commit_msg
stringlengths
1
24.2k
commit_hash
stringlengths
2
84
project
stringlengths
2
40
source
stringclasses
4 values
labels
int64
0
1
repo_url
stringlengths
26
70
commit_url
stringlengths
74
118
commit_date
stringlengths
25
25
Add SHA256 and SHA512 based output for 'openssl passwd' RT#4674 issue 2 Reviewed-by: Rich Salz <[email protected]>
4e57a12ba73fd96254ffde00066e212c3219583e
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/4e57a12ba73fd96254ffde00066e212c3219583e
2016-09-14 03:52:40+02:00
Skip a no-dsa test in the fipsinstall test In a similar way to the previous commit we also skip a fipsinstall test if DSA has been disabled. Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/11582)
9be92bec2eca839e26216cedc241f689c43125a5
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/9be92bec2eca839e26216cedc241f689c43125a5
2020-04-20 14:18:36+01:00
bugfix: calculate outlen for each curve Reviewed-by: Richard Levitte <[email protected]> Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/1658)
cc98e63938c6710fa3c79679adcffa754390ecaa
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/cc98e63938c6710fa3c79679adcffa754390ecaa
2016-10-04 09:17:11+03:00
ssl/statem/extensions_clnt.c: fix return code buglet. Reviewed-by: Matt Caswell <[email protected]> (Merged from https://github.com/openssl/openssl/pull/4297)
89bc9cf682e833d44fe135c901fe75f600d871ef
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/89bc9cf682e833d44fe135c901fe75f600d871ef
2017-08-31 23:24:30+02:00
remove ancient SSLeay bug workaround Reviewed-by: Matt Caswell <[email protected]>
7538cb82f941ecede9575aa04d401ffbe1dfb790
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/7538cb82f941ecede9575aa04d401ffbe1dfb790
2015-12-12 18:39:38+00:00
Fix a bug in the construction of the ClienHello SRTP extension Reviewed-by: Rich Salz <[email protected]>
7facdbd66f19f4a87cf2a5a335568c879772d92f
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/7facdbd66f19f4a87cf2a5a335568c879772d92f
2016-09-28 13:33:41+01:00
s390x assembly pack: improve portability. Some of the instructions used in latest additions are extension ones. There is no real reason to limit ourselves to specific processors, so [re-]adhere to base instruction set. RT#4548 Reviewed-by: Rich Salz <[email protected]>
0a4c87a90c6cf6628c688868cd5f13e4b9a5f19d
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/0a4c87a90c6cf6628c688868cd5f13e4b9a5f19d
2016-05-30 22:16:31+02:00
Fixed some grammar and spelling Reviewed-by: Richard Levitte <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> Reviewed-by: Matthias St. Pierre <[email protected]> (Merged from https://github.com/openssl/openssl/pull/19262)
af33b200da8040c78dbfd8405878190980727171
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/af33b200da8040c78dbfd8405878190980727171
2022-09-22 08:27:27-03:00
A few fixes in the EVP_KDF-KB and EVP_KDF-KRB5KDF manpages The context and label is info and salt respectively - fix the example in KB manpage for that. There are some typos and bug in EVP_KDF_derive call in the KRB5KDF example. Reviewed-by: Richard Levitte <[email protected]> (Merged from https://github.com/openssl/openssl/pull/10426)
a90311fead3d8e5178637f2d284fad95a47c281c
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/a90311fead3d8e5178637f2d284fad95a47c281c
2019-11-12 16:59:23+01:00
add documentation Reviewed-by: Rich Salz <[email protected]>
c082201a36303850e67300e0e8e3e2c67ed914dc
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/c082201a36303850e67300e0e8e3e2c67ed914dc
2016-08-12 17:27:11+01:00
test: add unit tests for TDES key wrap This functionality was completely untested. Doesn't fix #16002 since that's a bug against 1.1.1. Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/16343)
3d491c054ea8f662dc9dc499d3029d126a8726d3
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/3d491c054ea8f662dc9dc499d3029d126a8726d3
2021-08-18 11:58:11+10:00
Add PEM fuzzer This fuzzer can find CVE-2022-4450 Reviewed-by: Matt Caswell <[email protected]> Reviewed-by: Paul Dale <[email protected]> (Merged from https://github.com/openssl/openssl/pull/20242)
bc07d371865095643ec4f7190f26b174830a2f02
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/bc07d371865095643ec4f7190f26b174830a2f02
2022-12-13 22:10:47+01:00
X509_STORE_CTX_set_default(): improve error handling, also in its use Reviewed-by: Tomas Mraz <[email protected]> Reviewed-by: Shane Lontis <[email protected]> (Merged from https://github.com/openssl/openssl/pull/18918)
4fdc16af05d5e1e79ffebbae2b427f3a388227e3
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/4fdc16af05d5e1e79ffebbae2b427f3a388227e3
2022-07-31 07:15:40+02:00
Remove a reachable assert from ssl3_write_bytes A buggy application that call SSL_write with a different length after a NBIO event could cause an OPENSSL_assert to be reached. The assert is not actually necessary because there was an explicit check a little further down that would catch this scenario. Therefore remove the assert an move the check a little higher up. Reviewed-by: Rich Salz <[email protected]>
1c2e5d560d5143d8fc1cf7e6b598199201e60a45
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/1c2e5d560d5143d8fc1cf7e6b598199201e60a45
2015-10-30 17:01:01+00:00
Improve error handling in pk7_doit If a mem allocation failed we would ignore it. This commit fixes it to always check. Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/5596)
4718f449a3ecd5efac62b22d0fa9a759a7895dbc
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/4718f449a3ecd5efac62b22d0fa9a759a7895dbc
2018-03-12 13:56:34+00:00
Run-checker merge CI: Replace no-shared with no-modules ASAN otherwise fails to detect memleaks. Reviewed-by: Hugo Landau <[email protected]> Reviewed-by: Richard Levitte <[email protected]> Reviewed-by: Paul Dale <[email protected]> (Merged from https://github.com/openssl/openssl/pull/19860)
d5696547e46e9ea85fcb7581b9d49c58b7c24eeb
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/d5696547e46e9ea85fcb7581b9d49c58b7c24eeb
2022-12-08 14:24:40+01:00
