1. 19 3月, 2018 2 次提交
  2. 18 3月, 2018 1 次提交
  3. 17 3月, 2018 6 次提交
  4. 16 3月, 2018 1 次提交
  5. 15 3月, 2018 10 次提交
  6. 14 3月, 2018 4 次提交
  7. 13 3月, 2018 6 次提交
  8. 12 3月, 2018 1 次提交
  9. 10 3月, 2018 3 次提交
    • D
      RAND_DRBG: add a function for setting the reseeding defaults · 4917e911
      Dr. Matthias St. Pierre 提交于
      The introduction of thread local public and private DRBG instances (#5547)
      makes it very cumbersome to change the reseeding (time) intervals for
      those instances. This commit provides a function to set the default
      values for all subsequently created DRBG instances.
      
       int RAND_DRBG_set_reseed_defaults(
                                         unsigned int master_reseed_interval,
                                         unsigned int slave_reseed_interval,
                                         time_t master_reseed_time_interval,
                                         time_t slave_reseed_time_interval
                                         );
      
      The function is intended only to be used during application initialization,
      before any threads are created and before any random bytes are generated.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/5576)
      4917e911
    • B
      Fix type error in PEM processing · b0143b97
      Benjamin Kaduk 提交于
      The get_name() helper was using a variable of type size_t to hold the
      result of BIO_gets(), but BIO_gets() returns int and makes use of negative
      values to indicate error conditions.
      
      Change the type of the local variable to match, and propagate that
      through to other places in the file to avoid -Wsign-compare issues.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/5211)
      b0143b97
    • T
      Add SSL/SSL_CTX_use_cert_and_key() · 37933acb
      Todd Short 提交于
      Add functions that will do the work of assigning certificate, privatekey
      and chain certs to an SSL or SSL_CTX. If no privatekey is given, use the
      publickey. This will permit the keys to pass validation for both ECDSA
      and RSA. If a private key has already been set for the certificate, it
      is discarded. A real private key can be set later.
      
      This is an all-or-nothing setting of these parameters. Unlike the
      SSL/SSL_CTX_use_certificate() and SSL/SSL_CTX_use_PrivateKey() functions,
      the existing cert or privatekey is not modified (i.e. parameters copied).
      This permits the existing cert/privatekey to be replaced.
      
      It replaces the sequence of:
      * SSL_use_certificate()
      * SSL_use_privatekey()
      * SSL_set1_chain()
      And may actually be faster, as multiple checks are consolidated.
      
      The private key can be NULL, if so an ENGINE module needs to contain the
      actual private key that is to be used.
      
      Note that ECDH (using the certificate's ECDSA key) ciphers do not work
      without the private key being present, based on how the private key is
      used in ECDH. ECDH does not offer PFS; ECDHE ciphers should be used instead.
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      Reviewed-by: NBen Kaduk <kaduk@mit.edu>
      (Merged from https://github.com/openssl/openssl/pull/1130)
      37933acb
  10. 09 3月, 2018 4 次提交
  11. 08 3月, 2018 2 次提交
    • B
      Fix issues in ia32 RDRAND asm leading to reduced entropy · 082193ef
      Bryan Donlan 提交于
      This patch fixes two issues in the ia32 RDRAND assembly code that result in a
      (possibly significant) loss of entropy.
      
      The first, less significant, issue is that, by returning success as 0 from
      OPENSSL_ia32_rdrand() and OPENSSL_ia32_rdseed(), a subtle bias was introduced.
      Specifically, because the assembly routine copied the remaining number of
      retries over the result when RDRAND/RDSEED returned 'successful but zero', a
      bias towards values 1-8 (primarily 8) was introduced.
      
      The second, more worrying issue was that, due to a mixup in registers, when a
      buffer that was not size 0 or 1 mod 8 was passed to OPENSSL_ia32_rdrand_bytes
      or OPENSSL_ia32_rdseed_bytes, the last (n mod 8) bytes were all the same value.
      This issue impacts only the 64-bit variant of the assembly.
      
      This change fixes both issues by first eliminating the only use of
      OPENSSL_ia32_rdrand, replacing it with OPENSSL_ia32_rdrand_bytes, and fixes the
      register mixup in OPENSSL_ia32_rdrand_bytes. It also adds a sanity test for
      OPENSSL_ia32_rdrand_bytes and OPENSSL_ia32_rdseed_bytes to help catch problems
      of this nature in the future.
      Reviewed-by: NAndy Polyakov <appro@openssl.org>
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/5342)
      082193ef
    • S
      Add GOST OIDs for Edwards parameter sets · 3b5e5172
      Sergey Zhuravlev 提交于
      Add OIDs for parameter sets of Edwards elliptic curves.
      
      CLA: trivial
      Reviewed-by: NBernd Edlinger <bernd.edlinger@hotmail.de>
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/5380)
      3b5e5172