1. 08 3月, 2016 11 次提交
  2. 07 3月, 2016 2 次提交
  3. 05 3月, 2016 1 次提交
    • D
      Add ASN.1 ADB callback. · 5b70372d
      Dr. Stephen Henson 提交于
      Add support for application supplied any defined by callback. An
      application can change the selector value if it wishes. This is
      mainly intended for values which are only known at runtime, for
      example dynamically created OIDs.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      5b70372d
  4. 04 3月, 2016 3 次提交
  5. 03 3月, 2016 6 次提交
  6. 02 3月, 2016 3 次提交
  7. 29 2月, 2016 5 次提交
    • M
      Refactor the async wait fd logic · ff75a257
      Matt Caswell 提交于
      Implementation experience has shown that the original plan for async wait
      fds was too simplistic. Originally the async logic created a pipe internally
      and user/engine code could then get access to it via API calls. It is more
      flexible if the engine is able to create its own fd and provide it to the
      async code.
      
      Another issue is that there can be a lot of churn in the fd value within
      the context of (say) a single SSL connection leading to continually adding
      and removing fds from (say) epoll. It is better if we can provide some
      stability of the fd value across a whole SSL connection. This is
      problematic because an engine has no concept of an SSL connection.
      
      This commit refactors things to introduce an ASYNC_WAIT_CTX which acts as a
      proxy for an SSL connection down at the engine layer.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      ff75a257
    • M
      Workaround for VisualStudio 2015 bug · b32166b4
      Matt Caswell 提交于
      VisualStudio 2015 has a bug where an internal compiler error was occurring.
      By reordering the DEFINE_STACK_OF declarations for SSL_CIPHER and SSL_COMP
      until after the ssl3.h include everything seems ok again.
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      b32166b4
    • D
      TLS support for X25519 · 1db3107a
      Dr. Stephen Henson 提交于
      Add X25519 to TLS supported curve list.
      Reject attempts to configure keys which cannot be used
      for signing.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      Reviewed-by: NEmilia Käsper <emilia@openssl.org>
      1db3107a
    • D
      Add no signing flag. · 4b0555ec
      Dr. Stephen Henson 提交于
      Add a flag to EC_METHOD for curves which do not support signing.
      New function EC_KEY_can_sign() returns 1 is key can be used for signing.
      Return an explicit error is an attempt is made to sign with
      no signing curves.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      Reviewed-by: NEmilia Käsper <emilia@openssl.org>
      4b0555ec
    • D
      Rename OIDs. · 899cf48f
      Dr. Stephen Henson 提交于
      Use standard X25519 and X448 names for OIDs. Delete EdDSA OIDs: for now they
      wont be used and EdDSA may use a different format.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      Reviewed-by: NEmilia Käsper <emilia@openssl.org>
      899cf48f
  8. 27 2月, 2016 3 次提交
  9. 26 2月, 2016 2 次提交
  10. 25 2月, 2016 2 次提交
    • E
      CVE-2016-0798: avoid memory leak in SRP · 380f18ed
      Emilia Kasper 提交于
      The SRP user database lookup method SRP_VBASE_get_by_user had confusing
      memory management semantics; the returned pointer was sometimes newly
      allocated, and sometimes owned by the callee. The calling code has no
      way of distinguishing these two cases.
      
      Specifically, SRP servers that configure a secret seed to hide valid
      login information are vulnerable to a memory leak: an attacker
      connecting with an invalid username can cause a memory leak of around
      300 bytes per connection.
      
      Servers that do not configure SRP, or configure SRP but do not configure
      a seed are not vulnerable.
      
      In Apache, the seed directive is known as SSLSRPUnknownUserSeed.
      
      To mitigate the memory leak, the seed handling in SRP_VBASE_get_by_user
      is now disabled even if the user has configured a seed.
      
      Applications are advised to migrate to SRP_VBASE_get1_by_user. However,
      note that OpenSSL makes no strong guarantees about the
      indistinguishability of valid and invalid logins. In particular,
      computations are currently not carried out in constant time.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      380f18ed
    • R
      GH235: Set error status on malloc failure · 72e9be3d
      Rich Salz 提交于
      Reviewed-by: NEmilia Käsper <emilia@openssl.org>
      72e9be3d
  11. 23 2月, 2016 2 次提交