commit_msg
stringlengths 1
24.2k
| commit_hash
stringlengths 2
84
⌀ | project
stringlengths 2
40
| source
stringclasses 4
values | labels
int64 0
1
| repo_url
stringlengths 26
70
⌀ | commit_url
stringlengths 74
118
⌀ | commit_date
stringlengths 25
25
⌀ |
---|---|---|---|---|---|---|---|
Add SHA256 and SHA512 based output for 'openssl passwd'
RT#4674 issue 2
Reviewed-by: Rich Salz <[email protected]>
| 4e57a12ba73fd96254ffde00066e212c3219583e | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/4e57a12ba73fd96254ffde00066e212c3219583e | 2016-09-14 03:52:40+02:00 |
Skip a no-dsa test in the fipsinstall test
In a similar way to the previous commit we also skip a fipsinstall test
if DSA has been disabled.
Reviewed-by: Tomas Mraz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/11582)
| 9be92bec2eca839e26216cedc241f689c43125a5 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/9be92bec2eca839e26216cedc241f689c43125a5 | 2020-04-20 14:18:36+01:00 |
bugfix: calculate outlen for each curve
Reviewed-by: Richard Levitte <[email protected]>
Reviewed-by: Rich Salz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/1658) | cc98e63938c6710fa3c79679adcffa754390ecaa | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/cc98e63938c6710fa3c79679adcffa754390ecaa | 2016-10-04 09:17:11+03:00 |
ssl/statem/extensions_clnt.c: fix return code buglet.
Reviewed-by: Matt Caswell <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/4297)
| 89bc9cf682e833d44fe135c901fe75f600d871ef | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/89bc9cf682e833d44fe135c901fe75f600d871ef | 2017-08-31 23:24:30+02:00 |
remove ancient SSLeay bug workaround
Reviewed-by: Matt Caswell <[email protected]>
| 7538cb82f941ecede9575aa04d401ffbe1dfb790 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/7538cb82f941ecede9575aa04d401ffbe1dfb790 | 2015-12-12 18:39:38+00:00 |
Fix a bug in the construction of the ClienHello SRTP extension
Reviewed-by: Rich Salz <[email protected]>
| 7facdbd66f19f4a87cf2a5a335568c879772d92f | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/7facdbd66f19f4a87cf2a5a335568c879772d92f | 2016-09-28 13:33:41+01:00 |
s390x assembly pack: improve portability.
Some of the instructions used in latest additions are extension
ones. There is no real reason to limit ourselves to specific
processors, so [re-]adhere to base instruction set.
RT#4548
Reviewed-by: Rich Salz <[email protected]>
| 0a4c87a90c6cf6628c688868cd5f13e4b9a5f19d | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/0a4c87a90c6cf6628c688868cd5f13e4b9a5f19d | 2016-05-30 22:16:31+02:00 |
Fixed some grammar and spelling
Reviewed-by: Richard Levitte <[email protected]>
Reviewed-by: Tomas Mraz <[email protected]>
Reviewed-by: Matthias St. Pierre <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/19262)
| af33b200da8040c78dbfd8405878190980727171 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/af33b200da8040c78dbfd8405878190980727171 | 2022-09-22 08:27:27-03:00 |
A few fixes in the EVP_KDF-KB and EVP_KDF-KRB5KDF manpages
The context and label is info and salt respectively - fix
the example in KB manpage for that.
There are some typos and bug in EVP_KDF_derive call in the
KRB5KDF example.
Reviewed-by: Richard Levitte <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/10426)
| a90311fead3d8e5178637f2d284fad95a47c281c | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/a90311fead3d8e5178637f2d284fad95a47c281c | 2019-11-12 16:59:23+01:00 |
add documentation
Reviewed-by: Rich Salz <[email protected]>
| c082201a36303850e67300e0e8e3e2c67ed914dc | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/c082201a36303850e67300e0e8e3e2c67ed914dc | 2016-08-12 17:27:11+01:00 |
test: add unit tests for TDES key wrap
This functionality was completely untested.
Doesn't fix #16002 since that's a bug against 1.1.1.
Reviewed-by: Tomas Mraz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/16343)
| 3d491c054ea8f662dc9dc499d3029d126a8726d3 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/3d491c054ea8f662dc9dc499d3029d126a8726d3 | 2021-08-18 11:58:11+10:00 |
Add PEM fuzzer
This fuzzer can find CVE-2022-4450
Reviewed-by: Matt Caswell <[email protected]>
Reviewed-by: Paul Dale <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/20242)
| bc07d371865095643ec4f7190f26b174830a2f02 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/bc07d371865095643ec4f7190f26b174830a2f02 | 2022-12-13 22:10:47+01:00 |
X509_STORE_CTX_set_default(): improve error handling, also in its use
Reviewed-by: Tomas Mraz <[email protected]>
Reviewed-by: Shane Lontis <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/18918)
| 4fdc16af05d5e1e79ffebbae2b427f3a388227e3 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/4fdc16af05d5e1e79ffebbae2b427f3a388227e3 | 2022-07-31 07:15:40+02:00 |
Remove a reachable assert from ssl3_write_bytes
A buggy application that call SSL_write with a different length after a
NBIO event could cause an OPENSSL_assert to be reached. The assert is not
actually necessary because there was an explicit check a little further
down that would catch this scenario. Therefore remove the assert an move
the check a little higher up.
Reviewed-by: Rich Salz <[email protected]>
| 1c2e5d560d5143d8fc1cf7e6b598199201e60a45 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/1c2e5d560d5143d8fc1cf7e6b598199201e60a45 | 2015-10-30 17:01:01+00:00 |
Improve error handling in pk7_doit
If a mem allocation failed we would ignore it. This commit fixes it to
always check.
Reviewed-by: Rich Salz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/5596)
| 4718f449a3ecd5efac62b22d0fa9a759a7895dbc | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/4718f449a3ecd5efac62b22d0fa9a759a7895dbc | 2018-03-12 13:56:34+00:00 |
Run-checker merge CI: Replace no-shared with no-modules
ASAN otherwise fails to detect memleaks.
