00
Dr. Stephen Henson
069d4cfea5
although AES is a variable length cipher, AES EVP methods have a fixed key length
2010-03-07 15:54:26 +00:00
Dr. Stephen Henson
49436b59b5
oops, make EVP ctr mode work again
2010-03-07 15:52:41 +00:00
Dr. Stephen Henson
9ef6fe8c2e
typo
2010-03-07 15:37:37 +00:00
Dr. Stephen Henson
63b825c9d4
add separate PSS decode function, rename PSS parameters to RSA_PSS_PARAMS
2010-03-07 13:34:51 +00:00
Dr. Stephen Henson
77f4b6ba4f
add MGF1 digest ctrl
2010-03-07 13:34:15 +00:00
Dr. Stephen Henson
a5667732b9
update ASN1 sign/verify to use EVP_DigestSign and EVP_DigestVerify
2010-03-07 12:05:45 +00:00
Dr. Stephen Henson
1708456220
don't add digest alias if signature algorithm is undefined
2010-03-06 20:47:30 +00:00
Dr. Stephen Henson
ff04bbe363
Add PSS algorithm printing. This is an initial step towards full PSS support.
...
Uses ASN1 module in Martin Kaiser's PSS patch.
2010-03-06 19:55:25 +00:00
Dr. Stephen Henson
148924c1f4
fix indent, newline
2010-03-06 18:14:13 +00:00
Dr. Stephen Henson
fa1ba589f3
Add algorithm specific signature printing. An individual ASN1 method can
...
now print out signatures instead of the standard hex dump.
More complex signatures (e.g. PSS) can print out more meaningful information.
Sample DSA version included that prints out the signature parameters r, s.
[Note EVP_PKEY_ASN1_METHOD is an application opaque structure so adding
new fields in the middle has no compatibility issues]
2010-03-06 18:05:05 +00:00
Dr. Stephen Henson
8c4ce7bab2
Fix memory leak: free up ENGINE functional reference if digest is not
...
found in an ENGINE.
2010-03-05 13:33:21 +00:00
Dr. Stephen Henson
bb845ee044
Add -engine_impl option to dgst which will use an implementation of
...
an algorithm from the supplied engine instead of just the default one.
2010-03-05 13:28:21 +00:00
Dr. Stephen Henson
b5cfc2f590
option to replace extensions with new ones: mainly for creating cross-certificates
2010-03-03 20:13:30 +00:00
Dr. Stephen Henson
ebaa2cf5b2
PR: 2183
...
PR#1999 broke fork detection by assuming HAVE_FORK was set for all platforms.
Include original HAVE_FORK detection logic while allowing it to be
overridden on specific platforms with -DHAVE_FORK=1 or -DHAVE_FORK=0
2010-03-03 19:56:34 +00:00
Dr. Stephen Henson
cca1cd9a34
Submitted by: Tomas Hoger <thoger@redhat.com>
...
Fix for CVE-2010-0433 where some kerberos enabled versions of OpenSSL
could be crashed if the relevant tables were not present (e.g. chrooted).
2010-03-03 15:41:18 +00:00
Dr. Stephen Henson
2c772c8700
don't mix definitions and code
2010-03-03 15:30:42 +00:00
Andy Polyakov
e7f5b1cd42
Initial version of Galois Counter Mode implementation. Interface is still
...
subject to change...
2010-03-02 16:33:25 +00:00
Andy Polyakov
80dfadfdf3
ppccap.c: portability fix.
2010-03-02 16:28:29 +00:00
Andy Polyakov
d8c7bd6e11
Fix s390x-specific HOST_l2c|c2l.
...
Submitted by: Andreas Krebbel
2010-03-02 16:23:40 +00:00
Dr. Stephen Henson
f84c85b0e3
PR: 2178
...
Submitted by: "Kennedy, Brendan" <brendan.kennedy@intel.com >
Handle error codes correctly: cryptodev returns 0 for success whereas OpenSSL
returns 1.
2010-03-01 23:54:47 +00:00
Dr. Stephen Henson
a05b8d0ede
use supplied ENGINE in genrsa
2010-03-01 14:22:21 +00:00
Dr. Stephen Henson
ff2fdbf2f8
oops, reinstate correct prototype
2010-03-01 03:01:27 +00:00
Dr. Stephen Henson
da3955256d
'typo'
2010-03-01 01:53:34 +00:00
Dr. Stephen Henson
5e28ccb798
make USE_CRYPTODEV_DIGESTS work
2010-03-01 01:19:18 +00:00
Dr. Stephen Henson
a6575572c6
load cryptodev if HAVE_CRYPTODEV is set too
2010-03-01 00:40:10 +00:00
Dr. Stephen Henson
c3951d8973
update cryptodev to match 1.0.0 stable branch version
2010-03-01 00:37:58 +00:00
Ben Laurie
19ec2f4194
Fix warnings (note that gcc 4.2 has a bug that makes one of its
...
warnings hard to fix without major surgery).
2010-02-28 14:22:56 +00:00
Dr. Stephen Henson
2b13f80360
algorithms field has changed in 1.0.0 and later: update
2010-02-28 00:24:04 +00:00
Dr. Stephen Henson
40c5eaeeec
oops, revert verify.c change
2010-02-27 23:03:26 +00:00
Dr. Stephen Henson
c1ca9d3238
Add Kerberos fix which was in 0.9.8-stable but never committed to HEAD and
...
1.0.0. Original fix was on 2007-Mar-09 and had the log message: "Fix kerberos
ciphersuite bugs introduced with PR:1336."
2010-02-27 23:02:41 +00:00
Dr. Stephen Henson
48435b2098
include TVS 1.1 version string
2010-02-26 19:38:33 +00:00
Dr. Stephen Henson
37c541faed
Revert CFB block length change. Despite what SP800-38a says the input to
...
CFB mode does *not* have to be a multiple of the block length and several
other specifications (e.g. PKCS#11) do not require this.
2010-02-26 14:41:58 +00:00
Dr. Stephen Henson
0f776277bc
oops, use correct date
2010-02-26 12:13:36 +00:00
Dr. Stephen Henson
5814d829e6
update NEWS
2010-02-25 18:20:30 +00:00
Dr. Stephen Henson
f6bb465f87
update FAQ
2010-02-25 18:18:46 +00:00
Dr. Stephen Henson
db28aa86e0
add -trusted_first option and verify flag
2010-02-25 12:21:48 +00:00
Dr. Stephen Henson
2da2ff5065
tidy verify code. xn not used any more and check for self signed more efficiently
2010-02-25 11:18:26 +00:00
Dr. Stephen Henson
fbd2164044
Experimental support for partial chain verification: if an intermediate
...
certificate is explicitly trusted (using -addtrust option to x509 utility
for example) the verification is sucessful even if the chain is not complete.
2010-02-25 00:17:22 +00:00
Dr. Stephen Henson
04e4b82726
allow setting of verify names in command line utilities and print out verify names in verify utility
2010-02-25 00:11:32 +00:00
Dr. Stephen Henson
9b3d75706e
verify parameter enumeration functions
2010-02-25 00:08:23 +00:00
Dr. Stephen Henson
b1efb7161f
Include self-signed flag in certificates by checking SKID/AKID as well
...
as issuer and subject names. Although this is an incompatible change
it should have little impact in pratice because self-issued certificates
that are not self-signed are rarely encountered.
2010-02-25 00:01:38 +00:00
Dr. Stephen Henson
df4c395c6d
add anyExtendedKeyUsage OID
2010-02-24 15:53:58 +00:00
Dr. Stephen Henson
385a488c43
prevent warning
2010-02-24 15:24:19 +00:00
Andy Polyakov
ea746dad5e
Reserve for option to implement AES counter in assembler.
2010-02-23 16:51:24 +00:00
Andy Polyakov
d976f99294
Add AES counter mode to EVP.
2010-02-23 16:48:41 +00:00
Andy Polyakov
e5a4de9e44
Add assigned OIDs, as well as "anonymous" ones for AES counter mode.
2010-02-23 16:47:17 +00:00
Dr. Stephen Henson
7d3d1788a5
The meaning of the X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY and
...
X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT error codes were reversed in
the verify application documentation.
2010-02-23 14:09:09 +00:00
Bodo Möller
2d9dcd4ff0
Always check bn_wexpend() return values for failure (CVE-2009-3245).
...
(The CHANGES entry covers the change from PR #2111 as well, submitted by
Martin Olsson.)
Submitted by: Neel Mehta
2010-02-23 10:36:35 +00:00
Bodo Möller
a839755329
Fix X509_STORE locking
2010-02-19 18:27:07 +00:00
Dr. Stephen Henson
69582a592e
clarify documentation
2010-02-18 12:41:33 +00:00
Dr. Stephen Henson
7512141162
OR default SSL_OP_LEGACY_SERVER_CONNECT so existing options are preserved
2010-02-17 19:43:56 +00:00
Dr. Stephen Henson
c2c49969e2
Allow renegotiation if SSL_OP_LEGACY_SERVER_CONNECT is set as well as
...
initial connection to unpatched servers. There are no additional security
concerns in doing this as clients don't see renegotiation during an
attack anyway.
2010-02-17 18:38:31 +00:00
Dr. Stephen Henson
47e0a1c335
PR: 2100
...
Submitted by: James Baker <jbaker@tableausoftware.com > et al.
Workaround for slow Heap32Next on some versions of Windows.
2010-02-17 14:32:41 +00:00
Dr. Stephen Henson
439aab3afc
Submitted by: Dmitry Ivanov <vonami@gmail.com>
...
Don't leave dangling pointers in GOST engine if calls fail.
2010-02-16 14:30:29 +00:00
Dr. Stephen Henson
8d934c2585
PR: 2171
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Since SSLv2 doesn't support renegotiation at all don't reject it if
legacy renegotiation isn't enabled.
Also can now use SSL2 compatible client hello because RFC5746 supports it.
2010-02-16 14:21:11 +00:00
Dr. Stephen Henson
1458b931eb
The "block length" for CFB mode was incorrectly coded as 1 all the time. It
...
should be the number of feedback bits expressed in bytes. For CFB1 mode set
this to 1 by rounding up to the nearest multiple of 8.
2010-02-15 19:40:16 +00:00
Dr. Stephen Henson
20eb7238cb
Correct ECB mode EVP_CIPHER definition: IV length is 0
2010-02-15 19:26:02 +00:00
Dr. Stephen Henson
79cfc3ac54
add EVP_CIPH_FLAG_LENGTH_BITS from 0.9.8-stable
2010-02-15 19:20:13 +00:00
Dr. Stephen Henson
918a5d04e4
PR: 2164
...
Submitted by: "Noszticzius, Istvan" <inoszticzius@rightnow.com >
Don't clear the output buffer: ciphers should correctly the same input
and output buffers.
2010-02-15 19:00:12 +00:00
Dr. Stephen Henson
f959598866
update references to new RI RFC
2010-02-12 21:59:31 +00:00
Dr. Stephen Henson
5a9e3f05ff
PR: 2170
...
Submitted by: Magnus Lilja <lilja.magnus@gmail.com >
Make -c option in dgst work again.
