summaryrefslogtreecommitdiffstats
path: root/ssl/ssl_asn1.c
AgeCommit message (Expand)Author
2016-05-17Copyright consolidation 01/10Rich Salz
2016-01-26Remove /* foo.c */ commentsRich Salz
2015-12-16Rename some BUF_xxx to OPENSSL_xxxRich Salz
2015-09-11Enable -Wmissing-variable-declarations andBen Laurie
2015-05-22Remove support for OPENSSL_NO_TLSEXTMatt Caswell
2015-05-13Remove Kerberos support from libsslMatt Caswell
2015-05-05ssl/ssl_asn1.c: Fix typo introduced via cc5b6a03a320f1mancha security
2015-05-01Remove goto inside an if(0) blockRich Salz
2015-05-01free null cleanup finaleRich Salz
2015-04-10The wrong ifdef is used to guard usage of PSK codeKurt Cancemi
2015-04-03Rewrite ssl_asn1.c using new ASN.1 code.Dr. Stephen Henson
2015-02-27Fix d2i_SSL_SESSION for DTLS1_BAD_VERMatt Caswell
2015-02-10Correct reading back of tlsext_tick_lifetime_hint from ASN1.Matt Caswell
2015-02-03Add flags field to SSL_SESSION.Dr. Stephen Henson
2015-01-22Run util/openssl-format-source -v -c .Matt Caswell
2014-12-04Remove SSLv2 supportKurt Roeckx
2014-05-07fix coverity issue 966597 - error line is not always initialisedTim Hudson
2012-06-03Version skew reduction: trivia (I hope).Ben Laurie
2011-10-25Use correct tag for SRP username.Dr. Stephen Henson
2011-09-05Fix d2i_SSL_SESSION.Bodo Möller
2011-03-12Add SRP support.Ben Laurie
2011-02-16Include openssl/crypto.h first in several other files so FIPS renamingDr. Stephen Henson
2010-06-12Fix warnings.Ben Laurie
2010-02-01PR: 2160Dr. Stephen Henson
2009-10-30Generate stateless session ID just after the ticket is received insteadDr. Stephen Henson
2009-10-30Fix statless session resumption so it can coexist with SNIDr. Stephen Henson
2009-09-02PR: 2009Dr. Stephen Henson
2009-08-05Update from 1.0.0-stable.Dr. Stephen Henson
2009-06-30Update from 0.9.8-stableDr. Stephen Henson
2008-11-13Aftermath of a clashing size_t fix (now only format changes).Ben Laurie
2008-11-12Revert the size_t modifications from HEAD that had led to moreGeoff Thorpe
2008-11-01More size_tification.Ben Laurie
2008-09-14Some precautions to avoid potential security-relevant problems.Bodo Möller
2007-10-17Fix from stable branch.Dr. Stephen Henson
2007-08-12Fix warning and make no-tlsext work.Dr. Stephen Henson
2007-08-11RFC4507 (including RFC4507bis) TLS stateless session resumption supportDr. Stephen Henson
2006-04-05Remove ECC extension information from external representationBodo Möller
2006-03-30Implement Supported Elliptic Curves Extension.Bodo Möller
2006-03-26Simplify ASN.1 for point format listBodo Möller
2006-03-13Resolve signed vs. unsigned issuesRichard Levitte