DOC: Spelling fixes Signed-off-by: Sebastian Andrzej Siewior <[email protected]> Reviewed-by: Paul Dale <[email protected]> Reviewed-by: Dmitry Belyavskiy <[email protected]> (Merged from https://github.com/openssl/openssl/pull/12172)
bb361a27bafeb733417d9ab471973a333a924944
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/bb361a27bafeb733417d9ab471973a333a924944
2020-06-17 00:20:40+02:00
Fix spelling of error code Reviewed-by: Kurt Roeckx <[email protected]> Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/1421)
5898b8eb87e464b80153cae3424f4d283cb841b6
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/5898b8eb87e464b80153cae3424f4d283cb841b6
2016-08-06 17:03:15+02:00
BIO_s_accept.pod: add documentation for the new macros Reviewed-by: Rich Salz <[email protected]> Reviewed-by: Ben Kaduk <[email protected]> (Merged from https://github.com/openssl/openssl/pull/5007)
88b8d83e9e8869c60c556a86bee09f92c56c5a64
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/88b8d83e9e8869c60c556a86bee09f92c56c5a64
2018-01-09 20:18:24+01:00
Add documentation for running unit tests under Valgrind Reviewed-by: Tim Hudson <[email protected]> Reviewed-by: Richard Levitte <[email protected]> (Merged from https://github.com/openssl/openssl/pull/8867)
e616c11e170ef524b12e218537f4bf290057f8b7
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/e616c11e170ef524b12e218537f4bf290057f8b7
2019-05-02 14:37:18-04:00
Improve error message Reviewed-by: Rich Salz <[email protected]> Reviewed-by: Matt Caswell <[email protected]>
cfd451d47f4df63278f83612b9a5280d1801c5f6
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/cfd451d47f4df63278f83612b9a5280d1801c5f6
2016-08-04 00:23:39+02:00
Fix a bug in CKE construction for PSK In plain PSK we don't need to do anymore construction after the preamble. We weren't detecting this case and treating it as an unknown cipher. Reviewed-by: Rich Salz <[email protected]>
4a424545c4f3148bfbf54270422e05177b4c392f
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/4a424545c4f3148bfbf54270422e05177b4c392f
2016-09-29 12:04:08+01:00
STORE: Add the base functions to support provider based loaders This includes fixing a bug that could only be discovered when no loaders were registered. Reviewed-by: Shane Lontis <[email protected]> (Merged from https://github.com/openssl/openssl/pull/12512)
c4fc564d48456be622509886d3ea5618fce2a02e
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/c4fc564d48456be622509886d3ea5618fce2a02e
2020-07-22 22:54:54+02:00
Fix documentation of X509_VERIFY_PARAM_add0_policy() The function was incorrectly documented as enabling policy checking. Fixes: CVE-2023-0466 Reviewed-by: Paul Dale <[email protected]> Reviewed-by: Matt Caswell <[email protected]> (Merged from https://github.com/openssl/openssl/pull/20561)
5ab3f71a33cb0140fc29ae9244cd4f8331c2f3a5
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/5ab3f71a33cb0140fc29ae9244cd4f8331c2f3a5
2023-03-21 16:15:47+01:00
Address a bug in the DRBG tests where the reseeding wasn't properly reinstantiating the DRBG. Bug reported by Doug Gibbons. Reviewed-by: Paul Yang <[email protected]> (Merged from https://github.com/openssl/openssl/pull/8184)
b1522fa5ef676b7af0128eab3eee608af3416182
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/b1522fa5ef676b7af0128eab3eee608af3416182
2018-12-21 12:03:19+10:00
Add a test case for the name constraints bug Where a chain has name constraints but a certificate does not have a SAN extension but the CN meets the constraints, then this should be acceptable. However, and OpenSSL bug meant that an internal error was being reported. This adds a test case for that scenario. Test for CVE-2021-4044 Reviewed-by: Tomas Mraz <[email protected]>
0fcf2351ecff5db21cba431704e4da631b74904a
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/0fcf2351ecff5db21cba431704e4da631b74904a
2021-12-03 15:28:31+00:00
Fix spelling errors in manpages spelling: algorithm spelling: anyway spelling: assigned spelling: authenticated spelling: callback spelling: certificate spelling: compatibility spelling: configuration spelling: digest spelling: encrypted spelling: function spelling: output spelling: receive spelling: renegotiation spelling: signing spelling: similar spelling: string (Merged from https://github.com/openssl/openssl/pull/3580)Reviewed-by: Rich Salz <[email protected]> Reviewed-by: Kurt Roeckx <[email protected]> (Merged from https://github.com/openssl/openssl/pull/3580)
27b138e9db91bdfa1e3c55b0c3c9b2f02b5c0bf1
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/27b138e9db91bdfa1e3c55b0c3c9b2f02b5c0bf1
2017-05-19 00:16:38+00:00
util/find-doc-nits: Improve helpstr pattern matching Reviewed-by: Paul Dale <[email protected]> (Merged from https://github.com/openssl/openssl/pull/15299)
14d3bb06c9c11b3e13c64611913757c27bc057f2
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/14d3bb06c9c11b3e13c64611913757c27bc057f2
2021-05-19 09:38:20+02:00
Move the backtrace memleak options to a separate variable The contents of this variable ($memleak_devteam_backtrace) is added to $cflags unless we build for a platform we know doesn't support gcc's -rdynamic och backtrace() and friends. Reviewed-by: Andy Polyakov <[email protected]>
a1d3f3d1d0711eeece52f132e73b533d814770ac
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/a1d3f3d1d0711eeece52f132e73b533d814770ac
2015-12-02 18:44:26+01:00
Improve readability of evp.pod The changes are analogous to the ones made in commit 0bf340e1350e to x509.pod, see PR #4924. Reviewed-by: Rich Salz <[email protected]> Reviewed-by: Richard Levitte <[email protected]> Reviewed-by: Ben Kaduk <[email protected]> (Merged from https://github.com/openssl/openssl/pull/5012)
32b28859e0e194b8995cb9bcf2c9d65d4516835b
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/32b28859e0e194b8995cb9bcf2c9d65d4516835b
2018-01-03 22:14:02+01:00
