sort by:
Revision Author Date Message Commit Date
95605f3 Prepare for 1.0.2f release Reviewed-by: Richard Levitte <levitte@openssl.org> 28 January 2016, 13:57:22 UTC
f26a179 Update CHANGES and NEWS for release Add details about the latest issues into CHANGES and NEWS ready for the next release. Reviewed-by: Rich Salz <rsalz@openssl.org> 28 January 2016, 13:49:56 UTC
75374ad Add a test for small subgroup attacks on DH/DHE Following on from the previous commit, add a test to ensure that DH_compute_key correctly fails if passed a bad y such that: y^q (mod p) != 1 Reviewed-by: Viktor Dukhovni <viktor@openssl.org> 28 January 2016, 13:49:56 UTC
c5b831f Always generate DH keys for ephemeral DH cipher suites Modified version of the commit ffaef3f15 in the master branch by Stephen Henson. This makes the SSL_OP_SINGLE_DH_USE option a no-op and always generates a new DH key for every handshake regardless. CVE-2016-0701 (fix part 2 or 2) Issue reported by Antonio Sanso Reviewed-by: Viktor Dukhovni <viktor@openssl.org> 28 January 2016, 13:49:56 UTC
878e2c5 Prevent small subgroup attacks on DH/DHE Historically OpenSSL only ever generated DH parameters based on "safe" primes. More recently (in version 1.0.2) support was provided for generating X9.42 style parameter files such as those required for RFC 5114 support. The primes used in such files may not be "safe". Where an application is using DH configured with parameters based on primes that are not "safe" then an attacker could use this fact to find a peer's private DH exponent. This attack requires that the attacker complete multiple handshakes in which the peer uses the same DH exponent. A simple mitigation is to ensure that y^q (mod p) == 1 CVE-2016-0701 (fix part 1 of 2) Issue reported by Antonio Sanso. Reviewed-by: Viktor Dukhovni <viktor@openssl.org> 28 January 2016, 13:49:56 UTC
d81a160 Better SSLv2 cipher-suite enforcement Based on patch by: Nimrod Aviram <nimrod.aviram@gmail.com> CVE-2015-3197 Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> 28 January 2016, 13:48:24 UTC
3665fa2 pkeyutl: allow peerkey for EC_DERIVE to reside on a hardware token (public key for now) Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> 22 January 2016, 19:13:31 UTC
2b80d00 RT3863 ECC: Add missing NULL check. Set a flag Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (cherry picked from commit dd67493c344d9d98413d2ee7fd2b6fa9411d975c) 21 January 2016, 14:14:33 UTC
78a140e GH issue 572: Error in help message Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Viktor Dukhovni <viktor@openssl.org> 20 January 2016, 23:52:18 UTC
f73c737 Handle SSL_shutdown while in init more appropriately Calling SSL_shutdown while in init previously gave a "1" response, meaning everything was successfully closed down (even though it wasn't). Better is to send our close_notify, but fail when trying to receive one. The problem with doing a shutdown while in the middle of a handshake is that once our close_notify is sent we shouldn't really do anything else (including process handshake/CCS messages) until we've received a close_notify back from the peer. However the peer might send a CCS before acting on our close_notify - so we won't be able to read it because we're not acting on CCS messages! Reviewed-by: Viktor Dukhovni <viktor@openssl.org> 20 January 2016, 13:55:36 UTC
930d87c Fix BSD -rpath parameter For BSD systems, Configure adds a shared_ldflags including a reference to the Makefile variable LIBRPATH, but since it must be passed down to Makefile.shared, care must be taken so the value of LIBRPATH doesn't get expanded too early, or it ends up giving an empty string. Reviewed-by: Viktor Dukhovni <viktor@openssl.org> (cherry picked from commit c64879d3f3cc4c7f1c436a9fe3bd109847a23629) 19 January 2016, 19:59:26 UTC
