1. 30 9月, 2015 1 次提交
  2. 25 9月, 2015 1 次提交
  3. 20 9月, 2015 1 次提交
  4. 11 9月, 2015 1 次提交
  5. 06 9月, 2015 1 次提交
  6. 04 9月, 2015 1 次提交
  7. 03 9月, 2015 1 次提交
  8. 01 9月, 2015 1 次提交
  9. 28 8月, 2015 1 次提交
  10. 26 8月, 2015 1 次提交
  11. 12 8月, 2015 1 次提交
  12. 11 8月, 2015 1 次提交
  13. 01 8月, 2015 1 次提交
  14. 23 7月, 2015 2 次提交
  15. 14 7月, 2015 1 次提交
  16. 24 6月, 2015 1 次提交
  17. 23 6月, 2015 2 次提交
  18. 11 6月, 2015 1 次提交
  19. 04 6月, 2015 1 次提交
    • M
      Fix off-by-one error in BN_bn2hex · c5635307
      Matt Caswell 提交于
      A BIGNUM can have the value of -0. The function BN_bn2hex fails to account
      for this and can allocate a buffer one byte too short in the event of -0
      being used, leading to a one byte buffer overrun. All usage within the
      OpenSSL library is considered safe. Any security risk is considered
      negligible.
      
      With thanks to Mateusz Kocielski (LogicalTrust), Marek Kroemeke and
      Filip Palian for discovering and reporting this issue.
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      c5635307
  20. 03 6月, 2015 1 次提交
  21. 26 5月, 2015 1 次提交
  22. 25 5月, 2015 2 次提交
  23. 23 5月, 2015 3 次提交
    • M
      Fix off-by-one in BN_rand · efee575a
      Matt Caswell 提交于
      If BN_rand is called with |bits| set to 1 and |top| set to 1 then a 1 byte
      buffer overflow can occur. There are no such instances within the OpenSSL at
      the moment.
      
      Thanks to Mateusz Kocielski (LogicalTrust), Marek Kroemeke, Filip Palian for
      discovering and reporting this issue.
      Reviewed-by: NKurt Roeckx <kurt@openssl.org>
      efee575a
    • M
      Reject negative shifts for BN_rshift and BN_lshift · 7cc18d81
      Matt Caswell 提交于
      The functions BN_rshift and BN_lshift shift their arguments to the right or
      left by a specified number of bits. Unpredicatable results (including
      crashes) can occur if a negative number is supplied for the shift value.
      
      Thanks to Mateusz Kocielski (LogicalTrust), Marek Kroemeke and Filip Palian
      for discovering and reporting this issue.
      Reviewed-by: NKurt Roeckx <kurt@openssl.org>
      7cc18d81
    • R
      Fix the update target and remove duplicate file updates · 0f539dc1
      Richard Levitte 提交于
      We had updates of certain header files in both Makefile.org and the
      Makefile in the directory the header file lived in.  This is error
      prone and also sometimes generates slightly different results (usually
      just a comment that differs) depending on which way the update was
      done.
      
      This removes the file update targets from the top level Makefile, adds
      an update: target in all Makefiles and has it depend on the depend: or
      local_depend: targets, whichever is appropriate, so we don't get a
      double run through the whole file tree.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      0f539dc1
  24. 20 5月, 2015 1 次提交
  25. 14 5月, 2015 2 次提交
  26. 13 5月, 2015 2 次提交
  27. 06 5月, 2015 1 次提交
  28. 05 5月, 2015 1 次提交
    • R
      Use safer sizeof variant in malloc · b4faea50
      Rich Salz 提交于
      For a local variable:
              TYPE *p;
      Allocations like this are "risky":
              p = OPENSSL_malloc(sizeof(TYPE));
      if the type of p changes, and the malloc call isn't updated, you
      could get memory corruption.  Instead do this:
              p = OPENSSL_malloc(sizeof(*p));
      Also fixed a few memset() calls that I noticed while doing this.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      b4faea50
  29. 03 5月, 2015 1 次提交
  30. 01 5月, 2015 3 次提交
  31. 29 4月, 2015 1 次提交