Matt Caswell
aae3233e1e
More tweaks for comments due indent issues
...
Conflicts:
ssl/ssl_ciph.c
ssl/ssl_locl.h
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:29:11 +00:00
Matt Caswell
04f7cbea11
Fix modes.h so that indent doesn't complain
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:29:06 +00:00
Matt Caswell
45bd3616bb
Backport hw_ibmca.c from master due to failed merge
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:29:00 +00:00
Matt Caswell
335d4d06a7
Tweaks for comments due to indent's inability to handle them
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:28:55 +00:00
Matt Caswell
f3b6ee30f4
Move more comments that confuse indent
...
Conflicts:
crypto/dsa/dsa.h
demos/engines/ibmca/hw_ibmca.c
ssl/ssl_locl.h
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:28:49 +00:00
Dr. Stephen Henson
a1b20ff654
Delete trailing whitespace from output.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:28:43 +00:00
Dr. Stephen Henson
628afe685e
Add -d debug option to save preprocessed files.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:28:38 +00:00
Dr. Stephen Henson
defc825e9e
Test option -nc
...
Add option -nc which sets COMMENTS=true but disables all indent comment
reformatting options.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:28:32 +00:00
Andy Polyakov
319d5c7a58
ec/ecp_nistz256.c: further harmonization with latest rules.
...
Conflicts:
crypto/ec/ecp_nistz256.c
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:28:26 +00:00
Matt Caswell
3807db9d91
Add ecp_nistz256.c to list of files skipped by openssl-format-source
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:28:20 +00:00
Matt Caswell
0f344da8f7
Manually reformat aes_x86core.c and add it to the list of files skipped by
...
openssl-format-source
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:28:14 +00:00
Andy Polyakov
23690f94d9
crypto/ofb128.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:28:08 +00:00
Andy Polyakov
9a11440ec0
modes/ctr128.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:28:03 +00:00
Andy Polyakov
ea09c04e7e
modes/cfb128.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:27:58 +00:00
Andy Polyakov
e1e7dc5085
ec/ecp_nistz256.c: harmonize with latest indent script.
...
Conflicts:
crypto/ec/ecp_nistz256.c
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:27:52 +00:00
Matt Caswell
cc4cd8213e
Fix indent comment corruption issue
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:27:47 +00:00
Matt Caswell
d18d367d90
Amend openssl-format-source so that it give more repeatable output
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:27:41 +00:00
Andy Polyakov
065e6718bb
bn/bn_const.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:27:35 +00:00
Andy Polyakov
3bca047362
bn/asm/x86_64-gcc.cL make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:27:29 +00:00
Andy Polyakov
78e74b59c1
bn/bn_asm.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:27:22 +00:00
Andy Polyakov
c0edd77487
bn/bn_exp.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:27:16 +00:00
Matt Caswell
e4e5457c29
Manually reformat aes_core.c
...
Add aes_core.c to the list of files not processed by openssl-format-source
Conflicts:
crypto/aes/aes_core.c
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:27:10 +00:00
Matt Caswell
9b214383c1
Add obj_dat.h to the list of files that will not be processed by
...
openssl-format-source
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:27:05 +00:00
Matt Caswell
cc6e2a5936
Fix strange formatting by indent
...
Conflicts:
crypto/hmac/hmac.h
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:26:58 +00:00
Andy Polyakov
85b120f361
modes/modes_lcl.h: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:26:52 +00:00
Matt Caswell
65a6a1ff45
indent has problems with comments that are on the right hand side of a line.
...
Sometimes it fails to format them very well, and sometimes it corrupts them!
This commit moves some particularly problematic ones.
Conflicts:
crypto/bn/bn.h
crypto/ec/ec_lcl.h
crypto/rsa/rsa.h
demos/engines/ibmca/hw_ibmca.c
ssl/ssl.h
ssl/ssl3.h
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:26:44 +00:00
Andy Polyakov
fbdbb28ac6
modes/gcm128.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:26:38 +00:00
Andy Polyakov
80e1750976
modes/cts128.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:26:32 +00:00
Andy Polyakov
11552ddc13
crypto/mem_dbg.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:26:26 +00:00
Matt Caswell
4ce632fb45
More indent fixes for STACK_OF
...
Conflicts:
ssl/s3_lib.c
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:26:15 +00:00
Matt Caswell
7b1ac23412
Fix indent issue with functions using STACK_OF
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:26:10 +00:00
Matt Caswell
bdc21a1571
Fix indent issue with engine.h
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:26:04 +00:00
Matt Caswell
39108d595e
Fix logic to check for indent.pro
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:25:58 +00:00
Andy Polyakov
d565023ae8
crypto/cryptlib.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:25:52 +00:00
Andy Polyakov
96a66a973b
bn/bntest.c: make it indent-friendly.
...
Conflicts:
crypto/bn/bntest.c
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:25:45 +00:00
Andy Polyakov
20c554ce8f
bn/bn_recp.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:25:39 +00:00
Andy Polyakov
d72781b4c9
engines/e_ubsec.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:25:33 +00:00
Andy Polyakov
ff397a8ff0
apps/speed.c: make it indent-friendly.
...
Conflicts:
apps/speed.c
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:25:25 +00:00
Andy Polyakov
abef2b4c53
bn/rsaz_exp.c: make it indent-friendly.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:25:19 +00:00
Matt Caswell
d2f8517ad0
Fix make errors
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:25:13 +00:00
Richard Levitte
27df27d4b9
Make the script a little more location agnostic
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:25:06 +00:00
Matt Caswell
4a81e0f0d6
Provide script for filtering data initialisers for structs/unions. indent just can't handle it.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:24:59 +00:00
Dr. Stephen Henson
24e6a032bf
Script fixes.
...
Don't use double newline for headers.
Don't interpret ASN1_PCTX as start of an ASN.1 module.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:24:44 +00:00
Richard Levitte
9d63b5e375
Run expand before perl, to make sure things are properly aligned
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:24:38 +00:00
Richard Levitte
a45030fc9b
Force the use of our indent profile
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:24:32 +00:00
Tim Hudson
45b575a031
Provide source reformating script. Requires GNU indent to be
...
available.
Script written by Tim Hudson, with amendments by Steve Henson, Rich Salz and
Matt Caswell
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-22 09:24:12 +00:00
Matt Caswell
bc2d623c0e
Fix source where indent will not be able to cope
...
Conflicts:
apps/ciphers.c
ssl/s3_pkt.c
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:24:04 +00:00
Matt Caswell
c695ebe2a0
Additional comment changes for reformat of 1.0.2
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:23:58 +00:00
Matt Caswell
e19d4a99b8
Further comment amendments to preserve formatting prior to source reformat
...
(cherry picked from commit 4a7fa26ffd65bf36beb8d1cb8f29fc0ae203f5c5)
Conflicts:
crypto/x509v3/pcy_tree.c
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:23:50 +00:00
Tim Hudson
6977c7e2ba
mark all block comments that need format preserving so that
...
indent will not alter them when reformatting comments
(cherry picked from commit 1d97c84351 )
Conflicts:
crypto/bn/bn_lcl.h
crypto/bn/bn_prime.c
crypto/engine/eng_all.c
crypto/rc4/rc4_utl.c
crypto/sha/sha.h
ssl/kssl.c
ssl/t1_lib.c
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-22 09:23:04 +00:00
Richard Levitte
43257b9f51
Define CFLAGS as cflags on VMS as well
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-14 00:14:20 +01:00
Andy Polyakov
10771e3421
Add Broadwell performance results.
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit b3d7294976 )
2015-01-13 21:42:13 +01:00
Matt Caswell
36f694e09a
Make output from openssl version -f consistent with previous versions
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit 2d2671790e )
2015-01-13 11:28:54 +00:00
Matt Caswell
635ca4446f
Fix warning where BIO_FLAGS_UPLINK was being redefined.
...
This warning breaks the build in 1.0.0 and 0.9.8
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit b1ffc6ca1c )
2015-01-13 11:24:52 +00:00
Matt Caswell
bd00b8dc65
Avoid deprecation problems in Visual Studio 13
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit 86d21d0b95 )
2015-01-13 09:47:09 +00:00
Rich Salz
2194b36979
Allow multiple IDN xn-- indicators
...
Update the X509v3 name parsing to allow multiple xn-- international
domain name indicators in a name. Previously, only allowed one at
the beginning of a name, which was wrong.
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
(cherry picked from commit 31d1d3741f )
2015-01-12 12:40:29 -05:00
Kurt Roeckx
e81a83657c
Make build reproducible
...
It contained a date on when it was build.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-01-10 16:31:27 +01:00
Matt Caswell
cbbb952f3a
Further windows specific .gitignore entries
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 41c9cfbc4e )
2015-01-09 23:40:41 +00:00
Matt Caswell
04f670cf3d
Update .gitignore with windows files to be excluded from git
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
Conflicts:
.gitignore
2015-01-09 11:30:07 +00:00
Matt Caswell
5cee72382c
Fix build failure on Windows due to undefined cflags identifier
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 5c5e7e1a7e )
2015-01-08 19:24:09 +00:00
Matt Caswell
7c6a3cf237
A memory leak can occur in dtls1_buffer_record if either of the calls to
...
ssl3_setup_buffers or pqueue_insert fail. The former will fail if there is a
malloc failure, whilst the latter will fail if attempting to add a duplicate
record to the queue. This should never happen because duplicate records should
be detected and dropped before any attempt to add them to the queue.
Unfortunately records that arrive that are for the next epoch are not being
recorded correctly, and therefore replays are not being detected.
Additionally, these "should not happen" failures that can occur in
dtls1_buffer_record are not being treated as fatal and therefore an attacker
could exploit this by sending repeated replay records for the next epoch,
eventually causing a DoS through memory exhaustion.
Thanks to Chris Mueller for reporting this issue and providing initial
analysis and a patch. Further analysis and the final patch was performed by
Matt Caswell from the OpenSSL development team.
CVE-2015-0206
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
(cherry picked from commit 652ff0f4796eecd8729b4690f2076d1c7ccb2862)
2015-01-08 15:46:42 +00:00
Dr. Stephen Henson
be3fb8d15d
Unauthenticated DH client certificate fix.
...
Fix to prevent use of DH client certificates without sending
certificate verify message.
If we've used a client certificate to generate the premaster secret
ssl3_get_client_key_exchange returns 2 and ssl3_get_cert_verify is
never called.
We can only skip the certificate verify message in
ssl3_get_cert_verify if the client didn't send a certificate.
Thanks to Karthikeyan Bhargavan for reporting this issue.
CVE-2015-0205
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-08 15:46:42 +00:00
Matt Caswell
fb73f12a9c
Follow on from CVE-2014-3571. This fixes the code that was the original source
...
of the crash due to p being NULL. Steve's fix prevents this situation from
occuring - however this is by no means obvious by looking at the code for
dtls1_get_record. This fix just makes things look a bit more sane.
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2015-01-08 15:46:19 +00:00
Dr. Stephen Henson
25d738c3a4
Fix crash in dtls1_get_record whilst in the listen state where you get two
...
separate reads performed - one for the header and one for the body of the
handshake record.
CVE-2014-3571
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-08 11:20:29 +00:00
Andy Polyakov
49446ea62f
Fix for CVE-2014-3570 (with minor bn_asm.c revamp).
...
Reviewed-by: Emilia Kasper <emilia@openssl.org >
(cherry picked from commit 56df92efb6893abe323307939425957ce878c8f0)
2015-01-08 11:20:29 +00:00
Dr. Stephen Henson
f33ab61b5f
fix error discrepancy
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 4a4d415857 )
2015-01-07 18:10:38 +00:00
Andy Polyakov
2d63d0c84a
Fix irix-cc build.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit e464403d0b )
2015-01-07 18:41:17 +01:00
Richard Levitte
cfb5d6c10a
VMS fixups for 1.0.2
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2015-01-07 02:15:35 +01:00
Dr. Stephen Henson
a936ba1148
use correct credit in CHANGES
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 4138e38825 )
2015-01-06 22:41:27 +00:00
Emilia Kasper
ed736ddd74
Only inherit the session ID context in SSL_set_SSL_CTX if the existing
...
context was also inherited (matches that of the existing SSL_CTX).
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit ac8e9cbe14 )
2015-01-06 23:10:03 +01:00
Dr. Stephen Henson
c7c2a56a1b
use correct function name
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit cb62ab4b17 )
2015-01-06 21:04:38 +00:00
Dr. Stephen Henson
129344a8fb
RT3662: Allow leading . in nameConstraints
...
Change by SteveH from original by John Denker (in the RT)
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 77ff1f3b8b )
2015-01-06 15:33:41 -05:00
Martin Brejcha
be6e766953
Fix memory leak.
...
Fix memory leak by freeing up saved_message.data if it is not NULL.
PR#3489
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 41cd41c441 )
2015-01-06 16:49:36 +00:00
Matt Caswell
8dc461eccf
Remove blank line from start of cflags character array in buildinf.h
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit b691154e18 )
2015-01-06 15:35:15 +00:00
Dr. Stephen Henson
4b4c1fcc88
Only allow ephemeral RSA keys in export ciphersuites.
...
OpenSSL clients would tolerate temporary RSA keys in non-export
ciphersuites. It also had an option SSL_OP_EPHEMERAL_RSA which
enabled this server side. Remove both options as they are a
protocol violation.
Thanks to Karthikeyan Bhargavan for reporting this issue.
(CVE-2015-0204)
Reviewed-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2015-01-06 12:45:10 +00:00
Andy Polyakov
1cfd7cf3cc
CHANGES: mention "universal" ARM support.
...
This is re-commit without unrelated modification.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 0548505f4c )
2015-01-06 12:15:40 +01:00
Andy Polyakov
2996157127
Revert "CHANGES: mention "universal" ARM support."
...
This reverts commit caeed719fe .
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-06 12:12:15 +01:00
Andy Polyakov
caeed719fe
CHANGES: mention "universal" ARM support.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 4fec915069 )
2015-01-06 11:21:12 +01:00
Andy Polyakov
f4868c9921
Remove inconsistency in ARM support.
...
This facilitates "universal" builds, ones that target multiple
architectures, e.g. ARMv5 through ARMv7. See commentary in
Configure for details.
Reviewed-by: Ard Biesheuvel <ard.biesheuvel@linaro.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit c1669e1c20 )
2015-01-06 11:14:23 +01:00
Dr. Stephen Henson
4aaf1e493c
ECDH downgrade bug fix.
...
Fix bug where an OpenSSL client would accept a handshake using an
ephemeral ECDH ciphersuites with the server key exchange message omitted.
Thanks to Karthikeyan Bhargavan for reporting this issue.
CVE-2014-3572
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit b15f876964 )
2015-01-05 23:34:57 +00:00
Dr. Stephen Henson
d96c24926d
update ordinals
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 31c65a7bc0 )
2015-01-05 16:51:41 +00:00
Adam Langley
d9b277e085
Ensure that the session ID context of an SSL* is updated
...
when its SSL_CTX is updated.
From BoringSSL commit
https://boringssl.googlesource.com/boringssl/+/a5dc545bbcffd9c24cebe65e9ab5ce72d4535e3a
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 61aa44ca99 )
2015-01-05 17:33:02 +01:00
Dr. Stephen Henson
aace6dbcb3
Constify ASN1_TYPE_cmp add X509_ALGOR_cmp.
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 4c52816d35 )
2015-01-05 14:54:38 +00:00
Dr. Stephen Henson
85cfc188c0
Fix various certificate fingerprint issues.
...
By using non-DER or invalid encodings outside the signed portion of a
certificate the fingerprint can be changed without breaking the signature.
Although no details of the signed portion of the certificate can be changed
this can cause problems with some applications: e.g. those using the
certificate fingerprint for blacklists.
1. Reject signatures with non zero unused bits.
If the BIT STRING containing the signature has non zero unused bits reject
the signature. All current signature algorithms require zero unused bits.
2. Check certificate algorithm consistency.
Check the AlgorithmIdentifier inside TBS matches the one in the
certificate signature. NB: this will result in signature failure
errors for some broken certificates.
3. Check DSA/ECDSA signatures use DER.
Reencode DSA/ECDSA signatures and compare with the original received
signature. Return an error if there is a mismatch.
This will reject various cases including garbage after signature
(thanks to Antti Karjalainen and Tuomo Untinen from the Codenomicon CROSS
program for discovering this case) and use of BER or invalid ASN.1 INTEGERs
(negative or with leading zeroes).
CVE-2014-8275
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 684400ce19 )
2015-01-05 14:36:06 +00:00
Matt Caswell
6ee7de1eb3
Additional fix required for no-srtp to work
...
RT3638
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2015-01-05 14:28:40 +00:00
Piotr Sikora
7b0194db42
Fix building with no-srtp
...
RT3638
Reviewed-by: Emilia Käsper <emilia@openssl.org >
Conflicts:
ssl/t1_lib.c
2015-01-05 14:28:40 +00:00
Emilia Kasper
bfaf796241
Add a clang build target for linux-x86_64
...
This change documents the world as-is, by turning all warnings on,
and then turning warnings that trigger off again.
Reviewed-by: Andy Polyakov <appro@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2015-01-05 14:10:33 +01:00
Andy Polyakov
c02e2d6a71
ecp_nistz256-x86_64.pl: fix occasional failures.
...
RT: 3607
Reviewed-by: Adam Langley <agl@google.com >
Reviewed-by: Emilia Kasper <emilia@openssl.org >
(cherry picked from commit 9e557ab262 )
2015-01-04 23:22:06 +01:00
Rich Salz
9f49067c9e
RT2914: NULL check missing in X509_name_canon
...
Check for NULL return from X509_NAME_ENTRY_new()
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 2c60925d1c )
2015-01-04 14:52:01 -05:00
Dr. Stephen Henson
5396c1190f
Update SGC flag comment.
...
Since SGC has been removed from OpenSSL 1.0.2 the
SSL3_FLAGS_SGC_RESTART_DONE is no longer used. However the #define is
retained for compatibility.
Reviewed-by: Matt Caswell <matt@openssl.org >
2015-01-02 23:12:37 +00:00
Dr. Stephen Henson
cf95b2d66a
Remove MS SGC
...
MS Server gated cryptography is obsolete and dates from the time of export
restrictions on strong encryption and is only used by ancient versions of
MSIE.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 63eab8a620 )
2015-01-02 23:01:38 +00:00
Dr. Stephen Henson
47606dda67
Clear existing extension state.
...
When parsing ClientHello clear any existing extension state from
SRP login and SRTP profile.
Thanks to Karthikeyan Bhargavan for reporting this issue.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 4f605ccb77 )
Conflicts:
ssl/t1_lib.c
2015-01-02 22:27:40 +00:00
Dominik Neubauer
c30c876176
typo in s_client
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
2014-12-31 11:19:03 +01:00
Kurt Roeckx
73bda31b4c
Make "run" volatile
...
RT#3629
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-30 16:54:56 +01:00
Thorsten Glaser
dc00fb9d51
Document openssl dgst -hmac option
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-30 16:53:48 +01:00
Kurt Roeckx
06c3e65deb
dlfcn: always define _GNU_SOURCE
...
We need this for the freebsd kernel with glibc as used in the Debian kfreebsd
ports. There shouldn't be a problem defining this on systems not using glibc.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-30 16:53:48 +01:00
Kurt Roeckx
5984c7e3d5
Fix memory leak in the apps
...
The BIO_free() allocated ex_data again that we already freed.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-30 16:53:48 +01:00
Alok Menghrajani
beef278bd7
Improves certificates HOWTO
...
* adds links to various related documents.
* fixes a few typos.
* rewords a few sentences.
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 67472bd82b )
2014-12-22 16:26:03 +01:00
Richard Levitte
58191465ef
Small typo
...
Reviewed-by: Stephen Henson <steve@openssl.org >
(cherry picked from commit 7cfab40f43 )
2014-12-22 15:36:42 +01:00
Michael Tuexen
5760c8b82f
Fix incorrect OPENSSL_assert() usage.
...
Return an error code for I/O errors instead of an assertion failure.
PR#3470
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 2521fcd852 )
2014-12-20 14:46:28 +00:00
Matt Caswell
b651407268
Fix a problem if CFLAGS is too long cversion.c fails to compile when config
...
is run with --strict-warnings.
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit 488f16e31b )
2014-12-19 14:05:25 +00:00
Kurt Roeckx
a760dde681
Return error when a bit string indicates an invalid amount of bits left
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-18 15:04:58 +01:00
Dr. Stephen Henson
f5e4b6b5b5
Reject invalid constructed encodings.
...
According to X6.90 null, object identifier, boolean, integer and enumerated
types can only have primitive encodings: return an error if any of
these are received with a constructed encoding.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-12-17 14:34:36 +00:00
Emilia Kasper
9ca2cc78a9
Add a comment noting the padding oracle.
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit 03af843039 )
2014-12-17 14:55:47 +01:00
Emilia Kasper
0cf552230e
Revert "RT3425: constant-time evp_enc"
...
Causes more problems than it fixes: even though error codes
are not part of the stable API, several users rely on the
specific error code, and the change breaks them. Conversely,
we don't have any concrete use-cases for constant-time behaviour here.
This reverts commit 738911cde6 .
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-12-17 14:55:39 +01:00
Emilia Kasper
0e1c318ece
Build fixes
...
Various build fixes, mostly uncovered by clang's unused-const-variable
and unused-function errors.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-12-17 14:27:49 +01:00
Richard Levitte
8bc8450a26
Clear warnings/errors within RL_DEBUG code sections (RL_DEBUG should be renamed)
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-12-17 14:17:54 +01:00
Richard Levitte
bf68456f53
Clear warnings/errors within TLS_DEBUG code sections
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-12-17 14:17:54 +01:00
Richard Levitte
53332a75d1
Clear warnings/errors within KSSL_DEBUG code sections
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-12-17 14:17:54 +01:00
Richard Levitte
cd387d21da
Clear warnings/errors within CIPHER_DEBUG code sections
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-12-17 14:17:54 +01:00
Richard Levitte
0c403e80a9
Clear warnings/errors within CIPHER_DEBUG code sections
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-12-17 14:17:54 +01:00
Richard Levitte
553affbef7
Clear warnings/errors within BN_CTX_DEBUG code sections
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-12-17 14:17:54 +01:00
Adam Langley
1ecfb67335
Premaster secret handling fixes
...
From BoringSSL
- Send an alert when the client key exchange isn't correctly formatted.
- Reject overly short RSA ciphertexts to avoid a (benign) out-of-bounds memory access.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
(cherry picked from commit 4aecfd4d9f )
2014-12-17 14:03:43 +01:00
Bodo Möller
bb565cd29e
Backport regression test
...
master branch has a specific regression test for a bug in x86_64-mont5 code,
see commit cdfe0fdde6 .
This code is now in 1.0.2/1.0.1, so also backport the test.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-17 12:00:17 +01:00
Emilia Kasper
a43bcd9e96
Check for invalid divisors in BN_div.
...
Invalid zero-padding in the divisor could cause a division by 0.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-17 10:00:17 +01:00
Dr. Stephen Henson
c8667a2e46
Check return value of ssl3_output_cert_chain
...
(cherry picked from commit 66f96fe2d5 )
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-16 15:01:29 +00:00
Matt Caswell
5ee441162e
The dtls1_output_cert_chain function no longer exists so remove it from
...
ssl_locl.h
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-16 15:01:11 +00:00
Adam Langley
63ef0db60f
Don't set client_version to the ServerHello version.
...
The client_version needs to be preserved for the RSA key exchange.
This change also means that renegotiation will, like TLS, repeat the old
client_version rather than advertise only the final version. (Either way,
version change on renego is not allowed.) This is necessary in TLS to work
around an SChannel bug, but it's not strictly necessary in DTLS.
(From BoringSSL)
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit ec1af3c419 )
2014-12-16 14:46:57 +00:00
Matt Caswell
f74f5c8586
Add more meaningful OPENSSL_NO_ECDH error message for suite b mode
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit db812f2d70 )
2014-12-16 14:17:32 +00:00
Matt Caswell
a38ae11c48
Add OPENSSL_NO_ECDH guards
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit af6e2d51bf )
2014-12-16 14:17:12 +00:00
Matt Caswell
4ca0e95b92
Remove extraneous white space, and add some braces
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 55e530265a )
2014-12-16 00:13:36 +00:00
Matt Caswell
f9398b92de
DTLS fixes for signed/unsigned issues
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 1904d21123 )
2014-12-16 00:13:36 +00:00
Emilia Kasper
6af16ec5ee
Fix unused variable warning
...
The temporary variable causes unused variable warnings in opt mode with clang,
because the subsequent assert is compiled out.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-12-15 13:15:30 +01:00
Matt Caswell
d04a1e0b5b
Fix memory leak in s2_srvr.c if BUF_MEM_grow fails
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-12-13 00:04:32 +00:00
Matt Caswell
bb1ddd3d9a
Fixed memory leak if BUF_MEM_grow fails
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-12-13 00:03:58 +00:00
Matt Caswell
6806b69084
Fixed memory leak in the event of a failure of BUF_MEM_grow
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit 41bf250130 )
2014-12-08 16:44:09 +00:00
Matt Caswell
9809ab965b
Fix memory leak in SSL_new if errors occur.
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit 76e6509085 )
2014-12-08 16:44:09 +00:00
Emilia Kasper
bd34823e55
Clarify the return values for SSL_get_shared_curve.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 376e2ca3e3 )
2014-12-05 18:31:57 +01:00
Emilia Kasper
533814c6b5
Add extra checks for odd-length EC curve lists.
...
Odd-length lists should be rejected everywhere upon parsing. Nevertheless,
be extra careful and add guards against off-by-one reads.
Also, drive-by replace inexplicable double-negation with an explicit comparison.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-05 18:24:54 +01:00
Emilia Kasper
b32474a40b
Make 'make update' succeed and run it
...
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2014-12-05 18:20:51 +01:00
Emilia Kasper
f6e725e868
Reject elliptic curve lists of odd lengths.
...
The Supported Elliptic Curves extension contains a vector of NamedCurves
of 2 bytes each, so the total length must be even. Accepting odd-length
lists was observed to lead to a non-exploitable one-byte out-of-bounds
read in the latest development branches (1.0.2 and master). Released
versions of OpenSSL are not affected.
Thanks to Felix Groebert of the Google Security Team for reporting this issue.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 33d5ba8629 )
2014-12-05 16:44:12 +01:00
Richard Levitte
7005eda3b6
s_client and s_server take -verify_{host,email,ip}, not -check*
...
RT3596
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-12-04 23:16:38 +01:00
Matt Caswell
9a6e994240
Remove incorrect code inadvertently introduced through commit 59669b6ab.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-12-04 14:18:45 +00:00
Matt Caswell
0b3c13092c
Remove "#if 0" code
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 4bb8eb9ce4 )
2014-12-03 09:31:39 +00:00
Matt Caswell
dfa2762bba
Only use the fallback mtu after 2 unsuccessful retransmissions if it is less
...
than the mtu we are already using
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 047f21593e )
2014-12-03 09:31:39 +00:00
Matt Caswell
c0b90b3237
Updates to s_client and s_server to remove the constant 28 (for IPv4 header
...
and UDP header) when setting an mtu. This constant is not always correct (e.g.
if using IPv6). Use the new DTLS_CTRL functions instead.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 464ce92026 )
2014-12-03 09:31:39 +00:00
Matt Caswell
788a5bad17
If we really get a situation where the underlying mtu is less than the minimum
...
we will support then dtls1_do_write can go into an infinite loop. This commit
fixes that.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit d3d9eef316 )
2014-12-03 09:31:39 +00:00
Matt Caswell
1872083ca1
Fix dtls_query_mtu so that it will always either complete with an mtu that is
...
at least the minimum or it will fail.
There were some instances in dtls1_query_mtu where the final mtu can end up
being less than the minimum, i.e. where the user has set an mtu manually. This
shouldn't be allowed. Also remove dtls1_guess_mtu that, despite having
logic for guessing an mtu, was actually only ever used to work out the minimum
mtu to use.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 1620a2e49c )
2014-12-03 09:31:39 +00:00
Matt Caswell
05e769f269
Remove instances in libssl of the constant 28 (for size of IPv4 header + UDP)
...
and instead use the value provided by the underlying BIO. Also provide some
new DTLS_CTRLs so that the library user can set the mtu without needing to
know this constant. These new DTLS_CTRLs provide the capability to set the
link level mtu to be used (i.e. including this IP/UDP overhead). The previous
DTLS_CTRLs required the library user to subtract this overhead first.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 59669b6abf )
Conflicts:
ssl/d1_both.c
2014-12-03 09:31:35 +00:00
Matt Caswell
ccecdb130c
There are a number of instances throughout the code where the constant 28 is
...
used with no explanation. Some of this was introduced as part of RT#1929. The
value 28 is the length of the IP header (20 bytes) plus the UDP header (8
bytes). However use of this constant is incorrect because there may be
instances where a different value is needed, e.g. an IPv4 header is 20 bytes
but an IPv6 header is 40. Similarly you may not be using UDP (e.g. SCTP).
This commit introduces a new BIO_CTRL that provides the value to be used for
this mtu "overhead". It will be used by subsequent commits.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 0d3ae34df5 )
2014-12-03 09:30:21 +00:00
Matt Caswell
80d09058af
The first call to query the mtu in dtls1_do_write correctly checks that the
...
mtu that we have received is not less than the minimum. If its less it uses the
minimum instead. The second call to query the mtu does not do that, but
instead uses whatever comes back. We have seen an instance in RT#3592 where we
have got an unreasonably small mtu come back. This commit makes both query
checks consistent.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 6abb0d1f8e )
2014-12-03 09:30:21 +00:00
Matt Caswell
3cc0c0d21c
The SSL_OP_NO_QUERY_MTU option is supposed to stop the mtu from being
...
automatically updated, and we should use the one provided instead.
Unfortunately there are a couple of locations where this is not respected.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 001235778a )
2014-12-03 09:30:21 +00:00
Matt Caswell
5e47008b61
Verify that we have a sensible message len and fail if not
...
RT#3592 provides an instance where the OPENSSL_assert that this commit
replaces can be hit. I was able to recreate this issue by forcing the
underlying BIO to misbehave and come back with very small mtu values. This
happens the second time around the while loop after we have detected that the
MTU has been exceeded following the call to dtls1_write_bytes.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit cf75017bfd )
2014-12-03 09:30:21 +00:00
Kurt Roeckx
e9f47de1f0
Use the SSLv23 method by default
...
If SSLv2 and SSLv3 are both disabled we still support SSL/TLS.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-12-02 11:28:42 +01:00
Richard Levitte
6a7a4a4e19
Check for FindNextFile when defining it rather than FindFirstFile
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-28 23:31:28 +01:00
Richard Levitte
67a0ea702b
[PR3597] Advance to the next state variant when reusing messages.
...
Previously, state variant was not advanced, which resulted in state
being stuck in the st1 variant (usually "_A").
This broke certificate callback retry logic when accepting connections
that were using SSLv2 ClientHello (hence reusing the message), because
their state never advanced to SSL3_ST_SR_CLNT_HELLO_C variant required
for the retry code path.
Reported by Yichun Zhang (agentzh).
Signed-off-by: Piotr Sikora <piotr@cloudflare.com >
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-28 23:31:28 +01:00
Richard Levitte
89e1e5c84d
Correct some layout issues, convert all remaining tabs to appropriate amounts of spaces.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 8123d158ab )
2014-11-28 17:04:15 +01:00
Alok Menghrajani
7cae6eeed0
Improves the proxy certificates howto doc.
...
The current documentation contains a bunch of spelling and grammar mistakes. I also
found it hard to understand some paragraphs, so here is my attempt to improve its
readability.
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 03b637a730 )
2014-11-28 17:04:15 +01:00
Matt Caswell
4b12a17fe3
Fix warning in ssl2_enc
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit f9ea4deba0 )
2014-11-27 21:46:04 +00:00
Matt Caswell
2e524475cd
Remove more references to dtls1_enc
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit eceef8fb86 )
2014-11-27 21:46:04 +00:00
Matt Caswell
ac3dc3ee87
Check EVP_Cipher return values for SSL2
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit 81ec01b217 )
2014-11-27 21:46:04 +00:00
Matt Caswell
63039a177a
Delete unused file
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit 4b87706d20 )
Conflicts:
ssl/d1_enc.c
2014-11-27 21:46:00 +00:00
Matt Caswell
ca88bd4112
Add checks to the return value of EVP_Cipher to prevent silent encryption failure.
...
PR#1767
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit fe78f08d15 )
2014-11-27 21:44:03 +00:00
Matt Caswell
1e7b4891cb
Remove redundant checks in ssl_cert_dup. This was causing spurious error messages when using GOST
...
PR#3613
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit fc3968a25c )
2014-11-27 20:51:59 +00:00
Matt Caswell
3623e24b45
Remove duplicated code
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-27 14:30:36 +00:00
Matt Caswell
e164582690
Tidy up ocsp help output
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 5e31a40f47 )
Conflicts:
apps/ocsp.c
2014-11-27 14:16:49 +00:00
André Guerreiro
4d3df37bc7
Add documentation on -timeout option in the ocsp utility
...
PR#3612
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit de87dd46c1 )
2014-11-27 14:14:52 +00:00
Guenter
261e64b85e
NetWare compilation fix.
...
Workaround for NetWare CodeWarrior compiler which doesn't properly lookup
includes when in same directory as the C file which includes it.
PR#3569
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit 333fad9f2d )
2014-11-27 14:03:57 +00:00
Matt Caswell
23cf88440c
Updates to X509_NAME_get_index_by_NID.pod submitted by user Bernardh via the wiki
...
Minor changes made by Matt Caswell
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 6484958645 )
2014-11-27 13:57:11 +00:00
Matt Caswell
bd8192604a
Updates to X509_NAME_add_entry_by_txt.pod submitted by user Bernardh via the wiki
...
Minor changes made by Matt Caswell.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit f281b8df70 )
2014-11-27 13:57:11 +00:00
Matt Caswell
8f8e7cec83
Updates to EVP_PKEY_encrypt.pod submitted by user Bernardh via the wiki
...
Minor changes made by Matt Caswell.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 34890ac18e )
2014-11-27 13:57:11 +00:00
Matt Caswell
14332e4331
Add include of ssl.h which is required by srtp.h
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit f67203836c )
2014-11-27 13:17:56 +00:00
Matt Caswell
60de554e4f
Fixed memory leak due to incorrect freeing of DTLS reassembly bit mask
...
PR#3608
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 8a35dbb6d8 )
2014-11-26 10:11:25 +00:00
Matt Caswell
c57400e86c
Corrected comments in ssl.h about SSLv23_method and friends
...
PR#3574
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 3a0765882c )
2014-11-25 22:24:34 +00:00
Dr. Stephen Henson
f90fd2b017
Print out Suite B status.
...
When using the -xcert option to test certificate validity print out
if we pass Suite B compliance. We print out "not tested" if we aren't
in Suite B mode.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 7d4cdededc )
2014-11-20 22:14:45 +00:00
Dr. Stephen Henson
8d325d1d36
Fix SuiteB chain checking logic.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 7255ca99df )
2014-11-20 22:14:29 +00:00
David Benjamin
03d14f5887
Do not resume a session if the negotiated protocol version does not match
...
the session's version (server).
See also BoringSSL's commit bdf5e72f50e25f0e45e825c156168766d8442dde.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 9e189b9dc1 )
2014-11-20 16:31:35 +01:00
Matt Caswell
6f71d7da64
When using EVP_PKEY_derive with a KDF set, a negative error from
...
ECDH_compute_key is silently ignored and the KDF is run on duff data
Thanks to github user tomykaira for the suggested fix.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 8d02bebddf )
2014-11-20 15:21:37 +00:00
Emilia Kasper
0b9e82763f
Clean up CHANGES
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 31832e8ff1 )
Conflicts:
CHANGES
2014-11-20 15:19:42 +01:00
Emilia Kasper
e5f261df73
Ensure SSL3_FLAGS_CCS_OK (or d1->change_cipher_spec_ok for DTLS) is reset
...
once the ChangeCipherSpec message is received. Previously, the server would
set the flag once at SSL3_ST_SR_CERT_VRFY and again at SSL3_ST_SR_FINISHED.
This would allow a second CCS to arrive and would corrupt the server state.
(Because the first CCS would latch the correct keys and subsequent CCS
messages would have to be encrypted, a MitM attacker cannot exploit this,
though.)
Thanks to Joeri de Ruiter for reporting this issue.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit e94a6c0ede )
2014-11-20 15:17:36 +01:00
Emilia Kasper
9baee0216f
Always require an advertised NewSessionTicket message.
...
The server must send a NewSessionTicket message if it advertised one
in the ServerHello, so make a missing ticket message an alert
in the client.
An equivalent change was independently made in BoringSSL, see commit
6444287806d801b9a45baf1f6f02a0e3a16e144c.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit de2c7504eb )
2014-11-20 15:17:36 +01:00
Emilia Kasper
5d23e1303c
Remove ssl3_check_finished.
...
The client sends a session ID with the session ticket, and uses
the returned ID to detect resumption, so we do not need to peek
at handshake messages: s->hit tells us explicitly if we're resuming.
An equivalent change was independently made in BoringSSL, see commit
407886f589cf2dbaed82db0a44173036c3bc3317.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 980bc1ec61 )
Conflicts:
ssl/s3_clnt.c
2014-11-20 15:17:30 +01:00
Emilia Kasper
f7c7aa69f7
Set s->hit when resuming from external pre-shared secret.
...
The same change was independently made in BoringSSL, see commit
9eaeef81fa2d4fd6246dc02b6203fa936a5eaf67
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 7b3ba508af )
2014-11-20 15:09:45 +01:00
Emilia Kasper
ce5f32cfa7
Reset s->tlsext_ticket_expected in ssl_scan_serverhello_tlsext.
...
This ensures that it's zeroed even if the SSL object is reused
(as in ssltest.c). It also ensures that it applies to DTLS, too.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit a06cd5d056 )
2014-11-20 15:09:45 +01:00
Matt Caswell
5891c226d8
Fix s_server -ssl2. Previously this reported "Error setting EC curve"
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 13d568661c )
2014-11-19 23:57:02 +00:00
Dr. Stephen Henson
017a15cbd2
New option no-ssl3-method which removes SSLv3_*method
...
When no-ssl3 is set only make SSLv3 disabled by default. Retain -ssl3
options for s_client/s_server/ssltest.
When no-ssl3-method is set SSLv3_*method() is removed and all -ssl3
options.
We should document this somewhere, e.g. wiki, FAQ or manual page.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 3881d8106d )
2014-11-19 22:54:30 +00:00
Dr. Stephen Henson
786370b1b0
Fix excert logic.
...
If no keyfile has been specified use the certificate file instead.
Fix typo: we need to check the chain is not NULL, not the chain file.
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-19 22:50:00 +00:00
Dr. Stephen Henson
56e8dc542b
Process signature algorithms before deciding on certificate.
...
The supported signature algorithms extension needs to be processed before
the certificate to use is decided and before a cipher is selected (as the
set of shared signature algorithms supported may impact the choice).
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-19 14:44:42 +00:00
Matt Caswell
9ef1d283fe
Added RFC 7027 references
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-18 13:10:41 +00:00
Matt Caswell
5a4a949904
Fixed cms-test.pl for no-ec2m
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-18 13:10:23 +00:00
Matt Caswell
ffa69c1ced
Added OPENSSL_NO_EC2M guards around the default EC curves
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-11-18 13:10:01 +00:00
Jan Hykel
305e2b4111
Don't use msg on error.
...
Don't attempt to access msg structure if recvmsg returns an error.
PR#3483
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 012aa9ec76 )
2014-11-17 12:41:47 +00:00
Dr. Stephen Henson
ba7aaa5622
Fix cross reference table generator.
...
If the hash or public key algorithm is "undef" the signature type
will receive special handling and shouldn't be included in the
cross reference table.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 55f7fb8848 )
2014-11-13 13:35:25 +00:00
Alok Menghrajani
2ad842b86a
Fixes a minor typo in the EVP docs.
...
Out is the buffer which needs to contain at least inl + cipher_block_size - 1 bytes. Outl
is just an int*.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 5211e094de )
2014-11-12 21:05:01 +00:00
Michal Bozon
297a8fd4ac
Correct timestamp output when clock_precision_digits > 0
...
PR#3535
Reviewed-by: Stephen Henson <steve@openssl.org >
2014-11-12 20:52:52 +00:00
Matt Caswell
5b3a5e3e90
Fix free of garbage pointer. PR#3595
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit e04d426bf9 )
2014-11-12 20:29:27 +00:00
Kurt Roeckx
40e214a23b
Fix warning about negative unsigned intergers
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-11-11 15:47:54 +01:00
Russell Coker
39679d858a
Fix datarace reported by valgrind/helgrind
...
This doesn't really fix the datarace but changes it so it can only happens
once. This isn't really a problem since we always just set it to the same
value. We now just stop writing it after the first time.
PR3584, https://bugs.debian.org/534534
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-11-10 18:35:50 +01:00
Daniel Kahn Gillmor
0ec6898c67
Allow ECDHE and DHE as forward-compatible aliases for EECDH and EDH
...
see RT #3203
Future versions of OpenSSL use the canonical terms "ECDHE" and "DHE"
as configuration strings and compilation constants. This patch
introduces aliases so that the stable 1.0.2 branch can be
forward-compatible with code and configuration scripts that use the
normalized terms, while avoiding changing any library output for
stable users.
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-11-10 10:58:49 +01:00
Andy Polyakov
1e10aee2a7
armv4cpuid.S: fix compilation error in pre-ARMv7 build.
...
PR: 3474
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
(cherry picked from commit 6696203963 )
2014-10-30 20:31:50 +01:00
Andy Polyakov
34a136d90f
md32_common.h: address compiler warning in HOST_c2l.
...
Reviewed-by: Stephen Henson <steve@openssl.org >
(cherry picked from commit d45282fc7c )
2014-10-29 10:55:15 +01:00
Samuel Neves
42af669ff2
Use only unsigned arithmetic in constant-time operations
...
Signed-off-by: Kurt Roeckx <kurt@roeckx.be >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-10-28 20:42:22 +01:00
Emilia Kasper
4c75f4e5ca
Tighten session ticket handling
...
Tighten client-side session ticket handling during renegotiation:
ensure that the client only accepts a session ticket if the server sends
the extension anew in the ServerHello. Previously, a TLS client would
reuse the old extension state and thus accept a session ticket if one was
announced in the initial ServerHello.
Reviewed-by: Bodo Moeller <bodo@openssl.org >
(cherry picked from commit d663df2399 )
2014-10-28 17:38:23 +01:00
Emilia Kasper
1380317483
Sync CHANGES
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-10-27 17:52:15 +01:00
Emilia Kasper
a35f7adf5c
Fix ssltest logic when some protocols are compiled out.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
(cherry picked from commit fd28a41ec8 )
Conflicts:
ssl/ssltest.c
2014-10-27 16:33:28 +01:00
Dr. Stephen Henson
1ce95f1960
Copy negotiated parameters in SSL_set_SSL_CTX.
...
SSL_set_SSL_CTX is used to change the SSL_CTX for SNI, keep the
supported signature algorithms and raw cipherlist.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 14e14bf696 )
2014-10-24 14:01:01 +01:00
Dr. Stephen Henson
51695b98f1
Process signature algorithms in ClientHello late.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit c800c27a8c )
Conflicts:
ssl/ssl.h
ssl/ssl_err.c
ssl/ssl_locl.h
2014-10-24 13:57:23 +01:00
Dr. Stephen Henson
82182413a4
Parse custom extensions after SNI.
...
Since SNI will typically switch the SSL_CTX structure to the one
corresponding to the appopriate server we need to parse custom
extensions using the switched SSL_CTX not the original one. This
is done by parsing custom extensions *after* SNI.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-10-23 14:45:30 +01:00
Andy Polyakov
0ce2dbfb5b
Add missing credit.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 9f4bd9d5f9 )
2014-10-22 09:38:40 +02:00
Bodo Moeller
981545e1e7
Fix and improve SSL_MODE_SEND_FALLBACK_SCSV documentation.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-10-21 22:39:26 +02:00
Bodo Moeller
d60de314f4
When processing ClientHello.cipher_suites, don't ignore cipher suites
...
listed after TLS_FALLBACK_SCSV.
RT: 3575
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2014-10-21 22:32:09 +02:00
Kurt Roeckx
b6ece4c1fc
Keep old method in case of an unsupported protocol
...
When we're configured with no-ssl3 and we receive an SSL v3 Client Hello, we set
the method to NULL. We didn't used to do that, and it breaks things. This is a
regression introduced in 62f45cc27d . Keep the old
method since the code is not able to deal with a NULL method at this time.
CVE-2014-3569, PR#3571
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 392fa7a952 )
2014-10-21 21:04:09 +02:00
Tim Hudson
bb086221dd
no-ssl2 with no-ssl3 does not mean drop the ssl lib
...
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
(cherry picked from commit c882abd522 )
2014-10-20 15:26:16 +10:00
Kurt Cancemi
b4b8969df8
RT3547: Add missing static qualifier
...
Reviewed-by: Ben Laurie <ben@openssl.org >
(cherry picked from commit 87d388c955 )
2014-10-17 11:48:32 +02:00
Matt Caswell
010d37621d
Updates to NEWS file
...
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2014-10-15 08:54:27 -04:00
Matt Caswell
84d4f99d31
Updates to CHANGES file
...
Reviewed-by: Bodo Möller <bodo@openssl.org >
2014-10-15 08:54:26 -04:00
Geoff Thorpe
82180dcc0a
Fix no-ssl3 configuration option
...
CVE-2014-3568
Reviewed-by: Emilia Kasper <emilia@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-10-15 08:54:26 -04:00
Dr. Stephen Henson
c2b90b398d
Fix for session tickets memory leak.
...
CVE-2014-3567
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 5dc6070a03779cd524f0e67f76c945cb0ac38320)
2014-10-15 08:54:26 -04:00
Matt Caswell
c2a2ff3f0a
Fix SRTP compile issues for windows
...
Related to CVE-2014-3513
This fix was developed by the OpenSSL Team
Reviewed-by: Tim Hudson <tjh@openssl.org >
Conflicts:
util/mkdef.pl
util/ssleay.num
Conflicts:
util/mkdef.pl
2014-10-15 08:54:26 -04:00
Matt Caswell
d64b6c980c
Fix for SRTP Memory Leak
...
CVE-2014-3513
This issue was reported to OpenSSL on 26th September 2014, based on an original
issue and patch developed by the LibreSSL project. Further analysis of the issue
was performed by the OpenSSL team.
The fix was developed by the OpenSSL team.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-10-15 08:54:26 -04:00
Bodo Moeller
05df9b9ae5
Fix SSL_R naming inconsistency.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-10-15 14:48:00 +02:00
Andy Polyakov
3e3cc471c2
aesni-x86_64.pl: make ECB subroutine Windows ABI compliant.
...
RT: 3553
Reviewed-by: Emilia Kasper <emilia@openssl.org >
(cherry picked from commit 69d5747f90 )
2014-10-15 11:12:24 +02:00
Bodo Moeller
80fb4820cb
Add TLS_FALLBACK_SCSV documentation, and move s_client -fallback_scsv
...
handling out of #ifndef OPENSSL_NO_DTLS1 section.
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-10-15 10:50:53 +02:00
Bodo Moeller
2229fe5b94
Oop: revert unintentional change committed along with
...
TLS_FALLBACK_SCSV support, restoring a reviewed state instead.
Reviewed-by: Stephen Henson (steve@openssl.org )
2014-10-15 04:50:13 +02:00
Bodo Moeller
a46c705214
Support TLS_FALLBACK_SCSV.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-10-15 04:04:55 +02:00
Matt Caswell
dc7bca8bcc
Removed duplicate definition of PKCS7_type_is_encrypted
...
Patch supplied by Matthieu Patou <mat@matws.net >, and modified to also
remove duplicate definition of PKCS7_type_is_digest.
PR#3551
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit e0fdea3e49 )
2014-10-06 23:43:49 +01:00
Ben Laurie
f58cfe0422
Fix single makefile.
...
Reviewed-by: Geoffrey Thorpe <geoff@geoffthorpe.net >
2014-10-06 18:06:18 +01:00
Rich Salz
20d1c8111f
RT3462: Document actions when data==NULL
...
If data is NULL, return the size needed to hold the
derived key. No other API to do this, so document
the behavior.
Reviewed-by: Richard Levitte <levitte@openssl.org >
(cherry picked from commit 5aed169305 )
2014-10-03 10:39:32 -04:00
Bodo Moeller
c578fe37d9
DTLS 1.2 support has been added to 1.0.2.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-10-02 17:58:10 +02:00
Rich Salz
a4ee5bbc77
RT2309: Fix podpage MMNNFFPPS->MNNFFPPS
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 9208640a36 )
2014-09-30 16:31:44 -04:00
Andy Polyakov
8ad9050318
e_os.h: refine inline override logic (to address warnings in debug build).
...
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
(cherry picked from commit 55c7a4cf11 )
2014-09-30 21:07:59 +02:00
Dr. Stephen Henson
5df07a7210
Add additional DigestInfo checks.
...
Reencode DigestInto in DER and check against the original: this
will reject any improperly encoded DigestInfo structures.
Note: this is a precautionary measure, there is no known attack
which can exploit this.
Thanks to Brian Smith for reporting this issue.
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-29 12:24:04 +01:00
Matt Caswell
0853b2c5e4
Prepare for 1.0.2-beta4-dev
...
Reviewed-by: Stephen Henson <steve@openssl.org >
2014-09-25 21:35:35 +01:00
Matt Caswell
2c5db8dac3
Prepare for 1.0.2-beta3 release
...
Reviewed-by: Stephen Henson <steve@openssl.org >
2014-09-25 21:31:40 +01:00
Matt Caswell
bffd5a7f35
make update
...
Reviewed-by: Stephen Henson <steve@openssl.org >
2014-09-25 21:31:40 +01:00
Matt Caswell
5e60396fe7
Added 1.0.1i CHANGES and NEWS updates
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-25 21:29:25 +01:00
Emilia Kasper
0d6a11a91f
Add missing tests
...
Accidentally omitted from commit 455b65dfab
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
(cherry picked from commit fdc35a9d3e )
2014-09-25 13:46:55 +02:00
Tim Hudson
f9fac6163e
Add constant_time_locl.h to HEADERS,
...
so the Win32 compile picks it up correctly.
Reviewed-by: Richard Levitte <levitte@openssl.org >
2014-09-25 08:08:51 +02:00
Richard Levitte
ef8055cbb7
Add the constant time test to the VMS build and tests
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-25 08:07:54 +02:00
Richard Levitte
3b7ab6f4b8
Include "constant_time_locl.h" rather than "../constant_time_locl.h".
...
The different -I compiler parameters will take care of the rest...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-25 08:06:47 +02:00
Dr. Stephen Henson
3b4a761853
Don't allow non-FIPS curves in FIPS mode.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-25 00:20:56 +01:00
Dr. Stephen Henson
255401756d
Use correct function name: CMS_add1_signer()
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 5886354dcc )
2014-09-25 00:06:46 +01:00
Andy Polyakov
ec65b83d65
crypto/bn/bn_nist.c: work around MSC ARM compiler bug.
...
RT: 3541
Reviewed-by: Emilia Kasper <emilia@openssl.org >
(cherry picked from commit 8b07c005fe )
2014-09-25 00:46:45 +02:00
Andy Polyakov
d169bf9cab
e_os.h: allow inline functions to be compiled by legacy compilers.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 40155f4089 )
2014-09-25 00:36:10 +02:00
Emilia Kasper
738911cde6
RT3425: constant-time evp_enc
...
Do the final padding check in EVP_DecryptFinal_ex in constant time to
avoid a timing leak from padding failure.
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 4aac102f75 )
Conflicts:
crypto/evp/evp_enc.c
2014-09-24 16:25:04 +02:00
Emilia Kasper
e1080ea3c7
RT3067: simplify patch
...
(Original commit adb46dbc6d )
Use the new constant-time methods consistently in s3_srvr.c
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
(cherry picked from commit 455b65dfab )
2014-09-24 15:54:51 +02:00
Adam Langley
941af48fec
This change alters the processing of invalid, RSA pre-master secrets so
...
that bad encryptions are treated like random session keys in constant
time.
(cherry picked from commit adb46dbc6d )
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-09-24 15:42:43 +02:00
Emilia Kasper
9bed73adaa
RT3066: rewrite RSA padding checks to be slightly more constant time.
...
Also tweak s3_cbc.c to use new constant-time methods.
Also fix memory leaks from internal errors in RSA_padding_check_PKCS1_OAEP_mgf1
This patch is based on the original RT submission by Adam Langley <agl@chromium.org >,
as well as code from BoringSSL and OpenSSL.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
Conflicts:
crypto/rsa/rsa_oaep.c
crypto/rsa/rsa_pk1.c
ssl/s3_cbc.c
2014-09-24 12:47:19 +02:00
Emilia Kasper
e9128d9401
Note i2d_re_X509_tbs and related changes in CHANGES
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-09-23 18:26:42 +02:00
Emilia Kasper
972868b23d
make update
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-09-23 18:20:26 +02:00
Emilia Kasper
e774a3055b
Add i2d_re_X509_tbs
...
i2d_re_X509_tbs re-encodes the TBS portion of the certificate.
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
(cherry picked from commit 95b1752cc7 )
2014-09-23 18:20:26 +02:00
Emilia Kasper
d9f99d4ef3
Revert "Add accessor for x509.cert_info."
...
This reverts commit 519ad9b384 .
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-09-23 18:20:26 +02:00
Emilia Kasper
6ce2a64191
Revert "Add more accessors."
...
This reverts commit cacdfcb247 .
Conflicts:
crypto/x509/x509.h
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-09-23 18:20:26 +02:00
Andy Polyakov
d2a1226b81
CHANGES: mention ECP_NISTZ256.
...
Reviewed-by: Bodo Moeller <bodo@openssl.org >
(cherry picked from commit 507efe7372 )
2014-09-23 14:56:46 +02:00
Andy Polyakov
9fa9370b6f
crypto/ecp_nistz256.c: harmonize error codes.
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit be07ae9b10 )
2014-09-22 00:11:04 +02:00
Dr. Stephen Henson
12f14b1d8f
Fix warning.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 16e5b45f72 )
2014-09-22 00:10:53 +02:00
Andy Polyakov
27918b7c25
crypto/ec: harmonize new code with FIPS module.
...
RT: 3149
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-22 00:07:44 +02:00
Andy Polyakov
2e31c47adb
Configure: engage ECP_NISTZ256.
...
RT: 3149
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 847147908b )
Resolved conflicts:
Configure
TABLE
2014-09-22 00:07:44 +02:00
Andy Polyakov
3842a64d36
Add ECP_NISTZ256 by Shay Gueron, Intel Corp.
...
RT: 3149
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 4d3fa06fce )
2014-09-22 00:07:44 +02:00
Andy Polyakov
8aed2a7548
Reserve option to use BN_mod_exp_mont_consttime in ECDSA.
...
Submitted by Shay Gueron, Intel Corp.
RT: 3149
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit f54be179aa )
2014-09-22 00:07:44 +02:00
Andy Polyakov
f7835e1c20
perlasm/x86_64-xlate.pl: handle inter-bank movd.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 902b30df19 )
2014-09-22 00:07:44 +02:00
Andy Polyakov
11d8abb331
Configure: add configuration for crypto/ec/asm extensions.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 6019cdd327 )
Resolved conflicts:
Configure
Makefile.org
TABLE
2014-09-22 00:07:44 +02:00
Tim Hudson
320d949781
Fixed error introduced in commit f2be92b94d
...
that fixed PR#3450 where an existing cast masked an issue when i was changed
from int to long in that commit
Picked up on z/linux (s390) where sizeof(int)!=sizeof(long)
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit b5ff559ff9 )
2014-09-22 06:35:57 +10:00
Andy Polyakov
dfb5de6fc0
Harmonize Tru64 and Linux make rules.
...
RT: 3333,3165
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit d475b2a3bf )
2014-09-20 10:22:13 +02:00
Jake Goulding
5015a93ded
RT2301: GetDIBits, not GetBitmapBits in rand_win
...
GetDIBits has been around since Windows2000 and
BitBitmapBits is an old Win16 compatibility function
that is much slower.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 99b00fd993 )
2014-09-18 16:42:07 -04:00
Rich Salz
478b3470ff
RT2772 update: c_rehash was broken
...
Move the readdir() lines out of the if statement, so
that flist is available globally.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 6f46c3c3b0 )
2014-09-11 13:09:56 -04:00
Rich Salz
3258429883
RT3271 update; extra; semi-colon; confuses; some;
...
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
(cherry picked from commit cb4bb56bae )
2014-09-10 15:09:53 -04:00
Rich Salz
a9d928a8b6
RT2560: missing NULL check in ocsp_req_find_signer
...
If we don't find a signer in the internal list, then fall
through and look at the internal list; don't just return NULL.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit b2aa38a980 )
2014-09-10 12:20:15 -04:00
Rich Salz
3aa2d2d08f
RT2196: Clear up some README wording
...
Say where to email bug reports.
Mention general RT tracker info in a separate paragraph.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 468ab1c20d )
2014-09-09 17:49:04 -04:00
Matt Caswell
f33ce36aff
RT3192: spurious error in DSA verify
...
This is funny; Ben commented in the source, Matt opend a ticket,
and Rich is doing the submit. Need more code-review? :)
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit eb63bce040 )
2014-09-09 17:10:57 -04:00
Rich Salz
e61c648fd6
RT3271: Don't use "if !" in shell lines
...
For portability don't use "if ! expr"
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit b999f66e34 )
2014-09-09 17:05:50 -04:00
Geoff Keating
8c0d19d857
RT1909: Omit version for v1 certificates
...
When calling X509_set_version to set v1 certificate, that
should mean that the version number field is omitted.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 1f18f50c4b )
2014-09-09 15:16:42 -04:00
Kurt Cancemi
283a8fd1aa
RT3506: typo's in ssltest
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 4eadd11cd9 )
2014-09-09 13:58:33 -04:00
Paul Suhler
b8d687bb56
RT2841: Extra return in check_issued
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 4cd1119df3 )
2014-09-08 18:50:40 -04:00
Kurt Roeckx
57c932dafd
RT2626: Change default_bits from 1K to 2K
...
This is a more comprehensive fix. It changes all
keygen apps to use 2K keys. It also changes the
default to use SHA256 not SHA1. This is from
Kurt's upstream Debian changes.
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
(cherry picked from commit 44e0c2bae4 )
2014-09-08 17:23:37 -04:00
Matthias Andree
ef720a67ab
RT2272: Add old-style hash to c_rehash
...
In addition to Matthias's change, I also added -n to
not remove links. And updated the manpage.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit a787c2590e )
2014-09-08 11:35:25 -04:00
Rich Salz
f28c48d07e
RT468: SSL_CTX_sess_set_cache_size wrong
...
The documentation is wrong about what happens when the
session cache fills up.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit e9edfc4196 )
2014-09-08 11:26:19 -04:00
Erik Auerswald
ff89be854e
RT3301: Discard too-long heartbeat requests
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit af4c6e348e )
2014-09-08 11:23:02 -04:00
Scott Schaefer
61a44b76a0
RT2518: fix pod2man errors
...
pod2man now complains when item tags are not sequential.
Also complains about missing =back and other tags.
Silence the warnings; most were already done.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit fe7573042f )
2014-09-08 11:18:58 -04:00
Rich Salz
45236ed6a4
RT3108: OPENSSL_NO_SOCK should imply OPENSSL_NO_DGRAM
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit be0bd11d69 )
2014-09-08 11:08:01 -04:00
Robin Lee
240635c0b2
RT3031: Need to #undef some names for win32
...
Copy the ifdef/undef stanza from x509.h to x509v3.h
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 83e4e03eeb )
2014-09-08 11:06:07 -04:00
Martin Olsson
610ac0525d
RT2843: Remove another spurious close-comment token
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 683cd7c948 )
2014-09-08 10:52:19 -04:00
Martin Olsson
9c096d0bbf
RT2842: Remove spurious close-comment marker.
...
Also, I (rsalz) changed "#ifdef undef" to "#if 0"
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 6b0dc6eff1 )
2014-09-08 10:50:33 -04:00
Rich Salz
1915744a64
Merge branch 'OpenSSL_1_0_2-stable' of git.openssl.org:openssl into OpenSSL_1_0_2-stable
...
another empty merge???
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-08 10:47:03 -04:00
Rich Salz
c387f7d0ea
Empty merge
...
Merge branch 'OpenSSL_1_0_2-stable' of git.openssl.org:openssl into OpenSSL_1_0_2-stable
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-08 10:45:53 -04:00
Rich Salz
eee95fc64f
Empty merge
...
Merge branch 'OpenSSL_1_0_2-stable' of git.openssl.org:openssl into OpenSSL_1_0_2-stable
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-09-08 10:45:31 -04:00
Rich Salz
dd3c21b2d2
RT1834: Fix PKCS7_verify return value
...
The function returns 0 or 1, only.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit b0e659cfac )
2014-09-08 10:43:32 -04:00
Rich Salz
dd13aadf9e
RT1832: Fix PKCS7_verify return value
...
The function returns 0 or 1, only.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit b0e659cfac )
2014-09-08 10:39:12 -04:00
Alon Bar-Lev
2a49fef28e
RT1771: Add string.h include.
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 8842987e5a )
2014-09-08 10:38:08 -04:00
Viktor Dkhovni
c56be26d9f
RT1325,2973: Add more extensions to c_rehash
...
Regexp was bracketed wrong.
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 5a8addc432 )
2014-09-07 18:25:59 -04:00
Dr. Stephen Henson
2102c53caa
Add CHANGES entry for SCT viewer code.
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit b2774f6e17 )
2014-09-05 13:45:45 +01:00
Adam Langley
e12e875759
psk_client_callback, 128-byte id bug.
...
Fix a bug in handling of 128 byte long PSK identity in
psk_client_callback.
OpenSSL supports PSK identities of up to (and including) 128 bytes in
length. PSK identity is obtained via the psk_client_callback,
implementors of which are expected to provide a NULL-terminated
identity. However, the callback is invoked with only 128 bytes of
storage thus making it impossible to return a 128 byte long identity and
the required additional NULL byte.
This CL fixes the issue by passing in a 129 byte long buffer into the
psk_client_callback. As a safety precaution, this CL also zeroes out the
buffer before passing it into the callback, uses strnlen for obtaining
the length of the identity returned by the callback, and aborts the
handshake if the identity (without the NULL terminator) is longer than
128 bytes.
(Original patch amended to achieve strnlen in a different way.)
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit be0d851732 )
2014-09-05 12:22:33 +02:00
Adam Langley
0600a5cd49
Ensure that x**0 mod 1 = 0.
...
(cherry picked from commit 2b0180c37f )
Reviewed-by: Ben Laurie <ben@openssl.org >
2014-09-04 16:05:57 +02:00
Richard Levitte
a91b73fd29
Followup on RT3334 fix: make sure that a directory that's the empty
...
string returns 0 with errno = ENOENT.
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit 360928b7d0 )
2014-09-03 22:23:34 +02:00
Phil Mesnier
02c38e37a6
RT3334: Fix crypto/LPdir_win.c
...
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit 6a14fe7576 )
2014-09-03 22:23:34 +02:00
Clang via Jeffrey Walton
fa2ae04c40
RT3140: Possibly-unit variable in pem_lib.c
...
Can't really happen, but the flow of control isn't obvious.
Add an initializer.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 0ff3687eab )
2014-09-02 23:38:15 -04:00
Emilia Kasper
27739e9265
Make the inline const-time functions static.
...
"inline" without static is not correct as the compiler may choose to ignore it
and will then either emit an external definition, or expect one.
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
(cherry picked from commit 86f50b36e6 )
2014-09-02 15:24:54 +02:00
Adam Williamson
157c345175
RT3511: doc fix; req default serial is random
...
RT842, closed back in 2004, changed the default serial number
to be a random number rather than zero. Finally time to update
the doc
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 3aba132d61 )
2014-08-31 23:41:51 -04:00
Richard Levitte
770b98d02e
Add t1_ext and ssl_utst to the VMS build as well.
...
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
2014-08-31 18:22:02 +02:00
TANABE Hiroyasu
8475416fe7
RT1325,2973: Add more extensions to c_rehash
...
Add .crt/.cer/.crl to the filenames parsed.
I also updated the podpage (since it didn't exist when
this ticket was first created, nor when it was re-created
seven years later).
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 80ec8d4e3e )
2014-08-31 00:37:54 -04:00
Andy Polyakov
30b7d5e1d8
md5-x86_64.pl: work around warning.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 4d86e8df6b )
2014-08-30 19:18:12 +02:00
Andy Polyakov
9dd6240201
x86[_64] assembly pack: add Silvermont performance data.
...
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit b59f92e75d )
2014-08-30 19:14:49 +02:00
Rich Salz
63eacabb61
RT2820: case-insensitive filenames on Darwin
...
Andy pointed out there is also darwin64, so tweak the pattern.
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit 457f7b14ec )
2014-08-30 10:20:28 -04:00
Rich Salz
0996ccc077
Add tags/TAGS
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 9d6253cfd3 )
2014-08-30 10:09:01 -04:00
Rich Salz
6aa9dbab0f
RT2119,3407: Updated to dgst.pod
...
Re-order algorithm list.
Be consistent in command synopsis.
Add content about signing.
