- 17 9月, 2015 3 次提交
-
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NRich Salz <rsalz@openssl.org>
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NRich Salz <rsalz@openssl.org>
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NRich Salz <rsalz@openssl.org>
-
- 01 9月, 2015 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NRich Salz <rsalz@openssl.org>
-
- 14 5月, 2015 1 次提交
-
-
由 Richard Levitte 提交于
There are header files in crypto/ that are used by a number of crypto/ submodules. Move those to crypto/include/internal and adapt the affected source code and Makefiles. The header files that got moved are: crypto/cryptolib.h crypto/md32_common.h Reviewed-by: NRich Salz <rsalz@openssl.org>
-
- 22 1月, 2015 1 次提交
-
-
由 Matt Caswell 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
- 15 1月, 2015 1 次提交
-
-
由 Rich Salz 提交于
OPENSSL_NO_RIPEMD160, OPENSSL_NO_RIPEMD merged into OPENSSL_NO_RMD160 OPENSSL_NO_FP_API merged into OPENSSL_NO_STDIO Two typo's on #endif comments fixed: OPENSSL_NO_ECB fixed to OPENSSL_NO_OCB OPENSSL_NO_HW_SureWare fixed to OPENSSL_NO_HW_SUREWARE Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
- 05 1月, 2015 1 次提交
-
-
由 Dr. Stephen Henson 提交于
By using non-DER or invalid encodings outside the signed portion of a certificate the fingerprint can be changed without breaking the signature. Although no details of the signed portion of the certificate can be changed this can cause problems with some applications: e.g. those using the certificate fingerprint for blacklists. 1. Reject signatures with non zero unused bits. If the BIT STRING containing the signature has non zero unused bits reject the signature. All current signature algorithms require zero unused bits. 2. Check certificate algorithm consistency. Check the AlgorithmIdentifier inside TBS matches the one in the certificate signature. NB: this will result in signature failure errors for some broken certificates. 3. Check DSA/ECDSA signatures use DER. Reencode DSA/ECDSA signatures and compare with the original received signature. Return an error if there is a mismatch. This will reject various cases including garbage after signature (thanks to Antti Karjalainen and Tuomo Untinen from the Codenomicon CROSS program for discovering this case) and use of BER or invalid ASN.1 INTEGERs (negative or with leading zeroes). CVE-2014-8275 Reviewed-by: NEmilia Käsper <emilia@openssl.org>
-
- 05 6月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 02 5月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Reencode certificates in X509_sign_ctx as well as X509_sign. This was causing a problem in the x509 application when it modified an existing certificate.
-
- 29 11月, 2012 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
structures using HTTP. Add wrapper function to handle CRL download.
-
- 04 10月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
this means that some implementations will be used automatically, e.g. aesni, we do this for cryptodev anyway. Setup cpuid in ENGINE_load_builtin_engines() too as some ENGINEs use it.
-
- 14 3月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 07 11月, 2006 1 次提交
-
-
由 Nils Larsch 提交于
-
- 21 9月, 2006 1 次提交
-
-
由 Dr. Stephen Henson 提交于
loaded. Add new function X509_CRL_get0_by_serial() to lookup a revoked entry to avoid the need to access the structure directly. Add new X509_CRL_METHOD to allow common CRL operations (verify, lookup) to be redirected.
-
- 16 7月, 2005 1 次提交
-
-
由 Nils Larsch 提交于
./configure no-deprecated [no-dsa] [no-dh] [no-ec] [no-rsa] make depend all test work again PR: 1159
-
- 31 3月, 2005 1 次提交
-
-
由 Ben Laurie 提交于
-
- 09 12月, 2004 1 次提交
-
-
由 Dr. Stephen Henson 提交于
are performed.
-
- 20 4月, 2004 1 次提交
-
-
由 Geoff Thorpe 提交于
tree. This further reduces header interdependencies, and makes some associated cleanups.
-
- 07 8月, 2002 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Nils Larsch
-
- 14 2月, 2002 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Nils Larsch <nla@trustcenter.de>
-
- 16 10月, 2001 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Retain compatibility of EVP_DigestInit() and EVP_DigestFinal() with existing code. Modify library to use digest *_ex() functions.
