summaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2015-12-15Move library path to default libdirsubmit/tizen/20151215.030819accepted/tizen/wearable/20151216.105205accepted/tizen/tv/20151216.105141accepted/tizen/mobile/20151216.105133Kyungwook Tak1-15/+3
Change-Id: I70356e1ef2e74b817bd4008dc4e68473ed29d843 Signed-off-by: Kyungwook Tak <k.tak@samsung.com>
2015-10-12Fix diff between upstream and tizensubmit/tizen/20151102.020329submit/tizen/20151014.061836accepted/tizen/wearable/20151105.020114accepted/tizen/tv/20151105.020102accepted/tizen/mobile/20151105.020049Kyungwook Tak1-8/+6
Change-Id: I30681b310869557c60a2d8ab3b76d999c9c2fa97 Signed-off-by: Kyungwook Tak <k.tak@samsung.com>
2015-10-12Upgrade upstream version to 1.0.2dKyungwook Tak611-13748/+98329
Change-Id: I68b01267078a01007964c693440489151bc8ba2f
2015-10-06Imported Upstream version 1.0.2dupstream/1.0.2dYury Usishchev610-13747/+98328
Change-Id: I565a3e3ac5176f83139175faa2d2a11a334e8908 Signed-off-by: Yury Usishchev <y.usishchev@samsung.com>
2015-08-31Upgrade openssl version to 1.0.1ptizen_3.0.m2.a1_tv_releasetizen_3.0.m2.a1_mobile_releasetizen_3.0.m1_tv_releasetizen_3.0.m1_mobile_releasesubmit/tizen_common/20151026.085049submit/tizen_common/20151023.083358submit/tizen_common/20151019.135620submit/tizen_common/20151015.190624submit/tizen/20150831.092033submit/tizen/20150831.090327accepted/tizen/wearable/20150901.083422accepted/tizen/tv/20150901.083409accepted/tizen/mobile/20150901.083356tizen_3.0.m1_tvtizen_3.0.m1_mobileKyungwook Tak236-1179/+3268
Change-Id: I4adbd2d17c72f228aea1396678f1e11a67b63bdc
2015-08-31Imported Upstream version 1.0.1pupstream/1.0.1pKyungwook Tak235-1178/+3267
Change-Id: I297624cdcb5d68a3442cdf4666722e66ce7a264b
2015-03-25Upgrade openssl version to 1.0.1msubmit/tizen/20150325.105130accepted/tizen/wearable/20150326.094428accepted/tizen/tv/20150326.231020accepted/tizen/mobile/20150326.230707accepted/tizen/common/20150326.090358tizen_3.0.2015.q2_commonkyungwook tak1100-280567/+284626
Conflicts: ssl/ssl_lib.c Change-Id: Ib400e515e742c87075578ed5e7ff82ccf4f195af Signed-off-by: kyungwook tak <k.tak@samsung.com>
2015-03-25Imported Upstream version 1.0.1mupstream/1.0.1mkyungwook tak1100-280628/+284687
Change-Id: Ifa60e86d772dade7afe158c8899e6d36c5561bba
2015-03-12Upgrade openssl version to 1.0.1lsubmit/tizen/20150318.014044accepted/tizen/wearable/20150319.013230accepted/tizen/tv/20150319.020158accepted/tizen/mobile/20150319.013754accepted/tizen/common/20150318.103117kyungwook tak117-3777/+1795
Change-Id: Ia57c845afb0e9f2eb99fdb167441ef0b6157b50c
2015-03-12Imported Upstream version 1.0.1lupstream/1.0.1lkyungwook tak116-3775/+1793
Change-Id: I99680d38528c4117e59bb5377cc54820b22b93a2
2014-10-22Move openssl version from 1.0.1h to 1.0.1jtizen_3.0_ivi_releasesubmit/tizen_wearable/20150102.000000submit/tizen_tv/20151202.000000submit/tizen_mobile/20151202.000001submit/tizen_mobile/20141231.012840submit/tizen_ivi/20141225.333333submit/tizen/20141212.180557accepted/tizen/wearable/20150105.054719accepted/tizen/tv/20150105.022400accepted/tizen/mobile/20150105.022532accepted/tizen/ivi/20141231.083132accepted/tizen/common/20141216.093421tizen_3.0_ivitizen_3.0.2015.q1_commontizen_3.0.2014.q4_commonaccepted/tizen_iviaccepted/tizen_3.0_iviJanusz Kozerski1-1/+1
for CVE-2014-3513 CVE-2014-3567 CVE-2014-3566 (SSLv3 POODLE) CVE-2014-3568 fixes Change-Id: I7f10ab3e6459da4553c298c2ed26db0dc3623d0e Signed-off-by: Janusz Kozerski <j.kozerski@samsung.com>
