1. 01 5月, 2015 1 次提交
    • M
      Fix buffer overrun in RSA signing · 34166d41
      Matt Caswell 提交于
      The problem occurs in EVP_PKEY_sign() when using RSA with X931 padding.
      It is only triggered if the RSA key size is smaller than the digest length.
      So with SHA512 you can trigger the overflow with anything less than an RSA
      512 bit key. I managed to trigger a 62 byte overflow when using a 16 bit RSA
      key. This wasn't sufficient to cause a crash, although your mileage may
      vary.
      
      In practice RSA keys of this length are never used and X931 padding is very
      rare. Even if someone did use an excessively short RSA key, the chances of
      them combining that with a longer digest and X931 padding is very
      small. For these reasons I do not believe there is a security implication to
      this. Thanks to Kevin Wojtysiak (Int3 Solutions) and Paramjot Oberoi (Int3
      Solutions) for reporting this issue.
      Reviewed-by: NAndy Polyakov <appro@openssl.org>
      34166d41
  2. 24 3月, 2015 1 次提交
  3. 22 1月, 2015 1 次提交
  4. 09 12月, 2014 1 次提交
  5. 21 11月, 2014 1 次提交
  6. 22 6月, 2013 3 次提交
    • D
      CMS RSA-OAEP and RSA-PSS support. · 0574cadf
      Dr. Stephen Henson 提交于
      Extend RSA ASN1 method to support CMS PSS signatures for both sign
      and verify.
      
      For signing the EVP_PKEY_CTX parameters are read and the appropriate
      CMS structures set up.
      
      For verification the CMS structures are analysed and the corresponding
      parameters in the EVP_PKEY_CTX set.
      
      Also add RSA-OAEP support.
      
      For encrypt the EVP_PKEY_CTX parameters are used.
      
      For decrypt the CMS structure is uses to set the appropriate EVP_PKEY_CTX
      parameters.
      0574cadf
    • D
      Update to OAEP support. · 211a14f6
      Dr. Stephen Henson 提交于
      Add OAEP ctrls to retrieve MD and label. Return errors if
      an attempt is made to set or retrieve OAEP parameters when
      padding mode is not OAEP.
      211a14f6
    • D
      Add control to retrieve signature MD. · 81063953
      Dr. Stephen Henson 提交于
      81063953
  7. 13 6月, 2013 1 次提交
    • D
      Exetended OAEP support. · 271fef0e
      Dr. Stephen Henson 提交于
      Extend OAEP support. Generalise the OAEP padding functions to support
      arbitrary digests. Extend EVP_PKEY RSA method to handle the new OAEP
      padding functions and add ctrls to set the additional parameters.
      271fef0e
  8. 01 4月, 2013 1 次提交
  9. 15 2月, 2012 1 次提交
  10. 03 1月, 2012 1 次提交
  11. 01 6月, 2010 1 次提交
  12. 11 3月, 2010 2 次提交
  13. 09 3月, 2010 1 次提交
  14. 07 3月, 2010 1 次提交
  15. 06 11月, 2008 1 次提交
  16. 02 5月, 2008 1 次提交
  17. 17 3月, 2008 1 次提交
  18. 16 3月, 2008 1 次提交
  19. 13 3月, 2008 1 次提交
    • D
      And so it begins... · 8931b30d
      Dr. Stephen Henson 提交于
      Initial support for CMS.
      
      Add zlib compression BIO.
      
      Add AES key wrap implementation.
      
      Generalize S/MIME MIME code to support CMS and/or PKCS7.
      8931b30d
  20. 26 10月, 2007 1 次提交
    • D
      1. Changes for s_client.c to make it return non-zero exit code in case · 0e1dba93
      Dr. Stephen Henson 提交于
      of handshake failure
      
      2. Changes to x509_certificate_type function (crypto/x509/x509type.c) to
      make it recognize GOST certificates as EVP_PKT_SIGN|EVP_PKT_EXCH
      (required for s3_srvr to accept GOST client certificates).
      
      3. Changes to EVP
      	- adding of function EVP_PKEY_CTX_get0_peerkey
      	- Make function EVP_PKEY_derive_set_peerkey work for context with
      	  ENCRYPT operation, because we use peerkey field in the context to
      	  pass non-ephemeral secret key to GOST encrypt operation.
      	- added EVP_PKEY_CTRL_SET_IV control command. It is really
      	  GOST-specific, but it is used in SSL code, so it has to go
      	  in some header file, available during libssl compilation
      
      4. Fix to HMAC to avoid call of OPENSSL_cleanse on undefined data
      
      5. Include des.h if KSSL_DEBUG is defined into some libssl files, to
        make debugging output which depends on constants defined there, work
        and other KSSL_DEBUG output fixes
      
      6. Declaration of real GOST ciphersuites, two authentication methods
         SSL_aGOST94 and SSL_aGOST2001 and one key exchange method SSL_kGOST
      
      7. Implementation  of these methods.
      
      8. Support for sending unsolicited serverhello extension if GOST
        ciphersuite is selected. It is require for interoperability with
        CryptoPro CSP 3.0 and 3.6 and controlled by
        SSL_OP_CRYPTOPRO_TLSEXT_BUG constant.
        This constant is added to SSL_OP_ALL, because it does nothing, if
        non-GOST ciphersuite is selected, and all implementation of GOST
        include compatibility with CryptoPro.
      
      9. Support for CertificateVerify message without length field. It is
         another CryptoPro bug, but support is made unconditional, because it
         does no harm for draft-conforming implementation.
      
      10. In tls1_mac extra copy of stream mac context is no more done.
        When I've written currently commited code I haven't read
        EVP_DigestSignFinal manual carefully enough and haven't noticed that
        it does an internal digest ctx copying.
      
      This implementation was tested against
      1. CryptoPro CSP 3.6 client and server
      2. Cryptopro CSP 3.0 server
      0e1dba93
  21. 29 8月, 2006 1 次提交
  22. 21 7月, 2006 1 次提交
  23. 11 7月, 2006 1 次提交
  24. 29 5月, 2006 1 次提交
  25. 25 5月, 2006 1 次提交
  26. 24 5月, 2006 1 次提交
  27. 12 5月, 2006 1 次提交
  28. 08 5月, 2006 1 次提交
  29. 16 4月, 2006 1 次提交
  30. 15 4月, 2006 1 次提交
  31. 13 4月, 2006 1 次提交
  32. 12 4月, 2006 2 次提交
  33. 11 4月, 2006 1 次提交
  34. 10 4月, 2006 3 次提交