1. 17 9月, 2015 3 次提交
  2. 01 9月, 2015 1 次提交
  3. 14 5月, 2015 1 次提交
  4. 22 1月, 2015 1 次提交
  5. 15 1月, 2015 1 次提交
    • R
      Cleanup OPENSSL_NO_xxx, part 1 · 4b618848
      Rich Salz 提交于
      OPENSSL_NO_RIPEMD160, OPENSSL_NO_RIPEMD merged into OPENSSL_NO_RMD160
      OPENSSL_NO_FP_API merged into OPENSSL_NO_STDIO
      Two typo's on #endif comments fixed:
      	OPENSSL_NO_ECB fixed to OPENSSL_NO_OCB
      	OPENSSL_NO_HW_SureWare fixed to OPENSSL_NO_HW_SUREWARE
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      4b618848
  6. 05 1月, 2015 1 次提交
    • D
      Fix various certificate fingerprint issues. · 684400ce
      Dr. Stephen Henson 提交于
      By using non-DER or invalid encodings outside the signed portion of a
      certificate the fingerprint can be changed without breaking the signature.
      Although no details of the signed portion of the certificate can be changed
      this can cause problems with some applications: e.g. those using the
      certificate fingerprint for blacklists.
      
      1. Reject signatures with non zero unused bits.
      
      If the BIT STRING containing the signature has non zero unused bits reject
      the signature. All current signature algorithms require zero unused bits.
      
      2. Check certificate algorithm consistency.
      
      Check the AlgorithmIdentifier inside TBS matches the one in the
      certificate signature. NB: this will result in signature failure
      errors for some broken certificates.
      
      3. Check DSA/ECDSA signatures use DER.
      
      Reencode DSA/ECDSA signatures and compare with the original received
      signature. Return an error if there is a mismatch.
      
      This will reject various cases including garbage after signature
      (thanks to Antti Karjalainen and Tuomo Untinen from the Codenomicon CROSS
      program for discovering this case) and use of BER or invalid ASN.1 INTEGERs
      (negative or with leading zeroes).
      
      CVE-2014-8275
      Reviewed-by: NEmilia Käsper <emilia@openssl.org>
      684400ce
  7. 05 6月, 2013 1 次提交
  8. 02 5月, 2013 1 次提交
  9. 29 11月, 2012 2 次提交
  10. 04 10月, 2010 1 次提交
  11. 14 3月, 2010 1 次提交
  12. 07 11月, 2006 1 次提交
  13. 21 9月, 2006 1 次提交
  14. 16 7月, 2005 1 次提交
    • N
      make · 3eeaab4b
      Nils Larsch 提交于
          	./configure no-deprecated [no-dsa] [no-dh] [no-ec] [no-rsa]
          	make depend all test
      work again
      
      PR: 1159
      3eeaab4b
  15. 31 3月, 2005 1 次提交
  16. 09 12月, 2004 1 次提交
  17. 20 4月, 2004 1 次提交
  18. 07 8月, 2002 1 次提交
  19. 14 2月, 2002 1 次提交
  20. 16 10月, 2001 1 次提交
    • D
      · 20d2186c
      Dr. Stephen Henson 提交于
      Retain compatibility of EVP_DigestInit() and EVP_DigestFinal()
      with existing code.
      
      Modify library to use digest *_ex() functions.
      20d2186c
  21. 27 7月, 2001 1 次提交
    • D
      · 1241126a
      Dr. Stephen Henson 提交于
      More linker bloat reorganisation:
      
      Split private key PEM and normal PEM handling. Private key
      handling needs to link in stuff like PKCS#8.
      
      Relocate the ASN1 *_dup() functions, to the relevant ASN1
      modules using new macro IMPLEMENT_ASN1_DUP_FUNCTION. Previously
      these were all in crypto/x509/x_all.c along with every ASN1
      BIO/fp function which linked in *every* ASN1 function if
      a single dup was used.
      
      Move the authority key id ASN1 structure to a separate file.
      This is used in the X509 routines and its previous location
      linked in all the v3 extension code.
      
      Also move ASN1_tag2bit to avoid linking in a_bytes.c which
      is now largely obsolete.
      
      So far under Linux stripped binary with single PEM_read_X509
      is now 238K compared to 380K before these changes.
      1241126a
  22. 23 2月, 2001 1 次提交
  23. 20 2月, 2001 1 次提交
    • R
      Make all configuration macros available for application by making · cf1b7d96
      Richard Levitte 提交于
      sure they are available in opensslconf.h, by giving them names starting
      with "OPENSSL_" to avoid conflicts with other packages and by making
      sure e_os2.h will cover all platform-specific cases together with
      opensslconf.h.
      
      I've checked fairly well that nothing breaks with this (apart from
      external software that will adapt if they have used something like
      NO_KRB5), but I can't guarantee it completely, so a review of this
      change would be a good thing.
      cf1b7d96
  24. 02 2月, 2001 1 次提交
  25. 30 12月, 2000 2 次提交
  26. 29 12月, 2000 1 次提交
    • D
      Add NO_ASN1_OLD to remove some old style functions: · 73e92de5
      Dr. Stephen Henson 提交于
      currently OpenSSL itself wont compile with this set
      because some old style stuff remains.
      
      Change old functions X509_sign(), X509_verify() etc
      to use new item based functions.
      
      Replace OCSP function declarations with DECLARE macros.
      73e92de5
  27. 04 9月, 2000 1 次提交
  28. 01 6月, 2000 1 次提交
    • G
      The previous commit to crypto/stack/*.[ch] pulled the type-safety strings · ccd86b68
      Geoff Thorpe 提交于
      yet tighter, and also put some heat on the rest of the library by
      insisting (correctly) that compare callbacks used in stacks are prototyped
      with "const" parameters. This has led to a depth-first explosion of
      compiler warnings in the code where 1 constification has led to 3 or 4
      more. Fortunately these have all been resolved to completion and the code
      seems cleaner as a result - in particular many of the _cmp() functions
      should have been prototyped with "const"s, and now are. There was one
      little problem however;
      
      X509_cmp() should by rights compare "const X509 *" pointers, and it is now
      declared as such. However, it's internal workings can involve
      recalculating hash values and extensions if they have not already been
      setup. Someone with a more intricate understanding of the flow control of
      X509 might be able to tighten this up, but for now - this seemed the
      obvious place to stop the "depth-first" constification of the code by
      using an evil cast (they have migrated all the way here from safestack.h).
      
      Fortunately, this is the only place in the code where this was required
      to complete these type-safety changes, and it's reasonably clear and
      commented, and seemed the least unacceptable of the options. Trying to
      take the constification further ends up exploding out considerably, and
      indeed leads directly into generalised ASN functions which are not likely
      to cooperate well with this.
      ccd86b68
  29. 18 5月, 2000 1 次提交
  30. 02 1月, 2000 1 次提交
  31. 27 12月, 1999 1 次提交
  32. 25 12月, 1999 1 次提交
  33. 27 11月, 1999 1 次提交
  34. 22 11月, 1999 1 次提交
  35. 05 10月, 1999 1 次提交
  36. 05 6月, 1999 1 次提交