Bodo Möller
27eb115fb6
don't violate the bn_check_top assertion in BN_mod_inverse_no_branch()
2007-04-19 14:45:27 +00:00
Dr. Stephen Henson
51a596ef4f
Update from HEAD.
2007-04-09 11:46:36 +00:00
Dr. Stephen Henson
1cb7e5be5b
Fix OID config module.
2007-04-08 17:45:03 +00:00
Ben Laurie
84dd04e761
Make sure we detect corruption.
2007-04-04 12:50:13 +00:00
Bodo Möller
2ac061e487
make BN_FLG_CONSTTIME semantics more fool-proof
2007-03-28 18:44:01 +00:00
Bodo Möller
7cdb81582c
Change to mitigate branch prediction attacks
...
Submitted by: Matthew D Wood
Reviewed by: Bodo Moeller
2007-03-28 00:14:25 +00:00
Dr. Stephen Henson
3380c52f15
Stop memory leak.
2007-03-05 00:06:47 +00:00
Lutz Jänicke
1364e6f1ac
Initialize "buf" to 0 to make valgrind happy :-)
...
Note: the RAND_bytes() manual page says:
RAND_bytes() puts num cryptographically strong pseudo-random bytes into buf.
It does not talk about using the previous contents of buf so we are working
as documented.
2007-03-02 17:54:31 +00:00
Lutz Jänicke
c5ac2aa62c
Do not use uninitialized memory to seed the PRNG as it may confuse
...
code checking tools.
PR: 1499
2007-03-02 17:44:55 +00:00
Dr. Stephen Henson
392a0345de
EVP_CIPHER_CTX_key_length() should return the set key length in the
...
EVP_CIPHER_CTX structure which may not be the same as the underlying
cipher key length for variable length ciphers.
2007-02-27 18:42:52 +00:00
Dr. Stephen Henson
5dd24ead57
Prepare for next version.
2007-02-23 12:50:54 +00:00
Dr. Stephen Henson
d2cb94952a
Add L to version number
2007-02-23 12:38:11 +00:00
Dr. Stephen Henson
0615396d2d
Prepare for release.
2007-02-23 12:12:28 +00:00
Dr. Stephen Henson
82877ea449
Make update.
2007-02-23 01:01:08 +00:00
Lutz Jänicke
d69f85bf15
Fix incorrect handling of special characters
...
PR: 1459
Submitted by: tnitschke@innominate.com
Reviewed by: steve@openssl.org
2007-02-21 17:44:51 +00:00
Dr. Stephen Henson
52ee969e29
Update from 0.9.7-stable.
2007-02-21 13:48:49 +00:00
Dr. Stephen Henson
d1049ad93e
Fix Win32 warnings.
2007-02-18 17:23:20 +00:00
Nils Larsch
8f813338f1
- use OPENSSL_malloc() etc. in zlib
...
- move zlib_stateful_ex_idx initialization to COMP_zlib()
PR: 1468
2007-02-14 21:50:26 +00:00
Nils Larsch
5eee0253e5
remove unreachable code
2007-02-10 09:48:42 +00:00
Dr. Stephen Henson
594c723f98
Add hmac option to dgst from 0.9.7-stable.
2007-02-08 19:08:21 +00:00
Richard Levitte
53707e2eec
After objects have been freed, NULLify the pointers so there will be no double
...
free of those objects
2007-02-07 01:42:51 +00:00
Nils Larsch
fde794e898
fix typo
2007-02-06 19:48:36 +00:00
Dr. Stephen Henson
e31c620686
Update from fips2 branch.
2007-02-03 17:32:14 +00:00
Nils Larsch
923df53e25
fix potential memory leaks
...
PR: 1462
Submitted by: Charles Hardin <chardin@2wire.com>
2007-02-03 09:51:59 +00:00
Dr. Stephen Henson
dc3b721fa0
Update from 0.9.7-stable.
2007-01-23 17:54:22 +00:00
Dr. Stephen Henson
4a0d3530e0
Update from HEAD.