Reviewed-by: Hugo Landau <[email protected]>
Reviewed-by: Richard Levitte <[email protected]>
Reviewed-by: Paul Dale <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/19860)
| d5696547e46e9ea85fcb7581b9d49c58b7c24eeb | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/d5696547e46e9ea85fcb7581b9d49c58b7c24eeb | 2022-12-08 14:24:40+01:00 |
DOC: Spelling fixes
Signed-off-by: Sebastian Andrzej Siewior <[email protected]>
Reviewed-by: Paul Dale <[email protected]>
Reviewed-by: Dmitry Belyavskiy <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/12172)
| bb361a27bafeb733417d9ab471973a333a924944 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/bb361a27bafeb733417d9ab471973a333a924944 | 2020-06-17 00:20:40+02:00 |
Fix spelling of error code
Reviewed-by: Kurt Roeckx <[email protected]>
Reviewed-by: Rich Salz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/1421) | 5898b8eb87e464b80153cae3424f4d283cb841b6 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/5898b8eb87e464b80153cae3424f4d283cb841b6 | 2016-08-06 17:03:15+02:00 |
BIO_s_accept.pod: add documentation for the new macros
Reviewed-by: Rich Salz <[email protected]>
Reviewed-by: Ben Kaduk <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/5007)
| 88b8d83e9e8869c60c556a86bee09f92c56c5a64 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/88b8d83e9e8869c60c556a86bee09f92c56c5a64 | 2018-01-09 20:18:24+01:00 |
Add documentation for running unit tests under Valgrind
Reviewed-by: Tim Hudson <[email protected]>
Reviewed-by: Richard Levitte <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/8867)
| e616c11e170ef524b12e218537f4bf290057f8b7 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/e616c11e170ef524b12e218537f4bf290057f8b7 | 2019-05-02 14:37:18-04:00 |
Improve error message
Reviewed-by: Rich Salz <[email protected]>
Reviewed-by: Matt Caswell <[email protected]>
| cfd451d47f4df63278f83612b9a5280d1801c5f6 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/cfd451d47f4df63278f83612b9a5280d1801c5f6 | 2016-08-04 00:23:39+02:00 |
Fix a bug in CKE construction for PSK
In plain PSK we don't need to do anymore construction after the preamble.
We weren't detecting this case and treating it as an unknown cipher.
Reviewed-by: Rich Salz <[email protected]>
| 4a424545c4f3148bfbf54270422e05177b4c392f | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/4a424545c4f3148bfbf54270422e05177b4c392f | 2016-09-29 12:04:08+01:00 |
STORE: Add the base functions to support provider based loaders
This includes fixing a bug that could only be discovered when no
loaders were registered.
Reviewed-by: Shane Lontis <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/12512)
| c4fc564d48456be622509886d3ea5618fce2a02e | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/c4fc564d48456be622509886d3ea5618fce2a02e | 2020-07-22 22:54:54+02:00 |
Fix documentation of X509_VERIFY_PARAM_add0_policy()
The function was incorrectly documented as enabling policy checking.
Fixes: CVE-2023-0466
Reviewed-by: Paul Dale <[email protected]>
Reviewed-by: Matt Caswell <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/20561)
| 5ab3f71a33cb0140fc29ae9244cd4f8331c2f3a5 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/5ab3f71a33cb0140fc29ae9244cd4f8331c2f3a5 | 2023-03-21 16:15:47+01:00 |
Address a bug in the DRBG tests where the reseeding wasn't properly
reinstantiating the DRBG.
Bug reported by Doug Gibbons.
Reviewed-by: Paul Yang <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/8184)
| b1522fa5ef676b7af0128eab3eee608af3416182 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/b1522fa5ef676b7af0128eab3eee608af3416182 | 2018-12-21 12:03:19+10:00 |
Add a test case for the name constraints bug
Where a chain has name constraints but a certificate does not have a SAN
extension but the CN meets the constraints, then this should be acceptable.
However, and OpenSSL bug meant that an internal error was being reported.
This adds a test case for that scenario.
Test for CVE-2021-4044
Reviewed-by: Tomas Mraz <[email protected]>
| 0fcf2351ecff5db21cba431704e4da631b74904a | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/0fcf2351ecff5db21cba431704e4da631b74904a | 2021-12-03 15:28:31+00:00 |
Fix spelling errors in manpages
spelling: algorithm
spelling: anyway
spelling: assigned
spelling: authenticated
spelling: callback
spelling: certificate
spelling: compatibility
spelling: configuration
spelling: digest
spelling: encrypted
spelling: function
spelling: output
spelling: receive
spelling: renegotiation
spelling: signing
spelling: similar
spelling: string
(Merged from https://github.com/openssl/openssl/pull/3580)Reviewed-by: Rich Salz <[email protected]>
Reviewed-by: Kurt Roeckx <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/3580) | 27b138e9db91bdfa1e3c55b0c3c9b2f02b5c0bf1 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/27b138e9db91bdfa1e3c55b0c3c9b2f02b5c0bf1 | 2017-05-19 00:16:38+00:00 |
util/find-doc-nits: Improve helpstr pattern matching
Reviewed-by: Paul Dale <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/15299)
| 14d3bb06c9c11b3e13c64611913757c27bc057f2 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/14d3bb06c9c11b3e13c64611913757c27bc057f2 | 2021-05-19 09:38:20+02:00 |
Move the backtrace memleak options to a separate variable
The contents of this variable ($memleak_devteam_backtrace) is added to
$cflags unless we build for a platform we know doesn't support gcc's
-rdynamic och backtrace() and friends.
Reviewed-by: Andy Polyakov <[email protected]>
| a1d3f3d1d0711eeece52f132e73b533d814770ac | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/a1d3f3d1d0711eeece52f132e73b533d814770ac | 2015-12-02 18:44:26+01:00 |
Improve readability of evp.pod
The changes are analogous to the ones made in commit 0bf340e1350e
to x509.pod, see PR #4924.
Reviewed-by: Rich Salz <[email protected]>
Reviewed-by: Richard Levitte <[email protected]>
Reviewed-by: Ben Kaduk <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/5012)
| 32b28859e0e194b8995cb9bcf2c9d65d4516835b | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/32b28859e0e194b8995cb9bcf2c9d65d4516835b | 2018-01-03 22:14:02+01:00 |
Fix DH ASN1 decode so that it detects named groups.
The dh->nid was not being set if the loaded p,g matched an inbuilt named
group for "DH".
NOTE: The "DHX" related path already worked since it calls DH_set0_pqg()
(which does the name group check).
This bug was detected when new tests were added for dh5114 groups, combined
with the no-cache tests i.e. loading+import+export set the nid,
but just loading did not.
