Richard Levitte
c8b979e929
Add evp_cnf in the build.
2012-07-05 12:58:27 +00:00
Dr. Stephen Henson
2beaa91ca7
update NEWS
2012-07-05 11:49:56 +00:00
Richard Levitte
efa288ceac
Have the new names start in column 48, that makes it easy to see when
...
the 31 character limit is reached (on a 80 column display, do the math)
2012-07-05 09:00:49 +00:00
Richard Levitte
ad3bbd4a16
Cosmetics: remove duplicate symbol in crypto/symhacks.h
2012-07-05 08:49:30 +00:00
Dr. Stephen Henson
73913443a5
add missing evp_cnf.c file
2012-07-04 13:14:11 +00:00
Dr. Stephen Henson
e133ff7190
PR: 2840
...
Reported by: David McCullough <david_mccullough@mcafee.com>
Restore fips configuration module from 0.9.8.
2012-07-03 20:16:30 +00:00
Dr. Stephen Henson
25da47c3c8
Fix memory leak.
...
Always perform nexproto callback argument initialisation in s_server
otherwise we use uninitialised data if -nocert is specified.
2012-07-03 16:36:10 +00:00
Ben Laurie
4dc40f5eec
Unused variable.
2012-07-01 16:04:12 +00:00
Andy Polyakov
a1a37575f0
bss_dgram.c: fix typos in Windows code.
2012-07-01 09:12:14 +00:00
Dr. Stephen Henson
c64c0e03d3
don't use pseudo digests for default values of keys
2012-06-27 14:11:40 +00:00
Andy Polyakov
e1e882a368
x86_64 assembly pack: make it possible to compile with Perl located
...
on path with spaces [from HEAD].
PR: 2835
2012-06-27 12:58:03 +00:00
Dr. Stephen Henson
36b0719793
oops, add -debug_decrypt option which was accidenatally left out
2012-06-19 13:39:03 +00:00
Andy Polyakov
7655044dd3
bss_dgram.c: fix bugs [from HEAD].
...
PR: 2833
2012-06-19 12:36:00 +00:00
Dr. Stephen Henson
58fdd30664
revert more "version skew" changes that break FIPS builds
2012-06-10 23:01:28 +00:00
Dr. Stephen Henson
7175dbaeba
Revert "version skew" patches that break FIPS compilation.
2012-06-09 23:35:34 +00:00
Ben Laurie
af454b5bb0
Reduce version skew.
2012-06-08 09:18:47 +00:00
Andy Polyakov
5b2bbf37fa
s2_clnt.c: compensate for compiler bug [from HEAD].
2012-05-16 18:22:27 +00:00
Andy Polyakov
6321ac9e15
ppccap.c: assume no features under 32-bit AIX kernel [from HEAD].
...
PR: 2810
2012-05-16 18:18:29 +00:00
Dr. Stephen Henson
eeca72f71e
PR: 2813
...
Reported by: Constantine Sapuntzakis <csapuntz@gmail.com>
Fix possible deadlock when decoding public keys.
2012-05-11 13:52:46 +00:00
Dr. Stephen Henson
6e164e5c3d
PR: 2811
...
Reported by: Phil Pennock <openssl-dev@spodhuis.org>
Make renegotiation work for TLS 1.2, 1.1 by not using a lower record
version client hello workaround if renegotiating.
2012-05-11 13:32:26 +00:00
Dr. Stephen Henson
1b452133ae
PR: 2806
...
Submitted by: PK <runningdoglackey@yahoo.com>
Correct ciphersuite signature algorithm definitions.
2012-05-10 18:24:32 +00:00
Dr. Stephen Henson
d9c34505e5
prepare for next version
2012-05-10 16:02:30 +00:00
Dr. Stephen Henson
f9885acc8c
prepare for 1.0.1c release
2012-05-10 15:16:37 +00:00
Dr. Stephen Henson
fa9df48401
update NEWS
2012-05-10 15:11:34 +00:00
Dr. Stephen Henson
d414a5a0f0
Sanity check record length before skipping explicit IV in TLS 1.2, 1.1 and
...
DTLS to fix DoS attack.
Thanks to Codenomicon for discovering this issue using Fuzz-o-Matic
fuzzing as a service testing platform.
