1. 13 May, 2015 9 commits
    • Andy Polyakov's avatar
    • Hanno Böck's avatar
      Call of memcmp with null pointers in obj_cmp() · 2b8dc08b
      Hanno Böck authored
      
      
      The function obj_cmp() (file crypto/objects/obj_dat.c) can in some
      situations call memcmp() with a null pointer and a zero length.
      
      This is invalid behaviour. When compiling openssl with undefined
      behaviour sanitizer (add -fsanitize=undefined to compile flags) this
      can be seen. One example that triggers this behaviour is the pkcs7
      command (but there are others, e.g. I've seen it with the timestamp
      function):
      apps/openssl pkcs7 -in test/testp7.pem
      
      What happens is that obj_cmp takes objects of the type ASN1_OBJECT and
      passes their ->data pointer to memcmp. Zero-sized ASN1_OBJECT
      structures can have a null pointer as data.
      
      RT#3816
      
      Signed-off-by: default avatarMatt Caswell <matt@openssl.org>
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      2b8dc08b
    • Matt Caswell's avatar
      Add CHANGES entry for Kerberos removal · c3d73470
      Matt Caswell authored
      
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      c3d73470
    • Matt Caswell's avatar
      Remove remaining Kerberos references · e36827f6
      Matt Caswell authored
      
      
      Following on from the removal of libcrypto and libssl support for Kerberos
      this commit removes all remaining references to Kerberos.
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      e36827f6
    • Matt Caswell's avatar
      Remove Kerberos support from libcrypto · 60b3d36d
      Matt Caswell authored
      
      
      Remove libcrypto support for Kerberos following on from the previous commit
      which removed it from libssl.
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      60b3d36d
    • Matt Caswell's avatar
      Remove Kerberos support from libssl · 55a9a16f
      Matt Caswell authored
      
      
      Remove RFC2712 Kerberos support from libssl. This code and the associated
      standard is no longer considered fit-for-purpose.
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      55a9a16f
    • Matt Caswell's avatar
      Remove Kerberos support from apps · 5561419a
      Matt Caswell authored
      
      
      Remove Kerberos related options from the apps to prepare for the
      subsequent commits which will remove libcrypto and libssl support for
      Kerberos.
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      5561419a
    • Matt Caswell's avatar
      Don't allow a CCS when expecting a CertificateVerify · a0bd6493
      Matt Caswell authored
      
      
      Currently we set change_cipher_spec_ok to 1 before calling
      ssl3_get_cert_verify(). This is because this message is optional and if it
      is not sent then the next thing we would expect to get is the CCS. However,
      although it is optional, we do actually know whether we should be receiving
      one in advance. If we have received a client cert then we should expect
      a CertificateVerify message. By the time we get to this point we will
      already have bombed out if we didn't get a Certificate when we should have
      done, so it is safe just to check whether |peer| is NULL or not. If it is
      we won't get a CertificateVerify, otherwise we will. Therefore we should
      change the logic so that we only attempt to get the CertificateVerify if
      we are expecting one, and not allow a CCS in this scenario.
      
      Whilst this is good practice for TLS it is even more important for DTLS.
      In DTLS messages can be lost. Therefore we may be in a situation where a
      CertificateVerify message does not arrive even though one was sent. In that
      case the next message the server will receive will be the CCS. This could
      also happen if messages get re-ordered in-flight. In DTLS if
      |change_cipher_spec_ok| is not set and a CCS is received it is ignored.
      However if |change_cipher_spec_ok| *is* set then a CCS arrival will
      immediately move the server into the next epoch. Any messages arriving for
      the previous epoch will be ignored. This means that, in this scenario, the
      handshake can never complete. The client will attempt to retransmit
      missing messages, but the server will ignore them because they are the wrong
      epoch. The server meanwhile will still be waiting for the CertificateVerify
      which is never going to arrive.
      
      RT#2958
      
      Reviewed-by: default avatarEmilia Käsper <emilia@openssl.org>
      a0bd6493
    • Gunnar Kudrjavets's avatar
      Fix the heap corruption in libeay32!OBJ_add_object. · 56d88027
      Gunnar Kudrjavets authored
      
      
      Original 'sizeof(ADDED_OBJ)' was replaced with 'sizeof(*ao)'. However,
      they return different sizes. Therefore as the result heap gets corrupted
      and at some point later debug version of malloc() detects the corruption.
      
      On x86 we can observe that as follows:
      
      sizeof(*ao) == 4
      sizeof(*ao[0]) == sizeof(ADDED_OBJ) == 8
      
      Issue reproduces with either enabling CRT debug heap or Application
      Verifier's full-page heap.
      
      Basic debugging data from the moment the corruption is first detected:
      
      0:000:x86> |
      .  0    id: 283c        create  name: openssl.exe
      0:000:x86> kcn
       #
      00 MSVCR120D!_heap_alloc_dbg_impl
      01 MSVCR120D!_nh_malloc_dbg_impl
      02 MSVCR120D!_nh_malloc_dbg
      03 MSVCR120D!malloc
      04 LIBEAY32!default_malloc_ex
      05 LIBEAY32!CRYPTO_malloc
      06 LIBEAY32!lh_insert
      07 LIBEAY32!OBJ_add_object
      08 LIBEAY32!OBJ_create
      09 openssl!add_oid_section
      0a openssl!req_main
      0b openssl!do_cmd
      0c openssl!main
      0d openssl!__tmainCRTStartup
      0e openssl!mainCRTStartup
      0f KERNEL32!BaseThreadInitThunk
      10 ntdll_77d60000!__RtlUserThreadStart
      11 ntdll_77d60000!_RtlUserThreadStart
      
      Signed-off-by: default avatarMatt Caswell <matt@openssl.org>
      Reviewed-by: default avatarRichard Levitte <levitte@openssl.org>
      56d88027
  2. 12 May, 2015 3 commits
  3. 11 May, 2015 5 commits
  4. 08 May, 2015 1 commit
  5. 07 May, 2015 2 commits
  6. 06 May, 2015 9 commits
  7. 05 May, 2015 11 commits