Dr. Stephen Henson
3b07c32fe7
outlen should be int * in out_utf8.
2003-08-21 12:31:17 +00:00
Richard Levitte
05a1f76093
make update
2003-08-11 09:53:24 +00:00
Richard Levitte
4ed9388e5d
A new branch for FIPS-related changes has been created with the name
...
OpenSSL-fips-0_9_7-stable.
Since the 0.9.7-stable branch is supposed to be in freeze and should
only contain bug corrections, this change removes the FIPS changes
from that branch.
2003-08-11 09:37:17 +00:00
Richard Levitte
30e4269241
Correct two problems, found by Martin Kochanski <cardbox@easynet.co.uk>:
...
1. CreateToolhelp32Snapshot returns INVALID_HANDLE_VALUE, not NULL, on error.
2. On Windows CE, a snapshot handle is closed with CloseToolhelp32Snapshot,
not CloseHandle.
2003-08-07 11:57:21 +00:00
Bodo Möller
59315df637
add OpenSSL license
...
fix typo
2003-08-06 10:38:37 +00:00
Richard Levitte
98c1a4900c
Inclusion of openssl/engine.h should always be wrapped with a check that
...
OPENSSL_NO_ENGINE is not defined.
2003-08-04 10:12:38 +00:00
Dr. Stephen Henson
6b063f32d9
Make the EFB NIDs have empty OIDs aliased to the real EFB OID.
2003-08-01 17:06:48 +00:00
Ben Laurie
afab06d3f5
DES CFB8 test.
2003-08-01 10:31:25 +00:00
Ben Laurie
8fb97c9acd
Fix DES CFB-r.
2003-08-01 10:25:58 +00:00
Ben Laurie
c5f070d5d5
Whoops, forgot FIPS DES, also add EVPs for DES CFB1 and 8.
2003-07-30 18:30:18 +00:00
Ben Laurie
f3b2ea53e2
AES CFB8.
2003-07-29 17:05:16 +00:00
Ben Laurie
c473d53898
The rest of the keysizes for CFB1, working AES AVS test for CFB1.
2003-07-29 13:24:27 +00:00
Ben Laurie
e8f8249319
Working CFB1 and test vectors.
2003-07-29 10:56:56 +00:00
Ben Laurie
e2ced802b4
Add support for partial CFB modes, make tests work, update dependencies.
2003-07-28 15:08:00 +00:00
Ben Laurie
75622f1ece
Unfinished FIPS stuff for review/improvement.
2003-07-27 17:00:51 +00:00
Ben Laurie
a052dd6532
Add untested CFB-r mode. Will be tested soon.
2003-07-27 13:46:57 +00:00
Richard Levitte
5f24adda77
Oops, I forgot to replace 'counter' with 'ivec' when used...
2003-07-03 20:50:46 +00:00
Richard Levitte
ba64c2cc8f
The 'counter' is really the IV.
2003-07-03 06:42:45 +00:00
Richard Levitte
29e62e487f
Change AES-CTR to increment the IV by 1 instead of 2^64.
2003-07-03 06:41:33 +00:00
Dr. Stephen Henson
00dc2d7551
Return EOF when an S/MIME part have been read.
2003-06-24 17:12:22 +00:00
Richard Levitte
4aae637f6c
We set the export flag for 512 *bit* keys, not 512 *byte* ones.
...
PR: 587
2003-06-19 18:55:56 +00:00
Richard Levitte
8c2786fff7
Do not try to use non-existent gmtime_r() on SunOS4.
...
PR: 585
2003-06-12 00:57:27 +00:00
Richard Levitte
1b9f21fdc8
Make sure DSO-dlfcn works properly on SunOS4.
...
PR: 585
2003-06-12 00:51:59 +00:00
Richard Levitte
6e260c4093
Add an entry for X509_TRUST_OBJECT_SIGN in trstandard[].
...
PR: 617
2003-06-11 21:22:34 +00:00
Richard Levitte
25a1259911
Make sure to NUL-terminate the string on end-of-file (and error)
...
PR: 643
2003-06-11 18:43:49 +00:00
Richard Levitte
4eebab0d22
The output from AES_cbc_encrypt() should be exact multiple blocks when encrypting
2003-06-10 04:11:46 +00:00
Geoff Thorpe
bc63a2ee0e
This memset() in the ubsec ENGINE is a bug. Zeroing out the result array
...
should not be necessary in any case, but more importantly the result and
input BIGNUMs could be the same, in which case this is clearly a problem.