Add EXAMPLE section
Add some missing options: -r, -fips-fingerprint -non-fips-allow
Various other fixes.
Reviewed-by: Andy Polyakov <appro@openssl.org >
2014-08-30 10:05:19 -04:00
James Westby
c1071ab4f1
RT1941: c_rehash.pod is missing
...
Add the file written by James Westby, graciously contributed
under the terms of the OpenSSL license.
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit cf2239b3b3 )
2014-08-30 09:51:36 -04:00
Rich Salz
5decce4db0
RT2379: Bug in BIO_set_accept_port.pod
...
The doc says that port can be "*" to mean any port.
That's wrong.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 07e3b31fae )
2014-08-29 16:46:16 -04:00
Jim Reid
12dabfc560
RT2880: HFS is case-insensitive filenames
...
Add Darwin to list of case-insensitive filenames when
installing manapges. When doing this, I noticed that
we weren't setting "filecase" for the HTML doc install.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 82d9185ae5 )
2014-08-29 16:39:38 -04:00
Dr. Stephen Henson
39d64e9351
update ordinals
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-28 18:24:14 +01:00
Dr. Stephen Henson
f9784baf0e
Fix comments, add new test.
...
Fix comments in ssltest.c: return value of 0 now means extension is
omitted and add_cb is not called for servers if the corresponding
extension is absent in ClientHello.
Test add_cb is not called if extension is not received.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit f47e203975 )
2014-08-28 18:10:21 +01:00
Dr. Stephen Henson
8fb57b29d6
Custom extension documentation.
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit f3f56c2a87 )
2014-08-28 18:10:21 +01:00
Dr. Stephen Henson
cf8d6c1000
Rename some callbacks, fix alignment.
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 0cfefe4b6d )
2014-08-28 18:10:21 +01:00
Dr. Stephen Henson
4164d631bb
Use consistent function naming.
...
Instead of SSL_CTX_set_custom_cli_ext and SSL_CTX_set_custom_srv_ext
use SSL_CTX_add_client_custom_ext and SSL_CTX_add_server_custom_ext.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 8cafe9e8bf )
2014-08-28 18:10:21 +01:00
Dr. Stephen Henson
46a1b9ef4f
New function SSL_extension_supported().
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit c846a5f567 )
2014-08-28 18:10:21 +01:00
Dr. Stephen Henson
6db2239c60
New extension callback features.
...
Support separate parse and add callback arguments.
Add new callback so an application can free extension data.
Change return value for send functions so < 0 is an error 0
omits extension and > 0 includes it. This is more consistent
with the behaviour of other functions in OpenSSL.
Modify parse_cb handling so <= 0 is an error.
Make SSL_CTX_set_custom_cli_ext and SSL_CTX_set_custom_cli_ext argument
order consistent.
NOTE: these changes WILL break existing code.
Remove (now inaccurate) in line documentation.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 33f653adf3 )
2014-08-28 18:10:21 +01:00
Dr. Stephen Henson
423ceb8319
Callback revision.
...
Use "parse" and "add" for function and callback names instead of
"first" and "second".
Change arguments to callback so the extension type is unsigned int
and the buffer length is size_t. Note: this *will* break existing code.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit de2a9e38f3 )
2014-08-28 18:10:21 +01:00
Dr. Stephen Henson
cd2e17020e
Remove serverinfo checks.
...
Since sanity checks are performed for all custom extensions the
serverinfo checks are no longer needed.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 707b026d78 )
Conflicts:
ssl/ssl3.h
ssl/t1_lib.c
2014-08-28 18:09:59 +01:00
Dr. Stephen Henson
9346c75cb8
Add custom extension sanity checks.
...
Reject attempts to use extensions handled internally.
Add flags to each extension structure to indicate if an extension
has been sent or received. Enforce RFC5246 compliance by rejecting
duplicate extensions and unsolicited extensions and only send a
server extension if we have sent the corresponding client extension.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 28ea0a0c6a )
2014-08-28 18:09:39 +01:00
Dr. Stephen Henson
0a4fe37fc6
Custom extension revision.
...
Use the same structure for client and server custom extensions.
Add utility functions in new file t1_ext.c.
Use new utility functions to handle custom server and client extensions
and remove a lot of code duplication.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit ecf4d66090 )
Conflicts:
ssl/ssl_lib.c
ssl/ssl_locl.h
ssl/t1_lib.c
2014-08-28 18:09:05 +01:00
Dr. Stephen Henson
da67a0ae34
Revision of custom extension code.
...
Move custom extension structures from SSL_CTX to CERT structure.
This change means the form can be revised in future without binary
compatibility issues. Also since CERT is part of SSL structures
so per-SSL custom extensions could be supported in future as well as
per SSL_CTX.
Reviewed-by: Rich Salz <rsalz@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit b83294fe30 )
Conflicts:
ssl/ssl.h
ssl/ssl_cert.c
ssl/ssl_locl.h
2014-08-28 17:06:50 +01:00
Emilia Kasper
9a9b0c0401
Constant-time utilities
...
Pull constant-time methods out to a separate header, add tests.
Reviewed-by: Bodo Moeller <bodo@openssl.org >
(cherry picked from commit 5a3d21c058 )
Conflicts:
ssl/s3_cbc.c
test/Makefile
2014-08-28 16:26:01 +02:00
Raphael Spreitzer
b85d461cdf
RT2400: ASN1_STRING_to_UTF8 missing initializer
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit f9fb43e176 )
2014-08-27 22:59:40 -04:00
Rich Salz
089f10e69e
RT2308: Add extern "C" { ... } wrapper
...
Add the wrapper to all public header files (Configure
generates one). Don't bother for those that are just
lists of #define's that do renaming.
Reviewed-by: Tim Hudson <tjh@openssl.org >
Cherry-pick of commit 17e80c6bd0
2014-08-27 21:45:09 -04:00
Emilia Kasper
7f7c05ca63
Explicitly check for empty ASN.1 strings in d2i_ECPrivateKey
...
The old code implicitly relies on the ASN.1 code returning a \0-prefixed buffer
when the buffer length is 0. Change this to verify explicitly that the ASN.1 string
has positive length.
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
(cherry picked from commit 82dc08de54ce443c2a9ac478faffe79e76157795)
2014-08-27 19:50:15 +02:00
Matt Caswell
2083f7c465
RT3065: automatically generate a missing EC public key
...
When d2i_ECPrivateKey reads a private key with a missing (optional) public key,
generate one automatically from the group and private key.
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
(cherry picked from commit ed383f847156940e93f256fed78599873a4a9b28)
2014-08-27 19:50:15 +02:00
Adam Langley
1f2b943254
RT3065: ec_private_key_dont_crash
...
This change saves several EC routines from crashing when an EC_KEY is
missing a public key. The public key is optional in the EC private key
format and, without this patch, running the following through `openssl
ec` causes a crash:
-----BEGIN EC PRIVATE KEY-----
MBkCAQEECAECAwQFBgcIoAoGCCqGSM49AwEH
-----END EC PRIVATE KEY-----
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
(cherry picked from commit b391570bdeb386d4fd325917c248d593d3c43930)
2014-08-27 19:50:15 +02:00
Mihai Militaru
dc5c3d7370
RT2210: Add missing EVP_cleanup to example
...
I also removed some trailing whitespace and cleaned
up the "see also" list.
Reviewed-by: Emilia Kasper <emilia@openssl.org >
(cherry picked from commit 7b3e11c544 )
2014-08-27 13:25:36 -04:00
John Fitzgibbon
383f0e349f
RT2724: Remove extra declaration
...
Extra SSL_get_selected_srtp_profile() declaration in ssl/srtp.h
causes -Werror builds to fail.
Cherry-picked from 3609b02305
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-26 16:55:54 -04:00
David Gatwood
0a64a864b4
RT1744: SSL_CTX_set_dump_dh() doc feedback
...
The description of when the server creates a DH key is
confusing. This cleans it up.
(rsalz: also removed trailing whitespace.)
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
2014-08-26 13:38:27 -04:00
Jan Schaumann
dec128313b
RT1804: fix EXAMPLE in EVP_EncryptInit.pod
...
The EXAMPLE that used FILE and RC2 doesn't compile due to a
few minor errors. Tweak to use IDEA and AES-128. Remove
examples about RC2 and RC5.
Reviewed-by: Emilia Kasper <emilia@openssl.org >
2014-08-25 10:26:17 -04:00
Matt Caswell
1d4f214eaf
Typo fixes to evp documentation.
...
This patch was submitted by user "Kox" via the wiki
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 2dd8cb3b95 )
2014-08-24 21:26:02 +01:00
Adam Langley
3aac17a82f
RT3060: Limit the number of empty records.
...
Limit the number of empty records that will be processed consecutively
in order to prevent ssl3_get_record from never returning.
Reported by "oftc_must_be_destroyed" and George Kadianakis.
Reviewed-by: Bodo Moeller <bodo@openssl.org >
2014-08-22 15:36:06 +02:00
Adam Langley
e19c93811f
RT3061: Don't SEGFAULT when trying to export a public DSA key as a private key.
...
Reviewed-by: Viktor Dukhovni <viktor@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-08-22 15:21:12 +02:00
Emilia Kasper
108e907645
Improve EVP_PKEY_sign documentation
...
Clarify the intended use of EVP_PKEY_sign. Make the code example compile.
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
(cherry picked from commit d64c533a20 )
2014-08-22 15:05:55 +02:00
Emilia Kasper
8958be3946
define inline for Visual Studio
...
In Visual Studio, inline is available in C++ only, however __inline is available for C, see
http://msdn.microsoft.com/en-us/library/z8y1yy88.aspx
Reviewed-by: Richard Levitte <levitte@openssl.org >
Reviewed-by: Dr Stephen Henson <steve@openssl.org >
(cherry picked from commit f511b25a73 )
2014-08-21 16:07:44 +02:00
Emilia Kasper
ebf221ee25
Fix build when BSAES_ASM is defined but VPAES_ASM is not
...
Reviewed-by: Andy Polyakov <appro@openssl.org >
(cherry picked from commit da92be4d68 )
2014-08-21 15:48:10 +02:00
Andy Polyakov
ef90877721
bn/asm/rsaz-*.pl: allow spaces in Perl path name.
...
RT: 2835
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 15735e4f0e )
2014-08-21 00:19:24 +02:00
Andy Polyakov
a89adc148e
sha1-mb-x86_64.pl: add commentary.
...
Reviewed-by: Emilia Kasper <emilia@openssl.org >
(cherry picked from commit e608273a80 )
2014-08-21 00:16:32 +02:00
Andy Polyakov
b698c427de
crypto/evp/e_aes_cbc_hmac_sha[1|256].c: fix compiler warnings.
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 2893a302a9 )
2014-08-20 22:20:21 +02:00
Andy Polyakov
e99ac8b868
sha1-mb-x86_64.pl: fix typo.
...
Reviewed-by: Emilia Kasper <emilia@openssl.org >
(cherry picked from commit 55eb14da20 )
2014-08-20 22:12:50 +02:00
Matt Caswell
43312c624d
Fixed out-of-bounds read errors in ssl3_get_key_exchange.
...
PR#3450
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-15 23:28:52 +01:00
Istvan Noszticzius
beeb0fa7be
Fix use after free bug.
...
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
(cherry picked from commit 5afa57fb7b17aa51cfba1ffa94e900fc7a5f0e04)
2014-08-15 16:46:14 +01:00
Bodo Moeller
267e6f3cc0
Further improve/fix ec_GFp_simple_points_make_affine (ecp_smpl.c) and
...
group_order_tests (ectest.c). Also fix the EC_POINTs_mul documentation (ec.h).
Reviewed-by: emilia@openssl.org
2014-08-13 17:40:33 +02:00
Dr. Stephen Henson
5ed0b6ac0c
Fix SRP authentication ciphersuites.
...
The addition of SRP authentication needs to be checked in various places
to work properly. Specifically:
A certificate is not sent.
A certificate request must not be sent.
Server key exchange message must not contain a signature.
If appropriate SRP authentication ciphersuites should be chosen.
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 8f5a8805b82d1ae81168b11b7f1506db9e047dec)
2014-08-09 00:09:14 +01:00
Dr. Stephen Henson
90a549ddfb
Test SRP authentication ciphersuites.
...
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 193c1c07165b0042abd217274a084b49459d4443)
2014-08-09 00:09:01 +01:00
Dr. Stephen Henson
bc792813f0
Only use FIPS EC methods in FIPS mode.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 1433cac53c )
2014-08-07 02:11:53 +01:00
Dr. Stephen Henson
bb4c9ffd02
Check SRP parameters early.
...
Check SRP parameters when they are received so we can send back an
appropriate alert.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-08-06 20:41:53 +01:00
Dr. Stephen Henson
53348780e9
Fix SRP buffer overrun vulnerability.
...
Invalid parameters passed to the SRP code can be overrun an internal
buffer. Add sanity check that g, A, B < N to SRP code.
Thanks to Sean Devlin and Watson Ladd of Cryptography Services, NCC
Group for reporting this issue.
2014-08-06 20:41:24 +01:00
Dr. Stephen Henson
f338c2e0c2
Fix SRP ciphersuite DoS vulnerability.
...
If a client attempted to use an SRP ciphersuite and it had not been
set up correctly it would crash with a null pointer read. A malicious
server could exploit this in a DoS attack.
Thanks to Joonas Kuorilehto and Riku Hietamäki from Codenomicon
for reporting this issue.
CVE-2014-2970
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-06 20:41:24 +01:00
Gabor Tyukasz
92aa73bcbf
Fix race condition in ssl_parse_serverhello_tlsext
...
CVE-2014-3509
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-06 20:41:24 +01:00
Emilia Kasper
c01618dd82
Fix OID handling:
...
- Upon parsing, reject OIDs with invalid base-128 encoding.
- Always NUL-terminate the destination buffer in OBJ_obj2txt printing function.
CVE-2014-3508
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-06 20:41:24 +01:00
Emilia Käsper
1d7d0ed9c2
Fix DTLS anonymous EC(DH) denial of service
...
CVE-2014-3510
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-08-06 20:41:24 +01:00
David Benjamin
40a2200d89
Fix protocol downgrade bug in case of fragmented packets
...
CVE-2014-3511
Reviewed-by: Emilia Käsper <emilia@openssl.org >
Reviewed-by: Bodo Möller <bodo@openssl.org >
2014-08-06 20:41:24 +01:00
Adam Langley
d345a24569
Remove some duplicate DTLS code.
...
In a couple of functions, a sequence number would be calculated twice.
Additionally, in |dtls1_process_out_of_seq_message|, we know that
|frag_len| <= |msg_hdr->msg_len| so the later tests for |frag_len <
msg_hdr->msg_len| can be more clearly written as |frag_len !=
msg_hdr->msg_len|, since that's the only remaining case.
Reviewed-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-06 20:41:24 +01:00
Matt Caswell
3d5dceac43
Applying same fix as in dtls1_process_out_of_seq_message. A truncated DTLS fragment would cause *ok to be clear, but the return value would still be the number of bytes read.
...
Problem identified by Emilia Käsper, based on previous issue/patch by Adam
Langley.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-06 20:41:23 +01:00
Adam Langley
aad61c0a57
Fix return code for truncated DTLS fragment.
...
Previously, a truncated DTLS fragment in
|dtls1_process_out_of_seq_message| would cause *ok to be cleared, but
the return value would still be the number of bytes read. This would
cause |dtls1_get_message| not to consider it an error and it would
continue processing as normal until the calling function noticed that
*ok was zero.
I can't see an exploit here because |dtls1_get_message| uses
|s->init_num| as the length, which will always be zero from what I can
see.
Reviewed-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-06 20:41:23 +01:00
Adam Langley
8ca4c4b25e
Fix memory leak from zero-length DTLS fragments.
...
The |pqueue_insert| function can fail if one attempts to insert a
duplicate sequence number. When handling a fragment of an out of
sequence message, |dtls1_process_out_of_seq_message| would not call
|dtls1_reassemble_fragment| if the fragment's length was zero. It would
then allocate a fresh fragment and attempt to insert it, but ignore the
return value, leaking the fragment.
This allows an attacker to exhaust the memory of a DTLS peer.
Fixes CVE-2014-3507
Reviewed-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-06 20:41:23 +01:00
Matt Caswell
0598468fc0
Fix DTLS handshake message size checks.
...
In |dtls1_reassemble_fragment|, the value of
|msg_hdr->frag_off+frag_len| was being checked against the maximum
handshake message size, but then |msg_len| bytes were allocated for the
fragment buffer. This means that so long as the fragment was within the
allowed size, the pending handshake message could consume 16MB + 2MB
(for the reassembly bitmap). Approx 10 outstanding handshake messages
are allowed, meaning that an attacker could consume ~180MB per DTLS
connection.
In the non-fragmented path (in |dtls1_process_out_of_seq_message|), no
check was applied.
Fixes CVE-2014-3506
Wholly based on patch by Adam Langley with one minor amendment.
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-06 20:41:23 +01:00
Matt Caswell
ea7cb53974
Added comment for the frag->reassembly == NULL case as per feedback from Emilia
...
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-06 20:41:23 +01:00
Adam Langley
4985007555
Avoid double free when processing DTLS packets.
...
The |item| variable, in both of these cases, may contain a pointer to a
|pitem| structure within |s->d1->buffered_messages|. It was being freed
in the error case while still being in |buffered_messages|. When the
error later caused the |SSL*| to be destroyed, the item would be double
freed.
Thanks to Wah-Teh Chang for spotting that the fix in 1632ef74 was
inconsistent with the other error paths (but correct).
Fixes CVE-2014-3505
Reviewed-by: Matt Caswell <matt@openssl.org >
Reviewed-by: Emilia Käsper <emilia@openssl.org >
2014-08-06 20:41:23 +01:00
Dr. Stephen Henson
89d2f8f1a9
make update
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-08-01 21:21:03 +01:00
Dr. Stephen Henson
2c3673cd3f
Fix error discrepancy.
...
We can't rename ssleay_rand_bytes to md_rand_bytes_lock as this will cause
an error code discrepancy. Instead keep ssleay_rand_bytes and add an
extra parameter: since ssleay_rand_bytes is not part of the public API
this wont cause any binary compatibility issues.
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
2014-08-01 18:42:41 +01:00
Bodo Moeller
ba5f75d53e
Update $default_depflags to match current defaults.
2014-08-01 19:03:03 +02:00
Bodo Moeller
be804523cf
Clean up CHANGES files: If a change is already present in 1.0.1f or 1.0.1h,
...
don't list it again under changes between 1.0.1h and 1.0.2.
2014-08-01 18:38:56 +02:00
Bodo Moeller
d5213519c0
Simplify and fix ec_GFp_simple_points_make_affine
...
(which didn't always handle value 0 correctly).
Reviewed-by: emilia@openssl.org
2014-08-01 17:27:59 +02:00
Dr. Stephen Henson
a3efe1b6e9
Avoid multiple lock using FIPS DRBG.
...
Don't use multiple locks when SP800-90 DRBG is used outside FIPS mode.
PR#3176
Reviewed-by: Rich Salz <rsalz@openssl.org >
2014-07-30 21:08:07 +01:00
Dr. Stephen Henson
789b12599d
Add conditional unit testing interface.
...
Don't call internal functions directly call them through
SSL_test_functions(). This also makes unit testing work on
Windows and platforms that don't export internal functions
from shared libraries.
By default unit testing is not enabled: it requires the compile
time option "enable-unit-test".
Reviewed-by: Geoff Thorpe <geoff@openssl.org >
(cherry picked from commit e0fc7961c4 )
Conflicts:
ssl/heartbeat_test.c
ssl/ssl.h
util/mkdef.pl
2014-07-24 19:42:26 +01:00
Matt Caswell
371d9a627b
Prepare for 1.0.2-beta3-dev
...
Reviewed-by: Stephen Henson <steve@openssl.org >
2014-07-22 21:31:04 +01:00
Matt Caswell
2f63ad1c6d
Prepare for 1.0.2-beta2 release
...
Reviewed-by: Stephen Henson <steve@openssl.org >
2014-07-22 21:30:33 +01:00
Matt Caswell
0e32035292
make update
...
Reviewed-by: Stephen Henson <steve@openssl.org >
2014-07-22 21:30:33 +01:00
Dr. Stephen Henson
f5ce8d6a61
update $default_depflags
...
Reviewed-by: Matt Caswell <matt@openssl.org >
2014-07-22 21:12:25 +01:00
Andy Polyakov
0ae6ba18ab
CHANGES: mention new platforms.
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
2014-07-22 20:18:06 +02:00
Billy Brumley
4ccc2c19e2
"EC_POINT_invert" was checking "dbl" function pointer instead of "invert".
...
PR#2569
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit cba11f57ce )
2014-07-21 22:28:09 +01:00
Tim Hudson
b5e611a973
Remove old unused and unmaintained demonstration code.
...
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
(cherry picked from commit 62352b8138 )
2014-07-22 07:26:55 +10:00
Andy Polyakov
a2f34441ab
sha1-ppc.pl: shave off one cycle from BODY_20_39
...
and improve performance by 10% on POWER[78].
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
(cherry picked from commit 5c3598307e )
2014-07-21 15:30:59 +02:00
Tim Hudson
2be9425514
Minor documentation update removing "really" and a
...
statement of opinion rather than a fact.
Reviewed-by: Dr. Stephen Henson <steve@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit c8d133e4b6 )
2014-07-21 20:25:14 +10:00
Dr. Stephen Henson
f284fc7cc3
Add test header to Makefile, update ordinals
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-07-20 20:50:38 +01:00
Andy Polyakov
c991d8ae8b
Initial POWER8 support from development branch.
...
Reviewed-by: Kurt Roeckx <kurt@openssl.org >
Reviewed-by: Tim Hudson <tjh@openssl.org >
2014-07-20 14:36:49 +02:00
Dr. Stephen Henson
be12cb3e24
Fix documentation for RSA_set_method(3)
...
PR#1675
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit 197400c3f0d617d71ad8167b52fb73046d334320)
2014-07-19 18:25:53 +01:00
Dr. Stephen Henson
4c05b1f8d6
Make *Final work for key wrap again.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 58f4698f67 )
2014-07-17 23:31:11 +01:00
Dr. Stephen Henson
6e1e5996df
Sanity check lengths for AES wrap algorithm.
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit d12eef1501 )
2014-07-17 12:58:42 +01:00
Jeffrey Walton
6ccd120f5f
Fix typo, add reference.
...
PR#3456
Reviewed-by: Stephen Henson <steve@openssl.org >
Reviewed-by: Matt Caswell <matt@openssl.org >
(cherry picked from commit d48e78f0cf )
2014-07-17 12:08:26 +01:00
Matt Caswell
ca818b322d
Disabled XTS mode in enc utility as it is not supported
...
PR#3442
Reviewed-by: Tim Hudson <tjh@openssl.org >
Reviewed-by: Rich Salz <rsalz@openssl.org >
(cherry picked from commit 2097a17c57 )
2014-07-16 21:01:38 +01:00
Matt Caswell
b11c24110c
Add Matt Caswell's fingerprint, and general update on the fingerprints file to bring it up to date
...
Reviewed-by: Tim Hudson <tjh@openssl.org >
(cherry picked from commit 3bd548192a )
2014-07-15 23:22:49 +01:00
Dr. Stephen Henson
beac6cb5aa
Clarify -Verify and PSK.
...
PR#3452
(cherry picked from commit ca2015a617 )
2014-07-15 20:23:25 +01:00
Dr. Stephen Henson
666a597ffb
Fix DTLS certificate requesting code.
...
Use same logic when determining when to expect a client
certificate for both TLS and DTLS.
PR#3452
(cherry picked from commit c8d710dc5f )
2014-07-15 18:23:35 +01:00
Dr. Stephen Henson
d4dbabb814
Don't allow -www etc options with DTLS.
...
The options which emulate a web server don't make sense when doing DTLS.
Exit with an error if an attempt is made to use them.
PR#3453
(cherry picked from commit 58a2aaeade8bdecd0f9f0df41927f7cff3012547)
2014-07-15 12:25:19 +01:00
Dr. Stephen Henson
c71e37aa6c
Use case insensitive compare for servername.
...
PR#3445
(cherry picked from commit 1c3e9a7c67 )
2014-07-14 23:59:58 +01:00
Hubert Kario
cdae9a58e6
document -nextprotoneg option in man pages
...
Add description of the option to advertise support of
Next Protocol Negotiation extension (-nextprotoneg) to
man pages of s_client and s_server.
PR#3444
(cherry picked from commit 7efd0e777e )
2014-07-14 23:43:21 +01:00
Dr. Stephen Henson
fa2b54c83a
Use more common name for GOST key exchange.
...
(cherry picked from commit 7aabd9c92fe6f0ea2a82869e5171dcc4518cee85)
2014-07-14 18:31:55 +01:00
Matt Caswell
14b5d0d029
Fixed valgrind complaint due to BN_consttime_swap reading uninitialised data.
...
This is actually ok for this function, but initialised to zero anyway if
PURIFY defined.
This does have the impact of masking any *real* unitialised data reads in bn though.
Patch based on approach suggested by Rich Salz.
PR#3415
(cherry picked from commit 77747e2d9a5573b1dbc15e247ce18c03374c760c)
2014-07-13 22:20:15 +01:00
Peter Mosmans
2fbd94252a
Add names of GOST algorithms.
...
PR#3440
(cherry picked from commit 924e5eda2c )
2014-07-13 18:31:09 +01:00
Richard Levitte
5b9188454b
* crypto/ui/ui_lib.c: misplaced brace in switch statement.
...
Detected by dcruette@qualitesys.com
(cherry picked from commit 8b5dd34091 )
2014-07-13 19:13:38 +02:00
Ben Laurie
5e189b4b8d
Don't clean up uninitialised EVP_CIPHER_CTX on error (CID 483259).
...
(cherry picked from commit c1d1b0114e )
2014-07-10 17:49:53 +01:00
Matt Caswell
23bd628735
Fix memory leak in BIO_free if there is no destroy function.
...
Based on an original patch by Neitrino Photonov <neitrinoph@gmail.com >
PR#3439
(cherry picked from commit 66816c53be )
2014-07-09 23:32:18 +01:00
Andy Polyakov
371feee876
x86_64 assembly pack: improve masm support.
...
(cherry picked from commit 1b0fe79f3e )
2014-07-09 22:46:13 +02:00
Andy Polyakov
f50f0c6aa3
Please Clang's sanitizer, addendum.
...
(cherry picked from commit d11c70b2c2 )
2014-07-09 22:45:52 +02:00
Andy Polyakov
2064e2db08
Please Clang's sanitizer.
...
PR: #3424,#3423,#3422
(cherry picked from commit 021e5043e5 )
2014-07-09 22:45:38 +02:00
Andy Polyakov
de222838fe
apps/speed.c: fix compiler warnings in multiblock_speed().
...
(cherry picked from commit c4f8efab34 )
2014-07-07 17:03:27 +02:00
Andy Polyakov
0ad2a0a303
sha[1|512]-x86_64.pl: fix logical errors with $shaext=0.
...
(cherry picked from commit 07b635cceb )
2014-07-07 17:02:00 +02:00
David Lloyd
2cb761c1f4
Prevent infinite loop loading config files.
...
PR#2985
(cherry picked from commit 9d23f422a3 )
2014-07-07 13:54:11 +01:00
Viktor Dukhovni
3ebcecf5c4
Improve X509_check_host() documentation.
...
Based on feedback from Jeffrey Walton.
(cherry picked from commit b73ac02735 )
2014-07-07 20:35:49 +10:00
Viktor Dukhovni
e83c913723
Update API to use (char *) for email addresses and hostnames
...
Reduces number of silly casts in OpenSSL code and likely most
applications. Consistent with (char *) for "peername" value from
X509_check_host() and X509_VERIFY_PARAM_get0_peername().
(cherry picked from commit 297c67fcd8 )
2014-07-07 19:20:34 +10:00
Viktor Dukhovni
55fe56837a
Set optional peername when X509_check_host() succeeds.
...
Pass address of X509_VERIFY_PARAM_ID peername to X509_check_host().
Document modified interface.
(cherry picked from commit ced3d9158a )
2014-07-07 19:20:34 +10:00
Viktor Dukhovni
1eb57ae2b7
New peername element in X509_VERIFY_PARAM_ID
...
Declaration, memory management, accessor and documentation.
(cherry picked from commit 6e661d458f )
2014-07-07 19:20:34 +10:00
Viktor Dukhovni
41e3ebd5ab
One more typo when changing !result to result <= 0
...
(cherry picked from commit eef1827f89 )
2014-07-07 19:19:13 +10:00
Viktor Dukhovni
9624b50d51
Fix typo in last commit
...
(cherry picked from commit 90b70a6a6b )
2014-07-07 19:19:13 +10:00
Viktor Dukhovni
449d864515
Multiple verifier reference identities.
...
Implemented as STACK_OF(OPENSSL_STRING).
(cherry picked from commit 8abffa4a73 )
2014-07-07 19:19:13 +10:00
Viktor Dukhovni
7f7e11ee5c
Implement sk_deep_copy.
...
(cherry picked from commit 66d884f067 )
2014-07-07 19:19:13 +10:00
Dr. Stephen Henson
43f534b986
Usage for -hack and -prexit -verify_return_error
...
(cherry picked from commit ee724df75d )
2014-07-06 22:45:20 +01:00
Dr. Stephen Henson
fbe8ea3abe
Document certificate status request options.
...
(cherry picked from commit cba3f1c739 )
2014-07-06 22:45:20 +01:00
Dr. Stephen Henson
affc941ea6
s_server usage for certificate status requests
...
(cherry picked from commit a44f219c00 )
2014-07-06 22:45:20 +01:00
Dr. Stephen Henson
012f7474f7
Update ticket callback docs.
...
(cherry picked from commit a23a6e85d8 )
2014-07-06 12:40:16 +01:00
Dr. Stephen Henson
5c1b373be6
Sanity check keylength in PVK files.
...
PR#2277
(cherry picked from commit 733a6c882e92f8221bd03a51643bb47f5f81bb81)
2014-07-06 00:36:14 +01:00
Jeffrey Walton
648a9f7c2f
Added reference to platform specific cryptographic acceleration such as AES-NI
2014-07-06 00:04:09 +01:00
Matt Caswell
623acb90cc
Fixed error in pod files with latest versions of pod2man
...
(cherry picked from commit 07255f0a76d9d349d915e14f969b9ff2ee0d1953)
2014-07-06 00:04:09 +01:00
Andy Polyakov
6ce295a301
sha512-x86_64.pl: fix typo.
...
PR: #3431
(cherry picked from commit 7eb9680ae1 )
2014-07-06 00:00:34 +02:00
Andy Polyakov
0359ccfd8b
s3_pkt.c: fix typo.
...
(cherry picked from commit 0e7a32b55e )
2014-07-05 23:57:28 +02:00
Andy Polyakov
9c1cf94f34
apps/speed.c: add multi-block benchmark.
...
(cherry picked from commit 375a64e349 )
2014-07-05 23:54:43 +02:00
Alan Hryngle
ff5b11f547
Return smaller of ret and f.
...
PR#3418.
(cherry picked from commit fdea4fff8f )
2014-07-05 22:38:17 +01:00
Dr. Stephen Henson
8358302d47
Don't limit message sizes in ssl3_get_cert_verify.
...
PR#319 (reoponed version).
(cherry picked from commit 7f6e957864 )
2014-07-05 13:30:38 +01:00
Dr. Stephen Henson
534656a997
Add license info.
...
(cherry picked from commit 55707a36cc )
2014-07-04 18:43:06 +01:00
Dr. Stephen Henson
2cfbec1cae
typo
2014-07-04 13:50:26 +01:00
Dr. Stephen Henson
22db480daf
Remove all RFC5878 code.
...
Remove RFC5878 code. It is no longer needed for CT and has numerous bugs.
2014-07-04 13:42:05 +01:00
Rich Salz
d107382214
Merge branch 'rsalz-docfixes'
2014-07-03 12:57:16 -04:00
Rich Salz
03ae3ca621
Close 3170, remove reference to Ariel Glenn's old 0.9.8 doc
...
(cherry picked from commit f1112985e8 )
2014-07-03 12:54:31 -04:00
Andy Polyakov
61df34e924
e_os.h: limit _MSC_VER trickery to older compilers.
...
PR: #3390
(cherry picked from commit aab3560b65 )
2014-07-02 22:34:02 +02:00
Andy Polyakov
47b9e06cfd
bn_exp.c: fix x86_64-specific crash with one-word modulus.
...
PR: #3397
(cherry picked from commit eca441b2b4 )
2014-07-02 21:16:45 +02:00
Matt Smart
88822622a1
Fix doc typo.
...
ERR_get_error(3) references the non-existent
ERR_get_last_error_line_data instead of the one that does exist,
ERR_peek_last_error_line_data.
PR#3283
(cherry picked from commit 5cc99c6cf5 )
2014-07-02 03:45:01 +01:00
Thijs Alkemade
8f243ab6c1
Make disabling last cipher work.
...
(cherry picked from commit 7cb472bd0d )
2014-07-02 03:32:42 +01:00
Dr. Stephen Henson
9223a31eb7
ASN1 sanity check.
...
Primitive encodings shouldn't use indefinite length constructed
form.
PR#2438 (partial).
(cherry picked from commit 398e99fe5e )
2014-07-02 00:59:44 +01:00
Dr. Stephen Henson
654ae3d6ad
Accessor functions for app_data in ECDSA_METHOD
...
(cherry picked from commit 387b844ffd )
2014-07-02 00:59:43 +01:00
Ben Laurie
70c739b8db
Fix possible buffer overrun.
...
(cherry picked from commit 2db3ea2929 )
Conflicts:
ssl/ssl_locl.h
ssl/t1_lib.c
2014-07-02 00:09:39 +01:00
Andy Polyakov
daa96141d3
sha512-x86_64.pl: fix linking problem under Windows.
...
(cherry picked from commit 29be3f6411 )
2014-07-01 17:12:41 +02:00
Dr. Stephen Henson
802fdcda1e
Fix copy for CCM, GCM and XTS.
...
Internal pointers in CCM, GCM and XTS contexts should either be
NULL or set to point to the appropriate key schedule. This needs
to be adjusted when copying contexts.
(cherry picked from commit c2fd5d79ff )
2014-06-30 13:59:38 +01:00
Dr. Stephen Henson
6006e352ad
Make EVP_Digest* work again.
2014-06-30 13:59:29 +01:00
Dr. Stephen Henson
2af68ef774
Don't core dump when using CMAC with dgst.
...
We can't unfortunately print the CMAC cipher used without extending the API.
PR#2579
(cherry picked from commit 79e31a2842e10271581cbfdaae0145dd4bd35107)
2014-06-29 23:44:44 +01:00
Dr. Stephen Henson
df401f4796
Make CMAC work with EVP_PKEY.
...
Add patch originally accidentally omitted to allow CMAC to work with
EVP_PKEY APIs.
2014-06-29 23:44:44 +01:00
Jeffrey Walton
3875ee59ba
Clarified that the signature's buffer size, s, is not used as an
...
IN parameter.
Under the old docs, the only thing stated was "at most
EVP_PKEY_size(pkey) bytes will be written". It was kind of misleading
since it appears EVP_PKEY_size(pkey) WILL be written regardless of the
signature's buffer size.
(cherry picked from commit 6e6ba36d98 )
2014-06-29 23:36:22 +01:00
ZNV
14183e50e7
Make EVP_CIPHER_CTX_copy work in GCM mode.
...
PR#3272
(cherry picked from commit 370bf1d708 )
2014-06-29 22:02:23 +01:00
Dr. Stephen Henson
15de0f609c
Fix memory leak.
...
PR#2531
(cherry picked from commit 44724beead )
2014-06-29 13:51:57 +01:00
Ken Ballou
4824e7d6e9
Typo.
...
PR#3173
(cherry picked from commit 76ed5a42ea )
2014-06-29 13:39:20 +01:00
Dr. Stephen Henson
a3b8cd242a
Show errors on CSR verification failure.
...
If CSR verify fails in ca utility print out error messages.
Otherwise some errors give misleading output: for example
if the key size exceeds the library limit.
PR#2875
(cherry picked from commit a30bdb55d1 )
2014-06-29 13:34:25 +01:00
Dr. Stephen Henson
d1cc95f781
Make no-ssl3 no-ssl2 do more sensible things.
...
(cherry picked from commit 7ae6a4b659 )
2014-06-29 03:05:21 +01:00
Dr. Stephen Henson
6d02baf6ab
Clarify protocols supported.
...
Update protocols supported and note that SSLv2 is effectively disabled
by default.
PR#3184
(cherry picked from commit 1b13a4f38dfc385d5e776f6b3e06c5795874cf9b)
2014-06-29 00:07:07 +01:00
Andy Polyakov
377551b9c4
x86_64 assembly pack: refine clang detection.
...
(cherry picked from commit a356e488ad )
Resolved conflicts:
crypto/bn/asm/rsaz-avx2.pl
2014-06-28 17:26:03 +02:00
Dr. Stephen Henson
361fd136e9
Typo.
...
PR#3107
(cherry picked from commit 7c206db928 )
2014-06-28 12:42:59 +01:00
Dr. Stephen Henson
4950a528ce
Don't disable state strings with no-ssl2
...
Some state strings were erronously not compiled when no-ssl2
was set.
PR#3295
(cherry picked from commit 0518a3e19e )
2014-06-28 00:56:27 +01:00
yogesh nagarkar
00ab230a3f
Fix compilation with -DSSL_DEBUG -DTLS_DEBUG -DKSSL_DEBUG
...
PR#3141
(cherry picked from commit d183545d45 )
2014-06-28 00:41:31 +01:00
Andreas Westfeld
e99980e8fd
Fix typo in ideatest.c
...
(cherry picked from commit d1d4382dcb )
2014-06-28 00:06:32 +01:00
Ken Ballou
ec77f276e1
Remove redundant check.
...
PR#3174
(cherry picked from commit fd331c0bb9b557903dd2ce88398570a3327b5ef0)
2014-06-27 23:19:37 +01:00
Dr. Stephen Henson
d0ba994483
Fix for EVP_PBE_alg_add().
...
In EVP_PBE_alg_add don't use the underlying NID for the cipher
as it may have a non-standard key size.
PR#3206
(cherry picked from commit efb7caef637a1de8468ca109efd355a9d0e73a45)
2014-06-27 23:19:37 +01:00
Andy Polyakov
52f856526c
x86_64 assembly pack: addendum to last clang commit.
...
(cherry picked from commit 7eb0488280 )
2014-06-27 22:55:22 +02:00
Andy Polyakov
912f08dd5e
x86_64 assembly pack: allow clang to compile AVX code.
...
(cherry picked from commit ac171925ab )
2014-06-27 22:55:07 +02:00
Andy Polyakov
1067663d85
bn/asm/rsaz-avx2.pl: fix occasional failures.
...
(cherry picked from commit 406d4af050 )
2014-06-27 22:43:43 +02:00
Dr. Stephen Henson
22228d2d40
Tolerate critical AKID in CRLs.
...
PR#3014
(cherry picked from commit 11da66f8b1 )
2014-06-27 18:50:19 +01:00
Tom Greenslade
c57745596c
Handle IPv6 addresses in OCSP_parse_url.
...
PR#2783
(cherry picked from commit b36f35cda9 )
2014-06-27 17:31:37 +01:00
Dr. Stephen Henson
65e4dca40c
Rebuild OID table.
2014-06-27 16:58:41 +01:00
Dr. Stephen Henson
ff4cfc4c58
Fix OID encoding for one component.
...
OIDs with one component don't have an encoding.
PR#2556 (Bug#1)
(cherry picked from commit 95791bf941 )
2014-06-27 16:58:16 +01:00
Tomas Mraz
f4623ab996
Don't advertise ECC ciphersuits in SSLv2 compatible client hello.
...
PR#3374
(cherry picked from commit 0436369fcc )
2014-06-27 16:52:00 +01:00
Jeffrey Walton
6ef350952c
Clarify docs.
...
Document that the certificate passed to SSL_CTX_add_extra_chain_cert()
should not be freed by the application.
PR#3409
(cherry picked from commit 0535c2d67c )
2014-06-27 16:39:39 +01:00
Dr. Stephen Henson
e42c208235
Memory leak and NULL dereference fixes.
...
PR#3403
(cherry picked from commit d2aea03829 )
2014-06-27 14:52:36 +01:00
Dr. Stephen Henson
e86951ca2a
Remove ancient obsolete files under pkcs7.
...
(cherry picked from commit 7be6b27aaf )
2014-06-27 13:53:23 +01:00
Huzaifa Sidhpurwala
b7a4f98b15
Make sure BN_sqr can never return a negative value.
...
PR#3410
(cherry picked from commit e14e764c0d5d469da63d0819c6ffc0e1e9e7f0bb)
2014-06-26 23:56:32 +01:00
Andy Polyakov
82a9dafe32
bn_exp.c: move check for AD*X to rsaz-avx2.pl.
...
This ensures high performance is situations when assembler supports
AVX2, but not AD*X.
(cherry picked from commit f3f620e1e0 )
Resolved conflicts:
crypto/bn/asm/rsaz-avx2.pl
2014-06-27 00:36:05 +02:00
Andy Polyakov
1536bcfd56
aesv8-armx.pl: rigid input verification in key setup.
...
(cherry picked from commit 7b8c8c4d79 )
2014-06-25 22:12:08 +02:00
Viktor Dukhovni
3fc0b1edad
X509_check_mumble() failure is <= 0, not just 0
...
(cherry picked from commit a48fb0400c )
2014-06-25 18:21:36 +01:00
Viktor Dukhovni
3d15d58e55
More complete input validation of X509_check_mumble
...
(cherry picked from commit 29edebe95c )
2014-06-25 18:21:35 +01:00
Viktor Dukhovni
d93edc0aab
Drop hostlen from X509_VERIFY_PARAM_ID.
...
Just store NUL-terminated strings. This works better when we add
support for multiple hostnames.
(cherry picked from commit b3012c698a )
2014-06-25 18:21:35 +01:00
Viktor Dukhovni
609daababb
More complete X509_check_host documentation.
...
(cherry picked from commit d241b80409 )
2014-06-25 18:21:35 +01:00
Andy Polyakov
a073ceeff4
aesv8-armx.pl: inclrease interleave factor.
...
This is to compensate for higher aes* instruction latency on Cortex-A57.
(cherry picked from commit 015364baf3 )
2014-06-24 08:10:37 +02:00
Andy Polyakov
5cd8ce42ec
ARMv8 assembly pack: add Cortex performance numbers.
...
(cherry picked from commit 0f777aeb50 )
2014-06-24 08:07:04 +02:00
Miod Vallat
d15f2d98ef
Fix off-by-one errors in ssl_cipher_get_evp()
...
In the ssl_cipher_get_evp() function, fix off-by-one errors in index validation before accessing arrays.
Bug discovered and fixed by Miod Vallat from the OpenBSD team.
PR#3375
2014-06-22 23:18:15 +01:00
Matt Caswell
00f5ee445b
Revert "Fix off-by-one errors in ssl_cipher_get_evp()"
...
This reverts commit 3d86077427 .
Incorrect attribution.
2014-06-22 23:17:40 +01:00
Matt Caswell
e7911530a9
Fixed Windows compilation failure
2014-06-22 20:18:09 +02:00
Richard Levitte
6ff73426c3
Make sure test/tests.com exit gracefully, even when openssl.exe wasn't
...
properly built.
2014-06-18 13:43:10 +02:00
Richard Levitte
a61e509e9b
Adjust VMS build to Unix build. Most of all, make it so the disabled
...
algorithms MD2 and RC5 don't get built.
Also, disable building the test apps in crypto/des and crypto/pkcs7, as
they have no support at all.
2014-06-18 13:43:09 +02:00
Felix Laurie von Massenbach
1b823494de
Fix signed/unsigned comparisons.
...
(cherry picked from commit 50cc4f7b3d )
2014-06-17 18:38:36 +01:00
Felix Laurie von Massenbach
6657e68bf2
Fix shadow declaration.
...
(cherry picked from commit 1f61d8b5b1 )
2014-06-17 18:36:48 +01:00
Richard Levitte
23351c607b
Remove unused DANE macros. This should be the last DANE stuff...
2014-06-17 12:38:20 +02:00
Richard Levitte
9a6112d16a
DCL doesn't do well with empty lines, or lines starting with #
2014-06-16 13:25:16 +02:00
Richard Levitte
b9c0dae28e
Spaces were added in some strings for better readability. However, those spaces do not belong in file names, so when picking out the individual parts, remove the spaces
2014-06-16 13:25:16 +02:00
Andy Polyakov
d940b3b9c7
aesni-sha[1|256]-x86_64.pl: fix logical error and MacOS X build.
...
(cherry picked from commit 9024b84b7c )
2014-06-16 10:12:56 +02:00
Viktor Dukhovni
cfbc10fb32
Enforce _X509_CHECK_FLAG_DOT_SUBDOMAINS internal-only
...
(cherry picked from commit d435e23959f1c2cb4feadbfba9ad884c59f37db9)
2014-06-14 22:31:28 +01:00
Dr. Stephen Henson
90d94ce39e
Accept CCS after sending finished.
...
Allow CCS after finished has been sent by client: at this point
keys have been correctly set up so it is OK to accept CCS from
server. Without this renegotiation can sometimes fail.
PR#3400
(cherry picked from commit 99cd6a91fcb0931feaebbb4832681d40a66fad41)
2014-06-14 22:31:28 +01:00
Andy Polyakov
79b960c046
evp/e_aes_cbc_sha[1|256].c: fix -DPEDANTIC build.
...
(cherry picked from commit ce00c64df9 )
2014-06-14 23:16:29 +02:00
Richard Levitte
66a6e2b2b6
Adjust VMS build files to the Unix ones
2014-06-14 16:58:11 +02:00
Richard Levitte
1be1d05184
Make sure that disabling the MAYLOSEDATA3 warning is only done when the
...
compiler supports it. Otherwise, there are warnings about it lacking
everywhere, which is quite tedious to read through while trying to check
for other warnings.
2014-06-14 16:58:11 +02:00
Richard Levitte
9f8c183283
Update the VMS tests according to the latest unixly tests.
...
Partly provided by Zoltan Arpadffy <arpadffy@polarhome.com >
2014-06-14 16:58:11 +02:00
Andy Polyakov
8301245a5e
aesni-sha256-x86_64.pl: add missing rex in shaext.
...
PR: 3405
(cherry picked from commit 91a6bf80f8 )
2014-06-14 16:04:04 +02:00
Andy Polyakov
1f6d207625
sha1-x86_64.pl: add missing rex prefix in shaext.
...
PR: 3405
(cherry picked from commit c9cf29cca2 )
2014-06-14 15:28:38 +02:00
Matt Caswell
561ba12463
Fixed incorrect return code handling in ssl3_final_finish_mac.
...
Based on an original patch by Joel Sing (OpenBSD) who also originally identified the issue.
2014-06-13 15:50:58 +01:00
Matt Caswell
7f133c357b
Revert "Fixed incorrect return code handling in ssl3_final_finish_mac"
...
This reverts commit 728bd41a15 .
Missing attribution.
2014-06-13 15:50:28 +01:00
Viktor Dukhovni
3cc8a3f234
Client-side namecheck wildcards.
...
A client reference identity of ".example.com" matches a server
certificate presented identity that is any sub-domain of "example.com"
(e.g. "www.sub.example.com).
With the X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS flag, it matches
only direct child sub-domains (e.g. "www.sub.example.com").
(cherry picked from commit e52c52f10bb8e34aaf8f28f3e5b56939e8f6b357)
2014-06-12 23:19:24 +01:00
Kurt Cancemi
3d86077427
Fix off-by-one errors in ssl_cipher_get_evp()
...
In the ssl_cipher_get_evp() function, fix off-by-one errors in index validation before accessing arrays.
PR#3375
2014-06-12 21:12:43 +01:00
Andy Polyakov
56ba280ccd
Facilitate back-porting of AESNI and SHA modules.
...
Fix SEH and stack handling in Win64 build.
(cherry picked from commit 977f32e852 )
2014-06-12 21:51:35 +02:00
Matt Caswell
955bfbc268
Added OPENSSL_assert check as per PR#3377 reported by Rainer Jung <rainer.jung@kippdata.de>
2014-06-12 20:42:33 +01:00
Dr. Stephen Henson
2eab488c02
remove some more DANE code
2014-06-12 11:09:14 +01:00
Dr. Stephen Henson
fa7a0efbac
make update
2014-06-12 10:52:49 +01:00
Dr. Stephen Henson
3fe8f005b0
Fix Windows build.
2014-06-12 10:52:49 +01:00
Dr. Stephen Henson
5af09776ce
Remove unimplemented functions.
2014-06-12 10:52:49 +01:00
Richard Levitte
995d08d104
Update the VMS build according to the latest unixly build.
...
Partly provided by Zoltan Arpadffy <arpadffy@polarhome.com >
2014-06-12 16:59:47 +02:00
Richard Levitte
ca422f3563
The 1.0.2 cms-test.pl had some changes that don't quite work on VMS...
2014-06-12 16:58:39 +02:00
Richard Levitte
68a1e0bc35
Bring in the 1.0.1g to 1.0.1h changes into CHANGES.
2014-06-12 12:22:24 +02:00
Richard Levitte
ed6c278f60
Small cleanup, double entry in CHANGES.
2014-06-12 12:18:13 +02:00
Andy Polyakov
d85a772ec3
Enable multi-block support by default.
...
(cherry picked from commit 77a27a5066 )
2014-06-11 20:41:46 +02:00
Dr. Stephen Henson
fb2f9f266c
Fix compilation with no-comp
...
(cherry picked from commit 7239a09c7b5757ed8d0e9869f3e9b03c0e11f4d1)
2014-06-11 14:41:00 +01:00
Andy Polyakov
66aeaec067
ghash-x86_64.pl: optimize for upcoming Atom.
...
(cherry picked from commit 1cf8f57b43 )
2014-06-11 11:35:23 +02:00
Andy Polyakov
70fddbe32a
Add support for Intel SHA extension.
...
(cherry picked from commit 619b94667c )
2014-06-11 10:30:31 +02:00
Rob Stradling
5fc3d333c7
Separate the SCT List parser from the SCT List viewer
...
(cherry picked from commit fd2309aa29 )
2014-06-11 00:10:45 +01:00
Matt Caswell
728bd41a15
Fixed incorrect return code handling in ssl3_final_finish_mac
2014-06-10 23:32:27 +01:00
Andy Polyakov
77fb5a303b
Engage GHASH for ARMv8.
...
(cherry picked from commit 82741e9c89 )
2014-06-11 00:10:00 +02:00
Andy Polyakov
7344089dc3
Add GHASH for ARMv8 Crypto Extension.
...
Result of joint effort with Ard Biesheuvel.
(cherry picked from commit 2d5a799d27 )
2014-06-11 00:09:35 +02:00
Andy Polyakov
7e03acf2be
Engage ARMv8 AES support [from HEAD].
2014-06-11 00:08:03 +02:00
Andy Polyakov
9af4cb3d3b
Add AES module for ARMv8 Crypto Extension [from HEAD].
2014-06-11 00:06:27 +02:00
Andy Polyakov
a00caa0257
sha[1|512]-armv8.pl: get instruction endianness right.
...
Submitted by: Ard Biesheuvel.
(cherry picked from commit cd91fd7c32 )
2014-06-10 23:34:53 +02:00
Andy Polyakov
4672acfa7d
linux-aarch64: engage SHA modules.
...
(cherry picked from commit f8aab6174c )
2014-06-10 23:32:26 +02:00
Andy Polyakov
ea61b32719
Add SHA for ARMv8.
...
(cherry picked from commit ddb6b965da )
2014-06-10 23:32:16 +02:00
Andy Polyakov
dabfbea7d9
Add linux-aarch64 taget.
...
armcap.c is shared between 32- and 64-bit builds and features link-time
detection of getauxval.
Submitted by: Ard Biesheuvel.
(cherry picked from commit e8d93e342b )
2014-06-10 23:20:55 +02:00
Andy Polyakov
56d973709c
aesni-mb-x86_64.pl: add Win64 SEH.
...
(cherry picked from commit e2eabed110 )
2014-06-10 23:09:04 +02:00
Andy Polyakov
3a97ebb16b
ARM assembly pack: get ARMv7 instruction endianness right.
...
Pointer out and suggested by: Ard Biesheuvel.
(cherry picked from commit 5dcf70a1c5 )
2014-06-10 22:51:15 +02:00
Andy Polyakov
16f4d2e32f
armv4cpuid.S: switch to CNTVCT tick counter.
...
(cherry picked from commit 723463282f )
2014-06-10 22:50:18 +02:00
Andy Polyakov
1f72a76f98
sha[1|256]-armv4: harmonize with arm_arch.h.
...
(cherry picked from commit 797d24bee9 )
2014-06-10 22:49:54 +02:00
Andy Polyakov
f5247cea39
sha/asm/sha1-armv4-large.pl: add NEON and ARMv8 code paths.
...
sha/asm/sha256-armv4.pl: add ARMv8 code path.
(cherry picked from commit 9250a30692 )
2014-06-10 22:48:27 +02:00
Andy Polyakov
3da2c3df78
crypto/armcap.c: detect ARMv8 capabilities [in 32-bit build].
...
(cherry picked from commit 4afa9f033d )
2014-06-10 22:47:19 +02:00
Hubert Kario
4ceddeea6c
backport changes to ciphers(1) man page
...
Backport of patch:
add ECC strings to ciphers(1), point out difference between DH and ECDH
and backport of other other assorted fixes to this man page
* Make a clear distinction between DH and ECDH key exchange.
* Group all key exchange cipher suite identifiers, first DH then ECDH
* add descriptions for all supported *DH* identifiers
* add ECDSA authentication descriptions
* add example showing how to disable all suites that offer no
authentication or encryption
* update status of static DH (it's now supported)
* backport descriptions of AES128, AES256, AESGCM
* backport descriptions of CAMELLIA128, CAMELLIA256
* backport listing of standard names for ECC cipher suites
and TLSv1.2 cipher suites
* backport description of PSK cipher suites
2014-06-10 20:55:14 +01:00
Mike Bland
2fddc5fc09
Create test/testutil.h for unit test helper macros
...
Defines SETUP_TEST_FIXTURE and EXECUTE_TEST, and updates ssl/heartbeat_test.c
using these macros. SETUP_TEST_FIXTURE makes use of the new TEST_CASE_NAME
macro, defined to use __func__ or __FUNCTION__ on platforms that support those
symbols, or to use the file name and line number otherwise. This should fix
several reported build problems related to lack of C99 support.
2014-06-10 19:24:46 +01:00
Dr. Stephen Henson
e3beef1e1b
Remove experimental DANE code.
...
Remove experimental DANE/dnssec code: not ready for use in an
official release yet.
2014-06-10 14:59:10 +01:00
Dr. Stephen Henson
cea5a1d5f2
Fix null pointer errors.
...
PR#3394
(cherry picked from commit 7a9d59c148 )
2014-06-10 14:48:02 +01:00
Dr. Stephen Henson
f472ada006
SRP ciphersuite correction.
...
SRP ciphersuites do not have no authentication. They have authentication
based on SRP. Add new SRP authentication flag and cipher string.
(cherry picked from commit a86b88acc373ac1fb0ca709a5fb8a8fa74683f67)
2014-06-09 12:09:51 +01:00
Dr. Stephen Henson
05b2210476
Update strength_bits for 3DES.
...
Fix strength_bits to 112 for 3DES.
(cherry picked from commit 837c203719205ab19b5609b2df7151be8df05687)
2014-06-09 12:09:51 +01:00
Kurt Roeckx
33e1a1d652
Link heartbeat_test with the static version of the libraries
...
It's using an internal API that that might not be available in the shared
library.
2014-06-09 00:12:37 +01:00
Jakub Wilk
38956b071a
Create ~/.rnd with mode 0600 instead of 0666
...
Because of a missing include <fcntl.h> we don't have O_CREATE and don't create
the file with open() using mode 0600 but fall back to using fopen() with the
default umask followed by a chmod().
Problem found by Jakub Wilk <jwilk@debian.org >.
2014-06-08 21:20:34 +01:00
Dr. Stephen Henson
a21f350a76
Make tls_session_secret_cb work with CVE-2014-0224 fix.
...
If application uses tls_session_secret_cb for session resumption
set the CCS_OK flag.
(cherry picked from commit 953c592572e8811b7956cc09fbd8e98037068b58)
2014-06-07 15:27:23 +01:00
Dr. Stephen Henson
74360af359
Update NEWS.
2014-06-07 15:27:23 +01:00
Matt Caswell
5400882ca3
Fixed minor duplication in docs
2014-06-07 12:31:38 +01:00
Dr. Stephen Henson
eb6508d50c
Fix for CVE-2014-0195
...
A buffer overrun attack can be triggered by sending invalid DTLS fragments
to an OpenSSL DTLS client or server. This is potentially exploitable to
run arbitrary code on a vulnerable client or server.
Fixed by adding consistency check for DTLS fragments.
Thanks to Jüri Aedla for reporting this issue.
(cherry picked from commit 1632ef7448 )
2014-06-05 13:24:50 +01:00
Dr. Stephen Henson
77719aefb8
Fix for CVE-2014-0224
...
Only accept change cipher spec when it is expected instead of at any
time. This prevents premature setting of session keys before the master
secret is determined which an attacker could use as a MITM attack.
Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for reporting this issue
and providing the initial fix this patch is based on.
(cherry picked from commit bc8923b1ec )
2014-06-05 13:24:46 +01:00
Dr. Stephen Henson
9d2c9dd1e1
Additional CVE-2014-0224 protection.
...
Return a fatal error if an attempt is made to use a zero length
master secret.
(cherry picked from commit 006cd7083f )
2014-06-05 13:24:40 +01:00
Dr. Stephen Henson
8942b92c7c
Fix CVE-2014-0221
...
Unnecessary recursion when receiving a DTLS hello request can be used to
crash a DTLS client. Fixed by handling DTLS hello request without recursion.
Thanks to Imre Rad (Search-Lab Ltd.) for discovering this issue.
(cherry picked from commit d3152655d5 )
2014-06-05 13:24:36 +01:00
Dr. Stephen Henson
e5f706590c
Fix CVE-2014-3470
...
Check session_cert is not NULL before dereferencing it.
(cherry picked from commit 8011cd56e3 )
2014-06-05 13:24:30 +01:00
Libor Krystek
a5d03c54ab
Corrected OPENSSL_NO_EC_NISTP_64_GCC_128 usage in ec_lcl.h. PR#3370
2014-06-03 23:17:21 +01:00
David Benjamin
56b94a38b9
Check there is enough room for extension.
...
(cherry picked from commit 7d89b3bf42e4b4067371ab33ef7631434e41d1e4)
2014-06-02 18:59:48 +01:00
zhu qun-ying
d52eb82781
Free up s->d1->buffered_app_data.q properly.
...
PR#3286
(cherry picked from commit 71e95000afb2227fe5cac1c79ae884338bcd8d0b)
2014-06-02 14:40:05 +01:00
Dr. Stephen Henson
4967a832ab
Allow reordering of certificates when signing.
...
Add certificates if -nocerts and -certfile specified when signing
in smime application. This can be used this to specify the
order certificates appear in the PKCS#7 structure: some broken
applications require a certain ordering.
PR#3316
(cherry picked from commit e114abee9ec084a56c1d6076ac6de8a7a3a5cf34)
2014-06-02 14:19:43 +01:00
Sami Farin
6468866823
Typo: set i to -1 before goto.
...
PR#3302
(cherry picked from commit 9717f01951f976f76dd40a38d9fc7307057fa4c4)
2014-06-02 13:53:54 +01:00
Matt Caswell
de8a5b523f
Added SSLErr call for internal error in dtls1_buffer_record
2014-06-01 21:40:31 +01:00
David Ramos
8de85b0048
Delays the queue insertion until after the ssl3_setup_buffers() call due to use-after-free bug. PR#3362
2014-06-01 21:40:25 +01:00
Dr. Stephen Henson
8d71574142
Recognise padding extension.
...
(cherry picked from commit ea2bb861f0daaa20819bf9ac8c146f7593feacd4)
Conflicts:
apps/s_cb.c
2014-06-01 16:50:25 +01:00
Dr. Stephen Henson
623a01df49
Option to disable padding extension.
...
Add TLS padding extension to SSL_OP_ALL so it is used with other
"bugs" options and can be turned off.
This replaces SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG which is an ancient
option referring to SSLv2 and SSLREF.
PR#3336
(cherry picked from commit 758415b2259fa45d3fe17d8e53ae1341b7b6e482)
Conflicts:
ssl/t1_lib.c
2014-06-01 16:50:25 +01:00
Dr. Stephen Henson
08b172b975
Set default global mask to UTF8 only.
...
(cherry picked from commit 3009244da4 )
2014-06-01 15:04:21 +01:00
David Ramos
856a4585d6
Allocate extra space when NETSCAPE_HANG_BUG defined.
...
Make sure there is an extra 4 bytes for server done message when
NETSCAPE_HANG_BUG is defined.
PR#3361
(cherry picked from commit 92d81ba622 )
2014-06-01 14:27:58 +01:00
David Ramos
3329765bba
Initialise alg.
...
PR#3313
(cherry picked from commit 7e2c6f7eb0 )
2014-06-01 13:05:08 +01:00
Dr. Stephen Henson
87a0cbdf2e
Use correct digest when exporting keying material.
...
PR#3319
(cherry picked from commit 84691390eae86befd33c83721dacedb539ae34e6)
2014-05-30 13:24:36 +01:00
Dr. Stephen Henson
b5bdde9e0e
Don't compile heartbeat test code on Windows (for now).
...
(cherry picked from commit 2c575907d2c8601a18716f718ce309ed4e1f1783)
2014-05-30 13:12:26 +01:00
Dr. Stephen Henson
1788072b9e
Set version number correctly.
...
PR#3249
(cherry picked from commit 8909bf20269035d295743fca559207ef2eb84eb3)
2014-05-29 14:08:54 +01:00
František Bořánek
5f2b5e3823
Fix memory leak.
...
PR#3278
(cherry picked from commit de56fe797081fc09ebd1add06d6e2df42a324fd5)
2014-05-29 13:49:50 +01:00
Martin Kaiser
42d73874ed
remove duplicate 0x for default RSASSA-PSS salt len
...
(cherry picked from commit 3820fec3a09faecba7fe9912aa20ef7fcda8337b)
2014-05-29 13:32:41 +01:00
Matt Caswell
88d3d6c9ae
Fixed error in args for SSL_set_msg_callback and SSL_set_msg_callback_arg
2014-05-25 23:47:32 +01:00
Ben Laurie
3435ef467f
Only copy opensslconf.h at init time.
2014-05-24 15:48:24 +01:00
Andy Polyakov
c90c694bc4
vpaes-ppc.pl: comply with ABI.
...
(cherry picked from commit b83d09f552 )
2014-05-23 20:16:21 +02:00
Mike Bland
8db2ba4b84
Fix heartbeat_test for -DOPENSSL_NO_HEARTBEATS
...
Replaces the entire test with a trivial implementation when
OPENSSL_NO_HEARTBEATS is defined.
2014-05-22 22:02:46 +01:00
Ben Laurie
d77501d8fd
Check length first in BUF_strnlen().
2014-05-22 10:12:10 +01:00
Matt Caswell
15e4565984
Fixed minor copy&paste error, and stray space causing rendering problem
2014-05-22 00:11:40 +01:00
Matt Caswell
5757766550
Fixed unterminated B tag, causing build to fail with newer pod2man versions
2014-05-22 00:01:33 +01:00
Ben Laurie
4f7236edc7
Remove redundant test.
2014-05-21 12:03:50 +01:00
Ben Laurie
ed693e4332
Implement BUF_strnlen() and use it instead of strlen().
2014-05-21 11:56:21 +01:00
Viktor Dukhovni
a2219f6be3
Fixes to host checking.
...
Fixes to host checking wild card support and add support for
setting host checking flags when verifying a certificate
chain.
(cherry picked from commit 397a8e747d )
2014-05-21 11:32:19 +01:00
Dr. Stephen Henson
03b5b78c09
Fix for PKCS12_create if no-rc2 specified.
...
Use triple DES for certificate encryption if no-rc2 is
specified.
PR#3357
2014-05-21 11:28:57 +01:00
Dr. Stephen Henson
cd302feb5d
Change default cipher in smime app to des3.
...
PR#3357
(cherry picked from commit ca3ffd9670f2b589bf8cc04923f953e06d6fbc58)
2014-05-21 11:28:57 +01:00
Ben Laurie
5cd1a6fc3e
Fix signed/unsigned warning.
2014-05-20 15:14:30 +01:00
Ben Laurie
4ceb430a46
Don't allocate more than is needed in BUF_strndup().
2014-05-20 13:53:35 +01:00
Dr. Stephen Henson
81ce94f8dc
For portability use BUF_strndup instead of strndup.
...
(cherry picked from commit dcca7b13e9 )
2014-05-20 11:22:33 +01:00
Dr. Stephen Henson
feaa3b380b
Adding padding extension to trace code.
...
(cherry picked from commit 6db14dbc51 )
2014-05-20 11:22:15 +01:00
Janpopan
5d8e9f2ae0
Fix a wrong parameter count ERR_add_error_data
2014-05-19 22:15:27 +01:00
Ben Laurie
6c1d36a649
Merge branch 'mbland-heartbeat-test-1.0.2' into OpenSSL_1_0_2-stable
2014-05-19 18:04:41 +01:00
Mike Bland
2312a84ca1
Unit/regression test for TLS heartbeats.
