Skip to content
  1. Apr 24, 2014
  2. Apr 22, 2014
  3. Apr 15, 2014
  4. Apr 09, 2014
  5. Apr 07, 2014
    • Dr. Stephen Henson's avatar
      Return if ssleay_rand_add called with zero num. · f74fa33b
      Dr. Stephen Henson authored
      Treat a zero length passed to ssleay_rand_add a no op: the existing logic
      zeroes the md value which is very bad. OpenSSL itself never does this
      internally and the actual call doesn't make sense as it would be passing
      zero bytes of entropy.
      
      Thanks to Marcus Meissner <meissner@suse.de> for reporting this bug.
      (cherry picked from commit 5be1ae28)
      f74fa33b
  6. Apr 06, 2014
  7. Apr 02, 2014
    • Eric Young's avatar
      Fix base64 decoding bug. · 10378fb5
      Eric Young authored
      A short PEM encoded sequence if passed to the BIO, and the file
      had 2 \n following would fail.
      
      PR#3289
      10378fb5
  8. Apr 01, 2014
  9. Mar 28, 2014
  10. Mar 19, 2014
  11. Mar 12, 2014
    • Dr. Stephen Henson's avatar
      Fix for CVE-2014-0076 · f9b6c0ba
      Dr. Stephen Henson authored
      Fix for the attack described in the paper "Recovering OpenSSL
      ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack"
      by Yuval Yarom and Naomi Benger. Details can be obtained from:
      http://eprint.iacr.org/2014/140
      
      Thanks to Yuval Yarom and Naomi Benger for discovering this
      flaw and to Yuval Yarom for supplying a fix.
      (cherry picked from commit 2198be3483259de374f91e57d247d0fc667aef29)
      
      Conflicts:
      
      	CHANGES
      f9b6c0ba
  12. Mar 07, 2014
    • Andy Polyakov's avatar
      SPARC T4 assembly pack: treat zero input length in CBC. · 5e44c144
      Andy Polyakov authored
      The problem is that OpenSSH calls EVP_Cipher, which is not as
      protective as EVP_CipherUpdate. Formally speaking we ought to
      do more checks in *_cipher methods, including rejecting
      lengths not divisible by block size (unless ciphertext stealing
      is in place). But for now I implement check for zero length in
      low-level based on precedent.
      
      PR: 3087, 2775
      5e44c144
  13. Mar 06, 2014
  14. Mar 03, 2014
  15. Mar 01, 2014
    • Dr. Stephen Henson's avatar
      PKCS#8 support for alternative PRFs. · 5693a308
      Dr. Stephen Henson authored
      Add option to set an alternative to the default hmacWithSHA1 PRF
      for PKCS#8 private key encryptions. This is used automatically
      by PKCS8_encrypt if the nid specified is a PRF.
      
      Add option to pkcs8 utility.
      
      Update docs.
      (cherry picked from commit b60272b0)
      5693a308
    • Dr. Stephen Henson's avatar
      Fix memory leak. · 01757858
      Dr. Stephen Henson authored
      (cherry picked from commit 124d218889dfca33d277404612f1319afe04107e)
      01757858
  16. Feb 27, 2014
  17. Feb 26, 2014
  18. Feb 25, 2014
  19. Feb 24, 2014
  20. Feb 21, 2014
  21. Feb 20, 2014
  22. Feb 19, 2014
  23. Feb 18, 2014