1
0
mirror of https://git.FreeBSD.org/ports.git synced 2025-02-06 11:41:52 +00:00
Dirk Meyer cd87949d28 - Update to 0.9.6c
- more manpages
- shift FORBIDDEN

 Excerpt of Changes between 0.9.6b and 0.9.6c  [21 dec 2001]
  *) Fix BN_rand_range bug pointed out by Dominikus Scherkl
  *) Only add signing time to PKCS7 structures if it is not already present.
  *) Fix crypto/objects/objects.h: "ld-ce" should be "id-ce", OBJ_ld_ce
     should be OBJ_id_ce.  Also some ip-pda OIDs in crypto/objects/objects.txt
     were incorrect (cf. RFC 3039).
  *) Release CRYPTO_LOCK_DYNLOCK when CRYPTO_destroy_dynlockid()
     returns early because it has nothing to do.
  *) Fix mutex callback return values in crypto/engine/hw_ncipher.c.
  *) Change ssl/s2_clnt.c and ssl/s2_srvr.c so that received handshake
     messages are stored in a single piece (fixed-length part and
     variable-length part combined) and fix various bugs found on the way.
  *) Disable caching in BIO_gethostbyname(), directly use gethostbyname()
     instead.  BIO_gethostbyname() does not know what timeouts are
     appropriate, so entries would stay in cache even when they have
     become invalid.
  *) Change ssl23_get_client_hello (ssl/s23_srvr.c) behaviour when
     faced with a pathologically small ClientHello fragment that does
     not contain client_version: Instead of aborting with an error,
     simply choose the highest available protocol version (i.e.,
     TLS 1.0 unless it is disabled).
  *) Fix SSL handshake functions and SSL_clear() such that SSL_clear()
     never resets s->method to s->ctx->method when called from within
     one of the SSL handshake functions.
  *) In ssl3_get_client_hello (ssl/s3_srvr.c), generate a fatal alert
     (sent using the client's version number) if client_version is
     smaller than the protocol version in use.  Also change
     ssl23_get_client_hello (ssl/s23_srvr.c) to select TLS 1.0 if
     the client demanded SSL 3.0 but only TLS 1.0 is enabled; then
     the client will at least see that alert.
  *) Fix ssl3_get_message (ssl/s3_both.c) to handle message fragmentation
     correctly.
  *) Avoid infinite loop in ssl3_get_message (ssl/s3_both.c) if a
     client receives HelloRequest while in a handshake.
  *) Bugfix in ssl3_accept (ssl/s3_srvr.c): Case SSL3_ST_SW_HELLO_REQ_C
     should end in 'break', not 'goto end' which circuments various
     cleanups done in state SSL_ST_OK.   But session related stuff
     must be disabled for SSL_ST_OK in the case that we just sent a
     HelloRequest.  Also avoid some overhead by not calling
     ssl_init_wbio_buffer() before just sending a HelloRequest.
  *) Fix ssl/s3_enc.c, ssl/t1_enc.c and ssl/s3_pkt.c so that we don't
     reveal whether illegal block cipher padding was found or a MAC
     verification error occured.  (Neither SSLerr() codes nor alerts
     are directly visible to potential attackers, but the information
     may leak via logfiles.) ssl/s2_pkt.c failed to verify that the
     purported number of padding bytes is in the legal range.
  *) Improve RSA_padding_check_PKCS1_OAEP() check again to avoid
     'wristwatch attack' using huge encoding parameters (cf.
     James H. Manger's CRYPTO 2001 paper).  Note that the
     RSA_PKCS1_OAEP_PADDING case of RSA_private_decrypt() does not use
     encoding parameters and hence was not vulnerable.
  *) BN_sqr() bug fix.
  *) Rabin-Miller test analyses assume uniformly distributed witnesses,
     so use BN_pseudo_rand_range() instead of using BN_pseudo_rand()
     followed by modular reduction.
  *) Add BN_pseudo_rand_range() with obvious functionality: BN_rand_range()
     equivalent based on BN_pseudo_rand() instead of BN_rand().
  *) s3_srvr.c: allow sending of large client certificate lists (> 16 kB).
     This function was broken, as the check for a new client hello message
     to handle SGC did not allow these large messages.
  *) Add alert descriptions for TLSv1 to SSL_alert_desc_string[_long]().
  *) Fix buggy behaviour of BIO_get_num_renegotiates() and BIO_ctrl()
     for BIO_C_GET_WRITE_BUF_SIZE ("Stephen Hinton" <shinton@netopia.com>).
  *) In ssl3_get_key_exchange (ssl/s3_clnt.c), call ssl3_get_message()
     with the same message size as in ssl3_get_certificate_request().
     Otherwise, if no ServerKeyExchange message occurs, CertificateRequest
     messages might inadvertently be reject as too long.
  *) Modified SSL library such that the verify_callback that has been set
     specificly for an SSL object with SSL_set_verify() is actually being
     used. Before the change, a verify_callback set with this function was
     ignored and the verify_callback() set in the SSL_CTX at the time of
     the call was used. New function X509_STORE_CTX_set_verify_cb() introduced
     to allow the necessary settings.
  *) In OpenSSL 0.9.6a and 0.9.6b, crypto/dh/dh_key.c ignored
     dh->length and always used
          BN_rand_range(priv_key, dh->p).
