Ben Laurie [Wed, 30 May 2012 09:34:44 +0000 (09:34 +0000)]
Build on FreeBSD with gcc 4.6.
Andy Polyakov [Mon, 28 May 2012 17:50:57 +0000 (17:50 +0000)]
sha256-586.pl: full unroll to deliver additional ~16%, add Sandy Bridge-
specific code path.
Andy Polyakov [Mon, 28 May 2012 17:47:15 +0000 (17:47 +0000)]
sha512-x86_64.pl: >5% better performance.
Andy Polyakov [Thu, 24 May 2012 07:39:44 +0000 (07:39 +0000)]
aesni-x86_64.pl: make it possibel to use in Linux kernel.
Andy Polyakov [Thu, 24 May 2012 07:39:04 +0000 (07:39 +0000)]
sha256-586.pl: tune away regression on Nehalem core and incidentally
improve performance on Atom and P4.
Andy Polyakov [Sat, 19 May 2012 10:10:30 +0000 (10:10 +0000)]
sha256-586.pl optimization.
Andy Polyakov [Wed, 16 May 2012 12:47:36 +0000 (12:47 +0000)]
s2_clnt.c: compensate for compiler bug.
Andy Polyakov [Wed, 16 May 2012 12:42:32 +0000 (12:42 +0000)]
ppccap.c: assume no features under 32-bit AIX kernel.
PR: 2810
Dr. Stephen Henson [Fri, 11 May 2012 13:53:37 +0000 (13:53 +0000)]
PR: 2813
Reported by: Constantine Sapuntzakis <csapuntz@gmail.com>
Fix possible deadlock when decoding public keys.
Dr. Stephen Henson [Fri, 11 May 2012 13:34:29 +0000 (13:34 +0000)]
PR: 2811
Reported by: Phil Pennock <openssl-dev@spodhuis.org>
Make renegotiation work for TLS 1.2, 1.1 by not using a lower record
version client hello workaround if renegotiating.
Ben Laurie [Thu, 10 May 2012 20:29:00 +0000 (20:29 +0000)]
Fix warning.
Ben Laurie [Thu, 10 May 2012 20:28:02 +0000 (20:28 +0000)]
Padlock doesn't build. I don't even know what it is.
Dr. Stephen Henson [Thu, 10 May 2012 18:25:39 +0000 (18:25 +0000)]
PR: 2806
Submitted by: PK <runningdoglackey@yahoo.com>
Correct ciphersuite signature algorithm definitions.
Dr. Stephen Henson [Thu, 10 May 2012 16:03:52 +0000 (16:03 +0000)]
Sanity check record length before skipping explicit IV in TLS 1.2, 1.1 and
DTLS to fix DoS attack.
Thanks to Codenomicon for discovering this issue using Fuzz-o-Matic
fuzzing as a service testing platform.
(CVE-2012-2333)
Dr. Stephen Henson [Thu, 10 May 2012 15:37:16 +0000 (15:37 +0000)]
update FAQ
Dr. Stephen Henson [Thu, 10 May 2012 13:46:09 +0000 (13:46 +0000)]
Reported by: Solar Designer of Openwall
Make sure tkeylen is initialised properly when encrypting CMS messages.
Richard Levitte [Fri, 4 May 2012 10:43:15 +0000 (10:43 +0000)]
Correct environment variable is OPENSSL_ALLOW_PROXY_CERTS.
Andy Polyakov [Sat, 28 Apr 2012 10:36:58 +0000 (10:36 +0000)]
perlasm: fix symptom-less bugs, missing semicolons and 'my' declarations.
Andy Polyakov [Fri, 27 Apr 2012 20:17:45 +0000 (20:17 +0000)]
ppccpuid.pl: branch hints in OPENSSL_cleanse impact small block performance
of digest algorithms, mosty SHA, on Power7. Mystery of century, why SHA,
why slower algorithm are affected more...