Fix DH ASN1 decode so that it detects named groups. The dh->nid was not being set if the loaded p,g matched an inbuilt named group for "DH". NOTE: The "DHX" related path already worked since it calls DH_set0_pqg() (which does the name group check). This bug was detected when new tests were added for dh5114 groups, combined with the no-cache tests i.e. loading+import+export set the nid, but just loading did not. Reviewed-by: Richard Levitte <[email protected]> (Merged from https://github.com/openssl/openssl/pull/14207)
eabb3014165a1319ceb8a69cc135feb99f288293
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/eabb3014165a1319ceb8a69cc135feb99f288293
2021-02-17 13:13:51+10:00
Ensure that EXFLAG_INVALID_POLICY is checked even in leaf certs Even though we check the leaf cert to confirm it is valid, we later ignored the invalid flag and did not notice that the leaf cert was bad. Fixes: CVE-2023-0465 Reviewed-by: Hugo Landau <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/20585)
e4142ec43bcc08ffdb090580e24c24a7da302a32
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/e4142ec43bcc08ffdb090580e24c24a7da302a32
2023-03-07 16:52:55+00:00
Allocate bio_err before turning on memleak checks Reviewed-by: Tim Hudson <[email protected]>
d1b105827aef49ae16fd2d321bafa92b1a6489c9
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/d1b105827aef49ae16fd2d321bafa92b1a6489c9
2016-02-06 15:17:11-05:00
aesv8-armx.pl: Avoid buffer overrread in AES-XTS decryption Original author: Nevine Ebeid (Amazon) Fixes: CVE-2023-1255 The buffer overread happens on decrypts of 4 mod 5 sizes. Unless the memory just after the buffer is unmapped this is harmless. Reviewed-by: Paul Dale <[email protected]> Reviewed-by: Tom Cosgrove <[email protected]> (Merged from https://github.com/openssl/openssl/pull/20759)
72dfe46550ee1f1bbfacd49f071419365bc23304
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/72dfe46550ee1f1bbfacd49f071419365bc23304
2023-04-17 16:51:20+02:00
Fix file operations in c_rehash. CVE-2022-2068 Reviewed-by: Richard Levitte <[email protected]> Reviewed-by: Matt Caswell <[email protected]>
ce60b13707add7e6b54c5817376234c4043506ed
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/ce60b13707add7e6b54c5817376234c4043506ed
2022-05-29 20:11:24+02:00
Spelling fixes Reviewed-by: Andy Polyakov <[email protected]> Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/3066)
a8cd439bf58708ffe234a9f707cf6a394d28a1f9
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/a8cd439bf58708ffe234a9f707cf6a394d28a1f9
2017-02-10 23:17:00+01:00
Add a BN_mod_word test() The previous commit fixed a bug with BN_mod_word() which would have been caught if we had a test for it. This commit adds one. Reviewed-by: Andy Polyakov <[email protected]>
f44310e9ce2cdab64a9269ad8014be978e333db6
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/f44310e9ce2cdab64a9269ad8014be978e333db6
2016-05-31 11:38:52+01:00
Address a timing side channel whereby it is possible to determine some information about the length of the scalar used in ECDSA operations from a large number (2^32) of signatures. This doesn't rate as a CVE because: * For the non-constant time code, there are easier ways to extract more information. * For the constant time code, it requires a significant number of signatures to leak a small amount of information. Thanks to Neals Fournaise, Eliane Jaulmes and Jean-Rene Reinhard for reporting this issue. Reviewed-by: Andy Polyakov <[email protected]> Reviewed-by: Matt Caswell <[email protected]> (Merged from https://github.com/openssl/openssl/pull/4576)
4a089bbdf11f9e231cc68f42bba934c954d81a49
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/4a089bbdf11f9e231cc68f42bba934c954d81a49
2017-11-01 06:58:39+10:00
Improve robustness and performance of building Unix static libraries This is a fixup of 385deae79f26dd685339d3141a06d04d6bd753cd, which solved #12116 Reviewed-by: Paul Dale <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> Reviewed-by: Richard Levitte <[email protected]> (Merged from https://github.com/openssl/openssl/pull/12821)
0e60ce6334c86d271df5342029639048a635fefa
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/0e60ce6334c86d271df5342029639048a635fefa
2020-09-08 23:05:13+02:00
mem functions cleanup Only two macros CRYPTO_MDEBUG and CRYPTO_MDEBUG_ABORT to control this. If CRYPTO_MDEBUG is not set, #ifdef out the whole debug machinery. (Thanks to Jakob Bohm for the suggestion!) Make the "change wrapper functions" be the only paradigm. Wrote documentation! Format the 'set func' functions so their paramlists are legible. Format some multi-line comments. Remove ability to get/set the "memory debug" functions at runtme. Remove MemCheck_* and CRYPTO_malloc_debug_init macros. Add CRYPTO_mem_debug(int flag) function. Add test/memleaktest. Rename CRYPTO_malloc_init to OPENSSL_malloc_init; remove needless calls. Reviewed-by: Richard Levitte <[email protected]>
bbd86bf5424a611cb6b77a3a17fc522931c4dcb8
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/bbd86bf5424a611cb6b77a3a17fc522931c4dcb8
2016-01-07 15:06:38-05:00
RT3757: base64 encoding bugs Rewrite EVP_DecodeUpdate. In particular: reject extra trailing padding, and padding in the middle of the content. Don't limit line length. Add tests. Previously, the behaviour was ill-defined, and depended on the position of the padding within the input. In addition, this appears to fix a possible two-byte oob read. Reviewed-by: Richard Levitte <[email protected]> Reviewed-by: Rich Salz <[email protected]> Reviewed-by: Dr Stephen Henson <[email protected]>
3cdd1e94b1d71f2ce3002738f9506da91fe2af45
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/3cdd1e94b1d71f2ce3002738f9506da91fe2af45
2015-09-02 15:31:28+02:00
apps/pkey.c: Forther improve user guidance, also on non-sensical option combinations Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/13712)
046a7aaa5e3c398b19fcdb5b486d57ab9c6ced30
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/046a7aaa5e3c398b19fcdb5b486d57ab9c6ced30
2020-12-22 10:28:03+01:00
Fix small misspelling in doc for OCSP_response_status CLA: trivial Reviewed-by: Paul Yang <[email protected]> Reviewed-by: Matt Caswell <[email protected]> Reviewed-by: Matthias St. Pierre <[email protected]> (Merged from https://github.com/openssl/openssl/pull/10810)
