Mark Andrews
beb5c413b5
Replace sparse switch with if-else
...
Style
Add warning comments on known sparce switches.
2004-02-01 23:56:19 +00:00
Mark Andrews
9e09ddba95
add sig0 comment
2003-09-30 06:18:11 +00:00
Mark Andrews
93d6dfaf66
1516. [func] Roll the DNSSEC types to RRSIG, NSEC and DNSKEY.
2003-09-30 06:00:40 +00:00
Mark Andrews
5eb91bd90e
silence compiler warnings (HPUX/11i)
2003-07-25 00:01:16 +00:00
Mark Andrews
cc6271e46c
1494. [security] Turn on RSA BLINDING as a precaution.
2003-07-24 06:08:20 +00:00
Mark Andrews
a9bdaa1772
engine pointer not set to NULL on free.
2003-02-18 06:25:11 +00:00
Mark Andrews
81aea2f2d3
undo wrong branch
2002-12-13 02:51:41 +00:00
Mark Andrews
0020640ff6
checkpoint
2002-12-13 02:37:35 +00:00
Michael Graff
972cbaa79e
merge rt3598 (code by marka, pullup by me)
2002-11-12 22:22:32 +00:00
Mark Andrews
2ffb3eb384
1395. [port] OpenSSL 0.9.7 defines CRYPTO_LOCK_ENGINE but doesn't
...
have a working implementation. [RT #4079 ]
2002-10-31 04:35:02 +00:00
Mark Andrews
9b7c023fe6
1218. [bug] The CINCLUDES macro in lib/dns/sec/dst/Makefile
...
could be left with a trailing "\" after configure
has been run.
2002-06-05 22:34:57 +00:00
Mark Andrews
f76c4ebaf5
1235. [func] Report 'out of memory' errors from openssl.
2002-03-19 04:30:57 +00:00
Brian Wellington
9e6286de2a
add dst_key_privatefrombuffer(), which coverts a public key into a private
...
key.
2002-02-27 22:12:06 +00:00
Mark Andrews
a7038d1a05
copyrights
2002-02-20 03:35:59 +00:00
Mark Andrews
c46f10e4a1
Use as_textregion.base not as_pointer. [RT #2385 ]
2002-01-21 01:07:32 +00:00
Brian Wellington
3a8d4a316e
openssl 0.9.6a and higher don't have the RSA locking bug that earlier versions
...
did, so don't disable precomputation. Note that while this was fixed for
RSA, other algorithms still don't do locking when performing precomputation,
and thus we still disable it.
2002-01-15 22:09:45 +00:00
Brian Wellington
0118965e19
fix large DH key generation, hopefully for the last time.
2001-12-18 06:05:41 +00:00
Brian Wellington
1898837a5e
Add the well-known 1536 bit prime from draft-ietf-dnsext-rfc2539bis-dhk-01.txt
2001-12-12 17:18:52 +00:00
Brian Wellington
9af8851b85
whitespace style
2001-12-12 17:09:39 +00:00
Brian Wellington
0cb27602e5
1160. [bug] Generating Diffie-Hellman keys longer than 1024
...
bits could fail. [RT #2241 ]
2001-12-12 16:43:24 +00:00
Brian Wellington
b7415ddd79
let isc_lex_destroy() close sources.
2001-11-30 18:26:46 +00:00
Brian Wellington
2e4bec457d
Before signing with a key, make sure that it's not the public-only part.
...
A sane crypto toolkit would catch this and return an error, but openssl
unceremoniously seg faults.
2001-11-30 02:11:04 +00:00
Andreas Gustafsson
1f1d36a87b
Check return values or cast them to (void), as required by the coding
...
standards; add exceptions to the coding standards for cases where this is
not desirable
2001-11-30 01:59:49 +00:00
Brian Wellington
3638017bd3
1143. [bug] When a trusted-keys statement was present and named
...
was built without crypto support, it would leak memory.