2010-02-12 17:07:16 +00:00
Dr. Stephen Henson
29e722f031
Fix memory leak in ENGINE autoconfig code. Improve error logging.
2010-02-09 14:17:14 +00:00
Dr. Stephen Henson
05566760da
update year
2010-02-09 14:12:49 +00:00
Dr. Stephen Henson
e3e31ff482
Use supplied ENGINE when initialising CMAC. Restore pctx setting.
2010-02-08 16:31:28 +00:00
Dr. Stephen Henson
bae060c06a
add cvsignore
2010-02-08 15:34:02 +00:00
Dr. Stephen Henson
0ff907caf8
Make update.
2010-02-08 15:33:23 +00:00
Dr. Stephen Henson
c8ef656df2
Make CMAC API similar to HMAC API. Add methods for CMAC.
2010-02-08 15:31:35 +00:00
Dr. Stephen Henson
8c968e0355
Initial experimental CMAC implementation.
2010-02-07 18:01:07 +00:00
Dr. Stephen Henson
cc0661374f
make update
2010-02-07 13:54:30 +00:00
Dr. Stephen Henson
089f02c577
oops, use new value for new flag
2010-02-07 13:50:36 +00:00
Dr. Stephen Henson
c2bf720842
Add missing function EVP_CIPHER_CTX_copy(). Current code uses memcpy() to copy
...
an EVP_CIPHER_CTX structure which may have problems with external ENGINEs
who need to duplicate internal handles etc.
2010-02-07 13:39:39 +00:00
Dr. Stephen Henson
c95bf51167
don't assume 0x is at start of string
2010-02-03 18:19:22 +00:00
Dr. Stephen Henson
2712a2f625
tolerate broken CMS/PKCS7 implementations using signature OID instead of digest
2010-02-02 14:30:39 +00:00
Dr. Stephen Henson
17ebc10ffa
PR: 2161
...
Submitted by: Doug Goldstein <cardoe@gentoo.org >, Steve.
Make no-dsa, no-ecdsa and no-rsa compile again.
2010-02-02 13:35:27 +00:00
Dr. Stephen Henson
434745dc19
PR: 2160
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Make session tickets work with DTLS.
2010-02-01 16:51:09 +00:00
Dr. Stephen Henson
b380f9b884
PR: 2159
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Typo in PR#1949 bug, oops!
2010-02-01 12:43:45 +00:00
Richard Levitte
749af8cb61
Typo.
2010-01-29 12:07:46 +00:00
Richard Levitte
1d62de0395
The previous take went wrong, try again.
2010-01-29 12:02:50 +00:00
Richard Levitte
d7b99700c0
Architecture specific header files need special handling.
2010-01-29 11:44:36 +00:00
Richard Levitte
cd6bc02b29
If opensslconf.h and buildinf.h are to be in an architecture specific
...
directory, place it in the same tree as the other architecture
specific things.
2010-01-29 11:43:50 +00:00
Dr. Stephen Henson
da454e4c67
typo
2010-01-29 00:09:33 +00:00
Dr. Stephen Henson
08c239701b
Experimental renegotiation support in s_server test -www server.
2010-01-28 19:48:36 +00:00
Dr. Stephen Henson
92714455af
In engine_table_select() don't clear out entire error queue: just clear
...
out any we added using ERR_set_mark() and ERR_pop_to_mark() otherwise
errors from other sources (e.g. SSL library) can be wiped.
2010-01-28 17:49:25 +00:00
Dr. Stephen Henson
00b525781b
oops revert test code accidentally committed
2010-01-28 16:48:39 +00:00
Dr. Stephen Henson
891d3c7a60
revert previous change
2010-01-28 14:17:39 +00:00
Dr. Stephen Henson
9fb6fd34f8
reword RI description
2010-01-27 18:53:33 +00:00
Dr. Stephen Henson
c2963f5b87
revert wrongly committed test code
2010-01-27 17:49:33 +00:00
Dr. Stephen Henson
99b36a8c31
update documentation to reflect new renegotiation options
2010-01-27 17:46:24 +00:00
Dr. Stephen Henson
89e56aebef
Some shells print out the directory name if CDPATH is set breaking the
...
pod2man test. Use ./util instead to avoid this.
2010-01-27 16:07:17 +00:00
Dr. Stephen Henson
4ba1aa393b
typo
2010-01-27 14:05:39 +00:00
Dr. Stephen Henson
1e27847d4e
PR: 2157
...
Submitted by: "Green, Paul" <Paul.Green@stratus.com >
Typo.
2010-01-27 12:54:58 +00:00
Richard Levitte
407a410136
Have the VMS build system catch up with the 1.0.0-stable branch.
2010-01-27 09:18:42 +00:00
Richard Levitte
9921f865e4
Apparently, test/testtsa.com was only half done
2010-01-27 01:19:07 +00:00
Richard Levitte
c8c07be883
size_t doesn't compare less than zero...
2010-01-27 01:18:21 +00:00
Dr. Stephen Henson
d5e7f2f2c3
PR: 1949
...
Submitted by: steve@openssl.org
More robust fix and workaround for PR#1949. Don't try to work out if there
is any write pending data as this can be unreliable: always flush.
2010-01-26 19:47:37 +00:00
Dr. Stephen Henson
1bfdbd8e75
PR: 2138
...
Submitted by: Kevin Regan <k.regan@f5.com >
Clear stat structure if -DPURIFY is set to avoid problems on some
platforms which include unitialised fields.
2010-01-26 18:07:26 +00:00
Dr. Stephen Henson
e92f9f45e8
Add flags functions which were added to 0.9.8 for fips but not 1.0.0 and
...
later.
2010-01-26 14:29:06 +00:00
Dr. Stephen Henson
8c02119e39
OPENSSL_isservice is now defined on all platforms not just WIN32
2010-01-26 13:59:32 +00:00
Dr. Stephen Henson
ca9f55f710
export OPENSSL_isservice and make update
2010-01-26 13:52:36 +00:00
Dr. Stephen Henson
58c0da84dd
Typo
2010-01-26 12:30:00 +00:00
Andy Polyakov
964ed94649
parisc-mont.pl: PA-RISC 2.0 code path optimization based on intruction-
...
level profiling data resulted in almost 50% performance improvement.
PA-RISC 1.1 is also reordered in same manner, mostly to be consistent,
as no gain was observed, not on PA-7100LC.
2010-01-25 23:12:00 +00:00
Dr. Stephen Henson
cab6de03a2
PR: 2149
...
Submitted by: Douglas Stebila <douglas@stebila.ca >
Fix wap OIDs.
2010-01-25 16:07:42 +00:00
Richard Levitte
2d851ab919
There's really no need to use $ENV::HOME
2010-01-25 00:22:57 +00:00
Richard Levitte
04dbf0272e
Forgot to correct the definition of __arch in this file.
...
Submitted by Steven M. Schweda <sms@antinode.info >
2010-01-25 00:21:12 +00:00
Richard Levitte
d15dd388c1
It seems like sslroot: needs to be defined for some tests to work.
...
Submitted by Steven M. Schweda <sms@antinode.info >
2010-01-25 00:20:29 +00:00
Richard Levitte
c3502985b2
Compile t1_reneg on VMS as well.
...
Submitted by Steven M. Schweda <sms@antinode.info >
2010-01-25 00:19:31 +00:00
Richard Levitte
6fa0608eaf
A few more macros for long symbols.
...
Submitted by Steven M. Schweda <sms@antinode.info >
2010-01-25 00:18:29 +00:00
Andy Polyakov
3f2a98acbf
ia64cpuid.S: OPENSSL_cleanse to accept zero length parameter.
2010-01-24 17:08:52 +00:00
Dr. Stephen Henson
bc120a54c9
PR: 2153, 2125
...
Submitted by: steve@openssl.org
The original fix for PR#2125 broke compilation on some Unixware platforms:
revert and make conditional on VMS.
2010-01-24 16:57:20 +00:00
Andy Polyakov
82a66ce313
pariscid.pl: OPENSSL_cleanse to compile on PA-RISC 2.0W and to accept zero
...
length parameter.
2010-01-24 15:04:28 +00:00
Andy Polyakov
7676eebf42
OPENSSL_cleanse to accept zero length parameter [matching C implementation].
2010-01-24 14:54:24 +00:00
Dr. Stephen Henson
21a5c040e5
The fix for PR#1949 unfortunately broke cases where the BIO_CTRL_WPENDING
...
ctrl is incorrectly implemented (e.g. some versions of Apache). As a workaround
call both BIO_CTRL_INFO and BIO_CTRL_WPENDING if it returns zero. This should
both address the original bug and retain compatibility with the old behaviour.
2010-01-24 13:54:20 +00:00
Dr. Stephen Henson
ba64ae6cd1
Tolerate PKCS#8 DSA format with negative private key.
2010-01-22 20:17:12 +00:00
Dr. Stephen Henson
3a88efd48c
If legacy renegotiation is not permitted then send a fatal alert if a patched
...
server attempts to renegotiate with an unpatched client.
2010-01-22 18:49:34 +00:00
Dr. Stephen Henson
3243698f1d
typo
2010-01-21 18:46:15 +00:00
Dr. Stephen Henson
55f39a199d
fix comments
2010-01-21 01:17:17 +00:00
Dr. Stephen Henson
49371e3acb
oops
2010-01-20 17:59:53 +00:00
Dr. Stephen Henson
eb125795d2
update NEWS file
2010-01-20 17:56:34 +00:00
Dr. Stephen Henson
3ec5f38b47
Update demo
2010-01-20 14:06:21 +00:00
Dr. Stephen Henson
a70e377fd8
Support -L options in VC++ link.
2010-01-20 14:04:44 +00:00
Andy Polyakov
b3020393f2
rand_win.c: fix time limit logic.
2010-01-19 20:35:22 +00:00
Dr. Stephen Henson
071ef65cfa
The use of NIDs in the password based encryption table can result in
...
algorithms not found when an application uses PKCS#12 and only calls
SSL_library_init() instead of OpenSSL_add_all_algorithms(). Simple
work around is to add the missing algorithm (40 bit RC2) in
SSL_library_init().
2010-01-19 19:56:06 +00:00
Dr. Stephen Henson
d5e8d8b547
PR: 2141
...
Submitted by: "NARUSE, Yui" <naruse@airemix.jp >
Remove non-ASCII comment which causes compilation errors on some versions
of VC++.
2010-01-19 19:28:18 +00:00
Dr. Stephen Henson
0debb681e1
PR: 2144
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Better fix for PR#2144
2010-01-19 19:11:35 +00:00
Andy Polyakov
46c42e78ff
Enable PA-RISC assembler in Configure (feedback from PA-RISC 2.0 is still
...
needed).
2010-01-19 17:10:24 +00:00
Andy Polyakov
ee2b8ed2f5
x86_64-xlate.pl: refine sign extension logic when handling lea.
...
PR: 2094,2095
2010-01-19 16:15:23 +00:00
Andy Polyakov
7a6e0901ff
rand_win.c: handle GetTickCount wrap-around.
2010-01-19 13:48:18 +00:00
Andy Polyakov
91fdacb2c3
s390x assembler update: add support for run-time facility detection.