2006-03-11Implement the Supported Point Formats Extension for ECC ciphersuitesBodo Möller
2006-03-10add initial support for RFC 4279 PSK SSL ciphersuitesNils Larsch
2006-01-04Fix signed/unsigned char clashes.Richard Levitte
2006-01-02Support TLS extensions (specifically, HostName)Bodo Möller
2005-12-05Avoid warnings on VC++ 2005.Dr. Stephen Henson
2005-04-20Make kerberos ciphersuite code compile again.Dr. Stephen Henson
2005-04-01use SSL3_VERSION_MAJOR instead of SSL3_VERSION etc.Nils Larsch
2005-03-31Give everything prototypes (well, everything that's actually used).Ben Laurie
2005-03-30Constification.Ben Laurie
2003-12-27Avoid including cryptlib.h, it's not really needed.Richard Levitte
s="mh">0x33,0x4B,0x02,0x3C,0x52,0x30,0x03,0x8B,0x3B,0xF9, 0x5F,0xD1,0x24,0x06,0x4F,0x7B,0x4C,0xBA,0xAA,0x40,0x9B,0xFD, 0x96,0xE4,0x37,0x33,0xBB,0x2D,0x5A,0xD7,0x5A,0x11,0x40,0x66, 0xA2,0x76,0x7D,0x31, }; static unsigned char dsa512_q[]={ 0xFB,0x53,0xEF,0x50,0xB4,0x40,0x92,0x31,0x56,0x86,0x53,0x7A, 0xE8,0x8B,0x22,0x9A,0x49,0xFB,0x71,0x8F, }; static unsigned char dsa512_g[]={ 0x83,0x3E,0x88,0xE5,0xC5,0x89,0x73,0xCE,0x3B,0x6C,0x01,0x49, 0xBF,0xB3,0xC7,0x9F,0x0A,0xEA,0x44,0x91,0xE5,0x30,0xAA,0xD9, 0xBE,0x5B,0x5F,0xB7,0x10,0xD7,0x89,0xB7,0x8E,0x74,0xFB,0xCF, 0x29,0x1E,0xEB,0xA8,0x2C,0x54,0x51,0xB8,0x10,0xDE,0xA0,0xCE, 0x2F,0xCC,0x24,0x6B,0x90,0x77,0xDE,0xA2,0x68,0xA6,0x52,0x12, 0xA2,0x03,0x9D,0x20, }; DSA *get_dsa512() { DSA *dsa; if ((dsa=DSA_new()) == NULL) return(NULL); dsa->p=BN_bin2bn(dsa512_p,sizeof(dsa512_p),NULL); dsa->q=BN_bin2bn(dsa512_q,sizeof(dsa512_q),NULL); dsa->g=BN_bin2bn(dsa512_g,sizeof(dsa512_g),NULL); if ((dsa->p == NULL) || (dsa->q == NULL) || (dsa->g == NULL)) return(NULL); return(dsa); } static unsigned char dsa1024_p[]={ 0xA7,0x3F,0x6E,0x85,0xBF,0x41,0x6A,0x29,0x7D,0xF0,0x9F,0x47, 0x19,0x30,0x90,0x9A,0x09,0x1D,0xDA,0x6A,0x33,0x1E,0xC5,0x3D, 0x86,0x96,0xB3,0x15,0xE0,0x53,0x2E,0x8F,0xE0,0x59,0x82,0x73, 0x90,0x3E,0x75,0x31,0x99,0x47,0x7A,0x52,0xFB,0x85,0xE4,0xD9, 0xA6,0x7B,0x38,0x9B,0x68,0x8A,0x84,0x9B,0x87,0xC6,0x1E,0xB5, 0x7E,0x86,0x4B,0x53,0x5B,0x59,0xCF,0x71,0x65,0x19,0x88,0x6E, 0xCE,0x66,0xAE,0x6B,0x88,0x36,0xFB,0xEC,0x28,0xDC,0xC2,0xD7, 0xA5,0xBB,0xE5,0x2C,0x39,0x26,0x4B,0xDA,0x9A,0x70,0x18,0x95, 0x37,0x95,0x10,0x56,0x23,0xF6,0x15,0xED,0xBA,0x04,0x5E,0xDE, 0x39,0x4F,0xFD,0xB7,0x43,0x1F,0xB5,0xA4,0x65,0x6F,0xCD,0x80, 0x11,0xE4,0x70,0x95,0x5B,0x50,0xCD,0x49, }; static unsigned char dsa1024_q[]={ 0xF7,0x07,0x31,0xED,0xFA,0x6C,0x06,0x03,0xD5,0x85,0x8A,0x1C, 0xAC,0x9C,0x65,0xE7,0x50,0x66,0x65,0x6F, }; static unsigned char dsa1024_g[]={ 0x4D,0xDF,0x4C,0x03,0xA6,0x91,0x8A,0xF5,0x19,0x6F,0x50,0x46, 