1. 27 6月, 2016 2 次提交
  2. 18 5月, 2016 1 次提交
  3. 17 5月, 2016 1 次提交
  4. 03 5月, 2016 1 次提交
    • M
      Fix encrypt overflow · 3f358213
      Matt Caswell 提交于
      An overflow can occur in the EVP_EncryptUpdate function. If an attacker is
      able to supply very large amounts of input data after a previous call to
      EVP_EncryptUpdate with a partial block then a length check can overflow
      resulting in a heap corruption.
      
      Following an analysis of all OpenSSL internal usage of the
      EVP_EncryptUpdate function all usage is one of two forms.
      
      The first form is like this:
      EVP_EncryptInit()
      EVP_EncryptUpdate()
      
      i.e. where the EVP_EncryptUpdate() call is known to be the first called
      function after an EVP_EncryptInit(), and therefore that specific call
      must be safe.
      
      The second form is where the length passed to EVP_EncryptUpdate() can be
      seen from the code to be some small value and therefore there is no
      possibility of an overflow.
      
      Since all instances are one of these two forms, I believe that there can
      be no overflows in internal code due to this problem.
      
      It should be noted that EVP_DecryptUpdate() can call EVP_EncryptUpdate()
      in certain code paths. Also EVP_CipherUpdate() is a synonym for
      EVP_EncryptUpdate(). Therefore I have checked all instances of these
      calls too, and came to the same conclusion, i.e. there are no instances
      in internal usage where an overflow could occur.
      
      This could still represent a security issue for end user code that calls
      this function directly.
      
      CVE-2016-2106
      
      Issue reported by Guido Vranken.
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      3f358213
  5. 21 3月, 2016 1 次提交
  6. 26 2月, 2016 1 次提交
  7. 06 2月, 2016 1 次提交
  8. 27 1月, 2016 1 次提交
    • R
      Remove /* foo.c */ comments · 34980760
      Rich Salz 提交于
      This was done by the following
              find . -name '*.[ch]' | /tmp/pl
      where /tmp/pl is the following three-line script:
              print unless $. == 1 && m@/\* .*\.[ch] \*/@;
              close ARGV if eof; # Close file to reset $.
      
      And then some hand-editing of other files.
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      34980760
  9. 12 1月, 2016 4 次提交
  10. 10 12月, 2015 1 次提交
  11. 10 11月, 2015 1 次提交
  12. 03 9月, 2015 1 次提交
  13. 11 8月, 2015 1 次提交
  14. 14 5月, 2015 2 次提交
  15. 06 5月, 2015 1 次提交
  16. 05 5月, 2015 1 次提交
    • R
      Use safer sizeof variant in malloc · b4faea50
      Rich Salz 提交于
      For a local variable:
              TYPE *p;
      Allocations like this are "risky":
              p = OPENSSL_malloc(sizeof(TYPE));
      if the type of p changes, and the malloc call isn't updated, you
      could get memory corruption.  Instead do this:
              p = OPENSSL_malloc(sizeof(*p));
      Also fixed a few memset() calls that I noticed while doing this.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      b4faea50
  17. 01 5月, 2015 1 次提交
  18. 28 3月, 2015 1 次提交
    • R
      free NULL cleanup · c5ba2d99
      Rich Salz 提交于
      EVP_.*free; this gets:
              EVP_CIPHER_CTX_free EVP_PKEY_CTX_free EVP_PKEY_asn1_free
              EVP_PKEY_asn1_set_free EVP_PKEY_free EVP_PKEY_free_it
              EVP_PKEY_meth_free; and also EVP_CIPHER_CTX_cleanup
      Reviewed-by: NKurt Roeckx <kurt@openssl.org>
      c5ba2d99
  19. 29 1月, 2015 1 次提交
  20. 22 1月, 2015 1 次提交
  21. 17 12月, 2014 2 次提交
  22. 15 10月, 2014 1 次提交
  23. 24 9月, 2014 1 次提交
  24. 18 7月, 2013 1 次提交
    • D
      EVP support for wrapping algorithms. · 97cf1f6c
      Dr. Stephen Henson 提交于
      Add support for key wrap algorithms via EVP interface.
      
      Generalise AES wrap algorithm and add to modes, making existing
      AES wrap algorithm a special case.
      
      Move test code to evptests.txt
      97cf1f6c
  25. 11 2月, 2012 1 次提交
  26. 13 10月, 2011 1 次提交
  27. 22 3月, 2011 1 次提交
  28. 08 2月, 2011 1 次提交
  29. 07 2月, 2011 1 次提交
  30. 12 10月, 2010 1 次提交
    • D
      PR: 2295 · 776654ad
      Dr. Stephen Henson 提交于
      Submitted by: Alexei Khlebnikov <alexei.khlebnikov@opera.com>
      Reviewed by: steve
      
      OOM checking. Leak in OOM fix. Fall-through comment. Duplicate code
      elimination.
      776654ad
  31. 29 7月, 2010 1 次提交
  32. 28 7月, 2010 1 次提交
  33. 01 3月, 2010 1 次提交
  34. 07 2月, 2010 1 次提交