1. 28 6月, 2016 1 次提交
  2. 16 6月, 2016 1 次提交
  3. 18 5月, 2016 1 次提交
  4. 03 5月, 2016 2 次提交
    • M
      Ensure EVP_EncodeUpdate handles an output length that is too long · 2bd5d70c
      Matt Caswell 提交于
      With the EVP_EncodeUpdate function it is the caller's responsibility to
      determine how big the output buffer should be. The function writes the
      amount actually used to |*outl|. However this could go negative with a
      sufficiently large value for |inl|. We add a check for this error
      condition.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      2bd5d70c
    • M
      Avoid overflow in EVP_EncodeUpdate · ee1e3cac
      Matt Caswell 提交于
      An overflow can occur in the EVP_EncodeUpdate function which is used for
      Base64 encoding of binary data. If an attacker is able to supply very large
      amounts of input data then a length check can overflow resulting in a heap
      corruption. Due to the very large amounts of data involved this will most
      likely result in a crash.
      
      Internally to OpenSSL the EVP_EncodeUpdate function is primarly used by the
      PEM_write_bio* family of functions. These are mainly used within the
      OpenSSL command line applications, so any application which processes
      data from an untrusted source and outputs it as a PEM file should be
      considered vulnerable to this issue.
      
      User applications that call these APIs directly with large amounts of
      untrusted data may also be vulnerable.
      
      Issue reported by Guido Vranken.
      
      CVE-2016-2105
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      ee1e3cac
  5. 09 2月, 2016 1 次提交
  6. 27 1月, 2016 1 次提交
    • R
      Remove /* foo.c */ comments · 34980760
      Rich Salz 提交于
      This was done by the following
              find . -name '*.[ch]' | /tmp/pl
      where /tmp/pl is the following three-line script:
              print unless $. == 1 && m@/\* .*\.[ch] \*/@;
              close ARGV if eof; # Close file to reset $.
      
      And then some hand-editing of other files.
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      34980760
  7. 11 12月, 2015 1 次提交
  8. 19 9月, 2015 1 次提交
  9. 18 9月, 2015 2 次提交
  10. 14 5月, 2015 1 次提交
  11. 01 5月, 2015 1 次提交
  12. 24 1月, 2015 1 次提交
    • R
      ifdef cleanup, part 4a: '#ifdef undef' · a2b18e65
      Rich Salz 提交于
      This removes all code surrounded by '#ifdef undef'
      One case is left: memmove() replaced by open-coded for loop,
      in crypto/stack/stack.c  That needs further review.
      
      Also removed a couple of instances of /* dead code */ if I saw them
      while doing the main removal.
      Reviewed-by: NMatt Caswell <matt@openssl.org>
      a2b18e65
  13. 22 1月, 2015 1 次提交
  14. 31 12月, 2014 1 次提交
  15. 07 5月, 2014 1 次提交
  16. 06 9月, 2013 1 次提交
  17. 12 6月, 2010 1 次提交
  18. 12 11月, 2008 1 次提交
  19. 02 11月, 2008 1 次提交
  20. 13 10月, 2007 1 次提交
  21. 21 6月, 2005 1 次提交
  22. 04 4月, 2005 1 次提交
  23. 16 3月, 2004 1 次提交
  24. 30 10月, 2003 1 次提交
    • G
      A general spring-cleaning (in autumn) to fix up signed/unsigned warnings. · 27545970
      Geoff Thorpe 提交于
      I have tried to convert 'len' type variable declarations to unsigned as a
      means to address these warnings when appropriate, but when in doubt I have
      used casts in the comparisons instead. The better solution (that would get
      us all lynched by API users) would be to go through and convert all the
      function prototypes and structure definitions to use unsigned variables
      except when signed is necessary. The proliferation of (signed) "int" for
      strictly non-negative uses is unfortunate.
      27545970
  25. 13 11月, 2002 1 次提交
  26. 15 4月, 2002 1 次提交
  27. 11 8月, 2000 1 次提交
    • R
      Abdelilah Essiari <aes@george.lbl.gov> reports that for very small · 35140f33
      Richard Levitte 提交于
      records, EVP_EncodeUpdate() may misbehave.  This happens when there's
      a record boundary between the two ending b64 equal signs, which makes
      EVP_EncodeUpdate think there has been more than one EOF, and therefore
      add an extra NUL at the end of the output buffer.  This fix corrects
      that problem.
      35140f33
  28. 06 9月, 1999 1 次提交
  29. 19 8月, 1999 1 次提交
  30. 15 8月, 1999 1 次提交
  31. 14 8月, 1999 1 次提交
  32. 05 6月, 1999 1 次提交
  33. 24 4月, 1999 1 次提交
  34. 20 4月, 1999 1 次提交
  35. 21 12月, 1998 2 次提交