1. 25 May, 2017 4 commits
  2. 17 May, 2017 2 commits
  3. 11 May, 2017 1 commit
  4. 10 May, 2017 1 commit
    • Matt Caswell's avatar
      Copy custom extension flags in a call to SSL_set_SSL_CTX() · ea3fc601
      Matt Caswell authored
      
      
      The function SSL_set_SSL_CTX() can be used to swap the SSL_CTX used for
      a connection as part of an SNI callback. One result of this is that the
      s->cert structure is replaced. However this structure contains information
      about any custom extensions that have been loaded. In particular flags are
      set indicating whether a particular extension has been received in the
      ClientHello. By replacing the s->cert structure we lose the custom
      extension flag values, and it appears as if a client has not sent those
      extensions.
      
      SSL_set_SSL_CTX() should copy any flags for custom extensions that appear
      in both the old and the new cert structure.
      
      Fixes #2180
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/3427)
      ea3fc601
  5. 05 May, 2017 1 commit
  6. 02 May, 2017 4 commits
  7. 30 Apr, 2017 1 commit
  8. 27 Apr, 2017 1 commit
  9. 24 Apr, 2017 2 commits
  10. 22 Apr, 2017 2 commits
  11. 13 Apr, 2017 1 commit
  12. 11 Apr, 2017 1 commit
  13. 04 Apr, 2017 1 commit
  14. 03 Apr, 2017 2 commits
  15. 31 Mar, 2017 1 commit
  16. 29 Mar, 2017 5 commits
  17. 26 Mar, 2017 1 commit
    • Andy Polyakov's avatar
      aes/asm/bsaes-armv7.pl: relax stack alignment requirement. · 72c0482d
      Andy Polyakov authored
      
      
      Even though Apple refers to Procedure Call Standard for ARM Architecture
      (AAPCS), they apparently adhere to custom version that doesn't follow
      stack alignment constraints in the said standard. [Why or why? If it's
      vendor lock-in thing, then it would be like worst spot ever.] And since
      bsaes-armv7 relied on standard alignment, it became problematic to
      execute the code on iOS.
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      (cherry picked from commit 0822d41b)
      72c0482d
  18. 25 Mar, 2017 2 commits
  19. 24 Mar, 2017 1 commit
  20. 23 Mar, 2017 1 commit
  21. 22 Mar, 2017 1 commit
  22. 21 Mar, 2017 3 commits
  23. 20 Mar, 2017 1 commit
    • Richard Levitte's avatar
      Fix decoding of ASN.1 LONG and ZLONG items · 2e5adeb2
      Richard Levitte authored
      
      
      LONG and ZLONG items (which are OpenSSL private special cases of
      ASN1_INTEGER) are encoded into DER with padding if the leading octet
      has the high bit set, where the padding can be 0x00 (for positive
      numbers) or 0xff (for negative ones).
      
      When decoding DER to LONG or ZLONG, the padding wasn't taken in
      account at all, which means that if the encoded size with padding
      is one byte more than the size of long, decoding fails.  This change
      fixes that issue.
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/3000)
      (cherry picked from commit ca2045dc)
      2e5adeb2