924d041fe0c650a79449217f81880a6384ff06b2
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/924d041fe0c650a79449217f81880a6384ff06b2
2020-01-11 20:20:20+09:00
APPS load_key_certs_crls(): improve diagnostics on not finding expected types of contents Reviewed-by: Paul Dale <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/20156)
fedab100a4b8f4c3b81de632f29c159fb46ac3f2
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/fedab100a4b8f4c3b81de632f29c159fb46ac3f2
2023-01-16 19:38:01+01:00
apps/cmp.c: Improve user guidance on missing -subject etc. options Reviewed-by: Tomas Mraz <[email protected]> Reviewed-by: Paul Dale <[email protected]> (Merged from https://github.com/openssl/openssl/pull/12825)
62261446b21be4dcdc75af81e07253b803ae57f9
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/62261446b21be4dcdc75af81e07253b803ae57f9
2020-08-28 15:03:11+02:00
Avoid out-of-bounds read Fixes CVE 2017-3735 Reviewed-by: Kurt Roeckx <[email protected]> (Merged from https://github.com/openssl/openssl/pull/4276)
b23171744b01e473ebbfd6edad70c1c3825ffbcd
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/b23171744b01e473ebbfd6edad70c1c3825ffbcd
2017-08-22 11:44:41-04:00
Document command parameters. Add documentation for all commands that have parameters. Fix a couple of minor doc and programming bugs, too. Fixes #10313 Reviewed-by: Paul Dale <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/10371)
92de469fbd62a77a36dad5fde3a0ac7034071a59
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/92de469fbd62a77a36dad5fde3a0ac7034071a59
2019-09-19 21:33:17-04:00
Add an explicit list of options that can be disabled, enabled, ... Configure has, so far, had no control at all of which 'no-' options it can be given. This means that, for example, someone could configure with something absurd like 'no-stack' and then watch the build crumble to dust... or file a bug report. This introduces some sanity into the possible choices. The added list comes from looking for the explicit ones used in Configure, and from grepping after OPENSSL_NO_ in all source files. Reviewed-by: Rich Salz <[email protected]>
8b527be2db48064673640dda2d57edc6b362ae64
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/8b527be2db48064673640dda2d57edc6b362ae64
2015-10-22 17:09:14+02:00
DOC: Slightly improve the documentation of BIO_lookup() and related functions Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/15417)
d318fc954524e413148baa5fa1620f85fb008100
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/d318fc954524e413148baa5fa1620f85fb008100
2021-05-22 12:02:00+02:00
test/drbgtest.c: Fix error check test The condition in test_error_checks() was inverted, so it succeeded as long as error_check() failed. Incidently, error_check() contained several bugs that assured it always failed, thus giving overall drbg test success. Reviewed-by: Paul Dale <[email protected]> Reviewed-by: Matthias St. Pierre <[email protected]> (Merged from https://github.com/openssl/openssl/pull/11195)
11a6d6fd706d1fa095122d65d3076fb38f2c739c
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/11a6d6fd706d1fa095122d65d3076fb38f2c739c
2020-02-27 15:37:43+01:00
Fix bug in s_client. Previously default verify locations would only be loaded if CAfile or CApath were also supplied and successfully loaded first. Reviewed-by: Richard Levitte <[email protected]>
70e5fd877890489a3972bf8bf50bfec1fca3875e
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/70e5fd877890489a3972bf8bf50bfec1fca3875e
2015-02-25 11:30:43+00:00
Add decoder fuzzer This found CVE-2023-0217 Reviewed-by: Paul Dale <[email protected]> Reviewed-by: Matt Caswell <[email protected]> (Merged from https://github.com/openssl/openssl/pull/20269)
a9e6100bc98439ca787aa1fce541550ad1ff3e84
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/a9e6100bc98439ca787aa1fce541550ad1ff3e84
2023-01-11 21:14:35+01:00
Correct the documentation for OPENSSL_MALLOC_FD The documentation was misleading in that it suggests that this environment variable will record information about all allocations. While this is true it doesn't record the most useful information that you might expect such as the requested size of the allocation! It is mainly for use in conjunction with OPENSSL_MALLOC_FAILURES, and reports information about what chance an allocation has of failing. We also clarify that the mem_debug functions are actually no-ops in 3.0. Reviewed-by: Hugo Landau <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/18967)
2c35d61790603530d11f52eda9132ff8640f9852
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/2c35d61790603530d11f52eda9132ff8640f9852
2022-08-09 11:55:45+01:00
fixup! Improve readability of f_impl.c and f_impl.h Reviewed-by: Bernd Edlinger <[email protected]> (Merged from https://github.com/openssl/openssl/pull/5105)
18985129eb57d0bc162d376a5c0a160c22351999
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/18985129eb57d0bc162d376a5c0a160c22351999
2018-02-16 16:54:53+00:00
Fix an assertion in the DTLS server code This fixes an internal error alert from the server and an unexpected connection failure in the release version, but a failed assertion and a server crash in the debug version. Reproduce this issue with a DTLS server/client like that: ./openssl s_server -dtls -mtu 1500 ./openssl s_client -dtls -maxfraglen 512 In the debug version a crash happens in the Server now: ./openssl s_server -dtls -mtu 1500 Using default temp DH parameters ACCEPT ssl/statem/statem_dtls.c:269: OpenSSL internal error: Assertion failed: len == written Aborted (core dumped) While in the release version the handshake exceeds the negotiated max fragment size, and fails because of this: $ ./openssl s_server -dtls -mtu 1500 Using default temp DH parameters ACCEPT ERROR 4057152ADA7F0000:error:0A0000C2:SSL routines:do_dtls1_write:exceeds max fragment size:ssl/record/rec_layer_d1.c:826: shutting down SSL CONNECTION CLOSED From the client's point of view the connection fails with an Internal Error Alert: $ ./openssl s_client -dtls -maxfraglen 512 Connecting to ::1 CONNECTED(00000003) 40B76343377F0000:error:0A000438:SSL routines:dtls1_read_bytes:tlsv1 alert internal error:ssl/record/rec_layer_d1.c:613:SSL alert number 80 and now the connection attempt fails unexpectedly. Reviewed-by: Tomas Mraz <[email protected]> Reviewed-by: Matt Caswell <[email protected]> (Merged from https://github.com/openssl/openssl/pull/18093)