2014-10-22Move openssl version from 1.0.1g to 1.0.1hsandbox/jkozerski/tizenJohn L. Whiteman2-1/+4
for CVE-2014-0224, CVE-2014-0221, CVE-2014-0195, CVE-2014-0198, CVE-2010-5298, CVE-2014-3470 fixes Change-Id: Ifa69d7a46f9a000d0ee8cf4da86e3e1d7113cfdc Signed-off-by: John L. Whiteman <john.l.whiteman@intel.com>
2014-10-22Move openssl version to 1.0.1g for CVE-2014-160 (Heartbleed)Michael Demeter2-1/+4
Change-Id: Ia8dc1aada13143a27be097574f985414b998159f Signed-off-by: Michael Demeter <michael.demeter@intel.com>
2014-10-22Move to OpenSSL 1.0.1e from 1.0.1c.Ryan Ware1-1/+1
2014-10-22resetting manifest requested domain to floorAlexandru Cornea2-0/+12
2014-10-22Fixed package groupsAnas Nashif2-3/+16
2014-10-22Fixed package groupAnas Nashif1-0/+3
2014-10-22Fixed package groupsAnas Nashif1-59/+4
2014-10-22enable md2Anas Nashif1-1/+1
2014-10-22do not run tests for nowAnas Nashif1-4/+3
2014-10-22remove patchesAnas Nashif7-1679/+6
2014-10-22enable md2Anas Nashif1-19/+2
2014-10-22add packagingAnas Nashif8-0/+2060
2014-10-22Imported Upstream version 1.0.1eRyan Ware3-5/+10
2014-10-20Prepare for 1.0.1j releaseupstream/1.0.1jsandbox/jkozerski/upstreamMatt Caswell4-6/+6
Reviewed-by: Stephen Henson <steve@openssl.org>
2014-10-20Updates to NEWSMatt Caswell1-1/+4
Reviewed-by: Dr Stephen Henson <steve@openssl.org>
2014-10-20Add updates to CHANGES fileMatt Caswell1-0/+33
Reviewed-by: Bodo Möller <bodo@openssl.org>
2014-10-20Fix no-ssl3 configuration optionGeoff Thorpe2-11/+16
CVE-2014-3568 Reviewed-by: Emilia Kasper <emilia@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org>
2014-10-20Fix for session tickets memory leak.Dr. Stephen Henson1-0/+3
CVE-2014-3567 Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (cherry picked from commit 5dc6070a03779cd524f0e67f76c945cb0ac38320)
2014-10-20Fix SRTP compile issues for windowsMatt Caswell4-5/+14
Related to CVE-2014-3513 This fix was developed by the OpenSSL Team Reviewed-by: Tim Hudson <tjh@openssl.org>
2014-10-20Fix for SRTP Memory LeakMatt Caswell2-66/+36
CVE-2014-3513 This issue was reported to OpenSSL on 26th September 2014, based on an origi issue and patch developed by the LibreSSL project. Further analysis of the i was performed by the OpenSSL team. The fix was developed by the OpenSSL team. Reviewed-by: Tim Hudson <tjh@openssl.org>
2014-10-20Fix SSL_R naming inconsistency.Bodo Moeller1-1/+1
Reviewed-by: Tim Hudson <tjh@openssl.org>
2014-10-20aesni-x86_64.pl: make ECB subroutine Windows ABI compliant.Andy Polyakov1-25/+27
RT: 3553 Reviewed-by: Emilia Kasper <emilia@openssl.org> (cherry picked from commit 69d5747f90136aa026a96204f26ab39549dfc69b)
2014-10-20Add constant_time_locl.h to HEADERS,Tim Hudson1-1/+2
so the Win32 compile picks it up correctly. Reviewed-by: Richard Levitte <levitte@openssl.org>
2014-10-20Add the constant time test to the VMS build and testsRichard Levitte2-2/+8
Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: test/maketests.com test/tests.com
2014-10-20Include "constant_time_locl.h" rather than "../constant_time_locl.h".Richard Levitte3-3/+3
The different -I compiler parameters will take care of the rest... Reviewed-by: Tim Hudson <tjh@openssl.org>
2014-10-20Spaces were added in some strings for better readability. However, those ↵Richard Levitte2-4/+4
spaces do not belong in file names, so when picking out the individual parts, remove the spaces Reviewed-by: Tim Hudson <tjh@openssl.org>