     So switch back to
          BN_rand(priv_key, l, ...)
     where 'l' is dh->length if this is defined, or BN_num_bits(dh->p)-1
     otherwise.
  *) In RSA_eay_public_encrypt, RSA_eay_private_decrypt, RSA_eay_private_encrypt
     RSA_eay_public_decrypt always reject numbers >= n.
  *) In crypto/rand/md_rand.c, use a new short-time lock CRYPTO_LOCK_RAND2
     to synchronize access to 'locking_thread'.
  *) In crypto/rand/md_rand.c, set 'locking_thread' to current thread's ID
     *before* setting the 'crypto_lock_rand' flag.  The previous code had
     a race condition if 0 is a valid thread ID.
2002-04-21 13:02:08 +00:00
..
2002-02-13 20:45:43 +00:00
2002-01-17 22:40:04 +00:00
2001-10-21 18:47:20 +00:00
2001-08-11 14:08:00 +00:00
2001-09-16 15:12:19 +00:00
2001-06-14 05:42:15 +00:00
2002-02-16 05:32:08 +00:00
2002-04-10 05:20:58 +00:00
2001-06-10 11:30:06 +00:00
2001-10-09 09:30:34 +00:00
2001-10-09 09:30:34 +00:00
2002-02-07 01:13:35 +00:00
2001-10-29 21:56:08 +00:00
2001-12-25 16:59:04 +00:00
2002-02-01 04:06:34 +00:00
2001-07-06 09:52:36 +00:00
2001-09-11 08:13:02 +00:00
2001-10-20 14:32:35 +00:00
2002-01-04 07:13:24 +00:00
2002-01-04 23:01:38 +00:00
2001-10-07 02:03:45 +00:00
2002-01-28 05:21:34 +00:00
2002-01-22 14:34:16 +00:00
2002-01-22 14:34:16 +00:00
2002-03-31 06:42:30 +00:00
2002-02-28 21:51:03 +00:00
2001-09-17 05:50:42 +00:00
2002-03-30 05:18:23 +00:00
2002-02-24 12:35:05 +00:00
2002-04-03 21:11:50 +00:00
2002-03-10 16:00:57 +00:00
2002-03-10 04:25:12 +00:00
2002-04-12 17:10:20 +00:00
2002-01-15 03:04:08 +00:00
2002-03-03 06:51:45 +00:00
2002-03-27 06:13:27 +00:00
2002-02-20 11:03:42 +00:00
2001-07-06 11:42:16 +00:00
2001-10-05 20:53:44 +00:00
2002-04-18 08:20:50 +00:00
2002-04-18 08:20:50 +00:00
2002-04-02 19:49:58 +00:00
2002-03-15 13:13:12 +00:00
2002-04-01 02:10:44 +00:00
2002-01-17 23:13:38 +00:00
2001-06-10 11:30:06 +00:00
2002-04-21 13:02:08 +00:00
2002-04-21 13:02:08 +00:00
2001-12-25 16:59:04 +00:00
2001-05-10 01:20:55 +00:00
2002-03-14 14:58:35 +00:00
2001-08-31 13:34:40 +00:00
2001-11-30 07:20:53 +00:00
2002-02-20 02:47:14 +00:00
2001-12-25 09:04:30 +00:00
2001-12-11 08:58:11 +00:00
2001-10-03 03:31:08 +00:00
2002-02-19 02:01:27 +00:00
2001-12-13 10:17:13 +00:00
2002-03-29 06:05:40 +00:00
2002-04-04 17:47:33 +00:00
2002-03-07 18:03:02 +00:00
2001-07-24 17:14:44 +00:00
2002-02-21 15:13:16 +00:00
2001-12-08 20:55:27 +00:00
2001-08-21 18:37:14 +00:00
2002-04-19 22:23:32 +00:00
2002-01-17 21:18:22 +00:00
2002-03-16 10:14:44 +00:00
2002-01-18 13:07:09 +00:00
2002-01-12 16:57:26 +00:00
2002-02-10 19:29:58 +00:00
2002-02-11 14:54:44 +00:00
2002-02-11 14:20:24 +00:00
2002-01-15 14:51:09 +00:00
2002-02-09 12:56:58 +00:00
2001-12-17 10:25:54 +00:00
2001-12-17 10:25:54 +00:00
2001-12-17 21:01:06 +00:00
2001-10-14 09:28:18 +00:00
2002-01-26 11:30:27 +00:00
2002-02-06 22:03:26 +00:00
2002-03-20 11:16:07 +00:00
2001-11-23 04:47:03 +00:00
2001-05-22 16:32:57 +00:00
2001-12-30 06:59:19 +00:00
2002-02-16 02:49:42 +00:00
2001-11-04 14:54:36 +00:00
2001-11-30 23:11:51 +00:00
2002-03-16 14:33:39 +00:00
2002-01-24 05:01:26 +00:00
2001-05-25 09:53:59 +00:00
2001-11-13 22:39:27 +00:00
2001-06-19 04:09:12 +00:00
2002-04-06 20:30:01 +00:00
2002-04-17 17:44:11 +00:00
2002-02-08 08:12:24 +00:00