1. 08 Apr, 2015 4 commits
    • Richard Levitte's avatar
      Appease clang -Wshadow · 700c0eb8
      Richard Levitte authored
      
      
      The macros BSWAP4 and BSWAP8 have statetemnt expressions
      implementations that use local variable names that shadow variables
      outside the macro call, generating warnings like this
      
      e_aes_cbc_hmac_sha1.c:263:14: warning: declaration shadows a local variable
            [-Wshadow]
          seqnum = BSWAP8(blocks[0].q[0]);
                   ^
      ../modes/modes_lcl.h:41:29: note: expanded from macro 'BSWAP8'
                                  ^
      e_aes_cbc_hmac_sha1.c:223:12: note: previous declaration is here
          size_t ret = 0;
                 ^
      
      Have clang be quiet by modifying the macro variable names slightly
      (suffixing them with an underscore).
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      (cherry picked from commit 2da2a434)
      700c0eb8
    • Richard Levitte's avatar
      Appease clang -Wgnu-statement-expression · a4ba7163
      Richard Levitte authored
      
      
      We use GNU statement expressions in crypto/md32_common.h, surrounded
      by checks that GNU C is indeed used to compile.  It seems that clang,
      at least on Linux, pretends to be GNU C, therefore finds the statement
      expressions and then warns about them.
      
      The solution is to have clang be quiet about it.
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      (cherry picked from commit 04958e84)
      a4ba7163
    • Richard Levitte's avatar
      Appease clang -Wempty-translation-unit · d21cbd7d
      Richard Levitte authored
      
      
      ebcdic.c:284:7: warning: ISO C requires a translation unit to contain at least one
            declaration [-Wempty-translation-unit]
            ^
      1 warning generated.
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      (cherry picked from commit c25dea53)
      d21cbd7d
    • Emilia Kasper's avatar
      Harden SSLv2-supporting servers against Bleichenbacher's attack. · ae50d827
      Emilia Kasper authored
      
      
      There is no indication that the timing differences are exploitable in
      OpenSSL, and indeed there is some indication (Usenix '14) that they
      are too small to be exploitable. Nevertheless, be careful and apply
      the same countermeasures as in s3_srvr.c
      
      Thanks to Nimrod Aviram, Sebastian Schinzel and Yuval Shavitt for
      reporting this issue.
      
      Reviewed-by: default avatarRichard Levitte <levitte@openssl.org>
      ae50d827
  2. 02 Apr, 2015 3 commits
  3. 31 Mar, 2015 1 commit
  4. 28 Mar, 2015 1 commit
  5. 25 Mar, 2015 8 commits
  6. 24 Mar, 2015 5 commits
  7. 23 Mar, 2015 2 commits
  8. 22 Mar, 2015 1 commit
  9. 20 Mar, 2015 3 commits
  10. 19 Mar, 2015 12 commits