607e773 Validate ClientHello session_id field length and send alert on failure RT#4080 Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> 19 January 2016, 15:37:16 UTC
0555901 Update license year range to 2016 Signed-off-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> (cherry picked from commit 02f70372470b4dd3b21443bb615292175f5d2c88) 19 January 2016, 15:24:35 UTC
7934ce2 Don't use "grep -q", "-q" is not POSIX, and fails on Solaris. Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> 18 January 2016, 15:20:51 UTC
4d6fe78 Empty SNI names are not valid While empty inputs to SSL_set1_host() clear the reference identifier list. (cherry-picked from 1.1.0-dev) Reviewed-by: Rich Salz <rsalz@openssl.org> 17 January 2016, 21:58:48 UTC
15debc1 NGX-2040 - fix wildcard match on punycode/IDNA DNS names - bugfix: should not treat '--' as invalid domain substring. - '-' should not be the first letter of a domain Signed-off-by: Viktor Dukhovni <viktor@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org> 15 January 2016, 19:48:17 UTC
e254d12 To avoid possible time_t overflow use X509_time_adj_ex() Reviewed-by: Viktor Dukhovni <viktor@openssl.org> (cherry picked from commit 9aa00b187a65b1f30789d6274ec31ea86efe7973) Conflicts: apps/x509.c 14 January 2016, 03:02:27 UTC
8788fb9 Root cause discovered and fixed, this fix became unnecessary Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> 13 January 2016, 00:23:34 UTC
6fa6a66 Changed help output Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> 13 January 2016, 00:23:34 UTC
a2a29f7 Pass engine=NULL to EVP_PKEY_CTX_new(), unless "-engine_impl" was given Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> 13 January 2016, 00:23:34 UTC
8259ccb Remove unnecessary debugging fprintf Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> 13 January 2016, 00:23:34 UTC
ad81ca9 Fixed crash (SIGSEGV) when freeing of ex_data stumbles upon a NULL-pointer. Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> 13 January 2016, 00:23:34 UTC
d65a8d0 Fixed a bug preventing pkeyutl from accessing keys directly on the token via engine_pkcs11 Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> 13 January 2016, 00:23:34 UTC
75fdee0 Wrong definition of the macro SSL_set1_sigalgs in ssl.h Error in the definition of the macro SSL_set1_sigalgs(ctx, slist, slistlen): the third parameter 'slistlen' not used in the substitution code; used 'clistlen' instead. As a result of this, compilation error occurs when any application uses this macro. Signed-off-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Kurt Roeckx <kurt@openssl.org> 12 January 2016, 17:53:27 UTC
a4530ce Change minimum DH size from 768 to 1024 Reviewed-by: Viktor Dukhovni <openssl-users@dukhovni.org> 10 January 2016, 23:01:52 UTC
cb19c0d File is about s_time, not s_client Reviewed-by: Dr. Stephen Henson <steve@openssl.org> (cherry picked from commit 1918e01c9f915e2eba31a5e2f86f0a5daa4fafb6) 10 January 2016, 12:14:19 UTC
a3d74af Fix X509_STORE_CTX_cleanup() Reviewed-by: Dr. Stephen Henson <steve@openssl.org> 02 January 2016, 16:14:05 UTC
4d9c6fa RT4202: Update rt URL's. Reviewed-by: Matt Caswell <matt@openssl.org> (cherry picked from commit 41977c53cd04f52b2b5e56d31ace782577620ac3) 28 December 2015, 21:41:10 UTC
c52c3b5 Add some documentation for the OCSP callback functions Describe the usage of the OCSP callback functions on both the client and the server side. Reviewed-by: Viktor Dukhovni <viktor@openssl.org> 27 December 2015, 22:02:33 UTC
0ac6239 Ensure we don't call the OCSP callback if resuming a session It makes no sense to call the OCSP status callback if we are resuming a session because no certificates will be sent. Reviewed-by: Viktor Dukhovni <viktor@openssl.org> 27 December 2015, 22:02:33 UTC
