1. 11 8月, 2015 1 次提交
  2. 03 8月, 2015 1 次提交
  3. 30 7月, 2015 3 次提交
  4. 28 7月, 2015 1 次提交
  5. 18 7月, 2015 1 次提交
  6. 12 6月, 2015 1 次提交
  7. 10 6月, 2015 1 次提交
    • M
      Tighten extension handling · 54e3ad00
      Matt Caswell 提交于
      This adds additional checks to the processing of extensions in a ClientHello
      to ensure that either no extensions are present, or if they are then they
      take up the exact amount of space expected.
      
      With thanks to the Open Crypto Audit Project for reporting this issue.
      Reviewed-by: NStephen Henson <steve@openssl.org>
      54e3ad00
  8. 05 6月, 2015 1 次提交
  9. 26 5月, 2015 1 次提交
  10. 23 5月, 2015 1 次提交
  11. 20 5月, 2015 1 次提交
  12. 19 5月, 2015 4 次提交
  13. 16 5月, 2015 1 次提交
  14. 13 5月, 2015 1 次提交
  15. 07 5月, 2015 1 次提交
  16. 06 5月, 2015 1 次提交
    • G
      Initialize potentially uninitialized local variables · 4c9b0a03
      Gunnar Kudrjavets 提交于
      Compiling OpenSSL code with MSVC and /W4 results in a number of warnings.
      One category of warnings is particularly interesting - C4701 (potentially
      uninitialized local variable 'name' used). This warning pretty much means
      that there's a code path which results in uninitialized variables being used
      or returned. Depending on compiler, its options, OS, values in registers
      and/or stack, the results can be nondeterministic. Cases like this are very
      hard to debug so it's rational to fix these issues.
      
      This patch contains a set of trivial fixes for all the C4701 warnings (just
      initializing variables to 0 or NULL or appropriate error code) to make sure
      that deterministic values will be returned from all the execution paths.
      
      RT#3835
      Signed-off-by: NMatt Caswell <matt@openssl.org>
      
      Matt's note: All of these appear to be bogus warnings, i.e. there isn't
      actually a code path where an unitialised variable could be used - its just
      that the compiler hasn't been able to figure that out from the logic. So
      this commit is just about silencing spurious warnings.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      4c9b0a03
  17. 03 5月, 2015 1 次提交
  18. 01 5月, 2015 2 次提交
  19. 17 4月, 2015 1 次提交
  20. 26 3月, 2015 3 次提交
  21. 25 3月, 2015 1 次提交
  22. 23 3月, 2015 2 次提交
  23. 19 3月, 2015 1 次提交
    • D
      Fix for CVE-2015-0291 · 34e3edbf
      Dr. Stephen Henson 提交于
      If a client renegotiates using an invalid signature algorithms extension
      it will crash a server with a NULL pointer dereference.
      
      Thanks to David Ramos of Stanford University for reporting this bug.
      
      CVE-2015-0291
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      34e3edbf
  24. 12 3月, 2015 1 次提交
    • M
      SSL_check_chain fix · d813f9eb
      Matt Caswell 提交于
      If SSL_check_chain is called with a NULL X509 object or a NULL EVP_PKEY
      or the type of the public key is unrecognised then the local variable
      |cpk| in tls1_check_chain does not get initialised. Subsequently an
      attempt is made to deref it (after the "end" label), and a seg fault will
      result.
      Reviewed-by: NDr. Stephen Henson <steve@openssl.org>
      d813f9eb
  25. 11 3月, 2015 1 次提交
  26. 06 2月, 2015 1 次提交
  27. 03 2月, 2015 1 次提交
  28. 29 1月, 2015 1 次提交
  29. 28 1月, 2015 1 次提交
    • R
      OPENSSL_NO_xxx cleanup: SHA · 474e469b
      Rich Salz 提交于
      Remove support for SHA0 and DSS0 (they were broken), and remove
      the ability to attempt to build without SHA (it didn't work).
      For simplicity, remove the option of not building various SHA algorithms;
      you could argue that SHA_224/256/384/512 should be kept, since they're
      like crypto algorithms, but I decided to go the other way.
      So these options are gone:
      	GENUINE_DSA         OPENSSL_NO_SHA0
      	OPENSSL_NO_SHA      OPENSSL_NO_SHA1
      	OPENSSL_NO_SHA224   OPENSSL_NO_SHA256
      	OPENSSL_NO_SHA384   OPENSSL_NO_SHA512
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      474e469b
  30. 24 1月, 2015 1 次提交
  31. 22 1月, 2015 1 次提交