https://github.com/openssl/openssl

sort by:
Revision Author Date Message Commit Date
4bee980 Prepare for 1.0.0m release 05 June 2014, 09:42:13 UTC
7fa5428 make update 05 June 2014, 09:42:13 UTC
b9c9cd3 Update CHANGES and NEWS 05 June 2014, 08:00:01 UTC
8250e1b Fix CVE-2014-3470 Check session_cert is not NULL before dereferencing it. 03 June 2014, 15:30:37 UTC
519c977 Fix CVE-2014-0221 Unnecessary recursion when receiving a DTLS hello request can be used to crash a DTLS client. Fixed by handling DTLS hello request without recursion. Thanks to Imre Rad (Search-Lab Ltd.) for discovering this issue. 03 June 2014, 15:30:37 UTC
123370f Additional CVE-2014-0224 protection. Return a fatal error if an attempt is made to use a zero length master secret. 03 June 2014, 15:30:37 UTC
c97e457 Fix for CVE-2014-0224 Only accept change cipher spec when it is expected instead of at any time. This prevents premature setting of session keys before the master secret is determined which an attacker could use as a MITM attack. Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for reporting this issue and providing the initial fix this patch is based on. 03 June 2014, 15:30:37 UTC
f4e6ed0 Fix for CVE-2014-0195 A buffer overrun attack can be triggered by sending invalid DTLS fragments to an OpenSSL DTLS client or server. This is potentially exploitable to run arbitrary code on a vulnerable client or server. Fixed by adding consistency check for DTLS fragments. Thanks to Jüri Aedla for reporting this issue. 03 June 2014, 15:30:37 UTC
b79e6e3 Free up s->d1->buffered_app_data.q properly. PR#3286 (cherry picked from commit 71e95000afb2227fe5cac1c79ae884338bcd8d0b) 02 June 2014, 13:40:32 UTC
812b724 Make PKCS7_NOCERTS match documentation. As documented PKCS7_NOCERTS should only exclude the signer's certificate and not any supplied in the "certs" parameter. This makes it possible to exclude the signer's certificate but include other certificates. Applications that don't want to include other certificates should set "certs" to NULL anyway. (cherry picked from commit 5c6f808b66f1a2e0fb2a508b24b845a88803fe3a) 02 June 2014, 12:53:51 UTC
db30512 Fix typo. PR#2677. 02 June 2014, 12:53:51 UTC
bffbaf9 Typo: set i to -1 before goto. PR#3302 (cherry picked from commit 9717f01951f976f76dd40a38d9fc7307057fa4c4) 02 June 2014, 12:53:51 UTC
5aca5d4 Added SSLErr call for internal error in dtls1_buffer_record 01 June 2014, 20:43:51 UTC
8343e6b Delays the queue insertion until after the ssl3_setup_buffers() call due to use-after-free bug. PR#3362 01 June 2014, 20:42:47 UTC
f87c6a5 Set default global mask to UTF8 only. (cherry picked from commit 3009244da47b989c4cc59ba02cf81a4e9d8f8431) 01 June 2014, 14:04:35 UTC
268ae49 Allocate extra space when NETSCAPE_HANG_BUG defined. Make sure there is an extra 4 bytes for server done message when NETSCAPE_HANG_BUG is defined. PR#3361 (cherry picked from commit 673c42b2380c34e7500f05e7f00c674cc677a065) 01 June 2014, 13:31:30 UTC
6270d1c add description of -attime to man page the verify app man page didn't describe the usage of attime option even though it was listed as a valid option in the -help message. This patch fixes this omission. 30 May 2014, 22:35:32 UTC
5b54d26 add description of -no_ecdhe option to s_server man page While the -help message references this option, the man page doesn't mention the -no_ecdhe option. This patch fixes this omission. 30 May 2014, 22:35:22 UTC
