Commit graph

121 commits

Author SHA1 Message Date
Evan Hunt
b058c0fefb [v9_10] update 9.11 api range 2018-01-24 10:24:34 -08:00
Evan Hunt
f0c125a2c8 [v9_10] update api ranges 2017-07-16 13:57:29 -07:00
Evan Hunt
2437eaa744 [v9_10] fix API ranges (170-179 was used for two branches) 2017-06-27 12:22:11 -07:00
Mark Andrews
28c8b282dd 4585. [port] win32: Set CompileAS value. [RT #42474]
(cherry picked from commit 3742338a7b)
2017-04-20 12:43:17 +10:00
Mark Andrews
a71d773a3d api numbers clashed between 9.10 and 9.11; record ranges; account for -P's 2017-02-16 11:52:20 +11:00
Mark Andrews
a873ad10bd copyrights/whitespace 2016-11-03 12:47:03 +11:00
Evan Hunt
398f8c32f3 [v9_10] make uninstall
4503.	[cleanup]	"make uninstall" now removes file installed by
			BIND. (This currently excludes Python files
			due to lack of support in setup.py.) [RT #42912]

(cherry picked from commit 6087f87afb)
2016-11-01 19:35:44 -07:00
Mark Andrews
decd3bb79c copyright/whitespace 2016-11-02 10:43:07 +11:00
Evan Hunt
a2575e2796 [v9_10] system tests on windows
4487. [test] Make system tests work on Windows. [RT #42931]
2016-11-01 09:50:09 -07:00
Mark Andrews
69f9ca5830 4461. [bug] win32: not all external data was properly marked
as external data for windows dll. [RT #43161]
2016-09-07 14:43:14 +10:00
Mark Andrews
e0449a0a4a 4450. [port] Provide more nuanced HSM support which better matches
the specific PKCS11 providers capabilities. [RT #42458]

(cherry picked from commit 8ee6f289d8)
2016-08-19 08:25:54 +10:00
Mark Andrews
544bde5212 4354. [bug] Check that the received HMAC length matches the
expected length prior to check the contents on the
                        control channel.  This prevents a OOB read error.
                        [RT #42215]

(cherry picked from commit 402c63495c)
2016-05-05 14:22:43 +10:00
Mark Andrews
274ea210b0 sync w/ 9.10.3-P4 2016-03-08 11:34:15 +11:00
Tinderbox User
160c8ad89d update copyright notice / whitespace 2016-02-18 23:45:59 +00:00
Mark Andrews
e7e15d1302 4318. [security] Malformed control messages can trigger assertions
in named and rndc. (CVE-2016-1285) [RT #41666]

(cherry picked from commit a2b15b3305)
2016-02-18 12:12:02 +11:00
Evan Hunt
83289a39b0 [v9_10] removed /Gy- from VS project files
4302.	[port]		win32: fixed a build error in VS 2015. [RT #41426]
2016-01-27 15:29:53 -08:00
Francis Dupont
def7e9796f Updated WIN32 files (rt40877) bis 2016-01-04 18:55:57 +01:00
Tinderbox User
a68111c6f9 update copyright notice / whitespace 2015-11-09 23:45:50 +00:00
Evan Hunt
fbf5b36b69 [v9_10] fix python script versions
4257.	[cleanup]	Python scripts reported incorrect version. [RT #41080]
2015-11-08 21:36:27 -08:00
Mark Andrews
36d6fb03c7 Introduce end-of-line normalization 2015-09-29 08:26:56 +10:00
Evan Hunt
918a74ff08 [v9_10] incorrect result code in isccc
4202.	[bug]		isccc_cc_fromwire() could return an incorrect
			result. [RT #40614]
2015-09-11 00:05:34 -07:00
Mark Andrews
0d9fcd6afe *.vcxproj.in should use CRLF as EOL 2015-08-27 21:59:45 +00:00
Evan Hunt
42a6343cbf [v9_10] prep 9.10.3rc1 2015-08-25 11:20:47 -07:00
Evan Hunt
cd6122b164 [v9_10] timing safe memory comparisons
4183.	[cleanup]	Use timing-safe memory comparisons in cryptographic
			code. Also, the timing-safe comparison functions have
			been renamed to avoid possible confusion with
			memcmp(). [RT #40148]

