summaryrefslogtreecommitdiffstats
path: root/crypto
AgeCommit message (Collapse)Author
2001-07-30Really add the EVP and all of the DES changes.Ben Laurie
2001-07-30Make EVPs allocate context memory, thus making them extensible. RationaliseBen Laurie
DES's keyschedules. I know these two should be separate, and I'll back out the DES changes if they are deemed to be an error. Note that there is a memory leak lurking in SSL somewhere in this version.
2001-07-30Enhanced support for IA-64 Linux and HP-UX (as well as better support forAndy Polyakov
HP-UX in common in ./config). Note that for the moment of this writing none of 64-bit platforms pass bntest. I'm committing this anyway as it's too frustrating to patch snapshots over and over while 0.9.6 is known to work.
2001-07-30Support for Intel and HP-UXi assemblers.Andy Polyakov
2001-07-30ANSIfication.Ben Laurie
2001-07-30Don't miss files...Lutz Jänicke
2001-07-30Fix inconsistent behaviour with respect to verify_callback handling.Lutz Jänicke
2001-07-27length of secret exponent is needed only when we create oneBodo Möller
2001-07-27Undo DH_generate_key() change: s3_srvr.c was using it correctlyBodo Möller
2001-07-27Another uninitialized static that may lead to problems on Solaris under someLutz Jänicke
circumstances.
2001-07-27Addapt VMS script to the latest changes in the makefiles.Richard Levitte
2001-07-27Make sure *outl is always initialized in EVP_EncryptUpdate().Dr. Stephen Henson
2001-07-27More linker bloat reorganisation:Dr. Stephen Henson
Split private key PEM and normal PEM handling. Private key handling needs to link in stuff like PKCS#8. Relocate the ASN1 *_dup() functions, to the relevant ASN1 modules using new macro IMPLEMENT_ASN1_DUP_FUNCTION. Previously these were all in crypto/x509/x_all.c along with every ASN1 BIO/fp function which linked in *every* ASN1 function if a single dup was used. Move the authority key id ASN1 structure to a separate file. This is used in the X509 routines and its previous location linked in all the v3 extension code. Also move ASN1_tag2bit to avoid linking in a_bytes.c which is now largely obsolete. So far under Linux stripped binary with single PEM_read_X509 is now 238K compared to 380K before these changes.
2001-07-26First of several reorganisations toDr. Stephen Henson
reduce linker bloat. For example the single line: PEM_read_X509() results in a binary of around 400K in Linux! This first step separates some of the PEM functions and avoids linking in some PKCS#7 and PKCS#12 code.
2001-07-26Fix problem occuring when used from OpenSSH on Solaris 8.Lutz Jänicke
2001-07-25DH key generation should not use a do ... while loop,Bodo Möller
or bogus DH parameters can be used for launching DOS attacks
2001-07-25Don't preserve existing keys in DH_generate_key.Bodo Möller
2001-07-25md_rand.c thread safetyBodo Möller
2001-07-25always reject data >= nBodo Möller
2001-07-24avoid warningsBodo Möller
2001-07-24Avoid race condition.Bodo Möller
Submitted by: Travis Vitek <vitek@roguewave.com>
2001-07-22Tidy up "cvs update" output a bit.Geoff Thorpe
2001-07-21Not all platforms have the OpenBSD crypto device.Richard Levitte
2001-07-21Clean up EVP macros, rename DES EDE3 modes correctly, temporary support forBen Laurie
OpenBSD /dev/crypto (this will be revamped later when the appropriate machinery is available).
2001-07-20Currently, RSA code, when using no padding scheme, simply checks that inputGeoff Thorpe
does not contain more bytes than the RSA modulus 'n' - it does not check that the input is strictly *less* than 'n'. Whether this should be the case or not is open to debate - however, due to security problems with returning miscalculated CRT results, the 'rsa_mod_exp' implementation in rsa_eay.c now performs a public-key exponentiation to verify the CRT result and in the event of an error will instead recalculate and return a non-CRT (more expensive) mod_exp calculation. As the mod_exp of 'I' is equivalent to the mod_exp of 'I mod n', and the verify result is automatically between 0 and n-1 inclusive, the verify only matches the input if 'I' was less than 'n', otherwise even a correct CRT calculation is only congruent to 'I' (ie. they differ by a multiple of 'n'). Rather than rejecting correct calculations and doing redundant and slower ones instead, this changes the equality check in the verification code to a congruence check.
2001-07-11Delete extra ;Dr. Stephen Henson
2001-07-11In ocsp_match_issuerid() we are passed the CA that signed the responderDr. Stephen Henson
certificate so need to match its subject with the certificate IDs in the response.
2001-07-11The implementation of the TKTBODY ASN.1 functions was missing.Richard Levitte
2001-07-11One forgotten function.Richard Levitte
2001-07-10make updateRichard Levitte
2001-07-10EVP_Digest() takes one more parameter.Richard Levitte
2001-07-10For consistency with the terminology used in my SAC2001 paper, avoidBodo Möller
the term "simultaneous multiplication" (which -- acording to the paper, at least -- applies only to certain methods which we don't use here)
2001-07-10comment changeBodo Möller
2001-07-10Fix PRNG.Bodo Möller
2001-07-10In version numbers, there is just one "M" nybble.Bodo Möller
2001-07-10Precomputation will not necessarily be LIm-Lee precomputation.Bodo Möller
2001-07-09Patches from Vern Staats <staatsvr@asc.hpc.mil> to get Kerberos 5 inRichard Levitte
SSL according to RFC 2712. His comment is: This is a patch to openssl-SNAP-20010702 to support Kerberized SSL authentication. I'm expecting to have the full kssl-0.5 kit up on sourceforge by the end of the week. The full kit includes patches for mod-ssl, apache, and a few text clients. The sourceforge URL is http://sourceforge.net/projects/kssl/ . Thanks to a note from Simon Wilkinson I've replaced my KRB5 AP_REQ message with a real KerberosWrapper struct. I think this is fully RFC 2712 compliant now, including support for the optional authenticator field. I also added openssl-style ASN.1 macros for a few Kerberos structs; see crypto/krb5/ if you're interested.
2001-07-09A better compromise between encrypt and decrypt (but why isn't it as fastBen Laurie
for encrypt?).
2001-07-08Handle the common case first (where input size is a multiple of block size).Ben Laurie
Worth around 5% for encrypt. Slows down decrypt slightly, but I expect to regain that later.
2001-07-08Use & instead of % - worth about 4% for 8 byte blocks.Ben Laurie
2001-07-08Correct const-ness.Ben Laurie
2001-07-06Remove unnecessary casts.Ben Laurie
2001-07-06Constification.Ben Laurie
2001-07-05Use one address consistently.Richard Levitte
2001-07-05Change info to correct values.Richard Levitte
2001-07-04Call ENGINE_cleanup() to avoid memory leak.Bodo Möller
2001-07-04Update nCipher header with more liberal licence.Ben Laurie
2001-07-02Let's include cryptlib.h *before* things like NO_SYSLOG are tested orRichard Levitte
used.
2001-07-02[Forgotten commits?]Richard Levitte
Changes to have OpenSSL compile on OS/2. Contributed by "Brian Havard" <brianh@kheldar.apana.org.au>
2001-07-01Changes to have OpenSSL compile on OS/2.Richard Levitte
Contributed by "Brian Havard" <brianh@kheldar.apana.org.au>