1. 12 6月, 2019 1 次提交
  2. 06 6月, 2019 1 次提交
  3. 03 6月, 2019 1 次提交
    • S
      Add the content type attribute to additional CMS signerinfo. · d63d841f
      Shane Lontis 提交于
      Fixes #8923
      
      Found using the openssl cms -resign option.
      This uses an alternate path to do the signing which was not adding the required signed attribute
      content type. The content type attribute should always exist since it is required is there are
      any signed attributes.
      As the signing time attribute is always added in code, the content type attribute is also required.
      The CMS_si_check_attributes() method adds validity checks for signed and unsigned attributes
      e.g. The message digest attribute is a signed attribute that must exist if any signed attributes
      exist, it cannot be an unsigned attribute and there must only be one instance containing a single
      value.
      Reviewed-by: NMatt Caswell <matt@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/8944)
      
      (cherry picked from commit 19e512a8244a6f527d0194339a8f9fc45468537a)
      d63d841f
  4. 28 5月, 2019 3 次提交
  5. 24 5月, 2019 2 次提交
  6. 21 5月, 2019 1 次提交
  7. 28 3月, 2019 1 次提交
  8. 22 3月, 2019 1 次提交
  9. 21 3月, 2019 1 次提交
  10. 26 2月, 2019 3 次提交
  11. 21 2月, 2019 1 次提交
    • B
      SCA hardening for mod. field inversion in EC_GROUP · 48e82c8e
      Billy Brumley 提交于
      This commit adds a dedicated function in `EC_METHOD` to access a modular
      field inversion implementation suitable for the specifics of the
      implemented curve, featuring SCA countermeasures.
      
      The new pointer is defined as:
      `int (*field_inv)(const EC_GROUP*, BIGNUM *r, const BIGNUM *a, BN_CTX*)`
      and computes the multiplicative inverse of `a` in the underlying field,
      storing the result in `r`.
      
      Three implementations are included, each including specific SCA
      countermeasures:
        - `ec_GFp_simple_field_inv()`, featuring SCA hardening through
          blinding.
        - `ec_GFp_mont_field_inv()`, featuring SCA hardening through Fermat's
          Little Theorem (FLT) inversion.
        - `ec_GF2m_simple_field_inv()`, that uses `BN_GF2m_mod_inv()` which
          already features SCA hardening through blinding.
      
      From a security point of view, this also helps addressing a leakage
      previously affecting conversions from projective to affine coordinates.
      
      This commit also adds a new error reason code (i.e.,
      `EC_R_CANNOT_INVERT`) to improve consistency between the three
      implementations as all of them could fail for the same reason but
      through different code paths resulting in inconsistent error stack
      states.
      Co-authored-by: NNicola Tuveri <nic.tuv@gmail.com>
      
      (cherry picked from commit e0033efc30b0f00476bba8f0fa5512be5dc8a3f1)
      Reviewed-by: NMatt Caswell <matt@openssl.org>
      Reviewed-by: NNicola Tuveri <nic.tuv@gmail.com>
      (Merged from https://github.com/openssl/openssl/pull/8262)
      48e82c8e
  12. 19 2月, 2019 1 次提交
  13. 15 2月, 2019 1 次提交
  14. 07 2月, 2019 1 次提交
  15. 05 2月, 2019 1 次提交
  16. 01 2月, 2019 1 次提交
  17. 31 1月, 2019 1 次提交
  18. 27 1月, 2019 1 次提交
  19. 25 1月, 2019 1 次提交
  20. 08 1月, 2019 1 次提交
    • V
      More configurable crypto and ssl library initialization · 25eb9299
      Viktor Dukhovni 提交于
      1.  In addition to overriding the default application name,
          one can now also override the configuration file name
          and flags passed to CONF_modules_load_file().
      
      2.  By default we still keep going when configuration file
          processing fails.  But, applications that want to be
          strict about initialization errors can now make explicit
          flag choices via non-null OPENSSL_INIT_SETTINGS that omit
          the CONF_MFLAGS_IGNORE_RETURN_CODES flag (which had so far
          been both undocumented and unused).
      
      3.  In OPENSSL_init_ssl() do not request OPENSSL_INIT_LOAD_CONFIG
          if the options already include OPENSSL_INIT_NO_LOAD_CONFIG.
      