PR: 2794
Submitted by: Ashley Lai
Dr. Stephen Henson [Thu, 26 Apr 2012 18:55:01 +0000 (18:55 +0000)]
Don't try to use unvalidated composite ciphers in FIPS mode
Dr. Stephen Henson [Thu, 26 Apr 2012 11:13:30 +0000 (11:13 +0000)]
update NEWS
Dr. Stephen Henson [Thu, 26 Apr 2012 11:10:24 +0000 (11:10 +0000)]
update FAQ
Andy Polyakov [Thu, 26 Apr 2012 07:33:26 +0000 (07:33 +0000)]
CHANGES: clarify.
Andy Polyakov [Thu, 26 Apr 2012 07:20:06 +0000 (07:20 +0000)]
CHANGES: fix typos and clarify.
Dr. Stephen Henson [Wed, 25 Apr 2012 23:04:42 +0000 (23:04 +0000)]
Change value of SSL_OP_NO_TLSv1_1 to avoid clash with SSL_OP_ALL and
OpenSSL 1.0.0. Add CHANGES entry noting the consequences.
Andy Polyakov [Wed, 25 Apr 2012 22:06:32 +0000 (22:06 +0000)]
s23_clnt.c: ensure interoperability by maitaining client "version capability"
vector contiguous.
PR: 2802
Dr. Stephen Henson [Tue, 24 Apr 2012 12:22:23 +0000 (12:22 +0000)]
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr>
Reviewed by: steve
Improved localisation of TLS extension handling and code tidy.
Dr. Stephen Henson [Mon, 23 Apr 2012 21:58:29 +0000 (21:58 +0000)]
oops, not yet ;-)
Dr. Stephen Henson [Mon, 23 Apr 2012 21:56:33 +0000 (21:56 +0000)]
update NEWS
Andy Polyakov [Sun, 22 Apr 2012 21:18:30 +0000 (21:18 +0000)]
objxref.pl: improve portability.
Dr. Stephen Henson [Sun, 22 Apr 2012 13:31:09 +0000 (13:31 +0000)]
correct error code
Dr. Stephen Henson [Sun, 22 Apr 2012 13:25:51 +0000 (13:25 +0000)]
check correctness of errors before updating them so we don't get bogus errors added
Dr. Stephen Henson [Sun, 22 Apr 2012 13:20:28 +0000 (13:20 +0000)]
correct old FAQ answers
Dr. Stephen Henson [Sun, 22 Apr 2012 13:06:51 +0000 (13:06 +0000)]
PR: 2239
Submitted by: Dominik Oepen <oepen@informatik.hu-berlin.de>
Add Brainpool curves from RFC5639.
Original patch by Annie Yousar <a.yousar@informatik.hu-berlin.de>
Andy Polyakov [Thu, 19 Apr 2012 20:38:05 +0000 (20:38 +0000)]
e_rc4_hmac_md5.c: last commit was inappropriate for non-x86[_64] platforms.
PR: 2792
Dr. Stephen Henson [Thu, 19 Apr 2012 16:19:56 +0000 (16:19 +0000)]
Check for potentially exploitable overflows in asn1_d2i_read_bio
BUF_mem_grow and BUF_mem_grow_clean. Refuse attempts to shrink buffer
in CRYPTO_realloc_clean.
Thanks to Tavis Ormandy, Google Security Team, for discovering this
issue and to Adam Langley <agl@chromium.org> for fixing it. (CVE-2012-2110)
Dr. Stephen Henson [Thu, 19 Apr 2012 12:33:23 +0000 (12:33 +0000)]
update FAQ
Andy Polyakov [Thu, 19 Apr 2012 06:39:40 +0000 (06:39 +0000)]
Makefile.org: clear yet another environment variable.
PR: 2793
Dr. Stephen Henson [Wed, 18 Apr 2012 17:03:29 +0000 (17:03 +0000)]
recognise X9.42 DH certificates on servers
Dr. Stephen Henson [Wed, 18 Apr 2012 15:36:12 +0000 (15:36 +0000)]
correct error codes
Andy Polyakov [Wed, 18 Apr 2012 14:55:39 +0000 (14:55 +0000)]
e_rc4_hmac_md5.c: harmonize zero-length fragment handling with
e_aes_cbc_hmac_sha1.c (mostly for aesthetic reasons).