905943a Fix error when server does not send CertificateStatus message If a server sends the status_request extension then it may choose to send the CertificateStatus message. However this is optional. We were treating it as mandatory and the connection was failing. Thanks to BoringSSL for reporting this issue. RT#4120 Reviewed-by: Viktor Dukhovni <viktor@openssl.org> 27 December 2015, 22:02:33 UTC
155a162 The functions take a SSL *, not a SSL_CTX * Signed-off-by: Kurt Roeckx <kurt@roeckx.be> Reviewed-by: Rich Salz <rsalz@openssl.org> RT: #4192, MR: #1533 (cherry picked from commit d938e8dfee16e6bb5427eac7bda32337634ce130) 23 December 2015, 21:33:26 UTC
1c7de36 Fix memory leak in DSA redo case. Found by clang scan-build. Signed-off-by: Kurt Roeckx <kurt@roeckx.be> Reviewed-by: Richard Levitte <levitte@openssl.org> RT: #4184, MR: #1496 (cherry picked from commit 679d87515d23ca31491effdc264edc81c695a72a) 22 December 2015, 10:49:57 UTC
6656ba7 Don't check RSA_FLAG_SIGN_VER. Reviewed-by: Richard Levitte <levitte@openssl.org> 20 December 2015, 19:27:03 UTC
17592f3 BIO_s_datagram() ctrl doesn't support SEEK/TELL, so don't pretend it does Reviewed-by: Rich Salz <rsalz@openssl.org> 19 December 2015, 21:07:42 UTC
6d97060 Correct or add comments indicating what controls belong to what Reviewed-by: Rich Salz <rsalz@openssl.org> 19 December 2015, 21:07:42 UTC
7eb5125 Document how BIO_get_conn_ip and BIO_get_conn_int_port actually work No dummy arguments. Reviewed-by: Rich Salz <rsalz@openssl.org> 19 December 2015, 21:07:42 UTC
2a60fcc Have BIO_get_conn_int_port use BIO_ctrl instead BIO_int_ctrl BIO_int_ctrl isn't made for the purpose BIO_get_conn_int_port used it for. This also changes BIO_C_GET_CONNECT to actually return the port instead of assigning it to a pointer that was never returned back to the caller. Reviewed-by: Rich Salz <rsalz@openssl.org> 19 December 2015, 21:07:42 UTC
f6cadee Fix more URLs mangled by reformat Fix some more URLs mangled by indent in the reformat. These ones don't exist in master so we have a separate commit. Based on a patch supplied by Arnaud Lacombe <al@aerilon.ca> Reviewed-by: Richard Levitte <levitte@openssl.org> 19 December 2015, 14:44:03 UTC
dd045d1 Fix URLs mangled by reformat Some URLs in the source code ended up getting mangled by indent. This fixes it. Based on a patch supplied by Arnaud Lacombe <al@aerilon.ca> Reviewed-by: Richard Levitte <levitte@openssl.org> 19 December 2015, 14:43:43 UTC
93a17f7 Remove the "eay" c-file-style indicators Since we don't use the eay style any more, there's no point tryint to tell emacs to use it. Reviewed-by: Ben Laurie <ben@openssl.org> 18 December 2015, 12:39:34 UTC
ecadde4 Provide better "make depend" warning. Reviewed-by: Matt Caswell <matt@openssl.org> (cherry picked from commit 2e31ef0366d368ac8cf7f5ecc9052bff27337799) 16 December 2015, 22:46:07 UTC
44e4f5b Fix a ** 0 mod 1 = 0 for real this time. Commit 2b0180c37fa6ffc48ee40caa831ca398b828e680 attempted to do this but only hit one of many BN_mod_exp codepaths. Fix remaining variants and add a test for each method. Thanks to Hanno Boeck for reporting this issue. Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Dr. Stephen Henson <steve@openssl.org> (cherry picked from commit d911097d7c93e4cfeab624b34d73fe51da158b69) 14 December 2015, 16:57:49 UTC
474a53b Fix tarball production to keep test/bctest and util/pod2mantest Reviewed-by: Matt Caswell <matt@openssl.org> 14 December 2015, 02:54:56 UTC
e780ed0 x86_64 assembly pack: tune clang version detection even further. RT#4171 Reviewed-by: Kurt Roeckx <kurt@openssl.org> (cherry picked from commit b9749432346f69b29d82070041e71b237d718ce7) 13 December 2015, 21:19:32 UTC
