aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
...
* aesv8-armx.pl: optimize by adding 128-bit code paths.Andy Polyakov2014-05-201-16/+127
|
* Don't allocate more than is needed in BUF_strndup().Ben Laurie2014-05-201-0/+5
|
* For portability use BUF_strndup instead of strndup.Dr. Stephen Henson2014-05-201-2/+2
|
* Adding padding extension to trace code.Dr. Stephen Henson2014-05-201-1/+2
|
* Fix bug in signature algorithm copy.Dr. Stephen Henson2014-05-201-1/+1
|
* Fix a wrong parameter count ERR_add_error_dataJanpopan2014-05-191-1/+1
|
* Merge branch 'mbland-heartbeat-test'Ben Laurie2014-05-193-5/+488
|\
| * Fixup for ancient compilers.Ben Laurie2014-05-191-20/+31
| |
| * Zero-initialize heartbeat test write bufferMike Bland2014-05-191-2/+6
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The previous calls to memset() were added to tear_down() when I noticed the test spuriously failing in opt mode, with different results each time. This appeared to be because the allocator zeros out memory in debug mode, but not in opt mode. Since the heartbeat functions silently drop the request on error without modifying the contents of the write buffer, whatever random contents were in memory before being reallocated to the write buffer used in the test would cause nondeterministic test failures in the Heartbleed regression cases. Adding these calls allowed the test to pass in both debug and opt modes. Ben Laurie notified me offline that the test was aborting in debug-ben-debug-64-clang mode, configured with GitConfigure and built with GitMake. Looking into this, I realized the first memset() call was zeroing out a reference count used by SSL_free() that was checked in debug-ben-debug-64-clang mode but not in the normal debug mode. Removing the memset() calls from tear_down() and adding a memset() for the write buffer in set_up() addresses the issue and allows the test to successfully execute in debug, opt, and debug-ben-debug-64-clang modes.
| * More through error checks in set_upMike Bland2014-05-191-4/+20
| | | | | | | | Checks the return values of ssl_init_wbio_buffer() and ssl3_setup_buffers().
| * Make it build/run.Ben Laurie2014-05-192-4/+4
| |
| * Unit/regression test for TLS heartbeats.Mike Bland2014-05-193-5/+457
|/ | | | | | Regression test against CVE-2014-0160 (Heartbleed). More info: http://mike-bland.com/tags/heartbleed.html
* Add "teaser" AES module for ARMv8.Andy Polyakov2014-05-191-0/+604
| | | | | "Teaser" means that it's initial proof-of-concept to build EVP module upon.
* Moved note about lack of support for AEAD modes out of BUGS section to ↵Matt Caswell2014-05-151-4/+4
| | | | SUPPORTED CIPHERS section (bug has been fixed, but still no support for AEAD)
* Enc doesn't support AEAD ciphers.Dr. Stephen Henson2014-05-151-0/+6
| | | | (cherry picked from commit 09184dddead165901700b31eb39d540ba30f93c5)
* Fix grammar error in verify pod. PR#3355Jeffrey Walton2014-05-141-1/+1
|
* Add information to BUGS section of enc documentation. PR#3354Jeffrey Walton2014-05-141-0/+4
|
* Corrected POD syntax errors. PR#3353Michal Bozon2014-05-144-4/+4
|
* Have the .pc files depend on each other rather than duplicating theMike Frysinger2014-05-121-7/+4
| | | | various link settings. PR#3332
* Check sk_SSL_CIPHER_num() after assigning sk.Kurt Roeckx2014-05-121-2/+3
|
* Correct the return type on the signature for X509_STORE_CTX_get_ex_data ↵Jean-Paul Calderone2014-05-121-1/+1
| | | | given in the pod file.
* Replace manual ASN1 decoder with ASN1_get_objectSerguei E. Leontiev2014-05-121-16/+7
| | | | | | | | Replace manual ASN.1 decoder with ASN1_get object. This will decode the tag and length properly and check against it does not exceed the supplied buffer length. PR#3335
* Correct example.Dr. Stephen Henson2014-05-121-1/+1
|
* Add "teaser" AES module for PowerISA 2.07.Andy Polyakov2014-05-122-0/+755
| | | | | | | "Teaser" means that it's not integrated yet and purpose of this commit is primarily informational, to exhibit design choices, such as how to handle alignment and endianness. In other words it's proof-of-concept code that EVP module will build upon.
