1. 18 5月, 2016 2 次提交
  2. 06 5月, 2016 1 次提交
    • M
      Handle no async jobs in libssl · fc7f190c
      Matt Caswell 提交于
      If the application has limited the size of the async pool using
      ASYNC_init_thread() then we could run out of jobs while trying to start a
      libssl io operation. However libssl was failing to handle this and treating
      it like a fatal error. It should not be fatal...we just need to retry when
      there are jobs available again.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      fc7f190c
  3. 29 4月, 2016 1 次提交
  4. 16 4月, 2016 1 次提交
  5. 06 4月, 2016 1 次提交
  6. 22 3月, 2016 2 次提交
  7. 18 3月, 2016 1 次提交
  8. 10 3月, 2016 1 次提交
  9. 09 3月, 2016 1 次提交
  10. 08 3月, 2016 7 次提交
  11. 01 3月, 2016 1 次提交
  12. 28 2月, 2016 3 次提交
  13. 25 2月, 2016 2 次提交
    • E
      CVE-2016-0798: avoid memory leak in SRP · 380f18ed
      Emilia Kasper 提交于
      The SRP user database lookup method SRP_VBASE_get_by_user had confusing
      memory management semantics; the returned pointer was sometimes newly
      allocated, and sometimes owned by the callee. The calling code has no
      way of distinguishing these two cases.
      
      Specifically, SRP servers that configure a secret seed to hide valid
      login information are vulnerable to a memory leak: an attacker
      connecting with an invalid username can cause a memory leak of around
      300 bytes per connection.
      
      Servers that do not configure SRP, or configure SRP but do not configure
      a seed are not vulnerable.
      
      In Apache, the seed directive is known as SSLSRPUnknownUserSeed.
      
      To mitigate the memory leak, the seed handling in SRP_VBASE_get_by_user
      is now disabled even if the user has configured a seed.
      
      Applications are advised to migrate to SRP_VBASE_get1_by_user. However,
      note that OpenSSL makes no strong guarantees about the
      indistinguishability of valid and invalid logins. In particular,
      computations are currently not carried out in constant time.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      380f18ed
    • F
      GH480: Don't break statements with CPP stuff. · b5292f7b
      Flavio Medeiros 提交于
      This is also RT 4137
      Signed-off-by: NRich Salz <rsalz@akamai.com>
      Reviewed-by: NAndy Polyakov <appro@openssl.org>
      b5292f7b
  14. 23 2月, 2016 1 次提交
  15. 17 2月, 2016 1 次提交
  16. 15 2月, 2016 1 次提交
  17. 09 2月, 2016 3 次提交
  18. 06 2月, 2016 1 次提交
  19. 04 2月, 2016 2 次提交
    • R
      Refactoring BIO: Adapt s_client and s_server · ab69ac00
      Richard Levitte 提交于
      s_socket.c gets brutally cleaned out and now consists of only two
      functions, one for client and the other for server.  They both handle
      AF_INET, AF_INET6 and additionally AF_UNIX where supported.  The rest
      is just easy adaptation.
      
      Both s_client and s_server get the new flags -4 and -6 to force the
      use of IPv4 or IPv6 only.
      
      Also, the default host "localhost" in s_client is removed.  It's not
      certain that this host is set up for both IPv4 and IPv6.  For example,
      Debian has "ip6-localhost" as the default hostname for [::1].  The
      better way is to default |host| to NULL and rely on BIO_lookup() to
      return a BIO_ADDRINFO with the appropriate loopback address for IPv4
      or IPv6 as indicated by the |family| parameter.
      Reviewed-by: NKurt Roeckx <kurt@openssl.org>
      ab69ac00
    • R
      Refactoring BIO: Adapt BIO_s_datagram and all that depends on it · d858c876
      Richard Levitte 提交于
      The control commands that previously took a struct sockaddr * have
      been changed to take a BIO_ADDR * instead.
      Reviewed-by: NKurt Roeckx <kurt@openssl.org>
      d858c876
  20. 01 2月, 2016 1 次提交
  21. 21 1月, 2016 1 次提交
  22. 19 1月, 2016 1 次提交
    • V
      Support disabling any or all TLS or DTLS versions · 6b01bed2
      Viktor Dukhovni 提交于
      Some users want to disable SSL 3.0/TLS 1.0/TLS 1.1, and enable just
      TLS 1.2.  In the future they might want to disable TLS 1.2 and
      enable just TLS 1.3, ...
      
      This commit makes it possible to disable any or all of the TLS or
      DTLS protocols.  It also considerably simplifies the SSL/TLS tests,
      by auto-generating the min/max version tests based on the set of
      supported protocols (425 explicitly written out tests got replaced
      by two loops that generate all 425 tests if all protocols are
      enabled, fewer otherwise).
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      6b01bed2
  23. 15 1月, 2016 1 次提交
  24. 22 12月, 2015 1 次提交
  25. 17 12月, 2015 2 次提交