3cd33c4 ec/ecp_nistz256_table.c: fix potential misalignment problem with Sun C. Reviewed-by: Rich Salz <rsalz@openssl.org> 10 December 2015, 19:13:28 UTC
5005396 Ensure |rwstate| is set correctly on BIO_flush A BIO_flush call in the DTLS code was not correctly setting the |rwstate| variable to SSL_WRITING. This means that SSL_get_error() will not return SSL_ERROR_WANT_WRITE in the event of an IO retry. Reviewed-by: Richard Levitte <levitte@openssl.org> (cherry picked from commit 67f60be8c9ae5ff3129fcd6238baf124385a41d8) 10 December 2015, 12:47:49 UTC
01b5c12 Fix DTLS handshake fragment retries If using DTLS and NBIO then if a second or subsequent handshake message fragment hits a retry, then the retry attempt uses the wrong fragment offset value. This commit restores the fragment offset from the last attempt. Reviewed-by: Richard Levitte <levitte@openssl.org> (cherry picked from commit 2ad226e88bee97847496e542d63c67997d5beda6) 10 December 2015, 12:47:49 UTC
f4d1926 Add a return value check If the call to OBJ_find_sigid_by_algs fails to find the relevant NID then we should set the NID to NID_undef. Reviewed-by: Richard Levitte <levitte@openssl.org> (cherry picked from commit 330dcb09b2df7e1e6d1d3d14a5df7269aebd9a68) 10 December 2015, 11:50:45 UTC
9501418 Don't use applink for static builds. Reviewed-by: Rich Salz <rsalz@openssl.org> 09 December 2015, 00:30:29 UTC
50b255a Refer to website for acknowledgements. Reviewed-by: Steve Marquess <marquess@openssl.com> (cherry picked from commit ab29c82a55f3583a490733dd521ea6c486e8e2fb) 08 December 2015, 21:07:59 UTC
5ff0cfa Not all 'find's know -xtype, use -type instead Reviewed-by: Rich Salz <rsalz@openssl.org> (cherry picked from commit 3cd7aef34d0d414d27ab00abadb99265a2cffde9) 08 December 2015, 20:06:19 UTC
02d013e Adapt the OS X build to use the OS X tar As part of this, move release creation to a script to be called from .travis.yml. That makes it much easier to test outside of travis. Reviewed-by: Rich Salz <rsalz@openssl.org> (cherry picked from commit 382af61f6213e975b4c2a50fd8b9fedd23d86ab5) 08 December 2015, 20:06:18 UTC
89cd4fb Make it possible to affect the way dists are made Introducing DISTTARVARS to propagate changed variables down to the tar-making target. Reviewed-by: Rich Salz <rsalz@openssl.org> (cherry picked from commit 4d3c30a1799bf7b4dc7223b84417c4de992a6b9c) 08 December 2015, 20:06:18 UTC
c44844d Cleanup the EVP_MD_CTX before exit rather than after Reviewed-by: Matt Caswell <matt@openssl.org> 08 December 2015, 00:04:55 UTC
4e29514 Change tar owner and group to just 0 It seems like some tar versions don't like the name:id form for --owner and --group. The closest known anonymous user being 0 (root), that seems to be the most appropriate user/group to assign ownership to. It matters very little when unpacking either way. Reviewed-by: Rich Salz <rsalz@openssl.org> (cherry picked from commit b91dd150d2b9b5ddca37722e7f52ea59ba7f80da) 07 December 2015, 19:10:51 UTC
8e18bab Do not add symlinks in the source release Reviewed-by: Rich Salz <rsalz@openssl.org> (cherry picked from commit 451a5bdf0386d7acf091c3e3b39107e5ed8be25d) 07 December 2015, 15:21:49 UTC
b12fd50 In travis, build from a "source release" rather than from the build tree Reviewed-by: Rich Salz <rsalz@openssl.org> (cherry picked from commit 475fc3d8729190fd12b4ff23d6ec488439fb78f9) 07 December 2015, 15:21:43 UTC
e40d6bf Small changes to creating dists Make TARFILE include ../ instead of having that hard coded all over the place. When transforming file names in TAR_COMMAND, use $(NAME) instead of openssl-$(VERSION) Reviewed-by: Rich Salz <rsalz@openssl.org> (cherry picked from commit 4a544810f08539f1549eea9be36bd878c67c8e26) 07 December 2015, 15:20:14 UTC
8a27243 Prepare for 1.0.2f-dev Reviewed-by: Richard Levitte <levitte@openssl.org> 03 December 2015, 14:45:41 UTC