e915c3f5381cd38ebdc1824c3ba9896ea7160103
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/e915c3f5381cd38ebdc1824c3ba9896ea7160103
2022-04-11 10:12:48+02:00
Add a test for loading serverinfo data from memory The previous commit fixed a bug which occurs when serverinfo is loaded from memory (not from a file). This adds a test for loading serverinfo from memory. Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/3382)
16afd71c1dbafad398fc0c40e90b06acccca29de
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/16afd71c1dbafad398fc0c40e90b06acccca29de
2017-05-04 11:28:08+01:00
Make "openssl rehash" work on VMS 8.3 and up A spelling error prevented it from building correctly. Furthermore, we need to be more careful when to add a / at the end of the dirname and when not. Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/2706)
5c80e2af3a7d8aa5129a1668c286c1464983e1ac
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/5c80e2af3a7d8aa5129a1668c286c1464983e1ac
2017-02-22 16:48:55+01:00
apps/x509.c: Improve indentation of the large print loop in x509_main() Reviewed-by: Paul Dale <[email protected]> (Merged from https://github.com/openssl/openssl/pull/14340)
859e5f16213b1b80d06a20872ac137bdea708c29
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/859e5f16213b1b80d06a20872ac137bdea708c29
2021-02-26 11:51:43+01:00
Fix memleak in EVP_DigestSignFinal/VerifyFinal. Reviewed-by: Matt Caswell <[email protected]> Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/3658)
19546246cf44d30043fb17d1899b2c325924ac8b
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/19546246cf44d30043fb17d1899b2c325924ac8b
2017-06-12 18:05:19+02:00
Sanity check ticket length. If a ticket callback changes the HMAC digest to SHA512 the existing sanity checks are not sufficient and an attacker could perform a DoS attack with a malformed ticket. Add additional checks based on HMAC size. Thanks to Shi Lei for reporting this bug. CVE-2016-6302 Reviewed-by: Viktor Dukhovni <[email protected]>
e97763c92c655dcf4af2860b3abd2bc4c8a267f9
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/e97763c92c655dcf4af2860b3abd2bc4c8a267f9
2016-08-22 17:20:01+01:00
Fix append_ia5 function to not assume NUL terminated strings ASN.1 strings may not be NUL terminated. Don't assume they are. CVE-2021-3712 Reviewed-by: Viktor Dukhovni <[email protected]> Reviewed-by: Paul Dale <[email protected]> Reviewed-by: David Benjamin <[email protected]>
98624776c4d501c8badd6f772ab7048ac9191cb9
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/98624776c4d501c8badd6f772ab7048ac9191cb9
2021-08-18 17:58:23+01:00
ts: fix double free on error path. In function int_ts_RESP_verify_token, if (flags & TS_VFY_DATA) is true, function ts_compute_imprint() will be called at line 299. In the implementation of ts_compute_imprint, it allocates md_alg at line 406. But after the allocation, if the execution goto err, then md_alg will be freed in the first time by X509_ALGOR_free at line 439. After that, ts_compute_imprint returns 0 and the execution goto err branch of int_ts_RESP_verify_token. In the err branch, md_alg will be freed in the second time at line 320. Bug reported by @Yunlongs Fixes #14914 Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/14921)
db78c84eb2fa9c41124690bcc2ea50e05f5fc7b7
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/db78c84eb2fa9c41124690bcc2ea50e05f5fc7b7
2021-04-19 08:55:37+10:00
Do not dereference PKCS7 object data if not set Fixes CVE-2023-0216 Reviewed-by: Paul Dale <[email protected]> Reviewed-by: Matt Caswell <[email protected]>
80253dbdc92bec584f4a9866b43f8674156d838a
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/80253dbdc92bec584f4a9866b43f8674156d838a
2023-01-16 19:45:23+01:00
Fix early data bug with pause between EoED and CF If the server received EoED then SSL_read_early_data() will return SSL_READ_EARLY_DATA_FINISH. However if the CF has not yet been processed then SSL_is_init_finished() will still return 0. Therefore we should still be able to write early data. Fixes #3041 Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/3089)
116d0da5e8bcbb79ac1bdd1ec6bb861d9830e3a5
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/116d0da5e8bcbb79ac1bdd1ec6bb861d9830e3a5
2017-03-30 15:24:07+01:00
Fix typo and improve a bit of text Reviewed-by: Tim Hudson <[email protected]>
d231a4010bfa4032dc24a74c6cd3073e252864c4
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/d231a4010bfa4032dc24a74c6cd3073e252864c4
2015-12-06 22:17:15-05:00
Revert "Fix an error code spelling." This reverts commit 2b0bcfaf834e2fb7cd52888d7330b247e3878115. It wasn't reviewed. Reviewed-by: Rich Salz <[email protected]>
9f2a142b13a8fc37b811bc590baf847cc6be7ab3
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/9f2a142b13a8fc37b811bc590baf847cc6be7ab3
2016-04-04 16:11:04-04:00
Fix HelloVerifyRequest construction commit c536b6be1a introduced a bug that causes a reachable assert. This fixes it. Reviewed-by: Rich Salz <[email protected]>
98c1f5b429d036c0370de15f4d6851eed41fa5b3
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/98c1f5b429d036c0370de15f4d6851eed41fa5b3
2016-09-23 14:40:16+01:00
Remove outdated DEBUG flags. Add -DBIO_DEBUG to --strict-warnings. Remove comments about outdated debugging ifdef guards. Remove md_rand ifdef guarding an assert; it doesn't seem used. Remove the conf guards in conf_api since we use OPENSSL_assert, not assert. For pkcs12 stuff put OPENSSL_ in front of the macro name. Merge TLS_DEBUG into SSL_DEBUG. Various things just turned on/off asserts, mainly for checking non-NULL arguments, which is now removed: camellia, bn_ctx, crypto/modes. Remove some old debug code, that basically just printed things to stderr: DEBUG_PRINT_UNKNOWN_CIPHERSUITES, DEBUG_ZLIB, OPENSSL_RI_DEBUG, RL_DEBUG, RSA_DEBUG, SCRYPT_DEBUG. Remove OPENSSL_SSL_DEBUG_BROKEN_PROTOCOL. Reviewed-by: Richard Levitte <[email protected]>