2010-01-19 12:24:59 +00:00
Andy Polyakov
d582c98d8f
apps/speed.c: limit loop counters to 2^31 in order to avoid overflows
...
in performance calculations. For the moment there is only one code
fast enough to suffer from this: Intel AES-NI engine.
PR: 2096
2010-01-17 17:31:38 +00:00
Andy Polyakov
78a533cb93
Minor updates to ppccap.c and ppccpuid.pl.
2010-01-17 13:44:14 +00:00
Andy Polyakov
4f38565204
bn_lcl.h: add MIPS III-specific BN_UMULT_LOHI as alternative to porting
...
crypto/bn/asm/mips3.s from IRIX. Performance improvement is not as
impressive as with complete assembler, but still... it's almost 2.5x
[on R5000].
2010-01-17 12:08:24 +00:00
Andy Polyakov
4407700c40
ia64-mont.pl: add shorter vector support ("shorter" refers to 512 bits and
...
less).
2010-01-17 11:33:59 +00:00
Dr. Stephen Henson
72a9776abc
PR: 2135
...
Submitted by: Mike Frysinger <vapier@gentoo.org >
Change missed references to lib to $(LIBDIR)
2010-01-16 20:05:59 +00:00
Dr. Stephen Henson
8d39d2800a
PR: 2144
...
Submitted by: steve@openssl.org
Fix DTLS connection so new_session is reset if we read second client hello:
new_session is used to detect renegotiation.
2010-01-16 19:46:10 +00:00
Dr. Stephen Henson
598b562a7f
PR: 2133
...
Submitted by: steve@openssl.org
Add missing DTLS state strings.
2010-01-16 19:20:52 +00:00
Dr. Stephen Henson
dac40f87df
convert to Unix EOL form
2010-01-15 15:26:12 +00:00
Dr. Stephen Henson
031c78901b
make update
2010-01-15 15:24:19 +00:00
Dr. Stephen Henson
ce1ec9c35e
PR: 2125
...
Submitted by: "Alon Bar-Lev" <alon.barlev@gmail.com >
Fix gcc-aix compilation issue.
2010-01-14 17:51:29 +00:00
Dr. Stephen Henson
bd5f21a4ae
Fix version handling so it can cope with a major version >3.
...
Although it will be many years before TLS v2.0 or later appears old versions
of servers have a habit of hanging around for a considerable time so best
if we handle this properly now.
2010-01-13 19:08:02 +00:00
Dr. Stephen Henson
1b31b5ad56
Modify compression code so it avoids using ex_data free functions. This
...
stops applications that call CRYPTO_free_all_ex_data() prematurely leaking
memory.
2010-01-13 18:57:40 +00:00
Dr. Stephen Henson
97438f38df
update and sync ordinals
2010-01-12 17:34:39 +00:00
Dr. Stephen Henson
0e0c6821fa
PR: 2136
...
Submitted by: Willy Weisz <weisz@vcpc.univie.ac.at >
Add options to output hash using older algorithm compatible with OpenSSL
versions before 1.0.0
2010-01-12 17:29:34 +00:00
Dr. Stephen Henson
423c66f10e
Simplify RI+SCSV logic:
...
1. Send SCSV is not renegotiating, never empty RI.
2. Send RI if renegotiating.
2010-01-07 19:04:52 +00:00
Andy Polyakov
74f2260694
ia64-mont.pl: addp4 is not needed when referring to stack (this is 32-bit
...
HP-UX thing).
2010-01-07 15:36:59 +00:00
Andy Polyakov
25d1d62275
http://cvs.openssl.org/chngview?cn=19053 made me wonder if bind() and
...
connect() are as finicky as sendto() when it comes to socket address
length. As it turned out they are, therefore the fix. Note that you
can't reproduce the problem on Linux, it was failing on Solaris,
FreeBSD, most likely on more...
2010-01-07 13:12:30 +00:00
Andy Polyakov
9b5ca55695
sendto is reportedly picky about destination socket address length.
...
PR: 2114
Submitted by: Robin Seggelmann
2010-01-07 10:42:39 +00:00
Andy Polyakov
cba9ffc32a
Fix compilation on older Linux. Linux didn't always have sockaddr_storage,
...
not to mention that first sockaddr_storage had __ss_family, not ss_family.
In other words it makes more sense to avoid sockaddr_storage...
2010-01-06 21:22:56 +00:00
Dr. Stephen Henson
76998a71bc
Updates to conform with draft-ietf-tls-renegotiation-03.txt:
...
1. Add provisional SCSV value.
2. Don't send SCSV and RI at same time.
3. Fatal error is SCSV received when renegotiating.
2010-01-06 17:37:09 +00:00
Dr. Stephen Henson
dd792d6222
Missing commit from change ofr compress_meth to unsigned
2010-01-06 17:35:27 +00:00
Dr. Stephen Henson
82a107eaa8
compress_meth should be unsigned
2010-01-06 14:01:45 +00:00
Dr. Stephen Henson
f8e1ab79f5
ENGINE_load_capi() now exists on all platforms (but no op on non-WIN32)
2010-01-06 13:21:08 +00:00
Andy Polyakov
1f23001d07
ppc64-mont.pl: commentary update.
2010-01-06 10:58:59 +00:00
Andy Polyakov
dacdcf3c15
Add Montgomery multiplication module for IA-64.
2010-01-06 10:57:55 +00:00
Dr. Stephen Henson
60c52245e1
PR: 2102
...
Submitted by: John Fitzgibbon <john_fitzgibbon@yahoo.com >
Remove duplicate definitions.
2010-01-05 17:57:33 +00:00
Dr. Stephen Henson
2a30fec786
Typo
2010-01-05 17:49:49 +00:00
Dr. Stephen Henson
3ddf85033d
PR: 2132
...
Submitted by: steve
Fix bundled pod2man.pl to handle alternative comment formats.
2010-01-05 17:32:54 +00:00
Dr. Stephen Henson
6084c797a8
Remove tabs on blank lines: they produce warnings in pod2man
2010-01-05 17:16:54 +00:00
Dr. Stephen Henson
2be3d6ebc8
Client side compression algorithm sanity checks: ensure old compression
...
algorithm matches current and give error if compression is disabled and
server requests it (shouldn't happen unless server is broken).
2010-01-01 14:39:37 +00:00
Dr. Stephen Henson
e6f418bcb7
Compression handling on session resume was badly broken: it always
...
used compression algorithms in client hello (a legacy from when
the compression algorithm wasn't serialized with SSL_SESSION).
2009-12-31 14:13:30 +00:00
Dr. Stephen Henson
5e63121758
Include CHANGES entry for external cache
2009-12-31 13:58:57 +00:00
Andy Polyakov
2f4c1dc86c
b_sock.c: correct indirect calls on WinSock platforms.
...
PR: 2130
Submitted by: Eugeny Gostyukhin
2009-12-30 12:55:23 +00:00
Andy Polyakov
f87e307875
Adapt mingw config for newer mingw environment. Note modified conditional
...
compilation in e_capi.c.
PR: 2113
2009-12-30 11:46:54 +00:00
Andy Polyakov
70b76d392f
ppccap.c: fix compiler warning and perform sanity check outside signal masking.
...
ppc64-mont.pl: clarify comment and fix spelling.
2009-12-29 11:18:16 +00:00
Andy Polyakov
6a9d28f9e4
Deploy multilib config-line parameter. It was added in February to allow
...
for kind of installation suggested in ticket #2003 from August. What it
effectively does now, is arrange pre-configured default $libdir value.
Note that it also fixes ENGINESDIR, i.e. harmonizes it with install path.
2009-12-29 10:33:37 +00:00
Andy Polyakov
3fc2efd241
PA-RISC assembler: missing symbol and typos.
2009-12-28 16:13:35 +00:00
Dr. Stephen Henson
76774c5ea1
return v1.1 methods for client/server
2009-12-28 00:31:16 +00:00
Dr. Stephen Henson
35b0ea4efe
Add simple external session cache to s_server. This serialises sessions
...
just like a "real" server making it easier to trace any problems.
2009-12-27 23:24:45 +00:00
Dr. Stephen Henson
73527122c9
Typo
2009-12-27 23:02:50 +00:00
Dr. Stephen Henson
d68015764e
Update RI to match latest spec.
...
MCSV is now called SCSV.
Don't send SCSV if renegotiating.
Also note if RI is empty in debug messages.
2009-12-27 22:58:55 +00:00
Andy Polyakov
b57599b70c
Update sha512-parisc.pl and add make rules.
2009-12-27 21:05:19 +00:00
Andy Polyakov
cb3b9b1323
Throw in more PA-RISC assembler.
2009-12-27 20:49:40 +00:00
Andy Polyakov
beef714599
Switch to new uplink assembler.
2009-12-27 20:38:32 +00:00
Andy Polyakov
d741cf2267
ppccap.c: tidy up.
...
ppc64-mont.pl: missing predicate in commentary.
2009-12-27 11:25:24 +00:00
Andy Polyakov
b4b48a107c
ppc64-mont.pl: adapt for 32-bit and engage for all builds.
2009-12-26 21:30:13 +00:00
Dr. Stephen Henson
7e765bf29a
Traditional Yuletide commit ;-)
...
Add Triple DES CFB1 and CFB8 to algorithm list and NID translation.
2009-12-25 14:13:11 +00:00
Bodo Möller
8580f8015f
Use properly local variables for thread-safety.
...
Submitted by: Martin Rex
2009-12-22 11:52:17 +00:00
Bodo Möller
f21516075f
Constify crypto/cast.
2009-12-22 11:46:00 +00:00
Bodo Möller
7427379e9b
Constify crypto/cast.
2009-12-22 10:58:33 +00:00
Dr. Stephen Henson
fbed9f8158
Alert to use is now defined in spec: update code
2009-12-17 15:42:52 +00:00
Dr. Stephen Henson
e50858c559
PR: 2127
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Check for lookup failures in EVP_PBE_CipherInit().
2009-12-17 15:27:57 +00:00
Dr. Stephen Henson
ef51b4b9b4
New option to enable/disable connection to unpatched servers
2009-12-16 20:25:59 +00:00
Dr. Stephen Henson
c27c9cb4f7
Allow initial connection (but no renegoriation) to servers which don't support
...
RI.
Reorganise RI checking code and handle some missing cases.
2009-12-14 13:56:04 +00:00
Dr. Stephen Henson
22c2155595
Move SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION out of SSL_OP_ALL and move SSL_OP_NO_TLSv1_1
2009-12-11 00:23:12 +00:00
Dr. Stephen Henson
b5c002d5a8
clarify docs
2009-12-09 18:16:50 +00:00
Dr. Stephen Henson
4db82571ba
Document option clearning functions.
...
Initial secure renegotiation documentation.
2009-12-09 17:59:29 +00:00
Dr. Stephen Henson
89408580ed
remove DEBUG_UNUSED from config for now
2009-12-09 15:56:24 +00:00
Dr. Stephen Henson
a8640f0a7d
Check s3 is not NULL
2009-12-09 15:03:44 +00:00
Dr. Stephen Henson
338a61b94e
Add patch to crypto/evp which didn't apply from PR#2124
2009-12-09 15:01:39 +00:00
Dr. Stephen Henson
e4bcadb302
Revert lhash patch for PR#2124
2009-12-09 14:59:47 +00:00
Dr. Stephen Henson
fdb2c6e4e5
PR: 2124
...
