Peter Mosmans
17e844a450
Fix for test_bn regular expression to work on Windows using MSYS. PR#3346
2014-05-27 23:26:11 +01:00
Matt Caswell
8ca7d12430
Fixed Windows compilation failure
2014-05-27 00:26:55 +01:00
Matt Caswell
67b9c82ea2
Fixed error in args for SSL_set_msg_callback and SSL_set_msg_callback_arg
2014-05-25 23:48:15 +01:00
Matt Caswell
a6f5b991eb
Fix for non compilation with TLS_DEBUG defined
2014-05-24 23:56:58 +01:00
Mike Bland
756587dcb9
Fix heartbeat_test for -DOPENSSL_NO_HEARTBEATS
...
Replaces the entire test with a trivial implementation when
OPENSSL_NO_HEARTBEATS is defined.
2014-05-22 22:05:26 +01:00
Matt Caswell
0a084f7b3a
Fixed minor copy&paste error, and stray space causing rendering problem
2014-05-22 00:12:14 +01:00
Dr. Stephen Henson
da0a95b23a
Fix for PKCS12_create if no-rc2 specified.
...
Use triple DES for certificate encryption if no-rc2 is
specified.
PR#3357
(cherry picked from commit 4689c08453e95eeefcc88c9f32dc6e509f95caff)
2014-05-21 11:14:33 +01:00
Dr. Stephen Henson
599fe418a1
Change default cipher in smime app to des3.
...
PR#3357
(cherry picked from commit ca3ffd9670f2b589bf8cc04923f953e06d6fbc58)
2014-05-21 11:14:33 +01:00
Dr. Stephen Henson
4519e7b839
For portability use BUF_strndup instead of strndup.
...
(cherry picked from commit dcca7b13e9
)
2014-05-20 11:23:23 +01:00
Janpopan
4659b53e7d
Fix a wrong parameter count ERR_add_error_data
2014-05-19 22:17:00 +01:00
Ben Laurie
dc22495d35
Merge branch 'mbland-heartbeat-test-1.0.1' into OpenSSL_1_0_1-stable
2014-05-19 18:26:04 +01:00
Mike Bland
ab0d964259
Unit/regression test for TLS heartbeats.
...
Regression test against CVE-2014-0160 (Heartbleed).
More info: http://mike-bland.com/tags/heartbleed.html
(based on commit 35cb55988b75573105eefd00d27d0138eebe40b1)
2014-05-19 18:23:24 +01:00
Ben Laurie
dac3654e2d
Allow the maximum value.
2014-05-19 18:21:39 +01:00
Ben Laurie
989d87cb1a
Fix signed/unsigned warning.
2014-05-19 18:20:54 +01:00
Matt Caswell
d6934a02b5
Moved note about lack of support for AEAD modes out of BUGS section to SUPPORTED CIPHERS section (bug has been fixed, but still no support for AEAD)
2014-05-15 21:17:19 +01:00
Dr. Stephen Henson
f9986e9abf
Enc doesn't support AEAD ciphers.
2014-05-15 14:16:44 +01:00
Jeffrey Walton
1f5e321ec1
Fix grammar error in verify pod. PR#3355
2014-05-14 22:59:48 +01:00
Jeffrey Walton
b6adb6ef58
Add information to BUGS section of enc documentation. PR#3354
2014-05-14 22:59:48 +01:00
Michal Bozon
bfdaf45141
Corrected POD syntax errors. PR#3353
2014-05-14 22:59:48 +01:00
Kurt Roeckx
69526a354d
Check sk_SSL_CIPHER_num() after assigning sk.
2014-05-12 23:01:06 +01:00
Jean-Paul Calderone
778f2b648c
Correct the return type on the signature for X509_STORE_CTX_get_ex_data given in the pod file.
2014-05-12 22:48:34 +01:00
Serguei E. Leontiev
2223317bef
Replace manual ASN1 decoder with ASN1_get_object
...
Replace manual ASN.1 decoder with ASN1_get object. This
will decode the tag and length properly and check against
it does not exceed the supplied buffer length.
PR#3335
(cherry picked from commit b0308dddd1cc6a8e1de803ef29ba6da25ee072c2)
2014-05-12 18:41:50 +01:00
Matt Caswell
b107586c0c
Fixed NULL pointer dereference. See PR#3321
2014-05-12 00:43:33 +01:00
Kurt Roeckx
d544755389
Set authkey to NULL and check malloc return value.
2014-05-12 00:24:59 +01:00
Martin Brejcha
88398e9ba3
dgram_sctp_ctrl: authkey memory leak
...
PR: 3327
2014-05-12 00:24:59 +01:00
Günther Noack
15c1ac03c8
Avoid out-of-bounds write in SSL_get_shared_ciphers
...
PR: 3317
2014-05-11 23:57:14 +01:00
Viktor Dukhovni
c3c6fc7855
Fix infinite loop. PR#3347
2014-05-11 21:13:18 +01:00
Tim Hudson
4d8cca8a7e
safety check to ensure we dont send out beyond the users buffer
2014-05-11 13:29:59 +01:00
Dr. Stephen Henson
d61be85581
Return an error if no recipient type matches.