d63a5e5e7d96f173e2bbf711e3f1f813bf0df05e
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/d63a5e5e7d96f173e2bbf711e3f1f813bf0df05e
2016-02-18 11:33:21-05:00
Comment away the extra checks in Configure The "extra checks" is a debugging tool to check the config resolving mechanism. It uses Perl's smart match, which is experimental and therefore always causes Perl to give out a warning, and it causes older Perl versions to fail entirely. So, it gets commented away, but stays otherwise in place, as it may be useful again. Reviewed-by: Matt Caswell <[email protected]>
c47188499631a0ff07740853d60f2196a147eed9
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/c47188499631a0ff07740853d60f2196a147eed9
2016-03-09 17:18:07+01:00
Bug fix in ossl_cmp_hdr_init(): sould not remember recipient as expected sender Reviewed-by: Matt Caswell <[email protected]> (Merged from https://github.com/openssl/openssl/pull/11998)
7e8dbb74620ac4420ad4d3adca51ce1b9a3e114c
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/7e8dbb74620ac4420ad4d3adca51ce1b9a3e114c
2020-05-29 17:11:48+02:00
Fix session tickets Commit 9ceb2426b0 (PACKETise ClientHello) broke session tickets by failing to detect the session ticket extension in an incoming ClientHello. This commit fixes the bug. Reviewed-by: Emilia Käsper <[email protected]>
c83eda8c22f08346d5434662643de523a469c81e
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/c83eda8c22f08346d5434662643de523a469c81e
2015-08-13 10:04:23+01:00
Fix setting of debug callback in apps/enc.c Setting the debug callback on the in and out BIOs were done too early. No debug callback was set on the zlib filter BIO. Reviewed-by: Tim Hudson <[email protected]>
7a82f778bd23eec978d57679de48def0e5010284
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/7a82f778bd23eec978d57679de48def0e5010284
2016-04-13 02:43:45+02:00
Remove documentation of deleted function It's even removing a BUGS entry! Reviewed-by: Emilia Käsper <[email protected]> Reviewed-by: Rich Salz <[email protected]> Reviewed-by: Richard Levitte <[email protected]> (Merged from https://github.com/openssl/openssl/pull/2797)
0ae407eebe9aafecb7181f75935fcc344318a578
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/0ae407eebe9aafecb7181f75935fcc344318a578
2017-02-28 16:39:01-06:00
Fix no-cms (CVE-2016-7053) Reviewed-by: Matt Caswell <[email protected]>
9d7ce8d42b80fda2566c70f0d4de4069bb34e72c
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/9d7ce8d42b80fda2566c70f0d4de4069bb34e72c
2016-11-10 01:49:47+01:00
Fix AES OCB encrypt/decrypt for x86 AES-NI aesni_ocb_encrypt and aesni_ocb_decrypt operate by having a fast-path that performs operations on 6 16-byte blocks concurrently (the "grandloop") and then proceeds to handle the "short" tail (which can be anywhere from 0 to 5 blocks) that remain. As part of initialization, the assembly initializes $len to the true length, less 96 bytes and converts it to a pointer so that the $inp can be compared to it. Each iteration of "grandloop" checks to see if there's a full 96-byte chunk to process, and if so, continues. Once this has been exhausted, it falls through to "short", which handles the remaining zero to five blocks. Unfortunately, the jump at the end of "grandloop" had a fencepost error, doing a `jb` ("jump below") rather than `jbe` (jump below or equal). This should be `jbe`, as $inp is pointing to the *end* of the chunk currently being handled. If $inp == $len, that means that there's a whole 96-byte chunk waiting to be handled. If $inp > $len, then there's 5 or fewer 16-byte blocks left to be handled, and the fall-through is intended. The net effect of `jb` instead of `jbe` is that the last 16-byte block of the last 96-byte chunk was completely omitted. The contents of `out` in this position were never written to. Additionally, since those bytes were never processed, the authentication tag generated is also incorrect. The same fencepost error, and identical logic, exists in both aesni_ocb_encrypt and aesni_ocb_decrypt. This addresses CVE-2022-2097. Co-authored-by: Alejandro Sedeño <[email protected]> Co-authored-by: David Benjamin <[email protected]> Reviewed-by: Paul Dale <[email protected]> Reviewed-by: Tomas Mraz <[email protected]>
6ebf6d51596f51d23ccbc17930778d104a57d99c
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/6ebf6d51596f51d23ccbc17930778d104a57d99c
2022-06-16 12:00:22+10:00
Add $debug variable and use it Reviewed-by: Richard Levitte <[email protected]> Reviewed-by: Matthias St. Pierre <[email protected]> Reviewed-by: Paul Dale <[email protected]> (Merged from https://github.com/openssl/openssl/pull/10852)
0eb154663478968137112441d16b593fdf2ebcf8
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/0eb154663478968137112441d16b593fdf2ebcf8
2020-01-15 11:41:07-05:00
doc: fix spelling of TYPE_get_ex_new_index The generated macros are TYPE_get_ex_new_index() (to match CRYPTO_get_ex_new_index()), not TYPE_get_new_ex_index(), even though the latter spelling seems more natural. Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/10943)
fe41c06e69613b1a4814b3e3cdbf460f2678ec99
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/fe41c06e69613b1a4814b3e3cdbf460f2678ec99
2020-01-17 11:15:59-08:00
Fix CipherInit on s390x. Various different initialization sequences led to bugs on s390x due to caching and processing during key setting. Since, e.g., the direction does not necessarily have to be correct during initialization, this produced bugs in s390x which were not present on other architectures. Fix this by recomputing the function codes on the fly during updates and final operations. Signed-off-by: Juergen Christ <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> Reviewed-by: Paul Dale <[email protected]> (Merged from https://github.com/openssl/openssl/pull/15521)