Submitted by: Jan Pechanec <Jan.Pechanec@Sun.COM >
Check for memory allocation failures.
2009-12-09 13:38:05 +00:00
Dr. Stephen Henson
7661ccadf0
Add ctrls to clear options and mode.
...
Change RI ctrl so it doesn't clash.
2009-12-09 13:25:16 +00:00
Dr. Stephen Henson
82e610e2cf
Send no_renegotiation alert as required by spec.
2009-12-08 19:06:26 +00:00
Dr. Stephen Henson
5430200b8b
Add ctrl and macro so we can determine if peer support secure renegotiation.
2009-12-08 13:42:08 +00:00
Dr. Stephen Henson
13f6d57b1e
Add support for magic cipher suite value (MCSV). Make secure renegotiation
...
work in SSLv3: initial handshake has no extensions but includes MCSV, if
server indicates RI support then renegotiation handshakes include RI.
NB: current MCSV value is bogus for testing only, will be updated when we
have an official value.
Change mismatch alerts to handshake_failure as required by spec.
Also have some debugging fprintfs so we can clearly see what is going on
if OPENSSL_RI_DEBUG is set.
2009-12-08 13:14:03 +00:00
Dr. Stephen Henson
8025e25113
PR: 2121
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Add extension support to DTLS code mainly using existing implementation for
TLS.
2009-12-08 11:37:40 +00:00
Dr. Stephen Henson
637f374ad4
Initial experimental TLSv1.1 support
2009-12-07 13:31:02 +00:00
Dr. Stephen Henson
7e4cae1d2f
PR: 2111
...
Submitted by: Martin Olsson <molsson@opera.com >
Check for bn_wexpand errors in bn_mul.c
2009-12-02 15:28:42 +00:00
Dr. Stephen Henson
9d9530255b
Update CHANGES.
2009-12-02 15:28:27 +00:00
Dr. Stephen Henson
3533ab1fee
Replace the broken SPKAC certification with the correct version.
2009-12-02 14:41:51 +00:00
Dr. Stephen Henson
ec7d16ffdd
Check it actually compiles this time ;-)
2009-12-02 14:25:40 +00:00
Dr. Stephen Henson
5656f33cea
PR: 2120
...
Submitted by: steve@openssl.org
Initialize fields correctly if pem_str or info are NULL in EVP_PKEY_asn1_new().
2009-12-02 13:56:45 +00:00
Dr. Stephen Henson
7f354fa42d
Ooops...
2009-12-01 18:40:50 +00:00
Dr. Stephen Henson
6732e14278
check DSA_sign() return value properly
2009-12-01 18:39:33 +00:00
Dr. Stephen Henson
499684404c
PR: 2115
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Add Renegotiation extension to DTLS, fix DTLS ClientHello processing bug.
2009-12-01 17:42:15 +00:00
Dr. Stephen Henson
606c46fb6f
PR: 1432
...
Submitted by: "Andrzej Chmielowiec" <achmielowiec@enigma.com.pl >, steve@openssl.org
Approved by: steve@openssl.org
Truncate hash if it is too large: as required by FIPS 186-3.
2009-12-01 17:32:44 +00:00
Dr. Stephen Henson
fed8dbf46d
PR: 2118
...
Submitted by: Mounir IDRASSI <mounir.idrassi@idrix.net >
Approved by: steve@openssl.org
Check return value of ECDSA_sign() properly.
2009-11-30 13:56:04 +00:00
Dr. Stephen Henson
c2f0203da0
typo
2009-11-29 13:45:42 +00:00
Andy Polyakov
b6bf9e2ea7
bss_dgram.c: re-fix BIO_CTRL_DGRAM_GET_PEER.
...
PR: 2110
2009-11-26 20:52:08 +00:00
Dr. Stephen Henson
d2a53c2238
Experimental CMS password based recipient Info support.
2009-11-26 18:57:39 +00:00
Bodo Möller
480af99ef4
Make CHANGES in CVS head consistent with the CHANGES files in the
...
branches.
This means that http://www.openssl.org/news/changelog.html will
finally describe 0.9.8l.
2009-11-26 18:43:17 +00:00
Dr. Stephen Henson
f2334630a7
Add OID for PWRI KEK algorithm.
2009-11-25 22:07:49 +00:00
Dr. Stephen Henson
007f7ec1bd
Add PBKFD2 prototype.
2009-11-25 22:07:22 +00:00
Dr. Stephen Henson
3d63b3966f
Split PBES2 into cipher and PBKDF2 versions. This tidies the code somewhat
...
and is a pre-requisite to adding password based CMS support.
2009-11-25 22:01:06 +00:00
Andy Polyakov
451038b40c
cms-test.pl: use EXE_EXT.
...
PR: 2107
2009-11-23 20:28:17 +00:00
Andy Polyakov
7766bc1a19
util/pl/VC-32.pl: bufferoverflowu.lib only when actually needed and
...
eliminate duplicate code.
PR: 2086
2009-11-19 22:29:03 +00:00
Dr. Stephen Henson
6cef3a7f9c
Servers can't end up talking SSLv2 with legacy renegotiation disabled
2009-11-18 15:09:44 +00:00
Dr. Stephen Henson
4d09323a63
Don't use SSLv2 compatible client hello if we don't tolerate legacy renegotiation
2009-11-18 14:45:48 +00:00
Dr. Stephen Henson
64abf5e657
Include a more meaningful error message when rejecting legacy renegotiation
2009-11-18 14:20:21 +00:00
Dr. Stephen Henson
446a6a8af7
PR: 2103
...
Submitted by: Rob Austein <sra@hactrn.net >
Approved by: steve@openssl.org
Initialise atm.flags to 0.
2009-11-17 13:25:53 +00:00
Dr. Stephen Henson
320d3fd6af
PR: 2101 (additional)
...
Submitted by: Roumen Petrov <openssl@roumenpetrov.info >
Approved by: steve@openssl.org
Another mingw fix.
2009-11-15 19:05:13 +00:00
Andy Polyakov
cca3ea1e71
OPENSSL_ia32cap.pod update.
2009-11-15 17:34:24 +00:00
Andy Polyakov
a83f83aac8
Add sha512-parisc.pl.
2009-11-15 17:29:31 +00:00
Andy Polyakov
5727f1f790
SHA1 assembler show off: minor performance updates and new modules for
...
forgotten CPUs.
2009-11-15 17:26:11 +00:00
Andy Polyakov
53f73afc4d
sha512.c: there apparently is ILP32 PowerPC platform, where it is safe to
...
inline 64-bit assembler instructions. Normally it's inappropriate, because
signalling doesn't preserve upper halves of general purpose registers.
Meaning that it's only safe if signals are blocked for the time "wide"
code executes.
PR: 1998
2009-11-15 17:19:49 +00:00
Andy Polyakov
10232bdc0e
x86_64-xlate.pl: new gas requires sign extention in lea instruction.
...
This resolves md5-x86_64.pl and sha1-x86_64.pl bugs, but without modifying
the code.
PR: 2094,2095
2009-11-15 17:11:38 +00:00
Andy Polyakov
55ff3aff8c
x86masm.pl: eliminate linker "multiple sections found with different
...
attributes" warning.
2009-11-15 17:06:44 +00:00
Andy Polyakov
b7cec490fa
bss_dgram.c: more elegant solution to PR#2069. Use socklen_t heuristic
...
from b_sock.c, don't assume that caller always passes pointer to buffer
large enough to hold sockaddr_storage.
PR: 2069
2009-11-15 17:03:33 +00:00
Andy Polyakov
2335e8a9cc
b_sock.c: fix compiler warning.
2009-11-15 16:52:11 +00:00
Andy Polyakov
6f766a4181
aesni-x86.pl: eliminate development comments.
2009-11-15 16:40:22 +00:00
Dr. Stephen Henson
f741382b3c
PR: 2101
...
Submitted by: Doug Kaufman <dkaufman@rahul.net >
Approved by: steve@openssl.org
Fixes for tests in cms-test.pl
2009-11-13 13:44:25 +00:00
Dr. Stephen Henson
c18e51ba5e
PR: 2088
...
Submitted by: Aleksey Samsonov <s4ms0n0v@gmail.com >
Approved by: steve@openssl.org
Fix memory leak in d2i_PublicKey().
2009-11-12 19:56:56 +00:00
Dr. Stephen Henson
773b63d6f9
set engine to NULL after releasing it
2009-11-12 19:25:37 +00:00
Richard Levitte
0a02d1db34
Update from 1.0.0-stable
2009-11-12 17:03:10 +00:00
Dr. Stephen Henson
ff094bc2d1
PR: 2098
...
Submitted by: Corinna Vinschen <vinschen@redhat.com >
Approved by: steve@openssl.org
For Cygwin enable zlib and mdc2 by default.
2009-11-11 19:05:20 +00:00
Dr. Stephen Henson
860c3dd1b6
add missing parts of reneg port, fix apps patch
2009-11-11 14:51:19 +00:00
Dr. Stephen Henson
2942dde56c
commit missing apps code for reneg fix
2009-11-11 14:10:24 +00:00
Dr. Stephen Henson
0f6e21385e
PR: 1686
...
Submitted by: Hanno Böck <hanno@hboeck.de >
Approved by: steve@openssl.org
Create engines dir if it doesn't already exist.
2009-11-10 01:52:41 +00:00
Dr. Stephen Henson
709a395d1c
PR: 2091
...
Submitted by: Martin Kaiser <lists@kaiser.cx >, Stephen Henson
Approved by: steve@openssl.org
If an OID has no short name or long name return the numerical representation.
2009-11-10 01:00:07 +00:00
Dr. Stephen Henson
b599006751
PR: 2090
...
Submitted by: Martin Kaiser <lists@kaiser.cx >, Stephen Henson
Approved by: steve@openssl.org
Improve error checking in asn1_gen.c
2009-11-10 00:48:07 +00:00
Dr. Stephen Henson
e0e7997212
First cut of renegotiation extension. (port to HEAD)
2009-11-09 19:03:34 +00:00
Dr. Stephen Henson
befbd0619b
update CHANGES
2009-11-09 17:33:32 +00:00
Dr. Stephen Henson
f423c63bb0
make udpate
2009-11-09 14:56:33 +00:00
Dr. Stephen Henson
9acc65006c
Remove BF_PTR2 from configuration: it doesn't improve performance any more and causes gcc warnings about arrays out of range
2009-11-09 14:13:23 +00:00
Dr. Stephen Henson
7ba3838a4b
If it is a new session don't send the old TLS ticket: send a zero length
...
ticket to request a new session.
2009-11-08 14:36:12 +00:00
Dr. Stephen Henson
4398222457
Ooops, revert committed conflict.
2009-11-07 22:22:40 +00:00
Dr. Stephen Henson
71af26b57b
PR: 2089
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
DTLS Fragment size bug fix.
2009-11-02 13:38:22 +00:00
Dr. Stephen Henson
2008e714f3
Add missing functions to allow access to newer X509_STORE_CTX status
...
information. Add more informative message to verify callback to indicate
when CRL path validation is taking place.