* Fixed NULL pointer dereference. See PR#3321Matt Caswell2014-05-121-3/+4
|
* Set authkey to NULL and check malloc return value.Kurt Roeckx2014-05-121-1/+7
|
* dgram_sctp_ctrl: authkey memory leakMartin Brejcha2014-05-121-0/+1
| | | | PR: 3327
* Avoid out-of-bounds write in SSL_get_shared_ciphersGünther Noack2014-05-111-0/+3
| | | | PR: 3317
* Fix infinite loop. PR#3347Viktor Dukhovni2014-05-111-2/+13
|
* Move length check earlier to ensure we don't go beyond the end of the user's ↵Matt Caswell2014-05-111-14/+15
| | | | buffer. PR#3320
* safety check to ensure we dont send out beyond the users bufferTim Hudson2014-05-111-0/+15
|
* Fixed CRLF in fileMatt Caswell2014-05-101-1/+1
|
* Return an error if no recipient type matches.Dr. Stephen Henson2014-05-091-2/+3
| | | | | | | | If the key type does not match any CMS recipient type return an error instead of using a random key (MMA mitigation). This does not leak any useful information to an attacker. PR#3348
* s_client/s_server: support unix domain socketsGeoff Thorpe2014-05-085-8/+214
| | | | | | | | | | | | | | | | | | | | | | The "-unix <path>" argument allows s_server and s_client to use a unix domain socket in the filesystem instead of IPv4 ("-connect", "-port", "-accept", etc). If s_server exits gracefully, such as when "-naccept" is used and the requested number of SSL/TLS connections have occurred, then the domain socket file is removed. On ctrl-C, it is likely that the stale socket file will be left over, such that s_server would normally fail to restart with the same arguments. For this reason, s_server also supports an "-unlink" option, which will clean up any stale socket file before starting. If you have any reason to want encrypted IPC within an O/S instance, this concept might come in handy. Otherwise it just demonstrates that there is nothing about SSL/TLS that limits it to TCP/IP in any way. (There might also be benchmarking and profiling use in this path, as unix domain sockets are much lower overhead than connecting over local IP addresses). Signed-off-by: Geoff Thorpe <geoff@openssl.org>
* coverity 966576 - close socket in error pathTim Hudson2014-05-081-0/+3
|
* PR#3342 fix resource leak coverity issue 966577Tim Hudson2014-05-081-1/+1
|
* fix coverity issue 966597 - error line is not always initialisedTim Hudson2014-05-071-0/+4
|
* Fixed NULL pointer dereference in PKCS7_dataDecode reported by David Ramos ↵Matt Caswell2014-05-073-1/+8
| | | | in PR#3339
* evp: prevent underflow in base64 decodingGeoff Thorpe2014-05-061-0/+1
| | | | | | | | | This patch resolves RT ticket #2608. Thanks to Robert Dugal for originally spotting this, and to David Ramos for noticing that the ball had been dropped. Signed-off-by: Geoff Thorpe <geoff@openssl.org>
* bignum: allow concurrent BN_MONT_CTX_set_locked()Geoff Thorpe2014-05-061-20/+26
| | | | | | | | | | | | | The lazy-initialisation of BN_MONT_CTX was serialising all threads, as noted by Daniel Sands and co at Sandia. This was to handle the case that 2 or more threads race to lazy-init the same context, but stunted all scalability in the case where 2 or more threads are doing unrelated things! We favour the latter case by punishing the former. The init work gets done by each thread that finds the context to be uninitialised, and we then lock the "set" logic after that work is done - the winning thread's work gets used, the losing threads throw away what they've done. Signed-off-by: Geoff Thorpe <geoff@openssl.org>
* Initialize num properly.Dr. Stephen Henson2014-05-061-0/+1
| | | | | PR#3289 PR#3345
* Set Enveloped data version to 2 if ktri version not zero.Dr. Stephen Henson2014-05-061-1/+1
|
* - fix coverity issues 966593-966596Tim Hudson2014-05-061-0/+3
|
* apps/s_server: document '-naccept' cmd-line argumentGeoff Thorpe2014-05-041-0/+1
| | | | Signed-off-by: Geoff Thorpe <geoff@openssl.org>
* md5/asm/md5-[586|x86_64].pl: +15% on Atom.Andy Polyakov2014-05-042-10/+20
| | | | [MD5 is hardly relevant, just cleaning up repository]
* C64x+ assembply pack: add RC4 module.Andy Polyakov2014-05-043-3/+186
|
* C64x+ assembly pack: make it work with older toolchain.Andy Polyakov2014-05-048-29/+63
|
* sha/asm/sha1-armv4-large.pl: add NEON and ARMv8 code paths.Andy Polyakov2014-05-042-13/+550
| | | | sha/asm/sha256-armv4.pl: add ARMv8 code path.
* crypto/armcap.c: detect ARMv8 capabilities [in 32-bit build].Andy Polyakov2014-05-043-0/+56
|
* Double free in i2o_ECPublicKeyDavid Ramos2014-05-041-2/+5
| | | | PR: 3338