0x25,0x99,0xE5,0x68,0x6F,0x30,0xE3,0x69,0xE1,0xE5,0xB3,0x5D, 0x98,0xBB,0x28,0x86,0x48,0xFC,0xDE,0x99,0x04,0x3F,0x5F,0x88, 0x0C,0x9C,0x73,0x24,0x0D,0x20,0x5D,0xB9,0x2A,0x9A,0x3F,0x18, 0x96,0x27,0xE4,0x62,0x87,0xC1,0x7B,0x74,0x62,0x53,0xFC,0x61, 0x27,0xA8,0x7A,0x91,0x09,0x9D,0xB6,0xF1,0x4D,0x9C,0x54,0x0F, 0x58,0x06,0xEE,0x49,0x74,0x07,0xCE,0x55,0x7E,0x23,0xCE,0x16, 0xF6,0xCA,0xDC,0x5A,0x61,0x01,0x7E,0xC9,0x71,0xB5,0x4D,0xF6, 0xDC,0x34,0x29,0x87,0x68,0xF6,0x5E,0x20,0x93,0xB3,0xDB,0xF5, 0xE4,0x09,0x6C,0x41,0x17,0x95,0x92,0xEB,0x01,0xB5,0x73,0xA5, 0x6A,0x7E,0xD8,0x32,0xED,0x0E,0x02,0xB8, }; DSA *get_dsa1024() { DSA *dsa; if ((dsa=DSA_new()) == NULL) return(NULL); dsa->p=BN_bin2bn(dsa1024_p,sizeof(dsa1024_p),NULL); dsa->q=BN_bin2bn(dsa1024_q,sizeof(dsa1024_q),NULL); dsa->g=BN_bin2bn(dsa1024_g,sizeof(dsa1024_g),NULL); if ((dsa->p == NULL) || (dsa->q == NULL) || (dsa->g == NULL)) return(NULL); return(dsa); } static unsigned char dsa2048_p[]={ 0xA0,0x25,0xFA,0xAD,0xF4,0x8E,0xB9,0xE5,0x99,0xF3,0x5D,0x6F, 0x4F,0x83,0x34,0xE2,0x7E,0xCF,0x6F,0xBF,0x30,0xAF,0x6F,0x81, 0xEB,0xF8,0xC4,0x13,0xD9,0xA0,0x5D,0x8B,0x5C,0x8E,0xDC,0xC2, 0x1D,0x0B,0x41,0x32,0xB0,0x1F,0xFE,0xEF,0x0C,0xC2,0xA2,0x7E, 0x68,0x5C,0x28,0x21,0xE9,0xF5,0xB1,0x58,0x12,0x63,0x4C,0x19, 0x4E,0xFF,0x02,0x4B,0x92,0xED,0xD2,0x07,0x11,0x4D,0x8C,0x58, 0x16,0x5C,0x55,0x8E,0xAD,0xA3,0x67,0x7D,0xB9,0x86,0x6E,0x0B, 0xE6,0x54,0x6F,0x40,0xAE,0x0E,0x67,0x4C,0xF9,0x12,0x5B,0x3C, 0x08,0x7A,0xF7,0xFC,0x67,0x86,0x69,0xE7,0x0A,0x94,0x40,0xBF, 0x8B,0x76,0xFE,0x26,0xD1,0xF2,0xA1,0x1A,0x84,0xA1,0x43,0x56, 0x28,0xBC,0x9A,0x5F,0xD7,0x3B,0x69,0x89,0x8A,0x36,0x2C,0x51, 0xDF,0x12,0x77,0x2F,0x57,0x7B,0xA0,0xAA,0xDD,0x7F,0xA1,0x62, 0x3B,0x40,0x7B,0x68,0x1A,0x8F,0x0D,0x38,0xBB,0x21,0x5D,0x18, 0xFC,0x0F,0x46,0xF7,0xA3,0xB0,0x1D,0x23,0xC3,0xD2,0xC7,0x72, 0x51,0x18,0xDF,0x46,0x95,0x79,0xD9,0xBD,0xB5,0x19,0x02,0x2C, 0x87,0xDC,0xE7,0x57,0x82,0x7E,0xF1,0x8B,0x06,0x3D,0x00,0xA5, 0x7B,0x6B,0x26,0x27,0x91,0x0F,0x6A,0x77,0xE4,0xD5,0x04,0xE4, 0x12,0x2C,0x42,0xFF,0xD2,0x88,0xBB,0xD3,0x92,0xA0,0xF9,0xC8, 0x51,0x64,0x14,0x5C,0xD8,0xF9,0x6C,0x47,0x82,0xB4,0x1C,0x7F, 0x09,0xB8,0xF0,0x25,0x83,0x1D,0x3F,0x3F,0x05,0xB3,0x21,0x0A, 0x5D,0xA7,0xD8,0x54,0xC3,0x65,0x7D,0xC3,0xB0,0x1D,0xBF,0xAE, 0xF8,0x68,0xCF,0x9B, }; static unsigned char dsa2048_q[]={ 0x97,0xE7,0x33,0x4D,0xD3,0x94,0x3E,0x0B,0xDB,0x62,0x74,0xC6, 0xA1,0x08,0xDD,0x19,0xA3,0x75,0x17,0x1B, }; static unsigned char dsa2048_g[]={ 0x2C,0x78,0x16,0x59,0x34,0x63,0xF4,0xF3,0x92,0xFC,0xB5,0xA5, 0x4F,0x13,0xDE,0x2F,0x1C,0xA4,0x3C,0xAE,0xAD,0x38,0x3F,0x7E, 0x90,0xBF,0x96,0xA6,0xAE,0x25,0x90