...
Regression test against CVE-2014-0160 (Heartbleed).
More info: http://mike-bland.com/tags/heartbleed.html
(based on commit 35cb55988b75573105eefd00d27d0138eebe40b1)
2014-05-18 10:23:59 -04:00
Matt Caswell
a99d2a22e1
Moved note about lack of support for AEAD modes out of BUGS section to SUPPORTED CIPHERS section (bug has been fixed, but still no support for AEAD)
2014-05-15 21:15:21 +01:00
Dr. Stephen Henson
2fa65aa7d8
Enc doesn't support AEAD ciphers.
...
(cherry picked from commit 09184dddead165901700b31eb39d540ba30f93c5)
2014-05-15 14:16:45 +01:00
Jeffrey Walton
4907cf0845
Fix grammar error in verify pod. PR#3355
2014-05-14 22:58:19 +01:00
Jeffrey Walton
28b4820f70
Add information to BUGS section of enc documentation. PR#3354
2014-05-14 22:58:19 +01:00
Michal Bozon
72967d5be9
Corrected POD syntax errors. PR#3353
2014-05-14 22:58:19 +01:00
Mike Frysinger
4aebb2c8b8
Have the .pc files depend on each other rather than duplicating the
...
various link settings. PR#3332
2014-05-12 23:33:35 +01:00
Kurt Roeckx
1f5bce2dce
Check sk_SSL_CIPHER_num() after assigning sk.
2014-05-12 22:59:11 +01:00
Jean-Paul Calderone
b953b02849
Correct the return type on the signature for X509_STORE_CTX_get_ex_data given in the pod file.
2014-05-12 22:49:00 +01:00
Serguei E. Leontiev
d6e55b4001
Replace manual ASN1 decoder with ASN1_get_object
...
Replace manual ASN.1 decoder with ASN1_get object. This
will decode the tag and length properly and check against
it does not exceed the supplied buffer length.
PR#3335
(cherry picked from commit b0308dddd1cc6a8e1de803ef29ba6da25ee072c2)
2014-05-12 18:41:51 +01:00
Matt Caswell
f710c3f198
Fixed NULL pointer dereference. See PR#3321
2014-05-12 00:39:43 +01:00
Kurt Roeckx
99a3d167d9
Set authkey to NULL and check malloc return value.
2014-05-12 00:22:52 +01:00
Martin Brejcha
c622649513
dgram_sctp_ctrl: authkey memory leak
...
PR: 3327
2014-05-12 00:22:52 +01:00
Günther Noack
8571902e23
Avoid out-of-bounds write in SSL_get_shared_ciphers
...
PR: 3317
2014-05-11 23:55:06 +01:00
Viktor Dukhovni
711bb9bc88
Fix infinite loop. PR#3347
2014-05-11 21:09:56 +01:00
Matt Caswell
f2ebe2a60e
Move length check earlier to ensure we don't go beyond the end of the user's buffer. PR#3320
2014-05-11 11:32:17 +01:00
Tim Hudson
011ee91105
safety check to ensure we dont send out beyond the users buffer
2014-05-11 11:32:17 +01:00
Dr. Stephen Henson
2c4144638a
Return an error if no recipient type matches.
...
If the key type does not match any CMS recipient type return
an error instead of using a random key (MMA mitigation). This
does not leak any useful information to an attacker.
PR#3348
(cherry picked from commit bd43b4cf778a53ffa5d77510ecd408a009dc00d2)
2014-05-09 14:24:53 +01:00
Tim Hudson
2fc04cb872
coverity 966576 - close socket in error path
2014-05-08 23:22:28 +01:00
Tim Hudson
62cc5ff623
PR#3342 fix resource leak coverity issue 966577
2014-05-08 23:22:21 +01:00
Tim Hudson
afe343c3a7
fix coverity issue 966597 - error line is not always initialised
2014-05-07 23:57:00 +01:00
Matt Caswell
e0d2139045
Fixed NULL pointer dereference in PKCS7_dataDecode reported by David Ramos in PR#3339
2014-05-07 23:23:15 +01:00
Geoff Thorpe
d60f019321
dso: eliminate VMS code on non-VMS systems
...
Even though the meat of dso_vms.c is compiled out on non-VMS builds,
the (pre-)compiler still traverses some of the macro handling. This
trips up at least one non-VMS build configuration, so this commit
makes the skip-VMS case more robust.
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
2014-05-06 18:03:52 -04:00
Geoff Thorpe
65402586c0
evp: prevent underflow in base64 decoding
...
This patch resolves RT ticket #2608 .
Thanks to Robert Dugal for originally spotting this, and to David
Ramos for noticing that the ball had been dropped.
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
2014-05-06 18:02:02 -04:00
Geoff Thorpe
bf43446835
bignum: allow concurrent BN_MONT_CTX_set_locked()
...
The lazy-initialisation of BN_MONT_CTX was serialising all threads, as
noted by Daniel Sands and co at Sandia. This was to handle the case that
2 or more threads race to lazy-init the same context, but stunted all
scalability in the case where 2 or more threads are doing unrelated
things! We favour the latter case by punishing the former. The init work
gets done by each thread that finds the context to be uninitialised, and
we then lock the "set" logic after that work is done - the winning
thread's work gets used, the losing threads throw away what they've done.
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
2014-05-06 18:01:59 -04:00
Dr. Stephen Henson
7169e56d6b
Initialize num properly.
...
PR#3289
PR#3345
(cherry picked from commit 3ba1e406c2 )
2014-05-06 14:09:07 +01:00
Dr. Stephen Henson
1047b8c84d
Set Enveloped data version to 2 if ktri version not zero.
...
(cherry picked from commit 546b1b4384 )
2014-05-06 14:00:11 +01:00
Tim Hudson
9740a03695
- fix coverity issues 966593-966596
2014-05-06 00:04:59 +01:00
David Ramos
e34af3ec2b
Double free in i2o_ECPublicKey
...
PR: 3338
2014-05-04 00:50:42 +01:00
Jeff Trawick
d576146ebf
typo in SSL_get_peer_cert_chain docs
...
RT: 3304
2014-05-02 00:26:05 +01:00
Matt Caswell
7441e7dbe9
Fixed spelling error in error message. Fix supplied by Marcos Marado
2014-05-01 00:27:02 +01:00
Matt Caswell
1d3f432b53
Fixed various pod errors
2014-05-01 00:07:28 +01:00
Lubomir Rintel
15a4add72d
POD: Fix item numbering
...
Newer pod2man considers =item [1-9] part of a numbered list, while =item
0 starts an unnumbered list. Add a zero effect formatting mark to override
this.
doc/apps/smime.pod around line 315: Expected text after =item, not a
number
...
PR#3146
2014-04-30 23:44:54 +01:00
Geoff Thorpe
3cc546a3bb
bignum: fix boundary condition in montgomery logic
...
It's not clear whether this inconsistency could lead to an actual
computation error, but it involved a BIGNUM being passed around the
montgomery logic in an inconsistent state. This was found using flags
-DBN_DEBUG -DBN_DEBUG_RAND, and working backwards from this assertion
in 'ectest';
ectest: bn_mul.c:960: BN_mul: Assertion `(_bnum2->top == 0) ||
(_bnum2->d[_bnum2->top - 1] != 0)' failed
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
(cherry picked from commit a529261891 )
2014-04-30 11:53:09 -04:00
Geoff Thorpe
c434f7f80f
util/mkerr.pl: fix perl warning
...
Gets rid of this;
defined(@array) is deprecated at ../util/mkerr.pl line 792.
(Maybe you should just omit the defined()?)
defined(@array) is deprecated at ../util/mkerr.pl line 800.
(Maybe you should just omit the defined()?)
Signed-off-by: Geoff Thorpe <geoff@openssl.org >
(cherry picked from commit 647f360e2e )
2014-04-30 11:52:08 -04:00
mancha
e6a01b47e4
Fix version documentation.
...
Specify -f is for compilation flags. Add -d to synopsis section.
(cherry picked from commit 006397ea62bbcae22c8664d53c2222b808c4bdd1)
Closes #78 .
2014-04-26 11:20:00 +01:00
mancha
3f1b3d9675
Fix eckey_priv_encode()
...
Fix eckey_priv_encode to return an error on failure of i2d_ECPrivateKey.
2014-04-24 19:31:49 +00:00
Steve Marquess
3e124d66c8
Add new sponsors
...
(cherry picked from commit 351f0a124bffaa94d2a8abdec2e7dde5ae9c457d)
2014-04-24 12:33:01 +01:00
Andy Polyakov
0fb3d5b4fd
bn/asm/armv4-gf2m.pl, modes/asm/ghash-armv4.pl: faster multiplication
...
algorithm suggested in following paper:
Câmara, D.; Gouvêa, C. P. L.; López, J. & Dahab, R.: Fast Software
Polynomial Multiplication on ARM Processors using the NEON Engine.
http://conradoplg.cryptoland.net/files/2010/12/mocrysen13.pdf
(cherry picked from commit f8cee9d081 )
2014-04-24 10:27:52 +02:00
Andy Polyakov
ffdff9f12f
aes/asm/bsaes-x86_64.pl: Atom-specific optimization.
...
(cherry picked from commit 558ff0f0c1 )
2014-04-24 10:14:46 +02:00
Ben Laurie
a0fe2e72c4
Fix use after free.
2014-04-23 07:30:16 +01:00
Ben Laurie
3b21abfd6c
Fix double frees.
...
Conflicts:
CHANGES
2014-04-22 17:00:52 +01:00
Kaspar Brand
5aeb43393b
Fix SSL_CTX_get{first,next}_certificate.
...
Fix typo that stopped SSL_CTX_get_{first,next}_certificate from working.
(cherry picked from commit 9330a85e04 )
2014-04-21 16:53:48 +01:00
Dr. Stephen Henson
6e85eba11b
Document -debug_decrypt option.
...
(cherry picked from commit 0dd5b94aeb )
2014-04-16 12:35:54 +01:00
Dr. Stephen Henson
5cd5e0219d
Extension checking fixes.
...
When looking for an extension we need to set the last found
position to -1 to properly search all extensions.
PR#3309.
(cherry picked from commit 300b9f0b70 )
2014-04-15 18:52:50 +01:00
Dr. Stephen Henson
9c1d63540f
Clarify CMS_decrypt behaviour.
...
(cherry picked from commit 5f8e9a477a )
2014-04-15 18:19:26 +01:00
Dr. Stephen Henson
db34be4224
Add new key fingerprint.
...
(cherry picked from commit 3143a332e8 )
2014-04-11 02:51:34 +01:00
Dr. Stephen Henson
b9ce05acc4
Fix free errors in ocsp utility.
...
Keep copy of any host, path and port values allocated by
OCSP_parse_url and free as necessary.
(cherry picked from commit 5219d3dd35 )
2014-04-09 15:45:16 +01:00
Steven M. Schweda
6ef9d9bacf
VMS build fix #2 .
...
(cherry picked from commit a74bee5fc7 )
2014-04-08 17:28:23 +01:00
Steven M. Schweda
40a44a7c3d
VMS build fix for older compilers.
...
(cherry picked from commit 55c9e24875 )
2014-04-07 23:15:31 +01:00
Dr. Stephen Henson
13738d5fa1
update CHANGES
2014-04-07 21:56:34 +01:00
Dr. Stephen Henson
363dede7a5
Update NEWS.
2014-04-07 21:32:56 +01:00
Dr. Stephen Henson
43866bd6fc
update NEWS
2014-04-07 19:29:04 +01:00
Dr. Stephen Henson
cd29ced6de
Return if ssleay_rand_add called with zero num.
...
Treat a zero length passed to ssleay_rand_add a no op: the existing logic
zeroes the md value which is very bad. OpenSSL itself never does this
internally and the actual call doesn't make sense as it would be passing
zero bytes of entropy.
Thanks to Marcus Meissner <meissner@suse.de > for reporting this bug.
(cherry picked from commit 5be1ae28ef )
2014-04-07 19:27:46 +01:00
Dr. Stephen Henson
7e840163c0
Add heartbeat extension bounds check.
...
A missing bounds check in the handling of the TLS heartbeat extension
can be used to reveal up to 64k of memory to a connected client or
server.
Thanks for Neel Mehta of Google Security for discovering this bug and to
Adam Langley <agl@chromium.org > and Bodo Moeller <bmoeller@acm.org > for
preparing the fix (CVE-2014-0160)
(cherry picked from commit 96db9023b8 )
2014-04-07 19:25:34 +01:00
Dr. Stephen Henson
a4896327e3
Document -verify_return_error option.
...
(cherry picked from commit 4e6c12f308 )
2014-04-07 13:03:54 +01:00
Andy Polyakov
f396e9f4fc
crypto/modes/gcm128.c: more strict aliasing fixes.
...
(cherry picked from commit 997d1aac7c )
2014-04-06 17:22:12 +02:00
Andy Polyakov
dacb698ada
vpaes-[x86_64|ppc].pl: fix typo, which for some reason triggers rkhunter.
...
(cherry picked from commit 6eebcf3459 )
2014-04-06 12:53:17 +02:00
Dr. Stephen Henson
6411b83e52
Set TLS padding extension value.
...
Enable TLS padding extension using official value from:
http://www.iana.org/assignments/tls-extensiontype-values/tls-extensiontype-values.xhtml
(cherry picked from commit cd6bd5ffda )
Conflicts:
CHANGES
2014-04-05 20:49:09 +01:00
Dr. Stephen Henson
bb98beade9
Use correct length when prompting for password.
...
Use bufsiz - 1 not BUFSIZ - 1 when prompting for a password in
the openssl utility.
Thanks to Rob Mackinnon, Leviathan Security for reporting this issue.
(cherry picked from commit 7ba08a4d73 )
2014-04-04 13:06:49 +01:00
Dr. Stephen Henson
b8d208c549
Update FAQ.
...
(cherry picked from commit 6cc0068430 )
2014-04-04 13:05:56 +01:00
Dr. Stephen Henson
04f35a8909
Document new crl option.
...
(cherry picked from commit dbb7654dc1 )
2014-04-03 13:35:48 +01:00
Tim Hudson
68bd06eb6e
Add option to generate old hash format.
...
New -hash_old to generate CRL hashes using old
(before OpenSSL 1.0.0) algorithm.
(cherry picked from commit de2d97cd79 )
2014-04-03 13:35:22 +01:00
Dr. Stephen Henson
686b616ea9
VMS build fix
2014-04-02 21:46:13 +01:00
Eric Young
0bb37c5e23
Fix base64 decoding bug.
...
A short PEM encoded sequence if passed to the BIO, and the file
had 2 \n following would fail.
PR#3289
(cherry picked from commit 10378fb5f4 )
2014-04-02 19:57:06 +01:00
Dr. Stephen Henson
e9b4b8afbd
Don't try and verify signatures if key is NULL (CVE-2013-0166)
...
Add additional check to catch this in ASN1_item_verify too.
(cherry picked from commit 66e8211c0b )
2014-04-01 16:39:35 +01:00
Dr. Stephen Henson
bc5ec653ba
Fix memory leak with client auth.
2014-03-27 16:10:50 +00:00
Dr. Stephen Henson
1f44dac24d
Add -no_resumption_on_reneg to SSL_CONF.
2014-03-27 15:51:25 +00:00
Dr. Stephen Henson
2dd6976f6d
Update chain building function.
...
Don't clear verification errors from the error queue unless
SSL_BUILD_CHAIN_FLAG_CLEAR_ERROR is set.
If errors occur during verification and SSL_BUILD_CHAIN_FLAG_IGNORE_ERROR
is set return 2 so applications can issue warnings.
2014-03-27 14:23:46 +00:00
Emilia Kasper
662239183d
Allow duplicate certs in ssl_build_cert_chain
2014-03-25 17:28:04 +00:00
Dr. Stephen Henson
66243398bb
Workaround for some CMS signature formats.
...
Some CMS SignedData structure use a signature algorithm OID such
as SHA1WithRSA instead of the RSA algorithm OID. Workaround this
case by tolerating the signature if we recognise the OID.
(cherry picked from commit 3a98f9cf20 )
2014-03-19 17:29:55 +00:00
Piotr Sikora
aa10982c49
Retry callback only after ClientHello received.
...
(cherry picked from commit f04665a653 )
2014-03-18 23:58:39 +00:00
Dr. Stephen Henson
8b0336c810
Update ordinals.
...
Use a previously unused value as we will be updating multiple released
branches.
(cherry picked from commit 0737acd2a8 )
2014-03-12 14:41:52 +00:00
Dr. Stephen Henson
0a9f7780e5
Fix for CVE-2014-0076
...
Fix for the attack described in the paper "Recovering OpenSSL
ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack"
by Yuval Yarom and Naomi Benger. Details can be obtained from:
http://eprint.iacr.org/2014/140
Thanks to Yuval Yarom and Naomi Benger for discovering this
flaw and to Yuval Yarom for supplying a fix.
(cherry picked from commit 2198be3483 )
Conflicts:
CHANGES
2014-03-12 14:23:21 +00:00
Dr. Stephen Henson
44f7e399d3
typo
...
(cherry picked from commit a029788b0e )
2014-03-10 15:48:12 +00:00
Dr. Stephen Henson
8419df95e1
Remove -WX option from debug-VC-WIN32
...
(cherry picked from commit 7a3e67f029969620966b8a627b8485d83692cca5)
2014-03-07 19:07:51 +00:00
Andy Polyakov
59314f304e
engines/ccgost/gosthash.c: simplify and avoid SEGV.
...
PR: 3275
(cherry picked from commit ea38f02049 )
2014-03-07 11:03:25 +01:00
Andy Polyakov
cc6dc9b229
SPARC T4 assembly pack: treat zero input length in CBC.
...
The problem is that OpenSSH calls EVP_Cipher, which is not as
protective as EVP_CipherUpdate. Formally speaking we ought to
do more checks in *_cipher methods, including rejecting
lengths not divisible by block size (unless ciphertext stealing
is in place). But for now I implement check for zero length in
low-level based on precedent.
PR: 3087, 2775
(cherry picked from commit 5e44c144e6 )
2014-03-07 10:48:51 +01:00
Andy Polyakov
fe69e6be6e
dh_check.c: check BN_CTX_get's return value.
...
(cherry picked from commit 53e5161231 )
2014-03-06 14:21:17 +01:00
Andy Polyakov
430c5ca02e
test/Makefile: allow emulated test (e.g. under wine) [from master].
...
Submitted by: Roumen Petrov
2014-03-06 14:09:58 +01:00
Andy Polyakov
25ebd9e3ce
bss_dgram.c,d1_lib.c: make it compile with mingw.
...
Submitted by: Roumen Petrov
(cherry picked from commit 972b0dc350 )
2014-03-06 14:07:16 +01:00
Dr. Stephen Henson
bdfc0e284c
For self signed root only indicate one error.
2014-03-03 23:33:51 +00:00
Dr. Stephen Henson
12c56e4888
Sync crypto documentation with master branch.
2014-03-03 15:12:17 +00:00
Dr. Stephen Henson
1bd4ee1da1
Use nid not cipher type as some ciphers don't have OIDs.
2014-03-02 15:00:21 +00:00
Dr. Stephen Henson
3956bfce60
Make null cipher work in FIPS mode.
2014-03-02 13:50:06 +00:00
Dr. Stephen Henson
8394109c89
Add new VMS hack symbol, update ordinals.
2014-03-02 13:50:06 +00:00
Dr. Stephen Henson
813cfd9c0a
Add additional FIPS digests.
...
Add a few special case digests not returned by FIPS_get_digestbynid().
Thanks to Roumen Petrov <openssl@roumenpetrov.info > for reporting this
issue.
2014-03-01 23:14:08 +00:00
Dr. Stephen Henson
976c58302b
Add function to free compression methods.
...
Although the memory allocated by compression methods is fixed and
cannot grow over time it can cause warnings in some leak checking
tools. The function SSL_COMP_free_compression_methods() will free
and zero the list of supported compression methods. This should
*only* be called in a single threaded context when an application
is shutting down to avoid interfering with existing contexts
attempting to look up compression methods.
2014-03-01 23:14:08 +00:00
Dr. Stephen Henson
b60272b01f
PKCS#8 support for alternative PRFs.
...
Add option to set an alternative to the default hmacWithSHA1 PRF
for PKCS#8 private key encryptions. This is used automatically
by PKCS8_encrypt if the nid specified is a PRF.
Add option to pkcs8 utility.
Update docs.
2014-03-01 23:14:08 +00:00
Dr. Stephen Henson
124d218889
Fix memory leak.
2014-03-01 23:14:08 +00:00
Andy Polyakov
cd077dab08
Makefile.org: fix syntax error on Solaris.
...
PR: 3271
(cherry picked from commit 65370f9bbc )
2014-02-28 22:55:44 +01:00
Dr. Stephen Henson
d1201e3195
Fix compilation errors with no-nextprotoneg
2014-02-28 13:35:30 +00:00
Dr. Stephen Henson
5f2329b82a
Fix fips flag handling.
...
Don't set the fips flags in cipher and digests as the implementations
aren't suitable for FIPS mode and will be redirected to the FIPS module
versions anyway.
Return EVP_CIPH_FLAG_FIPS or EVP_MD_FLAG_FIPS if a FIPS implementation
exists when calling EVP_CIPHER_flags and EVP_MD_flags repectively.
Remove unused FIPS code from e_aes.c: the 1.0.2 branch will never be
used to build a FIPS module.
2014-02-27 19:18:58 +00:00
Dr. Stephen Henson
01fb5e133f
Remove unused file.
...
The file evp_fips.c isn't used in OpenSSL 1.0.2 as FIPS and non-FIPS
implementations of algorithms can coexist.
2014-02-27 19:08:53 +00:00
Andy Polyakov
fd2c85f6ae
evp/e_aes.c: harmonize with 1.0.1.
2014-02-27 17:47:23 +01:00
Andy Polyakov
41977c2e04
Configure: mark unixware target as elf-1.
...
(cherry picked from commit 4ca026560a )
2014-02-27 14:32:46 +01:00
Andy Polyakov
ca88a1d439
perlasm/x86asm.pl: recognize elf-1 denoting old ELF platforms.
...
(cherry picked from commit b62a4a1c0e )
2014-02-27 14:30:42 +01:00
Andy Polyakov
5615196f7b
perlasm/x86gas.pl: limit special OPENSSL_ia32cap_P treatment to ELF.
...
(cherry picked from commit ce876d8316 )
2014-02-27 14:29:07 +01:00
Andy Polyakov
1f59eb5f11
rc4/asm/rc4-586.pl: allow for 386-only build.
...
(cherry picked from commit f861b1d433 )
2014-02-27 14:28:54 +01:00
Andy Polyakov
4bf6d66e67
des/asm/des-586.pl: shortcut reference to DES_SPtrans.
...
(cherry picked from commit fd361a67ef )
2014-02-27 14:28:44 +01:00
Andy Polyakov
2f34088e5e
Makefile.org: mask touch's exit code
...
[but don't let it mask make's].
PR: 3269
2014-02-27 12:35:02 +01:00
Andy Polyakov
559e69f9b4
crypto/Makefile: make it OSF-make-friendly
...
PR: 3165
2014-02-26 16:42:57 +01:00
Rob Stradling
f3b7e522d8
CABForum EV OIDs for Subject Jurisdiction of Incorporation or Registration.
...
(cherry picked from commit ffcc832ba6e17859d45779eea87e38467561dd5d)
2014-02-26 15:33:10 +00:00
Dr. Stephen Henson
73be56a21d
Fix for WIN32 builds with KRB5
2014-02-26 15:33:10 +00:00
Andy Polyakov
d00ae7cf70
sha/asm/sha256-586.pl: don't try to compile SIMD with no-sse2.
...
(cherry picked from commit d49135e7ea )
2014-02-26 10:23:56 +01:00
Andy Polyakov
f92926e331
sha/asm/sha512-x86_64.pl: fix compilation error on Solaris.
...
(cherry picked from commit 147cca8f53 )
2014-02-26 09:31:40 +01:00
Andy Polyakov
241c8004ce
Configure: blended processor target in solaris-x86-cc.
...
(cherry picked from commit 7bb9d84e35 )
2014-02-26 09:31:26 +01:00
Andy Polyakov
8d08627c94
ssl/t1_enc.c: check EVP_MD_CTX_copy return value.
...
PR: 3201
(cherry picked from commit 03da57fe14 )
2014-02-25 22:23:49 +01:00
Andy Polyakov
aa1bb606f3
aes/asm/vpaes-ppc.pl: fix traceback info.
...
(cherry picked from commit e704741bf3 )
2014-02-25 20:13:41 +01:00
Zoltan Arpadffy
dabd4f1986
OpenVMS fixes.
2014-02-25 15:16:03 +00:00
Dr. Stephen Henson
251c47001b
update NEWS with v3_scts.c issue
2014-02-25 15:08:45 +00:00
Dr. Stephen Henson
3678161d71
Don't use BN_ULLONG in n2l8 use SCTS_TIMESTAMP.
2014-02-25 15:05:08 +00:00
Dr. Stephen Henson
6634416732
Fix for v3_scts.c
...
Not all platforms define BN_ULLONG. Define SCTS_TIMESTAMP as a type
which should work on all platforms.
2014-02-25 14:54:09 +00:00
Dr. Stephen Henson
7101fd705c
update NEWS
2014-02-25 13:56:40 +00:00
Dr. Stephen Henson
0f9bcf3319
Avoid Windows 8 Getversion deprecated errors.
...
Windows 8 SDKs complain that GetVersion() is deprecated.
We only use GetVersion like this:
(GetVersion() < 0x80000000)
which checks if the Windows version is NT based. Use a macro check_winnt()
which uses GetVersion() on older SDK versions and true otherwise.
(cherry picked from commit a4cc3c8041 )
2014-02-25 13:41:53 +00:00
Rob Stradling
a948732e1c
Parse non-v1 SCTs less awkwardly.
...
(cherry picked from commit 19f65ddbab )
2014-02-25 13:04:21 +00:00
Andy Polyakov
c3006e0f5a
util/pl/VC-32.pl: harmonize with 1.0.1 and fix typo.
2014-02-25 13:41:40 +01:00
Andy Polyakov
efe835eb5a
ms/do_win64a.bat: forward to NUL, not NUL:.
...
Allegedly formwarding to NUL: sometimes creates NUL file in file
system.
PR: 3250
(cherry picked from commit 63aff3001e )
2014-02-24 19:37:48 +01:00
Dr. Stephen Henson
ab03ead035
we need /MD for fips builds
2014-02-24 18:21:35 +00:00
Dr. Stephen Henson
6a6e08960e
Update NEWS with known issue.
2014-02-24 16:31:44 +00:00
Andy Polyakov
aedabeee3a
BC-32.pl: refresh Borland C support.
...
PR: 3251
Suggested by: Thorsten Schning
(cherry picked from commit 779c51c644 )
2014-02-24 16:45:15 +01:00
Andy Polyakov
83fe7b9c83
x509/by_dir.c: fix run-away pointer (and potential SEGV)
...
when adding duplicates in add_cert_dir.
PR: 3261
Reported by: Marian Done
(cherry picked from commit 758954e0d8 )
2014-02-24 15:21:37 +01:00
Dr. Stephen Henson
97654d7e28
Prepare for 1.0.2-beta2-dev
2014-02-24 13:52:51 +00:00
Dr. Stephen Henson
94f4166017
Prepare for 1.0.2-beta1 release
2014-02-24 13:51:34 +00:00
Dr. Stephen Henson
a74c9c9e10
OpenSSL 1.0.2 is now in beta
2014-02-24 13:50:38 +00:00
Dr. Stephen Henson
d2a3c4497f
make update
2014-02-24 13:50:38 +00:00
Andy Polyakov
a129850922
config: recognize ARMv8/AArch64 target.
...
(cherry picked from commit d099f0ed6c )
2014-02-24 13:21:14 +01:00
Dr. Stephen Henson
c3f5d3d93a
Only set current certificate to valid values.
...
When setting the current certificate check that it has a corresponding
private key.
(cherry picked from commit 358d352aa2 )
2014-02-23 13:49:21 +00:00
Dr. Stephen Henson
c5ea65b157
New chain building flags.
...
New flags to build certificate chains. The can be used to rearrange
the chain so all an application needs to do is add all certificates
in arbitrary order and then build the chain to check and correct them.
Add verify error code when building chain.
Update docs.
(cherry picked from commit 13dc3ce9ab )
2014-02-23 13:49:21 +00:00
Dr. Stephen Henson
58b86e4235
Option to set current cert to server certificate.
...
(cherry picked from commit daddd9a950 )
2014-02-23 13:49:21 +00:00
Ben Laurie
a466be6243
Fix typo.
2014-02-23 11:21:39 +00:00
Ben Laurie
60327ce41a
Add debug flag.
2014-02-23 11:21:28 +00:00
Andy Polyakov
2d4d9623da
aes/asm/aesni-x86[_64].pl: minor Atom-specific performance tweak.
...
(cherry picked from commit 214368ffee )
2014-02-21 12:15:07 +01:00
Andy Polyakov
6b3b6beaa1
ssl/ssl_cert.c: DANE update.
2014-02-21 12:12:25 +01:00
Dr. Stephen Henson
7743be3aac
make update
2014-02-20 22:57:24 +00:00
Dr. Stephen Henson
b709f8ef54
fix WIN32 warnings
2014-02-20 22:41:06 +00:00
Rob Stradling
c74ce24cd2
Show the contents of the RFC6962 Signed Certificate Timestamp List Certificate/OCSP Extensions.
...
Add the RFC6962 OIDs to the objects table.
(backport from master branch)
2014-02-20 21:43:54 +00:00
Dr. Stephen Henson
612566e752
Don't use CRYPTO_AES_CTR if it isn't defined.
...
(cherry picked from commit 6ecbc2bb62 )
2014-02-18 22:21:41 +00:00
Dr. Stephen Henson
3ecce3dbeb
Don't use getcwd in non-copy builds.
...
(cherry picked from commit f3a3903260 )
2014-02-15 20:17:59 +00:00
Dr. Stephen Henson
71eca86c30
Don't override $srcd for non copy builds.
2014-02-15 20:16:13 +00:00
Dr. Stephen Henson
dd1e3bd8d4
recognise multiblock
2014-02-15 18:19:35 +00:00
Dr. Stephen Henson
c55fef76f7
Add /fixed flag for FIPS links where appropriate.
2014-02-15 17:16:19 +00:00
Dr. Stephen Henson
eb70d4407f
Remove duplicate statement.
...
(cherry picked from commit 5a7652c3e5 )
2014-02-15 01:29:24 +00:00
Klaus-Peter Junghanns
b335b5440a
Add support for aes-128/192/256-ctr to the cryptodev engine.
...
This can be used to speed up SRTP with libsrtp, e.g. on TI omap/sitara based devices.
(cherry picked from commit be2c4d9bd9 )
2014-02-15 00:06:43 +00:00
Kurt Roeckx
a8eeedb603
Use defaults bits in req when not given
...
If you use "-newkey rsa" it's supposed to read the default number of bits from the
config file. However the value isn't used to generate the key, but it does
print it's generating such a key. The set_keygen_ctx() doesn't call
EVP_PKEY_CTX_set_rsa_keygen_bits() and you end up with the default set in
pkey_rsa_init() (1024). Afterwards the number of bits gets read from the config
file, but nothing is done with that anymore.
We now read the config first and use the value from the config file when no size
is given.
PR: 2592
(cherry picked from commit 3343220327 )
2014-02-14 22:35:15 +00:00
Kurt Roeckx
b3d8de7903
Fix additional pod errors with numbered items.
...
(cherry picked from commit e547c45f1c )
2014-02-14 22:35:15 +00:00
Scott Schaefer
0413ea5801
Fix various spelling errors
...
(cherry picked from commit 2b4ffc659e )
2014-02-14 22:35:15 +00:00
Scott Schaefer
2f6fba6772
Document pkcs12 -password behavior
...
apps/pkcs12.c accepts -password as an argument. The document author
almost certainly meant to write "-password, -passin".
However, that is not correct, either. Actually the code treats
-password as equivalent to -passin, EXCEPT when -export is also
specified, in which case -password as equivalent to -passout.
(cherry picked from commit 856c6dfb09 )
2014-02-14 22:35:15 +00:00
Dr. Stephen Henson
d69acceca9
Fix error discrepancy with 1.0.1
2014-02-14 17:50:20 +00:00
Andy Polyakov
aff78bb39a
ssl/s3_pkt.c: detect RAND_bytes error in multi-block.
...
(cherry picked from commit 701134320a )
2014-02-14 17:45:33 +01:00
Andy Polyakov
104c032b7b
x86[_64]cpuid.pl: add low-level RDSEED.
...
(cherry picked from commit f4d456408d )
2014-02-14 17:25:14 +01:00
Andy Polyakov
b347341c75
aes/asm/aesni-x86_64.pl: further optimization for Atom Silvermont.
...
Improve CBC decrypt and CTR by ~13/16%, which adds up to ~25/33%
improvement over "pre-Silvermont" version. [Add performance table to
aesni-x86.pl].
(cherry picked from commit 5599c7331b )
2014-02-14 17:17:39 +01:00
Dr. Stephen Henson
c00f8d697a
Include self-signed flag in certificates by checking SKID/AKID as well
...
as issuer and subject names. Although this is an incompatible change
it should have little impact in pratice because self-issued certificates
that are not self-signed are rarely encountered.
(cherry picked from commit b1efb7161f )
2014-02-14 15:27:30 +00:00
Dr. Stephen Henson
b07e4f2f46
Include TA in checks/callback with partial chains.
...
When a chain is complete and ends in a trusted root checks are also
performed on the TA and the callback notified with ok==1. For
consistency do the same for chains where the TA is not self signed.
(cherry picked from commit 385b348666 )
2014-02-14 15:12:53 +00:00
Dr. Stephen Henson
ced6dc5cef
Add cert_self_signed function to simplify verify
...
(from master)
2014-02-14 15:12:52 +00:00
Dr. Stephen Henson
bf2d129194
Simplify X509_STORE_CTX_get1_chain (from master).
2014-02-14 15:12:52 +00:00
Andy Polyakov
d59d0b7c21
ssl/ssl[3].h: retain binary compatibility.
2014-02-13 17:03:14 +01:00
Andy Polyakov
dbd512e1b7
Configure: restore binary compatibility in darwin64-x86_64-cc.
...
(and remove duplicates).
2014-02-13 15:23:36 +01:00
Andy Polyakov
fcc6f699e3
evp/e_aes_cbc_hmac_sha*.c: improve cache locality.
...
(cherry picked from commit 9587429fa0 )
2014-02-13 14:41:10 +01:00
Andy Polyakov
7078d93307
ghash-x86[_64].pl: ~15% improvement on Atom Silvermont
...
(other processors unaffected).
(cherry picked from commit 98e143f118 )
2014-02-13 14:38:59 +01:00
Dr. Stephen Henson
a2317c3ffd
fix error discrepancy
2014-02-09 21:12:12 +00:00
Dr. Stephen Henson
75917fac8e
Make upate.
...
Revert libssl ordinals to OpenSSL 1.0.1 values first to tidy up and
avoid entries for deleted functions.
2014-02-09 19:59:54 +00:00
Dr. Stephen Henson
295fd057ce
fix error number clash
2014-02-09 19:57:27 +00:00
Ben Laurie
8c4e09f74f
Whitespace fixes.
2014-02-09 19:31:07 +00:00
Ben Laurie
e32cbae224
Merge branch '102_stable_tlsext_suppdata_changes' of git://github.com/scottdeboy/openssl into scottdeboy-102_stable_tlsext_suppdata_changes
2014-02-09 19:17:42 +00:00
Scott Deboy
f6fd8db2a4
Restore copyright symbol - ISO-8859-1 encoding for Configure file
2014-02-09 08:26:04 -08:00
Ben Laurie
d65db21976
Const fix.
2014-02-09 08:07:16 -08:00
Ben Laurie
8acf1ff4b4
More cleanup.
...
(cherry picked from commit 5eda213ebe )
Conflicts:
apps/s_client.c
apps/s_server.c
2014-02-09 08:07:04 -08:00
Ben Laurie
8b41df41c2
Make it build.
...
(cherry picked from commit a6a48e87bc )
Conflicts:
ssl/s3_clnt.c
ssl/t1_lib.c
2014-02-09 08:02:40 -08:00
Scott Deboy
c32ebefaa8
Reverting 1.0.2-only changes supporting the prior authz RFC5878-based tests from commit 835d104f46
2014-02-09 07:49:44 -08:00
Ben Laurie
ed0dc93d89
Add new asm modules.
2014-02-09 12:18:16 +00:00
Scott Deboy
5a32dd8930
Don't break out of the custom extension callback loop - continue instead
...
The contract for custom extension callbacks has changed - all custom extension callbacks are triggered
2014-02-08 16:19:30 -08:00
Ben Laurie
130ebe34c8
Fix whitespace, new-style comments.
2014-02-08 16:19:30 -08:00
Scott Deboy
7612511b3b
Re-add alert variables removed during rebase
...
Whitespace fixes
(cherry picked from commit e9add063b5 )
Conflicts:
ssl/s3_clnt.c
2014-02-08 16:19:01 -08:00
Scott Deboy
19a28a8aa3
Updating DTCP authorization type to expected value
2014-02-08 16:18:11 -08:00
Scott Deboy
fc213217e8
Update custom TLS extension and supplemental data 'generate' callbacks to support sending an alert.
...
If multiple TLS extensions are expected but not received, the TLS extension and supplemental data 'generate' callbacks are the only chance for the receive-side to trigger a specific TLS alert during the handshake.
Removed logic which no-op'd TLS extension generate callbacks (as the generate callbacks need to always be called in order to trigger alerts), and updated the serverinfo-specific custom TLS extension callbacks to track which custom TLS extensions were received by the client, where no-ops for 'generate' callbacks are appropriate.
(cherry picked from commit ac20719d99 )
Conflicts:
ssl/t1_lib.c
2014-02-08 16:17:24 -08:00
Trevor Perrin
7198c5af1f
Redo deletion of some serverinfo code that supplemental data code mistakenly reinstated.
2014-02-08 16:15:10 -08:00
Scott Deboy
40632f6b77
Free generated supp data after handshake completion, add comment regarding use of num_renegotiations in TLS and supp data generation callbacks
...
(cherry picked from commit 67c408cee9 )
Conflicts:
apps/s_client.c
apps/s_server.c
2014-02-08 16:14:23 -08:00
Scott Deboy
038bec784e
Add callbacks supporting generation and retrieval of supplemental data entries, facilitating RFC 5878 (TLS auth extensions)
...
Removed prior audit proof logic - audit proof support was implemented using the generic TLS extension API
Tests exercising the new supplemental data registration and callback api can be found in ssltest.c.
Implemented changes to s_server and s_client to exercise supplemental data callbacks via the -auth argument, as well as additional flags to exercise supplemental data being sent only during renegotiation.
(cherry picked from commit 36086186a9 )
Conflicts:
Configure
apps/s_client.c
apps/s_server.c
ssl/ssl.h
ssl/ssl3.h
ssl/ssltest.c
2014-02-08 16:12:15 -08:00
Dr. Stephen Henson
f407eec799
make update
2014-02-06 14:31:09 +00:00
Dr. Stephen Henson
bd618bebbe
update default depflags
2014-02-06 14:28:49 +00:00
Andy Polyakov
e2884b3e9a
Configure: recognize experimental-multiblock.
...
(cherry picked from commit 2d752737c5 )
2014-02-06 14:26:01 +00:00
Dr. Stephen Henson
c41e242e5c
Return previous compression methods when setting them.
...
(cherry picked from commit b45e874d7c )
2014-02-06 13:58:18 +00:00
Andy Polyakov
9578319394
ssl/s3_pkt.c: add multi-block processing [from master].
2014-02-05 21:43:17 +01:00
Andy Polyakov
16eaca2c79
config: recognize little-endian Linux PPC64.
2014-02-05 20:36:11 +01:00
Dr. Stephen Henson
3bff195dca
Oops, get selection logic right.
...
(cherry picked from commit 3880579240d476d21f68fd01a391dd325920f479)
2014-02-05 18:57:23 +00:00
Andy Polyakov
41cf2d2518
evp/e_aes_cbc_hmac_sha[1|256].c: add multi-block implementations [from master].
2014-02-05 19:52:38 +01:00
Dr. Stephen Henson
e0d4272a58
Return per-certificate chain if extra chain is NULL.
...
If an application calls the macro SSL_CTX_get_extra_chain_certs
return either the old "shared" extra certificates or those associated
with the current certificate.
This means applications which call SSL_CTX_use_certificate_chain_file
and retrieve the additional chain using SSL_CTX_get_extra_chain_certs
will still work. An application which only wants to check the shared
extra certificates can call the new macro
SSL_CTX_get_extra_chain_certs_only
(cherry picked from commit a51f767645 )
2014-02-05 17:06:56 +00:00
Andy Polyakov
41c373fa3e
[aesni|sha*]-mb-x86_64.pl: add multi-block assembly modules [from master].
2014-02-05 14:33:44 +01:00
Dr. Stephen Henson
7f6e09b531
Add quotes as CC can contain spaces.
...
PR#3253
2014-02-03 14:13:04 +00:00
Dr. Stephen Henson
e2f06800bc
New ctrl to set current certificate.
...
New ctrl sets current certificate based on certain criteria. Currently
two options: set the first valid certificate as current and set the
next valid certificate as current. Using these an application can
iterate over all certificates in an SSL_CTX or SSL structure.
(cherry picked from commit 0f78819c8c )
2014-02-02 23:12:06 +00:00
Dr. Stephen Henson
1180833643
Fix various typos.
...
(cherry picked from commit f3efeaad54 )
2014-02-02 23:12:06 +00:00
Dr. Stephen Henson
130eed01cc
Update demo.
...
(cherry picked from commit 88c21c47a3 )
2014-02-02 23:06:16 +00:00
Dr. Stephen Henson
2ded87355f
Update demos/bio/README
...
(cherry picked from commit ea131a0644 )
2014-02-02 23:05:52 +00:00
Dr. Stephen Henson
b1ae02e2ff
Modify sample accept.cnf
...
(cherry picked from commit d80b0eeee5 )
2014-02-02 23:05:34 +00:00
Dr. Stephen Henson
381417089a
Add demo for SSL server using SSL_CONF.
...
(cherry picked from commit ebd14bfce9 )
2014-02-02 23:05:15 +00:00
Ben Laurie
984a30423d
Add extension free function.
2014-02-02 15:22:47 +00:00
Andy Polyakov
2ad673c611
engines/e_capi.c: TCHAR support (cumilative update from master).
2014-02-02 00:17:38 +01:00
Andy Polyakov
0693dd954e
modes/asm/ghash-s390x.pl: +15% performance improvement on z10.
...
(cherry picked from commit d162584b11 )
2014-02-02 00:10:41 +01:00
Andy Polyakov
9071b36d9a
Add AES-NI+SHA256 stitch registrations (from master).
2014-02-02 00:05:02 +01:00
Andy Polyakov
eb6af20d2e
dso/dso_win32.c: fix compiler warning.
...
(cherry picked from commit 0a2d5003df )
2014-02-01 23:32:19 +01:00
Andy Polyakov
8087969c5b
crypto/cryptlib.c: remove stdio dependency (update from master).
2014-02-01 23:27:49 +01:00
Andy Polyakov
cb437c66d1
camellia/asm/cmll-x86_64.pl: fix symptomless bugs (update from master).
2014-02-01 23:14:33 +01:00
Ben Laurie
40b0d0765e
Remove redundant accessor (you can do the same thing, and more, with
...
X509_ALGOR_[gs]et0()).
2014-02-01 22:03:40 +00:00
Andy Polyakov
41235f30fb
util/pl/VC-32.pl fix typo.
...
(cherry picked from commit fb0a520897 )
2014-02-01 22:55:25 +01:00
Andy Polyakov
130c15ef5a
util/pl/VC-32.pl: refresh, switch to ws2, add crypt32, fix typo (based on
...
suggestions from Pierre Delaage).
(cherry picked from commit 668bcfd5ca )
Resolved conflicts:
util/pl/VC-32.pl
2014-02-01 22:53:24 +01:00
Andy Polyakov
2cc5142fb1
Improve WINCE support.
...
Submitted by: Pierre Delaage
(cherry picked from commit a006fef78e )
Resolved conflicts:
crypto/bio/bss_dgram.c
ssl/d1_lib.c
util/pl/VC-32.pl
2014-02-01 22:48:56 +01:00
Andy Polyakov
d451ece4e7
b_sock.c: make getsockopt work in cases when optlen is 64-bit value.
...
(cherry picked from commit 80c42f3e0c )
2014-02-01 22:33:02 +01:00
Andy Polyakov
1121ba1b74
wp-mmx.pl: ~10% performance improvement.
...
(cherry picked from commit ae007d4d09 )
2014-02-01 22:27:07 +01:00
Andy Polyakov
1fb039fde2
wp-x86_64.pl: ~10% performance improvement.
...
(cherry picked from commit 701d593f70 )
2014-02-01 22:26:45 +01:00
Andy Polyakov
3073927e42
sha512-ia64.pl: 15-20% performance improvement.
...
(cherry picked from commit 46a2b3387a )
2014-02-01 22:21:57 +01:00
Andy Polyakov
b6c2029931
objxref.pl: improve portability.
...
(cherry picked from commit 71fa3bc5ec )
2014-02-01 22:17:36 +01:00
Adam Langley
45d010255f
Add volatile qualifications to two blocks of inline asm to stop GCC from
...
eliminating them as dead code.
Both volatile and "memory" are used because of some concern that the compiler
may still cache values across the asm block without it, and because this was
such a painful debugging session that I wanted to ensure that it's never
repeated.
(cherry picked from commit 7753a3a684 )
2014-02-01 22:01:46 +01:00
Andy Polyakov
7e569022c5
PPC assembly pack: ppc64-mont update from master.
2014-02-01 21:51:51 +01:00
Andy Polyakov
50f1b47c7f
PPC assembly pack: jumbo update from master.
...
Add Vector Permutation AES and little-endian support.
2014-02-01 21:48:31 +01:00
Andy Polyakov
5572bc4e2f
crypto/aes/asm/aesni-x86[_64].pl: jumbo update from master.
2014-02-01 21:27:46 +01:00
Andy Polyakov
729d334106
crypto/sha/asm/sha1-x86_64.pl: jumbo update from master.
2014-02-01 21:24:55 +01:00
Ben Laurie
cacdfcb247
Add more accessors.
2014-02-01 18:30:23 +00:00
Ben Laurie
519ad9b384
Add accessor for x509.cert_info.
2014-02-01 18:30:23 +00:00
Ben Laurie
7b2d785d20
Fix warning.
2014-01-29 17:57:32 +01:00
Dr. Stephen Henson
f2d678e6e8
Clarify docs.
...
Remove reference to ERR_TXT_MALLOCED in the error library as that is
only used internally. Indicate that returned error data must not be
freed.
2014-01-29 00:59:35 +00:00
Dr. Stephen Henson
448e9b7cf1
typo
...
(cherry picked from commit cb2182676b )
2014-01-28 15:36:15 +00:00
Dr. Stephen Henson
2c4c9867e7
Fix demo comment: 0.9.9 never released.
...
(cherry picked from commit 717cc85895 )
2014-01-28 15:17:32 +00:00
Dr. Stephen Henson
a99540a6de
Check i before r[i].
...
PR#3244
(cherry picked from commit 9614d2c676 )
2014-01-28 15:14:47 +00:00
Dr. Stephen Henson
9614ed695d
Add loaded dynamic ENGINEs to list.
...
Always add a dynamically loaded ENGINE to list. Otherwise it can cause
problems when multiply loaded, especially if it adds new public key methods.
For all current engines we only want a single implementation anyway.
(cherry picked from commit e933f91f50 )
2014-01-28 13:57:14 +00:00
Dr. Stephen Henson
aabfee601e
Certificate callback doc.
...
(cherry picked from commit 46ab9bbd7f )
2014-01-28 13:38:55 +00:00
Dr. Stephen Henson
cee1d9e02f
make update
2014-01-27 14:59:46 +00:00
Dr. Stephen Henson
285f7fb0f9
Add cert callback retry test.
...
(cherry picked from commit 3323314fc1 )
2014-01-27 14:41:38 +00:00
Dr. Stephen Henson
ede90b1121
Support retries in certificate callback
...
(cherry picked from commit 0ebc965b9c )
Conflicts:
ssl/s3_srvr.c
ssl/ssl3.h
2014-01-27 14:41:38 +00:00
Dr. Stephen Henson
5e7329d156
Compare encodings in X509_cmp as well as hash.
...
(cherry picked from commit ec492c8a5a )
2014-01-27 14:33:10 +00:00
Dr. Stephen Henson
9f1979b94a
New function to set compression methods so they can be safely freed.
...
(cherry picked from commit cbb6744827 )
2014-01-27 14:32:44 +00:00
Dr. Stephen Henson
3fcf327e26
Add -engine_impl option to dgst which will use an implementation of
...
an algorithm from the supplied engine instead of just the default one.
(cherry picked from commit bb845ee044 )
2014-01-23 18:35:42 +00:00
Dr. Stephen Henson
3f4742b48c
make update
2014-01-23 17:13:37 +00:00
Dr. Stephen Henson
c4f01c533b
Add new function SSL_CTX_get_ssl_method().
...
Partial fix for PR#3183.
(cherry picked from commit ba168244a1 )
2014-01-16 14:08:42 +00:00
Kaspar Brand
b7a8550988
Omit initial status request callback check.
...
PR#3178
(cherry picked from commit d0b039d4a3 )
2014-01-16 13:48:23 +00:00
Zoltan Arpadffy
e775891708
VMS fixes
2014-01-11 22:44:04 +00:00
Jeff Trawick
ae6fbb5df0
typo
...
(cherry picked from commit 5edce5685f )
2014-01-10 23:02:46 +00:00
Jeff Trawick
f9c1f03754
typo
...
(cherry picked from commit 4b64e0cbdb )
2014-01-10 23:02:20 +00:00
Dr. Stephen Henson
50701af9d5
Fix bug in X509_V_FLAG_IGNORE_CRITICAL CRL handling.
...
(cherry picked from commit 8f4077ca69 )
2014-01-09 22:53:50 +00:00
Dr. Stephen Henson
1d6af3d430
update NEWS
2014-01-09 22:50:07 +00:00
Andy Polyakov
392fd8f89c
bn/asm/x86_64-mont5.pl: fix compilation error on Solaris.
...
(cherry picked from commit eedab5241e )
2014-01-09 13:47:53 +01:00
Dr. Stephen Henson
802db0fab2
Sync CHANGES
2014-01-07 15:41:11 +00:00
Dr. Stephen Henson
2f972419a3
Add fix for CVE-2013-4353
2014-01-07 15:41:11 +00:00
Dr. Stephen Henson
a05a2c67ef
Update NEWS.
2014-01-07 15:41:04 +00:00
Andy Polyakov
e34140620e
sha/asm/sha256-armv4.pl: add NEON code path.
...
(and shave off cycle even from integer-only code)
(cherry picked from commit ad0d2579cf )
2014-01-04 18:06:36 +01:00
Andy Polyakov
acd9121085
aesni-sha1-x86_64.pl: harmonize [Atom-specific optimizations] with master branch.
2014-01-04 17:42:13 +01:00
Dr. Stephen Henson
b17d6b8d1d
Restore SSL_OP_MSIE_SSLV2_RSA_PADDING
...
The flag SSL_OP_MSIE_SSLV2_RSA_PADDING hasn't done anything since OpenSSL
0.9.7h but deleting it will break source compatibility with any software
that references it. Restore it but #define to zero.
2014-01-04 13:58:51 +00:00
Dr. Stephen Henson
b9fa413a08
Use algorithm specific chains for certificates.
...
Fix a limitation in SSL_CTX_use_certificate_chain_file(): use algorithm
specific chains instead of the shared chain.
Update docs.
(cherry picked from commit a4339ea3ba )
Conflicts:
CHANGES
2014-01-03 22:45:20 +00:00
Andy Polyakov
4abe148444
ssl/t1_enc.c: optimize PRF (suggested by Intel).
...
(cherry picked from commit e8b0dd57c0 )
2014-01-03 21:56:03 +01:00
Dr. Stephen Henson
04d6940436
update NEWS
2014-01-02 19:12:47 +00:00
Dr. Stephen Henson
8511b5f594
Don't change version number if session established
...
When sending an invalid version number alert don't change the
version number to the client version if a session is already
established.
Thanks to Marek Majkowski for additional analysis of this issue.
PR#3191
(cherry picked from commit b77b58a398 )
2014-01-02 15:07:51 +00:00
Dr. Stephen Henson
546d6760b9
Update curve list size.
2013-12-29 16:30:34 +00:00
Andy Polyakov
ccbb8d5e95
sparcv9cap.c: omit random detection.
...
PR: 3202
(cherry picked from commit 926725b3d7 )
2013-12-28 13:32:45 +01:00
Andy Polyakov
d7d7e7b038
ARM assembly pack: make it work with older toolchain.
...
(cherry picked from commit 2218c296b4 )
2013-12-28 12:18:11 +01:00
Dr. Stephen Henson
80b6d97585
Fix DTLS retransmission from previous session.
...
For DTLS we might need to retransmit messages from the previous session
so keep a copy of write context in DTLS retransmission buffers instead
of replacing it after sending CCS. CVE-2013-6450.
(cherry picked from commit 34628967f1 )
2013-12-20 23:25:41 +00:00
Dr. Stephen Henson
ff64ab32ae
Ignore NULL parameter in EVP_MD_CTX_destroy.
...
(cherry picked from commit a6c62f0c25 )
2013-12-20 23:24:26 +00:00
Andy Polyakov
fc9c9e47f7
sha1-x86_64.pl: harmonize Win64 SE handlers for SIMD code pathes.
...
(and ensure stack alignment in the process)
(cherry picked from commit fc0503a25c )
2013-12-18 22:57:14 +01:00
Andy Polyakov
68e6ac4379
evp/e_[aes|camellia].c: fix typo in CBC subroutine.
...
It worked because it was never called.
(cherry picked from commit e9c80e04c1 )
2013-12-18 22:56:24 +01:00
Andy Polyakov
e34b7e99fd
sha512.c: fullfull implicit API contract in SHA512_Transform.
...
SHA512_Transform was initially added rather as tribute to tradition
than for practucal reasons. But use was recently found in ssl/s3_cbc.c
and it turned to be problematic on platforms that don't tolerate
misasligned references to memory and lack assembly subroutine.
(cherry picked from commit cdd1acd788 )
2013-12-18 22:56:00 +01:00
Dr. Stephen Henson
a32ba49352
Check EVP errors for handshake digests.
...
Partial mitigation of PR#3200
(cherry picked from commit 0294b2be5f )
2013-12-18 13:27:15 +00:00
Dr. Stephen Henson
3a0c71541b
verify parameter enumeration functions
...
(cherry picked from commit 9b3d75706e )
Conflicts:
crypto/x509/x509_vpm.c
2013-12-13 15:52:27 +00:00
Dr. Stephen Henson
adc6bd73e3
Add opaque ID structure.
...
Move the IP, email and host checking fields from the public
X509_VERIFY_PARAM structure into an opaque X509_VERIFY_PARAM_ID
structure. By doing this the structure can be modified in future
without risk of breaking any applications.
2013-12-13 15:36:31 +00:00
Dr. Stephen Henson
8c6d8c2a49
Backport TLS padding extension from master.
2013-12-13 15:29:26 +00:00
Dr. Stephen Henson
53a8f8c26d
Fix for partial chain notification.
...
For consistency with other cases if we are performing
partial chain verification with just one certificate
notify the callback with ok==1.
2013-12-13 15:29:26 +00:00
Dr. Stephen Henson
bf4863b3f5
Verify parameter retrieval functions.
...
New functions to retrieve internal pointers to X509_VERIFY_PARAM
for SSL_CTX and SSL structures.
2013-12-13 15:29:26 +00:00
Dr. Stephen Henson
8f68678989
Don't use rdrand engine as default unless explicitly requested.
2013-12-13 15:29:26 +00:00
Dr. Stephen Henson
57c4e42d75
Get FIPS checking logic right.
...
We need to lock when *not* in FIPS mode.
2013-12-10 12:52:27 +00:00
Dr. Stephen Henson
ff672cf8dd
remove obsolete STATUS file
2013-12-10 00:10:41 +00:00
Dr. Stephen Henson
d43b040773
Add release dates to NEWS
2013-12-10 00:08:33 +00:00
Andy Polyakov
422c8c36e5
ARM assembly pack: SHA update from master.
2013-12-09 23:53:42 +01:00
Andy Polyakov
b76310ba74
ARM assembly pack: AES update from master (including bit-sliced module).
2013-12-09 23:44:45 +01:00
Andy Polyakov
c012f6e576
bn/asm/armv4-mont.pl: add NEON code path.
...
(cherry picked from commit d1671f4f1a )
2013-12-09 22:46:29 +01:00
Andy Polyakov
cf6d55961c
crypto/bn/asm/x86_64-mont*.pl: update from master.
...
Add MULX/AD*X code paths and optimize even original code path.
2013-12-09 22:40:53 +01:00
Andy Polyakov
3aa1b1ccbb
x86_64-xlate.pl: fix jrcxz in nasm case.
...
(cherry picked from commit 667053a2f3 )
2013-12-09 22:19:34 +01:00
Andy Polyakov
3dcae82fa9
x86_64-xlate.pl: minor update.
...
(cherry picked from commit 41965a84c4 )
2013-12-09 21:53:41 +01:00
Dr. Stephen Henson
86b81ecb73
update $default_depflags
2013-12-08 13:21:02 +00:00
Dr. Stephen Henson
c43dc3dd77
Avoid multiple locks in FIPS mode.
...
PR: 3176.
In FIPS mode ssleay_rand_bytes is only used for PRNG seeding and is
performed in either a single threaded context (when the PRNG is first
initialised) or under a lock (reseeding). To avoid multiple locks disable
use of CRYPTO_LOCK_RAND in FIPS mode in ssleay_rand_bytes.
2013-12-08 13:21:02 +00:00
Andy Polyakov
e5eab8a199
bn/asm/x86_64-mont5.pl: comply with Win64 ABI.
...
PR: 3189
Submitted by: Oscar Ciurana
(cherry picked from commit c5d5f5bd0f )
2013-12-04 00:02:18 +01:00
Andy Polyakov
7bab6eb6f0
crypto/bn/asm/rsaz-x86_64.pl: make it work on Win64.
...
(cherry picked from commit 8bd7ca9996 )
2013-12-03 22:30:00 +01:00
Andy Polyakov
87d9526d0c
crypto/bn/rsaz*: fix licensing note.
...
rsaz_exp.c: harmonize line terminating;
asm/rsaz-*.pl: minor optimizations.
asm/rsaz-x86_64.pl: sync from master.
(cherry picked from commit 31ed9a2131 )
2013-12-03 22:17:55 +01:00
Andy Polyakov
36982f056a
bn/asm/rsaz-x86_64.pl: fix prototype.
...
(cherry picked from commit 6efef384c6 )
2013-12-03 09:44:24 +01:00
Dr. Stephen Henson
c97ec5631b
Fix warning.
2013-12-01 23:30:21 +00:00
Dr. Stephen Henson
fdb0d5dd8f
Change header order to pick up OPENSSL_SYS_WIN32
2013-12-01 23:29:40 +00:00
Dr. Stephen Henson
81b6dfe40d
Recongnise no-dane and no-libunbound
2013-12-01 23:12:27 +00:00
Dr. Stephen Henson
bc35b8e435
make update
2013-12-01 23:09:44 +00:00
Dr. Stephen Henson
6859f3fc12
Fix warnings.
2013-12-01 23:08:13 +00:00
Dr. Stephen Henson
8b2d5cc4a7
WIN32 fixes.
2013-12-01 23:07:18 +00:00
Dr. Stephen Henson
74184b6f21
RSAX no longer compiled.
2013-12-01 23:06:33 +00:00
Dr. Stephen Henson
6416aed586
Simplify and update openssl.spec
2013-11-27 15:35:02 +00:00
Dr. Stephen Henson
2a1b7bd380
New functions to retrieve certificate from SSL_CTX
...
New functions to retrieve current certificate or private key
from an SSL_CTX.
Constify SSL_get_private_key().
(cherry picked from commit a25f9adc77 )
2013-11-18 18:59:18 +00:00
Dr. Stephen Henson
4bba0bda61
Don't define SSL_select_next_proto if OPENSSL_NO_TLSEXT set
...
(cherry picked from commit 60aeb18750 )
2013-11-18 18:59:03 +00:00
Dr. Stephen Henson
27baa8317a
Use correct header length in ssl3_send_certifcate_request
...
(cherry picked from commit fdeaf55bf9 )
2013-11-17 17:50:11 +00:00
Dr. Stephen Henson
1abfa78a8b
Constify.
2013-11-14 21:00:40 +00:00
Piotr Sikora
edc687ba0f
Fix compilation with no-nextprotoneg.
...
PR#3106
2013-11-14 01:20:58 +00:00
Dr. Stephen Henson
ff0bdbed85
Allow match selecting of current certificate.
...
If pointer comparison for current certificate fails check
to see if a match using X509_cmp succeeds for the current
certificate: this is useful for cases where the certificate
pointer is not available.
(cherry picked from commit 6856b288a6e66edd23907b7fa264f42e05ac9fc7)
2013-11-13 23:47:49 +00:00
Rob Stradling
dc4bdf592f
Additional "chain_cert" functions.
...
PR#3169
This patch, which currently applies successfully against master and
1_0_2, adds the following functions:
SSL_[CTX_]select_current_cert() - set the current certificate without
disturbing the existing structure.
SSL_[CTX_]get0_chain_certs() - get the current certificate's chain.
SSL_[CTX_]clear_chain_certs() - clear the current certificate's chain.
The patch also adds these functions to, and fixes some existing errors
in, SSL_CTX_add1_chain_cert.pod.
(cherry picked from commit 2f56c9c015dbca45379c9a725915b3b8e765a119)
2013-11-13 23:47:37 +00:00
Krzysztof Kwiatkowski
b03d0513d0
Delete duplicate entry.
...
PR#3172
(cherry picked from commit 4f055e34c3598cad00fca097d812fa3e6436d967)
2013-11-13 23:47:26 +00:00
Andy Polyakov
0de70011ad
srp/srp_grps.h: make it Compaq C-friendly.
...
PR: 3165
Submitted by: Daniel Richard G.
(cherry picked from commit 2df9ec01d5 )
2013-11-12 22:19:40 +01:00
Andy Polyakov
220d1e5353
modes/asm/ghash-alpha.pl: update from HEAD.
...
PR: 3165
2013-11-12 21:59:01 +01:00
Andy Polyakov
ca44f72938
Make Makefiles OSF-make-friendly.
...
PR: 3165
(cherry picked from commit d1cf23ac86 )
2013-11-12 21:53:39 +01:00
Dr. Stephen Henson
18f49508a5
Fix memory leak.
...
(cherry picked from commit 16bc45ba95 )
2013-11-11 23:55:18 +00:00
Dr. Stephen Henson
5c50462e1e
Typo.
2013-11-11 22:24:08 +00:00
Dr. Stephen Henson
a257865303
Fix for some platforms where "char" is unsigned.
...
(cherry picked from commit 08b433540416c5bc9a874ba0343e35ba490c65f1)
2013-11-11 22:18:07 +00:00
Andy Polyakov
60adefa610
Makefile.org: make FIPS build work with BSD make.
2013-11-10 23:06:41 +01:00
Dr. Stephen Henson
b5dde6bcc6
Check for missing components in RSA_check.
...
(cherry picked from commit 01be36ef70525e81fc358d2e559bdd0a0d9427a5)
2013-11-09 15:09:22 +00:00
Dr. Stephen Henson
024dbfd44c
Document RSAPublicKey_{in,out} options.
...
(cherry picked from commit 7040d73d22987532faa503630d6616cf2788c975)
2013-11-09 15:09:22 +00:00
Dr. Stephen Henson
233069f8db
Add CMS_SignerInfo_get0_signature function.
...
Add function to retrieve the signature from a CMS_SignerInfo structure:
applications can then read or modify it.
(cherry picked from commit e8df6cec4c09b9a94c4c07abcf0402d31ec82cc1)
2013-11-09 15:09:22 +00:00
Andy Polyakov
c76d6922b1
engines/ccgost/gost89.h: make word32 defintion unconditional.
...
Original definition depended on __LONG_MAX__ that is not guaranteed to
be present. As we don't support platforms with int narrower that 32 bits
it's appropriate to make defition inconditional.
PR: 3165
(cherry picked from commit 96180cac04 )
2013-11-08 23:10:21 +01:00
Andy Polyakov
3241496144
modes/asm/ghash-alpha.pl: make it work with older assembler.
...
PR: 3165
(cherry picked from commit d24d1d7daf )
2013-11-08 23:10:09 +01:00
Dr. Stephen Henson
63fe69c12e
Enable PSK in FIPS mode.
...
Enable PSK ciphersuites with AES or DES3 in FIPS mode.
(cherry picked from commit e0ffd129c1 )
2013-11-06 14:39:41 +00:00
Dr. Stephen Henson
a4947e4e06
Initialise context before using it.
2013-11-06 13:16:50 +00:00
Ben Laurie
262f1c524e
PBKDF2 should be efficient. Contributed by Christian Heimes
...