Andy Polyakov [Wed, 18 Apr 2012 14:50:28 +0000 (14:50 +0000)]
e_rc4_hmac_md5.c: oops, can't use rc4_hmac_md5_cipher on legacy Intel CPUs.
PR: 2792
Andy Polyakov [Wed, 18 Apr 2012 13:01:36 +0000 (13:01 +0000)]
C64x+ assembler pack. linux-c64xplus build is *not* tested nor can it be
tested, because kernel is not in shape to handle it *yet*. The code is
committed mostly to stimulate the kernel development.
Bodo Möller [Tue, 17 Apr 2012 15:23:03 +0000 (15:23 +0000)]
Disable SHA-2 ciphersuites in < TLS 1.2 connections.
(TLS 1.2 clients could end up negotiating these with an OpenSSL server
with TLS 1.2 disabled, which is problematic.)
Submitted by: Adam Langley
Dr. Stephen Henson [Tue, 17 Apr 2012 15:12:09 +0000 (15:12 +0000)]
Additional workaround for PR#2771
If OPENSSL_MAX_TLS1_2_CIPHER_LENGTH is set then limit the size of client
ciphersuites to this value. A value of 50 should be sufficient.
Document workarounds in CHANGES.
Dr. Stephen Henson [Tue, 17 Apr 2012 13:21:19 +0000 (13:21 +0000)]
Partial workaround for PR#2771.
Some servers hang when presented with a client hello record length exceeding
255 bytes but will work with longer client hellos if the TLS record version
in client hello does not exceed TLS v1.0. Unfortunately this doesn't fix all
cases...
Andy Polyakov [Mon, 16 Apr 2012 17:42:36 +0000 (17:42 +0000)]
OPENSSL_NO_SOCK fixes.
PR: 2791
Submitted by: Ben Noordhuis
Andy Polyakov [Mon, 16 Apr 2012 17:35:30 +0000 (17:35 +0000)]
Minor compatibility fixes.
PR: 2790
Submitted by: Alexei Khlebnikov
Andy Polyakov [Sun, 15 Apr 2012 17:22:57 +0000 (17:22 +0000)]
s3_srvr.c: fix typo.
PR: 2538
Andy Polyakov [Sun, 15 Apr 2012 14:14:22 +0000 (14:14 +0000)]
e_aes_cbc_hmac_sha1.c: handle zero-length payload and engage empty frag
countermeasure.
PR: 2778
Andy Polyakov [Thu, 12 Apr 2012 06:44:34 +0000 (06:44 +0000)]
ghash-s390x.pl: fix typo [that can induce SEGV in 31-bit build].
Dr. Stephen Henson [Wed, 11 Apr 2012 16:53:11 +0000 (16:53 +0000)]
Add options to set additional type specific certificate chains to
s_server.
Dr. Stephen Henson [Wed, 11 Apr 2012 16:01:08 +0000 (16:01 +0000)]
use different variable for chain iteration
Dr. Stephen Henson [Wed, 11 Apr 2012 15:05:07 +0000 (15:05 +0000)]
fix reset fix
Dr. Stephen Henson [Wed, 11 Apr 2012 12:26:41 +0000 (12:26 +0000)]
make reinitialisation work for CMAC
Dr. Stephen Henson [Tue, 10 Apr 2012 22:28:01 +0000 (22:28 +0000)]
update rather ancient EVP digest documentation
Andy Polyakov [Mon, 9 Apr 2012 15:12:13 +0000 (15:12 +0000)]
aes-s390x.pl: fix crash in AES_set_decrypt_key in linux32-s390x build.
Dr. Stephen Henson [Fri, 6 Apr 2012 11:18:40 +0000 (11:18 +0000)]
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr>
Localize client hello extension parsing in t1_lib.c
Dr. Stephen Henson [Thu, 5 Apr 2012 13:38:27 +0000 (13:38 +0000)]
Add support for automatic ECDH temporary key parameter selection. When
enabled instead of requiring an application to hard code a (possibly
inappropriate) parameter set and delve into EC internals we just
automatically use the preferred curve.
