1. 29 Jun, 2016 1 commit
  2. 27 Jun, 2016 1 commit
  3. 26 Jun, 2016 2 commits
  4. 25 Jun, 2016 1 commit
  5. 24 Jun, 2016 1 commit
  6. 23 Jun, 2016 1 commit
  7. 22 Jun, 2016 1 commit
  8. 21 Jun, 2016 1 commit
  9. 20 Jun, 2016 5 commits
  10. 16 Jun, 2016 3 commits
  11. 15 Jun, 2016 1 commit
  12. 14 Jun, 2016 6 commits
  13. 13 Jun, 2016 2 commits
  14. 12 Jun, 2016 5 commits
  15. 10 Jun, 2016 3 commits
  16. 07 Jun, 2016 3 commits
  17. 06 Jun, 2016 1 commit
    • Cesar Pereida's avatar
      Fix DSA, preserve BN_FLG_CONSTTIME · 621eaf49
      Cesar Pereida authored
      
      
      Operations in the DSA signing algorithm should run in constant time in
      order to avoid side channel attacks. A flaw in the OpenSSL DSA
      implementation means that a non-constant time codepath is followed for
      certain operations. This has been demonstrated through a cache-timing
      attack to be sufficient for an attacker to recover the private DSA key.
      
      CVE-2016-2178
      
      Reviewed-by: default avatarRichard Levitte <levitte@openssl.org>
      Reviewed-by: default avatarMatt Caswell <matt@openssl.org>
      621eaf49
  18. 03 Jun, 2016 2 commits
    • Matt Caswell's avatar
      Fix documentation error in x509 app certopt flag · 46bad919
      Matt Caswell authored
      
      
      According to the x509 man page in the section discussing -certopt it says
      that the ca_default option is the same as that used by the ca utility and
      (amongst other things) has the effect of suppressing printing of the
      signature - but in fact it doesn't. This error seems to have been present
      since the documentation was written back in 2001. It never had this effect.
      
      The default config file sets the certopt value to ca_default. The ca utility
      takes that and THEN adds additional options to suppress printing of the
      signature. So the ca utility DOES suppress printing of the signature - but
      it is not as a result of using the ca_default option.
      
      GitHub Issue #247
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      (cherry picked from commit 39a47008)
      46bad919
    • Matt Caswell's avatar
      BIO_printf() can fail to print the last character · 96f1de5b
      Matt Caswell authored
      
      
      If the string to print is exactly 2048 character long (excluding the NULL
      terminator) then BIO_printf will chop off the last byte. This is because
      it has filled its static buffer but hasn't yet allocated a dynamic buffer.
      In cases where we don't have a dynamic buffer we need to truncate but that
      is not the case for BIO_printf(). We need to check whether we are able to
      have a dynamic buffer buffer deciding to truncate.
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      96f1de5b