summaryrefslogtreecommitdiffstats
path: root/crypto/buffer (unfollow)
Commit message (Collapse)AuthorFilesLines
2001-07-31Reworked manual pages with a lot of input from Bodo Moeller.Lutz Jänicke3-71/+121
2001-07-31Document DES changes better.Ben Laurie2-34/+37
2001-07-31Remove old unused stuff.Ben Laurie1-4/+0
2001-07-31Indent.Lutz Jänicke1-1/+1
2001-07-31Vade retro C++ comments!Richard Levitte2-6/+10
(Latin for "comments", anyone?)
2001-07-31Make as sure as possible that gethostname() will be properly declared.Richard Levitte1-0/+8
2001-07-31Correct most of the unsigned vs. signed warnings (or int vs. size_t),Richard Levitte1-12/+13
and rename some local variables to avoid name shadowing.
2001-07-31Whoops, my fault, a backslash got converted to a slash...Richard Levitte1-1/+1
2001-07-31More Kerberos SSL changes from Jeffrey Altman <jaltman@columbia.edu>Richard Levitte7-7/+83
His comments are: First, it corrects a problem introduced in the last patch where the kssl_map_enc() would intentionally return NULL for valid ENCTYPE values. This was done to prevent verification of the kerberos 5 authenticator from being performed when Derived Key ciphers were in use. Unfortunately, the authenticator verification routine was not the only place that function was used. And it caused core dumps. Second, it attempt to add to SSL_SESSION the Kerberos 5 Client Principal Name.
2001-07-31Remove //.Ben Laurie1-2/+2
2001-07-31make updateRichard Levitte5-554/+604
2001-07-31Really add the EVP and all of the DES changes.Ben Laurie107-4616/+2990
2001-07-30Make EVPs allocate context memory, thus making them extensible. RationaliseBen Laurie25-188/+216
DES's keyschedules. I know these two should be separate, and I'll back out the DES changes if they are deemed to be an error. Note that there is a memory leak lurking in SSL somewhere in this version.
2001-07-30Only set the verify callback if there's one to set!Ben Laurie1-1/+2
2001-07-30Just a "get to know your system" bit.Andy Polyakov1-1/+3
2001-07-30Enhanced support for IA-64 Linux and HP-UX (as well as better support forAndy Polyakov5-16/+115
HP-UX in common in ./config). Note that for the moment of this writing none of 64-bit platforms pass bntest. I'm committing this anyway as it's too frustrating to patch snapshots over and over while 0.9.6 is known to work.
2001-07-30Support for Intel and HP-UXi assemblers.Andy Polyakov1-456/+465
2001-07-30ANSIfication.Ben Laurie1-1/+2
2001-07-30Typo in stty command lines.Andy Polyakov1-3/+3
2001-07-30Don't miss files...Lutz Jänicke1-0/+6
2001-07-30Fix inconsistent behaviour with respect to verify_callback handling.Lutz Jänicke4-2/+12
2001-07-30Forgot to mention second fix.Lutz Jänicke1-4/+4
2001-07-28length of secret exponent is needed only when we create oneBodo Möller1-2/+1
2001-07-28Undo DH_generate_key() change: s3_srvr.c was using it correctlyBodo Möller3-16/+9
2001-07-27Another uninitialized static that may lead to problems on Solaris under someLutz Jänicke1-1/+1
circumstances.
2001-07-27Addapt VMS script to the latest changes in the makefiles.Richard Levitte1-3/+4
2001-07-27Make sure *outl is always initialized in EVP_EncryptUpdate().Dr. Stephen Henson1-0/+2
2001-07-27More linker bloat reorganisation:Dr. Stephen Henson24-318/+612
Split private key PEM and normal PEM handling. Private key handling needs to link in stuff like PKCS#8. Relocate the ASN1 *_dup() functions, to the relevant ASN1 modules using new macro IMPLEMENT_ASN1_DUP_FUNCTION. Previously these were all in crypto/x509/x_all.c along with every ASN1 BIO/fp function which linked in *every* ASN1 function if a single dup was used. Move the authority key id ASN1 structure to a separate file. This is used in the X509 routines and its previous location linked in all the v3 extension code. Also move ASN1_tag2bit to avoid linking in a_bytes.c which is now largely obsolete. So far under Linux stripped binary with single PEM_read_X509 is now 238K compared to 380K before these changes.
