1. 09 9月, 2020 1 次提交
  2. 17 3月, 2020 1 次提交
  3. 11 3月, 2020 1 次提交
  4. 27 2月, 2020 1 次提交
  5. 06 2月, 2020 1 次提交
  6. 25 1月, 2020 1 次提交
    • K
      Check that the default signature type is allowed · cc7c6eb8
      Kurt Roeckx 提交于
      TLS < 1.2 has fixed signature algorithms: MD5+SHA1 for RSA and SHA1 for the
      others. TLS 1.2 sends a list of supported ciphers, but allows not sending
      it in which case SHA1 is used. TLS 1.3 makes sending the list mandatory.
      
      When we didn't receive a list from the client, we always used the
      defaults without checking that they are allowed by the configuration.
      Reviewed-by: NPaul Dale <paul.dale@oracle.com>
      GH: #10784
      (cherry picked from commit b0031e5dc2c8c99a6c04bc7625aa00d3d20a59a5)
      cc7c6eb8
  7. 20 11月, 2019 1 次提交
  8. 13 11月, 2019 1 次提交
  9. 17 10月, 2019 1 次提交
  10. 10 9月, 2019 1 次提交
  11. 06 9月, 2019 1 次提交
  12. 14 8月, 2019 1 次提交
  13. 25 6月, 2019 1 次提交
  14. 24 6月, 2019 1 次提交
  15. 03 6月, 2019 1 次提交
    • S
      Add the content type attribute to additional CMS signerinfo. · d63d841f
      Shane Lontis 提交于
      Fixes #8923
      
      Found using the openssl cms -resign option.
      This uses an alternate path to do the signing which was not adding the required signed attribute
      content type. The content type attribute should always exist since it is required is there are
      any signed attributes.
      As the signing time attribute is always added in code, the content type attribute is also required.
      The CMS_si_check_attributes() method adds validity checks for signed and unsigned attributes
      e.g. The message digest attribute is a signed attribute that must exist if any signed attributes
      exist, it cannot be an unsigned attribute and there must only be one instance containing a single
      value.
      Reviewed-by: NMatt Caswell <matt@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/8944)
      
      (cherry picked from commit 19e512a8244a6f527d0194339a8f9fc45468537a)
      d63d841f
  16. 28 5月, 2019 1 次提交
  17. 23 5月, 2019 1 次提交
  18. 08 5月, 2019 1 次提交
    • T
      Allow specifying the tag after AAD in CCM mode · b48e3be9
      Tobias Nießen 提交于
      This change allows to pass the authentication tag after specifying
      the AAD in CCM mode. This is already true for the other two supported
      AEAD modes (GCM and OCB) and it seems appropriate to match the
      behavior.
      
      GCM and OCB also support to set the tag at any point before the call
      to `EVP_*Final`, but this won't work for CCM due to a restriction
      imposed by section 2.6 of RFC3610: The tag must be set before
      actually decrypting data.
      
      This commit also adds a test case for setting the tag after supplying
      plaintext length and AAD.
      Reviewed-by: NPaul Dale <paul.dale@oracle.com>
      Reviewed-by: NMatt Caswell <matt@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/7243)
      
      (cherry picked from commit 67c81ec311d696464bdbf4c6d6f8a887a3ddf9f8)
      b48e3be9
  19. 03 5月, 2019 1 次提交
  20. 19 4月, 2019 1 次提交
  21. 11 4月, 2019 1 次提交
  22. 27 3月, 2019 2 次提交
  23. 06 3月, 2019 1 次提交
  24. 26 2月, 2019 3 次提交
  25. 21 2月, 2019 1 次提交
  26. 19 2月, 2019 1 次提交
  27. 11 2月, 2019 2 次提交
  28. 01 2月, 2019 1 次提交
  29. 30 1月, 2019 1 次提交
  30. 21 1月, 2019 1 次提交
  31. 07 1月, 2019 1 次提交
  32. 06 1月, 2019 1 次提交
  33. 05 1月, 2019 1 次提交
  34. 31 12月, 2018 1 次提交
  35. 11 12月, 2018 1 次提交
  36. 03 12月, 2018 1 次提交