1. 29 2月, 2016 3 次提交
  2. 27 2月, 2016 3 次提交
  3. 26 2月, 2016 2 次提交
  4. 25 2月, 2016 2 次提交
    • E
      CVE-2016-0798: avoid memory leak in SRP · 380f18ed
      Emilia Kasper 提交于
      The SRP user database lookup method SRP_VBASE_get_by_user had confusing
      memory management semantics; the returned pointer was sometimes newly
      allocated, and sometimes owned by the callee. The calling code has no
      way of distinguishing these two cases.
      
      Specifically, SRP servers that configure a secret seed to hide valid
      login information are vulnerable to a memory leak: an attacker
      connecting with an invalid username can cause a memory leak of around
      300 bytes per connection.
      
      Servers that do not configure SRP, or configure SRP but do not configure
      a seed are not vulnerable.
      
      In Apache, the seed directive is known as SSLSRPUnknownUserSeed.
      
      To mitigate the memory leak, the seed handling in SRP_VBASE_get_by_user
      is now disabled even if the user has configured a seed.
      
      Applications are advised to migrate to SRP_VBASE_get1_by_user. However,
      note that OpenSSL makes no strong guarantees about the
      indistinguishability of valid and invalid logins. In particular,
      computations are currently not carried out in constant time.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      380f18ed
    • R
      GH235: Set error status on malloc failure · 72e9be3d
      Rich Salz 提交于
      Reviewed-by: NEmilia Käsper <emilia@openssl.org>
      72e9be3d
  5. 23 2月, 2016 5 次提交
  6. 22 2月, 2016 1 次提交
  7. 20 2月, 2016 1 次提交
    • E
      TLS: reject duplicate extensions · aa474d1f
      Emilia Kasper 提交于
      Adapted from BoringSSL. Added a test.
      
      The extension parsing code is already attempting to already handle this for
      some individual extensions, but it is doing so inconsistently. Duplicate
      efforts in individual extension parsing will be cleaned up in a follow-up.
      Reviewed-by: NStephen Henson <steve@openssl.org>
      aa474d1f
  8. 19 2月, 2016 2 次提交
  9. 18 2月, 2016 2 次提交
    • D
      Finish 02f7114a · 3ba84717
      David Woodhouse 提交于
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      3ba84717
    • R
      RT4310: Fix varous no-XXX builds · 1288f26f
      Rich Salz 提交于
      When OPENSSL_NO_ASYNC is set, make ASYNC_{un,}block_pause() do nothing.
      This prevents md_rand.c from failing to build. Probably better to do it
      this way than to wrap every instance in an explicit #ifdef.
      
      A bunch of new socket code got added to a new file crypto/bio/b_addr.c.
      Make it all go away if OPENSSL_NO_SOCK is defined.
      
      Allow configuration with no-ripemd, no-ts, no-ui
      We use these for the UEFI build.
      
      Also remove the 'Really???' comment from no-err and no-locking. We use
      those too.
      
      We need to drop the crypto/engine directory from the build too, and also
      set OPENSSL_NO_ENGINE
      Signed-off-by: NRich Salz <rsalz@openssl.org>
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      1288f26f
  10. 17 2月, 2016 3 次提交
  11. 16 2月, 2016 2 次提交
  12. 15 2月, 2016 1 次提交
  13. 13 2月, 2016 3 次提交
  14. 12 2月, 2016 2 次提交
  15. 11 2月, 2016 7 次提交
  16. 10 2月, 2016 1 次提交