2001-11-28 02:35:02 +00:00
Andreas Gustafsson
91cd0f93ad
sizeof style
2001-11-27 01:56:32 +00:00
Andreas Gustafsson
4f30395c97
Suppress compiler warnings about empty translation units
2001-11-20 21:28:41 +00:00
Danny Mayer
e61793f086
Added LIB*_EXTERNAL_DATA Macros necessary to make lib extern variables globally visible in Win32
2001-11-19 03:08:44 +00:00
Brian Wellington
bcf53cf8d0
Move the memory allocation wrappers into openssl_link.c, since they're
...
openssl specific.
2001-11-07 23:03:54 +00:00
Brian Wellington
51e66e5dee
missing static
2001-11-06 23:10:34 +00:00
Brian Wellington
88d64279bb
if the function table entry already exists when _init() is called, don't
...
overwrite it.
2001-11-06 22:51:00 +00:00
Brian Wellington
f368466f81
Creating a NULL KEY shouldn't trigger a "no crypto" error.
2001-11-06 22:27:52 +00:00
Brian Wellington
ba45e16a66
Clean up the implementation cleanup mechanism. Also remove ->issymmetric,
...
since it's easier to just do it in dst_api.c.
2001-11-06 20:47:59 +00:00
Brian Wellington
2f93757751
Rework the "no crypto support" test. Rather than explicitly checking whether
...
built without openssl, instead return NOCRYPTO if the algorithm is not
supported but known.
2001-11-06 18:08:07 +00:00
Brian Wellington
3bc4de1f1b
memory leaks on errors
2001-11-06 17:59:50 +00:00
Brian Wellington
7b5bf4bea4
a key could be freed twice in an unlikely error case.
2001-11-06 03:02:48 +00:00
Mark Andrews
c2bc56dc65
Move configuration checking to libbind9.
2001-09-20 15:17:07 +00:00
Brian Wellington
4fb42a8382
unused #defines
2001-09-15 00:27:26 +00:00
Brian Wellington
36e37042c6
997. [func] Add support for RSA-SHA1 keys.
2001-09-15 00:01:58 +00:00
Mark Andrews
28fc90e6c8
#857 was incomplete, ISC_MAGIC was not being used everwhere it should have been.
...
'magic' was not being declared consistantly.
some #include <isc/magic.h> were missing from other include files.
NS_SERVER_VALID was not using ISC_MAGIC_VALID.
2001-08-28 03:58:29 +00:00
Mark Andrews
43e2ec89d8
redundate #include
2001-07-31 03:45:04 +00:00
Brian Wellington
3fcf6b956f
925. [cleanup] Remove openssl from the distribution; require that
...
--with-openssl be specified if DNSSEC is needed.
2001-07-10 21:40:10 +00:00
Brian Wellington
6614bac268
oops, don't return an isc_boolean_t as an isc_result_t.
2001-07-10 21:27:59 +00:00
Brian Wellington
5939aa7265
wording
2001-07-10 19:08:28 +00:00
Brian Wellington
3b31ce9da9
functions can now return DST_R_NOCRYPTO
2001-07-10 19:05:53 +00:00
Brian Wellington
28e2058c5f
macro style
2001-07-10 05:12:43 +00:00
Brian Wellington
9622173ccb
only create a memory pool if OPENSSL is defined.
2001-07-10 05:00:42 +00:00
Brian Wellington
4f0187f10c
DST_R_NOCRYPTO
2001-07-10 04:34:36 +00:00
Brian Wellington
024550401d
#if defined(OPENSSL) ==> #ifdef OPENSSL
...
remove unused #include <openssl/rand.h>
2001-07-10 04:01:19 +00:00
Brian Wellington
f215881bb0
removed unnecessary const [RT #1440 ]
2001-06-27 04:21:18 +00:00
David Lawrence
11c4f6b687
Reversed the sense of my earlier change to hmacmd5 key generation that
...
required good entropy only when 'param' (to dst_key_generate) was non-zero.
Since the default was always to require good entropy, that default behavior
has been restored and now a non-zero param means that pseudorandom is ok.
2001-05-31 18:34:51 +00:00