1. 08 2月, 2016 1 次提交
    • M
      Handle SSL_shutdown while in init more appropriately #2 · 64f9f406
      Matt Caswell 提交于
      Previous commit 7bb196a7 attempted to "fix" a problem with the way
      SSL_shutdown() behaved whilst in mid-handshake. The original behaviour had
      SSL_shutdown() return immediately having taken no action if called mid-
      handshake with a return value of 1 (meaning everything was shutdown
      successfully). In fact the shutdown has not been successful.
      
      Commit 7bb196a7 changed that to send a close_notify anyway and then
      return. This seems to be causing some problems for some applications so
      perhaps a better (much simpler) approach is revert to the previous
      behaviour (no attempt at a shutdown), but return -1 (meaning the shutdown
      was not successful).
      
      This also fixes a bug where SSL_shutdown always returns 0 when shutdown
      *very* early in the handshake (i.e. we are still using SSLv23_method).
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      64f9f406
  2. 07 2月, 2016 1 次提交
  3. 06 2月, 2016 4 次提交
  4. 05 2月, 2016 5 次提交
  5. 04 2月, 2016 11 次提交
  6. 03 2月, 2016 2 次提交
  7. 01 2月, 2016 5 次提交
  8. 31 1月, 2016 5 次提交
  9. 29 1月, 2016 3 次提交
  10. 28 1月, 2016 3 次提交
    • M
      Prevent small subgroup attacks on DH/DHE · b128abc3
      Matt Caswell 提交于
      Historically OpenSSL only ever generated DH parameters based on "safe"
      primes. More recently (in version 1.0.2) support was provided for
      generating X9.42 style parameter files such as those required for RFC
      5114 support. The primes used in such files may not be "safe". Where an
      application is using DH configured with parameters based on primes that
      are not "safe" then an attacker could use this fact to find a peer's
      private DH exponent. This attack requires that the attacker complete
      multiple handshakes in which the peer uses the same DH exponent.
      
      A simple mitigation is to ensure that y^q (mod p) == 1
      
      CVE-2016-0701
      
      Issue reported by Antonio Sanso.
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      b128abc3
    • R
      Fix typo in md2.h · 3444c36a
      Rich Salz 提交于
      Reviewed-by: NMatt Caswell <matt@openssl.org>
      3444c36a
    • R
      Add CRYPTO_secure_zalloc · 3538c7da
      Rich Salz 提交于
      Also turn B<foo> into foo() in the pod page.
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      3538c7da