summaryrefslogtreecommitdiffstats
AgeCommit message (Collapse)Author
2014-06-22 Fix off-by-one errors in ssl_cipher_get_evp()Miod Vallat
In the ssl_cipher_get_evp() function, fix off-by-one errors in index validation before accessing arrays. Bug discovered and fixed by Miod Vallat from the OpenBSD team. PR#3375
2014-06-22Revert " Fix off-by-one errors in ssl_cipher_get_evp()"Matt Caswell
This reverts commit def1490717c091c6ef669da9fc5ea4c8b2a4d776. Incorrect attribution
2014-06-14Accept CCS after sending finished.Dr. Stephen Henson
Allow CCS after finished has been sent by client: at this point keys have been correctly set up so it is OK to accept CCS from server. Without this renegotiation can sometimes fail. PR#3400 (cherry picked from commit 99cd6a91fcb0931feaebbb4832681d40a66fad41)
2014-06-12 Fix off-by-one errors in ssl_cipher_get_evp()Kurt Cancemi
In the ssl_cipher_get_evp() function, fix off-by-one errors in index validation before accessing arrays. PR#3375
2014-06-12Allow the maximum value.Ben Laurie
(Backported as a result of PR#3377 reported by Rainer Jung <rainer.jung@kippdata.de>)
2014-06-10Fix null pointer errors.Dr. Stephen Henson
PR#3394 (cherry picked from commit 7a9d59c148b773f59a41f8697eeecf369a0974c2)
2014-06-09Clarify NEWS.Dr. Stephen Henson
2014-06-06Use correct wording for website scripts.Dr. Stephen Henson
2014-06-06Add two known issues to NEWS.Dr. Stephen Henson
2014-06-06Fix 0.9.8 FIPS capable OpenSSL build.Dr. Stephen Henson
The object file bn_lib.o is excluded from FIPS builds which causes a linker error for BN_consttime_swap. So move definition from bn_lib.c to bn_gf2m.c This change is *only* needed for OpenSSL 0.9.8 which uses the 1.2 FIPS module.
2014-06-05Fixed Windows compilation failureMatt Caswell
2014-06-05Prepare for 0.9.8zb-devDr. Stephen Henson
2014-06-05Prepare for 0.9.8za releaseOpenSSL_0_9_8zaDr. Stephen Henson
2014-06-05Update CHANGES and NEWSDr. Stephen Henson
2014-06-03Fix CVE-2014-3470Dr. Stephen Henson
Check session_cert is not NULL before dereferencing it.
2014-06-03Fix CVE-2014-0221Dr. Stephen Henson
Unnecessary recursion when receiving a DTLS hello request can be used to crash a DTLS client. Fixed by handling DTLS hello request without recursion. Thanks to Imre Rad (Search-Lab Ltd.) for discovering this issue.
2014-06-03Additional CVE-2014-0224 protection.Dr. Stephen Henson
Return a fatal error if an attempt is made to use a zero length master secret.
2014-06-03Fix for CVE-2014-0224Dr. Stephen Henson
Only accept change cipher spec when it is expected instead of at any time. This prevents premature setting of session keys before the master secret is determined which an attacker could use as a MITM attack. Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for reporting this issue and providing the initial fix this patch is based on.
2014-06-03Fix for CVE-2014-0195Dr. Stephen Henson
A buffer overrun attack can be triggered by sending invalid DTLS fragments to an OpenSSL DTLS client or server. This is potentially exploitable to run arbitrary code on a vulnerable client or server. Fixed by adding consistency check for DTLS fragments. Thanks to Jüri Aedla for reporting this issue.
