- 27 2月, 2013 3 次提交
-
-
由 Dr. Stephen Henson 提交于
Add CMS_RecipientInfo_encrypt: this function encrypts an existing content encryption key to match the key in the RecipientInfo structure: this is useful if a new recpient is added to and existing enveloped data structure. Add documentation.
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
Two example programs one for command line argument processing and one for configuration file processing.
-
- 26 2月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Fix some typos and update version number first added: it has now been backported to OpenSSL 1.0.2.
-
- 22 2月, 2013 2 次提交
-
-
由 Ben Laurie 提交于
Not sure why I am getting these now and not before.
-
由 Ben Laurie 提交于
-
- 16 2月, 2013 1 次提交
-
-
由 Nick Alcock 提交于
podlators 2.5.0 has switched to dying on POD syntax errors. This means that a bunch of long-standing erroneous POD in the openssl documentation now leads to fatal errors from pod2man, halting installation. Unfortunately POD constraints mean that you have to sort numeric lists in ascending order if they start with 1: you cannot do 1, 0, 2 even if you want 1 to appear first. I've reshuffled such (alas, I wish there were a better way but I don't know of one).
-
- 15 2月, 2013 2 次提交
-
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
- 14 2月, 2013 4 次提交
-
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
- 13 2月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Add description of "allocate and encode" operation for ASN1 routines. Document how versioning will for after the letter release reaches y.
-
- 12 2月, 2013 3 次提交
-
-
由 David Woodhouse 提交于
The version check for DTLS1_VERSION was redundant as DTLS1_VERSION > TLS1_1_VERSION, however we do need to check for DTLS1_BAD_VER for compatibility. PR:2984
-
由 Dr. Stephen Henson 提交于
(cherry picked from commit cbf9b4aed3e209fe8a39e1d6f55aaf46d1369dc4)
-
由 Dr. Stephen Henson 提交于
-
- 11 2月, 2013 2 次提交
-
-
由 Lutz Jaenicke 提交于
(cherry picked from commit f88dbb8385c199a2a28e9525c6bba3a64bda96af)
-
由 Andy Polyakov 提交于
-
- 09 2月, 2013 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 08 2月, 2013 4 次提交
-
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
It also ensures that valgring is happy.
-
由 Andy Polyakov 提交于
Revert is appropriate because binary compatibility is not an issue in 1.1.
-
- 07 2月, 2013 1 次提交
-
-
由 Adam Langley 提交于
MD5 should use little endian order. Fortunately the only ciphersuite affected is EXP-RC2-CBC-MD5 (TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5) which is a rarely used export grade ciphersuite. (cherry picked from commit f306b87d766e6ecf30824635c7c395b67cff9dbc)
-
- 06 2月, 2013 15 次提交
-
-
由 Andy Polyakov 提交于
(cherry picked from commit 529d27ea472fc2c7ba9190a15a58cb84012d4ec6)
-
由 Andy Polyakov 提交于
Address CBC decrypt timing issues and reenable the AESNI+SHA1 stitch. (cherry picked from commit 125093b59f3c2a2d33785b5563d929d0472f1721)
-
由 Andy Polyakov 提交于
Kludge alert. This is arranged by passing padding length in unused bits of SSL3_RECORD->type, so that orig_len can be reconstructed. (cherry picked from commit 8bfd4c659f180a6ce34f21c0e62956b362067fba)
-
由 Dr. Stephen Henson 提交于
(cherry picked from commit 04e45b52ee3be81121359cc1198fd01e38096e9f)
-
由 Andy Polyakov 提交于
(cherry picked from commit d5371324d978e4096bf99b9d0fe71b2cb65d9dc8)
-
由 Andy Polyakov 提交于
RISCs are picky and alignment granted by compiler for md_state can be insufficient for SHA512. (cherry picked from commit 36260233e7e3396feed884d3f501283e0453c04f)
-
由 Andy Polyakov 提交于
Break dependency on uint64_t. It's possible to declare bits as unsigned int, because TLS packets are limited in size and 32-bit value can't overflow. (cherry picked from commit cab13fc8473856a43556d41d8dac5605f4ba1f91)
-
由 Dr. Stephen Henson 提交于
(cherry picked from commit 34ab3c8c711ff79c2b768f0b17e4b2a78fd1df5d)
-
由 Dr. Stephen Henson 提交于
branches it needs to be in a "gap". (cherry picked from commit 81ce0e14e72e8e255ad1bd9c7cfaa47a6291919c)
-
由 Dr. Stephen Henson 提交于
We have to use EVP in FIPS mode so we can only partially mitigate timing differences. Make an extra call to EVP_DigestSignUpdate to hash additonal blocks to cover any timing differences caused by removal of padding. (cherry picked from commit b908e88ec15aa0a74805e3f2236fc4f83f2789c2)
-
由 Ben Laurie 提交于
(cherry picked from commit 014265eb02e26f35c8db58e2ccbf100b0b2f0072)
-
由 Ben Laurie 提交于
This change updates the DTLS code to match the constant-time CBC behaviour in the TLS. (cherry picked from commit 9f27de170d1b7bef3d46d41382dc4dafde8b3900)
-
由 Ben Laurie 提交于
The previous CBC patch was bugged in that there was a path through enc() in s3_pkt.c/d1_pkt.c which didn't set orig_len. orig_len would be left at the previous value which could suggest that the packet was a sufficient length when it wasn't. (cherry picked from commit 6cb19b7681f600b2f165e4adc57547b097b475fd)
-
由 Ben Laurie 提交于
This patch makes the decoding of SSLv3 and TLS CBC records constant time. Without this, a timing side-channel can be used to build a padding oracle and mount Vaudenay's attack. This patch also disables the stitched AESNI+SHA mode pending a similar fix to that code. In order to be easy to backport, this change is implemented in ssl/, rather than as a generic AEAD mode. In the future this should be changed around so that HMAC isn't in ssl/, but crypto/ as FIPS expects. (cherry picked from commit e130841bccfc0bb9da254dc84e23bc6a1c78a64e)
-
由 Ben Laurie 提交于
This change adds CRYPTO_memcmp, which compares two vectors of bytes in an amount of time that's independent of their contents. It also changes several MAC compares in the code to use this over the standard memcmp, which may leak information about the size of a matching prefix. (cherry picked from commit 2ee798880a246d648ecddadc5b91367bee4a5d98)
-