Reviewed-by: Richard Levitte <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/14207)
| eabb3014165a1319ceb8a69cc135feb99f288293 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/eabb3014165a1319ceb8a69cc135feb99f288293 | 2021-02-17 13:13:51+10:00 |
Ensure that EXFLAG_INVALID_POLICY is checked even in leaf certs
Even though we check the leaf cert to confirm it is valid, we
later ignored the invalid flag and did not notice that the leaf
cert was bad.
Fixes: CVE-2023-0465
Reviewed-by: Hugo Landau <[email protected]>
Reviewed-by: Tomas Mraz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/20585)
| e4142ec43bcc08ffdb090580e24c24a7da302a32 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/e4142ec43bcc08ffdb090580e24c24a7da302a32 | 2023-03-07 16:52:55+00:00 |
Allocate bio_err before turning on memleak checks
Reviewed-by: Tim Hudson <[email protected]>
| d1b105827aef49ae16fd2d321bafa92b1a6489c9 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/d1b105827aef49ae16fd2d321bafa92b1a6489c9 | 2016-02-06 15:17:11-05:00 |
aesv8-armx.pl: Avoid buffer overrread in AES-XTS decryption
Original author: Nevine Ebeid (Amazon)
Fixes: CVE-2023-1255
The buffer overread happens on decrypts of 4 mod 5 sizes.
Unless the memory just after the buffer is unmapped this is harmless.
Reviewed-by: Paul Dale <[email protected]>
Reviewed-by: Tom Cosgrove <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/20759)
| 72dfe46550ee1f1bbfacd49f071419365bc23304 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/72dfe46550ee1f1bbfacd49f071419365bc23304 | 2023-04-17 16:51:20+02:00 |
Fix file operations in c_rehash.
CVE-2022-2068
Reviewed-by: Richard Levitte <[email protected]>
Reviewed-by: Matt Caswell <[email protected]>
| ce60b13707add7e6b54c5817376234c4043506ed | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/ce60b13707add7e6b54c5817376234c4043506ed | 2022-05-29 20:11:24+02:00 |
Spelling fixes
Reviewed-by: Andy Polyakov <[email protected]>
Reviewed-by: Rich Salz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/3066) | a8cd439bf58708ffe234a9f707cf6a394d28a1f9 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/a8cd439bf58708ffe234a9f707cf6a394d28a1f9 | 2017-02-10 23:17:00+01:00 |
Add a BN_mod_word test()
The previous commit fixed a bug with BN_mod_word() which would have been
caught if we had a test for it. This commit adds one.
Reviewed-by: Andy Polyakov <[email protected]>
| f44310e9ce2cdab64a9269ad8014be978e333db6 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/f44310e9ce2cdab64a9269ad8014be978e333db6 | 2016-05-31 11:38:52+01:00 |
Address a timing side channel whereby it is possible to determine some
information about the length of the scalar used in ECDSA operations
from a large number (2^32) of signatures.
This doesn't rate as a CVE because:
* For the non-constant time code, there are easier ways to extract
more information.
* For the constant time code, it requires a significant number of signatures
to leak a small amount of information.
Thanks to Neals Fournaise, Eliane Jaulmes and Jean-Rene Reinhard for
reporting this issue.
Reviewed-by: Andy Polyakov <[email protected]>
Reviewed-by: Matt Caswell <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/4576)
| 4a089bbdf11f9e231cc68f42bba934c954d81a49 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/4a089bbdf11f9e231cc68f42bba934c954d81a49 | 2017-11-01 06:58:39+10:00 |
Improve robustness and performance of building Unix static libraries
This is a fixup of 385deae79f26dd685339d3141a06d04d6bd753cd, which solved #12116
Reviewed-by: Paul Dale <[email protected]>
Reviewed-by: Tomas Mraz <[email protected]>
Reviewed-by: Richard Levitte <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/12821)
| 0e60ce6334c86d271df5342029639048a635fefa | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/0e60ce6334c86d271df5342029639048a635fefa | 2020-09-08 23:05:13+02:00 |
mem functions cleanup
Only two macros CRYPTO_MDEBUG and CRYPTO_MDEBUG_ABORT to control this.
If CRYPTO_MDEBUG is not set, #ifdef out the whole debug machinery.
(Thanks to Jakob Bohm for the suggestion!)
Make the "change wrapper functions" be the only paradigm.
Wrote documentation!
Format the 'set func' functions so their paramlists are legible.
Format some multi-line comments.
Remove ability to get/set the "memory debug" functions at runtme.
Remove MemCheck_* and CRYPTO_malloc_debug_init macros.
Add CRYPTO_mem_debug(int flag) function.
Add test/memleaktest.
Rename CRYPTO_malloc_init to OPENSSL_malloc_init; remove needless calls.
Reviewed-by: Richard Levitte <[email protected]>
| bbd86bf5424a611cb6b77a3a17fc522931c4dcb8 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/bbd86bf5424a611cb6b77a3a17fc522931c4dcb8 | 2016-01-07 15:06:38-05:00 |
RT3757: base64 encoding bugs
Rewrite EVP_DecodeUpdate.
In particular: reject extra trailing padding, and padding in the middle
of the content. Don't limit line length. Add tests.
Previously, the behaviour was ill-defined, and depended on the position
of the padding within the input.
In addition, this appears to fix a possible two-byte oob read.