      4.  Don't set up atexit() handlers when called with opts equal to
          OPENSSL_INIT_BASE_ONLY (this flag should only be used alone).
      Reviewed-by: NBernd Edlinger <bernd.edlinger@hotmail.de>
      Reviewed-by: NMatt Caswell <matt@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/7969)
      25eb9299
  21. 05 1月, 2019 1 次提交
  22. 03 1月, 2019 1 次提交
  23. 23 12月, 2018 1 次提交
  24. 10 12月, 2018 1 次提交
  25. 20 11月, 2018 3 次提交
  26. 13 11月, 2018 1 次提交
    • V
      Added missing signature algorithm reflection functions · 45f24725
      Viktor Dukhovni 提交于
          SSL_get_signature_nid()      -- local signature algorithm
          SSL_get_signature_type_nid() -- local signature algorithm key type
          SSL_get_peer_tmp_key()       -- Peer key-exchange public key
          SSL_get_tmp_key              -- local key exchange public key
      
      Aliased pre-existing SSL_get_server_tmp_key(), which was formerly
      just for clients, to SSL_get_peer_tmp_key().  Changed internal
      calls to use the new name.
      Reviewed-by: NMatt Caswell <matt@openssl.org>
      45f24725
  27. 30 10月, 2018 1 次提交
  28. 29 10月, 2018 1 次提交
  29. 27 10月, 2018 1 次提交
    • D
      Backport some DRBG renamings and typo fixes · 35a34508
      Dr. Matthias St. Pierre 提交于
      In commit 8bf366519661 some renamings andd typo fixes were made
      while adding back the DRBG-HMAC and DRBG-HASH implementation.
      Since the commit could not be backported, a lot of unnecessary
      differences between master and 1.1.1 were introduced.
      
      These differences result in tiresome merge conflicts when
      cherry-picking. To minimize these merge-conflicts, this patch
      ports all 'non-feature' changes of commit 8bf366519661
      (e.g., renamings of private variables, fixes of typographical
      errors, comment changes) manually back to 1.1.1.
      
      The commits a83dc59afa2e (#7399) and 8817215d5c52 (#7456)
      failed to cherry-pick previously to 1.1.1, with this patch
      they both cherry-pick without conflicts.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      Reviewed-by: NBernd Edlinger <bernd.edlinger@hotmail.de>
      (Merged from https://github.com/openssl/openssl/pull/7505)
      35a34508
  30. 17 10月, 2018 2 次提交
    • A
      EVP module documentation pass · 87103969
      Antoine Salon 提交于
      Replace ECDH_KDF_X9_62() with internal ecdh_KDF_X9_63()
      Signed-off-by: NAntoine Salon <asalon@vmware.com>
      Reviewed-by: NMatt Caswell <matt@openssl.org>
      Reviewed-by: NNicola Tuveri <nic.tuv@gmail.com>
      (Merged from https://github.com/openssl/openssl/pull/7345)
      
      (cherry picked from commit ffd89124bdfc9e69349492c3f15383bb35520a11)
      87103969
    • D
      DRBG: fix reseeding via RAND_add()/RAND_seed() with large input · dbf0a496
      Dr. Matthias St. Pierre 提交于
      In pull request #4328 the seeding of the DRBG via RAND_add()/RAND_seed()
      was implemented by buffering the data in a random pool where it is
      picked up later by the rand_drbg_get_entropy() callback. This buffer
      was limited to the size of 4096 bytes.
      
      When a larger input was added via RAND_add() or RAND_seed() to the DRBG,
      the reseeding failed, but the error returned by the DRBG was ignored
      by the two calling functions, which both don't return an error code.
      As a consequence, the data provided by the application was effectively
      ignored.
      
      This commit fixes the problem by a more efficient implementation which
      does not copy the data in memory and by raising the buffer the size limit
      to INT32_MAX (2 gigabytes). This is less than the NIST limit of 2^35 bits
      but it was chosen intentionally to avoid platform dependent problems
      like integer sizes and/or signed/unsigned conversion.
      
      Additionally, the DRBG is now less permissive on errors: In addition to
      pushing a message to the openssl error stack, it enters the error state,
      which forces a reinstantiation on next call.
      
      Thanks go to Dr. Falko Strenzke for reporting this issue to the
      openssl-security mailing list. After internal discussion the issue
      has been categorized as not being security relevant, because the DRBG
      reseeds automatically and is fully functional even without additional
      randomness provided by the application.
      
      Fixes #7381
      Reviewed-by: NPaul Dale <paul.dale@oracle.com>
      (Merged from https://github.com/openssl/openssl/pull/7382)
      
      (cherry picked from commit 3064b55134434a0b2850f07eff57120f35bb269a)
      dbf0a496
  31. 12 10月, 2018 1 次提交
  32. 04 10月, 2018 1 次提交