ff555f81365d1c09a408019924cace4a0f457ef6
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/ff555f81365d1c09a408019924cace4a0f457ef6
2021-05-28 15:02:52+02:00
srp: fix double free, In function SRP_create_verifier_ex, it calls SRP_create_verifier_BN_ex(..., &v, ..) at line 653. In the implementation of SRP_create_verifier_BN_ex(), *verify (which is the paremeter of v) is allocated a pointer via BN_new() at line 738. And *verify is freed via BN_clear_free() at line 743, and return 0. Then the execution continues up to goto err at line 655, and the freed v is freed again at line 687. Bug reported by @Yunlongs Fixes #14913 Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/14921)
b06450bcf763735a89b65ca3ec176600fe7fceed
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/b06450bcf763735a89b65ca3ec176600fe7fceed
2021-04-19 08:51:38+10:00
Fix malloc define typo Fix compilation failure when SCTP is compiled due to incorrect define. Reported-by: Conrad Kostecki <[email protected]> URL: https://bugs.gentoo.org/543828 RT#3758 Signed-off-by: Matt Caswell <[email protected]> Reviewed-by: Tim Hudson <[email protected]>
7c82e339a677f8546e1456c7a8f6788598a9de43
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/7c82e339a677f8546e1456c7a8f6788598a9de43
2015-03-21 05:08:41-04:00
Extend ServerKeyExchange parsing to work with a signature Previously SKE in TLSProxy only knew about one anonymous ciphersuite so there was never a signature. Extend that to include a ciphersuite that is not anonymous. This also fixes a bug where the existing SKE processing was checking against the wrong anon ciphersuite value. This has a knock on impact on the sslskewith0p test. The bug meant the test was working...but entirely by accident! Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/2157)
79d8c167857d1c776a6fbdb2aff166a126cab03e
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/79d8c167857d1c776a6fbdb2aff166a126cab03e
2017-01-05 12:32:06+00:00
Fix aesni_cbc_sha256_enc_avx2 backtrace info We store a secondary frame pointer info for the debugger in the red zone. This fixes a crash in the unwinder when this function is interrupted. Additionally the missing cfi function annotation is added to aesni_cbc_sha256_enc_shaext. [extended tests] Reviewed-by: Richard Levitte <[email protected]> (Merged from https://github.com/openssl/openssl/pull/10674)
665de4d48aef2507022a7d74f5c7f6e339d5e6bc
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/665de4d48aef2507022a7d74f5c7f6e339d5e6bc
2019-12-21 22:09:45+01:00
RAND_add()/RAND_seed(): fix failure on short input or low entropy Commit 5b4cb385c18a (#7382) introduced a bug which had the effect that RAND_add()/RAND_seed() failed for buffer sizes less than 32 bytes. The reason was that now the added random data was used exlusively as entropy source for reseeding. When the random input was too short or contained not enough entropy, the DRBG failed without querying the available entropy sources. This commit makes drbg_add() act smarter: it checks the entropy requirements explicitely. If the random input fails this check, it won't be added as entropy input, but only as additional data. More precisely, the behaviour depends on whether an os entropy source was configured (which is the default on most os): - If an os entropy source is avaible then we declare the buffer content as additional data by setting randomness to zero and trigger a regular reseeding. - If no os entropy source is available, a reseeding will fail inevitably. So drbg_add() uses a trick to mix the buffer contents into the DRBG state without forcing a reseeding: it generates a dummy random byte, using the buffer content as additional data. Related-to: #7449 Reviewed-by: Paul Dale <[email protected]> (Merged from https://github.com/openssl/openssl/pull/7456)
8817215d5c52a76f2b184b624bde4df8556dee6d
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/8817215d5c52a76f2b184b624bde4df8556dee6d
2018-10-21 15:45:34+02:00
Move cpuid_asm_src file information to build.info files Also took away the internal 'debug-linux-ia32-aes' config target, as it's broken (refers to files that no longer exist). Reviewed-by: Matt Caswell <[email protected]> (Merged from https://github.com/openssl/openssl/pull/9166)
6e1ba4721906c0a8486ca5acfb75353fec6c582b
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/6e1ba4721906c0a8486ca5acfb75353fec6c582b
2019-06-16 19:35:08+02:00
Fix spelling Reviewed-by: Rich Salz <[email protected]>
29d0932721b2da7e4980abe50aec418f28136fe9
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/29d0932721b2da7e4980abe50aec418f28136fe9
2016-02-18 00:32:13+01:00
Improve ossl_cmp_msg_check_received() and rename to ossl_cmp_msg_check_update() Bugfix: allow using extraCerts contained in msg already while checking signature Improve function name, simplify its return value, and update its documentation Reviewed-by: Matt Caswell <[email protected]> (Merged from https://github.com/openssl/openssl/pull/11998)
430efff1b9baa36099b5443c924f96b854e00300
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/430efff1b9baa36099b5443c924f96b854e00300
2020-05-28 17:19:36+02:00
Coverity: misuses of time_t Coverity 1508506: Fixes a bug in the cookie code which would have caused problems for ten minutes before and after the lower 32 bits of time_t rolled over. Coverity 1508534 & 1508540: Avoid problems when the lower 32 bits of time_t roll over by delaying the cast to integer until after the time delta has been computed. Reviewed-by: Ben Kaduk <[email protected]> Reviewed-by: Matt Caswell <[email protected]> (Merged from https://github.com/openssl/openssl/pull/19004)
e8a557dc3c1ed16faff4aeb39268f8f5a3f8b81d
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/e8a557dc3c1ed16faff4aeb39268f8f5a3f8b81d
2022-08-16 11:05:02+10:00
Remove debugging leftovers in apps/opt.c Reviewed-by: Stephen Henson <[email protected]> Reviewed-by: Rich Salz <[email protected]>
e546e2cc8ca6f984cc1fb618b136bb28304927c9
