1. 16 5月, 2015 1 次提交
  2. 13 5月, 2015 1 次提交
  3. 07 5月, 2015 1 次提交
  4. 06 5月, 2015 1 次提交
    • G
      Initialize potentially uninitialized local variables · 4c9b0a03
      Gunnar Kudrjavets 提交于
      Compiling OpenSSL code with MSVC and /W4 results in a number of warnings.
      One category of warnings is particularly interesting - C4701 (potentially
      uninitialized local variable 'name' used). This warning pretty much means
      that there's a code path which results in uninitialized variables being used
      or returned. Depending on compiler, its options, OS, values in registers
      and/or stack, the results can be nondeterministic. Cases like this are very
      hard to debug so it's rational to fix these issues.
      
      This patch contains a set of trivial fixes for all the C4701 warnings (just
      initializing variables to 0 or NULL or appropriate error code) to make sure
      that deterministic values will be returned from all the execution paths.
      
      RT#3835
      Signed-off-by: NMatt Caswell <matt@openssl.org>
      
      Matt's note: All of these appear to be bogus warnings, i.e. there isn't
      actually a code path where an unitialised variable could be used - its just
      that the compiler hasn't been able to figure that out from the logic. So
      this commit is just about silencing spurious warnings.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      4c9b0a03
  5. 03 5月, 2015 1 次提交
  6. 01 5月, 2015 2 次提交
  7. 17 4月, 2015 1 次提交
  8. 26 3月, 2015 3 次提交
  9. 25 3月, 2015 1 次提交
  10. 23 3月, 2015 2 次提交
  11. 19 3月, 2015 1 次提交
    • D
      Fix for CVE-2015-0291 · 34e3edbf
      Dr. Stephen Henson 提交于
      If a client renegotiates using an invalid signature algorithms extension
      it will crash a server with a NULL pointer dereference.
      
      Thanks to David Ramos of Stanford University for reporting this bug.
      
      CVE-2015-0291
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      34e3edbf
  12. 12 3月, 2015 1 次提交
    • M
      SSL_check_chain fix · d813f9eb
      Matt Caswell 提交于
      If SSL_check_chain is called with a NULL X509 object or a NULL EVP_PKEY
      or the type of the public key is unrecognised then the local variable
      |cpk| in tls1_check_chain does not get initialised. Subsequently an
      attempt is made to deref it (after the "end" label), and a seg fault will
      result.
      Reviewed-by: NDr. Stephen Henson <steve@openssl.org>
      d813f9eb
  13. 11 3月, 2015 1 次提交
  14. 06 2月, 2015 1 次提交
  15. 03 2月, 2015 1 次提交
  16. 29 1月, 2015 1 次提交
  17. 28 1月, 2015 1 次提交
    • R
      OPENSSL_NO_xxx cleanup: SHA · 474e469b
      Rich Salz 提交于
      Remove support for SHA0 and DSS0 (they were broken), and remove
      the ability to attempt to build without SHA (it didn't work).
      For simplicity, remove the option of not building various SHA algorithms;
      you could argue that SHA_224/256/384/512 should be kept, since they're
      like crypto algorithms, but I decided to go the other way.
      So these options are gone:
      	GENUINE_DSA         OPENSSL_NO_SHA0
      	OPENSSL_NO_SHA      OPENSSL_NO_SHA1
      	OPENSSL_NO_SHA224   OPENSSL_NO_SHA256
      	OPENSSL_NO_SHA384   OPENSSL_NO_SHA512
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      474e469b
  18. 24 1月, 2015 1 次提交
  19. 22 1月, 2015 4 次提交
  20. 05 1月, 2015 1 次提交
  21. 03 1月, 2015 1 次提交
  22. 31 12月, 2014 2 次提交
  23. 16 12月, 2014 1 次提交
  24. 11 12月, 2014 2 次提交
  25. 08 12月, 2014 1 次提交
  26. 06 12月, 2014 1 次提交
  27. 05 12月, 2014 2 次提交
    • E
      Add extra checks for odd-length EC curve lists. · 740580c2
      Emilia Kasper 提交于
      Odd-length lists should be rejected everywhere upon parsing. Nevertheless,
      be extra careful and add guards against off-by-one reads.
      
      Also, drive-by replace inexplicable double-negation with an explicit comparison.
      Reviewed-by: NMatt Caswell <matt@openssl.org>
      740580c2
    • E
      Reject elliptic curve lists of odd lengths. · 33d5ba86
      Emilia Kasper 提交于
      The Supported Elliptic Curves extension contains a vector of NamedCurves
      of 2 bytes each, so the total length must be even. Accepting odd-length
      lists was observed to lead to a non-exploitable one-byte out-of-bounds
      read in the latest development branches (1.0.2 and master). Released
      versions of OpenSSL are not affected.
      
      Thanks to Felix Groebert of the Google Security Team for reporting this issue.
      Reviewed-by: NMatt Caswell <matt@openssl.org>
      33d5ba86
  28. 21 11月, 2014 1 次提交
  29. 20 11月, 2014 2 次提交