Reviewed-by: Richard Levitte <[email protected]>
Reviewed-by: Rich Salz <[email protected]>
Reviewed-by: Dr Stephen Henson <[email protected]>
| 3cdd1e94b1d71f2ce3002738f9506da91fe2af45 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/3cdd1e94b1d71f2ce3002738f9506da91fe2af45 | 2015-09-02 15:31:28+02:00 |
apps/pkey.c: Forther improve user guidance, also on non-sensical option combinations
Reviewed-by: Tomas Mraz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/13712)
| 046a7aaa5e3c398b19fcdb5b486d57ab9c6ced30 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/046a7aaa5e3c398b19fcdb5b486d57ab9c6ced30 | 2020-12-22 10:28:03+01:00 |
Fix small misspelling in doc for OCSP_response_status
CLA: trivial
Reviewed-by: Paul Yang <[email protected]>
Reviewed-by: Matt Caswell <[email protected]>
Reviewed-by: Matthias St. Pierre <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/10810)
| 924d041fe0c650a79449217f81880a6384ff06b2 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/924d041fe0c650a79449217f81880a6384ff06b2 | 2020-01-11 20:20:20+09:00 |
APPS load_key_certs_crls(): improve diagnostics on not finding expected types of contents
Reviewed-by: Paul Dale <[email protected]>
Reviewed-by: Tomas Mraz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/20156)
| fedab100a4b8f4c3b81de632f29c159fb46ac3f2 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/fedab100a4b8f4c3b81de632f29c159fb46ac3f2 | 2023-01-16 19:38:01+01:00 |
apps/cmp.c: Improve user guidance on missing -subject etc. options
Reviewed-by: Tomas Mraz <[email protected]>
Reviewed-by: Paul Dale <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/12825)
| 62261446b21be4dcdc75af81e07253b803ae57f9 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/62261446b21be4dcdc75af81e07253b803ae57f9 | 2020-08-28 15:03:11+02:00 |
Avoid out-of-bounds read
Fixes CVE 2017-3735
Reviewed-by: Kurt Roeckx <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/4276)
| b23171744b01e473ebbfd6edad70c1c3825ffbcd | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/b23171744b01e473ebbfd6edad70c1c3825ffbcd | 2017-08-22 11:44:41-04:00 |
Document command parameters.
Add documentation for all commands that have parameters.
Fix a couple of minor doc and programming bugs, too.
Fixes #10313
Reviewed-by: Paul Dale <[email protected]>
Reviewed-by: Tomas Mraz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/10371)
| 92de469fbd62a77a36dad5fde3a0ac7034071a59 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/92de469fbd62a77a36dad5fde3a0ac7034071a59 | 2019-09-19 21:33:17-04:00 |
Add an explicit list of options that can be disabled, enabled, ...
Configure has, so far, had no control at all of which 'no-' options it
can be given. This means that, for example, someone could configure
with something absurd like 'no-stack' and then watch the build crumble
to dust... or file a bug report.
This introduces some sanity into the possible choices.
The added list comes from looking for the explicit ones used in
Configure, and from grepping after OPENSSL_NO_ in all source files.
Reviewed-by: Rich Salz <[email protected]>
| 8b527be2db48064673640dda2d57edc6b362ae64 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/8b527be2db48064673640dda2d57edc6b362ae64 | 2015-10-22 17:09:14+02:00 |
DOC: Slightly improve the documentation of BIO_lookup() and related functions
Reviewed-by: Tomas Mraz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/15417)
| d318fc954524e413148baa5fa1620f85fb008100 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/d318fc954524e413148baa5fa1620f85fb008100 | 2021-05-22 12:02:00+02:00 |
test/drbgtest.c: Fix error check test
The condition in test_error_checks() was inverted, so it succeeded
as long as error_check() failed. Incidently, error_check() contained
several bugs that assured it always failed, thus giving overall drbg
test success.
Reviewed-by: Paul Dale <[email protected]>
Reviewed-by: Matthias St. Pierre <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/11195)
| 11a6d6fd706d1fa095122d65d3076fb38f2c739c | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/11a6d6fd706d1fa095122d65d3076fb38f2c739c | 2020-02-27 15:37:43+01:00 |
Fix bug in s_client. Previously default verify locations would only be loaded
if CAfile or CApath were also supplied and successfully loaded first.
Reviewed-by: Richard Levitte <[email protected]>
| 70e5fd877890489a3972bf8bf50bfec1fca3875e | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/70e5fd877890489a3972bf8bf50bfec1fca3875e | 2015-02-25 11:30:43+00:00 |
Add decoder fuzzer
This found CVE-2023-0217
Reviewed-by: Paul Dale <[email protected]>
Reviewed-by: Matt Caswell <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/20269)
| a9e6100bc98439ca787aa1fce541550ad1ff3e84 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/a9e6100bc98439ca787aa1fce541550ad1ff3e84 | 2023-01-11 21:14:35+01:00 |
Correct the documentation for OPENSSL_MALLOC_FD
The documentation was misleading in that it suggests that this environment
variable will record information about all allocations. While this is true
it doesn't record the most useful information that you might expect such
as the requested size of the allocation! It is mainly for use in
conjunction with OPENSSL_MALLOC_FAILURES, and reports information about
what chance an allocation has of failing.
We also clarify that the mem_debug functions are actually no-ops in 3.0.
Reviewed-by: Hugo Landau <[email protected]>
Reviewed-by: Tomas Mraz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/18967)
| 2c35d61790603530d11f52eda9132ff8640f9852 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/2c35d61790603530d11f52eda9132ff8640f9852 | 2022-08-09 11:55:45+01:00 |
fixup! Improve readability of f_impl.c and f_impl.h
Reviewed-by: Bernd Edlinger <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/5105)
| 18985129eb57d0bc162d376a5c0a160c22351999 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/18985129eb57d0bc162d376a5c0a160c22351999 | 2018-02-16 16:54:53+00:00 |
Fix an assertion in the DTLS server code
This fixes an internal error alert from the server and
an unexpected connection failure in the release version,
but a failed assertion and a server crash in the
debug version.
Reproduce this issue with a DTLS server/client like that:
./openssl s_server -dtls -mtu 1500
./openssl s_client -dtls -maxfraglen 512
In the debug version a crash happens in the Server now:
./openssl s_server -dtls -mtu 1500
Using default temp DH parameters
ACCEPT
ssl/statem/statem_dtls.c:269: OpenSSL internal error: Assertion failed: len == written
Aborted (core dumped)
While in the release version the handshake exceeds the
negotiated max fragment size, and fails because of this:
$ ./openssl s_server -dtls -mtu 1500
Using default temp DH parameters
ACCEPT
ERROR
4057152ADA7F0000:error:0A0000C2:SSL routines:do_dtls1_write:exceeds max fragment size:ssl/record/rec_layer_d1.c:826:
shutting down SSL
CONNECTION CLOSED
From the client's point of view the connection fails
with an Internal Error Alert:
$ ./openssl s_client -dtls -maxfraglen 512
Connecting to ::1
CONNECTED(00000003)
40B76343377F0000:error:0A000438:SSL routines:dtls1_read_bytes:tlsv1 alert internal error:ssl/record/rec_layer_d1.c:613:SSL alert number 80
and now the connection attempt fails unexpectedly.