bfe07df Prepare for 1.0.2e release Reviewed-by: Richard Levitte <levitte@openssl.org> 03 December 2015, 14:44:31 UTC
33223e7 make update Reviewed-by: Richard Levitte <levitte@openssl.org> 03 December 2015, 14:44:31 UTC
9330fbd Update CHANGES and NEWS Update the CHANGES and NEWS files for the new release. Reviewed-by: Richard Levitte <levitte@openssl.org> 03 December 2015, 14:32:05 UTC
00456fd Add test for CVE-2015-3194 Reviewed-by: Richard Levitte <levitte@openssl.org> 03 December 2015, 14:32:05 UTC
c394a48 Add PSS parameter check. Avoid seg fault by checking mgf1 parameter is not NULL. This can be triggered during certificate verification so could be a DoS attack against a client or a server enabling client authentication. Thanks to Loïc Jonas Etienne (Qnective AG) for discovering this bug. CVE-2015-3194 Reviewed-by: Richard Levitte <levitte@openssl.org> 03 December 2015, 14:32:05 UTC
d73cc25 bn/asm/x86_64-mont5.pl: fix carry propagating bug (CVE-2015-3193). Reviewed-by: Richard Levitte <levitte@openssl.org> (cherry picked from commit e7c078db57908cbf16074c68034977565ffaf107) 03 December 2015, 14:32:05 UTC
cc598f3 Fix leak with ASN.1 combine. When parsing a combined structure pass a flag to the decode routine so on error a pointer to the parent structure is not zeroed as this will leak any additional components in the parent. This can leak memory in any application parsing PKCS#7 or CMS structures. CVE-2015-3195. Thanks to Adam Langley (Google/BoringSSL) for discovering this bug using libFuzzer. PR#4131 Reviewed-by: Richard Levitte <levitte@openssl.org> 03 December 2015, 14:32:05 UTC
fb4f467 Add cleanup of *.s Reviewed-by: Matt Caswell <matt@openssl.org> 03 December 2015, 14:20:10 UTC
babe434 perlasm/ppc-xlate.pl: comply with ABIs that specify vrsave as reserved. RT#4162 Reviewed-by: Richard Levitte <levitte@openssl.org> (cherry picked from commit b5516cfbd65de9331d827012fc5bdace1953613e) 03 December 2015, 12:31:36 UTC
87bc193 _BSD_SOURCE is deprecated, use _DEFAULT_SOURCE instead The feature_test_macros(7) manual tells us that _BSD_SOURCE is deprecated since glibc 2.20 and that the compiler will warn about it being used, unless _DEFAULT_SOURCE is defined as well. Reviewed-by: Rich Salz <rsalz@openssl.org> (cherry picked from commit f9fd35248c9a3b1125d9ab82ffb19d62e86533ac) 02 December 2015, 17:49:28 UTC
15c62b0 crypto/sparcv9cap.c: add SIGILL-free feature detection for Solaris. Reviewed-by: Rich Salz <rsalz@openssl.org> (cherry picked from commit 2238e0e45d03ec9ba15e9547f7739cc6987a8f57) 02 December 2015, 09:56:27 UTC
94f98a9 Remove cookie validation return value trick In the DTLS ClientHello processing the return value is stored in |ret| which by default is -1. |ret| is only updated to a positive value once we are past all points where we could hit an error. We wish to return 1 on success or 2 on success *and* we have validated the DTLS cookie. Previously on successful validation of the cookie we were setting |ret| to -2, and then once we were past all error points we set |ret = -ret|. This is non-obvious behaviour and could be error prone. This commit tries to make this a bit more intuitive. Reviewed-by: Andy Polyakov <appro@openssl.org> 01 December 2015, 15:23:42 UTC
301a6dc x86_64 assembly pack: tune clang version detection. RT#4142 Reviewed-by: Richard Levitte <levitte@openssl.org> (cherry picked from commit 76eba0d94bb418325be6409b272eac5e2bd4a0a9) Resolved conflicts: crypto/bn/asm/x86_64-mont.pl crypto/bn/asm/x86_64-mont5.pl Reviewed-by: Kurt Roeckx <kurt@openssl.org> 30 November 2015, 12:37:39 UTC
ed02493 Use both sun and __sun Reviewed-by: Andy Polyakov <appro@openssl.org> 24 November 2015, 22:44:05 UTC