...
If the key type does not match any CMS recipient type return
an error instead of using a random key (MMA mitigation). This
does not leak any useful information to an attacker.
PR#3348
2014-05-09 14:24:51 +01:00
Tim Hudson
9e456a8537
coverity 966576 - close socket in error path
2014-05-08 23:19:19 +01:00
Tim Hudson
f179e2b899
PR#3342 fix resource leak coverity issue 966577
2014-05-08 23:18:44 +01:00
Tim Hudson
6a60b41431
fix coverity issue 966597 - error line is not always initialised
2014-05-08 00:00:08 +01:00
Matt Caswell
c6a47f988c
Fixed NULL pointer dereference in PKCS7_dataDecode reported by David Ramos in PR#3339
2014-05-07 23:25:46 +01:00
Geoff Thorpe
d0666f289a
evp: prevent underflow in base64 decoding
...
This patch resolves RT ticket #2608 .
Thanks to Robert Dugal for originally spotting this, and to David
Ramos for noticing that the ball had been dropped.
Signed-off-by: Geoff Thorpe <geoff@openssl.org>
2014-05-06 18:10:23 -04:00
Geoff Thorpe
d8afda60a9
bignum: allow concurrent BN_MONT_CTX_set_locked()
...
The lazy-initialisation of BN_MONT_CTX was serialising all threads, as
noted by Daniel Sands and co at Sandia. This was to handle the case that
2 or more threads race to lazy-init the same context, but stunted all
scalability in the case where 2 or more threads are doing unrelated
things! We favour the latter case by punishing the former. The init work
gets done by each thread that finds the context to be uninitialised, and
we then lock the "set" logic after that work is done - the winning
thread's work gets used, the losing threads throw away what they've done.
Signed-off-by: Geoff Thorpe <geoff@openssl.org>
2014-05-06 18:10:21 -04:00
Geoff Thorpe
804ab36df6
dso: eliminate VMS code on non-VMS systems
...
Even though the meat of dso_vms.c is compiled out on non-VMS builds,
the (pre-)compiler still traverses some of the macro handling. This
trips up at least one non-VMS build configuration, so this commit
makes the skip-VMS case more robust.
Signed-off-by: Geoff Thorpe <geoff@openssl.org>
2014-05-06 18:10:17 -04:00
Dr. Stephen Henson
a41d5174e2
Initialize num properly.
...
PR#3289
PR#3345
(cherry picked from commit 3ba1e406c2
)
2014-05-06 14:09:14 +01:00
Dr. Stephen Henson
9c5d953a07
Set Enveloped data version to 2 if ktri version not zero.
2014-05-06 14:02:38 +01:00
Tim Hudson
7b7b18c57e
- fix coverity issues 966593-966596
2014-05-06 00:07:34 +01:00
David Ramos
8eb094b946
Double free in i2o_ECPublicKey
...
PR: 3338
2014-05-04 00:53:19 +01:00
Jeff Trawick
7fa18a63cb
typo in SSL_get_peer_cert_chain docs
...
RT: 3304
2014-05-02 00:27:37 +01:00
Matt Caswell
90600a5e3b
Fixed spelling error in error message. Fix supplied by Marcos Marado
2014-05-01 00:23:57 +01:00
Lubomir Rintel
23f5908ac7
POD: Fix item numbering
...
Newer pod2man considers =item [1-9] part of a numbered list, while =item
0 starts an unnumbered list. Add a zero effect formatting mark to override
this.
doc/apps/smime.pod around line 315: Expected text after =item, not a
number
...
PR#3146
2014-04-30 23:47:29 +01:00
mancha
e622237d12
Fix version documentation.
...
Specify -f is for compilation flags. Add -d to synopsis section.
(cherry picked from commit 006397ea62bbcae22c8664d53c2222b808c4bdd1)
Closes #79 .
2014-04-26 11:21:34 +01:00
mancha
f0816174d2
Fix eckey_priv_encode()
...
Fix eckey_priv_encode to return an error on failure of i2d_ECPrivateKey.
2014-04-24 19:32:17 +00:00
Steve Marquess
057444f844
Add new sponsors
...
(cherry picked from commit 351f0a124bffaa94d2a8abdec2e7dde5ae9c457d)
2014-04-24 12:32:59 +01:00
Ben Laurie
725c5f1ad3
Fix use after free.
2014-04-23 07:33:17 +01:00
Ben Laurie
9c8dc84ac1
Fix double frees.
2014-04-22 17:02:37 +01:00
Dr. Stephen Henson
e3899ababb
Document -debug_decrypt option.
...
(cherry picked from commit 0dd5b94aeb
)
2014-04-16 12:36:06 +01:00
Dr. Stephen Henson
3fc880ac5d
Extension checking fixes.
...
When looking for an extension we need to set the last found
position to -1 to properly search all extensions.
PR#3309.
(cherry picked from commit 300b9f0b70
)
2014-04-15 18:53:04 +01:00