summaryrefslogtreecommitdiffstats
path: root/crypto
AgeCommit message (Collapse)Author
2008-10-12Type-checked (and modern C compliant) OBJ_bsearch.Ben Laurie
2008-10-07Experimental new date handling routines. These fix issues with X509_time_adj()Dr. Stephen Henson
and should avoid any OS date limitations such as the year 2038 bug.
2008-10-06Fix incorrect command for assember file generation on IA64Lutz Jänicke
Submitted by: Amadeu A. Barbosa Jr <amadeu@tecgraf.puc-rio.br>
2008-09-23Fix EC_KEY_check_key.Andy Polyakov
2008-09-15From branch OpenSSL_0_9_8-stable: Allow soft-loading engines.Bodo Möller
Also, fix CHANGES (consistency with stable branch).
2008-09-15Fix yesterday typos in bss_dgram.c.Andy Polyakov
2008-09-15Fix build warnings.Geoff Thorpe
2008-09-14Winsock handles SO_RCVTIMEO in unique manner...Andy Polyakov
PR: 1648
2008-09-14Really get rid of unsafe double-checked locking.Bodo Möller
Also, "CHANGES" clean-ups.
2008-09-14Some precautions to avoid potential security-relevant problems.Bodo Möller
2008-09-12AIX build updates.Andy Polyakov
2008-09-07Fix warning.Ben Laurie
2008-09-01Initial support for delta CRLs. If "use deltas" flag is set attempt to findDr. Stephen Henson
a delta CRL in addition to a full CRL. Check and search delta in addition to the base.
2008-08-29Add support for CRLs partitioned by reason code.Dr. Stephen Henson
Tidy CRL scoring system. Add new CRL path validation error.
2008-08-27Add support for freshest CRL extension.Dr. Stephen Henson
2008-08-20Initial indirect CRL support.Dr. Stephen Henson
2008-08-18Support for certificateIssuer CRL entry extension.Dr. Stephen Henson
2008-08-14Don't use assertions to check application-provided arguments;Bodo Möller
and don't unnecessarily fail on input size 0.
2008-08-13Initial support for CRL path validation. This supports distinct certificateDr. Stephen Henson
and CRL signing keys.
2008-08-12Initial code to support distinct certificate and CRL signing keys where theDr. Stephen Henson
CRL issuer is not part of the main path. Not complete yet and not compiled in because the CRL issuer certificate is not validated.
2008-08-12Support for policy mappings extension.Dr. Stephen Henson
Delete X509_POLICY_REF code. Fix handling of invalid policy extensions to return the correct error. Add command line option to inhibit policy mappings.
2008-08-08Initial support for name constraints certificate extension.Dr. Stephen Henson
TODO: robustness checking on name forms.
2008-08-06Remove the dual-callback scheme for numeric and pointer thread IDs,Geoff Thorpe
deprecate the original (numeric-only) scheme, and replace with the CRYPTO_THREADID object. This hides the platform-specifics and should reduce the possibility for programming errors (where failing to explicitly check both thread ID forms could create subtle, platform-specific bugs). Thanks to Bodo, for invaluable review and feedback.
2008-08-06sha1-armv4-large cosmetics.Andy Polyakov
2008-08-06sha1-armv4-large.pl performance improvement. On PXA255 it gives +10% onAndy Polyakov
8KB block, +60% on 1KB, +160% on 256B...
2008-08-05Correctly handle errors in CMS I/O code.Dr. Stephen Henson
2008-08-04Add support for nameRelativeToCRLIssuer field in distribution point nameDr. Stephen Henson
fields.
2008-08-02Make explicit_policy handling match expected RFC3280 behaviour.Dr. Stephen Henson
2008-07-30Initial support for alternative CRL issuing certificates.Dr. Stephen Henson
Allow inibit any policy flag to be set in apps.
2008-07-30Policy validation fixes.Dr. Stephen Henson
Inhibit any policy count should ignore self issued certificates. Require explicit policy is the number certificate before an explict policy is required.
2008-07-22perlasm update: implement dataseg directive.Andy Polyakov
2008-07-22x86_64-xlate.pl: implement indirect jump/calls, support for Win64 SEH.Andy Polyakov
2008-07-17We should check the eight bytes starting at p[-9] for rollback attackBodo Möller
detection, or the probability for an erroneous RSA_R_SSLV3_ROLLBACK_ATTACK will be larger than necessary. PR: 1695
2008-07-17mem_dbg.c: avoid compiler warnings.Andy Polyakov
PR: 1693 Submitted by: Stefan Neis
2008-07-17Remove junk argument to function_begin in sha/asm/*-586.pl.Andy Polyakov
PR: 1681
2008-07-17x86masm.pl: harmonize functions' alignment.Andy Polyakov
2008-07-16Make sure not to read beyond end of bufferBodo Möller
2008-07-15x86_64cpuid.pl cosmetics: harmonize $dir treatment with other modules.Andy Polyakov
2008-07-15des-596.pl update: short-circuit reference to DES_SPtrans.Andy Polyakov
2008-07-15x86masm.pl cosmetics.Andy Polyakov
2008-07-15x86nasm.pl update: use pre-defined macros and allow for /safeseh link.Andy Polyakov
2008-07-13Zero is a valid value for any_skip and map_skipDr. Stephen Henson
2008-07-13We support inhibit any policy extension, add to table.Dr. Stephen Henson
2008-07-13X509 verification fixes.Dr. Stephen Henson
Ignore self issued certificates when checking path length constraints. Duplicate OIDs in policy tree in case they are allocated. Use anyPolicy from certificate cache and not current tree level.
2008-07-04Avoid warnings with -pedantic, specifically:Dr. Stephen Henson
Conversion between void * and function pointer. Value computed not used. Signed/unsigned argument.
2008-07-03Revert my earlier CRYPTO_THREADID commit, I will commit a reworkedGeoff Thorpe
version some time soon.
2008-06-26Update from stable branch.Dr. Stephen Henson
2008-06-23avoid potential infinite loop in final reduction round of BN_GF2m_mod_arr()Bodo Möller
Submitted by: Huang Ying Reviewed by: Douglas Stebila
2008-06-21Fix from stable branch.Dr. Stephen Henson
2008-06-16Update from stable branch.Dr. Stephen Henson