2009-10-31 19:22:18 +00:00
Dr. Stephen Henson
245d2ee3d0
Add option to allow in-band CRL loading in verify utility. Add function
...
load_crls and tidy up load_certs. Remove useless purpose variable from
verify utility: now done with args_verify.
2009-10-31 13:33:57 +00:00
Dr. Stephen Henson
4b4ba6a887
Generate stateless session ID just after the ticket is received instead
...
of when a session is loaded. This will mean that applications that
just hold onto SSL_SESSION structures and never call d2i_SSL_SESSION()
will still work.
2009-10-30 14:06:03 +00:00
Dr. Stephen Henson
bb4060c5b5
Move CHANGES entry to 0.9.8l section
2009-10-30 13:29:30 +00:00
Dr. Stephen Henson
661dc1431f
Fix statless session resumption so it can coexist with SNI
2009-10-30 13:22:24 +00:00
Dr. Stephen Henson
213f08a65a
Don't attempt session resumption if no ticket is present and session
...
ID length is zero.
2009-10-28 19:52:18 +00:00
Dr. Stephen Henson
3e24d43931
oops!
2009-10-28 19:50:59 +00:00
Dr. Stephen Henson
b57329ba90
PR: 2085
...
Submitted by: Mike Frysinger <vapier@gentoo.org >
Approved by: steve@openssl.org
Change domd test to match 1.0.0+ version: check $MAKEDEPEND
ends in "gcc" to support cross compilers.
2009-10-28 19:48:09 +00:00
Dr. Stephen Henson
d4be92896c
Add -no_cache option to s_server
2009-10-28 17:49:30 +00:00
Dr. Stephen Henson
8844a69cd3
Don't replace whole AR line
2009-10-28 15:33:32 +00:00
Dr. Stephen Henson
970097ae2c
PR: 2081
...
Submitted by: Mike Frysinger <vapier@gentoo.org >
Approved by: steve@openssl.org
Respect AR and RANLIB environment variables if set.
2009-10-28 14:00:29 +00:00
Dr. Stephen Henson
dafd83334a
PR: 2080
...
Submitted by: Mike Frysinger <vapier@gentoo.org >
Approved by: steve@openssl.org
Respect MAKE environment variable if set.
2009-10-28 13:55:44 +00:00
Dr. Stephen Henson
d6245b8952
PR: 2078
...
Submitted by: Dale Anderson <dra@redevised.net >
Approved by: steve@openssl.org
Corrections to bn_internal documentation.
2009-10-28 13:52:07 +00:00
Dr. Stephen Henson
13d7524698
Clarification
2009-10-23 12:36:41 +00:00
Dr. Stephen Henson
dd57b657a8
Add an FAQ.
2009-10-23 12:22:54 +00:00
Dr. Stephen Henson
45cd59ac71
If not checking all certificates don't attempt to find a CRL
...
for the leaf certificate of a CRL path.
2009-10-23 12:06:35 +00:00
Dr. Stephen Henson
d11d977da4
Need to check <= 0 here.
2009-10-22 23:12:05 +00:00
Dr. Stephen Henson
4a1b71fb0c
PR: 2070
...
Submitted by: Alexander Nikitovskiy <Nikitovski@ya.ru >
Approved by: steve@openssl.org
Fix wrong cast.
2009-10-19 13:16:01 +00:00
Dr. Stephen Henson
19a9d0fcea
make update
2009-10-18 14:53:00 +00:00
Dr. Stephen Henson
6aa1770c6d
Use new X509_STORE_set_verify_cb function instead of old macro.
2009-10-18 14:40:33 +00:00
Dr. Stephen Henson
122276a7b4
take install prefix from the environment
2009-10-18 14:27:01 +00:00
Dr. Stephen Henson
1e6b8d39f1
Document more error codes.
2009-10-18 14:01:17 +00:00
Dr. Stephen Henson
e05d6c7d3c
Verification callback functions.
2009-10-18 13:26:08 +00:00
Dr. Stephen Henson
a5b37fca0a
Add "missing" function X509_STORE_set_verify_cb().
2009-10-18 13:24:16 +00:00
Dr. Stephen Henson
9074df8684
Clarification.
2009-10-17 23:08:32 +00:00
Dr. Stephen Henson
6c17629f91
Preliminary documentation for X509_VERIFY_PARAM.
2009-10-17 23:00:18 +00:00
Dr. Stephen Henson
db57663241
Add docs for X509_STORE_CTX_new() and related functions.
2009-10-17 18:05:53 +00:00
Dr. Stephen Henson
53246488bd
More X509 verification docs.
2009-10-17 17:07:17 +00:00
Dr. Stephen Henson
1f164f5ed9
Typo.
2009-10-17 17:06:19 +00:00
Dr. Stephen Henson
b8c182a499
Manual page for X509_verify_cert()
2009-10-17 12:46:52 +00:00
Dr. Stephen Henson
11c4c02ce3
PR: 2074
...
Submitted by: Bram Neijt <bneijt@gmail.com >
Approved by: steve@openssl.org
Typo: "contet".
2009-10-16 15:30:13 +00:00
Dr. Stephen Henson
c6bec6ef0d
PR: 2072
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Approved by: steve@openssl.org
Avoid potential doublefree and reuse of freed handshake_buffer.
2009-10-16 15:24:07 +00:00
Dr. Stephen Henson
7c3908dd19
PR: 2073
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Approved by: steve@openssl.org
Don't access freed SSL_CTX in SSL_free().
2009-10-16 13:41:39 +00:00
Dr. Stephen Henson
3477592385
Fixes to CROSS_COMPILE, don't override command line option from environment
2009-10-15 23:43:54 +00:00
Dr. Stephen Henson
be45636661
Fix for WIN32 and possibly other platforms which don't define in_port_t.
2009-10-15 18:49:30 +00:00
Dr. Stephen Henson
6fb3233778
Update ordinals.
2009-10-15 18:08:05 +00:00
Dr. Stephen Henson
636b6b450d
PR: 2069
...
Submitted by: Michael Tuexen <tuexen@fh-muenster.de >
Approved by: steve@openssl.org
IPv6 support for DTLS.
2009-10-15 17:41:31 +00:00
Dr. Stephen Henson
2c55c0d367
PR: 1847
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Approved by: steve@openssl.org
Integrated patches to CA.sh to bring it into line with CA.pl functionality.
2009-10-15 17:27:34 +00:00
Dr. Stephen Henson
0431941ec5
Revert extra changes from previous commit.
2009-10-15 17:17:45 +00:00
Dr. Stephen Henson
42733b3bea
PR: 2066
...
Submitted by: Guenter <lists@gknw.net >
Approved by: steve@openssl.org
Add -r option to dgst to produce format compatible with core utilities.
2009-10-15 17:13:54 +00:00
Dr. Stephen Henson
8aab301b66
Rename CROSS_COMPILE_PREFIX to CROSS_COMPILE
2009-10-15 13:05:04 +00:00
Dr. Stephen Henson
19a0192b42
Allow uname values to be overridden by the environment
2009-10-07 16:44:03 +00:00
Dr. Stephen Henson
f99f41cf5c
Allow cross compilation prefix to come from CROSS_COMPILE environment variable
2009-10-07 16:41:14 +00:00
Andy Polyakov
b34d449c42
Combat gcc 4.4.1 aliasing rules.
2009-10-06 07:17:57 +00:00
Dr. Stephen Henson
04f9095d9e
Fix unitialized warnings
2009-10-04 16:52:51 +00:00
Dr. Stephen Henson
0e039aa797
Fix warnings about ignoring fgets return value
2009-10-04 16:42:56 +00:00
Dr. Stephen Henson
c21869fb07
Prevent ignored return value warning
2009-10-04 14:04:27 +00:00
Dr. Stephen Henson
9a0c776c60
Prevent aliasing warning
2009-10-04 14:02:22 +00:00
Dr. Stephen Henson
77db140f94
Typo.
2009-10-02 18:20:22 +00:00
Dr. Stephen Henson
fecef70773
Yes it is a typo ;-)
2009-10-01 12:17:44 +00:00
Dr. Stephen Henson
b48315d9b6
PR: 2061
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct i2b_PVK_bio error handling in rsa.c, dsa.c
2009-10-01 00:25:24 +00:00
Dr. Stephen Henson
e8a682f223
PR: 2062
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct BN_rand error handling in bntest.c
2009-10-01 00:21:20 +00:00
Dr. Stephen Henson
98fbfff417
PR: 2059
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct EVP_SealInit error handling in pem_seal.c
2009-10-01 00:17:59 +00:00
Dr. Stephen Henson
78ca13a272
PR: 2056
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct BIO_wirte error handling in asn1_par.c
2009-10-01 00:11:04 +00:00
Dr. Stephen Henson
d4778ae47e
PR: 2055
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct BIO_ctrl error handling in s2_srvr.c
2009-10-01 00:06:14 +00:00
Dr. Stephen Henson
ff613640e2
PR: 2054
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct BIO_ctrl error handling
2009-10-01 00:02:52 +00:00
Dr. Stephen Henson
aec13c1a9f
PR: 2063
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct BIO_write error handling in ocsp_prn.c
2009-09-30 23:58:37 +00:00
Dr. Stephen Henson
64f0f80eb6
PR: 2057
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct BIO_write, BIO_printf, i2a_ASN1_INTEGER and i2a_ASN1_OBJECT
error handling in OCSP print routines.
2009-09-30 23:55:53 +00:00
Dr. Stephen Henson
d71061122c
PR: 2058
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct EVP_DigestVerifyFinal error handling.
2009-09-30 23:49:11 +00:00
Dr. Stephen Henson
fb552ac616
Change version from 0.9.9 to 1.0.0 in docs
2009-09-30 23:43:01 +00:00
Dr. Stephen Henson
18e503f30f
PR: 2064, 728
...
Submitted by: steve@openssl.org
Add support for custom headers in OCSP requests.
2009-09-30 21:40:55 +00:00
Dr. Stephen Henson
37fc562bd8
Free SSL_CTX after BIO
2009-09-30 21:36:17 +00:00
Dr. Stephen Henson
a0b3e0de6c
Fixup sureware ENGINE to handle new RAND_METHOD
2009-09-23 23:49:04 +00:00
Dr. Stephen Henson
b6dcdbfc94
Audit libcrypto for unchecked return values: fix all cases enountered
2009-09-23 23:43:49 +00:00
Dr. Stephen Henson
cd4f7cddc7
Add more return value checking attributes to evp.h and hmac.h
2009-09-23 23:40:13 +00:00
Dr. Stephen Henson
3db244261d
Add DEBUG_UNUSED to debug-steve* entries
2009-09-23 16:29:20 +00:00
Dr. Stephen Henson
acf20c7dbd
Add attribute to check if return value of certain functions is incorrectly
...
ignored.
2009-09-23 16:27:10 +00:00
Dr. Stephen Henson
7c75f462e8
PR: 2050
...
Submitted by: Michael Tuexen <tuexen@fh-muenster.de >
Approved by: steve@openssl.org
Fix handling of ENOTCONN and EMSGSIZE for dgram BIOs.
