summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/cms/cms_env.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Fix a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey.tb2019-10-041-2/+19
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | (Note that the CMS code is currently disabled.) Port of Edlinger's Fix for CVE-2019-1563 from OpenSSL 1.1.1 (old license) tests from bluhm@ ok jsing commit e21f8cf78a125cd3c8c0d1a1a6c8bb0b901f893f Author: Bernd Edlinger <bernd.edlinger@hotmail.de> Date: Sun Sep 1 00:16:28 2019 +0200 Fix a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey An attack is simple, if the first CMS_recipientInfo is valid but the second CMS_recipientInfo is chosen ciphertext. If the second recipientInfo decodes to PKCS #1 v1.5 form plaintext, the correct encryption key will be replaced by garbage, and the message cannot be decoded, but if the RSA decryption fails, the correct encryption key is used and the recipient will not notice the attack. As a work around for this potential attack the length of the decrypted key must be equal to the cipher default key length, in case the certifiate is not given and all recipientInfo are tried out. The old behaviour can be re-enabled in the CMS code by setting the CMS_DEBUG_DECRYPT flag. Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/9777) (cherry picked from commit 5840ed0cd1e6487d247efbc1a04136a41d7b3a37)
* Include string.h for explicit_bzero().jsing2019-08-111-1/+3
|
* Expand M_ASN1_new_of and M_ASN1_free_of macros.jsing2019-08-111-9/+9
|
* Use freezero() rather than OPENSSL_clear_free().jsing2019-08-111-3/+3
|
* Use explicit_bzero() instead of OPENSSL_cleanse().jsing2019-08-111-3/+3
|
* Use malloc(3) and free(3), rather than OPENSSL_{malloc,free}().jsing2019-08-111-9/+9
|
* Convert CMSerr() to CMSerror().jsing2019-08-111-54/+40
|
* More style(9), whitespace and readability fixes.jsing2019-08-101-89/+114
| | | | Files are identical once whitespace and newlines are removed.
* First pass at style(9).jsing2019-08-101-632/+632
| | | | Whitespace only and no change according to diff -w.
* Fix includes for non-installed headers.jsing2019-08-101-4/+4
|
* Add $OpenBSD$ tags.jsing2019-08-101-0/+1
|
* Restore the original per-file licenses for CMS.jsing2019-08-101-5/+49
| | | | These were removed in OpenSSL b1322259d93cf6b6286f9febcd468b6a9f577d91.
* Work towards supporting Cryptographic Message Syntax (CMS) in libcrypto.jsing2019-08-101-0/+903
| | | | | | | | | | | | | | | | Cryptographic Message Syntax (CMS) is a standard for cryptographically protecting messages, as defined in RFC 5652. It is derived from PKCS #7 version 1.5 and utilises various ASN.1 structures, making it complex and fairly heavyweight. Various protocols - including RPKI (RFC 6480) - have been built on top of it, which means it is necessary to support CMS, in order to support RPKI. This imports around 6,000 lines of code from OpenSSL 1.1.1, which is still under the original OpenSSL license. Further work will occur in tree. Requested by and discussed with many. ok deraadt@ tb@
* Remove cms.jsing2016-09-041-818/+0
| | | | ok beck@, guenther@, tedu@
* Correct spelling of OPENSSL_cleanse.jsing2015-09-101-5/+5
| | | | ok miod@
* None of these need to include <openssl/rand.h>jsing2014-10-181-2/+1
|
* if (x) FOO_free(x) -> FOO_free(x).miod2014-07-121-5/+3
| | | | | | | Improves readability, keeps the code smaller so that it is warmer in your cache. review & ok deraadt@
* Only import cryptlib.h in the four source files that actually need it.jsing2014-07-111-6/+6
| | | | | | | | Remove the openssl public includes from cryptlib.h and add a small number of includes into the source files that actually need them. While here, also sort/group/tidy the includes. ok beck@ miod@
* tags as requested by miod and teduderaadt2014-06-121-1/+1
|
* KNF.jsing2014-05-241-313/+259
|
* if (x) free(x) -> free(x); semantic patch generated with coccinelle, carefullymiod2014-05-221-2/+1
| | | | eyeballed before applying. Contributed by Cyril Roelandt on tech@
* Change library to use intrinsic memory allocation functions instead ofbeck2014-04-171-10/+10
| | | | | | | | OPENSSL_foo wrappers. This changes: OPENSSL_malloc->malloc OPENSSL_free->free OPENSSL_relloc->realloc OPENSSL_freeFunc->free
* import OpenSSL-1.0.1cdjm2012-10-131-4/+18
|
* import OpenSSL-1.0.0adjm2010-10-011-24/+61
|
* import of OpenSSL 0.9.8hdjm2008-09-061-0/+825