2007-01-21 13:16:49 +00:00
Andy Polyakov
78d4d87e39
Initialize padlock in shared build.
2007-01-04 22:55:25 +00:00
Andy Polyakov
6211633273
#include <stddef.h> in digest headers [from HEAD].
2006-12-29 14:55:43 +00:00
Richard Levitte
e25eb309ec
From HEAD
2006-12-26 21:23:38 +00:00
Richard Levitte
ffa2b2aa7d
Synchronise with Unixly build
2006-12-25 10:57:20 +00:00
Andy Polyakov
a77a95584d
Make sha.h more "portable" [from HEAD].
2006-12-22 16:04:56 +00:00
Nils Larsch
8e6905d238
remove trailing '\'
...
PR: 1438
2006-12-19 19:47:39 +00:00
Bodo Möller
1a8521ff24
Fix the BIT STRING encoding of EC points or parameter seeds
...
(need to prevent the removal of trailing zero bits).
2006-12-19 15:10:46 +00:00
Dr. Stephen Henson
35e59297fc
Update from 0.9.7-stable branch
2006-12-07 13:28:07 +00:00
Dr. Stephen Henson
9b945233b1
Update from HEAD.
2006-12-06 13:38:59 +00:00
Nils Larsch
66c4bb1a70
avoid duplicate entries in add_cert_dir()
...
PR: 1407
Submitted by: Tomas Mraz <tmraz@redhat.com>
2006-12-05 21:21:10 +00:00
Nils Larsch
3c786aa6c8
allocate a new attributes entry in X509_REQ_add_extensions()
...
if it's NULL (in case of a malformed pkcs10 request)
PR: 1347
Submitted by: Remo Inverardi <invi@your.toilet.ch>
2006-12-04 19:10:58 +00:00
Nils Larsch
e5cce6d356
add "Certificate Issuer", "Issuing Distribution Point" and
...
"Subject Directory Attributes" OIDs
PR: 1433
2006-12-04 18:48:16 +00:00
Andy Polyakov
723b7d81e4
Camellia fixes and improvements from HEAD.
2006-12-02 12:00:27 +00:00
Andy Polyakov
a3ddd7358b
Camellia portability fixes.
...
Submitted by: Masashi Fujita, NTT
2006-12-02 11:57:40 +00:00
Dr. Stephen Henson
45c027f31f
Update dependencies.
2006-11-30 14:03:58 +00:00
Dr. Stephen Henson
34a8c7ec87
Win32 fixes.
...
Use OPENSSL_NO_RFC3779 instead of OPENSSL_RFC3779: this makes the Win32 scripts
work and is consistent with other options.
Fix Win32 scripts and Configure to process OPENSSL_NO_RFC3779 properly.
Update ordinals.
Change some prototypes for LSB because VC++ 6 doesn't like the */ sequence and thinks it is an invalid end of comment.
2006-11-30 13:04:43 +00:00
Nils Larsch
d4a6240005
replace macros with functions
...
Submitted by: Tracy Camp <tracyx.e.camp@intel.com>
2006-11-29 20:47:15 +00:00
Ben Laurie
4636341b05
Add RFC 3779 support, contributed by ARIN.
2006-11-27 13:36:55 +00:00
Nils Larsch
be3b770d8f
register the engine as default engine in ENGINE_set_default()
...
PR: 1431
2006-11-24 18:44:26 +00:00
Dr. Stephen Henson
115fc340cb
Rebuild error file C source files.
2006-11-21 20:14:46 +00:00
Dr. Stephen Henson
4877e30504
Fix from HEAD.
2006-11-13 13:23:05 +00:00
Andy Polyakov
e336441197
Gcc over-optimizes PadLock AES CFB codepath, tell it not to [from HEAD].
2006-10-19 20:56:31 +00:00
Dr. Stephen Henson
20d6182f33
Typo.
