1. 03 Jun, 2014 1 commit
    • Dr. Stephen Henson's avatar
      Fix for CVE-2014-0195 · f4e6ed09
      Dr. Stephen Henson authored
      A buffer overrun attack can be triggered by sending invalid DTLS fragments
      to an OpenSSL DTLS client or server. This is potentially exploitable to
      run arbitrary code on a vulnerable client or server.
      
      Fixed by adding consistency check for DTLS fragments.
      
      Thanks to Jüri Aedla for reporting this issue.
      f4e6ed09
  2. 02 Jun, 2014 4 commits
    • zhu qun-ying's avatar
      Free up s->d1->buffered_app_data.q properly. · b79e6e3a
      zhu qun-ying authored
      PR#3286
      (cherry picked from commit 71e95000afb2227fe5cac1c79ae884338bcd8d0b)
      b79e6e3a
    • Dr. Stephen Henson's avatar
      Make PKCS7_NOCERTS match documentation. · 812b7246
      Dr. Stephen Henson authored
      As documented PKCS7_NOCERTS should only exclude the signer's certificate
      and not any supplied in the "certs" parameter. This makes it possible to
      exclude the signer's certificate but include other certificates. Applications
      that don't want to include other certificates should set "certs" to NULL
      anyway.
      (cherry picked from commit 5c6f808b66f1a2e0fb2a508b24b845a88803fe3a)
      812b7246
    • Annie Yousar's avatar
      Fix typo. · db305124
      Annie Yousar authored
      PR#2677.
      db305124
    • Sami Farin's avatar
      Typo: set i to -1 before goto. · bffbaf92
      Sami Farin authored
      PR#3302
      (cherry picked from commit 9717f01951f976f76dd40a38d9fc7307057fa4c4)
      bffbaf92
  3. 01 Jun, 2014 4 commits
  4. 30 May, 2014 2 commits
  5. 29 May, 2014 5 commits
  6. 27 May, 2014 1 commit
  7. 25 May, 2014 1 commit
  8. 24 May, 2014 1 commit
  9. 21 May, 2014 1 commit
  10. 19 May, 2014 1 commit
  11. 15 May, 2014 1 commit
  12. 14 May, 2014 3 commits
  13. 12 May, 2014 3 commits
  14. 11 May, 2014 4 commits
  15. 09 May, 2014 1 commit
    • Dr. Stephen Henson's avatar
      Return an error if no recipient type matches. · c3cd9be0
      Dr. Stephen Henson authored
      If the key type does not match any CMS recipient type return
      an error instead of using a random key (MMA mitigation). This
      does not leak any useful information to an attacker.
      
      PR#3348
      (cherry picked from commit 83a3182e0560f76548f4378325393461f6275493)
      c3cd9be0
  16. 08 May, 2014 2 commits
  17. 07 May, 2014 2 commits
  18. 06 May, 2014 3 commits
    • Geoff Thorpe's avatar
      evp: prevent underflow in base64 decoding · 84fe6861
      Geoff Thorpe authored
      
      
      This patch resolves RT ticket #2608.
      
      Thanks to Robert Dugal for originally spotting this, and to David
      Ramos for noticing that the ball had been dropped.
      
      Signed-off-by: default avatarGeoff Thorpe <geoff@openssl.org>
      84fe6861
    • Geoff Thorpe's avatar
      bignum: allow concurrent BN_MONT_CTX_set_locked() · 44ea88c2
      Geoff Thorpe authored
      
      
      The lazy-initialisation of BN_MONT_CTX was serialising all threads, as
      noted by Daniel Sands and co at Sandia. This was to handle the case that
      2 or more threads race to lazy-init the same context, but stunted all
      scalability in the case where 2 or more threads are doing unrelated
      things! We favour the latter case by punishing the former. The init work
      gets done by each thread that finds the context to be uninitialised, and
      we then lock the "set" logic after that work is done - the winning
      thread's work gets used, the losing threads throw away what they've done.
      
      Signed-off-by: default avatarGeoff Thorpe <geoff@openssl.org>
      44ea88c2
    • Geoff Thorpe's avatar
      dso: eliminate VMS code on non-VMS systems · f4e69755
      Geoff Thorpe authored
      
      
      Even though the meat of dso_vms.c is compiled out on non-VMS builds,
      the (pre-)compiler still traverses some of the macro handling. This
      trips up at least one non-VMS build configuration, so this commit
      makes the skip-VMS case more robust.
      
      Signed-off-by: default avatarGeoff Thorpe <geoff@openssl.org>
      f4e69755