2009-09-22 11:34:45 +00:00
Dr. Stephen Henson
d636aa7109
PR: 2047
...
Submitted by: David Lee <live4thee@gmail.com >, steve@openssl.org
Approved by: steve@openssl.org
Fix for IPv6 handling in BIO_get_accept_socket().
2009-09-20 16:41:27 +00:00
Dr. Stephen Henson
1d42dbaf1e
Ooops, missing close quote
2009-09-20 12:46:55 +00:00
Dr. Stephen Henson
44c8b81eea
Don't use __try+__except unless on VC++
2009-09-20 12:39:32 +00:00
Dr. Stephen Henson
23129dec6f
add version info for VC-WIN64I too
2009-09-20 11:40:13 +00:00
Dr. Stephen Henson
0287ead9aa
PR: 2048
...
Submitted by: john blair <mailtome200420032002@yahoo.com >
Approved by: steve@openssl.org
Add version info in VC-WIN64A too.
2009-09-19 23:00:55 +00:00
Andy Polyakov
282feebab3
cmll-x86_64.pl: small buglet in CBC subroutine.
...
PR: 2035
2009-09-17 19:35:13 +00:00
Dr. Stephen Henson
e9f613acea
PR: 2039
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
DTLS listen bug fix,
2009-09-15 22:48:57 +00:00
Dr. Stephen Henson
a25f33d28a
Submitted by: Julia Lawall <julia@diku.dk>
...
The functions ENGINE_ctrl(), OPENSSL_isservice(), EVP_PKEY_sign(),
CMS_get1_RecipientRequest() and RAND_bytes() can return <=0 on error fix
so the return code is checked correctly.
2009-09-13 11:29:29 +00:00
Dr. Stephen Henson
94480b57db
PR: 2023
...
Submitted by: James Beckett <jmb.openssl@nospam.hackery.net >, steve
Approved by: steve@openssl.org
Fix documentation errors in d2i_X509 manual pages.
2009-09-12 23:34:41 +00:00
Dr. Stephen Henson
7689ed34d3
PR: 2025
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Approved by: steve@openssl.org
Constify SSL_CIPHER_description
2009-09-12 23:17:39 +00:00
Dr. Stephen Henson
33130b07ce
PR: 1411
...
Submitted by: steve@openssl.org
Allow use of trusted certificates in SSL_CTX_use_chain_file()
2009-09-12 23:09:45 +00:00
Dr. Stephen Henson
08882ac5be
PR: 2038
...
Submitted by: Artem Chuprina <ran@cryptocom.ru >
Approved by: steve@openssl.org
Avoid double call to BIO_free().
2009-09-11 11:02:52 +00:00
Dr. Stephen Henson
1fc3ac806d
PR: 2033
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
DTLS listen support.
2009-09-09 17:05:18 +00:00
Dr. Stephen Henson
0c28f277d1
Add new option --strict-warnings to Configure script. This is used to add
...
in devteam warnings into other configurations.
2009-09-09 16:31:32 +00:00
Dr. Stephen Henson
8c7168698e
Seed PRNG with DSA and ECDSA digests for additional protection against
...
possible PRNG state duplication.
2009-09-09 12:15:08 +00:00
Dr. Stephen Henson
b5ca7df5aa
PR: 2031
...
Submitted by: steve@openssl.org
Tolerate application/timestamp-response which some servers send out.
2009-09-07 17:57:18 +00:00
Dr. Stephen Henson
14b148d390
Typo presumably....
2009-09-06 17:56:30 +00:00
Dr. Stephen Henson
e0d4e97c1a
Make update, deleting bogus DTLS error code
2009-09-06 15:58:19 +00:00
Dr. Stephen Henson
f4274da164
PR: 1644
...
Submitted by: steve@openssl.org
Fix to make DHparams_dup() et al work in C++.
For 1.0 fix the final argument to ASN1_dup() so it is void *. Replace some
*_dup macros with functions.
2009-09-06 15:49:46 +00:00
Dr. Stephen Henson
07a9d1a2c2
PR: 2028
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Fix DTLS cookie management bugs.
2009-09-04 17:42:53 +00:00
Dr. Stephen Henson
88a3dd7896
Correction: salt is now default
2009-09-04 12:27:12 +00:00
Dr. Stephen Henson
4f59432c06
Oops, s can be NULL
2009-09-04 11:30:59 +00:00
Dr. Stephen Henson
2d1cbca960
PR: 2020
...
Submitted by: Keith Beckman <kbeckman@mcg.edu >, Tomas Mraz <tmraz@redhat.com >
Checked by: steve@openssl.org
Fix improperly capitalized references to WWW::Curl::Easy.
2009-09-02 15:57:24 +00:00
Dr. Stephen Henson
fc68056917
PR: 2029
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Checked by: steve@openssl.org
Fix so that the legacy digest EVP_dss1() still works.
2009-09-02 15:51:19 +00:00
Dr. Stephen Henson
17b5326ba9
PR: 2013
...
Submitted by: steve@openssl.org
Include a flag ASN1_STRING_FLAG_MSTRING when a multi string type is created.
This makes it possible to tell if the underlying type is UTCTime,
GeneralizedTime or Time when the structure is reused and X509_time_adj_ex()
can handle each case in an appropriate manner.
Add error checking to CRL generation in ca utility when nextUpdate is being
set.
2009-09-02 13:54:50 +00:00
Dr. Stephen Henson
3d9b105fe0
PR: 2009
...
Submitted by: "Alexei Khlebnikov" <alexei.khlebnikov@opera.com >
Approved by: steve@openssl.org
Avoid memory leak and fix error reporting in d2i_SSL_SESSION(). NB: although
the ticket mentions buffer overruns this isn't a security issue because
the SSL_SESSION structure is generated internally and it should never be
possible to supply its contents from an untrusted application (this would
among other things destroy session cache security).
2009-09-02 13:20:32 +00:00
Dr. Stephen Henson
70dc09ebe4
PR: 2022
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Fix DTLS record header length bug.
2009-09-02 12:53:52 +00:00
Dr. Stephen Henson
1771668096
Tidy up and fix verify callbacks to avoid structure dereference, use of
...
obsolete functions and enhance to handle new conditions such as policy printing.
2009-09-02 12:47:28 +00:00
Dr. Stephen Henson
38663fcc82
Missing break.
2009-08-31 22:19:26 +00:00
Dr. Stephen Henson
a6dab873d9
PR: 2005
...
Submitted by: steve@openssl.org
Some systems have broken IPv6 headers and/or implementations. If
OPENSSL_USE_IPV6 is set to 0 IPv6 is not used, if it is set to 1 it is used
and if undefined an attempt is made to detect at compile time by checking
if AF_INET6 is set and excluding known problem platforms.
2009-08-26 15:15:15 +00:00
Dr. Stephen Henson
480b9e5d29
PR: 2006
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Do not use multiple DTLS records for a single user message
2009-08-26 11:51:57 +00:00
Dr. Stephen Henson
19c5314f28
PR: 2015
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Define LIBDIR properly.
2009-08-26 11:42:11 +00:00
Andy Polyakov
c372482c1b
sha1-x86* assembler update: F_40_59 and Atom-specific optimizations.
2009-08-18 19:24:50 +00:00
Dr. Stephen Henson
ba4526e071
Stop unused variable warning on WIN32 et al.
2009-08-18 11:15:33 +00:00
Dr. Stephen Henson
98c08a6312
Use SHA1 and not deprecated MD5 in demos.
2009-08-15 11:01:09 +00:00
Dr. Stephen Henson
3ed3603b60
Update default dependency flags.
...
Make error name discrepancies a fatal error.
Fix error codes.
make update
2009-08-12 17:30:37 +00:00
Dr. Stephen Henson
f2589af1cf
Enable mdc2 support by default as the patent has now expired.
2009-08-12 16:46:26 +00:00
Dr. Stephen Henson
0e37c90925
Update README with bug report and contribution details.
2009-08-12 16:44:33 +00:00
Dr. Stephen Henson
b972fbaa8f
PR: 1997
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
DTLS timeout handling fix.
2009-08-12 13:19:54 +00:00
Dr. Stephen Henson
77c7f17a5e
Typo
2009-08-10 15:52:49 +00:00
Dr. Stephen Henson
b318cfb169
PR: 1999
...
Submitted by: "Bayram Kurumahmut" <kbayram@ubicom.com >
Approved by: steve@openssl.org
Don't use HAVE_FORK in apps/speed.c it can conflict with configured version.
2009-08-10 15:30:40 +00:00
Dr. Stephen Henson
e33d290159
PR: 2004
...
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr >
Approved by: steve@openssl.org
Handle fractional seconds properly in ASN1_GENERALIZEDTIME_print
2009-08-10 14:56:57 +00:00
Dr. Stephen Henson
6727565a84
PR: 2003
...
Make it possible to install OpenSSL in directories with name other
than "lib" for example "lib64". Based on patch from Jeremy Utley.
2009-08-10 14:48:40 +00:00
Dr. Stephen Henson
a0778bfae5
Add COMP error strings.
2009-08-09 14:58:37 +00:00
Dr. Stephen Henson
0f1d77a870
Fix error code.
2009-08-06 16:39:34 +00:00
Dr. Stephen Henson
d9d0f1b52c
Reject leading 0x80 in OID subidentifiers.
2009-08-06 16:32:54 +00:00
Dr. Stephen Henson
e075341d66
PR: 2002
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Obtained from: steve@openssl.org
Fix bug in libssl and krb5 linking in Makefile.org
2009-08-05 15:51:39 +00:00
Dr. Stephen Henson
bc32dbbea9
Oops!
2009-08-05 15:32:10 +00:00
Dr. Stephen Henson
f10f4447da
Update from 1.0.0-stable.
2009-08-05 15:29:58 +00:00
Dr. Stephen Henson
d76b8c89ec
PR: 2001
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Approved by: steve@openssl.org
Add patch: http://cvs.openssl.org/chngview?cn=14635 which never made it to
1.0.0, HEAD.
2009-08-05 14:55:20 +00:00
Dr. Stephen Henson
512d359e26
Update from 1.0.0-stable.
2009-07-27 21:22:02 +00:00
Dr. Stephen Henson
c869da8839
Update from 1.0.0-stable
2009-07-27 21:10:00 +00:00
Ben Laurie
d80866041e
Fix warnings.
2009-07-26 12:09:21 +00:00
Dr. Stephen Henson
75a86fa024
Update from 0.9.8-stable.
2009-07-24 13:48:07 +00:00
Dr. Stephen Henson
6b3bf0edf3
Remove MD2 test from WIN32 as we don't compile it in by default any more.
2009-07-24 13:43:59 +00:00
Dr. Stephen Henson
3ca16bfdd9
Fix typos.
2009-07-24 13:37:18 +00:00
Dr. Stephen Henson
59281ca03a
New debug targets from 1.0.0-stable
2009-07-24 13:31:12 +00:00
Dr. Stephen Henson
6aa220c935
PR: 1990
...
Update from 0.9.8-stable
2009-07-24 13:07:30 +00:00
Dr. Stephen Henson
3fa39ed723
Document removal of digest+signature algorithm link.