fccbab6 Set version number correctly. PR#3249 (cherry picked from commit 8909bf20269035d295743fca559207ef2eb84eb3) 29 May 2014, 13:12:13 UTC
caf4e91 Fix memory leak. PR#3278 (cherry picked from commit de56fe797081fc09ebd1add06d6e2df42a324fd5) 29 May 2014, 13:12:13 UTC
c01a838 Fix signed/unsigned warning. (cherry picked from commit 989d87cb1a174a951efd829ff6b2f68a322f9df8) 29 May 2014, 13:12:13 UTC
66d3fb6 Fix for PKCS12_create if no-rc2 specified. Use triple DES for certificate encryption if no-rc2 is specified. PR#3357 (cherry picked from commit 2e2a6d0ecd8f6984c692078ec2e2683690e0bc59) 29 May 2014, 13:12:12 UTC
92e2dc1 Change default cipher in smime app to des3. PR#3357 (cherry picked from commit ca3ffd9670f2b589bf8cc04923f953e06d6fbc58) 29 May 2014, 13:12:12 UTC
5bcb4be Fix for test_bn regular expression to work on Windows using MSYS. PR#3346 27 May 2014, 22:29:57 UTC
dd9d905 Fixed error in args for SSL_set_msg_callback and SSL_set_msg_callback_arg 25 May 2014, 22:48:36 UTC
44f28dd Fix for non compilation with TLS_DEBUG defined 24 May 2014, 22:59:24 UTC
3f2959b Fixed minor copy&paste error, and stray space causing rendering problem 21 May 2014, 23:12:39 UTC
30e9cbe Fix a wrong parameter count ERR_add_error_data 19 May 2014, 21:18:23 UTC
5b7f4c7 Removed note in BUGS section about AEAD ciphers - inadvertently added to wrong branch 15 May 2014, 20:19:46 UTC
cb8044f Fix grammar error in verify pod. PR#3355 14 May 2014, 22:00:18 UTC
7bca264 Add information to BUGS section of enc documentation. PR#3354 14 May 2014, 22:00:18 UTC
edc2df5 Corrected POD syntax errors. PR#3353 14 May 2014, 22:00:18 UTC
365e872 Check sk_SSL_CIPHER_num() after assigning sk. 12 May 2014, 22:05:19 UTC
b3edc5f Correct the return type on the signature for X509_STORE_CTX_get_ex_data given in the pod file. 12 May 2014, 21:48:06 UTC
f7c4fe5 Replace manual ASN1 decoder with ASN1_get_object Replace manual ASN.1 decoder with ASN1_get object. This will decode the tag and length properly and check against it does not exceed the supplied buffer length. PR#3335 (cherry picked from commit b0308dddd1cc6a8e1de803ef29ba6da25ee072c2) 12 May 2014, 17:41:49 UTC
92c2c6e Fixed NULL pointer dereference. See PR#3321 11 May 2014, 23:48:17 UTC
12cbba0 Avoid out-of-bounds write in SSL_get_shared_ciphers PR: 3317 11 May 2014, 22:59:38 UTC
f9f6bef Fix infinite loop. PR#3347 11 May 2014, 20:15:57 UTC
0552cbc safety check to ensure we dont send out beyond the users buffer 11 May 2014, 12:33:57 UTC
c3cd9be Return an error if no recipient type matches. If the key type does not match any CMS recipient type return an error instead of using a random key (MMA mitigation). This does not leak any useful information to an attacker. PR#3348 (cherry picked from commit 83a3182e0560f76548f4378325393461f6275493) 09 May 2014, 13:24:49 UTC
9f4a47b coverity 966576 - close socket in error path 08 May 2014, 22:24:56 UTC
5108067 PR#3342 fix resource leak coverity issue 966577 08 May 2014, 22:24:51 UTC
1535ff9 fix coverity issue 966597 - error line is not always initialised 07 May 2014, 23:04:16 UTC
79c8c47 Fixed NULL pointer dereference in PKCS7_dataDecode reported by David Ramos in PR#3339 07 May 2014, 22:28:26 UTC
84fe686 evp: prevent underflow in base64 decoding This patch resolves RT ticket #2608. Thanks to Robert Dugal for originally spotting this, and to David Ramos for noticing that the ball had been dropped. Signed-off-by: Geoff Thorpe <geoff@openssl.org> 06 May 2014, 22:15:43 UTC