Reviewed-by: Tomas Mraz <[email protected]>
Reviewed-by: Matt Caswell <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/18093)
| e915c3f5381cd38ebdc1824c3ba9896ea7160103 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/e915c3f5381cd38ebdc1824c3ba9896ea7160103 | 2022-04-11 10:12:48+02:00 |
Add a test for loading serverinfo data from memory
The previous commit fixed a bug which occurs when serverinfo is loaded
from memory (not from a file). This adds a test for loading serverinfo
from memory.
Reviewed-by: Rich Salz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/3382) | 16afd71c1dbafad398fc0c40e90b06acccca29de | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/16afd71c1dbafad398fc0c40e90b06acccca29de | 2017-05-04 11:28:08+01:00 |
Make "openssl rehash" work on VMS 8.3 and up
A spelling error prevented it from building correctly.
Furthermore, we need to be more careful when to add a / at the end
of the dirname and when not.
Reviewed-by: Rich Salz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/2706) | 5c80e2af3a7d8aa5129a1668c286c1464983e1ac | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/5c80e2af3a7d8aa5129a1668c286c1464983e1ac | 2017-02-22 16:48:55+01:00 |
apps/x509.c: Improve indentation of the large print loop in x509_main()
Reviewed-by: Paul Dale <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/14340)
| 859e5f16213b1b80d06a20872ac137bdea708c29 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/859e5f16213b1b80d06a20872ac137bdea708c29 | 2021-02-26 11:51:43+01:00 |
Fix memleak in EVP_DigestSignFinal/VerifyFinal.
Reviewed-by: Matt Caswell <[email protected]>
Reviewed-by: Rich Salz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/3658) | 19546246cf44d30043fb17d1899b2c325924ac8b | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/19546246cf44d30043fb17d1899b2c325924ac8b | 2017-06-12 18:05:19+02:00 |
Sanity check ticket length.
If a ticket callback changes the HMAC digest to SHA512 the existing
sanity checks are not sufficient and an attacker could perform a DoS
attack with a malformed ticket. Add additional checks based on
HMAC size.
Thanks to Shi Lei for reporting this bug.
CVE-2016-6302
Reviewed-by: Viktor Dukhovni <[email protected]>
| e97763c92c655dcf4af2860b3abd2bc4c8a267f9 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/e97763c92c655dcf4af2860b3abd2bc4c8a267f9 | 2016-08-22 17:20:01+01:00 |
Fix append_ia5 function to not assume NUL terminated strings
ASN.1 strings may not be NUL terminated. Don't assume they are.
CVE-2021-3712
Reviewed-by: Viktor Dukhovni <[email protected]>
Reviewed-by: Paul Dale <[email protected]>
Reviewed-by: David Benjamin <[email protected]>
| 98624776c4d501c8badd6f772ab7048ac9191cb9 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/98624776c4d501c8badd6f772ab7048ac9191cb9 | 2021-08-18 17:58:23+01:00 |
ts: fix double free on error path.
In function int_ts_RESP_verify_token, if (flags & TS_VFY_DATA) is true, function ts_compute_imprint() will be called at line 299.
In the implementation of ts_compute_imprint, it allocates md_alg at line 406.
But after the allocation, if the execution goto err, then md_alg will be freed in the first time by X509_ALGOR_free at line 439.
After that, ts_compute_imprint returns 0 and the execution goto err branch of int_ts_RESP_verify_token.
In the err branch, md_alg will be freed in the second time at line 320.
Bug reported by @Yunlongs
Fixes #14914
Reviewed-by: Tomas Mraz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/14921)
| db78c84eb2fa9c41124690bcc2ea50e05f5fc7b7 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/db78c84eb2fa9c41124690bcc2ea50e05f5fc7b7 | 2021-04-19 08:55:37+10:00 |
Do not dereference PKCS7 object data if not set
Fixes CVE-2023-0216
Reviewed-by: Paul Dale <[email protected]>
Reviewed-by: Matt Caswell <[email protected]>
| 80253dbdc92bec584f4a9866b43f8674156d838a | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/80253dbdc92bec584f4a9866b43f8674156d838a | 2023-01-16 19:45:23+01:00 |
Fix early data bug with pause between EoED and CF
If the server received EoED then SSL_read_early_data() will return
SSL_READ_EARLY_DATA_FINISH. However if the CF has not yet been processed
then SSL_is_init_finished() will still return 0. Therefore we should still
be able to write early data.
Fixes #3041
Reviewed-by: Rich Salz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/3089) | 116d0da5e8bcbb79ac1bdd1ec6bb861d9830e3a5 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/116d0da5e8bcbb79ac1bdd1ec6bb861d9830e3a5 | 2017-03-30 15:24:07+01:00 |
Fix typo and improve a bit of text
Reviewed-by: Tim Hudson <[email protected]>
| d231a4010bfa4032dc24a74c6cd3073e252864c4 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/d231a4010bfa4032dc24a74c6cd3073e252864c4 | 2015-12-06 22:17:15-05:00 |
Revert "Fix an error code spelling."
This reverts commit 2b0bcfaf834e2fb7cd52888d7330b247e3878115.
It wasn't reviewed.
Reviewed-by: Rich Salz <[email protected]>
| 9f2a142b13a8fc37b811bc590baf847cc6be7ab3 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/9f2a142b13a8fc37b811bc590baf847cc6be7ab3 | 2016-04-04 16:11:04-04:00 |
Fix HelloVerifyRequest construction
commit c536b6be1a introduced a bug that causes a reachable assert. This fixes
it.
Reviewed-by: Rich Salz <[email protected]>
| 98c1f5b429d036c0370de15f4d6851eed41fa5b3 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/98c1f5b429d036c0370de15f4d6851eed41fa5b3 | 2016-09-23 14:40:16+01:00 |
Remove outdated DEBUG flags.
Add -DBIO_DEBUG to --strict-warnings.
Remove comments about outdated debugging ifdef guards.
Remove md_rand ifdef guarding an assert; it doesn't seem used.
Remove the conf guards in conf_api since we use OPENSSL_assert, not assert.
For pkcs12 stuff put OPENSSL_ in front of the macro name.
Merge TLS_DEBUG into SSL_DEBUG.
Various things just turned on/off asserts, mainly for checking non-NULL
arguments, which is now removed: camellia, bn_ctx, crypto/modes.
Remove some old debug code, that basically just printed things to stderr:
DEBUG_PRINT_UNKNOWN_CIPHERSUITES, DEBUG_ZLIB, OPENSSL_RI_DEBUG,
RL_DEBUG, RSA_DEBUG, SCRYPT_DEBUG.
