1. 09 5月, 2014 1 次提交
  2. 08 5月, 2014 1 次提交
  3. 07 5月, 2014 2 次提交
    • G
      evp: prevent underflow in base64 decoding · fce38211
      Geoff Thorpe 提交于
      This patch resolves RT ticket #2608.
      
      Thanks to Robert Dugal for originally spotting this, and to David
      Ramos for noticing that the ball had been dropped.
      Signed-off-by: NGeoff Thorpe <geoff@openssl.org>
      fce38211
    • G
      bignum: allow concurrent BN_MONT_CTX_set_locked() · 12e9f627
      Geoff Thorpe 提交于
      The lazy-initialisation of BN_MONT_CTX was serialising all threads, as
      noted by Daniel Sands and co at Sandia. This was to handle the case that
      2 or more threads race to lazy-init the same context, but stunted all
      scalability in the case where 2 or more threads are doing unrelated
      things! We favour the latter case by punishing the former. The init work
      gets done by each thread that finds the context to be uninitialised, and
      we then lock the "set" logic after that work is done - the winning
      thread's work gets used, the losing threads throw away what they've done.
      Signed-off-by: NGeoff Thorpe <geoff@openssl.org>
      12e9f627
  4. 06 5月, 2014 3 次提交
  5. 04 5月, 2014 6 次提交
  6. 02 5月, 2014 1 次提交
  7. 30 4月, 2014 1 次提交
    • G
      bignum: fix boundary condition in montgomery logic · a5292618
      Geoff Thorpe 提交于
      It's not clear whether this inconsistency could lead to an actual
      computation error, but it involved a BIGNUM being passed around the
      montgomery logic in an inconsistent state. This was found using flags
      -DBN_DEBUG -DBN_DEBUG_RAND, and working backwards from this assertion
      in 'ectest';
      
      ectest: bn_mul.c:960: BN_mul: Assertion `(_bnum2->top == 0) ||
      (_bnum2->d[_bnum2->top - 1] != 0)' failed
      Signed-off-by: NGeoff Thorpe <geoff@openssl.org>
      a5292618
  8. 26 4月, 2014 2 次提交
  9. 24 4月, 2014 2 次提交
  10. 22 4月, 2014 1 次提交
  11. 16 4月, 2014 1 次提交
  12. 09 4月, 2014 1 次提交
  13. 08 4月, 2014 1 次提交
    • D
      Return if ssleay_rand_add called with zero num. · f74fa33b
      Dr. Stephen Henson 提交于
      Treat a zero length passed to ssleay_rand_add a no op: the existing logic
      zeroes the md value which is very bad. OpenSSL itself never does this
      internally and the actual call doesn't make sense as it would be passing
      zero bytes of entropy.
      
      Thanks to Marcus Meissner <meissner@suse.de> for reporting this bug.
      (cherry picked from commit 5be1ae28ef3c4bdec95b94f14e0e939157be550a)
      f74fa33b
  14. 06 4月, 2014 2 次提交
  15. 03 4月, 2014 1 次提交
    • E
      Fix base64 decoding bug. · 10378fb5
      Eric Young 提交于
      A short PEM encoded sequence if passed to the BIO, and the file
      had 2 \n following would fail.
      
      PR#3289
      10378fb5
  16. 01 4月, 2014 1 次提交
  17. 28 3月, 2014 1 次提交
  18. 20 3月, 2014 1 次提交
  19. 12 3月, 2014 1 次提交
    • D
      Fix for CVE-2014-0076 · f9b6c0ba
      Dr. Stephen Henson 提交于
      Fix for the attack described in the paper "Recovering OpenSSL
      ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack"
      by Yuval Yarom and Naomi Benger. Details can be obtained from:
      http://eprint.iacr.org/2014/140
      
      Thanks to Yuval Yarom and Naomi Benger for discovering this
      flaw and to Yuval Yarom for supplying a fix.
      (cherry picked from commit 2198be3483259de374f91e57d247d0fc667aef29)
      
      Conflicts:
      
      	CHANGES
      f9b6c0ba
  20. 07 3月, 2014 1 次提交
    • A
      SPARC T4 assembly pack: treat zero input length in CBC. · 5e44c144
      Andy Polyakov 提交于
      The problem is that OpenSSH calls EVP_Cipher, which is not as
      protective as EVP_CipherUpdate. Formally speaking we ought to
      do more checks in *_cipher methods, including rejecting
      lengths not divisible by block size (unless ciphertext stealing
      is in place). But for now I implement check for zero length in
      low-level based on precedent.
      
      PR: 3087, 2775
      5e44c144
  21. 06 3月, 2014 2 次提交
  22. 04 3月, 2014 1 次提交
  23. 02 3月, 2014 2 次提交
    • D
      PKCS#8 support for alternative PRFs. · 5693a308
      Dr. Stephen Henson 提交于
      Add option to set an alternative to the default hmacWithSHA1 PRF
      for PKCS#8 private key encryptions. This is used automatically
      by PKCS8_encrypt if the nid specified is a PRF.
      
      Add option to pkcs8 utility.
      
      Update docs.
      (cherry picked from commit b60272b01fcb4f69201b3e1659b4f7e9e9298dfb)
      5693a308
    • D
      Fix memory leak. · 01757858
      Dr. Stephen Henson 提交于
      (cherry picked from commit 124d218889dfca33d277404612f1319afe04107e)
      01757858
  24. 27 2月, 2014 4 次提交