1. 26 5月, 2023 1 次提交
  2. 12 4月, 2023 2 次提交
  3. 10 8月, 2021 1 次提交
  4. 27 2月, 2020 1 次提交
  5. 28 9月, 2019 1 次提交
    • D
      Reorganize private crypto header files · 0c994d54
      Dr. Matthias St. Pierre 提交于
      Currently, there are two different directories which contain internal
      header files of libcrypto which are meant to be shared internally:
      
      While header files in 'include/internal' are intended to be shared
      between libcrypto and libssl, the files in 'crypto/include/internal'
      are intended to be shared inside libcrypto only.
      
      To make things complicated, the include search path is set up in such
      a way that the directive #include "internal/file.h" could refer to
      a file in either of these two directoroes. This makes it necessary
      in some cases to add a '_int.h' suffix to some files to resolve this
      ambiguity:
      
        #include "internal/file.h"      # located in 'include/internal'
        #include "internal/file_int.h"  # located in 'crypto/include/internal'
      
      This commit moves the private crypto headers from
      
        'crypto/include/internal'  to  'include/crypto'
      
      As a result, the include directives become unambiguous
      
        #include "internal/file.h"       # located in 'include/internal'
        #include "crypto/file.h"         # located in 'include/crypto'
      
      hence the superfluous '_int.h' suffixes can be stripped.
      
      The files 'store_int.h' and 'store.h' need to be treated specially;
      they are joined into a single file.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/9681)
      0c994d54
  6. 18 10月, 2017 1 次提交
  7. 26 1月, 2017 1 次提交
    • A
      crypto/evp: harden RC4_MD5 cipher. · 8e204996
      Andy Polyakov 提交于
      Originally a crash in 32-bit build was reported CHACHA20-POLY1305
      cipher. The crash is triggered by truncated packet and is result
      of excessive hashing to the edge of accessible memory (or bogus
      MAC value is produced if x86 MD5 assembly module is involved). Since
      hash operation is read-only it is not considered to be exploitable
      beyond a DoS condition.
      
      Thanks to Robert Święcki for report.
      
      CVE-2017-3731
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      8e204996
  8. 25 1月, 2017 1 次提交
  9. 26 8月, 2016 1 次提交
    • R
      Improve the definition of STITCHED_CALL in e_rc4_hmac_md5.c · 216e8d91
      Richard Levitte 提交于
      The definition of STITCHED_CALL relies on OPENSSL_NO_ASM.  However,
      when a configuration simply lacks the assembler implementation for RC4
      (which is where we have implemented the stitched call), OPENSSL_NO_ASM
      isn't implemented.  Better, then, to rely on specific macros that
      indicated that RC4 (and MD5) are implemented in assembler.
      
      For this to work properly, we must also make sure Configure adds the
      definition of RC4_ASM among the C flags.
      Reviewed-by: NAndy Polyakov <appro@openssl.org>
      216e8d91
  10. 24 6月, 2016 1 次提交
  11. 18 5月, 2016 1 次提交
  12. 02 5月, 2016 1 次提交
  13. 08 3月, 2016 1 次提交
  14. 12 1月, 2016 2 次提交
  15. 08 6月, 2015 1 次提交
  16. 01 5月, 2015 1 次提交
    • M
      Sanity check EVP_CTRL_AEAD_TLS_AAD · c8269881
      Matt Caswell 提交于
      The various implementations of EVP_CTRL_AEAD_TLS_AAD expect a buffer of at
      least 13 bytes long. Add sanity checks to ensure that the length is at
      least that. Also add a new constant (EVP_AEAD_TLS1_AAD_LEN) to evp.h to
      represent this length. Thanks to Kevin Wojtysiak (Int3 Solutions) and
      Paramjot Oberoi (Int3 Solutions) for reporting this issue.
      Reviewed-by: NAndy Polyakov <appro@openssl.org>
      c8269881
  17. 22 1月, 2015 1 次提交
  18. 05 6月, 2012 1 次提交
  19. 04 6月, 2012 1 次提交
  20. 20 4月, 2012 1 次提交
  21. 18 4月, 2012 2 次提交
  22. 26 8月, 2011 1 次提交
  23. 24 8月, 2011 1 次提交