44ea88c bignum: allow concurrent BN_MONT_CTX_set_locked() The lazy-initialisation of BN_MONT_CTX was serialising all threads, as noted by Daniel Sands and co at Sandia. This was to handle the case that 2 or more threads race to lazy-init the same context, but stunted all scalability in the case where 2 or more threads are doing unrelated things! We favour the latter case by punishing the former. The init work gets done by each thread that finds the context to be uninitialised, and we then lock the "set" logic after that work is done - the winning thread's work gets used, the losing threads throw away what they've done. Signed-off-by: Geoff Thorpe <geoff@openssl.org> 06 May 2014, 22:15:41 UTC
f4e6975 dso: eliminate VMS code on non-VMS systems Even though the meat of dso_vms.c is compiled out on non-VMS builds, the (pre-)compiler still traverses some of the macro handling. This trips up at least one non-VMS build configuration, so this commit makes the skip-VMS case more robust. Signed-off-by: Geoff Thorpe <geoff@openssl.org> 06 May 2014, 22:15:37 UTC
3dd101a Initialize num properly. PR#3289 PR#3345 (cherry picked from commit 3ba1e406c2309adb427ced9815ebf05f5b58d155) 06 May 2014, 13:09:21 UTC
ba44b8d Set Enveloped data version to 2 if ktri version not zero. (cherry picked from commit 9c5d953a07f472452ae2cb578e39eddea2de2b9c) 06 May 2014, 13:04:37 UTC
7cdbce5 Double free in i2o_ECPublicKey PR: 3338 03 May 2014, 23:56:13 UTC
1ff9f2e typo in SSL_get_peer_cert_chain docs RT: 3304 01 May 2014, 23:29:31 UTC
ee30926 Fixed missing =back commands 30 April 2014, 22:58:24 UTC
3d50fef POD: Fix item numbering Newer pod2man considers =item [1-9] part of a numbered list, while =item 0 starts an unnumbered list. Add a zero effect formatting mark to override this. doc/apps/smime.pod around line 315: Expected text after =item, not a number ... PR#3146 30 April 2014, 22:50:21 UTC
33c1623 Fix version documentation. Specify -f is for compilation flags. Add -d to synopsis section. (cherry picked from commit 006397ea62bbcae22c8664d53c2222b808c4bdd1) Closes #80. 26 April 2014, 10:24:14 UTC
3abcf47 Fix eckey_priv_encode() Fix eckey_priv_encode to return an error on failure of i2d_ECPrivateKey. 24 April 2014, 19:33:01 UTC
986fa90 Add new sponsors (cherry picked from commit 351f0a124bffaa94d2a8abdec2e7dde5ae9c457d) 24 April 2014, 11:32:58 UTC
e4e1b8f Fix use after free. 23 April 2014, 06:33:26 UTC
da8f108 Fix double frees. Conflicts: CHANGES 22 April 2014, 21:52:26 UTC
ebbbc8b Document -debug_decrypt option. (cherry picked from commit 0dd5b94aeb77c2982bdf6886962b7a8491c6c9ed) 16 April 2014, 11:36:21 UTC
bddd6e3 Extension checking fixes. When looking for an extension we need to set the last found position to -1 to properly search all extensions. PR#3309. (cherry picked from commit 300b9f0b704048f60776881f1d378c74d9c32fbd) 15 April 2014, 17:53:14 UTC
6fc530e Clarify CMS_decrypt behaviour. (cherry picked from commit 5f8e9a477a18551052f2019c1f374061acbaa5e6) 15 April 2014, 17:19:50 UTC
d24e8ac Add new key fingerprint. (cherry picked from commit 3143a332e8f2f5ca1a6f0262a1a1a66103f2adf7) 11 April 2014, 01:51:59 UTC
06e1714 Fix free errors in ocsp utility. Keep copy of any host, path and port values allocated by OCSP_parse_url and free as necessary. (cherry picked from commit 5219d3dd350cc74498dd49daef5e6ee8c34d9857) 09 April 2014, 14:45:46 UTC
f825963 Document -verify_return_error option. (cherry picked from commit 4e6c12f3088d3ee5747ec9e16d03fc671b8f40be) 07 April 2014, 12:05:46 UTC
38b4d7a crypto/modes: strict aliasing fixes from master. 06 April 2014, 15:23:55 UTC
