- Dec 09, 2015
-
-
Dr. Stephen Henson authored
Reviewed-by:
Richard Levitte <levitte@openssl.org>
-
Dr. Stephen Henson authored
Reviewed-by:
Richard Levitte <levitte@openssl.org>
-
Dr. Stephen Henson authored
Reviewed-by:
Richard Levitte <levitte@openssl.org>
-
- Nov 09, 2015
-
-
Matt Caswell authored
Continuing from previous commit ensure our style is consistent for malloc return checks. Reviewed-by:
Kurt Roeckx <kurt@openssl.org>
-
- Sep 14, 2015
-
-
Kurt Roeckx authored
Reviewed-by:
Dr. Stephen Henson <steve@openssl.org> MR #1005
-
- Sep 11, 2015
-
-
Ben Laurie authored
-Wincompatible-pointer-types-discards-qualifiers (the latter did not require any code changes). Reviewed-by:
Rich Salz <rsalz@openssl.org>
-
- Jun 23, 2015
-
-
Rich Salz authored
Add secure heap for storage of private keys (when possible). Add BIO_s_secmem(), CBIGNUM, etc. Add BIO_CTX_secure_new so all BIGNUM's in the context are secure. Contributed by Akamai Technologies under the Corporate CLA. Reviewed-by:
Richard Levitte <levitte@openssl.org>
-
- May 11, 2015
-
-
Rich Salz authored
Reviewed-by:
Tim Hudson <tjh@openssl.org>
-
- May 01, 2015
-
-
Rich Salz authored
After the finale, the "real" final part. :) Do a recursive grep with "-B1 -w [a-zA-Z0-9_]*_free" to see if any of the preceeding lines are an "if NULL" check that can be removed. Reviewed-by:
Tim Hudson <tjh@openssl.org>
-
Rich Salz authored
Don't check for NULL before calling OPENSSL_free Reviewed-by:
Richard Levitte <levitte@openssl.org>
-
Rich Salz authored
This gets BN_.*free: BN_BLINDING_free BN_CTX_free BN_FLG_FREE BN_GENCB_free BN_MONT_CTX_free BN_RECP_CTX_free BN_clear_free BN_free BUF_MEM_free Also fix a call to DSA_SIG_free to ccgost engine and remove some #ifdef'd dead code in engines/e_ubsec. Reviewed-by:
Richard Levitte <levitte@openssl.org>
-
- Apr 30, 2015
-
-
Rich Salz authored
Do not check for NULL before calling a free routine. This addresses: ASN1_BIT_STRING_free ASN1_GENERALIZEDTIME_free ASN1_INTEGER_free ASN1_OBJECT_free ASN1_OCTET_STRING_free ASN1_PCTX_free ASN1_SCTX_free ASN1_STRING_clear_free ASN1_STRING_free ASN1_TYPE_free ASN1_UTCTIME_free M_ASN1_free_of Reviewed-by:
Richard Levitte <levitte@openssl.org>
-
- Mar 31, 2015
-
-
Douglas E Engert authored
RFC5915 requires the use of the I2OSP primitive as defined in RFC3447 for storing an EC Private Key. This converts the private key into an OCTETSTRING and retains any leading zeros. This commit ensures that those leading zeros are present if required. Reviewed-by:
Andy Polyakov <appro@openssl.org>
-
- Mar 25, 2015
-
-
Rich Salz authored
This gets EC_GROUP_clear_free EC_GROUP_free, EC_KEY_free, EC_POINT_clear_free, EC_POINT_free Reviewed-by:
Kurt Roeckx <kurt@openssl.org>
-
- Mar 24, 2015
-
-
Rich Salz authored
Start ensuring all OpenSSL "free" routines allow NULL, and remove any if check before calling them. This gets ASN1_OBJECT_free and ASN1_STRING_free. Reviewed-by:
Matt Caswell <matt@openssl.org>
-
- Mar 23, 2015
-
-
Dr. Stephen Henson authored
Remove old M_ASN1_ macros and replace any occurences with the corresponding function. Remove d2i_ASN1_bytes, d2i_ASN1_SET, i2d_ASN1_SET: no longer used internally. Reviewed-by:
Rich Salz <rsalz@openssl.org>
-
- Mar 19, 2015
-
-
Matt Caswell authored
Reported by the LibreSSL project as a follow on to CVE-2015-0209 Reviewed-by:
Richard Levitte <levitte@openssl.org>
-