2014-06-02Free up s->d1->buffered_app_data.q properly.zhu qun-ying
PR#3286 (cherry picked from commit 71e95000afb2227fe5cac1c79ae884338bcd8d0b)
2014-06-02ecdsa.pod: typo.Andy Polyakov
PR: 2678 Submitted by: Annie Yousar (cherry picked from commit d572544a2cccc9dad7afcef24de11232e5506c99)
2014-06-02Typo: set i to -1 before goto.Sami Farin
PR#3302 (cherry picked from commit 9717f01951f976f76dd40a38d9fc7307057fa4c4)
2014-06-01Set default global mask to UTF8 only.Dr. Stephen Henson
(cherry picked from commit 3009244da47b989c4cc59ba02cf81a4e9d8f8431)
2014-06-01Allocate extra space when NETSCAPE_HANG_BUG defined.David Ramos
Make sure there is an extra 4 bytes for server done message when NETSCAPE_HANG_BUG is defined. PR#3361 (cherry picked from commit 673c42b2380c34e7500f05e7f00c674cc677a065)
2014-05-29Fix signed/unsigned warning.Ben Laurie
(cherry picked from commit 989d87cb1a174a951efd829ff6b2f68a322f9df8)
2014-05-29Set version number correctly.Dr. Stephen Henson
PR#3249 (cherry picked from commit 8909bf20269035d295743fca559207ef2eb84eb3)
2014-05-29Fix memory leak.František Bořánek
PR#3278 (cherry picked from commit de56fe797081fc09ebd1add06d6e2df42a324fd5)
2014-05-27Fix for test_bn regular expression to work on Windows using MSYS. PR#3346Peter Mosmans
2014-05-25Fixed error in args for SSL_set_msg_callback and SSL_set_msg_callback_argMatt Caswell
2014-05-25Fix for non compilation with TLS_DEBUG definedMatt Caswell
2014-05-21Fix for PKCS12_create if no-rc2 specified.Dr. Stephen Henson
Use triple DES for certificate encryption if no-rc2 is specified. PR#3357 (cherry picked from commit 03b5b78c09fb10839a565f341cdc527c675e89ce)
2014-05-21Change default cipher in smime app to des3.Dr. Stephen Henson
PR#3357 (cherry picked from commit ca3ffd9670f2b589bf8cc04923f953e06d6fbc58) Conflicts: doc/apps/smime.pod
2014-05-15Removed note in BUGS section about AEAD ciphers - inadvertently added to ↵Matt Caswell
wrong branch
2014-05-14Fix grammar error in verify pod. PR#3355Jeffrey Walton
2014-05-14Add information to BUGS section of enc documentation. PR#3354Jeffrey Walton
2014-05-14Corrected POD syntax errors. PR#3353Michal Bozon
2014-05-12Check sk_SSL_CIPHER_num() after assigning sk.Kurt Roeckx
2014-05-12Avoid out-of-bounds write in SSL_get_shared_ciphersGünther Noack
PR: 3317
2014-05-11Fix infinite loop. PR#3347Viktor Dukhovni
2014-05-11safety check to ensure we dont send out beyond the users bufferTim Hudson
2014-05-08Return an error if no recipient type matches.Dr. Stephen Henson
If the key type does not match any CMS recipient type return an error instead of using a random key (MMA mitigation). This does not leak any useful information to an attacker. PR#3348 (cherry picked from commit 83a3182e0560f76548f4378325393461f6275493)
2014-05-06evp: prevent underflow in base64 decodingGeoff Thorpe
This patch resolves RT ticket #2608. Thanks to Robert Dugal for originally spotting this, and to David Ramos for noticing that the ball had been dropped. Signed-off-by: Geoff Thorpe <geoff@openssl.org>
2014-05-06bignum: allow concurrent BN_MONT_CTX_set_locked()Geoff Thorpe
The lazy-initialisation of BN_MONT_CTX was serialising all threads, as noted by Daniel Sands and co at Sandia. This was to handle the case that 2 or more threads race to lazy-init the same context, but stunted all scalability in the case where 2 or more threads are doing unrelated things! We favour the latter case by punishing the former. The init work gets done by each thread that finds the context to be uninitialised, and we then lock the "set" logic after that work is done - the winning thread's work gets used, the losing threads throw away what they've done. Signed-off-by: Geoff Thorpe <geoff@openssl.org>
2014-05-06Initialize num properly.Dr. Stephen Henson
PR#3289 PR#3345 (cherry picked from commit 3ba1e406c2309adb427ced9815ebf05f5b58d155)
2014-05-06Set Enveloped data version to 2 if ktri version not zero.Dr. Stephen Henson
(cherry picked from commit 9c5d953a07f472452ae2cb578e39eddea2de2b9c)
2014-04-24Add new sponsorsSteve Marquess
(cherry picked from commit 351f0a124bffaa94d2a8abdec2e7dde5ae9c457d)
2014-04-11Add new key fingerprint.Dr. Stephen Henson
(cherry picked from commit 3143a332e8f2f5ca1a6f0262a1a1a66103f2adf7)
2014-04-09Fix free errors in ocsp utility.Dr. Stephen Henson
Keep copy of any host, path and port values allocated by OCSP_parse_url and free as necessary. (cherry picked from commit 5219d3dd350cc74498dd49daef5e6ee8c34d9857)
2014-04-04Update FAQ.Dr. Stephen Henson
(cherry picked from commit 6cc0068430d0a4abdef0b466d422e6a4d154a5fe)
2014-04-04Use correct length when prompting for password.Dr. Stephen Henson
Use bufsiz - 1 not BUFSIZ - 1 when prompting for a password in the openssl utility. Thanks to Rob Mackinnon, Leviathan Security for reporting this issue. (cherry picked from commit 7ba08a4d73c1bdfd3aced09a628b1d7d7747cdca)