<christian@python.org >.
2013-11-03 17:27:12 +00:00
Dr. Stephen Henson
bd80d0229c
Add brainpool curves to trace output.
2013-11-02 14:07:21 +00:00
Dr. Stephen Henson
163d794845
Fix warning.
...
(cherry picked from commit 96e16bddb4 )
2013-11-02 14:02:00 +00:00
Dr. Stephen Henson
0b33466b3f
Add SSL_CONF command to set DH Parameters.
...
(cherry picked from commit c557f921dc )
2013-11-02 13:42:03 +00:00
Dr. Stephen Henson
bed27f4db3
Fix argument processing.
...
(cherry picked from commit abf840e4f7 )
2013-11-02 13:41:51 +00:00
Dr. Stephen Henson
738a224bd0
Constification.
...
(cherry picked from commit 27f3b65f49 )
2013-11-02 13:41:38 +00:00
Dr. Stephen Henson
044f8ca87d
Extend SSL_CONF
...
Extend SSL_CONF to return command value types.
Add certificate and key options.
Update documentation.
(cherry picked from commit ec2f7e568e )
2013-11-02 13:41:19 +00:00
Dr. Stephen Henson
45ee08d99b
Typo.
...
(cherry picked from commit 13af145159 )
2013-11-02 13:41:06 +00:00
Piotr Sikora
5ff68e8f6d
Fix SSL_OP_SINGLE_ECDH_USE
...
Don't require a public key in tls1_set_ec_id if compression status is
not needed. This fixes a bug where SSL_OP_SINGLE_ECDH_USE wouldn't work.
2013-11-01 21:37:46 +00:00
Dr. Stephen Henson
f14a4a861d
Add -ecdh_single option.
...
Add -ecdh_single option to set SSL_OP_SINGLE_ECDH_USE on the command line.
2013-11-01 21:35:00 +00:00
Robin Seggelmann
f596e3c491
DTLS/SCTP struct authchunks Bug
...
PR: 2809
DTLS/SCTP requires DATA and FORWARD-TSN chunks to be protected with
SCTP-AUTH. It is checked if this has been activated successfully for
the local and remote peer. Due to a bug, however, the
gauth_number_of_chunks field of the authchunks struct is missing on
FreeBSD, and was therefore not considered in the OpenSSL implementation.
This patch sets the corresponding pointer for the check correctly
whether or not this bug is present.
2013-10-30 14:37:22 +00:00
Robin Seggelmann
9fb523adce
DTLS/SCTP Finished Auth Bug
...
PR: 2808
With DTLS/SCTP the SCTP extension SCTP-AUTH is used to protect DATA and
FORWARD-TSN chunks. The key for this extension is derived from the
master secret and changed with the next ChangeCipherSpec, whenever a new
key has been negotiated. The following Finished then already uses the
new key. Unfortunately, the ChangeCipherSpec and Finished are part of
the same flight as the ClientKeyExchange, which is necessary for the
computation of the new secret. Hence, these messages are sent
immediately following each other, leaving the server very little time to
compute the new secret and pass it to SCTP before the finished arrives.
So the Finished is likely to be discarded by SCTP and a retransmission
becomes necessary. To prevent this issue, the Finished of the client is
still sent with the old key.
2013-10-30 14:37:22 +00:00
Ben Laurie
cecf4d98d0
Remove unused variable.
2013-10-21 03:34:00 +01:00
Nick Mathewson
070e40e2f5
Fix another gmt_unix_time case in server_random
2013-10-20 15:08:58 -07:00
Nick Mathewson
d757097bbc
Do not include a timestamp in the Client/ServerHello Random field.
...
Instead, send random bytes, unless SSL_SEND_{CLIENT,SERVER}RANDOM_MODE
is set.
This is a forward-port of commits:
4af793036f
f4c93b46ed
3da721dac9
2583270191
While the gmt_unix_time record was added in an ostensible attempt to
mitigate the dangers of a bad RNG, its presence leaks the host's view
of the current time in the clear. This minor leak can help
fingerprint TLS instances across networks and protocols... and what's
worse, it's doubtful thet the gmt_unix_time record does any good at
all for its intended purpose, since:
* It's quite possible to open two TLS connections in one second.
* If the PRNG output is prone to repeat itself, ephemeral
handshakes (and who knows what else besides) are broken.
2013-10-20 15:03:24 -07:00
Steve Marquess
7b112c2766
Remove gratuitous patent references
2013-10-20 22:19:47 +01:00
Dr. Stephen Henson
03ee8c2ed7
Fix no-ssl-trace
2013-10-20 22:07:33 +01:00
Dr. Stephen Henson
3495842bb0
Prevent use of RSA+MD5 in TLS 1.2 by default.
...
Removing RSA+MD5 from the default signature algorithm list
prevents its use by default.
If a broken implementation attempts to use RSA+MD5 anyway the sanity
checking of signature algorithms will cause a fatal alert.
(cherry picked from commit 77a0f740d00ecf8f6b01c0685a2f858c3f65a3dd)
2013-10-20 22:07:33 +01:00
Ben Laurie
face65dab8
Add clang debug target.
2013-10-20 13:23:14 +01:00
Andy Polyakov
e41a49c625
PPC assembly pack: make new .size directives profiler-friendly.
...
Suggested by: Anton Blanchard
(cherry picked from commit 76c15d790e )
2013-10-15 23:42:18 +02:00
Dr. Stephen Henson
3a55a42bff
Add brainpool curves to NID table too.
...
(cherry picked from commit 6699cb8491 )
2013-10-15 12:09:54 +01:00
Dr. Stephen Henson
72550c52ed
Fix warning.
...
(cherry picked from commit f6983769c1bcd6c3c6b6bbfbbc41848f6dccf127)
2013-10-15 11:33:58 +01:00
Dr. Stephen Henson
a9d0c56de1
Add test vectors from RFC7027
...
(cherry picked from commit 8ba2d4ed7f128e400693562efd35985068c45e4d)
2013-10-15 11:33:58 +01:00
Dr. Stephen Henson
469bcb0c24
RFC7027 (Brainpool for TLS) support.
...
(cherry picked from commit 695e8c36528f9c3275f5f56e9633ac6a0c11f2e3)
2013-10-15 11:33:58 +01:00
Andy Polyakov
43ce9cdde9
PPC assembly pack: update from master branch.
...
Includes multiple updates: AES module to comply with more ABI
flavors, SHA512 for PPC32, .size directives.
2013-10-15 00:31:45 +02:00
Andy Polyakov
011f89893c
Add support for Cygwin-x86_64.
...
PR: 3110
Submitted by Corinna Vinschen.
(cherry picked from commit b3ef742cbb )
2013-10-14 16:59:05 +02:00
Andy Polyakov
958608ca1c
Initial aarch64 bits.
...
(cherry picked from commit 039081b809 )
2013-10-13 19:24:22 +02:00
Andy Polyakov
1aecb23f5b
MIPS assembly pack: get rid of deprecated instructions.
...
Latest MIPS ISA specification declared 'branch likely' instructions
obsolete. To makes code future-proof replace them with equivalent.
(cherry picked from commit 0c2adb0a9b )
2013-10-13 13:18:21 +02:00
Andy Polyakov
9ed6fba2b4
aes/asm/bsaes-x86_64.pl: update from master.
...
Performance improvement and Windows-specific bugfix (PR#3139).
2013-10-12 21:47:54 +02:00
Andy Polyakov
df5c435c0b
bn/asm/rsax-avx2.pl: minor optimization [for Decoded ICache].
...
(cherry picked from commit fa104be35e )
2013-10-10 23:09:54 +02:00
Ben Laurie
1ebaf97c44
Constification.
2013-10-07 12:44:40 +01:00
Ben Laurie
c8c6914aac
Merge branch 'OpenSSL_1_0_2-stable' into pre-aead
2013-10-05 21:20:24 +01:00
Andy Polyakov
c99028f252
evp/e_des3.c: fix typo with potential integer overflow on 32-bit platforms.
...
Submitted by: Yuriy Kaminskiy
(cherry picked from commit 524b00c0da )
2013-10-05 21:09:50 +01:00
Andy Polyakov
90d8c5862b
perlasm/sparcv9_modes.pl: make it work even with seasoned perl.
...
PR: 3130
(cherry picked from commit 6b2cae0c16 )
2013-10-05 21:09:39 +01:00
Ben Laurie
2d5dd00f9e
Merge branch 'OpenSSL_1_0_2-stable' into agl-1.0.2aead
2013-10-04 12:59:03 +01:00
Ben Laurie
cb52183836
Tidy.
2013-10-04 12:58:08 +01:00
Ben Laurie
ab3b624b0c
Merge branch 'OpenSSL_1_0_2-stable' into agl-1.0.2aead
2013-10-04 12:48:24 +01:00
Ben Laurie
7c81de9a91
Make it build and test.
2013-10-03 19:02:58 +01:00
Andy Polyakov
4dfac659ff
evp/e_des3.c: fix typo with potential integer overflow on 32-bit platforms.
...
Submitted by: Yuriy Kaminskiy
(cherry picked from commit 524b00c0da )
2013-10-03 10:57:45 +02:00
Andy Polyakov
66e0f9db08
perlasm/sparcv9_modes.pl: make it work even with seasoned perl.
...
PR: 3130
(cherry picked from commit 6b2cae0c16 )
2013-10-03 10:45:36 +02:00
Adam Langley
a2eef41993
AEAD Tests.
...
Add tests for AEAD functions: AES-128-GCM, AES-256-GCM and
ChaCha20+Poly1305.
2013-10-01 15:34:44 -04:00
Adam Langley
9a8646510b
chacha20poly1305
...
Add support for Chacha20 + Poly1305.
2013-10-01 14:59:22 -04:00
Adam Langley
fa03d0117a
Use AEAD for AES-GCM.
...
Switches AES-GCM ciphersuites to use AEAD interfaces.
2013-10-01 13:09:12 -04:00
Adam Langley
03614034e9
AEAD support in ssl/
...
This change allows AEADs to be used in ssl/ to implement SSL/TLS
ciphersuites.
2013-10-01 12:49:50 -04:00
Adam Langley
444b1d416b
AEAD support.
...
This change adds an AEAD interface to EVP and an AES-GCM implementation
suitable for use in TLS.
2013-10-01 12:30:52 -04:00
Adam Langley
4055ca1f9e
Rework tls1_change_cipher_state.
...
The previous version of the function made adding AEAD changes very
difficult. This change should be a semantic no-op - it should be purely
a cleanup.
2013-10-01 11:31:30 -04:00
Ben Laurie
7a216dfee5
Constification.
2013-10-01 14:51:04 +01:00
Dr. Stephen Henson
a78b21fc67
Update cms docs.
...
(cherry picked from commit dfcb42c68e )
2013-10-01 14:01:19 +01:00
Ben Laurie
a808002bc3
Correctly test for no-ec.
...
(cherry picked from commit d5605699a1 )
2013-10-01 14:01:19 +01:00
Dr. Stephen Henson
2fc368c111
Don't run ECDH CMS tests if EC disabled.
...
(cherry picked from commit b85f8afe37 )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
6ed3af7d50
Add X9.42 DH test.
...
(cherry picked from commit bbc098ffb3 )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
d037e0d30c
New CMS tests.
...
Add some ECDH CMS tests.
(cherry picked from commit 5cdc25a754 )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
51cb950904
Add X9.42 DH certificate to S/MIME test
...
(cherry picked from commit 75787fd833 )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
4bfa88bb4c
Scripts to recreate S/MIME test certificates.
...
Add a script to generate keys and certificates for the S/MIME and CMS
tests.
Update certificates and add EC examples.
(cherry picked from commit a0957d5505 )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
9d1e475db6
Custom key wrap option for cms utility.
...
(cherry picked from commit 5711885a2b )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
3e792793f6
add cofactor ECDH support from fips branch
...
(cherry picked from commit a3a2e3a43d )
2013-10-01 14:01:18 +01:00
Ben Laurie
ac5cb33356
Fix compile errors.
...
(cherry picked from commit a0aaa5660a )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
aaf74259ec
CMS RFC2631 X9.42 DH enveloped data support.
...
(cherry picked from commit bd59f2b91d )
Conflicts:
crypto/dh/dh.h
crypto/dh/dh_err.c
Sync error codes with 1.0.1.
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
ecf9ceb90d
Minor optimisation to KDF algorithm.
...
Don't need to use temporary buffer if remaining length equals digest length.
(cherry picked from commit 3f6b6f0b8c )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
5c4ff8ad37
Add KDF for DH.
...
Add X9.42 DH KDF. Move sharedinfo generation code to CMS library as the
same structure is used by DH and ECDH.
Move ASN1_OBJECT typedef to ossl_typ.h so it can be picked up by dh headers
without the need to use ASN1.
(cherry picked from commit dc1ce3bc64 )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
dc427fc8e2
Return correct enveloped data type in ASN1 methods.
...
For RSA and DSA keys return an appropriate RecipientInfo type. By setting
CMS_RECIPINFO_NONE for DSA keys an appropriate error is returned if
an attempt is made to use DSA with enveloped data.
(cherry picked from commit 41b920ef01 )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
e1e6c4dae7
Algorithm parameter support.
...
Check and set AlgorithmIdenfier parameters for key wrap algorithms.
Currently these just set parameters to NULL.
(cherry picked from commit e61f5d55bc )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
1747fd1cc6
Add support for ECDH KARI.
...
Add support for ECDH in enveloped data. The CMS ctrls for the EC ASN1
method decode/encode the appropriate parameters from the CMS ASN1 data
and send appropriate data to the EC public key method.
(cherry picked from commit 88e20b8584 )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
a119822b90
Add support for X9.62 KDF.
...
Add X9.62 KDF to EC EVP_PKEY_METHOD.
(cherry picked from commit 25af7a5dbc )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
8c798690ce
CMS support for key agreeement recipient info.
...
Add hooks to support key agreement recipient info type (KARI) using
algorithm specific code in the relevant public key ASN1 method.
(cherry picked from commit 17c2764d2e )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
ea6bf26657
Add new CMS tests.
...
Add new tests to cms-test.pl covering PSS and OAEP.
(cherry picked from commit 32b18e0338 )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
4a26fd6e3b
Add -keyopt option to cms utility.
...
Add support for custom public key parameters in the cms utility using
the -keyopt switch. Works for -sign and also -encrypt if -recip is used.
(cherry picked from commit 02498cc885 )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
dddb38834e
Update cms docs.
...
Document use of -keyopt to use RSA-PSS and RSA-OAEP modes.
(cherry picked from commit 4bf4a6501c )
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
af7d6b936b
CMS RSA-OAEP and RSA-PSS support.
...
Extend RSA ASN1 method to support CMS PSS signatures for both sign
and verify.
For signing the EVP_PKEY_CTX parameters are read and the appropriate
CMS structures set up.
For verification the CMS structures are analysed and the corresponding
parameters in the EVP_PKEY_CTX set.
Also add RSA-OAEP support.
For encrypt the EVP_PKEY_CTX parameters are used.
For decrypt the CMS structure is uses to set the appropriate EVP_PKEY_CTX
parameters.
(cherry picked from commit 0574cadf85 )
Also sync error codes with OpenSSL 1.0.1 and add new ones.
2013-10-01 14:01:18 +01:00
Dr. Stephen Henson
a64b8786b5
Update to OAEP support.
...
Add OAEP ctrls to retrieve MD and label. Return errors if
an attempt is made to set or retrieve OAEP parameters when
padding mode is not OAEP.
(cherry picked from commit 211a14f627 )
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
25f93585a7
Exetended OAEP support.
...
Extend OAEP support. Generalise the OAEP padding functions to support
arbitrary digests. Extend EVP_PKEY RSA method to handle the new OAEP
padding functions and add ctrls to set the additional parameters.
(cherry picked from commit 271fef0ef3 )
Conflicts:
CHANGES
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
0d5a49e150
Add FIPS RSA error code.
...
Add some RSA error codes used by the FIPS module.
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
5c49a98c5e
Set CMS EnvelopedData version correctly.
...
(cherry picked from commit ff7b6ce9db )
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
869772ff08
Initialise CMS signature buffer length properly.
...
(cherry picked from commit e0f7cfda68 )
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
f2edf3181e
CMS public key parameter support.
...
Add support for customisation of CMS handling of signed and enveloped
data from custom public key parameters.
This will provide support for RSA-PSS and RSA-OAEP but could also be
applied to other algorithms.
(cherry picked from commit e365352d6a )
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
d6dc5c506a
Add control to retrieve signature MD.
...
(cherry picked from commit 810639536c )
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
eebd5e5dd7
Add new OIDs from RFC5753
...
Add OIDs for KDF schemes from RFC5753 and add cross references for
each type and the appropriate digest to use.
(cherry picked from commit 6af440ced4 )
Conflicts:
crypto/objects/obj_dat.h
crypto/objects/obj_mac.num
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
868b266451
Add new OID to pSpecified from PKCS#1
...
(cherry picked from commit e423c360fd )
Conflicts:
crypto/objects/obj_dat.h
crypto/objects/obj_mac.num
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
3fa23ff0f1
Add FIPS 186-2 DSA parameter generation algorithm.
...
Backport support for FIPS 186-2 DSA parameter generation from
HEAD. Redirect to FIPS in FIPS mode and workaround prototype error.
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
c275fb091e
Extend DH parameter generation support.
...
Add support for DH parameter generation using DSA methods including
FIPS 186-3.
(cherry picked from commit 3909087801 )
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
90c341c601
Enhance DH dup functions.
...
Make DHparams_dup work properly with X9.42 DH parameters.
(cherry picked from commit d3cc91eee2 )
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
52d0e1ca4e
If present print j, seed and counter values for DH
...
(cherry picked from commit c9577ab5ea )
Conflicts:
crypto/dh/dh_ameth.c
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
c6f3386577
EVP support for wrapping algorithms.
...
Add support for key wrap algorithms via EVP interface.
Generalise AES wrap algorithm and add to modes, making existing
AES wrap algorithm a special case.
Move test code to evptests.txt
(cherry picked from commit 97cf1f6c28 )
Conflicts:
CHANGES
2013-10-01 14:01:17 +01:00
Andy Polyakov
cf65a07256
evptests.txt: add XTS test vectors
...
(cherry picked from commit c9a8e3d1c7 )
2013-10-01 14:01:17 +01:00
Andy Polyakov
051dc9db2b
evptests.txt: additional GCM test vectors.
...
(cherry picked from commit ca303d333b )
2013-10-01 14:01:17 +01:00
Ben Laurie
93a886b45a
Fix warnings.
...
(cherry picked from commit 282a480a35 )
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
ec19082ecc
GCM and CCM test support
...
Add code to support GCM an CCM modes in evp_test. On encrypt this
will compare the expected ciphertext and tag. On decrypt it will
compare the expected plaintext: tag comparison is done internally.
Add a simple CCM test case and convert all tests from crypto/modes/gcm128.c
(cherry picked from commit 15652f9825 )
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
0eff7c7c88
Add CCM ciphers to tables.
...
(cherry picked from commit 95248de327 )
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
6c4b3514d7
New SP 800-56A compliant version of DH_compute_key().
...
(cherry picked from commit bc91494e06 )
2013-10-01 14:01:17 +01:00
Dr. Stephen Henson
d84cca7447
Typo.
...
(cherry picked from commit 415ece7301 )
2013-10-01 14:01:16 +01:00
Ben Laurie
3a8b23bfd9
Re-add accidentally deleted #endif.
2013-10-01 12:34:44 +01:00
Ben Laurie
63fe322160
Merge remote-tracking branch 'agl/1.0.2alpn' into agl-alpn
...
Conflicts:
ssl/ssl3.h
ssl/t1_lib.c
2013-10-01 12:20:02 +01:00
Ben Laurie
c808798013
Produce PEM we would consume.
2013-09-25 13:55:06 +01:00
Ben Laurie
379f21ce5c
Show useful errors.
2013-09-24 23:13:22 +01:00
Ben Laurie
4f3b1b3eb9
Merge remote-tracking branch 'trevp/pempick' into OpenSSL_1_0_2-stable
2013-09-24 12:47:54 +01:00
Dr. Stephen Henson
b49df9502e
Disable Dual EC DRBG.
...
Return an error if an attempt is made to enable the Dual EC DRBG: it
is not used by default.
(cherry picked from commit a4870de5aa )
2013-09-22 18:25:58 +01:00
Ben Laurie
4f8a706dc7
Merge remote-tracking branch 'trevp/pemfix' into trev-pem-fix
2013-09-20 15:39:08 -07:00
Dr. Stephen Henson
7560f63909
Fix warning.
2013-09-18 15:10:22 +01:00
Dr. Stephen Henson
1dfb1b103c
DTLS version usage fixes.
...
Make DTLS behave like TLS when negotiating version: record layer has
DTLS 1.0, message version is 1.2.
Tolerate different version numbers if version hasn't been negotiated
yet.
(cherry picked from commit 40088d8b81 )
2013-09-18 13:47:05 +01:00
Dr. Stephen Henson
6e1987ca1d
DTLS trace support.
...
Add DTLS record header parsing, different client hello format and add
HelloVerifyRequest message type.
Add code to d1_pkt.c to send message headers to the message callback.
(cherry picked from commit 890f2f8b92 )
Conflicts:
ssl/ssl_locl.h
2013-09-18 13:46:03 +01:00
Dr. Stephen Henson
d307176931
Suite B support for DTLS 1.2
...
Check for Suite B support using method flags instead of version numbers:
anything supporting TLS 1.2 cipher suites will also support Suite B.
Return an error if an attempt to use DTLS 1.0 is made in Suite B mode.
(cherry picked from commit 4544f0a691 )
2013-09-18 13:46:03 +01:00
Dr. Stephen Henson
c391a74266
Always return errors in ssl3_get_client_hello
...
If we successfully match a cookie don't set return value to 2 as this
results in other error conditions returning 2 as well.
Instead set return value to -2 which can be checked later if everything
else is OK.
(cherry picked from commit c56f5b8edf )
2013-09-18 13:46:02 +01:00
Dr. Stephen Henson
65a87d3cc3
Dual DTLS version methods.
...
Add new methods DTLS_*_method() which support both DTLS 1.0 and DTLS 1.2 and
pick the highest version the peer supports during negotiation.
As with SSL/TLS options can change this behaviour specifically
SSL_OP_NO_DTLSv1 and SSL_OP_NO_DTLSv1_2.
(cherry picked from commit c6913eeb76 )
Conflicts:
CHANGES
2013-09-18 13:46:02 +01:00
Dr. Stephen Henson
b60b9e7afe
Enable TLS 1.2 ciphers in DTLS 1.2.
...
Port TLS 1.2 GCM code to DTLS. Enable use of TLS 1.2 only ciphers when in
DTLS 1.2 mode too.
(cherry picked from commit 4221c0dd30 )
2013-09-18 13:46:02 +01:00
Dr. Stephen Henson
919834dc84
Update fixed DH requirements.
...
The relaxed signing requirements for fixed DH certificates apply to DTLS 1.2
too.
(cherry picked from commit fbbaaccaca )
2013-09-18 13:46:02 +01:00
Dr. Stephen Henson
efc17286f8
DTLS 1.2 cached record support.
...
Add DTLS1.2 support for cached records when computing handshake macs
instead of the MD5+SHA1 case for DTLS < 1.2 (this is a port of the
equivalent TLS 1.2 code to DTLS).
(cherry picked from commit 04fac50045 )
2013-09-18 13:46:02 +01:00
Dr. Stephen Henson
acec5a6244
Provisional DTLS 1.2 support.
...
Add correct flags for DTLS 1.2, update s_server and s_client to handle
DTLS 1.2 methods.
Currently no support for version negotiation: i.e. if client/server selects
DTLS 1.2 it is that or nothing.
(cherry picked from commit c3b344e36a )
Conflicts:
apps/s_server.c
2013-09-18 13:46:02 +01:00
Dr. Stephen Henson
68039af3e7
Remove versions test from dtls1_buffer_message
...
Since this is always called from DTLS code it is safe to assume the header
length should be the DTLS value. This avoids the need to check the version
number and should work with any version of DTLS (not just 1.0).
(cherry picked from commit 9cf0f18754 )
2013-09-18 13:46:02 +01:00
Dr. Stephen Henson
da1247d653
Extend DTLS method macros.
...
Extend DTLS method creation macros to support version numbers and encryption
methods. Update existing code.
(cherry picked from commit cfd298b7ae )
2013-09-18 13:46:02 +01:00
Dr. Stephen Henson
052d0358f2
Enable various DTLS extensions.
...
Some TLS extensions were disabled for DTLS. Possibly because they caused
problems with the old duplicated code. Enable them again.
(cherry picked from commit 874a18cfad )
2013-09-18 13:46:02 +01:00
Dr. Stephen Henson
1b6ab411d3
Use enc_flags when deciding protocol variations.
...
Use the enc_flags field to determine whether we should use explicit IV,
signature algorithms or SHA256 default PRF instead of hard coding which
versions support each requirement.
(cherry picked from commit cbd64894ec )
Conflicts:
ssl/ssl_locl.h
2013-09-18 13:46:02 +01:00
Dr. Stephen Henson
d88d98edd3
Use appropriate versions of SSL3_ENC_METHOD
...
(cherry picked from commit 6de2649a6b )
2013-09-18 13:46:02 +01:00
Dr. Stephen Henson
741c9959f6
DTLS revision.
...
Revise DTLS code. There was a *lot* of code duplication in the
DTLS code that generates records. This makes it harder to maintain and
sometimes a TLS update is omitted by accident from the DTLS code.
Specifically almost all of the record generation functions have code like
this:
some_pointer = buffer + HANDSHAKE_HEADER_LENGTH;
... Record creation stuff ...
set_handshake_header(ssl, SSL_MT_SOMETHING, message_len);
...
write_handshake_message(ssl);
Where the "Record creation stuff" is identical between SSL/TLS and DTLS or
in some cases has very minor differences.
By adding a few fields to SSL3_ENC to include the header length, some flags
and function pointers for handshake header setting and handshake writing the
code can cope with both cases.
(cherry picked from commit 173e72e64c )
2013-09-18 13:46:02 +01:00
Dr. Stephen Henson
7c23127fde
Add functions to set ECDSA_METHOD structure.
...
Add various functions to allocate and set the fields of an ECDSA_METHOD
structure.
(cherry picked from commit 94c2f77a62 )
2013-09-18 01:23:40 +01:00
Bodo Moeller
8b9722a3c0
Merge branch 'OpenSSL_1_0_2-stable' of openssl.net:openssl into OpenSSL_1_0_2-stable
2013-09-17 09:59:14 +02:00
Bodo Moeller
8c149cfd83
Sync with version from master.
2013-09-17 09:55:27 +02:00
Trevor Perrin
6da498991c
Various custom extension fixes.
...
Force no SSL2 when custom extensions in use.
Don't clear extension state when cert is set.
Clear on renegotiate.
Conflicts:
ssl/t1_lib.c
2013-09-16 18:40:53 +01:00
Rob Stradling
86a66deb7e
Update CHANGES.
2013-09-16 14:03:22 +01:00
Rob Stradling
9409e18179
Tidy up comments.
2013-09-16 14:03:21 +01:00
Rob Stradling
6a0b803fc0
Use TLS version supplied by client when fingerprinting Safari.
2013-09-16 14:03:21 +01:00
Rob Stradling
5fa3b54788
Fix compilation with no-ec and/or no-tlsext.
2013-09-16 14:03:21 +01:00
Rob Stradling
07df5018be
Don't prefer ECDHE-ECDSA ciphers when the client appears to be Safari on OS X.
...
OS X 10.8..10.8.3 has broken support for ECDHE-ECDSA ciphers.
2013-09-16 14:03:21 +01:00
Bodo Moeller
1b9a59c36a
Sync CHANGES and NEWS files.
2013-09-16 14:54:34 +02:00
Bodo Moeller
8f89c33451
Merge branch 'OpenSSL_1_0_2-stable' of /usr/local/google/home/bmoeller/openssl/openssl into OpenSSL_1_0_2-stable
2013-09-16 14:51:10 +02:00
Bodo Moeller
485d7d5904
Fix overly lenient comparisons:
...
- EC_GROUP_cmp shouldn't consider curves equal just because
the curve name is the same. (They really *should* be the same
in this case, but there's an EC_GROUP_set_curve_name API,
which could be misused.)
- EC_POINT_cmp shouldn't return 0 for ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED
or EC_R_INCOMPATIBLE_OBJECTS errors because in a cmp API, 0 indicates
equality (not an error).
Reported by: king cope
(cherry picked from commit 312a46791ab465cfa3bf26764361faed0e5df014)
2013-09-16 14:50:48 +02:00
Bodo Moeller
e3720888c7
Fix overly lenient comparisons:
...
- EC_GROUP_cmp shouldn't consider curves equal just because
the curve name is the same. (They really *should* be the same
in this case, but there's an EC_GROUP_set_curve_name API,
which could be misused.)
- EC_POINT_cmp shouldn't return 0 for ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED
or EC_R_INCOMPATIBLE_OBJECTS errors because in a cmp API, 0 indicates
equality (not an error).
Reported by: king cope
(cherry picked from commit 312a46791ab465cfa3bf26764361faed0e5df014)
2013-09-16 13:06:30 +02:00
Andy Polyakov
d75e384ff8
Extend OPENSSL_ia32cap_P (backport from HEAD).
2013-09-15 22:13:54 +02:00
Andy Polyakov
c340c7a88c
crypto/armcap.c: fix typo in rdtsc subroutine.
...
PR: 3125
Submitted by: Kyle McMartin
(cherry picked from commit 8e52a9063a )
2013-09-15 22:10:49 +02:00
Dr. Stephen Henson
9ecf6e93af
add -badsig option to corrupt CRL signatures for testing too
...
(cherry picked from commit 139cd16cc5 )
2013-09-14 13:53:44 +01:00
Dr. Stephen Henson
a41735288c
Add missing code from SSL_CONF backport.
2013-09-14 13:53:44 +01:00
Scott Deboy
8ae78c6bd9
Initialize next_proto in s_server - resolves incorrect attempts to free
...
Cherry pick of b0d27cb902 .
2013-09-13 11:31:39 -04:00
Adam Langley
cb3cec4adf
Add tests for ALPN functionality.
...
Cherry-picked from a898936218 .
2013-09-13 11:27:26 -04:00
Adam Langley
b0d6f3c58f
Support ALPN.
...
This change adds support for ALPN[1] in OpenSSL. ALPN is the IETF
blessed version of NPN and we'll be supporting both ALPN and NPN for
some time yet.
Cherry-picked from 6f017a8f9d .
[1] https://tools.ietf.org/html/draft-ietf-tls-applayerprotoneg-00
2013-09-13 11:27:22 -04:00
Ben Laurie
0338648426
Constification.
2013-09-10 17:58:44 +01:00
Andy Polyakov
c7dc404188
crypto/modes/asm/aesni-gcm-x86_64.pl: minor optimization.
...
Avoid occasional up to 8% performance drops.
(cherry picked from commit 7a1a12232a )
2013-09-09 21:46:02 +02:00
Andy Polyakov
08853158b6
crypto/bn/asm/x86_64-mont.pl: minor optimization.
...
(cherry picked from commit 72a158703b )
2013-09-09 21:42:48 +02:00
Andy Polyakov
74e0187663
Revert "x86cpuid.pl: fix extended feature flags detection."
...
This reverts commit 514f1a7835 .
2013-09-09 21:35:15 +02:00
Dr. Stephen Henson
bb4aa95c81
Remove ancient PATENTS section and FAQ reference.
...
(cherry picked from commit ce4555967e )
2013-09-08 21:25:38 +01:00
Dr. Stephen Henson
5117d50b7e
Partial path fix.
...
When verifying a partial path always check to see if the EE certificate
is explicitly trusted: the path could contain other untrusted certificates.
(cherry picked from commit 52073b7675 )
2013-09-08 21:25:10 +01:00
Dr. Stephen Henson
593605d3ec
Document supported curve functions.
...
(cherry picked from commit c3eb33763b )
2013-09-03 15:43:59 +01:00
Dr. Stephen Henson
c9ea4df8f9
Document -force_pubkey option.
...
(cherry picked from commit b093a06866bf632a97a9a0286e2d08f69c3cf7dd)
2013-08-21 13:41:17 +01:00
Dr. Stephen Henson
89ff56faf1
Correct ECDSA example.
...
(cherry picked from commit 3a918ea2bbf4175d9461f81be1403d3781b2c0dc)
2013-08-20 17:30:16 +01:00
Dr. Stephen Henson
9855026c43
fix printout of expiry days if -enddate is used in ca
...
(cherry picked from commit f7ac0ec89d )
2013-08-19 21:55:07 +01:00
Dr. Stephen Henson
904348a492
Time difference functions.
...
Backport of ASN1_TIME_diff and OPENSSL_gmtime_diff functions from master
branch.
2013-08-19 21:55:07 +01:00
Dr. Stephen Henson
aaaa18392d
new command line option -stdname to ciphers utility
...
(cherry picked from commit 51b9115b6d )
2013-08-19 20:25:39 +01:00
Dr. Stephen Henson
8c33e40d2e
Add new test option set the version in generated certificates: this
...
is needed to test some profiles/protocols which reject certificates
with unsupported versions.
(cherry picked from commit df316fd43c )
2013-08-19 18:10:04 +01:00
Dr. Stephen Henson
0d04af1e72
option to output corrupted signature in certificates for testing purposes
...
(cherry picked from commit 96cfba0fb4 )
2013-08-19 18:09:44 +01:00
Dr. Stephen Henson
8f17495800
update usage messages
...
(cherry picked from commit 7c8ac50504 )
2013-08-19 18:09:26 +01:00
Dr. Stephen Henson
95c1a24853
add -naccept <n> option to s_server to automatically exit after <n> connections
...
(cherry picked from commit b5cadfb564 )
2013-08-19 17:42:02 +01:00
Dr. Stephen Henson
08374de10f
with -rev close connection if client sends "CLOSE"
...
(cherry picked from commit 685755937a )
2013-08-19 14:14:05 +01:00
Dr. Stephen Henson
506e70a216
Add simple external session cache to s_server. This serialises sessions
...
just like a "real" server making it easier to trace any problems.
(manually applied from commit 35b0ea4efe )
2013-08-19 14:13:56 +01:00
Dr. Stephen Henson
0cca92cdd3
Remove commented out debug line.
2013-08-19 14:13:38 +01:00
Dr. Stephen Henson
5b430cfc44
Make no-ec compilation work.
...
(cherry picked from commit 14536c8c9c )
2013-08-19 14:13:38 +01:00
Dr. Stephen Henson
171c4da568
Add -rev test option to s_server to just reverse order of characters received
...
by client and send back to server. Also prints an abbreviated summary of
the connection parameters.
(cherry picked from commit 4f3df8bea2 )
2013-08-19 14:13:38 +01:00
Dr. Stephen Henson
04611fb0f1
Add -brief option to s_client and s_server to summarise connection details.
...
New option -verify_quiet to shut up the verify callback unless there is
an error.
(manually applied from commit 2a7cbe77b3 )
2013-08-19 14:13:24 +01:00
Dr. Stephen Henson
df430489cf
Add documentation.
...
Preliminary documentation for chain and verify stores and certificate chain
setting functions.
(cherry picked from commit eeb15452a0 )
2013-08-18 13:53:32 +01:00
Dr. Stephen Henson
5085e57fb5
Return 1 when setting ECDH auto mode.
...
(cherry picked from commit 42082eda6f )
2013-08-18 13:53:00 +01:00
Michael Tuexen
75b81247a0
DTLS message_sequence number wrong in rehandshake ServerHello
...
This fix ensures that
* A HelloRequest is retransmitted if not responded by a ClientHello
* The HelloRequest "consumes" the sequence number 0. The subsequent
ServerHello uses the sequence number 1.
* The client also expects the sequence number of the ServerHello to
be 1 if a HelloRequest was received earlier.
This patch fixes the RFC violation.
(cherry picked from commit b62f4daac0 )
2013-08-13 18:55:16 +01:00
Michael Tuexen
2c1a5c1039
DTLS handshake fix.
...
Reported by: Prashant Jaikumar <rmstar@gmail.com >
Fix handling of application data received before a handshake.
(cherry picked from commit 0c75eeacd3 )
2013-08-08 13:31:54 +01:00
Dr. Stephen Henson
71c34b7f2d
Fix verify loop with CRL checking.
...
PR #3090
Reported by: Franck Youssef <fry@open.ch >
If no new reason codes are obtained after checking a CRL exit with an
error to avoid repeatedly checking the same CRL.
This will only happen if verify errors such as invalid CRL scope are
overridden in a callback.
(cherry picked from commit 4b26645c1a )
2013-08-06 16:08:04 +01:00
Kaspar Brand
b0cfaf58ad
Fix for PEM_X509_INFO_read_bio.
...
PR: 3028
Fix bug introduced in PEM_X509_INFO_bio which wouldn't process RSA keys
correctly if they appeared first.
(cherry picked from commit 5ae8d6bcba )
2013-08-06 16:04:52 +01:00
Andy Polyakov
9dc07f04c3
crypto/evp/e_aes.c: fix logical pre-processor bug and formatting.
...
Bug would emerge when XTS is added to bsaes-armv7.pl. Pointed out by
Ard Biesheuvel of Linaro.
(cherry picked from commit 044f63086051d7542fa9485a1432498c39c4d8fa)
2013-08-03 17:09:37 +02:00
Andy Polyakov
f15c16200b
crypto/bn/asm/rsax-x86_64.pl: make it work on Darwin.
...
(cherry picked from commit fd8ad019e1 )
2013-08-03 16:30:40 +02:00
Andy Polyakov
4e09add6f8
crypto/sha/asm/sha*-x86_64.pl: comply with Win64 ABI.
...
(cherry picked from commit 006784378d )
2013-07-31 23:52:21 +02:00
Trevor
355a6236be
Cosmetic touchups.
2013-07-31 16:38:43 +01:00
Ben Laurie
6d7fa9c25c
Support new rsaz asm stuff.
2013-07-31 16:37:19 +01:00
Andy Polyakov
82ae22ef4d
bn/asm/rsaz-avx2.pl: Windows-specific fix.
...
(cherry picked from commit 5c57c69f9e )
2013-07-12 19:01:23 +02:00
Ben Laurie
b56bae5126
s/rsaz_eligible/rsaz_avx2_eligible/.
...
(cherry picked from commit 852f837f5e )
2013-07-12 18:53:05 +02:00
Andy Polyakov
2d3f31e0a1
sha512-586.pl: fix typo.
...
Submitted by: Gisle Vanem
(cherry picked from commit 241fba4ea9 )
2013-07-10 10:02:34 +02:00
Andy Polyakov
ae74191e38
Remove RSAX engine, superseded by RSAZ module.
...
(cherry picked from commit f5b132d652 )
Conflicts [resloved]:
Configure
2013-07-05 22:16:10 +02:00
Andy Polyakov
ab8233ab81
Take RSAZ modules into build loop, add glue and engage.
...
RT: 2582, 2850
(cherry picked from commit ca48ace5c5 )
Conflicts:
Configure
2013-07-05 21:53:05 +02:00
Andy Polyakov
d5572bdc64
Add RSAZ assembly modules.
...
RT: 2582, 2850
(cherry picked from commit 0b4bb91db6 )
2013-07-05 21:49:19 +02:00
Andy Polyakov
e3990db59c
bn/asm/x86_86-mont.pl: optimize reduction for Intel Core family.
...
(cherry picked from commit 26e43b48a3 )
2013-07-05 21:15:16 +02:00
Andy Polyakov
87d90528ac
bn/bn_exp.c: harmonize.
...
(cherry picked from commit cbce8c4644 )
2013-07-05 21:01:51 +02:00
Trevor
e27711cfdd
Trying cherrypick:
...
Add support for arbitrary TLS extensions.
Contributed by Trevor Perrin.
Conflicts:
CHANGES
ssl/ssl.h
ssl/ssltest.c
test/testssl
Fix compilation due to #endif.
Cherrypicking more stuff.
Cleanup of custom extension stuff.
serverinfo rejects non-empty extensions.
Omit extension if no relevant serverinfo data.
Improve error-handling in serverinfo callback.
Cosmetic cleanups.
s_client documentation.
s_server documentation.
SSL_CTX_serverinfo documentation.
Cleaup -1 and NULL callback handling for custom extensions, add tests.
Cleanup ssl_rsa.c serverinfo code.
Whitespace cleanup.
Improve comments in ssl.h for serverinfo.
Whitespace.
Cosmetic cleanup.
Reject non-zero-len serverinfo extensions.
Whitespace.
Make it build.
Conflicts:
test/testssl
2013-07-03 11:53:30 +01:00
Andy Polyakov
28c08222c0
config: fix executable format detection on latest FreeBSD.
...
Submitted by: Bryan Drewery
PR: 3075
(cherry picked from commit c256e69d3f )
2013-06-30 23:59:30 +02:00
Andy Polyakov
8508a80998
bn/bn_exp.c: Solaris-specific fix, T4 MONTMUL relies on alloca.
...
(cherry picked from commit b74ce8d948 )
2013-06-30 23:14:31 +02:00
Andy Polyakov
7850a8bc04
x86_64-xlate.pl: Windows fixes.
...
(cherry picked from commit a9d14832fd )
2013-06-30 23:14:19 +02:00
Andy Polyakov
fccec89084
aesni-sha256-x86_64.pl: fix typo in Windows SEH.
...
(cherry picked from commit 42386fdb62 )
2013-06-30 23:14:04 +02:00
Andy Polyakov
6c7fa27404
PA-RISC assembler pack: switch to bve in 64-bit builds.
...
PR: 3074
(cherry picked from commit 02450ec69d )
2013-06-30 23:13:23 +02:00
Andy Polyakov
e7f9c08ab8
SPARC T4 DES support: fix typo.
...
(cherry picked from commit 8ee3c7e676 )
2013-06-18 11:07:24 +02:00
Andy Polyakov
03c8441b14
Optimize SPARC T4 MONTMUL support.
...
Improve RSA sing performance by 20-30% by:
- switching from floating-point to integer conditional moves;
- daisy-chaining sqr-sqr-sqr-sqr-sqr-mul sequences;
- using MONTMUL even during powers table setup;
(cherry picked from commit 4ddacd9921 )
2013-06-18 11:07:16 +02:00
Ben Laurie
e887c4187e
Backport single makefile from master.
2013-06-13 15:09:48 +01:00
Ben Laurie
933aee6199
Wrong include path.
2013-06-13 13:26:22 +01:00
Dr. Stephen Henson
90e7f983b5
Typo: don't call RAND_cleanup during app startup.
2013-06-12 21:16:31 +01:00
Andy Polyakov
f00962aaf3
aesni-sha1-x86_64.pl: update performance data.
...
(cherry picked from commit 3b848d3401 )
2013-06-10 22:52:06 +02:00
Andy Polyakov
3eccd2e53a
aesni-sha256-x86_64.pl: harmonize with latest sha512-x86_64.pl.
...
(cherry picked from commit 42b9a4177b )
2013-06-10 22:51:55 +02:00
Andy Polyakov
fcd0e61c24
sha1-x86_64.pl: add AVX2+BMI code path.
...
(cherry picked from commit cd8d7335af )
2013-06-10 22:51:47 +02:00
Andy Polyakov
e7a02b24c1
sha512-x86_64.pl: upcoming-Atom-specific optimization.
...
(cherry picked from commit c7f690c243 )
2013-06-10 22:51:31 +02:00
Andy Polyakov
cbe6bb54e6
sha[256|512]-586.pl: add more SIMD code paths.
...
(cherry picked from commit 32213d8d77 )
2013-06-10 22:50:32 +02:00
Andy Polyakov
23966faca4
ghash-x86_64.pl: add Haswell performance data.
...
(cherry picked from commit b42759158d )
2013-06-10 22:50:23 +02:00
Andy Polyakov
514f1a7835
x86cpuid.pl: fix extended feature flags detection.
...
(cherry picked from commit 1bc0b68d7b )
2013-06-10 22:49:35 +02:00
Dr. Stephen Henson
af908bc48b
Don't use RC2 with PKCS#12 files in FIPS mode.
...
(cherry picked from commit cdb6c48445 )
2013-06-05 15:06:02 +01:00
Dr. Stephen Henson
233ebcb543
Fix PSS signature printing.
...
Fix PSS signature printing: consistently use 0x prefix for hex values for
padding length and trailer fields.
(cherry picked from commit deb24ad53147f5a8dd63416224a5edd7bbc0e74a)
2013-06-05 15:06:02 +01:00
Dr. Stephen Henson
da0c007254
Reencode with X509_CRL_ctx_sign too.
...
(cherry picked from commit 96940f4f2d0300c033379a87db0ff19e598c6264)
2013-06-05 15:06:02 +01:00
Ben Laurie
01bc7dcafc
Header needed for SOCK_STREAM on FreeBSD.
2013-06-04 16:27:05 +01:00
Ben Laurie
83e2ff8c51
Fix missing/incorrect prototype.
2013-06-04 16:17:30 +01:00
Ben Laurie
e3120586fb
Missing prototypes.
2013-06-04 15:14:18 +01:00
Ben Laurie
3941aa12f1
Remove added ;.
2013-06-04 15:05:18 +01:00
Andy Polyakov
0c10cf0ad6
crypto/modes: even more strict aliasing fixes [and fix bug in cbc128.c from
...
previous cbc128.c commit].
2013-06-04 14:31:23 +01:00
Andy Polyakov
62874a5a69
cbc128.c: fix strict aliasing warning.
2013-06-04 14:30:49 +01:00
Andy Polyakov
8c1f9c56fd
crypto/bn/bn_exp.c: SPARC portability fix.
...
(cherry picked from commit b69437e1e5 )
2013-06-01 09:59:54 +02:00
Andy Polyakov
75063c1527
aesni-sha1-x86_64.pl: Atom-specific optimization.
...
(cherry picked from commit 4df2280b4f )
2013-05-25 19:09:47 +02:00
Andy Polyakov
5de583aa91
sha512-x86_64.pl: +16% optimization for Atom.
...
(and pending AVX2 changes).
(cherry picked from commit 504bbcf3cd )
2013-05-25 19:04:48 +02:00
Andy Polyakov
a0675d8149
vpaes-x86[_64].pl: minor Atom-specific optimization.
...
(cherry picked from commit 988d11b641 )
2013-05-25 18:58:54 +02:00
Andy Polyakov
a7e9ed95ec
evp/e_aes.c: engage SPARC T4 AES support [from master].
2013-05-20 16:36:53 +02:00
Andy Polyakov
615d0edf1f
evp/e_aes.c: engage AES-NI GCM stitch.
2013-05-20 16:30:21 +02:00
Andy Polyakov
e775755dec
evp/evp_err.c: update from master.
2013-05-20 16:16:34 +02:00
Andy Polyakov
a1bf7de5a7
evp/e_camellia.c: engage SPARC T5 Camellia support [from master].
2013-05-20 16:09:13 +02:00
Andy Polyakov
047c02e8db
evp/e_des[3].c: engage SPARC T4 DES support.
2013-05-20 16:08:39 +02:00
Andy Polyakov
c92989d2b7
Add BN support for SPARC VIS3 and T4 [from master].
2013-05-20 15:48:13 +02:00
Andy Polyakov
039e7875ff
md5_locl.h: enable assembly support on SPARC [from master].
2013-05-20 00:33:09 +02:00
Andy Polyakov
48b7b96bd0
sparcv9cap.c: update from master.
2013-05-20 00:16:18 +02:00
Andy Polyakov
747b7a636a
Add MD5 SPARC T4 code from master.
2013-05-20 00:08:15 +02:00
Andy Polyakov
635f56fabd
Add SHA SPARC T4 code from master.
2013-05-20 00:04:38 +02:00
Andy Polyakov
c617bc0054
Add Camellia SPARC T4 module from master.
2013-05-19 23:58:54 +02:00
Andy Polyakov
d215724753
Add AES SPARC T4 module from master.
2013-05-19 23:54:34 +02:00
Andy Polyakov
9c1ee1bed5
Add DES SPARC T4 module from master.
2013-05-19 23:51:22 +02:00
Andy Polyakov
14ef63c15e
Add perlasm/sparcv9_modes.pl from master.
2013-05-19 23:47:38 +02:00
Andy Polyakov
5a456140c1
des_enc.m4: update from master.
2013-05-19 23:43:12 +02:00
Andy Polyakov
1ff546737b
evp/Makefile: fix typo.
2013-05-19 23:11:03 +02:00
Andy Polyakov
56f0b25754
Add EVP glue to AES-NI SHA256 stich [from master].
2013-05-19 22:35:37 +02:00
Andy Polyakov
b0f78dc018
Add AES-NI SHA256 stitch and take it into build loop [from master].
2013-05-19 22:23:18 +02:00
Andy Polyakov
1f2d194acf
aesni-sha1-x86_64.pl: update from master.
2013-05-19 22:18:52 +02:00
Andy Polyakov
aacfb2a2c6
Add AES-NI GCM stich and take it into build loop [from master].
2013-05-19 22:06:18 +02:00
Andy Polyakov
0ba304dd31
gcm128.c: update from master (add AVX and VIS3 support).
2013-05-19 21:55:30 +02:00
Andy Polyakov
8eb2da5fbb
ghash-sparcv9.pl: update from master.
2013-05-19 21:53:14 +02:00
Andy Polyakov
d1896e8ccd
ghash-x86_64.pl: update from master.
2013-05-19 21:51:19 +02:00
Andy Polyakov
0edcb7a556
ghash-x86.pl: update from master.
2013-05-19 21:46:03 +02:00
Andy Polyakov
ecc2c5d81a
sha512-x86_64.pl: update from master.
2013-05-19 21:36:54 +02:00
Andy Polyakov
441dec8e9f
sha512-586.pl: update from master.
2013-05-19 21:36:38 +02:00
Andy Polyakov
4f566c360b
sha256-598.pl: update from master.
2013-05-19 21:35:55 +02:00
Andy Polyakov
e10cd58090
sha1-x86_64.pl: update from master.
2013-05-19 21:33:04 +02:00
Andy Polyakov
5c8ae6d93e
sha1-586.pl: update from master.
2013-05-19 21:32:29 +02:00
Andy Polyakov
e72f7677bf
crypto/perlasm: update from master.
2013-05-19 21:27:59 +02:00
Andy Polyakov
e815d72b1f
RFC6689 support: add missing commit (git noob alert).
2013-05-15 20:41:51 +02:00
Andy Polyakov
ddf918673d
ssl/dnssec.c: compilation errors.
2013-05-15 20:38:58 +02:00
Andy Polyakov
8517d0c00d
Initial support for RFC6689, a.k.a. DANE.
...
Note that it initially applies to 1.0.2, and not to HEAD. This is
in order to allow development with existing libunbound installations
that are dependent on OpenSSL 1.0.x. More details in RT.
RT: 3003
2013-05-13 15:36:06 +02:00
Dr. Stephen Henson
8659dc73f4
Reencode certificates in X509_sign_ctx.
...
Reencode certificates in X509_sign_ctx as well as X509_sign.
This was causing a problem in the x509 application when it modified an
existing certificate.
(cherry picked from commit c6d8adb8a4 )
2013-05-02 12:24:33 +01:00
Andy Polyakov
07464787a8
crypto/modes/modes_lcl.h: let STRICT_ALIGNMENT be on ARMv7.
...
While ARMv7 in general is capable of unaligned access, not all instructions
actually are. And trouble is that compiler doesn't seem to differentiate
those capable and incapable of unaligned access. Side effect is that kernel
goes into endless loop retrying same instruction triggering unaligned trap.
Problem was observed in xts128.c and ccm128.c modules. It's possible to
resolve it by using (volatile u32*) casts, but letting STRICT_ALIGNMENT
be feels more appropriate.
(cherry picked from commit 3bdd80521a )
2013-04-13 21:19:16 +02:00
Dr. Stephen Henson
e9a3aa9721
Set s->d1 to NULL after freeing it.
...
(cherry picked from commit 04638f2fc3 )
2013-04-08 18:39:52 +01:00
Dr. Stephen Henson
a8cc9f1873
Typo.
...
(cherry picked from commit 0ded2a0689 )
2013-03-31 17:43:42 +01:00
Dr. Stephen Henson
f25c3c0542
Call RAND_cleanup in openssl application.
...
(cherry picked from commit 944bc29f90 )
2013-03-28 14:29:11 +00:00
Matt Caswell
4e5b9645e8
Make binary curve ASN.1 work in FIPS mode.
...
Don't check for binary curves by checking methods: the values will
be different in FIPS mode as they are redirected to the validated module
version.
(cherry picked from commit 94782e0e9c )
2013-03-26 16:58:29 +00:00
Dr. Stephen Henson
04347839ea
enhance EC method to support setting curve type when generating keys and add parameter encoding option
...
(cherry picked from commit 24edfa9df9 )
2013-03-20 15:54:05 +00:00
Dr. Stephen Henson
e14b8410ca
Disable compression for DTLS.
...
The only standard compression method is stateful and is incompatible with
DTLS.
2013-03-19 13:46:57 +00:00
Andy Polyakov
2a1ab7b438
x86cpuid.pl: make it work with older CPUs.
...
PR: 3005
(cherry picked from commit 5702e965d7 )
2013-03-18 19:50:09 +01:00
Andy Polyakov
dd1e4fbcc0
e_aes_cbc_hmac_sha1.c: fix rare bad record mac on AES-NI plaforms.
...
PR: 3002
(cherry picked from commit 5c60046553 )
2013-03-18 19:35:20 +01:00
Michael Tuexen
3f84d34c37
Avoid unnecessary fragmentation.
...
(cherry picked from commit 80ccc66d7e )
2013-03-18 14:32:59 +00:00
Dr. Stephen Henson
d7e429b91d
Encode INTEGER correctly.
...
If an ASN1_INTEGER structure is allocated but not explicitly set encode
it as zero: don't generate an invalid zero length INTEGER.
(cherry picked from commit 1643edc63c )
2013-03-18 14:22:01 +00:00
Dr. Stephen Henson
155ef13c67
Typo.
...
(cherry picked from commit 1546fb780b )
2013-03-18 13:59:57 +00:00
Dr. Stephen Henson
c3466040ec
Update ordinals.
2013-03-04 19:28:57 +00:00
Andy Polyakov
2d9be79407
x86_64-gf2m.pl: fix typo.
...
(cherry picked from commit 342dbbbe4e )
2013-03-01 22:37:53 +01:00
Andy Polyakov
2e4b7eede3
x86_64-gf2m.pl: add missing Windows build fix for #2963 .
...
PR: 3004
(cherry picked from commit 7c43601d44 )
2013-03-01 21:57:25 +01:00
Dr. Stephen Henson
e1dee801b9
Add function CMS_RecipientInfo_encrypt
...
Add CMS_RecipientInfo_encrypt: this function encrypts an existing content
encryption key to match the key in the RecipientInfo structure: this is
useful if a new recpient is added to and existing enveloped data structure.
Add documentation.
(cherry picked from commit e1f1d28f34 )
2013-02-26 17:06:08 +00:00
Dr. Stephen Henson
3c53fd892c
Fix error codes.
...
(cherry picked from commit 388aff08dc )
2013-02-26 17:05:39 +00:00
Dr. Stephen Henson
c46990b13b
Demo code for SSL_CONF API
...
Two example programs one for command line argument processing and
one for configuration file processing.
(cherry picked from commit 3646578ae7 )
2013-02-26 16:34:23 +00:00
Dr. Stephen Henson
1510b1f4c2
Update SSL_CONF docs.
...
Fix some typos and update version number first added: it has now been
backported to OpenSSL 1.0.2.
(cherry picked from commit 4365e4aad9 )
2013-02-26 15:29:49 +00:00
Dr. Stephen Henson
f8a69166ed
New -force_pubkey option to x509 utility to supply a different public
...
key to the one in a request. This is useful for cases where the public
key cannot be used for signing e.g. DH.
(cherry picked from commit 43206a2d7c )
2013-02-25 15:25:27 +00:00
Andy Polyakov
b9eef98883
bn_nist.c: work around clang 3.0 bug.
...
(cherry picked from commit 750398acd8 )
2013-02-16 11:37:38 +01:00
Nick Alcock
ae5c1ca377
Fix POD errors to stop make install_docs dying with pod2man 2.5.0+
...
podlators 2.5.0 has switched to dying on POD syntax errors. This means
that a bunch of long-standing erroneous POD in the openssl documentation
now leads to fatal errors from pod2man, halting installation.
Unfortunately POD constraints mean that you have to sort numeric lists
in ascending order if they start with 1: you cannot do 1, 0, 2 even if
you want 1 to appear first. I've reshuffled such (alas, I wish there
were a better way but I don't know of one).
(cherry picked from commit 5cc2707742 )
2013-02-15 19:39:59 +01:00
Andy Polyakov
188ab7df98
cms-test.pl: make it work with not-so-latest perl.
...
(cherry picked from commit 9c437e2fad )
2013-02-14 16:39:06 +01:00
Dr. Stephen Henson
2e3d02fe1a
Upate FAQ.
...
Add description of "allocate and encode" operation for ASN1 routines.
Document how versioning will for after the letter release reaches
y.
(cherry picked from commit 2527b94fec )
2013-02-12 16:05:02 +00:00
David Woodhouse
3a3a1af1da
Check DTLS_BAD_VER for version number.
...
The version check for DTLS1_VERSION was redundant as
DTLS1_VERSION > TLS1_1_VERSION, however we do need to
check for DTLS1_BAD_VER for compatibility.
PR:2984
(cherry picked from commit d980abb22e )
2013-02-12 15:15:32 +00:00
Dr. Stephen Henson
0ced72c608
Fix in ssltest is no-ssl2 configured
...
(cherry picked from commit cbf9b4aed3 )
2013-02-11 18:28:48 +00:00
Lutz Jaenicke
5584a95490
FAQ/README: we are now using Git instead of CVS
...
(cherry picked from commit f88dbb8385 )
2013-02-11 11:33:19 +01:00
Andy Polyakov
a3e66779d3
sparccpuid.S: work around emulator bug on T1.
...
(cherry picked from commit 3caeef94bd )
2013-02-11 10:41:22 +01:00
Andy Polyakov
919eab8a8b
s3_cbc.c: make CBC_MAC_ROTATE_IN_PLACE universal.
...
(cherry picked from commit f93a41877d )
2013-02-08 21:36:06 +01:00
Andy Polyakov
e9baceab5a
s3_cbc.c: get rid of expensive divisions [from master].
2013-02-08 16:59:26 +01:00
Andy Polyakov
b05561c4b7
ssl/[d1|s3]_pkt.c: harmomize orig_len handling.
...
(cherry picked from commit 8545f73b89 )
2013-02-08 10:40:51 +01:00
Dr. Stephen Henson
b7355af421
Fix IV check and padding removal.
...
Fix the calculation that checks there is enough room in a record
after removing padding and optional explicit IV. (by Steve)
For AEAD remove the correct number of padding bytes (by Andy)
(cherry picked from commit 32cc2479b4 )
2013-02-08 10:40:39 +01:00
Adam Langley
0462eedf5e
Fix for EXP-RC2-CBC-MD5
...
MD5 should use little endian order. Fortunately the only ciphersuite
affected is EXP-RC2-CBC-MD5 (TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5) which
is a rarely used export grade ciphersuite.
(cherry picked from commit f306b87d76 )
2013-02-08 10:40:13 +01:00
Andy Polyakov
82425f2c28
e_aes_cbc_hmac_sha1.c: align calculated MAC at cache line.
...
It also ensures that valgring is happy.
(cherry picked from commit 2141e6f30b )
2013-02-08 10:35:02 +01:00
Andy Polyakov
af010edd55
e_aes_cbc_hmac_sha1.c: cleanse temporary copy of HMAC secret.
...
(cherry picked from commit 529d27ea47 )
2013-02-06 13:56:15 +00:00
Andy Polyakov
5966f4d973
e_aes_cbc_hmac_sha1.c: address the CBC decrypt timing issues.
...
Address CBC decrypt timing issues and reenable the AESNI+SHA1 stitch.
(cherry picked from commit 125093b59f )
2013-02-06 13:56:15 +00:00
Andy Polyakov
eeb486a5f4
ssl/*: remove SSL3_RECORD->orig_len to restore binary compatibility.
...
Kludge alert. This is arranged by passing padding length in unused
bits of SSL3_RECORD->type, so that orig_len can be reconstructed.
(cherry picked from commit 8bfd4c659f )
2013-02-06 13:56:15 +00:00
Dr. Stephen Henson
d7f55e76f2
Don't access EVP_MD_CTX internals directly.
...
(cherry picked from commit 04e45b52ee )
2013-02-06 13:56:14 +00:00
Andy Polyakov
7d9e781a1d
s3/s3_cbc.c: allow for compilations with NO_SHA256|512.
...
(cherry picked from commit d5371324d9 )
2013-02-06 13:56:14 +00:00
Andy Polyakov
e0c21a0b6b
ssl/s3_cbc.c: md_state alignment portability fix.
...
RISCs are picky and alignment granted by compiler for md_state can be
insufficient for SHA512.
(cherry picked from commit 36260233e7 )
2013-02-06 13:56:14 +00:00
Andy Polyakov
1dfb4b9400
ssl/s3_cbc.c: uint64_t portability fix.
...
Break dependency on uint64_t. It's possible to declare bits as
unsigned int, because TLS packets are limited in size and 32-bit
value can't overflow.
(cherry picked from commit cab13fc847 )
2013-02-06 13:56:14 +00:00
Dr. Stephen Henson
e5cb774323
typo.
...
(cherry picked from commit 34ab3c8c71 )
2013-02-06 13:56:14 +00:00
Dr. Stephen Henson
73390e6ba5
Add ordinal for CRYPTO_memcmp: since this will affect multiple
...
branches it needs to be in a "gap".
(cherry picked from commit 81ce0e14e7 )
2013-02-06 13:56:13 +00:00
Dr. Stephen Henson
d91d9acc58
Timing fix mitigation for FIPS mode.
...
We have to use EVP in FIPS mode so we can only partially mitigate
timing differences.
Make an extra call to EVP_DigestSignUpdate to hash additonal blocks
to cover any timing differences caused by removal of padding.
(cherry picked from commit b908e88ec1 )
2013-02-06 13:56:13 +00:00
Ben Laurie
820988a0c0
Oops. Add missing file.
...
(cherry picked from commit 014265eb02 )
2013-02-06 13:56:13 +00:00
Ben Laurie
1326a64a33
Update DTLS code to match CBC decoding in TLS.
...
This change updates the DTLS code to match the constant-time CBC
behaviour in the TLS.
(cherry picked from commit 9f27de170d )
2013-02-06 13:56:13 +00:00
Ben Laurie
e0da2c2ed2
Don't crash when processing a zero-length, TLS >= 1.1 record.
...
The previous CBC patch was bugged in that there was a path through enc()
in s3_pkt.c/d1_pkt.c which didn't set orig_len. orig_len would be left
at the previous value which could suggest that the packet was a
sufficient length when it wasn't.
(cherry picked from commit 6cb19b7681 )
2013-02-06 13:56:13 +00:00
Ben Laurie
fb0a59cc58
Make CBC decoding constant time.
...
This patch makes the decoding of SSLv3 and TLS CBC records constant
time. Without this, a timing side-channel can be used to build a padding
oracle and mount Vaudenay's attack.
This patch also disables the stitched AESNI+SHA mode pending a similar
fix to that code.
In order to be easy to backport, this change is implemented in ssl/,
rather than as a generic AEAD mode. In the future this should be changed
around so that HMAC isn't in ssl/, but crypto/ as FIPS expects.
(cherry picked from commit e130841bcc )
2013-02-06 13:56:12 +00:00
Ben Laurie
f5cd3561ba
Add and use a constant-time memcmp.
...
This change adds CRYPTO_memcmp, which compares two vectors of bytes in
an amount of time that's independent of their contents. It also changes
several MAC compares in the code to use this over the standard memcmp,
which may leak information about the size of a matching prefix.
(cherry picked from commit 2ee798880a )
2013-02-06 13:56:12 +00:00
Dr. Stephen Henson
115f7fa562
Merge branch 'OpenSSL_1_0_2-stable' of /home/steve/src/git/openssl into OpenSSL_1_0_2-stable
2013-02-04 15:14:11 +00:00
Dr. Stephen Henson
c867d87180
Fix for trace code: SSL3 doesn't include a length value for
...
encrypted premaster secret value.
(cherry picked from commit ea34a58385 )
2013-02-04 15:14:00 +00:00
Andy Polyakov
2a713eadc3
bn_word.c: fix overflow bug in BN_add_word.
...
(cherry picked from commit 134c00659a )
2013-02-02 22:37:35 +01:00
Andy Polyakov
2e7900b624
x86_64 assembly pack: keep making Windows build more robust.
...
PR: 2963 and a number of others
(cherry picked from commit 4568182a8b )
2013-02-02 19:56:43 +01:00
Dr. Stephen Henson
f8435919a1
Fix warning: lenmax isn't used any more.
2013-01-24 14:08:28 +00:00
Dr. Stephen Henson
1db4354b53
Don't include comp.h in cmd_cd.c if OPENSSL_NO_COMP set
2013-01-23 01:11:05 +00:00
Andy Polyakov
3f233a1e77
x86_64 assembly pack: make Windows build more robust [from master].
...
