aboutsummaryrefslogtreecommitdiff
path: root/crypto
AgeCommit message (Collapse)AuthorFilesLines
2001-02-10Fix CRL printing to correctly show when there are no revoked certificates.Dr. Stephen Henson3-1/+3
Make ca.c correctly initialize the revocation date. Make ASN1_UTCTIME_set_string() and ASN1_GENERALIZEDTIME_set_string() set the string type: so they can initialize ASN1_TIME structures properly.
2001-02-10Simplify BN_rand_rangeBodo Möller3-9/+5
2001-02-09Fix "wierd" typo as submitted by Jeroen Ruigrok/Asmodai <asmodai@wxs.nl>.Lutz Jänicke1-1/+1
2001-02-09Various Win32 related fixed. Make no-krb5 work in mkdef.pl .Dr. Stephen Henson3-11/+2
Fix warning in apps/engine.c Remove definitions of deleted functions. Add missing definition of X509_VAL.
2001-02-08The check for request including a nonce and response not having it wasRichard Levitte1-1/+1
inversed. Corrected. Hopefully, this will make it work without dumping core.
2001-02-08use <= instead of ==Ulf Möller1-1/+1
2001-02-08point out that RAND_load_file() etc are only for seed files, not forUlf Möller1-0/+3
entropy devices or sockets.
2001-02-08Another comment change. (Previous comment does not applyBodo Möller1-2/+2
for range = 11000000... or range = 100000...)
2001-02-08Change comments. (The expected number of iterations in BN_rand_rangeBodo Möller1-2/+2
never exceeds 1.333...).
2001-02-08oops -- remove observation codeBodo Möller1-4/+0
2001-02-08Integrate my implementation of a countermeasure againstBodo Möller4-8/+63
Bleichenbacher's DSA attack. With this implementation, the expected number of iterations never exceeds 2. New semantics for BN_rand_range(): BN_rand_range(r, min, range) now generates r such that min <= r < min+range. (Previously, BN_rand_range(r, min, max) generated r such that min <= r < max. It is more convenient to have the range; also the previous prototype was misleading because max was larger than the actual maximum.)
2001-02-08platform specific CFLAGS don't belong into this MakefileBodo Möller1-1/+2
2001-02-07Bleichenbacher's DSA attackUlf Möller3-7/+13
2001-02-07Modify access to EGD socket to deal with EINTR etc that can appearLutz Jänicke1-67/+156
during connect() and other calls. First seen on Unixware-7. Unify access to EGD-socket for all RAND_egd_*() methods.
2001-02-07Fix AES code.Dr. Stephen Henson16-4977/+1860
Update Rijndael source to v3.0 Add AES OIDs. Change most references of Rijndael to AES. Add new draft AES ciphersuites.
2001-02-06Rijdael CBC mode and partial undebugged SSL support.Ben Laurie8-9/+174
2001-02-06Avoid coredumps for CONF_get_...(NULL, ...)Bodo Möller1-18/+41
2001-02-06format stringsUlf Möller1-1/+1
2001-02-06Fix potential buffer overrun for EBCDIC.Ulf Möller1-6/+20
2001-02-05Fix a memory leak in BIO_get_accept_socket(). This leak was small andRichard Levitte1-4/+4
only happened when the port number wasn't parsable ot the host wasn't possible to convert to an IP address. Contributed by Niko Baric <Niko.Baric@epost.de>
2001-02-05Include string.h (whis is in all relevant standards) instead ofBodo Möller1-1/+1
memory.h (which is not).
2001-02-05New function to copy nonce values from OCSPDr. Stephen Henson2-12/+17
request to response.
2001-02-04Make depend.Ben Laurie17-1830/+2004
2001-02-04Can't remember why this was needed?Ben Laurie1-1/+2
2001-02-04Fix a warning.Ben Laurie1-0/+1
2001-02-04Fix ASN1_TIME_to_generlizedtime().Dr. Stephen Henson5-11/+35
Add protoype for OCSP_response_create(). Add OCSP_request_sign() and OCSP_basic_sign() private key and certificate checks and make OCSP_NOCERTS consistent with PKCS7_NOCERTS
2001-02-03Various OCSP responder utility functions.Dr. Stephen Henson7-227/+321
Delete obsolete OCSP functions. Largely untested at present...
