- 21 9月, 2015 3 次提交
-
-
由 Matt Caswell 提交于
GOST extends PKCS5 PBES2/PBKDF2 with some additional GOST specific PRFs. Based on a patch provided by Dmitry Belyavsky <beldmit@gmail.com> Reviewed-by: NStephen Henson <steve@openssl.org>
-
由 Matt Caswell 提交于
There were some memory leaks in the creation of an SRP verifier (both on successful completion and also on some error paths). Reviewed-by: NEmilia Käsper <emilia@openssl.org>
-
由 Matt Caswell 提交于
The -srpvfile option was broken in the srp command line app. Using it would always result in "-dbfile and -configfile cannot be specified together." The error message is also wrong because the option is "-srpvfile" not "-dbfile", so that has been fixed too. Reviewed-by: NEmilia Käsper <emilia@openssl.org>
-
- 20 9月, 2015 23 次提交
-
-
由 Dr. Stephen Henson 提交于
PR#3817 Reviewed-by: NRich Salz <rsalz@openssl.org>
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NRich Salz <rsalz@openssl.org>
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
由 Richard Levitte 提交于
Reviewed-by: NStephen Henson <steve@openssl.org>
-
由 Richard Levitte 提交于
There actually is a "srp" feature to check the availability on Reviewed-by: NStephen Henson <steve@openssl.org>
-
由 Richard Levitte 提交于
There actually is a "jpake" feature to check the availability on Reviewed-by: NStephen Henson <steve@openssl.org>
-
由 Richard Levitte 提交于
These tests were checking for specific sha variants, when they should just check if "sha" is disabled. Reviewed-by: NStephen Henson <steve@openssl.org>
-
由 Richard Levitte 提交于
It depended on 'openssl no-wp', which always exited with code 0, so this test would never be performed, and this, I never discovered that the program it's supposed to run was misspellt. Furthermore, the feature to check is 'whirlpool', not 'wp'. All corrected. Reviewed-by: NStephen Henson <steve@openssl.org>
-
由 Richard Levitte 提交于
I have no clue why MD_GHOST94 was checked on, there is no OPENSSL_NO_MD_GHOST94 in sight anywhere Reviewed-by: NStephen Henson <steve@openssl.org>
-
由 Richard Levitte 提交于
Have a look at the directories in crypto/, I found reason to add checks on CMAC and HMAC. This might be completely irrelevant, but I prefered covering too much than not enough. Reviewed-by: NStephen Henson <steve@openssl.org>
-
由 Richard Levitte 提交于
A grep of OPENSSL_NO_ in the rest of the source tree revealed a few more features to check. NOTE: there are some of those macros that I ignore because a check of them doesn't seem useful to external apps. This might change later on. Reviewed-by: NStephen Henson <steve@openssl.org>
-
由 Richard Levitte 提交于
After a grep of OPENSSL_NO_ in apps/*.c, a few more features that may be interesting to check the availability of came up. Reviewed-by: NStephen Henson <steve@openssl.org>
-
由 Richard Levitte 提交于
I've tried to make this list as complete as possible, based on information found in apps/progs.pl. Reviewed-by: NStephen Henson <steve@openssl.org>
-
由 Richard Levitte 提交于
Reviewed-by: NStephen Henson <steve@openssl.org>
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
由 Dr. Stephen Henson 提交于
Add Utils.pm for test utilities. This currently just contains one function: disabled which checks if a feature is disabled based on the output of openssl list -disabled Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
由 Richard Levitte 提交于
OPENSSL_NO_ECA changed to OPENSSL_NO_EC Reviewed-by: NStephen Henson <steve@openssl.org>
-
由 Richard Levitte 提交于
Obvious typo, and it took configuring with 'zlib' to discover it, otherwise there was a previous skip that bypassed this section entirely. Reviewed-by: NTim Hudson <tjh@openssl.org>
-
由 Matt Caswell 提交于
TLSProxy was failing if we are Configured with compression because it doesn't support it. This fix simply switches compression off for the purposes of the test. Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
- 19 9月, 2015 4 次提交
-
-
由 Dr. Stephen Henson 提交于
New option "openssl list -disabled" this lists a set of disabled features in a form which can be conveniently parsed by the test framework so it knows which tests to skip. Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
由 Dr. Stephen Henson 提交于
When an OID is decoded see if it exists in the registered OID table and if so return the shared OID instead of dynamically allocating an ASN1_OBJECT. Reviewed-by: NRich Salz <rsalz@openssl.org>
-
由 Viktor Dukhovni 提交于
Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
由 Richard Levitte 提交于
If test/recipes/40-test_rehash.t is executed as root, the last test will fail, since the created directory will remain writable no matter what. Make sure it complains loudly about being run as root. Reviewed-by: NRich Salz <rsalz@openssl.org>
-
- 18 9月, 2015 7 次提交
-
-
由 Emilia Kasper 提交于
It's unused, and the same functionality can be achieved with saving a copy of the struct. Reviewed-by: NRich Salz <rsalz@openssl.org>
-
由 Matt Caswell 提交于
In master we have the function OPENSSL_clear_free(x,y), which immediately returns if x == NULL. In <=1.0.2 this function does not exist so we have to do: OPENSSL_cleanse(x, y); OPENSSL_free(x); However, previously, OPENSSL_cleanse did not check that if x == NULL, so the real equivalent check would have to be: if (x != NULL) OPENSSL_cleanse(x, y); OPENSSL_free(x); It would be easy to get this wrong during cherry-picking to other branches and therefore, for safety, it is best to just ensure OPENSSL_cleanse also checks for NULL. Reviewed-by: NRich Salz <rsalz@openssl.org>
-
由 Emilia Kasper 提交于
Previously, the conversion would silently coerce to ASCII. Now, we error out. Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
由 Emilia Kasper 提交于
Rewrite EVP_DecodeUpdate. In particular: reject extra trailing padding, and padding in the middle of the content. Don't limit line length. Add tests. Previously, the behaviour was ill-defined, and depended on the position of the padding within the input. In addition, this appears to fix a possible two-byte oob read. Reviewed-by: NRichard Levitte <levitte@openssl.org> Reviewed-by: NRich Salz <rsalz@openssl.org> Reviewed-by: NDr Stephen Henson <steve@openssl.org>
-
由 Emilia Kasper 提交于
The bookmark API results in a lot of boilerplate error checking that can be much more easily achieved with a simple struct copy. It also lays the path for removing the third PACKET field. Reviewed-by: NRich Salz <rsalz@openssl.org>
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NRich Salz <rsalz@openssl.org>
-
由 Rich Salz 提交于
Real fix for RT 4033 Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
- 17 9月, 2015 3 次提交
-
-
由 Filipe DA SILVA 提交于
Make sure it's valid very early. Signed-off-by: NRich Salz <rsalz@openssl.org> Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
由 Emilia Kasper 提交于
Simplify encrypted premaster secret reading by using new methods in the PACKET API. Don't overwrite the packet buffer. RSA decrypt accepts truncated ciphertext with leading zeroes omitted, so it's even possible that by crafting a valid ciphertext with several leading zeroes, this could cause a few bytes out-of-bounds write. The write is harmless because of the size of the underlying message buffer, but nevertheless we shouldn't write into the packet. Reviewed-by: NMatt Caswell <matt@openssl.org>
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NRich Salz <rsalz@openssl.org>
-