PR: 2963 and a number of others
2013-01-22 22:51:29 +01:00
Andy Polyakov
25917e972d
TABLE update.
2013-01-22 21:22:20 +01:00
Andy Polyakov
8812a81bdd
Configure: update linux-mips* lines [from master].
2013-01-22 21:21:44 +01:00
Andy Polyakov
b17ffba915
bn/asm/mips.pl: hardwire local call to bn_div_words.
2013-01-22 21:16:02 +01:00
Dr. Stephen Henson
3619e34f50
Don't include comp.h if no-comp set.
2013-01-20 01:10:03 +00:00
Ben Laurie
6924686b78
Merge branch 'OpenSSL_1_0_2-stable' of openssl.net:openssl into OpenSSL_1_0_2-stable
2013-01-19 18:36:44 +00:00
Ben Laurie
92745f8116
Remove extraneous brackets (clang doesn't like them).
2013-01-19 18:24:00 +00:00
Ben Laurie
17cf9864e0
Add MacOS 64-bit debug target.
2013-01-19 18:23:36 +00:00
Andy Polyakov
5cfefd3ce3
engines/ccgost: GOST fixes [from master].
...
Submitted by: Dmitry Belyavsky, Seguei Leontiev
PR: 2821
2013-01-19 18:24:03 +01:00
Ben Laurie
9ccc6f4382
Can't check a size_t for < 0.
2013-01-19 15:01:18 +00:00
Andy Polyakov
3c92471723
.gitignore adjustments
2013-01-19 13:31:29 +01:00
Dr. Stephen Henson
1a932ae094
-named_curve option handled automatically now.
2013-01-18 15:41:06 +00:00
Dr. Stephen Henson
57912ed329
Add code to download CRLs based on CRLDP extension.
...
Just a sample, real world applications would have to be cleverer.
2013-01-18 15:38:13 +00:00
Dr. Stephen Henson
e998f8aeb8
cipher is not used in s_server any more.
2013-01-18 15:05:28 +00:00
Dr. Stephen Henson
e318431e54
New option to add CRLs for s_client and s_server.
2013-01-18 14:37:14 +00:00
Dr. Stephen Henson
6a10f38daa
initial support for delta CRL generations by diffing two full CRLs
2013-01-17 18:51:50 +00:00
Dr. Stephen Henson
c095078890
Typo (PR2959).
2013-01-17 18:21:54 +00:00
Dr. Stephen Henson
c644b83227
constify
2013-01-17 16:35:50 +00:00
Dr. Stephen Henson
75f535315a
New functions to set lookup_crls callback and to retrieve internal X509_STORE
...
from X509_STORE_CTX.
2013-01-17 16:32:33 +00:00
Dr. Stephen Henson
7c283d9e97
add option to get a certificate or CRL from a URL
2013-01-17 16:08:02 +00:00
Dr. Stephen Henson
2aa3ef78b6
print out issuer and subject unique identifier fields in certificates
2013-01-16 15:08:34 +00:00
Dr. Stephen Henson
1c0964e87f
add wrapper function for certificate download
2013-01-15 18:01:54 +00:00
Dr. Stephen Henson
5c8d41be85
Generalise OCSP I/O functions to support dowloading of other ASN1
...
structures using HTTP. Add wrapper function to handle CRL download.
2013-01-15 18:01:31 +00:00
Dr. Stephen Henson
b286640360
Update default dependency flags.
2013-01-15 16:26:04 +00:00
Dr. Stephen Henson
75a8ff9263
make update
2013-01-15 16:24:07 +00:00
Dr. Stephen Henson
50b5966e57
Add support for broken protocol tests (backport from master branch)
2013-01-15 16:18:13 +00:00
Dr. Stephen Henson
8eb4456f93
Make whitespace consistent with master branch.
2013-01-15 15:55:54 +00:00
Ben Laurie
24c45faba0
Fix some clang warnings.
2013-01-13 21:06:36 +00:00
Ben Laurie
010ac38a98
Correct EVP_PKEY_verifyrecover to EVP_PKEY_verify_recover (RT 2955).
2013-01-12 12:51:58 +00:00
Dr. Stephen Henson
1c25ed5dbb
In FIPS mode use PKCS#8 format when writing private keys:
...
traditional format uses MD5 which is prohibited in FIPS mode.
2013-01-07 16:16:43 +00:00
Dr. Stephen Henson
bf1d32e52a
Change default bits to 1024
2013-01-07 16:13:48 +00:00
Dr. Stephen Henson
6c86b69729
Add .gitignore from master branch.
2013-01-06 21:34:51 +00:00
Ben Laurie
72dfff2d5e
Fix warning.
2013-01-06 21:03:05 +00:00
Dr. Stephen Henson
3341b820cc
add support for separate verify can chain stores to s_client (backport from HEAD)
2012-12-30 16:27:15 +00:00
Dr. Stephen Henson
ede5f6cf74
add -chain options to s_client (backrpot from HEAD)
2012-12-30 16:17:29 +00:00
Dr. Stephen Henson
321a9fea75
make no-comp compile
2012-12-30 16:05:03 +00:00
Dr. Stephen Henson
2e00f46b51
stop warning when compiling with no-comp
2012-12-30 01:12:19 +00:00
Dr. Stephen Henson
8c3f868983
remove unused cipher functionality from s_client
2012-12-30 00:03:40 +00:00
Dr. Stephen Henson
d03cc94f47
Update debug-steve* options.
2012-12-29 23:59:18 +00:00
Dr. Stephen Henson
5477ff9ba2
make JPAKE work again, fix memory leaks
2012-12-29 23:58:44 +00:00
Dr. Stephen Henson
46b11600b0
update ordinals
2012-12-29 14:18:14 +00:00
Dr. Stephen Henson
15387e4ce0
Delegate command line handling for many common options in s_client/s_server to
...
the SSL_CONF APIs.
This is complicated a little because the SSL_CTX structure is not available
when the command line is processed: so just check syntax of commands initially
and store them, ready to apply later.
(backport from HEAD)
2012-12-29 14:16:41 +00:00
Dr. Stephen Henson
49ef33fa34
add SSL_CONF functions and documentation (backport from HEAD)
2012-12-29 13:30:56 +00:00
Dr. Stephen Henson
1166323530
Update ordinals.
2012-12-26 23:53:52 +00:00
Dr. Stephen Henson
29113688a1
Portability fix: use BIO_snprintf and pick up strcasecmp alternative
...
definitions from e_os.h
2012-12-26 23:51:41 +00:00
Dr. Stephen Henson
44c970746f
typo
2012-12-26 22:43:43 +00:00
Dr. Stephen Henson
bc200e691c
SSL/TLS record tracing code (backport from HEAD).
2012-12-26 22:40:46 +00:00
Dr. Stephen Henson
a08f8d73cc
Reject zero length ec point format list.
...
Give more meaningful error is attempt made to use incorrect curve.
(from HEAD)
2012-12-26 18:26:11 +00:00
Dr. Stephen Henson
b52f12b3ba
handle point format list retrieval for clients too (from HEAD)
2012-12-26 18:20:07 +00:00
Dr. Stephen Henson
78b5d89ddf
Add support for printing out and retrieving EC point formats extension.
...
(backport from HEAD)
2012-12-26 18:13:49 +00:00
Dr. Stephen Henson
b79df62eff
return error if Suite B mode is selected and TLS 1.2 can't be used.
...
(backport from HEAD)
2012-12-26 17:39:02 +00:00
Dr. Stephen Henson
e3c76874ad
set auto ecdh parameter selction for Suite B
...
(backport from HEAD)
2012-12-26 17:35:02 +00:00
Dr. Stephen Henson
4347394a27
add Suite B 128 bit mode offering only combination 2
...
(backport from HEAD)
2012-12-26 17:34:50 +00:00
Dr. Stephen Henson
53bb723834
Use client version when deciding which cipher suites to disable.
...
(backport from HEAD)
2012-12-26 17:09:39 +00:00
Dr. Stephen Henson
684a2264c5
Use default point formats extension for server side as well as client
...
side, if possible.
Don't advertise compressed char2 for SuiteB as it is not supported.
(backport from HEAD)
2012-12-26 17:09:14 +00:00
Dr. Stephen Henson
fde8dc1798
add Suite B verification flags
2012-12-26 16:57:39 +00:00
Dr. Stephen Henson
3c87a2bdfa
contify
...
(backport from HEAD)
2012-12-26 16:49:59 +00:00
Dr. Stephen Henson
1520e6c084
Add ctrl and utility functions to retrieve raw cipher list sent by client in
...
client hello message. Previously this could only be retrieved on an initial
connection and it was impossible to determine the cipher IDs of any uknown
ciphersuites.
(backport from HEAD)
2012-12-26 16:25:06 +00:00
Dr. Stephen Henson
2001129f09
new ctrl to retrive value of received temporary key in server key exchange message, print out details in s_client
...
(backport from HEAD)
2012-12-26 16:23:36 +00:00
Dr. Stephen Henson
a50ecaee56
store and print out message digest peer signed with in TLS 1.2
...
(backport from HEAD)
2012-12-26 16:23:13 +00:00
Dr. Stephen Henson
67d9dcf003
perform sanity checks on server certificate type as soon as it is received instead of waiting until server key exchange
...
(backport from HEAD)
2012-12-26 16:22:19 +00:00
Dr. Stephen Henson
79dcae32ef
give more meaningful error if presented with wrong certificate type by server
...
(backport from HEAD)
2012-12-26 16:18:15 +00:00
Dr. Stephen Henson
ccf6a19e2d
Add three Suite B modes to TLS code, supporting RFC6460.
...
(backport from HEAD)
2012-12-26 16:17:40 +00:00
Dr. Stephen Henson
28fbbe3b1b
Add missing prototype to x509.h
2012-12-26 16:11:10 +00:00
Dr. Stephen Henson
8d2dbe6ac0
New function X509_chain_up_ref to dup and up the reference count of
...
a STACK_OF(X509): replace equivalent functionality in several places
by the equivalent call.
(backport from HEAD)
2012-12-26 16:04:03 +00:00
Dr. Stephen Henson
ba8bdea771
add suite B chain validation flags and associated verify errors
...
(backport from HEAD)
2012-12-26 16:01:31 +00:00
Dr. Stephen Henson
3d9916298a
Oops, add missing v3nametest.c
2012-12-26 15:59:57 +00:00
Dr. Stephen Henson
87054c4f0e
New -valid option to add a certificate to the ca index.txt that is valid and not revoked
...
(backport from HEAD)
2012-12-26 15:32:13 +00:00
Dr. Stephen Henson
6660baee66
Make tls1_check_chain return a set of flags indicating checks passed
...
by a certificate chain. Add additional tests to handle client
certificates: checks for matching certificate type and issuer name
comparison.
Print out results of checks for each candidate chain tested in
s_server/s_client.
(backport from HEAD)
2012-12-26 15:27:44 +00:00
Dr. Stephen Henson
25d4c9254c
Abort handshake if signature algorithm used not supported by peer.
...
(backport from HEAD)
2012-12-26 15:27:24 +00:00
Dr. Stephen Henson
44adfeb6c0
check EC tmp key matches preferences
...
(backport from HEAD)
2012-12-26 15:27:04 +00:00
Dr. Stephen Henson
5ff2ef79e6
typo
2012-12-26 15:23:16 +00:00
Dr. Stephen Henson
b762acadeb
Add support for certificate stores in CERT structure. This makes it
...
possible to have different stores per SSL structure or one store in
the parent SSL_CTX. Include distint stores for certificate chain
verification and chain building. New ctrl SSL_CTRL_BUILD_CERT_CHAIN
to build and store a certificate chain in CERT structure: returing
an error if the chain cannot be built: this will allow applications
to test if a chain is correctly configured.
Note: if the CERT based stores are not set then the parent SSL_CTX
store is used to retain compatibility with existing behaviour.
(backport from HEAD)
2012-12-26 15:21:53 +00:00
Dr. Stephen Henson
7d779eefb4
add ssl_locl.h to err header files, rebuild ssl error strings
...
(backport from HEAD)
2012-12-26 15:09:16 +00:00
Dr. Stephen Henson
35b7757f9b
set ciphers to NULL before calling cert_cb
...
(backport from HEAD)
2012-12-26 14:56:40 +00:00
Dr. Stephen Henson
23195e4dcc
stop warning
...
(backport from HEAD)
2012-12-26 14:56:27 +00:00
Dr. Stephen Henson
b28fbdfa7d
New function ssl_set_client_disabled to set masks for any ciphersuites
...
that are disabled for this session (as opposed to always disabled by
configuration).
(backport from HEAD)
2012-12-26 14:55:46 +00:00
Dr. Stephen Henson
a897502cd9
Add new ctrl to retrieve client certificate types, print out
...
details in s_client.
Also add ctrl to set client certificate types. If not used sensible values
will be included based on supported signature algorithms: for example if
we don't include any DSA signing algorithms the DSA certificate type is
omitted.
Fix restriction in old code where certificate types would be truncated
if it exceeded TLS_CT_NUMBER.
(backport from HEAD)
2012-12-26 14:51:37 +00:00
Dr. Stephen Henson
8546add692
cert_flags is unsigned
...
(backport from HEAD)
2012-12-26 14:48:05 +00:00
Dr. Stephen Henson
aa5c5eb4c1
add support for client certificate callbak, fix memory leak
...
(backport from HEAD)
2012-12-26 14:47:31 +00:00
Dr. Stephen Henson
731abd3bd7
new function SSL_is_server to which returns 1 is the corresponding SSL context is for a server
...
(backport from HEAD)
2012-12-26 14:45:46 +00:00
Dr. Stephen Henson
7531dd18dc
no need to check s->server as default_nid is never used for TLS 1.2 client authentication
...
(backport from HEAD)
2012-12-26 14:45:27 +00:00
Dr. Stephen Henson
04c32cddaa
Separate client and server permitted signature algorithm support: by default
...
the permitted signature algorithms for server and client authentication
are the same but it is now possible to set different algorithms for client
authentication only.
(backport from HEAD)
2012-12-26 14:44:56 +00:00
Dr. Stephen Henson
623a5e24cb
Add certificate callback. If set this is called whenever a certificate
...
is required by client or server. An application can decide which
certificate chain to present based on arbitrary criteria: for example
supported signature algorithms. Add very simple example to s_server.
This fixes many of the problems and restrictions of the existing client
certificate callback: for example you can now clear existing certificates
and specify the whole chain.
(backport from HEAD)
2012-12-26 14:43:51 +00:00
Dr. Stephen Henson
bd9fc1d667
New functions to retrieve certificate signatures and signature OID NID.
...
(backport from HEAD)
2012-12-26 14:31:05 +00:00
Dr. Stephen Henson
c550f2e37b
Function tls1_check_ec_server_key is now redundant as we make
...
appropriate checks in tls1_check_chain.
(backport from HEAD)
2012-12-26 14:27:27 +00:00
Dr. Stephen Henson
484f876235
Add new "valid_flags" field to CERT_PKEY structure which determines what
...
the certificate can be used for (if anything). Set valid_flags field
in new tls1_check_chain function. Simplify ssl_set_cert_masks which used
to have similar checks in it.
Add new "cert_flags" field to CERT structure and include a "strict mode".
This enforces some TLS certificate requirements (such as only permitting
certificate signature algorithms contained in the supported algorithms
extension) which some implementations ignore: this option should be used
with caution as it could cause interoperability issues.
(backport from HEAD)
2012-12-26 14:26:53 +00:00
Dr. Stephen Henson
c70a1fee71
Reorganise supported signature algorithm extension processing.
...
Only store encoded versions of peer and configured signature algorithms.
Determine shared signature algorithms and cache the result along with NID
equivalents of each algorithm.
(backport from HEAD)
2012-12-26 14:26:16 +00:00
Dr. Stephen Henson
0b362de5f5
Add support for application defined signature algorithms for use with
...
TLS v1.2. These are sent as an extension for clients and during a certificate
request for servers.
TODO: add support for shared signature algorithms, respect shared algorithms
when deciding which ciphersuites and certificates to permit.
(backport from HEAD)
2012-12-26 14:25:29 +00:00
Dr. Stephen Henson
d312f7be37
Make it possible to delete all certificates from an SSL structure.
...
(backport from HEAD)
2012-12-26 14:18:50 +00:00
Dr. Stephen Henson
2b5e5c3d08
Revert incompatible OCSP_basic_verify changes.
...
Make partial chain chekcing work with EE certificates only.
Remove unneeded -trust_other option from tocsp.
(Backport from HEAD)
2012-12-26 14:12:09 +00:00
Dr. Stephen Henson
708454f010
add missing \n
2012-12-23 18:12:28 +00:00
Dr. Stephen Henson
f1aec4dec3
fix typo
2012-12-21 18:33:53 +00:00
Dr. Stephen Henson
1c53a72f17
update/fix tocsp script (from HEAD)
2012-12-20 19:15:35 +00:00
Dr. Stephen Henson
9b157602e0
Backport enhancements to OCSP utility from HEAD:
...
Support - as a file for standard input or output.
Add -badsig option to generate invalid signatures for testing.
New -rmd option to specify digest to sign OCSP responses with.
2012-12-20 19:06:39 +00:00
Dr. Stephen Henson
67e217c84c
revert, missing commit message
2012-12-20 19:01:55 +00:00
Dr. Stephen Henson
e6b650df0a
oops, revert
2012-12-20 19:01:34 +00:00
Dr. Stephen Henson
7b7b667ddc
apps/ocsp.c
2012-12-20 18:59:09 +00:00
Dr. Stephen Henson
70cd3c6b95
Integrate host, email and IP address checks into X509_verify.
...
Add new verify options to set checks.
(backport from HEAD)
2012-12-19 15:14:10 +00:00
Dr. Stephen Henson
db05bc512d
Return success when the responder is active.
...
Don't verify our own responses.
(backport from HEAD)
2012-12-19 15:02:58 +00:00
Dr. Stephen Henson
45da1efcdb
Backport X509 hostname, IP address and email checking code from HEAD.
2012-12-19 15:01:59 +00:00
Dr. Stephen Henson
54a0076e94
Check chain is not NULL before assuming we have a validated chain. The
...
modification to the OCSP helper purpose breaks normal OCSP verification. It is
no longer needed now we can trust partial chains.
2012-12-19 15:01:32 +00:00
Andy Polyakov
f8cab37bc1
VC-32.pl: fix typo [from HEAD].
...
Submitted by: Pierre Delaage
2012-12-16 19:40:51 +00:00
Dr. Stephen Henson
2e65277695
Use new partial chain flag instead of modifying input parameters.
...
(backport from HEAD)
2012-12-14 14:31:16 +00:00
Dr. Stephen Henson
9a1f59cd31
New verify flag to return success if we have any certificate in the trusted
...
store instead of the default which is to return an error if we can't build
the complete chain. [backport from HEAD]
2012-12-14 14:30:46 +00:00
Ben Laurie
4e72220fd6
Documentation improvements by Chris Palmer (Google).
2012-12-14 13:29:17 +00:00
Ben Laurie
d65b8b2162
Backport OCSP fixes.
2012-12-14 12:53:53 +00:00
Ben Laurie
5dca1e338c
Document -pubkey option.
2012-12-13 16:16:48 +00:00
Ben Laurie
5f4cf08864
Make verify return errors.
2012-12-13 15:49:15 +00:00
Ben Laurie
2a2e537983
Ignore more.
2012-12-13 12:43:18 +00:00
Ben Laurie
d79fc8da02
Add my 64-bit debug target.
2012-12-12 13:45:32 +00:00
Dr. Stephen Henson
e04ccbc5cc
Fix two bugs which affect delta CRL handling:
...
Use -1 to check all extensions in CRLs.
Always set flag for freshest CRL.
2012-12-06 18:24:47 +00:00
Andy Polyakov
bc946bfb97
aes-s390x.pl: fix XTS bugs in z196-specific code path [from HEAD].
2012-12-05 17:45:09 +00:00
Dr. Stephen Henson
38680fa466
check mval for NULL too
2012-12-04 17:26:04 +00:00
Dr. Stephen Henson
a902b6bd98
fix leak
2012-12-03 16:33:15 +00:00
Andy Polyakov
c5e91a9ae9
aes-s390x.pl: harmonize software-only path [from HEAD].
2012-12-01 11:09:13 +00:00
Dr. Stephen Henson
b5f57f455a
PR: 2803
...
Submitted by: jean-etienne.schwartz@bull.net
In OCSP_basic_varify return an error if X509_STORE_CTX_init fails.
2012-11-29 19:15:27 +00:00
Andy Polyakov
ad00a52f2d
Intel compiler support update from HEAD.
2012-11-28 13:12:09 +00:00
Dr. Stephen Henson
e08c7f15b4
change inaccurate error message
2012-11-26 15:47:44 +00:00
Dr. Stephen Henson
7469af4484
reject zero length point format list or supported curves extensions
2012-11-22 14:15:36 +00:00
Dr. Stephen Henson
ec76d850af
PR: 2908
...
Submitted by: Dmitry Belyavsky <beldmit@gmail.com >
Fix DH double free if parameter generation fails.
2012-11-21 14:02:30 +00:00
Dr. Stephen Henson
cedf19f356
fix leaks
2012-11-20 00:28:22 +00:00
Dr. Stephen Henson
1d5f3f4640
correct docs
2012-11-19 20:06:57 +00:00
Andy Polyakov
a060fc3b8e
x86_64-gcc.c: resore early clobber constraint [from HEAD].
...
Submitted by: Florian Weimer
2012-11-19 15:02:34 +00:00
Dr. Stephen Henson
bda5153703
PR: 2880
...
Submitted by: "Florian Rüchel" <florian.ruechel@ruhr-uni-bochum.de >
Correctly handle local machine keys in the capi ENGINE.
2012-11-18 15:21:12 +00:00
Dr. Stephen Henson
6f539399ef
add "missing" TLSv1.2 cipher alias
2012-11-15 19:15:07 +00:00
Andy Polyakov
d90bf2ab21
[vp]aes-x86[_64].pl: update from HEAD.
2012-11-12 18:11:17 +00:00
Andy Polyakov
02620cfcd5
Cumulative updates from HEAD.
2012-10-29 22:29:29 +00:00
Dr. Stephen Henson
74daafaa94
use correct year automatically
2012-10-22 13:03:31 +00:00
Andy Polyakov
aa963813ed
linux-ppc: make it more robust [from HEAD].
2012-10-21 18:25:29 +00:00
Dr. Stephen Henson
9a6aff50ff
Don't require tag before ciphertext in AESGCM mode
2012-10-16 22:46:32 +00:00
Andy Polyakov
c7d16ac8da
aix[64]-cc: get MT support right [from HEAD].
...
PR: 2896
2012-10-16 08:09:20 +00:00
Bodo Möller
b626f0396c
Fix EC_KEY initialization race.
...
Submitted by: Adam Langley
2012-10-05 20:50:38 +00:00
Dr. Stephen Henson
9d2006d8ed
add -trusted_first option and verify flag (backport from HEAD)
2012-09-26 13:50:42 +00:00
Bodo Möller
abf1e32f2f
Fix Valgrind warning.
...
Submitted by: Adam Langley
2012-09-24 19:49:25 +00:00
Richard Levitte
fc1e09bf81
* Configure: make the debug-levitte-linux{elf,noasm} less extreme.
2012-09-24 18:49:07 +00:00
Richard Levitte
451cec33df
* ssl/t1_enc.c (tls1_change_cipher_state): Stupid bug. Fortunately in
...
debugging code that's seldom used.
2012-09-21 13:08:30 +00:00
Andy Polyakov
16c92916c7
Configure: allow for compiler options starting with double dash [from HEAD].
2012-09-19 21:00:35 +00:00
Andy Polyakov
988037fe18
MIPS assembly pack: jumbo update from HEAD.
2012-09-19 20:59:18 +00:00
Bodo Möller
9a7f80c869
Fix warning.
...
Submitted by: Chromium Authors
2012-09-17 17:23:43 +00:00
Andy Polyakov
507e5c3a61
e_aes.c: uninitialized variable in aes_ccm_init_key [from HEAD].
...
PR: 2874
Submitted by: Tomas Mraz
2012-09-15 08:46:08 +00:00
Dr. Stephen Henson
f8b90b5a5d
fix memory leak
2012-09-11 13:44:19 +00:00
Dr. Stephen Henson
dc14441757
Minor enhancement to PR#2836 fix. Instead of modifying SSL_get_certificate
...
change the current certificate (in s->cert->key) to the one used and then
SSL_get_certificate and SSL_get_privatekey will automatically work.
2012-09-11 13:35:14 +00:00
Ben Laurie
da8512aaff
Call OCSP Stapling callback after ciphersuite has been chosen, so the
...
right response is stapled. Also change SSL_get_certificate() so it
returns the certificate actually sent. See
http://rt.openssl.org/Ticket/Display.html?id=2836 .
2012-09-11 12:00:25 +00:00
Andy Polyakov
d46a1a6178
bn_lcl.h: gcc removed support for "h" constraint, which broke inline
...
assembler [from HEAD].
2012-09-01 13:21:24 +00:00
Dr. Stephen Henson
957c7c0e88
Don't load GOST ENGINE if it is already loaded.
...
Multiple copies of the ENGINE will cause problems when it is cleaned up as
the methods are stored in static structures which will be overwritten and
freed up more than once.
Set static methods to NULL when the ENGINE is freed so it can be reloaded.
2012-09-01 11:30:35 +00:00
Andy Polyakov
3ebe87473c
x86cpuid.pl: hide symbols [backport from x86_64, from HEAD].
2012-08-29 14:24:18 +00:00
Andy Polyakov
0e05b51fe5
Add linux-x32 target [from HEAD].
2012-08-29 14:12:10 +00:00
Dr. Stephen Henson
c759e453bc
PR: 2786
...
Reported by: Tomas Mraz <tmraz@redhat.com >
Treat a NULL value passed to drbg_free_entropy callback as non-op. This
can happen if the call to fips_get_entropy fails.
2012-08-22 22:43:03 +00:00
Andy Polyakov
40ce8fca73
sha1-armv4-large.pl: comply with ABI [from HEAD].
2012-08-17 19:58:34 +00:00
Andy Polyakov
8e1c33e160
MIPS assembly pack updates from HEAD.
2012-08-17 09:41:30 +00:00
Andy Polyakov
13b0cae256
aes-mips.pl: harmonize with fips module.
...
PR: 2863
Submitted by: Duane Sand
2012-08-17 09:03:57 +00:00
Bodo Möller
6d78a93b5b
Enable message names for TLS 1.1, 1.2 with -msg.
2012-08-16 13:42:37 +00:00
Andy Polyakov
ae92994645
bss_dgram.c: fix compilation failure and warning on Windows with
...
contemporary SDK [from HEAD].
2012-08-14 09:53:41 +00:00
Andy Polyakov
c4aa6b041b
gosthash.c: use memmove in circle_xor8, as input pointers can be equal
...
[from HEAD].
PR: 2858
2012-08-13 16:37:58 +00:00
Andy Polyakov
80158304f0
./Configure: libcrypto.a can grow to many GB on Solaris 10, because of ar bug
...
[from HEAD].
PR: 2838
2012-08-13 16:16:24 +00:00
Andy Polyakov
f0a069c1a2
gcm128.c: fix AAD-only case with AAD length not divisible by 16 [from HEAD].
...
PR: 2859
Submitted by: John Foley
2012-08-13 15:31:10 +00:00
Dr. Stephen Henson
5b4b9ce976
Don't ignore (!) reference count in X509_STORE_free.
2012-07-19 12:48:02 +00:00
Dr. Stephen Henson
7fbcc2f24a
type
2012-07-13 11:17:56 +00:00
Richard Levitte
e4be79a383
Add the missing dh_rfc5114 and evp_cnf.
2012-07-05 13:00:45 +00:00
Richard Levitte
658604473f
Added aliases for symbols longer than 31 chars.
2012-07-05 09:08:18 +00:00
Richard Levitte
86bea6455c
remove duplicate symbol in crypto/symhacks.h
...
Have the new names start in column 48, that makes it easy to see when
the 31 character limit is reached (on a 80 column display, do the math)
2012-07-05 08:53:43 +00:00
Dr. Stephen Henson
1e4a6e7b7f
add missing evp_cnf.c file
2012-07-04 13:14:44 +00:00
Andy Polyakov
fd6a72fa1c
crypto/bn/*.h: move PTR_SIZE_INT to private header [from HEAD].
2012-07-04 08:51:44 +00:00
Dr. Stephen Henson
ccffdb3fdc
revert unrelated test code
2012-07-03 20:21:35 +00:00
Dr. Stephen Henson
74d89b0d93
PR: 2840
...
Reported by: David McCullough <david_mccullough@mcafee.com >
Restore fips configuration module from 0.9.8.
2012-07-03 20:20:11 +00:00
Dr. Stephen Henson
f142a71c3d
Fix memory leak.
...
Always perform nexproto callback argument initialisation in s_server
otherwise we use uninitialised data if -nocert is specified.
2012-07-03 16:37:31 +00:00
Andy Polyakov
5b7af6de43
bn_nist.c: harmonize buf in BN_nist_mod_256 with other mod functions and
...
compensate for VC buf [from HEAD].
PR: 2837
2012-07-02 14:38:22 +00:00
Andy Polyakov
ae414a0e42
bss_dgram.c: fix typos in Windows code [from HEAD].
2012-07-01 09:12:03 +00:00
Dr. Stephen Henson
a240ea8ab8
don't use pseudo digests for default values of keys
2012-06-27 14:12:01 +00:00
Andy Polyakov
8b654459be
x86_64 assembly pack: make it possible to compile with Perl located
...
on path with spaces [from HEAD].
PR: 2835
2012-06-27 12:48:50 +00:00
Dr. Stephen Henson
93cf058334
oops, add -debug_decrypt option which was accidenatally left out
2012-06-19 13:39:17 +00:00
Andy Polyakov
3e8b4b5055
bss_dgram.c: add BIO_CTRL_DGRAM_SET_DONT_FRAG, fix bugs [from HEAD].
...
PR: 2830, 2833
2012-06-19 12:28:47 +00:00
Ben Laurie
3c56d65a41
Fix memory leak.
2012-06-11 09:23:38 +00:00
Dr. Stephen Henson
e51ec51af9
revert more "version skew" changes that break FIPS builds
2012-06-10 23:02:06 +00:00
Dr. Stephen Henson
ff1c55e983
Revert "version skew" patches that break FIPS compilation
2012-06-09 23:36:38 +00:00
Ben Laurie
835d104f46
Rearrange and test authz extension.
2012-06-07 13:20:20 +00:00
Ben Laurie
aeba1ef352
Fix memory leak.
2012-06-06 12:58:35 +00:00
Ben Laurie
49e9f751a4
Fix authz parsing.
2012-06-06 12:45:14 +00:00
Ben Laurie
ff46820da6
Version skew reduction.
2012-06-06 12:41:46 +00:00
Andy Polyakov
6fba65e20d
x86gas.pl: update from HEAD.
2012-06-04 22:14:25 +00:00
Ben Laurie
68d2cf51bc
Reduce version skew: trivia (I hope).
2012-06-03 22:03:37 +00:00
Ben Laurie
19eedffcaf
Don't insert in the middle.
2012-05-29 18:58:43 +00:00
Ben Laurie
4e14996e8a
Missing from previous commit.
2012-05-29 18:39:32 +00:00
Ben Laurie
8a02a46a5c
RFC 5878 support.
2012-05-29 17:27:48 +00:00
Ben Laurie
0de5a0feee
Work around macro issue with FreeBSD and gcc 4.6.
2012-05-18 12:40:28 +00:00
Andy Polyakov
4d321e0767
s2_clnt.c: compensate for compiler bug [from HEAD].
2012-05-16 18:22:15 +00:00
Andy Polyakov
67fda0c12e
ppccap.c: assume no features under 32-bit AIX kernel [from HEAD].
...
PR: 2810
2012-05-16 18:18:14 +00:00
Dr. Stephen Henson
1dded7f7e8
Experimental multi-implementation support for FIPS capable OpenSSL.
...
When in FIPS mode the approved implementations are used as normal,
when not in FIPS mode the internal unapproved versions are used instead.
This means that the FIPS capable OpenSSL isn't forced to use the
(often lower perfomance) FIPS implementations outside FIPS mode.
2012-05-13 18:40:12 +00:00
Dr. Stephen Henson
482f238069
PR: 2813
...
Reported by: Constantine Sapuntzakis <csapuntz@gmail.com >
Fix possible deadlock when decoding public keys.
2012-05-11 13:53:23 +00:00
Dr. Stephen Henson
5e145e54cc
PR: 2811
...
Reported by: Phil Pennock <openssl-dev@spodhuis.org >
Make renegotiation work for TLS 1.2, 1.1 by not using a lower record
version client hello workaround if renegotiating.
2012-05-11 13:33:34 +00:00
Dr. Stephen Henson
df73e68a43
PR: 2806
...
Submitted by: PK <runningdoglackey@yahoo.com >
Correct ciphersuite signature algorithm definitions.
2012-05-10 18:25:31 +00:00
Dr. Stephen Henson
e7c8483891
Sanity check record length before skipping explicit IV in TLS 1.2, 1.1 and
...
DTLS to fix DoS attack.
Thanks to Codenomicon for discovering this issue using Fuzz-o-Matic
fuzzing as a service testing platform.
(CVE-2012-2333)
2012-05-10 16:03:36 +00:00
Richard Levitte
712d523484
Don't forget to install srtp.h as well
2012-05-10 15:01:26 +00:00
Dr. Stephen Henson
24547c23ca
Reported by: Solar Designer of Openwall
...
Make sure tkeylen is initialised properly when encrypting CMS messages.
2012-05-10 13:44:24 +00:00
Richard Levitte
8baf604a39
Correct environment variable is OPENSSL_ALLOW_PROXY_CERTS.
2012-05-04 10:43:24 +00:00
Andy Polyakov
95416ce5b3
ppccpuid.pl: branch hints in OPENSSL_cleanse impact small block performance
...
of digest algorithms, mosty SHA, on Power7. Mystery of century, why SHA,
why slower algorithm are affected more... [from HEAD].
PR: 2794
Submitted by: Ashley Lai
2012-04-27 20:19:23 +00:00
Dr. Stephen Henson
a56f9a612b
Don't try to use unvalidated composite ciphers in FIPS mode
2012-04-26 18:51:26 +00:00
Andy Polyakov
0ae89cf32e
CHANGES: clarify.
2012-04-26 07:34:09 +00:00
Andy Polyakov
7e0c9630a3
CHANGES: fix typos and clarify.
2012-04-26 07:24:28 +00:00
Dr. Stephen Henson
a6df6702c6
Change value of SSL_OP_NO_TLSv1_1 to avoid clash with SSL_OP_ALL and
...
OpenSSL 1.0.0. Add CHANGES entry noting the consequences.
2012-04-25 23:06:31 +00:00
Andy Polyakov
f69abd5321
s23_clnt.c: ensure interoperability by maitaining client "version capability"
...
vector contiguous [from HEAD].
PR: 2802
2012-04-25 22:07:03 +00:00
Dr. Stephen Henson
fe9ce2b7d6
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr>
...
Reviewed by: steve
Improved localisation of TLS extension handling and code tidy.
2012-04-24 12:15:17 +00:00
Andy Polyakov
8e7ccf6ff7
objxref.pl: improve portability [from HEAD].
2012-04-22 21:19:41 +00:00
Dr. Stephen Henson
51b77c0337
correct error code
2012-04-22 13:31:19 +00:00
Dr. Stephen Henson
85d179d4eb
check correctness of errors before updating them so we don't get bogus errors added
2012-04-22 13:25:41 +00:00
Dr. Stephen Henson
890f5ada82
correct old FAQ answers, sync with HEAD
2012-04-22 13:21:15 +00:00
Dr. Stephen Henson
1cc8410e36
PR: 2239
...
Submitted by: Dominik Oepen <oepen@informatik.hu-berlin.de >
Add Brainpool curves from RFC5639.
Original patch by Annie Yousar <a.yousar@informatik.hu-berlin.de >
2012-04-22 13:11:48 +00:00
Andy Polyakov
6ca7af9ec0
e_rc4_hmac_md5.c: reapply commit#21726, which was erroneously omitted [from 1.0.1].
...
PR: 2797, 2792
2012-04-20 21:45:21 +00:00
Dr. Stephen Henson
bc2c8efc80
call OPENSSL_init when calling FIPS_mode too
2012-04-20 14:43:14 +00:00
Dr. Stephen Henson
00bb875240
make ciphers work again for FIPS builds
2012-04-20 00:08:32 +00:00
Andy Polyakov
c3cb563d87
e_rc4_hmac_md5.c: last commit was inappropriate for non-x86[_64] platforms
...
[from HEAD].
PR: 2792
2012-04-19 20:42:24 +00:00
Dr. Stephen Henson
d6ef8165bb
update date
2012-04-19 16:21:49 +00:00
Dr. Stephen Henson
564a503b1b
Check for potentially exploitable overflows in asn1_d2i_read_bio
...
BUF_mem_grow and BUF_mem_grow_clean. Refuse attempts to shrink buffer
in CRYPTO_realloc_clean.
Thanks to Tavis Ormandy, Google Security Team, for discovering this
issue and to Adam Langley <agl@chromium.org > for fixing it. (CVE-2012-2110)
2012-04-19 16:19:07 +00:00
Andy Polyakov
56eeb1b28c
Makefile.org: clear yet another environment variable [from HEAD].
...
PR: 2793
2012-04-19 06:40:21 +00:00
Dr. Stephen Henson
068fc255ac
only call FIPS_cipherinit in FIPS mode
2012-04-18 22:42:06 +00:00
Andy Polyakov
cc8f2fb917
e_rc4_hmac_md5.c: update from HEAD, fixes crash on legacy Intel CPUs.
...
PR: 2792
2012-04-18 17:51:26 +00:00
Dr. Stephen Henson
b583ebb7dd
recognise X9.42 DH certificates on servers
2012-04-18 17:03:45 +00:00
Dr. Stephen Henson
f897fe4146
correct error code
2012-04-18 15:17:39 +00:00
Bodo Möller
bb3add20f3
Disable SHA-2 ciphersuites in < TLS 1.2 connections.
...
(TLS 1.2 clients could end up negotiating these with an OpenSSL server
with TLS 1.2 disabled, which is problematic.)
Submitted by: Adam Langley
2012-04-17 15:21:29 +00:00
Dr. Stephen Henson
48e0f6667b
Additional workaround for PR#2771
...
If OPENSSL_MAX_TLS1_2_CIPHER_LENGTH is set then limit the size of client
ciphersuites to this value. A value of 50 should be sufficient.
Document workarounds in CHANGES.
2012-04-17 14:47:14 +00:00
Dr. Stephen Henson
32213fb25a
Partial workaround for PR#2771.
...
Some servers hang when presented with a client hello record length exceeding
255 bytes but will work with longer client hellos if the TLS record version
in client hello does not exceed TLS v1.0. Unfortunately this doesn't fix all
cases...
2012-04-17 13:20:37 +00:00
Andy Polyakov
f6a1939f0f
OPENSSL_NO_SOCK fixes [from HEAD].
...
PR: 2791
Submitted by: Ben Noordhuis
2012-04-16 17:43:02 +00:00
Andy Polyakov
94c666479d
Minor compatibility fixes [from HEAD].
...
PR: 2790
Submitted by: Alexei Khlebnikov
2012-04-16 17:35:48 +00:00
Andy Polyakov
09f17419a6
s3_srvr.c: fix typo [from HEAD].
...
PR: 2538
2012-04-15 17:23:54 +00:00
Andy Polyakov
eb8a65db16
e_aes_cbc_hmac_sha1.c: handle zero-length payload and engage empty frag
...
countermeasure [from HEAD].
PR: 2778
2012-04-15 14:23:26 +00:00
Andy Polyakov
e6255a7d1e
s390x asm pack: fix typos.
2012-04-12 06:46:49 +00:00
Dr. Stephen Henson
65a0f68484
Add options to set additional type specific certificate chains to
...
s_server.
2012-04-11 16:54:07 +00:00
Dr. Stephen Henson
e1a7db8fdd
use different variable for chain iteration
2012-04-11 16:01:20 +00:00
Dr. Stephen Henson
65331f225a
oops, macro not present in OpenSSL 1.0.2
2012-04-11 15:10:48 +00:00
Dr. Stephen Henson
64e8dc7981
fix reset fix
2012-04-11 15:05:33 +00:00
Dr. Stephen Henson
737fe7ea29
make reinitialisation work for CMAC
2012-04-11 12:26:27 +00:00
Dr. Stephen Henson
b344a826ad
update rather ancient EVP digest documentation
2012-04-10 22:28:13 +00:00
Andy Polyakov
bc0f56d6d7
aes-s390x.pl: fix crash in AES_set_decrypt_key in linux32-s390x build [from HEAD].
2012-04-09 15:12:30 +00:00
Dr. Stephen Henson
3a89e9f106
update year
2012-04-07 22:14:16 +00:00
Dr. Stephen Henson
79e75e04ea
recognise DECLARE_PEM_write_const, update ordinals
...
(backport from HEAD)
2012-04-07 20:48:12 +00:00
Dr. Stephen Henson
c3cb069108
transparently handle X9.42 DH parameters
...
(backport from HEAD)
2012-04-07 20:42:44 +00:00
Dr. Stephen Henson
cdb41713a4
Document RFC5114 "generation" options.
...
(backport from HEAD)
2012-04-07 20:42:17 +00:00
Dr. Stephen Henson
491734eb21
Initial experimental support for X9.42 DH parameter format to handle
...
RFC5114 parameters and X9.42 DH public and private keys.
(backport from HEAD)
2012-04-07 20:22:11 +00:00
Dr. Stephen Henson
4e891a191d
branches: 1.2.2;
...
Correct some parameter values.
(backport from HEAD)
2012-04-07 17:41:51 +00:00
Dr. Stephen Henson
b73a69a9c2
Update DH_check() to peform sensible checks when q parameter is present.
...
(backport from HEAD)
2012-04-07 17:40:08 +00:00
Dr. Stephen Henson
e811eff5a9
Add RFC5114 DH parameters to OpenSSL. Add test data to dhtest.
...
(backport from HEAD)
2012-04-07 12:19:50 +00:00
Dr. Stephen Henson
1d0c47fd55
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr>
...
Localize client hello extension parsing in t1_lib.c
(backport from HEAD)
2012-04-06 20:16:09 +00:00
Dr. Stephen Henson
e46c807e4f
Add support for automatic ECDH temporary key parameter selection. When
...
enabled instead of requiring an application to hard code a (possibly
inappropriate) parameter set and delve into EC internals we just
automatically use the preferred curve.
(backport from HEAD)
2012-04-06 20:15:50 +00:00
Dr. Stephen Henson
c132ca95c0
Tidy up EC parameter check code: instead of accessing internal structures
...
add utility functions to t1_lib.c to check if EC certificates and parameters
are consistent with peer.
(backport from HEAD)
2012-04-06 20:14:53 +00:00
Dr. Stephen Henson
6b870763ac
Initial revision of ECC extension handling.
...
Tidy some code up.
Don't allocate a structure to handle ECC extensions when it is used for
default values.
Make supported curves configurable.
Add ctrls to retrieve shared curves: not fully integrated with rest of
ECC code yet.
(backport from HEAD)
2012-04-06 20:12:35 +00:00
Dr. Stephen Henson
5505818199
New ctrls to retrieve supported signature algorithms and curves and
...
extensions to s_client and s_server to print out retrieved valued.
Extend CERT structure to cache supported signature algorithm data.
(backport from HEAD)
2012-04-06 19:29:49 +00:00
Dr. Stephen Henson
7493bcc659
initialise i if n == 0
...
(backport from HEAD)
2012-04-06 17:36:40 +00:00
Dr. Stephen Henson
a068a1d0e3
Add new APIs EC_curve_nist2nid and EC_curve_nid2nist which convert
...
between NIDs and the more common NIST names such as "P-256". Enhance
ecparam utility and ECC method to recognise the NIST names for curves.
(backport from HEAD)
2012-04-06 17:35:01 +00:00
Dr. Stephen Henson
37b16c84bb
Add support for distinct certificate chains per key type and per SSL
...
structure.
Before this the only way to add a custom chain was in the parent SSL_CTX
(which is shared by all key types and SSL structures) or rely on auto
chain building (which is performed on each handshake) from the trust store.
(backport from HEAD)
2012-04-06 17:22:48 +00:00
Dr. Stephen Henson
0ac89e8f54
Backport: code tidy (from HEAD)
2012-04-06 12:02:43 +00:00
Dr. Stephen Henson
7e65b21a24
Backport: Revise ssl code to use CERT_PKEY structure when outputting a certificate chain (from HEAD)
2012-04-06 12:00:24 +00:00
Dr. Stephen Henson
736d69750d
Backport: tidy/enhance certificate chain output code (from HEAD)
2012-04-06 11:58:17 +00:00
Dr. Stephen Henson
0cb9dbed4e
Backport: allow key agreement in SSL/TLS certificates (from HEAD)
2012-04-06 11:36:35 +00:00
Dr. Stephen Henson
6cfccfec33
Backport: initialise dh_clnt (from HEAD)
2012-04-06 11:35:45 +00:00
Dr. Stephen Henson
c523eb98d1
Backport DH client certificate support (from HEAD)
2012-04-06 11:34:42 +00:00
Dr. Stephen Henson
0ffa49970b
Backport support for fixed DH ciphersuites (from HEAD)
2012-04-06 11:33:12 +00:00
Andy Polyakov
8cd2ea552e
aes-armv4.pl: make it more foolproof [inspired by aes-s390x.pl in 1.0.1].
2012-04-05 08:32:08 +00:00
Andy Polyakov
3f0becbf75
aes-s390x.pl: fix endless loop in linux32-s390x build [from 1.0.1].
2012-04-05 08:17:47 +00:00
Andy Polyakov
1b0ae81f4a
ssl/ssl_ciph.c: interim solution for assertion in d1_pkt.c(444) [from HEAD].
...
PR: 2778
2012-04-04 20:50:58 +00:00
Andy Polyakov
54543b954c
CHANGES: harmonize with 1.0.0 and 1.0.1.
2012-03-31 18:56:07 +00:00
Dr. Stephen Henson
5e2187f7ee
PR: 2778(part)
...
Submitted by: John Fitzgibbon <john_fitzgibbon@yahoo.com >
Time is always encoded as 4 bytes, not sizeof(Time).
2012-03-31 18:02:53 +00:00
Andy Polyakov
7b087bf4a9
modes_lcl.h: make it work on i386 [from HEAD].
...
PR: 2780
2012-03-31 17:03:43 +00:00
Andy Polyakov
9df9c9d102
vpaes-x86[_64].pl: handle zero length in vpaes_cbc_encrypt [from HEAD].
...
PR: 2775
2012-03-31 16:55:34 +00:00
Andy Polyakov
7e8b5493a4
util/cygwin.sh update [from HEAD].
...
PR: 2761
Submitted by: Corinna Vinschen
2012-03-31 11:07:09 +00:00
Andy Polyakov
265863c6a4
bn/bn_gf2m.c: make new BN_GF2m_mod_inv work with BN_DEBUG_RAND [from HEAD].
2012-03-30 17:41:00 +00:00
Andy Polyakov
2fee1e0666
ans1/tasn_prn.c: avoid bool in variable names [from HEAD].
...
PR: 2776
2012-03-29 19:11:59 +00:00
Andy Polyakov
b4ff166cbc
perlasm/x86masm.pl: fix last fix [from HEAD].
2012-03-29 19:11:08 +00:00
Dr. Stephen Henson
861a0722c2
fix leak
2012-03-22 16:28:21 +00:00
Dr. Stephen Henson
b1cef8d984
Submitted by: Markus Friedl <mfriedl@gmail.com>
...
Fix memory leaks in 'goto err' cases.
2012-03-22 15:43:28 +00:00
Dr. Stephen Henson
b911523977
set version to 1.0.2-dev
2012-03-22 15:29:21 +00:00
cvs2svn
247c3f6049
This commit was manufactured by cvs2svn to create branch
...
'OpenSSL_1_0_2-stable'.
2012-03-21 21:32:58 +00:00
Dr. Stephen Henson
78c5d2a9bb
use client version when deciding whether to send supported signature algorithms extension
2012-03-21 21:32:57 +00:00
Dr. Stephen Henson
3bf4e14cc3
Always use SSLv23_{client,server}_method in s_client.c and s_server.c,
...
the old code came from SSLeay days before TLS was even supported.
2012-03-18 18:16:05 +00:00
Andy Polyakov
d68d160cb7
bsaes-x86_64.pl: optimize key conversion [from HEAD].
2012-03-16 21:45:51 +00:00
Dr. Stephen Henson
202cb42fbb
remove trailing slash
2012-03-14 22:20:40 +00:00
Richard Levitte
49f6cb968f
cipher should only be set to PSK if JPAKE is used.
2012-03-14 12:39:00 +00:00
Dr. Stephen Henson
07e120b7da
update STATUS
2012-03-14 12:14:06 +00:00
Dr. Stephen Henson
f3dcae15ac
prepare for 1.0.1 release
2012-03-14 12:04:40 +00:00
Dr. Stephen Henson
25ec498dc7
update NEWS
2012-03-13 22:49:27 +00:00
Andy Polyakov
9cc42cb091
ssl/t1_enc.c: pay attention to EVP_CIPH_FLAG_CUSTOM_CIPHER [from HEAD].
2012-03-13 19:21:15 +00:00
Andy Polyakov
bcf9cf89e7
x86_64-xlate.pl: remove old kludge.
...
PR: 2435,2440
2012-03-13 19:19:31 +00:00
Dr. Stephen Henson
f0729fc3e0
corrected fix to PR#2711 and also cover mime_param_cmp
2012-03-12 16:29:47 +00:00
Dr. Stephen Henson
8186c00ef3
Fix for CMS/PKCS7 MMA. If RSA decryption fails use a random key and
...
continue with symmetric decryption process to avoid leaking timing
information to an attacker.
Thanks to Ivan Nestlerode <inestlerode@us.ibm.com > for discovering
this issue. (CVE-2012-0884)
2012-03-12 16:27:50 +00:00
Dr. Stephen Henson
c0b31ccb87
PR: 2744
...
Submitted by: Dmitry Belyavsky <beldmit@gmail.com >
CMS support for ccgost engine
2012-03-11 13:40:05 +00:00
Dr. Stephen Henson
267c950c5f
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr>
...
Add more extension names in s_cb.c extension printing code.
2012-03-09 18:37:41 +00:00
Dr. Stephen Henson
ce1605b508
PR: 2756
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix DTLS timeout handling.
2012-03-09 15:52:20 +00:00
Dr. Stephen Henson
66fdb1c0d4
check return value of BIO_write in PKCS7_decrypt
2012-03-08 14:02:51 +00:00
Dr. Stephen Henson
25bfdca16a
PR: 2755
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reduce MTU after failed transmissions.
2012-03-06 13:47:27 +00:00
Dr. Stephen Henson
9c284f9651
PR: 2748
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix possible DTLS timer deadlock.
2012-03-06 13:24:16 +00:00
Andy Polyakov
6d78c381f6
Configure: make no-whirlpool work [from HEAD].
2012-03-03 13:18:06 +00:00
Richard Levitte
784e2080df
On OpenVMS, try sha256 and sha512 et al as well.
2012-03-01 21:29:58 +00:00
Richard Levitte
70505bc334
For OpenVMS, use inttypes.h instead of stdint.h
2012-03-01 21:29:16 +00:00
Dr. Stephen Henson
8e8b247341
PR: 2743
...
Reported by: Dmitry Belyavsky <beldmit@gmail.com >
Fix memory leak if invalid GOST MAC key given.
2012-02-29 14:12:52 +00:00
Dr. Stephen Henson
a8595879ec
PR: 2742
...
Reported by: Dmitry Belyavsky <beldmit@gmail.com >
If resigning with detached content in CMS just copy data across.
2012-02-29 14:01:53 +00:00
Dr. Stephen Henson
33a688e806
Fix memory leak cause by race condition when creating public keys.
...
Thanks to Ivan Nestlerode <inestlerode@us.ibm.com > for reporting this bug.
2012-02-28 14:47:16 +00:00
Andy Polyakov
5c2bfad9b4
x86cpuid.pl: fix processor capability detection on pre-586 [from HEAD].
2012-02-28 14:20:34 +00:00
Dr. Stephen Henson
250f979237
PR: 2736
...
Reported by: Remi Gacogne <rgacogne-bugs@coredump.fr >
Preserve unused bits value in non-canonicalised ASN1_STRING structures
by using ASN1_STRING_copy which preseves flags.
2012-02-27 18:45:18 +00:00
Dr. Stephen Henson
b527b6e8ff
PR: 2737
...
Submitted by: Remi Gacogne <rgacogne-bugs@coredump.fr >
Fix double free in PKCS12_parse if we run out of memory.
2012-02-27 16:46:45 +00:00
Dr. Stephen Henson
a54ce007e6
PR: 2739
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix padding bugs in Heartbeat support.
2012-02-27 16:38:10 +00:00
Dr. Stephen Henson
4ed1f3490e
PR: 2735
...
Make cryptodev digests work. Thanks to Nikos Mavrogiannopoulos for
this fix.
2012-02-27 16:33:25 +00:00
Dr. Stephen Henson
0a082e9b37
free headers after use in error message
2012-02-27 16:27:09 +00:00
Dr. Stephen Henson
236a99a409
Detect symmetric crypto errors in PKCS7_decrypt.
...
Thanks to Ivan Nestlerode <inestlerode@us.ibm.com > for reporting this bug.
2012-02-27 15:22:54 +00:00
Andy Polyakov
04b4363ec8
Configure: remove adding of -D_XPG4_2 -D__EXTENSIONS__ in sctp builds,
...
see corresponding commit to HEAD for details.
2012-02-26 22:03:41 +00:00
Andy Polyakov
37ebc20093
seed.c: Solaris portability fix from HEAD.
2012-02-26 21:53:28 +00:00
Dr. Stephen Henson
cef781cc87
PR: 2730
...
Submitted by: Arpadffy Zoltan <Zoltan.Arpadffy@scientificgames.se >
VMS fixes: disable SCTP by default.
2012-02-25 17:58:03 +00:00
Dr. Stephen Henson
08e4c7a967
correct CHANGES
2012-02-23 22:13:59 +00:00
Dr. Stephen Henson
697e4edcad
PR: 2711
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Tolerate bad MIME headers in parser.
2012-02-23 21:50:32 +00:00
Dr. Stephen Henson
b26297ca51
PR: 2696
...
Submitted by: Rob Austein <sra@hactrn.net >
Fix inverted range problem in RFC3779 code.
Thanks to Andrew Chi for generating test cases for this bug.
2012-02-23 21:31:22 +00:00
Dr. Stephen Henson
6ca7dba0cf
PR: 2727
...
Submitted by: Bruce Stephens <bruce.stephens@isode.com >
Use same construct for EXHEADER in srp/Makefile as other makefiles to cope
with possibly empty EXHEADER.
2012-02-23 13:49:22 +00:00
Dr. Stephen Henson
f1fa05b407
ABI compliance fixes.
...
Move new structure fields to end of structures.
Import library codes from 1.0.0 and recreate new ones.
2012-02-22 14:01:44 +00:00
Dr. Stephen Henson
02e22c35fe
update NEWS
2012-02-21 14:21:32 +00:00
Dr. Stephen Henson
b935714237
typo
2012-02-17 17:31:32 +00:00
Dr. Stephen Henson
a8314df902
Fix bug in CVE-2011-4619: check we have really received a client hello
...
before rejecting multiple SGC restarts.
2012-02-16 15:25:39 +00:00
Dr. Stephen Henson
0cd7a0325f
Additional compatibility fix for MDC2 signature format.
...
Update RSA EVP_PKEY_METHOD to use the OCTET STRING form of MDC2 signature:
this will make all versions of MDC2 signature equivalent.
2012-02-15 14:14:01 +00:00
Dr. Stephen Henson
16b7c81d55
An incompatibility has always existed between the format used for RSA
...
signatures and MDC2 using EVP or RSA_sign. This has become more apparent
when the dgst utility in OpenSSL 1.0.0 and later switched to using the
EVP_DigestSign functions which call RSA_sign.
This means that the signature format OpenSSL 1.0.0 and later used with
dgst -sign and MDC2 is incompatible with previous versions.
Add detection in RSA_verify so either format works.
Note: MDC2 is disabled by default in OpenSSL and very rarely used in practice.
2012-02-15 14:00:09 +00:00
Dr. Stephen Henson
424ba8b588
PR: 2708
...
Submitted by: Bruce Stephens <bruce.stephens@isode.com >
Translate path separators correctly for $fipsdir in util/mk1mf.pl
2012-02-12 23:20:21 +00:00
Dr. Stephen Henson
bf493e8d62
PR: 2713
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Move libraries that are not needed for dynamic linking to Libs.private in
the .pc files
2012-02-12 18:47:36 +00:00
Dr. Stephen Henson
c714e43c8d
PR: 2717
...
Submitted by: Tim Rice <tim@multitalents.net >
Make compilation work on OpenServer 5.0.7
2012-02-11 23:38:49 +00:00
Dr. Stephen Henson
cdf9d6f6ed
PR: 2716
...
Submitted by: Adam Langley <agl@google.com >
Fix handling of exporter return value and use OpenSSL indentation in
s_client, s_server.
2012-02-11 23:21:09 +00:00
Dr. Stephen Henson
cc4b48c27c
PR: 2703
...
Submitted by: Alexey Melnikov <alexey.melnikov@isode.com >
Fix some memory and resource leaks in CAPI ENGINE.
2012-02-11 23:12:59 +00:00
Dr. Stephen Henson
cac9c92cc0
PR: 2705
...
Submitted by: Alexey Melnikov <alexey.melnikov@isode.com >
Only create ex_data indices once for CAPI engine.
2012-02-11 23:07:58 +00:00
Dr. Stephen Henson
d40abf1689
Submitted by: Eric Rescorla <ekr@rtfm.com>
...
Further fixes for use_srtp extension.
2012-02-11 22:53:48 +00:00
Andy Polyakov
69e9c69e70
apps/s_cb.c: recognize latest TLS versions [from HEAD].
2012-02-11 13:31:16 +00:00
Dr. Stephen Henson
c489ea7d01
PR: 2704
...
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr >
Fix srp extension.
2012-02-10 20:08:49 +00:00
Dr. Stephen Henson
26c6857a59
PR: 2710
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Check return codes for load_certs_crls.
2012-02-10 19:54:46 +00:00
Dr. Stephen Henson
508bd3d1aa
PR: 2714
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Make no-srp work.
2012-02-10 19:44:00 +00:00
Dr. Stephen Henson
8705846710
only cleanup ctx if we need to, save ctx flags when we do
2012-02-10 16:54:56 +00:00
Dr. Stephen Henson
c944a9696e
add fips hmac option and fips blocking overrides to command line utilities
2012-02-10 16:46:19 +00:00
Dr. Stephen Henson
943cc09d8a
Submitted by: Eric Rescorla <ekr@rtfm.com>
...
Fix encoding of use_srtp extension to be compliant with RFC5764
2012-02-10 00:03:37 +00:00
Dr. Stephen Henson
fc6800d19f
Modify client hello version when renegotiating to enhance interop with
...
some servers.
2012-02-09 15:41:44 +00:00
Andy Polyakov
d06f047b04
bn_nist.c: make new optimized code dependent on BN_LLONG [from HEAD].
2012-02-02 07:46:19 +00:00
Andy Polyakov
ddc899bada
hpux-parisc2-*: engage assembler [from HEAD] and make it link.
2012-02-02 07:42:31 +00:00
Andy Polyakov
bd479e25c7
ghash-x86.pl: engage original MMX version in no-sse2 builds [from HEAD].
2012-01-25 17:56:25 +00:00
Andy Polyakov
eaf5bd168e
x86_64-xlate.pl: 1.0.1-specific typo.
2012-01-25 17:50:23 +00:00
Dr. Stephen Henson
d7ecc206ba
only include bn.h once
2012-01-24 23:00:36 +00:00
Dr. Stephen Henson
11ea212e8c
only include evp.h once
2012-01-24 22:59:46 +00:00
Dr. Stephen Henson
cb29d8c11f
only include string.h once
2012-01-24 22:58:46 +00:00
Dr. Stephen Henson
adcea5a043
return error if md is NULL
2012-01-22 13:12:50 +00:00
Andy Polyakov
f02f7c2c4a
cryptlib.c: make even non-Windows builds "strtoull-agnostic" [from HEAD].
2012-01-21 12:18:29 +00:00
Andy Polyakov
a1e44cc14f
x86_64-xlate.pl: proper solution for RT#2620 [from HEAD].
2012-01-21 11:35:20 +00:00
Dr. Stephen Henson
d2d09bf68c
change version to beta3-dev
2012-01-19 17:14:17 +00:00
Dr. Stephen Henson
e2dfb655f7
update files for beta2 release
2012-01-19 15:46:43 +00:00
Dr. Stephen Henson
463e76b63c
prepare for beta2
2012-01-19 15:37:57 +00:00
Dr. Stephen Henson
2dc4b0dbe8
Fix for DTLS DoS issue introduced by fix for CVE-2011-4109.
...
Thanks to Antonio Martin, Enterprise Secure Access Research and
Development, Cisco Systems, Inc. for discovering this bug and
preparing a fix. (CVE-2012-0050)
2012-01-18 18:14:56 +00:00
Dr. Stephen Henson
7b23c126e6
undef some symbols that cause problems with make depend for fips builds
2012-01-18 01:40:36 +00:00
Dr. Stephen Henson
25e3d2225a
fix CHANGES entry
2012-01-17 14:19:09 +00:00
Andy Polyakov
c8e0b5d7b6
1.0.1-specific OPNESSL vs. OPENSSL typo.
...
PR: 2613
Submitted by: Leena Heino
2012-01-15 13:42:50 +00:00
Andy Polyakov
4fb7e2b445
Fix OPNESSL vs. OPENSSL typos [from HEAD].
...
PR: 2613
Submitted by: Leena Heino
2012-01-15 13:40:21 +00:00
Dr. Stephen Henson
9138e3c061
fix warning
2012-01-15 13:30:52 +00:00
Andy Polyakov
9b2a29660b
Sanitize usage of <ctype.h> functions. It's important that characters
...
are passed zero-extended, not sign-extended [from HEAD].
PR: 2682
2012-01-12 16:28:03 +00:00
Andy Polyakov
b7b4a9fa57
sparcv9cap.c: omit unused variable.
2012-01-12 14:19:52 +00:00
Andy Polyakov
1fb07a7de8
doc/apps: formatting fixes [from HEAD].
...
PR: 2683
Submitted by: Annie Yousar
2012-01-11 21:58:42 +00:00
Andy Polyakov
b9cbcaad58
speed.c: typo in pkey_print_message [from HEAD].
...
PR: 2681
Submitted by: Annie Yousar
2012-01-11 21:49:16 +00:00
Andy Polyakov
c6706a6f6c
ecdsa.pod: typo.
...
PR: 2678
Submitted by: Annie Yousar
2012-01-11 21:41:50 +00:00
Andy Polyakov
958e6a75a1
asn1/t_x509.c: fix serial number print, harmonize with a_int.c [from HEAD].
...
PR: 2675
Submitted by: Annie Yousar
2012-01-11 21:12:47 +00:00
Andy Polyakov
397977726c
aes-sparcv9.pl: clean up regexp [from HEAD].
...
PR: 2685
2012-01-11 15:32:08 +00:00
Dr. Stephen Henson
285d9189c7
PR: 2652
...
Submitted by: Arpadffy Zoltan <Zoltan.Arpadffy@scientificgames.se >
OpenVMS fixes.
2012-01-05 14:30:08 +00:00
Bodo Möller
767d3e0054
Update for 0.9.8s and 1.0.0f.
...
(While the 1.0.0f CHANGES entry on VOS PRNG seeding was missing
in the 1.0.1 branch, the actual code is here already.)
2012-01-05 13:46:27 +00:00
Bodo Möller
409d2a1b71
Fix for builds without DTLS support.
...
Submitted by: Brian Carlstrom
2012-01-05 10:22:39 +00:00
Dr. Stephen Henson
e0b9678d7f
PR: 2671
...
Submitted by: steve
Update maximum message size for certifiate verify messages to support
4096 bit RSA keys again as TLS v1.2 messages is two bytes longer.
2012-01-05 00:28:29 +00:00
Dr. Stephen Henson
166dea6ac8
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de>
...
Reviewed by: steve
Send fatal alert if heartbeat extension has an illegal value.
2012-01-05 00:23:31 +00:00
Dr. Stephen Henson
52bef4d677
disable heartbeats if tlsext disabled
2012-01-05 00:07:34 +00:00
Dr. Stephen Henson
801e5ef840
update CHANGES
2012-01-04 23:53:52 +00:00
Dr. Stephen Henson
0044739ae5
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de>, Michael Tuexen <tuexen@fh-muenster.de>
...
Reviewed by: steve
Fix for DTLS plaintext recovery attack discovered by Nadhem Alfardan and
Kenny Paterson.