f16fede Use correct length when prompting for password. Use bufsiz - 1 not BUFSIZ - 1 when prompting for a password in the openssl utility. Thanks to Rob Mackinnon, Leviathan Security for reporting this issue. (cherry picked from commit 7ba08a4d73c1bdfd3aced09a628b1d7d7747cdca) 04 April 2014, 12:08:42 UTC
4a15b7c Update FAQ. (cherry picked from commit 6cc0068430d0a4abdef0b466d422e6a4d154a5fe) 04 April 2014, 12:08:39 UTC
065b75d Document new crl option. (cherry picked from commit dbb7654dc189992966ecd95ca66f7a3bb011ab9b) 03 April 2014, 12:38:00 UTC
75c3073 Add option to generate old hash format. New -hash_old to generate CRL hashes using old (before OpenSSL 1.0.0) algorithm. (cherry picked from commit de2d97cd799f38024d70847bab37d91aa5a2536e) 03 April 2014, 12:37:56 UTC
5762c18 Fix base64 decoding bug. A short PEM encoded sequence if passed to the BIO, and the file had 2 \n following would fail. PR#3289 (cherry picked from commit 10378fb5f4c67270b800e8f7c600cd0548874811) 02 April 2014, 18:57:57 UTC
6a1dd28 update NEWS 12 March 2014, 14:43:03 UTC
0737acd Update ordinals. Use a previously unused value as we will be updating multiple released branches. 12 March 2014, 14:41:00 UTC
2198be3 Fix for CVE-2014-0076 Fix for the attack described in the paper "Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack" by Yuval Yarom and Naomi Benger. Details can be obtained from: http://eprint.iacr.org/2014/140 Thanks to Yuval Yarom and Naomi Benger for discovering this flaw and to Yuval Yarom for supplying a fix. 12 March 2014, 14:16:19 UTC
6fe4984 typo (cherry picked from commit a029788b0e0c19cee4007cc1f73201cf2c13addf) 10 March 2014, 15:49:35 UTC
ce2c6d8 engines/ccgost/gosthash.c: simplify and avoid SEGV. PR: 3275 (cherry picked from commit ea38f020492042bc1d1adc26ef197b0b9cadf968) 07 March 2014, 10:04:10 UTC
e67c71c Fix for WIN32 builds with KRB5 (cherry picked from commit 3eddd1706a30cdf3dc9278692d8ee9038eac8a0d) 26 February 2014, 15:33:31 UTC
ffa0e16 ssl/t1_enc.c: check EVP_MD_CTX_copy return value. PR: 3201 (cherry picked from commit 03da57fe14f2de5bde9d4496a2ae9a4ae8879f88) 25 February 2014, 21:24:52 UTC
910b3a8 Avoid Windows 8 Getversion deprecated errors. Windows 8 SDKs complain that GetVersion() is deprecated. We only use GetVersion like this: (GetVersion() < 0x80000000) which checks if the Windows version is NT based. Use a macro check_winnt() which uses GetVersion() on older SDK versions and true otherwise. (cherry picked from commit a4cc3c8041104896d51ae12ef7b678c31808ce52) 25 February 2014, 13:43:04 UTC
24a4719 BC-32.pl: pre-1.0.2-specific refresh for Borland C. PR: 3251 Suggested by: Thorsten Sch\xf6ning (cherry picked from commit 3ae1b53496acd3f25e9b9089ed5fb6000e41a557) 24 February 2014, 15:55:46 UTC
4ba2edd BC-32.pl: refresh Borland C support. PR: 3251 Suggested by: Thorsten Sch\xf6ning (cherry picked from commit 779c51c6446f384c2f2a7bd5cc4c3e0366baf628) 24 February 2014, 15:49:50 UTC
4f5b7a7 x509/by_dir.c: fix run-away pointer (and potential SEGV) when adding duplicates in add_cert_dir. PR: 3261 Reported by: Marian Done (cherry picked from commit 758954e0d8232d370ed72b7f86640e40443e1778) 24 February 2014, 14:24:14 UTC
8fe4d5b Remove duplicate statement. (cherry picked from commit 5a7652c3e585e970e5b778074c92e617e48fde38) 15 February 2014, 01:29:49 UTC
