1. 13 Sep, 2019 1 commit
  2. 21 Jun, 2019 2 commits
    • kelsey's avatar
      Fix hardcoded default all-context-access policy for middleboxes, improve... · 6a450c9b
      kelsey authored
      Fix hardcoded default all-context-access policy for middleboxes, improve container status management
      
      - Middlebox context access will now match that configured by the
        client and server
      
      - The container access APIs now provide error results when trying to
        perform an access on a container for which the middlebox does not
        have the required rights
      
      - There are new API points for querying container status
      6a450c9b
    • kelsey's avatar
      Improved container state handling · 54b5f257
      kelsey authored
      54b5f257
  3. 20 Jun, 2019 2 commits
  4. 19 Jun, 2019 3 commits
  5. 20 Nov, 2018 3 commits
  6. 19 Nov, 2018 2 commits
  7. 16 Nov, 2018 2 commits
  8. 15 Nov, 2018 1 commit
  9. 14 Nov, 2018 2 commits
  10. 13 Nov, 2018 4 commits
  11. 12 Nov, 2018 9 commits
  12. 10 Nov, 2018 3 commits
  13. 09 Nov, 2018 5 commits
  14. 08 Nov, 2018 1 commit
    • Dr. Matthias St. Pierre's avatar
      rand_unix.c: open random devices on first use only · abf58ed3
      Dr. Matthias St. Pierre authored
      Commit c7504aeb
      
       (pr #6432) fixed a regression for applications in
      chroot environments, which compensated the fact that the new OpenSSL CSPRNG
      (based on the NIST DRBG) now reseeds periodically, which the previous
      one didn't. Now the reseeding could fail in the chroot environment if the
      DEVRANDOM devices were not present anymore and no other entropy source
      (e.g. getrandom()) was available.
      
      The solution was to keep the file handles for the DEVRANDOM devices open
      by default. In fact, the fix did more than this, it opened the DEVRANDOM
      devices early and unconditionally in rand_pool_init(), which had the
      unwanted side effect that the devices were opened (and kept open) even
      in cases when they were not used at all, for example when the getrandom()
      system call was available. Due  to a bug (issue #7419) this even happened
      when the feature was disabled by the application.
      
      This commit removes the unconditional opening of all DEVRANDOM devices.
      They will now only be opened (and kept open) on first use. In particular,
      if getrandom() is available, the handles will not be opened unnecessarily.
      
      This change does not introduce a regression for applications compiled for
      libcrypto 1.1.0, because the SSLEAY RNG also seeds on first use. So in the
      above constellation the CSPRNG will only be properly seeded if it is happens
      before the forking and chrooting.
      
      Fixes #7419
      
      Reviewed-by: default avatarPaul Dale <paul.dale@oracle.com>
      (Merged from https://github.com/openssl/openssl/pull/7437)
      
      (cherry picked from commit 8cfc1971)
      abf58ed3