Dr. Stephen Henson [Thu, 5 Apr 2012 13:16:37 +0000 (13:16 +0000)]
add FAQ about version numbers
Andy Polyakov [Thu, 5 Apr 2012 08:30:22 +0000 (08:30 +0000)]
aes-armv4.pl: make it more foolproof [inspired by aes-s390x.pl in 1.0.1].
Andy Polyakov [Thu, 5 Apr 2012 08:22:09 +0000 (08:22 +0000)]
aes-s390x.pl: make it more foolproof [inspired by 1.0.1].
Andy Polyakov [Wed, 4 Apr 2012 20:45:51 +0000 (20:45 +0000)]
ssl/ssl_ciph.c: interim solution for assertion in d1_pkt.c(444).
PR: 2778
Dr. Stephen Henson [Wed, 4 Apr 2012 14:41:01 +0000 (14:41 +0000)]
Tidy up EC parameter check code: instead of accessing internal structures
add utility functions to t1_lib.c to check if EC certificates and parameters
are consistent with peer.
Dr. Stephen Henson [Tue, 3 Apr 2012 23:13:23 +0000 (23:13 +0000)]
Update ordinals.
Andy Polyakov [Sat, 31 Mar 2012 18:56:27 +0000 (18:56 +0000)]
CHANGES: harmonize with 1.0.0 and 1.0.1.
Dr. Stephen Henson [Sat, 31 Mar 2012 18:03:02 +0000 (18:03 +0000)]
PR: 2778(part)
Submitted by: John Fitzgibbon <john_fitzgibbon@yahoo.com>
Time is always encoded as 4 bytes, not sizeof(Time).
Andy Polyakov [Sat, 31 Mar 2012 17:02:46 +0000 (17:02 +0000)]
modes_lcl.h: make it work on i386.
PR: 2780
Andy Polyakov [Sat, 31 Mar 2012 16:53:34 +0000 (16:53 +0000)]
vpaes-x86[_64].pl: handle zero length in vpaes_cbc_encrypt.
PR: 2775
Andy Polyakov [Sat, 31 Mar 2012 11:06:46 +0000 (11:06 +0000)]
util/cygwin.sh update.
PR: 2761
Submitted by: Corinna Vinschen
Dr. Stephen Henson [Fri, 30 Mar 2012 15:43:32 +0000 (15:43 +0000)]
don't shadow
Andy Polyakov [Thu, 29 Mar 2012 21:35:28 +0000 (21:35 +0000)]
bn/bn_gf2m.c: make new BN_GF2m_mod_inv work with BN_DEBUG_RAND.
Andy Polyakov [Thu, 29 Mar 2012 18:25:38 +0000 (18:25 +0000)]
modes/gcm128.c: fix self-test.
Andy Polyakov [Thu, 29 Mar 2012 18:20:11 +0000 (18:20 +0000)]
sha512-armv4.pl: optimize NEON code path by utilizing vbsl, bitwise select.
Andy Polyakov [Thu, 29 Mar 2012 18:09:36 +0000 (18:09 +0000)]
perlasm/x86masm.pl: fix last fix.
Andy Polyakov [Thu, 29 Mar 2012 17:48:19 +0000 (17:48 +0000)]
ans1/tasn_prn.c: avoid bool in variable names.
PR: 2776
Dr. Stephen Henson [Wed, 28 Mar 2012 15:05:04 +0000 (15:05 +0000)]
Initial revision of ECC extension handling.
Tidy some code up.
Don't allocate a structure to handle ECC extensions when it is used for
default values.
Make supported curves configurable.
Add ctrls to retrieve shared curves: not fully integrated with rest of
ECC code yet.
Dr. Stephen Henson [Thu, 22 Mar 2012 16:28:07 +0000 (16:28 +0000)]
fix leak
Dr. Stephen Henson [Thu, 22 Mar 2012 15:44:51 +0000 (15:44 +0000)]
Submitted by: Markus Friedl <mfriedl@gmail.com>
Fix memory leaks in 'goto err' cases.