296f7bd mark openssl configuration as loaded at end of OPENSSL_config Signed-off-by: Kurt Roeckx <kurt@roeckx.be> Reviewed-by: Rich Salz <rsalz@akamai.com> GH: #466 (cherry picked from commit 434b58457c8cca4d09f77a1774d6d2c446604bae) 24 November 2015, 21:05:10 UTC
a5b63f8 ssl3_free(): Return if it wasn't created If somewhere in SSL_new() there is a memory allocation failure, ssl3_free() can get called with s->s3 still being NULL. Patch also provided by Willy Tarreau <wtarreau@haproxy.com> Signed-off-by: Kurt Roeckx <kurt@roeckx.be> Reviewed-by: Viktor Dukhovni <openssl-users@dukhovni.org> (cherry picked from commit 3e7bd2ce0b16f8611298175d6dc7cb35ee06ea6d) 24 November 2015, 20:56:33 UTC
3a9328e Set reference count earlier Backport of 0e04674e964b905e67e3d215bcf888932c92765f Reviewed-by: Steve Henson <steve@openssl.org> RT #4047, #4110, MR #1356 24 November 2015, 20:54:38 UTC
943c4ca Fix uninitialised p error. Reviewed-by: Rich Salz <rsalz@openssl.org> (cherry picked from commit 63eb10a07ee29a312e50a227f5b3a290b1ad22b4) 24 November 2015, 16:55:34 UTC
d88ef40 Limit depth of ASN1 parse printing. Thanks to Guido Vranken <guidovranken@gmail.com> for reporting this issue. Reviewed-by: Tim Hudson <tjh@openssl.org> (cherry picked from commit 158e5207a794603f5d64ffa95e0247c7808ab445) Conflicts: crypto/asn1/asn1_par.c 24 November 2015, 15:29:05 UTC
9252d71 Makefile.org: add LC_ALL=C to unify error [and other] messages. RT#4138 Reviewed-by: Richard Levitte <levitte@openssl.org> (cherry picked from commit 193ed2d74b1a643b5f32bd46bf50a858fcdd2da4) 23 November 2015, 15:03:15 UTC
fb92839 Use defined(__sun) instead of defined(sun) Strict ISO confirming C compilers only define __sun Reviewed-by: Viktor Dukhovni <openssl-users@dukhovni.org> RT #4144, MR #1353 (cherry picked from commit 3d32218812e87221344f2985512e42e4aaa88745) 22 November 2015, 11:21:13 UTC
6d31885 Add initial AppVeyor configuration Original patch by Frank Morgner. Signed-off-by: Kurt Roeckx <kurt@roeckx.be> Reviewed-by: Rich Salz <rsalz@akamai.com> GH: #456 (cherry picked from commit 68db80e2d1accdd4c4a6b4763559c6cfe9663820) 21 November 2015, 19:15:36 UTC
03bf712 Good hygiene with size_t output argument. Though the callers check the function return value and ignore the size_t output argument on failure, it is still often not ideal to store -1 in a size_t on error. That might signal an unduly large buffer. Instead set the size_t to 0, to indicate no space. Reviewed-by: Richard Levitte <levitte@openssl.org> 21 November 2015, 10:23:20 UTC
56d9134 Ensure all EVP calls have their returns checked where appropriate There are lots of calls to EVP functions from within libssl There were various places where we should probably check the return value but don't. This adds these checks. Reviewed-by: Richard Levitte <levitte@openssl.org> 20 November 2015, 15:47:44 UTC
cb70eed Fix README version typo Reviewed-by: Steve Marquess <marquess@openssl.com> 19 November 2015, 15:20:21 UTC
01d625e Fix release in README Reviewed-by: Steve Marquess <marquess@openssl.com> 18 November 2015, 22:00:02 UTC
bc2ab6e aes/asm/vpaes-ppc.pl: eliminate overhung stores in misaligned cases. Reviewed-by: Richard Levitte <levitte@openssl.org> (cherry picked from commit ce24d2ed232a095349886aecc8cb959d5dda8342) 18 November 2015, 10:57:45 UTC
bef7693 bn/asm/ppc64-mont.pl: adapt for little-endian. The problem remained unnoticed so far, because it's never called by default. You have to craft OPENSSL_ppccap environment variable to trigger the problem. Reviewed-by: Richard Levitte <levitte@openssl.org> (cherry picked from commit e4693b4e2a0c3f6241d4d3e61460c34c7e0013f6) 16 November 2015, 12:41:58 UTC
c6a5fdd bn/asm/s390x.S: improve performance on z196 and z13 by up to 26%. [even z10 is couple percent faster]. Triggered by RT#4128, but solves the problem by real modulo-scheduling. Reviewed-by: Rich Salz <rsalz@openssl.org> (cherry picked from commit 9d0e4dc6351df7d0c08400c4b4cf17c017022e50) 16 November 2015, 12:11:27 UTC