- Feb 25, 2015
-
-
Matt Caswell authored
Reviewed-by:
Emilia Käsper <emilia@openssl.org>
-
Matt Caswell authored
Inspired by BoringSSL commit 517073cd4b by Eric Roman <eroman@chromium.org> CVE-2015-0209 Reviewed-by:
Emilia Käsper <emilia@openssl.org>
-
- Jan 22, 2015
-
-
Matt Caswell authored
Reviewed-by:
Tim Hudson <tjh@openssl.org>
-
- Aug 27, 2014
-
-
Emilia Kasper authored
The old code implicitly relies on the ASN.1 code returning a \0-prefixed buffer when the buffer length is 0. Change this to verify explicitly that the ASN.1 string has positive length. Reviewed-by:
Dr Stephen Henson <steve@openssl.org>
-
Matt Caswell authored
When d2i_ECPrivateKey reads a private key with a missing (optional) public key, generate one automatically from the group and private key. Reviewed-by:
Dr Stephen Henson <steve@openssl.org>
-
Adam Langley authored
This change saves several EC routines from crashing when an EC_KEY is missing a public key. The public key is optional in the EC private key format and, without this patch, running the following through `openssl ec` causes a crash: -----BEGIN EC PRIVATE KEY----- MBkCAQEECAECAwQFBgcIoAoGCCqGSM49AwEH -----END EC PRIVATE KEY----- Reviewed-by:
Dr Stephen Henson <steve@openssl.org>
-
- May 03, 2014
-
-
David Ramos authored
PR: 3338
-
- Mar 26, 2013
-
-
Matt Caswell authored
Don't check for binary curves by checking methods: the values will be different in FIPS mode as they are redirected to the validated module version.
-
- Feb 12, 2011
-
-
Dr. Stephen Henson authored
-
- Nov 12, 2008
-
-
Geoff Thorpe authored
knock-on work than expected - they've been extracted into a patch series that can be completed elsewhere, or in a different branch, before merging back to HEAD.
-
- Nov 01, 2008
-
-
Ben Laurie authored
-
- Dec 19, 2006
-
-
Bodo Möller authored
(need to prevent the removal of trailing zero bits).
-
- Sep 28, 2006
-
-
Bodo Möller authored
cause a denial of service. (CVE-2006-2940) [Steve Henson, Bodo Moeller]
-
- Jan 29, 2006
-
-
Nils Larsch authored
Submitted by: David Hartman <david_hartman@symantec.com>
-
- May 10, 2005
-
-
Nils Larsch authored
EC_GROUP_new_by_nid -> EC_GROUP_new_by_curve_name
-
- May 08, 2005
-
-
Nils Larsch authored
EC_GROUP_get_nid -> EC_GROUP_get_curve_name EC_GROUP_set_nid -> EC_GROUP_set_curve_name
-
- Apr 26, 2005
-
-
Bodo Möller authored
("perl util/ck_errf.pl */*.c */*/*.c" still reports many more.)
-
- May 04, 2004
-
-
Geoff Thorpe authored
Submitted by: Nils Larsch Reviewed by: Geoff Thorpe
-
- Nov 10, 2003
-
-
Geoff Thorpe authored
(where it was impossible to create an EC certificate with a compressed public key), and has some style improvements based on some comments from Steve Henson about use of the ASN1 macros. Submitted by: Nils Larsch Reviewed by: Geoff Thorpe
-
- Feb 21, 2003
-
-
Bodo Möller authored
-
Bodo Möller authored
behaviour was not quite consistent with the conventions for d2i and i2d functions as far as handling of the 'out' or 'in' pointer is concerned. This patch changes this behaviour, and renames the functions to o2i_ECPublicKey and i2o_ECPublicKey (not 'd2i' and 'i2d' because the external encoding is just a raw object string without any DER icing). Submitted by: Nils Larsch
-
- Jan 25, 2003
-
-
Bodo Möller authored
Submitted by: Nils Larsch
-
- Aug 26, 2002
-
-
Bodo Möller authored
Submitted by: Nils Larsch, Bodo Moeller
-