2012-01-04 23:52:05 +00:00
Dr. Stephen Henson
4e44bd3650
Clear bytes used for block padding of SSL 3.0 records. (CVE-2011-4576)
2012-01-04 23:13:29 +00:00
Dr. Stephen Henson
0cffb0cd3e
fix CHANGES
2012-01-04 23:11:43 +00:00
Dr. Stephen Henson
aaa3850ccd
Only allow one SGC handshake restart for SSL/TLS. (CVE-2011-4619)
2012-01-04 23:07:54 +00:00
Dr. Stephen Henson
a17b5d5a4f
Check GOST parameters are not NULL (CVE-2012-0027)
2012-01-04 23:03:20 +00:00
Dr. Stephen Henson
2f97765bc3
Prevent malformed RFC3779 data triggering an assertion failure (CVE-2011-4577)
2012-01-04 23:01:19 +00:00
Dr. Stephen Henson
3205ca8deb
fix warnings
2012-01-04 14:46:04 +00:00
Dr. Stephen Henson
1cb4d65b87
Submitted by: Adam Langley <agl@chromium.org>
...
Reviewed by: steve
Fix memory leaks.
2012-01-04 14:25:28 +00:00
Dr. Stephen Henson
7b2dd292bc
only send heartbeat extension from server if client sent one
2012-01-03 22:03:07 +00:00
Dr. Stephen Henson
ab585551c0
prepare for 1.0.1-beta1
2012-01-03 13:30:28 +00:00
Dr. Stephen Henson
6cf0d7b999
OpenSSL 1.0.1 is now in beta.
2012-01-02 18:28:28 +00:00
Dr. Stephen Henson
9d972207f0
incomplete provisional OAEP CMS decrypt support
2012-01-02 18:16:40 +00:00
Dr. Stephen Henson
d9834ff24b
make update
2012-01-02 16:41:11 +00:00
Dr. Stephen Henson
d9c3ba05e7
update NEWS
2012-01-02 16:31:46 +00:00
Dr. Stephen Henson
03467ce6bd
recognise HEARTBEATS in mkdef.pl script
2011-12-31 23:49:45 +00:00
Dr. Stephen Henson
6e750fcb1e
update CHANGES
2011-12-31 23:07:28 +00:00
Dr. Stephen Henson
bd6941cfaa
PR: 2658
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Support for TLS/DTLS heartbeats.
2011-12-31 23:00:36 +00:00
Dr. Stephen Henson
578519edd0
make error code checking strict
2011-12-27 15:17:50 +00:00
Dr. Stephen Henson
5c05f69450
make update
2011-12-27 14:38:27 +00:00
Dr. Stephen Henson
f529dca488
fix error code
2011-12-27 14:37:43 +00:00
Dr. Stephen Henson
296aca9dcf
fix deprecated statement
2011-12-27 14:36:57 +00:00
Dr. Stephen Henson
b170703128
update default depflags
2011-12-27 14:28:25 +00:00
Dr. Stephen Henson
b300fb7734
PR: 1794
...
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr >
Reviewed by: steve
- remove some unncessary SSL_err and permit
an srp user callback to allow a worker to obtain
a user verifier.
- cleanup and comments in s_server and demonstration
for asynchronous srp user lookup
2011-12-27 14:23:22 +00:00
Dr. Stephen Henson
f89af47438
PR: 2326
...
Submitted by: Tianjie Mao <tjmao@tjmao.net >
Reviewed by: steve
Fix incorrect comma expressions and goto f_err as alert has been set.
2011-12-26 19:38:09 +00:00
Dr. Stephen Henson
7bb4f8ff12
recognise no-sctp
2011-12-25 14:59:40 +00:00
Dr. Stephen Henson
7dd6407a4c
update ordinals
2011-12-25 14:48:44 +00:00
Dr. Stephen Henson
53de315b78
recognise SCTP in mkdef.pl script
2011-12-25 14:47:46 +00:00
Dr. Stephen Henson
e065e6cda2
PR: 2535
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Add SCTP support for DTLS (RFC 6083).
2011-12-25 14:45:40 +00:00
Dr. Stephen Henson
60553cc209
typo
2011-12-23 15:03:16 +00:00
Dr. Stephen Henson
2d4c9ab518
delete unimplemented function from header file, update ordinals
2011-12-23 14:10:35 +00:00
Dr. Stephen Henson
50771f7ce3
update ordinals
2011-12-22 16:10:04 +00:00
Dr. Stephen Henson
242f8d644c
remove prototype for deleted SRP function
2011-12-22 16:01:23 +00:00
Dr. Stephen Henson
f5575cd167
New ctrl values to clear or retrieve extra chain certs from an SSL_CTX.
...
New function to retrieve compression method from SSL_SESSION structure.
Delete SSL_SESSION_get_id_len and SSL_SESSION_get0_id functions
as they duplicate functionality of SSL_SESSION_get_id. Note: these functions
have never appeared in any release version of OpenSSL.
2011-12-22 15:01:16 +00:00
Ben Laurie
dd0ddc3e78
Fix DTLS.
2011-12-20 15:05:03 +00:00
Dr. Stephen Henson
62308f3f4a
PR: 2563
...
Submitted by: Paul Green <Paul.Green@stratus.com >
Reviewed by: steve
Improved PRNG seeding for VOS.
2011-12-19 17:02:35 +00:00
Andy Polyakov
cecafcce94
update CHANGES.
2011-12-19 14:49:05 +00:00
Dr. Stephen Henson
ca0efb7594
update CHANGES
2011-12-19 14:40:02 +00:00
Andy Polyakov
1d05ff2779
apps/speed.c: fix typo in last commit.
2011-12-19 14:33:37 +00:00
Andy Polyakov
941811ccb9
apps/speed.c: Cygwin alarm() fails sometimes.
...
PR: 2655
2011-12-15 22:30:11 +00:00
Andy Polyakov
700384be8e
vpaes-x86.pl: revert previous commit and solve the problem through x86masm.pl [from HEAD].
...
PR: 2657
2011-12-15 22:20:26 +00:00
Dr. Stephen Henson
b8a22c40e0
PR: 1794
...
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr >
Reviewed by: steve
Remove unnecessary code for srp and to add some comments to
s_client.
- the callback to provide a user during client connect is
no longer necessary since rfc 5054 a connection attempt
with an srp cipher and no user is terminated when the
cipher is acceptable
- comments to indicate in s_client the (non-)usefulness of
th primalaty tests for non known group parameters.
2011-12-14 22:18:03 +00:00
Andy Polyakov
3918de9ad1
vpaes-x86.pl: portability fix.
...
PR: 2657
2011-12-14 21:30:25 +00:00
Ben Laurie
96fe35e7d4
Remove redundant TLS exporter.
2011-12-13 14:35:12 +00:00
Ben Laurie
e87afb1518
SSL export fixes (from Adam Langley).
2011-12-13 14:25:11 +00:00
Andy Polyakov
7b467c6b81
modexp512-x86_64.pl: Solaris portability fix [from HEAD].
...
PR: 2656
2011-12-12 15:12:09 +00:00
Dr. Stephen Henson
eb8ebafe87
detect and use older PKITS data
2011-12-11 16:39:56 +00:00
Dr. Stephen Henson
e559febaf1
typo
2011-12-10 01:37:55 +00:00
Dr. Stephen Henson
6bcc6d38c7
add commented out option to allow use of older PKITS data
2011-12-10 00:50:16 +00:00
Dr. Stephen Henson
8173960305
remove old -attime code, new version includes all old functionality
2011-12-10 00:42:48 +00:00
Dr. Stephen Henson
f2e590942e
implement -attime option as a verify parameter then it works with all relevant applications
2011-12-10 00:37:42 +00:00
Ben Laurie
6a4b87eb9d
Fix warning.
2011-12-09 20:15:48 +00:00
Andy Polyakov
edcba19c23
perlasm/x86gas.pl: give a hand old assemblers assembling loop instruction
...
[from HEAD].
2011-12-09 19:16:35 +00:00
Andy Polyakov
b140ae9137
cryptlib.c: allow for OPENSSL_ia32cap=~0x????? syntax for environment value
...
in question.
2011-12-09 15:46:41 +00:00
Andy Polyakov
8ee0591f28
x86-mont.pl: fix bug in integer-only squaring path.
...
PR: 2648
2011-12-09 14:26:28 +00:00
Dr. Stephen Henson
97d0c596a1
Replace expired test server and client certificates with new ones.
2011-12-08 14:45:15 +00:00
Dr. Stephen Henson
7454cba4fa
fix error discrepancy
2011-12-07 12:28:50 +00:00
Dr. Stephen Henson
5713411893
The default CN prompt message can be confusing when often the CN needs to
...
be the server FQDN: change it.
[Reported by PSW Group]
2011-12-06 00:00:51 +00:00
Ben Laurie
a0cf79e841
Fix exporter.
2011-12-02 16:49:32 +00:00
Ben Laurie
825e1a7c56
Fix warnings.
2011-12-02 14:39:41 +00:00
Bodo Möller
9f2b453338
Resolve a stack set-up race condition (if the list of compression
...
methods isn't presorted, it will be sorted on first read).
Submitted by: Adam Langley
2011-12-02 12:51:41 +00:00
Bodo Möller
a0dce9be76
Fix ecdsatest.c.
...
Submitted by: Emilia Kasper
2011-12-02 12:40:42 +00:00
Bodo Möller
cf2b938529
Fix BIO_f_buffer().
...
Submitted by: Adam Langley
Reviewed by: Bodo Moeller
2011-12-02 12:24:48 +00:00
Andy Polyakov
62f685a9cd
bn/asm/mips.pl: fix typos [from HEAD].
2011-12-01 12:17:20 +00:00
Dr. Stephen Henson
2c7d978c2d
PR: 1794
...
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr >
Reviewed by: steve
Make SRP conformant to rfc 5054.
Changes are:
- removal of the addition state after client hello
- removal of all pre-rfc srp alert ids
- sending a fatal alert when there is no srp extension but when the
server wants SRP
- removal of unnecessary code in the client.
2011-11-25 00:18:10 +00:00
Ben Laurie
8cd897a42c
Don't send NPN during renegotiation.
2011-11-24 18:22:06 +00:00
Ben Laurie
1dc44d3130
Indent.
2011-11-24 16:51:15 +00:00
Dr. Stephen Henson
2a6e3ef37e
update ordinals
2011-11-22 14:45:27 +00:00
Dr. Stephen Henson
115d528c23
add cryptlib.h to mkdef.pl
2011-11-22 14:44:42 +00:00
Dr. Stephen Henson
a310428527
Workaround so "make depend" works for fips builds.
2011-11-22 12:50:59 +00:00
Dr. Stephen Henson
7e0fd45ce3
update ordinals
2011-11-21 22:56:33 +00:00
Dr. Stephen Henson
b138ea54ee
add strp.h to mkdef.pl headers
2011-11-21 22:55:12 +00:00
Dr. Stephen Henson
d7125d8d85
move internal functions to ssl_locl.h
2011-11-21 22:52:01 +00:00
Dr. Stephen Henson
9c115a4acc
recognise NEXTPROTONEG
2011-11-21 22:35:35 +00:00
Dr. Stephen Henson
43716567f5
bcmp doesn't exist on all platforms, replace with memcmp
2011-11-21 22:29:16 +00:00
Andy Polyakov
0a8f00af34
bsaes-x86_64.pl: fix buffer overrun in tail processing [from HEAD].
2011-11-16 23:36:40 +00:00
Ben Laurie
b1d7429186
Add TLS exporter.
2011-11-15 23:51:22 +00:00
Ben Laurie
060a38a2c0
Add DTLS-SRTP.
2011-11-15 23:02:16 +00:00
Andy Polyakov
58402976b4
aes-armv4.pl: make it link.
2011-11-15 13:55:52 +00:00
Andy Polyakov
cd7b854bbb
e_rc4_hmac_md5.c: make it work on darwin64, which is configured with RC4_CHAR.
2011-11-15 12:39:48 +00:00
Andy Polyakov
aecc0756e8
aes-s390x.pl: make it link.
2011-11-15 12:20:55 +00:00
Andy Polyakov
e6ccc6ed70
Configure, e_aes.c: allow for XTS assembler implementation [from HEAD].
2011-11-15 12:19:56 +00:00
Andy Polyakov
e959a01fac
e_aes.c: jumbo update from HEAD.
2011-11-14 21:17:08 +00:00
Andy Polyakov
17674bfdf7
ec_cvt.c: performance update from HEAD.
2011-11-14 21:14:53 +00:00
Andy Polyakov
d807d4c21f
c_allc.c: add XTS ciphers [from HEAD].
2011-11-14 21:13:35 +00:00
Andy Polyakov
b4690d2eab
config: platform and poratbility updates from HEAD.
2011-11-14 21:12:53 +00:00
Andy Polyakov
886657a641
Configure, etc.: engage additional assembler modules.
2011-11-14 21:12:05 +00:00
Andy Polyakov
db896db5a7
speed.c: add ghash benchmark [from HEAD].
2011-11-14 21:09:30 +00:00
Andy Polyakov
2357ae17e7
x86 assembler pack update from HEAD.
2011-11-14 21:06:50 +00:00
Andy Polyakov
9f1c5491d2
BN update from HEAD.
2011-11-14 21:05:42 +00:00
Andy Polyakov
70b52222f5
x86_64 assembler pack update from HEAD.
2011-11-14 21:01:21 +00:00
Andy Polyakov
88cb59727c
ARM assembler pack update from HEAD.
2011-11-14 20:58:01 +00:00
Andy Polyakov
781bfdc314
Alpha assembler pack update from HEAD.
2011-11-14 20:56:15 +00:00
Andy Polyakov
b66723b23e
MIPS assembler pack update from HEAD.
2011-11-14 20:55:24 +00:00
Andy Polyakov
cf96d71c22
PPC assembler pack update from HEAD.
2011-11-14 20:54:17 +00:00
Andy Polyakov
1a111921da
PA-RISC assembler pack update from HEAD.
2011-11-14 20:50:15 +00:00
Andy Polyakov
5d9bb428bb
SPARCv9 assembler pack update from HEAD.
2011-11-14 20:48:35 +00:00
Andy Polyakov
9833757b5d
s390x assembler pack update from HEAD.
2011-11-14 20:47:22 +00:00
Andy Polyakov
4195343c0d
IA64 assembler pack update from HEAD.
2011-11-14 20:45:57 +00:00
Andy Polyakov
042bee4e5c
perlasm update from HEAD.
2011-11-14 20:44:20 +00:00
Andy Polyakov
4afba1f3d9
Mafiles updates to accomodate assembler update from HEAD.
2011-11-14 20:42:22 +00:00
Dr. Stephen Henson
5999d45a5d
DH keys have an (until now) unused 'q' parameter. When creating from DSA copy
...
q across and if q present generate DH key in the correct range. (from HEAD)
2011-11-14 14:16:09 +00:00
Dr. Stephen Henson
f69e5d6a19
Call OPENSSL_init after we've checked to see if customisation is permissible.
2011-11-14 14:15:29 +00:00
Ben Laurie
3517637702
Ignorance.
2011-11-14 02:42:26 +00:00
Ben Laurie
e2809bfb42
Next Protocol Negotiation.
2011-11-14 02:25:04 +00:00
Ben Laurie
68b33cc5c7
Add Next Protocol Negotiation.
2011-11-13 21:55:42 +00:00
Ben Laurie
4c02cf8ecc
make depend.
2011-11-13 20:23:34 +00:00
Ben Laurie
271daaf768
Fix one of the no-tlsext build errors (there are more).
2011-11-13 20:19:21 +00:00
Dr. Stephen Henson
efbb7ee432
PR: 1794
...
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr >
Reviewed by: steve
Document unknown_psk_identify alert, remove pre-RFC 5054 string from
ssl_stat.c
2011-11-13 13:13:14 +00:00
Andy Polyakov
6471ec71aa
x86cpuid.pl: compensate for imaginary virtual machines [from HEAD].
...
PR: 2633
2011-11-08 21:28:14 +00:00
Andy Polyakov
cb45708061
x86cpuid.pl: don't punish "last-year" OSes on "this-year" CPUs.
...
PR: 2633
2011-11-05 10:44:25 +00:00
Andy Polyakov
02597f2885
ppc.pl: fix bug in bn_mul_comba4 [from HEAD].
...
PR: 2636
Submitted by: Charles Bryant
2011-11-05 10:16:30 +00:00
Richard Levitte
8c6a514edf
Add missing algorithms to disable, and in particular, disable
...
EC_NISTP_64_GCC_128 by default, as GCC isn't currently supported on
VMS. Add CMAC to the modules to build, and synchronise with Unix.
2011-10-30 11:45:30 +00:00
Richard Levitte
7f3fdab793
Teach mkshared.com to have a look for disabled algorithms in opensslconf.h
2011-10-30 11:40:56 +00:00
Dr. Stephen Henson
5372f5f989
PR: 2628
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Send alert instead of assertion failure for incorrectly formatted DTLS
fragments.
2011-10-27 13:06:43 +00:00
Dr. Stephen Henson
6d24c09a69
PR: 2628
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix for ECC keys and DTLS.
2011-10-27 13:01:20 +00:00
Dr. Stephen Henson
a8d72c79db
PR: 2632
...
Submitted by: emmanuel.azencot@bull.net
Reviewed by: steve
Return -1 immediately if not affine coordinates as BN_CTX has not been
set up.
2011-10-26 16:43:23 +00:00
Dr. Stephen Henson
1f713e0106
Use correct tag for SRP username.
2011-10-25 12:52:47 +00:00
Dr. Stephen Henson
03f84c8260
Update error codes for FIPS.
...
Add support for authentication in FIPS_mode_set().
2011-10-21 13:04:27 +00:00
Dr. Stephen Henson
6d5eb464c9
Recognise new ECC option (from HEAD).
2011-10-21 12:53:07 +00:00
Bodo Möller
67f8de9ab8
"make update"
2011-10-19 15:24:44 +00:00
Bodo Möller
2d95ceedc5
BN_BLINDING multi-threading fix.
...
Submitted by: Emilia Kasper (Google)
2011-10-19 14:58:59 +00:00
Bodo Möller
6526d765fc
Fix indentation
2011-10-19 09:24:05 +00:00
Bodo Möller
3d520f7c2d
Fix warnings.
...
Also, use the common Configure mechanism for enabling/disabling the 64-bit ECC code.
2011-10-19 08:58:35 +00:00
Bodo Möller
9c37519b55
Improve optional 64-bit NIST-P224 implementation, and add NIST-P256 and
...
NIST-P521. (Now -DEC_NISTP_64_GCC_128 enables all three of these;
-DEC_NISTP224_64_GCC_128 no longer works.)
Submitted by: Google Inc.
2011-10-18 19:43:54 +00:00
Dr. Stephen Henson
7e9cfcd0dc
Recognise no-rsax option.
2011-10-15 13:22:26 +00:00
Andy Polyakov
a99ce1f5b1
e_aes.c: fix bug in aesni_gcm_tls_cipher [in HEAD].
2011-10-14 09:34:14 +00:00
Andy Polyakov
42660b3cf1
aesni-x86[_64].pl: pull from HEAD.
2011-10-14 09:21:03 +00:00
Bodo Möller
f30258c439
use -no_ecdhe when using -no_dhe
2011-10-13 15:07:05 +00:00
Bodo Möller
93ff4c69f7
Make CTR mode behaviour consistent with other modes:
...
clear ctx->num in EVP_CipherInit_ex
Submitted by: Emilia Kasper
2011-10-13 13:42:29 +00:00
Bodo Möller
79571bb1ca
Clarify warning
2011-10-13 13:25:03 +00:00
Bodo Möller
f72c1a58cb
In ssl3_clear, preserve s3->init_extra along with s3->rbuf.
...
Submitted by: Bob Buckholz <bbuckholz@google.com >
2011-10-13 13:05:35 +00:00
Dr. Stephen Henson
2461396f69
For now disable RSAX ENGINE for FIPS builds: it sets a non-FIPS RSA
...
method which stops FIPS mode working.
2011-10-13 11:43:44 +00:00
Dr. Stephen Henson
81a071df2f
increase test RSA key size to 1024 bits
2011-10-12 21:55:42 +00:00
Dr. Stephen Henson
6841abe842
update pkey method initialisation and copy
2011-10-11 18:16:02 +00:00
Dr. Stephen Henson
cb70355d87
Backport ossl_ssize_t type from HEAD.
2011-10-10 22:33:50 +00:00
Dr. Stephen Henson
b17442bb04
def_rsa_finish not used anymore.
2011-10-10 20:34:17 +00:00
Dr. Stephen Henson
4874e235fb
fix leak properly this time...
2011-10-10 14:09:05 +00:00
Dr. Stephen Henson
06afa6eb94
add GCM ciphers in SSL_library_init
2011-10-10 12:56:11 +00:00
Dr. Stephen Henson
58e4205d6c
disable GCM if not available
2011-10-10 12:40:13 +00:00
Dr. Stephen Henson
733394d6dd
Add some entries for 1.0.1 in NEWS.
2011-10-10 00:27:52 +00:00
Dr. Stephen Henson
2de9558dea
sync NEWS with 1.0.0 branch
2011-10-10 00:23:14 +00:00
Dr. Stephen Henson
6bd173fced
Don't disable TLS v1.2 by default any more.
2011-10-09 23:28:25 +00:00
Dr. Stephen Henson
6b00cd746a
Update ordinals.
2011-10-09 23:14:20 +00:00
Dr. Stephen Henson
9309ea6617
Backport PSS signature support from HEAD.
2011-10-09 23:13:50 +00:00
Dr. Stephen Henson
05c9e3aea5
fix CHANGES entry
2011-10-09 23:11:09 +00:00
Dr. Stephen Henson
88bac3e664
fix memory leaks
2011-10-09 23:09:22 +00:00
Dr. Stephen Henson
5473b6bc2f
Fix memory leak. From HEAD.
2011-10-09 16:04:17 +00:00
Dr. Stephen Henson
38e408076e
Update ordinals.
2011-10-09 15:28:52 +00:00
Dr. Stephen Henson
dc100d87b5
Backport of password based CMS support from HEAD.
2011-10-09 15:28:02 +00:00
Dr. Stephen Henson
6f6b31dadc
PR: 2482
...
Submitted by: Rob Austein <sra@hactrn.net >
Reviewed by: steve
Don't allow inverted ranges in RFC3779 code, discovered by Frank Ellermann.
2011-10-09 00:56:43 +00:00
Dr. Stephen Henson
b08b158b44
use client version when eliminating TLS v1.2 ciphersuites in client hello
2011-10-07 15:07:36 +00:00
Dr. Stephen Henson
177f27d71e
? crypto/aes/aes-armv4.S
...
? crypto/aes/aesni-sha1-x86_64.s
? crypto/aes/aesni-x86_64.s
? crypto/aes/foo.pl
? crypto/aes/vpaes-x86_64.s
? crypto/bn/.bn_lib.c.swp
? crypto/bn/armv4-gf2m.S
? crypto/bn/diffs
? crypto/bn/modexp512-x86_64.s
? crypto/bn/x86_64-gf2m.s
? crypto/bn/x86_64-mont5.s
? crypto/ec/bc.txt
? crypto/ec/diffs
? crypto/modes/a.out
? crypto/modes/diffs
? crypto/modes/ghash-armv4.S
? crypto/modes/ghash-x86_64.s
? crypto/modes/op.h
? crypto/modes/tst.c
? crypto/modes/x.h
? crypto/objects/.obj_xref.txt.swp
? crypto/rand/diffs
? crypto/sha/sha-512
? crypto/sha/sha1-armv4-large.S
? crypto/sha/sha256-armv4.S
? crypto/sha/sha512-armv4.S
Index: crypto/objects/obj_xref.c
===================================================================
RCS file: /v/openssl/cvs/openssl/crypto/objects/obj_xref.c,v
retrieving revision 1.9
diff -u -r1.9 obj_xref.c
--- crypto/objects/obj_xref.c 5 Nov 2008 18:38:58 -0000 1.9
+++ crypto/objects/obj_xref.c 6 Oct 2011 20:30:21 -0000
@@ -110,8 +110,10 @@
#endif
if (rv == NULL)
return 0;
- *pdig_nid = rv->hash_id;
- *ppkey_nid = rv->pkey_id;
+ if (pdig_nid)
+ *pdig_nid = rv->hash_id;
+ if (ppkey_nid)
+ *ppkey_nid = rv->pkey_id;
return 1;
}
@@ -144,7 +146,8 @@
#endif
if (rv == NULL)
return 0;
- *psignid = (*rv)->sign_id;
+ if (psignid)
+ *psignid = (*rv)->sign_id;
return 1;
}
Index: crypto/x509/x509type.c
===================================================================
RCS file: /v/openssl/cvs/openssl/crypto/x509/x509type.c,v
retrieving revision 1.10
diff -u -r1.10 x509type.c
--- crypto/x509/x509type.c 26 Oct 2007 12:06:33 -0000 1.10
+++ crypto/x509/x509type.c 6 Oct 2011 20:36:04 -0000
@@ -100,20 +100,26 @@
break;
}
- i=X509_get_signature_type(x);
- switch (i)
+ i=OBJ_obj2nid(x->sig_alg->algorithm);
+ if (i && OBJ_find_sigid_algs(i, NULL, &i))
{
- case EVP_PKEY_RSA:
- ret|=EVP_PKS_RSA;
- break;
- case EVP_PKEY_DSA:
- ret|=EVP_PKS_DSA;
- break;
- case EVP_PKEY_EC:
- ret|=EVP_PKS_EC;
- break;
- default:
- break;
+
+ switch (i)
+ {
+ case NID_rsaEncryption:
+ case NID_rsa:
+ ret|=EVP_PKS_RSA;
+ break;
+ case NID_dsa:
+ case NID_dsa_2:
+ ret|=EVP_PKS_DSA;
+ break;
+ case NID_X9_62_id_ecPublicKey:
+ ret|=EVP_PKS_EC;
+ break;
+ default:
+ break;
+ }
}
if (EVP_PKEY_size(pk) <= 1024/8)/* /8 because it's 1024 bits we look
2011-10-06 20:45:08 +00:00
Dr. Stephen Henson
928bd9a149
fix signed/unsigned warning
2011-09-26 17:04:41 +00:00
Dr. Stephen Henson
e53113b8ac
make sure eivlen is initialised
2011-09-24 23:06:35 +00:00
Dr. Stephen Henson
1fe83b4afe
use keyformat for -x509toreq, don't hard code PEM
2011-09-23 21:48:50 +00:00
Dr. Stephen Henson
e8f31f80d1
PR: 2606
...
Submitted by: Christoph Viethen <cv@kawo2.rwth-aachen.de >
Reviewed by: steve
Handle timezones correctly in UTCTime.
2011-09-23 13:39:35 +00:00
Dr. Stephen Henson
56f5ab43c2
PR: 2602
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS bug which prevents manual MTU setting
2011-09-23 13:35:05 +00:00
Dr. Stephen Henson
370385571c
PR: 2347
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Reviewed by: steve
Fix usage message.
2011-09-23 13:12:41 +00:00
Dr. Stephen Henson
e34a303ce1
make depend
2011-09-16 23:15:22 +00:00
Dr. Stephen Henson
36f120cd20
Improved error checking for DRBG calls.
...
New functionality to allow default DRBG type to be set during compilation or during runtime.
2011-09-16 23:12:34 +00:00
Dr. Stephen Henson
0ae7c43fa5
Improved error checking for DRBG calls.
...
New functionality to allow default DRBG type to be set during compilation
or during runtime.
2011-09-16 23:08:57 +00:00
Dr. Stephen Henson
c0d2943952
Typo.
2011-09-16 23:04:07 +00:00
Dr. Stephen Henson
7d453a3b49
Fix warnings (from HEAD).
2011-09-10 21:18:37 +00:00
Dr. Stephen Henson
cd447875e6
Initialise X509_STORE_CTX properly so CRLs with nextUpdate date in the past
...
produce an error (CVE-2011-3207)
2011-09-06 15:14:41 +00:00
Andy Polyakov
692a94293c
config: don't add -Wa options with no-asm [from HEAD].
2011-09-05 16:33:48 +00:00
Bodo Möller
efebb10829
oops
2011-09-05 13:43:53 +00:00
Bodo Möller
3c3f025923
Fix session handling.
2011-09-05 13:36:55 +00:00
Bodo Möller
5ff6e2dfbb
Fix d2i_SSL_SESSION.
2011-09-05 13:31:07 +00:00
Bodo Möller
61ac68f9f6
(EC)DH memory handling fixes.
...
Submitted by: Adam Langley
2011-09-05 10:25:27 +00:00
Bodo Möller
7f1022a8b1
Fix memory leak on bad inputs.
2011-09-05 09:57:15 +00:00
Bodo Möller
edf6b025b1
make update
2011-09-05 09:44:54 +00:00
Bodo Möller
d799df36b3
Fix expected DEFFLAG for default config.
2011-09-05 09:43:56 +00:00
Bodo Möller
9e96812934
Fix error codes.
2011-09-05 09:42:55 +00:00
Dr. Stephen Henson
91e97cbe4c
Don't use *from++ in tolower as this is implemented as a macro on some
...
platforms. Thanks to Shayne Murray <Shayne.Murray@Polycom.com > for
reporting this issue.
2011-09-02 11:28:18 +00:00
Dr. Stephen Henson
63ee3b32fe
PR: 2576
...
Submitted by: Doug Goldstein <cardoe@gentoo.org >
Reviewed by: steve
Include header file stdlib.h which is needed on some platforms to get
getenv() declaration.
2011-09-02 11:20:32 +00:00
Dr. Stephen Henson
4ff1a2da10
PR: 2340
...
Submitted by: "Mauro H. Leggieri" <mxmauro@caiman.com.ar >
Reviewed by: steve
Stop warnings if OPENSSL_NO_DGRAM is defined.
2011-09-01 15:01:55 +00:00
Dr. Stephen Henson
4c3c975066
make timing attack protection unconditional
2011-09-01 14:23:22 +00:00
Dr. Stephen Henson
ec5d74f868
PR: 2573
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS buffering and decryption bug.
2011-09-01 14:02:14 +00:00
Dr. Stephen Henson
be0853358c
PR: 2589
...
Submitted by: Thomas Jarosch <thomas.jarosch@intra2net.com >
Reviewed by: steve
Initialise p pointer.
2011-09-01 13:52:38 +00:00
Dr. Stephen Henson
fea15b553d
PR: 2588
...
Submitted by: Thomas Jarosch <thomas.jarosch@intra2net.com >
Reviewed by: steve
Close file pointer.
2011-09-01 13:49:08 +00:00
Dr. Stephen Henson
88ef78745e
PR: 2586
...
Submitted by: Thomas Jarosch <thomas.jarosch@intra2net.com >
Reviewed by: steve
Zero structure fields properly.
2011-09-01 13:45:35 +00:00
Dr. Stephen Henson
be79342515
PR: 2586
...
Submitted by: Thomas Jarosch <thomas.jarosch@intra2net.com >
Reviewed by: steve
Fix brace mismatch.
2011-09-01 13:37:28 +00:00
Dr. Stephen Henson
064a6176ac
Update ordinals.
2011-08-26 10:45:17 +00:00
Andy Polyakov
84e7485bfb
Add RC4-MD5 and AESNI-SHA1 "stitched" implementations [from HEAD].
2011-08-23 20:53:34 +00:00
Andy Polyakov
f56f72f219
eng_rsax.c: improve portability [from HEAD].
2011-08-22 19:01:41 +00:00
Andy Polyakov
2bfb23f102
modexp512-x86_64.pl: make it work with ml64 [from HEAD].
2011-08-19 06:31:27 +00:00
Dr. Stephen Henson
cf199fec52
Remove hard coded ecdsaWithSHA1 hack in ssl routines and check for RSA
...
using OBJ xref utilities instead of string comparison with OID name.
This removes the arbitrary restriction on using SHA1 only with some ECC
ciphersuites.
2011-08-14 13:47:30 +00:00
Andy Polyakov
165c20c2c4
eng_rsax.c: make it work on Win64.
2011-08-14 08:38:04 +00:00
Andy Polyakov
625c6ba4c7
eng_rdrand.c: make it link in './config 386' case [from HEAD].
2011-08-14 08:31:14 +00:00
Andy Polyakov
a32bede701
x86_64-xlate.pl: fix movzw [from HEAD].
2011-08-12 21:25:23 +00:00
Andy Polyakov
8ff5c8874f
Alpha assembler fixed from HEAD.
...
PR: 2577
2011-08-12 12:31:08 +00:00
Dr. Stephen Henson
c5d38fc262
aesni TLS GCM support
2011-08-11 23:06:37 +00:00
Dr. Stephen Henson
6b71970520
Sync EVP AES modes from HEAD.
2011-08-11 22:52:06 +00:00
Dr. Stephen Henson
0209e111f6
Add XTS OIDs from HEAD.
2011-08-11 22:51:37 +00:00
Dr. Stephen Henson
dc01af7723
Sync ASM/modes to add CCM and XTS modes and assembly language optimisation
...
(from HEAD, original by Andy).
2011-08-11 22:36:19 +00:00
Dr. Stephen Henson
5435d0412f
prevent compilation errors and warnings
2011-08-11 21:12:01 +00:00
Andy Polyakov
922ac25f64
Add provisory support for RDRAND [from HEAD].
2011-08-10 18:53:13 +00:00
Dr. Stephen Henson
aed53d6c5a
Backport GCM support from HEAD.
2011-08-04 11:13:28 +00:00
Dr. Stephen Henson
61cdb9f36a
Backport GCM support from HEAD. Minimal support at present: no assembly
...
language optimisation. [original by Andy]
2011-08-04 11:12:38 +00:00
Dr. Stephen Henson
1acd042c85
fix memory leak
2011-08-03 16:40:14 +00:00
Dr. Stephen Henson
572712d82a
recognise ecdsaWithSHA1 OID
2011-07-28 14:42:53 +00:00
Dr. Stephen Henson
d1697a7556
Disable rsax for Windows: it doesn't currently work.
2011-07-25 23:45:49 +00:00
Dr. Stephen Henson
c8c6e9ecd9
Add HMAC ECC ciphersuites from RFC5289. Include SHA384 PRF support and
...
prohibit use of these ciphersuites for TLS < 1.2
2011-07-25 21:45:17 +00:00
Andy Polyakov
90f3e4cf05
Back-port TLS AEAD framework [from HEAD].
2011-07-21 19:22:57 +00:00
Dr. Stephen Henson
7bd8bf58bb
stop warnings
2011-07-21 13:45:17 +00:00
Andy Polyakov
1190d3f442
Add RSAX builtin engine [from HEAD].
2011-07-20 21:51:33 +00:00
Dr. Stephen Henson
0e4f5cfbab
PR: 2559
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS socket error bug
2011-07-20 15:22:02 +00:00
Dr. Stephen Henson
f1c8db9f8c
PR: 2555
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS sequence number bug
2011-07-20 15:17:42 +00:00
Dr. Stephen Henson
2c9abbd554
PR: 2550
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS HelloVerifyRequest Timer bug
2011-07-20 15:13:43 +00:00
Dr. Stephen Henson
2305ae5d8c
PR: 2556 (partial)
...
Reported by: Daniel Marschall <daniel-marschall@viathinksoft.de >
Reviewed by: steve
Fix OID routines.
Check on encoding leading zero rejection should start at beginning of
encoding.
Allow for initial digit when testing when to use BIGNUMs which can increase
first value by 2 * 40.
2011-07-14 12:01:36 +00:00
Andy Polyakov
dec54bd0ba
ms/uplink.c: fix Visual Studio 2010 warning [from HEAD].
2011-07-13 14:54:56 +00:00
Andy Polyakov
aade369737
config: config: detect if assembler supports --noexecstack and pass it down
...
[from HEAD].
2011-07-13 14:25:22 +00:00
Andy Polyakov
2a5e042c70
perlasm/cbc.pl: fix tail processing bug [from HEAD].
...
PR: 2557
2011-07-13 06:22:46 +00:00
Bodo Möller
1dc4c8c727
Fix typo.
...
Submitted by: Jim Morrison
2011-07-11 12:13:56 +00:00
Dr. Stephen Henson
7ca035db88
Update ordinals.
2011-07-08 12:12:30 +00:00
Andy Polyakov
a460c42f94
x86_64-xlate.pl: update from HEAD.
2011-07-04 13:11:55 +00:00
Andy Polyakov
d16743e728
sha1-x86_64.pl: nasm-related update from HEAD.
2011-07-04 13:01:42 +00:00
Andy Polyakov
4a29fa8caf
sha1-x86_64.pl: fix win64-specific typos and add masm support [from HEAD].
2011-07-01 21:24:39 +00:00
Andy Polyakov
250bb54dba
x86_64-xlate.pl: masm-specific update.
2011-07-01 21:22:13 +00:00
Dr. Stephen Henson
847d05d0b4
No need for trailing slash any more.
2011-07-01 14:15:02 +00:00
Dr. Stephen Henson
8315aa03fc
Fix assembly language function renaming so it works on WIN64.
2011-07-01 14:13:52 +00:00
Andy Polyakov
b7a4c480d6
Configure: add aesni-x86_64.o to VC-WIN64A line.
2011-06-28 18:20:25 +00:00
Andy Polyakov
9a35faaa29
rc4-x86[_64].pl: back-sync with original 1.0.1.
2011-06-28 15:04:31 +00:00
Andy Polyakov
fbe2e28911
AES-NI backport from HEAD. Note that e_aes.c doesn't implement all modes
...
from HEAD yet, more will be back-ported later.
2011-06-28 14:49:35 +00:00
Andy Polyakov
84968e25f3
x86[_64] assembler pack: back-port SHA1 and RC4 from HEAD.
2011-06-28 13:53:50 +00:00
Andy Polyakov
10fd0b7b55
x86[_64]cpuid.pl: harmonize OPENSSL_ia32_cpuid [from HEAD].
2011-06-28 13:40:19 +00:00
Andy Polyakov
4a46dc6e5c
x86[_64] perlasm: pull-in from HEAD.
2011-06-28 13:33:47 +00:00
Andy Polyakov
0ec55604c0
Expand OPENSSL_ia32cap_P to 64 bits. It might appear controversial, because
...
such operation can be considered as breaking binary compatibility. However!
OPNESSL_ia32cap_P is accessed by application through pointer returned by
OPENSSL_ia32cap_loc() and such change of *internal* OPENSSL_ia32cap_P
declaration is possible specifically on little-endian platforms, such as
x86[_64] ones in question. In addition, if 32-bit application calls
OPENSSL_ia32cap_loc(), it clears upper half of capability vector maintaining
the illusion that it's still 32 bits wide.
2011-06-28 13:31:58 +00:00
Dr. Stephen Henson
500007c9ed
auto detect configuration using KERNEL_BITS and CC
2011-06-27 11:39:01 +00:00
Dr. Stephen Henson
f75abba013
allow KERNEL_BITS to be specified in the environment
2011-06-24 14:04:18 +00:00
Dr. Stephen Henson
dea113b428
PR: 2470
...
Submitted by: Corinna Vinschen <vinschen@redhat.com >
Reviewed by: steve
Don't call ERR_remove_state from DllMain.
2011-06-22 15:38:40 +00:00
Dr. Stephen Henson
6abc406a69
PR: 2543
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Correctly handle errors in DTLSv1_handle_timeout()
2011-06-22 15:30:04 +00:00
Dr. Stephen Henson
dcbe723bc5
PR: 2540
...
Submitted by: emmanuel.azencot@bull.net
Reviewed by: steve
Prevent infinite loop in BN_GF2m_mod_inv().
2011-06-22 15:23:40 +00:00
Dr. Stephen Henson
33c98a28ac
correctly encode OIDs near 2^32
2011-06-22 15:15:48 +00:00
Dr. Stephen Henson
b2ddddfb20
allow MD5 use for computing old format hash links
2011-06-22 02:18:06 +00:00
Dr. Stephen Henson
c24367ebb9
Don't set FIPS rand method at same time as RAND method as this can cause
...
the FIPS library to fail. Applications that want to set the FIPS rand
method can do so explicitly and presumably they know what they are doing...
2011-06-21 17:08:25 +00:00
Dr. Stephen Henson
7397b35379
Add FIPS error codes.
2011-06-21 16:58:10 +00:00
Dr. Stephen Henson
baee44c3de
Stop warning.
2011-06-21 16:42:15 +00:00
Dr. Stephen Henson
1f2e4ecc30
Rename all AES_set*() functions using private_ prefix.
2011-06-21 16:23:42 +00:00
Dr. Stephen Henson
955e28006d
make EVP_dss() work for DSA signing
2011-06-20 20:05:13 +00:00
Dr. Stephen Henson
bf0736eb1f
Redirect null cipher to FIPS module.
2011-06-20 20:00:10 +00:00
Dr. Stephen Henson
3a5b97b7f1
Don't set default public key methods in FIPS mode so applications
...
can switch between modes.
2011-06-20 19:41:13 +00:00
Dr. Stephen Henson
45bf825066
Set FIPSLINK correctly now trailing slash is removed from FIPSDIR.
2011-06-18 19:35:03 +00:00
Dr. Stephen Henson
4a18d5c89b
Don't add trailing slash to FIPSDIR: it causes problems with Windows builds.
2011-06-18 19:02:12 +00:00
Dr. Stephen Henson
174b26c497
Preliminary WIN32 support for FIPS capable OpenSSL building.
2011-06-17 12:50:40 +00:00
Bodo Möller
5cacc82f61
Fix the version history: given that 1.0.1 has yet to be released,
...
we should list "Changes between 1.0.0e and 1.0.1",
not "between 1.0.0d and 1.0.1".
2011-06-15 14:23:44 +00:00
Dr. Stephen Henson
29a90816ff
Update key sizes to 2048 bits.
...
Only build ssltest with fipsld.
Include FIPS mode test for ssltest.
2011-06-14 15:35:49 +00:00
Dr. Stephen Henson
4bea454021
set FIPS allow before initialising ctx
2011-06-14 15:25:41 +00:00
Dr. Stephen Henson
8bfd0ae4c4
typo
2011-06-14 13:47:25 +00:00
Dr. Stephen Henson
378943ce67
Use include dir when copiling fips_premain_dso.
2011-06-14 12:58:35 +00:00
Dr. Stephen Henson
c65d409afd
Fix warnings in shared builds.
2011-06-14 12:58:00 +00:00
Dr. Stephen Henson
ed1bbe2cad
make sure custom cipher flag doesn't use any mode bits
2011-06-13 23:10:34 +00:00
Dr. Stephen Henson
b0b3d09063
Set rand method in FIPS_mode_set() not in rand library.
2011-06-13 21:18:00 +00:00
Dr. Stephen Henson
0ede2af7a0
Redirect RAND to FIPS module in FIPS mode.
2011-06-13 20:40:52 +00:00
Dr. Stephen Henson
e8d23f7811
Redirect HMAC and CMAC operations to module.
2011-06-12 15:07:26 +00:00
Dr. Stephen Henson
907cd7217e
update ordinals
2011-06-10 17:17:55 +00:00
Dr. Stephen Henson
7c402e5af3
Disable GCM, CCM, XTS outside FIPS mode this will be updated
...
when backported.
2011-06-10 14:22:42 +00:00
Dr. Stephen Henson
b8d78a5520
add cmac to Windows build, update ordinals
2011-06-10 14:12:55 +00:00
Dr. Stephen Henson
dfa5862960
Add android platforms. Let fipsdir come from environment.
2011-06-09 21:54:13 +00:00
Dr. Stephen Henson
4276908f51
add android support to DSO (from HEAD)
2011-06-09 21:49:24 +00:00
Ben Laurie
be23b71e87
Add -attime.
2011-06-09 17:09:31 +00:00
Ben Laurie
f851acbfff
Fix warnings/errors(!).
2011-06-09 17:09:08 +00:00
Ben Laurie
78ef9b0205
Fix warnings.
2011-06-09 16:03:18 +00:00
Dr. Stephen Henson
ed9b0e5cba
Redirect DH key and parameter generation.
2011-06-09 15:21:46 +00:00
Dr. Stephen Henson
752c1a0ce9
Redirect DSA operations to FIPS module in FIPS mode.
2011-06-09 13:54:09 +00:00
Dr. Stephen Henson
cc30415d0c
Use method rsa keygen first if FIPS mode if it is a FIPS method.
2011-06-09 13:18:07 +00:00
Dr. Stephen Henson
03e16611a3
Redirect DH operations to FIPS module. Block non-FIPS methods.
...
Sync DH error codes with HEAD.
2011-06-08 15:58:59 +00:00
Dr. Stephen Henson
8e2f3c1c83
fix memory leak
2011-06-08 15:55:57 +00:00
Dr. Stephen Henson
b6d63b2516
Check fips method flags for ECDH, ECDSA.
2011-06-08 14:01:00 +00:00
Dr. Stephen Henson
e6b88d02bd
Implement Camellia_set_key properly for FIPS builds.
2011-06-08 13:11:46 +00:00
Andy Polyakov
125060ca63
rc4_skey.c: remove dead/redundant code (it's never compiled) and
...
misleading/obsolete comment [from HEAD].
2011-06-06 20:04:33 +00:00
Dr. Stephen Henson
b4baca9261
Recognise "fips" in mkdef.pl script.
2011-06-06 15:46:25 +00:00
Dr. Stephen Henson
6342b6e332
Redirection of ECDSA, ECDH operations to FIPS module.
...
Also use FIPS EC methods unconditionally for now: might want to use them
only in FIPS mode or with a switch later.
2011-06-06 15:39:17 +00:00
Dr. Stephen Henson
a6dc77822b
Set SSL_FIPS flag in ECC ciphersuites.
2011-06-06 14:14:14 +00:00
Dr. Stephen Henson
59bc67052b
Add flags field to EC_KEY structure (backport from HEAD).
2011-06-06 13:18:03 +00:00
Dr. Stephen Henson
c090562828
Make no-ec2m work again (backport from HEAD).
2011-06-06 13:00:30 +00:00
Dr. Stephen Henson
69e2ec63c5
Reorganise ECC code so it can use FIPS module.
...
Move compression, point2oct and oct2point functions into separate files.
Add a flags field to EC_METHOD.
Add a flag EC_FLAGS_DEFAULT_OCT to use the default compession and oct functions
(all existing methods do this). This removes dependencies from EC_METHOD while
keeping original functionality.
Backport from HEAD with minor changes.
2011-06-06 12:54:51 +00:00
Dr. Stephen Henson
f610a516a0
Backport from HEAD:
...
New option to disable characteristic two fields in EC code.
Make no-ec2m work on Win32 build.
2011-06-06 11:49:36 +00:00
Dr. Stephen Henson
2e51a4caa3
Function not used outside FIPS builds.
2011-06-06 11:24:47 +00:00
Dr. Stephen Henson
c6fa97a6d6
FIPS low level blocking for AES, RC4 and Camellia. This is complicated by
...
use of assembly language routines: rename the assembly language function
to the private_* variant unconditionally and perform tests from a small
C wrapper.
2011-06-05 17:36:44 +00:00
Dr. Stephen Henson
24d7159abd
Backport libcrypto audit: check return values of EVP functions instead
...
of assuming they will always suceed.
2011-06-03 20:53:00 +00:00
Dr. Stephen Henson
7978dc989d
fix error discrepancy
2011-06-03 18:50:49 +00:00
Dr. Stephen Henson
d99e6b5014
New function X509_ALGOR_set_md() to set X509_ALGOR (DigestAlgorithmIdentifier) from a digest algorithm (backport from HEAD).
2011-06-03 18:35:49 +00:00
Dr. Stephen Henson
2cf40fc2b8
license correction, no EAY code included in this file
2011-06-03 17:56:51 +00:00
Dr. Stephen Henson
260d08b814
Backport CMAC support from HEAD.
2011-06-03 15:08:42 +00:00
Dr. Stephen Henson
53dd05d8f6
Redirect RSA keygen, sign, verify to FIPS module.
2011-06-03 13:16:16 +00:00
Dr. Stephen Henson
fbe7055370
Redirection of low level APIs to FIPS module.
...
Digest sign, verify operations are not redirected at this stage.
2011-06-02 18:22:42 +00:00
Dr. Stephen Henson
a5b386205f
Backport extended PSS support from HEAD: allow setting of mgf1Hash explicitly.
...
This is needed to handle FIPS redirection fully.
2011-06-02 18:13:33 +00:00
Dr. Stephen Henson
916bcab28e
Prohibit low level cipher APIs in FIPS mode.
...
Not complete: ciphers with assembly language key setup are not
covered yet.
2011-06-01 16:54:06 +00:00
Dr. Stephen Henson
c7373c3dee
For consistency define clone digests in evp_fips.c
2011-06-01 15:11:00 +00:00
Dr. Stephen Henson
9f2c8eb2a1
Redirect clone digests to FIPS module for FIPS builds.
2011-06-01 14:28:21 +00:00
Dr. Stephen Henson
65300dcfb0
Prohibit use of low level digest APIs in FIPS mode.
2011-06-01 13:39:45 +00:00
Dr. Stephen Henson
9ddc574f9a
typo
2011-06-01 11:10:50 +00:00
Dr. Stephen Henson
2dd9e67874
set FIPS permitted flag before initalising digest
2011-05-31 16:24:06 +00:00
Dr. Stephen Henson
f93b03a5e6
Don't round up partitioned premaster secret length if there is only one
...
digest in use: this caused the PRF to fail for an odd premaster secret
length.
2011-05-31 10:35:22 +00:00
Dr. Stephen Henson
55a47cd30f
Output supported curves in preference order instead of numerically.
2011-05-30 17:58:29 +00:00
Dr. Stephen Henson
5792219d1d
Redirect cipher operations to FIPS module for FIPS builds.
2011-05-29 16:18:38 +00:00
Dr. Stephen Henson
293c58c1e7
Use approved API for EVP digest operations in FIPS builds.
...
Call OPENSSL_init() in a few more places to make sure it is always called
at least once.
Initial cipher API redirection (incomplete).
2011-05-29 15:55:13 +00:00
Dr. Stephen Henson
9f375a752e
Add default ASN1 handling to support FIPS.
2011-05-29 02:32:05 +00:00
Dr. Stephen Henson
04dc5a9ca6
Redirect digests to FIPS module for FIPS builds.
...
Use FIPS API when initialising digests.
Sync header file evp.h and error codes with HEAD for necessary FIPS
definitions.
2011-05-28 23:01:26 +00:00
Dr. Stephen Henson
ae6cb5483e
Use || instead of && so build doesn't fail.
2011-05-26 22:10:28 +00:00
Dr. Stephen Henson
a168ec1d27
Support shared library builds of FIPS capable OpenSSL, add fipscanister.o
...
to libcrypto.a so linking to libcrypto.a works.
2011-05-26 21:23:11 +00:00
Dr. Stephen Henson
2a35144327
Make test utility link work for fips build.
2011-05-26 14:36:56 +00:00
Dr. Stephen Henson
7207eca1ee
The first of many changes to make OpenSSL 1.0.1 FIPS capable.
...
Add static build support to openssl utility.
Add new "fips" option to Configure.
Make use of installed fipsld and fips_standalone_sha1
Initialise FIPS error callbacks, locking and DRBG.
Doesn't do anything much yet: no crypto is redirected to the FIPS module.
Doesn't completely build either but the openssl utility can enter FIPS mode:
which doesn't do anything much either.
2011-05-26 14:19:19 +00:00
Dr. Stephen Henson
9c34782478
Don't advertise or use MD5 for TLS v1.2 in FIPS mode
2011-05-25 15:33:29 +00:00
Dr. Stephen Henson
20e6d22709
PR: 2533
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Setting SSL_MODE_RELEASE_BUFFERS should be ignored for DTLS, but instead causes
the program to crash. This is due to missing version checks and is fixed with
this patch.
2011-05-25 15:21:01 +00:00
Dr. Stephen Henson
24dd0c61ef
PR: 2529
...
Submitted by: Marcus Meissner <meissner@suse.de >
Reviewed by: steve
Call ssl_new() to reallocate SSL BIO internals if we want to replace
the existing internal SSL structure.
2011-05-25 15:16:01 +00:00
Dr. Stephen Henson
565c15363c
PR: 2527
...
Submitted by: Marcus Meissner <meissner@suse.de >
Reviewed by: steve
Set cnf to NULL to avoid possible double free.
2011-05-25 15:05:56 +00:00
Dr. Stephen Henson
ed67f7b7a7
Fix the ECDSA timing attack mentioned in the paper at:
...
http://eprint.iacr.org/2011/232.pdf
Thanks to the original authors Billy Bob Brumley and Nicola Tuveri for
bringing this to our attention.
2011-05-25 14:52:33 +00:00
Dr. Stephen Henson
6ea8d138d3
Fix the ECDSA timing attack mentioned in the paper at:
...
http://eprint.iacr.org/2011/232.pdf
Thanks to the original authors Billy Bob Brumley and Nicola Tuveri for
bringing this to our attention.
2011-05-25 14:42:27 +00:00
Dr. Stephen Henson
4159ac43aa
Oops use up to date patch for PR#2506
2011-05-25 14:30:05 +00:00
Dr. Stephen Henson
419b09b053
PR: 2512
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix BIO_accept so it can be bound to IPv4 or IPv6 sockets consistently.
2011-05-25 12:36:59 +00:00
Dr. Stephen Henson
88530f6b76
PR: 2506
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fully implement SSL_clear for DTLS.
2011-05-25 12:28:16 +00:00
Dr. Stephen Henson
a8cb8177f6
PR: 2505
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS session resumption timer bug.
2011-05-25 12:24:43 +00:00
Dr. Stephen Henson
277f8a34f4
use TLS1_get_version macro to check version so TLS v1.2 changes don't interfere with DTLS
2011-05-25 11:43:17 +00:00
Dr. Stephen Henson
4dde470865
Add tls12_sigalgs which somehow didn't get added to the backport.
2011-05-21 17:40:23 +00:00
Richard Levitte
ab08405984
LIBOBJ contained o_fips.c, now o_fips.o.
2011-05-21 09:17:54 +00:00
Dr. Stephen Henson
b81fde02aa
Add server client certificate support for TLS v1.2 . This is more complex
...
than client side as we need to keep the handshake record cache frozen when
it contains all the records need to process the certificate verify message.
(backport from HEAD).
2011-05-20 14:58:45 +00:00
Dr. Stephen Henson
57dd2ea808
add FIPS support to openssl utility (backport from HEAD)
2011-05-19 18:23:24 +00:00
Dr. Stephen Henson
7043fa702f
add FIPS support to ssl: doesn't do anything on this branch yet as there is no FIPS compilation support
2011-05-19 18:22:16 +00:00
Dr. Stephen Henson
f98d2e5cc1
Implement FIPS_mode and FIPS_mode_set
2011-05-19 18:19:07 +00:00
Dr. Stephen Henson
1a5538251f
update date
2011-05-19 17:56:12 +00:00
Dr. Stephen Henson
f4ddbb5ad1
inherit HMAC flags from MD_CTX
2011-05-19 17:38:57 +00:00
Dr. Stephen Henson
74bf705ea8
set encodedPoint to NULL after freeing it
2011-05-19 16:18:11 +00:00
Dr. Stephen Henson
676cd3a283
new flag to stop ENGINE methods being registered
2011-05-15 15:58:38 +00:00
Dr. Stephen Henson
c6ead3cdd3
Recognise and ignore no-ec-nistp224-64-gcc-128 (from HEAD).
2011-05-13 12:46:12 +00:00
Dr. Stephen Henson
2d53648ce7
typo
2011-05-13 12:44:37 +00:00
Dr. Stephen Henson
64ca6ac26b
Recognise NO_NISTP224-64-GCC-128
2011-05-13 12:38:02 +00:00
Dr. Stephen Henson
4fe4c00eca
Provisional support for TLS v1.2 client authentication: client side only.
...
Parse certificate request message and set digests appropriately.
Generate new TLS v1.2 format certificate verify message.
Keep handshake caches around for longer as they are needed for client auth.
2011-05-12 17:49:15 +00:00
Dr. Stephen Henson
376838a606
Process signature algorithms during TLS v1.2 client authentication.
...
Make sure message is long enough for signature algorithms.
(backport from HEAD).
2011-05-12 17:44:59 +00:00
Dr. Stephen Henson
d768a816aa
Ooops fix typo.
2011-05-12 13:59:04 +00:00
Dr. Stephen Henson
766e0cb7d1
SRP fixes from HEAD which weren't in 1.0.1-stable.
2011-05-12 13:46:40 +00:00
Dr. Stephen Henson
6a6b0c8b51
Add SSL_INTERN definition.
2011-05-12 13:12:49 +00:00
Dr. Stephen Henson
e24b01cc6f
Have EC_NISTP224_64_GCC_128 treated like any algorithm, and have disabled by
...
default. If we don't do it this way, it screws up libeay.num.
(update from HEAD, original from levitte).
2011-05-12 13:10:27 +00:00
Dr. Stephen Henson
7f9ef5621a
Oops, add missing declaration.
2011-05-12 13:02:25 +00:00
Dr. Stephen Henson
d7fc9ffc51
Update ordinals.
2011-05-11 23:03:06 +00:00
Dr. Stephen Henson
39348038df
make kerberos work with OPENSSL_NO_SSL_INTERN
2011-05-11 22:52:34 +00:00
Dr. Stephen Henson
9472baae0d
Backport TLS v1.2 support from HEAD.
...
This includes TLS v1.2 server and client support but at present
client certificate support is not implemented.
2011-05-11 13:37:52 +00:00
Dr. Stephen Henson
ae17b9ecd5
Typo.
2011-05-11 13:22:54 +00:00
Dr. Stephen Henson
74096890ba
Initial "opaque SSL" framework. If an application defines OPENSSL_NO_SSL_INTERN
...
all ssl related structures are opaque and internals cannot be directly
accessed. Many applications will need some modification to support this and
most likely some additional functions added to OpenSSL.
The advantage of this option is that any application supporting it will still
be binary compatible if SSL structures change.
(backport from HEAD).
2011-05-11 12:56:38 +00:00
Dr. Stephen Henson
889c2282a5
allow SHA384, SHA512 with DSA
2011-05-08 12:38:51 +00:00
Dr. Stephen Henson
dca30c44f5
no need to include memory.h
2011-04-30 23:38:05 +00:00
Dr. Stephen Henson
f2c358c6ce
check buffer is larger enough before overwriting
2011-04-06 18:06:54 +00:00
Dr. Stephen Henson
2ab42de1ec
PR: 2462
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS Retransmission Buffer Bug
2011-04-03 17:14:48 +00:00
Dr. Stephen Henson
ac2024ccbf
PR: 2458
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Don't change state when answering DTLS ClientHello.
2011-04-03 16:25:54 +00:00
Dr. Stephen Henson
93164a7d64
PR: 2457
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve
Fix DTLS fragment reassembly bug.
2011-04-03 15:48:32 +00:00
Richard Levitte
ecff2e5ce1
Corrections to the VMS build system.
...
Submitted by Steven M. Schweda <sms@antinode.info >
2011-03-25 16:21:08 +00:00
Dr. Stephen Henson
c9d630dab6
make some non-VMS builds work again
2011-03-25 15:07:18 +00:00
Richard Levitte
d135906dbc
For VMS, implement the possibility to choose 64-bit pointers with
...
different options:
"64" The build system will choose /POINTER_SIZE=64=ARGV if
the compiler supports it, otherwise /POINTER_SIZE=64.
"64=" The build system will force /POINTER_SIZE=64.
"64=ARGV" The build system will force /POINTER_SIZE=64=ARGV.
2011-03-25 09:39:46 +00:00
Richard Levitte
9f427a52cb
make update (1.0.1-stable)
...
This meant a slight renumbering in util/libeay.num due to symbols
appearing in 1.0.0-stable. However, since there's been no release on
this branch yet, it should be harmless.
2011-03-23 00:06:04 +00:00
Richard Levitte
5a39d3a838
* util/mkdef.pl: Add crypto/o_str.h and crypto/o_time.h. Maybe some
...
more need to be added...
2011-03-22 23:54:15 +00:00
Richard Levitte
013f3d999f
* apps/makeapps.com: Add srp.
2011-03-20 17:34:06 +00:00
Richard Levitte
64d30d7adc
* apps/makeapps.com: Forgot to end the check for /POINTER_SIZE=64=ARGV
...
with turning trapping back on.
* test/maketests.com: Do the same check for /POINTER_SIZE=64=ARGV
here.
* test/clean-test.com: A new script for cleaning up.
2011-03-20 14:01:49 +00:00
Richard Levitte
7062cb56a9
file clean_test.com was added on branch OpenSSL_1_0_1-stable on 2011-03-20 14:01:48 +0000
2011-03-20 14:01:18 +00:00
Richard Levitte
9d57828d66
* apps/openssl.c: For VMS, take care of copying argv if needed much earlier,
...
directly in main(). 'if needed' also includes when argv is a 32 bit
pointer in an otherwise 64 bit environment.
* apps/makeapps.com: When using /POINTER_SIZE=64, try to use the additional
=ARGV, but only if it's supported. Fortunately, DCL is very helpful
telling us in this case.
2011-03-20 13:15:37 +00:00
Richard Levitte
9ed8dee71b
A few more long symbols needing shortening.
2011-03-19 11:03:41 +00:00
Richard Levitte
4692b3345d
Keep file references in the VMS build files in the same order as they
...
are in the Unix Makefiles, and add SRP tests.
2011-03-19 10:46:21 +00:00
Richard Levitte
e59fb00735
SRP was introduced, add it for OpenVMS.
2011-03-19 09:55:35 +00:00
Richard Levitte
9275853084
A few more symbols that need shorter versions on OpenVMS.
2011-03-19 09:54:47 +00:00
Richard Levitte
0c81aa29f9
Change INSTALL.VMS to reflect the changes done on the build and
...
install scripts. This could need some more work.
2011-03-19 09:48:15 +00:00
Richard Levitte
01d2e27a2b
Apply all the changes submitted by Steven M. Schweda <sms@antinode.info>
2011-03-19 09:47:47 +00:00
Richard Levitte
dd7aadf7b2
file install-ssl.com was added on branch OpenSSL_1_0_1-stable on 2011-03-19 09:47:33 +0000
2011-03-19 09:44:39 +00:00
Richard Levitte
b2fdf501c5
file vms_rms.h was added on branch OpenSSL_1_0_1-stable on 2011-03-19 09:47:25 +0000
2011-03-19 09:44:30 +00:00
Richard Levitte
345e515735
file install-crypto.com was added on branch OpenSSL_1_0_1-stable on 2011-03-19 09:47:25 +0000
2011-03-19 09:44:29 +00:00
Richard Levitte
945982b0b2
file vms_decc_init.c was added on branch OpenSSL_1_0_1-stable on 2011-03-19 09:47:21 +0000
2011-03-19 09:44:27 +00:00
Richard Levitte
18ad9cbd10
file install-apps.com was added on branch OpenSSL_1_0_1-stable on 2011-03-19 09:47:21 +0000
2011-03-19 09:44:26 +00:00
Richard Levitte
f433a75569
file openssl_undo.com was added on branch OpenSSL_1_0_1-stable on 2011-03-19 09:47:19 +0000
2011-03-19 09:44:25 +00:00
Richard Levitte
b05389c825
file openssl_startup.com was added on branch OpenSSL_1_0_1-stable on 2011-03-19 09:47:19 +0000
2011-03-19 09:44:24 +00:00
Richard Levitte
68875fdf32
file install-vms.com was added on branch OpenSSL_1_0_1-stable on 2011-03-19 09:47:19 +0000
2011-03-19 09:44:23 +00:00
Dr. Stephen Henson
3393e0c02c
Fix SRP error codes (from HEAD).
2011-03-16 16:55:12 +00:00
Ben Laurie
a149b2466e
Add SRP.
2011-03-16 11:26:40 +00:00
Dr. Stephen Henson
13e230d505
PR: 2469
...
Submitted by: Jim Studt <jim@studt.net >
Reviewed by: steve
Check mac is present before trying to retrieve mac iteration count.
2011-03-13 18:20:23 +00:00
Dr. Stephen Henson
80b3d7a3c9
Remove redundant check to stop compiler warning.
2011-03-12 17:05:58 +00:00
Ben Laurie
4bd48de60c
Fix warning.
2011-03-12 12:18:34 +00:00
Dr. Stephen Henson
2eab92f8e3
make no-dsa work again
2011-03-10 18:27:13 +00:00
Andy Polyakov
2bbd82cf24
s390x-mont.pl: optimize for z196.
2011-03-04 13:13:04 +00:00
Andy Polyakov
1bfd3d7f58
dso_dlfcn.c: make it work on Tru64 4.0 [from HEAD].
2011-02-12 16:47:12 +00:00
Bodo Möller
cd77b3e88b
Sync with 1.0.0 branch.
...
(CVE-2011-0014 OCSP stapling fix has been applied to the 1.0.1 branch as well.)
2011-02-08 19:08:32 +00:00
Bodo Möller
8c93c4dd42
OCSP stapling fix (OpenSSL 0.9.8r/1.0.0d)
...
Submitted by: Neel Mehta, Adam Langley, Bodo Moeller
2011-02-08 17:48:41 +00:00
Bodo Möller
45d63a5408
Synchronize with 1.0.0 branch
2011-02-08 08:48:34 +00:00
Dr. Stephen Henson
decef971f4
add -stripcr option to copy.pl from 0.9.8
2011-02-03 14:58:02 +00:00
Bodo Möller
a288aaefc4
Assorted bugfixes:
...