Remove OPENSSL_SSL_DEBUG_BROKEN_PROTOCOL.
Reviewed-by: Richard Levitte <[email protected]>
| d63a5e5e7d96f173e2bbf711e3f1f813bf0df05e | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/d63a5e5e7d96f173e2bbf711e3f1f813bf0df05e | 2016-02-18 11:33:21-05:00 |
Comment away the extra checks in Configure
The "extra checks" is a debugging tool to check the config resolving
mechanism. It uses Perl's smart match, which is experimental and
therefore always causes Perl to give out a warning, and it causes
older Perl versions to fail entirely.
So, it gets commented away, but stays otherwise in place, as it may be
useful again.
Reviewed-by: Matt Caswell <[email protected]>
| c47188499631a0ff07740853d60f2196a147eed9 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/c47188499631a0ff07740853d60f2196a147eed9 | 2016-03-09 17:18:07+01:00 |
Bug fix in ossl_cmp_hdr_init(): sould not remember recipient as expected sender
Reviewed-by: Matt Caswell <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/11998)
| 7e8dbb74620ac4420ad4d3adca51ce1b9a3e114c | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/7e8dbb74620ac4420ad4d3adca51ce1b9a3e114c | 2020-05-29 17:11:48+02:00 |
Fix session tickets
Commit 9ceb2426b0 (PACKETise ClientHello) broke session tickets by failing
to detect the session ticket extension in an incoming ClientHello. This
commit fixes the bug.
Reviewed-by: Emilia Käsper <[email protected]>
| c83eda8c22f08346d5434662643de523a469c81e | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/c83eda8c22f08346d5434662643de523a469c81e | 2015-08-13 10:04:23+01:00 |
Fix setting of debug callback in apps/enc.c
Setting the debug callback on the in and out BIOs were done too early.
No debug callback was set on the zlib filter BIO.
Reviewed-by: Tim Hudson <[email protected]>
| 7a82f778bd23eec978d57679de48def0e5010284 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/7a82f778bd23eec978d57679de48def0e5010284 | 2016-04-13 02:43:45+02:00 |
Remove documentation of deleted function
It's even removing a BUGS entry!
Reviewed-by: Emilia Käsper <[email protected]>
Reviewed-by: Rich Salz <[email protected]>
Reviewed-by: Richard Levitte <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/2797) | 0ae407eebe9aafecb7181f75935fcc344318a578 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/0ae407eebe9aafecb7181f75935fcc344318a578 | 2017-02-28 16:39:01-06:00 |
Fix no-cms (CVE-2016-7053)
Reviewed-by: Matt Caswell <[email protected]>
| 9d7ce8d42b80fda2566c70f0d4de4069bb34e72c | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/9d7ce8d42b80fda2566c70f0d4de4069bb34e72c | 2016-11-10 01:49:47+01:00 |
Fix AES OCB encrypt/decrypt for x86 AES-NI
aesni_ocb_encrypt and aesni_ocb_decrypt operate by having a fast-path
that performs operations on 6 16-byte blocks concurrently (the
"grandloop") and then proceeds to handle the "short" tail (which can
be anywhere from 0 to 5 blocks) that remain.
As part of initialization, the assembly initializes $len to the true
length, less 96 bytes and converts it to a pointer so that the $inp
can be compared to it. Each iteration of "grandloop" checks to see if
there's a full 96-byte chunk to process, and if so, continues. Once
this has been exhausted, it falls through to "short", which handles
the remaining zero to five blocks.
Unfortunately, the jump at the end of "grandloop" had a fencepost
error, doing a `jb` ("jump below") rather than `jbe` (jump below or
equal). This should be `jbe`, as $inp is pointing to the *end* of the
chunk currently being handled. If $inp == $len, that means that
there's a whole 96-byte chunk waiting to be handled. If $inp > $len,
then there's 5 or fewer 16-byte blocks left to be handled, and the
fall-through is intended.
The net effect of `jb` instead of `jbe` is that the last 16-byte block
of the last 96-byte chunk was completely omitted. The contents of
`out` in this position were never written to. Additionally, since
those bytes were never processed, the authentication tag generated is
also incorrect.
The same fencepost error, and identical logic, exists in both
aesni_ocb_encrypt and aesni_ocb_decrypt.
This addresses CVE-2022-2097.
Co-authored-by: Alejandro Sedeño <[email protected]>
Co-authored-by: David Benjamin <[email protected]>
Reviewed-by: Paul Dale <[email protected]>
Reviewed-by: Tomas Mraz <[email protected]>
| 6ebf6d51596f51d23ccbc17930778d104a57d99c | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/6ebf6d51596f51d23ccbc17930778d104a57d99c | 2022-06-16 12:00:22+10:00 |
Add $debug variable and use it
Reviewed-by: Richard Levitte <[email protected]>
Reviewed-by: Matthias St. Pierre <[email protected]>
Reviewed-by: Paul Dale <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/10852)
| 0eb154663478968137112441d16b593fdf2ebcf8 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/0eb154663478968137112441d16b593fdf2ebcf8 | 2020-01-15 11:41:07-05:00 |
doc: fix spelling of TYPE_get_ex_new_index
The generated macros are TYPE_get_ex_new_index() (to match
CRYPTO_get_ex_new_index()), not TYPE_get_new_ex_index(), even though
the latter spelling seems more natural.
Reviewed-by: Tomas Mraz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/10943)
| fe41c06e69613b1a4814b3e3cdbf460f2678ec99 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/fe41c06e69613b1a4814b3e3cdbf460f2678ec99 | 2020-01-17 11:15:59-08:00 |
Fix CipherInit on s390x.
Various different initialization sequences led to bugs on s390x due to caching
and processing during key setting. Since, e.g., the direction does not
necessarily have to be correct during initialization, this produced bugs in
s390x which were not present on other architectures. Fix this by recomputing
the function codes on the fly during updates and final operations.
Signed-off-by: Juergen Christ <[email protected]>
Reviewed-by: Tomas Mraz <[email protected]>
Reviewed-by: Paul Dale <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/15521)
| ff555f81365d1c09a408019924cace4a0f457ef6 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/ff555f81365d1c09a408019924cace4a0f457ef6 | 2021-05-28 15:02:52+02:00 |
srp: fix double free,
In function SRP_create_verifier_ex, it calls SRP_create_verifier_BN_ex(..., &v, ..) at line 653.