2001-07-27First of several reorganisations toDr. Stephen Henson10-53/+321
reduce linker bloat. For example the single line: PEM_read_X509() results in a binary of around 400K in Linux! This first step separates some of the PEM functions and avoids linking in some PKCS#7 and PKCS#12 code.
2001-07-26Fix problem occuring when used from OpenSSH on Solaris 8.Lutz Jänicke2-1/+7
2001-07-25DH key generation should not use a do ... while loop,Bodo Möller1-7/+3
or bogus DH parameters can be used for launching DOS attacks
2001-07-25Don't preserve existing keys in DH_generate_key.Bodo Möller3-9/+45
2001-07-25md_rand.c thread safetyBodo Möller4-18/+45
2001-07-25always reject data >= nBodo Möller4-5/+47
2001-07-25Support for 64-bit Solaris build with GCC 3.0 and later. It should beAndy Polyakov3-10/+90
explicitely noted that 64-bit SPARCv9 ABI is not officially supported by GCC 3.0 (support is scheduled for 3.1 release), but it appears to work, at the very least 'make test' passes...
2001-07-25Fix wrong information about SSL_set_connect_state()...Lutz Jänicke6-30/+20
2001-07-25add a commentBodo Möller1-0/+4
2001-07-24avoid warningsBodo Möller1-2/+4
2001-07-24Avoid race condition.Bodo Möller2-4/+7
Submitted by: Travis Vitek <vitek@roguewave.com>
2001-07-23- New INSTALL document describing different ways to build "tunala" andGeoff Thorpe11-44/+354
possible problems. - New file breakage.c handles (so far) missing functions. - Get rid of some signed/unsigned/const warnings thanks to solaris-cc - Add autoconf/automake input files, and helper scripts to populate missing (but auto-generated) files. This change adds a configure.in and Makefile.am to build everything using autoconf, automake, and libtool - and adds "gunk" scripts to generate the various files those things need (and clean then up again after). This means that "autogunk.sh" needs to be run first on a system with the autotools, but the resulting directory should be "configure"able and compilable on systems without those tools.
2001-07-23Additional inline reference.Lutz Jänicke1-2/+4
2001-07-23Add missing reference.Lutz Jänicke1-0/+1
2001-07-23Tidy up "cvs update" output a bit.Geoff Thorpe2-0/+4
2001-07-21Not all platforms have the OpenBSD crypto device.Richard Levitte1-0/+4
2001-07-21Documentation about ephemeral key exchangeLutz Jänicke5-5/+315
2001-07-21Clean up EVP macros, rename DES EDE3 modes correctly, temporary support forBen Laurie12-20/+282
OpenBSD /dev/crypto (this will be revamped later when the appropriate machinery is available).
2001-07-21More Kerberos SSL patches from Vern Staats <staatsvr@asc.hpc.mil>.Richard Levitte2-73/+119
His comments are: This patch fixes the problem of modern Kerberos using "derived keys" to encrypt the authenticator by disabling the authenticator check for all derived keys enctypes. I think I've got all the bugfixes that Jeffrey and I discussed rolled into this. There were some problems with Jeffrey's code to convert the authenticator's Kerberos timestring into struct tm (e.g. Z, -1900; it helps to have an actual decryptable authenticator to play with). So I've shamelessly pushed in my code, while stealing some bits from Jeffrey.
2001-07-20Updated explanation.Lutz Jänicke1-3/+16
2001-07-20Some more documentation bits.Lutz Jänicke4-4/+56
2001-07-20Currently, RSA code, when using no padding scheme, simply checks that inputGeoff Thorpe1-3/+12
does not contain more bytes than the RSA modulus 'n' - it does not check that the input is strictly *less* than 'n'. Whether this should be the case or not is open to debate - however, due to security problems with returning miscalculated CRT results, the 'rsa_mod_exp' implementation in rsa_eay.c now performs a public-key exponentiation to verify the CRT result and in the event of an error will instead recalculate and return a non-CRT (more expensive) mod_exp calculation. As the mod_exp of 'I' is equivalent to the mod_exp of 'I mod n', and the verify result is automatically between 0 and n-1 inclusive, the verify only matches the input if 'I' was less than 'n', otherwise even a correct CRT calculation is only congruent to 'I' (ie. they differ by a multiple of 'n'). Rather than rejecting correct calculations and doing redundant and slower ones instead, this changes the equality check in the verification code to a congruence check.