2009-07-24 13:01:40 +00:00
Dr. Stephen Henson
0f65d5eba5
PR: 1993
...
Fix from 0.9.8-stable.
2009-07-24 11:52:55 +00:00
Dr. Stephen Henson
1587761819
Fix from 0.9.8-stable
2009-07-24 11:34:59 +00:00
Dr. Stephen Henson
83019f7e12
Update from 0.9.8-stable.
2009-07-24 11:25:13 +00:00
Dr. Stephen Henson
bdfa4ff947
Update from 0.9.8-stable
2009-07-24 11:17:10 +00:00
Dr. Stephen Henson
8b69d9d2b5
Update from 0.9.8-stable
2009-07-24 11:11:30 +00:00
Dr. Stephen Henson
3c630352e2
Use correct extension and OSX detection.
2009-07-16 09:52:59 +00:00
Dr. Stephen Henson
4a620922e2
Updates from 1.0.0-stable
2009-07-15 18:00:04 +00:00
Dr. Stephen Henson
4b06d778ad
Update from 1.0.0-stable.
2009-07-15 11:33:24 +00:00
Dr. Stephen Henson
6bb7dc1e90
Updates from 1.0.0-stable
2009-07-15 11:02:24 +00:00
Dr. Stephen Henson
3f7c592082
Updates from 1.0.0-stable.
2009-07-14 15:30:05 +00:00
Dr. Stephen Henson
0e4bc56347
Document MD2 deprecation.
2009-07-13 11:58:05 +00:00
Dr. Stephen Henson
5c168710ac
Update from 1.0.0-stable.
2009-07-13 11:44:30 +00:00
Dr. Stephen Henson
6053ef80e5
Use new time routines to avoid possible overflow.
2009-07-13 11:40:14 +00:00
Dr. Stephen Henson
55a4a77a52
Update from 0.9.8-stable
2009-07-11 22:36:59 +00:00
Dr. Stephen Henson
1e8569398c
PR: 1624
...
Submitted by: "Simon L. Nielsen" <simon@FreeBSD.org >
Obtained from: steve@openssl.org
Correct FreeBSD check.
2009-07-11 22:28:45 +00:00
Dr. Stephen Henson
6e0c9e6008
Update from 1.0.0-stable.
2009-07-11 21:43:50 +00:00
Dr. Stephen Henson
c55d27ac33
Make update.
2009-07-08 09:19:53 +00:00
Dr. Stephen Henson
4e9de7aa3a
Delete MD2 from algorithm tables as in 0.9.8-stable. However since this is
...
a new branch we can also disable it by default.
2009-07-08 08:49:17 +00:00
Dr. Stephen Henson
fc007d021e
Fix warnings.
2009-07-04 12:04:06 +00:00
Dr. Stephen Henson
baacd8d4e5
PR: 1981
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
DTLS record header bugfix.
2009-07-04 11:38:40 +00:00
Dr. Stephen Henson
6c495bdb5d
Upadte from 1.0.0-stable
2009-07-01 15:47:04 +00:00
Dr. Stephen Henson
8b96875052
Update from 1.0.0-stable.
2009-07-01 15:43:04 +00:00
Dr. Stephen Henson
b53e076988
Update from 1.0.0-stable
2009-07-01 15:37:17 +00:00
Dr. Stephen Henson
0e698584a0
Update from 1.0.0-stable
2009-07-01 15:26:00 +00:00
Dr. Stephen Henson
15c7adb0c9
Update from 1.0.0-stable
2009-07-01 11:46:03 +00:00
Dr. Stephen Henson
9a6d8ee5b5
Update from 1.0.0-stable
2009-07-01 11:40:19 +00:00
Dr. Stephen Henson
9458530d45
Update from 1.0.0-stable
2009-07-01 11:29:25 +00:00
Dr. Stephen Henson
9de014a7f8
Update from 0.9.8-stable
2009-06-30 22:27:33 +00:00
Dr. Stephen Henson
4f761f5956
Typo.
2009-06-30 18:27:03 +00:00
Dr. Stephen Henson
db99779bee
Use common verify parameters instead of the small ad-hoc subset in
...
s_client, s_server.
2009-06-30 15:56:35 +00:00
Dr. Stephen Henson
e5b2b0f91f
Updates from 1.0.0-stable
2009-06-30 15:28:16 +00:00
Dr. Stephen Henson
ccf117510d
Update from 1.0.0-stable.
2009-06-30 11:58:10 +00:00
Dr. Stephen Henson
746570e575
Update from 1.0.0-stable.
2009-06-30 11:42:04 +00:00
Dr. Stephen Henson
508c535221
Update from 1.0.0-stable
2009-06-30 11:24:57 +00:00
Dr. Stephen Henson
9a5faeaa42
Allow setting of verify depth in verify parameters (as opposed to the depth
...
implemented using the verify callback).
2009-06-29 16:09:37 +00:00
Dr. Stephen Henson
d2f6d28298
Update from 0.9.8-stable.
2009-06-28 16:24:37 +00:00
Dr. Stephen Henson
a5f78bf3ba
Fix from 0.9.8-stable.
2009-06-26 23:14:39 +00:00
Dr. Stephen Henson
ce92bb54d1
Update from 0.9.8-stable.
2009-06-26 15:03:35 +00:00
Dr. Stephen Henson
f3be6c7b7d
Update from 1.0.0-stable.
2009-06-26 11:29:26 +00:00
Dr. Stephen Henson
4aa902ebaf
Stop warnings in gcc where "a" is const passed as a non-const argument.
2009-06-25 17:10:44 +00:00
Dr. Stephen Henson
e30dd20c0e
Update from 1.0.0-stable
2009-06-25 11:29:30 +00:00
Dr. Stephen Henson
2693812db2
Update FAQ with note about online docs.
2009-06-24 13:50:05 +00:00
Dr. Stephen Henson
f20339e6d7
Initialize outlen.
2009-06-24 13:29:29 +00:00
Dr. Stephen Henson
fd621f7dfd
Add beos as a supported DSO scheme.
2009-06-17 12:19:09 +00:00
Dr. Stephen Henson
c05353c50a
Rename asc2uni and uni2asc functions to avoid clashes.
2009-06-17 12:04:56 +00:00
Dr. Stephen Henson
73ea416070
Update from 1.0.0-stable.
2009-06-17 11:48:22 +00:00
Dr. Stephen Henson
4f33534c8a
PR: 1958
...
Submitted by: Sean Boudreau <seanb@qnx.com >
Approved by: steve@openssl.org
qnx6 support.
2009-06-17 11:37:44 +00:00
Dr. Stephen Henson
eddee61671
PR: 1956
...
Submitted by: Guenter <lists@gknw.net >
Approved by: steve@openssl.org
Netware doesn't have strings.h
2009-06-17 11:32:59 +00:00
Dr. Stephen Henson
d70323f1c5
Submitted by: Peter Gutmann <pgut001@cs.auckland.ac.nz>
...
Approved by: steve@openssl.org
Check return values for NULL in case of malloc failure.
2009-06-17 11:25:42 +00:00
Dr. Stephen Henson
716cddc03c
PR: 1946
...
Submitted by: Guenter <lists@gknw.net >
Approved by: steve@openssl.org
Netware header fix.
2009-06-16 16:54:44 +00:00
Dr. Stephen Henson
f0288f05b9
Submitted by: Artem Chuprina <ran@cryptocom.ru>
...
Reviewed by: steve@openssl.org
Various GOST ciphersuite and ENGINE fixes. Including...
Allow EVP_PKEY_set_derive_peerkey() in encryption operations.
New flag when certificate verify should be omitted in client key exchange.
2009-06-16 16:38:47 +00:00
Dr. Stephen Henson
31db43df08
Update from 0.9.8-stable.
2009-06-15 15:01:00 +00:00
Dr. Stephen Henson
512cab0128
Fix error codes.
2009-06-15 11:18:31 +00:00
Dr. Stephen Henson
779558b9e5
Update from 1.0.0-stable.
2009-06-15 10:27:22 +00:00
Dr. Stephen Henson
21b25ed4b8
PR: 1952
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve@openssl.org
ECDH negotiation bug.
2009-06-13 20:46:30 +00:00
Dr. Stephen Henson
58f41a926a
Updates from 1.0.0-stable
2009-06-05 14:59:26 +00:00
Dr. Stephen Henson
81d06ef2fd
Update from 1.0.0-stable.
2009-06-05 11:52:23 +00:00
Dr. Stephen Henson
225f303a9d
PR: 1946
...
Submitted by: Guenter <lists@gknw.net >
Reviewed by: steve@openssl.org
Get timeval definition on Netware.
2009-06-02 11:23:13 +00:00
Dr. Stephen Henson
ff6e530359
PR: 1938
...
Submitted by: Mark Phalan <Mark.Phalan@Sun.COM >
Reviewed by: steve@openssl.org
Patch to pem and hmac manual pages NAME sections.
2009-06-02 11:05:33 +00:00
Dr. Stephen Henson
0176842592
PR: 1945
...
Submitted by: Guenter <lists@gknw.net >
Approved by: steve@openssl.org
Netware compilation fix for nonexistent header.
2009-06-01 12:13:44 +00:00
Dr. Stephen Henson
d741ccadb5
Oops, update CHANGES entry.
2009-05-31 17:13:55 +00:00
Dr. Stephen Henson
6cf41fec72
Update from 1.0.0-stable.
2009-05-31 17:13:09 +00:00
Dr. Stephen Henson
8132d3ac40
Update from 1.0.0-stable.
2009-05-30 18:11:26 +00:00
Dr. Stephen Henson
43e12b6f1c
Add ignored FIPS options to evp.h change clashing flag value.
2009-05-29 18:57:31 +00:00
Dr. Stephen Henson
0b36857866
Update from 0.9.8-stable.
2009-05-29 14:02:57 +00:00
Dr. Stephen Henson
cc9001cb3f
Update from 1.0.0-stable
2009-05-28 21:41:47 +00:00
Dr. Stephen Henson
b1b9530165
Sync ordinals from 1.0.0-stable
2009-05-28 21:41:08 +00:00
Dr. Stephen Henson
caa97ef149
Update from 1.0.0-stable.
2009-05-28 18:11:29 +00:00
Dr. Stephen Henson
d0b72cf45b
Add CHANGES entries from 0.9.8-stable.
2009-05-18 17:37:33 +00:00
Dr. Stephen Henson
4243a7f796
Update from 1.0.0-stable.
2009-05-18 16:12:24 +00:00
Dr. Stephen Henson
046f210112
Update from 1.0.0-stable.
2009-05-17 16:04:58 +00:00
Dr. Stephen Henson
16cd15e688
Update from 1.0.0-stable.
2009-05-17 14:48:31 +00:00
Richard Levitte
98a711b479
Stupid typo
2009-05-17 07:22:11 +00:00
Dr. Stephen Henson
481547f0fe
Fix from 1.0.0-stable.
2009-05-16 16:23:14 +00:00
Dr. Stephen Henson
8d932f6fd7
Update from 1.0.0-stable
2009-05-16 16:18:19 +00:00
Dr. Stephen Henson
48fd490c6d
Update from 1.0.0-stable.
2009-05-16 11:16:43 +00:00
Dr. Stephen Henson
9289f21b7d
Update from 1.0.0 stable branch.
