1. 15 Sep, 2016 7 commits
  2. 14 Sep, 2016 1 commit
    • Matt Caswell's avatar
      Add some sanity checks around usage of t_fromb64() · 68f11e82
      Matt Caswell authored
      
      
      The internal SRP function t_fromb64() converts from base64 to binary. It
      does not validate that the size of the destination is sufficiently large -
      that is up to the callers. In some places there was such a check, but not
      in others.
      
      Add an argument to t_fromb64() to provide the size of the destination
      buffer and validate that we don't write too much data. Also add some sanity
      checks to the callers where appropriate.
      
      With thanks to Shi Lei for reporting this issue.
      
      Reviewed-by: default avatarRichard Levitte <levitte@openssl.org>
      (cherry picked from commit 73f0df83)
      68f11e82
  3. 13 Sep, 2016 1 commit
    • Matt Caswell's avatar
      Abort on unrecognised warning alerts · 15d81749
      Matt Caswell authored
      
      
      A peer continually sending unrecognised warning alerts could mean that we
      make no progress on a connection. We should abort rather than continuing if
      we receive an unrecognised warning alert.
      
      Thanks to Shi Lei for reporting this issue.
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      15d81749
  4. 12 Sep, 2016 1 commit
  5. 11 Sep, 2016 1 commit
  6. 09 Sep, 2016 1 commit
  7. 08 Sep, 2016 1 commit
  8. 07 Sep, 2016 1 commit
  9. 06 Sep, 2016 1 commit
  10. 31 Aug, 2016 1 commit
  11. 30 Aug, 2016 1 commit
  12. 26 Aug, 2016 11 commits
  13. 24 Aug, 2016 3 commits
  14. 23 Aug, 2016 1 commit
    • Dr. Stephen Henson's avatar
      Sanity check ticket length. · baaabfd8
      Dr. Stephen Henson authored
      
      
      If a ticket callback changes the HMAC digest to SHA512 the existing
      sanity checks are not sufficient and an attacker could perform a DoS
      attack with a malformed ticket. Add additional checks based on
      HMAC size.
      
      Thanks to Shi Lei for reporting this bug.
      
      CVE-2016-6302
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      baaabfd8
  15. 22 Aug, 2016 8 commits