- safestack macro changes for C++ were incomplete
- RLE decompression boundary case
- SSL 2.0 key arg length check
Submitted by: Google (Adam Langley, Neel Mehta, Bodo Moeller)
2011-02-03 12:03:57 +00:00
Bodo Möller
eed56c77b4
fix omission
2011-02-03 11:19:52 +00:00
Bodo Möller
346601bc32
CVE-2010-4180 fix (from OpenSSL_1_0_0-stable)
2011-02-03 10:42:00 +00:00
Dr. Stephen Henson
5080fbbef0
Since FIPS 186-3 specifies we use the leftmost bits of the digest
...
we shouldn't reject digest lengths larger than SHA256: the FIPS
algorithm tests include SHA384 and SHA512 tests.
2011-02-01 12:53:47 +00:00
Dr. Stephen Henson
b5b724348d
stop warnings about no previous prototype when compiling shared engines
2011-01-30 01:55:29 +00:00
Dr. Stephen Henson
c3ee90d8ca
FIPS mode changes to make RNG compile (this will need updating later as we
...
need a whole new PRNG for FIPS).
1. avoid use of ERR_peek().
2. If compiling with FIPS use small FIPS EVP and disable ENGINE
2011-01-26 14:55:23 +00:00
Dr. Stephen Henson
e1435034ae
FIPS_allow_md5() no longer exists and is no longer required
2011-01-26 12:25:51 +00:00
Richard Levitte
bf35c5dc7f
Add rsa_crpt
2011-01-26 06:32:22 +00:00
Dr. Stephen Henson
c42d223ac2
Move RSA encryption functions to new file crypto/rsa/rsa_crpt.c to separate
...
crypto and ENGINE dependencies in RSA library.
2011-01-25 17:43:20 +00:00
Dr. Stephen Henson
d5654d2b20
Move BN_options function to bn_print.c to remove dependency for BIO printf
...
routines from bn_lib.c
2011-01-25 17:10:42 +00:00
Dr. Stephen Henson
a7508fec1a
Move DSA_sign, DSA_verify to dsa_asn1.c and include separate versions of
...
DSA_SIG_new() and DSA_SIG_free() to remove ASN1 dependencies from DSA_do_sign()
and DSA_do_verify().
2011-01-25 16:55:27 +00:00
Dr. Stephen Henson
c31945e682
recalculate DSA signature if r or s is zero (FIPS 186-3 requirement)
2011-01-25 16:02:27 +00:00
Dr. Stephen Henson
d3203b931e
PR: 2433
...
Submitted by: Chris Wilson <chris@qwirx.com >
Reviewed by: steve
Constify ASN1_STRING_set_default_mask_asc().
2011-01-24 16:20:05 +00:00
Dr. Stephen Henson
947f4e90c3
New function EC_KEY_set_affine_coordinates() this performs all the
...
NIST PKV tests.
2011-01-24 16:09:57 +00:00
Dr. Stephen Henson
d184c7b271
check EC public key isn't point at infinity
2011-01-24 15:07:47 +00:00
Dr. Stephen Henson
913488c066
PR: 1612
...
Submitted by: Robert Jackson <robert@rjsweb.net >
Reviewed by: steve
Fix EC_POINT_cmp function for case where b but not a is the point at infinity.
2011-01-24 14:41:49 +00:00
Dr. Stephen Henson
7fa27d9ac6
Add additional parameter to dsa_builtin_paramgen to output the generated
...
seed to: this doesn't introduce any binary compatibility issues as the
function is only used internally.
The seed output is needed for FIPS 140-2 algorithm testing: the functionality
used to be in DSA_generate_parameters_ex() but was removed in OpenSSL 1.0.0
2011-01-19 14:46:42 +00:00
Dr. Stephen Henson
c341b9cce5
add va_list version of ERR_add_error_data
2011-01-14 15:13:59 +00:00
Dr. Stephen Henson
bbbf0d45ba
stop warning with no-engine
2011-01-13 15:42:47 +00:00
Richard Levitte
114c402d9e
PR: 2425
...
Synchronise VMS build with Unixly build.
2011-01-10 20:55:27 +00:00
Dr. Stephen Henson
d51519eba4
add buf_str.c file
2011-01-09 13:30:58 +00:00
Dr. Stephen Henson
e650f9988b
move some string utilities to buf_str.c to reduce some dependencies (from 0.9.8 branch).
2011-01-09 13:30:34 +00:00
Dr. Stephen Henson
8ed8454115
add X9.31 prime generation routines from 0.9.8 branch
2011-01-09 13:22:47 +00:00
Richard Levitte
6e101bebb1
PR: 2407
...
Fix fault include.
Submitted by Arpadffy Zoltan <Zoltan.Arpadffy@scientificgames.se >
2011-01-06 20:56:04 +00:00
Dr. Stephen Henson
4577b38d22
Don't use decryption_failed alert for TLS v1.1 or later.
2011-01-04 19:39:42 +00:00
Dr. Stephen Henson
a8515e2d28
Since DTLS 1.0 is based on TLS 1.1 we should never return a decryption_failed
...
alert.
2011-01-04 19:33:30 +00:00
Dr. Stephen Henson
964e91052e
oops missed an assert
2011-01-03 12:52:11 +00:00
Dr. Stephen Henson
4e55e69bff
PR: 2411
...
Submitted by: Rob Austein <sra@hactrn.net >
Reviewed by: steve
Fix corner cases in RFC3779 code.
2011-01-03 01:40:45 +00:00
Dr. Stephen Henson
e501dbb658
Fix escaping code for string printing. If *any* escaping is enabled we
...
must escape the escape character itself (backslash).
2011-01-03 01:30:58 +00:00
Dr. Stephen Henson
20e505e4b7
PR: 2410
...
Submitted by: Rob Austein <sra@hactrn.net >
Reviewed by: steve
Use OPENSSL_assert() instead of assert().
2011-01-03 01:22:27 +00:00
Dr. Stephen Henson
291a26e6e3
PR: 2413
...
Submitted by: Michael Bergandi <mbergandi@gmail.com >
Reviewed by: steve
Fix typo in crypto/bio/bss_dgram.c
2011-01-03 01:07:20 +00:00
Dr. Stephen Henson
0383911887
PR: 2416
...
Submitted by: Mark Phalan <mark.phalan@oracle.com >
Reviewed by: steve
Use L suffix in version number.
2011-01-03 00:26:21 +00:00
Richard Levitte
a5c5eb77b5
Part of the IF structure didn't get pasted here...
...
PR: 2393
2010-12-14 21:44:33 +00:00
Richard Levitte
90d02be7c5
First attempt at adding the possibility to set the pointer size for the builds on VMS.
...
PR: 2393
2010-12-14 19:18:58 +00:00
Andy Polyakov
04221983ac
bss_file.c: refine UTF8 logic [from HEAD].
...
PR: 2382
2010-12-11 14:54:48 +00:00
Dr. Stephen Henson
dfda027ae8
ignore leading null fields
2010-12-03 19:31:23 +00:00
Dr. Stephen Henson
21b5a79121
update FAQ
2010-12-02 19:56:03 +00:00
Dr. Stephen Henson
411a388c62
PR: 2386
...
Submitted by: Stefan Birrer <stefan.birrer@adnovum.ch >
Reviewed by: steve
Correct SKM_ASN1_SET_OF_d2i macro.
2010-12-02 18:02:14 +00:00
Dr. Stephen Henson
61c10d42f6
fix doc typos
2010-12-02 13:45:25 +00:00
Dr. Stephen Henson
68ecfb69a5
use consistent FAQ between version
2010-12-02 00:11:21 +00:00
Andy Polyakov
e62fee8eb3
Configure: make -mno-cygwin optional on mingw platforms [from HEAD].
...
PR: 2381
2010-11-30 22:18:46 +00:00
Dr. Stephen Henson
5566d49103
PR: 2385
...
Submitted by: Stefan Birrer <stefan.birrer@adnovum.ch >
Reviewed by: steve
Zero key->pkey.ptr after it is freed so the structure can be reused.
2010-11-30 19:45:31 +00:00
Richard Levitte
48337a4a35
Better method for creating SSLROOT:.
...
Make sure to include the path to evptest.txt.
2010-11-29 22:27:18 +00:00
Dr. Stephen Henson
2c5c4fca14
apply J-PKAKE fix to HEAD (original by Ben)
2010-11-29 18:33:28 +00:00
Dr. Stephen Henson
4fab95ed20
Some of the MS_STATIC use in crypto/evp is a legacy from the days when
...
EVP_MD_CTX was much larger: it isn't needed anymore.
2010-11-27 17:35:56 +00:00
Dr. Stephen Henson
6c36ca4628
PR: 2240
...
Submitted by: Jack Lloyd <lloyd@randombit.net >, "Mounir IDRASSI" <mounir.idrassi@idrix.net >, steve
Reviewed by: steve
As required by RFC4492 an absent supported points format by a server is
not an error: it should be treated as equivalent to an extension only
containing uncompressed.
2010-11-25 12:27:39 +00:00
Dr. Stephen Henson
9c61c57896
using_ecc doesn't just apply to TLSv1
2010-11-25 11:51:46 +00:00
Dr. Stephen Henson
a618011ca1
add "missing" functions to copy EVP_PKEY_METHOD and examine info
2010-11-24 16:07:45 +00:00
Dr. Stephen Henson
95eef4df79
use generalised mac API for SSL key generation
2010-11-24 13:17:48 +00:00
Dr. Stephen Henson
ec1e714ac1
constify EVP_PKEY_new_mac_key()
2010-11-24 13:14:03 +00:00
Andy Polyakov
736d658080
INSTALL.W32: document trouble with symlinks under MSYS [from HEAD].
...
PR: 2377
2010-11-23 23:01:22 +00:00
Richard Levitte
aa2920584e
Implement bc test strategy as submitted by Steven M. Schweda <sms@antinode.info>.
...
Make sure we move to '__here' before trying to use it to build local sslroot:
2010-11-23 02:12:14 +00:00
Richard Levitte
9d13bfc258
Print openssl version information at the end of the tests
2010-11-23 01:06:13 +00:00
Richard Levitte
e43633011c
Give the architecture dependent directory higher priority
2010-11-23 01:05:32 +00:00
Richard Levitte
97027f7fb3
Don't define an empty CFLAGS, it's much more honest not to defined it at all.
...
Make sure to remove any [.CRYTO]BUILDINF.H so it doesn't get used instead of
[.CRYPTO._''ARCH'BUILDINF.H
2010-11-23 01:04:07 +00:00
Richard Levitte
bf5adc9be4
* tests.com: Add the symbol openssl_conf, so the openssl application
...
stops complaining about a missing configuration file. Define the logical
name PERL_ENV_TABLES with values to Perl considers the DCL symbol table
as part of the environment (see 'man perlvms' for details), so cms-test.pl
can get the value of EXE_DIR from tests.com, among others.
* cms-test.pl: Make changes to have it work on VMS as well. Upper or mixed
case options need to be quoted and the openssl command needs a VMS-specific
treatment. It all should work properly on Unix, I hope it does on Windows
as well...
2010-11-22 23:42:48 +00:00
Andy Polyakov
7665b436f0
s390x.S: fix typo in bn_mul_words [from HEAD].
...
PR: 2380
2010-11-22 21:57:29 +00:00
Dr. Stephen Henson
ffca7b85c2
PR: 2376
...
Submitted by: Guenter <lists@gknw.net >
Reviewed by: steve
Cleanup alloca use, fix Win32 target for OpenWatcom.
2010-11-19 00:11:44 +00:00
Dr. Stephen Henson
eef2fa00d9
PR: 2375
...
Submitted by: Guenter <lists@gknw.net >
Reviewed by: steve
cleanup/fix e_aep.c for OpenWatcom
2010-11-18 22:59:53 +00:00
Dr. Stephen Henson
c55551ad7c
PR: 2374
...
Submitted by: Guenter <lists@gknw.net >
Reviewed by: steve
Don't compile capi ENGINE on mingw32
2010-11-18 22:56:53 +00:00
Richard Levitte
c91b521111
Tell the user what test is being performed.
2010-11-18 22:46:55 +00:00
Richard Levitte
deb35e3e2c
Make sure the source directory for ASN1TEST is defined.
2010-11-18 22:45:29 +00:00
Richard Levitte
5e2d3c9ec1
We expect these scripts not to bail on error, so make sure that's what happens.
2010-11-18 22:31:01 +00:00
Richard Levitte
dda454434b
Synchronise with Unix tests
2010-11-18 22:24:22 +00:00
Richard Levitte
b97d371ce0
We redid the structure on architecture dependent source files, but
...
apparently forgot to adapt the copying to the installation directory.
2010-11-18 20:02:54 +00:00
Dr. Stephen Henson
a25c98ac73
remove duplicate statement
2010-11-18 17:33:44 +00:00
Dr. Stephen Henson
fd47013111
add ACKNOWLEDGEMENTS file to 1.0.1 branch
2010-11-18 17:26:51 +00:00
Dr. Stephen Henson
b3aa469c21
compile cts128.c on VMS
2010-11-18 17:04:37 +00:00
Dr. Stephen Henson
981c0de27a
fix no SIGALRM case in speed.c
2010-11-18 13:22:42 +00:00
Dr. Stephen Henson
1bfe9acbbf
PR: 2372
...
Submitted by: "W.C.A. Wijngaards" <wouter@nlnetlabs.nl >
Reviewed by: steve
Fix OpenBSD compilation failure.
2010-11-18 12:29:38 +00:00
Dr. Stephen Henson
2d1e9ce753
oops, reinstate TLSv1 string
2010-11-17 18:16:57 +00:00
Dr. Stephen Henson
19043426b9
backport AES EVP ctr mode changes from HEAD
2010-11-17 17:46:23 +00:00
Dr. Stephen Henson
6e21ce592e
fix CVE-2010-3864
2010-11-17 17:36:29 +00:00
Dr. Stephen Henson
975c6efbe4
sync OIDs with HEAD
2010-11-17 17:26:10 +00:00
Dr. Stephen Henson
972491aece
If EVP_PKEY structure contains an ENGINE the key is ENGINE specific and
...
we should use its method instead of any generic one.
2010-11-16 12:11:31 +00:00
Dr. Stephen Henson
1a8ecda3ee
Only use explicit IV if cipher is in CBC mode.
2010-11-14 17:47:21 +00:00
Dr. Stephen Henson
d36c7b618d
Get correct GOST private key instead of just assuming the last one is
...
correct: this isn't always true if we have more than one certificate.
2010-11-14 13:50:42 +00:00
Dr. Stephen Henson
251431ff4f
add TLS v1.1 options to s_server
2010-11-13 12:44:17 +00:00
Dr. Stephen Henson
1a3052793e
Submitted By: Bogdan Harjoc <harjoc@gmail.com>
...
Add missing debug WIN64 targets.
2010-11-11 15:23:32 +00:00
Dr. Stephen Henson
84fbc56fd0
PR: 2366
...
Submitted by: Damien Miller <djm@mindrot.org >
Reviewed by: steve
Stop pkeyutl crashing if some arguments are missing. Also make str2fmt
tolerate NULL parameter.
2010-11-11 14:42:34 +00:00
Dr. Stephen Henson
4444ff7632
Submitted by: Jonathan Dixon <joth@chromium.org>
...
Reviewed by: steve
If store is NULL set flags correctly.
2010-11-02 15:58:05 +00:00
Dr. Stephen Henson
7770da4b41
PR: 2295
...
Submitted by: Alexei Khlebnikov <alexei.khlebnikov@opera.com >
Reviewed by: steve
OOM checking. Leak in OOM fix. Fall-through comment. Duplicate code
elimination.
2010-10-11 23:25:23 +00:00
Andy Polyakov
7202a4d42b
x86_64-xlate.pl: fix LNK4078 and LNK4210 link warnings [from HEAD].
...
PR: 2356
2010-10-10 21:12:18 +00:00
Dr. Stephen Henson
3fa29765fd
PR: 2314
...
Submitted by: Mounir IDRASSI <mounir.idrassi@idrix.net >
Reviewed by: steve
Fix for double free bug in ssl/s3_clnt.c CVE-2010-2939
2010-10-10 12:27:19 +00:00
Dr. Stephen Henson
b9e468c163
We can't always read 6 bytes in an OCSP response: fix so error statuses
...
are read correctly for non-blocking I/O.
2010-10-06 18:01:14 +00:00
Dr. Stephen Henson
0172ad2902
Minor documentation fixes, PR#2345
2010-10-04 13:28:27 +00:00
Dr. Stephen Henson
d9aa352ff0
Minor documentation fixes, PR#2344
2010-10-04 13:24:07 +00:00
Dr. Stephen Henson
945ba0300d
Add call to ENGINE_register_all_complete() to ENGINE_load_builtin_engines(),
...
this means that some implementations will be used automatically, e.g. aesni,
we do this for cryptodev anyway.
Setup cpuid in ENGINE_load_builtin_engines() too as some ENGINEs use it.
2010-10-03 18:56:25 +00:00
Andy Polyakov
9e15cc606e
Alpha assembler pack: adapt for Linux [from HEAD].
...
PR: 2335
2010-09-13 20:32:53 +00:00
Andy Polyakov
e011160f3c
VC-32.pl: default to nasm if neither nasm or nasmw is is found at the moment [from HEAD].
...
PR: 2338
2010-09-13 16:29:00 +00:00
Andy Polyakov
9447da5065
crypto/bn/asm/s390x.S: drop redundant instructions [from HEAD].
2010-09-10 14:55:34 +00:00
Andy Polyakov
387ed39f6d
sparcv9cap.c: disengange Solaris-specific CPU detection routine in favour
...
of unified procedure relying on SIGILL [from HEAD].
PR: 2321
2010-09-05 19:48:19 +00:00
Dr. Stephen Henson
e50e5f9336
make no-gost work on Windows
2010-09-02 17:23:58 +00:00
Dr. Stephen Henson
6f0d9950f3
fix bug in AES_unwrap()
2010-08-30 23:58:47 +00:00
Bodo Möller
4705ff7d6d
More C language police work.
2010-08-27 13:17:58 +00:00
Dr. Stephen Henson
36778eb231
PR: 1833
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix other cases not covered by original patch. (correct patch this time!)
2010-08-27 12:12:07 +00:00
Dr. Stephen Henson
c6dd154b3e
oops, revert previous patch
2010-08-27 12:10:12 +00:00
Bodo Möller
74b5feea7b
C conformity fixes: Move declarations before statements in all blocks.
2010-08-27 12:07:12 +00:00
Dr. Stephen Henson
35cae95032
PR: 1833
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix other cases not covered by original patch.
2010-08-27 11:57:42 +00:00
Bodo Möller
11a36aa96f
C conformity fixes:
...
- Move declarations before statements in all blocks.
- Where 64-bit type is required, use it explicitly (not 1l).
2010-08-27 11:29:09 +00:00
Bodo Möller
9b0e97ae10
Update version numbers
2010-08-26 18:45:21 +00:00
Bodo Möller
02ba02604c
Patch from PR #1833 was broken: there's no s->s3->new_session
...
(only s->new_session).
2010-08-26 14:54:18 +00:00
Bodo Möller
42ecf418f5
(formatting error)
2010-08-26 14:38:49 +00:00
Bodo Möller
48ce525d16
New 64-bit optimized implementation EC_GFp_nistp224_method().
...
Binary compatibility is not affected as this will only be
compiled in if explicitly requested (#ifdef EC_NISTP224_64_GCC_128).
Submitted by: Emilia Kasper (Google)
2010-08-26 14:29:27 +00:00
Dr. Stephen Henson
3081e2ca73
update ordinals
2010-08-26 14:25:53 +00:00
Dr. Stephen Henson
48ae85b6ff
PR: 1833
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Support for abbreviated handshakes when renegotiating.
2010-08-26 14:22:40 +00:00
Bodo Möller
82281ce47d
ECC library bugfixes.
...
Submitted by: Emilia Kapser (Google)
2010-08-26 12:10:57 +00:00
Bodo Möller
4ecd2bafbb
Harmonize with OpenSSL_1_0_0-stable version of CHANGES.
2010-08-26 11:21:49 +00:00
Andy Polyakov
308b9ad8f0
util/cygwin.sh: maintainer's update [from HEAD].
...
Submitted by: Corinna Vinschen
2010-08-24 21:52:15 +00:00
Andy Polyakov
73b408c242
engine/Makefile: harmonize engine install rule for .dylib extension on MacOS X [from HEAD].
...
PR: 2319
2010-08-24 21:46:58 +00:00
Andy Polyakov
51c9eb321a
Makefile.shared: fix brown-bag typo in link_o.darwin [from HEAD].
...
PR: 2319
2010-08-21 11:37:17 +00:00
Andy Polyakov
1657fca2f4
sha1-armv4-large.pl: reschedule instructions for dual-issue pipeline [from HEAD]
...
.
2010-08-03 15:36:52 +00:00
Andy Polyakov
0d25aad90d
Make inline assembler clang-friendly [from HEAD].
2010-08-02 21:54:48 +00:00
Andy Polyakov
b8c1cb1c2c
alphacpuid.pl: fix brown-bag bug [from HEAD].
2010-07-28 08:18:46 +00:00
Andy Polyakov
6e1d44fd56
Replace alphacpuid.s with alphacpuid.pl to ensure it makes to release tar-balls [from HEAD].
...
PR: 2309
2010-07-26 22:11:23 +00:00
Dr. Stephen Henson
528ff4b451
Add modes.h to mkdef.pl, update ordinals.
2010-07-25 17:48:35 +00:00
Dr. Stephen Henson
f6c29ba3dc
Fix WIN32 build system to correctly link ENGINE DLLs contained in a
...
directory: currently the GOST ENGINE is the only case.
2010-07-24 17:55:47 +00:00
Dr. Stephen Henson
160f9b5bf6
Add call to ENGINE_register_all_complete() to ENGINE_load_builtin_engines(),
...
this means that some implementations will be used automatically, e.g. aesni,
we do this for cryptodev anyway.
Setup cpuid in ENGINE_load_builtin_engines() too as some ENGINEs use it.
2010-07-21 16:23:59 +00:00
Dr. Stephen Henson
53e7985c8d
PR: 1830
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >, Steve Henson
Support for RFC5705 key extractor.
2010-07-18 17:39:46 +00:00
Andy Polyakov
9102342795
Configure: suppress $multilib with non-system $prefix [from HEAD].
...
PR: 2307
2010-07-16 08:14:11 +00:00
Andy Polyakov
c4488936b2
Makefile.shared: update link_o.darwin rule [from HEAD].
...
PR: 2306
2010-07-16 08:11:43 +00:00
Andy Polyakov
4e2b990734
ARM assembler pack: reschedule instructions for dual-issue pipeline [from HEAD].
...
Modest improvement coefficients mean that code already had some
parallelism and there was not very much room for improvement. Special
thanks to Ted Krovetz for benchmarking the code with such patience.
2010-07-13 14:08:22 +00:00
Dr. Stephen Henson
6ca1418587
PR: 2297
...
Submitted by: Antony, Benoy <bantony@ebay.com >
Approved by: steve@openssl.org
Fix bug in AES wrap code when t > 0xff.
2010-07-09 17:25:46 +00:00
Andy Polyakov
30dd06812e
INSTALL.W32: mention _OPENSSL_isservice() [from HEAD].
...
PR: 2194
2010-07-09 14:32:22 +00:00
Andy Polyakov
b29b89ef21
rand_nw.c: compensate for gcc bug (using %edx instead of %eax at -O3)
...
[from HEAD].
PR: 2296
2010-07-08 09:15:49 +00:00
Andy Polyakov
81ae27d56a
PROBLEMS: MacOS X is not necessarily a problem anymore [from HEAD].
2010-07-08 09:02:22 +00:00
Andy Polyakov
f90bf72280
sparcv9cap.c: reiterate CPU detection logic [from HEAD].
2010-07-08 07:52:36 +00:00
Dr. Stephen Henson
abcf7aa591
crypto/sparc*: elininate _sparcv9_rdwrasi [from HEAD], original from Andy.
2010-07-05 22:22:22 +00:00
Dr. Stephen Henson
40b6d49387
SPARCv9 assembler pack: refine CPU detection on Linux, fix for "unaligned
...
opcodes detected in executable segment" error [from HEAD], original from Andy.
2010-07-05 22:20:36 +00:00
Dr. Stephen Henson
497b4f92d2
i variable is used on some platforms
2010-07-05 11:03:50 +00:00
Dr. Stephen Henson
28566b4966
no need for empty fragments with TLS 1.1 and later due to explicit IV
2010-06-27 14:42:43 +00:00
Dr. Stephen Henson
b4b15f68c0
Backport TLS v1.1 support from HEAD, ssl/ changes
2010-06-27 14:22:11 +00:00
Dr. Stephen Henson
1eb1cf452b
Backport TLS v1.1 support from HEAD
2010-06-27 14:15:02 +00:00
Dr. Stephen Henson
c549810def
update versions for 1.0.1
2010-06-16 13:48:00 +00:00
cvs2svn
0d0ed9187a
This commit was manufactured by cvs2svn to create branch
...
'OpenSSL_1_0_1-stable'.
2010-06-16 13:37:23 +00:00
Dr. Stephen Henson
dfa81d9efb
update README, fix opensslv.h
2010-06-16 13:37:22 +00:00
Dr. Stephen Henson
1dba06e7b0
update for next version
2010-06-16 13:34:33 +00:00
Dr. Stephen Henson
daac87be95
clarify comment
2010-06-16 13:17:22 +00:00
Dr. Stephen Henson
e97359435e
Fix warnings (From HEAD, original patch by Ben).
2010-06-15 17:25:15 +00:00
Andy Polyakov
afce9bcca1
VC-32.pl: fix /Fd name generation [from HEAD].
...
PR: 2284
2010-06-09 15:49:09 +00:00
Dr. Stephen Henson
9c7baca820
prepare for release
2010-06-01 13:31:38 +00:00
Dr. Stephen Henson
618265e645
Fix CVE-2010-1633 and CVE-2010-0742.
2010-06-01 13:17:06 +00:00
Andy Polyakov
9728978b75
VC-32.pl: unconditionally generate symbols.pdb [from HEAD].
2010-06-01 06:03:20 +00:00
Andy Polyakov
938c0bbae1
x86_64-xlate.pl: updates from HEAD.
2010-06-01 05:57:26 +00:00
Andy Polyakov
a0cd818831
Configure: update mingw config-lines [from HEAD].
2010-06-01 05:53:35 +00:00
Dr. Stephen Henson
31c4ab5401
fix PR#2261 in a different way
2010-05-31 13:18:08 +00:00
Dr. Stephen Henson
1f65529824
PR: 2278
...
Submitted By: Mattias Ellert <mattias.ellert@fysast.uu.se >
Fix type checking macro SKM_ASN1_SET_OF_i2d
2010-05-29 12:49:48 +00:00
Dr. Stephen Henson
5b3a6eedd1
update NEWS
2010-05-27 15:05:01 +00:00
Dr. Stephen Henson
6938440d68
PR: 2262
...
Submitted By: Victor Wagner <vitus@cryptocom.ru >
Fix error reporting in load_key function.
2010-05-27 14:09:13 +00:00
Dr. Stephen Henson
57ec6c9bad
PR: 2261
...
Submitted By: De Rudder, Stephen L." <s_derudder@tditx.com >
Workaround for newer Windows headers which define EADDRINUSE but not to the
same value as WSAEADDRINUSE.
2010-05-27 13:07:45 +00:00
Dr. Stephen Henson
7a09bc4068
PR: 2258
...
Submitted By: Ger Hobbelt <ger@hobbelt.com >
Base64 BIO fixes:
Use OPENSSL_assert() instead of assert().
Use memmove() as buffers overlap.
Fix write retry logic.
2010-05-27 12:41:20 +00:00
Dr. Stephen Henson
deb15645a8
PR: 2266
...
Submitted By: Jonathan Gray <jsg@goblin.cx >
Correct ioctl definitions.
2010-05-26 23:23:44 +00:00
Dr. Stephen Henson
f0b358e8b9
Avoid use of ex_data free function in Chil ENGINE so it can be safely
...
reloaded.
2010-05-26 16:17:06 +00:00
Dr. Stephen Henson
dce2b5a8fc
PR: 2254
...
Submitted by: Ger Hobbelt <ger@hobbelt.com >
Approved by: steve@openssl.org
Check for <= 0 i2d return value.
2010-05-22 00:40:58 +00:00
Dr. Stephen Henson
59d100d959
PR: 2251
...
Submitted by: Ger Hobbelt <ger@hobbelt.com >
Approved by: steve@openssl.org
Memleak, BIO chain leak and realloc checks in v3_pci.c
2010-05-22 00:31:02 +00:00
Dr. Stephen Henson
d497b5362b
oops, typo
2010-05-20 17:35:37 +00:00
Dr. Stephen Henson
369b0abdc2
Update cms-test.pl to handle some Unix like Windows environments where
...
calling shlib_wrap.sh doesn't work.
2010-05-20 17:28:51 +00:00
Dr. Stephen Henson
72240ab31a
PR: 2259
...
Submitted By: Artem Chuprina <ran@cryptocom.ru >
Check return values of HMAC in tls_P_hash and tls1_generate_key_block.
Although the previous version could in theory crash that would only happen if a
digest call failed. The standard software methods can never fail and only one
ENGINE currently uses digests and it is not compiled in by default.
2010-05-17 11:26:56 +00:00
Dr. Stephen Henson
dc4e1ddc9f
PR: 2253
...
Submitted By: Ger Hobbelt <ger@hobbelt.com >
Check callback return value when outputting errors.
2010-05-15 00:36:12 +00:00
Dr. Stephen Henson
ff656346fa
PR: 2255
...
Submitted By: Ger Hobbelt <ger@hobbelt.com >
Place RSA dependent variable under #ifndef OPENSSL_NO_RSA
2010-05-15 00:19:57 +00:00
Dr. Stephen Henson
ca91057d50
PR: 2252
...
Submitted By: Ger Hobbelt <ger@hobbelt.com >
Update docs to BIO_f_buffer()
2010-05-03 15:29:51 +00:00
Dr. Stephen Henson
8c1e7de6cb
PR: 2230
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix bug in bitmask macros and stop warnings.
2010-05-03 13:01:50 +00:00
Dr. Stephen Henson
207886cd3a
PR: 2244
...
Submitted By: "PMHager" <hager@dortmund.net >
Initialise pkey callback to 0.
2010-05-03 12:50:52 +00:00
Andy Polyakov
336d1ee733
bss_file.c: reserve for option to encode file name in UTF-8 on Windows
...
[from HEAD].
2010-04-28 20:04:37 +00:00
Andy Polyakov
bed2b769f5
md5-ia64.S: fix assembler warning [from HEAD].
2010-04-20 20:41:23 +00:00
Dr. Stephen Henson
26029d9c4c
PR: 2241
...
Submitted By: Artemy Lebedev <vagran.ast@gmail.com >
Typo.
2010-04-20 12:53:05 +00:00
Dr. Stephen Henson
c64c888929
oops, commit Configure part of PR#2234
2010-04-15 13:17:05 +00:00
Dr. Stephen Henson
8d9db41880
PR: 2234
...
Submitted By: Matthias Andree <matthias.andree@gmx.de >
Use correct path to openssl utility in c_rehash script.
2010-04-14 23:07:28 +00:00
Dr. Stephen Henson
4fae54a8e0
PR: 2235
...
Submitted By: Bruce Stephens <bruce.stephens@isode.com >
Make ts/Makefile consistent with other Makefiles.
2010-04-14 23:04:19 +00:00
Andy Polyakov
9f35928719
x86_64cpuid.pl: ml64 is allergic to db on label line [from HEAD].
2010-04-14 19:25:09 +00:00
Dr. Stephen Henson
c5af032df5
update FAQ
2010-04-14 13:20:53 +00:00
Andy Polyakov
8a898a6fcc
[co]cf128.c: fix "n=0" bug [from HEAD].
2010-04-14 07:47:53 +00:00
Dr. Stephen Henson
9f827ded1c
fix signed/unsigned comparison warnings
2010-04-14 00:41:01 +00:00
Dr. Stephen Henson
5daa9411a0
fix bug in ccgost CFB mode code
2010-04-14 00:33:22 +00:00
Dr. Stephen Henson
094d4019b8
check ASN1 type before using it
2010-04-14 00:30:12 +00:00
Dr. Stephen Henson
1507f3abba
PR: 2230
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix various DTLS fragment reassembly bugs.
2010-04-14 00:17:29 +00:00
Dr. Stephen Henson
30e8defe52
PR: 2229
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Don't drop DTLS connection if mac or decryption failed.
2010-04-14 00:09:55 +00:00
Dr. Stephen Henson
9f4dd3e3e3
PR: 2228
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fix DTLS buffer record MAC failure bug.
2010-04-14 00:03:13 +00:00
Dr. Stephen Henson
8c00014d7e
make update
2010-04-13 17:08:50 +00:00
Richard Levitte
1cf12a6350
No need to look for the file if none was entered.
2010-04-13 14:39:58 +00:00
Richard Levitte
dc9461e23f
A few more things that aren't built on VAX
2010-04-13 14:39:08 +00:00
Richard Levitte
72d57050df
Since test modules aren't copied to the test/ directory any more on
...
VMS, we need to rework this script with knowledge of where they are.
2010-04-13 14:38:39 +00:00
Richard Levitte
49d1f665a4
Rework the way engines are built
2010-04-13 14:37:43 +00:00
Richard Levitte
2c25edc4c1
Too long symbols
2010-04-13 14:36:58 +00:00
Richard Levitte
d2f098b33d
Spelling
2010-04-13 14:34:48 +00:00
Richard Levitte
6f4f7f35f3
Rework the configuration of avoided algorithms.
...
Avoid copying test modules.
2010-04-13 14:33:04 +00:00
Richard Levitte
0a4fe6c8db
Undo the previous change, it was incorrect in this branch.
2010-04-13 11:10:07 +00:00
Richard Levitte
7bba401d5d
Third argument to dtls1_buffer_record is by reference
2010-04-13 08:41:58 +00:00
Andy Polyakov
c73cff12f1
aes-ppc.pl: 10% performance improvement on Power6 [from HEAD].
2010-04-10 14:54:34 +00:00
Andy Polyakov
b32d93840e
cryptlib.c: allow application to override OPENSSL_isservice [from HEAD].
2010-04-10 14:13:12 +00:00
Andy Polyakov
cb457849fd
ctr129.c: fix typo, simplify ctr128_inc and fix "n=0" bug [from HEAD].
2010-04-10 13:47:11 +00:00
Andy Polyakov
cb3c30059a
darwin-ppc-cc: add -Wa,-force_cpusubtype_ALL to produce binaries not
...
specific to G5. This was already added to HEAD earlier.
PR: 2231
2010-04-10 13:41:58 +00:00
Andy Polyakov
20dc93e49e
sparccpuid.S: some assembler is allergic to apostrophes in comments [from HEAD].
2010-04-10 13:37:06 +00:00
Andy Polyakov
b620447dcc
alpha-mont.pl: comply with stack alignment requirement [from HEAD].
2010-04-10 13:33:46 +00:00
Dr. Stephen Henson
4ffd2ad1d3
make GOST MAC work again
2010-04-08 10:54:54 +00:00
Dr. Stephen Henson
acc9938ba5
Add SHA2 algorithms to SSL_library_init(). Although these aren't used
...
directly by SSL/TLS SHA2 certificates are becoming more common and
applications that only call SSL_library_init() and not
OpenSSL_add_all_alrgorithms() will fail when verifying certificates.
Update docs.
2010-04-07 13:18:30 +00:00
Dr. Stephen Henson
f6d13ac8cf
Remove obsolete PRNG note. Add comment about use of SHA256 et al.
2010-04-06 15:05:47 +00:00
Dr. Stephen Henson
24cb653c6b
PR: 2209
...
Submitted Daniel Mentz <danielml@sent.com >
Documentation typo.
2010-04-06 14:45:31 +00:00
Dr. Stephen Henson
6dfd3cf68e
PR: 2218
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fixes for DTLS replay bug.
2010-04-06 12:44:55 +00:00
Dr. Stephen Henson
073775cbbb
PR: 2219
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fixes for DTLS buffering bug.
2010-04-06 12:40:10 +00:00
Dr. Stephen Henson
e995d5044e
PR: 2223
...
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de >
Fixes for DTLS timeout bug
2010-04-06 12:29:21 +00:00
Dr. Stephen Henson
5b0a79a27a
PR: 2220
...
Fixes to make OpenSSL compile with no-rc4
2010-04-06 11:18:32 +00:00
Dr. Stephen Henson
6747de655e
updates for next release
2010-03-30 00:55:00 +00:00
Dr. Stephen Henson
91bad2b09e
Prepare for 1.0.0 release - finally ;-)
2010-03-29 13:11:54 +00:00
Andy Polyakov
1244d5b713
ARMv4 assembler: [unconfirmed] fix for compilation failure [from HEAD].
2010-03-29 09:59:58 +00:00
Andy Polyakov
c0ed5cd47b
dso_dlfcn.c: fix compile failure on Tru64 [from HEAD].
2010-03-29 09:50:33 +00:00
Dr. Stephen Henson
c8281fd38e
PR: 1696
...
Check return value if d2i_PBEPARAM().
2010-03-28 00:42:29 +00:00
Dr. Stephen Henson
fe8e6bff9b
PR: 1763
...
Remove useless num = 0 assignment.
Remove redundant cases on sock_ctrl(): default case handles them.
2010-03-27 23:28:23 +00:00
Dr. Stephen Henson
9caf25d144
PR: 1904
...
Submitted by: David Woodhouse <dwmw2@infradead.org >
Pass passphrase minimum length down to UI.
2010-03-27 19:27:51 +00:00
Dr. Stephen Henson
348620c7ac
PR: 1813
...
Submitted by: Torsten Hilbrich <torsten.hilbrich@secunet.com >
Fix memory leak when engine name cannot be loaded.
2010-03-27 18:28:13 +00:00
Dr. Stephen Henson
30fc2ab92b
update FAQ
2010-03-25 12:07:45 +00:00
Bodo Möller
5b5464d525
Fix for "Record of death" vulnerability CVE-2010-0740.
...
Also, add missing CHANGES entry for CVE-2009-3245 (code changes submitted to this branch on 23 Feb 2010).
2010-03-25 11:22:42 +00:00
Dr. Stephen Henson
cd15a0528f
initialise buf if wrong_info not used
2010-03-24 23:42:20 +00:00
Dr. Stephen Henson
7b52778eff
PR: 1731 and maybe 2197
...
Clear error queue in a few places in SSL code where errors are expected
so they don't stay in the queue.
2010-03-24 23:16:49 +00:00
Andy Polyakov
162de2f2b5
rand_win.c: fix logical bug in readscreen [from HEAD].
2010-03-22 22:44:35 +00:00
Andy Polyakov
f6e4af6fd7
bss_file.c: fix MSC 6.0 warning [from HEAD].
2010-03-22 22:39:46 +00:00
Andy Polyakov
32b76dcdac
e_capi.c: fix typo.
2010-03-15 22:29:20 +00:00
Andy Polyakov
bcfd252052
Fix UPLINK typo [from HEAD].
2010-03-15 22:26:33 +00:00
Dr. Stephen Henson
32c452779e
workaround for missing definition in some headers
2010-03-15 13:09:39 +00:00
Dr. Stephen Henson
118b90c59e
PR: 2192
...
Submitted By: Jaroslav Imrich <jaroslav.imrich@disig.sk >
The prompt_info and wrong_info parameters can be empty strings which
can produce confusing prompts. Treat empty string same as NULL.
2010-03-12 12:48:46 +00:00
Dr. Stephen Henson
f6a61b140e
missing goto meant signature was never printed out
2010-03-12 12:07:05 +00:00
Dr. Stephen Henson
75ece4b5cf
don't leave bogus errors in the queue
2010-03-10 13:48:21 +00:00
Dr. Stephen Henson
724cca4178
make update
2010-03-09 17:23:51 +00:00
Dr. Stephen Henson
5b3fdb0181
PR: 2188
...
Submitted By: Jaroslav Imrich <jaroslav.imrich@disig.sk >
Add "missing" functions to get and set prompt constructor.
2010-03-09 17:18:17 +00:00
Dr. Stephen Henson
fcc3d0265d
PR: 2186
...
Submitted By: "Joel Rabinovitch" <Joel.Rabinovitch@tecsys.com >
Detect aix64-gcc
2010-03-09 17:08:39 +00:00
Dr. Stephen Henson
5356ea7cde
reserve a few more bits for future cipher modes
2010-03-08 23:47:57 +00:00
Dr. Stephen Henson
06226df1a9
The OID sanity check was incorrect. It should only disallow *leading* 0x80
...
values.
2010-03-07 16:40:19 +00:00
Dr. Stephen Henson
bf638ef026
don't add digest alias if signature algorithm is undefined
2010-03-06 20:47:45 +00:00
Dr. Stephen Henson
07973d5db8
Fix memory leak: free up ENGINE functional reference if digest is not
...
found in an ENGINE.
2010-03-05 13:33:43 +00:00
Dr. Stephen Henson
3b3f71121b
PR: 2183
...
PR#1999 broke fork detection by assuming HAVE_FORK was set for all platforms.
Include original HAVE_FORK detection logic while allowing it to be
overridden on specific platforms with -DHAVE_FORK=1 or -DHAVE_FORK=0
2010-03-03 19:56:17 +00:00
Dr. Stephen Henson
47333a34d5
Submitted by: Tomas Hoger <thoger@redhat.com>
...
Fix for CVE-2010-0433 where some kerberos enabled versions of OpenSSL
could be crashed if the relevant tables were not present (e.g. chrooted).
2010-03-03 15:41:00 +00:00
Dr. Stephen Henson
d92138f703
don't mix definitions and code
2010-03-03 15:30:26 +00:00
Andy Polyakov
b2bf335327
Fix s390x-specific HOST_l2c|c2l [from HEAD].
...
Submitted by: Andreas Krebbel
2010-03-02 16:25:10 +00:00
Dr. Stephen Henson
33bec62a20
PR: 2178
...
Submitted by: "Kennedy, Brendan" <brendan.kennedy@intel.com >
Handle error codes correctly: cryptodev returns 0 for success whereas OpenSSL
returns 1.
2010-03-01 23:54:34 +00:00
Dr. Stephen Henson
2e630b1847
use supplied ENGINE in genrsa
2010-03-01 14:22:02 +00:00
Dr. Stephen Henson
002d3fe863
use correct prototype as in HEAD
2010-03-01 03:01:56 +00:00
Dr. Stephen Henson
fb24311e7c
'typo'
2010-03-01 01:52:47 +00:00
Dr. Stephen Henson
90278430d9
make USE_CRYPTODEV_DIGESTS work
2010-03-01 01:19:36 +00:00
Ben Laurie
bcd9d12a8d
Fix warning.
2010-02-28 13:38:16 +00:00
Dr. Stephen Henson
79363339b7
algorithms field has changed in 1.0.0 and later: update
2010-02-28 00:24:24 +00:00
Dr. Stephen Henson
fbe2c6b33e
Add Kerberos fix which was in 0.9.8-stable but never committed to HEAD and
...
1.0.0. Original fix was on 2007-Mar-09 and had the log message: "Fix kerberos
ciphersuite bugs introduced with PR:1336."
2010-02-27 23:04:10 +00:00
Dr. Stephen Henson
fc11f47229
Revert CFB block length change. Despite what SP800-38a says the input to
...
CFB mode does *not* have to be a multiple of the block length and several
other specifications (e.g. PKCS#11) do not require this.
2010-02-26 14:41:48 +00:00
Dr. Stephen Henson
2b23d89d14
oops, use correct date
2010-02-26 12:14:30 +00:00
Dr. Stephen Henson
9cfa3cff54
update FAQ, NEWS
2010-02-25 18:21:20 +00:00
Dr. Stephen Henson
6507653e72
The meaning of the X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY and
...
X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT error codes were reversed in
the verify application documentation.
2010-02-23 14:09:22 +00:00
Bodo Möller
7fe747d1eb
Always check bn_wexpend() return values for failure (CVE-2009-3245).
...
(The CHANGES entry covers the change from PR #2111 as well, submitted by
Martin Olsson.)
Submitted by: Neel Mehta
2010-02-23 10:36:30 +00:00
Bodo Möller
32567c9f3b
Fix X509_STORE locking
2010-02-19 18:26:23 +00:00
Dr. Stephen Henson
4f3d52fedc
clarify documentation
2010-02-18 12:41:50 +00:00
Dr. Stephen Henson
8321bab39c
OR default SSL_OP_LEGACY_SERVER_CONNECT so existing options are preserved
2010-02-17 19:43:46 +00:00
Dr. Stephen Henson
989238802a
Allow renegotiation if SSL_OP_LEGACY_SERVER_CONNECT is set as well as
...
initial connection to unpatched servers. There are no additional security
concerns in doing this as clients don't see renegotiation during an
attack anyway.
2010-02-17 18:38:10 +00:00
Dr. Stephen Henson
9051fc538f
PR: 2100
...
Submitted by: James Baker <jbaker@tableausoftware.com > et al.
Workaround for slow Heap32Next on some versions of Windows.
2010-02-17 14:32:25 +00:00
Dr. Stephen Henson
03fd7f27db
Submitted by: Dmitry Ivanov <vonami@gmail.com>
...
Don't leave dangling pointers in GOST engine if calls fail.
2010-02-16 14:30:19 +00:00
Dr. Stephen Henson
45d6a15ae9
PR: 2171
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Since SSLv2 doesn't support renegotiation at all don't reject it if
legacy renegotiation isn't enabled.
Also can now use SSL2 compatible client hello because RFC5746 supports it.
2010-02-16 14:20:40 +00:00
Dr. Stephen Henson
6c6ca18664
The "block length" for CFB mode was incorrectly coded as 1 all the time. It
...
should be the number of feedback bits expressed in bytes. For CFB1 mode set
this to 1 by rounding up to the nearest multiple of 8.
2010-02-15 19:40:30 +00:00
Dr. Stephen Henson
97fe2b40c1
Correct ECB mode EVP_CIPHER definition: IV length is 0
2010-02-15 19:25:52 +00:00
Dr. Stephen Henson
f689ab5017
add EVP_CIPH_FLAG_LENGTH_BITS from 0.9.8-stable
2010-02-15 19:17:55 +00:00
Dr. Stephen Henson
edb7cac271
PR: 2164
...
Submitted by: "Noszticzius, Istvan" <inoszticzius@rightnow.com >
Don't clear the output buffer: ciphers should correctly the same input
and output buffers.
2010-02-15 19:01:56 +00:00
Dr. Stephen Henson
81d87a2a28
update references to new RI RFC
2010-02-12 21:59:57 +00:00
Dr. Stephen Henson
7366f0b304
PR: 2170
...
Submitted by: Magnus Lilja <lilja.magnus@gmail.com >
Make -c option in dgst work again.
2010-02-12 17:07:24 +00:00
Dr. Stephen Henson
1d8fa09c80
Make assembly language versions of OPENSSL_cleanse() accept zero length
...
parameter. Backport from HEAD, orginal by appro.
2010-02-12 17:02:13 +00:00
Dr. Stephen Henson
e085e6c84c
Fix memory leak in ENGINE autoconfig code. Improve error logging.
2010-02-09 14:17:57 +00:00
Dr. Stephen Henson
008fa4584d
update year
2010-02-09 14:13:00 +00:00
Dr. Stephen Henson
c8c49133d9
oops, use new value for new flag
2010-02-07 13:54:54 +00:00
Dr. Stephen Henson
961f1dea06
make update
2010-02-07 13:47:08 +00:00
Dr. Stephen Henson
1700426256
Add missing function EVP_CIPHER_CTX_copy(). Current code uses memcpy() to copy
...
an EVP_CIPHER_CTX structure which may have problems with external ENGINEs
who need to duplicate internal handles etc.
2010-02-07 13:41:23 +00:00
Dr. Stephen Henson
aa7f5baad2
don't assume 0x is at start of string
2010-02-03 18:19:05 +00:00
Dr. Stephen Henson
45acdd6f6d
tolerate broken CMS/PKCS7 implementations using signature OID instead of digest
2010-02-02 14:26:32 +00:00
Dr. Stephen Henson
8b354e776b
PR: 2161
...
Submitted by: Doug Goldstein <cardoe@gentoo.org >, Steve.
Make no-dsa, no-ecdsa and no-rsa compile again.
2010-02-02 13:36:05 +00:00
Dr. Stephen Henson
868f5e44ca
PR: 2160
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Make session tickets work with DTLS.
2010-02-01 16:49:42 +00:00
Dr. Stephen Henson
4e5fdd11ea
PR: 2159
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Typo in PR#1949 bug, oops!
2010-02-01 12:44:11 +00:00
Richard Levitte
d552a3391a
Typo.
2010-01-29 12:07:50 +00:00
Richard Levitte
d023b4e2dd
The previous take went wrong, try again.
2010-01-29 12:02:54 +00:00
Richard Levitte
fa79cc9c23
Architecture specific header files need special handling.
2010-01-29 11:44:40 +00:00
Richard Levitte
06daa75fb9
If opensslconf.h and buildinf.h are to be in an architecture specific
...
directory, place it in the same tree as the other architecture
specific things.
2010-01-29 11:43:53 +00:00
Dr. Stephen Henson
ffa304c838
oops, revert more test code arghh!
2010-01-28 17:52:18 +00:00
Dr. Stephen Henson
df21765a3e
In engine_table_select() don't clear out entire error queue: just clear
...
out any we added using ERR_set_mark() and ERR_pop_to_mark() otherwise
errors from other sources (e.g. SSL library) can be wiped.
2010-01-28 17:50:23 +00:00
Dr. Stephen Henson
5a6ae115f8
reword RI description
2010-01-27 18:53:49 +00:00
Dr. Stephen Henson
5e5df40b9b
update documentation to reflect new renegotiation options
2010-01-27 17:50:20 +00:00
Dr. Stephen Henson
6d4943e81f
Some shells print out the directory name if CDPATH is set breaking the
...
pod2man test. Use ./util instead to avoid this.
2010-01-27 16:06:58 +00:00
Dr. Stephen Henson
57cffe901f
typo
2010-01-27 14:05:15 +00:00
Dr. Stephen Henson
a758f61793
PR: 2157
...
Submitted by: "Green, Paul" <Paul.Green@stratus.com >
Typo.
2010-01-27 12:55:52 +00:00
Richard Levitte
b3b35df2a2
Cosmetic changes, including changing a confusing example.
2010-01-27 09:18:05 +00:00
Richard Levitte
5ad50246fc
Apparently, test/testtsa.com was only half done
2010-01-27 01:19:12 +00:00
Richard Levitte
d89b895cfd
size_t doesn't compare less than zero...
2010-01-27 01:18:26 +00:00
Dr. Stephen Henson
d793c292cb
add CHANGES entry
2010-01-26 19:48:10 +00:00
Dr. Stephen Henson
57749b1b9f
PR: 1949
...
Submitted by: steve@openssl.org
More robust fix and workaround for PR#1949. Don't try to work out if there
is any write pending data as this can be unreliable: always flush.
2010-01-26 19:46:30 +00:00
Dr. Stephen Henson
1cdb7854a5
PR: 2138
...
Submitted by: Kevin Regan <k.regan@f5.com >
Clear stat structure if -DPURIFY is set to avoid problems on some
platforms which include unitialised fields.
2010-01-26 18:07:41 +00:00
Dr. Stephen Henson
704d33b347
Add flags functions which were added to 0.9.8 for fips but not 1.0.0 and
...
later.
2010-01-26 14:33:52 +00:00
Dr. Stephen Henson
b2a7515ee8
OPENSSL_isservice is now defined on all platforms not just WIN32
2010-01-26 13:58:49 +00:00
Dr. Stephen Henson
f4f2b52995
oops
2010-01-26 13:56:15 +00:00
Dr. Stephen Henson
c7d5edbf5e
export OPENSSL_isservice and make update
2010-01-26 13:55:33 +00:00
Dr. Stephen Henson
d8f07f1674
Typo
2010-01-26 12:29:48 +00:00
Dr. Stephen Henson
78bfb45b07
PR: 2149
...
Submitted by: Douglas Stebila <douglas@stebila.ca >
Fix wap OIDs.
2010-01-25 16:07:51 +00:00
Richard Levitte
6ad4d60555
There's really no need to use $ENV::HOME
2010-01-25 00:22:52 +00:00
Richard Levitte
2fad8aa209
Forgot to correct the definition of __arch in this file.
...
Submitted by Steven M. Schweda <sms@antinode.info >
2010-01-25 00:21:14 +00:00
Richard Levitte
74397d45b2
It seems like sslroot: needs to be defined for some tests to work.
...
Submitted by Steven M. Schweda <sms@antinode.info >
2010-01-25 00:20:32 +00:00
Richard Levitte
c8ca769d3b
Compile t1_reneg on VMS as well.
...
Submitted by Steven M. Schweda <sms@antinode.info >
2010-01-25 00:19:33 +00:00
Richard Levitte
25d42c17e3
A few more macros for long symbols.
...
Submitted by Steven M. Schweda <sms@antinode.info >
2010-01-25 00:18:31 +00:00
Dr. Stephen Henson
a377811f15
PR: 2153, 2125
...
Submitted by: steve@openssl.org
The original fix for PR#2125 broke compilation on some Unixware platforms:
revert and make conditional on VMS.
2010-01-24 16:57:38 +00:00
Dr. Stephen Henson
ef1b6b2cf2
The fix for PR#1949 unfortunately broke cases where the BIO_CTRL_WPENDING
...
ctrl is incorrectly implemented (e.g. some versions of Apache). As a workaround
call both BIO_CTRL_INFO and BIO_CTRL_WPENDING if it returns zero. This should
both address the original bug and retain compatibility with the old behaviour.
2010-01-24 13:54:07 +00:00
Dr. Stephen Henson
1699389a46
Tolerate PKCS#8 DSA format with negative private key.
2010-01-22 20:17:30 +00:00
Dr. Stephen Henson
ad8ee3d7d1
If legacy renegotiation is not permitted then send a fatal alert if a patched
...
server attempts to renegotiate with an unpatched client.
2010-01-22 18:49:19 +00:00
Dr. Stephen Henson
39f0a4d8e9
typo
2010-01-21 18:46:28 +00:00
Dr. Stephen Henson
15a9821cc2
fix comments
2010-01-21 01:17:45 +00:00
Dr. Stephen Henson
53e97e7433
update version for next beta if we have one...
2010-01-20 15:40:27 +00:00
Dr. Stephen Henson
bc0ecd202a
make update
2010-01-20 15:05:52 +00:00
Dr. Stephen Henson
b307daa23f
Prepare for beta5 release
2010-01-20 15:00:49 +00:00
Dr. Stephen Henson
4c95b1bfda
Update demo
2010-01-20 14:05:56 +00:00
Dr. Stephen Henson
9359fc5ff2
Support -L options in VC++ link.
2010-01-20 14:04:55 +00:00
Andy Polyakov
a238d7d1eb
rand_win.c: handel GetTickCount wrap-around [from HEAD].
2010-01-19 21:44:07 +00:00
Andy Polyakov
0e92313331
x86_64-xlate.pl: refine sign extension logic when handling lea [from HEAD].
...
PR: 2094,2095
2010-01-19 21:43:05 +00:00
Andy Polyakov
3e719c99f5
s390x assembler update: add support for run-time facility detection [from HEAD].
2010-01-19 21:40:58 +00:00
Dr. Stephen Henson
2a4d0dcb89
The use of NIDs in the password based encryption table can result in
...
algorithms not found when an application uses PKCS#12 and only calls
SSL_library_init() instead of OpenSSL_add_all_algorithms(). Simple
work around is to add the missing algorithm (40 bit RC2) in
SSL_library_init().
2010-01-19 19:55:47 +00:00
Dr. Stephen Henson
2e155fde39
PR: 2141
...
Submitted by: "NARUSE, Yui" <naruse@airemix.jp >
Remove non-ASCII comment which causes compilation errors on some versions
of VC++.
2010-01-19 19:28:03 +00:00
Dr. Stephen Henson
9a8c8cb22e
stop asn1test compilation producing link errors
2010-01-19 19:25:16 +00:00
Dr. Stephen Henson
04aa7441ab
PR: 2144
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Better fix for PR#2144
2010-01-19 19:11:21 +00:00
Dr. Stephen Henson
28dc54f6d9
Reverted patch for PR#2095. Addressed by Andy now in x86_64-xlate.pl
2010-01-17 16:58:56 +00:00
Dr. Stephen Henson
a1e1165200
PR: 2135
...
Submitted by: Mike Frysinger <vapier@gentoo.org >
Change missed references to lib to $(LIBDIR)
2010-01-16 20:06:10 +00:00
Dr. Stephen Henson
ddba003d5e
PR: 2144
...
Submitted by: steve@openssl.org
Fix DTLS connection so new_session is reset if we read second client hello:
new_session is used to detect renegotiation.
2010-01-16 19:45:59 +00:00
Dr. Stephen Henson
e59d9a34c9
PR: 2133
...
Submitted by: steve@openssl.org
Add missing DTLS state strings.
2010-01-16 19:20:38 +00:00
Ben Laurie
9e198c4bd0
Fix type-checking/casting issue.
2010-01-16 13:32:14 +00:00
Dr. Stephen Henson
7eceffbfef
convert to Unix EOL form
2010-01-15 15:26:32 +00:00
Dr. Stephen Henson
8043f01b13
PR: 2125
...
Submitted by: "Alon Bar-Lev" <alon.barlev@gmail.com >
Fix gcc-aix compilation issue.
2010-01-14 17:51:52 +00:00
Dr. Stephen Henson
41c0f68630
Fix version handling so it can cope with a major version >3.
...
Although it will be many years before TLS v2.0 or later appears old versions
of servers have a habit of hanging around for a considerable time so best
if we handle this properly now.
2010-01-13 19:08:29 +00:00
Dr. Stephen Henson
2c627637c5
Modify compression code so it avoids using ex_data free functions. This
...
stops applications that call CRYPTO_free_all_ex_data() prematurely leaking
memory.
2010-01-13 18:46:01 +00:00
Dr. Stephen Henson
58f4b3511e
update ordinals
2010-01-12 17:33:59 +00:00
Dr. Stephen Henson
93fac08ec3
PR: 2136
...
Submitted by: Willy Weisz <weisz@vcpc.univie.ac.at >
Add options to output hash using older algorithm compatible with OpenSSL
versions before 1.0.0
2010-01-12 17:27:11 +00:00
Dr. Stephen Henson
23c3bee970
make update
2010-01-12 01:59:11 +00:00
Dr. Stephen Henson
73ff97ad76
Simplify RI+SCSV logic:
...
1. Send SCSV is not renegotiating, never empty RI.
2. Send RI if renegotiating.
2010-01-07 19:05:03 +00:00
Andy Polyakov
0d8ffc2007
b_sock.c: bind/connect are picky about socket address length [from HEAD].
2010-01-07 13:15:39 +00:00
Andy Polyakov
a32f7fb832
sendto is reportedly picky about destination socket address length [from HEAD].
...
PR: 2114
Submitted by: Robin Seggelmann
2010-01-07 10:44:21 +00:00
Andy Polyakov
496cf69e40
Fix compilation on older Linux [from HEAD].
2010-01-06 21:25:22 +00:00
Dr. Stephen Henson
eb17330837
Updates to conform with draft-ietf-tls-renegotiation-03.txt:
...
1. Add provisional SCSV value.
2. Don't send SCSV and RI at same time.
3. Fatal error is SCSV received when renegotiating.
2010-01-06 17:37:38 +00:00
Dr. Stephen Henson
2708603bb4
ENGINE_load_capi() now exists on all platforms (but no op on non-WIN32)
2010-01-06 13:20:52 +00:00
Dr. Stephen Henson
e4f1cda7de
PR: 2102
...
Submitted by: John Fitzgibbon <john_fitzgibbon@yahoo.com >
Remove duplicate definitions.
2010-01-05 17:58:15 +00:00
Dr. Stephen Henson
4359b88bbe
Typo
2010-01-05 17:50:01 +00:00
Dr. Stephen Henson
c079fde3f7
PR: 2132
...
Submitted by: steve
Fix bundled pod2man.pl to handle alternative comment formats.
2010-01-05 17:33:09 +00:00
Dr. Stephen Henson
6e94156199
Remove tabs on blank lines: they produce warnings in pod2man
2010-01-05 17:17:20 +00:00
Dr. Stephen Henson
1f67a3a985
compress_meth should be unsigned
2010-01-05 16:46:39 +00:00
Dr. Stephen Henson
4cba294d79
Client side compression algorithm sanity checks: ensure old compression
...
algorithm matches current and give error if compression is disabled and
server requests it (shouldn't happen unless server is broken).
2010-01-01 14:39:51 +00:00
Dr. Stephen Henson
e642fd7a1c
Compression handling on session resume was badly broken: it always
...
used compression algorithms in client hello (a legacy from when
the compression algorithm wasn't serialized with SSL_SESSION).
2010-01-01 00:44:36 +00:00
Andy Polyakov
5448e6739c
b_sock.c: correct indirect calls on WinSock platforms [from HEAD].
...
PR: 2130
Submitted by: Eugeny Gostyukhin
2009-12-30 12:56:16 +00:00
Andy Polyakov
f0389d8d37
Adapt mingw config for newer mingw environment [from HEAD].
...
PR: 2113
2009-12-30 11:57:39 +00:00
Andy Polyakov
a5313cf360
sha512.c update for esoteric PPC platfrom(s) [from HEAD].
...
PR: 1998
2009-12-30 11:53:33 +00:00
Andy Polyakov
b26c45b033
Deploy multilib config-line parameter [from HEAD].
2009-12-29 10:46:46 +00:00
Dr. Stephen Henson
986093affa
Typo
2009-12-27 23:03:25 +00:00
Dr. Stephen Henson
f88e0acb0e
Update RI to match latest spec.
...
MCSV is now called SCSV.
Don't send SCSV if renegotiating.
Also note if RI is empty in debug messages.
2009-12-27 22:59:09 +00:00
Dr. Stephen Henson
aed461b431
Traditional Yuletide commit ;-)
...
Add Triple DES CFB1 and CFB8 to algorithm list and NID translation.
2009-12-25 14:12:24 +00:00
Bodo Möller
8bbd0e826c
Use properly local variables for thread-safety.
...
Submitted by: Martin Rex
2009-12-22 11:52:15 +00:00
Bodo Möller
40c45f86d4
Constify crypto/cast.
2009-12-22 11:45:59 +00:00
Bodo Möller
a0b7277724
Constify crypto/cast.
2009-12-22 10:58:01 +00:00
Dr. Stephen Henson
54bc369ad7
Alert to use is now defined in spec: update code
2009-12-17 15:42:43 +00:00
Dr. Stephen Henson
2d3855fc6e
PR: 2127
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Check for lookup failures in EVP_PBE_CipherInit().
2009-12-17 15:28:45 +00:00
Dr. Stephen Henson
1cd47f5f6e
Ooops revert stuff which shouldn't have been part of previous commit.
2009-12-16 20:33:11 +00:00
Dr. Stephen Henson
675564835c
New option to enable/disable connection to unpatched servers
2009-12-16 20:28:30 +00:00
Dr. Stephen Henson
2456cd58c4
Allow initial connection (but no renegoriation) to servers which don't support
...
RI.
Reorganise RI checking code and handle some missing cases.
2009-12-14 13:55:39 +00:00
Ben Laurie
43a107026d
Missing error code.
2009-12-12 15:57:53 +00:00
Ben Laurie
ef0498a00b
Use gcc 4.4.
2009-12-12 15:57:19 +00:00
Dr. Stephen Henson
f1784f2fd2
Move SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION out of SSL_OP_ALL
2009-12-11 00:20:58 +00:00
Dr. Stephen Henson
730f5752ff
clarify docs
2009-12-09 18:17:09 +00:00
Dr. Stephen Henson
a88c73b43a
Document option clearning functions.
...
Initial secure renegotiation documentation.
2009-12-09 18:00:52 +00:00
Dr. Stephen Henson
a6d204e241
Add patch to crypto/evp which didn't apply from PR#2124
2009-12-09 15:02:14 +00:00
Dr. Stephen Henson
941baf6641
Revert lhash patch for PR#2124
2009-12-09 15:00:20 +00:00
Dr. Stephen Henson
b41a614686
Check s3 is not NULL
2009-12-09 14:53:51 +00:00
Dr. Stephen Henson
aac751832a
PR: 2124
...
Submitted by: Jan Pechanec <Jan.Pechanec@Sun.COM >
Check for memory allocation failures.
2009-12-09 13:38:20 +00:00
Dr. Stephen Henson
52a08e90d1
Add ctrls to clear options and mode.
...
Change RI ctrl so it doesn't clash.
2009-12-09 13:25:38 +00:00
Dr. Stephen Henson
6b5f0458fe
Send no_renegotiation alert as required by spec.
2009-12-08 19:06:09 +00:00
Dr. Stephen Henson
b52a2738d4
Add ctrl and macro so we can determine if peer support secure renegotiation.
2009-12-08 13:42:32 +00:00
Dr. Stephen Henson
10f99d7b77
Add support for magic cipher suite value (MCSV). Make secure renegotiation
...
work in SSLv3: initial handshake has no extensions but includes MCSV, if
server indicates RI support then renegotiation handshakes include RI.
NB: current MCSV value is bogus for testing only, will be updated when we
have an official value.
Change mismatch alerts to handshake_failure as required by spec.
Also have some debugging fprintfs so we can clearly see what is going on
if OPENSSL_RI_DEBUG is set.
2009-12-08 13:15:12 +00:00
Dr. Stephen Henson
593222afe1
PR: 2121
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Add extension support to DTLS code mainly using existing implementation for
TLS.