Submitted by: Jonathan Hersch
Reviewed by: Joe Orton
Approved by: Geoff Thorpe
2003-06-06 17:53:24 +00:00
Dr. Stephen Henson
476f09712c
Really get X509_CRL_CHECK_ALL right this time...
2003-06-04 00:40:47 +00:00
Dr. Stephen Henson
16c9148220
Move the base64 BIO fixes to 0.9.7-stable
2003-06-03 00:11:37 +00:00
Dr. Stephen Henson
9d92486cfb
Only count 'LF' as EOL in pk7_mime.c, this avoids incorrect
...
results if CR+LF straddles the line buffer.
2003-06-02 17:52:19 +00:00
Dr. Stephen Henson
bb41fdb5ec
Stop checking for CRLF when start of buffer is reached.
2003-06-02 01:03:08 +00:00
Dr. Stephen Henson
3410aa1aa8
Various S/MIME bug and compatibility fixes.
2003-06-01 20:45:44 +00:00
Richard Levitte
2a948bd306
Include openssl/e_os.h so OPENSSL_SYSNAME_ULTRASPARC and other configuration
...
macros get properly defined.
2003-05-29 22:22:34 +00:00
Richard Levitte
d4e35514ba
Have ASFLAGS be defined the same way as CFLAGS
2003-05-29 22:20:57 +00:00
Richard Levitte
3fd6b9f6d4
PR: 630
...
Avoid looking outside the key_data array.
2003-05-29 20:59:30 +00:00
Lutz Jänicke
828ce10ce7
Move header file inclusion to prevent irritation of users forgetting to
...
call "make depend" after enabling or disabling ciphers...
Submitted by: Tal Mozes <talm@cyber-ark.com>
PR: #628
2003-05-28 19:56:04 +00:00
Dr. Stephen Henson
8939adbad9
PR: 627
...
Allocate certificatePolicies correctly if CPS field is absent.
Fix various memory leaks in certificatePolicies.
2003-05-28 17:28:42 +00:00
Dr. Stephen Henson
ff160dba54
PR: 631
...
Submitted by: Doug Sauder <dws+001@hunnysoft.com>
Fix bug in X509V3_get_d2i() when idx in not NULL.
2003-05-28 16:57:22 +00:00
Richard Levitte
fb5b7317a7
Make sure to compare unsigned against unsigned.
2003-05-28 10:34:04 +00:00
Richard Levitte
457f692eab
Fix sign bugs.
...
PR: 621
2003-05-21 14:29:33 +00:00
Richard Levitte
e077b5452f
Make sure EC_window_bits_for_scalar_size() returns a size_t
2003-05-21 08:40:18 +00:00
Dr. Stephen Henson
22e6c2524e
Add correct DN entry for serialNumber.
2003-05-07 23:20:41 +00:00
Richard Levitte
54a7ea6f36
DO NOT constify RSA* in RSA_sign() and RSA_verify(), since there are function
...
called downstream that need it to be non-const. The fact that the RSA_METHOD
functions take the RSA* as a const doesn't matter, it just expresses that
*they* won't touch it.
PR: 602
2003-05-07 11:38:13 +00:00
Richard Levitte
0e2f5ec2d2
Constify RSA_sign() and RSA_verify().
...
PR: 602
2003-05-05 13:55:23 +00:00
Dr. Stephen Henson
8c5e375c8e
Typo.
2003-05-02 11:42:17 +00:00
Bodo Möller
ce8a202831
fix typo
...
Submitted by: Nils Larsch
2003-04-22 12:44:58 +00:00
Richard Levitte
7f0f9f1934
Memory leak fix: RSA_blinding_on() didn't free Ai under certain circumstances.
...
Memory leak fix: RSA_blinding_on() would leave a dangling pointer in
rsa->blinding under certain circumstances.
Double definition fix: RSA_FLAG_NO_BLINDING was defined twice.
2003-04-16 06:25:29 +00:00
Richard Levitte
8f09a154e3
Memory leak fix: local blinding structure not freed in rsa_eay_private_decrypt()
2003-04-15 13:01:50 +00:00
Richard Levitte
fba1cfa06d
The release is tagged, time to work on 0.9.7c.
2003-04-10 20:40:19 +00:00
Richard Levitte
27f7d430ce
Forgot to code the status bits for release. This file will be
...
retagged.
2003-04-10 20:29:08 +00:00