Skip to content
  1. Oct 27, 2011
    • Dr. Stephen Henson's avatar
      PR: 2628 · 5372f5f9
      Dr. Stephen Henson authored
      Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de>
      Reviewed by: steve
      
      Send alert instead of assertion failure for incorrectly formatted DTLS
      fragments.
      5372f5f9
    • Dr. Stephen Henson's avatar
      PR: 2628 · 6d24c09a
      Dr. Stephen Henson authored
      Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de>
      Reviewed by: steve
      
      Fix for ECC keys and DTLS.
      6d24c09a
  2. Oct 26, 2011
    • Dr. Stephen Henson's avatar
      PR: 2632 · a8d72c79
      Dr. Stephen Henson authored
      Submitted by: emmanuel.azencot@bull.net
      Reviewed by: steve
      
      Return -1 immediately if not affine coordinates as BN_CTX has not been
      set up.
      a8d72c79
  3. Oct 25, 2011
  4. Oct 21, 2011
  5. Oct 19, 2011
  6. Oct 18, 2011
  7. Oct 15, 2011
  8. Oct 14, 2011
  9. Oct 13, 2011
  10. Oct 12, 2011
  11. Oct 11, 2011
  12. Oct 10, 2011
  13. Oct 09, 2011
  14. Oct 07, 2011
  15. Oct 06, 2011
    • Dr. Stephen Henson's avatar
      ? crypto/aes/aes-armv4.S · 177f27d7
      Dr. Stephen Henson authored
      ? crypto/aes/aesni-sha1-x86_64.s
      ? crypto/aes/aesni-x86_64.s
      ? crypto/aes/foo.pl
      ? crypto/aes/vpaes-x86_64.s
      ? crypto/bn/.bn_lib.c.swp
      ? crypto/bn/armv4-gf2m.S
      ? crypto/bn/diffs
      ? crypto/bn/modexp512-x86_64.s
      ? crypto/bn/x86_64-gf2m.s
      ? crypto/bn/x86_64-mont5.s
      ? crypto/ec/bc.txt
      ? crypto/ec/diffs
      ? crypto/modes/a.out
      ? crypto/modes/diffs
      ? crypto/modes/ghash-armv4.S
      ? crypto/modes/ghash-x86_64.s
      ? crypto/modes/op.h
      ? crypto/modes/tst.c
      ? crypto/modes/x.h
      ? crypto/objects/.obj_xref.txt.swp
      ? crypto/rand/diffs
      ? crypto/sha/sha-512
      ? crypto/sha/sha1-armv4-large.S
      ? crypto/sha/sha256-armv4.S
      ? crypto/sha/sha512-armv4.S
      Index: crypto/objects/obj_xref.c
      ===================================================================
      RCS file: /v/openssl/cvs/openssl/crypto/objects/obj_xref.c,v
      retrieving revision 1.9
      diff -u -r1.9 obj_xref.c
      --- crypto/objects/obj_xref.c	5 Nov 2008 18:38:58 -0000	1.9
      +++ crypto/objects/obj_xref.c	6 Oct 2011 20:30:21 -0000
      @@ -110,8 +110,10 @@
       #endif
       	if (rv == NULL)
       		return 0;
      -	*pdig_nid = rv->hash_id;
      -	*ppkey_nid = rv->pkey_id;
      +	if (pdig_nid)
      +		*pdig_nid = rv->hash_id;
      +	if (ppkey_nid)
      +		*ppkey_nid = rv->pkey_id;
       	return 1;
       	}
      
      @@ -144,7 +146,8 @@
       #endif
       	if (rv == NULL)
       		return 0;
      -	*psignid = (*rv)->sign_id;
      +	if (psignid)
      +		*psignid = (*rv)->sign_id;
       	return 1;
       	}
      
      Index: crypto/x509/x509type.c
      ===================================================================
      RCS file: /v/openssl/cvs/openssl/crypto/x509/x509type.c,v
      retrieving revision 1.10
      diff -u -r1.10 x509type.c
      --- crypto/x509/x509type.c	26 Oct 2007 12:06:33 -0000	1.10
      +++ crypto/x509/x509type.c	6 Oct 2011 20:36:04 -0000
      @@ -100,20 +100,26 @@
       		break;
       		}
      
      -	i=X509_get_signature_type(x);
      -	switch (i)
      +	i=OBJ_obj2nid(x->sig_alg->algorithm);
      +	if (i && OBJ_find_sigid_algs(i, NULL, &i))
       		{
      -	case EVP_PKEY_RSA:
      -		ret|=EVP_PKS_RSA;
      -		break;
      -	case EVP_PKEY_DSA:
      -		ret|=EVP_PKS_DSA;
      -		break;
      -	case EVP_PKEY_EC:
      -		ret|=EVP_PKS_EC;
      -		break;
      -	default:
      -		break;
      +
      +		switch (i)
      +			{
      +		case NID_rsaEncryption:
      +		case NID_rsa:
      +			ret|=EVP_PKS_RSA;
      +			break;
      +		case NID_dsa:
      +		case NID_dsa_2:
      +			ret|=EVP_PKS_DSA;
      +			break;
      +		case NID_X9_62_id_ecPublicKey:
      +			ret|=EVP_PKS_EC;
      +			break;
      +		default:
      +			break;
      +			}
       		}
      
       	if (EVP_PKEY_size(pk) <= 1024/8)/* /8 because it's 1024 bits we look
      177f27d7
  16. Sep 26, 2011