1. 22 May, 2014 2 commits
  2. 21 May, 2014 7 commits
  3. 20 May, 2014 4 commits
  4. 19 May, 2014 2 commits
  5. 18 May, 2014 1 commit
  6. 15 May, 2014 2 commits
  7. 14 May, 2014 3 commits
  8. 12 May, 2014 4 commits
  9. 11 May, 2014 7 commits
  10. 09 May, 2014 1 commit
    • Dr. Stephen Henson's avatar
      Return an error if no recipient type matches. · 2c414463
      Dr. Stephen Henson authored
      If the key type does not match any CMS recipient type return
      an error instead of using a random key (MMA mitigation). This
      does not leak any useful information to an attacker.
      
      PR#3348
      (cherry picked from commit bd43b4cf778a53ffa5d77510ecd408a009dc00d2)
      2c414463
  11. 08 May, 2014 2 commits
  12. 07 May, 2014 2 commits
  13. 06 May, 2014 3 commits
    • Geoff Thorpe's avatar
      dso: eliminate VMS code on non-VMS systems · d60f0193
      Geoff Thorpe authored
      
      
      Even though the meat of dso_vms.c is compiled out on non-VMS builds,
      the (pre-)compiler still traverses some of the macro handling. This
      trips up at least one non-VMS build configuration, so this commit
      makes the skip-VMS case more robust.
      
      Signed-off-by: default avatarGeoff Thorpe <geoff@openssl.org>
      d60f0193
    • Geoff Thorpe's avatar
      evp: prevent underflow in base64 decoding · 65402586
      Geoff Thorpe authored
      
      
      This patch resolves RT ticket #2608.
      
      Thanks to Robert Dugal for originally spotting this, and to David
      Ramos for noticing that the ball had been dropped.
      
      Signed-off-by: default avatarGeoff Thorpe <geoff@openssl.org>
      65402586
    • Geoff Thorpe's avatar
      bignum: allow concurrent BN_MONT_CTX_set_locked() · bf434468
      Geoff Thorpe authored
      
      
      The lazy-initialisation of BN_MONT_CTX was serialising all threads, as
      noted by Daniel Sands and co at Sandia. This was to handle the case that
      2 or more threads race to lazy-init the same context, but stunted all
      scalability in the case where 2 or more threads are doing unrelated
      things! We favour the latter case by punishing the former. The init work
      gets done by each thread that finds the context to be uninitialised, and
      we then lock the "set" logic after that work is done - the winning
      thread's work gets used, the losing threads throw away what they've done.
      
      Signed-off-by: default avatarGeoff Thorpe <geoff@openssl.org>
      bf434468