summaryrefslogtreecommitdiffstats
AgeCommit message (Collapse)Author
2013-02-05prepare for releaseOpenSSL_1_0_0kDr. Stephen Henson
2013-02-05make updateDr. Stephen Henson
2013-02-05Add ordinal for CRYPTO_memcmp: since this will affect multipleDr. Stephen Henson
branches it needs to be in a "gap". (cherry picked from commit 81ce0e14e72e8e255ad1bd9c7cfaa47a6291919c)
2013-02-05Fix error codes.Dr. Stephen Henson
(cherry picked from commit 35d732fc2e1badce13be22a044187ebd4d769552)
2013-02-05Update CHANGES and NEWSDr. Stephen Henson
2013-02-05bn_word.c: fix overflow bug in BN_add_word.Andy Polyakov
(cherry picked from commit 134c00659a1bc67ad35a1e4620e16bc4315e6e37)
2013-02-05x86_64 assembly pack: keep making Windows build more robust.Andy Polyakov
PR: 2963 and a number of others (cherry picked from commit 4568182a8b8cbfd15cbc175189029ac547bd1762)
2013-02-05update NEWSDr. Stephen Henson
2013-02-05s3/s3_cbc.c: allow for compilations with NO_SHA256|512.Andy Polyakov
(cherry picked from commit d5371324d978e4096bf99b9d0fe71b2cb65d9dc8)
2013-02-05ssl/s3_cbc.c: md_state alignment portability fix.Andy Polyakov
RISCs are picky and alignment granted by compiler for md_state can be insufficient for SHA512. (cherry picked from commit 36260233e7e3396feed884d3f501283e0453c04f)
2013-02-05ssl/s3_cbc.c: uint64_t portability fix.Andy Polyakov
Break dependency on uint64_t. It's possible to declare bits as unsigned int, because TLS packets are limited in size and 32-bit value can't overflow. (cherry picked from commit cab13fc8473856a43556d41d8dac5605f4ba1f91)
2013-02-05Update DTLS code to match CBC decoding in TLS.Ben Laurie
This change updates the DTLS code to match the constant-time CBC behaviour in the TLS. (cherry picked from commit 9f27de170d1b7bef3d46d41382dc4dafde8b3900)
2013-02-05Don't crash when processing a zero-length, TLS >= 1.1 record.Ben Laurie
The previous CBC patch was bugged in that there was a path through enc() in s3_pkt.c/d1_pkt.c which didn't set orig_len. orig_len would be left at the previous value which could suggest that the packet was a sufficient length when it wasn't. (cherry picked from commit 6cb19b7681f600b2f165e4adc57547b097b475fd)
2013-02-05Fixups from previous commit.Ben Laurie
2013-02-05Oops. Add missing file.Ben Laurie
(cherry picked from commit 014265eb02e26f35c8db58e2ccbf100b0b2f0072)
2013-02-05Add a target so I can build this.Ben Laurie
2013-02-05Make CBC decoding constant time.Ben Laurie
This patch makes the decoding of SSLv3 and TLS CBC records constant time. Without this, a timing side-channel can be used to build a padding oracle and mount Vaudenay's attack. This patch also disables the stitched AESNI+SHA mode pending a similar fix to that code. In order to be easy to backport, this change is implemented in ssl/, rather than as a generic AEAD mode. In the future this should be changed around so that HMAC isn't in ssl/, but crypto/ as FIPS expects. (cherry picked from commit e130841bccfc0bb9da254dc84e23bc6a1c78a64e) Conflicts: crypto/evp/c_allc.c ssl/ssl_algs.c ssl/ssl_locl.h ssl/t1_enc.c
2013-02-05Add and use a constant-time memcmp.Ben Laurie
This change adds CRYPTO_memcmp, which compares two vectors of bytes in an amount of time that's independent of their contents. It also changes several MAC compares in the code to use this over the standard memcmp, which may leak information about the size of a matching prefix. (cherry picked from commit 2ee798880a246d648ecddadc5b91367bee4a5d98) Conflicts: crypto/crypto.h ssl/t1_lib.c
2013-02-05Don't try and verify signatures if key is NULL (CVE-2013-0166)Dr. Stephen Henson
Add additional check to catch this in ASN1_item_verify too.
2013-01-23Don't include comp.h in cmd_cd.c if OPENSSL_NO_COMP setDr. Stephen Henson
2013-01-22x86_64 assembly pack: make Windows build more robust [from master].Andy Polyakov
PR: 2963 and a number of others
2013-01-20Don't include comp.h if no-comp set.Dr. Stephen Henson
2013-01-19engines/ccgost: GOST fixes [from master].Andy Polyakov
Submitted by: Dmitry Belyavsky, Seguei Leontiev PR: 2821
2013-01-19.gitignore adjustmentsAndy Polyakov
2013-01-13Correct EVP_PKEY_verifyrecover to EVP_PKEY_verify_recover (RT 2955).Ben Laurie
2013-01-13Add .gitignoreDr. Stephen Henson
2012-12-30make no-comp compileDr. Stephen Henson
2012-12-23add missing \nDr. Stephen Henson
2012-12-10PR: 2888Dr. Stephen Henson
Reported by: Daniel Black <daniel.black@openquery.com> Support renewing session tickets (backport from HEAD).
2012-12-06Fix two bugs which affect delta CRL handling:Dr. Stephen Henson
Use -1 to check all extensions in CRLs. Always set flag for freshest CRL.
2012-12-04check mval for NULL tooDr. Stephen Henson
2012-12-03fix leakDr. Stephen Henson
2012-11-29PR: 2803Dr. Stephen Henson
Submitted by: jean-etienne.schwartz@bull.net In OCSP_basic_varify return an error if X509_STORE_CTX_init fails.
2012-11-22reject zero length point format list or supported curves extensionsDr. Stephen Henson
2012-11-21PR: 2908Dr. Stephen Henson
Submitted by: Dmitry Belyavsky <beldmit@gmail.com> Fix DH double free if parameter generation fails.
2012-11-20fix leaksDr. Stephen Henson
2012-11-19correct docsDr. Stephen Henson
2012-11-18PR: 2880Dr. Stephen Henson
Submitted by: "Florian Rüchel" <florian.ruechel@ruhr-uni-bochum.de> Correctly handle local machine keys in the capi ENGINE.
2012-10-16aix[64]-cc: get MT support right [from HEAD].Andy Polyakov
PR: 2896
2012-10-05Fix EC_KEY initialization race.Bodo Möller
Submitted by: Adam Langley
2012-10-05backport OCSP fix enhancementDr. Stephen Henson
2012-10-04Backport OCSP Stapling fix.Ben Laurie
2012-10-04Fix warning.Ben Laurie
2012-10-04Fix warning (hope this doesn't break other platforms, there's a twistyBen Laurie
little maze of #ifs, all different).
2012-09-24Fix Valgrind warning.Bodo Möller
Submitted by: Adam Langley
2012-09-24* Configure: make the debug-levitte-linux{elf,noasm} less extreme.Richard Levitte
2012-09-21* ssl/t1_enc.c (tls1_change_cipher_state): Stupid bug. Fortunately inRichard Levitte
debugging code that's seldom used.
2012-09-17Fix warning.Bodo Möller
Submitted by: Chromium Authors
2012-09-11fix memory leakDr. Stephen Henson
2012-09-01Don't load GOST ENGINE if it is already loaded.Dr. Stephen Henson
Multiple copies of the ENGINE will cause problems when it is cleaned up as the methods are stored in static structures which will be overwritten and freed up more than once. Set static methods to NULL when the ENGINE is freed so it can be reloaded.