summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* Set CMS EnvelopedData version correctly.Dr. Stephen Henson2013-07-171-0/+73
|
* EVP support for wrapping algorithms.Dr. Stephen Henson2013-07-1713-197/+420
| | | | | | | | | Add support for key wrap algorithms via EVP interface. Generalise AES wrap algorithm and add to modes, making existing AES wrap algorithm a special case. Move test code to evptests.txt
* Typo.Dr. Stephen Henson2013-07-171-1/+1
|
* Avoid need to change function code.Dr. Stephen Henson2013-07-172-16/+16
| | | | | Keep original function names for nonce versions so we don't have to change error function codes.
* Make `safe' (EC)DSA nonces the default.Adam Langley2013-07-1512-77/+38
| | | | | | | | | This change updates 8a99cb29 to make the generation of (EC)DSA nonces using the message digest the default. It also reverts the changes to (EC)DSA_METHOD structure. In addition to making it the default, removing the flag from EC_KEY means that FIPS modules will no longer have an ABI mismatch.
* bn/asm/rsaz-avx2.pl: Windows-specific fix.Andy Polyakov2013-07-121-3/+5
|
* Fix verify loop with CRL checking.Dr. Stephen Henson2013-07-121-0/+11
| | | | | | | | | | | PR #3090 Reported by: Franck Youssef <fry@open.ch> If no new reason codes are obtained after checking a CRL exit with an error to avoid repeatedly checking the same CRL. This will only happen if verify errors such as invalid CRL scope are overridden in a callback.
* Clarify FIXME.Ben Laurie2013-07-121-2/+3
|
* Note non-export of CC.Ben Laurie2013-07-121-0/+2
|
* Support new rsaz asm stuff.Ben Laurie2013-07-121-0/+2
|
* s/rsaz_eligible/rsaz_avx2_eligible/.Ben Laurie2013-07-121-1/+1
|
* sha512-586.pl: fix typo.Andy Polyakov2013-07-101-1/+1
| | | | Submitted by: Gisle Vanem
* Remove RSAX engine, superseded by RSAZ module.Andy Polyakov2013-07-054-36/+19
|
* Take RSAZ modules into build loop, add glue and engage.Andy Polyakov2013-07-056-17/+408
| | | | RT: 2582, 2850
* Add RSAZ assembly modules.Andy Polyakov2013-07-052-0/+3569
| | | | RT: 2582, 2850
* bn/asm/x86_86-mont.pl: optimize reduction for Intel Core family.Andy Polyakov2013-07-051-312/+449
|
* bn/bn_exp.c: harmonize.Andy Polyakov2013-07-051-19/+28
|
* Fix multiple cosmetic typos.Jeff Walton2013-07-041-56/+56
|
* Initialise CMS signature buffer length properly.Dr. Stephen Henson2013-07-021-1/+2
|
* config: fix executable format detection on latest FreeBSD.Andy Polyakov2013-06-301-1/+1
| | | | | Submitted by: Bryan Drewery PR: 3075
* bn/bn_exp.c: Solaris-specific fix, T4 MONTMUL relies on alloca.Andy Polyakov2013-06-301-0/+2
|
* x86_64-xlate.pl: Windows fixes.Andy Polyakov2013-06-301-3/+5
|
* aesni-sha256-x86_64.pl: fix typo in Windows SEH.Andy Polyakov2013-06-301-4/+0
|
* Cosmetic touchups.Trevor2013-06-284-15/+18
|
* Fix duplicate error code.Dr. Stephen Henson2013-06-281-1/+1
|
* Update CHANGESDr. Stephen Henson2013-06-221-0/+4
|
* Update cms docs.Dr. Stephen Henson2013-06-221-2/+29
| | | | Document use of -keyopt to use RSA-PSS and RSA-OAEP modes.
* Add new CMS tests.Dr. Stephen Henson2013-06-221-0/+49
| | | | Add new tests to cms-test.pl covering PSS and OAEP.
* Add -keyopt option to cms utility.Dr. Stephen Henson2013-06-221-5/+143
| | | | | Add support for custom public key parameters in the cms utility using the -keyopt switch. Works for -sign and also -encrypt if -recip is used.