817ddb9 aesni-sha256-x86_64.pl: fix crash on AMD Jaguar. It was also found that stich performs suboptimally on AMD Jaguar, hence execution is limited to XOP-capable and Intel processors. Reviewed-by: Kurt Roeckx <kurt@openssl.org> (cherry picked from commit a5fd24d19bbb586b1c6d235c2021e9bead22c9f5) 16 November 2015, 12:07:33 UTC
f236ef2 RT32671: wrong multiple errs TS_check_status_info Manual cherry-pick of 0704343f138a38d3882d5af2a4ebe8821e9a8f3a. Signed-off-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org> 13 November 2015, 21:57:08 UTC
4800800 modes/asm/ghash-armv4.pl: make it compile by clang. RT#3989 Reviewed-by: Matt Caswell <matt@openssl.org> 11 November 2015, 21:12:28 UTC
d40ec4a Stop DTLS servers asking for unsafe legacy renegotiation If a DTLS client that does not support secure renegotiation connects to an OpenSSL DTLS server then, by default, renegotiation is disabled. If a server application attempts to initiate a renegotiation then OpenSSL is supposed to prevent this. However due to a discrepancy between the TLS and DTLS code, the server sends a HelloRequest anyway in DTLS. This is not a security concern because the handshake will still fail later in the process when the client responds with a ClientHello. Reviewed-by: Tim Hudson <tjh@openssl.org> 10 November 2015, 19:24:20 UTC
15a7164 Only call ssl3_init_finished_mac once for DTLS In DTLS if an IO retry occurs during writing of a fragmented ClientHello then we can end up reseting the finish mac variables on the retry, which causes a handshake failure. We should only reset on the first attempt not on retries. Thanks to BoringSSL for reporting this issue. RT#4119 Reviewed-by: Tim Hudson <tjh@openssl.org> 10 November 2015, 18:44:56 UTC
822d265 Remove redundant check from tls1_get_curvelist The function tls1_get_curvelist() has an explicit check to see if s->cert is NULL or not. However the check appears *after* calling the tls1_suiteb macro which derefs s->cert. In reality s->cert can never be NULL because it is created in SSL_new(). If the malloc fails then the SSL_new call fails and no SSL object is created. Reviewed-by: Tim Hudson <tjh@openssl.org> (cherry picked from commit 6329b6092b28b656be8a1e4a8363d2e3bcc32053) Conflicts: ssl/t1_lib.c 09 November 2015, 23:10:31 UTC
903738a Fix missing malloc return value checks During work on a larger change in master a number of locations were identified where return value checks were missing. This backports the relevant fixes. Reviewed-by: Richard Levitte <levitte@openssl.org> 09 November 2015, 22:54:19 UTC
a89dda8 Make the match for previous cflags a bit more strict ./Configure [target] --strict-warnings -Wno-pedantic-ms-format would not add '-pedantic' because it matches '-Wno-pedantic-ms-format', which was added first. Reviewed-by: Matt Caswell <matt@openssl.org> (cherry picked from commit 6703c4ea87b30554283deaa5df1f8d68725d3ee4) 09 November 2015, 11:15:42 UTC
fdbe4a3 Reject TLS 1.2 ciphersuites if not allowed. Reviewed-by: Viktor Dukhovni <viktor@openssl.org> 08 November 2015, 13:47:53 UTC
0c0f136 Ensure the dtls1_get_*_methods work with DTLS_ANY_VERSION The various dtls1_get*_methods did not handle the DTLS_ANY_VERSION case, so this needed to be added. Reviewed-by: Tim Hudson <tjh@openssl.org> 04 November 2015, 14:46:03 UTC
ca3658e Minor EVP_SignInit_ex doc fix EVP_SignInit_ex was missing from the NAME section of its man page so typing "man EVP_SignInit_ex" failed to load the page. Reviewed-by: Stephen Henson <steve@openssl.org> (cherry picked from commit 3d866ea67e8b19777e88ac2a78ee4188e0983168) 04 November 2015, 14:39:16 UTC
back to top