2001-02-02Various function for commmon operations.Dr. Stephen Henson10-44/+42
2001-02-02Tidy up the mess in bss_sock.c and bss_fd.cDr. Stephen Henson2-130/+225
by placing them socket/fd code in separate files rather than trying to have them both share the same one.
2001-02-01Tolerate some "variations" used in someDr. Stephen Henson1-2/+4
certificates. One is a valid CA which has no basicConstraints but does have certSign keyUsage. Other is S/MIME signer with nonRepudiation but no digitalSignature.
2001-01-30Increase consistency of header data (some mail readers really do notRichard Levitte1-3/+3
like spaces before the semicolon, and besides, other parts of this file makes the values without those spaces), and move spacing of continuation lines to support BIO's that break lines after each write.
2001-01-28Comment and indentationBodo Möller2-4/+11
2001-01-28Make sk_sort tolearate a NULL argument.Dr. Stephen Henson1-1/+1
2001-01-26New OCSP response verify option OCSP_TRUSTOTHERDr. Stephen Henson2-7/+17
2001-01-24Add debugging info to new ASN1 code to trace memory leaks.Dr. Stephen Henson4-13/+45
Fix PKCS7 and PKCS12 memory leaks. Initialise encapsulated content type properly.
2001-01-24Update "OAEP reconsidered" commentBodo Möller1-8/+8
2001-01-23There is no C version of bn_div_3_wordsUlf Möller1-1/+1
2001-01-20Fix to stop X509_time_adj() using GeneralizedTime.Dr. Stephen Henson1-3/+5
2001-01-19Fixes to various ASN1_INTEGER routines for negative case.Dr. Stephen Henson3-5/+36
Enhance s2i_ASN1_INTEGER().
2001-01-19Additional functionality in ocsp utility: print summaryDr. Stephen Henson4-8/+35
of status info. Check nonce values. Option to disable verify. Update usage message. Rename status to string functions and make them global.
2001-01-18Implement remaining OCSP verify checks inDr. Stephen Henson3-13/+175
accordance with RFC2560.
2001-01-17Initial OCSP certificate verify. Not complete,Dr. Stephen Henson8-10/+126
it just supports a "trusted OCSP global root CA".
2001-01-14Change PKCS#12 key derivation routines to cope withDr. Stephen Henson4-9/+13
non null terminated passwords.
2001-01-13New OCSP utility. This can generate, parse and printDr. Stephen Henson2-4/+6
OCSP requests. It can also query reponders and parse or print out responses. Still needs some more work: OCSP response checks and of course documentation.
2001-01-12Disable RegQueryValueEx() call.Bodo Möller1-0/+5
Problem reported by "Wolfgang Marczy" <WMarczy@topcall.co.at> in a message to openssl-dev (19 Dec 2000 13:40:51 +0100).
2001-01-12isspace must be used only on *unsigned* charsBodo Möller1-6/+6
2001-01-11Fix typo in OCSP ASN1 module, this causedDr. Stephen Henson3-4/+4
invalid format in OCSP request signatures. Add spaces to OCSP HTTP header. Change X509_NAME_set() there's no reason why it should return an error if the destination points to NULL... though it should if the destination is NULL.
2001-01-11OCSP basic response verify. Very incompleteDr. Stephen Henson5-5/+157
but will verify the signatures on a response and locate the signers certifcate. Still needs to implement a proper OCSP certificate verify. Fix warning in RAND_egd().
2001-01-10No functional change, but slightly improved code clarity.Bodo Möller1-3/+6
2001-01-10After discussion with Richard, change the new API for extended memoryBodo Möller1-56/+51
allocation callbacks so that it is no longer visible to applications that these live at a different call level than conventional memory allocation callbacks.