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/e546e2cc8ca6f984cc1fb618b136bb28304927c9
2017-02-28 11:47:10+01:00
Bugfix: in asn1parse avoid erroneous len after a sub-sequence Introduced in: commit 79c7f74d6cefd5d32fa20e69195ad3de834ce065 Author: Ben Laurie <[email protected]> Date: Tue Mar 29 19:37:57 2016 +0100 Fix buffer overrun in ASN1_parse(). Problem input: https://tools.ietf.org/html/draft-ietf-curdle-pkix-eddsa-00#section-8.1 -----BEGIN PUBLIC KEY----- MC0wCAYDK2VkCgECAyEAGb9ECWmEzf6FQbrBZ9w7lshQhqowtrbLDFw4rXAxZuE= -----END PUBLIC KEY----- Previously: 0:d=0 hl=2 l= 45 cons: SEQUENCE 2:d=1 hl=2 l= 8 cons: SEQUENCE 4:d=2 hl=2 l= 3 prim: OBJECT :1.3.101.100 9:d=2 hl=2 l= 1 prim: ENUMERATED :02 Error in encoding 140735164989440:error:0D07207B:asn1 encoding routines:ASN1_get_object:header too long:../openssl/crypto/asn1/asn1_lib.c:148: Now: 0:d=0 hl=2 l= 45 cons: SEQUENCE 2:d=1 hl=2 l= 8 cons: SEQUENCE 4:d=2 hl=2 l= 3 prim: OBJECT :1.3.101.100 9:d=2 hl=2 l= 1 prim: ENUMERATED :02 12:d=1 hl=2 l= 33 prim: BIT STRING 0000 - 00 19 bf 44 09 69 84 cd-fe 85 41 ba c1 67 dc 3b ...D.i....A..g.; 0010 - 96 c8 50 86 aa 30 b6 b6-cb 0c 5c 38 ad 70 31 66 ..P..0....\8.p1f 0020 - e1 . Reviewed-by: Richard Levitte <[email protected]>
bdcd660e33710079b495cf5cc6a1aaa5d2dcd317
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/bdcd660e33710079b495cf5cc6a1aaa5d2dcd317
2016-04-13 23:14:43-04:00
Improve the checking of pod sections (i.e. remove some bugs) Reviewed-by: Rich Salz <[email protected]>
c4d598939ac275ce0c4a28d6b76efd1e2e47af05
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/c4d598939ac275ce0c4a28d6b76efd1e2e47af05
2016-05-23 00:36:37+02:00
Address a timing side channel whereby it is possible to determine some information about the length of a value used in DSA operations from a large number of signatures. This doesn't rate as a CVE because: * For the non-constant time code, there are easier ways to extract more information. * For the constant time code, it requires a significant number of signatures to leak a small amount of information. Thanks to Neals Fournaise, Eliane Jaulmes and Jean-Rene Reinhard for reporting this issue. Reviewed-by: Andy Polyakov <[email protected]> Reviewed-by: Matt Caswell <[email protected]> (Merged from https://github.com/openssl/openssl/pull/4576)
c0caa945f6ef30363e0d01d75155f20248403df4
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/c0caa945f6ef30363e0d01d75155f20248403df4
2017-11-01 06:58:13+10:00
apps_ui.c: Improve error handling and return value of setup_ui_method() Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/12493)
f84de16f397b06831ea5569a285518c035285f46
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/f84de16f397b06831ea5569a285518c035285f46
2020-08-04 10:11:02+02:00
Improve documentation about reading and writing Reviewed-by: Matt Caswell <[email protected]> GH: #6240
57fd517066418472b3280a975823405fb8f2f43d
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/57fd517066418472b3280a975823405fb8f2f43d
2018-05-13 11:24:11+02:00
Add a test for the bug fixed in the previous commit We want to make sure that if we if are using SSL_MODE_AUTO_RETRY then if SSL_read_early_data() hits EndOfEarlyData then it doesn't auto retry and end up with normal data. The same issue could occur with read_ahead which is what we use in this test. Reviewed-by: Richard Levitte <[email protected]> (Merged from https://github.com/openssl/openssl/pull/3077)
3cb47b4ec1514248996ca037a5e7890ea7fdc855
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/3cb47b4ec1514248996ca037a5e7890ea7fdc855
2017-03-29 17:02:25+01:00
Remove OSSLzu macros and use %zu in the test framework (via BIO_printf). Convert the debug prints in dtls_mtu_test.c to use the framework. Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/3730)
bff951eeb1f86207ac02e0f73305c31ac0ab5f4f
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/bff951eeb1f86207ac02e0f73305c31ac0ab5f4f
2017-06-21 08:39:54+10:00
Remove support for SSL_OP_NETSCAPE_CA_DN_BUG. This is an ancient bug workaround for Netscape clients. The documentation talks about versions 3.x and 4.x beta. Reviewed-by: Tim Hudson <[email protected]>
3c33c6f6b10864355553961e638514a6d1bb00f6
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/3c33c6f6b10864355553961e638514a6d1bb00f6
2015-02-05 15:57:54+00:00
Fix bugs in 3GPP exception checking and improve diagnostics in crypt/cmp/cmp_vfy.c Reviewed-by: Matt Caswell <[email protected]> Reviewed-by: David von Oheimb <[email protected]> (Merged from https://github.com/openssl/openssl/pull/11448)
a1e4c8ef8125bfff403d49d60a625f75b3074a79
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/a1e4c8ef8125bfff403d49d60a625f75b3074a79
2020-03-30 16:40:14+02:00
Check for errors in BN_bn2dec() If an oversize BIGNUM is presented to BN_bn2dec() it can cause BN_div_word() to fail and not reduce the value of 't' resulting in OOB writes to the bn_data buffer and eventually crashing. Fix by checking return value of BN_div_word() and checking writes don't overflow buffer. Thanks to Shi Lei for reporting this bug. CVE-2016-2182 Reviewed-by: Tim Hudson <[email protected]>
07bed46f332fce8c1d157689a2cdf915a982ae34
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/07bed46f332fce8c1d157689a2cdf915a982ae34
2016-08-05 14:26:03+01:00
Fix OCSP_RESPID processing bug introduced by WPACKET changes An OCSP_RESPID in a status request extension has 2 bytes for the length not 1. Reviewed-by: Rich Salz <[email protected]>
dd8710dc54f5123d0fa54b5c90fc2c3a9dae43fe
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/dd8710dc54f5123d0fa54b5c90fc2c3a9dae43fe
2016-09-13 23:59:11+01:00
Provide a test for pause between EoED and CF This tests the bug fixed in the previous commit. We introduce a synthetic delay between the server receiving EoED and CF and check that we can still send early data. Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/3089)
9b5c865df0626d85065eacff714f20e2c721ca56
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/9b5c865df0626d85065eacff714f20e2c721ca56
2017-03-30 15:26:23+01:00