(cherry picked from commit 420a43c8d8)
2015-08-17 18:28:27 -07:00
Mukund Sivaraman
8ddb21cd82 Bump api versions 2015-07-31 12:33:36 +05:30
Tinderbox User
83a64013b1 update copyright notice / whitespace 2015-05-23 23:46:59 +00:00
Francis Dupont
1db36edf82 added print.h includes 2015-05-23 14:46:47 +02:00
Tinderbox User
4c15022601 update copyright notice / whitespace 2015-04-17 23:45:52 +00:00
Evan Hunt
0fdcf394cb [v9_10] misc x64 VS 2015 CTP fixes [#39308]
(cherry picked from commit ab973ec40c)
2015-04-17 15:32:05 -07:00
Tinderbox User
2fa25cdb19 update copyright notice / whitespace 2015-03-23 23:45:47 +00:00
Mark Andrews
0a8db1048c @ISC_OPENSSL_INC@ needs to not be by itself
(cherry picked from commit a5885354413d503105521b7bf4cd603927f81814)
2015-03-24 07:54:45 +11:00
Evan Hunt
582bd9d5a4 [v9_10] fixed build errors with libressl
4088.	[port]		Fixed errors when building with libressl. [RT #38899]
2015-03-23 13:35:26 -05:00
Tinderbox User
0253b39064 update copyright notice 2014-09-05 23:45:59 +00:00
Evan Hunt
aa430f55f4 [v9_10] [rt36786] use INSTALL_PROGRAM for shared libs
3947.	[cleanup]	Set the executable bit on libraries when using
			libtool. [RT #36786]

(cherry picked from commit f687e639f0)
2014-09-05 10:24:54 -07:00
Mark Andrews
2729aea3c1 3738. [bug] --enable-openssl-hash failed to build. [RT #35343] 2014-02-13 15:09:08 +11:00
Evan Hunt
dbb012765c [master] merge libiscpk11 to libisc
3735.	[cleanup]	Merged the libiscpk11 library into libisc
			to simplify dependencies. [RT #35205]
2014-02-11 21:20:28 -08:00
Evan Hunt
0a35160f4e [master] prep 9.10.0a2 2014-01-30 18:02:26 -08:00
Evan Hunt
ba751492fc [master] native PKCS#11 support
3705.	[func]		"configure --enable-native-pkcs11" enables BIND
			to use the PKCS#11 API for all cryptographic
			functions, so that it can drive a hardware service
			module directly without the need to use a modified
			OpenSSL as intermediary (so long as the HSM's vendor
			provides a complete-enough implementation of the
			PKCS#11 interface). This has been tested successfully
			with the Thales nShield HSM and with SoftHSMv2 from
			the OpenDNSSEC project. [RT #29031]
2014-01-14 15:40:56 -08:00
Tinderbox User
431a83fb29 update copyright notice 2014-01-09 23:46:35 +00:00
Evan Hunt
e851ea8260 [master] replace memcpy() with memmove().
3698.	[cleanup]	Replaced all uses of memcpy() with memmove().
			[RT #35120]
2014-01-08 16:39:05 -08:00
Mark Andrews
2bdfb330af update copyrights 2013-12-05 15:04:53 +11:00
Mark Andrews
c3c8823fed 3681. [port] Update the Windows build system to support feature
selection and WIN64 builds.  This is a work in
                        progress. [RT #34160]
2013-12-04 12:47:23 +11:00
Evan Hunt
09755f7270 [master] prep 9.10.0a1 release 2013-09-04 15:41:50 -07:00
Evan Hunt
5b7abbef51 [master] added isc_safe_memcmp()
3611.	[bug]		Improved resistance to a theoretical authentication
			attack based on differential timing.  [RT #33939]
2013-07-09 11:47:16 -07:00
Tinderbox User
cfa2326b5c update copyright notice 2013-03-14 23:46:11 +00:00
Evan Hunt
4eb998928b [master] algorithm flexibility for rndc
3525.	[func]		Support for additional signing algorithms in rndc:
			hmac-sha1, -sha224, -sha256, -sha384, and -sha512.
			The -A option to rndc-confgen can be used to
			select the algorithm for the generated key.
			(The default is still hmac-md5; this may
			change in a future release.) [RT #20363]
2013-03-13 17:53:11 -07:00
Mark Andrews
611dc88768 3390. [bug] Silence clang compiler warnings. [RT #30417] 2012-10-06 14:20:45 +10:00
Evan Hunt
41bbb34bc2 fix coverity issues
3388.	[bug]		Fixed several Coverity warnings. [RT #30996]
2012-10-02 23:44:03 -07:00
Tinderbox User
a3128c1995 update copyright notice 2012-06-29 23:45:57 +00:00
Mark Andrews
bf8267aa45 reverse bad copyright update 2012-06-29 11:39:47 +10:00