(CVE-2012-2333)
2012-05-10 15:10:15 +00:00
Richard Levitte
9eb4460e68
Don't forget to install srtp.h as well
2012-05-10 15:01:22 +00:00
Dr. Stephen Henson
6984d16671
oops, revert unrelated change
2012-05-10 13:38:18 +00:00
Dr. Stephen Henson
5b9d0995a1
Reported by: Solar Designer of Openwall
...
Make sure tkeylen is initialised properly when encrypting CMS messages.
2012-05-10 13:34:22 +00:00
Richard Levitte
7ad8e1fc4e
Correct environment variable is OPENSSL_ALLOW_PROXY_CERTS.
2012-05-04 10:43:22 +00:00
Andy Polyakov
c9b31189a9
ppccpuid.pl: branch hints in OPENSSL_cleanse impact small block performance
...
of digest algorithms, mosty SHA, on Power7. Mystery of century, why SHA,
why slower algorithm are affected more... [from HEAD].
PR: 2794
Submitted by: Ashley Lai
2012-04-27 20:20:15 +00:00
Dr. Stephen Henson
c76b7a1a82
Don't try to use unvalidated composite ciphers in FIPS mode
2012-04-26 18:49:45 +00:00
Dr. Stephen Henson
c940e07014
prepare for next version
2012-04-26 12:01:38 +00:00
Dr. Stephen Henson
88be4ebfbc
make update
2012-04-26 10:42:20 +00:00
Dr. Stephen Henson
effa47b80a
prepare for 1.0.1b release
2012-04-26 10:40:39 +00:00
Dr. Stephen Henson
067400b16e
update NEWS
2012-04-26 10:39:11 +00:00
Andy Polyakov
748628ced0
CHANGES: clarify.
2012-04-26 07:34:39 +00:00
Andy Polyakov
6791060eae
CHANGEs: fix typos and clarify.
2012-04-26 07:25:04 +00:00
Dr. Stephen Henson
502dfeb8de
Change value of SSL_OP_NO_TLSv1_1 to avoid clash with SSL_OP_ALL and
...
OpenSSL 1.0.0. Add CHANGES entry noting the consequences.
2012-04-25 23:08:44 +00:00
Andy Polyakov
5bbed29518
s23_clnt.c: ensure interoperability by maitaining client "version capability"
...
vector contiguous [from HEAD].
PR: 2802
2012-04-25 22:07:23 +00:00
Dr. Stephen Henson
2f2d33f470
correct error code
2012-04-22 13:31:26 +00:00
Dr. Stephen Henson
be60a3feaa
check correctness of errors before updating them so we don't get bogus errors added
2012-04-22 13:25:19 +00:00
Dr. Stephen Henson
e504a829a0
correct old FAQ answers, sync with HEAD
2012-04-22 13:21:38 +00:00
Andy Polyakov
0d829f6681
e_rc4_hmac_md5.c: reapply commit#21726, which was erroneously omitted.
...
PR: 2797, 2792
2012-04-20 21:45:17 +00:00
Dr. Stephen Henson
d9540579c5
call OPENSSL_init when calling FIPS_mode too
2012-04-20 14:42:54 +00:00
Dr. Stephen Henson
ecf963b80d
make ciphers work again for FIPS builds
2012-04-20 00:07:48 +00:00
Andy Polyakov
7fc6d35be0
e_rc4_hmac_md5.c: last commit was inappropriate for non-x86[_64] platforms
...
[from HEAD].
PR: 2792
2012-04-19 20:43:02 +00:00
Dr. Stephen Henson
e7d2a37158
update for next version
2012-04-19 16:53:43 +00:00
Dr. Stephen Henson
531c6fc8f3
prepare for 1.0.1a release
2012-04-19 12:17:19 +00:00
Dr. Stephen Henson
e011d0a3c4
update NEWS
2012-04-19 12:14:28 +00:00
Dr. Stephen Henson
8d5505d099
Check for potentially exploitable overflows in asn1_d2i_read_bio
...
BUF_mem_grow and BUF_mem_grow_clean. Refuse attempts to shrink buffer
in CRYPTO_realloc_clean.
Thanks to Tavis Ormandy, Google Security Team, for discovering this
issue and to Adam Langley <agl@chromium.org> for fixing it. (CVE-2012-2110)
2012-04-19 12:13:59 +00:00