2006-10-05 21:59:09 +00:00
Nils Larsch
aa145866f9
return an error if the supplied precomputed values lead to an invalid signature
2006-10-04 19:55:03 +00:00
Mark J. Cox
fdff41e166
Initialise ctx to NULL to avoid uninitialized free, noticed by
...
Steve Kiernan
2006-09-29 08:21:07 +00:00
Mark J. Cox
25e52a78fb
After tagging, bump ready for 0.9.8e development
2006-09-28 11:39:33 +00:00
Mark J. Cox
47c4bb2ddf
Prepare for 0.9.8d release
2006-09-28 11:32:42 +00:00
Mark J. Cox
951dfbb13a
Introduce limits to prevent malicious keys being able to
...
cause a denial of service. (CVE-2006-2940)
[Steve Henson, Bodo Moeller]
Fix ASN.1 parsing of certain invalid structures that can result
in a denial of service. (CVE-2006-2937) [Steve Henson]
Fix buffer overflow in SSL_get_shared_ciphers() function.
(CVE-2006-3738) [Tavis Ormandy and Will Drewry, Google Security Team]
Fix SSL client code which could crash if connecting to a
malicious SSLv2 server. (CVE-2006-4343)
[Tavis Ormandy and Will Drewry, Google Security Team]
2006-09-28 11:29:03 +00:00
Dr. Stephen Henson
c987c3f999
Fix from HEAD.
2006-09-22 17:07:40 +00:00
Bodo Möller
7d5af5e0fa
Ensure that the addition mods[i]+delta cannot overflow in probable_prime().
...
[Problem pointed out by Adam Young <adamy (at) acm.org>]
2006-09-18 14:01:39 +00:00
Bodo Möller
40ddcb717a
Remove non-functional part of recent patch, after discussion with
...
Colin Percival (this would have caused more problems than solved,
and isn't really necessary anyway)
2006-09-06 06:43:26 +00:00
Mark J. Cox
da1841a075
After tagging, prep for next release
2006-09-05 08:51:30 +00:00
Mark J. Cox
0a0a10d127
Ready for 0.9.8c release
2006-09-05 08:45:37 +00:00
Mark J. Cox
df20b6e79b
Avoid PKCS #1 v1.5 signature attack discovered by Daniel Bleichenbacher
...
(CVE-2006-4339)
Submitted by: Ben Laurie, Google Security Team
Reviewed by: bmoeller, mjc, shenson
2006-09-05 08:25:42 +00:00
Dr. Stephen Henson
f4f1dc39e0
Fix from HEAD.
2006-08-31 21:01:41 +00:00
Dr. Stephen Henson
340b4dd7df
Fix from HEAD.
2006-08-31 20:11:09 +00:00
Ben Laurie
4b9dcd821f
Add IGE and biIGE modes.
2006-08-28 11:00:32 +00:00
Andy Polyakov
669c5c9380
Engage assembler in solaris64-x86_64-cc [backport from HEAD].
2006-08-01 16:13:47 +00:00
Bodo Möller
d9c06b56ca
New Camellia implementation (replacing previous version)
...
Submitted by: NTT
2006-07-19 13:38:27 +00:00
Dr. Stephen Henson
eb499b2854
Oops...
2006-07-09 12:07:22 +00:00
Dr. Stephen Henson
65a82ef6d7
Fix from HEAD.
2006-07-09 12:03:02 +00:00
Bodo Möller
5d7f15daf8
use <poll.h> as by Single Unix Specification
2006-06-30 08:14:50 +00:00
Bodo Möller
ec67e3b7e4
always read in RAND_poll() if we can't use select because of a too
...
large FD: it's non-blocking mode anyway
2006-06-28 14:50:00 +00:00
Andy Polyakov
0d3ff3c073
aes-586.pl sync from HEAD.
2006-06-28 09:01:40 +00:00
Andy Polyakov
325e48867c
Mitigate the hazard of cache-collision timing attack on last round
...
[from HEAD].