d43301b Use defaults bits in req when not given If you use "-newkey rsa" it's supposed to read the default number of bits from the config file. However the value isn't used to generate the key, but it does print it's generating such a key. The set_keygen_ctx() doesn't call EVP_PKEY_CTX_set_rsa_keygen_bits() and you end up with the default set in pkey_rsa_init() (1024). Afterwards the number of bits gets read from the config file, but nothing is done with that anymore. We now read the config first and use the value from the config file when no size is given. PR: 2592 (cherry picked from commit 3343220327664680420d4068e1fbe46d2236f1b0) 14 February 2014, 22:36:05 UTC
4727d57 Fix additional pod errors with numbered items. (cherry picked from commit e547c45f1c74e976656c042ec9d873f6eea0e756) 14 February 2014, 22:36:04 UTC
b815ab2 Fix various spelling errors (cherry picked from commit 2b4ffc659eabec29f76821f0ac624a2b8c19e4c7) 14 February 2014, 22:36:04 UTC
ffaebdf Document pkcs12 -password behavior apps/pkcs12.c accepts -password as an argument. The document author almost certainly meant to write "-password, -passin". However, that is not correct, either. Actually the code treats -password as equivalent to -passin, EXCEPT when -export is also specified, in which case -password as equivalent to -passout. (cherry picked from commit 856c6dfb09d69fc82ada2611c6cd792dfc60e355) 14 February 2014, 22:36:04 UTC
8e04001 Clarify docs. Remove reference to ERR_TXT_MALLOCED in the error library as that is only used internally. Indicate that returned error data must not be freed. (cherry picked from commit f2d678e6e89b6508147086610e985d4e8416e867) 29 January 2014, 01:02:24 UTC
0450d6c typo (cherry picked from commit cb2182676bdf652070bc272a3896d957763a4324) 28 January 2014, 15:36:39 UTC
745929c Fix demo comment: 0.9.9 never released. (cherry picked from commit 717cc8589540b95122a652dee68e6a75b6262d93) 28 January 2014, 15:17:58 UTC
158d061 Add loaded dynamic ENGINEs to list. Always add a dynamically loaded ENGINE to list. Otherwise it can cause problems when multiply loaded, especially if it adds new public key methods. For all current engines we only want a single implementation anyway. (cherry picked from commit e933f91f50108a43c0198cdc63ecdfdbc77b4d0d) 28 January 2014, 13:57:58 UTC
16d6167 Use default digest implementation in dgst.c Use default instead of ENGINE version of digest. Without this errors will occur if you use an ENGINE for a private key and it doesn't implement the digest in question. (cherry picked from commit 4eedf86a163284478140c46edb7b462d33898c93) 23 January 2014, 18:38:51 UTC
9fe6acb make update 23 January 2014, 17:14:48 UTC
5df8322 Omit initial status request callback check. PR#3178 (cherry picked from commit eb85ee9a8867b605cd7fb427869d0e50caa80a3f) 16 January 2014, 13:51:05 UTC
317ed9a VMS fixes 11 January 2014, 22:42:15 UTC
080ae68 fix shell syntax PR#3216 10 January 2014, 23:03:47 UTC
6c6f6c4 Fix bug in X509_V_FLAG_IGNORE_CRITICAL CRL handling. (cherry picked from commit 8f4077ca69076cebaca51b7b666db1ed49e46b9e) 09 January 2014, 22:56:40 UTC
11d31c0 Prepare for 1.0.0m-dev 06 January 2014, 15:02:46 UTC
7f94a3c Prepare for 1.0.0l release 06 January 2014, 15:02:02 UTC
528c6ef make update 06 January 2014, 13:36:25 UTC
1b0d481 Restore SSL_OP_MSIE_SSLV2_RSA_PADDING The flag SSL_OP_MSIE_SSLV2_RSA_PADDING hasn't done anything since OpenSSL 0.9.7h but deleting it will break source compatibility with any software that references it. Restore it but #define to zero. (cherry picked from commit b17d6b8d1d49fa4732deff17cfd1833616af0d9c) 04 January 2014, 14:01:05 UTC
back to top