2014-10-20Adjust VMS build to Unix build. Most of all, make it so the disabledRichard Levitte5-31/+47
algorithms MD2 and RC5 don't get built. Also, disable building the test apps in crypto/des and crypto/pkcs7, as they have no support at all. Reviewed-by: Tim Hudson <tjh@openssl.org>
2014-10-20Make sure test/tests.com exit gracefully, even when openssl.exe wasn't ↵Richard Levitte1-0/+2
properly built. Reviewed-by: Tim Hudson <tjh@openssl.org>
2014-10-20Update the VMS build according to the latest unixly build. Partly provided ↵Richard Levitte3-3/+10
by Zoltan Arpadffy <arpadffy@polarhome.com> Reviewed-by: Tim Hudson <tjh@openssl.org>
2014-10-20Make sure that disabling the MAYLOSEDATA3 warning is only done when the ↵Richard Levitte4-11/+59
compiler supports it. Otherwise, there are warnings about it lacking everywhere, which is quite tedious to read through while trying to check for other warnings. Reviewed-by: Tim Hudson <tjh@openssl.org>
2014-10-20Support TLS_FALLBACK_SCSV.Bodo Moeller16-25/+140
Reviewed-by: Rich Salz <rsalz@openssl.org>
2014-10-20Preserve digests for SNI.Dr. Stephen Henson1-2/+13
SSL_set_SSL_CTX is normally called for SNI after ClientHello has received and the digest to use for each certificate has been decided. The original ssl->cert contains the negotiated digests and is now copied to the new ssl->cert. PR: 3560 Reviewed-by: Tim Hudson <tjh@openssl.org>
2014-10-20Removed duplicate definition of PKCS7_type_is_encryptedMatt Caswell1-4/+0
Patch supplied by Matthieu Patou <mat@matws.net>, and modified to also remove duplicate definition of PKCS7_type_is_digest. PR#3551 Reviewed-by: Rich Salz <rsalz@openssl.org> (cherry picked from commit e0fdea3e49e7454aa76bd5ecf3a3747641354c68)
2014-10-20Add additional DigestInfo checks.Dr. Stephen Henson2-2/+29
Reencode DigestInto in DER and check against the original: this will reject any improperly encoded DigestInfo structures. Note: this is a precautionary measure, there is no known attack which can exploit this. Thanks to Brian Smith for reporting this issue. Reviewed-by: Tim Hudson <tjh@openssl.org>
2014-10-20Add missing testsEmilia Kasper1-5/+7
Accidentally omitted from commit 455b65dfab0de51c9f67b3c909311770f2b3f801 Reviewed-by: Kurt Roeckx <kurt@openssl.org> (cherry picked from commit fdc35a9d3e8cf4cfd9330d5df9883f42cf5648ad)
2014-10-20Use correct function name: CMS_add1_signer()Dr. Stephen Henson1-7/+7
Reviewed-by: Matt Caswell <matt@openssl.org> (cherry picked from commit 5886354dcca4f8445ed35b6995a035b75409590c)
2014-10-20crypto/bn/bn_nist.c: work around MSC ARM compiler bug.Andy Polyakov1-3/+3
RT: 3541 Reviewed-by: Emilia Kasper <emilia@openssl.org> (cherry picked from commit 8b07c005fe006044d0e4a795421447deca3c9f2c)
2014-10-20RT3425: constant-time evp_encEmilia Kasper2-26/+32
Do the final padding check in EVP_DecryptFinal_ex in constant time to avoid a timing leak from padding failure. Reviewed-by: Rich Salz <rsalz@openssl.org> (cherry picked from commit 4aac102f75b517bdb56b1bcfd0a856052d559f6e) Conflicts: crypto/evp/evp_enc.c (cherry picked from commit 738911cde68b2b3706e502cf8daf5b14738f2f42)
2014-10-20RT3067: simplify patchEmilia Kasper4-74/+97
(Original commit adb46dbc6dd7347750df2468c93e8c34bcb93a4b) Use the new constant-time methods consistently in s3_srvr.c Reviewed-by: Kurt Roeckx <kurt@openssl.org> (cherry picked from commit 455b65dfab0de51c9f67b3c909311770f2b3f801)