aboutsummaryrefslogtreecommitdiffstats
path: root/crypto/cms/cms_smime.c
Commit message (Collapse)AuthorAgeFilesLines
* Continue standardising malloc style for libcryptoMatt Caswell2015-11-091-3/+3
| | | | | | | Continuing from previous commit ensure our style is consistent for malloc return checks. Reviewed-by: Kurt Roeckx <kurt@openssl.org>
* Err isn't always malloc failure.Dr. Stephen Henson2015-08-121-1/+1
| | | | Reviewed-by: Matt Caswell <matt@openssl.org>
* RT3917: add cleanup on an error pathRich Salz2015-06-211-1/+2
| | | | Reviewed-by: Richard Levitte <levitte@openssl.org>
* Identify and move common internal libcrypto header filesRichard Levitte2015-05-141-1/+1
| | | | | | | | | | | | | There are header files in crypto/ that are used by a number of crypto/ submodules. Move those to crypto/include/internal and adapt the affected source code and Makefiles. The header files that got moved are: crypto/cryptolib.h crypto/md32_common.h Reviewed-by: Rich Salz <rsalz@openssl.org>
* Use p==NULL not !p (in if statements, mainly)Rich Salz2015-05-111-1/+2
| | | | Reviewed-by: Tim Hudson <tjh@openssl.org>
* free NULL cleanup -- codaRich Salz2015-05-011-4/+2
| | | | | | | | After the finale, the "real" final part. :) Do a recursive grep with "-B1 -w [a-zA-Z0-9_]*_free" to see if any of the preceeding lines are an "if NULL" check that can be removed. Reviewed-by: Tim Hudson <tjh@openssl.org>
* free NULL cleanup 5aRich Salz2015-04-301-4/+2
| | | | | | | | | Don't check for NULL before calling a free routine. This gets X509_.*free: x509_name_ex_free X509_policy_tree_free X509_VERIFY_PARAM_free X509_STORE_free X509_STORE_CTX_free X509_PKEY_free X509_OBJECT_free_contents X509_LOOKUP_free X509_INFO_free Reviewed-by: Richard Levitte <levitte@openssl.org>
* free NULL cleanupRich Salz2015-03-251-5/+3
| | | | | | | This commit handles BIO_ACCEPT_free BIO_CB_FREE BIO_CONNECT_free BIO_free BIO_free_all BIO_vfree Reviewed-by: Matt Caswell <matt@openssl.org>
* Move some ASN.1 internals to asn1_int.hDr. Stephen Henson2015-03-241-1/+1
| | | | | | | | Move ASN.1 internals used across multiple directories into new internal header file asn1_int.h remove crypto/Makefile hack which allowed other directories to include "asn1_locl.h" Reviewed-by: Matt Caswell <matt@openssl.org>
* Run util/openssl-format-source -v -c .Matt Caswell2015-01-221-827/+764
| | | | Reviewed-by: Tim Hudson <tjh@openssl.org>
* Return an error if no recipient type matches.Dr. Stephen Henson2014-05-091-2/+3
| | | | | | | | If the key type does not match any CMS recipient type return an error instead of using a random key (MMA mitigation). This does not leak any useful information to an attacker. PR#3348
* Add suppot for ASCII with CRLF canonicalisation.Dr. Stephen Henson2014-02-131-0/+8
|
* Canonicalise input in CMS_verify.Dr. Stephen Henson2013-12-221-21/+73
| | | | | | If content is detached and not binary mode translate the input to CRLF format. Before this change the input was verified verbatim which lead to a discrepancy between sign and verify.
* CMS support for key agreeement recipient info.Dr. Stephen Henson2013-07-171-3/+45
| | | | | Add hooks to support key agreement recipient info type (KARI) using algorithm specific code in the relevant public key ASN1 method.
