1. 24 6月, 2015 1 次提交
  2. 14 5月, 2015 1 次提交
  3. 05 5月, 2015 1 次提交
    • R
      Use safer sizeof variant in malloc · b4faea50
      Rich Salz 提交于
      For a local variable:
              TYPE *p;
      Allocations like this are "risky":
              p = OPENSSL_malloc(sizeof(TYPE));
      if the type of p changes, and the malloc call isn't updated, you
      could get memory corruption.  Instead do this:
              p = OPENSSL_malloc(sizeof(*p));
      Also fixed a few memset() calls that I noticed while doing this.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      b4faea50
  4. 01 5月, 2015 1 次提交
    • R
      free cleanup almost the finale · 4b45c6e5
      Rich Salz 提交于
      Add OPENSSL_clear_free which merges cleanse and free.
      (Names was picked to be similar to BN_clear_free, etc.)
      Removed OPENSSL_freeFunc macro.
      Fixed the small simple ones that are left:
              CRYPTO_free CRYPTO_free_locked OPENSSL_free_locked
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      4b45c6e5
  5. 27 3月, 2015 1 次提交
    • D
      Simplify DSA public key handling. · ea6b07b5
      Dr. Stephen Henson 提交于
      DSA public keys could exist in two forms: a single Integer type or a
      SEQUENCE containing the parameters and public key with a field called
      "write_params" deciding which form to use. These forms are non standard
      and were only used by functions containing "DSAPublicKey" in the name.
      
      Simplify code to only use the parameter form and encode the public key
      component directly in the DSA public key method.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      ea6b07b5
  6. 22 1月, 2015 1 次提交
  7. 05 1月, 2015 1 次提交
    • D
      Fix various certificate fingerprint issues. · 684400ce
      Dr. Stephen Henson 提交于
      By using non-DER or invalid encodings outside the signed portion of a
      certificate the fingerprint can be changed without breaking the signature.
      Although no details of the signed portion of the certificate can be changed
      this can cause problems with some applications: e.g. those using the
      certificate fingerprint for blacklists.
      
      1. Reject signatures with non zero unused bits.
      
      If the BIT STRING containing the signature has non zero unused bits reject
      the signature. All current signature algorithms require zero unused bits.
      
      2. Check certificate algorithm consistency.
      
      Check the AlgorithmIdentifier inside TBS matches the one in the
      certificate signature. NB: this will result in signature failure
      errors for some broken certificates.
      
      3. Check DSA/ECDSA signatures use DER.
      
      Reencode DSA/ECDSA signatures and compare with the original received
      signature. Return an error if there is a mismatch.
      
      This will reject various cases including garbage after signature
      (thanks to Antti Karjalainen and Tuomo Untinen from the Codenomicon CROSS
      program for discovering this case) and use of BER or invalid ASN.1 INTEGERs
      (negative or with leading zeroes).
      
      CVE-2014-8275
      Reviewed-by: NEmilia Käsper <emilia@openssl.org>
      684400ce
  8. 31 12月, 2014 1 次提交
  9. 14 2月, 2011 1 次提交
  10. 26 1月, 2011 1 次提交
  11. 06 9月, 2009 1 次提交
    • D
      PR: 1644 · f4274da1
      Dr. Stephen Henson 提交于
      Submitted by: steve@openssl.org
      
      Fix to make DHparams_dup() et al work in C++.
      
      For 1.0 fix the final argument to ASN1_dup() so it is void *. Replace some
      *_dup macros with functions.
      f4274da1
  12. 15 4月, 2009 1 次提交
  13. 06 11月, 2008 1 次提交
  14. 02 9月, 2005 1 次提交
  15. 23 2月, 2001 1 次提交
  16. 09 12月, 2000 1 次提交
    • D
      · 9d6b1ce6
      Dr. Stephen Henson 提交于
      Merge from the ASN1 branch of new ASN1 code
      to main trunk.
      
      Lets see if the makes it to openssl-cvs :-)
      9d6b1ce6
  17. 19 11月, 2000 1 次提交
  18. 07 11月, 2000 1 次提交
  19. 02 6月, 2000 1 次提交
    • R
      There have been a number of complaints from a number of sources that names · 26a3a48d
      Richard Levitte 提交于
      like Malloc, Realloc and especially Free conflict with already existing names
      on some operating systems or other packages.  That is reason enough to change
      the names of the OpenSSL memory allocation macros to something that has a
      better chance of being unique, like prepending them with OPENSSL_.
      
      This change includes all the name changes needed throughout all C files.
      26a3a48d
  20. 20 10月, 1999 1 次提交
  21. 24 4月, 1999 1 次提交
  22. 20 4月, 1999 1 次提交
  23. 10 4月, 1999 1 次提交