In the implementation of SRP_create_verifier_BN_ex(), *verify (which is the paremeter of v) is allocated a pointer via BN_new() at line 738.
And *verify is freed via BN_clear_free() at line 743, and return 0.
Then the execution continues up to goto err at line 655, and the freed v is freed again at line 687.
Bug reported by @Yunlongs
Fixes #14913
Reviewed-by: Tomas Mraz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/14921)
| b06450bcf763735a89b65ca3ec176600fe7fceed | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/b06450bcf763735a89b65ca3ec176600fe7fceed | 2021-04-19 08:51:38+10:00 |
Fix malloc define typo
Fix compilation failure when SCTP is compiled due to incorrect define.
Reported-by: Conrad Kostecki <[email protected]>
URL: https://bugs.gentoo.org/543828
RT#3758
Signed-off-by: Matt Caswell <[email protected]>
Reviewed-by: Tim Hudson <[email protected]>
| 7c82e339a677f8546e1456c7a8f6788598a9de43 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/7c82e339a677f8546e1456c7a8f6788598a9de43 | 2015-03-21 05:08:41-04:00 |
Extend ServerKeyExchange parsing to work with a signature
Previously SKE in TLSProxy only knew about one anonymous ciphersuite so
there was never a signature. Extend that to include a ciphersuite that is
not anonymous. This also fixes a bug where the existing SKE processing was
checking against the wrong anon ciphersuite value. This has a knock on
impact on the sslskewith0p test. The bug meant the test was working...but
entirely by accident!
Reviewed-by: Rich Salz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/2157) | 79d8c167857d1c776a6fbdb2aff166a126cab03e | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/79d8c167857d1c776a6fbdb2aff166a126cab03e | 2017-01-05 12:32:06+00:00 |
Fix aesni_cbc_sha256_enc_avx2 backtrace info
We store a secondary frame pointer info for the debugger
in the red zone. This fixes a crash in the unwinder when
this function is interrupted.
Additionally the missing cfi function annotation is added
to aesni_cbc_sha256_enc_shaext.
[extended tests]
Reviewed-by: Richard Levitte <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/10674)
| 665de4d48aef2507022a7d74f5c7f6e339d5e6bc | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/665de4d48aef2507022a7d74f5c7f6e339d5e6bc | 2019-12-21 22:09:45+01:00 |
RAND_add()/RAND_seed(): fix failure on short input or low entropy
Commit 5b4cb385c18a (#7382) introduced a bug which had the effect
that RAND_add()/RAND_seed() failed for buffer sizes less than
32 bytes. The reason was that now the added random data was used
exlusively as entropy source for reseeding. When the random input
was too short or contained not enough entropy, the DRBG failed
without querying the available entropy sources.
This commit makes drbg_add() act smarter: it checks the entropy
requirements explicitely. If the random input fails this check,
it won't be added as entropy input, but only as additional data.
More precisely, the behaviour depends on whether an os entropy
source was configured (which is the default on most os):
- If an os entropy source is avaible then we declare the buffer
content as additional data by setting randomness to zero and
trigger a regular reseeding.
- If no os entropy source is available, a reseeding will fail
inevitably. So drbg_add() uses a trick to mix the buffer contents
into the DRBG state without forcing a reseeding: it generates a
dummy random byte, using the buffer content as additional data.
Related-to: #7449
Reviewed-by: Paul Dale <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/7456)
| 8817215d5c52a76f2b184b624bde4df8556dee6d | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/8817215d5c52a76f2b184b624bde4df8556dee6d | 2018-10-21 15:45:34+02:00 |
Move cpuid_asm_src file information to build.info files
Also took away the internal 'debug-linux-ia32-aes' config target, as
it's broken (refers to files that no longer exist).
Reviewed-by: Matt Caswell <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/9166)
| 6e1ba4721906c0a8486ca5acfb75353fec6c582b | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/6e1ba4721906c0a8486ca5acfb75353fec6c582b | 2019-06-16 19:35:08+02:00 |
Fix spelling
Reviewed-by: Rich Salz <[email protected]>
| 29d0932721b2da7e4980abe50aec418f28136fe9 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/29d0932721b2da7e4980abe50aec418f28136fe9 | 2016-02-18 00:32:13+01:00 |
Improve ossl_cmp_msg_check_received() and rename to ossl_cmp_msg_check_update()
Bugfix: allow using extraCerts contained in msg already while checking signature
Improve function name, simplify its return value, and update its documentation
Reviewed-by: Matt Caswell <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/11998)
| 430efff1b9baa36099b5443c924f96b854e00300 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/430efff1b9baa36099b5443c924f96b854e00300 | 2020-05-28 17:19:36+02:00 |
Coverity: misuses of time_t
Coverity 1508506:
Fixes a bug in the cookie code which would have caused problems for
ten minutes before and after the lower 32 bits of time_t rolled over.
Coverity 1508534 & 1508540:
Avoid problems when the lower 32 bits of time_t roll over by delaying
the cast to integer until after the time delta has been computed.
Reviewed-by: Ben Kaduk <[email protected]>
Reviewed-by: Matt Caswell <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/19004)
| e8a557dc3c1ed16faff4aeb39268f8f5a3f8b81d | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/e8a557dc3c1ed16faff4aeb39268f8f5a3f8b81d | 2022-08-16 11:05:02+10:00 |
Remove debugging leftovers in apps/opt.c
Reviewed-by: Stephen Henson <[email protected]>
Reviewed-by: Rich Salz <[email protected]>
| e546e2cc8ca6f984cc1fb618b136bb28304927c9 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/e546e2cc8ca6f984cc1fb618b136bb28304927c9 | 2017-02-28 11:47:10+01:00 |
Bugfix: in asn1parse avoid erroneous len after a sub-sequence
Introduced in:
commit 79c7f74d6cefd5d32fa20e69195ad3de834ce065
Author: Ben Laurie <[email protected]>
Date: Tue Mar 29 19:37:57 2016 +0100
Fix buffer overrun in ASN1_parse().