* CMS RSA-OAEP and RSA-PSS support.Dr. Stephen Henson2013-06-225-141/+475
| | | | | | | | | | | | | | | | | | Extend RSA ASN1 method to support CMS PSS signatures for both sign and verify. For signing the EVP_PKEY_CTX parameters are read and the appropriate CMS structures set up. For verification the CMS structures are analysed and the corresponding parameters in the EVP_PKEY_CTX set. Also add RSA-OAEP support. For encrypt the EVP_PKEY_CTX parameters are used. For decrypt the CMS structure is uses to set the appropriate EVP_PKEY_CTX parameters.
* CMS public key parameter support.Dr. Stephen Henson2013-06-216-75/+212
| | | | | | | | Add support for customisation of CMS handling of signed and enveloped data from custom public key parameters. This will provide support for RSA-PSS and RSA-OAEP but could also be applied to other algorithms.
* Update to OAEP support.Dr. Stephen Henson2013-06-212-5/+43
| | | | | | Add OAEP ctrls to retrieve MD and label. Return errors if an attempt is made to set or retrieve OAEP parameters when padding mode is not OAEP.
* Add control to retrieve signature MD.Dr. Stephen Henson2013-06-215-0/+26
|
* Add new OID to pSpecified from PKCS#1Dr. Stephen Henson2013-06-214-5/+17
|
* Cleanup of custom extension stuff.Trevor2013-06-188-44/+402
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | serverinfo rejects non-empty extensions. Omit extension if no relevant serverinfo data. Improve error-handling in serverinfo callback. Cosmetic cleanups. s_client documentation. s_server documentation. SSL_CTX_serverinfo documentation. Cleaup -1 and NULL callback handling for custom extensions, add tests. Cleanup ssl_rsa.c serverinfo code. Whitespace cleanup. Improve comments in ssl.h for serverinfo. Whitespace. Cosmetic cleanup. Reject non-zero-len serverinfo extensions. Whitespace. Make it build.
* SPARC T4 DES support: fix typo.Andy Polyakov2013-06-181-2/+2
|
* Optimize SPARC T4 MONTMUL support.Andy Polyakov2013-06-182-155/+253
| | | | | | | Improve RSA sing performance by 20-30% by: - switching from floating-point to integer conditional moves; - daisy-chaining sqr-sqr-sqr-sqr-sqr-mul sequences; - using MONTMUL even during powers table setup;
* PA-RISC assembler pack: switch to bve in 64-bit builds.Andy Polyakov2013-06-187-24/+33
| | | | PR: 3074
* Add secure DSA nonce flag.Adam Langley2013-06-1315-30/+201
| | | | | | This change adds the option to calculate (EC)DSA nonces by hashing the message and private key along with entropy to avoid leaking the private key if the PRNG fails.
* Limit the number of empty records that will be processed consecutivelyAdam Langley2013-06-133-1/+20
| | | | | | in order to prevent ssl3_get_record from never returning. Reported by "oftc_must_be_destroyed" and George Kadianakis.
* Don't SEGFAULT when trying to export a public DSA key as a private key.Adam Langley2013-06-131-0/+6
|
* This change alters the processing of invalid, RSA pre-master secrets soAdam Langley2013-06-131-45/+89
| | | | | that bad encryptions are treated like random session keys in constant time.
* Ignore one-makefile stuff.Ben Laurie2013-06-131-3/+4
|
* Document updates from wiki.Matt Caswell2013-06-1348-133/+1227
| | | | | | | | | | | | | PR#3071 The primary changes made are: - Updates to the "NAME" section of many pages to correctly reflect the functions defined on those pages. This section is automatically parsed by the util/extract-names.pl script, so if it is not correct then running "man" will not correctly locate the right manual pages. - Updates to take account of where functions are now deprecated - Full documentation of the ec sub-library - A number of other typo corrections and other minor tweaks
* Exetended OAEP support.Dr. Stephen Henson2013-06-125-48/+217
| | | | | | Extend OAEP support. Generalise the OAEP padding functions to support arbitrary digests. Extend EVP_PKEY RSA method to handle the new OAEP padding functions and add ctrls to set the additional parameters.
* Typo.Dr. Stephen Henson2013-06-121-1/+1
|
* Add support for arbitrary TLS extensions.Trevor2013-06-1217-5/+791
| | | | Contributed by Trevor Perrin.
* Add aesni-sha256-x86_64.Ben Laurie2013-06-121-1/+2
|
* aesni-sha1-x86_64.pl: update performance data.Andy Polyakov2013-06-101-12/+14
|
* aesni-sha256-x86_64.pl: harmonize with latest sha512-x86_64.pl.Andy Polyakov2013-06-101-11/+9
|