- Apr 07, 2014
-
-
Steven M. Schweda authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
Treat a zero length passed to ssleay_rand_add a no op: the existing logic zeroes the md value which is very bad. OpenSSL itself never does this internally and the actual call doesn't make sense as it would be passing zero bytes of entropy. Thanks to Marcus Meissner <meissner@suse.de> for reporting this bug.
-
Dr. Stephen Henson authored
A missing bounds check in the handling of the TLS heartbeat extension can be used to reveal up to 64k of memory to a connected client or server. Thanks for Neel Mehta of Google Security for discovering this bug and to Adam Langley <agl@chromium.org> and Bodo Moeller <bmoeller@acm.org> for preparing the fix (CVE-2014-0160)
-
Dr. Stephen Henson authored
(cherry picked from commit 4e6c12f3)
-
- Apr 06, 2014
-
-
Andy Polyakov authored
(cherry picked from commit 997d1aac)
-
Andy Polyakov authored
(cherry picked from commit 6eebcf34)
-
- Apr 05, 2014
-
-
Dr. Stephen Henson authored
Enable TLS padding extension using official value from: http://www.iana.org/assignments/tls-extensiontype-values/tls-extensiontype-values.xhtml (cherry picked from commit cd6bd5ff) Conflicts: CHANGES ssl/tls1.h
-
- Apr 04, 2014
-
-
Dr. Stephen Henson authored
(cherry picked from commit 6cc00684)
-
Dr. Stephen Henson authored
Use bufsiz - 1 not BUFSIZ - 1 when prompting for a password in the openssl utility. Thanks to Rob Mackinnon, Leviathan Security for reporting this issue. (cherry picked from commit 7ba08a4d)
-
- Apr 03, 2014
-
-
Dr. Stephen Henson authored
(cherry picked from commit dbb7654d)
-
Tim Hudson authored
New -hash_old to generate CRL hashes using old (before OpenSSL 1.0.0) algorithm. (cherry picked from commit de2d97cd)
-
- Apr 02, 2014
-
-
Eric Young authored
A short PEM encoded sequence if passed to the BIO, and the file had 2 \n following would fail. PR#3289 (cherry picked from commit 10378fb5)
-
- Mar 12, 2014
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
Use a previously unused value as we will be updating multiple released branches. (cherry picked from commit 0737acd2)
-
Dr. Stephen Henson authored
Fix for the attack described in the paper "Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack" by Yuval Yarom and Naomi Benger. Details can be obtained from: http://eprint.iacr.org/2014/140 Thanks to Yuval Yarom and Naomi Benger for discovering this flaw and to Yuval Yarom for supplying a fix. (cherry picked from commit 2198be34) Conflicts: CHANGES
-
- Mar 10, 2014
-
-
Dr. Stephen Henson authored
(cherry picked from commit a029788b)
-
- Mar 07, 2014
-
-
Dr. Stephen Henson authored
-
Andy Polyakov authored
PR: 3275 (cherry picked from commit ea38f020)
-
- Feb 27, 2014
-
-
Andy Polyakov authored
[but don't let it mask make's]. PR: 3269 (cherry picked from commit 2f34088e)
-
- Feb 26, 2014
-
-
Dr. Stephen Henson authored
(cherry picked from commit 3eddd1706a30cdf3dc9278692d8ee9038eac8a0d)
-
- Feb 25, 2014
-
-
Andy Polyakov authored
PR: 3201 (cherry picked from commit 03da57fe)
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
Windows 8 SDKs complain that GetVersion() is deprecated. We only use GetVersion like this: (GetVersion() < 0x80000000) which checks if the Windows version is NT based. Use a macro check_winnt() which uses GetVersion() on older SDK versions and true otherwise. (cherry picked from commit a4cc3c80)
-
- Feb 24, 2014
-
-
Andy Polyakov authored
Allegedly formwarding to NUL: sometimes creates NUL file in file system. PR: 3250 (cherry picked from commit 63aff300)
-
Andy Polyakov authored
PR: 3251 Suggested by: Thorsten Schöning
-
Andy Polyakov authored
PR: 3251 Suggested by: Thorsten Schning (cherry picked from commit 779c51c6)
-
Andy Polyakov authored
when adding duplicates in add_cert_dir. PR: 3261 Reported by: Marian Done (cherry picked from commit 758954e0)
-
- Feb 15, 2014
-
-
Dr. Stephen Henson authored
(cherry picked from commit c55fef76) Conflicts: util/pl/VC-32.pl
-
Dr. Stephen Henson authored
(cherry picked from commit 5a7652c3)
-
- Feb 14, 2014
-
-
Kurt Roeckx authored
If you use "-newkey rsa" it's supposed to read the default number of bits from the config file. However the value isn't used to generate the key, but it does print it's generating such a key. The set_keygen_ctx() doesn't call EVP_PKEY_CTX_set_rsa_keygen_bits() and you end up with the default set in pkey_rsa_init() (1024). Afterwards the number of bits gets read from the config file, but nothing is done with that anymore. We now read the config first and use the value from the config file when no size is given. PR: 2592 (cherry picked from commit 33432203)
-
Kurt Roeckx authored
(cherry picked from commit e547c45f)
-
Scott Schaefer authored
(cherry picked from commit 2b4ffc65)
-
Scott Schaefer authored
apps/pkcs12.c accepts -password as an argument. The document author almost certainly meant to write "-password, -passin". However, that is not correct, either. Actually the code treats -password as equivalent to -passin, EXCEPT when -export is also specified, in which case -password as equivalent to -passout. (cherry picked from commit 856c6dfb)
-
Dr. Stephen Henson authored
(cherry picked from commit 8c6d8c2a) Conflicts: CHANGES ssl/t1_lib.c
-
- Feb 05, 2014
-
-
Dr. Stephen Henson authored
(cherry picked from commit 8c6d8c2a) Conflicts: CHANGES ssl/t1_lib.c
-
- Feb 03, 2014
-
-
Dr. Stephen Henson authored
PR#3253 (cherry picked from commit 7f6e09b5)
-
- Jan 29, 2014
-
-
Dr. Stephen Henson authored
Remove reference to ERR_TXT_MALLOCED in the error library as that is only used internally. Indicate that returned error data must not be freed. (cherry picked from commit f2d678e6)
-