Problem input:
https://tools.ietf.org/html/draft-ietf-curdle-pkix-eddsa-00#section-8.1
-----BEGIN PUBLIC KEY-----
MC0wCAYDK2VkCgECAyEAGb9ECWmEzf6FQbrBZ9w7lshQhqowtrbLDFw4rXAxZuE=
-----END PUBLIC KEY-----
Previously:
0:d=0 hl=2 l= 45 cons: SEQUENCE
2:d=1 hl=2 l= 8 cons: SEQUENCE
4:d=2 hl=2 l= 3 prim: OBJECT :1.3.101.100
9:d=2 hl=2 l= 1 prim: ENUMERATED :02
Error in encoding
140735164989440:error:0D07207B:asn1 encoding routines:ASN1_get_object:header too long:../openssl/crypto/asn1/asn1_lib.c:148:
Now:
0:d=0 hl=2 l= 45 cons: SEQUENCE
2:d=1 hl=2 l= 8 cons: SEQUENCE
4:d=2 hl=2 l= 3 prim: OBJECT :1.3.101.100
9:d=2 hl=2 l= 1 prim: ENUMERATED :02
12:d=1 hl=2 l= 33 prim: BIT STRING
0000 - 00 19 bf 44 09 69 84 cd-fe 85 41 ba c1 67 dc 3b ...D.i....A..g.;
0010 - 96 c8 50 86 aa 30 b6 b6-cb 0c 5c 38 ad 70 31 66 ..P..0....\8.p1f
0020 - e1 .
Reviewed-by: Richard Levitte <[email protected]>
| bdcd660e33710079b495cf5cc6a1aaa5d2dcd317 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/bdcd660e33710079b495cf5cc6a1aaa5d2dcd317 | 2016-04-13 23:14:43-04:00 |
Improve the checking of pod sections
(i.e. remove some bugs)
Reviewed-by: Rich Salz <[email protected]>
| c4d598939ac275ce0c4a28d6b76efd1e2e47af05 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/c4d598939ac275ce0c4a28d6b76efd1e2e47af05 | 2016-05-23 00:36:37+02:00 |
Address a timing side channel whereby it is possible to determine some
information about the length of a value used in DSA operations from
a large number of signatures.
This doesn't rate as a CVE because:
* For the non-constant time code, there are easier ways to extract
more information.
* For the constant time code, it requires a significant number of signatures
to leak a small amount of information.
Thanks to Neals Fournaise, Eliane Jaulmes and Jean-Rene Reinhard for
reporting this issue.
Reviewed-by: Andy Polyakov <[email protected]>
Reviewed-by: Matt Caswell <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/4576)
| c0caa945f6ef30363e0d01d75155f20248403df4 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/c0caa945f6ef30363e0d01d75155f20248403df4 | 2017-11-01 06:58:13+10:00 |
apps_ui.c: Improve error handling and return value of setup_ui_method()
Reviewed-by: Tomas Mraz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/12493)
| f84de16f397b06831ea5569a285518c035285f46 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/f84de16f397b06831ea5569a285518c035285f46 | 2020-08-04 10:11:02+02:00 |
Improve documentation about reading and writing
Reviewed-by: Matt Caswell <[email protected]>
GH: #6240
| 57fd517066418472b3280a975823405fb8f2f43d | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/57fd517066418472b3280a975823405fb8f2f43d | 2018-05-13 11:24:11+02:00 |
Add a test for the bug fixed in the previous commit
We want to make sure that if we if are using SSL_MODE_AUTO_RETRY then
if SSL_read_early_data() hits EndOfEarlyData then it doesn't auto retry
and end up with normal data. The same issue could occur with read_ahead
which is what we use in this test.
Reviewed-by: Richard Levitte <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/3077)
| 3cb47b4ec1514248996ca037a5e7890ea7fdc855 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/3cb47b4ec1514248996ca037a5e7890ea7fdc855 | 2017-03-29 17:02:25+01:00 |
Remove OSSLzu macros and use %zu in the test framework (via BIO_printf).
Convert the debug prints in dtls_mtu_test.c to use the framework.
Reviewed-by: Rich Salz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/3730)
| bff951eeb1f86207ac02e0f73305c31ac0ab5f4f | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/bff951eeb1f86207ac02e0f73305c31ac0ab5f4f | 2017-06-21 08:39:54+10:00 |
Remove support for SSL_OP_NETSCAPE_CA_DN_BUG.
This is an ancient bug workaround for Netscape clients. The documentation
talks about versions 3.x and 4.x beta.
Reviewed-by: Tim Hudson <[email protected]>
| 3c33c6f6b10864355553961e638514a6d1bb00f6 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/3c33c6f6b10864355553961e638514a6d1bb00f6 | 2015-02-05 15:57:54+00:00 |
Fix bugs in 3GPP exception checking and improve diagnostics in crypt/cmp/cmp_vfy.c
Reviewed-by: Matt Caswell <[email protected]>
Reviewed-by: David von Oheimb <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/11448)
| a1e4c8ef8125bfff403d49d60a625f75b3074a79 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/a1e4c8ef8125bfff403d49d60a625f75b3074a79 | 2020-03-30 16:40:14+02:00 |
Check for errors in BN_bn2dec()
If an oversize BIGNUM is presented to BN_bn2dec() it can cause
BN_div_word() to fail and not reduce the value of 't' resulting
in OOB writes to the bn_data buffer and eventually crashing.
Fix by checking return value of BN_div_word() and checking writes
don't overflow buffer.
Thanks to Shi Lei for reporting this bug.
CVE-2016-2182
Reviewed-by: Tim Hudson <[email protected]>
| 07bed46f332fce8c1d157689a2cdf915a982ae34 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/07bed46f332fce8c1d157689a2cdf915a982ae34 | 2016-08-05 14:26:03+01:00 |
Fix OCSP_RESPID processing bug introduced by WPACKET changes
An OCSP_RESPID in a status request extension has 2 bytes for the length
not 1.
Reviewed-by: Rich Salz <[email protected]>
| dd8710dc54f5123d0fa54b5c90fc2c3a9dae43fe | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/dd8710dc54f5123d0fa54b5c90fc2c3a9dae43fe | 2016-09-13 23:59:11+01:00 |
Provide a test for pause between EoED and CF
This tests the bug fixed in the previous commit. We introduce a synthetic
delay between the server receiving EoED and CF and check that we can still
send early data.
Reviewed-by: Rich Salz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/3089) | 9b5c865df0626d85065eacff714f20e2c721ca56 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/9b5c865df0626d85065eacff714f20e2c721ca56 | 2017-03-30 15:26:23+01:00 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.