* Fix for CMS/PKCS7 MMA. If RSA decryption fails use a random key andDr. Stephen Henson2012-03-121-4/+33
| | | | | | | | continue with symmetric decryption process to avoid leaking timing information to an attacker. Thanks to Ivan Nestlerode <inestlerode@us.ibm.com> for discovering this issue. (CVE-2012-0884)
* Add new type ossl_ssize_t instead of ssize_t and move definitions toDr. Stephen Henson2010-07-261-1/+1
| | | | | e_os2.h, this should fix WIN32 compilation issues and hopefully avoid conflicts with other headers which may workaround ssize_t in different ways.
* Experimental CMS password based recipient Info support.Dr. Stephen Henson2009-11-261-0/+24
|
* Update from stable branch.Dr. Stephen Henson2009-03-251-1/+1
|
* Use correct ctx name.Dr. Stephen Henson2009-03-151-1/+1
|
* Fix from stable branch.Dr. Stephen Henson2009-03-151-1/+1
|
* Set memory BIOs up properly when stripping text headers from S/MIME messages.Dr. Stephen Henson2008-11-211-0/+3
|
* Correctly handle errors in CMS I/O code.Dr. Stephen Henson2008-08-051-2/+4
|
* Make certs argument work in CMS_sign() add test case.Dr. Stephen Henson2008-04-181-4/+4
| | | | PR:1664
* Fix prototype for CMS_decrypt(), don't free up detached content.Dr. Stephen Henson2008-04-111-7/+25
|
* Revert argument swap change... oops CMS_uncompress() was consistent...Dr. Stephen Henson2008-04-111-1/+1
|
* Make CMS_uncompress() argument order consistent with other functions.Dr. Stephen Henson2008-04-111-1/+1
|
* Fix for compression and updated CMS_final().Dr. Stephen Henson2008-04-111-1/+1
|
* Add additional parameter to CMS_final() to handle detached content.Dr. Stephen Henson2008-04-101-8/+11
|
* Ignore nonsensical flags for signed receipts.Dr. Stephen Henson2008-04-101-1/+2
|
* Implement CMS_NOCRL.Dr. Stephen Henson2008-04-071-1/+2
|
* Signed receipt generation code.Dr. Stephen Henson2008-03-281-0/+72
|
* Support for verification of signed receipts.Dr. Stephen Henson2008-03-281-8/+20
|
* Add support for KEK decrypt in cms utility.Dr. Stephen Henson2008-03-191-33/+78
|
* Various tidies/fixes:Dr. Stephen Henson2008-03-181-4/+5
| | | | | | | | Make streaming support in cms cleaner. Note errors in various S/MIME functions if CMS_final() fails. Add streaming support for enveloped data.
* More support for KEK RecipientInfo.Dr. Stephen Henson2008-03-181-20/+27
| | | | | Generalise RecipientInfo and enveloped data handling so applications can add their own key lookup routines as well as using the standard ones.
* Preliminary support for enveloped data content type creation.Dr. Stephen Henson2008-03-171-11/+38
| | | | | Fix signed data creation so versions are only corrected if structure is being created.
* Initial support for enveloped data decrypt. Extent runex.pl to cover theseDr. Stephen Henson2008-03-151-40/+62
| | | | examples. All RFC4134 examples can not be processed.
* Check for cipher BIO errors and set key length after parameter decode.Dr. Stephen Henson2008-03-151-1/+9
|
* Return error if no cipher set for encrypted data type.Dr. Stephen Henson2008-03-151-0/+5
| | | | Update CHANGES.
* Reorganise encrypted content info code to avoid duplication and be moreDr. Stephen Henson2008-03-141-3/+24
| | | | consistent with other content types.
* Encrypted Data type processing. Add options to cms utility and run section 7Dr. Stephen Henson2008-03-141-0/+34
| | | | tests in RFC4134.
* And so it begins...Dr. Stephen Henson2008-03-121-0/+515
Initial support for CMS. Add zlib compression BIO. Add AES key wrap implementation. Generalize S/MIME MIME code to support CMS and/or PKCS7.