1. 29 3月, 2018 5 次提交
  2. 19 3月, 2018 1 次提交
  3. 16 3月, 2018 1 次提交
  4. 01 3月, 2018 1 次提交
  5. 23 2月, 2018 1 次提交
  6. 07 2月, 2018 2 次提交
  7. 09 1月, 2018 1 次提交
  8. 08 1月, 2018 1 次提交
  9. 12 5月, 2017 1 次提交
  10. 08 2月, 2017 1 次提交
  11. 07 2月, 2017 1 次提交
  12. 26 1月, 2017 1 次提交
    • A
      crypto/evp: harden AEAD ciphers. · 2198b3a5
      Andy Polyakov 提交于
      Originally a crash in 32-bit build was reported CHACHA20-POLY1305
      cipher. The crash is triggered by truncated packet and is result
      of excessive hashing to the edge of accessible memory. Since hash
      operation is read-only it is not considered to be exploitable
      beyond a DoS condition. Other ciphers were hardened.
      
      Thanks to Robert Święcki for report.
      
      CVE-2017-3731
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      2198b3a5
  13. 25 1月, 2017 3 次提交
  14. 19 10月, 2016 1 次提交
  15. 17 7月, 2016 1 次提交
  16. 15 6月, 2016 1 次提交
  17. 24 5月, 2016 1 次提交
  18. 18 5月, 2016 1 次提交
  19. 02 5月, 2016 1 次提交
  20. 20 4月, 2016 1 次提交
  21. 14 4月, 2016 1 次提交
  22. 21 3月, 2016 1 次提交
  23. 18 3月, 2016 1 次提交
  24. 06 2月, 2016 1 次提交
  25. 12 1月, 2016 1 次提交
  26. 10 12月, 2015 2 次提交
  27. 10 11月, 2015 1 次提交
  28. 14 8月, 2015 1 次提交
  29. 06 7月, 2015 1 次提交
  30. 08 6月, 2015 1 次提交
  31. 01 5月, 2015 1 次提交
    • M
      Sanity check EVP_CTRL_AEAD_TLS_AAD · c8269881
      Matt Caswell 提交于
      The various implementations of EVP_CTRL_AEAD_TLS_AAD expect a buffer of at
      least 13 bytes long. Add sanity checks to ensure that the length is at
      least that. Also add a new constant (EVP_AEAD_TLS1_AAD_LEN) to evp.h to
      represent this length. Thanks to Kevin Wojtysiak (Int3 Solutions) and
      Paramjot Oberoi (Int3 Solutions) for reporting this issue.
      Reviewed-by: NAndy Polyakov <appro@openssl.org>
      c8269881
  32. 28 3月, 2015 1 次提交