Dr. Stephen Henson [Wed, 21 Mar 2012 21:33:23 +0000 (21:33 +0000)]
use client version when deciding whether to send supported signature algorithms extension
Andy Polyakov [Mon, 19 Mar 2012 20:23:32 +0000 (20:23 +0000)]
e_padlock-x86[_64].pl: better understanding of prefetch errata and proper
workaround.
Andy Polyakov [Mon, 19 Mar 2012 20:20:41 +0000 (20:20 +0000)]
eng_all.c: revert previous "disable Padlock" commit, which was unjustified.
Dr. Stephen Henson [Sun, 18 Mar 2012 18:16:46 +0000 (18:16 +0000)]
Always use SSLv23_{client,server}_method in s_client.c and s_server.c,
the old code came from SSLeay days before TLS was even supported.
Andy Polyakov [Sat, 17 Mar 2012 16:06:31 +0000 (16:06 +0000)]
vpaes-x86_64.pl: out-of-date Apple assembler fails to calculate
distance between local labels.
PR: 2762
Andy Polyakov [Fri, 16 Mar 2012 21:44:19 +0000 (21:44 +0000)]
bsaes-x86_64.pl: optimize key conversion.
Andy Polyakov [Fri, 16 Mar 2012 21:41:48 +0000 (21:41 +0000)]
bsaes-armv7.pl: optmize Sbox and key conversion.
Dr. Stephen Henson [Wed, 14 Mar 2012 13:46:50 +0000 (13:46 +0000)]
oops, revert unrelated patches
Dr. Stephen Henson [Wed, 14 Mar 2012 13:44:57 +0000 (13:44 +0000)]
update FAQ, NEWS
Andy Polyakov [Tue, 13 Mar 2012 19:43:42 +0000 (19:43 +0000)]
ghash-x86.pl: omit unreferenced rem_8bit from no-sse2 build.
Andy Polyakov [Tue, 13 Mar 2012 19:20:55 +0000 (19:20 +0000)]
ssl/t1_enc.c: pay attention to EVP_CIPH_FLAG_CUSTOM_CIPHER.
Andy Polyakov [Tue, 13 Mar 2012 19:19:08 +0000 (19:19 +0000)]
x86_64-xlate.pl: remove old kludge.
PR: 2435,2440
Dr. Stephen Henson [Mon, 12 Mar 2012 16:32:19 +0000 (16:32 +0000)]
corrected fix to PR#2711 and also cover mime_param_cmp
Dr. Stephen Henson [Mon, 12 Mar 2012 16:31:39 +0000 (16:31 +0000)]
Fix for CMS/PKCS7 MMA. If RSA decryption fails use a random key and
continue with symmetric decryption process to avoid leaking timing
information to an attacker.
Thanks to Ivan Nestlerode <inestlerode@us.ibm.com> for discovering
this issue. (CVE-2012-0884)
Dr. Stephen Henson [Mon, 12 Mar 2012 16:23:00 +0000 (16:23 +0000)]
update NEWS
Dr. Stephen Henson [Sun, 11 Mar 2012 13:40:17 +0000 (13:40 +0000)]
PR: 2744
Submitted by: Dmitry Belyavsky <beldmit@gmail.com>
CMS support for ccgost engine
Dr. Stephen Henson [Fri, 9 Mar 2012 18:38:35 +0000 (18:38 +0000)]
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr>
Add more extension names in s_cb.c extension printing code.
Dr. Stephen Henson [Fri, 9 Mar 2012 15:52:33 +0000 (15:52 +0000)]
PR: 2756
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de>
Fix DTLS timeout handling.
Dr. Stephen Henson [Thu, 8 Mar 2012 14:10:23 +0000 (14:10 +0000)]
check return value of BIO_write in PKCS7_decrypt
Dr. Stephen Henson [Tue, 6 Mar 2012 14:28:21 +0000 (14:28 +0000)]
New ctrls to retrieve supported signature algorithms and curves and
extensions to s_client and s_server to print out retrieved valued.
Extend CERT structure to cache supported signature algorithm data.
Dr. Stephen Henson [Tue, 6 Mar 2012 13:47:43 +0000 (13:47 +0000)]
PR: 2755
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de>
Reduce MTU after failed transmissions.