2006-06-28 08:58:15 +00:00
Richard Levitte
8de95bc05b
Use poll() when possible to gather Unix randomness entropy
2006-06-27 06:31:57 +00:00
Bodo Möller
4a9cfd763e
Another thread-safety fix
2006-06-16 01:01:14 +00:00
Bodo Möller
1921a1adb2
"make depend" for the default configuration, i.e. no-camellia here in
...
the 0.9.8 branch!
2006-06-14 09:56:08 +00:00
Bodo Möller
6d2cd23f40
Thread-safety fixes
2006-06-14 08:51:41 +00:00
Bodo Möller
14fb67f28a
make update
2006-06-14 08:47:00 +00:00
Richard Levitte
c552680473
Keep synchronised with Unix
2006-06-12 06:46:27 +00:00
Bodo Möller
edbf9f878d
Camellia cipher, contributed by NTT
...
Submitted by: Masashi Fujita
Reviewed by: Bodo Moeller
2006-06-11 01:08:15 +00:00
Richard Levitte
2745ddfc33
Keep synchronised with the Unix build
2006-06-10 05:38:29 +00:00
Bodo Möller
808606034a
Camellia cipher, contributed by NTT
...
Submitted by: Masashi Fujita
Reviewed by: Bodo Moeller
2006-06-09 22:31:05 +00:00
Bodo Möller
e18eef3d7a
Camellia cipher, contributed by NTT
...
Submitted by: Masashi Fujita
Reviewed by: Bodo Moeller
2006-06-09 15:42:21 +00:00
Dr. Stephen Henson
986ad56124
Fix from HEAD.
2006-05-17 18:20:27 +00:00
Dr. Stephen Henson
1c5dc844e7
Update for next dev version.
2006-05-04 13:08:35 +00:00
Dr. Stephen Henson
f871949efd
Prepare for new release.
2006-05-04 12:46:42 +00:00
Dr. Stephen Henson
eb2ec6bee9
make update
2006-05-04 12:15:59 +00:00
Dr. Stephen Henson
db0edc3273
Inherit check time if appropriate.
2006-05-03 13:16:02 +00:00
Dr. Stephen Henson
d4426e79a7
Fix warning.
2006-04-15 17:53:52 +00:00
Dr. Stephen Henson
b095418d20
Fix from 0.9.7-stable.
2006-04-15 17:43:18 +00:00
Dr. Stephen Henson
d6fd880481
Fix on the right branch this time :-)
2006-04-15 13:17:53 +00:00
Dr. Stephen Henson
cbb0b734c7
If cipher list contains a match for an explicit ciphersuite only match that
...
one suite.
2006-04-15 00:22:34 +00:00
Nils Larsch
d5cc2f19cd
fix error found by coverity: check if ctx is != NULL before calling BN_CTX_end()
2006-03-14 22:48:31 +00:00
Nils Larsch
b7a80146f4
fix error found by coverity: check if ctx is != NULL before calling BN_CTX_end()
2006-03-13 23:12:08 +00:00
Dr. Stephen Henson
81418b7c77
Update from HEAD.
2006-03-01 21:17:50 +00:00
Nils Larsch
e2217e7ed5
fix "#ifndef HZ" statement
...
PR: 1287
2006-02-28 20:08:46 +00:00
Dr. Stephen Henson
9d01d50459
Update from head.
2006-02-21 01:00:47 +00:00
Dr. Stephen Henson
e27c67c5c5
Fix from HEAD.
2006-02-19 13:45:22 +00:00
Dr. Stephen Henson
38a3178185
Fix OBJ_obj2txt() for large OIDs.
2006-02-15 15:03:47 +00:00
Nils Larsch
58828ae573
fix typo: pass pre-computed parameters to the underlying signature function; thanks to Lucas Newman
2006-02-13 08:22:39 +00:00
Nils Larsch
22d1087e16
backport recent changes from the cvs head
2006-02-08 19:16:33 +00:00
Dr. Stephen Henson
9f85fcefdc
Update filenames in makefiles
2006-02-04 01:49:36 +00:00