2009-12-08 11:38:18 +00:00
Dr. Stephen Henson
7b1856e5a1
PR: 2111
...
Submitted by: Martin Olsson <molsson@opera.com >
Check for bn_wexpand errors in bn_mul.c
2009-12-02 15:28:05 +00:00
Dr. Stephen Henson
3d5d81bf39
Replace the broken SPKAC certification with the correct version.
2009-12-02 14:41:24 +00:00
Dr. Stephen Henson
50f06b46f4
Check it actually compiles this time ;-)
2009-12-02 14:25:55 +00:00
Dr. Stephen Henson
be6076c0ad
PR: 2120
...
Submitted by: steve@openssl.org
Initialize fields correctly if pem_str or info are NULL in EVP_PKEY_asn1_new().
2009-12-02 13:57:03 +00:00
Dr. Stephen Henson
6125e07d79
check DSA_sign() return value properly
2009-12-01 18:41:50 +00:00
Dr. Stephen Henson
d5b8c46499
PR: 2115
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Add Renegotiation extension to DTLS, fix DTLS ClientHello processing bug.
2009-12-01 17:41:42 +00:00
Dr. Stephen Henson
7805e23588
PR: 1432
...
Submitted by: "Andrzej Chmielowiec" <achmielowiec@enigma.com.pl >, steve@openssl.org
Approved by: steve@openssl.org
Truncate hash if it is too large: as required by FIPS 186-3.
2009-12-01 17:32:33 +00:00
Dr. Stephen Henson
9117b9d17a
PR: 2118
...
Submitted by: Mounir IDRASSI <mounir.idrassi@idrix.net >
Approved by: steve@openssl.org
Check return value of ECDSA_sign() properly.
2009-11-30 13:53:42 +00:00
Dr. Stephen Henson
e274c8fb72
typo
2009-11-29 13:45:18 +00:00
Andy Polyakov
e8dbd66e2b
cms-test.pl: use EXE_EXT (from HEAD).
...
PR: 2107
2009-11-26 21:12:12 +00:00
Andy Polyakov
8b9b23603f
bss_dgram.c: re-fix BIO_CTRL_DGRAM_GET_PEER (from HEAD).
2009-11-26 20:56:05 +00:00
Bodo Möller
aefb9dc5e5
Make CHANGES in the OpenSSL_1_0_0-stable branch consistent with the
...
one in the OpenSSL_0_9_8-stable branch.
2009-11-26 18:37:11 +00:00
Andy Polyakov
a8c1b19a31
x86_64-xlate.pl: fix typo introduced in last commit.
...
PR: 2109
2009-11-23 19:51:24 +00:00
Andy Polyakov
29c8d2a54a
x86_64-xlate.pl: new gas requires sign extension.
...
x86masm.pl: fix linker warning.
PR: 2094,2095
2009-11-22 12:52:18 +00:00
Andy Polyakov
87827be0c2
VC-32.pl: bufferoverlowu.lib only when needed and remove duplicate code
...
(update from HEAD).
PR: 2086
2009-11-22 12:26:15 +00:00
Andy Polyakov
e4572e5210
bio_sock.c and bss_dgram.c: update from HEAD.
...
PR: 2069
2009-11-22 12:24:43 +00:00
Dr. Stephen Henson
3e8e12a6b6
Servers can't end up talking SSLv2 with legacy renegotiation disabled
2009-11-18 15:09:35 +00:00
Dr. Stephen Henson
5ddbb8f41a
Don't use SSLv2 compatible client hello if we don't tolerate legacy renegotiation
2009-11-18 14:45:32 +00:00
Dr. Stephen Henson
3c44e92bcb
Include a more meaningful error message when rejecting legacy renegotiation
2009-11-18 14:19:52 +00:00
Dr. Stephen Henson
5e8d95f590
PR: 2103
...
Submitted by: Rob Austein <sra@hactrn.net >
Approved by: steve@openssl.org
Initialise atm.flags to 0.
2009-11-17 13:25:35 +00:00
Dr. Stephen Henson
2156704924
PR: 2101 (additional)
...
Submitted by: Roumen Petrov <openssl@roumenpetrov.info >
Approved by: steve@openssl.org
Another mingw fix.
2009-11-15 19:06:21 +00:00
Dr. Stephen Henson
4e49aa0ca3
PR: 2095
...
Submitted by: Arkadiusz Miskiewicz <arekm@maven.pl >
Approved by: steve@openssl.org
Fix for out range of signed 32bit displacement error on newer binutils
in file sha1-x86_64.pl
2009-11-13 14:23:44 +00:00
Dr. Stephen Henson
d5d1c53735
PR: 2101
...
Submitted by: Doug Kaufman <dkaufman@rahul.net >
Approved by: steve@openssl.org
Fixes for tests in cms-test.pl
2009-11-13 13:44:14 +00:00
Richard Levitte
1aac5c0ee8
Add test_cms
2009-11-13 08:45:52 +00:00
Dr. Stephen Henson
4434328b0a
PR: 2088
...
Submitted by: Aleksey Samsonov <s4ms0n0v@gmail.com >
Approved by: steve@openssl.org
Fix memory leak in d2i_PublicKey().
2009-11-12 19:57:39 +00:00
Dr. Stephen Henson
9b2cfb890c
set engine to NULL after releasing it
2009-11-12 19:24:34 +00:00
Richard Levitte
b2f364ec62
Compiling vms.mar doesn't work on other than VAX.
2009-11-12 14:05:04 +00:00
Richard Levitte
b7aeb4c9b5
Another symbol longer than 31 characters.
2009-11-12 14:04:26 +00:00
Richard Levitte
370f48da2a
Typo
2009-11-12 14:03:57 +00:00
Richard Levitte
32def77ace
Everywhere was a little too much.
2009-11-12 14:03:35 +00:00
Dr. Stephen Henson
531c81ece8
PR: 2098
...
Submitted by: Corinna Vinschen <vinschen@redhat.com >
Approved by: steve@openssl.org
For Cygwin enable zlib and mdc2 by default.
2009-11-11 19:04:56 +00:00
Dr. Stephen Henson
73582b8117
add missing parts of reneg port, fix apps patch
2009-11-11 14:51:29 +00:00
Dr. Stephen Henson
5c33091cfa
commit missing apps code for reneg fix
2009-11-11 14:10:09 +00:00
Dr. Stephen Henson
56327ebe6a
make update
2009-11-10 13:23:04 +00:00
Dr. Stephen Henson
e0031b1c78
Prepare for beta4 release
2009-11-10 13:15:09 +00:00
Dr. Stephen Henson
b2ac5cb2d0
PR: 1686
...
Submitted by: Hanno Böck <hanno@hboeck.de >
Approved by: steve@openssl.org
Create engines dir if it doesn't already exist.
2009-11-10 01:52:52 +00:00
Dr. Stephen Henson
6757ef89b3
PR: 2091
...
Submitted by: Martin Kaiser <lists@kaiser.cx >, Stephen Henson
Approved by: steve@openssl.org
If an OID has no short name or long name return the numerical representation.
2009-11-10 01:00:23 +00:00
Dr. Stephen Henson
bf6eea6536
PR: 2090
...
Submitted by: Martin Kaiser <lists@kaiser.cx >, Stephen Henson
Approved by: steve@openssl.org
Improve error checking in asn1_gen.c
2009-11-10 00:47:37 +00:00
Dr. Stephen Henson
ec4346f6f9
oops, add missing prototypes
2009-11-09 18:58:50 +00:00
Dr. Stephen Henson
e42ff486a8
fix CHANGES
2009-11-09 18:46:59 +00:00
Dr. Stephen Henson
bc9058d041
First cut of renegotiation extension. (port to 1.0.0-stable)
2009-11-09 18:45:42 +00:00
Dr. Stephen Henson
4a276f3039
make update
2009-11-09 14:35:30 +00:00
Dr. Stephen Henson
acf47d8f24
Remove BF_PTR2 from configuration: it doesn't improve performance any more and causes gcc warnings about arrays out of range
2009-11-09 14:11:13 +00:00
Dr. Stephen Henson
f62d1ea3d5
Combat gcc 4.4.1 aliasing rules. (from HEAD)
2009-11-09 14:09:53 +00:00
Dr. Stephen Henson
f923bba73c
file t1_reneg.c was added on branch OpenSSL_1_0_0-stable on 2009-11-09 18:45:42 +0000
2009-11-08 14:51:55 +00:00
Dr. Stephen Henson
e3738c49b8
If it is a new session don't send the old TLS ticket: send a zero length
...
ticket to request a new session.
2009-11-08 14:36:32 +00:00
Dr. Stephen Henson
41746da8c2
Update ordinals.
2009-11-04 13:29:58 +00:00
Dr. Stephen Henson
23b97c6bb5
PR: 2089
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
DTLS Fragment size bug fix.
2009-11-02 13:37:17 +00:00
Dr. Stephen Henson
4a7f7171f5
Add missing functions to allow access to newer X509_STORE_CTX status
...
information. Add more informative message to verify callback to indicate
when CRL path validation is taking place.
2009-10-31 19:21:47 +00:00
Dr. Stephen Henson
961092281f
Add option to allow in-band CRL loading in verify utility. Add function
...
load_crls and tidy up load_certs. Remove useless purpose variable from
verify utility: now done with args_verify.
2009-10-31 13:34:19 +00:00
Dr. Stephen Henson
036b3f331b
Generate stateless session ID just after the ticket is received instead
...
of when a session is loaded. This will mean that applications that
just hold onto SSL_SESSION structures and never call d2i_SSL_SESSION()
will still work.
2009-10-30 14:06:18 +00:00
Dr. Stephen Henson
9ac5c355a2
Move CHANGES entry to 0.9.8l section
2009-10-30 13:29:08 +00:00
Dr. Stephen Henson
3d0b604c14
Fix statless session resumption so it can coexist with SNI
2009-10-30 13:22:44 +00:00
Dr. Stephen Henson
257b2bfb6c
Don't attempt session resumption if no ticket is present and session
...
ID length is zero.
2009-10-28 19:52:35 +00:00
Dr. Stephen Henson
90528846e8
Add -no_cache option to s_server
2009-10-28 17:49:37 +00:00
Dr. Stephen Henson
32509c9731
Don't replace whole AR line
2009-10-28 15:33:20 +00:00
Dr. Stephen Henson
d3f940833d
PR: 2081
...
Submitted by: Mike Frysinger <vapier@gentoo.org >
Approved by: steve@openssl.org
Respect AR and RANLIB environment variables if set.
2009-10-28 14:00:41 +00:00
Dr. Stephen Henson
b335e351d4
PR: 2080
...
Submitted by: Mike Frysinger <vapier@gentoo.org >
Approved by: steve@openssl.org
Respect MAKE environment variable if set.
2009-10-28 13:55:55 +00:00
Dr. Stephen Henson
67bcde9ba8
PR: 2078
...
Submitted by: Dale Anderson <dra@redevised.net >
Approved by: steve@openssl.org
Corrections to bn_internal documentation.
2009-10-28 13:51:56 +00:00
Dr. Stephen Henson
169bfde4d4
Clarification
2009-10-23 12:47:01 +00:00
Dr. Stephen Henson
0a7f291268
Sync FAQ with HEAD.
2009-10-23 12:24:54 +00:00
Dr. Stephen Henson
0c2c2e71a6
If not checking all certificates don't attempt to find a CRL
...
for the leaf certificate of a CRL path.
2009-10-23 12:05:54 +00:00
Dr. Stephen Henson
d1d746afb4
Need to check <= 0 here.
2009-10-22 23:14:12 +00:00
Dr. Stephen Henson
db6e41f0ed
PR: 2070
...
Submitted by: Alexander Nikitovskiy <Nikitovski@ya.ru >
Approved by: steve@openssl.org
Fix wrong cast.
2009-10-19 13:13:14 +00:00
Dr. Stephen Henson
5b2b60ae98
Document additions for X509 chain verification from HEAD
2009-10-18 15:28:59 +00:00
Dr. Stephen Henson
c90a1ae0c9
make update
2009-10-18 14:44:51 +00:00
Dr. Stephen Henson
c679fb298e
Add new function X509_STORE_set_verify_cb and use it in apps
2009-10-18 14:42:27 +00:00
Dr. Stephen Henson
17c7cad545
take install prefix from the environment
2009-10-18 14:26:46 +00:00
Dr. Stephen Henson
164c263b5c
PR: 2074
...
Submitted by: Bram Neijt <bneijt@gmail.com >
Approved by: steve@openssl.org
Typo: "contet".
2009-10-16 15:29:34 +00:00
Dr. Stephen Henson
a9bb9d0eb4
PR: 2072
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Approved by: steve@openssl.org
Avoid potential doublefree and reuse of freed handshake_buffer.
2009-10-16 15:24:19 +00:00
Dr. Stephen Henson
cc6688d796
PR: 2073
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Approved by: steve@openssl.org
Don't access freed SSL_CTX in SSL_free().
2009-10-16 13:41:52 +00:00
Dr. Stephen Henson
9b1f24df3d
Fixes to CROSS_COMPILE, don't override command line option from environment
2009-10-15 23:44:11 +00:00
Dr. Stephen Henson
595e804ae3
Fix for WIN32 (and possibly other platforms) which don't define in_port_t.
2009-10-15 18:48:47 +00:00
Dr. Stephen Henson
b381e9b952
Update ordinals.
2009-10-15 18:04:43 +00:00
Dr. Stephen Henson
28418076b2
PR: 2069
...
Submitted by: Michael Tuexen <tuexen@fh-muenster.de >
Approved by: steve@openssl.org
IPv6 support for DTLS.
2009-10-15 17:41:44 +00:00
Dr. Stephen Henson
abdfdb029e
PR: 1847
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Approved by: steve@openssl.org
Integrated patches to CA.sh to bring it into line with CA.pl functionality.
2009-10-15 17:27:47 +00:00
Dr. Stephen Henson
8465b81d50
PR: 2066
...
Submitted by: Guenter <lists@gknw.net >
Approved by: steve@openssl.org
Add -r option to dgst to produce format compatible with core utilities.
2009-10-15 17:18:03 +00:00
Dr. Stephen Henson
ed65b6e512
Rename CROSS_COMPILE_PREFIX to CROSS_COMPILE
2009-10-15 13:05:41 +00:00
Dr. Stephen Henson
d793544518
Allow uname values to be overridden by the environment
2009-10-07 16:46:51 +00:00
Dr. Stephen Henson
53480a673b
Allow cross compilation prefix to come from CROSS_COMPILE environment variable
2009-10-07 16:41:33 +00:00
Dr. Stephen Henson
ad187f8905
Fix unitialized warnings
2009-10-04 16:52:35 +00:00
Dr. Stephen Henson
2280f82fc6
Fix warnings about ignoring fgets return value
2009-10-04 16:43:21 +00:00
Dr. Stephen Henson
e6714faffb
Prevent ignored return value warning
2009-10-04 14:04:14 +00:00
Dr. Stephen Henson
af8f2bb174
Prevent aliasing warning
2009-10-04 14:02:03 +00:00
Dr. Stephen Henson
d7501c16bf
Yes it is a typo ;-)
2009-10-01 12:17:18 +00:00
Dr. Stephen Henson
804196a418
PR: 2061
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct i2b_PVK_bio error handling in rsa.c, dsa.c
2009-10-01 00:26:07 +00:00
Dr. Stephen Henson
50d70c01d6
PR: 2062
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct BN_rand error handling in bntest.c
2009-10-01 00:21:55 +00:00
Dr. Stephen Henson
9fc601cfbb
PR: 2059
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct EVP_SealInit error handling in pem_seal.c
2009-10-01 00:17:35 +00:00
Dr. Stephen Henson
fed5333248
PR: 2056
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct BIO_wirte error handling in asn1_par.c
2009-10-01 00:11:49 +00:00
Dr. Stephen Henson
3d1dab4404
PR: 2055
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct BIO_ctrl error handling in s2_srvr.c
2009-10-01 00:07:10 +00:00
Dr. Stephen Henson
29c2fd46d2
PR: 2054
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct BIO_ctrl error handling
2009-10-01 00:03:50 +00:00
Dr. Stephen Henson
a3d5cdb07c
PR: 2063
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct BIO_write error handling in ocsp_prn.c
2009-09-30 23:59:16 +00:00
Dr. Stephen Henson
d99c0f6b4a
PR: 2057
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct BIO_write, BIO_printf, i2a_ASN1_INTEGER and i2a_ASN1_OBJECT
error handling in OCSP print routines.
2009-09-30 23:55:29 +00:00
Dr. Stephen Henson
43f21e62aa
PR: 2058
...
Submitted by: Julia Lawall <julia@diku.dk >
Approved by: steve@openssl.org
Correct EVP_DigestVerifyFinal error handling.
2009-09-30 23:50:10 +00:00
Dr. Stephen Henson
50425bc137
Change version from 0.9.9 to 1.0.0 in docs
2009-09-30 23:40:52 +00:00
Dr. Stephen Henson
0c690586e0
PR: 2064, 728
...
Submitted by: steve@openssl.org
Add support for custom headers in OCSP requests.
2009-09-30 21:41:53 +00:00
Dr. Stephen Henson
bc8c5fe58d
Free SSL_CTX after BIO
2009-09-30 21:35:26 +00:00
Dr. Stephen Henson
0cc0db32e3
PR: 2050
...
Submitted by: Michael Tuexen <tuexen@fh-muenster.de >
Approved by: steve@openssl.org
Fix handling of ENOTCONN and EMSGSIZE for dgram BIOs.
2009-09-22 11:34:25 +00:00
Dr. Stephen Henson
d68f7641a3
PR: 2047
...
Submitted by: David Lee <live4thee@gmail.com >, steve@openssl.org
Approved by: steve@openssl.org
Fix for IPv6 handling in BIO_get_accept_socket().
2009-09-20 16:40:59 +00:00
Dr. Stephen Henson
4fcbaa3dd9
Ooops, missing close quote
2009-09-20 12:47:04 +00:00
Dr. Stephen Henson
5e56584285
Don't use __try+__except unless on VC++
2009-09-20 12:39:16 +00:00
Dr. Stephen Henson
ca26ccb083
add version info for VC-WIN64I too
2009-09-20 11:39:59 +00:00
Dr. Stephen Henson
3e8b713b06
PR: 2048
...
Submitted by: john blair <mailtome200420032002@yahoo.com >
Approved by: steve@openssl.org
Add version info in VC-WIN64A too.
2009-09-19 23:01:24 +00:00
Andy Polyakov
13eca7d782
cmll-x86_64.pl: small buglet in CBC subroutine [from HEAD].
...
PR: 2035
2009-09-17 19:35:49 +00:00
Dr. Stephen Henson
af3d4e1b02
PR: 2039
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
DTLS listen bug fix,
2009-09-15 22:48:30 +00:00
Dr. Stephen Henson
80afb40ae3
Submitted by: Julia Lawall <julia@diku.dk>
...
The functions ENGINE_ctrl(), OPENSSL_isservice(), EVP_PKEY_sign(),
CMS_get1_RecipientRequest() and RAND_bytes() can return <=0 on error fix
so the return code is checked correctly.
2009-09-13 11:27:27 +00:00
Dr. Stephen Henson
3333428b44
PR: 2023
...
Submitted by: James Beckett <jmb.openssl@nospam.hackery.net >, steve
Approved by: steve@openssl.org
Fix documentation errors in d2i_X509 manual pages.
2009-09-12 23:34:56 +00:00
Dr. Stephen Henson
a131de9bb2
PR: 2025
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Approved by: steve@openssl.org
Constify SSL_CIPHER_description
2009-09-12 23:18:09 +00:00
Dr. Stephen Henson
0ddd002f60
PR: 1411
...
Submitted by: steve@openssl.org
Allow use of trusted certificates in SSL_CTX_use_chain_file()
2009-09-12 23:09:26 +00:00
Dr. Stephen Henson
e7209103e6
PR: 2038
...
Submitted by: Artem Chuprina <ran@cryptocom.ru >
Approved by: steve@openssl.org
Avoid double call to BIO_free().
2009-09-11 11:03:31 +00:00
Dr. Stephen Henson
53f062d050
PR: 2033
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
DTLS listen support.
2009-09-09 17:05:42 +00:00
Dr. Stephen Henson
b5b65403a4
Add new option --strict-warnings to Configure script. This is used to add
...
in devteam warnings into other configurations.
2009-09-09 16:32:19 +00:00
Dr. Stephen Henson
1a3914fe0c
Seed PRNG with DSA and ECDSA digests for additional protection against
...
possible PRNG state duplication.
2009-09-09 12:14:36 +00:00
Dr. Stephen Henson
b7e3cb31a5
PR: 2031
...
Submitted by: steve@openssl.org
Tolerate application/timestamp-response which some servers send out.
2009-09-07 17:57:02 +00:00
Dr. Stephen Henson
9769137a43
Typo presumably...
2009-09-06 17:55:40 +00:00
Dr. Stephen Henson
c0688f1aef
Make update, deleting bogus DTLS error code
2009-09-06 15:55:54 +00:00
Dr. Stephen Henson
6c29853bf2
PR: 1644
...
Submitted by: steve@openssl.org
Fix to make DHparams_dup() et al work in C++.
For 1.0 fix the final argument to ASN1_dup() so it is void *. Replace some
*_dup macros with functions.
2009-09-06 15:49:12 +00:00
Dr. Stephen Henson
2e9802b7a7
PR: 2028
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Fix DTLS cookie management bugs.
2009-09-04 17:42:06 +00:00
Dr. Stephen Henson
7483896e15
Correction: salt is now default
2009-09-04 12:27:01 +00:00
Dr. Stephen Henson
4b4f249e0d
Oops, s can be NULL
2009-09-04 11:31:19 +00:00
Dr. Stephen Henson
196dcf93bc
PR: 2020
...
Submitted by: Keith Beckman <kbeckman@mcg.edu >, Tomas Mraz <tmraz@redhat.com >
Checked by: steve@openssl.org
Fix improperly capitalized references to WWW::Curl::Easy.
2009-09-02 15:57:12 +00:00
Dr. Stephen Henson
2c11ec308b
PR: 2029
...
Submitted by: Tomas Mraz <tmraz@redhat.com >
Checked by: steve@openssl.org
Fix so that the legacy digest EVP_dss1() still works.
2009-09-02 15:51:28 +00:00
Dr. Stephen Henson
e5eb96c83a
PR: 2013
...
Submitted by: steve@openssl.org
Include a flag ASN1_STRING_FLAG_MSTRING when a multi string type is created.
This makes it possible to tell if the underlying type is UTCTime,
GeneralizedTime or Time when the structure is reused and X509_time_adj_ex()
can handle each case in an appropriate manner.
Add error checking to CRL generation in ca utility when nextUpdate is being
set.
2009-09-02 13:55:22 +00:00
Dr. Stephen Henson
54ed003ace
PR: 2009
...
Submitted by: "Alexei Khlebnikov" <alexei.khlebnikov@opera.com >
Approved by: steve@openssl.org
Avoid memory leak and fix error reporting in d2i_SSL_SESSION(). NB: although
the ticket mentions buffer overruns this isn't a security issue because
the SSL_SESSION structure is generated internally and it should never be
possible to supply its contents from an untrusted application (this would
among other things destroy session cache security).
2009-09-02 13:20:22 +00:00
Dr. Stephen Henson
f18e10253d
PR: 2022
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Fix DTLS record header length bug.
2009-09-02 12:53:32 +00:00
Dr. Stephen Henson
c9add317a9
Tidy up and fix verify callbacks to avoid structure dereference, use of
...
obsolete functions and enhance to handle new conditions such as policy
printing.
2009-09-02 12:45:19 +00:00
Dr. Stephen Henson
6d1741030b
Missing break.
2009-08-31 22:21:01 +00:00
Dr. Stephen Henson
b8dc932c05
PR: 2005
...
Submitted by: steve@openssl.org
Some systems have broken IPv6 headers and/or implementations. If
OPENSSL_USE_IPV6 is set to 0 IPv6 is not used, if it is set to 1 it is used
and if undefined an attempt is made to detect at compile time by checking
if AF_INET6 is set and excluding known problem platforms.
2009-08-26 15:13:43 +00:00
Dr. Stephen Henson
17f8d8db61
PR: 2006
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Do not use multiple DTLS records for a single user message
2009-08-26 11:51:23 +00:00
Dr. Stephen Henson
38437fa135
PR: 2015
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Define LIBDIR properly.
2009-08-26 11:41:32 +00:00
Richard Levitte
82f35daaaf
Moving up the inclusion of e_os.h was a bad idea.
...
Put it back where it was and place an inclusion of e_os2.h to get platform
macros defined...
2009-08-26 11:21:50 +00:00
Richard Levitte
b529bba4bf
Make sure ENGINES can be separately compiled as well.
...
Make sure _XOPEN_SOURCE_EXTENDED is defined in opensslconf.h
Submitted by Zoltan Arpadffy <zoli@polarhome.com >
2009-08-25 07:30:02 +00:00
Richard Levitte
dde33ea9c3
Remove tmdiff.h from EXHEADERS as it doesn't exist.
...
Don't have separate installation directory variables for VAX and AXP.
Submitted by Zoltan Arpadffy <zoli@polarhome.com >
2009-08-25 07:28:12 +00:00
Richard Levitte
cb0d89705b
Define EXE_DIR earlier.
...
Make sure S_SOCKET also gets compiled with _POSIX_C_SOURCE defined.
Submitted by Zoltan Arpadffy <zoli@polarhome.com >
2009-08-25 07:25:55 +00:00
Richard Levitte
f49353b42f
Move up the inclusion of e_os.h so OPENSSL_SYS_VMS_DECC has a chance
...
to be properly defined.
2009-08-25 07:23:21 +00:00
Richard Levitte
573c61dcde
Make it possible to compile non-assembler routines on AXP as well.
...
Submitted by Zoltan Arpadffy <arpadffy@polarhome.com >
2009-08-25 07:22:08 +00:00
Richard Levitte
51f38e6c2d
Make engines compile on VMS for ia64 as well.
...
Parse file types in a more secure manner.
Submitted by sms@antinode.info (Steven M. Schweda)
2009-08-25 07:19:20 +00:00
Richard Levitte
2de213732a
Correct some typos and missing things.
...
Submitted by Arpadffy Zoltan <Zoltan.Arpadffy@scientificgames.se >
2009-08-25 07:17:13 +00:00
Richard Levitte
3798c36686
Include proper header files for time functions.
...
Submitted by Arpadffy Zoltan <Zoltan.Arpadffy@scientificgames.se >
2009-08-25 07:10:09 +00:00
Dr. Stephen Henson
209abea1db
Stop unused variable warning on WIN32 et al.
2009-08-18 11:14:12 +00:00
Dr. Stephen Henson
250705e7b5
Use SHA1 and not deprecated MD5 in demos.
2009-08-15 10:51:37 +00:00
Dr. Stephen Henson
5a96822f2c
Update default dependency flags.
...
Make error name discrepancies a fatal error.
Fix error codes.
make update
2009-08-12 17:08:44 +00:00
Dr. Stephen Henson
23b34259e0
Re-enable mdc2 default by default as the patent is now expired.
2009-08-12 16:45:35 +00:00
Dr. Stephen Henson
11b6cb8aae
Update README with bug report and contribution details.
2009-08-12 16:41:46 +00:00
Dr. Stephen Henson
a4bade7aac
PR: 1997
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
DTLS timeout handling fix.
2009-08-12 13:21:26 +00:00
Dr. Stephen Henson
e322b5d167
Typo
2009-08-10 15:53:11 +00:00
Dr. Stephen Henson
01af4edcfe
PR: 1999
...
Submitted by: "Bayram Kurumahmut" <kbayram@ubicom.com >
Approved by: steve@openssl.org
Don't use HAVE_FORK in apps/speed.c it can conflict with configured version.
2009-08-10 15:30:29 +00:00
Dr. Stephen Henson
ff0945cbdc
PR: 2004
...
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr >
Approved by: steve@openssl.org
Handle fractional seconds properly in ASN1_GENERALIZEDTIME_print
2009-08-10 14:57:11 +00:00
Dr. Stephen Henson
d5ec7d66a8
PR: 2003
...
Make it possible to install OpenSSL in directories with name other
than "lib" for example "lib64". Based on patch from Jeremy Utley.
2009-08-10 14:42:05 +00:00
Dr. Stephen Henson
dc0aebabe6
Add COMP error strings.
2009-08-09 14:58:05 +00:00
Dr. Stephen Henson
52828ca214
Add missing CHANGES entry.
2009-08-06 16:29:42 +00:00
Dr. Stephen Henson
757e9886a0
Update from HEAD.
2009-08-05 15:52:06 +00:00
Dr. Stephen Henson
f45e8c7bdd
PR: 2000
...
Submitted by: Vadim Zeitlin <vz-openssl@zeitlins.org >
Approved by: steve@openssl.org
Make no-comp compile without warnings.
2009-08-05 15:29:14 +00:00
Dr. Stephen Henson
ea904b4074
Update from HEAD.
2009-08-05 15:04:16 +00:00
Dr. Stephen Henson
ec6158d029
PR: 1996
...
Submitted by: steve@openssl.org
Change conflicting name "BLOCK" to "OPENSSL_BLOCK".
2009-07-27 21:21:25 +00:00
Dr. Stephen Henson
4386445c18
Change STRING to OPENSSL_STRING etc as common words such
...
as "STRING" cause conflicts with other headers/libraries.
2009-07-27 21:08:53 +00:00
Ben Laurie
a585aa6750
Fix warnings.
2009-07-26 12:26:38 +00:00
Dr. Stephen Henson
2475a52061
Update from 0.9.8-stable.
2009-07-24 13:47:52 +00:00
Dr. Stephen Henson
001dfac061
Remove MD2 test from WIN32 tests.
2009-07-24 13:43:23 +00:00
Dr. Stephen Henson
1b37c55e26
Fix typo.
2009-07-24 13:36:36 +00:00
Dr. Stephen Henson
3442781798
Update TABLE.
2009-07-24 13:29:45 +00:00
Dr. Stephen Henson
c9d3f123a6
Add new debug targets.
2009-07-24 13:29:13 +00:00
Dr. Stephen Henson
d069a4d15d
PR: 1990
...
Update from 0.9.8-stable.
2009-07-24 13:07:08 +00:00
Dr. Stephen Henson
f1ad8fb627
Doc update from HEAD.
2009-07-24 13:02:55 +00:00
Dr. Stephen Henson
d7406b1528
PR: 1993
...
Fix from 0.9.8-stable.
2009-07-24 11:52:32 +00:00
Dr. Stephen Henson
02ce897e80
Fix from 0.9.8-stable
2009-07-24 11:34:41 +00:00
Dr. Stephen Henson
0bd9d3a60e
Update from 0.9.8-stable.
2009-07-24 11:24:45 +00:00
Dr. Stephen Henson
b4c81fb6db
Update from 0.9.8-stable
2009-07-24 11:15:55 +00:00
Dr. Stephen Henson
0f566bda2b
Update from 0.9.8-stable.
2009-07-24 11:10:57 +00:00
Dr. Stephen Henson
f97a8149cd
Update from HEAD.
2009-07-16 09:54:49 +00:00
Dr. Stephen Henson
f4b6a3e9c0
Call CMS tests with "make test"
2009-07-15 17:59:17 +00:00
Dr. Stephen Henson
7dfae89768
Handle OSX ".dynlib" DSO extension.
2009-07-15 17:58:57 +00:00
Dr. Stephen Henson
d41ca3f0e2
Update for next beta.
2009-07-15 12:08:35 +00:00
Dr. Stephen Henson
65fc4c55be
Preparation for beta3 release.
2009-07-15 11:37:45 +00:00
Dr. Stephen Henson
5135d6b985
Fix error codes and indentation.
2009-07-15 11:32:58 +00:00
Dr. Stephen Henson
2202edeff0
PR: 1980
...
Submitted by: Victor Wagner <vitus@wagner.pp.ru >
Approved by: steve@openssl.org
Fix memory leaks.
2009-07-15 11:01:40 +00:00
Dr. Stephen Henson
c8f759ec74
Stop warning of signed/unsigned compare.
2009-07-14 15:28:44 +00:00
Dr. Stephen Henson
5fda10c6f1
Oops, use right function name...
2009-07-14 15:14:39 +00:00
Dr. Stephen Henson
11ba084e1b
Document MD2 deprecation.
2009-07-13 11:57:15 +00:00
Dr. Stephen Henson
cddd00166c
PR: 1984
...
Submitted by: Michael Tüxen <Michael.Tuexen@lurchi.franken.de >
Approved by: steve@openssl.org
Don't concatenate reads in DTLS.
2009-07-13 11:44:04 +00:00
Dr. Stephen Henson
0190aa7353
Update from HEAD.
2009-07-13 11:40:46 +00:00
Dr. Stephen Henson
1546de87f0
Fix from 0.9.8-stable.
2009-07-11 22:36:27 +00:00
Dr. Stephen Henson
affffaed3d
Update from HEAD.
2009-07-11 22:30:02 +00:00
Dr. Stephen Henson
0c644f1462
PR: 1985
...
Submitted by: Artem Chuprina <ran@cryptocom.ru >
Approved by: steve@openssl.org
Initialise flags.
2009-07-11 21:42:47 +00:00
Dr. Stephen Henson
a2da5c7daa
Make update.
2009-07-08 09:13:24 +00:00
Dr. Stephen Henson
c155d83f5b
Delete MD2 from algorithm tables and default compilation.
2009-07-08 08:50:53 +00:00
Dr. Stephen Henson
5a03e3ac3f
Fix from HEAD.
2009-07-04 12:05:14 +00:00
Dr. Stephen Henson
08b2097967
Update from HEAD.
2009-07-04 11:44:01 +00:00
Dr. Stephen Henson
15401859b5
PR: 1976
...
Submitted by: David McCullough <david_mccullough@securecomputing.com >
Approved by: steve@openssl.org
Cleanup some compile time warnings/magic numbers.
2009-07-01 15:46:43 +00:00
Dr. Stephen Henson
6f24165170
PR: 1974(partial)
...
Submitted by: David McCullough <david_mccullough@securecomputing.com >
Approved by: steve@openssl.org
Cryptodev digest support.
2009-07-01 15:42:38 +00:00
Dr. Stephen Henson
a8afd9382c
192, 256 bit AES and RC4 support for cryptodev.
2009-07-01 15:36:55 +00:00
Dr. Stephen Henson
caddf00d78
PR: 1974(partial)
...
Submitted by: David McCullough <david_mccullough@securecomputing.com >
Approved by: steve@openssl.org
Fix up RSA API compliance for rsa_nocrt_mod_exp method.
2009-07-01 15:25:17 +00:00
Dr. Stephen Henson
e105098b3f
PR: 1974 (partial)
...
Submitted by: David McCullough <david_mccullough@securecomputing.com >
Approved by: steve@openssl.org
If -DHAVE_CRYPTODEV is set enable cryptodev support
2009-07-01 14:55:59 +00:00
Dr. Stephen Henson
9852e7e4d7
PR: 1972
...
Submitted by: David McCullough <david_mccullough@securecomputing.com >
Approved by: steve@openssl.org
Add support for building with the uClinux-dist.
2009-07-01 11:43:57 +00:00
Dr. Stephen Henson
b855560192
PR: 1970
...
Submitted by: David McCullough <david_mccullough@securecomputing.com >
Reviewed by: steve@openssl.org
Fix unused variable "words" and uninitialised data "b".
2009-07-01 11:39:59 +00:00
Dr. Stephen Henson
f2f50efea3
PR: 1965
...
Submitted by: David McCullough <david_mccullough@securecomputing.com >
Approved by: steve@openssl.org
Make sure defines to remove SHA are correct.
2009-07-01 11:35:46 +00:00
Dr. Stephen Henson
2b3cd246e5
PR: 1962
...
Submitted by: Daniel Mentz <daniel.m@sent.com >
Reviewed by: steve@openssl.org
Fix "for dtls1_get_record() returns a bad record in one edge case" bug.
2009-07-01 11:29:01 +00:00
Dr. Stephen Henson
7171ade2c2
Submitted by: "Victor B. Wagner" <vitus@cryptocom.ru>
...
Reviewed by: steve@openssl.org
EVP_CTRL_PBE_PRF_NID suppot for Gost engine.
2009-07-01 11:23:07 +00:00
Dr. Stephen Henson
76ec9151d1
Update from 0.9.8-stable.
2009-06-30 22:26:28 +00:00
Dr. Stephen Henson
6c24dd9005
Typo.
2009-06-30 20:55:55 +00:00
Dr. Stephen Henson
e323afb0ce
Update from HEAD.
2009-06-30 16:10:24 +00:00
Dr. Stephen Henson
1fd43fd86e
PR: 1969
...
Submitted by: David McCullough <david_mccullough@securecomputing.com >
Approved by: steve@openssl.org
Don't use repeating key when testing algs.
2009-06-30 15:21:48 +00:00
Dr. Stephen Henson
3e70c81ed9
PR: 1967
...
Submitted by: David McCullough <david_mccullough@securecomputing.com >
Approved by: steve@openssl.org
Don't go past end of params array.
2009-06-30 15:10:54 +00:00
Dr. Stephen Henson
6e07229564
PR: 1966
...
Submitted by: David McCullough <david_mccullough@securecomputing.com >
Reviewed by: steve@openssl.org
Make no-ocsp work properly.
2009-06-30 15:08:38 +00:00
Dr. Stephen Henson
859d5eb2d7
PR: 1963
...
Submitted by: David McCullough <david_mccullough@securecomputing.com >
Approved by: steve@openssl.org
Make build fail if makedepend not present.
2009-06-30 14:59:59 +00:00
Dr. Stephen Henson
29b0c4a01c
Add "missing" functions for setting all verify parameters for SSL_CTX and SSL
...
structures.
2009-06-30 11:57:24 +00:00
Dr. Stephen Henson
b824f0f458
Redundant check: s->param is always non-NULL, it is set in SSL_new().
2009-06-30 11:41:35 +00:00
Dr. Stephen Henson
43ea53a04a
Inherit parameters properly in SSL contexts: any parameters set should
...
replace those in the current list.
2009-06-30 11:21:00 +00:00
Dr. Stephen Henson
fa07f00aaf
Update from HEAD.
2009-06-29 16:09:58 +00:00
Dr. Stephen Henson
dbb834ffeb
Update from 0.9.8-stable.
2009-06-28 16:24:11 +00:00
Dr. Stephen Henson
8549a8a5dc
Fix from 0.9.8-stable
2009-06-26 23:14:11 +00:00
Dr. Stephen Henson
887c250852
Update from 0.9.8-stable.
2009-06-26 15:04:22 +00:00
Dr. Stephen Henson
710c1c34d1
Allow checking of self-signed certifictes if a flag is set.
2009-06-26 11:28:52 +00:00
Dr. Stephen Henson
e16818108f
Fix from HEAD.
2009-06-25 17:11:48 +00:00
Dr. Stephen Henson
0cb76e79df
PR: 1748
...
Fix nasty SSL BIO pop bug. Since this changes the behaviour of SSL BIOs and
will break applications that worked around the bug only included in 1.0.0 and
later.
2009-06-25 11:26:45 +00:00
Ben Laurie
6cb419673e
DEBUG_BN_CTX doesn't really debug anything (it is essentially verbosity) and
...
has made make test far too noisy.
2009-06-25 10:15:06 +00:00
Dr. Stephen Henson
72d668c332
Update from HEAD.
2009-06-24 13:30:07 +00:00
Dr. Stephen Henson
5ce4799a38
Update from HEAD.
2009-06-17 12:19:35 +00:00
Dr. Stephen Henson
6178da0142
Update from HEAD.
2009-06-17 12:05:51 +00:00
Dr. Stephen Henson
27713e3fc2
Check t too.
2009-06-17 11:47:54 +00:00
Dr. Stephen Henson
3492c47b18
Update from HEAD.
2009-06-17 11:38:26 +00:00
Dr. Stephen Henson
43dc001b62
Update from HEAD.
2009-06-17 11:33:17 +00:00
Dr. Stephen Henson
8280b43a62
Update from HEAD.
2009-06-17 11:26:09 +00:00
Dr. Stephen Henson
85d9b02d16
Update from HEAD.
2009-06-16 16:55:01 +00:00
Dr. Stephen Henson
bfd502f027
Updates from HEAD.
2009-06-16 16:39:20 +00:00
Dr. Stephen Henson
f1ed5fa827
Update from 0.9.8-stable.
2009-06-15 15:00:19 +00:00
Dr. Stephen Henson
5bb9e1b4d4
Update from HEAD.
2009-06-15 11:23:33 +00:00
Ben Laurie
7de819237d
Two digits is not wide enough.
2009-06-14 10:23:29 +00:00
Ben Laurie
6cfab29b71
Make depend.
2009-06-14 02:37:22 +00:00
Dr. Stephen Henson
55708796af
Update from HEAD.
2009-06-13 20:47:09 +00:00
Dr. Stephen Henson
7074f1df07
Stop gcc bracket warning.
2009-06-05 14:57:10 +00:00
Dr. Stephen Henson
67d8ab07e6
Stop warning if dtls disabled.
2009-06-05 14:56:48 +00:00
Dr. Stephen Henson
4e63da0669
PR: 1950
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Reviewed by: steve@openssl.org
DTLS fragment retransmission bug.
2009-06-05 14:46:49 +00:00
Ben Laurie
15b0a5651c
Not always used.
2009-06-05 08:35:54 +00:00
Dr. Stephen Henson
4e66723517
Update from HEAD.
2009-06-02 11:23:30 +00:00
Dr. Stephen Henson
3e53c86001
Update from HEAD.
2009-06-02 11:06:28 +00:00
Dr. Stephen Henson
524e5b844b
Update from HEAD.
2009-06-01 12:14:15 +00:00
Dr. Stephen Henson
e1f09dfd84
PR: 1921
...
Submitted by: Michael Tuexen <tuexen@fh-muenster.de >
Reviewed by: steve@openssl.org
Add ECDHE and PSK support to DTLS.
2009-05-31 17:11:24 +00:00
Dr. Stephen Henson
f16411ccfd
Ensure canonical encodings of X509_NAME structures are valid.
2009-05-30 18:10:59 +00:00
Dr. Stephen Henson
2bbcd45b05
Update from HEAD.
2009-05-29 18:58:59 +00:00
Dr. Stephen Henson
fdc6c6ef08
Update from 0.9.8-stable.
2009-05-29 14:02:30 +00:00
Dr. Stephen Henson
6e87cc8da6
Need definition of struct timeval for dtls1.h which broke WIN32 builds,
...
so include winsock.h. (might be a cleaner way to do this...)
2009-05-28 20:53:16 +00:00
Dr. Stephen Henson
2d0b6c72b8
Update ordinals and sync with 0.9.8
2009-05-28 20:49:29 +00:00
Dr. Stephen Henson
3e84046f90
make errors
2009-05-28 20:45:26 +00:00
Dr. Stephen Henson
cc1cb996f1
Submitted by: Artem Chuprina <ran@cryptocom.ru>
...
Reviewed by: steve@openssl.org
Fix to match latest GOST in TLS draft.
2009-05-28 18:10:47 +00:00
Dr. Stephen Henson
32fbeacdfb
Add CHANGES entries from 0.9.8-stable.
2009-05-18 17:37:13 +00:00
Dr. Stephen Henson
431aad3c15
Delete line which should have gone with PR#1922.
2009-05-18 16:11:58 +00:00
Dr. Stephen Henson
0454f2c490
PR: 1929
...
Submitted by: Michael Tuexen <tuexen@fh-muenster.de >
Approved by: steve@openssl.org
Updated DTLS MTU bug fix.
2009-05-17 16:04:21 +00:00
Dr. Stephen Henson
5f911774bf
Revert previous MTU patch from PR#1929
2009-05-17 15:57:51 +00:00
Dr. Stephen Henson
66b7e42790
PR: 1599
...
Reformat PKCS12_parse manual page, document return values.
2009-05-17 14:48:02 +00:00
Richard Levitte
6a419388fc
Stupid typo
2009-05-17 07:22:15 +00:00
Dr. Stephen Henson
abda7c1147
PR: 1931
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Fix fragment handling memory leak.
2009-05-16 16:22:11 +00:00
Dr. Stephen Henson
88b48dc680
PR: 1930
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Limit size of DTLS record buffer queue.
2009-05-16 16:17:46 +00:00
Dr. Stephen Henson
661d35dfb2
Disable ECDHE in DTLS in a cleaner way.
2009-05-16 11:16:15 +00:00
Dr. Stephen Henson
f99c9daa39
Make the stuff compile again, fix missing prototype warnings.
2009-05-16 11:14:55 +00:00
Dr. Stephen Henson
019b3f3e5a
Update from HEAD.
2009-05-15 23:07:41 +00:00
Dr. Stephen Henson
d6584eba8c
PR: 1922
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
DTLS Timer bug fix.
2009-05-15 22:58:13 +00:00
Dr. Stephen Henson
a379c433a3
PR: 1925
...
Submitted by: "Green, Paul" <Paul.Green@stratus.com >
Approved by: steve@openssl.org
VOS extended name support.
2009-05-15 22:50:12 +00:00
Richard Levitte
006c7c6bb1
Functional VMS changes submitted by sms@antinode.info (Steven M. Schweda).
...
Thank you\!
(note: not tested for now, a few nightly builds should give indications though)
2009-05-15 16:37:08 +00:00
Richard Levitte
bd4a902a15
Have mkdef.pl also handle VAX and Non-VAX differences for VMS
2009-05-15 16:01:42 +00:00
Richard Levitte
17ae5e9f13
Add a comment about libeay.num and ssleay.num
2009-05-15 16:00:08 +00:00
Andy Polyakov
baa5f52422
x86[_64]cpuid.pl: update from HEAD.
2009-05-14 18:25:29 +00:00
Dr. Stephen Henson
b3620451b2
PR: 1921
...
Submitted by: steve@openssl.org
Our DTLS implementation doesn't currently handle ECDHE so don't include
unsupported ciphers in client hello.
2009-05-13 16:25:35 +00:00
Dr. Stephen Henson
d2f17d9615
Print out DTLS versions too.
2009-05-13 16:24:12 +00:00
Dr. Stephen Henson
561cbe5678
PR: 1923
...
Submitted by: Daniel Mentz <daniel.m@sent.com >, Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Don't access freed data structure.
2009-05-13 11:51:30 +00:00
Dr. Stephen Henson
756d2074b8
PR: 1924
...
Submitted by: "Green, Paul" <Paul.Green@stratus.com >
Approved by: steve@openssl.org
Fix _POSIX_C_SOURCE usage.
2009-05-13 11:32:24 +00:00
Andy Polyakov
c65db618bb
e_padlock.c: update from HEAD.
2009-05-12 20:24:23 +00:00
Dr. Stephen Henson
8355647403
Typo.
2009-05-07 16:26:44 +00:00
Dr. Stephen Henson
b839d73411
Typo.
2009-05-06 16:58:27 +00:00
Dr. Stephen Henson
4563c1e043
Add debug-VC-WIN32 target and let mk1mf.pl auto detect it, update docs.
2009-05-06 16:54:25 +00:00
Richard Levitte
11f35a036d
Select updates from HEAD
2009-05-06 14:03:24 +00:00
Dr. Stephen Henson
d8646dab14
Don't use -D_CRT_NONSTDC_NO_DEPRECATE, fix bio_lcl.h instead.
2009-05-06 10:23:39 +00:00
Andy Polyakov
47b3cd98f2
Configure: update from HEAD (Camellia assembler in VC-WIN64A, CAPI engine
...
in mingw64).
2009-05-05 19:25:53 +00:00
Andy Polyakov
27c7e53882
ec_mult.c: update from HEAD (Win64 compile warnings).
2009-05-05 19:23:45 +00:00
Andy Polyakov
b2b28803fb
cryptlib.c: update from HEAD.
2009-05-05 19:23:14 +00:00
Andy Polyakov
8e92b1b9ce
perlasm: update from HEAD.
2009-05-05 19:21:12 +00:00
Andy Polyakov
0f41ccf370
e_capi.c: update from HEAD.
2009-05-05 19:17:00 +00:00
Richard Levitte
c44544a1d7
Update from HEAD
2009-05-05 08:46:30 +00:00
Dr. Stephen Henson
4e50f02638
If an SSLv2 method is explicitly asked for use the SSLv2 cipher string:
...
assume an application *really* wants SSLv2 if they do that.
Otherwise stick with the default which excludes all SSLv2 cipher suites.
2009-04-29 14:12:54 +00:00
Dr. Stephen Henson
174ea15647
Typo.
2009-04-28 22:35:42 +00:00
Dr. Stephen Henson
18f8258a87
PR: 1629
...
Submitted by: Kaspar Brand <ossl-rt@velox.ch >
Approved by: steve@openssl.org
Don't use extensions if using SSLv3: this chokes some broken servers.
2009-04-28 22:01:53 +00:00
Dr. Stephen Henson
376bbb5887
PR: 1914
...
Make safestack work with C++.
2009-04-28 21:56:04 +00:00
Richard Levitte
2c8275409e
Update from HEAD.
2009-04-28 13:00:50 +00:00
Andy Polyakov
892582b541
v3_alt.c: otherName parsing fix from HEAD.
...
Submitted by: Love Hoernquist Aastrand
2009-04-27 19:37:23 +00:00
Andy Polyakov
57b53c1b0a
VC-32.pl: update from HEAD.
2009-04-27 19:32:13 +00:00
Andy Polyakov
004c3ca521
test_padlock: update from HEAD.
2009-04-27 19:31:52 +00:00
Andy Polyakov
f0f00f9272
sha*-s390x.pl: minor update from HEAD.
2009-04-27 19:31:30 +00:00
Andy Polyakov
a243c68736
rc4-x86_64.pl: Win64 SEH update from HEAD.
2009-04-27 19:31:04 +00:00
Andy Polyakov
467d9f2a34
b_sock.c: readability update from HEAD.
2009-04-27 19:30:36 +00:00
Richard Levitte
226a94963a
Updates from HEAD
2009-04-27 00:08:50 +00:00
Dr. Stephen Henson
d7f0d147b1
Update docs: can use backslashes now.
2009-04-26 15:50:55 +00:00
Dr. Stephen Henson
26902b9aad
Prevent warning if WINCE not used.
2009-04-26 15:04:06 +00:00
Dr. Stephen Henson
3c69d6bec4
Add extra no deprecate flags in Configure.
2009-04-26 14:54:23 +00:00
Dr. Stephen Henson
4f44677a41
This at least break WIN32 which doesn't have sys/time.h might need to make
...
this a bit more generous later...
2009-04-26 14:53:58 +00:00
Richard Levitte
88d9f669c5
Add local symbol hacks for OpenVMS
2009-04-26 12:26:04 +00:00
Richard Levitte
22e1421672
Cast to avoid signedness confusion
2009-04-26 12:16:12 +00:00
Richard Levitte
5409414eff
Updates from HEAD
2009-04-26 11:35:58 +00:00
Dr. Stephen Henson
7134507de0
Make no-rsa, no-dsa and no-dh compile again.
2009-04-23 17:16:40 +00:00
Dr. Stephen Henson
fe41d9853c
Make no-ec work
2009-04-23 16:25:00 +00:00
Dr. Stephen Henson
d07692cd96
Make no-gost work properly.
2009-04-23 16:12:09 +00:00
Dr. Stephen Henson
82ae57136b
Some no-ec fixes (not complete yet).
2009-04-23 15:24:27 +00:00
Dr. Stephen Henson
30baeaaeab
CryptoAPI engine only exists on WIN32.
2009-04-22 17:36:45 +00:00
Dr. Stephen Henson
87a0f4b92e
PR: 1902
...
Add ecdsa/ecdh algorithms to default for speed utility.
2009-04-22 17:31:04 +00:00
Dr. Stephen Henson
1b08bcbfe3
Find openssl utility if on the PATH.
2009-04-22 16:50:42 +00:00
Dr. Stephen Henson
346b1001eb
PR: 1903
...
Submitted by: "Paul Smedley" <pauldespam@despamsmedley.id.au >
Approved by: steve@openssl.org
OS/2 fixes (excludes Makefile.shared patch for now).
2009-04-22 16:21:20 +00:00
Dr. Stephen Henson
b61a84c8e6
Fix WIN32 warnings.
2009-04-22 15:40:54 +00:00
Dr. Stephen Henson
a543ea44bc
Fix WIN32 warning.
2009-04-22 12:17:02 +00:00
Dr. Stephen Henson
b0dd3d1b94
Another kerberos fix.
2009-04-21 22:30:54 +00:00
Dr. Stephen Henson
461be68b75
Change version to beta3-dev
2009-04-21 22:27:41 +00:00
Dr. Stephen Henson
21fb688d26
Some fixes for kerberos builds.
2009-04-21 22:20:12 +00:00
Dr. Stephen Henson
d8faad27b7
Fix RFC num.
2009-04-21 15:42:01 +00:00
Dr. Stephen Henson
dab7075946
Update STATUS.
2009-04-21 15:19:15 +00:00
Dr. Stephen Henson
dfc8e96daa
Fix warning.
2009-04-21 15:11:59 +00:00
Dr. Stephen Henson
71d3eaf358
make update.
2009-04-21 15:02:20 +00:00
Dr. Stephen Henson
ef6b25be63
Beta 2 preparation.
2009-04-21 14:58:57 +00:00
Dr. Stephen Henson
b452f43322
PR: 1751
...
Submitted by: David Woodhouse <dwmw2@infradead.org >
Approved by: steve@openssl.org
Compatibility patches for Cisco VPN client DTLS.
2009-04-19 18:03:13 +00:00
Dr. Stephen Henson
52891f832f
Fix error header files and error files too.
2009-04-19 17:58:01 +00:00
Dr. Stephen Henson
9990cb75c1
PR: 1894
...
Submitted by: Ger Hobbelt <ger@hobbelt.com >
Approved by: steve@openssl.org
Fix various typos and stuff.
2009-04-16 17:22:51 +00:00
Dr. Stephen Henson
a5cc69c7ae
PR: 1900
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Remove unnecessary included header file.
2009-04-16 16:42:02 +00:00
Dr. Stephen Henson
0b4b8ba64e
PR: 1895
...
Submitted by: Ger Hobbelt <ger@hobbelt.com >
Approved by: steve@openssl.org
Updates to mkerr.pl script.
2009-04-15 15:16:29 +00:00
Dr. Stephen Henson
268e78c305
PR: 1899
...
Submitted by: Ger Hobbelt <ger@hobbelt.com >
Approved by: steve@openssl.org
Check for <= 0 when verifying CRL issuers.
2009-04-15 15:07:09 +00:00
Dr. Stephen Henson
c900a78c99
PR: 1828
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Updated DTLS Rentransmission bug patch.
2009-04-15 14:49:36 +00:00
Dr. Stephen Henson
46ffb2dc97
PR #1828 reverted: state save/restore incompatible with 1.0.0-stable.
2009-04-14 15:29:34 +00:00
Dr. Stephen Henson
10acacb3bf
Fix typo and stop WIN32 warnings.
2009-04-14 15:13:35 +00:00
Dr. Stephen Henson
aab790a656
PR: 1829
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
DTLS Timer Bug fix.
2009-04-14 14:33:12 +00:00
Dr. Stephen Henson
1319aad994
PR: 1647
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Update patch for PR#1647.
2009-04-14 14:22:26 +00:00
Dr. Stephen Henson
3c0ce01cea
PR: 1827
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Updated patch for PR #1827
2009-04-14 14:20:57 +00:00
Dr. Stephen Henson
9fcbefebdb
PR: 1828
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Update from 0.9.8-stable.
2009-04-14 14:19:46 +00:00
Dr. Stephen Henson
017d2a887f
PR: 1838
...
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de >
Approved by: steve@openssl.org
Updated patch from 0.9.8-stable.
2009-04-14 14:18:16 +00:00
Dr. Stephen Henson
0416482605
Make update.
2009-04-13 11:40:00 +00:00
Dr. Stephen Henson
0f17424918
PR: 1786
...
Submitted by: Ger Hobbelt <ger@hobbelt.com >
Approved by: steve@openssl.org
Add missing IMPLEMENT.
2009-04-13 11:36:19 +00:00
Dr. Stephen Henson
55ed10db21
PR: 1785
...
Submitted by: Ger Hobbelt <ger@hobbelt.com >
Approved by: steve@openssl.org
Properly handle malloc failure.
2009-04-13 11:31:22 +00:00
Dr. Stephen Henson
3877b6bfe9
PR: 1896
...
Submitted by: Ger Hobbelt <ger@hobbelt.com >
Approved by: steve@openssl.org
Remove double sk_*_free() definition and add missing definition to mkstack.pl
2009-04-13 11:26:31 +00:00
Dr. Stephen Henson
a0f32454b6
PR: 1898
...
Submitted by: Ger Hobbelt <ger@hobbelt.com >
Approved by: steve@openssl.org
Include correct headers in selftest.pl generated code.
2009-04-13 11:22:55 +00:00
Dr. Stephen Henson
6fda4d7e5d
PR: 1887
...
Submitted by: "Victor B. Wagner" <vitus@cryptocom.ru >
Approved by: steve@openssl.org
Document/clarify use of some options and include details of GOST algorihthm
usage.
2009-04-10 16:42:28 +00:00
Dr. Stephen Henson
36a252ea46
Typo.
2009-04-10 11:35:31 +00:00
Dr. Stephen Henson
a31a195246
PR: 1887 (part, modified)
...
Submitted by: "Victor B. Wagner" <vitus@cryptocom.ru >
Approved by: steve@openssl.org
Use correct command names in -engine description and fix typo.
2009-04-10 11:25:54 +00:00
Dr. Stephen Henson
5f590d2218
PR: 1887 (part)
...
Submitted by: "Victor B. Wagner" <vitus@cryptocom.ru >
Approved by: steve@openssl.org
Added error codes for ccgost.
2009-04-10 11:07:35 +00:00
Dr. Stephen Henson
791b7bc715
Fix usage messages and lookup digests later in req command.
...
(part of PR #1887 )
2009-04-10 11:00:12 +00:00
Dr. Stephen Henson
19ae090787
Print out registered digest names in dgst utility instead of hard
...
coding them. Modify EVP_MD_do_all() to include registered digest name.
This is a modified version of part of PR#1887.
2009-04-10 10:30:27 +00:00
Dr. Stephen Henson
db3076621b
PR: 1892
...
Fix memory leak when email:move option used.
2009-04-08 15:58:07 +00:00
Dr. Stephen Henson
9ae5743515
Disable SSLv2 cipher suites by default and avoid SSLv2 compatible client
...
hello if no SSLv2 cipher suites are included. This effectively disables
the broken SSLv2 use by default.
2009-04-07 17:01:07 +00:00
Dr. Stephen Henson
c184b140df
Update from 0.9.8-stable.
2009-04-07 16:30:32 +00:00
Dr. Stephen Henson
9d80aa7e3f
Update from 0.9.8-stable
2009-04-07 12:10:59 +00:00
Dr. Stephen Henson
15671a90a9
PR: 1677
...
Submitted by: Vennemann <rvennemann@cool.ms >
Approved by: steve@openssl.org
Call RSA_new() after ENGINE has been set up.
2009-04-06 21:42:11 +00:00
Dr. Stephen Henson
0048464449
Use basename of objxref.pl not whole path in generated header.
2009-04-06 16:16:23 +00:00
Dr. Stephen Henson
b422166ce0
Updates from HEAD.
2009-04-06 16:02:51 +00:00
Dr. Stephen Henson
81be661ae2
PR: 1626
...
Submitted by: Cerutti Pietro <pietro.cerutti@bfh.ch >
Fix manual page.
2009-04-06 15:16:41 +00:00
Dr. Stephen Henson
8681c66eec
PR: 1890
...
Submitted by: "Green, Paul" <Paul.Green@stratus.com >
Approved by: steve@openssl.org
Fixes to --with-zlib-include and --with-zlib-lib and init PRNG for VOS.
2009-04-06 14:31:36 +00:00
Dr. Stephen Henson
69a0034e50
PR: 1899
...
Submitted by: Doug Kaufman <dkaufman@rahul.net >
Approved by: steve@openssl.org
Mingw fixes.
2009-04-06 14:25:02 +00:00
Dr. Stephen Henson
c9a1778134
Fix error codes.
2009-04-05 11:54:34 +00:00
Dr. Stephen Henson
326794e9c6
Change default openssl.cnf to only use issuer+serial option in AKID if no
...
SKID.
2009-04-04 18:09:43 +00:00
Dr. Stephen Henson
2dd5ca1fbc
Make no-ssl2 work including on Win32 builds.
2009-04-04 17:57:34 +00:00
Ben Laurie
3042945ac8
Fix warning.
2009-04-04 13:39:48 +00:00
Dr. Stephen Henson
da29b0d335
Fix for VC++ 6 which chokes on the empty argument.
2009-04-04 11:44:48 +00:00
Dr. Stephen Henson
6abbc68188
PR: 1870
...
Submitted by: kilroy <kilroy@mail.zutom.sk >
Approved by: steve@openssl.org
Handle pkcs12 format correctly by not assuming PEM format straight away.
2009-04-03 17:06:35 +00:00
Dr. Stephen Henson
25f6c7fd8b
Update from 0.9.8-stable.
2009-04-03 16:54:37 +00:00
Dr. Stephen Henson
1cf3571ea4
PR: 1888
...
Submitted by: Tim Rice <tim@multitalents.net >
Approved by: steve@openssl.org
Allow SOCKLEN_T type to be overridden at config time e.g.
./config -DSOCKLEN_T=int
2009-04-03 16:44:40 +00:00
Dr. Stephen Henson
d769e7a58c
PR: 1613
...
Submitted by: "Jean Rebiffe" <jrebiffe@gmail.com >
Approved by: steve@openssl.org
Free section.
2009-04-03 16:21:01 +00:00
Dr. Stephen Henson
fa3619f233
Update version info, fix typo.
2009-04-03 11:50:59 +00:00
Dr. Stephen Henson
a414cbcad3
Update from 0.9.8-stable.
2009-04-03 11:37:47 +00:00
Dr. Stephen Henson
c6196da587
Update from 0.9.8-stable.
2009-04-02 22:28:52 +00:00
Dr. Stephen Henson
5d48762647
Make PKCS12_parse() handle some PKCS#12 files which have their own ideas
...
about settings for local key id...
2009-04-02 17:44:50 +00:00
Dr. Stephen Henson
77e749405d
Fix demo program.
2009-04-02 17:39:25 +00:00
Dr. Stephen Henson
9ccd4e224f
Add USE_SOCKETS.
2009-04-02 15:19:03 +00:00
Dr. Stephen Henson
1dad4f3672
PR: 1882
...
Submitted by: Corinna Vinschen <vinschen@redhat.com >
Approved by: steve@openssl.org
Typo.
2009-04-02 15:04:01 +00:00
Dr. Stephen Henson
59745556b4
Add another one...
2009-04-01 15:22:00 +00:00
Dr. Stephen Henson
fab4447179
PR: 1880
...
Document -ocsp_uri command line switch to x509 utility.
2009-04-01 15:06:28 +00:00
Dr. Stephen Henson
417b8d4705
PR:1880
...
Load config in ts utility.
2009-04-01 14:59:18 +00:00
Dr. Stephen Henson
e614ec4769
Update README.
2009-04-01 08:57:37 +00:00
Dr. Stephen Henson
a6b03f4138
Make update fixing duplicate ASN1 error codes.
2009-04-01 08:55:54 +00:00
Dr. Stephen Henson
809fa4cc59
Update for first beta.
2009-04-01 08:47:28 +00:00
Dr. Stephen Henson
463f448595
Win32 build fixes.
2009-03-31 22:04:25 +00:00
Dr. Stephen Henson
5cd0cf8cce
Fix other read call too.
2009-03-31 21:57:26 +00:00
Dr. Stephen Henson
49cb959494
Use OPENSSL_SYS_WIN32 instead of _WIN32
2009-03-31 21:45:29 +00:00
Dr. Stephen Henson
783a73c47f
Oops.
2009-03-31 21:39:54 +00:00
Dr. Stephen Henson
99bf516908
Add update from 0.9.8-stable branch.
2009-03-31 21:35:55 +00:00
Dr. Stephen Henson
a26c372cfc
Fix shlib version.
2009-03-31 21:21:42 +00:00
Dr. Stephen Henson
ed5ac22e5b
Correct version.
2009-03-31 21:19:17 +00:00
cvs2svn
3d11b8f896
This commit was manufactured by cvs2svn to create branch
...
'OpenSSL_1_0_0-stable'.
2009-03-31 19:54:52 +00:00
Dr. Stephen Henson
2840dcd2a6
file evp_cnf.c was added on branch OpenSSL_1_0_1-stable on 2012-07-04 13:14:11 +0000
2007-04-08 17:50:59 +00:00
Dr. Stephen Henson
bd5770c6b1
file evp_cnf.c was added on branch OpenSSL_1_0_2-stable on 2012-07-04 13:14:44 +0000
2007-04-08 17:50:58 +00:00
Dr. Stephen Henson
a9c5de8654
file buf_str.c was added on branch OpenSSL_1_0_1-stable on 2011-01-09 13:30:58 +0000
2007-03-22 00:37:54 +00:00
Dr. Stephen Henson
837685c522
file testfipsssl was added on branch OpenSSL_1_0_1-stable on 2011-06-14 15:35:49 +0000
2003-09-13 17:03:55 +00:00