2009-05-16 11:15:42 +00:00
Dr. Stephen Henson
d3d4f9f5e9
PR: 1929
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
DTLS MTU bug.
2009-05-15 23:06:41 +00:00
Dr. Stephen Henson
eb38b26dbc
Update from 1.0.0-stable.
2009-05-15 22:58:40 +00:00
Dr. Stephen Henson
8bbe29f2ca
Update from 1.0.0-stable.
2009-05-15 22:50:33 +00:00
Richard Levitte
cc8cc9a3a1
Functional VMS changes submitted by sms@antinode.info (Steven M. Schweda).
...
Thank you\!
(note: not tested for now, a few nightly builds should give indications though)
2009-05-15 16:36:56 +00:00
Richard Levitte
af55c09d9f
Have mkdef.pl also handle VAX and Non-VAX differences for VMS
2009-05-15 16:01:39 +00:00
Richard Levitte
4531c1aa5e
Add a comment about libeay.num and ssleay.num
2009-05-15 16:00:04 +00:00
Andy Polyakov
761393bba7
x86[_64]cpuid.pl: further refine shared cache detection.
2009-05-14 18:17:26 +00:00
Dr. Stephen Henson
6f71e5ee6a
Update from stable branch.
2009-05-13 16:38:51 +00:00
Dr. Stephen Henson
715feb3104
Update from 1.0.0-stable.
2009-05-13 11:52:01 +00:00
Dr. Stephen Henson
83d8fa7dd1
Update from stable branch.
2009-05-13 11:32:46 +00:00
Andy Polyakov
586723138e
x86cpuid.pl: sync OPENSSL_ia32_cpuid with x86_64cpuid.pl.
2009-05-12 21:19:41 +00:00
Andy Polyakov
5cd91b5055
x86_64cpuid.pl: refine shared cache detection logic.
2009-05-12 21:01:13 +00:00
Andy Polyakov
6dd9066e0e
x86_64-xlate.pl: small commentary update.
2009-05-12 20:29:27 +00:00
Andy Polyakov
3dccfc1e68
e_padlock.c: fix typo (missing #endif) and switch to __builtin_alloca
...
(with introduction of 64-bit support alloca must be declared and there
is no standard way of doing that, switching to __bultin_alloca is
considered appropriate because code explicitly targets gcc anyway).
2009-05-12 20:19:09 +00:00
Richard Levitte
804ab1e0a4
Forgotten comma...
2009-05-12 05:03:42 +00:00
Dr. Stephen Henson
8002e3073b
Typo.
2009-05-07 16:40:52 +00:00
Dr. Stephen Henson
ac6f377754
Typo.
2009-05-06 16:57:19 +00:00
Dr. Stephen Henson
71b7858b1d
Update from 1.0.0-stable branch.
2009-05-06 16:55:55 +00:00
Richard Levitte
7da74281d2
Do not try to link the support file(s), as they aren't a complete
...
engine ;-)
2009-05-06 13:56:50 +00:00
Richard Levitte
e6b0c0007f
Make sure the padlock code compiles correctly even on hardware that
...
doesn't have padlocks.
2009-05-06 13:55:40 +00:00
Richard Levitte
eb2b33c2b9
Synchronise VMS with Unixly build.
2009-05-06 13:54:39 +00:00
Dr. Stephen Henson
eed15a831c
Fix from 1.0.0-stable.
2009-05-06 10:28:37 +00:00
Richard Levitte
5d6a017931
Move the time fetching code to its own static function, and thereby
...
make sure that BOTH instances of said code get the VMS modification.
2009-05-05 08:45:33 +00:00
Andy Polyakov
6022fe81a2
cryptlib.c: refine logic in OpenSSLDie (addenum to commit#18118).
2009-05-04 06:23:05 +00:00
Andy Polyakov
8b6fe84404
libeay.num: add ENGINE_load_aesni.
2009-05-03 14:23:16 +00:00
Andy Polyakov
3b58c74c98
Avoid double dialogs in OpenSSLDie on Windows.
2009-05-03 14:16:40 +00:00
Andy Polyakov
7752d34c61
Make it possible to compile CAPI engine under mingw64.
2009-05-03 13:54:01 +00:00
Andy Polyakov
01483c269e
Make CAPI engine UNICODE aware (it didn't work on Win64).
2009-05-03 13:52:01 +00:00
Andy Polyakov
03e13ca3f1
eng_aesni.c: win32 fix.
2009-05-03 13:48:54 +00:00
Andy Polyakov
065c5d6328
Engage cmll-x86_64.pl in Win64 build and make it compile correctly.
2009-05-02 21:18:52 +00:00
Andy Polyakov
f00fdcd14d
cryptlib.c: eliminate dependency on _strtoui64, older Windows CRT don't have it.
2009-05-02 12:51:37 +00:00
Andy Polyakov
194274cb68
ec_mult.c: fix C4334 win64 compiler warning.
2009-05-02 11:18:44 +00:00
Andy Polyakov
0fe4621e19
eng_aesni.c: fix assembler declarations.
2009-05-02 11:00:07 +00:00
Andy Polyakov
c5036d785a
aesni-x86_64.pl: resolve LNK1223 error.
2009-05-02 10:21:29 +00:00
Andy Polyakov
d608b4d662
AES-NI engine jumbo update.
2009-05-02 09:04:17 +00:00
Dr. Stephen Henson
b3f6fe919a
Updates from 1.0.0 stable branch.
2009-04-29 14:13:22 +00:00
Richard Levitte
d1417be75c
Make the NULL definition of OPENSSL_ia32cap_loc() compatible with the
...
declaration in crypto.h.
2009-04-29 13:40:28 +00:00
Dr. Stephen Henson
e7deff3cdf
Typo.
2009-04-28 22:36:33 +00:00
Dr. Stephen Henson
5f8f94a661
Update from 1.0.0-stable.
2009-04-28 22:10:54 +00:00
Richard Levitte
3c3f98dc93
Reimplement time check for VMS to mimic the way it's done on Windows.
...
Reason: gettimeofday() is deprecated.
2009-04-28 12:50:32 +00:00
Richard Levitte
f8a2233457
Stupid typo
2009-04-28 12:48:02 +00:00
Andy Polyakov
051742fb6c
v3_alt.c: otherName parsing fix.
...
Submitted by: Love Hörnquist Åstrand
2009-04-27 19:35:16 +00:00
Andy Polyakov
b066c3cd50
Update test/test_padlock script.
2009-04-27 19:04:23 +00:00
Andy Polyakov
eda2da3235
aesni-x86.pl: fix another typo and add test script.
2009-04-27 15:46:32 +00:00
Andy Polyakov
c0b03d44fb
aesni-x86.pl: fix typos.
2009-04-27 12:50:44 +00:00
Andy Polyakov
d64a7232d4
Intel AES-NI engine.
...
Submitted by: Huang Ying
2009-04-27 05:55:13 +00:00
Richard Levitte
876708c67d
Add padlock data
...
Redo the loop so it really compiles all objects for one engine, then
links the engine (until now, it still thought every file was an engine
of its own...).
2009-04-27 00:04:33 +00:00
Dr. Stephen Henson
d4f0339c66
Update from 1.0.0-stable.
2009-04-26 22:18:22 +00:00
Andy Polyakov
127186bf57
e_padlock: add support for x86_64 gcc.
2009-04-26 18:14:58 +00:00
Andy Polyakov
f06d0072fc
Minor shaX-s390x.pl update.
2009-04-26 18:11:25 +00:00
Andy Polyakov
f81e86d791
Improve readability of bio/b_sock.c
2009-04-26 18:06:14 +00:00
Andy Polyakov
2ff2710ccf
Engage nasm optimizations in Win64 build.
2009-04-26 18:05:19 +00:00
Andy Polyakov
ff65e94e04
Addenum to commit#18074: Expand OPENSSL_ia32cap to 64 bits.
2009-04-26 18:02:06 +00:00
Andy Polyakov
6c8b9259fc
AESNI perlasm update.
2009-04-26 17:58:58 +00:00
Andy Polyakov
75d448dde4
Handle push/pop %rbx in epi/prologue (this is Win64 SEH thing).
2009-04-26 17:58:01 +00:00
Andy Polyakov
e303f55fc7
Expand OPENSS_ia32cap to 64 bits.
2009-04-26 17:49:41 +00:00
Richard Levitte
d2617165ad
Add local symbol hacks for OpenVMS
2009-04-26 12:26:00 +00:00
Richard Levitte
7184ef1210
Cast to avoid signedness confusion
2009-04-26 12:16:08 +00:00
Richard Levitte
93caba129b
Include sys/time.h to declare gettimeofday().
2009-04-26 11:23:15 +00:00
Richard Levitte
6e177343f7
A DTLS1 symbol needs to be chopped off a bit.
2009-04-26 11:22:26 +00:00
Dr. Stephen Henson
ef236ec3b2
Merge from 1.0.0-stable branch.
2009-04-23 16:32:42 +00:00
Dr. Stephen Henson
8711efb498
Updates from 1.0.0-stable branch.
2009-04-20 11:33:12 +00:00
Dr. Stephen Henson
e5fa864f62
Updates from 1.0.0-stable.
2009-04-15 15:27:03 +00:00
Dr. Stephen Henson
22c98d4aad
Update from 1.0.0-stable
2009-04-08 16:16:35 +00:00
Dr. Stephen Henson
cc7399e79c
Changes from 1.0.0-stable.
2009-04-07 16:33:26 +00:00
Dr. Stephen Henson
14b3f1007e
Update from 0.9.8-stable.
2009-04-07 12:11:21 +00:00
Dr. Stephen Henson
645532b999
Update from 1.0.0-stable
2009-04-06 21:42:37 +00:00
Dr. Stephen Henson
220bd84911
Updates from 1.0.0-stable
2009-04-06 15:22:01 +00:00
Andy Polyakov
dec95a126a
Camellia update: make it respect NO_[INLINE_]ASM and typo in assembler.
2009-04-06 15:13:16 +00:00
Ben Laurie
a79b668b8f
Autogeneration seems to have changed slightly.
2009-04-05 10:21:05 +00:00
Dr. Stephen Henson
06ddf8eb08
Updates from 1.0.0-stable
2009-04-04 19:54:06 +00:00
Dr. Stephen Henson
71fca64d96
Update version info.
2009-04-03 11:47:05 +00:00
Dr. Stephen Henson
14023fe352
Merge from 1.0.0-stable branch.
2009-04-03 11:45:19 +00:00
Dr. Stephen Henson
b6b0b0d7a5
Update from 1.0.0-stable.
2009-04-01 14:59:49 +00:00
Dr. Stephen Henson
d6e460d44c
Update from 1.0.0-stable
2009-03-31 22:05:04 +00:00
Dr. Stephen Henson
0089a9dfa8
Fix from 1.0.0-stable
2009-03-31 21:58:01 +00:00
Dr. Stephen Henson
a5910673a6
Ooops reverse previous patch.
2009-03-31 21:39:37 +00:00
Dr. Stephen Henson
8e93eff8c6
Update from 0.9.8-stable
2009-03-31 21:36:30 +00:00