1. 24 10月, 2015 1 次提交
  2. 07 10月, 2015 1 次提交
  3. 06 10月, 2015 2 次提交
  4. 18 9月, 2015 1 次提交
  5. 07 9月, 2015 1 次提交
  6. 15 8月, 2015 1 次提交
  7. 14 8月, 2015 1 次提交
  8. 11 8月, 2015 1 次提交
  9. 03 8月, 2015 1 次提交
  10. 30 7月, 2015 3 次提交
  11. 28 7月, 2015 1 次提交
  12. 18 7月, 2015 1 次提交
  13. 12 6月, 2015 1 次提交
  14. 10 6月, 2015 1 次提交
    • M
      Tighten extension handling · 54e3ad00
      Matt Caswell 提交于
      This adds additional checks to the processing of extensions in a ClientHello
      to ensure that either no extensions are present, or if they are then they
      take up the exact amount of space expected.
      
      With thanks to the Open Crypto Audit Project for reporting this issue.
      Reviewed-by: NStephen Henson <steve@openssl.org>
      54e3ad00
  15. 05 6月, 2015 1 次提交
  16. 26 5月, 2015 1 次提交
  17. 23 5月, 2015 1 次提交
  18. 20 5月, 2015 1 次提交
  19. 19 5月, 2015 4 次提交
  20. 16 5月, 2015 1 次提交
  21. 13 5月, 2015 1 次提交
  22. 07 5月, 2015 1 次提交
  23. 06 5月, 2015 1 次提交
    • G
      Initialize potentially uninitialized local variables · 4c9b0a03
      Gunnar Kudrjavets 提交于
      Compiling OpenSSL code with MSVC and /W4 results in a number of warnings.
      One category of warnings is particularly interesting - C4701 (potentially
      uninitialized local variable 'name' used). This warning pretty much means
      that there's a code path which results in uninitialized variables being used
      or returned. Depending on compiler, its options, OS, values in registers
      and/or stack, the results can be nondeterministic. Cases like this are very
      hard to debug so it's rational to fix these issues.
      
      This patch contains a set of trivial fixes for all the C4701 warnings (just
      initializing variables to 0 or NULL or appropriate error code) to make sure
      that deterministic values will be returned from all the execution paths.
      
      RT#3835
      Signed-off-by: NMatt Caswell <matt@openssl.org>
      
      Matt's note: All of these appear to be bogus warnings, i.e. there isn't
      actually a code path where an unitialised variable could be used - its just
      that the compiler hasn't been able to figure that out from the logic. So
      this commit is just about silencing spurious warnings.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      4c9b0a03
  24. 03 5月, 2015 1 次提交
  25. 01 5月, 2015 2 次提交
  26. 17 4月, 2015 1 次提交
  27. 26 3月, 2015 3 次提交
  28. 25 3月, 2015 1 次提交
  29. 23 3月, 2015 2 次提交
  30. 19 3月, 2015 1 次提交
    • D
      Fix for CVE-2015-0291 · 34e3edbf
      Dr. Stephen Henson 提交于
      If a client renegotiates using an invalid signature algorithms extension
      it will crash a server with a NULL pointer dereference.
      
      Thanks to David Ramos of Stanford University for reporting this bug.
      
      CVE-2015-0291
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      34e3edbf