1. 01 5月, 2015 1 次提交
    • R
      free NULL cleanup 5a · 222561fe
      Rich Salz 提交于
      Don't check for NULL before calling a free routine.  This gets X509_.*free:
          x509_name_ex_free X509_policy_tree_free X509_VERIFY_PARAM_free
          X509_STORE_free X509_STORE_CTX_free X509_PKEY_free
          X509_OBJECT_free_contents X509_LOOKUP_free X509_INFO_free
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      222561fe
  2. 17 4月, 2015 1 次提交
  3. 26 3月, 2015 3 次提交
  4. 25 3月, 2015 1 次提交
  5. 23 3月, 2015 2 次提交
  6. 19 3月, 2015 1 次提交
    • D
      Fix for CVE-2015-0291 · 34e3edbf
      Dr. Stephen Henson 提交于
      If a client renegotiates using an invalid signature algorithms extension
      it will crash a server with a NULL pointer dereference.
      
      Thanks to David Ramos of Stanford University for reporting this bug.
      
      CVE-2015-0291
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      34e3edbf
  7. 12 3月, 2015 1 次提交
    • M
      SSL_check_chain fix · d813f9eb
      Matt Caswell 提交于
      If SSL_check_chain is called with a NULL X509 object or a NULL EVP_PKEY
      or the type of the public key is unrecognised then the local variable
      |cpk| in tls1_check_chain does not get initialised. Subsequently an
      attempt is made to deref it (after the "end" label), and a seg fault will
      result.
      Reviewed-by: NDr. Stephen Henson <steve@openssl.org>
      d813f9eb
  8. 11 3月, 2015 1 次提交
  9. 06 2月, 2015 1 次提交
  10. 03 2月, 2015 1 次提交
  11. 29 1月, 2015 1 次提交
  12. 28 1月, 2015 1 次提交
    • R
      OPENSSL_NO_xxx cleanup: SHA · 474e469b
      Rich Salz 提交于
      Remove support for SHA0 and DSS0 (they were broken), and remove
      the ability to attempt to build without SHA (it didn't work).
      For simplicity, remove the option of not building various SHA algorithms;
      you could argue that SHA_224/256/384/512 should be kept, since they're
      like crypto algorithms, but I decided to go the other way.
      So these options are gone:
      	GENUINE_DSA         OPENSSL_NO_SHA0
      	OPENSSL_NO_SHA      OPENSSL_NO_SHA1
      	OPENSSL_NO_SHA224   OPENSSL_NO_SHA256
      	OPENSSL_NO_SHA384   OPENSSL_NO_SHA512
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      474e469b
  13. 24 1月, 2015 1 次提交
  14. 22 1月, 2015 4 次提交
  15. 05 1月, 2015 1 次提交
  16. 03 1月, 2015 1 次提交
  17. 31 12月, 2014 2 次提交
  18. 16 12月, 2014 1 次提交
  19. 11 12月, 2014 2 次提交
  20. 08 12月, 2014 1 次提交
  21. 06 12月, 2014 1 次提交
  22. 05 12月, 2014 2 次提交
    • E
      Add extra checks for odd-length EC curve lists. · 740580c2
      Emilia Kasper 提交于
      Odd-length lists should be rejected everywhere upon parsing. Nevertheless,
      be extra careful and add guards against off-by-one reads.
      
      Also, drive-by replace inexplicable double-negation with an explicit comparison.
      Reviewed-by: NMatt Caswell <matt@openssl.org>
      740580c2
    • E
      Reject elliptic curve lists of odd lengths. · 33d5ba86
      Emilia Kasper 提交于
      The Supported Elliptic Curves extension contains a vector of NamedCurves
      of 2 bytes each, so the total length must be even. Accepting odd-length
      lists was observed to lead to a non-exploitable one-byte out-of-bounds
      read in the latest development branches (1.0.2 and master). Released
      versions of OpenSSL are not affected.
      
      Thanks to Felix Groebert of the Google Security Team for reporting this issue.
      Reviewed-by: NMatt Caswell <matt@openssl.org>
      33d5ba86
  23. 21 11月, 2014 1 次提交
  24. 20 11月, 2014 2 次提交
  25. 19 11月, 2014 2 次提交
  26. 18 11月, 2014 3 次提交
  27. 24 10月, 2014 1 次提交