- 24 3月, 2015 1 次提交
-
-
由 Rich Salz 提交于
Start ensuring all OpenSSL "free" routines allow NULL, and remove any if check before calling them. This gets ASN1_OBJECT_free and ASN1_STRING_free. Reviewed-by: NMatt Caswell <matt@openssl.org>
-
- 19 3月, 2015 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Fix a bug where invalid PSS parameters are not rejected resulting in a NULL pointer exception. This can be triggered during certificate verification so could be a DoS attack against a client or a server enabling client authentication. Thanks to Brian Carpenter for reporting this issues. CVE-2015-0208 Reviewed-by: NTim Hudson <tjh@openssl.org>
-
- 22 1月, 2015 1 次提交
-
-
由 Matt Caswell 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
- 09 9月, 2014 1 次提交
-
-
由 Kurt Roeckx 提交于
This is a more comprehensive fix. It changes all keygen apps to use 2K keys. It also changes the default to use SHA256 not SHA1. This is from Kurt's upstream Debian changes. Reviewed-by: NRich Salz <rsalz@openssl.org> Reviewed-by: NKurt Roeckx <kurt@openssl.org>
-
- 29 5月, 2014 1 次提交
-
-
由 Martin Kaiser 提交于
-
- 28 3月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Add functions to return the "bits of security" for various public key algorithms. Based on SP800-57.
-
- 20 3月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Some CMS SignedData structure use a signature algorithm OID such as SHA1WithRSA instead of the RSA algorithm OID. Workaround this case by tolerating the signature if we recognise the OID.
-
- 18 7月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
For RSA and DSA keys return an appropriate RecipientInfo type. By setting CMS_RECIPINFO_NONE for DSA keys an appropriate error is returned if an attempt is made to use DSA with enveloped data.
-
- 22 6月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Extend RSA ASN1 method to support CMS PSS signatures for both sign and verify. For signing the EVP_PKEY_CTX parameters are read and the appropriate CMS structures set up. For verification the CMS structures are analysed and the corresponding parameters in the EVP_PKEY_CTX set. Also add RSA-OAEP support. For encrypt the EVP_PKEY_CTX parameters are used. For decrypt the CMS structure is uses to set the appropriate EVP_PKEY_CTX parameters.
-
- 05 6月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Fix PSS signature printing: consistently use 0x prefix for hex values for padding length and trailer fields.
-
- 04 10月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 10 8月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Use consistent calculation for PSS salt length.
-
- 12 3月, 2010 2 次提交
-
-
由 Dr. Stephen Henson 提交于
Reject PSS signatures with unsupported trailer value.
-
由 Dr. Stephen Henson 提交于
-
- 11 3月, 2010 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
- 09 3月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
requests. Add new ASN1 signature initialisation function to handle this case.
-
- 08 3月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 07 3月, 2010 3 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
Uses ASN1 module in Martin Kaiser's PSS patch.
-
由 Dr. Stephen Henson 提交于
now print out signatures instead of the standard hex dump. More complex signatures (e.g. PSS) can print out more meaningful information. Sample DSA version included that prints out the signature parameters r, s. [Note EVP_PKEY_ASN1_METHOD is an application opaque structure so adding new fields in the middle has no compatibility issues]
-
- 12 11月, 2008 1 次提交
-
-
由 Geoff Thorpe 提交于
knock-on work than expected - they've been extracted into a patch series that can be completed elsewhere, or in a different branch, before merging back to HEAD.
-
- 06 11月, 2008 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 02 11月, 2008 1 次提交
-
-
由 Ben Laurie 提交于
-
- 17 3月, 2008 1 次提交
-
-
由 Geoff Thorpe 提交于
OPENSSL_NO_DEPRECATED, etc. Steve, please double-check the CMS stuff...
-
- 16 3月, 2008 1 次提交
-
-
由 Dr. Stephen Henson 提交于
examples. All RFC4134 examples can not be processed.
-
- 13 3月, 2008 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Initial support for CMS. Add zlib compression BIO. Add AES key wrap implementation. Generalize S/MIME MIME code to support CMS and/or PKCS7.
-
- 18 7月, 2006 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 08 5月, 2006 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 28 4月, 2006 1 次提交
-
-
由 Dr. Stephen Henson 提交于
ctrl.
-
- 20 4月, 2006 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Use cross reference table in ASN1_item_sign(), ASN1_item_verify() to eliminate the need for algorithm specific code.
-
- 18 4月, 2006 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 17 4月, 2006 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 15 4月, 2006 1 次提交
-
-
由 Dr. Stephen Henson 提交于
been deleted.
-
- 24 3月, 2006 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 23 3月, 2006 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
initialize it. Initial support for application added public key ASN1.
-
- 22 3月, 2006 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 21 3月, 2006 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 20 3月, 2006 1 次提交
-
-
由 Dr. Stephen Henson 提交于
key ASN1 handling through a single EVP_PKEY_ASN1_METHOD structure and move the spaghetti algorithm specific code to a single ASN1 module for each algorithm.
-