1. 03 3月, 2016 3 次提交
  2. 02 3月, 2016 3 次提交
  3. 29 2月, 2016 5 次提交
    • M
      Refactor the async wait fd logic · ff75a257
      Matt Caswell 提交于
      Implementation experience has shown that the original plan for async wait
      fds was too simplistic. Originally the async logic created a pipe internally
      and user/engine code could then get access to it via API calls. It is more
      flexible if the engine is able to create its own fd and provide it to the
      async code.
      
      Another issue is that there can be a lot of churn in the fd value within
      the context of (say) a single SSL connection leading to continually adding
      and removing fds from (say) epoll. It is better if we can provide some
      stability of the fd value across a whole SSL connection. This is
      problematic because an engine has no concept of an SSL connection.
      
      This commit refactors things to introduce an ASYNC_WAIT_CTX which acts as a
      proxy for an SSL connection down at the engine layer.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      ff75a257
    • M
      Workaround for VisualStudio 2015 bug · b32166b4
      Matt Caswell 提交于
      VisualStudio 2015 has a bug where an internal compiler error was occurring.
      By reordering the DEFINE_STACK_OF declarations for SSL_CIPHER and SSL_COMP
      until after the ssl3.h include everything seems ok again.
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      b32166b4
    • D
      TLS support for X25519 · 1db3107a
      Dr. Stephen Henson 提交于
      Add X25519 to TLS supported curve list.
      Reject attempts to configure keys which cannot be used
      for signing.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      Reviewed-by: NEmilia Käsper <emilia@openssl.org>
      1db3107a
    • D
      Add no signing flag. · 4b0555ec
      Dr. Stephen Henson 提交于
      Add a flag to EC_METHOD for curves which do not support signing.
      New function EC_KEY_can_sign() returns 1 is key can be used for signing.
      Return an explicit error is an attempt is made to sign with
      no signing curves.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      Reviewed-by: NEmilia Käsper <emilia@openssl.org>
      4b0555ec
    • D
      Rename OIDs. · 899cf48f
      Dr. Stephen Henson 提交于
      Use standard X25519 and X448 names for OIDs. Delete EdDSA OIDs: for now they
      wont be used and EdDSA may use a different format.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      Reviewed-by: NEmilia Käsper <emilia@openssl.org>
      899cf48f
  4. 27 2月, 2016 3 次提交
  5. 26 2月, 2016 2 次提交
  6. 25 2月, 2016 2 次提交
    • E
      CVE-2016-0798: avoid memory leak in SRP · 380f18ed
      Emilia Kasper 提交于
      The SRP user database lookup method SRP_VBASE_get_by_user had confusing
      memory management semantics; the returned pointer was sometimes newly
      allocated, and sometimes owned by the callee. The calling code has no
      way of distinguishing these two cases.
      
      Specifically, SRP servers that configure a secret seed to hide valid
      login information are vulnerable to a memory leak: an attacker
      connecting with an invalid username can cause a memory leak of around
      300 bytes per connection.
      
      Servers that do not configure SRP, or configure SRP but do not configure
      a seed are not vulnerable.
      
      In Apache, the seed directive is known as SSLSRPUnknownUserSeed.
      
      To mitigate the memory leak, the seed handling in SRP_VBASE_get_by_user
      is now disabled even if the user has configured a seed.
      
      Applications are advised to migrate to SRP_VBASE_get1_by_user. However,
      note that OpenSSL makes no strong guarantees about the
      indistinguishability of valid and invalid logins. In particular,
      computations are currently not carried out in constant time.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      380f18ed
    • R
      GH235: Set error status on malloc failure · 72e9be3d
      Rich Salz 提交于
      Reviewed-by: NEmilia Käsper <emilia@openssl.org>
      72e9be3d
  7. 23 2月, 2016 5 次提交
  8. 22 2月, 2016 1 次提交
  9. 20 2月, 2016 1 次提交
    • E
      TLS: reject duplicate extensions · aa474d1f
      Emilia Kasper 提交于
      Adapted from BoringSSL. Added a test.
      
      The extension parsing code is already attempting to already handle this for
      some individual extensions, but it is doing so inconsistently. Duplicate
      efforts in individual extension parsing will be cleaned up in a follow-up.
      Reviewed-by: NStephen Henson <steve@openssl.org>
      aa474d1f
  10. 19 2月, 2016 2 次提交
  11. 18 2月, 2016 2 次提交
    • D
      Finish 02f7114a · 3ba84717
      David Woodhouse 提交于
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      3ba84717
    • R
      RT4310: Fix varous no-XXX builds · 1288f26f
      Rich Salz 提交于
      When OPENSSL_NO_ASYNC is set, make ASYNC_{un,}block_pause() do nothing.
      This prevents md_rand.c from failing to build. Probably better to do it
      this way than to wrap every instance in an explicit #ifdef.
      
      A bunch of new socket code got added to a new file crypto/bio/b_addr.c.
      Make it all go away if OPENSSL_NO_SOCK is defined.
      
      Allow configuration with no-ripemd, no-ts, no-ui
      We use these for the UEFI build.
      
      Also remove the 'Really???' comment from no-err and no-locking. We use
      those too.
      
      We need to drop the crypto/engine directory from the build too, and also
      set OPENSSL_NO_ENGINE
      Signed-off-by: NRich Salz <rsalz@openssl.org>
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      1288f26f
  12. 17 2月, 2016 3 次提交
  13. 16 2月, 2016 2 次提交
  14. 15 2月, 2016 1 次提交
  15. 13 2月, 2016 3 次提交
  16. 12 2月, 2016 2 次提交