-
- 27 7月, 2001 1 次提交
-
-
由 Dr. Stephen Henson 提交于
More linker bloat reorganisation: Split private key PEM and normal PEM handling. Private key handling needs to link in stuff like PKCS#8. Relocate the ASN1 *_dup() functions, to the relevant ASN1 modules using new macro IMPLEMENT_ASN1_DUP_FUNCTION. Previously these were all in crypto/x509/x_all.c along with every ASN1 BIO/fp function which linked in *every* ASN1 function if a single dup was used. Move the authority key id ASN1 structure to a separate file. This is used in the X509 routines and its previous location linked in all the v3 extension code. Also move ASN1_tag2bit to avoid linking in a_bytes.c which is now largely obsolete. So far under Linux stripped binary with single PEM_read_X509 is now 238K compared to 380K before these changes.
-
- 23 2月, 2001 1 次提交
-
-
由 Dr. Stephen Henson 提交于
change the way ASN1 modules are exported. Still needs a bit of work for example the hack which a dummy function prototype to avoid compilers warning about multiple ;s.
-
- 20 2月, 2001 1 次提交
-
-
由 Richard Levitte 提交于
sure they are available in opensslconf.h, by giving them names starting with "OPENSSL_" to avoid conflicts with other packages and by making sure e_os2.h will cover all platform-specific cases together with opensslconf.h. I've checked fairly well that nothing breaks with this (apart from external software that will adapt if they have used something like NO_KRB5), but I can't guarantee it completely, so a review of this change would be a good thing.
-
- 02 2月, 2001 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 30 12月, 2000 2 次提交
-
-
由 Dr. Stephen Henson 提交于
most of the old wrappers. A few of the old versions remain because they are non standard and the corresponding ASN1 code has not been reimplemented yet.
-
由 Dr. Stephen Henson 提交于
zap some evil function pointers casts along the way...
-
- 29 12月, 2000 1 次提交
-
-
由 Dr. Stephen Henson 提交于
currently OpenSSL itself wont compile with this set because some old style stuff remains. Change old functions X509_sign(), X509_verify() etc to use new item based functions. Replace OCSP function declarations with DECLARE macros.
-
- 04 9月, 2000 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Add DER public key routines. Add -passin argument to 'ca' utility. Document sign and verify options to dgst.
-
- 01 6月, 2000 1 次提交
-
-
由 Geoff Thorpe 提交于
yet tighter, and also put some heat on the rest of the library by insisting (correctly) that compare callbacks used in stacks are prototyped with "const" parameters. This has led to a depth-first explosion of compiler warnings in the code where 1 constification has led to 3 or 4 more. Fortunately these have all been resolved to completion and the code seems cleaner as a result - in particular many of the _cmp() functions should have been prototyped with "const"s, and now are. There was one little problem however; X509_cmp() should by rights compare "const X509 *" pointers, and it is now declared as such. However, it's internal workings can involve recalculating hash values and extensions if they have not already been setup. Someone with a more intricate understanding of the flow control of X509 might be able to tighten this up, but for now - this seemed the obvious place to stop the "depth-first" constification of the code by using an evil cast (they have migrated all the way here from safestack.h). Fortunately, this is the only place in the code where this was required to complete these type-safety changes, and it's reasonably clear and commented, and seemed the least unacceptable of the options. Trying to take the constification further ends up exploding out considerably, and indeed leads directly into generalised ASN functions which are not likely to cooperate well with this.
-
- 18 5月, 2000 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 02 1月, 2000 1 次提交
-
-
由 Dr. Stephen Henson 提交于
that can automatically determine the type of a DER encoded "traditional" format private key and change some of the d2i functions to use it instead of requiring the application to work out the key type.
-
- 27 12月, 1999 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 25 12月, 1999 1 次提交
-
-
由 Dr. Stephen Henson 提交于
more utilities.
-
- 27 11月, 1999 1 次提交
-
-
由 Dr. Stephen Henson 提交于
in a table. Doesn't do too much yet. Make the -<digestname> options in 'x509' affect all relevant options. Change the name of the 'notrust' options to 'reject' as this causes less confusion and is a better description of the effect. A few constification changes.
-
- 22 11月, 1999 1 次提交
-
-
由 Dr. Stephen Henson 提交于
New universal public key format. Fix CRL+cert load problem in by_file.c Make verify report errors when loading files or dirs
-
- 05 10月, 1999 1 次提交
-
-
由 Dr. Stephen Henson 提交于
new DSA public key functions that were missing. Also beginning of a cache for X509_EXTENSION structures: this will allow them to be accessed more quickly for things like certificate chain verification...
-
- 05 6月, 1999 1 次提交
-
-
由 Dr. Stephen Henson 提交于
arguments to pkcs8 application.
-